Towards the limits: Sensing Capability Measurement for ISAC Through Channel Encoder

Fei Shang\orcidlink0000000254958869\orcidlink0000000254958869{}^{\orcidlink{0000-0002-5495-8869}}start_FLOATSUPERSCRIPT 0000 - 0002 - 5495 - 8869 end_FLOATSUPERSCRIPT
University of Science and Technology of China
[email protected]
&Haohua Du\orcidlink0000000284923990\orcidlink0000000284923990{}^{\orcidlink{0000-0002-8492-3990}}start_FLOATSUPERSCRIPT 0000 - 0002 - 8492 - 3990 end_FLOATSUPERSCRIPT
Beihang University
[email protected]
&Panlong Yang\orcidlink0000000310572793\orcidlink0000000310572793{}^{\orcidlink{0000-0003-1057-2793}}start_FLOATSUPERSCRIPT 0000 - 0003 - 1057 - 2793 end_FLOATSUPERSCRIPT
Nan**g University of Information Science and Technology
[email protected]
&Xin He\orcidlink0000000201254171\orcidlink0000000201254171{}^{\orcidlink{0000-0002-0125-4171}}start_FLOATSUPERSCRIPT 0000 - 0002 - 0125 - 4171 end_FLOATSUPERSCRIPT
Nan**g University of Information Science and Technology
[email protected]
&Wen Ma\orcidlink0000000256134134\orcidlink0000000256134134{}^{\orcidlink{0000-0002-5613-4134}}start_FLOATSUPERSCRIPT 0000 - 0002 - 5613 - 4134 end_FLOATSUPERSCRIPT
Beihang University
[email protected]
&Xiang-Yang Li\orcidlink0000000260706625\orcidlink0000000260706625{}^{\orcidlink{0000-0002-6070-6625}}start_FLOATSUPERSCRIPT 0000 - 0002 - 6070 - 6625 end_FLOATSUPERSCRIPT
University of Science and Technology of China
[email protected]
Abstract

Integrated Sensing and Communication (ISAC) is gradually becoming a reality due to the significant increase in frequency and bandwidth of next-generation wireless communication technologies. Therefore it becomes crucial to evaluate the communication and sensing performance using appropriate channel models to address resource competition from each other. Existing work only models the sensing capability based on the mutual information between the channel response and the received signal, and its theoretical resolution is difficult to support the high-precision requirements of ISAC for sensing tasks, and may even affect its communication optimal.

In this paper, we propose a sensing channel encoder model to measure the sensing capacity with higher resolution by discrete task mutual information. For the first time, derive upper and lower bounds on the sensing accuracy for a given channel. This model not only provides the possibility of optimizing the ISAC systems at a finer granularity and balancing communication and sensing resources, but also provides theoretical explanations for classical intuitive feelings (like more modalities more accuracy) in wireless sensing. Furthermore, we validate the effectiveness of the proposed channel model through real-case studies, including person identification, displacement detection, direction estimation, and device recognition. The evaluation results indicate a Pearson correlation coefficient exceeding 0.9 between our task mutual information and conventional experimental metrics (e.g., accuracy).111This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible.

Keywords ISAC  \cdot sensing channel \cdot wireless sensing \cdot mutual information

1 Introduction

The recent development of next-generation (5G-Advanced and 6G) communication technology motivates the integrated sensing and communication (ISAC) studies from various perspectives, such as the localization models Sayed et al. (2005); Shen et al. (2010); Wang et al. (2018a), the power and sub-channel allocation algorithms Phunchongharn et al. (2013); Zhang et al. (2017), the dual-functional waveforms design Zhang et al. (2024) and so on. ISAC has been conceptualized, designed, and optimized for making communication and sensing functions complementary to each other.

However, the goal of wireless communication is to minimize the impact of channel noise within the Shannon’s limit, while the goal of wireless sensing is to utilize the channel noise and then to identify the entities or the corresponding nature of the channel. The different goals bring the inherent trade-off between communication and sensing performance when integrating them together. To better address such resource competition from each other, it is essential to quantify the ability to communicate and sense under a given channel. The communication aspects can be bounded by Shannon’s theorem, but the sensing part lacks unified and efficient theory support. Existing work on sensing theory suffers from deficiencies in different aspects, such as limited applicable tasks Shen et al. (2010) and incomplete evaluation metrics Zhang et al. (2024); Phunchongharn et al. (2013).

In the present paper, we will theoretically analyze the sensing capability and measure it based channel encoder model. The core problem of wireless sensing is that of reproducing via the interfered signals at the receiver either exactly or approximately the interfering source, considered as the sensed object. As illustrated in Fig 1, the ISAC system can be formulated by 𝐘=𝐇𝐗+𝐍𝐘𝐇𝐗𝐍\mathbf{Y}=\mathbf{H}\mathbf{X}+\mathbf{N}bold_Y = bold_HX + bold_N, where 𝐘𝐘\mathbf{Y}bold_Y is the received signal, 𝐗𝐗\mathbf{X}bold_X is the transmitted signal, 𝐇𝐇\mathbf{H}bold_H is the channel status, and 𝐍𝐍\mathbf{N}bold_N is the noise that might be introduced by sensed objects.

Refer to caption
Figure 1: Schematic diagram of a general ISAC system.

Intuitively, the system sensing capability can be evaluated by analyzing how the received signals reflect the channel status, such as sensing mutual information I(𝐇;𝐘)𝐼𝐇𝐘I(\mathbf{H};\mathbf{Y})italic_I ( bold_H ; bold_Y ) Liu et al. (2021a); Zhang et al. (2021). But it doesn’t work well for the following two reasons. First, it is difficult to obtain complete information about the signal itself, we can only identify the sensory objects by analyzing several received signal features, such as the time-of-arrival (TOA), angle-of-arrival (AOA) and received signal strength (RSS). The relationship between the sensing capability of such features and the signal itself is ambiguous. For example, when containing the same level of noise, the AoA estimation error is related to the orientation of the antenna array Tai et al. (2019), as shown in Fig 2. Second, frequently the sensed objects have various types, including moving entities placed in the channel, temperature or humidity fields affecting the channel, etc. The sensing capability analysis must be designed to operate for all possible types, not just the one that will actually be chosen since this is unknown at the time of design.

Fortunately, if the number of signal features and object types in the sets is finite, then the monotone function of the map** between them can be regarded as a measure of the sensing capability when the pair is chosen from the sets. The most natural choice of such a monotone function is still mutual information for various reasons:

  1. 1.

    It is suitable to the communication theorem and thus easier to integrate. The ultimate goal of sensing capability assessment is to provide an optimization basis for the trade-off between communication and sensing in ISAC systems so that entropy-based methods can achieve calculations more efficiently.

  2. 2.

    It evaluates the amount of information contained in one random variable about another random variable, which is nearer to our intuitive feeling as to the proper measure for sensing: how much information is obtained in the observed signal features about the sensed object.

In this paper, we propose a general sensing channel encoder model to help determine the sensing capability – the upper bound and lower bound of error in restoring the sensed object from given wireless signal features. Main contributions are as following:

Refer to caption
Figure 2: Due to the nonlinear relationship between AoA and the phase change of received signals, even with comparable capabilities in estimating channel responses, there can still be order-of-magnitude differences in the estimation error of AoA when the orientation of the antenna array varies..
  • We propose a sensing channel encoder model to describe the sensing system, and derive the fundamental limits of specific sensing objects under given signal features, in terms of a performance measure called discrete task mutual information (DTMI). This approach unifies such information from different features in a canonical form as a weighted sum associated with the weights characterizing the information intensity.

  • Based on DTMI, we first provide upper and lower bounds of sensing errors for ubiquitous sensing systems and give a sufficient condition for lossless sensing. It enhances the interpretability of current sensing systems and can be further used to guide the problem of resource allocation for communication and sensing in ISAC systems.

  • We validate the effectiveness of the proposed sensing system model in several real-world cases, including binary classification tasks such as Wi-Fi-based human identification and RFID-based displacement detection, and multi-classification tasks such as direction sensing based on electromagnetic signals and device identification based on traffic features. The experiment results show that the consistency between our proposed sensing capability evaluation method and the actual task results is up to 0.9 (Pearson correlation coefficient).

The rest of the paper is organized as follows. Section 2 reviews the related work. We introduce the sensing channel encoder model in Section 3. In Section 4, we give a theoretical explanation for some classical phenomena in sensing systems. Finally, we evaluate its performance in real examples in Section 5.

2 Related work

2.1 Sensing systems based on communication devices.

ISAC is widely acknowledged as a pivotal enabler for a myriad of emerging applications, encompassing smart manufacturing, smart homes, and smart cities Bliss (2014). The deployment of professional sensing equipment on a large scale is often impeded by their substantial size and high costs.In the context of the burgeoning Internet of Things (IoT), a multitude of endpoints, originally intended for communication purposes such as WiFi, speakers and microphones, RFID, among others, have gained prominence due to their abundance and cost-effectiveness in comparison to specialized equipment. Consequently, a growing number of researchers and practitioners are exploring the use of these devices for sensing tasks. These applications range from localization and trajectory tracking to material identification and health monitoring.

(1) Localization and trajectory tracking. The proliferation of wireless devices, coupled with the development of wireless network infrastructure, has led to a significant increase in their deployment within both workplaces and homes. Recently, there has been a notable trend towards employing these communication devices for mobile trajectory tracking. Wi-Fi based systems Wang et al. (2018b); Kotaru et al. (2017) use Channel State Information/Received Signal Strength Indicator (CSI/RSSI) for localization Kotaru et al. (2017); Qian et al. (2017); Ali et al. (2015), gesture tracking Wang et al. (2018b); Yu et al. (2018), gesture recognition Ali et al. (2015); Tan and Yang (2016); Abdelnasser et al. (2015), etc. Within this context, Widar Qian et al. (2017) quantifies the relationship between CSI dynamic changes and user location and speed to achieve an average position error of \qty25cm. RFID-based systems can achieve centimeter-level tracking accuracy using phase-based methods Yang et al. ; Adib and Katabi (2013); Wang et al. (2018c, 2014, 2016); Chang et al. (2018). For instance, RF-IDraw Wang et al. (2014) utilizes interference techniques to measure the relative phase between multiple RFID readers, while Tadar Adib and Katabi (2013) achieves through-wall tracking by exploiting multipath signal variations caused by human movement. Tagoram Yang et al. uses the concept of "virtual antennas" and phase holography to map measured phases to possible tag locations and calculates moving trajectories through phase changes. However, the positioning accuracy of these works is influenced by many factors, such as the number of antennas and noise levels. There is still a lack of theoretical means to quantify the impact of these factors on the results.

(2) Material identification. In contrast to professional equipment, which can cost tens of thousands of dollars, radio frequency signal transceivers are comparatively less expensive and compact. This makes them more feasible for deployment in lightweight sensing scenarios such as homes, or large-scale scenarios like warehouses. For instance, we can utilize commercial WiFi signals to detect whether the purchased fruits are ripe Tan and Yang (2021); Liu et al. (2021b). In addition, compared with visible light, the frequency of wireless signals is lower, which makes them have better propagation performance in low light or non-line-of-sight environments. For example, for liquids placed in opaque containers, many radio frequency signal-based systems can identify the solution concentration with a granularity of 1%  Liang et al. (2021); Shang et al. (2022, 2023).

(3) Health monitoring. Both heartbeat and respiratory behavior produce corresponding body-conducted sounds. Consequently, sound has emerged as a significant modality for the sensing of vital signs. Xiong et al. Li et al. (2022, 2020); Liu et al. (2021c) have extended the effective distance of acoustic sensing by utilizing ubiquitous sound waves, achieving accurate personnel tracking, gesture tracking, eye movement tracking, etc. in multiple scenarios. For a long time, auscultation has been an important part of sleep and respiratory related research, so many works use microphones on mobile devices to capture the air-conducted sounds of respiration for snoring detection  Azarbarzin and Moussavi (2010), sleep apnea detection  Yadollahi et al. (2010). Han et al. Han et al. (2023) employ in-ear microphones to facilitate sense and user identity authentication via respiratory behavior analysis. Owing to its non-contact characteristic, radio frequency signals have the potential to alleviate pressure on users during monitoring or sensing processes. This has led to a surge in academic interest in this field in recent years. Wang et al. Wang et al. first propose the Fresnel zone theory of WiFi signal sensing in free space, theoretically exploring the impact of human breathing depth on the reception of radio frequency signals. In addition, Liu et al. Liu et al. (2019) explore the feasibility of using RFID tags to achieve non-contact chest displacement.

However, unlike the performance of communication systems that can be reasonably assessed using theoretical metrics like channel capacity, the current evaluation of sensing system performance largely relies on experimental approaches.

2.2 Performance measurement of the ISAC system.

Traditional research often treats “communication" and “sensing" as two distinct systems. However, a growing body of recent studies has demonstrated that these two concepts are intrinsically interconnected in the context of information theory, forming an intriguing “odd couple" Bliss (2014). In recent years, a significant number of researchers have dedicated their efforts to examining the theoretical performance of systems through the lens of synesthesia. A typical system modeling method is the linear Gaussian model, which is Xiong et al. (2023)

𝐘=𝐇𝐗+𝐍,𝐘𝐇𝐗𝐍\displaystyle\mathbf{Y}=\mathbf{H}\mathbf{X}+\mathbf{N},bold_Y = bold_HX + bold_N , (1)

where 𝐘𝐘\mathbf{Y}bold_Y is the received signal, 𝐗𝐗\mathbf{X}bold_X is the transmitted signal, 𝐇𝐇\mathbf{H}bold_H is the channel matrix, and 𝐍𝐍\mathbf{N}bold_N is the noise matrix. From the perspective of communication, the fundamental problem is how to accurately estimate the transmitted signal 𝐗𝐗\mathbf{X}bold_X from the received signal 𝐘𝐘\mathbf{Y}bold_Y. In accordance with Shannon’s second law, the ultimate performance of a channel is dictated by its capacity. This capacity is intrinsically linked to the mutual information between 𝐗𝐗\mathbf{X}bold_X and 𝐘𝐘\mathbf{Y}bold_Y, denoted as I(𝐗;𝐘)𝐼𝐗𝐘I(\mathbf{X};\mathbf{Y})italic_I ( bold_X ; bold_Y ). From the perspective of sensing, the basic problem is to estimate 𝐇𝐇\mathbf{H}bold_H. Similarly, researchers utilize the mutual information between 𝐇𝐇\mathbf{H}bold_H and 𝐘𝐘\mathbf{Y}bold_Y to characterize system performance Liu et al. (2021a); Zhang et al. (2021).

However, as introduced in Sec. 2.1, we are increasingly unsatisfied with merely sensing the channel response 𝐇𝐇\mathbf{H}bold_H and ubiquitously sensing with communication devices. In this case, mutual information I(𝐘;𝐇)𝐼𝐘𝐇I(\mathbf{Y};\mathbf{H})italic_I ( bold_Y ; bold_H ) cannot fully characterize the sensing performance of the system. For instance, MapFi Tong et al. (2021) shows that under the same estimation level for 𝐇𝐇\mathbf{H}bold_H, the accuracy of localization using angle of arrival varies with different orientations of the antenna array. Moreover, traditional channel theory is often based on Shannon’s second law, which assumes that the random variables used for encoding are independent and identically distributed, a condition difficult to meet when conducting ubiquitous sensing. Therefore, we need to construct a new channel model to adapt to the increasingly developed integrated communication and sensing systems.

3 Sensing channel encoder model

Sensing of discrete status finds broad applications in both industrial production and daily life scenarios, encompassing areas such as material identification, image recognition, and human presence detection. In this section, we establish a discrete sensing channel encoder model to analyze the system’s sensing capability. Our analysis reveals that, with the status to be sensed being fixed, the DTMI directly dictates the lower and upper bounds of the expected sensing error. Proceeding forward, we first introduce the definitions related to the discrete sensing channel encoder model, followed by an exploitation of DTMI to analyze the lower and upper bounds of the expected sensing error.

Refer to caption
Figure 3: Sensing channel encoder.

3.1 Model definitions.

A typical sensing process often comprises several components: the target status to be sensed (W𝑊Witalic_W), the feature (Xnsuperscript𝑋𝑛X^{n}italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT) designed to sense the status, the sensing channel embedding (Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT) obtained through the sensing system, and the outcome (W^^𝑊\hat{W}over^ start_ARG italic_W end_ARG) derived after processing the signal. We analyze the sensing system as shown in the Fig. 3. The status W𝑊Witalic_W has m𝑚mitalic_m possible values, which together form the set 𝒲={w1,,wm}𝒲subscript𝑤1subscript𝑤𝑚\mathcal{W}=\{w_{1},\cdots,w_{m}\}caligraphic_W = { italic_w start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , ⋯ , italic_w start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT }. The probability that the target is in the i𝑖iitalic_i-th status is Pr(W=wi)=p(wi)Pr𝑊subscript𝑤𝑖𝑝subscript𝑤𝑖\Pr(W=w_{i})=p(w_{i})roman_Pr ( italic_W = italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) = italic_p ( italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ). To facilitate the sensing of statuses, we construct n𝑛nitalic_n-dimensional independent features Xnsuperscript𝑋𝑛{X}^{n}italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT to represent the status W𝑊Witalic_W. Given the status as wisubscript𝑤𝑖w_{i}italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, the feature Xn(wi)superscript𝑋𝑛subscript𝑤𝑖X^{n}(w_{i})italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) is given by Xn(wi)=[X1(wi),,Xn(wi)]superscript𝑋𝑛subscript𝑤𝑖subscript𝑋1subscript𝑤𝑖subscript𝑋𝑛subscript𝑤𝑖X^{n}(w_{i})=[X_{1}(w_{i}),\cdots,X_{n}(w_{i})]italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) = [ italic_X start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ( italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) , ⋯ , italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ( italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) ]. Upon transmission and subsequent data processing, the receiver is likely to receive this feature with a probability denoted as p(yn|xn)𝑝conditionalsuperscript𝑦𝑛superscript𝑥𝑛p(y^{n}|x^{n})italic_p ( italic_y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT | italic_x start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ), which we represent as Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT. Subsequently, the receiver assesses the condition of the sensed target utilizing the acquired features Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT and decoding rules g𝑔gitalic_g. The result is given by W^=g(Yn)^𝑊𝑔superscript𝑌𝑛\hat{W}=g(Y^{n})over^ start_ARG italic_W end_ARG = italic_g ( italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ). For instance, in a task of material identification using radio frequency (RF) signals, the targets possess varying materials (W𝑊Witalic_W). We exploit the characteristic that different materials affect RF signals differently to design feature Xnsuperscript𝑋𝑛X^{n}italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, which are related to the amplitude of RF signals. Then, using a receiver that captures electromagnetic waves in the space and processes them according to a sensing algorithm, we acquire the sensing channel embedding denoted as Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT. Finally, based on certain decision rules, we correlate Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT with the corresponding Xnsuperscript𝑋𝑛X^{n}italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT to ascertain the result W^^𝑊\hat{W}over^ start_ARG italic_W end_ARG.

To quantify the performance of the sensing system, we initially define the “conditional error probability" and the “expected value of the error". The former represents the probability that the sensed result does not match the actual status wisubscript𝑤𝑖w_{i}italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT given that the target status is wisubscript𝑤𝑖w_{i}italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, while the latter signifies the expectation of the conditional error probabilities. Furthermore, we introduce several definitions (Definition 4, 5, and 6) to facilitate our analysis of the upper and lower bounds of the expected error value.

Definition 1.

The discrete task mutual information (DTMI) is defined as the mutual information between the feature Xnsuperscript𝑋𝑛X^{n}italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT and the channel embedding Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, i.e., I(Xn;Yn)𝐼superscript𝑋𝑛superscript𝑌𝑛I(X^{n};Y^{n})italic_I ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ; italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ).

Definition 2.

The conditional error probability ξisubscript𝜉𝑖\xi_{i}italic_ξ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT when the target status is wisubscript𝑤𝑖w_{i}italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT is defined as:

ξi=Pr(W^wi|W=wi).subscript𝜉𝑖Pr^𝑊conditionalsubscript𝑤𝑖𝑊subscript𝑤𝑖\xi_{i}=\Pr(\hat{W}\neq w_{i}|W=w_{i}).italic_ξ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = roman_Pr ( over^ start_ARG italic_W end_ARG ≠ italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_W = italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) . (2)
Definition 3.

The expected value of the error, denoted as PEnsuperscriptsubscript𝑃𝐸𝑛P_{E}^{n}italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, is articulated as follows:

PEn=i=1mp(wi)ξi.superscriptsubscript𝑃𝐸𝑛superscriptsubscript𝑖1𝑚𝑝subscript𝑤𝑖subscript𝜉𝑖P_{E}^{n}=\sum_{i=1}^{m}p(w_{i})\xi_{i}.italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT = ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT italic_p ( italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) italic_ξ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT . (3)
Definition 4.

If a sequence Xn=[X1,,Xn]superscript𝑋𝑛subscript𝑋1subscript𝑋𝑛X^{n}=[X_{1},\cdots,X_{n}]italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT = [ italic_X start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , ⋯ , italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ] of length n𝑛nitalic_n, where each dimension is statistically independent of one another, we refer to sequence Xnsuperscript𝑋𝑛X^{n}italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT as an n𝑛nitalic_n-dimensional independent sequence. Their joint probability density function is given by:

p(xn)=Πi=1np(xi).𝑝superscript𝑥𝑛superscriptsubscriptΠ𝑖1𝑛𝑝subscript𝑥𝑖p(x^{n})=\Pi_{i=1}^{n}p(x_{i}).italic_p ( italic_x start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) = roman_Π start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_p ( italic_x start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) . (4)
Definition 5.

For two n𝑛nitalic_n-dimensional independent sequences Xnsuperscript𝑋𝑛X^{n}italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT and Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, if the joint distribution of (Xn,Yn)superscript𝑋𝑛superscript𝑌𝑛(X^{n},Y^{n})( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) is given by

p(xn,yn)=Πi=1np(xi,yi),𝑝superscript𝑥𝑛superscript𝑦𝑛superscriptsubscriptΠ𝑖1𝑛𝑝subscript𝑥𝑖subscript𝑦𝑖p(x^{n},y^{n})=\Pi_{i=1}^{n}p(x_{i},y_{i}),italic_p ( italic_x start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) = roman_Π start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_p ( italic_x start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) , (5)

we refer to (Xn,Yn)superscript𝑋𝑛superscript𝑌𝑛(X^{n},Y^{n})( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) as a n𝑛nitalic_n-dimensional jointly independent sequence.

Definition 6.

The jointly matching set Bε(n)superscriptsubscript𝐵𝜀𝑛B_{\varepsilon}^{(n)}italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT of jointly independent sequence is defined as:

Bε(n)=superscriptsubscript𝐵𝜀𝑛absent\displaystyle B_{\varepsilon}^{(n)}=italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT = {(Xn,Yn)𝒳n×(Y)n:\displaystyle\left\{(X^{n},Y^{n})\in\mathcal{X}^{n}\times\mathcal{(}Y)^{n}:\right.{ ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ∈ caligraphic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT × ( italic_Y ) start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT : (6)
|1nlogp(xn)1ni=1nH(Xi)|<ε1𝑛log𝑝superscript𝑥𝑛1𝑛superscriptsubscript𝑖1𝑛𝐻subscript𝑋𝑖𝜀\displaystyle\left|-\frac{1}{n}\mathrm{log}p(x^{n})-\frac{1}{n}\sum_{i=1}^{n}H% (X_{i})\right|<\varepsilon| - divide start_ARG 1 end_ARG start_ARG italic_n end_ARG roman_log italic_p ( italic_x start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) - divide start_ARG 1 end_ARG start_ARG italic_n end_ARG ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) | < italic_ε
|1nlogp(yn)1ni=1nH(Yi)|<ε1𝑛log𝑝superscript𝑦𝑛1𝑛superscriptsubscript𝑖1𝑛𝐻subscript𝑌𝑖𝜀\displaystyle\left|-\frac{1}{n}\mathrm{log}p(y^{n})-\frac{1}{n}\sum_{i=1}^{n}H% (Y_{i})\right|<\varepsilon| - divide start_ARG 1 end_ARG start_ARG italic_n end_ARG roman_log italic_p ( italic_y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) - divide start_ARG 1 end_ARG start_ARG italic_n end_ARG ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) | < italic_ε
|1nlogp(xn,yn)1ni=1nH(Xi,Yi)|<ε}.\displaystyle\left|\left.-\frac{1}{n}\mathrm{log}p(x^{n},y^{n})-\frac{1}{n}% \sum_{i=1}^{n}H(X_{i},Y_{i})\right|<\varepsilon\right\}.| - divide start_ARG 1 end_ARG start_ARG italic_n end_ARG roman_log italic_p ( italic_x start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) - divide start_ARG 1 end_ARG start_ARG italic_n end_ARG ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) | < italic_ε } .

where (Xn,Yn)superscript𝑋𝑛superscript𝑌𝑛(X^{n},Y^{n})( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) is the n𝑛nitalic_n-dimensional jointly independent sequence. H(Xi)𝐻subscript𝑋𝑖H(X_{i})italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ), H(Yi)𝐻subscript𝑌𝑖H(Y_{i})italic_H ( italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ), and H(Xi,Yi)𝐻subscript𝑋𝑖subscript𝑌𝑖H(X_{i},Y_{i})italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) are the entropy of Xisubscript𝑋𝑖X_{i}italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, Yisubscript𝑌𝑖Y_{i}italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, and (Xi,Yi)subscript𝑋𝑖subscript𝑌𝑖(X_{i},Y_{i})( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ), respectively.

3.2 Lower bound on expected error.

The current evaluation of sensing systems’ performance predominantly relies on experimental assessments. While experimental evaluations are highly effective in gauging system performance, conducting rigorous controlled experiments in real-world scenarios is exceedingly challenging. Consequently, in many instances, it is difficult to ascertain whether the failure to achieve the desired accuracy is due to inadequately designed sensing features or simply unforeseen interference during the data acquisition process. In this section, we give a lower bound on the expected error value based on DTMI, which helps us analyze the ultimate performance of the sensing system.

Theorem 1.

For a sensing task W𝑊Witalic_W with m𝑚mitalic_m statuses, we use n𝑛nitalic_n independent features to describe the status of the target. The expected value of the error PEnsuperscriptsubscript𝑃𝐸𝑛P_{E}^{n}italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT satisfies the following lower bound:

PEn+H(PEn)logmH(W)I(Xn;Yn)logm,superscriptsubscript𝑃𝐸𝑛𝐻superscriptsubscript𝑃𝐸𝑛𝑚𝐻𝑊𝐼superscript𝑋𝑛superscript𝑌𝑛𝑚P_{E}^{n}+\frac{H(P_{E}^{n})}{\log m}\geq\frac{H(W)-I(X^{n};Y^{n})}{\log m},italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT + divide start_ARG italic_H ( italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) end_ARG start_ARG roman_log italic_m end_ARG ≥ divide start_ARG italic_H ( italic_W ) - italic_I ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ; italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) end_ARG start_ARG roman_log italic_m end_ARG , (7)

where H(PEn)=PEnlogPEn(1PEn)log(1PEn)𝐻superscriptsubscript𝑃𝐸𝑛superscriptsubscript𝑃𝐸𝑛superscriptsubscript𝑃𝐸𝑛1superscriptsubscript𝑃𝐸𝑛1superscriptsubscript𝑃𝐸𝑛H(P_{E}^{n})=-P_{E}^{n}\log P_{E}^{n}-(1-P_{E}^{n})\log(1-P_{E}^{n})italic_H ( italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) = - italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT roman_log italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT - ( 1 - italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) roman_log ( 1 - italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ).

Proof.

We first prove that the sensing model we defined forms a Markov chain. Then we combine Fano’s inequality Verdú et al. (1994) and some properties of Markov chains to give a lower bound for PEnsuperscriptsubscript𝑃𝐸𝑛P_{E}^{n}italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT.

Lemma 1.

For the sensing model described in Section 3, the target status W𝑊Witalic_W, the feature Xnsuperscript𝑋𝑛X^{n}italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, the received channel embedding Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, and the sensing result W^^𝑊\hat{W}over^ start_ARG italic_W end_ARG form two Markov chains, i.e., WXnYnW^𝑊superscript𝑋𝑛superscript𝑌𝑛^𝑊W\rightarrow X^{n}\rightarrow Y^{n}\rightarrow\hat{W}italic_W → italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT → italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT → over^ start_ARG italic_W end_ARG and W^YnXnW^𝑊superscript𝑌𝑛superscript𝑋𝑛𝑊\hat{W}\rightarrow Y^{n}\rightarrow X^{n}\rightarrow Wover^ start_ARG italic_W end_ARG → italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT → italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT → italic_W.

Proof.

For a Markov chain, some simple consequences are as follows Cover (1999):

  • If XYZ𝑋𝑌𝑍X\rightarrow Y\rightarrow Zitalic_X → italic_Y → italic_Z is a Markov chain, Z,Y,X𝑍𝑌𝑋Z,Y,Xitalic_Z , italic_Y , italic_X form a Markov chain, i.e., ZYX𝑍𝑌𝑋Z\rightarrow Y\rightarrow Xitalic_Z → italic_Y → italic_X.

  • For three random variables X𝑋Xitalic_X, Y𝑌Yitalic_Y, and Z𝑍Zitalic_Z, if Z=f(Y)𝑍𝑓𝑌Z=f(Y)italic_Z = italic_f ( italic_Y ), then X,Y,Z𝑋𝑌𝑍X,Y,Zitalic_X , italic_Y , italic_Z form a Markov chain, i.e., XYZ𝑋𝑌𝑍X\rightarrow Y\rightarrow Zitalic_X → italic_Y → italic_Z.

According to the deification of sensing model, the feature is a function of the target status, i.e., Xn=f(W)superscript𝑋𝑛𝑓𝑊X^{n}=f(W)italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT = italic_f ( italic_W ); the sensing feature Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT is a function of the status feature Xnsuperscript𝑋𝑛X^{n}italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, i.e., Ynp(yn|xn)similar-tosuperscript𝑌𝑛𝑝conditionalsuperscript𝑦𝑛superscript𝑥𝑛Y^{n}\sim p(y^{n}|x^{n})italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ∼ italic_p ( italic_y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT | italic_x start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ); and the sensing result W^^𝑊\hat{W}over^ start_ARG italic_W end_ARG is a function of the sensing feature Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, i.e., W^=g(Yn)^𝑊𝑔superscript𝑌𝑛\hat{W}=g(Y^{n})over^ start_ARG italic_W end_ARG = italic_g ( italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ). Therefore, the target status W𝑊Witalic_W, the feature Xnsuperscript𝑋𝑛X^{n}italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, the channel embedding Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, and the sensing result W^^𝑊\hat{W}over^ start_ARG italic_W end_ARG form a Markov chain, i.e., WXnYnW^𝑊superscript𝑋𝑛superscript𝑌𝑛^𝑊W\rightarrow X^{n}\rightarrow Y^{n}\rightarrow\hat{W}italic_W → italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT → italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT → over^ start_ARG italic_W end_ARG. Besides, we have W^YnXnW^𝑊superscript𝑌𝑛superscript𝑋𝑛𝑊\hat{W}\rightarrow Y^{n}\rightarrow X^{n}\rightarrow Wover^ start_ARG italic_W end_ARG → italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT → italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT → italic_W. ∎

According to the Fano’s inequality Cover (1999), if three random variables X,Y,Z𝑋𝑌𝑍X,Y,Zitalic_X , italic_Y , italic_Z form a Markov chain, i.e., XYZ𝑋𝑌𝑍X\rightarrow Y\rightarrow Zitalic_X → italic_Y → italic_Z, we have:

Pr(XZ)H(X|Z)H(Pr(XZ))log(|𝒳|).Pr𝑋𝑍𝐻conditional𝑋𝑍𝐻Pr𝑋𝑍𝒳\Pr\left(X\neq Z\right)\geq\frac{H(X|Z)-H(\Pr(X\neq Z))}{\log(|\mathcal{X}|)}.roman_Pr ( italic_X ≠ italic_Z ) ≥ divide start_ARG italic_H ( italic_X | italic_Z ) - italic_H ( roman_Pr ( italic_X ≠ italic_Z ) ) end_ARG start_ARG roman_log ( | caligraphic_X | ) end_ARG . (8)

where H(X|Y)𝐻conditional𝑋𝑌H(X|Y)italic_H ( italic_X | italic_Y ) is the conditional entropy of X𝑋Xitalic_X given Y𝑌Yitalic_Y. For the Markov chain WXnYnW^𝑊superscript𝑋𝑛superscript𝑌𝑛^𝑊W\rightarrow X^{n}\rightarrow Y^{n}\rightarrow\hat{W}italic_W → italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT → italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT → over^ start_ARG italic_W end_ARG, according to the total probability formula and Ferno’s inequality, we have:

PEnsuperscriptsubscript𝑃𝐸𝑛\displaystyle P_{E}^{n}italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT =Pr(W^W)H(W|W^)H(PEn)log(|𝒲|)=H(W)I(W;W^)H(PEn)logmabsentPr^𝑊𝑊𝐻conditional𝑊^𝑊𝐻superscriptsubscript𝑃𝐸𝑛𝒲𝐻𝑊𝐼𝑊^𝑊𝐻superscriptsubscript𝑃𝐸𝑛𝑚\displaystyle=\Pr(\hat{W}\neq W)\geq\frac{H(W|\hat{W})-H(P_{E}^{n})}{\log(|% \mathcal{W}|)}=\frac{H(W)-I(W;\hat{W})-H(P_{E}^{n})}{\log m}= roman_Pr ( over^ start_ARG italic_W end_ARG ≠ italic_W ) ≥ divide start_ARG italic_H ( italic_W | over^ start_ARG italic_W end_ARG ) - italic_H ( italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) end_ARG start_ARG roman_log ( | caligraphic_W | ) end_ARG = divide start_ARG italic_H ( italic_W ) - italic_I ( italic_W ; over^ start_ARG italic_W end_ARG ) - italic_H ( italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) end_ARG start_ARG roman_log italic_m end_ARG (9)

According to the Data-processing inequality Cover (1999), if three random variables X𝑋Xitalic_X, Y𝑌Yitalic_Y, and Z𝑍Zitalic_Z form a Markov chain, XYZ𝑋𝑌𝑍X\rightarrow Y\rightarrow Zitalic_X → italic_Y → italic_Z, then we have I(X;Z)I(X;Y)𝐼𝑋𝑍𝐼𝑋𝑌I(X;Z)\leq I(X;Y)italic_I ( italic_X ; italic_Z ) ≤ italic_I ( italic_X ; italic_Y ), where I(X;Y)𝐼𝑋𝑌I(X;Y)italic_I ( italic_X ; italic_Y ) is the mutual information between X𝑋Xitalic_X and Y𝑌Yitalic_Y. For the Markov chain WXnYnW^𝑊superscript𝑋𝑛superscript𝑌𝑛^𝑊W\rightarrow X^{n}\rightarrow Y^{n}\rightarrow\hat{W}italic_W → italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT → italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT → over^ start_ARG italic_W end_ARG, we have I(W;W^)I(W;Yn)𝐼𝑊^𝑊𝐼𝑊superscript𝑌𝑛I(W;\hat{W})\leq I(W;Y^{n})italic_I ( italic_W ; over^ start_ARG italic_W end_ARG ) ≤ italic_I ( italic_W ; italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ). And for the Markov chain W^YnXnW^𝑊superscript𝑌𝑛superscript𝑋𝑛𝑊\hat{W}\rightarrow Y^{n}\rightarrow X^{n}\rightarrow Wover^ start_ARG italic_W end_ARG → italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT → italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT → italic_W, we have I(Yn;W)I(Yn;Xn)𝐼superscript𝑌𝑛𝑊𝐼superscript𝑌𝑛superscript𝑋𝑛I(Y^{n};W)\leq I(Y^{n};X^{n})italic_I ( italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ; italic_W ) ≤ italic_I ( italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ; italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ). As a result, we have:

I(W;W^)I(Xn;Yn).𝐼𝑊^𝑊𝐼superscript𝑋𝑛superscript𝑌𝑛I(W;\hat{W})\leq I(X^{n};Y^{n}).italic_I ( italic_W ; over^ start_ARG italic_W end_ARG ) ≤ italic_I ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ; italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) . (10)

Substituting Equ. (10) into Equ. (10), we have:

PEn+H(PEn)logmH(W)I(Xn;Yn)logm.superscriptsubscript𝑃𝐸𝑛𝐻superscriptsubscript𝑃𝐸𝑛𝑚𝐻𝑊𝐼superscript𝑋𝑛superscript𝑌𝑛𝑚P_{E}^{n}+\frac{H(P_{E}^{n})}{\log m}\geq\frac{H(W)-I(X^{n};Y^{n})}{\log m}.italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT + divide start_ARG italic_H ( italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) end_ARG start_ARG roman_log italic_m end_ARG ≥ divide start_ARG italic_H ( italic_W ) - italic_I ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ; italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) end_ARG start_ARG roman_log italic_m end_ARG . (11)

3.3 Upper bound on expected error.

In communication, Shannon’s second theorem Shannon (1948) posits that for a given signal, error-free transmission can always be achieved as long as we employ code words that are sufficiently long to encode the message. This issue is equally pertinent in sensing: when the dimensionality n𝑛nitalic_n of the feature is sufficiently large, what is the upper bound on the expected error? In this section, we derive an upper bound based on DTMI (Theorem 2) and provide a sufficient condition under which error-free sensing can be attained (Theorem 3).

Theorem 2.

For a sensing task with m𝑚mitalic_m statuss, we use n𝑛nitalic_n independent features to describe the status of the target. For sufficiently large n𝑛nitalic_n, the expected value of the error PEnsuperscriptsubscript𝑃𝐸𝑛P_{E}^{n}italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT satisfies the following upper bound:

PEnε+k=1mp(wk)jkm23nεi=1nI(Xi(wj);Yi(wk))superscriptsubscript𝑃𝐸𝑛𝜀superscriptsubscript𝑘1𝑚𝑝subscript𝑤𝑘superscriptsubscript𝑗𝑘𝑚superscript23𝑛𝜀superscriptsubscript𝑖1𝑛𝐼subscript𝑋𝑖subscript𝑤𝑗subscript𝑌𝑖subscript𝑤𝑘P_{E}^{n}\leq\varepsilon+\sum_{k=1}^{m}p(w_{k})\sum_{j\neq k}^{m}2^{3n% \varepsilon-\sum_{i=1}^{n}I(X_{i}(w_{j});Y_{i}(w_{k}))}italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ≤ italic_ε + ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT italic_p ( italic_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) ∑ start_POSTSUBSCRIPT italic_j ≠ italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT 2 start_POSTSUPERSCRIPT 3 italic_n italic_ε - ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_I ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) ; italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) ) end_POSTSUPERSCRIPT (12)
Proof.

The expected error PEnsuperscriptsubscript𝑃𝐸𝑛P_{E}^{n}italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT is influenced by the decision rule g𝑔gitalic_g, with the maximum likelihood criterion being a commonly employed rule in practical scenarios. However, for the sake of facilitating analysis, we introduce a novel decision rule defined in conjunction with the matching set Bε(n)superscriptsubscript𝐵𝜀𝑛B_{\varepsilon}^{(n)}italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT (Definition 6), where in the result W^^𝑊\hat{W}over^ start_ARG italic_W end_ARG is determined as wisubscript𝑤𝑖w_{i}italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT whenever the channel embedding Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT and the feature Xn(wi)superscript𝑋𝑛subscript𝑤𝑖X^{n}(w_{i})italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) corresponding to the message wisubscript𝑤𝑖w_{i}italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT form a jointly matching set. Under this rule, we first estimate the probability of Xn,Ynsuperscript𝑋𝑛superscript𝑌𝑛X^{n},Y^{n}italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT constituting a jointly matching set (Lemma 2 to 4) and subsequently present a suboptimal upper bound on the expected error (it is noted that employing alternative decision criteria might yield tighter upper bounds).

The decoding rule g𝑔gitalic_g. To obtain sensing outcomes from Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, we employ the following rule g𝑔gitalic_g:

  • We declare that the target statue is wisubscript𝑤𝑖w_{i}italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT if (Xn(wi),Yn)Bε(n)superscript𝑋𝑛subscript𝑤𝑖superscript𝑌𝑛superscriptsubscript𝐵𝜀𝑛(X^{n}(w_{i}),Y^{n})\in B_{\varepsilon}^{(n)}( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ∈ italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT and there is no other status wjsubscript𝑤𝑗w_{j}italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT such that (Xn(wj),Yn)Bε(n)superscript𝑋𝑛subscript𝑤𝑗superscript𝑌𝑛superscriptsubscript𝐵𝜀𝑛(X^{n}(w_{j}),Y^{n})\in B_{\varepsilon}^{(n)}( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ∈ italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT.

  • If there are multiple statuss wjsubscript𝑤𝑗w_{j}italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT such that (Xn(wj),Yn)Bε(n)superscript𝑋𝑛subscript𝑤𝑗superscript𝑌𝑛superscriptsubscript𝐵𝜀𝑛(X^{n}(w_{j}),Y^{n})\in B_{\varepsilon}^{(n)}( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ∈ italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT or there is no status wisubscript𝑤𝑖w_{i}italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT such that (Xn(wi),Yn)Bε(n)superscript𝑋𝑛subscript𝑤𝑖superscript𝑌𝑛superscriptsubscript𝐵𝜀𝑛(X^{n}(w_{i}),Y^{n})\in B_{\varepsilon}^{(n)}( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ∈ italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT, an error is declared.

To estimate the probability of an event occurring, we first prove the following lemma about matching sets.

Lemma 2.

For a n𝑛nitalic_n-dimensional jointly independent sequence (Xn,Yn)superscript𝑋𝑛superscript𝑌𝑛(X^{n},Y^{n})( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) and a matching set Bε(n)superscriptsubscript𝐵𝜀𝑛B_{\varepsilon}^{(n)}italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT, when n𝑛n\to\inftyitalic_n → ∞, the probability that (Xn,Yn)superscript𝑋𝑛superscript𝑌𝑛(X^{n},Y^{n})( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) is in the matching set Bε(n)superscriptsubscript𝐵𝜀𝑛B_{\varepsilon}^{(n)}italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT is close to 1, which is

Pr((Xn,Yn)Bε(n))1.Prsuperscript𝑋𝑛superscript𝑌𝑛superscriptsubscript𝐵𝜀𝑛1\Pr((X^{n},Y^{n})\in B_{\varepsilon}^{(n)})\to 1.roman_Pr ( ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ∈ italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT ) → 1 . (13)
Proof.

According to the Chebyshev’s Law of Large Numbers, when the number of observations n𝑛nitalic_n is sufficiently large, the sample mean of n𝑛nitalic_n independent and identically distributed random variables converges in probability to their common expected value. Observing that the entropy is essentially the expectation of the logarithm of the reciprocal of probabilities, we leverage these two premises to underpin our proof.

According to Chebyshev’s Law of Large Numbers, given ε>0𝜀0\varepsilon>0italic_ε > 0, there exists n1subscript𝑛1n_{1}italic_n start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT, so that for all n>n1𝑛subscript𝑛1n>n_{1}italic_n > italic_n start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT, the following holds:

P1subscript𝑃1\displaystyle P_{1}italic_P start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT =Pr(|1nlogp(Xn)1ni=1nH(Xi)|ε)absentPr1𝑛𝑝superscript𝑋𝑛1𝑛superscriptsubscript𝑖1𝑛𝐻subscript𝑋𝑖𝜀\displaystyle=\Pr\left(\left|-\frac{1}{n}\log p\left(X^{n}\right)-\frac{1}{n}% \sum_{i=1}^{n}H(X_{i})\right|\geq\varepsilon\right)= roman_Pr ( | - divide start_ARG 1 end_ARG start_ARG italic_n end_ARG roman_log italic_p ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) - divide start_ARG 1 end_ARG start_ARG italic_n end_ARG ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) | ≥ italic_ε ) (14)
=Pr(|1ni=1nlogp(Xi)1ni=1n𝔼(logp(Xi))|ε)<ε3.absentPr1𝑛superscriptsubscript𝑖1𝑛𝑝subscript𝑋𝑖1𝑛superscriptsubscript𝑖1𝑛𝔼𝑝subscript𝑋𝑖𝜀𝜀3\displaystyle=\Pr\left(\left|\frac{1}{n}\sum_{i=1}^{n}\log p\left(X_{i}\right)% -\frac{1}{n}\sum_{i=1}^{n}\mathbb{E}\left(\log p(X_{i})\right)\right|\geq% \varepsilon\right)<\frac{\varepsilon}{3}.= roman_Pr ( | divide start_ARG 1 end_ARG start_ARG italic_n end_ARG ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT roman_log italic_p ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) - divide start_ARG 1 end_ARG start_ARG italic_n end_ARG ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT blackboard_E ( roman_log italic_p ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) ) | ≥ italic_ε ) < divide start_ARG italic_ε end_ARG start_ARG 3 end_ARG .

Similarly, there exists n2subscript𝑛2n_{2}italic_n start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT and n3subscript𝑛3n_{3}italic_n start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT, so that for all n>n2𝑛subscript𝑛2n>n_{2}italic_n > italic_n start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT, the following holds:

P2=Pr(|1nlogp(Yn)1ni=1nH(Yi)|ε)<ε3,subscript𝑃2Pr1𝑛𝑝superscript𝑌𝑛1𝑛superscriptsubscript𝑖1𝑛𝐻subscript𝑌𝑖𝜀𝜀3\displaystyle P_{2}=\Pr\left(\left|-\frac{1}{n}\log p\left(Y^{n}\right)-\frac{% 1}{n}\sum_{i=1}^{n}H(Y_{i})\right|\geq\varepsilon\right)<\frac{\varepsilon}{3},italic_P start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT = roman_Pr ( | - divide start_ARG 1 end_ARG start_ARG italic_n end_ARG roman_log italic_p ( italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) - divide start_ARG 1 end_ARG start_ARG italic_n end_ARG ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) | ≥ italic_ε ) < divide start_ARG italic_ε end_ARG start_ARG 3 end_ARG , (15)

and for all n>n3𝑛subscript𝑛3n>n_{3}italic_n > italic_n start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT, the following holds:

P3subscript𝑃3\displaystyle P_{3}italic_P start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT =Pr(|1nlogp(Xn,Yn)1ni=1nH(Xi,Yi)|ε)<ε3.absentPr1𝑛𝑝superscript𝑋𝑛superscript𝑌𝑛1𝑛superscriptsubscript𝑖1𝑛𝐻subscript𝑋𝑖subscript𝑌𝑖𝜀𝜀3\displaystyle=\Pr\left(\left|-\frac{1}{n}\log p\left(X^{n},Y^{n}\right)-\frac{% 1}{n}\sum_{i=1}^{n}H(X_{i},Y_{i})\right|\geq\varepsilon\right)<\frac{% \varepsilon}{3}.= roman_Pr ( | - divide start_ARG 1 end_ARG start_ARG italic_n end_ARG roman_log italic_p ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) - divide start_ARG 1 end_ARG start_ARG italic_n end_ARG ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) | ≥ italic_ε ) < divide start_ARG italic_ε end_ARG start_ARG 3 end_ARG . (16)

Let n0=max{n1,n2,n3}subscript𝑛0subscript𝑛1subscript𝑛2subscript𝑛3n_{0}=\max\{n_{1},n_{2},n_{3}\}italic_n start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT = roman_max { italic_n start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_n start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , italic_n start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT }, then for all n>n0𝑛subscript𝑛0n>n_{0}italic_n > italic_n start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT, the following holds:

Pr((Xn,Yn)Bε(n))>1(P1+P2+P3)=1ε.Prsuperscript𝑋𝑛superscript𝑌𝑛superscriptsubscript𝐵𝜀𝑛1subscript𝑃1subscript𝑃2subscript𝑃31𝜀\displaystyle\Pr((X^{n},Y^{n})\in B_{\varepsilon}^{(n)})>1-(P_{1}+P_{2}+P_{3})% =1-\varepsilon.roman_Pr ( ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ∈ italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT ) > 1 - ( italic_P start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT + italic_P start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT + italic_P start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT ) = 1 - italic_ε . (17)

Going further, we consider the scenario where (Xn,Yn)superscript𝑋𝑛superscript𝑌𝑛(X^{n},Y^{n})( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) forms a jointly independent sequence (Definition 5), and we examine the probability of them constituting a joint matching set. Initially, drawing upon Definition 6, we estimate the counts of elements in both the matching set and the jointly matching set, which are related to the entropy. Specifically, the number of elements in the matching set for Xnsuperscript𝑋𝑛X^{n}italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT and Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT are approximately 2i=1nH(Xi)superscript2superscriptsubscript𝑖1𝑛𝐻subscript𝑋𝑖2^{\sum_{i=1}^{n}H(X_{i})}2 start_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) end_POSTSUPERSCRIPT and 2i=1nH(Yi)superscript2superscriptsubscript𝑖1𝑛𝐻subscript𝑌𝑖2^{\sum_{i=1}^{n}H(Y_{i})}2 start_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) end_POSTSUPERSCRIPT, respectively, while the count of their joint matching sequences is roughly 2i=1nH(Xi,Yi)superscript2superscriptsubscript𝑖1𝑛𝐻subscript𝑋𝑖subscript𝑌𝑖2^{\sum_{i=1}^{n}H(X_{i},Y_{i})}2 start_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) end_POSTSUPERSCRIPT. Building on this foundation, Lemma 4 furnishes an estimate for the probability that (Xn,Yn)superscript𝑋𝑛superscript𝑌𝑛(X^{n},Y^{n})( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) forms a joint matching set.

Refer to caption
Figure 4: For independent sequences Xnsuperscript𝑋𝑛X^{n}italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT and Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, the number of elements in their jointly matching set is approximately 2i=1nH(Xi,Yi)superscript2superscriptsubscript𝑖1𝑛𝐻subscript𝑋𝑖subscript𝑌𝑖2^{\sum_{i=1}^{n}H(X_{i},Y_{i})}2 start_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) end_POSTSUPERSCRIPT. We decode the channel embedding as w^ksubscript^𝑤𝑘\hat{w}_{k}over^ start_ARG italic_w end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT when Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT forms a joint matching sequence with only one feature Xn(wk)superscript𝑋𝑛subscript𝑤𝑘X^{n}(w_{k})italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ).
Lemma 3.

The upper bound of the number of elements in the matching set of jointly independent sequence Bε(n)superscriptsubscript𝐵𝜀𝑛B_{\varepsilon}^{(n)}italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT is given by:

|Bε(n)|2nε+i=1nH(Xi,Yi),superscriptsubscript𝐵𝜀𝑛superscript2𝑛𝜀superscriptsubscript𝑖1𝑛𝐻subscript𝑋𝑖subscript𝑌𝑖\left|B_{\varepsilon}^{(n)}\right|\leq 2^{n\varepsilon+\sum_{i=1}^{n}H(X_{i},Y% _{i})},| italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT | ≤ 2 start_POSTSUPERSCRIPT italic_n italic_ε + ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) end_POSTSUPERSCRIPT , (18)

where H(Xi,Yi)𝐻subscript𝑋𝑖subscript𝑌𝑖H(X_{i},Y_{i})italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) is the entropy of (Xi,Yi)subscript𝑋𝑖subscript𝑌𝑖(X_{i},Y_{i})( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ), and |.||.|| . | denotes the number of elements in the set.

Proof.

According to the Definition 6, if (Xn,Yn)Bε(n)superscript𝑋𝑛superscript𝑌𝑛superscriptsubscript𝐵𝜀𝑛(X^{n},Y^{n})\in B_{\varepsilon}^{(n)}( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ∈ italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT, we have:

p(xn,yn)2nεi=1nH(Xi,Yi).𝑝superscript𝑥𝑛superscript𝑦𝑛superscript2𝑛𝜀superscriptsubscript𝑖1𝑛𝐻subscript𝑋𝑖subscript𝑌𝑖p(x^{n},y^{n})\geq 2^{-n\varepsilon-\sum_{i=1}^{n}H(X_{i},Y_{i})}.italic_p ( italic_x start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ≥ 2 start_POSTSUPERSCRIPT - italic_n italic_ε - ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) end_POSTSUPERSCRIPT . (19)

As a result,

1=(xn,yn)𝒳n×(Y)np(xn,yn)(xn,yn)Bε(n)p(xn,yn)2nεi=1nH(Xi,Yi)|Bε(n)|.1subscriptsuperscript𝑥𝑛superscript𝑦𝑛superscript𝒳𝑛superscript𝑌𝑛𝑝superscript𝑥𝑛superscript𝑦𝑛subscriptsuperscript𝑥𝑛superscript𝑦𝑛superscriptsubscript𝐵𝜀𝑛𝑝superscript𝑥𝑛superscript𝑦𝑛superscript2𝑛𝜀superscriptsubscript𝑖1𝑛𝐻subscript𝑋𝑖subscript𝑌𝑖superscriptsubscript𝐵𝜀𝑛\displaystyle 1=\sum_{(x^{n},y^{n})\in\mathcal{X}^{n}\times\mathcal{(}Y)^{n}}p% (x^{n},y^{n})\geq\sum_{(x^{n},y^{n})\in B_{\varepsilon}^{(n)}}p(x^{n},y^{n})% \geq 2^{-n\varepsilon-\sum_{i=1}^{n}H(X_{i},Y_{i})}|B_{\varepsilon}^{(n)}|.1 = ∑ start_POSTSUBSCRIPT ( italic_x start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ∈ caligraphic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT × ( italic_Y ) start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT end_POSTSUBSCRIPT italic_p ( italic_x start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ≥ ∑ start_POSTSUBSCRIPT ( italic_x start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ∈ italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT end_POSTSUBSCRIPT italic_p ( italic_x start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ≥ 2 start_POSTSUPERSCRIPT - italic_n italic_ε - ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) end_POSTSUPERSCRIPT | italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT | . (20)

Therefore, we have

|Bε(n)|2nε+i=1nH(Xi,Yi).superscriptsubscript𝐵𝜀𝑛superscript2𝑛𝜀superscriptsubscript𝑖1𝑛𝐻subscript𝑋𝑖subscript𝑌𝑖|B_{\varepsilon}^{(n)}|\leq 2^{n\varepsilon+\sum_{i=1}^{n}H(X_{i},Y_{i})}.| italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT | ≤ 2 start_POSTSUPERSCRIPT italic_n italic_ε + ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) end_POSTSUPERSCRIPT . (21)

Lemma 4.

For a n𝑛nitalic_n-dimensional jointly independent sequence (X^n,Y^n)superscript^𝑋𝑛superscript^𝑌𝑛(\hat{X}^{n},\hat{Y}^{n})( over^ start_ARG italic_X end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , over^ start_ARG italic_Y end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) and a matching set Bε(n)superscriptsubscript𝐵𝜀𝑛B_{\varepsilon}^{(n)}italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT, if (X^n,Y^n)p(xn)p(yn)similar-tosuperscript^𝑋𝑛superscript^𝑌𝑛𝑝superscript𝑥𝑛𝑝superscript𝑦𝑛(\hat{X}^{n},\hat{Y}^{n})\sim p(x^{n})p(y^{n})( over^ start_ARG italic_X end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , over^ start_ARG italic_Y end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ∼ italic_p ( italic_x start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) italic_p ( italic_y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ), i.e., X^nsuperscript^𝑋𝑛\hat{X}^{n}over^ start_ARG italic_X end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT and Y^nsuperscript^𝑌𝑛\hat{Y}^{n}over^ start_ARG italic_Y end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT are independent with the same marginals as p(xn,yn)𝑝superscript𝑥𝑛superscript𝑦𝑛p(x^{n},y^{n})italic_p ( italic_x start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ), then

Pr((X^n,Y^n)Bε(n))23nεi=1nI(Xi;Yi),Prsuperscript^𝑋𝑛superscript^𝑌𝑛superscriptsubscript𝐵𝜀𝑛superscript23𝑛𝜀superscriptsubscript𝑖1𝑛𝐼subscript𝑋𝑖subscript𝑌𝑖\Pr((\hat{X}^{n},\hat{Y}^{n})\in B_{\varepsilon}^{(n)})\leq 2^{3n\varepsilon-% \sum_{i=1}^{n}I(X_{i};Y_{i})},roman_Pr ( ( over^ start_ARG italic_X end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , over^ start_ARG italic_Y end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ∈ italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT ) ≤ 2 start_POSTSUPERSCRIPT 3 italic_n italic_ε - ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_I ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ; italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) end_POSTSUPERSCRIPT , (22)

where I(Xi;Yi)𝐼subscript𝑋𝑖subscript𝑌𝑖I(X_{i};Y_{i})italic_I ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ; italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) is the mutual information between Xisubscript𝑋𝑖X_{i}italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and Yisubscript𝑌𝑖Y_{i}italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT.

Proof.

According to the definition of the jointly matching set, we have:

log(p(xn))nεi=1nH(Xi)𝑝superscript𝑥𝑛𝑛𝜀superscriptsubscript𝑖1𝑛𝐻subscript𝑋𝑖\displaystyle\log(p(x^{n}))\leq n\varepsilon-\sum_{i=1}^{n}H(X_{i})roman_log ( italic_p ( italic_x start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ) ≤ italic_n italic_ε - ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) (23)
log(p(yn))nεi=1nH(Yi)𝑝superscript𝑦𝑛𝑛𝜀superscriptsubscript𝑖1𝑛𝐻subscript𝑌𝑖\displaystyle\log(p(y^{n}))\leq n\varepsilon-\sum_{i=1}^{n}H(Y_{i})roman_log ( italic_p ( italic_y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ) ≤ italic_n italic_ε - ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT )

The probability of a joint independent sequence (X^n,Y^n)superscript^𝑋𝑛superscript^𝑌𝑛(\hat{X}^{n},\hat{Y}^{n})( over^ start_ARG italic_X end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , over^ start_ARG italic_Y end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) in Bεnsuperscriptsubscript𝐵𝜀𝑛B_{\varepsilon}^{n}italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT is given by:

Pr((X^n,Y^n)Bε(n))=(xn,yn)Bε(n)p(xn)p(yn)Prsuperscript^𝑋𝑛superscript^𝑌𝑛superscriptsubscript𝐵𝜀𝑛subscriptsuperscript𝑥𝑛superscript𝑦𝑛superscriptsubscript𝐵𝜀𝑛𝑝superscript𝑥𝑛𝑝superscript𝑦𝑛\displaystyle\Pr((\hat{X}^{n},\hat{Y}^{n})\in B_{\varepsilon}^{(n)})=\sum_{(x^% {n},y^{n})\in B_{\varepsilon}^{(n)}}p(x^{n})p(y^{n})roman_Pr ( ( over^ start_ARG italic_X end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , over^ start_ARG italic_Y end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ∈ italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT ) = ∑ start_POSTSUBSCRIPT ( italic_x start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ∈ italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT end_POSTSUBSCRIPT italic_p ( italic_x start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) italic_p ( italic_y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) (24)
\displaystyle\leq |Bε(n)|2nεi=1nH(Xi)2nεi=1nH(Yi)superscriptsubscript𝐵𝜀𝑛superscript2𝑛𝜀superscriptsubscript𝑖1𝑛𝐻subscript𝑋𝑖superscript2𝑛𝜀superscriptsubscript𝑖1𝑛𝐻subscript𝑌𝑖\displaystyle\left|B_{\varepsilon}^{(n)}\right|2^{n\varepsilon-\sum_{i=1}^{n}H% (X_{i})}2^{n\varepsilon-\sum_{i=1}^{n}H(Y_{i})}| italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT | 2 start_POSTSUPERSCRIPT italic_n italic_ε - ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) end_POSTSUPERSCRIPT 2 start_POSTSUPERSCRIPT italic_n italic_ε - ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_H ( italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) end_POSTSUPERSCRIPT
\displaystyle\leq 23nε+i=1n(H(Xi,Yi)H(Xi)H(Yi))superscript23𝑛𝜀superscriptsubscript𝑖1𝑛𝐻subscript𝑋𝑖subscript𝑌𝑖𝐻subscript𝑋𝑖𝐻subscript𝑌𝑖\displaystyle 2^{3n\varepsilon+\sum_{i=1}^{n}(H(X_{i},Y_{i})-H(X_{i})-H(Y_{i}))}2 start_POSTSUPERSCRIPT 3 italic_n italic_ε + ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) - italic_H ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) - italic_H ( italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) ) end_POSTSUPERSCRIPT
=\displaystyle== 23nεi=1nI(Xi;Yi).superscript23𝑛𝜀superscriptsubscript𝑖1𝑛𝐼subscript𝑋𝑖subscript𝑌𝑖\displaystyle 2^{3n\varepsilon-\sum_{i=1}^{n}I(X_{i};Y_{i})}.2 start_POSTSUPERSCRIPT 3 italic_n italic_ε - ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_I ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ; italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) end_POSTSUPERSCRIPT .

We first estimate the probability that the sensing result W^^𝑊\hat{W}over^ start_ARG italic_W end_ARG is wrong when the target status is W=wi𝑊subscript𝑤𝑖W=w_{i}italic_W = italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT. We can assume without loss of generality that the target status is w1subscript𝑤1w_{1}italic_w start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT. We consider the following events:

Ci={(Xn(wi),Yn(w1))Bε(n)},i{1,,m}.formulae-sequencesubscript𝐶𝑖superscript𝑋𝑛subscript𝑤𝑖superscript𝑌𝑛subscript𝑤1superscriptsubscript𝐵𝜀𝑛𝑖1𝑚C_{i}=\left\{(X^{n}(w_{i}),Y^{n}(w_{1}))\in B_{\varepsilon}^{(n)}\right\},% \quad i\in\{1,\cdots,m\}.italic_C start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = { ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) , italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ) ) ∈ italic_B start_POSTSUBSCRIPT italic_ε end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_n ) end_POSTSUPERSCRIPT } , italic_i ∈ { 1 , ⋯ , italic_m } . (25)

where yn(1)superscript𝑦𝑛1y^{n}(1)italic_y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( 1 ) is the received channel embedding when the target status is w1subscript𝑤1w_{1}italic_w start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT. Based on the decision rule and Definition 2, the conditional error probability at this point is given by:

ξ1subscript𝜉1\displaystyle\xi_{1}italic_ξ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT =Pr(C1¯i=2mCi)Pr(C1¯)+i=2mPr(Ci),absent𝑃𝑟¯subscript𝐶1superscriptsubscript𝑖2𝑚subscript𝐶𝑖𝑃𝑟¯subscript𝐶1superscriptsubscript𝑖2𝑚𝑃𝑟subscript𝐶𝑖\displaystyle=Pr\left(\bar{C_{1}}\bigcup_{i=2}^{m}C_{i}\right)\leq Pr\left(% \bar{C_{1}}\right)+\sum_{i=2}^{m}Pr\left(C_{i}\right),= italic_P italic_r ( over¯ start_ARG italic_C start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_ARG ⋃ start_POSTSUBSCRIPT italic_i = 2 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT italic_C start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) ≤ italic_P italic_r ( over¯ start_ARG italic_C start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_ARG ) + ∑ start_POSTSUBSCRIPT italic_i = 2 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT italic_P italic_r ( italic_C start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) , (26)

where C1¯¯subscript𝐶1\bar{C_{1}}over¯ start_ARG italic_C start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_ARG is the complement of C1subscript𝐶1C_{1}italic_C start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT.

According to Lemma 2, we have:

Pr(C1¯)ε.Pr¯subscript𝐶1𝜀\displaystyle\Pr\left(\bar{C_{1}}\right)\leq\varepsilon.roman_Pr ( over¯ start_ARG italic_C start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_ARG ) ≤ italic_ε . (27)

Besides, for j{2,,m}𝑗2𝑚j\in\{2,\cdots,m\}italic_j ∈ { 2 , ⋯ , italic_m }, the feature Xn(wj)superscript𝑋𝑛subscript𝑤𝑗X^{n}(w_{j})italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) is independent of Xn(w1)superscript𝑋𝑛subscript𝑤1X^{n}(w_{1})italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ), so is Xn(j)superscript𝑋𝑛𝑗X^{n}(j)italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_j ) and Yn(w1)superscript𝑌𝑛subscript𝑤1Y^{n}(w_{1})italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ). Hence, according to Lemma 4, we have:

Pr(Cj)23nεi=1nI(Xi(wj);Yi(w1)).Prsubscript𝐶𝑗superscript23𝑛𝜀superscriptsubscript𝑖1𝑛𝐼subscript𝑋𝑖subscript𝑤𝑗subscript𝑌𝑖subscript𝑤1\displaystyle\Pr\left(C_{j}\right)\leq 2^{3n\varepsilon-\sum_{i=1}^{n}I(X_{i}(% w_{j});Y_{i}(w_{1}))}.roman_Pr ( italic_C start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) ≤ 2 start_POSTSUPERSCRIPT 3 italic_n italic_ε - ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_I ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) ; italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_w start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ) ) end_POSTSUPERSCRIPT . (28)

Substituting the above results into Eq. (26), we have:

ξ1subscript𝜉1\displaystyle\xi_{1}italic_ξ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ε+j=2m23nεi=1nI(Xi(wj);Yi(w1)).absent𝜀superscriptsubscript𝑗2𝑚superscript23𝑛𝜀superscriptsubscript𝑖1𝑛𝐼subscript𝑋𝑖subscript𝑤𝑗subscript𝑌𝑖subscript𝑤1\displaystyle\leq\varepsilon+\sum_{j=2}^{m}2^{3n\varepsilon-\sum_{i=1}^{n}I(X_% {i}(w_{j});Y_{i}(w_{1}))}.≤ italic_ε + ∑ start_POSTSUBSCRIPT italic_j = 2 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT 2 start_POSTSUPERSCRIPT 3 italic_n italic_ε - ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_I ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) ; italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_w start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ) ) end_POSTSUPERSCRIPT . (29)

According to Definition 3, we have:

PEnsuperscriptsubscript𝑃𝐸𝑛\displaystyle P_{E}^{n}italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT =k=1mp(wk)ξkε+k=1mp(wk)jkm23nεi=1nI(Xi(wj);Yi(wk)).absentsuperscriptsubscript𝑘1𝑚𝑝subscript𝑤𝑘subscript𝜉𝑘𝜀superscriptsubscript𝑘1𝑚𝑝subscript𝑤𝑘superscriptsubscript𝑗𝑘𝑚superscript23𝑛𝜀superscriptsubscript𝑖1𝑛𝐼subscript𝑋𝑖subscript𝑤𝑗subscript𝑌𝑖subscript𝑤𝑘\displaystyle=\sum_{k=1}^{m}p(w_{k})\xi_{k}\leq\varepsilon+\sum_{k=1}^{m}p(w_{% k})\sum_{j\neq k}^{m}2^{3n\varepsilon-\sum_{i=1}^{n}I(X_{i}(w_{j});Y_{i}(w_{k}% ))}.= ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT italic_p ( italic_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) italic_ξ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ≤ italic_ε + ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT italic_p ( italic_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) ∑ start_POSTSUBSCRIPT italic_j ≠ italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT 2 start_POSTSUPERSCRIPT 3 italic_n italic_ε - ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_I ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) ; italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) ) end_POSTSUPERSCRIPT . (30)

Finally, Theorem 3 provides a sufficient condition for error-free sensing, indicating that for achieving error-free sensing, a sufficient number of features with high DTMI must be identified 222This requirement diverges from the conclusion in communications, where merely having a sufficient number of codewords is typically sufficient..

Theorem 3.

For a sensing task with m=2nR𝑚superscript2𝑛𝑅m=2^{nR}italic_m = 2 start_POSTSUPERSCRIPT italic_n italic_R end_POSTSUPERSCRIPT statuss, we use n𝑛nitalic_n independent features to describe the status of the target. For a sufficiently large n𝑛nitalic_n, if R𝑅Ritalic_R satisfies the following equation,

R<I(kjX¯n(wk)m1;Y¯n(wj)),𝑅𝐼subscript𝑘𝑗superscript¯𝑋𝑛subscript𝑤𝑘𝑚1superscript¯𝑌𝑛subscript𝑤𝑗R<I\left(\frac{\sum_{k\neq j}\bar{X}^{n}(w_{k})}{m-1};\bar{Y}^{n}(w_{j})\right),italic_R < italic_I ( divide start_ARG ∑ start_POSTSUBSCRIPT italic_k ≠ italic_j end_POSTSUBSCRIPT over¯ start_ARG italic_X end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) end_ARG start_ARG italic_m - 1 end_ARG ; over¯ start_ARG italic_Y end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) ) , (31)

where X¯(wj)¯𝑋subscript𝑤𝑗\bar{X}(w_{j})over¯ start_ARG italic_X end_ARG ( italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) and Y¯(wj)¯𝑌subscript𝑤𝑗\bar{Y}(w_{j})over¯ start_ARG italic_Y end_ARG ( italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) is the mean Xn(wj)superscript𝑋𝑛subscript𝑤𝑗X^{n}(w_{j})italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) and Yn(wj)superscript𝑌𝑛subscript𝑤𝑗Y^{n}(w_{j})italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ), we have ξj0subscript𝜉𝑗0\xi_{j}\rightarrow 0italic_ξ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT → 0.

Proof.

In Theorem 2, we derive an upper bound estimate for the expected error PEnsuperscriptsubscript𝑃𝐸𝑛P_{E}^{n}italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT. Capitalizing on the convexity property of mutual information, we leverage Jensen’s inequality to provide a sufficient condition for a tight error estimation. This approach ensures that our estimate effectively captures the inherent relationship between the variables, harnessing the convexity to yield a more robust and accurate analysis of the error’s expected magnitude without loss of generality.

According to the Jensen’s inequality, if f𝑓fitalic_f is a convex function and X𝑋Xitalic_X is a random variable, we have:

f(𝔼(X))𝔼(f(X)).𝑓𝔼𝑋𝔼𝑓𝑋f(\mathbb{E}(X))\leq\mathbb{E}(f(X)).italic_f ( blackboard_E ( italic_X ) ) ≤ blackboard_E ( italic_f ( italic_X ) ) . (32)

Since the mutual information is a convex function Cover (1999), we have:

nI(X¯n;Y¯n)ni=1n1nI(Xi;Yi),𝑛𝐼superscript¯𝑋𝑛superscript¯𝑌𝑛𝑛superscriptsubscript𝑖1𝑛1𝑛𝐼subscript𝑋𝑖subscript𝑌𝑖nI(\bar{X}^{n};\bar{Y}^{n})\leq n\sum_{i=1}^{n}\frac{1}{n}I(X_{i};Y_{i}),italic_n italic_I ( over¯ start_ARG italic_X end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ; over¯ start_ARG italic_Y end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ≤ italic_n ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT divide start_ARG 1 end_ARG start_ARG italic_n end_ARG italic_I ( italic_X start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ; italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) , (33)

where X¯nsuperscript¯𝑋𝑛\bar{X}^{n}over¯ start_ARG italic_X end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT and Y¯nsuperscript¯𝑌𝑛\bar{Y}^{n}over¯ start_ARG italic_Y end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT is the mean of Xnsuperscript𝑋𝑛X^{n}italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT and Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT. As a result, for a j{1,,mj\in\{1,\cdots,mitalic_j ∈ { 1 , ⋯ , italic_m, the Equ. (26) can be rewritten as:

ξjε+kjm23nεnI(X¯n(wk);Y¯n(wj)).subscript𝜉𝑗𝜀superscriptsubscript𝑘𝑗𝑚superscript23𝑛𝜀𝑛𝐼superscript¯𝑋𝑛subscript𝑤𝑘superscript¯𝑌𝑛subscript𝑤𝑗\xi_{j}\leq\varepsilon+\sum_{k\neq j}^{m}2^{3n\varepsilon-nI(\bar{X}^{n}(w_{k}% );\bar{Y}^{n}(w_{j}))}.italic_ξ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ≤ italic_ε + ∑ start_POSTSUBSCRIPT italic_k ≠ italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT 2 start_POSTSUPERSCRIPT 3 italic_n italic_ε - italic_n italic_I ( over¯ start_ARG italic_X end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) ; over¯ start_ARG italic_Y end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) ) end_POSTSUPERSCRIPT . (34)

Since functions 2xsuperscript2𝑥2^{x}2 start_POSTSUPERSCRIPT italic_x end_POSTSUPERSCRIPT and I(X;Y)𝐼𝑋𝑌I(X;Y)italic_I ( italic_X ; italic_Y ) are both convex functions, and function 2xsuperscript2𝑥2^{x}2 start_POSTSUPERSCRIPT italic_x end_POSTSUPERSCRIPT is monotonically increasing, 2I(X;Y)superscript2𝐼𝑋𝑌2^{I(X;Y)}2 start_POSTSUPERSCRIPT italic_I ( italic_X ; italic_Y ) end_POSTSUPERSCRIPT is also a convex function. According to the Jensen’s inequality, we have:

(m1)kjm1m12nI(X¯n(wk);Y¯n(wj))(m1)2nI(jkmX¯n(wk)m1;Y¯n(wj)).𝑚1superscriptsubscript𝑘𝑗𝑚1𝑚1superscript2𝑛𝐼superscript¯𝑋𝑛subscript𝑤𝑘superscript¯𝑌𝑛subscript𝑤𝑗𝑚1superscript2𝑛𝐼superscriptsubscript𝑗𝑘𝑚superscript¯𝑋𝑛subscript𝑤𝑘𝑚1superscript¯𝑌𝑛subscript𝑤𝑗\displaystyle(m-1)\sum_{k\neq j}^{m}\frac{1}{m-1}2^{nI(\bar{X}^{n}(w_{k});\bar% {Y}^{n}(w_{j}))}\geq(m-1)2^{nI\left(\frac{\sum_{j\neq k}^{m}\bar{X}^{n}(w_{k})% }{m-1};\bar{Y}^{n}(w_{j})\right)}.( italic_m - 1 ) ∑ start_POSTSUBSCRIPT italic_k ≠ italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT divide start_ARG 1 end_ARG start_ARG italic_m - 1 end_ARG 2 start_POSTSUPERSCRIPT italic_n italic_I ( over¯ start_ARG italic_X end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) ; over¯ start_ARG italic_Y end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) ) end_POSTSUPERSCRIPT ≥ ( italic_m - 1 ) 2 start_POSTSUPERSCRIPT italic_n italic_I ( divide start_ARG ∑ start_POSTSUBSCRIPT italic_j ≠ italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT over¯ start_ARG italic_X end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) end_ARG start_ARG italic_m - 1 end_ARG ; over¯ start_ARG italic_Y end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) ) end_POSTSUPERSCRIPT . (35)

As a result, for m=2nR𝑚superscript2𝑛𝑅m=2^{nR}italic_m = 2 start_POSTSUPERSCRIPT italic_n italic_R end_POSTSUPERSCRIPT and sufficiently large n𝑛nitalic_n, if R𝑅Ritalic_R satisfies the Equ. (31), we have:

ξjε+23nε2n(RI(jkmX¯n(wk)m1;Y¯n(wj)))2ε.subscript𝜉𝑗𝜀superscript23𝑛𝜀superscript2𝑛𝑅𝐼superscriptsubscript𝑗𝑘𝑚superscript¯𝑋𝑛subscript𝑤𝑘𝑚1superscript¯𝑌𝑛subscript𝑤𝑗2𝜀\xi_{j}\leq\varepsilon+2^{3n\varepsilon}2^{n\left(R-I\left(\frac{\sum_{j\neq k% }^{m}\bar{X}^{n}(w_{k})}{m-1};\bar{Y}^{n}(w_{j})\right)\right)}\rightarrow 2\varepsilon.italic_ξ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ≤ italic_ε + 2 start_POSTSUPERSCRIPT 3 italic_n italic_ε end_POSTSUPERSCRIPT 2 start_POSTSUPERSCRIPT italic_n ( italic_R - italic_I ( divide start_ARG ∑ start_POSTSUBSCRIPT italic_j ≠ italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT over¯ start_ARG italic_X end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) end_ARG start_ARG italic_m - 1 end_ARG ; over¯ start_ARG italic_Y end_ARG start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ( italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) ) ) end_POSTSUPERSCRIPT → 2 italic_ε . (36)

4 Corollary

Previous excellent sensing systems have summarized many valuable experiences, such as multi-modal systems tend to achieve better sensing performance. However, these experiences currently lack theoretical explainability. In this section, we employ sensing channel encoder model and DTMI as tools to attempt to explain some classic phenomena.

Refer to caption
Figure 5: The sensing channel of multi-modal sensing system.

4.1 Why do multimodal systems tend to exhibit superior performance?

In a communication system, Shannon’s second theorem stipulates that the error rate can be reduced to an arbitrary low level, provided that the codewords are sufficiently lengthy. Similarly, many previous research works have shown that using multi-modality for sensing helps achieve better performance, which can be explained by the theorem we proved previously. In this subsection, we will theoretically explain why multi-modal sensing systems are more capable of achieving superior sensing performance based on the DTMI.

Fig. 5 shows a schematic diagram of a multi-modal system. For the target state W𝑊Witalic_W, we use n𝑛nitalic_n modalities to sense it. The channels of different modalities are directly independent of each other. For example, in order to identify the material of the target, we use three modalities: vision, sound wave, and radio frequency signal for sensing. The transmission of visual signal, sound wave signal, and radio frequency signal is independent of each other. According to the Theorem 1, when the number of states m𝑚mitalic_m remains unchanged, the lower bound of the expected value of the error PEnsuperscriptsubscript𝑃𝐸𝑛P_{E}^{n}italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT is related to I(Xn;Yn)𝐼superscript𝑋𝑛superscript𝑌𝑛I(X^{n};Y^{n})italic_I ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ; italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ). Note that both mutual information and conditional mutual information are non-negative. When we add a new mode, we have

I(Xn+1;Yn+1)=I(Xn,Xn+1;Yn,Yn+1)𝐼superscript𝑋𝑛1superscript𝑌𝑛1𝐼superscript𝑋𝑛subscript𝑋𝑛1superscript𝑌𝑛subscript𝑌𝑛1\displaystyle I(X^{n+1};Y^{n+1})=I(X^{n},X_{n+1};Y^{n},Y_{n+1})italic_I ( italic_X start_POSTSUPERSCRIPT italic_n + 1 end_POSTSUPERSCRIPT ; italic_Y start_POSTSUPERSCRIPT italic_n + 1 end_POSTSUPERSCRIPT ) = italic_I ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_X start_POSTSUBSCRIPT italic_n + 1 end_POSTSUBSCRIPT ; italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_Y start_POSTSUBSCRIPT italic_n + 1 end_POSTSUBSCRIPT ) (37)
=\displaystyle== I(Xn;Yn)+I(Xn;Yn+1|Yn)+I(Xn+1;Yn+1|Xn)𝐼superscript𝑋𝑛superscript𝑌𝑛𝐼superscript𝑋𝑛conditionalsubscript𝑌𝑛1superscript𝑌𝑛𝐼subscript𝑋𝑛1conditionalsuperscript𝑌𝑛1superscript𝑋𝑛\displaystyle I(X^{n};Y^{n})+I(X^{n};Y_{n+1}|Y^{n})+I(X_{n+1};Y^{n+1}|X^{n})italic_I ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ; italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) + italic_I ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ; italic_Y start_POSTSUBSCRIPT italic_n + 1 end_POSTSUBSCRIPT | italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) + italic_I ( italic_X start_POSTSUBSCRIPT italic_n + 1 end_POSTSUBSCRIPT ; italic_Y start_POSTSUPERSCRIPT italic_n + 1 end_POSTSUPERSCRIPT | italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT )
\displaystyle\geq I(Xn;Yn),𝐼superscript𝑋𝑛superscript𝑌𝑛\displaystyle I(X^{n};Y^{n}),italic_I ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ; italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ,

where Xn+1=[X1,X2,,Xn,Xn+1]superscript𝑋𝑛1subscript𝑋1subscript𝑋2subscript𝑋𝑛subscript𝑋𝑛1X^{n+1}=[X_{1},X_{2},\ldots,X_{n},X_{n+1}]italic_X start_POSTSUPERSCRIPT italic_n + 1 end_POSTSUPERSCRIPT = [ italic_X start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_X start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT , italic_X start_POSTSUBSCRIPT italic_n + 1 end_POSTSUBSCRIPT ] and Yn+1=[Y1,Y2,,Yn,Yn+1]superscript𝑌𝑛1subscript𝑌1subscript𝑌2subscript𝑌𝑛subscript𝑌𝑛1Y^{n+1}=[Y_{1},Y_{2},\ldots,Y_{n},Y_{n+1}]italic_Y start_POSTSUPERSCRIPT italic_n + 1 end_POSTSUPERSCRIPT = [ italic_Y start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_Y start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , italic_Y start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT , italic_Y start_POSTSUBSCRIPT italic_n + 1 end_POSTSUBSCRIPT ]. Therefore, the more modalities we use, the larger the mutual information I(Xn;Yn)𝐼superscript𝑋𝑛superscript𝑌𝑛I(X^{n};Y^{n})italic_I ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ; italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ), the lower the theoretical lower bound of the expected value of the error.

4.2 How do we compare which of two sensing features is better?

In the process of designing a sensing system, it is crucial to carefully craft the sensing features. To show that feature X𝑋Xitalic_X is better than feature Xsuperscript𝑋X^{\prime}italic_X start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, we usually need to run many micro-benchmarks. While experimental validation is a compelling method of verification, it frequently involves intricate setup procedures and can be time-consuming. Moreover, due to the challenge of deploying tests across a wide range of scenarios, it is often difficult to ascertain whether feature X𝑋Xitalic_X is truly superior to feature Xsuperscript𝑋X^{\prime}italic_X start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT or if this conclusion holds only in specific contexts.

In this paper, we propose DTMI which can reflect the performance of sensing features to a certain extent. Specifically, we consider two features X𝑋Xitalic_X and Xsuperscript𝑋X^{\prime}italic_X start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT. After passing through the sensing channel, their corresponding channel embeddings are Y𝑌Yitalic_Y and Ysuperscript𝑌Y^{\prime}italic_Y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, respectively. According to Theorem 1 and Theorem 2, both the upper and lower bounds of the expected error are related to the DTMI. If the DTMI I(X;Y)>I(X;Y)𝐼𝑋𝑌𝐼superscript𝑋superscript𝑌I(X;Y)>I(X^{\prime};Y^{\prime})italic_I ( italic_X ; italic_Y ) > italic_I ( italic_X start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ; italic_Y start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ), the upper and lower bounds of the expected value of the error PEsubscript𝑃𝐸P_{E}italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT will be reduced, which means that it is easier to achieve good performance using X𝑋Xitalic_X as sensing features. This necessitates alternative approaches, beyond experimental validation, to assess the performance of designed sensing features.

4.3 Is data pre-processing a “cure-all" solution?

Since data contains a lot of noise and interference, sensing systems usually include a data preprocessing module when they are designed, which is used to improve data quality for subsequent processing. Previous studies have shown that preprocessing can often improve sensing performance. Now our questions are: can we accomplish any sensing task with arbitrary accuracy through sufficiently sophisticatedly designed data preprocessing algorithms?

We refine the sensing channel encoder model depicted in Fig. 3, and the result is illustrated in Fig. 6. Specifically, for the n𝑛nitalic_n-dimensional independent features Xnsuperscript𝑋𝑛X^{n}italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, after transmission through an actual physical channel, we obtain an l𝑙litalic_l-dimensional data Dlsuperscript𝐷𝑙D^{l}italic_D start_POSTSUPERSCRIPT italic_l end_POSTSUPERSCRIPT at the receiver. For instance, to localize a target using radio frequency (RF) signals, we employ angle of arrival (AoA) as a feature. At the receiver, what we receive is the amplitude and phase of the RF signals, which are Dlsuperscript𝐷𝑙D^{l}italic_D start_POSTSUPERSCRIPT italic_l end_POSTSUPERSCRIPT. Subsequently, we subject the received data Dlsuperscript𝐷𝑙D^{l}italic_D start_POSTSUPERSCRIPT italic_l end_POSTSUPERSCRIPT to data preprocessing, yielding a processed data D^lsuperscript^𝐷𝑙\hat{D}^{l}over^ start_ARG italic_D end_ARG start_POSTSUPERSCRIPT italic_l end_POSTSUPERSCRIPT. Then we utilize the sensing algorithm to process the data D^lsuperscript^𝐷𝑙\hat{D}^{l}over^ start_ARG italic_D end_ARG start_POSTSUPERSCRIPT italic_l end_POSTSUPERSCRIPT to obtain the channel embedding Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, and finally use the judgment algorithm to obtain the result W^^𝑊\hat{W}over^ start_ARG italic_W end_ARG. In particular, when no data preprocessing is used, it is equivalent to D^l=Dlsuperscript^𝐷𝑙superscript𝐷𝑙\hat{D}^{l}=D^{l}over^ start_ARG italic_D end_ARG start_POSTSUPERSCRIPT italic_l end_POSTSUPERSCRIPT = italic_D start_POSTSUPERSCRIPT italic_l end_POSTSUPERSCRIPT.

Refer to caption
Figure 6: The sensing system with data pre-processing.
Corollary 1.

If the following equation holds,

H(W)I(Xn;Dl)>1,𝐻𝑊𝐼superscript𝑋𝑛superscript𝐷𝑙1H(W)-I(X^{n};D^{l})>1,italic_H ( italic_W ) - italic_I ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ; italic_D start_POSTSUPERSCRIPT italic_l end_POSTSUPERSCRIPT ) > 1 , (38)

lossless sensing cannot be achieved simply by improving the effect of data preprocessing.

Proof.

According to the definition Markov chain, the channel shown in Fig. 6 constitutes a Markov chain WXnDlD^lYnW^𝑊superscript𝑋𝑛superscript𝐷𝑙superscript^𝐷𝑙superscript𝑌𝑛^𝑊W\rightarrow X^{n}\rightarrow D^{l}\rightarrow\hat{D}^{l}\rightarrow Y^{n}% \rightarrow\hat{W}italic_W → italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT → italic_D start_POSTSUPERSCRIPT italic_l end_POSTSUPERSCRIPT → over^ start_ARG italic_D end_ARG start_POSTSUPERSCRIPT italic_l end_POSTSUPERSCRIPT → italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT → over^ start_ARG italic_W end_ARG. Note that “whether the sensing result is correct" is a binary event, so we have H(PEn)1𝐻superscriptsubscript𝑃𝐸𝑛1H(P_{E}^{n})\leq 1italic_H ( italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) ≤ 1. According to the Theorem 1 and the Data-Processing Inequality, we have

PEnsuperscriptsubscript𝑃𝐸𝑛\displaystyle P_{E}^{n}italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT H(W)I(Xn;Yn)H(PEn)logmH(W)I(Xn;Dl)1logm0,absent𝐻𝑊𝐼superscript𝑋𝑛superscript𝑌𝑛𝐻superscriptsubscript𝑃𝐸𝑛𝑚𝐻𝑊𝐼superscript𝑋𝑛superscript𝐷𝑙1𝑚0\displaystyle\geq\frac{H(W)-I(X^{n};Y^{n})-H(P_{E}^{n})}{\log m}\geq\frac{H(W)% -I(X^{n};D^{l})-1}{\log m}\geq 0,≥ divide start_ARG italic_H ( italic_W ) - italic_I ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ; italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) - italic_H ( italic_P start_POSTSUBSCRIPT italic_E end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) end_ARG start_ARG roman_log italic_m end_ARG ≥ divide start_ARG italic_H ( italic_W ) - italic_I ( italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ; italic_D start_POSTSUPERSCRIPT italic_l end_POSTSUPERSCRIPT ) - 1 end_ARG start_ARG roman_log italic_m end_ARG ≥ 0 , (39)

if Equ. (38) holds. Therefore, lossless sensing cannot be achieved simply by improving the effect of data preprocessing. ∎

5 Case Study

We illustrate the role of system performance evaluation based on sensing channel encoder model and DTMI through several case studies. We begin by examining the application of DTMI in binary classification tasks, using examples of human detection in home settings via WiFi and appliance cabinet door displacement detection in industrial scenarios via RFID. For multi-class classification, we consider two instances: the classic sensing problem in ISAC systems – direction estimation, and device identification based on an open-source traffic dataset. The results demonstrate that across different cases, the Pearson correlation between the trend of DTMI changes and that of accuracy fluctuations exceeds 0.9. Furthermore, DTMI can provide estimates of upper and lower bounds for sensing system errors, which is beneficial for optimizing and balancing ISAC systems.

5.1 Binary classification task.

(1) Human detection based on WiFi devices.

Refer to caption
(a)
Refer to caption
(b)
Figure 7: Human detection in home environments based on WiFi. (a) Experimental environment and device deployment. (b) Human detection algorithm based on thresholding method.
Refer to caption
(a)
Refer to caption
(b)
Figure 8: (a) Channel embedding extraction. (b) The accuracy exhibits a similar trend to the mutual information estimated by numerical algorithms.

Indoor human detection plays a pivotal role in services such as elderly monitoring. In particular, device-free passive human detection has garnered significant attention in recent years. While methods based on infrared, pressure sensors, and the like have been applied to human detection, they either rely on specialized hardware or come at a higher cost. Moreover, vision-based and infrared-based methods are only effective within line-of-sight (LOS) coverage. Wi-Fi devices, being one of the most widely deployed radio frequency devices, have led to the implementation of numerous radio frequency sensing systems around them. In recent years, with the advancement of wireless sensing technology, Wi-Fi-based approaches have proven to be a promising method for indoor human detection. We deployed an experiment based on Wi-Fi devices in a residential setting and estimated mutual information using numerical methods. The experimental results indicate that DTMI exhibits a similar trend to accuracy. In this case study, their Pearson correlation coefficient exceeds 0.90.90.90.9.

Refer to caption
(a)
Refer to caption
(b)
Refer to caption
(c)
Figure 9: RFID-based electrical cabinet door state monitoring. (a) Schematic diagram of device deployment. (b) The cabinet door status monitoring algorithm. (c) The identification accuracy (represented by the bar chart on the left y-axis) and the mutual information (indicated by the red line on the right y-axis) exhibit a consistent trend of variation.

The experimental setup is depicted in Fig. 7a, where we conducted experiments in a \qty4m×\qty6m\qty4𝑚\qty6𝑚\qty{4}{m}\times\qty{6}{m}4 italic_m × 6 italic_m office using an ESP32 device as both transmitter and receiver, each equipped with a single antenna. Additionally, a camera was placed within the environment to capture video footage for recording ground truth. The sampling rate of the ESP32 is set to \qty100Hz. Ten volunteers are invited to participate in the tests. Each data acquisition session lasted 10 minutes: the first 5 minutes ensured the room is empty, followed by 5 minutes with human activity (walking) inside the room.

State W𝑊Witalic_W has two possible values: “personnel present" and “personnel absent". After obtaining CSI data, we initially sliced the data, then performed data preprocessing to eliminate outliers and apply filtering. Finally, channel embedding Y𝑌Yitalic_Y is extracted from this processed data and compared against empirical thresholds to ascertain the presence or absence of individuals, which is the result W^^𝑊\hat{W}over^ start_ARG italic_W end_ARG. The entire data processing procedure is illustrated in Fig. 7b. The corfficient of variation of k𝑘kitalic_k-th subcarrier is δΔTk=σΔTkμΔTksuperscriptsubscript𝛿Δ𝑇𝑘superscriptsubscript𝜎Δ𝑇𝑘superscriptsubscript𝜇Δ𝑇𝑘\delta_{\Delta T}^{k}=\frac{\sigma_{\Delta T}^{k}}{\mu_{\Delta T}^{k}}italic_δ start_POSTSUBSCRIPT roman_Δ italic_T end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT = divide start_ARG italic_σ start_POSTSUBSCRIPT roman_Δ italic_T end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT end_ARG start_ARG italic_μ start_POSTSUBSCRIPT roman_Δ italic_T end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT end_ARG, where ΔTΔ𝑇\Delta Troman_Δ italic_T is the width of the time window, μΔTksuperscriptsubscript𝜇Δ𝑇𝑘\mu_{\Delta T}^{k}italic_μ start_POSTSUBSCRIPT roman_Δ italic_T end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT and σΔTksuperscriptsubscript𝜎Δ𝑇𝑘\sigma_{\Delta T}^{k}italic_σ start_POSTSUBSCRIPT roman_Δ italic_T end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT are the mean and standard deviation of the k𝑘kitalic_k-th subcarrier, respectively. And the channel embedding y𝑦yitalic_y is given by

y=1ni=11|δiΔTδiΔT1|,𝑦1𝑛superscriptsubscript𝑖11superscript𝛿𝑖subscriptΔ𝑇superscript𝛿𝑖subscriptΔ𝑇1y=\frac{1}{n}\sum_{i=1}^{1}\left|\frac{\delta^{i}\Delta_{T}}{\delta^{i}\Delta_% {T-1}}\right|,italic_y = divide start_ARG 1 end_ARG start_ARG italic_n end_ARG ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 1 end_POSTSUPERSCRIPT | divide start_ARG italic_δ start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT roman_Δ start_POSTSUBSCRIPT italic_T end_POSTSUBSCRIPT end_ARG start_ARG italic_δ start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT roman_Δ start_POSTSUBSCRIPT italic_T - 1 end_POSTSUBSCRIPT end_ARG | , (40)

where n𝑛nitalic_n is the number of subcarriers. If y𝑦yitalic_y falls within the experiential threshold range, we consider the environment to be “person absent"; otherwise, it is determined to be person present. The entire data processing workflow is illustrated in Fig. 7b. Here, the threshold range is [0.935,1.065]0.9351.065[0.935,1.065][ 0.935 , 1.065 ]. Figure 8a shows a example of the channel embedding extraction process.

In Fig. 8b, the blue solid line illustrates the error rate of human detection as the width of the time window varies ΔTΔ𝑇\Delta Troman_Δ italic_T. The dashed lines of other colors represent the mutual information I(W;W^)𝐼𝑊^𝑊I(W;\hat{W})italic_I ( italic_W ; over^ start_ARG italic_W end_ARG ) under different numerical estimation algorithms, namely KraskovStogbauerGrassberger1 Kraskov et al. , KraskovStogbauerGrassberger2 Kraskov et al. , GaoKannanOhViswanath Gao et al. (a), and GaoOhViswanath Gao et al. (b). The results demonstrate that the trend of accuracy change is highly consistent with the trend of mutual information change, indicating that in such tasks, DTMI can serve as an additional performance metric, complementing accuracy, to evaluate system performance.

(2) RFID-based electrical cabinet door direction monitoring. Ensuring electrical safety is crucial during the manufacturing process. Take the electrical cabinet as an example; if its door is inadvertently opened without timely detection, there are potential safety hazards, including the risk of electrical fires and electric shock. In the field of terminal sensing in power systems, electromagnetic transformer-type sensors have traditionally dominated. In recent years, non-electric quantity sensing technologies such as vibration, stroke, arc light, and spectral sensing have gained widespread application in digital electrical equipment and power systems. However, these sensing technologies frequently depend on specialized sensors that boast high sensitivity and accuracy. These sensors are typically burdened with several drawbacks, including complexities in power supply, large size and weight, high energy consumption, vulnerability to electromagnetic interference, difficult installation processes, and exorbitant costs. Consequently, they fall short of meeting the requirements for the development of modern smart power equipment. Given the cost-effectiveness and ease of deployment of RFID tags, we have developed an algorithm for monitoring cabinet door status using multiple tags. Furthermore, we employ the mutual information of tasks, as proposed in this paper, to assess the system’s performance.

We conduct relevant tests in a factory setting. For an industrial metal electrical cabinet (measuring approximately \qty1m×\qty1m×\qty2m\qty1𝑚\qty1𝑚\qty2𝑚\qty{1}{m}\times\qty{1}{m}\times\qty{2}{m}1 italic_m × 1 italic_m × 2 italic_m) used in production, our objective is to monitor the status of the cabinet door. The RFID reader is ImpinJ Speedway R420 reader. The RFID system operates in the \qty920MHz\qty926MHzsimilar-to\qty920𝑀𝐻𝑧\qty926𝑀𝐻𝑧\qty{920}{MHz}\sim\qty{926}{MHz}920 italic_M italic_H italic_z ∼ 926 italic_M italic_H italic_z. Two states W𝑊Witalic_W are defined: when the door opening angle is less than 5superscript55^{\circ}5 start_POSTSUPERSCRIPT ∘ end_POSTSUPERSCRIPT, it is considered “closed"; otherwise, it is deemed “open". We affix several (1 to 3) anti-metal RFID tags onto the cabinet door and positioned the antenna within the cabinet body. The deployment configuration of the equipment is illustrated in Fig. 9a. After collecting the RSSI (Received Signal Strength Indicator) from each tag, we perform differential processing against an initial value, followed by calculating the average of these differential values across multiple tags. If the average differential exceeds an empirically determined threshold (set here as 2.52.52.52.5), we conclude that the sensing result is “open"; otherwise, it is concluded as “closed". The detailed steps of data processing are depicted in Fig. 9b.

The results of the state monitoring are shown in Fig. 9c. Due to the cabinet being made of metal, the electromagnetic waves suffer from severe multipath interference. Consequently, when only one tag is used, the stability of the data is poor, and the empirical threshold becomes almost unusable after the tag position shifts by just a few centimeters. This issue leads to an identification accuracy of less than 60%. This is well reflected by the mutual information I(W;Yn)𝐼𝑊superscript𝑌𝑛I(W;Y^{n})italic_I ( italic_W ; italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) (n=1𝑛1n=1italic_n = 1), which has a small value in this case. Since the spacing of the tags exceeds half a wavelength, their mutual influence is minimal, and thus we can approximately consider the reflection signals from different tags as independent of each other. Consequently, following corollary introduced in Sec. 4.1, as the number of tags increases, so does the mutual information. We employ GaoOhViswanath Gao et al. (b) method to estimate the mutual information, and the red line in Fig. 9c illustrates its trend, which increases with the number of tags. As the mutual information increases, so does the accuracy of state identification.

5.2 Multiple classification tasks.

(1) Direction estimation based on Music algorithm and electromagnetic signal.

Location sensing represents one of the most prevalent and fundamental tasks in the field. A plethora of superior systems have been developed utilizing location sensing. Nevertheless, for an extended period, there has been a dearth of methods other than experimental evaluations to assess the influence of numerous factors, including the distance between the target and both the transmitter and receiver, on localization accuracy. In this case study, we use direction estimation based on the Music algorithm (one of the most popular localization algorithms) Kotaru et al. and electromagnetic signal to show the application of the proposed framework.

We consider a two-dimensional direction estimation problem. The basic model setup is shown in the Fig. 11. There are P𝑃Pitalic_P transmitting antennas and the position of the p𝑝pitalic_p-th transmitting antenna is denoted as 𝐫txpsubscript𝐫𝑡subscript𝑥𝑝\mathbf{r}_{tx_{p}}bold_r start_POSTSUBSCRIPT italic_t italic_x start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT end_POSTSUBSCRIPT. The receiver has Q𝑄Qitalic_Q receiving antennas and the position of the q𝑞qitalic_q-th receiving antenna is denoted as 𝐫rxqsubscript𝐫𝑟subscript𝑥𝑞\mathbf{r}_{rx_{q}}bold_r start_POSTSUBSCRIPT italic_r italic_x start_POSTSUBSCRIPT italic_q end_POSTSUBSCRIPT end_POSTSUBSCRIPT. The distance between two adjacent antennas is drxsubscript𝑑𝑟𝑥d_{rx}italic_d start_POSTSUBSCRIPT italic_r italic_x end_POSTSUBSCRIPT and dtxsubscript𝑑𝑡𝑥d_{tx}italic_d start_POSTSUBSCRIPT italic_t italic_x end_POSTSUBSCRIPT for the receiver and transmitter, respectively. The distribution of complex permittivity in space is \mathcal{E}caligraphic_E, and the permittivity at position 𝐫𝐫\mathbf{r}bold_r is =ϵ(𝐫)italic-ϵ𝐫\mathcal{E}=\epsilon(\mathbf{r})caligraphic_E = italic_ϵ ( bold_r ). For ease of calculation, we set the shape of the target to be a circle with a radius of 2R2𝑅2R2 italic_R. We set m𝑚mitalic_m states, each state corresponds to a direction interval. The direction is defined as the angle (the X𝑋Xitalic_X in Fig. 11) between the line connecting the center of the target circle and the center of the receiving antenna array and the vertical line of the antenna array. The direction interval is [π,π]𝜋𝜋[-\pi,\pi][ - italic_π , italic_π ], which is evenly divided into m𝑚mitalic_m sub-intervals. The scattered signals Essubscript𝐸𝑠E_{s}italic_E start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT are calculated using Maxwell’s equations and the method of moments Shang et al. . After adding Gaussian random noise to Essubscript𝐸𝑠E_{s}italic_E start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT, we estimate signal Y𝑌Yitalic_Y using the MUSIC algorithm. Finally, we use the maximum likelihood algorithm to determine the direction X𝑋Xitalic_X corresponding to channel embedding Y𝑌Yitalic_Y, and then output the category to which X𝑋Xitalic_X belongs as the result W^^𝑊\hat{W}over^ start_ARG italic_W end_ARG.

We first simulated the effect of the distance between the target and the receiver on the direction estimation accuracy. During the simulation, we set the parameters as follows. We set the number of states m=9𝑚9m=9italic_m = 9. The frequency of the electromagnetic signal is \qty5.0GHz. The distance between the transmitter and the receiver is \qty8.0m. There are P=1𝑃1P=1italic_P = 1 transmitting antennas and Q=3𝑄3Q=3italic_Q = 3 receiving antennas. The distance between two adjacent receiving antennas is \qty0.03m, i.e., drx=\qty0.03msubscript𝑑𝑟𝑥\qty0.03𝑚d_{rx}=\qty{0.03}{m}italic_d start_POSTSUBSCRIPT italic_r italic_x end_POSTSUBSCRIPT = 0.03 italic_m. The diameter of the target is 2R=\qty0.2m2𝑅\qty0.2𝑚2R=\qty{0.2}{m}2 italic_R = 0.2 italic_m. The distance between the target and the receiver changes from \qty0.3m to \qty5m. The material of the target is water, and the permittivity is given by empirical formula Kaatze . In order to solve the scattered waves Essubscript𝐸𝑠E_{s}italic_E start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT using the moment method, we discretized the space so that each subunit is a square with a side length of \qty0.01m.

We estimate the mutual information using a numerical algorithm Haaga et al. . The results are shown in Fig. 11. The results show that when the target is too close to the receiver, the accuracy of the direction estimation is very poor. We believe this is because the existence of phenomena such as diffraction makes it difficult to use the ray tracing model (the basic assumption of the MUSIC algorithm) to equivalent signal transmission Shang et al. (2022). When the distance is too large, the accuracy will also decrease. We believe this is because the scattered wave signal becomes weaker, resulting in a decrease in angular resolution. In addition, the changing trend of accuracy is basically consistent with the changing trend of the error lower bound given by our DTMI, and their Pearson correlation coefficient exceeds 0.95.

Refer to caption
Figure 10: The sensing channel of direction estimation based on Music algorithm and electromagnetic signal.
Refer to caption
Figure 11: The sensing channel of AoA estimation based on Music algorithm and electromagnetic signal.

(2) Device type identification based on traffic characteristics.

Refer to caption
Figure 12: Device type identification based on traffic characteristics.
Table 1: The code names for device types and their actual names.
Device name Device type
XIAOMI Bedside Lamp A
HUAWEI TC5206 B
XIAOMI Induction Cooker C1, C2
HUAWEI Matebook D
XIAOMI Microwave Oven E1, E2
Oneplus6T F
XIAOMI Rice Cooker G1, G2
XIAOMI EPS H1, H2, H3
XIAOMI Table Lamp I1, I2
Refer to caption
Figure 13: Device type identification based on traffic characteristics.

Security and privacy issues have always been a hot topic among researchers Han et al. (2022). In recent years, with the development of the Internet of Things (IoT) and WiFi technology, attackers have devised more diverse means to steal private information. For instance, many attackers place concealed cameras and other IoT devices designed to pilfer private information in public environments such as hotels. After acquiring this private information, these devices continuously transmit the data through gateways. To detect illegal devices, Yan et al. Yan et al. (2022) leveraged the characteristic that different devices generate distinct traffic patterns, using the traffic at the gateway for device type identification. Their research findings indicated a minimum accuracy rate of 99.17% for identifying common devices like various models of Xiaomi phones, routers, etc. In this paper, based on their open-source code and data, our analysis shows that lossless detection can be achieved when the bit rate satisfies the sufficient condition given in Theorem 3.

At this moment, the schematic diagram illustrating the sensing channel encoder model is depicted in Fig. 12. Post-processing of the traffic data, we employ the methodology put forth by Yan. Yan et al. (2022) and colleagues to derive a 30-dimensional signal intended for appliance classification. Our dataset encompasses traffic information from eleven distinct device categories, whose precise nomenclature and coding are presented in Table 13. Notably, instances where identical device names are associated with multiple codes signify the existence of several units of the same device category. As an illustration, Type “C" comprises two devices, labeled “C1" and “C2", which denote two separate models of Xiaomi induction stoves. The evaluation procedure incorporates a five-fold cross-validation strategy, alongside adopting the KNN classifier as the analytical tool for discrimination. Throughout every iteration of cross-validation, the signals hailing from the subset earmarked for training are denoted as Xnsuperscript𝑋𝑛X^{n}italic_X start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, whereas those belonging to the testing subset are marked as Ynsuperscript𝑌𝑛Y^{n}italic_Y start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, precedented by applying algorithm “GaoOhViswanath" Gao et al. (b) to gauge mutual information. Fig. 13 illustrates the results of our calculations. Here, the possible state number m=9𝑚9m=9italic_m = 9, and 30-dimensional features are used for device type recognition. In this case, the corresponding sensing bitrate is R=logm/n𝑅𝑚𝑛R=\log{m}/{n}italic_R = roman_log italic_m / italic_n. We find that the data at this time satisfies the sufficient conditions given by Theorem 3, and the goal of non-destructive sensing can be achieved at this time. The results of our KNN classification also show that the accuracy of device type recognition is 100%.

6 Conclusion

In this paper, we establish a channel model suitable for ubiquitous sensing, where we associate the sensing task with the received channel embedding through discrete task mutual information. Compared to the sensing mutual information in the integrated sensing and communication system, discrete task mutual information can more accurately evaluate the performance of the sensing system. Unlike traditional communication channel models, in sensing channels, it is difficult to maintain the independent and identically distributed characteristics among different random variables. For discrete task sensing channels, we provide upper and lower bounds for the expected error of sensing based on discrete task mutual information, and give a sufficient condition for achieving lossless sensing. We conduct case studies on four common sensing applications based on experimental data and simulation data. The results show that discrete task mutual information has a strong similarity with sensing accuracy. This provides a theoretical evaluation method for the performance of integrated sensing and communication systems beyond experimental evaluation.

References

  • Sayed et al. [2005] Ali H Sayed, Alireza Tarighat, and Nima Khajehnouri. Network-based wireless location: challenges faced in develo** techniques for accurate wireless location information. IEEE signal processing magazine, 22(4):24–40, 2005.
  • Shen et al. [2010] Yuan Shen, Henk Wymeersch, and Moe Z Win. Fundamental limits of wideband localization—part ii: Cooperative networks. IEEE Transactions on Information Theory, 56(10):4981–5000, 2010.
  • Wang et al. [2018a] Jie Wang, Qinhua Gao, Miao Pan, and Yuguang Fang. Device-free wireless sensing: Challenges, opportunities, and applications. IEEE network, 32(2):132–137, 2018a.
  • Phunchongharn et al. [2013] Phond Phunchongharn, Ekram Hossain, and Dong In Kim. Resource allocation for device-to-device communications underlaying lte-advanced networks. IEEE wireless communications, 20(4):91–100, 2013.
  • Zhang et al. [2017] Haijun Zhang, Na Liu, ** Long, Abdol-Hamid Aghvami, and Victor CM Leung. Network slicing based 5g and future mobile networks: Mobility, resource management, and challenges. IEEE communications magazine, 55(8):138–145, 2017.
  • Zhang et al. [2024] Kecheng Zhang, Weijie Yuan, **zhi Fan, and Xianbin Wang. Dual-functional waveform design with local sidelobe suppression via otfs signaling. IEEE Transactions on Vehicular Technology, 2024.
  • Liu et al. [2021a] Fan Liu, Ya-Feng Liu, Ang Li, Christos Masouros, and Yonina C Eldar. Cramér-rao bound optimization for joint radar-communication beamforming. IEEE Transactions on Signal Processing, 70:240–253, 2021a.
  • Zhang et al. [2021] J Andrew Zhang, Fan Liu, Christos Masouros, Robert W Heath, Zhiyong Feng, Le Zheng, and Athina Petropulu. An overview of signal processing techniques for joint communication and radar sensing. IEEE Journal of Selected Topics in Signal Processing, 15(6):1295–1315, 2021.
  • Tai et al. [2019] Tzu-Chun Tai, Kate Ching-Ju Lin, and Yu-Chee Tseng. Toward reliable localization by unequal aoa tracking. In Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, pages 444–456, 2019.
  • Bliss [2014] Daniel W Bliss. Cooperative radar and communications signaling: The estimation and information theory odd couple. In 2014 IEEE Radar Conference, pages 0050–0055. IEEE, 2014.
  • Wang et al. [2018b] Lei Wang, Ke Sun, Haipeng Dai, Alex X Liu, and Xiaoyu Wang. Witrace: Centimeter-level passive gesture tracking using wifi signals. In 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pages 1–9. IEEE, 2018b.
  • Kotaru et al. [2017] Manikanta Kotaru, Pengyu Zhang, and Sachin Katti. Localizing low-power backscatter tags using commodity wifi. In Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, pages 251–262, 2017.
  • Qian et al. [2017] Kun Qian, Chenshu Wu, Zheng Yang, Yunhao Liu, and Kyle Jamieson. Widar: Decimeter-level passive tracking via velocity monitoring with commodity wi-fi. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 1–10, 2017.
  • Ali et al. [2015] Kamran Ali, Alex X Liu, Wei Wang, and Muhammad Shahzad. Keystroke recognition using wifi signals. In Proceedings of the 21st annual international conference on mobile computing and networking, pages 90–102, 2015.
  • Yu et al. [2018] Nan Yu, Wei Wang, Alex X Liu, and Lingtao Kong. Qgesture: Quantifying gesture distance and direction with wifi signals. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2(1):1–23, 2018.
  • Tan and Yang [2016] Sheng Tan and Jie Yang. Wifinger: Leveraging commodity wifi for fine-grained finger gesture recognition. In Proceedings of the 17th ACM international symposium on mobile ad hoc networking and computing, pages 201–210, 2016.
  • Abdelnasser et al. [2015] Heba Abdelnasser, Moustafa Youssef, and Khaled A Harras. Wigest: A ubiquitous wifi-based gesture recognition system. In 2015 IEEE conference on computer communications (INFOCOM), pages 1472–1480. IEEE, 2015.
  • [18] Lei Yang, Yekui Chen, Xiang-Yang Li, Chaowei Xiao, Mo Li, and Yunhao Liu. Tagoram: Real-time tracking of mobile RFID tags to high precision using COTS devices. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, pages 237–248.
  • Adib and Katabi [2013] Fadel Adib and Dina Katabi. See through walls with wifi! In Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, pages 75–86, 2013.
  • Wang et al. [2018c] Chuyu Wang, Jian Liu, Yingying Chen, Hongbo Liu, Lei Xie, Wei Wang, Bingbing He, and Sanglu Lu. Multi-touch in the air: Device-free finger tracking and gesture recognition via cots rfid. In IEEE INFOCOM 2018-IEEE conference on computer communications, pages 1691–1699. IEEE, 2018c.
  • Wang et al. [2014] Jue Wang, Deepak Vasisht, and Dina Katabi. Rf-idraw: Virtual touch screen in the air using rf signals. ACM SIGCOMM Computer Communication Review, 44(4):235–246, 2014.
  • Wang et al. [2016] Ju Wang, Jie Xiong, Hongbo Jiang, Xiaojiang Chen, and Dingyi Fang. D-watch: Embracing" bad" multipaths for device-free localization with cots rfid devices. In Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, pages 253–266, 2016.
  • Chang et al. [2018] Liqiong Chang, Jie Xiong, Ju Wang, Xiaojiang Chen, Yu Wang, Zhanyong Tang, and Dingyi Fang. Rf-copybook: A millimeter level calligraphy copybook based on commodity rfid. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1(4):1–19, 2018.
  • Tan and Yang [2021] Sheng Tan and Jie Yang. Object sensing for fruit ripeness detection using wifi signals. arXiv preprint arXiv:2106.00860, 2021.
  • Liu et al. [2021b] Yutong Liu, Landu Jiang, Linghe Kong, Qiao Xiang, Xue Liu, and Guihai Chen. Wi-fruit: See through fruits with smart devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5(4):1–29, 2021b.
  • Liang et al. [2021] Yumeng Liang, Anfu Zhou, Huanhuan Zhang, Xinzhe Wen, and Huadong Ma. Fg-liquid: A contact-less fine-grained liquid identifier by pushing the limits of millimeter-wave sensing. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5(3):1–27, 2021.
  • Shang et al. [2022] Fei Shang, Panlong Yang, Yubo Yan, and Xiang-Yang Li. Liqray: non-invasive and fine-grained liquid recognition system. In Proceedings of the 28th Annual International Conference on Mobile Computing And Networking, pages 296–309, 2022.
  • Shang et al. [2023] Fei Shang, Panlong Yang, Yubo Yan, and Xiang-Yang Li. Contactless and fine-grained liquid identification utilizing sub-6ghz signals. IEEE Transactions on Mobile Computing, pages 1–16, 2023. doi:10.1109/TMC.2023.3300356.
  • Li et al. [2022] Dong Li, Jialin Liu, Sunghoon Ivan Lee, and Jie Xiong. Lasense: Pushing the limits of fine-grained activity sensing using acoustic signals. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 6(1):1–27, 2022.
  • Li et al. [2020] Dong Li, Jialin Liu, Sunghoon Ivan Lee, and Jie Xiong. Fm-track: pushing the limits of contactless multi-target tracking using acoustic signals. In Proceedings of the 18th Conference on Embedded Networked Sensor Systems, pages 150–163, 2020.
  • Liu et al. [2021c] Jialin Liu, Dong Li, Lei Wang, and Jie Xiong. Blinklistener: " listen" to your eye blink using your smartphone. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5(2):1–27, 2021c.
  • Azarbarzin and Moussavi [2010] Ali Azarbarzin and Zahra MK Moussavi. Automatic and unsupervised snore sound extraction from respiratory sound signals. IEEE Transactions on Biomedical Engineering, 58(5):1156–1162, 2010.
  • Yadollahi et al. [2010] Azadeh Yadollahi, Eleni Giannouli, and Zahra Moussavi. Sleep apnea monitoring and diagnosis based on pulse oximetery and tracheal sound signals. Medical & biological engineering & computing, 48:1087–1097, 2010.
  • Han et al. [2023] Feiyu Han, Panlong Yang, Shaojie Yan, Haohua Du, and Yuanhao Feng. Breathsign: Transparent and continuous in-ear authentication using bone-conducted breathing biometrics. In IEEE INFOCOM 2023-IEEE Conference on Computer Communications, pages 1–10. IEEE, 2023.
  • [35] Hao Wang, Daqing Zhang, Junyi Ma, Yasha Wang, Yuxiang Wang, Dan Wu, Tao Gu, and Bing Xie. Human respiration detection with commodity WiFi devices: Do user location and body orientation matter? In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pages 25–36.
  • Liu et al. [2019] Chen Liu, Jie Xiong, Lin Cai, Lin Feng, Xiaojiang Chen, and Dingyi Fang. Beyond respiration: Contactless sleep sound-activity recognition using rf signals. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 3(3):1–22, 2019.
  • Xiong et al. [2023] Yifeng Xiong, Fan Liu, Yuanhao Cui, Weijie Yuan, Tony Xiao Han, and Giuseppe Caire. On the fundamental tradeoff of integrated sensing and communications under gaussian channels. IEEE Transactions on Information Theory, 2023.
  • Tong et al. [2021] Xinyu Tong, Han Wang, Xiulong Liu, and Wenyu Qu. Mapfi: Autonomous map** of wi-fi infrastructure for indoor localization. IEEE transactions on mobile computing, 22(3):1566–1580, 2021.
  • Verdú et al. [1994] Sergio Verdú et al. Generalizing the fano inequality. IEEE Transactions on Information Theory, 40(4):1247–1251, 1994.
  • Cover [1999] Thomas M Cover. Elements of information theory. John Wiley & Sons, 1999.
  • Shannon [1948] Claude Elwood Shannon. A mathematical theory of communication. The Bell system technical journal, 27(3):379–423, 1948.
  • [42] Alexander Kraskov, Harald Stögbauer, and Peter Grassberger. Estimating mutual information. 69(6):66138. ISSN 1539-3755, 1550-2376. doi:10.1103/PhysRevE.69.066138. URL https://link.aps.org/doi/10.1103/PhysRevE.69.066138.
  • Gao et al. [a] Weihao Gao, Sreeram Kannan, Sewoong Oh, and Pramod Viswanath. Estimating Mutual Information for Discrete-Continuous Mixtures. a.
  • Gao et al. [b] Weihao Gao, Sewoong Oh, and Pramod Viswanath. Demystifying Fixed $k$ -Nearest Neighbor Information Estimators. 64(8):5629–5661, b. ISSN 0018-9448, 1557-9654. doi:10.1109/TIT.2018.2807481. URL https://ieeexplore.ieee.org/document/8294268/.
  • [45] Manikanta Kotaru, Kiran Joshi, Dinesh Bharadia, and Sachin Katti. Spotfi: decimeter level localization using wifi. 45(4):269–282. ISSN 0146-4833. doi:10.1145/2829988.2787487. URL https://dl.acm.org/doi/10.1145/2829988.2787487.
  • [46] Fei Shang, Panlong Yang, Dawei Yan, Sijia Zhang, and Xiang-Yang Li. LiquImager: Fine-grained liquid identification and container imaging system with COTS WiFi devices. 8(1):15:1–15:29. doi:10.1145/3643509. URL https://doi.org/10.1145/3643509.
  • [47] Udo Kaatze. Complex permittivity of water as a function of frequency and temperature. 34(4):371–374. ISSN 0021-9568, 1520-5134. doi:10.1021/je00058a001. URL https://pubs.acs.org/doi/abs/10.1021/je00058a001.
  • [48] Kristian Agasøster Haaga, RomeoV, George Datseris, Julia TagBot, and tormolle. JuliaDynamics/CausalityTools.jl: V2.10.1. URL https://doi.org/10.5281/zenodo.8409495.
  • Han et al. [2022] Feiyu Han, Panlong Yang, Haohua Du, and Xiang-Yang Li. Accuth: Anti-spoofing voice authentication via accelerometer. In Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, pages 637–650, 2022.
  • Yan et al. [2022] Dawei Yan, Yubo Yan, Panlong Yang, Wen-Zhan Song, Xiang-Yang Li, and Pengfei Liu. Real-time identification of rogue wifi connections in the wild. IEEE Internet of Things Journal, 10(7):6042–6058, 2022.