-
Information-Theoretic Privacy-Preserving Schemes Based On Perfect Privacy
Authors:
Borzoo Rassouli,
Deniz Gündüz
Abstract:
Consider a pair of random variables $(X,Y)$ distributed according to a given joint distribution $p_{XY}$. A curator wishes to maximally disclose information about $Y$, while limiting the information leakage incurred on $X$. Adopting mutual information to measure both utility and privacy of this information disclosure, the problem is to maximize $I(Y;U)$, subject to $I(X;U)\leqε$, where $U$ denotes…
▽ More
Consider a pair of random variables $(X,Y)$ distributed according to a given joint distribution $p_{XY}$. A curator wishes to maximally disclose information about $Y$, while limiting the information leakage incurred on $X$. Adopting mutual information to measure both utility and privacy of this information disclosure, the problem is to maximize $I(Y;U)$, subject to $I(X;U)\leqε$, where $U$ denotes the released random variable and $ε$ is a given privacy threshold. Two settings are considered, where in the first one, the curator has access to $(X,Y)$, and hence, the optimization is over $p_{U|XY}$, while in the second one, the curator can only observe $Y$ and the optimization is over $p_{U|Y}$. In both settings, the utility-privacy trade-off is investigated from theoretical and practical perspective. More specifically, several privacy-preserving schemes are proposed in these settings based on generalizing the notion of statistical independence. Moreover, closed-form solutions are provided in certain scenarios. Finally, convexity arguments are provided for the utility-privacy trade-off as functionals of the joint distribution $p_{XY}$.
△ Less
Submitted 27 January, 2023;
originally announced January 2023.
-
Privacy Against Inference Attacks in Vertical Federated Learning
Authors:
Borzoo Rassouli,
Morteza Varasteh,
Deniz Gunduz
Abstract:
Vertical federated learning is considered, where an active party, having access to true class labels, wishes to build a classification model by utilizing more features from a passive party, which has no access to the labels, to improve the model accuracy. In the prediction phase, with logistic regression as the classification model, several inference attack techniques are proposed that the adversa…
▽ More
Vertical federated learning is considered, where an active party, having access to true class labels, wishes to build a classification model by utilizing more features from a passive party, which has no access to the labels, to improve the model accuracy. In the prediction phase, with logistic regression as the classification model, several inference attack techniques are proposed that the adversary, i.e., the active party, can employ to reconstruct the passive party's features, regarded as sensitive information. These attacks, which are mainly based on a classical notion of the center of a set, i.e., the Chebyshev center, are shown to be superior to those proposed in the literature. Moreover, several theoretical performance guarantees are provided for the aforementioned attacks. Subsequently, we consider the minimum amount of information that the adversary needs to fully reconstruct the passive party's features. In particular, it is shown that when the passive party holds one feature, and the adversary is only aware of the signs of the parameters involved, it can perfectly reconstruct that feature when the number of predictions is large enough. Next, as a defense mechanism, a privacy-preserving scheme is proposed that worsen the adversary's reconstruction attacks, while preserving the full benefits that VFL brings to the active party. Finally, experimental results demonstrate the effectiveness of the proposed attacks and the privacy-preserving scheme.
△ Less
Submitted 7 September, 2022; v1 submitted 24 July, 2022;
originally announced July 2022.
-
An operational information decomposition via synergistic disclosure
Authors:
Fernando Rosas,
Pedro Mediano,
Borzoo Rassouli,
Adam Barrett
Abstract:
Multivariate information decompositions hold promise to yield insight into complex systems, and stand out for their ability to identify synergistic phenomena. However, the adoption of these approaches has been hindered by there being multiple possible decompositions, and no precise guidance for preferring one over the others. At the heart of this disagreement lies the absence of a clear operationa…
▽ More
Multivariate information decompositions hold promise to yield insight into complex systems, and stand out for their ability to identify synergistic phenomena. However, the adoption of these approaches has been hindered by there being multiple possible decompositions, and no precise guidance for preferring one over the others. At the heart of this disagreement lies the absence of a clear operational interpretation of what synergistic information is. Here we fill this gap by proposing a new information decomposition based on a novel operationalisation of informational synergy, which leverages recent developments in the literature of data privacy. Our decomposition is defined for any number of information sources, and its atoms can be calculated using elementary optimisation techniques. The decomposition provides a natural coarse-graining that scales gracefully with the system's size, and is applicable in a wide range of scenarios of practical interest.
△ Less
Submitted 13 March, 2020; v1 submitted 28 January, 2020;
originally announced January 2020.
-
Data Disclosure under Perfect Sample Privacy
Authors:
Borzoo Rassouli,
Fernando E. Rosas,
Deniz Gunduz
Abstract:
Perfect data privacy seems to be in fundamental opposition to the economical and scientific opportunities associated with extensive data exchange. Defying this intuition, this paper develops a framework that allows the disclosure of collective properties of datasets without compromising the privacy of individual data samples. We present an algorithm to build an optimal disclosure strategy/map**,…
▽ More
Perfect data privacy seems to be in fundamental opposition to the economical and scientific opportunities associated with extensive data exchange. Defying this intuition, this paper develops a framework that allows the disclosure of collective properties of datasets without compromising the privacy of individual data samples. We present an algorithm to build an optimal disclosure strategy/map**, and discuss it fundamental limits on finite and asymptotically large datasets. Furthermore, we present explicit expressions to the asymptotic performance of this scheme in some scenarios, and study cases where our approach attains maximal efficiency. We finally discuss suboptimal schemes to provide sample privacy guarantees to large datasets with a reduced computational cost.
△ Less
Submitted 2 April, 2019;
originally announced April 2019.
-
Privacy Against Brute-Force Inference Attacks
Authors:
Seyed Ali Osia,
Borzoo Rassouli,
Hamed Haddadi,
Hamid R. Rabiee,
Deniz Gündüz
Abstract:
Privacy-preserving data release is about disclosing information about useful data while retaining the privacy of sensitive data. Assuming that the sensitive data is threatened by a brute-force adversary, we define Guessing Leakage as a measure of privacy, based on the concept of guessing. After investigating the properties of this measure, we derive the optimal utility-privacy trade-off via a line…
▽ More
Privacy-preserving data release is about disclosing information about useful data while retaining the privacy of sensitive data. Assuming that the sensitive data is threatened by a brute-force adversary, we define Guessing Leakage as a measure of privacy, based on the concept of guessing. After investigating the properties of this measure, we derive the optimal utility-privacy trade-off via a linear program with any $f$-information adopted as the utility measure, and show that the optimal utility is a concave and piece-wise linear function of the privacy-leakage budget.
△ Less
Submitted 1 February, 2019;
originally announced February 2019.
-
SWIPT Signalling over Frequency-Selective Channels with a Nonlinear Energy Harvester: Non-Zero Mean and Asymmetric Inputs
Authors:
Morteza Varasteh,
Borzoo Rassouli,
Bruno Clerckx
Abstract:
Simultaneous Wireless Information and Power Transfer (SWIPT) over a point-to-point frequency-selective Additive White Gaussian Noise (AWGN) channel is studied. Considering an approximation of the nonlinearity of the harvester, a general form of delivered power in terms of system baseband parameters is derived, which demonstrates the dependency of the delivered power on higher order moment of the b…
▽ More
Simultaneous Wireless Information and Power Transfer (SWIPT) over a point-to-point frequency-selective Additive White Gaussian Noise (AWGN) channel is studied. Considering an approximation of the nonlinearity of the harvester, a general form of delivered power in terms of system baseband parameters is derived, which demonstrates the dependency of the delivered power on higher order moment of the baseband channel input distribution. The optimization problem of maximizing Rate-Power (RP) region is studied. Assuming that the Channel State Information (CSI) is available at both the receiver and the transmitter, and constraining to non-zero mean Gaussian input distributions, an optimization algorithm for power allocation among different subchannels is studied. As a special case, optimality conditions for zero mean Gaussian inputs are derived. Results obtained from numerical optimization demonstrate the superiority of non-zero mean Gaussian inputs (with asymmetric power allocation in each complex subchannel) in yielding a larger RP region compared to their zero mean and non-zero mean (with symmetric power allocation in each complex subchannel) counterparts. This severely contrasts with SWIPT design under linear energy harvesting, for which circularly symmetric Gaussian inputs are optimal.
△ Less
Submitted 7 January, 2019;
originally announced January 2019.
-
SWIPT Signalling over Complex AWGN Channels with Two Nonlinear Energy Harvester Models
Authors:
Morteza Varasteh,
Borzoo Rassouli,
Hamdi Joudeh,
Bruno Clerckx
Abstract:
Simultaneous Wireless Information and Power Transfer (SWIPT) is subject to nonlinearity at the energy harvester that leads to significant changes to transmit signal designs compared to conventional wireless communications. In this paper, the capacity of a discrete time, memoryless and complex Additive White Gaussian Noise (AWGN) channel in the presence of a nonlinear energy harvester at the receiv…
▽ More
Simultaneous Wireless Information and Power Transfer (SWIPT) is subject to nonlinearity at the energy harvester that leads to significant changes to transmit signal designs compared to conventional wireless communications. In this paper, the capacity of a discrete time, memoryless and complex Additive White Gaussian Noise (AWGN) channel in the presence of a nonlinear energy harvester at the receiver is studied. Considering the two common nonlinear energy harvester models introduced in the literature, two sets of constraints are considered. First the capacity is studied under average power (AP), peak amplitude (PA) and receiver delivery power (RDP) constraints. The RDP constraint is modelled as a linear combination of even-moment statistics of the channel input being larger than a threshold. It is shown that the capacity of an AWGN channel under AP and RDP constraints is the same as the capacity of an AWGN channel under an AP constraint, however, depending on the two constraints, it can be either achieved or arbitrarily approached. It is also shown that under AP, PA and RDP constraints, the amplitude of the optimal inputs is discrete with a finite number of mass points. Next, the capacity is studied under AP, PA and output outage probability (OOP) constraints. OOP is modelled as satisfying a certain probability inequality for the amplitude of the received signal being outside of a given interval. Similarly, it is shown that the amplitude of the optimal input is discrete with a finite number of mass points.
△ Less
Submitted 9 May, 2018;
originally announced May 2018.
-
Optimal Utility-Privacy Trade-off with Total Variation Distance as a Privacy Measure
Authors:
Borzoo Rassouli,
Deniz Gündüz
Abstract:
The total variation distance is proposed as a privacy measure in an information disclosure scenario when the goal is to reveal some information about available data in return of utility, while retaining the privacy of certain sensitive latent variables from the legitimate receiver. The total variation distance is introduced as a measure of privacy-leakage by showing that: i) it satisfies the post-…
▽ More
The total variation distance is proposed as a privacy measure in an information disclosure scenario when the goal is to reveal some information about available data in return of utility, while retaining the privacy of certain sensitive latent variables from the legitimate receiver. The total variation distance is introduced as a measure of privacy-leakage by showing that: i) it satisfies the post-processing and linkage inequalities, which makes it consistent with an intuitive notion of a privacy measure; ii) the optimal utility-privacy trade-off can be solved through a standard linear program when total variation distance is employed as the privacy measure; iii) it provides a bound on the privacy-leakage measured by mutual information, maximal leakage, or the improvement in an inference attack with a bounded cost function.
△ Less
Submitted 4 March, 2019; v1 submitted 5 January, 2018;
originally announced January 2018.
-
On Perfect Privacy
Authors:
Borzoo Rassouli,
Deniz Gunduz
Abstract:
The problem of private data disclosure is studied from an information theoretic perspective. Considering a pair of dependent random variables $(X,Y)$, where $X$ and $Y$ denote the private and useful data, respectively, the following problem is addressed: What is the maximum information that can be revealed about $Y$ (measured by mutual information $I(Y;U)$, in which $U$ is the revealed data), whil…
▽ More
The problem of private data disclosure is studied from an information theoretic perspective. Considering a pair of dependent random variables $(X,Y)$, where $X$ and $Y$ denote the private and useful data, respectively, the following problem is addressed: What is the maximum information that can be revealed about $Y$ (measured by mutual information $I(Y;U)$, in which $U$ is the revealed data), while disclosing no information about $X$ (captured by the condition of statistical independence, i.e., $X\independent U$, and henceforth, called \textit{perfect privacy})? We analyze the supremization of \textit{utility}, i.e., $I(Y;U)$ under the condition of perfect privacy for two scenarios: \textit{output perturbation} and \textit{full data observation} models, which correspond to the cases where a Markov kernel, called \textit{privacy-preserving map**}, applies to $Y$ and the pair $(X,Y)$, respectively. When both $X$ and $Y$ have a finite alphabet, the linear algebraic analysis involved in the solution provides some interesting results, such as upper/lower bounds on the size of the released alphabet and the maximum utility. Afterwards, it is shown that for the jointly Gaussian $(X,Y)$, perfect privacy is not possible in the output perturbation model in contrast to the full data observation model. Finally, an asymptotic analysis is provided to obtain the rate of released information when a sufficiently small leakage is allowed. In particular, in the context of output perturbation model, it is shown that this rate is always finite when perfect privacy is not feasible, and two lower bounds are provided for it; When perfect privacy is feasible, it is shown that under mild conditions, this rate becomes unbounded.
△ Less
Submitted 21 January, 2021; v1 submitted 22 December, 2017;
originally announced December 2017.
-
On Capacity-Achieving Distributions for Complex AWGN Channels Under Nonlinear Power Constraints and their Applications to SWIPT
Authors:
Morteza Varasteh,
Borzoo Rassouli,
Bruno Clerckx
Abstract:
The capacity of a complex and discrete-time memoryless additive white Gaussian noise (AWGN) channel under three constraints, namely, input average power, input amplitude and output delivered power is studied. The output delivered power constraint is modelled as the average of linear combination of even moments of the channel input being larger than a threshold. It is shown that the capacity of an…
▽ More
The capacity of a complex and discrete-time memoryless additive white Gaussian noise (AWGN) channel under three constraints, namely, input average power, input amplitude and output delivered power is studied. The output delivered power constraint is modelled as the average of linear combination of even moments of the channel input being larger than a threshold. It is shown that the capacity of an AWGN channel under transmit average power and receiver delivered power constraints is the same as the capacity of an AWGN channel under an average power constraint. However, depending on the two constraints, the capacity can be either achieved by a Gaussian distribution or arbitrarily approached by using time-sharing between a Gaussian distribution and On-Off Keying. As an application, a simultaneous wireless information and power transfer (SWIPT) problem is studied, where an experimentally-validated nonlinear model of the harvester is used. It is shown that the delivered power depends on higher order moments of the channel input. Two inner bounds, one based on complex Gaussian inputs and the other based on further restricting the delivered power are obtained for the Rate-Power (RP) region. For Gaussian inputs, the optimal inputs are zero mean and a tradeoff between transmitted information and delivered power is recognized by considering asymmetric power allocations between inphase and quadrature subchannels. Through numerical algorithms, it is observed that input distributions (obtained by restricting the delivered power) attain larger RP region compared to Gaussian input counterparts.
△ Less
Submitted 24 April, 2020; v1 submitted 4 December, 2017;
originally announced December 2017.
-
Wireless Information and Power Transfer over an AWGN channel: Nonlinearity and Asymmetric Gaussian Signaling
Authors:
Morteza Varasteh,
Borzoo Rassouli,
Bruno Clerckx
Abstract:
Simultaneous transmission of information and power over a point-to-point flat-fading complex Additive White Gaussian Noise (AWGN) channel is studied. In contrast with the literature that relies on an inaccurate linear model of the energy harvester, an experimentally-validated nonlinear model is considered. A general form of the delivered Direct Current (DC) power in terms of system baseband parame…
▽ More
Simultaneous transmission of information and power over a point-to-point flat-fading complex Additive White Gaussian Noise (AWGN) channel is studied. In contrast with the literature that relies on an inaccurate linear model of the energy harvester, an experimentally-validated nonlinear model is considered. A general form of the delivered Direct Current (DC) power in terms of system baseband parameters is derived, which demonstrates the dependency of the delivered DC power on higher order statistics of the channel input distribution. The optimization problem of maximizing Rate-Power (R-P) region is studied. Assuming that the Channel gain is available at both the receiver and the transmitter, and constraining to independent and identically distributed (i.i.d.) channel inputs determined only by their first and second moment statistics, an inner bound for the general problem is obtained. Notably, as a consequence of the harvester nonlinearity, the studied inner bound exhibits a tradeoff between the delivered power and the rate of received information. It is shown that the tradeoff-characterizing input distribution is with mean zero and with asymmetric power allocations to the real and imaginary dimensions.
△ Less
Submitted 31 May, 2017; v1 submitted 17 May, 2017;
originally announced May 2017.
-
Gaussian Multiple Access Channels with One-Bit Quantizer at the Receiver
Authors:
Borzoo Rassouli,
Morteza Varasteh,
Deniz Gunduz
Abstract:
The capacity region of a two-transmitter Gaussian multiple access channel (MAC) under average input power constraints is studied, when the receiver employs a zero-threshold one-bit analog-to-digital converter (ADC). It is proved that the input distributions of the two transmitters that achieve the boundary points of the capacity region are discrete. Based on the position of a boundary point, upper…
▽ More
The capacity region of a two-transmitter Gaussian multiple access channel (MAC) under average input power constraints is studied, when the receiver employs a zero-threshold one-bit analog-to-digital converter (ADC). It is proved that the input distributions of the two transmitters that achieve the boundary points of the capacity region are discrete. Based on the position of a boundary point, upper bounds on the number of the mass points of the corresponding distributions are derived.
△ Less
Submitted 1 October, 2017; v1 submitted 7 March, 2017;
originally announced March 2017.
-
Zero-Delay Source-Channel Coding with a One-Bit ADC Front End and Correlated Side Information at the Receiver
Authors:
Morteza Varasteh,
Borzoo Rassouli,
Osvaldo Simeone,
Deniz Gunduz
Abstract:
Zero-delay transmission of a Gaussian source over an additive white Gaussian noise (AWGN) channel is considered with a one-bit analog-to-digital converter (ADC) front end and a correlated side information at the receiver. The design of the optimal encoder and decoder is studied for two performance criteria, namely, the mean squared error (MSE) distortion and the distortion outage probability (DOP)…
▽ More
Zero-delay transmission of a Gaussian source over an additive white Gaussian noise (AWGN) channel is considered with a one-bit analog-to-digital converter (ADC) front end and a correlated side information at the receiver. The design of the optimal encoder and decoder is studied for two performance criteria, namely, the mean squared error (MSE) distortion and the distortion outage probability (DOP), under an average power constraint on the channel input. For both criteria, necessary optimality conditions for the encoder and the decoder are derived. Using these conditions, it is observed that the numerically optimized encoder (NOE) under the MSE distortion criterion is periodic, and its period increases with the correlation between the source and the receiver side information. For the DOP, it is instead seen that the NOE map**s periodically acquire positive and negative values, which decay to zero with increasing source magnitude, and the interval over which the map** takes non-zero values, becomes wider with the correlation between the source and the side information.
△ Less
Submitted 17 December, 2019; v1 submitted 3 March, 2017;
originally announced March 2017.
-
Constant Envelope Signaling in MIMO Channels
Authors:
Borzoo Rassouli,
Bruno Clerckx
Abstract:
The capacity of the point-to-point vector Gaussian channel under the peak power constraint is not known in general. This paper considers a simpler scenario in which the input signal vector is forced to have a constant envelope (or norm). The capacity-achieving distribution for the non-identity $2\times 2$ MIMO channel when the input vector lies on a circle in $\mathbb{R}^2$ is obtained and is show…
▽ More
The capacity of the point-to-point vector Gaussian channel under the peak power constraint is not known in general. This paper considers a simpler scenario in which the input signal vector is forced to have a constant envelope (or norm). The capacity-achieving distribution for the non-identity $2\times 2$ MIMO channel when the input vector lies on a circle in $\mathbb{R}^2$ is obtained and is shown to have a finite number of mass points on the circle. Subsequently, it is shown that the degrees of freedom (DoF) of a full-rank $n$ by $n$ channel with constant envelope signaling is $n-1$ and it can be achieved by a uniform distribution over the surface of the hypersphere whose radius is defined by the constant envelope. Finally, for the 2 by 2 channel, the power allocation scheme of the constant envelope signaling is compared with that of the conventional case, in which the constraint is on the average transmitted power. It is observed that when the condition number of the channel is close to one, both schemes have a similar trend while this is not the case as the condition number grows.
△ Less
Submitted 12 May, 2016;
originally announced May 2016.
-
An Upper Bound for the Capacity of Amplitude-Constrained Scalar AWGN Channel
Authors:
Borazon Rassouli,
Bruno Clerckx
Abstract:
This paper slightly improves the upper bound in Thangaraj et al. for the capacity of the amplitude-constrained scalar AWGN channel. This improvement makes the upper bound within 0.002 bits of the capacity for $\frac{E_b}{N_0}\leq 2.5$ dB.
This paper slightly improves the upper bound in Thangaraj et al. for the capacity of the amplitude-constrained scalar AWGN channel. This improvement makes the upper bound within 0.002 bits of the capacity for $\frac{E_b}{N_0}\leq 2.5$ dB.
△ Less
Submitted 4 May, 2016;
originally announced May 2016.
-
Joint Source-Channel Coding with One-Bit ADC Front End
Authors:
Morteza Varasteh,
Borzoo Rassouli,
Osvaldo Simeone,
Deniz Gunduz
Abstract:
Motivated by the practical constraints arising in emerging sensor network and Internet-of-Things (IoT) applications, the zero-delay transmission of a Gaussian measurement over a real single-input multiple-output (SIMO) additive white Gaussian noise (AWGN) channel is studied with a low-resolution analog-to-digital converter (ADC) front end. Joint optimization of the encoder and the decoder map**…
▽ More
Motivated by the practical constraints arising in emerging sensor network and Internet-of-Things (IoT) applications, the zero-delay transmission of a Gaussian measurement over a real single-input multiple-output (SIMO) additive white Gaussian noise (AWGN) channel is studied with a low-resolution analog-to-digital converter (ADC) front end. Joint optimization of the encoder and the decoder map** is tackled under both the mean squared error (MSE) distortion and the distortion outage probability (DOP) criteria, with an average power constraint on the channel input. Optimal encoder and decoder map**s are identified for a one-bit ADC front end under both criteria. For the MSE distortion, the optimal encoder map** is shown to be non-linear in general, while it tends to a linear encoder in the low signal-to-noise ratio (SNR) regime, and to an antipodal digital encoder in the high SNR regime. This is in contrast to the optimality of linear encoding at all SNR values in the presence of a full-precision front end. For the DOP criterion, it is shown that the optimal encoder map** is piecewise constant and can take only two opposite values when it is non-zero. For both the MSE distortion and the DOP criteria, necessary optimality conditions are then derived for $K$-level ADC front ends as well as front ends with multiple one-bit ADCs. These conditions are used to obtain numerically optimized solutions. Extensive numerical results are also provided in order to gain insights into the structure of the optimal encoding and decoding map**s.
△ Less
Submitted 31 May, 2017; v1 submitted 22 April, 2016;
originally announced April 2016.
-
Achievable DoF Regions of MIMO Networks with Imperfect CSIT
Authors:
Chenxi Hao,
Borzoo Rassouli,
Bruno Clerckx
Abstract:
We focus on a two-receiver Multiple-Input-Multiple-Output (MIMO) Broadcast Channel (BC) and Interference Channel (IC) with an arbitrary number of antennas at each node. We assume an imperfect knowledge of local Channel State Information at the Transmitters (CSIT), whose error decays with the Signal-to-Noise-Ratio. With such configuration, we characterize the achievable Degrees-of-Freedom (DoF) reg…
▽ More
We focus on a two-receiver Multiple-Input-Multiple-Output (MIMO) Broadcast Channel (BC) and Interference Channel (IC) with an arbitrary number of antennas at each node. We assume an imperfect knowledge of local Channel State Information at the Transmitters (CSIT), whose error decays with the Signal-to-Noise-Ratio. With such configuration, we characterize the achievable Degrees-of-Freedom (DoF) regions in both BC and IC, by proposing a Rate-Splitting approach, which divides each receiver's message into a common part and a private part. Compared to the RS scheme designed for the symmetric MIMO case, this scheme is suitable for the general asymmetric deployment with an arbitrary number of antennas at each node. In BC, the proposed block 1) employs an unequal power allocation to the private messages of the two receivers, 2) exploits the benefit of having an extra spatial dimension at one receiver, and 3) is carried out with a Space-Time transmission. These features enable the scheme to yield a greater DoF region than trivially extending the scheme designed for the symmetric case. In IC, we modify the scheme proposed for the BC case by applying a linear transformation to the channel matrices. Such a linear transformation allows us to identify the signal space where the two transmitted signals interfere with each other and propose a proper power allocation policy. The achievable DoF regions are shown to be optimal for some antenna configurations.
△ Less
Submitted 5 June, 2017; v1 submitted 24 March, 2016;
originally announced March 2016.
-
Rate Splitting for MIMO Wireless Networks: A Promising PHY-Layer Strategy for LTE Evolution
Authors:
Bruno Clerckx,
Hamdi Joudeh,
Chenxi Hao,
Mingbo Dai,
Borzoo Rassouli
Abstract:
MIMO processing plays a central part towards the recent increase in spectral and energy efficiencies of wireless networks. MIMO has grown beyond the original point-to-point channel and nowadays refers to a diverse range of centralized and distributed deployments. The fundamental bottleneck towards enormous spectral and energy efficiency benefits in multiuser MIMO networks lies in a huge demand for…
▽ More
MIMO processing plays a central part towards the recent increase in spectral and energy efficiencies of wireless networks. MIMO has grown beyond the original point-to-point channel and nowadays refers to a diverse range of centralized and distributed deployments. The fundamental bottleneck towards enormous spectral and energy efficiency benefits in multiuser MIMO networks lies in a huge demand for accurate channel state information at the transmitter (CSIT). This has become increasingly difficult to satisfy due to the increasing number of antennas and access points in next generation wireless networks relying on dense heterogeneous networks and transmitters equipped with a large number of antennas. CSIT inaccuracy results in a multi-user interference problem that is the primary bottleneck of MIMO wireless networks. Looking backward, the problem has been to strive to apply techniques designed for perfect CSIT to scenarios with imperfect CSIT. In this paper, we depart from this conventional approach and introduce the readers to a promising strategy based on rate-splitting. Rate-splitting relies on the transmission of common and private messages and is shown to provide significant benefits in terms of spectral and energy efficiencies, reliability and CSI feedback overhead reduction over conventional strategies used in LTE-A and exclusively relying on private message transmissions. Open problems, impact on standard specifications and operational challenges are also discussed.
△ Less
Submitted 3 March, 2016;
originally announced March 2016.
-
DoF Analysis of the MIMO Broadcast Channel with Alternating/Hybrid CSIT
Authors:
Borzoo Rassouli,
Chenxi Hao,
Bruno Clerckx
Abstract:
We consider a $K$-user multiple-input single-output (MISO) broadcast channel (BC) where the channel state information (CSI) of user $i(i=1,2,\ldots,K)$ may be instantaneously perfect (P), delayed (D) or not known (N) at the transmitter with probabilities $λ_P^i$, $λ_D^i$ and $λ_N^i$, respectively. In this setting, according to the three possible CSIT for each user, knowledge of the joint CSIT of t…
▽ More
We consider a $K$-user multiple-input single-output (MISO) broadcast channel (BC) where the channel state information (CSI) of user $i(i=1,2,\ldots,K)$ may be instantaneously perfect (P), delayed (D) or not known (N) at the transmitter with probabilities $λ_P^i$, $λ_D^i$ and $λ_N^i$, respectively. In this setting, according to the three possible CSIT for each user, knowledge of the joint CSIT of the $K$ users could have at most $3^K$ states. In this paper, given the marginal probabilities of CSIT (i.e., $λ_P^i$, $λ_D^i$ and $λ_N^i$), we derive an outer bound for the DoF region of the $K$-user MISO BC. Subsequently, we tighten this outer bound by taking into account a set of inequalities that capture some of the $3^K$ states of the joint CSIT. One of the consequences of this set of inequalities is that for $K\geq3$, it is shown that the DoF region is not completely characterized by the marginal probabilities in contrast to the two-user case. Afterwards, the tightness of these bounds are investigated through the discussion on the achievability. Finally, a two user MIMO BC having CSIT among P and N is considered in which an outer bound for the DoF region is provided and it is shown that in some scenarios it is tight.
△ Less
Submitted 27 January, 2016;
originally announced January 2016.
-
DoF Analysis of the K-user MISO Broadcast Channel with Hybrid CSIT
Authors:
Borzoo Rassouli,
Chenxi Hao,
Bruno Clerckx
Abstract:
We consider a $K$-user multiple-input single-output (MISO) broadcast channel (BC) where the channel state information (CSI) of user $i(i=1,2,\ldots,K)$ may be either instantaneously perfect (P), delayed (D) or not known (N) at the transmitter with probabilities $λ_P^i$, $λ_D^i$ and $λ_N^i$, respectively. In this setting, according to the three possible CSIT for each user, knowledge of the joint CS…
▽ More
We consider a $K$-user multiple-input single-output (MISO) broadcast channel (BC) where the channel state information (CSI) of user $i(i=1,2,\ldots,K)$ may be either instantaneously perfect (P), delayed (D) or not known (N) at the transmitter with probabilities $λ_P^i$, $λ_D^i$ and $λ_N^i$, respectively. In this setting, according to the three possible CSIT for each user, knowledge of the joint CSIT of the $K$ users could have at most $3^K$ states. Although the results by Tandon et al. show that for the symmetric two user MISO BC (i.e., $λ_Q^i=λ_Q,\ \forall i\in \{1,2\}, Q\in \{P,D,N\}$), the Degrees of Freedom (DoF) region depends only on the marginal probabilities, we show that this interesting result does not hold in general when $K\geq3$. In other words, the DoF region is a function of all the joint probabilities. In this paper, given the marginal probabilities of CSIT, we derive an outer bound for the DoF region of the $K$-user MISO BC. Subsequently, we investigate the achievability of the outer bound in some scenarios. Finally, we show the dependence of the DoF region on the joint probabilities.
△ Less
Submitted 3 March, 2015;
originally announced March 2015.
-
A New Proof for the DoF Region of the MIMO Networks with No CSIT
Authors:
Borzoo Rassouli,
Chenxi Hao,
Bruno Clerckx
Abstract:
In this paper, a new proof for the degrees of freedom (DoF) region of the K-user multiple-input multiple-output (MIMO) broadcast channel (BC) with no channel state information at the transmitter (CSIT) and perfect channel state information at the receivers (CSIR) is provided. Based on this proof, the capacity region of a certain class of MIMO BC with channel distribution information at the transmi…
▽ More
In this paper, a new proof for the degrees of freedom (DoF) region of the K-user multiple-input multiple-output (MIMO) broadcast channel (BC) with no channel state information at the transmitter (CSIT) and perfect channel state information at the receivers (CSIR) is provided. Based on this proof, the capacity region of a certain class of MIMO BC with channel distribution information at the transmitter (CDIT) and perfect CSIR is derived. Finally, an outer bound for the DoF region of the K-user MIMO interference channel (IC) with no CSIT is provided.
△ Less
Submitted 7 January, 2015;
originally announced January 2015.
-
On the Capacity of Vector Gaussian Channels With Bounded Inputs
Authors:
Borzoo Rassouli,
Bruno Clerckx
Abstract:
The capacity of a deterministic multiple-input multiple-output (MIMO) channel under the peak and average power constraints is investigated. For the identity channel matrix, the approach of Shamai et al. is generalized to the higher dimension settings to derive the necessary and sufficient conditions for the optimal input probability density function. This approach prevents the usage of the identit…
▽ More
The capacity of a deterministic multiple-input multiple-output (MIMO) channel under the peak and average power constraints is investigated. For the identity channel matrix, the approach of Shamai et al. is generalized to the higher dimension settings to derive the necessary and sufficient conditions for the optimal input probability density function. This approach prevents the usage of the identity theorem of the holomorphic functions of several complex variables which seems to fail in the multi-dimensional scenarios. It is proved that the support of the capacity-achieving distribution is a finite set of hyper-spheres with mutual independent phases and amplitude in the spherical domain. Subsequently, it is shown that when the average power constraint is relaxed, if the number of antennas is large enough, the capacity has a closed form solution and constant amplitude signaling at the peak power achieves it. Moreover, it will be observed that in a discrete-time memoryless Gaussian channel, the average power constrained capacity, which results from a Gaussian input distribution, can be closely obtained by an input where the support of its magnitude is a discrete finite set. Finally, we investigate some upper and lower bounds for the capacity of the non-identity channel matrix and evaluate their performance as a function of the condition number of the channel.
△ Less
Submitted 28 September, 2016; v1 submitted 27 October, 2014;
originally announced October 2014.
-
A Novel Proof for the DoF Region of the MIMO Broadcast Channel with No CSIT
Authors:
Borzoo Rassouli,
Chenxi Hao,
Bruno Clerckx
Abstract:
In this paper, a new proof for the degrees of freedom (DoF) region of the K-user multiple-input multiple-output (MIMO) broadcast channel (BC) with no channel state information at the transmitter (CSIT) and perfect channel state information at the receivers (CSIR) is provided. Based on this proof, the capacity region of a certain class of MIMO BC with channel distribution information at the transmi…
▽ More
In this paper, a new proof for the degrees of freedom (DoF) region of the K-user multiple-input multiple-output (MIMO) broadcast channel (BC) with no channel state information at the transmitter (CSIT) and perfect channel state information at the receivers (CSIR) is provided. Based on this proof, the capacity region of a certain class of MIMO BC with channel distribution information at the transmitter (CDIT) and perfect CSIR is derived. Finally, an outer bound for the DoF region of the MIMO interference channel (IC) with no CSIT is provided.
△ Less
Submitted 24 January, 2014; v1 submitted 22 January, 2014;
originally announced January 2014.
-
DoF Analysis of the K-user MISO Broadcast Channel with Alternating CSIT
Authors:
Borzoo Rassouli,
Chenxi Hao,
Bruno Clerckx
Abstract:
We consider a $K$-user multiple-input single-output (MISO) broadcast channel (BC) where the channel state information (CSI) of user $i(i=1,2,\ldots,K)$ may be either perfect (P), delayed (D) or not known (N) at the transmitter with probabilities $λ_P^i$, $λ_D^i$ and $λ_N^i$, respectively. In this channel, according to the three possible CSIT for each user, joint CSIT of the $K$ users could have at…
▽ More
We consider a $K$-user multiple-input single-output (MISO) broadcast channel (BC) where the channel state information (CSI) of user $i(i=1,2,\ldots,K)$ may be either perfect (P), delayed (D) or not known (N) at the transmitter with probabilities $λ_P^i$, $λ_D^i$ and $λ_N^i$, respectively. In this channel, according to the three possible CSIT for each user, joint CSIT of the $K$ users could have at most $3^K$ realizations. Although the results by Tandon et al. show that the Degrees of Freedom (DoF) region for the two user MISO BC with symmetric marginal probabilities (i.e., $λ_Q^i=λ_Q \forall i\in \{1,2,\ldots,K\}, Q\in \{P,D,N\}$) depends only on the marginal probabilities, we show that this interesting result does not hold in general when the number of users is more than two. In other words, the DoF region is a function of the \textit{CSIT pattern}, or equivalently, all the joint probabilities. In this paper, given the marginal probabilities of CSIT, we derive an outer bound for the DoF region of the $K$-user MISO BC. Subsequently, the achievability of these outer bounds are considered in certain scenarios. Finally, we show the dependence of the DoF region on the joint probabilities.
△ Less
Submitted 26 November, 2013;
originally announced November 2013.
-
Degrees-of-Freedom Region of MISO-OFDMA Broadcast Channel with Imperfect CSIT
Authors:
Chenxi Hao,
Borzoo Rassouli,
Bruno Clerckx
Abstract:
This contribution investigates the Degrees-of-Freedom region of a two-user frequency correlated Multiple-Input-Single-Output (MISO) Broadcast Channel (BC) with imperfect Channel State Information at the transmitter (CSIT). We assume that the system consists of an arbitrary number of subbands, denoted as $L$. Besides, the CSIT state varies across users and subbands. A tight outer-bound is found as…
▽ More
This contribution investigates the Degrees-of-Freedom region of a two-user frequency correlated Multiple-Input-Single-Output (MISO) Broadcast Channel (BC) with imperfect Channel State Information at the transmitter (CSIT). We assume that the system consists of an arbitrary number of subbands, denoted as $L$. Besides, the CSIT state varies across users and subbands. A tight outer-bound is found as a function of the minimum average CSIT quality between the two users. Based on the CSIT states across the subbands, the DoF region is interpreted as a weighted sum of the optimal DoF regions in the scenarios where the CSIT of both users are perfect, alternatively perfect and not known. Inspired by the weighted-sum interpretation and identifying the benefit of the optimal scheme for the unmatched CSIT proposed by Chen et al., we also design a scheme achieving the upper-bound for the general $L$-subband scenario in frequency domain BC, thus showing the optimality of the DoF region.
△ Less
Submitted 24 October, 2013;
originally announced October 2013.