Skip to main content

2018-09-13: Reconfigurable Distributed MIMO for Physical-layer Security in Mobile Networks

Zygmunt J. Haas, Professor Emeritus at Cornell University, Ithaca, NY, USA, and Distinguished Chair in Computer Science at the University of Texas at Dallas, TX, USA, will give a talk at 10:30 on the 13th of September in room Q2, Malvinas väg 10. The title of the talk is "Reconfigurable Distributed MIMO for Physical-layer Security in Mobile Networks". Welcome!

Abstract

In this talk, I will discuss the model and performance of the distributed MIMO architecture for mobile networks, which we refer to as Reconfigurable Distributed MIMO (RD-MIMO). In RD-MIMO, the communicating mobile nodes temporarily recruit adjacent nodes to operate as distributed antenna arrays. To best serve the communicating nodes, the node clusters are continuously reconfigured due to the node mobility and the varying channel conditions. The frequency of reconfiguration depends on the required system performance, exhibiting a tradeoff between performance and complexity. We evaluate the asymptotic performance of the scheme as a function of the number of recruited nodes, demonstrating that there is an optimal number of such nodes. Owing to the diversity and differring-in-time channel conditions, we postulate that the RD-MIMO architecture may be especially well suited to physical-layer security. Thus, we study the cooperative MIMO architecture to enable and to improve the secrecy transmissions between clusters of mobile devices in the presence of an eavesdropper with certain location constraints. We obtain the expression of the secrecy rate, where the required average mutual information between the transmitters and the eavesdropper is characterized by closed-form approximations. Numerical results show that the secrecy rate can be significantly improved by leveraging the location constraint of the eavesdropper, compared to the result existing in the literature. We also demonstrate that the secrecy rate can be further improved by increasing the cluster size. Some possible applications of this technology will be discussed in this talk as well.

This seminar is part of the ACCESS DLS series.

About Zygmunt J. Haas

Zygmunt J. Haas received the Ph.D. degree in electrical engineering from Stanford University, Stanford, CA, USA, in 1988. In 1988, he joined AT&T Bell Laboratories in the Network Research Area, where he pursued research in wireless communications, mobility management, fast protocols, optical networks, and optical switching. In August 1995, he joined the Faculty of the School of Electrical and Computer Engineering, Cornell University, Ithaca, NY, USA, where he is currently a Professor Emeritus. As of October 2013, he is also a Distinguished Chair in Computer Science at the University of Texas at Dallas. He is a Fellow of the IEEE.

Dr. Haas heads the Wireless Network Laboratory (WNL), a research group with extensive contributions and international recognition, focussing on the area of wireless ad hoc networks and sensor networks. He has authored over 200 technical conference and journal papers and holds 20 patents in the areas of wireless networks and wireless communications, optical switching and optical networks, and high-speed networking protocols. His research interests include protocols for mobile and wireless communication and networks, secure communications, and modeling and performance evaluation of large and complex systems. He has organized several workshops, delivered numerous tutorials at major IEEE and ACM conferences, and served as an Editor for several journals and magazines, including the IEEE/ACM TRANSACTIONS ON NETWORKING, the IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, the IEEE Communications Magazine, and Wireless Networks (Springer). He has been a Guest Editor of the IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS issues and served as the Chair of the IEEE Technical Committee on Personal Communications (now the Wireless Communications Technical Committee). He was the recipient of a number of awards and distinctions, including several best paper awards, the 2012 IEEE ComSoc WTC Recognition Award for “outstanding achievements and contribution in the area of wireless communications systems and networks,” and the 2016 IEEE ComSoc AHSN Recognition Award for “for outstanding contributions to securing ad hoc and sensor networks.”

Belongs to: School of Electrical Engineering and Computer Science
Last changed: Oct 23, 2019
Title
2021-12-08: Testing Software and Hardware against Speculation Contracts
2021-12 03: Practical Data Access Minimization in Trigger-Action Platforms
2021-11-16: Securing software in the presence of realistic attackers and polices
2021-11-9: An In-depth Study of Java Deserialization Exploits and Vulnerabilities
2019-02-05 Faceted Secure Multi-Execution
2019-01-11 Privacy-preserving ridesharing and multi key-homomorphic signatures
2018-11-06 Authentication and Pairing Using Human Body Impedance
2018-10-26 Security and Privacy in the IoT: An Information-Theoretic Perspective
2018-09-17 Cyber-Defence Panel
2018-09-13: Reconfigurable Distributed MIMO for Physical-layer Security in Mobile Networks
2018-09-03: A Constraint Programming approach to deliver a Tolerant Algebraic Side-Channel Attack of AES
2018-06-18: Coarse-grained information-flow control as a library in Haskell
2018-06-07: The capacity of private information retrieval with eavesdroppers
2018-05-23: Information-Flow Control for Concurrent Programs with Declassification
2018-05-09: Browser fingerprinting: past, present and possible future
2018-05-07: The Verificatum Project 10-year Anniversary