• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 87
  • 18
  • 17
  • 11
  • 5
  • 4
  • 2
  • 2
  • Tagged with
  • 173
  • 173
  • 71
  • 45
  • 44
  • 44
  • 36
  • 35
  • 33
  • 32
  • 24
  • 23
  • 22
  • 20
  • 20
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
171

Robust Optimization of Private Communication in Multi-Antenna Systems

Wolf, Anne 02 June 2015 (has links)
The thesis focuses on the privacy of communication that can be ensured by means of the physical layer, i.e., by appropriately chosen coding and resource allocation schemes. The fundamentals of physical-layer security have been already formulated in the 1970s by Wyner (1975), Csiszár and Körner (1978). But only nowadays we have the technical progress such that these ideas can find their way in current and future communication systems, which has driven the growing interest in this area of research in the last years. We analyze two physical-layer approaches that can ensure the secret transmission of private information in wireless systems in presence of an eavesdropper. One is the direct transmission of the information to the intended receiver, where the transmitter has to simultaneously ensure the reliability and the secrecy of the information. The other is a two-phase approach, where two legitimated users first agree on a common and secret key, which they use afterwards to encrypt the information before it is transmitted. In this case, the secrecy and the reliability of the transmission are managed separately in the two phases. The secrecy of the transmitted messages mainly depends on reliable information or reasonable and justifiable assumptions about the channel to the potential eavesdropper. Perfect state information about the channel to a passive eavesdropper is not a rational assumption. Thus, we introduce a deterministic model for the uncertainty about this channel, which yields a set of possible eavesdropper channels. We consider the optimization of worst-case rates in systems with multi-antenna Gaussian channels for both approaches. We study which transmit strategy can yield a maximum rate if we assume that the eavesdropper can always observe the corresponding worst-case channel that reduces the achievable rate for the secret transmission to a minimum. For both approaches, we show that the resulting max-min problem over the matrices that describe the multi-antenna system can be reduced to an equivalent problem over the eigenvalues of these matrices. We characterize the optimal resource allocation under a sum power constraint over all antennas and derive waterfilling solutions for the corresponding worst-case channel to the eavesdropper for a constraint on the sum of all channel gains. We show that all rates converge to finite limits for high signal-to-noise ratios (SNR), if we do not restrict the number of antennas for the eavesdropper. These limits are characterized by the quotients of the eigenvalues resulting from the Gramian matrices of both channels. For the low-SNR regime, we observe a rate increase that depends only on the differences of these eigenvalues for the direct-transmission approach. For the key generation approach, there exists no dependence from the eavesdropper channel in this regime. The comparison of both approaches shows that the superiority of an approach over the other mainly depends on the SNR and the quality of the eavesdropper channel. The direct-transmission approach is advantageous for low SNR and comparably bad eavesdropper channels, whereas the key generation approach benefits more from high SNR and comparably good eavesdropper channels. All results are discussed in combination with numerous illustrations. / Der Fokus dieser Arbeit liegt auf der Abhörsicherheit der Datenübertragung, die auf der Übertragungsschicht, also durch geeignete Codierung und Ressourcenverteilung, erreicht werden kann. Die Grundlagen der Sicherheit auf der Übertragungsschicht wurden bereits in den 1970er Jahren von Wyner (1975), Csiszár und Körner (1978) formuliert. Jedoch ermöglicht erst der heutige technische Fortschritt, dass diese Ideen in zukünftigen Kommunikationssystemen Einzug finden können. Dies hat in den letzten Jahren zu einem gestiegenen Interesse an diesem Forschungsgebiet geführt. In der Arbeit werden zwei Ansätze zur abhörsicheren Datenübertragung in Funksystemen analysiert. Dies ist zum einen die direkte Übertragung der Information zum gewünschten Empfänger, wobei der Sender gleichzeitig die Zuverlässigkeit und die Abhörsicherheit der Übertragung sicherstellen muss. Zum anderen wird ein zweistufiger Ansatz betrachtet: Die beiden Kommunikationspartner handeln zunächst einen gemeinsamen sicheren Schlüssel aus, der anschließend zur Verschlüsselung der Datenübertragung verwendet wird. Bei diesem Ansatz werden die Abhörsicherheit und die Zuverlässigkeit der Information getrennt voneinander realisiert. Die Sicherheit der Nachrichten hängt maßgeblich davon ab, inwieweit zuverlässige Informationen oder verlässliche Annahmen über den Funkkanal zum Abhörer verfügbar sind. Die Annahme perfekter Kanalkenntnis ist für einen passiven Abhörer jedoch kaum zu rechtfertigen. Daher wird hier ein deterministisches Modell für die Unsicherheit über den Kanal zum Abhörer eingeführt, was zu einer Menge möglicher Abhörkanäle führt. Die Optimierung der sogenannten Worst-Case-Rate in einem Mehrantennensystem mit Gaußschem Rauschen wird für beide Ansätze betrachtet. Es wird analysiert, mit welcher Sendestrategie die maximale Rate erreicht werden kann, wenn gleichzeitig angenommen wird, dass der Abhörer den zugehörigen Worst-Case-Kanal besitzt, welcher die Rate der abhörsicheren Kommunikation jeweils auf ein Minimum reduziert. Für beide Ansätze wird gezeigt, dass aus dem resultierenden Max-Min-Problem über die Matrizen des Mehrantennensystems ein äquivalentes Problem über die Eigenwerte der Matrizen abgeleitet werden kann. Die optimale Ressourcenverteilung für eine Summenleistungsbeschränkung über alle Sendeantennen wird charakterisiert. Für den jeweiligen Worst-Case-Kanal zum Abhörer, dessen Kanalgewinne einer Summenbeschränkung unterliegen, werden Waterfilling-Lösungen hergeleitet. Es wird gezeigt, dass für hohen Signal-Rausch-Abstand (engl. signal-to-noise ratio, SNR) alle Raten gegen endliche Grenzwerte konvergieren, wenn die Antennenzahl des Abhörers nicht beschränkt ist. Die Grenzwerte werden durch die Quotienten der Eigenwerte der Gram-Matrizen beider Kanäle bestimmt. Für den Ratenanstieg der direkten Übertragung ist bei niedrigem SNR nur die Differenz dieser Eigenwerte maßgeblich, wohingegen für den Verschlüsselungsansatz in dem Fall keine Abhängigkeit vom Kanal des Abhörers besteht. Ein Vergleich zeigt, dass das aktuelle SNR und die Qualität des Abhörkanals den einen oder anderen Ansatz begünstigen. Die direkte Übertragung ist bei niedrigem SNR und verhältnismäßig schlechten Abhörkanälen überlegen, wohingegen der Verschlüsselungsansatz von hohem SNR und vergleichsweise guten Abhörkanälen profitiert. Die Ergebnisse der Arbeit werden umfassend diskutiert und illustriert.
172

[en] EMBEDDED OTDR MONITORING SYSTEMS FOR NEXT GENERATION OPTICAL ACCESS NETWORKS / [pt] SISTEMAS INTEGRADOS DE MONITORAMENTO POR OTDR PARA REDES DE ACESSO ÓPTICO DE PRÓXIMA GERAÇÃO

12 December 2017 (has links)
[pt] Para suportar os requisitos das redes móveis de 5a geração (5G), os sistemas de comunicação óptica serão usados nas redes de acesso. Isso ocorre porque a evolução das RAN (Radio Access Networks) incluem a centralização do equipamento mais crítico para implantar pontos de acesso móveis de baixa potência, como DAS (Distributed Antenna Systems) e Small Cells. Os serviços emergentes solicitam a implantação de tecnologias de rádio sobre fibra com ênfase na eficiência de largura de banda, eficiência energética e alta confiabilidade. Neste âmbito, um monitoramento eficiente da camada física é imperativo para a operação dessas redes. O sistema de monitoramento deve fornecer uma localização de falhas em serviço, econômico, centralizado e com impacto mínimo para a transmissão de dados. Esta tese propõe vários sistemas de monitoramento incorporado no transceptor utilizando reflectometria óptica no domínio do tempo. Os sistemas de monitoramento são testados em diferentes sistemas de transmissão de dados e arquiteturas de rede, onde é apresentada uma validação simulada e outras experimentais. / [en] In order to support the requirements for 5th generation mobile networks (5G), optical communication systems will be used in the access part of the network. This is because the evolution of radio access networks includes the centralization of the most critical equipment in order to deploy low power mobile access points, like distributed antenna systems and small cells. The emerging services call for the deployment of radio over fibre technologies with emphasis on bandwidth efficiency, energy efficiency and high reliability. Within this scope, an efficient monitoring of the physical layer would become essential for the operation of these networks. The monitoring system should provide in-service, cost efficient and centralized fault localization with minimum impact on data transmission. This thesis proposes several transceiver-embedded optical time domain reflectometry monitoring systems. The monitoring systems are tested over different data transmission systems and network architectures, where one architecture was simulated and several others experimentally validated.
173

Koexistence mobilních komunikačních systémů GSM-EDGE a UMTS / GSM-EDGE and UMTS Systems Coexistence

Gleissner, Filip January 2009 (has links)
The dissertation thesis deals with the investigation of the coexistence of GSM–EDGE and UMTS systems with focus on the physical layer of the systems. The aim is to provide a set of recommendations for practical cooperation while the systems operate in both the separated and the common radio bands. A detailed description of signal processing of both the systems on the physical layer is presented. On the basis of this description, models of both systems were created and implemented in the MATLAB environment. The simulations are focused on the physical layer quality parameters, especially the bit error ratio evaluation for various ratios of useful signal power to noise power during the transmission over the radio channel. Simulation is also used to examine the quality of received useful signal while it is interfered by signals from the same and adjacent channels. The purpose is to determine the isolation between these adjacent channels, when the bit error ratio of the useful signal does not exceed a certain reference value. The simulation results are subsequently subjected to comparison with the results of the experimental measurements in laboratory conditions. Before the measurements are carried out, a study of possible interference types is performed. Consequently, the crucial parameters of the measuring equipment used are verified. From the results of simulations and measurements, the proposal of a minimum and recommended carrier separation between both the systems is presented in order to efficiently utilize the assigned frequency spectrum. Furthermore, for the cooperation in both the separated and the common radio bands, the necessary precautions are given for reaching the required isolation and thereby inter-system interference minimization.

Page generated in 0.055 seconds