270 research outputs found
Percolation and Connectivity in the Intrinsically Secure Communications Graph
The ability to exchange secret information is critical to many commercial,
governmental, and military networks. The intrinsically secure communications
graph (iS-graph) is a random graph which describes the connections that can be
securely established over a large-scale network, by exploiting the physical
properties of the wireless medium. This paper aims to characterize the global
properties of the iS-graph in terms of: (i) percolation on the infinite plane,
and (ii) full connectivity on a finite region. First, for the Poisson iS-graph
defined on the infinite plane, the existence of a phase transition is proven,
whereby an unbounded component of connected nodes suddenly arises as the
density of legitimate nodes is increased. This shows that long-range secure
communication is still possible in the presence of eavesdroppers. Second, full
connectivity on a finite region of the Poisson iS-graph is considered. The
exact asymptotic behavior of full connectivity in the limit of a large density
of legitimate nodes is characterized. Then, simple, explicit expressions are
derived in order to closely approximate the probability of full connectivity
for a finite density of legitimate nodes. The results help clarify how the
presence of eavesdroppers can compromise long-range secure communication.Comment: Submitted for journal publicatio
Continuum Percolation in the Intrinsically Secure Communications Graph
The intrinsically secure communications graph (iS-graph) is a random graph
which captures the connections that can be securely established over a
large-scale network, in the presence of eavesdroppers. It is based on
principles of information-theoretic security, widely accepted as the strictest
notion of security. In this paper, we are interested in characterizing the
global properties of the iS-graph in terms of percolation on the infinite
plane. We prove the existence of a phase transition in the Poisson iS-graph,
whereby an unbounded component of securely connected nodes suddenly arises as
we increase the density of legitimate nodes. Our work shows that long-range
communication in a wireless network is still possible when a secrecy constraint
is present.Comment: Accepted in the IEEE International Symposium on Information Theory
and its Applications (ISITA'10), Taichung, Taiwan, Oct. 201
Power Optimization for Network Localization
Reliable and accurate localization of mobile objects is essential for many
applications in wireless networks. In range-based localization, the position of
the object can be inferred using the distance measurements from wireless
signals exchanged with active objects or reflected by passive ones. Power
allocation for ranging signals is important since it affects not only network
lifetime and throughput but also localization accuracy. In this paper, we
establish a unifying optimization framework for power allocation in both active
and passive localization networks. In particular, we first determine the
functional properties of the localization accuracy metric, which enable us to
transform the power allocation problems into second-order cone programs
(SOCPs). We then propose the robust counterparts of the problems in the
presence of parameter uncertainty and develop asymptotically optimal and
efficient near-optimal SOCP-based algorithms. Our simulation results validate
the efficiency and robustness of the proposed algorithms.Comment: 15 pages, 7 figure
MIMO Networks: the Effects of Interference
Multiple-input/multiple-output (MIMO) systems promise enormous capacity
increase and are being considered as one of the key technologies for future
wireless networks. However, the decrease in capacity due to the presence of
interferers in MIMO networks is not well understood. In this paper, we develop
an analytical framework to characterize the capacity of MIMO communication
systems in the presence of multiple MIMO co-channel interferers and noise. We
consider the situation in which transmitters have no information about the
channel and all links undergo Rayleigh fading. We first generalize the known
determinant representation of hypergeometric functions with matrix arguments to
the case when the argument matrices have eigenvalues of arbitrary multiplicity.
This enables the derivation of the distribution of the eigenvalues of Gaussian
quadratic forms and Wishart matrices with arbitrary correlation, with
application to both single user and multiuser MIMO systems. In particular, we
derive the ergodic mutual information for MIMO systems in the presence of
multiple MIMO interferers. Our analysis is valid for any number of interferers,
each with arbitrary number of antennas having possibly unequal power levels.
This framework, therefore, accommodates the study of distributed MIMO systems
and accounts for different positions of the MIMO interferers.Comment: Submitted to IEEE Trans. on Info. Theor
Adaptive recurrence quantum entanglement distillation for two-Kraus-operator channels
Quantum entanglement serves as a valuable resource for many important quantum
operations. A pair of entangled qubits can be shared between two agents by
first preparing a maximally entangled qubit pair at one agent, and then sending
one of the qubits to the other agent through a quantum channel. In this
process, the deterioration of entanglement is inevitable since the noise
inherent in the channel contaminates the qubit. To address this challenge,
various quantum entanglement distillation (QED) algorithms have been developed.
Among them, recurrence algorithms have advantages in terms of implementability
and robustness. However, the efficiency of recurrence QED algorithms has not
been investigated thoroughly in the literature. This paper put forth two
recurrence QED algorithms that adapt to the quantum channel to tackle the
efficiency issue. The proposed algorithms have guaranteed convergence for
quantum channels with two Kraus operators, which include phase-damping and
amplitude-damping channels. Analytical results show that the convergence speed
of these algorithms is improved from linear to quadratic and one of the
algorithms achieves the optimal speed. Numerical results confirm that the
proposed algorithms significantly improve the efficiency of QED
- …