-
Preserving the beamforming effect for spatial cue-based pseudo-binaural dereverberation of a single source
Authors:
Sania Gul,
Muhammad Salman Khan,
Syed Waqar Shah
Abstract:
Reverberations are unavoidable in enclosures, resulting in reduced intelligibility for hearing impaired and non native listeners and even for the normal hearing listeners in noisy circumstances. It also degrades the performance of machine listening applications. In this paper, we propose a novel approach of binaural dereverberation of a single speech source, using the differences in the interaural…
▽ More
Reverberations are unavoidable in enclosures, resulting in reduced intelligibility for hearing impaired and non native listeners and even for the normal hearing listeners in noisy circumstances. It also degrades the performance of machine listening applications. In this paper, we propose a novel approach of binaural dereverberation of a single speech source, using the differences in the interaural cues of the direct path signal and the reverberations. Two beamformers, spaced at an interaural distance, are used to extract the reverberations from the reverberant speech. The interaural cues generated by these reverberations and those generated by the direct path signal act as a two class dataset, used for the training of U-Net (a deep convolutional neural network). After its training, the beamformers are removed and the trained U-Net along with the maximum likelihood estimation (MLE) algorithm is used to discriminate between the direct path cues from the reverberation cues, when the system is exposed to the interaural spectrogram of the reverberant speech signal. Our proposed model has outperformed the classical signal processing dereverberation model weighted prediction error in terms of cepstral distance (CEP), frequency weighted segmental signal to noise ratio (FWSEGSNR) and signal to reverberation modulation energy ratio (SRMR) by 1.4 points, 8 dB and 0.6dB. It has achieved better performance than the deep learning based dereverberation model by gaining 1.3 points improvement in CEP with comparable FWSEGSNR, using training dataset which is almost 8 times smaller than required for that model. The proposed model also sustained its performance under relatively similar unseen acoustic conditions and at positions in the vicinity of its training position.
△ Less
Submitted 10 August, 2022;
originally announced August 2022.
-
Recycling an anechoic pre-trained speech separation deep neural network for binaural dereverberation of a single source
Authors:
Sania Gul,
Muhammad Salman Khan,
Syed Waqar Shah,
Ata Ur-Rehman
Abstract:
Reverberation results in reduced intelligibility for both normal and hearing-impaired listeners. This paper presents a novel psychoacoustic approach of dereverberation of a single speech source by recycling a pre-trained binaural anechoic speech separation neural network. As training the deep neural network (DNN) is a lengthy and computationally expensive process, the advantage of using a pre-trai…
▽ More
Reverberation results in reduced intelligibility for both normal and hearing-impaired listeners. This paper presents a novel psychoacoustic approach of dereverberation of a single speech source by recycling a pre-trained binaural anechoic speech separation neural network. As training the deep neural network (DNN) is a lengthy and computationally expensive process, the advantage of using a pre-trained separation network for dereverberation is that the network does not need to be retrained, saving both time and computational resources. The interaural cues of a reverberant source are given to this pretrained neural network to discriminate between the direct path signal and the reverberant speech. The results show an average improvement of 1.3% in signal intelligibility, 0.83 dB in SRMR (signal to reverberation energy ratio) and 0.16 points in perceptual evaluation of speech quality (PESQ) over other state-of-the-art signal processing dereverberation algorithms and 14% in intelligibility and 0.35 points in quality over orthogonal matching pursuit with spectral subtraction (OSS), a machine learning based dereverberation algorithm.
△ Less
Submitted 9 August, 2022;
originally announced August 2022.
-
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism
Authors:
Mohammad Reza Nosouhi,
Syed W. Shah,
Lei Pan,
Yevhen Zolotavkin,
Ashish Nanda,
Praveen Gauravaram,
Robin Doss
Abstract:
The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National Institute of Standards and Technology (NIST) is currently undertaking the Post-Quantum Cryptography (PQC) standardization project intending to evaluate and subsequently standardize the suitable PQC scheme(s). One such attractive approach, call…
▽ More
The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National Institute of Standards and Technology (NIST) is currently undertaking the Post-Quantum Cryptography (PQC) standardization project intending to evaluate and subsequently standardize the suitable PQC scheme(s). One such attractive approach, called Bit Flip** Key Encapsulation (BIKE), has made to the final round of the competition. Despite having some attractive features, the IND-CCA security of the BIKE depends on the average decoder failure rate (DFR), a higher value of which can facilitate a particular type of side-channel attack. Although the BIKE adopts a Black-Grey-Flip (BGF) decoder that offers a negligible DFR, the effect of weak-keys on the average DFR has not been fully investigated. Therefore, in this paper, we first perform an implementation of the BIKE scheme, and then through extensive experiments show that the weak-keys can be a potential threat to IND-CCA security of the BIKE scheme and thus need attention from the research community prior to standardization. We also propose a key-check algorithm that can potentially supplement the BIKE mechanism and prevent users from generating and adopting weak keys to address this issue.
△ Less
Submitted 13 July, 2022; v1 submitted 29 April, 2022;
originally announced April 2022.
-
Statistical QoS Analysis of Reconfigurable Intelligent Surface-assisted D2D Communication
Authors:
Syed Waqas Haider Shah,
Adnan Noor Mian,
Shahid Mumtaz,
Anwer Al-Dulaimi,
Chih-Lin I,
Jon Crowcroft
Abstract:
This work performs the statistical QoS analysis of a Rician block-fading reconfigurable intelligent surface (RIS)-assisted D2D link in which the transmit node operates under delay QoS constraints. First, we perform mode selection for the D2D link, in which the D2D pair can either communicate directly by relaying data from RISs or through a base station (BS). Next, we provide closed-form expression…
▽ More
This work performs the statistical QoS analysis of a Rician block-fading reconfigurable intelligent surface (RIS)-assisted D2D link in which the transmit node operates under delay QoS constraints. First, we perform mode selection for the D2D link, in which the D2D pair can either communicate directly by relaying data from RISs or through a base station (BS). Next, we provide closed-form expressions for the effective capacity (EC) of the RIS-assisted D2D link. When channel state information at the transmitter (CSIT) is available, the transmit D2D node communicates with the variable rate $r_t(n)$ (adjustable according to the channel conditions); otherwise, it uses a fixed rate $r_t$. It allows us to model the RIS-assisted D2D link as a Markov system in both cases. We also extend our analysis to overlay and underlay D2D settings. To improve the throughput of the RIS-assisted D2D link when CSIT is unknown, we use the HARQ retransmission scheme and provide the EC analysis of the HARQ-enabled RIS-assisted D2D link. Finally, simulation results demonstrate that: i) the EC increases with an increase in RIS elements, ii) the EC decreases when strict QoS constraints are imposed at the transmit node, iii) the EC decreases with an increase in the variance of the path loss estimation error, iv) the EC increases with an increase in the probability of ON states, v) EC increases by using HARQ when CSIT is unknown, and it can reach up to $5\times$ the usual EC (with no HARQ and without CSIT) by using the optimal number of retransmissions.
△ Less
Submitted 7 April, 2022;
originally announced April 2022.
-
Effective Capacity Analysis of HARQ-enabled D2D Communication in Multi-Tier Cellular Networks
Authors:
Syed Waqas Haider Shah,
Muhammad Mahboob-ur-Rahman,
Adnan Noor Mian,
Octavia A. Dobre,
Jon Crowcroft
Abstract:
This work does the statistical quality-of-service (QoS) analysis of a block-fading device-to-device (D2D) link in a multi-tier cellular network that consists of a macro-BS (BSMC) and a micro-BS (BSmC) which both operate in full-duplex (FD) mode. For the D2D link under consideration, we first formulate the mode selection problem-whereby D2D pair could either communicate directly, or, through the BS…
▽ More
This work does the statistical quality-of-service (QoS) analysis of a block-fading device-to-device (D2D) link in a multi-tier cellular network that consists of a macro-BS (BSMC) and a micro-BS (BSmC) which both operate in full-duplex (FD) mode. For the D2D link under consideration, we first formulate the mode selection problem-whereby D2D pair could either communicate directly, or, through the BSmC, or, through the BSMC-as a ternary hypothesis testing problem. Next, to compute the effective capacity (EC) for the given D2D link, we assume that the channel state information (CSI) is not available at the transmit D2D node, and hence, it transmits at a fixed rate r with a fixed power. This allows us to model the D2D link as a Markov system with six-states. We consider both overlay and underlay modes for the D2D link. Moreover, to improve the throughput of the D2D link, we assume that the D2D pair utilizes two special automatic repeat request (ARQ) schemes, i.e., Hybrid-ARQ (HARQ) and truncated HARQ. Furthermore, we consider two distinct queue models at the transmit D2D node, based upon how it responds to the decoding failure at the receive D2D node. Eventually, we provide closed-form expressions for the EC for both HARQ-enabled D2D link and truncated HARQ-enabled D2D link, under both queue models. Noting that the EC looks like a quasi-concave function of r, we further maximize the EC by searching for an optimal rate via the gradient-descent method. Simulation results provide us the following insights: i) EC decreases with an increase in the QoS exponent, ii) EC of the D2D link improves when HARQ is employed, iii) EC increases with an increase in the quality of self-interference cancellation techniques used at BSmC and BSMC in FD mode.
△ Less
Submitted 26 July, 2021;
originally announced July 2021.
-
Protocol Stack Perspective For Low Latency and Massive Connectivity in Future Cellular Networks
Authors:
Syed Waqas Haider Shah,
Adnan Noor Mian,
Shahid Mumtaz,
Miaowen Wen,
T. Hong,
Michel Kadoch
Abstract:
With the emergence of Internet-of-Things (IoT) and ever-increasing demand for the newly connected devices, there is a need for more effective storage and processing paradigms to cope with the data generated from these devices. In this study, we have discussed different paradigms for data processing and storage including Cloud, Fog, and Edge computing models and their suitability in integrating wit…
▽ More
With the emergence of Internet-of-Things (IoT) and ever-increasing demand for the newly connected devices, there is a need for more effective storage and processing paradigms to cope with the data generated from these devices. In this study, we have discussed different paradigms for data processing and storage including Cloud, Fog, and Edge computing models and their suitability in integrating with the IoT. Moreover, a detailed discussion on low latency and massive connectivity requirements of future cellular networks in accordance with machine-type communication (MTC) is also presented. Furthermore, the need to bring IoT devices to Internet connectivity and a standardized protocol stack to regulate the data transmission between these devices is also addressed while kee** in view the resource constraint nature of IoT devices.
△ Less
Submitted 22 May, 2021;
originally announced May 2021.
-
Energy-Efficient MAC for Cellular IoT: State-of-the-Art, Challenges, and Standardization
Authors:
Syed Waqas Haider Shah,
Adnan Noor Mian,
Adnan Aijaz,
Junaid Qadir,
Jon Crowcroft
Abstract:
In the modern world, the connectivity-as-we-go model is gaining popularity. Internet-of-Things (IoT) envisions a future in which human beings communicate with each other and with devices that have identities and virtual personalities, as well as sensing, processing, and networking capabilities, which will allow the develo** of smart environments that operate with little or no human intervention.…
▽ More
In the modern world, the connectivity-as-we-go model is gaining popularity. Internet-of-Things (IoT) envisions a future in which human beings communicate with each other and with devices that have identities and virtual personalities, as well as sensing, processing, and networking capabilities, which will allow the develo** of smart environments that operate with little or no human intervention. In such IoT environments, that will have battery-operated sensors and devices, energy efficiency becomes a fundamental concern. Thus, energy-efficient (EE) connectivity is gaining significant attention from the industrial and academic communities. This work aims to provide a comprehensive state-of-the-art survey on the energy efficiency of medium access control (MAC) protocols for cellular IoT. we provide a detailed discussion on the sources of energy dissipation at the MAC layer and then propose solutions. In addition to reviewing the proposed MAC designs, we also provide insights and suggestions that can guide practitioners and researchers in designing EE MAC protocols that extend the battery life of IoT devices. Finally, we identify a range of challenging open problems that should be solved for providing EE MAC services for IoT devices, along with corresponding opportunities and future research ideas to address these challenges.
△ Less
Submitted 9 March, 2021;
originally announced March 2021.
-
Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication
Authors:
Syed W. Shah,
Naeem F. Syed,
Arash Shaghaghi,
Adnan Anwar,
Zubair Baig,
Robin Doss
Abstract:
Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity attacks that exploit conventional static authentication mechanisms that authenticate users only at an ingress point. However, widely researched human user characteristics-based CA mechanisms cannot be extended to continuously authenticate Internet of Things (IoT) devices. The challenges are ex…
▽ More
Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity attacks that exploit conventional static authentication mechanisms that authenticate users only at an ingress point. However, widely researched human user characteristics-based CA mechanisms cannot be extended to continuously authenticate Internet of Things (IoT) devices. The challenges are exacerbated with increased adoption of device-to-device (d2d) communication in critical infrastructures. Existing d2d authentication protocols proposed in the literature are either prone to subversion or are computationally infeasible to be deployed on constrained IoT devices. In view of these challenges, we propose a novel, lightweight, and secure CA protocol that leverages communication channel properties and a tunable mathematical function to generate dynamically changing session keys. Our preliminary informal protocol analysis suggests that the proposed protocol is resistant to known attack vectors and thus has strong potential for deployment in securing critical and resource-constrained d2d communication.
△ Less
Submitted 10 October, 2020;
originally announced October 2020.
-
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
Authors:
Waqas Aman,
Zeeshan Haider,
S. Waqas H. Shah,
M. Mahboob Ur Rahman,
Octavia A. Dobre
Abstract:
This paper investigates the impact of authentication on effective capacity (EC) of an underwater acoustic (UWA) channel. Specifically, the UWA channel is under impersonation attack by a malicious node (Eve) present in the close vicinity of the legitimate node pair (Alice and Bob); Eve tries to inject its malicious data into the system by making Bob believe that she is indeed Alice. To thwart the i…
▽ More
This paper investigates the impact of authentication on effective capacity (EC) of an underwater acoustic (UWA) channel. Specifically, the UWA channel is under impersonation attack by a malicious node (Eve) present in the close vicinity of the legitimate node pair (Alice and Bob); Eve tries to inject its malicious data into the system by making Bob believe that she is indeed Alice. To thwart the impersonation attack by Eve, Bob utilizes the distance of the transmit node as the feature/fingerprint to carry out feature-based authentication at the physical layer. Due to authentication at Bob, due to lack of channel knowledge at the transmit node (Alice or Eve), and due to the threshold-based decoding error model, the relevant dynamics of the considered system could be modelled by a Markov chain (MC). Thus, we compute the state-transition probabilities of the MC, and the moment generating function for the service process corresponding to each state. This enables us to derive a closed-form expression of the EC in terms of authentication parameters. Furthermore, we compute the optimal transmission rate (at Alice) through gradient-descent (GD) technique and artificial neural network (ANN) method. Simulation results show that the EC decreases under severe authentication constraints (i.e., more false alarms and more transmissions by Eve). Simulation results also reveal that the (optimal transmission rate) performance of the ANN technique is quite close to that of the GD method.
△ Less
Submitted 12 February, 2020;
originally announced February 2020.
-
Energy-Efficient Mechanism for Smart Communication in Cellular Networks
Authors:
Syed Waqas Haider Shah,
Ahmad Talal Riaz,
Zahoor Fatima
Abstract:
Internet-of-things (IoT) is gaining popularity in recent times. Cellular network can be an appropriate solution for the IoT connectivity. With the exponential increase in the number of connected IoT devices, energy consumption is a bottleneck for wireless connectivity solutions. In this work, we proposed a scheme to decrease the power consumption of a base station of a cell. The maximum power cons…
▽ More
Internet-of-things (IoT) is gaining popularity in recent times. Cellular network can be an appropriate solution for the IoT connectivity. With the exponential increase in the number of connected IoT devices, energy consumption is a bottleneck for wireless connectivity solutions. In this work, we proposed a scheme to decrease the power consumption of a base station of a cell. The maximum power consumption of a base station is associated with its data processing, routing, and transmission. Our scheme reduce the size of the transmission data which ultimately reduce the power consumption associated with it. Multiple data reduction techniques have been used for this purpose. System level simulations show the efficiency of our proposed system.
△ Less
Submitted 29 April, 2019; v1 submitted 5 September, 2018;
originally announced September 2018.