Use this URL to cite or link to this record in EThOS: http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.709882
Title: Wireless security with beamforming technique
Author: Zhang, Yuanrui
Awarding Body: Queen's University Belfast
Current Institution: Queen's University Belfast
Date of Award: 2016
Availability of Full Text:
Full text unavailable from EThOS.
Please contact the current institution’s library for further details.
Abstract:
This thesis focuses on the wireless security in the physical layer with beamforming technique. As the wireless communications grow more important, a higher level of security is more demanding as well. New techniques have been proposed in complement to the existing encryption-based methods in the communications protocols. One of the emerging areas is the security enhancement in the physical layer, which exploits the intrinsic properties of the wireless medium. Beamforming, which has been proved to have many advantages, such as increasing data rates and reducing interference, can also be applied to enhance the wireless security. The antenna array is one of the most important factors that affect the secrecy performance of the exposure region based beamforming technique. The potential of using different array geometry and array configuration to improve security is explored. In this thesis, two common arrays, i.e., linear and circular arrays, are considered. Analytic expressions for general array geometry as well as for the linear and circular arrays are derived. In addition, numerical results are used to analyze the behaviors of the antenna array towards security. Based on the empirical results, numerical optimization algorithms are developed to exploit the array configuration to enhance the system security level. In complement to the theoretical analysis, experiments are carried out to study the performance of the beamformer with linear and circular arrays in practice. Especially, the impact of the mutual coupling on the security performance is investigated. To this end, numerical simulation results as well experimental results are used to study the behaviors of the linear and circular arrays towards security.
Supervisor: Not available Sponsor: Not available
Qualification Name: Thesis (Ph.D.) Qualification Level: Doctoral
EThOS ID: uk.bl.ethos.709882  DOI: Not available
Share: