286 results on '"Ashish Khisti"'
Search Results
102. Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage.
- Author
-
David P. Varodayan and Ashish Khisti
- Published
- 2011
- Full Text
- View/download PDF
103. A comparative analysis of biometric secret-key binding schemes based on QIM and Wyner-Ziv coding.
- Author
-
Aniketh Talwai, Francis Minhthang Bui, Ashish Khisti, and Dimitrios Hatzinakos
- Published
- 2011
- Full Text
- View/download PDF
104. Streaming data over fading wireless channels: The diversity-multiplexing tradeoff.
- Author
-
Ashish Khisti and Stark C. Draper
- Published
- 2011
- Full Text
- View/download PDF
105. Truncated tree codes for streaming data: Infinite-memory reliability using finite memory.
- Author
-
Stark C. Draper and Ashish Khisti
- Published
- 2011
- Full Text
- View/download PDF
106. On the MISO compound wiretap channel.
- Author
-
Ashish Khisti
- Published
- 2010
- Full Text
- View/download PDF
107. Diversity Embedded Streaming Erasure Codes (DE-SCo): Constructions and Optimality.
- Author
-
Ahmed Badr, Ashish Khisti, and Emin Martinian
- Published
- 2010
- Full Text
- View/download PDF
108. Multicast streaming codes (Mu-SCo) for burst erasure channels.
- Author
-
Ahmed Badr, Devin Lui, and Ashish Khisti
- Published
- 2010
- Full Text
- View/download PDF
109. Secure-broadcast codes over linear-deterministic channels.
- Author
-
Ashish Khisti, Danilo Silva 0001, and Frank R. Kschischang
- Published
- 2010
- Full Text
- View/download PDF
110. Secret key agreement using asymmetry in channel state knowledge.
- Author
-
Ashish Khisti, Gregory W. Wornell, and Suhas N. Diggavi
- Published
- 2009
- Full Text
- View/download PDF
111. On multicasting with streaming burst-erasure codes.
- Author
-
Jatinder P. Singh and Ashish Khisti
- Published
- 2009
- Full Text
- View/download PDF
112. Secret-key generation with correlated sources and noisy channels.
- Author
-
Ashish Khisti, Suhas N. Diggavi, and Gregory W. Wornell
- Published
- 2008
- Full Text
- View/download PDF
113. Using Distributed Source Coding to Secure Fingerprint Biometrics.
- Author
-
Stark C. Draper, Ashish Khisti, Emin Martinian, Anthony Vetro, and Jonathan S. Yedidia
- Published
- 2007
- Full Text
- View/download PDF
114. Lattice Strategies for the Dirty Multiple Access Channel.
- Author
-
Tal Philosof, Ashish Khisti, Uri Erez, and Ram Zamir
- Published
- 2007
- Full Text
- View/download PDF
115. On the Gaussian MIMO Wiretap Channel.
- Author
-
Ashish Khisti, Gregory W. Wornell, Ami Wiesel, and Yonina C. Eldar
- Published
- 2007
- Full Text
- View/download PDF
116. Low complexity virtual antenna arrays using cooperative relay selection.
- Author
-
Aggelos Bletsas, Ashish Khisti, and Moe Z. Win
- Published
- 2006
- Full Text
- View/download PDF
117. Information Embedding with Distortion Side Information.
- Author
-
Ashish Khisti, Emin Martinian, and Gregory W. Wornell
- Published
- 2006
- Full Text
- View/download PDF
118. Information Theoretic Perspectives on Synchronization.
- Author
-
Aslan Tchamkerten, Ashish Khisti, and Gregory W. Wornell
- Published
- 2006
- Full Text
- View/download PDF
119. Hybrid Distributed Video Coding Using SCA Codes.
- Author
-
Emin Martinian, Anthony Vetro, Jonathan S. Yedidia, João Ascenso, Ashish Khisti, and Dmitry Malioutov
- Published
- 2006
- Full Text
- View/download PDF
120. On the coding-spreading tradeoff and intra-cell frequency planning in uplink CDMA systems.
- Author
-
Ashish Khisti and Mitchell D. Trott
- Published
- 2004
- Full Text
- View/download PDF
121. Distributed source coding using serially-concatenated-accumulate codes.
- Author
-
Johnny Chen, Ashish Khisti, Dmitry Malioutov, and Jonathan S. Yedidia
- Published
- 2004
- Full Text
- View/download PDF
122. Session MA2b: Delay sensitive communication.
- Author
-
Ashish Khisti
- Published
- 2011
- Full Text
- View/download PDF
123. Adaptive relaying for streaming erasure codes in a three node relay network
- Author
-
Gustavo Kasper Facenda, M. Nikhil Krishnan, Elad Domanovitz, Silas L. Fong, Ashish Khisti, Wai-Tian Tan, and John Apostolopoulos
- Subjects
FOS: Computer and information sciences ,Information Theory (cs.IT) ,Computer Science - Information Theory ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Computer Science::Networking and Internet Architecture ,Data_CODINGANDINFORMATIONTHEORY ,Library and Information Sciences ,Computer Science Applications ,Information Systems ,Computer Science::Information Theory - Abstract
This paper investigates adaptive streaming codes over a three-node relayed network. In this setting, a source node transmits a sequence of message packets to a destination through a relay. The source-to-relay and relay-to-destination links are unreliable and introduce at most $N_1$ and $N_2$ packet erasures, respectively. The destination node must recover each message packet within a strict delay constraint $T$. The paper presents achievable streaming codes for all feasible parameters $\{N_1, N_2, T\}$ that exploit the fact that the relay naturally observes the erasure pattern occurring in the link from source to relay, thus it can adapt its relaying strategy based on these observations. In a recent work, Fong et al. provide streaming codes featuring channel-state-independent relaying strategies. The codes proposed in this paper achieve rates higher than the ones proposed by Fong et al. whenever $N_2 > N_1$, and achieve the same rate when $N_2 = N_1$. The paper also presents an upper bound on the achievable rate that takes into account erasures in both links in order to bound the rate in the second link. The upper bound is shown to be tighter than a trivial bound that considers only the erasures in the second link., Paper has been submitted to transactions on information theory
- Published
- 2022
124. Optimal Multiplexed Erasure Codes for Streaming Messages With Different Decoding Delays
- Author
-
Ashish Khisti, Silas L. Fong, Wai-Tian Tan, Xiaoqing Zhu, John G. Apostolopoulos, and Baochun Li
- Subjects
FOS: Computer and information sciences ,Current (mathematics) ,Computer science ,Computer Science - Information Theory ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Library and Information Sciences ,Multiplexing ,Channel (programming) ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Code (cryptography) ,Forward error correction ,Computer Science::Information Theory ,Physics ,Discrete mathematics ,Sequence ,Network packet ,Information Theory (cs.IT) ,Packet erasure channel ,020206 networking & telecommunications ,Computer Science Applications ,Erasure ,Erasure code ,Algorithm ,Decoding methods ,Communication channel ,Information Systems - Abstract
This paper considers multiplexing two sequences of messages with two different decoding delays over a packet erasure channel. In each time slot, the source constructs a packet based on the current and previous messages and transmits the packet, which may be erased when the packet travels from the source to the destination. The destination must perfectly recover every source message in the first sequence subject to a decoding delay $T_\mathrm{v}$ and every source message in the second sequence subject to a shorter decoding delay $T_\mathrm{u}\le T_\mathrm{v}$. We assume that the channel loss model introduces a burst erasure of a fixed length $B$ on the discrete timeline. Under this channel loss assumption, the capacity region for the case where $T_\mathrm{v}\le T_\mathrm{u}+B$ was previously solved. In this paper, we fully characterize the capacity region for the remaining case $T_\mathrm{v}> T_\mathrm{u}+B$. The key step in the achievability proof is achieving the non-trivial corner point of the capacity region through using a multiplexed streaming code constructed by superimposing two single-stream codes. The main idea in the converse proof is obtaining a genie-aided bound when the channel is subject to a periodic erasure pattern where each period consists of a length-$B$ burst erasure followed by a length-$T_\mathrm{u}$ noiseless duration., 20 pages, 1 figure, 1 table, presented in part at 2019 IEEE ISIT
- Published
- 2020
125. Regularized Classification-Aware Quantization
- Author
-
Daniel Severo, Elad Domanovitz, and Ashish Khisti
- Published
- 2022
126. Compressing Multisets with Large Alphabets
- Author
-
Daniel Severo, James Townsend, Ashish Khisti, Alireza Makhzani, and Karen Ullrich
- Subjects
Media Technology - Published
- 2023
127. Guaranteed Rate of Streaming Erasure Codes over Multi-Link Multi-hop Network
- Author
-
Wai-Tian Tan, Gustavo Kasper Facenda, John G. Apostolopoulos, Elad Domanovitz, and Ashish Khisti
- Subjects
Computer science ,business.industry ,Multi link ,Hop (telecommunications) ,Erasure code ,business ,Computer network - Published
- 2021
128. High Rate Streaming Codes Over the Three-Node Relay Network
- Author
-
John G. Apostolopoulos, Elad Domanovitz, Ashish Khisti, Wai-Tian Tan, M. Nikhil Krishnan, and Gustavo Kasper Facenda
- Subjects
High rate ,Computer science ,business.industry ,Node (networking) ,Relay network ,business ,Computer network - Published
- 2021
129. Corrections to 'Optimal Streaming Erasure Codes Over the Three-Node Relay Network'
- Author
-
Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, and John Apostolopoulos
- Subjects
Library and Information Sciences ,Computer Science Applications ,Information Systems - Published
- 2022
130. Streaming Erasure Codes over Multi-Access Relay Networks
- Author
-
John G. Apostolopoulos, Elad Domanovitz, Gustavo Kasper Facenda, Ashish Khisti, and Wai-Tian Tan
- Subjects
business.industry ,Computer science ,Node (networking) ,Concatenation ,Information theory ,law.invention ,Transmission (telecommunications) ,Relay ,law ,Server ,Latency (engineering) ,business ,Erasure code ,Computer Science::Information Theory ,Computer network - Abstract
Applications where multiple users communicate with a common server and desire low latency are common and increasing. This paper studies a network with two source nodes, one relay node and a destination node, where each source nodes wishes to transmit a sequence of messages, through the relay, to the destination, who is required to decode the messages with a strict delay constraint $T$ . The network with a single source node has been studied in [1]. We start by introducing two important tools: the delay spectrum, which generalizes delay-constrained point-to-point transmission, and concatenation, which, similar to time sharing, allows combinations of different codes in order to achieve a desired regime of operation. Using these tools, we are able to generalize the two schemes previously presented in [1], and propose a novel scheme which allows us to achieve optimal rates under a set of well-defined conditions. Such novel scheme is further improved in order to achieve higher rates in the scenarios where the conditions for optimality are not met.
- Published
- 2021
131. Effect of User Cooperation on Smart Meter Privacy With Rechargeable Batteries
- Author
-
Si-Hyeon Lee, Kang-Hee Cho, and Ashish Khisti
- Subjects
Battery (electricity) ,business.industry ,Computer science ,Smart meter ,Applied Mathematics ,020206 networking & telecommunications ,02 engineering and technology ,Masking (Electronic Health Record) ,Load profile ,Hardware_GENERAL ,Signal Processing ,Information leakage ,0202 electrical engineering, electronic engineering, information engineering ,Metering mode ,Electrical and Electronic Engineering ,business ,Computer network - Abstract
In smart metering systems, a rechargeable battery can be utilized to protect the privacy of a user from the utility provider by partially masking the load profile of the user. In this line of research on using rechargeable batteries for privacy protection, most existing works have studied only single-user systems using rechargeable batteries. In this letter, we consider a multi-user scenario where the power supplies of two or more users are combined before sending them to the utility provider. We study the effect of such a user cooperation on enhancing the user privacy by deriving upper and lower bounds on the minimum leakage rate. Our simulation results show that the information leakage of each user can be reduced by a factor of the total number of cooperative users.
- Published
- 2019
132. Tracking and Control of Gauss–Markov Processes over Packet-Drop Channels with Acknowledgments
- Author
-
Babak Hassibi, Victoria Kostina, Ashish Khisti, and Anatoly Khina
- Subjects
FOS: Computer and information sciences ,0209 industrial biotechnology ,Control and Optimization ,Minimum mean square error ,Computer Networks and Communications ,Computer science ,Network packet ,Information Theory (cs.IT) ,Computer Science - Information Theory ,Estimator ,Markov process ,020206 networking & telecommunications ,02 engineering and technology ,AC power ,Linear-quadratic-Gaussian control ,symbols.namesake ,020901 industrial engineering & automation ,Control and Systems Engineering ,Control system ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Algorithm ,Coding (social sciences) - Abstract
We consider the problem of tracking the state of Gauss-Markov processes over rate-limited erasure-prone links. We concentrate first on the scenario in which several independent processes are seen by a single observer. The observer maps the processes into finite-rate packets that are sent over the erasure-prone links to a state estimator, and are acknowledged upon packet arrivals. The aim of the state estimator is to track the processes with zero delay and with minimum mean square error (MMSE). We show that, in the limit of many processes, greedy quantization with respect to the squared error distortion is optimal. That is, there is no tension between optimizing the MMSE of the process in the current time instant and that of future times. For the case of packet erasures with delayed acknowledgments, we connect the problem to that of compression with side information that is known at the observer and may be known at the state estimator - where the most recent packets serve as side information that may have been erased, and demonstrate that the loss due to a delay by one time unit is rather small. For the scenario where only one process is tracked by the observer-state estimator system, we further show that variable-length coding techniques are within a small gap of the many-process outer bound. We demonstrate the usefulness of the proposed approach for the simple setting of discrete-time scalar linear quadratic Gaussian control with a limited data-rate feedback that is susceptible to packet erasures.
- Published
- 2019
133. Streaming Erasure Codes over Multi-hop Relay Network
- Author
-
John G. Apostolopoulos, Elad Domanovitz, Xiaoqing Zhu, Wai-Tian Tan, and Ashish Khisti
- Subjects
FOS: Computer and information sciences ,Computer science ,Computer Science - Information Theory ,0211 other engineering and technologies ,02 engineering and technology ,Data_CODINGANDINFORMATIONTHEORY ,Upper and lower bounds ,law.invention ,Relay ,law ,Header ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Computer Science::Information Theory ,021110 strategic, defence & security studies ,business.industry ,Information Theory (cs.IT) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Packet erasure channel ,020206 networking & telecommunications ,Transmission (telecommunications) ,Erasure ,Erasure code ,business ,Communication channel ,Computer network - Abstract
This paper studies low-latency streaming codes for the multi-hop network. The source is transmitting a sequence of messages (streaming messages) to a destination through a chain of relays where each hop is subject to packet erasures. Every source message has to be recovered perfectly at the destination within a delay constraint of $T$ time slots. In any sliding window of $T+1$ time slots, we assume no more than $N_j$ erasures introduced by the $j$'th hop channel. The capacity in case of a single relay (a three-node network) was derived by Fong [1], et al. While the converse derived for the three-node case can be extended to any number of nodes using a similar technique (analyzing the case where erasures on other links are consecutive), we demonstrate next that the achievable scheme, which suggested a clever symbol-wise decode and forward strategy, can not be straightforwardly extended without a loss in performance. The coding scheme for the three-node network, which was shown to achieve the upper bound, was ``state-independent'' (i.e., it does not depend on specific erasure pattern). While this is a very desirable property, in this paper, we suggest a ``state-dependent'' (i.e., a scheme which depends on specific erasure pattern) and show that it achieves the upper bound up to the size of an additional header. Since, as we show, the size of the header does not depend on the field size, the gap between the achievable rate and the upper bound decreases as the field size increases.
- Published
- 2020
134. The Wiretapped Diamond-Relay Channel
- Author
-
Ashish Khisti and Si-Hyeon Lee
- Subjects
FOS: Computer and information sciences ,Beamforming ,Computer science ,Computer Science - Information Theory ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Library and Information Sciences ,law.invention ,Relay ,law ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,0601 history and archaeology ,Interference alignment ,Computer Science::Cryptography and Security ,Computer Science::Information Theory ,060102 archaeology ,Wireless network ,business.industry ,Information Theory (cs.IT) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,06 humanities and the arts ,Computer Science Applications ,Transmission (telecommunications) ,Channel state information ,Linear network coding ,business ,Relay channel ,Information Systems ,Communication channel ,Computer network - Abstract
In this paper, we study a diamond-relay channel where the source is connected to $M$ relays through orthogonal links and the relays transmit to the destination over a wireless multiple-access channel in the presence of an eavesdropper. The eavesdropper not only observes the relay transmissions through another multiple-access channel, but also observes a certain number of source-relay links. The legitimate terminals know neither the eavesdropper's channel state information nor the location of source-relay links revealed to the eavesdropper except the total number of such links. For this wiretapped diamond-relay channel, we establish the optimal secure degrees of freedom. In the achievability part, our proposed scheme uses the source-relay links to transmit a judiciously constructed combination of message symbols, artificial noise symbols as well as fictitious message symbols associated with secure network coding. The relays use a combination of beamforming and interference alignment in their transmission scheme. For the converse part, we take a genie-aided approach assuming that the location of wiretapped links is known., Comment: 30 pages, 4 figures, Submitted to IEEE Transactions on Information Theory
- Published
- 2018
135. Streaming Codes for Multiplicative-Matrix Channels With Burst Rank Loss
- Author
-
Ahmed Badr, Ashish Khisti, and Rafid Mahmood
- Subjects
060102 archaeology ,Rank (linear algebra) ,Computer science ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,06 humanities and the arts ,02 engineering and technology ,Library and Information Sciences ,Loss network ,Binary erasure channel ,Computer Science Applications ,Packet loss ,Linear network coding ,0202 electrical engineering, electronic engineering, information engineering ,Erasure ,0601 history and archaeology ,Algorithm ,Decoding methods ,Computer Science::Information Theory ,Information Systems ,Communication channel - Abstract
The burst rank loss network is an extension of the burst erasure channel, where the channel matrix between the sender and receiver becomes rank-deficient for a certain period of consecutive time-slots. We study streaming communication over the burst rank loss channel, propose a new class of codes, ROBIN codes, and establish their optimality. Our construction uses the maximum rank distance and maximum sum rank codes from previous works as constituent codes and combines them in a layered fashion. Our results generalize previous works on both the single-link and multiple-parallel-link streaming setups over burst erasure channels. We perform simulations over statistical network models to show that ROBIN codes attain low packet loss rates in comparison with the existing codes.
- Published
- 2018
136. Guest Editorial Physical Layer Security for 5G Wireless Networks, Part II
- Author
-
Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, and Xiqi Gao
- Subjects
Computer Networks and Communications ,Electrical and Electronic Engineering - Published
- 2018
137. Multiplexed Coding for Multiple Streams With Different Decoding Delays
- Author
-
Devin Lui, Ahmed Badr, Ashish Khisti, Wai-Tian Tan, Xiaoqing Zhu, and John G. Apostolopoulos
- Subjects
Computer science ,Network packet ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Library and Information Sciences ,Multiplexing ,Computer Science Applications ,Computer Science::Multimedia ,0202 electrical engineering, electronic engineering, information engineering ,Erasure ,020201 artificial intelligence & image processing ,Forward error correction ,Encoder ,Algorithm ,Decoding methods ,Computer Science::Information Theory ,Information Systems ,Parity bit ,Communication channel ,Coding (social sciences) - Abstract
We consider a communication setup where two source streams with different decoding deadlines, must be simultaneously transmitted over a single channel subjected to burst erasures. The encoder multiplexes the two source streams into a single stream of channel-packets. The decoder must recover the two source streams sequentially by their corresponding deadlines. One of the streams, the urgent stream, has a smaller delay than the other stream. We study the capacity region for such a setting for a certain range of system parameters. We divide the system into three different cases based on the relative values of the delays. For each case we provide achievability and converse bounds, which match under certain conditions. Our proposed coding scheme involves a careful construction of the parity check packets by jointly coding across the two streams despite different deadlines. Interestingly it is possible to transmit the urgent stream at a certain positive rate even when the sum rate equals the capacity associated with the less urgent stream. A separation based approach where we apply separate single-stream codes to each stream is suboptimal. Although our capacity results assume a simplistic channel model with a single erasure burst, we further demonstrate that our proposed code constructions also provide significant performance gains in simulations over statistical channel models with random bursts.
- Published
- 2018
138. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
- Author
-
Chengshan Xiao, Ashish Khisti, Kai-Kit Wong, Xiqi Gao, Giuseppe Caire, and Yongpeng Wu
- Subjects
FOS: Computer and information sciences ,Computer Networks and Communications ,Computer science ,Network security ,business.industry ,Wireless network ,Computer Science - Information Theory ,Information Theory (cs.IT) ,Physical layer ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Electrical and Electronic Engineering ,business ,computer ,Heterogeneous network ,5G - Abstract
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed., Comment: To appear in IEEE Journal on Selected Areas in Communications
- Published
- 2018
139. Guest Editorial Physical Layer Security for 5G Wireless Networks, Part I
- Author
-
Chengshan Xiao, Yongpeng Wu, Ashish Khisti, Giuseppe Caire, Kai-Kit Wong, and Xiqi Gao
- Subjects
Computer Networks and Communications ,Computer science ,Network security ,business.industry ,Wireless network ,Mobile broadband ,Physical layer ,Cryptography ,Computer security ,computer.software_genre ,Wireless ,Electrical and Electronic Engineering ,business ,computer ,5G - Abstract
The unprecedented growth in the number of mobile data and connected machines ever-fast approaches limits of fourth generation technologies to address this enormous data demand. Therefore, the development of the fifth generation (5G) wireless communication technologies is a priority issue currently. The evolution towards 5G wireless communications will be a cornerstone for realizing the future human-centric and connected machine-centric networks, which achieve near-instantaneous, zero distance connectivity for people and connected machines. On the other hand, wireless networks have been widely used in civilian and military applications and become an indispensable part of our daily life. People rely heavily on wireless networks for transmission of important/private information, such as credit card information, energy pricing, e-health data, command, and control messages. Therefore, security is a critical issue for future 5G wireless networks. Physical layer security techniques can be used to either perform secure data transmission directly or generate the distribution of cryptography keys for conventional cryptography techniques in the 5G networks. With careful management and implementation, physical layer security can be used as an additional level of protection on top of the existing security schemes. As such, they will formulate a well-integrated security solution together that efficiently safeguards the confidential and privacy communication data in 5G wireless networks. The main goal of this IEEE JSAC Special Issue on “Physical Layer Security for 5G Wireless Networks” is to bring together leading researchers in both academia and industry from diversified backgrounds to advance the theory and practice of physical layer security for 5G wireless networks.
- Published
- 2018
140. The MIMO Wiretap Channel Decomposed
- Author
-
Anatoly Khina, Ashish Khisti, and Yuval Kochman
- Subjects
FOS: Computer and information sciences ,021110 strategic, defence & security studies ,Computer science ,Computer Science - Information Theory ,Information Theory (cs.IT) ,Gaussian ,MIMO ,0211 other engineering and technologies ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Library and Information Sciences ,Topology ,Computer Science Applications ,Matrix decomposition ,symbols.namesake ,Channel capacity ,Single antenna interference cancellation ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Computer Science::Cryptography and Security ,Computer Science::Information Theory ,Information Systems ,Communication channel - Abstract
The problem of sending a secret message over the Gaussian multiple-input multiple-output (MIMO) wiretap channel is studied. While the capacity of this channel is known, it is not clear how to construct optimal coding schemes that achieve this capacity. In this work, we use linear operations along with successive interference cancellation to attain effective parallel single-antenna wiretap channels. By using independent scalar Gaussian wiretap codebooks over the resulting parallel channels, the capacity of the MIMO wiretap channel is achieved. The derivation of the schemes is based upon joint triangularization of the channel matrices. We find that the same technique can be used to re-derive capacity expressions for the MIMO wiretap channel in a way that is simple and closely connected to a transmission scheme. This technique allows to extend the previously proven strong security for scalar Gaussian channels to the MIMO case. We further consider the problem of transmitting confidential messages over a two-user broadcast MIMO channel. For that problem, we find that derivation of both the capacity and a transmission scheme is a direct corollary of the proposed analysis for the MIMO wiretap channel., Comment: Submitted to IEEE Transactions on Information Theory Aug. 2015; revised Oct. 2016
- Published
- 2018
141. A Truncated Prediction Framework for Streaming Over Erasure Channels
- Author
-
Ashish Khisti, Jun Chen, and Farrokh Etezadi
- Subjects
Independent and identically distributed random variables ,Theoretical computer science ,020206 networking & telecommunications ,Data compression ratio ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Library and Information Sciences ,Binary erasure channel ,Upper and lower bounds ,Computer Science Applications ,0202 electrical engineering, electronic engineering, information engineering ,Erasure ,Algorithm ,Decoding methods ,Group of pictures ,Computer Science::Information Theory ,Information Systems ,Mathematics ,Communication channel - Abstract
We propose a new coding technique for sequential transmission of a stream of Gauss–Markov sources over erasure channels under a zero decoding delay constraint. Our proposed scheme is a combination (hybrid) of predictive coding with truncated memory, and quantization-and-binning. We study the optimality of our proposed scheme using an information theoretic model. In our setup, the encoder observes a stream of source vectors that are spatially independent and identically distributed (i.i.d.) and temporally sampled from a first-order stationary Gauss–Markov process. The channel introduces an erasure burst of a certain maximum length $B$ , starting at an arbitrary time, not known to the transmitter. The reconstruction of each source vector at the destination must be with zero delay and satisfy a quadratic distortion constraint with an average distortion of $D$ . The decoder is not required to reconstruct those source vectors that belong to the period spanning the erasure burst and a recovery window of length $W$ following it. We study the minimum compression rate $R(B,W,D)$ in this setup. As our main result, we establish upper and lower bounds on the compression rate. The upper bound (achievability) is based on our hybrid scheme. It achieves significant gains over baseline schemes such as (leaky) predictive coding, memoryless binning, a separation-based scheme, and a group of pictures-based scheme. The lower bound is established by observing connection to a network source coding problem. The bounds simplify in the high resolution regime, where we provide explicit expressions whenever possible, and identify conditions when the proposed scheme is close to optimal. We finally discuss the interplay between the parameters of our burst erasure channel and the statistical channel models and explain how the bounds in the former model can be used to derive insights into the simulation results involving the latter. In particular, our proposed scheme outperforms the baseline schemes over the i.i.d. erasure channel and the Gilbert–Elliott channel, and achieves performance close to a lower bound in some regimes.
- Published
- 2017
142. Information-Theoretic Privacy in Smart Metering Systems Using Cascaded Rechargeable Batteries
- Author
-
Ashish Khisti, Yuhan Helena Liu, and Si-Hyeon Lee
- Subjects
Battery (electricity) ,021110 strategic, defence & security studies ,business.industry ,Computer science ,Applied Mathematics ,0211 other engineering and technologies ,Electrical engineering ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,Load profile ,Hardware_GENERAL ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Metering mode ,Electricity ,Electrical and Electronic Engineering ,business ,computer ,Leakage (electronics) - Abstract
A rechargeable battery may alleviate the issue of privacy loss in a smart metering system by distorting a household's load profile. However, existing studies involve a single rechargeable battery, whereas in a network scenario, there could be multiple batteries connected together. In this letter, we study the extension where a user's electricity load is input into a network of two rechargeable batteries, connected in series, and operating individually. This battery network attempts to mask the user load from the utility provider. We focus on the case of independent identically distributed load profile and a system of ideal batteries with no conversion loss, and use normalized mutual information (leakage rate) as the privacy metric. We derive upper and lower bounds on the leakage rate in terms of (single-letter) mutual information expressions. On the achievability side, our information-theoretic upper bound captures the novel tension between minimizing the leakage across each individual battery and the effect of their joint interaction. For the lower bound, we show that a system with a single battery, whose storage capacity is the sum of the two individual batteries, can achieve a leakage rate at least as small as our proposed setup. Furthermore, we use simulations to compare achievable leakage of our proposed scheme with several baseline schemes. The achievable leakage rates obtained in this study could help us to elucidate the privacy performance of a network of batteries.
- Published
- 2017
143. Perfecting Protection for Interactive Multimedia: A survey of forward error correction for low-delay interactive applications
- Author
-
John Apolstolopoulos, Ahmed Badr, Ashish Khisti, and Wai-Tian Tan
- Subjects
Interleaving ,business.industry ,Computer science ,Network packet ,Applied Mathematics ,Real-time computing ,Latency (audio) ,020206 networking & telecommunications ,02 engineering and technology ,Encoding (memory) ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Forward error correction ,Electrical and Electronic Engineering ,business ,Interactive media ,Decoding methods ,Computer network ,Block (data storage) - Abstract
Many current and emerging applications require low-latency communication, including interactive voice and video communication, multiplayer gaming, multiperson augmented/virtual reality, and various Internet of Things (IoT) applications. Forward error correction (FEC) codes for low-delay interactive applications have several characteristics that distinguish them from traditional FEC. The encoding and decoding operations must process a stream of data packets in a sequential fashion. Strict latency constraints limit the use of long block lengths, interleaving, or large buffers. Furthermore, these codes must achieve fast recovery from burst losses and yet be robust to other types of loss patterns.
- Published
- 2017
144. The Gaussian Diamond-Wiretap Channel With Rate-Limited Relay Cooperation
- Author
-
Ashish Khisti and Si-Hyeon Lee
- Subjects
Computer science ,Gaussian ,Jamming ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,law.invention ,symbols.namesake ,Relay ,law ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Computer Science::Cryptography and Security ,Computer Science::Information Theory ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,Computer Science Applications ,Channel state information ,Modeling and Simulation ,Linear network coding ,symbols ,020201 artificial intelligence & image processing ,Telecommunications ,business ,Relay channel ,Communication channel ,Computer network - Abstract
In this letter, we establish the secure degrees-of-freedom of the Gaussian diamond-wiretap channel with rate-limited relay cooperation, where the eavesdropper not only observes the relay transmission through another multiple access channel but also wiretaps some of communication links among relays. The legitimate parties do not know the location of wiretapped relay links nor the eavesdropper’s channel state information. As an optimal relay cooperation strategy, a noise-forwarding scheme that does not incorporate secure network coding is adopted. Furthermore, we briefly outline how the scheme can be extended to incorporate the case when the source-relay links are also wiretapped.
- Published
- 2017
145. Streaming Data Transmission in the Moderate Deviations and Central Limit Regimes
- Author
-
Ashish Khisti, Vincent Y. F. Tan, and Si-Hyeon Lee
- Subjects
Decodes ,FOS: Computer and information sciences ,Block code ,Computer Science - Information Theory ,Monte Carlo method ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Library and Information Sciences ,01 natural sciences ,0103 physical sciences ,Statistics ,0202 electrical engineering, electronic engineering, information engineering ,010306 general physics ,Computer Science::Information Theory ,Central limit theorem ,Mathematics ,biology ,Information Theory (cs.IT) ,020206 networking & telecommunications ,Code rate ,biology.organism_classification ,Computer Science Applications ,Exponent ,Erasure ,Encoder ,Algorithm ,Decoding methods ,Information Systems ,Coding (social sciences) - Abstract
We consider streaming data transmission over a discrete memoryless channel. A new message is given to the encoder at the beginning of each block and the decoder decodes each message sequentially, after a delay of $T$ blocks. In this streaming setup, we study the fundamental interplay between the rate and error probability in the central limit and moderate deviations regimes and show that i) in the moderate deviations regime, the moderate deviations constant improves over the block coding or non-streaming setup by a factor of $T$ and ii) in the central limit regime, the second-order coding rate improves by a factor of approximately $\sqrt{T}$ for a wide range of channel parameters. For both regimes, we propose coding techniques that incorporate a joint encoding of fresh and previous messages. In particular, for the central limit regime, we propose a coding technique with truncated memory to ensure that a summation of constants, which arises as a result of applications of the central limit theorem, does not diverge in the error analysis. Furthermore, we explore interesting variants of the basic streaming setup in the moderate deviations regime. We first consider a scenario with an erasure option at the decoder and show that both the exponents of the total error and the undetected error probabilities improve by factors of $T$. Next, by utilizing the erasure option, we show that the exponent of the total error probability can be improved to that of the undetected error probability (in the order sense) at the expense of a variable decoding delay. Finally, we also extend our results to the case where the message rate is not fixed but alternates between two values., Comment: 36 pages, 3 figures, Submitted to IEEE Transactions on Information Theory
- Published
- 2016
146. Phase-Only Zero Forcing for Secure Communication With Multiple Antennas
- Author
-
Ashish Khisti, Wanyao Zhao, and Si-Hyeon Lee
- Subjects
Beamforming ,Mathematical optimization ,WSDMA ,Heuristic (computer science) ,MIMO ,020302 automobile design & engineering ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Topology ,Precoding ,0203 mechanical engineering ,Transmission (telecommunications) ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Artificial noise ,Electrical and Electronic Engineering ,Computer Science::Information Theory ,Rayleigh fading ,Mathematics - Abstract
Artificial noise (AN) transmission can enhance the secrecy in multiantenna wireless channels by superimposing judiciously constructed synthetic noise signals over information signals during transmission. Motivated by the large-scale multiple-input multiple-output systems, we study AN transmission under a constraint that all elements (weights) in each beamforming vector must have a constant magnitude, but can have arbitrary phases. For the special case of one AN beamforming vector and one legitimate receiver, we derive a necessary and sufficient condition for finding a beamforming vector in the null space of the legitimate receiver's channel and provide a geometric interpretation. For the independent identically distributed Rayleigh fading channel, we derive an approximate expression for the probability of failing to find such a beamforming vector, and show that it decreases exponentially in the square of the number of transmit antennas. For the general case, we propose a numerical algorithm for obtaining a set of mutually orthogonal AN beamforming vectors in the null space of all the receivers. Our approach involves reducing the problem to an unconstrained nonlinear programming problem, which is then solved using the Gauss–Newton method. We show numerically that our proposed algorithm performs significantly better than a heuristic relaxation approach. Finally, for a multiantenna system with multiple RF chains, we show numerically that the secrecy rate achieved by our proposed approach is close to that achieved by the AN transmission with unconstrained beamforming, when the number of transmit antennas is sufficiently large.
- Published
- 2016
147. Secret-Key Agreement Over Non-Coherent Block-Fading Channels With Public Discussion
- Author
-
Ashish Khisti
- Subjects
021110 strategic, defence & security studies ,business.industry ,0211 other engineering and technologies ,020206 networking & telecommunications ,02 engineering and technology ,Library and Information Sciences ,Topology ,Upper and lower bounds ,Computer Science Applications ,Channel state information ,0202 electrical engineering, electronic engineering, information engineering ,Coherence (signal processing) ,Wireless ,Fading ,Remainder ,Telecommunications ,business ,Computer Science::Information Theory ,Information Systems ,Mathematics ,Communication channel ,Rayleigh fading - Abstract
Motivated by recent interest in physical-layer secret-key generation over wireless fading channels, we study the non-coherent secret-key generation capacity of a block-fading wireless channel with channel reciprocity and bi-directional (two-way) communication. We assume a non-coherent main channel, i.e., the realization of channel gains on the main channel is not known to any terminal. The eavesdropper is assumed to have both perfect Channel State Information of its own channel and orthogonal observations from the forward and backward channels. As our main result, we establish new upper and lower bounds on the secret-key generation capacity with public discussion, which are structurally similar. The upper bound can be expressed as a sum of three terms—one of the terms arises due to channel reciprocity, while the other two terms correspond to communication on the forward and backward channels, respectively. In the limit of long coherence period, the contribution from channel reciprocity vanishes to zero, whereas the other terms prevail. The lower bound is based on a separation based scheme. In each coherence block, we use the first symbol for training while the remainder of the coherence block is devoted to source emulation, i.e., to generate correlated sources between the terminals. The lower bound expression also consists of three terms and admits an interpretation similar to the upper bound expression. For Rayleigh fading channels, in the high signal-to-noise ratio (SNR) regime, the gap between the upper and lower bounds is shown to vanish inversely with the coherence period. Numerical results indicate significant performance gains over training-only schemes even for moderate values of SNR and small coherence periods.
- Published
- 2016
148. An Explicit Construction of Optimal Streaming Codes for Channels with Burst and Arbitrary Erasures
- Author
-
Ashish Khisti, Damian Dudzicz, and Silas L. Fong
- Subjects
Block code ,FOS: Computer and information sciences ,decoding ,correcting codes ,Computer science ,Generalization ,Computer Science - Information Theory ,0102 computer and information sciences ,02 engineering and technology ,Data_CODINGANDINFORMATIONTHEORY ,01 natural sciences ,Separable space ,block codes ,Sliding window protocol ,error correcting codes ,0202 electrical engineering, electronic engineering, information engineering ,Code (cryptography) ,Electrical and Electronic Engineering ,distance ,Computer Science::Information Theory ,delays ,Information Theory (cs.IT) ,Packet erasure channel ,low delay streaming codes ,020206 networking & telecommunications ,gabidulin codes ,Parity-check matrix ,error correction codes ,Convolutional code ,010201 computation theory & mathematics ,convolutional codes ,channel models ,Erasure ,Error detection and correction ,generators ,burst ,sparse erasures ,Algorithm ,Decoding methods ,Communication channel - Abstract
This paper presents a new construction of error correcting codes which achieves optimal recovery of a streaming source over a packet erasure channel. The channel model considered is the sliding window erasure model, with burst and arbitrary losses, introduced by Badr et al. . Recently, two independents works by Fong et al. and Krishnan and Kumar have identified optimal streaming codes within this framework. In this paper, we introduce streaming code when the rate of the code is at least 1/2. Our proposed construction is explicit and systematic, uses off-the-shelf maximum distance separable (MDS) codes and maximum rank distance (MRD) Gabidulin block codes as constituent codes and achieves the optimal error correction. It presents a natural generalization to the construction of Martinian and Sundberg to tolerate an arbitrary number of sparse erasures. The field size requirement which depends on the constituent MDS and MRD codes is also analyzed., Comment: 22 pages
- Published
- 2019
- Full Text
- View/download PDF
149. Low-Latency Network-Adaptive Error Control for Interactive Streaming
- Author
-
John G. Apostolopoulos, Wai-Tian Tan, Xiaoqing Zhu, Silas L. Fong, Ashish Khisti, Salma Emara, and Baochun Li
- Subjects
FOS: Computer and information sciences ,Computer science ,Real-time computing ,02 engineering and technology ,Computer Science - Networking and Internet Architecture ,Packet loss ,Computer Science::Multimedia ,Media Technology ,Code (cryptography) ,0202 electrical engineering, electronic engineering, information engineering ,User Datagram Protocol ,Wireless ,Forward error correction ,Electrical and Electronic Engineering ,Latency (engineering) ,Networking and Internet Architecture (cs.NI) ,business.industry ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,Computer Science Applications ,Network congestion ,Noise ,Signal Processing ,Error detection and correction ,business ,Algorithm - Abstract
We introduce a novel network-adaptive algorithm that is suitable for alleviating network packet losses for low-latency interactive communications between a source and a destination. Our network-adaptive algorithm estimates in real-time the best parameters of a recently proposed streaming code that uses forward error correction (FEC) to correct both arbitrary and burst losses, which cause a crackling noise and undesirable jitters, respectively in audio. In particular, the destination estimates appropriate coding parameters based on its observed packet loss pattern and sends them back to the source for updating the underlying code. Besides, a new explicit construction of practical low-latency streaming codes that achieve the optimal tradeoff between the capability of correcting arbitrary losses and the capability of correcting burst losses is provided. Simulation evaluations based on statistical losses and real-world packet loss traces reveal the following: (i) Our proposed network-adaptive algorithm combined with our optimal streaming codes can achieve significantly higher performance compared to uncoded and non-adaptive FEC schemes over UDP (User Datagram Protocol); (ii) Our explicit streaming codes can significantly outperform traditional MDS (maximum-distance separable) streaming schemes when they are used along with our network-adaptive algorithm., Comment: Presented in part at 27th ACM International Conference on Multimedia, October 2019; 13 pages, 24 figures, submitted to IEEE Transactions on Multimedia
- Published
- 2019
- Full Text
- View/download PDF
150. Writing on many pieces of dirty paper at once: the binary case.
- Author
-
Ashish Khisti, Uri Erez, and Gregory W. Wornell
- Published
- 2004
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.