Date of Award

Spring 5-6-2016

Level of Access Assigned by Author

Campus-Only Dissertation

Degree Name

Doctor of Philosophy (PhD)


Electrical and Computer Engineering


Ali Abedi

Second Committee Member

John Vetelino

Third Committee Member

Richard Eason

Additional Committee Members

Dr. Nuri Emanetoglu

Dr. Silvia Nittel


As wireless networks started to flourish, moving towards a more convenient and a simplified network became a hot research topic for the researchers. Despite the recent technological advancements, current wireless network design is not capable of meeting the increasing demand for wireless multimedia services and high-speed Internet access. This is due to the scarce frequency resources, fading channels, and user competition to access the networks. In order to satisfy these requirements, new schemes have to be introduced and applied. Network coding promises to provide high throughput in relay networks through combining packets at the relays and trading communication for more computation. The emerging area of physical layer network coding (PLNC) exploits the electromagnetic nature of signals and eliminates the need for addition at the packet level, while making signal design and coding schemes adaptable to the channel conditions. PLNC promises a higher end-to-end network throughput in comparison to the three stage network coding scheme. The PLNC technique becomes more valuable in wireless networks when we consider the limited bandwidth and power resources of the nodes. Although network coding has been extensively studied recently, physical layer network coding has not received the attention it deserves. The security of this scheme is the factor that we investigate in this research. The main challenge with the pollution attack involves propagation of the corrupted packets in an epidemic manner which will degrade the performance of the network. A comprehensive analysis of the effectiveness of the PLNC scheme as well the Link Layer Network Coding (LLNC) scheme is being studied here. For different attack scenarios, the robustness of these schemes is evaluated where it has been shown that PLNC scheme can replace the LLNC scheme for a network with/without an intruder.