10 research outputs found
Low-Complexity Puncturing and Shortening of Polar Codes
In this work, we address the low-complexity construction of shortened and
punctured polar codes from a unified view. While several independent puncturing
and shortening designs were attempted in the literature, our goal is a unique,
low-complexity construction encompassing both techniques in order to achieve
any code length and rate. We observe that our solution significantly reduces
the construction complexity as compared to state-of-the-art solutions while
providing a block error rate performance comparable to constructions that are
highly optimized for specific lengths and rates. This makes the constructed
polar codes highly suitable for practical application in future communication
systems requiring a large set of polar codes with different lengths and rates.Comment: to appear in WCNC 2017 - "Polar Coding in Wireless Communications:
Theory and Implementation" Worksho
Optimizing MDS Codes for Caching at the Edge
In this paper we investigate the problem of optimal MDS-encoded cache
placement at the wireless edge to minimize the backhaul rate in heterogeneous
networks. We derive the backhaul rate performance of any caching scheme based
on file splitting and MDS encoding and we formulate the optimal caching scheme
as a convex optimization problem. We then thoroughly investigate the
performance of this optimal scheme for an important heterogeneous network
scenario. We compare it to several other caching strategies and we analyze the
influence of the system parameters, such as the popularity and size of the
library files and the capabilities of the small-cell base stations, on the
overall performance of our optimal caching strategy. Our results show that the
careful placement of MDS-encoded content in caches at the wireless edge leads
to a significant decrease of the load of the network backhaul and hence to a
considerable performance enhancement of the network.Comment: to appear in Globecom 201
Cooperation for Secrecy in Wireless Networks
The growth of wireless networks has been considerable over the last decades. Due to the broadcast nature of these networks, security issues have taken a critical role in today’s communications. A promising direction towards achieving secure communications is information theoretic secrecy, which is an approach exploiting the randomness of the channels to ensure secrecy. Based on this approach, there has been a recent surge of interest in a potential cooperation between users to enhance the secrecy of communications. In this thesis we investigate the interaction between cooperation and secrecy. In particular the contributions of the thesis can be divided into two parts. In the first part, we study cooperative strategies for secrecy for wireless channels. Our goal is to evaluate the effect of fading and limited CSI on the eavesdropper’s channels. In that purpose we consider a scenario where a helper aims at increasing the secrecy of the communication between a source and destination in the presence of an eavesdropper. Several strategies are discussed for the helper, namely decode-and-forward, amplify-and-forward, and cooperative jamming. We introduce the secrecy outage probability, the conditional secrecy outage probability and the secure throughput as secrecy measures. For each measure, we investigate and compare the secrecy performance of cooperation. We furthermore elaborate a system optimization in terms of strategy selection, node positioning, power allocation and rate design. In the second part, we consider cooperation in the 4-node scenario against a more sophisticated adversary: an active eavesdropper, which can either passively eavesdrop, or jam the transmission. A game-theoretic perspective is a natural way to analyze the competitive interaction between the helper and the eavesdropper. Therefore we define several secrecy games, for which we find the Nash and Stackelberg equilibria as well as the corresponding secrecy rate outcomes. Another important consideration in this scenario is the interaction between the source and the helper, which we model and solve as a Stackelberg game, and we illustrate its impact on the achievable secrecy rates.QC 20120822</p
Secrecy in Cognitive Radio Networks
With the considerable growth of wireless networks in recent years, the issue of network security has taken an important role in the design of communication devices and protocols. Indeed, due to the broadcast nature of these networks, communications can potentially be attacked by malicious parties, and therefore, the protection of transmitted data has become a main concern in today's communications. On the other hand the cooperation of nodes overhearing the transmission may potentially lead to a better performance. In this thesis we combine both fundamental concepts of cooperation and secrecy in wireless networks. In particular we investigate the cooperation between transmitters in a cognitive radio network where the secondary receiver is treated as a potential eavesdropper to the primary transmission. We study this novel model focusing on several fundamental aspects. First we derive achievable rate regions for different transmission schemes, such as cooperative jamming and relaying, with and without primary message knowledge at the secondary transmitter. For these schemes, we formulate and solve three relevant power allocation problems: the maximization of the achievable primary and secondary rates, and the minimization of the secondary transmitting power. We model the interaction between the transmitting users as a Stackelberg game corresponding to a more realistic power allocation problem. We solve the game and illustrate its impact on the achievable rates. Secondly we generalize our system model by introducing the multi-phase clean relaying (CR) scheme, which takes into account the message-learning constraint at the secondary transmitter, and we derive the achievable rate region for this scheme. We compare our CR scheme to other transmission strategies such as dirty paper coding, interference neutralization, and pure cooperative jamming. Â Thirdly we extend our model to the generalized scenario where multiple secondary transmitter-receiver pairs wish to access the spectrum. For this scenario, we define and study several types of games between the primary network and the secondary pairs, such as Stackelberg games, power control games, and auction games. We derive the equilibrium of each game considered, which allows us to predict the behavior of the users in the cognitive radio network with multiple secondary pairs. Moreover we consider the important concept of energy efficiency (EE) for the performance of the cognitive radio network and we derive the power allocation and power splitting maximizing the secondary transmitter's energy efficiency. An important EE Stackelberg game between the two transmitters is formulated, and the impact of the game theoretic interaction is analyzed. Â Finally we motivate and investigate information theoretic secrecy using key agreement techniques in wireless networks. In particular we derive achievable secret key rate regions for two different key agreement schemes in Gaussian channels using several transmission strategies such as power control and cooperative jamming. The interaction between transmitting users is analyzed from a game theoretic perspective using non-cooperative game theory. For every fundamental perspective considered for the analysis of the model studied in the thesis, our results are illustrated through numerical examples based on a geometrical setup, highlighting the impact of the node geometry on the achievable rates, the optimal strategies, the games' equilibria and the impact of the game theoretic interaction between transmitters on the system performance.QC 20141110</p
Pilot Contamination Attack Detection by Key-Confirmation in Secure MIMO Systems
Many security techniques working at the physical layer need a correct channel
state information (CSI) at the transmitter, especially when devices are
equipped with multiple antennas. Therefore such techniques are vulnerable to
pilot contamination attacks (PCAs) by which an attacker aims at inducing false
CSI. In this paper we provide a solution to some PCA methods, by letting two
legitimate parties to compare their channel estimates. The comparison is made
in order to minimize the information leakage on the channel to a possible
attacker. By reasonable assumptions on both the channel knowledge by the
attacker and the correlation properties of the attacker and legitimate channels
we show the validity of our solution. An accurate analysis of possible attacks
and countermeasures is provided, together with a numerical evaluation of the
attainable secrecy outage probability when our solution is used in conjunction
with beamforming for secret communications.Comment: accepted, appears in IEEE GLOBECOM 201
Interference Neutralization vs Clean Relaying in Cognitive Radio Networks with Secrecy
In this paper we study cognitive radio networks with secrecy constraints on the primary transmission. In particular we consider several transmission schemes for the secondary transmitter, namely interference neutralization (IN) and cooperative jamming with and without clean relaying (CR). We derive and analyze the achievable secondary rate performance of the schemes. Furthermore we thoroughly investigate the advantages and shortcomings of these schemes through numerical simulations in a geometric model where we highlight the impact of the users’ locations and show the important difference in all schemes depending on the topology. Our results show that the secondary transmitter can successfully adapt its transmission scheme (and parameters), i.e., either IN or CR, depending on its location to maximize its rate while insuring perfect secrecy of the primary transmission