7,468 research outputs found
A New Achievable Scheme for Interference Relay Channels
We establish an achievable rate region for discrete memoryless interference
relay channels that consist of two source-destination pairs and one or more
relays. We develop an achievable scheme combining Han-Kobayashi and noisy
network coding schemes. We apply our achievability to two cases. First, we
characterize the capacity region of a class of discrete memoryless interference
relay channels. This class naturally generalizes the injective deterministic
discrete memoryless interference channel by El Gamal and Costa and the
deterministic discrete memoryless relay channel with orthogonal receiver
components by Kim. Moreover, for the Gaussian interference relay channel with
orthogonal receiver components, we show that our scheme achieves a better sum
rate than that of noisy network coding.Comment: 18 pages, 4 figure
Secrecy capacity of a class of orthogonal relay eavesdropper channels
The secrecy capacity of relay channels with orthogonal components is studied
in the presence of an additional passive eavesdropper node. The relay and
destination receive signals from the source on two orthogonal channels such
that the destination also receives transmissions from the relay on its channel.
The eavesdropper can overhear either one or both of the orthogonal channels.
Inner and outer bounds on the secrecy capacity are developed for both the
discrete memoryless and the Gaussian channel models. For the discrete
memoryless case, the secrecy capacity is shown to be achieved by a partial
decode-and-forward (PDF) scheme when the eavesdropper can overhear only one of
the two orthogonal channels. Two new outer bounds are presented for the
Gaussian model using recent capacity results for a Gaussian multi-antenna
point-to-point channel with a multi-antenna eavesdropper. The outer bounds are
shown to be tight for two sub-classes of channels. The first sub-class is one
in which the source and relay are clustered and the and the eavesdropper
receives signals only on the channel from the source and the relay to the
destination, for which the PDF strategy is optimal. The second is a sub-class
in which the source does not transmit to the relay, for which a
noise-forwarding strategy is optimal.Comment: Submitted to Eurasip Journal on Wireless Communications and
Networking special issue on Wireless physical layer security, Dec. 2008,
Revised Jun. 200
Secrecy capacity of a class of orthogonal relay eavesdropper channels
The secrecy capacity of relay channels with orthogonal components is studied
in the presence of an additional passive eavesdropper node. The relay and
destination receive signals from the source on two orthogonal channels such
that the destination also receives transmissions from the relay on its channel.
The eavesdropper can overhear either one or both of the orthogonal channels.
Inner and outer bounds on the secrecy capacity are developed for both the
discrete memoryless and the Gaussian channel models. For the discrete
memoryless case, the secrecy capacity is shown to be achieved by a partial
decode-and-forward (PDF) scheme when the eavesdropper can overhear only one of
the two orthogonal channels. Two new outer bounds are presented for the
Gaussian model using recent capacity results for a Gaussian multi-antenna
point-to-point channel with a multi-antenna eavesdropper. The outer bounds are
shown to be tight for two sub-classes of channels. The first sub-class is one
in which the source and relay are clustered and the and the eavesdropper
receives signals only on the channel from the source and the relay to the
destination, for which the PDF strategy is optimal. The second is a sub-class
in which the source does not transmit to the relay, for which a
noise-forwarding strategy is optimal.Comment: Submitted to Eurasip Journal on Wireless Communications and
Networking special issue on Wireless physical layer security, Dec. 2008,
Revised Jun. 200
Cooperation with an Untrusted Relay: A Secrecy Perspective
We consider the communication scenario where a source-destination pair wishes
to keep the information secret from a relay node despite wanting to enlist its
help. For this scenario, an interesting question is whether the relay node
should be deployed at all. That is, whether cooperation with an untrusted relay
node can ever be beneficial. We first provide an achievable secrecy rate for
the general untrusted relay channel, and proceed to investigate this question
for two types of relay networks with orthogonal components. For the first
model, there is an orthogonal link from the source to the relay. For the second
model, there is an orthogonal link from the relay to the destination. For the
first model, we find the equivocation capacity region and show that answer is
negative. In contrast, for the second model, we find that the answer is
positive. Specifically, we show by means of the achievable secrecy rate based
on compress-and-forward, that, by asking the untrusted relay node to relay
information, we can achieve a higher secrecy rate than just treating the relay
as an eavesdropper. For a special class of the second model, where the relay is
not interfering itself, we derive an upper bound for the secrecy rate using an
argument whose net effect is to separate the eavesdropper from the relay. The
merit of the new upper bound is demonstrated on two channels that belong to
this special class. The Gaussian case of the second model mentioned above
benefits from this approach in that the new upper bound improves the previously
known bounds. For the Cover-Kim deterministic relay channel, the new upper
bound finds the secrecy capacity when the source-destination link is not worse
than the source-relay link, by matching with the achievable rate we present.Comment: IEEE Transactions on Information Theory, submitted October 2008,
revised October 2009. This is the revised versio
Capacity of a Class of State-Dependent Orthogonal Relay Channels
The class of orthogonal relay channels in which the orthogonal channels
connecting the source terminal to the relay and the destination, and the relay
to the destination, depend on a state sequence, is considered. It is assumed
that the state sequence is fully known at the destination while it is not known
at the source or the relay. The capacity of this class of relay channels is
characterized, and shown to be achieved by the partial
decode-compress-and-forward (pDCF) scheme. Then the capacity of certain binary
and Gaussian state-dependent orthogonal relay channels are studied in detail,
and it is shown that the compress-and-forward (CF) and
partial-decode-and-forward (pDF) schemes are suboptimal in general. To the best
of our knowledge, this is the first single relay channel model for which the
capacity is achieved by pDCF, while pDF and CF schemes are both suboptimal.
Furthermore, it is shown that the capacity of the considered class of
state-dependent orthogonal relay channels is in general below the cut-set
bound. The conditions under which pDF or CF suffices to meet the cut-set bound,
and hence, achieve the capacity, are also derived.Comment: This paper has been accepted by IEEE Transactions on Information
Theor
Computation Over Gaussian Networks With Orthogonal Components
Function computation of arbitrarily correlated discrete sources over Gaussian
networks with orthogonal components is studied. Two classes of functions are
considered: the arithmetic sum function and the type function. The arithmetic
sum function in this paper is defined as a set of multiple weighted arithmetic
sums, which includes averaging of the sources and estimating each of the
sources as special cases. The type or frequency histogram function counts the
number of occurrences of each argument, which yields many important statistics
such as mean, variance, maximum, minimum, median, and so on. The proposed
computation coding first abstracts Gaussian networks into the corresponding
modulo sum multiple-access channels via nested lattice codes and linear network
coding and then computes the desired function by using linear Slepian-Wolf
source coding. For orthogonal Gaussian networks (with no broadcast and
multiple-access components), the computation capacity is characterized for a
class of networks. For Gaussian networks with multiple-access components (but
no broadcast), an approximate computation capacity is characterized for a class
of networks.Comment: 30 pages, 12 figures, submitted to IEEE Transactions on Information
Theor
Nested Lattice Codes for Gaussian Relay Networks with Interference
In this paper, a class of relay networks is considered. We assume that, at a
node, outgoing channels to its neighbors are orthogonal, while incoming signals
from neighbors can interfere with each other. We are interested in the
multicast capacity of these networks. As a subclass, we first focus on Gaussian
relay networks with interference and find an achievable rate using a lattice
coding scheme. It is shown that there is a constant gap between our achievable
rate and the information theoretic cut-set bound. This is similar to the recent
result by Avestimehr, Diggavi, and Tse, who showed such an approximate
characterization of the capacity of general Gaussian relay networks. However,
our achievability uses a structured code instead of a random one. Using the
same idea used in the Gaussian case, we also consider linear finite-field
symmetric networks with interference and characterize the capacity using a
linear coding scheme.Comment: 23 pages, 5 figures, submitted to IEEE Transactions on Information
Theor
The Approximate Capacity of the MIMO Relay Channel
Capacity bounds are studied for the multiple-antenna complex Gaussian relay
channel with t1 transmitting antennas at the sender, r2 receiving and t2
transmitting antennas at the relay, and r3 receiving antennas at the receiver.
It is shown that the partial decode-forward coding scheme achieves within
min(t1,r2) bits from the cutset bound and at least one half of the cutset
bound, establishing a good approximate expression of the capacity. A similar
additive gap of min(t1 + t2, r3) + r2 bits is shown to be achieved by the
compress-forward coding scheme.Comment: 8 pages, 5 figures, submitted to the IEEE Transactions on Information
Theor
- …