Learn More
Embedded sensing systems are pervasively used in life- and security-critical systems such as those found in airplanes, automobiles, and healthcare. Traditional security mechanisms for these sensors focus on data encryption and other post-processing techniques, but the sensors themselves often remain vulnerable to attacks in the physical/analog domain. If an(More)
The fundamental and natural connection between the infinite constellation (IC) dimension and the best diversity order it can achieve is investigated in this paper. In the first part of this work we develop an upper bound on the diversity order of IC's for any dimension and any number of transmit and receive antennas. By choosing the right dimensions, we(More)
In this work the optimal diversity-multiplexing tradeoff (DMT) is investigated for the multiple-input multiple-output fading multiple-access channels with no power constraints (infinite constellations). For K users (K > 1), M transmit antennas for each user, and N receive antennas, infinite constellations in general and lattices in particular are shown to(More)
—The fundamental and natural connection between the infinite constellation (IC) dimension and the best diversity order it can achieve is investigated in this paper. We develop upper and lower bounds on the diversity order of IC for any dimension and any number of transmit and receive antennas. We show that by choosing the correct dimensions, IC in general(More)
Embedded sensing systems are pervasively used in life-and security-critical systems such as those found in airplanes, automobiles , and healthcare. Traditional security mechanisms for these sensors focus on data encryption and other post-processing techniques, but the sensors themselves often remain vulnerable to attacks in the physical/analog domain. If an(More)
In this work we analyze the average guesswork for the problem of hashed passwords cracking (i.e., finding a password that has the same hash value as the actual password). We focus on the case when the hash function is adaptively modified based on the passwords of the users. First, we find the average guesswork, averaged over all strategies of guessing(More)