• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 18
  • 18
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Design and analysis of green mobile communication networks

Aldosari, Mansour January 2016 (has links)
Increasing energy consumption is a result of the rapid growth in cellular communication technologies and a massive increase in the number of mobile terminals (MTs) and communication sites. In cellular communication networks, energy efficiency (EE) and spectral efficiency (SE) are two of the most important criteria employed to evaluate the performance of networks. A compromise between these two conflicting criteria is therefore required, in order to achieve the best cellular network performance. Fractional frequency reuse (FFR), classed as either strict FFR or soft frequency reuse (SFR), is an intercell interference coordination (ICIC) technique applied to manage interference when more spectrum is used, and to enhance the EE. A conventional cellular model's downlink is designed as a reference in the presence of inter-cell interference (ICI) and a general fading environment. Energy-efficient cellular models,such as cell zooming, cooperative BSs and relaying models are designed, analysed and compared with the reference model, in order to reduce network energy consumption without degrading the SE. New mathematical models are derived herein to design a distributed antenna system (DAS), in order to enhance the system's EE and SE. DAS is designed in the presence of ICI and composite fading and shadowing with FFR. A coordinate multi-point (CoMP) technique is applied, using maximum ratio transmission (MRT) to serve the mobile terminal (MT), with all distributed antenna elements (DAEs), transmit antenna selection (TAS) being applied to select the best DAE and general selection combining (GSC) being applied to select more than one DAE. Furthermore, a Cloud radio access network (C-RAN) is designed and analysed with two different schemes, using the high-power node (HPN) and a remote radio head (RRH), in order to improve the EE and SE of the system. Finally, a trade-off between the two conflicting criteria, EE and SE, is handled carefully in this thesis, in order to ensure a green cellular communication network.
12

PERFORMANCE ANALYSIS OF ADAPTIVE ARRAY SYSTEM AND SPACE-TIME BLOCK CODING IN MOBILE WIMAX (802.16e) SYSTEMS

Kim, Ngan Trieu, Ajiboye, Olumide January 2008 (has links)
We live in an information hungry age, we generate and process information at a rate never before recorded in the history of mankind. Today’s computing platforms are run on Gigahertz multi-core processors churning out Gigabits streams of data that need to be transmitted as quickly as possible. Often times the source and the destination are mobile which means wired connections are not a choice. This has led to an ever increasing need to develop wireless access technologies that support high throughput regardless of the transmission environment. Till date, many proprietary solutions exist that seek to bridge this gap with little or no support for interoperability. For the sheer scale of development that is required, a standard based solution is the key. The IEEE 802.1x committee oversees the development of standards for wireless systems, it formed the 802.16 working group to develop a standards-based Wireless Metropolitan Area Network (MAN) solution. One of the fruits of this effort is the 802.16e standard fondly referred to as mobile WiMAX and it is the subject of study in this thesis. This thesis seeks to analyze the transmission characteristics of two of the antenna systems defined in the standard i.e. Adaptive Beamforming Systems and Multiple-Input Multiple-Output Systems. Multiple-Input Multiple-Output (MIMO): utilizes multiple antennas at the transmitter and receiver to provide diversity gain, multiplexing gain or both. Adaptive Antenna Systems (AAS): Adaptive array system uses an antenna array to generate in real-time radiation patterns with the main lobes and/or nulls dynamically tuned to specific directions in order to increase or suppress signal power in that direction. / Worldwide Interoperability for Microwave Access (WiMAX) is the acronym for Institute of Electrical and Electronics Engineers (IEEE) 802.16 set of standards governing Air Interface for Fixed Broadband Wireless Access Systems. In the history of wireless systems, WiMAX is revolutionary technology as affords its users the Wi-Fi grade throughput and cellular system level of mobility. With WiMAX, broadband technology (traditionally ADSL and Fiber) goes wireless and WiMAX users can basically enjoy triple-play application, and split-second download and upload rates. WIMAX also offers full mobility much as traditional cellular systems do with features like seamless hand-over and roaming at vehicular speed; this is made possible because the system design covers the access network to core network. For the operator, WiMAX is a welcome development because it merges traditional cellular networks with broadband technology thus opening them to more business offerings and a larger client base and all this at a reduced cost of deployment. Base stations are comparatively cheaper and do not require extensive planning typical of other cellular systems thus WiMAX is aptly suited for emerging markets where infrastructure cost is a major issue; little wonder a lot of 3rd world countries have signified interest in the technology.
13

Modeling of a Retrodirective Channel With Active Antenna Arrays for Cross-Eye Jamming

Petersson, Björn January 2017 (has links)
Cross-Eye (CE) jamming is a technique aimed at inducing false target angles in radar measurements. The potential to deceive monopulse radar, a radar type commonly used due to its angular accuracy and resilience against jamming, has captured the interest of Electronic Warfare (EW) system manufacturers. CE jamming may increase the capability of self-defense against radar guided missiles. In this thesis, a CE jammer, based on the retrodirective channel design, for use in an EW systems is modeled and analyzed. The focus of the analysis is on the non-reciprocal Active Electronically Scanned Arrays (AESA). An electrical model of the jammer system and the AESA, including variations in the electrical properties, together with three different system correction methods are used. A simulation procedure, using single frequency (CW) signals, is defined and used for estimating total level of reciprocity, which is a primary contributor to jammer performance. Reciprocity error sensitivity for variations in model parameters is simulated to indicate which AESA aspects are essential for performance. Further, the influence of characterization and calibration noise is investigated. The usability of the model is demonstrated in different types of simulations, which highlights the differences between the system correction methods. Simulations show that a relatively high level of reciprocity can be achieved when using system correction, if measurement noise and model limitations are disregarded. The expected degradation in reciprocity from differences in electrical properties between the reception and transmission branch of the AESA has been confirmed. The effect of characterization and calibration noise, for realistic levels of noise, seems to be a dominating factor in the total reciprocity error. A significant increase in reciprocity error can likely be expected when non-CW signals are used and when realistic levels of noise and non-linear effects are added. / Cross-eye (CE) är en störprincip som har potential att inducera vinkelmätfel i radar. Dess möjlighet att störa monopulsradar, en vanligt förekommande typ av radar som är motståndskraftig mot många störformer, har skapat ett intresse för metoden hos tillverkare av system för elektronisk krigföring (EW-system). Användning av CE störning i ett EW-system skulle kunna öka möjligheten till självskydd vid attack från en monopulsradarstyrd robot. Avhandlingen analyserar en modell av en retrodirektiv CE störare som är avsedd för integration i ett multifunktionellt EW-system. Fokus i analysen är på de aktiva gruppantennerna (AESA) som används i systemet. En elektrisk modell av systemet används, vilken inkluderar variationer i parametrar hos AESA samt tre olika systemkorrektionsmetoder. En simuleringsprocedur som ger möjlighet att uppskatta reciprocitetsfel och känslighet för parametervariationer i AESA är definierad. Vidare undersöks inverkan av karaktäriserings och kalibreringsbrus. Modellens användningsområden visas i olika typer av prestandasimulering där effekter av de olika systemkorrektionsmetoderna tydliggörs. Simuleringsresultat för enkelfrekvens (CW) signaler visar en relativt hög nivå av reciprocitet om brus och olinjäriteter ignoreras. Det förväntade resultatet, att elektriska skillnader mellan mottagar- och sändargrenarna orsakar en försämring i reciprocitet, bekräftas. Inverkan av karaktäriserings och kalibreringsbrus verkar vara en dominerande faktor i det totala reciprocitetsfelet då rimliga brusnivåer används. En signifikant höjning av reciprocitetsfelet kan sannolikt förväntas då signaler med en viss bandbredd används och då rimliga nivåer av brus samt olinjäriteter inkluderas. / <p>QC 20171102</p>
14

Anténní systém pro bezdrátové mikrofony / Antenna system for wireless microphones

Bartoš, Adam January 2018 (has links)
Master's thesis deals with the design of an antenna system for wireless sound transmission used mainly in professional sound reinforcement. The introductory part deals generally with wireless microphones, frequency bands used and proven antenna types. Next, this work deals with signal distribution that is realized using the antenna splitter. The antenna parts is focused on easy production and real usage, therefore were selected antennas with appropriate properties suitable for small series production. This thesis includes simulation of each device, their real construction design and measurements of built prototypes and final products. All three produced devices – the rack splitter, /4 antenna and Helix antenna are fully working, achieve good parameters and are ready for further manufacturing and easy modifications in case of frequency band change requirement. The conclusion includes an overall assessment of the results achieved.
15

Data-driven Interpolation Methods Applied to Antenna System Responses : Implementation of and Benchmarking / Datadrivna interpolationsmetoder applicerade på systemsvar från antenner : Implementering av och prestandajämförelse

Åkerstedt, Lucas January 2023 (has links)
With the advances in the telecommunications industry, there is a need to solve the in-band full-duplex (IBFD) problem for antenna systems. One premise for solving the IBFD problem is to have strong isolation between transmitter and receiver antennas in an antenna system. To increase isolation, antenna engineers are dependent on simulation software to calculate the isolation between the antennas, i.e., the mutual coupling. Full-wave simulations that accurately calculate the mutual coupling between antennas are timeconsuming, and there is a need to reduce the required time. In this thesis, we investigate how implemented data-driven interpolation methods can be used to reduce the simulation times when applied to frequency domain solvers. Here, we benchmark the four different interpolation methods vector fitting, the Loewner framework, Cauchy interpolation, and a modified version of Nevanlinna-Pick interpolation. These four interpolation methods are benchmarked on seven different antenna frequency responses, to investigate their performance in terms of how many interpolation points they require to reach a certain root mean squared error (RMSE) tolerance. We also benchmark different frequency sampling algorithms together with the interpolation methods. Here, we have predetermined frequency sampling algorithms such as linear frequency sampling distribution, and Chebyshevbased frequency sampling distributions. We also benchmark two kinds of adaptive frequency sampling algorithms. The first type is compatible with all of the four interpolation methods, and it selects the next frequency sample by analyzing the dynamics of the previously generated interpolant. The second adaptive frequency sampling algorithm is solely for the modified NevanlinnaPick interpolation method, and it is based on the free parameter in NevanlinnaPick interpolation. From the benchmark results, two interpolation methods successfully decrease the RMSE as a function of the number of interpolation points used, namely, vector fitting and the Loewner framework. Here, the Loewner framework performs slightly better than vector fitting. The benchmark results also show that vector fitting is less dependent on which frequency sampling algorithm is used, while the Loewner framework is more dependent on the frequency sampling algorithm. For the Loewner framework, Chebyshev-based frequency sampling distributions proved to yield the best performance. / Med de snabba utvecklingarna i telekomindustrin så har det uppstått ett behov av att lösa det så kallad i-band full-duplex (IBFD) problemet. En premiss för att lösa IBFD-problemet är att framgångsrikt isolera transmissionsantennen från mottagarantennen inom ett antennsystem. För att öka isolationen mellan antennerna måste antenningenjörer använda sig av simulationsmjukvara för att beräkna isoleringen (den ömsesidiga kopplingen mellan antennerna). Full-wave-simuleringar som noggrant beräknar den ömsesidga kopplingen är tidskrävande. Det finns därför ett behov av att minska simulationstiderna. I denna avhandling kommer vi att undersöka hur våra implementerade och datadrivna interpoleringsmetoder kan vara till hjälp för att minska de tidskrävande simuleringstiderna, när de används på frekvensdomänslösare. Här prestandajämför vi de fyra interpoleringsmetoderna vector fitting, Loewner ramverket, Cauchy interpolering, och modifierad Nevanlinna-Pick interpolering. Dessa fyra interpoleringsmetoder är prestandajämförda på sju olika antennsystemsvar, med avseende på hur många interpoleringspunkter de behöver för att nå en viss root mean squared error (RMSE)-tolerans. Vi prestandajämför också olika frekvenssamplingsalgoritmer tillsammas med interpoleringsmetoderna. Här använder vi oss av förbestämda frekvenssamplingsdistributioner så som linjär samplingsdistribution och Chebyshevbaserade samplingsdistributioner. Vi använder oss också av två olika sorters adaptiv frekvenssamplingsalgoritmer. Den första sortens adaptiv frekvenssamplingsalgoritm är kompatibel med alla de fyra interpoleringsmetoderna, och den väljer nästa frekvenspunkt genom att analysera den föregående interpolantens dynamik. Den andra adaptiva frekvenssamplingsalgoritmen är enbart till den modifierade Nevanlinna-Pick interpoleringsalgoritmen, och den baserar sitt val av nästa frekvenspunkt genom att använda sig av den fria parametern i Nevanlinna-Pick interpolering. Från resultaten av prestandajämförelsen ser vi att två interpoleringsmetoder framgångsrikt lyckas minska medelvärdetsfelet som en funktion av antalet interpoleringspunkter som används. Dessa två metoder är vector fitting och Loewner ramverket. Här så presterar Loewner ramverket aningen bättre än vad vector fitting gör. Prestandajämförelsen visar också att vector fitting inte är lika beroende av vilken frekvenssamplingsalgoritm som används, medan Loewner ramverket är mer beroende på vilken frekvenssamplingsalgoritm som används. För Loewner ramverket så visade det sig att Chebyshev-baserade frekvenssamplingsalgoritmer presterade bättre.
16

Modellering och simulering av Multiantennsystem avsett för litet fartyg

Annerstål, Viktor, Ottosson, Peter January 2016 (has links)
Within the military there is great need for reliable communication between vehicles. During the planning and construction of a military RIB, Rigid-hulled Inflatable Boat, it is important to design an efficient antenna system that does not deteriorate out of disorder. It must also be ensured that the antennas transmitted power does not stay in the RIB boat. We have been given assignment to model and simulate a proposed antenna system and assess which tool is best suitable for the task. To analyze the antenna system we will look at the radiated electrical field together with the reflectionand EMC properties. The tool that we choose to use is a software called EMPro produced by Keysight Technologies. In this program we will create 3Dstructures for each individual object, the boat, the three antennas and the seawater. It’s also important to include each objects properties concerning material, so that they correctly reflect the reality. We are covering a broad spectrum with our antennas reaching from 1.6-30MHz, 30-88MHz and 100512MHz. The resulting simulation verifies that electromagnetic field would be powerful enough and that the antennas would not affect each other with the proposed placement. We could also confirm that our antennas reflected an inordinate amount of power but with cause that our models were not an exact replica of the antenna. The software EMPro is a suitable tool for this kind of projects concerning modeling and simulating antenna systems.Within the military there is great need for reliable communication between vehicles. During the planning and construction of a military RIB, Rigid-hulled Inflatable Boat, it is important to design an efficient antenna system that does not deteriorate out of disorder. It must also be ensured that the antennas transmitted power does not stay in the RIB boat. We have been given assignment to model and simulate a proposed antenna system and assess which tool is best suitable for the task. To analyze the antenna system we will look at the radiated electrical field together with the reflectionand EMC properties. The tool that we choose to use is a software called EMPro produced by Keysight Technologies. In this program we will create 3Dstructures for each individual object, the boat, the three antennas and the seawater. It’s also important to include each objects properties concerning material, so that they correctly reflect the reality. We are covering a broad spectrum with our antennas reaching from 1.6-30MHz, 30-88MHz and 100512MHz. The resulting simulation verifies that electromagnetic field would be powerful enough and that the antennas would not affect each other with the proposed placement. We could also confirm that our antennas reflected an inordinate amount of power but with cause that our models were not an exact replica of the antenna. The software EMPro is a suitable tool for this kind of projects concerning modeling and simulating antenna systems. / Inom militären finns stort behov av pålitlig kommunikation mellan fordon. Vid konstruktion av ett småfartyg i militärtoch bevakningssyfte är det viktigt att designa ett välfungerande antennsystem som inte försämras utav störningar, det ska även ses till att antennernas utsända effekt inte fastnar i småfartyget. Vi har fått en ritning av hur antennplaceringen är planerad, denna rapport går ut på att verifiera dess funktionalitet samt hitta en mjukvara som kan användas för att verifiera olika antennsystem. För att bedöma antennsystemet kommer denna rapport att undersöka att dess elektriska fält samt reflektionsoch EMC egenskaper, en uppgift som kan lösas med programvaran EMPro (Keysight). I programvaran skapas en 3Dstruktur som innehåller småfartyget, dess 3 stycken antenner samt omfattande havsvatten. Här tas hänsyn till objektens materialegenskaper, antennernas jordning samt de frekvenser antennerna arbetar på, 1.6-30MHz, 30-88MHz samt 100-512MHz. Simulering av systemet gav positiva resultat kring antennsystemets elektromagnetiskafält, antennerna kommer inte heller att störa varandra. Antennerna som vi har modellerat reflekterar orimligt mycket effekt, detta bortser vi från då vi inte haft tillgång till exakt avbildning av antennerna. EMPro är ett verktyg som är lämpligt att använda i detta samt liknande projekt. Dock krävs det att en kraftig dator finns tillgänglig då simuleringar av stora antennsystem baseras på stora uträkningar, som generellt tar lång tid.
17

Robust Optimization of Private Communication in Multi-Antenna Systems / Robuste Optimierung abhörsicherer Kommunikation in Mehrantennensystemen

Wolf, Anne 06 September 2016 (has links) (PDF)
The thesis focuses on the privacy of communication that can be ensured by means of the physical layer, i.e., by appropriately chosen coding and resource allocation schemes. The fundamentals of physical-layer security have been already formulated in the 1970s by Wyner (1975), Csiszár and Körner (1978). But only nowadays we have the technical progress such that these ideas can find their way in current and future communication systems, which has driven the growing interest in this area of research in the last years. We analyze two physical-layer approaches that can ensure the secret transmission of private information in wireless systems in presence of an eavesdropper. One is the direct transmission of the information to the intended receiver, where the transmitter has to simultaneously ensure the reliability and the secrecy of the information. The other is a two-phase approach, where two legitimated users first agree on a common and secret key, which they use afterwards to encrypt the information before it is transmitted. In this case, the secrecy and the reliability of the transmission are managed separately in the two phases. The secrecy of the transmitted messages mainly depends on reliable information or reasonable and justifiable assumptions about the channel to the potential eavesdropper. Perfect state information about the channel to a passive eavesdropper is not a rational assumption. Thus, we introduce a deterministic model for the uncertainty about this channel, which yields a set of possible eavesdropper channels. We consider the optimization of worst-case rates in systems with multi-antenna Gaussian channels for both approaches. We study which transmit strategy can yield a maximum rate if we assume that the eavesdropper can always observe the corresponding worst-case channel that reduces the achievable rate for the secret transmission to a minimum. For both approaches, we show that the resulting max-min problem over the matrices that describe the multi-antenna system can be reduced to an equivalent problem over the eigenvalues of these matrices. We characterize the optimal resource allocation under a sum power constraint over all antennas and derive waterfilling solutions for the corresponding worst-case channel to the eavesdropper for a constraint on the sum of all channel gains. We show that all rates converge to finite limits for high signal-to-noise ratios (SNR), if we do not restrict the number of antennas for the eavesdropper. These limits are characterized by the quotients of the eigenvalues resulting from the Gramian matrices of both channels. For the low-SNR regime, we observe a rate increase that depends only on the differences of these eigenvalues for the direct-transmission approach. For the key generation approach, there exists no dependence from the eavesdropper channel in this regime. The comparison of both approaches shows that the superiority of an approach over the other mainly depends on the SNR and the quality of the eavesdropper channel. The direct-transmission approach is advantageous for low SNR and comparably bad eavesdropper channels, whereas the key generation approach benefits more from high SNR and comparably good eavesdropper channels. All results are discussed in combination with numerous illustrations. / Der Fokus dieser Arbeit liegt auf der Abhörsicherheit der Datenübertragung, die auf der Übertragungsschicht, also durch geeignete Codierung und Ressourcenverteilung, erreicht werden kann. Die Grundlagen der Sicherheit auf der Übertragungsschicht wurden bereits in den 1970er Jahren von Wyner (1975), Csiszár und Körner (1978) formuliert. Jedoch ermöglicht erst der heutige technische Fortschritt, dass diese Ideen in zukünftigen Kommunikationssystemen Einzug finden können. Dies hat in den letzten Jahren zu einem gestiegenen Interesse an diesem Forschungsgebiet geführt. In der Arbeit werden zwei Ansätze zur abhörsicheren Datenübertragung in Funksystemen analysiert. Dies ist zum einen die direkte Übertragung der Information zum gewünschten Empfänger, wobei der Sender gleichzeitig die Zuverlässigkeit und die Abhörsicherheit der Übertragung sicherstellen muss. Zum anderen wird ein zweistufiger Ansatz betrachtet: Die beiden Kommunikationspartner handeln zunächst einen gemeinsamen sicheren Schlüssel aus, der anschließend zur Verschlüsselung der Datenübertragung verwendet wird. Bei diesem Ansatz werden die Abhörsicherheit und die Zuverlässigkeit der Information getrennt voneinander realisiert. Die Sicherheit der Nachrichten hängt maßgeblich davon ab, inwieweit zuverlässige Informationen oder verlässliche Annahmen über den Funkkanal zum Abhörer verfügbar sind. Die Annahme perfekter Kanalkenntnis ist für einen passiven Abhörer jedoch kaum zu rechtfertigen. Daher wird hier ein deterministisches Modell für die Unsicherheit über den Kanal zum Abhörer eingeführt, was zu einer Menge möglicher Abhörkanäle führt. Die Optimierung der sogenannten Worst-Case-Rate in einem Mehrantennensystem mit Gaußschem Rauschen wird für beide Ansätze betrachtet. Es wird analysiert, mit welcher Sendestrategie die maximale Rate erreicht werden kann, wenn gleichzeitig angenommen wird, dass der Abhörer den zugehörigen Worst-Case-Kanal besitzt, welcher die Rate der abhörsicheren Kommunikation jeweils auf ein Minimum reduziert. Für beide Ansätze wird gezeigt, dass aus dem resultierenden Max-Min-Problem über die Matrizen des Mehrantennensystems ein äquivalentes Problem über die Eigenwerte der Matrizen abgeleitet werden kann. Die optimale Ressourcenverteilung für eine Summenleistungsbeschränkung über alle Sendeantennen wird charakterisiert. Für den jeweiligen Worst-Case-Kanal zum Abhörer, dessen Kanalgewinne einer Summenbeschränkung unterliegen, werden Waterfilling-Lösungen hergeleitet. Es wird gezeigt, dass für hohen Signal-Rausch-Abstand (engl. signal-to-noise ratio, SNR) alle Raten gegen endliche Grenzwerte konvergieren, wenn die Antennenzahl des Abhörers nicht beschränkt ist. Die Grenzwerte werden durch die Quotienten der Eigenwerte der Gram-Matrizen beider Kanäle bestimmt. Für den Ratenanstieg der direkten Übertragung ist bei niedrigem SNR nur die Differenz dieser Eigenwerte maßgeblich, wohingegen für den Verschlüsselungsansatz in dem Fall keine Abhängigkeit vom Kanal des Abhörers besteht. Ein Vergleich zeigt, dass das aktuelle SNR und die Qualität des Abhörkanals den einen oder anderen Ansatz begünstigen. Die direkte Übertragung ist bei niedrigem SNR und verhältnismäßig schlechten Abhörkanälen überlegen, wohingegen der Verschlüsselungsansatz von hohem SNR und vergleichsweise guten Abhörkanälen profitiert. Die Ergebnisse der Arbeit werden umfassend diskutiert und illustriert.
18

Robust Optimization of Private Communication in Multi-Antenna Systems

Wolf, Anne 02 June 2015 (has links)
The thesis focuses on the privacy of communication that can be ensured by means of the physical layer, i.e., by appropriately chosen coding and resource allocation schemes. The fundamentals of physical-layer security have been already formulated in the 1970s by Wyner (1975), Csiszár and Körner (1978). But only nowadays we have the technical progress such that these ideas can find their way in current and future communication systems, which has driven the growing interest in this area of research in the last years. We analyze two physical-layer approaches that can ensure the secret transmission of private information in wireless systems in presence of an eavesdropper. One is the direct transmission of the information to the intended receiver, where the transmitter has to simultaneously ensure the reliability and the secrecy of the information. The other is a two-phase approach, where two legitimated users first agree on a common and secret key, which they use afterwards to encrypt the information before it is transmitted. In this case, the secrecy and the reliability of the transmission are managed separately in the two phases. The secrecy of the transmitted messages mainly depends on reliable information or reasonable and justifiable assumptions about the channel to the potential eavesdropper. Perfect state information about the channel to a passive eavesdropper is not a rational assumption. Thus, we introduce a deterministic model for the uncertainty about this channel, which yields a set of possible eavesdropper channels. We consider the optimization of worst-case rates in systems with multi-antenna Gaussian channels for both approaches. We study which transmit strategy can yield a maximum rate if we assume that the eavesdropper can always observe the corresponding worst-case channel that reduces the achievable rate for the secret transmission to a minimum. For both approaches, we show that the resulting max-min problem over the matrices that describe the multi-antenna system can be reduced to an equivalent problem over the eigenvalues of these matrices. We characterize the optimal resource allocation under a sum power constraint over all antennas and derive waterfilling solutions for the corresponding worst-case channel to the eavesdropper for a constraint on the sum of all channel gains. We show that all rates converge to finite limits for high signal-to-noise ratios (SNR), if we do not restrict the number of antennas for the eavesdropper. These limits are characterized by the quotients of the eigenvalues resulting from the Gramian matrices of both channels. For the low-SNR regime, we observe a rate increase that depends only on the differences of these eigenvalues for the direct-transmission approach. For the key generation approach, there exists no dependence from the eavesdropper channel in this regime. The comparison of both approaches shows that the superiority of an approach over the other mainly depends on the SNR and the quality of the eavesdropper channel. The direct-transmission approach is advantageous for low SNR and comparably bad eavesdropper channels, whereas the key generation approach benefits more from high SNR and comparably good eavesdropper channels. All results are discussed in combination with numerous illustrations. / Der Fokus dieser Arbeit liegt auf der Abhörsicherheit der Datenübertragung, die auf der Übertragungsschicht, also durch geeignete Codierung und Ressourcenverteilung, erreicht werden kann. Die Grundlagen der Sicherheit auf der Übertragungsschicht wurden bereits in den 1970er Jahren von Wyner (1975), Csiszár und Körner (1978) formuliert. Jedoch ermöglicht erst der heutige technische Fortschritt, dass diese Ideen in zukünftigen Kommunikationssystemen Einzug finden können. Dies hat in den letzten Jahren zu einem gestiegenen Interesse an diesem Forschungsgebiet geführt. In der Arbeit werden zwei Ansätze zur abhörsicheren Datenübertragung in Funksystemen analysiert. Dies ist zum einen die direkte Übertragung der Information zum gewünschten Empfänger, wobei der Sender gleichzeitig die Zuverlässigkeit und die Abhörsicherheit der Übertragung sicherstellen muss. Zum anderen wird ein zweistufiger Ansatz betrachtet: Die beiden Kommunikationspartner handeln zunächst einen gemeinsamen sicheren Schlüssel aus, der anschließend zur Verschlüsselung der Datenübertragung verwendet wird. Bei diesem Ansatz werden die Abhörsicherheit und die Zuverlässigkeit der Information getrennt voneinander realisiert. Die Sicherheit der Nachrichten hängt maßgeblich davon ab, inwieweit zuverlässige Informationen oder verlässliche Annahmen über den Funkkanal zum Abhörer verfügbar sind. Die Annahme perfekter Kanalkenntnis ist für einen passiven Abhörer jedoch kaum zu rechtfertigen. Daher wird hier ein deterministisches Modell für die Unsicherheit über den Kanal zum Abhörer eingeführt, was zu einer Menge möglicher Abhörkanäle führt. Die Optimierung der sogenannten Worst-Case-Rate in einem Mehrantennensystem mit Gaußschem Rauschen wird für beide Ansätze betrachtet. Es wird analysiert, mit welcher Sendestrategie die maximale Rate erreicht werden kann, wenn gleichzeitig angenommen wird, dass der Abhörer den zugehörigen Worst-Case-Kanal besitzt, welcher die Rate der abhörsicheren Kommunikation jeweils auf ein Minimum reduziert. Für beide Ansätze wird gezeigt, dass aus dem resultierenden Max-Min-Problem über die Matrizen des Mehrantennensystems ein äquivalentes Problem über die Eigenwerte der Matrizen abgeleitet werden kann. Die optimale Ressourcenverteilung für eine Summenleistungsbeschränkung über alle Sendeantennen wird charakterisiert. Für den jeweiligen Worst-Case-Kanal zum Abhörer, dessen Kanalgewinne einer Summenbeschränkung unterliegen, werden Waterfilling-Lösungen hergeleitet. Es wird gezeigt, dass für hohen Signal-Rausch-Abstand (engl. signal-to-noise ratio, SNR) alle Raten gegen endliche Grenzwerte konvergieren, wenn die Antennenzahl des Abhörers nicht beschränkt ist. Die Grenzwerte werden durch die Quotienten der Eigenwerte der Gram-Matrizen beider Kanäle bestimmt. Für den Ratenanstieg der direkten Übertragung ist bei niedrigem SNR nur die Differenz dieser Eigenwerte maßgeblich, wohingegen für den Verschlüsselungsansatz in dem Fall keine Abhängigkeit vom Kanal des Abhörers besteht. Ein Vergleich zeigt, dass das aktuelle SNR und die Qualität des Abhörkanals den einen oder anderen Ansatz begünstigen. Die direkte Übertragung ist bei niedrigem SNR und verhältnismäßig schlechten Abhörkanälen überlegen, wohingegen der Verschlüsselungsansatz von hohem SNR und vergleichsweise guten Abhörkanälen profitiert. Die Ergebnisse der Arbeit werden umfassend diskutiert und illustriert.

Page generated in 0.0898 seconds