THESIS
2014
xvi, 110 pages : illustrations ; 30 cm
Abstract
Exploiting the randomness embedded in wireless channels, the physical-layer security
techniques can provide additional security robustness against malicious eavesdropping at
the physical layer of communication systems. To further this line of study, this thesis
focuses on developing advanced multi-antenna transmission strategies for enhancing the
secrecy performance of wireless communication systems.
Assuming perfect channel feedback from the desired receiver and none from the eavesdropper,
we consider beamforming with smartly injected artificial noise, aiming to confuse
the eavesdropper whilst leaving the desired receiver unaffected. The system parameters
are either chosen to be fixed for all transmissions, or adaptively adjusted based on the
channel feedback from the desired...[
Read more ]
Exploiting the randomness embedded in wireless channels, the physical-layer security
techniques can provide additional security robustness against malicious eavesdropping at
the physical layer of communication systems. To further this line of study, this thesis
focuses on developing advanced multi-antenna transmission strategies for enhancing the
secrecy performance of wireless communication systems.
Assuming perfect channel feedback from the desired receiver and none from the eavesdropper,
we consider beamforming with smartly injected artificial noise, aiming to confuse
the eavesdropper whilst leaving the desired receiver unaffected. The system parameters
are either chosen to be fixed for all transmissions, or adaptively adjusted based on the
channel feedback from the desired receiver. For both cases, we provide novel and explicit
design solutions for achieving the maximum throughput subject to a secrecy outage constraint.
We then derive accurate approximations for the maximum throughput, and give
new insights into the additional power cost for achieving a higher security level and the
throughput gain of adaptive transmission over non-adaptive transmission.
Having investigated the perfect feedback scenario, we then relax the feedback assumption
and consider practical effects imposed by limited feedback constraints on the channel from
the desired receiver to the transmitter. To deal with quantization error due to limited
feedback whilst also accounting for unknown channel of the eavesdropper, we specify a
connection outage constraint to guarantee the reliability of desired communication and a
secrecy outage constraint to guard against malicious eavesdropping. Under dual outage
constraints, we derive a novel optimized rate-adaptive transmission design to maximize
the average secrecy throughput. New insights regarding the optimal power/feedback
allocation and the number of feedback bits required for efficient quantization are obtained
through our analysis.
Our preceding study focused on isolated point-to-point transmission without any interference.
However, the performance of contemporary wireless networks is often limited by
interference from concurrent transmissions. To characterize the impact of interference on
secure communication, we consider an interference-limited large-scale network. To confuse
the malicious eavesdroppers, in addition to information-bearing signals, the transmitters
are designed to generate artificial noise through either beamforming or antenna sectoring
in a distributed manner. For both cases, using tools from stochastic geometry, we provide
a statistical characterization of the reliability performance of desired communication and
the secrecy performance against eavesdropping. We then investigate the networkwide secrecy
throughput performance and optimize the transmit power allocation. Our analysis
reveals interesting differences between the beamforming and sectoring approaches in terms
of the optimal power allocation and the maximum networkwide secrecy throughput.
Post a Comment