Wireless Communications under Hostile Jamming: Security and Efficiency

Yuan Liang, Tongtong Li, Tianlong Song, et al.

PDF
ca. 118,99
Amazon iTunes Thalia.de Weltbild.de Hugendubel Bücher.de ebook.de kobo Mayersche Osiander Google Books Barnes&Noble bol.com
* Affiliatelinks/Werbelinks
Hinweis: Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.

Springer Singapore img Link Publisher

Naturwissenschaften, Medizin, Informatik, Technik / Datenkommunikation, Netzwerke

Beschreibung

This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. In this book, going beyond traditional communication system design that mainly focuses on accurate information transmission under benign environments, we aim to enhance the physical layer security of communication systems by integrating modern cryptographic techniques into transceiver design, so as to achieve secure high-speed transmission under hostile interference with high reliability and efficiency.  We revisit existing jamming patterns, and introduce new jamming patterns. We analyze the weaknesses of existing anti-jamming techniques.  We present innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G and the upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping and OFDM schemes. We also provide benchmarks for system performance evaluation under various jamming scenarios through capacity analysis. This book includes design principles, in-depth theoretical analysis and practical design examples, and will be of interest to academic researchers as well as professionals in industry.

Weitere Titel zum gleichen Preis
Cover Fog Computing
Zaigham Mahmood
Cover Pervasive Social Computing
Muhammad Ashad Kabir
Cover Manage IT!
Theo Thiadens

Kundenbewertungen

Schlagwörter

collision-free frequency hopping, disguised jamming, message-driven frequency hopping, secure carrier assignment, Anti-jamming techniques, physical layer security, secure precoding