{"title":"Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels","authors":"A. Mukherjee, A. L. Swindlehurst","doi":"10.1109/ALLERTON.2009.5394865","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394865","url":null,"abstract":"This paper examines linear beamforming methods for secure communications in a multiuser wiretap channel with a single transmitter, multiple legitimate receivers, and a single eavesdropper, where all nodes are equipped with multiple antennas. No information regarding the eavesdropper is presumed at the transmitter, and we examine both the broadcast MIMO downlink with independent information, and the multicast MIMO downlink with common information for all legitimate receivers. In both cases the information signal is transmitted with just enough power to guarantee a certain SINR at the desired receivers, while the remainder of the power is used to broadcast artificial noise. The artificial interference selectively degrades the passive eavesdropper's signal while remaining orthogonal to the desired receivers. We analyze the confidentiality provided by zero-forcing and optimal minimum-power beamforming designs for the broadcast channel, and optimal minimum-MSE beamformers for the multicast channel. Numerical simulations for the relative SINR and BER performance of the eavesdropper demonstrate the effectiveness of the proposed physical-layer security schemes.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125168327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed strategies for making a digraph weight-balanced","authors":"Bahman Gharesifard, Jorge Cortés","doi":"10.1109/ALLERTON.2009.5394936","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394936","url":null,"abstract":"A digraph is weight-balanced if, at each node, the sum of the weights of the incoming edges (in-degree) equals the sum of the weights of the outgoing edges (out-degree). Weight-balanced digraphs play an important role in a variety of cooperative control problems, including formation control, distributed averaging and optimization. We call a digraph weight-balanceable if it admits an edge weight assignment that makes it weight-balanced. It is known that semiconnectedness is a necessary and sufficient condition for a digraph to be weight-balanceable. However, to our knowledge, the available approaches to compute the appropriate set of weights are centralized. In this paper, we propose a distributed algorithm running synchronously on a directed communication network that allows individual agents to balance their in- and out-degrees. We also develop a systematic centralized algorithm for constructing a weight-balanced digraph and compute its time complexity. Finally, we modify the distributed procedure to design an algorithm which is distributed over the mirror digraph and has a time complexity much smaller than the centralized algorithm.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122680152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive encoding and decoding based on syndrome accumulation over binary LDPC ensembles: Universality and rate-adaptivity","authors":"Jin Meng, E. Yang","doi":"10.1109/ALLERTON.2009.5394496","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394496","url":null,"abstract":"In this paper we investigate the performance of linear interactive encoding and decoding based on syndrome accumulation(SA-IED) over binary LDPC ensembles. Assume that the source alphabet is GF(2), and the side information alphabet is finite. It is shown that we can construct universal SA-IED schemes, which are asymptotically optimal for any stationary ergodic source-side information pair. Our analysis further shows that the word error probability will approach 0 sub-exponentially with respect to the block length, while at the same time, the rate approaches H(X|Y) as the average variable node degree of the LDPC ensemble approaches ∞. Further, if the source and side information are correlated through a binary symmetrical memoryless channel, but the cross-over probability of the channel is not known to either the encoder or the decoder, our result on the performance of SA-IED can be further improved for LDPC ensembles with finite average variable node degree. Simulation results on binary source-side information pairs confirm the theoretical analysis above, and further show that SA-IED schemes using LDPC codes coupled with linear time belief propagation decoding consistently outperform Slepian-Wolf coding schemes based on LDPC codes.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134045268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the capacity of the symbol-asynchronous relay channel","authors":"Chiranjib Choudhuri, U. Mitra","doi":"10.1109/ALLERTON.2009.5394511","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394511","url":null,"abstract":"The capacity of the symbol-asynchronous single-relay channel is investigated. Symbol asynchronism implies that the codewords transmitted from the relay and the source do not coincide in time at the destination. Due to propagation or implementation effects (e.g. mis-synchronized clocks), symbol asynchronism occurs in many practical situations. In ad hoc scenarios, such as sensor networks, achieving perfect synchronism is challenging (due to the distributed nature of the network). Herein it is shown that the symbol-asynchronous single-relay channel can be modeled as a MIMO relay channel with memory. First, lower and upper bounds on the capacity are derived under the assumption that the receivers know the symbol epochs and the transmitters know their mutual offset. Next, the case where the transmitters only know that the mutual offsets that parameterize the channel belong to an uncertainty set and receivers have no knowledge of the symbol epochs is examined. Conditions for characterizing capacity (when the upper and lower bounds match) are also derived. Simple asynchronous coding schemes for the relay channel are also explored. The proposed coding scheme can be extended to the relay with memory. Bilayer LDPC codes are used to replicate the binning strategy of the relay and MLC coding with MSD decoding is used to counter the effect of memory.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"170 1 Pt 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132220372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model-based compressive sensing for signal ensembles","authors":"Marco F. Duarte, V. Cevher, Richard Baraniuk","doi":"10.1109/ALLERTON.2009.5394807","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394807","url":null,"abstract":"Compressive sensing (CS) is an alternative to Shannon/Nyquist sampling for acquiring sparse or compressible signals. Instead of taking N periodic samples, we measure M ≪ N inner products with random vectors and then recover the signal via a sparsity-seeking optimization or greedy algorithm. A new framework for CS based on unions of subspaces can improve signal recovery by including dependencies between values and locations of the signal's significant coefficients. In this paper, we extend this framework to the acquisition of signal ensembles under a common sparse supports model. The new framework provides recovery algorithms with theoretical performance guarantees. Additionally, the framework scales naturally to large sensor networks: the number of measurements needed for each signal does not increase as the network becomes larger. Furthermore, the complexity of the recovery algorithm is only linear in the size of the network. We provide experimental results using synthetic and real-world signals that confirm these benefits.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"6 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134531644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A single-letter characterization of optimal noisy compressed sensing","authors":"Dongning Guo, D. Baron, S. Shamai","doi":"10.1109/ALLERTON.2009.5394838","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394838","url":null,"abstract":"Compressed sensing deals with the reconstruction of a high-dimensional signal from far fewer linear measurements, where the signal is known to admit a sparse representation in a certain linear space. The asymptotic scaling of the number of measurements needed for reconstruction as the dimension of the signal increases has been studied extensively. This work takes a fundamental perspective on the problem of inferring about individual elements of the sparse signal given the measurements, where the dimensions of the system become increasingly large. Using the replica method, the outcome of inferring about any fixed collection of signal elements is shown to be asymptotically decoupled, i.e., those elements become independent conditioned on the measurements. Furthermore, the problem of inferring about each signal element admits a single-letter characterization in the sense that the posterior distribution of the element, which is a sufficient statistic, becomes asymptotically identical to the posterior of inferring about the same element in scalar Gaussian noise. The result leads to simple characterization of all other elemental metrics of the compressed sensing problem, such as the mean squared error and the error probability for reconstructing the support set of the sparse signal. Finally, the single-letter characterization is rigorously justified in the special case of sparse measurement matrices where belief propagation becomes asymptotically optimal.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114788814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modulation codes for flash memory based on load-balancing theory","authors":"Fan Zhang, H. Pfister","doi":"10.1109/ALLERTON.2009.5394880","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394880","url":null,"abstract":"In this paper, we consider modulation codes for practical multilevel flash memory storage systems with q cell levels. Instead of maximizing the lifetime of the device [7], [1], [2], [4], we maximize the average amount of information stored per cell-level, which is defined as storage efficiency. Using this framework, we show that the worst-case criterion [7], [1], [2] and the average-case criterion [4] are two extreme cases of our objective function. A self-randomized modulation code is proposed which is asymptotically optimal, as q → ∞, for an arbitrary input alphabet and i.i.d. input distribution. In practical flash memory systems, the number of cell-levels q is only moderately large. So the asymptotic performance as q → ∞ may not tell the whole story. Using the tools from load-balancing theory, we analyze the storage efficiency of the self-randomized modulation code. The result shows that only a fraction of the cells are utilized when the number of cell-levels q is only moderately large. We also propose a load-balancing modulation code, based on a phenomenon known as “the power of two random choices” [10], to improve the storage efficiency of practical systems. Theoretical analysis and simulation results show that our load-balancing modulation codes can provide significant gain to practical flash memory storage systems. Though pseudo-random, our approach achieves the same load-balancing performance, for i.i.d. inputs, as a purely random approach based on the power of two random choices.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"7 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114108094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Paganini, Andres Ferragut Ao Tangt, L. Andrew, L. Andrew
{"title":"Stability of networks under general file size distribution with alpha fair rate allocation","authors":"F. Paganini, Andres Ferragut Ao Tangt, L. Andrew, L. Andrew","doi":"10.1109/ALLERTON.2009.5394857","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394857","url":null,"abstract":"Convex optimization has been widely used to model bandwidth allocation policies among TCP flows in the Internet. When the offered load is less than capacity, stochastic stability of networks using such policies has been established for exponentially distributed file sizes. The problem has remained open for general file size distributions, which is very relevant as it is well known that Internet file sizes follow heavy-tailed distributions. In this paper, building on existing results on the fluid model of the system, we use a partial differential equation to characterize the dynamics. The equation keeps track of residual file size and therefore is suitable to study networks under general file size distributions. For alpha fair bandwidth allocation, with any positive alpha parameter, a Lyapunov function is constructed to prove stability when the offered load does not exceed capacity. The result gives an affirmative answer to this open problem and sets a foundation for further analysis of such systems.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"447 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123095718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generalizing Kronecker graphs in order to model searchable networks","authors":"E. Bodine, B. Hassibi, A. Wierman","doi":"10.1109/ALLERTON.2009.5394816","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394816","url":null,"abstract":"This paper describes an extension to stochastic Kronecker graphs that provides the special structure required for searchability, by defining a “distance”-dependent Kronecker operator. We show how this extension of Kronecker graphs can generate several existing social network models, such as the Watts-Strogatz small-world model and Kleinberg's lattice-based model. We focus on a specific example of an expanding hypercube, reminiscent of recently proposed social network models based on a hidden hyperbolic metric space, and prove that a greedy forwarding algorithm can find very short paths of length O((log log n)2) for graphs with n nodes.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129671034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed localization and tracking with coordinated and uncoordinated motion models","authors":"U. Khan, S. Kar, J. Moura","doi":"10.1109/ALLERTON.2009.5394801","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394801","url":null,"abstract":"This paper introduces the MDL algorithm for distributed localization in a network of mobile agents in Rm, m ¿ 1. The algorithm requires the dynamic agents with unknown locations to lie in the convex hull of at least m + 1 mobile or static anchors that can track their positions over time perfectly. Under minimal assumptions on network connectivity and local triangulation at each agent, we show that the MDL algorithm leads to convergence of the estimated agent locations to the true locations under general deterministic motion models. In addition, MDL exhibits desirable tracking performance in random environments also and we explicitly characterize the steady state tracking error in such environments. A significant feature of the algorithm is its distributed nature, where each agent updates its current location estimate based on its neighbors' estimates and current local barycentric coordinates, computed using only local information. Simulations verify the effectiveness of the approach.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124965953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}