4,950 research outputs found
Multiple Access Channels with Generalized Feedback and Confidential Messages
This paper considers the problem of secret communication over a multiple
access channel with generalized feedback. Two trusted users send independent
confidential messages to an intended receiver, in the presence of a passive
eavesdropper. In this setting, an active cooperation between two trusted users
is enabled through using channel feedback in order to improve the communication
efficiency. Based on rate-splitting and decode-and-forward strategies,
achievable secrecy rate regions are derived for both discrete memoryless and
Gaussian channels. Results show that channel feedback improves the achievable
secrecy rates.Comment: To appear in the Proceedings of the 2007 IEEE Information Theory
Workshop on Frontiers in Coding Theory, Lake Tahoe, CA, September 2-6, 200
Capacity Theorems for the Fading Interference Channel with a Relay and Feedback Links
Handling interference is one of the main challenges in the design of wireless
networks. One of the key approaches to interference management is node
cooperation, which can be classified into two main types: relaying and
feedback. In this work we consider simultaneous application of both cooperation
types in the presence of interference. We obtain exact characterization of the
capacity regions for Rayleigh fading and phase fading interference channels
with a relay and with feedback links, in the strong and very strong
interference regimes. Four feedback configurations are considered: (1) feedback
from both receivers to the relay, (2) feedback from each receiver to the relay
and to one of the transmitters (either corresponding or opposite), (3) feedback
from one of the receivers to the relay, (4) feedback from one of the receivers
to the relay and to one of the transmitters. Our results show that there is a
strong motivation for incorporating relaying and feedback into wireless
networks.Comment: Accepted to the IEEE Transactions on Information Theor
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Communicating over Filter-and-Forward Relay Networks with Channel Output Feedback
Relay networks aid in increasing the rate of communication from source to
destination. However, the capacity of even a three-terminal relay channel is an
open problem. In this work, we propose a new lower bound for the capacity of
the three-terminal relay channel with destination-to-source feedback in the
presence of correlated noise. Our lower bound improves on the existing bounds
in the literature. We then extend our lower bound to general relay network
configurations using an arbitrary number of filter-and-forward relay nodes.
Such network configurations are common in many multi-hop communication systems
where the intermediate nodes can only perform minimal processing due to limited
computational power. Simulation results show that significant improvements in
the achievable rate can be obtained through our approach. We next derive a
coding strategy (optimized using post processed signal-to-noise ratio as a
criterion) for the three-terminal relay channel with noisy channel output
feedback for two transmissions. This coding scheme can be used in conjunction
with open-loop codes for applications like automatic repeat request (ARQ) or
hybrid-ARQ.Comment: 15 pages, 8 figures, to appear in IEEE Transactions on Signal
Processin
Generalized Degrees of Freedom of the Interference Channel with a Signal Cognitive Relay
We study the interference channel with a signal cognitive relay. A signal
cognitive relay knows the transmit signals (but not the messages) of the
sources non-causally, and tries to help them communicating with their
respective destinations. We derive upper bounds and provide achievable schemes
for this channel. These upper and lower bounds are shown to be tight from
generalized degrees of freedom point of view. As a result, a characterization
of the generalized degrees of freedom of the interference channel with a signal
cognitive relay is given.Comment: Results submitted to ISIT 2010, 19 pages, 3 figure
- …