Physical Layer Security for Wireless Networks
|
|
- Patrick Wilkins
- 6 years ago
- Views:
Transcription
1 Physical Layer Security for Wireless Networks Şennur Ulukuş Department of ECE University of Maryland Joint work with Shabnam Shafiee, Nan Liu, Ersen Ekrem, Jianwei Xie and Pritam Mukherjee. LTS, August 22,
2 Security in Wireless Systems Inherent openness in wireless communications channel: eavesdropping and jamming attacks Bob Alice Eve 2
3 Countering Security Threats in Wireless Systems Cryptography at higher layers of the protocol stack based on the assumption of limited computational power at Eve vulnerable to large-scale implementation of quantum computers Techniques like frequency hopping, CDMA at the physical layer based on the assumption of limited knowledge at Eve vulnerable to rogue or captured node events Physical layer security at the physical layer no assumption on Eve s computational power no assumption on Eve s available information unbreakable, provable, and quantifiable (in bits/sec/hertz) implementable by signal processing, communications, and coding techniques 3
4 Beginnings of Security Research: Shannon 1949 Noiseless bit pipes to Bob and Eve. W X X W Alice Bob X W Eve Eve gets whatever Bob gets. Secure communications is not possible. 4
5 Shannon s 1949 Security Paper Noiseless bit pipes to Bob and Eve. K keys K W X X W Alice Bob X W Eve One-time pad: X = W K If K is uniform, then X is independent of W. If we know K, then W = X K. For perfect secrecy, length of K (key rate) must be as large as length of W (message rate). 5
6 Beginnings of Cryptography Private key cryptography Based on one-time pad There are separate secure communication links for key exchange Encryption and decryption are done using these keys Public key cryptography Encryption is based on publicly known key (or method) Decryption can be performed only by the desired destination Security based on computational advantage Security against computationally limited adversaries Certain operations are easy in one direction, difficult in the other direction Multiplication is easy, factoring is difficult (RSA) Exponentiation is easy, discrete logarithm is difficult (Diffie-Hellman) 6
7 Cryptography versus Physical Layer Security 7
8 Wyner s Wiretap Channel Wyner introduced the wiretap channel in Major departure from Shannon s model: noisy channels. Eve s channel is degraded with respect to Bob s channel: X Y Z W X Y Wˆ Alice Bob Z H W Z n Secrecy is measured by equivocation, R e, at Eve, i.e., the confusion at Eve: 1 R e = lim n n H(W Zn ) Eve 8
9 Notions of Perfect Secrecy Perfect secrecy is achieved if R e = R This is perfect weak secrecy: Also, there is perfect strong secrecy: 1 lim n n I(W;Zn ) = 0 lim n I(W;Zn ) = 0 All capacity results obtained for weak secrecy have been extended for strong secrecy. However, there is still no proof of equivalence or strict containment. 9
10 Capacity-Equivocation Region Wyner characterized the optimal (R,R e ) region: R I(X;Y ) R e I(X;Y ) I(X;Z) Main idea is to split the message W into two coordinates, secret and public: (W s,w p ). W s needs to be transmitted in perfect secrecy. W p has two roles: Carries some information on which there is no secrecy constraint Provides protection for W s by creating confusion for the eavesdropper 10
11 A Typical Capacity-Equivocation Region Wyner characterized the optimal (R,R e ) region: R I(X;Y ) R e I(X;Y ) I(X;Z) A typical (R,R e ) region: R e Cs C R There might be a tradeoff between rate and its equivocation: Capacity and secrecy capacity might not be simultaneously achievable 11
12 A Typical Capacity-Equivocation Region Wyner characterized the optimal (R,R e ) region: R I(X;Y ) R e I(X;Y ) I(X;Z) A typical (R,R e ) region: C s R e p(x) p(x) C s C R There might be a tradeoff between rate and its equivocation: Capacity and secrecy capacity might not be simultaneously achievable 12
13 Secrecy Capacity Perfect secrecy when R = R e. The maximum perfect secrecy rate is the secrecy capacity: C s = max I(X;Y ) I(X;Z) X Y Z Main idea is to replace W p with dummy indices, W s, which carry no information. In particular, each W s is mapped to many codewords: Stochastic encoding (a.k.a. random binning) To send message W s securely, we send X n (W s, W s ) where W s is random. This one-to-many mapping aims to confuse the eavesdropper 13
14 Main Tool: Stochastic Encoding Each message W s is associated with many codewords: X n (W s, W s ). Eve s decoding capability 2 n R s (1,1)... (1,j)... (1,2 n R s ) Stochastic encoding nr s (i,1)... (i,j)... (i,2 n R s ) Messagei..... (2 nr s,1)... (2 R s,j)... (2 nr s,2 n R s ) 14
15 Stochastic Encoding: 64-QAM Example Bob s Noise Eve s Noise Bob s Constellation Eve s Constellation CB log b/s E 2 Cs CB CE 2 b/s C log 16 4 b/s 15
16 Stochastic Encoding: 64-QAM Example Divide Bob s constellation into 4 subsets. Message 1 Message 2 Message 3 Message 4 16
17 Stochastic Encoding: 64-QAM Example All red stars denote the same message. Pick one randomly. Message 1 Message 2 Message 3 Message 4 17
18 Stochastic Encoding: 64-QAM Example Bob can decode the message reliably. Message 1 Message 2 Message 3 Message 4 18
19 Stochastic Encoding: 64-QAM Example For Eve, all 4 messages look equally likely. Message 1 Message 2 Message 3 Message 4 19
20 General Wiretap Channel Csiszar and Korner considered the general wiretap channel in Eve s signal is not necessarily a degraded version of Bob s signal. Y Wˆ Bob W V X Alice Z H W Z n Eve 20
21 General Capacity-Equivocation Region General (R,R e ) region: R I(V ;Y ) R e I(V ;Y U) I(V ;Z U) for some (U,V ) such that U V X Y,Z. Two new ingredients in the achievable scheme V : channel prefixing U: rate splitting 21
22 General Capacity-Equivocation Region Contrast with the degraded case R I(V ;Y ) R I(X;Y ) R e I(V ;Y U) I(V ;Z U) R e I(X;Y ) I(X;Z) for some (U,V ) such that U V X Y,Z. Two new ingredients in the achievable scheme V : channel prefixing U: rate splitting 22
23 General Secrecy Capacity Contrast with the degraded case R I(V ;Y ) R I(X;Y ) R e I(V ;Y U) I(V ;Z U) for some (U,V ) such that U V X Y,Z. Two new ingredients in the achievable scheme V : channel prefixing U: rate splitting General secrecy capacity expression: i.e., rate splitting is not needed. C s = max I(V ;Y ) I(V ;Z) V X Y Z R e I(X;Y ) I(X;Z) 23
24 Main Tool: Channel Prefixing A virtual channel from V to X. Additional stochastic mapping from the message to the channel input: W V X. Real channel: X Y and X Z. Constructed channel: V Y and V Z. Y Wˆ Bob W V X Alice Z H W Z n With channel prefixing: V X Y,Z. Eve From DPI, both mutual informations decrease, but the difference may increase. The secrecy capacity: C s = max I(V ;Y ) I(V ;Z) V X Y Z 24
25 Gaussian Wiretap Channel Leung-Yang-Cheong and Hellman considered the Gaussian wire-tap channel in Y = X + N 1 and Z = X + N 2 Y Wˆ Bob W X Alice Z H W Z n Degraded: No channel prefixing is necessary and Gaussian signalling is optimal. The secrecy capacity: C s = i.e., the difference of two capacities. Eve max I(X;Y ) I(X;Z) = [C B C E ] + X Y Z 25
26 Caveat: Need Channel Advantage The secrecy capacity: C s = [C B C E ] + Bob s channel is better Eve s channel is better W X Y Bob Wˆ W X Y Bob Wˆ Alice Z H W Z n Alice Z H W Z n Eve Eve positive secrecy no secrecy C s = C B C E C s = 0 26
27 Two Recurring Themes Creating advantage for the legitimate users: computational advantage (cryptography) knowledge advantage (spread spectrum) channel advantage (physical layer security) Exhausting capabilities of the illegitimate entities: exhausting computational power (cryptography) exhausting searching power (spread spectrum) exhausting decoding capability (physical layer security) 27
28 Outlook at the End of 1970s and Transition into 2000s Information theoretic secrecy is extremely powerful: no limitation on Eve s computational power no limitation on Eve s available information yet, we are able to provide secrecy to the legitimate user unbreakable, provable, and quantifiable (in bits/sec/hertz) secrecy We seem to be at the mercy of the nature: if Bob s channel is stronger, positive perfect secrecy rate if Eve s channel is stronger, no secrecy We need channel advantage. Can we create channel advantage? Wireless channel provides many options: time, frequency, multi-user diversity via fading cooperation via overheard signals multi-dimensional signalling via multiple antennas signal alignment 28
29 Fading Wiretap Channel In the Gaussian wiretap channel, secrecy is not possible if C B C E Fading provides time-diversity: Can it be used to obtain/improve secrecy? Y Wˆ Bob W X Alice Z Eve H W Z n 29
30 MIMO Wiretap Channel In SISO Gaussian wiretap channel, secrecy is not possible if C B C E Multiple antennas improve reliability and rates. How about secrecy? W X... Y Wˆ Bob Alice... Z H W Z n Eve 30
31 Broadcast (Downlink) Channel In cellular communications: base station to end-users channel can be eavesdropped. This channel can be modelled as a broadcast channel with an external eavesdropper. Y 1 Wˆ 1 W1, W2 Alice X Y 2 Bob 1 Bob 2 Wˆ 2 Z H W, W Z 1 2 n Eve 31
32 Internal Security within a System Legitimate users may have different security clearances. Some legitimate users may have paid for some content, some may not have. Broadcast channel with two confidential messages. Y 1 Wˆ, H ( W Y ) n Bob\Eve 1 W1, W2 X Alice Y 2 Wˆ, H ( W Y ) n Bob\Eve 2 32
33 Multiple Access (Uplink) Channel Alice and Charles want to have secure communication with Bob in the presence of Eve. Simultaneous multi-message secrecy. Opportunities for deaf cooperation. W1 X1 Alice W X 2 2 Y Bob Wˆ, Wˆ 1 2 Charles Z Eve H W, W Z 1 2 n 33
34 Interference Channel with Confidential Messages Interference results in performance degradation, requires sophisticated transceiver design. From a secrecy point of view, interference (overheard signal) results in loss of confidentiality. W X Y Wˆ, H ( W Y ) n Alice Bob\Eve 1 W X 2 2 Y 2 Wˆ, H ( W Y ) n Charles Bob\Eve 2 34
35 Cooperative Channels Overheard information at communicating parties: Forms the basis for cooperation; results in loss of confidentiality How do cooperation and secrecy interact? Can Charles help without learning the messages going to Bob? Charles\Eve Y1 X 2 H W Y n 1 W X1 Y Wˆ Alice Bob 35
36 Fading Broadcast Channel with Confidential Messages Both users want secrecy against each other. In a non-fading setting, only one user can have a positive secure rate. With full CSIT and CSIR: Gaussian signalling with power control is optimal. Ekrem et. al., Ergodic Secrecy Capacity Region of the Fading Broadcast Channel, ICC
37 The Secrecy Capacity Region (Squared) channel gains are exponential random variables with means σ 1,σ 2, respectively σ 1 = σ 2 = 1 σ 1 = 1, σ 2 = R R 1 Fading (channel variation over time) is beneficial for secrecy. Both users can have positive secrecy rates in fading (even if they have the same average quality). This is not possible without fading. 37
38 Fading Wiretap Channel without CSI Fast fading channel: no CSI anywhere. Discrete signalling is optimal Positions of mass points points 3 points 4 points 5 points Power Mukherjee et. al., Fading Wiretap Channel with No CSI Anywhere, ISIT
39 Gaussian MIMO Wiretap Channel Multiple antennas improve reliability and rates. They improve secrecy as well. W X... Y Wˆ Bob Alice... Z H W Z n No channel prefixing is necessary and Gaussian signalling is optimal. The secrecy capacity: 1 C s = max K:tr(K) P 2 log HM KH M + I 1 2 log HE KH E + I As opposed to the SISO case, C S C B C E. Tradeoff between the rate and its equivocation. Shafiee et. al., Towards the Secrecy Capacity of the Gaussian MIMO Wire-tap Channel: The Channel, IEEE Trans. on Information Theory, Eve
40 Cooperative Channels and Secrecy How do cooperation and secrecy interact? Is there a trade-off or a synergy? Charles\Eve Y1 X 2 H W Y n 1 W X1 Y Wˆ Alice Bob Ekrem et. al., Secrecy in Cooperative Relay Broadcast Channels, IEEE Trans. on Information Theory,
41 Interactions of Cooperation and Secrecy Existing cooperation strategies: Decode-and-forward (DAF) Compress-and-forward (CAF) Decode-and-forward: Relay decodes (learns) the message. No secrecy is possible. Compress-and-forward: Relay does not need to decode the message. Can it be useful for secrecy? Achievable secrecy rate when relay uses CAF: I(X 1 ;Y 1,Ŷ 1 X 2 ) I(X 1 ;Y 2 X 2 ) = I(X 1 ;Y 1 X 2 ) I(X 1 ;Y 2 X 2 ) }{{} +I(X 1;Ŷ 1 X 2,Y 1 ) }{{} secrecy rate of the wiretap channel additional term due to CAF 41
42 Gaussian Relay Broadcast Channel (Charles is Stronger) Joint jamming and relaying Relaying 0.1 R (bits/channel use) R 1 Charles/Eve Alice R 2 Bob R 1 (bits/channel use) Bob cannot have any positive secrecy rate without cooperation. Cooperation is beneficial for secrecy if CAF based relaying (cooperation) is employed. Charles can further improve his own secrecy by joint relaying and jamming. 42
43 Secure Degrees of Freedom: Motivation For most multi-user wiretap channels, secrecy capacity is unknown. Partial characterization in the high power, P, regime. Secure degrees of freedom (d.o.f.) is defined as: Rest of this talk: Secrecy penalty paid in d.o.f Role of a helper for security D.o.f. optimal deaf cooperation D s = lim P Secure d.o.f. of some multi-user channels C s 1 2 logp 43
44 Canonical Gaussian Wiretap Channel Canonical Gaussian wiretap channel with power P, N 1 X h Y g N 2 Z The secrecy capacity is known exactly: C s = 1 2 log( 1 + h 2 P ) 1 2 log( 1 + g 2 P ) In this case, C s does not scale with logp, and D s = 0. Severe penalty for secrecy. D.o.f. goes from 1 to 0 due to secrecy. 44
45 Cooperative Jamming Cooperative jamming from helpers improves secure rates [Tekin, Yener, 2008]. N 1 W X 1 h 1 Y 1 Ŵ g 1 N 2 Y 2 W Secure d.o.f. with i.i.d. Gaussian cooperative jamming is still zero. Positive secure d.o.f. by using nested lattice codes [He, Yener, 2009]. Question: What is the exact secure d.o.f.? 45
46 Gaussian Wiretap Channel with M Helpers The exact secure d.o.f. with M helpers is M M+1. Even though they are independent, more helpers is better. N 1 W X 1 g1 h 1 Y 1 Ŵ X 2 N 2 X 3 Y 2 W X M+1 Tools: Real interference alignment and structured coding. Xie et. al., Secure Degrees of Freedom of the Gaussian Wiretap Channel with Helpers, Allerton Conference,
47 Secure Signal Alignment with M Helpers Alignment for the M = 2 case: V 2 V 3 V 2 V 3 U 2 X 1 h 1 Y 1 g 1 U 3 U 2 X 2 Y 2 V 2 V 3 U 2 U 3 U 3 X 3 The transmitter sends M independent sub-messages. M helpers send an independent cooperative jamming signal each. Each cooperative jamming signal is aligned with one sub-message at the eavesdropper. All cooperative jamming signals are aligned together at the legitimate receiver. 47
48 Eavesdropper CSI? The previous achievable scheme required perfect knowledge of eavesdropper CSI. V 2 V 3 X 1 h 1 Y 1 V 2 V 3 U 2 g 1 U 3 U 2 X 2 Y 2 V 2 V 3 U 2 U 3 U 3 X 3 Generally, it is difficult or impossible to obtain the eavesdropper s CSI. Question: What is the exact secure d.o.f. without eavesdropper CSI? The exact secure d.o.f. is still M M+1. Xie et. al., Secure Degrees of Freedom of the Gaussian Wiretap Channel with Helpers and No Eavesdropper CSI: Blind Cooperative Jamming, CISS
49 Secure Signal Alignment with M Helpers without Eavesdropper CSI Alignment for M = 2 helpers without eavesdropper CSI: U 1 V 2 V 3 U 1 V 2 V 3 U 2 X 1 h 1 Y 1 g 1 U 3 U 2 X 2 Y 2 V 2 V 3 U 1 U 2 U 3 U 3 X 3 The transmitter sends M independent sub-messages and also a cooperative jamming signal. M helpers send an independent cooperative jamming signal each. All M + 1 cooperative jamming signals are blue aligned together at the legitimate receiver. All cooperative jamming signals span the entire space at the eavesdropper. 49
50 Multiple Access Wiretap Channel Each user has its own message to be kept secret from the external eavesdropper. N 1 W 1 X 1 Y 1 Ŵ 1 Ŵ 2 ˆ W K W 2 X 2 N 2 Y 2 W 1 W 2 W K W 3 X 3 W K X K The exact sum secure d.o.f. is K(K 1) K(K 1)+1. Xie et. al., Secure Degrees of Freedom of the Gaussian Multiple Access Wiretap Channel, ISIT
51 Secure Signal Alignment for the Multiple Access Channel Alignment for the K = 3 case: U 1 U 1 V 1 X 1 Y 1 U 2 V 1 V 2 V 3 U 3 U 2 U 1 U 2 U 3 V 2 X 2 Y 2 V 1 V 2 V 3 U 3 V 3 X 3 Each transmitter divides its own message into K 1 sub-messages. The total K jamming signals from the K users span the whole space at the eavesdropper. The jamming signals are aligned in the same dimension at the legitimate receiver. 51
52 Secure Signal Alignment for the Multiple Access Channel Alignment for the K = 3 case: U 1 U 1 V 1 X 1 Y 1 U 2 V 1 V 2 V 3 }{{} K(K 1) { 1 U 3 V 2 U 2 X 2 Y 2 U 1 U 2 U 3 V 1 V 2 V 3 U 3 V 3 X 3 Each transmitter divides its own message into K 1 sub-messages. The total K jamming signals from the K users span the whole space at the eavesdropper. The jamming signals are aligned in the same dimension at the legitimate receiver. 52
53 Interference Channel with an External Eavesdropper External eavesdropper model (IC-EE). W 1 X 1 Y 1 Ŵ 1 W 2 X 2 Y 2 Ŵ 2 W K X K Y K Ŵ K Z W K 1 Secure all messages against the external eavesdropper. 53
54 Interference Channel with Confidential Messages Confidential message model (IC-CM). W 1 X 1 Y 1 Ŵ 1 W K 1 W 2 X 2 Y 2 Ŵ 2 W K 2 W K X K Y K Ŵ K W K K Secure all messages against all unintended receivers. 54
55 Unified Model: Internal and External Security Interference channel with confidential messages and one external eavesdropper (IC-CM-EE): W 1 X 1 Y 1 Ŵ 1 W K 1 W 2 X Y 2 W 2 K 2 Ŵ 2 W K X K Y K Ŵ K W K K Z W K 1 Secure all messages against the internal unintended receivers and the external eavesdropper. 55
56 Secure Signal Alignment for the Unified K-User IC-CM-EE The exact sum secure dof is K(K 1) 2K 1. Added challenge: simultaneous alignment at multiple receivers. V 12 V 13 U 1 X 1 Y 1 V 12 V 13 U 1 V 21 U 2 V 23 V 31 V 32 U 3 V 21 V 23 U 2 X 2 Y 2 V 21 V 23 U 2 V 32 U 3 V 31 V 12 V 13 U 1 V 31 V 32 U 3 Y 3 X 3 V 31 V 32 U 3 V 13 U 1 V 12 V 23 V 21 U 2 Z U 1 V 12 V 13 V 21 U 2 V 23 Xie et. al., Unified Secure DoF Analysis of K-User Gaussian Interference Channels, ISIT V 31 V 32 U 3
57 Going Back to where We have Started Cryptography at higher layers of the protocol stack based on the assumption of limited computational power at Eve vulnerable to large-scale implementation of quantum computers Techniques like frequency hopping, CDMA at the physical layer based on the assumption of limited knowledge at Eve vulnerable to rogue or captured node events Physical layer security at the physical layer no assumption on Eve s computational power no assumption on Eve s available information unbreakable, provable, and quantifiable (in bits/sec/hertz) implementable by signal processing, communications, and coding techniques 57
58 Going Back to where We have Started Cryptography at higher layers of the protocol stack based on the assumption of limited computational power at Eve vulnerable to large-scale implementation of quantum computers Techniques like frequency hopping, CDMA at the physical layer based on the assumption of limited knowledge at Eve vulnerable to rogue or captured node events Physical layer security at the physical layer no assumption on Eve s computational power no assumption on Eve s available information unbreakable, provable, and quantifiable (in bits/sec/hertz) implementable by signal processing, communications, and coding techniques 58
59 Going Back to where We have Started Cryptography at higher layers of the protocol stack based on the assumption of limited computational power at Eve vulnerable to large-scale implementation of quantum computers Techniques like frequency hopping, CDMA at the physical layer based on the assumption of limited knowledge at Eve vulnerable to rogue or captured node events Physical layer security at the physical layer no assumption on Eve s computational power no assumption on Eve s available information based on the assumption of limited???????? at Eve unbreakable, provable, and quantifiable (in bits/sec/hertz) implementable by signal processing, communications, and coding techniques 59
60 Two Recurring Themes Creating advantage for the legitimate users: computational advantage (cryptography) knowledge advantage (spread spectrum) channel advantage (physical layer security) Exhausting capabilities of the illegitimate entities: exhausting computational power (cryptography) exhausting searching power (spread spectrum) exhausting decoding capability (physical layer security) 60
61 Three Dimensions of Advantage Three known dimensions of advantage: knowledge, computational, channel advantage. knowledge advantage SS PLS Crypto computational advantage channel advantage Each method uses only one possible dimension of advantage. 61
62 Hybrid Schemes Hybrid schemes: move to another dimension when an advantage is lost. knowledge advantage SS PLS Crypto computational advantage channel advantage hybrid schemes Still a single dimension is used. 62
63 Hybrid Schemes Hybrid schemes: move to another dimension when an advantage is lost. knowledge advantage SS PLS Crypto computational advantage channel advantage hybrid schemes Still a single dimension is used. 63
64 Combined Schemes Combine and utilize multiple dimensions of advantage knowledge advantage PLS SS Crypto computational advantage channel advantage combined schemes Multi-dimensional, multi-faceted, cross-layer security. 64
65 Conclusions Wireless communication is susceptible to eavesdropping and jamming attacks. Wireless medium also offers ways to neutralize the loss of confidentiality: time, frequency, multi-user diversity via fading cooperation via overheard signals multi-dimensional signalling via multiple antennas secure signal alignment Information theory directs us to methods that can be used to achieve: unbreakable, provable, and quantifiable (in bits/sec/hertz) security irrespective of the adversary s computation power or inside knowledge Resulting schemes implementable by signal processing, communications and coding tech. Many open problems... 65
Secure Degrees of Freedom of the Gaussian MIMO Wiretap and MIMO Broadcast Channels with Unknown Eavesdroppers
1 Secure Degrees of Freedom of the Gaussian MIMO Wiretap and MIMO Broadcast Channels with Unknown Eavesdroppers Mohamed Amir and Tamer Khattab Electrical Engineering, Qatar University Email: mohamed.amir@qu.edu.qa,
More informationBroadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications
1 Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications Shaofeng Zou, Student Member, IEEE, Yingbin Liang, Member, IEEE, Lifeng Lai, Member, IEEE, H. Vincent Poor, Fellow,
More informationOn Secure Signaling for the Gaussian Multiple Access Wire-Tap Channel
On ecure ignaling for the Gaussian Multiple Access Wire-Tap Channel Ender Tekin tekin@psu.edu emih Şerbetli serbetli@psu.edu Wireless Communications and Networking Laboratory Electrical Engineering Department
More informationArtificial Intersymbol Interference (ISI) to Exploit Receiver Imperfections for Secrecy
Artificial Intersymbol Interference ISI to Exploit Receiver Imperfections for Secrecy Azadeh Sheikholeslami, Dennis Goeckel and Hossein ishro-nik Electrical and Computer Engineering Department, University
More informationInformation Theoretic Security: Fundamentals and Applications
Information Theoretic Security: Fundamentals and Applications Ashish Khisti University of Toronto IPSI Seminar Nov 25th 23 Ashish Khisti (University of Toronto) / 35 Layered Architectures Layered architecture
More informationDegrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT
Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)
More informationBreaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective
Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective Naroa Zurutuza - EE360 Winter 2014 Introduction Cognitive Radio: Wireless communication system that intelligently
More informationDiversity Gain Region for MIMO Fading Multiple Access Channels
Diversity Gain Region for MIMO Fading Multiple Access Channels Lihua Weng, Sandeep Pradhan and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor,
More informationEverlasting Security and Undetectability in Wireless Communications
Everlasting Security and Undetectability in Wireless Communications ICNC Lecture February 6, 2014 Dennis Goeckel University of Massachusetts Amherst This work is supported by the National Science Foundation
More informationCooperation in Wireless Networks
Cooperation in Wireless Networks Ivana Marić and Ron Dabora Stanford 15 September 2008 Ivana Marić and Ron Dabora Cooperation in Wireless Networks 1 Objectives The case for cooperation Types of cooperation
More informationOn the Capacity Region of the Vector Fading Broadcast Channel with no CSIT
On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,
More informationInterference Management in Wireless Networks
Interference Management in Wireless Networks Aly El Gamal Department of Electrical and Computer Engineering Purdue University Venu Veeravalli Coordinated Science Lab Department of Electrical and Computer
More informationEverlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper s Receiver
Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper s Receiver Azadeh Sheikholeslami, Student Member, IEEE, Dennis Goeckel, Fellow, IEEE and Hossein Pishro-Nik, Member, IEEE Abstract Secure
More informationExploiting Interference through Cooperation and Cognition
Exploiting Interference through Cooperation and Cognition Stanford June 14, 2009 Joint work with A. Goldsmith, R. Dabora, G. Kramer and S. Shamai (Shitz) The Role of Wireless in the Future The Role of
More informationA Bit of network information theory
Š#/,% 0/,94%#(.)15% A Bit of network information theory Suhas Diggavi 1 Email: suhas.diggavi@epfl.ch URL: http://licos.epfl.ch Parts of talk are joint work with S. Avestimehr 2, S. Mohajer 1, C. Tian 3,
More informationPower and Bandwidth Allocation in Cooperative Dirty Paper Coding
Power and Bandwidth Allocation in Cooperative Dirty Paper Coding Chris T. K. Ng 1, Nihar Jindal 2 Andrea J. Goldsmith 3, Urbashi Mitra 4 1 Stanford University/MIT, 2 Univeristy of Minnesota 3 Stanford
More informationLecture 8 Multi- User MIMO
Lecture 8 Multi- User MIMO I-Hsiang Wang ihwang@ntu.edu.tw 5/7, 014 Multi- User MIMO System So far we discussed how multiple antennas increase the capacity and reliability in point-to-point channels Question:
More informationOPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 6, December 06 OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL Zouhair Al-qudah Communication Engineering Department, AL-Hussein
More informationOptimal Power Allocation over Fading Channels with Stringent Delay Constraints
1 Optimal Power Allocation over Fading Channels with Stringent Delay Constraints Xiangheng Liu Andrea Goldsmith Dept. of Electrical Engineering, Stanford University Email: liuxh,andrea@wsl.stanford.edu
More informationCooperative versus Full-Duplex Communication in Cellular Networks: A Comparison of the Total Degrees of Freedom. Amr El-Keyi and Halim Yanikomeroglu
Cooperative versus Full-Duplex Communication in Cellular Networks: A Comparison of the Total Degrees of Freedom Amr El-Keyi and Halim Yanikomeroglu Outline Introduction Full-duplex system Cooperative system
More informationDegrees of Freedom of the MIMO X Channel
Degrees of Freedom of the MIMO X Channel Syed A. Jafar Electrical Engineering and Computer Science University of California Irvine Irvine California 9697 USA Email: syed@uci.edu Shlomo Shamai (Shitz) Department
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties
More informationOn the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels
On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels Kambiz Azarian, Hesham El Gamal, and Philip Schniter Dept of Electrical Engineering, The Ohio State University Columbus, OH
More informationInformation flow over wireless networks: a deterministic approach
Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory
More informationECE 4400:693 - Information Theory
ECE 4400:693 - Information Theory Dr. Nghi Tran Lecture 1: Introduction & Overview Dr. Nghi Tran (ECE-University of Akron) ECE 4400:693 Information Theory 1 / 26 Outline 1 Course Information 2 Course Overview
More informationCourse Developer: Ranjan Bose, IIT Delhi
Course Title: Coding Theory Course Developer: Ranjan Bose, IIT Delhi Part I Information Theory and Source Coding 1. Source Coding 1.1. Introduction to Information Theory 1.2. Uncertainty and Information
More informationDegrees of Freedom of Bursty Multiple Access Channels with a Relay
Fifty-third Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 29 - October 2, 205 Degrees of Freedom of Bursty Multiple Access Channels with a Relay Sunghyun im and Changho Suh Department
More informationDoF Analysis in a Two-Layered Heterogeneous Wireless Interference Network
DoF Analysis in a Two-Layered Heterogeneous Wireless Interference Network Meghana Bande, Venugopal V. Veeravalli ECE Department and CSL University of Illinois at Urbana-Champaign Email: {mbande,vvv}@illinois.edu
More informationCooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study
Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Fan Xu Kangqi Liu and Meixia Tao Dept of Electronic Engineering Shanghai Jiao Tong University Shanghai China Emails:
More informationSecure Degrees of Freedom of Multiuser Networks: One-Time-Pads in the Air via Alignment
INVITED PAPER Secure Degrees of Freedom of Multiuser Networks: One-Time-Pads in the Air via Alignment Interference alignment techniques are powerful methods that best exploit available degrees of freedom
More informationA Practical Method to Achieve Perfect Secrecy
A Practical Method to Achieve Perfect Secrecy Amir K. Khandani E&CE Department, University of Waterloo August 3 rd, 2014 Perfect Secrecy: One-time Pad One-time Pad: Bit-wise XOR of a (non-reusable) binary
More informationPrevention of Eavesdropping in OFDMA Systems
Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 12, Number 1 (2016), pp. 453-461 Research India Publications http://www.ripublication.com Prevention of Eavesdropping in OFDMA Systems
More informationChapter 10. User Cooperative Communications
Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication
More informationSpace-Time Interference Alignment and Degrees of Freedom Regions for the MISO Broadcast Channel with Periodic CSI Feedback
1 Space-Time Interference Alignment and Degrees of Freedom Regions for the MISO Broadcast Channel with Periodic CSI Feedback Namyoon Lee and Robert W Heath Jr arxiv:13083272v1 [csit 14 Aug 2013 Abstract
More informationBeamforming algorithm for physical layer security of multi user large scale antenna network
, pp.35-40 http://dx.doi.org/10.14257/astl.2016.134.06 Beamforming algorithm for physical layer security of multi user large scale antenna network Zhou Wen-gang, Li Jing, Guo Hui-ling (School of computer
More informationInterference Alignment for Heterogeneous Full-Duplex Cellular Networks. Amr El-Keyi and Halim Yanikomeroglu
Interference Alignment for Heterogeneous Full-Duplex Cellular Networks Amr El-Keyi and Halim Yanikomeroglu 1 Outline Introduction System Model Main Results Outer bounds on the DoF Optimum Antenna Allocation
More informationJoint Relaying and Network Coding in Wireless Networks
Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block
More informationMulti-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless
Forty-Ninth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 28-30, 2011 Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless Zhiyu Cheng, Natasha
More informationThe Degrees of Freedom of Full-Duplex. Bi-directional Interference Networks with and without a MIMO Relay
The Degrees of Freedom of Full-Duplex 1 Bi-directional Interference Networks with and without a MIMO Relay Zhiyu Cheng, Natasha Devroye, Tang Liu University of Illinois at Chicago zcheng3, devroye, tliu44@uic.edu
More information6 Multiuser capacity and
CHAPTER 6 Multiuser capacity and opportunistic communication In Chapter 4, we studied several specific multiple access techniques (TDMA/FDMA, CDMA, OFDM) designed to share the channel among several users.
More informationInformation Theory: the Day after Yesterday
: the Day after Yesterday Department of Electrical Engineering and Computer Science Chicago s Shannon Centennial Event September 23, 2016 : the Day after Yesterday IT today Outline The birth of information
More informationOn the Capacity Regions of Two-Way Diamond. Channels
On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of
More informationOutage Probability of a Multi-User Cooperation Protocol in an Asynchronous CDMA Cellular Uplink
Outage Probability of a Multi-User Cooperation Protocol in an Asynchronous CDMA Cellular Uplink Kanchan G. Vardhe, Daryl Reynolds, and Matthew C. Valenti Lane Dept. of Comp. Sci and Elec. Eng. West Virginia
More informationBlock Markov Encoding & Decoding
1 Block Markov Encoding & Decoding Deqiang Chen I. INTRODUCTION Various Markov encoding and decoding techniques are often proposed for specific channels, e.g., the multi-access channel (MAC) with feedback,
More informationDegrees of Freedom in Multiuser MIMO
Degrees of Freedom in Multiuser MIMO Syed A Jafar Electrical Engineering and Computer Science University of California Irvine, California, 92697-2625 Email: syed@eceuciedu Maralle J Fakhereddin Department
More informationCHAPTER 5 DIVERSITY. Xijun Wang
CHAPTER 5 DIVERSITY Xijun Wang WEEKLY READING 1. Goldsmith, Wireless Communications, Chapters 7 2. Tse, Fundamentals of Wireless Communication, Chapter 3 2 FADING HURTS THE RELIABILITY n The detection
More informationInterference: An Information Theoretic View
Interference: An Information Theoretic View David Tse Wireless Foundations U.C. Berkeley ISIT 2009 Tutorial June 28 Thanks: Changho Suh. Context Two central phenomena in wireless communications: Fading
More informationPower Allocation Tradeoffs in Multicarrier Authentication Systems
Power Allocation Tradeoffs in Multicarrier Authentication Systems Paul L. Yu, John S. Baras, and Brian M. Sadler Abstract Physical layer authentication techniques exploit signal characteristics to identify
More informationPerformance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel
Performance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel Sara Viqar 1, Shoab Ahmed 2, Zaka ul Mustafa 3 and Waleed Ejaz 4 1, 2, 3 National University
More informationInterleaving And Channel Encoding Of Data Packets In Wireless Communications
Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218
More informationPerformance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks
Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks B.Vijayanarasimha Raju 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:
More informationOn Optimum Communication Cost for Joint Compression and Dispersive Information Routing
2010 IEEE Information Theory Workshop - ITW 2010 Dublin On Optimum Communication Cost for Joint Compression and Dispersive Information Routing Kumar Viswanatha, Emrah Akyol and Kenneth Rose Department
More informationOn Fading Broadcast Channels with Partial Channel State Information at the Transmitter
On Fading Broadcast Channels with Partial Channel State Information at the Transmitter Ravi Tandon 1, ohammad Ali addah-ali, Antonia Tulino, H. Vincent Poor 1, and Shlomo Shamai 3 1 Dept. of Electrical
More informationCSIsnoop: Attacker Inference of Channel State Information in Multi-User WLANs
CSIsnoop: Attacker Inference of Channel State Information in Multi-User WLANs Xu Zhang and Edward W. Knightly ECE Department, Rice University Channel State Information (CSI) CSI plays a key role in wireless
More informationOPTIMIZATION OF TRANSMIT SIGNALS TO INTERFERE EAVESDROPPING IN A WIRELESS LAN
04 IEEE International Conference on Acoustic, Speech and Signal Processing ICASSP) OPTIMIZATION OF TRANSMIT SIGNALS TO INTERFERE EAVESDROPPING IN A WIRELESS LAN Shuichi Ohno, Yuji Wakasa, Shui Qiang Yan,
More informationLecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications
COMM 907: Spread Spectrum Communications Lecture 10 - LTE (4G) -Technologies used in 4G and 5G The Need for LTE Long Term Evolution (LTE) With the growth of mobile data and mobile users, it becomes essential
More informationOpportunistic network communications
Opportunistic network communications Suhas Diggavi School of Computer and Communication Sciences Laboratory for Information and Communication Systems (LICOS) Ecole Polytechnique Fédérale de Lausanne (EPFL)
More informationMassive MIMO: Signal Structure, Efficient Processing, and Open Problems I
Massive MIMO: Signal Structure, Efficient Processing, and Open Problems I Saeid Haghighatshoar Communications and Information Theory Group (CommIT) Technische Universität Berlin CoSIP Winter Retreat Berlin,
More informationHow (Information Theoretically) Optimal Are Distributed Decisions?
How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr
More informationTHE emergence of multiuser transmission techniques for
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 54, NO. 10, OCTOBER 2006 1747 Degrees of Freedom in Wireless Multiuser Spatial Multiplex Systems With Multiple Antennas Wei Yu, Member, IEEE, and Wonjong Rhee,
More informationGuaranteeing Secrecy in Wireless Networks using Artificial Noise
Guaranteeing Secrecy in Wireless Networks using Artificial Noise Submitted by: Satashu Goel Department of Electrical and Computer Engineering Advisor: Professor Rohit Negi Department of Electrical and
More informationTHIS paper addresses the interference channel with a
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 6, NO. 8, AUGUST 07 599 The Degrees of Freedom of the Interference Channel With a Cognitive Relay Under Delayed Feedback Hyo Seung Kang, Student Member, IEEE,
More informationCooperative Orthogonal Space-Time-Frequency Block Codes over a MIMO-OFDM Frequency Selective Channel
Cooperative Orthogonal Space-Time-Frequency Block Codes over a MIMO-OFDM Frequency Selective Channel M. Rezaei* and A. Falahati* (C.A.) Abstract: In this paper, a cooperative algorithm to improve the orthogonal
More informationMultiple Antennas. Mats Bengtsson, Björn Ottersten. Basic Transmission Schemes 1 September 8, Presentation Outline
Multiple Antennas Capacity and Basic Transmission Schemes Mats Bengtsson, Björn Ottersten Basic Transmission Schemes 1 September 8, 2005 Presentation Outline Channel capacity Some fine details and misconceptions
More informationScheduling in omnidirectional relay wireless networks
Scheduling in omnidirectional relay wireless networks by Shuning Wang A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied Science
More informationarxiv: v1 [cs.it] 12 Jan 2011
On the Degree of Freedom for Multi-Source Multi-Destination Wireless Networ with Multi-layer Relays Feng Liu, Chung Chan, Ying Jun (Angela) Zhang Abstract arxiv:0.2288v [cs.it] 2 Jan 20 Degree of freedom
More informationInformation Theory at the Extremes
Information Theory at the Extremes David Tse Department of EECS, U.C. Berkeley September 5, 2002 Wireless Networks Workshop at Cornell Information Theory in Wireless Wireless communication is an old subject.
More informationDownlink Performance of Cell Edge User Using Cooperation Scheme in Wireless Cellular Network
Quest Journals Journal of Software Engineering and Simulation Volume1 ~ Issue1 (2013) pp: 07-12 ISSN(Online) :2321-3795 ISSN (Print):2321-3809 www.questjournals.org Research Paper Downlink Performance
More informationDelay Tolerant Cooperation in the Energy Harvesting Multiple Access Channel
Delay Tolerant Cooperation in the Energy Harvesting Multiple Access Channel Onur Kaya, Nugman Su, Sennur Ulukus, Mutlu Koca Isik University, Istanbul, Turkey, onur.kaya@isikun.edu.tr Bogazici University,
More informationELEC E7210: Communication Theory. Lecture 11: MIMO Systems and Space-time Communications
ELEC E7210: Communication Theory Lecture 11: MIMO Systems and Space-time Communications Overview of the last lecture MIMO systems -parallel decomposition; - beamforming; - MIMO channel capacity MIMO Key
More informationPIMRC 2016: Practical Examples of Physical Layer Security
PIMRC 2016: Practical Examples of Physical Layer Security 4 September 2016, Valencia How it looks from outside "All you need to make a movie is a girl and a gun" Jean-Luc Godard How it looks from outside
More informationSourceSync. Exploiting Sender Diversity
SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored
More informationMOBILE data demands are on the rise at an alarming
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 6, JUNE 2018 4581 A Relay Can Increase Degrees of Freedom in Bursty Interference Networks Sunghyun Kim, I-Hsiang Wang, and Changho Suh, Member, IEEE
More informationThroughput Improvement for Cell-Edge Users Using Selective Cooperation in Cellular Networks
Throughput Improvement for Cell-Edge Users Using Selective Cooperation in Cellular Networks M. R. Ramesh Kumar S. Bhashyam D. Jalihal Sasken Communication Technologies,India. Department of Electrical Engineering,
More informationMulti-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems
Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems MIMO Each node has multiple antennas Capable of transmitting (receiving) multiple streams
More informationWireless Network Coding with Local Network Views: Coded Layer Scheduling
Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the
More informationCapacity and Cooperation in Wireless Networks
Capacity and Cooperation in Wireless Networks Chris T. K. Ng and Andrea J. Goldsmith Stanford University Abstract We consider fundamental capacity limits in wireless networks where nodes can cooperate
More informationMulticasting over Multiple-Access Networks
ing oding apacity onclusions ing Department of Electrical Engineering and omputer Sciences University of alifornia, Berkeley May 9, 2006 EE 228A Outline ing oding apacity onclusions 1 2 3 4 oding 5 apacity
More informationComputing and Communications 2. Information Theory -Channel Capacity
1896 1920 1987 2006 Computing and Communications 2. Information Theory -Channel Capacity Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Communication
More informationWireless Network Information Flow
Š#/,% 0/,94%#(.)15% Wireless Network Information Flow Suhas iggavi School of Computer and Communication Sciences, Laboratory for Information and Communication Systems (LICOS), EPFL Email: suhas.diggavi@epfl.ch
More informationCryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1
Cryptography CS 555 Topic 20: Other Public Key Encryption Schemes Topic 20 1 Outline and Readings Outline Quadratic Residue Rabin encryption Goldwasser-Micali Commutative encryption Homomorphic encryption
More informationThe Multi-way Relay Channel
The Multi-way Relay Channel Deniz Gündüz, Aylin Yener, Andrea Goldsmith, H. Vincent Poor Department of Electrical Engineering, Stanford University, Stanford, CA Department of Electrical Engineering, Princeton
More informationSecure communication based on noisy input data Fuzzy Commitment schemes. Stephan Sigg
Secure communication based on noisy input data Fuzzy Commitment schemes Stephan Sigg May 24, 2011 Overview and Structure 05.04.2011 Organisational 15.04.2011 Introduction 19.04.2011 Classification methods
More informationPERFORMANCE OF TWO-PATH SUCCESSIVE RELAYING IN THE PRESENCE OF INTER-RELAY INTERFERENCE
PERFORMANCE OF TWO-PATH SUCCESSIVE RELAYING IN THE PRESENCE OF INTER-RELAY INTERFERENCE 1 QIAN YU LIAU, 2 CHEE YEN LEOW Wireless Communication Centre, Faculty of Electrical Engineering, Universiti Teknologi
More informationSolution: Alice tosses a coin and conveys the result to Bob. Problem: Alice can choose any result.
Example - Coin Toss Coin Toss: Alice and Bob want to toss a coin. Easy to do when they are in the same room. How can they toss a coin over the phone? Mutual Commitments Solution: Alice tosses a coin and
More informationSPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE
Int. J. Chem. Sci.: 14(S3), 2016, 794-800 ISSN 0972-768X www.sadgurupublications.com SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE ADITYA SAI *, ARSHEYA AFRAN and PRIYANKA Information
More informationEE360: Lecture 6 Outline MUD/MIMO in Cellular Systems
EE360: Lecture 6 Outline MUD/MIMO in Cellular Systems Announcements Project proposals due today Makeup lecture tomorrow Feb 2, 5-6:15, Gates 100 Multiuser Detection in cellular MIMO in Cellular Multiuser
More informationA unified graphical approach to
A unified graphical approach to 1 random coding for multi-terminal networks Stefano Rini and Andrea Goldsmith Department of Electrical Engineering, Stanford University, USA arxiv:1107.4705v3 [cs.it] 14
More informationEE359 Discussion Session 8 Beamforming, Diversity-multiplexing tradeoff, MIMO receiver design, Multicarrier modulation
EE359 Discussion Session 8 Beamforming, Diversity-multiplexing tradeoff, MIMO receiver design, Multicarrier modulation November 29, 2017 EE359 Discussion 8 November 29, 2017 1 / 33 Outline 1 MIMO concepts
More informationOn the Optimum Power Allocation in the One-Side Interference Channel with Relay
2012 IEEE Wireless Communications and etworking Conference: Mobile and Wireless etworks On the Optimum Power Allocation in the One-Side Interference Channel with Relay Song Zhao, Zhimin Zeng, Tiankui Zhang
More informationDirty Paper Coding vs. TDMA for MIMO Broadcast Channels
1 Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University njindal, andrea@systems.stanford.edu Submitted to IEEE Trans.
More informationKURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 1, Juli 2017
Jurnal Ilmiah KURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 1, Juli 2017 ISSN 0216 0544 e-issn 2301 6914 OPTIMAL RELAY DESIGN OF ZERO FORCING EQUALIZATION FOR MIMO MULTI WIRELESS RELAYING NETWORKS
More informationFig.1channel model of multiuser ss OSTBC system
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. V (Feb. 2014), PP 48-52 Cooperative Spectrum Sensing In Cognitive Radio
More informationCloud-Based Cell Associations
Cloud-Based Cell Associations Aly El Gamal Department of Electrical and Computer Engineering Purdue University ITA Workshop, 02/02/16 2 / 23 Cloud Communication Global Knowledge / Control available at
More informationCollaborative transmission in wireless sensor networks
Collaborative transmission in wireless sensor networks Cooperative transmission schemes Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg
More informationSymmetric Decentralized Interference Channels with Noisy Feedback
4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en
More informationRelay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying
013 IEEE International Symposium on Information Theory Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying M. Jorgovanovic, M. Weiner, D. Tse and B. Nikolić
More informationChannel Estimation and Multiple Access in Massive MIMO Systems. Junjie Ma, Chongbin Xu and Li Ping City University of Hong Kong, Hong Kong
Channel Estimation and Multiple Access in Massive MIMO Systems Junjie Ma, Chongbin Xu and Li Ping City University of Hong Kong, Hong Kong 1 Main references Li Ping, Lihai Liu, Keying Wu, and W. K. Leung,
More informationMinimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels
IET Communications Research Article Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels ISSN 1751-8628 Received on 28th July 2014 Accepted
More information