-
On the Need of Neuromorphic Twins to Detect Denial-of-Service Attacks on Communication Networks
Authors:
Holger Boche,
Rafael F. Schaefer,
H. Vincent Poor,
Frank H. P. Fitzek
Abstract:
As we are more and more dependent on the communication technologies, resilience against any attacks on communication networks is important to guarantee the digital sovereignty of our society. New developments of communication networks tackle the problem of resilience by in-network computing approaches for higher protocol layers, while the physical layer remains an open problem. This is particularl…
▽ More
As we are more and more dependent on the communication technologies, resilience against any attacks on communication networks is important to guarantee the digital sovereignty of our society. New developments of communication networks tackle the problem of resilience by in-network computing approaches for higher protocol layers, while the physical layer remains an open problem. This is particularly true for wireless communication systems which are inherently vulnerable to adversarial attacks due to the open nature of the wireless medium. In denial-of-service (DoS) attacks, an active adversary is able to completely disrupt the communication and it has been shown that Turing machines are incapable of detecting such attacks. As Turing machines provide the fundamental limits of digital information processing and therewith of digital twins, this implies that even the most powerful digital twins that preserve all information of the physical network error-free are not capable of detecting such attacks. This stimulates the question of how powerful the information processing hardware must be to enable the detection of DoS attacks. Therefore, in the paper the need of neuromorphic twins is advocated and by the use of Blum-Shub-Smale machines a first implementation that enables the detection of DoS attacks is shown. This result holds for both cases of with and without constraints on the input and jamming sequences of the adversary.
△ Less
Submitted 29 October, 2022;
originally announced October 2022.
-
Energy Efficiency of Massive Random Access in MIMO Quasi-Static Rayleigh Fading Channels with Finite Blocklength
Authors:
Junyuan Gao,
Yongpeng Wu,
Shuo Shao,
Wei Yang,
H. Vincent Poor
Abstract:
This paper considers the massive random access problem in MIMO quasi-static Rayleigh fading channels. Specifically, we derive achievability and converse bounds on the minimum energy-per-bit required for each active user to transmit $J$ bits with blocklength $n$ and power $P$ under a per-user probability of error (PUPE) constraint, in the cases with and without \emph{a priori} channel state informa…
▽ More
This paper considers the massive random access problem in MIMO quasi-static Rayleigh fading channels. Specifically, we derive achievability and converse bounds on the minimum energy-per-bit required for each active user to transmit $J$ bits with blocklength $n$ and power $P$ under a per-user probability of error (PUPE) constraint, in the cases with and without \emph{a priori} channel state information at the receiver (CSIR and no-CSI). In the case of no-CSI, we consider both the settings with and without knowing the number $K_a$ of active users. The achievability bounds rely on the design of the ``good region''. Numerical evaluation shows the gap between achievability and converse bounds is less than $2.5$ dB in the CSIR case and less than $4$ dB in the no-CSI case in most considered regimes. When the distribution of $K_a$ is known, the performance gap between the cases with and without knowing the value of $K_a$ is small. For example, in the setup with blocklength $n=1000$, payload $J=100$, error requirement $ε=0.001$, and $L=128$ receive antennas, compared to the case with known $K_a$, the extra required energy-per-bit when $K_a$ is unknown and distributed as $K_a\sim\text{Binom}(K,0.4)$ is less than $0.3$ dB on the converse side and $1.1$ dB on the achievability side. The spectral efficiency grows approximately linearly with $L$ in the CSIR case, whereas the growth rate decreases with no-CSI. Moreover, we study the performance of a pilot-assisted scheme, which is suboptimal especially when $K_a$ is large. Building on non-asymptotic results, when all users are active and $J=Θ(1)$, we obtain scaling laws as follows: when $L=Θ\left(n^2\right)$ and $P=Θ\left(\frac{1}{n^2}\right)$, one can reliably serve $K=\mathcal{O}(n^2)$ users with no-CSI; under mild conditions with CSIR, the PUPE requirement is satisfied if and only if $\frac{nL\ln KP}{K}=Ω\left(1\right)$.
△ Less
Submitted 21 October, 2022;
originally announced October 2022.
-
Random Orthogonalization for Federated Learning in Massive MIMO Systems
Authors:
Xizixiang Wei,
Cong Shen,
**g Yang,
H. Vincent Poor
Abstract:
We propose a novel communication design, termed random orthogonalization, for federated learning (FL) in a massive multiple-input and multiple-output (MIMO) wireless system. The key novelty of random orthogonalization comes from the tight coupling of FL and two unique characteristics of massive MIMO -- channel hardening and favorable propagation. As a result, random orthogonalization can achieve n…
▽ More
We propose a novel communication design, termed random orthogonalization, for federated learning (FL) in a massive multiple-input and multiple-output (MIMO) wireless system. The key novelty of random orthogonalization comes from the tight coupling of FL and two unique characteristics of massive MIMO -- channel hardening and favorable propagation. As a result, random orthogonalization can achieve natural over-the-air model aggregation without requiring transmitter side channel state information (CSI) for the uplink phase of FL, while significantly reducing the channel estimation overhead at the receiver. We extend this principle to the downlink communication phase and develop a simple but highly effective model broadcast method for FL. We also relax the massive MIMO assumption by proposing an enhanced random orthogonalization design for both uplink and downlink FL communications, that does not rely on channel hardening or favorable propagation. Theoretical analyses with respect to both communication and machine learning performance are carried out. In particular, an explicit relationship among the convergence rate, the number of clients, and the number of antennas is established. Experimental results validate the effectiveness and efficiency of random orthogonalization for FL in massive MIMO.
△ Less
Submitted 18 October, 2022;
originally announced October 2022.
-
Toward Secure and Private Over-the-Air Federated Learning
Authors:
Na Yan,
Kezhi Wang,
Kangda Zhi,
Cunhua Pan,
Kok Keong Chai,
H. Vincent Poor
Abstract:
In this paper, a novel secure and private over-the-air federated learning (SP-OTA-FL) framework is studied where noise is employed to protect data privacy and system security. Specifically, the privacy leakage of user data and the security level of the system are measured by differential privacy (DP) and mean square error security (MSE-security), respectively. To mitigate the impact of noise on le…
▽ More
In this paper, a novel secure and private over-the-air federated learning (SP-OTA-FL) framework is studied where noise is employed to protect data privacy and system security. Specifically, the privacy leakage of user data and the security level of the system are measured by differential privacy (DP) and mean square error security (MSE-security), respectively. To mitigate the impact of noise on learning accuracy, we propose a channel-weighted post-processing (CWPP) mechanism, which assigns a smaller weight to the gradient of the device with poor channel conditions. Furthermore, employing CWPP can avoid the issue that the signal-to-noise ratio (SNR) of the overall system is limited by the device with the worst channel condition in aligned over-the-air federated learning (OTA-FL). We theoretically analyze the effect of noise on privacy and security protection and also illustrate the adverse impact of noise on learning performance by conducting convergence analysis. Based on these analytical results, we propose device scheduling policies considering privacy and security protection in different cases of channel noise. In particular, we formulate an integer nonlinear fractional programming problem aiming to minimize the negative impact of noise on the learning process. We obtain the closed-form solution to the optimization problem when the model is with high dimension. For the general case, we propose a secure and private algorithm (SPA) based on the branch-and-bound (BnB) method, which can obtain an optimal solution with low complexity. The effectiveness of the proposed CWPP mechanism and the policies for device selection are validated through simulations.
△ Less
Submitted 14 October, 2022;
originally announced October 2022.
-
Spreading Processes with Mutations over Multi-layer Networks
Authors:
Mansi Sood,
Anirudh Sridhar,
Rashad Eletreby,
Chai Wah Wu,
Simon A. Levin,
H. Vincent Poor,
Osman Yagan
Abstract:
A key scientific challenge during the outbreak of novel infectious diseases is to predict how the course of the epidemic changes under different countermeasures that limit interaction in the population. Most epidemiological models do not consider the role of mutations and heterogeneity in the type of contact events. However, pathogens have the capacity to mutate in response to changing environment…
▽ More
A key scientific challenge during the outbreak of novel infectious diseases is to predict how the course of the epidemic changes under different countermeasures that limit interaction in the population. Most epidemiological models do not consider the role of mutations and heterogeneity in the type of contact events. However, pathogens have the capacity to mutate in response to changing environments, especially caused by the increase in population immunity to existing strains and the emergence of new pathogen strains poses a continued threat to public health. Further, in light of differing transmission risks in different congregate settings (e.g., schools and offices), different mitigation strategies may need to be adopted to control the spread of infection. We analyze a multi-layer multi-strain model by simultaneously accounting for i) pathways for mutations in the pathogen leading to the emergence of new pathogen strains, and ii) differing transmission risks in different congregate settings, modeled as network-layers. Assuming complete cross-immunity among strains, namely, recovery from any infection prevents infection with any other (an assumption that will need to be relaxed to deal with COVID-19 or influenza), we derive the key epidemiological parameters for the proposed multi-layer multi-strain framework. We demonstrate that reductions to existing network-based models that discount heterogeneity in either the strain or the network layers can lead to incorrect predictions for the course of the outbreak. In addition, our results highlight that the impact of imposing/lifting mitigation measures concerning different contact network layers (e.g., school closures or work-from-home policies) should be evaluated in connection with their effect on the likelihood of the emergence of new pathogen strains.
△ Less
Submitted 24 January, 2023; v1 submitted 10 October, 2022;
originally announced October 2022.
-
Alternating Differentiation for Optimization Layers
Authors:
Haixiang Sun,
Ye Shi,
**gya Wang,
Hoang Duong Tuan,
H. Vincent Poor,
Dacheng Tao
Abstract:
The idea of embedding optimization problems into deep neural networks as optimization layers to encode constraints and inductive priors has taken hold in recent years. Most existing methods focus on implicitly differentiating Karush-Kuhn-Tucker (KKT) conditions in a way that requires expensive computations on the Jacobian matrix, which can be slow and memory-intensive. In this paper, we developed…
▽ More
The idea of embedding optimization problems into deep neural networks as optimization layers to encode constraints and inductive priors has taken hold in recent years. Most existing methods focus on implicitly differentiating Karush-Kuhn-Tucker (KKT) conditions in a way that requires expensive computations on the Jacobian matrix, which can be slow and memory-intensive. In this paper, we developed a new framework, named Alternating Differentiation (Alt-Diff), that differentiates optimization problems (here, specifically in the form of convex optimization problems with polyhedral constraints) in a fast and recursive way. Alt-Diff decouples the differentiation procedure into a primal update and a dual update in an alternating way. Accordingly, Alt-Diff substantially decreases the dimensions of the Jacobian matrix especially for optimization with large-scale constraints and thus increases the computational speed of implicit differentiation. We show that the gradients obtained by Alt-Diff are consistent with those obtained by differentiating KKT conditions. In addition, we propose to truncate Alt-Diff to further accelerate the computational speed. Under some standard assumptions, we show that the truncation error of gradients is upper bounded by the same order of variables' estimation error. Therefore, Alt-Diff can be truncated to further increase computational speed without sacrificing much accuracy. A series of comprehensive experiments validate the superiority of Alt-Diff.
△ Less
Submitted 24 April, 2023; v1 submitted 3 October, 2022;
originally announced October 2022.
-
Goal-Oriented Quantization: Analysis, Design, and Application to Resource Allocation
Authors:
Hang Zou,
Chao Zhang,
Samson Lasaulce,
Lucas Saludjian,
Vincent Poor
Abstract:
In this paper, the situation in which a receiver has to execute a task from a quantized version of the information source of interest is considered. The task is modeled by the minimization problem of a general goal function $f(x;g)$ for which the decision $x$ has to be taken from a quantized version of the parameters $g$. This problem is relevant in many applications e.g., for radio resource alloc…
▽ More
In this paper, the situation in which a receiver has to execute a task from a quantized version of the information source of interest is considered. The task is modeled by the minimization problem of a general goal function $f(x;g)$ for which the decision $x$ has to be taken from a quantized version of the parameters $g$. This problem is relevant in many applications e.g., for radio resource allocation (RA), high spectral efficiency communications, controlled systems, or data clustering in the smart grid. By resorting to high resolution (HR) analysis, it is shown how to design a quantizer that minimizes the gap between the minimum of $f$ (which would be reached by knowing $g$ perfectly) and what is effectively reached with a quantized $g$. The conducted formal analysis both provides quantization strategies in the HR regime and insights for the general regime and allows a practical algorithm to be designed. The analysis also allows one to provide some elements to the new and fundamental problem of the relationship between the goal function regularity properties and the hardness to quantize its parameters. The derived results are discussed and supported by a rich numerical performance analysis in which known RA goal functions are studied and allows one to exhibit very significant improvements by tailoring the quantization operation to the final task.
△ Less
Submitted 30 September, 2022;
originally announced September 2022.
-
Joint Convexity of Error Probability in Blocklength and Transmit Power in the Finite Blocklength Regime
Authors:
Yao Zhu,
Yulin Hu,
Xiaopeng Yuan,
M. Cenk Gursoy,
H. Vincent Poor,
Anke Schmeink
Abstract:
To support ultra-reliable and low-latency services for mission-critical applications, transmissions are usually carried via short blocklength codes, i.e., in the so-called finite blocklength (FBL) regime. Different from the infinite blocklength regime where transmissions are assumed to be arbitrarily reliable at the Shannon's capacity, the reliability and capacity performances of an FBL transmissi…
▽ More
To support ultra-reliable and low-latency services for mission-critical applications, transmissions are usually carried via short blocklength codes, i.e., in the so-called finite blocklength (FBL) regime. Different from the infinite blocklength regime where transmissions are assumed to be arbitrarily reliable at the Shannon's capacity, the reliability and capacity performances of an FBL transmission are impacted by the coding blocklength. The relationship among reliability, coding rate, blocklength and channel quality has recently been characterized in the literature, considering the FBL performance model. In this paper, we follow this model, and prove the joint convexity of the FBL error probability with respect to blocklength and transmit power within a region of interest, as a key enabler for designing systems to achieve globally optimal performance levels. Moreover, we apply the joint convexity to general use cases and efficiently solve the joint optimization problem in the setting with multiple users. We also extend the applicability of the proposed approach by proving that the joint convexity still holds in fading channels, as well as in relaying networks. Via simulations, we validate our analytical results and demonstrate the advantage of leveraging the joint convexity compared to other commonly-applied approaches.
△ Less
Submitted 29 September, 2022;
originally announced September 2022.
-
Age of Information: Can CR-NOMA Help?
Authors:
Zhiguo Ding,
Robert Schober,
H. V. Poor
Abstract:
The aim of this paper is to exploit cognitive-ratio inspired NOMA (CR-NOMA) transmission to reduce the age of information in wireless networks. In particular, two CR-NOMA transmission protocols are developed by utilizing the key features of different data generation models and applying CR-NOMA as an add-on to a legacy orthogonal multiple access (OMA) based network. The fact that the implementation…
▽ More
The aim of this paper is to exploit cognitive-ratio inspired NOMA (CR-NOMA) transmission to reduce the age of information in wireless networks. In particular, two CR-NOMA transmission protocols are developed by utilizing the key features of different data generation models and applying CR-NOMA as an add-on to a legacy orthogonal multiple access (OMA) based network. The fact that the implementation of CR-NOMA causes little disruption to the legacy OMA network means that the proposed CR-NOMA protocols can be practically implemented in various communication systems which are based on OMA. Closed-form expressions for the AoI achieved by the proposed NOMA protocols are developed to facilitate performance evaluation, and asymptotic studies are carried out to identify two benefits of using NOMA to reduce the AoI in wireless networks. One is that the use of NOMA provides users more opportunities to transmit, which means that the users can update their base station more frequently. The other is that the use of NOMA can reduce access delay, i.e., the users are scheduled to transmit earlier than in the OMA case, which is useful to improve the freshness of the data available in the wireless network.
△ Less
Submitted 20 September, 2022;
originally announced September 2022.
-
On Differential Privacy for Federated Learning in Wireless Systems with Multiple Base Stations
Authors:
Nima Tavangaran,
Mingzhe Chen,
Zhaohui Yang,
José Mairton B. Da Silva Jr.,
H. Vincent Poor
Abstract:
In this work, we consider a federated learning model in a wireless system with multiple base stations and inter-cell interference. We apply a differential private scheme to transmit information from users to their corresponding base station during the learning phase. We show the convergence behavior of the learning process by deriving an upper bound on its optimality gap. Furthermore, we define an…
▽ More
In this work, we consider a federated learning model in a wireless system with multiple base stations and inter-cell interference. We apply a differential private scheme to transmit information from users to their corresponding base station during the learning phase. We show the convergence behavior of the learning process by deriving an upper bound on its optimality gap. Furthermore, we define an optimization problem to reduce this upper bound and the total privacy leakage. To find the locally optimal solutions of this problem, we first propose an algorithm that schedules the resource blocks and users. We then extend this scheme to reduce the total privacy leakage by optimizing the differential privacy artificial noise. We apply the solutions of these two procedures as parameters of a federated learning system. In this setting, we assume that each user is equipped with a classifier. Moreover, the communication cells are assumed to have mostly fewer resource blocks than numbers of users. The simulation results show that our proposed scheduler improves the average accuracy of the predictions compared with a random scheduler. Furthermore, its extended version with noise optimizer significantly reduces the amount of privacy leakage.
△ Less
Submitted 24 August, 2022;
originally announced August 2022.
-
Performance Optimization for Semantic Communications: An Attention-based Reinforcement Learning Approach
Authors:
Yining Wang,
Mingzhe Chen,
Tao Luo,
Walid Saad,
Dusit Niyato,
H. Vincent Poor,
Shuguang Cui
Abstract:
In this paper, a semantic communication framework is proposed for textual data transmission. In the studied model, a base station (BS) extracts the semantic information from textual data, and transmits it to each user. The semantic information is modeled by a knowledge graph (KG) that consists of a set of semantic triples. After receiving the semantic information, each user recovers the original t…
▽ More
In this paper, a semantic communication framework is proposed for textual data transmission. In the studied model, a base station (BS) extracts the semantic information from textual data, and transmits it to each user. The semantic information is modeled by a knowledge graph (KG) that consists of a set of semantic triples. After receiving the semantic information, each user recovers the original text using a graph-to-text generation model. To measure the performance of the considered semantic communication framework, a metric of semantic similarity (MSS) that jointly captures the semantic accuracy and completeness of the recovered text is proposed. Due to wireless resource limitations, the BS may not be able to transmit the entire semantic information to each user and satisfy the transmission delay constraint. Hence, the BS must select an appropriate resource block for each user as well as determine and transmit part of the semantic information to the users. As such, we formulate an optimization problem whose goal is to maximize the total MSS by jointly optimizing the resource allocation policy and determining the partial semantic information to be transmitted. To solve this problem, a proximal-policy-optimization-based reinforcement learning (RL) algorithm integrated with an attention network is proposed. The proposed algorithm can evaluate the importance of each triple in the semantic information using an attention network and then, build a relationship between the importance distribution of the triples in the semantic information and the total MSS. Compared to traditional RL algorithms, the proposed algorithm can dynamically adjust its learning rate thus ensuring convergence to a locally optimal solution.
△ Less
Submitted 17 August, 2022;
originally announced August 2022.
-
Interference Cancellation GAN Framework for Dynamic Channels
Authors:
Hung T. Nguyen,
Steven Bottone,
Kwang Taik Kim,
Mung Chiang,
H. Vincent Poor
Abstract:
Symbol detection is a fundamental and challenging problem in modern communication systems, e.g., multiuser multiple-input multiple-output (MIMO) setting. Iterative Soft Interference Cancellation (SIC) is a state-of-the-art method for this task and recently motivated data-driven neural network models, e.g. DeepSIC, that can deal with unknown non-linear channels. However, these neural network models…
▽ More
Symbol detection is a fundamental and challenging problem in modern communication systems, e.g., multiuser multiple-input multiple-output (MIMO) setting. Iterative Soft Interference Cancellation (SIC) is a state-of-the-art method for this task and recently motivated data-driven neural network models, e.g. DeepSIC, that can deal with unknown non-linear channels. However, these neural network models require thorough timeconsuming training of the networks before applying, and is thus not readily suitable for highly dynamic channels in practice. We introduce an online training framework that can swiftly adapt to any changes in the channel. Our proposed framework unifies the recent deep unfolding approaches with the emerging generative adversarial networks (GANs) to capture any changes in the channel and quickly adjust the networks to maintain the top performance of the model. We demonstrate that our framework significantly outperforms recent neural network models on highly dynamic channels and even surpasses those on the static channel in our experiments.
△ Less
Submitted 16 August, 2022;
originally announced August 2022.
-
Cognitive Radio-Inspired Rate-Splitting Multiple Access for Semi-Grant-Free Transmissions
Authors:
Hongwu Liu,
Kyeong ** Kim,
Theodoros A. Tsiftsis,
Bruno Clerckx,
Kyung Sup Kwak,
H. Vincent Poor
Abstract:
In this paper, we propose a cognitive radio-inspired rate-splitting multiple access (CR-RSMA) scheme to assist semi-grant-free (SGF) transmissions in which a grant-based user (GBU) and multiple grant-free users (GFUs) access the base-station (BS) by sharing the same resource block. Using the cognitive radio principle, the GBU and admitted GFU are treated as the primary and secondary users, respect…
▽ More
In this paper, we propose a cognitive radio-inspired rate-splitting multiple access (CR-RSMA) scheme to assist semi-grant-free (SGF) transmissions in which a grant-based user (GBU) and multiple grant-free users (GFUs) access the base-station (BS) by sharing the same resource block. Using the cognitive radio principle, the GBU and admitted GFU are treated as the primary and secondary users, respectively, and rate-splitting is applied at the admitted GFU to realize SGF transmissions. The admitted GFU's transmit power allocation, target rate allocation, and successive interference cancellation decoding order at the BS are jointly optimized to attain the maximum achievable rate for the admitted GFU without deteriorating the GBU's outage performance compared to orthogonal multiple access. Due to the extended non-outage zone, CR-RSMA-assised SGF (CR-RSMA-SGF) transmissions achieve a lower outage probability than SGF transmissions assisted by cognitive radio-inspired non-orthogonal multiple access. Exact expressions and asymptotic analysis for the admitted GFU's outage probability are derived to evaluate the system performance achieved by CR-RSMA-SGF transmissions. The superior outage performance and full multiuser diversity gain achieved by CR-RSMA-SGF transmissions are verified by the analytical and simulation results.
△ Less
Submitted 15 August, 2022;
originally announced August 2022.
-
Beamforming Design for the Performance Optimization of Intelligent Reflecting Surface Assisted Multicast MIMO Networks
Authors:
Songling Zhang,
Zhaohui Yang,
Mingzhe Chen,
Danpu Liu,
Kai-Kit Wong,
H. Vincent Poor
Abstract:
In this paper, the problem of maximizing the sum of data rates of all users in an intelligent reflecting surface (IRS)-assisted millimeter wave multicast multiple-input multiple-output communication system is studied. In the considered model, one IRS is deployed to assist the communication from a multiantenna base station (BS) to the multi-antenna users that are clustered into several groups. Our…
▽ More
In this paper, the problem of maximizing the sum of data rates of all users in an intelligent reflecting surface (IRS)-assisted millimeter wave multicast multiple-input multiple-output communication system is studied. In the considered model, one IRS is deployed to assist the communication from a multiantenna base station (BS) to the multi-antenna users that are clustered into several groups. Our goal is to maximize the sum rate of all users by jointly optimizing the transmit beamforming matrices of the BS, the receive beamforming matrices of the users, and the phase shifts of the IRS. To solve this non-convex problem, we first use a block diagonalization method to represent the beamforming matrices of the BS and the users by the phase shifts of the IRS. Then, substituting the expressions of the beamforming matrices of the BS and the users, the original sum-rate maximization problem can be transformed into a problem that only needs to optimize the phase shifts of the IRS. To solve the transformed problem, a manifold method is used. Simulation results show that the proposed scheme can achieve up to 28.6% gain in terms of the sum rate of all users compared to the algorithm that optimizes the hybrid beamforming matrices of the BS and the users using our proposed scheme and randomly determines the phase shifts of the IRS.
△ Less
Submitted 15 August, 2022;
originally announced August 2022.
-
Block Orthogonal Sparse Superposition Codes for Ultra-Reliable Low-Latency Communications
Authors:
Donghwa Han,
Jeonghun Park,
Youngjoo Lee,
H. Vincent Poor,
Namyoon Lee
Abstract:
Low-rate and short-packet transmissions are important for ultra-reliable low-latency communications (URLLC). In this paper, we put forth a new family of sparse superposition codes for URLLC, called block orthogonal sparse superposition (BOSS) codes. We first present a code construction method for the efficient encoding of BOSS codes. The key idea is to construct codewords by the superposition of t…
▽ More
Low-rate and short-packet transmissions are important for ultra-reliable low-latency communications (URLLC). In this paper, we put forth a new family of sparse superposition codes for URLLC, called block orthogonal sparse superposition (BOSS) codes. We first present a code construction method for the efficient encoding of BOSS codes. The key idea is to construct codewords by the superposition of the orthogonal columns of a dictionary matrix with a sequential bit map** strategy. We also propose an approximate maximum a posteriori probability (MAP) decoder with two stages. The approximate MAP decoder reduces the decoding latency significantly via a parallel decoding structure while maintaining a comparable decoding complexity to the successive cancellation list (SCL) decoder of polar codes. Furthermore, to gauge the code performance in the finite-blocklength regime, we derive an exact analytical expression for block-error rates (BLERs) for single-layered BOSS codes in terms of relevant code parameters. Lastly, we present a cyclic redundancy check aided-BOSS (CA-BOSS) code with simple list decoding to boost the code performance. Our experiments verify that CA-BOSS with the simple list decoder outperforms CA-polar codes with SCL decoding in the low-rate and finite-blocklength regimes while achieving the finite-blocklength capacity upper bound within one dB of signal-to-noise ratio.
△ Less
Submitted 14 August, 2022;
originally announced August 2022.
-
Ensembles of Realistic Power Distribution Networks
Authors:
Rounak Meyur,
Anil Vullikanti,
Samarth Swarup,
Henning Mortveit,
Virgilio Centeno,
Arun Phadke,
H. Vincent Poor,
Madhav Marathe
Abstract:
The power grid is going through significant changes with the introduction of renewable energy sources and incorporation of smart grid technologies. These rapid advancements necessitate new models and analyses to keep up with the various emergent phenomena they induce. A major prerequisite of such work is the acquisition of well-constructed and accurate network datasets for the power grid infrastru…
▽ More
The power grid is going through significant changes with the introduction of renewable energy sources and incorporation of smart grid technologies. These rapid advancements necessitate new models and analyses to keep up with the various emergent phenomena they induce. A major prerequisite of such work is the acquisition of well-constructed and accurate network datasets for the power grid infrastructure. In this paper, we propose a robust, scalable framework to synthesize power distribution networks which resemble their physical counterparts for a given region. We use openly available information about interdependent road and building infrastructures to construct the networks. In contrast to prior work based on network statistics, we incorporate engineering and economic constraints to create the networks. Additionally, we provide a framework to create ensembles of power distribution networks to generate multiple possible instances of the network for a given region. The comprehensive dataset consists of nodes with attributes such as geo-coordinates, type of node (residence, transformer, or substation), and edges with attributes such as geometry, type of line (feeder lines, primary or secondary) and line parameters. For validation, we provide detailed comparisons of the generated networks with actual distribution networks. The generated datasets represent realistic test systems (as compared to standard IEEE test cases) that can be used by network scientists to analyze complex events in power grids and to perform detailed sensitivity and statistical analyses over ensembles of networks.
△ Less
Submitted 24 September, 2022; v1 submitted 12 July, 2022;
originally announced August 2022.
-
Approximation-based Threshold Optimization from Single Antenna to Massive SIMO Authentication
Authors:
Stefan Roth,
Aydin Sezgin,
Roman Bessel,
H. Vincent Poor
Abstract:
In a wireless sensor network, data from various sensors are gathered to estimate the system-state of the process system. However, adversaries aim at distorting the system-state estimate, for which they may infiltrate sensors or position additional devices in the environment. To authenticate the received process values, the integrity of the measurements from different sensors can be evaluated joint…
▽ More
In a wireless sensor network, data from various sensors are gathered to estimate the system-state of the process system. However, adversaries aim at distorting the system-state estimate, for which they may infiltrate sensors or position additional devices in the environment. To authenticate the received process values, the integrity of the measurements from different sensors can be evaluated jointly with the temporal integrity of channel measurements from each sensor. For this purpose, we design a security protocol, in which Kalman filters are used to predict the system-state and the channel-state values, and the received data are authenticated by a hypothesis test. We theoretically analyze the adversarial success probability and the reliability rate obtained in the hypothesis test in two ways, based on a chi-square approximation and on a Gaussian approximation. The two approximations are exact for small and large data vectors, respectively. The Gaussian approximation is suitable for analyzing massive single-input multiple-output (SIMO) setups. To obtain additional insights, the approximation is further adapted for the case of channel hardening, which occurs in massive SIMO fading channels. As adversaries always look for the weakest point of a system, a time-constant security level is required. To provide such a service, the approximations are used to propose time-varying threshold values for the hypothesis test, which approximately attain a constant security level. Numerical results show that a constant security level can only be achieved by a time-varying threshold choice, while a constant threshold value leads to a time-varying security level.
△ Less
Submitted 11 August, 2022;
originally announced August 2022.
-
Reconfigurable Intelligent Computational Surfaces: When Wave Propagation Control Meets Computing
Authors:
Bo Yang,
Xuelin Cao,
**dan Xu,
Chongwen Huang,
George C. Alexandropoulos,
Linglong Dai,
M'erouane Debbah,
H. Vincent Poor,
Chau Yuen
Abstract:
The envisioned sixth-generation (6G) of wireless networks will involve an intelligent integration of communications and computing, thereby meeting the urgent demands of diverse applications. To realize the concept of the smart radio environment, reconfigurable intelligent surfaces (RISs) are a promising technology for offering programmable propagation of im**ing electromagnetic signals via exter…
▽ More
The envisioned sixth-generation (6G) of wireless networks will involve an intelligent integration of communications and computing, thereby meeting the urgent demands of diverse applications. To realize the concept of the smart radio environment, reconfigurable intelligent surfaces (RISs) are a promising technology for offering programmable propagation of im**ing electromagnetic signals via external control. However, the purely reflective nature of conventional RISs induces significant challenges in supporting computation-based applications, e.g., wave-based calculation and signal processing. To fulfil future communication and computing requirements, new materials are needed to complement the existing technologies of metasurfaces, enabling further diversification of electronics and their applications. In this event, we introduce the concept of reconfigurable intelligent computational surface (RICS), which is composed of two reconfigurable multifunctional layers: the `reconfigurable beamforming layer' which is responsible for tunable signal reflection, absorption, and refraction, and the `intelligence computation layer' that concentrates on metamaterials-based computing. By exploring the recent trends on computational metamaterials, RICSs have the potential to make joint communication and computation a reality. We further demonstrate two typical applications of RICSs for performing wireless spectrum sensing and secrecy signal processing. Future research challenges arising from the design and operation of RICSs are finally highlighted.
△ Less
Submitted 3 October, 2022; v1 submitted 8 August, 2022;
originally announced August 2022.
-
Sensor Deployment and Link Analysis in Satellite IoT Systems for Wildfire Detection
Authors:
How-Hang Liu,
Ronald Y. Chang,
Yi-Ying Chen,
I-Kang Fu,
H. Vincent Poor
Abstract:
Climate change has been identified as one of the most critical threats to human civilization and sustainability. Wildfires, which produce huge amounts of carbon emission, are both drivers and results of climate change. An early and timely wildfire detection system can constrain fires to short and small ones and yield significant carbon reduction. In this paper, we propose to use ground sensor depl…
▽ More
Climate change has been identified as one of the most critical threats to human civilization and sustainability. Wildfires, which produce huge amounts of carbon emission, are both drivers and results of climate change. An early and timely wildfire detection system can constrain fires to short and small ones and yield significant carbon reduction. In this paper, we propose to use ground sensor deployment and satellite Internet of Things (IoT) technologies for wildfire detection by taking advantage of satellites' ubiquitous global coverage. We first develop an optimal IoT sensor placement strategy based on fire ignition and detection models. Then, we analyze the uplink satellite communication budget and the bandwidth required for wildfire detection under the narrowband IoT (NB-IoT) radio interface. Finally, we conduct simulations on the California wildfire database and quantify the potential economical benefits by factoring in carbon emission reductions and sensor/bandwidth costs.
△ Less
Submitted 5 August, 2022; v1 submitted 2 August, 2022;
originally announced August 2022.
-
Finite-Blocklength RIS-Aided Transmit Beamforming
Authors:
M. Abughalwa,
H. D. Tuan,
D. N. Nguyen,
H. V. Poor,
L. Hanzo
Abstract:
This paper considers the downlink of an ultra-reliable low-latency communication (URLLC) system in which a base station (BS) serves multiple single-antenna users in the short (finite) blocklength (FBL) regime with the assistance of a reconfigurable intelligent surface (RIS). In the FBL regime, the users' achievable rates are complex functions of the beamforming vectors and of the RIS's programmabl…
▽ More
This paper considers the downlink of an ultra-reliable low-latency communication (URLLC) system in which a base station (BS) serves multiple single-antenna users in the short (finite) blocklength (FBL) regime with the assistance of a reconfigurable intelligent surface (RIS). In the FBL regime, the users' achievable rates are complex functions of the beamforming vectors and of the RIS's programmable reflecting elements (PREs). We propose the joint design of the transmit beamformers and PREs, the problem of maximizing the geometric mean (GM) of these rates (GM-rate) and show that this aforementioned results are providing fair rate distribution and thus reliable links to all users. A novel computational algorithm is developed, which is based on closed forms to generate improved feasible points, using its execution. The simulations show the merit of our solution.
△ Less
Submitted 23 July, 2022;
originally announced July 2022.
-
Meta-material Sensor Based Internet of Things: Design, Optimization, and Implementation
Authors:
**gzhi Hu,
Hongliang Zhang,
Boya Di,
Zhu Han,
H. Vincent Poor,
Lingyang Song
Abstract:
For many applications envisioned for the Internet of Things (IoT), it is expected that the sensors will have very low costs and zero power, which can be satisfied by meta-material sensor based IoT, i.e., meta-IoT. As their constituent meta-materials can reflect wireless signals with environment-sensitive reflection coefficients, meta-IoT sensors can achieve simultaneous sensing and transmission wi…
▽ More
For many applications envisioned for the Internet of Things (IoT), it is expected that the sensors will have very low costs and zero power, which can be satisfied by meta-material sensor based IoT, i.e., meta-IoT. As their constituent meta-materials can reflect wireless signals with environment-sensitive reflection coefficients, meta-IoT sensors can achieve simultaneous sensing and transmission without any active modulation. However, to maximize the sensing accuracy, the structures of meta-IoT sensors need to be optimized considering their joint influence on sensing and transmission, which is challenging due to the high computational complexity in evaluating the influence, especially given a large number of sensors. In this paper, we propose a joint sensing and transmission design method for meta-IoT systems with a large number of meta-IoT sensors, which can efficiently optimize the sensing accuracy of the system. Specifically, a computationally efficient received signal model is established to evaluate the joint influence of meta-material structure on sensing and transmission. Then, a sensing algorithm based on deep unsupervised learning is designed to obtain accurate sensing results in a robust manner. Experiments with a prototype verify that the system has a higher sensitivity and a longer transmission range compared to existing designs, and can sense environmental anomalies correctly within 2 meters.
△ Less
Submitted 26 June, 2022;
originally announced June 2022.
-
Performance Analysis of Joint Active User Detection and Channel Estimation for Massive Connectivity
Authors:
Jia-Cheng Jiang,
Hui-Ming Wang,
H. Vincent Poor
Abstract:
This paper considers joint active user detection (AUD) and channel estimation (CE) for massive connectivity scenarios with sporadic traffic. The state-of-art method under a Bayesian framework to perform joint AUD and CE in such scenarios is approximate message passing (AMP). However, the existing theoretical analysis of AMP-based joint AUD and CE can only be performed with a given fixed point of t…
▽ More
This paper considers joint active user detection (AUD) and channel estimation (CE) for massive connectivity scenarios with sporadic traffic. The state-of-art method under a Bayesian framework to perform joint AUD and CE in such scenarios is approximate message passing (AMP). However, the existing theoretical analysis of AMP-based joint AUD and CE can only be performed with a given fixed point of the AMP state evolution function, lacking the analysis of AMP phase transition and Bayes-optimality. In this paper, we propose a novel theoretical framework to analyze the performance of the joint AUD and CE problem by adopting the replica method in the Bayes-optimal condition. Specifically, our analysis is based on a general channel model, which reduces to particular channel models in multiple typical MIMO communication scenarios. Our theoretical framework allows ones to measure the optimality and phase transition of AMP-based joint AUD and CE as well as to predict the corresponding performance metrics under our model. To reify our proposed theoretical framework, we analyze two typical scenarios from the massive random access literature, i.e., the isotropic channel scenario and the spatially correlated channel scenario. Accordingly, our performance analysis produces some novel results for both the isotropic Raleigh channel and spatially correlated channel case.
△ Less
Submitted 24 June, 2022;
originally announced June 2022.
-
Joint Coding of URLLC and eMBB in Wyner's Soft-Handoff Network in the Finite Blocklength Regime
Authors:
Homa Nikbakht,
Michèle Wigger,
Shlomo Shamai,
Jean-Marie Gorce,
H. Vincent Poor
Abstract:
Wyner's soft-handoff network is considered where transmitters simultaneously send messages of enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) services. Due to the low-latency requirements, the URLLC messages are transmitted over fewer channel uses compared to the eMBB messages. To improve the reliability of the URLLC transmissions, we propose a coding scheme w…
▽ More
Wyner's soft-handoff network is considered where transmitters simultaneously send messages of enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) services. Due to the low-latency requirements, the URLLC messages are transmitted over fewer channel uses compared to the eMBB messages. To improve the reliability of the URLLC transmissions, we propose a coding scheme with finite blocklength codewords that exploits dirty-paper coding (DPC) to precancel the interference from eMBB transmissions. Rigorous bounds are derived for the error probabilities of eMBB and URLLC transmissions achieved by our scheme. Numerical results illustrate that they are lower than for standard time-sharing.
△ Less
Submitted 22 June, 2022;
originally announced June 2022.
-
Performance-Oriented Design for Intelligent Reflecting Surface Assisted Federated Learning
Authors:
Yapeng Zhao,
Qingqing Wu,
Wen Chen,
Celimuge Wu,
H. Vincent Poor
Abstract:
To efficiently exploit the massive amounts of raw data that are increasingly being generated in mobile edge networks, federated learning (FL) has emerged as a promising distributed learning technique. By collaboratively training a shared learning model on edge devices, raw data transmission and storage are replaced by the exchange of the local computed parameters/gradients in FL, which thus helps…
▽ More
To efficiently exploit the massive amounts of raw data that are increasingly being generated in mobile edge networks, federated learning (FL) has emerged as a promising distributed learning technique. By collaboratively training a shared learning model on edge devices, raw data transmission and storage are replaced by the exchange of the local computed parameters/gradients in FL, which thus helps address latency and privacy issues. However, the number of resource blocks when using traditional orthogonal transmission strategies for FL linearly scales with the number of participating devices, which conflicts with the scarcity of communication resources. To tackle this issue, over-the-air computation (AirComp) has emerged recently which leverages the inherent superposition property of wireless channels to perform one-shot model aggregation. However, the aggregation accuracy in AirComp suffers from the unfavorable wireless propagation environment. In this paper, we consider the use of intelligent reflecting surfaces (IRSs) to mitigate this problem and improve FL performance with AirComp. Specifically, a performance-oriented design scheme that directly minimizes the optimality gap of the loss function is proposed to accelerate the convergence of AirComp-based FL. We first analyze the convergence behavior of the FL procedure with the absence of channel fading and noise. Based on the obtained optimality gap which characterizes the impact of channel fading and noise in different communication rounds on the ultimate performance of FL, we propose both online and offline approaches to tackle the resulting design problem. Simulation results demonstrate that such a performance-oriented design strategy can achieve higher test accuracy than the conventional isolated mean square error (MSE) minimization approach in FL.
△ Less
Submitted 11 June, 2023; v1 submitted 20 June, 2022;
originally announced June 2022.
-
Matching Pursuit Based Scheduling for Over-the-Air Federated Learning
Authors:
Ali Bereyhi,
Adela Vagollari,
Saba Asaad,
Ralf R. Müller,
Wolfgang Gerstacker,
H. Vincent Poor
Abstract:
This paper develops a class of low-complexity device scheduling algorithms for over-the-air federated learning via the method of matching pursuit. The proposed scheme tracks closely the close-to-optimal performance achieved by difference-of-convex programming, and outperforms significantly the well-known benchmark algorithms based on convex relaxation. Compared to the state-of-the-art, the propose…
▽ More
This paper develops a class of low-complexity device scheduling algorithms for over-the-air federated learning via the method of matching pursuit. The proposed scheme tracks closely the close-to-optimal performance achieved by difference-of-convex programming, and outperforms significantly the well-known benchmark algorithms based on convex relaxation. Compared to the state-of-the-art, the proposed scheme poses a drastically lower computational load on the system: For $K$ devices and $N$ antennas at the parameter server, the benchmark complexity scales with $\left(N^2+K\right)^3 + N^6$ while the complexity of the proposed scheme scales with $K^p N^q$ for some $0 < p,q \leq 2$. The efficiency of the proposed scheme is confirmed via numerical experiments on the CIFAR-10 dataset.
△ Less
Submitted 12 October, 2022; v1 submitted 14 June, 2022;
originally announced June 2022.
-
Toward Ambient Intelligence: Federated Edge Learning with Task-Oriented Sensing, Computation, and Communication Integration
Authors:
Peixi Liu,
Guangxu Zhu,
Shuai Wang,
Wei Jiang,
Wu Luo,
H. Vincent Poor,
Shuguang Cui
Abstract:
In this paper, we address the problem of joint sensing, computation, and communication (SC$^{2}$) resource allocation for federated edge learning (FEEL) via a concrete case study of human motion recognition based on wireless sensing in ambient intelligence. First, by analyzing the wireless sensing process in human motion recognition, we find that there exists a thresholding value for the sensing t…
▽ More
In this paper, we address the problem of joint sensing, computation, and communication (SC$^{2}$) resource allocation for federated edge learning (FEEL) via a concrete case study of human motion recognition based on wireless sensing in ambient intelligence. First, by analyzing the wireless sensing process in human motion recognition, we find that there exists a thresholding value for the sensing transmit power, exceeding which yields sensing data samples with approximately the same satisfactory quality. Then, the joint SC$^{2}$ resource allocation problem is cast to maximize the convergence speed of FEEL, under the constraints on training time, energy supply, and sensing quality of each edge device. Solving this problem entails solving two subproblems in order: the first one reduces to determine the joint sensing and communication resource allocation that maximizes the total number of samples that can be sensed during the entire training process; the second one concerns the partition of the attained total number of sensed samples over all the communication rounds to determine the batch size at each round for convergence speed maximization. The first subproblem on joint sensing and communication resource allocation is converted to a single-variable optimization problem by exploiting the derived relation between different control variables (resources), which thus allows an efficient solution via one-dimensional grid search. For the second subproblem, it is found that the number of samples to be sensed (or batch size) at each round is a decreasing function of the loss function value attained at the round. Based on this relationship, the approximate optimal batch size at each communication round is derived in closed-form as a function of the round index. Finally, extensive simulation results are provided to validate the superiority of the proposed joint SC$^{2}$ resource allocation scheme.
△ Less
Submitted 13 June, 2022;
originally announced June 2022.
-
Security-Reliability Trade-Off Analysis for SWIPT- and AF-Based IoT Networks with Friendly Jammers
Authors:
Tan N. Nguyen,
Dinh-Hieu Tran,
Trinh Van Chien,
Van-Duc Phan,
Miroslav Voznak,
Phu Tran Tin,
Symeon Chatzinotas,
Derrick Wing Kwan Ng,
H. Vincent Poor
Abstract:
Radio-frequency (RF) energy harvesting (EH) in wireless relaying networks has attracted considerable recent interest, especially for supplying energy to relay nodes in Internet-of-Things (IoT) systems to assist the information exchange between a source and a destination. Moreover, limited hardware, computational resources, and energy availability of IoT devices have raised various security challen…
▽ More
Radio-frequency (RF) energy harvesting (EH) in wireless relaying networks has attracted considerable recent interest, especially for supplying energy to relay nodes in Internet-of-Things (IoT) systems to assist the information exchange between a source and a destination. Moreover, limited hardware, computational resources, and energy availability of IoT devices have raised various security challenges. To this end, physical layer security (PLS) has been proposed as an effective alternative to cryptographic methods for providing information security. In this study, we propose a PLS approach for simultaneous wireless information and power transfer (SWIPT)-based half-duplex (HD) amplify-and-forward (AF) relaying systems in the presence of an eavesdropper. Furthermore, we take into account both static power splitting relaying (SPSR) and dynamic power splitting relaying (DPSR) to thoroughly investigate the benefits of each one. To further enhance secure communication, we consider multiple friendly jammers to help prevent wiretap** attacks from the eavesdropper. More specifically, we provide a reliability and security analysis by deriving closed-form expressions of outage probability (OP) and intercept probability (IP), respectively, for both the SPSR and DPSR schemes. Then, simulations are also performed to validate our analysis and the effectiveness of the proposed schemes. Specifically, numerical results illustrate the non-trivial trade-off between reliability and security of the proposed system. In addition, we conclude from the simulation results that the proposed DPSR scheme outperforms the SPSR-based scheme in terms of OP and IP under the influences of different parameters on system performance.
△ Less
Submitted 9 June, 2022;
originally announced June 2022.
-
Federated Deep Learning Meets Autonomous Vehicle Perception: Design and Verification
Authors:
Shuai Wang,
Chengyang Li,
Derrick Wing Kwan Ng,
Yonina C. Eldar,
H. Vincent Poor,
Qi Hao,
Chengzhong Xu
Abstract:
Realizing human-like perception is a challenge in open driving scenarios due to corner cases and visual occlusions. To gather knowledge of rare and occluded instances, federated learning assisted connected autonomous vehicle (FLCAV) has been proposed, which leverages vehicular networks to establish federated deep neural networks (DNNs) from distributed data captured by vehicles and road sensors. W…
▽ More
Realizing human-like perception is a challenge in open driving scenarios due to corner cases and visual occlusions. To gather knowledge of rare and occluded instances, federated learning assisted connected autonomous vehicle (FLCAV) has been proposed, which leverages vehicular networks to establish federated deep neural networks (DNNs) from distributed data captured by vehicles and road sensors. Without the need of data aggregation, FLCAV preserves privacy while reducing communication costs compared with conventional centralized learning. However, it is challenging to determine the network resources and road sensor placements for multi-stage training with multi-modal datasets in multi-variant scenarios. This article presents networking and training frameworks for FLCAV perception. Multi-layer graph resource allocation and vehicle-road contrastive sensor placement are proposed to address the network management and sensor deployment problems, respectively. We also develop CarlaFLCAV, a software platform that implements the above system and methods. Experimental results confirm the superiority of the proposed techniques compared with various benchmarks.
△ Less
Submitted 5 December, 2022; v1 submitted 3 June, 2022;
originally announced June 2022.
-
Energy-Efficient Resource Allocation for Aggregated RF/VLC Systems
Authors:
Sylvester Aboagye,
Telex M. N. Ngatched,
Octavia A. Dobre,
H. Vincent Poor
Abstract:
Visible light communication (VLC) is envisioned as a core component of future wireless communication networks due to, among others, the huge unlicensed bandwidth it offers and the fact that it does not cause any interference to existing radio frequency (RF) communication systems. Most research on RF and VLC coexistence has focused on hybrid designs where data transmission to any user could origina…
▽ More
Visible light communication (VLC) is envisioned as a core component of future wireless communication networks due to, among others, the huge unlicensed bandwidth it offers and the fact that it does not cause any interference to existing radio frequency (RF) communication systems. Most research on RF and VLC coexistence has focused on hybrid designs where data transmission to any user could originate from either an RF or a VLC access point (AP). However, hybrid RF/VLC systems fail to exploit the distinct transmission characteristics of RF and VLC systems to fully reap the benefits they can offer. Aggregated RF/VLC systems, in which any user can be served simultaneously by both RF and VLC APs, have recently emerged as a more promising and robust design for the coexistence of RF and VLC systems. To this end, this paper, for the first time, investigates AP assignment, subchannel allocation (SA), and transmit power allocation (PA) to optimize the energy efficiency (EE) of aggregated RF/VLC systems while considering the effects of interference and VLC line-of-sight link blockages. A novel and challenging EE optimization problem is formulated for which an efficient joint solution based on alternating optimization is developed. More particularly, an energy-efficient AP assignment algorithm based on matching theory is proposed. Then, a low-complexity SA scheme that allocates subchannels to users based on their channel conditions is developed. Finally, an effective PA algorithm is presented by utilizing the quadratic transform approach and a multi-objective optimization framework. Extensive simulation results reveal that: 1) the proposed joint AP assignment, SA, and PA solution obtains significant EE, sum-rate, and outage performance gains with low complexity, and 2) the aggregated RF/VLC system provides considerable performance improvement compared to hybrid RF/VLC systems.
△ Less
Submitted 3 June, 2022;
originally announced June 2022.
-
K-Receiver Wiretap Channel: Optimal Encoding Order and Signaling Design
Authors:
Yue Qi,
Mojtaba Vaezi,
H. Vincent Poor
Abstract:
The K-receiver wiretap channel is a channel model where a transmitter broadcasts K independent messages to K intended receivers while kee** them secret from an eavesdropper. The capacity region of the K-receiver multiple-input multiple-output (MIMO) wiretap channel has been characterized by using dirty-paper coding and stochastic encoding. However, K factorial encoding orders may need to be enum…
▽ More
The K-receiver wiretap channel is a channel model where a transmitter broadcasts K independent messages to K intended receivers while kee** them secret from an eavesdropper. The capacity region of the K-receiver multiple-input multiple-output (MIMO) wiretap channel has been characterized by using dirty-paper coding and stochastic encoding. However, K factorial encoding orders may need to be enumerated to evaluate the capacity region, which makes the problem intractable. In addition, even though the capacity region is known, the optimal signaling to achieve the capacity region is unknown. In this paper, we determine one optimal encoding order to achieve every point on the capacity region, and thus reduce the encoding complexity K factorial times. We prove that the optimal decoding order for the K-receiver MIMO wiretap channel is the same as that for the MIMO broadcast channel without secrecy. To be specific, the descending weight ordering in the weighted sum-rate (WSR) maximization problem determines the optimal encoding order. Next, to reach the border of the secrecy capacity region, we form a WSR maximization problem and apply the block successive maximization method to solve this nonconvex problem and find the input covariance matrices corresponding to each message. Numerical results are used to verify the optimality of the encoding order and to demonstrate the efficacy of the proposed signaling design.
△ Less
Submitted 2 April, 2023; v1 submitted 1 June, 2022;
originally announced June 2022.
-
Intelligent Omni-Surfaces: Reflection-Refraction Circuit Model, Full-Dimensional Beamforming, and System Implementation
Authors:
Shuhao Zeng,
Hongliang Zhang,
Boya Di,
Yuanwei Liu,
Marco Di Renzo,
Zhu Han,
H. Vincent Poor,
Lingyang Song
Abstract:
The intelligent omni-surface (IOS) is a dynamic metasurface that has recently been proposed to achieve full-dimensional communications by realizing the dual function of anomalous reflection and anomalous refraction. Existing research works provide only simplified models for the reflection and refraction responses of the IOS, which do not explicitly depend on the physical structure of the IOS and t…
▽ More
The intelligent omni-surface (IOS) is a dynamic metasurface that has recently been proposed to achieve full-dimensional communications by realizing the dual function of anomalous reflection and anomalous refraction. Existing research works provide only simplified models for the reflection and refraction responses of the IOS, which do not explicitly depend on the physical structure of the IOS and the angle of incidence of the electromagnetic (EM) wave. Therefore, the available reflection-refraction models are insufficient to characterize the performance of full-dimensional communications. In this paper, we propose a complete and detailed circuit-based reflection-refraction model for the IOS, which is formulated in terms of the physical structure and equivalent circuits of the IOS elements, as well as we validate it against full-wave EM simulations. Based on the proposed circuit-based model for the IOS, we analyze the asymmetry between the reflection and transmission coefficients. Moreover, the proposed circuit-based model is utilized for optimizing the hybrid beamforming of IOS-assisted networks and hence improving the system performance. To verify the circuit-based model, the theoretical findings, and to evaluate the performance of full-dimensional beamforming, we implement a prototype of IOS and deploy an IOS-assisted wireless communication testbed to experimentally measure the beam patterns and to quantify the achievable rate. The obtained experimental results validate the theoretical findings and the accuracy of the proposed circuit-based reflection-refraction model for IOSs.
△ Less
Submitted 14 July, 2022; v1 submitted 31 May, 2022;
originally announced June 2022.
-
How Should IRSs Scale to Harden Multi-Antenna Channels?
Authors:
Ali Bereyhi,
Saba Asaad,
Chongjun Ouyang,
Ralf R. Müller,
Rafael F. Schaefer,
H. Vincent Poor
Abstract:
This work extends the concept of channel hardening to multi-antenna systems that are aided by intelligent reflecting surfaces (IRSs). For fading links between a multi-antenna transmitter and a single-antenna receiver, we derive an accurate approximation for the distribution of the input-output mutual information when the number of reflecting elements grows large. The asymptotic results demonstrate…
▽ More
This work extends the concept of channel hardening to multi-antenna systems that are aided by intelligent reflecting surfaces (IRSs). For fading links between a multi-antenna transmitter and a single-antenna receiver, we derive an accurate approximation for the distribution of the input-output mutual information when the number of reflecting elements grows large. The asymptotic results demonstrate that by increasing the number of elements on the IRS, the end-to-end channel hardens as long as the physical dimensions of the IRS grow as well. The growth rate however need not to be of a specific order and can be significantly sub-linear. The validity of the analytical result is confirmed by numerical experiments.
△ Less
Submitted 31 May, 2022;
originally announced May 2022.
-
Joint Beam Management and Power Allocation in THz-NOMA Networks
Authors:
Zhiguo Ding,
H. Vincent Poor
Abstract:
This paper investigates how to apply non-orthogonal multiple access (NOMA) as an add-on in terahertz (THz) networks. In particular, prior to the implementation of NOMA, it is assumed that there exists a legacy THz system, where spatial beams have already been configured to serve legacy primary users. The aim of this paper is to study how these pre-configured spatial beams can be used as a type of…
▽ More
This paper investigates how to apply non-orthogonal multiple access (NOMA) as an add-on in terahertz (THz) networks. In particular, prior to the implementation of NOMA, it is assumed that there exists a legacy THz system, where spatial beams have already been configured to serve legacy primary users. The aim of this paper is to study how these pre-configured spatial beams can be used as a type of bandwidth resources, on which additional secondary users are served without degrading the performance of the legacy primary users. A joint beam management and power allocation problem is first formulated as a mixed combinatorial non-convex optimization problem, and then solved by two methods with different performance-complexity tradeoffs, one based on the branch and bound method and the other based on successive convex approximation. Both analytical and simulation results are presented to illustrate the new features of beam-based resource allocation in THz-NOMA networks and also demonstrate that those pre-configured spatial beams can be employed to improve the system throughput and connectivity in a spectrally efficient manner.
△ Less
Submitted 25 May, 2022;
originally announced May 2022.
-
Secure and Private Source Coding with Private Key and Decoder Side Information
Authors:
Onur Günlü,
Rafael F. Schaefer,
Holger Boche,
H. Vincent Poor
Abstract:
The problem of secure source coding with multiple terminals is extended by considering a remote source whose noisy measurements are the correlated random variables used for secure source reconstruction. The main additions to the problem include 1) all terminals noncausally observe a noisy measurement of the remote source; 2) a private key is available to all legitimate terminals; 3) the public com…
▽ More
The problem of secure source coding with multiple terminals is extended by considering a remote source whose noisy measurements are the correlated random variables used for secure source reconstruction. The main additions to the problem include 1) all terminals noncausally observe a noisy measurement of the remote source; 2) a private key is available to all legitimate terminals; 3) the public communication link between the encoder and decoder is rate-limited; and 4) the secrecy leakage to the eavesdropper is measured with respect to the encoder input, whereas the privacy leakage is measured with respect to the remote source. Exact rate regions are characterized for a lossy source coding problem with a private key, remote source, and decoder side information under security, privacy, communication, and distortion constraints. By replacing the distortion constraint with a reliability constraint, we obtain the exact rate region also for the lossless case. Furthermore, the lossy rate region for scalar discrete-time Gaussian sources and measurement channels is established.
△ Less
Submitted 9 November, 2022; v1 submitted 10 May, 2022;
originally announced May 2022.
-
Decentralized Stochastic Optimization with Inherent Privacy Protection
Authors:
Yongqiang Wang,
H. Vincent Poor
Abstract:
Decentralized stochastic optimization is the basic building block of modern collaborative machine learning, distributed estimation and control, and large-scale sensing. Since involved data usually contain sensitive information like user locations, healthcare records and financial transactions, privacy protection has become an increasingly pressing need in the implementation of decentralized stocha…
▽ More
Decentralized stochastic optimization is the basic building block of modern collaborative machine learning, distributed estimation and control, and large-scale sensing. Since involved data usually contain sensitive information like user locations, healthcare records and financial transactions, privacy protection has become an increasingly pressing need in the implementation of decentralized stochastic optimization algorithms. In this paper, we propose a decentralized stochastic gradient descent algorithm which is embedded with inherent privacy protection for every participating agent against other participating agents and external eavesdroppers. This proposed algorithm builds in a dynamics based gradient-obfuscation mechanism to enable privacy protection without compromising optimization accuracy, which is in significant difference from differential-privacy based privacy solutions for decentralized optimization that have to trade optimization accuracy for privacy. The dynamics based privacy approach is encryption-free, and hence avoids incurring heavy communication or computation overhead, which is a common problem with encryption based privacy solutions for decentralized stochastic optimization. Besides rigorously characterizing the convergence performance of the proposed decentralized stochastic gradient descent algorithm under both convex objective functions and non-convex objective functions, we also provide rigorous information-theoretic analysis of its strength of privacy protection. Simulation results for a distributed estimation problem as well as numerical experiments for decentralized learning on a benchmark machine learning dataset confirm the effectiveness of the proposed approach.
△ Less
Submitted 8 May, 2022;
originally announced May 2022.
-
Transformer-Empowered 6G Intelligent Networks: From Massive MIMO Processing to Semantic Communication
Authors:
Yang Wang,
Zhen Gao,
Dezhi Zheng,
Sheng Chen,
Deniz Gündüz,
H. Vincent Poor
Abstract:
It is anticipated that 6G wireless networks will accelerate the convergence of the physical and cyber worlds and enable a paradigm-shift in the way we deploy and exploit communication networks. Machine learning, in particular deep learning (DL), is expected to be one of the key technological enablers of 6G by offering a new paradigm for the design and optimization of networks with a high level of…
▽ More
It is anticipated that 6G wireless networks will accelerate the convergence of the physical and cyber worlds and enable a paradigm-shift in the way we deploy and exploit communication networks. Machine learning, in particular deep learning (DL), is expected to be one of the key technological enablers of 6G by offering a new paradigm for the design and optimization of networks with a high level of intelligence. In this article, we introduce an emerging DL architecture, known as the transformer, and discuss its potential impact on 6G network design. We first discuss the differences between the transformer and classical DL architectures, and emphasize the transformer's self-attention mechanism and strong representation capabilities, which make it particularly appealing for tackling various challenges in wireless network design. Specifically, we propose transformer-based solutions for various massive multiple-input multiple-output (MIMO) and semantic communication problems, and show their superiority compared to other architectures. Finally, we discuss key challenges and open issues in transformer-based solutions, and identify future research directions for their deployment in intelligent 6G networks.
△ Less
Submitted 3 November, 2022; v1 submitted 7 May, 2022;
originally announced May 2022.
-
Sensing RISs: Enabling Dimension-Independent CSI Acquisition for Beamforming
Authors:
Jieao Zhu,
Kunzan Liu,
Zhongzhichao Wan,
Linglong Dai,
Tie Jun Cui,
H. Vincent Poor
Abstract:
Reconfigurable intelligent surfaces (RISs) are envisioned as a potentially transformative technology for future wireless communications. However, RISs' inability to process signals and the attendant increased channel dimension have brought new challenges to RIS-assisted systems, including significantly increased pilot overhead required for channel estimation. To address these problems, several pri…
▽ More
Reconfigurable intelligent surfaces (RISs) are envisioned as a potentially transformative technology for future wireless communications. However, RISs' inability to process signals and the attendant increased channel dimension have brought new challenges to RIS-assisted systems, including significantly increased pilot overhead required for channel estimation. To address these problems, several prior contributions that enhance the hardware architecture of RISs or develop algorithms to exploit the channels' mathematical properties have been made, where the required pilot overhead is reduced to be proportional to the number of RIS elements. In this paper, we propose a dimension-independent channel state information (CSI) acquisition approach in which the required pilot overhead is independent of the number of RIS elements. Specifically, in contrast to traditional signal transmission methods, where signals from the base station (BS) and the users are transmitted in different time slots, we propose a novel method in which signals are transmitted from the BS and the user simultaneously during CSI acquisition. With this method, an electromagnetic interference random field (IRF) will be induced on the RIS, and we propose the structure of sensing RIS to capture its features. Moreover, we develop three algorithms for parameter estimation in this system, in which one of the proposed vM-EM algorithm is analyzed with the fixed-point perturbation method to obtain an asymptotic achievable bound. In addition, we also derive the Cramér-Rao lower bound (CRLB) and an asymptotic expression for characterizing the best possible performance of the proposed algorithms. Simulation results verify that our proposed signal transmission method and the corresponding algorithms can achieve dimension-independent CSI acquisition for beamforming.
△ Less
Submitted 8 February, 2023; v1 submitted 28 April, 2022;
originally announced April 2022.
-
Phase Shift Design in RIS Empowered Wireless Networks: From Optimization to AI-Based Methods
Authors:
Zongze Li,
Shuai Wang,
Qingfeng Lin,
Yang Li,
Miaowen Wen,
Yik-Chung Wu,
H. Vincent Poor
Abstract:
Reconfigurable intelligent surfaces (RISs) have a revolutionary capability to customize the radio propagation environment for wireless networks. To fully exploit the advantages of RISs in wireless systems, the phases of the reflecting elements must be jointly designed with conventional communication resources, such as beamformers, transmit power, and computation time. However, due to the unique co…
▽ More
Reconfigurable intelligent surfaces (RISs) have a revolutionary capability to customize the radio propagation environment for wireless networks. To fully exploit the advantages of RISs in wireless systems, the phases of the reflecting elements must be jointly designed with conventional communication resources, such as beamformers, transmit power, and computation time. However, due to the unique constraints on the phase shift, and massive numbers of reflecting units and users in large-scale networks, the resulting optimization problems are challenging to solve. This paper provides a review of current optimization methods and artificial intelligence-based methods for handling the constraints imposed by RIS and compares them in terms of solution quality and computational complexity. Future challenges in phase shift optimization involving RISs are also described and potential solutions are discussed.
△ Less
Submitted 28 April, 2022;
originally announced April 2022.
-
Compressive Sensing-Based Recovery of Molecular Mixtures with Cross-Reactive Receptor Arrays
Authors:
Vahid Jamali,
Helene M. Loos,
Andrea Buettner,
Robert Schober,
H. Vincent Poor
Abstract:
In this paper, we propose a novel concept for engineered molecular communication (MC) systems inspired by animal olfaction. We focus on a multi-user scenario where transmitters employ unique mixtures of different types of signaling molecules to convey their messages to a central receiver, which is equipped with an array comprising $R$ different types of receptors to detect the emitted molecule mix…
▽ More
In this paper, we propose a novel concept for engineered molecular communication (MC) systems inspired by animal olfaction. We focus on a multi-user scenario where transmitters employ unique mixtures of different types of signaling molecules to convey their messages to a central receiver, which is equipped with an array comprising $R$ different types of receptors to detect the emitted molecule mixtures. The hardware complexity of an MC system employing \textit{orthogonal} molecule-receptor pairs would linearly scale with the number of signaling molecule types $Q$ (i.e., $R=Q$). Natural olfaction systems avoid such high complexity by employing arrays of \textit{cross-reactive} receptors, where each type of molecule activates multiple types of receptors and each type of receptor is predominantly activated by multiple types of molecules albeit with different activation strengths. For instance, the human olfactory system is believed to discriminate several thousands of chemicals using only a few hundred receptor types, i.e., $Q\gg R$. Motivated by this observation, we first develop an end-to-end MC channel model that accounts for the key properties of olfaction. Subsequently, we formulate the molecule mixture recovery as a convex compressive sensing (CS) problem which can be efficiently solved via available numerical solvers. Our simulation results confirm the efficiency of the proposed CS problem for the recovery of the molecular mixture signal and quantify the system performance for various system parameters.
△ Less
Submitted 16 April, 2022;
originally announced April 2022.
-
RIS-Assisted Visible Light Communication Systems: A Tutorial
Authors:
Sylvester Aboagye,
Alain R. Ndjiongue,
Telex M. N. Ngatched,
Octavia Dobre,
H. Vincent Poor
Abstract:
Recent development of the fifth-generation (5G) of cellular networks has led to their deployment worldwide. As part of the implementation, one of the challenges that must be addressed is the skip-zone problem, which occurs when objects obstruct the transmission of signals. A signal obstruction can significantly reduce the signal-to-noise ratio in radio frequency (RF) and indoor visible light commu…
▽ More
Recent development of the fifth-generation (5G) of cellular networks has led to their deployment worldwide. As part of the implementation, one of the challenges that must be addressed is the skip-zone problem, which occurs when objects obstruct the transmission of signals. A signal obstruction can significantly reduce the signal-to-noise ratio in radio frequency (RF) and indoor visible light communications (VLC) systems, whereas the obstruction can completely disrupt data transmission in free-space optical (FSO) systems. Therefore, the skip-zone dilemma must be resolved to ensure the efficient operation of 5G and beyond networks. In recent years, reconfigurable intelligent surfaces (RISs) that are more efficient than relays have become widely accepted as a method of mitigating skip-zones and providing reconfigurable radio environments. However, there have been limited studies on RISs for optical wireless communication (OWC) systems. This paper aims to provide a comprehensive tutorial on indoor VLC systems utilizing RISs technology. The article discusses the basics of VLC and RISs and reintroduces RISs for OWC systems, focusing on RIS-assisted indoor VLC systems. We also provide a comprehensive overview of optical RISs and examine the differences between optical RISs, RF-RISs, and optical relays. Furthermore, we discuss in detail how RISs can be used to overcome line-of-sight blockages and device orientation issue in VLC systems while revealing key challenges such as RIS element orientation design, RIS elements to access point/user assignment design, and RIS array positioning design problems that need to be studied. Moreover, we discuss and propose several research problems on integrating optical RISs with other emerging technologies and highlight other important research directions for RIS-assisted VLC systems.
△ Less
Submitted 28 November, 2022; v1 submitted 14 April, 2022;
originally announced April 2022.
-
Flexible LED Index Modulation for MIMO Optical Wireless Communications
Authors:
Anil Yesilkaya,
Ardimas Andi Purwita,
Erdal Panayirci,
H. Vincent Poor,
Harald Haas
Abstract:
The limited bandwidth of optical wireless communication (OWC) front-end devices motivates the use of multiple-input-multiple-output (MIMO) techniques to enhance data rates. It is known that very high multiplexing gains could be achieved by spatial multiplexing (SMX) in exchange for exhaustive detection complexity. Alternatively, in spatial modulation (SM), a single light emitting diode (LED) is ac…
▽ More
The limited bandwidth of optical wireless communication (OWC) front-end devices motivates the use of multiple-input-multiple-output (MIMO) techniques to enhance data rates. It is known that very high multiplexing gains could be achieved by spatial multiplexing (SMX) in exchange for exhaustive detection complexity. Alternatively, in spatial modulation (SM), a single light emitting diode (LED) is activated per time instance where information is carried by both the signal and the LED index. Since only an LED is active, both transmitter (TX) and receiver (RX) complexity reduces significantly while retaining the information transmission in the spatial domain. However, significant spectral efficiency losses occur in SM compared to SMX. In this paper, we propose a technique which adopts the advantages of both systems. Accordingly, the proposed flexible LED index modulation (FLIM) technique harnesses the inactive state of the LEDs as a transmit symbol. Therefore, the number of active LEDs changes in each transmission, unlike conventional techniques. Moreover, the system complexity is reduced by employing a linear minimum mean squared error (MMSE) equalizer and an angle perturbed receiver at the RX. Numerical results show that FLIM outperforms the reference systems by at least 6 dB in the low and medium/high spectral efficiency regions.
△ Less
Submitted 14 April, 2022;
originally announced April 2022.
-
Semi-Data-Aided Channel Estimation for MIMO Systems via Reinforcement Learning
Authors:
Tae-Kyoung Kim,
Yo-Seb Jeon,
Jun Li,
Nima Tavangaran,
H. Vincent Poor
Abstract:
Data-aided channel estimation is a promising solution to improve channel estimation accuracy by exploiting data symbols as pilot signals for updating an initial channel estimate. In this paper, we propose a semi-data-aided channel estimator for multiple-input multiple-output communication systems. Our strategy is to leverage reinforcement learning (RL) for selecting reliable detected symbols among…
▽ More
Data-aided channel estimation is a promising solution to improve channel estimation accuracy by exploiting data symbols as pilot signals for updating an initial channel estimate. In this paper, we propose a semi-data-aided channel estimator for multiple-input multiple-output communication systems. Our strategy is to leverage reinforcement learning (RL) for selecting reliable detected symbols among the symbols in the first part of transmitted data block. This strategy facilitates an update of the channel estimate before the end of data block transmission and therefore achieves a significant reduction in communication latency compared to conventional data-aided channel estimation approaches. Towards this end, we first define a Markov decision process (MDP) which sequentially decides whether to use each detected symbol as an additional pilot signal. We then develop an RL algorithm to efficiently find the best policy of the MDP based on a Monte Carlo tree search approach. In this algorithm, we exploit the a-posteriori probability for approximating both the optimal future actions and the corresponding state transitions of the MDP and derive a closed-form expression for the best policy. Simulation results demonstrate that the proposed channel estimator effectively mitigates both channel estimation error and detection performance loss caused by insufficient pilot signals.
△ Less
Submitted 3 April, 2022;
originally announced April 2022.
-
Near-Field Hierarchical Beam Management for RIS-Enabled Millimeter Wave Multi-Antenna Systems
Authors:
George C. Alexandropoulos,
Vahid Jamali,
Robert Schober,
H. Vincent Poor
Abstract:
In this paper, we present a low overhead beam management approach for near-field millimeter-wave multi-antenna communication systems enabled by Reconfigurable Intelligent Surfaces (RISs). We devise a novel variable-width hierarchical phaseshift codebook suitable for both the near- and far-field of the RIS, and present a fast alignment algorithm for the RIS phase shifts and the transceiver beamform…
▽ More
In this paper, we present a low overhead beam management approach for near-field millimeter-wave multi-antenna communication systems enabled by Reconfigurable Intelligent Surfaces (RISs). We devise a novel variable-width hierarchical phaseshift codebook suitable for both the near- and far-field of the RIS, and present a fast alignment algorithm for the RIS phase shifts and the transceiver beamformers. Indicative performance evaluation results are shown, verifying the effectiveness of the proposed approach in comparison with various benchmark schemes.
△ Less
Submitted 29 March, 2022;
originally announced March 2022.
-
Contextual Model Aggregation for Fast and Robust Federated Learning in Edge Computing
Authors:
Hung T. Nguyen,
H. Vincent Poor,
Mung Chiang
Abstract:
Federated learning is a prime candidate for distributed machine learning at the network edge due to the low communication complexity and privacy protection among other attractive properties. However, existing algorithms face issues with slow convergence and/or robustness of performance due to the considerable heterogeneity of data distribution, computation and communication capability at the edge.…
▽ More
Federated learning is a prime candidate for distributed machine learning at the network edge due to the low communication complexity and privacy protection among other attractive properties. However, existing algorithms face issues with slow convergence and/or robustness of performance due to the considerable heterogeneity of data distribution, computation and communication capability at the edge. In this work, we tackle both of these issues by focusing on the key component of model aggregation in federated learning systems and studying optimal algorithms to perform this task. Particularly, we propose a contextual aggregation scheme that achieves the optimal context-dependent bound on loss reduction in each round of optimization. The aforementioned context-dependent bound is derived from the particular participating devices in that round and an assumption on smoothness of the overall loss function. We show that this aggregation leads to a definite reduction of loss function at every round. Furthermore, we can integrate our aggregation with many existing algorithms to obtain the contextual versions. Our experimental results demonstrate significant improvements in convergence speed and robustness of the contextual versions compared to the original algorithms. We also consider different variants of the contextual aggregation and show robust performance even in the most extreme settings.
△ Less
Submitted 23 March, 2022;
originally announced March 2022.
-
An Information-Theoretic View of Mixed-Delay Traffic in 5G and 6G
Authors:
Homa Nikbakht,
Michèle Wigger,
Malcolm Egan,
Shlomo Shamai,
Jean-Marie Gorce,
H. Vincent Poor
Abstract:
Fifth generation mobile communication systems (5G) have to accommodate both Ultra-Reliable Low-Latency Communication (URLLC) and enhanced Mobile Broadband (eMBB) services. While, eMBB applications support high data rates, URLLC services aim at guaranteeing low-latencies and high-reliabilities. eMBB and URLLC services are scheduled on the same frequency band, where the different latency requirement…
▽ More
Fifth generation mobile communication systems (5G) have to accommodate both Ultra-Reliable Low-Latency Communication (URLLC) and enhanced Mobile Broadband (eMBB) services. While, eMBB applications support high data rates, URLLC services aim at guaranteeing low-latencies and high-reliabilities. eMBB and URLLC services are scheduled on the same frequency band, where the different latency requirements of the communications render the coexistence challenging. In this survey, we review, from an information theoretic perspective, coding schemes that simultaneously accommodate URLLC and eMBB transmissions and show that they outperform traditional scheduling approaches. Various communication scenarios are considered, including point-to-point channels, broadcast channels, interference networks, cellular models, and cloud radio access networks (C-RANs). The main focus is on the set of rate pairs that can simultaneously be achieved for URLLC and eMBB messages, which well captures the tension between the two types of communications. We also discuss finite-blocklength results where the measure of interest is the set of error probability pairs that can simultaneously be achieved on the two communication regimes.
△ Less
Submitted 22 March, 2022;
originally announced March 2022.
-
Channel Hardening of IRS-Aided Multi-Antenna Systems: How Should IRSs Scale?
Authors:
Ali Bereyhi,
Saba Asaad,
Chongjun Ouyang,
Ralf R. Müller,
Rafael F. Schaefer,
H. Vincent Poor
Abstract:
Unlike active array antennas, intelligent reflecting surfaces (IRSs) are efficiently implemented at large dimensions. This allows for traceable realizations of large-scale IRS-aided MIMO systems in which not necessarily the array antennas, but the passive IRSs are large. It is widely believed that large IRS-aided MIMO settings maintain the fundamental features of massive MIMO systems, and hence th…
▽ More
Unlike active array antennas, intelligent reflecting surfaces (IRSs) are efficiently implemented at large dimensions. This allows for traceable realizations of large-scale IRS-aided MIMO systems in which not necessarily the array antennas, but the passive IRSs are large. It is widely believed that large IRS-aided MIMO settings maintain the fundamental features of massive MIMO systems, and hence they are the implementationally feasible technology for establishing the performance of large-scale MIMO settings. This work gives a rigorous proof to this belief. We show that using a large passive IRS, the end-to-end MIMO channel between the transmitter and the receiver always hardens, even if the IRS elements are strongly correlated.
For the fading direct and reflection links between the transmitter and the receiver, our derivations demonstrate that as the number of IRS elements grows large, the capacity of end-to-end channel converges in distribution to a real-valued Gaussian random variable whose variance goes to zero. The order of this drop depends on how the physical dimensions of the IRS grow. We derive this order explicitly. Numerical experiments depict that the analytical asymptotic distribution almost perfectly matches the histogram of the capacity, even in practical scenarios.
As a sample application of the results, we use the asymptotic characterization to study the dimensional trade-off between the transmitter and the IRS. The result is intuitive: For a given target performance, the larger the IRS is, the less transmit antennas are required to achieve the target. For an arbitrary ergodic and outage performance, we characterize this trade-off analytically. Our investigations demonstrate that using a practical IRS size, the target performance can be achieved with significantly small end-to-end MIMO dimensions.
△ Less
Submitted 22 March, 2022;
originally announced March 2022.
-
Proximal Policy Optimization-based Transmit Beamforming and Phase-shift Design in an IRS-aided ISAC System for the THz Band
Authors:
Xiangnan Liu,
Haijun Zhang,
Ke** Long,
Mingyu Zhou,
Yonghui Li,
H. Vincent Poor
Abstract:
In this paper, an IRS-aided integrated sensing and communications (ISAC) system operating in the terahertz (THz) band is proposed to maximize the system capacity. Transmit beamforming and phase-shift design are transformed into a universal optimization problem with ergodic constraints. Then the joint optimization of transmit beamforming and phase-shift design is achieved by gradient-based, primal-…
▽ More
In this paper, an IRS-aided integrated sensing and communications (ISAC) system operating in the terahertz (THz) band is proposed to maximize the system capacity. Transmit beamforming and phase-shift design are transformed into a universal optimization problem with ergodic constraints. Then the joint optimization of transmit beamforming and phase-shift design is achieved by gradient-based, primal-dual proximal policy optimization (PPO) in the multi-user multiple-input single-output (MISO) scenario. Specifically, the actor part generates continuous transmit beamforming and the critic part takes charge of discrete phase shift design. Based on the MISO scenario, we investigate a distributed PPO (DPPO) framework with the concept of multi-threading learning in the multi-user multiple-input multiple-output (MIMO) scenario. Simulation results demonstrate the effectiveness of the primal-dual PPO algorithm and its multi-threading version in terms of transmit beamforming and phase-shift design.
△ Less
Submitted 21 March, 2022;
originally announced March 2022.
-
Adaptive Information Bottleneck Guided Joint Source and Channel Coding for Image Transmission
Authors:
Lunan Sun,
Yang Yang,
Mingzhe Chen,
Caili Guo,
Walid Saad,
H. Vincent Poor
Abstract:
Joint source and channel coding (JSCC) for image transmission has attracted increasing attention due to its robustness and high efficiency. However, the existing deep JSCC research mainly focuses on minimizing the distortion between the transmitted and received information under a fixed number of available channels. Therefore, the transmitted rate may be far more than its required minimum value. I…
▽ More
Joint source and channel coding (JSCC) for image transmission has attracted increasing attention due to its robustness and high efficiency. However, the existing deep JSCC research mainly focuses on minimizing the distortion between the transmitted and received information under a fixed number of available channels. Therefore, the transmitted rate may be far more than its required minimum value. In this paper, an adaptive information bottleneck (IB) guided joint source and channel coding (AIB-JSCC) method is proposed for image transmission. The goal of AIB-JSCC is to reduce the transmission rate while improving the image reconstruction quality. In particular, a new IB objective for image transmission is proposed so as to minimize the distortion and the transmission rate. A mathematically tractable lower bound on the proposed objective is derived, and then, adopted as the loss function of AIB-JSCC. To trade off compression and reconstruction quality, an adaptive algorithm is proposed to adjust the hyperparameter of the proposed loss function dynamically according to the distortion during the training. Experimental results show that AIB-JSCC can significantly reduce the required amount of transmitted data and improve the reconstruction quality and downstream task accuracy.
△ Less
Submitted 28 May, 2023; v1 submitted 12 March, 2022;
originally announced March 2022.
-
Olfaction-inspired MCs: Molecule Mixture Shift Keying and Cross-Reactive Receptor Arrays
Authors:
Vahid Jamali,
Helene M. Loos,
Andrea Buettner,
Robert Schober,
H. Vincent Poor
Abstract:
In this paper, we propose a novel concept for engineered molecular communication (MC) systems inspired by animal olfaction. We focus on a multi-user scenario where several transmitters wish to communicate with a central receiver. We assume that each transmitter employs a unique mixture of different types of signaling molecules to represent its message and the receiver is equipped with an array com…
▽ More
In this paper, we propose a novel concept for engineered molecular communication (MC) systems inspired by animal olfaction. We focus on a multi-user scenario where several transmitters wish to communicate with a central receiver. We assume that each transmitter employs a unique mixture of different types of signaling molecules to represent its message and the receiver is equipped with an array comprising $R$ different types of receptors in order to detect the emitted molecule mixtures. The design of an MC system based on \textit{orthogonal} molecule-receptor pairs implies that the hardware complexity of the receiver linearly scales with the number of signaling molecule types $Q$ (i.e., $R=Q$). Natural olfaction systems avoid such high complexity by employing arrays of \textit{cross-reactive} receptors, where each type of molecule activates multiple types of receptors and each type of receptor is predominantly activated by multiple types of molecules albeit with different activation strengths. For instance, the human olfactory system is believed to discriminate several thousands of chemicals using only a few hundred receptor types, i.e., $Q\gg R$. Motivated by this observation, we first develop an end-to-end MC channel model that accounts for the key properties of olfaction. Subsequently, we present the proposed transmitter and receiver designs. In particular, given a set of signaling molecules, we develop algorithms that allocate molecules to different transmitters and optimize the mixture alphabet for communication. Moreover, we formulate the molecule mixture recovery as a convex compressive sensing problem which can be efficiently solved via available numerical solvers.
△ Less
Submitted 8 March, 2022;
originally announced March 2022.
-
Algorithmic Computability and Approximability of Capacity-Achieving Input Distributions
Authors:
Holger Boche,
Rafael F. Schaefer,
H. Vincent Poor
Abstract:
The capacity of a channel can usually be characterized as a maximization of certain entropic quantities. From a practical point of view it is of primary interest to not only compute the capacity value, but also to find the corresponding optimizer, i.e., the capacity-achieving input distribution. This paper addresses the general question of whether or not it is possible to find algorithms that can…
▽ More
The capacity of a channel can usually be characterized as a maximization of certain entropic quantities. From a practical point of view it is of primary interest to not only compute the capacity value, but also to find the corresponding optimizer, i.e., the capacity-achieving input distribution. This paper addresses the general question of whether or not it is possible to find algorithms that can compute the optimal input distribution depending on the channel. For this purpose, the concept of Turing machines is used which provides the fundamental performance limits of digital computers and therewith fully specifies which tasks are algorithmically feasible in principle. It is shown for discrete memoryless channels that it is impossible to algorithmically compute the capacity-achieving input distribution, where the channel is given as an input to the algorithm (or Turing machine). Finally, it is further shown that it is even impossible to algorithmically approximate these input distributions.
△ Less
Submitted 23 May, 2023; v1 submitted 25 February, 2022;
originally announced February 2022.