CAREER: Taming Wireless Devices Cross-Layer Errors with Assistive Networked Edges
Project Synopsis
Wireless devices are inherently faulty due
to imperfect electronics and noisy environments, which can result in multifaceted data
errors in computing, caching, and communications (C3). These errors have been widely
deemed harmful, so a great number of error-control mechanisms are built into wireless
devices’ hardware and software layers to avoid errors. However, data errors can be
benign or even beneficial to design objectives (e.g., perturbing gradients when training
deep neural networks may help the model escape local optima) while existing
error-control studies that either consider the “worst case” for absolute error removal
or reactively adapt to the dynamics of errors are passive, non-functional, and often
redundant.
Figure 1 shows a demonstrative example of different wireless applications, for which existing designs adjust error-correction margins according to the naturally evolved error modalities (X axis). Clearly, existing designs either waste error-correction margins (yellow-shaded area for error-free applications) or leave random and non-usable errors (dashed area for error-tolerant applications). Motivated by this research gap, this project’s ideology of “turning waste into wealth” by proactively harvesting, rendering, and controlling errors offers an innovation that will push the frontier of the state of the art. This project proposes three research thrusts to achieve this vision.
(1): Harvest and render errors on hierarchical layers of C3
(as rendering techniques);
(2): Design an optimization and control framework to integrate
errors for system gains (as control algorithms);
(3): Design an error-embracing assistive networked edge to
support the error-rendering technique (as networking protocols).
Figure 1 shows a demonstrative example of different wireless applications, for which existing designs adjust error-correction margins according to the naturally evolved error modalities (X axis). Clearly, existing designs either waste error-correction margins (yellow-shaded area for error-free applications) or leave random and non-usable errors (dashed area for error-tolerant applications). Motivated by this research gap, this project’s ideology of “turning waste into wealth” by proactively harvesting, rendering, and controlling errors offers an innovation that will push the frontier of the state of the art. This project proposes three research thrusts to achieve this vision.
In our prior studies
[TMC'19, ICDCS'17], we adopted this idea in an OFDM system as shown in Figure
2. Specifically, IEEE 802.11a adopts a stair-case link adaptation technique in
accordance to the measured SNR. To cope with the worst-case channel conditions, there
always exists unused channel coding capability. In light of it, we intentionally render
some symbol errors by nullifying the transmit power of a selective set of OFDM
sub-carriers - the one that inherently suffers from strong frequency selective fading.
These "silence symbols'' are viewed by the receiver as erasure errors, which can be
corrected by bit interleaving and residual coding capability. Moreover, the
temporal-spectral distribution of “silence symbols” can be encoded to carry extra
information for implicit communications, as shown in Figure 2(b). Based on this design,
we showed significant performance gains in throughput and power saving simultaneously.
Personnel and Collaborators
Research Progress
-
[1]
Privacy By Memory Design: Visions and Open Problems
J. Liu, N. Gong, to appear at IEEE MICRO (IEEE MICRO).
-
[2]
A Secure and Efficient Protocol for LoRa Using
Cryptographic Hardware Accelerators
S. Puckett, J. Liu, Y. Seong-Moo, and T. Morris, to appear at IEEE Internet of Things Journal (IEEE IoT-J).
-
[3]
Towards Anonymous yet Accountable Authentication for Public Wi-Fi
Hotspot Access with Permissionless Blockchains
Y. Niu, L. Wei, C. Zhang, J. Liu, and Y. Fang, IEEE Transactions on Vehicular Technology (IEEE TVT), Vol. 72, no. 3, pp. 3904-3913, 2023.
-
[4]
Privacy Preservation in Multi-Cloud Secure Data Fusion for
Infectious-Disease Analysis
J. Liu, C. Zhang, K. Xue, and Y. Fang, IEEE Transactions on Mobile Computing (IEEE TMC), Vol. 22, no. 7, pp. 4212-4222, 2023.
Education and Outreach Activities
under development
Disclaimer
Any opinions, findings, and conclusions or recommendations expressed in this
material are those of the author(s) and do not necessarily reflect the views of the National
Science Foundation.