NUMMER: | 141212 |
KÜRZEL: | phyLaySec |
MODULBEAUFTRAGTE:R: | PROF. DR.-ING. AYDIN SEZGIN |
DOZENT:IN: | Prof. Dr.-Ing. Aydin Sezgin |
FAKULTÄT: | Fakultät für Elektrotechnik und Informationstechnik |
SPRACHE: | Deutsch |
SWS: | 4 |
CREDITS: | 5 |
ANGEBOTEN IM: | unregelmäßig |
PRÜFUNGEN
FORM: | mündlich |
TERMIN: | Siehe Prüfungsamt. |
LERNFORM
Vorlesungen und Ubungen
LERNZIELE
The students understand the concepts of physical-layer measures to achieve secrecy.Equipped with tools and methods acquired during the lectures, new setups can be investigated.
INHALT
The broadcast nature of wireless systems makes it more vulnerable to eavesdroppersto extract data from the received signals. The conventional way to achieve confidentiality is
by using cryptographic encryption based on keys. The idea behind is that the eavesdropper
is assumed to have limited time or computational resources. While this approach has both
it advantages and disadvantages, the physical-layer approach can be regarded as a powerful
alternative or as an additional level of protection to achieve security in wireless networks. A
distinct feature of the physical-layer approach is that the eavesdropper is assumed to have
unlimited time and resources available. Furthermore, this approach guarantees both reliability
and security, which the other approach can not. In this lecture, we will cover the following
aspects and setups
• Part I: Review
[system-message] [system-message]system-message
WARNING/2 in
Bullet list ends without a blank line; unexpected unindent. backrefs:
• Entropy, Mutual Information, Differential Entropy
• Fading channels
• Capacity of Gaussian channels
• Medium Access (Centralized and Distributed)
• Coding on Dirty Paper
• Beamforming and zero-forcing
• Deterministic models
• Interference Alignment
• Part II: Basics
[system-message] [system-message]system-message
WARNING/2 in
Bullet list ends without a blank line; unexpected unindent. backrefs:
• Confidentiality and Encryption
• Basic Wyner Wiretap Channel
• Multiple-Antenna Wiretap Channel
• Part III: Advanced Topics
[system-message] [system-message]system-message
WARNING/2 in
Bullet list ends without a blank line; unexpected unindent. backrefs:
• Broadcast channel with side information
• Secret-Key Agreement: Half-Duplex vs. Full-Duplex
• Specific Multiuser Wiretap Channels
• Caching in D2D networks with secure delivery
• Retrospective Alignment and Jamming
• Network Coding, Source Coding
• Cross-Layer Design
[system-message] [system-message]system-message
WARNING/2 in
Block quote ends without a blank line; unexpected unindent. backrefs:
• Practical Projects
[system-message] [system-message]system-message
WARNING/2 in
Bullet list ends without a blank line; unexpected unindent. backrefs:
• Medium Access
• Antenna design and beamforming
• Jamming
• Software defined radio based implementations of physical-layer security methods
VORAUSSETZUNGEN CREDITS
None
EMPFOHLENE VORKENNTNISSE
System Theory• Communications Engineering
• Stochastic Signals