Skip to content
Register Sign in Wishlist

Physical-Layer Security
From Information Theory to Security Engineering

$80.00 USD

  • Date Published: December 2011
  • availability: This ISBN is for an eBook version which is distributed on our behalf by a third party.
  • format: Adobe eBook Reader
  • isbn: 9781139118743

$ 80.00 USD
Adobe eBook Reader

You will be taken to for this purchase
Buy eBook Add to wishlist

Other available formats:

Looking for an inspection copy?

This title is not currently available on inspection

Product filter button
About the Authors
  • This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures, it provides essential practical tools that enable graduate students, industry professionals and researchers to build more secure systems by exploiting the noise inherent to communications channels. The book begins with a self-contained explanation of the information-theoretic limits of secure communications at the physical layer. It then goes on to develop practical coding schemes, building on the theoretical insights and enabling readers to understand the challenges and opportunities related to the design of physical layer security schemes. Finally, applications to multi-user communications and network coding are also included.

    • Presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication: physical-layer security
    • Provides essential practical tools enabling readers to build more secure systems
    • Includes a broad treatment of passive and active attacks at the physical layer, setting out the vulnerabilities that can be exploited by eavesdroppers and jammers
    Read more

    Customer reviews

    Not yet reviewed

    Be the first to review

    Review was not posted due to profanity


    , create a review

    (If you're not , sign out)

    Please enter the right captcha value
    Please enter a star rating.
    Your review must be a minimum of 12 words.

    How do you rate this item?


    Product details

    • Date Published: December 2011
    • format: Adobe eBook Reader
    • isbn: 9781139118743
    • contains: 79 b/w illus. 7 tables
    • availability: This ISBN is for an eBook version which is distributed on our behalf by a third party.
  • Table of Contents

    Part I. Preliminaries:
    1. An information-theoretic approach to physical-layer security
    2. Fundamentals of information theory
    Part II. Information-Theoretic Security:
    3. Secrecy capacity
    4. Secret-key capacity
    5. Security limits of Gaussian and wireless channels
    Part III. Coding and System Aspects:
    6. Coding for secrecy
    7. System aspects
    Part IV. Other Applications of Information-Theoretic Security:
    8. Secrecy and jamming in multi-user channels
    8. Network coding security.

  • Authors

    Matthieu Bloch, Georgia Institute of Technology
    Matthieu Bloch is an Assistant Professor in the School of Electrical Engineering of the Georgia Institute of Technology. He received a Ph.D. in Engineering Science from the Université de Franche-Comté, Besançon, France, in 2006, and a Ph.D. in Electrical Engineering from the Georgia Institute of Technology in 2008. His research interests are in the areas of information theory, error-control coding, wireless communications and quantum cryptography.

    João Barros, Universidade do Porto
    João Barros is an Associate Professor in the Department of Electrical and Computer Engineering of the Faculdade de Engenharia da Universidade do Porto, and the Coordinator of the Porto Laboratory of the Instituto de Telecomunicações in Portugal. He received his Ph.D. in Electrical Engineering and Information Technology from the Technische Universitaet Muenchen (TUM), Germany, in 2004 and has since published extensively in the general areas of information theory, communication networks and security. He has taught short courses and tutorials at various institutions and has received a Best Teaching Award from the Bavarian State Ministry of Sciences and the Arts.

Sign In

Please sign in to access your account


Not already registered? Create an account now. ×

Sorry, this resource is locked

Please register or sign in to request access. If you are having problems accessing these resources please email

Register Sign in
Please note that this file is password protected. You will be asked to input your password on the next screen.

» Proceed

You are now leaving the Cambridge University Press website. Your eBook purchase and download will be completed by our partner Please see the permission section of the catalogue page for details of the print & copy limits on our eBooks.

Continue ×

Continue ×

Continue ×

Find content that relates to you

Join us online

This site uses cookies to improve your experience. Read more Close

Are you sure you want to delete your account?

This cannot be undone.


Thank you for your feedback which will help us improve our service.

If you requested a response, we will make sure to get back to you shortly.

Please fill in the required fields in your feedback submission.