Wireless physical layer (PHY) security has attracted much attention due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping, jamming, and interference.
Physical Layer Security for Wireless Sensing and Communication covers both communication and sensing security from a broad perspective. The main emphasis is on PHY security, although other security measures are covered for the sake of completeness and as a step towards cross-layer security and cognitive security vision. After discussing the features of wireless channels from both the communication and sensing perspectives, the book details their exploitation for secure transmission utilizing various approaches. Wireless sensing and radio environment concepts are also addressed, along with the related security implications in terms of eavesdropping, disruption, manipulation, and, in general, the exploitation of wireless sensing by unauthorised users. Several solutions for these threats from the domains of wireless communication, military radars, and machine learning, are discussed.
The book provides valuable information to researchers in academia and industry, as well as engineers, developers, and advanced students in the field of cybersecurity.
"synopsis" may belong to another edition of this title.
Hüseyin Arslan is a professor at the Istanbul Medipol University, Turkey, where he is Dean of the School of Engineering and Natural Sciences. He has also worked as a part-time consultant for various companies and institutions including Anritsu Company and The Scientific and Technological Research Council of Turkey. Hüseyin conducts research in wireless systems with an emphasis on the physical and medium access layers of communications.
Haji M. Furqan is currently a post-doctoral researcher in the Communications, Signal Processing, and Networking Center (CoSiNC) at Istanbul Medipol University, Turkey. He received his B.E. and M.Sc. degrees in electrical engineering from COMSATS Institute of Information Technology (CIIT), Islamabad, Pakistan in 2012 and 2014, respectively. He received his Ph.D. from Istanbul Medipol University, Turkey. His research focuses on physical layer security, REM security, context aware security, cognitive security, MIMO, OFDM, V2X, and 5G and beyond technologies.
"About this title" may belong to another edition of this title.
£ 2.95 shipping within U.S.A.
Destination, rates & speedsSeller: Books From California, Simi Valley, CA, U.S.A.
hardcover. Condition: Very Good. Seller Inventory # mon0003812137
Quantity: 1 available
Seller: Best Price, Torrance, CA, U.S.A.
Condition: New. SUPER FAST SHIPPING. Seller Inventory # 9781839535277
Quantity: 2 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 45774799-n
Quantity: 1 available
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9781839535277
Quantity: Over 20 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 45774799
Quantity: 1 available
Seller: Rarewaves USA, OSWEGO, IL, U.S.A.
Hardback. Condition: New. Wireless physical layer (PHY) security has attracted much attention due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping, jamming, and interference. Physical Layer Security for Wireless Sensing and Communication covers both communication and sensing security from a broad perspective. The main emphasis is on PHY security, although other security measures are covered for the sake of completeness and as a step towards cross-layer security and cognitive security vision. After discussing the features of wireless channels from both the communication and sensing perspectives, the book details their exploitation for secure transmission utilizing various approaches. Wireless sensing and radio environment concepts are also addressed, along with the related security implications in terms of eavesdropping, disruption, manipulation, and, in general, the exploitation of wireless sensing by unauthorised users. Several solutions for these threats from the domains of wireless communication, military radars, and machine learning, are discussed. The book provides valuable information to researchers in academia and industry, as well as engineers, developers, and advanced students in the field of cybersecurity. Seller Inventory # LU-9781839535277
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 45774799-n
Quantity: 1 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 45774799
Quantity: 1 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Hardback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 185. Seller Inventory # C9781839535277
Quantity: Over 20 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
HRD. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L1-9781839535277
Quantity: Over 20 available