Skip to main content

Showing 1–21 of 21 results for author: Mandayam, N

Searching in archive eess. Search in all archives.
.
  1. arXiv:2405.07274  [pdf, other

    eess.SY

    Timely Offloading in Mobile Edge Cloud Systems

    Authors: Nitya Sathyavageeswaran, Roy D. Yates, Anand D. Sarwate, Narayan Mandayam

    Abstract: Future real-time applications like smart cities will use complex Machine Learning (ML) models for a variety of tasks. Timely status information is required for these applications to be reliable. Offloading computation to a mobile edge cloud (MEC) can reduce the completion time of these tasks. However, using the MEC may come at a cost such as related to use of a cloud service or privacy. In this pa… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  2. Programming Wireless Security through Learning-Aided Spatiotemporal Digital Coding Metamaterial Antenna

    Authors: Alireza Nooraiepour, Shaghayegh Vosoughitabar, Chung-Tse Michael Wu, Waheed U. Bajwa, Narayan B. Mandayam

    Abstract: The advancement of future large-scale wireless networks necessitates the development of cost-effective and scalable security solutions. Conventional cryptographic methods, due to their computational and key management complexity, are unable to fulfill the low-latency and scalability requirements of these networks. Physical layer (PHY) security has been put forth as a cost-effective alternative to… ▽ More

    Submitted 12 August, 2023; v1 submitted 16 November, 2022; originally announced November 2022.

    Journal ref: Adv. Intell. Syst. 2300341 (2023)

  3. arXiv:2205.15630  [pdf, other

    eess.SY

    Privacy Leakage in Discrete Time Updating Systems

    Authors: Nitya Sathyavageeswaran, Roy D. Yates, Anand D. Sarwate, Narayan Mandayam

    Abstract: A source generates time-stamped update packets that are sent to a server and then forwarded to a monitor. This occurs in the presence of an adversary that can infer information about the source by observing the output process of the server. The server wishes to release updates in a timely way to the monitor but also wishes to minimize the information leaked to the adversary. We analyze the trade-o… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

  4. arXiv:2111.14992  [pdf, other

    eess.SP cs.CR

    Network Traffic Shaping for Enhancing Privacy in IoT Systems

    Authors: Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam

    Abstract: Motivated by privacy issues caused by inference attacks on user activities in the packet sizes and timing information of Internet of Things (IoT) network traffic, we establish a rigorous event-level differential privacy (DP) model on infinite packet streams. We propose a memoryless traffic shaping mechanism satisfying a first-come-first-served queuing discipline that outputs traffic dependent on t… ▽ More

    Submitted 29 November, 2021; originally announced November 2021.

    Comments: 18 pages, 10 figures, submitted to IEEE Transactions on Networking

  5. A hybrid model-based and learning-based approach for classification using limited number of training samples

    Authors: Alireza Nooraiepour, Waheed U. Bajwa, Narayan B. Mandayam

    Abstract: The fundamental task of classification given a limited number of training data samples is considered for physical systems with known parametric statistical models. The standalone learning-based and statistical model-based classifiers face major challenges towards the fulfillment of the classification task using a small training set. Specifically, classifiers that solely rely on the physics-based s… ▽ More

    Submitted 1 December, 2021; v1 submitted 25 June, 2021; originally announced June 2021.

    Comments: An extended version of the paper accepted in the open journal of signal processing. This version includes the following extra materials compared to the accepted paper: 1. Appendix D: Proof of Lemma 5, 2. Appendix E: Proof of Lemma 6, 3. Appendix F: A heuristic approach for channel parameter estimation for CDMA system

    MSC Class: I.5 ACM Class: I.5

    Journal ref: IEEE Open J. Signal Proc., vol. 3, pp. 49-70, Jan. 2022

  6. arXiv:2103.03932  [pdf, other

    eess.SY cs.GT

    Prosumer Behavior: Decision Making with Bounded Horizon

    Authors: Mohsen Rajabpour, Arnold Glass, Robert Mulligan, Narayan B. Mandayam

    Abstract: Most studies of prosumer decision making in the smart grid have focused on single, temporally discrete decisions within the framework of expected utility theory (EUT) and behavioral theories such as prospect theory. In this work, we study prosumer decision making in a more natural, ongoing market situation in which a prosumer has to decide every day whether to sell any surplus energy units generat… ▽ More

    Submitted 5 March, 2021; originally announced March 2021.

    Comments: To Appear in Advanced Data Analytics for Power Systems, Cambridge University Press, 2021

  7. arXiv:2008.13498  [pdf, other

    eess.SP eess.SY

    Modeling the Impact of 5G Leakage on Weather Prediction

    Authors: Mohammad Yousefvand, Chung-Tse Michael Wu, Ruo-Qian Wang, Joseph Brodie, Narayan Mandayam

    Abstract: The 5G band allocated in the 26 GHz spectrum referred to as 3GPP band n258, has generated a lot of anxiety and concern in the meteorological data forecasting community including the National Oceanic and Atmospheric Administration (NOAA). Unlike traditional spectrum coexistence problems, the issue here stems from the leakage of n258 band transmissions impacting the observations of passive sensors (… ▽ More

    Submitted 31 August, 2020; originally announced August 2020.

    Comments: This paper is accepted for presentation, and will soon appear in the 2020 IEEE 5G World Forum conference proceedings, Sep 10-12, 2020, (Virtual Event). [6 pages, 6 figures]

  8. arXiv:1909.05679  [pdf, other

    eess.SY cs.NI

    Learning End-User Behavior for Optimized Bidding in HetNets: Impact on User/Network Association

    Authors: Mohammad Yousefvand, Narayan Mandayam

    Abstract: We study the impact of end-user behavior on service provider (SP) bidding and user/network association in a HetNet with multiple SPs while considering the uncertainty in the service guarantees offered by the SPs. Using Prospect Theory (PT) to model end-user decision making that deviates from expected utility theory (EUT), we formulate user association with SPs as a multiple leader Stackelberg game… ▽ More

    Submitted 11 September, 2019; originally announced September 2019.

    Comments: Submitted to IEEE J-SAC Special issue on Smart Data Pricing. arXiv admin note: text overlap with arXiv:1806.03213

  9. arXiv:1908.00195  [pdf, other

    cs.LG cs.CR eess.SP stat.ML

    Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT

    Authors: Alireza Nooraiepour, Waheed U. Bajwa, Narayan B. Mandayam

    Abstract: Internet-of-Things (IoT) devices that are limited in power and processing are susceptible to physical layer (PHY) spoofing (signal exploitation) attacks owing to their inability to implement a full-blown protocol stack for security. The overwhelming adoption of multicarrier techniques such as orthogonal frequency division multiplexing (OFDM) for the PHY layer makes IoT devices further vulnerable t… ▽ More

    Submitted 4 July, 2020; v1 submitted 31 July, 2019; originally announced August 2019.

    Comments: 15 pages; 20 figures; 3 tables; preprint of a paper accepted for publication in IEEE Trans. Cognitive Commun. Netw

    Journal ref: IEEE Trans. Cognitive Commun. Netw., vol. 7, no. 1, pp. 239-254, Mar. 2021

  10. arXiv:1905.04788  [pdf, other

    cs.NI cs.LG eess.SP

    Learning-based Resource Optimization in Ultra Reliable Low Latency HetNets

    Authors: Mohammad Yousefvand, Kenza Hamidouche, Narayan B. Mandayam

    Abstract: In this paper, the problems of user offloading and resource optimization are jointly addressed to support ultra-reliable and low latency communications (URLLC) in HetNets. In particular, a multi-tier network with a single macro base station (MBS) and multiple overlaid small cell base stations (SBSs) is considered that includes users with different latency and reliability constraints. Modeling the… ▽ More

    Submitted 12 May, 2019; originally announced May 2019.

    Comments: Submitted to IEEE Globecom 2019

  11. arXiv:1812.05298  [pdf, other

    eess.SY cs.LG

    Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning

    Authors: Aidin Ferdowsi, Samad Ali, Walid Saad, Narayan B. Mandayam

    Abstract: Autonomous connected vehicles (ACVs) rely on intra-vehicle sensors such as camera and radar as well as inter-vehicle communication to operate effectively. This reliance on cyber components exposes ACVs to cyber and physical attacks in which an adversary can manipulate sensor readings and physically take control of an ACV. In this paper, a comprehensive framework is proposed to thwart cyber and phy… ▽ More

    Submitted 13 December, 2018; originally announced December 2018.

    Comments: 30 pages, 11 figures

  12. arXiv:1810.00532  [pdf, ps, other

    eess.SP

    How Secure are Multicarrier Communication Systems Against Signal Exploitation Attacks?

    Authors: Alireza Nooraiepour, Kenza Hamidouche, Waheed U. Bajwa, Narayan Mandayam

    Abstract: In this paper, robustness of non-contiguous orthogonal frequency division multiplexing (NC-OFDM) transmissions is investigated and contrasted to OFDM transmissions for fending off signal exploitation attacks. In contrast to ODFM transmissions, NC-OFDM transmissions take place over a subset of active subcarriers to either avoid incumbent transmissions or for strategic considerations. A point-to-poi… ▽ More

    Submitted 1 October, 2018; originally announced October 2018.

  13. arXiv:1805.00983  [pdf, other

    eess.SY cs.AI math.OC

    Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems

    Authors: Aidin Ferdowsi, Ursula Challita, Walid Saad, Narayan B. Mandayam

    Abstract: To operate effectively in tomorrow's smart cities, autonomous vehicles (AVs) must rely on intra-vehicle sensors such as camera and radar as well as inter-vehicle communication. Such dependence on sensors and communication links exposes AVs to cyber-physical (CP) attacks by adversaries that seek to take control of the AVs by manipulating their data. Thus, to ensure safe and optimal AV dynamics cont… ▽ More

    Submitted 8 May, 2018; v1 submitted 2 May, 2018; originally announced May 2018.

    Comments: 8 pages, 4 figures

  14. arXiv:1804.07428  [pdf, other

    cs.NI eess.SY

    Design of Ad Hoc Wireless Mesh Networks Formed by Unmanned Aerial Vehicles with Advanced Mechanical Automation

    Authors: Ryoichi Shinkuma, Narayan B. Mandayam

    Abstract: Ad hoc wireless mesh networks formed by unmanned aerial vehicles (UAVs) equipped with wireless transceivers (access points (APs)) are increasingly being touted as being able to provide a flexible "on-the-fly" communications infrastructure that can collect and transmit sensor data from sensors in remote, wilderness, or disaster-hit areas. Recent advances in the mechanical automation of UAVs have re… ▽ More

    Submitted 19 April, 2018; originally announced April 2018.

    Comments: 12 pages

  15. arXiv:1709.09768  [pdf, other

    eess.SY cs.GT cs.IT

    Colonel Blotto Game for Secure State Estimation in Interdependent Critical Infrastructure

    Authors: Aidin Ferdowsi, Walid Saad, Narayan B. Mandayam

    Abstract: Securing the physical components of a city's interdependent critical infrastructure (ICI) such as power, natural gas, and water systems is a challenging task due to their interdependence and a large number of involved sensors. In this paper, using a novel integrated state-space model that captures the interdependence, a two-stage cyber attack on an ICI is studied in which the attacker first compro… ▽ More

    Submitted 5 November, 2019; v1 submitted 27 September, 2017; originally announced September 2017.

    Comments: 30 pages, 6 figures

  16. arXiv:1709.06071  [pdf, ps, other

    cs.GT cs.MA eess.SY

    Managing Price Uncertainty in Prosumer-Centric Energy Trading: A Prospect-Theoretic Stackelberg Game Approach

    Authors: Georges El Rahi, S. Rasoul Etesami, Walid Saad, Narayan Mandayam, H. Vincent Poor

    Abstract: In this paper, the problem of energy trading between smart grid prosumers, who can simultaneously consume and produce energy, and a grid power company is studied. The problem is formulated as a single-leader, multiple-follower Stackelberg game between the power company and multiple prosumers. In this game, the power company acts as a leader who determines the pricing strategy that maximizes its pr… ▽ More

    Submitted 18 September, 2017; originally announced September 2017.

  17. arXiv:1707.04589  [pdf, other

    eess.SY cs.GT cs.IT

    Game Theory for Secure Critical Interdependent Gas-Power-Water Infrastructure

    Authors: Aidin Ferdowsi, Anibal Sanjab, Walid Saad, Narayan B. Mandayam

    Abstract: A city's critical infrastructure such as gas, water, and power systems, are largely interdependent since they share energy, computing, and communication resources. This, in turn, makes it challenging to endow them with fool-proof security solutions. In this paper, a unified model for interdependent gas-power-water infrastructure is presented and the security of this model is studied using a novel… ▽ More

    Submitted 14 July, 2017; originally announced July 2017.

    Comments: 7 pages, in proceedings of Resilience Week 2017

  18. arXiv:1705.08338  [pdf, ps, other

    cs.GT cs.IT eess.SY

    A Colonel Blotto Game for Interdependence-Aware Cyber-Physical Systems Security in Smart Cities

    Authors: Aidin Ferdowsi, Walid Saad, Behrouz Maham, Narayan B. Mandayam

    Abstract: Smart cities must integrate a number of interdependent cyber-physical systems that operate in a coordinated manner to improve the well-being of the city's residents. A cyber-physical system (CPS) is a system of computational elements controlling physical entities. Large-scale CPSs are more vulnerable to attacks due to the cyber-physical interdependencies that can lead to cascading failures which c… ▽ More

    Submitted 23 May, 2017; originally announced May 2017.

  19. arXiv:1705.03805  [pdf, other

    cs.GT cs.MA eess.SY

    Smart Routing of Electric Vehicles for Load Balancing in Smart Grids

    Authors: S. Rasoul Etesami, Walid Saad, Narayan Mandayam, H. V. Poor

    Abstract: Electric vehicles (EVs) are expected to be a major component of the smart grid. The rapid proliferation of EVs will introduce an unprecedented load on the existing electric grid due to the charging/discharging behavior of the EVs, thus motivating the need for novel approaches for routing EVs across the grid. In this paper, a novel gametheoretic framework for smart routing of EVs within the smart g… ▽ More

    Submitted 27 December, 2019; v1 submitted 10 May, 2017; originally announced May 2017.

  20. arXiv:1610.02067  [pdf, other

    cs.GT cs.IT cs.LG eess.SY

    Stochastic Games for Smart Grid Energy Management with Prospect Prosumers

    Authors: Seyed Rasoul Etesami, Walid Saad, Narayan Mandayam, H. Vincent Poor

    Abstract: In this paper, the problem of smart grid energy management under stochastic dynamics is investigated. In the considered model, at the demand side, it is assumed that customers can act as prosumers who own renewable energy sources and can both produce and consume energy. Due to the coupling between the prosumers' decisions and the stochastic nature of renewable energy, the interaction among prosume… ▽ More

    Submitted 7 August, 2017; v1 submitted 6 October, 2016; originally announced October 2016.

  21. arXiv:1511.01065  [pdf, ps, other

    eess.SY cs.IT

    Towards a Consumer-Centric Grid: A Behavioral Perspective

    Authors: Walid Saad, Arnold Glass, Narayan Mandayam, H. Vincent Poor

    Abstract: Active consumer participation is seen as an integral part of the emerging smart grid. Examples include demand-side management programs, incorporation of consumer-owned energy storage or renewable energy units, and active energy trading. However, despite the foreseen technological benefits of such consumer-centric grid features, to date, their widespread adoption in practice remains modest. To shed… ▽ More

    Submitted 1 November, 2015; originally announced November 2015.

    Comments: to appear, Proceedings of the IEEE