Delay-Limited Secure Communication Over Fading Channels / (Record no. 8967)

MARC details
000 -LEADER
fixed length control field 04459nam a22002537a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210223b2009 a|||f mb|| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
041 0# - Language Code
Language code of text eng
Language code of abstract eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005
100 0# - MAIN ENTRY--PERSONAL NAME
Personal name Karim Abulmakarem Mohamed Khalil
245 1# - TITLE STATEMENT
Title Delay-Limited Secure Communication Over Fading Channels /
Statement of responsibility, etc. Karim Abulmakarem Mohamed Khalil
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Date of publication, distribution, etc. 2009
300 ## - PHYSICAL DESCRIPTION
Extent 59 p.
Other physical details ill.
Dimensions 21 cm.
500 ## - GENERAL NOTE
Materials specified Supervisor: Moustafa Youssef
502 ## - Dissertation Note
Dissertation type Thesis (M.A.)—Nile University, Egypt, 2009 .
504 ## - Bibliography
Bibliography "Includes bibliographical references"
505 0# - Contents
Formatted contents note Contents:<br/>Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1<br/>1.1 The Wireless Channel . . . . . . . . . . . . . . . . . . . . . . . . . 1<br/>1.2 Previous Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3<br/>1.3 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6<br/>1.4 Outline and Contribution . . . . . . . . . . . . . . . . . . . . . . . 10<br/>2. Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12<br/>2.1 Physical Layer Security . . . . . . . . . . . . . . . . . . . . . . . . 12<br/>2.2 Delay Limited Communication . . . . . . . . . . . . . . . . . . . . 14<br/>2.2.1 Ergodic vs Delay Limited Setting: Capacity and Power Control 15<br/>2.2.2 Transmitter CSI . . . . . . . . . . . . . . . . . . . . . . . . 16<br/>viii<br/>3. Full Transmitter CSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br/>3.1 Upper Bound on the Delay Limited Secrecy Capacity . . . . . . . . 18<br/>3.2 Achievable Delay Limited Secrecy Rate . . . . . . . . . . . . . . . . 19<br/>3.2.1 Achievability Proof . . . . . . . . . . . . . . . . . . . . . . . 20<br/>3.2.2 Remarks on the achievability scheme . . . . . . . . . . . . . 27<br/>3.3 Asymptotic Optimality of the Achievable Rate . . . . . . . . . . . 27<br/>3.4 Numerical Results . . . . . . . . . . . . . . . . . . . . . . . . . . . 28<br/>4. Only Main Channel CSI . . . . . . . . . . . . . . . . . . . . . . . . . . . 30<br/>4.1 Upper Bound on the Delay Limited Secrecy Capacity . . . . . . . . 30<br/>4.2 Achievable Delay Limited Secrecy Rate . . . . . . . . . . . . . . . . 31<br/>4.2.1 Proof of the Achievable Scheme . . . . . . . . . . . . . . . . 32<br/>4.3 Numerical Results . . . . . . . . . . . . . . . . . . . . . . . . . . . 36<br/>5. Conclusions and Future Work . . . . . . . . . . . . . . . . . . . . . . . . 38<br/>Appendices:<br/>A. Random Binning Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . 39<br/>B. Ergodic Secrecy Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . 42<br/>B.1 Full Transmitter CSI . . . . . . . . . . . . . . . . . . . . . . . . . . 42<br/>B.2 Only Main Channel CSI . . . . . . . . . . . . . . . . . . . . . . . . 43<br/>Bibliography . . . .
520 3# - Abstract
Abstract Abstract:<br/>Many wireless applications are limited by different forms of delay constraints.<br/>These applications range from the most basic voice communication to the more demanding<br/>multimedia streaming. However, due to its broadcast nature, the wireless<br/>channel is vulnerable to eavesdropping and other security threats. Therefore, techniques<br/>that satisfy both the delay limitation and the confidentiality requirement are<br/>of definite interest. This motivates our analysis of the fundamental (information theoretic)<br/>limits of secure communication over fading channels subject to strict deadlines.<br/>In this thesis, we study the delay limited secrecy capacity of the flat fading channel<br/>under two different assumptions on the available transmitter channel state information<br/>(CSI). The first scenario assumes perfect prior knowledge of both the main and<br/>eavesdropper channel gains. Here, upper and lower bounds on the delay limited secrecy<br/>capacity are derived, and shown to be tight in the high signal-to-noise ratio<br/>(SNR) regime. In the second scenario, only the main channel CSI is assumed to<br/>be available at the transmitter where, remarkably, we establish the achievability of<br/>a non-zero delay-limited secure rate, for a wide class of channel distributions, with<br/>a high probability. In the two cases, our achievability arguments are based on a<br/>novel two-stage key-sharing approach that overcomes the secrecy outage phenomenon<br/>observed in earlier works.
546 ## - Language Note
Language Note Text in English, abstracts in English.
650 #4 - Subject
Subject Wireless Technologies
655 #7 - Index Term-Genre/Form
Source of term NULIB
focus term Dissertation, Academic
690 ## - Subject
School Wireless Technologies
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Thesis
650 #4 - Subject
-- 327
655 #7 - Index Term-Genre/Form
-- 187
690 ## - Subject
-- 327
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library 02/23/2021   005/ K.K.D 2009 02/23/2021 02/23/2021 Thesis