4,945 research outputs found
Robust Lattice Alignment for K-user MIMO Interference Channels with Imperfect Channel Knowledge
In this paper, we consider a robust lattice alignment design for K-user
quasi-static MIMO interference channels with imperfect channel knowledge. With
random Gaussian inputs, the conventional interference alignment (IA) method has
the feasibility problem when the channel is quasi-static. On the other hand,
structured lattices can create structured interference as opposed to the random
interference caused by random Gaussian symbols. The structured interference
space can be exploited to transmit the desired signals over the gaps. However,
the existing alignment methods on the lattice codes for quasi-static channels
either require infinite SNR or symmetric interference channel coefficients.
Furthermore, perfect channel state information (CSI) is required for these
alignment methods, which is difficult to achieve in practice. In this paper, we
propose a robust lattice alignment method for quasi-static MIMO interference
channels with imperfect CSI at all SNR regimes, and a two-stage decoding
algorithm to decode the desired signal from the structured interference space.
We derive the achievable data rate based on the proposed robust lattice
alignment method, where the design of the precoders, decorrelators, scaling
coefficients and interference quantization coefficients is jointly formulated
as a mixed integer and continuous optimization problem. The effect of imperfect
CSI is also accommodated in the optimization formulation, and hence the derived
solution is robust to imperfect CSI. We also design a low complex iterative
optimization algorithm for our robust lattice alignment method by using the
existing iterative IA algorithm that was designed for the conventional IA
method. Numerical results verify the advantages of the proposed robust lattice
alignment method
Approximate Sum-Capacity of K-user Cognitive Interference Channels with Cumulative Message Sharing
This paper considers the K user cognitive interference channel with one
primary and K-1 secondary/cognitive transmitters with a cumulative message
sharing structure, i.e cognitive transmitter knows non-causally
all messages of the users with index less than i. We propose a computable outer
bound valid for any memoryless channel. We first evaluate the sum-rate outer
bound for the high- SNR linear deterministic approximation of the Gaussian
noise channel. This is shown to be capacity for the 3-user channel with
arbitrary channel gains and the sum-capacity for the symmetric K-user channel.
Interestingly. for the K user channel having only the K th cognitive know all
the other messages is sufficient to achieve capacity i.e cognition at
transmitter 2 to K-1 is not needed. Next the sum capacity of the symmetric
Gaussian noise channel is characterized to within a constant additive and
multiplicative gap. The proposed achievable scheme for the additive gap is
based on Dirty paper coding and can be thought of as a MIMO-broadcast scheme
where only one encoding order is possible due to the message sharing structure.
As opposed to other multiuser interference channel models, a single scheme
suffices for both the weak and strong interference regimes. With this scheme
the generalized degrees of freedom (gDOF) is shown to be a function of K, in
contrast to the non cognitive case and the broadcast channel case.
Interestingly, it is show that as the number of users grows to infinity the
gDoF of the K-user cognitive interference channel with cumulative message
sharing tends to the gDoF of a broadcast channel with a K-antenna transmitter
and K single-antenna receivers. The analytical additive additive and
multiplicative gaps are a function of the number of users. Numerical
evaluations of inner and outer bounds show that the actual gap is less than the
analytical one.Comment: Journa
The Approximate Capacity of the Many-to-One and One-to-Many Gaussian Interference Channels
Recently, Etkin, Tse, and Wang found the capacity region of the two-user
Gaussian interference channel to within one bit/s/Hz. A natural goal is to
apply this approach to the Gaussian interference channel with an arbitrary
number of users. We make progress towards this goal by finding the capacity
region of the many-to-one and one-to-many Gaussian interference channels to
within a constant number of bits. The result makes use of a deterministic model
to provide insight into the Gaussian channel. The deterministic model makes
explicit the dimension of signal scale. A central theme emerges: the use of
lattice codes for alignment of interfering signals on the signal scale.Comment: 45 pages, 16 figures. Submitted to IEEE Transactions on Information
Theor
Information Exchange Limits in Cooperative MIMO Networks
Concurrent presence of inter-cell and intra-cell interferences constitutes a
major impediment to reliable downlink transmission in multi-cell multiuser
networks. Harnessing such interferences largely hinges on two levels of
information exchange in the network: one from the users to the base-stations
(feedback) and the other one among the base-stations (cooperation). We
demonstrate that exchanging a finite number of bits across the network, in the
form of feedback and cooperation, is adequate for achieving the optimal
capacity scaling. We also show that the average level of information exchange
is independent of the number of users in the network. This level of information
exchange is considerably less than that required by the existing coordination
strategies which necessitate exchanging infinite bits across the network for
achieving the optimal sum-rate capacity scaling. The results provided rely on a
constructive proof.Comment: 35 pages, 5 figur
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Opportunistic Scheduling for Full-Duplex Uplink-Downlink Networks
We study opportunistic scheduling and the sum capacity of cellular networks
with a full-duplex multi-antenna base station and a large number of
single-antenna half-duplex users. Simultaneous uplink and downlink over the
same band results in uplink-to-downlink interference, degrading performance. We
present a simple opportunistic joint uplink-downlink scheduling algorithm that
exploits multiuser diversity and treats interference as noise. We show that in
homogeneous networks, our algorithm achieves the same sum capacity as what
would have been achieved if there was no uplink-to-downlink interference,
asymptotically in the number of users. The algorithm does not require
interference CSI at the base station or uplink users. It is also shown that for
a simple class of heterogeneous networks without sufficient channel diversity,
it is not possible to achieve the corresponding interference-free system
capacity. We discuss the potential for using device-to-device side-channels to
overcome this limitation in heterogeneous networks.Comment: 10 pages, 2 figures, to appear at IEEE International Symposium on
Information Theory (ISIT) '1
- β¦