Interference Alignment with Imperfect Channel Knowledge and Secrecy Constraints

نویسنده

  • Zhao Wang
چکیده

Please note that all the discussion referring to Theorem 5.4.1 has been revised accordingly. The corrected version of Chapter 5 has been published as follows: [WXSP15a] Zhao Wang, Ming Xiao, Mikael Skoglund, and H. Vincent Poor, “Secure degrees of freedom of wireless X networks using artificial noise alignment,” IEEE Trans. Commun., to appear. Online access: http://arxiv.org/abs/1410.5009. • 833: At transmitter 1 • 9511: is bounded above by K(M−1) K+M−1+M−1 M • 96, the last inequality of Appendix 5.B: H(WK,M\1), instead of H(WK,M−1) • 143, Lemma 8.5.2: on a finite set X , instead of on a continuous set X • 143, the equations in Remark 8.2: h should be replaced by H for entropy, and |Y n j | should be replaced by |Yn j | for cardinality. • 166, the first two equations in Codebook generation, encoding and decoding: the index of Ỹ should be corrected as follows,

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Interference Alignment with Imperfect Channel Knowledge and Secrecy Constraints pdfsubject=Doctoral Thesis

In this thesis, the degrees of freedom (DOF) of wireless networks are studied with imperfect channel state information at transmitters (CSIT) and/or secrecy constraints. Different interference alignment schemes are proposed to establish the DOF lower bound for a variety of wireless networks. For the imperfections of CSIT, we mainly have two practical concerns. The first concern is the long dela...

متن کامل

Achievable Secrecy Rate Regions of State Dependent Causal Cognitive Interference Channel

In this paper, the secrecy problem in the state dependent causal cognitive interference channel is studied. The channel state is non-causally known at the cognitive encoder. The message of the cognitive encoder must be kept secret from the primary receiver. We use a coding scheme which is a combination of compress-and-forward strategy with Marton coding, Gel’fand-Pinsker coding and Wyner’s wire...

متن کامل

On The Secrecy of the Cognitive Interference Channel with Channel State

In this paper the secrecy problem in the cognitive state-dependent interference channel is considered. In this scenario we have a primary and a cognitive transmitter-receiver pairs. The cognitive transmitter has the message of the primary sender as side information. In addition, the state of the channel is known at the cognitive encoder. Hence, the cognitive encoder uses this side information t...

متن کامل

Strong Secrecy for Interference Channels: Achievable Rate Region and Degrees of Freedom

The achievable rate region and degrees of freedom are studied for interference channels with confidential messages under strong secrecy constraints. The problem is studied based on the framework of Han and Verdú’s channel resolvability theory. It is shown that if the random binning rate for securing a confidential message is slightly above the resolution of its corresponding wiretapped channel,...

متن کامل

On the Secure Degrees of Freedom of the K-user Interference Channel with Delayed CSIT

In this paper, the K-user interference channel with secrecy constraints is considered with delayed channel state information at transmitters (CSIT). We propose a novel secure retrospective interference alignment scheme in which the transmitters carefully mix information symbols with artificial noises to ensure confidentiality. Achieving positive secure degrees of freedom (SDoF) is challenging d...

متن کامل

Robust Lattice Alignment for K-user MIMO Interference Channels with Imperfect Channel Knowledge

In this paper, we consider a robust lattice alignment design for K-user quasi-static MIMO interference channels with imperfect channel knowledge. With random Gaussian inputs, the conventional interference alignment (IA) method has the feasibility problem when the channel is quasi-static. On the other hand, structured lattices can create structured interference as opposed to the random interfere...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015