首页 > 最新文献

2008 46th Annual Allerton Conference on Communication, Control, and Computing最新文献

英文 中文
Capacity results for certain wireless relay networks with erasure links 容量结果为某些无线中继网络与擦除链路
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797714
S. Puducheri, T. Fuja
This paper considers two simple wireless network configurations in which the links making up the network do not interfere with one another and the assumed link loss mechanisms are erasures. The first configuration is the M-source multiple access relay channel (MARC), in which M different sources convey information to a single destination with the help of a single relay. The second configuration is the two-fold multi-relay channel (MRC), in which a pair of relays help a single source convey information to a single destination. Cut set bounds are established for these configurations, and linear programming is then employed to formulate closed-form solutions for the capacity regions as a function of the link parameters; moreover, it is shown that easily-implemented capacity-approaching codes such as LDPC or Tornado codes can be used at the link level to achieve any point in the capacity region. For the erasure MARC, the results indicate that the relay should help only those sources that have a weaker direct channel to the destination than the relay itself does - regardless of the quality of the source-to-relay channels. For the erasure MRC, the solution is not as intuitive, but it displays a structure in which the relative quality of the various links determine which relays are used - and, when both are used, which relay is ldquoprimaryrdquo and which is ldquosecondaryrdquo.
本文考虑了两种简单的无线网络配置,其中组成网络的链路互不干扰,假设的链路丢失机制是擦除。第一种配置是M源多址中继通道(MARC),其中M个不同的源通过单个中继将信息传递到单个目的地。第二种配置是双重多中继通道(MRC),其中一对中继帮助单个源将信息传递到单个目的地。建立了这些构型的切集边界,然后利用线性规划的方法给出了容量区域随链路参数的函数的封闭解;此外,本文还证明了易于实现的容量逼近码(如LDPC码或Tornado码)可以在链路级达到容量区域的任何点。对于擦除MARC,结果表明中继应该只帮助那些具有比中继本身更弱的到目标的直接通道的源-无论源到中继通道的质量如何。对于擦除MRC,解决方案不那么直观,但它显示了一种结构,在这种结构中,各种链路的相对质量决定了使用哪些继电器,并且,当两者都使用时,哪个继电器是ldquoprimary rrdquo,哪个继电器是ldquosecondary rrdquo。
{"title":"Capacity results for certain wireless relay networks with erasure links","authors":"S. Puducheri, T. Fuja","doi":"10.1109/ALLERTON.2008.4797714","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797714","url":null,"abstract":"This paper considers two simple wireless network configurations in which the links making up the network do not interfere with one another and the assumed link loss mechanisms are erasures. The first configuration is the M-source multiple access relay channel (MARC), in which M different sources convey information to a single destination with the help of a single relay. The second configuration is the two-fold multi-relay channel (MRC), in which a pair of relays help a single source convey information to a single destination. Cut set bounds are established for these configurations, and linear programming is then employed to formulate closed-form solutions for the capacity regions as a function of the link parameters; moreover, it is shown that easily-implemented capacity-approaching codes such as LDPC or Tornado codes can be used at the link level to achieve any point in the capacity region. For the erasure MARC, the results indicate that the relay should help only those sources that have a weaker direct channel to the destination than the relay itself does - regardless of the quality of the source-to-relay channels. For the erasure MRC, the solution is not as intuitive, but it displays a structure in which the relative quality of the various links determine which relays are used - and, when both are used, which relay is ldquoprimaryrdquo and which is ldquosecondaryrdquo.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133443788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymity under light traffic conditions using a network of mixes 使用混合网络的轻交通条件下的匿名性
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797721
P. Venkitasubramaniam, V. Anantharam
The analysis of a multi-source single-destination network of mixes is considered under strict latency constraints at each mix. Mixes are relay nodes that accept packets arriving from multiple sources and release them after variable delays to prevent an eavesdropper from perfectly identifying the sources of outgoing packets (also, the contents of the packets are encrypted to prevent these from being used to correlate the arrivals to the mix with its departures). Using an entropy-based measure to quantify anonymity, the anonymity provided by such a single-destination network of mixes is analyzed, with the focus on light traffic conditions. A general upper bound is presented that bounds the anonymity of a single-destination mix network in terms of a linear combination of the anonymity of two-stage networks. By using a specific mixing strategy, a lower bound is provided on the light traffic derivative of the anonymity of single-destination mix networks. The light traffic derivative of the upper bound coincides with the lower bound for the case of mix-cascades (linear single-destination mix networks). Thus, the optimal light traffic derivative of the anonymity is characterized for mix cascades.
在严格的延迟约束下,考虑了多源单目的地混合网络的分析。混合是中继节点,它接受来自多个来源的数据包,并在可变延迟后释放它们,以防止窃听者完美地识别出传出数据包的来源(此外,数据包的内容被加密,以防止这些内容被用来将到达的数据包与离开的数据包相关联)。采用基于熵的匿名量化方法,分析了单目的地混合网络提供的匿名性,并以轻交通条件为重点。给出了单目标混合网络的匿名性用两阶段网络匿名性的线性组合来限定的一般上界。通过采用特定的混合策略,给出了单目的地混合网络的匿名性的轻流量导数的下界。对于混合级联(线性单目的地混合网络),轻流量导数的上界与下界重合。因此,对于混合级联,最优交通量导数具有匿名性。
{"title":"Anonymity under light traffic conditions using a network of mixes","authors":"P. Venkitasubramaniam, V. Anantharam","doi":"10.1109/ALLERTON.2008.4797721","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797721","url":null,"abstract":"The analysis of a multi-source single-destination network of mixes is considered under strict latency constraints at each mix. Mixes are relay nodes that accept packets arriving from multiple sources and release them after variable delays to prevent an eavesdropper from perfectly identifying the sources of outgoing packets (also, the contents of the packets are encrypted to prevent these from being used to correlate the arrivals to the mix with its departures). Using an entropy-based measure to quantify anonymity, the anonymity provided by such a single-destination network of mixes is analyzed, with the focus on light traffic conditions. A general upper bound is presented that bounds the anonymity of a single-destination mix network in terms of a linear combination of the anonymity of two-stage networks. By using a specific mixing strategy, a lower bound is provided on the light traffic derivative of the anonymity of single-destination mix networks. The light traffic derivative of the upper bound coincides with the lower bound for the case of mix-cascades (linear single-destination mix networks). Thus, the optimal light traffic derivative of the anonymity is characterized for mix cascades.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132114014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Multiuser MIMO downlink with limited inter-cell cooperation: Approximate interference alignment in time, frequency and space 有限小区间合作的多用户MIMO下行链路:在时间、频率和空间上的近似干扰对准
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797630
G. Caire, S. Ramprashad, H. Papadopoulos, C. Pépin, C. Sundberg
We consider a realistic albeit simplified scenario for wireless cellular systems of the next generation (4G and beyond), where MIMO-OFDM, opportunistic scheduling, channel state information at the transmitter and limited base-station cooperation are envisaged. We propose two strategies with limited base-station cooperation that can be easily implemented with today's technology and achieve an approximate form of inter-cell interference alignment. The first strategy consists of imposing a ldquopower maskrdquo in frequency such that adjacent cooperative clusters of base stations generate different interference levels in different frequency subchannels. The second strategy consists of switching between different cooperative clusters such that no user is in a permanently disadvantaged location.We compare single-user and multiuser MIMO systems in terms of average throughput as a function of the user location.
我们考虑了下一代(4G及以后)无线蜂窝系统的一个现实但简化的场景,其中设想了MIMO-OFDM,机会调度,发射机的信道状态信息和有限的基站合作。我们提出了两种具有有限基站合作的策略,这两种策略可以很容易地用当今的技术实现,并实现近似形式的小区间干扰对齐。第一种策略包括在频率上施加低功率掩码,使相邻的基站合作集群在不同的频率子信道中产生不同的干扰水平。第二种策略包括在不同的合作集群之间切换,这样就不会有用户永远处于不利地位。我们比较了单用户和多用户MIMO系统的平均吞吐量作为用户位置的函数。
{"title":"Multiuser MIMO downlink with limited inter-cell cooperation: Approximate interference alignment in time, frequency and space","authors":"G. Caire, S. Ramprashad, H. Papadopoulos, C. Pépin, C. Sundberg","doi":"10.1109/ALLERTON.2008.4797630","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797630","url":null,"abstract":"We consider a realistic albeit simplified scenario for wireless cellular systems of the next generation (4G and beyond), where MIMO-OFDM, opportunistic scheduling, channel state information at the transmitter and limited base-station cooperation are envisaged. We propose two strategies with limited base-station cooperation that can be easily implemented with today's technology and achieve an approximate form of inter-cell interference alignment. The first strategy consists of imposing a ldquopower maskrdquo in frequency such that adjacent cooperative clusters of base stations generate different interference levels in different frequency subchannels. The second strategy consists of switching between different cooperative clusters such that no user is in a permanently disadvantaged location.We compare single-user and multiuser MIMO systems in terms of average throughput as a function of the user location.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133879883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
On the minimum trapping distance of repeat accumulate accumulate codes 关于重复累加码的最小捕获距离
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797726
J. Kliewer, K. Zigangirov, D. J. Costello
We consider the ensemble of codes formed by a serial concatenation of a repetition code with two accumulators through uniform random interleavers. For this ensemble, asymptotic expressions for the normalized minimum trapping distance are derived. We employ a variant of the Gallager-Zyablov-Pinsker bit flipping decoding algorithm on a binary symmetric channel, where the analysis is based on the factor graph of the code. In particular, we show that the minimum trapping distance can be determined by solving a non-linear optimization problem. As a result we find that the minimum trapping distance grows linearly with block length for code rates of 1/3 and smaller, albeit with very small growth rate coefficients.
我们考虑了由具有两个累加器的重复码通过均匀随机交织器串行连接而形成的码集合。对于该系综,导出了归一化最小俘获距离的渐近表达式。我们在二进制对称信道上采用Gallager-Zyablov-Pinsker位翻转解码算法的一种变体,其中分析是基于编码的因子图。特别地,我们证明了最小捕获距离可以通过求解非线性优化问题来确定。结果发现,对于码率为1/3或更小的情况,最小捕获距离随块长度线性增长,尽管增长率系数非常小。
{"title":"On the minimum trapping distance of repeat accumulate accumulate codes","authors":"J. Kliewer, K. Zigangirov, D. J. Costello","doi":"10.1109/ALLERTON.2008.4797726","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797726","url":null,"abstract":"We consider the ensemble of codes formed by a serial concatenation of a repetition code with two accumulators through uniform random interleavers. For this ensemble, asymptotic expressions for the normalized minimum trapping distance are derived. We employ a variant of the Gallager-Zyablov-Pinsker bit flipping decoding algorithm on a binary symmetric channel, where the analysis is based on the factor graph of the code. In particular, we show that the minimum trapping distance can be determined by solving a non-linear optimization problem. As a result we find that the minimum trapping distance grows linearly with block length for code rates of 1/3 and smaller, albeit with very small growth rate coefficients.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124522592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trading off coding complexity and feedback requirements for the packet erasure channel 权衡编码复杂性和对包擦除通道的反馈需求
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797716
S. Puducheri, T. Fuja
We study the tradeoffs in employing two different approaches - coding and feedback - for reliable communication over packet erasure channels. Results are shown for a scheme that combines both approaches. Inspired by this scheme, we use rate distortion results to characterize the best achievable tradeoffs for a class of joint coding-and-feedback schemes.
我们研究了采用两种不同的方法-编码和反馈-在包擦除信道上进行可靠通信的权衡。结果显示了一个方案,结合这两种方法。受此方案的启发,我们使用速率失真结果来表征一类联合编码和反馈方案的最佳可实现折衷。
{"title":"Trading off coding complexity and feedback requirements for the packet erasure channel","authors":"S. Puducheri, T. Fuja","doi":"10.1109/ALLERTON.2008.4797716","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797716","url":null,"abstract":"We study the tradeoffs in employing two different approaches - coding and feedback - for reliable communication over packet erasure channels. Results are shown for a scheme that combines both approaches. Inspired by this scheme, we use rate distortion results to characterize the best achievable tradeoffs for a class of joint coding-and-feedback schemes.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115767118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
System level optimization in wireless networks with uncertain customer arrival rates 客户到达率不确定的无线网络系统级优化
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797671
Sungho Yun, C. Caramanis
We consider a system-level approach to interference management in a cellular broadband system operating in an interference-limited and highly dynamic regime, as put forth. Here, base stations in neighboring cells (partially) coordinate their transmission schedules in an attempt to avoid simultaneous transmission to their mutual cell edge. Limits on communication overhead and use of the backhaul require base station coordination to occur at a slower time scale than the arriving customers. Depending on the overhead restrictions, the slower time scale could be on the scale of minutes or even hours. Thus base stations coordinate using only the statistics of customer arrival, while they serve users based on the actual realizations. The central challenge is to properly structure coordination decisions at the slow time scale, as these subsequently restrict the actions of each base station until the next coordination period. A further challenge comes from the fact that over longer coordination intervals, the statistics of the arriving customers, e.g., the load, may themselves vary or be only approximately known. Indeed, we show through simulation that while the approach is effective for a broad range of arriving load, performance rapidly degrades as the variation of the arriving load from the nominal (or assured) arriving load grows. We show this is true even when the variations are neutral, namely when the aggregate load is fixed, but there are local variations. In this paper we show that a two-stage robust optimization framework is a natural way to model two time-scale decision problems. We provide tractable formulations for the base- station coordination problem, and show that our formulation is robust to fluctuations (uncertainties) in the arriving load. This tolerance to load fluctuation also serves to reduce the need for frequent re-optimization across base stations, thus helping minimize the communication overhead required for system level interference reduction. Building in robustness to load variation comes at the potential cost of somewhat degraded performance when variations happen to be very small. Our robust optimization formulations are flexible, allowing us to control the conservatism of the solution. Our simulations show that we can build in robustness without significant degradation of nominal performance.
我们考虑了在蜂窝宽带系统中运行在干扰限制和高动态状态下的系统级干扰管理方法。在这里,相邻小区中的基站(部分地)协调它们的传输调度,试图避免同时传输到它们的相互小区边缘。通信开销和回程使用的限制要求基站协调在比到达客户更慢的时间尺度上进行。根据开销限制,较慢的时间尺度可以是分钟甚至小时。因此,基站仅使用客户到达的统计数据进行协调,而它们根据实际实现为用户提供服务。主要的挑战是在缓慢的时间尺度上适当地组织协调决定,因为这些决定随后限制了每个基站的行动,直到下一个协调时期。进一步的挑战来自于这样一个事实,即在较长的协调间隔内,到达客户的统计数据(例如,负载)本身可能会变化或仅大致已知。事实上,我们通过模拟表明,虽然该方法对大范围的到达负载是有效的,但随着到达负载与名义(或保证)到达负载的变化增加,性能会迅速下降。我们证明,即使变化是中性的,即当总负荷是固定的,但存在局部变化时,这也是正确的。在本文中,我们证明了一个两阶段鲁棒优化框架是一个自然的方法来建模两个时间尺度决策问题。我们提供了易于处理的基站协调问题的公式,并证明了该公式对到达负载的波动(不确定性)具有鲁棒性。这种对负载波动的容忍度还有助于减少跨基站频繁重新优化的需要,从而有助于最大限度地减少系统级干扰所需的通信开销。当变化非常小时,为负载变化构建健壮性的潜在代价是性能下降。我们稳健的优化配方是灵活的,使我们能够控制解决方案的保守性。我们的模拟表明,我们可以在不显著降低标称性能的情况下构建鲁棒性。
{"title":"System level optimization in wireless networks with uncertain customer arrival rates","authors":"Sungho Yun, C. Caramanis","doi":"10.1109/ALLERTON.2008.4797671","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797671","url":null,"abstract":"We consider a system-level approach to interference management in a cellular broadband system operating in an interference-limited and highly dynamic regime, as put forth. Here, base stations in neighboring cells (partially) coordinate their transmission schedules in an attempt to avoid simultaneous transmission to their mutual cell edge. Limits on communication overhead and use of the backhaul require base station coordination to occur at a slower time scale than the arriving customers. Depending on the overhead restrictions, the slower time scale could be on the scale of minutes or even hours. Thus base stations coordinate using only the statistics of customer arrival, while they serve users based on the actual realizations. The central challenge is to properly structure coordination decisions at the slow time scale, as these subsequently restrict the actions of each base station until the next coordination period. A further challenge comes from the fact that over longer coordination intervals, the statistics of the arriving customers, e.g., the load, may themselves vary or be only approximately known. Indeed, we show through simulation that while the approach is effective for a broad range of arriving load, performance rapidly degrades as the variation of the arriving load from the nominal (or assured) arriving load grows. We show this is true even when the variations are neutral, namely when the aggregate load is fixed, but there are local variations. In this paper we show that a two-stage robust optimization framework is a natural way to model two time-scale decision problems. We provide tractable formulations for the base- station coordination problem, and show that our formulation is robust to fluctuations (uncertainties) in the arriving load. This tolerance to load fluctuation also serves to reduce the need for frequent re-optimization across base stations, thus helping minimize the communication overhead required for system level interference reduction. Building in robustness to load variation comes at the potential cost of somewhat degraded performance when variations happen to be very small. Our robust optimization formulations are flexible, allowing us to control the conservatism of the solution. Our simulations show that we can build in robustness without significant degradation of nominal performance.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114854383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Asymptotically optimal transmit strategies for the multiple antenna interference channel 多天线干扰信道的渐近最优传输策略
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797627
E. Larsson, D. Danev, Eduard Axel Jorswieck
We consider the interference channel with multiple antennas at the transmitter. We prove that at high signal-to-noise ratio (SNR), the zero-forcing transmit scheme is optimal in the sum-rate sense. Furthermore we prove that at low SNR, maximum-ratio transmission is optimal in the sum-rate sense. We also provide a discussion of the connection to classical results on spectral efficiency in the wideband regime. Finally, we propose a non-convex optimization approach based on monotonic optimization to solve the sum rate maximization problem.
我们考虑了发射机多天线干扰信道。我们证明了在高信噪比(SNR)下,强制零传输方案在和速率意义上是最优的。进一步证明了在低信噪比下,最大比传输在和速率意义上是最优的。我们还提供了一个讨论连接到经典结果的频谱效率在宽带制度。最后,我们提出了一种基于单调优化的非凸优化方法来解决和速率最大化问题。
{"title":"Asymptotically optimal transmit strategies for the multiple antenna interference channel","authors":"E. Larsson, D. Danev, Eduard Axel Jorswieck","doi":"10.1109/ALLERTON.2008.4797627","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797627","url":null,"abstract":"We consider the interference channel with multiple antennas at the transmitter. We prove that at high signal-to-noise ratio (SNR), the zero-forcing transmit scheme is optimal in the sum-rate sense. Furthermore we prove that at low SNR, maximum-ratio transmission is optimal in the sum-rate sense. We also provide a discussion of the connection to classical results on spectral efficiency in the wideband regime. Finally, we propose a non-convex optimization approach based on monotonic optimization to solve the sum rate maximization problem.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"282 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126916090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Modeling node capture attacks in wireless sensor networks 无线传感器网络节点捕获攻击建模
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797699
P. Tague, R. Poovendran
We formalize a model for node capture attacks in which an adversary collects information about the network via eavesdropping on the wireless medium and captures nodes based on the learned information. We show that attacks in this adversary model correspond to NP-hard optimization problems and discuss the behavior of a reasonable heuristic algorithm. We show that the goals of node capture attacks can be decomposed into a collection of primitive events, the impact of which can be evaluated and recombined to yield an overall evaluation of the attack. We demonstrate the use of the attack decomposition model for derivation of attack metrics and discuss the potential use of this decomposition technique for the purposes of defense against node capture attacks.
我们形式化了一个节点捕获攻击的模型,在该模型中,攻击者通过在无线介质上窃听来收集有关网络的信息,并根据所获得的信息捕获节点。我们证明了这种对手模型中的攻击对应于NP-hard优化问题,并讨论了合理的启发式算法的行为。我们表明,节点捕获攻击的目标可以分解为一组原始事件,这些事件的影响可以被评估和重组,以产生对攻击的总体评估。我们演示了使用攻击分解模型推导攻击度量,并讨论了这种分解技术在防御节点捕获攻击方面的潜在用途。
{"title":"Modeling node capture attacks in wireless sensor networks","authors":"P. Tague, R. Poovendran","doi":"10.1109/ALLERTON.2008.4797699","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797699","url":null,"abstract":"We formalize a model for node capture attacks in which an adversary collects information about the network via eavesdropping on the wireless medium and captures nodes based on the learned information. We show that attacks in this adversary model correspond to NP-hard optimization problems and discuss the behavior of a reasonable heuristic algorithm. We show that the goals of node capture attacks can be decomposed into a collection of primitive events, the impact of which can be evaluated and recombined to yield an overall evaluation of the attack. We demonstrate the use of the attack decomposition model for derivation of attack metrics and discuss the potential use of this decomposition technique for the purposes of defense against node capture attacks.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127055960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
On codes designed via algebraic lifts of graphs 论图的代数提升设计的码
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797704
C. Kelley
Over the past few years several constructions of protograph codes have been proposed that are based on random lifts of suitably chosen base graphs. More recently, an algebraic analog of this approach was introduced using the theory of voltage graphs. The strength of the voltage graph framework is the ability to analyze the resulting derived graph algebraically, even when the voltages themselves are assigned randomly. Moreover, the theory of voltage graphs provides insight to designing lifts of graphs with particular properties. In this paper we illustrate how the properties of the derived graphs and the corresponding codes relate to the voltage assignments. In particular, we present a construction of LDPC codes by giving an algebraic method of choosing the permutation voltages and illustrate the usefulness of the proposed technique via simulation results.
在过去的几年中,已经提出了几种基于适当选择的基图的随机提升的原型码结构。最近,使用电压图理论介绍了这种方法的代数模拟。电压图框架的强大之处在于,即使电压本身是随机分配的,它也能以代数方式分析得出的图。此外,电压图的理论为设计具有特定性质的图的提升提供了洞察力。在本文中,我们说明了推导图的性质和相应的代码与电压分配的关系。特别地,我们提出了一种LDPC码的构造方法,给出了选择排列电压的代数方法,并通过仿真结果说明了所提出技术的实用性。
{"title":"On codes designed via algebraic lifts of graphs","authors":"C. Kelley","doi":"10.1109/ALLERTON.2008.4797704","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797704","url":null,"abstract":"Over the past few years several constructions of protograph codes have been proposed that are based on random lifts of suitably chosen base graphs. More recently, an algebraic analog of this approach was introduced using the theory of voltage graphs. The strength of the voltage graph framework is the ability to analyze the resulting derived graph algebraically, even when the voltages themselves are assigned randomly. Moreover, the theory of voltage graphs provides insight to designing lifts of graphs with particular properties. In this paper we illustrate how the properties of the derived graphs and the corresponding codes relate to the voltage assignments. In particular, we present a construction of LDPC codes by giving an algebraic method of choosing the permutation voltages and illustrate the usefulness of the proposed technique via simulation results.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127307889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Generalized binary search 广义二叉搜索
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797609
R. Nowak
This paper studies a generalization of the classic binary search problem of locating a desired value within a sorted list. The classic problem can be viewed as determining the correct one-dimensional, binary-valued threshold function from a finite class of such functions based on queries taking the form of point samples of the function. The classic problem is also equivalent to a simple binary encoding of the threshold location. This paper extends binary search to learning more general binary-valued functions. Specifically, if the set of target functions and queries satisfy certain geometrical relationships, then an algorithm, based on selecting a query that is maximally discriminating at each step, will determine the correct function in a number of steps that is logarithmic in the number of functions under consideration. Examples of classes satisfying the geometrical relationships include linear separators in multiple dimensions. Extensions to handle noise are also discussed. Possible applications include machine learning, channel coding, and sequential experimental design.
本文研究了经典的二叉查找问题的推广,该问题是在一个排序列表中定位一个期望值。经典问题可以被看作是基于以函数的点样本形式的查询,从有限类这样的函数中确定正确的一维二值阈值函数。经典问题也等价于阈值位置的简单二进制编码。本文将二分查找扩展到学习更一般的二值函数。具体来说,如果目标函数和查询的集合满足某些几何关系,那么基于选择在每个步骤中具有最大区别性的查询的算法将在考虑的函数数量的对数步骤中确定正确的函数。满足几何关系的类的例子包括多维的线性分隔符。还讨论了处理噪声的扩展。可能的应用包括机器学习、信道编码和顺序实验设计。
{"title":"Generalized binary search","authors":"R. Nowak","doi":"10.1109/ALLERTON.2008.4797609","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797609","url":null,"abstract":"This paper studies a generalization of the classic binary search problem of locating a desired value within a sorted list. The classic problem can be viewed as determining the correct one-dimensional, binary-valued threshold function from a finite class of such functions based on queries taking the form of point samples of the function. The classic problem is also equivalent to a simple binary encoding of the threshold location. This paper extends binary search to learning more general binary-valued functions. Specifically, if the set of target functions and queries satisfy certain geometrical relationships, then an algorithm, based on selecting a query that is maximally discriminating at each step, will determine the correct function in a number of steps that is logarithmic in the number of functions under consideration. Examples of classes satisfying the geometrical relationships include linear separators in multiple dimensions. Extensions to handle noise are also discussed. Possible applications include machine learning, channel coding, and sequential experimental design.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122955738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 87
期刊
2008 46th Annual Allerton Conference on Communication, Control, and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1