Interference Alignment with Imperfect Channel Knowledge and Secrecy Constraints pdfsubject=Doctoral Thesis

نویسنده

  • ZHAO WANG
چکیده

In this thesis, the degrees of freedom (DOF) of wireless networks are studied with imperfect channel state information at transmitters (CSIT) and/or secrecy constraints. Different interference alignment schemes are proposed to establish the DOF lower bound for a variety of wireless networks. For the imperfections of CSIT, we mainly have two practical concerns. The first concern is the long delay of the high-resolution feedback from receivers to transmitters such that the obtained CSIT is totally outdated. The second concern is the inaccurate estimation on the instantaneous CSIT. Specifically, the first scenario is solely investigated in a delayed CSIT model, and a combination of these two types of imperfections is studied in a mixed CSIT model. The DOF of wireless networks are studied based on these two CSIT models. Regarding secrecy constraints, we also consider two scenarios, to be specific, the weak secrecy where the confidentiality is measured by the normalized information leakage with respect to the codeword length, and the strong secrecy where the total information leakage of the whole codeword is used as the secrecy measure. In the first part of the thesis, the impact of imperfect CSIT is investigated for the multi-hop broadcast networks. The Maddah-Ali & Tse (MAT) alignment is extended to the considered multi-hop network to make use of the delayed CSIT, and it is also shown that the MAT scheme can be integrated with linear beamforming to achieve the optimal sum DOF of a two-user multi-hop broadcast network with mixed CSIT. In the second part of the thesis, the secrecy constraints are subjected to the studied networks. With weak secrecy constraints, we propose artificial noise alignment approaches for seeking the optimal secure degrees of freedom (SDOF) of wireless X networks, the multiple-input single-output (MISO) broadcast channel and the twohop interference channel. It is worth noting that the proposed alignment schemes are also based on divergent CSIT conditions, i.e., delayed, mixed or even no CSIT. With strong secrecy constraints, the secure coding based on channel resolvability and the signaling method by interference alignment are combined to provide the optimal SDOF of the K-user interference channel with confidential messages. It is worth noting that a general framework of the secure interference alignment encoder is provided in the thesis, which consists of two functional sections: the stochastic encoding section to provide secure codes and the alignment section to provide signaling solutions. This framework can be applied to all the network models studied in the latter part of the thesis.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Achievable Secrecy Rate Regions of State Dependent Causal Cognitive Interference Channel

In this paper, the secrecy problem in the state dependent causal cognitive interference channel is studied. The channel state is non-causally known at the cognitive encoder. The message of the cognitive encoder must be kept secret from the primary receiver. We use a coding scheme which is a combination of compress-and-forward strategy with Marton coding, Gel’fand-Pinsker coding and Wyner’s wire...

متن کامل

On The Secrecy of the Cognitive Interference Channel with Channel State

In this paper the secrecy problem in the cognitive state-dependent interference channel is considered. In this scenario we have a primary and a cognitive transmitter-receiver pairs. The cognitive transmitter has the message of the primary sender as side information. In addition, the state of the channel is known at the cognitive encoder. Hence, the cognitive encoder uses this side information t...

متن کامل

Strong Secrecy for Interference Channels: Achievable Rate Region and Degrees of Freedom

The achievable rate region and degrees of freedom are studied for interference channels with confidential messages under strong secrecy constraints. The problem is studied based on the framework of Han and Verdú’s channel resolvability theory. It is shown that if the random binning rate for securing a confidential message is slightly above the resolution of its corresponding wiretapped channel,...

متن کامل

On the Secure Degrees of Freedom of the K-user Interference Channel with Delayed CSIT

In this paper, the K-user interference channel with secrecy constraints is considered with delayed channel state information at transmitters (CSIT). We propose a novel secure retrospective interference alignment scheme in which the transmitters carefully mix information symbols with artificial noises to ensure confidentiality. Achieving positive secure degrees of freedom (SDoF) is challenging d...

متن کامل

Robust Lattice Alignment for K-user MIMO Interference Channels with Imperfect Channel Knowledge

In this paper, we consider a robust lattice alignment design for K-user quasi-static MIMO interference channels with imperfect channel knowledge. With random Gaussian inputs, the conventional interference alignment (IA) method has the feasibility problem when the channel is quasi-static. On the other hand, structured lattices can create structured interference as opposed to the random interfere...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015