{"id":33754,"date":"2021-02-07T20:53:53","date_gmt":"2021-02-07T17:53:53","guid":{"rendered":"https:\/\/researcherstore.com\/?post_type=product&p=33754"},"modified":"2021-02-19T02:26:54","modified_gmt":"2021-02-18T23:26:54","slug":"wireless-communication-security-2","status":"publish","type":"product","link":"https:\/\/researcherstore.com\/product\/wireless-communication-security-2\/","title":{"rendered":"Wireless Communication Security – eBook"},"content":{"rendered":"

In this e-book, several advanced security designs and techniques, capable of replacing conventional encryption-based methods, are proposed for future wireless networks. Particularly, the conducted research studies encompass the following main directions: I) Designing cross PHY\/MAC layer security techniques using the following approaches: 1) Automatic-repeat-request (ARQ) with adaptive modulation. 2) ARQ with null-space-independent artificial noise. II) Security techniques for OFDM-based waveforms. This includes developing new designs that cover the following topics: 1) OFDM with adaptive interleaving (precoding) and deinterleaving (postcoding). 2) OFDM with subcarrier index selection for enhancing security and reliability of 5G URLLC services. 3) CP-less OFDM with alignment signals for enhancing spectral efficiency, reducing latency, and improving PHY security of 5G and beyond services. III) New inherently secure waveform designs, where a secure channel-based transform waveform, referred to as orthogonal transform division multiplexing (OTDM), is developed for future wireless systems. IV) Security designs for orthogonal space-time block coding (OSTBC)-based MISO systems.<\/span><\/p>\n

[woo-related]<\/p>\n","protected":false},"excerpt":{"rendered":"

In this e-book, several advanced security designs and techniques, capable of replacing conventional encryption-based methods, are proposed for future wireless networks. Particularly, the conducted research studies encompass the following main directions: I) Designing cross PHY\/MAC layer security techniques using the following approaches: 1) Automatic-repeat-request (ARQ) with adaptive modulation. 2) ARQ with null-space-independent artificial noise. II) […]<\/p>\n","protected":false},"featured_media":5733,"template":"","meta":{"qubely_global_settings":"","qubely_interactions":"","pmpro_default_level":""},"product_cat":[96,105],"product_tag":[],"_links":{"self":[{"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/product\/33754"}],"collection":[{"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/media\/5733"}],"wp:attachment":[{"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/media?parent=33754"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/product_cat?post=33754"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/product_tag?post=33754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}