Dissertations / Theses on the topic 'Physical-layer security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Physical-layer security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Bloch, Matthieu. "Physical-layer security." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24658.
Full textCommittee Chair: McLaughlin, Steven; Committee Member: Barros, Joao; Committee Member: Bellissard, Jean; Committee Member: Fekri, Faramarz; Committee Member: Lanterman, Aaron
Zhu, Jun. "Physical layer security in massive MIMO systems." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/58281.
Full textApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Alotaibi, Esa. "Physical layer security in cooperative wireless communications." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-security-in-cooperative-wireless-communications(6a0c261e-c4c4-4796-a08b-95d015d7528a).html.
Full textChu, Zheng. "Transmit optimization techniques for physical layer security." Thesis, University of Newcastle upon Tyne, 2016. http://hdl.handle.net/10443/3377.
Full textJo, Youngho. "Physical layer techniques for wireless communication security." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0041108.
Full textMostafa, Ayman. "Physical-layer security for visible-light communication systems." Thesis, University of British Columbia, 2017. http://hdl.handle.net/2429/61328.
Full textApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Al-Talabani, Ali Mohammed Noori Hasan. "Enhancing physical layer security in cognitive radio networks." Thesis, King's College London (University of London), 2016. https://kclpure.kcl.ac.uk/portal/en/theses/enhancing-physical-layer-security-in-cognitive-radio-networks(d9036158-5310-4292-b93d-f542354269a7).html.
Full textPierrot, Alexandre Jean Louis J. "Coding techniques for multi-user physical layer security." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53836.
Full textWang, Ting. "Wireless Network Physical Layer Security with Smart Antenna." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/23243.
Full textWe first investigate the problem of enhancing wireless communication privacy. A novel scheme named "artificial fading" is proposed, which leverages the beam switching capability of smart antennas to prevent eavesdropping attacks. We introduce the optimization strategy to design a pair of switched beam patterns that both have high directional gain to the intended receiver. Meanwhile, in all the other directions, the overlap between these two patterns is minimized. The transmitter switches between the two patterns at a high frequency. In this way, the signal to unintended directions experiences severe fading and the eavesdropper cannot decode it. We use simulation experiments to show that the artificial fading outperforms single pattern beamforming in reducing the unnecessary coverage area of the wireless transmitter.
We then study the impact of beamforming technique on wireless localization systems from the perspectives of both location privacy protection and location spoofing attack.
For the location privacy preservation scheme, we assume that the adversary uses received signal strength (RSS) based localization systems to localize network users in Wireless LAN (WLAN). The purpose of the scheme is to make the adversary unable to uniquely localize the user when possible, and otherwise, maximize error of the adversary\'s localization results. To this end, we design a two-step scheme to optimize the beamforming pattern of the wireless user\'s smart antenna. First, the user moves around to estimate the locations of surrounding access points (APs). Then based on the locations of the APs, pattern synthesis is optimized to minimize the number of APs in the coverage area and degenerate the localization precision. Simulation results show that our scheme can significantly lower the chance of being localized by adversaries and also degrade the location estimation precision to as low as the coverage range of the AP that the wireless user is connected to.
As personal privacy preservation and security assurance at the system level are always conflictive to some extent, the capability of smart antenna to intentionally bias the RSS measurements of the localization system also potentially enables location spoofing attacks. From this aspect, we present theoretical analysis on the feasibility of beamforming-based perfect location spoofing (PLS) attacks, where the attacker spoofs to a target fake location by carefully choosing the beamforming pattern to fool the location system. The PLS problem is formulated as a nonlinear feasibility problem, and due to its intractable nature, we solve it using semidefinite relaxation (SDR) in conjunction with a heuristic local search algorithm. Simulation results show the effectiveness of our analytical approach and indicate the correlation between the geometry of anchor deployment and the feasibility of PLS attacks. Based on the simulation results, guidelines for guard against PLS attacks are provided.
Ph. D.
Polisetti, Mounika. "Physical Layer Security With Active Jamming Using NOMA." Thesis, Blekinge Tekniska Högskola, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21259.
Full textKoyluoglu, Onur Ozan. "Wireless Physical Layer Security: An Information Theoretic Approach." The Ohio State University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=osu1289592032.
Full textRomero, Zurita Leonardo Nabil. "Optimising multiple antenna techniques for physical layer security." Thesis, University of Leeds, 2014. http://etheses.whiterose.ac.uk/7636/.
Full textMuhammad, I. (Irfan). "Physical layer security for machine type communication networks." Master's thesis, University of Oulu, 2018. http://jultika.oulu.fi/Record/nbnfioulu-201809212821.
Full textZhuang, Yifei. "Physical layer security in MIMO power line communication networks." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/50241.
Full textApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Wang, Lifeng. "Physical layer security in wireless networks : design and enhancement." Thesis, Queen Mary, University of London, 2015. http://qmro.qmul.ac.uk/xmlui/handle/123456789/9019.
Full textXiang, Weichen. "Power allocation and signal labelling on physical layer security." Thesis, University of Newcastle upon Tyne, 2016. http://hdl.handle.net/10443/3399.
Full textGülgün, Ziya. "Physical Layer Security Issues in Massive MIMO and GNSS." Licentiate thesis, Linköpings universitet, Kommunikationssystem, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-172558.
Full textAdamo, Oluwayomi Bamidele. "Joint Schemes for Physical Layer Security and Error Correction." Thesis, University of North Texas, 2011. https://digital.library.unt.edu/ark:/67531/metadc84159/.
Full textBi, Ying. "Enhancing Physical-Layer Security in Wireless Powered Communication Networks." Thesis, The University of Sydney, 2017. http://hdl.handle.net/2123/16890.
Full textAjayi, Idowu Iseoluwa. "Enhanced Physical Layer Security through Frequency and Spatial Diversity." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS227.
Full textPhysical layer security (PLS) is an emerging paradigm that focuses on using the properties of wireless communication, such as noise, fading, dispersion, interference, diversity, etc., to provide security between legitimate users in the presence of an eavesdropper. Since PLS uses signal processing and coding techniques, it takes place at the physical layer and hence can guarantee secrecy irrespective of the computational power of the eavesdropper. This makes it an interesting approach to complement legacy cryptography whose security premise is based on the computational hardness of the encryption algorithm that cannot be easily broken by an eavesdropper. The advancements in quantum computing has however shown that attackers have access to super computers and relying on only encryption will not be enough. In addition, the recent rapid advancement in wireless communication technologies has seen the emergence and adoption of technologies such as Internet of Things, Ultra-Reliable and Low Latency Communication, massive Machine-Type Communication, Unmanned Aerial Vehicles, etc. Most of these technologies are decentralized, limited in computational and power resources, and delay sensitive. This makes PLS a very interesting alternative to provide security in such technologies. To this end, in this thesis, we study the limitations to the practical implementation of PLS and propose solutions to address these challenges. First, we investigate the energy efficiency challenge of PLS by artificial noise (AN) injection in massive Multiple-Input Multiple-Output (MIMO) context. The large precoding matrix in massive MIMO also contributes to a transmit signal with high Peak-to-Average Power Ratio (PAPR). This motivated us to proposed a novel algorithm , referred to as PAPR-Aware-Secure-mMIMO. In this scheme, instantaneous Channel State Information (CSI) is used to design a PAPR-aware AN that simultaneously provides security while reducing the PAPR. This leads to energy efficient secure massive MIMO. The performance is measured in terms of secrecy capacity, Symbol Error Rate (SER), PAPR, and Secrecy Energy Efficiency (SEE). Next, we consider PLS by channel adaptation. These PLS schemes depend on the accuracy of the instantaneous CSI and are ineffective when the CSI is inaccurate. However, CSI could be inaccurate in practice due to such factors as noisy CSI feedback, outdated CSI, etc. To address this, we commence by proposing a PLS scheme that uses precoding and diversity to provide PLS. We then study the impact of imperfect CSI on the PLS performance and conclude with a proposal of a low-complexity autoencoder neural network to denoise the imperfect CSI and give optimal PLS performance. The proposed autoencoder models are referred to as DenoiseSecNet and HybDenoiseSecNet respectively. The performance is measured in terms of secrecy capacity and Bit Error Rate (BER). Finally, we study the performance of PLS under finite-alphabet signaling. Many works model performance assuming that the channel inputs are Gaussian distributed. However, Gaussian signals have high detection complexity because they take a continuum of values and have unbounded amplitudes. In practice, discrete channel inputs are used because they help to maintain moderate peak transmission power and receiver complexity. However, they introduce constraints that significantly affect PLS performance, hence, the related contribution in this thesis. We propose the use of dynamic keys to partition modulation spaces in such a way that it benefits a legitimate receiver and not the eavesdropper. This keys are based on the independent main channel and using them to partition leads to larger decision regions for the intended receiver but smaller ones for the Eavesdropper. The scheme is referred to as Index Partitioned Modulation (IPM). The performance is measured in terms of secrecy capacity, mutual information and BER
Renna, Francesco Renna. "OFDM in emerging wireless networks: synchronization algorithms and physical layer security." Doctoral thesis, Università degli studi di Padova, 2011. http://hdl.handle.net/11577/3422004.
Full textNell'ultimo decennio, la tecnica nota come orthogonal frequency division multiplexing (OFDM) è stata scelta come soluzione di strato fisico per diversi sistemi di trasmissione wireless ad alto bit rate. Le ragioni di tale successo sono riscontrabili nella capacità di sfruttare canali selettivi in frequenza con dispositivi di semplice ed efficiente implementazione, nonché nella possibilità di ottenere un'elevata efficienza spettrale. Allo scopo di ottimizzare le prestazioni di questi sistemi, le reti wireless di nuova generazione necessitano di metodi efficaci per la sincronizzazione di tempo e di frequenza, dato che un'errata scelta del sincronismo di simbolo ed offset di frequenza residui di portante e campionamento possono disturbare fortemente le trasmissioni a causa dell'introduzione di interferenza di intersimbolo (ISI) ed interferenza di intercanale (ICI). Nella prima parte della tesi il lavoro si è concentrato sulla formulazione e l'analisi di algoritmi di sincronizzazione di tempo e frequenza per sistemi ultrawide band (UWB) multiband (MB) OFDM. Per prima cosa è stato considerato il problema della sincronizzazione di simbolo ed è stato analizzato il caso in cui la lunghezza del canale dispersivo è maggiore di quella del prefisso ciclico previsto dallo standard, ovvero quando sia ISI che ICI non possono essere completamente annullate scegliendo in maniera opportuna l'epoca di campionamento. In questo caso, un opportuno obiettivo per la sincronizzazione di simbolo è stato identificato nella massimizzazione del rapporto fra la potenza utile totale su tutte le sottoportanti e la potenza totale di ISI ed ICI, per una data realizzazione di canale. E' stato anche derivato uno schema di sincronizzazione pratico a bassa complessità computazionale, che offre prestazioni migliori di quelle fornite dagli stimatori a correlazione esistenti in letteratura. Inoltre, l'alto rate di trasmissione dei sistemi MB-OFDM richiede che la stima degli offset di campionamento e di portante venga effettuata con metodi a complessità moderata e con tempi di acquisizione ridotti. Pertanto, sono stati formulati algoritmi che operano sui simboli ricevuti nel dominio della frequenza, dai quali è possibile rilevare gli effetti di entrambi gli offset, che vengono così stimati congiuntamente mediante approcci ai minimi quadrati o a massima verosimiglianza. Le prestazioni di questi algoritmi sono state valutate mediante simulazioni in uno scenario UWB realistico e sono state confrontate con i risultati ottenuti dagli stimatori presentati precedentemente in letteratura. In parallelo con la richiesta di elevati rate di trasmissione, l'imponente traffico di dati sensibili attraverso comunicazioni wireless ha generato un bisogno crescente di segretezza (e sicurezza in generale) per l'informazione trasmessa su tali canali. La sicurezza a livello di strato fisico si sta rivelando un utile strumento per proteggere l'informazione trasmessa su reti wireless di nuova generazione, e sfrutta la diversità esistente fra le realizzazioni di canale dei terminali legittimi rispetto a quelle dell'attaccante. Quindi, nella seconda parte della tesi, si è valutato come i risultati ottenuti nell'ambito dell'information-theoretic security possano essere adattati ad un sistema che adotta OFDM come tipo di modulazione. L'architettura multiportante è stata quindi rappresentata come un caso particolare di un canale multiple-input multiple-output (MMO). In questo modo è stato possibile valutare le potenzialità del sistema OFDM nel trasmettere messaggi riservati applicando ed adattando a questo caso i risultati presentati in letteratura riguardo canali wiretap MIMO gaussiani. Si sono così caratterizzati i rate di segretezza raggiungibili da una coppia trasmettitore/ricevitore OFDM in presenza di un ascoltatore indesiderato, sia nel caso in cui esso adotti un ricevitore di tipo OFDM, sia nel caso in cui esso possa implementare architetture di ricezione più complesse e sofisticate. Le caratteristiche fisiche del canale di trsmissione possono essere sfruttate non solo per trasmettere messaggi in maniera che il loro contenuto sia segreto per eventuali attaccanti, ma anche per condividere in maniera sicura chiavi segrete, da utilizzare in sistemi di crittografia classica. In particolare, si è studiato il caso generale di condivisione di chiavi segrete mediante trasmissioni su canali MIMO (di cui OFDM può essere pensato come istanza particolare) e si sono ricavate in forma chiusa le espressioni per la capacità di chiavi segreta (ovvero il massimo rate con cui può essere scambiata una chiave segreta in presenza di un attaccante) nei regimi asintotici di basso ed alto SNR. Per bassi SNR, è stato dimostrato come la strategia ottima di trasmissione sia indipendente dalla realizzazione di canale dell'attaccante. Pertanto, combinando questa strategia di trasmissione con le fasi di information reconciliation e privacy amplification, è possibile ottenere uno schema di condivisione di chiavi di tipo semi-blind, per il quale la conoscenza del canale dell'attaccante è rischiesta solo nella fase finale di privacy amplification. Un approccio simile a quelli descritti finora è stato applicato per studiare il problema della robustezza dei sistemi OFDM ad attacchi di jamming. In questo scenario l'attaccante è attivo, ed il suo scopo è quello di disturbare la comunicazione fra i terminali legittimi mediante la trasmissione di un segnale di jamming, appunto. Tale setup è stato modellato mediante strumenti ricavati dalla Teoria dei Giochi, in particolare come gioco a somma zero in cui la funzione di payoff è rappresentata dall'informazione mutua scambiata fra trasmettitore e ricevitore. In quseto modo sono state determinate le strategie di trasmissione ottime sia per il trasmettitore legittimo che per l'attaccante, ed è stato trovato il punto di equilibrio di Nash del gioco sia per sistemi OFDM di tipo discrete multitone (DMT) che filtered multitone (FMT).
Harrison, Willie K. "Physical-layer security: practical aspects of channel coding and cryptography." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44818.
Full textLiu, Weigang. "Enhancing physical layer security in wireless networks with cooperative approaches." Thesis, University of Edinburgh, 2016. http://hdl.handle.net/1842/19565.
Full textRyland, Kevin Sherwood. "Software-Defined Radio Implementation of Two Physical Layer Security Techniques." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/82055.
Full textMaster of Science
Bianchi, Marco. "Cryptography and physical layer security: the role of channel coding." Doctoral thesis, Università Politecnica delle Marche, 2013. http://hdl.handle.net/11566/242703.
Full textThis thesis presents a study of channel coding techniques for security issues. Two possible applications are investigated: I) using the decoding problem as a cryptographic trapdoor in an efficient way, from the key size and complexity point of view II) the usage of channel coding techniques aimed to prevent the information eavesdropping on a public insecure channel without encryption. A quantum computer will be able to break the worldwide implemented number-theory-based cryptographic primitives, such as RSA. This could have dramatic consequences, since all the web-banking and e-commerce transactions are protected by this kind of primitives. Decoding a random linear code, is a problem that have been shown to be NP-complete and no algorithm is known to solve it, in reasonable time, even using quantum algorithm. This thesis analyzes the possible introduction of different families of linear codes (GRS and QC-LDPC) in the main code-based cryptosystem: the McEliece cryptosystem. We show how to avoid its biggest problem, the huge key size, by modifying the original system and adopting different codes, obtaining keys that are comparable with non-quantum solutions as RSA, with a reduced decrypting complexity. Moreover, the adoption of similar techniques, that is, a proper mix of scrambling and linear coding, can be used for physical layer security. In a physical layer security scheme, all the users are completely aware of all the components of the communication system, there are no secret keys: the differentiation between legitimate and unauthorized users is based only on the physical channel randomness. As an example, we can imagine a wireless router transmission, the legitimate user is inside the router's room and the eavesdropper is outside of it. The channel deterioration experienced by the attacker, since he is farther than the legitimate receiver, is small and he can correctly receive router's data. The proposed scheme allows to greatly improve the security of the system in such a way to prevent the information leakage, even if the channel difference between the two users is very small.
QIAO, YUE. "Attacks and Counterattacks on Physical Layer Primitives." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1494284803751621.
Full textZhou, Yi. "Physical Layer Security and Latency Optimization for Internet of Things Communications." Thesis, University of Sydney, 2020. https://hdl.handle.net/2123/23553.
Full textRichter, Johannes, Elke Franz, Sabrina Engelmann, Stefan Pfennig, and Eduard A. Jorswieck. "Physical Layer Security vs. Network Layer Secrecy: Who Wins on the Untrusted Two-Way Relay Channel?" Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-145086.
Full textRichter, Johannes, Elke Franz, Sabrina Engelmann, Stefan Pfennig, and Eduard A. Jorswieck. "Physical Layer Security vs. Network Layer Secrecy: Who Wins on the Untrusted Two-Way Relay Channel?" Technische Universität Dresden, 2013. https://tud.qucosa.de/id/qucosa%3A28133.
Full textSun, Xiaole, and Ivan B. Djordjevic. "Physical-Layer Security in Orbital Angular Momentum Multiplexing Free-Space Optical Communications." IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2016. http://hdl.handle.net/10150/615106.
Full textLu, Xiaotao. "Cost-effective signal processing algorithms for physical-layer security in wireless networks." Thesis, University of York, 2016. http://etheses.whiterose.ac.uk/16043/.
Full textYu, Jiahui. "Physical-layer Security Based Authentication and Key Generation for Seamless IoT Communications." University of Dayton / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1576178965071975.
Full textXing, Hong. "Enhancing physical-layer security in wireless powered communication network : challenges and opportunities." Thesis, King's College London (University of London), 2016. http://kclpure.kcl.ac.uk/portal/en/theses/enhancing-physicallayer-security-in-wireless-powered-communication-network(34c5e7ec-8c94-4d3a-a583-7f8d21115b15).html.
Full textCouto, Osmar Pereira do. "Physical layer security using optical steganography and encoding techniques in optical networks." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2018. https://ro.ecu.edu.au/theses/2111.
Full textWang, Le. "Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques." Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-theses/992.
Full textChen, Kan. "Physical layer security in co-operative MIMO networks - key generation and reliability evaluation." Diss., Kansas State University, 2016. http://hdl.handle.net/2097/32839.
Full textDepartment of Electrical and Computer Engineering
Balasubramaniam Natarajan
Widely recognized security vulnerabilities in current wireless radio access technologies undermine the benefits of ubiquitous mobile connectivity. Security strategies typically rely on bit-level cryptographic techniques and associated protocols at various levels of the data processing stack. These solutions have drawbacks that have slowed down the progress of new wireless services. Physical layer security approaches derived from an information theoretic framework have been recently proposed with secret key generation being the primary focus of this dissertation. Previous studies of physical layer secret key generation (PHY-SKG) indicate that a low secret key generation rate (SKGR) is the primary limitation of this approach. To overcome this drawback, we propose novel SKG schemes to increase the SKGR as well as improve the security strength of generated secret keys by exploiting multiple input and multiple output (MIMO), cooperative MIMO (co-op MIMO) networks. Both theoretical and numerical results indicate that relay-based co-op MIMO schemes, traditionally used to enhance LTE-A network throughput and coverage, can also increase SKGR. Based on the proposed SKG schemes, we introduce innovative power allocation strategies to further enhance SKGR. Results indicate that the proposed power allocation scheme can offer 15% to 30% increase in SKGR relative to MIMO/co-op MIMO networks with equal power allocation at low-power region, thereby improving network security. Although co-op MIMO architecture can offer significant improvements in both performance and security, the concept of joint transmission and reception with relay nodes introduce new vulnerabilities. For example, even if the transmitted information is secured, it is difficult but essential to monitor the behavior of relay nodes. Selfish or malicious intentions of relay nodes may manifest as non-cooperation. Therefore, we propose relay node reliability evaluation schemes to measure and monitor the misbehavior of relay nodes. Using a power-sensing based reliability evaluation scheme, we attempt to detect selfish nodes thereby measuring the level of non-cooperation. An overall node reliability evaluation, which can be used as a guide for mobile users interested in collaboration with relay nodes, is performed at the basestation. For malicious behavior, we propose a network tomography technique to arrive at node reliability metrics. We estimate the delay distribution of each internal link within a co-op MIMO framework and use this estimate as an indicator of reliability. The effectiveness of the proposed node reliability evaluations are demonstrated via both theoretical analysis and simulations results. The proposed PHY-SKG strategies used in conjunction with node reliability evaluation schemes represent a novel cross-layer approach to enhance security of cooperative networks.
Del, Prete Simone. "Ray-tracing assessment of the robustness of Physical Layer Security key generation protocol." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24081/.
Full textLee, Jeong Heon. "Physical Layer Security for Wireless Position Location in the Presence of Location Spoofing." Diss., Virginia Tech, 2011. http://hdl.handle.net/10919/26417.
Full textPh. D.
Timilsina, Santosh. "Physical Layer Security in Training-Based Single-Hop/Dual-Hop Massive MIMO Systems." OpenSIUC, 2018. https://opensiuc.lib.siu.edu/theses/2376.
Full textKRAYANI, ALI. "Learning Self-Awareness Models for Physical Layer Security in Cognitive and AI-enabled Radios." Doctoral thesis, Università degli studi di Genova, 2022. http://hdl.handle.net/11567/1074612.
Full textZenger, Christian [Verfasser], Christof [Gutachter] Paar, and Holger [Gutachter] Boche. "Physical-layer security for the internet of things / Christian Zenger ; Gutachter: Christof Paar, Holger Boche." Bochum : Ruhr-Universität Bochum, 2017. http://d-nb.info/1127335170/34.
Full textElsaid, Lubna A. "PHYSICAL-LAYER SECURITY WITH FULL-DUPLEX DECODE-AND-FORWARD RELAYING: SECRECY RATES AND POWER ALLOCATION." University of Akron / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=akron1467375632.
Full textMasiero, Chiara. "Multivariate moment problems with applications to spectral estimation and physical layer security in wireless communications." Doctoral thesis, Università degli studi di Padova, 2014. http://hdl.handle.net/11577/3423571.
Full textLa tesi affronta il problema dei momenti generalizzato e le sue applicazioni nell'ambito dell’ingegneria dell’informazione. Nella prima parte della tesi sono proposte due nuove tecniche per affrontare efficientemente il problema della stima spettrale multivariata, che è molto rilevante nel contesto dell'identificazione dei sistemi dinamici: la stima basata sul tasso di entropia relativa tra processi e l’estensione di covarianza razionale per processi multivariati e periodici. La stima spettrale basata sul tasso di entropia relativa estende in modo molto naturale un approccio che rappresenta lo stato dell’arte per quanto riguarda la stima spettrale per processi scalari con un vincolo sulla massima complessità della soluzione, noto come THREE - Tunable High Resolution Estimator. La tecnica proposta permette all'utente di tenere in considerazione le informazioni sulla densità spettrale del processo eventualmente disponibili. Inoltre, essa permette di ottenere stime ad elevata risoluzione ed è robusta nel caso di ridotta numerosità campionaria dei dati. Per quanto riguarda l'estensione circolare di covarianza per processi multivariati, essa fornisce un nuovo approccio di ottimizzazione convessa alla stima spettrale per processi multivariati periodici, nel quale la soluzione può essere ricavata in modo efficiente ricorrendo agli algoritmi per il calcolo della trasformata di Fourier veloce (FFT - Fast Fourier Transform). Alcuni esempi numerici illustrano che questa procedura fornisce uno strumento efficace per approssimare l’estensione di covarianza per processi in generale non periodici. La seconda parte della tesi si occupa del problema dell'autenticazione a livello fisico della sorgente di un messaggio in un sistema di comunicazione wireless. Nello scenario considerato l'attaccante ha accesso ad alcune informazioni sul canale tra sorgente legittima e ricevitore e può avere potenza di calcolo illimitata. Sotto l'ipotesi che i canali d'interesse siano descritti da vettori gaussiani a valori complessi, si dimostra che la strategia d'attacco ottima corrisponde alla generazione di un segnale congiuntamente gaussiano con le osservazioni dell'attaccante. La distribuzione congiunta è caratterizzata mediante la soluzione di un sistema di equazioni matriciali non lineari, che può essere calcolata per mezzo di un algoritmo iterativo. Alcuni esempi numerici illustrano l'efficacia della procedura proposta nel valutare le performance al caso pessimo dello schema di autenticazione di canale.
Ankarali, Zekeriyya Esat. "Physical Layer Algorithms for Reliability and Spectral Efficiency in Wireless Communications." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6996.
Full textDiakos, Thomas P. "An evaluation of security and privacy concerns in contactless payment systems through physical layer eavesdropping measurements." Thesis, University of Surrey, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.616478.
Full textSibomana, Louis. "Performance Analysis of Cognitive Radio Networks under Spectrum Sharing and Security Constraints." Doctoral thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-11739.
Full textTaheri, Shayan. "Evaluation of Tracking Regimes for, and Security of, PLI Systems." DigitalCommons@USU, 2015. https://digitalcommons.usu.edu/etd/4549.
Full textTunaru, Iulia. "Physical layer secret key generation for decentralized wireless networks." Thesis, Rennes 1, 2015. http://www.theses.fr/2015REN1S081/document.
Full textEmerging decentralized wireless systems, such as sensor or ad-hoc networks, will demand an adequate level of security in order to protect the private and often sensitive information that they carry. The main security mechanism for confidentiality in such networks is symmetric cryptography, which requires the sharing of a symmetric key between the two legitimate parties. According to the principles of physical layer security, wireless devices within the communication range can exploit the wireless channel in order to protect their communications. Due to the theoretical reciprocity of wireless channels, the spatial decorrelation property (e.g., in rich scattering environments), as well as the fine temporal resolution of the Impulse Radio - Ultra Wideband (IR-UWB) technology, directly sampled received signals or estimated channel impulse responses (CIRs) can be used for symmetric secret key extraction under the information-theoretic source model. Firstly, we are interested in the impact of quantization and channel estimation algorithms on the reciprocity and on the random aspect of the generated keys. Secondly, we investigate alternative ways of limiting public exchanges needed for the reconciliation phase. Finally, we develop a new signal-based method that extends the point-to-point source model to cooperative contexts with several nodes intending to establish a group key
Ahmed, Shakil. "Robust Resource Allocation to Secure Physical Layer Using UAV-Assisted Mobile Relay Communications in 5G Technology." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7575.
Full textAlbehadili, Abdulsahib. "Link-signature in Physical Layer Security and Its Applications for PHY-key Generation, PHY-authentication, and Discriminatory Channel Estimation." University of Toledo / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1588784882183339.
Full text