24 research outputs found

    Achievable Rate Regions for Two-Way Relay Channel using Nested Lattice Coding

    Get PDF
    This paper studies Gaussian Two-Way Relay Channel where two communication nodes exchange messages with each other via a relay. It is assumed that all nodes operate in half duplex mode without any direct link between the communication nodes. A compress-and-forward relaying strategy using nested lattice codes is first proposed. Then, the proposed scheme is improved by performing a layered coding : a common layer is decoded by both receivers and a refinement layer is recovered only by the receiver which has the best channel conditions. The achievable rates of the new scheme are characterized and are shown to be higher than those provided by the decode-and-forward strategy in some regions.Comment: 27 pages, 13 figures, Submitted to IEEE Transactions on Wireless Communications (October 2013

    Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications

    Get PDF
    This paper investigates the energy consumption minimization for resource scheduling in a wireless communication. We propose to take into account a strict delay constraint for each queued packet rather than an average delay constraint, in addition to a buffer overflow constraint. The associated optimization problem can be modeled as Constraint Markov Decision Problem where the actions are the number of packets sent on the known channel at each slot. The optimal random policy is exhibited through the resolution of standard linear programming. We show the gain in energy is substantial compared to naive policy

    Testing Against Independence with an Eavesdropper

    Full text link
    We study a distributed binary hypothesis testing (HT) problem with communication and security constraints, involving three parties: a remote sensor called Alice, a legitimate decision centre called Bob, and an eavesdropper called Eve, all having their own source observations. In this system, Alice conveys a rate R description of her observation to Bob, and Bob performs a binary hypothesis test on the joint distribution underlying his and Alice's observations. The goal of Alice and Bob is to maximise the exponential decay of Bob's miss-detection (type II-error) probability under two constraints: Bob's false alarm-probability (type-I error) probability has to stay below a given threshold and Eve's uncertainty (equivocation) about Alice's observations should stay above a given security threshold even when Eve learns Alice's message. For the special case of testing against independence, we characterise the largest possible type-II error exponent under the described type-I error probability and security constraints.Comment: submitted to ITW 202

    Multi-library Coded Caching with Partial Secrecy

    Full text link
    International audienceThe paper considers a coded caching setup with two libraries and where only one of them needs to be kept secret from an external eavesdropper. We provide upper and lower bounds on the secrecy rate-memory tradeoff for systems with K = 2 or K = 3 receivers. Our bounds are tight in some regimes and show that the standard (non-secure) coded caching upper bound can be approached for a wide range of parameters. In some cases, the proposed upper bound on the secrecy rate-memory tradeoff is even lower than the lower bound for standard coded caching. The reason is that in our setup the ratio of receivers requesting secure files over those requesting nonsecure files is fixed and known to everyone in advance. The transmitter can thus adjust the contents stored in the cache memories to this ratio

    On the energy efficiency of base station cooperation under limited backhaul capacity

    Full text link
    A part of this work is published in the IEEE 3rd International Conference on Communications and Networking (ComNet’2012)International audienceRecently, energy-efficient (EE) communications have received increasing interest specially in cellular networks. Promising techniques, such as multiple input multiple output (MIMO) and base station (BS) cooperation schemes, have been widely studied in the past to improve the spectral efficiency and the reliability. Nowadays, the purpose is to investigate how these techniques can reduce the energy consumption of the systems. In this paper, we address for a single-user scenario, the energy efficiency of two BSs cooperation under limited backhaul capacity. In order to evaluate the EE metric, we provide first an information-theoretical analysis based on the outage probability, for a quantization model over the backhaul. Then, we extend this EE analysis to a more practical approach with data transmission over the backhaul. For both approaches, we identify by numerical/simulation results the cooperation scenarios that can save energy depending on the backhaul capacity

    Mixing a Covert and a Non-Covert User

    Full text link
    This paper establishes the fundamental limits of a two-user single-receiver system where communication from User 1 (but not from User 2) needs to be undetectable to an external warden. Our fundamental limits show a tradeoff between the highest rates (or square-root rates) that are simultaneously achievable for the two users. Moreover, coded time-sharing for both users is fundamentally required on most channels, which distinguishes this setup from the more classical setups with either only covert users or only non-covert users. Interestingly, the presence of a non-covert user can be beneficial for improving the covert capacity of the other user.Comment: Accepted to 2023 IEEE International Symposium on Information Theory (ISIT

    Joint Resource Scheduling and Computation Offloading for Energy Harvesting Communications

    Full text link
    International audienceThis paper studies the joint optimization of resource scheduling and computation offloading for mobile networks where energy harvesting (EH)-enabled devices are wirelessly connected to nearby base stations (BSs), which can be endowed with some computational capabilities. We consider that a mobile device may run its applications either locally or remotely at its serving base station. We also consider that its applications are strict delay constraints. Our objective is to minimize the packets' loss due to buffer overflow or delay violation of the queued packets at the mobile device. We formulate this problem as a Markov Decision Process (MDP) and exhibit an optimal deterministic offline scheduling-offloading policy. This policy makes decision on the processing location (either local or offloading) and on the number of processed packets by relying on the knowledge on the current channel, the past data and energy arrivals as well as the harvested energy available in the battery. We show through numerical results that the proposed policy can significantly improve the successfully received packets' rate and the energy consumption compared to other policies, such as immediate scheduling or only local processing or only offloading policies

    Efficient network representation for GNN-based intrusion detection

    Full text link
    International Conference on Applied Cryptography and Network Security (ACNS 2023)International audienceThe last decades have seen a growth in the number of cyber-attacks with severe economic and privacy damages, which reveals the need for network intrusion detection approaches to assist in preventing cyber-attacks and reducing their risks. In this work, we propose a novel network representation as a graph of flows that aims to provide relevant topological information for the intrusion detection task, such as malicious behavior patterns, the relation between phases of multi-step attacks, and the relation between spoofed and pre-spoofed attackers’ activities. In addition, we present a Graph Neural Network (GNN) based-framework responsible for exploiting the proposed graph structure to classify communication flows by assigning them a maliciousness score. The framework comprises three main steps that aim to embed nodes’ features and learn relevant attack patterns from the network representation. Finally, we highlight a potential data leakage issue with classical evaluation procedures and suggest a solution to ensure a reliable validation of intrusion detection systems’ performance. We implement the proposed framework and prove that exploiting the flow-based graph structure outperforms the classical machine learning-based and the previous GNN-based solutions

    Decentralized Coded Caching for Wiretap Broadcast Channels

    Full text link
    International audienceWe consider a K-receiver wiretap broadcast channel where Kw receivers are weak and have cache memories and Ks receivers are strong and have no cache memories. We derive an upper bound on the secrecy rate-memory tradeoff under a joint secrecy constraint and under decentralized caching. In contrast to previous works, prefetching in our scheme is purely decentralized and receivers randomly sample from a random key stream available at the transmitter and from the files in a library. For small cache sizes, the performance of our scheme improves with increasing length of the random key stream. For moderate and large cache sizes, a small key stream suffices to perform close to the information-theoretic limit of the system

    Packet Scheduling and Computation Offloading for Energy Harvesting Devices without CSIT

    Full text link
    Virtual conferenceInternational audienceThis paper proposes a joint packet scheduling and computation offloading policy for an Energy Harvesting (EH) mobile terminal wirelessly connected to a Base Station (BS) when the channel between the mobile and the BS is unavailable at the mobile side. The mobile terminal has to decide if its packet related to one application is computed either locally or remotely by the BS within a strict delay imposed by this application without knowing the channel in advance. Our objective is to guarantee reliable communication by minimizing the packet loss. This packet loss is due to buffer overflow, strict delay violation and channel mismatch. We formulate the problem using a Markov Decision Process (MDP) and we propose and implement the optimal deterministic offline policy to solve it. This optimal policy decides: (i) the execution location (locally or remotely), (ii) the number of packets to be executed and (iii) the corresponding transmission power. This policy offers a dramatic increase in the number of executed packets and a significant energy saving
    corecore