Towards Achieving Full Secrecy Rate in Wireless Networks: A Control Theoretic Approach
|
|
- Emery Allen
- 5 years ago
- Views:
Transcription
1 owards Achieving Full Secrecy Rate in Wireless Networks: A Control heoretic Approach Zhoujia Mao Department of ECE he Ohio State University maoz@ece.osu.edu Can Emre Koksal Department of ECE he Ohio State University koksal@ece.osu.edu Ness B. Shroff Departments of ECE and CSE he Ohio State University shroff@ece.osu.edu Abstract In this paper, we consider a single-user secure data communication system. Data packets arriving at the transmitter are enqueued at a data queue to be transmitted to the receiver over a block fading channel, securely from an eavesdropper that listens to the transmitter over another independent block fading channel. We address two separate problems, both of which involve the maximization of a long-term average utility, defined as a function of the number of secure packets transmitted in each time slot. We propose a transmission controller and an admission controller based on simple index policies that do not rely on any prior statistical information on the data arrival process. he former chooses a random key generation and transmission) rate as well as the secure data transmission rate in each time slot. Part of the data is secured by the available secrecy rate while the other part is encrypted by the key bits, enqueued at both the transmitter and the receiver. he latter chooses the amount of data admitted by the transmitter to be enqueued in the data queue. We show that our controller pair has a provably efficient performance. Also, we illustrate via simulations that the use of a key queue reduces the queuing delay for the data packets, while serving packets that are admitted at the maximum admissible rate. o our best knowledge, this is the first work that addresses the queuing delay in the context of secrecy. I. INRODUCION Motivated by the seminal paper by, there has been a large number of investigations e.g., 8) on wireless information theoretic secrecy. hese studies have significantly enhanced our understanding of the basic limits and principles of the design and the analysis of secure wireless communication systems. Despite the significant progress in information theoretic secrecy, most of the work has focused on physical layer techniques. he application of wireless information theoretic secrecy remains mainly unresolved as it relates to the design of wireless networks and its impact on network control and protocol development. Indeed, our understanding of the interplay between the secrecy requirements and the critical functionalities of wireless networks, such as scheduling, routing, and congestion control remains very limited. o that end, there have been some recent efforts to utilize the insights drawn from the aforementioned investigations on information theoretic secrecy to build secure wireless networks. In 9 3 the fundamental capacity and connectivity scaling laws of wireless networks with secrecy have been addressed. In 4, 5, single hop uplink scenario has been considered in which nodes enqueue arriving private and open data packets to be transmitted to a base station over block fading channels. A node is scheduled to transmit information privately from the other nodes and rate is controlled carefully to maximize an overall utility. he solution provided follows up on the stochastic network optimization framework e.g., as treated in 6 9) and generalizes the uplink scenario to incorporate secrecy as a quality of service requirement. In a separate direction 0 proposed the idea of the use of a key queue in a single user system. here, a key queue is kept at the transmitter and the receiver, separately from the data queues. Instead of using the entire instantaneous secrecy rate for information transmission at all times, some of it is utilized to transmit key bits, generated randomly at the transmitter. hese stored key bits are used later to secure information bits in such a way that, even when the instantaneous secrecy rate is 0, information bits can still be transmitted to the destination securely from the eavesdropper. Hence, the idea of key sharing allows one to bank secrecy rates at certain times to be utilized at other times. It is shown in that, using this idea, a long-term constant secrecy rate, identical to the secrecy capacity expected instantaneous secrecy rate) of the channel is achievable. In this paper, we address the single user setting in the presence of arrival of data packets being enqueued at a data queue to be transmitted to the receiver over a block fading channel, securely from an eavesdropper that listens to the transmitter over another independent block fading channel. We consider two separate problems, which involve the maximization of a long-term average utility, defined as a function of the number of secure packets transmitted in each time slot. While, one would be inclined to exploit the entire secrecy rate for data transmission in each time slot in a greedy fashion, we show that this approach leads to a performance loss. Instead, the use of a key queue leads to a smoother secrecy rate, which in turn maximizes a concave utility, since it is negatively affected by the second order factors caused by the variability of the service. We propose a controller, which chooses the key generation and transmission) rate along with the secure data transmission rate in each time slot using a transmission control component. he admission control component chooses the amount of data admitted by the transmitter to be enqueued in the data queue. hese two components are based on simple index policies that do not rely on any prior statistical information on the data arrival process. We show that our
2 q k t) data queue µt) q d t) R k t) q k t) µ k t) µ k t) + R m t) xmit µ t) µ k t) Fig.. shared key queues System model t) R e recv R k t) µ k t) eavesdrop controller achieves a utility, arbitrarily close to the optimal utility. Also, we illustrate via simulations that the use of key queue reduces the queuing delay for the data packets, while serving packets that are admitted at the maximum admissible rate. o our best knowledge, this is the first work that addresses the queuing delay in the context of secrecy. II. SYSEM MODEL We consider the single-user system illustrated in Fig., in which the transmitter enqueues data packets to be transmitted to the receiver over the main channel at a fixed power, securely from an eavesdropper, overhearing the transmission over a separate channel. ime is slotted, and the time-varying rates of the main and the eavesdropper channel follow general processes R m = {R m 0), R m ),..., R m ),...} and R e = {R e 0), R e ),..., R e ),...}, respectively. In this paper, we assume perfect knowledge of these rates at the transmitter. We also assume the time slots are long enough and as shown in, the achievable instantaneous secrecy rate at a given slot t is identical to R s t) = R m t) R e t)) +, t 0, where ) + = max, 0. In a given time slot, this rate is fully utilized: part of it is used to secure data from the data queue and the remaining part is used to transmit randomly generated key bits to be stored at the both key queues at the transmitter and the receiver. he size of the data and the key buffers are infinite. As shown in Fig., the amount of secure data transmitted at a time t is µt). A part µ k t) bits) of this data is secured using µ k t) key bits by a simple bit-by-bit XOR operation. he remaining µt) µ k t) bits is secured using the available secrecy rate R s t). Since the secrecy rate is fully utilized, the portion of the secrecy rate, not used to secure data is used to transmit R k t) key bits. he data arrivals to the system is represented by the arrival process {At)}. he data queue state is denoted by q d t). he Lindley equation that models the state evolution of the key queue is: q k t + ) = q k t) + R k t) µ k t). We provide an equivalent model in the following lemma along with the constraints that specify the relationships between the parameters. Lemma : he key queue q k can be modeled with the state evolution equation q k t + ) = q k t) + R s t) µt) with the constraints 0 µt) minq k t) + R s t), R m t), 0 µ k t) minµt), R e t), and µt) µ k t) ) + R k t) = R s t). Proof: We have the following relationships between the system parameters: ) µ k t) µt): the amount of key bits used to secure data does not exceed the amount of transmitted data. ) µt) µ k t) + R k t) = R s t): the instantaneous secrecy rate is fully utilized: µt) µ k t) is the amount of transmitted data secured over the wiretap channel in slot t and the rest of it is used to generate key bits. 3) µ k t) min{r m t), R e t), q k t)+r k t)}: the amount of used key bits cannot exceed the main channel rate, since we cannot send data at a higher rate even if all of it is secured using key bits, i.e., µ k t) R m t). Also, we cannot use more key bits than the amount available in the key queue, i.e., µ k t) q k t) + R k t). Finally, for full secrecy, the amount of shared randomness we need is no more than the eavesdropper channel rate. Using more key bits will be wasteful, i.e., µ k t) R e t). Claim : Constraints ), ), and 3) imply µt) R m t). If R m t) R e t), then R s t) = 0 and by Constraint ), µt) = µ k t) R k t) µ k t). With Constraint ), we have µt) = µ k t), i.e., when R s t) = 0, we use key bits to secure all the data. Likewise, from Constraint 3), we obtain µt) min{r m t), q k t) + R k t)} R m t); If R m t) > R e t), then R s t) = R m t) R e t) and by Constraint ), µt) = R m t) R e t) + µ k t) R k t) R m t) + µ k t) R e t). Since µ k t) R e t) from Constraint 3), µt) R m t). Claim : By Constraints ) and 3), µt) = R s t) R k t) + µ k t) q k t) + R k t) + R s t) R k t) = q k t) + R s t). Claim 3: he key state evolution is equivalent to q k t + ) = q k t) + R k t) µ k t) = q k t) + R s t) µt) by Constraint ). Claim 4: Combining µt) R m t) and µ k t) µt) leads to µ k t) R m t). Claims,,3 and 4 complete the proof. III. PROBLEM FORMULAION We consider two problems. In our first problem, we assume an infinitely backlogged data queue, i.e., q d 0) =. he objective is to maximize the long-term average utility, which is a function of the transmission rate. Our control parameters are the number, µ k t), of used key bits, the number, µt), of served data bits, and the number, R k t), of generated key bits. In particular, we have:
3 3 A) max Uµt)) µ, µ k, R k s.t. q k t + ) = q k t) + R s t) µt), ) 0 µt) minq k t) + R s t), R m t), ) 0 µ k t) minµt), R e t), 3) µt) µk t) ) + R k t) = R s t), 4) where the utility function U ) is assumed to be monotonically increasing, reversible and differentiable on the half real line R + {0}. Note that if there were no key queue, then we would have q k t) = 0, µt) = R s t), µ k t) = 0, R k t) = 0, t 0. Also note that, the maximum achievable average secrecy rate is upper bounded by the average secrecy capacity R s = R st). In our second problem, we assume a general data arrival process, {At)} at the input of the data queue. At time t, only a portion Rt) of all arrivals are admitted into the data queue in order to keep the data queue stable. All the admitted packets are required to be served by the system eventually. In the second problem, our objective is maximize the long-term average admitted data rate. B) max Rt) R, µ, µ k, R k s.t. q d t + ) = q d t) µt)) + + Rt), 5) q k t + ) = q k t) + R s t) µt), 6) 0 Rt) At), 7) 0 µt) minq k t) + R s t), R m t), 8) q d t) <, 9) 0 µ k t) minµt), R e t), 0) µt) µk t) ) + R k t) = R s t). ) Note that, the maximum achievable average secrecy rate, which happens to be the objective function here, is upper bounded by the average secrecy capacity R s. As we shall show, R s can be achieved even without a key queue. However, we will also illustrate that our solutions that involve the use of the key queue lead to smaller queueing delays, compared to the one without the key queue. In these two problems, constraint 5) describes the data queue evolution, and constraints ) and 6) describe the key queue evolution. Constraint 7) bounds the actual amount of sensed data Rt) by the available amount of data At) at time t. Constraints ) and 8) state that the amount of transmitted data is bounded by both the main channel rate and the amount of keys available. Constraint 9) guarantees data queue stability. Constraints 3) and 0) state that the amount of key bits used to secure data is bounded by the eavesdropper channel rate and does not exceed the amount of transmitted data. Constraints 4) and ) mean that the secure capacity is fully utilized by the transmission of secure data and key bits. irtual Queue: In order to have a fair rate allocation, we do not want the key queue to be drained frequently, which would lead to outages whenever R s t) = 0. We define q k as the virtual key queue and try to avoid key outage by making the virtual key queue stable similar ideas of utilizing virtual queue are used in 9,. he virtual queue evolves according to the following equation: q k t + ) = q k t) ɛ) + + µt) R s t) + o t) ) +, ) where ɛ > 0 can be chosen arbitrarily, and o t) = key queue hits zero state from higher states in slot t { 0 if µt) = 0 or µt) < qk t) + R = s t) otherwise 3) is the indicator that the key queue is drained in slot t. Without loss of generality, the initial state q k 0) can be set to be zero. I. CONROL ALGORIHM AND PERFORMANCE ANALYSIS In this section, we provide a simple control algorithm, analyze its performance, and show that its provably optimal for both problems described in the previous section. A. Algorithm Our algorithm for Problem A) involves only a transmission rate controller. he transmission controller attempts to provide a smooth service by the help of the key bits. ransmission Control C): We define R + to be the control parameter of our algorithm. In slot t, the controller solves the following optimization problem and transmits with the calculated rate: max µt) Πt) Uµt)) q kt)µt), 4) where Πt) = {µt) : 0 µt) minq k t)+r s t), R m t)} is a compact and nonempty set. Furthermore, key generation and usage rates R k t), µ k t)) are chosen as follows: If µt) > R s t), then R k t) = 0 and µ k t) = µt) R s t); if µt) R s t), then µ k t) = 0 and R k t) = R s t) µt). his ensures that constraint µt) µ k t) ) + R k t) = R s t) is satisfied. It is not surprising that µ k t)r k t) = 0, since any solution with µ k t) > 0 and R k t) > 0, can be equivalently replicated by using the secrecy rate to transmit data rather than generating and using key bits at the same time. Note that R s t) = R m t) R e t) ) + Rm t) R e t), then for µt) > R s t), we have µ k t) = µt) R s t) R m t) R s t) R e t). his leads to constraint 0 µ k t) minµt), R e t) being satisfied. he set, Πt) of possible data transmission guarantees constraint ) on µt) in Problem A). If U ) is concave, the objective function is a concave function of µt). Consequently, C solves a simple convex optimization problem in each time slot. he positive term Uµt)) can be viewed as a utility obtained from the transmission rate µt) and the term q k t)µt) can be viewed as its associated cost. When the virtual key queue q k t) is small, C tries to allocate a high amount of transmitted data to increase the utility; and when
4 4 q k t) is large, C allocates a small amount of transmitted data to reduce cost. his pushes the served data rate to be smoother over time. It is also notable that 4) involves only µt). he key generation and usage rates are not part of this optimization, and are chosen subsequently. In Problem B), we need to control both the admission and transmission rate such that the admitted rate is maximized while keeping the data queue stable. In our algorithm, there are two components: a admission control component and a transmission control component. he transmission control component is the identical to the one described above for Problem A), and the admission control component is as follows: Admission Control AC): In slot t, the controller solves the following optimization problem and admit the calculated amount of data arrivals: max 0 Rt) At) URt)) q dt)rt), 5) Both C and AC are index policies, i.e., the solutions are memoryless and they depend only on the instantaneous values of the system variables. B. Performance Analysis Recall that At) is the original data arrival and Rt) is the amount of data admitted to the data queue. he natural question one would ask here is, whether our admission controller rejects too many packets in the first place to synthetically keep the data queue stable. In the following theorem, we show that this is not the case. Indeed, the admission rate associated with AC and C can be made closer to the optimum by increasing the control parameter. We use the notation y = Ox) to represent y going to 0 as x goes to 0. heorem : If ) U ) is strictly concave on R + {0}, and its slope at 0 satisfies 0 β = U 0) <, ) 0 R max <, t 0, then C achieves: and AC achieves: A t) < and 0 R m t) Uµt)) Uµ t)) O ), 6) q d t) β, t 0 7) URt)) UR t)) O ), Rt) For instance, U + R) = log + R). 8) R t) as, 9) where µ = {µ 0), µ ),..., µ ),...} and R = {R 0), R ),..., R ),...} are the optimal solutions to Problem A) and Problem B), respectively. he proof of heorem can be found in Appendix A. Equation 7) shows that the data queue q d is stable. In Equation 6), the gap between the average transmission rate with our algorithm and the optimal average transmission rate can be made arbitrarily small by choosing parameter large. Similarly, by Equation 9), the admission rate can be close to optimum with large. As a tradeoff, the data queue length increases as increases. From Equation 8), we observe that, if we plug the rates allocated by our algorithm in the utility function, it still remains close to the utility achieved by the optimal solution of Problem B). his implies that, AC and C allocate rates smoothly over time, as opposed to the case without a key queue. Based on this observation, combined with Equation 6), we expect the queueing delay to be smaller with a key queue. We will verify this in the following numerical example.. NUMERICAL EXAMPLE In this section we simulate our algorithms and numerically compare them with the optimal performance. In the simulation, the number of time slots is = 0 6. We use the utility function Ux) = log + x) x 0. he main channel rate is uniformly distributed over 0, 00 and the eavesdropper channel rate is uniformly distributed over 0, 50. As a result of the simulation, the average secure capacity R s = 9.. We also set the virtual key queue parameter ɛ = 0.0. We first use an arrival process At), t 0, that is composed of independent Poisson random variables with mean 30 each slot. In this example, Ā > R s. We run the simulation for different values of the control coefficient and compare the results with the optimal value. In Figure a), one can observe that, as increases, the average utility of the transmission rate with a key queue approaches the optimal value, which is consistent with Equation 6). For the case without a key queue, the average utility remains a constant and is quite smaller. Figure b) shows that, as increases, the average admission rate both with and without a key queue) also increases to the optimum, which is consistent with Equation 9). As a tradeoff, the average queue length increases but remains bounded as shown in Figure c). Although the optimal admission rate can be approached both with and without a key queue, the delay performance with a key queue is better as we can see in Figure d). Figure 3 illustrates the same scenario, with a more bursty arrival process. his time, At) = 0 w.p. and At) = 50 w.p. independently for each time slot. Consequently, Ā = 5 < R s. Similar observations to the previous case can be made with this arrival process. Note that the optimal value for Problem A) is U R s) and for Problem B) is minā, R s.
5 5 Average Utility of ransmission Rate Average Queue Length Optimal x a) x 0 4 c) Average Admission Rate Average Queue Length Optimal x b) Average Admission Rate Fig.. Performance Evaluation of C and AC with respect to the solutions of Problem A) and B) under Poisson Arrivals: a) Control Parameter vs. Average Utility of ransmission Rate; b) Control Parameter vs. Average Admission Rate; c) Control Parameter vs. Queueing Delay; d) hroughput vs. Delay Curve Average Utility of ransmission Rate Average Queue Length Optimal x a) x 0 4 c) Average Admission Rate Average Queue Length d) Optimal x b) Average Admission Rate Fig. 3. Performance Evaluation of C and AC for Problem A) and B) under ariable Arrivals I. CONCLUSION In this paper, we considered a single-user secure data communication system and addressed two separate problems, d) both of which involve the maximization of a long-term average utility, defined as a function of the number of secure packets transmitted in each time slot. We proposed a transmission controller and an admission controller based on simple index policies that do not rely on any prior statistical information on the data arrival process. We showed that our controller pair has a provably efficient performance. Also, we illustrated via simulations that the use of a key queue reduces the queuing delay for the data packets, while serving packets that are admitted at the maximum admissible rate. his is due to the fact that, the transmission controller is designed to choose the rate of served packets as uniformly over time as possible. REFERENCES A. Wyner, he Wire-ap Channel, he Bell System echnical Hournal, vol. 54, no. 8, pp , October 975. P. K. Gopala, L. Lai, and H. El Gamal, On the secrecy capacity of fading channels, vol. 54, no. 0, pp , Oct J. Barros and M. R. D. Rodrigues, Secrecy capacity of wireless channels, in Proc. IEEE Int. Symposium Inform. heory, Seattle, WA, July 006, pp D. Gunduz, R. Brown, and H.. Poor, Secret communication with feedback, in Proc. IEEE Intl. Symposium on Information heory and its Applications, Auckland, New Zealand, Dec A. Khisti and G. W. Wornell, Secure transmission with multiple antennas: he MISOME wiretap channel, IEEE rans. Inform. heory, 009, to appear. 6 Y. Liang, H.. Poor, and S. Shamai Shitz), Secure communication over fading channels, IEEE rans. Inform. heory, vol. 54, no. 6, pp , June E. Ekrem and S. Ulukus, he secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel, Mar. 009, submitted. 8 M. Yuksel, X. Liu, and E. Erkip, A secure communication game with a relay helping the eavesdropper, aormina, Italy, Oct. 009, to appear. 9 O. O. Koyluoglu, C. E. Koksal, and H. E. Gamal, On secrecy capacity scaling in wireless networks, 00, submitted. 0, On the effect of colluding eavesdroppers on secrecy scaling, in Proceedings of European Wireless, EW, Lucca, Italy, 00. S. Goel,. Aggarwal, A. Yener, and A. R. Calderbank, Modeling location uncertainty for eavesdroppers: A secrecy graph approach, Austin, X, June 00. S. asudevan, D. Goeckel, and D. F. owsley, Security-capacity tradeoff in large wireless networks using keyless secrecy, Chicago, IL, September A. Sarkar and M. Haenggi, Secrecy coverage, Pacific Grove, CA, Nov C. E. Koksal and O. Ercetin, Control of wireless networks with secrecy, in Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, Nov C. E. Koksal, O. Ercetin, and Y. Sarikaya, Control of wireless networks with secrecy, CoRR, vol. abs/0.3444, 0. 6 L. assiulas and A. Ephremides, Jointly optimal routing and scheduling in packet ratio networks, IEEE ransactions on Information heory, vol. 38, no., pp , Jan X. Liu, E. K. P. Chong, and N. B. Shroff, A framework for opportunistic scheduling in wireless networks, Computer Networks, vol. 4, no. 4, pp , A. Stolyar, Greedy primal-dual algorithm for dynamic resource allocation in complex networks, Queueing Systems, vol. 54, pp. 03 0, 006, 0.007/s Online. Available: M. Neely, Energy Optimal Control for ime arying Wireless Networks, IEEE ransactions on Information heory, vol. 5, no. 7, pp , July K. Khalil, M. Youssef, O. O. Koyluoglu, and H. El Gamal, On the delay limited secrecy capacity of fading channels, Seoul, Korea, June - July 009. O. Gungor, J. an, C. E. Koksal, H. El Gamal, and N. B. Shroff, Joint power and secret key queue management for delay limited secure communication, San Diego, CA, March 00.
6 6 Z. Mao, C. Koksal, and N. Shroff, Resource Allocation in Sensor Networks with Renewable Energy, in Proc. of the 9th International Conference on Computer Communication Networks, 00. A. Proof of heorem APPENDIX Proof of Equation 7): Equation 7) directly follows from the following lemma: Lemma : Under algorithm AC and C, we have q d t) β, q kt) β. Proof: Since U ) is concave on R + {0}, we have Uµt)) U0)+βµt), t 0, where 0 β = U 0) <. hen, Uµt)) q kt)µt) U0) + β µt) q kt)µt) where µt) is the solution of C. β If µt) q kt)µt) < 0, then we get Uµt)) q k t)µt) < U0). However, C chooses µt) that maximizes Uµt)) q kt)µt) which means Uµt)) q k t)µt) U0) since 0 Πt). hen, we must have β µt) q kt)µt) 0, i.e., q k t)µt) β µt). 0) We now prove the result by induction. Without loss of generality, let q k 0) β. Suppose for all t, q kt ) β holds. In slot t, if µt) = 0, then q k t) q k t ) β by Equation ). Otherwise, µt) 0, and by Equation 0), we have q k t) β. q d t) β can be obtained using the same argument. Proof of Equation 6): We define the Lyapunov function L q k t)) = q k t)), and q k t)) = L q k t+)) L q k t)). From Equation ), we have then qk t + ) ) qk t) ɛ ) + µt) Rs t) + o t) ) + qt) ɛ ) + µt) Rs t) + o t) ) = q k t)) q k t) ) + ɛ + + R max ) + ɛrmax + q k t) o t) + q k t)µt) q k t)r s t), Uµt)) Uµt)) + ɛ + + R max ) + ɛrmax + q k t) o t) + q k t)µt) q k t)r s t) Uµt)) + ɛ + ) + R max + ɛrmax + β o t) Uµt)) q kt)µt) q k t)r s t). It is apparent that C is trying to maximize the value of the term Uµt)) q kt)µt). Since the optimal solution for Problem A) may not be unique, we let U be the optimal solution set and µ U be any optimal solution, for Problem A) given any sample path. Since the constraint set Πt) is queue dynamic related, it is possible that µ t) / Πt). Lemma 3: In slot t, if by solving C, we get Uµt)) q kt)µt) < Uµ t)) q k t)µ t), then µt) < µ t) and o t ) = for some t t and t t <. Proof: In time slot t, let µ m t) be the value that maximize the unconstrained objective function Uµt)) q kt)µt). Claim : q k t) + R s t) R m t). Otherwise, Πt) = 0, R m t) which is not queue dynamic related, then Uµt)) q kt)µt) Uµ t)) q k t)µ t). Claim : µ m t), µ t) > q k t) + R s t). If µ m t), µ t) Πt), we must have Uµt)) q kt)µt) Uµ t)) q k t)µ t), then µ t) > q k t) + R s t). If µ m t) < 0, we will have U0) = Uµt)) q kt)µt) Uµ t)) q k t)µ t), then µ m t) > q k t) + R s t). By the above claims, µt) < µ t) and µt) < µ m t). Suppose µt) < q k t) + R s t), since the objective function of C is concave in µt), we can increase µt) to increase the objective without violating the constraint. hus, µt) = q k t)+r s t) and o t) =. It is also possible that o t ) = for some t < t and R s τ) = 0, τ t, t. Note that t t <, otherwise, R st) = 0. Let N = max{n : for any t 0, R s τ) = 0, τ t, t + n}. By using Lemma 3 and µt), µ t) R m t) R max, t 0, we have N < and Uµt)) Uµ t)) + ɛ + ) + R max + ɛrmax + q k t) µ t) R s t) + β + NUR max )) o t). Lemma 4: q k t)µ t) R s t) O ). Proof: Note that µ t) q k 0) + R s t) 0, then ) µ t) R s t) δ < q k 0), ) where δ can be arbitrarily small. By divided by and taking of both sides, we have ) µ t) R s t) δ < 0. ) Construct an auxiliary queue with the following evolution: + q kt + ) = q kt) R s t) δ) + µ t), then with Equation ), q k t) is strongly stable. By multiplying q k t) for both sides of the inequality q k t + ) q k t) R st) δ + µ t) and rearranging terms, we obtain
7 7 q k t) µ t) R s t) q k t) q k t + ) q k t) + δ. By summing from 0 to, dividing by and taking, we have + + R max + ɛ =O ) + δβ, q k t)µ t) R s t) q kt) q k t ) q k t) ) t= q k ) q k ) q k0) q k 0) q k t) δ q kt) + δ β t= since the average queue length of the auxiliary queue remains stable and is not related to. By letting δ 0, we finish the proof. Lemma 5: If q k t) β, then q kt) <. Proof: First, we provide a rough idea of the proof: by exploring the relations between q k t) and q k t), we notice that as q k t) increases from 0 to at most β, q kt) will hit zero at some slot. Once q k t) becomes zero, C results in µt) = minq k t) + R s t), R m t). Since R s t) R m t), q k t) will either be zero or decrease. We now give the proof details. Without loss of generality, let q k 0) = 0. We have the following cases: i) if µt) R s t), o t) = 0 and q k t) > 0, then q k t + ) q k t) and q k t + ) q k t) q k t) q k t + ), i.e., even if q k t) increases, the increment is no larger than the decrement of q k t); ii) if µt) < R s t), o t) = 0, then if q k t + ) > 0, q k t) q k t+) q k t+) q k t), i.e., the decrement of q k t) is no less than the increment of q k t), else if q k t + ) = 0, it goes to case iv); iii) if o t) =, then q k t + ) = 0 by Equation ) and Equation 3); iv) if q k t) = 0, by Equation 4), C chooses µt) = minq k t) + R s t), R m t), then either q b t + ) = 0, or q k t + ) = q k t) R m t) + R s t) q k t). From the above discussion, we have q k t) β <. Lemma 6: If both the key queue q k t) and virtual key queue q k t) are strongly stable, i.e., qk t) + q k t) ) <, then ot) ɛ. Proof: Using the idea similar to 9, we have the fact that if any queue represented with Qt) is strongly stable, then Q ) = 0. Hence, if q k t) and q k t) are strongly q stable, k ) q = k ) = 0. From Equation ), we have q k t + ) q k t) ɛ + o t) + µt) R s t). Note that q k t + ) = q k t) µt) + R s t). By adding from 0 to, dividing by and taking on both sides, we have q k ) q k 0) lim ɛ + o t) + lim q k 0) q k ). q Since k ) q = lim k 0) = q lim k 0) q = lim k ) = 0, so we get ot) ɛ. By summing from 0 to, dividing by and, taking over Equation ), combined with Lemma, Lemma 5, Lemma 6, and Lemma 4, we get Uµt)) ɛnur max ) + β). Uµ t)) O ) By letting ɛ 0, we obtain Equation 6). Proof of Equation 8) and Equation 9): We define Lq d t)) = q d t)), and q d t)) = Lq d t+)) Lq d t)). By Equation 5), we have = q d t)) URt)) URt)) q dt)rt) + A t) + Rmax q d t)µt) 3) P ) max Rt) R P ) max R s.t. URt)) q d t + ) = q d t) µt)) + + Rt), 0 Rt) At), Rs t) µt) = 0, q d t) <, Lemma 7: P) and P) have different objective functions under the same set of constraints. Let R be the maximizer of P), then it is also the maximizer of P). Proof: Suppose there exists R such R t) < R t),
8 8 then there exists R such that R t) R t) At), t 0 and R t) < R t) Rt). i.e., there are infinitely many slots in which R t) Rt) < 0. Since U ) is strictly concave, UR t)) URt)) < β m R t) Rt)) < 0 if R t) Rt) < 0, where 0 < β m = min{ UR t)) UR t)) R t) R t) : R t) Rt) < 0}. hus, UR t)) < UR t)), which contradicts the fact that R is the maximizer of P). Note that q k t + ) = q k t) + R s t) µt). By Lemma 5, we have the fact that C results into Rs t) µt) = 0, 4) then Problem B) is reduced to P). By Lemma 7, R is also the maximizer of Problem B). Substituting R t) into Equation 3), we obtain URt)) UR t)) + A t) + Rmax + q d t) R t) µt). Note that R t) R s t)) 0 and A t) <. combining with Equation 4) and using the same idea as in Lemma 4, we have q d t)r t) µt) O ). hen, we further obtain URt)) UR t)) O ), where R is the maximizer of P), P) and Problem B). his equation also means that as, R becomes the maximizer of P). By applying Lemma 7 again, we have Rt) R t) as.
Towards Achieving Full Secrecy Rate and Low Delays in Wireless Networks
owards Achieving Full Secrecy Rate and Low Delays in Wireless Networks Zhoujia Mao Department of ECE he Ohio State University maoz@ece.osu.edu Can Emre Koksal Department of ECE he Ohio State University
More informationAchieving Full Secrecy Rate with Low Packet Delays: An Optimal Control Approach
Achieving Full Secrecy Rate with Low Packet Delays: An Optimal Control Approach Zhoujia Mao, C. Emre Koksal, Ness B. Shroff E-mail: maoz@ece.osu.edu, koksal@ece.osu.edu, shroff@ece.osu.edu Abstract We
More informationResource Allocation in Sensor Networks with Renewable Energy
Resource Allocation in Sensor Networks with Renewable Energy (Invited Paper) Zhoujia Mao Department of ECE he Ohio State University maoz@ece.osu.edu Can Emre Koksal Department of ECE he Ohio State University
More informationAchieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel
Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Shahid Mehraj Shah and Vinod Sharma Department of Electrical Communication Engineering, Indian Institute of
More informationThroughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting
Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210
More informationChannel Allocation Using Pricing in Satellite Networks
Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract
More informationSecure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel
Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu
More informationOptimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information
SUBMIED O IEEE INERNAIONAL SYMPOSIUM ON INFORMAION HEORY, DE. 23 1 Optimal Power Allocation for Parallel Gaussian Broadcast hannels with Independent and ommon Information Nihar Jindal and Andrea Goldsmith
More informationOnline Scheduling for Energy Harvesting Broadcast Channels with Finite Battery
Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,
More informationA POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation
A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New
More informationOn the Energy-Delay Trade-off of a Two-Way Relay Network
On the Energy-Delay Trade-off of a To-Way Relay Netork Xiang He Aylin Yener Wireless Communications and Netorking Laboratory Electrical Engineering Department The Pennsylvania State University University
More informationEnergy Harvesting Multiple Access Channel with Peak Temperature Constraints
Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,
More informationPower Aware Wireless File Downloading: A Lyapunov Indexing Approach to A Constrained Restless Bandit Problem
IEEE/ACM RANSACIONS ON NEWORKING, VOL. 24, NO. 4, PP. 2264-2277, AUG. 206 Power Aware Wireless File Downloading: A Lyapunov Indexing Approach to A Constrained Restless Bandit Problem Xiaohan Wei and Michael
More informationInformation Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels
1 Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels Invited Paper Ali ParandehGheibi, Muriel Médard, Asuman Ozdaglar, and Atilla Eryilmaz arxiv:0810.167v1 cs.it
More informationOptimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters
Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Alkan Soysal Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland,
More informationSum-Rate Capacity of Poisson MIMO Multiple-Access Channels
1 Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels Ain-ul-Aisha, Lifeng Lai, Yingbin Liang and Shlomo Shamai (Shitz Abstract In this paper, we analyze the sum-rate capacity of two-user Poisson
More informationDynamic Power Allocation and Routing for Time Varying Wireless Networks
Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,
More informationOn the Secrecy Capacity of Fading Channels
On the Secrecy Capacity of Fading Channels arxiv:cs/63v [cs.it] 7 Oct 26 Praveen Kumar Gopala, Lifeng Lai and Hesham El Gamal Department of Electrical and Computer Engineering The Ohio State University
More informationEnergy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California
Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely Part 1: A single wireless downlink (L links) L 2 1 S={Totally
More informationDynamic User Association and Energy Control in Cellular Networks with Renewable Resources
Dynamic User Association and Energy Control in Cellular Networks with Renewable Resources Yang Yang, Jiashang Liu, Prasun Sinha and Ness B. Shroff Abstract In recent years, there has been a growing interest
More informationEE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing
EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a
More informationInequality Comparisons and Traffic Smoothing in Multi-Stage ATM Multiplexers
IEEE Proceedings of the International Conference on Communications, 2000 Inequality Comparisons and raffic Smoothing in Multi-Stage AM Multiplexers Michael J. Neely MI -- LIDS mjneely@mit.edu Abstract
More informationExploring the Tradeoff between Waiting Time and Service Cost in Non-Asymptotic Operating Regimes
Exploring the radeoff between Waiting ime and Service Cost in Non-Asymptotic Operating Regimes Bin Li, Ozgur Dalkilic and Atilla Eryilmaz Abstract Motivated by the problem of demand management in smart
More information4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016
4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016 Online Power Control Optimization for Wireless Transmission With Energy Harvesting and Storage Fatemeh Amirnavaei, Student Member,
More informationInformation in Aloha Networks
Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha
More informationOptimal power-delay trade-offs in fading channels: small delay asymptotics
Optimal power-delay trade-offs in fading channels: small delay asymptotics Randall A. Berry Dept. of EECS, Northwestern University 45 Sheridan Rd., Evanston IL 6008 Email: rberry@ece.northwestern.edu Abstract
More informationA Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying
A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,
More informationMorning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland
Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable
More informationOptimal Power Control in Decentralized Gaussian Multiple Access Channels
1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017
More informationAn Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 4, APRIL 2012 2427 An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel Ersen Ekrem, Student Member, IEEE,
More informationFairness and Optimal Stochastic Control for Heterogeneous Networks
λ 91 λ 93 Fairness and Optimal Stochastic Control for Heterogeneous Networks sensor network wired network wireless 9 8 7 6 5 λ 48 λ 42 4 3 0 1 2 λ n R n U n Michael J. Neely (USC) Eytan Modiano (MIT) Chih-Ping
More informationOn the Secrecy Capacity of the Z-Interference Channel
On the Secrecy Capacity of the Z-Interference Channel Ronit Bustin Tel Aviv University Email: ronitbustin@post.tau.ac.il Mojtaba Vaezi Princeton University Email: mvaezi@princeton.edu Rafael F. Schaefer
More informationCooperative Energy Harvesting Communications with Relaying and Energy Sharing
Cooperative Energy Harvesting Communications with Relaying and Energy Sharing Kaya Tutuncuoglu and Aylin Yener Department of Electrical Engineering The Pennsylvania State University, University Park, PA
More informationOptimizing Queueing Cost and Energy Efficiency in a Wireless Network
Optimizing Queueing Cost and Energy Efficiency in a Wireless Network Antonis Dimakis Department of Informatics Athens University of Economics and Business Patission 76, Athens 1434, Greece Email: dimakis@aueb.gr
More informationCapacity of the Discrete Memoryless Energy Harvesting Channel with Side Information
204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener
More informationrequests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1
Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet
More informationOn the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise
On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise Ya-Lan Liang, Yung-Shun Wang, Tsung-Hui Chang, Y.-W. Peter Hong, and Chong-Yung Chi Institute of Communications
More informationTRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS
The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,
More informationRessource Allocation Schemes for D2D Communications
1 / 24 Ressource Allocation Schemes for D2D Communications Mohamad Assaad Laboratoire des Signaux et Systèmes (L2S), CentraleSupélec, Gif sur Yvette, France. Indo-french Workshop on D2D Communications
More informationThe Poisson Channel with Side Information
The Poisson Channel with Side Information Shraga Bross School of Enginerring Bar-Ilan University, Israel brosss@macs.biu.ac.il Amos Lapidoth Ligong Wang Signal and Information Processing Laboratory ETH
More informationResource Allocation and Pricing. R. Srikant University of Illinois
Resource Allocation and Pricing R. Srikant University of Illinois References The Mathematics of Internet Congestion Control, Birkhauser, 2004. Pricing: Kelly Distributed Resource Allocation: Kelly, Mauloo
More informationNode-based Distributed Optimal Control of Wireless Networks
Node-based Distributed Optimal Control of Wireless Networks CISS March 2006 Edmund M. Yeh Department of Electrical Engineering Yale University Joint work with Yufang Xi Main Results Unified framework for
More informationFading Wiretap Channel with No CSI Anywhere
Fading Wiretap Channel with No CSI Anywhere Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 7 pritamm@umd.edu ulukus@umd.edu Abstract
More informationBroadcasting with a Battery Limited Energy Harvesting Rechargeable Transmitter
roadcasting with a attery Limited Energy Harvesting Rechargeable Transmitter Omur Ozel, Jing Yang 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland, College
More informationOptimal Sampling of Random Processes under Stochastic Energy Constraints
Globecom 24 - Signal Processing for Communications Symposium Optimal Sampling of Random Processes under Stochastic Energy Constraints Jing Yang and Jingxian Wu Department of Electrical Engineering, University
More informationMIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper
MIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper Xiang He, Ashish Khisti, Aylin Yener Dept. of Electrical and Computer Engineering, University of Toronto, Toronto, ON, M5S 3G4, Canada
More informationA Simple Memoryless Proof of the Capacity of the Exponential Server Timing Channel
A Simple Memoryless Proof of the Capacity of the Exponential Server iming Channel odd P. Coleman ECE Department Coordinated Science Laboratory University of Illinois colemant@illinois.edu Abstract his
More informationOn Gaussian MIMO Broadcast Channels with Common and Private Messages
On Gaussian MIMO Broadcast Channels with Common and Private Messages Ersen Ekrem Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 ersen@umd.edu
More informationErgodic Stochastic Optimization Algorithms for Wireless Communication and Networking
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering 11-17-2010 Ergodic Stochastic Optimization Algorithms for Wireless Communication and
More informationCrowdsourcing in Cyber-Physical Systems: Stochastic Optimization with Strong Stability
Received 1 April 2013; revised 25 May 2013; accepted 29 June 2013. Date of publication 15 July 2013; date of current version 21 January 2014. Digital Object Identifier 10.1109/EC.2013.2273358 Crowdsourcing
More informationOnline Power Control Optimization for Wireless Transmission with Energy Harvesting and Storage
Online Power Control Optimization for Wireless Transmission with Energy Harvesting and Storage Fatemeh Amirnavaei, Student Member, IEEE and Min Dong, Senior Member, IEEE arxiv:606.046v2 [cs.it] 26 Feb
More informationQuiz 1 EE 549 Wednesday, Feb. 27, 2008
UNIVERSITY OF SOUTHERN CALIFORNIA, SPRING 2008 1 Quiz 1 EE 549 Wednesday, Feb. 27, 2008 INSTRUCTIONS This quiz lasts for 85 minutes. This quiz is closed book and closed notes. No Calculators or laptops
More informationIN this paper, we show that the scalar Gaussian multiple-access
768 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 5, MAY 2004 On the Duality of Gaussian Multiple-Access and Broadcast Channels Nihar Jindal, Student Member, IEEE, Sriram Vishwanath, and Andrea
More informationAge-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges
Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges Ahmed Arafa, Jing Yang 2, Sennur Ulukus 3, and H. Vincent Poor Electrical Engineering Department, Princeton
More informationPerformance-based Security for Encoding of Information Signals. FA ( ) Paul Cuff (Princeton University)
Performance-based Security for Encoding of Information Signals FA9550-15-1-0180 (2015-2018) Paul Cuff (Princeton University) Contributors Two students finished PhD Tiance Wang (Goldman Sachs) Eva Song
More informationFair Scheduling in Input-Queued Switches under Inadmissible Traffic
Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Neha Kumar, Rong Pan, Devavrat Shah Departments of EE & CS Stanford University {nehak, rong, devavrat@stanford.edu Abstract In recent
More informationLow-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. XX, XXXXXXX X Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks Longbi Lin, Xiaojun Lin, Member, IEEE, and Ness B. Shroff,
More informationEquivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues
Proceedings of the 38th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2000. Equivalent Models and Analysis for Multi-Stage ree Networks of Deterministic Service ime Queues Michael
More informationCooperative Communication with Feedback via Stochastic Approximation
Cooperative Communication with Feedback via Stochastic Approximation Utsaw Kumar J Nicholas Laneman and Vijay Gupta Department of Electrical Engineering University of Notre Dame Email: {ukumar jnl vgupta}@ndedu
More informationDelay-Based Back-Pressure Scheduling in. Multihop Wireless Networks
Delay-Based Back-Pressure Scheduling in Multihop Wireless Networks Bo Ji, Student Member, IEEE, Changhee Joo, Member, IEEE, and Ness B. Shroff, Fellow, IEEE arxiv:0.5674v3 [cs.ni] 7 Nov 202 Abstract Scheduling
More informationSpectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy
Spectrum Leasing via Cooperation for Enhanced 1 Physical-Layer Secrecy Keonkook Lee, Member, IEEE, Chan-Byoung Chae, Senior Member, IEEE, Joonhyuk Kang, Member, IEEE arxiv:1205.0085v1 [cs.it] 1 May 2012
More informationSum Capacity of General Deterministic Interference Channel with Channel Output Feedback
Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback Achaleshwar Sahai Department of ECE, Rice University, Houston, TX 775. as27@rice.edu Vaneet Aggarwal Department of
More informationLattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm
Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm HongSun An Student Member IEEE he Graduate School of I & Incheon Korea ahs3179@gmail.com Manar Mohaisen Student Member IEEE
More informationThroughput-optimal Scheduling in Multi-hop Wireless Networks without Per-flow Information
Throughput-optimal Scheduling in Multi-hop Wireless Networks without Per-flow Information Bo Ji, Student Member, IEEE, Changhee Joo, Member, IEEE, and Ness B. Shroff, Fellow, IEEE Abstract In this paper,
More informationOn queueing in coded networks queue size follows degrees of freedom
On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,
More informationEnergy-Efficient Scheduling with Individual Delay Constraints over a Fading Channel
Energy-Efficient Scheduling with Individual Delay Constraints over a Fading Channel Wanshi Chen Qualcomm Inc. San Diego, CA 92121 wanshic@qualcomm.com Urbashi Mitra and Michael J. Neely Dept. of Electrical
More informationCapacity and Delay Tradeoffs for Ad-Hoc Mobile Networks
IEEE TRASACTIOS O IFORMATIO THEORY 1 Capacity and Delay Tradeoffs for Ad-Hoc Mobile etworks Michael J. eely University of Southern California mjneely@usc.edu http://www-rcf.usc.edu/ mjneely Eytan Modiano
More informationOptimum Transmission Policies for Battery Limited Energy Harvesting Nodes
Optimum Transmission Policies for Battery Limited Energy Harvesting Nodes Kaya Tutuncuoglu Aylin Yener Wireless Communications and Networking Laboratory (WCAN) Electrical Engineering Department The Pennsylvania
More informationIntegrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks
VANET Analysis Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks Tom Hao Luan, Xuemin (Sherman) Shen, and Fan Bai BBCR, ECE, University of Waterloo, Waterloo, Ontario, N2L 3G1,
More informationAmr Rizk TU Darmstadt
Saving Resources on Wireless Uplinks: Models of Queue-aware Scheduling 1 Amr Rizk TU Darmstadt - joint work with Markus Fidler 6. April 2016 KOM TUD Amr Rizk 1 Cellular Uplink Scheduling freq. time 6.
More informationAdaptive Distributed Algorithms for Optimal Random Access Channels
Forty-Eighth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 29 - October, 2 Adaptive Distributed Algorithms for Optimal Random Access Channels Yichuan Hu and Alejandro Ribeiro
More informationThe Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems
The Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems Jie Yang and D.R. Brown III Worcester Polytechnic Institute Department
More informationUsing Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor
Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor Ahmed Arafa, Jing Yang, Sennur Ulukus 3, and H. Vincent Poor Electrical Engineering Department, Princeton University School
More informationInteractive Interference Alignment
Interactive Interference Alignment Quan Geng, Sreeram annan, and Pramod Viswanath Coordinated Science Laboratory and Dept. of ECE University of Illinois, Urbana-Champaign, IL 61801 Email: {geng5, kannan1,
More informationContinuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks
Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer
More informationAny Work-conserving Policy Stabilizes the Ring with Spatial Reuse
Any Work-conserving Policy Stabilizes the Ring with Spatial Reuse L. assiulas y Dept. of Electrical Engineering Polytechnic University Brooklyn, NY 20 leandros@olympos.poly.edu L. Georgiadis IBM. J. Watson
More informationQueue Proportional Scheduling in Gaussian Broadcast Channels
Queue Proportional Scheduling in Gaussian Broadcast Channels Kibeom Seong Dept. of Electrical Engineering Stanford University Stanford, CA 9435 USA Email: kseong@stanford.edu Ravi Narasimhan Dept. of Electrical
More informationBacklog Optimal Downlink Scheduling in Energy Harvesting Base Station in a Cellular Network
MTech Dissertation Backlog Optimal Downlink Scheduling in Energy Harvesting Base Station in a Cellular Network Submitted in partial fulfillment of the requirements for the degree of Master of Technology
More informationA Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels
A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels Mehdi Mohseni Department of Electrical Engineering Stanford University Stanford, CA 94305, USA Email: mmohseni@stanford.edu
More informationPower Allocation and Coverage for a Relay-Assisted Downlink with Voice Users
Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,
More informationCooperative HARQ with Poisson Interference and Opportunistic Routing
Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline
More informationSecret Key Agreement Using Asymmetry in Channel State Knowledge
Secret Key Agreement Using Asymmetry in Channel State Knowledge Ashish Khisti Deutsche Telekom Inc. R&D Lab USA Los Altos, CA, 94040 Email: ashish.khisti@telekom.com Suhas Diggavi LICOS, EFL Lausanne,
More informationStochastic Optimization for Undergraduate Computer Science Students
Stochastic Optimization for Undergraduate Computer Science Students Professor Joongheon Kim School of Computer Science and Engineering, Chung-Ang University, Seoul, Republic of Korea 1 Reference 2 Outline
More informationABSTRACT CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS. Title of dissertation: Anthony A. Fanous, Doctor of Philosophy, 2013
ABSTRACT Title of dissertation: CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS Anthony A. Fanous, Doctor of Philosophy, 2013 Dissertation directed by: Professor Anthony Ephremides Department of Electrical
More informationSTABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS
The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung
More informationEnergy Cooperation and Traffic Management in Cellular Networks with Renewable Energy
Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy Hyun-Suk Lee Dept. of Electrical and Electronic Eng., Yonsei University, Seoul, Korea Jang-Won Lee Dept. of Electrical
More informationNetwork Optimization: Notes and Exercises
SPRING 2016 1 Network Optimization: Notes and Exercises Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely Abstract These notes provide a tutorial treatment of topics of
More informationNode-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance
Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance Yu Sang, Gagan R. Gupta, and Bo Ji Member, IEEE arxiv:52.02328v2 [cs.ni] 8 Nov 207 Abstract This
More informationWIRELESS systems often operate in dynamic environments
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 9, NOVEMBER 2012 3931 Structure-Aware Stochastic Control for Transmission Scheduling Fangwen Fu and Mihaela van der Schaar, Fellow, IEEE Abstract
More informationOptimal Sensing and Transmission in Energy Harvesting Sensor Networks
University of Arkansas, Fayetteville ScholarWorks@UARK Theses and Dissertations 2-206 Optimal Sensing and Transmission in Energy Harvesting Sensor Networks Xianwen Wu University of Arkansas, Fayetteville
More informationExploiting Partial Channel State Information for Secrecy over Wireless Channels
Exploiting Partial Channel State Information for Secrecy over Wireless Channels Matthieu R. Bloch and J. Nicholas Laneman Abstract In this paper, we investigate the effect of partial channel state information
More informationWireless Transmission with Energy Harvesting and Storage. Fatemeh Amirnavaei
Wireless Transmission with Energy Harvesting and Storage by Fatemeh Amirnavaei A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in The Faculty of Engineering
More informationCharacterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems
2382 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 59, NO 5, MAY 2011 Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems Holger Boche, Fellow, IEEE,
More informationDEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE
DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE Daohua Zhu, A. Lee Swindlehurst, S. Ali A. Fakoorian, Wei Xu, Chunming Zhao National Mobile Communications Research Lab, Southeast
More informationStability Analysis in a Cognitive Radio System with Cooperative Beamforming
Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Mohammed Karmoose 1 Ahmed Sultan 1 Moustafa Youseff 2 1 Electrical Engineering Dept, Alexandria University 2 E-JUST Agenda 1
More informationII. THE TWO-WAY TWO-RELAY CHANNEL
An Achievable Rate Region for the Two-Way Two-Relay Channel Jonathan Ponniah Liang-Liang Xie Department of Electrical Computer Engineering, University of Waterloo, Canada Abstract We propose an achievable
More informationQuality of Information Aware Scheduling in Task Processing Networks
Resource Allocation on Wireless Networks and Wireless Networks - Communication, Cooperation and Competition Quality of Information Aware Scheduling in Task Processing Networks Rahul Urgaonkar, Ertugrul
More informationHow Much Training and Feedback are Needed in MIMO Broadcast Channels?
How uch raining and Feedback are Needed in IO Broadcast Channels? ari Kobayashi, SUPELEC Gif-sur-Yvette, France Giuseppe Caire, University of Southern California Los Angeles CA, 989 USA Nihar Jindal University
More informationNetwork Optimization and Control
Foundations and Trends R in Networking Vol. 2, No. 3 (2007) 271 379 c 2008 S. Shakkottai and R. Srikant DOI: 10.1561/1300000007 Network Optimization and Control Srinivas Shakkottai 1 and R. Srikant 2 1
More informationA Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case. 1
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case 1 Abhay K Parekh 2 3 and Robert G Gallager 4 Laboratory for Information and Decision Systems
More information