ERA

Download the full-sized PDF of Efficiency and Security Analysis in Multi-User Wireless Communication Systems: Cooperation, Competition and Malicious BehaviorDownload the full-sized PDF

Analytics

Share

Permanent link (DOI): https://doi.org/10.7939/R3BT3C

Download

Export to: EndNote  |  Zotero  |  Mendeley

Communities

This file is in the following communities:

Graduate Studies and Research, Faculty of

Collections

This file is in the following collections:

Theses and Dissertations

Efficiency and Security Analysis in Multi-User Wireless Communication Systems: Cooperation, Competition and Malicious Behavior Open Access

Descriptions

Other title
Subject/Keyword
jamming
interference channel
game theory
resource allocation
two-way relay
efficiency and security
Type of item
Thesis
Degree grantor
University of Alberta
Author or creator
Gao,Jie
Supervisor and department
Jiang, Hai (Electrical and Computer Engineering)
Vorobyov, Sergiy A (Electrical and Computer Engineering)
Examining committee member and department
Elmallah, Ehab (Computing Science)
Niu, Di (Electrical and Computer Engineering)
Jiang, Hai (Electrical and Computer Engineering)
Vorobyov, Sergiy A (Electrical and Computer Engineering)
Mao, Shiwen (Electrical and Computer Engineering, Auburn University)
Department
Department of Electrical and Computer Engineering
Specialization
communications
Date accepted
2014-01-03T13:29:17Z
Graduation date
2014-06
Degree
Doctor of Philosophy
Degree level
Doctoral
Abstract
Efficiency and security are major concerns with increasingly higher importance in modern wireless communications. These two concerns are especially significant for multi-user wireless communications where different users share or compete for resources. Among different users, there are possibilities of cooperation, competition, and/or malicious behavior. Due to the possibility of cooperation among the users, the spectral and energy efficiency in multi-user wireless communications could be boosted. Due to the possibility of competition, the resource allocation in multi-user wireless systems may reach certain equilibrium. Due to the possibility of malicious behavior, the security and reliability of wireless communications can be undermined. In this thesis, a comprehensive analysis on the issues of efficiency and security in multi-user wireless communications is developed for three systems in four scenarios. The first multi-user system of multiple-input multiple-output two-way relaying has the feature of cooperation including a limited coordination scenario and a full coordination scenario. It is shown that high spectral efficiency can be achieved with efficient energy consumption in this system due to the cooperation among the users. Moreover, full coordination yields better results in both spectral and energy efficiency than limited coordination at the cost of higher overhead. The second multi-user system of legitimate transceiver(s) with a jammer features the existence of malicious behavior. To measure the jamming threat, the worst-case jamming is studied for different cases according to the jammer's knowledge of the legitimate communication. The optimal/sub-optimal jamming strategy in each case is analyzed and derived. The third multi-user system of two-user interference channel features the competition of the users. The situation is modeled using noncooperative games with continuous mixed strategies. The outcomes of the games are analyzed through the establishment of the conditions for the existence and uniqueness of mixed strategy Nash equilibrium.
Language
English
DOI
doi:10.7939/R3BT3C
Rights
Permission is hereby granted to the University of Alberta Libraries to reproduce single copies of this thesis and to lend or sell such copies for private, scholarly or scientific research purposes only. Where the thesis is converted to, or otherwise made available in digital form, the University of Alberta will advise potential users of the thesis of these terms. The author reserves all other publication and other rights in association with the copyright in the thesis and, except as herein before provided, neither the thesis nor any substantial portion thereof may be printed or otherwise reproduced in any material form whatsoever without the author's prior written permission.
Citation for previous publication
J. Gao, S. A. Vorobyov, H. Jiang, J. Zhang, and M. Haardt, “Sum-rate maximization with minimum power consumption for MIMO DF two-way relaying: Part I - Relay optimization,” IEEE Trans. Signal Process., vol. 61, no. 14, pp. 3563-3577, July, 2013.J. Gao, S. A. Vorobyov, H. Jiang, J. Zhang, and M. Haardt, “Sum-rate maximization with minimum power consumption for MIMO DF two-way relaying: Part II - Network optimization,” IEEE Trans. Signal Process., vol. 61, no. 14, pp. 3578-3591, July, 2013.J. Gao, J. Zhang, S. A. Vorobyov, H. Jiang, and M. Haardt, “Power allocation/beamforming for DF MIMO two-way relaying: relay and network optimization,” in Proc. IEEE Global Commun. Conf. 2012, pp. 5657 - 5662, Anaheim, December, 2012.J. Gao, S. A. Vorobyov, and H. Jiang, “Mixed Strategy Nash Equilibrium in Two-User Resource Allocation Games,” in Proc. IEEE Int. Symp. Info. Theory 2011, pp. 2632-2636, St. Petersburg, Aug. 2011.

File Details

Date Uploaded
Date Modified
2014-06-15T07:08:46.023+00:00
Audit Status
Audits have not yet been run on this file.
Characterization
File format: pdf (Portable Document Format)
Mime type: application/pdf
File size: 1223291
Last modified: 2015:10:12 13:11:33-06:00
Filename: Gao_Jie_Spring 2014.pdf
Original checksum: 5ee350d616417ad28108d827739e0946
Well formed: false
Valid: false
Status message: Invalid page tree node offset=364169
Status message: Unexpected error in findFonts java.lang.ClassCastException: edu.harvard.hul.ois.jhove.module.pdf.PdfSimpleObject cannot be cast to edu.harvard.hul.ois.jhove.module.pdf.PdfDictionary offset=4950
Status message: Outlines contain recursive references.
File title: title_Jie
Page count: 67
Activity of users you follow
User Activity Date