4.5 Article

Secrecy Degrees of Freedom of MIMO Broadcast Channels With Delayed CSIT

期刊

IEEE TRANSACTIONS ON INFORMATION THEORY
卷 59, 期 9, 页码 5244-5256

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIT.2013.2266924

关键词

Delayed channel state information; Gaussian broadcast channels; interference alignment; multiple-antenna channels; physical-layer security; wiretap channel

资金

  1. Network of Excellence in Wireless Communications
  2. NEWCOM++
  3. NEWCOM#

向作者/读者索取更多资源

The degrees of freedom (DoF) of the two-user Gaussian multiple-input and multiple-output (MIMO) broadcast channel with confidential messages is studied under the assumption that delayed channel state information (CSI) is available at the transmitter. We characterize the optimal secrecy DoF (SDoF) region and show that it can be achieved by a simple artificial noise alignment scheme. The proposed scheme sends the confidential messages superposed with the artificial noise over several time slots. Exploiting delayed CSI, the transmitter aligns the transmit signal in such a way that the useful message can be extracted at the intended receiver but is completely drowned by the artificial noise at the unintended receiver. The proposed scheme can be regarded as a nontrivial extension of Maddah-Ali Tse scheme and enables us to quantify the resource overhead, or equivalently the DoF loss, to be paid for the secure communications.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Physics, Multidisciplinary

Beyond Equal-Power Sparse NOMA: Two User Classes and Closed-Form Bounds on the Achievable Region

Benjamin M. Zaidel, Ori Shental, Shlomo Shamai (Shitz)

Summary: This paper investigates the achievable rate region of regular sparse code-domain NOMA technology in scenarios with two classes of users with different power constraints and compares its performance in extreme-SNR regimes. Valuable insights are provided into the potential performance gains of regular sparse NOMA in practical environments and the gap to the ultimate performance limits.

ENTROPY (2022)

Article Telecommunications

Ball-Tree-Based Signal Detection for LMA MIMO Systems

Jinle Zhu, Ercong Yu, Qiang Li, Hongyang Chen, Shlomo Shamai Shitz

Summary: This letter discusses the uplink multiuser load-modulated array multiple-input multiple-output communication system and proposes a low-complexity detection scheme based on a ball-tree structure. The proposed scheme achieves similar bit error rate performance as maximum likelihood detection while significantly reducing detection complexity.

IEEE COMMUNICATIONS LETTERS (2022)

Article Computer Science, Information Systems

On Sampling Continuous-Time AWGN Channels

Guangyue Han, Shlomo Shamai

Summary: This paper investigates the sampling problem of continuous-time additive white Gaussian noise (AWGN) channels and provides quantitative strengthenings to describe how oversampling approaches the true mutual information of continuous-time Gaussian channels. The results show that, under certain conditions, oversampling can accurately approximate the true mutual information of continuous-time channels.

IEEE TRANSACTIONS ON INFORMATION THEORY (2022)

Article Physics, Multidisciplinary

An Information-Theoretic View of Mixed-Delay Traffic in 5G and 6G

Homa Nikbakht, Michele Wigger, Malcolm Egan, Shlomo Shamai (Shitz), Jean-Marie Gorce, H. Vincent Poor

Summary: This survey reviews coding schemes that simultaneously accommodate URLLC and eMBB transmissions from an information theoretic perspective and shows their superiority over traditional scheduling approaches. Various communication scenarios are considered, and the focus is on the achievable rate pairs for URLLC and eMBB messages, as well as the achievable error probability pairs in finite-blocklength scenarios.

ENTROPY (2022)

Article Engineering, Electrical & Electronic

The Filtered Gaussian Primitive Diamond Channel

Asif Katz, Michael Peleg, Shlomo Shamai (Shitz)

Summary: We investigate a special case of diamond relay, consisting of Gaussian channels from the user to the relays and lossless fronthaul links with limited rate from the relays to the destination. We compare the oblivious compress and forward (CF) scheme with distributed compression and the decode and forward (DF) scheme, and prove that the optimal CF-DF time-sharing scheme is more advantageous than the CF-DF superposition scheme. We derive an achievable rate using time-sharing between CF and DF, where the optimal time-sharing proportion, power, and rate allocations differ for each frequency and are fully determined.

IEEE TRANSACTIONS ON COMMUNICATIONS (2022)

Article Computer Science, Information Systems

Canonical Conditions for K/2 Degrees of Freedom

Recep Guel, David Stotz, Syed Ali Jafar, Helmut Boelcskei, Shlomo Shamai (Shitz)

Summary: This paper presents a condition for achieving 1/2 degree of freedom for each user in constant K-user single-antenna interference channels. The condition applies to all channel topologies and captures the essence of interference alignment. Furthermore, codebook constructions are provided to achieve the desired degree of freedom for all channel matrices satisfying the identified condition.

IEEE TRANSACTIONS ON INFORMATION THEORY (2022)

Article Physics, Multidisciplinary

The Double-Sided Information Bottleneck Function

Michael Dikshtein, Or Ordentlich, Shlomo Shamai (Shitz)

Summary: The paper investigates a double-sided variant of the information bottleneck method, finding optimal channels in various scenarios and proposing an alternating maximization algorithm. This problem is closely related to biclustering.

ENTROPY (2022)

Article Physics, Multidisciplinary

Broadcast Approach to Uplink NOMA: Queuing Delay Analysis

Maha Zohdy, Ali Tajer, Shlomo Shamai (Shitz)

Summary: This paper proposes a multi-access broadcast approach to prevent outage events and improve transmission latency. By splitting the information stream into different layers adapted to different channel states, the proposed approach achieves lower average delay compared to single-layer outage approaches. Analytical characterizations are provided for deterministic and Poisson arrivals, demonstrating the effectiveness of the proposed approach in reducing average sum delays.

ENTROPY (2022)

Article Engineering, Electrical & Electronic

Learning to Broadcast for Ultra-Reliable Communication With Differential Quality of Service via the Conditional Value at Risk

Roy Karasik, Osvaldo Simeone, Hyeryung Jang, Shlomo Shamai Shitz

Summary: This paper presents an optimized layered division multiplexing (LDM) scheme based on conditional value-at-risk (CVaR) rate for ultra-reliable communication scenarios. Meta-learning is introduced to reduce sample complexity, and numerical experiments demonstrate the effectiveness of LDM and the benefits of meta-learning.

IEEE TRANSACTIONS ON COMMUNICATIONS (2022)

Article Computer Science, Information Systems

Conditional Mean Estimation in Gaussian Noise: A Meta Derivative Identity With Applications

Alex Dytso, H. Vincent Poor, Shlomo Shamai (Shitz)

Summary: Consider a channel Y = X + N where X is an n-dimensional random vector, and N is a multivariate Gaussian vector with a full-rank covariance matrix K-N. The objective of this paper is to provide a unifying view of the identities connecting the conditional mean of X given Y = y to other quantities. In the first part, a general derivative identity for the conditional mean estimator is derived. In the second part, the new identity is used to recover and generalize many known identities and derive some new ones.

IEEE TRANSACTIONS ON INFORMATION THEORY (2023)

Article Engineering, Electrical & Electronic

An Optimization Framework for General Rate Splitting for General Multicast

Lingzhi Zhao, Ying Cui, Sheng Yang, Shlomo Shamai Shitz

Summary: This paper investigates general rate splitting for general multicast in a multi-carrier single-cell wireless network. The authors propose an iterative algorithm to solve the nonconvex stochastic problem, and also propose low-complexity iterative algorithms for the fast fading scenario. Numerical analysis demonstrates the substantial gains of the proposed solutions over existing schemes and reveals insights for the design of general rate splitting.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2023)

Article Engineering, Electrical & Electronic

Guaranteed Dynamic Scheduling of Ultra-Reliable Low-Latency Traffic via Conformal Prediction

Kfir M. Cohen, Sangwoo Park, Osvaldo Simeone, Petar Popovski, Shlomo Shamai

Summary: The dynamic scheduling of ultra-reliable and low-latency communication traffic (URLLC) in the uplink can enhance coexisting services by only allocating resources when necessary. The main challenge is the uncertainty in URLLC packet generation, which requires predictors. This letter introduces a novel scheduler for URLLC packets that guarantees reliability and latency regardless of the prediction quality.

IEEE SIGNAL PROCESSING LETTERS (2023)

Article Engineering, Electrical & Electronic

Bayesian Active Meta-Learning for Reliable and Efficient AI-Based Demodulation

Kfir M. Cohen, Sangwoo Park, Osvaldo Simeone, Shlomo Shamai

Summary: This paper introduces the principles of adaptation and monitoring in the life cycle of an artificial intelligence module in communication networks and proposes a solution that combines meta-learning with Bayesian learning. Using demodulation and equalization as an example, the study demonstrates how meta-learning can extract shared properties of effective demodulators from multiple frames, resulting in better calibrated decisions. By extending Bayesian meta-learning to an active setting, the number of frames required for efficient adaptation is significantly reduced.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2022)

Article Computer Science, Theory & Methods

Self-Secure Capacity-Achieving Feedback Schemes of Gaussian Multiple-Access Wiretap Channels With Degraded Message Sets

Bin Dai, Chong Li, Yingbin Liang, Zheng Ma, Shlomo Shamai

Summary: This paper presents a feedback scheme for Gaussian multi-user wiretap channels, showing its capacity and secrecy capacity achievements. The outer bounds on secrecy capacity regions are derived, and numerical results demonstrate the rate gains from feedback.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)

Article Engineering, Electrical & Electronic

Collaborative Cloud and Edge Mobile Computing in C-RAN Systems With Minimal End-to-End Latency

Seok-Hwan Park, Seongah Jeong, Jinyeop Na, Osvaldo Simeone, Shlomo Shamai

Summary: This paper proposes an approach to collaboratively offload computing tasks across CP and ENs within a Cloud RAN architecture, minimizing end-to-end latency by exchanging data and computational outcomes.

IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS (2021)

暂无数据