This project proposal envisages the design of communication strategies in uncoordinated network settings, e.g. military networks/vehicular networks with the following three main features.
- Efficient multi-user distributed strategies for maximizing the data-rates under communication constraints on power/bandwidth/delay, while coordinating the participating users with limited information exchange.
- Enhanced secure data access in distributed wireless systems where information dissemination to unwanted entities should be guarded against.
- Protocols and fundamental limits of data rate transmission in uncoordinated networks with renewable energy sources, e.g. solar/wind energy.
For More Details Click Here
The research and development scope of this proposal includes designing communication protocols for maximizing the throughput of uncoordinated networks with limited overhead exchange, e.g. in a post-disaster relief network or rural network. The scope also includes designing communication algorithms that maximally exploit the natural energy sources, such as wind/solar/vibrational to provide a means of green communication by curbing the dependence on conventional energy sources. Information exchange with guaranteed data security is another principle area covered. This is of paramount importance in uncoordinated networks, where there are many nodes with almost no centralized network controller. The three themes are inter-related through their reliance on the wireless channel, and their co-existence needs joint designs.
The proposal also focuses on demonstrating a platform/test-bed for uncoordinated network access in public forums/technical fests. The test-bed will be implemented in GNURADIO and its implementation (software) will be made available online, so that the academic community/industry can get hands on experience and appreciate the research quality and quantity.
The principal outcome of this research proposal is high quality research papers which will be presented in reputed international forums and journals, see below for numbers. The proposed protocols and algorithms will provide design directions for practical deployment in uncoordinated network settings, e.g. military networks/vehicular networks.
The designs will target throughput efficiency, guaranteed security, and green communication by leveraging natural energy sources for power generation. These developments will be implemented in software, and tested/demonstrated extensively on the test-bed built using the GNURadio package and USRP hardware devices. The algorithms (in software) along with the proof-of-concept demonstrations are also a major part of the deliverables. The explicit numbers are shown in the bar-chart.
|Prof. Bikash Kumar Dey, IITBfirstname.lastname@example.org||Link to homepage|
|Prof. Vinod Prabhakaran, STCS TIFRemail@example.com||Link to homepage|
|Prof. Sripati Acharya, NIT Kfirstname.lastname@example.org||Link to homepage|
|Prof. Sumit Kundu, NIT Durgapuremail@example.com||Link to homepage|
|Prof. Sibi Raj B. Pillai, IITBfirstname.lastname@example.org||Link to homepage|
|Prof. Rahul Vaze, STCS TIFRemail@example.com||Link to homepage|
For more details, check project website.
[table caption=”” width=”500″ rowwidth=”20|100|50″ rowalign=”right”]
PhD Student(s) ,6
Number of Workshop/Training(s) , 1
Labs Created, 0
Presented at Conference: IEEE International Symposium on Information Theory (ISIT), June 29 – July 4, Honolulu, HI, USA Authors: S. Sreekumar, S R B Pillai, B K Dey Abstract—We consider a multiple access system (MAC) with bursty arrivals. The transmissions are grouped into slots and the users are frame-synchronized. At the start of each time slot, variable sized packets independently arrive… Read More
Presented at Conference: IEEE International Symposium on Information Theory (ISIT), June 29 – July 4, Honolulu, HI, USA Authors: M. Mishra, B. K. Dey, V. Prabhakaran, S. Diggavi Abstract—We consider oblivious transfer between Alice and Bob in the presence of an eavesdropper Eve when there is a broadcast channel from Alice to Bob and Eve. In addition to the secrecy constraints… Read More
Presented at Conference: IEEE International Symposium on Information Theory (ISIT), June 29 – July 4, Honolulu, HI, USA Authors: A. Budkuley, B. K. Dey, V. Prabhakaran Abstract—In this paper, the problem of writing on a dirty paper in the presence of jamming is examined. We consider an AWGN channel with an additive white Gaussian state and an additive adversarial jammer. The… Read More
Presented at Conference: IEEE International Symposium on Information Theory (ISIT), June 29 – July 4, Honolulu, HI, USA Authors: A. Budkuley, B. K. Dey, V. Prabhakaran Abstract—We study correlated jamming in joint source- channel communication systems. An i.i.d. source is to be communicated over a memoryless channel in the presence of a correlated jammer with non-causal knowledge of user transmission. This… Read More