Loading...
Search for: outer-bounds
0.014 seconds
Total 31 records

    Transmitting Correlated Gaussian Sources over a Gaussian Multiple-Access Channel

    , M.Sc. Thesis Sharif University of Technology Setayesh, Mehdi (Author) ; Hossein Khalaj, Babak (Supervisor) ; Behroozi, Hamid (Supervisor)
    Abstract
    This thesis considers the problem of communicating correlated Gaussian sources through a Gaussian multiple-access channel (MAC). A well known application of these problems is a sensor network. In a distributed sensor network, sensors measure the required parameters from the environment, encode and transmit them to a fusion center through a multiple-access channel. Then, the fusion center makes a decision about the environmental measured parameters by data processing on the received data from sensors. In these networks, one of the main concerns is the power limitation at sensors. As a result, we usually look for an encoding method that is not only simple but also has a nearly optimal... 

    Compound multiple access channel with confidential messages

    , Article 2014 IEEE International Conference on Communications, ICC 2014 ; 10-14 June 2014 , 2014 , Pages 1922-1927 ; ISBN: 9781479920037 Zivari Fard, H ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this paper, we study the problem of secret communication over a Compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential that is only decoded by its corresponding receiver and kept secret from the other receiver. For this proposed setting (compound MAC with confidential messages), we derive general inner and outer bounds on the secrecy capacity region. Also, as examples, we investigate 'Less noisy' and 'Gaussian' versions of this channel, and extend the results of the discrete memoryless version to these cases. Moreover, providing numerical examples for the Gaussian case, we illustrate the comparison between achievable rate... 

    Imperfect and Perfect Secrecy in Compound Multiple Access Channel with Confidential Message

    , Article IEEE Transactions on Information Forensics and Security ; Volume 11, Issue 6 , 2016 , Pages 1239-1251 ; 15566013 (ISSN) Zivari Fard, H ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    In this paper, we study the problem of secret communication over a compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential, which is only decoded by its corresponding receiver and kept secret from the other receiver. We call this proposed setting the compound MAC with a confidential message. For this model, we derive general inner and outer bounds for both imperfect and perfect secrecy conditions for the second receiver. Also, as examples, we investigate less noisy and Gaussian versions of this channel, and extend the results of the discrete memoryless version to these cases. Moreover, providing numerical examples for the... 

    Channel simulation via interactive communications

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2012 , Pages 3053-3057 ; 9781467325790 (ISBN) Yassaee, M. H ; Gohari, A ; Aref, M. R ; Sharif University of Technology
    IEEE  2012
    Abstract
    In this paper, we study the problem of channel simulation via interactive communication, known as the coordination capacity, in a two-terminal network. We assume that two terminals observe i.i.d. copies of two random variables and would like to generate i.i.d. copies of two other random variables jointly distributed with the observed random variables. The terminals are provided with two-way communication links, and shared common randomness, all at limited rates. Two special cases of this problem are the interactive function computation studied by Ma and Ishwar, and the tradeoff curve between one-way communication and shared randomness studied by Cuff. The latter work had inspired Gohari and... 

    Layered hybrid digital-analog coding with correlated interference

    , Article IEEE International Conference on Communications ; 2012 , Pages 2565-2569 ; 15503607 (ISSN) ; 9781457720529 (ISBN) Varasteh, M ; Behroozi, H ; Sharif University of Technology
    2012
    Abstract
    In this paper, we propose a modified joint source-channel coding (JSCC) scheme on the transmission of an analog Gaussian source over an additive white Gaussian noise (AWGN) channel in the presence of an interference, correlated with the source. This setting naturally generalizes the problem of sending a single Gaussian source over an AWGN channel, in the case of bandwidth-matched, and with uncorrelated interference in which separation-based scheme with Costa coding is optimal. We analyze the modifeied scheme to obtain achievable (mean-squared error) distortion-power tradeoff. For comparison, we also obtain a new outer bound for the achievable distortion-power tradeoff. Using numerical... 

    On the transmission of a Gaussian source over an AWGN channel with correlated interference

    , Article 12th Canadian Workshop on Information Theory, CWIT 2011, 17 May 2011 through 20 May 2011 ; May , 2011 , Pages 19-23 ; 9781457707438 (ISBN) Varasteh, M ; Behroozi, H ; Sharif University of Technology
    2011
    Abstract
    We study hybrid digital-analog (HDA) joint source-channel coding schemes in transmitting an analog Gaussian source over an AWGN channel in the presence of an interference, correlated with the source. We analyze these schemes to obtain achievable (mean-squared error) distortion-power tradeoffs. For comparison, we also obtain two outer bounds for the achievable distortion-power tradeoff; those are two necessary conditions under which (D,P) is achievable. Using numerical examples, we demonstrate that, a two-layered coding scheme consisting of analog and Costa coding performs well compared to other provided HDA schemes  

    A distortion outer bound for communicating correlated gaussian sources over a gaussian MAC

    , Article IEEE Communications Letters ; Volume 21, Issue 7 , 2017 , Pages 1457-1460 ; 10897798 (ISSN) Setayesh, M ; Behroozi, H ; Khalaj, B. H ; Sharif University of Technology
    Abstract
    In this letter, we consider two problems of sending a bivariate Gaussian source through a two-user Gaussian non-orthogonal multiple-access channel. We provide a new distortion outer bound for the considered joint source-channel coding problems, which significantly reduces the gap between inner and outer bounds of the distortion for correlation coefficients below a threshold. Furthermore, numerical results show, that under some conditions, our proposed outer bound matches with the inner bound obtained via the separate source-channel coding scheme, which proves the optimality of this scheme. © 1997-2012 IEEE  

    On Körner-Marton's sum modulo two problem

    , Article IWCIT 2015 - Iran Workshop on Communication and Information Theory, 6 May 2015 through 7 May 2015 ; May , 2015 ; 9781479982356 (ISBN) Sefidgaran, M ; Gohari, A ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper we study the sum modulo two problem proposed by Körner and Marton. In this source coding problem, two transmitters who observe binary sources X and Y, send messages of limited rate to a receiver whose goal is to compute the sum modulo of X and Y. This problem has been solved for the two special cases of independent and symmetric sources. In both of these cases, the rate pair (H(X|Y), H(Y|X)) is achievable. The best known outer bound for this problem is a conventional cut-set bound, and the best known inner bound is derived by Ahlswede and Han using a combination of Slepian-Wolf and Körner-Marton's coding schemes. In this paper, we propose a new outer bound which is strictly... 

    Pairwise secret key agreement using the source common randomness

    , Article Proceedings of the International Symposium on Wireless Communication Systems, 28 August 2012 through 31 August 2012 ; Aug , 2012 , Pages 751-755 ; 21540217 (ISSN) ; 9781467307604 (ISBN) Salimi, S ; Skoglund, M ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2012
    Abstract
    A secret key agreement setup between three users is considered in which each pair of them wishes to agree on a secret key hidden from the remaining user. The three users observe i.i.d. outputs of correlated sources and there is a noiseless public channel from each user for communication to the others. In this setup, inner and outer bounds of the secret key capacity region is derived. Moreover, some special cases are obtained in which the inner bound coincides the explicit outer bound. Also a binary-erasure example is presented through which the results are examined  

    Key agreement over multiple access channel

    , Article IEEE Transactions on Information Forensics and Security ; Volume 6, Issue 3 PART 1 , 2011 , Pages 775-790 ; 15566013 (ISSN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Golic, J. D ; Sharif University of Technology
    Abstract
    In this paper, a generalized multiple access channel (MAC) model for secret key sharing between three terminals is considered. In this model, there are two transmitters and a receiver where all three terminals receive noisy channel outputs. In addition, there is a one-way public channel from the transmitters to the receiver. Each of the transmitters intends to share a secret key with the receiver by using the MAC and the public channel, where the transmitters are eavesdroppers with respect to each other. Two strategies for secret key sharing are considered, namely, the pregenerated key strategy and the two-stage key strategy. For both of them, inner and outer bounds of the secret key... 

    Rate regions of secret key sharing in a new source model

    , Article IET Communications ; Volume 5, Issue 4 , March , 2011 , Pages 443-455 ; 17518628 (ISSN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, while at the other side via a public channel where three users can observe i.i.d. outputs of correlated sources. Each of users 1 and 2 intends to share a secret key with user 3 where user 1 acts as a wiretapper for user 2 and vice versa. In this model, two situations are considered: communication from users 1 and 2 to user 3 (the forward key strategy) and from user 3 to users 1 and 2 (the backward key strategy). In both situations, the goal is sharing a secret key between user 1 and user 3 while leaking no effective information... 

    Generalised secure distributed source coding with side information

    , Article IET Communications ; Volume 4, Issue 18 , 2010 , Pages 2262-2272 ; 17518628 (ISSN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    New inner and outer bounds on the achievable compression-equivocation rate region for generalised secure data compression with side information are given that do not match in general. In this setup, two senders, Alice and Charlie intend to transmit information to Bob via channels with limited capacity so that he can reliably reconstruct their observations. The eavesdropper, Eve, has access to one of the channels at each instant and is interested in the source of the same channel at the time. Bob and Eve also have their own observations, which are correlated with Alice's and Charlie's observations. In this model, two equivocation and compression rates are defined with respect to the sources... 

    Secret key sharing in a new source model: Rate regions

    , Article 2010 Australian Communications Theory Workshop, AusCTW 2010, Canberra, ACT, 3 February 2010 through 5 February 2010 ; 2010 , Pages 117-122 ; 9781424454334 (ISBN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; ANU - The Australian National University; ACoRN - ARC Communications Research Network; NICTA; UniSA; CSIRO ; Sharif University of Technology
    2010
    Abstract
    A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, at the other side via public channels where three users can observe i.i.d outputs of correlated sources. Each of users 1 and 2 intends to share a secret key with user 3 where user 1 acts as a wiretapper for user 2 and vice versa. In this model, two situations are considered: communication from users 1 and 2 to user 3 (forward key strategy) and from user 3 to users 1 and 2 (backward key strategy). This model is motivated by wireless communications when considering user 3 as a base station and users 1 and 2 as network users. In... 

    On the secrecy capacity of 3-receiver Broadcast Channel with causal states and conferencing

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2012 , Pages 1167-1171 ; 9781467325790 (ISBN) Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    IEEE  2012
    Abstract
    We investigate the secrecy capacity region of 2-receiver, 1-eavesdropper Broadcast Channel (BC) with two causal states and conferencing decoders. The encoder sends two messages, one of them for both legitimate receivers and the other one for the first legitimate receiver. It keeps these messages secret from the eavesdropper. Each state is causally available at the corresponding receiver, while both states are known causally at the encoder. Each receiver wishes to send the state which is not available at the other receiver, through a noiseless link with limited capacity. We find an inner bound on the secrecy capacity region of this channel. The achievability scheme employs block Markov coding... 

    On the capacity region of a class of Z channels with cooperation

    , Article ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications, 17 October 2010 through 20 October 2010 ; October , 2010 , Pages 464-468 ; 9781424460175 (ISBN) Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    In this paper, we consider Z Channel (ZC) with cooperation, where there are two senders and two receivers. The first sender transmits information to both receivers and also to the second sender. The first receiver and the second sender cooperate with the first sender in sending messages to the second receiver. The second sender transmits information only to its intended receiver. We first establish an achievable rate region for the general cooperative ZC. The coding scheme is based on rate splitting technique. At the receivers, we use joint decoding strategy. To illustrate the tightness of the proposed inner bound, we define degraded cooperative ZC. We derive an outer bound to the capacity... 

    Achievable rate region for multiple-access-relay-networks

    , Article IET Communications ; Volume 4, Issue 15 , October , 2010 , Pages 1792-1798 ; 17518628 (ISSN) Salehkalaibar, S ; Ghabeli, L ; Aref, M. R ; Sharif University of Technology
    Abstract
    The authors introduce a generalisation of the multiple-access-relay-channel (MARC) called multiple-access-relay-network (MARN). The MARC model was first introduced by Kramer et al. and consists of many transmitters, one receiver and only one relay. In the MARN, there are many transmitters, many relays and one receiver. The authors obtained an achievable rate region for MARN by considering partial decode-and-forward (PDF) strategy at the relays. They showed that the region obtained using PDF strategy subsumes the region obtained by Kramer et al. for MARC. In the proposed coding scheme, the authors take advantage of PDF strategy based on regular encoding/backward decoding strategy. They also... 

    An outer bound on the capacity region of Broadcast-Relay-Channel

    , Article IEEE International Symposium on Information Theory - Proceedings, 13 June 2010 through 18 June 2010, Austin, TX ; 2010 , Pages 599-603 ; 21578103 (ISSN) ; 9781424469604 (ISBN) Salehkalaibar, S ; Ghabeli, L ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    In this paper, we obtain an outer bound on the capacity region of the Broadcast-Relay-Channel (BRC). BRC is a four node network with one source, one relay and two destinations. To the best of our knowledge, this work represents the first effort to find an outer bound on the capacity region of the BRC. In the proof, we jointly utilize the ideas of the outer bounds on the Broadcast Channel (BC) and also the cut-set bound. The proposed outer bound looks like the inner bound obtained by Kramer et. al for BRC  

    On the capacity of interference channel with causal and noncausal generalized feedback at the cognitive transmitter

    , Article IEEE Transactions on Information Theory ; Volume 58, Issue 5 , 2012 , Pages 2813-2837 ; 00189448 (ISSN) Mirmohseni, M ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this paper, taking into account the effect of link delays, we investigate the capacity region of the cognitive interference channel (C-IFC), where cognition can be obtained from either causal or noncausal generalized feedback. For this purpose, we introduce the causal C-IFC with delay (CC-IFC-WD) in which the cognitive user's transmission can depend on L future received symbols as well as the past ones. We show that the CC-IFC-WD model is equivalent to a classical causal C-IFC (CC-IFC) with link delays. Moreover, CC-IFC-WD extends both genie-aided and causal cognitive radio channels and bridges the gap between them. First, we derive an outer bound on the capacity region for the arbitrary... 

    Capacity bounds for the three-user Cognitive Z-Interference Channel

    , Article 12th Canadian Workshop on Information Theory, CWIT 2011, 17 May 2011 through 20 May 2011 ; May , 2011 , Pages 34-37 ; 9781457707438 (ISBN) Mirmohseni, M ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    In this paper, we consider a three-user cognitive radio network with two primary users and one cognitive radio. We concentrate on a three-user Interference Channel (IFC) where one of the transmitters has cognitive capabilities and non-causally knows the messages of the other two transmitters. Moreover, we assume that the cognitive transmitter does not cause any interference at the receivers of the primary users and we introduce three-user Cognitive Z-Interference Channel (C-ZIFC). We first obtain an inner bound on the capacity region of three-user C-ZIFC, where our coding scheme makes use of collaborative strategy by rate splitting and cooperative strategy by superposition coding. Moreover,... 

    Capacity bounds for multiuser channels with non-causal channel state information at the transmitters

    , Article 2011 IEEE Information Theory Workshop, ITW 2011 ; 2011 , Pages 195-199 ; 9781457704376 (ISBN) Khosravi Farsani, R ; Marvasti, F ; Sharif University of Technology
    Abstract
    In this paper, capacity inner and outer bounds are established for multiuser channels with Channel State Information (CSI) known non-causally at the transmitters: The Multiple Access Channel (MAC), the Broadcast Channel (BC) with common information, and the Relay Channel (RC). For each channel, the actual capacity region is also derived in some special cases. Specifically, it is shown that for some deterministic models with non-causal CSI at the transmitters, similar to Costa's Gaussian channel, the availability of CSI at the deterministic receivers does not affect the capacity region