论文标题

二次受约束的双向对抗通道

Quadratically Constrained Two-way Adversarial Channels

论文作者

Zhang, Yihan, Vatedka, Shashank, Jaggi, Sidharth

论文摘要

我们研究了可靠的可靠沟通速率,在真正的双向添加性干扰通道上,在真实的字母表上,通过功率受限的干扰器破坏了通信。这对无线通信方案进行了建模,其中两个用户爱丽丝和鲍勃以完整的双工模式运行,希望在干扰器詹姆斯的存在下彼此交换消息。爱丽丝(Alice)和鲍勃(Bob)同时传输他们的编码$ \ usewissline {x} _a $和$ \ usewissline {x} _b $在$ n $ channel的用途上。假定詹姆斯可以选择他的干扰信号$ \ usepline {s} $作为$ \ usepline {x} _a $和$ \ useverline {x} _b $的非出色随机函数,以及爱丽丝和鲍勃使用的代码书。爱丽丝(Alice)和鲍勃(Bob)观察$ \下划线{x} _a +\下划线{x} _b +\ usewissline {s} $,并且必须可靠地恢复彼此的消息。在本文中,我们提供了彼此匹配的能力的上限和下限定义为用户的功率约束与干扰器的功率约束的比率)。我们根据晶格代码提供代码构建,并为大型$ \ Mathsf {snr} $得出可实现的费率。我们还根据詹姆斯的两种特定攻击策略提出上限。在此过程中,证明了晶格的可实现和一般属性的集合属性证明了对匡威的无内存渠道的能力调整代码,这可能具有独立的利益。

We study achievable rates of reliable communication in a power-constrained two-way additive interference channel over the real alphabet where communication is disrupted by a power-constrained jammer. This models the wireless communication scenario where two users Alice and Bob, operating in the full duplex mode, wish to exchange messages with each other in the presence of a jammer, James. Alice and Bob simultaneously transmit their encodings $ \underline{x}_A $ and $\underline{x}_B $ over $ n $ channel uses. It is assumed that James can choose his jamming signal $ \underline{s} $ as a noncausal randomized function of $ \underline{x}_A $ and $ \underline{x}_B $, and the codebooks used by Alice and Bob. Alice and Bob observe $ \underline{x}_A+\underline{x}_B +\underline{s}$, and must recover each others' messages reliably. In this article, we provide upper and lower bounds on the capacity of this channel which match each other and equal $ \frac{1}{2}\log\left(\frac{1}{2} + \mathsf{SNR}\right) $ in the high-$\mathsf{SNR}$ regime (where $\mathsf{SNR}$, signal to noise ratios, is defined as the ratio of the power constraints of the users to the power constraint of the jammer). We give a code construction based on lattice codes, and derive achievable rates for large $\mathsf{SNR}$. We also present upper bounds based on two specific attack strategies for James. Along the way, sumset property of lattices for the achievability and general properties of capacity-achieving codes for memoryless channels for the converse are proved, which might be of independent interest.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源