Physical Layer Security and Its Applications

Physical Layer Security and Its Applications

Author: 
Sharma, Rajesh K.
Place: 
Hershey
Publisher: 
IGI Global
Date published: 
2013
Editor: 
Rawat, Danda B.
Source: 
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
Subject: 
Abstract: 

This chapter provides a survey of physical layer security and key generation methods. This includes mainly an overview of ongoing research in physical layer security in the present and next generation communication networks. Although higher layer security mechanisms and protocols address wireless security challenges in large extent, more security vulnerabilities arise due to the increasingly pervasive existence of wireless communication devices. In this context, the focus of this chapter is mainly on physical layer security. Some security attacks in general are briefly reviewed. Models of physical layer security, information theoretic works, and key generation methods including quantization and reconciliation are discussed. Some latest developments for enhanced security like Multiple-Input Multiple-Output (MIMO) systems, reconfigurable antennas, and multiple relay systems are also presented. Finally, some existing and emerging application scenarios of physical layer security are discussed.

Series: 
Advances in Information Security, Privacy, and Ethics

CITATION: Sharma, Rajesh K.. Physical Layer Security and Its Applications edited by Rawat, Danda B. . Hershey : IGI Global , 2013. Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications - Available at: https://library.au.int/physical-layer-security-and-its-applications