Loading...

Analysis of fundamental Limits For Information Theoretic Secrecy in Large Wireless Networks

Hadavi, Amir Hossein | 2015

1173 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 48235 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Aref, Mohammad Reza; Mirmohseni, Mahtab
  7. Abstract:
  8. Against the computational security, which guarantees the confidentiality via computational complexity, information theoretic secrecy considers the full information secrecy. The full information secrecy is the case when the mutual information rate between received signal of eavesdropper and the confidential message converges to zero. In this thesis we consider the fundamental limits of transmission security. For this, we first consider basic models with one transmitter, one receiver and one eavesdropper and after investigating previous works, models and performance criteria, we state our owns models and criterion. Since the full knowledge of CSI is an optimistic assumption, we consider the partial knowledge situation and after reviewing some previous results for basic models, we investigate some of methods for enhancing the secrecy. These methods can be divided in two major approaches: reducing the power level and increasing the noise level of the eavesdropper. There, we state that the first approach seems to be more appropriate. Then we propose our own method based on this approach. More practical, then we regard large wireless networks. We use our method, which is based on MIMO, for these networks to guarantee some achievable secure rates for them. Some done works in this field only consider the fading effect or path loss effect. Also some other, use the full CSI assumption in the transmitter and some of them, design secrecy enhancing schemes using noise increment approach. But, in this thesis we consider both effects of fading and path loss and we solve the problem under the partial CSI assumption and design our method based on eavesdropper power reduction. In our calculations, after obtaining proper limits for problem parameters, we will derive a scaling law for the secure rate. At the end, After giving some points to secret key agreement problem in large wireless networks, we propose a compound problem between secure transmission and key agreement
  9. Keywords:
  10. Secret Key Agreement ; Path Loss ; Fading ; Wiretap Channel ; Outage Probability ; Scaling Method ; Achievable Rate Region ; Transmission Security ; Large Wireless Networks

 Digital Object List

 Bookmark

...see more