Physical and Cross-Layer Security Enhancement and Resource Allocationfor Wireless Networks

Physical and Cross-Layer Security Enhancement and Resource Allocationfor Wireless Networks
Author: Muhammad Shafi Al Bashar
Publisher:
Total Pages: 140
Release: 2011
Genre:
ISBN: 9781124906454

Download Physical and Cross-Layer Security Enhancement and Resource Allocationfor Wireless Networks Book in PDF, Epub and Kindle

In this dissertation, we present novel physical (phy) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better flexibility in response to the typically time-varying wireless environment. To better utilize limited wireless resources, we present approaches and techniques based on new performance criteria for wireless system optimization by thoroughly exploiting user information including its Quality of Service (QoS) requests and channel state information (csi) to improve network throughput and security. In recent years, there has been a growing research interest in wireless system security from phy layer perspective. In a wiretap channel model introduced in the seminal work by Wyner, a sender "Alice" wishes to transmit a secret message to the intended receiver "Bob" in presence of a passive eavesdropper "Eve". Existing works have characterized maximum achievable secrecy rate or secrecy capacity for single- and multiple-antenna systems by applying Gaussian signaling and secrecy code. Despite the impracticality of Gaussian input, its compact closed-form expression of mutual information motivated the wide use of Gaussian input assumption in theoretical analysis. In contrast to the Gaussian codebook, practical wiretap codes must consist of finite-alphabet symbols. Because of this constraint, the achievable secrecy rate for a finite-alphabet input scenario would differ from the secrecy rate achievable by a Gaussian codebook. In this thesis, we quantify the effect of finite discrete-constellation on instantaneous and ergodic secrecy rate of multiple-antenna wire-tap channels. Our results demonstrate substantial performance difference between systems involving finite-alphabet inputs and systems with Gaussian inputs. In addition, we investigate the secrecy performance of multi-terminal wiretap systems when a codebook based transmission beamforming is implemented. We characterize the secrecy outage probability of a communication link under eavesdropping. We consider a limited feedback scenario where the transmitter uses a pre-defined codebook known to both the transmitter and the receiver for beamforming, and analyze the secrecy outage probability of the link when it being eavesdropped. Next, we consider the security of wireless multi-hop networks. Certainly, network security is an overarching issue that transcends all layers of communication protocol stack. Therefore, we tackle the problem of network security by proper user scheduling, routing, and resource management. Our approach of secrecy is complementary to the traditional cryptography based techniques. Together, they can provide stronger overall security and flexibility in selecting the desired solution and can reduce bandwidth and energy overhead as much as possible. Multi-hop wireless networks frequently employ the traditional routing and resource allocation strategies. Such strategies often fail to take into account the additional need for protection against security vulnerabilities due to the wireless medium. Thus, to address security concerns, we investigate the problem of eavesdropping control by proposing security-aware power allocation strategies and routing algorithms for multi-hop networks. The future wireless infrastructure will consists of a plethora of heterogeneous collections of applications and services. A differentiated service structure would therefore be an essential part of the future wireless infrastructure. In addition to the security consideration of wireless network, we focus on the heterogeneous structure of the network. We study the problem of cross-layer resource allocation and admission control in a multiuser heterogeneous ofdma network providing both QoS-constrained user services and best-effort services. Such heterogeneous networks provide service to both High-Priority (hp) users and Best-Effort (be) users. By clustering subcarriers, efficient algorithms for cluster and power allocation have been proposed. Our strategy maximizes the total network utility of the be users while satisfying the QoS request for maximum number of hp users. The feasibility of the resource allocation problem depends on the number of hp users in the network. Since a large number of demanding hp users would render the resource allocation problem infeasible, a joint admission control and resource allocation scheme could be an efficient way of tackling both problems with less overhead. By incorporating admission control, we propose an efficient and optimal joint admission control and resource allocation algorithm. [The dissertation citations contained here are published with the permission of ProQuest llc. Further reproduction is prohibited without permission. Copies of dissertations may be obtained by Telephone (800) 1-800-521-0600. Web page: http://www.proquest.com/en-US/products/dissertations/individuals.shtml.].


Physical and Cross-Layer Security Enhancement and Resource Allocationfor Wireless Networks
Language: en
Pages: 140
Authors: Muhammad Shafi Al Bashar
Categories:
Type: BOOK - Published: 2011 - Publisher:

GET EBOOK

In this dissertation, we present novel physical (phy) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user expe
Physical Layer Security in Wireless Cooperative Networks
Language: en
Pages: 191
Authors: Li Wang
Categories: Technology & Engineering
Type: BOOK - Published: 2017-08-31 - Publisher: Springer

GET EBOOK

This book provides a comprehensive overview for physical layer security in wireless cooperative networks, including fundamental concepts, typical solutions, and
Cross-layer Resource Allocation in Wireless Communications
Language: en
Pages: 165
Authors: Ana I. Perez-Niera
Categories: Technology & Engineering
Type: BOOK - Published: 2009 - Publisher: Academic Press

GET EBOOK

Resource allocation in wireless networks is traditionally approached either through information theory or communications networks. To break down the barriers be
5G Enabled Secure Wireless Networks
Language: en
Pages: 214
Authors: Dushantha Nalin K. Jayakody
Categories: Technology & Engineering
Type: BOOK - Published: 2019-02-05 - Publisher: Springer

GET EBOOK

This book covers issues related to 5G network security. The authors start by providing details on network architecture and key requirements. They then outline t
Physical Layer Security in Wireless Communications
Language: en
Pages: 308
Authors: Xiangyun Zhou
Categories: Computers
Type: BOOK - Published: 2016-04-19 - Publisher: CRC Press

GET EBOOK

Physical Layer Security in Wireless Communications supplies a systematic overview of the basic concepts, recent advancements, and open issues in providing commu