Physical-Layer Security

NUMMER: 141212
KÜRZEL: phyLaySec
MODULBEAUFTRAGTE:R: Prof. Dr.-Ing. Aydin Sezgin
DOZENT:IN: PROF. DR.-ING. AYDIN SEZ­GIN
FAKULTÄT: Fakultät für Elektrotechnik und Informationstechnik
SPRACHE: Deutsch
SWS: 4
CREDITS: 5
WORKLOAD: 150 Stunden
ANGEBOTEN IM: unregelmäßig

PRÜFUNGEN

FORM: mündlich
ANMELDUNG:
DATUM: 0000-00-00
BEGINN: 00:00:00
DAUER: 30 Minuten
RAUM:

LERNFORM

Vorlesungen und Ubungen

LERNZIELE

The students understand the concepts of physical-layer measures to achieve secrecy.
Equipped with tools and methods acquired during the lectures, new setups can be investigated.

INHALT

The broadcast nature of wireless systems makes it more vulnerable to eavesdroppers
to extract data from the received signals. The conventional way to achieve confidentiality is
by using cryptographic encryption based on keys. The idea behind is that the eavesdropper
is assumed to have limited time or computational resources. While this approach has both
it advantages and disadvantages, the physical-layer approach can be regarded as a powerful
alternative or as an additional level of protection to achieve security in wireless networks. A
distinct feature of the physical-layer approach is that the eavesdropper is assumed to have
unlimited time and resources available. Furthermore, this approach guarantees both reliability
and security, which the other approach can not. In this lecture, we will cover the following
aspects and setups
• Part I: Review
[system-message] [system-message]system-message
WARNING/2 in , line 6
Bullet list ends without a blank line; unexpected unindent. backrefs:
• Entropy, Mutual Information, Differential Entropy
• Fading channels
• Capacity of Gaussian channels
• Medium Access (Centralized and Distributed)
• Coding on Dirty Paper
• Beamforming and zero-forcing
• Deterministic models
• Interference Alignment
• Part II: Basics
[system-message] [system-message]system-message
WARNING/2 in , line 16
Bullet list ends without a blank line; unexpected unindent. backrefs:
• Confidentiality and Encryption
• Basic Wyner Wiretap Channel
• Multiple-Antenna Wiretap Channel
• Part III: Advanced Topics
[system-message] [system-message]system-message
WARNING/2 in , line 21
Bullet list ends without a blank line; unexpected unindent. backrefs:
• Broadcast channel with side information
• Secret-Key Agreement: Half-Duplex vs. Full-Duplex
• Specific Multiuser Wiretap Channels
• Caching in D2D networks with secure delivery
• Retrospective Alignment and Jamming
• Network Coding, Source Coding
• Cross-Layer Design
[system-message] [system-message]system-message
WARNING/2 in , line 28
Block quote ends without a blank line; unexpected unindent. backrefs:
• Practical Projects
[system-message] [system-message]system-message
WARNING/2 in , line 29
Bullet list ends without a blank line; unexpected unindent. backrefs:
• Medium Access
• Antenna design and beamforming
• Jamming
• Software defined radio based implementations of physical-layer security methods

VORAUSSETZUNGEN CREDITS

None

EMPFOHLENE VORKENNTNISSE

System Theory
• Communications Engineering
• Stochastic Signals