451 research outputs found

    Wireless networks physical layer security : modeling and performance characterization

    Get PDF
    Intrigued by the rapid growth and expand of wireless devices, data security is increasingly playing a significant role in our daily transactions and interactions with different entities. Possible examples, including e-healthcare information and online shopping, are becoming vulnerable due to the intrinsic nature of wireless transmission medium and the widespread open access of wireless links. Traditionally, the communication security is mainly regarded as the tasks at the upper layers of layered protocol stack, security techniques, including personal access control, password protection, and end-to-end encryption, have been widely studied in the open literature. More recently, plenty of research interests have been drawn to the physical layer forms of secrecy. As a new but appealing paradigm at physical layer, physical layer security is based on two pioneering works: (i) Shannon’s information-theoretic formulation and (ii) Wyner’s wiretap formulation. On account of the fundamental of physical layer security and the different nature of various wireless network, this dissertation is supposed to further fill the lacking of the existing research outcomes. To be specific, the contributions of this dissertation can be summarized as three-fold:(i) exploration of secrecy metrics to more general fading channels; (ii) characterization a new fading channel model and its reliability and security analysis in digital communication systems; and (iii) investigation of physical layer security over the random multiple-input multiple-output (MIMO) α −μ fading channels. Taking into account the classic Alice-Bob-Eve wiretap model, the first contribution can be divided into four aspects: (i) we have investigated the secrecy performance over single-input single-output (SISO) α −μ fading channels. The probability of non-zero (PNZ) secrecy capacity and the lower bound of secrecy outage probability (SOP) are derived for the special case when the main channel and wiretap channel undergo the same non-linearity fading parameter, i.e., α. Later on, for the purpose of filling the gap of lacking closed-form expression of SOP in the open literature and extending the obtained results in chapter 2 to the single-input multiple-output (SIMO) α − μ wiretap fading channels, utilizing the fact that the received signal-tonoise ratios (SNRs) at the legitimate receiver and eavesdropper can be approximated as new α −μ distributed random variables (RVs), the SOP metric is therefore derived, and given in terms of the bivariate Fox’s H-function; (ii) the secrecy performance over the Fisher-Snedecor F wiretap fading channels is initially considered. The SOP, PNZ, and ASC are finalized in terms of Meijer’s G-function; (iii) in order to generalize the obtained results over α −μ and Fisher-Snedecor F wiretap fading channels, a more flexible and general fading channel, i.e., Fox’s H-function fading model, are taken into consideration. Both the exact and asymptotic analysis of SOP, PNZ, and average secrecy capacity (ASC), are developed with closed-form expressions; and (iv) finally, motivated by the fact that the mixture gamma (MG) distribution is an appealing tool, which can be used to model the received instantaneous SNRs over wireless fading channels, the secrecy metrics over wiretap fading channels are derived based on the MG approach. Due to the limited transmission power and communication range, cooperative relays or multi-hop wireless networks are usually regarded as two promising means to address these concerns. Inspired by the obtained results in Chapters 2 and 3, the second main contribution is to propose a novel but simple fading channel model, namely, the cascaded α −μ. This new distribution is advantageous since it encompasses the existing cascaded Rayleigh, cascaded Nakagami-m, and cascaded Weibull with ease. Based on this, both the reliability and secrecy performance of a digital system over cascaded α −μ fading channels are further evaluated. Closed-form expressions of reliability metrics (including amount of fading (AF), outage probability, average channel capacity, and average symbol error probability (ABEP).) and secrecy metrics (including SOP, PNZ, and ASC) are respectively provided. Besides, their asymptotic behaviors are also performed and compared with the exact results. Considering the impacts of users’ densities, spatial distribution, and the path-loss exponent on secrecy issue, the third aspect of this thesis is detailed in Chapter 8 as the secrecy investigation of stochastic MIMO system over α −μ wiretap fading channels. Both the stochastic geometry and conventional space-time transmission (STT) scheme are used in the system configuration. The secrecy issue is mathematically evaluated by three metrics, i.e., connection outage, the probability of non-zero secrecy capacity and the ergodic secrecy capacity. Those three metrics are later on derived regarding two ordering scheme, and further compared with Monte-Carlo simulations

    Physical Layer Security in Vehicular Communication Networks in the Presence of Interference

    Full text link
    This paper studies the physical layer security of a vehicular communication network in the presence of interference constraints by analysing its secrecy capacity. The system considers a legitimate receiver node and an eavesdropper node, within a shared network, both under the effect of interference from other users. The double-Rayleigh fading channel is used to capture the effects of the wireless communication channel for the vehicular network. We present the standard logarithmic expression for the system capacity in an alternate form, to facilitate analysis in terms of the joint moment generating functions (MGF) of the random variables representing the channel fading and interference. Closed-form expressions for the MGFs are obtained and Monte-Carlo simulations are provided throughout to validate the results. The results show that performance of the system in terms of the secrecy capacity is affected by the number of interferers and their distances. The results further demonstrate the effect of the uncertainty in eavesdropper location on the analysis

    Design Of Vehicular Communication Systems Employing Physical Layer Network Coding Over Cascaded Fading Channels

    Get PDF
    Tez (Doktora) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 2017Thesis (Ph.D.) -- İstanbul Technical University, Institute of Science and Technology, 2017İnsandan insana ses taşıma odaklı ikinci nesil (2nd Generation, 2G) mobil haberleşme teknolojilerinin kaydettiği başarıdan sonra telsiz iletişim alanındaki eğilimler insandan-makinaya olarak adlandırılan veri taşıma odaklı telsiz iletişim teknolojilerine (3rd Generation, 3G) doğru yönelmiştir. Bu veri taşıma odaklı iletişim konsepti ile birlikte son kullanıcılar multi-media mesajlaşma, internet erişimi, e-ticaret ve video paylaşımı gibi çok çeşitli telsiz iletişim servislerine kavuşma imkanı buldular. Telsiz iletişimdeki başarılı ve hızlı ilerlemenin bir sonucu olarak günümüzde bu alanda yapılan araştırma-geliştirme çalışmalarının yönü yüksek veri iletim hızları (>100Mb/s) ve daha yüksek bant-verimliliği (>10b/s) gerektiren makineden-makineye (Mactine-to-Machine, M2M) telsiz iletişime doğru yönelmiş bulunmaktadır. M2M telsiz iletişiminde bir araştırma/uygulama alanı araçtan-nesnelere (Vehicle-to-things, V2X) haberleşmedir. Araçtan araca (Vehicle-to-Vehicle, V2V) ve araçtan yol kenarındaki baz istasyonuna (Vehicle-to-Infrastructure, V2I) olmak üzere iki haberleşme sistemini birlikte içeren V2X haberleşme sistemleri günümüzde özellikle büyük metropollerde günlük hayatı pek çok yönden olumsuz etkileyen trafik kaynaklı problemlere karşı getirdiği çözüm önerileri nedeniyle üniversitlerde teorik çalışmalar yapan araştırmacıların yanı sıra, resmi kurumların, standartları belirleyen organizasyonların ve özellille otomotiv ve bilişim endüstrisindeki şirketlerin gittikçe artan dikkatini çekmeyi başarmıştır. Araçlar arası haberleşme teknolojilerinin gelişimine ivme kazandıran önemli gelişmelere bakılacak olursa; 1999 yılında ABD’de Federal Communication Comission (FCC) 5.9GHz frekans bandında 75MHz’lik bir frekans bandının V2X haberleşme için kullanımını onaylamıştır. 2008 yılında ise Avrupa haberleşme standardları enstitüsü (European Telecommunication Standards Institute) yine 5.9GHz frekans bandında 30Mhz’lik bir bandın bu amaçla kullanılmasını önermiştir. FCC’nin 2003 yılında ITS (Intelligent Transportation Systems) uygulamalarında kullanılacak haberleşme birimleri için yayımladığı rapor ve talebin ardından DSRC (Dedicated Short Range Communication) olarak adlandırılan V2X haberleşme sistemlerinin standardizasyonu için çalışmalar başlamış ve 2004 yılında IEEE 802.11standardı temel alınarak geliştirilen IEEE 802.11p standardı WAVE (Wireless Access in Vehicular Environments) olarak da bilinen adıyla 2010 yılında kabul edilmiştir. Bugün artık pek çok üniversitede çeşitli araştırma grupları V2X haberleşme üzerine akademik çalışmalar yürütürken endüstriyel seviyede ise Avrupa’da örneğin büyük ölçekli Avrupa Birliği projeleri olarak CAR2CAR Communication Corsortium, Secure Vehicular Communication ve NEARCTIS yürütülmektedir. Amerika’da ise ulaştırma bakanlığının desteklediği IntelliDrive projesi ile güvenlik, mobil iletişim ve çevre koruma amaçlı hedefler doğrultusunda trafik altyapısı, araçlar ve yolcuların mobil haberleşme cihazları arasında haberleşmeyi sağlayacak bir telsiz iletişim ağı alt yapısı kurma çalışmaları sürdürülmektedir. Benzer çalışmalar Japon Otomobil Teknolojileri Araştırma Enstitüsü JARI tarafından da yapılmaktadır. Yine V2V haberleşmenin trafik güvenliğini arttırmadaki öneminin anlaşılmasından sonra lider otomobil üreticisi firmalar “Crash Avoidance Metrics Partnership” adını verdikleri proje için ortak çatı altında biraraya gelmişlerdir. Kısaca belirtilmek istenirse, telsiz iletişim alanında V2X haberleşme yeni ama oldukça önemli bir çalışma alanı olarak görülmektedir. Günümüz telsiz haberleşme teknolojilerinden biri olan araçtan araca haberleşme, trafik verimliliğini arttırma, kazaların azaltılması ve trafikte güvenli sürüş konulara çözümler sağlayacak akıllı taşıma sistemlerinin gerçeklenmesinde çekirdek teknoloji konumundadır. Hücresel haberleşme ile karşılaştırıldığında, V2V haberleşme bazı yeni zorlukları içerir. V2V haberleşme kanallarının istatistiksel özellikleri hücresel telsiz haberleşme kanallarının istatistiksel özelliklerinden farklıdır. Bu nedenle, Rayleigh, Rician ve Nakagami-m gibi iyi bilinen hücresel haberleşme kanal modelleri V2V haberleşme kanallarındaki sönümlemeyi modellemek için uygun değildir. Yapılan saha ölçümlerinden görüldüğü üzere, V2V haberleşme kanallarında kanal kazancı, hareketli kaynaklar etrafında, her biri ayrı bir işaret kaynağı gibi davranan birbirinden bağımsız saçıcı gupların oluşturduğu sanal kanalların kanal kazançlarının çarpımından meydana gelmektedir. Kanal kazancının bu çarpımsallık niteliğinden dolayı V2V haberleşme kanalları kaskad sönümlemeli kanal modeli olarak adlandırılan bir grup kanal modeli ile modellenmelidirler. V2V haberleşmede karşılaşılan zorlukların bir nedeni, gerek haberleşen araçların gerekse onların etrafındaki diğer araçların yüksek hızlardaki hareketliliği nedeniyle haberleşme ortamının çevresel olarak çok hızlı değişmesidir. Bunun yanısıra araç antenlerinin görece düşük yükseklikte olmasının da etkisiyle, özellikle yerleşim birimleri içindeki yoğun trafik şartları düşünüldüğünde, haberleşen araçlar arasında çoğu zaman doğrudan görüş olmayacaktır. Bu da iletişimin sürekliliği ve güvenilirliği açısından işbirlikli haberleşmeyi kaçınılmaz kılmaktadır. Ancak doğrudan haberleşmeye nazaran daha fazla zaman dilimi gereksinimi işbirlikli sistemlerin temel dezavantajıdır. Veri iletim hızında kayba neden olan bu dezavantajı yok etmenin bir yolu, iki haberleşme biriminin aynı zaman aralığında aynı röle üzerinden veri aktarmasına imkan tanıyan fiziksel katman ağ kodlama (Physical Layer Network Coding, PLNC) tekniğidir. Ani gelişen durumların çok sayıda kullanıcıya kısa sürede bildirilmesini gerektirecek trafik içi haberleşmede PLNC tekniği yüksek başarımlı V2V haberleşme sistemlerinin tasarımında önemli bir rol oynayacaktır. Bu tezde sunulan çalışmalar üç grupta ele alınabilir. Birinci gruptaki ilk çalışmada tek antenli tek röleli ve röle üzerinde sabit kazançlı kuvvetlendir-ve-aktar tekniği kullanılarak PLNC yapılan bir işbirlikli V2V haberleşme sistemi tasarlanmıştır. Sistemin performans analizleri kaskad Nakagami-m kanal modeli varsayımı altında yapılmış olup bu kanal modeli, araçlar arası haberleşmeye uygun olan çift Rayleigh, kaskad Rayleigh, çift Nakagami-m ve genelleştirilmiş-K kanal modellerinin yanı sıra geleneksel hücresel haberleşme kanal modellerini de kapsamaktadır. Dolayısıyla bu çalışmada elde edilen sonuçlar bu kanal modelleri için de geçerlidir. Sistemin hata performans analizleri yapılırken öncelikle uçtan-uca işaret gürültü oranına ait birikimsel olasılık dağılım fonksiyonu kapalı formda elde edilmiş, ardından bu dağılım fonksiyonu kullanılarak sistemin servis kesinti olasılığı ve çeşitli modülasyon tipleri için sembol hata olasılığı ifadeleri kapalı formda bulunmuştur. Bu analizlerin bir devamı olarak, birinci grupta yapılan ikinci çalışmada ise, kaynaklarda öz-girişim işaretinin tam olarak yok edilemediği durumlar için yine tek antenli tek röleli rölede sabit kazançlı kuvvetlendir-ve-aktar tekniği kullanılarak PLNC yapılan sistemin performans analizi kaskad ve hızlı sönümlemeli Rayleigh kanal varsayımı altında yapılmış ve sisteme ait servis kesinti olasılığı ifadesi kapalı formda elde edilerek öz girişimin sistem performansına etkileri incelenmiştir. Tezde yer alan ikinci grup çalışmada, çok girişli çok çıkışlı (multiple input multiple output, MIMO) bir V2V haberleşme sistemi tasarlanmıştır. Sistemde birden çok röle olup kaynaklar ve tüm röleler çok antenlidir. Ayrıca röleler değişken kazançlı kuvvetlendir-ve-aktar tekniği uygulayarak PLNC yapmaktadır. Bu çalışmada da kaskad Nakagami-m kanal modeli kullanıldığından elde edilen sonuçlar yukarıda bahsedilen diğer kaskad veya kaskad olmayan kanal modelleri için de geçerlidir. Burada yapılan analizler ile tüm sistemin servis kesinti performansı kaynakların ortak servis kesinti olasılıkları cinsinden ifade edilerek bu olasılık tek katlı integral formunda bulunmuştur. Ardından servis kesinti olasılığı için alt ve üst sınır ifadeleri kapalı formda elde edilmiştir. Bulunan sınır ifadeleri aracılığıyla sistemde elde edilebilecek çeşitleme derecesi, röle sayısı, kaynak ve rölelerde kullanılan anten sayıları ve kanalların kaskadlık dereceleri ve sönümleme parametrelerinin aldığı değerlere bağlı olarak sistem parametreleri cinsinden ifade edilmiştir. Tasarlanan bu sistem ile ortak anten ve röle seçimi yapılarak V2V haberleşme sistemlerinin performansının daha da iyileştirilebileceği gösterilmiştir. Tezde yapılan üçüncü çalışmada PLNC yapılan bir çok antenli çok röleli V2V haberleşme sisteminde uzay-zaman kafes kodlama tekniği kullanılarak sistem performansının daha da iyileştirilmesi sağlanmıştır. Bu amaçla öncelikle sistemin çiftsel hata olasılığı için bir üst sınır ifadesi çift Rayleigh sönümlemeli kanal varsayımı için elde edilmiştir. Daha sonra bu olasılığı en küçük yapacak kodların inşaası için yeni bir kod tasarım ölçütü türetilmiş ve bu ölçüt kullanılarak çift Rayleigh sönümlemeli kanallarda PLNC tekniği kullanan MIMO V2V haberleşme sistemler için 4 ve 8 durumlu yeni uzay-zaman kafes kodları bulunmuştur.As a current state-of-the-art in wireless communications, Vehicle-to-Vehicle (V2V) communications is the core technology to build the intelligent transportation infrastructures promising the solutions to the issues such as traffic efficiency increasing, accident reduction and safety improvements. In comparison with the cellular wireless communication, there are some new challenges within the V2V communication. The statistical properties of the V2V communication channels differ from those of the cellular channels. Thereby, well known cellular channel models such as Rayleigh, Rician and Nakagami-m are not appropriate to simulate the fading in V2V communication channels. Field measurements reveal that V2V communication channels can be modeled by a class of channel models where the gain is obtained by multiplying the gains of virtual channels produced by each individual scattering group around that behaves as an independent signal source. Due to their multiplicativity nature, V2V communication channels are named as cascaded fading channels. A major challenge in V2V communications is that the physical environment is unsettled due to the mobility of the wireless units and other vehicles around these units. Additionally, the vehicle antennas have relatively lower heights. Therefore, especially considering the traffic in urban areas, most of the time there will be no line-of-sight between the communicating vehicles. This makes cooperative communications inevitable for seamless and reliable communication among the moving vehicles. And yet, compared to non-cooperative communication, the cooperation protocols require more time slots, which results in a decrease in data transmission rate. A method to cope with this drawback is physical layer network coding (PLNC) providing the simultaneous data transmissions of the vehicles via the same relay. The PLNC method will play an important role in the design of the high performance V2V communication systems serving in the heavy traffic conditions when a large number of users need to be notified about suddenly changing situations. Studies presented in this thesis can be divided into three categories. In the first category, a cooperative V2V communication system employing PLNC using fixed gain amplify-and-forward technique is proposed and its outage and error performance analysis is investigated. Analytic results are derived under the cascaded Nakagami-m fading channel model assumption covering double Rayleigh, cascaded Rayleigh, double Nakagami-m, generalized-K and conventional cellular channel models as well. Therefore, the results obtained by this work are also valid for all these channel models. In the error performance investigation of the proposed system, first, exact cumulative density function of the end to end signal to noise ratio is derived. Then, using this cumulative density function, the exact closed-form outage probability is obtained. Then the exact closed-form symbol error rate expression for various modulation types is derived. As a continuation of this work, the performance analysis of the same system is investigated for not only cascaded but also fast fading Rayleigh channels in the presence of the self-interference. Thus the exact closed-form outage probability expression is obtained, and it is shown that the self-interference may cause the error floor in the performance of the network coded communication systems. In the second category, a multiple input multiple output (MIMO) V2V communication system is proposed. In this proposed system, all source and relay vehicles have multiple antennas while the relays employ the PLNC method using variable gain amplify-and-forward technique. The analytic results are derived for the cascaded Nakagami-m fading channels, and therefore the result of this work are held for the cascaded and non-cascaded channels, as mentioned above. Furthermore, the performance of the system is evaluated in terms of joint outage probability of the sources, and the exact outage probability expression is obtained in a single integral form while the upper and the lower bounds of the outage probability are obtained in the closed-form. Moreover, asymptotic diversity order is quantified as a function of the number of the relays, the number of the antennas at the sources and the relays, and the channel parameters which are cascading degree and fading parameter values. Within this system, it is shown that the service outage probability performance can be enhanced by employing joint antenna and relay selection. In the third category, PLNC and space-time trellis coding (STTC) techniques are combined to improve the error performance of a multi-antenna multi-relay V2V system. The upper bound expression of the pairwise error probability of the system is evaluated for double Rayleigh fading channels. Then using the upper bound expression, a novel code-design criterion is derived for cascaded fading channels. Then, by using this new criterion, a novel STTCs with 4 and 8 states are proposed for MIMO V2V PLNC systems.DoktoraPh.D

    Second Order Statistics of -Fisher-Snedecor Distribution and Their Application to Burst Error Rate Analysis of Multi-Hop Communications

    Get PDF
    An advantage of using the composite fading models (CFMs) is their ability to concurrently address the impact of multi-path and shadowing phenomena on the system performance in wireless communications. A Fisher-Snedecor (FS) F CFM has been recently proposed as an experimentally verified and tractable fading model that can be efficiently applied for 5G and beyond 5G wireless communication systems. This paper provides second-order (s-order) performance analysis of the product of N independent but not identically distributed (i.n.i.d) FS F random variables (RVs). In particular, accurate and closedform approximations for level crossing rate (LCR) and average fade duration (AFD) of the product of N i.n.i.d FS F(N-FS F) RVs are successfully derived by exploiting a general property of a Laplace approximation method for evaluation of the N -folded integral-form LCR expression. Based on the obtained s-order statistical results, the burst error rate and maximum symbol rate of the N -FS F distribution are addressed and thoroughly examined. The numerical results of the considered performance measures are discussed in relation to the N-FS F multi-path and shadowing severity parameters. Moreover, the impact of the number of hops (N) of the N -FS F CFM on the s-order metrics, the burst error rate and maximum symbol rate are numerically evaluated and investigated. The derived s-order statistical results can be used to address the cooperative relay-assisted (RA) communications for vehicular systems. Monte-Carlo (M - C) simulations for the addressed statistical measures are developed in order to confirm the provided theoretical results.This work was supported in part by UC3M and the European Union's Horizon 2020 Programme under the Marie Sklodowska-Curie Grant through the CONEX-Plus Project under Agreement 801538; in part by the IRENE-EARTH Project under Grant PID2020-115323RB-C33/AEI/10.13039/501100011033; in part by ERDF and the Spanish Government Projects under Grant PID2019-106808RA-I00 AEI/FEDER, UE; in part by CDTI Cervera Project INTEGRA under Grant CER-20211031; in part by the Secretaria d'Universitats i Recerca de la Generalitat de Catalunya under Project 2017-SGR-00376 and Project Fem IoT under Grant 001-P-001662; in part by the European Commission Project CPSoSaware; and in part by the Cost Actions under Grant CA19111, Grant CA20120, and Grant CA16220.Publicad

    Physical-Layer Security in Cognitive Radio Networks

    Get PDF
    The fifth-generation (5G) communications and beyond are expected to serve a huge number of devices and services. However, due to the fixed spectrum allocation policies, the need for cognitive radio networks (CRNs) has increased accordingly. CRNs have been proposed as a promising approach to address the problem of under-utilization and scarcity of the spectrum. In CRNs, secondary users (SUs) access the licensed spectrum of the primary users (PUs) using underlay, overlay, or interweave paradigms. SUs can access the spectrum band simultaneously with the PUs in underlay access mode provided that the SUs’ transmission power does not cause interference to the PUs’ communication. In this case, SUs should keep monitoring the interference level that the PU receiver can tolerate and adjust the transmission power accordingly. However, varying the transmission power may lead to some threats to the privacy of the information transfer of CRNs. Therefore, securing data transmission in an underlay CRN is a challenge that should be addressed. Physical-layer security (PLS) has recently emerged as a reliable method to protect the confidentiality of the SUs’ transmission against attacks, especially for the underlay model with no need for sharing security keys. Indeed, PLS has the advantage of safeguarding the data transmission without the necessity of adding enormous additional resources, specifically when there are massively connected devices. Apart from the energy consumed by the various functions carried out by SUs, enhancing security consumes additional energy. Therefore, energy harvesting (EH) is adopted in our work to achieve both; energy efficiency and spectral efficiency. EH is a significant breakthrough for green communication, allowing the network nodes to reap energy from multiple sources to lengthen battery life. The energy from various sources, such as solar, wind, vibration, and radio frequency (RF) signals, can be obtained through the process of EH. This accumulated energy can be stored to be used for various processes, such as improving the users’ privacy and prolonging the energy-constrained devices’ battery life. In this thesis, for the purpose of realistic modelling of signal transmission, we explicitly assume scenarios involving moving vehicles or nodes in networks that are densely surrounded by obstacles. Hence, we begin our investigations by studying the link performance under the impact of cascaded κ−μ fading channels. Moreover, using the approach of PLS, we address the privacy of several three-node wiretap system models, in which there are two legitimate devices communicating under the threat of eavesdroppers. We begin by a three-node wiretap system model operating over cascaded κ − μ fading channels and under worst-case assumptions. Moreover, assuming cascaded κ − μ distributions for all the links, we investigate the impact of these cascade levels, as well as the impact of multiple antennas employed at the eavesdropper on security. Additionally, the PLS is examined for two distinct eavesdropping scenarios: colluding and non-colluding eavesdroppers. Throughout the thesis, PLS is mainly evaluated through the secrecy outage probability (SOP), the probability of non-zero secrecy capacity (Pnzcr ), and the intercept probability (Pint). Considering an underlay CRN operating over cascaded Rayleigh fading channel, with the presence of an eavesdropper, we explore the PLS for SUs in the network. This study is then extended to investigate the PLS of SUs in an underlay single-input-multiple-output (SIMO) CRN over cascaded κ-μ general fading channels with the presence of a multi-antenna eavesdropper. The impact of the constraint over the transmission power of the SU transmitter due to the underlay access mode is investigated. In addition, the effects of multiple antennas and cascade levels over security are well-explored. In the second part of our thesis, we propose an underlay CRN, in which an SU transmitter communicates with an SU destination over cascaded κ-μ channels. The confidentiality of the shared information between SUs is threatened by an eavesdropper. Our major objective is to achieve a secured network, while at the same time improving the energy and spectrum efficiencies with practical modeling for signals’ propagation. Hence, we presume that the SU destination harvests energy from the SU transmitter. The harvested energy is used to produce jamming signals to be transmitted to mislead the eavesdropper. In this scenario, a comparison is made between an energy-harvesting eavesdropper and a non-energy harvesting one. Additionally, we present another scenario in which cooperative jamming is utilized as one of the means to boost security. In this system model, the users are assumed to communicate over cascaded Rayleigh channels. Moreover, two scenarios for the tapping capabilities of the eavesdroppers are presented; colluding and non-colluding eavesdroppers. This study is then extended for the case of non-colluding eavesdroppers, operating over cascaded κ-μ channels. Finally, we investigate the reliability of the SUs and PUs while accessing the licensed bands using the overlay mode, while enhancing the energy efficiency via EH techniques. Hence, we assume that multiple SUs are randomly distributed, in which one of the SUs is selected to harvest energy from the PUs’ messages. Then, utilizing the gathered energy, this SU combines its own messages with the amplified PUs messages and forwards them to the destinations. Furthermore, we develop two optimization problems with the potential of maximizing the secondary users’ rate and the sum rate of both networks

    Physical layer authentication for wireless communications

    Get PDF
    指導教員:姜 暁
    corecore