The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we investigate multi-message authentication to combat adversaries with infinite computational capacity. An authentication framework over a wiretap channel (W_1, W_2) is proposed to achieve information-theoretic security with the same key. The proposed framework bridges the two research areas in physical (PHY) layer security: secure transmission and message authentication. Specifically,...
The existing secure transmission methods based on fountain codes require a quite dominant quality of the main channel. In this paper, we propose a novel feedback-based method for fountain code to achieve stronger security. In the binary erasure channel model, the legitimate user shares the decoding situation with transmitter via feedback messages. The transmitter updates the coding process based on...
Hybrid digital-analog (HDA) architectures have been widely developed for efficient digital transmission of analog speech, audio or video data. By considering the advantage of both digital and analog components, HDA systems gain better performances than purely analog and digital schemes in a wide range of channel conditions. However, HDA systems described in previous works are mostly designed for continuous-valued...
The arbitrarily varying channel (AVC) models communication over a channel that varies in an arbitrary and unknown manner from channel use to channel use. This paper considers the AVC under list decoding and studies the corresponding list capacity. In particular, the list capacity function is shown to be discontinuous and the corresponding discontinuity points are characterized for all possible list...
We prove an upper bound on the Shannon capacity of a graph via a linear programming variation. We also show that our bound can be better than Lovász theta number and Haemers minimum rank bound.
A cache-aided erasure broadcast channel is studied. The receivers are divided into two sets: the weak and strong receivers, where the receivers in the same set all have the same erasure probability. The weak receivers, in order to compensate for the high erasure probability, are equipped with cache memories of equal size, while the receivers in the strong set have no caches. Data can be pre-delivered...
In conventional system of wireless communication the source and the channel coding are used in different modules that increases the system complexity, cost and overall processing period. To make it more efficient, both the source and channel coding modules are combined in a single processing block, which not only decreases the system complexity but also reduces the overall processing cost. Multi Carrier...
Hybrid analog digital (HDA) architectures have been widely used in communication systems for analog source over discrete-time memoryless Gaussian channels. They employ a linear coding scheme in the analog parts, while considering separately the design of source and channel codes in the digital parts. To the best of our knowledge, none of the previous HDA schemes exploit the advantages of maintaining...
This paper presents a strategy for additional improvement of Coded Orthogonal Frequency Division Multiplexing properties of the mobile receiver. This improvement is a result of combining of soft decoding techniques with additional redundancies for error recognition and correction.
Secure data transfer is often achieved by encryption. However, if transmitting across a Binary Symmetric Channel while an eavesdropper listens via a Wiretap Channel, the difference in signal quality can be exploited to improve the inherent transmission secrecy. If this exploitation involves the managed use of erasures, then the secrecy of a code transmitted across the channel can be improved whilst...
We consider the problem of controlling an unstable plant over an additive white Gaussian noise (AWGN) channel with a transmit power constraint, where the signaling rate of communication is larger than the sampling rate (for generating observations and applying control inputs) of the underlying plant. Such a situation is quite common since sampling is done at a rate that captures the dynamics of the...
Jamming is an ongoing threat that plagues wireless communications in contested areas. Unfortunately, jamming complexity and sophistication will continue to increase over time. The traditional approach to addressing the jamming threat is to harden radios, such that they sacrifice communications performance for more advanced jamming protection. To provide an escape from this trend, we propose a jammer...
In this paper, a joint source-channel coding approach is taken to the problem of securely computing a function of distributed sources over a multiple-access wiretap channel that is linear with respect to a finite field. It is shown that if the joint source distribution fulfills certain conditions and the function to be computed matches the linear structure of the channel, secrecy comes for free in...
For physical-layer authentication, the authentication tags are often sent concurrently with messages without much bandwidth expansion. In this paper, we present a channel coding approach for physical-layer authentication. The generation of authentication tags can be formulated as an encoding process for an ensemble of codes, where the shared key between Alice and Bob is considered as the input and...
In this paper, we study the capacity region of the general distributed index coding. In contrast to the traditional centralized index coding where a single server contains all n messages requested by the receivers, in the distributed index coding there are 2n − 1 servers, each containing a unique non-empty subset J of the messages and each is connected to all receivers via a noiseless independent...
A recent transmission scheme called Packet-Appended Bit-Interleaved Coded Modulation with Iterative Decoding (PA-BICM-ID) consists in appending a conventional packet of Gray-labeled signals with some extra non-Gray-labeled signals in order to enable successful iterative decoding at the receiver side. In this paper, PA-BICM-ID is combined with Orthogonal Frequency Division Multiplexing (OFDM) with...
In this paper, an optimized codebook design based on rotated angles and extrinsic information transfer (EXIT) chart for a non-orthogonal multiple access scheme, called irregular sparse code multiple access (IrSCMA), is presented. Unlike regular SCMA, in IrSCMA, the defined degree of layer's resource nodes is different, which is beneficial to system performance.It is demonstrated that the new codebook...
This paper reports our implementation of an experimental system to generate DB-T2 signal based on a commercial FPGA (Field Programmable Gate Array) board with additional instruments. The baseband OFDM (Orthogonal Frequency Division Multiplexing) samples are computed offline via a C program. The OFDM samples are stored in an SD card for the FPGA board to read. The FPGA board converts the digital samples...
A rapid evolution in communication technologies has been observed over the last few years with large-scale deployment of 3G and 4G networks. With 5G already in the picture, time efficient communication systems which provide excellent error rates are currently being focused on. Multifaceted DPLL based topologies find place today as communication receivers. A Modified Phase Resolving NCO (MPR-NCO) based...
Undersea acoustic links are highly complex due to the various propagation effects like the spreading, multipath, intersymbol interference, fading, etc.. Orthogonal frequency division multiplexing is found to be a good choice to combat intersymbol interference. It enables simpler equalization as well. Coding can be used in conjunction with OFDM to achieve error correction, improved security as well...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.