Show simple item record

dc.contributor.advisorDuman, Tolga Meteen_US
dc.contributor.authorNooraiepour, Alirezaen_US
dc.date.accessioned2016-11-24T12:56:19Z
dc.date.available2016-11-24T12:56:19Z
dc.date.copyright2016-10
dc.date.issued2016-11
dc.date.submitted2016-11-21
dc.identifier.urihttp://hdl.handle.net/11693/32546
dc.descriptionCataloged from PDF version of article.en_US
dc.descriptionThesis (M.S.): Bilkent University, Department of Electrical and Electronics Engineering, İhsan Doğramacı Bilkent University, 2016.en_US
dc.descriptionIncludes bibliographical references (leaves 74-78).en_US
dc.description.abstractWireless networks are vulnerable to various kinds of attacks such as eavesdropping because of their open nature. As a result, security is one of the most important challenges that needs to be addressed for such networks. To address this issue, we utilize information theoretic secrecy approach and develop randomized channel coding techniques akin to the approach proposed by Wyner as a general method for confusing the eavesdropper while making sure that the legitimate receiver is able to recover the transmitted message. We first study the application of convolutional codes to the randomized encoding scheme. We argue how dual of a code plays a major role in this construction and obtain dual of a convolutional code in a systematic manner. We propose optimal and sub-optimal decoders for additive white Gaussian noise (AWGN) and binary symmetric channels and obtain bounds on the decoder performance extending the existing lower and upper bounds on the error rates of coded systems with maximum likelihood (ML) decoding. Furthermore, we apply list decoding to improve the performance of the sub-optimal decoders. We demonstrate via several examples that security gaps achieved by the randomized convolutional codes compete favorably with some of the existing coding methods. In order to improve the security gap hence the system performance further, we develop concatenated coding approaches applied to the randomized encoding scheme as well. These include serial and parallel concatenated convolutional codes and serial concatenation of a low density generator matrix code with a convolutional code. For all of these solutions low-complexity iterative decoders are proposed and their performance in the wiretap channel is evaluated in terms of the security gap. Numerical examples show that for certain levels of confusion at the eavesdropper, randomized serially concatenated convolutional codes oer the best performance.en_US
dc.description.statementofresponsibilityby Alireza Nooraiepour.en_US
dc.format.extentxiv, 78 leaves : charts (some color).en_US
dc.language.isoEnglishen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectRandomized codesen_US
dc.subjectWiretap channelen_US
dc.subjectSecurity gapen_US
dc.subjectPhysical layer securityen_US
dc.subjectConvolutional codesen_US
dc.subjectTurbo codesen_US
dc.subjectLow density generator matrix codesen_US
dc.titleRandomized convolutional and concatenated codes for the wiretap channelen_US
dc.title.alternativeHat dinlemeli kanallar için rasgeleleştirilmiş kıvrımlı ve uç uça eklemeli kodlaren_US
dc.typeThesisen_US
dc.departmentDepartment of Electrical and Electronics Engineeringen_US
dc.publisherBilkent Universityen_US
dc.description.degreeM.S.en_US
dc.identifier.itemidB154701


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record