Non-Fiction Books:

Securing Wireless Communications at the Physical Layer



Customer rating

Click to share your rating 0 ratings (0.0/5.0 average) Thanks for your vote!

Share this product

Securing Wireless Communications at the Physical Layer
Save $286.00
$441.99 was $727.99
or 4 payments of $110.50 with Learn more
In stock with supplier

The item is brand new and in-stock in with one of our preferred suppliers. The item will ship from the Mighty Ape warehouse within the timeframe shown below.

Usually ships within 10-14 days


Delivering to:

Estimated arrival:

  • Around 14-20 February using Express Delivery
    Mighty Ape can deliver this product within 1-2 business days (usually overnight) to urban centres across Australia, and some remote areas. Learn more
  • Around 15-22 February using standard courier delivery


Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to make messages unintelligible to adversaries. However, rarely is the task of securing a message - changesosimple.Whenonestepsbackandcontemplateshowtosecuretheexchange of communications, one realizes that the challenge is fundamentally one of bui- ing a complete solution. For example, one must ensure that all entities involved have proper and authenticated cryptographic material, or one must ensure that one veri?ably knows to whom one is communicating, or one must understand how the communication process takes place so as to make certain there are no vulnerabilities introduced by the communication process itself. Thislastissue, namelythatsecuritymethodsareoftenbuiltwithoutconsideration to how communication takes place, represents a fundamental gap where much of modern security research has fallen short.The security literature is ?lled with a mass of articles on cryptographic primitives and, although there are still many theoretical hurdlestobeovercomebythecryptographiccommunity,mostoftheseshortcomings areacademicandtherearenownumeroustextbooksoncryptographythatcanprovide thebasicintroductionneededtoemploycryptographicprimitives. Ontheothersideof thecoin,thesecurityliteratureisalso?lledwithamassofarticlesdevotedtobuilding secure protocols and, similarly, there are now numerous textbooks on computer securitythatprovidetheinstructionneededtodesignsecureprotocols.Unfortunately, the issue of how communication takes place or, more speci?cally, whether there are any speci?c issues that might arise or be circumvented because message exchanges aretakingplaceononemediumversusanother(e.g., wirelesscommunicationversus wired communication), is generally neglected.
Release date Australia
December 7th, 2009
Edited by Ruoheng Liu Edited by Wade Trappe
2010 ed.
4 Tables, black and white; XVI, 396 p.
Country of Publication
United States
Springer-Verlag New York Inc.
Product ID

Customer reviews

Nobody has reviewed this product yet. You could be the first!

Write a Review

Marketplace listings

There are no Marketplace listings available for this product currently.
Already own it? Create a free listing and pay just 9% commission when it sells!

Sell Yours Here

Help & options

  • If you think we've made a mistake or omitted details, please send us your feedback. Send Feedback
  • If you have a question or problem with this product, visit our Help section. Get Help
  • Seen a lower price for this product elsewhere? We'll do our best to beat it. Request a better price
Filed under...