Securing Wireless Communications at the Physical Layer
Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a
- PDF / 8,094,277 Bytes
- 401 Pages / 439.44 x 666.12 pts Page_size
- 45 Downloads / 232 Views
Ruoheng Liu ยท Wade Trappe Editors
Securing Wireless Communications at the Physical Layer
~ Springer
Editors Ruoheng Liu Princeton University Department of Electrical Engineering Olden Street Princeton, NJ 08544 USA [email protected]
Dr. Wade Trappe Rutgers University Technology Centre of New Jersey Wireless Information 671 Route 1 South North Brunswick, NJ 08902 USA [email protected]
ISBN 978-1-4419-1384-5 e-ISBN 978-1-4419-1385-2 DOI 10.1007/978-1-4419-1385-2 Springer New York Dordrecht Heidelberg London Library of Congress Control Number: c Springer Science+Business Media, LLC 2010 All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Cover design: Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)
To Our Families
Preface
Securing communications is a challenging task. A first attempt at security involves learning basic cryptography, and applying encryption algorithms to make messages unintelligible to adversaries. However, rarely is the task of securing a message exchange so simple. When one steps back and contemplates how to secure the exchange of communications, one realizes that the challenge is fundamentally one of building a complete solution. For example, one must ensure that all entities involved have proper and authenticated cryptographic material, or one must ensure that one verifiably knows to whom one is communicating, or one must understand how the communication process takes place so as to make certain there are no vulnerabilities introduced by the communication process itself. This last issue, namely that security methods are often built without consideration to how communication takes place, represents a fundamental gap where much of modern security research has fallen short. The security literature is filled with a mass of articles on cryptographic primitives and, although there are still many theoretical hurdles to be overcome by the cryptographic community, most of these short comings are academic and there are now numerous textbooks on cryptography that can provide the basic introduction needed to employ cryptographic primitives. On the other side of the coin, the security literature is also filled with a mass of articles devoted to building secure protocols and, similarly, there are now numerous textbooks on computer security that provide the instruction needed t
Data Loading...