000 | 04498nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-031-57349-1 | ||
003 | DE-He213 | ||
005 | 20240730172735.0 | ||
007 | cr nn 008mamaa | ||
008 | 240709s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031573491 _9978-3-031-57349-1 |
||
024 | 7 |
_a10.1007/978-3-031-57349-1 _2doi |
|
050 | 4 | _aTK5105.59 | |
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM043050 _2bisacsh |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aHernandez Fernandez, Javier. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _9105281 |
|
245 | 1 | 0 |
_aPhysical Layer Security in Power Line Communications _h[electronic resource] : _bFundamentals, Models and Applications / _cby Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aXVII, 143 p. 51 illus., 45 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Information Security, _x2512-2193 ; _v108 |
|
505 | 0 | _aChapter.1.Introduction -- Chapter.2.An Overview of Power Line Communication Networks -- Chapter.3.Power Line Communication Channel Characteristics -- Chapter.4.Power Line Communication Security -- Chapter.5.Physical Layer Security in Power Line Communications -- Chapter.6.Performance Analysis of Data Transmission Security and Reliability in PLC -- Chapter.7.Confidentiality Technique for PLC Networks -- Chapter.8.Authentication Method for PLC Network -- Chapter.9.PLC Network Integrity Solution.-Chapter.10.PLC Availability Scheme -- Chapter.11.Conclusions. | |
520 | _aThis book emerges as a seminal work, addressing the critical need for robust security for power line communications (PLC), during an era where digital interconnectivity is paramount yet vulnerable. This comprehensive volume offers a deep dive into the realm of PLC, a technology increasingly central to our interconnected power grid infrastructure and explores its potential as a cornerstone for various applications. This book opens with a clear and informative introduction to PLC, shedding light on its present status and importance. The authors then delve into the heart of the matter: the application of physical layer security (PLS) in PLC networks. PLS, an emerging field in its own right, is presented as a vital complement or alternative to traditional communications security methods, especially relevant for securing networks of low-complexity devices that are pivotal in PLC applications. This exhaustive treatment of PLS in PLC is unprecedented, both in its scope and depth. This book not only clarifies the fundamental principles of PLS in PLC, but also provides actionable insights for mitigating risks and enhancing resilience. Targeted towards engineers, researchers, graduate students and practitioners grappling with the multifaceted aspects of cybersecurity in energy infrastructure, this book stands out for its clarity, rigor, and the practical applicability of its content. The authors share the results of their extensive research journey and practice, presenting compelling use cases that underscore the practicality of their findings, as well as insights to be prepared for the next challenges in the security of the grid infrastructure. | ||
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aData protection _xLaw and legislation. _923450 |
|
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 1 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aPrivacy. _935098 |
650 | 2 | 4 |
_aCommunications Engineering, Networks. _931570 |
700 | 1 |
_aOmri, Aymen. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _9105283 |
|
700 | 1 |
_aDi Pietro, Roberto. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _9105284 |
|
710 | 2 |
_aSpringerLink (Online service) _9105286 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031573484 |
776 | 0 | 8 |
_iPrinted edition: _z9783031573507 |
776 | 0 | 8 |
_iPrinted edition: _z9783031573514 |
830 | 0 |
_aAdvances in Information Security, _x2512-2193 ; _v108 _9105288 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-57349-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cEBK | ||
999 |
_c88522 _d88522 |