Feedback Approach for the Relay Channel with Noisy Feedback and Its Security Analysis
Abstract
:1. Introduction
2. Model Formulation
2.1. The Gaussian Relay Channel with Noisy Feedback
- A uniformly distributed message M, which takes values over the set .
- Encoder 1 with output , where is an encoding function of Source at the time index , satisfying the average power constraint .
- Relay with output , where is an encoding function of Relay at time index , satisfying the average power constraint .
- Encoder 2 with output , where is an encoding function of Destination at time index , satisfying the average feedback power constraint .
- Decoder has output , where ψ is the decoding function of Destination. The average decoding error probability is defined as
- (1)
- .
- (2)
- .
- (3)
- if ,
- (4)
- Let , for any and .
- (5)
- For any random variable Y that is statistically independent of ν, is statistically independent of Y.
2.2. The MISO Fading Relay Channel with Noisy Feedback
- A uniformly distributed message M, which takes values over the set .
- Encoder 1 with output , where is an encoding function of Source at the time index , satisfying the average power constraint .
- Relay with output , where is an encoding function of Relay at time index , satisfying the average power constraint .
- Encoder 2 with output , where is an encoding function of Destination at time index , satisfying the average feedback power constraint .
- Decoder has output , where ψ is the decoding function of Destination. The average decoding error probability is also defined as (2).
- (1)
- The distributive law .
- (2)
- If , ; otherwise, a modulo-aliasing error has occurred.
- (3)
- Let the dither signal be uniform over Λ; then, is uniform over Λ, and .
- (4)
- For any random variable that is statistically independent of the dither signal , is statistically independent of .
3. An SK-Type Feedback Scheme for the Gaussian Relay Channel with Noisy Feedback
3.1. Main Result
3.2. Our Achievable Scheme
3.2.1. Message Mapping Method
3.2.2. Dither Signal for the Feedback Channel Power Constaint
3.2.3. Coding Procedure
4. An SK-Type Scheme for the MISO Fading Relay Channel with Noisy Feedback and Its Security Analysis
4.1. Main Result
4.2. Security Analysis of the Proposed Extended Scheme
- Case I: Eavesdropper does not know the complex dither signal sequence , and the secrecy level is defined by
- Case II: Eavesdropper knows the complex dither signal sequence , and the secrecy level is defined by
5. Numerical Results
6. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A. Coefficient’s Derivation and Error Probability Analysis of Theorem 1
- (1)
- A modulo-aliasing error occurs in Source at time instant . The event is defined as
- (2)
- A decoding error occurs in Destination at time instant N. The event is defined as
Appendix B. Proof of Theorem 2
Appendix B.1. Channel Transformation Strategy
Appendix B.2. Message Mapping Method
Appendix B.3. Dither Signal for the Feedback Channel Power Constaint
Appendix B.4. Coding Procedure
- Source sends , the relay keeps quiet and Destination receives .
- Once it receives , Destination first computes the estimation of by . The first estimation error is denoted by , and the variance of is .
- Then, Destination uses the two-dimensional modulo- function to encode as and transmits it back to Source via a noisy feedback channel.
- Once receiving , Source also uses the two-dimensional modulo- function to decode this message and computes the noisy versions of Destination’s estimation error, i.e., . If the modulo-aliasing error does not occur, using Property (2) of Proposition 2, Source can obtain .
- The Source sends to Destination, where . At this time instant, Relay also keeps quiet, so Destination receives the output signal .
- Next, Destination evaluates MMSE of based on and updates the estimation of by computing . The second estimation error is denoted by , and the variance of is . Then, Destination encodes and transmits it back to Source via a noisy feedback channel.
- Once it receives , Source computes the noisy versions of Destination’s estimation error, i.e., . If the modulo-aliasing error does not occur, using Property (2) of Proposition 2, Source can get .
- The Source sends to both the Relay and Destination, where . Furthermore, Relay does not keep quiet and utilizes the AF strategy to transmit a scaled version of ; that is, , and the value of the Relay’s AF coefficient is .
- Next, the n-th channel output signal of Destination received is . Destination first calculates the auxiliary signal about the received message , then forms the innovation based on the fact that . is denoted by .
- Then Destination evaluates MMSE of based on and updates the estimation of by computing . The estimation error at time instant is denoted by , and the variance of is .
Appendix B.5. Coefficient’s Derivation and Error Probability Analysis
- (1)
- A modulo-aliasing error occurs in Source at time instant . The event is defined as
- (2)
- A decoding error occurs in Destination at time instant N. The event is defined as
Appendix C. Proof of Theorem 3
- (I)
- To analyze the secrecy level , can be bounded by
- (a)
- follows from the fact that is a deterministic function of M, , and conditioning reduces entropy;
- (b)
- follows from (A47);
- (c)
- follows from , and are deterministic functions of . Additionally, is only dependent on the complex dither signal sequence (see Property (2) of Proposition 2), and is independent of ;
- (d)
- follows from the fact that is independent of ;
- (e)
- follows from
- (II)
- To analyze secrecy level , can be bounded by
- (a)
- follows from the fact that is a deterministic function of M, , and conditioning reduces entropy;
- (b)
- follows from (A47);
- (c)
- follows from , and are deterministic functions of ;
- (d)
- follows from the fact that , is independent of , for , and are both deterministic functions of ;
- (e)
- follows from
References
- De Sanctis, M.; Cianca, E.; Araniti, G.; Bisio, I.; Prasad, R. Satellite communications supporting internet of remote things. IEEE Internet Things J. 2016, 3, 113–123. [Google Scholar] [CrossRef]
- An, K.; Lin, M.; Liang, T.; Wang, J.B.; Wang, J.; Huang, Y.; Swindlehurst, A.L. Performance analysis of multi-Antenna hybrid satellite-terrestrial relay networks in the presence of interference. IEEE Trans. Commun. 2015, 63, 4390–4404. [Google Scholar] [CrossRef]
- Nguyen, T.N.; Tran, D.H.; Van Chien, T.; Phan, V.D.; Voznak, M.; Chatzinotas, S. Security and reliability analysis of satellite-terrestrial multirelay networks with imperfect CSI. IEEE Syst. J. 2023, 17, 2824–2835. [Google Scholar] [CrossRef]
- Gupta, P.; Kumar, P.R. Towards an information theory of large networks: An achievable rate region. IEEE Trans. Inf. Theory 2003, 49, 1877–1894. [Google Scholar] [CrossRef]
- Xie, L.-L.; Kumar, P.R. A network information theory for wireless communication: Scaling laws and optimal operation. IEEE Trans. Inf. Theory 2004, 50, 748–767. [Google Scholar] [CrossRef]
- Xie, L.-L.; Kumar, P.R. An achievable rate for the multiple-level relay channel. IEEE Trans. Inf. Theory 2005, 51, 1348–1358. [Google Scholar] [CrossRef]
- Kramer, G.; Gastpar, M.; Gupta, P. Cooperative strategies and capacity theorems for relay networks. IEEE Trans. Inf. Theory 2005, 51, 3037–3063. [Google Scholar] [CrossRef]
- Gastpar, M. The Wyner-Ziv problem with multiple sources. IEEE Trans. Inf. Theory 2004, 50, 2762–2768. [Google Scholar] [CrossRef]
- Maric, I.; Goldsmith, A.; Medard, M. Multihop analog network coding via amplify-and-forward: The high SNR regime. IEEE Trans. Inf. Theory 2012, 58, 793–803. [Google Scholar] [CrossRef]
- Simmons, D.E.; Coon, J.P.; Warsi, N. Capacity and power scaling laws for finite antenna MIMO amplify-and-forward relay networks. IEEE Trans. Inf. Theory 2016, 62, 1993–2008. [Google Scholar] [CrossRef]
- Cover, T.M.; El Gamal, A. Capacity theorems for the relay channel. IEEE Trans. Inf. Theory 1979, 25, 572–584. [Google Scholar] [CrossRef]
- Schein, B.; Gallager, R. The Gaussian parallel relay network. In Proceedings of the 2000 IEEE International Symposium on Information Theory, Sorrento, Italy, 25–30 June 2000; p. 22. [Google Scholar]
- Durisi, G.; Koch, T.; Popovski, P. Toward massive, ultra-reliable, and low-latency wireless communication with short packets. Proc. IEEE 2016, 104, 1711–1726. [Google Scholar] [CrossRef]
- Ren, H.; Pan, C.; Deng, Y.; Elkashlan, M.; Nallanathan, A. Joint power and blocklength optimization for URLLC in a factory automation scenario. IEEE Trans. Wirel. Commun. 2020, 19, 1786–1801. [Google Scholar] [CrossRef]
- Yuan, L.; Yang, N.; Fang, F.; Ding, Z. Performance analysis of UAV-assisted short-packet cooperative communications. IEEE Trans. Veh. Technol. 2022, 71, 4471–4476. [Google Scholar] [CrossRef]
- Hu, Y.; Zhu, Y.; Gursoy, M.C.; Schmeink, A. SWIPT-enabled relaying in IoT networks operating with finite blocklength codes. IEEE J. Sel. Areas Commun. 2019, 37, 74–88. [Google Scholar] [CrossRef]
- Jee, A.; Agrawal, K.; Prakriya, S. A coordinated direct AF/DF relay-aided NOMA framework for low outage. IEEE Trans. Commun. 2022, 70, 1559–1579. [Google Scholar] [CrossRef]
- Jee, A.; Prakriya, S. Performance of energy and spectrally efficient AF relay-aided incremental CDRT NOMA-based IoT network with imperfect SIC for smart cities. IEEE Internet Things J. 2023, 10, 18766–18781. [Google Scholar] [CrossRef]
- Agrawal, K.; Jee, A.; Prakriya, S. Performance of SWIPT in cooperative networks with direct link and nonlinear energy harvesting at the battery-assisted relay. IEEE Trans. Green Commun. Netw. 2022, 6, 1198–1215. [Google Scholar] [CrossRef]
- Gamal, A.E.; Kim, Y.-H. Network Information Theory; Cambridge University Press: New York, NY, USA, 2012. [Google Scholar]
- Schalkwijk, J.; Kailath, T. A coding scheme for additive noise channels with feedback–I: No bandwidth constraint. IEEE Trans. Inf. Theory 1966, 12, 172–182. [Google Scholar] [CrossRef]
- Truong, L.V.; Fong, S.L.; Tan, V.Y.F. On Gaussian channels with feedback under expected power constraints and with non-vanishing error probabilities. IEEE Trans. Inf. Theory 2017, 63, 1746–1765. [Google Scholar] [CrossRef]
- Bross, S.I.; Wigger, M.A. On the Relay Channel With Receiver–Transmitter Feedback. IEEE Trans. Inf. Theory 2009, 55, 275–291. [Google Scholar] [CrossRef]
- Wyner, A.D. The Wire-Tap Channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
- Gunduz, D.; Brown, D.R.; Poor, H.V. Secret communication with feedback. In Proceedings of the International Symposium on Information Theory and Its Applications (ISITA), Auckland, New Zealand, 7–10 December 2008; pp. 1–6. [Google Scholar]
- Dai, B.; Li, C.; Liang, Y.; Ma, Z.; Shamai Shitz, S. Impact of action-dependent state and channel feedback on Gaussian wiretap channels. IEEE Trans. Inf. Theory 2020, 66, 3435–3455. [Google Scholar] [CrossRef]
- Li, C.; Liang, Y.; Poor, H.V.; Shamai, S. A coding scheme for colored Gaussian wiretap channels with feedback. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; pp. 131–135. [Google Scholar]
- Dai, B.; Li, C.; Liang, Y.; Ma, Z.; Shamai Shitz, S. Self-secure capacity-achieving feedback schemes of Gaussian multiple-access wiretap channels with degraded message sets. IEEE Trans. Inf. Forensics Secur. 2022, 17, 1583–1596. [Google Scholar] [CrossRef]
- Xia, D.; Yang, C.; Dai, B. Two-Way Full-Duplex Gaussian Channels With or Without Eavesdropper: Revisit. IEEE Trans. Commun. 2022, 70, 5434–5450. [Google Scholar] [CrossRef]
- Ben-Yishai, A.; Shayevitz, O. Interactive schemes for the AWGN channel with noisy feedback. IEEE Trans. Inf. Theory 2017, 63, 2409–2427. [Google Scholar] [CrossRef]
- Zamir, R. Lattice Coding for Signals and Networks; Cambridge University Press: Cambridge, UK, 2014. [Google Scholar]
- Laneman, J.N.; Tse, D.N.C.; Wornell, G.W. Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Trans. Inf. Theory 2004, 50, 3062–3080. [Google Scholar] [CrossRef]
- Tekin, E.; Yener, A. The Gaussian Multiple Access Wire-Tap Channel. IEEE Trans. Inf. Theory 2008, 54, 5747–5755. [Google Scholar] [CrossRef]
- Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hu, R.; Zhang, H.; Yang, H. Feedback Approach for the Relay Channel with Noisy Feedback and Its Security Analysis. Entropy 2024, 26, 651. https://doi.org/10.3390/e26080651
Hu R, Zhang H, Yang H. Feedback Approach for the Relay Channel with Noisy Feedback and Its Security Analysis. Entropy. 2024; 26(8):651. https://doi.org/10.3390/e26080651
Chicago/Turabian StyleHu, Rong, Haonan Zhang, and Huan Yang. 2024. "Feedback Approach for the Relay Channel with Noisy Feedback and Its Security Analysis" Entropy 26, no. 8: 651. https://doi.org/10.3390/e26080651