Physical layer security in cooperative wireless communications
Due to the open nature of the medium, wireless communications systems are highly vulnerable to security attacks. In recent years, security within the physical layer has gained attention, since the underlying techniques can add to those found in traditional cryptographic approaches. In this thesis, n...
Main Author: | |
---|---|
Published: |
University of Manchester
2016
|
Online Access: | http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.727906 |
id |
ndltd-bl.uk-oai-ethos.bl.uk-727906 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-bl.uk-oai-ethos.bl.uk-7279062018-06-12T03:27:30ZPhysical layer security in cooperative wireless communicationsAlotaibi, Esa2016Due to the open nature of the medium, wireless communications systems are highly vulnerable to security attacks. In recent years, security within the physical layer has gained attention, since the underlying techniques can add to those found in traditional cryptographic approaches. In this thesis, new mathematical models were developed for the analysis of secrecy capacity and outage probability in different scenarios, following which new optimisation problems were formulated and new algorithms devised to solve those problems. The process began by analysing secrecy performance for various cooperative communication scenarios in the presence of single and multiple eavesdropper(s). A multicast cooperative system was also analysed, based on distributed Alamouti space-time coding. Furthermore, the secrecy performance of a relay selection scheme was analysed in an independent but non-identically distributed (i.n.i.d) Rayleigh fading scenario. The second part of the thesis concentrated on optimisation methods for cooperative relaying and jamming techniques. For a dual-hop system, a joint cooperative beamforming and jamming scheme was created, considering both a perfect and an imperfect eavesdropper's channel state information (CSI). Optimal solutions to degrade the eavesdropper's interception by minimising its received signal to interference and noise ratio (SINR) were also presented whilst ensuring the legitimate receiver's SINR requirement. For the multi-hop scenario, the secrecy rate, with and without transmitting artificial noise, was considered for maximisation, and an optimal power splitting solution under limited power constraints at the transmitters was also proposed. In addition, an iterative solution for the joint optimisation of transmit power and power splitting coefficient at each transmitter was posited. The analyses and optimisation algorithms developed provide new insights into secrecy performance and optimal transmission schemes in various practical scenarios.University of Manchesterhttp://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.727906https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-security-in-cooperative-wireless-communications(6a0c261e-c4c4-4796-a08b-95d015d7528a).htmlElectronic Thesis or Dissertation |
collection |
NDLTD |
sources |
NDLTD |
description |
Due to the open nature of the medium, wireless communications systems are highly vulnerable to security attacks. In recent years, security within the physical layer has gained attention, since the underlying techniques can add to those found in traditional cryptographic approaches. In this thesis, new mathematical models were developed for the analysis of secrecy capacity and outage probability in different scenarios, following which new optimisation problems were formulated and new algorithms devised to solve those problems. The process began by analysing secrecy performance for various cooperative communication scenarios in the presence of single and multiple eavesdropper(s). A multicast cooperative system was also analysed, based on distributed Alamouti space-time coding. Furthermore, the secrecy performance of a relay selection scheme was analysed in an independent but non-identically distributed (i.n.i.d) Rayleigh fading scenario. The second part of the thesis concentrated on optimisation methods for cooperative relaying and jamming techniques. For a dual-hop system, a joint cooperative beamforming and jamming scheme was created, considering both a perfect and an imperfect eavesdropper's channel state information (CSI). Optimal solutions to degrade the eavesdropper's interception by minimising its received signal to interference and noise ratio (SINR) were also presented whilst ensuring the legitimate receiver's SINR requirement. For the multi-hop scenario, the secrecy rate, with and without transmitting artificial noise, was considered for maximisation, and an optimal power splitting solution under limited power constraints at the transmitters was also proposed. In addition, an iterative solution for the joint optimisation of transmit power and power splitting coefficient at each transmitter was posited. The analyses and optimisation algorithms developed provide new insights into secrecy performance and optimal transmission schemes in various practical scenarios. |
author |
Alotaibi, Esa |
spellingShingle |
Alotaibi, Esa Physical layer security in cooperative wireless communications |
author_facet |
Alotaibi, Esa |
author_sort |
Alotaibi, Esa |
title |
Physical layer security in cooperative wireless communications |
title_short |
Physical layer security in cooperative wireless communications |
title_full |
Physical layer security in cooperative wireless communications |
title_fullStr |
Physical layer security in cooperative wireless communications |
title_full_unstemmed |
Physical layer security in cooperative wireless communications |
title_sort |
physical layer security in cooperative wireless communications |
publisher |
University of Manchester |
publishDate |
2016 |
url |
http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.727906 |
work_keys_str_mv |
AT alotaibiesa physicallayersecurityincooperativewirelesscommunications |
_version_ |
1718693894498025472 |