Wednesday, June 6, 2018 to Thursday, June 7, 2018. Times listed in Eastern Time (US &
Canada). All talks are held in the lower floor of the Engineering Building (245
Church Street)
Wednesday, June6, 2018
8:30am 9:00
am – 10:am (ENG-LG04) Keynote
Presentation, Aria Nosratinia (UT Dallas):” Coherence
Diversity: a new source of gains in wireless networks”
Session Chair: Ali Miri (Ryerson)
Se
Abstract: Due to differences in mobility and local scattering,
the links in a wireless network can experience disparities in coherence time
that, in the past, were mostly ignored in the modeling and analysis of
networks. We show that these coherence disparities can be a source of capacity
gains (denoted “coherence diversity”) that are distinct and independent from
classical gains such as spatial multiplexing, beamforming, and multiuser
diversity. A product superposition is introduced that can exploit these
differences in coherence and yield gains in degrees of freedom. The gains are
an increasing function of the mismatch in coherence times and vanish in the
absence of coherence disparity. Coherence diversity will be explored in the
context of pilot-based as well as Grassmannian communication. It is shown that
differences in coherence bandwidth also yield a similar gain. Time permitting,
non-uniformity of CSIT under coherence disparity and disparity in spatial
coherence will be discussed. Several open problems in the broad area of
coherence diversity will be highlighted.
10:00am - 10:20am Coffee Break
10:20
am – 12:00 pm (ENG-LG04) Session 1: Multiple Antenna Systems
Session
Chair: Julian Cheng (UBC)
· ‘A New Look at Optimum Macro Base Station
Deployment in Heterogeneous Massive MIMO Networks for Eliminating Interference’,
Noha Hassan and Xavier Fernando
Heterogeneous networks (HetNets) offer a practical representation for 5G systems
due to the recent trend of viewing
the communication system as three dimensional (3D) with various slices cooperating among each other. Each slice represents a unique tier that has its own Base stations (BS) and serving users (UEs). Also, data can be transmitted among tiers, and UEs have the flexibility to switch between various tiers. In order to present the randomization that imposes such systems, a Poisson point process (PPP) has been widely used by default to allocate BSs and UEs in various tiers. However, the suggested locations are not the best ones to improve network performance and reduce interference. In this paper, we develop a new algorithm to find the optimum locations of Macro BSs in HetNets where every Macro BS along with its associate Micro BSs can be treated as an independent unit after eliminating interference from neighboring Macro and Micro BSs. The simulation results proved the validity of our approach and the promising enhancement to system performance.
· ‘Transmit Antenna Selection for
Rank-deficient Spatial Multiplexing Systems’, Mohammad Kazem Izadinasab
and Mohamed Oussama Damen
In this work, we study a diversity
optimal transmit antenna selection for rank-deficient spatial multiplexing (SM)
systems with linear or decision-feedback (DF) receivers based on the
fixed-complexity sphere decoder (FSD) ordering. We propose a regularized FSD
(RFSD) transmit antenna selection algorithm by utilizing the regularized (or
augmented) channel matrix in order to alleviate the rank-deficiency of the Gram
channel matrix. In each iteration of the RFSD algorithm, one column of the
channel corresponding to the row of the pseudo-inverse of the regularized
channel matrix with the maximum norm is zeroed until L columns remain for
transmission. The diversity optimality of the proposed technique is
investigated by analysis and
some computer simulations.
· ‘Updating Beamformers to Respond to
Changes in Users’, Mostafa Medra, Andrew Eckford and Raviraj Adve
We consider a multi-user multiple-input single-output downlink system that provides each user with a prespecified level of quality-of-service. The base station (BS) designs the beamformers so that each user receives a certain signal-to-interference-and-noise ratio (SINR). In contrast to most of the available literature in the beamforming field, we focus on the required modifications when the system changes. We specifically study three cases: (i) user entering the system, (ii) user leaving the system, and (iii) a change in the SINR target. We do so in order to avoid designing the entire system from scratch for every change in the requirements. In each of the three cases, we describe the modifications required to the beamforming directions and the power loading. We consider maximum ratio transmission (MRT), zero-forcing (ZF) and the optimal beamformers. The proposed modifications provide performance that is either exact or very close to that obtained when we redesign the entire system, while having much lower computational cost.
· ‘On the Error Performance of Space-Time
Codes over MIMO Nakagami Fading Channels with
Blockage’, Ahmed Aboutaleb, Wael Fatnassi, Zouheir Rezki and Anas Chaaban
In this paper, we derive a closed-form upper bound on the error performance of space-time codes over Nakagami-$m$ fading channels. Our upper bound is based on the pairwise error probability (PEP). We then examine the resulting diversity and coding gains to propose design criteria that maximize these gains. Orthogonal space-time block codes are shown to achieve the maximum diversity gain but not the maximum coding gain. Indeed, we show that there exists a trade-off between the diversity gain and the coding gain. Furthermore, we investigate the effect of blockage on the error performance using stochastic geometry. Our analysis and simulations show that blockage only reduces the coding gain and does not affect the diversity gain. This reduction in the coding gain is a function of the probability of line-of-sight (LOS) communication, path loss exponents, the distance between transceivers, and the coding gain without considering the effect of blockage. For instance, in a typical indoor environment, blockage due to humans or other obstacles can reduce the coding gain by up to 1.5 dB for a bit error probability of 10$^{-3}$.
· ‘A Hierarchical Graph Signal Processing
Approach to Inference from Spatiotemporal Signals’, Nafiseh
Ghoroghchian, Stark C. Draper and Roman Genov
Motivated by the emerging area of graph signal processing (GSP), we
introduce a novel method to draw inference from spatiotemporal signals. Data
acquisition in different locations over time is seen in sensor networks for
diverse applications, from object tracking to electroencephalography (EEG)
signal processing. In this paper we leverage novel techniques of GSP to extract
spatiotemporal signals from such data sets.We
develop a hierarchical feature extraction approach by mapping the data onto a
series of spatiotemporal graphs. Such a model maps signals onto vertices of a
graph and the time-space dependencies among signals are modeled by the edges weights.Signal components acquired
from different locations and time often have complicated functional
dependencies. Accordingly, their corresponding graph weights are learned from
data and used in two ways. First, they are used as a part of the embedding
related to the topology of graph such as density. Second, they provide the connectivities of the base graph for extracting higher
level GSP-based features. The latter include the energies of graph Fourier
transform in different frequency bands. We test our approach on the iEEG data set of the Kaggle seizure detection contest. In
comparison to the winning code, the results show a slight net improvement and
up to 6 percent improvement in per subject analysis, while the number of
features are decreased by 75 percent on average.
12:00pm -
2:00pm Lunch
2:00pm - 5:00pm
(ENG-LG04) Tutorial, Zheshen Zhang
(Arizona):”Quantum Communications: Fundamentals, Applications, and Physical
Realizations”
Abstract: Quantum information science gives rise to new communication paradigms that would offer unmatched security and capacity. This tutorial will provide an overview of the principles and applications of quantum communications. It will be comprised of three Sections: in Section I, we will introduce the basics of quantum information, i.e., how information is represented at a quantum mechanical level. The focus will be on the fundamental disparities between quantum and classical information, including the quantum superposition principle, measurement uncertainty, the no-cloning theorem, and quantum entanglement. In Section II, we will build upon the knowledge acquired in Section I to construct quantum-communication protocols that offer functionalities beyond the reach of classical communications. We will study quantum key distribution, quantum teleportation, entanglement swapping, and super-dense coding. Section III will be dedicated to bridging the gap between theory and experiment, by introducing the physical realizations of entanglement generation, operations and measurements on the quantum states of light, along with a case study of a complete quantum-communication system. The attendees of the tutorial are anticipated to learn the essential elements of quantum communications, from both theoretical and experimental perspectives. We hope that the materials presented in this tutorial will help to build connections between quantum and classical communications so that their respective tools and techniques may benefit each other to create new routes for interdisciplinary research.
5:00pm - 6:00pm
(ENG-LG21) CSIT Meeting
6:30pm - 8:30pm
Banquet
Thursday, June7, 2018
9:00 am – 9:00am - 10:20am (ENG-LG04) Session 2a: Source
Coding and Quantizer
Session Chair: Fady Alajaji (Queens)
· ‘Binary CEO Problem under Log-Loss with
BSC Test-Channel Model’, Mahdi Nangir, Reza Asvadi, Mahmoud Ahmadian-Attari
and Jun Chen
In this paper, we propose an efficient coding scheme for the two-link
binary Chief Executive Officer (CEO) problem under logarithmic loss criterion.
The exact rate-distortion bound for a two-link binary CEO problem under the
logarithmic loss has been obtained by Courtade and
Weissman. We propose an encoding scheme based on compound LDGM-LDPC codes to
achieve the theoretical bounds. In the proposed encoding, a binary quantizer
using LDGM codes and a syndrome-coding employing LDPC codes are applied. An
iterative joint decoding is also designed as a fusion center. The proposed CEO
decoder is based on the sum-product algorithm and a soft estimator.
· ‘Design of Optimal Entropy-constrained
Successively Refinable Unrestricted Polar Quantizer
for Bivariate Circularly Symmetric Sources’, Huihui
Wu and Sorina Dumitrescu
This paper focuses on the design of entropy-constrained successively refinable unrestricted polar quantizer (EC-SRUPQ) for
bivariate circularly symmetric sources. The proposed algorithm is globally
optimal under the constraint that the magnitude quantizers' thresholds are
confined to finite sets. The optimization problem is formulated as the
minimization of a weighted sum of distortions and entropies. The proposed solution consists of a series of
steps including solving the minimum-weight path problem for multiple node pairs
in certain weighted directed acyclic graphs. The asymptotical time complexity
is $O(K_1K_2^2P_{max})$, where $K_1$ and $K_2$ are the
sizes of the sets of possible magnitude thresholds of the coarse UPQ and
refined UPQ, respectively, while $P_{max}$ is the maximum number of phase
levels in any phase quantizer of the coarse UPQ.
· ‘Optimal Design of A
Two-stage Wyner-Ziv Scalar Quantizer with Degraded
Side Information’, Qixue Zheng and Sorina Dumitrescu
This work addresses the optimal design of a two-stage Wyner-Ziv scalar quantizer with degraded side information
(SI). We assume that binning is performed optimally and address the design of
the nested quantizer partitions. The optimization problem is formulated as
minimizing a weighted sum of distortions and rates. The proposed solution
algorithm is globally optimal when the source and SI are discrete, while the
partition cells are contiguous. The algorithm is based on solving the single
source or the all-pairs minimum-weight path problem in certain weighted
directed acyclic graphs. A so-called partial Monge property is additionally
introduced and a faster solution algorithm exploiting this property is
proposed. Experimental results assess the practical performance of the proposed
scheme.
·
‘Successive
Wyner-Ziv Coding for the Binary CEO Problem under
Log-Loss’, Mahdi Nangir, Reza Asvadi,
Mahmoud Ahmadian-Attari and Jun Chen
An
$l$-link binary CEO problem is considered in this paper. We present a practical
encoding and decoding scheme for this problem employing the graph-based codes.
A successive coding scheme is proposed for converting an $l$-link binary CEO
problem to the $(2l-1)$ single binary Wyner-Ziv (WZ) problems. By using the compound LDGM-LDPC
codes, the theoretical bound of each binary WZ is asymptotically achievable.
Our proposed decoder successively decodes the received data by employing the
well-known Sum-Product (SP) algorithm and leverages them to reconstruct the
source. The sum-rate distortion performance of our proposed coding scheme is
compared with the theoretical bounds under the logarithmic loss (log-loss)
criterion.
9:0 9:00am - 10:20am (ENG-LG21) Session 2b: Communication theory and energy harvesting
Session Chair: Andrew Eckford (York)
· ‘Analysis of Nonlinear Phase Noise in
Dispersion Unmanaged Fiber-Optic Systems’, Saber Rahbarfam
and Shiva Kumar
An analytical expression for the linear and nonlinear phase noise variance in dispersion unmanaged fiber optic systems has been derived using a first-order perturbation theory. Some numerical examples have been provided to illustrate the behavior of the developed phase noise variance in terms of dispersion and distance. The results show that in dispersion unmanaged systems, nonlinear interaction between the amplified spontaneous emission and the signal does not grow as much as in dispersion managed systems, because this interaction is different in each fiber-amplifier span and the noise contributions from various fiber spans do not add up coherently. Therefore, the nonlinear phase variance in a dispersion unmanaged system is much lower than the corresponding noise variance in a dispersion managed system.
· ‘Optimized Physical Carrier Sensing
Threshold in High Density CSMA/CA Networks’, Phillip Oni and Steven Blostein
We address the PCS (physical carrier sensing) threshold selection
problem for dense wireless local area networks (WLANs). This important network
parameter determines the spatial reuse permitted by the CSMA/CA protocol, which
consequently determines the interference level. Using Poisson Point Processes
(PPP) from stochastic geometry, we obtain a closed-form expression for PCS
threshold selection. Our primary aim is to find the PCS threshold value that
improves the spatial density of throughput (SDT). Assuming a Rayleigh fading
channel, we derive the PCS threshold as a function of deterministic network
parameters (node density and path loss exponent). That is, we determine the
optimal PCS threshold based on the fundamental parameters of the network
without requiring channel knowledge of each link. To assess the impact of the
proposed method, simulation results reveal gains in throughput density over the
conventional scheme and the random selection method.
·
‘Extracting the Most Weighted Throughput in
UAV Empowered Wireless Systems With Nonlinear Energy
Harvester’, Yanjie Dong, Julian Cheng, Md. Jahangir
Hossain and Victor C. M. Leung
With
the maturity of unmanned aerial vehicle (UAV) technology, this work
investigates the integration of UAV into wireless communication systems. Since
the UAV is powered by a capacity-limited battery, this work proposes to use the
radio energy harvesting technology at the UAV in order to extend the lifetime
of UAV empowered base station. To extract the most weighted throughput of UAV
empowered wireless systems, the dirty paper coding scheme and
information-theoretic uplink-downlink channel duality are exploited to propose
an extracting the most weighted throughput algorithm.
Numerical
results are used to verify the proposed algorithm.
·
‘Exact Statistical Characterization of
RF-Energy Harvesting over Nakagami-m Fading Channel’,
Ala Abu Alkheir and Hussein T. Mouftah
This
article gives exact statistical characterization of harvested RF-energy over a Nakagami-$m$ fading channel. In \cite{A.AbuAlkheir1015},
we have shown that the amount of harvested energy is a scaled version of the
amount of received energy, which can be statistically modeled using the
Sampling Theorem. However, harvesting only happens when the received Signal to
Noise Ratio (SNR) exceeds a certain threshold. This article capitalizes on
these two results to derive exact closed form expressions of the Cumulative
Distribution and Moment Generating Functions (CDF) and (MGF) of the harvested
energy over a Nakagami-$m$ fading channel. We also
extend the analysis to the case of harvesting over a sequence of $N$ fading
blocks. The derived results give researchers a powerful tool to design realistic
RF-energy harvesting protocols.
A Hierar
10:20am - 10:40am
Coffee Break
10:40
am – 12:00 am (ENG-LG04)
Session 3: Coding and
Information Theory
Session Chair: Frank Kschischang (UofT)
· ‘Reduced Message-Passing bitwidth for Hardware Implementation of ADMM-LP Decoding’, Omar
Samhan and Stark Draper
In this paper we consider the implementation in hardware of linear-programming (LP) decoding of low-density parity-check codes. Previous work has shown that the alternating direction method of multipliers (ADMM) can be applied to solve LP decoding in a message passing manner amenable to hardware. Wasson et al.~demonstrated the feasibility of a hardware implementation in a field-programmable gate array (FPGA). However, the area footprint and message bit-width of the implemenation was not competitive with classic alternatives such as min-sum decoding. In this paper we leverage recent work by Jiao et al.~on implementating the central computational primative of ADMM-LP decoding (a certain Euclidean projection) via look-up tables (LUTs). While Jiao's work indicated the possiblity of significant bit-width reduction, it left open a number of questions about how to translate those ideas into hardware and what algorithmic modifications would be required. In this paper we answer those questions and develop a modified version of Wasson's ADMM-LP decoding algorithm, realizing a bit-width reduction of about 50\%, thereby yielding a hardware implementation of ADMM-LP decoding that is competitive with min-sum.
· ‘Streaming Codes with Unequal Error
Protection against Burst Losses’, Mahdi Haghifam,
Ahmed Badr, Ashish Khisti,
Xiaoqing Zhu, Wai-Tian Dan and John Apostolopoulos
Error control codes for real-time interactive applications such as audio and video streaming must operate under strict delay constraints and be resilient to burst losses. Previous works have characterized optimal codes that guarantee perfect recovery of all source packets when the burst loss is below a certain maximum threshold. In this work we introduce two notions of unequal error protection (UEP) in streaming codes. The first is symbol-level UEP where each source packet consists of two sub-packets, one of which has higher level of importance than the other. While the important sub-packet has the same deadline it must recover from a longer burst loss. Perfect recovery of the entire source packet is required if the burst loss is below a certain nominal threshold. The second notion is packet-level UEP. Here we assume that the source packets arriving at odd and even times have different levels of importance. When the burst length is below a certain threshold, all the source packets must be recovered. On the other hand, in the period of the longer burst, we only require the recovery of the source packets at even time slots. We discuss practical motivations for both settings and develop coding schemes that use previously proposed streaming codes as constituent codes. We establish optimality or near optimality guarantees through information theoretic converse. Simulation over Gilbert channels show that these codes outperform baseline schemes over a wide range of channel parameters.
· ‘A Direct Method to Construct Golay Complementary Sets Based on Boolean Functions’, Dongxu Ma, Zilong Wang and Guang Gong
Golay complementary pair and set sequences
are highly regarded since their potential in the applications for Peakto-mean power ratio (PMEPR) in multicarrier
communications including orthogonal frequency-division multiplexing (OFDM). In
the latest literature [13], the authors provided a new construction on Golay complementary sets using matrix method, which also
included the Golay complementary pair as a special
case. But there is no investigating how these sequences can be efficiently
generated. In this paper, we will introduce a method which can directly
generate the Boolean functions of q-ary Golay complementary sets with size N and length N^m. From this new method, the generation of the explicit
Boolean functions of Golay complementary sets can be
used to generate such Golay complementary sets in
much more efficient and flexible way. Furthermore, the cost of the implementation
of the Golay complementary sets is greatly reduced.
· ‘Subfield Subcodes
of Tamo-Barg Locally Recoverable Codes’, Christian Senger and Harsha Kadalveni Shivakumar
It is shown that Tamo-Barg locally recoverable (LRC) codes can be considered as subcodes of generalized Reed-Solomon (GRS) codes. Their encoding can be interpreted as sequential encoding with two particular constituent codes that depend on each other. The message constraint approach for finding subfield subcodes of GRS codes is transferred to this setting in order to obtain subfield subcodes of LRC codes. The subcodes have the same (or better) locality as their parent codes, and at least their minimum distance.
12:00pm - 1:40pm
Lunch
1:40pm - 3:00pm (ENG-LG04) Session 4: Networks and Fog Computing
Session Chair: Chen
Feng (UBC)
· ‘A Dynamic Priority Service Provision
Scheme for Delay-Sensitive Applications in Fog Computing’, Ali Alnoman and Alagan Anpalagan
The massive number of connected
devices in future networks impose a real challenge in terms of managing both
communication and computing resources. Moreover, the competency on the limited resources of devices and machines in the IoT era will inherently raise the delay experienced by users. To this end, we propose a dynamic priority service provision scheme to achieve the envisioned ultra-low latency for delay-sensitive applications. First, incoming tasks are classified as delay-sensitive and delay-insensitive, then priority classes are assigned using a matching theory approach where both the task preference and category are taken into account. Secondly, the time delay experienced by each class is investigated on the fog computing node i.e., the edge device, and the communication node i.e., the small base station (SBS), using regular and prioritized queues. To maintain high quality of experience (QoE) in regard with time delay for all tasks, a dynamic priority scheme is proposed and controlled using a heuristic algorithm. The goal of the dynamic priority scheme is to minimize the delay experienced by noncomputing tasks (e.g., regular phone calls) that use the SBS to obtain radio access links to connect with the cellular network. The combined delay effect of both communication and computing nodes is compared using the different schemes. Results show that the proposed schemes can achieve significant reduction in the amount of delay experienced by users while maintaining the balance between computing and non-computing tasks.
· ‘On Base Station Sleeping for
Heterogeneous Cloud-Fog Computing Networks’, Ali Alnoman
and Alagan Anpalagan
In this paper, a base station
sleeping mechanism is investigated taking into account the effect of offloaded
tasks on
the queue delay at the cloud
server. Motivated by the capability of heterogeneous cloud radio access
networks (H-CRANs) to
efficiently manage and control all
network nodes, we aim to minimize power consumption of small base stations
(SBSs) under
the constraint of queue delay at the central cloud. In the proposed model, computing tasks can be processed either at the edge device close to users, or at the central cloud. The problem is formulated using conditional probabilities whereby the queueing probability of macro base station (MBS) and cloud given that each SBS operates in the sleeping mode is calculated. The sleeping strategy then forces SBSs that impose minimum queueing probability on MBS, cloud, or the union of MBS and cloud to sleep based on the desired performance. The minimum queueing probability on MBS is analogous to the minimum number of tasks approach used in the literature and is used for comparison. Results show that the proposed mechanism can significantly reduce the computing response time in accordance with the desired amount of power saving.
· ‘Probabilistic Caching as Mixed
Strategies in Spatially-Coupled Edge Caching’, Jie
Gao, Lian Zhao and Limin
Sun
The problem of probabilistic caching in a network with multiple edge
nodes and user nodes is studied. Files with different lengths, caches with
different sizes, and spatial coupling through overlapping service areas are
considered. The connection between caching probabilities and strategy-mixing
probabilities in a mixed strategy is characterized. It is found that a given
set of caching probabilities for an edge node can correspond to more than one
mixed strategies. Through this characterization, caching probabilities can be
decomposed into pure caching strategies and corresponding strategy-mixing
probabilities. Moreover, the best-response caching strategy of an EN is studied
and obtained based on the spatial-coupling discounted file preference level.
The impact of information availability and request scenario on the
best-response strategy is analyzed. Numeric examples demonstrate the
best-response strategy and the decomposition of the caching probabilities into
pure strategies and strategy-mixing probabilities.
· ‘Join-the-Idle-Queue Meets the Power-of-d-choices’, Chunpu
Wang, Yonghui Lu, Chen Feng and Julian Cheng
Power-of-d-choices (Pod) and Join-the-idle-queue (JIQ) are two popular
load balancing strategies that have received much attention from both academia
and industry. Some possible combinations of Pod and JIQ have been explored very
recently. Building upon these works, we have studied two new combinations of
Pod and JIQ, which offer several unique advantages such as a better
performance-cost tradeoff.
3:00pm - 3:20pm Coffee Break
3:20pm - 5:00pm (ENG-LG04) Session 5: Security
Session Chair: Anas Chaaban
(UBC)
· ‘Single Packet Authorization in a Multi-layered
Security Architecture’, Mohammad Mirheydari, Pavol Zavarsky and Sergey Butakov
Single Packet Authorization (SPA) is a concealment method that hides the open ports, devices, and network components behind a firewall. SPA suffers from a known weakness i.e. the SPA client, and if the SPA client gets compromised by an attacker, the attacker can find his way to the SPA server. This paper explores the possible attacks from the SPA client with the focus on the implementation of SPA in multi-level security architecture such as Industrial Control Systems (ICS). It identifies the limitations of SPA on cascading the authorization packet in multiple security levels and proposes to combine SPA with access control. It is shown in the paper that the security of the whole SPA architecture can be improved by adding some features to the SPA server.
· ‘Evaluation of Industrial Firewall
Performance Issues in Automation and Control Networks’, Davison Zvabva, Pavol Zavarsky,
Sergey Butakov and John Luswata
The IEC 62443 security standards introduce the concepts of zones, conduits, and security levels as a way of segmenting and isolating the sub-systems of an industrial control network. Network segmentation physically/logically partition the control network into separate communication zones to restrict unnecessary flow of traffic between zones of different trust level. Firewalls with deep packet inspection capabilities for filtering industrial control protocols are indispensable elements in implementing important security principles, standards, and best practices of IEC 62443. While partitioning of the industrial control network and placement of multiple firewalls at various locations provides defense in-depth against cyber-attacks, it is important to consider the impact of these firewalls on nodes distributing time critical communications. This paper attempts to (i) study network performance impact introduced by the implementation of multiple firewalls in Modbus TCP/IP industrial control networks following IEC 62443 security standards and (ii) evaluate if time constraint requirements for communications are achievable. The results reveal that the latency and jitters introduced by multilayered firewalls makes it challenging to achieve real-time communications in some industrial applications when strict IEC 62443 security standards are followed.
· ‘Analysis of SCADA Security using
Penetration Testing: A case study on Modbus TCP Protocol’, John Luswata, Pavol Zavarsky, Bobby Swar and Davison Zvabva
This paper presents an insight into attacks on Supervisory Control and Data Acquisition (SCADA) systems specifically focusing on systems that use the Modbus TCP protocol. A penetration testing approach is adopted using a novel penetration testing tool to (i) test the effectiveness and efficiency of the tool, (ii) examine the insider threat as well as the external threat through internal and external penetration testing respectively and (iii) rate the vulnerabilities identified through the penetration tests according to the Common Vulnerability Scoring System. The study also examines and tests the existing security countermeasures that are unique to SCADA systems and outlines some recommendations that may improve security in SCADA systems. The experimental results showed that some of the attacks may severely impact integrity and availability.
· ‘Secrecy Beamforming for SWIPT MISO
Heterogeneous Cellular Networks’, Hui Ma, Julian Cheng and Xianfu
Wang
In this paper, we consider the
secure transmission design for a multiple-input single-output Femtocell
overlaid with
a Macrocell in co-channel deployment. The Femtocell base station sends confidential messages to information receiving Femtocell users (FUs) and energy signals to energy receiving (ER) FUs while limiting the interference to Macrocell users (MUs). The ER FUs have the potential to wiretap the confidential messages. Consequently, by taking fairness into account, we propose a sum logarithmic secrecy rate maximization beamforming design problem under the interference constraints for MUs and energy harvesting (EH) constraints for ER FUs. The formulated design problem is nontrivial to solve due to the nonconvexity which lies in the objective and the constraints. To tackle with the design problem, a semidefinite relaxation and successive convex approximation based algorithm is proposed. Simulation results demonstrate the effectiveness of the proposed beamforming.