53 research outputs found
On The Robustness of Channel Allocation in Joint Radar And Communication Systems: An Auction Approach
Joint radar and communication (JRC) is a promising technique for spectrum
re-utilization, which enables radar sensing and data transmission to operate on
the same frequencies and the same devices. However, due to the multi-objective
property of JRC systems, channel allocation to JRC nodes should be carefully
designed to maximize system performance. Additionally, because of the broadcast
nature of wireless signals, a watchful adversary, i.e., a warden, can detect
ongoing transmissions and attack the system. Thus, we develop a covert JRC
system that minimizes the detection probability by wardens, in which friendly
jammers are deployed to improve the covertness of the JRC nodes during radar
sensing and data transmission operations. Furthermore, we propose a robust
multi-item auction design for channel allocation for such a JRC system that
considers the uncertainty in bids. The proposed auction mechanism achieves the
properties of truthfulness, individual rationality, budget feasibility, and
computational efficiency. The simulations clearly show the benefits of our
design to support covert JRC systems and to provide incentive to the JRC nodes
in obtaining spectrum, in which the auction-based channel allocation mechanism
is robust against perturbations in the bids, which is highly effective for JRC
nodes working in uncertain environments
Recommended from our members
COVERT COMMUNICATIONS IN CONTINUOUS-TIME SYSTEMS
This dissertation studies covert wireless communications where a transmitter (Alice) intends to transmit messages to a legitimate receiver (Bob) such that the presence of the message is hidden from an attentive warden (Willie). Here we consider pertinent aspects of covert communications that focus on moving such systems closer to implementation. For example, previous studies use the standard discrete-time communication model when analyzing covert communications, since this is commonly assumed without loss of generality in standard communication theory. However, it is not clear that such a model captures the salient aspects of the continuous-time covert communications problem. A power detector that is optimal for the warden in a discrete-time covert communications scenario may not be optimal on a continuous- time model. Thus, it is of interest to consider this more realistic model for physical channels. After analyzing a power optimization problem using the standard discrete-time model, we move to the key part of system implementation: the instantiation in true continuous-time systems of the discrete-time models studied to this point in the literature. A key goal is to examine Willie’s detection capability on a continuous-time model and study how the limits of covert communications change from the discrete-time case. In particular, we show that detectors for Willie can benefit from the continuous-time setting and outperform detectors based on the discrete-time model; not surprisingly, this has a significant impact on the true covert throughput of the system. Nevertheless, we establish constructions such that efficient covert communications can still be achieved in a continuous-time model, and prove the fundamental limit on the covert communication rate. After considering the continuous-time problem in detail, we then turn to addressing another limitation of previous work - the requirement for an intentional jammer to facilitate efficient covert communication. Instead, we consider how to exploit a pre-existing interference source – a radar - to achieve covert communication. We establish a covert communication scheme in such an environment, and analyze the corresponding covert rate. Finally, we consider the use of a detection technique similar to that in the covert communications problem, in the area of quantized signal detection
Covert Communication Achieved by A Greedy Relay in Wireless Networks
Covert wireless communication aims to hide the very existence of wireless transmissions in order to guarantee a strong security in wireless networks. In this paper, we examine the possibility and achievable performance of covert communication in amplify-and-forward one-way relay networks. Specifically, the relay is greedy and opportunistically transmits its own information to the destination covertly on top of forwarding the source's message, while the source tries to detect this covert transmission to discover the illegitimate usage of the resource (e.g., power and spectrum) allocated only for the purpose of forwarding the source's information. We propose two strategies for the relay to transmit its covert information, namely rate-control and power-control transmission schemes, for which the source's detection limits are analyzed in terms of detection error probability and the achievable effective covert rates from the relay to destination are derived. Our examination determines the conditions under which the rate-control transmission scheme outperforms the power-control transmission scheme, and vice versa, which enables the relay to achieve the maximum effective covert rate. Our analysis indicates that the relay has to forward the source's message to shield its covert transmission and the effective covert rate increases with its forwarding ability (e.g., its maximum transmits power)
Changing primary care performance measurement by getting started
This action research study was conducted as part of an ongoing performance measurement initiative in an association of primary care teams in Ontario, Canada. The problem addressed was the challenge of increasing participation in performance measurement. The research question addressed was: What happens when a novel approach to measuring quality/ demonstrating value is introduced in my organization? My view in this action research considered change as a continuous phenomenon. This is consistent with my operational mandate as a scholar-practitioner and my own orientation as a reluctant constructionist. The literature informed the development of a framework to guide the analysis of data in this study. This action research was based on a developmental evaluation using qualitative tools for data capture and analysis. It ensured a critical perspective by orienting around the reflective questions: “What, So What, Now What”. The study unfolded in a cyclical way starting with the launch of the artifact, the experience with the first iterations, reflection on the experience to generate recommendations for action, the experience with implementing the actions (or not, as events unfolded) and finally reflections and general considerations for next steps with the initiative. The data sources included: results of surveys, minutes and materials for governance committees, email conversations between staff, members and stakeholders of the organization, my own observations and performance reports generated by the ongoing measurement initiative. Data were analysed using template analysis. The artifact in this study was Data to Decisions (D2D) a multifaceted initiative that involves member engagement, supporting materials, a performance report and communication. The study showed that participation in D2D was high and that the initiative was generally considered to be successful. The key themes emerging from the experience with D2D were: a focus on relationships; a dynamic of help-seeking and self-reliant behaviour, a range of perceptions of priority and a clear intent and ability to “get started” with measurement. Reflections on these themes generated actions, the fate of which was described and reflected on in the final phases of the action research study. Implications of the data were presented for consideration by the organization as the ongoing measurement work continues, independent of this action research study. In this way, the study contributed to the organization’s ability to support ongoing measurement and improvement of performance. The observation that relationships are more important in participation in performance measurement than the actual indicators being measured is a useful contribution to professional knowledge regarding performance measurement in primary care. The thesis concludes with a reflexive moment in which I described the purpose and nature of reflexivity involved in my action research and summarize my role as a scholar-practitioner and my reflections on the project as a whole
Security and Privacy for Modern Wireless Communication Systems
The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks
Unleashing the Power of Edge-Cloud Generative AI in Mobile Networks: A Survey of AIGC Services
Artificial Intelligence-Generated Content (AIGC) is an automated method for
generating, manipulating, and modifying valuable and diverse data using AI
algorithms creatively. This survey paper focuses on the deployment of AIGC
applications, e.g., ChatGPT and Dall-E, at mobile edge networks, namely mobile
AIGC networks, that provide personalized and customized AIGC services in real
time while maintaining user privacy. We begin by introducing the background and
fundamentals of generative models and the lifecycle of AIGC services at mobile
AIGC networks, which includes data collection, training, finetuning, inference,
and product management. We then discuss the collaborative cloud-edge-mobile
infrastructure and technologies required to support AIGC services and enable
users to access AIGC at mobile edge networks. Furthermore, we explore
AIGCdriven creative applications and use cases for mobile AIGC networks.
Additionally, we discuss the implementation, security, and privacy challenges
of deploying mobile AIGC networks. Finally, we highlight some future research
directions and open issues for the full realization of mobile AIGC networks
A Survey on Fundamental Limits of Integrated Sensing and Communication
The integrated sensing and communication (ISAC), in which the sensing and communication share the same frequency band and hardware, has emerged as a key technology in future wireless systems due to two main reasons. First, many important application scenarios in fifth generation (5G) and beyond, such as autonomous vehicles, Wi-Fi sensing and extended reality, requires both high-performance sensing and wireless communications. Second, with millimeter wave and massive multiple-input multiple-output (MIMO) technologies widely employed in 5G and beyond, the future communication signals tend to have high-resolution in both time and angular domain, opening up the possibility for ISAC. As such, ISAC has attracted tremendous research interest and attentions in both academia and industry. Early works on ISAC have been focused on the design, analysis and optimization of practical ISAC technologies for various ISAC systems. While this line of works are necessary, it is equally important to study the fundamental limits of ISAC in order to understand the gap between the current state-of-the-art technologies and the performance limits, and provide useful insights and guidance for the development of better ISAC technologies that can approach the performance limits. In this paper, we aim to provide a comprehensive survey for the current research progress on the fundamental limits of ISAC. Particularly, we first propose a systematic classification method for both traditional radio sensing (such as radar sensing and wireless localization) and ISAC so that they can be naturally incorporated into a unified framework. Then we summarize the major performance metrics and bounds used in sensing, communications and ISAC, respectively. After that, we present the current research progresses on fundamental limits of each class of the traditional sensing and ISAC systems. Finally, the open problems and future research directions are discussed
Intelligent Circuits and Systems
ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fields of Energy, Electronics, Communications, Computers, and Control. ICICS provides innovators to identify new opportunities for the social and economic benefits of society.  This conference bridges the gap between academics and R&D institutions, social visionaries, and experts from all strata of society to present their ongoing research activities and foster research relations between them. It provides opportunities for the exchange of new ideas, applications, and experiences in the field of smart technologies and finding global partners for future collaboration. The ICICS-2020 was conducted in two broad categories, Intelligent Circuits & Intelligent Systems and Emerging Technologies in Electrical Engineering
- …