Moritz Wiese’s research while affiliated with Technical University of Munich and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (61)


Exploiting Beamforming for Enforcing Semantic Secrecy in 5G NR mmWave Communications
  • Preprint
  • File available

April 2025

·

4 Reads

Luis Torres-Figueroa

·

Johannes Voichtleitner

·

Ullrich J. Mönich

·

[...]

·

Holger Boche

We experimentally investigate the performance of semantically-secure physical layer security (PLS) in 5G new radio (NR) mmWave communications during the initial cell search procedure in the NR band n257 at 27 GHz. A gNB transmits PLS-encoded messages in the presence of an eavesdropper, who intercepts the communication by non-intrusively collecting channel readings in the form of IQ samples. For the message transmission, we use the physical broadcast channel (PBCH) within the synchronization signal block. We analyze different signal-to-noise ratio (SNR) conditions by progressively reducing the transmit power of the subcarriers carrying the PBCH channel, while ensuring optimal conditions for over-the-air frequency and timing synchronization. We measure the secrecy performance of the communication in terms of upper and lower bounds for the distinguishing error rate (DER) metric for different SNR levels and beam angles when performing beamsteering in indoor scenarios, such as office environments and laboratory settings.

Download

SE(3)$-Based Trajectory Optimization and Target Tracking in UAV-Enabled ISAC Systems

January 2025

·

8 Reads

This paper introduces a novel approach to enhance the performance of UAV-enabled integrated sensing and communication (ISAC) systems. By integrating uniform planar arrays (UPAs) and modeling the UAV as a rigid body using SE(3), the study addresses key challenges in existing ISAC frameworks, such as rigid-body dynamics and trajectory design. We propose a target tracking scheme based on extended Kalman filtering (EKF) in SE(3) and trajectory optimization from a control signal design perspective, leveraging the conditional Posterior Cramer-Rao bound (CPCRB) to optimize performance. Numerical results demonstrate the effectiveness of the proposed method in improving target tracking and trajectory optimization for a UAV-enabled MIMO-OFDM ISAC system.


Uniform Common Randomness Generation over Arbitrary Point-to-Point Channels

January 2025

·

2 Reads

IEEE Transactions on Information Theory

We consider a standard two-source model for uniform common randomness (UCR) generation, in which two terminals (Terminal A and Terminal B) observe independent and identically distributed (i.i.d.) samples of a correlated finite source, and where Terminal A is allowed to send information to Terminal B over an arbitrary single-user channel. We provide a general theoretical framework, from which the proofs of a general formula for the UCR capacity and general bounds on the ϵ-UCR capacity of the specified model follow as special cases. The UCR capacity is defined as the maximum achievable CR rate such that the two terminals can agree on a common uniform or nearly uniform random variable with probability arbitrarily close to one, whereas the ϵ-UCR capacity is defined as the maximum CR rate that can be achieved such that the probability that the two terminals do not agree on a common uniform or nearly uniform random variable does not exceed ϵ, where 0 < ϵ < 1 is fixed. The established general formula for the UCR capacity depends on a formula characterizing the transmission capacity of arbitrary point-to-point channels, as elaborated by Verdú and Han. The derived general lower and upper bounds on the ϵ- UCR capacity depend on corresponding lower and upper bounds on the ϵ-transmission capacity, as proved by Verdú and Han for arbitrary point-to-point channels. Since we are considering general channels, the derived bounds are equal except possibly for at most countably many points, where discontinuity issues might arise. We further provide two examples of channels for which the established bounds are equal and investigate the left-continuity and monotonicity of the derived lower bound.







εε\varepsilon -Almost collision-flat universal hash functions and mosaics of designs

November 2023

·

4 Reads

·

2 Citations

Designs Codes and Cryptography

We introduce, motivate and study ε\varepsilon ε -almost collision-flat universal (ACFU) hash functions f:X×SAf:\mathcal X\times \mathcal S\rightarrow \mathcal A f : X × S → A . Their main property is that the number of collisions in any given value is bounded. Each ε\varepsilon ε -ACFU hash function is an ε\varepsilon ε -almost universal (AU) hash function, and every ε\varepsilon ε -almost strongly universal (ASU) hash function is an ε\varepsilon ε -ACFU hash function. We study how the size of the seed set S\mathcal S S depends on ε,X\varepsilon ,|\mathcal X | ε , | X | and A|\mathcal A | | A | . Depending on how these parameters are interrelated, seed-minimizing ACFU hash functions are equivalent to mosaics of balanced incomplete block designs (BIBDs) or to duals of mosaics of quasi-symmetric block designs; in a third case, mosaics of transversal designs and nets yield seed-optimal ACFU hash functions, but a full characterization is missing. By either extending S\mathcal S S or X\mathcal X X , it is possible to obtain an ε\varepsilon ε -ACFU hash function from an ε\varepsilon ε -AU hash function or an ε\varepsilon ε -ASU hash function, generalizing the construction of mosaics of designs from a given resolvable design (Gnilke et al. in Des. Codes Cryptogr. 86(1):85–95, 2017). The concatenation of an ASU and an ACFU hash function again yields an ACFU hash function. Finally, we motivate ACFU hash functions by their applicability in privacy amplification.


A Proof of a Single-Letter Capacity Formula for MIMO Gauss-Markov Rayleigh Fading Channels

November 2023

·

15 Reads

·

1 Citation

IEEE Transactions on Information Theory

Over the past decades, the problem of communication over finite-state Markov channels (FSMCs) has been investigated in many works and the capacity of FSMCs has been studied in closed form under the assumption of the availability of partial/complete channel state information at the sender and/or the receiver. In our work, we focus on infinite-state Markov channels by investigating the problem of message transmission over time-varying single-user multiple-input multiple-output (MIMO) Gauss-Markov Rayleigh fading channels, as an example of MIMO ergodic Rayleigh fading channels, with average power constraint and with complete channel state information available at the receiver side (CSIR). We prove a single-letter formula for the channel capacity and in particular the formula pointed out by Telatar for the channel capacity of MIMO ergodic Rayleigh fading channels for the case when the Gaussian noise is uncorrelated across antennas.


Citations (38)


... We employ the code construction introduced in [21], which outperforms other existing secrecy encoders [22] and achieves semantic security [7]. This is, to the best of our knowledge, the strongest secrecy metric in the literature, since it does not pose any restriction on Eve's attack strategies. ...

Reference:

Exploiting Beamforming for Enforcing Semantic Secrecy in 5G NR mmWave Communications
Comparison of universal hash functions for physical layer security in wiretap channels
  • Citing Conference Paper
  • September 2024

... Progress in ID schemes can leverage resources such as quantum entanglement [22], [23], common randomness (CR) [24], [25], [26], and feedback [27]. Particularly, feedback could have significant applications in MC systems [28], [29], especially in medical treatment [30], [31] and precisely controlling cellular processes using injected nanomachines [32]. ...

Common Randomness Generation from Finite Compound Sources
  • Citing Conference Paper
  • July 2024

... Additionally, it is demonstrated that the proposed algorithms can be further enhanced by incorporating cyclic redundancy check bits and parity check bits, such as those generated when using polar codes or LDPC codes in accordance with the 5G standard. Furthermore, the compatibility of these algorithms with both polar codes and LDPC codes is illustrated [52]. The results have just been published in [55] and show an interesting connection to combinatorics. ...

Improving Upper and Lower Bounds for the Security Performance of Wiretap Channels
  • Citing Conference Paper
  • December 2023

... With the introduction of semantic security in [7], a more rigorous security metric which can be quantified in practical settings thanks to its operational meaning has been used for PLS code design, whose performance in FR1 has been evaluated for additive white Gaussian noise (AWGN) [8]- [10] and fading channels [11] by using a seeded modular coding scheme, this at the cost of a negligible latency overhead [12]. Further, in [13] semantic security is analytically evaluated for indoor terahertz (THz) scenarios based on the channel resolvability; although the authors do not use any explicit code construction. ...

Semantic Secrecy Assessment of Physical Layer Security in 5G NR Uplink Transmissions Under Fading Channel Conditions
  • Citing Conference Paper
  • December 2023

... Caspar had already highlighted the significance of common randomness generation in the context of message identification, noting its role in enhancing identification capacity. Building on this foundation, Wafa began her session by elaborating on the model of common randomness generation [8,9,10]. She then transitioned into a discussion on correlated assisted message identification, explaining how these concepts interlink to optimize identification processes. ...

Common Randomness Generation from Sources with Countable Alphabet
  • Citing Conference Paper
  • May 2023

... This work was presented in part at the 2023 IEEE International Symposium on Information Theory and at the 29th Nordic Congress of Mathematicians. A short and preliminary version of this paper is [31]. It mainly contains: two of the lower bounds on the size of an ACFU hash function (Theorem 3.4) without proof; a less general version of Theorem 4.1, which shows how to construct an ACFU hash function from an almost universal hash function; all examples without the discussion of their design-theoretic properties; a discussion of the application of ACFU hash functions to privacy amplification which is more detailed than here (Section 5) and gives a better bound on the attained security level. ...

ε-Almost Collision-Flat Universal Hash Functions Motivated by Information-Theoretic Security
  • Citing Conference Paper
  • June 2023

... The single-letter capacity formula for MIMO Gauss-Markov fading channels is proved, especially for the case where the noise is uncorrelated across antennas, and a general capacity expression is derived [2]. However, there is little analysis of the factors affecting the security capacity of the wiretap channel and its impact on wireless communication. ...

A Proof of a Single-Letter Capacity Formula for MIMO Gauss-Markov Rayleigh Fading Channels
  • Citing Article
  • November 2023

IEEE Transactions on Information Theory

... With the introduction of semantic security in [7], a more rigorous security metric which can be quantified in practical settings thanks to its operational meaning has been used for PLS code design, whose performance in FR1 has been evaluated for additive white Gaussian noise (AWGN) [8]- [10] and fading channels [11] by using a seeded modular coding scheme, this at the cost of a negligible latency overhead [12]. Further, in [13] semantic security is analytically evaluated for indoor terahertz (THz) scenarios based on the channel resolvability; although the authors do not use any explicit code construction. ...

Statistical verification of upper and lower bounds for the security performance of wiretap channels
  • Citing Conference Paper
  • March 2023

... He also provided this formula for cases where the channel to the eavesdropper is strongly degraded, strongly noisier, or significantly less capable compared to the main channel. Furthermore, he compared these results to the random code secrecy capacity under different conditions: with the maximum error criterion but without non-causal side information at the jammer, with the maximum error criterion and non-causal side information of the messages at the jammer, and with the average error criterion without non-causal side information at the jammer [31]. We were able to persuade Christian to share his musical talents by giving a concert. ...

Arbitrarily Varying Wiretap Channels With Non-Causal Side Information at the Jammer

IEEE Transactions on Information Theory

... With the introduction of semantic security in [7], a more rigorous security metric which can be quantified in practical settings thanks to its operational meaning has been used for PLS code design, whose performance in FR1 has been evaluated for additive white Gaussian noise (AWGN) [8]- [10] and fading channels [11] by using a seeded modular coding scheme, this at the cost of a negligible latency overhead [12]. Further, in [13] semantic security is analytically evaluated for indoor terahertz (THz) scenarios based on the channel resolvability; although the authors do not use any explicit code construction. ...

Implementation of Physical Layer Security into 5G NR Systems and E2E Latency Assessment
  • Citing Conference Paper
  • December 2022