MARC details
| 000 -LEADER |
| fixed length control field |
04459nam a22002537a 4500 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
210223b2009 a|||f mb|| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EG-CaNU |
| Transcribing agency |
EG-CaNU |
| 041 0# - Language Code |
| Language code of text |
eng |
| Language code of abstract |
eng |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005 |
| 100 0# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Karim Abulmakarem Mohamed Khalil |
| 245 1# - TITLE STATEMENT |
| Title |
Delay-Limited Secure Communication Over Fading Channels / |
| Statement of responsibility, etc. |
Karim Abulmakarem Mohamed Khalil |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Date of publication, distribution, etc. |
2009 |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
59 p. |
| Other physical details |
ill. |
| Dimensions |
21 cm. |
| 500 ## - GENERAL NOTE |
| Materials specified |
Supervisor: Moustafa Youssef |
| 502 ## - Dissertation Note |
| Dissertation type |
Thesis (M.A.)—Nile University, Egypt, 2009 . |
| 504 ## - Bibliography |
| Bibliography |
"Includes bibliographical references" |
| 505 0# - Contents |
| Formatted contents note |
Contents:<br/>Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1<br/>1.1 The Wireless Channel . . . . . . . . . . . . . . . . . . . . . . . . . 1<br/>1.2 Previous Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3<br/>1.3 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6<br/>1.4 Outline and Contribution . . . . . . . . . . . . . . . . . . . . . . . 10<br/>2. Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12<br/>2.1 Physical Layer Security . . . . . . . . . . . . . . . . . . . . . . . . 12<br/>2.2 Delay Limited Communication . . . . . . . . . . . . . . . . . . . . 14<br/>2.2.1 Ergodic vs Delay Limited Setting: Capacity and Power Control 15<br/>2.2.2 Transmitter CSI . . . . . . . . . . . . . . . . . . . . . . . . 16<br/>viii<br/>3. Full Transmitter CSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br/>3.1 Upper Bound on the Delay Limited Secrecy Capacity . . . . . . . . 18<br/>3.2 Achievable Delay Limited Secrecy Rate . . . . . . . . . . . . . . . . 19<br/>3.2.1 Achievability Proof . . . . . . . . . . . . . . . . . . . . . . . 20<br/>3.2.2 Remarks on the achievability scheme . . . . . . . . . . . . . 27<br/>3.3 Asymptotic Optimality of the Achievable Rate . . . . . . . . . . . 27<br/>3.4 Numerical Results . . . . . . . . . . . . . . . . . . . . . . . . . . . 28<br/>4. Only Main Channel CSI . . . . . . . . . . . . . . . . . . . . . . . . . . . 30<br/>4.1 Upper Bound on the Delay Limited Secrecy Capacity . . . . . . . . 30<br/>4.2 Achievable Delay Limited Secrecy Rate . . . . . . . . . . . . . . . . 31<br/>4.2.1 Proof of the Achievable Scheme . . . . . . . . . . . . . . . . 32<br/>4.3 Numerical Results . . . . . . . . . . . . . . . . . . . . . . . . . . . 36<br/>5. Conclusions and Future Work . . . . . . . . . . . . . . . . . . . . . . . . 38<br/>Appendices:<br/>A. Random Binning Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . 39<br/>B. Ergodic Secrecy Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . 42<br/>B.1 Full Transmitter CSI . . . . . . . . . . . . . . . . . . . . . . . . . . 42<br/>B.2 Only Main Channel CSI . . . . . . . . . . . . . . . . . . . . . . . . 43<br/>Bibliography . . . . |
| 520 3# - Abstract |
| Abstract |
Abstract:<br/>Many wireless applications are limited by different forms of delay constraints.<br/>These applications range from the most basic voice communication to the more demanding<br/>multimedia streaming. However, due to its broadcast nature, the wireless<br/>channel is vulnerable to eavesdropping and other security threats. Therefore, techniques<br/>that satisfy both the delay limitation and the confidentiality requirement are<br/>of definite interest. This motivates our analysis of the fundamental (information theoretic)<br/>limits of secure communication over fading channels subject to strict deadlines.<br/>In this thesis, we study the delay limited secrecy capacity of the flat fading channel<br/>under two different assumptions on the available transmitter channel state information<br/>(CSI). The first scenario assumes perfect prior knowledge of both the main and<br/>eavesdropper channel gains. Here, upper and lower bounds on the delay limited secrecy<br/>capacity are derived, and shown to be tight in the high signal-to-noise ratio<br/>(SNR) regime. In the second scenario, only the main channel CSI is assumed to<br/>be available at the transmitter where, remarkably, we establish the achievability of<br/>a non-zero delay-limited secure rate, for a wide class of channel distributions, with<br/>a high probability. In the two cases, our achievability arguments are based on a<br/>novel two-stage key-sharing approach that overcomes the secrecy outage phenomenon<br/>observed in earlier works. |
| 546 ## - Language Note |
| Language Note |
Text in English, abstracts in English. |
| 650 #4 - Subject |
| Subject |
Wireless Technologies |
| 655 #7 - Index Term-Genre/Form |
| Source of term |
NULIB |
| focus term |
Dissertation, Academic |
| 690 ## - Subject |
| School |
Wireless Technologies |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Thesis |
| 650 #4 - Subject |
| -- |
327 |
| 655 #7 - Index Term-Genre/Form |
| -- |
187 |
| 690 ## - Subject |
| -- |
327 |