Capacity Region of the Gaussian Arbitrarily-Varying Broadcast - - PowerPoint PPT Presentation

capacity region of the gaussian arbitrarily varying
SMART_READER_LITE
LIVE PREVIEW

Capacity Region of the Gaussian Arbitrarily-Varying Broadcast - - PowerPoint PPT Presentation

Capacity Region of the Gaussian Arbitrarily-Varying Broadcast Channel Fatemeh Hosseinigoki and Oliver Kosut A RIZONA S TATE U NIVERSITY ISIT 2020 1 / 12 Gaussian Arbitrarily-Varying Broadcast Channel Transmitter power constraint X 2


slide-1
SLIDE 1

Capacity Region of the Gaussian Arbitrarily-Varying Broadcast Channel

Fatemeh Hosseinigoki and Oliver Kosut

ARIZONA STATE UNIVERSITY ISIT 2020

1 / 12

slide-2
SLIDE 2

Gaussian Arbitrarily-Varying Broadcast Channel

Transmitter power constraint X2 ≤ nP

2 / 12

slide-3
SLIDE 3

Gaussian Arbitrarily-Varying Broadcast Channel

Transmitter power constraint X2 ≤ nP Jammer power constraints Sj2 ≤ nΛj, j = 1, 2

2 / 12

slide-4
SLIDE 4

Gaussian Arbitrarily-Varying Broadcast Channel

Transmitter power constraint X2 ≤ nP Jammer power constraints Sj2 ≤ nΛj, j = 1, 2 We want to decode messages no matter what the jammers do

2 / 12

slide-5
SLIDE 5

Gaussian Arbitrarily-Varying Broadcast Channel

Transmitter power constraint X2 ≤ nP Jammer power constraints Sj2 ≤ nΛj, j = 1, 2 We want to decode messages no matter what the jammers do

Assumptions: Oblivious adversary, but knows the code

2 / 12

slide-6
SLIDE 6

Gaussian Arbitrarily-Varying Channel

Transmitter power constraint X2 ≤ nP Jammer power constraint S2 ≤ nΛ

3 / 12

slide-7
SLIDE 7

Gaussian Arbitrarily-Varying Channel

Transmitter power constraint X2 ≤ nP Jammer power constraint S2 ≤ nΛ [Csisz´ ar-Narayan 1991]: Capacity is C =    C

  • P

Λ + N

  • ,

Λ < P 0, Λ ≥ P where C(x) = 1 2 log(1 + x)

3 / 12

slide-8
SLIDE 8

Gaussian Arbitrarily-Varying Channel

Transmitter power constraint X2 ≤ nP Jammer power constraint S2 ≤ nΛ [Csisz´ ar-Narayan 1991]: Capacity is C =    C

  • P

Λ + N

  • ,

Λ < P 0, Λ ≥ P where C(x) = 1 2 log(1 + x) As long as jammer’s power is less than legitimate transmitter’s, then the worst the jammer can do is send noise

3 / 12

slide-9
SLIDE 9

Symmetrizability

If Λ ≥ P, then the jammer can choose a false message m′ and transmit S = X(m′)

4 / 12

slide-10
SLIDE 10

Symmetrizability

If Λ ≥ P, then the jammer can choose a false message m′ and transmit S = X(m′) Receiver gets Y = X(m) + X(m′) + V Cannot tell which message is correct

4 / 12

slide-11
SLIDE 11

Gaussian AVC with Common Randomness

5 / 12

slide-12
SLIDE 12

Gaussian AVC with Common Randomness

[Hughes-Narayan 1982]: If transmitter/receiver have common randomness (unknown to adversary) of at least O(log n) bits, then C = C

  • P

N + Λ

  • 5 / 12
slide-13
SLIDE 13

Gaussian AVC with Common Randomness

[Hughes-Narayan 1982]: If transmitter/receiver have common randomness (unknown to adversary) of at least O(log n) bits, then C = C

  • P

N + Λ

  • Symmetrizability is not a problem because two possibilities can be

distinguished via the common randomness

5 / 12

slide-14
SLIDE 14

Gaussian AVBC Capacity Region

Let Cno-adv(S1, S2) be the capacity region for the no-adversary BC with SNRs S1, S2

6 / 12

slide-15
SLIDE 15

Gaussian AVBC Capacity Region

Let Cno-adv(S1, S2) be the capacity region for the no-adversary BC with SNRs S1, S2 i.e., if S1 ≥ S2, then Cno-adv(S1, S1) =   (R1, R2) : R1 ≤ C(αS1), R2 ≤ C

  • ¯

αS2 αS2 + 1 for some α ∈ [0, 1]   

6 / 12

slide-16
SLIDE 16

Gaussian AVBC Capacity Region

Let Cno-adv(S1, S2) be the capacity region for the no-adversary BC with SNRs S1, S2 i.e., if S1 ≥ S2, then Cno-adv(S1, S1) =   (R1, R2) : R1 ≤ C(αS1), R2 ≤ C

  • ¯

αS2 αS2 + 1 for some α ∈ [0, 1]   

Theorem

(R1, R2) ∈ CGAV BC if and only if (R1, R2) ∈ Cno-adv

  • P

N1 + Λ1 , P N2 + Λ2

  • If Λ1 ≥ P, then R1 = 0

If Λ2 ≥ P, then R2 = 0

6 / 12

slide-17
SLIDE 17

Gaussian AVBC Capacity Region

Let Cno-adv(S1, S2) be the capacity region for the no-adversary BC with SNRs S1, S2 i.e., if S1 ≥ S2, then Cno-adv(S1, S1) =   (R1, R2) : R1 ≤ C(αS1), R2 ≤ C

  • ¯

αS2 αS2 + 1 for some α ∈ [0, 1]   

Theorem

(R1, R2) ∈ CGAV BC if and only if (R1, R2) ∈ Cno-adv

  • P

N1 + Λ1 , P N2 + Λ2

  • If Λ1 ≥ P, then R1 = 0

If Λ2 ≥ P, then R2 = 0 Converse is straightforward: (a) adversaries send Gaussian noise, (b) symmetrizability

6 / 12

slide-18
SLIDE 18

Gaussian AVBC with Common Randomness

Easy to show that, with common randomness, the capacity region is Cno-adv

  • P

N1 + Λ1 , P N2 + Λ2

  • 7 / 12
slide-19
SLIDE 19

Gaussian AVBC with Common Randomness

Problem: How to send common randomness. . .

7 / 12

slide-20
SLIDE 20

Gaussian AVBC with Common Randomness

Problem: How to send common randomness. . .

1 without the adversary preventing it,

7 / 12

slide-21
SLIDE 21

Gaussian AVBC with Common Randomness

Problem: How to send common randomness. . .

1 without the adversary preventing it, 2 without conflicting with superposition coding

7 / 12

slide-22
SLIDE 22

Idea that doesn’t work #1

[Ahlswede 1978]

8 / 12

slide-23
SLIDE 23

Idea that doesn’t work #1

[Ahlswede 1978] Works for unconstrained discrete channels, e.g. [Jahn 1981]

8 / 12

slide-24
SLIDE 24

Idea that doesn’t work #1

[Ahlswede 1978] Works for unconstrained discrete channels, e.g. [Jahn 1981] Doesn’t work in the power-constrained setting, because the adversary can inject more power during the short common randomness transmission

8 / 12

slide-25
SLIDE 25

Idea that doesn’t work #2

Use the common message as common randomness

9 / 12

slide-26
SLIDE 26

Idea that doesn’t work #2

Use the common message as common randomness Codebooks X1(m1, m2) ∼ N(0, αP), X2(m2) ∼ N(0, ¯ αP)

9 / 12

slide-27
SLIDE 27

Idea that doesn’t work #2

Use the common message as common randomness Codebooks X1(m1, m2) ∼ N(0, αP), X2(m2) ∼ N(0, ¯ αP) X = X1(m1, m2) + X2(m2)

9 / 12

slide-28
SLIDE 28

Idea that doesn’t work #2

Use the common message as common randomness Codebooks X1(m1, m2) ∼ N(0, αP), X2(m2) ∼ N(0, ¯ αP) X = X1(m1, m2) + X2(m2) Decoder 2 decodes m2, treats X1 as noise

9 / 12

slide-29
SLIDE 29

Idea that doesn’t work #2

Use the common message as common randomness Codebooks X1(m1, m2) ∼ N(0, αP), X2(m2) ∼ N(0, ¯ αP) X = X1(m1, m2) + X2(m2) Decoder 2 decodes m2, treats X1 as noise Decoder 1 decodes m2, then decodes m1 using m2 as common randomness

9 / 12

slide-30
SLIDE 30

Idea that doesn’t work #2

Use the common message as common randomness Codebooks X1(m1, m2) ∼ N(0, αP), X2(m2) ∼ N(0, ¯ αP) X = X1(m1, m2) + X2(m2) Decoder 2 decodes m2, treats X1 as noise Decoder 1 decodes m2, then decodes m1 using m2 as common randomness Problem: To avoid symmetrizability, we need Λ1 < ¯ αP, Λ2 < ¯ αP

9 / 12

slide-31
SLIDE 31

Idea that doesn’t work #2

Use the common message as common randomness Codebooks X1(m1, m2) ∼ N(0, αP), X2(m2) ∼ N(0, ¯ αP) X = X1(m1, m2) + X2(m2) Decoder 2 decodes m2, treats X1 as noise Decoder 1 decodes m2, then decodes m1 using m2 as common randomness Problem: To avoid symmetrizability, we need Λ1 < ¯ αP, Λ2 < ¯ αP This idea does work for the interference channel1

  • 1F. Hosseinigoki and O. Kosut, “The Gaussian Interference Channel in the

Presence of a Malicious Jammer,” Allerton, 2016.

9 / 12

slide-32
SLIDE 32

Idea that works

10 / 12

slide-33
SLIDE 33

Idea that works

Divide length-n block into √n segments of length √n

10 / 12

slide-34
SLIDE 34

Idea that works

Divide length-n block into √n segments of length √n In each segment, transmit at either full power or 0

10 / 12

slide-35
SLIDE 35

Idea that works

Divide length-n block into √n segments of length √n In each segment, transmit at either full power or 0 The main BC code is contained in the full power segments

10 / 12

slide-36
SLIDE 36

Idea that works

Divide length-n block into √n segments of length √n In each segment, transmit at either full power or 0 The main BC code is contained in the full power segments The on/off sequence contains the common randomness

10 / 12

slide-37
SLIDE 37

Idea that works

Divide length-n block into √n segments of length √n In each segment, transmit at either full power or 0 The main BC code is contained in the full power segments The on/off sequence contains the common randomness

  • Wait. . . can’t the adversary mess up the on/off sequence?

10 / 12

slide-38
SLIDE 38

Common randomness coding

At decoders, determine if the received power in each segment is high or low

11 / 12

slide-39
SLIDE 39

Common randomness coding

At decoders, determine if the received power in each segment is high or low Transmitter power Adversary power Received power P anything high >P high <P low

11 / 12

slide-40
SLIDE 40

Common randomness coding

At decoders, determine if the received power in each segment is high or low Transmitter power Adversary power Received power P anything high >P high <P low This is essentially a binary “or” channel

11 / 12

slide-41
SLIDE 41

Common randomness coding

At decoders, determine if the received power in each segment is high or low Transmitter power Adversary power Received power P anything high >P high <P low This is essentially a binary “or” channel If Λ < P, the adversary can only send power >P so often

11 / 12

slide-42
SLIDE 42

Common randomness coding

At decoders, determine if the received power in each segment is high or low Transmitter power Adversary power Received power P anything high >P high <P low This is essentially a binary “or” channel If Λ < P, the adversary can only send power >P so often Looks like a discrete AVC with cost-constrained adversary

11 / 12

slide-43
SLIDE 43

Common randomness coding

At decoders, determine if the received power in each segment is high or low Transmitter power Adversary power Received power P anything high >P high <P low This is essentially a binary “or” channel If Λ < P, the adversary can only send power >P so often Looks like a discrete AVC with cost-constrained adversary [Csiszar-Narayan 1988]: The capacity of this channel is positive, even if >1 − ǫ fraction of segments have high transmit power

11 / 12

slide-44
SLIDE 44

Conclusion

Main idea: On/off power code to transmit common randomness Applied to Gaussian arbitrarily-varying broadcast channel, but should generalize to many other settings Question? → fhossei1@asu.edu

12 / 12