3,242 research outputs found
Secure Communication over Parallel Relay Channel
We investigate the problem of secure communication over parallel relay
channel in the presence of a passive eavesdropper. We consider a four terminal
relay-eavesdropper channel which consists of multiple relay-eavesdropper
channels as subchannels. For the discrete memoryless model, we establish outer
and inner bounds on the rate-equivocation region. The inner bound allows mode
selection at the relay. For each subchannel, secure transmission is obtained
through one of two coding schemes at the relay: decoding-and-forwarding the
source message or confusing the eavesdropper through noise injection. For the
Gaussian memoryless channel, we establish lower and upper bounds on the perfect
secrecy rate. Furthermore, we study a special case in which the relay does not
hear the source and show that under certain conditions the lower and upper
bounds coincide. The results established for the parallel Gaussian
relay-eavesdropper channel are then applied to study the fading
relay-eavesdropper channel. Analytical results are illustrated through some
numerical examples.Comment: To Appear in IEEE Transactions on Information Forensics and Securit
Sum-Rate Maximization in Two-Way AF MIMO Relaying: Polynomial Time Solutions to a Class of DC Programming Problems
Sum-rate maximization in two-way amplify-and-forward (AF) multiple-input
multiple-output (MIMO) relaying belongs to the class of difference-of-convex
functions (DC) programming problems. DC programming problems occur as well in
other signal processing applications and are typically solved using different
modifications of the branch-and-bound method. This method, however, does not
have any polynomial time complexity guarantees. In this paper, we show that a
class of DC programming problems, to which the sum-rate maximization in two-way
MIMO relaying belongs, can be solved very efficiently in polynomial time, and
develop two algorithms. The objective function of the problem is represented as
a product of quadratic ratios and parameterized so that its convex part (versus
the concave part) contains only one (or two) optimization variables. One of the
algorithms is called POlynomial-Time DC (POTDC) and is based on semi-definite
programming (SDP) relaxation, linearization, and an iterative search over a
single parameter. The other algorithm is called RAte-maximization via
Generalized EigenvectorS (RAGES) and is based on the generalized eigenvectors
method and an iterative search over two (or one, in its approximate version)
optimization variables. We also derive an upper-bound for the optimal values of
the corresponding optimization problem and show by simulations that this
upper-bound can be achieved by both algorithms. The proposed methods for
maximizing the sum-rate in the two-way AF MIMO relaying system are shown to be
superior to other state-of-the-art algorithms.Comment: 35 pages, 10 figures, Submitted to the IEEE Trans. Signal Processing
in Nov. 201
Wireless Network Simplification: the Gaussian N-Relay Diamond Network
We consider the Gaussian N-relay diamond network, where a source wants to
communicate to a destination node through a layer of N-relay nodes. We
investigate the following question: what fraction of the capacity can we
maintain by using only k out of the N available relays? We show that
independent of the channel configurations and the operating SNR, we can always
find a subset of k relays which alone provide a rate (kC/(k+1))-G, where C is
the information theoretic cutset upper bound on the capacity of the whole
network and G is a constant that depends only on N and k (logarithmic in N and
linear in k). In particular, for k = 1, this means that half of the capacity of
any N-relay diamond network can be approximately achieved by routing
information over a single relay. We also show that this fraction is tight:
there are configurations of the N-relay diamond network where every subset of k
relays alone can at most provide approximately a fraction k/(k+1) of the total
capacity. These high-capacity k-relay subnetworks can be also discovered
efficiently. We propose an algorithm that computes a constant gap approximation
to the capacity of the Gaussian N-relay diamond network in O(N log N) running
time and discovers a high-capacity k-relay subnetwork in O(kN) running time.
This result also provides a new approximation to the capacity of the Gaussian
N-relay diamond network which is hybrid in nature: it has both multiplicative
and additive gaps. In the intermediate SNR regime, this hybrid approximation is
tighter than existing purely additive or purely multiplicative approximations
to the capacity of this network.Comment: Submitted to Transactions on Information Theory in October 2012. The
new version includes discussions on the algorithmic complexity of discovering
a high-capacity subnetwork and on the performance of amplify-and-forwar
Crystallization in large wireless networks
We analyze fading interference relay networks where M single-antenna
source-destination terminal pairs communicate concurrently and in the same
frequency band through a set of K single-antenna relays using half-duplex
two-hop relaying. Assuming that the relays have channel state information
(CSI), it is shown that in the large-M limit, provided K grows fast enough as a
function of M, the network "decouples" in the sense that the individual
source-destination terminal pair capacities are strictly positive. The
corresponding required rate of growth of K as a function of M is found to be
sufficient to also make the individual source-destination fading links converge
to nonfading links. We say that the network "crystallizes" as it breaks up into
a set of effectively isolated "wires in the air". A large-deviations analysis
is performed to characterize the "crystallization" rate, i.e., the rate (as a
function of M,K) at which the decoupled links converge to nonfading links. In
the course of this analysis, we develop a new technique for characterizing the
large-deviations behavior of certain sums of dependent random variables. For
the case of no CSI at the relay level, assuming amplify-and-forward relaying,
we compute the per source-destination terminal pair capacity for M,K converging
to infinity, with K/M staying fixed, using tools from large random matrix
theory.Comment: 30 pages, 6 figures, submitted to journal IEEE Transactions on
Information Theor
- …