ترغب بنشر مسار تعليمي؟ اضغط هنا

Device-to-Device Secure Coded Caching

90   0   0.0 ( 0 )
 نشر من قبل Ahmed A. Zewail
 تاريخ النشر 2018
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

This paper studies device to device (D2D) coded-caching with information theoretic security guarantees. A broadcast network consisting of a server, which has a library of files, and end users equipped with cache memories, is considered. Information theoretic security guarantees for confidentiality are imposed upon the files. The server populates the end user caches, after which D2D communications enable the delivery of the requested files. Accordingly, we require that a user must not have access to files it did not request, i.e., secure caching. First, a centralized coded caching scheme is provided by jointly optimizing the cache placement and delivery policies. Next, a decentralized coded caching scheme is developed that does not require the knowledge of the number of active users during the caching phase. Both schemes utilize non-perfect secret sharing and one-time pad keying, to guarantee secure caching. Furthermore, the proposed schemes provide secure delivery as a side benefit, i.e., any external entity which overhears the transmitted signals during the delivery phase cannot obtain any information about the database files. The proposed schemes provide the achievable upper bound on the minimum delivery sum rate. Lower bounds on the required transmission sum rate are also derived using cut-set arguments indicating the multiplicative gap between the lower and upper bounds. Numerical results indicate that the gap vanishes with increasing memory size. Overall, the work demonstrates the effectiveness of D2D communications in cache-aided systems even when confidentiality constraints are imposed at the participating nodes and against external eavesdroppers.

قيم البحث

اقرأ أيضاً

This paper considers a cache-aided device-to-device (D2D) system where the users are equipped with cache memories of different size. During low traffic hours, a server places content in the users cache memories, knowing that the files requested by th e users during peak traffic hours will have to be delivered by D2D transmissions only. The worst-case D2D delivery load is minimized by jointly designing the uncoded cache placement and linear coded D2D delivery. Next, a novel lower bound on the D2D delivery load with uncoded placement is proposed and used in explicitly characterizing the minimum D2D delivery load (MD2DDL) with uncoded placement for several cases of interest. In particular, having characterized the MD2DDL for equal cache sizes, it is shown that the same delivery load can be achieved in the network with users of unequal cache sizes, provided that the smallest cache size is greater than a certain threshold. The MD2DDL is also characterized in the small cache size regime, the large cache size regime, and the three-user case. Comparisons of the server-based delivery load with the D2D delivery load are provided. Finally, connections and mathematical parallels between cache-aided D2D systems and coded distributed computing (CDC) systems are discussed.
Coded caching is an efficient way to reduce network traffic congestion during peak hours by storing some content at the users local cache memory without knowledge of later demands. The goal of coded caching design is to minimize the transmission rate and the subpacketization. In practice the demand for each user is sensitive since one can get the other users preferences when it gets the other users demands. The first coded caching scheme with private demands was proposed by Wan et al. However the transmission rate and the subpacketization of their scheme increase with the file number stored in the library. In this paper we consider the following secure coded caching: prevent the wiretappers from obtaining any information about the files in the server and protect the demands from all the users in the delivery phase. We firstly introduce a combinatorial structure called secure placement delivery array (SPDA in short) to realize a coded caching scheme for our security setting. Then we obtain three classes of secure schemes by constructing SPDAs, where one of them is optimal. It is worth noting that the transmission rates and the subpacketizations of our schemes are independent to the file number. Furthermore, comparing with the previously known schemes with the same security setting, our schemes have significantly advantages on the subpacketizations and for some parameters have the advantage on the transmission rates.
The multi-access variant of the coded caching problem in the presence of an external wiretapper is investigated . A multi-access coded caching scheme with $K$ users, $K$ caches and $N$ files, where each user has access to $L$ neighbouring caches in a cyclic wrap-around manner, is proposed, which is secure against the wiretappers. Each transmission in the conventional insecure scheme will be now encrypted by a random key. The proposed scheme uses a novel technique for the key placement in the caches. It is also shown that the proposed secure multi-access coded caching scheme is within a constant multiplicative factor from the information-theoretic optimal rate for $Lgeq frac{K}{2}$ and $Ngeq 2K$.
In this paper, we consider the dynamic power control for delay-aware D2D communications. The stochastic optimization problem is formulated as an infinite horizon average cost Markov decision process. To deal with the curse of dimensionality, we utili ze the interference filtering property of the CSMA-like MAC protocol and derive a closed-form approximate priority function and the associated error bound using perturbation analysis. Based on the closed-form approximate priority function, we propose a low-complexity power control algorithm solving the per-stage optimization problem. The proposed solution is further shown to be asymptotically optimal for a sufficiently large carrier sensing distance. Finally, the proposed power control scheme is compared with various baselines through simulations, and it is shown that significant performance gain can be achieved.
This paper investigates user cooperation in massive multiple-input multiple-output (MIMO) systems with cascaded precoding. The high-dimensional physical channel in massive MIMO systems can be converted into a low-dimensional effective channel through the inner precoder to reduce the overhead of channel estimation and feedback. The inner precoder depends on the spatial covariance matrix of the channels, and thus the same precoder can be used for different users as long as they have the same spatial covariance matrix. Spatial covariance matrix is determined by the surrounding environment of user terminals. Therefore, the users that are close to each other will share the same spatial covariance matrix. In this situation, it is possible to achieve user cooperation by sharing receiver information through some dedicated link, such as device-to-device communications. To reduce the amount of information that needs to be shared, we propose a decoding codebook based scheme, which can achieve user cooperation without the need of channel state information. Moreover, we also investigate the amount of bandwidth required to achieve efficient user cooperation. Simulation results show that user cooperation can improve the capacity compared to the non-cooperation scheme.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا