Wireless communications under hostile jamming : security and efficiency (Record no. 29500)

000 -LEADER
fixed length control field nam a22 7a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190527b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789811308208
Terms of availability (hbk)
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number LIT
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Li, Tongtong
245 ## - TITLE STATEMENT
Title Wireless communications under hostile jamming : security and efficiency
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Singapore :
Name of publisher, distributor, etc Springer,
Date of publication, distribution, etc 2018.
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 219 p. :
Other physical details ill. ;
Dimensions 24 cm.
365 ## - TRADE PRICE
Price type code EUR
Price amount 119.99
Unit of pricing 00
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. In this book, going beyond traditional communication system design that mainly focuses on accurate information transmission under benign environments, we aim to enhance the physical layer security of communication systems by integrating modern cryptographic techniques into transceiver design, so as to achieve secure high-speed transmission under hostile interference with high reliability and efficiency. We revisit existing jamming patterns, and introduce new jamming patterns. We analyze the weaknesses of existing anti-jamming techniques. We present innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G and the upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping and OFDM schemes. We also provide benchmarks for system performance evaluation under various jamming scenarios through capacity analysis. This book includes design principles, in-depth theoretical analysis and practical design examples, and will be of interest to academic researchers as well as professionals in industry.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers
Topical term or geographic name as entry element Networking
Topical term or geographic name as entry element Security
Topical term or geographic name as entry element Telecommunications
Topical term or geographic name as entry element Online services
Topical term or geographic name as entry element Computer networking
Topical term or geographic name as entry element Network hardware
Topical term or geographic name as entry element Computer security
Topical term or geographic name as entry element Information systems
Topical term or geographic name as entry element Signal
Topical term or geographic name as entry element Image
Topical term or geographic name as entry element Speech processing
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Song, Tianlong
Relator term aut
Personal name Liang, Yuan
Relator term aut
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Total Renewals Full call number Barcode Date last seen Date last borrowed Koha item type
          DAIICT DAIICT 2019-05-24 Baroda Book Corporation 9767.19 3 3 005.8 LIT 031943 2022-06-27 2020-12-09 Books

Powered by Koha