10 research outputs found

    Low-Complexity Puncturing and Shortening of Polar Codes

    Full text link
    In this work, we address the low-complexity construction of shortened and punctured polar codes from a unified view. While several independent puncturing and shortening designs were attempted in the literature, our goal is a unique, low-complexity construction encompassing both techniques in order to achieve any code length and rate. We observe that our solution significantly reduces the construction complexity as compared to state-of-the-art solutions while providing a block error rate performance comparable to constructions that are highly optimized for specific lengths and rates. This makes the constructed polar codes highly suitable for practical application in future communication systems requiring a large set of polar codes with different lengths and rates.Comment: to appear in WCNC 2017 - "Polar Coding in Wireless Communications: Theory and Implementation" Worksho

    Optimizing MDS Codes for Caching at the Edge

    Full text link
    In this paper we investigate the problem of optimal MDS-encoded cache placement at the wireless edge to minimize the backhaul rate in heterogeneous networks. We derive the backhaul rate performance of any caching scheme based on file splitting and MDS encoding and we formulate the optimal caching scheme as a convex optimization problem. We then thoroughly investigate the performance of this optimal scheme for an important heterogeneous network scenario. We compare it to several other caching strategies and we analyze the influence of the system parameters, such as the popularity and size of the library files and the capabilities of the small-cell base stations, on the overall performance of our optimal caching strategy. Our results show that the careful placement of MDS-encoded content in caches at the wireless edge leads to a significant decrease of the load of the network backhaul and hence to a considerable performance enhancement of the network.Comment: to appear in Globecom 201

    Cooperation for Secrecy in Wireless Networks

    No full text
    The growth of wireless networks has been considerable over the last decades. Due to the broadcast nature of these networks, security issues have taken a critical role in today’s communications. A promising direction towards achieving secure communications is information theoretic secrecy, which is an approach exploiting the randomness of the channels to ensure secrecy. Based on this approach, there has been a recent surge of interest in a potential cooperation between users to enhance the secrecy of communications. In this thesis we investigate the interaction between cooperation and secrecy. In particular the contributions of the thesis can be divided into two parts. In the first part, we study cooperative strategies for secrecy for wireless channels. Our goal is to evaluate the effect of fading and limited CSI on the eavesdropper’s channels. In that purpose we consider a scenario where a helper aims at increasing the secrecy of the communication between a source and destination in the presence of an eavesdropper. Several strategies are discussed for the helper, namely decode-and-forward, amplify-and-forward, and cooperative jamming. We introduce the secrecy outage probability, the conditional secrecy outage probability and the secure throughput as secrecy measures. For each measure, we investigate and compare the secrecy performance of cooperation. We furthermore elaborate a system optimization in terms of strategy selection, node positioning, power allocation and rate design. In the second part, we consider cooperation in the 4-node scenario against a more sophisticated adversary: an active eavesdropper, which can either passively eavesdrop, or jam the transmission. A game-theoretic perspective is a natural way to analyze the competitive interaction between the helper and the eavesdropper. Therefore we define several secrecy games, for which we find the Nash and Stackelberg equilibria as well as the corresponding secrecy rate outcomes. Another important consideration in this scenario is the interaction between the source and the helper, which we model and solve as a Stackelberg game, and we illustrate its impact on the achievable secrecy rates.QC 20120822</p

    Secrecy in Cognitive Radio Networks

    No full text
    With the considerable growth of wireless networks in recent years, the issue of network security has taken an important role in the design of communication devices and protocols. Indeed, due to the broadcast nature of these networks, communications can potentially be attacked by malicious parties, and therefore, the protection of transmitted data has become a main concern in today's communications. On the other hand the cooperation of nodes overhearing the transmission may potentially lead to a better performance. In this thesis we combine both fundamental concepts of cooperation and secrecy in wireless networks. In particular we investigate the cooperation between transmitters in a cognitive radio network where the secondary receiver is treated as a potential eavesdropper to the primary transmission. We study this novel model focusing on several fundamental aspects. First we derive achievable rate regions for different transmission schemes, such as cooperative jamming and relaying, with and without primary message knowledge at the secondary transmitter. For these schemes, we formulate and solve three relevant power allocation problems: the maximization of the achievable primary and secondary rates, and the minimization of the secondary transmitting power. We model the interaction between the transmitting users as a Stackelberg game corresponding to a more realistic power allocation problem. We solve the game and illustrate its impact on the achievable rates. Secondly we generalize our system model by introducing the multi-phase clean relaying (CR) scheme, which takes into account the message-learning constraint at the secondary transmitter, and we derive the achievable rate region for this scheme. We compare our CR scheme to other transmission strategies such as dirty paper coding, interference neutralization, and pure cooperative jamming.  Thirdly we extend our model to the generalized scenario where multiple secondary transmitter-receiver pairs wish to access the spectrum. For this scenario, we define and study several types of games between the primary network and the secondary pairs, such as Stackelberg games, power control games, and auction games. We derive the equilibrium of each game considered, which allows us to predict the behavior of the users in the cognitive radio network with multiple secondary pairs. Moreover we consider the important concept of energy efficiency (EE) for the performance of the cognitive radio network and we derive the power allocation and power splitting maximizing the secondary transmitter's energy efficiency. An important EE Stackelberg game between the two transmitters is formulated, and the impact of the game theoretic interaction is analyzed.  Finally we motivate and investigate information theoretic secrecy using key agreement techniques in wireless networks. In particular we derive achievable secret key rate regions for two different key agreement schemes in Gaussian channels using several transmission strategies such as power control and cooperative jamming. The interaction between transmitting users is analyzed from a game theoretic perspective using non-cooperative game theory. For every fundamental perspective considered for the analysis of the model studied in the thesis, our results are illustrated through numerical examples based on a geometrical setup, highlighting the impact of the node geometry on the achievable rates, the optimal strategies, the games' equilibria and the impact of the game theoretic interaction between transmitters on the system performance.QC 20141110</p

    Pilot Contamination Attack Detection by Key-Confirmation in Secure MIMO Systems

    No full text
    Many security techniques working at the physical layer need a correct channel state information (CSI) at the transmitter, especially when devices are equipped with multiple antennas. Therefore such techniques are vulnerable to pilot contamination attacks (PCAs) by which an attacker aims at inducing false CSI. In this paper we provide a solution to some PCA methods, by letting two legitimate parties to compare their channel estimates. The comparison is made in order to minimize the information leakage on the channel to a possible attacker. By reasonable assumptions on both the channel knowledge by the attacker and the correlation properties of the attacker and legitimate channels we show the validity of our solution. An accurate analysis of possible attacks and countermeasures is provided, together with a numerical evaluation of the attainable secrecy outage probability when our solution is used in conjunction with beamforming for secret communications.Comment: accepted, appears in IEEE GLOBECOM 201

    Multi-Kernel Polar Codes: Concept and Design Principles

    No full text

    Interference Neutralization vs Clean Relaying in Cognitive Radio Networks with Secrecy

    No full text
    In this paper we study cognitive radio networks with secrecy constraints on the primary transmission. In particular we consider several transmission schemes for the secondary transmitter, namely interference neutralization (IN) and cooperative jamming with and without clean relaying (CR). We derive and analyze the achievable secondary rate performance of the schemes. Furthermore we thoroughly investigate the advantages and shortcomings of these schemes through numerical simulations in a geometric model where we highlight the impact of the users’ locations and show the important difference in all schemes depending on the topology. Our results show that the secondary transmitter can successfully adapt its transmission scheme (and parameters), i.e., either IN or CR, depending on its location to maximize its rate while insuring perfect secrecy of the primary transmission
    corecore