-
Training Modern Deep Neural Networks for Memory-Fault Robustness
Authors:
Ghouthi Boukli Hacene,
François Leduc-Primeau,
Amal Ben Soussia,
Vincent Gripon,
François Gagnon
Abstract:
Because deep neural networks (DNNs) rely on a large number of parameters and computations, their implementation in energy-constrained systems is challenging. In this paper, we investigate the solution of reducing the supply voltage of the memories used in the system, which results in bit-cell faults. We explore the robustness of state-of-the-art DNN architectures towards such defects and propose a…
▽ More
Because deep neural networks (DNNs) rely on a large number of parameters and computations, their implementation in energy-constrained systems is challenging. In this paper, we investigate the solution of reducing the supply voltage of the memories used in the system, which results in bit-cell faults. We explore the robustness of state-of-the-art DNN architectures towards such defects and propose a regularizer meant to mitigate their effects on accuracy. Our experiments clearly demonstrate the interest of operating the system in a faulty regime to save energy without reducing accuracy.
△ Less
Submitted 22 November, 2019;
originally announced November 2019.
-
LiSA: A Lightweight and Secure Authentication Mechanism for Smart Metering Infrastructure
Authors:
Sahil Garg,
Kuljeet Kaur,
Georges Kaddoum,
François Gagnon,
Syed Hassan Ahmed,
Dushantha Nalin K. Jayakody
Abstract:
Smart metering infrastructure (SMI) is the core component of the smart grid (SG) which enables two-way communication between consumers and utility companies to control, monitor, and manage the energy consumption data. Despite their salient features, SMIs equipped with information and communication technology are associated with new threats due to their dependency on public communication networks.…
▽ More
Smart metering infrastructure (SMI) is the core component of the smart grid (SG) which enables two-way communication between consumers and utility companies to control, monitor, and manage the energy consumption data. Despite their salient features, SMIs equipped with information and communication technology are associated with new threats due to their dependency on public communication networks. Therefore, the security of SMI communications raises the need for robust authentication and key agreement primitives that can satisfy the security requirements of the SG. Thus, in order to realize the aforementioned issues, this paper introduces a lightweight and secure authentication protocol, "LiSA", primarily to secure SMIs in SG setups. The protocol employs Elliptic Curve Cryptography at its core to provide various security features such as mutual authentication, anonymity, replay protection, session key security, and resistance against various attacks. Precisely, LiSA exploits the hardness of the Elliptic Curve Qu Vanstone (EVQV) certificate mechanism along with Elliptic Curve Diffie Hellman Problem (ECDHP) and Elliptic Curve Discrete Logarithm Problem (ECDLP). Additionally, LiSA is designed to provide the highest level of security relative to the existing schemes with least computational and communicational overheads. For instance, LiSA incurred barely 11.826 ms and 0.992 ms for executing different passes across the smart meter and the service providers. Further, it required a total of 544 bits for message transmission during each session.
△ Less
Submitted 20 July, 2019;
originally announced July 2019.
-
Early Detection for Optimal-Latency Communications in Multi-Hop Links
Authors:
Diego Barragán Guerrero,
Minh Au,
Ghyslain Gagnon,
François Gagnon,
Pascal Giard
Abstract:
Modern wireless machine-to-machine-type communications aim to provide both ultra reliability and low latency, stringent requirements that appear to be mutually exclusive. From the noisy channel coding theorem, we know that reliable communications mandate transmission rates that are lower than the channel capacity. To guarantee arbitrarily-low error probability, this implies the use of messages who…
▽ More
Modern wireless machine-to-machine-type communications aim to provide both ultra reliability and low latency, stringent requirements that appear to be mutually exclusive. From the noisy channel coding theorem, we know that reliable communications mandate transmission rates that are lower than the channel capacity. To guarantee arbitrarily-low error probability, this implies the use of messages whose lengths tend to infinity. However, long messages are not suitable for low-latency communications. In this paper, we propose an early-detection scheme for wireless communications under a finite-blocklength regime that employs a sequential-test technique to reduce latency while maintaining reliability. We prove that our scheme leads to an average detection time smaller than the symbol duration. Furthermore, in multi-hop low-traffic or continuous-transmission links, we show that our scheme can reliably detect symbols before the end of their transmission, significantly reducing the latency, while keeping the error probability below a predefined threshold.
△ Less
Submitted 8 July, 2019; v1 submitted 4 July, 2019;
originally announced July 2019.
-
An Efficient Blockchain-based Hierarchical Authentication Mechanism for Energy Trading in V2G Environment
Authors:
Sahil Garg,
Kuljeet Kaur,
Georges Kaddoum,
François Gagnon,
Joel J. P. C. Rodrigues
Abstract:
Vehicle-to-grid (V2G) networks have emerged as a new technology in modern electric power transmission networks. It allows bi-directional flow of communication and electricity between electric vehicles (EVs) and the Smart Grid (SG), in order to provide more sophisticated energy trading. However, due to the involvement of a huge amount of trading data and the presence of untrusted entities in the vi…
▽ More
Vehicle-to-grid (V2G) networks have emerged as a new technology in modern electric power transmission networks. It allows bi-directional flow of communication and electricity between electric vehicles (EVs) and the Smart Grid (SG), in order to provide more sophisticated energy trading. However, due to the involvement of a huge amount of trading data and the presence of untrusted entities in the visiting networks, the underlying V2G infrastructure suffers from various security and privacy challenges. Although, several solutions have been proposed in the literature to address these problems, issues like lack of mutual authentication and anonymity, incapability to protect against several attack vectors, generation of huge overhead, and dependency on centralized infrastructures make security and privacy issues even more challenging. To address the above mentioned problems, in this paper, we propose a blockchain oriented hierarchical authentication mechanism for rewarding EVs. The overall process is broadly classified into the following phases: 1) System Initialization, 2) Registration, 3) Hierarchical Mutual Authentication, and 4) Consensus; wherein blockchain's distributed ledger has been employed for transaction execution in distributed V2G environments while Elliptic curve cryptography (ECC) has been used for hierarchical authentication. The designed hierarchical authentication mechanism has been employed to preserve the anonymity of EVs and support mutual authentication between EVs, charging stations (CSs) and the central aggregator (CAG). Additionally, it also supports minimal communicational and computational overheads on resource constrained EVs. Further, formal security verification of the proposed scheme on widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool validates its safeness against different security attacks.
△ Less
Submitted 1 April, 2019;
originally announced April 2019.
-
Blockchain-based Lightweight Authentication Mechanism for Vehicular Fog Infrastructure
Authors:
Kuljeet Kaur,
Sahil Garg,
Georges Kaddoum,
François Gagnon,
Syed Hassan Ahmed
Abstract:
With the increasing development of advanced communication technologies, vehicles are becoming smarter and more connected. Due to the tremendous growth of various vehicular applications, a huge amount of data is generated through advanced on-board devices and is deemed critical to improve driving safety and enhance vehicular services. However, cloud based models often fall short in applications whe…
▽ More
With the increasing development of advanced communication technologies, vehicles are becoming smarter and more connected. Due to the tremendous growth of various vehicular applications, a huge amount of data is generated through advanced on-board devices and is deemed critical to improve driving safety and enhance vehicular services. However, cloud based models often fall short in applications where latency and mobility are critical. In order to fully realize the potential of vehicular networks, the challenges of efficient communication and computation need to be addressed. In this direction, vehicular fog computing (VFC) has emerged which extends the concept of fog computing to conventional vehicular networks. It is a geographically distributed paradigm that has the potential to conduct time-critical and data-intensive tasks by pushing intelligence (i.e. computing resources, storage, and application services) in the vicinity of end vehicles. However secure and reliable transmission are of significant importance in highly-mobile vehicular networks in order to ensure the optimal Quality of Service (QoS). In this direction, several authentication mechanisms have been proposed in the literature but most of them are found unfit due to absence of decentralization, anonymity, and trust characteristics. Thus, an effective cross-datacenter authentication and key-exchange scheme based on blockchain and elliptic curve cryptography (ECC) is proposed in this paper. Here, the distributed ledger of blockchain is used for maintaining the network information while the highly secure ECC is employed for mutual authentication between vehicles and road side units (RSUs). Additionally, the proposed scheme is lightweight and scalable for the considered VFC setup. The performance evaluation results against the existing state-of-the-art reveal that the proposed scheme accomplishes enhanced security features.
△ Less
Submitted 1 April, 2019;
originally announced April 2019.
-
An Energy-driven Network Function Virtualization for Multi-domain Software Defined Networks
Authors:
Kuljeet Kaur,
Sahil Garg,
Georges Kaddoum,
François Gagnon,
Neeraj Kumar,
Syed Hassan Ahmed
Abstract:
Network Functions Virtualization (NFV) in Software Defined Networks (SDN) emerged as a new technology for creating virtual instances for smooth execution of multiple applications. Their amalgamation provides flexible and programmable platforms to utilize the network resources for providing Quality of Service (QoS) to various applications. In SDN-enabled NFV setups, the underlying network services…
▽ More
Network Functions Virtualization (NFV) in Software Defined Networks (SDN) emerged as a new technology for creating virtual instances for smooth execution of multiple applications. Their amalgamation provides flexible and programmable platforms to utilize the network resources for providing Quality of Service (QoS) to various applications. In SDN-enabled NFV setups, the underlying network services can be viewed as a series of virtual network functions (VNFs) and their optimal deployment on physical/virtual nodes is considered a challenging task to perform. However, SDNs have evolved from single-domain to multi-domain setups in the recent era. Thus, the complexity of the underlying VNF deployment problem in multi-domain setups has increased manifold. Moreover, the energy utilization aspect is relatively unexplored with respect to an optimal mapping of VNFs across multiple SDN domains. Hence, in this work, the VNF deployment problem in multi-domain SDN setup has been addressed with a primary emphasis on reducing the overall energy consumption for deploying the maximum number of VNFs with guaranteed QoS. The problem in hand is initially formulated as a "Multi-objective Optimization Problem" based on Integer Linear Programming (ILP) to obtain an optimal solution. However, the formulated ILP becomes complex to solve with an increasing number of decision variables and constraints with an increase in the size of the network. Thus, we leverage the benefits of the popular evolutionary optimization algorithms to solve the problem under consideration. In order to deduce the most appropriate evolutionary optimization algorithm to solve the considered problem, it is subjected to different variants of evolutionary algorithms on the widely used MOEA framework (an open source java framework based on multi-objective evolutionary algorithms).
△ Less
Submitted 24 March, 2019;
originally announced March 2019.
-
On Optimal Latency of Communications
Authors:
Minh Au,
Francois Gagnon
Abstract:
In this paper we investigate the optimal latency of communications. Focusing on fixed rate communication without any feedback channel, this paper encompasses low-latency strategies with which one hop and multi-hop communication issues are treated from an information theoretic perspective. By defining the latency as the time required to make decisions, we prove that if short messages can be transmi…
▽ More
In this paper we investigate the optimal latency of communications. Focusing on fixed rate communication without any feedback channel, this paper encompasses low-latency strategies with which one hop and multi-hop communication issues are treated from an information theoretic perspective. By defining the latency as the time required to make decisions, we prove that if short messages can be transmitted in parallel Gaussian channels, for example, via orthogonal frequency-division multiplexing (OFDM)-like signals, there exists an optimal low-latency strategy for every code. This can be achieved via early-detection schemes or asynchronous detections. We first provide the optimal achievable latency in additive white Gaussian noise (AWGN) channels for every channel code given a probability block error $ε$. This can be obtained via sequential ratio tests or a "genie" aided, \textit{e.g}. error-detecting codes. Results demonstrate the effectiveness of the approach. Next, we show how early-detection can be effective with OFDM signals while maintaining its spectral efficiency via random coding or pre-coding random matrices. Finally, we explore the optimal low-latency strategy in multi-hop relaying schemes. For amplify-and-forward (AF) and decode-and-forward (DF) relaying schemes there exist an optimal achievable latency. In particular, we first show that there exist a better low-latency strategy, for which AF relays could transmit while receiving. This can be achieved by using amplify and forward combined with early detection.
△ Less
Submitted 4 January, 2017; v1 submitted 30 September, 2016;
originally announced October 2016.
-
Modeling and Analysis of Energy Efficiency and Interference for Cellular Relay Deployment
Authors:
Fanny Parzysz,
Mai Vu,
François Gagnon
Abstract:
By relying on a wireless backhaul link, relay stations enhance the performance of cellular networks at low infrastructure cost, but at the same time, they can aggravate the interference issue. In this paper, we analyze for several relay coding schemes the maximum energy gain provided by a relay, taking into account the additional relay-generated interference to neighboring cells. First, we define…
▽ More
By relying on a wireless backhaul link, relay stations enhance the performance of cellular networks at low infrastructure cost, but at the same time, they can aggravate the interference issue. In this paper, we analyze for several relay coding schemes the maximum energy gain provided by a relay, taking into account the additional relay-generated interference to neighboring cells. First, we define spatial areas for relaying efficiency in log-normal shadowing environments and propose three easily-computable and tractable models. These models allow the prediction of 1) the probability of energy-efficient relaying, 2) the spatial distribution of energy consumption within a cell and 3) the average interference generated by relays. Second, we define a new performance metric that jointly captures both aspects of energy and interference, and characterize the optimal number and location of relays. These results are obtainable with significantly lower complexity and execution time when applying the proposed models as compared to system simulations.We highlight that energy-efficient relay deployment does not necessarily lead to interference reduction and conversely, an interference-aware deployment is suboptimal in the energy consumption. We then propose a map showing the optimal utilization of relay coding schemes across a cell. This map combines two-hop relaying and energy-optimized partial decode-forward as a function of their respective circuitry consumption. Such a combination not only alleviates the interference issue, but also leads to a reduction in the number of relays required for the same performance.
△ Less
Submitted 20 March, 2015;
originally announced March 2015.
-
Lower Bound on the BER of a Decode-and-Forward Relay Network Under Chaos Shift Keying Communication System
Authors:
Georges Kaddoum,
Francois Gagnon
Abstract:
This paper carries out the first-ever investigation of the analysis of a cooperative Decode-and-Forward (DF) relay network with Chaos Shift Keying (CSK) modulation. The performance analysis of DF-CSK in this paper takes into account the dynamical nature of chaotic signal, which is not similar to a conventional binary modulation performance computation methodology. The expression of a lower bound b…
▽ More
This paper carries out the first-ever investigation of the analysis of a cooperative Decode-and-Forward (DF) relay network with Chaos Shift Keying (CSK) modulation. The performance analysis of DF-CSK in this paper takes into account the dynamical nature of chaotic signal, which is not similar to a conventional binary modulation performance computation methodology. The expression of a lower bound bit error rate (BER) is derived in order to investigate the performance of the cooperative system under independently and identically distributed (i.i.d.) Gaussian fading wireless environments. The effect of the non-periodic nature of chaotic sequence leading to a non constant bit energy of the considered modulation is also investigated. A computation approach of the BER expression based on the probability density function of the bit energy of the chaotic sequence, channel distribution, and number of relays is presented. Simulation results prove the accuracy of our BER computation methodology.
△ Less
Submitted 24 September, 2013; v1 submitted 18 September, 2013;
originally announced September 2013.
-
Impact of Propagation Environment on Energy-Efficient Relay Placement: Model and Performance Analysis
Authors:
Fanny Parzysz,
Mai Vu,
François Gagnon
Abstract:
The performance of a relay-based cellular network is greatly affected by the relay location within a cell. Existing results for optimal relay placement do not reflect how the radio propagation environment and choice of the coding scheme can impact system performance. In this paper, we analyze the impact on relaying performance of node distances, relay height and line-of-sight conditions for both u…
▽ More
The performance of a relay-based cellular network is greatly affected by the relay location within a cell. Existing results for optimal relay placement do not reflect how the radio propagation environment and choice of the coding scheme can impact system performance. In this paper, we analyze the impact on relaying performance of node distances, relay height and line-of-sight conditions for both uplink and downlink transmissions, using several relay coding schemes. Our first objective is to propose a geometrical model for energy-efficient relay placement that requires only a small number of characteristic distances. Our second objective is to estimate the maximum cell coverage of a relay-aided cell given power constraints, and conversely, the averaged energy consumption given a cell radius. We show that the practical full decode-forward scheme performs close to the energy-optimized partial decode-forward scheme when the relay is ideally located. However, away from this optimum relay location, performance rapidly degrades and more advanced coding scheme, such as partial decode-forward, is needed to maintain good performance and allow more freedom in the relay placement. Finally, we define a trade-off between cell coverage and energy efficiency, and show that there exists a relay location for which increasing the cell coverage has a minimal impact on the average energy consumed per unit area.
△ Less
Submitted 21 January, 2014; v1 submitted 26 July, 2013;
originally announced July 2013.
-
On Convexity of Error Rates in Digital Communications
Authors:
Sergey Loyka,
Victoria Kostina,
Francois Gagnon
Abstract:
Convexity properties of error rates of a class of decoders, including the ML/min-distance one as a special case, are studied for arbitrary constellations, bit mapping and coding. Earlier results obtained for the AWGN channel are extended to a wide class of noise densities, including unimodal and spherically-invariant noise. Under these broad conditions, symbol and bit error rates are shown to be c…
▽ More
Convexity properties of error rates of a class of decoders, including the ML/min-distance one as a special case, are studied for arbitrary constellations, bit mapping and coding. Earlier results obtained for the AWGN channel are extended to a wide class of noise densities, including unimodal and spherically-invariant noise. Under these broad conditions, symbol and bit error rates are shown to be convex functions of the SNR in the high-SNR regime with an explicitly-determined threshold, which depends only on the constellation dimensionality and minimum distance, thus enabling an application of the powerful tools of convex optimization to such digital communication systems in a rigorous way. It is the decreasing nature of the noise power density around the decision region boundaries that insures the convexity of symbol error rates in the general case. The known high/low SNR bounds of the convexity/concavity regions are tightened and no further improvement is shown to be possible in general. The high SNR bound fits closely into the channel coding theorem: all codes, including capacity-achieving ones, whose decision regions include the hardened noise spheres (from the noise sphere hardening argument in the channel coding theorem) satisfies this high SNR requirement and thus has convex error rates in both SNR and noise power. We conjecture that all capacity-achieving codes have convex error rates. Convexity properties in signal amplitude and noise power are also investigated. Some applications of the results are discussed. In particular, it is shown that fading is convexity-preserving and is never good in low dimensions under spherically-invariant noise, which may also include any linear diversity combining.
△ Less
Submitted 30 April, 2013;
originally announced April 2013.
-
Design and Analysis of a Multi-Carrier Differential Chaos Shift Keying Communication System
Authors:
Georges Kaddoum,
Francois-Dominique Richardson,
Francois Gagnon
Abstract:
A new Multi-Carrier Differential Chaos Shift Keying (MC-DCSK) modulation is presented in this paper. The system endeavors to provide a good trade-off between robustness, energy efficiency and high data rate, while still being simple compared to conventional multi-carrier spread spectrum systems. This system can be seen as a parallel extension of the DCSK modulation where one chaotic reference sequ…
▽ More
A new Multi-Carrier Differential Chaos Shift Keying (MC-DCSK) modulation is presented in this paper. The system endeavors to provide a good trade-off between robustness, energy efficiency and high data rate, while still being simple compared to conventional multi-carrier spread spectrum systems. This system can be seen as a parallel extension of the DCSK modulation where one chaotic reference sequence is transmitted over a predefined subcarrier frequency. Multiple modulated data streams are transmitted over the remaining subcarriers. This transmitter structure increases the spectral efficiency of the conventional DCSK system and uses less energy. The receiver design makes this system easy to implement where no radio frequency (RF) delay circuit is needed to demodulate received data. Various system design parameters are discussed throughout the paper, including the number of subcarriers, the spreading factor, and the transmitted energy. Once the design is explained, the bit error rate performance of the MC-DCSK system is computed and compared to the conventional DCSK system under an additive white Gaussian noise (AWGN) and Rayleigh channels. Simulation results confirm the advantages of this new hybrid design.
△ Less
Submitted 26 June, 2013; v1 submitted 15 February, 2013;
originally announced March 2013.
-
Multi-User Multi-Carrier Differential Chaos Shift Keying Communication System
Authors:
Georges Kaddoum,
Francois-Dominique Richardson,
Sarra Adouni,
Francois Gagnon,
Claude Thibeault
Abstract:
In this paper, a multi user Multi-Carrier Differential Chaos Shift Keying (MC-DCSK) modulation is presented. The system endeavors to provide a good trade-off between robustness, energy efficiency and high data rate, while still being simple. In this architecture of MC-DCSK system, for each user, chaotic reference sequence is transmitted over a predefined subcarrier frequency. Multiple modulated da…
▽ More
In this paper, a multi user Multi-Carrier Differential Chaos Shift Keying (MC-DCSK) modulation is presented. The system endeavors to provide a good trade-off between robustness, energy efficiency and high data rate, while still being simple. In this architecture of MC-DCSK system, for each user, chaotic reference sequence is transmitted over a predefined subcarrier frequency. Multiple modulated data streams are transmitted over the remaining subcarriers allocated for each user. This transmitter structure saves energy and increases the spectral efficiency of the conventional DCSK system.
△ Less
Submitted 27 March, 2013; v1 submitted 7 March, 2013;
originally announced March 2013.
-
An Enhanced Spectral Efficiency Chaos-Based Symbolic Dynamics Transceiver Design
Authors:
Georges Kaddoum,
Francois Gagnon,
Denis Couillard
Abstract:
Chaotic synchronization performs poorly in noisy environments, with the main drawback being that the coherent receiver cannot be implemented in realistic communication channels. In this paper, we focus our study on a promising communication system based on chaotic symbolic dynamics. Such modulation shows a high synchronization quality, without the need for a complex chaotic synchronization mechani…
▽ More
Chaotic synchronization performs poorly in noisy environments, with the main drawback being that the coherent receiver cannot be implemented in realistic communication channels. In this paper, we focus our study on a promising communication system based on chaotic symbolic dynamics. Such modulation shows a high synchronization quality, without the need for a complex chaotic synchronization mechanism. Our study mainly concerns an improvement of the bandwidth efficiency of the chaotic modulator. A new chaotic map is proposed to achieve this goal, and a receiver based on the maximum likelihood algorithm is designed to estimate the transmitted symbols. The performance of the proposed system is analyzed and discussed.
△ Less
Submitted 15 February, 2013;
originally announced February 2013.
-
Energy Minimization for the Half-Duplex Relay Channel with Decode-Forward Relaying
Authors:
Fanny Parzysz,
Mai Vu,
François Gagnon
Abstract:
We analyze coding for energy efficiency in relay channels at a fixed source rate. We first propose a half-duplex decode-forward coding scheme for the Gaussian relay channel. We then derive three optimal sets of power allocation, which respectively minimize the network, the relay and the source energy consumption. These optimal power allocations are given in closed-form, which have so far remained…
▽ More
We analyze coding for energy efficiency in relay channels at a fixed source rate. We first propose a half-duplex decode-forward coding scheme for the Gaussian relay channel. We then derive three optimal sets of power allocation, which respectively minimize the network, the relay and the source energy consumption. These optimal power allocations are given in closed-form, which have so far remained implicit for maximum-rate schemes. Moreover, analysis shows that minimizing the network energy consumption at a given rate is not equivalent to maximizing the rate given energy, since it only covers part of all rates achievable by decode-forward. We thus combine the optimized schemes for network and relay energy consumptions into a generalized one, which then covers all achievable rates. This generalized scheme is not only energy-optimal for the desired source rate but also rate-optimal for the consumed energy. The results also give a detailed understanding of the power consumption regimes and allow a comprehensive description of the optimal message coding and resource allocation for each desired source rate and channel realization. Finally, we simulate the proposed schemes in a realistic environment, considering path-loss and shadowing as modelled in the 3GPP standard. Significant energy gain can be obtained over both direct and two-hop transmissions, particularly when the source is far from relay and destination.
△ Less
Submitted 19 March, 2013; v1 submitted 13 August, 2011;
originally announced August 2011.
-
Error Rates of Capacity-Achieving Codes Are Convex
Authors:
Sergey Loyka,
Francois Gagnon,
Victoria Kostina
Abstract:
Motivated by a wide-spread use of convex optimization techniques, convexity properties of bit error rate of the maximum likelihood detector operating in the AWGN channel are studied for arbitrary constellations and bit mappings, which also includes coding under maximum-likelihood decoding. Under this generic setting, the pairwise probability of error and bit error rate are shown to be convex funct…
▽ More
Motivated by a wide-spread use of convex optimization techniques, convexity properties of bit error rate of the maximum likelihood detector operating in the AWGN channel are studied for arbitrary constellations and bit mappings, which also includes coding under maximum-likelihood decoding. Under this generic setting, the pairwise probability of error and bit error rate are shown to be convex functions of the SNR and noise power in the high SNR/low noise regime with explicitly-determined boundary. Any code, including capacity-achieving ones, whose decision regions include the hardened noise spheres (from the noise sphere hardening argument in the channel coding theorem) satisfies this high SNR requirement and thus has convex error rates in both SNR and noise power. We conjecture that all capacity-achieving codes have convex error rates.
△ Less
Submitted 15 April, 2010;
originally announced April 2010.
-
A performance analysis of multi-hop ad hoc networks with adaptive antenna array systems
Authors:
Olfa Ben Sik Ali,
Christian Cardinal,
Francois Gagnon
Abstract:
Based on a stochastic geometry framework, we establish an analysis of the multi-hop spatial reuse aloha protocol (MSR-Aloha) in ad hoc networks. We compare MSR-Aloha to a simple routing strategy, where a node selects the next relay of the treated packet as to be its nearest receiver with a forward progress toward the final destination (NFP). In addition, performance gains achieved by employing a…
▽ More
Based on a stochastic geometry framework, we establish an analysis of the multi-hop spatial reuse aloha protocol (MSR-Aloha) in ad hoc networks. We compare MSR-Aloha to a simple routing strategy, where a node selects the next relay of the treated packet as to be its nearest receiver with a forward progress toward the final destination (NFP). In addition, performance gains achieved by employing adaptive antenna array systems are quantified in this paper. We derive a tight upper bound on the spatial density of progress of MSR-Aloha. Our analytical results demonstrate that the spatial density of progress scales as the square root of the density of users, and the optimal contention density (that maximizes the spatial density of progress) is independent of the density of users. These two facts are consistent with the observations of Baccelli et al., established through an analytical lower bound and through simulations.
△ Less
Submitted 20 January, 2010; v1 submitted 18 January, 2010;
originally announced January 2010.
-
Performance of Optimum Combining in a Poisson Field of Interferers and Rayleigh Fading Channels
Authors:
Olfa Ben Sik Ali,
Christian Cardinal,
Francois Gagnon
Abstract:
This paper studies the performance of antenna array processing in distributed multiple access networks without power control. The interference is represented as a Poisson point process. Desired and interfering signals are subject to both path-loss fading (with an exponent greater than 2) and to independent Rayleigh fading. Using these assumptions, we derive the exact closed form expression for t…
▽ More
This paper studies the performance of antenna array processing in distributed multiple access networks without power control. The interference is represented as a Poisson point process. Desired and interfering signals are subject to both path-loss fading (with an exponent greater than 2) and to independent Rayleigh fading. Using these assumptions, we derive the exact closed form expression for the cumulative distribution function of the output signal-to-interference-plus-noise ratio when optimum combining is applied. This results in a pertinent measure of the network performance in terms of the outage probability, which in turn provides insights into the network capacity gain that could be achieved with antenna array processing. We present and discuss examples of applications, as well as some numerical results.
△ Less
Submitted 20 January, 2010; v1 submitted 10 January, 2010;
originally announced January 2010.
-
Bit Error Rate is Convex at High SNR
Authors:
Sergey Loyka,
Victoria Kostina,
Francois Gagnon
Abstract:
Motivated by a wide-spread use of convex optimization techniques, convexity properties of bit error rate of the maximum likelihood detector operating in the AWGN channel are studied for arbitrary constellations and bit mappings, which may also include coding under maximum-likelihood decoding. Under this generic setting, the pairwise probability of error and bit error rate are shown to be convex…
▽ More
Motivated by a wide-spread use of convex optimization techniques, convexity properties of bit error rate of the maximum likelihood detector operating in the AWGN channel are studied for arbitrary constellations and bit mappings, which may also include coding under maximum-likelihood decoding. Under this generic setting, the pairwise probability of error and bit error rate are shown to be convex functions of the SNR in the high SNR regime with explicitly-determined boundary. The bit error rate is also shown to be a convex function of the noise power in the low noise/high SNR regime.
△ Less
Submitted 26 December, 2009;
originally announced December 2009.
-
Error Rates of the Maximum-Likelihood Detector for Arbitrary Constellations: Convex/Concave Behavior and Applications
Authors:
Sergey Loyka,
Victoria Kostina,
Francois Gagnon
Abstract:
Motivated by a recent surge of interest in convex optimization techniques, convexity/concavity properties of error rates of the maximum likelihood detector operating in the AWGN channel are studied and extended to frequency-flat slow-fading channels. Generic conditions are identified under which the symbol error rate (SER) is convex/concave for arbitrary multi-dimensional constellations. In part…
▽ More
Motivated by a recent surge of interest in convex optimization techniques, convexity/concavity properties of error rates of the maximum likelihood detector operating in the AWGN channel are studied and extended to frequency-flat slow-fading channels. Generic conditions are identified under which the symbol error rate (SER) is convex/concave for arbitrary multi-dimensional constellations. In particular, the SER is convex in SNR for any one- and two-dimensional constellation, and also in higher dimensions at high SNR. Pairwise error probability and bit error rate are shown to be convex at high SNR, for arbitrary constellations and bit mapping. Universal bounds for the SER 1st and 2nd derivatives are obtained, which hold for arbitrary constellations and are tight for some of them. Applications of the results are discussed, which include optimum power allocation in spatial multiplexing systems, optimum power/time sharing to decrease or increase (jamming problem) error rate, an implication for fading channels ("fading is never good in low dimensions") and optimization of a unitary-precoded OFDM system. For example, the error rate bounds of a unitary-precoded OFDM system with QPSK modulation, which reveal the best and worst precoding, are extended to arbitrary constellations, which may also include coding. The reported results also apply to the interference channel under Gaussian approximation, to the bit error rate when it can be expressed or approximated as a non-negative linear combination of individual symbol error rates, and to coded systems.
△ Less
Submitted 19 November, 2009;
originally announced November 2009.
-
The Ergodic Capacity of The MIMO Wire-Tap Channel
Authors:
Zouheir Rezki,
Francois Gagnon,
Vijay Bhargava
Abstract:
This paper has been withdrawn to provide a more rigorous proof of the converse of Theorem 1 and Lemma 1 as well.
This paper has been withdrawn to provide a more rigorous proof of the converse of Theorem 1 and Lemma 1 as well.
△ Less
Submitted 20 July, 2009; v1 submitted 1 February, 2009;
originally announced February 2009.
-
Amendment to "Performance Analysis of the V-BLAST Algorithm: An Analytical Approach." [1]
Authors:
Sergey Loyka,
Francois Gagnon
Abstract:
An analytical technique for the outage and BER analysis of the nx2 V-BLAST algorithm with the optimal ordering has been presented in [1], including closed-form exact expressions for average BER and outage probabilities, and simple high-SNR approximations. The analysis in [1] is based on the following essential approximations: 1. The SNR was defined in terms of total after-projection signal and n…
▽ More
An analytical technique for the outage and BER analysis of the nx2 V-BLAST algorithm with the optimal ordering has been presented in [1], including closed-form exact expressions for average BER and outage probabilities, and simple high-SNR approximations. The analysis in [1] is based on the following essential approximations: 1. The SNR was defined in terms of total after-projection signal and noise powers, and the BER was analyzed based on their ratio. This corresponds to a non-coherent (power-wise) equal-gain combining of both the signal and the noise, and it is not optimum since it does not provide the maximum output SNR. 2. The definition of the total after-projection noise power at each step ignored the fact that the after-projection noise vector had correlated components. 3. The after-combining noises at different steps (and hence the errors) were implicitly assumed to be independent of each other. Under non-coherent equal-gain combining, that is not the case. It turns out that the results in [1] hold also true without these approximations, subject to minor modifications only. The purpose of this note is to show this and also to extend the average BER results in [1] to the case of BPSK-modulated V-BLAST with more than two Rx antennas (eq. 18-20). Additionally, we emphasize that the block error rate is dominated by the first step BER at the high-SNR mode (eq. 14 and 21).
△ Less
Submitted 15 November, 2008;
originally announced November 2008.
-
On Outage and Error Rate Analysis of the Ordered V-BLAST
Authors:
Sergey Loyka,
Francois Gagnon
Abstract:
Outage and error rate performance of the ordered BLAST with more than 2 transmit antennas is evaluated for i.i.d. Rayleigh fading channels. A number of lower and upper bounds on the 1st step outage probability at any SNR are derived, which are further used to obtain accurate approximations to average block and total error rates. For m Tx antennas, the effect of the optimal ordering at the first…
▽ More
Outage and error rate performance of the ordered BLAST with more than 2 transmit antennas is evaluated for i.i.d. Rayleigh fading channels. A number of lower and upper bounds on the 1st step outage probability at any SNR are derived, which are further used to obtain accurate approximations to average block and total error rates. For m Tx antennas, the effect of the optimal ordering at the first step is an m-fold SNR gain. As m increases to infinity, the BLER decreases to zero, which is a manifestation of the space-time autocoding effect in the V-BLAST. While the sub-optimal ordering (based on the before-projection SNR) suffers a few dB SNR penalty compared to the optimal one, it has a lower computational complexity and a 3 dB SNR gain compared to the unordered V-BLAST and can be an attractive solution for low-complexity/low-energy systems. Uncoded D-BLAST exhibits the same outage and error rate performance as that of the V-BLAST. An SNR penalty of the linear receiver interfaces compared to the BLAST is also evaluated.
△ Less
Submitted 13 October, 2008;
originally announced October 2008.
-
Capacity of The Discrete-Time Non-Coherent Memoryless Gaussian Channels at Low SNR
Authors:
Z. Rezki,
David Haccoun,
François Gagnon
Abstract:
We address the capacity of a discrete-time memoryless Gaussian channel, where the channel state information (CSI) is neither available at the transmitter nor at the receiver. The optimal capacity-achieving input distribution at low signal-to-noise ratio (SNR) is precisely characterized, and the exact capacity of a non-coherent channel is derived. The derived relations allow to better understandi…
▽ More
We address the capacity of a discrete-time memoryless Gaussian channel, where the channel state information (CSI) is neither available at the transmitter nor at the receiver. The optimal capacity-achieving input distribution at low signal-to-noise ratio (SNR) is precisely characterized, and the exact capacity of a non-coherent channel is derived. The derived relations allow to better understanding the capacity of non-coherent channels at low SNR. Then, we compute the non-coherence penalty and give a more precise characterization of the sub-linear term in SNR. Finally, in order to get more insight on how the optimal input varies with SNR, upper and lower bounds on the non-zero mass point location of the capacity-achieving input are given.
△ Less
Submitted 2 May, 2008;
originally announced May 2008.
-
Impact of Spatial Correlation on the Finite-SNR Diversity-Multiplexing Tradeoff
Authors:
Z. Rezki,
David Haccoun,
François Gagnon,
Wessam Ajib
Abstract:
The impact of spatial correlation on the performance limits of multielement antenna (MEA) channels is analyzed in terms of the diversity-multiplexing tradeoff (DMT) at finite signal-to-noise ratio (SNR) values. A lower bound on the outage probability is first derived. Using this bound accurate finite-SNR estimate of the DMT is then derived. This estimate allows to gain insight on the impact of s…
▽ More
The impact of spatial correlation on the performance limits of multielement antenna (MEA) channels is analyzed in terms of the diversity-multiplexing tradeoff (DMT) at finite signal-to-noise ratio (SNR) values. A lower bound on the outage probability is first derived. Using this bound accurate finite-SNR estimate of the DMT is then derived. This estimate allows to gain insight on the impact of spatial correlation on the DMT at finite SNR. As expected, the DMT is severely degraded as the spatial correlation increases. Moreover, using asymptotic analysis, we show that our framework encompasses well-known results concerning the asymptotic behavior of the DMT.
△ Less
Submitted 14 April, 2008;
originally announced April 2008.
-
Capacity of The Discrete-Time Non-Coherent Memoryless Rayleigh Fading Channels at Low SNR
Authors:
Z. Rezki,
David Haccoun,
François Gagnon
Abstract:
The capacity of a discrete-time memoryless channel, in which successive symbols fade independently, and where the channel state information (CSI) is neither available at the transmitter nor at the receiver, is considered at low SNR. We derive a closed form expression of the optimal capacity-achieving input distribution at low signal-to-noise ratio (SNR) and give the exact capacity of a non-coher…
▽ More
The capacity of a discrete-time memoryless channel, in which successive symbols fade independently, and where the channel state information (CSI) is neither available at the transmitter nor at the receiver, is considered at low SNR. We derive a closed form expression of the optimal capacity-achieving input distribution at low signal-to-noise ratio (SNR) and give the exact capacity of a non-coherent channel at low SNR. The derived relations allow to better understanding the capacity of non-coherent channels at low SNR and bring an analytical answer to the peculiar behavior of the optimal input distribution observed in a previous work by Abou Faycal, Trott and Shamai. Then, we compute the non-coherence penalty and give a more precise characterization of the sub-linear term in SNR. Finally, in order to better understand how the optimal input varies with SNR, upper and lower bounds on the capacity-achieving input are given.
△ Less
Submitted 3 January, 2008;
originally announced January 2008.
-
Symbol Error Rates of Maximum-Likelihood Detector: Convex/Concave Behavior and Applications
Authors:
Sergey Loyka,
Victoria Kostina,
Francois Gagnon
Abstract:
Convexity/concavity properties of symbol error rates (SER) of the maximum likelihood detector operating in the AWGN channel (non-fading and fading) are studied. Generic conditions are identified under which the SER is a convex/concave function of the SNR. Universal bounds for the SER 1st and 2nd derivatives are obtained, which hold for arbitrary constellations and are tight for some of them. App…
▽ More
Convexity/concavity properties of symbol error rates (SER) of the maximum likelihood detector operating in the AWGN channel (non-fading and fading) are studied. Generic conditions are identified under which the SER is a convex/concave function of the SNR. Universal bounds for the SER 1st and 2nd derivatives are obtained, which hold for arbitrary constellations and are tight for some of them. Applications of the results are discussed, which include optimum power allocation in spatial multiplexing systems, optimum power/time sharing to decrease or increase (jamming problem) error rate, and implication for fading channels.
△ Less
Submitted 8 May, 2007;
originally announced May 2007.