
iii
CONTENTS
ACKNOWLEDGMENTS ........................................................................................... i
DECLARATION OF AUTHORSHIP ....................................................................... ii
CONTENTS .............................................................................................................. iii
LIST OF ABBREVIATIONS .................................................................................... v
LIST OF MATHEMATICAL SYMBOLS .............................................................. vii
LIST OF FIGURES ................................................................................................... ix
LIST OF TABLES ................................................................................................... xii
INTRODUCTION ...................................................................................................... 1
Introduction ............................................................................................................ 1
Motivation .............................................................................................................. 2
Objective, subject, and methodology research of the dissertation ......................... 3
Contributions .......................................................................................................... 4
Dissertation outline ................................................................................................ 5
CHAPTER 1. SECURITY AND RELIABILITY IN MULTI-ANTENNA
WIRELESS COMMUNICATION SYSTEMS .......................................................... 6
1.1. Overview of multi-antenna wireless communication systems ........................ 6
1.2. Encryption ....................................................................................................... 7
1.2.1. Classification of cryptosystems ........................................................ 7
1.2.2. Classification of attacks .................................................................. 10
1.2.3. Security protocols in wireless communication systems ................. 11
1.2.4. Information-Theoretic basics for PLS ............................................ 12
1.3. Channel codes ............................................................................................... 19
1.3.1. Turbo codes ..................................................................................... 19
1.3.2. Polar codes ...................................................................................... 23
1.4. Wireless channel of multi-antenna communication systems ........................ 26
1.4.1. Introduction of the wireless channel ............................................... 26
1.4.2. Channel models ............................................................................... 27
1.5. Secret key generation based on wireless channel characteristics ................. 30
1.5.1. Information-theoretic perspectives of key generation based on
wireless channel characteristics ........................................................................... 30
1.5.2. Performance parameters .................................................................. 30