Towards Achieving Full Secrecy Rate and Low Delays in Wireless Networks
|
|
- Prosper Laurence Hutchinson
- 5 years ago
- Views:
Transcription
1 owards Achieving Full Secrecy Rate and Low Delays in Wireless Networks Zhoujia Mao Department of ECE he Ohio State University Can Emre Koksal Department of ECE he Ohio State University Ness B. Shroff Departments of ECE and CSE he Ohio State University Abstract In this paper, we consider a single-user secure data communication system. Data packets arriving at the transmitter are enqueued at a data queue to be transmitted to the receiver over a block fading channel, securely from an eavesdropper that listens to the transmitter over another independent block fading channel. Part of the data is secured by the available secrecy rate while the other part is encrypted by the key bits, enqueued at both the transmitter and the receiver. We first address two separate problems in this paper: with an average power constraint, given any sample path of arrivals, how to admit the arrivals and allocate power such that the long term average secrecy rate is maximized and the maximum admission rate is achieved while the data queue is kept stable; with infinite queue backlog, given any sample path of secrecy rate, how to control the data transmission rate and key generation such that a smooth transmission rate and then a small queueing delay are achieved. We propose a power controller, transmission controller and an admission controller based on simple index policies that do not rely on any prior statistical information on the data arrival process and channel conditions. We show that our controllers has a provably efficient performance and solve the above two problems simultaneously. Furthermore, for any given secrecy rate sample path and correspondingly admissible arrival, we provide a rate allocation policy which is sample path queueing delay optimal. I. INRODUCION Motivated by the seminal paper by [], there has been a large number of investigations e.g., [2] [8]) on wireless information theoretic secrecy. hese studies have significantly enhanced our understanding of the basic limits and principles of the design and the analysis of secure wireless communication systems. Despite the significant progress in information theoretic secrecy, most of the work has focused on physical layer techniques. he application of wireless information theoretic secrecy remains mainly unresolved as it relates to the design of wireless networks and its impact on network control and protocol development. Indeed, our understanding of the interplay between the secrecy requirements and the critical functionalities of wireless networks, such as scheduling, routing, and congestion control remains very limited. o that end, there have been some recent efforts to utilize the insights drawn from the aforementioned investigations on information theoretic secrecy to build secure wireless networks. In [9] [3] the fundamental capacity and connectivity scaling laws of wireless networks with secrecy have been addressed. In [4], [5], single hop uplink scenario has been considered in which nodes enqueue arriving private and open data packets to be transmitted to a base station over block fading channels. A node is scheduled to transmit information privately from the other nodes and rate is controlled carefully to maximize an overall utility. he solution provided follows up on the stochastic network optimization framework e.g., as treated in [6] [20]) and generalizes the uplink scenario to incorporate secrecy as a quality of service requirement. In a separate direction [2] proposed the idea of the use of a key queue in a single user system. here, a key queue is kept at the transmitter and the receiver, separately from the data queues. Instead of using the entire instantaneous secrecy rate for information transmission at all times, some of it is utilized to transmit key bits, generated randomly at the transmitter. hese stored key bits are used later to secure information bits in such a way that, even when the instantaneous secrecy rate is 0, information bits can still be transmitted to the destination securely from the eavesdropper. Hence, the idea of key sharing allows one to bank secrecy rates at certain times to be utilized at other times. It is shown in [22] that, using this idea, a long-term constant secrecy rate, identical to the secrecy capacity expected instantaneous secrecy rate) of the channel is achievable. In this paper, we address the single user setting in the presence of arrival of data packets being enqueued at a data queue to be transmitted to the receiver over a block fading channel, securely from an eavesdropper that listens to the transmitter over another independent block fading channel. We consider two separate problems, which involve the maximization of the long term average secrecy rate and admitted arrival rate while keeping data queue stable under an average power constraint, and maximization of a long-term average utility, defined as a function of the number of secure packets transmitted in each time slot. While, one would be inclined to exploit the entire secrecy rate for data transmission in each time slot in a greedy fashion, we show that this approach leads to a performance loss. Instead, the use of a key queue leads to a smoother secrecy rate, which in turn maximizes a concave utility, since it is negatively affected by the second order factors caused by the variability of the service. We propose a controller, which chooses the key generation and transmission) rate along with the secure data transmission rate in each time slot using a transmission control component. he power control
2 2 q k t) data queue µt) q d t) R k t) q k t) µ k t) µ k t) + R m t) xmit µ t) µ k t) Fig.. shared key queues System model t) R e recv R k t) µ k t) eavesdrop component allocates the power such that the secrecy rate is maximized under the average power constraint. he admission control component chooses the amount of data admitted by the transmitter to be enqueued in the data queue such that the admission rate approaches the maximum secrecy rate. hese three components are based on simple index policies that do not rely on any prior statistical information on the data arrival process. We show that our controller achieves a utility, arbitrarily close to the optimal utility. Also, we illustrate via simulations that the use of key queue reduces the queuing delay for the data packets, while serving packets that are admitted at the maximum admissible rate. For any given secrecy sample path and correspondingly admissible arrival, we also provide a rate control policy which is sample path queueing delay optimal. II. SYSEM MODEL We consider a single-user system illustrated in Fig., in which the transmitter enqueues data packets that wait to be transmitted to the receiver over the main channel at a variable power, securely from an eavesdropper, overhearing the transmission over a separate channel. ime is slotted, and the timevarying channel state of the main and the eavesdropper channel follow general processes h m = {h m 0), h m ),..., h m ),...} and h e = {h e 0), h e ),..., h e ),...}, respectively. In this paper, we assume perfect knowledge of these channel states at the transmitter. With the transmission power vector P = {P 0), P ),..., P ),...}, the instantaneous rate of the receiver and eavesdropper at slot t are R m t) = log + P t)h m t) ) and R e t) = log + P t)h e t) ), respectively. We also assume the time slots are long enough and as shown in [], the achievable instantaneous secrecy rate at a given slot t is identical to R s t) = R m t) R e t) ) +, t 0, where ) + = max[, 0]. In a given time slot, this rate is fully utilized: part of it is used to secure data from the data queue and the remaining part is used to transmit randomly generated key bits to be stored at the both key queues at the transmitter and the receiver. he size of the data and the key buffers are infinite. As shown in Fig., the amount of secure data transmitted at a time t is µt). A part µ k t) bits) of this data is secured using µ k t) key bits by a simple bit-by-bit XOR operation. he remaining µt) µ k t) bits is secured using the available secrecy rate R s t). Since the secrecy rate is fully utilized, the portion of the secrecy rate, not used to secure data is used to generate R k t) key bits. he data arrivals to the system is represented by the arrival process {At)}. he data queue state is denoted by q d t). he Lindley equation that models the state evolution of the key queue is: q k t + ) = q k t) + R k t) µ k t). he following lemma in [23] provides an equivalent model with the constraints that specify the relationships between the parameters. Lemma : he key queue q k can be modeled with the state evolution equation q k t + ) = q k t) + R s t) µt) with the constraints 0 µt) min[q k t) + R s t), R m t)], 0 µ k t) min[µt), R e t)], and µt) µ k t) ) + R k t) = R s t). III. PROBLEM FORMULAION We aim to design an efficient algorithm to control the power and rate allocation such that the throughput of the system is maximized with small queueing delay, under an average power constraint. o achieve this, we first consider two separate problems. In our first problem, we assume an infinitely backlogged data queue, i.e., q d 0) =. he objective is to maximize the long-term average utility, which is a function of the transmission rate given any sample path of secrecy rate. Our control parameters are the amount of used key bits µ k t), the amount of served data bits µt), and the amount of generated key bits R k t). In particular, we have: A) max U µt) ) µ, µ k, R k s.t. q k t + ) = q k t) + R s t) µt), ) 0 µt) min [ q k t) + R s t), R m t) ], 2) 0 µ k t) min [ µt), R e t) ], 3) µt) µk t) ) + R k t) = R s t), 4) where the utility function U ) is assumed to be monotonically increasing, reversible and differentiable on the half real line R + {0}. Note that if there were no key queue, then we would have q k t) = 0, µt) = R s t), µ k t) = 0, R k t) = 0, t 0. Also note that, the maximum achievable average secrecy rate is upper bounded by the average secrecy capacity R s = R st). In our second problem, we assume a general data arrival process, {At)} at the input of the data queue. At time t, only a portion Rt) of all arrivals are admitted into the data queue in order to keep the data queue stable. All the admitted packets are required to be served by the system eventually. In the second problem, our objective is maximize the long-term
3 3 average admitted data rate under an average power constraint. B) max Rt) R, µ, µ k, R k, P s.t. q d t + ) = q d t) µt) ) + + Rt), 5) q k t + ) = q k t) + R s t) µt), 6) 0 Rt) At), 7) 0 µt) min [ q k t) + R s t), R m t) ], 8) lim sup q d t) <, 9) 0 µ k t) min [ µt), R e t) ], 0) µt) µk t) ) + R k t) = R s t), ) R s t) = R m t) R e t) ) +, 2) R m t) = log + P t)h m t) ), 3) R e t) = log + P t)h e t) ), 4) lim sup P t) P avg, 5) 0 P t) P peak. 6) Note that, the maximum achievable average secrecy rate, which happens to be the objective function here, is upper bounded by the average secrecy capacity R s. By controlling the power allocation, we can first maximize the long term average secrecy rate. hen, by using an independent admission controller, we maximize the average admission rate that is bounded by the maximum secrecy rate. Further, as we shall show, R s can be achieved even without a key queue. However, we will also illustrate that our solutions that involve the use of the key queue lead to smaller queueing delays, compared to the one without the key queue. In these three problems, constraint 5) describes the data queue evolution, and constraints ) and 6) describe the key queue evolution. Constraint 7) bounds the actual amount of sensed data Rt) by the available amount of data At) at time t. Constraints 2) and 8) state that the amount of transmitted data is bounded by both the main channel rate and the amount of keys available. Constraint 9) guarantees data queue stability. Constraints 3) and 0) state that the amount of key bits used to secure data is bounded by the eavesdropper channel rate and does not exceed the amount of transmitted data. Constraints 4) and ) mean that the secure capacity is fully utilized by the transmission of secure data and key bits. Constraints 2), 3) and 4) are definitions of instantaneous secrecy rate R s t), rate of receiver R m t) and eavesdropper R e t). Constraint 5) is the average power constraint and constraint 6) is the peak power constraint. irtual Queues: In order to have a fair rate allocation, we do not want the key queue to be drained frequently, which would lead to outages whenever R s t) = 0. We define q k as the virtual key queue and try to avoid key outage by making the virtual key queue stable similar ideas of utilizing virtual queue are used in [20], [24]. he virtual queue evolves according to the following equation: q k t + ) = q k t) ɛ) + + µt) R s t) + o t) ) +, 7) where ɛ > 0 can be chosen arbitrarily, and o t) = key queue hits zero state from higher states in slot t { 0 if µt) = 0 or µt) < qk t) + R = s t) otherwise 8) is the indicator that the key queue is drained in slot t. Without loss of generality, the initial state q k 0) can be set to be zero. Similarly, we define the following virtual power queue to avoid the average power constraint being violated: q p t + ) = q p t) P avg ) + + P t). 9) I. CONROL ALGORIHM AND PERFORMANCE ANALYSIS In this section, we provide a simple control algorithm, analyze its performance, and show that its provably optimal for all three problems described in the previous section. A. Algorithm Our algorithm for Problem A) involves only a transmission rate controller. he transmission controller attempts to provide a smooth service by the help of the key bits. ransmission Control C): We define R + to be the control parameter of our algorithm. In slot t, the controller solves the following optimization problem and transmits with the calculated rate: max µt) Πt) 2 U µt) ) q k t)µt), 20) where Πt) = {µt) : 0 µt) min[q k t)+r s t), R m t)]} is a compact and nonempty set. Furthermore, key generation and usage rates R k t), µ k t)) are chosen as follows: If µt) > R s t), then R k t) = 0 and µ k t) = µt) R s t); if µt) R s t), then µ k t) = 0 and R k t) = R s t) µt). his ensures that constraint µt) µ k t) ) + R k t) = R s t) is satisfied. It is not surprising that µ k t)r k t) = 0, since any solution with µ k t) > 0 and R k t) > 0, can be equivalently replicated by using the secrecy rate to transmit data rather than generating and using key bits at the same time. Note that R s t) = R m t) R e t) ) + Rm t) R e t), then for µt) > R s t), we have µ k t) = µt) R s t) R m t) R s t) R e t). his leads to constraint 0 µ k t) min[µt), R e t)] being satisfied. he set, Πt) of possible data transmission guarantees constraint 2) on µt) in Problem A). If U ) is concave, the objective function is a concave function of µt). Consequently, C solves a simple convex optimization problem in each time slot. he positive term 2 Uµt)) can be viewed as a utility obtained from the transmission rate µt) and the term q k t)µt) can be viewed as its associated cost. When the virtual key queue q k t) is small, C tries to allocate a high amount of transmitted data to increase the utility; and when q k t) is large, C allocates a small amount of transmitted data to reduce cost. his pushes the served data rate to be smoother
4 4 over time. It is also notable that 20) involves only µt). he key generation and usage rates are not part of this optimization, and are chosen subsequently. In Problem B), we need to control the transmission power, admission and transmission rate such that the admitted rate is maximized while keeping the data queue stable under an average power constraint. In our algorithm, there are three components: a admission control component, a transmission control component, and a power control component. he transmission control component is the identical to the one described above for Problem A), and the admission control and power control component are as follows: Admission Control AC): In slot t, the controller solves the following optimization problem and admit the calculated amount of data arrivals: max 0 Rt) At) 2 U Rt) ) q d t)rt). 2) Power Control PC): In slot t, the controller solves the following optimization problem and allocate the calculated amount of power: max 0 P t) P peak 2 log )) + + P t)hm t) q p t)p t). + P t)h e t) 22) When h m t) < h e t), i.e., the channel condition of the eavesdropper is better, P t) = 0 is the solution of Equation 22). he reason is that under such a situation, the instantaneous secrecy rate is zero with any power allocation. In order to satisfy the power constraint, it is obvious to save power for future usage. When h m t) h e t), we have )) + ) + P t)hm t) + P t)hm t) log = log + P t)h e t) + P t)h e t) = log h mt) h e t) h mt) h et) + P t)h e t), 23) which is concave in P t). hen, Equation 22) is a concave maximization problem under this situation. Note that C, AC and PC are all index policies, i.e., the solutions are memoryless and they depend only on the instantaneous values of the system variables. B. Performance Analysis Recall that At) is the original data arrival and Rt) is the amount of data admitted to the data queue. he natural question one would ask here is, whether our admission controller rejects too many packets in the first place to synthetically keep the data queue stable. In the following theorem, we show that this is not the case. Indeed, the admission rate associated with AC and C can be made closer to the optimum by increasing the control parameter. We use the notation y = Ox) to represent y going to 0 as x goes to 0. heorem : If ) U ) is strictly concave on R + {0}, and its slope at 0 satisfies 0 β = U 0) <, 2) 0 lim sup A2 t) <, then C achieves: PC achieves: lim sup Uµt)) R s P t) ) and AC achieves: Uµ t)) O ), 24) R s P t) ) O ), 25) P t) P avg, 26) q d t) β 2, t 0 27) URt)) UR t)) O ), Rt) 28) R t) as, 29) where µ = {µ 0), µ ),..., µ ),...}, and R = {R 0), R ),..., R ),...} are the optimal solutions to Problem A) and B), respectively. he proof of heorem can be found in Appendix A. Equation 27) shows that the data queue q d is stable and Equation 26) shows that the average power is bounded. In Equation 24) and Equation 25), the gap between the average transmission rate and secrecy rate with our algorithm and the optimal average transmission rate and secrecy rate can be made arbitrarily small by choosing parameter large. Similarly, by Equation 29), the admission rate can be close to optimum with large, and the optimal admission rate is actually bounded by the optimal secrecy rate. As a tradeoff, the data queue length increases as increases. Note that the how to control the transmission rate does not really influence the optimality of the solution for Problem B). From Equation 28), we observe that, if we plug the rates allocated by our algorithm in the utility function, it still remains close to the utility achieved by the optimal solution of Problem B). his implies that, AC and C allocate rates smoothly over time, as opposed to the case without a key queue. Based on this observation, combined with Equation 24), we expect the queueing delay to be smaller with a key queue. We will verify this in the following numerical example. For instance, U + R) = log + R).
5 5 C. Sample-path Delay Policy for Admissible Arrivals Given any general time varying rates of the main and eavesdroppers channel R m = {R m 0), R m ),..., R m ),...} and R e = {R e 0), R e ),..., R e ),...}, an arrival sample A = {A0), A),..., A ),...} is admissible if there exists a transmission and key management policy such that the resulting average queue length is stable, i.e., lim sup q dt) <. In this section, we focus on the delay performance for admissible arrivals given sample path of secrecy rate, and only consider policies that admits all the arrivals. Our objective is that given any sample path R m, Re and admissible A corresponding to R m and R e, to find a policy that gives the minimum average queueing delay lim sup q dt). Such a policy is called sample path queueing delay optimal policy. Work conserving policy µ for single link communication: µt) = min{q d t) + At), q k t) + R s t), R m t)}, { 0, if µt) Rs t) µ k t) = µt) R s t), otherwise { 0, if µt) > Rs t) R k t) = 30) R s t) µt), otherwise his policy satisfies all the constraints of the equivalent model characterized in Lemma, and R k t) and µ k t) can be calculated with µt). he work conserving policy transmits as much data as possible in the data queue until the data queue is empty. Once the data queue is empty, the key bits will be stored in the key queue rather than being used to transmit idle packets. Such a policy keeps the remaining packets in the queue as less as possible, and at the same time does not waste any key bits. It is natural to expect this policy is sample path delay optimal. Proposition : he above work conserving policy is sample path queueing delay optimal. Proof: It is sufficient to show that t 0, the policy µ gives the smallest queue length among all policies, i.e., q µ d t) qγ d t), t 0 for any policy γ, where qµ d and q γ d are the resulting queue backlogs under policy µ and γ, respectively. We show this by induction. Without loss of generality, let q d 0) = q k 0) = 0. I) When t =, it is apparent. II) Suppose q µ d ) qγ d ) for and any policy γ. Note that under policy µ, the queue evolution follows: q µ d t + ) = qµ d t) µt) + At), q µ k t + ) = qµ k t) µt) + R st), and for policy γ, the queue evolution follows: q γ d t + ) = q γ d t) γt) ) + + At), q γ k t + ) = qγ k t) γt) + R st). hus, we have which implies q µ k ) + R s ) = q γ k ) + R s ) q µ d ) = At) µt), q µ k ) = R s t) µt), q γ d ) At) γt), q γ k ) = R s t) γt), R s t) R s t) i) If R st) At), then and we also have At) + q µ d ) + A ), 3) At) + q γ d ) + A ). µ ) = min{q µ k ) + R s ), R m )}, γ ) min{q γ k ) + R s ), R m )}, q µ d + ) =qµ d ) µ ) + A ), q γ d + ) qγ d ) γ ) + A ), then combine with Equation 3) and 32), we have 32) q µ d + ) qγ d + ) q µ d ) qγ d ) + γ ) µ ) 33) q µ k ) qγ k ) + γ ) µ ), 34) i.) when q γ k ) + R s ) R m ) and q µ k ) + R s ) R m ), then continue from Equation 34), we have q µ d + ) qγ d + ) q µ k ) qγ k ) + qγ k ) + R s ) µ ) =q µ k ) qγ k ) + qγ k ) qµ k ) = 0. i.2) when q γ k ) + R s ) R m ) and q µ k ) + R s ) > R m ), then continue from Equation 33), we have q µ d + ) qγ d + ) q µ d ) qγ d ) + qγ k ) + R s ) µ ) =q µ d ) qγ d ) + qγ k ) + R s ) R m ) q µ d ) qγ d ) 0, by the hypothesis. i.3) when q γ k ) + R s ) > R m ) and q µ k ) + R s )
6 6 R m ), then continue from Equation 34), we have q µ d + ) qγ d + ) q µ k ) qγ k ) + R m ) µ ) <q µ k ) qγ k ) + qγ k ) + R s ) µ ) =q µ k ) qγ k ) + qγ k ) + R s ) q µ k ) R s ) =0. i.4) when q γ k ) + R s ) > R m ) and q µ k ) + R s ) > R m ), then continue from Equation 33), we have q µ d + ) qγ d + ) q µ d ) qγ d ) + R m ) µ ) =q µ d ) qγ d ) + R m ) R m ) 0. hus, q µ d + ) qγ d + ) if R st) At). ii) If R st) > At), then µ ) = min{q µ d ) + A ), R m )}, γ ) min{q γ k ) + R s ), R m )}, ii.) when q µ d )+A ) R m ), we have µ ) = q µ d )+ A ), and q µ d + ) = 0 qγ d + ). ii.2) when q µ d ) + A ) > R m ), then q µ d + ) qγ d + ) q µ d ) qγ d ) + γ ) R m ) 0 + R m ) R m ) = 0. hus, q µ d + ) qγ d + ) if R st) > well.. NUMERICAL EXAMPLE At) as In this section we simulate our algorithms and numerically compare them with the optimal performance. In the simulation, the number of time slots is = 0 6. We use the utility function Ux) = log 2 +x) x 0. he main channel gain is uniformly distributed over [0, 45] and the eavesdropper channel gain is uniformly distributed over [0, 5]. We use rate power function R m = 0 log+g m P ) and R e = 0 log+g e P ) for each slot. he average power upper bound is and the peak power is 2. We also set the virtual key queue parameter ɛ = 0.0. As shown in Figure 2 a), the power controller achieves the optimal average secrecy rate R s = 28.3 as increasing. We first use an arrival process At), t 0, that is composed of independent Poisson random variables with mean 30 each slot. In this example, Ā > R s. We run the simulation for different values of the control coefficient and compare the results with the optimal value 2. Figure 2b) shows that, as increases, the average admission rate both with and without a key queue) also increases to the optimum, which is consistent with Equation 29). In Figure 2 c), one can observe that, as increases, the average utility of the transmission rate with 2 Note that the optimal value for Problem A) is upper bounded by U R s) and for Problem B) is min[ā, R s]. a key queue approaches the optimal value, which is consistent with Equation 24). For the case without a key queue, the average utility is smaller but not much in the Poisson arrival scenario. As a result, the delay performance with a key queue is also only a little better as we can see in Figure 2d) for Poisson arrivals. Average Secrecy Rate Average Utility of ransmission Rate Approximate Algorithm a) x c) x 0 6 Average Injection Rate Average Queue Length b) x Average Admission Rate d) Fig. 2. Performance Evaluation of PC, AC, and C with respect to the solutions of Problem A) and B) under Poisson Arrivals: a) Control Parameter vs. Average Secrecy Rate; b) Control Parameter vs. Average Admission Rate; c) Control Parameter vs. Average Utility of ransmission Rate; d) hroughput vs. Delay Curve Figure 3 illustrates the same scenario, with a more bursty arrival process. his time, At) = 0 w.p. 2 and At) = 50 w.p. 2 independently for each time slot. Consequently, Ā = 25 < R s. Similar observations to the previous case can be made with this arrival process, but the delay performance with a key queue is now much better than that without a key queue, for bursty arrivals. Furthermore, in this case, the arrivals are admissible, we also plotted the optimal delay curve in Figure 3 c) and d) given the output secrecy sample of the power controller. I. CONCLUSION In this paper, we considered a single-user secure data communication system and addressed two separate problems, in order to achieve optimal secrecy rate and admitted arrival rate, and small queueing delay, under an average power constraint. We proposed a transmission controller, a power controller and an admission controller based on simple index policies that do not rely on any prior statistical information on the data arrival process. We showed that our controller pair has a provably efficient performance. Also, we illustrated via simulations that the use of a key queue reduces the queuing delay for the
7 7 Average Utility of ransmission Rate Average Queue Length a) x Minimum Queue Length c) x 0 4 Average Injection Rate Average Queue Length b) x Minimum Queue Length Average Admission Rate d) Fig. 3. Performance Evaluation of C and AC for Problem A) and B) under ariable Arrivals data packets, while serving packets that are admitted at the maximum admissible rate. his is due to the fact that, the transmission controller is designed to choose the rate of served packets as uniformly over time as possible. When the arrival is admissible given sample path of secrecy rate, we provide a rate allocation policy that is sample path queueing delay optimal. REFERENCES [] A. D. Wyner, he Wire-ap Channel, he Bell System echnical Hournal, vol. 54, no. 8, pp , October 975. [2] P. K. Gopala, L. Lai, and H. El Gamal, On the secrecy capacity of fading channels, vol. 54, no. 0, pp , Oct [3] J. Barros and M. R. D. Rodrigues, Secrecy capacity of wireless channels, in Proc. IEEE Int. Symposium Inform. heory, Seattle, WA, July 2006, pp [4] D. Gunduz, R. Brown, and H.. Poor, Secret communication with feedback, in Proc. IEEE Intl. Symposium on Information heory and its Applications, Auckland, New Zealand, Dec [5] A. Khisti and G. W. Wornell, Secure transmission with multiple antennas: he MISOME wiretap channel, IEEE rans. Inform. heory, 2009, to appear. [6] Y. Liang, H.. Poor, and S. Shamai Shitz), Secure communication over fading channels, IEEE rans. Inform. heory, vol. 54, no. 6, pp , June [7] E. Ekrem and S. Ulukus, he secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel, Mar. 2009, submitted. [8] M. Yuksel, X. Liu, and E. Erkip, A secure communication game with a relay helping the eavesdropper, aormina, Italy, Oct. 2009, to appear. [9] O. O. Koyluoglu, C. E. Koksal, and H. E. Gamal, On secrecy capacity scaling in wireless networks, 200, submitted. [0], On the effect of colluding eavesdroppers on secrecy scaling, in Proceedings of European Wireless, EW, Lucca, Italy, 200. [] S. Goel,. Aggarwal, A. Yener, and A. R. Calderbank, Modeling location uncertainty for eavesdroppers: A secrecy graph approach, Austin, X, June 200. [2] S. asudevan, D. Goeckel, and D. F. owsley, Security-capacity tradeoff in large wireless networks using keyless secrecy, Chicago, IL, September 200. [3] A. Sarkar and M. Haenggi, Secrecy coverage, Pacific Grove, CA, Nov [4] C. E. Koksal and O. Ercetin, Control of wireless networks with secrecy, in Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, Nov [5] C. E. Koksal, O. Ercetin, and Y. Sarikaya, Control of wireless networks with secrecy, CoRR, vol. abs/0.3444, 20. [6] L. assiulas and A. Ephremides, Jointly optimal routing and scheduling in packet ratio networks, IEEE ransactions on Information heory, vol. 38, no., pp , Jan [7] X. Liu, E. K. P. Chong, and N. B. Shroff, A framework for opportunistic scheduling in wireless networks, Computer Networks, vol. 4, no. 4, pp , [8] X. Lin and N. B. Shroff, he Impact of Imperfect Scheduling on Cross-Layer Congestion Control in Wireless Networks, IEEE/ACM ransactions on Networking, vol. 4, no. 2, pp , April [9] A. Eryilmaz and R. Srikant, Joint Congestion Control, Routing and MAC for Stability and Fairness in Wireless Networks, IEEE Journal on Selected Areas in Communications, vol. 24, pp , August [20] M. J. Neely, Energy Control for ime arying Wireless Networks, IEEE ransactions on Information heory, vol. 52, no. 7, pp , July [2] K. Khalil, M. Youssef, O. O. Koyluoglu, and H. El Gamal, On the delay limited secrecy capacity of fading channels, Seoul, Korea, June - July [22] O. Gungor, J. an, C. E. Koksal, H. El Gamal, and N. B. Shroff, Joint power and secret key queue management for delay limited secure communication, San Diego, CA, March 200. [23] Z. Mao, C. E. Koksal, and N. B. Shroff, owards Achieving Full Secrecy Rate in Wireless Networks: A Control heoretic Approach, San Diego, CA, IA 20. [24], Near Power and Rate Control of Multi-hop Sensor Networks with Energy Replenishment: Basic Limitations with Finite Energy and Data Storage, in IEEE ransactions on Automatic Control, accepted. A. Proof of heorem APPENDIX Proof of Equation 27): Equation 27) directly follows from the following lemma: Lemma 2: Under algorithm AC, C and PC, we have q d t) β 2, q kt) β 2, q pt) 2. Proof: Since U ) is concave on R + {0}, we have Uµt)) U0)+βµt), t 0, where 0 β = U 0) <. hen, 2 Uµt)) q kt)µt) 2 U0) + β 2 µt) q kt)µt) where µt) is the solution of C. β If 2 µt) q kt)µt) < 0, then we get 2 Uµt)) q k t)µt) < 2 U0). However, C chooses µt) that maximizes 2 Uµt)) q kt)µt) which means 2 Uµt)) q k t)µt) 2 U0) since 0 Πt). hen, we must have β 2 µt) q kt)µt) 0, i.e., q k t)µt) β µt). 35) 2 We now prove the result by induction. Without loss of generality, let q k 0) β 2. Suppose for all t, q kt ) β 2 holds. In slot t, if µt) = 0, then q k t) q k t ) β 2 by Equation 7). Otherwise, µt) 0, and by Equation 35), we have q k t) β 2. q d t) β 2 can be obtained using the same argument.
8 8 Since )) + + P t)hm t) log + P t)h e t) + P t) h m t) h e t) ) )) + = log + P t)h e t) log + P t) hm t) h e t) )) + + P t)h e t) = log + P t) hm t) h e t) ) + P t)h e t) P t) hm t) h e t), t 0. + P t)h e t) Similarly, we have q p t) h m t) h M <, where h M = max t 0 h m t). Proof of Equation 24): We define the Lyapunov function L q k t)) = q k t)) 2, and q k t)) = L q k t+)) L q k t)). From Equation 7), we have qk t + ) ) 2 qk t) ɛ ) 2 + µt) Rs t) + o t) ) qt) ɛ ) + µt) Rs t) + o t) ) then = q k t)) q k t) ) 2 + ɛ R max ) 2 + 2ɛRmax + 2 q k t) o t) + 2 q k t)µt) 2 q k t)r s t), Uµt)) Uµt)) + ɛ R max ) 2 + 2ɛRmax + 2 q k t) o t) + 2 q k t)µt) 2 q k t)r s t) Uµt)) + ɛ 2 + ) 2 + R max + 2ɛRmax + β o t) [ ] 2 2 Uµt)) q kt)µt) 2 q k t)r s t). It is apparent that C is trying to maximize the value of the term [ 2 Uµt)) q kt)µt) ]. Since the optimal solution for Problem A) may not be unique, we let U be the optimal solution set and µ U be any optimal solution, for Problem A) given any sample path. Since the constraint set Πt) is queue dynamic related, it is possible that µ t) / Πt). [ Lemma 3: In slot t, if by solving C, we get 2 Uµt)) q kt)µt) ] [ < 2 Uµ t)) q k t)µ t) ], then µt) < µ t) and o t ) = for some t t and t t <. Proof: he proof is given in [23] as well. Let N = max{n : for any t 0, R s τ) = 0, τ [t, t + n]}. By using Lemma 3 and µt), µ t) R m t) R max, t 0, we have N < and Lemma 4: lim sup lim sup q k t)[µ t) R s t)] O ), q p t)[p t) P avg ] O ). Proof: he proof is similar as in [23]. Lemma 5: If q k t) β 2, then q kt) <. Proof: he proof is given in [23] as well. Lemma 6: If both the key queue q k t) and virtual key queue q k t) are strongly stable, i.e., lim sup qk t) + q k t) ) <, then lim sup ot) ɛ. If the virtual power queue q p t) is strongly stable, then lim sup P t) P avg. Proof: he proof is similar as in [23]. By summing from 0 to, dividing by and, taking over Equation 36), combined with Lemma 2, Lemma 5, Lemma 6, and Lemma 4, we get Uµt)) ɛnur max ) + β). Uµ t)) O ) By letting ɛ 0, we obtain Equation 24). Proof of Equation 26): Equation 26) follows from Lemma 2 and Lemma 6. Proof of Equation 25): We define L q p t)) = q p t)) 2, and q p t)) = L q p t+)) L q p t)). Both P t) and P t) are within [0, P peak ], by Equation 9), we have = q p t)) R s t) 2 [ )) + + P t)hm t) log q p t)p t)] 2 + P t)h e t) 2 q p t)p avg + P 2 avg + P 2 peak R s P t) ) Rs P t) ) + 2 q p t)p t) 2 q p t)p avg + P 2 avg + P 2 peak. By summing from 0 to, dividing by and, taking over both sides, combined with Lemma 4, we get R s P t)) R s P t)) O ). Proof of Equation 28) and Equation 29): he proof is given in [23] as well. Uµt)) Uµ t)) + ɛ 2 + ) 2 + R max + 2ɛRmax [ ] + 2 q k t) µ t) R s t) + β + NUR max )) o t). 36)
Towards Achieving Full Secrecy Rate in Wireless Networks: A Control Theoretic Approach
owards Achieving Full Secrecy Rate in Wireless Networks: A Control heoretic Approach Zhoujia Mao Department of ECE he Ohio State University maoz@ece.osu.edu Can Emre Koksal Department of ECE he Ohio State
More informationAchieving Full Secrecy Rate with Low Packet Delays: An Optimal Control Approach
Achieving Full Secrecy Rate with Low Packet Delays: An Optimal Control Approach Zhoujia Mao, C. Emre Koksal, Ness B. Shroff E-mail: maoz@ece.osu.edu, koksal@ece.osu.edu, shroff@ece.osu.edu Abstract We
More informationResource Allocation in Sensor Networks with Renewable Energy
Resource Allocation in Sensor Networks with Renewable Energy (Invited Paper) Zhoujia Mao Department of ECE he Ohio State University maoz@ece.osu.edu Can Emre Koksal Department of ECE he Ohio State University
More informationAchieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel
Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Shahid Mehraj Shah and Vinod Sharma Department of Electrical Communication Engineering, Indian Institute of
More informationThroughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting
Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210
More informationSecure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel
Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu
More informationOnline Scheduling for Energy Harvesting Broadcast Channels with Finite Battery
Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,
More informationInformation Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels
1 Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels Invited Paper Ali ParandehGheibi, Muriel Médard, Asuman Ozdaglar, and Atilla Eryilmaz arxiv:0810.167v1 cs.it
More informationEnergy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California
Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely Part 1: A single wireless downlink (L links) L 2 1 S={Totally
More informationOn the Energy-Delay Trade-off of a Two-Way Relay Network
On the Energy-Delay Trade-off of a To-Way Relay Netork Xiang He Aylin Yener Wireless Communications and Netorking Laboratory Electrical Engineering Department The Pennsylvania State University University
More informationChannel Allocation Using Pricing in Satellite Networks
Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract
More informationEnergy Harvesting Multiple Access Channel with Peak Temperature Constraints
Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,
More informationA POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation
A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New
More informationDynamic User Association and Energy Control in Cellular Networks with Renewable Resources
Dynamic User Association and Energy Control in Cellular Networks with Renewable Resources Yang Yang, Jiashang Liu, Prasun Sinha and Ness B. Shroff Abstract In recent years, there has been a growing interest
More informationSum-Rate Capacity of Poisson MIMO Multiple-Access Channels
1 Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels Ain-ul-Aisha, Lifeng Lai, Yingbin Liang and Shlomo Shamai (Shitz Abstract In this paper, we analyze the sum-rate capacity of two-user Poisson
More informationExploring the Tradeoff between Waiting Time and Service Cost in Non-Asymptotic Operating Regimes
Exploring the radeoff between Waiting ime and Service Cost in Non-Asymptotic Operating Regimes Bin Li, Ozgur Dalkilic and Atilla Eryilmaz Abstract Motivated by the problem of demand management in smart
More informationDynamic Power Allocation and Routing for Time Varying Wireless Networks
Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,
More informationQueue Proportional Scheduling in Gaussian Broadcast Channels
Queue Proportional Scheduling in Gaussian Broadcast Channels Kibeom Seong Dept. of Electrical Engineering Stanford University Stanford, CA 9435 USA Email: kseong@stanford.edu Ravi Narasimhan Dept. of Electrical
More informationOptimal Power Control in Decentralized Gaussian Multiple Access Channels
1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017
More information4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016
4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016 Online Power Control Optimization for Wireless Transmission With Energy Harvesting and Storage Fatemeh Amirnavaei, Student Member,
More informationOptimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information
SUBMIED O IEEE INERNAIONAL SYMPOSIUM ON INFORMAION HEORY, DE. 23 1 Optimal Power Allocation for Parallel Gaussian Broadcast hannels with Independent and ommon Information Nihar Jindal and Andrea Goldsmith
More informationInformation in Aloha Networks
Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha
More informationOptimal power-delay trade-offs in fading channels: small delay asymptotics
Optimal power-delay trade-offs in fading channels: small delay asymptotics Randall A. Berry Dept. of EECS, Northwestern University 45 Sheridan Rd., Evanston IL 6008 Email: rberry@ece.northwestern.edu Abstract
More informationOn the Secrecy Capacity of Fading Channels
On the Secrecy Capacity of Fading Channels arxiv:cs/63v [cs.it] 7 Oct 26 Praveen Kumar Gopala, Lifeng Lai and Hesham El Gamal Department of Electrical and Computer Engineering The Ohio State University
More informationPower Aware Wireless File Downloading: A Lyapunov Indexing Approach to A Constrained Restless Bandit Problem
IEEE/ACM RANSACIONS ON NEWORKING, VOL. 24, NO. 4, PP. 2264-2277, AUG. 206 Power Aware Wireless File Downloading: A Lyapunov Indexing Approach to A Constrained Restless Bandit Problem Xiaohan Wei and Michael
More informationCapacity of the Discrete Memoryless Energy Harvesting Channel with Side Information
204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener
More informationrequests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1
Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet
More informationTRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS
The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,
More informationMorning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland
Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable
More informationOptimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters
Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Alkan Soysal Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland,
More informationRessource Allocation Schemes for D2D Communications
1 / 24 Ressource Allocation Schemes for D2D Communications Mohamad Assaad Laboratoire des Signaux et Systèmes (L2S), CentraleSupélec, Gif sur Yvette, France. Indo-french Workshop on D2D Communications
More informationFairness and Optimal Stochastic Control for Heterogeneous Networks
λ 91 λ 93 Fairness and Optimal Stochastic Control for Heterogeneous Networks sensor network wired network wireless 9 8 7 6 5 λ 48 λ 42 4 3 0 1 2 λ n R n U n Michael J. Neely (USC) Eytan Modiano (MIT) Chih-Ping
More informationOptimizing Queueing Cost and Energy Efficiency in a Wireless Network
Optimizing Queueing Cost and Energy Efficiency in a Wireless Network Antonis Dimakis Department of Informatics Athens University of Economics and Business Patission 76, Athens 1434, Greece Email: dimakis@aueb.gr
More informationA Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying
A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,
More informationBroadcasting with a Battery Limited Energy Harvesting Rechargeable Transmitter
roadcasting with a attery Limited Energy Harvesting Rechargeable Transmitter Omur Ozel, Jing Yang 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland, College
More informationCooperative Energy Harvesting Communications with Relaying and Energy Sharing
Cooperative Energy Harvesting Communications with Relaying and Energy Sharing Kaya Tutuncuoglu and Aylin Yener Department of Electrical Engineering The Pennsylvania State University, University Park, PA
More informationFair Scheduling in Input-Queued Switches under Inadmissible Traffic
Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Neha Kumar, Rong Pan, Devavrat Shah Departments of EE & CS Stanford University {nehak, rong, devavrat@stanford.edu Abstract In recent
More informationNode-based Distributed Optimal Control of Wireless Networks
Node-based Distributed Optimal Control of Wireless Networks CISS March 2006 Edmund M. Yeh Department of Electrical Engineering Yale University Joint work with Yufang Xi Main Results Unified framework for
More informationOnline Power Control Optimization for Wireless Transmission with Energy Harvesting and Storage
Online Power Control Optimization for Wireless Transmission with Energy Harvesting and Storage Fatemeh Amirnavaei, Student Member, IEEE and Min Dong, Senior Member, IEEE arxiv:606.046v2 [cs.it] 26 Feb
More informationUnderstanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks
Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo, Xiaojun Lin, and Ness B. Shroff Abstract In this paper, we characterize the performance
More informationEE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing
EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a
More informationNode-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance
Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance Yu Sang, Gagan R. Gupta, and Bo Ji Member, IEEE arxiv:52.02328v2 [cs.ni] 8 Nov 207 Abstract This
More informationOn queueing in coded networks queue size follows degrees of freedom
On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,
More informationABSTRACT CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS. Title of dissertation: Anthony A. Fanous, Doctor of Philosophy, 2013
ABSTRACT Title of dissertation: CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS Anthony A. Fanous, Doctor of Philosophy, 2013 Dissertation directed by: Professor Anthony Ephremides Department of Electrical
More informationOptimum Transmission Policies for Battery Limited Energy Harvesting Nodes
Optimum Transmission Policies for Battery Limited Energy Harvesting Nodes Kaya Tutuncuoglu Aylin Yener Wireless Communications and Networking Laboratory (WCAN) Electrical Engineering Department The Pennsylvania
More informationOptimal Sensing and Transmission in Energy Harvesting Sensor Networks
University of Arkansas, Fayetteville ScholarWorks@UARK Theses and Dissertations 2-206 Optimal Sensing and Transmission in Energy Harvesting Sensor Networks Xianwen Wu University of Arkansas, Fayetteville
More informationAn Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 4, APRIL 2012 2427 An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel Ersen Ekrem, Student Member, IEEE,
More informationDelay-Based Back-Pressure Scheduling in. Multihop Wireless Networks
Delay-Based Back-Pressure Scheduling in Multihop Wireless Networks Bo Ji, Student Member, IEEE, Changhee Joo, Member, IEEE, and Ness B. Shroff, Fellow, IEEE arxiv:0.5674v3 [cs.ni] 7 Nov 202 Abstract Scheduling
More informationOn Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networks
On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networs V.J. Venataramanan and Xiaojun Lin School of ECE Purdue University Email: {vvenat,linx}@purdue.edu Lei Ying Department
More informationOn the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise
On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise Ya-Lan Liang, Yung-Shun Wang, Tsung-Hui Chang, Y.-W. Peter Hong, and Chong-Yung Chi Institute of Communications
More informationUtility-Maximizing Scheduling for Stochastic Processing Networks
Utility-Maximizing Scheduling for Stochastic Processing Networks Libin Jiang and Jean Walrand EECS Department, University of California at Berkeley {ljiang,wlr}@eecs.berkeley.edu Abstract Stochastic Processing
More informationAny Work-conserving Policy Stabilizes the Ring with Spatial Reuse
Any Work-conserving Policy Stabilizes the Ring with Spatial Reuse L. assiulas y Dept. of Electrical Engineering Polytechnic University Brooklyn, NY 20 leandros@olympos.poly.edu L. Georgiadis IBM. J. Watson
More informationWireless Transmission with Energy Harvesting and Storage. Fatemeh Amirnavaei
Wireless Transmission with Energy Harvesting and Storage by Fatemeh Amirnavaei A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in The Faculty of Engineering
More informationFading Wiretap Channel with No CSI Anywhere
Fading Wiretap Channel with No CSI Anywhere Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 7 pritamm@umd.edu ulukus@umd.edu Abstract
More informationBacklog Optimal Downlink Scheduling in Energy Harvesting Base Station in a Cellular Network
MTech Dissertation Backlog Optimal Downlink Scheduling in Energy Harvesting Base Station in a Cellular Network Submitted in partial fulfillment of the requirements for the degree of Master of Technology
More informationOptimal Sampling of Random Processes under Stochastic Energy Constraints
Globecom 24 - Signal Processing for Communications Symposium Optimal Sampling of Random Processes under Stochastic Energy Constraints Jing Yang and Jingxian Wu Department of Electrical Engineering, University
More informationContinuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks
Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer
More informationLow-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. XX, XXXXXXX X Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks Longbi Lin, Xiaojun Lin, Member, IEEE, and Ness B. Shroff,
More informationUnderstanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks
Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo Departments of ECE and CSE The Ohio State University Email: cjoo@ece.osu.edu Xiaojun
More informationOn the Secrecy Capacity of the Z-Interference Channel
On the Secrecy Capacity of the Z-Interference Channel Ronit Bustin Tel Aviv University Email: ronitbustin@post.tau.ac.il Mojtaba Vaezi Princeton University Email: mvaezi@princeton.edu Rafael F. Schaefer
More informationThe Poisson Channel with Side Information
The Poisson Channel with Side Information Shraga Bross School of Enginerring Bar-Ilan University, Israel brosss@macs.biu.ac.il Amos Lapidoth Ligong Wang Signal and Information Processing Laboratory ETH
More informationCooperative Communication with Feedback via Stochastic Approximation
Cooperative Communication with Feedback via Stochastic Approximation Utsaw Kumar J Nicholas Laneman and Vijay Gupta Department of Electrical Engineering University of Notre Dame Email: {ukumar jnl vgupta}@ndedu
More informationEnergy-Efficient Scheduling with Individual Delay Constraints over a Fading Channel
Energy-Efficient Scheduling with Individual Delay Constraints over a Fading Channel Wanshi Chen Qualcomm Inc. San Diego, CA 92121 wanshic@qualcomm.com Urbashi Mitra and Michael J. Neely Dept. of Electrical
More informationInequality Comparisons and Traffic Smoothing in Multi-Stage ATM Multiplexers
IEEE Proceedings of the International Conference on Communications, 2000 Inequality Comparisons and raffic Smoothing in Multi-Stage AM Multiplexers Michael J. Neely MI -- LIDS mjneely@mit.edu Abstract
More informationSpectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy
Spectrum Leasing via Cooperation for Enhanced 1 Physical-Layer Secrecy Keonkook Lee, Member, IEEE, Chan-Byoung Chae, Senior Member, IEEE, Joonhyuk Kang, Member, IEEE arxiv:1205.0085v1 [cs.it] 1 May 2012
More informationCapacity and Delay Tradeoffs for Ad-Hoc Mobile Networks
IEEE TRASACTIOS O IFORMATIO THEORY 1 Capacity and Delay Tradeoffs for Ad-Hoc Mobile etworks Michael J. eely University of Southern California mjneely@usc.edu http://www-rcf.usc.edu/ mjneely Eytan Modiano
More informationMIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper
MIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper Xiang He, Ashish Khisti, Aylin Yener Dept. of Electrical and Computer Engineering, University of Toronto, Toronto, ON, M5S 3G4, Canada
More informationThroughput-optimal Scheduling in Multi-hop Wireless Networks without Per-flow Information
Throughput-optimal Scheduling in Multi-hop Wireless Networks without Per-flow Information Bo Ji, Student Member, IEEE, Changhee Joo, Member, IEEE, and Ness B. Shroff, Fellow, IEEE Abstract In this paper,
More informationThe Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems
The Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems Jie Yang and D.R. Brown III Worcester Polytechnic Institute Department
More informationOn the Fundamental Limits of Multi-user Scheduling under Short-term Fairness Constraints
1 On the Fundamental Limits of Multi-user Scheduling under Short-term Fairness Constraints arxiv:1901.07719v1 [cs.it] 23 Jan 2019 Shahram Shahsavari, Farhad Shirani and Elza Erkip Dept. of Electrical and
More informationStochastic Optimization for Undergraduate Computer Science Students
Stochastic Optimization for Undergraduate Computer Science Students Professor Joongheon Kim School of Computer Science and Engineering, Chung-Ang University, Seoul, Republic of Korea 1 Reference 2 Outline
More informationSTABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS
The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung
More informationA Simple Memoryless Proof of the Capacity of the Exponential Server Timing Channel
A Simple Memoryless Proof of the Capacity of the Exponential Server iming Channel odd P. Coleman ECE Department Coordinated Science Laboratory University of Illinois colemant@illinois.edu Abstract his
More informationEquivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues
Proceedings of the 38th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2000. Equivalent Models and Analysis for Multi-Stage ree Networks of Deterministic Service ime Queues Michael
More informationCrowdsourcing in Cyber-Physical Systems: Stochastic Optimization with Strong Stability
Received 1 April 2013; revised 25 May 2013; accepted 29 June 2013. Date of publication 15 July 2013; date of current version 21 January 2014. Digital Object Identifier 10.1109/EC.2013.2273358 Crowdsourcing
More informationAmr Rizk TU Darmstadt
Saving Resources on Wireless Uplinks: Models of Queue-aware Scheduling 1 Amr Rizk TU Darmstadt - joint work with Markus Fidler 6. April 2016 KOM TUD Amr Rizk 1 Cellular Uplink Scheduling freq. time 6.
More informationLearning Algorithms for Minimizing Queue Length Regret
Learning Algorithms for Minimizing Queue Length Regret Thomas Stahlbuhk Massachusetts Institute of Technology Cambridge, MA Brooke Shrader MIT Lincoln Laboratory Lexington, MA Eytan Modiano Massachusetts
More informationOn the Throughput of Proportional Fair Scheduling with Opportunistic Beamforming for Continuous Fading States
On the hroughput of Proportional Fair Scheduling with Opportunistic Beamforming for Continuous Fading States Andreas Senst, Peter Schulz-Rittich, Gerd Ascheid, and Heinrich Meyr Institute for Integrated
More informationIntegrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks
VANET Analysis Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks Tom Hao Luan, Xuemin (Sherman) Shen, and Fan Bai BBCR, ECE, University of Waterloo, Waterloo, Ontario, N2L 3G1,
More informationSum Capacity of General Deterministic Interference Channel with Channel Output Feedback
Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback Achaleshwar Sahai Department of ECE, Rice University, Houston, TX 775. as27@rice.edu Vaneet Aggarwal Department of
More informationChannel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting
1 Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting Dusit Niyato 1, Ping Wang 1, and Dong In Kim 2 1 School of Computer Engineering, Nanyang Technological University
More informationQueueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "
Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals
More informationLattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm
Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm HongSun An Student Member IEEE he Graduate School of I & Incheon Korea ahs3179@gmail.com Manar Mohaisen Student Member IEEE
More informationDEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE
DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE Daohua Zhu, A. Lee Swindlehurst, S. Ali A. Fakoorian, Wei Xu, Chunming Zhao National Mobile Communications Research Lab, Southeast
More informationExploiting Partial Channel State Information for Secrecy over Wireless Channels
Exploiting Partial Channel State Information for Secrecy over Wireless Channels Matthieu R. Bloch and J. Nicholas Laneman Abstract In this paper, we investigate the effect of partial channel state information
More informationQuiz 1 EE 549 Wednesday, Feb. 27, 2008
UNIVERSITY OF SOUTHERN CALIFORNIA, SPRING 2008 1 Quiz 1 EE 549 Wednesday, Feb. 27, 2008 INSTRUCTIONS This quiz lasts for 85 minutes. This quiz is closed book and closed notes. No Calculators or laptops
More informationRandomized Algorithms for Throughput-Optimality and Fairness in Wireless Networks
Proceedings o the 45th IEEE Conerence on Decision & Control Manchester Grand Hyatt Hotel San Diego, CA, USA, December 13-15, 2006 Randomized Algorithms or hroughput-optimality and Fairness in Wireless
More informationAge-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges
Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges Ahmed Arafa, Jing Yang 2, Sennur Ulukus 3, and H. Vincent Poor Electrical Engineering Department, Princeton
More informationOFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback. Prof. Phil Schniter
OFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback Prof. Phil Schniter T. H. E OHIO STATE UNIVERSITY Joint work with Mr. Rohit Aggarwal, Dr. Mohamad Assaad, Dr. C. Emre Koksal September
More informationUnderstanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks
1 Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo, Member, IEEE, Xiaojun Lin, Member, IEEE, and Ness B. Shroff, Fellow, IEEE Abstract
More informationUsing Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor
Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor Ahmed Arafa, Jing Yang, Sennur Ulukus 3, and H. Vincent Poor Electrical Engineering Department, Princeton University School
More informationJob Scheduling and Multiple Access. Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley)
Job Scheduling and Multiple Access Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley) 1 Multiple Access Setting Characteristics of Multiple Access: Bursty Arrivals Uncoordinated Transmitters Interference
More informationPower Allocation and Coverage for a Relay-Assisted Downlink with Voice Users
Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,
More informationEnergy Cooperation and Traffic Management in Cellular Networks with Renewable Energy
Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy Hyun-Suk Lee Dept. of Electrical and Electronic Eng., Yonsei University, Seoul, Korea Jang-Won Lee Dept. of Electrical
More informationCooperative HARQ with Poisson Interference and Opportunistic Routing
Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline
More informationJoint Source-Channel Coding for the Multiple-Access Relay Channel
Joint Source-Channel Coding for the Multiple-Access Relay Channel Yonathan Murin, Ron Dabora Department of Electrical and Computer Engineering Ben-Gurion University, Israel Email: moriny@bgu.ac.il, ron@ee.bgu.ac.il
More informationDelay QoS Provisioning and Optimal Resource Allocation for Wireless Networks
Syracuse University SURFACE Dissertations - ALL SURFACE June 2017 Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Yi Li Syracuse University Follow this and additional works
More informationQuality of Information Aware Scheduling in Task Processing Networks
Resource Allocation on Wireless Networks and Wireless Networks - Communication, Cooperation and Competition Quality of Information Aware Scheduling in Task Processing Networks Rahul Urgaonkar, Ertugrul
More informationResource Allocation for Video Streaming in Wireless Environment
Resource Allocation for Video Streaming in Wireless Environment Shahrokh Valaee and Jean-Charles Gregoire Abstract This paper focuses on the development of a new resource allocation scheme for video streaming
More informationQueue length analysis for multicast: Limits of performance and achievable queue length with random linear coding
Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding The MIT Faculty has made this article openly available Please share how this access benefits
More information