-
From Worst to Average Case to Incremental Search Bounds of the Strong Lucas Test
Authors:
Semira Einsele,
Gerhard Wunder
Abstract:
The strong Lucas test is a widely used probabilistic primality test in cryptographic libraries. When combined with the Miller-Rabin primality test, it forms the Baillie-PSW primality test, known for its absence of false positives, undermining the relevance of a complete understanding of the strong Lucas test. In primality testing, the worst-case error probability serves as an upper bound on the li…
▽ More
The strong Lucas test is a widely used probabilistic primality test in cryptographic libraries. When combined with the Miller-Rabin primality test, it forms the Baillie-PSW primality test, known for its absence of false positives, undermining the relevance of a complete understanding of the strong Lucas test. In primality testing, the worst-case error probability serves as an upper bound on the likelihood of incorrectly identifying a composite as prime. For the strong Lucas test, this bound is $4/15$ for odd composites, not products of twin primes. On the other hand, the average-case error probability indicates the probability that a randomly chosen integer is inaccurately classified as prime by the test. This bound is especially important for practical applications, where we test primes that are randomly generated and not generated by an adversary. The error probability of $4/15$ does not directly carry over due to the scarcity of primes, and whether this estimate holds has not yet been established in the literature. This paper addresses this gap by demonstrating that an integer passing $t$ consecutive test rounds, alongside additional standard tests of low computational cost, is indeed prime with a probability greater than $1-(4/15)^t$ for all $t\geq 1$. Furthermore, we introduce error bounds for the incremental search algorithm based on the strong Lucas test, as there are no established bounds up to date as well. Rather than independent selection, in this approach, the candidate is chosen uniformly at random, with subsequent candidates determined by incrementally adding 2. This modification reduces the need for random bits and enhances the efficiency of trial division computation further.
△ Less
Submitted 7 June, 2024;
originally announced June 2024.
-
Expectation Entropy as a Password Strength Metric
Authors:
Khan Reaz,
Gerhard Wunder
Abstract:
The classical combinatorics-based password strength formula provides a result in tens of bits, whereas the NIST Entropy Estimation Suite give a result between 0 and 1 for Min-entropy. In this work, we present a newly developed metric -- Expectation entropy that can be applied to estimate the strength of any random or random-like password. Expectation entropy provides the strength of a password on…
▽ More
The classical combinatorics-based password strength formula provides a result in tens of bits, whereas the NIST Entropy Estimation Suite give a result between 0 and 1 for Min-entropy. In this work, we present a newly developed metric -- Expectation entropy that can be applied to estimate the strength of any random or random-like password. Expectation entropy provides the strength of a password on the same scale as an entropy estimation tool. Having an 'Expectation entropy' of a certain value, for example, 0.4 means that an attacker has to exhaustively search at least 40\% of the total number of guesses to find the password.
△ Less
Submitted 18 March, 2024;
originally announced April 2024.
-
Perfectly Secure Key Agreement Over a Full Duplex Wireless Channel
Authors:
Gerhard Wunder,
Axel Flinth,
Daniel Becker,
Benedikt Groß
Abstract:
Secret key generation (SKG) between authenticated devices is a pivotal task for secure communications. Diffie-Hellman (DH) is de-facto standard but not post-quantum secure. In this paper, we shall invent and analyze a new security primitive that is specifically designed for WPAN. For WPAN, wireless channel-based SKG has been proposed but was not widely deployed due to its critical dependence on th…
▽ More
Secret key generation (SKG) between authenticated devices is a pivotal task for secure communications. Diffie-Hellman (DH) is de-facto standard but not post-quantum secure. In this paper, we shall invent and analyze a new security primitive that is specifically designed for WPAN. For WPAN, wireless channel-based SKG has been proposed but was not widely deployed due to its critical dependence on the channel's entropy which is uncontrollable. We formulate a different approach: We still exploit channel properties but mainly hinge on the reciprocity of the wireless channel and not on the channel's entropy. The radio advantage comes from the use of full duplex communication. We show that in this situation both legitimate parties can agree on a common secret key even without ever probing the channel at all. At the core is a new bisparse blind deconvolution scheme for which we prove correctness and information-theoretic, i.e. perfect, security. We show that, ultimately, a secret key can be extracted and give a lower bound for the number of secret key bits which is then verified by experiments.
△ Less
Submitted 23 April, 2024; v1 submitted 10 April, 2024;
originally announced April 2024.
-
ASOP: A Sovereign and Secure Device Onboarding Protocol for Cloud-based IoT Services
Authors:
Khan Reaz,
Gerhard Wunder
Abstract:
The existing high-friction device onboarding process hinders the promise and potentiality of Internet of Things (IoT). Even after several attempts by various device manufacturers and working groups, no widely adopted standard solution came to fruition. The latest attempt by Fast Identity Online (FIDO) Alliance promises a zero touch solution for mass market IoT customers, but the burden is transfer…
▽ More
The existing high-friction device onboarding process hinders the promise and potentiality of Internet of Things (IoT). Even after several attempts by various device manufacturers and working groups, no widely adopted standard solution came to fruition. The latest attempt by Fast Identity Online (FIDO) Alliance promises a zero touch solution for mass market IoT customers, but the burden is transferred to the intermediary supply chain (i.e. they have to maintain infrastructure for managing keys and digital signatures called `Ownership Voucher' for all devices). The specification relies on a `Rendezvous Server' mimicking the notion of Domain Name System (DNS) server'. This essentially means resurrecting all existing possible attack scenarios associated with DNS, which include Denial of Service (DoS) attack, and Correlation attack. `Ownership Voucher' poses the risk that some intermediary supply chain agents may act maliciously and reject the transfer of ownership or sign with a wrong key. Furthermore, the deliberate use of the weak elliptic curve SECP256r1/SECP384r1 (also known as NIST P-256/384) in the specification raises questions. We introduce ASOP: a sovereign and secure device onboarding protocol for IoT devices without blindly trusting the device manufacturer, supply chain, and cloud service provider. The ASOP protocol allows onboarding an IoT device to a cloud server with the help of an authenticator owned by the user. This paper outlines the preliminary development of the protocol and its high-level description. Our `zero-trust' and `human-in-the-loop' approach guarantees that the device owner does not remain at the mercy of third-party infrastructures, and it utilises recently standardized post-quantum cryptographic suite (CRYSTALS) to secure connection and messages.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
A Causal Model for Quantifying Multipartite Classical and Quantum Correlations
Authors:
Shuchan Wang,
Gerhard Wunder
Abstract:
We give an operational definition of information-theoretic resources within a given multipartite classical or quantum correlation. We present our causal model that serves as the source coding side of this correlation and introduce a novel concept of resource rate. We argue that, beyond classical secrecy, additional resources exist that are useful for the security of distributed computing problems,…
▽ More
We give an operational definition of information-theoretic resources within a given multipartite classical or quantum correlation. We present our causal model that serves as the source coding side of this correlation and introduce a novel concept of resource rate. We argue that, beyond classical secrecy, additional resources exist that are useful for the security of distributed computing problems, which can be captured by the resource rate. Furthermore, we establish a relationship between resource rate and an extension of Shannon's logarithmic information measure, namely, total correlation. Subsequently, we present a novel quantum secrecy monotone and investigate a quantum hybrid key distribution system as an extension of our causal model. Finally, we discuss some connections to optimal transport (OT) problem.
△ Less
Submitted 2 April, 2024; v1 submitted 29 January, 2024;
originally announced January 2024.
-
Model CBOR Serialization for Federated Learning
Authors:
Koen Zandberg,
Mayank Gulati,
Gerhard Wunder,
Emmanuel Baccelli
Abstract:
The typical federated learning workflow requires communication between a central server and a large set of clients synchronizing model parameters between each other. The current frameworks use communication protocols not suitable for resource-constrained devices and are either hard to deploy or require high-throughput links not available on these devices. In this paper, we present a generic messag…
▽ More
The typical federated learning workflow requires communication between a central server and a large set of clients synchronizing model parameters between each other. The current frameworks use communication protocols not suitable for resource-constrained devices and are either hard to deploy or require high-throughput links not available on these devices. In this paper, we present a generic message framework using CBOR for communication with existing federated learning frameworks optimised for use with resource-constrained devices and low power and lossy network links. We evaluate the resulting message sizes against JSON serialized messages where compare both with model parameters resulting in optimal and worst case serialization length, and with a real-world LeNet-5 model. Our benchmarks show that with our approach, messages are up to 75 % smaller in size when compared to the JSON alternative.
△ Less
Submitted 25 January, 2024;
originally announced January 2024.
-
On Gradient-like Explanation under a Black-box Setting: When Black-box Explanations Become as Good as White-box
Authors:
Yi Cai,
Gerhard Wunder
Abstract:
Attribution methods shed light on the explainability of data-driven approaches such as deep learning models by uncovering the most influential features in a to-be-explained decision. While determining feature attributions via gradients delivers promising results, the internal access required for acquiring gradients can be impractical under safety concerns, thus limiting the applicability of gradie…
▽ More
Attribution methods shed light on the explainability of data-driven approaches such as deep learning models by uncovering the most influential features in a to-be-explained decision. While determining feature attributions via gradients delivers promising results, the internal access required for acquiring gradients can be impractical under safety concerns, thus limiting the applicability of gradient-based approaches. In response to such limited flexibility, this paper presents \methodAbr~(gradient-estimation-based explanation), an approach that produces gradient-like explanations through only query-level access. The proposed approach holds a set of fundamental properties for attribution methods, which are mathematically rigorously proved, ensuring the quality of its explanations. In addition to the theoretical analysis, with a focus on image data, the experimental results empirically demonstrate the superiority of the proposed method over state-of-the-art black-box methods and its competitive performance compared to methods with full access.
△ Less
Submitted 14 May, 2024; v1 submitted 18 August, 2023;
originally announced August 2023.
-
Differentially Private Synthetic Data Generation via Lipschitz-Regularised Variational Autoencoders
Authors:
Benedikt Groß,
Gerhard Wunder
Abstract:
Synthetic data has been hailed as the silver bullet for privacy preserving data analysis. If a record is not real, then how could it violate a person's privacy? In addition, deep-learning based generative models are employed successfully to approximate complex high-dimensional distributions from data and draw realistic samples from this learned distribution. It is often overlooked though that gene…
▽ More
Synthetic data has been hailed as the silver bullet for privacy preserving data analysis. If a record is not real, then how could it violate a person's privacy? In addition, deep-learning based generative models are employed successfully to approximate complex high-dimensional distributions from data and draw realistic samples from this learned distribution. It is often overlooked though that generative models are prone to memorising many details of individual training records and often generate synthetic data that too closely resembles the underlying sensitive training data, hence violating strong privacy regulations as, e.g., encountered in health care. Differential privacy is the well-known state-of-the-art framework for guaranteeing protection of sensitive individuals' data, allowing aggregate statistics and even machine learning models to be released publicly without compromising privacy. The training mechanisms however often add too much noise during the training process, and thus severely compromise the utility of these private models. Even worse, the tight privacy budgets do not allow for many training epochs so that model quality cannot be properly controlled in practice. In this paper we explore an alternative approach for privately generating data that makes direct use of the inherent stochasticity in generative models, e.g., variational autoencoders. The main idea is to appropriately constrain the continuity modulus of the deep models instead of adding another noise mechanism on top. For this approach, we derive mathematically rigorous privacy guarantees and illustrate its effectiveness with practical experiments.
△ Less
Submitted 13 July, 2023; v1 submitted 22 April, 2023;
originally announced April 2023.
-
Explaining text classifiers through progressive neighborhood approximation with realistic samples
Authors:
Yi Cai,
Arthur Zimek,
Eirini Ntoutsi,
Gerhard Wunder
Abstract:
The importance of neighborhood construction in local explanation methods has been already highlighted in the literature. And several attempts have been made to improve neighborhood quality for high-dimensional data, for example, texts, by adopting generative models. Although the generators produce more realistic samples, the intuitive sampling approaches in the existing solutions leave the latent…
▽ More
The importance of neighborhood construction in local explanation methods has been already highlighted in the literature. And several attempts have been made to improve neighborhood quality for high-dimensional data, for example, texts, by adopting generative models. Although the generators produce more realistic samples, the intuitive sampling approaches in the existing solutions leave the latent space underexplored. To overcome this problem, our work, focusing on local model-agnostic explanations for text classifiers, proposes a progressive approximation approach that refines the neighborhood of a to-be-explained decision with a careful two-stage interpolation using counterfactuals as landmarks. We explicitly specify the two properties that should be satisfied by generative models, the reconstruction ability and the locality-preserving property, to guide the selection of generators for local explanation methods. Moreover, noticing the opacity of generative models during the study, we propose another method that implements progressive neighborhood approximation with probability-based editions as an alternative to the generator-based solution. The explanation results from both methods consist of word-level and instance-level explanations benefiting from the realistic neighborhood. Through exhaustive experiments, we qualitatively and quantitatively demonstrate the effectiveness of the two proposed methods.
△ Less
Submitted 11 February, 2023;
originally announced February 2023.
-
Bisparse Blind Deconvolution through Hierarchical Sparse Recovery
Authors:
Axel Flinth,
Ingo Roth,
Gerhard Wunder
Abstract:
The bi-sparse blind deconvolution problem is studied -- that is, from the knowledge of $h*(Qb)$, where $Q$ is some linear operator, recovering $h$ and $b$, which are both assumed to be sparse. The approach rests upon lifting the problem to a linear one, and then applying the hierarchical sparsity framework. In particular, the efficient HiHTP algorithm is proposed for performing the recovery. Then,…
▽ More
The bi-sparse blind deconvolution problem is studied -- that is, from the knowledge of $h*(Qb)$, where $Q$ is some linear operator, recovering $h$ and $b$, which are both assumed to be sparse. The approach rests upon lifting the problem to a linear one, and then applying the hierarchical sparsity framework. In particular, the efficient HiHTP algorithm is proposed for performing the recovery. Then, under a random model on the matrix $Q$, it is theoretically shown that an $s$-sparse $h \in \mathbb{K}^μ$ and $σ$-sparse $b \in \mathbb{K}^n$ with high probability can be recovered when $μ\succcurlyeq s\log(s)^2\log(μ)\log(μn) + sσ\log(n)$.
△ Less
Submitted 19 February, 2024; v1 submitted 20 October, 2022;
originally announced October 2022.
-
One-Shot Messaging at Any Load Through Random Sub-Channeling in OFDM
Authors:
Gerhard Wunder,
Axel Flinth,
Benedikt Groß
Abstract:
Compressive Sensing has well boosted massive random access protocols over the last decade. In this paper we apply an orthogonal FFT basis as it is used in OFDM, but subdivide its image into so-called sub-channels and let each sub-channel take only a fraction of the load. In a random fashion the subdivision is consecutively applied over a suitable number of time-slots. Within the time-slots the use…
▽ More
Compressive Sensing has well boosted massive random access protocols over the last decade. In this paper we apply an orthogonal FFT basis as it is used in OFDM, but subdivide its image into so-called sub-channels and let each sub-channel take only a fraction of the load. In a random fashion the subdivision is consecutively applied over a suitable number of time-slots. Within the time-slots the users will not change their sub-channel assignment and send in parallel the data. Activity detection is carried out jointly across time-slots in each of the sub-channels. For such system design we derive three rather fundamental results: i) First, we prove that the subdivision can be driven to the extent that the activity in each sub-channel is sparse by design. An effect that we call sparsity capture effect. ii) Second, we prove that effectively the system can sustain any overload situation relative to the FFT dimension, i.e. detection failure of active and non-active users can be kept below any desired threshold regardless of the number of users. The only price to pay is delay, i.e. the number of time-slots over which cross-detection is performed. We achieve this by jointly exploring the effect of measure concentration in time and frequency and careful system parameter scaling. iii) Third, we prove that parallel to activity detection active users can carry one symbol per pilot resource and time-slot so it supports so-called one-shot messaging.
The key to proving these results are new concentration results for sequences of randomly sub-sampled FFTs detecting the sparse vectors "en bloc". Eventually, we show by simulations that the system is scalable resulting in a coarsely 20-fold capacity increase compared to standard OFDM.
△ Less
Submitted 13 July, 2023; v1 submitted 22 September, 2022;
originally announced September 2022.
-
Power of Explanations: Towards automatic debiasing in hate speech detection
Authors:
Yi Cai,
Arthur Zimek,
Gerhard Wunder,
Eirini Ntoutsi
Abstract:
Hate speech detection is a common downstream application of natural language processing (NLP) in the real world. In spite of the increasing accuracy, current data-driven approaches could easily learn biases from the imbalanced data distributions originating from humans. The deployment of biased models could further enhance the existing social biases. But unlike handling tabular data, defining and…
▽ More
Hate speech detection is a common downstream application of natural language processing (NLP) in the real world. In spite of the increasing accuracy, current data-driven approaches could easily learn biases from the imbalanced data distributions originating from humans. The deployment of biased models could further enhance the existing social biases. But unlike handling tabular data, defining and mitigating biases in text classifiers, which deal with unstructured data, are more challenging. A popular solution for improving machine learning fairness in NLP is to conduct the debiasing process with a list of potentially discriminated words given by human annotators. In addition to suffering from the risks of overlooking the biased terms, exhaustively identifying bias with human annotators are unsustainable since discrimination is variable among different datasets and may evolve over time. To this end, we propose an automatic misuse detector (MiD) relying on an explanation method for detecting potential bias. And built upon that, an end-to-end debiasing framework with the proposed staged correction is designed for text classifiers without any external resources required.
△ Less
Submitted 7 September, 2022;
originally announced September 2022.
-
Age-of-Information in Clocked Networks
Authors:
R. Schoeffauer,
G. Wunder
Abstract:
We derive key features of the Age-of-Information distribution in a system whose activities are strictly limited to periodic instances on a global time grid. In particular, one agent periodically generates updates while the other agent periodically uses the most recently received of those updates. Likewise, transmission of those updates over a network can only occur periodically. All periods may di…
▽ More
We derive key features of the Age-of-Information distribution in a system whose activities are strictly limited to periodic instances on a global time grid. In particular, one agent periodically generates updates while the other agent periodically uses the most recently received of those updates. Likewise, transmission of those updates over a network can only occur periodically. All periods may differ. We derive results for two different models: a basic one in which the mathematical problems can be handled directly and an extended model which, among others, can also account for stochastic transmission failure, making the results applicable to instances with wireless communication. For both models, a suitable approximation for the expected Age-of-Information and an upper bound for its largest occurring value are developed. For the extended model (which is the more relevant one from a practical standpoint) we also present numerical results for the distribution of the approximation error for numerous parameter choices.
△ Less
Submitted 12 July, 2022;
originally announced July 2022.
-
An Algorithm for Exact Numerical Age-of-Information Evaluation in Multi-Agent Systems
Authors:
Richard Schoeffauer,
Gerhard Wunder
Abstract:
We present an algorithm for the numerical evaluation of the state-space distribution of an Age-of-Information network. Given enough computational resources, the evaluation can be performed to an arbitrary high precision. An Age-of-Information network is described by a vector of natural numbers, that track how outdated status information from various agents is. Our algorithm yields the means to det…
▽ More
We present an algorithm for the numerical evaluation of the state-space distribution of an Age-of-Information network. Given enough computational resources, the evaluation can be performed to an arbitrary high precision. An Age-of-Information network is described by a vector of natural numbers, that track how outdated status information from various agents is. Our algorithm yields the means to determine any moment of the corresponding stochastic process. This can be extremely valuable for cases in which the network consists of controllers that communicate with one another, as it potentially allows for less conservative control behavior. It also enables the comparison of different policies regarding their performance (minimizing the average Age-of-Information) to a much more accurate degree than was possible before. This is illustrated using the conventional MaxWeight policy and the optimal policy. We also validate and compare the algorithm with Monte-Carlo-Simulations.
△ Less
Submitted 11 June, 2022;
originally announced June 2022.
-
Open or not open: Are conventional radio access networks more secure and trustworthy than Open-RAN?
Authors:
Felix Klement,
Stefan Katzenbeisser,
Vincent Ulitzsch,
Juliane Krämer,
Slawomir Stanczak,
Zoran Utkovski,
Igor Bjelakovic,
Gerhard Wunder
Abstract:
The Open RAN architecture is a promising and future-oriented architecture. It is intended to open up the radio access network (RAN) and enable more innovation and competition in the market. This will lead to RANs for current 5G networks, but especially for future 6G networks, evolving from the current highly integrated, vendor-specific RAN architecture towards disaggregated architectures with open…
▽ More
The Open RAN architecture is a promising and future-oriented architecture. It is intended to open up the radio access network (RAN) and enable more innovation and competition in the market. This will lead to RANs for current 5G networks, but especially for future 6G networks, evolving from the current highly integrated, vendor-specific RAN architecture towards disaggregated architectures with open interfaces that will enable to better tailor RAN solutions to the requirements of 5G and 6G applications. However, the introduction of such an open architecture substantially broadens the attack possibilities when compared to conventional RANs. In the past, this has often led to negative headlines that in summary have associated Open RAN with faulty or inadequate security. In this paper, we analyze what components are involved in an Open RAN deployment, how to assess the current state of security, and what measures need to be taken to ensure secure operation.
△ Less
Submitted 22 June, 2022; v1 submitted 26 April, 2022;
originally announced April 2022.
-
A Reverse Jensen Inequality Result with Application to Mutual Information Estimation
Authors:
Gerhard Wunder,
Benedikt Groß,
Rick Fritschek,
Rafael F. Schaefer
Abstract:
The Jensen inequality is a widely used tool in a multitude of fields, such as for example information theory and machine learning. It can be also used to derive other standard inequalities such as the inequality of arithmetic and geometric means or the Hölder inequality. In a probabilistic setting, the Jensen inequality describes the relationship between a convex function and the expected value. I…
▽ More
The Jensen inequality is a widely used tool in a multitude of fields, such as for example information theory and machine learning. It can be also used to derive other standard inequalities such as the inequality of arithmetic and geometric means or the Hölder inequality. In a probabilistic setting, the Jensen inequality describes the relationship between a convex function and the expected value. In this work, we want to look at the probabilistic setting from the reverse direction of the inequality. We show that under minimal constraints and with a proper scaling, the Jensen inequality can be reversed. We believe that the resulting tool can be helpful for many applications and provide a variational estimation of mutual information, where the reverse inequality leads to a new estimator with superior training behavior compared to current estimators.
△ Less
Submitted 12 November, 2021;
originally announced November 2021.
-
Guaranteed blind deconvolution and demixing via hierarchically sparse reconstruction
Authors:
Axel Flinth,
Ingo Roth,
Benedikt Groß,
Jens Eisert,
Gerhard Wunder
Abstract:
The blind deconvolution problem amounts to reconstructing both a signal and a filter from the convolution of these two. It constitutes a prominent topic in mathematical and engineering literature. In this work, we analyze a sparse version of the problem: The filter $h\in \mathbb{R}^μ$ is assumed to be $s$-sparse, and the signal $b \in \mathbb{R}^n$ is taken to be $σ$-sparse, both supports being un…
▽ More
The blind deconvolution problem amounts to reconstructing both a signal and a filter from the convolution of these two. It constitutes a prominent topic in mathematical and engineering literature. In this work, we analyze a sparse version of the problem: The filter $h\in \mathbb{R}^μ$ is assumed to be $s$-sparse, and the signal $b \in \mathbb{R}^n$ is taken to be $σ$-sparse, both supports being unknown. We observe a convolution between the filter and a linear transformation of the signal. Motivated by practically important multi-user communication applications, we derive a recovery guarantee for the simultaneous demixing and deconvolution setting. We achieve efficient recovery by relaxing the problem to a hierarchical sparse recovery for which we can build on a flexible framework. At the same time, for this we pay the price of some sub-optimal guarantees compared to the number of free parameters of the problem. The signal model we consider is sufficiently general to capture many applications in a number of engineering fields. Despite their practical importance, we provide first rigorous performance guarantees for efficient and simple algorithms for the bi-sparse and generalized demixing setting. We complement our analytical results by presenting results of numerical simulations. We find evidence that the sub-optimal scaling $s^2σ\log(μ)\log(n)$ of our derived sufficient condition is likely overly pessimistic and that the observed performance is better described by a scaling proportional to $ sσ$ up to log-factors.
△ Less
Submitted 5 November, 2021;
originally announced November 2021.
-
Explicit CSI Feedback Compression via Learned Approximate Message Passing
Authors:
Benedikt Groß,
Rana Ahmed Salem,
Thorsten Wild,
Gerhard Wunder
Abstract:
Explicit channel state information at the transmitter side is helpful to improve downlink precoding performance for multi-user MIMO systems. In order to reduce feedback signalling overhead, compression of Channel State Information (CSI) is essential. In this work different low complexity compressed sensing algorithms are compared in the context of an explicit CSI feedback scheme for 5G new radio.…
▽ More
Explicit channel state information at the transmitter side is helpful to improve downlink precoding performance for multi-user MIMO systems. In order to reduce feedback signalling overhead, compression of Channel State Information (CSI) is essential. In this work different low complexity compressed sensing algorithms are compared in the context of an explicit CSI feedback scheme for 5G new radio. A neural network approach, based on learned approximate message passing for the computation of row-sparse solutions to matrix-valued compressed sensing problems is introduced. Due to extensive weight sharing, it shares the low memory footprint and fast evaluation of the forward pass with few iterations of a first order iterative algorithm. Furthermore it can be trained on purely synthetic data prior to deployment. Its performance in the explicit CSI feedback application is evaluated, and its key benefits in terms of computational complexity savings are discussed.
△ Less
Submitted 12 October, 2021;
originally announced October 2021.
-
Reinforce Security: A Model-Free Approach Towards Secure Wiretap Coding
Authors:
Rick Fritschek,
Rafael F. Schaefer,
Gerhard Wunder
Abstract:
The use of deep learning-based techniques for approximating secure encoding functions has attracted considerable interest in wireless communications due to impressive results obtained for general coding and decoding tasks for wireless communication systems. Of particular importance is the development of model-free techniques that work without knowledge about the underlying channel. Such techniques…
▽ More
The use of deep learning-based techniques for approximating secure encoding functions has attracted considerable interest in wireless communications due to impressive results obtained for general coding and decoding tasks for wireless communication systems. Of particular importance is the development of model-free techniques that work without knowledge about the underlying channel. Such techniques utilize for example generative adversarial networks to estimate and model the conditional channel distribution, mutual information estimation as a reward function, or reinforcement learning. In this paper, the approach of reinforcement learning is studied and, in particular, the policy gradient method for a model-free approach of neural network-based secure encoding is investigated. Previously developed techniques for enforcing a certain co-set structure on the encoding process can be combined with recent reinforcement learning approaches. This new approach is evaluated by extensive simulations, and it is demonstrated that the resulting decoding performance of an eavesdropper is capped at a certain error level.
△ Less
Submitted 1 June, 2021;
originally announced June 2021.
-
Measure Concentration on the OFDM-based Random Access Channel
Authors:
Gerhard Wunder,
Axel Flinth,
Benedikt Groß
Abstract:
It is well known that CS can boost massive random access protocols. Usually, the protocols operate in some overloaded regime where the sparsity can be exploited. In this paper, we consider a different approach by taking an orthogonal FFT base, subdivide its image into appropriate sub-channels and let each subchannel take only a fraction of the load. To show that this approach can actually achieve…
▽ More
It is well known that CS can boost massive random access protocols. Usually, the protocols operate in some overloaded regime where the sparsity can be exploited. In this paper, we consider a different approach by taking an orthogonal FFT base, subdivide its image into appropriate sub-channels and let each subchannel take only a fraction of the load. To show that this approach can actually achieve the full capacity we provide i) new concentration inequalities, and ii) devise a sparsity capture effect, i.e where the sub-division can be driven such that the activity in each each sub-channel is sparse by design. We show by simulations that the system is scalable resulting in a coarsely 30-fold capacity increase.
△ Less
Submitted 21 May, 2021;
originally announced May 2021.
-
Hierarchical sparse recovery from hierarchically structured measurements with application to massive random access
Authors:
Benedikt Groß,
Axel Flinth,
Ingo Roth,
Jens Eisert,
Gerhard Wunder
Abstract:
A new family of operators, coined hierarchical measurement operators, is introduced and discussed within the well-known hierarchical sparse recovery framework. Such operator is a composition of block and mixing operations and notably contains the Kronecker product as a special case. Results on their hierarchical restricted isometry property (HiRIP) are derived, generalizing prior work on recovery…
▽ More
A new family of operators, coined hierarchical measurement operators, is introduced and discussed within the well-known hierarchical sparse recovery framework. Such operator is a composition of block and mixing operations and notably contains the Kronecker product as a special case. Results on their hierarchical restricted isometry property (HiRIP) are derived, generalizing prior work on recovery of hierarchically sparse signals from Kronecker-structured linear measurements. Specifically, these results show that, very surprisingly, sparsity properties of the block and mixing part can be traded against each other. The measurement structure is well-motivated by a massive random access channel design in communication engineering. Numerical evaluation of user detection rates demonstrate the huge benefit of the theoretical framework.
△ Less
Submitted 7 May, 2021;
originally announced May 2021.
-
Hierarchical compressed sensing
Authors:
Jens Eisert,
Axel Flinth,
Benedikt Groß,
Ingo Roth,
Gerhard Wunder
Abstract:
Compressed sensing is a paradigm within signal processing that provides the means for recovering structured signals from linear measurements in a highly efficient manner. Originally devised for the recovery of sparse signals, it has become clear that a similar methodology would also carry over to a wealth of other classes of structured signals. In this work, we provide an overview over the theory…
▽ More
Compressed sensing is a paradigm within signal processing that provides the means for recovering structured signals from linear measurements in a highly efficient manner. Originally devised for the recovery of sparse signals, it has become clear that a similar methodology would also carry over to a wealth of other classes of structured signals. In this work, we provide an overview over the theory of compressed sensing for a particularly rich family of such signals, namely those of hierarchically structured signals. Examples of such signals are constituted by blocked vectors, with only few non-vanishing sparse blocks. We present recovery algorithms based on efficient hierarchical hard-thresholding. The algorithms are guaranteed to converge, in a stable fashion both with respect to measurement noise as well as to model mismatches, to the correct solution provided the measurement map acts isometrically restricted to the signal class. We then provide a series of results establishing the required condition for large classes of measurement ensembles. Building upon this machinery, we sketch practical applications of this framework in machine-type communications and quantum tomography.
△ Less
Submitted 8 December, 2021; v1 submitted 6 April, 2021;
originally announced April 2021.
-
ComPass: Proximity Aware Common Passphrase Agreement Protocol for Wi-Fi devices Using Physical Layer Security
Authors:
Khan Reaz,
Gerhard Wunder
Abstract:
Secure and scalable device provisioning is a notorious challenge in Wi-Fi. WPA2/WPA3 solutions take user interaction and a strong passphrase for granted. However, the often weak passphrases are subject to guessing attacks. Notably, there has been a significant rise of cyberattacks on Wi-Fi home or small office networks during the COVID-19 pandemic. This paper addresses the device provisioning prob…
▽ More
Secure and scalable device provisioning is a notorious challenge in Wi-Fi. WPA2/WPA3 solutions take user interaction and a strong passphrase for granted. However, the often weak passphrases are subject to guessing attacks. Notably, there has been a significant rise of cyberattacks on Wi-Fi home or small office networks during the COVID-19 pandemic. This paper addresses the device provisioning problem in Wi-Fi (personal mode) and proposes ComPass protocol to supplement WPA2/WPA3. ComPass replaces the pre-installed or user-selected passphrases with automatically generated ones. For this, ComPass employs Physical Layer Security and extracts credentials from common random physical layer parameters between devices. Two major features make ComPass unique and superior compared to previous proposals: First, it employs phase information (rather than amplitude or signal strength) to generate the passphrase so that it is robust, scaleable, and impossible to guess. Our analysis showed that ComPass generated passphrases have 3 times more entropy than human generated passphrases (113-bits vs. 34-bits). Second, ComPass selects parameters such that two devices bind only within a certain proximity (less than 3m), hence providing practically useful in-build PLS-based authentiation. ComPass is available as a kernel module or as full firmware.
△ Less
Submitted 27 April, 2021; v1 submitted 11 March, 2021;
originally announced March 2021.
-
Using AoI Forecasts in Communicating and Robust Distributed Model-Predictive Control
Authors:
Jannik Hahn,
Richard Schoeffauer,
Gerhard Wunder,
Olaf Stursberg
Abstract:
In order to enhance the performance of cyber-physical systems, this paper proposes the integrated de-sign of distributed controllers for distributed plants andthe control of the communication network. Conventionaldesign methods use static interfaces between both enti-ties and therefore rely on worst-case estimations of com-munication delay, often leading to conservative behaviorof the overall syst…
▽ More
In order to enhance the performance of cyber-physical systems, this paper proposes the integrated de-sign of distributed controllers for distributed plants andthe control of the communication network. Conventionaldesign methods use static interfaces between both enti-ties and therefore rely on worst-case estimations of com-munication delay, often leading to conservative behaviorof the overall system. By contrast, the present approachestablishes a robust distributed model-predictive controlscheme, in which the local subsystem controllers oper-ate under the assumption of a variable communicationschedule that is predicted by a network controller. Us-ing appropriate models for the communication network,the network controller applies a predictive network policyfor scheduling the communication among the subsystemcontrollers across the network. Given the resulting time-varying predictions of the age of information, the papershows under which conditions the subsystem controllerscan robustly stabilize the distributed system. To illustratethe approach, the paper also reports on the application to avehicle platooning scenario.
△ Less
Submitted 9 March, 2021;
originally announced March 2021.
-
WiFi-Based Channel Impulse Response Estimation and Localization via Multi-Band Splicing
Authors:
Mahdi Barzegar Khalilsarai,
Benedikt Gross,
Stelios Stefanatos,
Gerhard Wunder,
Giuseppe Caire
Abstract:
Using commodity WiFi data for applications such as indoor localization, object identification and tracking and channel sounding has recently gained considerable attention. We study the problem of channel impulse response (CIR) estimation from commodity WiFi channel state information (CSI). The accuracy of a CIR estimation method in this setup is limited by both the available channel bandwidth as w…
▽ More
Using commodity WiFi data for applications such as indoor localization, object identification and tracking and channel sounding has recently gained considerable attention. We study the problem of channel impulse response (CIR) estimation from commodity WiFi channel state information (CSI). The accuracy of a CIR estimation method in this setup is limited by both the available channel bandwidth as well as various CSI distortions induced by the underlying hardware. We propose a multi-band splicing method that increases channel bandwidth by combining CSI data across multiple frequency bands. In order to compensate for the CSI distortions, we develop a per-band processing algorithm that is able to estimate the distortion parameters and remove them to yield the "clean" CSI. This algorithm incorporates the atomic norm denoising sparse recovery method to exploit channel sparsity. Splicing clean CSI over M frequency bands, we use orthogonal matching pursuit (OMP) as an estimation method to recover the sparse CIR with high (M-fold) resolution. Unlike previous works in the literature, our method does not appeal to any limiting assumption on the CIR (other than the widely accepted sparsity assumption) or any ad hoc processing for distortion removal. We show, empirically, that the proposed method outperforms the state of the art in terms of localization accuracy.
△ Less
Submitted 20 November, 2020;
originally announced November 2020.
-
Neural Mutual Information Estimation for Channel Coding: State-of-the-Art Estimators, Analysis, and Performance Comparison
Authors:
Rick Fritschek,
Rafael F. Schaefer,
Gerhard Wunder
Abstract:
Deep learning based physical layer design, i.e., using dense neural networks as encoders and decoders, has received considerable interest recently. However, while such an approach is naturally training data-driven, actions of the wireless channel are mimicked using standard channel models, which only partially reflect the physical ground truth. Very recently, neural network based mutual informatio…
▽ More
Deep learning based physical layer design, i.e., using dense neural networks as encoders and decoders, has received considerable interest recently. However, while such an approach is naturally training data-driven, actions of the wireless channel are mimicked using standard channel models, which only partially reflect the physical ground truth. Very recently, neural network based mutual information (MI) estimators have been proposed that directly extract channel actions from the input-output measurements and feed these outputs into the channel encoder. This is a promising direction as such a new design paradigm is fully adaptive and training data-based. This paper implements further recent improvements of such MI estimators, analyzes theoretically their suitability for the channel coding problem, and compares their performance. To this end, a new MI estimator using a \emph{``reverse Jensen''} approach is proposed.
△ Less
Submitted 29 June, 2020;
originally announced June 2020.
-
Stability Results on Synchronized Queues in Discrete-Time for Arbitrary Dimension
Authors:
Richard Schoeffauer,
Gerhard Wunder
Abstract:
In a batch of synchronized queues, customers can only be serviced all at once or not at all, implying that service remains idle if at least one queue is empty. We propose that a batch of $n$ synchronized queues in a discrete-time setting is quasi-stable for $n \in \{2,3\}$ and unstable for $n \geq 4$. A correspondence between such systems and a random-walk-like discrete-time Markov chain (DTMC), w…
▽ More
In a batch of synchronized queues, customers can only be serviced all at once or not at all, implying that service remains idle if at least one queue is empty. We propose that a batch of $n$ synchronized queues in a discrete-time setting is quasi-stable for $n \in \{2,3\}$ and unstable for $n \geq 4$. A correspondence between such systems and a random-walk-like discrete-time Markov chain (DTMC), which operates on a quotient space of the original state-space, is derived. Using this relation, we prove the proposition by showing that the DTMC is transient for $n \geq 4$ and null-recurrent (hence quasi-stability) for $n \in \{2,3\}$ via evaluating infinite power sums over skewed binomial coefficients.
Ignoring the special structure of the quotient space, the proposition can be interpreted as a result of Pólya's theorem on random walks, since the dimension of said space is $d-1$.
△ Less
Submitted 25 June, 2020;
originally announced June 2020.
-
Hierarchical Isometry Properties of Hierarchical Measurements
Authors:
Axel Flinth,
Benedikt Groß,
Ingo Roth,
Jens Eisert,
Gerhard Wunder
Abstract:
A new class of measurement operators, coined hierarchical measurement operators, and prove results guaranteeing the efficient, stable and robust recovery of hierarchically structured signals from such measurements. We derive bounds on their hierarchical restricted isometry properties based on the restricted isometry constants of their constituent matrices, generalizing and extending prior work on…
▽ More
A new class of measurement operators, coined hierarchical measurement operators, and prove results guaranteeing the efficient, stable and robust recovery of hierarchically structured signals from such measurements. We derive bounds on their hierarchical restricted isometry properties based on the restricted isometry constants of their constituent matrices, generalizing and extending prior work on Kronecker-product measurements. As an exemplary application, we apply the theory to two communication scenarios. The fast and scalable HiHTP algorithm is shown to be suitable for solving these types of problems and its performance is evaluated numerically in terms of sparse signal recovery and block detection capability.
△ Less
Submitted 14 December, 2021; v1 submitted 20 May, 2020;
originally announced May 2020.
-
Model-Predictive Control for Discrete-Time Queueing Networks with Varying Topology
Authors:
Richard Schoeffauer,
Gerhard Wunder
Abstract:
In this paper, we equip the conventional discrete-time queueing network with a Markovian input process, that, in addition to the usual short-term stochastics, governs the mid- to long-term behavior of the links between the network nodes. This is reminiscent of so-called Jump-Markov systems in control theory and allows the network topology to change over time. We argue that the common back-pressure…
▽ More
In this paper, we equip the conventional discrete-time queueing network with a Markovian input process, that, in addition to the usual short-term stochastics, governs the mid- to long-term behavior of the links between the network nodes. This is reminiscent of so-called Jump-Markov systems in control theory and allows the network topology to change over time. We argue that the common back-pressure control policy is inadequate to control such network dynamics and propose a novel control policy inspired by the paradigms of model-predictive control. Specifically, by defining a suitable but arbitrary prediction horizon, our policy takes into account the future network states and possible control actions. This stands in clear contrast to most other policies which are myopic, i.e. only consider the next state. We show numerically that such an approach can significantly improve the control performance and introduce several variants, thereby trading off performance versus computational complexity. In addition, we prove so-called throughput optimality of our policy which guarantees stability for all network flows that can be maintained by the network. Interestingly, in contrast to general stability proofs in model-predictive control, our proof does not require the assumption of a terminal set (i.e. for the prediction horizon to be large enough). Finally, we provide several illustrating examples, one of which being a network of synchronized queues. This one in particular constitutes an interesting system class, in which our policy exerts superiority over general back-pressure policies, that even lose their throughput optimality in those networks.
△ Less
Submitted 4 April, 2020;
originally announced April 2020.
-
The Method of Conditional Expectations for PAPR and Cubic Metric Reduction
Authors:
Saeed Afrasiabi-Gorgani,
Gerhard Wunder
Abstract:
The OFDM waveform exhibits high fluctuation in the signal envelope which causes distortion in the nonlinear power amplifier of the transmitter. Peak-to-Average Power Ratio (PAPR) and Cubic Metric (CM) are the common metrics to quantify the phenomenon. A promising approach for PAPR or CM reduction is Sign Selection which is based on altering the signs of the data symbols. In this paper, the Method…
▽ More
The OFDM waveform exhibits high fluctuation in the signal envelope which causes distortion in the nonlinear power amplifier of the transmitter. Peak-to-Average Power Ratio (PAPR) and Cubic Metric (CM) are the common metrics to quantify the phenomenon. A promising approach for PAPR or CM reduction is Sign Selection which is based on altering the signs of the data symbols. In this paper, the Method of Conditional Expectations (CE Method) is proposed to obtain a competing suboptimal solution to the Sign Selection problem. For PAPR reduction, a surrogate metric is introduced which allows for an efficient application of the CE Method. For CM reduction, the tractability of the definition of CM is exploited to this end. The algorithm is analyzed to obtain an upper bound on the worst-case reduced metric value. A noticeable characteristic is the persistent reduction capability for a wide range of subcarrier numbers. In particular, simulations show a reduction of the so-called "effective PAPR" to about 6.5 dB from 10.5 dB and 11.7 dB respectively for 64 to 1024 subcarriers. A similar steady reduction of 3 dB is observed for CM. In addition, the CE Method leads to a pruned version of Sign Selection which halves the rate loss.
△ Less
Submitted 25 March, 2020; v1 submitted 23 September, 2019;
originally announced September 2019.
-
Predictive Network Control in Multi-Connectivity Mobility for URLLC Services
Authors:
David Guzman,
Richard Schoeffauer,
Gerhard Wunder
Abstract:
This paper proposes a centralized predictive flow controller to handle multi-connectivity for ultra-reliable low latency communication (URLLC) services. The prediction is based on channel state information (CSI) and buffer state reports from the system nodes. For this, we extend CSI availability to a packet data convergence protocol (PDCP) controller. The controller captures CSI in a discrete time…
▽ More
This paper proposes a centralized predictive flow controller to handle multi-connectivity for ultra-reliable low latency communication (URLLC) services. The prediction is based on channel state information (CSI) and buffer state reports from the system nodes. For this, we extend CSI availability to a packet data convergence protocol (PDCP) controller. The controller captures CSI in a discrete time Markov chain (DTMC). The DTMC is used to predict forwarding decisions over a finite time horizon. The novel mathematical model optimizes over finite trajectories based on a linear program. The results show performance improvements in a multi-layer small cell mobility scenario in terms of end-to-end (E2E) throughput. Furthermore, 5G new radio (NR) complaint system level simulations (SLS) and results are shown for dual connectivity as well as for the general multi-connectivity case.
△ Less
Submitted 2 July, 2019;
originally announced July 2019.
-
The Method of Conditional Expectations for Cubic Metric Reduction in OFDM
Authors:
Saeed Afrasiabi-Gorgani,
Gerhard Wunder
Abstract:
High variations in the OFDM signal envelope cause nonlinear distortion in the power amplifier of the transmitter, which is a major drawback. Peak-to-Average Power Ratio (PAPR) and Cubic Metric (CM) are commonly used for quantifying this characteristic of the signal. Despite the reportedly higher accuracy compared to PAPR, limited research has been done on reduction algorithms for CM. In this paper…
▽ More
High variations in the OFDM signal envelope cause nonlinear distortion in the power amplifier of the transmitter, which is a major drawback. Peak-to-Average Power Ratio (PAPR) and Cubic Metric (CM) are commonly used for quantifying this characteristic of the signal. Despite the reportedly higher accuracy compared to PAPR, limited research has been done on reduction algorithms for CM. In this paper, the Method of Conditional Expectations (CE Method) is used to achieve CM reduction by the Sign Selection approach. Using the CE Method, the amenable mathematical structure of CM is exploited to develop a low complexity algorithm. In addition, guaranteed reduction is analytically proved for every combination of the data symbols. Simulations show a reduction gain of almost 3 dB in Raw Cubic Metric (RCM) for practically all subcarrier numbers, which is achieved using only half the full rate loss of the Sign Selection approach.
△ Less
Submitted 8 May, 2019;
originally announced May 2019.
-
Non-Coherent Joint Transmission in Poisson Cellular Networks Under Pilot Contamination
Authors:
Stelios Stefanatos,
Gerhard Wunder
Abstract:
This paper investigates the performance of downlink cellular networks with non-coherent joint (mutlipoint) transmissions and practical channel estimation. Under a stochastic geometry framework, the spatial average signal-to-noise-ratio (SNR) is characterized, taking into account the effect of channel estimation error due to pilot contamination. A simple, easy to compute SNR expression is obtained…
▽ More
This paper investigates the performance of downlink cellular networks with non-coherent joint (mutlipoint) transmissions and practical channel estimation. Under a stochastic geometry framework, the spatial average signal-to-noise-ratio (SNR) is characterized, taking into account the effect of channel estimation error due to pilot contamination. A simple, easy to compute SNR expression is obtained under the assumption of randomly generated pilot sequences and minimal prior information about the channels and positions of access points (APs). This SNR expression allows for the efficient joint optimization of critical system design parameters such as number of cooperating APs and training overhead. Among others, it is shown that multipoint transmissions are preferable to conventional (non-cooperative) cellular operation under certain operational conditions. Furthermore, analytical insights are obtained regarding (a) the minimum training overhead required to achieve a given SNR degradation compared to the perfect channel estimation case and (b) the optimal number of cooperating APs when an arbitrarily large training overhead can be afforded. For the latter, in particular, a phase transition phenomenon is identified, where the optimal number of cooperating APs is either finite or infinite, depending on whether the path loss factor is less or equal than a certain value, respectively.
△ Less
Submitted 1 July, 2019; v1 submitted 14 March, 2019;
originally announced March 2019.
-
Deep Learning for Channel Coding via Neural Mutual Information Estimation
Authors:
Rick Fritschek,
Rafael F. Schaefer,
Gerhard Wunder
Abstract:
End-to-end deep learning for communication systems, i.e., systems whose encoder and decoder are learned, has attracted significant interest recently, due to its performance which comes close to well-developed classical encoder-decoder designs. However, one of the drawbacks of current learning approaches is that a differentiable channel model is needed for the training of the underlying neural netw…
▽ More
End-to-end deep learning for communication systems, i.e., systems whose encoder and decoder are learned, has attracted significant interest recently, due to its performance which comes close to well-developed classical encoder-decoder designs. However, one of the drawbacks of current learning approaches is that a differentiable channel model is needed for the training of the underlying neural networks. In real-world scenarios, such a channel model is hardly available and often the channel density is not even known at all. Some works, therefore, focus on a generative approach, i.e., generating the channel from samples, or rely on reinforcement learning to circumvent this problem. We present a novel approach which utilizes a recently proposed neural estimator of mutual information. We use this estimator to optimize the encoder for a maximized mutual information, only relying on channel samples. Moreover, we show that our approach achieves the same performance as state-of-the-art end-to-end learning with perfect channel model knowledge.
△ Less
Submitted 7 March, 2019;
originally announced March 2019.
-
WiFi-Based Indoor Localization via Multi-Band Splicing and Phase Retrieval
Authors:
Mahdi Barzegar Khalilsarai,
Stelios Stefanatos,
Gerhard Wunder,
Giuseppe Caire
Abstract:
We study the problem of indoor localization using commodity WiFi channel state information (CSI) measurements. The accuracy of methods developed to address this problem is limited by the overall bandwidth used by the WiFi device as well as various types of signal distortions imposed by the underlying hardware. In this paper, we propose a localization method that performs channel impulse response (…
▽ More
We study the problem of indoor localization using commodity WiFi channel state information (CSI) measurements. The accuracy of methods developed to address this problem is limited by the overall bandwidth used by the WiFi device as well as various types of signal distortions imposed by the underlying hardware. In this paper, we propose a localization method that performs channel impulse response (CIR) estimation by splicing measured CSI over multiple WiFi bands. In order to overcome hardware-induced phase distortions, we propose a phase retrieval (PR) scheme that only uses CSI magnitude values to estimate the CIR. To achieve high localization accuracy, the PR scheme involves a sparse recovery step, which exploits the fact that the CIR is sparse over the delay domain, due to the small number of contributing signal paths in an indoor environment. Simulation results indicate that our approach outperforms the state of the art by an order of magnitude (cm-level localization accuracy) for more than 90% of the trials and for various SNR regimes.
△ Less
Submitted 6 March, 2019;
originally announced March 2019.
-
Deep Learning for the Gaussian Wiretap Channel
Authors:
Rick Fritschek,
Rafael F. Schaefer,
Gerhard Wunder
Abstract:
End-to-end learning of communication systems with neural networks and particularly autoencoders is an emerging research direction which gained popularity in the last year. In this approach, neural networks learn to simultaneously optimize encoding and decoding functions to establish reliable message transmission. In this paper, this line of thinking is extended to communication scenarios in which…
▽ More
End-to-end learning of communication systems with neural networks and particularly autoencoders is an emerging research direction which gained popularity in the last year. In this approach, neural networks learn to simultaneously optimize encoding and decoding functions to establish reliable message transmission. In this paper, this line of thinking is extended to communication scenarios in which an eavesdropper must further be kept ignorant about the communication. The secrecy of the transmission is achieved by utilizing a modified secure loss function based on cross-entropy which can be implemented with state-of-the-art machine-learning libraries. This secure loss function approach is applied in a Gaussian wiretap channel setup, for which it is shown that the neural network learns a trade-off between reliable communication and information secrecy by clustering learned constellations. As a result, an eavesdropper with higher noise cannot distinguish between the symbols anymore.
△ Less
Submitted 11 March, 2019; v1 submitted 30 October, 2018;
originally announced October 2018.
-
Distributed MPC with Prediction of Time-Varying Communication Delay
Authors:
Jannik Hahn,
Richard Schoeffauer,
Gerhard Wunder,
Olaf Stursberg
Abstract:
The novel idea presented in this paper is to interweave distributed model predictive control with a reliable scheduling of the information that is interchanged between local controllers of the plant subsystems. To this end, a dynamic model of the communication network and a predictive scheduling algorithm are proposed, the latter providing predictions of the delay between sending and receiving inf…
▽ More
The novel idea presented in this paper is to interweave distributed model predictive control with a reliable scheduling of the information that is interchanged between local controllers of the plant subsystems. To this end, a dynamic model of the communication network and a predictive scheduling algorithm are proposed, the latter providing predictions of the delay between sending and receiving information. These predictions can be used by the local subsystem controllers to improve their control performance, as exemplary shown for a platooning example.
△ Less
Submitted 14 September, 2018;
originally announced September 2018.
-
A linear algorithm for reliable predictive network control
Authors:
Richard Schoeffauer,
Gerhard Wunder
Abstract:
This paper introduces a novel control approach for network scheduling and routing that is predictive and reliable in its nature, yet builds upon a linear program, making it fast in execution. First, we describe the canonical system model and how we expand it to be able to predict the success of transmissions. Furthermore, we define a notion of reliability and then explain the algorithm. With exten…
▽ More
This paper introduces a novel control approach for network scheduling and routing that is predictive and reliable in its nature, yet builds upon a linear program, making it fast in execution. First, we describe the canonical system model and how we expand it to be able to predict the success of transmissions. Furthermore, we define a notion of reliability and then explain the algorithm. With extended simulations, we demonstrate the gains in performance over the well known MaxWeight policy.
△ Less
Submitted 14 September, 2018;
originally announced September 2018.
-
Performance of Hierarchical Sparse Detectors for Massive MTC
Authors:
Gerhard Wunder,
Ingo Roth,
Rick Fritschek,
Jens Eisert
Abstract:
Recently, a new class of so-called \emph{hierarchical thresholding algorithms} was introduced to optimally exploit the sparsity structure in joint user activity and channel detection problems. In this paper, we take a closer look at the user detection performance of such algorithms under noise and relate its performance to the classical block correlation detector with orthogonal signatures. More s…
▽ More
Recently, a new class of so-called \emph{hierarchical thresholding algorithms} was introduced to optimally exploit the sparsity structure in joint user activity and channel detection problems. In this paper, we take a closer look at the user detection performance of such algorithms under noise and relate its performance to the classical block correlation detector with orthogonal signatures. More specifically, we derive a lower bound for the diversity order which, under suitable choice of the signatures, equals that of the block correlation detector. Surprisingly, in specific parameter settings non-orthogonal pilots, i.e. pilots where (cyclically) shifted versions interfere with each other, outperform the block correlation detector. Altogether, we show that, in wide parameter regimes, the hierarchical thresholding detectors behave like the classical correlator with improved detection performance but operate with much less required pilot subcarriers. We provide mathematically rigorous and easy to handle formulas for numerical evaluations and system design. Finally, we evaluate our findings with numerical examples and show that, in a practical parameter setting, a classical pilot channel can accommodate up to three advanced pilot channels with the same performance.
△ Less
Submitted 19 October, 2018; v1 submitted 7 June, 2018;
originally announced June 2018.
-
Low-Overhead Hierarchically-Sparse Channel Estimation for Multiuser Wideband Massive MIMO
Authors:
Gerhard Wunder,
Stelios Stefanatos,
Axel Flinth,
Ingo Roth,
Giuseppe Caire
Abstract:
The problem of excessive pilot overhead required for uplink massive MIMO channel estimation is well known, let alone when it is considered along with wideband (OFDM) transmissions. Towards channel estimators that are both efficient and require low-training overhead, compressive sensing (CS) approaches have been increasingly popular, exploiting the sparse nature of the physical channel. However, no…
▽ More
The problem of excessive pilot overhead required for uplink massive MIMO channel estimation is well known, let alone when it is considered along with wideband (OFDM) transmissions. Towards channel estimators that are both efficient and require low-training overhead, compressive sensing (CS) approaches have been increasingly popular, exploiting the sparse nature of the physical channel. However, no analytical insights regarding the overhead required for reliable channel estimation in wideband massive MIMO are available. By observing that the wideband massive MIMO channel can be represented by a vector that is not simply sparse but has well defined structural properties, referred to as hierarchical sparsity, we propose low complexity channel estimators for the multiuser scenario that take this property into account. By employing the framework of the hierarchical restricted isometry property, rigorous performance guarantees for these algorithms are provided suggesting concrete design goals for the user pilot sequences. For a specific design, we analytically characterize the scaling of the required pilot overhead with increasing number of antennas and bandwidth, revealing that, as long as the number of antennas is sufficiently large, it is independent of the per user channel sparsity level as well as the number of active users. Hence, surprisingly, in contrast to the classical setting, pilot overhead can be shifted into spatial dimensions not affecting crucial bandwidth constraints thereby increasing the overall system capacity. These analytical insights are verified by simulation results demonstrating also the superiority of the proposed algorithm over conventional CS algorithms that ignore the hierarchical sparsity property.
△ Less
Submitted 10 December, 2018; v1 submitted 3 June, 2018;
originally announced June 2018.
-
Wideband Massive MIMO Channel Estimation via Sequential Atomic Norm Minimization
Authors:
Stelios Stefanatos,
Mahdi Barzegar Khalilsarai,
Gerhard Wunder
Abstract:
The recently introduced atomic norm minimization (ANM) framework for parameter estimation is a promising candidate towards low overhead channel estimation in wireless communications. However, previous works on ANM-based channel estimation evaluated performance on channels with artificially imposed channel path separability, which cannot be guaranteed in practice. In addition, direct application of…
▽ More
The recently introduced atomic norm minimization (ANM) framework for parameter estimation is a promising candidate towards low overhead channel estimation in wireless communications. However, previous works on ANM-based channel estimation evaluated performance on channels with artificially imposed channel path separability, which cannot be guaranteed in practice. In addition, direct application of the ANM framework for massive MIMO channel estimation is computationally infeasible due to the large dimensions. In this paper, a low-complexity ANM-based channel estimator for wideband massive MIMO is proposed, consisting of two sequential steps, the first estimating the channel over the spatial and the second over the frequency dimension. Its mean squared error performance is analytically characterized in terms of tight lower bounds. It is shown that the proposed algorithm achieves excellent performance that is close to the best that can be achieved by any unbiased channel estimator in the regime of low to moderate number of channel paths, without any restrictions on their separability.
△ Less
Submitted 3 September, 2018; v1 submitted 3 June, 2018;
originally announced June 2018.
-
Towards Massive Connectivity Support for Scalable mMTC Communications in 5G networks
Authors:
Carsten Bockelmann,
Nuno K. Pratas,
Gerhard Wunder,
Stephan Saur,
Monica Navarro,
David Gregoratti,
Guillaume Vivier,
Elisabeth de Carvalho,
Yalei Ji,
Cedomir Stefanovic,
Petar Popovski,
Qi Wang,
Malte Schellmann,
Evangelos Kosmatos,
Panagiotis Demestichas,
Miruna Raceala-Motoc,
Peter Jung,
Slawomir Stanczak,
Armin Dekorsy
Abstract:
The fifth generation of cellular communication systems is foreseen to enable a multitude of new applications and use cases with very different requirements. A new 5G multiservice air interface needs to enhance broadband performance as well as provide new levels of reliability, latency and supported number of users. In this paper we focus on the massive Machine Type Communications (mMTC) service wi…
▽ More
The fifth generation of cellular communication systems is foreseen to enable a multitude of new applications and use cases with very different requirements. A new 5G multiservice air interface needs to enhance broadband performance as well as provide new levels of reliability, latency and supported number of users. In this paper we focus on the massive Machine Type Communications (mMTC) service within a multi-service air interface. Specifically, we present an overview of different physical and medium access techniques to address the problem of a massive number of access attempts in mMTC and discuss the protocol performance of these solutions in a common evaluation framework.
△ Less
Submitted 5 April, 2018;
originally announced April 2018.
-
Predictive Network Control and Throughput Sub-Optimality of MaxWeight
Authors:
Richard Schoeffauer,
Gerhard Wunder
Abstract:
We present a novel control policy, called Predictive Network Control (PNC) to control wireless communication networks (on packet level), based on paradigms of Model Predictive Control (MPC). In contrast to common myopic policies, who use one step ahead prediction, PNC predicts the future behavior of the system for an extended horizon, thus facilitating performance gains. We define an advanced syst…
▽ More
We present a novel control policy, called Predictive Network Control (PNC) to control wireless communication networks (on packet level), based on paradigms of Model Predictive Control (MPC). In contrast to common myopic policies, who use one step ahead prediction, PNC predicts the future behavior of the system for an extended horizon, thus facilitating performance gains. We define an advanced system model in which we use a Markov chain in combination with a Bernoulli trial to model the stochastic components of the network. Furthermore we introduce the algorithm and present two detailed simulation examples, which show general improved performance and a gain in stability region compared to the standard policy.
△ Less
Submitted 31 August, 2018; v1 submitted 2 April, 2018;
originally announced April 2018.
-
Hierarchical Sparse Channel Estimation for Massive MIMO
Authors:
Gerhard Wunder,
Ingo Roth,
Axel Flinth,
Mahdi Barzegar,
Saeid Haghighatshoar,
Giuseppe Caire,
Gitta Kutyniok
Abstract:
The problem of wideband massive MIMO channel estimation is considered. Targeting for low complexity algorithms as well as small training overhead, a compressive sensing (CS) approach is pursued. Unfortunately, due to the Kronecker-type sensing (measurement) matrix corresponding to this setup, application of standard CS algorithms and analysis methodology does not apply. By recognizing that the cha…
▽ More
The problem of wideband massive MIMO channel estimation is considered. Targeting for low complexity algorithms as well as small training overhead, a compressive sensing (CS) approach is pursued. Unfortunately, due to the Kronecker-type sensing (measurement) matrix corresponding to this setup, application of standard CS algorithms and analysis methodology does not apply. By recognizing that the channel possesses a special structure, termed hierarchical sparsity, we propose an efficient algorithm that explicitly takes into account this property. In addition, by extending the standard CS analysis methodology to hierarchical sparse vectors, we provide a rigorous analysis of the algorithm performance in terms of estimation error as well as number of pilot subcarriers required to achieve it. Small training overhead, in turn, means higher number of supported users in a cell and potentially improved pilot decontamination. We believe, that this is the first paper that draws a rigorous connection between the hierarchical framework and Kronecker measurements. Numerical results verify the advantage of employing the proposed approach in this setting instead of standard CS algorithms.
△ Less
Submitted 29 March, 2018;
originally announced March 2018.
-
Hierarchical restricted isometry property for Kronecker product measurements
Authors:
I. Roth,
A. Flinth,
R. Kueng,
J. Eisert,
G. Wunder
Abstract:
Hierarchically sparse signals and Kronecker product structured measurements arise naturally in a variety of applications. The simplest example of a hierarchical sparsity structure is two-level $(s,σ)$-hierarchical sparsity which features $s$-block-sparse signals with $σ$-sparse blocks. For a large class of algorithms recovery guarantees can be derived based on the restricted isometry property (RIP…
▽ More
Hierarchically sparse signals and Kronecker product structured measurements arise naturally in a variety of applications. The simplest example of a hierarchical sparsity structure is two-level $(s,σ)$-hierarchical sparsity which features $s$-block-sparse signals with $σ$-sparse blocks. For a large class of algorithms recovery guarantees can be derived based on the restricted isometry property (RIP) of the measurement matrix and model-based variants thereof. We show that given two matrices $\mathbf{A}$ and $\mathbf{B}$ having the standard $s$-sparse and $σ$-sparse RIP their Kronecker product $\mathbf{A}\otimes\mathbf{B}$ has two-level $(s,σ)$-hierarchically sparse RIP (HiRIP). This result can be recursively generalized to signals with multiple hierarchical sparsity levels and measurements with multiple Kronecker product factors. As a corollary we establish the efficient reconstruction of hierarchical sparse signals from Kronecker product measurements using the HiHTP algorithm. We argue that Kronecker product measurement matrices allow to design large practical compressed sensing systems that are deterministically certified to reliably recover signals in a stable fashion. We elaborate on their motivation from the perspective of applications.
△ Less
Submitted 31 January, 2018;
originally announced January 2018.
-
Secure Massive IoT Using Hierarchical Fast Blind Deconvolution
Authors:
Gerhard Wunder,
Ingo Roth,
Rick Fritschek,
Benedikt Groß,
Jens Eisert
Abstract:
The Internet of Things and specifically the Tactile Internet give rise to significant challenges for notions of security. In this work, we introduce a novel concept for secure massive access. The core of our approach is a fast and low-complexity blind deconvolution algorithm exploring a bi-linear and hierarchical compressed sensing framework. We show that blind deconvolution has two appealing feat…
▽ More
The Internet of Things and specifically the Tactile Internet give rise to significant challenges for notions of security. In this work, we introduce a novel concept for secure massive access. The core of our approach is a fast and low-complexity blind deconvolution algorithm exploring a bi-linear and hierarchical compressed sensing framework. We show that blind deconvolution has two appealing features: 1) There is no need to coordinate the pilot signals, so even in the case of collisions in user activity, the information messages can be resolved. 2) Since all the individual channels are recovered in parallel, and by assumed channel reciprocity, the measured channel entropy serves as a common secret and is used as an encryption key for each user. We will outline the basic concepts underlying the approach and describe the blind deconvolution algorithm in detail. Eventually, simulations demonstrate the ability of the algorithm to recover both channel and message. They also exhibit the inherent trade-offs of the scheme between economical recovery and secret capacity.
△ Less
Submitted 31 January, 2018; v1 submitted 29 January, 2018;
originally announced January 2018.
-
On the Gaussian Multiple Access Wiretap Channel and the Gaussian Wiretap Channel with a Helper: Achievable Schemes and Upper Bounds
Authors:
Rick Fritschek,
Gerhard Wunder
Abstract:
We study deterministic approximations of the Gaussian two-user multiple access wiretap channel (G-MAC-WT) and the Gaussian wiretap channel with a helper (G-WT-H). These approximations enable results beyond the recently shown 2/3 and 1/2 secure degrees of freedom (s.d.o.f.) for the G-MAC-WT and the G-WT-H, respectively. While the s.d.o.f. were obtained by real interference alignment, our approach u…
▽ More
We study deterministic approximations of the Gaussian two-user multiple access wiretap channel (G-MAC-WT) and the Gaussian wiretap channel with a helper (G-WT-H). These approximations enable results beyond the recently shown 2/3 and 1/2 secure degrees of freedom (s.d.o.f.) for the G-MAC-WT and the G-WT-H, respectively. While the s.d.o.f. were obtained by real interference alignment, our approach uses signal-scale alignment. We show achievable schemes which are independent of the rationality of the channel gains. Moreover, our results can differentiate between channel strengths, in particular between both users, and establishes secrecy rates dependent on this difference. We can show that the resulting achievable secrecy rates tend to the s.d.o.f. for vanishing channel gain differences. Moreover, we extend previous and develop new techniques to prove general s.d.o.f. bounds for varying channel strengths and show that our achievable schemes reach the bounds for certain channel gain parameters. We believe that our analysis is the next step towards a constant-gap analysis of the G-MAC-WT and the G-WT-H.
△ Less
Submitted 23 April, 2018; v1 submitted 12 December, 2017;
originally announced December 2017.
-
Estimation of Angles of Arrival Through Superresolution -- A Soft Recovery Approach for General Antenna Geometries
Authors:
Mahdi Barzegar,
Guiseppe Caire,
Axel Flinth,
Saeid Haghighatshoar,
Gitta Kutyniok,
Gerhard Wunder
Abstract:
The estimation of direction of arrivals with help of $TV$-minimization is studied. Contrary to prior work in this direction, which has only considered certain antenna placement designs, we consider general antenna geometries. Applying the soft-recovery framework, we are able to derive a theoretic guarantee for a certain direction of arrival to be approximately recovered. We discuss the impact of t…
▽ More
The estimation of direction of arrivals with help of $TV$-minimization is studied. Contrary to prior work in this direction, which has only considered certain antenna placement designs, we consider general antenna geometries. Applying the soft-recovery framework, we are able to derive a theoretic guarantee for a certain direction of arrival to be approximately recovered. We discuss the impact of the recovery guarantee for a few concrete antenna designs. Additionally, numerical simulations supporting the findings of the theoretical part are performed.
△ Less
Submitted 10 November, 2017;
originally announced November 2017.
-
Performance Limits of Compressive Sensing Channel Estimation in Dense Cloud RAN
Authors:
Stelios Stefanatos,
Gerhard Wunder
Abstract:
Towards reducing the training signaling overhead in large scale and dense cloud radio access networks (CRAN), various approaches have been proposed based on the channel sparsification assumption, namely, only a small subset of the deployed remote radio heads (RRHs) are of significance to any user in the system. Motivated by the potential of compressive sensing (CS) techniques in this setting, this…
▽ More
Towards reducing the training signaling overhead in large scale and dense cloud radio access networks (CRAN), various approaches have been proposed based on the channel sparsification assumption, namely, only a small subset of the deployed remote radio heads (RRHs) are of significance to any user in the system. Motivated by the potential of compressive sensing (CS) techniques in this setting, this paper provides a rigorous description of the performance limits of many practical CS algorithms by considering the performance of the, so called, oracle estimator, which knows a priori which RRHs are of significance but not their corresponding channel values. By using tools from stochastic geometry, a closed form analytical expression of the oracle estimator performance is obtained, averaged over distribution of RRH positions and channel statistics. Apart from a bound on practical CS algorithms, the analysis provides important design insights, e.g., on how the training sequence length affects performance, and identifies the operational conditions where the channel sparsification assumption is valid. It is shown that the latter is true only in operational conditions with sufficiently large path loss exponents.
△ Less
Submitted 8 February, 2018; v1 submitted 30 October, 2017;
originally announced October 2017.
-
Compressive Coded Random Access for Massive MTC Traffic in 5G Systems
Authors:
Gerhard Wunder,
Cedomir Stefanovic,
Petar Popovski,
Lars Thiele
Abstract:
Massive MTC support is an important future market segment, but not yet efficiently supported in cellular systems. In this paper we follow-up on recent concepts combining advanced MAC protocols with Compressed Sensing (CS) based multiuser detection. Specifically, we introduce a concept for sparse joint activity, channel and data detection in the context of the Coded ALOHA (FDMA) protocol. We will a…
▽ More
Massive MTC support is an important future market segment, but not yet efficiently supported in cellular systems. In this paper we follow-up on recent concepts combining advanced MAC protocols with Compressed Sensing (CS) based multiuser detection. Specifically, we introduce a concept for sparse joint activity, channel and data detection in the context of the Coded ALOHA (FDMA) protocol. We will argue that a simple sparse activity and data detection is not sufficient (as many papers do) because control resources are in the order of the data. In addition, we will improve on the performance of such protocols in terms of the reduction of resources required for the user activity, channel estimation and data detection. We will mathematically analyze the system accordingly and provide expressions for the capture probabilities of the underlying sparse multiuser detector. Finally, we will provide structured CS algorithms for the joint estimation scheme and evaluate its performance.
△ Less
Submitted 29 June, 2017;
originally announced July 2017.