EURECOM

Displaying 1-40 of 111 results

  • White Papers // Jul 2014

    A Large-Scale Analysis of the Security of Embedded Firmwares

    As embedded systems are more than ever present in society, their security is becoming an increasingly important issue. However, based on the results of many recent analyses of individual firmware images, embedded systems acquired a reputation of being insecure. Despite these facts, the authors still lack a global understanding of...

    Provided By EURECOM

  • White Papers // Apr 2014

    Private and Dynamic Time-Series Data Aggregation With Trust Relaxation

    With the advent of networking applications collecting user data on a massive scale, the privacy of individual users appears to be a major concern. The main challenge is the design of a solution that allows the data analyzer to compute global statistics over the set of individual inputs that are...

    Provided By EURECOM

  • White Papers // Feb 2014

    Toward Black-Box Detection of Logic Flaws in Web Applications

    Web applications play a very important role in many critical areas, including online banking, health care, and personal communication. This, combined with the limited security training of many web developers, makes web applications one of the most common targets for attackers. In the past, researchers have proposed a large number...

    Provided By EURECOM

  • White Papers // Dec 2013

    Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares

    To address the growing concerns about the security of embedded systems, it is important to perform accurate analysis of firmware binaries, even when the source code or the hardware documentation is not available. However, research in this field is hindered by the lack of dedicated tools. For example, dynamic analysis...

    Provided By EURECOM

  • White Papers // Sep 2013

    ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage

    With the continuous and exponential increase of the number of users and the size of their data, data deduplication becomes more and more a necessity for cloud storage providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. The advantages of...

    Provided By EURECOM

  • White Papers // Sep 2013

    Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting

    Fingerprinting 802.11 devices has been proposed to identify devices in order to mitigate IEEE 802.11 weaknesses. However, important limitations prevent any real deployment. On the first hand, fingerprinting has a low accuracy when the devices have similar hardware and software. On the second hand, attackers may forge signatures to impersonate...

    Provided By EURECOM

  • White Papers // Sep 2013

    Towards the Model-Driven Engineering of Security Requirements for Embedded Systems

    This paper discusses why and how security requirements engineering must be adapted to the model-driven approach usually adopted to design and develop embedded systems. In particular, the authors discuss to what extent the elicitation of security requirements and the Y-chart partitioning approach, a central design methodology in embedded systems, can...

    Provided By EURECOM

  • White Papers // Jul 2013

    Elastic SIEM: Elastic Detector Integrated With OSSIM

    Cloud computing adoption is rising fast. Flexibility, pay-per-use and available resources on-demand with the promise of lower ownership costs are a very attractive value proposition. On the other hand, Infrastructure as a Service (IaaS) providers, such as Amazon Web Services (AWS), are being asked for flexible cloud offerings while needing...

    Provided By EURECOM

  • White Papers // Jul 2013

    Secure Alert Tracking in Supply Chain

    Risk management practices, techniques and tools with respect to companies' supply chains have begun to receive more attention recently, as the need to improve supply chain performances has increased in order to keep the balance between financial considerations and those of the customer interests. With the multiplication of intermediate actors,...

    Provided By EURECOM

  • White Papers // Jun 2013

    The Role of Phone Numbers in Understanding Cyber-Crime Schemes

    Internet and telephones are part of everyone's modern life. Unfortunately, several criminal activities also rely on these technologies to reach their victims. While the use and importance of the Internet has been largely studied, previous work overlooked the role that phone numbers can play in understanding online threats. In this...

    Provided By EURECOM

  • White Papers // Jun 2013

    Effective and Efficient Security Policy Engines for Automotive On-Board Networks

    The configuration of security mechanisms in automotive onboard networks makes it necessary to define and deploy adapted security policies. This paper discusses how to design policy engines that implement an effective enforcement in such architectures despite the complexity of the protocol stacks of on-board electronic control units. It also evaluates...

    Provided By EURECOM

  • White Papers // Jun 2013

    Bootstrapping Security Associations in Opportunistic Networks

    Key management in opportunistic networks is a challenging problem that cannot be solved with existing solutions. In this paper, the authors analyze the requirements of key management in the framework of opportunistic networks and content-based forwarding. This key management solution relies on two phases: a first phase where nodes are...

    Provided By EURECOM

  • White Papers // Jun 2013

    QoE-Aware Traffic Management for Mobile Video Delivery

    Video delivery has become a major challenge for mobile networks. The increasing spread of smartphones, along with the expanding availability of LTE coverage, has contributed to an extensively growing mobile video demand, bringing large volumes of video traffic and far exceeding the capacity of mobile networks. As a result, wireless...

    Provided By EURECOM

  • White Papers // Jun 2013

    Degrees of Freedom of Downlink Single-And Multi-Cell Multi-User MIMO Systems With Location Based CSIT

    Multiple antennas facilitate the coexistence of multiple users in wireless communications, leading to spatial multiplexing and spatial division and to significant system capacity increase. However, this comes at the cost of very precise Channel State Information at the Transmitters (CSIT). The authors advocate the use of channel propagation models to...

    Provided By EURECOM

  • White Papers // Jun 2013

    Analysis of Pilot Decontamination Based on Power Control

    A subspace method for channel estimation is proposed for asymmetric antenna array systems. The so-called pilot contamination problem reported in is found to be due to the linearity of channel estimation in. The authors show that it does not occur in cellular systems with power control and power-controlled handoff when...

    Provided By EURECOM

  • White Papers // Jun 2013

    MIMO BC With Imperfect and Delayed Channel State Information at the Transmitter and Receivers

    In the setting of the two-user (M;N) Multiple-Input Multiple-Output (MIMO) Broadcast Channel (BC), recent work by Maddah-Ali and Tse, and Vaze and Varanasi have revealed the usefulness of delayed Channel State Information at the Transmitter (perfect delayed CSIT). The authors' work studies the general case of communicating with imperfect delayed...

    Provided By EURECOM

  • White Papers // Jun 2013

    Implementation and Test of a DSRC Prototype on OpenAirInterface SDR Platform

    This paper presents OpenAirITS, an open-source Software-Defined Radio platform for DSRC (802.11p) technology. They extended the Linux 802.11 subsystem, developed a soft-modem and a dedicated driver for the OpenAirInterface Express-MIMO FPGA board. The low-layer PHY functions of DSRC have not been coded on the chipset, but instead as a soft-modem,...

    Provided By EURECOM

  • White Papers // May 2013

    Space Time Interference Alignment Scheme for the MIMO BC and IC with Delayed Csit and Finite Coherence Time

    Interference is a major limitation in wireless networks and the search for efficient ways of transmitting in this context has been productive and diversified. Numerous techniques allow the increase of the multiplexing gain. However, most techniques, even promising linear solutions rely on perfect current CSIT which is not realistic. Though...

    Provided By EURECOM

  • White Papers // May 2013

    Reference Monitors for Security and Interoperability in OAuth 2.0

    OAuth 2.0 is a recent IETF standard devoted to providing authorization to clients requiring access to specific resources over HTTP. It was recently adopted by major internet players like Google, Facebook, and Microsoft. It has been pointed out that this framework is potentially subject to security issues, as well as...

    Provided By EURECOM

  • White Papers // May 2013

    Evolving Security Requirements in Multi-Layered Service-Oriented-Architectures

    Due to today's rapidly changing corporate environments, business processes are increasingly subject to dynamic configuration and evolution. The evolution of new deployment architectures, as illustrated by the move towards mobile platforms and the Internet of services, and the introduction of new security regulations (imposed by national and international regulatory bodies,...

    Provided By EURECOM

  • White Papers // Apr 2013

    Power Monitor V2: Novel PowEr Saving Android Application

    This paper presents a novel scheme to derive power saving profiles based on the usage patterns of the Android devices. The entire architecture is developed as an Android app "Power Monitor v2" and is deployed to the smart devices. A monitoring module of the app periodically collects several data from...

    Provided By EURECOM

  • White Papers // Apr 2013

    Broadcasting User Content Over Novel Mobile Networks

    In the "Youtube Era", mobile consumption of video, such as Video on Demand (VoD) and User Generated Content (UGC), has been steadily increasing. However, mobile networks are showing to be unprepared for such phenomenal traffic volume, whereas the devices' multiple interfaces are being exploited to address this problem. As such,...

    Provided By EURECOM

  • White Papers // Mar 2013

    An Architecture to Aggregate Heterogeneous and Semantic Sensed Data

    Sensor networks are used in a great deal of realms such as home monitoring, environmental monitoring (e.g., weather forecasting), health monitoring (e.g., pacemaker, brain waves), vehicular networks, etc. The authors are surrounding by sensor networks such as healthcare, home or environmental monitoring, weather forecasting, etc. All sensor-based applications proposed are...

    Provided By EURECOM

  • White Papers // Mar 2013

    The DoF of Network MIMO With Backhaul Delays

    The authors consider the problem of downlink precoding for Network (multi-cell) MIMO networks where Transmitters (TXs) are provided with imperfect Channel State Information (CSI). Specifically, each TX receives a delayed channel estimate with the delay being specific to each channel component. This model is particularly adapted to the scenarios where...

    Provided By EURECOM

  • White Papers // Mar 2013

    A P2P Based Usage Control Enforcement Scheme Resilient to Re-injection Attacks

    Existing privacy controls based on access control techniques do not prevent massive dissemination of private data by malevolent acquaintances of social network, unauthorized duplication of files or personal messages, or persistence of some files in third-party operated storage beyond their deletion by their owners. The authors suggest a usage control...

    Provided By EURECOM

  • White Papers // Feb 2013

    On the Value of Spectrum Sharing Among Operators in Multicell Networks

    This paper considers the benefits of allowing spectrum sharing among co-located wireless service providers operating in the same multi-cell network. Although spectrum sharing was shown to be valuable in some scenarios where the created interference can be eliminated, the benefits have not clearly shown for multi-cell networks with aggressive reuse....

    Provided By EURECOM

  • White Papers // Feb 2013

    Optimal Combining of Instantaneous and Statistical CSI in the SIMO Interference Channel

    The uplink of the two-user multiple-antenna interference channel is considered and the optimal (in the ergodic rate sense) BeamForming (BF) problem is posed and solved. Specifically, a feedback scenario is studied whereby a Base Station (BS) is allowed to estimate the instantaneous channel vector information from the users it serves,...

    Provided By EURECOM

  • White Papers // Feb 2013

    Decontaminating Pilots in Massive MIMO Systems

    Pilot contamination is known to severely limit the performance of large-scale antenna ("Massive MIMO") systems due to degraded channel estimation. This paper proposes a twofold approach to this problem. First, the authors show analytically that pilot contamination can be made to vanish asymptotically in the number of antennas for a...

    Provided By EURECOM

  • White Papers // Jan 2013

    T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags

    One prominent application of RFID technology is the automation of safety inspections when transporting hazardous goods such as highly reactive chemicals in supply chains. Here, it is dangerous to place specific, reactive chemicals close to each other, because small leaks can already result in a threat to the life of...

    Provided By EURECOM

  • White Papers // Jan 2013

    Secure Product Tracking in Supply Chain

    In this paper, the authors propose a secure and efficient product tracking mechanism implemented using wireless sensor nodes. This mechanism aims at tracking goods, and actions performed by each actor of the supply chain, while preserving the actors' privacy. Their solution is based on generating identifiers of the actors and...

    Provided By EURECOM

  • White Papers // Dec 2012

    Behind the Scenes of Online Attacks: An Analysis of Exploitation Behaviors on the Web

    Web attacks are nowadays one of the major threats on the Internet, and several studies have analyzed them, providing details on how they are performed and how they spread. However, no study seems to have sufficiently analyzed the typical behavior of an attacker after a website has been compromised. This...

    Provided By EURECOM

  • White Papers // Nov 2012

    A General Scalable and Accurate Decentralized Level Monitoring Method for Large-Scale Dynamic Service Provision in Hybrid Clouds

    Hybrid cloud computing combines private clouds with geographically-distributed resources from public clouds, desktop grids or in-house gateways to provide the most flexibility of each kind of cloud platforms. Service provisioning for wide-area applications such as cloud backup or cloud network games is sensitive to wide-area network metric such as round...

    Provided By EURECOM

  • White Papers // Nov 2012

    On the Resilience of the Dependability Framework to the Intrusion of New Security Threats

    Initially thought of with a strong emphasis on accidental faults, it has paid more attention over the years to intentional ones and, thus, to classical security concepts as well. Recently, a couple of incidents have received a lot of attention: the Hydraq and Stuxnet worms outbreaks. They have been used...

    Provided By EURECOM

  • White Papers // Nov 2012

    HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems

    Expressing security policies to govern distributed systems is a complex and error-prone task. Policies are hard to understand, often expressed with unfriendly syntax, making it difficult for security administrators and for business analysts to create intelligible specifications. The authors introduce the Hierarchical Policy Language for Distributed Systems (HiPoLDS), which has...

    Provided By EURECOM

  • White Papers // Sep 2012

    Computing the Nash Equilibria of Intruder Classification Games

    The authors investigate the problem of classifying an intruder of two different types (spy or spammer). The classification is based on the number of file server and mail server attacks a network defender observes during a fixed window. The spammer naively attacks (with a known distribution) his main target: the...

    Provided By EURECOM

  • White Papers // Sep 2012

    Towards Assisted Remediation of Security Vulnerabilities

    Security vulnerabilities are still prevalent in systems despite the existence of their countermeasures for several decades. In order to detect the security vulnerabilities missed by developers, complex solutions are undertaken like static analysis, often after the development phase and with a loss of context. Although vulnerabilities are found, there is...

    Provided By EURECOM

  • White Papers // Sep 2012

    Catch the Jammer in Wireless Sensor Network

    Jamming attacks can severely affect the performance of Wireless Sensor Networks (WSNs) due to their broadcast nature. The most reliable solution to reduce the impact of such attacks is to detect and localize the source of the attack. In this paper, the authors investigate the feasibility of localizing an omni-antenna...

    Provided By EURECOM

  • White Papers // Sep 2012

    Data Transfer Scheduling for P2P Storage

    In peer-to-peer storage and backup applications, large amounts of data have to be transferred between nodes. In general, recipient of data transfers are not chosen randomly from the whole set of nodes in the peer-to-peer networks, but they are chosen according to peer selection rules imposing several criteria, such as...

    Provided By EURECOM

  • White Papers // Jul 2012

    A Measurement Study of the Wuala On-line Storage Service

    Wuala is a popular online backup and file sharing system that has been successfully operated for several years. Very little is known about the design and implementation of Wuala. The authors capture the network traffic exchanged between the machines participating in Wuala to reverse engineer the design and operation of...

    Provided By EURECOM

  • White Papers // Jun 2012

    Enabling Message Security for RESTful Services

    The security and dependability of cloud applications require strong confidence in the communication protocol used to access web resources. The mainstream service providers nowadays are shifting to REST-based services in the detriment of SOAP-based ones. REST proposes a lightweight approach to consume resources with no specific encapsulation, thus lacking of...

    Provided By EURECOM

  • White Papers // Feb 2012

    Spectrum Sensing for Cognitive Radio Exploiting Spectrum Discontinuities Detection

    This paper presents a spectrum sensing algorithm for wideband cognitive radio exploiting sensed spectrum discontinuity properties. Some work has already been investigated by wavelet approach by Giannakis et al, but in this paper the authors investigate an algebraic framework in order to model spectrum discontinuities. The information derived at the...

    Provided By EURECOM

  • White Papers // Feb 2012

    Game Theory-Based Resource Management Strategy for Cognitive Radio Networks

    This paper investigates the application of game theory tools in the context of Cognitive Radio Networks (CRN). Specifically, the authors propose a resource management strategy with the objective to maximize a defined utility function subject to minimize the mutual interference caused by Secondary Users (SUs) with protection for Primary Users...

    Provided By EURECOM

  • White Papers // Mar 2012

    Large System Analysis of Zero-Forcing Precoding in MISO Broadcast Channels With Limited Feedback

    In this paper, the authors analyze the sum rate of Zero-Forcing (ZF) precoding in MISO broadcast channels with limited feedback, transmit correlation and path loss. Their analysis assumes that the number of transmit antennas M and the number of users K are large, while their ratio remains bounded. By applying...

    Provided By EURECOM

  • White Papers // Feb 2011

    Deterministic Equivalent for the SINR of Regularized Zero-Forcing Precoding in Correlated MISO Broadcast Channels With Imperfect CSIT

    This paper considers the MISO broadcast channel with different spatial correlations of the user vector channels. The base station implements Regularized Zero-Forcing (RZF) precoding based on an imperfect channel estimation. The authors derive a deterministic equivalent of the Signal-to-Interference plus Noise Ratio (SINR) by applying novel results from the field...

    Provided By EURECOM

  • White Papers // Jan 2011

    Asymptotic Analysis of Regularized Zero-Forcing Precoding in MISO Broadcast Channels With Limited Feedback

    In this paper, the authors analyze the asymptotic sum-rate of Regularized Zero-Forcing (RZF) precoding in MISO broadcast channels with limited feedback, transmit correlation and path-loss. Their analysis assumes that the ratio of the number of transmit antennas M to the number of users K is bounded as (K;M) grow large....

    Provided By EURECOM

  • White Papers // Jan 2012

    Sparse Precoding in Multicell MIMO Systems

    In this paper, the authors consider the joint precoding across K distant Transmitters (TXs) towards K single-antenna Receivers (RXs) and they let the TXs have access to perfect Channel State Information (CSI). Instead of considering the conventional method of clustering to allocate the user's data symbols, they focus on determining...

    Provided By EURECOM

  • White Papers // Jan 2012

    3D Face Recognition: A Robust Multi-Matcher Approach to Data Degradations

    Over the past decades, 3D face has emerged as a solution to face recognition due to its reputed invariance to lighting conditions and pose. While proposed approaches have proven their efficiency over renowned databases as FRGC, less effort was spent on studying the robustness of algorithms to quality degradations. In...

    Provided By EURECOM

  • White Papers // Jan 2012

    Outage Performance of Double Stratospheric Platforms Diversity Systems

    High Altitude Platform Networks (HAPNs) comprise an emerging communication solution promising to exploit many of the best aspects of terrestrial and satellite-based systems. Nevertheless, while offering advantageous propagation characteristics, HAP networks are still subject to large fades due to atmospheric precipitation and especially due to rain, for the allocated high...

    Provided By EURECOM

  • White Papers // Jan 2012

    Distributed Troubleshooting of Web Sessions Using Clustering

    Web browsing is a very common way of using the Internet to, among others, read news, do on-line shopping, or search for user generated content such as YouTube or Dailymotion. Traditional evaluations of web surfing focus on objectively measured Quality of Service (QoS) metrics such as loss rate or round-trip...

    Provided By EURECOM

  • White Papers // Feb 2012

    A Practical Precoding Scheme for Multicell MIMO Channels With Partial User's Data Sharing

    In this paper, the authors consider a setting where K Transmitters (TXs) equipped with multiple antennas aim at transmitting to their K respective Receivers (RXs) also equipped with multiple antennas. Without exchange of the user's data symbols, this represents a conventional Interference Channel (IC), while it is a so-called MIMO...

    Provided By EURECOM

  • White Papers // Feb 2012

    Link Abstraction for Multi-User MIMO in LTE Using Interference-Aware Receiver

    Most of the recent wireless communication systems are interference limited rather than noise limited. In the case of a very strong interferer the conventional assumption of the interference as Gaussian is extremely suboptimal. However, optimal (capacity achieving) receivers utilize some prior knowledge about the interference to reach optimality. The link...

    Provided By EURECOM

  • White Papers // Jan 2012

    Interference Relay Channel in 4G Wireless Networks

    In the next generation cellular systems, such as LTE-A (Release 10 and beyond), Relay Node (RN) deployment has been adopted due to its potentials in enlarging coverage and increasing system throughput, even with primitive relaying functionalities. For example, in LTE-A Release 10 only Type-I (non-transparent) RNs are considered wherein no...

    Provided By EURECOM

  • White Papers // Jan 2012

    Moving Face Spoofing Detection Via 3D Projective Invariants

    Face recognition provides many advantages compared with other available biometrics, but it is particularly subject to spoofing. The most accurate methods in literature addressing this problem, rely on the estimation of the three-dimensionality of faces, which heavily increase the whole cost of the system. This paper proposes an effective and...

    Provided By EURECOM

  • White Papers // Jan 2012

    Retrospective Interference Alignment for Interference Channels With Delayed Feedback

    The capacity of the most recent network architectures, such as femtocells, is severely limited by interference. This has spurred an intense research on the M-user interference channel, in which M transmitter/receiver pairs interfere with each other. Very striking recent results, though, disproved it by showing that the degrees of freedom...

    Provided By EURECOM

  • White Papers // Mar 2012

    On the Vulnerability of Automatic Speaker Recognition to Spoofing Attacks With Artificial Signals

    Automatic Speaker Verification (ASV) systems are increasingly being used for biometric authentication even if their vulnerability to imposture or spoofing is now widely acknowledged. Recent work has proposed different spoofing approaches which can be used to test vulnerabilities. This paper introduces a new approach based on artificial, tone-like signals which...

    Provided By EURECOM

  • White Papers // Feb 2012

    Regional Confidence Score Assessment for 3D Face

    3D shape data for face recognition is advantageous to its 2D counterpart for being invariant to illumination and pose. However, expression variations and occlusions still remain as major challenges since the shape distortions hinder accurate matching. Numerous algorithms developed to overcome this problem mainly propose region-based approaches, where similarity scores...

    Provided By EURECOM

  • White Papers // Jan 2012

    Redundancy Management for P2P Backup

    The authors propose a redundancy management mechanism for peer-to-peer backup applications. Since, in a backup system, data is read over the network only during restore processes caused by data loss, redundancy management targets data durability rather than attempting to make each piece of information available at any time. Each peer...

    Provided By EURECOM

  • White Papers // Oct 2010

    Comparison Between Viterbi Detectors for Magnetic Recording Channels, Based on Regressive and Autoregressive Noise Models

    A recent work presents a regressive noise model for the data-dependent correlated noise, at the output of a magnetic recording channel detector. This paper generalizes this channel model, considering digital equalization and a more efficient correlation matrix, in order to make a comparison with the usual detector in a more...

    Provided By EURECOM

  • White Papers // Jan 2011

    Spatial Transmit Prefiltering for Frequency-Flat MIMO Transmission With Mean and Covariance Information

    In this paper techniques are proposed for combining information about the mean and the covariance of the channel for the purpose of MIMO transmission. (Partial) Channel State Information at the Transmitter (CSIT) is typically used in MIMO systems for the design of spatial prefiltering and waterfilling. For the purpose of...

    Provided By EURECOM

  • White Papers // May 2010

    Scheduling and CAC in IEEE 802.16 Fixed BWNs: A Comprehensive Survey and Taxonomy

    IEEE 802.16 technology has emerged as a competitive alternative to wireline broadband access solution. IEEE 802.16 can provide Quality of Service (QoS) guarantees for heterogeneous classes of traffic with different QoS requirements. The standard, however, leaves open the resource management and scheduling issues, which are crucial components to guarantee QoS...

    Provided By EURECOM

  • White Papers // Feb 2011

    The Multiplexing Gain of a Two-Cell MIMO Channel With Unequal CSI

    In this paper, the joint precoding across two distant transmitters (TXs) to two receivers (RXs), each equipped with one antenna is discussed. The authors consider a distributed Channel State Information (CSI) configuration where each TX has a separate local estimate of the channel. The authors assume that no communication is...

    Provided By EURECOM

  • White Papers // Nov 2010

    Beamforming on the MISO Interference Channel With Multi-User Decoding Capability

    This paper considers the Multiple-Input-Single-Output Interference Channel (MISO-IC) in which transmitters and receivers share the same time and frequency resources. The authors consider receivers with Interference Decoding Capability (IDC) so that the interference signal can be decoded and subtracted from the received signal. On the MISO-IC with single user decoding,...

    Provided By EURECOM

  • White Papers // Nov 2010

    Low-Complexity Multiple-Relay Strategies for Improving Uplink Coverage in 4G Wireless Networks

    In this paper the authors present low-complexity coded-modulation strategies for distributed relaying in 4G wireless networks. The primary goal of these strategies is to improve coverage on the uplink while retaining high spectral efficiency through multiuser spatial-multiplexing using two or more relays between the users and the base station. They...

    Provided By EURECOM

  • White Papers // Jan 2010

    Balancing Egoism and Altruism on Interference Channel: The MIMO Case

    This paper considers the so-called Multiple-Input-Multiple-Output interference channel (MIMO-IC) which has relevance in applications such as multi-cell coordination in cellular networks as well as spectrum sharing in cognitive radio networks among others. The authors address the design of precoding (i.e. beamforming) vectors at each sender with the aim of striking...

    Provided By EURECOM

  • White Papers // Aug 2011

    The Multiplexing Gain of the Network MIMO Channel With Distributed CSI

    In this paper, the authors discuss the joint precoding across K transmitters (TXs), sharing the knowledge of the data symbols to be transmitted toward K single-antenna receivers (RXs). They introduce a Distributed Channel State Information (DCSI) configuration where each TX has its own local estimate of the overall multiuser MIMO...

    Provided By EURECOM

  • White Papers // Nov 2011

    High Throughput and Low Power Enhancements for LDPC Decoders

    Modern VLSI decoders for Low-Density ParityCheck (LDPC) codes require high throughput performance while achieving high energy efficiency on the smallest possible footprint. In this paper, the authors present two optimizations to enhance the throughput and reduce the power consumption for these decoders. As a first optimization, they seek to speedup...

    Provided By EURECOM

  • White Papers // May 2011

    Interference-Aware Receiver Structure for Multi-User MIMO and LTE

    In this paper, the authors propose a novel low-complexity interference-aware receiver structure for multi-user MIMO which is based on the exploitation of the structure of residual interference. They show that multi-user MIMO can deliver its promised gains in modern wireless systems in spite of the limited CSIT only if users...

    Provided By EURECOM

  • White Papers // Dec 2011

    CHECKER: On-Site Checking in RFID-Based Supply Chains

    Counterfeit detection in RFID-based supply chains aims at preventing adversaries from injecting fake products that do not meet quality standards. This paper introduces CHECKER, a new protocol for counterfeit detection in RFID-based supply chains through on-site checking. While RFID-equipped products travel through the supply chain, RFID readers can verify product...

    Provided By EURECOM

  • White Papers // Dec 2010

    Hardware Optimized Sample Rate Conversion for Software Defined Radio

    The evolution towards applications with increasing functionalities leads to the need of high flexible systems that support a high number of different standards while decreasing the required hardware space. Therefore, a high configurable platform being able to handle a multitude of standards is needed. One main issue is the tradeoff...

    Provided By EURECOM

  • White Papers // Sep 2010

    A Scalable Interest-Oriented Peer-to-Peer Pub/Sub Network

    There has been a big challenge in structured peer-to-peer overlay network research area. Generally, a structured overlay network involves nodes evenly or based on their resource availabilities, and gathers nodes' resources to achieve some bigger tasks. The challenge here is to gather resources based on nodes' interests, and only interested...

    Provided By EURECOM

  • White Papers // Nov 2010

    Bag of Soft Biometrics for Person Identification New Trends and Challenges

    In this paper, the authors seek to provide insight on the general topic of soft biometrics. They firstly present a new refined definition of soft biometrics, emphasizing on the aspect of human compliance, and then proceed to identify candidate traits that accept this novel definition. They, then address relations between...

    Provided By EURECOM

  • White Papers // May 2010

    Relative Channel Reciprocity Calibration in MIMO/TDD Systems

    Channel State Information at the Transmitter (CSIT) can greatly improve the capacity of a wireless MIMO communication system. In a Time Division Duplex (TDD) system CSIT can be obtained by exploiting the reciprocity of the wireless channel. This however requires calibration of the Radio Frequency (RF) chains of the receiver...

    Provided By EURECOM

  • White Papers // Sep 2009

    Optimal Linear Precoder for Multiuser MIMO for Discrete Alphabets

    In this paper, the authors study the effect of discrete constellation alphabets on linear pre-coding for the downlink of Multi-User (MU) MIMO. They underline the fundamental difference in the approach of pre-coding if the alphabets are assumed to be discrete constellations rather than the idealized Gaussian assumption. They derive the...

    Provided By EURECOM

  • White Papers // Jun 2010

    Making Multiuser MIMO Work for LTE

    Underlining the viability of Multi-User (MU) MIMO for future wireless communications as Long Term Evolution (LTE), the authors propose in this paper a pre-coding strategy based on the low resolution LTE pre-coders which necessitates 2 bits feedback from the User Equipment (UE). The proposed strategy encompasses geometrical interference alignment at...

    Provided By EURECOM

  • White Papers // Feb 2011

    Mixed CSIT DL Channel: Gains with Interference Aware Receivers

    The Broadcast Channels (BC), a single transmitter transmitting data to multiple receivers, has been widely studied in literature mostly with and sometimes without the availability of Channel State Information at the Transmitter (CSIT). The authors study a very practical version of the BC where the transmitter has CSIT of some...

    Provided By EURECOM

  • White Papers // Feb 2011

    Interference Sensitivity for Multi-User MIMO in LTE

    A recent idea of exploiting the promised gains of multi-user MIMO for future cellular standards as LTE by intelligent interference aware receivers instead of suboptimal single-user receivers is quite promising. However this detection strategy is based on the exploitation of the structure of interference which necessitates the knowledge of the...

    Provided By EURECOM

  • White Papers // Apr 2011

    Performance of LTE in Rural Areas - Benefits of Opportunistic Multi-User MIMO

    This paper focuses on the performance of LTE in rural areas which is based on a channel measurement campaign conducted with the Eurecom OpenAirInterface LTE testbed at 800MHz. This testbed is based on LTE release 8 PHY layer and implements transmission modes 1 (single antenna - SISO), 2 (transmit diversity),...

    Provided By EURECOM

  • White Papers // May 2012

    On Enhancing Inter-User Spatial Separation for Downlink Multiuser MIMO Systems

    In practical downlink multiuser MIMO channels, users' channels are non-orthogonal, which results in inter-user interference and in turn degrades system performance. In this paper, a new subspace-domain linear transmit preprocessing technique is proposed in enhancing users' spatial separation and suppressing inter-user interference. The authors show by simulations that sum rate...

    Provided By EURECOM

  • White Papers // May 2012

    CSI Feedback Allocation in Multicell MIMO Channels

    In this paper, the authors consider the joint pre-coding across K Transmitters (TXs), sharing the knowledge of the user's data symbols being transmitted to K single-antenna Receivers (RXs). They consider a Distributed Channel State Information (DCSI) configuration where each TX has its own local estimate of the overall multiuser MIMO...

    Provided By EURECOM

  • White Papers // Dec 2012

    Behind the Scenes of Online Attacks: An Analysis of Exploitation Behaviors on the Web

    Web attacks are nowadays one of the major threats on the Internet, and several studies have analyzed them, providing details on how they are performed and how they spread. However, no study seems to have sufficiently analyzed the typical behavior of an attacker after a website has been compromised. This...

    Provided By EURECOM