530 research outputs found
On the reliability exponent of the exponential timing channel
Cataloged from PDF version of article.We determine the reliability exponent E(R) of the Anantharam-Verdu exponential server timing channel with service rate p for all rates R between a critical rate R-c = (mu/4) log 2 and the channel capacity C = e(-1)mu. For rates between 0 and R-c, we provide a random-coding lower bound E,(R) and a sphere-packing upper bound E-r(R) on E(R). We also determine that the cutoff rate R-0 for this channel equals mu/4, thus answering a question posed by Sundaresan and Verdu. An interesting aspect of our results is that the lower bound E, (R) for the reliability exponent of the timing channel coincides with Wyner's reliability exponent for the photon-counting channel with no dark current and with peak power constraint mu. Whether the reliability exponents of the two channels are actually equal everywhere remains open. This shows that the exponential server timing channel is at least as reliable as this type of a photon-counting channel for all rates
Processing and Transmission of Information
Contains research objectives, summary of research and reports on two research projects.National Aeronautics and Space Administration (Grant NGL 22-009-013)Joint Services Electronics Programs (U. S. Army, U. S. Navy, and U. S. Air Force) under Contract DA 28-043-AMC-02536(E)U. S. Army Research Office - Durham (Contract DAHCO4-69-C-0042
Implementation of generalized quantum measurements: superadditive quantum coding, accessible information extraction, and classical capacity limit
Quantum information theory predicts that when the transmission resource is
doubled in quantum channels, the amount of information transmitted can be
increased more than twice by quantum channel coding technique, whereas the
increase is at most twice in classical information theory. This remarkable
feature, the superadditive quantum coding gain, can be implemented by
appropriate choices of code words and corresponding quantum decoding which
requires a collective quantum measurement. Recently, the first experimental
demonstration was reported [Phys. Rev. Lett. 90, 167906 (2003)]. The purpose of
this paper is to describe our experiment in detail. Particularly, a design
strategy of quantum collective decoding in physical quantum circuits is
emphasized. We also address the practical implication of the gain on
communication performance by introducing the quantum-classical hybrid coding
scheme. We show how the superadditive quantum coding gain, even in a small code
length, can boost the communication performance of conventional coding
technique.Comment: 15 pages, 14 figure
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
On capacity of optical communications over a lossy bosonic channel with a receiver employing the most general coherent electro-optic feedback control
We study the problem of designing optical receivers to discriminate between
multiple coherent states using coherent processing receivers---i.e., one that
uses arbitrary coherent feedback control and quantum-noise-limited direct
detection---which was shown by Dolinar to achieve the minimum error probability
in discriminating any two coherent states. We first derive and re-interpret
Dolinar's binary-hypothesis minimum-probability-of-error receiver as the one
that optimizes the information efficiency at each time instant, based on
recursive Bayesian updates within the receiver. Using this viewpoint, we
propose a natural generalization of Dolinar's receiver design to discriminate
coherent states each of which could now be a codeword, i.e., a sequence of
coherent states each drawn from a modulation alphabet. We analyze the
channel capacity of the pure-loss optical channel with a general
coherent-processing receiver in the low-photon number regime and compare it
with the capacity achievable with direct detection and the Holevo limit
(achieving the latter would require a quantum joint-detection receiver). We
show compelling evidence that despite the optimal performance of Dolinar's
receiver for the binary coherent-state hypothesis test (either in error
probability or mutual information), the asymptotic communication rate
achievable by such a coherent-processing receiver is only as good as direct
detection. This suggests that in the infinitely-long codeword limit, all
potential benefits of coherent processing at the receiver can be obtained by
designing a good code and direct detection, with no feedback within the
receiver.Comment: 17 pages, 5 figure
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
- …