Article
Physics, Multidisciplinary
Remi A. Chou, Aylin Yener
Summary: This paper discusses the issue of secure communication in the presence of an eavesdropper and a malicious jammer. Four different models are considered, and inner and outer bounds are derived for each model. The results show that secure communication can be achieved under certain conditions.
Article
Computer Science, Theory & Methods
Hongliang He, Xizhao Luo, Jian Weng, Kaimin Wei
Summary: This paper proposes a novel cooperative jamming scheme to improve security in multiple access wiretap channels, where users use their own CSI to design artificial noise to eliminate eavesdroppers' ability to intercept legitimate information. The interference between users plays a key role in achieving security by ensuring that artificial noise from different users helps each other. The study considers both non-collusion and collusion scenarios of eavesdroppers, and shows that positive secrecy sum-rate can be achieved by the proposed scheme.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2021)
Article
Engineering, Electrical & Electronic
Hongliang He, Shanxiang Lyu, Bingwen Feng
Summary: In order to improve the security of information transmission, we propose a cross-time interference injection scheme that enhances security by introducing cross-time self-interference and inter-user interference without the need for artificial noise. This scheme utilizes the properties of Hadamard matrix and wireless channels to create stronger interference on the eavesdropping channel compared to the legitimate channel. We analyze the security performance of this scheme when both the legitimate receiver and the eavesdropper employ successive interference cancellation (SIC) scheme, including secrecy sum rate, secrecy capacity, and secrecy outage probability. We also investigate the impact of the eavesdropper's antenna number, legitimate user number, and time slot utilization on the security performance, obtaining the corresponding relationships for achieving positive secrecy rate. Simulation results validate our theoretical analysis.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2023)
Article
Computer Science, Theory & Methods
Bin Dai, Chong Li, Yingbin Liang, Zheng Ma, Shlomo Shamai
Summary: This paper presents a feedback scheme for Gaussian multi-user wiretap channels, showing its capacity and secrecy capacity achievements. The outer bounds on secrecy capacity regions are derived, and numerical results demonstrate the rate gains from feedback.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2022)
Article
Engineering, Electrical & Electronic
Amir Leshem, Uri Erez
Summary: Adjusting the distance between antennas can eliminate interference and improve the signal-to-noise ratio under certain conditions, which is applicable not only to specific signal-to-noise ratio scenarios, but also to different types of channels. The practical application of the scheme has been demonstrated through suitable antenna selection and adjustment in real scenarios, and the robustness to channel estimation errors has also been explored.
IEEE TRANSACTIONS ON SIGNAL PROCESSING
(2021)
Article
Computer Science, Theory & Methods
Dajiang Chen, Shaoquan Jiang, Ning Zhang, Lei Liu, Kim-Kwang Raymond Choo
Summary: In this paper, a novel message authentication model using the same key over wiretap channel is proposed to achieve information-theoretic security. The model consists of two discrete memoryless channels: one between transmitter Alice and receiver Bob, and another connecting attacker Oscar and Alice. Based on this model, a new message authentication scheme is proposed, which utilizes random coding techniques to detect man-in-the-middle attacks.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2022)
Article
Computer Science, Information Systems
Emmanuel Obeng Frimpong, Taehoon Kim, Inkyu Bang
Summary: This article investigates the application of an autoencoder-based deep learning framework in physical-layer security and the secrecy performance among multiple users in an eavesdropping scenario. By designing an integrated loss function and training based on this function, it is verified that our proposed training approach achieves better secrecy performance compared to conventional methods.
Article
Engineering, Electrical & Electronic
Tong Zhang, Rui Wang
Summary: This paper designs transmission schemes for a three-user MIMO broadcast channel with delayed CSIT and arbitrary antenna configurations, and analyzes the achievable DoF region through a transformation approach. The decoding condition of the transmission scheme is transformed into the achievable DoF region, connecting phase duration and achievable DoF, characterizing the DoF region of order-2 messages and expressing an achievable DoF region for order-1 messages.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Toshiki Matsumine, Hideki Ochiai, Junji Shikata
Summary: This paper investigates the impact of a bit-labeling scheme on the security performance of BICM systems and proposes optimization algorithms for bit-labeling. The results show that the proposed bit-labeling can significantly improve performance while degrading the error rate performance of the legitimate receiver, and can be combined with coding schemes to reduce the security gap.
Article
Engineering, Electrical & Electronic
Xu Du, Ashutosh Sabharwal
Summary: In this paper, the impact of angle correlation on inter-user channel correlation in massive MIMO systems is studied. Through a combination of measurement and analysis, three key results are obtained: there is a high channel correlation between close-by users; the channel correlation between far-away users can be at least twice higher than in i.i.d. Rayleigh fading channel when there is angle correlation; inter-user angle correlation increases the inter-user channel correlation, while the number and spacing of base-station antennas reduce the channel correlation.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2022)
Article
Engineering, Electrical & Electronic
Vidhi Rana, Remi A. Chou
Summary: We design short blocklength codes for the Gaussian wiretap channel, ensuring information-theoretic security. Our approach involves separating reliability and secrecy requirements in code design. By using an autoencoder for reliability and hash functions for secrecy, we evaluate the error probability at the legitimate receiver and the leakage at the eavesdropper through simulations. Our results show improved secrecy rates compared to existing non-constructive designs for the Gaussian wiretap channel, and suitability for compound and arbitrarily varying Gaussian wiretap channels with uncertain channel statistics.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2023)
Article
Physics, Multidisciplinary
Neri Merhav
Summary: In this study, we address the problem of encoding a deterministic source sequence for the degraded wiretap channel using finite-state machines as encoder and decoder. A necessary condition for reliable and secure transmission is presented, along with a lower bound on the smallest achievable bandwidth expansion factor. The bound is achievable through Lempel-Ziv compression and good channel coding, and a lower bound on the minimum necessary rate of purely random bits needed for security is also derived.
Article
Computer Science, Information Systems
Hyukmin Son
Summary: This study proposes a cooperative beamforming based artificial noise-aided secure transmission for uplink wiretap channels, analyzing the cooperative artificial noise and SINR at the eavesdropper in terms of system and design parameters. The optimal secrecy capacity with and without eavesdropper's CSI is examined, demonstrating near-optimal secrecy capacity as the number of users increases.
Article
Physics, Multidisciplinary
Manos Athanasakos, George Karagiannidis
Summary: This paper introduces a technique based on polar coding for the primitive relay wiretap channel, allowing the relay to intelligently decide whether to cooperate or not for information-theoretic security.
Article
Computer Science, Information Systems
Byungju Lee, Namyoon Lee, Nohgyeom Ha, Wonjae Shin
Summary: This research proposes a relay-aided interference alignment scheme that utilizes partial and delayed channel state information. The study shows that, under certain conditions, using outdated CSI at the relay can achieve the same optimal sum-degrees of freedom as perfect CSI knowledge.
IEEE WIRELESS COMMUNICATIONS LETTERS
(2021)
Article
Physics, Multidisciplinary
Benjamin M. Zaidel, Ori Shental, Shlomo Shamai (Shitz)
Summary: This paper investigates the achievable rate region of regular sparse code-domain NOMA technology in scenarios with two classes of users with different power constraints and compares its performance in extreme-SNR regimes. Valuable insights are provided into the potential performance gains of regular sparse NOMA in practical environments and the gap to the ultimate performance limits.
Article
Telecommunications
Jinle Zhu, Ercong Yu, Qiang Li, Hongyang Chen, Shlomo Shamai Shitz
Summary: This letter discusses the uplink multiuser load-modulated array multiple-input multiple-output communication system and proposes a low-complexity detection scheme based on a ball-tree structure. The proposed scheme achieves similar bit error rate performance as maximum likelihood detection while significantly reducing detection complexity.
IEEE COMMUNICATIONS LETTERS
(2022)
Article
Computer Science, Information Systems
Guangyue Han, Shlomo Shamai
Summary: This paper investigates the sampling problem of continuous-time additive white Gaussian noise (AWGN) channels and provides quantitative strengthenings to describe how oversampling approaches the true mutual information of continuous-time Gaussian channels. The results show that, under certain conditions, oversampling can accurately approximate the true mutual information of continuous-time channels.
IEEE TRANSACTIONS ON INFORMATION THEORY
(2022)
Article
Physics, Multidisciplinary
Homa Nikbakht, Michele Wigger, Malcolm Egan, Shlomo Shamai (Shitz), Jean-Marie Gorce, H. Vincent Poor
Summary: This survey reviews coding schemes that simultaneously accommodate URLLC and eMBB transmissions from an information theoretic perspective and shows their superiority over traditional scheduling approaches. Various communication scenarios are considered, and the focus is on the achievable rate pairs for URLLC and eMBB messages, as well as the achievable error probability pairs in finite-blocklength scenarios.
Article
Engineering, Electrical & Electronic
Asif Katz, Michael Peleg, Shlomo Shamai (Shitz)
Summary: We investigate a special case of diamond relay, consisting of Gaussian channels from the user to the relays and lossless fronthaul links with limited rate from the relays to the destination. We compare the oblivious compress and forward (CF) scheme with distributed compression and the decode and forward (DF) scheme, and prove that the optimal CF-DF time-sharing scheme is more advantageous than the CF-DF superposition scheme. We derive an achievable rate using time-sharing between CF and DF, where the optimal time-sharing proportion, power, and rate allocations differ for each frequency and are fully determined.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2022)
Article
Computer Science, Information Systems
Recep Guel, David Stotz, Syed Ali Jafar, Helmut Boelcskei, Shlomo Shamai (Shitz)
Summary: This paper presents a condition for achieving 1/2 degree of freedom for each user in constant K-user single-antenna interference channels. The condition applies to all channel topologies and captures the essence of interference alignment. Furthermore, codebook constructions are provided to achieve the desired degree of freedom for all channel matrices satisfying the identified condition.
IEEE TRANSACTIONS ON INFORMATION THEORY
(2022)
Article
Physics, Multidisciplinary
Michael Dikshtein, Or Ordentlich, Shlomo Shamai (Shitz)
Summary: The paper investigates a double-sided variant of the information bottleneck method, finding optimal channels in various scenarios and proposing an alternating maximization algorithm. This problem is closely related to biclustering.
Article
Physics, Multidisciplinary
Maha Zohdy, Ali Tajer, Shlomo Shamai (Shitz)
Summary: This paper proposes a multi-access broadcast approach to prevent outage events and improve transmission latency. By splitting the information stream into different layers adapted to different channel states, the proposed approach achieves lower average delay compared to single-layer outage approaches. Analytical characterizations are provided for deterministic and Poisson arrivals, demonstrating the effectiveness of the proposed approach in reducing average sum delays.
Article
Engineering, Electrical & Electronic
Roy Karasik, Osvaldo Simeone, Hyeryung Jang, Shlomo Shamai Shitz
Summary: This paper presents an optimized layered division multiplexing (LDM) scheme based on conditional value-at-risk (CVaR) rate for ultra-reliable communication scenarios. Meta-learning is introduced to reduce sample complexity, and numerical experiments demonstrate the effectiveness of LDM and the benefits of meta-learning.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2022)
Article
Computer Science, Information Systems
Alex Dytso, H. Vincent Poor, Shlomo Shamai (Shitz)
Summary: Consider a channel Y = X + N where X is an n-dimensional random vector, and N is a multivariate Gaussian vector with a full-rank covariance matrix K-N. The objective of this paper is to provide a unifying view of the identities connecting the conditional mean of X given Y = y to other quantities. In the first part, a general derivative identity for the conditional mean estimator is derived. In the second part, the new identity is used to recover and generalize many known identities and derive some new ones.
IEEE TRANSACTIONS ON INFORMATION THEORY
(2023)
Article
Engineering, Electrical & Electronic
Lingzhi Zhao, Ying Cui, Sheng Yang, Shlomo Shamai Shitz
Summary: This paper investigates general rate splitting for general multicast in a multi-carrier single-cell wireless network. The authors propose an iterative algorithm to solve the nonconvex stochastic problem, and also propose low-complexity iterative algorithms for the fast fading scenario. Numerical analysis demonstrates the substantial gains of the proposed solutions over existing schemes and reveals insights for the design of general rate splitting.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
(2023)
Article
Engineering, Electrical & Electronic
Kfir M. Cohen, Sangwoo Park, Osvaldo Simeone, Petar Popovski, Shlomo Shamai
Summary: The dynamic scheduling of ultra-reliable and low-latency communication traffic (URLLC) in the uplink can enhance coexisting services by only allocating resources when necessary. The main challenge is the uncertainty in URLLC packet generation, which requires predictors. This letter introduces a novel scheduler for URLLC packets that guarantees reliability and latency regardless of the prediction quality.
IEEE SIGNAL PROCESSING LETTERS
(2023)
Article
Engineering, Electrical & Electronic
Kfir M. Cohen, Sangwoo Park, Osvaldo Simeone, Shlomo Shamai
Summary: This paper introduces the principles of adaptation and monitoring in the life cycle of an artificial intelligence module in communication networks and proposes a solution that combines meta-learning with Bayesian learning. Using demodulation and equalization as an example, the study demonstrates how meta-learning can extract shared properties of effective demodulators from multiple frames, resulting in better calibrated decisions. By extending Bayesian meta-learning to an active setting, the number of frames required for efficient adaptation is significantly reduced.
IEEE TRANSACTIONS ON SIGNAL PROCESSING
(2022)
Article
Computer Science, Theory & Methods
Bin Dai, Chong Li, Yingbin Liang, Zheng Ma, Shlomo Shamai
Summary: This paper presents a feedback scheme for Gaussian multi-user wiretap channels, showing its capacity and secrecy capacity achievements. The outer bounds on secrecy capacity regions are derived, and numerical results demonstrate the rate gains from feedback.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2022)
Article
Engineering, Electrical & Electronic
Seok-Hwan Park, Seongah Jeong, Jinyeop Na, Osvaldo Simeone, Shlomo Shamai
Summary: This paper proposes an approach to collaboratively offload computing tasks across CP and ENs within a Cloud RAN architecture, minimizing end-to-end latency by exchanging data and computational outcomes.
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS
(2021)