Endre søk
Link to record
Permanent link

Direct link
BETA
Alternativa namn
Publikasjoner (10 av 77) Visa alla publikasjoner
Forssell, K. H., Thobaben, R. & Gross, J. (2019). Performance Analysis of Distributed SIMO Physical Layer Authentication. In: ICC 2019 - 2019 IEEE International Conference on Communications (ICC): . Paper presented at 2019 IEEE International Conference on Communications, ICC 2019; Shanghai International Convention Center, Shanghai; China; 20-24 May 2019. Institute of Electrical and Electronics Engineers (IEEE), Article ID 8761666.
Åpne denne publikasjonen i ny fane eller vindu >>Performance Analysis of Distributed SIMO Physical Layer Authentication
2019 (engelsk)Inngår i: ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Institute of Electrical and Electronics Engineers (IEEE), 2019, artikkel-id 8761666Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

This paper proposes a new approach for physical layer authentication where transmissions are authenticated based on the single-input/multiple-output channel-states observed at multiple distributed antenna-arrays. The receiver operating characteristics (ROC) are derived in terms of closed form expressions for the false alarm and missed detection probability in order to evaluate the effectiveness compared to single-array authentication. To this end, we study the worst-case missed detection probability based on the optimal attacker position. Finally, we apply our previously developed queueing analytical tools, based on stochastic network calculus, in order to assess the delay performance impacts of the physical layer authentication scheme in a mission-critical communication scenario. Our results show that the distributed approach significantly outperforms single-array authentication in terms of worst-case missed detection probability and that this can help mitigating the delay performance impacts of authentication false alarms.

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers (IEEE), 2019
Serie
IEEE International Conference on Communications, ISSN 1550-3607 ; 8761666
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-258169 (URN)10.1109/ICC.2019.8761666 (DOI)000492038803139 ()2-s2.0-85070211836 (Scopus ID)9781538680889 (ISBN)
Konferanse
2019 IEEE International Conference on Communications, ICC 2019; Shanghai International Convention Center, Shanghai; China; 20-24 May 2019
Prosjekter
CERCES
Merknad

QC 20190910

Tilgjengelig fra: 2019-09-10 Laget: 2019-09-10 Sist oppdatert: 2019-12-09bibliografisk kontrollert
Forssell, H., Thobaben, R., Al-Zubaidy, H. & Gross, J. (2019). Physical Layer Authentication in Mission-Critical MTC Networks: A Security and Delay Performance Analysis. IEEE Journal on Selected Areas in Communications, 37(4), 795-808
Åpne denne publikasjonen i ny fane eller vindu >>Physical Layer Authentication in Mission-Critical MTC Networks: A Security and Delay Performance Analysis
2019 (engelsk)Inngår i: IEEE Journal on Selected Areas in Communications, ISSN 0733-8716, E-ISSN 1558-0008, Vol. 37, nr 4, s. 795-808Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

We study the detection and delay performance impacts of a feature-based physical layer authentication (PLA) protocol in mission-critical machine-type communication (MTC) networks. The PLA protocol uses generalized likelihood-ratio testing based on the line-of-sight (LOS), single-input multiple- output channel-state information in order to mitigate imper- sonation attempts from an adversary node. We study the de- tection performance, develop a queueing model that captures the delay impacts of erroneous decisions in the PLA (i.e., the false alarms and missed detections), and model three different adversary strategies: data injection, disassociation, and Sybil attacks. Our main contribution is the derivation of analytical delay performance bounds that allow us to quantify the delay introduced by PLA that potentially can degrade the performance in mission-critical MTC networks. For the delay analysis, we utilize tools from stochastic network calculus. Our results show that with a sufficient number of receive antennas (approx. 4-8) and sufficiently strong LOS components from legitimate devices, PLA is a viable option for securing mission-critical MTC systems, despite the low latency requirements associated to corresponding use cases. Furthermore, we find that PLA can be very effective in detecting the considered attacks, and in particular, it can significantly reduce the delay impacts of disassociation and Sybil attacks.

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers (IEEE), 2019
HSV kategori
Forskningsprogram
Telekommunikation
Identifikatorer
urn:nbn:se:kth:diva-245235 (URN)10.1109/JSAC.2019.2899421 (DOI)000461853500008 ()2-s2.0-85061989373 (Scopus ID)
Prosjekter
CERCES
Merknad

QC 20191120

Tilgjengelig fra: 2019-03-07 Laget: 2019-03-07 Sist oppdatert: 2019-11-20bibliografisk kontrollert
Mouris, B. A., Quevedo-Teruel, O. & Thobaben, R. (2018). Exploiting Glide Symmetry in Planar EBG Structures. Paper presented at 2017 3rd International Workshop on Metamaterial-by-Design: Theory, Methods, and Applications to Communications and Sensing, Madrid, Spain, 14 December 2017 through 15 December 2017. Journal of Physics, Conference Series, 963(1), Article ID 012002.
Åpne denne publikasjonen i ny fane eller vindu >>Exploiting Glide Symmetry in Planar EBG Structures
2018 (engelsk)Inngår i: Journal of Physics, Conference Series, ISSN 1742-6588, E-ISSN 1742-6596, Vol. 963, nr 1, artikkel-id 012002Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Periodic structures such as electromagnetic band gap (EBG) structures can be used to prevent the propagation of electromagnetic waves within a certain frequency range known as the stop band. One of the main limitations of using EBG structures at low frequencies is their relatively large size. In this paper, we investigate the possibility of using glide symmetry in planar EBG structures to reduce their size. Simulated results demonstrate that exploiting glide symmetry in EBG structures can lead to size reduction.

sted, utgiver, år, opplag, sider
Institute of Physics Publishing (IOPP), 2018
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-224237 (URN)10.1088/1742-6596/963/1/012002 (DOI)000435022800002 ()2-s2.0-85043258367 (Scopus ID)
Konferanse
2017 3rd International Workshop on Metamaterial-by-Design: Theory, Methods, and Applications to Communications and Sensing, Madrid, Spain, 14 December 2017 through 15 December 2017
Merknad

QC 20180315

Tilgjengelig fra: 2018-03-15 Laget: 2018-03-15 Sist oppdatert: 2018-07-02bibliografisk kontrollert
Forssell, H., Thobaben, R., Al-Zubaidy, H. & Gross, J. (2017). On the Impact of Feature-Based Physical Layer Authentication on Network Delay Performance. In: Globecom 2017 - 2017 IEEE Global Communications Conference: . Paper presented at IEEE Global Communications Conference (GLOBECOM), DEC 04-08, 2017, Your, Singapore. Institute of Electrical and Electronics Engineers (IEEE)
Åpne denne publikasjonen i ny fane eller vindu >>On the Impact of Feature-Based Physical Layer Authentication on Network Delay Performance
2017 (engelsk)Inngår i: Globecom 2017 - 2017 IEEE Global Communications Conference, Institute of Electrical and Electronics Engineers (IEEE), 2017Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Feature-based authentication schemes that verify wireless transmitter identities based on physical-layer features allow for fast and efficient authentication with minimal overhead. Hence, they are interesting to consider for safety-critical applications where low latency and high reliability is required. However, as erroneous authentication decisions will introduce delays, we propose to study the impact of feature-based schemes on the system-level performance. In this paper, we therefore study the queuing performance of a line-of-sight wireless link that employs a feature-based authentication scheme based on the complex channel gain. Using stochastic networks calculus, we provide bounds on the delay performance which are validated by numerical simulations. The results show that the delay and authentication performance is highly dependent on the SNR and Rice factor. However, under good channel conditions, a missed-detection rate of 10(-8) can be achieved without introducing excessive delays in the system.

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers (IEEE), 2017
Serie
IEEE Global Communications Conference, ISSN 2334-0983
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-226848 (URN)10.1109/GLOCOM.2017.8254003 (DOI)000428054300083 ()2-s2.0-85046437823 (Scopus ID)978-1-5090-5019-2 (ISBN)
Konferanse
IEEE Global Communications Conference (GLOBECOM), DEC 04-08, 2017, Your, Singapore
Prosjekter
CERCES
Forskningsfinansiär
Swedish Civil Contingencies Agency
Merknad

QC 20180507

Tilgjengelig fra: 2018-05-07 Laget: 2018-05-07 Sist oppdatert: 2018-06-25bibliografisk kontrollert
Grosjean, L., Thobaben, R., Rasmussen, L. K. & Skoglund, M. (2016). Variable-rate anytime transmission with feedback. In: IEEE Vehicular Technology Conference: . Paper presented at 84th IEEE Vehicular Technology Conference, VTC Fall 2016, 18 September 2016 through 21 September 2016. IEEE, Article ID 7881963.
Åpne denne publikasjonen i ny fane eller vindu >>Variable-rate anytime transmission with feedback
2016 (engelsk)Inngår i: IEEE Vehicular Technology Conference, IEEE, 2016, artikkel-id 7881963Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

A generalization of the ensemble of non-terminated systematic LDPC convolutional codes developed in our previous work is proposed that allows us to design codes with lower rates than the original structure. We show that over the BEC, the modified codes have improved asymptotic and finite-length behavior and we determine the operational anytime exponent. Having shown the advantages of lowering the rate of the code, we propose a feedback protocol that permits encoder and decoder to operate at a variable rate. The rate is set on-the-fly and depends on the decoding success of the decoder. We describe the construction of the variable rate code structure and demonstrate by simulations the superiority of the variable rate scheme as compared to a scheme using a fixed rate.

sted, utgiver, år, opplag, sider
IEEE, 2016
Emneord
Convolutional codes, Decoding, Design codes, Feedback protocol, Finite length, LDPC convolutional codes, On the flies, Original structures, Variable rate, Variable rate codes, Codes (symbols)
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-210142 (URN)10.1109/VTCFall.2016.7881963 (DOI)000402610200441 ()2-s2.0-85016981677 (Scopus ID)9781509017010 (ISBN)
Konferanse
84th IEEE Vehicular Technology Conference, VTC Fall 2016, 18 September 2016 through 21 September 2016
Merknad

QC 20170630

Tilgjengelig fra: 2017-06-30 Laget: 2017-06-30 Sist oppdatert: 2017-06-30bibliografisk kontrollert
Si, Z., Ma, J. & Thobaben, R. (2015). Coded Cooperation for Multiway Relaying in Wireless Sensor Networks. Sensors, 15(7), 15265-15284
Åpne denne publikasjonen i ny fane eller vindu >>Coded Cooperation for Multiway Relaying in Wireless Sensor Networks
2015 (engelsk)Inngår i: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 15, nr 7, s. 15265-15284Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Wireless sensor networks have been considered as an enabling technology for constructing smart cities. One important feature of wireless sensor networks is that the sensor nodes collaborate in some manner for communications. In this manuscript, we focus on the model of multiway relaying with full data exchange where each user wants to transmit and receive data to and from all other users in the network. We derive the capacity region for this specific model and propose a coding strategy through coset encoding. To obtain good performance with practical codes, we choose spatially-coupled LDPC (SC-LDPC) codes for the coded cooperation. In particular, for the message broadcasting from the relay, we construct multi-edge-type (MET) SC-LDPC codes by repeatedly applying coset encoding. Due to the capacity-achieving property of the SC-LDPC codes, we prove that the capacity region can theoretically be achieved by the proposed MET SC-LDPC codes. Numerical results with finite node degrees are provided, which show that the achievable rates approach the boundary of the capacity region in both binary erasure channels and additive white Gaussian channels.

Emneord
wireless sensor networks, multiway relay channel, capacity region, coset encoding, multi-edge-type LDPC codes, spatially-coupled LDPC codes
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-175941 (URN)10.3390/s150715265 (DOI)000361788200022 ()26131675 (PubMedID)2-s2.0-84934765174 (Scopus ID)
Forskningsfinansiär
The Swedish Foundation for International Cooperation in Research and Higher Education (STINT), IB2015-5959
Merknad

QC 20151102

Tilgjengelig fra: 2015-11-02 Laget: 2015-10-26 Sist oppdatert: 2017-12-01bibliografisk kontrollert
Gabry, F., Zappone, A., Thobaben, R., Jorswieck, E. A. & Skoglund, M. (2015). Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks with Secrecy Constraints. IEEE Wireless Communications Letters, 4(4), 437-440, Article ID 7106492.
Åpne denne publikasjonen i ny fane eller vindu >>Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks with Secrecy Constraints
Vise andre…
2015 (engelsk)Inngår i: IEEE Wireless Communications Letters, ISSN 2162-2337, E-ISSN 2162-2345, Vol. 4, nr 4, s. 437-440, artikkel-id 7106492Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

We investigate energy-efficient cooperation for secrecy in cognitive radio networks. In particular, we consider a four-node cognitive scenario where the secondary receiver is treated as a potential eavesdropper with respect to the primary transmission. The cognitive transmitter should ensure that the primary message is not leaked to the secondary user by using cooperative jamming. We investigate the optimal power allocation and power splitting at the secondary transmitter for our cognitive model to maximize the secondary energy efficiency (EE) under secrecy constraints. We formulate and analyze an important EE Stackelberg game between the two transmitters aiming at maximizing their utilities. We illustrate the analytical results through our geometrical model, highlighting the EE performance of the system and the impact of the Stackelberg game.

Emneord
cognitive radio, Cooperative jamming, energy efficiency, game theory, Security, Balloons, Jamming, Transmitters, Analytical results, Cognitive radio network, Energy efficiency analysis, Geometrical modeling, Optimal power allocation, Primary transmission
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-175015 (URN)10.1109/LWC.2015.2432802 (DOI)000377307900024 ()2-s2.0-84940395428 (Scopus ID)
Merknad

QC 20151130

Tilgjengelig fra: 2015-11-30 Laget: 2015-10-09 Sist oppdatert: 2017-12-01bibliografisk kontrollert
Lin, P.-H. -., Gabry, F., Thobaben, R., Jorswieck, E. & Skoglund, M. (2015). Interference neutralization vs clean relaying in cognitive radio networks with secrecy. In: Proceedings of the 12th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MOBIQUITOUS 2015. Paper presented at 12th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MOBIQUITOUS 2015, 22 July 2015 through 24 July 2015 (pp. 240-246). IEEE conference proceedings
Åpne denne publikasjonen i ny fane eller vindu >>Interference neutralization vs clean relaying in cognitive radio networks with secrecy
Vise andre…
2015 (engelsk)Inngår i: Proceedings of the 12th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MOBIQUITOUS 2015, IEEE conference proceedings, 2015, s. 240-246Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

In this paper we study cognitive radio networks with secrecy constraints on the primary transmission. In particular we consider several transmission schemes for the secondary transmitter, namely interference neutralization (IN) and cooperative jamming with and without clean relaying (CR). We derive and analyze the achievable secondary rate performance of the schemes. Furthermore we thoroughly investigate the advantages and shortcomings of these schemes through numerical simulations in a geometric model where we highlight the impact of the users' locations and show the important difference in all schemes depending on the topology. Our results show that the secondary transmitter can successfully adapt its transmission scheme (and parameters), i.e., either IN or CR, depending on its location to maximize its rate while insuring perfect secrecy of the primary transmission.

sted, utgiver, år, opplag, sider
IEEE conference proceedings, 2015
Emneord
Cognitive radio, Interference neutralization, Jamming, Physical layer security, Relaying, Network layers, Radio transmission, Topology, Transmissions, Transmitters, Ubiquitous computing, Cognitive radio network, Cooperative jamming, Geometric modeling, Interference neutralizations, Primary transmission, Transmission schemes
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-181632 (URN)2-s2.0-84946030890 (Scopus ID)9781631900723 (ISBN)
Konferanse
12th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MOBIQUITOUS 2015, 22 July 2015 through 24 July 2015
Merknad

QC 20160314

Tilgjengelig fra: 2016-03-14 Laget: 2016-02-02 Sist oppdatert: 2017-06-02bibliografisk kontrollert
Lin, P.-H. -., Gabry, F., Thobaben, R., Jorswieck, E. & Skoglund, M. (2015). Multi-phase transmission for secure cognitive radio networks. In: 2015 IEEE International Conference on Communication Workshop, ICCW 2015: . Paper presented at IEEE International Conference on Communication Workshop, ICCW 2015, 8 June 2015 through 12 June 2015 (pp. 475-479). IEEE conference proceedings
Åpne denne publikasjonen i ny fane eller vindu >>Multi-phase transmission for secure cognitive radio networks
Vise andre…
2015 (engelsk)Inngår i: 2015 IEEE International Conference on Communication Workshop, ICCW 2015, IEEE conference proceedings, 2015, s. 475-479Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

In this paper we study secure communications with weak secrecy constraint in a cognitive radio channel, where the secondary receiver is treated as a potential eavesdropper with respect to the primary transmission. The primary's secrecy rate and the transmission scheme should be kept unchanged whether the secondary users transmit or not. We derive the achievable rate of the discrete memoryless multi-phase cognitive channel. To against the information leakage due to the use of Gelfand-Pinsker coding at the secondary transmitter, we derive the corresponding constraints to guarantee the primary's secure transmission. We then specialize the results to the additive white Gaussian noise channels. Numerical results show the advantages of using the proposed multiple-phase transmission scheme over the traditional ones without the additional phase.

sted, utgiver, år, opplag, sider
IEEE conference proceedings, 2015
Emneord
Gaussian noise (electronic), Radio transmission, Secure communication, Transmissions, White noise, Additive white Gaussian noise channel, Cognitive radio channels, Cognitive radio network, Information leakage, Phase transmission, Primary transmission, Secure transmission, Transmission schemes, Cognitive radio
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-181641 (URN)10.1109/ICCW.2015.7247225 (DOI)000380459900080 ()2-s2.0-84947772669 (Scopus ID)9781467363051 (ISBN)
Konferanse
IEEE International Conference on Communication Workshop, ICCW 2015, 8 June 2015 through 12 June 2015
Merknad

QC 20160314

Tilgjengelig fra: 2016-03-14 Laget: 2016-02-02 Sist oppdatert: 2016-09-23bibliografisk kontrollert
Blasco-Serrano, R., Zachariah, D., Sundman, D., Thobaben, R. & Skoglund, M. (2014). A Measurement Rate-MSE Tradeoff for Compressive Sensing Through Partial Support Recovery. IEEE Transactions on Signal Processing, 62(18), 4643-4658
Åpne denne publikasjonen i ny fane eller vindu >>A Measurement Rate-MSE Tradeoff for Compressive Sensing Through Partial Support Recovery
Vise andre…
2014 (engelsk)Inngår i: IEEE Transactions on Signal Processing, ISSN 1053-587X, E-ISSN 1941-0476, Vol. 62, nr 18, s. 4643-4658Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

We study the fundamental relationship between two relevant quantities in compressive sensing: the measurement rate, which characterizes the asymptotic behavior of the dimensions of the measurement matrix in terms of the ratio m/ log n (m being the number of measurements and n the dimension of the sparse signal), and the mean square estimation error. First, we use an information-theoretic approach to derive sufficient conditions on the measurement rate to reliably recover a part of the support set that represents a certain fraction of the total signal power when the sparsity level is fixed. Second, we characterize the mean square error of an estimator that uses partial support set information. Using these two parts, we derive a tradeoff between the measurement rate and the mean square error. This tradeoff is achievable using a two-step approach: first support set recovery, then estimation of the active components. Finally, for both deterministic and random signals, we perform a numerical evaluation to verify the advantages of the methods based on partial support set recovery.

sted, utgiver, år, opplag, sider
IEEE Signal Processing Society, 2014
Emneord
Compressive sensing, sparse signal, support recovery, MSE, performance tradeoff
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-144414 (URN)10.1109/TSP.2014.2321739 (DOI)000340847000001 ()2-s2.0-84906483401 (Scopus ID)
Forskningsfinansiär
EU, FP7, Seventh Framework Programme, 257626
Merknad

QC 20140617

Tilgjengelig fra: 2014-04-29 Laget: 2014-04-22 Sist oppdatert: 2017-12-05bibliografisk kontrollert
Organisasjoner
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0001-9307-484X