Information Theory for Data Communications and Processing


Book Description

Modern, current, and future communications/processing aspects motivate basic information-theoretic research for a wide variety of systems for which we do not have the ultimate theoretical solutions (for example, a variety of problems in network information theory as the broadcast/interference and relay channels, which mostly remain unsolved in terms of determining capacity regions and the like). Technologies such as 5/6G cellular communications, Internet of Things (IoT), and mobile edge networks, among others, not only require reliable rates of information measured by the relevant capacity and capacity regions, but are also subject to issues such as latency vs. reliability, availability of system state information, priority of information, secrecy demands, energy consumption per mobile equipment, sharing of communications resources (time/frequency/space), etc. This book, composed of a collection of papers that have appeared in the Special Issue of the Entropy journal dedicated to “Information Theory for Data Communications and Processing”, reflects, in its eleven chapters, novel contributions based on the firm basic grounds of information theory. The book chapters address timely theoretical and practical aspects that constitute both interesting and relevant theoretical contributions, as well as direct implications for modern current and future communications systems.




Perfect Secrecy in IoT


Book Description

Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious third party cannot guess anything regarding the plain text or the key, even in the case of full access to the cipher text. Despite this advantage, there are only a few real-world implementations of perfect secrecy due to some well-known limitations. Any simple, straightforward modeling can pave the way for further advancements in the implementation, especially in environments with time and resource constraints such as IoT. This book takes one step towards this goal via presenting a hybrid combinatorial-Boolean model for perfectly-secure cryptography in IoT. In this book, we first present an introduction to information-theoretic cryptography as well as perfect secrecy and its real-world implementations. Then we take a systematic approach to highlight information-theoretic cryptography as a convergence point for existing trends in research on cryptography in IoT. Then we investigate combinatorial and Boolean cryptography and show how they are seen almost everywhere in the ecosystem and the life cycle of information-theoretic IoT cryptography. We finally model perfect secrecy in IoT using Boolean functions, and map the Boolean functions to simple, well-studied combinatorial designs like Latin squares. This book is organized in two parts. The first part studie s information-theoretic cryptography and the promise it holds for cryptography in IoT. The second part separately discusses combinatorial and Boolean cryptography, and then presents the hybrid combinatorial-Boolean model for perfect secrecy in IoT.




Combinatorial Optimization


Book Description

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Symposium on Combinatorial Optimization, ISCO 2018, held in Marrakesh, Marocco, in April 2018. The 35 revised full papers presented in this book were carefully reviewed and selected from 75 submissions. The symposium aims to bring together researchers from all the communities related to combinatorial optimization, including algorithms and complexity, mathematical programming and operations research.




Cooperative Communications for Improved Wireless Network Transmission: Framework for Virtual Antenna Array Applications


Book Description

Offers practitioners, researchers, and academicians with fundamental principles of cooperative communication. This book provides readers diverse findings and exposes underlying issues in the analysis, design, and optimization of wireless systems.




Tractability


Book Description

An overview of the techniques developed to circumvent computational intractability, a key challenge in many areas of computer science.




Wireless, Networking, Radar, Sensor Array Processing, and Nonlinear Signal Processing


Book Description

Now available in a three-volume set, this updated and expanded edition of the bestselling The Digital Signal Processing Handbook continues to provide the engineering community with authoritative coverage of the fundamental and specialized aspects of information-bearing signals in digital form. Encompassing essential background material, technical details, standards, and software, the second edition reflects cutting-edge information on signal processing algorithms and protocols related to speech, audio, multimedia, and video processing technology associated with standards ranging from WiMax to MP3 audio, low-power/high-performance DSPs, color image processing, and chips on video. Drawing on the experience of leading engineers, researchers, and scholars, the three-volume set contains 29 new chapters that address multimedia and Internet technologies, tomography, radar systems, architecture, standards, and future applications in speech, acoustics, video, radar, and telecommunications. This volume, Wireless, Networking, Radar, Sensor Array Processing, and Nonlinear Signal Processing, provides complete coverage of the foundations of signal processing related to wireless, radar, space–time coding, and mobile communications, together with associated applications to networking, storage, and communications.




Boolean Functions for Cryptography and Coding Theory


Book Description

A complete, accessible book on single and multiple output Boolean functions in cryptography and coding, with recent applications and problems.