Title Page
Abstract
Contents
Chapter 1. Introduction 11
Chapter 2. Efficient Power Allocation for Physical-Layer Security with Adaptive Transmission in Multi-Carrier and Multi-Node DF Relay Networks 15
2.1. Motivation 15
2.2. System Model 20
2.2.1. Network Topology 20
2.2.2. Adaptive Cooperative Transmission 21
2.2.3. Secrecy Rate 24
2.3. Optimal Power Distribution 25
2.4. Optimal Power Allocation 30
2.4.1. Sub-optimal power allocation 34
2.4.2. Proposed power allocation 39
2.5. Numerical Results 47
2.6. Summary 54
Chapter 3. Proactive Eavesdropping with Adaptive Full-duplex Jamming-Helping Method for Infrastructure-free Relay Networks 55
3.1. Motivation 55
3.2. System Model 59
3.2.1. Network Topology 59
3.2.2. Time-sharing Protocol 61
3.2.3. Achievable Rate 62
3.3. Optimal Power Design 64
3.3.1. Maximizing Eavesdropping Rate 64
3.3.2. Minimizing Total Power Consumption 76
3.4. Numerical Results 78
3.5. Summary 93
Chapter 4. Proactive Eavesdropping using Half-Duplex Dual Monitor 95
4.1. Motivation 95
4.2. System Model 97
4.2.1. Network Topology 97
4.2.2. Transmission Protocol 98
4.2.3. Achievable Rate 100
4.3. Optimal Transmission Scheme 101
4.4. Numerical Results 103
4.5. Summary 106
Bibliography 107
초록 113
Table 2.1. Cooperative Transmission Process 21
Table 2.2. The Concavity of the Achievable Secrecy Rate Function on the nth Subcarrier for the ith Sub-problem, n=1,···,N ; i=1,···,MN[이미지참조] 37
Table 2.3. The Concavity of the Maximum Achievable Secrecy Rate Function on thenth Sub-carrier, n=1,···,N 43
Table 3.1. The five cases of channel conditions 65
Table 3.2. The five sub-cases of channel conditions for Case 5 72
Table 4.1. Channel conditions classification 101
Table 4.2. Case classification 102
Table 4.3. Optimal transmission scheme 102
Figure 2.1. Description of the two-hop DF relay network topology 20
Figure 2.2. Illustration of non-convex shape of R⋆(n).[이미지참조] 31
Figure 2.3. Non-convex shape of Rni⋆(n) when (a) αni⋆(n)> βni⋆(n), (b) αni⋆(n) ≤ βni⋆(n).[이미지참조] 33
Figure 2.4. Illustration of the network topology in simulations. 48
Figure 2.5. The sum secrecy rate when the center of intermediate region moves from (dDx/4, 0) to (3dDx/4, 0) with dDx=1, dEy=0.5, p'tot=0dB.[이미지참조] 50
Figure 2.6. The sum secrecy rate when the center of intermediate region moves from (dDx/2, 0) to (dDx/2, dEy/2) with dDx=1, dEy=0.5, P'tot=0dB.[이미지참조] 51
Figure 2.7. The sum secrecy rate versus the total system SNR where the center of the intermediate region is (dDx/2, 0), dDx=1, dEy=0.5.[이미지참조] 52
Figure 2.8. The sum secrecy rate ersus the number of intermediate nodes inside the intermediate region where the center of the intermediate region is (dDx/2, 0), dDx=1,...[이미지참조] 53
Figure 3.1. Description of the two-hop DF relay network topology 59
Figure 3.2. Graphical description of the time-sharing protocol 60
Figure 3.3. Description of the shape of C=CDJ(q) and the area according to the feasible set in the Ψth sub-case of Case 5, i.e. Case 5Ψ.[이미지참조] 71
Figure 3.4. Description of how Qₘₐₓ affects formation of the feasible set. 72
Figure 3.5. The network topology for the first simulation scenario. 80
Figure 3.6. Outage probabilities for the three sub-cases where the relay node is positioned at (a), (b), and (c) in the first simulation scenario. 81
Figure 3.7. Average eavesdropping rates for the three sub-cases where the relay node is positioned at (a), (b), and (c) in the first simulation scenario. 82
Figure 3.8. The average eavesdropping rate of the cases when the conventional method experiences no outage. 84
Figure 3.9. The network topology for (a) the second simulation scenario and (b) the third simulation scenario. 85
Figure 3.10. Outage probabilities for the three sub-cases where the relay node is positioned at (a), (b), and (c) in the second simulation scenario. 86
Figure 3.11. Average eavesdropping rates for the three sub-cases where the relay node is positioned at (a), (b), and (c) in the second simulation scenario. 87
Figure 3.12. Outage probabilities for the three sub-cases where the relay node is positioned at (a), (b), and (c) in the third simulation scenario. 89
Figure 3.13. Average eavesdropping rates for the three sub-cases where the relay node is positioned at (a), (b), and (c) in the third simulation scenario. 90
Figure 3.14. Average eavesdropping rates for the three sub-cases where the relay node is positioned at (a), (b), and (c) in the third simulation scenario. 92
Figure 3.15. Average eavesdropping rates for the three sub-cases where the relay node is positioned at (a), (b), and (c) in the third simulation scenario. 93
Figure 4.1. Description of the two-hop DF relay network topology 97
Figure 4.2. Graphical illustration of the transmission protocol in the two options; (a) the 1st option and (b) the 2nd option. 99
Figure 4.3. Graphical illustration of the network topology in the simulation. 103
Figure 4.4. Outage probability versus the maximum available jamming power. 105
Figure 4.5. Eavesdropping rate versus the maximum available jamming power. 105