"Contents" -- "About the editors" -- "Preface" -- "Part I: Fundamentals of physical layer security" -- "1. Secrecy metrics for physical layer security over fading channels / Biao He, Vincent K. N. Lau, Xiangyun Zhou, and A. Lee Swindlehurst" -- "2. Secure data networks with channel uncertainty / Amal Hyadi, Zouheir Rezki, and Mohamed-Slim Alouini" -- "3. Confidential and energy-efficient communications by physical layer security / Alessio Zappone, Pin-Hsun Lin, and Eduard A. Jorswieck" -- "Part II: Physical layer security for multiple-antenna technologies" -- "4. Antenna selection strategies for wiretap channels / Shihao Yan, Nan Yang, Robert Malaney, and Jinhong Yuan" -- "5. Physical layer security for massive MIMO systems / Jun Zhu, Robert Schober, and Vijay K. Bhargava" -- "6. Physical layer security for massive MIMO with anti-jamming / Tan Tai Do, Hien Quoc Ngo, and Trung Q. Duong" -- "7. Physical layer security for multiuser relay networks / Lisheng Fan and Trung Q. Duong" -- "8. Trusted wireless communications with spatial multiplexing / Giovanni Geraci and Jinhong Yuan" -- "Part III: Physical layer security with emerging 5G technologies" -- "9. Physical layer security for wirelessly powered communication systems / Caijun Zhong and Xiaoming Chen" -- "10. Physical layer security for D2D-enabled cellular networks / Chuan Ma, Jianting Yue, Hui Yu, and Xiaoying Gan" -- "11. Physical layer security for cognitive radio networks / Van-Dinh Nguyen, Trung Q. Duong, and Oh-Soon Shin" -- "12. Physical layer security in mmWave cellular networks / Hui-MingWang" -- "Part IV: Physical layer security with emerging modulation technologies" -- "13. Directional-modulation-enabled physical-layer wireless security / Yuan Ding and Vincent Fusco" -- "14. Secure waveforms for 5G systems / Stefano Tomasin
"15. Physical layer security in non-orthogonal multiple access / Hui-Ming Wang, Yi Zhang, and Zhiguo Ding" -- "16. Physical layer security for MIMOME-OFDM systems: spatial versus temporal artificial noise / Ahmed El Shafie, Zhiguo Ding, and Naofal Al-Dhahir" -- "Part V: Applications of physical layer security" -- "17. Physical layer security for real-world applications: use cases, results and open challenges / Stephan Ludwig, René Guillaume, and Andreas Müller" -- "18. Key generation from wireless channels: a survey and practical implementation / Junqing Zhang, Trung Q. Duong, RogerWoods, and Alan Marshall" -- "19. Application cases of secret key generation in communication nodes and terminals / Christiane Kameni Ngassa, Taghrid Mazloum, FranÃois Delaveau, Sandrine Boumard, Nir Shapira, Renaud Molière, Alain Sibille, Adrian Kotelba, and Jani Suomalainen" -- "20. Application cases of secrecy coding in communication nodes and terminals / Christiane Kameni Ngassa, Cong Ling, FranÃois Delaveau, Sandrine Boumard, Nir Shapira, Ling Liu, Renaud Molière, Adrian Kotelba, and Jani Suomalainen
Securely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques