Skip to content

Physical-Layer Security From Information Theory to Security Engineering

Spend $50 to get a free movie!

ISBN-10: 0521516501

ISBN-13: 9780521516501

Edition: 2011

Authors: Matthieu Bloch, Jo�o Barros

List price: $156.95
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Customers also bought

Book details

List price: $156.95
Copyright year: 2011
Publisher: Cambridge University Press
Publication date: 9/22/2011
Binding: Hardcover
Pages: 346
Size: 7.00" wide x 9.75" long x 0.75" tall
Weight: 1.848
Language: English

Matthieu Bloch is an Assistant Professor in the School of Electrical Engineering of the Georgia Institute of Technology. He received a Ph.D. in Engineering Science from the Universit� de Franche-Comt�, Besan�on, France, in 2006, and a Ph.D. in Electrical Engineering from the Georgia Institute of Technology in 2008. His research interests are in the areas of information theory, error-control coding, wireless communications and quantum cryptography.

Preface
Notation
List of abbreviations
Preliminaries
An information-theoretic approach to physical-layer security
Shannon's perfect secrecy
Secure communication over noisy channels
Channel coding for secrecy
Secret-key agreement from noisy observations
Active attacks
Physical-layer security and classical cryptography
Outline of the rest of the book
Fundamentals of information theory
Mathematical tools of information theory
Useful bounds
Entropy and mutual information
Strongly typical sequences
Weakly typical sequences
Markov chains and functional dependence graphs
The point-to-point communication problem
Point-to-point communication model
The source coding theorem
The channel coding theorem
Network information theory
Distributed source coding
The multiple-access channel
The broadcast channel
Bibliographical notes
Information-theoretic security
Secrecy capacity
Shannon's cipher system
Secure communication over a noisy channel
Perfect, weak, and strong secrecy
Wyner's wiretap channel
Achievability proof for the degraded wiretap channel
Converse proof for the degraded wiretap channel
Broadcast channel with confidential messages
Channel comparison
Achievability proof for the broadcast channel with confidential messages
Converse proof for the broadcast channel with confidential messages
Multiplexing and feedback
Multiplexing secure and non-secure messages
Feedback and secrecy
Conclusions and lessons learned
Bibliographical notes
Secret-key capacity
Source and channel models for secret-key agreement
Secret-key capacity of the source model
Secret-key distillation based on wiretap codes
Secret-key distillation based on Slepian-Wolf codes
Upper bound for secret-key capacity
Alternative upper bounds for secret-key capacity
Sequential key distillation for the source model
Advantage distillation
Information reconciliation
Privacy amplification
Secret-key capacity of the channel model
Strong secrecy from weak secrecy
Conclusions and lessons learned
Appendix
Bibliographical notes
Security limits of Gaussian and wireless channels
Gaussian channels and sources
Gaussian broadcast channel with confidential messages
Multiple-input multiple-output Gaussian wiretap channel
Gaussian source model
Wireless channels
Ergodic-fading channels
Block-fading channels
Quasi-static fading channels
Conclusions and lessons learned
Bibliographical notes
Coding and system aspects
Coding for secrecy
Secrecy and capacity-achieving codes
Low-density parity-check codes
Binary linear block codes and LDPC codes
Message-passing decoding algorithm
Properties of LDPC codes under message-passing decoding
Secrecy codes for the binary erasure wiretap channel
Algebraic secrecy criterion
Coset coding with dual of LDPC codes
Degrading erasure channels
Reconciliation of binary memoryless sources
Reconciliation of general memoryless sources
Multilevel reconciliation
Multilevel reconciliation of Gaussian sources
Secure communication over wiretap channels
Bibliographical notes
System aspects
Basic security primitives
Symmetric encryption
Public-key cryptography
Hash functions
Authentication, integrity, and confidentiality
Key-reuse and authentication
Security schemes in the layered architecture
Practical case studies
Integrating physical-layer security into wireless systems
Bibliographical notes
Other applications of information-theoretic security
Secrecy and jamming in multi-user channels
Two-way Gaussian wiretap channel
Cooperative jamming
Coded cooperative jamming
Key-exchange
Bibliographical notes
Network-coding security
Fundamentals of network coding
Network-coding basics
System aspects of network coding
Practical network-coding protocols
Security vulnerabilities
Securing network coding against passive attacks
Countering Byzantine attacks
Bibliographical notes
References
Author index
Subject index