-
Artificial General Intelligence (AGI)-Native Wireless Systems: A Journey Beyond 6G
Authors:
Walid Saad,
Omar Hashash,
Christo Kurisummoottil Thomas,
Christina Chaccour,
Merouane Debbah,
Narayan Mandayam,
Zhu Han
Abstract:
Building future wireless systems that support services like digital twins (DTs) is challenging to achieve through advances to conventional technologies like meta-surfaces. While artificial intelligence (AI)-native networks promise to overcome some limitations of wireless technologies, developments still rely on AI tools like neural networks. Such tools struggle to cope with the non-trivial challen…
▽ More
Building future wireless systems that support services like digital twins (DTs) is challenging to achieve through advances to conventional technologies like meta-surfaces. While artificial intelligence (AI)-native networks promise to overcome some limitations of wireless technologies, developments still rely on AI tools like neural networks. Such tools struggle to cope with the non-trivial challenges of the network environment and the growing demands of emerging use cases. In this paper, we revisit the concept of AI-native wireless systems, equip** them with the common sense necessary to transform them into artificial general intelligence (AGI)-native systems. These systems acquire common sense by exploiting different cognitive abilities such as perception, analogy, and reasoning, that enable them to generalize and deal with unforeseen scenarios. Towards develo** the components of such a system, we start by showing how the perception module can be built through abstracting real-world elements into generalizable representations. These representations are then used to create a world model, founded on principles of causality and hyper-dimensional (HD) computing, that aligns with intuitive physics and enables analogical reasoning, that define common sense. Then, we explain how methods such as integrated information theory play a role in the proposed intent-driven and objective-driven planning methods that maneuver the AGI-native network to take actions. Next, we discuss how an AGI-native network can enable use cases related to human and autonomous agents: a) analogical reasoning for next-generation DTs, b) synchronized and resilient experiences for cognitive avatars, and c) brain-level metaverse experiences like holographic teleportation. Finally, we conclude with a set of recommendations to build AGI-native systems. Ultimately, we envision this paper as a roadmap for the beyond 6G era.
△ Less
Submitted 29 April, 2024;
originally announced May 2024.
-
Watch from sky: machine-learning-based multi-UAV network for predictive police surveillance
Authors:
Ryusei Sugano,
Ryoichi Shinkuma,
Takayuki Nishio,
Sohei Itahara,
Narayan B. Mandayam
Abstract:
This paper presents the watch-from-sky framework, where multiple unmanned aerial vehicles (UAVs) play four roles, i.e., sensing, data forwarding, computing, and patrolling, for predictive police surveillance. Our framework is promising for crime deterrence because UAVs are useful for collecting and distributing data and have high mobility. Our framework relies on machine learning (ML) technology f…
▽ More
This paper presents the watch-from-sky framework, where multiple unmanned aerial vehicles (UAVs) play four roles, i.e., sensing, data forwarding, computing, and patrolling, for predictive police surveillance. Our framework is promising for crime deterrence because UAVs are useful for collecting and distributing data and have high mobility. Our framework relies on machine learning (ML) technology for controlling and dispatching UAVs and predicting crimes. This paper compares the conceptual model of our framework against the literature. It also reports a simulation of UAV dispatching using reinforcement learning and distributed ML inference over a lossy UAV network.
△ Less
Submitted 6 March, 2022;
originally announced March 2022.
-
Network Traffic Sha** for Enhancing Privacy in IoT Systems
Authors:
Sijie Xiong,
Anand D. Sarwate,
Narayan B. Mandayam
Abstract:
Motivated by privacy issues caused by inference attacks on user activities in the packet sizes and timing information of Internet of Things (IoT) network traffic, we establish a rigorous event-level differential privacy (DP) model on infinite packet streams. We propose a memoryless traffic sha** mechanism satisfying a first-come-first-served queuing discipline that outputs traffic dependent on t…
▽ More
Motivated by privacy issues caused by inference attacks on user activities in the packet sizes and timing information of Internet of Things (IoT) network traffic, we establish a rigorous event-level differential privacy (DP) model on infinite packet streams. We propose a memoryless traffic sha** mechanism satisfying a first-come-first-served queuing discipline that outputs traffic dependent on the input using a DP mechanism. We show that in special cases the proposed mechanism recovers existing shapers which standardize the output independently from the input. To find the optimal shapers for given levels of privacy and transmission efficiency, we formulate the constrained problem of minimizing the expected delay per packet and propose using the expected queue size across time as a proxy. We further show that the constrained minimization is a convex program. We demonstrate the effect of shapers on both synthetic data and packet traces from actual IoT devices. The experimental results reveal inherent privacy-overhead tradeoffs: more sha** overhead provides better privacy protection. Under the same privacy level, there naturally exists a tradeoff between dummy traffic and delay. When dealing with heavier or less bursty input traffic, all shapers become more overhead-efficient. We also show that increased traffic from a larger number of IoT devices makes guaranteeing event-level privacy easier. The DP shaper offers tunable privacy that is invariant with the change in the input traffic distribution and has an advantage in handling burstiness over traffic-independent shapers. This approach well accommodates heterogeneous network conditions and enables users to adapt to their privacy/overhead demands.
△ Less
Submitted 29 November, 2021;
originally announced November 2021.
-
A hybrid model-based and learning-based approach for classification using limited number of training samples
Authors:
Alireza Nooraiepour,
Waheed U. Bajwa,
Narayan B. Mandayam
Abstract:
The fundamental task of classification given a limited number of training data samples is considered for physical systems with known parametric statistical models. The standalone learning-based and statistical model-based classifiers face major challenges towards the fulfillment of the classification task using a small training set. Specifically, classifiers that solely rely on the physics-based s…
▽ More
The fundamental task of classification given a limited number of training data samples is considered for physical systems with known parametric statistical models. The standalone learning-based and statistical model-based classifiers face major challenges towards the fulfillment of the classification task using a small training set. Specifically, classifiers that solely rely on the physics-based statistical models usually suffer from their inability to properly tune the underlying unobservable parameters, which leads to a mismatched representation of the system's behaviors. Learning-based classifiers, on the other hand, typically rely on a large number of training data from the underlying physical process, which might not be feasible in most practical scenarios. In this paper, a hybrid classification method -- termed HyPhyLearn -- is proposed that exploits both the physics-based statistical models and the learning-based classifiers. The proposed solution is based on the conjecture that HyPhyLearn would alleviate the challenges associated with the individual approaches of learning-based and statistical model-based classifiers by fusing their respective strengths. The proposed hybrid approach first estimates the unobservable model parameters using the available (suboptimal) statistical estimation procedures, and subsequently use the physics-based statistical models to generate synthetic data. Then, the training data samples are incorporated with the synthetic data in a learning-based classifier that is based on domain-adversarial training of neural networks. Specifically, in order to address the mismatch problem, the classifier learns a map** from the training data and the synthetic data to a common feature space. Simultaneously, the classifier is trained to find discriminative features within this space in order to fulfill the classification task.
△ Less
Submitted 1 December, 2021; v1 submitted 25 June, 2021;
originally announced June 2021.
-
A Game-Theoretic Analysis of Competitive Editing in Wikipedia: Contributors' Effort to Influence Articles and the Community's Attempt to Ensure Neutrality
Authors:
Santhanakrishnan Anand,
Ofer Arazy,
Narayan B. Mandayam,
Oded Nov
Abstract:
Peer production, such as the collaborative authoring of Wikipedia articles, involves both cooperation and competition between contributors, and we focus on the latter. As individuals, contributors compete to align Wikipedia articles with their personal perspectives. As a community, they work collectively to ensure a neutral point of view (NPOV). We study the interplay between individuals' competit…
▽ More
Peer production, such as the collaborative authoring of Wikipedia articles, involves both cooperation and competition between contributors, and we focus on the latter. As individuals, contributors compete to align Wikipedia articles with their personal perspectives. As a community, they work collectively to ensure a neutral point of view (NPOV). We study the interplay between individuals' competition and the community's endeavor to ensure neutrality. We develop a two-level game-theoretic model, modeling the interactions of ownership-motivated individuals and neutrality-seeking communal mechanisms as a Stackelberg game. We present our model's predictions regarding the relation between contributors' effort (i.e. typical size of edit) and benefits (i.e. the portion of the article they eventually ``own''). We validate the model's prediction through an empirical analysis, by studying the interactions of 219,811 distinct contributors that co-produced 864 Wikipedia articles over a decade. The analysis and empirical results suggest that contributors who make large edits (``creators'') eventually lose the article's ownership to those who refine the articles and typically make smaller edits (``curators''). Whereas neutrality-seeking mechanisms are essential for ensuring that ownership is not concentrated within a small number of contributors, our findings suggest that the burden of excessive governance may deter contributors from participating.
△ Less
Submitted 17 May, 2021;
originally announced May 2021.
-
Prosumer Behavior: Decision Making with Bounded Horizon
Authors:
Mohsen Rajabpour,
Arnold Glass,
Robert Mulligan,
Narayan B. Mandayam
Abstract:
Most studies of prosumer decision making in the smart grid have focused on single, temporally discrete decisions within the framework of expected utility theory (EUT) and behavioral theories such as prospect theory. In this work, we study prosumer decision making in a more natural, ongoing market situation in which a prosumer has to decide every day whether to sell any surplus energy units generat…
▽ More
Most studies of prosumer decision making in the smart grid have focused on single, temporally discrete decisions within the framework of expected utility theory (EUT) and behavioral theories such as prospect theory. In this work, we study prosumer decision making in a more natural, ongoing market situation in which a prosumer has to decide every day whether to sell any surplus energy units generated by the solar panels on her roof or hold (store) the energy units in anticipation of a future sale at a better price. Within this context, we propose a new behavioral model that extends EUT to take into account the notion of a bounded temporal horizon over which various decision parameters are considered. Specifically, we introduce the notion of a bounded time window (the number of upcoming days over which a prosumer evaluates the probability that each possible price will be the highest) that prosumers implicitly impose on their decision making in arriving at hold or sell decisions. The new behavioral model assumes that humans make decisions that will affect their lives within a bounded time window regardless of how far into the future their units may be sold. Modeling the utility of the prosumer using parameters such as the offered price on a day, the number of energy units the prosumer has available for sale on a day, and the probabilities of the forecast prices, we fit both traditional EUT and the proposed behavioral model with bounded time windows to data collected from 57 homeowners over 68 days in a simulated energy market. Each prosumer generated surplus units of solar power and had the opportunity to sell those units to the local utility at the price set that day by the utility or hold the units for sale in the future. For most participants, a bounded horizon in the range of 4-5 days provided a much better fit to their responses than was found for the traditional (unbounded) EUT model
△ Less
Submitted 5 March, 2021;
originally announced March 2021.
-
Tale of Seven Alerts: Enhancing Wireless Emergency Alerts (WEAs) to Reduce Cellular Network Usage During Disasters
Authors:
Demetrios Lambropoulos,
Mohammad Yousefvand,
Narayan Mandayam
Abstract:
In weather disasters, first responders access dedicated communication channels different from civilian commercial channels to facilitate rescues. However, rescues in recent disasters have increasingly involved civilian and volunteer forces, requiring civilian channels not to be overloaded with traffic. We explore seven enhancements to the wording of Wireless Emergency Alerts (WEAs) and their effec…
▽ More
In weather disasters, first responders access dedicated communication channels different from civilian commercial channels to facilitate rescues. However, rescues in recent disasters have increasingly involved civilian and volunteer forces, requiring civilian channels not to be overloaded with traffic. We explore seven enhancements to the wording of Wireless Emergency Alerts (WEAs) and their effectiveness in getting smartphone users to comply, including reducing frivolous mobile data consumption during critical weather disasters. We conducted a between-subjects survey (N=898), in which participants were either assigned no alert (control) or an alert framed as Basic Information, Altruism, Multimedia, Negative Feedback, Positive Feedback, Reward, or Punishment. We find that Basic Information alerts resulted in the largest reduction of multimedia and video services usage; we also find that Punishment alerts have the lowest absolute compliance. This work has implications for creating more effective WEAs and providing a better understanding of how wording can affect emergency alert compliance.
△ Less
Submitted 31 January, 2021;
originally announced February 2021.
-
Estimation of Individual Device Contributions for Incentivizing Federated Learning
Authors:
Takayuki Nishio,
Ryoichi Shinkuma,
Narayan B. Mandayam
Abstract:
Federated learning (FL) is an emerging technique used to train a machine-learning model collaboratively using the data and computation resource of the mobile devices without exposing privacy-sensitive user data.
Appropriate incentive mechanisms that motivate the data and mobile-device owner to participate in FL is key to building a sustainable platform for FL. However, it is difficult to evaluat…
▽ More
Federated learning (FL) is an emerging technique used to train a machine-learning model collaboratively using the data and computation resource of the mobile devices without exposing privacy-sensitive user data.
Appropriate incentive mechanisms that motivate the data and mobile-device owner to participate in FL is key to building a sustainable platform for FL. However, it is difficult to evaluate the contribution level of the devices/owners to determine appropriate rewards without large computation and communication overhead.
This paper proposes a computation-and communication-efficient method of estimating a participating device's contribution level. The proposed method enables such estimation during a single FL training process, there by reducing the need for traffic and computation overhead. The performance evaluations using the MNIST dataset show that the proposed method estimates individual participants' contributions accurately with 46-49% less computation overhead and no communication overhead than a naive estimation method.
△ Less
Submitted 20 September, 2020;
originally announced September 2020.
-
Learning End-User Behavior for Optimized Bidding in HetNets: Impact on User/Network Association
Authors:
Mohammad Yousefvand,
Narayan Mandayam
Abstract:
We study the impact of end-user behavior on service provider (SP) bidding and user/network association in a HetNet with multiple SPs while considering the uncertainty in the service guarantees offered by the SPs. Using Prospect Theory (PT) to model end-user decision making that deviates from expected utility theory (EUT), we formulate user association with SPs as a multiple leader Stackelberg game…
▽ More
We study the impact of end-user behavior on service provider (SP) bidding and user/network association in a HetNet with multiple SPs while considering the uncertainty in the service guarantees offered by the SPs. Using Prospect Theory (PT) to model end-user decision making that deviates from expected utility theory (EUT), we formulate user association with SPs as a multiple leader Stackelberg game where each SP offers a bid to each user that includes a data rate with a certain probabilistic service guarantee and at a given price, while the user chooses the best offer among multiple such bids. We show that when users underweight the advertised service guarantees of the SPs (a behavior observed under uncertainty), the rejection rate of the bids increases dramatically which in turn decreases the SPs utilities and service rates. To overcome this, we propose a two-stage learning-based optimized bidding framework for SPs. In the first stage, we use a support vector machine (SVM) learning algorithm to predict users' binary decisions (accept/reject bids), and then in the second stage we cast the utility-optimized bidding problem as a Markov Decision Problem (MDP) and propose a reinforcement learning-based dynamic programming algorithm to efficiently solve it. Simulation results and computational complexity analysis validate the efficiency of our proposed model.
△ Less
Submitted 11 September, 2019;
originally announced September 2019.
-
Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT
Authors:
Alireza Nooraiepour,
Waheed U. Bajwa,
Narayan B. Mandayam
Abstract:
Internet-of-Things (IoT) devices that are limited in power and processing are susceptible to physical layer (PHY) spoofing (signal exploitation) attacks owing to their inability to implement a full-blown protocol stack for security. The overwhelming adoption of multicarrier techniques such as orthogonal frequency division multiplexing (OFDM) for the PHY layer makes IoT devices further vulnerable t…
▽ More
Internet-of-Things (IoT) devices that are limited in power and processing are susceptible to physical layer (PHY) spoofing (signal exploitation) attacks owing to their inability to implement a full-blown protocol stack for security. The overwhelming adoption of multicarrier techniques such as orthogonal frequency division multiplexing (OFDM) for the PHY layer makes IoT devices further vulnerable to PHY spoofing attacks. These attacks which aim at injecting bogus/spurious data into the receiver, involve inferring transmission parameters and finding PHY characteristics of the transmitted signals so as to spoof the received signal. Non-contiguous (NC) OFDM systems have been argued to have low probability of exploitation (LPE) characteristics against classic attacks based on cyclostationary analysis, and the corresponding PHY has been deemed to be secure. However, with the advent of machine learning (ML) algorithms, adversaries can devise data-driven attacks to compromise such systems. It is in this vein that PHY spoofing performance of adversaries equipped with supervised and unsupervised ML tools are investigated in this paper. The supervised ML approach is based on deep neural networks (DNN) while the unsupervised one employs variational autoencoders (VAEs). In particular, VAEs are shown to be capable of learning representations from NC-OFDM signals related to their PHY characteristics such as frequency pattern and modulation scheme, which are useful for PHY spoofing. In addition, a new metric based on the disentanglement principle is proposed to measure the quality of such learned representations. Simulation results demonstrate that the performance of the spoofing adversaries highly depends on the subcarriers' allocation patterns. Particularly, it is shown that utilizing a random subcarrier occupancy pattern secures NC-OFDM systems against ML-based attacks.
△ Less
Submitted 4 July, 2020; v1 submitted 31 July, 2019;
originally announced August 2019.
-
Learning-based Resource Optimization in Ultra Reliable Low Latency HetNets
Authors:
Mohammad Yousefvand,
Kenza Hamidouche,
Narayan B. Mandayam
Abstract:
In this paper, the problems of user offloading and resource optimization are jointly addressed to support ultra-reliable and low latency communications (URLLC) in HetNets. In particular, a multi-tier network with a single macro base station (MBS) and multiple overlaid small cell base stations (SBSs) is considered that includes users with different latency and reliability constraints. Modeling the…
▽ More
In this paper, the problems of user offloading and resource optimization are jointly addressed to support ultra-reliable and low latency communications (URLLC) in HetNets. In particular, a multi-tier network with a single macro base station (MBS) and multiple overlaid small cell base stations (SBSs) is considered that includes users with different latency and reliability constraints. Modeling the latency and reliability constraints of users with probabilistic guarantees, the joint problem of user offloading and resource allocation (JUR) in a URLLC setting is formulated as an optimization problem to minimize the cost of serving users for the MBS. In the considered scheme, SBSs bid to serve URLLC users under their coverage at a given price, and the MBS decides whether to serve each user locally or to offload it to one of the overlaid SBSs. Since the JUR optimization is NP-hard, we propose a low complexity learning-based heuristic method (LHM) which includes a support vector machine-based user association model and a convex resource optimization (CRO) algorithm. To further reduce the delay, we propose an alternating direction method of multipliers (ADMM)-based solution to the CRO problem. Simulation results show that using LHM, the MBS significantly decreases the spectrum access delay for users (by $\sim$ 93\%) as compared to JUR, while also reducing its bandwidth and power costs in serving users (by $\sim$ 33\%) as compared to directly serving users without offloading.
△ Less
Submitted 12 May, 2019;
originally announced May 2019.
-
Optimizing Throughput Performance in Distributed MIMO Wi-Fi Networks using Deep Reinforcement Learning
Authors:
Neelakantan Nurani Krishnan,
Eric Torkildson,
Narayan Mandayam,
Dipankar Raychaudhuri,
Enrico-Henrik Rantala,
Klaus Doppler
Abstract:
This paper explores the feasibility of leveraging concepts from deep reinforcement learning (DRL) to enable dynamic resource management in Wi-Fi networks implementing distributed multi-user MIMO (D-MIMO). D-MIMO is a technique by which a set of wireless access points are synchronized and grouped together to jointly serve multiple users simultaneously. This paper addresses two dynamic resource mana…
▽ More
This paper explores the feasibility of leveraging concepts from deep reinforcement learning (DRL) to enable dynamic resource management in Wi-Fi networks implementing distributed multi-user MIMO (D-MIMO). D-MIMO is a technique by which a set of wireless access points are synchronized and grouped together to jointly serve multiple users simultaneously. This paper addresses two dynamic resource management problems pertaining to D-MIMO Wi-Fi networks: (i) channel assignment of D-MIMO groups, and (ii) deciding how to cluster access points to form D-MIMO groups, in order to maximize user throughput performance. These problems are known to be NP-Hard and only heuristic solutions exist in literature. We construct a DRL framework through which a learning agent interacts with a D-MIMO Wi-Fi network, learns about the network environment, and is successful in converging to policies which address the aforementioned problems. Through extensive simulations and on-line training based on D-MIMO Wi-Fi networks, this paper demonstrates the efficacy of DRL in achieving an improvement of 20% in user throughput performance compared to heuristic solutions, particularly when network conditions are dynamic. This work also showcases the effectiveness of DRL in meeting multiple network objectives simultaneously, for instance, maximizing throughput of users as well as fairness of throughput among them.
△ Less
Submitted 29 April, 2019; v1 submitted 17 December, 2018;
originally announced December 2018.
-
Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning
Authors:
Aidin Ferdowsi,
Samad Ali,
Walid Saad,
Narayan B. Mandayam
Abstract:
Autonomous connected vehicles (ACVs) rely on intra-vehicle sensors such as camera and radar as well as inter-vehicle communication to operate effectively. This reliance on cyber components exposes ACVs to cyber and physical attacks in which an adversary can manipulate sensor readings and physically take control of an ACV. In this paper, a comprehensive framework is proposed to thwart cyber and phy…
▽ More
Autonomous connected vehicles (ACVs) rely on intra-vehicle sensors such as camera and radar as well as inter-vehicle communication to operate effectively. This reliance on cyber components exposes ACVs to cyber and physical attacks in which an adversary can manipulate sensor readings and physically take control of an ACV. In this paper, a comprehensive framework is proposed to thwart cyber and physical attacks on ACV networks. First, an optimal safe controller for ACVs is derived to maximize the street traffic flow while minimizing the risk of accidents by optimizing ACV speed and inter-ACV spacing. It is proven that the proposed controller is robust to physical attacks which aim at making ACV systems instable. To improve the cyber-physical security of ACV systems, next, data injection attack (DIA) detection approaches are proposed to address cyber attacks on sensors and their physical impact on the ACV system. To comprehensively design the DIA detection approaches, ACV sensors are characterized in two subsets based on the availability of a-priori information about their data. For sensors having a prior information, a DIA detection approach is proposed and an optimal threshold level is derived for the difference between the actual and estimated values of sensors data which enables ACV to stay robust against cyber attacks. For sensors having no prior information, a novel multi-armed bandit (MAB) algorithm is proposed to enable ACV to securely control its motion. Simulation results show that the proposed optimal safe controller outperforms current state of the art controllers by maximizing the robustness of ACVs to physical attacks. The results also show that the proposed DIA detection approaches, compared to Kalman filtering, can improve the security of ACV sensors against cyber attacks and ultimately improve the physical robustness of an ACV system.
△ Less
Submitted 13 December, 2018;
originally announced December 2018.
-
Joint User Association and Resource Allocation Optimization for Ultra Reliable Low Latency HetNets
Authors:
Mohammad Yousefvand,
Narayan B. Mandayam
Abstract:
Ensuring ultra-reliable and low latency communications (URLLC) is necessary for enabling delay critical applications in 5G HetNets. We propose a joint user to BS association and resource optimization method that is attractive for URLLC in HetNets with Cellular Base Stations (CBSs) and Small Cell Base Stations (SBSs), while also reducing energy and bandwidth consumption. In our scheme, CBSs share p…
▽ More
Ensuring ultra-reliable and low latency communications (URLLC) is necessary for enabling delay critical applications in 5G HetNets. We propose a joint user to BS association and resource optimization method that is attractive for URLLC in HetNets with Cellular Base Stations (CBSs) and Small Cell Base Stations (SBSs), while also reducing energy and bandwidth consumption. In our scheme, CBSs share portions of the available spectrum with SBSs, and they in exchange, provide data service to the users in their coverage area. We first show that the CBSs optimal resource allocation (ORA) problem is NP-hard and computationally intractable for large number of users. Then, to reduce its time complexity, we propose a relaxed heuristic method (RHM) which breaks down the original ORA problem into a heuristic user association (HUA) algorithm and a convex resource allocation (CRA) optimization problem. Simulation results show that the proposed heuristic method decreases the time complexity of finding the optimal solution for CBS's significantly, thereby benefiting URLLC. It also helps the CBSs to save energy by offloading users to SBSs. In our simulations, the spectrum access delay for cellular users is reduced by 93\% and the energy consumption is reduced by 33\%, while maintaining the full service rate.
△ Less
Submitted 18 September, 2018;
originally announced September 2018.
-
Impact of End-User Behavior on User/Network Association in HetNets
Authors:
Mohammad Yousefvand,
Mohammad Hajimirsadeghi,
Narayan B. Mandayam
Abstract:
We study the impact of end-user behavior on user/network association in a HetNet with multiple service providers (SPs). Specifically, we consider the uncertainty in the service guarantees offered by SPs in a HetNet, and use Prospect Theory (PT) to model end-user decision making. We formulate user association with SPs as a multiple leader Stackelberg game where each SP offers a data rate to each us…
▽ More
We study the impact of end-user behavior on user/network association in a HetNet with multiple service providers (SPs). Specifically, we consider the uncertainty in the service guarantees offered by SPs in a HetNet, and use Prospect Theory (PT) to model end-user decision making. We formulate user association with SPs as a multiple leader Stackelberg game where each SP offers a data rate to each user with a certain service guarantee and at a certain price, while the user chooses the best offer among multiple such bids. Using the specific example of a HetNet with one cellular base station and one WiFi access point, we show that when the end users underestimate the advertised service guarantees, then some of the Nash Equilibrium strategies under the Expected Utility Theory (EUT) model become infeasible under PT, and for those Nash Equilibria that are feasible under both EUT and PT, the resulting user utilities are less under PT. We propose resource allocation and bidding mechanisms for the SPs to mitigate these effects.
△ Less
Submitted 1 June, 2018;
originally announced June 2018.
-
Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems
Authors:
Aidin Ferdowsi,
Ursula Challita,
Walid Saad,
Narayan B. Mandayam
Abstract:
To operate effectively in tomorrow's smart cities, autonomous vehicles (AVs) must rely on intra-vehicle sensors such as camera and radar as well as inter-vehicle communication. Such dependence on sensors and communication links exposes AVs to cyber-physical (CP) attacks by adversaries that seek to take control of the AVs by manipulating their data. Thus, to ensure safe and optimal AV dynamics cont…
▽ More
To operate effectively in tomorrow's smart cities, autonomous vehicles (AVs) must rely on intra-vehicle sensors such as camera and radar as well as inter-vehicle communication. Such dependence on sensors and communication links exposes AVs to cyber-physical (CP) attacks by adversaries that seek to take control of the AVs by manipulating their data. Thus, to ensure safe and optimal AV dynamics control, the data processing functions at AVs must be robust to such CP attacks. To this end, in this paper, the state estimation process for monitoring AV dynamics, in presence of CP attacks, is analyzed and a novel adversarial deep reinforcement learning (RL) algorithm is proposed to maximize the robustness of AV dynamics control to CP attacks. The attacker's action and the AV's reaction to CP attacks are studied in a game-theoretic framework. In the formulated game, the attacker seeks to inject faulty data to AV sensor readings so as to manipulate the inter-vehicle optimal safe spacing and potentially increase the risk of AV accidents or reduce the vehicle flow on the roads. Meanwhile, the AV, acting as a defender, seeks to minimize the deviations of spacing so as to ensure robustness to the attacker's actions. Since the AV has no information about the attacker's action and due to the infinite possibilities for data value manipulations, the outcome of the players' past interactions are fed to long-short term memory (LSTM) blocks. Each player's LSTM block learns the expected spacing deviation resulting from its own action and feeds it to its RL algorithm. Then, the the attacker's RL algorithm chooses the action which maximizes the spacing deviation, while the AV's RL algorithm tries to find the optimal action that minimizes such deviation.
△ Less
Submitted 8 May, 2018; v1 submitted 2 May, 2018;
originally announced May 2018.
-
Design of Ad Hoc Wireless Mesh Networks Formed by Unmanned Aerial Vehicles with Advanced Mechanical Automation
Authors:
Ryoichi Shinkuma,
Narayan B. Mandayam
Abstract:
Ad hoc wireless mesh networks formed by unmanned aerial vehicles (UAVs) equipped with wireless transceivers (access points (APs)) are increasingly being touted as being able to provide a flexible "on-the-fly" communications infrastructure that can collect and transmit sensor data from sensors in remote, wilderness, or disaster-hit areas. Recent advances in the mechanical automation of UAVs have re…
▽ More
Ad hoc wireless mesh networks formed by unmanned aerial vehicles (UAVs) equipped with wireless transceivers (access points (APs)) are increasingly being touted as being able to provide a flexible "on-the-fly" communications infrastructure that can collect and transmit sensor data from sensors in remote, wilderness, or disaster-hit areas. Recent advances in the mechanical automation of UAVs have resulted in separable APs and replaceable batteries that can be carried by UAVs and placed at arbitrary locations in the field. These advanced mechanized UAV mesh networks pose interesting questions in terms of the design of the network architecture and the optimal UAV scheduling algorithms. This paper studies a range of network architectures that depend on the mechanized automation (AP separation and battery replacement) capabilities of UAVs and proposes heuristic UAV scheduling algorithms for each network architecture, which are benchmarked against optimal designs.
△ Less
Submitted 19 April, 2018;
originally announced April 2018.
-
Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach
Authors:
Minghui Min,
Liang Xiao,
Caixia Xie,
Mohammad Hajimirsadeghi,
Narayan B. Mandayam
Abstract:
Advanced Persistent Threat (APT) attackers apply multiple sophisticated methods to continuously and stealthily steal information from the targeted cloud storage systems and can even induce the storage system to apply a specific defense strategy and attack it accordingly. In this paper, the interactions between an APT attacker and a defender allocating their Central Processing Units (CPUs) over mul…
▽ More
Advanced Persistent Threat (APT) attackers apply multiple sophisticated methods to continuously and stealthily steal information from the targeted cloud storage systems and can even induce the storage system to apply a specific defense strategy and attack it accordingly. In this paper, the interactions between an APT attacker and a defender allocating their Central Processing Units (CPUs) over multiple storage devices in a cloud storage system are formulated as a Colonel Blotto game. The Nash equilibria (NEs) of the CPU allocation game are derived for both symmetric and asymmetric CPUs between the APT attacker and the defender to evaluate how the limited CPU resources, the date storage size and the number of storage devices impact the expected data protection level and the utility of the cloud storage system. A CPU allocation scheme based on "hotbooting" policy hill-climbing (PHC) that exploits the experiences in similar scenarios to initialize the quality values to accelerate the learning speed is proposed for the defender to achieve the optimal APT defense performance in the dynamic game without being aware of the APT attack model and the data storage model. A hotbooting deep Q-network (DQN)-based CPU allocation scheme further improves the APT detection performance for the case with a large number of CPUs and storage devices. Simulation results show that our proposed reinforcement learning based CPU allocation can improve both the data protection level and the utility of the cloud storage system compared with the Q-learning based CPU allocation against APTs.
△ Less
Submitted 18 January, 2018;
originally announced January 2018.
-
Colonel Blotto Game for Secure State Estimation in Interdependent Critical Infrastructure
Authors:
Aidin Ferdowsi,
Walid Saad,
Narayan B. Mandayam
Abstract:
Securing the physical components of a city's interdependent critical infrastructure (ICI) such as power, natural gas, and water systems is a challenging task due to their interdependence and a large number of involved sensors. In this paper, using a novel integrated state-space model that captures the interdependence, a two-stage cyber attack on an ICI is studied in which the attacker first compro…
▽ More
Securing the physical components of a city's interdependent critical infrastructure (ICI) such as power, natural gas, and water systems is a challenging task due to their interdependence and a large number of involved sensors. In this paper, using a novel integrated state-space model that captures the interdependence, a two-stage cyber attack on an ICI is studied in which the attacker first compromises the ICI's sensors by decoding their messages, and, subsequently, it alters the compromised sensors' data to cause state estimation errors. To thwart such attacks, the administrator of each critical infrastructure (CI) must assign protection levels to the sensors based on their importance in the state estimation process. To capture the interdependence between the attacker and the ICI administrator's actions and analyze their interactions, a Colonel Blotto game framework is proposed. The mixed-strategy Nash equilibrium of this game is derived analytically. At this equilibrium, it is shown that the administrator can strategically randomize between the protection levels of the sensors to deceive the attacker. Simulation results coupled with theoretical analysis show that, using the proposed game, the administrator can reduce the state estimation error by at least $ 50\% $ compared to a non-strategic approach that assigns protection levels proportional to sensor values.
△ Less
Submitted 5 November, 2019; v1 submitted 27 September, 2017;
originally announced September 2017.
-
Managing Price Uncertainty in Prosumer-Centric Energy Trading: A Prospect-Theoretic Stackelberg Game Approach
Authors:
Georges El Rahi,
S. Rasoul Etesami,
Walid Saad,
Narayan Mandayam,
H. Vincent Poor
Abstract:
In this paper, the problem of energy trading between smart grid prosumers, who can simultaneously consume and produce energy, and a grid power company is studied. The problem is formulated as a single-leader, multiple-follower Stackelberg game between the power company and multiple prosumers. In this game, the power company acts as a leader who determines the pricing strategy that maximizes its pr…
▽ More
In this paper, the problem of energy trading between smart grid prosumers, who can simultaneously consume and produce energy, and a grid power company is studied. The problem is formulated as a single-leader, multiple-follower Stackelberg game between the power company and multiple prosumers. In this game, the power company acts as a leader who determines the pricing strategy that maximizes its profits, while the prosumers act as followers who react by choosing the amount of energy to buy or sell so as to optimize their current and future profits. The proposed game accounts for each prosumer's subjective decision when faced with the uncertainty of profits, induced by the random future price. In particular, the framing effect, from the framework of prospect theory (PT), is used to account for each prosumer's valuation of its gains and losses with respect to an individual utility reference point. The reference point changes between prosumers and stems from their past experience and future aspirations of profits. The followers' noncooperative game is shown to admit a unique pure-strategy Nash equilibrium (NE) under classical game theory (CGT) which is obtained using a fully distributed algorithm. The results are extended to account for the case of PT using algorithmic solutions that can achieve an NE under certain conditions. Simulation results show that the total grid load varies significantly with the prosumers' reference point and their loss-aversion level. In addition, it is shown that the power company's profits considerably decrease when it fails to account for the prosumers' subjective perceptions under PT.
△ Less
Submitted 18 September, 2017;
originally announced September 2017.
-
Game Theory for Secure Critical Interdependent Gas-Power-Water Infrastructure
Authors:
Aidin Ferdowsi,
Anibal Sanjab,
Walid Saad,
Narayan B. Mandayam
Abstract:
A city's critical infrastructure such as gas, water, and power systems, are largely interdependent since they share energy, computing, and communication resources. This, in turn, makes it challenging to endow them with fool-proof security solutions. In this paper, a unified model for interdependent gas-power-water infrastructure is presented and the security of this model is studied using a novel…
▽ More
A city's critical infrastructure such as gas, water, and power systems, are largely interdependent since they share energy, computing, and communication resources. This, in turn, makes it challenging to endow them with fool-proof security solutions. In this paper, a unified model for interdependent gas-power-water infrastructure is presented and the security of this model is studied using a novel game-theoretic framework. In particular, a zero-sum noncooperative game is formulated between a malicious attacker who seeks to simultaneously alter the states of the gas-power-water critical infrastructure to increase the power generation cost and a defender who allocates communication resources over its attack detection filters in local areas to monitor the infrastructure. At the mixed strategy Nash equilibrium of this game, numerical results show that the expected power generation cost deviation is 35\% lower than the one resulting from an equal allocation of resources over the local filters. The results also show that, at equilibrium, the interdependence of the power system on the natural gas and water systems can motivate the attacker to target the states of the water and natural gas systems to change the operational states of the power grid. Conversely, the defender allocates a portion of its resources to the water and natural gas states of the interdependent system to protect the grid from state deviations.
△ Less
Submitted 14 July, 2017;
originally announced July 2017.
-
A Colonel Blotto Game for Interdependence-Aware Cyber-Physical Systems Security in Smart Cities
Authors:
Aidin Ferdowsi,
Walid Saad,
Behrouz Maham,
Narayan B. Mandayam
Abstract:
Smart cities must integrate a number of interdependent cyber-physical systems that operate in a coordinated manner to improve the well-being of the city's residents. A cyber-physical system (CPS) is a system of computational elements controlling physical entities. Large-scale CPSs are more vulnerable to attacks due to the cyber-physical interdependencies that can lead to cascading failures which c…
▽ More
Smart cities must integrate a number of interdependent cyber-physical systems that operate in a coordinated manner to improve the well-being of the city's residents. A cyber-physical system (CPS) is a system of computational elements controlling physical entities. Large-scale CPSs are more vulnerable to attacks due to the cyber-physical interdependencies that can lead to cascading failures which can have a significant detrimental effect on a city. In this paper, a novel approach is proposed for analyzing the problem of allocating security resources, such as firewalls and anti-malware, over the various cyber components of an interdependent CPS to protect the system against imminent attacks. The problem is formulated as a Colonel Blotto game in which the attacker seeks to allocate its resources to compromise the CPS, while the defender chooses how to distribute its resources to defend against potential attacks. To evaluate the effects of defense and attack, various CPS factors are considered including human-CPS interactions as well as physical and topological characteristics of a CPS such as flow and capacity of interconnections and minimum path algorithms. Results show that, for the case in which the attacker is not aware of the CPS interdependencies, the defender can have a higher payoff, compared to the case in which the attacker has complete information. The results also show that, in the case of more symmetric nodes, due to interdependencies, the defender achieves its highest payoff at the equilibrium compared to the case with independent, asymmetric nodes.
△ Less
Submitted 23 May, 2017;
originally announced May 2017.
-
Smart Routing of Electric Vehicles for Load Balancing in Smart Grids
Authors:
S. Rasoul Etesami,
Walid Saad,
Narayan Mandayam,
H. V. Poor
Abstract:
Electric vehicles (EVs) are expected to be a major component of the smart grid. The rapid proliferation of EVs will introduce an unprecedented load on the existing electric grid due to the charging/discharging behavior of the EVs, thus motivating the need for novel approaches for routing EVs across the grid. In this paper, a novel gametheoretic framework for smart routing of EVs within the smart g…
▽ More
Electric vehicles (EVs) are expected to be a major component of the smart grid. The rapid proliferation of EVs will introduce an unprecedented load on the existing electric grid due to the charging/discharging behavior of the EVs, thus motivating the need for novel approaches for routing EVs across the grid. In this paper, a novel gametheoretic framework for smart routing of EVs within the smart grid is proposed. The goal of this framework is to balance the electricity load across the grid while taking into account the traffic congestion and the waiting time at charging stations. The EV routing problem is formulated as a noncooperative game. For this game, it is shown that selfish behavior of EVs will result in a pure-strategy Nash equilibrium with the price of anarchy upper bounded by the variance of the ground load induced by the residential, industrial, or commercial users. Moreover, the results are extended to capture the stochastic nature of induced ground load as well as the subjective behavior of the owners of EVs as captured by using notions from the behavioral framework of prospect theory. Simulation results provide new insights on more efficient energy pricing at charging stations and under more realistic grid conditions.
△ Less
Submitted 27 December, 2019; v1 submitted 10 May, 2017;
originally announced May 2017.
-
Coexistence of Radar and Communication Systems in CBRS Bands Through Downlink Power Control
Authors:
Neelakantan Nurani Krishnan,
Ratnesh Kumbhkar,
Narayan B. Mandayam,
Ivan Seskar,
Sastry Kompella
Abstract:
Citizen Broadband Radio Service band (3550 - 3700 GHz) is seen as one of the key frequency bands to enable improvements in performance of wireless broadband and cellular systems. A careful study of interference caused by a secondary cellular communication system coexisting with an incumbent naval radar is required to establish a pragmatic protection distance, which not only protects the incumbent…
▽ More
Citizen Broadband Radio Service band (3550 - 3700 GHz) is seen as one of the key frequency bands to enable improvements in performance of wireless broadband and cellular systems. A careful study of interference caused by a secondary cellular communication system coexisting with an incumbent naval radar is required to establish a pragmatic protection distance, which not only protects the incumbent from harmful interference but also increases the spectrum access opportunity for the secondary system. In this context, this paper investigates the co-channel and adjacent channel coexistence of a ship-borne naval radar and a wide-area cellular communication system and presents the analysis of interference caused by downlink transmission in the cellular system on the naval radar for different values of radar protection distance. The results of such analysis suggest that maintaining a protection distance of 30 km from the radar will ensure the required INR protection criterion of -6 dB at the radar receiver with > 0.9 probability, even when the secondary network operates in the same channel as the radar. Novel power control algorithms to assign operating powers to the coexisting cellular devices are also proposed to further reduce the protection distance from radar while still meeting the radar INR protection requirement.
△ Less
Submitted 9 May, 2017;
originally announced May 2017.
-
Coverage and Rate Analysis of Super Wi-Fi Networks Using Stochastic Geometry
Authors:
Neelakantan Nurani Krishnan,
Gokul Sridharan,
Ivan Seskar,
Narayan Mandayam
Abstract:
Recent regulatory changes proposed by the Federal Communications Commission (FCC) permitting unlicensed use of television white space (TVWS) channels present new opportunities for designing wireless networks that make efficient use of this spectrum. The favorable propagation characteristics of these channels and their widespread availability, especially in rural areas, make them well-suited for pr…
▽ More
Recent regulatory changes proposed by the Federal Communications Commission (FCC) permitting unlicensed use of television white space (TVWS) channels present new opportunities for designing wireless networks that make efficient use of this spectrum. The favorable propagation characteristics of these channels and their widespread availability, especially in rural areas, make them well-suited for providing broadband services in sparsely populated regions where economic factors hinder deployment of such services on licensed spectrum. In this context, this paper explores the deployment of an outdoor Wi-Fi-like network operating in TVWS channels, referred to commonly as a Super Wi-Fi network. Since regulations governing unlicensed use of these channels allow (a) mounting fixed devices up to a height of 30 m and operation at transmit powers of up to 4 W EIRP, and (b) operation at transmit powers of up to 100 mW EIRP for portable devices, such networks can provide extended coverage and higher rates than traditional Wi-Fi networks. However, these gains are subject to the viability of the uplink from the portable devices (clients) to the fixed devices (access points (AP)) because of tighter restrictions on transmit power of clients compared to APs. This paper leverages concepts from stochastic geometry to study the performance of such networks with specific focus on the effect of (a) transmit power asymmetry between APs and clients and its impact on uplink viability and coverage, and (b) the interplay between height and transmit power of APs in determining the network throughput. Such an analysis reveals that (a) maximum coverage of no more than 700 m is obtained even when APs are deployed at 30 m height, and (b) operating APs at transmit power of more than 1 W is beneficial only at sparse deployment densities when rate is prioritized over coverage.
△ Less
Submitted 26 April, 2017;
originally announced April 2017.
-
How Close Can I Be? - A Comprehensive Analysis of Cellular Interference on ATC Radar
Authors:
Neelakantan Nurani Krishnan,
Ratnesh Kumbhkar,
Narayan B. Mandayam,
Ivan Seskar,
Sastry Kompella
Abstract:
Increasing data traffic demands over wireless spectrum have necessitated spectrum sharing and coexistence between heterogeneous systems such as radar and cellular communications systems. In this context, we specifically investigate the co-channel coexistence between an air traffic control (ATC) radar and a wide area cellular communication (comms) system. We present a comprehensive characterization…
▽ More
Increasing data traffic demands over wireless spectrum have necessitated spectrum sharing and coexistence between heterogeneous systems such as radar and cellular communications systems. In this context, we specifically investigate the co-channel coexistence between an air traffic control (ATC) radar and a wide area cellular communication (comms) system. We present a comprehensive characterization and analysis of interference caused by the comms system on the ATC radar with respect to multiple parameters such as radar range, protection radius around the radar, and radar antenna elevation angle. The analysis suggests that maintaining a protection radius of 50 km around the radar will ensure the required INR protection criterion of -10 dB at the radar receiver with ~0.9 probability, even when the radar beam is in the same horizon as the comms BS. Detailed evaluations of the radar target detection performance provide a framework to choose appropriate protection radii around the radar to meet specific performance requirements.
△ Less
Submitted 24 April, 2017;
originally announced April 2017.
-
Prospect Theory for Enhanced Smart Grid Resilience Using Distributed Energy Storage
Authors:
Georges El Rahi,
Anibal Sanjab,
Walid Saad,
Narayan B. Mandayam,
H. Vincent Poor
Abstract:
The proliferation of distributed generation and storage units is leading to the development of local, small-scale distribution grids, known as microgrids (MGs). In this paper, the problem of optimizing the energy trading decisions of MG operators (MGOs) is studied using game theory. In the formulated game, each MGO chooses the amount of energy that must be sold immediately or stored for future eme…
▽ More
The proliferation of distributed generation and storage units is leading to the development of local, small-scale distribution grids, known as microgrids (MGs). In this paper, the problem of optimizing the energy trading decisions of MG operators (MGOs) is studied using game theory. In the formulated game, each MGO chooses the amount of energy that must be sold immediately or stored for future emergencies, given the prospective market prices which are influenced by other MGOs' decisions. The problem is modeled using a Bayesian game to account for the incomplete information that MGOs have about each others' levels of surplus. The proposed game explicitly accounts for each MGO's subjective decision when faced with the uncertainty of its opponents' energy surplus. In particular, the so-called framing effect, from the framework of prospect theory (PT), is used to account for each MGO's valuation of its gains and losses with respect to an individual utility reference point. The reference point is typically different for each individual and originates from its past experiences and future aspirations. A closed-form expression for the Bayesian Nash equilibrium is derived for the standard game formulation. Under PT, a best response algorithm is proposed to find the equilibrium. Simulation results show that, depending on their individual reference points, MGOs can tend to store more or less energy under PT compared to classical game theory. In addition, the impact of the reference point is found to be more prominent as the emergency price set by the power company increases.
△ Less
Submitted 6 October, 2016;
originally announced October 2016.
-
Stochastic Games for Smart Grid Energy Management with Prospect Prosumers
Authors:
Seyed Rasoul Etesami,
Walid Saad,
Narayan Mandayam,
H. Vincent Poor
Abstract:
In this paper, the problem of smart grid energy management under stochastic dynamics is investigated. In the considered model, at the demand side, it is assumed that customers can act as prosumers who own renewable energy sources and can both produce and consume energy. Due to the coupling between the prosumers' decisions and the stochastic nature of renewable energy, the interaction among prosume…
▽ More
In this paper, the problem of smart grid energy management under stochastic dynamics is investigated. In the considered model, at the demand side, it is assumed that customers can act as prosumers who own renewable energy sources and can both produce and consume energy. Due to the coupling between the prosumers' decisions and the stochastic nature of renewable energy, the interaction among prosumers is formulated as a stochastic game, in which each prosumer seeks to maximize its payoff, in terms of revenues, by controlling its energy consumption and demand. In particular, the subjective behavior of prosumers is explicitly reflected into their payoff functions using prospect theory, a powerful framework that allows modeling real-life human choices. For this prospect-based stochastic game, it is shown that there always exists a stationary Nash equilibrium where the prosumers' trading policies in the equilibrium are independent of the time and their histories of the play. Moreover, a novel distributed algorithm with no information sharing among prosumers is proposed and shown to converge to an $ε$-Nash equilibrium. On the other hand, at the supply side, the interaction between the utility company and the prosumers is formulated as an online optimization problem in which the utility company's goal is to learn its optimal energy allocation rules. For this case, it is shown that such an optimization problem admits a no-regret algorithm meaning that regardless of the actual outcome of the game among the prosumers, the utility company can follow a strategy that mitigates its allocation costs as if it knew the entire demand market a priori. Simulation results show the convergence of the proposed algorithms to their predicted outcomes and present new insights resulting from prospect theory that contribute toward more efficient energy management in the smart grids.
△ Less
Submitted 7 August, 2017; v1 submitted 6 October, 2016;
originally announced October 2016.
-
Joint Caching and Pricing Strategies for Popular Content in Information Centric Networks
Authors:
Mohammad Hajimirsadeghi,
Narayan B. Mandayam,
Alex Reznik
Abstract:
We develop an analytical framework for distribution of popular content in an Information Centric Network (ICN) that comprises of Access ICNs, a Transit ICN and a Content Provider. Using a generalized Zipf distribution to model content popularity, we devise a game theoretic approach to jointly determine caching and pricing strategies in such an ICN. Under the assumption that the caching cost of the…
▽ More
We develop an analytical framework for distribution of popular content in an Information Centric Network (ICN) that comprises of Access ICNs, a Transit ICN and a Content Provider. Using a generalized Zipf distribution to model content popularity, we devise a game theoretic approach to jointly determine caching and pricing strategies in such an ICN. Under the assumption that the caching cost of the access and transit ICNs is inversely proportional to popularity, we show that the Nash caching strategies in the ICN are 0-1 (all or nothing) strategies. Further, for the case of symmetric Access ICNs, we show that the Nash equilibrium is unique and the caching policy (0 or 1) is determined by a threshold on the popularity of the content (reflected by the Zipf probability metric), i.e., all content more popular than the threshold value is cached. We also show that the resulting threshold of the Access and Transit ICNs, as well as all prices can be obtained by a decomposition of the joint caching and pricing problem into two independent caching only and pricing only problems.
△ Less
Submitted 30 January, 2017; v1 submitted 3 September, 2016;
originally announced September 2016.
-
Reading Between the Pixels: Photographic Steganography for Camera Display Messaging
Authors:
Eric Wengrowski,
Kristin Dana,
Marco Gruteser,
Narayan Mandayam
Abstract:
We exploit human color metamers to send light-modulated messages less visible to the human eye, but recoverable by cameras. These messages are a key component to camera-display messaging, such as handheld smartphones capturing information from electronic signage. Each color pixel in the display image is modified by a particular color gradient vector. The challenge is to find the color gradient tha…
▽ More
We exploit human color metamers to send light-modulated messages less visible to the human eye, but recoverable by cameras. These messages are a key component to camera-display messaging, such as handheld smartphones capturing information from electronic signage. Each color pixel in the display image is modified by a particular color gradient vector. The challenge is to find the color gradient that maximizes camera response, while minimizing human response. The mismatch in human spectral and camera sensitivity curves creates an opportunity for hidden messaging. Our approach does not require knowledge of these sensitivity curves, instead we employ a data-driven method. We learn an ellipsoidal partitioning of the six-dimensional space of colors and color gradients. This partitioning creates metamer sets defined by the base color at the display pixel and the color gradient direction for message encoding. We sample from the resulting metamer sets to find color steps for each base color to embed a binary message into an arbitrary image with reduced visible artifacts. Unlike previous methods that rely on visually obtrusive intensity modulation, we embed with color so that the message is more hidden. Ordinary displays and cameras are used without the need for expensive LEDs or high speed devices. The primary contribution of this work is a framework to map the pixels in an arbitrary image to a metamer pair for steganographic photo messaging.
△ Less
Submitted 6 April, 2016;
originally announced April 2016.
-
Towards a Consumer-Centric Grid: A Behavioral Perspective
Authors:
Walid Saad,
Arnold Glass,
Narayan Mandayam,
H. Vincent Poor
Abstract:
Active consumer participation is seen as an integral part of the emerging smart grid. Examples include demand-side management programs, incorporation of consumer-owned energy storage or renewable energy units, and active energy trading. However, despite the foreseen technological benefits of such consumer-centric grid features, to date, their widespread adoption in practice remains modest. To shed…
▽ More
Active consumer participation is seen as an integral part of the emerging smart grid. Examples include demand-side management programs, incorporation of consumer-owned energy storage or renewable energy units, and active energy trading. However, despite the foreseen technological benefits of such consumer-centric grid features, to date, their widespread adoption in practice remains modest. To shed light on this challenge, this paper explores the potential of prospect theory, a Nobel-prize winning theory, as a decision-making framework that can help understand how risk and uncertainty can impact the decisions of smart grid consumers. After introducing the basic notions of prospect theory, several examples drawn from a number of smart grid applications are developed. These results show that a better understanding of the role of human decision-making within the smart grid is paramount for optimizing its operation and expediting the deployment of its various technologies.
△ Less
Submitted 1 November, 2015;
originally announced November 2015.
-
Prospect Pricing in Cognitive Radio Networks
Authors:
Yingxiang Yang,
Leonard T. Park,
Narayan B. Mandayam,
Ivan Seskar,
Arnold Glass,
Neha Sinha
Abstract:
Advances in cognitive radio networks have primarily focused on the design of spectrally agile radios and novel spectrum sharing techniques that are founded on Expected Utility Theory (EUT). In this paper, we consider the development of novel spectrum sharing algorithms in such networks taking into account human psychological behavior of the end-users, which often deviates from EUT. Specifically, w…
▽ More
Advances in cognitive radio networks have primarily focused on the design of spectrally agile radios and novel spectrum sharing techniques that are founded on Expected Utility Theory (EUT). In this paper, we consider the development of novel spectrum sharing algorithms in such networks taking into account human psychological behavior of the end-users, which often deviates from EUT. Specifically, we consider the impact of end-user decision making on pricing and management of radio resources in a cognitive radio enabled network when there is uncertainty in the Quality of Service (QoS) guarantees offered by the Service Provider (SP). Using Prospect Theory (a Nobel-Prize-winning behavioral economic theory that captures human decision making and its deviation from EUT), we design data pricing and channel allocation algorithms for use in cognitive radio networks by formulating a game theoretic analysis of the interplay between the price offerings, bandwidth allocation by the SP and the service choices made by end-users. We show that, when the end-users under-weight the service guarantee, they tend to reject the offer which results in under-utilization of radio resources and revenue loss. We propose prospect pricing, a pricing mechanism that can make the system robust to decision making and improve radio resource management. We present analytical results as well as preliminary human subject studies with video QoS.
△ Less
Submitted 3 October, 2015;
originally announced October 2015.
-
Load Shifting in the Smart Grid: To Participate or Not?
Authors:
Yunpeng Wang,
Walid Saad,
Narayan B. Mandayam,
H. Vincent Poor
Abstract:
Demand-side management (DSM) has emerged as an important smart grid feature that allows utility companies to maintain desirable grid loads. However, the success of DSM is contingent on active customer participation. Indeed, most existing DSM studies are based on game-theoretic models that assume customers will act rationally and will voluntarily participate in DSM. In contrast, in this paper, the…
▽ More
Demand-side management (DSM) has emerged as an important smart grid feature that allows utility companies to maintain desirable grid loads. However, the success of DSM is contingent on active customer participation. Indeed, most existing DSM studies are based on game-theoretic models that assume customers will act rationally and will voluntarily participate in DSM. In contrast, in this paper, the impact of customers' subjective behavior on each other's DSM decisions is explicitly accounted for. In particular, a noncooperative game is formulated between grid customers in which each customer can decide on whether to participate in DSM or not. In this game, customers seek to minimize a cost function that reflects their total payment for electricity. Unlike classical game-theoretic DSM studies which assume that customers are rational in their decision-making, a novel approach is proposed, based on the framework of prospect theory (PT), to explicitly incorporate the impact of customer behavior on DSM decisions. To solve the proposed game under both conventional game theory and PT, a new algorithm based on fictitious player is proposed using which the game will reach an epsilon-mixed Nash equilibrium. Simulation results assess the impact of customer behavior on demand-side management. In particular, the overall participation level and grid load can depend significantly on the rationality level of the players and their risk aversion tendency.
△ Less
Submitted 26 September, 2015;
originally announced September 2015.
-
Opportunistic Spectrum Allocation for Max-Min Rate in NC-OFDMA
Authors:
Ratnesh Kumbhkar,
Tejashri Kuber,
Narayan B. Mandayam,
Ivan Seskar
Abstract:
We envision a scenario of opportunistic spectrum access among multiple links when the available spectrum is not contiguous due to the presence of external interference sources. Non-contiguous Orthogonal Frequency Division Multiplexing (NC-OFDM) is a promising technique to utilize such disjoint frequency bands in an efficient manner. In this paper we study the problem of fair spectrum allocation ac…
▽ More
We envision a scenario of opportunistic spectrum access among multiple links when the available spectrum is not contiguous due to the presence of external interference sources. Non-contiguous Orthogonal Frequency Division Multiplexing (NC-OFDM) is a promising technique to utilize such disjoint frequency bands in an efficient manner. In this paper we study the problem of fair spectrum allocation across multiple NCOFDM-enabled point-to-point cognitive radio links under certain practical considerations that arise from such non-contiguous access. When using NC-OFDMA, the channels allocated to a cognitive link are spread across several disjoint frequency bands leading to a large spectral span for that link. Increased spectral span requires higher sampling rates, leading to increased power consumption in the ADC/DAC of the transmit/receive nodes. In this context, this paper proposes a spectrum allocation that maximizes the minimum rate achieved by the cognitive radio links, under a constraint on the maximum permissible spectral span. Under constant transmit powers and orthogonal spectrum allocation, such an optimization is a mixed-integer linear program and can be solved efficiently. There exists a clear trade-off between the max-min rate achieved and the maximum permissible spectral span. The spectral allocation obtained from the proposed optimization framework is shown to be close to the tradeoff boundary, thus showing the effectiveness of the proposed technique. We find that it is possible to limit the spectrum span without incurring a significant penalty on the max-min rate under different interference environments. We also discuss an experimental evaluation of the techniques developed here using the Universal Software Radio Peripheral (USRP) enabled ORBIT radio network testbed.
△ Less
Submitted 3 May, 2015;
originally announced May 2015.
-
Optimal Radiometric Calibration for Camera-Display Communication
Authors:
Wenjia Yuan,
Eric Wengrowski,
Kristin J. Dana,
Ashwin Ashok,
Marco Gruteser,
Narayan Mandayam
Abstract:
We present a novel method for communicating between a camera and display by embedding and recovering hidden and dynamic information within a displayed image. A handheld camera pointed at the display can receive not only the display image, but also the underlying message. These active scenes are fundamentally different from traditional passive scenes like QR codes because image formation is based o…
▽ More
We present a novel method for communicating between a camera and display by embedding and recovering hidden and dynamic information within a displayed image. A handheld camera pointed at the display can receive not only the display image, but also the underlying message. These active scenes are fundamentally different from traditional passive scenes like QR codes because image formation is based on display emittance, not surface reflectance. Detecting and decoding the message requires careful photometric modeling for computational message recovery. Unlike standard watermarking and steganography methods that lie outside the domain of computer vision, our message recovery algorithm uses illumination to optically communicate hidden messages in real world scenes. The key innovation of our approach is an algorithm that performs simultaneous radiometric calibration and message recovery in one convex optimization problem. By modeling the photometry of the system using a camera-display transfer function (CDTF), we derive a physics-based kernel function for support vector machine classification. We demonstrate that our method of optimal online radiometric calibration (OORC) leads to an efficient and robust algorithm for computational messaging between nine commercial cameras and displays.
△ Less
Submitted 8 January, 2015;
originally announced January 2015.
-
HetNetwork Coding: Scaling Throughput in Heterogeneous Networks using Multiple Radio Interfaces
Authors:
Ratnesh Kumbhkar,
Narayan Mandayam,
Ivan Seskar
Abstract:
The explosive demand for data has called for solution approaches that range from spectrally agile cognitive radios with novel spectrum sharing, to use of higher frequency spectrum as well as smaller and denser cell deployments with diverse access technologies, referred to as heterogeneous networks (HetNets). Simultaneously, advances in electronics and storage, has led to the advent of wireless dev…
▽ More
The explosive demand for data has called for solution approaches that range from spectrally agile cognitive radios with novel spectrum sharing, to use of higher frequency spectrum as well as smaller and denser cell deployments with diverse access technologies, referred to as heterogeneous networks (HetNets). Simultaneously, advances in electronics and storage, has led to the advent of wireless devices equipped with multiple radio interfaces (e.g. WiFi, WiMAX, LTE, etc.) and the ability to store and efficiently process large amounts of data. Motivated by the convergence of HetNets and multi-platform radios, we propose HetNetwork Coding as a means to utilize the available radio interfaces in parallel along with network coding to increase wireless data throughput. Specifically we explore the use of random linear network coding at the network layer where packets can travel through multiple interfaces and be received via multihoming. Using both simulations and experimentation with real hardware on WiFi and WiMAX platforms, we study the scaling of throughput enabled by such HetNetwork coding. We find from our simulations and experiments that the use of this method increases the throughput, with greater gains achieved for cases when the system is heavily loaded or the channel quality is poor. Our results also reveal that the throughput gains achieved scale linearly with the number of radio interfaces at the nodes.
△ Less
Submitted 11 November, 2014;
originally announced November 2014.
-
Evaluating Opportunistic Delivery of Large Content with TCP over WiFi in I2V Communication
Authors:
Shreyasee Mukherjee,
Kai Su,
Narayan B. Mandayam,
K. K. Ramakrishnan,
Dipankar Raychaudhuri,
Ivan Seskar
Abstract:
With the increasing interest in connected vehicles, it is useful to evaluate the capability of delivering large content over a WiFi infrastructure to vehicles. The throughput achieved over WiFi channels can be highly variable and also rapidly degrades as the distance from the access point increases. While this behavior is well understood at the data link layer, the interactions across the various…
▽ More
With the increasing interest in connected vehicles, it is useful to evaluate the capability of delivering large content over a WiFi infrastructure to vehicles. The throughput achieved over WiFi channels can be highly variable and also rapidly degrades as the distance from the access point increases. While this behavior is well understood at the data link layer, the interactions across the various protocol layers (data link and up through the transport layer) and the effect of mobility may reduce the amount of content transferred to the vehicle, as it travels along the roadway.
This paper examines the throughput achieved at the TCP layer over a carefully designed outdoor WiFi environment and the interactions across the layers that impact the performance achieved, as a function of the receiver mobility. The experimental studies conducted reveal that impairments over the WiFi link (frame loss, ARQ and increased delay) and the residual loss seen by TCP causes a cascade of duplicate ACKs to be generated. This triggers large congestion window reductions at the sender, leading to a drastic degradation of throughput to the vehicular client. To ensure outdoor WiFi infrastructures have the potential to sustain reasonable downlink throughput for drive-by vehicles, we speculate that there is a need to adapt how WiFi and TCP (as well as mobility protocols) function for such vehicular applications.
△ Less
Submitted 9 October, 2014;
originally announced October 2014.
-
Rate Optimal design of a Wireless Backhaul Network using TV White Space
Authors:
Ratnesh Kumbhkar,
Muhammad Nazmul Islam,
Narayan B. Mandayam,
Ivan Seskar
Abstract:
The penetration of wireless broadband services in remote areas has primarily been limited due to the lack of economic incentives that service providers encounter in sparsely populated areas. Besides, wireless backhaul links like satellite and microwave are either expensive or require strict line of sight communication making them unattractive. TV white space channels with their desirable radio pro…
▽ More
The penetration of wireless broadband services in remote areas has primarily been limited due to the lack of economic incentives that service providers encounter in sparsely populated areas. Besides, wireless backhaul links like satellite and microwave are either expensive or require strict line of sight communication making them unattractive. TV white space channels with their desirable radio propagation characteristics can provide an excellent alternative for engineering backhaul networks in areas that lack abundant infrastructure. Specifically, TV white space channels can provide "free wireless backhaul pipes" to transport aggregated traffic from broadband sources to fiber access points. In this paper, we investigate the feasibility of multi-hop wireless backhaul in the available white space channels by using noncontiguous Orthogonal Frequency Division Multiple Access (NC-OFDMA) transmissions between fixed backhaul towers. Specifically, we consider joint power control, scheduling and routing strategies to maximize the minimum rate across broadband towers in the network. Depending on the population density and traffic demands of the location under consideration, we discuss the suitable choice of cell size for the backhaul network. Using the example of available TV white space channels in Wichita, Kansas (a small city located in central USA), we provide illustrative numerical examples for designing such wireless backhaul network.
△ Less
Submitted 5 May, 2015; v1 submitted 5 September, 2014;
originally announced September 2014.
-
Power Optimal Non-contiguous Spectrum Access in Multi Front End Radio Enabled Point-to-Point Link
Authors:
Muhammad Nazmul Islam,
Narayan B. Mandayam,
Sastry Kompella,
Ivan Seskar
Abstract:
Non-contiguous spectrum chunks allow wireless links to flexibly access a wide amount of bandwidth. Multi- Channel Multi-Radio (MC-MR) and Non-Contiguous Orthogonal Frequency Division Multiplexing (NC-OFDM) are the two commercially viable strategies to access non-contiguous spectrum chunks. MC-MR accesses multiple non-contiguous chunks by activating multiple front ends which, in turn, increases the…
▽ More
Non-contiguous spectrum chunks allow wireless links to flexibly access a wide amount of bandwidth. Multi- Channel Multi-Radio (MC-MR) and Non-Contiguous Orthogonal Frequency Division Multiplexing (NC-OFDM) are the two commercially viable strategies to access non-contiguous spectrum chunks. MC-MR accesses multiple non-contiguous chunks by activating multiple front ends which, in turn, increases the circuit power consumption of each of the activated front ends. NC-OFDM accesses non-contiguous spectrum chunks with a single front end by nulling remaining subchannels but increases spectrum span which, in turn, increases the power consumption of ADC and DAC. This work focuses on a point-to-point link where transmitter and receiver have multiple front ends and can employ NC-OFDM technology. We investigate optimal spectrum fragmentation in each front end from a system power (summation of transmit power and circuit power) perspective. We formulate a mixed integer non-linear program (MINLP) to perform power control and scheduling, and minimize system power by providing a greedy algorithm (O(M^3 I)) where M and I denote the number of channels and radio front ends respectively.
△ Less
Submitted 4 September, 2014;
originally announced September 2014.
-
Wireless Backhaul Node Placement for Small Cell Networks
Authors:
Muhammad Nazmul Islam,
Ashwin Sampath,
Atul Maharshi,
Ozge Koymen,
Narayan B. Mandayam
Abstract:
Small cells have been proposed as a vehicle for wireless networks to keep up with surging demand. Small cells come with a significant challenge of providing backhaul to transport data to(from) a gateway node in the core network. Fiber based backhaul offers the high rates needed to meet this requirement, but is costly and time-consuming to deploy, when not readily available. Wireless backhaul is an…
▽ More
Small cells have been proposed as a vehicle for wireless networks to keep up with surging demand. Small cells come with a significant challenge of providing backhaul to transport data to(from) a gateway node in the core network. Fiber based backhaul offers the high rates needed to meet this requirement, but is costly and time-consuming to deploy, when not readily available. Wireless backhaul is an attractive option for small cells as it provides a less expensive and easy-to-deploy alternative to fiber. However, there are multitude of bands and features (e.g. LOS/NLOS, spatial multiplexing etc.) associated with wireless backhaul that need to be used intelligently for small cells. Candidate bands include: sub-6 GHz band that is useful in non-line-of-sight (NLOS) scenarios, microwave band (6-42 GHz) that is useful in point-to-point line-of-sight (LOS) scenarios, and millimeter wave bands (e.g. 60, 70 and 80 GHz) that are recently being commercially used in LOS scenarios. In many deployment topologies, it is advantageous to use aggregator nodes, located at the roof tops of tall buildings near small cells. These nodes can provide high data rate to multiple small cells in NLOS paths, sustain the same data rate to gateway nodes using LOS paths and take advantage of all available bands. This work performs the joint cost optimal aggregator node placement, power allocation, channel scheduling and routing to optimize the wireless backhaul network. We formulate mixed integer nonlinear programs (MINLP) to capture the different interference and multiplexing patterns at sub-6 GHz and microwave band. We solve the MINLP through linear relaxation and branch-and-bound algorithm and apply our algorithm in an example wireless backhaul network of downtown Manhattan.
△ Less
Submitted 9 April, 2014;
originally announced April 2014.
-
Integrating Energy Storage into the Smart Grid: A Prospect Theoretic Approach
Authors:
Yunpeng Wang,
Walid Saad,
Narayan B. Mandayam,
H. Vincent Poor
Abstract:
In this paper, the interactions and energy exchange decisions of a number of geographically distributed storage units are studied under decision-making involving end-users. In particular, a noncooperative game is formulated between customer-owned storage units where each storage unit's owner can decide on whether to charge or discharge energy with a given probability so as to maximize a utility th…
▽ More
In this paper, the interactions and energy exchange decisions of a number of geographically distributed storage units are studied under decision-making involving end-users. In particular, a noncooperative game is formulated between customer-owned storage units where each storage unit's owner can decide on whether to charge or discharge energy with a given probability so as to maximize a utility that reflects the tradeoff between the monetary transactions from charging/discharging and the penalty from power regulation. Unlike existing game-theoretic works which assume that players make their decisions rationally and objectively, we use the new framework of prospect theory (PT) to explicitly incorporate the users' subjective perceptions of their expected utilities. For the two-player game, we show the existence of a proper mixed Nash equilibrium for both the standard game-theoretic case and the case with PT considerations. Simulation results show that incorporating user behavior via PT reveals several important insights into load management as well as economics of energy storage usage. For instance, the results show that deviations from conventional game theory, as predicted by PT, can lead to undesirable grid loads and revenues thus requiring the power company to revisit its pricing schemes and the customers to reassess their energy storage usage choices.
△ Less
Submitted 5 March, 2014;
originally announced March 2014.
-
A Game Theoretic Analysis of Collaboration in Wikipedia
Authors:
S. Anand,
Ofer Arazy,
Narayan Mandayam,
Oded Nov
Abstract:
Peer production projects such as Wikipedia or open-source software development allow volunteers to collectively create knowledge based products. The inclusive nature of such projects poses difficult challenges for ensuring trustworthiness and combating vandalism. Prior studies in the area deal with descriptive aspects of peer production, failing to capture the idea that while contributors collabor…
▽ More
Peer production projects such as Wikipedia or open-source software development allow volunteers to collectively create knowledge based products. The inclusive nature of such projects poses difficult challenges for ensuring trustworthiness and combating vandalism. Prior studies in the area deal with descriptive aspects of peer production, failing to capture the idea that while contributors collaborate, they also compete for status in the community and for imposing their views on the product. In this paper we investigate collaborative authoring in Wikipedia where contributors append and overwrite previous contributions to a page. We assume that a contributors goal is to maximize ownership of content sections such that content owned (or originated) by her survived the most recent revision of the page. We model contributors interactions to increase their content ownership as a noncooperative game where a players utility is associated with content owned and cost is a function of effort expended. Our results capture several real life aspects of contributors interactions within peer production projects. We show that at the Nash equilibrium there is an inverse relationship between the effort required to make a contribution and the survival of a contributors content. In other words majority of the content that survives is necessarily contributed by experts who expend relatively less effort than non experts. An empirical analysis of Wikipedia articles provides support for our models predictions. Implications for research and practice are discussed in the context of trustworthy collaboration as well as vandalism.
△ Less
Submitted 4 February, 2014;
originally announced February 2014.
-
System Power Minimization to Access Non-Contiguous Spectrum in Cognitive Radio Networks
Authors:
Muhammad Nazmul Islam,
Narayan B. Mandayam,
Sastry Kompella,
Ivan Seskar
Abstract:
Wireless transmission using non-contiguous chunks of spectrum is becoming increasingly important due to a variety of scenarios such as: secondary users avoiding incumbent users in TV white space; anticipated spectrum sharing between commercial and military systems; and spectrum sharing among uncoordinated interferers in unlicensed bands. Multi-Channel Multi-Radio (MCMR) platforms and Non-Contiguou…
▽ More
Wireless transmission using non-contiguous chunks of spectrum is becoming increasingly important due to a variety of scenarios such as: secondary users avoiding incumbent users in TV white space; anticipated spectrum sharing between commercial and military systems; and spectrum sharing among uncoordinated interferers in unlicensed bands. Multi-Channel Multi-Radio (MCMR) platforms and Non-Contiguous Orthogonal Frequency Division Multiple Access (NC-OFDMA) technology are the two commercially viable transmission choices to access these non-contiguous spectrum chunks. Fixed MC-MRs do not scale with increasing number of non-contiguous spectrum chunks due to their fixed set of supporting radio front ends. NC-OFDMA allows nodes to access these non-contiguous spectrum chunks and put null sub-carriers in the remaining chunks. However, nulling sub-carriers increases the sampling rate (spectrum span) which, in turn, increases the power consumption of radio front ends. Our work characterizes this trade-off from a cross-layer perspective, specifically by showing how the slope of ADC/DAC power consumption versus sampling rate curve influences scheduling decisions in a multi-hop network. Specifically, we provide a branch and bound algorithm based mixed integer linear programming solution that performs joint power control, spectrum span selection, scheduling and routing in order to minimize the system power of multi-hop NC-OFDMA networks. We also provide a low complexity (O(E^2 M^2)) greedy algorithm where M and E denote the number of channels and links respectively. Numerical simulations suggest that our approach reduces system power by 30% over classical transmit power minimization based cross-layer algorithms.
△ Less
Submitted 14 February, 2016; v1 submitted 3 September, 2013;
originally announced September 2013.
-
Uplink Linear Receivers for Multi-cell Multiuser MIMO with Pilot Contamination: Large System Analysis
Authors:
Narayanan Krishnan,
Roy D. Yates,
Narayan B. Mandayam
Abstract:
Base stations with a large number of transmit antennas have the potential to serve a large number of users at high rates. However, the receiver processing in the uplink relies on channel estimates which are known to suffer from pilot interference. In this work, making use of the similarity of the uplink received signal in CDMA with that of a multi-cell multi-antenna system, we perform a large syst…
▽ More
Base stations with a large number of transmit antennas have the potential to serve a large number of users at high rates. However, the receiver processing in the uplink relies on channel estimates which are known to suffer from pilot interference. In this work, making use of the similarity of the uplink received signal in CDMA with that of a multi-cell multi-antenna system, we perform a large system analysis when the receiver employs an MMSE filter with a pilot contaminated estimate. We assume a Rayleigh fading channel with different received powers from users. We find the asymptotic Signal to Interference plus Noise Ratio (SINR) as the number of antennas and number of users per base station grow large while maintaining a fixed ratio. Through the SINR expression we explore the scenario where the number of users being served are comparable to the number of antennas at the base station. The SINR explicitly captures the effect of pilot contamination and is found to be the same as that employing a matched filter with a pilot contaminated estimate. We also find the exact expression for the interference suppression obtained using an MMSE filter which is an important factor when there are significant number of users in the system as compared to the number of antennas. In a typical set up, in terms of the five percentile SINR, the MMSE filter is shown to provide significant gains over matched filtering and is within 5 dB of MMSE filter with perfect channel estimate. Simulation results for achievable rates are close to large system limits for even a 10-antenna base station with 3 or more users per cell.
△ Less
Submitted 14 April, 2014; v1 submitted 16 July, 2013;
originally announced July 2013.
-
Dynamic Radio Resource Management for Random Network Coding: Power Control and CSMA Backoff Control
Authors:
Kai Su,
Dan Zhang,
Narayan B. Mandayam
Abstract:
Resource allocation in wireless networks typically occurs at PHY/MAC layers, while random network coding (RNC) is a network layer strategy. An interesting question is how resource allocation mechanisms can be tuned to improve RNC performance. By means of a differential equation framework which models RNC throughput in terms of lower layer parameters, we propose a gradient based approach that can d…
▽ More
Resource allocation in wireless networks typically occurs at PHY/MAC layers, while random network coding (RNC) is a network layer strategy. An interesting question is how resource allocation mechanisms can be tuned to improve RNC performance. By means of a differential equation framework which models RNC throughput in terms of lower layer parameters, we propose a gradient based approach that can dynamically allocate MAC and PHY layer resources with the goal of maximizing the minimum network coding throughput among all the destination nodes in a RNC multicast. We exemplify this general approach with two resource allocation problems: (i) power control to improve network coding throughput, and (ii) CSMA mean backoff delay control to improve network coding throughput. We design both centralized algorithms and online algorithms for power control and CSMA backoff control. Our evaluations, including numerically solving the differential equations in the centralized algorithm and an event-driven simulation for the online algorithm, show that such gradient based dynamic resource allocation yields significant throughput improvement of the destination nodes in RNC. Further, our numerical results reveal that network coding aware power control can regain the broadcast advantage of wireless transmissions to improve the throughput.
△ Less
Submitted 26 March, 2013;
originally announced March 2013.
-
Cellular Systems with Many Antennas: Large System Analysis under Pilot Contamination
Authors:
Narayanan Krishnan,
Roy D. Yates,
Narayan B. Mandayam
Abstract:
Base stations with a large number of transmit antennas have the potential to serve a large number of users simultaneously at higher rates. They also promise a lower power consumption due to coherent combining at the receiver. However, the receiver processing in the uplink relies on the channel estimates which are known to suffer from pilot interference. In this work, we perform an uplink large sys…
▽ More
Base stations with a large number of transmit antennas have the potential to serve a large number of users simultaneously at higher rates. They also promise a lower power consumption due to coherent combining at the receiver. However, the receiver processing in the uplink relies on the channel estimates which are known to suffer from pilot interference. In this work, we perform an uplink large system analysis of multi-cell multi-antenna system when the receiver employs a matched filtering with a pilot contaminated estimate. We find the asymptotic Signal to Interference plus Noise Ratio (SINR) as the number of antennas and number of users per base station grow large while maintaining a fixed ratio. To do this, we make use of the similarity of the uplink received signal in a multi-antenna system to the representation of the received signal in CDMA systems. The asymptotic SINR expression explicitly captures the effect of pilot contamination and that of interference averaging. This also explains the SINR performance of receiver processing schemes at different regimes such as instances when the number of antennas are comparable to number of users as well as when antennas exceed greatly the number of users. Finally, we also propose that the adaptive MMSE symbol detection scheme, which does not require the explicit channel knowledge, can be employed for cellular systems with large number of antennas.
△ Less
Submitted 5 January, 2013;
originally announced January 2013.
-
Implementation of Distributed Time Exchange Based Cooperative Forwarding
Authors:
Muhammad Nazmul Islam,
Shantharam Balasubramanian,
Narayan B. Mandayam,
Ivan Seskar,
Sastry Kompella
Abstract:
In this paper, we design and implement time exchange (TE) based cooperative forwarding where nodes use transmission time slots as incentives for relaying. We focus on distributed joint time slot exchange and relay selection in the sum goodput maximization of the overall network. We formulate the design objective as a mixed integer nonlinear programming (MINLP) problem and provide a polynomial time…
▽ More
In this paper, we design and implement time exchange (TE) based cooperative forwarding where nodes use transmission time slots as incentives for relaying. We focus on distributed joint time slot exchange and relay selection in the sum goodput maximization of the overall network. We formulate the design objective as a mixed integer nonlinear programming (MINLP) problem and provide a polynomial time distributed solution of the MINLP. We implement the designed algorithm in the software defined radio enabled USRP nodes of the ORBIT indoor wireless testbed. The ORBIT grid is used as a global control plane for exchange of control information between the USRP nodes. Experimental results suggest that TE can significantly increase the sum goodput of the network. We also demonstrate the performance of a goodput optimization algorithm that is proportionally fair.
△ Less
Submitted 19 October, 2012;
originally announced October 2012.
-
Optimal Resource Allocation and Relay Selection in Bandwidth Exchange Based Cooperative Forwarding
Authors:
Muhammad Nazmul Islam,
Narayan Mandayam,
Sastry Kompella
Abstract:
In this paper, we investigate joint optimal relay selection and resource allocation under bandwidth exchange (BE) enabled incentivized cooperative forwarding in wireless networks. We consider an autonomous network where N nodes transmit data in the uplink to an access point (AP) / base station (BS). We consider the scenario where each node gets an initial amount (equal, optimal based on direct pat…
▽ More
In this paper, we investigate joint optimal relay selection and resource allocation under bandwidth exchange (BE) enabled incentivized cooperative forwarding in wireless networks. We consider an autonomous network where N nodes transmit data in the uplink to an access point (AP) / base station (BS). We consider the scenario where each node gets an initial amount (equal, optimal based on direct path or arbitrary) of bandwidth, and uses this bandwidth as a flexible incentive for two hop relaying. We focus on alpha-fair network utility maximization (NUM) and outage reduction in this environment. Our contribution is two-fold. First, we propose an incentivized forwarding based resource allocation algorithm which maximizes the global utility while preserving the initial utility of each cooperative node. Second, defining the link weight of each relay pair as the utility gain due to cooperation (over noncooperation), we show that the optimal relay selection in alpha-fair NUM reduces to the maximum weighted matching (MWM) problem in a non-bipartite graph. Numerical results show that the proposed algorithms provide 20- 25% gain in spectral efficiency and 90-98% reduction in outage probability.
△ Less
Submitted 13 October, 2012; v1 submitted 24 December, 2011;
originally announced December 2011.
-
Analyzing Random Network Coding with Differential Equations and Differential Inclusions
Authors:
Dan Zhang,
Narayan B. Mandayam
Abstract:
We develop a framework based on differential equations (DE) and differential inclusions (DI) for analyzing Random Network Coding (RNC), as well as a nonlinear variant referred to as Random Coupon (RC), in a wireless network. The DEDI framework serves as a powerful numerical and analytical tool to study RNC. We demonstrate its versatility by proving theoretical results on multicast information flow…
▽ More
We develop a framework based on differential equations (DE) and differential inclusions (DI) for analyzing Random Network Coding (RNC), as well as a nonlinear variant referred to as Random Coupon (RC), in a wireless network. The DEDI framework serves as a powerful numerical and analytical tool to study RNC. We demonstrate its versatility by proving theoretical results on multicast information flows in a wireless network using RNC or RC. We also demonstrate the accuracy and flexibility of the performance analysis enabled by this framework via illustrative examples of networks with multiple multicast sessions, user cooperation and arbitrary topologies.
△ Less
Submitted 7 January, 2012; v1 submitted 28 April, 2010;
originally announced April 2010.
-
Information-theoretically Secret Key Generation for Fading Wireless Channels
Authors:
Chunxuan Ye,
Suhas Mathur,
Alex Reznik,
Yogendra Shah,
Wade Trappe,
Narayan Mandayam
Abstract:
The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, and uniquely shared by a given transmitter-receiver pair. The complexity associated with a richly scattering environment implies that the short-term fading process is inherently hard to predict and best modeled stochastic…
▽ More
The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, and uniquely shared by a given transmitter-receiver pair. The complexity associated with a richly scattering environment implies that the short-term fading process is inherently hard to predict and best modeled stochastically, with rapid decorrelation properties in space, time and frequency. In this paper, we demonstrate how the channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities. We begin by presenting a scheme based on level crossings of the fading process, which is well-suited for the Rayleigh and Rician fading models associated with a richly scattering environment. Our level crossing algorithm is simple, and incorporates a self-authenticating mechanism to prevent adversarial manipulation of message exchanges during the protocol. Since the level crossing algorithm is best suited for fading processes that exhibit symmetry in their underlying distribution, we present a second and more powerful approach that is suited for more general channel state distributions. This second approach is motivated by observations from quantizing jointly Gaussian processes, but exploits empirical measurements to set quantization boundaries and a heuristic log likelihood ratio estimate to achieve an improved secret key generation rate. We validate both proposed protocols through experimentations using a customized 802.11a platform, and show for the typical WiFi channel that reliable secret key establishment can be accomplished at rates on the order of 10 bits/second.
△ Less
Submitted 26 October, 2009;
originally announced October 2009.