scispace - formally typeset
Search or ask a question
Author

D. Richard Brown

Bio: D. Richard Brown is an academic researcher from Worcester Polytechnic Institute. The author has contributed to research in topics: Beamforming & Communication channel. The author has an hindex of 21, co-authored 75 publications receiving 1296 citations.


Papers
More filters
Posted Content
TL;DR: The current state of the art in the design and optimization of low-latency cyberphysical systems and applications in which sources send time-stamped status updates to interested recipients is described and AoI timeliness metrics are described.
Abstract: We summarize recent contributions in the broad area of age of information (AoI). In particular, we describe the current state of the art in the design and optimization of low-latency cyberphysical systems and applications in which sources send time-stamped status updates to interested recipients. These applications desire status updates at the recipients to be as timely as possible; however, this is typically constrained by limited system resources. We describe AoI timeliness metrics and present general methods of AoI evaluation analysis that are applicable to a wide variety of sources and systems. Starting from elementary single-server queues, we apply these AoI methods to a range of increasingly complex systems, including energy harvesting sensors transmitting over noisy channels, parallel server systems, queueing networks, and various single-hop and multi-hop wireless networks. We also explore how update age is related to MMSE methods of sampling, estimation and control of stochastic processes. The paper concludes with a review of efforts to employ age optimization in cyberphysical applications.

265 citations

Journal ArticleDOI
TL;DR: In this paper, the authors summarize recent contributions in the broad area of AoI and present general AoI evaluation analysis that are applicable to a wide variety of sources and systems, starting from elementary single-server queues, and applying these AoI methods to a range of increasingly complex systems, including energy harvesting sensors transmitting over noisy channels, parallel server systems, queueing networks, and various single-hop and multi-hop wireless networks.
Abstract: We summarize recent contributions in the broad area of age of information (AoI). In particular, we describe the current state of the art in the design and optimization of low-latency cyberphysical systems and applications in which sources send time-stamped status updates to interested recipients. These applications desire status updates at the recipients to be as timely as possible; however, this is typically constrained by limited system resources. We describe AoI timeliness metrics and present general methods of AoI evaluation analysis that are applicable to a wide variety of sources and systems. Starting from elementary single-server queues, we apply these AoI methods to a range of increasingly complex systems, including energy harvesting sensors transmitting over noisy channels, parallel server systems, queueing networks, and various single-hop and multi-hop wireless networks. We also explore how update age is related to MMSE methods of sampling, estimation and control of stochastic processes. The paper concludes with a review of efforts to employ age optimization in cyberphysical applications.

213 citations

Proceedings ArticleDOI
15 Apr 2018
TL;DR: The average age of information in a single-source status update system with energy constraints is analyzed both for servers that are able or unable to perform simultaneous service and energy harvesting and closed-form expressions for the average age in terms of the system parameters are derived.
Abstract: This paper investigates the age of information in a single-source status update system with energy constraints. Specifically, a source provides status updates to a destination through a server assumed to have a battery with finite capacity that is replenished by harvesting energy. Arrival times of the status updates at the source and energy units at the server are assumed to be random according to independent Poisson processes. Service times are also assumed to be exponentially distributed and independent of the status and energy arrivals. The server is assumed to always be able to harvest energy when no information packet from the source is in service and the battery is not full. With regards to harvesting energy while packets are in service, this paper analyzes the average age of information both for servers that are able or unable to perform simultaneous service and energy harvesting. Closed-form expressions for the average age in terms of the system parameters are derived. Simulation results confirm the analysis and numerically demonstrate the performance advantage of servers with simultaneous service and energy harvesting.

135 citations

Proceedings ArticleDOI
14 Aug 2007
TL;DR: Simulation results validate the analysis and show that the metric EOT leads to both higher one-hop and path throughput than the corresponding pure GOR and geographic routing.
Abstract: Geographic opportunistic routing (GOR) is a new routing concept in multihop wireless networks. In stead of picking one node to forward a packet to, GOR forwards a packet to a set of candidate nodes and one node is selected dynamically as the actual forwarder based on the instantaneous wireless channel condition and node position and availability at the time of transmission. GOR takes advantages of the spatial diversity and broadcast nature of wireless communications and is an efficient mechanism to combat the unreliable links. The existing GOR schemes typically involve as many as available next-hop neighbors into the local opportunistic forwarding, and give the nodes closer to the destination higher relay priorities. In this paper, we focus on realizing GOR's potential in maximizing throughput. We start with an insightful analysis of various factors and their impact on the throughput of GOR, and propose a local metric named expected one-hop throughput (EOT) to balance the tradeoff between the benefit (i.e., packet advancement and transmission reliability) and the cost (i.e., medium time delay). We identify an upper bound of EOT and proof its concavity. Based on the EOT, we also propose a local candidate selection and prioritization algorithm. Simulation results validate our analysis and show that the metric EOT leads to both higher one-hop and path throughput than the corresponding pure GOR and geographic routing.

90 citations

Journal ArticleDOI
TL;DR: An optimal maximum likelihood (ML) receiver and a low-complexity zero-forcing (ZF)-type receiver at the fusion center are developed and it is shown that this error floor can be overcome by increasing the number of receive nodes.
Abstract: We study a quantized distributed reception scenario in which a transmitter equipped with multiple antennas sends multiple streams via spatial multiplexing to a large number of geographically separated single antenna receive nodes. This approach is applicable to scenarios such as those enabled by the Internet of Things (IoT) which holds much commercial potential and could facilitate distributed multiple-input multiple-output (MIMO) communication in future systems. The receive nodes quantize their received signals and forward the quantized received signals to a receive fusion center. With global channel knowledge and forwarded quantized information from the receive nodes, the fusion center attempts to decode the transmitted symbols. We assume the transmit vector consists of arbitrary constellation points, and each receive node quantizes its received signal with one bit for each of the real and imaginary parts of the signal to minimize the transmission overhead between the receive nodes and the fusion center. Fusing this data is a nontrivial problem because the receive nodes cannot decode the transmitted symbols before quantization. We develop an optimal maximum likelihood (ML) receiver and a low-complexity zero-forcing (ZF)-type receiver at the fusion center. Despite its suboptimality, the ZF-type receiver is simple to implement and shows comparable performance with the ML receiver in the low signal-to-noise ratio (SNR) regime but experiences an error rate floor at high SNR. It is shown that this error floor can be overcome by increasing the number of receive nodes.

80 citations


Cited by
More filters
Journal ArticleDOI

2,415 citations

Book
12 Jun 2009
TL;DR: Information Theoretic Security surveys the research dating back to the 1970s which forms the basis of applying this technique in modern systems to achieve secrecy for a basic wire-tap channel model as well as for its extensions to multiuser networks.
Abstract: Security is one of the most important issues in communications. Security issues arising in communication networks include confidentiality, integrity, authentication and non-repudiation. Attacks on the security of communication networks can be divided into two basic types: passive attacks and active attacks. An active attack corresponds to the situation in which a malicious actor intentionally disrupts the system. A passive attack corresponds to the situation in which a malicious actor attempts to interpret source information without injecting any information or trying to modify the information; i.e., passive attackers listen to the transmission without modifying it. Information Theoretic Security focuses on confidentiality issues, in which passive attacks are of primary concern. The information theoretic approach to achieving secure communication opens a promising new direction toward solving wireless networking security problems. Compared to contemporary cryptosystems, information theoretic approaches offer advantages such as eliminating the key management issue; are less vulnerable to the man-in-the-middle and achieve provable security that is robust to powerful eavesdroppers possessing unlimited computational resources, knowledge of the communication strategy employed including coding and decoding algorithms, and access to communication systems either through perfect or noisy channels. Information Theoretic Security surveys the research dating back to the 1970s which forms the basis of applying this technique in modern systems. It proceeds to provide an overview of how information theoretic approaches are developed to achieve secrecy for a basic wire-tap channel model as well as for its extensions to multiuser networks. It is an invaluable resource for students and researchers working in network security, information theory and communications.

877 citations

Book
22 Sep 2011
TL;DR: In this article, the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication are presented, using a bottom-up approach from the link level all the way to end-to-end architectures.
Abstract: This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures, it provides essential practical tools that enable graduate students, industry professionals and researchers to build more secure systems by exploiting the noise inherent to communications channels. The book begins with a self-contained explanation of the information-theoretic limits of secure communications at the physical layer. It then goes on to develop practical coding schemes, building on the theoretical insights and enabling readers to understand the challenges and opportunities related to the design of physical layer security schemes. Finally, applications to multi-user communications and network coding are also included.

805 citations

Journal ArticleDOI
01 Jan 1976

660 citations

01 Jan 2016
TL;DR: This rfid handbook fundamentals and applications in contactless smart cards and identification helps people to read a good book with a cup of coffee in the afternoon instead of juggled with some malicious bugs inside their laptop.
Abstract: Thank you for reading rfid handbook fundamentals and applications in contactless smart cards and identification. As you may know, people have search numerous times for their chosen novels like this rfid handbook fundamentals and applications in contactless smart cards and identification, but end up in malicious downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they juggled with some malicious bugs inside their laptop.

570 citations