Secret-Key Generation from Channel Reciprocity: A Separation Approach
|
|
- Madison Blankenship
- 5 years ago
- Views:
Transcription
1 Secret-ey Generation from Channel Reciprocity: Separation pproach shish histi Department of Electrical and Computer Engineering University of Toronto Feb 11, 2013
2 Security at PHY-Layer Use PHY Resources for designing security mechanisms. pplication Layer (Semantics of Information) Transport Layer (End to End Connectivity) Encryption, uthentication Secure Socket Layer Wireless Systems Network Layer (Routing and Path Discovery) Virtual Private Networks nonymous Routing Data Link Layer (Error Correction Codes) Physical Layer (Signals, RF hardware) Device level uthentication nti-jamming pplications: Secret-ey Generation Secure Message Transmission Physical Layer uthentication Jamming Resistance Feb 11, / 20
3 Motivation Secret-ey Generation in Wireless Fading Channels m Forward Link y = h x + n y = h x + n Reverse Link m Channel Gain Fading: Reverse Channel Forward Channel y (t) = h (t)x (t)+n (t) Reciprocity: time y (t) = h (t)x (t) + n (t) y (t) = h (t)x (t) + n (t) Feb 11, / 20
4 Motivation Secret-ey Generation in Wireless Fading Channels m Forward Link y = h x + n y = h x + n Reverse Link m z + E = g E x ne z E = g E x + ne Channel Gain Eavesdropper Link Reverse Channel Forward Channel E Spatial Decorrelation: y (t)= h (t)x (t) + n (t) y (t)= h (t)x (t) + n (t) z (t)= g (t)x (t) + n E (t) z (t)= g (t)x (t) + n E (t) time Feb 11, / 20
5 Secret-ey Generation - Systems pproach ey Generation in Wireless Systems UW Systems: Wilson-Tse-Scholz ( 07), M. o ( 07), Madiseh-Neville-McGuire( 12) Narrowband Systems: zimi Sadjadi- iayias-mercado-yener ( 07), Mathur-Trappe-Mandayam -Ye-Reznick ( 10), Patware and asera ( 07) OFDM reciprocity: Haile ( 09), Tsouri and Wulich ( 09) Implementations Experimental UW: Measurements for ey Generation Madiseh ( 12) Software Radio Implementations: Jana et. al. ( 09) MIMO systems: Wallace and Sharma ( 10), Shimizu et al. Zeng-Wu-Mohapatra Signal Processing for Secret-ey Generation ttacks Quantization Techniques: Ye-Reznik-Shah ( 07), Hamida-Pierrot-Castelluccia ( 09), Sun-Zhu-Jiang-Zhao ( 11) daptive Channel Probing: Wei-Zheng-Mohapatra ( 10) Mobility ssisted ey Generation: Gungor-Chen-oksal ( 11) ctive Eavesdroppers: Ebrez et. al ( 11) Zafer-grawal-Srivatsa ( 11), Unauthenticated Channels: Mathur et al. ( 10), Xiao-Greenstein-Mandayam-Trappe ( 07). Feb 11, / 20
6 Secret-ey Generation: Systems pproach II m z E Forward Link g y h E y h x n x n E z x n E Reverse Link g E x n E m Start E Channel Probing N ĥ N ĥ ey Extraction Shared ey Two Phase pproach: Phase I: Channel Probing and Estimation: (ĥn, ĥn ) Phase 2: Source Reconciliation and ey Extraction Secret-ey Generation: Limits Capacity Feb 11, / 20
7 Secret-ey Generation - Source Model Maurer ( 93), hlswede-csiszar ( 93) N X N X Terminal Public Discussion Channel Terminal Eavesdropper DMMS Model: (x N, x N ) N i=1 p x,x (x (i), x (i)) Interactive Public Communication: F ey Generation: k i = F i (xi N, F), i {, }. Reliability: Pr(k k ) ε N, 1 Secrecy: N I(k ; F) ε N Secret-ey Rate: R = 1 N H(k ) Feb 11, / 20
8 Secret-ey Generation - Source Model Maurer ( 93), Csiszar-hlswede ( 93) N X N X Slepian-Wolf Encoder F F Slepian-Wolf Decoder ey-distillation F Eavesdropper N Xˆ ey-distillation Capacity: C = I(x ; x ) One-Round of Communication Capacity Unknown when Eavesdropper also observes a source sequence Feb 11, / 20
9 Problem Setup m Forward Link y = h x + n y = h x + n Reverse Link m z + E = g E x ne z E = g E x + ne E Two-Way Reciprocal Fading Channel y (i) = h (i)x (i) + n (i), y (i) = h (i)x (i) + n (i) z (i) = g (i)x (i) + n E (i), z (i) = g (i)x (i) + n E (i) Feb 11, / 20
10 Problem Setup m Forward Link y = h x + n y = h x + n Reverse Link m z + E = g E x ne z E = g E x + ne Two-Way Reciprocal Fading Channel y (i) = h (i)x (i) + n (i), z (i) = g (i)x (i) + n E (i), E y (i) = h (i)x (i) + n (i) z (i) = g (i)x (i) + n E (i) Channel Model ssumptions: Non-Coherent Model: h (i) and h (i) Perfect Eavesdropper CSI: g (i) & g (i) known to Eve lock-fading Channel with Coherence Period: T. pproximate Reciprocity: (h, h ) p h,h (, ) Independence: (g, g ) (h, h ) Feb 11, / 20
11 Problem Setup m Forward Link y = h x + n y = h x + n Reverse Link m z + E = g E x ne z E = g E x + ne Two-Way Reciprocal Fading Channel y (i) = h (i)x (i) + n (i), z (i) = g (i)x (i) + n E (i), E y (i) = h (i)x (i) + n (i) z (i) = g (i)x (i) + n E (i) Secret-ey greement Protocols: Interactive: x (i) = f (m, y i 1 ), x (i) = f (m, y i 1 verage Power Constraints E[ x 2 ] P, E[ x 2 ] P. k = (y N, m ), k = (y N, m ) Reliability and Secrecy Constraint. Secret-ey Capacity ) Feb 11, / 20
12 Outline Upper ound Lower ound With Public Discussion Lower ound No Public Discussion symptotic Regimes and Numerical Results Feb 11, / 20
13 Secret-ey Capacity Upper ound histi 12 Theorem n upper bound on the secret-key capacity is C R + : R + = 1 [ ( T I(h ; h ) + max E log 1 + P (h ) h 2 )] ) P (h ) P 1 + P (h ) g 2 [ + max E log (1 + P (h ) h 2 )] P (h ) P 1 + P (h ) g 2 ) where P (h ) and P (h ) are power allocation function across the fading states. Feb 11, / 20
14 Secret-ey Capacity Upper ound Genie-ided Channel: h x y y x h Feb 11, / 20
15 Secret-ey Capacity Upper ound Genie-ided Channel: h x y y x h NT R I(m, h, N y NT ; m, h, N y NT z NT, g N ) Feb 11, / 20
16 Secret-ey Capacity Upper ound Genie-ided Channel: h x y y x h NT R I(m, h, N y NT ; m, h, N y NT z NT, g N ) I(x (NT ); y (NT ) h (N), z (NT ), g (N)) + I(x (NT ); y (NT ) h (N), z (NT ), g (N)) + I(m, h N, y NT 1 NT 1 ; m, h, N y z NT 1, g N ) Feb 11, / 20
17 Secret-ey Capacity Upper ound Genie-ided Channel: h x y y x h NT R I(m, h, N y NT ; m, h, N y NT z NT, g N ) NT I(x (n); y (n) h (n), z (n), ḡ (n)) n=1 NT + I(x (n); y (n) h (n), z (n), ḡ (n)) n=1 + NI(h ; h ) Feb 11, / 20
18 Secret-ey Capacity Upper ound Genie-ided Channel: h x y y x h Interpretation of the Upper ound: Channel Reciprocity: 1 T I(h ; h ) Forward Channel: I(y ; x h, z, g ) Reverse Channel: I(y ; x h, z, g ) Feb 11, / 20
19 Secret-ey Capacity Upper ound Genie-ided Channel: h x y y x h Public Discussion Channel Interpretation of the Upper ound: Channel Reciprocity: 1 T I(h ; h ) Forward Channel: I(y ; x h, z, g ) Reverse Channel: I(y ; x h, z, g ) Upper ound also holds if a public discussion channel is available. Feb 11, / 20
20 Lower ound: Separation ased Scheme histi 12 T T P N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) 1 P1 P1 Randomness Sharing Randomness Sharing Training: x (i, 1) = P 1 Randomness Sharing: x (i, t) CN (0, P 2 ) for t = 2,..., T x (i) = [x (i, 2),..., x (i, T )] C T 1. Training: ĥ(i) and ĥ(i) Correlated Sources: Forward Channel: y (i) = h (i)x (i) + n (i) C T 1, Reverse Channel: y (i) = h (i)x (i) + n (i) C T 1. Feb 11, / 20
21 Lower ound: Separation ased Scheme histi 12 T T P N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) 1 P1 P1 Randomness Sharing Randomness Sharing E Channel State ĥ ĥ (g, g ) Forward Channel x y z Reverse Channel y x z Feb 11, / 20
22 Lower ound: Separation ased Scheme histi 12 T T P N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) 1 P1 P1 Randomness Sharing Randomness Sharing E Channel State ĥ ĥ (g, g ) Forward Channel x y z Reverse Channel y x z Generate a secret-key from these sequences. Feb 11, / 20
23 Lower ound Overview Start Channel Probing Randomness Sharing ĥ ĥ Channel Reconciliation ĥ ĥ ĥ ĥ Secret-ey Extraction T Y T Y Source Reconciliation T T Y Y Shared ey Feb 11, / 20
24 chievable Rate with Public Discussion Theorem (Public Discussion) n achievable rate when a public discussion channel is available is { 1 R key = I(ĥ; ĥ) T }{{} + T 1 T + T 1 T Training [ ] I(y ; x, ĥ) I(y ; z, g, h ) } {{ } Forward Channel [ ] } I(y ; x, ĥ)) I(y ; z, g, h ) } {{ } Reverse Channel Feb 11, / 20
25 chievable Rate with Public Discussion Theorem (Public Discussion) n achievable rate when a public discussion channel is available is { 1 R key = I(ĥ; ĥ) T }{{} + T 1 T + T 1 T Training [ ] I(y ; x, ĥ) I(y ; z, g, h ) } {{ } Forward Channel [ ] } I(y ; x, ĥ)) I(y ; z, g, h ) } {{ } Reverse Channel Feb 11, / 20
26 High SNR Regime Theorem In the high SNR regime our upper and lower bound (with public discussion) coincide: } lim {R + (P ) R PD (P ) c P T where [ c =E log (1 + h 2 )] [ g 2 +E log (1 + h 2 )] g 2 Feb 11, / 20
27 Lower ound Without Public Discussion (T-1) Training Communication Transmission Public Discussion Coherence locks 1 2 Phase Probing + Randomness Sharing Channel-Sequence Reconciliation Source-Sequence Reconciliation Coherence locks ε 1 ε 2 Feb 11, / 20
28 Numerical Plot SNR =35 d, h 1, h 2 CN (0, 1), ρ = Lower ound Upper ound Public Discussion Training Rate (nats/symbol) Coherence Period (T) Feb 11, / 20
29 Symmetric MIMO Extension M. ndersson,. histi and M. Skoglund, 2012 y = H x + n, y = H x + n, z = G E x + n E z = G E x + n E H, H C M M, G E, G E C N E M Independent Rayleigh Fading, pproximate Reciprocity lock Fading with Coherence Period T T M N E Training + Source Emulation achieves degrees of freedom given by: d = max 2(T M )(M N E ) M [1,M] T Feb 11, / 20
30 Conclusions Secret-ey greement in Two-Way fading channels Upper and Lower ounds on Capacity symptotic Optimality Significant Gains over Training ased Schemes Future Work: Upper ounds with Perfect Reciprocity (See lso Lai-Liang-Poor 12) Stationary Fading Channels Low SNR Regime Stronger Eavesdropper Channels Feb 11, / 20
31 Error Reconciliation Public Discussion Channel, Discrete-Valued Sequences Reconciliation of Channel-Estimate Sequences (ĥ, ĥ ) ĥ ĥ ĥ ĥ Discussion Channel ĥ hˆ ( hˆ ĥ, hˆ ) Discussion Channel 1 H(φ ) H(ĥ ĥ), 1 H(φ ) H(ĥ ĥ) Feb 11, / 20
32 Error Reconciliation Public Discussion Channel, Discrete-Valued Sequences Reconciliation of Channel-Estimate Sequences (ĥ, ĥ ) ĥ ĥ ĥ ĥ Discussion Channel ĥ hˆ ( hˆ ĥ, hˆ ) Discussion Channel Reconciliation of (y, y ) y x, hˆ x h ˆ, y Discussion Channel y Common Sequence: ( y y, y, hˆ ) Discussion Channel 1 T H(ψ ) H(y x, ĥ, ĥ), 1 T H(ψ ) H(y x, ĥ, ĥ) Feb 11, / 20
Secret-Key Generation over Reciprocal Fading Channels
Secret-ey Generation over Reciprocal Fading Channels shish histi Department of Electrical and Computer Engineering University of oronto Nov. 14, 2012 Motivation Secret-ey Generation in Wireless Fading
More informationExtracting a Secret Key from a Wireless Channel
Extracting a Secret Key from a Wireless Channel Suhas Mathur suhas@winlab.rutgers.edu W. Trappe, N. Mandayam (WINLAB) Chunxuan Ye, Alex Reznik (InterDigital) Suhas Mathur (WINLAB) Secret bits from the
More informationGroup Secret Key Agreement over State-Dependent Wireless Broadcast Channels
Group Secret Key Agreement over State-Dependent Wireless Broadcast Channels Mahdi Jafari Siavoshani Sharif University of Technology, Iran Shaunak Mishra, Suhas Diggavi, Christina Fragouli Institute of
More informationMinimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels
Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou Email: tchou@wisc.edu Akbar M. Sayeed Email: akbar@engr.wisc.edu Stark C. Draper Email: sdraper@ece.wisc.edu
More informationAchieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel
Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Shahid Mehraj Shah and Vinod Sharma Department of Electrical Communication Engineering, Indian Institute of
More informationExploiting Partial Channel State Information for Secrecy over Wireless Channels
Exploiting Partial Channel State Information for Secrecy over Wireless Channels Matthieu R. Bloch and J. Nicholas Laneman Abstract In this paper, we investigate the effect of partial channel state information
More informationDEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE
DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE Daohua Zhu, A. Lee Swindlehurst, S. Ali A. Fakoorian, Wei Xu, Chunming Zhao National Mobile Communications Research Lab, Southeast
More informationSecret Key Agreement Using Asymmetry in Channel State Knowledge
Secret Key Agreement Using Asymmetry in Channel State Knowledge Ashish Khisti Deutsche Telekom Inc. R&D Lab USA Los Altos, CA, 94040 Email: ashish.khisti@telekom.com Suhas Diggavi LICOS, EFL Lausanne,
More informationThe Private Key Capacity of a Cooperative Pairwise-Independent Network
The Private Key Capacity of a Cooperative Pairwise-Independent Network Peng Xu, Zhiguo Ding and Xuchu Dai Dept. of Elec. Eng. and Info Sci., Univ. Science & Tech. China, Hefei, Anhui, 230027, P..China
More informationSecure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel
Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu
More informationAN INTRODUCTION TO SECRECY CAPACITY. 1. Overview
AN INTRODUCTION TO SECRECY CAPACITY BRIAN DUNN. Overview This paper introduces the reader to several information theoretic aspects of covert communications. In particular, it discusses fundamental limits
More informationCapacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming
Capacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming Authors: Christian Lameiro, Alfredo Nazábal, Fouad Gholam, Javier Vía and Ignacio Santamaría University of Cantabria,
More informationOn the Secrecy Capacity of Fading Channels
On the Secrecy Capacity of Fading Channels arxiv:cs/63v [cs.it] 7 Oct 26 Praveen Kumar Gopala, Lifeng Lai and Hesham El Gamal Department of Electrical and Computer Engineering The Ohio State University
More informationMULTITERMINAL SECRECY AND TREE PACKING. With Imre Csiszár, Sirin Nitinawarat, Chunxuan Ye, Alexander Barg and Alex Reznik
MULTITERMINAL SECRECY AND TREE PACKING With Imre Csiszár, Sirin Nitinawarat, Chunxuan Ye, Alexander Barg and Alex Reznik Information Theoretic Security A complementary approach to computational security
More informationErgodic and Outage Capacity of Narrowband MIMO Gaussian Channels
Ergodic and Outage Capacity of Narrowband MIMO Gaussian Channels Yang Wen Liang Department of Electrical and Computer Engineering The University of British Columbia April 19th, 005 Outline of Presentation
More informationInformation-theoretically Secret Key. Generation for Fading Wireless Channels
Information-theoretically Secret Key 1 Generation for Fading Wireless Channels Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra Shah, Wade Trappe and Narayan Mandayam arxiv:0910.5027v1 [cs.cr] 27 Oct 2009
More informationLecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH
MIMO : MIMO Theoretical Foundations of Wireless Communications 1 Wednesday, May 25, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication 1 / 20 Overview MIMO
More informationROBUST SECRET KEY CAPACITY FOR THE MIMO INDUCED SOURCE MODEL. Javier Vía
ROBUST SECRET KEY CAPACITY FOR THE MIMO INDUCED SOURCE MODEL Javier Vía University of Cantabria, Spain e-mail: jvia@gtas.dicom.unican.es web: gtas.unican.es ABSTRACT This paper considers the problem of
More informationApproximate Ergodic Capacity of a Class of Fading Networks
Approximate Ergodic Capacity of a Class of Fading Networks Sang-Woon Jeon, Chien-Yi Wang, and Michael Gastpar School of Computer and Communication Sciences EPFL Lausanne, Switzerland {sangwoon.jeon, chien-yi.wang,
More informationLecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH
: Antenna Diversity and Theoretical Foundations of Wireless Communications Wednesday, May 4, 206 9:00-2:00, Conference Room SIP Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication
More information(Structured) Coding for Real-Time Streaming Communication
(Structured) Coding for Real-Time Streaming Communication Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Joint work with: Ahmed Badr (Toronto), Farrokh Etezadi (Toronto),
More informationSecret Key and Private Key Constructions for Simple Multiterminal Source Models
Secret Key and Private Key Constructions for Simple Multiterminal Source Models arxiv:cs/05050v [csit] 3 Nov 005 Chunxuan Ye Department of Electrical and Computer Engineering and Institute for Systems
More informationA Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying
A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,
More informationKeyless authentication in the presence of a simultaneously transmitting adversary
Keyless authentication in the presence of a simultaneously transmitting adversary Eric Graves Army Research Lab Adelphi MD 20783 U.S.A. ericsgra@ufl.edu Paul Yu Army Research Lab Adelphi MD 20783 U.S.A.
More informationThe Role of Channel States in Secret Key Generation
2st Annual IEEE International ymposium on Personal, Indoor and Mobile Radio Communications The Role of Channel tates in ecret Key Generation Xiang He Aylin Yener Wireless Communications and Networking
More informationUsing Noncoherent Modulation for Training
EE8510 Project Using Noncoherent Modulation for Training Yingqun Yu May 5, 2005 0-0 Noncoherent Channel Model X = ρt M ΦH + W Rayleigh flat block-fading, T: channel coherence interval Marzetta & Hochwald
More informationSecret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper
Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper Mohsen Bahrami, Ali Bereyhi, Mahtab Mirmohseni and Mohammad Reza Aref Information Systems and Security
More informationJoint Channel Estimation and Co-Channel Interference Mitigation in Wireless Networks Using Belief Propagation
Joint Channel Estimation and Co-Channel Interference Mitigation in Wireless Networks Using Belief Propagation Yan Zhu, Dongning Guo and Michael L. Honig Northwestern University May. 21, 2008 Y. Zhu, D.
More informationFading Wiretap Channel with No CSI Anywhere
Fading Wiretap Channel with No CSI Anywhere Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 7 pritamm@umd.edu ulukus@umd.edu Abstract
More informationSecure Multiuser MISO Communication Systems with Quantized Feedback
Secure Multiuser MISO Communication Systems with Quantized Feedback Berna Özbek*, Özgecan Özdoğan*, Güneş Karabulut Kurt** *Department of Electrical and Electronics Engineering Izmir Institute of Technology,Turkey
More informationTHE IDEA of exploiting wireless fading channels for
476 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 3, MARCH 04 Secret Key Generation in the Two-Way Relay Channel With Active Attackers Heng Zhou, Lauren M. Huie, Member, IEEE, and
More informationSecret Key Generation and Secure Computing
Secret Key Generation and Secure Computing Himanshu Tyagi Department of Electrical and Computer Engineering and Institute of System Research University of Maryland, College Park, USA. Joint work with Prakash
More informationExploiting Partial Channel Knowledge at the Transmitter in MISO and MIMO Wireless
Exploiting Partial Channel Knowledge at the Transmitter in MISO and MIMO Wireless SPAWC 2003 Rome, Italy June 18, 2003 E. Yoon, M. Vu and Arogyaswami Paulraj Stanford University Page 1 Outline Introduction
More informationAhmed S. Mansour, Rafael F. Schaefer and Holger Boche. June 9, 2015
The Individual Secrecy Capacity of Degraded Multi-Receiver Wiretap Broadcast Channels Ahmed S. Mansour, Rafael F. Schaefer and Holger Boche Lehrstuhl für Technische Universität München, Germany Department
More informationDegrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel
/33 Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel Presented by Paul de Kerret Joint work with Antonio Bazco, Nicolas Gresset, and David Gesbert ESIT 2017 in Madrid,
More informationSecrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View
Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View P. Mohapatra 9 th March 2013 Outline Motivation Problem statement Achievable scheme 1 Weak interference
More informationPerformance-based Security for Encoding of Information Signals. FA ( ) Paul Cuff (Princeton University)
Performance-based Security for Encoding of Information Signals FA9550-15-1-0180 (2015-2018) Paul Cuff (Princeton University) Contributors Two students finished PhD Tiance Wang (Goldman Sachs) Eva Song
More informationLecture 2. Capacity of the Gaussian channel
Spring, 207 5237S, Wireless Communications II 2. Lecture 2 Capacity of the Gaussian channel Review on basic concepts in inf. theory ( Cover&Thomas: Elements of Inf. Theory, Tse&Viswanath: Appendix B) AWGN
More informationInformation-Theoretic Security: an overview
Information-Theoretic Security: an overview Rui A Costa 1 Relatório para a disciplina de Seminário, do Mestrado em Informática da Faculdade de Ciências da Universidade do Porto, sob a orientação do Prof
More informationCommon Randomness Principles of Secrecy
Common Randomness Principles of Secrecy Himanshu Tyagi Department of Electrical and Computer Engineering and Institute of Systems Research 1 Correlated Data, Distributed in Space and Time Sensor Networks
More informationLecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH
: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 Rayleigh Wednesday, June 1, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication
More informationOn the Capacity and Degrees of Freedom Regions of MIMO Interference Channels with Limited Receiver Cooperation
On the Capacity and Degrees of Freedom Regions of MIMO Interference Channels with Limited Receiver Cooperation Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang 1 arxiv:1308.3310v1 [cs.it] 15 Aug 2013
More informationAPPLICATIONS. Quantum Communications
SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction
More informationHarnessing Interaction in Bursty Interference Networks
215 IEEE Hong Kong-Taiwan Joint Workshop on Information Theory and Communications Harnessing Interaction in Bursty Interference Networks I-Hsiang Wang NIC Lab, NTU GICE 1/19, 215 Modern Wireless: Grand
More informationRandom Access Protocols for Massive MIMO
Random Access Protocols for Massive MIMO Elisabeth de Carvalho Jesper H. Sørensen Petar Popovski Aalborg University Denmark Emil Björnson Erik G. Larsson Linköping University Sweden 2016 Tyrrhenian International
More informationRECURSIVE TRAINING WITH UNITARY MODULATION FOR CORRELATED BLOCK-FADING MIMO CHANNELS
RECURSIVE TRAINING WITH UNITARY MODULATION FOR CORRELATED BLOCK-FADING MIMO CHANNELS Wenyi Zhang, Student Member, IEEE, and J Nicholas Laneman, Member, IEEE Department of Electrical Engineering University
More informationOn the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise
On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise Ya-Lan Liang, Yung-Shun Wang, Tsung-Hui Chang, Y.-W. Peter Hong, and Chong-Yung Chi Institute of Communications
More informationSHARED INFORMATION. Prakash Narayan with. Imre Csiszár, Sirin Nitinawarat, Himanshu Tyagi, Shun Watanabe
SHARED INFORMATION Prakash Narayan with Imre Csiszár, Sirin Nitinawarat, Himanshu Tyagi, Shun Watanabe 2/40 Acknowledgement Praneeth Boda Himanshu Tyagi Shun Watanabe 3/40 Outline Two-terminal model: Mutual
More informationLecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1
: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 Rayleigh Friday, May 25, 2018 09:00-11:30, Kansliet 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless
More informationMultiple Antennas in Wireless Communications
Multiple Antennas in Wireless Communications Luca Sanguinetti Department of Information Engineering Pisa University luca.sanguinetti@iet.unipi.it April, 2009 Luca Sanguinetti (IET) MIMO April, 2009 1 /
More informationSHARED INFORMATION. Prakash Narayan with. Imre Csiszár, Sirin Nitinawarat, Himanshu Tyagi, Shun Watanabe
SHARED INFORMATION Prakash Narayan with Imre Csiszár, Sirin Nitinawarat, Himanshu Tyagi, Shun Watanabe 2/41 Outline Two-terminal model: Mutual information Operational meaning in: Channel coding: channel
More informationMulti-User Gain Maximum Eigenmode Beamforming, and IDMA. Peng Wang and Li Ping City University of Hong Kong
Multi-User Gain Maximum Eigenmode Beamforming, and IDMA Peng Wang and Li Ping City University of Hong Kong 1 Contents Introduction Multi-user gain (MUG) Maximum eigenmode beamforming (MEB) MEB performance
More informationLimited Feedback in Wireless Communication Systems
Limited Feedback in Wireless Communication Systems - Summary of An Overview of Limited Feedback in Wireless Communication Systems Gwanmo Ku May 14, 17, and 21, 2013 Outline Transmitter Ant. 1 Channel N
More informationMIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper
MIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper Xiang He, Ashish Khisti, Aylin Yener Dept. of Electrical and Computer Engineering, University of Toronto, Toronto, ON, M5S 3G4, Canada
More informationECE Information theory Final (Fall 2008)
ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1
More informationDiversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT. ECE 559 Presentation Hoa Pham Dec 3, 2007
Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT ECE 559 Presentation Hoa Pham Dec 3, 2007 Introduction MIMO systems provide two types of gains Diversity Gain: each path from a transmitter
More informationSecrecy Outage Performance of Cooperative Relay Network With Diversity Combining
Secrecy Outage erformance of Cooperative Relay Network With Diversity Combining Khyati Chopra Dept. of lectrical ngineering Indian Institute of Technology, Delhi New Delhi-110016, India mail: eez148071@ee.iitd.ac.in
More informationLECTURE 15. Last time: Feedback channel: setting up the problem. Lecture outline. Joint source and channel coding theorem
LECTURE 15 Last time: Feedback channel: setting up the problem Perfect feedback Feedback capacity Data compression Lecture outline Joint source and channel coding theorem Converse Robustness Brain teaser
More informationTransmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback
IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of
More informationGroup secret key agreement over state-dependent wireless broadcast channels
1 Group secret ey agreement over state-dependent wireless broadcast channels Mahdi Jafari Siavoshani, Shauna Mishra, Christina Fragouli, Suhas N. Diggavi Sharif University of Technology, Tehran, Iran University
More information3F1: Signals and Systems INFORMATION THEORY Examples Paper Solutions
Engineering Tripos Part IIA THIRD YEAR 3F: Signals and Systems INFORMATION THEORY Examples Paper Solutions. Let the joint probability mass function of two binary random variables X and Y be given in the
More informationOutage Capacity of the Fading Relay Channel in the Low SNR Regime
Outage Capacity of the Fading Relay Channel in the Low SNR Regime Amir Salman Avestimehr Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2006-36
More informationCooperative HARQ with Poisson Interference and Opportunistic Routing
Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline
More informationAdvanced Topics in Digital Communications Spezielle Methoden der digitalen Datenübertragung
Advanced Topics in Digital Communications Spezielle Methoden der digitalen Datenübertragung Dr.-Ing. Carsten Bockelmann Institute for Telecommunications and High-Frequency Techniques Department of Communications
More informationApproximately achieving the feedback interference channel capacity with point-to-point codes
Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used
More informationJoint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation
Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Chongbin Xu, Peng Wang, Zhonghao Zhang, and Li Ping City University of Hong Kong 1 Outline Background Mutual Information
More informationSecret Message Capacity of Erasure Broadcast Channels with Feedback
Secret Message Capacity of Erasure Broadcast Channels with Feedback László Czap Vinod M. Prabhakaran Christina Fragouli École Polytechnique Fédérale de Lausanne, Switzerland Email: laszlo.czap vinod.prabhakaran
More informationOptimal Power Allocation for Achieving Perfect Secrecy Capacity in MIMO Wire-Tap Channels
Optimal Power Allocation for Achieving Perfect Secrecy Capacity in MIMO Wire-Tap Channels Jia Liu, Y. Thomas Hou, and Hanif D. Sherali Bradley Department of Electrical and Computer Engineering Grado Department
More informationPing Pong Protocol & Auto-compensation
Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol
More informationInformation Theory for Wireless Communications, Part II:
Information Theory for Wireless Communications, Part II: Lecture 5: Multiuser Gaussian MIMO Multiple-Access Channel Instructor: Dr Saif K Mohammed Scribe: Johannes Lindblom In this lecture, we give the
More informationOptimal Power Allocation for Energy Recycling Assisted Cooperative Communications
Optimal Power llocation for Energy Recycling ssisted Cooperative Communications George. Ropokis, M. Majid Butt, Nicola Marchetti and Luiz. DaSilva CONNECT Centre, Trinity College, University of Dublin,
More informationQuantum key distribution for the lazy and careless
Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center
More informationApproximate Capacity of Fast Fading Interference Channels with no CSIT
Approximate Capacity of Fast Fading Interference Channels with no CSIT Joyson Sebastian, Can Karakus, Suhas Diggavi Abstract We develop a characterization of fading models, which assigns a number called
More informationNash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels
Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Jung Hoon Lee and Huaiyu Dai Department of Electrical and Computer Engineering, North Carolina State University,
More informationLecture 4. Capacity of Fading Channels
1 Lecture 4. Capacity of Fading Channels Capacity of AWGN Channels Capacity of Fading Channels Ergodic Capacity Outage Capacity Shannon and Information Theory Claude Elwood Shannon (April 3, 1916 February
More informationAdaptive Wireless Channel Probing for Shared Key Generation based on PID Controller
IEEE TRANSACTIONS ON MOBILE COMPUTING,MANUSCRIPT 1 Adaptive Wireless Channel Probing for Shared Key Generation based on PID Controller Yunchuan Wei, Kai Zeng, Member, IEEE, and Prasant Mohapatra, Fellow,
More informationSecret Key Agreement: General Capacity and Second-Order Asymptotics. Masahito Hayashi Himanshu Tyagi Shun Watanabe
Secret Key Agreement: General Capacity and Second-Order Asymptotics Masahito Hayashi Himanshu Tyagi Shun Watanabe Two party secret key agreement Maurer 93, Ahlswede-Csiszár 93 X F Y K x K y ArandomvariableK
More informationEE 4TM4: Digital Communications II Scalar Gaussian Channel
EE 4TM4: Digital Communications II Scalar Gaussian Channel I. DIFFERENTIAL ENTROPY Let X be a continuous random variable with probability density function (pdf) f(x) (in short X f(x)). The differential
More informationMultiuser Capacity in Block Fading Channel
Multiuser Capacity in Block Fading Channel April 2003 1 Introduction and Model We use a block-fading model, with coherence interval T where M independent users simultaneously transmit to a single receiver
More informationOn Capacity Under Received-Signal Constraints
On Capacity Under Received-Signal Constraints Michael Gastpar Dept. of EECS, University of California, Berkeley, CA 9470-770 gastpar@berkeley.edu Abstract In a world where different systems have to share
More informationAn Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009
An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer
More informationAn Uplink-Downlink Duality for Cloud Radio Access Network
An Uplin-Downlin Duality for Cloud Radio Access Networ Liang Liu, Prati Patil, and Wei Yu Department of Electrical and Computer Engineering University of Toronto, Toronto, ON, 5S 3G4, Canada Emails: lianguotliu@utorontoca,
More informationLecture 7 MIMO Communica2ons
Wireless Communications Lecture 7 MIMO Communica2ons Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 1 Outline MIMO Communications (Chapter 10
More informationTCP over Cognitive Radio Channels
1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done
More information1 Background on Information Theory
Review of the book Information Theory: Coding Theorems for Discrete Memoryless Systems by Imre Csiszár and János Körner Second Edition Cambridge University Press, 2011 ISBN:978-0-521-19681-9 Review by
More informationVector Channel Capacity with Quantized Feedback
Vector Channel Capacity with Quantized Feedback Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 9697-65 Email: syed@ece.uci.edu,
More informationChapter 4: Continuous channel and its capacity
meghdadi@ensil.unilim.fr Reference : Elements of Information Theory by Cover and Thomas Continuous random variable Gaussian multivariate random variable AWGN Band limited channel Parallel channels Flat
More informationPerfect Omniscience, Perfect Secrecy and Steiner Tree Packing
Perfect Omniscience, Perfect Secrecy and Steiner Tree Packing S. Nitinawarat and P. Narayan Department of Electrical and Computer Engineering and Institute for Systems Research University of Maryland College
More informationDiversity-Multiplexing Tradeoff of the Two-User Interference Channel
Diversity-Multiplexing Tradeoff of the Two-User Interference Channel arxiv:0905.0385v2 [cs.it] 8 Sep 2009 Adnan Raja and Pramod Viswanath April 9, 2018 Abstract Diversity-Multiplexing tradeoff DMT) is
More informationELEC546 Review of Information Theory
ELEC546 Review of Information Theory Vincent Lau 1/1/004 1 Review of Information Theory Entropy: Measure of uncertainty of a random variable X. The entropy of X, H(X), is given by: If X is a discrete random
More informationFinite-Blocklength Bounds on the Maximum Coding Rate of Rician Fading Channels with Applications to Pilot-Assisted Transmission
Finite-Blocklength Bounds on the Maximum Coding Rate of Rician Fading Channels with Applications to Pilot-Assisted Transmission Johan Östman, Giuseppe Durisi, and Erik G. Ström Dept. of Signals and Systems,
More informationThe Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems
The Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems Jie Yang and D.R. Brown III Worcester Polytechnic Institute Department
More informationChannel Coding for Secure Transmissions
Channel Coding for Secure Transmissions March 27, 2017 1 / 51 McEliece Cryptosystem Coding Approach: Noiseless Main Channel Coding Approach: Noisy Main Channel 2 / 51 Outline We present an overiew of linear
More informationSpectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy
Spectrum Leasing via Cooperation for Enhanced 1 Physical-Layer Secrecy Keonkook Lee, Member, IEEE, Chan-Byoung Chae, Senior Member, IEEE, Joonhyuk Kang, Member, IEEE arxiv:1205.0085v1 [cs.it] 1 May 2012
More informationA robust transmit CSI framework with applications in MIMO wireless precoding
A robust transmit CSI framework with applications in MIMO wireless precoding Mai Vu, and Arogyaswami Paulraj Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,
More informationAchievability of Nonlinear Degrees of Freedom in Correlatively Changing Fading Channels
Achievability of Nonlinear Degrees of Freedom in Correlatively Changing Fading Channels Mina Karzand Massachusetts Institute of Technology Cambridge, USA Email: mkarzand@mitedu Lizhong Zheng Massachusetts
More informationThe Optimality of Beamforming: A Unified View
The Optimality of Beamforming: A Unified View Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 92697-2625 Email: sudhirs@uciedu,
More information120 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 67, NO. 1, JANUARY 1, 2019
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 67, NO., JANUARY, 9 Advanced Properties of Full-Duplex Radio for Securing Wireless Network Yingbo Hua, Fellow, IEEE Abstract This paper examines the role of
More informationTrust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems
Introduction Main Results Simulation Conclusions Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Mojtaba Vaezi joint work with H. Inaltekin, W. Shin, H. V. Poor, and
More informationCapacity Theorems for Relay Channels
Capacity Theorems for Relay Channels Abbas El Gamal Department of Electrical Engineering Stanford University April, 2006 MSRI-06 Relay Channel Discrete-memoryless relay channel [vm 7] Relay Encoder Y n
More information