4 research outputs found
Blind MIMOME Wiretap Channel with Delayed CSIT
We study the Gaussian MIMOME wiretap channel where a transmitter wishes to
communicate a confidential message to a legitimate receiver in the presence of
eavesdroppers, while the eavesdroppers should not be able to decode the
confidential message. Each node in the network is equipped with arbitrary
number of antennas. Furthermore, channels are time varying, and there is no
channel state information available at the transmitter (CSIT) with respect to
eavesdroppers' channels; and transmitter only has access to delayed CSIT of the
channel to the legitimate receiver. The secure degrees of freedom (SDoF) for
such network has only been characterized for special cases, and is unknown in
general. We completely characterize the SDoF of this network for all antenna
configurations. In particular, we strictly improve the state-of-the-art
achievable scheme for this network by proposing more efficient artificial noise
alignment at the receivers. Furthermore, we develop a tight upper bound by
utilizing 4 important inequalities that provide lower bounds on the received
signal dimensions at receivers which supply delayed CSIT or no CSIT, or at a
collection of receivers where some supply no CSIT. These inequalities together
allow for analysis of signal dimensions in networks with asymmetric CSIT; and
as a result, we present a converse proof that leads to characterization of SDoF
for all possible antenna configurations.Comment: This work has been presented in part at the IEEE International
Symposium on Information Theory 2014 and IEEE Globecom 201
Throughput Region of Spatially Correlated Interference Packet Networks
In multi-user wireless packet networks interference, typically modeled as
packet collision, is the throughput bottleneck. Users become aware of the
interference pattern via feedback and use this information for contention
resolution and for packet retransmission. Conventional random access protocols
interrupt communication to resolve contention which reduces network throughput
and increases latency and power consumption. In this work we take a different
approach and we develop opportunistic random access protocols rather than
pursuing conventional methods. We allow wireless nodes to communicate without
interruption and to observe the interference pattern. We then use this
interference pattern knowledge and channel statistics to counter the negative
impact of interference. We prove the optimality of our protocols using an
extremal rank-ratio inequality. An important part of our contributions is the
integration of spatial correlation in our assumptions and results. We identify
spatial correlation regimes in which inherently outdated feedback becomes as
good as idealized instantaneous feedback, and correlation regimes in which
feedback does not provide any throughput gain. To better illustrate the
results, and as an intermediate step, we characterize the capacity region of
finite-field spatially correlated interference channels with delayed channel
state information at the transmitters.Comment: Accepted for publication in IEEE Transactions on Information Theor
Secure Degrees of Freedom of One-hop Wireless Networks with No Eavesdropper CSIT
We consider three channel models: the wiretap channel with helpers, the
-user multiple access wiretap channel, and the -user interference channel
with an external eavesdropper, when no eavesdropper's channel state information
(CSI) is available at the transmitters. In each case, we establish the optimal
sum secure degrees of freedom (s.d.o.f.) by providing achievable schemes and
matching converses. We show that the unavailability of the eavesdropper's CSIT
does not reduce the s.d.o.f. of the wiretap channel with helpers. However,
there is loss in s.d.o.f. for both the multiple access wiretap channel and the
interference channel with an external eavesdropper. In particular, we show that
in the absence of eavesdropper's CSIT, the -user multiple access wiretap
channel reduces to a wiretap channel with helpers from a sum s.d.o.f.
perspective, and the optimal sum s.d.o.f. reduces from
to . For the interference channel with
an external eavesdropper, the optimal sum s.d.o.f. decreases from
to in the absence of the eavesdropper's
CSIT. Our results show that the lack of eavesdropper's CSIT does not have a
significant impact on the optimal s.d.o.f. for any of the three channel models,
especially when the number of users is large. This implies that physical layer
security can be made robust to the unavailability of eavesdropper CSIT at high
signal to noise ratio (SNR) regimes by careful modification of the achievable
schemes as demonstrated in this paper.Comment: Submitted to IEEE Transactions on Information Theory, June 201
MISO Broadcast Channel with Hybrid CSIT: Beyond Two Users
We study the impact of heterogeneity of channel-state-information available
at the transmitters (CSIT) on the capacity of broadcast channels with a
multiple-antenna transmitter and single-antenna receivers (MISO BC). In
particular, we consider the -user MISO BC, where the CSIT with respect to
each receiver can be either instantaneous/perfect, delayed, or not available;
and we study the impact of this heterogeneity of CSIT on the degrees-of-freedom
(DoF) of such network. We first focus on the -user MISO BC; and we
completely characterize the DoF region for all possible heterogeneous CSIT
configurations, assuming linear encoding strategies at the transmitters. The
result shows that the state-of-the-art achievable schemes in the literature are
indeed sum-DoF optimal, when restricted to linear encoding schemes. To prove
the result, we develop a novel bound, called Interference Decomposition Bound,
which provides a lower bound on the interference dimension at a receiver which
supplies delayed CSIT based on the average dimension of constituents of that
interference, thereby decomposing the interference into its individual
components. Furthermore, we extend our outer bound on the DoF region to the
general -user MISO BC, and demonstrate that it leads to an approximate
characterization of linear sum-DoF to within an additive gap of for a
broad range of CSIT configurations. Moreover, for the special case where only
one receiver supplies delayed CSIT, we completely characterize the linear
sum-DoF.Comment: submitted to IEEE Transactions on Information Theory; shorter version
will be presented at IEEE ISIT, 201