-
Stochastic Analysis of Homogeneous Wireless Networks Assisted by Intelligent Reflecting Surfaces
Authors:
Ali H. Abdollahi Bafghi,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari,
Behrouz Maham,
Umberto Spagnolini
Abstract:
In this paper, we study the impact of the existence of multiple IRSs in a homogeneous wireless network, in which all BSs, users (U), and IRSs are spatially distributed by an independent homogeneous PPP, with density $λ_{\rm BS}\rm{[BS/m^2]}$, $λ_{\rm U}\rm{[U/m^2]}$, and $λ_{\rm IRS}\rm{[IRS/m^2]}$, respectively. We utilize a uniformly random serving strategy for BS and IRS to create stochastic sy…
▽ More
In this paper, we study the impact of the existence of multiple IRSs in a homogeneous wireless network, in which all BSs, users (U), and IRSs are spatially distributed by an independent homogeneous PPP, with density $λ_{\rm BS}\rm{[BS/m^2]}$, $λ_{\rm U}\rm{[U/m^2]}$, and $λ_{\rm IRS}\rm{[IRS/m^2]}$, respectively. We utilize a uniformly random serving strategy for BS and IRS to create stochastic symmetry in the network. We analyze the performance of the network and study the effect of the existence of the IRS on the network performance. To this end, for a typical user in the system, we derive analytical upper and lower bounds on the expectation of the power (second statistical moment) of the desired signal and the interference caused by BSs and other users. After that, we obtain analytical upper bounds on the decay of the probability of the power of the desired signal and the interference for the typical user (which results in a lower bound for the cumulative distribution function (CDF)). Moreover, we derive upper bounds on the decay of the probability of the capacity of one typical user, which results in a lower bound for the outage probability. In the numerical results, we observe that the numerical calculation of the power of the desired signal and the interference is near the derived lower bounds and we show that the increment of the parameter ${(λ_{\rm IRS})}$ causes increment in powers of both the desired and interference signals. We also observe that the increment of the parameter ${λ_{\rm IRS}}$ causes the decrement of outage probability.
△ Less
Submitted 11 June, 2024;
originally announced June 2024.
-
On Stochastic Fundamental Limits in a Downlink Integrated Sensing and Communication Network
Authors:
Marziyeh Soltani,
Mahtab Mirmohseni,
Rahim Tafazolli
Abstract:
This paper aims to analyze the stochastic performance of a multiple input multiple output (MIMO) integrated sensing and communication (ISAC) system in a downlink scenario, where a base station (BS) transmits a dual-functional radar-communication (DFRC) signal matrix, serving the purpose of transmitting communication data to the user while simultaneously sensing the angular location of a target. Th…
▽ More
This paper aims to analyze the stochastic performance of a multiple input multiple output (MIMO) integrated sensing and communication (ISAC) system in a downlink scenario, where a base station (BS) transmits a dual-functional radar-communication (DFRC) signal matrix, serving the purpose of transmitting communication data to the user while simultaneously sensing the angular location of a target. The channel between the BS and the user is modeled as a random channel with Rayleigh fading distribution, and the azimuth angle of the target is assumed to follow a uniform distribution. Due to the randomness inherent in the network, the challenge is to consider suitable performance metrics for this randomness. To address this issue, for users, we employ the user's rate outage probability (OP) and ergodic rate, while for target, we propose using the OP of the Cramér-Rao lower bound (CRLB) for the angle of arrival and the ergodic CRLB. We have obtained the expressions of these metrics for scenarios where the BS employs two different beamforming methods. Our approach to deriving these metrics involves computing the probability density function (PDF) of the signal-to-noise ratio for users and the CRLB for the target. We have demonstrated that the central limit theorem provides a viable approach for deriving these PDFs. In our numerical results, we demonstrate the trade-off between sensing and communication (S \& C) by characterizing the region of S \& C metrics and by obtaining the Pareto optimal boundary points, confirmed with simulations.
△ Less
Submitted 8 May, 2024;
originally announced May 2024.
-
Secure Semantic Communication over Wiretap Channel
Authors:
Denis Kozlov,
Mahtab Mirmohseni,
Rahim Tafazolli
Abstract:
Semantic communication is an emerging feature for future networks like 6G, which emphasizes the meaning of the message in contrast to the traditional approach where the meaning of the message is irrelevant. Yet, the open nature of a wireless channel poses security risks for semantic communications. In this paper, we derive information-theoretic limits for the secure transmission of semantic source…
▽ More
Semantic communication is an emerging feature for future networks like 6G, which emphasizes the meaning of the message in contrast to the traditional approach where the meaning of the message is irrelevant. Yet, the open nature of a wireless channel poses security risks for semantic communications. In this paper, we derive information-theoretic limits for the secure transmission of semantic source over wiretap channel. Under separate equivocation and distortion conditions for semantics and observed data, we present the general outer and inner bounds on the rate-distortion-equivocation region. We also reduce the general region to a case of Gaussian source and channel and provide numerical evaluations.
△ Less
Submitted 10 May, 2024; v1 submitted 6 May, 2024;
originally announced May 2024.
-
A Novel Stochastic Model for IRS-Assisted Communication Systems Based on the Sum-Product of Nakagami-$m$ Random Variables
Authors:
Hamid Amiriara,
Mahtab Mirmohseni,
Farid Ashtiani,
Masoumeh Nasiri-Kenari
Abstract:
This paper presents exact formulas for the probability distribution function (PDF) and moment generating function (MGF) of the sum-product of statistically independent but not necessarily identically distributed (i.n.i.d.) Nakagami-$m$ random variables (RVs) in terms of Meijer's G-function. Additionally, exact series representations are also derived for the sum of double-Nakagami RVs, providing us…
▽ More
This paper presents exact formulas for the probability distribution function (PDF) and moment generating function (MGF) of the sum-product of statistically independent but not necessarily identically distributed (i.n.i.d.) Nakagami-$m$ random variables (RVs) in terms of Meijer's G-function. Additionally, exact series representations are also derived for the sum of double-Nakagami RVs, providing useful insights on the trade-off between accuracy and computational cost. Simple asymptotic analytical expressions are provided to gain further insight into the derived formula, and the achievable diversity order is obtained. The suggested statistical properties are proved to be a highly useful tool for modeling parallel cascaded Nakagami-$m$ fading channels. The application of these new results is illustrated by deriving exact expressions and simple tight upper bounds for the outage probability (OP) and average symbol error rate (ASER) of several binary and multilevel modulation signals in intelligent reflecting surfaces (IRSs)-assisted communication systems operating over Nakagami-$m$ fading channels. It is demonstrated that the new asymptotic expression is highly accurate and can be extended to encompass a wider range of scenarios. To validate the theoretical frameworks and formulations, Monte-Carlo simulation results are presented. Additionally, supplementary simulations are provided to compare the derived results with two common types of approximations available in the literature, namely the central limit theorem (CLT) and gamma distribution.
△ Less
Submitted 18 January, 2024; v1 submitted 11 January, 2024;
originally announced January 2024.
-
Outage Tradeoff Analysis in a Downlink Integrated Sensing and Communication Network
Authors:
Marziyeh Soltani,
Mahtab Mirmohseni,
Rahim Tafazolli
Abstract:
This paper aims to analyze the stochastic performance of a multiple input multiple output (MIMO) integrated sensing and communication (ISAC) system in a downlink scenario, where a base station (BS) transmits a dual-functional radar-communication (DFRC) signal matrix, serving the purpose of transmitting communication data to the user while simultaneously sensing the angular location of a target. Th…
▽ More
This paper aims to analyze the stochastic performance of a multiple input multiple output (MIMO) integrated sensing and communication (ISAC) system in a downlink scenario, where a base station (BS) transmits a dual-functional radar-communication (DFRC) signal matrix, serving the purpose of transmitting communication data to the user while simultaneously sensing the angular location of a target. The channel between the BS and the user is modeled as a random channel with Rayleigh fading distribution, and the azimuth angle of the target is assumed to follow a uniform distribution. We use a maximum ratio transmission (MRT) beamformer to share resource between sensing and communication (S \& C) and observe the trade-off between them. We derive the approximate probability density function (PDF) of the signal-to-noise ratio (SNR) for both the user and the target. Subsequently, leveraging the obtained PDF, we derive the expressions for the user's rate outage probability (OP), as well as the OP for the Cramer-Rao lower bound (CRLB) of the angle of arrival (AOA). In our numerical results, we demonstrate the trade-off between S \& C, confirmed with simulations.
△ Less
Submitted 24 May, 2023;
originally announced May 2023.
-
Statistics of Random Binning Based on Tsallis Divergence
Authors:
Masoud Kavian,
Mohammad Mahdi Mojahedian,
Mohammad Hossein Yassaee,
Mahtab Mirmohseni,
Mohammad Reza Aref
Abstract:
Random binning is a widely utilized tool in information theory, finding applications in various domains. In this paper, we focus on the output statistics of random binning (OSRB) using the Tsallis divergence $T_α$. Our investigation encompasses all values of $α$ within the range of $(0,\infty)$. The proofs provided in this paper cover both the achievability and converse aspects. To accommodate the…
▽ More
Random binning is a widely utilized tool in information theory, finding applications in various domains. In this paper, we focus on the output statistics of random binning (OSRB) using the Tsallis divergence $T_α$. Our investigation encompasses all values of $α$ within the range of $(0,\infty)$. The proofs provided in this paper cover both the achievability and converse aspects. To accommodate the unbounded nature of $T_\infty$, we analyze the OSRB framework using the Rényi's divergence criterion with the order of infinity, denoted as $D_\infty$. During our exploration of OSRB, we encounter a specific form of Rényi's conditional entropy and delve into its properties. Additionally, we demonstrate the effectiveness of this framework in establishing achievability results for wiretap channel, where Tsallis divergence serves as a security measure.
△ Less
Submitted 13 February, 2024; v1 submitted 25 April, 2023;
originally announced April 2023.
-
IRS-User Association in IRS-Aided MISO Wireless Networks: Convex Optimization and Machine Learning Approaches
Authors:
Hamid Amiriara,
Farid Ashtiani,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
This paper concentrates on the problem of associating an intelligent reflecting surface (IRS) to multiple users in a multiple-input single-output (MISO) downlink wireless communication network. The main objective of the paper is to maximize the sum-rate of all users by solving the joint optimization problem of the IRS-user association, IRS reflection, and BS beamforming, formulated as a non-convex…
▽ More
This paper concentrates on the problem of associating an intelligent reflecting surface (IRS) to multiple users in a multiple-input single-output (MISO) downlink wireless communication network. The main objective of the paper is to maximize the sum-rate of all users by solving the joint optimization problem of the IRS-user association, IRS reflection, and BS beamforming, formulated as a non-convex mixed-integer optimization problem. The variable separation and relaxation are used to transform the problem into three convex sub-problems, which are alternatively solved through the convex optimization (CO) method. The major drawback of the proposed CO-based algorithm is high computational complexity. Thus, we make use of machine learning (ML) to tackle this problem. To this end, first, we convert the optimization problem into a regression problem. Then, we solve it with feed-forward neural networks (FNNs), trained by CO-based generated data. Simulation results show that the proposed ML-based algorithm has a performance equivalent to the CO-based algorithm, but with less computation complexity due to its offline training procedure.
△ Less
Submitted 29 October, 2022;
originally announced October 2022.
-
Physical Layer Security in Random NOMA-Enabled Heterogeneous Networks
Authors:
Elmira Shahraki,
Mahtab Mirmohseni,
Hengameh Keshavarz
Abstract:
The performance of physical layer secrecy approach in non-orthogonal multiple access (NOMA)-enabled heterogeneous networks (HetNets) is analyzed in this paper. A $K$-tier multi-cell HetNet is considered, comprising NOMA adopted in all tiers. The base stations, legitimate users (in a two-user NOMA setup), and passive eavesdroppers, all with single-antenna, are randomly distributed. Assuming indepen…
▽ More
The performance of physical layer secrecy approach in non-orthogonal multiple access (NOMA)-enabled heterogeneous networks (HetNets) is analyzed in this paper. A $K$-tier multi-cell HetNet is considered, comprising NOMA adopted in all tiers. The base stations, legitimate users (in a two-user NOMA setup), and passive eavesdroppers, all with single-antenna, are randomly distributed. Assuming independent Poisson point processes for node distribution, stochastic geometry approaches are exploited to characterize the ergodic secrecy rate. A lower bound on the ergodic secrecy rate along with closed-form expressions for the lower bound on the ergodic rates of the legitimate users in a special case are derived. Moreover, simpler expressions for the ergodic secrecy rate are obtained in the interference-limited regime with vanishing noise variance. The effect of multi-tier technology, NOMA, and physical layer secrecy are investigated using numerical results. The results reveal that applying HetNet to a secure multi-cell NOMA system improves the spectrum efficiency performance.
△ Less
Submitted 21 October, 2022;
originally announced October 2022.
-
Abnormality Detection and Localization Schemes using Molecular Communication Systems: A Survey
Authors:
Ali Etemadi,
Maryam Farahnak-Ghazani,
Hamidreza Arjmandi,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
Abnormality detection and localization (ADL) have been studied widely in wireless sensor networks (WSNs) literature, where the sensors use electromagnetic waves for communication. Molecular communication (MC) has been introduced as an alternative approach for ADL in particular areas such as healthcare, being able to tackle the shortcomings of conventional WSNs, such as invasiveness, bio-incompatib…
▽ More
Abnormality detection and localization (ADL) have been studied widely in wireless sensor networks (WSNs) literature, where the sensors use electromagnetic waves for communication. Molecular communication (MC) has been introduced as an alternative approach for ADL in particular areas such as healthcare, being able to tackle the shortcomings of conventional WSNs, such as invasiveness, bio-incompatibility, and high energy consumption. In this paper, we introduce a general framework for MC-based ADL, which consists of multiple tiers for sensing the abnormality and communication between different agents, including the sensors, the fusion center (FC), the gateway (GW), and the external node (e.g., a local cloud), and describe each tier and the agents in this framework. We classify and explain different abnormality recognition methods, the functional units of the sensors, and different sensor features. Further, we describe different types of interfaces required for converting the internal and external signals at the FC and GW. Moreover, we present a unified channel model for the sensing and communication links. We categorize the MC-based abnormality detection schemes based on the sensor mobility, cooperative detection, and cooperative sensing/activation. We also classify the localization approaches based on the sensor mobility and propulsion mechanisms and present a general framework for the externally-controllable localization systems. Finally, we present some challenges and future research directions to realize and develop MC-based systems for ADL. The important challenges in the MC-based systems lie in four main directions as implementation, system design, modeling, and methods, which need considerable attention from multidisciplinary perspectives.
△ Less
Submitted 12 November, 2022; v1 submitted 13 July, 2022;
originally announced July 2022.
-
Joint Sensing, Communication and Localization of a Silent Abnormality Using Molecular Diffusion
Authors:
Ladan Khaloopour,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
In this paper, we propose a molecular communication system to localize an abnormality in a diffusion based medium. We consider a general setup to perform joint sensing, communication and localization. This setup consists of three types of devices, each for a different task: mobile sensors for navigation and molecule releasing (for communication), fusion centers (FC)s for sampling, amplifying and f…
▽ More
In this paper, we propose a molecular communication system to localize an abnormality in a diffusion based medium. We consider a general setup to perform joint sensing, communication and localization. This setup consists of three types of devices, each for a different task: mobile sensors for navigation and molecule releasing (for communication), fusion centers (FC)s for sampling, amplifying and forwarding the signal, and a gateway for making decision or exchanging the information with an external device. The sensors move randomly in the environment to reach the abnormality. We consider both collaborative and non-collaborative sensors that simultaneously release their molecules to the FCs when the number of activated sensors or the moving time reach a certain threshold, respectively. The FCs amplify the received signal and forward it to the gateway for decision making using either an ideal or a noisy communication channel. A practical application of the proposed model is drug delivery in a tissue of human body, in order to guide the nanomachine bound drug to the exact location. The decision rules and probabilities of error are obtained for two considered sensors types in both ideal and noisy communication channels.
△ Less
Submitted 30 March, 2022;
originally announced March 2022.
-
Distributed Attribute-based Private Access Control
Authors:
Amir Masoud Jafarpisheh,
Mahtab Mirmohseni,
Mohammad Ali Maddah-Ali
Abstract:
In attribute-based access control, users with certain verified attributes will gain access to some particular data. Concerning with privacy of the users' attributes, we study the problem of distributed attribute-based private access control (DAPAC) with multiple authorities, where each authority will learn and verify only one of the attributes.
To investigate its fundamental limits, we introduce…
▽ More
In attribute-based access control, users with certain verified attributes will gain access to some particular data. Concerning with privacy of the users' attributes, we study the problem of distributed attribute-based private access control (DAPAC) with multiple authorities, where each authority will learn and verify only one of the attributes.
To investigate its fundamental limits, we introduce an information theoretic DAPAC framework, with $N \in \mathbb{N}$, $N\geq 2$, replicated non-colluding servers (authorities) and some users. Each user has an attribute vector $\mathbf{v^*}=(v_1^*, ..., v_N^*)$ of dimension $N$ and is eligible to retrieve a message $W^{\mathbf{v}^*}$, available in all servers. Each server $n\in [N]$ is able to only observe and verify the $n$'th attribute of a user. In response, it sends a function of its data to the user. The system must satisfy the following conditions: (1) Correctness: the user with attribute vector $\mathbf{v^*}$ is able to retrieve his intended message $W^{\mathbf{v}^*}$ from the servers' response, (2) Data Secrecy: the user will not learn anything about the other messages, (3) Attribute Privacy: each Server~$n$ learns nothing beyond attribute $n$ of the user. The capacity of the DAPAC is defined as the ratio of the file size and the aggregated size of the responses, maximized over all feasible schemes. We obtain a lower bound on the capacity of this problem by proposing an achievable algorithm with rate $\frac{1}{2K}$, where $K$ is the size of the alphabet of each attribute.
△ Less
Submitted 9 February, 2022;
originally announced February 2022.
-
Privacy-aware Distributed Hypothesis Testing in Gray-Wyner Network with Side Information
Authors:
Reza Abbasalipour,
Mahtab Mirmohseni
Abstract:
The problem of distributed binary hypothesis testing in the Gray-Wyner network with side information is studied in this paper. An observer has access to a discrete memoryless and stationary source and describes its observation to two detectors via one common and two private channels. The channels are considered error-free but rate-limited. Each detector also has access to its own discrete memoryle…
▽ More
The problem of distributed binary hypothesis testing in the Gray-Wyner network with side information is studied in this paper. An observer has access to a discrete memoryless and stationary source and describes its observation to two detectors via one common and two private channels. The channels are considered error-free but rate-limited. Each detector also has access to its own discrete memoryless and stationary source, i.e., the side information. The goal is to perform two distinct binary hypothesis testings on the joint distribution of observations at detectors. Additionally, the observer aims to keep a correlated latent source private against the detectors. Equivocation is used as the measure of the privacy preserved for the latent source. An achievable inner bound is derived for the general case by introducing a non-asymptotic account of the output statistics of the random binning.
△ Less
Submitted 4 February, 2022;
originally announced February 2022.
-
On Achievable Degrees of Freedom for the Frequency-Selective K-User Interference Channel in the Presence of an Instantaneous Relay
Authors:
Ali H. Abdollahi Bafghi,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
In this paper, we study the degrees of freedom (DoF) of the frequency-selective K-user interference channel in the presence of an instantaneous relay (IR) with multiple receive and transmit antennas. We investigate two scenarios based on the IR antennas' cooperation ability. First, we assume that the IR receive and transmit antennas can coordinate with each other, where the transmitted signal of e…
▽ More
In this paper, we study the degrees of freedom (DoF) of the frequency-selective K-user interference channel in the presence of an instantaneous relay (IR) with multiple receive and transmit antennas. We investigate two scenarios based on the IR antennas' cooperation ability. First, we assume that the IR receive and transmit antennas can coordinate with each other, where the transmitted signal of each transmit antenna can depend on the received signals of all receive antennas, and we derive an achievable DoF for this model. In our interference alignment scheme, we divide receivers into two groups, called clean and dirty receivers. We design our scheme such that a part of the message of clean receivers can be demultiplexed at the IR. Thus, the IR can use these message streams for interference cancelation at the clean receivers. Next, we consider an IR, whose antennas do not have coordination with each other, where the transmitted signal of each transmit antenna only depends on the received signal of its corresponding receive antenna, and we derive an achievable DoF for it. We show that the achievable DoF decreases considerably compared with the coordinated case. In both of these models, our schemes achieve the maximum K DoFs, if the number of transmit and receive antennas is more than a finite threshold.
△ Less
Submitted 20 September, 2021;
originally announced September 2021.
-
Theoretical Concept Study of Cooperative Abnormality Detection and Localization in Fluidic-Medium Molecular Communication
Authors:
Ladan Khaloopour,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
In this paper, we propose a theoretical framework for cooperative abnormality detection and localization systems by exploiting molecular communication setup. The system consists of mobile sensors in a fluidic medium, which are injected into the medium to search the environment for abnormality. Some fusion centers (FC) are placed at specific locations in the medium, which absorb all sensors arrived…
▽ More
In this paper, we propose a theoretical framework for cooperative abnormality detection and localization systems by exploiting molecular communication setup. The system consists of mobile sensors in a fluidic medium, which are injected into the medium to search the environment for abnormality. Some fusion centers (FC) are placed at specific locations in the medium, which absorb all sensors arrived at their locations, and by observing its state, each FC decides on the abnormality existence and/or its location. To reduce the effects of sensor imperfection, we propose a scheme where the sensors release some molecules (i.e., markers) into the medium after they sense an abnormality. If the goal is abnormality detection, the released molecules are used to cooperatively activate other sensors. If the goal is abnormality localization, the released molecules are used by the FCs to determine the location. In our model, both sensors' imperfection and markers background noise are taken into account. For the detection phase, we consider two sensor types based on their activation strategy by markers. To make the analysis tractable, we assume some ideal assumptions for the sensors' model. We investigate the related binary hypothesis testing problem and obtain the probabilities of false alarm and miss-detection. It is shown that using sensors with the ability of cooperatively activating each other can significantly improve the detection performance in terms of probability of error. For the localization phase, we consider two types of FCs based on their capability in reading sensors' storage levels. We study their performance and obtain the optimal and sub-optimal decision schemes and also the probability of localization error for both perfect and imperfect sensing regimes.
△ Less
Submitted 16 May, 2021;
originally announced May 2021.
-
Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers
Authors:
Marziyeh Soltani,
Mahtab Mirmohseni,
Panos Papadimitratos
Abstract:
Non-orthogonal multiple access (NOMA) and massive multiple-input multiple-output (MIMO) systems are highly efficient. Massive MIMO systems are inherently resistant to passive attackers (eavesdroppers), thanks to transmissions directed to the desired users. However, active attackers can transmit a combination of legitimate user pilot signals during the channel estimation phase. This way they can mi…
▽ More
Non-orthogonal multiple access (NOMA) and massive multiple-input multiple-output (MIMO) systems are highly efficient. Massive MIMO systems are inherently resistant to passive attackers (eavesdroppers), thanks to transmissions directed to the desired users. However, active attackers can transmit a combination of legitimate user pilot signals during the channel estimation phase. This way they can mislead the base station (BS) to rotate the transmission in their direction, and allow them to eavesdrop during the downlink data transmission phase. In this paper, we analyse this vulnerability in an improved system model and stronger adversary assumptions, and investigate how physical layer security can mitigate such attacks and ensure secure (confidential) communication. We derive the secrecy outage probability (SOP) and a lower bound on the ergodic secrecy capacity, using stochastic geometry tools when the number of antennas in the BSs tends to infinity. We adapt the result to evaluate the secrecy performance in massive orthogonal multiple access (OMA). We find that appropriate power allocation allows NOMA to outperform OMA in terms of ergodic secrecy rate and SOP.
△ Less
Submitted 5 May, 2021;
originally announced May 2021.
-
The Capacity Region of Distributed Multi-User Secret Sharing
Authors:
Ali Khalesi,
Mahtab Mirmohseni,
Mohammad Ali Maddah-Ali
Abstract:
In this paper, we study the problem of distributed multi-user secret sharing, including a trusted master node, $N\in \mathbb{N}$ storage nodes, and $K$ users, where each user has access to the contents of a subset of storage nodes. Each user has an independent secret message with certain rate, defined as the size of the message normalized by the size of a storage node. Having access to the secret…
▽ More
In this paper, we study the problem of distributed multi-user secret sharing, including a trusted master node, $N\in \mathbb{N}$ storage nodes, and $K$ users, where each user has access to the contents of a subset of storage nodes. Each user has an independent secret message with certain rate, defined as the size of the message normalized by the size of a storage node. Having access to the secret messages, the trusted master node places encoded shares in the storage nodes, such that (i) each user can recover its own message from the content of the storage nodes that it has access to, (ii) each user cannot gain any information about the message of any other user. We characterize the capacity region of the distributed multi-user secret sharing, defined as the set of all achievable rate tuples, subject to the correctness and privacy constraints. In the achievable scheme, for each user, the master node forms a polynomial with the degree equal to the number of its accessible storage nodes minus one, where the value of this polynomial at certain points are stored as the encoded shares. The message of that user is embedded in some of the coefficients of the polynomial. The remaining coefficients are determined such that the content of each storage node serves as the encoded shares for all users that have access to that storage node.
△ Less
Submitted 2 March, 2021;
originally announced March 2021.
-
Interference Alignment Using Reaction in Molecular Interference Channels
Authors:
Maryam Farahnak-Ghazani,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
Co-channel interference (CCI) is a performance limiting factor in molecular communication (MC) systems with shared medium. Interference alignment (IA) is a promising scheme to mitigate CCI in traditional communication systems. Due to the signal-dependent noise in MC systems, the traditional IA schemes are less useful in MC systems. In this paper, we propose a novel IA scheme in molecular interfere…
▽ More
Co-channel interference (CCI) is a performance limiting factor in molecular communication (MC) systems with shared medium. Interference alignment (IA) is a promising scheme to mitigate CCI in traditional communication systems. Due to the signal-dependent noise in MC systems, the traditional IA schemes are less useful in MC systems. In this paper, we propose a novel IA scheme in molecular interference channels (IFCs), based on the choice of releasing/sampling times. To cancel the aligned interference signals and reduce the signal dependent noise, we use molecular reaction in the proposed IA scheme. We obtain the feasible region for the releasing/sampling times in the proposed scheme. Further, we investigate the error performance of the proposed scheme. Our results show that the proposed IA scheme using reaction improves the performance significantly.\blfootnote{This work was supported in part by the Iran National Science Foundation (INSF) Research Grant on Nano-Network Communications and in part by the Research Center of Sharif University of Technology.
△ Less
Submitted 26 June, 2022; v1 submitted 26 January, 2021;
originally announced January 2021.
-
Achievable Rates for Binary Two-hop Channel with Energy Harvesting Relay and Finite Battery
Authors:
Ali H. Abdollahi Bafghi,
Mahtab Mirmohseni,
Mohammad Reza Aref
Abstract:
We study the problem of joint information and energy transfer in a binary two-hop channel with an energy harvesting relay. We consider a finite battery size at the relay and energy loss in transmitting energy. In other words, to be able to send an energy-contained symbol, the relay must receive multiple energy-contained symbols. Thus, we face a kind of channel with memory. We model the energy save…
▽ More
We study the problem of joint information and energy transfer in a binary two-hop channel with an energy harvesting relay. We consider a finite battery size at the relay and energy loss in transmitting energy. In other words, to be able to send an energy-contained symbol, the relay must receive multiple energy-contained symbols. Thus, we face a kind of channel with memory. We model the energy saved in the battery as the channel state with the challenge that the receiver does not know the channel state. We propose two different achievable schemes, the first one is based on state-dependent superposition coding and the second one is based on the equivalent timing channel approach. Both of our schemes are based on block Markov coding and backward decoding techniques. Due to these two approaches, we find achievable rates with a single-letter expression for the model.
△ Less
Submitted 28 September, 2021; v1 submitted 31 December, 2020;
originally announced January 2021.
-
On Molecular Flow Velocity Meters
Authors:
Maryam Farahnak-Ghazani,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
Flow velocity is an important characteristic of the fluidic mediums. In this paper, we introduce a molecular based flow velocity meter consisting of a molecule releasing node and a receiver that counts these molecules. We consider both flow velocity detection and estimation problems, which are employed in different applications. For the flow velocity detection, we obtain the maximum a posteriori (…
▽ More
Flow velocity is an important characteristic of the fluidic mediums. In this paper, we introduce a molecular based flow velocity meter consisting of a molecule releasing node and a receiver that counts these molecules. We consider both flow velocity detection and estimation problems, which are employed in different applications. For the flow velocity detection, we obtain the maximum a posteriori (MAP) decision rule. To analyze the performance of the proposed flow velocity detector, we obtain the error probability, its Gaussian approximation and Chernoff information (CI) upper bound, and investigate the optimum and sub-optimum sampling times accordingly. We show that, for binary hypothesis, the sub-optimum sampling times using CI upper bound are the same. Further, the sub-optimum sampling times are close to the optimum sampling times. For the flow velocity estimation, we obtain the MAP and minimum mean square error (MMSE) estimators. We consider the mean square error (MSE) to investigate the error performance of the flow velocity estimators and obtain the Bayesian Cramer-Rao (BCR) and expected Cramer-Rao (ECR) lower bounds. Further, we obtain the optimum sampling times for each estimator. It is seen that the optimum sampling times for each estimator are nearly the same. The proposed flow velocity meter can be used to design a new modulation technique in molecular communication (MC), where information is encoded in the flow velocity of the medium instead of the concentration, type, or release time of the molecules. The setup and performance analysis of the proposed flow velocity detector and estimator for molecular communication system need further investigation.
△ Less
Submitted 11 January, 2021; v1 submitted 5 July, 2020;
originally announced July 2020.
-
On the Capacity of the Joint Time and Concentration Modulation for Molecular Communications
Authors:
Farhad Mirkarimi,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
Most diffusion based molecular channels suffer from low information capacity due to the structure of the diffusion environment. To address this issue, this paper studies the capacity of the diffusion based molecular communication by exploiting both time and concentration level of the released molecules for information transfer. The transmitter releases molecules in one of the sub-intervals with a…
▽ More
Most diffusion based molecular channels suffer from low information capacity due to the structure of the diffusion environment. To address this issue, this paper studies the capacity of the diffusion based molecular communication by exploiting both time and concentration level of the released molecules for information transfer. The transmitter releases molecules in one of the sub-intervals with a level of concentration both determined by input data, hereby applying joint time and concentration (JTAC) modulation. The observation time, at the receiver, which is equal to symbol period, is divided to some sub-intervals, not necessarily equal to the number of sub-intervals in the transmitter, and the number of received molecules in each sub-interval is counted. We propose three practical schemes, depending on how the receiver uses the number of molecules counted in the sub-intervals and find the lower bound on capacity in each case. Moreover, the symmetric Kullback-Liebler (KL) divergence metric is used to obtain a computable upper bound on the JTAC channel capacity. Finally, the Blahut-Arimoto algorithm is used to compute the capacity numerically, and to determine how tight the derived bounds are. Our numerical results indicate that our bounds are tight especially in environments with high diffusion coefficient. The improvements compared to the conventional concentration based modulation and timing based modulation are also demonstrated.
△ Less
Submitted 23 June, 2020;
originally announced June 2020.
-
Corella: A Private Multi Server Learning Approach based on Correlated Queries
Authors:
Hamidreza Ehteram,
Mohammad Ali Maddah-Ali,
Mahtab Mirmohseni
Abstract:
The emerging applications of machine learning algorithms on mobile devices motivate us to offload the computation tasks of training a model or deploying a trained one to the cloud or at the edge of the network. One of the major challenges in this setup is to guarantee the privacy of the client data. Various methods have been proposed to protect privacy in the literature. Those include (i) adding n…
▽ More
The emerging applications of machine learning algorithms on mobile devices motivate us to offload the computation tasks of training a model or deploying a trained one to the cloud or at the edge of the network. One of the major challenges in this setup is to guarantee the privacy of the client data. Various methods have been proposed to protect privacy in the literature. Those include (i) adding noise to the client data, which reduces the accuracy of the result, (ii) using secure multiparty computation (MPC), which requires significant communication among the computing nodes or with the client, (iii) relying on homomorphic encryption (HE) methods, which significantly increases computation load at the servers. In this paper, we propose $\textit{Corella}$ as an alternative approach to protect the privacy of data. The proposed scheme relies on a cluster of servers, where at most $T \in \mathbb{N}$ of them may collude, each running a learning model (e.g., a deep neural network). Each server is fed with the client data, added with $\textit{strong}$ noise, independent from user data. The variance of the noise is set to be large enough to make the information leakage to any subset of up to $T$ servers information-theoretically negligible. On the other hand, the added noises for different servers are $\textit{correlated}$. This correlation among the queries allows the parameters of the models running on different servers to be $\textit{trained}$ such that the client can mitigate the contribution of the noises by combining the outputs of the servers, and recover the final result with high accuracy and with a minor computational effort. Simulation results for various datasets demonstrate the accuracy of the proposed approach for the classification, using deep neural networks, and the autoencoder, as supervised and unsupervised learning tasks, respectively.
△ Less
Submitted 27 July, 2020; v1 submitted 26 March, 2020;
originally announced March 2020.
-
Adaptive Release Duration Modulation for Limited Molecule Production and Storage
Authors:
Ladan Khaloopour,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
The nature of molecular transmitter imposes some limitations on the molecule production process and its storage. As the molecules act the role of the information carriers, the limitations affect the transmission process and the system performance considerably. In this paper, we focus on the transmitter's limitations, in particular, the limited molecule production rate and the finite storage capaci…
▽ More
The nature of molecular transmitter imposes some limitations on the molecule production process and its storage. As the molecules act the role of the information carriers, the limitations affect the transmission process and the system performance considerably. In this paper, we focus on the transmitter's limitations, in particular, the limited molecule production rate and the finite storage capacity. We consider a time-slotted communication where the transmitter opens its outlets and releases the stored molecules for a specific time duration to send bit "1" and remains silent to send bit "0". By changing the release duration, we propose an adaptive release duration modulation. The objective is to find the optimal transmission release duration to minimize the probability of error. We characterize the properties of the optimal release duration and use it to derive upper and lower bounds on the system performance. We see that the proposed modulation scheme improves the performance.
△ Less
Submitted 21 July, 2019;
originally announced July 2019.
-
On the Secrecy Performance of NOMA Systems with both External and Internal Eavesdroppers
Authors:
Milad Abolpour,
Mahtab Mirmohseni,
Mohammad Reza Aref
Abstract:
Sharing resource blocks in NOMA systems provides more opportunity to the internal users to overhear the messages of the other users. Therefore, some sort of secrecy against the internal users in addition to the external eavesdroppers must be provided. In this paper, we investigate the secrecy performance of a two-user NOMA system in existence of the external and internal passive eavesdroppers, whe…
▽ More
Sharing resource blocks in NOMA systems provides more opportunity to the internal users to overhear the messages of the other users. Therefore, some sort of secrecy against the internal users in addition to the external eavesdroppers must be provided. In this paper, we investigate the secrecy performance of a two-user NOMA system in existence of the external and internal passive eavesdroppers, where the far user acts as an internal eavesdropper and tries to overhear the message of the near user. Our system consists of a single antenna base station, two legitimate users and an external passive eavesdropper. We present the closed-forms for the ergodic secrecy rates of the users. Moreover, to derive the secrecy outage probability (SOP) of the system, we use Gaussian-Chebyshev quadrature method, which gives an approximation for the SOP. Numerical results show that this approximation is very close to the exact value of the SOP of the system. Finally, we eliminate the external eavesdropper and present the closed-forms for the ergodic rate of the far user, the ergodic secrecy rate of the near user and also the SOP of the system.
△ Less
Submitted 10 June, 2019;
originally announced June 2019.
-
Private Inner Product Retrieval for Distributed Machine Learning
Authors:
Mohammad Hossein Mousavi,
Mohammad Ali Maddah-Ali,
Mahtab Mirmohseni
Abstract:
In this paper, we argue that in many basic algorithms for machine learning, including support vector machine (SVM) for classification, principal component analysis (PCA) for dimensionality reduction, and regression for dependency estimation, we need the inner products of the data samples, rather than the data samples themselves.
Motivated by the above observation, we introduce the problem of pri…
▽ More
In this paper, we argue that in many basic algorithms for machine learning, including support vector machine (SVM) for classification, principal component analysis (PCA) for dimensionality reduction, and regression for dependency estimation, we need the inner products of the data samples, rather than the data samples themselves.
Motivated by the above observation, we introduce the problem of private inner product retrieval for distributed machine learning, where we have a system including a database of some files, duplicated across some non-colluding servers. A user intends to retrieve a subset of specific size of the inner products of the data files with minimum communication load, without revealing any information about the identity of the requested subset. For achievability, we use the algorithms for multi-message private information retrieval. For converse, we establish that as the length of the files becomes large, the set of all inner products converges to independent random variables with uniform distribution, and derive the rate of convergence. To prove that, we construct special dependencies among sequences of the sets of all inner products with different length, which forms a time-homogeneous irreducible Markov chain, without affecting the marginal distribution. We show that this Markov chain has a uniform distribution as its unique stationary distribution, with rate of convergence dominated by the second largest eigenvalue of the transition probability matrix. This allows us to develop a converse, which converges to a tight bound in some cases, as the size of the files becomes large. While this converse is based on the one in multi-message private information retrieval, due to the nature of retrieving inner products instead of data itself some changes are made to reach the desired result.
△ Less
Submitted 17 February, 2019;
originally announced February 2019.
-
Outage Performance in Secure Cooperative NOMA
Authors:
Milad Abolpour,
Mahtab Mirmohseni,
Mohammad Reza Aref
Abstract:
Enabling cooperation in a NOMA system is a promising approach to improve its performance. In this paper, we study the cooperation in a secure NOMA system, where the legitimate users are distributed uniformly in the network and the eavesdroppers are distributed according to a homogeneous Poisson point process. We consider a cooperative NOMA scheme (two users are paired as strong and weak users) in…
▽ More
Enabling cooperation in a NOMA system is a promising approach to improve its performance. In this paper, we study the cooperation in a secure NOMA system, where the legitimate users are distributed uniformly in the network and the eavesdroppers are distributed according to a homogeneous Poisson point process. We consider a cooperative NOMA scheme (two users are paired as strong and weak users) in two phases: 1) Direct transmission phase, in which the base station broadcasts a superposition of the messages, 2) Cooperation phase, in which the strong user acts as a relay to help in forwarding the messages of the weak user. We study the secrecy outage performance in two cases: (i) security of the strong user, (ii) security of both users, are guaranteed. In the first case, we derive the exact secrecy outage probability of the system for some regions of power allocation coefficients and a lower bound on the secrecy outage probability is derived for the other regions. In the second case, the strong user is a relay or a friendly jammer (as well as a relay), where an upper bound on the secrecy outage probability is derived at high signal-to-noise-ratio regimes. For both cases, the cooperation in a two-user paired NOMA system necessitate to utilize the joint distribution of the distance between two random users. Numerical results shows the superiority of the secure cooperative NOMA for a range of the cooperation power compared to secure non-cooperative NOMA systems.
△ Less
Submitted 13 March, 2019; v1 submitted 3 February, 2019;
originally announced February 2019.
-
Fundamental Limits of Private User Authentication
Authors:
Narges Kazempour,
Mahtab Mirmohseni,
Mohammad Reza Aref
Abstract:
Most of the security services in the connected world of cyber-physical systems necessitate authenticating a large number of nodes privately. In this paper, the private authentication problem is considered which consists of a certificate authority, a verifier (or some verifiers), many legitimate users (provers), and an arbitrary number of attackers. Each legitimate user wants to be authenticated (u…
▽ More
Most of the security services in the connected world of cyber-physical systems necessitate authenticating a large number of nodes privately. In this paper, the private authentication problem is considered which consists of a certificate authority, a verifier (or some verifiers), many legitimate users (provers), and an arbitrary number of attackers. Each legitimate user wants to be authenticated (using his personal key) by the verifier(s), while simultaneously staying completely anonymous (even to the verifier). On the other hand, an attacker must fail to be authenticated. We analyze this problem from an information-theoretical perspective and propose a general interactive information-theoretic model for the problem. As a metric to measure the reliability, we consider the normalized total key rate whose maximization has a trade-off with establishing privacy. The problem is considered in two different scenarios: single-server scenario (only one verifier is considered, which all the provers are connected to) and multi-server scenario ($N$ verifiers are assumed, where each verifier is connected to a subset of users). For both scenarios, two regimes are considered: finite size regime (i.e., the variables are elements of a finite field) and asymptotic regime (i.e., the variables are considered to have large enough length). We propose achievable schemes that satisfy the completeness, soundness, and privacy properties in both single-server and multi-server scenarios in all cases. In the finite size regime, the main idea is to generate the authentication keys according to a secret sharing scheme. We show that the proposed scheme in the special case of multi-server authentication in the finite size regime is optimal. In the asymptotic regime, we use a random binning based scheme that relies on the joint typicality to generate the authentication keys.
△ Less
Submitted 12 September, 2022; v1 submitted 17 January, 2019;
originally announced January 2019.
-
Diffusion Based Molecular Communication with Limited Molecule Production Rate
Authors:
Hamid G. Bafghi,
Amin Gohari,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
This paper studies the impact of a transmitter's molecule generation process on the capacity of a concentration based Molecular Communication (MC) system. Constraints caused by the molecule generation process affect the availability of the molecules at the transmitter. The transmitter has a storage of molecules, and should decide whether to release or save the currently produced molecules. As a re…
▽ More
This paper studies the impact of a transmitter's molecule generation process on the capacity of a concentration based Molecular Communication (MC) system. Constraints caused by the molecule generation process affect the availability of the molecules at the transmitter. The transmitter has a storage of molecules, and should decide whether to release or save the currently produced molecules. As a result, the MC system has conceptual connections with energy harvesting systems. In this paper, we consider two scenarios on the propagation channel. The first scenario assumes a channel with no Inter-symbol Interference (ISI), \emph{i.e.,} a memoryless channel. We derive bounds on the capacity of the MC system in this scenario. The second scenario assumes the MC network with ISI, in which the output of the channel depends on the history of released molecules in the previous time-slots. Based on the assumptions that either the transmitter or the receiver knows the channel statistics, we compute a lower bound on the channel capacity.
△ Less
Submitted 25 February, 2018;
originally announced February 2018.
-
Private Function Retrieval
Authors:
Mahtab Mirmohseni,
Mohammad Ali Maddah-Ali
Abstract:
The widespread use of cloud computing services raises the question of how one can delegate the processing tasks to the untrusted distributed parties without breeching the privacy of its data and algorithms. Motivated by the algorithm privacy concerns in a distributed computing system, in this paper, we introduce the private function retrieval (PFR) problem, where a user wishes to efficiently retri…
▽ More
The widespread use of cloud computing services raises the question of how one can delegate the processing tasks to the untrusted distributed parties without breeching the privacy of its data and algorithms. Motivated by the algorithm privacy concerns in a distributed computing system, in this paper, we introduce the private function retrieval (PFR) problem, where a user wishes to efficiently retrieve a linear function of $K$ messages from $N$ non-communicating replicated servers while kee** the function hidden from each individual server. The goal is to find a scheme with minimum communication cost. To characterize the fundamental limits of the communication cost, we define the capacity of PFR problem as the size of the message that can be privately retrieved (which is the size of one file) normalized to the required downloaded information bits. We first show that for the PFR problem with $K$ messages, $N=2$ servers and a linear function with binary coefficients the capacity is $C=\frac{1}{2}\Big(1-\frac{1}{2^K}\Big)^{-1}$. Interestingly, this is the capacity of retrieving one of $K$ messages from $N=2$ servers while kee** the index of the requested message hidden from each individual server, the problem known as private information retrieval (PIR). Then, we extend the proposed achievable scheme to the case of arbitrary number of servers and coefficients in the field $GF(q)$ with arbitrary $q$ and obtain $R=\Big(1-\frac{1}{N}\Big)\Big(1+\frac{\frac{1}{N-1}}{(\frac{q^K-1}{q-1})^{N-1}}\Big)$.
△ Less
Submitted 15 November, 2017; v1 submitted 13 November, 2017;
originally announced November 2017.
-
Joint Transfer of Energy and Information in a Two-hop Relay Channel
Authors:
Ali H. Abdollahi Bafghi,
Mahtab Mirmohseni,
Mohammad Reza Aref
Abstract:
We study the problem of joint information and energy transfer in a two-hop channel with a Radio frequency (RF) energy harvesting relay. We consider a finite battery size at the relay and deterministic energy loss in transmitting energy. In other words, to be able to send an energy-contained symbol, the relay must receive multiple energy-contained symbols. Thus, we face a kind of channel with memor…
▽ More
We study the problem of joint information and energy transfer in a two-hop channel with a Radio frequency (RF) energy harvesting relay. We consider a finite battery size at the relay and deterministic energy loss in transmitting energy. In other words, to be able to send an energy-contained symbol, the relay must receive multiple energy-contained symbols. Thus, we face a kind of channel with memory. We model the energy saved in battery as channel state with the challenge that the receiver does not know the channel state. First, we consider the problem without any channel noise and derive an achievable rate. Next, we extend the results to the case with an independent and identically distributed noise in the second hop (the relay-receiver link).
△ Less
Submitted 13 April, 2017;
originally announced April 2017.
-
On the Capacity of a Class of Signal-Dependent Noise Channels
Authors:
Hamid Ghourchian,
Gholamali Aminian,
Amin Gohari,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
In some applications, the variance of additive measurement noise depends on the signal that we aim to measure. For instance, additive Gaussian signal-dependent noise (AGSDN) channel models are used in molecular and optical communication. Herein we provide lower and upper bounds on the capacity of additive signal-dependent noise (ASDN) channels. The idea of the first lower bound is the extension of…
▽ More
In some applications, the variance of additive measurement noise depends on the signal that we aim to measure. For instance, additive Gaussian signal-dependent noise (AGSDN) channel models are used in molecular and optical communication. Herein we provide lower and upper bounds on the capacity of additive signal-dependent noise (ASDN) channels. The idea of the first lower bound is the extension of the majorization inequality, and for the second one, it uses some calculations based on the fact that $h(Y) > h (Y|Z)$. Both of them are valid for all additive signal-dependent noise (ASDN) channels defined in the paper. The upper bound is based on a previous idea of the authors ("symmetric relative entropy") and is used for the additive Gaussian signal-dependent noise (AGSDN) channels. These bounds indicate that in ASDN channels (unlike the classical AWGN channels), the capacity does not necessarily become larger by making the variance function of the noise smaller. We also provide sufficient conditions under which the capacity becomes infinity. This is complemented by a number of conditions that imply capacity is finite and a unique capacity achieving measure exists (in the sense of the output measure).
△ Less
Submitted 2 June, 2017; v1 submitted 12 February, 2017;
originally announced February 2017.
-
On Optimal Online Algorithms for Energy Harvesting Systems with Continuous Energy and Data Arrivals
Authors:
Milad Rezaee,
Mahtab Mirmohseni,
Mohammad Reza Aref
Abstract:
Energy harvesting (EH) has been developed to extend the lifetimes of energy-limited communication systems. In this letter, we consider a single-user EH communication system, in which both of the arrival data and the harvested energy curves are modeled as general functions. Unlike most of the works in the field, we investigate the online algorithms which only acquire the causal information of the a…
▽ More
Energy harvesting (EH) has been developed to extend the lifetimes of energy-limited communication systems. In this letter, we consider a single-user EH communication system, in which both of the arrival data and the harvested energy curves are modeled as general functions. Unlike most of the works in the field, we investigate the online algorithms which only acquire the causal information of the arrival data and the harvested energy processes. We study how well the optimal online algorithm works compared with the optimal offline algorithm, and thus our goal is to find the lower and upper bounds for the ratio of the completion time in the optimal online algorithm to the optimal offline algorithm. We propose two online algorithms which achieve the upper bound of 2 on this ratio. Also, we show that this ratio is 2 for the optimal online algorithm.
△ Less
Submitted 19 January, 2017;
originally announced January 2017.
-
Optimal Transmission Policies for Multi-hop Energy Harvesting Systems
Authors:
Milad Rezaee,
Mahtab Mirmohseni,
Vaneet Aggarwal,
Mohammad Reza Aref
Abstract:
In this paper, we consider a multi-hop energy harvesting (EH) communication system in a full-duplex mode, where arrival data and harvested energy curves in the source and the relays are modeled as general functions. This model includes the EH system with discrete arrival processes as a special case. We investigate the throughput maximization problem considering minimum utilized energy in the sourc…
▽ More
In this paper, we consider a multi-hop energy harvesting (EH) communication system in a full-duplex mode, where arrival data and harvested energy curves in the source and the relays are modeled as general functions. This model includes the EH system with discrete arrival processes as a special case. We investigate the throughput maximization problem considering minimum utilized energy in the source and relays and find the optimal offline algorithm. We show that the optimal solution of the two-hop transmission problem have three main steps: (i) Solving a point-to-point throughput maximization problem at the source; (ii) Solving a point-to-point throughput maximization problem at the relay (after applying the solution of first step as the input of this second problem); (iii) Minimizing utilized energy in the source. In addition, we show that how the optimal algorithm for the completion time minimization problem can be derived from the proposed algorithm for throughput maximization problem. Also, for the throughput maximization problem, we propose an online algorithm and show that it is more efficient than the benchmark one (which is a direct application of an existing point-to-point online algorithm to the multi-hop system).
△ Less
Submitted 30 December, 2016;
originally announced December 2016.
-
Information Theory of Molecular Communication: Directions and Challenges
Authors:
Amin Gohari,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
Molecular Communication (MC) is a communication strategy that uses molecules as carriers of information, and is widely used by biological cells. As an interdisciplinary topic, it has been studied by biologists, communication theorists and a growing number of information theorists. This paper aims to specifically bring MC to the attention of information theorists. To do this, we first highlight the…
▽ More
Molecular Communication (MC) is a communication strategy that uses molecules as carriers of information, and is widely used by biological cells. As an interdisciplinary topic, it has been studied by biologists, communication theorists and a growing number of information theorists. This paper aims to specifically bring MC to the attention of information theorists. To do this, we first highlight the unique mathematical challenges of studying the capacity of molecular channels. Addressing these problems require use of known, or development of new mathematical tools. Toward this goal, we review a subjective selection of the existing literature on information theoretic aspect of molecular communication. The emphasis here is on the mathematical techniques used, rather than on the setup or modeling of a specific paper. Finally, as an example, we propose a concrete information theoretic problem that was motivated by our study of molecular communication.
△ Less
Submitted 10 December, 2016;
originally announced December 2016.
-
Capacity of the State-Dependent Wiretap Channel: Secure Writing on Dirty Paper
Authors:
Hamid G. Bafghi,
Babak Seyfe,
Mahtab Mirmohseni,
Mohammad Reza Aref
Abstract:
In this paper we consider the State-Dependent Wiretap Channel (SD-WC). As the main idea, we model the SD-WC as a Cognitive Interference Channel (CIC), in which the primary receiver acts as an eavesdropper for the cognitive transmitter's message. By this point of view, the Channel State Information (CSI) in SD-WC plays the role of the primary user's message in CIC which can be decoded at the eavesd…
▽ More
In this paper we consider the State-Dependent Wiretap Channel (SD-WC). As the main idea, we model the SD-WC as a Cognitive Interference Channel (CIC), in which the primary receiver acts as an eavesdropper for the cognitive transmitter's message. By this point of view, the Channel State Information (CSI) in SD-WC plays the role of the primary user's message in CIC which can be decoded at the eavesdropper. This idea enables us to use the main achievability approaches of CIC, i.~e., Gel'fand-Pinsker Coding (GPC) and Superposition Coding (SPC), to find new achievable equivocation-rates for the SD-WC. We show that these approaches meet the capacity under some constraints on the rate of the channel state. Similar to the dirty paper channel, extending the results to the Gaussian case shows that the GPC lead to the capacity of the Gaussian SD-WC which is equal to the capacity of the wiretap channel without channel state. Hence, we achieve the capacity of the Gaussian SD-WC using the dirty paper technique. Moreover, our proposed approaches provide the capacity of the Binary SD-WC. It is shown that the capacity of the Binary SD-WC is equal to the capacity of the Binary wiretap channel without channel state.
△ Less
Submitted 18 May, 2016;
originally announced May 2016.
-
On Medium Chemical Reaction in Diffusion-Based Molecular Communication: a Two-Way Relaying Example
Authors:
Maryam Farahnak-Ghazani,
Gholamali Aminian,
Mahtab Mirmohseni,
Amin Gohari,
Masoumeh Nasiri-Kenari
Abstract:
Chemical reactions are a prominent feature of molecular communication (MC) systems, with no direct parallels in wireless communications. While chemical reactions may be used inside the transmitter nodes, receiver nodes or the communication medium, we focus on its utility in the medium in this paper. Such chemical reactions can be used to perform computation over the medium as molecules diffuse and…
▽ More
Chemical reactions are a prominent feature of molecular communication (MC) systems, with no direct parallels in wireless communications. While chemical reactions may be used inside the transmitter nodes, receiver nodes or the communication medium, we focus on its utility in the medium in this paper. Such chemical reactions can be used to perform computation over the medium as molecules diffuse and react with each other (physical-layer computation). We propose the use of chemical reactions for the following purposes: (i) to reduce signal-dependent observation noise of receivers by reducing the signal density, (ii) to realize molecular physical-layer network coding (molecular PNC) by performing the natural XOR operation inside the medium, and (iii) to reduce the inter-symbol interference (ISI) of other transmitters by canceling out the remaining molecules from previous transmissions. To make the ideas formal, we consider an explicit two-way relaying example with a transparent receiver (which has a signal-dependent noise). The proposed ideas are used to define a modulation scheme (which we call the PNC scheme). We compare the PNC with a previously proposed scheme for this problem where the XOR operation is performed at the relay node (using a molecular logic gate). We call the latter, the straightforward network coding (SNC). It is observed that in addition to the simplicity of the proposed PNC scheme, it outperforms the SNC scheme especially when we consider ISI.
△ Less
Submitted 24 April, 2018; v1 submitted 19 April, 2016;
originally announced April 2016.
-
Secrecy Capacity in Large Cooperative Networks in Presence of Eavesdroppers with Unknown Locations
Authors:
Amir Hossein Hadavi,
Narges Kazempour,
Mahtab Mirmohseni,
Mohammad Reza Aref
Abstract:
In this paper, an extended large wireless network under the secrecy constraint is considered. In contrast to works which use idealized assumptions, a more realistic network situation with unknown eavesdroppers locations is investigated: the legitimate users only know their own Channel State Information (CSI), not the eavesdroppers CSI. Also, the network is analyzed by taking in to account the effe…
▽ More
In this paper, an extended large wireless network under the secrecy constraint is considered. In contrast to works which use idealized assumptions, a more realistic network situation with unknown eavesdroppers locations is investigated: the legitimate users only know their own Channel State Information (CSI), not the eavesdroppers CSI. Also, the network is analyzed by taking in to account the effects of both fading and path loss. Under these assumptions, a power efficient cooperative scheme, named \emph{stochastic virtual beamforming}, is proposed. Applying this scheme, an unbounded secure rate with any desired outage level is achieved, provided that the density of the legitimate users tends to infinity. In addition, by tending the legitimate users density to the infinity, the tolerable density of eavesdroppers will become unbounded too.
△ Less
Submitted 16 April, 2016;
originally announced April 2016.
-
Type Based Sign Modulation and its Application for ISI mitigation in Molecular Communication
Authors:
Reza Mosayebi,
Amin Gohari,
Mahtab Mirmohseni,
Masoumeh Nasiri Kenari
Abstract:
An important challenge in design of modulation schemes for molecular communication is positivity of the transmission signal (only a positive concentration of molecules can be released in the environment). This restriction makes handling of the InterSymbol Interference (ISI) a challenge for molecular communication. Previous works have proposed use of chemical reactions to remove molecules from the…
▽ More
An important challenge in design of modulation schemes for molecular communication is positivity of the transmission signal (only a positive concentration of molecules can be released in the environment). This restriction makes handling of the InterSymbol Interference (ISI) a challenge for molecular communication. Previous works have proposed use of chemical reactions to remove molecules from the environment, and to effectively simulate negative signals. However, the differential equation describing a diffusion-reaction process is non-linear. This precludes the possibility of using Fourier transform tools. In this paper, a solution for simulating negative signals based on the diffusion-reaction channel model is proposed. While the proposed solution does not exploit the full degrees of freedom available for signaling in a diffusion-reaction process, but its end-to-end system is a linear channel and amenable to Fourier transform analysis. Based on our solution, a modulation scheme and a precoder are introduced and shown to have a significant reduction in error probability compared to previous modulation schemes such as CSK and MCSK. The effect of various imperfections (such as quantization error) on the communication system performance are studied.
△ Less
Submitted 14 December, 2016; v1 submitted 6 March, 2016;
originally announced March 2016.
-
Investigating the Performances and Vulnerabilities of Two New Protocols Based on R-RAPSE
Authors:
Seyed Salman Sajjadi Ghaemmaghami,
Afrooz Haghbin,
Mahtab Mirmohseni
Abstract:
Radio Frequency IDentification (RFID) is a pioneer technology which has depicted a new lifestyle for humanity in all around the world. Every day we observe an increase in the scope of RFID applications and no one cannot withdraw its numerous usage around him/herself. An important issue which should be considered is providing privacy and security requirements of an RFID system. Recently in 2014, Ca…
▽ More
Radio Frequency IDentification (RFID) is a pioneer technology which has depicted a new lifestyle for humanity in all around the world. Every day we observe an increase in the scope of RFID applications and no one cannot withdraw its numerous usage around him/herself. An important issue which should be considered is providing privacy and security requirements of an RFID system. Recently in 2014, Cai et al. proposed two improved RFID authentication protocols based on R-RAPS rules by the names of IHRMA and I2SRS. In this paper, we investigate the privacy of the aforementioned protocols based on Ouafi and Phan formal privacy model and show that both IHRMA and I2SRS protocols cannot provide private authentication for RFID users. Moreover, we showthat these protocols are vulnerable to impersonation, DoS and traceability attacks. Then, by considering the drawbacks of the studied protocols and implementation of messages with new structures, we present two improved efficient and secure authentication protocols to ameliorate the performance of Cai et al schemes. Our analysis illustrate that the existing weaknesses of the discussed protocols are eliminated in our proposed protocols.
△ Less
Submitted 18 January, 2016;
originally announced January 2016.
-
On The Secrecy of the Cognitive Interference Channel with Partial Channel States
Authors:
Hamid G. Bafghi,
Babak Seyfe,
Mahtab Mirmohseni,
Mohammad Reza Aref
Abstract:
The secrecy problem in the state-dependent cognitive interference channel is considered in this paper. In our model, there are a primary and a secondary (cognitive) transmitter-receiver pairs, in which the cognitive transmitter has the message of the primary one as side information. In addition, the channel is affected by a channel state sequence which is estimated partially at the cognitive trans…
▽ More
The secrecy problem in the state-dependent cognitive interference channel is considered in this paper. In our model, there are a primary and a secondary (cognitive) transmitter-receiver pairs, in which the cognitive transmitter has the message of the primary one as side information. In addition, the channel is affected by a channel state sequence which is estimated partially at the cognitive transmitter and the corresponding receiver. The cognitive transmitter wishes to cooperate with the primary one, and it sends its individual message which should be confidential at the primary receiver. The achievable equivocation-rate regions for this channel are derived using two approaches: the binning scheme coding, and superposition coding. Then the outer bounds on the capacity are proposed and the results are extended to the Gaussian examples.
△ Less
Submitted 18 May, 2016; v1 submitted 23 November, 2015;
originally announced November 2015.
-
A Privacy Preserving Improvement for SRTA in Telecare Systems
Authors:
Seyed Salman Sajjadi Ghaemmaghami,
Mahtab Mirmohseni,
Afrooz Haghbin
Abstract:
Radio Frequency Identification (RFID) is a modern communication technology, which provides authentication and identification through a nonphysical contact. Recently, the use of this technology is almost developed in healthcare environments. Although RFID technology can prepare sagacity in systems, privacy and security issues ought to be considered before. Recently, in 2015, Li et al. proposed SRTA…
▽ More
Radio Frequency Identification (RFID) is a modern communication technology, which provides authentication and identification through a nonphysical contact. Recently, the use of this technology is almost developed in healthcare environments. Although RFID technology can prepare sagacity in systems, privacy and security issues ought to be considered before. Recently, in 2015, Li et al. proposed SRTA, a hash-based RFID authentication protocol in medication verification for healthcare. In this paper, we study this protocol and show that SRTA protocol is vulnerable to traceability, impersonation and Dos attacks. So it does not provide the privacy and security of RFID end users. Therefore, we propose an improved secure and efficient RFID authentication protocol to enhance the performance of Li et al. method. Our analyze show that the existing weaknesses of SRTA protocol are eliminated in our proposed protocol.
△ Less
Submitted 14 October, 2015;
originally announced October 2015.
-
On the Capacity of Point-to-Point and Multiple-Access Molecular Communications with Ligand-Receptors
Authors:
Gholamali Aminian,
Maryam Farahnak Ghazani,
Mahtab Mirmohseni,
Masoumeh Nasiri Kenari,
Faramarz Fekri
Abstract:
In this paper, we consider the bacterial point-to-point and multiple-access molecular communications with ligand-receptors. For the point-to-point communication, we investigate common signaling methods, namely the Level Scenario (LS), which uses one type of a molecule with different concentration levels, and the Type Scenario (TS), which employs multiple types of molecules with a single concentrat…
▽ More
In this paper, we consider the bacterial point-to-point and multiple-access molecular communications with ligand-receptors. For the point-to-point communication, we investigate common signaling methods, namely the Level Scenario (LS), which uses one type of a molecule with different concentration levels, and the Type Scenario (TS), which employs multiple types of molecules with a single concentration level. We investigate the trade-offs between the two scenarios from the capacity point of view. We derive an upper bound on the capacity using a Binomial Channel (BIC) model and the symmetrized Kullback-Leibler (KL) divergence. A lower bound is also derived when the environment noise is negligible. For the TS, we also consider the effect of blocking of a receptor by a different molecule type. Then, we consider multiple-access communications, for which we investigate three scenarios based on molecule and receptor types, i.e., same types of molecules with Different Labeling and Same types of Receptors (DLSR), Different types of Molecules and Receptors (DMDR), and Same types of Molecules and Receptors (SMSR). We investigate the trade-offs among the three scenarios from the total capacity point of view. We derive some inner bounds on the capacity region of these scenarios when the environment noise is negligible.
△ Less
Submitted 19 September, 2015;
originally announced September 2015.
-
On ISI-free Modulations for Diffusion based Molecular Communication
Authors:
Hamidreza Arjmandi,
Mohammad Movahednasab,
Amin Gohari,
Mahtab Mirmohseni,
Masoumeh Nasiri Kenari,
Faramarz Fekri
Abstract:
A diffusion molecular channel is a channel with memory, as molecules released into the medium hit the receptors after a random delay. Coding over the diffusion channel is performed by choosing the type, intensity, or the released time of molecules diffused in the environment over time. To avoid intersymbol interference (ISI), molecules of the same type should be released at time instances that are…
▽ More
A diffusion molecular channel is a channel with memory, as molecules released into the medium hit the receptors after a random delay. Coding over the diffusion channel is performed by choosing the type, intensity, or the released time of molecules diffused in the environment over time. To avoid intersymbol interference (ISI), molecules of the same type should be released at time instances that are sufficiently far apart. This ensures that molecules of a previous transmission are faded in the environment, before molecules of the same type are reused for signaling. In this paper, we consider ISI-free time-slotted modulation schemes. The maximum reliable transmission rate for these modulations is given by the constrained coding capacity of the graph that represents the permissible transmission sequences. However, achieving the constrained coding capacity requires long blocklengths and delays at the decoder, making it impractical for simple nanomachines. The main contribution of this paper is to consider modulations with small delay (short blocklength) and show that they get very close to constrained coding capacity.
△ Less
Submitted 11 August, 2015;
originally announced August 2015.
-
Energy Harvesting Systems with Continuous Energy and Data Arrivals: the Optimal Offline and a Heuristic Online Algorithms
Authors:
Milad Rezaee,
Mahtab Mirmohseni,
Mohammad Reza Aref
Abstract:
Energy harvesting has been developed as an effective technology for communication systems in order to extend the lifetime of these systems. In this work, we consider a singleuser energy harvesting wireless communication system, in which arrival data and harvested energy curves are modeled as continuous functions. For the single-user model, our first goal is to find an offline algorithm, which maxi…
▽ More
Energy harvesting has been developed as an effective technology for communication systems in order to extend the lifetime of these systems. In this work, we consider a singleuser energy harvesting wireless communication system, in which arrival data and harvested energy curves are modeled as continuous functions. For the single-user model, our first goal is to find an offline algorithm, which maximizes the amount of data which is transmitted to the receiver node by a given deadline. If more than one scheme exists that transmits the maximum data, we choose the one with minimum utilized energy at the transmitter node. Next, we propose an online algorithm for this system. We also consider a multi-hop energy harvesting wireless communication system in a full-duplex mode and find the optimal offline algorithm to maximize the throughput.
△ Less
Submitted 22 January, 2016; v1 submitted 12 June, 2015;
originally announced June 2015.
-
On the Capacity of Level and Type Modulation in Molecular Communication with Ligand Receptors
Authors:
Gholamali Aminian,
Mahtab Mirmohseni,
Masoumeh Nasiri Kenari,
Faramarz Fekri
Abstract:
In this paper, we consider the bacterial point-to-point communication problem with one transmitter and one receiver by considering the ligand receptor binding process. The most commonly investigated signalling model, referred to as the Level Scenario (LS), uses one type of a molecule with different concentration levels for signaling. An alternative approach is to employ multiple types of molecules…
▽ More
In this paper, we consider the bacterial point-to-point communication problem with one transmitter and one receiver by considering the ligand receptor binding process. The most commonly investigated signalling model, referred to as the Level Scenario (LS), uses one type of a molecule with different concentration levels for signaling. An alternative approach is to employ multiple types of molecules with a single concentration level, referred to as the Type Scenario (TS). We investigate the trade-offs between the two scenarios for the ligand receptor from the capacity point of view. For this purpose, we evaluate the capacity using numerical algorithms. Moreover, we derive an upper bound on the capacity of the ligand receptor using a Binomial Channel (BIC) model using symmetrized Kullback-Leibler (KL) divergence. A lower bound is also derived when the environment noise is negligible. Finally, we analyse the effect of blocking of a receptor by a molecule of a different type, by proposing a new Markov model in the multiple-type signalling.
△ Less
Submitted 16 April, 2015;
originally announced April 2015.
-
Power Allocation in the Energy Harvesting Full-Duplex Gaussian Relay Channels
Authors:
Mahmood Mohassel Feghhi,
Mahtab Mirmohseni,
Aliazam Abbasfar
Abstract:
In this paper, we propose a general model to study the full-duplex non-coherent decode-and-forward Gaussian relay channel with energy harvesting (EH) nodes, called NC-EH-$\mathcal{RC}$, in three cases: $i)$ no energy transfer (ET), $ii)$ one-way ET from the source (S) to the relay (R), and $iii)$ two-way ET. We consider the problem of optimal power allocation in NC-EH-$\mathcal{RC}$ in order to ma…
▽ More
In this paper, we propose a general model to study the full-duplex non-coherent decode-and-forward Gaussian relay channel with energy harvesting (EH) nodes, called NC-EH-$\mathcal{RC}$, in three cases: $i)$ no energy transfer (ET), $ii)$ one-way ET from the source (S) to the relay (R), and $iii)$ two-way ET. We consider the problem of optimal power allocation in NC-EH-$\mathcal{RC}$ in order to maximize the total transmitted bits from S to the destination in a given time duration. General stochastic energy arrivals at S and R with known EH times and values are assumed. In NC-EH-$\mathcal{RC}$ with no ET, the complicated min-max optimization form along with its constraints make the problem intractable. It is shown that this problem can be transformed to a solvable convex form; however, convex optimization solution does not provide the structural properties of the optimal solution. Therefore, following an alternative perspective, we investigate conditions on harvesting process of S and R where we find optimal algorithmic solution. Further, we propose some suboptimal algorithms and provide some examples, in which the algorithms are optimal. Moreover, we find a class of problems for NC-EH-$\mathcal{RC}$ with one-way ET from S to R, where the optimal algorithmic solution is devised. For NC-EH-$\mathcal{RC}$ with two-way ET, we propose \emph{general} optimal algorithmic solution. Furthermore, the performance of the proposed algorithms are evaluated numerically and compared with optimal numerical convex optimization tools.
△ Less
Submitted 14 November, 2014;
originally announced November 2014.
-
Performance Analysis for Energy Harvesting Communication Protocols with Fixed Rate Transmission
Authors:
Mahmood Mohassel Feghhi,
Aliazam Abbasfar,
Mahtab Mirmohseni
Abstract:
Energy Harvesting (EH) has emerged as a promising technique for Green Communications and it is a novel technique to prolong the lifetime of the wireless networks with replenishable nodes. In this paper, we consider the energy shortage analysis of fixed rate transmission in communication systems with energy harvesting nodes. First, we study the finite-horizon transmission and provide the general fo…
▽ More
Energy Harvesting (EH) has emerged as a promising technique for Green Communications and it is a novel technique to prolong the lifetime of the wireless networks with replenishable nodes. In this paper, we consider the energy shortage analysis of fixed rate transmission in communication systems with energy harvesting nodes. First, we study the finite-horizon transmission and provide the general formula for the energy shortage probability. We also give some examples as benchmarks. Then, we continue to derive a closed-form expression for infinite-horizon transmission, which is a lower bound for the energy shortage probability of any finite-horizon transmission. These results are proposed for both Additive White Gaussian Noise (AWGN) and fading channels. Moreover, we show that even under \emph{random energy arrival}, one can transmit at a fixed rate equal to capacity in the AWGN channels with negligible aggregate shortage time. We achieve this result using our practical transmission schemes, proposed for finite-horizon. Also, comprehensive numerical simulations are performed in AWGN and fading channels with no Channel State Information (CSI) available at the transmitter, which corroborate our theoretical findings. Furthermore, we improve the performance of our transmission schemes in the fading channel with no CSI at the transmitter by optimizing the transmission initiation threshold.
△ Less
Submitted 11 November, 2014;
originally announced November 2014.
-
Active Adversaries from an Information-Theoretic Perspective: Data Modification Attacks
Authors:
Mahtab Mirmohseni,
Panagiotis Papadimitratos
Abstract:
We investigate the problem of reliable communication in the presence of active adversaries that can tamper with the transmitted data. We consider a legitimate transmitter-receiver pair connected over multiple communication paths (routes). We propose two new models of adversary, a "memoryless" and a "foreseer" adversary. For both models, the adversaries are placing themselves arbitrarily on the rou…
▽ More
We investigate the problem of reliable communication in the presence of active adversaries that can tamper with the transmitted data. We consider a legitimate transmitter-receiver pair connected over multiple communication paths (routes). We propose two new models of adversary, a "memoryless" and a "foreseer" adversary. For both models, the adversaries are placing themselves arbitrarily on the routes, kee** their placement fixed throughout the transmission block. This placement may or may not be known to the transmitter. The adversaries can choose their best modification strategy to increase the error at the legitimate receiver, subject to a maximum distortion constraint. We investigate the communication rates that can be achieved in the presence of the two types of adversaries and the channel (benign) stochastic behavior. For memoryless adversaries, the capacity is derived. Our method is to use the typical set of the anticipated received signal for all possible adversarial strategies (including their best one) in a compound channel that also captures adversarial placement. For the foreseer adversaries, which have enhanced observation capabilities compared to the memoryless ones, we propose a new coding scheme to guarantee resilience, i.e., recovery of the codeword independently of the adversarial (best) choice. We derive an achievable rate and we propose an upper bound on the capacity. We evaluate our general results for specific cases (e.g., binary symbol replacement or erasing attacks), to gain insights.
△ Less
Submitted 25 April, 2014;
originally announced April 2014.
-
Constrained Colluding Eavesdroppers: An Information-Theoretic Model
Authors:
Mahtab Mirmohseni,
Panagiotis Papadimitratos
Abstract:
We study the secrecy capacity in the vicinity of colluding eavesdroppers. Contrary to the perfect collusion assumption in previous works, our new information-theoretic model considers constraints in collusion. We derive the achievable secure rates (lower bounds on the perfect secrecy capacity), both for the discrete memoryless and Gaussian channels. We also compare the proposed rates to the non-co…
▽ More
We study the secrecy capacity in the vicinity of colluding eavesdroppers. Contrary to the perfect collusion assumption in previous works, our new information-theoretic model considers constraints in collusion. We derive the achievable secure rates (lower bounds on the perfect secrecy capacity), both for the discrete memoryless and Gaussian channels. We also compare the proposed rates to the non-colluding and perfect colluding cases.
△ Less
Submitted 11 December, 2013;
originally announced December 2013.
-
Secrecy Capacity Scaling in Large Cooperative Wireless Networks
Authors:
Mahtab Mirmohseni,
Panagiotis Papadimitratos
Abstract:
We investigate large wireless networks subject to security constraints. In contrast to point-to-point, interference-limited communications considered in prior works, we propose active cooperative relaying based schemes. We consider a network with $n_l$ legitimate nodes, $n_e$ eavesdroppers, and path loss exponent $α\geq 2$. As long as $n_e^2(\log(n_e))^γ=o(n_l)$, for some positive $γ$, we show one…
▽ More
We investigate large wireless networks subject to security constraints. In contrast to point-to-point, interference-limited communications considered in prior works, we propose active cooperative relaying based schemes. We consider a network with $n_l$ legitimate nodes, $n_e$ eavesdroppers, and path loss exponent $α\geq 2$. As long as $n_e^2(\log(n_e))^γ=o(n_l)$, for some positive $γ$, we show one can obtain unbounded secure aggregate rate. This means zero-cost secure communication, given fixed total power constraint for the entire network. We achieve this result through (i) the source using Wyner randomized encoder and a serial (multi-stage) block Markov scheme, to cooperate with the relays and (ii) the relays acting as a virtual multi-antenna to apply beamforming against the eavesdroppers. Our simpler parallel (two-stage) relaying scheme can achieve the same unbounded secure aggregate rate when $n_e^{\fracα{2}+1}(\log(n_e))^{γ+δ(\fracα{2}+1)}=o(n_l)$ holds, for some positive $γ,δ$. Finally, we study the improvement (to the detriment of legitimate nodes) the eavesdroppers achieve in terms of the information leakage rate in a large cooperative network in case of collusion. We show that again the zero-cost secure communication is possible, if $n_e^{(2+\frac{2}α)}(\log n_e)^γ=o(n_l)$ holds, for some positive $γ$; i.e., in case of collusion slightly fewer eavesdroppers can be tolerated compared to the non-colluding case.
△ Less
Submitted 28 February, 2015; v1 submitted 11 December, 2013;
originally announced December 2013.
-
Empirical Coordination in a Triangular Multiterminal Network
Authors:
Ali Bereyhi,
Mohsen Bahrami,
Mahtab Mirmohseni,
Mohammad Reza Aref
Abstract:
In this paper, we investigate the problem of the empirical coordination in a triangular multiterminal network. A triangular multiterminal network consists of three terminals where two terminals observe two external i.i.d correlated sequences. The third terminal wishes to generate a sequence with desired empirical joint distribution. For this problem, we derive inner and outer bounds on the empiric…
▽ More
In this paper, we investigate the problem of the empirical coordination in a triangular multiterminal network. A triangular multiterminal network consists of three terminals where two terminals observe two external i.i.d correlated sequences. The third terminal wishes to generate a sequence with desired empirical joint distribution. For this problem, we derive inner and outer bounds on the empirical coordination capacity region. It is shown that the capacity region of the degraded source network and the inner and outer bounds on the capacity region of the cascade multiterminal network can be directly obtained from our inner and outer bounds. For a cipher system, we establish key distribution over a network with a reliable terminal, using the results of the empirical coordination. As another example, the problem of rate distortion in the triangular multiterminal network is investigated in which a distributed doubly symmetric binary source is available.
△ Less
Submitted 16 May, 2013;
originally announced May 2013.