Buy Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Science, Technology & Agriculture > Technology: general issues > Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels
Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels

Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

The widespread use of multiuser wireless communications has been raising the demand for higher data rates and until now that has been the main design focus in wireless systems. This design focus, however, neglects the critical issue of communications security inherent in wireless systems that present a channel that is very easy for people of criminal intent to tap. Existing approaches leave this important issue to the higher layers of the protocol hierarchies, yet the need to deal with it in lower layers is imminent as the security of many cryptographic algorithms is hard to evaluate and has caused disappointment in the past. In addition, there is rising interest in large networks of low-complexity transmitters such as sensor nodes and RF-ID tags that do not have room for complicated and computationally intensive cryptographic algorithms. Historically, communication secrecy has been evaluated using one of two approaches: information theory or computational complexity. Throughout this thesis, we look at the information theoretic measures of secrecy to find provable secure communication schemes, and try to bring a joint approach to improve both security and throughput. We start by examining the Gaussian Multiple-Access Wire-Tap Channel (GMAC-WT), and an eavesdropper who has access to a degraded version of the legitimate receiver's signal. For this scenario, we first define two suitable secrecy measures, called "collective" and "individual" secrecy measures. We first look at coding schemes to achieve a given amount of secrecy in the presence of this eavesdropper. We find achievable secrecy rate regions for each constraint, and show that we can achieve the secrecy sum-capacity for this scenario. We then look at a more general scenario where the eavesdropper does not necessarily have a degraded version of the receiver's signal. In this more general case, we consider the "collective" constraints, as this constraint allows the system to achieve a larger rate region by placing trust on all users; and the "perfect secrecy" case, since this is in general a more appropriate constraint for practical purposes. We find an achievable secrecy rate region, and the power allocations that maximize the achievable perfect secrecy sum-rate. We also introduce a novel scheme, which we call "cooperative jamming," where users whose signals are vulnerable to decoding by the eavesdropper jam the eavesdropper, achieving higher secrecy rates for the remaining users. We also find an outer bound on the achievable secrecy sum-rate, which is shown to coincide with the achievable secrecy sum-rate for the degraded scenario. Next, we consider the Gaussian Two-Way Wire-Tap Channel (GTW-WT) and the Binary Additive Two-Way Wire-Tap Channel (BATW-WT). For these channels, we find achievable secrecy regions, and show that utilizing the same channel, in addition to the transmitters knowing their own self-interference, allows for higher secrecy sum-rates than the GMAC-WT. We also investigate cooperative jamming and find the optimum transmit/jam powers for the two users. Finally, we examine the ergodic block-fading case for the two user GMAC-WT. We find the secrecy sum-rate maximizing power allocations under a long-term power constraint, and see that unlike the standard GMAC where it is optimal for only one user to be transmitting at any given time, in some cases it is better for both users to be transmitting. We also consider cooperative jamming for this scenario, and give numerical results showing the improvement achievable for the secrecy sum-rate. This thesis is among the first to point out the advantages that the wireless medium brings to securing information transfer...


Best Sellers


Product Details
  • ISBN-13: 9781243565907
  • Publisher: Proquest, Umi Dissertation Publishing
  • Publisher Imprint: Proquest, Umi Dissertation Publishing
  • Height: 254 mm
  • Weight: 304 gr
  • ISBN-10: 124356590X
  • Publisher Date: 01 Sep 2011
  • Binding: Paperback
  • Spine Width: 10 mm
  • Width: 203 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels
Proquest, Umi Dissertation Publishing -
Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!