Information Theoretic Security: Fundamentals and Applications

Size: px
Start display at page:

Download "Information Theoretic Security: Fundamentals and Applications"

Transcription

1 Information Theoretic Security: Fundamentals and Applications Ashish Khisti University of Toronto IPSI Seminar Nov 25th 23 Ashish Khisti (University of Toronto) / 35

2 Layered Architectures Layered architecture for communication systems. Application Layer (Semantics of Information) Transport Layer (End to End Connectivity) Encryption, Authentication Secure Socket Layer Where is Security? Network Layer (Routing and Path Discovery) Virtual Private Networks Anonymous Routing Data Link Layer (Error Correction Codes) Physical Layer (Signals, RF hardware) Device level Authentication Anti-Jamming Ashish Khisti (University of Toronto) 2 / 35

3 Layered Architectures Layered architecture for communication systems. Application Layer (Semantics of Information) Transport Layer (End to End Connectivity) Encryption, Authentication Secure Socket Layer Where is Security? Wireless Systems Network Layer (Routing and Path Discovery) Virtual Private Networks Anonymous Routing Data Link Layer (Error Correction Codes) Physical Layer (Signals, RF hardware) Ashish Khisti (University of Toronto) 2 / 35

4 Traditional Approach A typical graduate level course in computer security introduces Shannon s notion of security. Shannon s Notion Message W Alice X X Bob decoded message W key K X key K Eve Perfect Secrecy: p(w x)=p(w) Note that Key Size = Message length, hence impractical Focus: computational cryptography Is this all about information theoretic security? Ashish Khisti (University of Toronto) 3 / 35

5 Outline Motivating Applications Secure Biometrics Smart-Meter Privacy Wireless Systems Information Theoretic Models Wiretap Channel Model Secret-key agreement Ashish Khisti (University of Toronto) 4 / 35

6 Biometric Technologies Laptop ATM Passport Ashish Khisti (University of Toronto) 5 / 35

7 Biometric Technologies Laptop ATM Passport Enrollment Feature Extraction Biometric Stored in clear Authentication =? Feature Extraction Ashish Khisti (University of Toronto) 5 / 35

8 Biometric Technologies Laptop ATM Passport Enrollment Feature Extraction Biometric Stored in clear Authentication =? Feature Extraction Issue: Biometrics are stored in the clear Ashish Khisti (University of Toronto) 5 / 35

9 Biometrics: Toy Example Enrolment Biometric Biometric Channel Authentication Biometric No Error Bit Flipped Bit 6 Flipped Bit 7 Flipped 8 Possible Events : All Equally Likely Ashish Khisti (University of Toronto) 6 / 35

10 Biometrics: Toy Example X, Y : length seven binary sequence Channel Model: one bit flip (8 possibilities) 3 bits required. Ashish Khisti (University of Toronto) 7 / 35

11 Biometrics: Toy Example X, Y : length seven binary sequence Channel Model: one bit flip (8 possibilities) 3 bits required. Syndrome Encoder Syndrome Decoder Enrollment Biometric Syndrome bits Authentication Biometric Syndr. Ashish Khisti (University of Toronto) 7 / 35

12 Biometrics: Toy Example X, Y : length seven binary sequence Channel Model: one bit flip (8 possibilities) 3 bits required. Syndrome Encoder Syndrome Decoder Enrollment Biometric Syndrome bits Authentication Biometric Syndr. Ashish Khisti (University of Toronto) 7 / 35

13 Biometrics: Toy Example X, Y : length seven binary sequence Channel Model: one bit flip (8 possibilities) 3 bits required. Syndrome Encoder Syndrome Decoder Enrollment Biometric Syndrome bits Authentication Biometric Syndr. Ashish Khisti (University of Toronto) 7 / 35

14 Biometrics: Toy Example X, Y : length seven binary sequence Channel Model: one bit flip (8 possibilities) 3 bits required. Syndrome Encoder Syndrome Decoder Enrollment Biometric Syndrome bits Authentication Biometric Syndr. Ashish Khisti (University of Toronto) 7 / 35

15 Privacy Preserving Biometrics S. Draper, A. Khisti, et. al Using distributed source coding to secure fingerprint biometrics ICASSP, 27 X Encode enrollment biometric Syndrome Encoding S Store syndrome S Original enrollment biometric Store syndromes Ashish Khisti (University of Toronto) 8 / 35

16 Privacy Preserving Biometrics S. Draper, A. Khisti, et. al Using distributed source coding to secure fingerprint biometrics ICASSP, 27 X Encode enrollment biometric Syndrome Encoding S Store syndrome S Decode w/ probe biometric Syndrome Decoding Original enrollment biometric Fingerprint Channel Y Original enrollment biometric Store syndromes Reproduce enrollment biometric Authentication biometric Ashish Khisti (University of Toronto) 8 / 35

17 Privacy Preserving Biometrics S. Draper, A. Khisti, et. al Using distributed source coding to secure fingerprint biometrics ICASSP, 27 Biometric Authentication X Encode enrollment biometric Syndrome Encoding S One way hash Store syndrome S Decode w/ probe biometric Syndrome Decoding One way hash Original enrollment biometric Fingerprint Channel Y Original enrollment biometric Store syndromes Reproduce enrollment biometric Authenticate Authentication biometric Ashish Khisti (University of Toronto) 8 / 35

18 Smart-Meter Privacy D. Varodayan and A Khisti, ICASSP 2 C. Efthymiou and G. Kalogridis, Smart grid privacy via anonymization of smart metering data, Smart Grid Commun. Conf., Gaithersburg, 2. Ashish Khisti (University of Toronto) 9 / 35

19 Smart-Meter Privacy D. Varodayan and A Khisti, ICASSP 2 User Appliances X Rechargeable Battery Y Utility Company Privacy Leakage: I(X N ;Y N ) Battery: Limited Storage Model Battery as a Finite State Communication Channel Design the Channel Ashish Khisti (University of Toronto) 9 / 35

20 Secret-Key Generation in Wireless Fading Channels m A A Forward Link BA B y h x n B y h x n A BA AB A AB Reverse Link B m B K A K B Channel Gain Reverse Channel Forward Channel Fading Reciprocity Spatial Decorrelation time Ashish Khisti (University of Toronto) / 35

21 Secret-Key Generation in Wireless Fading Channels m A A Forward Link A BA B y h x n B y h x n BA AB A AB Reverse Link B m B K A z AE g AE x n A AE z BE g x n BE B K B BE Channel Gain Eavesdropper Link E Reverse Channel Forward Channel Fading Reciprocity Spatial Decorrelation time Ashish Khisti (University of Toronto) / 35

22 Secret-Key Generation in Wireless Fading Channels A. Khisti 23 m A K A A z AE ForwardLink g y h A AE BA y h B x n A B x n AE BA AB z x n BE A AB ReverseLink g BE x n B BE B K B m B Start E Channel Probing N ĥ AB N ĥ BA Key Extraction Shared Key Two Phase Approach: Phase I: Channel Probing and Estimation: (ĥn AB, ĥn BA ) Phase 2: Source Reconciliation and Key Extraction Secret-Key Generation: Capacity Limits Ashish Khisti (University of Toronto) / 35

23 Secure MIMO Communication Enc. Dec. Rx. Tx. Eaves.?????? Signal of interest: direction of legitimate receiver. Synthetic noise: null-space of legitimate receiver. Ashish Khisti (University of Toronto) 2 / 35

24 Secure MIMO Multicast A. Khisti, 2 Noise Symbols Artificial Noise Alignment Rx Information Symbols IA Precoder Ev Rx2 Signal Masking Transmitter Align Noise Symbols at Legitimate Receivers Mask Information Symbols at Eavesdroppers Ashish Khisti (University of Toronto) 3 / 35

25 Outline Motivating Applications Secure Biometrics Smart-Meter Privacy Wireless Systems Information Theoretic Models Wiretap Channel Model Secret-key agreement Ashish Khisti (University of Toronto) 4 / 35

26 Wiretap Channel Wyner 75 AWGN Wiretap Channel Model Z n r M Encoder X n Z n e Y n r Receiver ˆM Y n e?? Eaves. Reliability Constraint : Pr(M ˆM) n Secrecy Constraint : n H(M Y n e ) = n H(M) o n() Secrecy Capacity Ashish Khisti (University of Toronto) 5 / 35

27 Secrecy Criterion n H(M Y e n ) }{{} Equivocation rate = n H(M) o n () }{{} Information rate Perfect Secrecy: o n (), (Shannon 49) n Weak Secrecy: o n (), (Wyner 75) Strong Secrecy: o n () O ( n), (Maurer and Wolf ) Guessing approach : (Arikan & Merhav 2) Focus: Wyner s notion Ashish Khisti (University of Toronto) 6 / 35

28 Joint Encryption and Encoding Separation based approach vs. Wiretap codes Traditional Approach : Separation... Z n r Key M Key Encryption Encoder X n Z n e Yn r Decoder Decryption ˆM Y n e?? Eaves. Traditional Approach Separation based Requires keys Wiretap Codes Joint encryption/encoding Channel based secrecy Ashish Khisti (University of Toronto) 7 / 35

29 Joint Encryption and Encoding Separation based approach vs. Wiretap codes Wiretap Codes: Joint Encryption and Encoding Z n r Key M Secure Encoder X n Z n e Yn r Decoder Decryption ˆM Y n e?? Eaves. Traditional Approach Separation based Requires keys Wiretap Codes Joint encryption/encoding Channel based secrecy Ashish Khisti (University of Toronto) 7 / 35

30 Joint Encryption and Encoding Separation based approach vs. Wiretap codes Wiretap Codes: Joint Encryption and Encoding Z n r M Secure Encoder X n Z n e Yn r Secure Decoder ˆM Y n e?? Eaves. Traditional Approach Separation based Requires keys Wiretap Codes Joint encryption/encoding Channel based secrecy Ashish Khisti (University of Toronto) 7 / 35

31 Wiretap Codes Uniform Noise Wiretap Channel Model Z n r M Secure Encoder X n Z n e Yn r Secure Decoder ˆM Y n e?? Eaves. QAM Modulation Uniform noise model Recv. Noise Eaves. Noise σ 2 e = 4σ 2 r σ 2 e = 4σ 2 r Ashish Khisti (University of Toronto) 8 / 35

32 Wiretap Codes QAM Modulation Recv. Noise Eaves. Noise σ 2 e = 4σ2 r Uniform noise model Ashish Khisti (University of Toronto) 9 / 35

33 Wiretap Codes QAM Modulation Recv. Noise Eaves. Noise σ 2 e = 4σ2 r Uniform noise model Receiver s Constellation Eavesdropper s Constellation C r = log 2 64 = 6 b/s C e = log 2 6 = 4 b/s Ashish Khisti (University of Toronto) 9 / 35

34 Wiretap Codes QAM Modulation Recv. Noise Eaves. Noise σ 2 e = 4σ2 r Uniform noise model Receiver s Constellation Eavesdropper s Constellation C r = log 2 64 = 6 b/s C e = log 2 6 = 4 b/s C s = C r C e = 2 b/s Ashish Khisti (University of Toronto) 9 / 35

35 Wiretap Codes Secure QAM Constellation Msg Msg2 Msg3 Msg4 Ashish Khisti (University of Toronto) 2 / 35

36 Wiretap Codes Encoding: Randomly select one candidate Msg Msg2 Msg3 Msg4 Ashish Khisti (University of Toronto) 2 / 35

37 Wiretap Codes Decoding at legitimate receiver Msg Msg2 Msg3 Msg4 Ashish Khisti (University of Toronto) 2 / 35

38 Wiretap Codes Confusion at the eavesdropper Msg Msg2 Msg3 Msg4 Ashish Khisti (University of Toronto) 2 / 35

39 Gaussian Wiretap Channel Leung-Yan-Cheong and Hellman 78 Z n r M Encoder X n Z n e Y n r Receiver ˆM Y n e?? Eaves. Secrecy Capacity C s = {log(+snr r ) log(+snr e )} + = {C(SNR r ) C(SNR e )} + SNR r : Legitimate receiver s signal to noise ratio SNR e : Eavesdropper s signal to noise ratio Ashish Khisti (University of Toronto) 2 / 35

40 Other Classical Results The secrecy capacity was also characterized for: Degraded Memoryless Wiretap Channel(Wyner 75) X Y r Y e C = max p X I(X;Y r ) I(X;Y e ) Discrete Memoryless Wiretap Channel (Csiszar-Korner 78) C = max p U,X I(U;Y r ) I(U;Y e ), U X (Y r,y e ) Cardinality bounds on the alphabet of U Ashish Khisti (University of Toronto) 22 / 35

41 Gaussian Wiretap Channel Receiver Transmitter?????? Eavesdropper Strong Requirement: Eavesdropper must not be closer to the transmitter Ashish Khisti (University of Toronto) 23 / 35

42 Gaussian Wiretap Channel Receiver Transmitter Eavesdropper Strong Requirement: Eavesdropper must not be closer to the transmitter Ashish Khisti (University of Toronto) 23 / 35

43 Solution... Multiple Antennas Khisti-Wornell 2 Multi-antenna wiretap channel Receiver Transmitter???? Eavesdropper Spatial Diversity: Multiple Antennas Temporal Diversity: Fading Channels Ashish Khisti (University of Toronto) 24 / 35

44 Solution... Multiple Antennas Khisti-Wornell 2 Multi-antenna wiretap channel Receiver Transmitter???? Channel Model Y r = H r X +Z r Y e = H e X +Z e Eavesdropper Channel matrices: H r C Nr Nt, H e C Ne Nt N t : # Tx antennas AWGN noise: Z r, Z e Ashish Khisti (University of Toronto) 24 / 35

45 MIMOME: Secrecy Capacity Khisti-Wornell 2 Theorem Secrecy capacity of the Multi-antenna wiretap channel is given by, C s = max logdet(i r +H r QH r ) logdet(i e +H e QH e ) Q :Tr(Q) P Ashish Khisti (University of Toronto) 25 / 35

46 MIMOME: Secrecy Capacity Khisti-Wornell 2 Theorem Secrecy capacity of the Multi-antenna wiretap channel is given by, C s = max logdet(i r +H r QH r ) logdet(i e +H e QH e ) Q :Tr(Q) P Scalar Gaussian Case (Leung-Yan-Cheong & Hellman 78), C s = log(+snr r ) log(+snr e ) New information theoretic upper-bound Convex Optimization Matrix Analysis Ashish Khisti (University of Toronto) 25 / 35

47 Secrecy Capacity: Remarks C s = max logdet(i r +H r QH r) logdet(i e +H e QH e) Q :Tr(Q) P Ashish Khisti (University of Toronto) 26 / 35

48 Secrecy Capacity: Remarks C s = max logdet(i r +H r QH r) logdet(i e +H e QH e) Q :Tr(Q) P Convex Reformulation C s = min Φ P max Q Q R +(Φ,Q) Ashish Khisti (University of Toronto) 26 / 35

49 Secrecy Capacity: Remarks C s = max logdet(i r +H r QH r) logdet(i e +H e QH e) Q :Tr(Q) P Convex Reformulation C s = min Φ P max Q Q R +(Φ,Q) 2 MISOME Case: rank-one covariance is optimal C s = log + λ max (I +Ph r h r,i +PH eh e ) Ashish Khisti (University of Toronto) 26 / 35

50 Secrecy Capacity: Remarks C s = max logdet(i r +H r QH r) logdet(i e +H e QH e) Q :Tr(Q) P Convex Reformulation C s = min Φ P max Q Q R +(Φ,Q) 2 MISOME Case: rank-one covariance is optimal C s = log + λ max (I +Ph r h r,i +PH eh e ) 3 High SNR case: GSVD transform Simultaneous diagonalization: (H r,h e ) Ashish Khisti (University of Toronto) 26 / 35

51 Masked Beamforming Scheme MISOME Case: Y r = h rx +Z r, Y e = H e X +Z e Enc. Dec. Rx. Tx. Eaves.?????? Ashish Khisti (University of Toronto) 27 / 35

52 Masked Beamforming Scheme MISOME Case: Y r = h rx +Z r, Y e = H e X +Z e Enc. Dec. Rx. Tx. Eaves.?????? Signal of interest: direction of legitimate receiver. Synthetic noise: null-space of legitimate receiver. Ashish Khisti (University of Toronto) 27 / 35

53 Masked Beamforming vs. Capacity Achieving Scheme MISOME Case: Y r = h rx +Z r, Y e = H e X +Z e Masked beamforming scheme Capacity achieving scheme h r, H e Scalar Wiretap Code h r Masked Beam-forming Scalar Wiretap Code h, H r e Optimal Beam-forming Ashish Khisti (University of Toronto) 28 / 35

54 Masked Beamforming vs. Capacity Achieving Scheme MISOME Case: Y r = h rx +Z r, Y e = H e X +Z e Masked beamforming scheme Capacity achieving scheme h r, H e Scalar Wiretap Code h r Masked Beam-forming Scalar Wiretap Code h, H r e Optimal Beam-forming { ) } lim C (h r,h e, PNt R MB (h r,h e,p) = P Transmit Power: P Transmit antennas: N t Ashish Khisti (University of Toronto) 28 / 35

55 Outline Motivating Applications Secure Biometrics Smart-Meter Privacy Wireless Systems Information Theoretic Models Wiretap Channel Model Secret-key agreement Ashish Khisti (University of Toronto) 29 / 35

56 Secret Key Generation Maurer 93, Ahlswede-Csiszar 93 u N v N A F = f(u N ) B k = K A (u N ) ˆk = K B (v N,f) Error Probability: Pr(k ˆk) ε N Equivocation: N H(k f) N H(k) ε n Rate R = N H(k) C key = I(u;v) Ashish Khisti (University of Toronto) 3 / 35

57 Achievability Random Binning Technique (Slepian-Wolf 73) u N Slepain-Wolf Encoder Bin-Index Bin Bin 2 No. of Bins: 2 nh(v u) No. of Sequences/Bin: 2 ni(u;v) Ashish Khisti (University of Toronto) 3 / 35

58 Joint Source and Channel Coding Khisti-Diggavi-Wornell 8 u N v N Enc. x n p(y,z x) yn z n dec w.t. Two types of uncertainty Sources Channel How to combine both these equivocation for secret-key-distillation? Ashish Khisti (University of Toronto) 32 / 35

59 Achievability Wiretap Codebook x n y n Wiretap Decoder u N Wyner-Ziv Codebook Bin Index v N Bin Index Wyner-Ziv Decoder W-Z Codeword Secret-Key Codebook k k W-Z Codeword Secret Key Codebook Encoder Decoder R key = max βi(t;v) t,x }{{} src. equiv. +I(x;y) I(x;z) }{{} channel equiv. t u v, β{i(t;u) I(t;v)} I(x;y) Ashish Khisti (University of Toronto) 33 / 35

60 Capacity Results R key = max t,x βi(t;v)+i(x;y z) t u v, β{i(t;u) I(t;v)} I(x;y) Upper and lower bounds coincide, when channels are degraded or parallel reversely degraded broadcast. Capacity for Parallel Gaussian broadcast channels and Gaussian sources Extension to side information at the eavesdropper, when sources and channels are degraded. Ashish Khisti (University of Toronto) 34 / 35

61 Conclusions Motivating Applications Secure Biometrics Smart-Meter Privacy Wireless Systems Information Theoretic Models Wiretap Channel Model Secret-key agreement Ashish Khisti (University of Toronto) 35 / 35

Physical Layer Security for Wireless Networks

Physical Layer Security for Wireless Networks Physical Layer Security for Wireless Networks Şennur Ulukuş Department of ECE University of Maryland ulukus@umd.edu Joint work with Shabnam Shafiee, Nan Liu, Ersen Ekrem, Jianwei Xie and Pritam Mukherjee.

More information

Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications

Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications 1 Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications Shaofeng Zou, Student Member, IEEE, Yingbin Liang, Member, IEEE, Lifeng Lai, Member, IEEE, H. Vincent Poor, Fellow,

More information

Secure Degrees of Freedom of the Gaussian MIMO Wiretap and MIMO Broadcast Channels with Unknown Eavesdroppers

Secure Degrees of Freedom of the Gaussian MIMO Wiretap and MIMO Broadcast Channels with Unknown Eavesdroppers 1 Secure Degrees of Freedom of the Gaussian MIMO Wiretap and MIMO Broadcast Channels with Unknown Eavesdroppers Mohamed Amir and Tamer Khattab Electrical Engineering, Qatar University Email: mohamed.amir@qu.edu.qa,

More information

A Practical Method to Achieve Perfect Secrecy

A Practical Method to Achieve Perfect Secrecy A Practical Method to Achieve Perfect Secrecy Amir K. Khandani E&CE Department, University of Waterloo August 3 rd, 2014 Perfect Secrecy: One-time Pad One-time Pad: Bit-wise XOR of a (non-reusable) binary

More information

On Secure Signaling for the Gaussian Multiple Access Wire-Tap Channel

On Secure Signaling for the Gaussian Multiple Access Wire-Tap Channel On ecure ignaling for the Gaussian Multiple Access Wire-Tap Channel Ender Tekin tekin@psu.edu emih Şerbetli serbetli@psu.edu Wireless Communications and Networking Laboratory Electrical Engineering Department

More information

Artificial Intersymbol Interference (ISI) to Exploit Receiver Imperfections for Secrecy

Artificial Intersymbol Interference (ISI) to Exploit Receiver Imperfections for Secrecy Artificial Intersymbol Interference ISI to Exploit Receiver Imperfections for Secrecy Azadeh Sheikholeslami, Dennis Goeckel and Hossein ishro-nik Electrical and Computer Engineering Department, University

More information

Course Developer: Ranjan Bose, IIT Delhi

Course Developer: Ranjan Bose, IIT Delhi Course Title: Coding Theory Course Developer: Ranjan Bose, IIT Delhi Part I Information Theory and Source Coding 1. Source Coding 1.1. Introduction to Information Theory 1.2. Uncertainty and Information

More information

Computing and Communications 2. Information Theory -Channel Capacity

Computing and Communications 2. Information Theory -Channel Capacity 1896 1920 1987 2006 Computing and Communications 2. Information Theory -Channel Capacity Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Communication

More information

Information flow over wireless networks: a deterministic approach

Information flow over wireless networks: a deterministic approach Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory

More information

Opportunistic network communications

Opportunistic network communications Opportunistic network communications Suhas Diggavi School of Computer and Communication Sciences Laboratory for Information and Communication Systems (LICOS) Ecole Polytechnique Fédérale de Lausanne (EPFL)

More information

Lecture 8 Multi- User MIMO

Lecture 8 Multi- User MIMO Lecture 8 Multi- User MIMO I-Hsiang Wang ihwang@ntu.edu.tw 5/7, 014 Multi- User MIMO System So far we discussed how multiple antennas increase the capacity and reliability in point-to-point channels Question:

More information

A Bit of network information theory

A Bit of network information theory Š#/,% 0/,94%#(.)15% A Bit of network information theory Suhas Diggavi 1 Email: suhas.diggavi@epfl.ch URL: http://licos.epfl.ch Parts of talk are joint work with S. Avestimehr 2, S. Mohajer 1, C. Tian 3,

More information

Multicasting over Multiple-Access Networks

Multicasting over Multiple-Access Networks ing oding apacity onclusions ing Department of Electrical Engineering and omputer Sciences University of alifornia, Berkeley May 9, 2006 EE 228A Outline ing oding apacity onclusions 1 2 3 4 oding 5 apacity

More information

Interference: An Information Theoretic View

Interference: An Information Theoretic View Interference: An Information Theoretic View David Tse Wireless Foundations U.C. Berkeley ISIT 2009 Tutorial June 28 Thanks: Changho Suh. Context Two central phenomena in wireless communications: Fading

More information

Everlasting Security and Undetectability in Wireless Communications

Everlasting Security and Undetectability in Wireless Communications Everlasting Security and Undetectability in Wireless Communications ICNC Lecture February 6, 2014 Dennis Goeckel University of Massachusetts Amherst This work is supported by the National Science Foundation

More information

MU-MIMO in LTE/LTE-A Performance Analysis. Rizwan GHAFFAR, Biljana BADIC

MU-MIMO in LTE/LTE-A Performance Analysis. Rizwan GHAFFAR, Biljana BADIC MU-MIMO in LTE/LTE-A Performance Analysis Rizwan GHAFFAR, Biljana BADIC Outline 1 Introduction to Multi-user MIMO Multi-user MIMO in LTE and LTE-A 3 Transceiver Structures for Multi-user MIMO Rizwan GHAFFAR

More information

Coding for Noisy Networks

Coding for Noisy Networks Coding for Noisy Networks Abbas El Gamal Stanford University ISIT Plenary, June 2010 A. El Gamal (Stanford University) Coding for Noisy Networks ISIT Plenary, June 2010 1 / 46 Introduction Over past 40+

More information

OPTIMIZATION OF TRANSMIT SIGNALS TO INTERFERE EAVESDROPPING IN A WIRELESS LAN

OPTIMIZATION OF TRANSMIT SIGNALS TO INTERFERE EAVESDROPPING IN A WIRELESS LAN 04 IEEE International Conference on Acoustic, Speech and Signal Processing ICASSP) OPTIMIZATION OF TRANSMIT SIGNALS TO INTERFERE EAVESDROPPING IN A WIRELESS LAN Shuichi Ohno, Yuji Wakasa, Shui Qiang Yan,

More information

Practical Implementation of Physical-Layer Key Generation using Standard WLAN Cards and Performance Evaluation

Practical Implementation of Physical-Layer Key Generation using Standard WLAN Cards and Performance Evaluation Practical Implementation of Physical-Layer Key Generation using Standard WLAN Cards and Performance Evaluation by Munder Hamruni Master Thesis in Electronics Engineering Ph.D. cand. (ABD) Oana Graur Prof.

More information

PIMRC 2016: Practical Examples of Physical Layer Security

PIMRC 2016: Practical Examples of Physical Layer Security PIMRC 2016: Practical Examples of Physical Layer Security 4 September 2016, Valencia How it looks from outside "All you need to make a movie is a girl and a gun" Jean-Luc Godard How it looks from outside

More information

ELEC E7210: Communication Theory. Lecture 11: MIMO Systems and Space-time Communications

ELEC E7210: Communication Theory. Lecture 11: MIMO Systems and Space-time Communications ELEC E7210: Communication Theory Lecture 11: MIMO Systems and Space-time Communications Overview of the last lecture MIMO systems -parallel decomposition; - beamforming; - MIMO channel capacity MIMO Key

More information

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1 Antenna, Antenna : Antenna and Theoretical Foundations of Wireless Communications 1 Friday, April 27, 2018 9:30-12:00, Kansliet plan 3 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication

More information

CHAPTER 8 MIMO. Xijun Wang

CHAPTER 8 MIMO. Xijun Wang CHAPTER 8 MIMO Xijun Wang WEEKLY READING 1. Goldsmith, Wireless Communications, Chapters 10 2. Tse, Fundamentals of Wireless Communication, Chapter 7-10 2 MIMO 3 BENEFITS OF MIMO n Array gain The increase

More information

Key Generation Exploiting MIMO Channel Evolution: Algorithms and Theoretical Limits

Key Generation Exploiting MIMO Channel Evolution: Algorithms and Theoretical Limits Key Generation Exploiting MIMO Channel Evolution: Algorithms and Theoretical Limits Jon W. Wallace, Chan Chen, Michael A. Jensen School of Engineering and Science, Jacobs University Bremen Campus Ring,

More information

Wireless Network Information Flow

Wireless Network Information Flow Š#/,% 0/,94%#(.)15% Wireless Network Information Flow Suhas iggavi School of Computer and Communication Sciences, Laboratory for Information and Communication Systems (LICOS), EPFL Email: suhas.diggavi@epfl.ch

More information

Distributed Source Coding: A New Paradigm for Wireless Video?

Distributed Source Coding: A New Paradigm for Wireless Video? Distributed Source Coding: A New Paradigm for Wireless Video? Christine Guillemot, IRISA/INRIA, Campus universitaire de Beaulieu, 35042 Rennes Cédex, FRANCE Christine.Guillemot@irisa.fr The distributed

More information

Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna

Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna Vincent Lau Associate Prof., University of Hong Kong Senior Manager, ASTRI Agenda Bacground Lin Level vs System Level Performance

More information

SHANNON S source channel separation theorem states

SHANNON S source channel separation theorem states IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 9, SEPTEMBER 2009 3927 Source Channel Coding for Correlated Sources Over Multiuser Channels Deniz Gündüz, Member, IEEE, Elza Erkip, Senior Member,

More information

Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective

Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective Naroa Zurutuza - EE360 Winter 2014 Introduction Cognitive Radio: Wireless communication system that intelligently

More information

Diversity Gain Region for MIMO Fading Multiple Access Channels

Diversity Gain Region for MIMO Fading Multiple Access Channels Diversity Gain Region for MIMO Fading Multiple Access Channels Lihua Weng, Sandeep Pradhan and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor,

More information

On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets

On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets Mohammed Eltayeb*, Junil Choi*, Tareq Al-Naffouri #, and Robert W. Heath Jr.* * Wireless Networking and Communications

More information

Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper s Receiver

Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper s Receiver Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper s Receiver Azadeh Sheikholeslami, Student Member, IEEE, Dennis Goeckel, Fellow, IEEE and Hossein Pishro-Nik, Member, IEEE Abstract Secure

More information

Cooperation in Wireless Networks

Cooperation in Wireless Networks Cooperation in Wireless Networks Ivana Marić and Ron Dabora Stanford 15 September 2008 Ivana Marić and Ron Dabora Cooperation in Wireless Networks 1 Objectives The case for cooperation Types of cooperation

More information

Diversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels

Diversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels Diversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels Lizhong Zheng and David Tse Department of EECS, U.C. Berkeley Feb 26, 2002 MSRI Information Theory Workshop Wireless Fading Channels

More information

Outage Probability of a Multi-User Cooperation Protocol in an Asynchronous CDMA Cellular Uplink

Outage Probability of a Multi-User Cooperation Protocol in an Asynchronous CDMA Cellular Uplink Outage Probability of a Multi-User Cooperation Protocol in an Asynchronous CDMA Cellular Uplink Kanchan G. Vardhe, Daryl Reynolds, and Matthew C. Valenti Lane Dept. of Comp. Sci and Elec. Eng. West Virginia

More information

Power Allocation Tradeoffs in Multicarrier Authentication Systems

Power Allocation Tradeoffs in Multicarrier Authentication Systems Power Allocation Tradeoffs in Multicarrier Authentication Systems Paul L. Yu, John S. Baras, and Brian M. Sadler Abstract Physical layer authentication techniques exploit signal characteristics to identify

More information

Multiuser Information Theory and Wireless Communications. Professor in Charge: Toby Berger Principal Lecturer: Jun Chen

Multiuser Information Theory and Wireless Communications. Professor in Charge: Toby Berger Principal Lecturer: Jun Chen Multiuser Information Theory and Wireless Communications Professor in Charge: Toby Berger Principal Lecturer: Jun Chen Where and When? 1 Good News No homework. No exam. 2 Credits:1-2 One credit: submit

More information

Multiple Antennas. Mats Bengtsson, Björn Ottersten. Basic Transmission Schemes 1 September 8, Presentation Outline

Multiple Antennas. Mats Bengtsson, Björn Ottersten. Basic Transmission Schemes 1 September 8, Presentation Outline Multiple Antennas Capacity and Basic Transmission Schemes Mats Bengtsson, Björn Ottersten Basic Transmission Schemes 1 September 8, 2005 Presentation Outline Channel capacity Some fine details and misconceptions

More information

Frequency hopping does not increase anti-jamming resilience of wireless channels

Frequency hopping does not increase anti-jamming resilience of wireless channels Frequency hopping does not increase anti-jamming resilience of wireless channels Moritz Wiese and Panos Papadimitratos Networed Systems Security Group KTH Royal Institute of Technology, Stocholm, Sweden

More information

ECE 4400:693 - Information Theory

ECE 4400:693 - Information Theory ECE 4400:693 - Information Theory Dr. Nghi Tran Lecture 1: Introduction & Overview Dr. Nghi Tran (ECE-University of Akron) ECE 4400:693 Information Theory 1 / 26 Outline 1 Course Information 2 Course Overview

More information

Network Information Theory

Network Information Theory 1 / 191 Network Information Theory Young-Han Kim University of California, San Diego Joint work with Abbas El Gamal (Stanford) IEEE VTS San Diego 2009 2 / 191 Network Information Flow Consider a general

More information

Cooperative MIMO schemes optimal selection for wireless sensor networks

Cooperative MIMO schemes optimal selection for wireless sensor networks Cooperative MIMO schemes optimal selection for wireless sensor networks Tuan-Duc Nguyen, Olivier Berder and Olivier Sentieys IRISA Ecole Nationale Supérieure de Sciences Appliquées et de Technologie 5,

More information

Diversity and Multiplexing: A Fundamental Tradeoff in Wireless Systems

Diversity and Multiplexing: A Fundamental Tradeoff in Wireless Systems Diversity and Multiplexing: A Fundamental Tradeoff in Wireless Systems David Tse Department of EECS, U.C. Berkeley June 6, 2003 UCSB Wireless Fading Channels Fundamental characteristic of wireless channels:

More information

Guaranteeing Secrecy in Wireless Networks using Artificial Noise

Guaranteeing Secrecy in Wireless Networks using Artificial Noise Guaranteeing Secrecy in Wireless Networks using Artificial Noise Submitted by: Satashu Goel Department of Electrical and Computer Engineering Advisor: Professor Rohit Negi Department of Electrical and

More information

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques 1 Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques Bin Song and Martin Haardt Outline 2 Multi-user user MIMO System (main topic in phase I and phase II) critical problem Downlink

More information

1 Interference Cancellation

1 Interference Cancellation Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2017 Problem Set 1 September 19, 2017 This problem set has 7 questions, each with several parts.

More information

Scheduling in omnidirectional relay wireless networks

Scheduling in omnidirectional relay wireless networks Scheduling in omnidirectional relay wireless networks by Shuning Wang A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied Science

More information

RECENTLY, a significant effort has been made on physical

RECENTLY, a significant effort has been made on physical I TRANSACTIONS ON WIRLSS COMMUNICATIONS, VOL. 11, NO. 3, MARCH 2012 903 Pilot Contamination for Active avesdropping Xiangyun Zhou, Member, I, Behrouz Maham, Member, I, and Are Hjørungnes Abstract xisting

More information

Antennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO

Antennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO Antennas and Propagation b: Path Models Rayleigh, Rician Fading, MIMO Introduction From last lecture How do we model H p? Discrete path model (physical, plane waves) Random matrix models (forget H p and

More information

Lecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr.

Lecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr. Lecture #2 EE 471C / EE 381K-17 Wireless Communication Lab Professor Robert W. Heath Jr. Preview of today s lecture u Introduction to digital communication u Components of a digital communication system

More information

When Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network

When Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network When Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network Nadia Fawaz, David Gesbert Mobile Communications Department, Eurecom Institute Sophia-Antipolis, France {fawaz, gesbert}@eurecom.fr

More information

Error Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria

Error Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria Error Control Coding Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria Topics Introduction The Channel Coding Problem Linear Block Codes Cyclic Codes BCH and Reed-Solomon

More information

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,

More information

Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks

Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks B.Vijayanarasimha Raju 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:

More information

Capacity and Cooperation in Wireless Networks

Capacity and Cooperation in Wireless Networks Capacity and Cooperation in Wireless Networks Chris T. K. Ng and Andrea J. Goldsmith Stanford University Abstract We consider fundamental capacity limits in wireless networks where nodes can cooperate

More information

Coding Techniques and the Two-Access Channel

Coding Techniques and the Two-Access Channel Coding Techniques and the Two-Access Channel A.J. Han VINCK Institute for Experimental Mathematics, University of Duisburg-Essen, Germany email: Vinck@exp-math.uni-essen.de Abstract. We consider some examples

More information

CONSTELLATION SHAPING FOR BROADCAST CHANNELS IN PRACTICAL SITUATIONS

CONSTELLATION SHAPING FOR BROADCAST CHANNELS IN PRACTICAL SITUATIONS 19th European Signal Processing Conference (EUSIPCO 2011) Barcelona, Spain, August 29 - September 2, 2011 CONSTELLATION SHAPING FOR BROADCAST CHANNELS IN PRACTICAL SITUATIONS Zeina Mheich 1, Pierre Duhamel

More information

1 Overview of MIMO communications

1 Overview of MIMO communications Jerry R Hampton 1 Overview of MIMO communications This chapter lays the foundations for the remainder of the book by presenting an overview of MIMO communications Fundamental concepts and key terminology

More information

Info theory and big data

Info theory and big data Info theory and big data Typical or not typical, that is the question Han Vinck University Duisburg Essen, Germany September 2016 A.J. Han Vinck, Yerevan, September 2016 Content: big data issues A definition:

More information

Noncoherent Communications with Large Antenna Arrays

Noncoherent Communications with Large Antenna Arrays Noncoherent Communications with Large Antenna Arrays Mainak Chowdhury Joint work with: Alexandros Manolakos, Andrea Goldsmith, Felipe Gomez-Cuba and Elza Erkip Stanford University September 29, 2016 Wireless

More information

Optimizing future wireless communication systems

Optimizing future wireless communication systems Optimizing future wireless communication systems "Optimization and Engineering" symposium Louvain-la-Neuve, May 24 th 2006 Jonathan Duplicy (www.tele.ucl.ac.be/digicom/duplicy) 1 Outline History Challenges

More information

DEGRADED broadcast channels were first studied by

DEGRADED broadcast channels were first studied by 4296 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 9, SEPTEMBER 2008 Optimal Transmission Strategy Explicit Capacity Region for Broadcast Z Channels Bike Xie, Student Member, IEEE, Miguel Griot,

More information

Physical-Layer Multicasting by Stochastic Beamforming and Alamouti Space-Time Coding

Physical-Layer Multicasting by Stochastic Beamforming and Alamouti Space-Time Coding Physical-Layer Multicasting by Stochastic Beamforming and Alamouti Space-Time Coding Anthony Man-Cho So Dept. of Systems Engineering and Engineering Management The Chinese University of Hong Kong (Joint

More information

Degrees of Freedom in Multiuser MIMO

Degrees of Freedom in Multiuser MIMO Degrees of Freedom in Multiuser MIMO Syed A Jafar Electrical Engineering and Computer Science University of California Irvine, California, 92697-2625 Email: syed@eceuciedu Maralle J Fakhereddin Department

More information

On the Capacity Regions of Two-Way Diamond. Channels

On the Capacity Regions of Two-Way Diamond. Channels On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of

More information

Hybrid Compression and Message-Sharing Strategy for the Downlink Cloud Radio-Access Network

Hybrid Compression and Message-Sharing Strategy for the Downlink Cloud Radio-Access Network Hybrid Compression and Message-Sharing Strategy for the Downlink Cloud Radio-Access Network Pratik Patil and Wei Yu Department of Electrical and Computer Engineering University of Toronto, Toronto, Ontario

More information

ECEn 665: Antennas and Propagation for Wireless Communications 131. s(t) = A c [1 + αm(t)] cos (ω c t) (9.27)

ECEn 665: Antennas and Propagation for Wireless Communications 131. s(t) = A c [1 + αm(t)] cos (ω c t) (9.27) ECEn 665: Antennas and Propagation for Wireless Communications 131 9. Modulation Modulation is a way to vary the amplitude and phase of a sinusoidal carrier waveform in order to transmit information. When

More information

Symmetric Decentralized Interference Channels with Noisy Feedback

Symmetric Decentralized Interference Channels with Noisy Feedback 4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en

More information

Massive MIMO: Signal Structure, Efficient Processing, and Open Problems I

Massive MIMO: Signal Structure, Efficient Processing, and Open Problems I Massive MIMO: Signal Structure, Efficient Processing, and Open Problems I Saeid Haghighatshoar Communications and Information Theory Group (CommIT) Technische Universität Berlin CoSIP Winter Retreat Berlin,

More information

An Orthogonal Relay Protocol with Improved Diversity-Multiplexing Tradeoff

An Orthogonal Relay Protocol with Improved Diversity-Multiplexing Tradeoff SUBMITTED TO IEEE TRANS. WIRELESS COMMNS., NOV. 2009 1 An Orthogonal Relay Protocol with Improved Diversity-Multiplexing Tradeoff K. V. Srinivas, Raviraj Adve Abstract Cooperative relaying helps improve

More information

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems MIMO Each node has multiple antennas Capable of transmitting (receiving) multiple streams

More information

Analysis of Space-Time Block Coded Spatial Modulation in Correlated Rayleigh and Rician Fading Channels

Analysis of Space-Time Block Coded Spatial Modulation in Correlated Rayleigh and Rician Fading Channels Analysis of Space-Time Block Coded Spatial Modulation in Correlated Rayleigh and Rician Fading Channels B Kumbhani, V K Mohandas, R P Singh, S Kabra and R S Kshetrimayum Department of Electronics and Electrical

More information

#8 Adaptive Modulation Coding

#8 Adaptive Modulation Coding 06 Q Wireless Communication Engineering #8 Adaptive Modulation Coding Kei Sakaguchi sakaguchi@mobile.ee. July 5, 06 Course Schedule () Date Text Contents #7 July 5 4.6 Error correction coding #8 July 5

More information

Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels

Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels IET Communications Research Article Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels ISSN 1751-8628 Received on 28th July 2014 Accepted

More information

Block Markov Encoding & Decoding

Block Markov Encoding & Decoding 1 Block Markov Encoding & Decoding Deqiang Chen I. INTRODUCTION Various Markov encoding and decoding techniques are often proposed for specific channels, e.g., the multi-access channel (MAC) with feedback,

More information

Optimal Rate-Diversity-Delay Tradeoff in ARQ Block-Fading Channels

Optimal Rate-Diversity-Delay Tradeoff in ARQ Block-Fading Channels Optimal Rate-Diversity-Delay Tradeoff in ARQ Block-Fading Channels Allen Chuang School of Electrical and Information Eng. University of Sydney Sydney NSW, Australia achuang@ee.usyd.edu.au Albert Guillén

More information

CorteXlab: research. opportunities. Jean-Marie Gorce

CorteXlab: research. opportunities. Jean-Marie Gorce CorteXlab: research opportunities Jean-Marie Gorce jean-marie.gorce@insa-lyon.fr CorteXlab inauguration Tuesday, October 28, 2014 Which theoretical framework? EM theory Information theory Queuing theory

More information

SourceSync. Exploiting Sender Diversity

SourceSync. Exploiting Sender Diversity SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored

More information

Lecture 4 Diversity and MIMO Communications

Lecture 4 Diversity and MIMO Communications MIMO Communication Systems Lecture 4 Diversity and MIMO Communications Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Spring 2017 1 Outline Diversity Techniques

More information

Space-Time Coding: Fundamentals

Space-Time Coding: Fundamentals Space-Time Coding: Fundamentals Xiang-Gen Xia Dept of Electrical and Computer Engineering University of Delaware Newark, DE 976, USA Email: xxia@ee.udel.edu and xianggen@gmail.com Outline Background Single

More information

Optimization Techniques for Alphabet-Constrained Signal Design

Optimization Techniques for Alphabet-Constrained Signal Design Optimization Techniques for Alphabet-Constrained Signal Design Mojtaba Soltanalian Department of Electrical Engineering California Institute of Technology Stanford EE- ISL Mar. 2015 Optimization Techniques

More information

Information Theoretic Analysis of Cognitive Radio Systems

Information Theoretic Analysis of Cognitive Radio Systems Information Theoretic Analysis of Cognitive Radio Systems Natasha Devroye 1, Patrick Mitran 1, Masoud Sharif 2, Saeed Ghassemzadeh 3, and Vahid Tarokh 1 1 Division of Engineering and Applied Sciences,

More information

On Optimum Communication Cost for Joint Compression and Dispersive Information Routing

On Optimum Communication Cost for Joint Compression and Dispersive Information Routing 2010 IEEE Information Theory Workshop - ITW 2010 Dublin On Optimum Communication Cost for Joint Compression and Dispersive Information Routing Kumar Viswanatha, Emrah Akyol and Kenneth Rose Department

More information

Hybrid ARQ Scheme with Antenna Permutation for MIMO Systems in Slow Fading Channels

Hybrid ARQ Scheme with Antenna Permutation for MIMO Systems in Slow Fading Channels Hybrid ARQ Scheme with Antenna Permutation for MIMO Systems in Slow Fading Channels Jianfeng Wang, Meizhen Tu, Kan Zheng, and Wenbo Wang School of Telecommunication Engineering, Beijing University of Posts

More information

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Fan Xu Kangqi Liu and Meixia Tao Dept of Electronic Engineering Shanghai Jiao Tong University Shanghai China Emails:

More information

Power and Bandwidth Allocation in Cooperative Dirty Paper Coding

Power and Bandwidth Allocation in Cooperative Dirty Paper Coding Power and Bandwidth Allocation in Cooperative Dirty Paper Coding Chris T. K. Ng 1, Nihar Jindal 2 Andrea J. Goldsmith 3, Urbashi Mitra 4 1 Stanford University/MIT, 2 Univeristy of Minnesota 3 Stanford

More information

EE303: Communication Systems

EE303: Communication Systems EE303: Communication Systems Professor A. Manikas Chair of Communications and Array Processing Imperial College London An Overview of Fundamentals: Channels, Criteria and Limits Prof. A. Manikas (Imperial

More information

THIS paper addresses the interference channel with a

THIS paper addresses the interference channel with a IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 6, NO. 8, AUGUST 07 599 The Degrees of Freedom of the Interference Channel With a Cognitive Relay Under Delayed Feedback Hyo Seung Kang, Student Member, IEEE,

More information

3G Evolution. Outline. Chapter: Multi-antenna configurations. Introduction. Introduction. Multi-antenna techniques. Multiple receiver antennas, SIMO

3G Evolution. Outline. Chapter: Multi-antenna configurations. Introduction. Introduction. Multi-antenna techniques. Multiple receiver antennas, SIMO Chapter: 3G Evolution 6 Outline Introduction Multi-antenna configurations Multi-antenna t techniques Vanja Plicanic vanja.plicanic@eit.lth.se lth Multi-antenna techniques Multiple transmitter antennas,

More information

Secure communication based on noisy input data Fuzzy Commitment schemes. Stephan Sigg

Secure communication based on noisy input data Fuzzy Commitment schemes. Stephan Sigg Secure communication based on noisy input data Fuzzy Commitment schemes Stephan Sigg May 24, 2011 Overview and Structure 05.04.2011 Organisational 15.04.2011 Introduction 19.04.2011 Classification methods

More information

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels 1 Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University njindal, andrea@systems.stanford.edu Submitted to IEEE Trans.

More information

The Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA

The Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA The Z Channel Sriram Vishwanath Dept. of Elec. and Computer Engg. Univ. of Texas at Austin, Austin, TX E-mail : sriram@ece.utexas.edu Nihar Jindal Department of Electrical Engineering Stanford University,

More information

Array-Transmission Based Physical-Layer Security Techniques For Wireless Sensor Networks

Array-Transmission Based Physical-Layer Security Techniques For Wireless Sensor Networks Proceedings of the IEEE International Conference on Mechatronics & Automation Niagara Falls, Canada July 2005 Array-Transmission Based Physical-Layer Security Techniques For Wireless Sensor Networks Xiaohua(Edward)

More information

MIMO III: Channel Capacity, Interference Alignment

MIMO III: Channel Capacity, Interference Alignment MIMO III: Channel Capacity, Interference Alignment COS 463: Wireless Networks Lecture 18 Kyle Jamieson [Parts adapted from D. Tse] Today 1. MIMO Channel Degrees of Freedom 2. MIMO Channel Capacity 3. Interference

More information

Diffie s Wireless Phone: Heterodyning-Based Physical-Layer Encryption

Diffie s Wireless Phone: Heterodyning-Based Physical-Layer Encryption 013 IEEE Military Communications Conference Diffie s Wireless Phone: Heterodyning-Based Physical-Layer Encryption Jerry T. Chiang Advanced Digital Sciences Center Singapore jerry.chiang@adsc.com.sg Yih-Chun

More information

The Wireless Data Crunch: Motivating Research in Wireless Communications

The Wireless Data Crunch: Motivating Research in Wireless Communications The Wireless Data Crunch: Motivating Research in Wireless Communications Stephen Hanly CSIRO-Macquarie University Chair in Wireless Communications stephen.hanly@mq.edu.au Wireless Growth Rate Cooper s

More information

Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength

Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength Sriram Nandha Premnath Academic Advisors: Sneha K. Kasera, Neal Patwari nandha@cs.utah.edu, kasera@cs.utah.edu, npatwari@ece.utah.edu

More information

MIMO Systems and Applications

MIMO Systems and Applications MIMO Systems and Applications Mário Marques da Silva marques.silva@ieee.org 1 Outline Introduction System Characterization for MIMO types Space-Time Block Coding (open loop) Selective Transmit Diversity

More information

Pattern Synthesis of Massive LED Arrays for Secure Visible Light Communication Links

Pattern Synthesis of Massive LED Arrays for Secure Visible Light Communication Links Pattern Synthesis of Massive LED Arrays for Secure Visible Light Communication Links Ayman Mostafa and Lutz Lampe Department of Electrical and Computer Engineering he University of British Columbia, Vancouver,

More information

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,

More information