Jamming Resistant Encoding

Slides:



Advertisements
Similar presentations
Mahdi Barhoush Mohammad Hanaysheh
Advertisements

Jesper H. Sørensen, Toshiaki Koike-Akino, and Philip Orlik 2012 IEEE International Symposium on Information Theory Proceedings Rateless Feedback Codes.
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padro,
Noise, Information Theory, and Entropy (cont.) CS414 – Spring 2007 By Karrie Karahalios, Roger Cheng, Brian Bailey.
Cyclic Code.
Error Control Code.
Computer Networking Error Control Coding
Digital Fountain Codes V. S
Linear Obfuscation to Combat Symbolic Execution Zhi Wang 1, Jiang Ming 2, Chunfu Jia 1 and Debin Gao 3 1 Nankai University 2 Pennsylvania State University.
Structure learning with deep neuronal networks 6 th Network Modeling Workshop, 6/6/2013 Patrick Michl.
Strong Error Detection for Control Units Against Advanced Attackers Kahraman Daglar Akdemir Advisor: Berk Sunar Electrical and Computer Engineering MOTIVATION.
UCLA Progress Report OCDMA Channel Coding Jun Shi Andres I. Vila Casado Miguel Griot Richard D. Wesel UCLA Electrical Engineering Department-Communication.
OCDMA Channel Coding Progress Report
Error detection/correction FOUR WEEK PROJECT 1 ITEMS TO BE DISCUSSED 1.0 OVERVIEW OF CODING STRENGTH (3MINS) Weight/distance of binary vectors Error detection.
Factoring 1 Factoring Factoring 2 Factoring  Security of RSA algorithm depends on (presumed) difficulty of factoring o Given N = pq, find p or q and.
1 Distortion-Rate for Non-Distributed and Distributed Estimation with WSNs Presenter: Ioannis D. Schizas May 5, 2005 EE8510 Project May 5, 2005 EE8510.
HumanAUT Secure Human Identification Protocols Adam Bender Avrim Blum Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.
Clustering Vertices of 3D Animated Meshes
exercise in the previous class (1)
“SDJS: Efficient Statistics in Wireless Networks” Albert Krohn, Michael Beigl, Sabin Wendhack TecO (Telecooperation Office) Institut für Telematik Universität.
Low Density Parity Check (LDPC) Code Implementation Matthew Pregara & Zachary Saigh Advisors: Dr. In Soo Ahn & Dr. Yufeng Lu Dept. of Electrical and Computer.
DIGITAL COMMUNICATION Error - Correction A.J. Han Vinck.
USING THE MATLAB COMMUNICATIONS TOOLBOX TO LOOK AT CYCLIC CODING Wm. Hugh Blanton East Tennessee State University
A Secure Protocol for Computing Dot-products in Clustered and Distributed Environments Ioannis Ioannidis, Ananth Grama and Mikhail Atallah Purdue University.
Entropy coding Present by 陳群元. outline constraints  Compression efficiency  Computational efficiency  Error robustness.
Digital Logic Lecture 4 Binary Codes The Hashemite University Computer Engineering Department.
Random Encryption Program Patrick Lowe EKU - Department of Technology CEN.
Multiuser Detection (MUD) Combined with array signal processing in current wireless communication environments Wed. 박사 3학기 구 정 회.
CODING/DECODING CONCEPTS AND BLOCK CODING. ERROR DETECTION CORRECTION Increase signal power Decrease signal power Reduce Diversity Retransmission Forward.
Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),
COEN 180 Erasure Correcting, Error Detecting, and Error Correcting Codes.
MIMO continued and Error Correction Code. 2 by 2 MIMO Now consider we have two transmitting antennas and two receiving antennas. A simple scheme called.
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
DIGITAL COMMUNICATIONS Linear Block Codes
Linear codes of good error control performance Tsonka Baicheva Institute of Mathematics and Informatics Bulgarian Academy of Sciences Bulgaria.
Mathematical Programming in Data Mining Author: O. L. Mangasarian Advisor: Dr. Hsu Graduate: Yan-Cheng Lin.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
ADVANTAGE of GENERATOR MATRIX:
Chapter 31 INTRODUCTION TO ALGEBRAIC CODING THEORY.
ITERATIVE CHANNEL ESTIMATION AND DECODING OF TURBO/CONVOLUTIONALLY CODED STBC-OFDM SYSTEMS Hakan Doğan 1, Hakan Ali Çırpan 1, Erdal Panayırcı 2 1 Istanbul.
Doc.: IEEE SubmissionSlide 1 Interleavers for 160MHz Transmission Date: Authors: Mediatek.
Part 1: Overview of Low Density Parity Check(LDPC) codes.
The parity bits of linear block codes are linear combination of the message. Therefore, we can represent the encoder by a linear system described by matrices.
Error Detection. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. An error-detecting code can.
FEC Linear Block Coding
System To Generate Test Data: The Analysis Program Syed Nabeel.
Fidelity of a Quantum ARQ Protocol Alexei Ashikhmin Bell Labs  Classical Automatic Repeat Request (ARQ) Protocol  Quantum Automatic Repeat Request (ARQ)
II. Linear Block Codes. © Tallal Elshabrawy 2 Digital Communication Systems Source of Information User of Information Source Encoder Channel Encoder Modulator.
Genetic Algorithm. Outline Motivation Genetic algorithms An illustrative example Hypothesis space search.
On-Chip ECC for Low-Power SRAM Design
Advanced Computer Networks
MinJi Kim, Muriel Médard, João Barros
You can check broken videos in this slide here :
Rate 7/8 (1344,1176) LDPC code Date: Authors:
Presented by Prashant Duhoon
Presented by Rich Goyette
Structure learning with deep autoencoders
Ioannis Ioannidis, Ananth Grama and Ioannis Ioannidis
II. Linear Block Codes.
Design of Hierarchical Classifiers for Efficient and Accurate Pattern Classification M N S S K Pavan Kumar Advisor : Dr. C. V. Jawahar.
Motivations Algebraic Manipulation Detection Codes
Channel Dimension Reduction in MU Operation
Error control coding for wireless communication technologies
Use ECP, not ECC, for hard failures in resistive memories
Time Varying Convolutional Codes for Punctured Turbocodes
Error Detection and Correction
A Block Based MAP Segmentation for Image Compression
Reseeding-based Test Set Embedding with Reduced Test Sequences
doc.: IEEE <doc#>
Rich QR Codes With Three-Layer Information Using Hamming Code
Presentation transcript:

Jamming Resistant Encoding For Non-Uniformly Distributed Information Batya Karp Yerucham Berkowitz Advisor: Dr. Osnat Keren

Motivation & Goal Improve detection of jamming attacks in systems with non-uniformly distributed information Solutions implemented in encoding layer for efficiency: Faster Less hardware overhead (fewer redundancy bits)

Platform - Keyboard Perfect example of a system with non-uniformly distributed information Important note: The proposed solutions are applicable to any similar system

Basic Concepts Error Masking Probability: Robust Codes 𝑸 𝒆 = 𝒄 | 𝒄, 𝒄+𝒆 ∈𝑪 𝑪 𝑈𝑛𝑑𝑒𝑟 𝑈𝑛𝑖𝑓𝑜𝑟𝑚 𝐷𝑖𝑠𝑡𝑟𝑖𝑏𝑢𝑡𝑖𝑜𝑛 𝑸 𝒆 = 𝒄∈𝑪 𝒑 𝒄 𝑷𝒓 𝒄+𝒆∈𝑪 𝑈𝑛𝑑𝑒𝑟 𝑁𝑜𝑛−𝑈𝑛𝑖𝑓𝑜𝑟𝑚 𝐷𝑖𝑠𝑡𝑟𝑖𝑏𝑢𝑡𝑖𝑜𝑛 Robust Codes A code C is robust if and only if 𝑄 𝑤𝑐 = max 𝑒≠0 𝑄 𝑒 <1 Linear codes are not sufficient! Punctured Cubic Code (Neumeier and Keren) : 𝑃 is a binary 𝑟×𝑘 matrix of rank 1<𝑟≤𝑘. 𝑪= 𝒙,𝒘 :𝒙 ∈𝑮𝑭 𝟐 𝒌 , 𝒘= 𝑷 𝒙 𝟑 ∈𝑮𝑭 𝟐 𝒓 , 𝑄 𝑒 ≤ 2 −𝑟+1

Attacker Profiles M – set of information words C – set of code words Method of attack: Add an error 𝑒 ∗ that maximizes the probability of the attack going undetected, i.e. Choose 𝑒 ∗ 𝑠𝑢𝑐ℎ 𝑡ℎ𝑎𝑡 𝑄 𝑒 ∗ = 𝑄 𝑤𝑐

Existing Solutions Algebraic Manipulation Detection Codes Systematic AMD Code (Cramer et. Al. 2008): 𝐶= 𝑠,𝑥,𝑓 𝑥,𝑠 : 𝑠∈ 𝐹 𝑞 𝑑 , 𝑥∈ 𝐹 𝑞 ,𝑓 𝑥,𝑠 = 𝑥 𝑑+2 + 𝑖=1 𝑑 𝑠 𝑖 𝑥 𝑖 ∈ 𝐹 𝑞 is a systematic AMD code with 𝑄 𝑤𝑐 = 𝑑+1 𝑞 Security Oriented State Assignment (Shumsky, Keren 2013) 𝑪 – robust code, 𝑯 – Set of most probable information symbols Assign each symbol a vector such that 𝐻𝑊 𝑥 𝑖 ≤𝐻𝑊 𝑥 𝑗 if 𝑝 𝑠 𝑖 ≥𝑝 𝑠 𝑗

Level Out Encoding Let 𝜃: 𝐹 2 𝑘 →{𝑆}⊆ 𝐹 2 𝑘+ 𝑟 𝑙𝑜 be a mapping such that: 𝜃 𝑚 𝑖 ∝𝑝 𝑚 𝑖 Encode the information word 𝜃 𝑚 𝑖 using a robust code

Simulation Results

Analysis & Conclusions SOSA: “Free” but not a viable solution as the EMP remains quite high. AMD: Best option for non-uniformly distributed information. Main drawbacks are the strict constraints and relatively complex computation involved. Level-Out: Not as effective as AMD codes, but much easier to design, and can require less time and hardware to implement.