Towards Achieving Full Secrecy Rate and Low Delays in Wireless Networks

Size: px
Start display at page:

Download "Towards Achieving Full Secrecy Rate and Low Delays in Wireless Networks"

Transcription

1 owards Achieving Full Secrecy Rate and Low Delays in Wireless Networks Zhoujia Mao Department of ECE he Ohio State University Can Emre Koksal Department of ECE he Ohio State University Ness B. Shroff Departments of ECE and CSE he Ohio State University Abstract In this paper, we consider a single-user secure data communication system. Data packets arriving at the transmitter are enqueued at a data queue to be transmitted to the receiver over a block fading channel, securely from an eavesdropper that listens to the transmitter over another independent block fading channel. Part of the data is secured by the available secrecy rate while the other part is encrypted by the key bits, enqueued at both the transmitter and the receiver. We first address two separate problems in this paper: with an average power constraint, given any sample path of arrivals, how to admit the arrivals and allocate power such that the long term average secrecy rate is maximized and the maximum admission rate is achieved while the data queue is kept stable; with infinite queue backlog, given any sample path of secrecy rate, how to control the data transmission rate and key generation such that a smooth transmission rate and then a small queueing delay are achieved. We propose a power controller, transmission controller and an admission controller based on simple index policies that do not rely on any prior statistical information on the data arrival process and channel conditions. We show that our controllers has a provably efficient performance and solve the above two problems simultaneously. Furthermore, for any given secrecy rate sample path and correspondingly admissible arrival, we provide a rate allocation policy which is sample path queueing delay optimal. I. INRODUCION Motivated by the seminal paper by [], there has been a large number of investigations e.g., [2] [8]) on wireless information theoretic secrecy. hese studies have significantly enhanced our understanding of the basic limits and principles of the design and the analysis of secure wireless communication systems. Despite the significant progress in information theoretic secrecy, most of the work has focused on physical layer techniques. he application of wireless information theoretic secrecy remains mainly unresolved as it relates to the design of wireless networks and its impact on network control and protocol development. Indeed, our understanding of the interplay between the secrecy requirements and the critical functionalities of wireless networks, such as scheduling, routing, and congestion control remains very limited. o that end, there have been some recent efforts to utilize the insights drawn from the aforementioned investigations on information theoretic secrecy to build secure wireless networks. In [9] [3] the fundamental capacity and connectivity scaling laws of wireless networks with secrecy have been addressed. In [4], [5], single hop uplink scenario has been considered in which nodes enqueue arriving private and open data packets to be transmitted to a base station over block fading channels. A node is scheduled to transmit information privately from the other nodes and rate is controlled carefully to maximize an overall utility. he solution provided follows up on the stochastic network optimization framework e.g., as treated in [6] [20]) and generalizes the uplink scenario to incorporate secrecy as a quality of service requirement. In a separate direction [2] proposed the idea of the use of a key queue in a single user system. here, a key queue is kept at the transmitter and the receiver, separately from the data queues. Instead of using the entire instantaneous secrecy rate for information transmission at all times, some of it is utilized to transmit key bits, generated randomly at the transmitter. hese stored key bits are used later to secure information bits in such a way that, even when the instantaneous secrecy rate is 0, information bits can still be transmitted to the destination securely from the eavesdropper. Hence, the idea of key sharing allows one to bank secrecy rates at certain times to be utilized at other times. It is shown in [22] that, using this idea, a long-term constant secrecy rate, identical to the secrecy capacity expected instantaneous secrecy rate) of the channel is achievable. In this paper, we address the single user setting in the presence of arrival of data packets being enqueued at a data queue to be transmitted to the receiver over a block fading channel, securely from an eavesdropper that listens to the transmitter over another independent block fading channel. We consider two separate problems, which involve the maximization of the long term average secrecy rate and admitted arrival rate while keeping data queue stable under an average power constraint, and maximization of a long-term average utility, defined as a function of the number of secure packets transmitted in each time slot. While, one would be inclined to exploit the entire secrecy rate for data transmission in each time slot in a greedy fashion, we show that this approach leads to a performance loss. Instead, the use of a key queue leads to a smoother secrecy rate, which in turn maximizes a concave utility, since it is negatively affected by the second order factors caused by the variability of the service. We propose a controller, which chooses the key generation and transmission) rate along with the secure data transmission rate in each time slot using a transmission control component. he power control

2 2 q k t) data queue µt) q d t) R k t) q k t) µ k t) µ k t) + R m t) xmit µ t) µ k t) Fig.. shared key queues System model t) R e recv R k t) µ k t) eavesdrop component allocates the power such that the secrecy rate is maximized under the average power constraint. he admission control component chooses the amount of data admitted by the transmitter to be enqueued in the data queue such that the admission rate approaches the maximum secrecy rate. hese three components are based on simple index policies that do not rely on any prior statistical information on the data arrival process. We show that our controller achieves a utility, arbitrarily close to the optimal utility. Also, we illustrate via simulations that the use of key queue reduces the queuing delay for the data packets, while serving packets that are admitted at the maximum admissible rate. For any given secrecy sample path and correspondingly admissible arrival, we also provide a rate control policy which is sample path queueing delay optimal. II. SYSEM MODEL We consider a single-user system illustrated in Fig., in which the transmitter enqueues data packets that wait to be transmitted to the receiver over the main channel at a variable power, securely from an eavesdropper, overhearing the transmission over a separate channel. ime is slotted, and the timevarying channel state of the main and the eavesdropper channel follow general processes h m = {h m 0), h m ),..., h m ),...} and h e = {h e 0), h e ),..., h e ),...}, respectively. In this paper, we assume perfect knowledge of these channel states at the transmitter. With the transmission power vector P = {P 0), P ),..., P ),...}, the instantaneous rate of the receiver and eavesdropper at slot t are R m t) = log + P t)h m t) ) and R e t) = log + P t)h e t) ), respectively. We also assume the time slots are long enough and as shown in [], the achievable instantaneous secrecy rate at a given slot t is identical to R s t) = R m t) R e t) ) +, t 0, where ) + = max[, 0]. In a given time slot, this rate is fully utilized: part of it is used to secure data from the data queue and the remaining part is used to transmit randomly generated key bits to be stored at the both key queues at the transmitter and the receiver. he size of the data and the key buffers are infinite. As shown in Fig., the amount of secure data transmitted at a time t is µt). A part µ k t) bits) of this data is secured using µ k t) key bits by a simple bit-by-bit XOR operation. he remaining µt) µ k t) bits is secured using the available secrecy rate R s t). Since the secrecy rate is fully utilized, the portion of the secrecy rate, not used to secure data is used to generate R k t) key bits. he data arrivals to the system is represented by the arrival process {At)}. he data queue state is denoted by q d t). he Lindley equation that models the state evolution of the key queue is: q k t + ) = q k t) + R k t) µ k t). he following lemma in [23] provides an equivalent model with the constraints that specify the relationships between the parameters. Lemma : he key queue q k can be modeled with the state evolution equation q k t + ) = q k t) + R s t) µt) with the constraints 0 µt) min[q k t) + R s t), R m t)], 0 µ k t) min[µt), R e t)], and µt) µ k t) ) + R k t) = R s t). III. PROBLEM FORMULAION We aim to design an efficient algorithm to control the power and rate allocation such that the throughput of the system is maximized with small queueing delay, under an average power constraint. o achieve this, we first consider two separate problems. In our first problem, we assume an infinitely backlogged data queue, i.e., q d 0) =. he objective is to maximize the long-term average utility, which is a function of the transmission rate given any sample path of secrecy rate. Our control parameters are the amount of used key bits µ k t), the amount of served data bits µt), and the amount of generated key bits R k t). In particular, we have: A) max U µt) ) µ, µ k, R k s.t. q k t + ) = q k t) + R s t) µt), ) 0 µt) min [ q k t) + R s t), R m t) ], 2) 0 µ k t) min [ µt), R e t) ], 3) µt) µk t) ) + R k t) = R s t), 4) where the utility function U ) is assumed to be monotonically increasing, reversible and differentiable on the half real line R + {0}. Note that if there were no key queue, then we would have q k t) = 0, µt) = R s t), µ k t) = 0, R k t) = 0, t 0. Also note that, the maximum achievable average secrecy rate is upper bounded by the average secrecy capacity R s = R st). In our second problem, we assume a general data arrival process, {At)} at the input of the data queue. At time t, only a portion Rt) of all arrivals are admitted into the data queue in order to keep the data queue stable. All the admitted packets are required to be served by the system eventually. In the second problem, our objective is maximize the long-term

3 3 average admitted data rate under an average power constraint. B) max Rt) R, µ, µ k, R k, P s.t. q d t + ) = q d t) µt) ) + + Rt), 5) q k t + ) = q k t) + R s t) µt), 6) 0 Rt) At), 7) 0 µt) min [ q k t) + R s t), R m t) ], 8) lim sup q d t) <, 9) 0 µ k t) min [ µt), R e t) ], 0) µt) µk t) ) + R k t) = R s t), ) R s t) = R m t) R e t) ) +, 2) R m t) = log + P t)h m t) ), 3) R e t) = log + P t)h e t) ), 4) lim sup P t) P avg, 5) 0 P t) P peak. 6) Note that, the maximum achievable average secrecy rate, which happens to be the objective function here, is upper bounded by the average secrecy capacity R s. By controlling the power allocation, we can first maximize the long term average secrecy rate. hen, by using an independent admission controller, we maximize the average admission rate that is bounded by the maximum secrecy rate. Further, as we shall show, R s can be achieved even without a key queue. However, we will also illustrate that our solutions that involve the use of the key queue lead to smaller queueing delays, compared to the one without the key queue. In these three problems, constraint 5) describes the data queue evolution, and constraints ) and 6) describe the key queue evolution. Constraint 7) bounds the actual amount of sensed data Rt) by the available amount of data At) at time t. Constraints 2) and 8) state that the amount of transmitted data is bounded by both the main channel rate and the amount of keys available. Constraint 9) guarantees data queue stability. Constraints 3) and 0) state that the amount of key bits used to secure data is bounded by the eavesdropper channel rate and does not exceed the amount of transmitted data. Constraints 4) and ) mean that the secure capacity is fully utilized by the transmission of secure data and key bits. Constraints 2), 3) and 4) are definitions of instantaneous secrecy rate R s t), rate of receiver R m t) and eavesdropper R e t). Constraint 5) is the average power constraint and constraint 6) is the peak power constraint. irtual Queues: In order to have a fair rate allocation, we do not want the key queue to be drained frequently, which would lead to outages whenever R s t) = 0. We define q k as the virtual key queue and try to avoid key outage by making the virtual key queue stable similar ideas of utilizing virtual queue are used in [20], [24]. he virtual queue evolves according to the following equation: q k t + ) = q k t) ɛ) + + µt) R s t) + o t) ) +, 7) where ɛ > 0 can be chosen arbitrarily, and o t) = key queue hits zero state from higher states in slot t { 0 if µt) = 0 or µt) < qk t) + R = s t) otherwise 8) is the indicator that the key queue is drained in slot t. Without loss of generality, the initial state q k 0) can be set to be zero. Similarly, we define the following virtual power queue to avoid the average power constraint being violated: q p t + ) = q p t) P avg ) + + P t). 9) I. CONROL ALGORIHM AND PERFORMANCE ANALYSIS In this section, we provide a simple control algorithm, analyze its performance, and show that its provably optimal for all three problems described in the previous section. A. Algorithm Our algorithm for Problem A) involves only a transmission rate controller. he transmission controller attempts to provide a smooth service by the help of the key bits. ransmission Control C): We define R + to be the control parameter of our algorithm. In slot t, the controller solves the following optimization problem and transmits with the calculated rate: max µt) Πt) 2 U µt) ) q k t)µt), 20) where Πt) = {µt) : 0 µt) min[q k t)+r s t), R m t)]} is a compact and nonempty set. Furthermore, key generation and usage rates R k t), µ k t)) are chosen as follows: If µt) > R s t), then R k t) = 0 and µ k t) = µt) R s t); if µt) R s t), then µ k t) = 0 and R k t) = R s t) µt). his ensures that constraint µt) µ k t) ) + R k t) = R s t) is satisfied. It is not surprising that µ k t)r k t) = 0, since any solution with µ k t) > 0 and R k t) > 0, can be equivalently replicated by using the secrecy rate to transmit data rather than generating and using key bits at the same time. Note that R s t) = R m t) R e t) ) + Rm t) R e t), then for µt) > R s t), we have µ k t) = µt) R s t) R m t) R s t) R e t). his leads to constraint 0 µ k t) min[µt), R e t)] being satisfied. he set, Πt) of possible data transmission guarantees constraint 2) on µt) in Problem A). If U ) is concave, the objective function is a concave function of µt). Consequently, C solves a simple convex optimization problem in each time slot. he positive term 2 Uµt)) can be viewed as a utility obtained from the transmission rate µt) and the term q k t)µt) can be viewed as its associated cost. When the virtual key queue q k t) is small, C tries to allocate a high amount of transmitted data to increase the utility; and when q k t) is large, C allocates a small amount of transmitted data to reduce cost. his pushes the served data rate to be smoother

4 4 over time. It is also notable that 20) involves only µt). he key generation and usage rates are not part of this optimization, and are chosen subsequently. In Problem B), we need to control the transmission power, admission and transmission rate such that the admitted rate is maximized while keeping the data queue stable under an average power constraint. In our algorithm, there are three components: a admission control component, a transmission control component, and a power control component. he transmission control component is the identical to the one described above for Problem A), and the admission control and power control component are as follows: Admission Control AC): In slot t, the controller solves the following optimization problem and admit the calculated amount of data arrivals: max 0 Rt) At) 2 U Rt) ) q d t)rt). 2) Power Control PC): In slot t, the controller solves the following optimization problem and allocate the calculated amount of power: max 0 P t) P peak 2 log )) + + P t)hm t) q p t)p t). + P t)h e t) 22) When h m t) < h e t), i.e., the channel condition of the eavesdropper is better, P t) = 0 is the solution of Equation 22). he reason is that under such a situation, the instantaneous secrecy rate is zero with any power allocation. In order to satisfy the power constraint, it is obvious to save power for future usage. When h m t) h e t), we have )) + ) + P t)hm t) + P t)hm t) log = log + P t)h e t) + P t)h e t) = log h mt) h e t) h mt) h et) + P t)h e t), 23) which is concave in P t). hen, Equation 22) is a concave maximization problem under this situation. Note that C, AC and PC are all index policies, i.e., the solutions are memoryless and they depend only on the instantaneous values of the system variables. B. Performance Analysis Recall that At) is the original data arrival and Rt) is the amount of data admitted to the data queue. he natural question one would ask here is, whether our admission controller rejects too many packets in the first place to synthetically keep the data queue stable. In the following theorem, we show that this is not the case. Indeed, the admission rate associated with AC and C can be made closer to the optimum by increasing the control parameter. We use the notation y = Ox) to represent y going to 0 as x goes to 0. heorem : If ) U ) is strictly concave on R + {0}, and its slope at 0 satisfies 0 β = U 0) <, 2) 0 lim sup A2 t) <, then C achieves: PC achieves: lim sup Uµt)) R s P t) ) and AC achieves: Uµ t)) O ), 24) R s P t) ) O ), 25) P t) P avg, 26) q d t) β 2, t 0 27) URt)) UR t)) O ), Rt) 28) R t) as, 29) where µ = {µ 0), µ ),..., µ ),...}, and R = {R 0), R ),..., R ),...} are the optimal solutions to Problem A) and B), respectively. he proof of heorem can be found in Appendix A. Equation 27) shows that the data queue q d is stable and Equation 26) shows that the average power is bounded. In Equation 24) and Equation 25), the gap between the average transmission rate and secrecy rate with our algorithm and the optimal average transmission rate and secrecy rate can be made arbitrarily small by choosing parameter large. Similarly, by Equation 29), the admission rate can be close to optimum with large, and the optimal admission rate is actually bounded by the optimal secrecy rate. As a tradeoff, the data queue length increases as increases. Note that the how to control the transmission rate does not really influence the optimality of the solution for Problem B). From Equation 28), we observe that, if we plug the rates allocated by our algorithm in the utility function, it still remains close to the utility achieved by the optimal solution of Problem B). his implies that, AC and C allocate rates smoothly over time, as opposed to the case without a key queue. Based on this observation, combined with Equation 24), we expect the queueing delay to be smaller with a key queue. We will verify this in the following numerical example. For instance, U + R) = log + R).

5 5 C. Sample-path Delay Policy for Admissible Arrivals Given any general time varying rates of the main and eavesdroppers channel R m = {R m 0), R m ),..., R m ),...} and R e = {R e 0), R e ),..., R e ),...}, an arrival sample A = {A0), A),..., A ),...} is admissible if there exists a transmission and key management policy such that the resulting average queue length is stable, i.e., lim sup q dt) <. In this section, we focus on the delay performance for admissible arrivals given sample path of secrecy rate, and only consider policies that admits all the arrivals. Our objective is that given any sample path R m, Re and admissible A corresponding to R m and R e, to find a policy that gives the minimum average queueing delay lim sup q dt). Such a policy is called sample path queueing delay optimal policy. Work conserving policy µ for single link communication: µt) = min{q d t) + At), q k t) + R s t), R m t)}, { 0, if µt) Rs t) µ k t) = µt) R s t), otherwise { 0, if µt) > Rs t) R k t) = 30) R s t) µt), otherwise his policy satisfies all the constraints of the equivalent model characterized in Lemma, and R k t) and µ k t) can be calculated with µt). he work conserving policy transmits as much data as possible in the data queue until the data queue is empty. Once the data queue is empty, the key bits will be stored in the key queue rather than being used to transmit idle packets. Such a policy keeps the remaining packets in the queue as less as possible, and at the same time does not waste any key bits. It is natural to expect this policy is sample path delay optimal. Proposition : he above work conserving policy is sample path queueing delay optimal. Proof: It is sufficient to show that t 0, the policy µ gives the smallest queue length among all policies, i.e., q µ d t) qγ d t), t 0 for any policy γ, where qµ d and q γ d are the resulting queue backlogs under policy µ and γ, respectively. We show this by induction. Without loss of generality, let q d 0) = q k 0) = 0. I) When t =, it is apparent. II) Suppose q µ d ) qγ d ) for and any policy γ. Note that under policy µ, the queue evolution follows: q µ d t + ) = qµ d t) µt) + At), q µ k t + ) = qµ k t) µt) + R st), and for policy γ, the queue evolution follows: q γ d t + ) = q γ d t) γt) ) + + At), q γ k t + ) = qγ k t) γt) + R st). hus, we have which implies q µ k ) + R s ) = q γ k ) + R s ) q µ d ) = At) µt), q µ k ) = R s t) µt), q γ d ) At) γt), q γ k ) = R s t) γt), R s t) R s t) i) If R st) At), then and we also have At) + q µ d ) + A ), 3) At) + q γ d ) + A ). µ ) = min{q µ k ) + R s ), R m )}, γ ) min{q γ k ) + R s ), R m )}, q µ d + ) =qµ d ) µ ) + A ), q γ d + ) qγ d ) γ ) + A ), then combine with Equation 3) and 32), we have 32) q µ d + ) qγ d + ) q µ d ) qγ d ) + γ ) µ ) 33) q µ k ) qγ k ) + γ ) µ ), 34) i.) when q γ k ) + R s ) R m ) and q µ k ) + R s ) R m ), then continue from Equation 34), we have q µ d + ) qγ d + ) q µ k ) qγ k ) + qγ k ) + R s ) µ ) =q µ k ) qγ k ) + qγ k ) qµ k ) = 0. i.2) when q γ k ) + R s ) R m ) and q µ k ) + R s ) > R m ), then continue from Equation 33), we have q µ d + ) qγ d + ) q µ d ) qγ d ) + qγ k ) + R s ) µ ) =q µ d ) qγ d ) + qγ k ) + R s ) R m ) q µ d ) qγ d ) 0, by the hypothesis. i.3) when q γ k ) + R s ) > R m ) and q µ k ) + R s )

6 6 R m ), then continue from Equation 34), we have q µ d + ) qγ d + ) q µ k ) qγ k ) + R m ) µ ) <q µ k ) qγ k ) + qγ k ) + R s ) µ ) =q µ k ) qγ k ) + qγ k ) + R s ) q µ k ) R s ) =0. i.4) when q γ k ) + R s ) > R m ) and q µ k ) + R s ) > R m ), then continue from Equation 33), we have q µ d + ) qγ d + ) q µ d ) qγ d ) + R m ) µ ) =q µ d ) qγ d ) + R m ) R m ) 0. hus, q µ d + ) qγ d + ) if R st) At). ii) If R st) > At), then µ ) = min{q µ d ) + A ), R m )}, γ ) min{q γ k ) + R s ), R m )}, ii.) when q µ d )+A ) R m ), we have µ ) = q µ d )+ A ), and q µ d + ) = 0 qγ d + ). ii.2) when q µ d ) + A ) > R m ), then q µ d + ) qγ d + ) q µ d ) qγ d ) + γ ) R m ) 0 + R m ) R m ) = 0. hus, q µ d + ) qγ d + ) if R st) > well.. NUMERICAL EXAMPLE At) as In this section we simulate our algorithms and numerically compare them with the optimal performance. In the simulation, the number of time slots is = 0 6. We use the utility function Ux) = log 2 +x) x 0. he main channel gain is uniformly distributed over [0, 45] and the eavesdropper channel gain is uniformly distributed over [0, 5]. We use rate power function R m = 0 log+g m P ) and R e = 0 log+g e P ) for each slot. he average power upper bound is and the peak power is 2. We also set the virtual key queue parameter ɛ = 0.0. As shown in Figure 2 a), the power controller achieves the optimal average secrecy rate R s = 28.3 as increasing. We first use an arrival process At), t 0, that is composed of independent Poisson random variables with mean 30 each slot. In this example, Ā > R s. We run the simulation for different values of the control coefficient and compare the results with the optimal value 2. Figure 2b) shows that, as increases, the average admission rate both with and without a key queue) also increases to the optimum, which is consistent with Equation 29). In Figure 2 c), one can observe that, as increases, the average utility of the transmission rate with 2 Note that the optimal value for Problem A) is upper bounded by U R s) and for Problem B) is min[ā, R s]. a key queue approaches the optimal value, which is consistent with Equation 24). For the case without a key queue, the average utility is smaller but not much in the Poisson arrival scenario. As a result, the delay performance with a key queue is also only a little better as we can see in Figure 2d) for Poisson arrivals. Average Secrecy Rate Average Utility of ransmission Rate Approximate Algorithm a) x c) x 0 6 Average Injection Rate Average Queue Length b) x Average Admission Rate d) Fig. 2. Performance Evaluation of PC, AC, and C with respect to the solutions of Problem A) and B) under Poisson Arrivals: a) Control Parameter vs. Average Secrecy Rate; b) Control Parameter vs. Average Admission Rate; c) Control Parameter vs. Average Utility of ransmission Rate; d) hroughput vs. Delay Curve Figure 3 illustrates the same scenario, with a more bursty arrival process. his time, At) = 0 w.p. 2 and At) = 50 w.p. 2 independently for each time slot. Consequently, Ā = 25 < R s. Similar observations to the previous case can be made with this arrival process, but the delay performance with a key queue is now much better than that without a key queue, for bursty arrivals. Furthermore, in this case, the arrivals are admissible, we also plotted the optimal delay curve in Figure 3 c) and d) given the output secrecy sample of the power controller. I. CONCLUSION In this paper, we considered a single-user secure data communication system and addressed two separate problems, in order to achieve optimal secrecy rate and admitted arrival rate, and small queueing delay, under an average power constraint. We proposed a transmission controller, a power controller and an admission controller based on simple index policies that do not rely on any prior statistical information on the data arrival process. We showed that our controller pair has a provably efficient performance. Also, we illustrated via simulations that the use of a key queue reduces the queuing delay for the

7 7 Average Utility of ransmission Rate Average Queue Length a) x Minimum Queue Length c) x 0 4 Average Injection Rate Average Queue Length b) x Minimum Queue Length Average Admission Rate d) Fig. 3. Performance Evaluation of C and AC for Problem A) and B) under ariable Arrivals data packets, while serving packets that are admitted at the maximum admissible rate. his is due to the fact that, the transmission controller is designed to choose the rate of served packets as uniformly over time as possible. When the arrival is admissible given sample path of secrecy rate, we provide a rate allocation policy that is sample path queueing delay optimal. REFERENCES [] A. D. Wyner, he Wire-ap Channel, he Bell System echnical Hournal, vol. 54, no. 8, pp , October 975. [2] P. K. Gopala, L. Lai, and H. El Gamal, On the secrecy capacity of fading channels, vol. 54, no. 0, pp , Oct [3] J. Barros and M. R. D. Rodrigues, Secrecy capacity of wireless channels, in Proc. IEEE Int. Symposium Inform. heory, Seattle, WA, July 2006, pp [4] D. Gunduz, R. Brown, and H.. Poor, Secret communication with feedback, in Proc. IEEE Intl. Symposium on Information heory and its Applications, Auckland, New Zealand, Dec [5] A. Khisti and G. W. Wornell, Secure transmission with multiple antennas: he MISOME wiretap channel, IEEE rans. Inform. heory, 2009, to appear. [6] Y. Liang, H.. Poor, and S. Shamai Shitz), Secure communication over fading channels, IEEE rans. Inform. heory, vol. 54, no. 6, pp , June [7] E. Ekrem and S. Ulukus, he secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel, Mar. 2009, submitted. [8] M. Yuksel, X. Liu, and E. Erkip, A secure communication game with a relay helping the eavesdropper, aormina, Italy, Oct. 2009, to appear. [9] O. O. Koyluoglu, C. E. Koksal, and H. E. Gamal, On secrecy capacity scaling in wireless networks, 200, submitted. [0], On the effect of colluding eavesdroppers on secrecy scaling, in Proceedings of European Wireless, EW, Lucca, Italy, 200. [] S. Goel,. Aggarwal, A. Yener, and A. R. Calderbank, Modeling location uncertainty for eavesdroppers: A secrecy graph approach, Austin, X, June 200. [2] S. asudevan, D. Goeckel, and D. F. owsley, Security-capacity tradeoff in large wireless networks using keyless secrecy, Chicago, IL, September 200. [3] A. Sarkar and M. Haenggi, Secrecy coverage, Pacific Grove, CA, Nov [4] C. E. Koksal and O. Ercetin, Control of wireless networks with secrecy, in Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, Nov [5] C. E. Koksal, O. Ercetin, and Y. Sarikaya, Control of wireless networks with secrecy, CoRR, vol. abs/0.3444, 20. [6] L. assiulas and A. Ephremides, Jointly optimal routing and scheduling in packet ratio networks, IEEE ransactions on Information heory, vol. 38, no., pp , Jan [7] X. Liu, E. K. P. Chong, and N. B. Shroff, A framework for opportunistic scheduling in wireless networks, Computer Networks, vol. 4, no. 4, pp , [8] X. Lin and N. B. Shroff, he Impact of Imperfect Scheduling on Cross-Layer Congestion Control in Wireless Networks, IEEE/ACM ransactions on Networking, vol. 4, no. 2, pp , April [9] A. Eryilmaz and R. Srikant, Joint Congestion Control, Routing and MAC for Stability and Fairness in Wireless Networks, IEEE Journal on Selected Areas in Communications, vol. 24, pp , August [20] M. J. Neely, Energy Control for ime arying Wireless Networks, IEEE ransactions on Information heory, vol. 52, no. 7, pp , July [2] K. Khalil, M. Youssef, O. O. Koyluoglu, and H. El Gamal, On the delay limited secrecy capacity of fading channels, Seoul, Korea, June - July [22] O. Gungor, J. an, C. E. Koksal, H. El Gamal, and N. B. Shroff, Joint power and secret key queue management for delay limited secure communication, San Diego, CA, March 200. [23] Z. Mao, C. E. Koksal, and N. B. Shroff, owards Achieving Full Secrecy Rate in Wireless Networks: A Control heoretic Approach, San Diego, CA, IA 20. [24], Near Power and Rate Control of Multi-hop Sensor Networks with Energy Replenishment: Basic Limitations with Finite Energy and Data Storage, in IEEE ransactions on Automatic Control, accepted. A. Proof of heorem APPENDIX Proof of Equation 27): Equation 27) directly follows from the following lemma: Lemma 2: Under algorithm AC, C and PC, we have q d t) β 2, q kt) β 2, q pt) 2. Proof: Since U ) is concave on R + {0}, we have Uµt)) U0)+βµt), t 0, where 0 β = U 0) <. hen, 2 Uµt)) q kt)µt) 2 U0) + β 2 µt) q kt)µt) where µt) is the solution of C. β If 2 µt) q kt)µt) < 0, then we get 2 Uµt)) q k t)µt) < 2 U0). However, C chooses µt) that maximizes 2 Uµt)) q kt)µt) which means 2 Uµt)) q k t)µt) 2 U0) since 0 Πt). hen, we must have β 2 µt) q kt)µt) 0, i.e., q k t)µt) β µt). 35) 2 We now prove the result by induction. Without loss of generality, let q k 0) β 2. Suppose for all t, q kt ) β 2 holds. In slot t, if µt) = 0, then q k t) q k t ) β 2 by Equation 7). Otherwise, µt) 0, and by Equation 35), we have q k t) β 2. q d t) β 2 can be obtained using the same argument.

8 8 Since )) + + P t)hm t) log + P t)h e t) + P t) h m t) h e t) ) )) + = log + P t)h e t) log + P t) hm t) h e t) )) + + P t)h e t) = log + P t) hm t) h e t) ) + P t)h e t) P t) hm t) h e t), t 0. + P t)h e t) Similarly, we have q p t) h m t) h M <, where h M = max t 0 h m t). Proof of Equation 24): We define the Lyapunov function L q k t)) = q k t)) 2, and q k t)) = L q k t+)) L q k t)). From Equation 7), we have qk t + ) ) 2 qk t) ɛ ) 2 + µt) Rs t) + o t) ) qt) ɛ ) + µt) Rs t) + o t) ) then = q k t)) q k t) ) 2 + ɛ R max ) 2 + 2ɛRmax + 2 q k t) o t) + 2 q k t)µt) 2 q k t)r s t), Uµt)) Uµt)) + ɛ R max ) 2 + 2ɛRmax + 2 q k t) o t) + 2 q k t)µt) 2 q k t)r s t) Uµt)) + ɛ 2 + ) 2 + R max + 2ɛRmax + β o t) [ ] 2 2 Uµt)) q kt)µt) 2 q k t)r s t). It is apparent that C is trying to maximize the value of the term [ 2 Uµt)) q kt)µt) ]. Since the optimal solution for Problem A) may not be unique, we let U be the optimal solution set and µ U be any optimal solution, for Problem A) given any sample path. Since the constraint set Πt) is queue dynamic related, it is possible that µ t) / Πt). [ Lemma 3: In slot t, if by solving C, we get 2 Uµt)) q kt)µt) ] [ < 2 Uµ t)) q k t)µ t) ], then µt) < µ t) and o t ) = for some t t and t t <. Proof: he proof is given in [23] as well. Let N = max{n : for any t 0, R s τ) = 0, τ [t, t + n]}. By using Lemma 3 and µt), µ t) R m t) R max, t 0, we have N < and Lemma 4: lim sup lim sup q k t)[µ t) R s t)] O ), q p t)[p t) P avg ] O ). Proof: he proof is similar as in [23]. Lemma 5: If q k t) β 2, then q kt) <. Proof: he proof is given in [23] as well. Lemma 6: If both the key queue q k t) and virtual key queue q k t) are strongly stable, i.e., lim sup qk t) + q k t) ) <, then lim sup ot) ɛ. If the virtual power queue q p t) is strongly stable, then lim sup P t) P avg. Proof: he proof is similar as in [23]. By summing from 0 to, dividing by and, taking over Equation 36), combined with Lemma 2, Lemma 5, Lemma 6, and Lemma 4, we get Uµt)) ɛnur max ) + β). Uµ t)) O ) By letting ɛ 0, we obtain Equation 24). Proof of Equation 26): Equation 26) follows from Lemma 2 and Lemma 6. Proof of Equation 25): We define L q p t)) = q p t)) 2, and q p t)) = L q p t+)) L q p t)). Both P t) and P t) are within [0, P peak ], by Equation 9), we have = q p t)) R s t) 2 [ )) + + P t)hm t) log q p t)p t)] 2 + P t)h e t) 2 q p t)p avg + P 2 avg + P 2 peak R s P t) ) Rs P t) ) + 2 q p t)p t) 2 q p t)p avg + P 2 avg + P 2 peak. By summing from 0 to, dividing by and, taking over both sides, combined with Lemma 4, we get R s P t)) R s P t)) O ). Proof of Equation 28) and Equation 29): he proof is given in [23] as well. Uµt)) Uµ t)) + ɛ 2 + ) 2 + R max + 2ɛRmax [ ] + 2 q k t) µ t) R s t) + β + NUR max )) o t). 36)

Towards Achieving Full Secrecy Rate in Wireless Networks: A Control Theoretic Approach

Towards Achieving Full Secrecy Rate in Wireless Networks: A Control Theoretic Approach owards Achieving Full Secrecy Rate in Wireless Networks: A Control heoretic Approach Zhoujia Mao Department of ECE he Ohio State University maoz@ece.osu.edu Can Emre Koksal Department of ECE he Ohio State

More information

Achieving Full Secrecy Rate with Low Packet Delays: An Optimal Control Approach

Achieving Full Secrecy Rate with Low Packet Delays: An Optimal Control Approach Achieving Full Secrecy Rate with Low Packet Delays: An Optimal Control Approach Zhoujia Mao, C. Emre Koksal, Ness B. Shroff E-mail: maoz@ece.osu.edu, koksal@ece.osu.edu, shroff@ece.osu.edu Abstract We

More information

Resource Allocation in Sensor Networks with Renewable Energy

Resource Allocation in Sensor Networks with Renewable Energy Resource Allocation in Sensor Networks with Renewable Energy (Invited Paper) Zhoujia Mao Department of ECE he Ohio State University maoz@ece.osu.edu Can Emre Koksal Department of ECE he Ohio State University

More information

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Shahid Mehraj Shah and Vinod Sharma Department of Electrical Communication Engineering, Indian Institute of

More information

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,

More information

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels 1 Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels Invited Paper Ali ParandehGheibi, Muriel Médard, Asuman Ozdaglar, and Atilla Eryilmaz arxiv:0810.167v1 cs.it

More information

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely Part 1: A single wireless downlink (L links) L 2 1 S={Totally

More information

On the Energy-Delay Trade-off of a Two-Way Relay Network

On the Energy-Delay Trade-off of a Two-Way Relay Network On the Energy-Delay Trade-off of a To-Way Relay Netork Xiang He Aylin Yener Wireless Communications and Netorking Laboratory Electrical Engineering Department The Pennsylvania State University University

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

Dynamic User Association and Energy Control in Cellular Networks with Renewable Resources

Dynamic User Association and Energy Control in Cellular Networks with Renewable Resources Dynamic User Association and Energy Control in Cellular Networks with Renewable Resources Yang Yang, Jiashang Liu, Prasun Sinha and Ness B. Shroff Abstract In recent years, there has been a growing interest

More information

Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels

Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels 1 Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels Ain-ul-Aisha, Lifeng Lai, Yingbin Liang and Shlomo Shamai (Shitz Abstract In this paper, we analyze the sum-rate capacity of two-user Poisson

More information

Exploring the Tradeoff between Waiting Time and Service Cost in Non-Asymptotic Operating Regimes

Exploring the Tradeoff between Waiting Time and Service Cost in Non-Asymptotic Operating Regimes Exploring the radeoff between Waiting ime and Service Cost in Non-Asymptotic Operating Regimes Bin Li, Ozgur Dalkilic and Atilla Eryilmaz Abstract Motivated by the problem of demand management in smart

More information

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

Queue Proportional Scheduling in Gaussian Broadcast Channels

Queue Proportional Scheduling in Gaussian Broadcast Channels Queue Proportional Scheduling in Gaussian Broadcast Channels Kibeom Seong Dept. of Electrical Engineering Stanford University Stanford, CA 9435 USA Email: kseong@stanford.edu Ravi Narasimhan Dept. of Electrical

More information

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

Optimal Power Control in Decentralized Gaussian Multiple Access Channels 1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017

More information

4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016

4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016 4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016 Online Power Control Optimization for Wireless Transmission With Energy Harvesting and Storage Fatemeh Amirnavaei, Student Member,

More information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information SUBMIED O IEEE INERNAIONAL SYMPOSIUM ON INFORMAION HEORY, DE. 23 1 Optimal Power Allocation for Parallel Gaussian Broadcast hannels with Independent and ommon Information Nihar Jindal and Andrea Goldsmith

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Optimal power-delay trade-offs in fading channels: small delay asymptotics

Optimal power-delay trade-offs in fading channels: small delay asymptotics Optimal power-delay trade-offs in fading channels: small delay asymptotics Randall A. Berry Dept. of EECS, Northwestern University 45 Sheridan Rd., Evanston IL 6008 Email: rberry@ece.northwestern.edu Abstract

More information

On the Secrecy Capacity of Fading Channels

On the Secrecy Capacity of Fading Channels On the Secrecy Capacity of Fading Channels arxiv:cs/63v [cs.it] 7 Oct 26 Praveen Kumar Gopala, Lifeng Lai and Hesham El Gamal Department of Electrical and Computer Engineering The Ohio State University

More information

Power Aware Wireless File Downloading: A Lyapunov Indexing Approach to A Constrained Restless Bandit Problem

Power Aware Wireless File Downloading: A Lyapunov Indexing Approach to A Constrained Restless Bandit Problem IEEE/ACM RANSACIONS ON NEWORKING, VOL. 24, NO. 4, PP. 2264-2277, AUG. 206 Power Aware Wireless File Downloading: A Lyapunov Indexing Approach to A Constrained Restless Bandit Problem Xiaohan Wei and Michael

More information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information 204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener

More information

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1 Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable

More information

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Alkan Soysal Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland,

More information

Ressource Allocation Schemes for D2D Communications

Ressource Allocation Schemes for D2D Communications 1 / 24 Ressource Allocation Schemes for D2D Communications Mohamad Assaad Laboratoire des Signaux et Systèmes (L2S), CentraleSupélec, Gif sur Yvette, France. Indo-french Workshop on D2D Communications

More information

Fairness and Optimal Stochastic Control for Heterogeneous Networks

Fairness and Optimal Stochastic Control for Heterogeneous Networks λ 91 λ 93 Fairness and Optimal Stochastic Control for Heterogeneous Networks sensor network wired network wireless 9 8 7 6 5 λ 48 λ 42 4 3 0 1 2 λ n R n U n Michael J. Neely (USC) Eytan Modiano (MIT) Chih-Ping

More information

Optimizing Queueing Cost and Energy Efficiency in a Wireless Network

Optimizing Queueing Cost and Energy Efficiency in a Wireless Network Optimizing Queueing Cost and Energy Efficiency in a Wireless Network Antonis Dimakis Department of Informatics Athens University of Economics and Business Patission 76, Athens 1434, Greece Email: dimakis@aueb.gr

More information

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,

More information

Broadcasting with a Battery Limited Energy Harvesting Rechargeable Transmitter

Broadcasting with a Battery Limited Energy Harvesting Rechargeable Transmitter roadcasting with a attery Limited Energy Harvesting Rechargeable Transmitter Omur Ozel, Jing Yang 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland, College

More information

Cooperative Energy Harvesting Communications with Relaying and Energy Sharing

Cooperative Energy Harvesting Communications with Relaying and Energy Sharing Cooperative Energy Harvesting Communications with Relaying and Energy Sharing Kaya Tutuncuoglu and Aylin Yener Department of Electrical Engineering The Pennsylvania State University, University Park, PA

More information

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Neha Kumar, Rong Pan, Devavrat Shah Departments of EE & CS Stanford University {nehak, rong, devavrat@stanford.edu Abstract In recent

More information

Node-based Distributed Optimal Control of Wireless Networks

Node-based Distributed Optimal Control of Wireless Networks Node-based Distributed Optimal Control of Wireless Networks CISS March 2006 Edmund M. Yeh Department of Electrical Engineering Yale University Joint work with Yufang Xi Main Results Unified framework for

More information

Online Power Control Optimization for Wireless Transmission with Energy Harvesting and Storage

Online Power Control Optimization for Wireless Transmission with Energy Harvesting and Storage Online Power Control Optimization for Wireless Transmission with Energy Harvesting and Storage Fatemeh Amirnavaei, Student Member, IEEE and Min Dong, Senior Member, IEEE arxiv:606.046v2 [cs.it] 26 Feb

More information

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo, Xiaojun Lin, and Ness B. Shroff Abstract In this paper, we characterize the performance

More information

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a

More information

Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance

Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance Yu Sang, Gagan R. Gupta, and Bo Ji Member, IEEE arxiv:52.02328v2 [cs.ni] 8 Nov 207 Abstract This

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

ABSTRACT CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS. Title of dissertation: Anthony A. Fanous, Doctor of Philosophy, 2013

ABSTRACT CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS. Title of dissertation: Anthony A. Fanous, Doctor of Philosophy, 2013 ABSTRACT Title of dissertation: CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS Anthony A. Fanous, Doctor of Philosophy, 2013 Dissertation directed by: Professor Anthony Ephremides Department of Electrical

More information

Optimum Transmission Policies for Battery Limited Energy Harvesting Nodes

Optimum Transmission Policies for Battery Limited Energy Harvesting Nodes Optimum Transmission Policies for Battery Limited Energy Harvesting Nodes Kaya Tutuncuoglu Aylin Yener Wireless Communications and Networking Laboratory (WCAN) Electrical Engineering Department The Pennsylvania

More information

Optimal Sensing and Transmission in Energy Harvesting Sensor Networks

Optimal Sensing and Transmission in Energy Harvesting Sensor Networks University of Arkansas, Fayetteville ScholarWorks@UARK Theses and Dissertations 2-206 Optimal Sensing and Transmission in Energy Harvesting Sensor Networks Xianwen Wu University of Arkansas, Fayetteville

More information

An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel

An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 4, APRIL 2012 2427 An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel Ersen Ekrem, Student Member, IEEE,

More information

Delay-Based Back-Pressure Scheduling in. Multihop Wireless Networks

Delay-Based Back-Pressure Scheduling in. Multihop Wireless Networks Delay-Based Back-Pressure Scheduling in Multihop Wireless Networks Bo Ji, Student Member, IEEE, Changhee Joo, Member, IEEE, and Ness B. Shroff, Fellow, IEEE arxiv:0.5674v3 [cs.ni] 7 Nov 202 Abstract Scheduling

More information

On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networks

On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networks On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networs V.J. Venataramanan and Xiaojun Lin School of ECE Purdue University Email: {vvenat,linx}@purdue.edu Lei Ying Department

More information

On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise

On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise Ya-Lan Liang, Yung-Shun Wang, Tsung-Hui Chang, Y.-W. Peter Hong, and Chong-Yung Chi Institute of Communications

More information

Utility-Maximizing Scheduling for Stochastic Processing Networks

Utility-Maximizing Scheduling for Stochastic Processing Networks Utility-Maximizing Scheduling for Stochastic Processing Networks Libin Jiang and Jean Walrand EECS Department, University of California at Berkeley {ljiang,wlr}@eecs.berkeley.edu Abstract Stochastic Processing

More information

Any Work-conserving Policy Stabilizes the Ring with Spatial Reuse

Any Work-conserving Policy Stabilizes the Ring with Spatial Reuse Any Work-conserving Policy Stabilizes the Ring with Spatial Reuse L. assiulas y Dept. of Electrical Engineering Polytechnic University Brooklyn, NY 20 leandros@olympos.poly.edu L. Georgiadis IBM. J. Watson

More information

Wireless Transmission with Energy Harvesting and Storage. Fatemeh Amirnavaei

Wireless Transmission with Energy Harvesting and Storage. Fatemeh Amirnavaei Wireless Transmission with Energy Harvesting and Storage by Fatemeh Amirnavaei A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in The Faculty of Engineering

More information

Fading Wiretap Channel with No CSI Anywhere

Fading Wiretap Channel with No CSI Anywhere Fading Wiretap Channel with No CSI Anywhere Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 7 pritamm@umd.edu ulukus@umd.edu Abstract

More information

Backlog Optimal Downlink Scheduling in Energy Harvesting Base Station in a Cellular Network

Backlog Optimal Downlink Scheduling in Energy Harvesting Base Station in a Cellular Network MTech Dissertation Backlog Optimal Downlink Scheduling in Energy Harvesting Base Station in a Cellular Network Submitted in partial fulfillment of the requirements for the degree of Master of Technology

More information

Optimal Sampling of Random Processes under Stochastic Energy Constraints

Optimal Sampling of Random Processes under Stochastic Energy Constraints Globecom 24 - Signal Processing for Communications Symposium Optimal Sampling of Random Processes under Stochastic Energy Constraints Jing Yang and Jingxian Wu Department of Electrical Engineering, University

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. XX, XXXXXXX X Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks Longbi Lin, Xiaojun Lin, Member, IEEE, and Ness B. Shroff,

More information

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo Departments of ECE and CSE The Ohio State University Email: cjoo@ece.osu.edu Xiaojun

More information

On the Secrecy Capacity of the Z-Interference Channel

On the Secrecy Capacity of the Z-Interference Channel On the Secrecy Capacity of the Z-Interference Channel Ronit Bustin Tel Aviv University Email: ronitbustin@post.tau.ac.il Mojtaba Vaezi Princeton University Email: mvaezi@princeton.edu Rafael F. Schaefer

More information

The Poisson Channel with Side Information

The Poisson Channel with Side Information The Poisson Channel with Side Information Shraga Bross School of Enginerring Bar-Ilan University, Israel brosss@macs.biu.ac.il Amos Lapidoth Ligong Wang Signal and Information Processing Laboratory ETH

More information

Cooperative Communication with Feedback via Stochastic Approximation

Cooperative Communication with Feedback via Stochastic Approximation Cooperative Communication with Feedback via Stochastic Approximation Utsaw Kumar J Nicholas Laneman and Vijay Gupta Department of Electrical Engineering University of Notre Dame Email: {ukumar jnl vgupta}@ndedu

More information

Energy-Efficient Scheduling with Individual Delay Constraints over a Fading Channel

Energy-Efficient Scheduling with Individual Delay Constraints over a Fading Channel Energy-Efficient Scheduling with Individual Delay Constraints over a Fading Channel Wanshi Chen Qualcomm Inc. San Diego, CA 92121 wanshic@qualcomm.com Urbashi Mitra and Michael J. Neely Dept. of Electrical

More information

Inequality Comparisons and Traffic Smoothing in Multi-Stage ATM Multiplexers

Inequality Comparisons and Traffic Smoothing in Multi-Stage ATM Multiplexers IEEE Proceedings of the International Conference on Communications, 2000 Inequality Comparisons and raffic Smoothing in Multi-Stage AM Multiplexers Michael J. Neely MI -- LIDS mjneely@mit.edu Abstract

More information

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy Spectrum Leasing via Cooperation for Enhanced 1 Physical-Layer Secrecy Keonkook Lee, Member, IEEE, Chan-Byoung Chae, Senior Member, IEEE, Joonhyuk Kang, Member, IEEE arxiv:1205.0085v1 [cs.it] 1 May 2012

More information

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks IEEE TRASACTIOS O IFORMATIO THEORY 1 Capacity and Delay Tradeoffs for Ad-Hoc Mobile etworks Michael J. eely University of Southern California mjneely@usc.edu http://www-rcf.usc.edu/ mjneely Eytan Modiano

More information

MIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper

MIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper MIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper Xiang He, Ashish Khisti, Aylin Yener Dept. of Electrical and Computer Engineering, University of Toronto, Toronto, ON, M5S 3G4, Canada

More information

Throughput-optimal Scheduling in Multi-hop Wireless Networks without Per-flow Information

Throughput-optimal Scheduling in Multi-hop Wireless Networks without Per-flow Information Throughput-optimal Scheduling in Multi-hop Wireless Networks without Per-flow Information Bo Ji, Student Member, IEEE, Changhee Joo, Member, IEEE, and Ness B. Shroff, Fellow, IEEE Abstract In this paper,

More information

The Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems

The Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems The Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems Jie Yang and D.R. Brown III Worcester Polytechnic Institute Department

More information

On the Fundamental Limits of Multi-user Scheduling under Short-term Fairness Constraints

On the Fundamental Limits of Multi-user Scheduling under Short-term Fairness Constraints 1 On the Fundamental Limits of Multi-user Scheduling under Short-term Fairness Constraints arxiv:1901.07719v1 [cs.it] 23 Jan 2019 Shahram Shahsavari, Farhad Shirani and Elza Erkip Dept. of Electrical and

More information

Stochastic Optimization for Undergraduate Computer Science Students

Stochastic Optimization for Undergraduate Computer Science Students Stochastic Optimization for Undergraduate Computer Science Students Professor Joongheon Kim School of Computer Science and Engineering, Chung-Ang University, Seoul, Republic of Korea 1 Reference 2 Outline

More information

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung

More information

A Simple Memoryless Proof of the Capacity of the Exponential Server Timing Channel

A Simple Memoryless Proof of the Capacity of the Exponential Server Timing Channel A Simple Memoryless Proof of the Capacity of the Exponential Server iming Channel odd P. Coleman ECE Department Coordinated Science Laboratory University of Illinois colemant@illinois.edu Abstract his

More information

Equivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues

Equivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues Proceedings of the 38th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2000. Equivalent Models and Analysis for Multi-Stage ree Networks of Deterministic Service ime Queues Michael

More information

Crowdsourcing in Cyber-Physical Systems: Stochastic Optimization with Strong Stability

Crowdsourcing in Cyber-Physical Systems: Stochastic Optimization with Strong Stability Received 1 April 2013; revised 25 May 2013; accepted 29 June 2013. Date of publication 15 July 2013; date of current version 21 January 2014. Digital Object Identifier 10.1109/EC.2013.2273358 Crowdsourcing

More information

Amr Rizk TU Darmstadt

Amr Rizk TU Darmstadt Saving Resources on Wireless Uplinks: Models of Queue-aware Scheduling 1 Amr Rizk TU Darmstadt - joint work with Markus Fidler 6. April 2016 KOM TUD Amr Rizk 1 Cellular Uplink Scheduling freq. time 6.

More information

Learning Algorithms for Minimizing Queue Length Regret

Learning Algorithms for Minimizing Queue Length Regret Learning Algorithms for Minimizing Queue Length Regret Thomas Stahlbuhk Massachusetts Institute of Technology Cambridge, MA Brooke Shrader MIT Lincoln Laboratory Lexington, MA Eytan Modiano Massachusetts

More information

On the Throughput of Proportional Fair Scheduling with Opportunistic Beamforming for Continuous Fading States

On the Throughput of Proportional Fair Scheduling with Opportunistic Beamforming for Continuous Fading States On the hroughput of Proportional Fair Scheduling with Opportunistic Beamforming for Continuous Fading States Andreas Senst, Peter Schulz-Rittich, Gerd Ascheid, and Heinrich Meyr Institute for Integrated

More information

Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks

Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks VANET Analysis Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks Tom Hao Luan, Xuemin (Sherman) Shen, and Fan Bai BBCR, ECE, University of Waterloo, Waterloo, Ontario, N2L 3G1,

More information

Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback

Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback Achaleshwar Sahai Department of ECE, Rice University, Houston, TX 775. as27@rice.edu Vaneet Aggarwal Department of

More information

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting 1 Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting Dusit Niyato 1, Ping Wang 1, and Dong In Kim 2 1 School of Computer Engineering, Nanyang Technological University

More information

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems  M/M/1  M/M/m  M/M/1/K Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals

More information

Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm

Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm HongSun An Student Member IEEE he Graduate School of I & Incheon Korea ahs3179@gmail.com Manar Mohaisen Student Member IEEE

More information

DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE

DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE Daohua Zhu, A. Lee Swindlehurst, S. Ali A. Fakoorian, Wei Xu, Chunming Zhao National Mobile Communications Research Lab, Southeast

More information

Exploiting Partial Channel State Information for Secrecy over Wireless Channels

Exploiting Partial Channel State Information for Secrecy over Wireless Channels Exploiting Partial Channel State Information for Secrecy over Wireless Channels Matthieu R. Bloch and J. Nicholas Laneman Abstract In this paper, we investigate the effect of partial channel state information

More information

Quiz 1 EE 549 Wednesday, Feb. 27, 2008

Quiz 1 EE 549 Wednesday, Feb. 27, 2008 UNIVERSITY OF SOUTHERN CALIFORNIA, SPRING 2008 1 Quiz 1 EE 549 Wednesday, Feb. 27, 2008 INSTRUCTIONS This quiz lasts for 85 minutes. This quiz is closed book and closed notes. No Calculators or laptops

More information

Randomized Algorithms for Throughput-Optimality and Fairness in Wireless Networks

Randomized Algorithms for Throughput-Optimality and Fairness in Wireless Networks Proceedings o the 45th IEEE Conerence on Decision & Control Manchester Grand Hyatt Hotel San Diego, CA, USA, December 13-15, 2006 Randomized Algorithms or hroughput-optimality and Fairness in Wireless

More information

Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges

Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges Ahmed Arafa, Jing Yang 2, Sennur Ulukus 3, and H. Vincent Poor Electrical Engineering Department, Princeton

More information

OFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback. Prof. Phil Schniter

OFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback. Prof. Phil Schniter OFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback Prof. Phil Schniter T. H. E OHIO STATE UNIVERSITY Joint work with Mr. Rohit Aggarwal, Dr. Mohamad Assaad, Dr. C. Emre Koksal September

More information

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks 1 Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo, Member, IEEE, Xiaojun Lin, Member, IEEE, and Ness B. Shroff, Fellow, IEEE Abstract

More information

Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor

Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor Ahmed Arafa, Jing Yang, Sennur Ulukus 3, and H. Vincent Poor Electrical Engineering Department, Princeton University School

More information

Job Scheduling and Multiple Access. Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley)

Job Scheduling and Multiple Access. Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley) Job Scheduling and Multiple Access Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley) 1 Multiple Access Setting Characteristics of Multiple Access: Bursty Arrivals Uncoordinated Transmitters Interference

More information

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,

More information

Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy

Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy Hyun-Suk Lee Dept. of Electrical and Electronic Eng., Yonsei University, Seoul, Korea Jang-Won Lee Dept. of Electrical

More information

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Cooperative HARQ with Poisson Interference and Opportunistic Routing Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline

More information

Joint Source-Channel Coding for the Multiple-Access Relay Channel

Joint Source-Channel Coding for the Multiple-Access Relay Channel Joint Source-Channel Coding for the Multiple-Access Relay Channel Yonathan Murin, Ron Dabora Department of Electrical and Computer Engineering Ben-Gurion University, Israel Email: moriny@bgu.ac.il, ron@ee.bgu.ac.il

More information

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Syracuse University SURFACE Dissertations - ALL SURFACE June 2017 Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Yi Li Syracuse University Follow this and additional works

More information

Quality of Information Aware Scheduling in Task Processing Networks

Quality of Information Aware Scheduling in Task Processing Networks Resource Allocation on Wireless Networks and Wireless Networks - Communication, Cooperation and Competition Quality of Information Aware Scheduling in Task Processing Networks Rahul Urgaonkar, Ertugrul

More information

Resource Allocation for Video Streaming in Wireless Environment

Resource Allocation for Video Streaming in Wireless Environment Resource Allocation for Video Streaming in Wireless Environment Shahrokh Valaee and Jean-Charles Gregoire Abstract This paper focuses on the development of a new resource allocation scheme for video streaming

More information

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding The MIT Faculty has made this article openly available Please share how this access benefits

More information