000823518 000__ 03331cam\a2200493I\\4500 000823518 001__ 823518 000823518 005__ 20230306143930.0 000823518 006__ m\\\\\o\\d\\\\\\\\ 000823518 007__ cr\un\nnnunnun 000823518 008__ 170906s2018\\\\sz\\\\\\ob\\\\000\0\eng\d 000823518 019__ $$a1003197175$$a1003253844$$a1004732795$$a1005137113$$a1012043934 000823518 020__ $$a9783319618630$$q(electronic book) 000823518 020__ $$a3319618636$$q(electronic book) 000823518 020__ $$z9783319618623 000823518 020__ $$z3319618628 000823518 0247_ $$a10.1007/978-3-319-61863-0$$2doi 000823518 035__ $$aSP(OCoLC)on1003107248 000823518 035__ $$aSP(OCoLC)1003107248$$z(OCoLC)1003197175$$z(OCoLC)1003253844$$z(OCoLC)1004732795$$z(OCoLC)1005137113$$z(OCoLC)1012043934 000823518 040__ $$aYDX$$beng$$cYDX$$dN$T$$dEBLCP$$dGW5XE$$dN$T$$dNJR$$dAZU$$dOCLCF$$dCOO$$dUAB$$dU3W$$dCAUOI 000823518 049__ $$aISEA 000823518 050_4 $$aTK5103.2 000823518 08204 $$a621.382$$223 000823518 1001_ $$aWang, Li,$$eauthor. 000823518 24510 $$aPhysical layer security in wireless cooperative networks /$$cLi Wang. 000823518 260__ $$aCham, Switzerland :$$bSpringer,$$c[2018] 000823518 300__ $$a1 online resource. 000823518 336__ $$atext$$btxt$$2rdacontent 000823518 337__ $$acomputer$$bc$$2rdamedia 000823518 338__ $$aonline resource$$bcr$$2rdacarrier 000823518 347__ $$atext file$$bPDF$$2rda 000823518 4901_ $$aWireless networks 000823518 504__ $$aIncludes bibliographical references. 000823518 5050_ $$a1 Introduction -- 2 Existing Techniques in Physical Layer Security -- 3 Secrecy Analysis with Time-Reversal Technique in Distributed Transmission System -- 4 Spatial Modulation in Physical Layer Security -- 5 Cooperative Security in D2D Communications -- 6 Summary. 000823518 506__ $$aAccess limited to authorized users. 000823518 520__ $$aThis book provides a comprehensive overview for physical layer security in wireless cooperative networks, including fundamental concepts, typical solutions, and some recent achievements. It investigates the secrecy performance with respect to time reversal transmission and multi-antenna spatial modulation techniques. Both of which are proposed as effective physical layer processing schemes in wireless multipath channel environment.Resource allocation strategies to enhance secrecy performance in D2D communications are also discussed in this book. It contributes to formulating user social behaviors and utilizing social characteristics to improve the secrecy performance in wireless cooperative networks. This book not only analyzes the secrecy enhancement with certain techniques, but also pursues to find the relationships or tradeoffs among the secrecy performance, energy consumption, channel conditions, and other essential factors in wireless communications. This book targets researchers and professionals specializing in electronic engineering, computer science,wireless communications and networks. Advanced level students in electrical engineering and computer science will also find this book useful as a secondary text. 000823518 588__ $$aDescription based on print version record. 000823518 650_0 $$aWireless communication systems$$xSecurity measures. 000823518 77608 $$iPrint version:$$z3319618628$$z9783319618623$$w(OCoLC)988276715 000823518 830_0 $$aWireless networks. 000823518 830_0 $$aWireless networks (Springer (Firm)) 000823518 852__ $$bebk 000823518 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-61863-0$$zOnline Access$$91397441.1 000823518 909CO $$ooai:library.usi.edu:823518$$pGLOBAL_SET 000823518 980__ $$aEBOOK 000823518 980__ $$aBIB 000823518 982__ $$aEbook 000823518 983__ $$aOnline 000823518 994__ $$a92$$bISE