Institute for Systems Research Technical Reports
Permanent URI for this collectionhttp://hdl.handle.net/1903/4376
This archive contains a collection of reports generated by the faculty and students of the Institute for Systems Research (ISR), a permanent, interdisciplinary research unit in the A. James Clark School of Engineering at the University of Maryland. ISR-based projects are conducted through partnerships with industry and government, bringing together faculty and students from multiple academic departments and colleges across the university.
Browse
Search Results
Item Dynamic ElGamal Public Key Generation with Tight Binding(1999) Poovendran, R.; Corson, M. Scott; Baras, John S.; ISR; CSHCNWe present a new distributed, group ElGamal public key generation algorithm which also permits maintenance of a group-specific, dynamic,individual ElGamal public key infrastructure.We parameterize the group with a time-varying quantity that servesas a distributed mechanism for controlling key generation privilege.
Our scheme can be viewed as an alternative to polynomial schemes where, at the time of the secret construction step, there has to be a third party or a black box to combine the shares. Also, in polynomial schemes, at the time of combining, the individual shares of the secret have to be revealed to the third party. In our scheme, the common secret can be generated without ever exposing the individual shares constructing it.
We note that many of the recently proposed distributed key management~[2-4] schemes need such group keys for certification and signing purposes.
Item VLSI Implemented ML Joint Carrier Phase and Timing Offsets Joint Estimator for QPSK/QQPSK Burst Modems(1999) Jiang, Yimin; Verahrami, F.B.; Richmond, R.L.; Baras, John S.; Baras, John S.; ISR; CSHCNA high performance ASIC supporting multiple modulation, error correction, and frame formats is under development at Hughes Network Systems, Inc. Powerful and generic data-aided (DA) estimators are needed to accommodate operation in the required modes. In this paper, a simplified DA maximum likelihood (ML) joint estimator for carrier phase and symbol timing offset for QPSK/OQPSK burst modems and a sample systolic VLSI implementation for the estimator are presented.Furthermore, the Cramer-Rao lower bound (CRLB) for DA case is investigated. The performance of the estimator is shown through simulation to meet the CRLB even at low signal-to-noise ratios (SNR). Compared with theoretical solutions, the proposed estimator is less computationally intensive and is therefore easier to implement using current VLSI technology. IEEE Wireless Communications and Networking Conference: WCNC'99
Item Data-Aided ML Parameter Estimators of PSK Burst Modems and Their Systolic VLSI Implementations(1999) Jiang, Yimin; Ting, W-C.; Verahrami, F.B.; Richmond, R.L.; Baras, John S.; Baras, John S.; ISR; CSHCNA high performance Universal Modem ASIC that supports several modulation types and burst mode frame formats is under development. Powerful and generic data-aided (DA) parameter estimators are necessary to accommodate many modes.In this paper we present an approximated maximum likelihood (ML) carrier frequency offset estimator, ML joint carrier phase and timing offsets estimator and their systolic VLSI implementations for PSK burst modems. The performances are close to the Cramer-Rao lower bounds (CRLB) at low SNRs.
Compared with theoretical solutions, the estimators proposed here are much simpler and easier to implement by the current VLSI technology. The CRLB for DA estimations is discussed in some depth, some issues on training sequence design is also addressed in this work.
Globecomm99
Item A Video Transmission System Based on a Human Visual Model(1999) Jiang, Yimin; Gu, Junfeng; Baras, John S.; Baras, John S.; ISR; CSHCNThis paper presents a joint source-channel coding scheme of digital video broadcasting over satellite channels. The video compression is based on a human visual model. A perceptual distortion model, the just-noticeable-distortion (JND), is applied to improve the subjective quality of compressed videos.3-D wavelet decomposition can remove spatial and temporal redundancy and provide scalability of video quality. In order to conceal the errors occurring under bad channel conditions, a novel slicing method and a joint source channel coding scenario that combines RCPC with CRC and utilizes the distortion information to allocate convolutional coding rates are presented. A new performance index based on JND is proposed and used to evaluate the overall performance at different signal-to-noise ratios (SNR). Our system uses the OQPSK modulation scheme.
VTC 1999
Item VLSI Implemented Data-Aided ML Parameter Estimators of PSK Burst Modems(1999) Jiang, Yimin; Ting, W.C.; Verahrami, F.B.; Richmond, R.L.; Baras, John S.; Baras, John S.; ISR; CSHCNA high performance Universal Modem ASIC that supports several modulation types and burst mode frame formats is under development. The ASIC is designed to work under stringent conditions such as large carrier frequency offset (up to 13 percent symbol rate) and low signal-to-noise ratio (SNR). Powerful and generic data-aided (DA) parameter estimators are necessary to accommodate many modes.In this paper we present an approximated maximum likelihood (ML) carrier frequency offset estimator, ML joint carrier phase and timing offsets estimator and their systolic VLSI implementations for PSK burst modems. The performances are close to the Cramer-Rao lower bounds (CRLB) at low SNRs. Compared with theoretical solutions the estimators proposed here are much simpler and easier to implement by the current VLSI technology.
VTC'99
Item Dynamic Elgamal Public Key Generation with Tight Binding(1999) Poovendran, R.; Corson, M. Scott; Baras, John S.; Baras, John S.; ISR; CSHCNWe present a new distributed, group ElGamal public key generation algorithm which also permits maintenance of a group-specific, dynamic, individual ElGamal public key infrastructure. We parameterize the group with a time-varying quantity that serves as a distributed mechanism for controlling key generation privilege.Our scheme can be viewed as an alternative to polynomial schemes where, at the time of the secret construction step, there has to be a third party or a black box to combine the shares. Also, in polynomial schemes, at the time of combining,the individual shares of the secret have to be revealed to the third party.
In our scheme, the common secret can be generated without ever exposing the individual shares constructing it. We note that many of the recently proposed distributed key management schemes need such group keys for certification and signing purposes.
3rd Annual Conference on Advanced Telecommunications and Information Distribution Research Program (ATIRP)
Item On a Recent Problem of Communication-Storage Tradeoffs for Secure Multicast for Large Networks(1999) R. Poovendran; Baras, John S.; Baras, John S.; ISR; CSHCNA variety of rooted tree-based secure multicast networks with different efficiencies and storage requirements that are linear in group size have been proposed.Recently, Canetti et. al. presented a scheme based on clustering that had sub-linear storage requirements at the group controller. However, they were unable to prove or disprove that the scheme was optimal, and posed it as an open question.
In this paper we answer the question with affirmative NO! Additionally we use our results to show that the optimal clustering in this context is related to maximum entropy of member revocation event, and corresponding optimal strategy is to partition members such that each cluster has the same probability of being revoked.
Second Workshop on Security in Communication Networks
Item Window Distribution of Multiple TCPs with Random Loss Queues(1999) Misra, Archan; Baras, John S.; Ott, Teunis; Baras, John S.; ISR; CSHCNIn this paper, we consider the case of multiple ideal and persistent TCP flows (flows that are assumed to be performing idealized congestion avoidance) interacting with queue management algorithms that perform random drop-based buffer management. Our objective is to determine the stationary congestion window distribution of each of the TCP flows whenthe router port implements algorithms like RED (Random Early Detection)or ERD (Early Random Drop).We first present an analyticaltechnique to obtain the 'mean' queue occupancy and the 'mean' of the individual TCP windows. Armed with this estimate of the means, wethen derive the window distribution of each individual TCPconnection. Extensive simulation experiments indicate that, under a wide variety of operating conditions, our analytical method is quite accurate in predicting the 'mean' as well asthe distributions. The derivation of the individual distributions is based upon a numerical analysis presented which considers the case of a single TCP flow subject to variable state-dependent packet loss.
Item A Simulation Study of Enhanced TCP/IP Gateways for Broadband Internet over Satellite(1999) Karir, Manish; Liu, Mingyan D.; Barrett, Bradley A.; Baras, John S.; Baras, John S.; ISR; CSHCNThe demand for Internet bandwidth has been growing rapidlyover the years and the use of high-bandwidth satellites has been proposed as one possible solution to meet the increasingdemand.However, there are certain performance problems withproviding Internet over satellite due to the nature of TCP/IP protocol suite and the satellite link characteristics. In this paper, we describe a simulation study of an architecture for improving the performance of TCP/IP over satellite links.
On each end of the satellite link, there are gateways that split the TCP connection so that the satellite link is transparent to the end hosts.
The split TCP connection over the satellite segment is then optimized.TCP congestion control is maintained on each segment of the split connection.
We simulated such an architecture in OPNET and present results showing improved throughput over the satellite link.
Item Run-to-Run Control Methods Based on the DHOBE Algorithm(1999) Deng, Hao; Zhang, Chang; Baras, John S.; ISR; CSHCNMany run-to-run (RtR) control methods have been developed in recentyears. Two particular set-valued RtR control schemes based on the Dasgupta-Huang OptimalBounded Ellipsoid (DHOBE) algorithm are introduced. Compared to other RtR control schemes, the methods in this paper only need to know the bound of the noises, and are easyto implement.The DHOBE algorithm, for eachrecursion, returns an outer bounding ellipsoid of the estimated parameters. If the center of the ellipsoid each time istaken as the model coefficients, the explicit model update isimplemented which leads to a model-reference method. If we choose theworst-case point which maximizes the cost function in the set, then wecan apply the set-valued worst case approach. These two methods were compared with two other main RtRcontrol schemes: the Exponentially Weighted Moving Average (EWMA) methodand the Optimizing Adaptive Quality Controller (OAQC) method. Simulation results showed the superior performance of the RtRcontrollers based on the DHOBE algorithm. Furthermore this paper showedthat it is necessary to applynonlinear models to compensate for severe nonlinear processes.