Physical layer security in cooperative wireless communications

Due to the open nature of the medium, wireless communications systems are highly vulnerable to security attacks. In recent years, security within the physical layer has gained attention, since the underlying techniques can add to those found in traditional cryptographic approaches. In this thesis, n...

Full description

Bibliographic Details
Main Author: Alotaibi, Esa
Published: University of Manchester 2016
Online Access:http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.727906
id ndltd-bl.uk-oai-ethos.bl.uk-727906
record_format oai_dc
spelling ndltd-bl.uk-oai-ethos.bl.uk-7279062018-06-12T03:27:30ZPhysical layer security in cooperative wireless communicationsAlotaibi, Esa2016Due to the open nature of the medium, wireless communications systems are highly vulnerable to security attacks. In recent years, security within the physical layer has gained attention, since the underlying techniques can add to those found in traditional cryptographic approaches. In this thesis, new mathematical models were developed for the analysis of secrecy capacity and outage probability in different scenarios, following which new optimisation problems were formulated and new algorithms devised to solve those problems. The process began by analysing secrecy performance for various cooperative communication scenarios in the presence of single and multiple eavesdropper(s). A multicast cooperative system was also analysed, based on distributed Alamouti space-time coding. Furthermore, the secrecy performance of a relay selection scheme was analysed in an independent but non-identically distributed (i.n.i.d) Rayleigh fading scenario. The second part of the thesis concentrated on optimisation methods for cooperative relaying and jamming techniques. For a dual-hop system, a joint cooperative beamforming and jamming scheme was created, considering both a perfect and an imperfect eavesdropper's channel state information (CSI). Optimal solutions to degrade the eavesdropper's interception by minimising its received signal to interference and noise ratio (SINR) were also presented whilst ensuring the legitimate receiver's SINR requirement. For the multi-hop scenario, the secrecy rate, with and without transmitting artificial noise, was considered for maximisation, and an optimal power splitting solution under limited power constraints at the transmitters was also proposed. In addition, an iterative solution for the joint optimisation of transmit power and power splitting coefficient at each transmitter was posited. The analyses and optimisation algorithms developed provide new insights into secrecy performance and optimal transmission schemes in various practical scenarios.University of Manchesterhttp://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.727906https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-security-in-cooperative-wireless-communications(6a0c261e-c4c4-4796-a08b-95d015d7528a).htmlElectronic Thesis or Dissertation
collection NDLTD
sources NDLTD
description Due to the open nature of the medium, wireless communications systems are highly vulnerable to security attacks. In recent years, security within the physical layer has gained attention, since the underlying techniques can add to those found in traditional cryptographic approaches. In this thesis, new mathematical models were developed for the analysis of secrecy capacity and outage probability in different scenarios, following which new optimisation problems were formulated and new algorithms devised to solve those problems. The process began by analysing secrecy performance for various cooperative communication scenarios in the presence of single and multiple eavesdropper(s). A multicast cooperative system was also analysed, based on distributed Alamouti space-time coding. Furthermore, the secrecy performance of a relay selection scheme was analysed in an independent but non-identically distributed (i.n.i.d) Rayleigh fading scenario. The second part of the thesis concentrated on optimisation methods for cooperative relaying and jamming techniques. For a dual-hop system, a joint cooperative beamforming and jamming scheme was created, considering both a perfect and an imperfect eavesdropper's channel state information (CSI). Optimal solutions to degrade the eavesdropper's interception by minimising its received signal to interference and noise ratio (SINR) were also presented whilst ensuring the legitimate receiver's SINR requirement. For the multi-hop scenario, the secrecy rate, with and without transmitting artificial noise, was considered for maximisation, and an optimal power splitting solution under limited power constraints at the transmitters was also proposed. In addition, an iterative solution for the joint optimisation of transmit power and power splitting coefficient at each transmitter was posited. The analyses and optimisation algorithms developed provide new insights into secrecy performance and optimal transmission schemes in various practical scenarios.
author Alotaibi, Esa
spellingShingle Alotaibi, Esa
Physical layer security in cooperative wireless communications
author_facet Alotaibi, Esa
author_sort Alotaibi, Esa
title Physical layer security in cooperative wireless communications
title_short Physical layer security in cooperative wireless communications
title_full Physical layer security in cooperative wireless communications
title_fullStr Physical layer security in cooperative wireless communications
title_full_unstemmed Physical layer security in cooperative wireless communications
title_sort physical layer security in cooperative wireless communications
publisher University of Manchester
publishDate 2016
url http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.727906
work_keys_str_mv AT alotaibiesa physicallayersecurityincooperativewirelesscommunications
_version_ 1718693894498025472