Show simple item record

dc.contributor.advisorGezici, Sinan
dc.contributor.authorGöken, Çağrı
dc.date.accessioned2019-12-13T12:06:34Z
dc.date.available2019-12-13T12:06:34Z
dc.date.copyright2019-12
dc.date.issued2019-12
dc.date.submitted2019-12-12
dc.identifier.urihttp://hdl.handle.net/11693/52757
dc.descriptionCataloged from PDF version of article.en_US
dc.descriptionThesis (Ph.D.): Bilkent University, Department of Electrical and Electronics Engineering, İhsan Doğramacı Bilkent University, 2019.en_US
dc.descriptionIncludes bibliographical references (leaves 174-181).en_US
dc.description.abstractPhysical layer security has gained a renewed interest with the advances in modern wireless communication technologies. In estimation theoretic security, secrecy levels are measured via estimation theoretic tools and metrics, such as mean-squared error (MSE), where the objective is to perform accurate estimation of the parameter at the intended receiver while keeping the estimation error at the eavesdropper above a certain level. This framework proves useful both for analyzing the achievable performance under security constraints in parameter estimation problems, and for designing low-complexity, practical methods to enhance security in communication systems. In this dissertation, we investigate optimal deterministic encoding of random scalar and vector parameters in the presence of an eavesdropper, who is unaware of the encoding operation. We also analyze optimal stochastic encoding of a random parameter under secrecy constraints in a Gaussian wiretap channel model, where the eavesdropper is aware of the encoding strategy at the transmitter. In addition, we perform optimal parameter design for secure broadcast of a parameter to multiple receivers with fixed estimators. First, optimal deterministic encoding of a scalar parameter is investigated in the presence of an eavesdropper. The aim is to minimize the expectation of the conditional Cram´er-Rao bound (ECRB) at the intended receiver while keeping the MSE at the eavesdropper above a certain threshold. The eavesdropper is modeled to employ the linear minimum mean-squared error (LMMSE) estimator based on the encoded version of the parameter. First, the optimal encoding function is derived in the absence of secrecy constraints for any given prior distribution on the parameter. Next, an optimization problem is formulated under a secrecy constraint and various solution approaches are proposed. Also, theoretical results on the form of the optimal encoding function are provided. Furthermore, a robust parameter encoding approach is developed. In this case, the objective is to maximize the worst-case Fisher information of the parameter at the intended receiver while keeping the MSE at the eavesdropper above a certain level. The optimal encoding function is derived when there exist no secrecy constraints. Next, to obtain the solution of the problem in the presence of the secrecy constraint, the form of the encoding function that maximizes the MSE at the eavesdropper is explicitly derived for any given level of worst-case Fisher information. Then, based on this result, a low-complexity algorithm is provided to calculate the optimal encoding function for the given secrecy constraint. Numerical examples are presented to illustrate the theoretical results for both the ECRB and worst-case Fisher information based designs. Second, optimal deterministic encoding of a vector parameter is investigated in the presence of an eavesdropper. The objective is to minimize the ECRB at the intended receiver while satisfying an individual secrecy constraint on the MSE of estimating each parameter at the eavesdropper. The eavesdropper is modeled to employ the LMMSE estimator based on the noisy observation of the encoded parameter without being aware of encoding. First, the problem is formulated as a constrained optimization problem in the space of vector-valued functions. Then, two practical solution strategies are developed based on nonlinear individual encoding and affine joint encoding of parameters. Theoretical results on the solutions of the proposed strategies are provided for various scenarios on channel conditions and parameter distributions. Finally, numerical examples are presented to illustrate the performance of the proposed solution approaches. Third, estimation theoretic secure transmission of a scalar random parameter is investigated in the presence of an eavesdropper. The aim is to minimize the estimation error at the receiver under a secrecy constraint at the eavesdropper; or, alternatively, to maximize the estimation error at the eavesdropper for a given estimation accuracy limit at the receiver. In the considered setting, the encoder at the transmitter is allowed to use a randomized mapping between two one-to-one and continuous functions and the eavesdropper is fully aware of the encoding strategy at the transmitter. For small numbers of observations, both the eavesdropper and the receiver are modeled to employ LMMSE estimators, and for large numbers of observations, the ECRB metric is employed for both the receiver and the eavesdropper. Optimization problems are formulated and various theoretical results are provided in order to obtain the optimal solutions and to analyze the effects of encoder randomization. In addition, numerical examples are presented to corroborate the theoretical results. It is observed that stochastic encoding can bring significant performance gains for estimation theoretic secrecy problems. Finally, estimation theoretic secure broadcast of a random parameter is investigated. In the considered setting, each receiver device employs a fixed estimator and carries a certain security risk such that its decision can be available to a malicious third party with a certain probability. The encoder at the transmitter is allowed to use a random mapping to minimize the weighted sum of the conditional Bayes risks of the estimators under secrecy and average power constraints. After formulating the optimal parameter design problem, it is shown that the optimization problem can be solved individually for each parameter value and the optimal mapping at the transmitter involves a randomization among at most three different signal levels. Sufficient conditions for improvability and nonimprovability of the deterministic design via stochastic encoding are obtained. Numerical examples are provided to corroborate the theoretical results.en_US
dc.description.statementofresponsibilityby Çağrı Gökenen_US
dc.format.extentxv, 181 leaves : charts (some color) ; 30 cm.en_US
dc.language.isoEnglishen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectParameter estimationen_US
dc.subjectPhysical layer securityen_US
dc.subjectSecrecyen_US
dc.subjectCram´er-Rao bound (CRB)en_US
dc.subjectOptimizationen_US
dc.subjectMean-squared erroren_US
dc.subjectFisher information matrix (FIM)en_US
dc.subjectGaussian wiretap channelen_US
dc.subjectBroadcast channelen_US
dc.titleOptimal parameter encoding strategies for estimation theoretic secure communicationsen_US
dc.title.alternativeKestirim kuramsal güvenli haberleşme için optimal parametre kodlama stratejilerien_US
dc.typeThesisen_US
dc.departmentDepartment of Electrical and Electronics Engineeringen_US
dc.publisherBilkent Universityen_US
dc.description.degreePh.D.en_US
dc.identifier.itemidB122994


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record