Skip to main content

Showing 1–42 of 42 results for author: Goeckel, D

.
  1. arXiv:2307.08195  [pdf, other

    cs.CR

    Covert Communication in Autoencoder Wireless Systems

    Authors: Ali Mohammadi Teshnizi, Majid Ghaderi, Dennis Goeckel

    Abstract: Hiding the wireless communication by transmitter Alice to intended receiver Bob from a capable and attentive adversary Willie has been widely studied under the moniker "covert communications". However, when such covert communication is done in the presence of allowable system communications, there has been little study of both hiding the signal and preserving the performance of those allowable com… ▽ More

    Submitted 16 July, 2023; originally announced July 2023.

  2. arXiv:2108.12336  [pdf, other

    cs.CR cs.IT

    Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks

    Authors: Bo Guan, Nazanin Takbiri, Dennis Goeckel, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: User privacy can be compromised by matching user data traces to records of their previous behavior. The matching of the statistical characteristics of traces to prior user behavior has been widely studied. However, an adversary can also identify a user deterministically by searching data traces for a pattern that is unique to that user. Our goal is to thwart such an adversary by applying small art… ▽ More

    Submitted 27 August, 2021; originally announced August 2021.

  3. arXiv:2102.00918  [pdf, other

    cs.CR

    Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems

    Authors: Alireza Bahramali, Milad Nasr, Amir Houmansadr, Dennis Goeckel, Don Towsley

    Abstract: Deep Neural Networks (DNNs) have become prevalent in wireless communication systems due to their promising performance. However, similar to other DNN-based applications, they are vulnerable to adversarial examples. In this work, we propose an input-agnostic, undetectable, and robust adversarial attack against DNN-based wireless communication systems in both white-box and black-box scenarios. We de… ▽ More

    Submitted 1 February, 2021; originally announced February 2021.

  4. arXiv:2007.06119  [pdf, other

    cs.CR

    Asymptotic Privacy Loss due to Time Series Matching of Dependent Users

    Authors: Nazanin Takbiri, Minting Chen, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: The Internet of Things (IoT) promises to improve user utility by tuning applications to user behavior, but revealing the characteristics of a user's behavior presents a significant privacy risk. Our previous work has established the challenging requirements for anonymization to protect users' privacy in a Bayesian setting in which we assume a powerful adversary who has perfect knowledge of the pri… ▽ More

    Submitted 12 July, 2020; originally announced July 2020.

  5. Practical Traffic Analysis Attacks on Secure Messaging Applications

    Authors: Alireza Bahramali, Ramin Soltani, Amir Houmansadr, Dennis Goeckel, Don Towsley

    Abstract: Instant Messaging (IM) applications like Telegram, Signal, and WhatsApp have become extremely popular in recent years. Unfortunately, such IM services have been targets of continuous governmental surveillance and censorship, as these services are home to public and private communication channels on socially and politically sensitive topics. To protect their clients, popular IM services deploy stat… ▽ More

    Submitted 1 May, 2020; originally announced May 2020.

    Journal ref: Network and Distributed Systems Security (NDSS) Symposium 2020

  6. arXiv:2001.06932  [pdf, other

    cs.CR cs.IT

    Covert Communication in Continuous-Time Systems

    Authors: Ke Li, Don Towsley, Dennis Goeckel

    Abstract: Recent works have considered the ability of transmitter Alice to communicate reliably to receiver Bob without being detected by warden Willie. These works generally assume a standard discrete-time model. But the assumption of a discrete-time model in standard communication scenarios is often predicated on its equivalence to a continuous-time model, which has not been established for the covert com… ▽ More

    Submitted 19 January, 2020; originally announced January 2020.

    Comments: 8 pages, 5 figures, concise version submitted to 2020 IEEE International Symposium on Information Theory (ISIT)

  7. arXiv:1912.02209  [pdf, other

    cs.IT eess.SP

    Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms

    Authors: Nazanin Takbiri, Virat Shejwalker, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik

    Abstract: The prevalence of mobile devices and Location-Based Services (LBS) necessitate the study of Location Privacy-Preserving Mechanisms (LPPM). However, LPPMs reduce the utility of LBS due to the noise they add to users' locations. Here, we consider the remap** technique, which presumes the adversary has a perfect statistical model for the user location. We consider this assumption and show that unde… ▽ More

    Submitted 4 December, 2019; originally announced December 2019.

    Comments: Submitted to IEEE Wireless Communications Letters

  8. arXiv:1907.01350  [pdf, other

    eess.SP

    Covert Communication Using Null Space and 3D Beamforming

    Authors: Moslem Forouzesh, Paeiz Azmi, Nader Mokari, Dennis Goeckel

    Abstract: Covert communication is often limited in rate because it is difficult to hide the signal in the background noise. Recent work has shown that jamming can significantly improve the rate at which covert communications can be conducted; however, the rate could be improved further if the jamming incident on the intended receiver can be mitigated. Here, we consider a multiple-antenna jammer that employs… ▽ More

    Submitted 3 July, 2019; v1 submitted 2 July, 2019; originally announced July 2019.

    Comments: 4 figure, 1 algorithm

  9. arXiv:1903.11640  [pdf, other

    cs.CR

    Fundamental Limits of Covert Packet Insertion

    Authors: Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr

    Abstract: Covert communication conceals the existence of the transmission from a watchful adversary. We consider the fundamental limits for covert communications via packet insertion over packet channels whose packet timings are governed by a renewal process of rate $λ$. Authorized transmitter Jack sends packets to authorized receiver Steve, and covert transmitter Alice wishes to transmit packets to covert… ▽ More

    Submitted 27 March, 2019; originally announced March 2019.

  10. arXiv:1902.06404  [pdf, other

    cs.IT

    Asymptotic Limits of Privacy in Bayesian Time Series Matching

    Authors: Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: Various modern and highly popular applications make use of user data traces in order to offer specific services, often for the purpose of improving the user's experience while using such applications. However, even when user data is privatized by employing privacy-preserving mechanisms (PPM), users' privacy may still be compromised by an external party who leverages statistical matching methods to… ▽ More

    Submitted 18 February, 2019; originally announced February 2019.

    Comments: The 53rd Annual Conference on Information Sciences and Systems

    Journal ref: The 53rd Annual Conference on Information Sciences and Systems 2019

  11. arXiv:1901.04914  [pdf, other

    eess.SP

    Robust Power Allocation in Covert Communication: Imperfect CDI

    Authors: Moslem Forouzesh, Paeiz Azmi, Nader Mokari, Dennis Goeckel

    Abstract: The study of the fundamental limits of covert communications, where a transmitter Alice wants to send information to a desired recipient Bob without detection of that transmission by an attentive and capable warden Willie, has emerged recently as a topic of great research interest. Critical to these analyses is a characterization of the detection problem that is presented to Willie. Previous work… ▽ More

    Submitted 15 January, 2019; originally announced January 2019.

    Comments: 11 page, 5 figures, one table

  12. arXiv:1810.03510  [pdf, other

    cs.NI cs.CR cs.IT

    Fundamental Limits of Covert Bit Insertion in Packets

    Authors: Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr

    Abstract: Covert communication is necessary when revealing the mere existence of a message leaks sensitive information to an attacker. Consider a network link where an authorized transmitter Jack sends packets to an authorized receiver Steve, and the packets visit Alice, Willie, and Bob, respectively, before they reach Steve. Covert transmitter Alice wishes to alter the packet stream in some way to send inf… ▽ More

    Submitted 8 October, 2018; originally announced October 2018.

    Comments: This work has been presented at the 56th Annual Allerton Conference on Communication, Control, and Computing, October 2018

  13. arXiv:1809.10289  [pdf, other

    cs.IT

    Asymptotic Loss in Privacy due to Dependency in Gaussian Traces

    Authors: Nazanin Takbiri, Ramin Soltani, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: The rapid growth of the Internet of Things (IoT) necessitates employing privacy-preserving techniques to protect users' sensitive information. Even when user traces are anonymized, statistical matching can be employed to infer sensitive information. In our previous work, we have established the privacy requirements for the case that the user traces are instantiations of discrete random variables a… ▽ More

    Submitted 18 February, 2019; v1 submitted 26 September, 2018; originally announced September 2018.

    Comments: IEEE Wireless Communications and Networking Conference

  14. arXiv:1809.08514  [pdf, other

    cs.NI cs.CR cs.IT eess.SP

    Fundamental Limits of Invisible Flow Fingerprinting

    Authors: Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr

    Abstract: Network flow fingerprinting can be used to de-anonymize communications on anonymity systems such as Tor by linking the ingress and egress segments of anonymized connections. Assume Alice and Bob have access to the input and the output links of an anonymous network, respectively, and they wish to collaboratively reveal the connections between the input and the output links without being detected by… ▽ More

    Submitted 27 March, 2019; v1 submitted 22 September, 2018; originally announced September 2018.

  15. arXiv:1806.11108  [pdf, other

    cs.IT

    Privacy of Dependent Users Against Statistical Matching

    Authors: Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik

    Abstract: Modern applications significantly enhance user experience by adapting to each user's individual condition and/or preferences. While this adaptation can greatly improve a user's experience or be essential for the application to work, the exposure of user data to the application presents a significant privacy threat to the users\textemdash even when the traces are anonymized\textemdash since the sta… ▽ More

    Submitted 29 May, 2019; v1 submitted 28 June, 2018; originally announced June 2018.

    Comments: Submitted to IEEE Transaction on Information Theory

  16. arXiv:1805.01296  [pdf, other

    cs.IT

    Privacy against Statistical Matching: Inter-User Correlation

    Authors: Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik

    Abstract: Modern applications significantly enhance user experience by adapting to each user's individual condition and/or preferences. While this adaptation can greatly improve utility or be essential for the application to work (e.g., for ride-sharing applications), the exposure of user data to the application presents a significant privacy threat to the users, even when the traces are anonymized, since t… ▽ More

    Submitted 27 June, 2018; v1 submitted 2 May, 2018; originally announced May 2018.

    Comments: arXiv admin note: text overlap with arXiv:1702.02701 and arXiv:1710.00197

    Journal ref: ISIT 2018

  17. arXiv:1803.06608  [pdf, other

    cs.CR

    Information-Theoretic Security or Covert Communication

    Authors: Moslem Forouzesh, Paeiz Azmi, Nader Mokari, Kai Kit Wong, Dennis Goeckel

    Abstract: Information-theoretic secrecy, in particular the wiretap channel formulation, provides protection against interception of a message by adversary Eve and has been widely studied in the last two decades. In contrast, covert communications under an analogous formulation provides protection against even the detection of the presence of the message by an adversary, and it has drawn significant interest… ▽ More

    Submitted 15 July, 2019; v1 submitted 18 March, 2018; originally announced March 2018.

    Comments: 20 pages, 6 figures, two tables

  18. arXiv:1803.04100  [pdf, ps, other

    cs.NI

    Multi-Hop Routing in Covert Wireless Networks

    Authors: Azadeh Sheikholeslami, Majid Ghaderi, Don Towsley, Boulat A. Bash, Saikat Guha, Dennis Goeckel

    Abstract: In covert communication, Alice tries to communicate with Bob without being detected by a warden Willie. When the distance between Alice and Bob becomes large compared to the distance between Alice and Willie(s), the performance of covert communication will be degraded. In this case, multi-hop message transmission via intermediate relays can help to improve performance. Hence, in this work multi-ho… ▽ More

    Submitted 11 March, 2018; originally announced March 2018.

    Comments: Accepted in IEEE Transactions of Wireless Communications

  19. arXiv:1711.10079  [pdf, other

    cs.NI cs.CR cs.IT math.PR

    Towards Provably Invisible Network Flow Fingerprints

    Authors: Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr

    Abstract: Network traffic analysis reveals important information even when messages are encrypted. We consider active traffic analysis via flow fingerprinting by invisibly embedding information into packet timings of flows. In particular, assume Alice wishes to embed fingerprints into flows of a set of network input links, whose packet timings are modeled by Poisson processes, without being detected by a wa… ▽ More

    Submitted 22 September, 2018; v1 submitted 27 November, 2017; originally announced November 2017.

  20. arXiv:1710.00197  [pdf, other

    cs.IT cs.CR

    Matching Anonymized and Obfuscated Time Series to Users' Profiles

    Authors: Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik

    Abstract: Many popular applications use traces of user data to offer various services to their users. However, even if user data is anonymized and obfuscated, a user's privacy can be compromised through the use of statistical matching techniques that match a user trace to prior user behavior. In this work, we derive the theoretical bounds on the privacy of users in such a scenario. We build on our recent st… ▽ More

    Submitted 27 June, 2018; v1 submitted 30 September, 2017; originally announced October 2017.

    Comments: 48 pages, 12 figures, Submitted to IEEE Transactions on Information Theory

  21. arXiv:1709.07096  [pdf, other

    cs.IT cs.CR cs.NI eess.SP

    Covert Wireless Communication with Artificial Noise Generation

    Authors: Ramin Soltani, Dennis Goeckel, Don Towsley, Boulat Bash, Saikat Guha

    Abstract: Covert communication conceals the transmission of the message from an attentive adversary. Recent work on the limits of covert communication in additive white Gaussian noise (AWGN) channels has demonstrated that a covert transmitter (Alice) can reliably transmit a maximum of $\mathcal{O}\left(\sqrt{n}\right)$ bits to a covert receiver (Bob) without being detected by an adversary (Warden Willie) in… ▽ More

    Submitted 22 September, 2018; v1 submitted 20 September, 2017; originally announced September 2017.

  22. Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming

    Authors: Azadeh Sheikholeslami, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel

    Abstract: This paper considers secure energy-efficient routing in the presence of multiple passive eavesdroppers. Previous work in this area has considered secure routing assuming probabilistic or exact knowledge of the location and channel-state-information (CSI) of each eavesdropper. In wireless networks, however, the locations and CSIs of passive eavesdroppers are not known, making it challenging to guar… ▽ More

    Submitted 15 March, 2017; originally announced March 2017.

  23. arXiv:1611.06476  [pdf, other

    physics.atom-ph

    Orientation Resolution through Rotational Coherence Spectroscopy

    Authors: Varun Makhija, Xiaoming Ren, Drue Gockel, Anh-Thu Le, Vinod Kumarappan

    Abstract: The rich information content of measurements in the molecular frame rather than the laboratory frame has motivated the development of several methods for aligning gas phase molecules in space. Even so, for asymmetric tops the problem of making molecular frame measurements remains challenging due to its inherently multi-dimensional nature. In this Letter we present a method, based on the analysis o… ▽ More

    Submitted 21 November, 2016; v1 submitted 20 November, 2016; originally announced November 2016.

    Comments: 6 pages, 4 figures

  24. arXiv:1610.05598  [pdf, other

    cs.IT cs.NI

    An SMDP Approach to Optimal PHY Configuration in Wireless Networks

    Authors: Mark Shifrin, Daniel S. Menasché, Asaf Cohen, Omer Gurewitz, Dennis Goeckel

    Abstract: In this work, we study the optimal configuration of the physical layer in wireless networks by means of Semi-Markov Decision Process (SMDP) modeling. In particular, assume the physical layer is characterized by a set of potential operating points, with each point corresponding to a rate and reliability pair; for example, these pairs might be obtained through a now-standard diversity-vs-multiplexin… ▽ More

    Submitted 6 February, 2017; v1 submitted 18 October, 2016; originally announced October 2016.

    Comments: arXiv admin note: text overlap with arXiv:1601.06859

  25. Covert Single-hop Communication in a Wireless Network with Distributed Artificial Noise Generation

    Authors: Ramin Soltani, Boulat Bash, Dennis Goeckel, Saikat Guha, Don Towsley

    Abstract: Covert communication, also known as low probability of detection (LPD) communication, prevents the adversary from knowing that a communication is taking place. Recent work has demonstrated that, in a three-party scenario with a transmitter (Alice), intended recipient (Bob), and adversary (Warden Willie), the maximum number of bits that can be transmitted reliably from Alice to Bob without detectio… ▽ More

    Submitted 27 November, 2017; v1 submitted 2 October, 2016; originally announced October 2016.

    Comments: Submitted to Allerton Conference 2014

  26. Covert Communications on Poisson Packet Channels

    Authors: Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr

    Abstract: Consider a channel where authorized transmitter Jack sends packets to authorized receiver Steve according to a Poisson process with rate $λ$ packets per second for a time period $T$. Suppose that covert transmitter Alice wishes to communicate information to covert receiver Bob on the same channel without being detected by a watchful adversary Willie. We consider two scenarios. In the first scenari… ▽ More

    Submitted 27 November, 2017; v1 submitted 2 October, 2016; originally announced October 2016.

    Comments: Allerton 2015 submission, minor edits. arXiv

  27. arXiv:1610.00368  [pdf, other

    cs.IT

    Covert Communications on Renewal Packet Channels

    Authors: Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr

    Abstract: Security and privacy are major concerns in modern communication networks. In recent years, the information theory of covert communications, where the very presence of the communication is undetectable to a watchful and determined adversary, has been of great interest. This emerging body of work has focused on additive white Gaussian noise (AWGN), discrete memoryless channels (DMCs), and optical ch… ▽ More

    Submitted 27 November, 2017; v1 submitted 2 October, 2016; originally announced October 2016.

    Comments: Contains details of an Allerton 2016 submission arXiv:1610.00381

  28. arXiv:1608.00698  [pdf, ps, other

    cs.IT

    Covert Communication in the Presence of an Uninformed Jammer

    Authors: Tamara V. Sobers, Boulat A. Bash, Saikat Guha, Don Towsley, Dennis Goeckel

    Abstract: Recent work has established that when transmitter Alice wishes to communicate reliably to recipient Bob without detection by warden Willie, with additive white Gaussian noise (AWGN) channels between all parties, communication is limited to $\mathcal{O}(\sqrt{n})$ bits in $n$ channel uses. However, this assumes Willie has an accurate statistical characterization of the channel. When Willie has unce… ▽ More

    Submitted 25 June, 2017; v1 submitted 2 August, 2016; originally announced August 2016.

    Comments: 14 pages, 4 figures

  29. arXiv:1601.06859   

    cs.IT eess.SY

    Optimal Dynamic Routing for the Wireless Relay Channel

    Authors: Asaf Cohen, Dennis Goeckel, Omer Gurewitz, Daniel S. Menasche, Mark Shifrin

    Abstract: Consider a communication network with a source, a relay and a destination. Each time interval, the source may dynamically choose between a few possible coding schemes, based on the channel state, traffic pattern and its own queue status. For example, the source may choose between a direct route to the destination and a relay-assisted scheme. Clearly, due to the difference in the performance achiev… ▽ More

    Submitted 7 February, 2017; v1 submitted 25 January, 2016; originally announced January 2016.

    Comments: This paper was replaced by arXiv:1610.05598

  30. arXiv:1506.00066  [pdf, other

    cs.IT

    Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication

    Authors: Boulat A. Bash, Dennis Goeckel, Saikat Guha, Don Towsley

    Abstract: Widely-deployed encryption-based security prevents unauthorized decoding, but does not ensure undetectability of communication. However, covert, or low probability of detection/intercept (LPD/LPI) communication is crucial in many scenarios ranging from covert military operations and the organization of social unrest, to privacy protection for users of wireless networks. In addition, encrypted data… ▽ More

    Submitted 29 May, 2015; originally announced June 2015.

    Comments: 6 pages, 4 figures

    Journal ref: IEEE Communications Magazine 53.12 (2015)

  31. Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments

    Authors: Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik

    Abstract: Secure communication over a wiretap channel is considered in the disadvantaged wireless environment, where the eavesdropper channel is (possibly much) better than the main channel. We present a method to exploit inherent vulnerabilities of the eavesdropper's receiver to obtain everlasting secrecy. Based on an ephemeral cryptographic key pre-shared between the transmitter Alice and the intended rec… ▽ More

    Submitted 13 November, 2014; originally announced December 2014.

    Journal ref: IEEE Transactions on Wireless Communications, Volume: 14, Issue: 11, Pages: 6072 - 6081, 2015

  32. Energy-Efficient Routing in Wireless Networks in the Presence of Jamming

    Authors: Azadeh Sheikholeslami, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel

    Abstract: The effectiveness and simple implementation of physical layer jammers make them an essential threat for wireless networks. In a multihop wireless network, where jammers can interfere with the transmission of user messages at intermediate nodes along the path, one can employ jamming oblivious routing and then employ physical-layer techniques (e.g. spread spectrum) to suppress jamming. However, wher… ▽ More

    Submitted 13 September, 2016; v1 submitted 13 November, 2014; originally announced November 2014.

    Journal ref: IEEE Transactions on Wireless Communications, 2016

  33. arXiv:1404.7347  [pdf, ps, other

    cs.IT quant-ph

    Covert Optical Communication

    Authors: Boulat A. Bash, Andrei H. Gheorghe, Monika Patel, Jonathan Habif, Dennis Goeckel, Don Towsley, Saikat Guha

    Abstract: Encryption prevents unauthorized decoding, but does not ensure stealth---a security demand that a mere presence of a message be undetectable. We characterize the ultimate limit of covert communication that is secure against the most powerful physically-permissible adversary. We show that, although it is impossible over a pure-loss channel, covert communication is attainable in the presence of any… ▽ More

    Submitted 10 September, 2014; v1 submitted 29 April, 2014; originally announced April 2014.

    Comments: v4: improved organization and figures, no changes to the results; v3: significant changes, included new theoretical results as well as re-organized; v2: updated figure 3 with theoretical channel capacity curves + minor fixes, no changes to experiments or other main results

    Journal ref: Nature Communications 6: 8626 (2015)

  34. arXiv:1403.5616  [pdf, other

    cs.IT quant-ph

    Quantum-noise limited communication with low probability of detection

    Authors: Boulat A. Bash, Saikat Guha, Dennis Goeckel, Don Towsley

    Abstract: We demonstrate the achievability of a square root limit on the amount of information transmitted reliably and with low probability of detection (LPD) over the single-mode lossy bosonic channel if either the eavesdropper's measurements or the channel itself is subject to the slightest amount of excess noise. Specifically, Alice can transmit $\mathcal{O}(\sqrt{n})$ bits to Bob over $n$ channel uses… ▽ More

    Submitted 22 March, 2014; originally announced March 2014.

    Report number: UM-CS-2013-002

  35. arXiv:1403.1013  [pdf, other

    cs.IT

    Covert Communication Gains from Adversary's Ignorance of Transmission Time

    Authors: Boulat A. Bash, Dennis Goeckel, Don Towsley

    Abstract: The recent square root law (SRL) for covert communication demonstrates that Alice can reliably transmit $\mathcal{O}(\sqrt{n})$ bits to Bob in $n$ uses of an additive white Gaussian noise (AWGN) channel while kee** ineffective any detector employed by the adversary; conversely, exceeding this limit either results in detection by the adversary with high probability or non-zero decoding error prob… ▽ More

    Submitted 27 September, 2016; v1 submitted 5 March, 2014; originally announced March 2014.

    Comments: v2: updated references/discussion of steganography, no change in results; v3: significant update, includes new theorem 1.2; v4 and v5: fixed minor technical issues

    Report number: UM-CS-2014-001

  36. arXiv:1304.2688  [pdf, ps, other

    cs.NI cs.CR cs.IT

    Efficient Wireless Security Through Jamming, Coding and Routing

    Authors: Majid Ghaderi, Dennis Goeckel, Ariel Orda, Mostafa Dehghan

    Abstract: There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming. In this paper, we consider how these single-hop physical layer security techniques can be extended to multi-hop wireless networks and show how to augment physical layer security techniques with h… ▽ More

    Submitted 9 April, 2013; originally announced April 2013.

    Report number: CPSC Technical Report 2012-1027-10

  37. Asymptotic Optimality of Equal Power Allocation for Linear Estimation of WSS Random Processes

    Authors: Boulat A. Bash, Dennis Goeckel, Don Towsley

    Abstract: This letter establishes the asymptotic optimality of equal power allocation for measurements of a continuous wide-sense stationary (WSS) random process with a square-integrable autocorrelation function when linear estimation is used on equally-spaced measurements with periodicity meeting the Nyquist criterion and with the variance of the noise on any sample inversely proportional to the power expe… ▽ More

    Submitted 19 January, 2013; v1 submitted 11 December, 2012; originally announced December 2012.

    Report number: UM-CS-2012-036

    Journal ref: IEEE Wireless Communications Letters 2.3 (2013) 247-250

  38. arXiv:1210.1790  [pdf, ps, other

    cs.CR cs.IT

    Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver

    Authors: Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik

    Abstract: Secure communication over a memoryless wiretap channel in the presence of a passive eavesdropper is considered. Traditional information-theoretic security methods require an advantage for the main channel over the eavesdropper channel to achieve a positive secrecy rate, which in general cannot be guaranteed in wireless systems. Here, we exploit the non-linear conversion operation in the eavesdropp… ▽ More

    Submitted 15 November, 2013; v1 submitted 5 October, 2012; originally announced October 2012.

  39. arXiv:1205.2118  [pdf, other

    cs.IT

    Performance Bounds for Grouped Incoherent Measurements in Compressive Sensing

    Authors: Adam C. Polak, Marco F. Duarte, Dennis L. Goeckel

    Abstract: Compressive sensing (CS) allows for acquisition of sparse signals at sampling rates significantly lower than the Nyquist rate required for bandlimited signals. Recovery guarantees for CS are generally derived based on the assumption that measurement projections are selected independently at random. However, for many practical signal acquisition applications, including medical imaging and remote se… ▽ More

    Submitted 20 October, 2014; v1 submitted 9 May, 2012; originally announced May 2012.

    Comments: Revised for publication. 21 pages, 10 figures

  40. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels

    Authors: Boulat A. Bash, Dennis Goeckel, Don Towsley

    Abstract: We present a square root limit on the amount of information transmitted reliably and with low probability of detection (LPD) over additive white Gaussian noise (AWGN) channels. Specifically, if the transmitter has AWGN channels to an intended receiver and a warden, both with non-zero noise power, we prove that $o(\sqrt{n})$ bits can be sent from the transmitter to the receiver in $n$ channel uses… ▽ More

    Submitted 20 March, 2013; v1 submitted 28 February, 2012; originally announced February 2012.

    Comments: Major revision in v2. Context, esp. the relationship to steganography updated. Also, added discussion on secret key length. Results are unchanged from previous version. Minor revision in v3. Major revision in v4, Clarified derivations (adding appendix), also context, esp. relationship to previous work in communication updated. Results are unchanged from previous revisions

    Report number: UM-CS-2012-003

    Journal ref: IEEE Journal on Selected Areas in Communications 31.9 (2013) 1921-1930

  41. arXiv:1104.3209  [pdf, ps, other

    cs.IT cs.NI

    Broadcast Analysis for Large Cooperative Wireless Networks

    Authors: Cagatay Capar, Dennis Goeckel, Don Towsley

    Abstract: The capability of nodes to broadcast their message to the entire wireless network when nodes employ cooperation is considered. We employ an asymptotic analysis using an extended random network setting and show that the broadcast performance strongly depends on the path loss exponent of the medium. In particular, as the size of the random network grows, the probability of broadcast in a one-dimensi… ▽ More

    Submitted 16 April, 2011; originally announced April 2011.

    Comments: Submitted to IEEE Transactions on Information Theory

  42. arXiv:cs/0509085  [pdf, ps, other

    cs.NI cs.IT

    An Improved Lower Bound to the Number of Neighbors Required for the Asymptotic Connectivity of Ad Hoc Networks

    Authors: Sanquan Song, Dennis L. Goeckel, Don Towsley

    Abstract: Xue and Kumar have established that the number of neighbors required for connectivity of wireless networks with N uniformly distributed nodes must grow as log(N), and they also established that the actual number required lies between 0.074log(N) and 5.1774log(N). In this short paper, by recognizing that connectivity results for networks where the nodes are distributed according to a Poisson poin… ▽ More

    Submitted 27 September, 2005; originally announced September 2005.

    Comments: Submitted to IEEE Transactions on Information Theory