Key Agreement with Physical Unclonable Functions and Biometric Identifiers

This thesis addresses security and privacy problems for digital devices and biometrics, where a secret key is generated for authentication, identification, or secure computa- tions. A physical unclonable function (PUF) is a promising solution for local security in digital devices. A low-complexity transform-coding algorithm is developed to make the information-theoretic analysis tractable and motivate a noisy (hidden) PUF source model. The optimal trade-offs between the secret-key, privacy-leakage, and storage rates for multiple measurements of hidden PUFs are characterized. The first optimal and low- complexity code constructions are proposed. Polar codes are designed to achieve the best known rate tuples. The gains from cost-constrained controllable PUF measurements are illustrated to motivate extensions.

Günlü, Onur — Technical University of Munich


Efficient Decoding Techniques for LDPC Codes

Efficient decoding techniques for LDPC codes are in demand, since these codes are included in many standards nowadays. Although the theoretical performance of LDPC codes is impressive, their practical implementation leads to problems like numerical inaccuracy, limited memory resources, etc. We investigate methods that are suited to reduce the decoding complexity while still keeping the loss in performance small. We aim to reduce the complexity using three approaches: simplification of the component decoders, restricting the message passing algorithm to binary variables and combining the LDPC decoder with other receiver tasks like demapping or multi-user detection. For the simplification of the component decoders, we analyze the min-sum algorithm and derive a theoretical framework which is used to explain previous heuristic approaches to improve the performance of this algorithm. Using this framework, we are able to modify the algorithm in order to ...

Lechner, G. — Vienna University of Technology


On the Energy Efficiency of Cooperative Wireless Networks

The aim of this dissertation is the study of cooperative communications in wireless networks. In cooperative networks, each user transmits its own data and also aids the communication of other users. User cooperation is particularly attractive for the wireless medium, where every user listens to the transmission of other users. The main benefit of user cooperation in wireless networks is, probably, its efficacy to combat the wireless channel impairments. Path loss and shadowing effects are overcome using intermediate nodes, with better channel conditions, to retransmit the received signal to the estination. Further, the channel fading effect can be also mitigated by means of cooperative spatial diversity (the information arrives at the destination through multiple independent paths). These benefits result in an increase of the users spectral efficiency and/or savings on the overall network power resource. Besides these gains, the simple ...

Gomez-Vilardebo, Jesus — Universidad Politecnica de Madrid


Physical and MAC layer techniques for next generation satellite communications

In this thesis, we consider four different scenarios of interest in modern satellite communications. For each scenario, we will propose the use of advanced solutions aimed at increasing the spectral efficiency of the communication links. First, we will investigate the optimization of the current standard for digital video broadcasting. We will increase the symbol rate of the signal and determine the optimal signal bandwidth. We will apply the time packing technique and propose a specifically design constellation. We will then compare some receiver architectures with different performance and complexity. The second scenario still addresses broadcast transmissions, but in a network composed of two satellites. We will compare three alternative transceiver strategies, namely, signals completely overlapped in frequency, frequency division multiplexing, and the Alamouti space-time block code, and, for each technique, we will derive theoretical results on the achievable rates. We ...

Ugolini, Alessandro — University of Parma


Polarization and Index Modulations: a Theoretical and Practical Perspective

Radiocommunication systems have evolved significantly in recent years in order to meet present and future demands. Historically, time, frequency and more recently, spatial dimensions have been used to improve capacity and robustness. Paradoxically, radiocommunications that leverage the polarization dimension have not evolved at the same pace. In particular, these communications are widely used by satellites, where several streams are multiplexed in each orthogonal polarization. Current communication trends advocate for simplifying and unifying different frameworks in order to increase flexibility and address future needs. Due to this, systems that do not require channel information are progressively gaining traction, as they help to improve the overall quality of the network instead of that of specific users only. The search for new paradigms aimed at improving the quality of wireless communications is unstoppable. In order to increase the capacity of current communications systems, ...

Henarejos, Pol — Universitat Politècnica de Catalunya


Communication Rates for Fading Channels with Imperfect Channel-State Information

An important specificity of wireless communication channels are the rapid fluctuations of propagation coefficients. This effect is called fading and is caused by the motion of obstacles, scatterers and reflectors standing along the different paths of electromagnetic wave propagation between the transmitting and the receiving terminal. These changes in the geometry of the wireless channel prompt the attenuation coefficients and the relative phase shifts between the multiple propagation paths to vary. This suggests to model the channel coefficients (the transfer matrix) as random variables. The present thesis studies information rates for reliable transmission of information over fading channels under the realistic assumption that the receiver has only imperfect knowledge of the random fading state. While the over-idealized assumption of perfect channel-state information at the receiver (CSIR) gives rise to many simple expressions and is fairly well understood, the settings with ...

Pastore, Adriano — Universitat Politècnica de Catalunya


Iterative Joint Source-Channel Coding Techniques for Single and Multiterminal Sources in Communication Networks

In a communication system it results undoubtedly of great interest to compress the information generated by the data sources to its most elementary representation, so that the amount of power necessary for reliable communications can be reduced. It is often the case that the redundancy shown by a wide variety of information sources can be modelled by taking into account the probabilistic dependance among consecutive source symbols rather than the probabilistic distribution of a single symbol. These sources are commonly referred to as single or multiterminal sources "with memory" being the memory, in this latter case, the existing temporal correlation among the consecutive symbol vectors generated by the multiterminal source. It is well known that, when the source has memory, the average amount of information per source symbol is given by the entropy rate, which is lower than its entropy ...

Del Ser, Javier — University of Navarra (TECNUN)


ACHIEVABLE RATES FOR GAUSSIAN CHANNELS WITH MULTIPLE RELAYS

Multiple-input-multiple-output (MIMO) channels are extensively proposed as a means to overcome the random channel impairments of wireless communications. Based upon placing multiple antennas at both the transmitter and receiver sides of the communication, their virtues are twofold. On the one hand, they allow the transmitter to code across antennas to overcome unknown channel fading. On the other hand, they permit the receiver to sample the signal on the space domain. This operation, followed by the coherent combination of samples, increases the signal-to-noise ratio at the input of the detector and provides large capacity, and reliability, gains. Nevertheless, equipping wireless handsets with multiple antennas is not always possible or worthwhile. Mainly, due to size and cost constraints, respectively. For these cases, the appropriate manner to exploit multi-antenna processing is by means of relaying. This consists of a set of wireless relay ...

Del Coso, Aitor — CTTC-Centre Tecnològic de Telecomunicacions de Catalunya


Impact of channel state information on the analysis and design of multiantenna communication systems

During the last decade, there has been a steady increase in the demand of high data rates that are to be supported by wireless communication applications. Among the different solutions that have been proposed by the research community to cope with this new demand, the utilization of multiple antennas arises as one of the best candidates due to the fact that it provides both an increase in reliability and also in information transmission rate. Although the use of multiple antennas at the receiver side dates back from the sixties, the full potential of multiple antennas at both communication ends has been both theoretically and practically recognized in the last few years. The design of proper multi-antenna communication systems to satisfy the high data rates demand depends not only on the chosen figure of merit or performance metric, but also on ...

Payaró Llisterri, Miquel — Centre Technologic de Telecomunicacions de Catalunya


Feedback-Channel and Adaptive MIMO Coded-Modulations

When the transmitter of a communication system disposes of some Channel State Information (CSI), it is possible to design linear precoders that optimally allocate the power inducing high gains either in terms of capacity or in terms of reliable communications. In practical scenarios, this channel knowledge is not perfect and thus the transmitted signal suffers from the mismatch between the CSI at the transmitter and the real channel. In that context, this thesis deals with two different, but related, topics: the design of a feasible transmitter channel tracker for time varying channels, and the design of optimal linear precoders robust to imperfect channel estimates. The first part of the thesis proposes the design of a channel tracker that provides an accurate CSI at the transmitter by means of a low capacity feedback link. Historically, those schemes have been criticized because ...

Rey, Francesc — Universitat Politecnica de Catalunya


Multifunction Radios and Interference Suppression for Enhanced Reliability and Security of Wireless Systems

Wireless connectivity, with its relative ease of over-the-air information sharing, is a key technological enabler that facilitates many of the essential applications, such as satellite navigation, cellular communication, and media broadcasting, that are nowadays taken for granted. However, that relative ease of over-the-air communications has significant drawbacks too. On one hand, the broadcast nature of wireless communications means that one receiver can receive the superposition of multiple transmitted signals. But on the other hand, it means that multiple receivers can receive the same transmitted signal. The former leads to congestion and concerns about reliability because of the limited nature of the electromagnetic spectrum and the vulnerability to interference. The latter means that wirelessly transmitted information is inherently insecure. This thesis aims to provide insights and means for improving physical layer reliability and security of wireless communications by, in a sense, ...

Pärlin, Karel — Tampere University


Low-Complexity Iterative Detection Algorithms for Multi-Antenna Systems

Multiple input multiple output (MIMO) techniques have been widely employed by dif- ferent wireless systems with many advantages. By using multiple antennas, the system is able to transmit multiple data streams simultaneously and within the same frequency band. The methods known as spatial multiplexing (SM) and spatial diversity (SD) im- proves the high spectral efficiency and link reliability of wireless communication systems without requiring additional transmitting power. By introducing channel coding in the transmission procedure, the information redundancy is introduced to further improve the reliability of SM links and the quality of service for the next generation communication systems. However, the throughput performance of these systems is limited by interference. A number of different interference suppression techniques have been reported in the literature. Theses techniques can be generally categorised into two aspects: the preprocessing techniques at the transmitter side and ...

Peng Li — University of York


OFDM Multi-User Communication Over Time-Variant Channels

Wireless broadband communications for users moving at vehicular speed is a cor- nerstone of future fourth generation (4G) mobile communication systems. We inves- tigate a multi-carrier (MC) code division multiple access (CDMA) system which is based on orthogonal frequency division multiplexing (OFDM). A spreading sequence is used in the frequency domain in order to distinguish individual users and to take advantage of the multipath diversity of the wireless channel. The transmission is block oriented. A block consists of OFDM pilot and OFDM data symbols. At pedestrian velocities the channel can be modelled as block fading. We ap- ply iterative multi-user detection and channel estimation. In iterative receivers soft symbols are derived from the output of an soft-input soft-output decoder. These soft symbols are used in order to reduce the interference from other users and to enhance the channel estimates. We ...

Zemen, T. — Vienna University of Technology


Privacy Protecting Biometric Authentication Systems

As biometrics gains popularity and proliferates into the daily life, there is an increased concern over the loss of privacy and potential misuse of biometric data held in central repositories. The major concerns are about i) the use of biometrics to track people, ii) non-revocability of biometrics (eg. if a fingerprint is compromised it can not be canceled or reissued), and iii) disclosure of sensitive information such as race, gender and health problems which may be revealed by biometric traits. The straightforward suggestion of keeping the biometric data in a user owned token (eg. smart cards) does not completely solve the problem, since malicious users can claim that their token is broken to avoid biometric verification altogether. Put together, these concerns brought the need for privacy preserving biometric authentication methods in the recent years. In this dissertation, we survey existing ...

Kholmatov, Alisher — Sabanci University


Security/Privacy Analysis of Biometric Hashing and Template Protection for Fingerprint Minutiae

This thesis has two main parts. The first part deals with security and privacy analysis of biometric hashing. The second part introduces a method for fixed-length feature vector extraction and hash generation from fingerprint minutiae. The upsurge of interest in biometric systems has led to development of biometric template protection methods in order to overcome security and privacy problems. Biometric hashing produces a secure binary template by combining a personal secret key and the biometric of a person, which leads to a two factor authentication method. This dissertation analyzes biometric hashing both from a theoretical point of view and in regards to its practical application. For theoretical evaluation of biohashes, a systematic approach which uses estimated entropy based on degree of freedom of a binomial distribution is outlined. In addition, novel practical security and privacy attacks against face image hashing ...

Berkay Topcu — Sabanci University

The current layout is optimized for mobile phones. Page previews, thumbnails, and full abstracts will remain hidden until the browser window grows in width.

The current layout is optimized for tablet devices. Page previews and some thumbnails will remain hidden until the browser window grows in width.