Capacity of a Broadcast Channel with Luo, Gohary, Yanikomeroglu - - PowerPoint PPT Presentation

capacity of a broadcast channel with
SMART_READER_LITE
LIVE PREVIEW

Capacity of a Broadcast Channel with Luo, Gohary, Yanikomeroglu - - PowerPoint PPT Presentation

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 1 Capacity of a Broadcast Channel with Luo, Gohary, Yanikomeroglu Gaussian Jamming and a Friendly Channel Eavesdropper Model Relaying Schemes Kevin


slide-1
SLIDE 1

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 1 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper

Kevin Luo, Ramy Gohary, Halim Yanikomeroglu

Carleton University, Ottawa, ON, Canada

Oct 2015

slide-2
SLIDE 2

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 2 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

A Battlefield Communication Scenario

  • a drone sends common information to two ground

troops

  • a malicious jammer transmits high power Gaussian

signal to disrupt the communication

slide-3
SLIDE 3

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 3 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

Literature Review (related work)

  • Basar, Gaussian channel with jamming, 1983;
  • Kashyap, Basar and Srikant, correlated jamming on

MIMO Gaussian fading channels, 2004;

  • Tekin and Yener, Gaussian multiple access channel

with two-way wiretap, 2008;

  • Shafie and Ulukus, mutual information games in

multiuser channels with correlated jamming, 2009;

  • Lai and H. E. Gamal, relay-eavesdropper channel,
  • 2008. In particular, the relay can be seen as a "friendly

jammer" who forwards noise to the malicious eavesdropper to improve secrecy.

slide-4
SLIDE 4

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 4 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

Eavesdropper

We introduce a “friendly eavesdropper" who

  • picks up the jammer’s signal
  • assists the communication on an orthogonal channel
slide-5
SLIDE 5

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 5 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

System Model-1

We conceive the role of the eavesdropper as a relay

  • drone → source
  • troops → receivers
  • jammer → noise or interference
  • eavesdropper → relay

Transmitter Receiver 1 Receiver 2 Jammer Friendly Eavesdropper

Y1 Y2 Ys,1 Ys,2 Ye X J Xe Z1 ∼ N(0, N1) Z2 ∼ N(0, N2) a1 a2 b1 b2 1 Re

slide-6
SLIDE 6

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 6 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

System Model-2

Model details of the eavesdropper as a relay:

  • The eavesdropper has average power constraint
  • The eavesdropper-to-receiver links are noisy links
  • The eavesdropper’s transmission is rate-limited by the

higher capacity of the two eavesdropper-to-receiver links

  • The jammer does not cooperate with the eavesdropper,

i.e., the jammer’s codebook is not exposed to the eavesdropper What is the eavesdropper’s optimal strategy to enable the maximum rate to be reliably communicated between the source and the receivers?

slide-7
SLIDE 7

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 7 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

Relaying Schemes

Two types of relaying schemes:

  • Relaying schemes that require the eavesdropper (relay)

to know the the jammer’s codebook:

  • decode-and-forward (DF) and hash-and-forward (HF)
  • DF and HF are not suitable for this channel
  • Relaying schemes that do not require the eavesdropper

(relay) to know the the jammer’s codebook:

  • amplify-and-forward (AF)
  • compress-and-forward (CF) and variants
slide-8
SLIDE 8

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 8 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

Cut-set Bound

  • We first show a capacity upper bound by deriving the

cut-set bound: C ≤ min

  • C(γ1) + C(γe,1), C(γ2)+ C(γe,2)
  • .

where γi is the signal-to-jamming ratio of the source-to-receiver i link and γe,i is the signal-to-noise ratio of the eavesdropper-to-receiver i link.

Transmitter Receiver 1 Receiver 2 Jammer Friendly Eavesdropper

Y1 Y2 Ys,1 Ys,2 Ye X J Xe Z1 Z2 γ1 γ2 γe,1 γe,2 Re

slide-9
SLIDE 9

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 9 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

AF: Suboptimal

  • The achievable rate expression of the AF scheme can

be obtained by RAF = min

i=1,2{C

  • γi(1 + γe,i)
  • }.

which is below the cut-set bound in general.

  • AF does not achieve the cut-set bound in general.
slide-10
SLIDE 10

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 10 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

CF with Standard Decoding: Suboptimal

  • Conventional CF
  • The relay bin index is recovered by finding a unique

codeword representing the bin index in the joint typicality set with the received signal at the receiver.

  • The achievable rate expression of the conventional CF

can be obtained by RCF ≤ min

i=1,2 C(γi) + min i=1,2 C(γe,i),

which is also below the cut-set bound in general.

  • CF with standard decoding does not achieve the cut-set

bound in general either.

slide-11
SLIDE 11

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 11 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

CF with List Decoding: Capacity Achieving

  • Modified CF
  • Use the same codebook structure and encoding as

conventional CF.

slide-12
SLIDE 12

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 12 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

CF with List Decoding: Capacity Achieving

  • Modified CF (continued)
  • In decoding block j, receiver i finds unique

(ˆ yn

e,j−1, xn j−1, xn e,j) such that

  • {(ˆ

y n

e,j−1, xn j−1)} jointly typical with y n i(j−1) (not necessarily

unique); and

  • xn

e,j jointly typical with y n s,ij, i = 1, 2. (xn e,j is the

eavesdropper codeword corresponding to ˆ y n

e,j−1)

X n ˆ Yn

e

X n

e

yn

i(j−1)

yn

s,ij

slide-13
SLIDE 13

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 13 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

CF with List Decoding: Capacity Achieving

  • The eavesdropper uses
  • Standard CF encoding, with
  • Gaussian codebook.

This signaling strategy is able to achieve the cut-set bound and hence C = min

  • C(γ1) + C(γe,1), C(γ2)+ C(γe,2)
  • .
slide-14
SLIDE 14

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 14 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

Benefit of Eavesdropper

  • Capacity without eavesdropper

CNo Eavesdropper = min

i=1,2C(γi).

  • The rate gain provided by the friendly eavesdropper is

given by min

  • ∆ + C(γe,1), C(γe,2)
  • ,

γ1 ≥ γ2, min

  • C(γe,1), ∆ + C(γe,2)
  • ,

γ1 < γ2, where ∆ |C(γ1) − C(γ2)|.

slide-15
SLIDE 15

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 15 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

Numerical Result

  • Consider the instance γ2 = 4, γe,1 = 3, γe,2 = 2 and

γ1 ∈ [0, 4.5].

0.5 1 1.5 2 2.5 3 3.5 4 4.5 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2

γ1 rate (bits per channel use)

Capacity with Eavesdropper CF with standard decoding Amplify-and-Forward Capacity without Eavesdropper

slide-16
SLIDE 16

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 16 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

Summary and Conclusions

  • Channel with multiple receivers, a jammer and a

friendly eavesdropper.

  • AF and conventional CF with Gaussian codebooks do

not achieve cut-set bound.

  • CF with list decoding and Gaussian codebooks

achieves cut-set bound.

slide-17
SLIDE 17

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 17 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

Comments on NNC and SNNC

  • NNC and SNNC uses a 1-to-1 mapping between the

codewords in ˆ Ye and in Xe.

  • This is in contrast with conventional CF and modified

CF, both of which use the N-to-1 mapping from Wyner-Ziv binning.

  • The 1-to-1 mapping induces an additional constraint on

the estimation noise at the eavesdropper since Xe is rate limited in the considered channel.

  • This constraint results in a rate loss in general.
slide-18
SLIDE 18

Capacity of a Broadcast Channel with Gaussian Jamming and a Friendly Eavesdropper 18 Luo, Gohary, Yanikomeroglu Channel Model Relaying Schemes

Comments on HF

  • In HF, the relay constructs a mapping from J to the

bins (Xe).

  • Mapping available at receivers. Hence, not applicable

in jamming case.