Physical and Data-Link Security Techniques for Future Communication Systems

  • Marco Baldi
  • Stefano Tomasin
Conference proceedings

Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 358)

Table of contents

  1. Front Matter
    Pages i-x
  2. Arsenia Chorti, Camilla Hollanti, Jean-Claude Belfiore, Harold Vincent Poor
    Pages 1-15
  3. Eduard Jorswieck, Pin-Hsun Lin, Sabrina Engelmann, Anne Wolf
    Pages 17-31
  4. Francesco Renna, Nicola Laurenti, Stefano Tomasin
    Pages 33-52
  5. Marco Baldi, Franco Chiaraluce, Nicola Maturo, Stefano Tomasin
    Pages 53-68
  6. Rafael F. Schaefer, Andrea Grigorescu, Holger Boche, H. Vincent Poor
    Pages 69-91
  7. Stefan Pfennig, Elke Franz, Sabrina Engelmann, Anne Wolf
    Pages 93-110
  8. Gianni Pasolini, Enrico Paolini, Davide Dardari, Marco Chiani
    Pages 111-124
  9. Alberto Pittolo, Andrea M. Tonello
    Pages 125-144
  10. Tiziano Bianchi, Enrico Magli
    Pages 145-162
  11. Kyle Marshall, Davide Schipani, Anna-Lena Trautmann, Joachim Rosenthal
    Pages 163-172
  12. Francesco Aldà, Riccardo Aragona, Lorenzo Nicolodi, Massimiliano Sala
    Pages 181-195
  13. Riccardo Aragona, Francesco Gozzini, Massimiliano Sala
    Pages 197-203
  14. Alessio Meneghetti, Pietro Peterlongo, Massimiliano Sala
    Pages 205-212

About these proceedings


 This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with presentation of cutting-edge research and innovative results from leading researchers. The characteristic feature of all the contributions is their relevance for practical embodiments: detailed consideration is given to applications of security principles to a variety of widely used communication techniques such as multiantenna systems, ultra-wide band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, providing a bridge between two usually distinct worlds. The book comprises extended versions of contributions delivered at the Workshop on Communication Security, held in Ancona, Italy, in September 2014 within the framework of the research project "Enhancing Communication Security by Cross-layer Physical and Data-link Techniques", funded by the Italian Ministry of Education, Universities, and Research.


Communication Systems Computational Security Cross-layer Security Cryptography Unconditional Security Workshop on Communication Security (WCS) 2014

Editors and affiliations

  • Marco Baldi
    • 1
  • Stefano Tomasin
    • 2
  1. 1.Department of Information EngineeringUniversità Politecnica delle MarcheAnconaItaly
  2. 2.Department of Information EngineeringUniversity of PadovaPadovaItaly

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Engineering Engineering (R0)
  • Print ISBN 978-3-319-23608-7
  • Online ISBN 978-3-319-23609-4
  • Series Print ISSN 1876-1100
  • Series Online ISSN 1876-1119
  • Buy this book on publisher's site
Industry Sectors
Materials & Steel
Finance, Business & Banking
IT & Software
Energy, Utilities & Environment
Oil, Gas & Geosciences