Physical Layer Security for Wireless Networks

Size: px
Start display at page:

Download "Physical Layer Security for Wireless Networks"

Transcription

1 Physical Layer Security for Wireless Networks Şennur Ulukuş Department of ECE University of Maryland Joint work with Shabnam Shafiee, Nan Liu, Ersen Ekrem, Jianwei Xie and Pritam Mukherjee. LTS, August 22,

2 Security in Wireless Systems Inherent openness in wireless communications channel: eavesdropping and jamming attacks Bob Alice Eve 2

3 Countering Security Threats in Wireless Systems Cryptography at higher layers of the protocol stack based on the assumption of limited computational power at Eve vulnerable to large-scale implementation of quantum computers Techniques like frequency hopping, CDMA at the physical layer based on the assumption of limited knowledge at Eve vulnerable to rogue or captured node events Physical layer security at the physical layer no assumption on Eve s computational power no assumption on Eve s available information unbreakable, provable, and quantifiable (in bits/sec/hertz) implementable by signal processing, communications, and coding techniques 3

4 Beginnings of Security Research: Shannon 1949 Noiseless bit pipes to Bob and Eve. W X X W Alice Bob X W Eve Eve gets whatever Bob gets. Secure communications is not possible. 4

5 Shannon s 1949 Security Paper Noiseless bit pipes to Bob and Eve. K keys K W X X W Alice Bob X W Eve One-time pad: X = W K If K is uniform, then X is independent of W. If we know K, then W = X K. For perfect secrecy, length of K (key rate) must be as large as length of W (message rate). 5

6 Beginnings of Cryptography Private key cryptography Based on one-time pad There are separate secure communication links for key exchange Encryption and decryption are done using these keys Public key cryptography Encryption is based on publicly known key (or method) Decryption can be performed only by the desired destination Security based on computational advantage Security against computationally limited adversaries Certain operations are easy in one direction, difficult in the other direction Multiplication is easy, factoring is difficult (RSA) Exponentiation is easy, discrete logarithm is difficult (Diffie-Hellman) 6

7 Cryptography versus Physical Layer Security 7

8 Wyner s Wiretap Channel Wyner introduced the wiretap channel in Major departure from Shannon s model: noisy channels. Eve s channel is degraded with respect to Bob s channel: X Y Z W X Y Wˆ Alice Bob Z H W Z n Secrecy is measured by equivocation, R e, at Eve, i.e., the confusion at Eve: 1 R e = lim n n H(W Zn ) Eve 8

9 Notions of Perfect Secrecy Perfect secrecy is achieved if R e = R This is perfect weak secrecy: Also, there is perfect strong secrecy: 1 lim n n I(W;Zn ) = 0 lim n I(W;Zn ) = 0 All capacity results obtained for weak secrecy have been extended for strong secrecy. However, there is still no proof of equivalence or strict containment. 9

10 Capacity-Equivocation Region Wyner characterized the optimal (R,R e ) region: R I(X;Y ) R e I(X;Y ) I(X;Z) Main idea is to split the message W into two coordinates, secret and public: (W s,w p ). W s needs to be transmitted in perfect secrecy. W p has two roles: Carries some information on which there is no secrecy constraint Provides protection for W s by creating confusion for the eavesdropper 10

11 A Typical Capacity-Equivocation Region Wyner characterized the optimal (R,R e ) region: R I(X;Y ) R e I(X;Y ) I(X;Z) A typical (R,R e ) region: R e Cs C R There might be a tradeoff between rate and its equivocation: Capacity and secrecy capacity might not be simultaneously achievable 11

12 A Typical Capacity-Equivocation Region Wyner characterized the optimal (R,R e ) region: R I(X;Y ) R e I(X;Y ) I(X;Z) A typical (R,R e ) region: C s R e p(x) p(x) C s C R There might be a tradeoff between rate and its equivocation: Capacity and secrecy capacity might not be simultaneously achievable 12

13 Secrecy Capacity Perfect secrecy when R = R e. The maximum perfect secrecy rate is the secrecy capacity: C s = max I(X;Y ) I(X;Z) X Y Z Main idea is to replace W p with dummy indices, W s, which carry no information. In particular, each W s is mapped to many codewords: Stochastic encoding (a.k.a. random binning) To send message W s securely, we send X n (W s, W s ) where W s is random. This one-to-many mapping aims to confuse the eavesdropper 13

14 Main Tool: Stochastic Encoding Each message W s is associated with many codewords: X n (W s, W s ). Eve s decoding capability 2 n R s (1,1)... (1,j)... (1,2 n R s ) Stochastic encoding nr s (i,1)... (i,j)... (i,2 n R s ) Messagei..... (2 nr s,1)... (2 R s,j)... (2 nr s,2 n R s ) 14

15 Stochastic Encoding: 64-QAM Example Bob s Noise Eve s Noise Bob s Constellation Eve s Constellation CB log b/s E 2 Cs CB CE 2 b/s C log 16 4 b/s 15

16 Stochastic Encoding: 64-QAM Example Divide Bob s constellation into 4 subsets. Message 1 Message 2 Message 3 Message 4 16

17 Stochastic Encoding: 64-QAM Example All red stars denote the same message. Pick one randomly. Message 1 Message 2 Message 3 Message 4 17

18 Stochastic Encoding: 64-QAM Example Bob can decode the message reliably. Message 1 Message 2 Message 3 Message 4 18

19 Stochastic Encoding: 64-QAM Example For Eve, all 4 messages look equally likely. Message 1 Message 2 Message 3 Message 4 19

20 General Wiretap Channel Csiszar and Korner considered the general wiretap channel in Eve s signal is not necessarily a degraded version of Bob s signal. Y Wˆ Bob W V X Alice Z H W Z n Eve 20

21 General Capacity-Equivocation Region General (R,R e ) region: R I(V ;Y ) R e I(V ;Y U) I(V ;Z U) for some (U,V ) such that U V X Y,Z. Two new ingredients in the achievable scheme V : channel prefixing U: rate splitting 21

22 General Capacity-Equivocation Region Contrast with the degraded case R I(V ;Y ) R I(X;Y ) R e I(V ;Y U) I(V ;Z U) R e I(X;Y ) I(X;Z) for some (U,V ) such that U V X Y,Z. Two new ingredients in the achievable scheme V : channel prefixing U: rate splitting 22

23 General Secrecy Capacity Contrast with the degraded case R I(V ;Y ) R I(X;Y ) R e I(V ;Y U) I(V ;Z U) for some (U,V ) such that U V X Y,Z. Two new ingredients in the achievable scheme V : channel prefixing U: rate splitting General secrecy capacity expression: i.e., rate splitting is not needed. C s = max I(V ;Y ) I(V ;Z) V X Y Z R e I(X;Y ) I(X;Z) 23

24 Main Tool: Channel Prefixing A virtual channel from V to X. Additional stochastic mapping from the message to the channel input: W V X. Real channel: X Y and X Z. Constructed channel: V Y and V Z. Y Wˆ Bob W V X Alice Z H W Z n With channel prefixing: V X Y,Z. Eve From DPI, both mutual informations decrease, but the difference may increase. The secrecy capacity: C s = max I(V ;Y ) I(V ;Z) V X Y Z 24

25 Gaussian Wiretap Channel Leung-Yang-Cheong and Hellman considered the Gaussian wire-tap channel in Y = X + N 1 and Z = X + N 2 Y Wˆ Bob W X Alice Z H W Z n Degraded: No channel prefixing is necessary and Gaussian signalling is optimal. The secrecy capacity: C s = i.e., the difference of two capacities. Eve max I(X;Y ) I(X;Z) = [C B C E ] + X Y Z 25

26 Caveat: Need Channel Advantage The secrecy capacity: C s = [C B C E ] + Bob s channel is better Eve s channel is better W X Y Bob Wˆ W X Y Bob Wˆ Alice Z H W Z n Alice Z H W Z n Eve Eve positive secrecy no secrecy C s = C B C E C s = 0 26

27 Two Recurring Themes Creating advantage for the legitimate users: computational advantage (cryptography) knowledge advantage (spread spectrum) channel advantage (physical layer security) Exhausting capabilities of the illegitimate entities: exhausting computational power (cryptography) exhausting searching power (spread spectrum) exhausting decoding capability (physical layer security) 27

28 Outlook at the End of 1970s and Transition into 2000s Information theoretic secrecy is extremely powerful: no limitation on Eve s computational power no limitation on Eve s available information yet, we are able to provide secrecy to the legitimate user unbreakable, provable, and quantifiable (in bits/sec/hertz) secrecy We seem to be at the mercy of the nature: if Bob s channel is stronger, positive perfect secrecy rate if Eve s channel is stronger, no secrecy We need channel advantage. Can we create channel advantage? Wireless channel provides many options: time, frequency, multi-user diversity via fading cooperation via overheard signals multi-dimensional signalling via multiple antennas signal alignment 28

29 Fading Wiretap Channel In the Gaussian wiretap channel, secrecy is not possible if C B C E Fading provides time-diversity: Can it be used to obtain/improve secrecy? Y Wˆ Bob W X Alice Z Eve H W Z n 29

30 MIMO Wiretap Channel In SISO Gaussian wiretap channel, secrecy is not possible if C B C E Multiple antennas improve reliability and rates. How about secrecy? W X... Y Wˆ Bob Alice... Z H W Z n Eve 30

31 Broadcast (Downlink) Channel In cellular communications: base station to end-users channel can be eavesdropped. This channel can be modelled as a broadcast channel with an external eavesdropper. Y 1 Wˆ 1 W1, W2 Alice X Y 2 Bob 1 Bob 2 Wˆ 2 Z H W, W Z 1 2 n Eve 31

32 Internal Security within a System Legitimate users may have different security clearances. Some legitimate users may have paid for some content, some may not have. Broadcast channel with two confidential messages. Y 1 Wˆ, H ( W Y ) n Bob\Eve 1 W1, W2 X Alice Y 2 Wˆ, H ( W Y ) n Bob\Eve 2 32

33 Multiple Access (Uplink) Channel Alice and Charles want to have secure communication with Bob in the presence of Eve. Simultaneous multi-message secrecy. Opportunities for deaf cooperation. W1 X1 Alice W X 2 2 Y Bob Wˆ, Wˆ 1 2 Charles Z Eve H W, W Z 1 2 n 33

34 Interference Channel with Confidential Messages Interference results in performance degradation, requires sophisticated transceiver design. From a secrecy point of view, interference (overheard signal) results in loss of confidentiality. W X Y Wˆ, H ( W Y ) n Alice Bob\Eve 1 W X 2 2 Y 2 Wˆ, H ( W Y ) n Charles Bob\Eve 2 34

35 Cooperative Channels Overheard information at communicating parties: Forms the basis for cooperation; results in loss of confidentiality How do cooperation and secrecy interact? Can Charles help without learning the messages going to Bob? Charles\Eve Y1 X 2 H W Y n 1 W X1 Y Wˆ Alice Bob 35

36 Fading Broadcast Channel with Confidential Messages Both users want secrecy against each other. In a non-fading setting, only one user can have a positive secure rate. With full CSIT and CSIR: Gaussian signalling with power control is optimal. Ekrem et. al., Ergodic Secrecy Capacity Region of the Fading Broadcast Channel, ICC

37 The Secrecy Capacity Region (Squared) channel gains are exponential random variables with means σ 1,σ 2, respectively σ 1 = σ 2 = 1 σ 1 = 1, σ 2 = R R 1 Fading (channel variation over time) is beneficial for secrecy. Both users can have positive secrecy rates in fading (even if they have the same average quality). This is not possible without fading. 37

38 Fading Wiretap Channel without CSI Fast fading channel: no CSI anywhere. Discrete signalling is optimal Positions of mass points points 3 points 4 points 5 points Power Mukherjee et. al., Fading Wiretap Channel with No CSI Anywhere, ISIT

39 Gaussian MIMO Wiretap Channel Multiple antennas improve reliability and rates. They improve secrecy as well. W X... Y Wˆ Bob Alice... Z H W Z n No channel prefixing is necessary and Gaussian signalling is optimal. The secrecy capacity: 1 C s = max K:tr(K) P 2 log HM KH M + I 1 2 log HE KH E + I As opposed to the SISO case, C S C B C E. Tradeoff between the rate and its equivocation. Shafiee et. al., Towards the Secrecy Capacity of the Gaussian MIMO Wire-tap Channel: The Channel, IEEE Trans. on Information Theory, Eve

40 Cooperative Channels and Secrecy How do cooperation and secrecy interact? Is there a trade-off or a synergy? Charles\Eve Y1 X 2 H W Y n 1 W X1 Y Wˆ Alice Bob Ekrem et. al., Secrecy in Cooperative Relay Broadcast Channels, IEEE Trans. on Information Theory,

41 Interactions of Cooperation and Secrecy Existing cooperation strategies: Decode-and-forward (DAF) Compress-and-forward (CAF) Decode-and-forward: Relay decodes (learns) the message. No secrecy is possible. Compress-and-forward: Relay does not need to decode the message. Can it be useful for secrecy? Achievable secrecy rate when relay uses CAF: I(X 1 ;Y 1,Ŷ 1 X 2 ) I(X 1 ;Y 2 X 2 ) = I(X 1 ;Y 1 X 2 ) I(X 1 ;Y 2 X 2 ) }{{} +I(X 1;Ŷ 1 X 2,Y 1 ) }{{} secrecy rate of the wiretap channel additional term due to CAF 41

42 Gaussian Relay Broadcast Channel (Charles is Stronger) Joint jamming and relaying Relaying 0.1 R (bits/channel use) R 1 Charles/Eve Alice R 2 Bob R 1 (bits/channel use) Bob cannot have any positive secrecy rate without cooperation. Cooperation is beneficial for secrecy if CAF based relaying (cooperation) is employed. Charles can further improve his own secrecy by joint relaying and jamming. 42

43 Secure Degrees of Freedom: Motivation For most multi-user wiretap channels, secrecy capacity is unknown. Partial characterization in the high power, P, regime. Secure degrees of freedom (d.o.f.) is defined as: Rest of this talk: Secrecy penalty paid in d.o.f Role of a helper for security D.o.f. optimal deaf cooperation D s = lim P Secure d.o.f. of some multi-user channels C s 1 2 logp 43

44 Canonical Gaussian Wiretap Channel Canonical Gaussian wiretap channel with power P, N 1 X h Y g N 2 Z The secrecy capacity is known exactly: C s = 1 2 log( 1 + h 2 P ) 1 2 log( 1 + g 2 P ) In this case, C s does not scale with logp, and D s = 0. Severe penalty for secrecy. D.o.f. goes from 1 to 0 due to secrecy. 44

45 Cooperative Jamming Cooperative jamming from helpers improves secure rates [Tekin, Yener, 2008]. N 1 W X 1 h 1 Y 1 Ŵ g 1 N 2 Y 2 W Secure d.o.f. with i.i.d. Gaussian cooperative jamming is still zero. Positive secure d.o.f. by using nested lattice codes [He, Yener, 2009]. Question: What is the exact secure d.o.f.? 45

46 Gaussian Wiretap Channel with M Helpers The exact secure d.o.f. with M helpers is M M+1. Even though they are independent, more helpers is better. N 1 W X 1 g1 h 1 Y 1 Ŵ X 2 N 2 X 3 Y 2 W X M+1 Tools: Real interference alignment and structured coding. Xie et. al., Secure Degrees of Freedom of the Gaussian Wiretap Channel with Helpers, Allerton Conference,

47 Secure Signal Alignment with M Helpers Alignment for the M = 2 case: V 2 V 3 V 2 V 3 U 2 X 1 h 1 Y 1 g 1 U 3 U 2 X 2 Y 2 V 2 V 3 U 2 U 3 U 3 X 3 The transmitter sends M independent sub-messages. M helpers send an independent cooperative jamming signal each. Each cooperative jamming signal is aligned with one sub-message at the eavesdropper. All cooperative jamming signals are aligned together at the legitimate receiver. 47

48 Eavesdropper CSI? The previous achievable scheme required perfect knowledge of eavesdropper CSI. V 2 V 3 X 1 h 1 Y 1 V 2 V 3 U 2 g 1 U 3 U 2 X 2 Y 2 V 2 V 3 U 2 U 3 U 3 X 3 Generally, it is difficult or impossible to obtain the eavesdropper s CSI. Question: What is the exact secure d.o.f. without eavesdropper CSI? The exact secure d.o.f. is still M M+1. Xie et. al., Secure Degrees of Freedom of the Gaussian Wiretap Channel with Helpers and No Eavesdropper CSI: Blind Cooperative Jamming, CISS

49 Secure Signal Alignment with M Helpers without Eavesdropper CSI Alignment for M = 2 helpers without eavesdropper CSI: U 1 V 2 V 3 U 1 V 2 V 3 U 2 X 1 h 1 Y 1 g 1 U 3 U 2 X 2 Y 2 V 2 V 3 U 1 U 2 U 3 U 3 X 3 The transmitter sends M independent sub-messages and also a cooperative jamming signal. M helpers send an independent cooperative jamming signal each. All M + 1 cooperative jamming signals are blue aligned together at the legitimate receiver. All cooperative jamming signals span the entire space at the eavesdropper. 49

50 Multiple Access Wiretap Channel Each user has its own message to be kept secret from the external eavesdropper. N 1 W 1 X 1 Y 1 Ŵ 1 Ŵ 2 ˆ W K W 2 X 2 N 2 Y 2 W 1 W 2 W K W 3 X 3 W K X K The exact sum secure d.o.f. is K(K 1) K(K 1)+1. Xie et. al., Secure Degrees of Freedom of the Gaussian Multiple Access Wiretap Channel, ISIT

51 Secure Signal Alignment for the Multiple Access Channel Alignment for the K = 3 case: U 1 U 1 V 1 X 1 Y 1 U 2 V 1 V 2 V 3 U 3 U 2 U 1 U 2 U 3 V 2 X 2 Y 2 V 1 V 2 V 3 U 3 V 3 X 3 Each transmitter divides its own message into K 1 sub-messages. The total K jamming signals from the K users span the whole space at the eavesdropper. The jamming signals are aligned in the same dimension at the legitimate receiver. 51

52 Secure Signal Alignment for the Multiple Access Channel Alignment for the K = 3 case: U 1 U 1 V 1 X 1 Y 1 U 2 V 1 V 2 V 3 }{{} K(K 1) { 1 U 3 V 2 U 2 X 2 Y 2 U 1 U 2 U 3 V 1 V 2 V 3 U 3 V 3 X 3 Each transmitter divides its own message into K 1 sub-messages. The total K jamming signals from the K users span the whole space at the eavesdropper. The jamming signals are aligned in the same dimension at the legitimate receiver. 52

53 Interference Channel with an External Eavesdropper External eavesdropper model (IC-EE). W 1 X 1 Y 1 Ŵ 1 W 2 X 2 Y 2 Ŵ 2 W K X K Y K Ŵ K Z W K 1 Secure all messages against the external eavesdropper. 53

54 Interference Channel with Confidential Messages Confidential message model (IC-CM). W 1 X 1 Y 1 Ŵ 1 W K 1 W 2 X 2 Y 2 Ŵ 2 W K 2 W K X K Y K Ŵ K W K K Secure all messages against all unintended receivers. 54

55 Unified Model: Internal and External Security Interference channel with confidential messages and one external eavesdropper (IC-CM-EE): W 1 X 1 Y 1 Ŵ 1 W K 1 W 2 X Y 2 W 2 K 2 Ŵ 2 W K X K Y K Ŵ K W K K Z W K 1 Secure all messages against the internal unintended receivers and the external eavesdropper. 55

56 Secure Signal Alignment for the Unified K-User IC-CM-EE The exact sum secure dof is K(K 1) 2K 1. Added challenge: simultaneous alignment at multiple receivers. V 12 V 13 U 1 X 1 Y 1 V 12 V 13 U 1 V 21 U 2 V 23 V 31 V 32 U 3 V 21 V 23 U 2 X 2 Y 2 V 21 V 23 U 2 V 32 U 3 V 31 V 12 V 13 U 1 V 31 V 32 U 3 Y 3 X 3 V 31 V 32 U 3 V 13 U 1 V 12 V 23 V 21 U 2 Z U 1 V 12 V 13 V 21 U 2 V 23 Xie et. al., Unified Secure DoF Analysis of K-User Gaussian Interference Channels, ISIT V 31 V 32 U 3

57 Going Back to where We have Started Cryptography at higher layers of the protocol stack based on the assumption of limited computational power at Eve vulnerable to large-scale implementation of quantum computers Techniques like frequency hopping, CDMA at the physical layer based on the assumption of limited knowledge at Eve vulnerable to rogue or captured node events Physical layer security at the physical layer no assumption on Eve s computational power no assumption on Eve s available information unbreakable, provable, and quantifiable (in bits/sec/hertz) implementable by signal processing, communications, and coding techniques 57

58 Going Back to where We have Started Cryptography at higher layers of the protocol stack based on the assumption of limited computational power at Eve vulnerable to large-scale implementation of quantum computers Techniques like frequency hopping, CDMA at the physical layer based on the assumption of limited knowledge at Eve vulnerable to rogue or captured node events Physical layer security at the physical layer no assumption on Eve s computational power no assumption on Eve s available information unbreakable, provable, and quantifiable (in bits/sec/hertz) implementable by signal processing, communications, and coding techniques 58

59 Going Back to where We have Started Cryptography at higher layers of the protocol stack based on the assumption of limited computational power at Eve vulnerable to large-scale implementation of quantum computers Techniques like frequency hopping, CDMA at the physical layer based on the assumption of limited knowledge at Eve vulnerable to rogue or captured node events Physical layer security at the physical layer no assumption on Eve s computational power no assumption on Eve s available information based on the assumption of limited???????? at Eve unbreakable, provable, and quantifiable (in bits/sec/hertz) implementable by signal processing, communications, and coding techniques 59

60 Two Recurring Themes Creating advantage for the legitimate users: computational advantage (cryptography) knowledge advantage (spread spectrum) channel advantage (physical layer security) Exhausting capabilities of the illegitimate entities: exhausting computational power (cryptography) exhausting searching power (spread spectrum) exhausting decoding capability (physical layer security) 60

61 Three Dimensions of Advantage Three known dimensions of advantage: knowledge, computational, channel advantage. knowledge advantage SS PLS Crypto computational advantage channel advantage Each method uses only one possible dimension of advantage. 61

62 Hybrid Schemes Hybrid schemes: move to another dimension when an advantage is lost. knowledge advantage SS PLS Crypto computational advantage channel advantage hybrid schemes Still a single dimension is used. 62

63 Hybrid Schemes Hybrid schemes: move to another dimension when an advantage is lost. knowledge advantage SS PLS Crypto computational advantage channel advantage hybrid schemes Still a single dimension is used. 63

64 Combined Schemes Combine and utilize multiple dimensions of advantage knowledge advantage PLS SS Crypto computational advantage channel advantage combined schemes Multi-dimensional, multi-faceted, cross-layer security. 64

65 Conclusions Wireless communication is susceptible to eavesdropping and jamming attacks. Wireless medium also offers ways to neutralize the loss of confidentiality: time, frequency, multi-user diversity via fading cooperation via overheard signals multi-dimensional signalling via multiple antennas secure signal alignment Information theory directs us to methods that can be used to achieve: unbreakable, provable, and quantifiable (in bits/sec/hertz) security irrespective of the adversary s computation power or inside knowledge Resulting schemes implementable by signal processing, communications and coding tech. Many open problems... 65

Secure Degrees of Freedom of the Gaussian MIMO Wiretap and MIMO Broadcast Channels with Unknown Eavesdroppers

Secure Degrees of Freedom of the Gaussian MIMO Wiretap and MIMO Broadcast Channels with Unknown Eavesdroppers 1 Secure Degrees of Freedom of the Gaussian MIMO Wiretap and MIMO Broadcast Channels with Unknown Eavesdroppers Mohamed Amir and Tamer Khattab Electrical Engineering, Qatar University Email: mohamed.amir@qu.edu.qa,

More information

Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications

Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications 1 Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications Shaofeng Zou, Student Member, IEEE, Yingbin Liang, Member, IEEE, Lifeng Lai, Member, IEEE, H. Vincent Poor, Fellow,

More information

On Secure Signaling for the Gaussian Multiple Access Wire-Tap Channel

On Secure Signaling for the Gaussian Multiple Access Wire-Tap Channel On ecure ignaling for the Gaussian Multiple Access Wire-Tap Channel Ender Tekin tekin@psu.edu emih Şerbetli serbetli@psu.edu Wireless Communications and Networking Laboratory Electrical Engineering Department

More information

Artificial Intersymbol Interference (ISI) to Exploit Receiver Imperfections for Secrecy

Artificial Intersymbol Interference (ISI) to Exploit Receiver Imperfections for Secrecy Artificial Intersymbol Interference ISI to Exploit Receiver Imperfections for Secrecy Azadeh Sheikholeslami, Dennis Goeckel and Hossein ishro-nik Electrical and Computer Engineering Department, University

More information

Information Theoretic Security: Fundamentals and Applications

Information Theoretic Security: Fundamentals and Applications Information Theoretic Security: Fundamentals and Applications Ashish Khisti University of Toronto IPSI Seminar Nov 25th 23 Ashish Khisti (University of Toronto) / 35 Layered Architectures Layered architecture

More information

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)

More information

Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective

Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective Naroa Zurutuza - EE360 Winter 2014 Introduction Cognitive Radio: Wireless communication system that intelligently

More information

Diversity Gain Region for MIMO Fading Multiple Access Channels

Diversity Gain Region for MIMO Fading Multiple Access Channels Diversity Gain Region for MIMO Fading Multiple Access Channels Lihua Weng, Sandeep Pradhan and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor,

More information

Everlasting Security and Undetectability in Wireless Communications

Everlasting Security and Undetectability in Wireless Communications Everlasting Security and Undetectability in Wireless Communications ICNC Lecture February 6, 2014 Dennis Goeckel University of Massachusetts Amherst This work is supported by the National Science Foundation

More information

Cooperation in Wireless Networks

Cooperation in Wireless Networks Cooperation in Wireless Networks Ivana Marić and Ron Dabora Stanford 15 September 2008 Ivana Marić and Ron Dabora Cooperation in Wireless Networks 1 Objectives The case for cooperation Types of cooperation

More information

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,

More information

Interference Management in Wireless Networks

Interference Management in Wireless Networks Interference Management in Wireless Networks Aly El Gamal Department of Electrical and Computer Engineering Purdue University Venu Veeravalli Coordinated Science Lab Department of Electrical and Computer

More information

Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper s Receiver

Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper s Receiver Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper s Receiver Azadeh Sheikholeslami, Student Member, IEEE, Dennis Goeckel, Fellow, IEEE and Hossein Pishro-Nik, Member, IEEE Abstract Secure

More information

Exploiting Interference through Cooperation and Cognition

Exploiting Interference through Cooperation and Cognition Exploiting Interference through Cooperation and Cognition Stanford June 14, 2009 Joint work with A. Goldsmith, R. Dabora, G. Kramer and S. Shamai (Shitz) The Role of Wireless in the Future The Role of

More information

A Bit of network information theory

A Bit of network information theory Š#/,% 0/,94%#(.)15% A Bit of network information theory Suhas Diggavi 1 Email: suhas.diggavi@epfl.ch URL: http://licos.epfl.ch Parts of talk are joint work with S. Avestimehr 2, S. Mohajer 1, C. Tian 3,

More information

Power and Bandwidth Allocation in Cooperative Dirty Paper Coding

Power and Bandwidth Allocation in Cooperative Dirty Paper Coding Power and Bandwidth Allocation in Cooperative Dirty Paper Coding Chris T. K. Ng 1, Nihar Jindal 2 Andrea J. Goldsmith 3, Urbashi Mitra 4 1 Stanford University/MIT, 2 Univeristy of Minnesota 3 Stanford

More information

Lecture 8 Multi- User MIMO

Lecture 8 Multi- User MIMO Lecture 8 Multi- User MIMO I-Hsiang Wang ihwang@ntu.edu.tw 5/7, 014 Multi- User MIMO System So far we discussed how multiple antennas increase the capacity and reliability in point-to-point channels Question:

More information

OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL

OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 6, December 06 OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL Zouhair Al-qudah Communication Engineering Department, AL-Hussein

More information

Optimal Power Allocation over Fading Channels with Stringent Delay Constraints

Optimal Power Allocation over Fading Channels with Stringent Delay Constraints 1 Optimal Power Allocation over Fading Channels with Stringent Delay Constraints Xiangheng Liu Andrea Goldsmith Dept. of Electrical Engineering, Stanford University Email: liuxh,andrea@wsl.stanford.edu

More information

Cooperative versus Full-Duplex Communication in Cellular Networks: A Comparison of the Total Degrees of Freedom. Amr El-Keyi and Halim Yanikomeroglu

Cooperative versus Full-Duplex Communication in Cellular Networks: A Comparison of the Total Degrees of Freedom. Amr El-Keyi and Halim Yanikomeroglu Cooperative versus Full-Duplex Communication in Cellular Networks: A Comparison of the Total Degrees of Freedom Amr El-Keyi and Halim Yanikomeroglu Outline Introduction Full-duplex system Cooperative system

More information

Degrees of Freedom of the MIMO X Channel

Degrees of Freedom of the MIMO X Channel Degrees of Freedom of the MIMO X Channel Syed A. Jafar Electrical Engineering and Computer Science University of California Irvine Irvine California 9697 USA Email: syed@uci.edu Shlomo Shamai (Shitz) Department

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties

More information

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels Kambiz Azarian, Hesham El Gamal, and Philip Schniter Dept of Electrical Engineering, The Ohio State University Columbus, OH

More information

Information flow over wireless networks: a deterministic approach

Information flow over wireless networks: a deterministic approach Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory

More information

ECE 4400:693 - Information Theory

ECE 4400:693 - Information Theory ECE 4400:693 - Information Theory Dr. Nghi Tran Lecture 1: Introduction & Overview Dr. Nghi Tran (ECE-University of Akron) ECE 4400:693 Information Theory 1 / 26 Outline 1 Course Information 2 Course Overview

More information

Course Developer: Ranjan Bose, IIT Delhi

Course Developer: Ranjan Bose, IIT Delhi Course Title: Coding Theory Course Developer: Ranjan Bose, IIT Delhi Part I Information Theory and Source Coding 1. Source Coding 1.1. Introduction to Information Theory 1.2. Uncertainty and Information

More information

Degrees of Freedom of Bursty Multiple Access Channels with a Relay

Degrees of Freedom of Bursty Multiple Access Channels with a Relay Fifty-third Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 29 - October 2, 205 Degrees of Freedom of Bursty Multiple Access Channels with a Relay Sunghyun im and Changho Suh Department

More information

DoF Analysis in a Two-Layered Heterogeneous Wireless Interference Network

DoF Analysis in a Two-Layered Heterogeneous Wireless Interference Network DoF Analysis in a Two-Layered Heterogeneous Wireless Interference Network Meghana Bande, Venugopal V. Veeravalli ECE Department and CSL University of Illinois at Urbana-Champaign Email: {mbande,vvv}@illinois.edu

More information

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Fan Xu Kangqi Liu and Meixia Tao Dept of Electronic Engineering Shanghai Jiao Tong University Shanghai China Emails:

More information

Secure Degrees of Freedom of Multiuser Networks: One-Time-Pads in the Air via Alignment

Secure Degrees of Freedom of Multiuser Networks: One-Time-Pads in the Air via Alignment INVITED PAPER Secure Degrees of Freedom of Multiuser Networks: One-Time-Pads in the Air via Alignment Interference alignment techniques are powerful methods that best exploit available degrees of freedom

More information

A Practical Method to Achieve Perfect Secrecy

A Practical Method to Achieve Perfect Secrecy A Practical Method to Achieve Perfect Secrecy Amir K. Khandani E&CE Department, University of Waterloo August 3 rd, 2014 Perfect Secrecy: One-time Pad One-time Pad: Bit-wise XOR of a (non-reusable) binary

More information

Prevention of Eavesdropping in OFDMA Systems

Prevention of Eavesdropping in OFDMA Systems Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 12, Number 1 (2016), pp. 453-461 Research India Publications http://www.ripublication.com Prevention of Eavesdropping in OFDMA Systems

More information

Chapter 10. User Cooperative Communications

Chapter 10. User Cooperative Communications Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication

More information

Space-Time Interference Alignment and Degrees of Freedom Regions for the MISO Broadcast Channel with Periodic CSI Feedback

Space-Time Interference Alignment and Degrees of Freedom Regions for the MISO Broadcast Channel with Periodic CSI Feedback 1 Space-Time Interference Alignment and Degrees of Freedom Regions for the MISO Broadcast Channel with Periodic CSI Feedback Namyoon Lee and Robert W Heath Jr arxiv:13083272v1 [csit 14 Aug 2013 Abstract

More information

Beamforming algorithm for physical layer security of multi user large scale antenna network

Beamforming algorithm for physical layer security of multi user large scale antenna network , pp.35-40 http://dx.doi.org/10.14257/astl.2016.134.06 Beamforming algorithm for physical layer security of multi user large scale antenna network Zhou Wen-gang, Li Jing, Guo Hui-ling (School of computer

More information

Interference Alignment for Heterogeneous Full-Duplex Cellular Networks. Amr El-Keyi and Halim Yanikomeroglu

Interference Alignment for Heterogeneous Full-Duplex Cellular Networks. Amr El-Keyi and Halim Yanikomeroglu Interference Alignment for Heterogeneous Full-Duplex Cellular Networks Amr El-Keyi and Halim Yanikomeroglu 1 Outline Introduction System Model Main Results Outer bounds on the DoF Optimum Antenna Allocation

More information

Joint Relaying and Network Coding in Wireless Networks

Joint Relaying and Network Coding in Wireless Networks Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block

More information

Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless

Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless Forty-Ninth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 28-30, 2011 Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless Zhiyu Cheng, Natasha

More information

The Degrees of Freedom of Full-Duplex. Bi-directional Interference Networks with and without a MIMO Relay

The Degrees of Freedom of Full-Duplex. Bi-directional Interference Networks with and without a MIMO Relay The Degrees of Freedom of Full-Duplex 1 Bi-directional Interference Networks with and without a MIMO Relay Zhiyu Cheng, Natasha Devroye, Tang Liu University of Illinois at Chicago zcheng3, devroye, tliu44@uic.edu

More information

6 Multiuser capacity and

6 Multiuser capacity and CHAPTER 6 Multiuser capacity and opportunistic communication In Chapter 4, we studied several specific multiple access techniques (TDMA/FDMA, CDMA, OFDM) designed to share the channel among several users.

More information

Information Theory: the Day after Yesterday

Information Theory: the Day after Yesterday : the Day after Yesterday Department of Electrical Engineering and Computer Science Chicago s Shannon Centennial Event September 23, 2016 : the Day after Yesterday IT today Outline The birth of information

More information

On the Capacity Regions of Two-Way Diamond. Channels

On the Capacity Regions of Two-Way Diamond. Channels On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of

More information

Outage Probability of a Multi-User Cooperation Protocol in an Asynchronous CDMA Cellular Uplink

Outage Probability of a Multi-User Cooperation Protocol in an Asynchronous CDMA Cellular Uplink Outage Probability of a Multi-User Cooperation Protocol in an Asynchronous CDMA Cellular Uplink Kanchan G. Vardhe, Daryl Reynolds, and Matthew C. Valenti Lane Dept. of Comp. Sci and Elec. Eng. West Virginia

More information

Block Markov Encoding & Decoding

Block Markov Encoding & Decoding 1 Block Markov Encoding & Decoding Deqiang Chen I. INTRODUCTION Various Markov encoding and decoding techniques are often proposed for specific channels, e.g., the multi-access channel (MAC) with feedback,

More information

Degrees of Freedom in Multiuser MIMO

Degrees of Freedom in Multiuser MIMO Degrees of Freedom in Multiuser MIMO Syed A Jafar Electrical Engineering and Computer Science University of California Irvine, California, 92697-2625 Email: syed@eceuciedu Maralle J Fakhereddin Department

More information

CHAPTER 5 DIVERSITY. Xijun Wang

CHAPTER 5 DIVERSITY. Xijun Wang CHAPTER 5 DIVERSITY Xijun Wang WEEKLY READING 1. Goldsmith, Wireless Communications, Chapters 7 2. Tse, Fundamentals of Wireless Communication, Chapter 3 2 FADING HURTS THE RELIABILITY n The detection

More information

Interference: An Information Theoretic View

Interference: An Information Theoretic View Interference: An Information Theoretic View David Tse Wireless Foundations U.C. Berkeley ISIT 2009 Tutorial June 28 Thanks: Changho Suh. Context Two central phenomena in wireless communications: Fading

More information

Power Allocation Tradeoffs in Multicarrier Authentication Systems

Power Allocation Tradeoffs in Multicarrier Authentication Systems Power Allocation Tradeoffs in Multicarrier Authentication Systems Paul L. Yu, John S. Baras, and Brian M. Sadler Abstract Physical layer authentication techniques exploit signal characteristics to identify

More information

Performance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel

Performance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel Performance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel Sara Viqar 1, Shoab Ahmed 2, Zaka ul Mustafa 3 and Waleed Ejaz 4 1, 2, 3 National University

More information

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

Interleaving And Channel Encoding Of Data Packets In Wireless Communications Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218

More information

Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks

Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks B.Vijayanarasimha Raju 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:

More information

On Optimum Communication Cost for Joint Compression and Dispersive Information Routing

On Optimum Communication Cost for Joint Compression and Dispersive Information Routing 2010 IEEE Information Theory Workshop - ITW 2010 Dublin On Optimum Communication Cost for Joint Compression and Dispersive Information Routing Kumar Viswanatha, Emrah Akyol and Kenneth Rose Department

More information

On Fading Broadcast Channels with Partial Channel State Information at the Transmitter

On Fading Broadcast Channels with Partial Channel State Information at the Transmitter On Fading Broadcast Channels with Partial Channel State Information at the Transmitter Ravi Tandon 1, ohammad Ali addah-ali, Antonia Tulino, H. Vincent Poor 1, and Shlomo Shamai 3 1 Dept. of Electrical

More information

CSIsnoop: Attacker Inference of Channel State Information in Multi-User WLANs

CSIsnoop: Attacker Inference of Channel State Information in Multi-User WLANs CSIsnoop: Attacker Inference of Channel State Information in Multi-User WLANs Xu Zhang and Edward W. Knightly ECE Department, Rice University Channel State Information (CSI) CSI plays a key role in wireless

More information

OPTIMIZATION OF TRANSMIT SIGNALS TO INTERFERE EAVESDROPPING IN A WIRELESS LAN

OPTIMIZATION OF TRANSMIT SIGNALS TO INTERFERE EAVESDROPPING IN A WIRELESS LAN 04 IEEE International Conference on Acoustic, Speech and Signal Processing ICASSP) OPTIMIZATION OF TRANSMIT SIGNALS TO INTERFERE EAVESDROPPING IN A WIRELESS LAN Shuichi Ohno, Yuji Wakasa, Shui Qiang Yan,

More information

Lecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications

Lecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications COMM 907: Spread Spectrum Communications Lecture 10 - LTE (4G) -Technologies used in 4G and 5G The Need for LTE Long Term Evolution (LTE) With the growth of mobile data and mobile users, it becomes essential

More information

Opportunistic network communications

Opportunistic network communications Opportunistic network communications Suhas Diggavi School of Computer and Communication Sciences Laboratory for Information and Communication Systems (LICOS) Ecole Polytechnique Fédérale de Lausanne (EPFL)

More information

Massive MIMO: Signal Structure, Efficient Processing, and Open Problems I

Massive MIMO: Signal Structure, Efficient Processing, and Open Problems I Massive MIMO: Signal Structure, Efficient Processing, and Open Problems I Saeid Haghighatshoar Communications and Information Theory Group (CommIT) Technische Universität Berlin CoSIP Winter Retreat Berlin,

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

THE emergence of multiuser transmission techniques for

THE emergence of multiuser transmission techniques for IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 54, NO. 10, OCTOBER 2006 1747 Degrees of Freedom in Wireless Multiuser Spatial Multiplex Systems With Multiple Antennas Wei Yu, Member, IEEE, and Wonjong Rhee,

More information

Guaranteeing Secrecy in Wireless Networks using Artificial Noise

Guaranteeing Secrecy in Wireless Networks using Artificial Noise Guaranteeing Secrecy in Wireless Networks using Artificial Noise Submitted by: Satashu Goel Department of Electrical and Computer Engineering Advisor: Professor Rohit Negi Department of Electrical and

More information

THIS paper addresses the interference channel with a

THIS paper addresses the interference channel with a IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 6, NO. 8, AUGUST 07 599 The Degrees of Freedom of the Interference Channel With a Cognitive Relay Under Delayed Feedback Hyo Seung Kang, Student Member, IEEE,

More information

Cooperative Orthogonal Space-Time-Frequency Block Codes over a MIMO-OFDM Frequency Selective Channel

Cooperative Orthogonal Space-Time-Frequency Block Codes over a MIMO-OFDM Frequency Selective Channel Cooperative Orthogonal Space-Time-Frequency Block Codes over a MIMO-OFDM Frequency Selective Channel M. Rezaei* and A. Falahati* (C.A.) Abstract: In this paper, a cooperative algorithm to improve the orthogonal

More information

Multiple Antennas. Mats Bengtsson, Björn Ottersten. Basic Transmission Schemes 1 September 8, Presentation Outline

Multiple Antennas. Mats Bengtsson, Björn Ottersten. Basic Transmission Schemes 1 September 8, Presentation Outline Multiple Antennas Capacity and Basic Transmission Schemes Mats Bengtsson, Björn Ottersten Basic Transmission Schemes 1 September 8, 2005 Presentation Outline Channel capacity Some fine details and misconceptions

More information

Scheduling in omnidirectional relay wireless networks

Scheduling in omnidirectional relay wireless networks Scheduling in omnidirectional relay wireless networks by Shuning Wang A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied Science

More information

arxiv: v1 [cs.it] 12 Jan 2011

arxiv: v1 [cs.it] 12 Jan 2011 On the Degree of Freedom for Multi-Source Multi-Destination Wireless Networ with Multi-layer Relays Feng Liu, Chung Chan, Ying Jun (Angela) Zhang Abstract arxiv:0.2288v [cs.it] 2 Jan 20 Degree of freedom

More information

Information Theory at the Extremes

Information Theory at the Extremes Information Theory at the Extremes David Tse Department of EECS, U.C. Berkeley September 5, 2002 Wireless Networks Workshop at Cornell Information Theory in Wireless Wireless communication is an old subject.

More information

Downlink Performance of Cell Edge User Using Cooperation Scheme in Wireless Cellular Network

Downlink Performance of Cell Edge User Using Cooperation Scheme in Wireless Cellular Network Quest Journals Journal of Software Engineering and Simulation Volume1 ~ Issue1 (2013) pp: 07-12 ISSN(Online) :2321-3795 ISSN (Print):2321-3809 www.questjournals.org Research Paper Downlink Performance

More information

Delay Tolerant Cooperation in the Energy Harvesting Multiple Access Channel

Delay Tolerant Cooperation in the Energy Harvesting Multiple Access Channel Delay Tolerant Cooperation in the Energy Harvesting Multiple Access Channel Onur Kaya, Nugman Su, Sennur Ulukus, Mutlu Koca Isik University, Istanbul, Turkey, onur.kaya@isikun.edu.tr Bogazici University,

More information

ELEC E7210: Communication Theory. Lecture 11: MIMO Systems and Space-time Communications

ELEC E7210: Communication Theory. Lecture 11: MIMO Systems and Space-time Communications ELEC E7210: Communication Theory Lecture 11: MIMO Systems and Space-time Communications Overview of the last lecture MIMO systems -parallel decomposition; - beamforming; - MIMO channel capacity MIMO Key

More information

PIMRC 2016: Practical Examples of Physical Layer Security

PIMRC 2016: Practical Examples of Physical Layer Security PIMRC 2016: Practical Examples of Physical Layer Security 4 September 2016, Valencia How it looks from outside "All you need to make a movie is a girl and a gun" Jean-Luc Godard How it looks from outside

More information

SourceSync. Exploiting Sender Diversity

SourceSync. Exploiting Sender Diversity SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored

More information

MOBILE data demands are on the rise at an alarming

MOBILE data demands are on the rise at an alarming IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 6, JUNE 2018 4581 A Relay Can Increase Degrees of Freedom in Bursty Interference Networks Sunghyun Kim, I-Hsiang Wang, and Changho Suh, Member, IEEE

More information

Throughput Improvement for Cell-Edge Users Using Selective Cooperation in Cellular Networks

Throughput Improvement for Cell-Edge Users Using Selective Cooperation in Cellular Networks Throughput Improvement for Cell-Edge Users Using Selective Cooperation in Cellular Networks M. R. Ramesh Kumar S. Bhashyam D. Jalihal Sasken Communication Technologies,India. Department of Electrical Engineering,

More information

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems MIMO Each node has multiple antennas Capable of transmitting (receiving) multiple streams

More information

Wireless Network Coding with Local Network Views: Coded Layer Scheduling

Wireless Network Coding with Local Network Views: Coded Layer Scheduling Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the

More information

Capacity and Cooperation in Wireless Networks

Capacity and Cooperation in Wireless Networks Capacity and Cooperation in Wireless Networks Chris T. K. Ng and Andrea J. Goldsmith Stanford University Abstract We consider fundamental capacity limits in wireless networks where nodes can cooperate

More information

Multicasting over Multiple-Access Networks

Multicasting over Multiple-Access Networks ing oding apacity onclusions ing Department of Electrical Engineering and omputer Sciences University of alifornia, Berkeley May 9, 2006 EE 228A Outline ing oding apacity onclusions 1 2 3 4 oding 5 apacity

More information

Computing and Communications 2. Information Theory -Channel Capacity

Computing and Communications 2. Information Theory -Channel Capacity 1896 1920 1987 2006 Computing and Communications 2. Information Theory -Channel Capacity Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Communication

More information

Wireless Network Information Flow

Wireless Network Information Flow Š#/,% 0/,94%#(.)15% Wireless Network Information Flow Suhas iggavi School of Computer and Communication Sciences, Laboratory for Information and Communication Systems (LICOS), EPFL Email: suhas.diggavi@epfl.ch

More information

Cryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1

Cryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1 Cryptography CS 555 Topic 20: Other Public Key Encryption Schemes Topic 20 1 Outline and Readings Outline Quadratic Residue Rabin encryption Goldwasser-Micali Commutative encryption Homomorphic encryption

More information

The Multi-way Relay Channel

The Multi-way Relay Channel The Multi-way Relay Channel Deniz Gündüz, Aylin Yener, Andrea Goldsmith, H. Vincent Poor Department of Electrical Engineering, Stanford University, Stanford, CA Department of Electrical Engineering, Princeton

More information

Secure communication based on noisy input data Fuzzy Commitment schemes. Stephan Sigg

Secure communication based on noisy input data Fuzzy Commitment schemes. Stephan Sigg Secure communication based on noisy input data Fuzzy Commitment schemes Stephan Sigg May 24, 2011 Overview and Structure 05.04.2011 Organisational 15.04.2011 Introduction 19.04.2011 Classification methods

More information

PERFORMANCE OF TWO-PATH SUCCESSIVE RELAYING IN THE PRESENCE OF INTER-RELAY INTERFERENCE

PERFORMANCE OF TWO-PATH SUCCESSIVE RELAYING IN THE PRESENCE OF INTER-RELAY INTERFERENCE PERFORMANCE OF TWO-PATH SUCCESSIVE RELAYING IN THE PRESENCE OF INTER-RELAY INTERFERENCE 1 QIAN YU LIAU, 2 CHEE YEN LEOW Wireless Communication Centre, Faculty of Electrical Engineering, Universiti Teknologi

More information

Solution: Alice tosses a coin and conveys the result to Bob. Problem: Alice can choose any result.

Solution: Alice tosses a coin and conveys the result to Bob. Problem: Alice can choose any result. Example - Coin Toss Coin Toss: Alice and Bob want to toss a coin. Easy to do when they are in the same room. How can they toss a coin over the phone? Mutual Commitments Solution: Alice tosses a coin and

More information

SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE

SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE Int. J. Chem. Sci.: 14(S3), 2016, 794-800 ISSN 0972-768X www.sadgurupublications.com SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE ADITYA SAI *, ARSHEYA AFRAN and PRIYANKA Information

More information

EE360: Lecture 6 Outline MUD/MIMO in Cellular Systems

EE360: Lecture 6 Outline MUD/MIMO in Cellular Systems EE360: Lecture 6 Outline MUD/MIMO in Cellular Systems Announcements Project proposals due today Makeup lecture tomorrow Feb 2, 5-6:15, Gates 100 Multiuser Detection in cellular MIMO in Cellular Multiuser

More information

A unified graphical approach to

A unified graphical approach to A unified graphical approach to 1 random coding for multi-terminal networks Stefano Rini and Andrea Goldsmith Department of Electrical Engineering, Stanford University, USA arxiv:1107.4705v3 [cs.it] 14

More information

EE359 Discussion Session 8 Beamforming, Diversity-multiplexing tradeoff, MIMO receiver design, Multicarrier modulation

EE359 Discussion Session 8 Beamforming, Diversity-multiplexing tradeoff, MIMO receiver design, Multicarrier modulation EE359 Discussion Session 8 Beamforming, Diversity-multiplexing tradeoff, MIMO receiver design, Multicarrier modulation November 29, 2017 EE359 Discussion 8 November 29, 2017 1 / 33 Outline 1 MIMO concepts

More information

On the Optimum Power Allocation in the One-Side Interference Channel with Relay

On the Optimum Power Allocation in the One-Side Interference Channel with Relay 2012 IEEE Wireless Communications and etworking Conference: Mobile and Wireless etworks On the Optimum Power Allocation in the One-Side Interference Channel with Relay Song Zhao, Zhimin Zeng, Tiankui Zhang

More information

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels 1 Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University njindal, andrea@systems.stanford.edu Submitted to IEEE Trans.

More information

KURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 1, Juli 2017

KURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 1, Juli 2017 Jurnal Ilmiah KURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 1, Juli 2017 ISSN 0216 0544 e-issn 2301 6914 OPTIMAL RELAY DESIGN OF ZERO FORCING EQUALIZATION FOR MIMO MULTI WIRELESS RELAYING NETWORKS

More information

Fig.1channel model of multiuser ss OSTBC system

Fig.1channel model of multiuser ss OSTBC system IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. V (Feb. 2014), PP 48-52 Cooperative Spectrum Sensing In Cognitive Radio

More information

Cloud-Based Cell Associations

Cloud-Based Cell Associations Cloud-Based Cell Associations Aly El Gamal Department of Electrical and Computer Engineering Purdue University ITA Workshop, 02/02/16 2 / 23 Cloud Communication Global Knowledge / Control available at

More information

Collaborative transmission in wireless sensor networks

Collaborative transmission in wireless sensor networks Collaborative transmission in wireless sensor networks Cooperative transmission schemes Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg

More information

Symmetric Decentralized Interference Channels with Noisy Feedback

Symmetric Decentralized Interference Channels with Noisy Feedback 4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en

More information

Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying

Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying 013 IEEE International Symposium on Information Theory Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying M. Jorgovanovic, M. Weiner, D. Tse and B. Nikolić

More information

Channel Estimation and Multiple Access in Massive MIMO Systems. Junjie Ma, Chongbin Xu and Li Ping City University of Hong Kong, Hong Kong

Channel Estimation and Multiple Access in Massive MIMO Systems. Junjie Ma, Chongbin Xu and Li Ping City University of Hong Kong, Hong Kong Channel Estimation and Multiple Access in Massive MIMO Systems Junjie Ma, Chongbin Xu and Li Ping City University of Hong Kong, Hong Kong 1 Main references Li Ping, Lihai Liu, Keying Wu, and W. K. Leung,

More information

Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels

Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels IET Communications Research Article Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels ISSN 1751-8628 Received on 28th July 2014 Accepted

More information