Toward a Secure Data-Rate Theorem Paul Cuff. Control Setting Controller Encoder System (Plant) Sensors Rate R UiUi XiXi YiYi.

Slides:



Advertisements
Similar presentations
Ulams Game and Universal Communications Using Feedback Ofer Shayevitz June 2006.
Advertisements

NONLINEAR HYBRID CONTROL with LIMITED INFORMATION Daniel Liberzon Coordinated Science Laboratory and Dept. of Electrical & Computer Eng., Univ. of Illinois.
CONTROL with LIMITED INFORMATION Daniel Liberzon Coordinated Science Laboratory and Dept. of Electrical & Computer Eng., Univ. of Illinois at Urbana-Champaign.
TOWARDS a UNIFIED FRAMEWORK for NONLINEAR CONTROL with LIMITED INFORMATION Daniel Liberzon Coordinated Science Laboratory and Dept. of Electrical & Computer.
Sampling and Pulse Code Modulation
I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.
Gillat Kol (IAS) joint work with Ran Raz (Weizmann + IAS) Interactive Channel Capacity.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Causal Secrecy: An Informed Eavesdropper.
Hybrid Codes and the Point-to-Point Channel Paul Cuff Curt Schieler.
Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Information Theory for Secrecy and Control.
Bounds on Code Length Theorem: Let l ∗ 1, l ∗ 2,..., l ∗ m be optimal codeword lengths for a source distribution p and a D-ary alphabet, and let L ∗ be.
Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.
CELLULAR COMMUNICATIONS 5. Speech Coding. Low Bit-rate Voice Coding  Voice is an analogue signal  Needed to be transformed in a digital form (bits)
CHARDD Kickoff Meeting, Princeton University, September 13, 2007 Toward a Theory of Protocols for Communication Through Action John Baillieul C.I.S.E.
UCLA Progress Report OCDMA Channel Coding Jun Shi Andres I. Vila Casado Miguel Griot Richard D. Wesel UCLA Electrical Engineering Department-Communication.
OCDMA Channel Coding Progress Report
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY A Framework for Partial Secrecy.
Fundamental limits in Information Theory Chapter 10 :
Digital Communications I: Modulation and Coding Course Term 3 – 2008 Catharina Logothetis Lecture 2.
USAFrance OCEAN. Control and Communication: an overview Jean-Charles Delvenne CMI, Caltech May 5, 2006.
Variable-Length Codes: Huffman Codes
Dynamics of Learning & Distributed Adaptation PI: James P. Crutchfield, Santa Fe Institute Second PI Meeting, April 2001, SFe Dynamics of Learning:
Linear Codes for Distributed Source Coding: Reconstruction of a Function of the Sources -D. Krithivasan and S. Sandeep Pradhan -University of Michigan,
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Department of Electrical Engineering Systems. What is Systems? The study of mathematical and engineering tools used to analyze and implement engineering.
Secure Communication for Signals Paul Cuff Electrical Engineering Princeton University.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Secure Communication for Distributed Systems.
Digital Communication Symbol Modulated Carrier RX Symbol Decision Binary Bytes D/A Recovered Analog Binary Bytes Symbol State Modulation A/D Analog Source.
Lecture 3 Outline Announcements: No class Wednesday Friday lecture (1/17) start at 12:50pm Review of Last Lecture Communication System Block Diagram Performance.
Noise, Information Theory, and Entropy
The Complex Braid of Communication and Control Massimo Franceschetti.
Boulat A. Bash Dennis Goeckel Don Towsley LPD Communication when the Warden Does Not Know When.
Rate-distortion Theory for Secrecy Systems
Channel Capacity
Secure Communication for Distributed Systems Paul Cuff Electrical Engineering Princeton University.
The Secrecy of Compressed Sensing Measurements Yaron Rachlin & Dror Baron TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Rei Safavi-Naini University of Calgary Joint work with: Hadi Ahmadi iCORE Information Security.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
EE 6332, Spring, 2014 Wireless Communication Zhu Han Department of Electrical and Computer Engineering Class 11 Feb. 19 th, 2014.
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
Coding Theory Efficient and Reliable Transfer of Information
1 Private codes or Succinct random codes that are (almost) perfect Michael Langberg California Institute of Technology.
University of Massachusetts Amherst · Department of Computer Science Square Root Law for Communication with Low Probability of Detection on AWGN Channels.
1 Quantization Error Analysis Author: Anil Pothireddy 12/10/ /10/2002.
Superposition encoding A distorted version of is is encoded into the inner codebook Receiver 2 decodes using received signal and its side information Decoding.
The Classically Enhanced Father Protocol
Outline Transmitters (Chapters 3 and 4, Source Coding and Modulation) (week 1 and 2) Receivers (Chapter 5) (week 3 and 4) Received Signal Synchronization.
Transmission over composite channels with combined source-channel outage: Reza Mirghaderi and Andrea Goldsmith Work Summary STATUS QUO A subset Vo (with.
Quantization Watermarking Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems Brian Chen, Ph. D. Dissertation,
Name Iterative Source- and Channel Decoding Speaker: Inga Trusova Advisor: Joachim Hagenauer.
We aim to exploit cognition to maximize network performance What is the side information at a cognitive node? What is the best encoding scheme given this.
1 Lecture 7 System Models Attributes of a man-made system. Concerns in the design of a distributed system Communication channels Entropy and mutual information.
Reliable Deniable Communication: Hiding Messages in Noise The Chinese University of Hong Kong The Institute of Network Coding Pak Hou Che Mayank Bakshi.
NONLINEAR CONTROL with LIMITED INFORMATION Daniel Liberzon Coordinated Science Laboratory and Dept. of Electrical & Computer Eng., Univ. of Illinois at.
Quantum Cryptography Antonio Acín
Using Feedback in MANETs: a Control Perspective Todd P. Coleman University of Illinois DARPA ITMANET TexPoint fonts used.
CDC 2006, San Diego 1 Control of Discrete-Time Partially- Observed Jump Linear Systems Over Causal Communication Systems C. D. Charalambous Depart. of.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
TOWARDS a UNIFIED FRAMEWORK for NONLINEAR CONTROL with LIMITED INFORMATION Daniel Liberzon Coordinated Science Laboratory and Dept. of Electrical & Computer.
UNIT I. Entropy and Uncertainty Entropy is the irreducible complexity below which a signal cannot be compressed. Entropy is the irreducible complexity.
Introduction to Communication Lecture (11) 1. Digital Transmission A computer network is designed to send information from one point to another. This.
Tilted Matching for Feedback Channels
Information Theory Michael J. Watts
Using Secret Key to Foil an Eavesdropper
Information-Theoretic Security
Information Theoretical Analysis of Digital Watermarking
Presentation transcript:

Toward a Secure Data-Rate Theorem Paul Cuff

Control Setting Controller Encoder System (Plant) Sensors Rate R UiUi XiXi YiYi

Data Rate Theorem x i+1 = A x i + B u i + v i y i = C x i + w i Rate R encoder and decoder M i (y i ) 2 2 R u i (M i )

Intrinsic Entropy If all modes are unstable,

Data Rate Theorem R > H(A) is necessary and sufficient to stabilize the system. Many different assumptions about noise and definitions of stability, but this threshold is the same in all cases. [Tatikonda, Mitter 04], [Baillieul 99, 02], [Nair et. al. 05, 07, 09], [Wong, Brockett 99]

Data Rate Theorem Converse Probabilistic Analysis Uncertainty Set Evolution Using EPI Using Brunn-Minkowski Inequality

Scalar Achievability Quantize to odd integers x i+1 = a x i + u i For simplicity, consider a noiseless system. If x 0 is in [-1,1], then the error never gets larger than 1. Starting set

Block coding tools What if we use rate distortion theory to create an AWGN channel? This ignores the effect of delays. Here LQR can be used to analyze the performance.

Control Setting Controller Encoder System (Plant) Sensors Rate R UiUi XiXi YiYi

Synthesize a Channel With an adversary present, we can synthesize a channel using common randomness. [Bennett, Shor et. al., 02], [C., 08] Example: yields perfect secrecy [Liu, Chen 11] [C. 10, Allerton]

Control Setting Controller Encoder System (Plant) Sensors Rate R UiUi XiXi YiYi

Simple Idea for no Delay Quantize evens or odds depending on 1 bit of secret key.

Key Aspects of a Secure DRT Problem Must use probabilistic analysis with averages. – Worst case bounded noise sequences can be controlled. No need to understand information known to the adversary. Probably need to look at other aspects of performance such as LQR performance. – Data-rate threshold will likely not change – Consider bounded control power, etc.

Combined Control and Communication Controller Encoder System (Plant) Sensors Rate R UiUi XiXi YiYi

No Rate – No Channel No explicit communication channel Signal “A” serves an analog and information role. – Analog: symbol-by-symbol relationship – (Digital): uses complex structure to carry information. Processor 1 Processor 2 Source Actuator 1 Actuator 2

Define Empirical Coordination Empirical distribution: Processor 1 Processor 2 Source is achievable if:

Coordination Region The coordination region gives us all results concerning average distortion. Processor 1 Processor 2 Source

Result – No constraints Processor 1 Processor 2 Source Achievability: Make a codebook of (A n, B n ) pairs

Related Work “Witsenhausen Counterexample” – [Witsenhausen 68] – [Grover-Wagner-Sahai 10] Digital Watermarking and “Information Hiding” – [Moullin O’Sullivan 00], [Chen-Wornell 01], [Cohen- Lapidoth 02], [Wu-Hwang 07]

Example – Collision Avoidance Flocking Frequency Hopping (avoid interference) Writing to Scattered Memory Locations

Example - Games Partner games (example: bridge) Penny Matching – [Gossner-Hernandez-Neyman 03]

General Results Variety of causality constraints (delay) Processor 1 Processor 2 Source

Alice and Bob Game Alice and Bob want to cooperatively score points by both correctly guessing a sequence of random binary numbers (one point if they both guess correctly). Alice gets entire sequence ahead of time Bob only sees that past binary numbers and guesses of Alice. What is the optimal score in the game?

Alice and Bob Game (answer) Online Matching Pennies – [Gossner, Hernandez, Neyman, 2003] – “Online Communication” Solution

Alice and Bob Game (connection) Score in Alice and Bob Game is a first-order statistic Markov structure is different (strictly causal): First Surprise: Bob doesn’t need to see the past of the sequence.

General (causal) solution Achievable empirical distributions – (Processor 2 is strictly causal)

Noise in the system [C.-Schieler, Allerton 11] So called “hybrid analog-digital codes” are useful. p(y|x) f g

Thank you Controller Encoder System (Plant) Sensors Rate R UiUi XiXi YiYi