Doctor of Philosophy (PhD)


Electrical and Computer Engineering

Document Type



This work aims at addressing two critical security issues residing in the physical layer of wireless networks, namely intelligent jamming and eavesdropping. In the first two chapters we study the problem of jamming in a fixed-rate transmission system with fading, under the general assumption that the jammer has no knowledge about either the codebook used by the legitimate communication terminals, or the source’s output. Both transmitter and jammer are subject to power constraints which can be enforced over each codeword (peak) or over all codewords (average). All our jamming problems are formulated as zero-sum games, having the probability of outage as pay-off function and power control functions as strategies. We provide a comprehensive coverage of these problems, under fast and slow fading, peak and average power constraints, pure and mixed strategies, with and without channel state information (CSI) feedback. Contributions to the eavesdropping problem include a novel feedback scheme for transmitting secret messages between two legitimate parties, over an eavesdropped communication link, presented in Chapter 4. Relative to Wyner’s traditional encoding scheme, our feedback-based encoding often yields larger rate-equivocation regions and achievable secrecy rates. More importantly, by exploiting the channel randomness inherent in the feedback channels, our scheme achieves a strictly positive secrecy rate even when the eavesdropper’s channel is less noisy than the legitimate receiver’s channel. In Chapter 5 we study the problem of active eavesdropping in fast fading channels. The active eavesdropper is a more powerful adversary than the classical eavesdropper. It can choose between two functional modes: eavesdropping the transmission between the legitimate parties (Ex mode), and jamming it (Jx mode) – the active eavesdropper cannot function in full duplex mode. We consider two scenarios: the best-case scenario, when the transmitter knows the eavesdropper’s strategy in advance – and hence can adaptively choose an encoding strategy – and the worst-case scenario, when the active eavesdropper can choose its strategy based on the legitimate transmitter-receiver pair’s strategy. For the second scenario, we introduce a novel encoding scheme, based on very limited and unprotected feedback – the Block-Markov Wyner (BMW) encoding scheme – which outperforms any schemes currently available.



Document Availability at the Time of Submission

Release the entire work immediately for access worldwide.

Committee Chair

Wei, Shuangqing