-
Local Mutual-Information Differential Privacy
Authors:
Khac-Hoang Ngo,
Johan Östman,
Alexandre Graell i Amat
Abstract:
Local mutual-information differential privacy (LMIDP) is a privacy notion that aims to quantify the reduction of uncertainty about the input data when the output of a privacy-preserving mechanism is revealed. We study the relation of LMIDP with local differential privacy (LDP), the de facto standard notion of privacy in context-independent (CI) scenarios, and with local information privacy (LIP),…
▽ More
Local mutual-information differential privacy (LMIDP) is a privacy notion that aims to quantify the reduction of uncertainty about the input data when the output of a privacy-preserving mechanism is revealed. We study the relation of LMIDP with local differential privacy (LDP), the de facto standard notion of privacy in context-independent (CI) scenarios, and with local information privacy (LIP), the state-of-the-art notion for context-dependent settings. We establish explicit conversion rules, i.e., bounds on the privacy parameters for a LMIDP mechanism to also satisfy LDP/LIP, and vice versa. We use our bounds to formally verify that LMIDP is a weak privacy notion. We also show that uncorrelated Gaussian noise is the best-case noise in terms of CI-LMIDP if both the input data and the noise are subject to an average power constraint.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
Poisoning Attacks on Federated Learning for Autonomous Driving
Authors:
Sonakshi Garg,
Hugo Jönsson,
Gustav Kalander,
Axel Nilsson,
Bhhaanu Pirange,
Viktor Valadi,
Johan Östman
Abstract:
Federated Learning (FL) is a decentralized learning paradigm, enabling parties to collaboratively train models while kee** their data confidential. Within autonomous driving, it brings the potential of reducing data storage costs, reducing bandwidth requirements, and to accelerate the learning. FL is, however, susceptible to poisoning attacks. In this paper, we introduce two novel poisoning atta…
▽ More
Federated Learning (FL) is a decentralized learning paradigm, enabling parties to collaboratively train models while kee** their data confidential. Within autonomous driving, it brings the potential of reducing data storage costs, reducing bandwidth requirements, and to accelerate the learning. FL is, however, susceptible to poisoning attacks. In this paper, we introduce two novel poisoning attacks on FL tailored to regression tasks within autonomous driving: FLStealth and Off-Track Attack (OTA). FLStealth, an untargeted attack, aims at providing model updates that deteriorate the global model performance while appearing benign. OTA, on the other hand, is a targeted attack with the objective to change the global model's behavior when exposed to a certain trigger. We demonstrate the effectiveness of our attacks by conducting comprehensive experiments pertaining to the task of vehicle trajectory prediction. In particular, we show that, among five different untargeted attacks, FLStealth is the most successful at bypassing the considered defenses employed by the server. For OTA, we demonstrate the inability of common defense strategies to mitigate the attack, highlighting the critical need for new defensive mechanisms against targeted attacks within FL for autonomous driving.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Secure Aggregation is Not Private Against Membership Inference Attacks
Authors:
Khac-Hoang Ngo,
Johan Östman,
Giuseppe Durisi,
Alexandre Graell i Amat
Abstract:
Secure aggregation (SecAgg) is a commonly-used privacy-enhancing mechanism in federated learning, affording the server access only to the aggregate of model updates while safeguarding the confidentiality of individual updates. Despite widespread claims regarding SecAgg's privacy-preserving capabilities, a formal analysis of its privacy is lacking, making such presumptions unjustified. In this pape…
▽ More
Secure aggregation (SecAgg) is a commonly-used privacy-enhancing mechanism in federated learning, affording the server access only to the aggregate of model updates while safeguarding the confidentiality of individual updates. Despite widespread claims regarding SecAgg's privacy-preserving capabilities, a formal analysis of its privacy is lacking, making such presumptions unjustified. In this paper, we delve into the privacy implications of SecAgg by treating it as a local differential privacy (LDP) mechanism for each local update. We design a simple attack wherein an adversarial server seeks to discern which update vector a client submitted, out of two possible ones, in a single training round of federated learning under SecAgg. By conducting privacy auditing, we assess the success probability of this attack and quantify the LDP guarantees provided by SecAgg. Our numerical results unveil that, contrary to prevailing claims, SecAgg offers weak privacy against membership inference attacks even in a single training round. Indeed, it is difficult to hide a local update by adding other independent local updates when the updates are of high dimension. Our findings underscore the imperative for additional privacy-enhancing mechanisms, such as noise injection, in federated learning.
△ Less
Submitted 14 June, 2024; v1 submitted 26 March, 2024;
originally announced March 2024.
-
Decoupled Subgraph Federated Learning
Authors:
Javad Aliakbari,
Johan Östman,
Alexandre Graell i Amat
Abstract:
We address the challenge of federated learning on graph-structured data distributed across multiple clients. Specifically, we focus on the prevalent scenario of interconnected subgraphs, where interconnections between different clients play a critical role. We present a novel framework for this scenario, named FedStruct, that harnesses deep structural dependencies. To uphold privacy, unlike existi…
▽ More
We address the challenge of federated learning on graph-structured data distributed across multiple clients. Specifically, we focus on the prevalent scenario of interconnected subgraphs, where interconnections between different clients play a critical role. We present a novel framework for this scenario, named FedStruct, that harnesses deep structural dependencies. To uphold privacy, unlike existing methods, FedStruct eliminates the necessity of sharing or generating sensitive node features or embeddings among clients. Instead, it leverages explicit global graph structure information to capture inter-node dependencies. We validate the effectiveness of FedStruct through experimental results conducted on six datasets for semi-supervised node classification, showcasing performance close to the centralized approach across various scenarios, including different data partitioning methods, varying levels of label availability, and number of clients.
△ Less
Submitted 20 June, 2024; v1 submitted 29 February, 2024;
originally announced February 2024.
-
FedGT: Identification of Malicious Clients in Federated Learning with Secure Aggregation
Authors:
Marvin Xhemrishi,
Johan Östman,
Antonia Wachter-Zeh,
Alexandre Graell i Amat
Abstract:
We propose FedGT, a novel framework for identifying malicious clients in federated learning with secure aggregation. Inspired by group testing, the framework leverages overlap** groups of clients to identify the presence of malicious clients in the groups via a decoding operation. The clients identified as malicious are then removed from the model training, which is performed over the remaining…
▽ More
We propose FedGT, a novel framework for identifying malicious clients in federated learning with secure aggregation. Inspired by group testing, the framework leverages overlap** groups of clients to identify the presence of malicious clients in the groups via a decoding operation. The clients identified as malicious are then removed from the model training, which is performed over the remaining clients. By choosing the size, number, and overlap between groups, FedGT strikes a balance between privacy and security. Specifically, the server learns the aggregated model of the clients in each group - vanilla federated learning and secure aggregation correspond to the extreme cases of FedGT with group size equal to one and the total number of clients, respectively. The effectiveness of FedGT is demonstrated through extensive experiments on the MNIST, CIFAR-10, and ISIC2019 datasets in a cross-silo setting under different data-poisoning attacks. These experiments showcase FedGT's ability to identify malicious clients, resulting in high model utility. We further show that FedGT significantly outperforms the private robust aggregation approach based on the geometric median recently proposed by Pillutla et al. in multiple settings.
△ Less
Submitted 10 July, 2024; v1 submitted 9 May, 2023;
originally announced May 2023.
-
Decentralised Semi-supervised Onboard Learning for Scene Classification in Low-Earth Orbit
Authors:
Johan Östman,
Pablo Gomez,
Vinutha Magal Shreenath,
Gabriele Meoni
Abstract:
Onboard machine learning on the latest satellite hardware offers the potential for significant savings in communication and operational costs. We showcase the training of a machine learning model on a satellite constellation for scene classification using semi-supervised learning while accounting for operational constraints such as temperature and limited power budgets based on satellite processor…
▽ More
Onboard machine learning on the latest satellite hardware offers the potential for significant savings in communication and operational costs. We showcase the training of a machine learning model on a satellite constellation for scene classification using semi-supervised learning while accounting for operational constraints such as temperature and limited power budgets based on satellite processor benchmarks of the neural network. We evaluate mission scenarios employing both decentralised and federated learning approaches. All scenarios achieve convergence to high accuracy (around 91% on EuroSAT RGB dataset) within a one-day mission timeframe.
△ Less
Submitted 6 May, 2023;
originally announced May 2023.
-
PAseos Simulates the Environment for Operating multiple Spacecraft
Authors:
Pablo Gómez,
Johan Östman,
Vinutha Magal Shreenath,
Gabriele Meoni
Abstract:
The next generation of spacecraft is anticipated to enable various new applications involving onboard processing, machine learning and decentralised operational scenarios. Even though many of these have been previously proposed and evaluated, the operational constraints of real mission scenarios are often either not considered or only rudimentary. Here, we present an open-source Python module call…
▽ More
The next generation of spacecraft is anticipated to enable various new applications involving onboard processing, machine learning and decentralised operational scenarios. Even though many of these have been previously proposed and evaluated, the operational constraints of real mission scenarios are often either not considered or only rudimentary. Here, we present an open-source Python module called PASEOS that is capable of modelling operational scenarios involving one or multiple spacecraft. It considers several physical phenomena including thermal, power, bandwidth and communications constraints as well as the impact of radiation on spacecraft. PASEOS can be run both as a high-performance-oriented numerical simulation and/or in a real-time mode directly on edge hardware. We demonstrate these capabilities in three scenarios, one in real-time simulation on a Unibap iX-10 100 satellite processor, another in a simulation modelling an entire constellation performing tasks over several hours and one training a machine learning model in a decentralised setting. While we demonstrate tasks in Earth orbit, PASEOS is conceptually designed to allow deep space scenarios too. Our results show that PASEOS can model the described scenarios efficiently and thus provide insight into operational considerations. We show this in terms of runtime and overhead as well as by investigating the modelled temperature, battery status and communication windows of a constellation. By running PASEOS on an actual satellite processor, we showcase how PASEOS can be directly included in hardware demonstrators for future missions. Overall, we provide the first solution to holistically model the physical constraints spacecraft encounter in Earth orbit and beyond. The PASEOS module is available open-source online together with an extensive documentation to enable researchers to quickly incorporate it in their studies.
△ Less
Submitted 6 February, 2023;
originally announced February 2023.
-
Efficient Node Selection in Private Personalized Decentralized Learning
Authors:
Edvin Listo Zec,
Johan Östman,
Olof Mogren,
Daniel Gillblad
Abstract:
Personalized decentralized learning is a promising paradigm for distributed learning, enabling each node to train a local model on its own data and collaborate with other nodes to improve without sharing any data. However, this approach poses significant privacy risks, as nodes may inadvertently disclose sensitive information about their data or preferences through their collaboration choices. In…
▽ More
Personalized decentralized learning is a promising paradigm for distributed learning, enabling each node to train a local model on its own data and collaborate with other nodes to improve without sharing any data. However, this approach poses significant privacy risks, as nodes may inadvertently disclose sensitive information about their data or preferences through their collaboration choices. In this paper, we propose Private Personalized Decentralized Learning (PPDL), a novel approach that combines secure aggregation and correlated adversarial multi-armed bandit optimization to protect node privacy while facilitating efficient node selection. By leveraging dependencies between different arms, represented by potential collaborators, we demonstrate that PPDL can effectively identify suitable collaborators solely based on aggregated models. Additionally, we show that PPDL surpasses previous non-private methods in model performance on standard benchmarks under label and covariate shift scenarios.
△ Less
Submitted 15 January, 2024; v1 submitted 30 January, 2023;
originally announced January 2023.
-
Decentralized Online Bandit Optimization on Directed Graphs with Regret Bounds
Authors:
Johan Östman,
Ather Gattami,
Daniel Gillblad
Abstract:
We consider a decentralized multiplayer game, played over $T$ rounds, with a leader-follower hierarchy described by a directed acyclic graph. For each round, the graph structure dictates the order of the players and how players observe the actions of one another. By the end of each round, all players receive a joint bandit-reward based on their joint action that is used to update the player strate…
▽ More
We consider a decentralized multiplayer game, played over $T$ rounds, with a leader-follower hierarchy described by a directed acyclic graph. For each round, the graph structure dictates the order of the players and how players observe the actions of one another. By the end of each round, all players receive a joint bandit-reward based on their joint action that is used to update the player strategies towards the goal of minimizing the joint pseudo-regret. We present a learning algorithm inspired by the single-player multi-armed bandit problem and show that it achieves sub-linear joint pseudo-regret in the number of rounds for both adversarial and stochastic bandit rewards. Furthermore, we quantify the cost incurred due to the decentralized nature of our problem compared to the centralized setting.
△ Less
Submitted 27 January, 2023;
originally announced January 2023.
-
On Joint Detection and Decoding in Short-Packet Communications
Authors:
Alejandro Lancho,
Johan Östman,
Giuseppe Durisi
Abstract:
We consider a communication problem in which the receiver must first detect the presence of an information packet and, if detected, decode the message carried within it. We present general nonasymptotic upper and lower bounds on the maximum coding rate that depend on the blocklength, the probability of false alarm, the probability of misdetection, and the packet error probability. The bounds, whic…
▽ More
We consider a communication problem in which the receiver must first detect the presence of an information packet and, if detected, decode the message carried within it. We present general nonasymptotic upper and lower bounds on the maximum coding rate that depend on the blocklength, the probability of false alarm, the probability of misdetection, and the packet error probability. The bounds, which are expressed in terms of binary-hypothesis-testing performance metrics, generalize finite-blocklength bounds derived previously for the scenario when a genie informs the receiver whether a packet is present. The bounds apply to detection performed either jointly with decoding on the entire data packet, or separately on a dedicated preamble. The results presented in this paper can be used to determine the blocklength values at which the performance of a communication system is limited by its ability to perform packet detection satisfactorily, and to assess the difference in performance between preamble-based detection, and joint detection and decoding. Numerical results pertaining to the binary-input AWGN channel are provided.
△ Less
Submitted 28 September, 2021;
originally announced September 2021.
-
URLLC with Massive MIMO: Analysis and Design at Finite Blocklength
Authors:
Johan Östman,
Alejandro Lancho,
Giuseppe Durisi,
Luca Sanguinetti
Abstract:
The fast adoption of Massive MIMO for high-throughput communications was enabled by many research contributions mostly relying on infinite-blocklength information-theoretic bounds. This makes it hard to assess the suitability of Massive MIMO for ultra-reliable low-latency communications (URLLC) operating with short blocklength codes. This paper provides a rigorous framework for the characterizatio…
▽ More
The fast adoption of Massive MIMO for high-throughput communications was enabled by many research contributions mostly relying on infinite-blocklength information-theoretic bounds. This makes it hard to assess the suitability of Massive MIMO for ultra-reliable low-latency communications (URLLC) operating with short blocklength codes. This paper provides a rigorous framework for the characterization and numerical evaluation (using the saddlepoint approximation) of the error probability achievable in the uplink and downlink of Massive MIMO at finite blocklength. The framework encompasses imperfect channel state information, pilot contamination, spatially correlated channels, and arbitrary linear spatial processing. In line with previous results based on infinite-blocklength bounds, we prove that, with minimum mean-square error (MMSE) processing and spatially correlated channels, the error probability at finite blocklength goes to zero as the number $M$ of antennas grows to infinity, even under pilot contamination. On the other hand, numerical results for a practical URLLC network setup involving a base station with $M=100$ antennas, show that a target error probability of $10^{-5}$ can be achieved with MMSE processing, uniformly over each cell, only if orthogonal pilot sequences are assigned to all the users in the network. Maximum ratio processing does not suffice.
△ Less
Submitted 10 May, 2021; v1 submitted 22 September, 2020;
originally announced September 2020.
-
Short-Packet Transmission over a Bidirectional Massive MIMO link
Authors:
Johan Östman,
Alejandro Lancho,
Giuseppe Durisi
Abstract:
We consider the transmission of short packets over a bidirectional communication link where multiple devices, e.g., sensors and actuators, exchange small-data payloads with a base station equipped with a large antenna array. Using results from finite-blocklength information theory, we characterize the minimum SNR required to achieve a target error probability for a fixed packet length and a fixed…
▽ More
We consider the transmission of short packets over a bidirectional communication link where multiple devices, e.g., sensors and actuators, exchange small-data payloads with a base station equipped with a large antenna array. Using results from finite-blocklength information theory, we characterize the minimum SNR required to achieve a target error probability for a fixed packet length and a fixed payload size. Our nonasymptotic analysis, which applies to the scenario in which the bidirectional communication is device-initiated, and also to the more challenging case when it is base-station initiated, provides guidelines on the design of massive multiple-input multiple-output links that need to support sporadic ultra-reliable low-latency transmissions. Specifically, it allows us to determine the optimal amount of resources that need to be dedicated to the acquisition of channel state information.
△ Less
Submitted 2 December, 2019;
originally announced December 2019.
-
Short-packet Transmission via Variable-Length Codes in the Presence of Noisy Stop Feedback
Authors:
Johan Östman,
Rahul Devassy,
Giuseppe Durisi,
Erik G. Ström
Abstract:
We present an upper bound on the error probability achievable using variable-length stop feedback codes, for a fixed size of the information payload and a given constraint on the maximum latency and the average service time. Differently from the bound proposed in Polyanskiy et al. (2011), which pertains to the scenario in which the stop signal is sent over a noiseless feedback channel, our bound a…
▽ More
We present an upper bound on the error probability achievable using variable-length stop feedback codes, for a fixed size of the information payload and a given constraint on the maximum latency and the average service time. Differently from the bound proposed in Polyanskiy et al. (2011), which pertains to the scenario in which the stop signal is sent over a noiseless feedback channel, our bound applies to the practically relevant setup in which the feedback link is noisy. By numerically evaluating our bound, we illustrate that, for fixed latency and reliability constraints, noise in the feedback link can cause a significant increase in the minimum average service time, to the extent that fixed-length codes without feedback may be preferable in some scenarios.
△ Less
Submitted 19 February, 2020; v1 submitted 3 September, 2019;
originally announced September 2019.
-
Saddlepoint Approximations for Short-Packet Wireless Communications
Authors:
Alejandro Lancho,
Jöhan Ostman,
Giuseppe Durisi,
Tobias Koch,
Gonzalo Vazquez-Vilar
Abstract:
In recent years, the derivation of nonasymptotic converse and achievability bounds on the maximum coding rate as a function of the error probability and blocklength has gained attention in the information theory literature. While these bounds are accurate for many scenarios of interest, they need to be evaluated numerically for most wireless channels of practical interest, and their evaluation is…
▽ More
In recent years, the derivation of nonasymptotic converse and achievability bounds on the maximum coding rate as a function of the error probability and blocklength has gained attention in the information theory literature. While these bounds are accurate for many scenarios of interest, they need to be evaluated numerically for most wireless channels of practical interest, and their evaluation is computationally demanding. This paper presents saddlepoint approximations of state-of-the-art converse and achievability bounds for noncoherent, single-antenna, Rayleigh block-fading channels. These approximations can be calculated efficiently and are shown to be accurate for SNR values as small as 0 dB and blocklengths of 168 channel uses or more.
△ Less
Submitted 29 March, 2020; v1 submitted 23 April, 2019;
originally announced April 2019.
-
Peak-Age Violation Guarantees for the Transmission of Short Packets over Fading Channels
Authors:
Johan Östman,
Rahul Devassy,
Giuseppe Durisi,
Elif Uysal
Abstract:
We investigate the probability that the peak age of information in a point-to-point communication system operating over a multiantenna wireless fading channel exceeds a predetermined value. The packets are scheduled according to a last-come first-serve policy with preemption in service, and are transmitted over the channel using a simple automatic repetition request protocol. We consider quadratur…
▽ More
We investigate the probability that the peak age of information in a point-to-point communication system operating over a multiantenna wireless fading channel exceeds a predetermined value. The packets are scheduled according to a last-come first-serve policy with preemption in service, and are transmitted over the channel using a simple automatic repetition request protocol. We consider quadrature phase shift keying modulation, pilot-assisted transmission, maximum-likelihood channel estimation, and mismatched scaled nearest-neighbor decoding. Our analysis, which exploits nonasymptotic tools in information theory, allows one to determine, for a given information packet size, the physical layer parameters such as the SNR, the number of transmit and receive antennas, the amount of frequency diversity to exploit, and the number of pilot symbols, to ensure that the system operates below a target peak-age violation probability.
△ Less
Submitted 15 March, 2019;
originally announced March 2019.
-
Low-Complexity Joint Channel Estimation and List Decoding of Short Codes
Authors:
Mustafa Cemil Coşkun,
Gianluigi Liva,
Johan Östman,
Giuseppe Durisi
Abstract:
A pilot-assisted transmission (PAT) scheme is proposed for short blocklengths, where the pilots are used only to derive an initial channel estimate for the list construction step. The final decision of the message is obtained by applying a non-coherent decoding metric to the codewords composing the list. This allows one to use very few pilots, thus reducing the channel estimation overhead. The met…
▽ More
A pilot-assisted transmission (PAT) scheme is proposed for short blocklengths, where the pilots are used only to derive an initial channel estimate for the list construction step. The final decision of the message is obtained by applying a non-coherent decoding metric to the codewords composing the list. This allows one to use very few pilots, thus reducing the channel estimation overhead. The method is applied to an ordered statistics decoder for communication over a Rayleigh block-fading channel. Gains of up to $1.2$ dB as compared to traditional PAT schemes are demonstrated for short codes with QPSK signaling. The approach can be generalized to other list decoders, e.g., to list decoding of polar codes.
△ Less
Submitted 16 January, 2019;
originally announced January 2019.
-
Low-Latency Short-Packet Transmissions: Fixed Length or HARQ?
Authors:
Johan Östman,
Rahul Devassy,
Guido C. Ferrante,
Giuseppe Durisi
Abstract:
We study short-packet communications, subject to latency and reliability constraints, under the premises of limited frequency diversity and no time diversity. The question addressed is whether, and when, hybrid automatic repeat request (HARQ) outperforms fixed-blocklength schemes with no feedback (FBL-NF) in such a setting. We derive an achievability bound for HARQ, under the assumption of a limit…
▽ More
We study short-packet communications, subject to latency and reliability constraints, under the premises of limited frequency diversity and no time diversity. The question addressed is whether, and when, hybrid automatic repeat request (HARQ) outperforms fixed-blocklength schemes with no feedback (FBL-NF) in such a setting. We derive an achievability bound for HARQ, under the assumption of a limited number of transmissions. The bound relies on pilot-assisted transmission to estimate the fading channel and scaled nearest-neighbor decoding at the receiver. We compare our achievability bound for HARQ to stateof-the-art achievability bounds for FBL-NF communications and show that for a given latency, reliability, number of information bits, and number of diversity branches, HARQ may significantly outperform FBL-NF. For example, for an average latency of 1 ms, a target error probability of 10^-3, 30 information bits, and 3 diversity branches, the gain in energy per bit is about 4 dB.
△ Less
Submitted 18 September, 2018;
originally announced September 2018.
-
Pilot-Assisted Short-Packet Transmission over Multiantenna Fading Channels: A 5G Case Study
Authors:
Guido Carlo Ferrante,
Johan Östman,
Giuseppe Durisi,
Kittipong Kittichokechai
Abstract:
Leveraging recent results in finite-blocklength information theory, we investigate the problem of designing a control channel in a 5G system. The setup involves the transmission, under stringent latency and reliability constraints, of a short data packet containing a small information payload, over a propagation channel that offers limited frequency diversity and no time diversity. We present an a…
▽ More
Leveraging recent results in finite-blocklength information theory, we investigate the problem of designing a control channel in a 5G system. The setup involves the transmission, under stringent latency and reliability constraints, of a short data packet containing a small information payload, over a propagation channel that offers limited frequency diversity and no time diversity. We present an achievability bound, built upon the random-coding union bound with parameter $s$ (Martinez & Guillén i Fàbregas, 2011), which relies on quadrature phase-shift keying modulation, pilot-assisted transmission to estimate the fading channel, and scaled nearest-neighbor decoding at the receiver. Using our achievability bound, we determine how many pilot symbols should be transmitted to optimally trade between channel-estimation errors and rate loss due to pilot overhead. Our analysis also reveals the importance of using multiple antennas at the transmitter and/or the receiver to provide the spatial diversity needed to meet the stringent reliability constraint.
△ Less
Submitted 1 February, 2018; v1 submitted 31 January, 2018;
originally announced January 2018.
-
Short Packets over Block-Memoryless Fading Channels: Pilot-Assisted or Noncoherent Transmission?
Authors:
Johan Östman,
Giuseppe Durisi,
Erik G. Ström,
Mustafa C. Coşkun,
Gianluigi Liva
Abstract:
We present nonasymptotic upper and lower bounds on the maximum coding rate achievable when transmitting short packets over a Rician memoryless block-fading channel for a given requirement on the packet error probability. We focus on the practically relevant scenario in which there is no \emph{a priori} channel state information available at the transmitter and at the receiver. An upper bound built…
▽ More
We present nonasymptotic upper and lower bounds on the maximum coding rate achievable when transmitting short packets over a Rician memoryless block-fading channel for a given requirement on the packet error probability. We focus on the practically relevant scenario in which there is no \emph{a priori} channel state information available at the transmitter and at the receiver. An upper bound built upon the min-max converse is compared to two lower bounds: the first one relies on a noncoherent transmission strategy in which the fading channel is not estimated explicitly at the receiver; the second one employs pilot-assisted transmission (PAT) followed by maximum-likelihood channel estimation and scaled mismatched nearest-neighbor decoding at the receiver. Our bounds are tight enough to unveil the optimum number of diversity branches that a packet should span so that the energy per bit required to achieve a target packet error probability is minimized, for a given constraint on the code rate and the packet size. Furthermore, the bounds reveal that noncoherent transmission is more energy efficient than PAT, even when the number of pilot symbols and their power is optimized. For example, for the case when a coded packet of $168$ symbols is transmitted using a channel code of rate $0.48$ bits/channel use, over a block-fading channel with block size equal to $8$ symbols, PAT requires an additional $1.2$ dB of energy per information bit to achieve a packet error probability of $10^{-3}$ compared to a suitably designed noncoherent transmission scheme. Finally, we devise a PAT scheme based on punctured tail-biting quasi-cyclic codes and ordered statistics decoding, whose performance are close ($1$ dB gap at $10^{-3}$ packet error probability) to the ones predicted by our PAT lower bound. This shows that the PAT lower bound provides useful guidelines on the design of actual PAT schemes.
△ Less
Submitted 18 December, 2017;
originally announced December 2017.
-
Finite-Blocklength Bounds on the Maximum Coding Rate of Rician Fading Channels with Applications to Pilot-Assisted Transmission
Authors:
Johan Östman,
Giuseppe Durisi,
Erik G. Ström
Abstract:
We present nonasymptotic bounds on the maximum coding rate achievable over a Rician block-fading channel for a fixed packet size and a fixed packet error probability. Our bounds, which apply to the scenario where no a priori channel state information is available at the receiver, allow one to quantify the tradeoff between the rate gains resulting from the exploitation of time-frequency diversity a…
▽ More
We present nonasymptotic bounds on the maximum coding rate achievable over a Rician block-fading channel for a fixed packet size and a fixed packet error probability. Our bounds, which apply to the scenario where no a priori channel state information is available at the receiver, allow one to quantify the tradeoff between the rate gains resulting from the exploitation of time-frequency diversity and the rate loss resulting from fast channel variations and pilot-symbol overhead.
△ Less
Submitted 23 May, 2017; v1 submitted 8 May, 2017;
originally announced May 2017.
-
Low-latency Ultra Reliable 5G Communications: Finite-Blocklength Bounds and Coding Schemes
Authors:
Johan Östman,
Giuseppe Durisi,
Erik G. Ström,
**gya Li,
Henrik Sahlin,
Gianluigi Liva
Abstract:
Future autonomous systems require wireless connectivity able to support extremely stringent requirements on both latency and reliability. In this paper, we leverage recent developments in the field of finite-blocklength information theory to illustrate how to optimally design wireless systems in the presence of such stringent constraints. Focusing on a multi-antenna Rayleigh block-fading channel,…
▽ More
Future autonomous systems require wireless connectivity able to support extremely stringent requirements on both latency and reliability. In this paper, we leverage recent developments in the field of finite-blocklength information theory to illustrate how to optimally design wireless systems in the presence of such stringent constraints. Focusing on a multi-antenna Rayleigh block-fading channel, we obtain bounds on the maximum number of bits that can be transmitted within given bandwidth, latency, and reliability constraints, using an orthogonal frequency-division multiplexing system similar to LTE. These bounds unveil the fundamental interplay between latency, bandwidth, rate, and reliability. Furthermore, they suggest how to optimally use the available spatial and frequency diversity. Finally, we use our bounds to benchmark the performance of an actual coding scheme involving the transmission of short packets.
△ Less
Submitted 26 November, 2016;
originally announced November 2016.
-
Finite-SNR Bounds on the Sum-Rate Capacity of Rayleigh Block-Fading Multiple-Access Channels with no a Priori CSI
Authors:
Rahul Devassy,
Giuseppe Durisi,
Johan Östman,
Wei Yang,
Tome Eftimov,
Zoran Utkovski
Abstract:
We provide nonasymptotic upper and lower bounds on the sum-rate capacity of Rayleigh block-fading multiple-access channels for the setup where a priori channel state information is not available. The upper bound relies on a dual formula for channel capacity and on the assumption that the users can cooperate perfectly. The lower bound is derived assuming a noncooperative scenario, where each user e…
▽ More
We provide nonasymptotic upper and lower bounds on the sum-rate capacity of Rayleigh block-fading multiple-access channels for the setup where a priori channel state information is not available. The upper bound relies on a dual formula for channel capacity and on the assumption that the users can cooperate perfectly. The lower bound is derived assuming a noncooperative scenario, where each user employs unitary space-time modulation (independently from the other users). Numerical results show that the gap between the upper and the lower bound is small already at moderate SNR values. This suggests that the sum-rate capacity gains obtainable through user cooperation are minimal.
△ Less
Submitted 9 August, 2015; v1 submitted 8 January, 2015;
originally announced January 2015.
-
Short-Packet Communications over Multiple-Antenna Rayleigh-Fading Channels
Authors:
Giuseppe Durisi,
Tobias Koch,
Johan Östman,
Yury Polyanskiy,
Wei Yang
Abstract:
Motivated by the current interest in ultra-reliable, low-latency, machine-type communication systems, we investigate the tradeoff between reliability, throughput, and latency in the transmission of information over multiple-antenna Rayleigh block-fading channels. Specifically, we obtain finite-blocklength, finite-SNR upper and lower bounds on the maximum coding rate achievable over such channels f…
▽ More
Motivated by the current interest in ultra-reliable, low-latency, machine-type communication systems, we investigate the tradeoff between reliability, throughput, and latency in the transmission of information over multiple-antenna Rayleigh block-fading channels. Specifically, we obtain finite-blocklength, finite-SNR upper and lower bounds on the maximum coding rate achievable over such channels for a given constraint on the packet error probability. Numerical evidence suggests that our bounds delimit tightly the maximum coding rate already for short blocklengths (packets of about 100 symbols). Furthermore, our bounds reveal the existence of a tradeoff between the rate gain obtainable by spreading each codeword over all available time-frequency-spatial degrees of freedom, and the rate loss caused by the need of estimating the fading coefficients over these degrees of freedom. In particular, our bounds allow us to determine the optimal number of transmit antennas and the optimal number of time-frequency diversity branches that maximize the rate. Finally, we show that infinite-blocklength performance metrics such as the ergodic capacity and the outage capacity yield inaccurate throughput estimates.
△ Less
Submitted 16 December, 2015; v1 submitted 23 December, 2014;
originally announced December 2014.
-
Diversity versus Multiplexing at Finite Blocklength
Authors:
Johan Östman,
Wei Yang,
Giuseppe Durisi,
Tobias Koch
Abstract:
A finite blocklenth analysis of the diversity-multiplexing tradeoff is presented, based on nonasymptotic bounds on the maximum channel coding rate of multiple-antenna block-memoryless Rayleigh-fading channels.The bounds in this paper allow one to numerically assess for which packet size, number of antennas, and degree of channel selectivity, diversity-exploiting schemes are close to optimal, and w…
▽ More
A finite blocklenth analysis of the diversity-multiplexing tradeoff is presented, based on nonasymptotic bounds on the maximum channel coding rate of multiple-antenna block-memoryless Rayleigh-fading channels.The bounds in this paper allow one to numerically assess for which packet size, number of antennas, and degree of channel selectivity, diversity-exploiting schemes are close to optimal, and when instead the available spatial degrees of freedom should be used to provide spatial multiplexing. This finite blocklength view on the diversity-multiplexing tradeoff provides insights on the design of delay-sensitive ultra-reliable communication links.
△ Less
Submitted 27 June, 2014;
originally announced June 2014.