Share

Physical Layer Security in Training-based Single-hop/dual-hop Massive MIMO Systems

Download Physical Layer Security in Training-based Single-hop/dual-hop Massive MIMO Systems PDF Online Free

Author :
Release : 2018
Genre : Computer network architectures
Kind : eBook
Book Rating : /5 ( reviews)

GET EBOOK


Book Synopsis Physical Layer Security in Training-based Single-hop/dual-hop Massive MIMO Systems by : Santosh Timilsina

Download or read book Physical Layer Security in Training-based Single-hop/dual-hop Massive MIMO Systems written by Santosh Timilsina. This book was released on 2018. Available in PDF, EPUB and Kindle. Book excerpt: The broadcast nature of wireless medium has made information security as one of the most important and critical issues in wireless systems. Physical layer security, which is based on information-theoretic secrecy concepts, can be used to secure the wireless channels by exploiting the noisiness and imperfections of the channels. Massive multiple-input multiple-output (MIMO) systems, which are equipped with very large antenna arrays at the base stations, have a great potential to boost the physical layer security by generating the artificial noise (AN) with the exploitation of excess degrees-of-freedom available at the base stations. In this thesis, we investigate physical layer security provisions in the presence of passive/active eavesdroppers for single-hop massive MIMO, dual-hop relay-assisted massive MIMO and underlay spectrum-sharing massive MIMO systems. The performance of the proposed security provisions is investigated by deriving the achievable rates at the user nodes, the information rate leaked into the eavesdroppers, and the achievable secrecy rates. Moreover, the effects of active pilot contamination attacks, imperfect channel state information (CSI) acquisition at the base-stations, and the availability of statistical CSI at the user nodes are quantified. The secrecy rate/performance gap between two AN precoders, namely the random AN precoder and the null-space based AN precoder, is investigated. The performance of hybrid analog/digital precoding is compared with the full-dimensional digital precoding. Furthermore, the physical layer security breaches in underlay spectrum-sharing massive MIMO systems are investigated, and thereby, security provisions are designed/analyzed against active pilot contamination attacks during the channel estimation phase. A power-ratio based active pilot attack detection scheme is investigated, and thereby, the probability of detection is derived. Thereby, the vulnerability of uplink channel estimation based on the pilots transmitted by the user nodes in time division duplexing based massive MIMO systems is revealed, and the fundamental trade-offs among physical layer security provisions, implementation complexity and performance gains are discussed.

Physical Layer Security Issues in Massive MIMO and GNSS

Download Physical Layer Security Issues in Massive MIMO and GNSS PDF Online Free

Author :
Release : 2021-02-10
Genre :
Kind : eBook
Book Rating : 98X/5 ( reviews)

GET EBOOK


Book Synopsis Physical Layer Security Issues in Massive MIMO and GNSS by : Ziya Gülgün

Download or read book Physical Layer Security Issues in Massive MIMO and GNSS written by Ziya Gülgün. This book was released on 2021-02-10. Available in PDF, EPUB and Kindle. Book excerpt: Wireless communication technology has evolved rapidly during the last 20 years. Nowadays, there are huge networks providing communication infrastructures to not only people but also to machines, such as unmanned air and ground vehicles, cars, household appliances and so on. There is no doubt that new wireless communication technologies must be developed, that support the data traffic in these emerging, large networks. While developing these technologies, it is also important to investigate the vulnerability of these technologies to different malicious attacks. In particular, spoofing and jamming attacks should be investigated and new countermeasure techniques should be developed. In this context, spoofing refers to the situation in which a receiver identifies falsified signals, that are transmitted by the spoofers, as legitimate or trustable signals. Jamming, on the other hand, refers to the transmission of radio signals that disrupt communications by decreasing the signal-to-interference-and-noise ratio (SINR) on the receiver side. In this thesis, we analyze the effects of spoofing and jamming both on global navigation satellite system (GNSS) and on massive multiple-input multiple-output (MIMO) communications. GNSS is everywhere and used to provide location information. Massive MIMO is one of the cornerstone technologies in 5G. We also propose countermeasure techniques to the studied spoofing and jamming attacks. More specifically, in paper A we analyze the effects of distributed jammers on massive MIMO and answer the following questions: Is massive MIMO more robust to distributed jammers compared with previous generation’s cellular networks? Which jamming attack strategies are the best from the jammer’s perspective, and can the jamming power be spread over space to achieve more harmful attacks? In paper B, we propose a detector for GNSS receivers that is able to detect multiple spoofers without having any prior information about the attack strategy or the number of spoofers in the environment.

Physical Layer Security in Massive MIMO Systems

Download Physical Layer Security in Massive MIMO Systems PDF Online Free

Author :
Release : 2016
Genre :
Kind : eBook
Book Rating : /5 ( reviews)

GET EBOOK


Book Synopsis Physical Layer Security in Massive MIMO Systems by : Jun Zhu

Download or read book Physical Layer Security in Massive MIMO Systems written by Jun Zhu. This book was released on 2016. Available in PDF, EPUB and Kindle. Book excerpt:

Physical Layer Security

Download Physical Layer Security PDF Online Free

Author :
Release : 2021-01-24
Genre : Technology & Engineering
Kind : eBook
Book Rating : 663/5 ( reviews)

GET EBOOK


Book Synopsis Physical Layer Security by : Khoa N. Le

Download or read book Physical Layer Security written by Khoa N. Le. This book was released on 2021-01-24. Available in PDF, EPUB and Kindle. Book excerpt: This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer security analyses for several technologies and networks such as Fifth-Generation (5G) networks, Internet of Things (IoT) applications, and Non-orthogonal multiple access (NOMA). The authors have provided these under various practical scenarios, and developed theoretical aspects to validate their proposed applications. Presents physical layer security (PLS) under correlated fading environments, 5G wireless networks, and NOMA networks; Provides end-to-end analyses, combination of channel correlation and outdated CSI and their effects on PL; Includes contributions of PLS research written by global experts in academia and industry.

Cellular Communications Systems in Congested Environments

Download Cellular Communications Systems in Congested Environments PDF Online Free

Author :
Release : 2016-10-11
Genre : Technology & Engineering
Kind : eBook
Book Rating : 679/5 ( reviews)

GET EBOOK


Book Synopsis Cellular Communications Systems in Congested Environments by : Mo Ghorbanzadeh

Download or read book Cellular Communications Systems in Congested Environments written by Mo Ghorbanzadeh. This book was released on 2016-10-11. Available in PDF, EPUB and Kindle. Book excerpt: This book presents a mathematical treatment of the radio resource allocation of modern cellular communications systems in contested environments. It focuses on fulfilling the quality of service requirements of the living applications on the user devices, which leverage the cellular system, and with attention to elevating the users’ quality of experience. The authors also address the congestion of the spectrum by allowing sharing with the band incumbents while providing with a quality-of-service-minded resource allocation in the network. The content is of particular interest to telecommunications scheduler experts in industry, communications applications academia, and graduate students whose paramount research deals with resource allocation and quality of service.

You may also like...