27 research outputs found

    Synthesis of Gaussian Trees with Correlation Sign Ambiguity: An Information Theoretic Approach

    Full text link
    In latent Gaussian trees the pairwise correlation signs between the variables are intrinsically unrecoverable. Such information is vital since it completely determines the direction in which two variables are associated. In this work, we resort to information theoretical approaches to achieve two fundamental goals: First, we quantify the amount of information loss due to unrecoverable sign information. Second, we show the importance of such information in determining the maximum achievable rate region, in which the observed output vector can be synthesized, given its probability density function. In particular, we model the graphical model as a communication channel and propose a new layered encoding framework to synthesize observed data using upper layer Gaussian inputs and independent Bernoulli correlation sign inputs from each layer. We find the achievable rate region for the rate tuples of multi-layer latent Gaussian messages to synthesize the desired observables.Comment: 14 pages, 9 figures, part of this work is submitted to Allerton 2016 conference, UIUC, IL, US

    Half-duplex active eavesdropping in fast-fading channels: A block-markov wyner secrecy encoding scheme

    No full text
    In this paper, we study the problem of half-duplex active eavesdropping in fast-fading channels. The active eavesdropper is a more powerful adversary than the classical eavesdropper. It can choose between two functional modes: eavesdropping the transmission between the legitimate parties (Ex mode), and jamming it (Jx mode)-the active eavesdropper cannot function in full duplex mode. We consider a conservative scenario, when the active eavesdropper can choose its strategy based on the legitimate transmitter-receiver pair\u27s strategy, and thus, the transmitter and legitimate receiver have to plan for the worst. We show that conventional physical-layer secrecy approaches perform poorly (if at all), and we introduce a novel encoding scheme, based on very limited and unsecured feedback-the Block-Markov Wyner encoding scheme-which outperforms any schemes currently available. © 2012 IEEE

    Jamming games in fast-fading wireless channels

    No full text
    In this paper, we adopt outage probability (A- capacity) in fast fading channels as a pay-off function in a zero- sum game between a legitimate transceiver pair and an uncorre- lated Gaussian jammer. The transmitter aims at minimizing the outage probability, while the jammer attempts to maximize the outage probability. We consider both peak (over each codeword) and average (over all codewords) power constraints. For peak power constraints, a transmission rate is either supported by the system, or if too large, causes the whole transmission to fail. By imposing average power constraints, large rates can be supported at the cost of positive probability of codeword error. Maxmin and minimax power control strategies are developed, which show that no Nash equilibrium of pure strategies exists under average power constraints. © 2008 IEEE

    Mixed anti-jamming strategies in fixed-rate wireless systems over fast fading channels

    No full text
    We study the problem of jamming in a fixed-rate wireless system over fast fading channels. Both transmitter and jammer are subject to long term (average) power constraints. Our jamming problem is formulated as a zero-sum game with the probability of outage as pay-off function and power control functions as strategies. We consider both the case with full channel state information (CSI) at all parties (available from a training and feedback protocol), and the case when no CSI is fed back from the receiver. Nash equilibria of mixed strategies are found by solving the generalized form of an older problem dated back to Bell and Cover (1]. © 2009 IEEE

    Active eavesdropping in fast fading channels

    No full text
    In this paper we study the problem of active eavesdropping in fast fading channels. The active eavesdropper is a more powerful adversary than the classical eavesdropper. It can choose between two functional modes: eavesdropping the transmission between the legitimate parties (Ex mode), and jamming it (Jx mode) the active eavesdropper cannot function in full duplex mode. In this paper we only consider the best-case scenario, when the transmitter knows the eavesdropper\u27s strategy in advance - and hence can adaptively choose an encoding strategy. We show that, even under these most optimistic assumptions, an active eavesdropper can induce moderate to severe degradation of the achievable secrecy rate. ©2009 IEEE
    corecore