Skip to main content

Showing 1–13 of 13 results for author: Kittichokechai, K

.
  1. arXiv:2401.03333  [pdf, other

    cs.IT

    3GPP Release 18 Wake-up Receiver: Feature Overview and Evaluations

    Authors: Andreas Hoglund, Mohammad Mozaffari, Yanpeng Yang, Giuseppe Moschetti, Kittipong Kittichokechai, Ravikiran Nory

    Abstract: Enhancing the energy efficiency of devices stands as one of the key requirements in the fifth-generation (5G) cellular network and its evolutions toward the next generation wireless technology. Specifically, for battery-limited Internet-of-Things (IoT) devices where downlink monitoring significantly contributes to energy consumption, efficient solutions are required for power saving while addressi… ▽ More

    Submitted 6 January, 2024; originally announced January 2024.

  2. arXiv:2101.07310  [pdf, other

    cs.IT

    Coverage Evaluation for 5G Reduced Capability New Radio (NR-RedCap)

    Authors: Saeedeh Moloudi, Mohammad Mozaffari, Sandeep Narayanan Kadan Veedu, Kittipong Kittichokechai, Y. -P. Eric Wang, Johan Bergman, Andreas Höglund

    Abstract: The fifth generation (5G) wireless technology is primarily designed to address a wide range of use cases categorized into the enhanced mobile broadband (eMBB), ultra-reliable and low latency communication (URLLC), and massive machine-type communication (mMTC). Nevertheless, there are a few other use cases which are in-between these main use cases such as industrial wireless sensor networks, video… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

  3. arXiv:2010.08829  [pdf, other

    cs.IT

    Blocking Probability Analysis for 5G New Radio (NR) Physical Downlink Control Channel

    Authors: Mohammad Mozaffari, Y. -P. Eric Wang, Kittipong Kittichokechai

    Abstract: The 5th generation (5G) new radio (NR) is designed to support a wide range of use cases, requirements, and services from enhanced mobile broadband (eMBB) to ultra-reliable low-latency communications (URLLC). NR signals are designed to meet stringent requirements, and in particular the physical downlink control channel (PDCCH) which requires careful consideration. In this paper, we provide a compre… ▽ More

    Submitted 17 October, 2020; originally announced October 2020.

  4. arXiv:1804.01430  [pdf, other

    cs.IT cs.CR cs.MM eess.SP math.PR

    Controllable Identifier Measurements for Private Authentication with Secret Keys

    Authors: Onur Günlü, Kittipong Kittichokechai, Rafael F. Schaefer, Giuseppe Caire

    Abstract: The problem of secret-key based authentication under a privacy constraint on the source sequence is considered. The identifier measurements during authentication are assumed to be controllable via a cost-constrained "action" sequence. Single-letter characterizations of the optimal trade-off among the secret-key rate, storage rate, privacy-leakage rate, and action cost are given for the four proble… ▽ More

    Submitted 4 April, 2018; originally announced April 2018.

    Comments: 15 pages

    Journal ref: IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 1945-1959 (Aug. 2018)

  5. arXiv:1801.10552  [pdf, other

    cs.IT

    Pilot-Assisted Short-Packet Transmission over Multiantenna Fading Channels: A 5G Case Study

    Authors: Guido Carlo Ferrante, Johan Östman, Giuseppe Durisi, Kittipong Kittichokechai

    Abstract: Leveraging recent results in finite-blocklength information theory, we investigate the problem of designing a control channel in a 5G system. The setup involves the transmission, under stringent latency and reliability constraints, of a short data packet containing a small information payload, over a propagation channel that offers limited frequency diversity and no time diversity. We present an a… ▽ More

    Submitted 1 February, 2018; v1 submitted 31 January, 2018; originally announced January 2018.

    Comments: To be presented at CISS 2018 (http://ee-ciss.princeton.edu)

  6. arXiv:1607.07674  [pdf, other

    cs.IT

    Secret Key Generation Through a Relay

    Authors: Kittipong Kittichokechai, Rafael F. Schaefer, Giuseppe Caire

    Abstract: We consider problems of two-user secret key generation through an intermediate relay. Each user observes correlated source sequences and communicates to the relay over rate-limited noiseless links. The relay processes and broadcasts information to the two users over another rate-limited link. The users then generate a common secret key based on their sources and information from the relay. In the… ▽ More

    Submitted 26 July, 2016; originally announced July 2016.

    Comments: An extended version of a paper to be presented at ITW 2016

  7. arXiv:1605.01880  [pdf, ps, other

    cs.IT

    Privacy-Constrained Remote Source Coding

    Authors: Kittipong Kittichokechai, Giuseppe Caire

    Abstract: We consider the problem of revealing/sharing data in an efficient and secure way via a compact representation. The representation should ensure reliable reconstruction of the desired features/attributes while still preserve privacy of the secret parts of the data. The problem is formulated as a remote lossy source coding with a privacy constraint where the remote source consists of public and secr… ▽ More

    Submitted 6 May, 2016; originally announced May 2016.

    Comments: 10 pages, 1 figure, to be presented at ISIT 2016

  8. arXiv:1508.01295  [pdf, other

    cs.IT cs.CR

    Secret key-based Identification and Authentication with a Privacy Constraint

    Authors: Kittipong Kittichokechai, Giuseppe Caire

    Abstract: We consider the problem of identification and authentication based on secret key generation from some user-generated source data (e.g., a biometric source). The goal is to reliably identify users pre-enrolled in a database as well as authenticate them based on the estimated secret key while preserving the privacy of the enrolled data and of the generated keys. We characterize the optimal tradeoff… ▽ More

    Submitted 6 August, 2015; originally announced August 2015.

    Comments: 33 pages, 3 figures, submitted to IEEE Transactions on Information Theory

  9. arXiv:1504.01614  [pdf, ps, other

    cs.CR cs.IT

    Secret key-based Authentication with a Privacy Constraint

    Authors: Kittipong Kittichokechai, Giuseppe Caire

    Abstract: We consider problems of authentication using secret key generation under a privacy constraint on the enrolled source data. An adversary who has access to the stored description and correlated side information tries to deceive the authentication as well as learn about the source. We characterize the optimal tradeoff between the compression rate of the stored description, the leakage rate of the sou… ▽ More

    Submitted 7 April, 2015; originally announced April 2015.

    Comments: 8 pages, 2 figures, to be presented at ISIT 2015

  10. arXiv:1402.4308  [pdf, ps, other

    cs.IT

    Lossy Source Coding with Reconstruction Privacy

    Authors: Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We consider the problem of lossy source coding with side information under a privacy constraint that the reconstruction sequence at a decoder should be kept secret to a certain extent from another terminal such as an eavesdropper, a sender, or a helper. We are interested in how the reconstruction privacy constraint at a particular terminal affects the rate-distortion tradeoff. In this work, we all… ▽ More

    Submitted 24 June, 2014; v1 submitted 18 February, 2014; originally announced February 2014.

    Comments: 22 pages, added proofs, to be presented at ISIT 2014

  11. arXiv:1307.1397  [pdf

    cs.IT

    Secure Source Coding with a Public Helper

    Authors: Kittipong Kittichokechai, Yeow-Khiang Chia, Tobias J. Oechtering, Mikael Skoglund, Tsachy Weissman

    Abstract: We consider secure multi-terminal source coding problems in the presence of a public helper. Two main scenarios are studied: 1) source coding with a helper where the coded side information from the helper is eavesdropped by an external eavesdropper; 2) triangular source coding with a helper where the helper is considered as a public terminal. We are interested in how the helper can support the sou… ▽ More

    Submitted 4 July, 2013; originally announced July 2013.

    Comments: 45 pages, 12 figures, a short version to be presented at ISIT 2013

  12. arXiv:1307.0974  [pdf, ps, other

    cs.IT

    On Secure Source Coding with Side Information at the Encoder

    Authors: Yeow-Khiang Chia, Kittipong Kittichokechai

    Abstract: We consider a secure source coding problem with side information (S.I.) at the decoder and the eavesdropper. The encoder has a source that it wishes to describe with limited distortion through a rate limited link to a legitimate decoder. The message sent is also observed by the eavesdropper. The encoder aims to minimize both the distortion incurred by the legitimate decoder; and the information le… ▽ More

    Submitted 3 July, 2013; originally announced July 2013.

    Comments: 38 pages, 4 figures. Short version to be presented at ISIT 2013

  13. Coding With Action-dependent Side Information and Additional Reconstruction Requirements

    Authors: Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund

    Abstract: Constrained lossy source coding and channel coding with side information problems which extend the classic Wyner-Ziv and Gel'fand-Pinsker problems are considered. Inspired by applications in sensor networking and control, we first consider lossy source coding with two-sided partial side information where the quality/availability of the side information can be influenced by a cost-constrained actio… ▽ More

    Submitted 7 February, 2012; originally announced February 2012.

    Comments: submitted to IEEE Trans. Information Theory