Physical Layer Security for 6G Networks (Telecommunications)

個数:

Physical Layer Security for 6G Networks (Telecommunications)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 596 p.
  • 言語 ENG
  • 商品コード 9781839536915
  • DDC分類 621.38456

Full Description

6G networks are expected to provide one-microsecond latency communication with a billion devices competing for resources 1000 times faster than current standards. Increases in network speed, heterogeneity, virtualization, better radio requirements and adaptive communications will place new demands on physical layer security. Moreover, IoT, blockchain, and artificial intelligence are enabling technologies that require rapid data rates, raising a significant burden on the network's physical layer, requiring that security must be attained at a fast pace, and that the network must be resilient to accommodate sudden changes to the configurations or the load.

Physical layer (PHY) security solutions are needed that have the capacity to handle the new demands of 6G networks, whilst protecting those networks against risk factors such as interference, data spoofing, replay attacks, side-channel attacks, jamming, traffic analysis, and cyber-vandalism attacks. This comprehensive book addresses the PHY security challenges and proposes efficient and resilient physical layer security solutions for beyond 5G networks leading to 6G. Several topics have emerged that rely on PHY security in solving real-world network challenges such as ultra-dense networks, adaptive communication, distributed technology, and artificial intelligence.

Physical Layer Security for 6G Networks helps readers understand the expectations of 6G's physical layer security in supporting pervasive and integrated communication networks, AI convergence and utility, and develop better sensing solutions, which go beyond cognitive radio, device-to-device or mm-wave communications.

Contents

Part I: Fundamental theories of physical layer security

Chapter 1: Learned codes for dependent wiretap channels
Chapter 2: Physical layer security in the terahertz band
Chapter 3: Eavesdropping attacks for terahertz wireless links
Chapter 4: Intelligent reflecting surface-aided physical layer security of wireless communications


Part II: Authentication using channel features and hardware impairments

Chapter 5: Intelligent physical layer authentication
Chapter 6: Deep learning-enhanced radio frequency fingerprint identification
Chapter 7: Radio frequency fingerprint-based wireless device identification


Part III: Key generation from wireless channels

Chapter 8: Secret key generation from wireless channels
Chapter 9: Impact of reconfigurable intelligent surfaces on physical layer key generation in NextG wireless networks
Chapter 10: Physical layer key generation for LoRa-enabled networks
Chapter 11: Robust secret key generation from stochastic fading in the presence of passive and active attackers
Chapter 12: Physical-layer key generation for multi-user massive MIMO wireless communications


Part IV: Applications of physical layer security

Chapter 13: Physical layer security for UAV wireless networks
Chapter 14: Secure communication in mobile edge computing networks with RF energy harvesting
Chapter 15: Secure and private localization in 6G networks
Chapter 16: Radio frequency informed physical layer security - an augmented padlock to wireless transmission secrecy
Chapter 17: Physical layer security for non-orthogonal multiple access toward 6G
Chapter 18: Detecting unpredictable adversaries in the industrial network with blockchain
Chapter 19: Using support vector machines for detecting active spoofing attacks

最近チェックした商品