650 research outputs found
A New Capacity Result for the Z-Gaussian Cognitive Interference Channel
This work proposes a novel outer bound for the Gaussian cognitive
interference channel in strong interference at the primary receiver based on
the capacity of a multi-antenna broadcast channel with degraded message set. It
then shows that for the Z-channel, i.e., when the secondary receiver
experiences no interference and the primary receiver experiences strong
interference, the proposed outer bound not only is the tightest among known
bounds but is actually achievable for sufficiently strong interference. The
latter is a novel capacity result that from numerical evaluations appears to be
generalizable to a larger (i.e., non-Z) class of Gaussian channels
Multiaccess Channels with State Known to Some Encoders and Independent Messages
We consider a state-dependent multiaccess channel (MAC) with state
non-causally known to some encoders. We derive an inner bound for the capacity
region in the general discrete memoryless case and specialize to a binary
noiseless case. In the case of maximum entropy channel state, we obtain the
capacity region for binary noiseless MAC with one informed encoder by deriving
a non-trivial outer bound for this case. For a Gaussian state-dependent MAC
with one encoder being informed of the channel state, we present an inner bound
by applying a slightly generalized dirty paper coding (GDPC) at the informed
encoder that allows for partial state cancellation, and a trivial outer bound
by providing channel state to the decoder also. The uninformed encoders benefit
from the state cancellation in terms of achievable rates, however, appears that
GDPC cannot completely eliminate the effect of the channel state on the
achievable rate region, in contrast to the case of all encoders being informed.
In the case of infinite state variance, we analyze how the uninformed encoder
benefits from the informed encoder's actions using the inner bound and also
provide a non-trivial outer bound for this case which is better than the
trivial outer bound.Comment: Accepted to EURASIP Journal on Wireless Communication and Networking,
Feb. 200
Capacity Theorems for the Fading Interference Channel with a Relay and Feedback Links
Handling interference is one of the main challenges in the design of wireless
networks. One of the key approaches to interference management is node
cooperation, which can be classified into two main types: relaying and
feedback. In this work we consider simultaneous application of both cooperation
types in the presence of interference. We obtain exact characterization of the
capacity regions for Rayleigh fading and phase fading interference channels
with a relay and with feedback links, in the strong and very strong
interference regimes. Four feedback configurations are considered: (1) feedback
from both receivers to the relay, (2) feedback from each receiver to the relay
and to one of the transmitters (either corresponding or opposite), (3) feedback
from one of the receivers to the relay, (4) feedback from one of the receivers
to the relay and to one of the transmitters. Our results show that there is a
strong motivation for incorporating relaying and feedback into wireless
networks.Comment: Accepted to the IEEE Transactions on Information Theor
State of the cognitive interference channel: a new unified inner bound
The capacity region of the interference channel in which one transmitter
non-causally knows the message of the other, termed the cognitive interference
channel, has remained open since its inception in 2005. A number of subtly
differing achievable rate regions and outer bounds have been derived, some of
which are tight under specific conditions. In this work we present a new
unified inner bound for the discrete memoryless cognitive interference channel.
We show explicitly how it encompasses all known discrete memoryless achievable
rate regions as special cases. The presented achievable region was recently
used in deriving the capacity region of the general deterministic cognitive
interference channel, and thus also the linear high-SNR deterministic
approximation of the Gaussian cognitive interference channel. The high-SNR
deterministic approximation was then used to obtain the capacity of the
Gaussian cognitive interference channel to within 1.87 bits.Comment: Presented at the 2010 International Zurich Seminar on Communications
- an 2nd updated version
Inner and Outer Bounds for the Gaussian Cognitive Interference Channel and New Capacity Results
The capacity of the Gaussian cognitive interference channel, a variation of
the classical two-user interference channel where one of the transmitters
(referred to as cognitive) has knowledge of both messages, is known in several
parameter regimes but remains unknown in general. In this paper we provide a
comparative overview of this channel model as we proceed through our
contributions: we present a new outer bound based on the idea of a broadcast
channel with degraded message sets, and another series of outer bounds obtained
by transforming the cognitive channel into channels with known capacity. We
specialize the largest known inner bound derived for the discrete memoryless
channel to the Gaussian noise channel and present several simplified schemes
evaluated for Gaussian inputs in closed form which we use to prove a number of
results. These include a new set of capacity results for the a) "primary
decodes cognitive" regime, a subset of the "strong interference" regime that is
not included in the "very strong interference" regime for which capacity was
known, and for the b) "S-channel" in which the primary transmitter does not
interfere with the cognitive receiver. Next, for a general Gaussian cognitive
interference channel, we determine the capacity to within one bit/s/Hz and to
within a factor two regardless of channel parameters, thus establishing rate
performance guarantees at high and low SNR, respectively. We also show how
different simplified transmission schemes achieve a constant gap between inner
and outer bound for specific channels. Finally, we numerically evaluate and
compare the various simplified achievable rate regions and outer bounds in
parameter regimes where capacity is unknown, leading to further insight on the
capacity region of the Gaussian cognitive interference channel.Comment: submitted to IEEE transaction of Information Theor
On the Capacity Region of the Two-user Interference Channel with a Cognitive Relay
This paper considers a variation of the classical two-user interference
channel where the communication of two interfering source-destination pairs is
aided by an additional node that has a priori knowledge of the messages to be
transmitted, which is referred to as the it cognitive relay. For this
Interference Channel with a Cognitive Relay (ICCR) In particular, for the class
of injective semi-deterministic ICCRs, a sum-rate upper bound is derived for
the general memoryless ICCR and further tightened for the Linear Deterministic
Approximation (LDA) of the Gaussian noise channel at high SNR, which disregards
the noise and focuses on the interaction among the users' signals. The capacity
region of the symmetric LDA is completely characterized except for the regime
of moderately weak interference and weak links from the CR to the destinations.
The insights gained from the analysis of the LDA are then translated back to
the symmetric Gaussian noise channel (GICCR). For the symmetric GICCR, an
approximate characterization (to within a constant gap) of the capacity region
is provided for a parameter regime where capacity was previously unknown. The
approximately optimal scheme suggests that message cognition at a relay is
beneficial for interference management as it enables simultaneous over the air
neutralization of the interference at both destinations
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Lecture Notes on Network Information Theory
These lecture notes have been converted to a book titled Network Information
Theory published recently by Cambridge University Press. This book provides a
significantly expanded exposition of the material in the lecture notes as well
as problems and bibliographic notes at the end of each chapter. The authors are
currently preparing a set of slides based on the book that will be posted in
the second half of 2012. More information about the book can be found at
http://www.cambridge.org/9781107008731/. The previous (and obsolete) version of
the lecture notes can be found at http://arxiv.org/abs/1001.3404v4/
- …