Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where João Barros is active.

Publication


Featured researches published by João Barros.


IEEE Transactions on Information Theory | 2008

Wireless Information-Theoretic Security

Matthieu R. Bloch; João Barros; Miguel R. D. Rodrigues; Steven W. McLaughlin

This paper considers the transmission of confidential data over wireless channels. Based on an information-theoretic formulation of the problem, in which two legitimates partners communicate over a quasi-static fading channel and an eavesdropper observes their transmissions through a second independent quasi-static fading channel, the important role of fading is characterized in terms of average secure communication rates and outage probability. Based on the insights from this analysis, a practical secure communication protocol is developed, which uses a four-step procedure to ensure wireless information-theoretic security: (i) common randomness via opportunistic transmission, (ii) message reconciliation, (iii) common key generation via privacy amplification, and (iv) message protection with a secret key. A reconciliation procedure based on multilevel coding and optimized low-density parity-check (LDPC) codes is introduced, which allows to achieve communication rates close to the fundamental security limits in several relevant instances. Finally, a set of metrics for assessing average secure key generation rates is established, and it is shown that the protocol is effective in secure key renewal-even in the presence of imperfect channel state information.


international symposium on information theory | 2006

Secrecy Capacity of Wireless Channels

João Barros; Miguel R. D. Rodrigues

We consider the transmission of confidential data over wireless channels with multiple communicating parties. Based on an information-theoretic problem formulation in which two legitimate partners communicate over a quasi-static fading channel and an eavesdropper observes their transmission through another independent quasi-static fading channel, we define the secrecy capacity in terms of outage probability and provide a complete characterization of the maximum transmission rate at which the eavesdropper is unable to decode any information. In sharp contrast with known results for Gaussian wiretap channels (without feedback), our contribution shows that in the presence of fading information-theoretic security is achievable even when the eavesdropper has a better average signal-to-noise ratio (SNR) than the legitimate receiver - fading thus turns out to be a friend and not a foe


Archive | 2011

Physical-Layer Security: From Information Theory to Security Engineering

Matthieu R. Bloch; João Barros

This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures, it provides essential practical tools that enable graduate students, industry professionals and researchers to build more secure systems by exploiting the noise inherent to communications channels. The book begins with a self-contained explanation of the information-theoretic limits of secure communications at the physical layer. It then goes on to develop practical coding schemes, building on the theoretical insights and enabling readers to understand the challenges and opportunities related to the design of physical layer security schemes. Finally, applications to multi-user communications and network coding are also included.


IEEE Journal on Selected Areas in Communications | 2011

Impact of Vehicles as Obstacles in Vehicular Ad Hoc Networks

Mate Boban; Tiago T. V. Vinhoza; Michel Ferreira; João Barros; Ozan K. Tonguz

A thorough understanding of the communications channel between vehicles is essential for realistic modeling of Vehicular Ad Hoc Networks (VANETs) and the development of related technology and applications. The impact of vehicles as obstacles on vehicle-to-vehicle (V2V) communication has been largely neglected in VANET research, especially in simulations. Useful models accounting for vehicles as obstacles must satisfy a number of requirements, most notably accurate positioning, realistic mobility patterns, realistic propagation characteristics, and manageable complexity. We present a model that satisfies all of these requirements. Vehicles are modeled as physical obstacles affecting the V2V communication. The proposed model accounts for vehicles as three-dimensional obstacles and takes into account their impact on the LOS obstruction, received signal power, and the packet reception rate. We utilize two real world highway datasets collected via stereoscopic aerial photography to test our proposed model, and we confirm the importance of modeling the effects of obstructing vehicles through experimental measurements. Our results show considerable obstruction of LOS due to vehicles. By obstructing the LOS, vehicles induce significant attenuation and packet loss. The algorithm behind the proposed model allows for computationally efficient implementation in VANET simulators. It is also shown that by modeling the vehicles as obstacles, significant realism can be added to existing simulators with clear implications on the design of upper layer protocols.


international conference on computer communications | 2009

Network Coding Meets TCP

Jay Kumar Sundararajan; Devavrat Shah; Muriel Médard; Michael Mitzenmacher; João Barros

We propose a mechanism that incorporates network coding into TCP with only minor changes to the protocol stack, thereby allowing incremental deployment. In our scheme, the source transmits random linear combinations of packets currently in the congestion window. At the heart of our scheme is a new interpretation of ACKs - the sink acknowledges every degree of freedom (i.e., a linear combination that reveals one unit of new information) even if it does not reveal an original packet immediately. Such ACKs enable a TCP-compatible sliding-window approach to network coding. Our scheme has the nice property that packet losses are essentially masked from the congestion control algorithm. Our algorithm therefore reacts to packet drops in a smooth manner, resulting in a novel and effective approach for congestion control over networks involving lossy links such as wireless links. Our scheme also allows intermediate nodes to perform re-encoding of the data packets. Our simulations show that our algorithm, with or without re-encoding inside the network, achieves much higher throughput compared to TCP over lossy wireless links. We also establish the soundness and fairness properties of our algorithm. Finally, we present queuing analysis for the case of intermediate node re-encoding.


Proceedings of the IEEE | 2011

Network Coding Meets TCP: Theory and Implementation

Jay Kumar Sundararajan; Devavrat Shah; Muriel Médard; Szymon Jakubczak; Michael Mitzenmacher; João Barros

The theory of network coding promises significant benefits in network performance, especially in lossy networks and in multicast and multipath scenarios. To realize these benefits in practice, we need to understand how coding across packets interacts with the acknowledgment (ACK)-based flow control mechanism that forms a central part of todays Internet protocols such as transmission control protocol (TCP). Current approaches such as rateless codes and batch-based coding are not compatible with TCPs retransmission and sliding-window mechanisms. In this paper, we propose a new mechanism called TCP/NC that incorporates network coding into TCP with only minor changes to the protocol stack, thereby allowing incremental deployment. In our scheme, the source transmits random linear combinations of packets currently in the congestion window. At the heart of our scheme is a new interpretation of ACKs-the sink acknowledges every degree of freedom (i.e., a linear combination that reveals one unit of new information) even if it does not reveal an original packet immediately. Thus, our new TCP ACK rule takes into account the network coding operations in the lower layer and enables a TCP-compatible sliding-window approach to network coding. Coding essentially masks losses from the congestion control algorithm and allows TCP/NC to react smoothly to losses, resulting in a novel and effective approach for congestion control over lossy networks such as wireless networks. An important feature of our solution is that it allows intermediate nodes to perform re-encoding of packets, which is known to provide significant throughput gains in lossy networks and multicast scenarios. Simulations show that our scheme, with or without re-encoding inside the network, achieves much higher throughput compared to TCP over lossy wireless links. We present a real-world implementation of this protocol that addresses the practical aspects of incorporating network coding and decoding with TCPs window management mechanism. We work with TCP-Reno, which is a widespread and practical variant of TCP. Our implementation significantly advances the goal of designing a deployable, general, TCP-compatible protocol that provides the benefits of network coding.


IEEE Transactions on Information Forensics and Security | 2011

LDPC Codes for the Gaussian Wiretap Channel

Demijan Klinc; Jeongseok Ha; Steven W. McLaughlin; João Barros; Byung-Jae Kwak

This paper presents a coding scheme for the Gaussian wiretap channel based on low-density parity-check (LDPC) codes. The messages are transmitted over punctured bits to hide data from eavesdroppers. The proposed coding scheme is asymptotically effective in the sense that it yields a bit-error rate (BER) very close to 0.5 for an eavesdropper whose signal-to-noise ratio (SNR) is lower than the threshold SNRE, even if the eavesdropper has the ability to use a bitwise maximum a posteriori (MAP) decoder. Such codes also achieve high reliability for the friendly parties provided they have an SNR above a second threshold SNRB . It is shown how asymptotically optimized LDPC codes are designed with differential evolution where the goal is to achieve high reliability between friendly parties while keeping the security gap SNRB/SNRE as small as possible to protect against passive eavesdroppers. The proposed coding scheme is encodable in linear time, applicable at finite block lengths, and can be combined with existing cryptographic schemes to deliver improved data security by taking advantage of the stochastic nature of many communication channels.


vehicular networking conference | 2010

Experimental study on the impact of vehicular obstructions in VANETs

Rui Meireles; Mate Boban; Peter Steenkiste; Ozan K. Tonguz; João Barros

Channel models for vehicular networks typically disregard the effect of vehicles as physical obstructions for the wireless signal. We aim to clarify the validity of this simplification by quantifying the impact of obstructions through a series of wireless experiments. Using two cars equipped with Dedicated Short Range Communications (DSRC) hardware designed for vehicular use, we perform experimental measurements in order to collect received signal power and packet delivery ratio information in a multitude of relevant scenarios: parking lot, highway, suburban and urban canyon. Upon separating the data into line of sight (LOS) and non-line of sight (NLOS) categories, our results show that obstructing vehicles cause significant impact on the channel quality. A single obstacle can cause a drop of over 20 dB in received signal strength when two cars communicate at a distance of 10 m. At longer distances, NLOS conditions affect the usable communication range, effectively halving the distance at which communication can be achieved with 90% chance of success. The presented results motivate the inclusion of vehicles in the radio propagation models used for VANET simulation in order to increase the level of realism.


IEEE Transactions on Information Forensics and Security | 2012

Secure Communication in Stochastic Wireless Networks—Part I: Connectivity

Pedro C. Pinto; João Barros; Moe Z. Win

The ability to exchange secret information is critical to many commercial, governmental, and military networks. Information-theoretic security-widely accepted as the strictest notion of security-relies on channel coding techniques that exploit the inherent randomness of the propagation channels to strengthen the security of digital communications systems. Motivated by recent developments in the field, we aim to characterize the fundamental secrecy limits of wireless networks. The paper is comprised of two separate parts. In Part I, we define the intrinsically secure communications graph (iS-graph), a random graph which describes the connections that can be securely established over a large-scale network. We provide conclusive results for the local connectivity of the Poisson iS-graph, in terms of node degrees and isolation probabilities. We show how the secure connectivity of the network varies with the wireless propagation effects, the secrecy rate threshold of each link, and the noise powers of legitimate nodes and eavesdroppers. We then propose sectorized transmission and eavesdropper neutralization as viable strategies for improving the secure connectivity. Our results help clarify how the spatial density of eavesdroppers can compromise the intrinsic security of wireless networks. In Part II of the paper, we study the achievable secrecy rates and the effect of eavesdropper collusion.


international conference on computer communications | 2009

Effective Delay Control in Online Network Coding

João Barros; Rui A. Costa; Daniele Munaretto; Joerg Widmer

Motivated by streaming applications with stringent delay constraints, we consider the design of online network coding algorithms with timely delivery guarantees. Assuming that the sender is providing the same data to multiple receivers over independent packet erasure channels, we focus on the case of perfect feedback and heterogeneous erasure probabilities. Based on a general analytical framework for evaluating the decoding delay, we show that existing ARQ schemes fail to ensure that receivers with weak channels are able to recover from packet losses within reasonable time. To overcome this problem, we re-define the encoding rules in order to break the chains of linear combinations that cannot be decoded after one of the packets is lost. Our results show that sending uncoded packets at key times ensures that all the receivers are able to meet specific delay requirements with very high probability.

Collaboration


Dive into the João Barros's collaboration.

Top Co-Authors

Avatar

Muriel Médard

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Matthieu R. Bloch

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Steven W. McLaughlin

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Tiago T. V. Vinhoza

Pontifical Catholic University of Rio de Janeiro

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

MinJi Kim

Massachusetts Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge