Professional Documents
Culture Documents
Research Article
Physical Layer Security Game: Interaction between Source,
Eavesdropper, and Friendly Jammer
Physical layer security is an emerging security area that achieves perfect secrecy data transmission between intended network
nodes, while malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be
improved using friendly jammers that introduce extra interference to the eavesdroppers. We investigate the interaction between
the source that transmits the useful data and friendly jammers who assist the source by “masking” the eavesdropper. To obtain
distributed solution, we introduce a game theoretic approach. The game is defined such that the source pays the jammers to
interfere the eavesdropper, therefore, increasing the secrecy capacity. The friendly jammers charge the source with a certain price
for the jamming, and there is a tradeoff for the price. If too low, the profit of the jammers is low; and if too high, the source
would not buy the “service” (jamming power) or would buy it from other jammers. To analyze the game outcome, we investigate
a Stackelburg type of game and construct a distributed algorithm. Our analysis and simulation results show the effectiveness of
friendly jamming and the tradeoff for setting the price. The distributed game solution is shown to have similar performances to
those of the centralized one.
Copyright © 2009 Zhu Han et al. This is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
C2 0.9
0.8
0.7
Secrecy capacity Cs
J1
M 0.6
0.5
J2
JJ 0.4
0.3
0.2
S: Source
D: Destination 0.1
M: Malicious node (eavesdropper)
0
J1 , . . . , JJ : J friendly jammers 0 0.005 0.01 0.015 0.02
Useful data Jamming power
Interference
Jammer location (50, 75)
Payment
Jammer location (10, 75)
Figure 1: System model for the proposed physical layer security
Figure 2: Secrecy capacity versus the power of the single jammer.
game.
in the sense that the eavesdropper is now limited to learn pays the jammers to interfere the malicious eavesdropper,
almost nothing about the source-destination messages from and therefore, to increase the secrecy capacity. The friendly
its observations. Follow-up work by Leung-Yan-Cheong and jammers charge the source with a certain price for their
Hellman characterized the secrecy capacity of the additive service of jamming the eavesdropper. One could notice that
white Gaussian noise (AWGN) wiretap channel [2]. In their there is a tradeoff for the proposed price. If the price of a
landmark paper, Csiszar and Korner generalized Wyner’s certain jammer is too low, its profit is also low; if its price
approach by considering the transmission of confidential is too high, the source will buy from the other jammers.
messages over broadcast channels [3]. Recently, there have In modeling the outcome of the above games our analysis
been considerable efforts on generalizing these studies to the uses the Stackelberg type of game. Initially, the existence of
wireless channel and multiuser scenarios (see [2, 4–11] and equilibrium will be studied. Then, a distributed algorithm
references therein). Jamming [12–14] has been studied for will be proposed and its convergence will be investigated. The
a long time to analyze the hostile behaviors of malicious outcome of the distributed algorithm will be compared to
nodes. Recently, jamming has been employed to physical the centralized genie aided solution. Some implementation
layer security to reduce the eavesdropper’s ability to decode concerns are also discussed. From the simulation results, we
the source’s information [15]. In other words, the jamming can see the efficiency of friendly jamming and tradeoff for
is friendly in this context. Moreover, the friendly helper can setting the price, the source prefers buying service from only
assist the secrecy by sending codewords, and bring further one jammer, and the centralized scheme and the proposed
gains relative to unstructured Gaussian noise [15–17]. game scheme have similar performance.
Game theory [18] is a formal framework with a set The rest of the paper is organized as follows. In Section 2,
of mathematical tools to study some complex interactions the system model of physical layer security with friendly
among interdependent rational players. During the past jamming users is described. In Section 3, the game models
decade, there has been a surge in research activities that are formulated, and the outcomes as well as properties of the
employ game theory to model and analyze modern dis- game are analyzed. Simulation results are shown in Section 4,
tributed communication systems. Most of these works [19– and conclusions are drawn in Section 5.
22] concentrate on the distributed resource allocation for
wireless networks. As far as the authors’ knowledge, the game 2. System Model
theory has not yet been used in the physical layer security.
In this paper, we investigate the interaction between the We consider a network with a source, a destination, a
source and its friendly jammers using game theory. Although malicious eavesdropper node, and J friendly jammer nodes
the friendly jammers help the source by reducing the data as shown in Figure 1. The malicious node tries to eavesdrop
rate that is “leaking” from the source to the malicious node, the transmitted data coming from the source node. When
at the same time they also reduce the useful data rate from the eavesdropper channel from the source to the malicious
the source to the destination. Using well chosen amounts of node is a degraded version of the main source-destination
power from the friendly jammers, the secrecy capacity can channel, the source and destination can exchange perfectly
be maximized. In the game that we define here, the source secure messages at a nonzero rate. By transmitting a message
EURASIP Journal on Wireless Communications and Networking 3
at a rate higher than the rate of the malicious node, the How much power bought versus jammer price
0.016
malicious node can learn almost nothing about the messages
from its observations. The maximum rate of secrecy infor- 0.014
mation from the source to its intended destination is defined
3. Game for Physical Layer Security where ci ≥ 1 is a constant to balance from the payment
pi Pi from the source and the transmission cost Pi . With
In this section, we study how to use game theory to analyze different values of ci , jammers have different strategies for
the physical layer security. First, we define the game between asking the price pi . Notice that Pi is also a function of the
the source and friendly jammers. Next, we optimize the vector of prices (p1 , . . . pN ), since the power that the source
source and jammer sides, respectively. Then, we prove some will buy also depends on the price that the friendly jammers
properties of the proposed game. Furthermore, a comparison ask. Hence, for each friendly jammer, the optimization
with the centralized scheme is constructed. Finally, we problem is
discuss some implementation concerns.
Friendly Jammer’s Game: max U i . (8)
pi
3.1. Game Definition. The source can be modeled as a
buyer who wants to optimize its secrecy capacity minus cost In the next two subsections, we analyze the optimal
by modifying the “service” (jamming power Pi ) from the strategies for the source and friendly jammers to maximize
friendly jammers, that is, their own utilities.
4 EURASIP Journal on Wireless Communications and Networking
3.2. Source (Buyer) Side Analysis. Introducing A = Source (0,0), dest. (100,0), malic. node (50,90),
P0 Gsd /σ 2 , B = P0 Gsm /σ 2 , ui = Gid /σ 2 , and vi = Gim /σ 2 , i ∈ user 1 (50,50), user 2 (50,75)
J, we have
+
A B 1
Us = aW log 1+ − log 1+
1+ j ∈J u j P j 1+ j ∈J v j P j
0.8
Source Us
− pjPj. 0.6
j ∈J
(9) 0.4
For the source (buyer) size, we analyze the case C1 > C2 . 0.2
By differentiating (4), we have 0
Source (0,0), dest. (100,0), malic. node (50,90), If (B/v1 ) − (A/u1 ) ≤ 0, Us is a decreasing function of
user 1 (50,50), user 2 (50,75) P1 . As a result, Ps is optimized when P1 = 0, that is, the
jammer would not participate the game. On the other hand,
if (B/v1 )−(A/u1 ) > 0, in order to find the maximizing powers
we have to calculate
×10−7 ∂Us aWA aWB
=− + − p1 = 0. (21)
3 ∂Pi u1 P12 v1 P12
Hence
Source U1
2
∗ aW B A D1
1 150 P1 = − = . (22)
p1 v1 u1 p1
100
0 1 From this equation we get the optimal closed-form solution
300 ep
250 pr ic Pi∗ , and similarly by comparing P1∗ with the power under the
200 50 2
150 100 er boundary conditions (P1 = 0, P1 = Pmax , and Cs = 0), we
User 1
price p 50 Us
2 0 can obtain the optimal solution for the this special case.
Figure 5: U1 versus the prices of both users.
3.3. Friendly Jammer (Seller) Side Analysis. In this subsec-
tion, we study how the friendly jammers can set the optimal
Solving the above equation we obtain a closed-form solution price to maximize its utility. By differentiating the utility in
(7) and setting it to zero, we have
2 + 2βi + B
Pi∗ = − , c −1 ∂Pi∗
2vi ∂Ui ∗ ci
= Pi + pi ci Pi∗ i = 0. (23)
∂pi ∂pi
2 + 2βi + B 2 1 + βi 1 + B + βi aWB
+ 2 − 2 + , This is equivalent to
4vi vi pi vi ln 2
ci −1 ∂Pi∗
z Pi∗ Pi∗ + pi ci · = 0. (24)
= qi + wi + i , ∂pi
pi
(18) This happens either if Pi∗ = 0 or if
where ∂Pi∗
2 + 2βi + B Pi∗ + pi ci · = 0. (25)
qi = − ∂pi
2vi
2 From the closed form solution of Pi∗ the solution of pi∗ will
2 + 2βi + B 1 + βi 1 + B + βi be a function given as
wi = − (19)
4vi2 vi2
pi∗ = pi∗ σ 2 ; Gsd ; Gsm ; {Gid }; {Gim } . (26)
aWB
zi = .
vi ln 2 Notice that pi∗ should be positive. Otherwise, the friendly
jammer would not play.
Finally, by comparing Pi∗ with the power under the
boundary conditions (Pi = 0, Pi = Pmax , and Cs = 0), the
optimal Pi∗ in the low SNR region can be obtained. 3.4. Properties. In this subsection, we prove some properties
of the proposed game. First, we prove that the power is
monotonous function of the price under the two extreme
3.2.2. One Jammer with Interference That Is Much Higher
cases. The properties can help for the proof of equilibrium
than the Noise but Much Smaller than the Received Power
existence in the later part of this subsection.
at the Destination and the Malicious Node. In this case the
interference from the jammer is much higher than the Property 1. Under the two special cases, the optimal power
additive noise but much smaller than the power of the consumption Pi∗ for friendly jammer i is monotonous with its
received signal at the destination and the malicious node. In price pi , when the other friendly jammers prices are fixed. The
other words, that means 1 u1 P1 A and 1 v1 P1 B. proof is straightforward from (18) and (22).
Therefore the utility function of the source is given by
We investigate the following analysis of the relation
A B
Us ≈ aW log 1 + − log 1 + − p1 P1 between the price and the power. We find out that the
u1 P1 v1 P1
(20) friendly jammer power Pi bought from the source is convex
aWA aWB in its own price pi under some conditions. To prove this we
≈ − − p1 P1 .
u1 P1 v1 P1 need to check whether the second derivative ∂2 Pi /∂pi2 < 0.
6 EURASIP Journal on Wireless Communications and Networking
In the first special case in which the interference is small Source (0,0), dest. (100,0), malic. node (50,90),
user 1 (50,50), user 2 (50,75)
∂Pi∗ zi
= − ,
∂pi 2
2pi wi + zi / pi ×10−6
4
(27)
∂2 Pi∗ zi 1 3
2 = 3 1/2 1 − .
Source U2
∂pi p i wi + zi / p i 4 pi wi /zi + 1
2
The above equation is greater than zero when pi is small. This 1
means when the interference is small and the price is small,
the power is convex as a function of the price. 0
300
In the second special case in which the interference is
severe 200
Us
er
∂Pi ∗
1
1
150
=− D1 p1−3/2 , 100
pr
100
ice
∂pi 2 50
p
(28) rice p1
2
0 User 2 p
∂2 Pi∗ 3
= D1 p1−5/2 > 0.
∂pi2 4 Figure 6: U2 versus the prices of both users.
1
the proposed game, if when pi is fixed,
0.9
Us PiSE = sup Us ({Pi }), ∀i ∈ J (29)
0.8
Pmax ≥{PiSE }≥0, ∀i
0.7
where p = [p1 , . . . , pN ]T and Ii (p) is the price update Definition 2. A function I(p) is standard, if for all p ≥ 0, the
function. Notice that Pi∗ is a function of p. The information following properties are satisfied
EURASIP Journal on Wireless Communications and Networking 7
(1) Positivity: p > 0. Two user case, jamming power versus jammer 2 location
0.025
(2) Monotonicity: if p ≥ p , then I(p) ≥ I(p ), or I(p) ≤
I(p ).
0.02
(3) Scalability: for all η > 1, ηI(p) ≥ I(ηp).
Jamming power
In [23], it has been proved that the price will converge to
0.015
the fixed point (i.e., the Stackelberg equilibrium in our case)
from any feasible initial price vector. The positivity is very
easy to prove. If the price pi goes up, the source would buy 0.01
less from the ith friendly jammer. As a result, (∂Pi∗ /∂pi ) in
(23) is negative, and we prove positivity pi = Ii (p) > 0.
The monotonicity and scalability can only be shown in 0.005
the two special cases. For the low interference case, from (18)
it is obvious that
0
P∗ −50 0 50 100
Ii p = − ∗i
Jammer 2 location
ci ∂Pi /∂pi
(33) Jammer 1 power
2 wi pi2 + zi pi qi pi + wi pi2 + zi pi Jammer 2 power
=
ci z i
Figure 8: Power versus the location of the second jammer.
which is monotonically increasing in pi . For scalability, we
have
Rearranging we get
Ii ηp wi pi2 + zi pi /η qi pi + wi pi2 + zi pi /η
= < 1,
ηIi p wi pi2 + zi pi qi pi + wi pi2 + zi pi Au2i 2 + B + 2βi − Bvi2 (2 + A + 2αi )
Pi2 + Pi
(34) Au3i − Bvi3
since η > 1. Aui 1 + βi 1 + B + βi − Bvi (1 + αi )(1 + A + αi )
+
For the large interference case, from (22) we have Au3i − Bvi3
Pi∗ 2pi = 0.
Ii p = − = (35)
ci ∂Pi∗ /∂pi ci (38)
which is monotonically increasing in pi and scalable. Using the KKT condition theorem [24], the final solution
For more general cases, the analysis is tractable. In the would be obtained by comparing the boundary conditions
simulation section later, we employ the general simulation (i.e., Pi = 0, Pi = Pmax , and Cs = 0).
setups. The simulation results show that the proposed Notice that our proposed algorithm is distributive,
scheme can converge and outperform the no-jammer case. in the sense that only the pricing information needs to
be exchanged. In the simulation results, we compare the
3.6. Centralized Scheme. Traditionally, the centralized proposed game theoretical approach with this centralized
scheme is employed assuming that all channel information scheme.
is known. The objective is to optimize the secrecy capacity Finally, from the simulation results in the next section, we
under the constraints of maximal jamming power. see that the distributed solution and the centralized solution
⎡ ⎛ ⎞ ⎤ are asymptotically the same if a is sufficiently large (the
1+ P0 Gsd / σ 2 + i∈J Pi Gid source cares more about the secrecy capacity than for the
max C s = max⎣Wlog2⎝ ⎠, 0⎦.
Pi 1+ P0 Gsm / σ 2 + i∈J Pi Gim payment, i.e., the source is sufficiently rich).
s.t. 0 ≤ Pi ≤ Pmax , ∀i. 3.7. Implementation Discussion. There are several implemen-
(36) tation concerns for the proposed scheme. First, the channel
information from the source to the malicious eavesdropper
The centralized solution is found by maximizing the might not be known or accurately known. Under this
secrecy capacity only. If we do not consider the constraint, condition, the secrecy capacity formula should be rewritten
we have considering the uncertainty. If the direction of arrival is
∂Cs AWui known, multiple antenna techniques can be employed such
=−
∂Pi (1 + αi + ui Pi )(1 + A + αi + ui Pi ) as in [11]. Second, the proposed scheme needs to iteratively
(37) update the price and power information. A natural question
BWv
+ i = 0. arises if the distributed scheme has less signalling than the
1 + βi + ui Pi 1 + B + βi + ui Pi centralized scheme. The comparison is similar to distributed
8 EURASIP Journal on Wireless Communications and Networking
1.2
auction could be investigated. The detailed discussion is
1 beyond the scope of this paper and would be considered in
0.8
our future research.
0.6
0.4 4. Simulation Results
0.2 The simulation is set up as follows. The source and friendly
0 jammer have power of 0.02, the bandwidth is 1, the
−50 0 50 100 noise level is 10−8 , the propagation loss factor is 3, and
Jammer 2 location AWGN channel is assumed. The source, destination, and
Jammer 1 utility
eavesdropper are located at the coordinates (0,0), (100,0),
Jammer 2 utility and (50,50), respectively. Here we select a = 2 for the friendly
jammer utility in (7).
Figure 9: Utility versus the location of the second jammer. For single friendly jammer case, we show the simulation
with the friendly jammer at the location of (50,75) and
(10,75). In Figure 2, we show the secrecy capacity as a
Effect of parameter a: jammer 2 location (0, 75) function of the jamming power. We can see that with the
1
increase of the jamming power, the secrecy capacity first
0.95 increases and then decreases. This is because the jamming
power has different effects on C1 and C2 . So there is an
0.9 optimal point for the jamming power. Also the optimal point
Secrecy capacity
away from the upper bound, while the game solution can References
be implemented in a distributed manner. The performance
game is trivial when the friendly jammer 2 is close to the [1] A. D. Wyner, “The wire-tap channel,” Bell System Technical
Journal, vol. 54, no. 8, pp. 1355–1387, 1975.
malicious eavesdropper from (20,75) to (70,75). In Figure 8,
[2] S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian
we show the jammers’ power as a function of jammer
wiretap channel,” IEEE Transactions on Information Theory,
2’s location. We can see that depending on the jammers’ vol. 24, pp. 451–456, 1978.
location, the source switches between two jammers for the [3] I. Csiszar and J. Korner, “Broadcast channels with confidential
best performance. Moreover, the source also buys the optimal messages,” IEEE Transactions on Information Theory, vol. 24,
amount of jamming power: when the jammer is close to no. 3, pp. 339–348, 1978.
the malicious eavesdropper, the source would buy less power [4] A. O. Hero III, “Secure space-time communication,” IEEE
since the jammer is more effective to improve the secrecy Transactions on Information Theory, vol. 49, no. 12, pp. 3235–
capacity. In Figure 9, we show the corresponding friendly 3249+3351, 2003.
jammers’ utilities of the proposed game. [5] Z. Li, W. Trappe, and R. Yates, “Secret communication via
Finally, we show the effect of parameter a for the friendly multi-antenna transmission,” in Proceedings of the 41st Annual
jammer utility in (7). When a is large, the friendly jammer’s Conference on Information Sciences and Systems (CISS ’07), pp.
905–910, Baltimore, Md, USA, March 2007.
utility reduces quick if the source does not buy the service. As
[6] R. Negi and S. Goelm, “Secret communication using artificial
a result, the friendly jammer would not ask arbitrary price,
noise,” in Proceedings of IEEE Vehicular Technology Conference,
and performance gap to the optima solution is small. In vol. 3, pp. 1906–1910, September 2005.
Figure 10, we show the secrecy capacity as a function of a [7] P. Parada and R. Blahut, “Secrecy capacity of SIMO and
when the second jammer is located at (0,75). We can see that slow fading channels,” in Proceedings of IEEE International
the performance gap is shrinking when a is increasing. Notice Symposium on Information Theory (ISIT ’05), pp. 2152–2155,
that for the condition in which the game almost converges to Adelaide, South Australia, September 2005.
the optimal solution, most value of a > 1 will achieve good [8] S. Shafiee and S. Ulukus, “Achievable rates in Gaussian MISO
solution, for example, the second friendly jammer located at channels with secrecy constraints,” in Proceedings of IEEE
(50,75). International Symposium on Information Theory, pp. 2466–
2470, Nice, France, June 2007.
[9] Y. Liang, H. V. Poor, and S. Shamai, “Secure communication
5. Conclusions over fading channels,” IEEE Transactions on Information
Physical layer security is an emerging security technique Theory, vol. 54, no. 6, pp. 2470–2492, 2008.
[10] P. K. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity
that is an alternative for traditional cryptographic-based
of fading channels,” IEEE Transactions on Information Theory,
protocols to achieve perfect secrecy capacity as eavesdroppers vol. 54, no. 10, pp. 4687–4698, 2008.
obtain zero information. Jamming has been shown in the [11] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Secure
literature to effectively improve secrecy capacity. In this collaborative beamforming,” in Proceedings of Allerton Confer-
paper, we investigate the interaction between the source ence on Communication, Control, and Computing, Allerton, Ill,
and friendly jammers using the game theory in order to USA, October 2008.
have a distributed solution. The source pays the friendly [12] A. Kashyap, T. Başar, and R. Srikant, “Correlated jamming
jammers to interfere the malicious eavesdropper such that on MIMO Gaussian fading channels,” IEEE Transactions on
the secrecy capacity is increased, and therefore the security Information Theory, vol. 50, no. 9, pp. 2119–2123, 2004.
of the network. The friendly jammers charge the source with [13] S. Shafiee and S. Ulukus, “Mutual Information Games in
a price for the jamming. To analyze the game outcome, we Multi-user Channels with Correlated Jamming,” IEEE Trans.
investigate the Stackelburg game and construct a distributed on Information Theory, vol. 55, no. 10, pp. 4598–4607, 2009.
[14] M. H. Brady, M. Mohseni, and J. M. Cioffi, “Spatially-
algorithm. Some properties such as equilibrium and conver-
correlated jamming in Gaussian multiple access and broadcast
gence are analyzed. From the simulation results, we conclude channels,” in Proceedings of the 40th IEEE Conference on
the following. First, there is a tradeoff for the price: If the Information Sciences and Systems (CISS ’06), pp. 1635–1639,
price is too low, the profit is low; and if the price is too Princeton, NJ, USA, March 2006.
high, the source would not buy or buy from other jammers. [15] L. Lai and H. El Gamal, “The relay-eavesdropper channel:
Second, for the multiple jammer case, the source would buy cooperation for secrecy,” IEEE Transactions on Information
service from only one jammer. Third, the centralized scheme Theory, vol. 54, no. 9, pp. 4005–4019, 2008.
and distributed scheme have similar performance, especially [16] X. Tang, R. Liu, P. Spasojević, and H. V. Poor, “The Gaussian
when a is sufficiently large. Overall, the proposed game wiretap channel with a helping interferer,” in Proceedings of
theoretical scheme can achieve a comparable performance IEEE International Symposium on Information Theory (ISIT
with distributed implementation. ’08), pp. 389–393, Toronto, Canada, July 2008.
[17] X. Tang, R. Liu, P. Spasojević, and H. V. Poor, “Interference-
assisted secret communication,” in Proceedings of the IEEE
Acknowledgments Information Theory Workshop (ITW ’08), pp. 164–168, Porto,
Portugal, May 2008.
This work was supported by NSF CNS-0910461 and NSF [18] D. Fudenberg and J. Tirole, Game Theory, MIT Press, Cam-
CNS-0905556 and was supported by the Research Council bridge, Mass, USA, 1991.
of Norway through the project entitled “Mobile-to-Mobile [19] C. U. Saraydar, N. B. Mandayam, and D. J. Goodman,
Communication Systems (M2M).” “Efficient power control via pricing in wireless data networks,”
10 EURASIP Journal on Wireless Communications and Networking
Preliminaryȱcallȱforȱpapers OrganizingȱCommittee
HonoraryȱChair
The 2011 European Signal Processing Conference (EUSIPCOȬ2011) is the MiguelȱA.ȱLagunasȱ(CTTC)
nineteenth in a series of conferences promoted by the European Association for GeneralȱChair
Signal Processing (EURASIP, www.eurasip.org). This year edition will take place AnaȱI.ȱPérezȬNeiraȱ(UPC)
in Barcelona, capital city of Catalonia (Spain), and will be jointly organized by the GeneralȱViceȬChair
Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) and the CarlesȱAntónȬHaroȱ(CTTC)
Universitat Politècnica de Catalunya (UPC). TechnicalȱProgramȱChair
XavierȱMestreȱ(CTTC)
EUSIPCOȬ2011 will focus on key aspects of signal processing theory and
TechnicalȱProgramȱCo
Technical Program CoȬChairs
Chairs
applications
li ti as listed
li t d below.
b l A
Acceptance
t off submissions
b i i will
ill be
b based
b d on quality,
lit JavierȱHernandoȱ(UPC)
relevance and originality. Accepted papers will be published in the EUSIPCO MontserratȱPardàsȱ(UPC)
proceedings and presented during the conference. Paper submissions, proposals PlenaryȱTalks
for tutorials and proposals for special sessions are invited in, but not limited to, FerranȱMarquésȱ(UPC)
the following areas of interest. YoninaȱEldarȱ(Technion)
SpecialȱSessions
IgnacioȱSantamaríaȱ(Unversidadȱ
Areas of Interest deȱCantabria)
MatsȱBengtssonȱ(KTH)
• Audio and electroȬacoustics.
• Design, implementation, and applications of signal processing systems. Finances
MontserratȱNájarȱ(UPC)
Montserrat Nájar (UPC)
• Multimedia
l d signall processing andd coding.
d
Tutorials
• Image and multidimensional signal processing. DanielȱP.ȱPalomarȱ
• Signal detection and estimation. (HongȱKongȱUST)
• Sensor array and multiȬchannel signal processing. BeatriceȱPesquetȬPopescuȱ(ENST)
• Sensor fusion in networked systems. Publicityȱ
• Signal processing for communications. StephanȱPfletschingerȱ(CTTC)
MònicaȱNavarroȱ(CTTC)
• Medical imaging and image analysis.
Publications
• NonȬstationary, nonȬlinear and nonȬGaussian signal processing. AntonioȱPascualȱ(UPC)
CarlesȱFernándezȱ(CTTC)
Submissions IIndustrialȱLiaisonȱ&ȱExhibits
d i l Li i & E hibi
AngelikiȱAlexiouȱȱ
Procedures to submit a paper and proposals for special sessions and tutorials will (UniversityȱofȱPiraeus)
be detailed at www.eusipco2011.org. Submitted papers must be cameraȬready, no AlbertȱSitjàȱ(CTTC)
more than 5 pages long, and conforming to the standard specified on the InternationalȱLiaison
EUSIPCO 2011 web site. First authors who are registered students can participate JuȱLiuȱ(ShandongȱUniversityȬChina)
in the best student paper competition. JinhongȱYuanȱ(UNSWȬAustralia)
TamasȱSziranyiȱ(SZTAKIȱȬHungary)
RichȱSternȱ(CMUȬUSA)
ImportantȱDeadlines: RicardoȱL.ȱdeȱQueirozȱȱ(UNBȬBrazil)
P
Proposalsȱforȱspecialȱsessionsȱ
l f i l i 15 D 2010
15ȱDecȱ2010
Proposalsȱforȱtutorials 18ȱFeb 2011
Electronicȱsubmissionȱofȱfullȱpapers 21ȱFeb 2011
Notificationȱofȱacceptance 23ȱMay 2011
SubmissionȱofȱcameraȬreadyȱpapers 6ȱJun 2011
Webpage:ȱwww.eusipco2011.org