scispace - formally typeset
Search or ask a question
Author

Thomas Dean

Other affiliations: United States Military Academy
Bio: Thomas Dean is an academic researcher from Stanford University. The author has contributed to research in topics: MIMO & Decoding methods. The author has an hindex of 6, co-authored 19 publications receiving 121 citations. Previous affiliations of Thomas Dean include United States Military Academy.

Papers
More filters
Proceedings ArticleDOI
23 Dec 2013
TL;DR: The new technique of physical-layer cryptography based on using a massive MIMO channel as a key between the sender and desired receiver, which need not be secret, has security that exceeds that of the most common encryption methods used today such as RSA and Diffie-Hellman.
Abstract: We propose the new technique of physical-layer cryptography based on using a massive MIMO channel as a key between the sender and desired receiver, which need not be secret. The goal is for low-complexity encoding and decoding by the desired transmitter-receiver pair, whereas decoding by an eavesdropper is hard in terms of prohibitive complexity. The massive MIMO system has a channel gain matrix that is drawn i.i.d. according to a Gaussian distribution, subject to additive white Gaussian noise. The decoding complexity is analyzed by mapping the massive MIMO system to a lattice. We show that the eavesdropper's decoder for the MIMO system with M-PAM modulation is equivalent to solving standard lattice problems that are conjectured to be of exponential complexity for both classical and quantum computers. Hence, under the widely-held conjecture that standard lattice problems are of worst-case complexity, the proposed encryption scheme has security that exceeds that of the most common encryption methods used today such as RSA and Diffie-Hellman. Additionally, we show that this scheme could be used to securely communicate without a pre-shared secret key and little computational overhead. In particular, a standard parallel channel decomposition allows the desired transmitter-receiver pair to encode and decode transmissions over the MIMO channel based on the singular value decomposition of the channel, while decoding remains computationally hard for an eavesdropper with an independent channel gain matrix, even if it knows the channel gain matrix between the desired transmitter and receiver. Thus, the massive MIMO system provides for low-complexity encryption commensurate with the most sophisticated forms of application-layer encryption by exploiting the physical layer properties of the radio channel.

42 citations

Proceedings ArticleDOI
01 Oct 2017
TL;DR: It is found that for channels with a high Doppler spread and a low delay spread, the FDM-FDCP construction can sustain good performance in terms of low SER and minimal overhead, whereas OFDM is strictly worse.
Abstract: A new modulation technique for the time-frequency dispersive channel is considered The waveform construction, called Frequency-Domain Multiplexing with a Frequency-Domain Cyclic Prefix (FDM-FDCP) efficiently corrects for the Doppler spread introduced by the channel The mathematical foundations behind this construction are described and efficient algorithms presented to modulate and demodulate information symbols It is found that for channels with a high Doppler spread and a low delay spread, the construction can sustain good performance in terms of low SER and minimal overhead, whereas OFDM is strictly worse This shows that, in rapidly time-varying time-frequency dispersive channels, general time-frequency signaling schemes (FDM-FDCP being an example) may outperform OFDM or other waveform constructions designed for multipath channels with low mobility

31 citations

Journal ArticleDOI
TL;DR: By exploiting the physical layer properties of the radio channel, the massive MIMO system provides for low-complexity encryption commensurate with the most sophisticated forms of application-layer encryption that are currently known.
Abstract: We propose the new technique of physical-layer cryptography based on using a massive MIMO channel as a key between the sender and desired receiver, which need not be secret. The goal is for low-complexity encoding and decoding by the desired transmitter–receiver pair, whereas decoding by an eavesdropper is hard in terms of prohibitive complexity. The decoding complexity is analyzed by mapping the massive MIMO system to a lattice. We show that the eavesdropper’s decoder for the MIMO system with M-PAM modulation is equivalent to solving standard lattice problems that are conjectured to be of exponential complexity for both classical and quantum computers. Hence, under the widely-held conjecture that standard lattice problems are hard to solve, the proposed encryption scheme has a more robust notion of security than that of the most common encryption methods used today such as RSA and Diffie–Hellman. In addition, we show that this scheme could be used to securely communicate without a pre-shared secret and little computational overhead. Thus, by exploiting the physical layer properties of the radio channel, the massive MIMO system provides for low-complexity encryption commensurate with the most sophisticated forms of application-layer encryption that are currently known.

19 citations

Journal ArticleDOI
TL;DR: This work proposes a blind decoding algorithm for multiple-input multiple-output (MIMO) decoding when channel-state information (CSI) is unknown to both the transmitter and receiver, imposing a similar performance penalty as space-time coding techniques without the loss of rate incurred by those techniques.
Abstract: We propose a method for multiple-input multiple-output (MIMO) decoding when channel-state information (CSI) is unknown to both the transmitter and receiver. The proposed method requires some structure in the transmitted signal for the decoding to be effective, in particular that the underlying sources are drawn from a hypercubic space. Our proposed technique fits a minimum volume parallelepiped to the received samples. This problem can be expressed as a non-convex optimization problem that can be solved with high probability by gradient descent. Our blind decoding algorithm can be used when communicating over unknown MIMO wireless channels using either binary phase-shift keying or MPAM modulation. We apply our technique to jointly estimate MIMO-channel gain matrices and decode the underlying transmissions with only knowledge of the transmitted constellation and without the use of pilot symbols. Our results provide theoretical guarantees that the proposed algorithm is correct when applied to MIMO systems with four or fewer transmit antennas. Empirical results show small sample size requirements, making this algorithm suitable for block-fading channels with coherence times typically seen in practice. Our approach has a loss of less than 3 dB compared to zero forcing with perfect CSI, imposing a similar performance penalty as space-time coding techniques without the loss of rate incurred by those techniques.

13 citations

Journal ArticleDOI
TL;DR: The authors envision the co-location of open data repositories in standardized formats together with high-performance computing hardware utilizing open source optimized analysis codes.
Abstract: Neuroscience initiatives aim to develop new technologies and tools to measure and manipulate neuronal circuits. To deal with the massive amounts of data generated by these tools, the authors envision the co-location of open data repositories in standardized formats together with high-performance computing hardware utilizing open source optimized analysis codes.

12 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A comprehensive review of the domain of physical layer security in multiuser wireless networks, with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security and observations on potential research directions in this area.
Abstract: This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical layer message authentication is also briefly introduced. The survey concludes with observations on potential research directions in this area.

1,294 citations

Journal ArticleDOI
TL;DR: This paper derives the explicit input–output relation describing OTFS modulation and demodulation (mod/demod) and analyzes the cases of ideal pulse-shaping waveforms that satisfy the bi-orthogonality conditions and those which do not.
Abstract: The recently proposed orthogonal time–frequency–space (OTFS) modulation technique was shown to provide significant error performance advantages over orthogonal frequency division multiplexing (OFDM) over delay-Doppler channels. In this paper, we first derive the explicit input–output relation describing OTFS modulation and demodulation (mod/demod). We then analyze the cases of: 1) ideal pulse-shaping waveforms that satisfy the bi-orthogonality conditions and 2) rectangular waveforms which do not. We show that while only inter-Doppler interference (IDI) is present in the former case, additional inter-carrier interference (ICI) and inter-symbol interference (ISI) occur in the latter case. We next characterize the interferences and develop a novel low-complexity yet efficient message passing (MP) algorithm for joint interference cancellation (IC) and symbol detection. While ICI and ISI are eliminated through appropriate phase shifting, IDI can be mitigated by adapting the MP algorithm to account for only the largest interference terms. The MP algorithm can effectively compensate for a wide range of channel Doppler spreads. Our results indicate that OTFS using practical rectangular waveforms can achieve the performance of OTFS using ideal but non-realizable pulse-shaping waveforms. Finally, simulation results demonstrate the superior error performance gains of the proposed uncoded OTFS schemes over OFDM under various channel conditions.

539 citations

Journal ArticleDOI
TL;DR: A conceptual, generic, and expandable framework for classifying the existing PLS techniques against wireless passive eavesdropping is proposed, and the security techniques that are reviewed are divided into two primary approaches: signal-to-interference-plus-noise ratio- based approach and complexity-based approach.
Abstract: Physical layer security (PLS) has emerged as a new concept and powerful alternative that can complement and may even replace encryption-based approaches, which entail many hurdles and practical problems for future wireless systems. The basic idea of PLS is to exploit the characteristics of the wireless channel and its impairments including noise, fading, interference, dispersion, diversity, etc. in order to ensure the ability of the intended user to successfully perform data decoding while preventing eavesdroppers from doing so. Thus, the main design goal of PLS is to increase the performance difference between the link of the legitimate receiver and that of the eavesdropper by using well-designed transmission schemes. In this survey, we propose a conceptual, generic, and expandable framework for classifying the existing PLS techniques against wireless passive eavesdropping. In this flexible framework, the security techniques that we comprehensively review in this treatise are divided into two primary approaches: signal-to-interference-plus-noise ratio-based approach and complexity-based approach. The first approach is classified into three major categories: first, secrecy channel codes-based schemes; second, security techniques based on channel adaptation; third, schemes based on injecting interfering artificial (noise/jamming) signals along with the transmitted information signals. The second approach (complexity-based), which is associated with the mechanisms of extracting secret sequences from the shared channel, is classified into two main categories based on which layer the secret sequence obtained by channel quantization is applied on. The techniques belonging to each one of these categories are divided and classified into three main signal domains: time, frequency and space. For each one of these domains, several examples are given and illustrated along with the review of the state-of-the-art security advances in each domain. Moreover, the advantages and disadvantages of each approach alongside the lessons learned from existing research works are stated and discussed. The recent applications of PLS techniques to different emerging communication systems such as visible light communication, body area network, power line communication, Internet of Things, smart grid, mm-Wave, cognitive radio, vehicular ad-hoc network, unmanned aerial vehicle, ultra-wideband, device-to-device, radio-frequency identification, index modulation, and 5G non-orthogonal multiple access based-systems, are also reviewed and discussed. The paper is concluded with recommendations and future research directions for designing robust, efficient and strong security methods for current and future wireless systems.

457 citations

Posted Content
TL;DR: In this article, Orthogonal Time Frequency Space (OTFS) modulation is proposed to exploit the full channel diversity over both time and frequency, which obviates the need for transmitter adaptation, and greatly simplifies system operation.
Abstract: This paper introduces a new two-dimensional modulation technique called Orthogonal Time Frequency Space (OTFS) modulation. OTFS has the novel and important feature of being designed in the delay-Doppler domain. When coupled with a suitable equalizer, OTFS modulation is able to exploit the full channel diversity over both time and frequency. Moreover, it converts the fading, time-varying wireless channel experienced by modulated signals such as OFDM into a time-independent channel with a complex channel gain that is essentially constant for all symbols. This design obviates the need for transmitter adaptation, and greatly simplifies system operation. The paper describes the basic operating principles of OTFS as well as a possible implementation as an overlay to current or anticipated standardized systems. OTFS is shown to provide significant performance improvement in systems with high Doppler, short packets, and/or large antenna array. In particular, simulation results indicate at least several dB of block error rate performance improvement for OTFS over OFDM in all of these settings.

394 citations

Journal ArticleDOI
TL;DR: It is convenient to develop reasoning in analytical terms and for simplicity to restrict the flow to two dimensions and the engineer will find special scope in this part of aerodynamics for graphical methods in the solution of particular problems.
Abstract: WE found, on experimental grounds in Article I, that the field of air‐flow past a short body of low resistance shape, such as an aerofoil, comprises two dissimilar parts: (a) a thin boundary layer enveloping the body and dominated by viscous effects, and (b) a motion outside the boundary layer in which viscosity is much less important. It will be remembered that in the external motion occur the large pressure changes, which, transmitted through the boundary layer, account for nearly all the lift and for part of the drag. These pressures we observed to be calculable from the velocities without appreciable error by Bernoulli's equation. In the present Article we confine attention to this external flow, assuming it to be steady, incompressible, and inviscid. Its dependence upon (a), already discussed to some extent, we ignore; the boundary layer is conceived to be everywhere very thin, so that the only role it plays is to allow of relative velocity at the surface of the body. The assumptions made, excepting that of incompressibility, will appear drastic, and it will not be surprising if some of our deductions prove discordant with experimental fact. Nevertheless, they lead to a theory which finds many applications and uses in real fluid motion, and, in particular, gives an intimate view of aerofoil flow that is very close to the truth. It is convenient to develop our reasoning in analytical terms and for simplicity to restrict the flow to two dimensions (Article 1, §5). But the engineer will find special scope in this part of aerodynamics for graphical methods in the solution of particular problems.

373 citations