Information Theoretic Security: Fundamentals and Applications
|
|
- Junior Houston
- 6 years ago
- Views:
Transcription
1 Information Theoretic Security: Fundamentals and Applications Ashish Khisti University of Toronto IPSI Seminar Nov 25th 23 Ashish Khisti (University of Toronto) / 35
2 Layered Architectures Layered architecture for communication systems. Application Layer (Semantics of Information) Transport Layer (End to End Connectivity) Encryption, Authentication Secure Socket Layer Where is Security? Network Layer (Routing and Path Discovery) Virtual Private Networks Anonymous Routing Data Link Layer (Error Correction Codes) Physical Layer (Signals, RF hardware) Device level Authentication Anti-Jamming Ashish Khisti (University of Toronto) 2 / 35
3 Layered Architectures Layered architecture for communication systems. Application Layer (Semantics of Information) Transport Layer (End to End Connectivity) Encryption, Authentication Secure Socket Layer Where is Security? Wireless Systems Network Layer (Routing and Path Discovery) Virtual Private Networks Anonymous Routing Data Link Layer (Error Correction Codes) Physical Layer (Signals, RF hardware) Ashish Khisti (University of Toronto) 2 / 35
4 Traditional Approach A typical graduate level course in computer security introduces Shannon s notion of security. Shannon s Notion Message W Alice X X Bob decoded message W key K X key K Eve Perfect Secrecy: p(w x)=p(w) Note that Key Size = Message length, hence impractical Focus: computational cryptography Is this all about information theoretic security? Ashish Khisti (University of Toronto) 3 / 35
5 Outline Motivating Applications Secure Biometrics Smart-Meter Privacy Wireless Systems Information Theoretic Models Wiretap Channel Model Secret-key agreement Ashish Khisti (University of Toronto) 4 / 35
6 Biometric Technologies Laptop ATM Passport Ashish Khisti (University of Toronto) 5 / 35
7 Biometric Technologies Laptop ATM Passport Enrollment Feature Extraction Biometric Stored in clear Authentication =? Feature Extraction Ashish Khisti (University of Toronto) 5 / 35
8 Biometric Technologies Laptop ATM Passport Enrollment Feature Extraction Biometric Stored in clear Authentication =? Feature Extraction Issue: Biometrics are stored in the clear Ashish Khisti (University of Toronto) 5 / 35
9 Biometrics: Toy Example Enrolment Biometric Biometric Channel Authentication Biometric No Error Bit Flipped Bit 6 Flipped Bit 7 Flipped 8 Possible Events : All Equally Likely Ashish Khisti (University of Toronto) 6 / 35
10 Biometrics: Toy Example X, Y : length seven binary sequence Channel Model: one bit flip (8 possibilities) 3 bits required. Ashish Khisti (University of Toronto) 7 / 35
11 Biometrics: Toy Example X, Y : length seven binary sequence Channel Model: one bit flip (8 possibilities) 3 bits required. Syndrome Encoder Syndrome Decoder Enrollment Biometric Syndrome bits Authentication Biometric Syndr. Ashish Khisti (University of Toronto) 7 / 35
12 Biometrics: Toy Example X, Y : length seven binary sequence Channel Model: one bit flip (8 possibilities) 3 bits required. Syndrome Encoder Syndrome Decoder Enrollment Biometric Syndrome bits Authentication Biometric Syndr. Ashish Khisti (University of Toronto) 7 / 35
13 Biometrics: Toy Example X, Y : length seven binary sequence Channel Model: one bit flip (8 possibilities) 3 bits required. Syndrome Encoder Syndrome Decoder Enrollment Biometric Syndrome bits Authentication Biometric Syndr. Ashish Khisti (University of Toronto) 7 / 35
14 Biometrics: Toy Example X, Y : length seven binary sequence Channel Model: one bit flip (8 possibilities) 3 bits required. Syndrome Encoder Syndrome Decoder Enrollment Biometric Syndrome bits Authentication Biometric Syndr. Ashish Khisti (University of Toronto) 7 / 35
15 Privacy Preserving Biometrics S. Draper, A. Khisti, et. al Using distributed source coding to secure fingerprint biometrics ICASSP, 27 X Encode enrollment biometric Syndrome Encoding S Store syndrome S Original enrollment biometric Store syndromes Ashish Khisti (University of Toronto) 8 / 35
16 Privacy Preserving Biometrics S. Draper, A. Khisti, et. al Using distributed source coding to secure fingerprint biometrics ICASSP, 27 X Encode enrollment biometric Syndrome Encoding S Store syndrome S Decode w/ probe biometric Syndrome Decoding Original enrollment biometric Fingerprint Channel Y Original enrollment biometric Store syndromes Reproduce enrollment biometric Authentication biometric Ashish Khisti (University of Toronto) 8 / 35
17 Privacy Preserving Biometrics S. Draper, A. Khisti, et. al Using distributed source coding to secure fingerprint biometrics ICASSP, 27 Biometric Authentication X Encode enrollment biometric Syndrome Encoding S One way hash Store syndrome S Decode w/ probe biometric Syndrome Decoding One way hash Original enrollment biometric Fingerprint Channel Y Original enrollment biometric Store syndromes Reproduce enrollment biometric Authenticate Authentication biometric Ashish Khisti (University of Toronto) 8 / 35
18 Smart-Meter Privacy D. Varodayan and A Khisti, ICASSP 2 C. Efthymiou and G. Kalogridis, Smart grid privacy via anonymization of smart metering data, Smart Grid Commun. Conf., Gaithersburg, 2. Ashish Khisti (University of Toronto) 9 / 35
19 Smart-Meter Privacy D. Varodayan and A Khisti, ICASSP 2 User Appliances X Rechargeable Battery Y Utility Company Privacy Leakage: I(X N ;Y N ) Battery: Limited Storage Model Battery as a Finite State Communication Channel Design the Channel Ashish Khisti (University of Toronto) 9 / 35
20 Secret-Key Generation in Wireless Fading Channels m A A Forward Link BA B y h x n B y h x n A BA AB A AB Reverse Link B m B K A K B Channel Gain Reverse Channel Forward Channel Fading Reciprocity Spatial Decorrelation time Ashish Khisti (University of Toronto) / 35
21 Secret-Key Generation in Wireless Fading Channels m A A Forward Link A BA B y h x n B y h x n BA AB A AB Reverse Link B m B K A z AE g AE x n A AE z BE g x n BE B K B BE Channel Gain Eavesdropper Link E Reverse Channel Forward Channel Fading Reciprocity Spatial Decorrelation time Ashish Khisti (University of Toronto) / 35
22 Secret-Key Generation in Wireless Fading Channels A. Khisti 23 m A K A A z AE ForwardLink g y h A AE BA y h B x n A B x n AE BA AB z x n BE A AB ReverseLink g BE x n B BE B K B m B Start E Channel Probing N ĥ AB N ĥ BA Key Extraction Shared Key Two Phase Approach: Phase I: Channel Probing and Estimation: (ĥn AB, ĥn BA ) Phase 2: Source Reconciliation and Key Extraction Secret-Key Generation: Capacity Limits Ashish Khisti (University of Toronto) / 35
23 Secure MIMO Communication Enc. Dec. Rx. Tx. Eaves.?????? Signal of interest: direction of legitimate receiver. Synthetic noise: null-space of legitimate receiver. Ashish Khisti (University of Toronto) 2 / 35
24 Secure MIMO Multicast A. Khisti, 2 Noise Symbols Artificial Noise Alignment Rx Information Symbols IA Precoder Ev Rx2 Signal Masking Transmitter Align Noise Symbols at Legitimate Receivers Mask Information Symbols at Eavesdroppers Ashish Khisti (University of Toronto) 3 / 35
25 Outline Motivating Applications Secure Biometrics Smart-Meter Privacy Wireless Systems Information Theoretic Models Wiretap Channel Model Secret-key agreement Ashish Khisti (University of Toronto) 4 / 35
26 Wiretap Channel Wyner 75 AWGN Wiretap Channel Model Z n r M Encoder X n Z n e Y n r Receiver ˆM Y n e?? Eaves. Reliability Constraint : Pr(M ˆM) n Secrecy Constraint : n H(M Y n e ) = n H(M) o n() Secrecy Capacity Ashish Khisti (University of Toronto) 5 / 35
27 Secrecy Criterion n H(M Y e n ) }{{} Equivocation rate = n H(M) o n () }{{} Information rate Perfect Secrecy: o n (), (Shannon 49) n Weak Secrecy: o n (), (Wyner 75) Strong Secrecy: o n () O ( n), (Maurer and Wolf ) Guessing approach : (Arikan & Merhav 2) Focus: Wyner s notion Ashish Khisti (University of Toronto) 6 / 35
28 Joint Encryption and Encoding Separation based approach vs. Wiretap codes Traditional Approach : Separation... Z n r Key M Key Encryption Encoder X n Z n e Yn r Decoder Decryption ˆM Y n e?? Eaves. Traditional Approach Separation based Requires keys Wiretap Codes Joint encryption/encoding Channel based secrecy Ashish Khisti (University of Toronto) 7 / 35
29 Joint Encryption and Encoding Separation based approach vs. Wiretap codes Wiretap Codes: Joint Encryption and Encoding Z n r Key M Secure Encoder X n Z n e Yn r Decoder Decryption ˆM Y n e?? Eaves. Traditional Approach Separation based Requires keys Wiretap Codes Joint encryption/encoding Channel based secrecy Ashish Khisti (University of Toronto) 7 / 35
30 Joint Encryption and Encoding Separation based approach vs. Wiretap codes Wiretap Codes: Joint Encryption and Encoding Z n r M Secure Encoder X n Z n e Yn r Secure Decoder ˆM Y n e?? Eaves. Traditional Approach Separation based Requires keys Wiretap Codes Joint encryption/encoding Channel based secrecy Ashish Khisti (University of Toronto) 7 / 35
31 Wiretap Codes Uniform Noise Wiretap Channel Model Z n r M Secure Encoder X n Z n e Yn r Secure Decoder ˆM Y n e?? Eaves. QAM Modulation Uniform noise model Recv. Noise Eaves. Noise σ 2 e = 4σ 2 r σ 2 e = 4σ 2 r Ashish Khisti (University of Toronto) 8 / 35
32 Wiretap Codes QAM Modulation Recv. Noise Eaves. Noise σ 2 e = 4σ2 r Uniform noise model Ashish Khisti (University of Toronto) 9 / 35
33 Wiretap Codes QAM Modulation Recv. Noise Eaves. Noise σ 2 e = 4σ2 r Uniform noise model Receiver s Constellation Eavesdropper s Constellation C r = log 2 64 = 6 b/s C e = log 2 6 = 4 b/s Ashish Khisti (University of Toronto) 9 / 35
34 Wiretap Codes QAM Modulation Recv. Noise Eaves. Noise σ 2 e = 4σ2 r Uniform noise model Receiver s Constellation Eavesdropper s Constellation C r = log 2 64 = 6 b/s C e = log 2 6 = 4 b/s C s = C r C e = 2 b/s Ashish Khisti (University of Toronto) 9 / 35
35 Wiretap Codes Secure QAM Constellation Msg Msg2 Msg3 Msg4 Ashish Khisti (University of Toronto) 2 / 35
36 Wiretap Codes Encoding: Randomly select one candidate Msg Msg2 Msg3 Msg4 Ashish Khisti (University of Toronto) 2 / 35
37 Wiretap Codes Decoding at legitimate receiver Msg Msg2 Msg3 Msg4 Ashish Khisti (University of Toronto) 2 / 35
38 Wiretap Codes Confusion at the eavesdropper Msg Msg2 Msg3 Msg4 Ashish Khisti (University of Toronto) 2 / 35
39 Gaussian Wiretap Channel Leung-Yan-Cheong and Hellman 78 Z n r M Encoder X n Z n e Y n r Receiver ˆM Y n e?? Eaves. Secrecy Capacity C s = {log(+snr r ) log(+snr e )} + = {C(SNR r ) C(SNR e )} + SNR r : Legitimate receiver s signal to noise ratio SNR e : Eavesdropper s signal to noise ratio Ashish Khisti (University of Toronto) 2 / 35
40 Other Classical Results The secrecy capacity was also characterized for: Degraded Memoryless Wiretap Channel(Wyner 75) X Y r Y e C = max p X I(X;Y r ) I(X;Y e ) Discrete Memoryless Wiretap Channel (Csiszar-Korner 78) C = max p U,X I(U;Y r ) I(U;Y e ), U X (Y r,y e ) Cardinality bounds on the alphabet of U Ashish Khisti (University of Toronto) 22 / 35
41 Gaussian Wiretap Channel Receiver Transmitter?????? Eavesdropper Strong Requirement: Eavesdropper must not be closer to the transmitter Ashish Khisti (University of Toronto) 23 / 35
42 Gaussian Wiretap Channel Receiver Transmitter Eavesdropper Strong Requirement: Eavesdropper must not be closer to the transmitter Ashish Khisti (University of Toronto) 23 / 35
43 Solution... Multiple Antennas Khisti-Wornell 2 Multi-antenna wiretap channel Receiver Transmitter???? Eavesdropper Spatial Diversity: Multiple Antennas Temporal Diversity: Fading Channels Ashish Khisti (University of Toronto) 24 / 35
44 Solution... Multiple Antennas Khisti-Wornell 2 Multi-antenna wiretap channel Receiver Transmitter???? Channel Model Y r = H r X +Z r Y e = H e X +Z e Eavesdropper Channel matrices: H r C Nr Nt, H e C Ne Nt N t : # Tx antennas AWGN noise: Z r, Z e Ashish Khisti (University of Toronto) 24 / 35
45 MIMOME: Secrecy Capacity Khisti-Wornell 2 Theorem Secrecy capacity of the Multi-antenna wiretap channel is given by, C s = max logdet(i r +H r QH r ) logdet(i e +H e QH e ) Q :Tr(Q) P Ashish Khisti (University of Toronto) 25 / 35
46 MIMOME: Secrecy Capacity Khisti-Wornell 2 Theorem Secrecy capacity of the Multi-antenna wiretap channel is given by, C s = max logdet(i r +H r QH r ) logdet(i e +H e QH e ) Q :Tr(Q) P Scalar Gaussian Case (Leung-Yan-Cheong & Hellman 78), C s = log(+snr r ) log(+snr e ) New information theoretic upper-bound Convex Optimization Matrix Analysis Ashish Khisti (University of Toronto) 25 / 35
47 Secrecy Capacity: Remarks C s = max logdet(i r +H r QH r) logdet(i e +H e QH e) Q :Tr(Q) P Ashish Khisti (University of Toronto) 26 / 35
48 Secrecy Capacity: Remarks C s = max logdet(i r +H r QH r) logdet(i e +H e QH e) Q :Tr(Q) P Convex Reformulation C s = min Φ P max Q Q R +(Φ,Q) Ashish Khisti (University of Toronto) 26 / 35
49 Secrecy Capacity: Remarks C s = max logdet(i r +H r QH r) logdet(i e +H e QH e) Q :Tr(Q) P Convex Reformulation C s = min Φ P max Q Q R +(Φ,Q) 2 MISOME Case: rank-one covariance is optimal C s = log + λ max (I +Ph r h r,i +PH eh e ) Ashish Khisti (University of Toronto) 26 / 35
50 Secrecy Capacity: Remarks C s = max logdet(i r +H r QH r) logdet(i e +H e QH e) Q :Tr(Q) P Convex Reformulation C s = min Φ P max Q Q R +(Φ,Q) 2 MISOME Case: rank-one covariance is optimal C s = log + λ max (I +Ph r h r,i +PH eh e ) 3 High SNR case: GSVD transform Simultaneous diagonalization: (H r,h e ) Ashish Khisti (University of Toronto) 26 / 35
51 Masked Beamforming Scheme MISOME Case: Y r = h rx +Z r, Y e = H e X +Z e Enc. Dec. Rx. Tx. Eaves.?????? Ashish Khisti (University of Toronto) 27 / 35
52 Masked Beamforming Scheme MISOME Case: Y r = h rx +Z r, Y e = H e X +Z e Enc. Dec. Rx. Tx. Eaves.?????? Signal of interest: direction of legitimate receiver. Synthetic noise: null-space of legitimate receiver. Ashish Khisti (University of Toronto) 27 / 35
53 Masked Beamforming vs. Capacity Achieving Scheme MISOME Case: Y r = h rx +Z r, Y e = H e X +Z e Masked beamforming scheme Capacity achieving scheme h r, H e Scalar Wiretap Code h r Masked Beam-forming Scalar Wiretap Code h, H r e Optimal Beam-forming Ashish Khisti (University of Toronto) 28 / 35
54 Masked Beamforming vs. Capacity Achieving Scheme MISOME Case: Y r = h rx +Z r, Y e = H e X +Z e Masked beamforming scheme Capacity achieving scheme h r, H e Scalar Wiretap Code h r Masked Beam-forming Scalar Wiretap Code h, H r e Optimal Beam-forming { ) } lim C (h r,h e, PNt R MB (h r,h e,p) = P Transmit Power: P Transmit antennas: N t Ashish Khisti (University of Toronto) 28 / 35
55 Outline Motivating Applications Secure Biometrics Smart-Meter Privacy Wireless Systems Information Theoretic Models Wiretap Channel Model Secret-key agreement Ashish Khisti (University of Toronto) 29 / 35
56 Secret Key Generation Maurer 93, Ahlswede-Csiszar 93 u N v N A F = f(u N ) B k = K A (u N ) ˆk = K B (v N,f) Error Probability: Pr(k ˆk) ε N Equivocation: N H(k f) N H(k) ε n Rate R = N H(k) C key = I(u;v) Ashish Khisti (University of Toronto) 3 / 35
57 Achievability Random Binning Technique (Slepian-Wolf 73) u N Slepain-Wolf Encoder Bin-Index Bin Bin 2 No. of Bins: 2 nh(v u) No. of Sequences/Bin: 2 ni(u;v) Ashish Khisti (University of Toronto) 3 / 35
58 Joint Source and Channel Coding Khisti-Diggavi-Wornell 8 u N v N Enc. x n p(y,z x) yn z n dec w.t. Two types of uncertainty Sources Channel How to combine both these equivocation for secret-key-distillation? Ashish Khisti (University of Toronto) 32 / 35
59 Achievability Wiretap Codebook x n y n Wiretap Decoder u N Wyner-Ziv Codebook Bin Index v N Bin Index Wyner-Ziv Decoder W-Z Codeword Secret-Key Codebook k k W-Z Codeword Secret Key Codebook Encoder Decoder R key = max βi(t;v) t,x }{{} src. equiv. +I(x;y) I(x;z) }{{} channel equiv. t u v, β{i(t;u) I(t;v)} I(x;y) Ashish Khisti (University of Toronto) 33 / 35
60 Capacity Results R key = max t,x βi(t;v)+i(x;y z) t u v, β{i(t;u) I(t;v)} I(x;y) Upper and lower bounds coincide, when channels are degraded or parallel reversely degraded broadcast. Capacity for Parallel Gaussian broadcast channels and Gaussian sources Extension to side information at the eavesdropper, when sources and channels are degraded. Ashish Khisti (University of Toronto) 34 / 35
61 Conclusions Motivating Applications Secure Biometrics Smart-Meter Privacy Wireless Systems Information Theoretic Models Wiretap Channel Model Secret-key agreement Ashish Khisti (University of Toronto) 35 / 35
Physical Layer Security for Wireless Networks
Physical Layer Security for Wireless Networks Şennur Ulukuş Department of ECE University of Maryland ulukus@umd.edu Joint work with Shabnam Shafiee, Nan Liu, Ersen Ekrem, Jianwei Xie and Pritam Mukherjee.
More informationBroadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications
1 Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications Shaofeng Zou, Student Member, IEEE, Yingbin Liang, Member, IEEE, Lifeng Lai, Member, IEEE, H. Vincent Poor, Fellow,
More informationSecure Degrees of Freedom of the Gaussian MIMO Wiretap and MIMO Broadcast Channels with Unknown Eavesdroppers
1 Secure Degrees of Freedom of the Gaussian MIMO Wiretap and MIMO Broadcast Channels with Unknown Eavesdroppers Mohamed Amir and Tamer Khattab Electrical Engineering, Qatar University Email: mohamed.amir@qu.edu.qa,
More informationA Practical Method to Achieve Perfect Secrecy
A Practical Method to Achieve Perfect Secrecy Amir K. Khandani E&CE Department, University of Waterloo August 3 rd, 2014 Perfect Secrecy: One-time Pad One-time Pad: Bit-wise XOR of a (non-reusable) binary
More informationOn Secure Signaling for the Gaussian Multiple Access Wire-Tap Channel
On ecure ignaling for the Gaussian Multiple Access Wire-Tap Channel Ender Tekin tekin@psu.edu emih Şerbetli serbetli@psu.edu Wireless Communications and Networking Laboratory Electrical Engineering Department
More informationArtificial Intersymbol Interference (ISI) to Exploit Receiver Imperfections for Secrecy
Artificial Intersymbol Interference ISI to Exploit Receiver Imperfections for Secrecy Azadeh Sheikholeslami, Dennis Goeckel and Hossein ishro-nik Electrical and Computer Engineering Department, University
More informationCourse Developer: Ranjan Bose, IIT Delhi
Course Title: Coding Theory Course Developer: Ranjan Bose, IIT Delhi Part I Information Theory and Source Coding 1. Source Coding 1.1. Introduction to Information Theory 1.2. Uncertainty and Information
More informationComputing and Communications 2. Information Theory -Channel Capacity
1896 1920 1987 2006 Computing and Communications 2. Information Theory -Channel Capacity Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Communication
More informationInformation flow over wireless networks: a deterministic approach
Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory
More informationOpportunistic network communications
Opportunistic network communications Suhas Diggavi School of Computer and Communication Sciences Laboratory for Information and Communication Systems (LICOS) Ecole Polytechnique Fédérale de Lausanne (EPFL)
More informationLecture 8 Multi- User MIMO
Lecture 8 Multi- User MIMO I-Hsiang Wang ihwang@ntu.edu.tw 5/7, 014 Multi- User MIMO System So far we discussed how multiple antennas increase the capacity and reliability in point-to-point channels Question:
More informationA Bit of network information theory
Š#/,% 0/,94%#(.)15% A Bit of network information theory Suhas Diggavi 1 Email: suhas.diggavi@epfl.ch URL: http://licos.epfl.ch Parts of talk are joint work with S. Avestimehr 2, S. Mohajer 1, C. Tian 3,
More informationMulticasting over Multiple-Access Networks
ing oding apacity onclusions ing Department of Electrical Engineering and omputer Sciences University of alifornia, Berkeley May 9, 2006 EE 228A Outline ing oding apacity onclusions 1 2 3 4 oding 5 apacity
More informationInterference: An Information Theoretic View
Interference: An Information Theoretic View David Tse Wireless Foundations U.C. Berkeley ISIT 2009 Tutorial June 28 Thanks: Changho Suh. Context Two central phenomena in wireless communications: Fading
More informationEverlasting Security and Undetectability in Wireless Communications
Everlasting Security and Undetectability in Wireless Communications ICNC Lecture February 6, 2014 Dennis Goeckel University of Massachusetts Amherst This work is supported by the National Science Foundation
More informationMU-MIMO in LTE/LTE-A Performance Analysis. Rizwan GHAFFAR, Biljana BADIC
MU-MIMO in LTE/LTE-A Performance Analysis Rizwan GHAFFAR, Biljana BADIC Outline 1 Introduction to Multi-user MIMO Multi-user MIMO in LTE and LTE-A 3 Transceiver Structures for Multi-user MIMO Rizwan GHAFFAR
More informationCoding for Noisy Networks
Coding for Noisy Networks Abbas El Gamal Stanford University ISIT Plenary, June 2010 A. El Gamal (Stanford University) Coding for Noisy Networks ISIT Plenary, June 2010 1 / 46 Introduction Over past 40+
More informationOPTIMIZATION OF TRANSMIT SIGNALS TO INTERFERE EAVESDROPPING IN A WIRELESS LAN
04 IEEE International Conference on Acoustic, Speech and Signal Processing ICASSP) OPTIMIZATION OF TRANSMIT SIGNALS TO INTERFERE EAVESDROPPING IN A WIRELESS LAN Shuichi Ohno, Yuji Wakasa, Shui Qiang Yan,
More informationPractical Implementation of Physical-Layer Key Generation using Standard WLAN Cards and Performance Evaluation
Practical Implementation of Physical-Layer Key Generation using Standard WLAN Cards and Performance Evaluation by Munder Hamruni Master Thesis in Electronics Engineering Ph.D. cand. (ABD) Oana Graur Prof.
More informationPIMRC 2016: Practical Examples of Physical Layer Security
PIMRC 2016: Practical Examples of Physical Layer Security 4 September 2016, Valencia How it looks from outside "All you need to make a movie is a girl and a gun" Jean-Luc Godard How it looks from outside
More informationELEC E7210: Communication Theory. Lecture 11: MIMO Systems and Space-time Communications
ELEC E7210: Communication Theory Lecture 11: MIMO Systems and Space-time Communications Overview of the last lecture MIMO systems -parallel decomposition; - beamforming; - MIMO channel capacity MIMO Key
More informationLecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1
Antenna, Antenna : Antenna and Theoretical Foundations of Wireless Communications 1 Friday, April 27, 2018 9:30-12:00, Kansliet plan 3 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication
More informationCHAPTER 8 MIMO. Xijun Wang
CHAPTER 8 MIMO Xijun Wang WEEKLY READING 1. Goldsmith, Wireless Communications, Chapters 10 2. Tse, Fundamentals of Wireless Communication, Chapter 7-10 2 MIMO 3 BENEFITS OF MIMO n Array gain The increase
More informationKey Generation Exploiting MIMO Channel Evolution: Algorithms and Theoretical Limits
Key Generation Exploiting MIMO Channel Evolution: Algorithms and Theoretical Limits Jon W. Wallace, Chan Chen, Michael A. Jensen School of Engineering and Science, Jacobs University Bremen Campus Ring,
More informationWireless Network Information Flow
Š#/,% 0/,94%#(.)15% Wireless Network Information Flow Suhas iggavi School of Computer and Communication Sciences, Laboratory for Information and Communication Systems (LICOS), EPFL Email: suhas.diggavi@epfl.ch
More informationDistributed Source Coding: A New Paradigm for Wireless Video?
Distributed Source Coding: A New Paradigm for Wireless Video? Christine Guillemot, IRISA/INRIA, Campus universitaire de Beaulieu, 35042 Rennes Cédex, FRANCE Christine.Guillemot@irisa.fr The distributed
More informationMulti-user Space Time Scheduling for Wireless Systems with Multiple Antenna
Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna Vincent Lau Associate Prof., University of Hong Kong Senior Manager, ASTRI Agenda Bacground Lin Level vs System Level Performance
More informationSHANNON S source channel separation theorem states
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 9, SEPTEMBER 2009 3927 Source Channel Coding for Correlated Sources Over Multiuser Channels Deniz Gündüz, Member, IEEE, Elza Erkip, Senior Member,
More informationBreaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective
Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective Naroa Zurutuza - EE360 Winter 2014 Introduction Cognitive Radio: Wireless communication system that intelligently
More informationDiversity Gain Region for MIMO Fading Multiple Access Channels
Diversity Gain Region for MIMO Fading Multiple Access Channels Lihua Weng, Sandeep Pradhan and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor,
More informationOn the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets
On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets Mohammed Eltayeb*, Junil Choi*, Tareq Al-Naffouri #, and Robert W. Heath Jr.* * Wireless Networking and Communications
More informationEverlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper s Receiver
Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper s Receiver Azadeh Sheikholeslami, Student Member, IEEE, Dennis Goeckel, Fellow, IEEE and Hossein Pishro-Nik, Member, IEEE Abstract Secure
More informationCooperation in Wireless Networks
Cooperation in Wireless Networks Ivana Marić and Ron Dabora Stanford 15 September 2008 Ivana Marić and Ron Dabora Cooperation in Wireless Networks 1 Objectives The case for cooperation Types of cooperation
More informationDiversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels
Diversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels Lizhong Zheng and David Tse Department of EECS, U.C. Berkeley Feb 26, 2002 MSRI Information Theory Workshop Wireless Fading Channels
More informationOutage Probability of a Multi-User Cooperation Protocol in an Asynchronous CDMA Cellular Uplink
Outage Probability of a Multi-User Cooperation Protocol in an Asynchronous CDMA Cellular Uplink Kanchan G. Vardhe, Daryl Reynolds, and Matthew C. Valenti Lane Dept. of Comp. Sci and Elec. Eng. West Virginia
More informationPower Allocation Tradeoffs in Multicarrier Authentication Systems
Power Allocation Tradeoffs in Multicarrier Authentication Systems Paul L. Yu, John S. Baras, and Brian M. Sadler Abstract Physical layer authentication techniques exploit signal characteristics to identify
More informationMultiuser Information Theory and Wireless Communications. Professor in Charge: Toby Berger Principal Lecturer: Jun Chen
Multiuser Information Theory and Wireless Communications Professor in Charge: Toby Berger Principal Lecturer: Jun Chen Where and When? 1 Good News No homework. No exam. 2 Credits:1-2 One credit: submit
More informationMultiple Antennas. Mats Bengtsson, Björn Ottersten. Basic Transmission Schemes 1 September 8, Presentation Outline
Multiple Antennas Capacity and Basic Transmission Schemes Mats Bengtsson, Björn Ottersten Basic Transmission Schemes 1 September 8, 2005 Presentation Outline Channel capacity Some fine details and misconceptions
More informationFrequency hopping does not increase anti-jamming resilience of wireless channels
Frequency hopping does not increase anti-jamming resilience of wireless channels Moritz Wiese and Panos Papadimitratos Networed Systems Security Group KTH Royal Institute of Technology, Stocholm, Sweden
More informationECE 4400:693 - Information Theory
ECE 4400:693 - Information Theory Dr. Nghi Tran Lecture 1: Introduction & Overview Dr. Nghi Tran (ECE-University of Akron) ECE 4400:693 Information Theory 1 / 26 Outline 1 Course Information 2 Course Overview
More informationNetwork Information Theory
1 / 191 Network Information Theory Young-Han Kim University of California, San Diego Joint work with Abbas El Gamal (Stanford) IEEE VTS San Diego 2009 2 / 191 Network Information Flow Consider a general
More informationCooperative MIMO schemes optimal selection for wireless sensor networks
Cooperative MIMO schemes optimal selection for wireless sensor networks Tuan-Duc Nguyen, Olivier Berder and Olivier Sentieys IRISA Ecole Nationale Supérieure de Sciences Appliquées et de Technologie 5,
More informationDiversity and Multiplexing: A Fundamental Tradeoff in Wireless Systems
Diversity and Multiplexing: A Fundamental Tradeoff in Wireless Systems David Tse Department of EECS, U.C. Berkeley June 6, 2003 UCSB Wireless Fading Channels Fundamental characteristic of wireless channels:
More informationGuaranteeing Secrecy in Wireless Networks using Artificial Noise
Guaranteeing Secrecy in Wireless Networks using Artificial Noise Submitted by: Satashu Goel Department of Electrical and Computer Engineering Advisor: Professor Rohit Negi Department of Electrical and
More informationAnalysis and Improvements of Linear Multi-user user MIMO Precoding Techniques
1 Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques Bin Song and Martin Haardt Outline 2 Multi-user user MIMO System (main topic in phase I and phase II) critical problem Downlink
More information1 Interference Cancellation
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2017 Problem Set 1 September 19, 2017 This problem set has 7 questions, each with several parts.
More informationScheduling in omnidirectional relay wireless networks
Scheduling in omnidirectional relay wireless networks by Shuning Wang A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied Science
More informationRECENTLY, a significant effort has been made on physical
I TRANSACTIONS ON WIRLSS COMMUNICATIONS, VOL. 11, NO. 3, MARCH 2012 903 Pilot Contamination for Active avesdropping Xiangyun Zhou, Member, I, Behrouz Maham, Member, I, and Are Hjørungnes Abstract xisting
More informationAntennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO
Antennas and Propagation b: Path Models Rayleigh, Rician Fading, MIMO Introduction From last lecture How do we model H p? Discrete path model (physical, plane waves) Random matrix models (forget H p and
More informationLecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr.
Lecture #2 EE 471C / EE 381K-17 Wireless Communication Lab Professor Robert W. Heath Jr. Preview of today s lecture u Introduction to digital communication u Components of a digital communication system
More informationWhen Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network
When Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network Nadia Fawaz, David Gesbert Mobile Communications Department, Eurecom Institute Sophia-Antipolis, France {fawaz, gesbert}@eurecom.fr
More informationError Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria
Error Control Coding Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria Topics Introduction The Channel Coding Problem Linear Block Codes Cyclic Codes BCH and Reed-Solomon
More informationBackground Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia
Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,
More informationPerformance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks
Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks B.Vijayanarasimha Raju 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:
More informationCapacity and Cooperation in Wireless Networks
Capacity and Cooperation in Wireless Networks Chris T. K. Ng and Andrea J. Goldsmith Stanford University Abstract We consider fundamental capacity limits in wireless networks where nodes can cooperate
More informationCoding Techniques and the Two-Access Channel
Coding Techniques and the Two-Access Channel A.J. Han VINCK Institute for Experimental Mathematics, University of Duisburg-Essen, Germany email: Vinck@exp-math.uni-essen.de Abstract. We consider some examples
More informationCONSTELLATION SHAPING FOR BROADCAST CHANNELS IN PRACTICAL SITUATIONS
19th European Signal Processing Conference (EUSIPCO 2011) Barcelona, Spain, August 29 - September 2, 2011 CONSTELLATION SHAPING FOR BROADCAST CHANNELS IN PRACTICAL SITUATIONS Zeina Mheich 1, Pierre Duhamel
More information1 Overview of MIMO communications
Jerry R Hampton 1 Overview of MIMO communications This chapter lays the foundations for the remainder of the book by presenting an overview of MIMO communications Fundamental concepts and key terminology
More informationInfo theory and big data
Info theory and big data Typical or not typical, that is the question Han Vinck University Duisburg Essen, Germany September 2016 A.J. Han Vinck, Yerevan, September 2016 Content: big data issues A definition:
More informationNoncoherent Communications with Large Antenna Arrays
Noncoherent Communications with Large Antenna Arrays Mainak Chowdhury Joint work with: Alexandros Manolakos, Andrea Goldsmith, Felipe Gomez-Cuba and Elza Erkip Stanford University September 29, 2016 Wireless
More informationOptimizing future wireless communication systems
Optimizing future wireless communication systems "Optimization and Engineering" symposium Louvain-la-Neuve, May 24 th 2006 Jonathan Duplicy (www.tele.ucl.ac.be/digicom/duplicy) 1 Outline History Challenges
More informationDEGRADED broadcast channels were first studied by
4296 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 9, SEPTEMBER 2008 Optimal Transmission Strategy Explicit Capacity Region for Broadcast Z Channels Bike Xie, Student Member, IEEE, Miguel Griot,
More informationPhysical-Layer Multicasting by Stochastic Beamforming and Alamouti Space-Time Coding
Physical-Layer Multicasting by Stochastic Beamforming and Alamouti Space-Time Coding Anthony Man-Cho So Dept. of Systems Engineering and Engineering Management The Chinese University of Hong Kong (Joint
More informationDegrees of Freedom in Multiuser MIMO
Degrees of Freedom in Multiuser MIMO Syed A Jafar Electrical Engineering and Computer Science University of California Irvine, California, 92697-2625 Email: syed@eceuciedu Maralle J Fakhereddin Department
More informationOn the Capacity Regions of Two-Way Diamond. Channels
On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of
More informationHybrid Compression and Message-Sharing Strategy for the Downlink Cloud Radio-Access Network
Hybrid Compression and Message-Sharing Strategy for the Downlink Cloud Radio-Access Network Pratik Patil and Wei Yu Department of Electrical and Computer Engineering University of Toronto, Toronto, Ontario
More informationECEn 665: Antennas and Propagation for Wireless Communications 131. s(t) = A c [1 + αm(t)] cos (ω c t) (9.27)
ECEn 665: Antennas and Propagation for Wireless Communications 131 9. Modulation Modulation is a way to vary the amplitude and phase of a sinusoidal carrier waveform in order to transmit information. When
More informationSymmetric Decentralized Interference Channels with Noisy Feedback
4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en
More informationMassive MIMO: Signal Structure, Efficient Processing, and Open Problems I
Massive MIMO: Signal Structure, Efficient Processing, and Open Problems I Saeid Haghighatshoar Communications and Information Theory Group (CommIT) Technische Universität Berlin CoSIP Winter Retreat Berlin,
More informationAn Orthogonal Relay Protocol with Improved Diversity-Multiplexing Tradeoff
SUBMITTED TO IEEE TRANS. WIRELESS COMMNS., NOV. 2009 1 An Orthogonal Relay Protocol with Improved Diversity-Multiplexing Tradeoff K. V. Srinivas, Raviraj Adve Abstract Cooperative relaying helps improve
More informationMulti-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems
Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems MIMO Each node has multiple antennas Capable of transmitting (receiving) multiple streams
More informationAnalysis of Space-Time Block Coded Spatial Modulation in Correlated Rayleigh and Rician Fading Channels
Analysis of Space-Time Block Coded Spatial Modulation in Correlated Rayleigh and Rician Fading Channels B Kumbhani, V K Mohandas, R P Singh, S Kabra and R S Kshetrimayum Department of Electronics and Electrical
More information#8 Adaptive Modulation Coding
06 Q Wireless Communication Engineering #8 Adaptive Modulation Coding Kei Sakaguchi sakaguchi@mobile.ee. July 5, 06 Course Schedule () Date Text Contents #7 July 5 4.6 Error correction coding #8 July 5
More informationMinimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels
IET Communications Research Article Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels ISSN 1751-8628 Received on 28th July 2014 Accepted
More informationBlock Markov Encoding & Decoding
1 Block Markov Encoding & Decoding Deqiang Chen I. INTRODUCTION Various Markov encoding and decoding techniques are often proposed for specific channels, e.g., the multi-access channel (MAC) with feedback,
More informationOptimal Rate-Diversity-Delay Tradeoff in ARQ Block-Fading Channels
Optimal Rate-Diversity-Delay Tradeoff in ARQ Block-Fading Channels Allen Chuang School of Electrical and Information Eng. University of Sydney Sydney NSW, Australia achuang@ee.usyd.edu.au Albert Guillén
More informationCorteXlab: research. opportunities. Jean-Marie Gorce
CorteXlab: research opportunities Jean-Marie Gorce jean-marie.gorce@insa-lyon.fr CorteXlab inauguration Tuesday, October 28, 2014 Which theoretical framework? EM theory Information theory Queuing theory
More informationSourceSync. Exploiting Sender Diversity
SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored
More informationLecture 4 Diversity and MIMO Communications
MIMO Communication Systems Lecture 4 Diversity and MIMO Communications Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Spring 2017 1 Outline Diversity Techniques
More informationSpace-Time Coding: Fundamentals
Space-Time Coding: Fundamentals Xiang-Gen Xia Dept of Electrical and Computer Engineering University of Delaware Newark, DE 976, USA Email: xxia@ee.udel.edu and xianggen@gmail.com Outline Background Single
More informationOptimization Techniques for Alphabet-Constrained Signal Design
Optimization Techniques for Alphabet-Constrained Signal Design Mojtaba Soltanalian Department of Electrical Engineering California Institute of Technology Stanford EE- ISL Mar. 2015 Optimization Techniques
More informationInformation Theoretic Analysis of Cognitive Radio Systems
Information Theoretic Analysis of Cognitive Radio Systems Natasha Devroye 1, Patrick Mitran 1, Masoud Sharif 2, Saeed Ghassemzadeh 3, and Vahid Tarokh 1 1 Division of Engineering and Applied Sciences,
More informationOn Optimum Communication Cost for Joint Compression and Dispersive Information Routing
2010 IEEE Information Theory Workshop - ITW 2010 Dublin On Optimum Communication Cost for Joint Compression and Dispersive Information Routing Kumar Viswanatha, Emrah Akyol and Kenneth Rose Department
More informationHybrid ARQ Scheme with Antenna Permutation for MIMO Systems in Slow Fading Channels
Hybrid ARQ Scheme with Antenna Permutation for MIMO Systems in Slow Fading Channels Jianfeng Wang, Meizhen Tu, Kan Zheng, and Wenbo Wang School of Telecommunication Engineering, Beijing University of Posts
More informationCooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study
Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Fan Xu Kangqi Liu and Meixia Tao Dept of Electronic Engineering Shanghai Jiao Tong University Shanghai China Emails:
More informationPower and Bandwidth Allocation in Cooperative Dirty Paper Coding
Power and Bandwidth Allocation in Cooperative Dirty Paper Coding Chris T. K. Ng 1, Nihar Jindal 2 Andrea J. Goldsmith 3, Urbashi Mitra 4 1 Stanford University/MIT, 2 Univeristy of Minnesota 3 Stanford
More informationEE303: Communication Systems
EE303: Communication Systems Professor A. Manikas Chair of Communications and Array Processing Imperial College London An Overview of Fundamentals: Channels, Criteria and Limits Prof. A. Manikas (Imperial
More informationTHIS paper addresses the interference channel with a
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 6, NO. 8, AUGUST 07 599 The Degrees of Freedom of the Interference Channel With a Cognitive Relay Under Delayed Feedback Hyo Seung Kang, Student Member, IEEE,
More information3G Evolution. Outline. Chapter: Multi-antenna configurations. Introduction. Introduction. Multi-antenna techniques. Multiple receiver antennas, SIMO
Chapter: 3G Evolution 6 Outline Introduction Multi-antenna configurations Multi-antenna t techniques Vanja Plicanic vanja.plicanic@eit.lth.se lth Multi-antenna techniques Multiple transmitter antennas,
More informationSecure communication based on noisy input data Fuzzy Commitment schemes. Stephan Sigg
Secure communication based on noisy input data Fuzzy Commitment schemes Stephan Sigg May 24, 2011 Overview and Structure 05.04.2011 Organisational 15.04.2011 Introduction 19.04.2011 Classification methods
More informationDirty Paper Coding vs. TDMA for MIMO Broadcast Channels
1 Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University njindal, andrea@systems.stanford.edu Submitted to IEEE Trans.
More informationThe Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA
The Z Channel Sriram Vishwanath Dept. of Elec. and Computer Engg. Univ. of Texas at Austin, Austin, TX E-mail : sriram@ece.utexas.edu Nihar Jindal Department of Electrical Engineering Stanford University,
More informationArray-Transmission Based Physical-Layer Security Techniques For Wireless Sensor Networks
Proceedings of the IEEE International Conference on Mechatronics & Automation Niagara Falls, Canada July 2005 Array-Transmission Based Physical-Layer Security Techniques For Wireless Sensor Networks Xiaohua(Edward)
More informationMIMO III: Channel Capacity, Interference Alignment
MIMO III: Channel Capacity, Interference Alignment COS 463: Wireless Networks Lecture 18 Kyle Jamieson [Parts adapted from D. Tse] Today 1. MIMO Channel Degrees of Freedom 2. MIMO Channel Capacity 3. Interference
More informationDiffie s Wireless Phone: Heterodyning-Based Physical-Layer Encryption
013 IEEE Military Communications Conference Diffie s Wireless Phone: Heterodyning-Based Physical-Layer Encryption Jerry T. Chiang Advanced Digital Sciences Center Singapore jerry.chiang@adsc.com.sg Yih-Chun
More informationThe Wireless Data Crunch: Motivating Research in Wireless Communications
The Wireless Data Crunch: Motivating Research in Wireless Communications Stephen Hanly CSIRO-Macquarie University Chair in Wireless Communications stephen.hanly@mq.edu.au Wireless Growth Rate Cooper s
More informationSecret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength
Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength Sriram Nandha Premnath Academic Advisors: Sneha K. Kasera, Neal Patwari nandha@cs.utah.edu, kasera@cs.utah.edu, npatwari@ece.utah.edu
More informationMIMO Systems and Applications
MIMO Systems and Applications Mário Marques da Silva marques.silva@ieee.org 1 Outline Introduction System Characterization for MIMO types Space-Time Block Coding (open loop) Selective Transmit Diversity
More informationPattern Synthesis of Massive LED Arrays for Secure Visible Light Communication Links
Pattern Synthesis of Massive LED Arrays for Secure Visible Light Communication Links Ayman Mostafa and Lutz Lampe Department of Electrical and Computer Engineering he University of British Columbia, Vancouver,
More informationOn the Capacity Region of the Vector Fading Broadcast Channel with no CSIT
On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,
More information