430 research outputs found

    Generalized Stability Condition for Generalized and Doubly-Generalized LDPC Codes

    Full text link
    In this paper, the stability condition for low-density parity-check (LDPC) codes on the binary erasure channel (BEC) is extended to generalized LDPC (GLDPC) codes and doublygeneralized LDPC (D-GLDPC) codes. It is proved that, in both cases, the stability condition only involves the component codes with minimum distance 2. The stability condition for GLDPC codes is always expressed as an upper bound to the decoding threshold. This is not possible for D-GLDPC codes, unless all the generalized variable nodes have minimum distance at least 3. Furthermore, a condition called derivative matching is defined in the paper. This condition is sufficient for a GLDPC or DGLDPC code to achieve the stability condition with equality. If this condition is satisfied, the threshold of D-GLDPC codes (whose generalized variable nodes have all minimum distance at least 3) and GLDPC codes can be expressed in closed form.Comment: 5 pages, 2 figures, to appear in Proc. of IEEE ISIT 200

    Construction of Near-Optimum Burst Erasure Correcting Low-Density Parity-Check Codes

    Full text link
    In this paper, a simple, general-purpose and effective tool for the design of low-density parity-check (LDPC) codes for iterative correction of bursts of erasures is presented. The design method consists in starting from the parity-check matrix of an LDPC code and developing an optimized parity-check matrix, with the same performance on the memory-less erasure channel, and suitable also for the iterative correction of single bursts of erasures. The parity-check matrix optimization is performed by an algorithm called pivot searching and swapping (PSS) algorithm, which executes permutations of carefully chosen columns of the parity-check matrix, after a local analysis of particular variable nodes called stopping set pivots. This algorithm can be in principle applied to any LDPC code. If the input parity-check matrix is designed for achieving good performance on the memory-less erasure channel, then the code obtained after the application of the PSS algorithm provides good joint correction of independent erasures and single erasure bursts. Numerical results are provided in order to show the effectiveness of the PSS algorithm when applied to different categories of LDPC codes.Comment: 15 pages, 4 figures. IEEE Trans. on Communications, accepted (submitted in Feb. 2007

    On the LoRa Modulation for IoT: Waveform Properties and Spectral Analysis

    Get PDF
    An important modulation technique for Internet of Things (IoT) is the one proposed by the low power long range (LoRa) alliance. In this paper, we analyze the M -ary LoRa modulation in the time and frequency domains. First, we provide the signal description in the time domain, and show that LoRa is a memoryless continuous phase modulation. The cross-correlation between the transmitted waveforms is determined, proving that LoRa can be considered approximately an orthogonal modulation only for large M. Then, we investigate the spectral characteristics of the signal modulated by random data, obtaining a closed-form expression of the spectrum in terms of Fresnel functions. Quite surprisingly, we found that LoRa has both continuous and discrete spectra, with the discrete spectrum containing exactly a fraction 1/M of the total signal power

    Augmented PIN Authentication through Behavioral Biometrics

    Get PDF
    Personal Identification Numbers (PINs) are widely used today for user authentication on mobile devices. However, this authentication method can be subject to several attacks such as phishing, smudge, and side-channel. In this paper, we increase the security of PIN-based authentication by considering behavioral biometrics, specifically the smartphone movements typical of each user. To this end, we propose a method based on anomaly detection that is capable of recognizing whether the PIN is inserted by the smartphone owner or by an attacker. This decision is taken according to the smartphone movements, which are recorded during the PIN insertion through the built-in motion sensors. For each digit in the PIN, an anomaly score is computed using Machine Learning (ML) techniques. Subsequently, these scores are combined to obtain the final decision metric. Numerical results show that our authentication method can achieve an Equal Error Rate (EER) as low as 5% in the case of 4-digit PINs, and 4% in the case of 6-digit PINs. Considering a reduced training set, composed of solely 50 samples, the EER only slightly worsens, reaching 6%. The practicality of our approach is further confirmed by the low processing time required, on the order of fractions of milliseconds

    Machine Learning for PIN Side-Channel Attacks Based on Smartphone Motion Sensors

    Get PDF
    Motion sensors are integrated into all mobile devices, providing information useful for several purposes. However, these sensor data can be read by any application and by websites accessed through a browser, without requiring security permissions. In this paper, we show that information about smartphone movements can lead to the identification of a Personal Identification Number (PIN) tapped by the user. To reduce the amount of sniffed data, we use an event-driven approach, where motion sensors are sampled only when a key is pressed. The acquired data are used to train a machine learning algorithm for the classification of the keystrokes in a supervised manner. We also consider that users insert the same PIN each time authentication is required, leading to further side-channel information available to the attacker. Numerical results show the feasibility of cyber-attacks based on motion sensors. For example, 4-digit PINs are correctly recognized at the first attempt with an accuracy of 37%, and in five attempts with an accuracy of 63%

    Density Estimation in Randomly Distributed Wireless Networks

    Get PDF
    Networks of randomly distributed nodes appear in various fields, including forestry and wireless communications, and can often be modeled, using stochastic geometry theory, as Poisson point processs (PPPs). In these contexts, estimation of nodes density is important for monitoring and optimizing the network. Originally, this problem has been addressed in forestry where the trees are the nodes and, assuming these are distributed according to an infinite two-dimensional homogeneous PPP, the spatial density can be estimated by measuring the distances from one reference tree to its neighbors. However, in many other scenarios, nodes could result invisible with some probability, for example depending on distance. In this paper, we derive the Cramér-Rao bounds and new estimators for the node spatial density, taking into account a limited capability in sensing neighbors. As an example, we provide estimators of the spatial density of transmitting devices in wireless networks with links affected by thermal noise, path loss, and shadowing

    Massive Grant-Free Access with Massive MIMO and Spatially Coupled Replicas

    Get PDF
    Massive multiple access schemes, capable of serving a large number of uncoordinated devices while fulfilling reliability and latency constraints, are proposed. The schemes belong to the class of grant-free coded random access protocols and are tailored to massive multiple input multiple output (MIMO) base station processing. High reliability is obtained owing to an intra-frame spatial coupling effect, triggered by a simple device access protocol combined with acknowledgements (ACKs) from the base station. To provide system design guidelines, analytical bounds on error floor and latency are also derived. The proposed schemes are particularly interesting to address the challenges of massive machine-type communications in the framework of next generation massive multiple access systems

    Quantum codes for asymmetric channels: ZZZY surface codes

    Get PDF
    We introduce surface ZZZY codes, a novel family of quantum error-correcting codes designed for asymmetric channels. Derived from standard surface codes through tailored modification of generators, ZZZY codes can be decoded by the minimum weight perfect matching (MWPM) algorithm with a suitable pre-processing phase. The resulting decoder exploits the information provided by the modified generators without introducing additional complexity. ZZZY codes demonstrate a significant performance advantage over surface codes when increasing the channel asymmetry, while maintaining the same correction capability over depolarizing channel

    Identification-detection group testing protocols for COVID-19 at high prevalence

    Get PDF
    Group testing allows saving chemical reagents, analysis time, and costs, by testing pools of samples instead of individual samples. We introduce a class of group testing protocols with small dilution, suited to operate even at high prevalence (5–10%), and maximizing the fraction of samples classified positive/negative within the first round of tests. Precisely, if the tested group has exactly one positive sample then the protocols identify it without further individual tests. The protocols also detect the presence of two or more positives in the group, in which case a second round could be applied to identify the positive individuals. With a prevalence of 5 % and maximum dilution 6, with 100 tests we classify 242 individuals, 92 % of them in one round and 8 % requiring a second individual test. In comparison, the Dorfman’s scheme can test 229 individuals with 100 tests, with a second round for 18.5 % of the individuals
    corecore