
June 16, 2015 12:59 PSP Book - 9in x 6in 01-Yong-Ching-Lim-c01
8 Introduction
for a subset of important samples from the data signal space whose
use is sufficient for a near optimum performance of the receiver. The
detail of implementation of the MCMC detector in hardware is also
presented and shown to be amenable to low-complexity logic and
parallelism.
Information transmitted over wireless networks can be accessed
by unauthorized users (eavesdroppers). Traditionally, ensuring that
only the legitimate receiver will be able to decipher the transmitted
information has been achieved by cryptographic approaches oper-
ating at various layers of the network