• Media type: Doctoral Thesis; E-Book; Electronic Thesis
  • Title: "Security at the Physical and MAC Layers in Wireless Networks"
  • Contributor: El Hajj Shehadeh, Youssef [Author]
  • imprint: Georg-August-Universität Göttingen: eDiss, 2013-04-18
  • Language: English
  • DOI: https://doi.org/10.53846/goediss-3807
  • Keywords: Misbehavior ; Informatik (PPN619939052) ; Efficiency ; Key Generation ; Intelligent Mechanisms ; Robustness ; MAC-layer Security ; SODCA ; Physical-layer Security
  • Origination:
  • Footnote: Diese Datenquelle enthält auch Bestandsnachweise, die nicht zu einem Volltext führen.
  • Description: The main objective of this dissertation is to investigate security solutions and issues at the lower layers in wireless networks. In the first part, the potential of the physical layer in providing security solutions is investigated. Recently, it has been found that the multipath wireless channel in TDD wireless communications can provide a common reciprocal source of randomness that can be leveraged in secret key generation and agreement. Based on this property, many key generation mechanisms have been proposed. In contrary to the common direct quantization and extraction mechanisms, we propose two intelligent mechanisms for secret bits extraction. They are based on mitigating error through optimized guard intervals (GI mechanism) or through phase-shifting the channel taps (PS mechanism). The high efficiency of these two mechanisms compared to the regular quantization mechanisms is manifested through simulations based on a realistic channel model. We also investigate some practical issues that affect the performance of key generation at the physical layer based on the multipath wireless channel. Delay and Mobility are mainly investigated. In fact, mobility leads to a varying channel. Thus, delay between the channel estimation procedures at the two communicating wireless nodes results into varied channel estimates, hence key disagreement. To tackle these two issues, we propose the Enhanced 3-Way PS mechanism. Through simulation results, this mechanism has been proven to be robust to delay and mobility while still achieving a high secret bit extraction rate. Finally, key reconciliation and error correction are also discussed. The second part of this dissertation is concerned with securing medium access in wireless networks. In fact, the broadcast nature of wireless communications poses a problem with channel access. A selfish node can get easily a higher share of the common wireless channel by simply manipulating through the medium access protocol parameters, mainly the random backoff selection procedure. To ...
  • Access State: Open Access
  • Rights information: Attribution - Non Commercial - No Derivs (CC BY-NC-ND)