© 2010

Securing Wireless Communications at the Physical Layer

  • Ruoheng Liu
  • Wade Trappe

Table of contents

  1. Front Matter
    Pages 1-16
  2. Zang Li, Roy Yates, Wade Trappe
    Pages 1-18
  3. Satashu Goel, Rohit Negi
    Pages 19-37
  4. Xiaojun Tang, Predrag Spasojević, Ruoheng Liu, H. Vincent Poor
    Pages 89-112
  5. Yingbin Liang, H. Vincent Poor, Shlomo Shamai (Shitz)
    Pages 113-141
  6. Sennur Ulukus, Ersen Ekrem
    Pages 143-172
  7. Deniz Gündüz, Elza Erkip, H. Vincent Poor
    Pages 173-199
  8. Suhas Mathur, Wade Trappe, Narayan Mandayam, Chunxuan Ye, Alex Reznik
    Pages 201-230
  9. B. Azimi-Sadjadi, A. Kiayias, A. Mercado, B. Yener
    Pages 281-309
  10. Liang Xiao, Larry Greenstein, Narayan Mandayam, Wade Trappe
    Pages 311-333
  11. Lifeng Lai, Hesham El Gamal, H. Vincent Poor
    Pages 335-353

About this book


Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving cryptographic protocols. Such an approach inherently seeks to secure the wireless network at the link layer and above, and consequently fails to leverage the most unique characteristic of wireless communication: its physical layer.

Securing Wireless Communications at the Physical Layer is a compilation of contributions by experts in wireless communications and security, and presents state-of-the-art results that examine the challenge of introducing security at the physical layer of a wireless system. Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validations that have been performed on real wireless systems. The book also covers topics related to ensuring that cooperative wireless communications at the physical layer is trustworthy. Additionally, the emerging area of modulation forensics, whereby a device is able to identify the modulation format being employed by other devices is explored.

Securing Wireless Communications at the Physical Layer will serve as a valuable reference to engineers and researchers in the fields of security and wireless communications.


Artificial noise Cooperative jamming Crib DES Gaussian Channel MIMO Multiple-transmit antennas RSSI Secret wireless communication Wireless digital communication cryptography interference

Editors and affiliations

  • Ruoheng Liu
    • 1
  • Wade Trappe
    • 2
  1. 1.Dept. Electrical EngineeringPrinceton UniversityPrincetonU.S.A.
  2. 2.Technology Centre of New JerseyRutgers UniversityNorth BrunswickU.S.A.

Bibliographic information

Industry Sectors
IT & Software
Materials & Steel
Finance, Business & Banking
Energy, Utilities & Environment
Oil, Gas & Geosciences