Limit search to available items
Book Cover
E-book
Author Bloch, Matthieu, 1981-

Title Physical-layer security : from information theory to security engineering / Matthieu Bloch & Joao Barros
Published Cambridge, UK ; New York : Cambridge University Press, 2011
Online access available from:
Cambridge Core    View Resource Record  

Copies

Description 1 online resource (xii, 329 pages) : illustrations
Contents Cover; Title; Copyright; Dedication; Contents; Preface; Notation; Abbreviations; Part I Preliminaries; 1 An information-theoretic approach to physical-layer security; 1.1 Shannon's perfect secrecy; 1.2 Secure communication over noisy channels; 1.3 Channel coding for secrecy; 1.4 Secret-key agreement from noisy observations; 1.5 Active attacks; 1.6 Physical-layer security and classical cryptography; 1.7 Outline; 2 Fundamentals of information theory; 2.1 Mathematical tools of information theory; 2.1.1 Useful bounds; 2.1.2 Entropy and mutual information; 2.1.3 Strongly typical sequences
2.1.4 Weakly typical sequences2.1.5 Markov chains and functional dependence graphs; 2.2 Point-to-point communication problem; 2.2.1 Point-to-point communication model; 2.2.2 The source coding theorem; 2.2.3 The channel coding theorem; 2.3 Network information theory; 2.3.1 Distributed source coding; 2.3.2 The multiple-access channel; 2.3.3 The broadcast channel; 2.4 Bibliographical notes; Part II Information-theoretic security; 3 Secrecy capacity; 3.1 Shannon's cipher system; 3.2 Secure communication over a noisy channel; 3.3 Perfect, weak, and strong secrecy; 3.4 Wyner's wiretap channel
3.4.1 Achievability proof for the degraded wiretap channel3.4.2 Converse proof for the degraded wiretap channel; 3.5 Broadcast channel with confidential messages; 3.5.1 Channel comparison; 3.5.2 Achievability proof for the broadcast channel with confidential messages; 3.5.3 Converse proof for the broadcast channel with confidential messages; 3.6 Multiplexing and feedback; 3.6.1 Multiplexing secure and non-secure messages; 3.6.2 Feedback and secrecy; 3.7 Conclusions and lessons learned; 3.8 Bibliographical notes; 4 Secret-key capacity; 4.1 Source and channel models
4.2 Secret-key capacity of the source model4.2.1 Secret-key distillation based on wiretap codes; 4.2.2 Secret-key distillation based on Slepian -- Wolf codes; 4.2.3 Upper bound for secret-key capacity; 4.2.4 Alternative upper bounds for secret-key capacity; 4.3 Sequential key distillation for the source model; 4.3.1 Advantage distillation; 4.3.2 Information reconciliation; 4.3.3 Privacy amplification; 4.4 Secret-key capacity of the channel model; 4.5 Strong secrecy from weak secrecy; 4.6 Conclusions and lessons learned; 4.7 Appendix; 4.8 Bibliographical notes
5 Security limits of Gaussian and wireless channels5.1 Gaussian channels and sources; 5.1.1 Gaussian broadcast channel with confidential messages; 5.1.2 Multiple-input multiple-output Gaussian wiretap channel; 5.1.3 Gaussian source model; 5.2 Wireless channels; 5.2.1 Ergodic-fading channels; 5.2.2 Block-fading channels; 5.2.3 Quasi-static fading channels; 5.3 Conclusions and lessons learned; 5.4 Bibliographical notes; Part III Coding and system aspects; 6 Coding for secrecy; 6.1 Secrecy and capacity-achieving codes; 6.2 Low-density parity-check codes
Summary Presents the theoretical foundations, practical implementation, challenges and benefits of physical-layer security, a groundbreaking new model for secure communication
Bibliography Includes bibliographical references and index
Notes Print version record
Subject Computer networks -- Security measures.
Computer security.
Form Electronic book
Author Barros, João.
ISBN 0511977980 (electronic bk.)
1139116576 (electronic bk.)
1139127233 (electronic bk.)
1283316307
9780511977985 (electronic bk.)
9781139116572 (electronic bk.)
9781139127233 (electronic bk.)
9781283316309