Welcome to My Homepage!

Yu Zhang

 


Home

Group web page

Projects

Work

Papers

Student Seminar Schedule:

1. The student talk will be given from 1:30 to 3:00PM every Thursday from Jan. 31, 08.

2. During the meeting, there should be 2 student talks, and each student should target giving a 30-40 minute talk.

3. You can volunteer for a talk by either directly talking to me or send me an email to yu@winlab.rutgers.edu .

4. If we need to miss a week or so due to schedule conflict, then we can handle that on an individual week basis. 

Time Speakers Advisors Topics Abstract
Jan. 31, 08 Suhas Mathur Prof. Mandayam and Prof. Trappe Extracting a Cryptographic Key from the Wireless Channel
Yu Zhang Prof. Trappe Power-Modulated Challenge-Response Schemes for Verifying Location Claims
Feb. 07, 08 No Student Seminar

 

Feb. 14, 08 No Student Seminar

 

Feb. 21, 08 Baik Hoh Prof. Gruteser Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring
Shengchao Yu Prof. Zhang Robust Sentry-based Schemes: Towards Long-lived, Fault-Tolerant Wireless Sensor Networks
Feb. 28, 08 Liang Xiao Prof. Mandayam, Prof. Trappe and Prof. Greenstein A Physical-Layer Technique to Enhance Authentication for Mobile Terminals
Xiaojun Tang Prof. Spasojevic Interference-assisted Secret Communication
Mar. 06, 08 Shimpei Yasukawa, Takayuki SHIMIZU(Japanese Exchange Students) Prof. Hisato IWAI,  Prof. Hideichi SASAOKA, and Prof. Trappe Secure Wireless Communications Utilizing Physical Layer Characteristics
Goran Ivkovic Prof. Spasojevic Radio Scene Analysis using Trilinear Decomposition
Mar. 13, 08 Dan Zhang Prof. Mandayam Bandwidth Exchange as an Incentive for Relaying
Song Liu Prof. Trappe and Prof. Greenstein Locating a Non-interactive Transmitter Based on Dynamic Signal Strength Mapping
Mar. 20, 08 No Student Seminar in Spring Recess

 

Mar. 27, 08 Nicholas Madamopoulos, Associate Professor, Department of Electrical Engineering, City College of CUNY, New York  Fiber Assisted Wireless for Broadband Access Networks
Mar. 31, 08 Shweta Jain

Experimental Study of Interference Models for Low-Power Wireless Networks

Apr. 03, 08 Shu Chen Prof. Trappe and Prof. Chen(Yingying) Exploiting Environmental Properties for Wireless Localization and Location Aware Applications
Apr. 10, 08 Sylvia Kokalj-Filipovic Prof. Yates and Prof. Spasojevic Feedback-assisted belief propagation decoder for Fountain codes and application for minimum-delay data collection
Apr. 17, 08 Stephen A. Wilkus A Hybrid Satellite & Terrestrial Mobile TV System is Launched
Apr. 23, 08        

Winlab eyes only.

Current results and news.

 

Extracting a Cryptographic Key from the Wireless Channel:

In this talk, I will describe a simple protocol that allows two parties, Alice and Bob, communicating on a point-to-point wireless link, to establish a common secret cryptographic key using fundamental properties of the wireless medium, without letting an adversary infer any information about the key. The established key can then be used to encrypt communication between Alice and Bob using standard symmetric key algorithms such as Rijndael, DES, etc. The protocol allows Alice and Bob to regularly refresh their keys. It resists cryptanalysis of the generated key by an eavesdropping adversary Eve and unlike key-agreement schemes that have been proposed in prior literature, does not require that Alice and Bob share an authenticated channel. The presence of a man-in-the-middle adversary can be detected much as in quantum key distribution systems. We are currently numerically evaluating the performance of our algorithm while conducting a measurement based study using the GNUradio platform & a network analyzer. For those interested, an open mathematical problem that we are trying to solve as part of this work will also be described.


Power-Modulated Challenge-Response Schemes for Verifying Location Claims:

Location information should be verifiable in order to support new computing and information services. In this work, we adapt the classical challenge-response method for authentication to the task of verifying an entity's location. Our scheme utilizes a collection of transmitters, and adapts their power allocations to verify a user's claimed location. This strategy, which we call power-modulated challenge response, is able to be used with existing wireless sensor networks, and we present three variations. First, we propose a direct method, where some transmitters are selected to send ``challenges" that the claimant node should be able to witness based on its claimed location, and for which the claimant node must correctly respond in order to prove its location. Second, we reverse the strategy by presenting an indirect method, where some transmitters send challenges that the claimant node should not be able to witness. Finally, we present a signal strength based method, where the node responds with its received signal strength and thereby provides improved location verification. To evaluate our schemes, we examine different adversarial models for the claimant, and characterize the performance of our power-modulated challenge response schemes under these adversarial models.


Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring:

Automotive traffic monitoring through probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, however, raise privacy concerns because they require participants to reveal their positions to an external traffic monitoring server. To address this challenge, we propose a system based on virtual trip lines and an associated cloaking technique. Virtual trip lines are geographic markers that indicate where vehicles should provide location updates. These markers can be placed to avoid particularly privacy sensitive locations. They also allow aggregating and cloaking several location updates based on trip line identifiers, without knowing the actual geographic locations of these trip lines. Thus they facilitate the design of a distributed architecture, where no single entity has a complete knowledge of probe identities and fine-grained location information.  We have implemented the system with GPS smartphone clients and conducted a controlled experiment with 20 phone-equipped drivers circling a highway segment. Results show that even with this low number of probe vehicles, travel time estimates can be provided with less than 15% error, and applying the cloaking techniques reduces travel time estimation accuracy by less than 5% compared to a standard periodic sampling approach.


Robust Sentry-based Schemes: Towards Long-lived, Fault-Tolerant Wireless Sensor Networks:

Recent advances in MEMS technology, wireless communication and networking have enabled the development of low-cost yet capable wireless micro-sensors, thus bringing up a new class of applications involving remote surveillance and date collection. However, there are still barriers to overcome to deploy these applications in large scale, one of which is the limited network lifetime. Extending network lifetime is challenging because the network is built out of short-lived sensor nodes. The lifetime of a sensor node is limited by its battery capacity; and due to limitations of cost and size, the sensor hardware is rather unreliable. Additionally, sensor networks are often deployed in harsh environments
and left unattended in operation, which further contributes to frequent node failures.
In order to extend the lifetime of the networked system beyond the lifetime of the individual sensor node, a common practice is to deploy a large array of sensor nodes, and at any instance, have only a minimal set of nodes active performing duties while others stay in sleep mode to conserve energy. With this rationale, random node failures, either from active nodes or from redundant nodes, can seriously disrupt system operations. To address this issue, a node scheduling algorithm is proposed: R-Sentry, a gang-based scheduling algorithm that attempts to bound the service loss duration due to node failures
by coordinating the schedules among redundant nodes. Intensive simulations clearly show R-Sentry's superiority over existing schemes, like PEAS.


A Physical-Layer Technique to Enhance Authentication for Mobile Terminals:

We propose an enhanced physical-layer authentication scheme for multi-carrier wireless systems, where transmission bursts consist of multiple frames. More specifically, it is based on the spatial variability characteristic of wireless channels, and able to work with moderate terminal mobility. For the authentication of the first frame in each data burst, the legal transmitter uses the saved channel response from the previous burst as the key for authentication of the first frame in the next burst. The key is obtained either via feedback from the receiver, or using the
symmetric channel property of a TDD system. Then the authentication of the following frames in the burst is performed either by a Neyman-Pearson hypothesis test, or a least-squares adaptive channel estimator. Simulations in a typical indoor building show that both methods work efficiently, if the speed of
transmitters is no more than typical pedestrian velocities.


Interference-assisted Secret Communication:

Wireless communication is susceptible to adversarial eavesdropping due to the broadcast nature of the wireless medium. In this talk, we illustrate how eavesdropping can be alleviated by exploiting the superposition property of the wireless medium. A wiretap channel with a helping interferer (WT-HI), in which a transmitter sends a confidential message to its intended receiver in the presence of a passive eavesdropper, and with the help of an independent interferer, is considered. The interferer, who does not know the confidential message, helps in ensuring the secrecy of the message by sending independent signals. An achievable secrecy rate for the WT-HI is given. The results show that interference, which seldom offers any advantage for problems not involving secrecy, can be exploited to assist secrecy in wireless communication. An important example of Gaussian channels is the case when the interferer has a better channel to the intended receiver than to the eavesdropper. Here, the interferer can send a (random) codeword at a rate which ensures that it can be decoded and subtracted from the received signal by the intended receiver and not decoded by the eavesdropper. Hence, only the eavesdropper is interfered upon and the secrecy level of the confidential message is increased.


Secure Wireless Communications Utilizing Physical Layer Characteristics:

In this talk, we will give a brief summary of our researches in Japan. We are developing some wireless communication systems utilizing physical layer property. Most of them make use of key extraction techniques from the reciprocal channel response. We also have some concern about secret communication and analysis of radio propagation which ensures the security of our secure wireless communication schemes. After the presentation, we will make a demonstration of key extraction by a simple prototype system.

 Bio: Shimpei Yasukawa and Takayuki SHIMIZU are two Japanese exchange students. They come from Communication System Lab, Doshisha University, Japan. Both of their advisors are Professor Hisato IWAI and Professor Hideichi SASAOKA. Currently, they are under the guidance of Professor Trappe.


Radio Scene Analysis using Trilinear Decomposition:

We consider a scenario with multiple radio sources performing packet based transmissions. The sources belong to heterogeneous networks and their signals may overlap in time and frequency. Each source is characterized by its power spectral density and on/off activity sequence. A network of sensors performs measurements, where each sensor computes spectrogram of the received signal with certain time and frequency resolution. Spectrograms from different sensors are collected and arraigned in a three-way array, whose three dimensions correspond to space, time, and frequency indices. We show that, under certain rank conditions of the three-way array, it is possible to recover sources to sensors channel gain coefficients, power spectral densities and on/off activity sequences of the sources by decomposing the three-way array into rank-one components. The recovery process is illustrated with simulation examples involving 802.11b/g and Bluetooth sources whose signals overlap in time and frequency.


Bandwidth Exchange as an Incentive for Relaying:

Relay cooperation has been recognized as an important mechanism to enhance connectivity and throughput in multi-hop wireless networks,especially under varying channel conditions. One major problem of relay cooperation is that relaying always incurs energy and possibly delay costs. To a rational and selfish node these costs are worth incurring only if it receives at least comparable returns in the long term. In light of this, we propose a new incentive mechanism called bandwidth exchange where a node can delegate a portion of its bandwidth to another node in exchange for relay cooperation. In this talk we specifically discuss bandwidth exchange in the simple form of exchanging orthogonal frequency bands to provide incentives for relaying in a wireless network. Other forms of exchanging bandwidth such as delegation of time-slots or using spreading codes of different lengths are also possible. Using a Nash Bargaining framework, we explore the advantage of bandwidth exchange in both static and fading channels.


Locating a Non-interactive Transmitter Based on Dynamic Signal Strength Mapping:

In the new paradigm of the spectrum access driven by cognitive radios, the location awareness has its special importance to issues such as spectrum etiquette enforcement and spectrum hole discovery. Because of the nature of the cognitive radios, the most accessible information at a receiver is the received signal strength (RSS). This motivates us to revisit the RSS based localizations in a cognitive radio framework. Given the radio propagation law in nature, the RSS usually corresponds to the direct link distance between a transmitter and a receiver, with random distortions by obstructions, multipath and noises. By making use of such correlations, it is possible to recover more RSS data without actual measuring them.

We present two range-free localization algorithms based on dynamic mapping of received signal strength. The schemes are designed for a non-interactive location system that does not require the cooperation from the device to be located. A detailed signal strength map across the surveillance area is constructed by interpolation. By making use of this signal map, the proposed schemes achieve better accuracy of location estimation than existing non-interactive and RSS based methods in most channel variation conditions.

 


Fiber Assisted Wireless for Broadband Access Networks:

With the advent of broadband wireless systems operating at microwave frequency bands, and with the entailed shrinkage of cell coverage for high capacity wireless access, the simplification of the antenna stations becomes crucial to reduce access infrastructure cost. For this purpose, radio-over-fiber (RoF) distribution antenna systems are an attractive option for the transparent delivery of wireless data signals from a central office location to remote antenna sites via optical fiber.  In this way, the complicated and costly (in particular for high RF frequencies) wireless signal processing can be placed in the central office. 

   This presentation will give an overview of the Fiber Assisted Wireless for Broadband Access Networks.  The approach is based on passive optical network architectures that can support the generation, transmission and delivery of high frequency signals required in wireless links.  In addition these architectures allow the sharing of a single central office and provide additional direct interconnectivity of the antenna station so dynamic bandwidth allocation can be addressed as mobile customers enter or leave the coverage area of different cell coverage. 

Bio:

Professor Nicholas Madamopoulos is currently an Associate Professor in Department of Electrical Engineering, City College of CUNY, New York. He got his Ph.D. in Optical Science and Engineering, The School of Optics, University of Central Florida, Orlando, FL. 1998, M.S. in Optical Science and Engineering, The School of Optics and Department of Electrical and Computer Engineering, Univ. of Central Florida, Orlando, FL. 1996, and  B.S. in Physics, University of Patras, Patras, Greece. 1993. His research interests include Optical communications, passive optical networks, analog photonics, photonic sensors, photonic systems for telecom and non-telecom applications.

Email: nmadamopoulos@ccny.cuny.edu
 


Experimental Study of Interference Models for Low-Power Wireless Networks:

Practical approaches for modeling interference on wireless links are critical for understanding wireless network behavior. This is because the MAC layer protocol must fundamentally be able to schedule transmissions on links in an interference-free fashion. While many algorithmic studies have used protocol interference models based on network topology or physical node distance, focus has recently shifted toward more realistic, physical interference models, based on signal-to interference-and-noise ratio (SINR). Essentially, in SINR model, success of a packet reception depends on the ratio of the signal power and the aggregated interference and noise power. Here, interference is considered in an aggregated form as the sum of all interference powers from all interfering links. Prior work, has reported interesting observations that refute the additive interference assumption for low power radios used in previous generation sensor motes, indicating that the SINR model may not be useful in designing higher layer protocols. In our work, we perform a careful set of measurements on 802.15.4 compatible, CC2420 radio which is used in the new generation low power sensor networks. We find that, in contrast to the observations in prior work, additive model works quite well in practice.

 We then perform extensive experimentation to model the SINR vs. PRR relationship for this physical interference model, as well as several common protocol interference models typically considered in literature for scheduling studies, such as hop-based, range based, distance ratio-based, etc. We observe that the physical model is significantly more accurate than the protocol models considered for evaluation. We then look closely into the physical interference model itself, and consider its two incarnations --- thresholded (overly conservative, but typically considered in literature) and graded (more realistic). We show via solving the one shot scheduling problem, that the graded version can significantly improve expected throughput over the thresholded version by scheduling imperfect links. 

BIO 

Shweta Jain: I graduated with a PhD in Computer Science from Stony Brook University in August 2007. I also have a MS degree in Computer Science from Stony Brook University and a BE in Electronics and Telecommunication Engineering from Bengal Engineering and Science University (Shibpore). My research interests are in wireless embedded systems, medium access protocols and experimental systems research. I have experience in designing embedded systems solutions through several exciting projects in small and medium size startup companies. I currently work as Senior Engineer at Staccato Communications where I am developing embedded wireless USB solutions for next generation cameras and cell phones.  Further information about my research and work experiences is available at http://www.wings.cs.sunysb.edu/~shweta


Exploiting Environmental Properties for Wireless Localization and Location Aware Applications:

Wireless sensor networks monitor phenomena that vary over the spatial region the sensor network covers. The sensor readings may also be dual-used for additional purposes. We propose to use the inherent spatial variability in physical phenomena to support localization and position verification. In this talk, we first present the problem of localization using general spatial information fields, and then propose a theory for exploiting this spatial variability for localization. Our Spatio-Correlation Weighting Mechanism (SCWM) uses spatial relationships of measured physical phenomena to determine an appropriate subset of environmental parameters for better location accuracy. We next present the Flex-EP algorithm, which supports our theoretical model for performing localization. Finally, we provide an experimental evaluation of our approach by using a collection of physical phenomena measured across one hundred locations inside a building. Our results provide strong evidence of the viability of using general sensor readings for location applications.


Feedback-assisted belief propagation decoder for Fountain codes and application for minimum-delay data collection:

Our research analyzes the benefits of an automatic repeat request (ARQ) scheme employed in doped belief-propagation decoding for increasing the throughput of Fountain encoded data transmissions. Both Ideal and Robust Soliton code symbol degree distributions are studied. The proposed doping mechanism selects doping symbols randomly from the set of input symbols contributing to degree-two output symbols. Here an output symbol is the encoded symbol whose code-graph links to input symbols decoded thus far have been severed. This doping approach always ensures releasing of at least one output symbol, thus increasing the number of degree-one output symbols (the ripple). Using a random walk analysis, we study the belief propagation decoding with degree-two random doping for a fountain code with symbols drawn from an Ideal Soliton distribution. We show that the decoding process is a renewal process whereas the process starts all over afresh after each doping. The asymptotic interdoping process analysis revolves around a random walk model for the ripple size. We show that the sequence of the ripple size increments (due to doping and/or decoding) can be modeled as an iid sequence of shifted Poisson random variables (with unit mean), regardless of the number of input symbols. This model furnishes the final cost analysis with a prediction on the number of required doping symbols.  In particular, the cost analysis is given for various decentralized strategies used to facilitate
data collection in circular wireless sensor networks, which rely on the stochastic diversity of data storage. The goal is to allow for a reduced delay collection by a mobile data collector (MDC) who accesses the network at a random position and random time.


A Hybrid Satellite & Terrestrial Mobile TV System is Launched:

Emerging mobile Television (MTV) systems such as the DVB family, complement 3G wireless telephony in both service and in technology. For example, technologically advanced digital radio concepts including Turbo and LDPC coding, OFMD, and physical and link layer interleaver are now being used in broadcast television to mobile terminals. Satellite broadcast to mobile terminals are also now about to launch. On April 14th, a satellite is to be launched from Cape Canaveral to become the first to provide hybrid satellite plus terrestrial transmission of mobile TV on a Single Frequency Network (SFN). This will utilize the new Digital Video Broadcast - Satellite to Handset (DVB-SH) standard.

Synchronizing the satellite and terrestrial repeaters in this network present some fascinating challenges in architecture and RF network design. This talk will highlight the DVB-SH standard, the implementation of the trial system and the challenges ahead for deploying and integrating wireless broadcasting with wireless broadband.

BIO 

The talk will be presented by Stephen Wilkus of Alcatel-Lucent Bell Labs, who has been the solutions architect for this first North American application of the DVB-SH standard.  He graduated with his MSEE and Physics degrees from the University of Illinois in 1981. He has been 22 years at Bell Laboratories and a long time supporter of the industrial affiliation with Rutgers' WINLAB.