NotesFAQContact Us
Search Tips
ERIC Number: ED533816
Record Type: Non-Journal
Publication Date: 2011
Pages: 140
Abstractor: As Provided
Reference Count: 0
ISBN: ISBN-978-1-1249-0645-4
Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks
Bashar, Muhammad Shafi Al
ProQuest LLC, Ph.D. Dissertation, University of California, Davis
In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better flexibility in response to the typically time-varying wireless environment. To better utilize limited wireless resources, we present approaches and techniques based on new performance criteria for wireless system optimization by thoroughly exploiting user information including its Quality of Service (QoS) requests and channel state information (CSI) to improve network throughput and security. In recent years, there has been a growing research interest in wireless system security from PHY layer perspective. In a wiretap channel model introduced in the seminal work by Wyner, a sender "Alice" wishes to transmit a secret message to the intended receiver "Bob" in presence of a passive eavesdropper "Eve". Existing works have characterized maximum achievable secrecy rate or secrecy capacity for single- and multiple-antenna systems by applying Gaussian signaling and secrecy code. Despite the impracticality of Gaussian input, its compact closed-form expression of mutual information motivated the wide use of Gaussian input assumption in theoretical analysis. In contrast to the Gaussian codebook, practical wiretap codes must consist of finite-alphabet symbols. Because of this constraint, the achievable secrecy rate for a finite-alphabet input scenario would differ from the secrecy rate achievable by a Gaussian codebook. In this thesis, we quantify the effect of finite discrete-constellation on instantaneous and ergodic secrecy rate of multiple-antenna wire-tap channels. Our results demonstrate substantial performance difference between systems involving finite-alphabet inputs and systems with Gaussian inputs. In addition, we investigate the secrecy performance of multi-terminal wiretap systems when a codebook based transmission beamforming is implemented. We characterize the secrecy outage probability of a communication link under eavesdropping. We consider a limited feedback scenario where the transmitter uses a pre-defined codebook known to both the transmitter and the receiver for beamforming, and analyze the secrecy outage probability of the link when it being eavesdropped. Next, we consider the security of wireless multi-hop networks. Certainly, network security is an overarching issue that transcends all layers of communication protocol stack. Therefore, we tackle the problem of network security by proper user scheduling, routing, and resource management. Our approach of secrecy is complementary to the traditional cryptography based techniques. Together, they can provide stronger overall security and flexibility in selecting the desired solution and can reduce bandwidth and energy overhead as much as possible. Multi-hop wireless networks frequently employ the traditional routing and resource allocation strategies. Such strategies often fail to take into account the additional need for protection against security vulnerabilities due to the wireless medium. Thus, to address security concerns, we investigate the problem of eavesdropping control by proposing security-aware power allocation strategies and routing algorithms for multi-hop networks. The future wireless infrastructure will consists of a plethora of heterogeneous collections of applications and services. A differentiated service structure would therefore be an essential part of the future wireless infrastructure. In addition to the security consideration of wireless network, we focus on the heterogeneous structure of the network. We study the problem of cross-layer resource allocation and admission control in a multiuser heterogeneous OFDMA network providing both QoS-constrained user services and best-effort services. Such heterogeneous networks provide service to both High-Priority (HP) users and Best-Effort (BE) users. By clustering subcarriers, efficient algorithms for cluster and power allocation have been proposed. Our strategy maximizes the total network utility of the BE users while satisfying the QoS request for maximum number of HP users. The feasibility of the resource allocation problem depends on the number of HP users in the network. Since a large number of demanding HP users would render the resource allocation problem infeasible, a joint admission control and resource allocation scheme could be an efficient way of tackling both problems with less overhead. By incorporating admission control, we propose an efficient and optimal joint admission control and resource allocation algorithm. [The dissertation citations contained here are published with the permission of ProQuest LLC. Further reproduction is prohibited without permission. Copies of dissertations may be obtained by Telephone (800) 1-800-521-0600. Web page:]
ProQuest LLC. 789 East Eisenhower Parkway, P.O. Box 1346, Ann Arbor, MI 48106. Tel: 800-521-0600; Web site:
Publication Type: Dissertations/Theses - Doctoral Dissertations
Education Level: N/A
Audience: N/A
Language: English
Sponsor: N/A
Authoring Institution: N/A