Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Narayan B. Mandayam is active.

Publication


Featured researches published by Narayan B. Mandayam.


IEEE Transactions on Communications | 2002

Efficient power control via pricing in wireless data networks

Cem U. Saraydar; Narayan B. Mandayam; David J. Goodman

A major challenge in the operation of wireless communications systems is the efficient use of radio resources. One important component of radio resource management is power control, which has been studied extensively in the context of voice communications. With the increasing demand for wireless data services, it is necessary to establish power control algorithms for information sources other than voice. We present a power control solution for wireless data in the analytical setting of a game theoretic framework. In this context, the quality of service (QoS) a wireless terminal receives is referred to as the utility and distributed power control is a noncooperative power control game where users maximize their utility. The outcome of the game results in a Nash (1951) equilibrium that is inefficient. We introduce pricing of transmit powers in order to obtain Pareto improvement of the noncooperative power control game, i.e., to obtain improvements in user utilities relative to the case with no pricing. Specifically, we consider a pricing function that is a linear function of the transmit power. The simplicity of the pricing function allows a distributed implementation where the price can be broadcast by the base station to all the terminals. We see that pricing is especially helpful in a heavily loaded system.


acm/ieee international conference on mobile computing and networking | 2008

Radio-telepathy: extracting a secret key from an unauthenticated wireless channel

Suhas Mathur; Wade Trappe; Narayan B. Mandayam; Chunxuan Ye; Alex Reznik

Securing communications requires the establishment of cryptographic keys, which is challenging in mobile scenarios where a key management infrastructure is not always present. In this paper, we present a protocol that allows two users to establish a common cryptographic key by exploiting special properties of the wireless channel: the underlying channel response between any two parties is unique and decorrelates rapidly in space. The established key can then be used to support security services (such as encryption) between two users. Our algorithm uses level-crossings and quantization to extract bits from correlated stochastic processes. The resulting protocol resists cryptanalysis by an eavesdropping adversary and a spoofing attack by an active adversary without requiring an authenticated channel, as is typically assumed in prior information-theoretic key establishment schemes. We evaluate our algorithm through theoretical and numerical studies, and provide validation through two complementary experimental studies. First, we use an 802.11 development platform with customized logic that extracts raw channel impulse response data from the preamble of a format-compliant 802.11a packet. We show that it is possible to practically achieve key establishment rates of ~ 1 bit/sec in a real, indoor wireless environment. To illustrate the generality of our method, we show that our approach is equally applicable to per-packet coarse signal strength measurements using off-the-shelf 802.11 hardware.


IEEE Journal on Selected Areas in Communications | 2001

Pricing and power control in a multicell wireless data network

Cem U. Saraydar; Narayan B. Mandayam; David J. Goodman

We consider distributed power control in a multicell wireless data system and study the effect of pricing transmit power. Drawing on the earlier work of Goodman and Mandayam (see IEEE Personal Commun. Mag., vol.7, p.48-54, 2000), we formulate the QoS of a data user via a utility function measured in bits per Joule. We consider distributed power control, modeled as a noncooperative game, where users maximize their utilities in a multicell system. Base station assignment based on received signal strength as well as received signal-to-interference ratio (SIR) are considered jointly with power control. Our results indicate that for both assignment schemes, such a procedure results in an inefficient operating point (Nash equilibrium) for the entire system. We introduce pricing of transmit power as a mechanism for influencing data user behavior and our results show that the distributed power control based on maximizing the net utility (utility minus the price) results in improving the Pareto efficiency of the resulting operating point. Variations of pricing based on global and local loading in cells are considered as a means of improving the efficiency of wireless data networks. Finally, we discuss the improvement in utilities through a centralized scheme where each base station (BS) calculates the best SIR to be targeted by the terminals it is assigned.


First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005. | 2005

Demand responsive pricing and competitive spectrum allocation via a spectrum server

Omer Ileri; Dragan Samardzija; Narayan B. Mandayam

In this paper we develop a framework for competition of future operators likely to operate in a mixed commons/property-rights regime under the regulation of a spectrum policy server (SPS). The operators dynamically compete for customers as well as portions of available spectrum. The operators are charged by the SPS for the amount of bandwidth they use in their services. Through demand responsive pricing, the operators try to come up with convincing service offers for the customers, while trying to maximize their profits. We first consider a single-user system as an illustrative example. We formulate the competition between the operators as a non-cooperative game and propose an SPS-based iterative bidding scheme that results in a Nash equilibrium of the game. Numerical results suggest that, competition increases the users (customers) acceptance probability of the offered service, while reducing the profits achieved by the operators. It is also observed that as the cost of unit bandwidth increases relative to the cost of unit infrastructure (fixed cost), the operator with superior technology (higher fixed cost) becomes more competitive. We then extend the framework to a multiuser setting where the operators are competing for a number of users at once. We propose an SPS-based bandwidth allocation scheme in which the SPS optimally allocates bandwidth portions for each user-operator session to maximize its overall expected revenue resulting from the operator payments. Comparison of the performance of this scheme to one in which the bandwidth is equally shared between the user-operator pairs reveals that such an SPS-based scheme improves the user acceptance probabilities and the bandwidth utilization in multiuser systems


IEEE Transactions on Information Forensics and Security | 2010

Information-Theoretically Secret Key Generation for Fading Wireless Channels

Chunxuan Ye; Suhas Mathur; Alex Reznik; Yogendra C. Shah; Wade Trappe; Narayan B. Mandayam

The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, and uniquely shared by a given transmitter-receiver pair. The complexity associated with a richly scattering environment implies that the short-term fading process is inherently hard to predict and best modeled stochastically, with rapid decorrelation properties in space, time, and frequency. In this paper, we demonstrate how the channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities. We begin by presenting a scheme based on level crossings of the fading process, which is well-suited for the Rayleigh and Rician fading models associated with a richly scattering environment. Our level crossing algorithm is simple, and incorporates a self-authenticating mechanism to prevent adversarial manipulation of message exchanges during the protocol. Since the level crossing algorithm is best suited for fading processes that exhibit symmetry in their underlying distribution, we present a second and more powerful approach that is suited for more general channel state distributions. This second approach is motivated by observations from quantizing jointly Gaussian processes, but exploits empirical measurements to set quantization boundaries and a heuristic log likelihood ratio estimate to achieve an improved secret key generation rate. We validate both proposed protocols through experimentations using a customized 802.11a platform, and show for the typical WiFi channel that reliable secret key establishment can be accomplished at rates on the order of 10 b/s.


vehicular technology conference | 1997

INFOSTATIONS: a new system model for data and messaging services

David J. Goodman; J. Borras; Narayan B. Mandayam; Roy D. Yates

We analyze a new wireless system concept called Infostations, that can provide isolated pockets of high bandwidth connectivity for future data and messaging services. The intermittent connectivity available to mobile terminals using a network of Infostations raises new issues in protocol design at several layers. This paper describes the challenges of Infostation protocol design. It also presents a mathematical analysis of Infostation information transfer focusing on the optimum combination of transmission rate and coverage area.


vehicular technology conference | 1998

Decision theoretic framework for NLOS identification

J. Borras; P. Hatrack; Narayan B. Mandayam

This paper presents the problem of identifying whether a received signal at a base station is due to a line-of-sight (LOS) transmission or not (NLOS). This is a first step towards estimating the mobile stations location. We formulate the NLOS identification problem as a binary hypothesis test where the range measurements are modeled as being corrupted by additive noise, with different probability distributions depending on the hypothesis. We solve the binary hypothesis test under several assumptions, proposing appropriate decision criteria.


IEEE Transactions on Wireless Communications | 2008

Using the physical layer for wireless authentication in time-variant channels

Liang Xiao; Larry J. Greenstein; Narayan B. Mandayam; Wade Trappe

The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to exploit the spatial variability of the radio channel response in a rich scattering environment, as is typical of indoor environments. Specifically, we describe a physical-layer authentication algorithm that utilizes channel probing and hypothesis testing to determine whether current and prior communication attempts are made by the same transmit terminal. In this way, legitimate users can be reliably authenticated and false users can be reliably detected. We analyze the ability of a receiver to discriminate between transmitters (users) according to their channel frequency responses. This work is based on a generalized channel response with both spatial and temporal variability, and considers correlations among the time, frequency and spatial domains. Simulation results, using the ray-tracing tool WiSE to generate the time-averaged response, verify the efficacy of the approach under realistic channel conditions, as well as its capability to work under unknown channel variations.


personal indoor and mobile radio communications | 1998

Power control for wireless data based on utility and pricing

V. Shah; Narayan B. Mandayam; David J. Goodman

We develop a framework for power control for wireless data services based on economic concepts of utility and pricing. Our approach is based on a model for the level of satisfaction (utility) a wireless data user derives from using the system. Using this model, we present a distributed power control scheme that maximizes the utility of each user. Formulating this algorithm as a non-cooperative game, we show conditions for the feasibility of such power control as well as the existence and uniqueness of the Nash equilibrium achieved by the non-cooperative game. However, the resulting equilibrium is shown to be Pareto inefficient. A detailed analysis of this equilibrium provides motivation for introducing pricing in the system. A distributed power control scheme is then proposed where users maximize the difference in their utility and price. It is shown by way of simulation that by introducing pricing in the power control algorithm, there is a Pareto improvement in terms of the utilities that the users obtain. Numerical results are presented for the special case of a code division multiple access (CDMA) system for PCS (personal communication services) band.


international conference on communications | 2007

Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication

Liang Xiao; Larry J. Greenstein; Narayan B. Mandayam; Wade Trappe

The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to exploit the fact that, in a typically rich scattering environment, the radio channel response decorrelates quite rapidly in space. Specifically, we describe a physical-layer algorithm that combines channel probing (M complex frequency response samples over a bandwidth W) with hypothesis testing to determine whether current and prior communication attempts are made by the same user (same channel response). In this way, legitimate users can be reliably authenticated and false users can be reliably detected. To evaluate the feasibility of our algorithm, we simulate spatially variable channel responses in real environments using the WiSE ray-tracing tool; and we analyze the ability of a receiver to discriminate between transmitters (users) based on their channel frequency responses in a given office environment. For several rooms in the extremities of the building we considered, we have confirmed the efficacy of our approach under static channel conditions. For example, measuring five frequency response samples over a bandwidth of 100 MHz and using a transmit power of 100 mW, valid users can be verified with 99% confidence while rejecting false users with greater than 95% confidence.

Collaboration


Dive into the Narayan B. Mandayam's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge