liu.seSearch for publications in DiVA
Change search
Link to record
Permanent link

Direct link
Arvanitaki, Antonia
Publications (4 of 4) Show all publications
Arvanitaki, A. (2025). Performance Analysis of Wireless Systems with Security Constraints. (Doctoral dissertation). Linköping: Linköping University Electronic Press
Open this publication in new window or tab >>Performance Analysis of Wireless Systems with Security Constraints
2025 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Broadcast channels are fundamental components of wireless communication systems, extensively utilized in various applications such as the Internet of Things (IoT). However, security poses a significant concern in such networks due to their broadcast nature, making them vulnerable to unauthorized access and eavesdropping. Physical layer security, among other security measures, is crucial for enhancing the security posture of broadcast channels and is often integrated into cross-layer design approaches. Analyzing the performance of secure broadcast channels is a complex endeavor, compounded by several critical factors. Issues such as fading, interference from nearby transmissions, and path loss significantly influence key performance metrics like average packet delay and throughput. The consideration of bursty traffic remains largely unexplored in these systems. The utilization of traffic characteristics such as random arrivals can further improve the performance of those systems without sacrificing security.

The main contribution of this thesis is addressing these factors in a holistic way for ensuring the efficient operation of broadcast channels. More specifically, proposing and studying congestion control policies as an effective strategy to manage packet transmission flow can mitigate the adverse effects of factors like interference and path loss on average packet delay. By maintaining a balanced transmission flow, congestion control policies help alleviate delays caused by channel impairments. Decoding schemes also play a pivotal role in optimizing network performance. Successive decoding, in particular, offers superior performance compared to treating interference as noise, leveraging higher-quality communication channels more effectively to improve overall network performance. Furthermore, adjusting packet transmission power based on channel conditions can help mitigate interference issues. Utilizing reinforcement learning techniques enables dynamic adjustment of transmission power, allowing the system to adapt to changing channel conditions and optimize performance accordingly. Addressing issues like interference, path loss, and packet delay is crucial for optimizing the performance of secure broadcast channels. By employing congestion control policies, optimizing decoding schemes, and leveraging reinforcement learning for power control, broadcasters can enhance network efficiency and security in various wireless communication applications.

This thesis proposes an integrated approach to enhancing the performance and security of broadcast channels by addressing key performance bottlenecks. Unlike existing studies that focus separately on congestion control, decoding strategies, or power adaptation, we present a holistic framework that combines these techniques to mitigate interference, reduce packet delay, and optimize throughput. Specifically, we propose the use of congestion control policies to regulate packet transmission flow, thereby minimizing the impact of interference and path loss on latency. Additionally, we explore the benefits of successive decoding over conventional interference-as-noise approaches, demonstrating its ability to leverage high-quality communication channels for improved network efficiency. Finally, we introduce a reinforcement learning-based power control mechanism that dynamically adjusts transmission power in response to channel conditions, enabling adaptive interference mitigation and enhanced system performance.

Abstract [sv]

Broadcast-kanaler är grundläggande komponenter i trådlösa kommunikationssystem och används i stor utsträckning inom olika tillämpningar, såsom sakernas internet (IoT). Dock utgör säkerhet en betydande utmaning i sådana nätverk på grund av deras sändningskaraktär, vilket gör dem sårbara för obehörig åtkomst och avlyssning. Säkerhet på den fysiska nivån, tillsammans med andra säkerhetsåtgärder, är avgörande för att stärka säkerheten i sändningskanaler och integreras ofta i tvärskiktsdesign. Att analysera prestandan hos säkra sändningskanaler är en komplex uppgift som försvåras av flera kritiska faktorer. Problem såsom fading, interferens från närliggande överföringar och signalförlust påverkar avsevärt nyckelprestandamått, såsom genomsnittlig paketfördröjning och genomströmning. Hänsyn till burst-trafik är fortfarande till stor del outforskad i dessa system. Genom att utnyttja trafikegenskaper såsom slumpmässiga ankomster kan systemens prestanda förbättras ytterligare utan att kompromissa med säkerheten.

Huvudbidraget i denna avhandling är att hantera dessa faktorer på ett holistiskt sätt för att säkerställa en effektiv drift av sändningskanaler. Mer specifikt föreslås och studeras överbelastningskontrollpolicys som en effektiv strategi för att hantera paketöverföringsflödet, vilket kan mildra de negativa effekterna av faktorer såsom interferens och signalförlust på genomsnittlig paketfördröjning. Genom att upprätthålla ett balanserat överföringsflöde bidrar överbelastningskontrollpolicys till att minska förseningar orsakade av kanalnedsättningar. Även avkodningsscheman spelar en avgörande roll i att optimera nätverksprestanda. Successiv avkodning erbjuder särskilt överlägsen prestanda jämfört med att behandla interferens som brus, eftersom den effektivare utnyttjar kommunikationskanaler av högre kvalitet för att förbättra nätverkets övergripande prestanda. Vidare kan justering av paketöverföringseffekt baserat på kanalens tillstånd bidra till att mildra interferensproblem. Genom att använda förstärkningsinlärningstekniker kan systemet dynamiskt anpassa överföringseffekten, vilket möjliggör anpassning till förändrade kanalvillkor och optimering av prestanda. Att hantera problem såsom interferens, signalförlust och paketfördröjning är avgörande för att optimera prestandan hos säkra sändningskanaler. Genom att använda överbelastningskontrollpolicys, optimera avkodningsscheman och utnyttja förstärkningsinlärning för effektkontroll kan nätverksoperatörer förbättra både effektivitet och säkerhet i olika trådlösa kommunikationsapplikationer.

Denna avhandling föreslår en integrerad strategi för att förbättra prestanda och säkerhet i sändningskanaler genom att adressera centrala flaskhalsar. Till skillnad från befintliga studier, som behandlar överbelastningskontroll, avkodningsstrategier eller effektanpassning separat, presenterar vi en holistisk ram som kombinerar dessa tekniker för att minska interferens, minimera paketfördröjning och optimera genomströmning. Mer specifikt föreslår vi användningen av överbelastningskontrollpolicys för att reglera paketöverföringsflödet, vilket minimerar effekterna av interferens och signalförlust på latens. Dessutom undersöker vi fördelarna med successiv avkodning jämfört med konventionella metoder där interferens behandlas som brus och visar dess förmåga att utnyttja högkvalitativa kommunikationskanaler för förbättrad nätverkseffektivitet. Slutligen introducerar vi en förstärkningsinlärningsbaserad effektkontrollmekanism som dynamiskt justerar överföringseffekten beroende på kanalens tillstånd, vilket möjliggör adaptiv interferensdämpning och förbättrad systemprestanda.

Place, publisher, year, edition, pages
Linköping: Linköping University Electronic Press, 2025. p. 65
Series
Linköping Studies in Science and Technology. Dissertations, ISSN 0345-7524 ; 2437
National Category
Communication Systems
Identifiers
urn:nbn:se:liu:diva-212479 (URN)10.3384/9789181180169 (DOI)9789181180152 (ISBN)9789181180169 (ISBN)
Public defence
2025-04-22, Ada Lovelace, B Building, Campus Valla, Linköping, 13:15 (English)
Opponent
Supervisors
Available from: 2025-03-20 Created: 2025-03-20 Last updated: 2025-03-31Bibliographically approved
Arvanitaki, A., Stamatakis, G., Carlsson, N., Mohapatra, P. & Pappas, N. (2023). Deep Reinforcement Learning for Power Control in Secure Broadcast Channels. In: 2023 21st International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt): . Paper presented at WiOpt Workshop on Machine Learning in Wireless Communications (WMLC @WiOpt), Singapore, 24-27 August 2023.
Open this publication in new window or tab >>Deep Reinforcement Learning for Power Control in Secure Broadcast Channels
Show others...
2023 (English)In: 2023 21st International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2023Conference paper, Published paper (Refereed)
Series
International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), ISSN 2690-3334, E-ISSN 2690-3342
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-208863 (URN)10.23919/WiOpt58741.2023.10349852 (DOI)2-s2.0-85184655790 (Scopus ID)9783903176553 (ISBN)9798350341584 (ISBN)
Conference
WiOpt Workshop on Machine Learning in Wireless Communications (WMLC @WiOpt), Singapore, 24-27 August 2023
Funder
Swedish Research CouncilELLIIT - The Linköping‐Lund Initiative on IT and Mobile CommunicationsEU, Horizon Europe, 101096526
Available from: 2024-10-27 Created: 2024-10-27 Last updated: 2025-03-20Bibliographically approved
Arvanitaki, A., Pappas, N., Carlsson, N. & Mohapatra, P. (2021). Secrecy in Congestion-Aware Broadcast Channels. In: Proc. Wireless Days Conference (WD) 2021: . Paper presented at Wireless Days Conference (WD), Paris, France, 30 June-2 July 2021. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Secrecy in Congestion-Aware Broadcast Channels
2021 (English)In: Proc. Wireless Days Conference (WD) 2021, Institute of Electrical and Electronics Engineers (IEEE), 2021Conference paper, Published paper (Refereed)
Abstract [en]

Congestion-aware scheduling in the case of traditional downlink cellular communication has neglected the heterogeneity in terms of secrecy among different clients. In this paper, we study a two-user congestion-aware broadcast channel with heterogeneous traffic and different security requirements. The traffic with security requirements is intended for a legitimate user and it has bursty nature. The incoming packets are stored in a queue at the source. Furthermore, there is a second traffic flow intended for another user, it is delay tolerant and does not have secrecy constraints. The receiver which needs to be served with confidential data has full-duplex capabilities, and it can send a jamming signal to hinder eavesdropping of its data at the other user. We consider two randomized policies for selecting which packets to transmit, one is congestion-aware by taking into consideration the queue size, whereas the other one is non-congestion-aware. We analyse the throughput and the delay performance under two decoding schemes at the receivers and provide insights into their relative security performance and into how congestion control at the queue holding confidential information can help decrease the average delay per packet. We show that the two policies have the same secrecy performance for large random access probabilities. The derived results also take account of the self-interference caused at the receiver for whom confidential data is intended due to its full-duplex operation while jamming the communication at the other user.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
Series
IFIP Wireless Days, WD, ISSN 2156-9711, E-ISSN 2156-972X
Keywords
Broadcast channel; Delay; Queueing; Random access; Secrecy
National Category
Telecommunications Communication Systems
Identifiers
urn:nbn:se:liu:diva-180862 (URN)10.1109/WD52248.2021.9508287 (DOI)000701612800008 ()2-s2.0-85125385163 (Scopus ID)9781665425599 (ISBN)9781665425605 (ISBN)
Conference
Wireless Days Conference (WD), Paris, France, 30 June-2 July 2021
Note

Funding Agencies|Swedish Research Council (VR)Swedish Research Council; CENIIT; Indo-Sweden Project, Department of Science and Technology, India

Available from: 2021-11-06 Created: 2021-11-06 Last updated: 2025-11-17Bibliographically approved
Arvanitaki, A., Pappas, N., Mohapatra, P. & Carlsson, N. (2020). Delay Performance of a Two-User Broadcast Channel with Security Constraints. SN Computer Science, 1(1), Article ID 53.
Open this publication in new window or tab >>Delay Performance of a Two-User Broadcast Channel with Security Constraints
2020 (English)In: SN Computer Science, ISSN 2661-8907, Vol. 1, no 1, article id 53Article in journal (Refereed) Published
Abstract [en]

In this paper, we consider the two-user broadcast channel with security constraints. We assume that a source broadcasts packets to two receivers, and that one of them has secrecy constraints, i.e., its packets need to be kept secret from the other receiver. The receiver with secrecy constraint has full-duplex capability, allowing it to transmit a jamming signal to increase its secrecy. We derive the average delay per packet and provide simulations and numerical results, where we compare different performance metrics for the cases when both receivers treat interference as noise, when the legitimate receiver performs successive decoding, and when the eavesdropper performs successive decoding. The results show that successive decoding provides better average packet delay for the legitimate user. Furthermore, we define a new metric that characterizes the reduction on the success probability for the legitimate user that is caused by the secrecy constraint. The results show that secrecy poses a significant amount of packet delay for the legitimate receiver when either receiver performs successive decoding. We also formulate an optimization problem, wherein the throughput of the eavesdropper is maximized under delay and secrecy rate constraints at the legitimate receiver. We provide numerical results for the optimization problem, where we show the trade-off between the transmission power for the jamming and the throughput of the non-legitimate receiver. The results provide insights into how channel ordering and encoding differences can be exploited to improve performance under different interference conditions.

Place, publisher, year, edition, pages
Springer, 2020
Keywords
Broadcast channel, Delay, Queueing, Security constraints
National Category
Telecommunications
Identifiers
urn:nbn:se:liu:diva-179795 (URN)10.1007/s42979-019-0055-3 (DOI)2-s2.0-85115700810 (Scopus ID)
Available from: 2021-10-01 Created: 2021-10-01 Last updated: 2025-11-18Bibliographically approved
Organisations

Search in DiVA

Show all publications