Universität Siegen Institut für Digitale Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 D-57076 Siegen

Slides:



Advertisements
Similar presentations
Noise-Predictive Turbo Equalization for Partial Response Channels Sharon Aviran, Paul H. Siegel and Jack K. Wolf Department of Electrical and Computer.
Advertisements

Iterative Equalization and Decoding
Data Communication, Lecture 111 Channel Coding. Data Communication, Lecture 112 audio video (analogue) data (digital) Source anti-alias filter A/D Nyquist.
1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints Adapted from the notes By Lami Kaya, © 2009 Pearson Education.
2005/12/06OPLAB, Dept. of IM, NTU1 Optimizing the ARQ Performance in Downlink Packet Data Systems With Scheduling Haitao Zheng, Member, IEEE Harish Viswanathan,
Development of Parallel Simulator for Wireless WCDMA Network Hong Zhang Communication lab of HUT.
Information Theory Introduction to Channel Coding Jalal Al Roumy.
Cellular Communications
Turbo Codes Azmat Ali Pasha.
Bandwidth-Efficient Method for Adaptive Forward Error Correction on Wireless Local Area Network  Co-Presenters: David R. Pollard, Graduate Student, Eastern.
Reliability and Channel Coding
EE 3220: Digital Communication Dr Hassan Yousif 1 Dr. Hassan Yousif Ahmed Department of Electrical Engineering College of Engineering at Wadi Aldwasser.
EE 3220: Digital Communication Dr Hassan Yousif 1 Dr. Hassan Yousif Ahmed Department of Electrical Engineering College of Engineering at Wadi Aldwasser.
Concatenated Codes, Turbo Codes and Iterative Processing
Matthew C. Valenti (presenter)
Low Density Parity Check (LDPC) Code Implementation Matthew Pregara & Zachary Saigh Advisors: Dr. In Soo Ahn & Dr. Yufeng Lu Dept. of Electrical and Computer.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Channel Coding and Error Control
Channel Coding Part 1: Block Coding
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 4 Channel Coding.
Lecture 10: Error Control Coding I Chapter 8 – Coding and Error Control From: Wireless Communications and Networks by William Stallings, Prentice Hall,
Cryptography, Authentication and Digital Signatures
Error control in video Streaming. Introduction Development of different types of n/ws such as internet, wireless and mobile networks has created new applications.
March 29, 2005Week 11 1 EE521 Analog and Digital Communications James K. Beard, Ph. D. Tuesday, March 29, 2005
Iterative Soft Decoding of Reed-Solomon Convolutional Concatenated Codes Li Chen Associate Professor School of Information Science and Technology, Sun.
Iterative Multi-user Detection for STBC DS-CDMA Systems in Rayleigh Fading Channels Derrick B. Mashwama And Emmanuel O. Bejide.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Lecture 3-2: Coding and Error Control (Cont.) ECE
A Novel technique for Improving the Performance of Turbo Codes using Orthogonal signalling, Repetition and Puncturing by Narushan Pillay Supervisor: Prof.
Miss Insah Bhurtah Main Supervisor: Prof. K.M.S. Soyjaudah Associate Supervisor: Dr C Catherine.
COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section M Topics: 1. Error Detection Techniques:
Digital Communications I: Modulation and Coding Course Term Catharina Logothetis Lecture 12.
Coding Theory. 2 Communication System Channel encoder Source encoder Modulator Demodulator Channel Voice Image Data CRC encoder Interleaver Deinterleaver.
Wireless Information Networking Group Cooperative Diversity Techniques for Wireless Networks Arun ‘Nayagam Wireless Information Networking Group (WING)
Novel network coding strategy for TDD Use of feedback (ACK) improves delay/energy/ throughput performance, especially for high latency- high errors scenarios.
TI Cellular Mobile Communication Systems Lecture 4 Engr. Shahryar Saleem Assistant Professor Department of Telecom Engineering University of Engineering.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
Error/Flow Control Modeling (ARQ Modeling). © Tallal Elshabrawy 2 Data Link Layer  Data Link Layer provides a service for Network Layer (transfer of.
Potential and specific features of the method of transmission and integrated protection of information Stocos, Ltd.1.
Synchronization of Turbo Codes Based on Online Statistics
Real-Time Turbo Decoder Nasir Ahmed Mani Vaya Elec 434 Rice University.
Error Detection and Correction – Hamming Code
Digital Communications I: Modulation and Coding Course Term Catharina Logothetis Lecture 9.
Tufts University. EE194-WIR Wireless Sensor Networks. February 17, 2005 Increased QoS through a Degraded Channel using a Cross-Layered HARQ Protocol Elliot.
An ARQ Technique Using Related Parallel and Serial Concatenated Convolutional Codes Yufei Wu formerly with: Mobile and Portable Radio Research Group Virginia.
Data Communications and Networking
Turbo Codes. 2 A Need for Better Codes Designing a channel code is always a tradeoff between energy efficiency and bandwidth efficiency. Lower rate Codes.
Channel Capacity. Techniques to reduce errors in digital communication systems Automatic repeat request (ARC) Forward error correction (FEC) Channel.
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
The Softest Handoff Design Using Iterative Decoding (Turbo Coding) Byung K. Yi LGIC 3GPP2 TSG-C WG 3 Physical Layer Jan. 11, 2000.
Information Theory & Coding for Digital Communications Prof JA Ritcey EE 417 Source; Anderson Digital Transmission Engineering 2005.
II. Linear Block Codes. © Tallal Elshabrawy 2 Digital Communication Systems Source of Information User of Information Source Encoder Channel Encoder Modulator.
Chapter Nine: Data Transmission. Introduction Binary data is transmitted by either by serial or parallel methods Data transmission over long distances.
DIGITAL COMMUNICATION. Introduction In a data communication system, the output of the data source is transmitted from one point to another. The rate of.
Channel Coding and Error Control 1. Outline Introduction Linear Block Codes Cyclic Codes Cyclic Redundancy Check (CRC) Convolutional Codes Turbo Codes.
Results and Conclusions
Coding and Error Control
Lecture 4 Error Detecting and Correcting Techniques Dr. Ghalib A. Shah
8 Coding Theory Discrete Mathematics: A Concept-based Approach.
CSE 5345 – Fundamentals of Wireless Networks
Digital Communications
Rate Mapping for SISO, AWGN channel
Coding and Interleaving
January 2004 Turbo Codes for IEEE n
Chapter 6.
Digital Communication Chapter 1: Introduction
Chapter Nine: Data Transmission
Direct Sequence Spread Spectrum Modulation and Demodulation using Compressive Sensing Under the guidance of M.Venugopala Rao Submitted by K.Y.K.Kumari.
Error Trapping on LFBSR
Presentation transcript:

Universität Siegen Institut für Digitale Kommunikationssysteme Univ.-Prof. Dr. Christoph Ruland Hölderlinstraße 3 D Siegen FEC over Wireless Channels using Cryptographic Check Values as Coding Redundancy Belgrade, April 2, 2009 Nataša Živić

Wireless Communication Systems  Wireless communication systems have found heavy deployments over recent years  Many popular applications have emerged for wireless networks including, voice calls, SMS, MMS, web browsing and video conferencing, to name a few.  These services not only needs to be provided but rather provided in a secure and reliable manner  Our work focus on reliablity of data transfer, from source to destination, using security mechanisms as a tool ITG-Fachgruppensitzung2

Channel Coding & Cryptography  We consider the following two basic limitations of a wireless channel, 1. Wireless channel is inherently prone to transmission errors  Forward Error Correction (FEC) is used as a solution in those scenarios where the feedback link is missing and thus Automatic Repeat Request (ARQ) can not be used 2. Wireless channel is prone to the problem of data security too  Cryptography and digital signatures are used as a solution to these problems  Cryptography solves the problems of eves-dropping & digital signatures is a solution to repudiation by the sender ITG-Fachgruppensitzung3

Joint Channel Coding & Cryptography  So far, data security and the correction of errors induced by the transmission channel have been dealt separately  In this work we present a novel technique which combines these two different areas together to give a joint solution to both the problems discussed before  We use cryptography (in the form of cryptographic check functions) to improve the BER over the channel  Moreover we use the channel coding to improve the results of cryptography as well  We call this technique as Joint Channel Coding & Cryptography ITG-Fachgruppensitzung4

SOURCE ENCODER CHANNEL ENCODER MODULATOR DEMODULATOR CHANNEL DECODER SINK Data Communication (Building Blocks) SOURCE DECODER L-values NOISY CHANNEL Data (Text, Audio, video) Received Data (probably with errors)

Objective MODULATOR CHANNEL ENCODER SOURCE ENCODER SOURCEENCRYPTOR DECRYPTOR DEMODULATOR CHANNEL DECODER SOURCE DECODER SINK L-values Data (Text, Audio, video) Received Data (probably with errors) NOISY CHANNEL

CHANNEL DECODER (SISO) SOFT INPUT DECRYPTOR SID block L (1.bit) L (2.bit) L (3.bit)… Soft Input L = L-Values (Obtained from probability distribution) Soft Input Decryption

Soft Input Decryption Algorithm Channel SISO Channel Decoder Number of trials exceeded the max? No Source Decoder No Bit flipping No Successfully verified data Verification successful? Unsuccessfully verified data (contains errors) Yes L Values of bits Ordering of bits into an increasing array of their |L|- values Decryptor (Verification) Soft Input Decryption Process

Feedback information about correct decoded bits CHANNEL DECODER (SISO) SOFT INPUT DECRYPTOR SID block L (1.bit) L (2.bit) L (3.bit)… Soft Input Soft Input Decryption with Feedback

ma || na block a mb || nb block b ab…b a b…b a …… ab…b u … V: … mamb na nb CCF key CCF – Cryptographic Check Function Assembling message u for Transmission

Parallel Soft Input Decryption Algorithm Demodulation Channel SID of Block a‘ SID of Block b‘ SISO Channel Decoding Block a‘Block b‘ BER 1,SID SISO Channel Decoding BER feedback SID of Block a‘ SID of Block b‘ BER 2,SID Step1Step1 Step1Step1 Step 2 Step 3 BER 2,SID BER cd1 SISO Channel Decoding Segmentation of u‘ (into blocks a‘ & b‘) BER feedback

  Encoder: - Convolutional encoder (1/2)   BPSK modulation   AWGN channel   Decoder: - Convolutional MAP decoder (1/2 and 1/3)   Length of SID Blocks: 192 bits (128 bit message and 64 bit cryptographic check value)   8 (16) bits with the minimal absolute L-values are tested   E b /N 0 increased in steps of 0,5 dB   For each result (point of curves) tests are done Simulation Parameters

Simulation Results

  Joint Soft Input Decryption and Source Channel Coding   Improvement of arithmetic efficiency of Soft Input Decryption method   Development of new strategies for Soft Input Decryption   Extension of Soft Input Decryption with Feedback to Turbo principle   Analysis of the impact of the channel encoder to Soft Input Decryption   SISO decryption Summary

Thank you very much for your attention!