Use this URL to cite or link to this record in EThOS:
Title: System-level analysis and design for reliability and security in wireless networks
Author: Tang, Jinchuan
ISNI:       0000 0004 7971 6748
Awarding Body: University of Oxford
Current Institution: University of Oxford
Date of Award: 2019
Availability of Full Text:
Access from EThOS:
Full text unavailable from EThOS. Please try the link below.
Access from Institution:
The performance of four wireless network scenarios, focusing on reliable device-to-device (D2D) communications and secure physical layer communications, is analyzed based on stochastic geometry in this thesis. The analyses and methodologies in this thesis constitute a comprehensive framework for system-level analysis and design of reliability and security in future wireless networks. Since reliability is the cornerstone of security in wireless communications, the first scenario focuses on enhancing the reliability of concurrent D2D transmissions in a Poisson clustered out-band D2D network. Two convex optimization schemes are proposed to maximize the joint coverage probability and minimize the power consumption for reliable concurrent transmissions. Meanwhile, the second scenario focuses on route selection for end-to-end reliability, which is jointly characterized by coverage, delay and trust criteria, in the multi-hop D2D based mission-critical communication systems. The proposed algorithm ensures that the candidate links meet the given requirements of the criteria while selecting the best path based on end-to-end coverage, timeliness or trust probabilities. Apart from the reliability issues discussed above, wireless communication networks including D2D networks are vulnerable to eavesdropping attacks. Thus, the third scenario moves on to study the meta distribution of the secrecy rate for a legitimate link in the presence of randomly located eavesdroppers (EDs) modeled by a Poisson point process. The meta distribution characterizes the fraction of the realizations of EDs that yield a target secrecy rate. Finally, the fourth scenario studies secure wireless communications in the presence of unmanned aerial vehicle (UAV) jamming and randomly located UAV EDs modeled by a uniform binomial point process. A fitting function on the line-of-sight probability is proposed so that a tractable expression is derived for the secure connection probability (SCP). The trends of the SCP on the transmit signal to jamming power ratio, UAV jammer location and UAV height are analyzed.
Supervisor: Coon, Justin P. Sponsor: Not available
Qualification Name: Thesis (Ph.D.) Qualification Level: Doctoral
EThOS ID:  DOI: Not available