-
Secure Deep-JSCC Against Multiple Eavesdroppers
Authors:
Seyyed Amirhossein Ameli Kalkhoran,
Mehdi Letafati,
Ecenaz Erdemir,
Babak Hossein Khalaj,
Hamid Behroozi,
Deniz Gündüz
Abstract:
In this paper, a generalization of deep learning-aided joint source channel coding (Deep-JSCC) approach to secure communications is studied. We propose an end-to-end (E2E) learning-based approach for secure communication against multiple eavesdroppers over complex-valued fading channels. Both scenarios of colluding and non-colluding eavesdroppers are studied. For the colluding strategy, eavesdropp…
▽ More
In this paper, a generalization of deep learning-aided joint source channel coding (Deep-JSCC) approach to secure communications is studied. We propose an end-to-end (E2E) learning-based approach for secure communication against multiple eavesdroppers over complex-valued fading channels. Both scenarios of colluding and non-colluding eavesdroppers are studied. For the colluding strategy, eavesdroppers share their logits to collaboratively infer private attributes based on ensemble learning method, while for the non-colluding setup they act alone. The goal is to prevent eavesdroppers from inferring private (sensitive) information about the transmitted images, while delivering the images to a legitimate receiver with minimum distortion. By generalizing the ideas of privacy funnel and wiretap channel coding, the trade-off between the image recovery at the legitimate node and the information leakage to the eavesdroppers is characterized. To solve this secrecy funnel framework, we implement deep neural networks (DNNs) to realize a data-driven secure communication scheme, without relying on a specific data distribution. Simulations over CIFAR-10 dataset verifies the secrecy-utility trade-off. Adversarial accuracy of eavesdroppers are also studied over Rayleigh fading, Nakagami-m, and AWGN channels to verify the generalization of the proposed scheme. Our experiments show that employing the proposed secure neural encoding can decrease the adversarial accuracy by 28%.
△ Less
Submitted 5 August, 2023;
originally announced August 2023.
-
Intelligent Reflecting Surface Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments
Authors:
Vahid Shahiri,
Hamid Behroozi,
Ali Kuhestani
Abstract:
Physical layer key generation (PLKG) can significantly enhance the security of classic encryption schemes by enabling them to change their secret keys significantly faster and more efficient. However, due to the reliance of PLKG techniques on channel medium, reaching a high secret key rate is challenging in static environments. Recently, exploiting intelligent reflecting surface (IRS) as a means t…
▽ More
Physical layer key generation (PLKG) can significantly enhance the security of classic encryption schemes by enabling them to change their secret keys significantly faster and more efficient. However, due to the reliance of PLKG techniques on channel medium, reaching a high secret key rate is challenging in static environments. Recently, exploiting intelligent reflecting surface (IRS) as a means to induce randomness in static wireless channels has received significant research interest. However, the impact of spatial correlation between the IRS elements is rarely studied. To be specific, for the first time, in this contribution, we take into account a spatially correlated IRS which intends to enhance the secret key generation (SKG) rate in a static medium. Closed form analytical expressions for SKG rate are derived for the two cases of random phase shift and equal random phase shift for all the IRS elements. We also analyze the temporal correlation between the channel samples to ensure the randomness of the generated secret key sequence. We further formulate an optimization problem in which we determine the optimal portion of time within a coherence interval dedicated for the direct and indirect channel estimation. We show the accuracy and the fast convergence of our proposed sequential convex programming (SCP) based algorithm and discuss the various parameters affecting spatially correlated IRS assisted PLKG.
△ Less
Submitted 3 December, 2022;
originally announced December 2022.
-
Secure SWIPT in the Multiuser STAR-RIS Aided MISO Rate Splitting Downlink
Authors:
Hamid Reza Hashempour,
Hamed Bastami,
Majid Moradikia,
Seyed A. Zekavat,
Hamid Behroozi,
Gilberto Berardinelli,
A. Lee Swindlehurst
Abstract:
Recently, simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RISs) have emerged as a novel technology that provides 360 coverage and new degrees-of-freedom (DoFs). They are also capable of manipulating signal propagation and simultaneous wireless information and power transfer (SWIPT). This paper introduces a novel STAR-RIS-aided secure SWIPT system for downlink m…
▽ More
Recently, simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RISs) have emerged as a novel technology that provides 360 coverage and new degrees-of-freedom (DoFs). They are also capable of manipulating signal propagation and simultaneous wireless information and power transfer (SWIPT). This paper introduces a novel STAR-RIS-aided secure SWIPT system for downlink multiple input single output rate-splitting multiple access (RSMA) networks. The transmitter concurrently communicates with the information receivers (IRs) and sends energy to untrusted energy receivers (UERs). The UERs are also capable of wiretap** the IR streams. We assume that the channel state information (CSI) of the IRs is known at the information transmitter, but only imperfect CSI for the UERs is available at the energy transmitter. By exploiting RSMA, the base station splits the messages of the IRs into common and private parts. The former is encoded into a common stream that can be decoded by all IRs, while the private messages are individually decoded by their respective IRs. We find the precoders and STAR-RIS configuration that maximizes the achievable worst-case sum secrecy rate of the IRs under a total transmit power constraint, a sum energy constraint for the UERs, and subject to constraints on the transmission and reflection coefficients. The formulated problem is non-convex and has intricately coupled variables. To tackle this challenge, a suboptimal two-step iterative algorithm based on the sequential parametric convex approximation method is proposed. Simulations demonstrate that the RSMA-based algorithm implemented with a STAR-RIS enhances both the rate of confidential information transmission and the total spectral efficiency. Furthermore, our method surpasses the performance of both orthogonal multiple access (OMA) and non-OMA (NOMA).
△ Less
Submitted 2 June, 2024; v1 submitted 16 November, 2022;
originally announced November 2022.
-
Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection
Authors:
Hamed Bastami,
Majid Moradikia,
Hamid Behroozi,
Lajos Hanzo
Abstract:
The Cooperative Rate-Splitting (CRS) scheme, proposed evolves from conventional Rate Splitting (RS) and relies on forwarding a portion of the RS message by the relaying users. In terms of secrecy enhancement, it has been shown that CRS outperforms its non-cooperative counterpart for a two-user Multiple Input Single Output (MISO) Broadcast Channel (BC). Given the massive connectivity requirement of…
▽ More
The Cooperative Rate-Splitting (CRS) scheme, proposed evolves from conventional Rate Splitting (RS) and relies on forwarding a portion of the RS message by the relaying users. In terms of secrecy enhancement, it has been shown that CRS outperforms its non-cooperative counterpart for a two-user Multiple Input Single Output (MISO) Broadcast Channel (BC). Given the massive connectivity requirement of 6G, we have generalized the existing secure two-user CRS framework to the multi-user framework, where the highest-security users must be selected as the relay nodes. This paper addresses the problem of maximizing the Worst-Case Secrecy Rate (WCSR) in a UAV-aided downlink network where a multi-antenna UAV Base-Station (UAV-BS) serves a group of users in the presence of an external eavesdropper (Eve). We consider a practical scenario in which only imperfect channel state information of Eve is available at the UAV-BS. Accordingly, we conceive a robust and secure resource allocation algorithm, which maximizes the WCSR by jointly optimizing both the Secure Relaying User Selection (SRUS) and the network parameter allocation problem, including the RS transmit precoders, message splitting variables, time slot sharing and power allocation. To circumvent the resultant non-convexity owing to the discrete variables imposed by SRUS, we propose a two-stage algorithm where the SRUS and network parameter allocation are accomplished in two consecutive stages. With regard to the SRUS, we study both centralized and distributed protocols. On the other hand, for jointly optimizing the network parameter allocation we resort to the Sequential Parametric Convex Approximation (SPCA) algorithm. Our numerical results show that the proposed solution significantly outperforms the existing benchmarks for a wide range of network loads in terms of the WCSR.
△ Less
Submitted 8 October, 2022;
originally announced October 2022.
-
Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel
Authors:
Hamed Bastami,
Hamid Behroozi,
Majid Moradikia,
Ahmed Abdelhadi,
Derrick Wing Kwan Ngand,
Lajos Hanzo
Abstract:
UAVs are capable of improving the performance of next generation wireless systems. Specifically, UAVs can be exploited as aerial base-stations (UAV-BS) for supporting legitimate ground users in remote uncovered areas or in environments temporarily requiring high capacity. However, their communication performance is prone to both channel estimation errors and potential eavesdrop**. Hence, we inve…
▽ More
UAVs are capable of improving the performance of next generation wireless systems. Specifically, UAVs can be exploited as aerial base-stations (UAV-BS) for supporting legitimate ground users in remote uncovered areas or in environments temporarily requiring high capacity. However, their communication performance is prone to both channel estimation errors and potential eavesdrop**. Hence, we investigate the effective secrecy throughput of the UAV-aided uplink, in which rate-splitting multiple access (RSMA) is employed by each legitimate user for secure transmission under the scenario of massive access. To maximize the effective network secrecy throughput in the uplink, the transmission rate vs. power allocation relationship is formulated as a max-min optimization problem, relying on realistic imperfect CSI of both the legitimate users and of the potential eavesdroppers (Eves). We then propose a novel transformation of the associated probabilistic constraints for decoupling the variables, so that our design problem can be solved by alternatively activating the related block coordinate decent programming. In the model considered, each user transmits a superposition of two messages to a UAV-BS, each having different transmit power and the UAV-BS uses a SIC technique to decode the received messages. Given the non-convexity of the problem, it is decoupled into a pair of sub-problems. In particular, we derive a closed form expression for the optimal rate-splitting fraction of each user. Then, given the optimal rate-splitting fraction of each user, the ε-constrainted transmit power of each user is calculated by harnessing SPCA programming.
△ Less
Submitted 26 September, 2022;
originally announced September 2022.
-
Temporal Action Localization Using Gated Recurrent Units
Authors:
Hassan Keshvarikhojasteh,
Hoda Mohammadzade,
Hamid Behroozi
Abstract:
Temporal Action Localization (TAL) task which is to predict the start and end of each action in a video along with the class label of the action has numerous applications in the real world. But due to the complexity of this task, acceptable accuracy rates have not been achieved yet, whereas this is not the case regarding the action recognition task. In this paper, we propose a new network based on…
▽ More
Temporal Action Localization (TAL) task which is to predict the start and end of each action in a video along with the class label of the action has numerous applications in the real world. But due to the complexity of this task, acceptable accuracy rates have not been achieved yet, whereas this is not the case regarding the action recognition task. In this paper, we propose a new network based on Gated Recurrent Unit (GRU) and two novel post-processing methods for TAL task. Specifically, we propose a new design for the output layer of the conventionally GRU resulting in the so-called GRU-Split network. Moreover, linear interpolation is used to generate the action proposals with precise start and end times. Finally, to rank the generated proposals appropriately, we use a Learn to Rank (LTR) approach. We evaluated the performance of the proposed method on Thumos14 and ActivityNet-1.3 datasets. Results show the superiority of the performance of the proposed method compared to state-of-the-art. Specifically in the mean Average Precision (mAP) metric at Intersection over Union (IoU) of 0.7 on Thumos14, we get 27.52% accuracy which is 5.12% better than that of state-of-the-art methods.
△ Less
Submitted 24 May, 2022; v1 submitted 7 August, 2021;
originally announced August 2021.
-
On Learning-Assisted Content-Based Secure Image Transmission for Delay-Aware Systems with Randomly-Distributed Eavesdroppers -- Extended Version
Authors:
Mehdi Letafati,
Hamid Behroozi,
Babak Hossein Khalaj,
Eduard A. Jorswieck
Abstract:
In this paper, a learning-aided content-based wireless image transmission scheme is proposed, where a multi-antenna-aided source wishes to securely deliver an image to a legitimate destination in the presence of randomly distributed eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we propose a transm…
▽ More
In this paper, a learning-aided content-based wireless image transmission scheme is proposed, where a multi-antenna-aided source wishes to securely deliver an image to a legitimate destination in the presence of randomly distributed eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we propose a transmission scheme, where the source employs a hybrid method to realize both the error-free data delivery of public regions containing less-important pixels; and an artificial noise (AN)-aided transmission scheme to provide security for the regions containing large amount of information. Moreover, in order to reinforce system's security, fountain-based packet delivery is adopted: First, the source node encodes image packets into fountain-like packets prior to sending them over the air. The secrecy of our proposed scheme will be achieved if the legitimate destination correctly receives the entire image source packets, while conforming to the latency limits of the system, before Eves can obtain the important regions. Accordingly, the secrecy performance of our scheme is characterized by deriving the closed-form expression for the quality-of-security (QoSec) violation probability. Moreover, our proposed wireless image delivery scheme leverages the deep neural network (DNN) and learns to maintain optimized transmission parameters, while achieving a low QoSec violation probability. Simulation results are provided with some useful engineering insights which illustrate that our proposed learning-assisted scheme outperforms the state-of-the-arts by achieving considerable gains in terms of security and the delay requirement.
△ Less
Submitted 19 April, 2021;
originally announced April 2021.
-
DTW-Merge: A Novel Data Augmentation Technique for Time Series Classification
Authors:
Mohammad Akyash,
Hoda Mohammadzade,
Hamid Behroozi
Abstract:
In recent years, neural networks achieved much success in various applications. The main challenge in training deep neural networks is the lack of sufficient data to improve the model's generalization and avoid overfitting. One of the solutions is to generate new training samples. This paper proposes a novel data augmentation method for time series based on Dynamic Time War**. This method is ins…
▽ More
In recent years, neural networks achieved much success in various applications. The main challenge in training deep neural networks is the lack of sufficient data to improve the model's generalization and avoid overfitting. One of the solutions is to generate new training samples. This paper proposes a novel data augmentation method for time series based on Dynamic Time War**. This method is inspired by the concept that warped parts of two time series have similar temporal properties and therefore, exchanging them between the two series generates a new training sample. The proposed method selects an element of the optimal war** path randomly and then exchanges the segments that are aligned together. Exploiting the proposed approach with recently introduced ResNet reveals improved results on the 2018 UCR Time Series Classification Archive. By employing Gradient-weighted Class Activation Map** (Grad-CAM) and Multidimensional Scaling (MDS), we manifest that our method extract more discriminant features out of time series.
△ Less
Submitted 21 August, 2021; v1 submitted 1 March, 2021;
originally announced March 2021.
-
Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning
Authors:
Hamed Bastami,
Majid Moradikia,
Hamid Behroozi,
Rodrigo C. de Lamare,
Ahmed Abdelhadi,
Zhigou Ding
Abstract:
This paper investigates the physical layer security design of an untrusted relaying network where the source node coexists with a multi-antenna eavesdropper (Eve). While the communication relies on untrustworthy relay nodes to increase reliability, we aim to protect the confidentiality of information against combined eavesdrop** attacks performed by both untrusted relay nodes and Eve. Taking int…
▽ More
This paper investigates the physical layer security design of an untrusted relaying network where the source node coexists with a multi-antenna eavesdropper (Eve). While the communication relies on untrustworthy relay nodes to increase reliability, we aim to protect the confidentiality of information against combined eavesdrop** attacks performed by both untrusted relay nodes and Eve. Taking into account the hardware impairments, and power budget constraints, this paper presents a novel approach to jointly optimize relay beamformer and transmit powers aimed at maximizing average secrecy rate (ASR). The resultant optimization problem is non-convex, and a suboptimal solution is obtained through the sequential parametric convex approximation (SPCA) method. In order to prevent any failure due to infeasibility, we propose an iterative initialization algorithm to find the feasible initial point of the original problem. To satisfy low-latency as one of the main key performance indicators (KPI) required in beyond 5G (B5G) communications, a computationally efficient data-driven approach is developed exploiting a deep learning model to improve the ASR while the computational burden is significantly reduced. Simulation results assess the effect of different system parameters on the ASR performance as well as the effectiveness of the proposed deep learning solution in large-scale cases.
△ Less
Submitted 7 January, 2021;
originally announced January 2021.
-
Fairness-Oriented User Association in HetNets Using Bargaining Game Theory
Authors:
Ehsan Sadeghi,
Hamid Behroozi,
Stefano Rini
Abstract:
In this paper, the user association and resource allocation problem is investigated for a two-tier HetNet consisting of one macro Base Station (BS) and a number of pico BSs. The effectiveness of user association to BSs is evaluated in terms of fairness and load distribution. In particular, the problem of determining a fair user association is formulated as a bargaining game so that for the Nash Ba…
▽ More
In this paper, the user association and resource allocation problem is investigated for a two-tier HetNet consisting of one macro Base Station (BS) and a number of pico BSs. The effectiveness of user association to BSs is evaluated in terms of fairness and load distribution. In particular, the problem of determining a fair user association is formulated as a bargaining game so that for the Nash Bargaining Solution (NBS) abiding the fairness axioms provides an optimal and fair user association. The NBS also yields in a Pareto optimal solution and leads to a proportional fair solution in the proposed HetNet model. Additionally, we introduce a novel algorithmic solution in which a new Coalition Generation Algorithm (CGA), called SINR-based CGA, is considered in order to simplify the coalition generation phase. Our simulation results show the efficiency of the proposed user association scheme in terms of fairness and load distribution among BSs and users. In particular, we compare the performance of the proposed solution with that of the throughput-oriented scheme in terms of the max-sum-rate scheme and show that the proposed solution yields comparable average data rates and overall sum rate.
△ Less
Submitted 9 November, 2020;
originally announced November 2020.
-
Compressed-Domain Detection and Estimation for Colocated MIMO Radar
Authors:
Ehsan Tohidi,
Alireza Hariri,
Hamid Behroozi,
Mohammad Mahdi Nayebi,
Geert Leus,
Athina Petropulu
Abstract:
This paper proposes compressed domain signal processing (CSP) multiple input multiple output (MIMO) radar, a MIMO radar approach that achieves substantial sample complexity reduction by exploiting the idea of CSP. CSP MIMO radar involves two levels of data compression followed by target detection at the compressed domain. First, compressive sensing is applied at the receive antennas, followed by a…
▽ More
This paper proposes compressed domain signal processing (CSP) multiple input multiple output (MIMO) radar, a MIMO radar approach that achieves substantial sample complexity reduction by exploiting the idea of CSP. CSP MIMO radar involves two levels of data compression followed by target detection at the compressed domain. First, compressive sensing is applied at the receive antennas, followed by a Capon beamformer which is designed to suppress clutter. Exploiting the sparse nature of the beamformer output, a second compression is applied to the filtered data. Target detection is subsequently conducted by formulating and solving a hypothesis testing problem at each grid point of the discretized angle space. The proposed approach enables an 8-fold reduction of the sample complexity in some settings as compared to a conventional compressed sensing (CS) MIMO radar thus enabling faster target detection. Receiver operating characteristic (ROC) curves of the proposed detector are provided. Simulation results show that the proposed approach outperforms recovery-based compressed sensing algorithms.
△ Less
Submitted 17 June, 2020;
originally announced June 2020.
-
Can a Multi-Hop Link Relying on Untrusted Amplify-and-Forward Relays Render Security?
Authors:
Milad Tatar Mamaghani,
Ali Kuhestani,
Hamid Behroozi
Abstract:
Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things (IoT). However, sometimes due to the necessity of multi-hop relaying in such communication networks, it is challenging to guarantee the secrecy of cooperative transmissions when the relays may themselves be eavesdroppers, i.e., we may face with the untrusted relayin…
▽ More
Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things (IoT). However, sometimes due to the necessity of multi-hop relaying in such communication networks, it is challenging to guarantee the secrecy of cooperative transmissions when the relays may themselves be eavesdroppers, i.e., we may face with the untrusted relaying scenario where the relays are both necessary helpers and potential adversary. To obviate this issue, a new cooperative jamming scheme is proposed in this paper, in which the data can be confidentially communicated from the source to the destination through multiple untrusted relays. In our proposed secure transmission scheme, all the legitimate nodes contribute to providing secure communication by intelligently injecting artificial noises to the network in different communication phases. For the sake of analysis, we consider a multi-hop untrusted relaying network with two successive intermediate nodes, i.e, a three-hop communications network. Given this system model, a new closed-form expression is presented in the high signal-to-noise ratio (SNR) region for the Ergodic secrecy rate (ESR). Furthermore, we evaluate the high SNR slope and power offset of the ESR to gain an insightful comparison of the proposed secure transmission scheme and the state-of-arts. Our numerical results highlight that the proposed secure transmission scheme provides better secrecy rate performance compared with the two-hop untrusted relaying as well as the direct transmission schemes.
△ Less
Submitted 5 July, 2020; v1 submitted 17 May, 2019;
originally announced May 2019.
-
Sparse Antenna and Pulse Placement for Colocated MIMO Radar
Authors:
Ehsan Tohidi,
Mario Coutino,
Sundeep Prabhakar Chepuri,
Hamid Behroozi,
Mohammad Mahdi Nayebi,
Geert Leus
Abstract:
Multiple input multiple output (MIMO) radar is known for its superiority over conventional radar due to its antenna and waveform diversity. Although higher angular resolution, improved parameter identifiability, and better target detection are achieved, the hardware costs (due to multiple transmitters and multiple receivers) and high energy consumption (multiple pulses) limit the usage of MIMO rad…
▽ More
Multiple input multiple output (MIMO) radar is known for its superiority over conventional radar due to its antenna and waveform diversity. Although higher angular resolution, improved parameter identifiability, and better target detection are achieved, the hardware costs (due to multiple transmitters and multiple receivers) and high energy consumption (multiple pulses) limit the usage of MIMO radars in large scale networks. On one hand, higher angle and velocity estimation accuracy is required, but on the other hand, a lower number of antennas/pulses is desirable. To achieve such a compromise, in this work, the Cram'er-Rao lower bound (CRLB) for the angle and velocity estimator is employed as a performance metric to design the antenna and pulse placement. It is shown that the CRLB derived for two targets is a more appropriate criterion in comparison with the single-target CRLB since the two-target CRLB takes into account both the mainlobe width and sidelobe level of the ambiguity function. In this paper, several algorithms for antenna and pulse selection based on convex and submodular optimization are proposed. Numerical experiments are provided to illustrate the developed theory.
△ Less
Submitted 27 May, 2018;
originally announced May 2018.
-
On the Ice-Wine Problem: Recovering Linear Combination of Codewords over the Gaussian Multiple Access Channel
Authors:
Shahab Ghasemi-Goojani,
Hamid Behroozi
Abstract:
In this paper, we consider the Ice-Wine problem: Two transmitters send their messages over the Gaussian Multiple-Access Channel (MAC) and a receiver aims to recover a linear combination of codewords. The best known achievable rate-region for this problem is due to [1],[2] as $R_{i}\leq\frac{1}{2}\log\left(\frac{1}{2}+{\rm SNR}\right)$ $(i=1,2)$. In this paper, we design a novel scheme using lattic…
▽ More
In this paper, we consider the Ice-Wine problem: Two transmitters send their messages over the Gaussian Multiple-Access Channel (MAC) and a receiver aims to recover a linear combination of codewords. The best known achievable rate-region for this problem is due to [1],[2] as $R_{i}\leq\frac{1}{2}\log\left(\frac{1}{2}+{\rm SNR}\right)$ $(i=1,2)$. In this paper, we design a novel scheme using lattice codes and show that the rate region of this problem can be improved. The main difference between our proposed scheme with known schemes in [1],[2] is that instead of recovering the sum of codewords at the decoder, a non-integer linear combination of codewords is recovered. Comparing the achievable rate-region with the outer bound, $R_{i}\leq\frac{1}{2}\log\left(1+{\rm SNR}\right)\,\,(i=1,2)$, we observe that the achievable rate for each user is partially tight. Finally, by applying our proposed scheme to the Gaussian Two Way Relay Channel (GTWRC), we show that the best rate region for this problem can be improved.
△ Less
Submitted 18 August, 2014;
originally announced August 2014.
-
Nested Lattice Codes for Gaussian Two-Way Relay Channels
Authors:
Shahab Ghasemi-Goojani,
Hamid Behroozi
Abstract:
In this paper, we consider a Gaussian two-way relay channel (GTRC), where two sources exchange messages with each other through a relay. We assume that there is no direct link between sources, and all nodes operate in full-duplex mode. By utilizing nested lattice codes for the uplink (i.e., MAC phase), and structured binning for the downlink (i.e., broadcast phase), we propose two achievable schem…
▽ More
In this paper, we consider a Gaussian two-way relay channel (GTRC), where two sources exchange messages with each other through a relay. We assume that there is no direct link between sources, and all nodes operate in full-duplex mode. By utilizing nested lattice codes for the uplink (i.e., MAC phase), and structured binning for the downlink (i.e., broadcast phase), we propose two achievable schemes. Scheme 1 is based on compute and forward scheme of [1] while scheme 2 utilizes two different lattices for source nodes based on a three-stage lattice partition chain. We show that scheme 2 can achieve capacity region at the high signal-to-noise ratio (SNR). Regardless all channel parameters, the achievable rate of scheme 2 is within 0.2654 bit from the cut-set outer bound for user 1. For user 2, the proposed scheme achieves within 0.167 bit from the outer bound if channel coefficient is larger than one, and achieves within 0.2658 bit from the outer bound if channel coefficient is smaller than one. Moreover, sum rate of the proposed scheme is within 0.334 bits from the sum capacity. These gaps for GTRC are the best gap-to-capacity results to date.
△ Less
Submitted 26 January, 2013;
originally announced January 2013.
-
On the Achievable Rate-Regions for State-Dependent Gaussian Interference Channel
Authors:
Shahab Ghasemi-Goojani,
Hamid Behroozi
Abstract:
In this paper, we study a general additive state-dependent Gaussian interference channel (ASD-GIC) where we consider two-user interference channel with two independent states known non-causally at both transmitters, but unknown to either of the receivers. An special case, where the additive states over the two links are the same is studied in [1], [2], in which it is shown that the gap between the…
▽ More
In this paper, we study a general additive state-dependent Gaussian interference channel (ASD-GIC) where we consider two-user interference channel with two independent states known non-causally at both transmitters, but unknown to either of the receivers. An special case, where the additive states over the two links are the same is studied in [1], [2], in which it is shown that the gap between the achievable symmetric rate and the upper bound is less than 1/4 bit for the strong interference case. Here, we also consider the case where each channel state has unbounded variance [3], which is referred to as the strong interferences. We first obtain an outer bound on the capacity region. By utilizing lattice-based coding schemes, we obtain four achievable rate regions. Depend on noise variance and channel power constraint, achievable rate regions can coincide with the channel capacity region. For the symmetric model, the achievable sum-rate reaches to within 0.661 bit of the channel capacity for signal to noise ratio (SNR) greater than one.
△ Less
Submitted 23 January, 2013;
originally announced January 2013.
-
On the Capacity of Pairwise Collaborative Networks
Authors:
Saeed A. Astaneh,
Saeed Gazor,
Hamid Behroozi
Abstract:
We derive expressions for the achievable rate region of a collaborative coding scheme in a two-transmitter, two-receiver Pairwise Collaborative Network (PCN) where one transmitter and receiver pair, namely relay pair, assists the other pair, namely the source pair, by partially decoding and forwarding the transmitted message to the intended receiver. The relay pair provides such assistance while…
▽ More
We derive expressions for the achievable rate region of a collaborative coding scheme in a two-transmitter, two-receiver Pairwise Collaborative Network (PCN) where one transmitter and receiver pair, namely relay pair, assists the other pair, namely the source pair, by partially decoding and forwarding the transmitted message to the intended receiver. The relay pair provides such assistance while handling a private message. We assume that users can use the past channel outputs and can transmit and receive at the same time and in the same frequency band. In this collaborative scheme, the transmitter of the source pair splits its information into two independent parts. Ironically, the relay pair employs the decode and forward coding to assist the source pair in delivering a part of its message and re-encodes the decoded message along with private message, which is intended to the receiver of the relay pair, and broadcasts the results. The receiver of the relay pair decodes both messages, retrieves the private message, re-encodes and transmits the decoded massage to the intended destination. We also characterize the achievable rate region for Gaussian PCN. Finally, we provide numerical results to study the rate trade off for the involved pairs. Numerical result shows that the collaboration offers gain when the channel gain between the users of the relay pair are strong. It also shows that if the channel conditions between transmitters or between the receivers of the relay and source pairs are poor, such a collaboration is not beneficial.
△ Less
Submitted 5 July, 2008;
originally announced July 2008.