Buy Cooperation and Information Theoretic Security in Wireless Networks.
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Mathematics and Science Textbooks > Science: general issues > Cooperation and Information Theoretic Security in Wireless Networks.
Cooperation and Information Theoretic Security in Wireless Networks.

Cooperation and Information Theoretic Security in Wireless Networks.


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

This dissertation studies the fundamental rate limits of wireless communication systems through which confidential messages can be transmitted without being intercepted by an adversary. It is assumed that the adversary is subject to noise and interference, as are the legitimate nodes in the system. The security guarantees offered are irrespective of the computational power of the adversary. Three themes are developed in parallel throughout the dissertation. The first theme explores the relationship between cooperation and secrecy. In wireless networks, cooperation from intermediate relay nodes are essential for facilitating long range communications. This dissertation considers a series of network models where the information from a source to a destination needs to be kept confidential from intermediate relays. Four different network models with untrusted relay nodes are considered: the three-node relay channel, the two-hop link, the two-way relay channel and the multi-hop line network. These models are studied for relays that are honest but curious. That is, the relay nodes are legitimate nodes with lower security clearance, that willingly carry out the designated relay schemes. Secrecy capacity lower and upper bounds for each channel model are found and cases where secrecy capacity can be found are identified. Next the two-hop link is studied where the relay turns malicious in that it can manipulate the signals being relayed and carry out a Byzantine attack. In this case, two requirements must be satisfied simultaneously: The message must be kept confidential from the relay node, and, any modification carried out by the relay node must be detected reliably by the legitimate parties. The dissertation shows that both requirements can be fulfilled for this model with arbitrarily small overhead. The next two themes developed in this dissertation serve as the technical foundation for the first theme. One establishes the foundation for providing secrecy using structured codes. Traditionally, the achievability proofs for information theoretic secrecy rely on Shannon's random codebook generation argument in which the codebook does not exhibit structure. In this dissertation, it is shown that by imposing structure requirements in random codebook generation, higher rates for secure communication can be achieved than known results obtained using the conventional approach. This dissertation develops the necessary tool and general methodology for computing the secrecy rate when a nested lattice structure is used in codebook generation. Two results are presented that rely on this foundation. First, it is proved that, for a class of Gaussian channel models with interference and secrecy constraints, structured codes outperform Gaussian signaling at medium to high SNR. Second, this tool is used to develop a strong secrecy scheme for the two-hop link with an untrusted relay, which in turn is the centerpiece of the Byzantine detection scheme developed in this dissertation. The third theme is methods of proving strong secrecy. Information theoretic secrecy results often rely on the weak secrecy constraint which provides only asymptotic guarantees with respect to the information rate leaked to the adversary. As this would likely be insufficient in a practical system, a non-asymptotic, strong secrecy guarantee must be sought. More often than not, weak secrecy rates can be strengthened to strong secrecy rates in a straightforward manner, leading back to the justification of proving weak secrecy only. This dissertation challenges this conventional wisdom and identifies two cases where this approach does not follow. In both cases, direct strong secrecy proofs are established. These are: the two-hop


Best Sellers


Product Details
  • ISBN-13: 9781244760059
  • Publisher: Proquest, Umi Dissertation Publishing
  • Publisher Imprint: Proquest, Umi Dissertation Publishing
  • Height: 254 mm
  • Weight: 603 gr
  • ISBN-10: 1244760056
  • Publisher Date: 01 Oct 2011
  • Binding: Paperback
  • Spine Width: 20 mm
  • Width: 203 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cooperation and Information Theoretic Security in Wireless Networks.
Proquest, Umi Dissertation Publishing -
Cooperation and Information Theoretic Security in Wireless Networks.
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cooperation and Information Theoretic Security in Wireless Networks.

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!