Publication:
Physical Layer Security: Wireless Location Verification and Secure Communications

dc.contributor.advisor Malaney, Robert en_US
dc.contributor.author Yan, Shihao en_US
dc.date.accessioned 2022-03-22T09:15:48Z
dc.date.available 2022-03-22T09:15:48Z
dc.date.issued 2015 en_US
dc.description.abstract This thesis focuses on the utilization of reliable location information in wireless physical layer security. Specifically, new optimal Location Verification Systems (LVSs) are first developed to authenticate claimed locations, and then robust transmission strategies that utilize the verified locations are exploited in order to enhance physical layer security. In the first half of this thesis, new optimal LVSs are developed and analyzed, leading to the following three main contributions. First, an information-theoretic framework for optimizing an LVS is developed and analyzed, in which the mutual information between the input and output data of the LVS is utilized as the optimization metric. Our analysis reveals that relative to more general frameworks the information-theoretic framework has a weaker dependence on critical unknown parameters of the system. Second, new optimal LVSs for a range of optimization metrics are proposed and examined under spatially correlated shadowing, with the conclusion that correlation in shadowing can lead to dramatic LVSs performance improvements. Third, analysis on an LVS under Rician fading channels discloses that the performance of the LVS increases significantly as the proportion of the line-of-sight component in the legitimate channel increases, or the tracking information on claimed locations accumulates. Surprisingly, our analysis also demonstrates that the performance limit of the LVS does not depend on the inherent properties of the channel between an adversary and the LVS. In the second half of this thesis, robust transmission strategies utilizing verified location information are developed, leading to the following additional contributions. Fourth, an optimal location-based beamforming scheme that solely requires the locations of the intended receiver and the potential eavesdropper is proposed and analyzed under a Rician wiretap channel. Specifically, we provide the optimal location-based beamformer that minimizes the secrecy outage probability. Fifth, new antenna selection schemes which rely on verified locations are proposed. Our analysis reveals that the new antenna selection schemes enhance wireless physical layer security at the cost of only a minor increase in the feedback overhead. Sixth and finally, the optimization of wiretap code rates is investigated for a range of passive eavesdropping scenarios. Specifically, the optimal wiretap code rates for given locations of the eavesdropper are determined. en_US
dc.identifier.uri http://hdl.handle.net/1959.4/54294
dc.language English
dc.language.iso EN en_US
dc.publisher UNSW, Sydney en_US
dc.rights CC BY-NC-ND 3.0 en_US
dc.rights.uri https://creativecommons.org/licenses/by-nc-nd/3.0/au/ en_US
dc.subject.other Wireless Communications en_US
dc.subject.other Physical Layer Security en_US
dc.subject.other Location Verification en_US
dc.title Physical Layer Security: Wireless Location Verification and Secure Communications en_US
dc.type Thesis en_US
dcterms.accessRights open access
dcterms.rightsHolder Yan, Shihao
dspace.entity.type Publication en_US
unsw.accessRights.uri https://purl.org/coar/access_right/c_abf2
unsw.identifier.doi https://doi.org/10.26190/unsworks/18125
unsw.relation.faculty Engineering
unsw.relation.originalPublicationAffiliation Yan, Shihao, Electrical Engineering & Telecommunications, Faculty of Engineering, UNSW en_US
unsw.relation.originalPublicationAffiliation Malaney, Robert, Electrical Engineering & Telecommunications, Faculty of Engineering, UNSW en_US
unsw.relation.school School of Electrical Engineering and Telecommunications *
unsw.thesis.degreetype PhD Doctorate en_US
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
public version.pdf
Size:
1.98 MB
Format:
application/pdf
Description:
Resource type