000 04558nam a22006375i 4500
001 978-981-13-0821-5
003 DE-He213
005 20210201191403.0
007 cr nn 008mamaa
008 181010s2018 si | s |||| 0|eng d
020 _a9789811308215
_9978-981-13-0821-5
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
100 1 _aLi, Tongtong.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aWireless Communications under Hostile Jamming: Security and Efficiency
_h[electronic resource] /
_cby Tongtong Li, Tianlong Song, Yuan Liang.
250 _a1st ed. 2018.
264 1 _aSingapore :
_bSpringer Singapore :
_bImprint: Springer,
_c2018.
300 _aXXI, 219 p. 84 illus., 8 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
500 _aAcceso multiusuario
505 0 _aChapter 1 Introduction -- Chapter 2 Enhanced CDMA System with Secure Scrambling -- Chapter 3 Message-Driven Frequency Hopping Systems -- Chapter 4 Collision-Free Frequency Hopping and OFDM -- Chapter 5 Securely Precoded OFDM -- Chapter 6 Multiband Transmission under Jamming: A Game Theoretic Perspective -- 7. Chapter 7 Conclusions and Future Directions.
520 _aThis monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. In this book, going beyond traditional communication system design that mainly focuses on accurate information transmission under benign environments, we aim to enhance the physical layer security of communication systems by integrating modern cryptographic techniques into transceiver design, so as to achieve secure high-speed transmission under hostile interference with high reliability and efficiency. We revisit existing jamming patterns, and introduce new jamming patterns. We analyze the weaknesses of existing anti-jamming techniques. We present innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G and the upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping and OFDM schemes. We also provide benchmarks for system performance evaluation under various jamming scenarios through capacity analysis. This book includes design principles, in-depth theoretical analysis and practical design examples, and will be of interest to academic researchers as well as professionals in industry.
541 _fUABC ;
_cTemporal ;
_d01/01/2021-12/31/2023.
650 0 _aComputer communication systems.
650 0 _aElectrical engineering.
650 0 _aSignal processing.
650 0 _aImage processing.
650 0 _aSpeech processing systems.
650 0 _aComputers.
650 0 _aComputer security.
650 1 4 _aComputer Communication Networks.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I13022
650 2 4 _aCommunications Engineering, Networks.
_0https://scigraph.springernature.com/ontologies/product-market-codes/T24035
650 2 4 _aSignal, Image and Speech Processing.
_0https://scigraph.springernature.com/ontologies/product-market-codes/T24051
650 2 4 _aInformation Systems and Communication Service.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I18008
650 2 4 _aSystems and Data Security.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28060
700 1 _aSong, Tianlong.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aLiang, Yuan.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811308208
776 0 8 _iPrinted edition:
_z9789811308222
776 0 8 _iPrinted edition:
_z9789811345098
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=https://doi.org/10.1007/978-981-13-0821-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cLIBRO_ELEC
999 _c242899
_d242898