Physical Layer Security from Inter-Session Interference in Large Wireless Networks

Size: px
Start display at page:

Download "Physical Layer Security from Inter-Session Interference in Large Wireless Networks"

Transcription

1 Physical Layer Security from Inter-Session Interference in Large Wireless Networks Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik, Don Towsley University of Massachussets, Amherst

2 Outline 1. Motivation 2. Introduction 3. First scenario: Equal path-loss between all pairs of nodes 4. Second scenario: General case 5. Conclusion 2

3 Motivation Conventional way to achieve secrecy: Cryptography Computationally unlimited eavesdropper Breaking encryption system later Perfect Secrecy [Shannon]: Unconditional secrecy One time pad 3

4 Motivation Wiretap Channel [Wyner]: Eve s channel degraded with respect to Bob s channel General Wiretap channel: Bob s channel better than Eve s channel 4

5 Motivation Gaussian wiretap channel: C S = log 1 + γ M log(1 + γ E ) Choosing γ M < γ E ensures a positive secrecy capacity γ E so small that Eve s decoder can never recover the message Problems in wireless networks: Close eavesdropper Eavesdropper with unknown location or channel gain 5

6 Motivation Cooperative jamming: Jammer s signal in the null space of Bob s channel Degrades Eve s channel with high probability Drawbacks: Low power efficiency Power expended on artificial noise Low throughput Only one node can transmit at each time slot. The location and/or CSI of Eve is known. 6

7 Motivation 1. Can we do something more power efficient? 2. Can we achieve higher throughput? 3. Can we achieve secrecy without knowing the location and channel gain of the eavesdropper? 7

8 Introduction Multipath fading: Reflectors in the environment Receiver sees the superposition Rayleigh fading Fading gain has an Exponential distribution Fact: Y 1,, Y n be a sequence of n i.i.d. exponential r.v.s with parameter λ, max(y 1,, Y n ) log n λ as n a.s. 8

9 Introduction Large wireless network: Many system nodes Many eavesdroppers 9

10 Introduction Cooperative jamming + relay [Goeckel, et. al., JSAC 2011]: A source-destination pair choose a relay node with large gain to both The other helper nodes chatter 10

11 First Scenario Equal path loss between all pairs of nodes Outline of protocol 1: Relay selection Transmission from Sources to relays Transmission from Relays to destinations The interference of other transmitters hides each message Multiple nodes can transmit in each time slot 11

12 First Scenario Equal path loss between all pairs of nodes Theorem: For the proposed protocol, m(n) eavesdroppers can be tolerated (S D) guaranteeing P OUT 0, for each source S which transmits a message, (E) and P OUT 1 as n is: nlog(1+γe) 2et m n = o log n where n is the number of system nodes, γ E is the required SINR threshold at each eavesdropper, and t is a constant. 12

13 Second Scenario General case Extended network Multi-hop in Gupta-Kumar framework Secure communication between two adjacent cells Tessellate the active cell into square sub-cells: 13

14 Second Scenario General case Outline of protocol 2: Choose one relay with fading greater that log N A group of nodes transmit messages simultaneously The interference of other transmitters hides each message Multiple nodes can transmit in each time slot 14

15 Second Scenario General case Theorem: By applying the proposed protocol, m(n) eavesdroppers can be (S R) tolerated guaranteeing P OUT 0, for each source S which transmits (E) a message, and P OUT 1 as N is: Nlog(1+γE2 α) 8et m N = o log N where N is the number of nodes in each cell, γ E is the required SINR threshold at each eavesdropper, α is the path-loss exponent, and t is a constant. 15

16 Conclusion 1. Equal path-loss between all pairs of nodes: A protocol for two hop communication between a large number of source-destination pairs via one relay for each pair is proposed. 2. General case in an extended network: A multi-hop strategy in a Gupta-Kumar framework is considered. In contrast to other cooperative jamming schemes, all the energy is used to transmit messages. No extra energy required to obtain secrecy. A large number of nodes share the same bandwidth simultaneously and achieve a higher bandwidth efficiency. 16

Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques

Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques Yulong Zou, Senior Member, IEEE, Jia Zhu, Xianbin Wang, Senior Member, IEEE, and Victor C.M. Leung, Fellow, IEEE

More information

The Capacity of Wireless Networks

The Capacity of Wireless Networks The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #6 Physical Layer Security 1 Leveraging PHY Properties Each wireless link behaves differently A single transmission looks different to each

More information

Remote State Estimation in the Presence of an Eavesdropper

Remote State Estimation in the Presence of an Eavesdropper Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and Communication Theory in Control Systems, TUM, May 2017 Alex Leong (Paderborn University)

More information

Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks

Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks January 11, 2008 Abstract In this paper, we study multicast in large-scale wireless ad hoc networks. Consider N nodes that are

More information

Physical Layer Security for Cyber-Physical Systems: Friendly Jammers

Physical Layer Security for Cyber-Physical Systems: Friendly Jammers Physical Layer Security for Cyber-Physical Systems: Friendly Jammers GUNES KARABULUT KURT gkurt@itu.edu.tr Wireless Communications and Research Laboratory (WCRL) ISTANBUL TECHNICAL UNIVERSITY ITU WCRL

More information

Delay-Throughput Tradeoff for Supportive Two-Tier Networks

Delay-Throughput Tradeoff for Supportive Two-Tier Networks Delay-Throughput Tradeoff for Supportive Two-Tier Networks arxiv:082.4826v [cs.it] 28 Dec 2008 Long Gao, Rui Zhang, Changchuan Yin, Shuguang Cui Department of Electrical and Computer Engineering Texas

More information

Distributed MIMO. Patrick Maechler. April 2, 2008

Distributed MIMO. Patrick Maechler. April 2, 2008 Distributed MIMO Patrick Maechler April 2, 2008 Outline 1. Motivation: Collaboration scheme achieving optimal capacity scaling 2. Distributed MIMO 3. Synchronization errors 4. Implementation 5. Conclusion/Outlook

More information

Design and Evaluation of the Ultra- Reliable Low-Latency Wireless Protocol EchoRing

Design and Evaluation of the Ultra- Reliable Low-Latency Wireless Protocol EchoRing Design and Evaluation of the Ultra- Reliable Low-Latency Wireless Protocol EchoRing BWRC, September 22 nd 2017 joint work with C. Dombrowski, M. Serror, Y. Hu, S. Junges Machine-Type Communications: Origins

More information

SECRET SHARING IN FAST FADING CHANNELS BASED ON RELIABILITY-BASED HYBRID ARQ

SECRET SHARING IN FAST FADING CHANNELS BASED ON RELIABILITY-BASED HYBRID ARQ SECRET SHARING IN FAST FADING CHANNELS BASED ON RELIABILITY-BASED HYBRID ARQ Chan Wong Wong, John M. Shea, and Tan F. Wong Wireless Information Networking Group (WING) Department of Electrical and Computer

More information

On the Design of a Quality-of-Service Driven Routing Protocol for Wireless Cooperative Networks

On the Design of a Quality-of-Service Driven Routing Protocol for Wireless Cooperative Networks On the Design of a Quality-of-Service Driven Routing Protocol for Wireless Cooperative Networks Zhengguo Sheng, Zhiguo Ding, and Kin K Leung Department of Electrical and Electronic Engineering Imperial

More information

THE demand for widespread Internet access over large

THE demand for widespread Internet access over large 3596 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 Cooperative Strategies and Achievable Rate for Tree Networks With Optimal Spatial Reuse Omer Gurewitz, Member, IEEE, Alexandre

More information

CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS. Jaime Adeane, Miguel R.D. Rodrigues, and Ian J.

CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS. Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering,

More information

Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details

Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details Fouad A. Tobagi Stanford University Broadnets 2006 San Jose, October 4, 2006 Very Wide Range of

More information

An Architecture for Future Configurable Millimeter Wave Networks. Hang Liu

An Architecture for Future Configurable Millimeter Wave Networks. Hang Liu An Architecture for Future Configurable Millimeter Wave Networks Hang Liu Outline Motivation and Industrial Relevance Project Objectives Approach and Previous Results Future Work Outcome and Impact [2]

More information

B.E. ELECTRONICS & COMMUNICATION ENGINEERING SEMESTER - VII EC WIRELESS COMMUNICATION

B.E. ELECTRONICS & COMMUNICATION ENGINEERING SEMESTER - VII EC WIRELESS COMMUNICATION B.E. ELECTRONICS & COMMUNICATION ENGINEERING SEMESTER - VII EC2401 - WIRELESS COMMUNICATION Question Bank (ALL UNITS) UNIT-I: SERVICES & TECHNICAL CHALLENGES PART A 1. What are the types of Services? (Nov.

More information

University of Alberta. Routing Strategies for Multihop Wireless Relaying Networks. Ramin Babaee. Master of Science

University of Alberta. Routing Strategies for Multihop Wireless Relaying Networks. Ramin Babaee. Master of Science University of Alberta Routing Strategies for Multihop Wireless Relaying Networks by Ramin Babaee A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements

More information

APP-PHY Interactions in Wireless Networks

APP-PHY Interactions in Wireless Networks University of Minnesota September 29, 2009 APP-PHY Interactions in Wireless Networks Vince Poor (poor@princeton.edu) APP-PHY Interactions in Wireless Nets Wireless Networks: Layers Application (APP) Web

More information

LTE and IEEE802.p for vehicular networking: a performance evaluation

LTE and IEEE802.p for vehicular networking: a performance evaluation LTE and IEEE802.p for vehicular networking: a performance evaluation Zeeshan Hameed Mir* Fethi Filali EURASIP Journal on Wireless Communications and Networking 1 Presenter Renato Iida v2 Outline Introduction

More information

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions Minimum Delay acket-sizing for inear Multi-hop Networks with Cooperative Transmissions Ning Wen and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern University, Evanston,

More information

On the Scalability of Hierarchical Ad Hoc Wireless Networks

On the Scalability of Hierarchical Ad Hoc Wireless Networks On the Scalability of Hierarchical Ad Hoc Wireless Networks Suli Zhao and Dipankar Raychaudhuri Fall 2006 IAB 11/15/2006 Outline Motivation Ad hoc wireless network architecture Three-tier hierarchical

More information

Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks

Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks Presentation: Alexandros Manolakos EE 360 Stanford University February 13, 2012 Table of Contents What are we trying to solve?

More information

CS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD

CS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD ERIK JONSSON SCHOOL OF ENGINEERING & COMPUTER SCIENCE Cyber Security Research and Education Institute CS 6324: Information Security Dr. Junia Valente Department of Computer Science The University of Texas

More information

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks X. Zhang, X. Dong Shanghai Jiaotong University J. Wu, X. Li Temple University, University of North Carolina N. Xiong Colorado

More information

Motivation. Mechanisms of Physical-Layer Security. Securenets 2011 May 20th, Secrecy metrics and examples. Information-Theoretic Secrecy Metrics

Motivation. Mechanisms of Physical-Layer Security. Securenets 2011 May 20th, Secrecy metrics and examples. Information-Theoretic Secrecy Metrics Mechanisms of Physical-Layer Security Securenets 2011 May 20th, 2011 Motivation Matthieu Bloch Georgia Institute of Technology School of Electrical and Computer Engineering Secrecy metrics and examples

More information

Wireless Network Capacity. Nitin Vaidya

Wireless Network Capacity. Nitin Vaidya Wireless Network Capacity Nitin Vaidya 2009 1 Wireless Networks Why use multi-hop routes to delivery data? Is this optimal? What s the best performance achievable? Capacity analysis can help answer such

More information

A Cross-Layer Design for Reducing Packet Loss Caused by Fading in a Mobile Ad Hoc Network

A Cross-Layer Design for Reducing Packet Loss Caused by Fading in a Mobile Ad Hoc Network Clemson University TigerPrints All Theses Theses 8-2017 A Cross-Layer Design for Reducing Packet Loss Caused by Fading in a Mobile Ad Hoc Network William Derek Johnson Clemson University Follow this and

More information

TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS

TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS IEEE 2012 Transactions on Wireless Communications, Volume: 9, Issue: 2 TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS Abstract Cooperative communication has received tremendous

More information

Design and Simulation of an Underwater Acoustic Local Area Network

Design and Simulation of an Underwater Acoustic Local Area Network Design and Simulation of an Underwater Acoustic Local Area Network Ethem M. Sozer, Milica Stojanovic, and John G. Proakis Northeastern University, Communications and Digital Signal Processing Center 409

More information

Flaws in Some Self-Healing Key Distribution Schemes with Revocation

Flaws in Some Self-Healing Key Distribution Schemes with Revocation Flaws in Some Self-Healing Key Distribution Schemes with Revocation Vanesa Daza 1, Javier Herranz 2 and Germán Sáez 2 1 Dept. Tecnologies de la Informació i les Comunicacions, Universitat Pompeu Fabra,

More information

Opportunistic forwarding in multi-hop OFDMA networks with local CSI

Opportunistic forwarding in multi-hop OFDMA networks with local CSI Opportunistic forwarding in multi-hop OFDMA networks with local CSI Alexander Kühne, Anja Klein, Adrian Loch, and Matthias Hollick Communications Engineering Lab, Technische Universität Darmstadt, 648

More information

Energy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks

Energy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks Energy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks Reza Aminzadeh Electrical Engineering Department Khavaran Higher Education Institute Mashhad, Iran. reza.aminzadeh@ieee.com

More information

University of Bristol - Explore Bristol Research. Link to published version (if available): /WCNC

University of Bristol - Explore Bristol Research. Link to published version (if available): /WCNC Gormus, S., Kaleshi, D., McGeehan, J. P., & Munro, A. T. D. (2006). Performance comparison of cooperative and non-cooperative relaying mechanisms in wireless networks. In IEEE Wireless Communications and

More information

Public Key Cryptography and RSA

Public Key Cryptography and RSA Public Key Cryptography and RSA Major topics Principles of public key cryptosystems The RSA algorithm The Security of RSA Motivations A public key system is asymmetric, there does not have to be an exchange

More information

Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE

Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 9, SEPTEMBER 2008 4119 Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE

More information

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu

More information

Inefficiency of Bargaining Solution in Multiuser Relay Network

Inefficiency of Bargaining Solution in Multiuser Relay Network International Conference on Electrical and Computer Engineering ICECE'2015 Dec. 15-16, 2015 Pattaya Thailand Inefficiency of Bargaining Solution in Multiuser Relay Network Supenporn.Somjit, Pattarawit

More information

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Enhanced Parity Packet Transmission for Video Multicast using R-DSTC Özgü Alay, Zhili Guo, Yao Wang, Elza Erkip

More information

Understanding the Impact of Interference on Collaborative Relays

Understanding the Impact of Interference on Collaborative Relays IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. XX, NO. X, MONTH 200X 1 Understanding the Impact of Interference on Collaborative Relays Yan Zhu, Student Member, IEEE and Haitao Zheng, Member, IEEE Abstract

More information

Routing in Ad Hoc Networks: A Case for Long Hops

Routing in Ad Hoc Networks: A Case for Long Hops TOPICS IN AD HOC AND SENSOR NETWORKS Routing in Ad Hoc Networks: A Case for Long Hops Martin Haenggi and Daniele Puccinelli, University of Notre Dame ABSTRACT For multihop wireless networks, a fundamental

More information

Lifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks. Presented by Yao Zheng

Lifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks. Presented by Yao Zheng Lifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks Presented by Yao Zheng Contributions Analyzing the lifetime of WSN without knowing the lifetime of sensors Find a accurate approximation

More information

A Protocol to Recover the Unused Time Slot Assignments in Transmission Scheduling Protocols for Channel Access in Ad Hoc Networks

A Protocol to Recover the Unused Time Slot Assignments in Transmission Scheduling Protocols for Channel Access in Ad Hoc Networks Clemson University TigerPrints All Theses Theses 8-2016 A Protocol to Recover the Unused Time Slot Assignments in Transmission Scheduling Protocols for Channel Access in Ad Hoc Networks Vikas Bollapragada

More information

Cooperative Routing for Wireless Networks with Multiple Shared Channels

Cooperative Routing for Wireless Networks with Multiple Shared Channels Cooperative Routing for Wireless Networks with Multiple Shared Channels Xiaoqin Chen Australian National Uni. Department of Engineering Canberra, 0200, Australia Sandra.Chen@anu.edu.au Dhammika Jayalath

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 1, 2011 SURVEY: Physical Layer Security Announcements HW #1 is posted on main class website Due 2/10 @ 11:59pm (PST) Office hours on 2/1 will

More information

Links, clocks, optics and radios

Links, clocks, optics and radios Links, clocks, optics and radios end IP addresses Source Destination Data 171.64.74.55 176.22.45.66 176 10110000 start Example of On-Off Keying +5V 0V Volts 1 0 time Data 0 1 1 0 0 1 0 1 1 0 1 0 1 0

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 9, SEPTEMBER

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 9, SEPTEMBER IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 9, SEPTEMBER 2005 3037 Cooperative Strategies and Capacity Theorems for Relay Networks Gerhard Kramer, Member, IEEE, Michael Gastpar, Member, IEEE,

More information

Cisco Cooperative Project. Delay Performance and Different Locations for Users. Students: Li Li Advisors: Len Cimini, Chien-Chung Shen

Cisco Cooperative Project. Delay Performance and Different Locations for Users. Students: Li Li Advisors: Len Cimini, Chien-Chung Shen Cisco Cooperative Project Delay Performance and Different Locations for Users Students: Li Li Advisors: Len Cimini, Chien-Chung Shen Nov. 20, 2015 Outline Problem Review Performance of Delay Different

More information

Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer

Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer Jiska Classen, Daniel Steinmetzer, Matthias Hollick Jiska Classen Technische Universität Darmstadt Secure Mobile

More information

Fault-Tolerant and Secure Data Transmission Using Random Linear Network Coding

Fault-Tolerant and Secure Data Transmission Using Random Linear Network Coding Fault-Tolerant and Secure Data Transmission Using Random Linear Network Coding Pouya Ostovari and Jie Wu Computer & Information Sciences Temple University Center for Networked Computing http://www.cnc.temple.edu

More information

AN ABSTRACT OF THE THESIS OF

AN ABSTRACT OF THE THESIS OF AN ABSTRACT OF THE THESIS OF Adem Mabruk Zaid for the degree of Master of Science in Electrical and Computer Engineering presented on November 28, 2011. Title: Enhancing Macrocell Downlink Performance

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are

More information

On Enhancements of Physical Layer Secret Key Generation and Its Application in Wireless Communication Systems

On Enhancements of Physical Layer Secret Key Generation and Its Application in Wireless Communication Systems Western University Scholarship@Western Electronic Thesis and Dissertation Repository December 2015 On Enhancements of Physical Layer Secret Key Generation and Its Application in Wireless Communication

More information

Network-level performance evaluation of a tworelay cooperative random access wireless system

Network-level performance evaluation of a tworelay cooperative random access wireless system Network-level performance evaluation of a tworelay cooperative random access wireless system Georgios Papadimitriou, Nikolaos Pappas, Apostolos Traganitis and Vangelis Angelakis Linköping University Post

More information

Longest edge routing on the spatial Aloha graph

Longest edge routing on the spatial Aloha graph 1 Longest edge routing on the spatial Aloha graph Steven Weber, Nihar Jindal, Radha Krishna Ganti, Martin Haenggi Drexel University, Dept. of ECE, Philadelphia, PA 1914 University of Minnesota, Dept. of

More information

Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang

Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang University of Wisconsin - Madison 1 Wireless Access in Vehicles Wireless network in public vehicles use existing infrastructure

More information

Advanced Topics in Digital Communications Spezielle Methoden der digitalen Datenübertragung

Advanced Topics in Digital Communications Spezielle Methoden der digitalen Datenübertragung Advanced Topics in Digital Communications Spezielle Methoden der digitalen Datenübertragung Dr.-Ing. Carsten Bockelmann Institute for Telecommunications and High-Frequency Techniques Department of Communications

More information

Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs

Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs Presented by: Hao Liang Broadband Communications Research (BBCR) Lab 2012.7.6 Outline Introduction and Related Work

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

On the Impact of Mobility on Multicast Capacity of Wireless Networks

On the Impact of Mobility on Multicast Capacity of Wireless Networks On the Impact of Mobility on Multicast Capacity of Wireless Networs Jubin Jose, Ahmed Abdel-Hadi, Piyush Gupta and Sriram Vishwanath University of Texas at Austin, Austin, TX Bell Labs, Alcatel-Lucent,

More information

How does the Information Capacity of Ad Hoc Networks Scale?

How does the Information Capacity of Ad Hoc Networks Scale? How does the Information Capacity of Ad Hoc Networks Scale? Ayfer Özgür, Olivier Lévêque, David Tse Abstract n source and destination pairs randomly located in an area want to communicate with each other.

More information

Joint routing and scheduling optimization in arbitrary ad hoc networks: Comparison of cooperative and hop-by-hop forwarding

Joint routing and scheduling optimization in arbitrary ad hoc networks: Comparison of cooperative and hop-by-hop forwarding Joint routing and scheduling optimization in arbitrary ad hoc networks: Comparison of cooperative and hop-by-hop forwarding Antonio Capone, Stefano Gualandi and Di Yuan Linköping University Post Print

More information

Coordinated Multi-Point in Mobile Communications

Coordinated Multi-Point in Mobile Communications Coordinated Multi-Point in Mobile Communications From Theory to Practice Edited by PATRICK MARSCH Nokia Siemens Networks, Wroctaw, Poland GERHARD P. FETTWEIS Technische Universität Dresden, Germany Pf

More information

Packet-Level Diversity From Theory to Practice: An based Experimental Investigation

Packet-Level Diversity From Theory to Practice: An based Experimental Investigation Packet-Level Diversity From Theory to Practice: An 802.11- based Experimental Investigation E. Vergetis, E. Pierce, M. Blanco and R. Guérin University of Pennsylvania Department of Electrical & Systems

More information

Multi-Hop Virtual MIMO Communication using STBC and Relay Selection

Multi-Hop Virtual MIMO Communication using STBC and Relay Selection Multi-Hop Virtual MIMO Communication using STBC and Relay Selection Athira D. Nair, Aswathy Devi T. Department of Electronics and Communication L.B.S. Institute of Technology for Women Thiruvananthapuram,

More information

Relay Selection Based on Simultaneous Wireless Information and Power Transfer for Wireless Sensor Networks

Relay Selection Based on Simultaneous Wireless Information and Power Transfer for Wireless Sensor Networks International Journal of Computer Engineering and Information Technology VOL. 9, NO. 1, January 2017, 1 5 Available online at: www.ijceit.org E-ISSN 2412-8856 (Online) Relay Selection Based on Simultaneous

More information

Video-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014

Video-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014 Video-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014 1/26 ! Real-time Video Transmission! Challenges and Opportunities! Lessons Learned for Real-time Video! Mitigating Losses in Scalable

More information

Rate Adaptation in

Rate Adaptation in Rate Adaptation in 802.11 SAMMY KUPFER Outline Introduction Intuition Basic techniques Techniques General Designs Robust Rate Adaptation for 802.11 (2006) Efficient Channel aware Rate Adaptation in Dynamic

More information

Great Theoretical Ideas in Computer Science. Lecture 27: Cryptography

Great Theoretical Ideas in Computer Science. Lecture 27: Cryptography 15-251 Great Theoretical Ideas in Computer Science Lecture 27: Cryptography What is cryptography about? Adversary Eavesdropper I will cut his throat I will cut his throat What is cryptography about? loru23n8uladjkfb!#@

More information

Research Article Throughput Analysis of Large Wireless Networks with Regular Topologies

Research Article Throughput Analysis of Large Wireless Networks with Regular Topologies Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 7, Article ID 676, pages doi:.55/7/676 Research Article Throughput Analysis of Large Wireless Networks with

More information

The Complexity of Connectivity in Wireless Networks. Roger WISARD

The Complexity of Connectivity in Wireless Networks. Roger WISARD The Complexity of Connectivity in Wireless Networks Roger Wattenhofer @ WISARD 2008 1 The paper Joint work with Thomas Moscibroda Former PhD student of mine Now researcher at Microsoft Research, Redmond

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

First Semester Examinations 2013/14 (Model Solution) INTERNET PRINCIPLES

First Semester Examinations 2013/14 (Model Solution) INTERNET PRINCIPLES PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2013/14 (Model Solution) INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS

More information

Variable Key : A new investigation in cryptography and results thereoff

Variable Key : A new investigation in cryptography and results thereoff Variable Key A new investigation in cryptography and results thereoff P. Chakrabarti 1, LMISTE C.T.Bhunia 2, B. Bhuyan 3 1 Bengal Institute of Technology and Management, Santiniketan, West Bengal, Pin-731236,India

More information

The Design of Degree Distribution for Distributed Fountain Codes in Wireless Sensor Networks

The Design of Degree Distribution for Distributed Fountain Codes in Wireless Sensor Networks The Design of Degree Distribution for Distributed Fountain Codes in Wireless Sensor Networks Jing Yue, Zihuai Lin, Branka Vucetic, and Pei Xiao School of Electrical and Information Engineering, The University

More information

Capacity Deficit in Mobile Wireless Ad Hoc Networks Due to Geographic Routing Overheads

Capacity Deficit in Mobile Wireless Ad Hoc Networks Due to Geographic Routing Overheads Capacity Deficit in Mobile Wireless Ad Hoc Networks Due to Geographic Routing Overheads Nabhendra Bisnik, Alhussein Abouzeid Abstract Mobility of nodes may cause routing protocols to incur large overheads

More information

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions 2007 IEEE Communication Theory Workshop Christian R. Berger 1, Shengli Zhou 1, Yonggang Wen 2, Peter Willett 1 and

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Jan 18, 2011 Class #3 Wireless vulnerabilities and threats Announcement: Agenda 6 remaining survey slots, 12 students yet to sign up Vulnerabilities,

More information

6514 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 10, OCTOBER Opportunistic Wireless Relay Networks: Diversity-Multiplexing Tradeoff

6514 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 10, OCTOBER Opportunistic Wireless Relay Networks: Diversity-Multiplexing Tradeoff 6514 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 10, OCTOBER 2011 Opportunistic Wireless Relay Networks: Diversity-Multiplexing Tradeoff Mohamed Abouelseoud, Student Member, IEEE, and Aria Nosratinia,

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

Multihop Relaying for Broadband Wireless. Mesh Networks: From Theory to Practice

Multihop Relaying for Broadband Wireless. Mesh Networks: From Theory to Practice 1 Multihop Relaying for Broadband Wireless Mesh Networks: From Theory to Practice Özgür Oyman, Member, IEEE, J. Nicholas Laneman, Member, IEEE, and Sumeet Sandhu, Member, IEEE Abstract We summarize capacity

More information

Cooperative-Diversity Slotted ALOHA

Cooperative-Diversity Slotted ALOHA Wireless Networks manuscript No. (will be inserted by the editor) Cooperative-Diversity Slotted ALOHA John M. Shea, Tan F. Wong, and Wing-Hin Wong Wireless Information Networking Group, University of Florida,

More information

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network 1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay

More information

5088 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 8, AUGUST We use the following notation: i) f (x) =O(g(x)) means that there exist

5088 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 8, AUGUST We use the following notation: i) f (x) =O(g(x)) means that there exist 5088 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 8, AUGUST 2011 Improved Capacity Scaling in Wireless Networks With Infrastructure Won-Yong Shin, Member, IEEE, Sang-Woon Jeon, Student Member,

More information

Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks

Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks Quan Chen, Hong Gao, Yingshu Li, Siyao Cheng, and Jianzhong Li Harbin Institute of Technology, China Quan Chen@ Harbin Institute

More information

Multiple Network Coded TCP Sessions in Disruptive Wireless Scenarios

Multiple Network Coded TCP Sessions in Disruptive Wireless Scenarios Multiple Network Coded TCP Sessions in Disruptive Wireless Scenarios Chien-Chia Chen Cliff Chen Joon-Sang Park Soon Oh Mario Gerla M.Y. Sanadidi Network Research Lab, 1 Problem Statement Communication

More information

Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading

Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

Qos support and adaptive video

Qos support and adaptive video Qos support and adaptive video QoS support in ad hoc networks MAC layer techniques: 802.11 e - alternation of contention based and contention free periods; differentiated (per class) Interframe Spacing

More information

Anomaly Detection in Cyber Physical Systems

Anomaly Detection in Cyber Physical Systems Anomaly Detection in Cyber Physical Systems Maggie Cheng Illinois Institute of Technology December 11, 2018 IEEE Big Data Conference Seattle, WA Outline Introduction Outlier Detection Sequential Change

More information

SINR-Based Scheduling for Minimum Latency Broadcast

SINR-Based Scheduling for Minimum Latency Broadcast SINR-Based Scheduling for Minimum Latency Broadcast Clement Kam, Sastry Kompella, Anthony Ephremides and Ira S. Moskowitz Information Technology Division, Naval Research Laboratory, Washington, DC 75 Electrical

More information

Wireless Networks Research Seminar April 22nd 2013

Wireless Networks Research Seminar April 22nd 2013 Wireless Networks Research Seminar April 22nd 2013 Distributed Transmit Power Minimization in Wireless Sensor Networks via Cross-Layer Optimization NETS2020 Markus Leinonen, Juha Karjalainen, Marian Codreanu,

More information

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION CHAPTER 5 QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION 5.1 PRINCIPLE OF RRM The success of mobile communication systems and the need for better QoS, has led to the development of 3G mobile systems

More information

SAPHYRE. Contract No. FP7-ICT Network protocol design for resource sharing D4.2

SAPHYRE. Contract No. FP7-ICT Network protocol design for resource sharing D4.2 SAPHYRE SAPHYRE Contract No. FP7-ICT-248001 Network protocol design for resource sharing D4.2 Contractual date: M30 Actual date: M30 Authors: Federico Librino, Leonardo Badia, Participants: CFR Work package:

More information

Side-Channel Attacks on RSA with CRT. Weakness of RSA Alexander Kozak Jared Vanderbeck

Side-Channel Attacks on RSA with CRT. Weakness of RSA Alexander Kozak Jared Vanderbeck Side-Channel Attacks on RSA with CRT Weakness of RSA Alexander Kozak Jared Vanderbeck What is RSA? As we all know, RSA (Rivest Shamir Adleman) is a really secure algorithm for public-key cryptography.

More information

Abstract. Wireless ad-hoc networks (WANETs) are innately different from the well-known wired

Abstract. Wireless ad-hoc networks (WANETs) are innately different from the well-known wired Abstract Wireless ad-hoc networks (WANETs) are innately different from the well-known wired networks and have a totally new architecture. A few problems arise from the two main traits of WANETs: self-organization

More information

Multiparty Communications CS 118. Computer Network Fundamentals Peter Reiher. Lecture 4 Page 1 CS 118. Winter 2016

Multiparty Communications CS 118. Computer Network Fundamentals Peter Reiher. Lecture 4 Page 1 CS 118. Winter 2016 Multiparty Communications Computer Network Fundamentals Peter Reiher Page 1 Outline Extending 2-party model to N-party A party has multiple receivers (other end) A party has multiple senders (local end)

More information

ABSTRACT COOPERATIVE COMMUNICATIONS AND NETWORKING. Amr A. El-Sherif, Doctor of Philosophy, 2009

ABSTRACT COOPERATIVE COMMUNICATIONS AND NETWORKING. Amr A. El-Sherif, Doctor of Philosophy, 2009 ABSTRACT Title of Dissertation: COGNITIVE MULTIPLE ACCESS FOR COOPERATIVE COMMUNICATIONS AND NETWORKING Amr A. El-Sherif, Doctor of Philosophy, 2009 Dissertation directed by: Professor K. J. Ray Liu Department

More information

MOAR: A Multi-channel Opportunistic Auto-rate Media Access Protocol for Ad Hoc Networks

MOAR: A Multi-channel Opportunistic Auto-rate Media Access Protocol for Ad Hoc Networks MOAR: A Multi-channel Opportunistic Auto-rate Media Access Protocol for Ad Hoc Networks V. Kanodia, A. Sabharwal, and E. Knightly ECE/CS Departments Rice University Houston, Texas ABSTRACT The IEEE 802.11

More information

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline CSC/ECE 574 Computer and Network Security Topic 2. Introduction to Cryptography 1 Outline Basic Crypto Concepts and Definitions Some Early (Breakable) Cryptosystems Key Issues 2 Basic Concepts and Definitions

More information

Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective

Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Ness Shroff School of Electrical and Computer Engineering Purdue University West Lafayette, IN

More information