Showing 1–2 of 2 results for author: Blankenship, Y
-
A Primer on 3GPP Narrowband Internet of Things (NB-IoT)
Authors:
Y. -P. Eric Wang,
Xingqin Lin,
Ansuman Adhikary,
Asbjörn Grövlen,
Yutao Sui,
Yufei Blankenship,
Johan Bergman,
Hazhir S. Razaghi
Abstract:
Narrowband Internet of Things (NB-IoT) is a new cellular technology introduced in 3GPP Release 13 for providing wide-area coverage for the Internet of Things (IoT). This article provides an overview of the air interface of NB-IoT. We describe how NB-IoT addresses key IoT requirements such as deployment flexibility, low device complexity, long battery life time, support of massive number of devices…
▽ More
Narrowband Internet of Things (NB-IoT) is a new cellular technology introduced in 3GPP Release 13 for providing wide-area coverage for the Internet of Things (IoT). This article provides an overview of the air interface of NB-IoT. We describe how NB-IoT addresses key IoT requirements such as deployment flexibility, low device complexity, long battery life time, support of massive number of devices in a cell, and significant coverage extension beyond existing cellular technologies. We also share the various design rationales during the standardization of NB-IoT in Release 13 and point out several open areas for future evolution of NB-IoT.
△ Less
Submitted 13 June, 2016;
originally announced June 2016.
-
Security Embedding Codes
Authors:
Hung D. Ly,
Tie Liu,
Yufei Blankenship
Abstract:
This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is show…
▽ More
This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is shown to achieve the secrecy capacity region of the channel in several scenarios. Specifying these results to both scalar and independent parallel Gaussian channels (under an average individual per-subchannel power constraint), it is shown that the high-security message can be embedded into the low-security message at full rate (as if the low-security message does not exist) without incurring any loss on the overall rate of communication (as if both messages are low-security messages). Extensions to the wiretap channel II setting of Ozarow and Wyner are also considered, where it is shown that "perfect" security embedding can be achieved by an encoder that uses a two-level coset code.
△ Less
Submitted 7 February, 2011;
originally announced February 2011.