首页 > 最新文献

2008 46th Annual Allerton Conference on Communication, Control, and Computing最新文献

英文 中文
Opportunistic multi-antenna downlink transmission with finite-rate feedback 具有有限速率反馈的机会多天线下行传输
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797539
A. Tajer, Xiaodong Wang
Multiple-antenna downlink transmission offers significant capacity improvement when the transmit-side channel state information (CSI) is available. The sum-rate capacity with infinite-rate feedback (full or partial CSI) scales linearly with the number of transmit antennas (multiplexing gain) and double logarithmically with the number of users (multiuser diversity gain). In this paper we present a new scheduling scheme which requires only finite-rate feedback and yet retains the optimal multiplexing and multiuser diversity gains achievable by dirty-paper coding and show that its sum-rate throughput scales like Nt log log KNr where Nt and Nr are the number of transmit and receive antennas and K is the number of users. While our scheduling schemes is asymptotically optimal, it also exhibits a good performance for practical network sizes. We also show that by appropriate design of the feedback mechanism, we can refrain the aggregate amount of feedback from increasing with the number of users and for asymptotically large networks the total number of feedback bits is bounded by Nt log Nt. We also demonstrate that despite having an opportunistic user selection, fairness among the users is maintained and all are equality likely to be scheduled.
当传输端信道状态信息(CSI)可用时,多天线下行传输可显著提高传输容量。具有无限速率反馈(全部或部分CSI)的和速率容量与发射天线数量(多路复用增益)成线性关系,与用户数量(多用户分集增益)成双对数关系。本文提出了一种新的调度方案,该方案只需要有限速率反馈,但保留了脏纸编码可实现的最优复用和多用户分集增益,并证明了其和速率吞吐量尺度为Nt log log KNr,其中Nt和Nr为发射和接收天线的数量,K为用户的数量。虽然我们的调度方案是渐近最优的,但它在实际网络规模下也表现出良好的性能。我们还表明,通过适当的反馈机制设计,我们可以抑制反馈的总量随着用户数量的增加而增加,并且对于渐近大的网络,反馈位的总数以Nt log Nt为界。我们还证明,尽管有机会性的用户选择,但用户之间的公平性是保持的,并且所有用户都是平等的。
{"title":"Opportunistic multi-antenna downlink transmission with finite-rate feedback","authors":"A. Tajer, Xiaodong Wang","doi":"10.1109/ALLERTON.2008.4797539","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797539","url":null,"abstract":"Multiple-antenna downlink transmission offers significant capacity improvement when the transmit-side channel state information (CSI) is available. The sum-rate capacity with infinite-rate feedback (full or partial CSI) scales linearly with the number of transmit antennas (multiplexing gain) and double logarithmically with the number of users (multiuser diversity gain). In this paper we present a new scheduling scheme which requires only finite-rate feedback and yet retains the optimal multiplexing and multiuser diversity gains achievable by dirty-paper coding and show that its sum-rate throughput scales like Nt log log KNr where Nt and Nr are the number of transmit and receive antennas and K is the number of users. While our scheduling schemes is asymptotically optimal, it also exhibits a good performance for practical network sizes. We also show that by appropriate design of the feedback mechanism, we can refrain the aggregate amount of feedback from increasing with the number of users and for asymptotically large networks the total number of feedback bits is bounded by Nt log Nt. We also demonstrate that despite having an opportunistic user selection, fairness among the users is maintained and all are equality likely to be scheduled.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130770326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A cross-layer view of wireless multicast optimization 无线组播优化的跨层视图
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797740
A. Pantelidou, A. Ephremides
We consider a system of multiple multicast transmitters with possibly overlapping receivers. We introduce a stationary policy that allocates the transmission rates and powers of every transmitter with the objective to maximize the overall user utility, which is measured in terms of the total average rate of each receiver. We show optimality of this policy by employing the theory of stochastic approximation for any utility function that is strictly concave and increasing in the average rate. The introduced policy is opportunistic in nature as it capitalizes on the variations of the wireless channel that are induced by fading. Specifically, we show through a set of simulations that the average throughput under unicast traffic observes a benefit under fading. Our results further indicate that this benefit is mitigated when multicast traffic is considered.
我们考虑一个由多个多播发射机和可能重叠的接收器组成的系统。我们引入了一个固定策略,该策略分配每个发射器的传输速率和功率,目标是最大化总体用户效用,这是根据每个接收器的总平均速率来衡量的。我们利用随机逼近理论证明了该策略的最优性,该理论适用于任何严格凹且平均率递增的效用函数。引入的策略本质上是机会主义的,因为它利用了由衰落引起的无线信道的变化。具体来说,我们通过一组模拟表明,单播流量下的平均吞吐量在衰落下观察到好处。我们的研究结果进一步表明,当考虑多播流量时,这种优势会减弱。
{"title":"A cross-layer view of wireless multicast optimization","authors":"A. Pantelidou, A. Ephremides","doi":"10.1109/ALLERTON.2008.4797740","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797740","url":null,"abstract":"We consider a system of multiple multicast transmitters with possibly overlapping receivers. We introduce a stationary policy that allocates the transmission rates and powers of every transmitter with the objective to maximize the overall user utility, which is measured in terms of the total average rate of each receiver. We show optimality of this policy by employing the theory of stochastic approximation for any utility function that is strictly concave and increasing in the average rate. The introduced policy is opportunistic in nature as it capitalizes on the variations of the wireless channel that are induced by fading. Specifically, we show through a set of simulations that the average throughput under unicast traffic observes a benefit under fading. Our results further indicate that this benefit is mitigated when multicast traffic is considered.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"20 17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120823555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Stable networking games 稳定的网络游戏
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797686
H. Tembine, E. Altman, R. Elazouzi, Y. Hayel
We study a class of population game frameworks called stable games, introduced by Hofbauer and Sandholm (2007). We give several examples of applications of stable population games in the context of wireless networks including resource allocation, impact of malicious users in cognitive radio networks and power control. We model and analyze a base station assignment problem and interference control scenarios in heterogeneous wireless networks as a non-zero sum stable game. We show that the resource selection game has a unique evolutionary stable strategy (ESS) and a unique correlated ESS. We give a class of evolutionary game dynamics to lead to the ESS.
我们研究了一类由Hofbauer和Sandholm(2007)引入的称为稳定博弈的人口博弈框架。我们给出了稳定人口博弈在无线网络环境下的几个应用实例,包括资源分配、认知无线网络中恶意用户的影响和功率控制。本文将异构无线网络中的基站分配问题和干扰控制场景作为非零和稳定博弈进行建模和分析。研究表明,资源选择博弈具有独特的进化稳定策略(ESS)和独特的相关ESS。我们给出了一类进化博弈动力学来推导ESS。
{"title":"Stable networking games","authors":"H. Tembine, E. Altman, R. Elazouzi, Y. Hayel","doi":"10.1109/ALLERTON.2008.4797686","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797686","url":null,"abstract":"We study a class of population game frameworks called stable games, introduced by Hofbauer and Sandholm (2007). We give several examples of applications of stable population games in the context of wireless networks including resource allocation, impact of malicious users in cognitive radio networks and power control. We model and analyze a base station assignment problem and interference control scenarios in heterogeneous wireless networks as a non-zero sum stable game. We show that the resource selection game has a unique evolutionary stable strategy (ESS) and a unique correlated ESS. We give a class of evolutionary game dynamics to lead to the ESS.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131370052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the minimum trapping distance of repeat accumulate accumulate codes 关于重复累加码的最小捕获距离
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797726
J. Kliewer, K. Zigangirov, D. J. Costello
We consider the ensemble of codes formed by a serial concatenation of a repetition code with two accumulators through uniform random interleavers. For this ensemble, asymptotic expressions for the normalized minimum trapping distance are derived. We employ a variant of the Gallager-Zyablov-Pinsker bit flipping decoding algorithm on a binary symmetric channel, where the analysis is based on the factor graph of the code. In particular, we show that the minimum trapping distance can be determined by solving a non-linear optimization problem. As a result we find that the minimum trapping distance grows linearly with block length for code rates of 1/3 and smaller, albeit with very small growth rate coefficients.
我们考虑了由具有两个累加器的重复码通过均匀随机交织器串行连接而形成的码集合。对于该系综,导出了归一化最小俘获距离的渐近表达式。我们在二进制对称信道上采用Gallager-Zyablov-Pinsker位翻转解码算法的一种变体,其中分析是基于编码的因子图。特别地,我们证明了最小捕获距离可以通过求解非线性优化问题来确定。结果发现,对于码率为1/3或更小的情况,最小捕获距离随块长度线性增长,尽管增长率系数非常小。
{"title":"On the minimum trapping distance of repeat accumulate accumulate codes","authors":"J. Kliewer, K. Zigangirov, D. J. Costello","doi":"10.1109/ALLERTON.2008.4797726","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797726","url":null,"abstract":"We consider the ensemble of codes formed by a serial concatenation of a repetition code with two accumulators through uniform random interleavers. For this ensemble, asymptotic expressions for the normalized minimum trapping distance are derived. We employ a variant of the Gallager-Zyablov-Pinsker bit flipping decoding algorithm on a binary symmetric channel, where the analysis is based on the factor graph of the code. In particular, we show that the minimum trapping distance can be determined by solving a non-linear optimization problem. As a result we find that the minimum trapping distance grows linearly with block length for code rates of 1/3 and smaller, albeit with very small growth rate coefficients.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124522592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trading off coding complexity and feedback requirements for the packet erasure channel 权衡编码复杂性和对包擦除通道的反馈需求
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797716
S. Puducheri, T. Fuja
We study the tradeoffs in employing two different approaches - coding and feedback - for reliable communication over packet erasure channels. Results are shown for a scheme that combines both approaches. Inspired by this scheme, we use rate distortion results to characterize the best achievable tradeoffs for a class of joint coding-and-feedback schemes.
我们研究了采用两种不同的方法-编码和反馈-在包擦除信道上进行可靠通信的权衡。结果显示了一个方案,结合这两种方法。受此方案的启发,我们使用速率失真结果来表征一类联合编码和反馈方案的最佳可实现折衷。
{"title":"Trading off coding complexity and feedback requirements for the packet erasure channel","authors":"S. Puducheri, T. Fuja","doi":"10.1109/ALLERTON.2008.4797716","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797716","url":null,"abstract":"We study the tradeoffs in employing two different approaches - coding and feedback - for reliable communication over packet erasure channels. Results are shown for a scheme that combines both approaches. Inspired by this scheme, we use rate distortion results to characterize the best achievable tradeoffs for a class of joint coding-and-feedback schemes.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115767118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
System level optimization in wireless networks with uncertain customer arrival rates 客户到达率不确定的无线网络系统级优化
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797671
Sungho Yun, C. Caramanis
We consider a system-level approach to interference management in a cellular broadband system operating in an interference-limited and highly dynamic regime, as put forth. Here, base stations in neighboring cells (partially) coordinate their transmission schedules in an attempt to avoid simultaneous transmission to their mutual cell edge. Limits on communication overhead and use of the backhaul require base station coordination to occur at a slower time scale than the arriving customers. Depending on the overhead restrictions, the slower time scale could be on the scale of minutes or even hours. Thus base stations coordinate using only the statistics of customer arrival, while they serve users based on the actual realizations. The central challenge is to properly structure coordination decisions at the slow time scale, as these subsequently restrict the actions of each base station until the next coordination period. A further challenge comes from the fact that over longer coordination intervals, the statistics of the arriving customers, e.g., the load, may themselves vary or be only approximately known. Indeed, we show through simulation that while the approach is effective for a broad range of arriving load, performance rapidly degrades as the variation of the arriving load from the nominal (or assured) arriving load grows. We show this is true even when the variations are neutral, namely when the aggregate load is fixed, but there are local variations. In this paper we show that a two-stage robust optimization framework is a natural way to model two time-scale decision problems. We provide tractable formulations for the base- station coordination problem, and show that our formulation is robust to fluctuations (uncertainties) in the arriving load. This tolerance to load fluctuation also serves to reduce the need for frequent re-optimization across base stations, thus helping minimize the communication overhead required for system level interference reduction. Building in robustness to load variation comes at the potential cost of somewhat degraded performance when variations happen to be very small. Our robust optimization formulations are flexible, allowing us to control the conservatism of the solution. Our simulations show that we can build in robustness without significant degradation of nominal performance.
我们考虑了在蜂窝宽带系统中运行在干扰限制和高动态状态下的系统级干扰管理方法。在这里,相邻小区中的基站(部分地)协调它们的传输调度,试图避免同时传输到它们的相互小区边缘。通信开销和回程使用的限制要求基站协调在比到达客户更慢的时间尺度上进行。根据开销限制,较慢的时间尺度可以是分钟甚至小时。因此,基站仅使用客户到达的统计数据进行协调,而它们根据实际实现为用户提供服务。主要的挑战是在缓慢的时间尺度上适当地组织协调决定,因为这些决定随后限制了每个基站的行动,直到下一个协调时期。进一步的挑战来自于这样一个事实,即在较长的协调间隔内,到达客户的统计数据(例如,负载)本身可能会变化或仅大致已知。事实上,我们通过模拟表明,虽然该方法对大范围的到达负载是有效的,但随着到达负载与名义(或保证)到达负载的变化增加,性能会迅速下降。我们证明,即使变化是中性的,即当总负荷是固定的,但存在局部变化时,这也是正确的。在本文中,我们证明了一个两阶段鲁棒优化框架是一个自然的方法来建模两个时间尺度决策问题。我们提供了易于处理的基站协调问题的公式,并证明了该公式对到达负载的波动(不确定性)具有鲁棒性。这种对负载波动的容忍度还有助于减少跨基站频繁重新优化的需要,从而有助于最大限度地减少系统级干扰所需的通信开销。当变化非常小时,为负载变化构建健壮性的潜在代价是性能下降。我们稳健的优化配方是灵活的,使我们能够控制解决方案的保守性。我们的模拟表明,我们可以在不显著降低标称性能的情况下构建鲁棒性。
{"title":"System level optimization in wireless networks with uncertain customer arrival rates","authors":"Sungho Yun, C. Caramanis","doi":"10.1109/ALLERTON.2008.4797671","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797671","url":null,"abstract":"We consider a system-level approach to interference management in a cellular broadband system operating in an interference-limited and highly dynamic regime, as put forth. Here, base stations in neighboring cells (partially) coordinate their transmission schedules in an attempt to avoid simultaneous transmission to their mutual cell edge. Limits on communication overhead and use of the backhaul require base station coordination to occur at a slower time scale than the arriving customers. Depending on the overhead restrictions, the slower time scale could be on the scale of minutes or even hours. Thus base stations coordinate using only the statistics of customer arrival, while they serve users based on the actual realizations. The central challenge is to properly structure coordination decisions at the slow time scale, as these subsequently restrict the actions of each base station until the next coordination period. A further challenge comes from the fact that over longer coordination intervals, the statistics of the arriving customers, e.g., the load, may themselves vary or be only approximately known. Indeed, we show through simulation that while the approach is effective for a broad range of arriving load, performance rapidly degrades as the variation of the arriving load from the nominal (or assured) arriving load grows. We show this is true even when the variations are neutral, namely when the aggregate load is fixed, but there are local variations. In this paper we show that a two-stage robust optimization framework is a natural way to model two time-scale decision problems. We provide tractable formulations for the base- station coordination problem, and show that our formulation is robust to fluctuations (uncertainties) in the arriving load. This tolerance to load fluctuation also serves to reduce the need for frequent re-optimization across base stations, thus helping minimize the communication overhead required for system level interference reduction. Building in robustness to load variation comes at the potential cost of somewhat degraded performance when variations happen to be very small. Our robust optimization formulations are flexible, allowing us to control the conservatism of the solution. Our simulations show that we can build in robustness without significant degradation of nominal performance.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114854383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Asymptotically optimal transmit strategies for the multiple antenna interference channel 多天线干扰信道的渐近最优传输策略
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797627
E. Larsson, D. Danev, Eduard Axel Jorswieck
We consider the interference channel with multiple antennas at the transmitter. We prove that at high signal-to-noise ratio (SNR), the zero-forcing transmit scheme is optimal in the sum-rate sense. Furthermore we prove that at low SNR, maximum-ratio transmission is optimal in the sum-rate sense. We also provide a discussion of the connection to classical results on spectral efficiency in the wideband regime. Finally, we propose a non-convex optimization approach based on monotonic optimization to solve the sum rate maximization problem.
我们考虑了发射机多天线干扰信道。我们证明了在高信噪比(SNR)下,强制零传输方案在和速率意义上是最优的。进一步证明了在低信噪比下,最大比传输在和速率意义上是最优的。我们还提供了一个讨论连接到经典结果的频谱效率在宽带制度。最后,我们提出了一种基于单调优化的非凸优化方法来解决和速率最大化问题。
{"title":"Asymptotically optimal transmit strategies for the multiple antenna interference channel","authors":"E. Larsson, D. Danev, Eduard Axel Jorswieck","doi":"10.1109/ALLERTON.2008.4797627","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797627","url":null,"abstract":"We consider the interference channel with multiple antennas at the transmitter. We prove that at high signal-to-noise ratio (SNR), the zero-forcing transmit scheme is optimal in the sum-rate sense. Furthermore we prove that at low SNR, maximum-ratio transmission is optimal in the sum-rate sense. We also provide a discussion of the connection to classical results on spectral efficiency in the wideband regime. Finally, we propose a non-convex optimization approach based on monotonic optimization to solve the sum rate maximization problem.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"282 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126916090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Modeling node capture attacks in wireless sensor networks 无线传感器网络节点捕获攻击建模
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797699
P. Tague, R. Poovendran
We formalize a model for node capture attacks in which an adversary collects information about the network via eavesdropping on the wireless medium and captures nodes based on the learned information. We show that attacks in this adversary model correspond to NP-hard optimization problems and discuss the behavior of a reasonable heuristic algorithm. We show that the goals of node capture attacks can be decomposed into a collection of primitive events, the impact of which can be evaluated and recombined to yield an overall evaluation of the attack. We demonstrate the use of the attack decomposition model for derivation of attack metrics and discuss the potential use of this decomposition technique for the purposes of defense against node capture attacks.
我们形式化了一个节点捕获攻击的模型,在该模型中,攻击者通过在无线介质上窃听来收集有关网络的信息,并根据所获得的信息捕获节点。我们证明了这种对手模型中的攻击对应于NP-hard优化问题,并讨论了合理的启发式算法的行为。我们表明,节点捕获攻击的目标可以分解为一组原始事件,这些事件的影响可以被评估和重组,以产生对攻击的总体评估。我们演示了使用攻击分解模型推导攻击度量,并讨论了这种分解技术在防御节点捕获攻击方面的潜在用途。
{"title":"Modeling node capture attacks in wireless sensor networks","authors":"P. Tague, R. Poovendran","doi":"10.1109/ALLERTON.2008.4797699","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797699","url":null,"abstract":"We formalize a model for node capture attacks in which an adversary collects information about the network via eavesdropping on the wireless medium and captures nodes based on the learned information. We show that attacks in this adversary model correspond to NP-hard optimization problems and discuss the behavior of a reasonable heuristic algorithm. We show that the goals of node capture attacks can be decomposed into a collection of primitive events, the impact of which can be evaluated and recombined to yield an overall evaluation of the attack. We demonstrate the use of the attack decomposition model for derivation of attack metrics and discuss the potential use of this decomposition technique for the purposes of defense against node capture attacks.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127055960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
On codes designed via algebraic lifts of graphs 论图的代数提升设计的码
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797704
C. Kelley
Over the past few years several constructions of protograph codes have been proposed that are based on random lifts of suitably chosen base graphs. More recently, an algebraic analog of this approach was introduced using the theory of voltage graphs. The strength of the voltage graph framework is the ability to analyze the resulting derived graph algebraically, even when the voltages themselves are assigned randomly. Moreover, the theory of voltage graphs provides insight to designing lifts of graphs with particular properties. In this paper we illustrate how the properties of the derived graphs and the corresponding codes relate to the voltage assignments. In particular, we present a construction of LDPC codes by giving an algebraic method of choosing the permutation voltages and illustrate the usefulness of the proposed technique via simulation results.
在过去的几年中,已经提出了几种基于适当选择的基图的随机提升的原型码结构。最近,使用电压图理论介绍了这种方法的代数模拟。电压图框架的强大之处在于,即使电压本身是随机分配的,它也能以代数方式分析得出的图。此外,电压图的理论为设计具有特定性质的图的提升提供了洞察力。在本文中,我们说明了推导图的性质和相应的代码与电压分配的关系。特别地,我们提出了一种LDPC码的构造方法,给出了选择排列电压的代数方法,并通过仿真结果说明了所提出技术的实用性。
{"title":"On codes designed via algebraic lifts of graphs","authors":"C. Kelley","doi":"10.1109/ALLERTON.2008.4797704","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797704","url":null,"abstract":"Over the past few years several constructions of protograph codes have been proposed that are based on random lifts of suitably chosen base graphs. More recently, an algebraic analog of this approach was introduced using the theory of voltage graphs. The strength of the voltage graph framework is the ability to analyze the resulting derived graph algebraically, even when the voltages themselves are assigned randomly. Moreover, the theory of voltage graphs provides insight to designing lifts of graphs with particular properties. In this paper we illustrate how the properties of the derived graphs and the corresponding codes relate to the voltage assignments. In particular, we present a construction of LDPC codes by giving an algebraic method of choosing the permutation voltages and illustrate the usefulness of the proposed technique via simulation results.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127307889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Generalized binary search 广义二叉搜索
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797609
R. Nowak
This paper studies a generalization of the classic binary search problem of locating a desired value within a sorted list. The classic problem can be viewed as determining the correct one-dimensional, binary-valued threshold function from a finite class of such functions based on queries taking the form of point samples of the function. The classic problem is also equivalent to a simple binary encoding of the threshold location. This paper extends binary search to learning more general binary-valued functions. Specifically, if the set of target functions and queries satisfy certain geometrical relationships, then an algorithm, based on selecting a query that is maximally discriminating at each step, will determine the correct function in a number of steps that is logarithmic in the number of functions under consideration. Examples of classes satisfying the geometrical relationships include linear separators in multiple dimensions. Extensions to handle noise are also discussed. Possible applications include machine learning, channel coding, and sequential experimental design.
本文研究了经典的二叉查找问题的推广,该问题是在一个排序列表中定位一个期望值。经典问题可以被看作是基于以函数的点样本形式的查询,从有限类这样的函数中确定正确的一维二值阈值函数。经典问题也等价于阈值位置的简单二进制编码。本文将二分查找扩展到学习更一般的二值函数。具体来说,如果目标函数和查询的集合满足某些几何关系,那么基于选择在每个步骤中具有最大区别性的查询的算法将在考虑的函数数量的对数步骤中确定正确的函数。满足几何关系的类的例子包括多维的线性分隔符。还讨论了处理噪声的扩展。可能的应用包括机器学习、信道编码和顺序实验设计。
{"title":"Generalized binary search","authors":"R. Nowak","doi":"10.1109/ALLERTON.2008.4797609","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797609","url":null,"abstract":"This paper studies a generalization of the classic binary search problem of locating a desired value within a sorted list. The classic problem can be viewed as determining the correct one-dimensional, binary-valued threshold function from a finite class of such functions based on queries taking the form of point samples of the function. The classic problem is also equivalent to a simple binary encoding of the threshold location. This paper extends binary search to learning more general binary-valued functions. Specifically, if the set of target functions and queries satisfy certain geometrical relationships, then an algorithm, based on selecting a query that is maximally discriminating at each step, will determine the correct function in a number of steps that is logarithmic in the number of functions under consideration. Examples of classes satisfying the geometrical relationships include linear separators in multiple dimensions. Extensions to handle noise are also discussed. Possible applications include machine learning, channel coding, and sequential experimental design.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122955738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 87
期刊
2008 46th Annual Allerton Conference on Communication, Control, and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1