Secret-Key Generation from Channel Reciprocity: A Separation Approach

Size: px
Start display at page:

Download "Secret-Key Generation from Channel Reciprocity: A Separation Approach"

Transcription

1 Secret-ey Generation from Channel Reciprocity: Separation pproach shish histi Department of Electrical and Computer Engineering University of Toronto Feb 11, 2013

2 Security at PHY-Layer Use PHY Resources for designing security mechanisms. pplication Layer (Semantics of Information) Transport Layer (End to End Connectivity) Encryption, uthentication Secure Socket Layer Wireless Systems Network Layer (Routing and Path Discovery) Virtual Private Networks nonymous Routing Data Link Layer (Error Correction Codes) Physical Layer (Signals, RF hardware) Device level uthentication nti-jamming pplications: Secret-ey Generation Secure Message Transmission Physical Layer uthentication Jamming Resistance Feb 11, / 20

3 Motivation Secret-ey Generation in Wireless Fading Channels m Forward Link y = h x + n y = h x + n Reverse Link m Channel Gain Fading: Reverse Channel Forward Channel y (t) = h (t)x (t)+n (t) Reciprocity: time y (t) = h (t)x (t) + n (t) y (t) = h (t)x (t) + n (t) Feb 11, / 20

4 Motivation Secret-ey Generation in Wireless Fading Channels m Forward Link y = h x + n y = h x + n Reverse Link m z + E = g E x ne z E = g E x + ne Channel Gain Eavesdropper Link Reverse Channel Forward Channel E Spatial Decorrelation: y (t)= h (t)x (t) + n (t) y (t)= h (t)x (t) + n (t) z (t)= g (t)x (t) + n E (t) z (t)= g (t)x (t) + n E (t) time Feb 11, / 20

5 Secret-ey Generation - Systems pproach ey Generation in Wireless Systems UW Systems: Wilson-Tse-Scholz ( 07), M. o ( 07), Madiseh-Neville-McGuire( 12) Narrowband Systems: zimi Sadjadi- iayias-mercado-yener ( 07), Mathur-Trappe-Mandayam -Ye-Reznick ( 10), Patware and asera ( 07) OFDM reciprocity: Haile ( 09), Tsouri and Wulich ( 09) Implementations Experimental UW: Measurements for ey Generation Madiseh ( 12) Software Radio Implementations: Jana et. al. ( 09) MIMO systems: Wallace and Sharma ( 10), Shimizu et al. Zeng-Wu-Mohapatra Signal Processing for Secret-ey Generation ttacks Quantization Techniques: Ye-Reznik-Shah ( 07), Hamida-Pierrot-Castelluccia ( 09), Sun-Zhu-Jiang-Zhao ( 11) daptive Channel Probing: Wei-Zheng-Mohapatra ( 10) Mobility ssisted ey Generation: Gungor-Chen-oksal ( 11) ctive Eavesdroppers: Ebrez et. al ( 11) Zafer-grawal-Srivatsa ( 11), Unauthenticated Channels: Mathur et al. ( 10), Xiao-Greenstein-Mandayam-Trappe ( 07). Feb 11, / 20

6 Secret-ey Generation: Systems pproach II m z E Forward Link g y h E y h x n x n E z x n E Reverse Link g E x n E m Start E Channel Probing N ĥ N ĥ ey Extraction Shared ey Two Phase pproach: Phase I: Channel Probing and Estimation: (ĥn, ĥn ) Phase 2: Source Reconciliation and ey Extraction Secret-ey Generation: Limits Capacity Feb 11, / 20

7 Secret-ey Generation - Source Model Maurer ( 93), hlswede-csiszar ( 93) N X N X Terminal Public Discussion Channel Terminal Eavesdropper DMMS Model: (x N, x N ) N i=1 p x,x (x (i), x (i)) Interactive Public Communication: F ey Generation: k i = F i (xi N, F), i {, }. Reliability: Pr(k k ) ε N, 1 Secrecy: N I(k ; F) ε N Secret-ey Rate: R = 1 N H(k ) Feb 11, / 20

8 Secret-ey Generation - Source Model Maurer ( 93), Csiszar-hlswede ( 93) N X N X Slepian-Wolf Encoder F F Slepian-Wolf Decoder ey-distillation F Eavesdropper N Xˆ ey-distillation Capacity: C = I(x ; x ) One-Round of Communication Capacity Unknown when Eavesdropper also observes a source sequence Feb 11, / 20

9 Problem Setup m Forward Link y = h x + n y = h x + n Reverse Link m z + E = g E x ne z E = g E x + ne E Two-Way Reciprocal Fading Channel y (i) = h (i)x (i) + n (i), y (i) = h (i)x (i) + n (i) z (i) = g (i)x (i) + n E (i), z (i) = g (i)x (i) + n E (i) Feb 11, / 20

10 Problem Setup m Forward Link y = h x + n y = h x + n Reverse Link m z + E = g E x ne z E = g E x + ne Two-Way Reciprocal Fading Channel y (i) = h (i)x (i) + n (i), z (i) = g (i)x (i) + n E (i), E y (i) = h (i)x (i) + n (i) z (i) = g (i)x (i) + n E (i) Channel Model ssumptions: Non-Coherent Model: h (i) and h (i) Perfect Eavesdropper CSI: g (i) & g (i) known to Eve lock-fading Channel with Coherence Period: T. pproximate Reciprocity: (h, h ) p h,h (, ) Independence: (g, g ) (h, h ) Feb 11, / 20

11 Problem Setup m Forward Link y = h x + n y = h x + n Reverse Link m z + E = g E x ne z E = g E x + ne Two-Way Reciprocal Fading Channel y (i) = h (i)x (i) + n (i), z (i) = g (i)x (i) + n E (i), E y (i) = h (i)x (i) + n (i) z (i) = g (i)x (i) + n E (i) Secret-ey greement Protocols: Interactive: x (i) = f (m, y i 1 ), x (i) = f (m, y i 1 verage Power Constraints E[ x 2 ] P, E[ x 2 ] P. k = (y N, m ), k = (y N, m ) Reliability and Secrecy Constraint. Secret-ey Capacity ) Feb 11, / 20

12 Outline Upper ound Lower ound With Public Discussion Lower ound No Public Discussion symptotic Regimes and Numerical Results Feb 11, / 20

13 Secret-ey Capacity Upper ound histi 12 Theorem n upper bound on the secret-key capacity is C R + : R + = 1 [ ( T I(h ; h ) + max E log 1 + P (h ) h 2 )] ) P (h ) P 1 + P (h ) g 2 [ + max E log (1 + P (h ) h 2 )] P (h ) P 1 + P (h ) g 2 ) where P (h ) and P (h ) are power allocation function across the fading states. Feb 11, / 20

14 Secret-ey Capacity Upper ound Genie-ided Channel: h x y y x h Feb 11, / 20

15 Secret-ey Capacity Upper ound Genie-ided Channel: h x y y x h NT R I(m, h, N y NT ; m, h, N y NT z NT, g N ) Feb 11, / 20

16 Secret-ey Capacity Upper ound Genie-ided Channel: h x y y x h NT R I(m, h, N y NT ; m, h, N y NT z NT, g N ) I(x (NT ); y (NT ) h (N), z (NT ), g (N)) + I(x (NT ); y (NT ) h (N), z (NT ), g (N)) + I(m, h N, y NT 1 NT 1 ; m, h, N y z NT 1, g N ) Feb 11, / 20

17 Secret-ey Capacity Upper ound Genie-ided Channel: h x y y x h NT R I(m, h, N y NT ; m, h, N y NT z NT, g N ) NT I(x (n); y (n) h (n), z (n), ḡ (n)) n=1 NT + I(x (n); y (n) h (n), z (n), ḡ (n)) n=1 + NI(h ; h ) Feb 11, / 20

18 Secret-ey Capacity Upper ound Genie-ided Channel: h x y y x h Interpretation of the Upper ound: Channel Reciprocity: 1 T I(h ; h ) Forward Channel: I(y ; x h, z, g ) Reverse Channel: I(y ; x h, z, g ) Feb 11, / 20

19 Secret-ey Capacity Upper ound Genie-ided Channel: h x y y x h Public Discussion Channel Interpretation of the Upper ound: Channel Reciprocity: 1 T I(h ; h ) Forward Channel: I(y ; x h, z, g ) Reverse Channel: I(y ; x h, z, g ) Upper ound also holds if a public discussion channel is available. Feb 11, / 20

20 Lower ound: Separation ased Scheme histi 12 T T P N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) 1 P1 P1 Randomness Sharing Randomness Sharing Training: x (i, 1) = P 1 Randomness Sharing: x (i, t) CN (0, P 2 ) for t = 2,..., T x (i) = [x (i, 2),..., x (i, T )] C T 1. Training: ĥ(i) and ĥ(i) Correlated Sources: Forward Channel: y (i) = h (i)x (i) + n (i) C T 1, Reverse Channel: y (i) = h (i)x (i) + n (i) C T 1. Feb 11, / 20

21 Lower ound: Separation ased Scheme histi 12 T T P N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) 1 P1 P1 Randomness Sharing Randomness Sharing E Channel State ĥ ĥ (g, g ) Forward Channel x y z Reverse Channel y x z Feb 11, / 20

22 Lower ound: Separation ased Scheme histi 12 T T P N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) N(0,P 2 ) 1 P1 P1 Randomness Sharing Randomness Sharing E Channel State ĥ ĥ (g, g ) Forward Channel x y z Reverse Channel y x z Generate a secret-key from these sequences. Feb 11, / 20

23 Lower ound Overview Start Channel Probing Randomness Sharing ĥ ĥ Channel Reconciliation ĥ ĥ ĥ ĥ Secret-ey Extraction T Y T Y Source Reconciliation T T Y Y Shared ey Feb 11, / 20

24 chievable Rate with Public Discussion Theorem (Public Discussion) n achievable rate when a public discussion channel is available is { 1 R key = I(ĥ; ĥ) T }{{} + T 1 T + T 1 T Training [ ] I(y ; x, ĥ) I(y ; z, g, h ) } {{ } Forward Channel [ ] } I(y ; x, ĥ)) I(y ; z, g, h ) } {{ } Reverse Channel Feb 11, / 20

25 chievable Rate with Public Discussion Theorem (Public Discussion) n achievable rate when a public discussion channel is available is { 1 R key = I(ĥ; ĥ) T }{{} + T 1 T + T 1 T Training [ ] I(y ; x, ĥ) I(y ; z, g, h ) } {{ } Forward Channel [ ] } I(y ; x, ĥ)) I(y ; z, g, h ) } {{ } Reverse Channel Feb 11, / 20

26 High SNR Regime Theorem In the high SNR regime our upper and lower bound (with public discussion) coincide: } lim {R + (P ) R PD (P ) c P T where [ c =E log (1 + h 2 )] [ g 2 +E log (1 + h 2 )] g 2 Feb 11, / 20

27 Lower ound Without Public Discussion (T-1) Training Communication Transmission Public Discussion Coherence locks 1 2 Phase Probing + Randomness Sharing Channel-Sequence Reconciliation Source-Sequence Reconciliation Coherence locks ε 1 ε 2 Feb 11, / 20

28 Numerical Plot SNR =35 d, h 1, h 2 CN (0, 1), ρ = Lower ound Upper ound Public Discussion Training Rate (nats/symbol) Coherence Period (T) Feb 11, / 20

29 Symmetric MIMO Extension M. ndersson,. histi and M. Skoglund, 2012 y = H x + n, y = H x + n, z = G E x + n E z = G E x + n E H, H C M M, G E, G E C N E M Independent Rayleigh Fading, pproximate Reciprocity lock Fading with Coherence Period T T M N E Training + Source Emulation achieves degrees of freedom given by: d = max 2(T M )(M N E ) M [1,M] T Feb 11, / 20

30 Conclusions Secret-ey greement in Two-Way fading channels Upper and Lower ounds on Capacity symptotic Optimality Significant Gains over Training ased Schemes Future Work: Upper ounds with Perfect Reciprocity (See lso Lai-Liang-Poor 12) Stationary Fading Channels Low SNR Regime Stronger Eavesdropper Channels Feb 11, / 20

31 Error Reconciliation Public Discussion Channel, Discrete-Valued Sequences Reconciliation of Channel-Estimate Sequences (ĥ, ĥ ) ĥ ĥ ĥ ĥ Discussion Channel ĥ hˆ ( hˆ ĥ, hˆ ) Discussion Channel 1 H(φ ) H(ĥ ĥ), 1 H(φ ) H(ĥ ĥ) Feb 11, / 20

32 Error Reconciliation Public Discussion Channel, Discrete-Valued Sequences Reconciliation of Channel-Estimate Sequences (ĥ, ĥ ) ĥ ĥ ĥ ĥ Discussion Channel ĥ hˆ ( hˆ ĥ, hˆ ) Discussion Channel Reconciliation of (y, y ) y x, hˆ x h ˆ, y Discussion Channel y Common Sequence: ( y y, y, hˆ ) Discussion Channel 1 T H(ψ ) H(y x, ĥ, ĥ), 1 T H(ψ ) H(y x, ĥ, ĥ) Feb 11, / 20

Secret-Key Generation over Reciprocal Fading Channels

Secret-Key Generation over Reciprocal Fading Channels Secret-ey Generation over Reciprocal Fading Channels shish histi Department of Electrical and Computer Engineering University of oronto Nov. 14, 2012 Motivation Secret-ey Generation in Wireless Fading

More information

Extracting a Secret Key from a Wireless Channel

Extracting a Secret Key from a Wireless Channel Extracting a Secret Key from a Wireless Channel Suhas Mathur suhas@winlab.rutgers.edu W. Trappe, N. Mandayam (WINLAB) Chunxuan Ye, Alex Reznik (InterDigital) Suhas Mathur (WINLAB) Secret bits from the

More information

Group Secret Key Agreement over State-Dependent Wireless Broadcast Channels

Group Secret Key Agreement over State-Dependent Wireless Broadcast Channels Group Secret Key Agreement over State-Dependent Wireless Broadcast Channels Mahdi Jafari Siavoshani Sharif University of Technology, Iran Shaunak Mishra, Suhas Diggavi, Christina Fragouli Institute of

More information

Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou Email: tchou@wisc.edu Akbar M. Sayeed Email: akbar@engr.wisc.edu Stark C. Draper Email: sdraper@ece.wisc.edu

More information

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Shahid Mehraj Shah and Vinod Sharma Department of Electrical Communication Engineering, Indian Institute of

More information

Exploiting Partial Channel State Information for Secrecy over Wireless Channels

Exploiting Partial Channel State Information for Secrecy over Wireless Channels Exploiting Partial Channel State Information for Secrecy over Wireless Channels Matthieu R. Bloch and J. Nicholas Laneman Abstract In this paper, we investigate the effect of partial channel state information

More information

DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE

DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE Daohua Zhu, A. Lee Swindlehurst, S. Ali A. Fakoorian, Wei Xu, Chunming Zhao National Mobile Communications Research Lab, Southeast

More information

Secret Key Agreement Using Asymmetry in Channel State Knowledge

Secret Key Agreement Using Asymmetry in Channel State Knowledge Secret Key Agreement Using Asymmetry in Channel State Knowledge Ashish Khisti Deutsche Telekom Inc. R&D Lab USA Los Altos, CA, 94040 Email: ashish.khisti@telekom.com Suhas Diggavi LICOS, EFL Lausanne,

More information

The Private Key Capacity of a Cooperative Pairwise-Independent Network

The Private Key Capacity of a Cooperative Pairwise-Independent Network The Private Key Capacity of a Cooperative Pairwise-Independent Network Peng Xu, Zhiguo Ding and Xuchu Dai Dept. of Elec. Eng. and Info Sci., Univ. Science & Tech. China, Hefei, Anhui, 230027, P..China

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

AN INTRODUCTION TO SECRECY CAPACITY. 1. Overview

AN INTRODUCTION TO SECRECY CAPACITY. 1. Overview AN INTRODUCTION TO SECRECY CAPACITY BRIAN DUNN. Overview This paper introduces the reader to several information theoretic aspects of covert communications. In particular, it discusses fundamental limits

More information

Capacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming

Capacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming Capacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming Authors: Christian Lameiro, Alfredo Nazábal, Fouad Gholam, Javier Vía and Ignacio Santamaría University of Cantabria,

More information

On the Secrecy Capacity of Fading Channels

On the Secrecy Capacity of Fading Channels On the Secrecy Capacity of Fading Channels arxiv:cs/63v [cs.it] 7 Oct 26 Praveen Kumar Gopala, Lifeng Lai and Hesham El Gamal Department of Electrical and Computer Engineering The Ohio State University

More information

MULTITERMINAL SECRECY AND TREE PACKING. With Imre Csiszár, Sirin Nitinawarat, Chunxuan Ye, Alexander Barg and Alex Reznik

MULTITERMINAL SECRECY AND TREE PACKING. With Imre Csiszár, Sirin Nitinawarat, Chunxuan Ye, Alexander Barg and Alex Reznik MULTITERMINAL SECRECY AND TREE PACKING With Imre Csiszár, Sirin Nitinawarat, Chunxuan Ye, Alexander Barg and Alex Reznik Information Theoretic Security A complementary approach to computational security

More information

Ergodic and Outage Capacity of Narrowband MIMO Gaussian Channels

Ergodic and Outage Capacity of Narrowband MIMO Gaussian Channels Ergodic and Outage Capacity of Narrowband MIMO Gaussian Channels Yang Wen Liang Department of Electrical and Computer Engineering The University of British Columbia April 19th, 005 Outline of Presentation

More information

Information-theoretically Secret Key. Generation for Fading Wireless Channels

Information-theoretically Secret Key. Generation for Fading Wireless Channels Information-theoretically Secret Key 1 Generation for Fading Wireless Channels Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra Shah, Wade Trappe and Narayan Mandayam arxiv:0910.5027v1 [cs.cr] 27 Oct 2009

More information

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH MIMO : MIMO Theoretical Foundations of Wireless Communications 1 Wednesday, May 25, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication 1 / 20 Overview MIMO

More information

ROBUST SECRET KEY CAPACITY FOR THE MIMO INDUCED SOURCE MODEL. Javier Vía

ROBUST SECRET KEY CAPACITY FOR THE MIMO INDUCED SOURCE MODEL. Javier Vía ROBUST SECRET KEY CAPACITY FOR THE MIMO INDUCED SOURCE MODEL Javier Vía University of Cantabria, Spain e-mail: jvia@gtas.dicom.unican.es web: gtas.unican.es ABSTRACT This paper considers the problem of

More information

Approximate Ergodic Capacity of a Class of Fading Networks

Approximate Ergodic Capacity of a Class of Fading Networks Approximate Ergodic Capacity of a Class of Fading Networks Sang-Woon Jeon, Chien-Yi Wang, and Michael Gastpar School of Computer and Communication Sciences EPFL Lausanne, Switzerland {sangwoon.jeon, chien-yi.wang,

More information

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH : Antenna Diversity and Theoretical Foundations of Wireless Communications Wednesday, May 4, 206 9:00-2:00, Conference Room SIP Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication

More information

(Structured) Coding for Real-Time Streaming Communication

(Structured) Coding for Real-Time Streaming Communication (Structured) Coding for Real-Time Streaming Communication Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Joint work with: Ahmed Badr (Toronto), Farrokh Etezadi (Toronto),

More information

Secret Key and Private Key Constructions for Simple Multiterminal Source Models

Secret Key and Private Key Constructions for Simple Multiterminal Source Models Secret Key and Private Key Constructions for Simple Multiterminal Source Models arxiv:cs/05050v [csit] 3 Nov 005 Chunxuan Ye Department of Electrical and Computer Engineering and Institute for Systems

More information

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,

More information

Keyless authentication in the presence of a simultaneously transmitting adversary

Keyless authentication in the presence of a simultaneously transmitting adversary Keyless authentication in the presence of a simultaneously transmitting adversary Eric Graves Army Research Lab Adelphi MD 20783 U.S.A. ericsgra@ufl.edu Paul Yu Army Research Lab Adelphi MD 20783 U.S.A.

More information

The Role of Channel States in Secret Key Generation

The Role of Channel States in Secret Key Generation 2st Annual IEEE International ymposium on Personal, Indoor and Mobile Radio Communications The Role of Channel tates in ecret Key Generation Xiang He Aylin Yener Wireless Communications and Networking

More information

Using Noncoherent Modulation for Training

Using Noncoherent Modulation for Training EE8510 Project Using Noncoherent Modulation for Training Yingqun Yu May 5, 2005 0-0 Noncoherent Channel Model X = ρt M ΦH + W Rayleigh flat block-fading, T: channel coherence interval Marzetta & Hochwald

More information

Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper

Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper Mohsen Bahrami, Ali Bereyhi, Mahtab Mirmohseni and Mohammad Reza Aref Information Systems and Security

More information

Joint Channel Estimation and Co-Channel Interference Mitigation in Wireless Networks Using Belief Propagation

Joint Channel Estimation and Co-Channel Interference Mitigation in Wireless Networks Using Belief Propagation Joint Channel Estimation and Co-Channel Interference Mitigation in Wireless Networks Using Belief Propagation Yan Zhu, Dongning Guo and Michael L. Honig Northwestern University May. 21, 2008 Y. Zhu, D.

More information

Fading Wiretap Channel with No CSI Anywhere

Fading Wiretap Channel with No CSI Anywhere Fading Wiretap Channel with No CSI Anywhere Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 7 pritamm@umd.edu ulukus@umd.edu Abstract

More information

Secure Multiuser MISO Communication Systems with Quantized Feedback

Secure Multiuser MISO Communication Systems with Quantized Feedback Secure Multiuser MISO Communication Systems with Quantized Feedback Berna Özbek*, Özgecan Özdoğan*, Güneş Karabulut Kurt** *Department of Electrical and Electronics Engineering Izmir Institute of Technology,Turkey

More information

THE IDEA of exploiting wireless fading channels for

THE IDEA of exploiting wireless fading channels for 476 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 3, MARCH 04 Secret Key Generation in the Two-Way Relay Channel With Active Attackers Heng Zhou, Lauren M. Huie, Member, IEEE, and

More information

Secret Key Generation and Secure Computing

Secret Key Generation and Secure Computing Secret Key Generation and Secure Computing Himanshu Tyagi Department of Electrical and Computer Engineering and Institute of System Research University of Maryland, College Park, USA. Joint work with Prakash

More information

Exploiting Partial Channel Knowledge at the Transmitter in MISO and MIMO Wireless

Exploiting Partial Channel Knowledge at the Transmitter in MISO and MIMO Wireless Exploiting Partial Channel Knowledge at the Transmitter in MISO and MIMO Wireless SPAWC 2003 Rome, Italy June 18, 2003 E. Yoon, M. Vu and Arogyaswami Paulraj Stanford University Page 1 Outline Introduction

More information

Ahmed S. Mansour, Rafael F. Schaefer and Holger Boche. June 9, 2015

Ahmed S. Mansour, Rafael F. Schaefer and Holger Boche. June 9, 2015 The Individual Secrecy Capacity of Degraded Multi-Receiver Wiretap Broadcast Channels Ahmed S. Mansour, Rafael F. Schaefer and Holger Boche Lehrstuhl für Technische Universität München, Germany Department

More information

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel /33 Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel Presented by Paul de Kerret Joint work with Antonio Bazco, Nicolas Gresset, and David Gesbert ESIT 2017 in Madrid,

More information

Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View

Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View P. Mohapatra 9 th March 2013 Outline Motivation Problem statement Achievable scheme 1 Weak interference

More information

Performance-based Security for Encoding of Information Signals. FA ( ) Paul Cuff (Princeton University)

Performance-based Security for Encoding of Information Signals. FA ( ) Paul Cuff (Princeton University) Performance-based Security for Encoding of Information Signals FA9550-15-1-0180 (2015-2018) Paul Cuff (Princeton University) Contributors Two students finished PhD Tiance Wang (Goldman Sachs) Eva Song

More information

Lecture 2. Capacity of the Gaussian channel

Lecture 2. Capacity of the Gaussian channel Spring, 207 5237S, Wireless Communications II 2. Lecture 2 Capacity of the Gaussian channel Review on basic concepts in inf. theory ( Cover&Thomas: Elements of Inf. Theory, Tse&Viswanath: Appendix B) AWGN

More information

Information-Theoretic Security: an overview

Information-Theoretic Security: an overview Information-Theoretic Security: an overview Rui A Costa 1 Relatório para a disciplina de Seminário, do Mestrado em Informática da Faculdade de Ciências da Universidade do Porto, sob a orientação do Prof

More information

Common Randomness Principles of Secrecy

Common Randomness Principles of Secrecy Common Randomness Principles of Secrecy Himanshu Tyagi Department of Electrical and Computer Engineering and Institute of Systems Research 1 Correlated Data, Distributed in Space and Time Sensor Networks

More information

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH : Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 Rayleigh Wednesday, June 1, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication

More information

On the Capacity and Degrees of Freedom Regions of MIMO Interference Channels with Limited Receiver Cooperation

On the Capacity and Degrees of Freedom Regions of MIMO Interference Channels with Limited Receiver Cooperation On the Capacity and Degrees of Freedom Regions of MIMO Interference Channels with Limited Receiver Cooperation Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang 1 arxiv:1308.3310v1 [cs.it] 15 Aug 2013

More information

APPLICATIONS. Quantum Communications

APPLICATIONS. Quantum Communications SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction

More information

Harnessing Interaction in Bursty Interference Networks

Harnessing Interaction in Bursty Interference Networks 215 IEEE Hong Kong-Taiwan Joint Workshop on Information Theory and Communications Harnessing Interaction in Bursty Interference Networks I-Hsiang Wang NIC Lab, NTU GICE 1/19, 215 Modern Wireless: Grand

More information

Random Access Protocols for Massive MIMO

Random Access Protocols for Massive MIMO Random Access Protocols for Massive MIMO Elisabeth de Carvalho Jesper H. Sørensen Petar Popovski Aalborg University Denmark Emil Björnson Erik G. Larsson Linköping University Sweden 2016 Tyrrhenian International

More information

RECURSIVE TRAINING WITH UNITARY MODULATION FOR CORRELATED BLOCK-FADING MIMO CHANNELS

RECURSIVE TRAINING WITH UNITARY MODULATION FOR CORRELATED BLOCK-FADING MIMO CHANNELS RECURSIVE TRAINING WITH UNITARY MODULATION FOR CORRELATED BLOCK-FADING MIMO CHANNELS Wenyi Zhang, Student Member, IEEE, and J Nicholas Laneman, Member, IEEE Department of Electrical Engineering University

More information

On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise

On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise Ya-Lan Liang, Yung-Shun Wang, Tsung-Hui Chang, Y.-W. Peter Hong, and Chong-Yung Chi Institute of Communications

More information

SHARED INFORMATION. Prakash Narayan with. Imre Csiszár, Sirin Nitinawarat, Himanshu Tyagi, Shun Watanabe

SHARED INFORMATION. Prakash Narayan with. Imre Csiszár, Sirin Nitinawarat, Himanshu Tyagi, Shun Watanabe SHARED INFORMATION Prakash Narayan with Imre Csiszár, Sirin Nitinawarat, Himanshu Tyagi, Shun Watanabe 2/40 Acknowledgement Praneeth Boda Himanshu Tyagi Shun Watanabe 3/40 Outline Two-terminal model: Mutual

More information

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 : Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 Rayleigh Friday, May 25, 2018 09:00-11:30, Kansliet 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless

More information

Multiple Antennas in Wireless Communications

Multiple Antennas in Wireless Communications Multiple Antennas in Wireless Communications Luca Sanguinetti Department of Information Engineering Pisa University luca.sanguinetti@iet.unipi.it April, 2009 Luca Sanguinetti (IET) MIMO April, 2009 1 /

More information

SHARED INFORMATION. Prakash Narayan with. Imre Csiszár, Sirin Nitinawarat, Himanshu Tyagi, Shun Watanabe

SHARED INFORMATION. Prakash Narayan with. Imre Csiszár, Sirin Nitinawarat, Himanshu Tyagi, Shun Watanabe SHARED INFORMATION Prakash Narayan with Imre Csiszár, Sirin Nitinawarat, Himanshu Tyagi, Shun Watanabe 2/41 Outline Two-terminal model: Mutual information Operational meaning in: Channel coding: channel

More information

Multi-User Gain Maximum Eigenmode Beamforming, and IDMA. Peng Wang and Li Ping City University of Hong Kong

Multi-User Gain Maximum Eigenmode Beamforming, and IDMA. Peng Wang and Li Ping City University of Hong Kong Multi-User Gain Maximum Eigenmode Beamforming, and IDMA Peng Wang and Li Ping City University of Hong Kong 1 Contents Introduction Multi-user gain (MUG) Maximum eigenmode beamforming (MEB) MEB performance

More information

Limited Feedback in Wireless Communication Systems

Limited Feedback in Wireless Communication Systems Limited Feedback in Wireless Communication Systems - Summary of An Overview of Limited Feedback in Wireless Communication Systems Gwanmo Ku May 14, 17, and 21, 2013 Outline Transmitter Ant. 1 Channel N

More information

MIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper

MIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper MIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper Xiang He, Ashish Khisti, Aylin Yener Dept. of Electrical and Computer Engineering, University of Toronto, Toronto, ON, M5S 3G4, Canada

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT. ECE 559 Presentation Hoa Pham Dec 3, 2007

Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT. ECE 559 Presentation Hoa Pham Dec 3, 2007 Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT ECE 559 Presentation Hoa Pham Dec 3, 2007 Introduction MIMO systems provide two types of gains Diversity Gain: each path from a transmitter

More information

Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining

Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining Secrecy Outage erformance of Cooperative Relay Network With Diversity Combining Khyati Chopra Dept. of lectrical ngineering Indian Institute of Technology, Delhi New Delhi-110016, India mail: eez148071@ee.iitd.ac.in

More information

LECTURE 15. Last time: Feedback channel: setting up the problem. Lecture outline. Joint source and channel coding theorem

LECTURE 15. Last time: Feedback channel: setting up the problem. Lecture outline. Joint source and channel coding theorem LECTURE 15 Last time: Feedback channel: setting up the problem Perfect feedback Feedback capacity Data compression Lecture outline Joint source and channel coding theorem Converse Robustness Brain teaser

More information

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of

More information

Group secret key agreement over state-dependent wireless broadcast channels

Group secret key agreement over state-dependent wireless broadcast channels 1 Group secret ey agreement over state-dependent wireless broadcast channels Mahdi Jafari Siavoshani, Shauna Mishra, Christina Fragouli, Suhas N. Diggavi Sharif University of Technology, Tehran, Iran University

More information

3F1: Signals and Systems INFORMATION THEORY Examples Paper Solutions

3F1: Signals and Systems INFORMATION THEORY Examples Paper Solutions Engineering Tripos Part IIA THIRD YEAR 3F: Signals and Systems INFORMATION THEORY Examples Paper Solutions. Let the joint probability mass function of two binary random variables X and Y be given in the

More information

Outage Capacity of the Fading Relay Channel in the Low SNR Regime

Outage Capacity of the Fading Relay Channel in the Low SNR Regime Outage Capacity of the Fading Relay Channel in the Low SNR Regime Amir Salman Avestimehr Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2006-36

More information

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Cooperative HARQ with Poisson Interference and Opportunistic Routing Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline

More information

Advanced Topics in Digital Communications Spezielle Methoden der digitalen Datenübertragung

Advanced Topics in Digital Communications Spezielle Methoden der digitalen Datenübertragung Advanced Topics in Digital Communications Spezielle Methoden der digitalen Datenübertragung Dr.-Ing. Carsten Bockelmann Institute for Telecommunications and High-Frequency Techniques Department of Communications

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Chongbin Xu, Peng Wang, Zhonghao Zhang, and Li Ping City University of Hong Kong 1 Outline Background Mutual Information

More information

Secret Message Capacity of Erasure Broadcast Channels with Feedback

Secret Message Capacity of Erasure Broadcast Channels with Feedback Secret Message Capacity of Erasure Broadcast Channels with Feedback László Czap Vinod M. Prabhakaran Christina Fragouli École Polytechnique Fédérale de Lausanne, Switzerland Email: laszlo.czap vinod.prabhakaran

More information

Optimal Power Allocation for Achieving Perfect Secrecy Capacity in MIMO Wire-Tap Channels

Optimal Power Allocation for Achieving Perfect Secrecy Capacity in MIMO Wire-Tap Channels Optimal Power Allocation for Achieving Perfect Secrecy Capacity in MIMO Wire-Tap Channels Jia Liu, Y. Thomas Hou, and Hanif D. Sherali Bradley Department of Electrical and Computer Engineering Grado Department

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

Information Theory for Wireless Communications, Part II:

Information Theory for Wireless Communications, Part II: Information Theory for Wireless Communications, Part II: Lecture 5: Multiuser Gaussian MIMO Multiple-Access Channel Instructor: Dr Saif K Mohammed Scribe: Johannes Lindblom In this lecture, we give the

More information

Optimal Power Allocation for Energy Recycling Assisted Cooperative Communications

Optimal Power Allocation for Energy Recycling Assisted Cooperative Communications Optimal Power llocation for Energy Recycling ssisted Cooperative Communications George. Ropokis, M. Majid Butt, Nicola Marchetti and Luiz. DaSilva CONNECT Centre, Trinity College, University of Dublin,

More information

Quantum key distribution for the lazy and careless

Quantum key distribution for the lazy and careless Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center

More information

Approximate Capacity of Fast Fading Interference Channels with no CSIT

Approximate Capacity of Fast Fading Interference Channels with no CSIT Approximate Capacity of Fast Fading Interference Channels with no CSIT Joyson Sebastian, Can Karakus, Suhas Diggavi Abstract We develop a characterization of fading models, which assigns a number called

More information

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Jung Hoon Lee and Huaiyu Dai Department of Electrical and Computer Engineering, North Carolina State University,

More information

Lecture 4. Capacity of Fading Channels

Lecture 4. Capacity of Fading Channels 1 Lecture 4. Capacity of Fading Channels Capacity of AWGN Channels Capacity of Fading Channels Ergodic Capacity Outage Capacity Shannon and Information Theory Claude Elwood Shannon (April 3, 1916 February

More information

Adaptive Wireless Channel Probing for Shared Key Generation based on PID Controller

Adaptive Wireless Channel Probing for Shared Key Generation based on PID Controller IEEE TRANSACTIONS ON MOBILE COMPUTING,MANUSCRIPT 1 Adaptive Wireless Channel Probing for Shared Key Generation based on PID Controller Yunchuan Wei, Kai Zeng, Member, IEEE, and Prasant Mohapatra, Fellow,

More information

Secret Key Agreement: General Capacity and Second-Order Asymptotics. Masahito Hayashi Himanshu Tyagi Shun Watanabe

Secret Key Agreement: General Capacity and Second-Order Asymptotics. Masahito Hayashi Himanshu Tyagi Shun Watanabe Secret Key Agreement: General Capacity and Second-Order Asymptotics Masahito Hayashi Himanshu Tyagi Shun Watanabe Two party secret key agreement Maurer 93, Ahlswede-Csiszár 93 X F Y K x K y ArandomvariableK

More information

EE 4TM4: Digital Communications II Scalar Gaussian Channel

EE 4TM4: Digital Communications II Scalar Gaussian Channel EE 4TM4: Digital Communications II Scalar Gaussian Channel I. DIFFERENTIAL ENTROPY Let X be a continuous random variable with probability density function (pdf) f(x) (in short X f(x)). The differential

More information

Multiuser Capacity in Block Fading Channel

Multiuser Capacity in Block Fading Channel Multiuser Capacity in Block Fading Channel April 2003 1 Introduction and Model We use a block-fading model, with coherence interval T where M independent users simultaneously transmit to a single receiver

More information

On Capacity Under Received-Signal Constraints

On Capacity Under Received-Signal Constraints On Capacity Under Received-Signal Constraints Michael Gastpar Dept. of EECS, University of California, Berkeley, CA 9470-770 gastpar@berkeley.edu Abstract In a world where different systems have to share

More information

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009 An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer

More information

An Uplink-Downlink Duality for Cloud Radio Access Network

An Uplink-Downlink Duality for Cloud Radio Access Network An Uplin-Downlin Duality for Cloud Radio Access Networ Liang Liu, Prati Patil, and Wei Yu Department of Electrical and Computer Engineering University of Toronto, Toronto, ON, 5S 3G4, Canada Emails: lianguotliu@utorontoca,

More information

Lecture 7 MIMO Communica2ons

Lecture 7 MIMO Communica2ons Wireless Communications Lecture 7 MIMO Communica2ons Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 1 Outline MIMO Communications (Chapter 10

More information

TCP over Cognitive Radio Channels

TCP over Cognitive Radio Channels 1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done

More information

1 Background on Information Theory

1 Background on Information Theory Review of the book Information Theory: Coding Theorems for Discrete Memoryless Systems by Imre Csiszár and János Körner Second Edition Cambridge University Press, 2011 ISBN:978-0-521-19681-9 Review by

More information

Vector Channel Capacity with Quantized Feedback

Vector Channel Capacity with Quantized Feedback Vector Channel Capacity with Quantized Feedback Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 9697-65 Email: syed@ece.uci.edu,

More information

Chapter 4: Continuous channel and its capacity

Chapter 4: Continuous channel and its capacity meghdadi@ensil.unilim.fr Reference : Elements of Information Theory by Cover and Thomas Continuous random variable Gaussian multivariate random variable AWGN Band limited channel Parallel channels Flat

More information

Perfect Omniscience, Perfect Secrecy and Steiner Tree Packing

Perfect Omniscience, Perfect Secrecy and Steiner Tree Packing Perfect Omniscience, Perfect Secrecy and Steiner Tree Packing S. Nitinawarat and P. Narayan Department of Electrical and Computer Engineering and Institute for Systems Research University of Maryland College

More information

Diversity-Multiplexing Tradeoff of the Two-User Interference Channel

Diversity-Multiplexing Tradeoff of the Two-User Interference Channel Diversity-Multiplexing Tradeoff of the Two-User Interference Channel arxiv:0905.0385v2 [cs.it] 8 Sep 2009 Adnan Raja and Pramod Viswanath April 9, 2018 Abstract Diversity-Multiplexing tradeoff DMT) is

More information

ELEC546 Review of Information Theory

ELEC546 Review of Information Theory ELEC546 Review of Information Theory Vincent Lau 1/1/004 1 Review of Information Theory Entropy: Measure of uncertainty of a random variable X. The entropy of X, H(X), is given by: If X is a discrete random

More information

Finite-Blocklength Bounds on the Maximum Coding Rate of Rician Fading Channels with Applications to Pilot-Assisted Transmission

Finite-Blocklength Bounds on the Maximum Coding Rate of Rician Fading Channels with Applications to Pilot-Assisted Transmission Finite-Blocklength Bounds on the Maximum Coding Rate of Rician Fading Channels with Applications to Pilot-Assisted Transmission Johan Östman, Giuseppe Durisi, and Erik G. Ström Dept. of Signals and Systems,

More information

The Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems

The Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems The Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems Jie Yang and D.R. Brown III Worcester Polytechnic Institute Department

More information

Channel Coding for Secure Transmissions

Channel Coding for Secure Transmissions Channel Coding for Secure Transmissions March 27, 2017 1 / 51 McEliece Cryptosystem Coding Approach: Noiseless Main Channel Coding Approach: Noisy Main Channel 2 / 51 Outline We present an overiew of linear

More information

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy Spectrum Leasing via Cooperation for Enhanced 1 Physical-Layer Secrecy Keonkook Lee, Member, IEEE, Chan-Byoung Chae, Senior Member, IEEE, Joonhyuk Kang, Member, IEEE arxiv:1205.0085v1 [cs.it] 1 May 2012

More information

A robust transmit CSI framework with applications in MIMO wireless precoding

A robust transmit CSI framework with applications in MIMO wireless precoding A robust transmit CSI framework with applications in MIMO wireless precoding Mai Vu, and Arogyaswami Paulraj Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,

More information

Achievability of Nonlinear Degrees of Freedom in Correlatively Changing Fading Channels

Achievability of Nonlinear Degrees of Freedom in Correlatively Changing Fading Channels Achievability of Nonlinear Degrees of Freedom in Correlatively Changing Fading Channels Mina Karzand Massachusetts Institute of Technology Cambridge, USA Email: mkarzand@mitedu Lizhong Zheng Massachusetts

More information

The Optimality of Beamforming: A Unified View

The Optimality of Beamforming: A Unified View The Optimality of Beamforming: A Unified View Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 92697-2625 Email: sudhirs@uciedu,

More information

120 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 67, NO. 1, JANUARY 1, 2019

120 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 67, NO. 1, JANUARY 1, 2019 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 67, NO., JANUARY, 9 Advanced Properties of Full-Duplex Radio for Securing Wireless Network Yingbo Hua, Fellow, IEEE Abstract This paper examines the role of

More information

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Introduction Main Results Simulation Conclusions Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Mojtaba Vaezi joint work with H. Inaltekin, W. Shin, H. V. Poor, and

More information

Capacity Theorems for Relay Channels

Capacity Theorems for Relay Channels Capacity Theorems for Relay Channels Abbas El Gamal Department of Electrical Engineering Stanford University April, 2006 MSRI-06 Relay Channel Discrete-memoryless relay channel [vm 7] Relay Encoder Y n

More information