• Login
    View Item 
    •   Mak UD Home
    • College of Engineering, Design, Art and Technology (CEDAT)
    • School of Engineering (SEng.)
    • School of Engineering (SEng.) Collections
    • View Item
    •   Mak UD Home
    • College of Engineering, Design, Art and Technology (CEDAT)
    • School of Engineering (SEng.)
    • School of Engineering (SEng.) Collections
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Physical Layer Security improvement of wireless sensor networks in the presence of an untrusted user

    Thumbnail
    View/Open
    Undergraduate dissertation (879.1Kb)
    Date
    2019
    Author
    Mutaawe, Richard
    Metadata
    Show full item record
    Abstract
    In this project, Physical Layer Security (PHY{Security) is increasingly being adopted to guarantee secure wireless communications because it takes advantage of the imperfections of wireless channels such as fading, noise and interference to secure communication between the Base station and legitimate nodesthe.A secure transmission in wireless sensor networks consisting of one multiple-antenna base station, multiple single antenna legitimate nodes, one single-antenna eavesdropper and one multiple-antenna cooperative jammer is investigated. In order to maximize the secrecy performance of the network, the Selection Combining scheme is exploited over the legitimate nodes. In the meantime, the transmit antenna selection is employed at the BS and cooperative jamming is adopted at the jammer node, aiming at reducing scheduling complexity at the BS and achieving satisfactory secrecy performance. Furthermore, depending on whether the jammer node has the channel state information of both the main and wiretap channels, it explores a zero-forcing beamforming (ZFB) scheme to confuse the eavesdropper while avoiding interference to the legitimate nodes. Subsequently, a novel hybrid secure transmission scheme is proposed, denoted as TAS-SC-ZFB, for WSNs. The exact closed-form expressions for the secrecy outage probability and the e ective secrecy throughput for this scheme are derived to characterize the secrecy performance. Using these closed-form expressions, the optimal power allocation factor between the BS and jammer is determined to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the e ective secrecy throughput for this scheme. Numerical results are provided to the validate the theoretical analysis and show the impact of key system parameters on the secrecy performance.
    URI
    http://hdl.handle.net/20.500.12281/6311
    Collections
    • School of Engineering (SEng.) Collections

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of Mak UDCommunities & CollectionsTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy TypeThis CollectionTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy Type

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV