-
3GPP Release 18 Wake-up Receiver: Feature Overview and Evaluations
Authors:
Andreas Hoglund,
Mohammad Mozaffari,
Yanpeng Yang,
Giuseppe Moschetti,
Kittipong Kittichokechai,
Ravikiran Nory
Abstract:
Enhancing the energy efficiency of devices stands as one of the key requirements in the fifth-generation (5G) cellular network and its evolutions toward the next generation wireless technology. Specifically, for battery-limited Internet-of-Things (IoT) devices where downlink monitoring significantly contributes to energy consumption, efficient solutions are required for power saving while addressi…
▽ More
Enhancing the energy efficiency of devices stands as one of the key requirements in the fifth-generation (5G) cellular network and its evolutions toward the next generation wireless technology. Specifically, for battery-limited Internet-of-Things (IoT) devices where downlink monitoring significantly contributes to energy consumption, efficient solutions are required for power saving while addressing performance tradeoffs. In this regard, the use of a low-power wake-up receiver (WUR) and wake-up signal (WUS) is an attractive solution for reducing the energy consumption of devices without compromising the downlink latency. This paper provides an overview of the standardization study on the design of low-power WUR and WUS within Release 18 of the third-generation partnership project (3GPP). We describe design principles, receiver architectures, waveform characteristics, and device procedures upon detection of WUS. In addition, we provide representative results to show the performance of the WUR in terms of power saving, coverage, and network overhead along with highlighting design tradeoffs.
△ Less
Submitted 6 January, 2024;
originally announced January 2024.
-
Coverage Evaluation for 5G Reduced Capability New Radio (NR-RedCap)
Authors:
Saeedeh Moloudi,
Mohammad Mozaffari,
Sandeep Narayanan Kadan Veedu,
Kittipong Kittichokechai,
Y. -P. Eric Wang,
Johan Bergman,
Andreas Höglund
Abstract:
The fifth generation (5G) wireless technology is primarily designed to address a wide range of use cases categorized into the enhanced mobile broadband (eMBB), ultra-reliable and low latency communication (URLLC), and massive machine-type communication (mMTC). Nevertheless, there are a few other use cases which are in-between these main use cases such as industrial wireless sensor networks, video…
▽ More
The fifth generation (5G) wireless technology is primarily designed to address a wide range of use cases categorized into the enhanced mobile broadband (eMBB), ultra-reliable and low latency communication (URLLC), and massive machine-type communication (mMTC). Nevertheless, there are a few other use cases which are in-between these main use cases such as industrial wireless sensor networks, video surveillance, or wearables. In order to efficiently serve such use cases, in Release 17, the 3rd generation partnership project (3GPP) introduced the reduced capability NR devices (NR-RedCap) with lower cost and complexity, smaller form factor and longer battery life compared to regular NR devices. However, one key potential consequence of device cost and complexity reduction is the coverage loss. In this paper, we provide a comprehensive evaluation of NR RedCap coverage for different physical channels and initial access messages to identify the channels/messages that are potentially coverage limiting for RedCap UEs. We perform the coverage evaluations for RedCap UEs operating in three different scenarios, namely Rural, Urban and Indoor with carrier frequencies 700 MHz, 2.6 GHz and 28 GHz, respectively. Our results confirm that for all the considered scenarios, the amounts of required coverage recovery for RedCap channels are either less than 1 dB or can be compensated by considering smaller data rate targets for RedCap use cases.
△ Less
Submitted 18 January, 2021;
originally announced January 2021.
-
Blocking Probability Analysis for 5G New Radio (NR) Physical Downlink Control Channel
Authors:
Mohammad Mozaffari,
Y. -P. Eric Wang,
Kittipong Kittichokechai
Abstract:
The 5th generation (5G) new radio (NR) is designed to support a wide range of use cases, requirements, and services from enhanced mobile broadband (eMBB) to ultra-reliable low-latency communications (URLLC). NR signals are designed to meet stringent requirements, and in particular the physical downlink control channel (PDCCH) which requires careful consideration. In this paper, we provide a compre…
▽ More
The 5th generation (5G) new radio (NR) is designed to support a wide range of use cases, requirements, and services from enhanced mobile broadband (eMBB) to ultra-reliable low-latency communications (URLLC). NR signals are designed to meet stringent requirements, and in particular the physical downlink control channel (PDCCH) which requires careful consideration. In this paper, we provide a comprehensive analysis on the PDCCH blocking probability in a network where multiple users need to be scheduled for receiving downlink control information. We evaluate the performance of blocking probability in terms of various network parameters including number of users, size of the control resource set (CORESET), and PDCCH aggregation levels (ALs). Our analysis reveals fundamental tradeoffs and key insights for efficient network design in terms of PDCCH blocking probability.
△ Less
Submitted 17 October, 2020;
originally announced October 2020.
-
Controllable Identifier Measurements for Private Authentication with Secret Keys
Authors:
Onur Günlü,
Kittipong Kittichokechai,
Rafael F. Schaefer,
Giuseppe Caire
Abstract:
The problem of secret-key based authentication under a privacy constraint on the source sequence is considered. The identifier measurements during authentication are assumed to be controllable via a cost-constrained "action" sequence. Single-letter characterizations of the optimal trade-off among the secret-key rate, storage rate, privacy-leakage rate, and action cost are given for the four proble…
▽ More
The problem of secret-key based authentication under a privacy constraint on the source sequence is considered. The identifier measurements during authentication are assumed to be controllable via a cost-constrained "action" sequence. Single-letter characterizations of the optimal trade-off among the secret-key rate, storage rate, privacy-leakage rate, and action cost are given for the four problems where noisy or noiseless measurements of the source are enrolled to generate or embed secret keys. The results are relevant for several user-authentication scenarios including physical and biometric authentications with multiple measurements. Our results include, as special cases, new results for secret-key generation and embedding with action-dependent side information without any privacy constraint on the enrolled source sequence.
△ Less
Submitted 4 April, 2018;
originally announced April 2018.
-
Pilot-Assisted Short-Packet Transmission over Multiantenna Fading Channels: A 5G Case Study
Authors:
Guido Carlo Ferrante,
Johan Östman,
Giuseppe Durisi,
Kittipong Kittichokechai
Abstract:
Leveraging recent results in finite-blocklength information theory, we investigate the problem of designing a control channel in a 5G system. The setup involves the transmission, under stringent latency and reliability constraints, of a short data packet containing a small information payload, over a propagation channel that offers limited frequency diversity and no time diversity. We present an a…
▽ More
Leveraging recent results in finite-blocklength information theory, we investigate the problem of designing a control channel in a 5G system. The setup involves the transmission, under stringent latency and reliability constraints, of a short data packet containing a small information payload, over a propagation channel that offers limited frequency diversity and no time diversity. We present an achievability bound, built upon the random-coding union bound with parameter $s$ (Martinez & Guillén i Fàbregas, 2011), which relies on quadrature phase-shift keying modulation, pilot-assisted transmission to estimate the fading channel, and scaled nearest-neighbor decoding at the receiver. Using our achievability bound, we determine how many pilot symbols should be transmitted to optimally trade between channel-estimation errors and rate loss due to pilot overhead. Our analysis also reveals the importance of using multiple antennas at the transmitter and/or the receiver to provide the spatial diversity needed to meet the stringent reliability constraint.
△ Less
Submitted 1 February, 2018; v1 submitted 31 January, 2018;
originally announced January 2018.
-
Secret Key Generation Through a Relay
Authors:
Kittipong Kittichokechai,
Rafael F. Schaefer,
Giuseppe Caire
Abstract:
We consider problems of two-user secret key generation through an intermediate relay. Each user observes correlated source sequences and communicates to the relay over rate-limited noiseless links. The relay processes and broadcasts information to the two users over another rate-limited link. The users then generate a common secret key based on their sources and information from the relay. In the…
▽ More
We consider problems of two-user secret key generation through an intermediate relay. Each user observes correlated source sequences and communicates to the relay over rate-limited noiseless links. The relay processes and broadcasts information to the two users over another rate-limited link. The users then generate a common secret key based on their sources and information from the relay. In the untrusted relay setting, the goal is to establish key agreement between the two users at the highest key rate without leaking information about the key to the relay. We characterize inner and outer bounds to the optimal tradeoff between communication and key rates. The inner bound is based on the scheme which involves a combination of binning, network coding, and key aggregation techniques. For the trusted relay setting with a public broadcast link, the optimal communication-key rate tradeoff is provided for a special case where the two sources are available losslessly at the relay. The results can be relevant for cloud-based secret key generation services.
△ Less
Submitted 26 July, 2016;
originally announced July 2016.
-
Privacy-Constrained Remote Source Coding
Authors:
Kittipong Kittichokechai,
Giuseppe Caire
Abstract:
We consider the problem of revealing/sharing data in an efficient and secure way via a compact representation. The representation should ensure reliable reconstruction of the desired features/attributes while still preserve privacy of the secret parts of the data. The problem is formulated as a remote lossy source coding with a privacy constraint where the remote source consists of public and secr…
▽ More
We consider the problem of revealing/sharing data in an efficient and secure way via a compact representation. The representation should ensure reliable reconstruction of the desired features/attributes while still preserve privacy of the secret parts of the data. The problem is formulated as a remote lossy source coding with a privacy constraint where the remote source consists of public and secret parts. Inner and outer bounds for the optimal tradeoff region of compression rate, distortion, and privacy leakage rate are given and shown to coincide for some special cases. When specializing the distortion measure to a logarithmic loss function, the resulting rate-distortion-leakage tradeoff for the case of identical side information forms an optimization problem which corresponds to the "secure" version of the so-called information bottleneck.
△ Less
Submitted 6 May, 2016;
originally announced May 2016.
-
Secret key-based Identification and Authentication with a Privacy Constraint
Authors:
Kittipong Kittichokechai,
Giuseppe Caire
Abstract:
We consider the problem of identification and authentication based on secret key generation from some user-generated source data (e.g., a biometric source). The goal is to reliably identify users pre-enrolled in a database as well as authenticate them based on the estimated secret key while preserving the privacy of the enrolled data and of the generated keys. We characterize the optimal tradeoff…
▽ More
We consider the problem of identification and authentication based on secret key generation from some user-generated source data (e.g., a biometric source). The goal is to reliably identify users pre-enrolled in a database as well as authenticate them based on the estimated secret key while preserving the privacy of the enrolled data and of the generated keys. We characterize the optimal tradeoff between the identification rate, the compression rate of the users' source data, information leakage rate, and secret key rate. In particular, we provide a coding strategy based on layered random binning which is shown to be optimal. In addition, we study a related secure identification/authentication problem where an adversary tries to deceive the system using its own data. Here the optimal tradeoff between the identification rate, compression rate, leakage rate, and exponent of the maximum false acceptance probability is provided. The results reveal a close connection between the optimal secret key rate and the false acceptance exponent of the identification/authentication system.
△ Less
Submitted 6 August, 2015;
originally announced August 2015.
-
Secret key-based Authentication with a Privacy Constraint
Authors:
Kittipong Kittichokechai,
Giuseppe Caire
Abstract:
We consider problems of authentication using secret key generation under a privacy constraint on the enrolled source data. An adversary who has access to the stored description and correlated side information tries to deceive the authentication as well as learn about the source. We characterize the optimal tradeoff between the compression rate of the stored description, the leakage rate of the sou…
▽ More
We consider problems of authentication using secret key generation under a privacy constraint on the enrolled source data. An adversary who has access to the stored description and correlated side information tries to deceive the authentication as well as learn about the source. We characterize the optimal tradeoff between the compression rate of the stored description, the leakage rate of the source data, and the exponent of the adversary's maximum false acceptance probability. The related problem of secret key generation with a privacy constraint is also studied where the optimal tradeoff between the compression rate, leakage rate, and secret key rate is characterized. It reveals a connection between the optimal secret key rate and security of the authentication system.
△ Less
Submitted 7 April, 2015;
originally announced April 2015.
-
Lossy Source Coding with Reconstruction Privacy
Authors:
Kittipong Kittichokechai,
Tobias J. Oechtering,
Mikael Skoglund
Abstract:
We consider the problem of lossy source coding with side information under a privacy constraint that the reconstruction sequence at a decoder should be kept secret to a certain extent from another terminal such as an eavesdropper, a sender, or a helper. We are interested in how the reconstruction privacy constraint at a particular terminal affects the rate-distortion tradeoff. In this work, we all…
▽ More
We consider the problem of lossy source coding with side information under a privacy constraint that the reconstruction sequence at a decoder should be kept secret to a certain extent from another terminal such as an eavesdropper, a sender, or a helper. We are interested in how the reconstruction privacy constraint at a particular terminal affects the rate-distortion tradeoff. In this work, we allow the decoder to use a random map**, and give inner and outer bounds to the rate-distortion-equivocation region for different cases where the side information is available non-causally and causally at the decoder. In the special case where each reconstruction symbol depends only on the source description and current side information symbol, the complete rate-distortion-equivocation region is provided. A binary example illustrating a new tradeoff due to the new privacy constraint, and a gain from the use of a stochastic decoder is given.
△ Less
Submitted 24 June, 2014; v1 submitted 18 February, 2014;
originally announced February 2014.
-
Secure Source Coding with a Public Helper
Authors:
Kittipong Kittichokechai,
Yeow-Khiang Chia,
Tobias J. Oechtering,
Mikael Skoglund,
Tsachy Weissman
Abstract:
We consider secure multi-terminal source coding problems in the presence of a public helper. Two main scenarios are studied: 1) source coding with a helper where the coded side information from the helper is eavesdropped by an external eavesdropper; 2) triangular source coding with a helper where the helper is considered as a public terminal. We are interested in how the helper can support the sou…
▽ More
We consider secure multi-terminal source coding problems in the presence of a public helper. Two main scenarios are studied: 1) source coding with a helper where the coded side information from the helper is eavesdropped by an external eavesdropper; 2) triangular source coding with a helper where the helper is considered as a public terminal. We are interested in how the helper can support the source transmission subject to a constraint on the amount of information leaked due to its public nature. We characterize the tradeoff between transmission rate, incurred distortion, and information leakage rate at the helper/eavesdropper in the form of a rate-distortion-leakage region for various classes of problems.
△ Less
Submitted 4 July, 2013;
originally announced July 2013.
-
On Secure Source Coding with Side Information at the Encoder
Authors:
Yeow-Khiang Chia,
Kittipong Kittichokechai
Abstract:
We consider a secure source coding problem with side information (S.I.) at the decoder and the eavesdropper. The encoder has a source that it wishes to describe with limited distortion through a rate limited link to a legitimate decoder. The message sent is also observed by the eavesdropper. The encoder aims to minimize both the distortion incurred by the legitimate decoder; and the information le…
▽ More
We consider a secure source coding problem with side information (S.I.) at the decoder and the eavesdropper. The encoder has a source that it wishes to describe with limited distortion through a rate limited link to a legitimate decoder. The message sent is also observed by the eavesdropper. The encoder aims to minimize both the distortion incurred by the legitimate decoder; and the information leakage rate at the eavesdropper. When the encoder has access to the uncoded S.I. at the decoder, we characterize the rate-distortion-information leakage rate (R.D.I.) region under a Markov chain assumption and when S.I. at the encoder does not improve the rate-distortion region as compared to the case when S.I. is absent. When the decoder also has access to the eavesdroppers S.I., we characterize the R.D.I. region without the Markov Chain condition. We then consider a related setting where the encoder and decoder obtain coded S.I. through a rate limited helper, and characterize the R.D.I. region for several special cases, including special cases under logarithmic loss distortion and for special cases of the Quadratic Gaussian setting. Finally, we consider the amplification measures of list or entropy constraint at the decoder, and show that the R.D.I. regions for the settings considered in this paper under these amplification measures coincide with R.D.I. regions under per symbol logarithmic loss distortion constraint at the decoder.
△ Less
Submitted 3 July, 2013;
originally announced July 2013.
-
Coding With Action-dependent Side Information and Additional Reconstruction Requirements
Authors:
Kittipong Kittichokechai,
Tobias J. Oechtering,
Mikael Skoglund
Abstract:
Constrained lossy source coding and channel coding with side information problems which extend the classic Wyner-Ziv and Gel'fand-Pinsker problems are considered. Inspired by applications in sensor networking and control, we first consider lossy source coding with two-sided partial side information where the quality/availability of the side information can be influenced by a cost-constrained actio…
▽ More
Constrained lossy source coding and channel coding with side information problems which extend the classic Wyner-Ziv and Gel'fand-Pinsker problems are considered. Inspired by applications in sensor networking and control, we first consider lossy source coding with two-sided partial side information where the quality/availability of the side information can be influenced by a cost-constrained action sequence. A decoder reconstructs a source sequence subject to the distortion constraint, and at the same time, an encoder is additionally required to be able to estimate the decoder's reconstruction. Next, we consider the channel coding "dual" where the channel state is assumed to depend on the action sequence, and the decoder is required to decode both the transmitted message and channel input reliably. Implications on the fundamental limits of communication in discrete memoryless systems due to the additional reconstruction constraints are investigated. Single-letter expressions for the rate-distortion-cost function and channel capacity for the respective source and channel coding problems are derived. The dual relation between the two problems is discussed. Additionally, based on the two-stage coding structure and the additional reconstruction constraint of the channel coding problem, we discuss and give an interpretation of the two-stage coding condition which appears in the channel capacity expression. Besides the rate constraint on the message, this condition is a necessary and sufficient condition for reliable transmission of the channel input sequence over the channel in our "two-stage" communication problem. It is also shown in one example that there exists a case where the two-stage coding condition can be active in computing the capacity, and it thus can actively restrict the set of capacity achieving input distributions.
△ Less
Submitted 7 February, 2012;
originally announced February 2012.