2,730 research outputs found
Multiaccess Channels with State Known to One Encoder: Another Case of Degraded Message Sets
We consider a two-user state-dependent multiaccess channel in which only one
of the encoders is informed, non-causally, of the channel states. Two
independent messages are transmitted: a common message transmitted by both the
informed and uninformed encoders, and an individual message transmitted by only
the uninformed encoder. We derive inner and outer bounds on the capacity region
of this model in the discrete memoryless case as well as the Gaussian case.
Further, we show that the bounds for the Gaussian case are tight in some
special cases.Comment: 5 pages, Proc. of IEEE International Symposium on Information theory,
ISIT 2009, Seoul, Kore
Distributed Full-duplex via Wireless Side Channels: Bounds and Protocols
In this paper, we study a three-node full-duplex network, where a base
station is engaged in simultaneous up- and downlink communication in the same
frequency band with two half-duplex mobile nodes. To reduce the impact of
inter- node interference between the two mobile nodes on the system capacity,
we study how an orthogonal side-channel between the two mobile nodes can be
leveraged to achieve full-duplex-like multiplexing gains. We propose and
characterize the achievable rates of four distributed full-duplex schemes,
labeled bin-and- cancel, compress-and-cancel, estimate-and-cancel and decode-
and-cancel. Of the four, bin-and-cancel is shown to achieve within 1 bit/s/Hz
of the capacity region for all values of channel parameters. In contrast, the
other three schemes achieve the near-optimal performance only in certain
regimes of channel values. Asymptotic multiplexing gains of all proposed
schemes are derived to show that the side-channel is extremely effective in
regimes where inter-node interference has the highest impact.Comment: Published in IEEE Transactions on Wireless Communications, August
201
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
- …