A direct sequence spread spectrum is employed together with a lattice coding scheme to enhance physical layer security and efficiency of a wireless communication system against the denial of service attacks, due to th...
详细信息
A direct sequence spread spectrum is employed together with a lattice coding scheme to enhance physical layer security and efficiency of a wireless communication system against the denial of service attacks, due to the presence of deliberate unwanted interferences. Based on the results, using a direct sequence spread spectrum together with a random "construction A" lattice coding scheme named "DSSS/RCA" can highly improve the error performance compared with similar methods. Regarding a typically large block code length, some constraints on the coding rate and average signal to noise ratio are drawn to guarantee a block error probability which is asymptotically close to zero. Also, the secrecy capacity of DSSS/RCA is investigated and the achievability of perfect secrecy is verified.
A pseudo-random antipodal sequence that is accessible to transmitter and legitimate receiver is employed over a lattice coding scheme to provide the required security. Traditionally, pseudo-random sequences are employ...
详细信息
ISBN:
(纸本)9781728115085
A pseudo-random antipodal sequence that is accessible to transmitter and legitimate receiver is employed over a lattice coding scheme to provide the required security. Traditionally, pseudo-random sequences are employed in spread spectrum techniques to maintain the security of a wireless communication system. However, spread spectrum techniques require a huge amount of bandwidth that is a major constraint for wireless systems. Nonetheless, in the proposed scheme, the pseudo-random sequence is employed over channel coding level, so the bandwidth limitation of the spread spectrum is eased significantly. Mathematically, it is proved that the eavesdropper suffers from a degraded channel compared with legitimate receiver, and at high signal to noise ratio regimes, the proposed scheme can considerably deliver the required secrecy.
A pseudo-random antipodal sequence that is accessible to transmitter and legitimate receiver is employed over a lattice coding scheme to provide the required security. Traditionally, pseudo-random sequences are employ...
详细信息
A pseudo-random antipodal sequence that is accessible to transmitter and legitimate receiver is employed over a lattice coding scheme to provide the required security. Traditionally, pseudo-random sequences are employed in spread spectrum techniques to maintain the security of a wireless communication system. However, spread spectrum techniques require a huge amount of bandwidth that is a major constraint for wireless systems. Nonetheless, in the proposed scheme, the pseudorandom sequence is employed over channel coding level, so the bandwidth limitation of the spread spectrum is eased significantly. Mathematically, it is proved that the eavesdropper suffers from a degraded channel compared with legitimate receiver, and at high signal to noise ratio regimes, the proposed scheme can considerably deliver the required secrecy.
This paper addresses the problem of physical-layer multicasting over single-cell point-to-multipoint communication. We consider a base station that needs to convey a common information to a group of users. We propose ...
详细信息
ISBN:
(纸本)9781538635315
This paper addresses the problem of physical-layer multicasting over single-cell point-to-multipoint communication. We consider a base station that needs to convey a common information to a group of users. We propose a Wyner-Ziv coder (WZC) based on doubly nested lattice quantization. In our scheme, we use the base layer generated by a standard coder as the decoder side information. Then, WZC is performed for enhancing the quality of the transmitted message. With the proposed layered coding, two enhancement messages will be generated, the first for all users and the second for only a subgroup of users with the best channel conditions. We optimize the scheme parameters in order to maximize the multicast rate and minimize the reconstruction distortion at all users. The efficiency of the proposed scheme is confirmed by the rate-distortion performance results that show significant decrease of the decoded signal distortion, compared to the basic multicasting scheme.
Full-duplex allows for the simultaneous flow of information in two directions and, in point-to-point Gaussian two-way channels, doubles capacity. A two-way line network where two sources exchange messages through mult...
详细信息
Full-duplex allows for the simultaneous flow of information in two directions and, in point-to-point Gaussian two-way channels, doubles capacity. A two-way line network where two sources exchange messages through multiple serial relays is considered. It is shown that when all nodes are full duplex, one may achieve to within a constant gap, independent of the number of relays, of the capacity of two one-way line networks. This shows that, even in the presence of relays that carry information in two directions, full duplex is able to approximately double capacity. A novel lattice coding scheme is developed for the two-way line network with two relays, which may be extended to an arbitrary number of relays and to half-duplex scenarios. The key technical contribution is the achievability strategy, where each relay decodes the sum of several signals ( using lattice codes) and then re-encodes it into another lattice codeword. This allows other nodes to again decode sums of codewords. The presented lattice-coding-based scheme ensures that both directions simultaneously fully utilize the relays' powers, even for asymmetric channels. The symmetric rate achieved by the proposed scheme is within 0.5 log 5 bit/Hz/s of the symmetric rate capacity regardless of the number of relays.
Blockchain has been deemed as a promising solution for providing security and privacy protection in the next-generation wireless networks. Large-scale concurrent access for massive wireless devices to accomplish the c...
详细信息
Blockchain has been deemed as a promising solution for providing security and privacy protection in the next-generation wireless networks. Large-scale concurrent access for massive wireless devices to accomplish the consensus procedure may consume prohibitive communication and computing resources, and thus may limit the application of blockchain in wireless conditions. As most existing consensus protocols are designed for wired networks, directly apply them for wireless users equipment (UEs) may exhaust their scarce spectrum and computing resources. In this paper, we propose AirCon, a byzantine fault-tolerant (BFT) consensus protocol for wireless UEs via the over-the-air computation. The novelty of AirCon is to take advantage of the intrinsic characteristic of the wireless channel and automatically achieve the consensus in the physical layer while receiving from the UEs, which greatly reduces the communication and computational cost that would be caused by traditional consensus protocols. We implement the AirCon protocol integrated into an LTE system and provide solutions to the critical issues for over-the-air consensus implementation. Experimental results are provided to show the feasibility of the proposed protocol, and simulation results to show the performance of the AirCon protocol under different wireless conditions.
The classical Schalkwijk-Kailath (SK) scheme, which achieves the capacity of the additive white Gaussian noise (AWGN) channel with noiseless feedback, is also shown to be an excellent secure finite blocklength (FBL) c...
详细信息
The classical Schalkwijk-Kailath (SK) scheme, which achieves the capacity of the additive white Gaussian noise (AWGN) channel with noiseless feedback, is also shown to be an excellent secure finite blocklength (FBL) coding scheme for the AWGN wiretap channel with noiseless feedback. In this paper, the dirty tape channel (AWGN channel with Gaussian state interference causally known by the transmitter) with noiseless/noisy feedback is investigated. First, SK-type feedback schemes are proposed for this model by introducing a lattice-based strategy into the classical SK scheme, and it is shown that this strategy helps to eliminate the impact of the state interference and the feedback channel noise on the performance of the SK scheme. Then, we analyze the security performance of the proposed schemes, in particular, for the dirty tape channel with noisy feedback and eavesdropper, we give a lower bound on the normalized eavesdropper's equivocation by establishing a novel inequality about the differential entropy of the Gaussian modulo-lattice function. Finally, performances of our proposed schemes are further explained by numerical examples.
The sparse code multiple access(SCMA)scheme is a Non-Orthogonal Multiple Access(NOMA)type of scheme that is used to handle the uplink com-ponent of mobile communication in the current generation.A need of the 5G mobil...
详细信息
The sparse code multiple access(SCMA)scheme is a Non-Orthogonal Multiple Access(NOMA)type of scheme that is used to handle the uplink com-ponent of mobile communication in the current generation.A need of the 5G mobile network is the ability to handle more *** accommodate this,the SCMA allows each user to deploy a variety of sub-carrier broadcasts,and several consumers may contribute to the same frequency using superposition *** SCMA approach,together with codebook design for each user,is used to improve channel efficiency through better management of the available ***-ever,developing a codebook with a greater number of value sets is still another *** enhanced techniques of encoding and decoding for 5G networks,mapping the multidimensional constellations in the SCMA system plays a signif-icant role in improving the system performance and enhancing the overall system *** creation of a codebook utilizing the SCMA approach in con-junction with the lattice theory is suggested in this *** prototype is shaped using a popular lattice,such as A n and D n,as the ***,from the primary lattice constellation,the multidimensional complex mother constellation with the most noticeable variance in power is *** lattice-based cod-ing is generated by combining the codebooks with the mother constellation,and the codes in the matrices are mapped by rotating the constellations in this *** suggested technique,in conjunction with the investigation of novel SCMA codebook sets,provides improved performance in terms of Bit Error Rate(BER)and complexity with regard to Signal to Noise Ratio(SNR).Finally,the bit error rate is reduced for various SNRs during transmission in the channel.
We propose a lattice-based scheme for secret key generation from Gaussian sources in the presence of an eaves-dropper, and show that it achieves the strong secret key capacity in the case of degraded source models, as...
详细信息
We propose a lattice-based scheme for secret key generation from Gaussian sources in the presence of an eaves-dropper, and show that it achieves the strong secret key capacity in the case of degraded source models, as well as the optimal secret key / public communication rate trade-off. The key ingredients of our scheme are the use of the modulo lattice operation to extract the channel intrinsic randomness, based on the notion of flatness factor, together with a randomized lattice quantization technique to quantize the continuous source. Compared to previous works, we introduce two new notions of flatness factor based on L-1 distance and KL divergence, respectively, which might be of independent interest. We prove the existence of secrecy-good lattices under L-1 distance and KL divergence, whose L-1 and KL flatness factors vanish for volume-to- noise ratios up to 2pe. This improves upon the volume-to- noise ratio threshold 2p of the L8 flatness factor.
In this paper, the dirty-tape channel (the white Gaussian channel with causal state interference at the transmitter) is revisited by considering a noisy feedback link between the transmitter and receiver. A finite blo...
详细信息
ISBN:
(纸本)9781665435406
In this paper, the dirty-tape channel (the white Gaussian channel with causal state interference at the transmitter) is revisited by considering a noisy feedback link between the transmitter and receiver. A finite blocklength (FBL) coding scheme is proposed for this model, which is based on the classical Schalkwijk-Kailath (SK) scheme and an existing lattice-based interference canceling scheme. Based on the proposed scheme, an achievable rate for given blocklength and decoding error probability is obtained, and the results of this paper are further illustrated via numerical examples.
暂无评论