Next Article in Journal
Statistics as a Social Activity: Attitudes toward Amalgamating Evidence
Next Article in Special Issue
On the Interplay between Deadline-Constrained Traffic and the Number of Allowed Retransmissions in Random Access Networks
Previous Article in Journal
A Thermodynamic Study on Information Power in Communication Systems
Previous Article in Special Issue
Capacity Analysis of Hybrid Satellite–Terrestrial Systems with Selection Relaying
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Feedback Approach for the Relay Channel with Noisy Feedback and Its Security Analysis

1
School of Intelligence Technology, Geely University of China, Chengdu 610000, China
2
School of Information Science and Technology, Southwest JiaoTong University, Chengdu 610031, China
*
Author to whom correspondence should be addressed.
Current address: School of Intelligence Technology, Geely University of China, No. 123, Section 2, Chengjian Avenue, Eastern New District, Chengdu 641423, China.
Submission received: 8 June 2024 / Revised: 24 July 2024 / Accepted: 29 July 2024 / Published: 30 July 2024
(This article belongs to the Special Issue Information Theory and Coding for Wireless Communications II)

Abstract

:
Relay channels capture the essence of several important communication scenarios such as sensor network and satellite communication. In this paper, first, we propose an efficient coding scheme for an additive white Gaussian noise (AWGN) relay channel in the presence of AWGN feedback, which generalizes the conventional scheme for the AWGN relay channel with noiseless feedback by introducing a lattice-based strategy to eliminate the impact of the feedback channel noise on the performance of the original scheme. Next, we further extend the proposed scheme to the multi-input single-output (MISO) fading relay channel (FRC) with noisy feedback. The key to this extension is to use a pre-coding strategy to transform the MISO channel into a single-input single-output (SISO) channel and applying a two-dimensional lattice coding strategy to deal with the feedback fading channel noise. Finally, we analyze the security performance of our proposed scheme in several cases, and the results of this paper are further illustrated by numerical examples.

1. Introduction

The relay channel (RC), which captures the essence of satellite communication [1,2,3], receives much attention in the literature. To explore the fundamental limit of the transmission over the RC, in recent years, the studies [4,5,6,7,8,9,10], respectively, have extended the decode-and-forward (DF) strategy [11], the compress-and-forward (CF) strategy [11], and the amplify-and-forward (AF) strategy [12] for the single relay case to the RC. These extensions have provided corresponding lower bounds on the capacity of the RC according to these relay strategies.
Nowadays, ultra-reliable and low-latency communication (URLLC) [13] serves as one of the key technologies in fifth-generation (5G) wireless communications since it supports many critical services in 5G that require a high level of reliability and low latency. Recently, the study of URLLC in the RC has received much attention, which mainly focuses on performance analysis [14,15,16] and emerging wireless access techniques [17,18,19], evaluating key metrics such as transmission rates, latency, and reliability to improve RC performance. However, there is a notable lack of attention to the design of efficient, low-complexity coding schemes for RC. This gap highlights the need for further exploration into coding strategies that can reduce computational demands while maintaining or improving system performance.
Though channel feedback does not increase the memoryless channel capacity [20], it helps to construct an efficient coding scheme, such as the well-known Schalkwijk–Kailath (SK) scheme [21]. It has been shown that the SK scheme achieves a desired decoding error probability with extremely short coding blocklength [22], which indicates that it may be a good code for URLLC scenarios. Recently, ref. [23] extended the classical SK scheme [21] to the Gaussian relay channel (GRC) with noiseless feedback. In [23], the AF relay strategy and the classical SK coding scheme are combined, and to eliminate the impact of the relay noise on the performance of the original coding scheme, an auxiliary signal is generated, and the difference between the receiver’s received signal and this auxiliary signal is used for the receiver’s decoding. However, note that this SK-type scheme is based on noiseless feedback, which is unrealistic in practical communication scenarios. Then, it is natural to ask: can we extend the SK-type scheme in [23] to the noisy feedback case?
On the other hand, due to the broadcast nature of wireless communication, in recent years, physical layer security (PLS), which started from [24], has been proven to be a useful tool to deal with the eavesdropping problem in wireless communication. In [25], it has already been shown that the classical SK [21] scheme achieves perfect weak secrecy by itself, where the perfect weak secrecy is known as one standard for the PLS. This self-secure property has been extensively studied in the literature; see [26,27,28]. However, we should note that this property holds for the noiseless feedback case, and whether it also holds for the noisy feedback case remains unknown.
To answer the aforementioned questions, in this paper, we aim to extend the SK-type scheme to the GRC with noiseless feedback [23] to the wireless scenario and explore its security performance when an external eavesdropper is considered. First, we propose such an extended scheme for the additive white Gaussian noise (AWGN) RC in the presence of AWGN feedback, where the modulo-lattice function is introduced to mitigate the influence of noise within the feedback channel on the efficacy of the SK scheme.
Furthermore, the utilization of multiple-input, single-output (MISO) technology in satellite relay communications offers significant advantages in enhancing the performance and reliability of the communication system [2,3]. The above scenario can be modeled as using multiple transmitting antennas at the satellite and a single receiving antenna at the ground station and relay station. Then, another question is whether we can extend the scheme for the AWGN RC with AWGN feedback to the MISO fading relay channel (FRC) with noisy feedback. To this end, we further extend the proposed scheme to the MISO fading relay channel (FRC) with noisy feedback. In this extension scheme, to deal with the complex signals in the fading channel, we introduce the two-dimensional complex plane mapping method. Furthermore, the pre-coding strategy is used to transform the feedforward MISO channel into a complex-valued SISO channel, and the beamforming strategy is employed to convert the feedback single-input, multi-output (SIMO) channel into a complex-valued SISO channel. Then, following the scheme for the AWGN RC with AWGN feedback, the scheme for the MISO FRC with noisy feedback is obtained. Finally, we show that our extended scheme may achieve the PLS requirement for some cases.
The remainder of this paper is organized as follows. A formal definition of the RC with noisy feedback is introduced in Section 2. The proposed SK-type scheme for the AWGN RC with AWGN feedback is shown in Section 3. The extended SK-type scheme for the MISO fading RC with noisy feedback and its secrecy analysis are shown in Section 4. Numerical results are given in Section 5. Section 6 summarizes all results in this paper and discusses future works.

2. Model Formulation

The notations R  and  C  represent the real and complex space, respectively. The superscript  · H  denotes the conjugate transpose.  ·  represents the absolute value if applied to a complex number or the cardinality if applied to a set. And  ·  represents the  l 2 -norm of a vector.  Unif [ a , b ]  denotes uniform distribution in  [ a , b ] N ( 0 , σ 2 )  and  CN ( 0 , σ 2 ) , respectively, denote the Gaussian distribution and circularly symmetric complex Gaussian distribution with mean 0 and covariance  σ 2 . Y N = Y 1 , Y 2 , , Y N E ·  and  Var ·  represent statistical expectation and variance for random variables, respectively. The Gaussian Q-function is defined by  Q ( x ) = 1 2 π x e t 2 2 d t , and  Q 1 ( · )  is its inverse function. The log function takes base 2 in this paper.

2.1. The Gaussian Relay Channel with Noisy Feedback

In this subsection, the communication scenario is depicted in Figure 1a, which consists of a Source, a Relay, and a Destination. Source wishes to transmit the message to Destination with the help of Relay, and the message received by Destination can be sent to Source through an AWGN feedback channel. The channel gains of the Source–Relay channel, the Relay–Destination channel, the Source–Destination channel and the Destination–Source channel are denoted by  h s r , h r d , h s d , h d s , respectively.
So the channel inputs-outputs relationships are given by
Relay : Y r , n = h s r X n + η r , n , 1 n N , Destination : Y n = h s d X n + h r d X r , n + η n , 1 n N , Source : Y f , n = h d s X f , n + η f , n , 1 n N 1 .
where  X n  (resp.  Y n ) and  X r , n  (resp.  Y r , n ) are the feedforward inputs (resp. outputs), and  X f , n  and  Y f , n  are the feedback channel input and output, respectively. The channel noises of  η n , η r , n , η f , n  are independent and identically distributed (i.i.d.) as  N 0 , σ 2 N 0 , σ r 2 N 0 , σ f 2 , respectively.
Definition 1.
For the GRC with noisy feedback in Figure 1a, a ( N , | M | , P , P r , P f )-code with the average power constraints consist of:
  • A uniformly distributed message M, which takes values over the set  M = 1 , 2 , , M .
  • Encoder 1 with output  X n = f 1 , n M , Y f n 1 , where  f 1 , n ·  is an encoding function of Source at the time index  n 1 n N , satisfying the average power constraint  n = 1 N E X n 2 N P .
  • Relay with output  X r , n = f r , n Y r n 1 , where  f r , n ·  is an encoding function of Relay at time index  n 1 n N , satisfying the average power constraint  n = 1 N E X r , n 2 N P r .
  • Encoder 2 with output  X f , n = f 2 , n Y n , where  f 2 , n · is an encoding function of Destination at time index  n 1 n N 1 , satisfying the average feedback power constraint  n = 1 N 1 E X f , n 2 N 1 P f .
  • Decoder has output  M ^ = ψ Y N , where ψ is the decoding function of Destination. The average decoding error probability is defined as
    P e = 1 M m M Pr ψ Y N m | m was   sent .
Definition 2.
The rate R is said to be  N , ϵ -achievable if for given coding block length N and decoding error probability ϵ, there exists a    ( N , | M | , P , P r , P f ) -code described in Definition 1 such that
log M N R ϵ , P e ϵ .
The N , ϵ -capacity [29] of the GRC with noisy feedback is defined as the supremum over all achievable rates in Definition 2, denoted as  C GRC NFb N , ϵ .
Definition 3.
The modulo-d function [30,31] (also named the one-dimensional modulo-lattice function) is defined as
M d x = x d · y d + 1 2 ,
where  d > 0  is the step size of the one-dimensional modulo-lattice and  x  represents the largest integer that is smaller than x. Proposition 1 provides the properties of the modulo-d function [30,31].
Proposition 1
([30,31]).
(1) 
M d [ x ] [ d 2 , d 2 ) .
(2) 
M d [ M d [ x ] + y ] = M d [ x + y ] .
(3) 
if  x + y [ d 2 , d 2 ) ,
M d x + y = x + y ,
otherwise, a random error termed  a · d  is added to the right-hand side of (5) for  a 0 , which means that a modulo aliasing error has occurred.
(4) 
Let  ν Unif [ d 2 , d 2 ) M d [ x + y ] Unif [ d 2 , d 2 )  for any  x R  and  E [ ( M d [ x + ν ] ) 2 ] = d 2 / 12 .
(5) 
For any random variable Y that is statistically independent of ν,  M d [ Y + ν ]  is statistically independent of Y.

2.2. The MISO Fading Relay Channel with Noisy Feedback

The MISO FRC with noisy feedback studied in this subsection is also depicted in Figure 1b, which consists of a Source equipped with  B ( B > 1 )  antennas, a Relay, and a Destination with a single-antenna, respectively. The channel gains of the Source-=Relay channel, the Relay-=Destination channel, the Source=-Destination channel and the Destination-=Source channel are denoted by  h sr C 1 × B , h r d C 1 × 1 , h sd C 1 × B , h ds C B × 1 , respectively. In this work, the channels of these four links are independent and experience quasi-static fading; i.e., the channel state of each link is constant during one block and varies independently for the next.
So the channel input–output relationships are given by
Relay : Y r , n = h sr X n + η r , n , 1 n N , Destination : Y n = h sd X n + h r d X r , n + η n , 1 n N , Source : Y f , n = h ds X f , n + η f , n , 1 n N 1 ,
where  X n C B × 1  (resp.  Y n C 1 × 1 ) and  X r , n C 1 × 1  (resp.  Y r , n C 1 × 1 ) are the feedforward inputs (resp. outputs), and  X f , n C 1 × 1  and  Y f , n C B × 1  are the feedback channel input and output, respectively. The channel noises of  η n  and  η r , n  are i.i.d. as  N 0 , σ 2 N 0 , σ r 2 , respectively, and the elements of  η f , n C B × 1  are i.i.d. as  N 0 , σ f 2 .
Definition 4.
For the MISO FRC with noisy feedback in Figure 1b, a  ( N , | M | , P , P r , P f ) -code with the average power constraints consists of
  • A uniformly distributed message M, which takes values over the set  M = 1 , 2 , , M .
  • Encoder 1 with output  X n = f 1 , n ( M , Y f n 1 ) , where  f 1 , n ( · )  is an encoding function of Source at the time index  n ( 1 n N ) , satisfying the average power constraint  n = 1 N E [ X n H X n ] N P .
  • Relay with output  X r , n = f r , n ( Y r n 1 ) , where  f r , n ( · )  is an encoding function of Relay at time index  n ( 1 n N ) , satisfying the average power constraint  n = 1 N E [ | X r , n | 2 ] N P r .
  • Encoder 2 with output  X f , n = f 2 , n ( Y n ) , where  f 2 , n ( · )  is an encoding function of Destination at time index  n ( 1 n N 1 ) , satisfying the average feedback power constraint  n = 1 N 1 E [ | X f , n | 2 ] ( N 1 ) P f .
  • Decoder has output  M ^ = ψ ( Y N ) , where ψ is the decoding function of Destination. The average decoding error probability is also defined as (2).
Definition 5.
The rate R is said to be  N , ϵ -achievable if for given coding blocklength N and decoding error probability ϵ, there exists a  ( N , | M | , P , P r , P f ) -code described in Definition 4 such that (3). The  ( N , ϵ ) -capacity [29] of the FRC with noisy feedback is defined as the supremum over all achievable rates in Definition 4, denoted as  C FRC NFb ( N , ϵ ) .
Definition 6.
The two-dimensional modulo-lattice function [31] (modulo-Λ function) is defined as
M Λ X = def X Q Λ X ,
where  Λ = Λ R + j Λ I  is a complex plane with  Λ [ ± d 2 , ± j d 2 ) d > 0 , j is the imaginary unit,  X  is a complex-valued number, and  Q Λ [ X ]  is the nearest neighbor quantization of  X  with respect to Λ.
Proposition 2
([31]).
(1) 
The distributive law  M Λ [ M Λ [ X ] + Y ] = M Λ [ X + Y ] .
(2) 
If  X + Y Λ M Λ [ X + Y ] = X + Y ; otherwise, a modulo-aliasing error has occurred.
(3) 
Let the dither signal  V  be uniform over Λ; then,  M Λ [ X + V ]  is uniform over Λ, and  Var ( M Λ [ X + V ] ) = d 2 / 12 + d 2 / 12 = d 2 / 6 .
(4) 
For any random variable  X  that is statistically independent of the dither signal  V M Λ [ X + V ]  is statistically independent of  X .

3. An SK-Type Feedback Scheme for the Gaussian Relay Channel with Noisy Feedback

In this section, an SK-type feedback scheme for the Gaussian relay channel with noisy feedback is proposed. The key to this scheme involves the introduction of the modulo-lattice function to mitigate the impact of feedback channel noise on the performance of the SK-type scheme. Additionally, an auxiliary signal is generated at the receiver, which is the receiver’s estimation of the output of the AF strategy-based relay node, and using a difference between the received signal and this auxiliary signal to do the receiver’s MMSE about the transmitted message. The main result and details about this scheme are given below.

3.1. Main Result

Theorem 1.
For given coding blocklength N and decoding error probability ϵ, the lower bound on the   N , ϵ -capacity  C GRC NFb N , ϵ of the GRC with noisy feedback is given by
C GRC NFb ( N , ϵ ) R GRC NFb ( N , ϵ ) = R GRC * ( N , ϵ ) R GRC ( N , ϵ ) ,
where
R GRC * ( N , ϵ ) = 1 2 log 1 + h s d P ϕ + h s r h r d β P ρ * 2 Γ ,
R GRC ( N , ϵ ) = 1 N 2 R GRC * ( N , ϵ ) + log μ ,
ϕ = P f h d s 2 P f h d s 2 L σ f 2 ,
L = 1 3 Q 1 ϵ 4 N 1 2 ,
β = P r h s r 2 P + σ r 2 ,
μ = 2 Q 1 ϵ 4 σ 2 12 P h s d 2 1 + h s d 2 P ϕ h s d 2 P 1 1 ϕ + σ 2 1 ,
Γ = h s r 2 h r d 2 β 2 P 1 1 ϕ 1 1 A ρ * 2 ρ * 2 + F ,
F = h s d 2 P 1 1 ϕ + h r d 2 β 2 σ r 2 + σ 2 ,
and the correlation coefficient  ρ *  is given by the unique solution in [0, 1] of the following equation:
ρ 2 = A ρ 2 ϕ × 1 + h s d P ϕ + h s r h r d β P ρ 2 h s r 2 h r d 2 β 2 P 1 1 ϕ 1 1 A ρ 2 ρ 2 + F 1 ,
A ρ = 1 + P h s d h s d 1 ϕ + h s r h r d β ρ 1 ϕ ϕ h s r 2 h r d 2 β 2 P 1 1 ϕ 1 1 A ρ 2 ρ 2 + F .
Remark 1.
When the blocklength N is sufficiently large, the achievable rate  R GRC NFb N , ϵ  approaches  R GRC * N , ϵ , which is given in (9).
Remark 2.
The upper bound  R GRC PFb  of the GRC with noisy feedback is given in [23], where
R GRC PFb = 1 2 log 1 + P h s d + h s r h r d β ρ * 2 h r d 2 β 2 σ r 2 + σ 2 ,
ρ *  is the unique solution in  0 , 1  of the following equation
ρ 2 = 1 + P h s d + h s r h r d β ρ 2 h r d 2 β 2 σ r 2 + σ 2 1 .
For the GRC with noisy feedback, letting the power of the feedback channel  P f  be sufficiently large, from (11), (15) and (18), we conclude that
lim P f ϕ = 1 , lim P f A ρ = 1 , lim P f Γ = h r d 2 β 2 σ r 2 + σ 2 .
Substituting (21) into (17), we conclude that (17) can be rewritten as (20). Combined with Remark 1, as N increases,    R GRC NFb N , ϵ  in Theorem 1 approaches   R GRC PFb  in (19).

3.2. Our Achievable Scheme

3.2.1. Message Mapping Method

For a given coding blocklength N and decoding error probability  ϵ , let  M = 2 N R ( N , ϵ ) , where M is the transmitted message uniformly distributed over the set  M = { 1 , 2 , , 2 N R ( N , ϵ ) } . Divide the interval  0.5 , 0.5  into  2 N R ( N , ϵ )  equally spaced sub-intervals, and the center of each sub-interval is mapped one-to-one to a message value in  M . Let  θ  be the center of each sub-interval with respect to the message M. Since M is equi-probably distributed over the set  M θ  is approximately uniformly distributed over the interval  0.5 , 0.5  (i.e.,  θ Unif 0.5 , 0.5 ) and has a variance of approximately  1 / 12 , i.e.,  E [ θ 2 ] = 1 / 12 .

3.2.2. Dither Signal for the Feedback Channel Power Constaint

In the proposed scheme, we introduce a dither signal  ν n ( 1 n N 1 )  to ensure the transmitted codewords satisfy the feedback channel’s power constraint at time n. Here  ν n  is perfectly known by Source, and it is i.i.d. generated and uniformly distributed over  [ d / 2 , d / 2 ) . In addition,  γ n ( 1 n N 1 )  is chosen to avoid modulo-aliasing errors occurring in Source.

3.2.3. Coding Procedure

At time instant 1, Source transmits
X 1 = 12 P θ ,
where  E [ X 1 2 ] = P , which satisfies the average power constraint of Source.
Meanwhile, Relay remains quiet, and Destination obtains the first output signal
Y 1 = h s d X 1 + η 1 = h s d 12 P θ + η 1 ,
then computes the first estimation of  θ  by
θ ^ 1 = Y 1 h s d 12 P = θ + η 1 h s d 12 P θ + ε 1 ,
where  ε 1  is the first estimation error, denoted by
ε 1 θ ^ 1 θ = η 1 h s d 12 P ,
and its variance is
α 1 Var ε 1 = σ 2 12 P h s d 2 .
Then, Destination encodes
X f , 1 = M d γ 1 θ ^ 1 + ν 1 ,
and sends  X f , 1  back to Source. Here from Property (1) of Proposition 1 and  d = 12 P f , the power constraint of  X f , 1  satisfies  P f .
Then Source receives the feedback signal
Y f , 1 = h d s X f , 1 + η f , 1 = h d s M d γ 1 θ ^ 1 + ν 1 + η f , 1 .
At time 2, by using the feedback signals  Y f , 1  (see (28)), Source firstly computes the noisy versions of the Destination’s estimation errors, i.e.,
ε f , 1 = 1 γ 1 M d 1 h d s Y f , 1 γ 1 θ ν 1 = ( a ) 1 γ 1 M d M d γ 1 θ ^ 1 + ν 1 + η f , 1 h ds γ 1 θ ν 1 = ( b ) 1 γ 1 M d γ 1 ε 1 + η f , 1 h d s ,
where  ( a )  follows from (28),  ( b )  follows from Property (1) of Proposition 1 and the fact that  ε 1 = θ ^ 1 θ . In accordance with (4), we know that if  γ 1 ε 1 + η f , 1 / h d s d / 2 , d / 2 , (29) can be rewritten by
ε f , 1 = 1 γ 1 M d γ 1 ε 1 + η f , 1 h d s = ε 1 + η f , 1 γ 1 h d s ,
otherwise, it implies that a modulo-aliasing error does occur in Source. Hence understanding how to choose the modulation coefficient  γ 1  is crucial to avoid the modulo-aliasing error.
After decoding  ε f , 1 , Source sends
X 2 = P α f , 1 ε f , 1 ,
where  α f , 1 Var ε f , 1 , and  E [ X 2 2 ] = P , which satisfies the average power constraint of Source.
At this time instant, Relay also keeps quiet. And once it receives
Y 2 = h s d X 2 + η 2 = h s d P α f , 1 ε f , 1 + η 2 ,
Destination carries out the MMSE of  ε 1  based on  Y 2  and updates the estimation of  θ  by computing
θ ^ 2 = θ ^ 1 E ε 1 Y 2 E Y 2 2 Y 2 = θ + ε 1 E ε 1 Y 2 E Y 2 2 Y 2 = θ + ε 2 ,
where the second estimation error  ε 2  is denoted as
ε 2 = ε 1 E ε 1 Y 2 E Y 2 2 Y 2 ,
and the variance of the estimation error is denoted as
α 2 Var ε 2 .
Iteration:
At time instant  n 1 ( 3 n N ) , Destination sends
X f , n 1 = M d γ n 1 θ ^ n 1 + ν n 1
back to Source.
At time  n ( 3 n N ) , once it receives the feedback signals
Y f , n 1 = h d s M d γ n 1 θ ^ n 1 + ν n 1 + η n 1 ,
Source computes the noisy version of the Destination’s estimation errors, i.e.,
ε f , n 1 = 1 γ n 1 M d 1 h d s Y f , n 1 γ n 1 θ ν n 1 = ( a ) 1 γ n 1 M d γ n 1 ε n 1 + η f , n 1 h d s = ( b ) ε n 1 + η f , n 1 γ n 1 h d s ,
where  ( a )  follows from (37), Property (1) of Proposition 1 and the fact that  ε n 1 = θ ^ n 1 θ ( b )  follows from  γ n 1 ε n 1 + η f , n 1 / h d s d / 2 , d / 2 , which means that modulo-aliasing error does not occur in Source.
After decoding  ε f , n 1 , Source transmits
X n = P α f , n 1 ε f , n 1 ,
where  α f , n 1 Var ε f , n 1 , and  E [ X n 2 ] = P , which satisfies the average power constraint of Source.
At time instant  n ( 3 n N ) , Relay does not remain quiet and transmits the received messages from Source to Destination through an AF strategy, that is, it transmits a scaled version of its observation in the previous step, i.e.,
X r , n = β Y r , n 1 = β h s r X n 1 + η r , n 1 = β h s r P α f , n 2 ε f , n 2 + η r , n 1 ,
where the scaling factor is chosen as
β = P r h s r 2 P + σ r 2 ,
and  E [ X r , n 2 ] = β 2 E [ Y r , n 1 2 ] = P r , which satisfies the average power constraint of Relay.
So, Destination obtains the n-th channel output signal
Y n = h s d X n + h r d X r , n + η n = h s d P α f , n 1 ε f , n 1 + β h s r h r d P α f , n 2 ε f , n 2 + β h rd η r , n 1 + η n .
Upon receiving  Y n , Destination first computes the auxiliary signal, that is,
Y ^ n = h s r h r d β P α f , n 2 ε ^ n 2 ,
and this auxiliary signal  Y ^ n  will be used to form the innovation  I n  based on the fact that  ε n 1 = ε n 2 ε ^ n 2 ,
I n Y n Y ^ n = h s d P α f , n 1 ε f , n 1 + h s r h r d β P α f , n 2 ε n 1 + h s r h r d β P α f , n 2 η f , n 2 γ n 2 h d s + β h r d η r , n 1 + η n .
and it carries out the MMSE of  ϵ n 1  based on  I n , then updates the estimation of  θ  by computing
θ ^ n = θ ^ n 1 E ε n 1 I n E I n 2 I n = θ + ε n ,
where the estimation error of  θ  is denoted as
ε n = ε n 1 E ε n 1 I n E I n 2 I n ,
and the variance of the estimation error is denoted as
α n Var ε n .
At time instant N, Destination computes the final estimation
θ ^ N = θ + ε N .
According to the mapping method in Section 3.2.1, if the final estimation error is given by
ε N 0.5 2 N R N , ϵ , 0.5 2 N R N , ϵ ,
the final estimation  θ ^ N  is closest to the transmitted point  θ , and thus Destination successfully decodes the transmitted message M.
For better understanding, the schematic diagram of the above proposed scheme is shown in Figure 2.
Proof. 
The detailed proof is given in Appendix A. □

4. An SK-Type Scheme for the MISO Fading Relay Channel with Noisy Feedback and Its Security Analysis

In this section, an SK-type scheme for the MISO fading relay channel with noisy feedback is proposed. In this extension scheme, to deal with complex signals in the fading channel, we introduce the two-dimensional complex plane mapping method. Furthermoreavesdropper does not know t, a pre-coding strategy is used to transform the feedforward MISO channel into a complex-valued SISO channel, while a beamforming strategy is used to transform the feedback SIMO channel into a complex-valued SISO channel. Consequently, by following the scheme for the AWGN RC with AWGN feedback, we obtain the scheme for the MISO FRC with noisy feedback. The main result and security analysis of this extension scheme are given below.

4.1. Main Result

Theorem 2.
For given coding blocklength N and decoding error probability ϵ, the lower bound on the  N , ϵ -capacity   C FRC NFb N , ϵ  of the FRC with noisy feedback is given by
C FRC NFb ( N , ϵ ) R FRC NFb ( N , ϵ ) = R FRC * ( N , ϵ ) R FRC ( N , ϵ ) ,
where
R FRC * ( N , ϵ ) = 1 2 log 1 + h sd P Φ + h sr · h r d β P ρ * 2 Γ ,
R FRC ( N , ϵ ) = 1 N 2 R FRC * ( N , ϵ ) + log λ ,
Φ = P f h ds 2 P f h ds 2 L σ f 2 ,
L = 1 3 Q 1 ϵ 8 N 1 2 ,
β = P r h sr 2 P + σ r 2 ,
λ = Q 1 ϵ 8 σ 2 3 P h sd 2 1 + h sd 2 P Φ h sd 2 P 1 1 Φ + σ 2 1 ,
Γ = h sr 2 h r d 2 β 2 P 1 1 Φ 1 1 A ρ * 2 ρ * 2 + F ,
F = h sd 2 P 1 1 Φ + h r d 2 β 2 σ r 2 + σ 2 ,
and the correlation coefficient  ρ *  is given by the unique solution in [0, 1] of the following equation
ρ 2 = A ρ 2 Φ × 1 + h sd P Φ + h sr · h r d β P ρ 2 h sr 2 h r d 2 β 2 P 1 1 Φ 1 1 A ρ 2 ρ 2 + F 1 ,
A ρ = 1 + P h sd h sd 1 Φ + h sr · h r d β ρ 1 Φ Φ h sr 2 h r d 2 β 2 P 1 1 Φ 1 1 A ρ 2 ρ 2 + F .
Remark 3.
When the blocklength N is sufficiently large, the achievable rate  R FRC NFb N , ϵ  approaches  R FRC * N , ϵ , which is given in (51).
Remark 4.
For the MISO FRC without feedback, the AF lower bound  R FRC AF  is given by [32], i.e.,
R FRC AF = log 1 + h sd 2 P σ 2 + h sr 2 P σ r 2 · h r d 2 P r σ 2 h sr 2 P σ r 2 + h r d 2 P r σ 2 + 1 .
Proof. 
The detailed proof is given in Appendix B. □

4.2. Security Analysis of the Proposed Extended Scheme

The communication scenario is similar to Figure 1b, except that the existence of Eavesdropper equipped with  B ( B > 1 )  antennas. The information-theoretic schematic diagram is depicted in Figure 3. We assume that Eavesdropper can simultaneously eavesdrop on the signals of both the forward and feedback channels. Here, the channel gains of the Source–Eavesdropper channel, the Relay–Eavesdropper channel and the Destination–Eavesdropper channel are, respectively, denoted by  g se C D × B , g re C D × 1 , g de C D × 1 . We assume that these three links are independent of each other and experience quasi-static fading.
So, the signals received by Eavesdropper are given by
Z n = g se X n + g re X r , n + η e , n , 1 n N , Z f , n = g de X f , n + η f e , n , 1 n N 1 ,
where  Z n , Z f , n C D × 1 X n C B × 1 , X r , n C 1 × 1 , X f , n C 1 × 1  represent the input of Source, Relay and Destination, respectively.  η e , n CN ( 0 , σ e 2 ) , η f e , n CN ( 0 , σ f e 2 )  are the channel noise, which are i.i.d. across the time index n.
Definition 7. 
Following the secrecy criteria defined in [33], a normalized eavesdropper’s equivocation (also called the secrecy level) is adopted in this paper and is given by
Δ = H M | Z 1 N , Z f , 1 N 1 , h , g H M , 0 Δ 1 ,
where  Z 1 N = ( Z 1 , Z 2 , , Z N ) Z f , 1 N 1 = ( Z f , 1 , Z f , 2 , , Z f , N 1 ) h = ( h sr , h r d , h sd , h ds ) g = ( g se , g re , g de ) . Here, note that  Δ = 1  corresponds to perfect secrecy, indicating that Eavesdropper cannot obtain any useful information, which was first introduced in [34], and  Δ = 0  corresponds to no secrecy constraint.
Furthermore, in terms of whether Eavesdropper is powerful enough to acquire the complex dither signal sequence  V 1 N 1  shared between legal parties in our scheme, we define the following two cases.
  • Case I: Eavesdropper does not know the complex dither signal sequence  V 1 N 1 , and the secrecy level is defined by
    Δ I = H M | Z 1 N , Z f , 1 N 1 , h , g H M , 0 Δ I 1 .
  • Case II: Eavesdropper knows the complex dither signal sequence  V 1 N 1 , and the secrecy level is defined by
    Δ I I = H M | Z 1 N , Z f , 1 N 1 , V 1 N 1 , h , g H M , 0 Δ I I 1 .
Theorem 3.
For given coding blocklength N and decoding error probability ϵ, the secrecy levels  Δ I  and  Δ I I  of the proposed scheme are, respectively, lower-bounded by
Δ I 1 κ 1 N R FRC NFb N , ϵ , Δ I I 1 κ 1 + κ 2 N R FRC NFb N , ϵ ,
where
κ 1 = l o g 1 + h sd · g se H 2 P h sd 2 σ e 2 , κ 2 = N 1 l o g 1 + g de 2 P f σ f e 2 ,
Note that  κ 1  and  κ 2 , respectively, represent the information leaked in Source at time 1 and in the feedback channel from time 1 to  N 1 .
Proof. 
The detailed proof is given in Appendix C. □

5. Numerical Results

The aim of these numerical results is to evaluate the performance of our proposed schemes versus different parameters. Here, note that the simulation results for the fading scenario are based on an average of 1000 independent channel realizations.
Figure 4 shows the performance analysis of the SK-Type scheme for the GRC with noisy feedback. Here, the achievable rate  R GRC NFb ( N , ϵ )  of this proposed scheme is given in (8). In Figure 4a, we show the relationship between the achievable rate  R GRC NFb ( N , ϵ ) , the coding blocklength N and the decoding error probability  ϵ . From Figure 4a, we see that when the coding blocklength N and the decoding error probability  ϵ  increase, the achievable rate  R GRC NFb ( N , ϵ )  also increases. Figure 4b depicts the relationship between the achievable rate  R GRC NFb ( N , ϵ )  and its asymptotic value  R GRC * ( N , ϵ ) . Figure 4b shows that as blocklength N increases, there exists an asymptotic value  R GRC * ( N , ϵ )  for the achievable rate  R GRC NFb ( N , ϵ ) . And as blocklength N and the power of the feedback channel  P f  increase, it will approach its asymptotic value more closely. This simulation result is the same as the theoretical result in Remark 1. Figure 4c illustrates the relationship between the relative rate  Δ R  and the relative power  Δ P , where the relative rate  Δ R  and the relative power  Δ P  are, respectively, defined as
Δ R = R GRC NFb N , ϵ R GRC PFb , Δ P = P f P
where  R GRC NFb N , ϵ  is given in (8) and  R GRC PFb  is given in (19). From Figure 4c, it shows that when the power of the Destination–Source feedback channel  P f  is sufficiently large, the achievable rate  R GRC NFb N , ϵ  of the noisy feedback scheme in Theorem 1 approaches the rate  R GRC PFb  of the noiseless feedback scheme in [23].
Figure 5 shows the performance analysis of the SK-Type scheme for the MISO FRC with noisy feedback. Here, the achievable rate  R FRC NFb ( N , ϵ )  of this proposed scheme is given in (50). The conclusions drawn in Figure 4a,b are consistent with the results in the Gaussian case; i.e, when the coding blocklength N and the decoding error probability  ϵ  increase, the achievable rate  R FRC NFb ( N , ϵ )  also increases. And as blocklength N increases, there exists an asymptotic value  R FRC * ( N , ϵ )  for the achievable rate  R FRC NFb ( N , ϵ ) . Figure 5c illustrates the influence of the number of the Source’s antennas B on the achievable rate  R FRC NFb ( N , ϵ )  in the proposed SK-Type coding scheme. From Figure 5c, we conclude that as the number of the Source’s antennas B increases, the achievable rate  R FRC NFb ( N , ϵ )  also increases, which indicates that the number of the Source’s antennas B can bring a gain to the achievable rate  R FRC NFb ( N , ϵ )  of our proposed SK-Type coding scheme. Figure 5d compares the achievable rates of the SK-Type coding scheme for the MISO FRC with noisy feedback and the scheme without feedback [32], where both Relays use the AF strategy. Figure 5d shows that our proposed scheme can significantly enhance the achievable rate even in the presence of noise in the feedback channel.
Figure 6 shows the relationship between secrecy level  Δ , blocklength N and decoding error probability  ϵ  of the proposed SK-Type FBL coding scheme for the MISO FRC with noisy feedback and in the presence of Eavesdropper. From Figure 6a,b, we see that both the secrecy level in Case I  Δ I  and Case II  Δ I I  increase with the increase of the blocklength N and decoding error probability  P e . To be specific, when the blocklength  N = 60  and decoding error probability  ϵ = 10 3 , the secrecy level in case I  Δ I  has already exceeded 0.99 (secrecy level equal to 1 corresponds to perfect secrecy). However, under the same parameters, the secrecy level in case II  Δ I I  only approaches 0.7. This result indicates that the maximum secrecy level achieved in case I (Eavesdropper does not know the complex dither signal sequence  V 1 N 1 ) is superior to that of case II (Eavesdropper knows complex dither signal sequence  V 1 N 1 ), which is consistent with the theoretical analysis.
Figure 7 shows the relationship between the secrecy level  Δ  and blocklength N under various powers of the proposed SK-Type FBL coding scheme. Figure 7a compares the secrecy level in Case I  Δ I  under different powers of Source encoder P. It is easy to see that secrecy level in Case I  Δ I  approaches perfect secrecy when the blocklength N is about 100, and a larger P causes secrecy performance degradation on small N. Figure 7b, plots secrecy level in Case II  Δ I I  under several powers of the feedback channel  P f . From this figure, we can see that the secrecy level in Case II  Δ I I  of the proposed scheme cannot achieve perfect secrecy in general cases. Actually, only when the channel quality of Destination-Eavesdropper is much poorer (i.e.,  σ f e 2 P f ), the secrecy level in Case II  Δ I I  may approach 1 as the blocklength N tends to infinity.

6. Conclusions and Future Work

In this paper, we first proposed an SK-Type FBL coding scheme for the GRC with noisy feedback by introducing the lattice-based strategy to reduce the impact of the feedback channel noise. Numerical results show that when the power of the feedback channel is sufficiently large, the achievable rate almost approaches the rate of the GRC with noiseless feedback, and the required blocklength to achieve a desired decoding error probability is significantly short. Then, based on this scheme, we extended it to the MISO FRC with noisy feedback. The essence of this proposed scheme is to further extend the original real number scheme to the complex number. Simulation results show that even if there is noise in the feedback channel, this proposed scheme can still significantly improve the achievable rate of the MISO FRC without feedback. Finally, for the above MISO FRC with the noisy feedback model, we further consider multi-antenna Eavesdropper and derive a lower bound of the secrecy level in different cases by calculating the equivocation rate when Eavesdropper knows the complex dither signal sequence or not. We show that though perfect secrecy cannot be achieved in the noisy feedback model, it almost approaches perfect secrecy for some special cases. One possible future work is to extend this scheme to the fading MIMO case.

Author Contributions

Formal analysis, H.Y.; writing—original draft, R.H.; writing—review and editing, H.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author due to (specify the reason for the restriction).

Acknowledgments

Authors would like to thank anonymous reviewers for careful reading of the manuscript and providing constructive comments and suggestions, which have helped them to improve the quality of the paper.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. Coefficient’s Derivation and Error Probability Analysis of Theorem 1

Let  M ^  be the estimate of the transmitted message M, the decoder declares an error if  M ^ M . To determine the parameters, we need to analyze the error event in  P e . And the error events of the SK-Type FBL approach for the GRC with noisy feedback are described in Section 3.2.3, consisting of
(1)
A modulo-aliasing error occurs in Source at time instant  n ( 1 n N 1 ) . The event is defined as
C n γ n ε n + η f , n h ds d 2 , d 2 .
(2)
A decoding error occurs in Destination at time instant N. The event is defined as
C N ε N 0.5 2 N R N , ϵ , 0.5 2 N R N , ϵ .
Hence, by applying the union bound, we can derive
P e Pr n = 1 N C n = Pr n = 1 N 1 C n + Pr n = 1 N 1 C ¯ n C N = n = 1 N 1 Pr i = 1 n 1 C ¯ i C n + Pr n = 1 N 1 C ¯ n C N n = 1 N 1 Pr C ˜ n + Pr C ˜ N ,
where  C ¯  denotes the complement of the set C C ˜ n i = 1 n 1 C ¯ i C n C ˜ N = n = 1 N 1 C ¯ n C N Pr ( C ˜ n ) ( 1 n N 1 )  represents the error probability that a modulo-aliasing occurs in Source at time instant n when there is no error occurring in all previous times, and  Pr ( C ˜ N )  represents the error probability of the final decoding without any modulo-aliasing error occurring in Source before time instance N.
For a given decoding error probability  ϵ , let
Pr C ˜ N = ϵ 2 , Pr C ˜ n = ϵ 2 N 1 .
For the event  C ˜ n ( 1 n N 1 ) , since no modulo-aliasing error occurs before time instant n, from (A1) and the fact that  η f , n  is Gaussian-distributed, we conclude that  γ n ε n + η f , n / h ds N ( 0 , γ n 2 α n + σ f 2 / h ds 2 ) . From (A1), (A4) and  d = 12 P f , we have
Pr C ˜ n = Pr γ n ε n + η f , n h ds d 2 , d 2 = 2 Q 3 P f γ n 2 α n + σ f 2 h d s 2 .
To simplify the calculation, we introduce a looseness parameter  L , which is denoted by
L P f γ n 2 α n + σ f 2 h d s 2 = 1 3 Q 1 ϵ 4 N 1 2 .
Substituting (A4) and (A6) into (A5), we determine the appropriate selection of coefficient  γ n ( 1 n N 1 ) ,
γ n = P f L σ f 2 h d s 2 1 α n .
According to (38), we obtain
α f , n Var ε f , n = ( a ) α n + σ f 2 γ n 2 h d s 2 = ( b ) α n P f h d s 2 P f h d s 2 L σ f 2 = ( c ) α n ϕ ,
where  ( a )  follows from the fact that  η f , n  is dependent on  ε n ( b )  follows from (A7), and  ( c )  follows from  ϕ P f h d s 2 P f h d s 2 L σ f 2 .
To derive the achievable rate of this SK-type scheme, we focus on the final estimation error. At time instant 1, the estimation error and its variance are given in (25) and (26). So we consider the second moment and the following moments.
At time instant 2, we first need to calculate the MMSE estimation coefficient of Destination based on  Y 2 , that is,
E ε 1 Y 2 = h s d P ϕ α 1 , E Y 2 2 = h s d 2 P ϕ + h s d 2 P 1 1 ϕ + σ 2 ,
and the estimation error is given in (34). So, the variance of  ε 2  is
α 2 Var ε 2 = α 1 E ε 1 Y 2 2 E Y 2 2 = α 1 1 + h s d 2 P ϕ h s d 2 P 1 1 ϕ + σ 2 1 ,
where  α 1  is given in (26).
At time instant  n ( 3 n N ) , similar to the second moment, we also calculate the MMSE estimation coefficient of Destination based on  I n  instead of  Y n ; that is,
E ε n 1 I n = α n 1 h s d P ϕ + h s r h r d β P ρ n 1 , E I n 2 = h s d P ϕ + h s r h r d β P ρ n 1 2 + h s r 2 h r d 2 β 2 P 1 1 ϕ 1 1 A n 1 2 ρ n 1 2 + F ,
where  F = h s d 2 P 1 1 ϕ + h r d 2 β 2 σ r 2 + σ 2 .
The estimation error at time instant  n ( 3 n N )  is given in (46), so the variance of  ε n  is
α n Var ε n = α n 1 E ε n 1 I n 2 E I n 2 = α n 1 × 1 + h s d P ϕ + h s r h r d β P ρ n 1 2 h s r 2 h r d 2 β 2 P 1 1 ϕ 1 1 A n 1 2 ρ n 1 2 + F 1 ,
where  ρ n 1  is the correlation coefficient between  ε n 1  and  ε f , n 2 , denoted by
ρ n 1 E ε n 1 ε f , n 2 α n 1 α f , n 2 = A n 1 α n 1 α f , n 2 ,
and
A n 1 = 1 + P h s d h s d 1 ϕ + h s r h r d β ρ n 2 1 ϕ ϕ h s r 2 h r d 2 β 2 P 1 1 ϕ 1 1 A n 2 2 ρ n 2 2 + F .
It is worth noting that the initial value of  ρ n 1  is given by
ρ 2 = σ 2 h s d 2 P 1 1 ϕ + σ 2 α 2 α 1 ϕ .
From (A13) and (A14), it is apparent that  ρ n ρ n 1 . By applying Cesáro’s Mean Theorem in [20] to the  ρ n , it follows that this sequence will converge to a unique fixed point in  0 , 1 . Hence, we obtain the following equation
ρ 2 = A ρ 2 ϕ × 1 + h s d P ϕ + h s r h r d β P ρ 2 h s r 2 h r d 2 β 2 P 1 1 ϕ 1 1 A ρ 2 ρ 2 + F 1 ,
where
A ρ = 1 + P h s d h s d 1 ϕ + h s r h r d β ρ 1 ϕ ϕ h s r 2 h r d 2 β 2 P 1 1 ϕ 1 1 A ρ 2 ρ 2 + F .
Let  ρ *  be defined as the unique solution within  0 , 1  of (A16). Then, according to (A12), the variance of the final estimation error  ε N  is as follows
α N = α 2 1 + h s d P ϕ + h s r h r d β P ρ * 2 Γ 2 N ,
where
Γ = h s r 2 h r d 2 β 2 P 1 1 ϕ 1 1 A ρ * 2 ρ * 2 + F .
Next, according to (A2) and (A4), we have
Pr C ˜ N = Pr ε N 0.5 2 N R N , ϵ , 0.5 2 N R N , ϵ = 2 Q 0.5 2 N R N , ϵ α N = ϵ 2 .
Substituting (A18) and (A19) into (A20), we obtain
R GRC NFb ( N , ϵ ) = R GRC * ( N , ϵ ) R GRC ( N , ϵ ) ,
where  R GRC * ( N , ϵ )  and  R GRC ( N , ϵ )  are, respectively, given in (9) and (10). It should be noted that  R GRC * ( N , ϵ )  represents the maximum achievable rate when blocklength N is sufficiently large. And  R GRC ( N , ϵ )  represents the achievable rate loss caused by given blocklength N and decoding error probability  ϵ .

Appendix B. Proof of Theorem 2

Appendix B.1. Channel Transformation Strategy

Pre-coding strategy for the feedforward MISO channels: At time instant  n ( 1 n N ) , the output signal received by Destination is given in (6). Let
X n = h sd H h sd X n X n = h sd h sd X n , X r , n = h r d H h r d X r , n X r , n = h r d h r d X r , n ,
where  h sd C 1 × B , h r d C 1 × 1 , X n C 1 × 1 , X r , n C 1 × 1 , and
E X n H X n = E X n H h sd h sd · h sd H X n h sd = E | X n | 2 = P , E X r , n X r , n H = E h r d X r , n h r d · X r , n H h rd H h r d = E X r , n X r , n H = P r ,
which indicates that the power constraint of  X n  and  X r , n  are exactly the same as that of  X n , X r , n , respectively. Therefore, by substituting (A22) into (6), the signal received by Destination can be further expressed as
Y n = h sd X n + h r d X r , n + η n , Y n = h sd h sd H h sd X n + h r d h r d H h r d X r , n + η n , Y n = h sd X n + h r d X r , n + η n .
Specifically, the link from Source to Relay is also a MISO channel, and the messages sent by Source and Relay are related. So, at time instant  n 1 n N , the signal received by Relay can be further expressed as
Y r , n = h sr X n + η r , n = h sr h sd H h sd X n + η r , n , h sd h sr H h sd · h sr Y r , n = h sr X n + h sd h sr H h sd · h sr η r , n , Y r , n = h sr X n + η r , n ,
where  h sr C 1 × B , h sd C 1 × B , X n C 1 × 1 , and
Y r , n = h sd h sr H h sd · h sr Y r , n , η r , n = h sd h sr H h sd · h sr η r , n ,
Y r , n C 1 × 1 , η r , n C 1 × 1 CN ( 0 , σ r 2 ) . It indicates that the complex-valued feedforward MISO FRC can be transformed into a complex-valued single-input single-output (SISO) FRC case.
Beamforming strategy for the feedback SIMO channel: At time  n 1 n N 1 , the signal received by Source (see (6)) can be proceeded as
Y f , n = h ds X f , n + η f , n , h ds H h ds 2 Y f , n = X f , n + h ds H h ds 2 η f , n , Y f , n = X f , n + η f , n ,
where  h ds C B × 1 , X f , n C 1 × 1 , Y f , n = h ds H Y f , n h ds 2 C 1 × 1 , η f , n = h ds H η f , n h ds 2 C 1 × 1 CN ( 0 , σ f 2 h ds 2 ) . This indicates that the complex-valued feedback SIMO channel can be transformed into complex-valued SISO channels.
Therefore, according to (A24), (A25) and (A27), we complete the transformation of MISO FRC with noisy feedback into the SISO FRC with noisy feedback.

Appendix B.2. Message Mapping Method

In the proposed SK-Type FBL scheme for the MISO FRC with noisy feedback, we extend the one-dimensional real number axis mapping in the GRC with noisy feedback to the two-dimensional complex plane mapping. To be specific, for given coding blocklength N and decoding error probability  ϵ , let  | M | = 2 N R ( N , ϵ ) , where M is the transmitted message uniformly distributed over the set  M = { 1 , 2 , , 2 N R ( N , ϵ ) } . We divide a complex plane region  [ ± 0.5 , ± 0.5 j ]  into  2 N R N , ϵ  equally spaced sub-complex plane regions with both the length and width of each sub-complex plane region being  2 N R ( N , ϵ ) / 2 . The message M is one-to-one mapped to the center point of each sub-complex plane region, denoted as  Θ = θ R + j θ I , where  θ R  and  θ I , respectively, represent the real and imaginary parts of the complex element  Θ , j is the imaginary unit. Since M is equi-probably distributed over the set  M θ R  and  θ I  are both approximately uniformly distributed over the interval  [ 0.5 , 0.5 ]  (i.e.,  θ R , θ I Unif [ 0.5 , 0.5 ] ), and their variances approximately equal  1 / 12 , i.e.,  E [ θ R 2 ] = E [ θ I 2 ] = 1 / 12 , so
Var Θ = E Θ Θ H = E θ R 2 + E θ I 2 = 1 6 .

Appendix B.3. Dither Signal for the Feedback Channel Power Constaint

In this proposed scheme, we further extend the dither signal in the real number (see in Section 3.2.2) to the complex dither signal  V n ( 1 n N 1 )  to ensure the codewords encoded by Destination satisfy the power constraints at time n. It is also perfectly known by Source and Destination, and it is i.i.d. generated and uniformly distributed over  Λ , where  Λ = Λ R + j Λ I  with  Λ [ ± d / 2 , ± j d / 2 ) . Due to the average power constraint of  X n ( 1 n N 1 )  on the feedback channel encoder, the value of d is  6 P f . In addition,  γ n ( 1 n N 1 )  is the real-valued number and is chosen to avoid modulo-aliasing errors occurring in Source.

Appendix B.4. Coding Procedure

The specific coding process is similar to what was described in Section 3.2.3. For the similar parts, we omit them directly, focusing here on elaborating the distinctions from Section 3.2.3.
After channel transformation, at time 1,
  • Source sends  X 1 = 6 P Θ , the relay keeps quiet and Destination receives  Y 1 = h sd X 1 + η 1 = h sd 6 P Θ + η 1 .
  • Once it receives  Y 1 , Destination first computes the estimation of  Θ  by  Θ ^ 1 = Y 1 h sd 6 P = Θ + η 1 h sd 6 P Θ + ε 1 . The first estimation error is denoted by  ε 1 Θ ^ 1 Θ = η 1 h sd 6 P , and the variance of  ε 1  is  α 1 Var ε 1 = σ 2 6 P h sd 2 .
  • Then, Destination uses the two-dimensional modulo- Λ  function to encode  Θ ^ 1  as  X f , 1 = M Λ [ γ 1 Θ ^ 1 + V 1 ]  and transmits it back to Source via a noisy feedback channel.
At time 2,
  • Once receiving  Y f , 1 , Source also uses the two-dimensional modulo- Λ  function to decode this message and computes the noisy versions of Destination’s estimation error, i.e.,  ε f , 1 = 1 γ 1 M Λ [ Y f , 1 γ 1 Θ V 1 ] = 1 γ 1 M Λ [ γ 1 ε 1 + η f , 1 ] . If the modulo-aliasing error does not occur, using Property (2) of Proposition 2, Source can obtain  ε f , 1 = ε 1 + η f , 1 / γ 1 .
  • The Source sends  X 2 = P / α f , 1 ε f , 1  to Destination, where  α f , 1 Var ε f , 1 . At this time instant, Relay also keeps quiet, so Destination receives the output signal  Y 2 = h sd X 2 + η 2 = h sd P / α f , 1 ε f , 1 + η 2 .
  • Next, Destination evaluates MMSE of  ε 1  based on  Y 2  and updates the estimation of  Θ  by computing  Θ ^ 2 = Θ ^ 1 E ε 1 Y 2 H E Y 2 Y 2 H Y 2 = Θ + ε 2 . The second estimation error is denoted by  ε 2 Θ ^ 2 Θ = ε 1 E ε 1 Y 2 H E Y 2 Y 2 H Y 2 , and the variance of  ε 2  is  α 2 Var ( ε 2 ) . Then, Destination encodes  X f , 2 = M Λ [ γ 2 Θ ^ 2 + V 2 ]  and transmits it back to Source via a noisy feedback channel.
At time  n ( 3 n N ) ,
  • Once it receives  Y f , n 1 , Source computes the noisy versions of Destination’s estimation error, i.e.,  ε f , n 1 = 1 γ n 1 M Λ [ γ n 1 ε n 1 + η f , n 1 ] . If the modulo-aliasing error does not occur, using Property (2) of Proposition 2, Source can get  ε f , n 1 = ε n 1 + η f , n 1 / γ n 1 .
  • The Source sends  X n = P / α f , n 1 ε f , n 1  to both the Relay and Destination, where  α f , n 1 Var ε f , n 1 . Furthermore, Relay does not keep quiet and utilizes the AF strategy to transmit a scaled version of  Y r , n 1 ; that is,  X r , n = β Y r , n 1 = β ( h sr X n 1 + η r , n 1 ) = β ( h sr P / α f , n 2 ε f , n 2 + η r , n 1 ) , and the value of the Relay’s AF coefficient is  β = P r / ( h sr 2 P + σ r 2 ) .
  • Next, the n-th channel output signal of Destination received is  Y n = h sd X n + h r d X r , n + η n = h sd P / α f , n 1 ε f , n 1 + h r d β ( h sr P / α f , n 2 ε f , n 2 + η r , n 1 ) + η n . Destination first calculates the auxiliary signal about the received message  Y ^ n = h sr · h r d β P / α f , n 2 ε ^ n 2 , then forms the innovation  I n  based on the fact that  ε n 1 = ε n 2 ε ^ n 2 I n  is denoted by  I n Y n Y ^ n = h sd P / α f , n 1 ε f , n 1 + h r d β ( h sr P / α f , n 2 ( ε f , n 1 + η f , n 2 / γ n 2 ) + η r , n 1 ) + η n .
  • Then Destination evaluates MMSE of  ε n 1  based on  I n  and updates the estimation of  Θ  by computing  Θ ^ n = Θ ^ n 1 E ε n 1 I n E I n 2 I n = Θ + ε n . The estimation error at time instant  n ( 3 n N )  is denoted by  ε n Θ ^ n Θ = ε n 1 E ε n 1 I n E I n 2 I 2 , and the variance of  ε n  is  α n Var ( ε n ) .
Finally, at time instant N, Destination computes the final estimation  Θ ^ N = Θ + ε N . According to the mapping method in Appendix B.2, if the final estimation error satisfies both of the following conditions
ε R , N 0.5 2 N R N , ϵ 2 , 0.5 2 N R N , ϵ 2 , ε I , N 0.5 2 N R N , ϵ 2 , 0.5 2 N R N , ϵ 2 ,
the final estimation  Θ ^ N  is closest to the  Θ , and thus Destination successfully decodes the message M.
For a better understanding, the schematic diagram of the scheme proposed above is shown in Figure A1.
Figure A1. The schematic diagram of the proposed SK-type FBL scheme for the MISO GRC with noisy feedback.
Figure A1. The schematic diagram of the proposed SK-type FBL scheme for the MISO GRC with noisy feedback.
Entropy 26 00651 g0a1
The coefficient’s derivation and the analysis of error probability for Theorem 2 are fundamentally consistent. We omit the similar parts directly and focus on elaborating the differences between them. See details below.

Appendix B.5. Coefficient’s Derivation and Error Probability Analysis

The error events of the SK-type FBL coding scheme for the MISO FRC with noisy feedback described in Appendix B.4 consist of
(1)
A modulo-aliasing error occurs in Source at time instant  n ( 1 n N 1 ) . The event is defined as
C n γ n ε n + η f , n Λ ,
where  ε n  and  η f , n  are both complex numbers, so (A30) can be further expressed as
C n γ n ε R , n + η f R , n d 2 , d 2 γ n ε I , n + η f I , n d 2 , d 2 ,
where  d = 6 P f  and the subscripts R and I represent the real and imaginary parts of the original complex elements, respectively.
(2)
A decoding error occurs in Destination at time instant N. The event is defined as
C N ε R , N 0.5 2 N R N , ϵ 2 , 0.5 2 N R N , ϵ 2 ε I , N 0.5 2 N R N , ϵ 2 , 0.5 2 N R N , ϵ 2 .
Hence, the error probability is bounded by (A3). And for a given decoding error probability  ϵ , from (A30)–(A32), let
Pr C ˜ N = ϵ 2 , Pr C ˜ n = ϵ 2 N 1 .
Since no modulo-aliasing error occurs at time instant  n ( 1 n N 1 ) , from (A30) and (A31) and the fact that  η f , n  is a circularly symmetric Gaussian distribution, we conclude that  γ n ε R , n + η f R , n N ( 0 , ( γ n 2 α n + σ f 2 / h ds 2 ) / 2 ) γ n ε I , n + η f I , n N ( 0 , ( γ n 2 α n + σ f 2 / h ds 2 ) / 2 ) . So we have
Pr C ˜ n = 2 Pr γ n ε R , n + η f R , n d 2 , d 2 = 4 Q 3 P f γ n 2 α n + σ f 2 h ds 2 ,
where  d = 6 P f .
Similar to the GRC scenario, we also introduce a looseness parameter L, which is denoted by
L P f γ n 2 α n + σ f 2 h ds 2 = 1 3 Q 1 ϵ 8 N 1 2 .
Then, we determine the appropriate selection of coefficient  γ n ,
γ n = P f L σ f 2 h ds 2 1 α n ,
where  γ n  is the real-value number.
According to  α f , n Var ( ε f , n ) , we obtain
α f , n = α n P f h ds 2 P f h ds 2 L σ f 2 = ( a ) α n Φ .
where  ( a )  follows from  Φ P f h ds 2 / ( P f h ds 2 L σ f 2 ) .
The computation process of estimation errors at each time instant is analogous to that described in Appendix A. Here, we will omit the detailed procedures and provide the results directly.
At time instant 1,  ε 1 = η 1 6 P h sd  and  α 1 = σ 2 6 P h sd 2 .
At time instant 2,  ε 2 = ε 1 E [ ε 1 Y 2 H ] E [ Y 2 Y 2 H ] Y 2 , where
E ε 1 Y 2 H = h sd P Φ α 1 , E Y 2 Y 2 H = h sd 2 P Φ + h sd 2 P 1 1 Φ + σ 2 ,
and
α 2 = α 1 1 + h sd 2 P Φ h sd 2 P 1 1 Φ + σ 2 1 .
At time instant  n ( 3 n N ) ε n = ε n 1 E ε n 1 I n H E I n I n H I n , where
E ε n 1 I n H = α n 1 h sd P Φ + h sr · h r d β P ρ n 1 , E I n I n H = h sd P Φ + h sr · h r d β P ρ n 1 2 + h sr 2 h r d 2 β 2 P 1 1 Φ 1 1 A n 1 2 ρ n 1 2 + F ,
where  F = h sd 2 P 1 1 Φ + h r d 2 β 2 σ r 2 + σ 2 .
So, at time instant N, the variance of the final estimation error  ε N  is as follows
α N = α 2 1 + h sd P Φ + h sr · h r d β P ρ * 2 Γ 2 N ,
where
Γ = h sr 2 h r d 2 β 2 P 1 1 Φ 1 1 A ρ * 2 ρ * 2 + F ,
α 2  is given in (A39).  ρ *  is defined as the unique solution within  [ 0 , 1 ]  of the following equation,
ρ 2 = A ρ 2 Φ × 1 + h sd P Φ + h sr · h r d β P ρ 2 h sr 2 h r d 2 β 2 P 1 1 φ 1 1 A ρ 2 ρ 2 + F 1 ,
and
A ρ = 1 + P h sd h sd 1 Φ + h sr · h r d β ρ 1 Φ Φ h sr 2 h r d 2 β 2 P 1 1 Φ 1 1 A ρ 2 ρ 2 + F .
Next, according to (A32) and (A33), we have
Pr C ˜ N Pr ε R , N 0.5 2 N R N , ϵ 2 , 0.5 2 N R N , ϵ 2 + Pr ε I , N 0.5 2 N R N , ϵ 2 , 0.5 2 N R N , ϵ 2 = 2 Pr ε R , N 0.5 2 N R N , ϵ 2 , 0.5 2 N R N , ϵ 2 = 4 Q 0.5 2 N R N , ϵ α N 2 = ϵ 2 .
Substituting (A41) and (A42) into (A45), we obtain
R FRC NFb ( N , ϵ ) = R FRC * ( N , ϵ ) R FRC ( N , ϵ ) ,
where  R FRC * ( N , ϵ )  and  R FRC ( N , ϵ )  are, respectively, given in (51) and (52).

Appendix C. Proof of Theorem 3

For the MISO FRC case, at time n, according to (A22) and (62), the signals received by Eavesdropper can be rewritten as
Z n = g se h sd H h sd X n + g re h r d H h r d X r , n + η e , n , 1 n N , Z f , n = g de X f , n + η f e , n , 1 n N 1 .
The proof of Theorem 3 consists of the following two parts (I)–(II).
(I)
To analyze the secrecy level  Δ I = H ( M | Z 1 N , Z f , 1 N 1 , h , g ) H ( M ) H ( M | Z 1 N , Z f , 1 N 1 , h , g )  can be bounded by
H ( M | Z 1 N , Z f , 1 N 1 , h , g ) a H ( Θ | Z 1 N , Z f , 1 N 1 , h , g , η , M 1 N 1 ) = b H ( Θ | g se h sd H h sd X 1 + η e , 1 Z 1 , g se h sd H h sd X 2 + η e , 2 Z 2 , g se h sd H h sd X 3 + g re h r d H h r d X r , n + η e , 3 Z 3 , , g se h sd H h sd X N + g re h r d H h r d X r , N + η e , N Z N , g de X f , 1 + η f e , 1 Z f , 1 , , g de X f , N 1 + η f e , N 1 Z f , N 1 , h , g , η , M 1 N 1 ) = c H ( Θ | g se h sd H h sd X 1 + η e , 1 ) = d H ( Θ ) + h ( η e , 1 ) h g se h sd H h sd X 1 + η e , 1 e H ( Θ ) log 1 + h sd · g se H 2 P σ e 2 Information leaked by Source at time 1 ,
where
(a)
follows from the fact that  Θ  is a deterministic function of M η = ( η 1 N , η r , 1 N , η f , 1 N 1 , η e , 2 N , η f e , 1 N 1 ) M 1 N 1 = ( M Λ [ γ 1 Θ ^ 1 + V 1 ] , , M Λ [ γ N 1 Θ ^ N 1 + V N 1 ] )  and conditioning reduces entropy;
(b)
follows from (A47);
(c)
follows from  X r , 1 = X r , 2 = 0 X n ( 2 n N )  and  X r , n ( 3 n N )  are deterministic functions of  ( η n , η r , n , η f , n , h ) . Additionally,  M n ( 1 n N 1 )  is only dependent on the complex dither signal sequence  V 1 N 1  (see Property (2) of Proposition 2), and  ( h , g , η , M 1 N 1 )  is independent of  ( Θ , η e , 1 ) ;
(d)
follows from the fact that  Θ  is independent of  η e , 1 ;
(e)
follows from
h g se h sd H h sd X 1 + η e , 1 h η e , 1 log det π e g se h sd H h sd X 1 + η e , 1 g se h sd H h sd X 1 + η e , 1 H log det π e σ e 2 E D = log det π e g se h sd H h sd g se H h sd P + σ e 2 E D log det π e σ e 2 E D = e 1 log det 1 + h sd g se H g se h sd H h sd σ e 2 P = l o g 1 + h sd g se H 2 P h sd σ e 2 ,
where  ( e 1 )  follows from  log det ( A B + E ) = log det ( B A + E )  and  E D  represents a  D × D  identity matrix.
Substituting (A48) into (64), we conclude that
Δ I 1 log 1 + h sd g se H 2 P h sd σ e 2 Information   leaked   by   Source   at   time   1 N R FRC NFb N , ϵ
where  R FRC NFb ( N , ϵ )  is given in (50).
(II)
To analyze secrecy level  Δ I I = H ( M | Z 1 N , Z f , 1 N 1 , V 1 N 1 , h , g ) H ( M ) H ( M | Z 1 N , Z f , 1 N 1 , V 1 N 1 , h , g )  can be bounded by
H ( M | Z 1 N , Z f , 1 N 1 , V 1 N 1 , h , g ) a H ( Θ | Z 1 N , Z f , 1 N 1 , V 1 N 1 , h , g , η ) = b H ( Θ | g se h sd H h sd X 1 + η e , 1 Z 1 , g se h sd H h sd X 2 + η e , 2 Z 2 , g se h sd H h sd X 3 + g re h r d H h r d X r , n + η e , 3 Z 3 , , g se h sd H h sd X N + g re h r d H h r d X r , N + η e , N Z N , Z f , 1 N 1 , V 1 N 1 , h , g , η ) = c H ( Θ | g se h sd H h sd X 1 + η e , 1 , η e , 2 N , Z f , 1 N 1 , V 1 N 1 , h , g , η ) = d H ( Θ ) + h ( η e , 1 ) h g se h sd H h sd X 1 + η e , 1 + h η f e , 1 N 1 h Z f , 1 N 1 H ( Θ ) + h ( η e , 1 ) h g se h sd H h sd X 1 + η e , 1 + n = 1 N 1 h η f e , 1 h Z f , 1 e H ( Θ ) log 1 + h sd · g se H 2 P σ e 2 Information   leaked   by   Source   at   time   1 ( N 1 ) log 1 + g de 2 P f σ f e 2 Information   leaked   in   feedback   channel   at   time   1   to   N 1 ,
where
(a)
follows from the fact that  Θ  is a deterministic function of M η = ( η 1 N , η r , 1 N , η f , 1 N 1 ) , and conditioning reduces entropy;
(b)
follows from (A47);
(c)
follows from  X r , 1 = X r , 2 = 0 X n ( 2 n N )  and  X r , n ( 3 n N )  are deterministic functions of  ( η n , η r , n , η f , n , h ) ;
(d)
follows from the fact that  X 1 η e , 1  is independent of  Z f , 1 N 1 , for  n ( 1 n N 1 ) Z f , n = g de X f , n + η f e , n  and  X f , n = M Λ [ γ n Θ ^ n + V n ]  are both deterministic functions of  ( Θ , V 1 N 1 , h , g , η ) ;
(e)
follows from
h g se h sd H h sd X 1 + η e , 1 h η e , 1 e 1 l o g 1 + h sd g se H 2 P h sd σ e 2 , h g de X f , n + η f e , n h η f e , n l o g 1 + g de 2 P f σ f e 2 ,
where  ( e 1 )  is similar to (A49).
Substituting (A51) into (65), we conclude that
Δ I 1 log 1 + h sd g se H 2 P h sd σ e 2 Information   leaked   by   Source   at   time   1 N R FRC NFb N , ϵ ( N 1 ) log 1 + g de 2 P f σ f e 2 Information   leaked   in   feedback   channel   at   time   1   to   N 1 N R FRC NFb N , ϵ ,
where  R FRC NFb ( N , ϵ )  is given in (50).
According to (I)–(II), the proof of Theorem 3 is completed.

References

  1. De Sanctis, M.; Cianca, E.; Araniti, G.; Bisio, I.; Prasad, R. Satellite communications supporting internet of remote things. IEEE Internet Things J. 2016, 3, 113–123. [Google Scholar] [CrossRef]
  2. An, K.; Lin, M.; Liang, T.; Wang, J.B.; Wang, J.; Huang, Y.; Swindlehurst, A.L. Performance analysis of multi-Antenna hybrid satellite-terrestrial relay networks in the presence of interference. IEEE Trans. Commun. 2015, 63, 4390–4404. [Google Scholar] [CrossRef]
  3. Nguyen, T.N.; Tran, D.H.; Van Chien, T.; Phan, V.D.; Voznak, M.; Chatzinotas, S. Security and reliability analysis of satellite-terrestrial multirelay networks with imperfect CSI. IEEE Syst. J. 2023, 17, 2824–2835. [Google Scholar] [CrossRef]
  4. Gupta, P.; Kumar, P.R. Towards an information theory of large networks: An achievable rate region. IEEE Trans. Inf. Theory 2003, 49, 1877–1894. [Google Scholar] [CrossRef]
  5. Xie, L.-L.; Kumar, P.R. A network information theory for wireless communication: Scaling laws and optimal operation. IEEE Trans. Inf. Theory 2004, 50, 748–767. [Google Scholar] [CrossRef]
  6. Xie, L.-L.; Kumar, P.R. An achievable rate for the multiple-level relay channel. IEEE Trans. Inf. Theory 2005, 51, 1348–1358. [Google Scholar] [CrossRef]
  7. Kramer, G.; Gastpar, M.; Gupta, P. Cooperative strategies and capacity theorems for relay networks. IEEE Trans. Inf. Theory 2005, 51, 3037–3063. [Google Scholar] [CrossRef]
  8. Gastpar, M. The Wyner-Ziv problem with multiple sources. IEEE Trans. Inf. Theory 2004, 50, 2762–2768. [Google Scholar] [CrossRef]
  9. Maric, I.; Goldsmith, A.; Medard, M. Multihop analog network coding via amplify-and-forward: The high SNR regime. IEEE Trans. Inf. Theory 2012, 58, 793–803. [Google Scholar] [CrossRef]
  10. Simmons, D.E.; Coon, J.P.; Warsi, N. Capacity and power scaling laws for finite antenna MIMO amplify-and-forward relay networks. IEEE Trans. Inf. Theory 2016, 62, 1993–2008. [Google Scholar] [CrossRef]
  11. Cover, T.M.; El Gamal, A. Capacity theorems for the relay channel. IEEE Trans. Inf. Theory 1979, 25, 572–584. [Google Scholar] [CrossRef]
  12. Schein, B.; Gallager, R. The Gaussian parallel relay network. In Proceedings of the 2000 IEEE International Symposium on Information Theory, Sorrento, Italy, 25–30 June 2000; p. 22. [Google Scholar]
  13. Durisi, G.; Koch, T.; Popovski, P. Toward massive, ultra-reliable, and low-latency wireless communication with short packets. Proc. IEEE 2016, 104, 1711–1726. [Google Scholar] [CrossRef]
  14. Ren, H.; Pan, C.; Deng, Y.; Elkashlan, M.; Nallanathan, A. Joint power and blocklength optimization for URLLC in a factory automation scenario. IEEE Trans. Wirel. Commun. 2020, 19, 1786–1801. [Google Scholar] [CrossRef]
  15. Yuan, L.; Yang, N.; Fang, F.; Ding, Z. Performance analysis of UAV-assisted short-packet cooperative communications. IEEE Trans. Veh. Technol. 2022, 71, 4471–4476. [Google Scholar] [CrossRef]
  16. Hu, Y.; Zhu, Y.; Gursoy, M.C.; Schmeink, A. SWIPT-enabled relaying in IoT networks operating with finite blocklength codes. IEEE J. Sel. Areas Commun. 2019, 37, 74–88. [Google Scholar] [CrossRef]
  17. Jee, A.; Agrawal, K.; Prakriya, S. A coordinated direct AF/DF relay-aided NOMA framework for low outage. IEEE Trans. Commun. 2022, 70, 1559–1579. [Google Scholar] [CrossRef]
  18. Jee, A.; Prakriya, S. Performance of energy and spectrally efficient AF relay-aided incremental CDRT NOMA-based IoT network with imperfect SIC for smart cities. IEEE Internet Things J. 2023, 10, 18766–18781. [Google Scholar] [CrossRef]
  19. Agrawal, K.; Jee, A.; Prakriya, S. Performance of SWIPT in cooperative networks with direct link and nonlinear energy harvesting at the battery-assisted relay. IEEE Trans. Green Commun. Netw. 2022, 6, 1198–1215. [Google Scholar] [CrossRef]
  20. Gamal, A.E.; Kim, Y.-H. Network Information Theory; Cambridge University Press: New York, NY, USA, 2012. [Google Scholar]
  21. Schalkwijk, J.; Kailath, T. A coding scheme for additive noise channels with feedback–I: No bandwidth constraint. IEEE Trans. Inf. Theory 1966, 12, 172–182. [Google Scholar] [CrossRef]
  22. Truong, L.V.; Fong, S.L.; Tan, V.Y.F. On Gaussian channels with feedback under expected power constraints and with non-vanishing error probabilities. IEEE Trans. Inf. Theory 2017, 63, 1746–1765. [Google Scholar] [CrossRef]
  23. Bross, S.I.; Wigger, M.A. On the Relay Channel With Receiver–Transmitter Feedback. IEEE Trans. Inf. Theory 2009, 55, 275–291. [Google Scholar] [CrossRef]
  24. Wyner, A.D. The Wire-Tap Channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  25. Gunduz, D.; Brown, D.R.; Poor, H.V. Secret communication with feedback. In Proceedings of the International Symposium on Information Theory and Its Applications (ISITA), Auckland, New Zealand, 7–10 December 2008; pp. 1–6. [Google Scholar]
  26. Dai, B.; Li, C.; Liang, Y.; Ma, Z.; Shamai Shitz, S. Impact of action-dependent state and channel feedback on Gaussian wiretap channels. IEEE Trans. Inf. Theory 2020, 66, 3435–3455. [Google Scholar] [CrossRef]
  27. Li, C.; Liang, Y.; Poor, H.V.; Shamai, S. A coding scheme for colored Gaussian wiretap channels with feedback. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; pp. 131–135. [Google Scholar]
  28. Dai, B.; Li, C.; Liang, Y.; Ma, Z.; Shamai Shitz, S. Self-secure capacity-achieving feedback schemes of Gaussian multiple-access wiretap channels with degraded message sets. IEEE Trans. Inf. Forensics Secur. 2022, 17, 1583–1596. [Google Scholar] [CrossRef]
  29. Xia, D.; Yang, C.; Dai, B. Two-Way Full-Duplex Gaussian Channels With or Without Eavesdropper: Revisit. IEEE Trans. Commun. 2022, 70, 5434–5450. [Google Scholar] [CrossRef]
  30. Ben-Yishai, A.; Shayevitz, O. Interactive schemes for the AWGN channel with noisy feedback. IEEE Trans. Inf. Theory 2017, 63, 2409–2427. [Google Scholar] [CrossRef]
  31. Zamir, R. Lattice Coding for Signals and Networks; Cambridge University Press: Cambridge, UK, 2014. [Google Scholar]
  32. Laneman, J.N.; Tse, D.N.C.; Wornell, G.W. Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Trans. Inf. Theory 2004, 50, 3062–3080. [Google Scholar] [CrossRef]
  33. Tekin, E.; Yener, A. The Gaussian Multiple Access Wire-Tap Channel. IEEE Trans. Inf. Theory 2008, 54, 5747–5755. [Google Scholar] [CrossRef]
  34. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
Figure 1. The information-theoretic schematic diagram.
Figure 1. The information-theoretic schematic diagram.
Entropy 26 00651 g001
Figure 2. The schematic diagram of the proposed SK-Type finite blocklength (FBL) scheme for the GRC with noisy feedback.
Figure 2. The schematic diagram of the proposed SK-Type finite blocklength (FBL) scheme for the GRC with noisy feedback.
Entropy 26 00651 g002
Figure 3. The MISO FRC with noisy feedback and a multi-antenna external eavesdropper.
Figure 3. The MISO FRC with noisy feedback and a multi-antenna external eavesdropper.
Entropy 26 00651 g003
Figure 4. Performance analysis of the proposed scheme for the GRC with noisy feedback ( P r = 10 dB , h s d = h s r = h r d = h d s = 1 , σ 2 = σ r 2 = σ f 2 = 1 ). (a) Achievable rate  R GRC NFb ( N , ϵ )  versus blocklength N and various decoding error probability  ϵ  ( P = 10 dB , P f = 20 dB ); (b) relationship between the achievable rate  R GRC NFb ( N , ϵ )  and its asymptotic value  R GRC * ( N , ϵ )  ( P = 10 dB , ϵ = 10 6 ); (c) relationship between the relative rate  Δ R  and the relative power  Δ P  ( N = 100 , ϵ = 10 6 ).
Figure 4. Performance analysis of the proposed scheme for the GRC with noisy feedback ( P r = 10 dB , h s d = h s r = h r d = h d s = 1 , σ 2 = σ r 2 = σ f 2 = 1 ). (a) Achievable rate  R GRC NFb ( N , ϵ )  versus blocklength N and various decoding error probability  ϵ  ( P = 10 dB , P f = 20 dB ); (b) relationship between the achievable rate  R GRC NFb ( N , ϵ )  and its asymptotic value  R GRC * ( N , ϵ )  ( P = 10 dB , ϵ = 10 6 ); (c) relationship between the relative rate  Δ R  and the relative power  Δ P  ( N = 100 , ϵ = 10 6 ).
Entropy 26 00651 g004
Figure 5. Performance analysis of the proposed scheme for the MISO FRC with noisy feedback ( P r = 10 dB , h sd , h sr , h r d , h ds CN ( 0 , 1 ) , σ 2 = σ r 2 = σ f 2 = 1 ). (a) Relationship among the achievable rate  R FRC NFb ( N , ϵ ) , blocklength N and decoding error probability  ϵ  ( B = 5 , P = 10 dB , P f = 20 dB ); (b) telationship between the achievable rate  R FRC NFb ( N , ϵ )  and its asymptotic value  R FRC * ( N , ϵ )  ( P = 10 dB , ϵ = 10 6 ); (c) the influence of the number of Source’s antennas B on the achievable rate  R FRC NFb ( N , ϵ )  ( P = 10 dB , P f = 20 dB , ϵ = 10 6 ); (d) comparison of achievable rate for MISO FRC with noisy  R FRC NFb ( N , ϵ )  and without feedback  R FRC AF  ( N = 100 , ϵ = 10 6 , B = 5 , P f = 20 dB ).
Figure 5. Performance analysis of the proposed scheme for the MISO FRC with noisy feedback ( P r = 10 dB , h sd , h sr , h r d , h ds CN ( 0 , 1 ) , σ 2 = σ r 2 = σ f 2 = 1 ). (a) Relationship among the achievable rate  R FRC NFb ( N , ϵ ) , blocklength N and decoding error probability  ϵ  ( B = 5 , P = 10 dB , P f = 20 dB ); (b) telationship between the achievable rate  R FRC NFb ( N , ϵ )  and its asymptotic value  R FRC * ( N , ϵ )  ( P = 10 dB , ϵ = 10 6 ); (c) the influence of the number of Source’s antennas B on the achievable rate  R FRC NFb ( N , ϵ )  ( P = 10 dB , P f = 20 dB , ϵ = 10 6 ); (d) comparison of achievable rate for MISO FRC with noisy  R FRC NFb ( N , ϵ )  and without feedback  R FRC AF  ( N = 100 , ϵ = 10 6 , B = 5 , P f = 20 dB ).
Entropy 26 00651 g005
Figure 6. The relationship among the secrecy levels  Δ , blocklength N, and decoding error probability  ϵ  of the proposed scheme for the MISO FRC with noisy feedback and a multi-antenna external Eavesdropper ( B = D = 5 , P = P r = 10 dB , P f = 20 dB , h sd , h sr , h r d , h ds , g se , g re , g de CN ( 0 , 1 ) , σ 2 = σ r 2 = σ f 2 = 1 ).
Figure 6. The relationship among the secrecy levels  Δ , blocklength N, and decoding error probability  ϵ  of the proposed scheme for the MISO FRC with noisy feedback and a multi-antenna external Eavesdropper ( B = D = 5 , P = P r = 10 dB , P f = 20 dB , h sd , h sr , h r d , h ds , g se , g re , g de CN ( 0 , 1 ) , σ 2 = σ r 2 = σ f 2 = 1 ).
Entropy 26 00651 g006
Figure 7. Relationship between the secrecy levels  Δ  and blocklength N under various power ( B = D = 5 , P r = 10 dB , h sd , h sr , h r d , h ds , g se , g re , g de CN ( 0 , 1 ) , σ 2 = σ r 2 = σ f 2 = 1 , ϵ = 10 6 ).
Figure 7. Relationship between the secrecy levels  Δ  and blocklength N under various power ( B = D = 5 , P r = 10 dB , h sd , h sr , h r d , h ds , g se , g re , g de CN ( 0 , 1 ) , σ 2 = σ r 2 = σ f 2 = 1 , ϵ = 10 6 ).
Entropy 26 00651 g007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hu, R.; Zhang, H.; Yang, H. Feedback Approach for the Relay Channel with Noisy Feedback and Its Security Analysis. Entropy 2024, 26, 651. https://doi.org/10.3390/e26080651

AMA Style

Hu R, Zhang H, Yang H. Feedback Approach for the Relay Channel with Noisy Feedback and Its Security Analysis. Entropy. 2024; 26(8):651. https://doi.org/10.3390/e26080651

Chicago/Turabian Style

Hu, Rong, Haonan Zhang, and Huan Yang. 2024. "Feedback Approach for the Relay Channel with Noisy Feedback and Its Security Analysis" Entropy 26, no. 8: 651. https://doi.org/10.3390/e26080651

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop