Loading...
Search for: outer-bounds
0.011 seconds
Total 31 records

    Deterministic multiple access wiretap channel

    , Article Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, 17 December 2010 through 19 December 2010, Beijing ; 2010 , Pages 998-1001 ; 9781424469406 (ISBN) Jahandideh, V ; Salimi, S ; Salmasizadeh, M ; Sharif University of Technology
    2010
    Abstract
    Two-user Multiple Access Channel with a Wire- Tapper (MAC-WT) is considered. A general outer bound for the secrecy capacity region is given. Also, we have defined the Deterministic MAC-WT, where the channel input of each user is a deterministic function of the channel output and the channel input of the other user. For this network single-letter inner and outer bounds for the secrecy capacity region are given. Furthermore, it is shown that in the Deterministic MAC-WT, if the wiretapper channel is a degraded version of the main channel, inner and outer bounds meet and the secrecy capacity region is characterized  

    Achievable rate region for multiple-access-relay-networks

    , Article IET Communications ; Volume 4, Issue 15 , October , 2010 , Pages 1792-1798 ; 17518628 (ISSN) Salehkalaibar, S ; Ghabeli, L ; Aref, M. R ; Sharif University of Technology
    Abstract
    The authors introduce a generalisation of the multiple-access-relay-channel (MARC) called multiple-access-relay-network (MARN). The MARC model was first introduced by Kramer et al. and consists of many transmitters, one receiver and only one relay. In the MARN, there are many transmitters, many relays and one receiver. The authors obtained an achievable rate region for MARN by considering partial decode-and-forward (PDF) strategy at the relays. They showed that the region obtained using PDF strategy subsumes the region obtained by Kramer et al. for MARC. In the proposed coding scheme, the authors take advantage of PDF strategy based on regular encoding/backward decoding strategy. They also... 

    On the secrecy of the cognitive interference channel with partial channel states

    , Article Transactions on Emerging Telecommunications Technologies ; Volume 27, Issue 11 , 2016 , Pages 1472-1485 ; 21615748 (ISSN) Bafghi, H. G ; Seyfe, B ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Wiley Blackwell  2016
    Abstract
    The secrecy problem in the state-dependent cognitive interference channel is considered in this paper. In our model, there are a primary and a secondary (cognitive) transmitter–receiver pairs, in which the cognitive transmitter has the message of the primary one as side information. In addition, the channel is affected by two channel state sequences, which are known at the cognitive transmitter and the corresponding receiver, separately. The cognitive transmitter should cooperate with the primary one, and it wishes to keep its message secure at the primary receiver. The achievable equivocation-rate regions for this channel are derived using two approaches: the binning scheme coding and... 

    Transmitting Correlated Gaussian Sources over a Gaussian Multiple-Access Channel

    , M.Sc. Thesis Sharif University of Technology Setayesh, Mehdi (Author) ; Hossein Khalaj, Babak (Supervisor) ; Behroozi, Hamid (Supervisor)
    Abstract
    This thesis considers the problem of communicating correlated Gaussian sources through a Gaussian multiple-access channel (MAC). A well known application of these problems is a sensor network. In a distributed sensor network, sensors measure the required parameters from the environment, encode and transmit them to a fusion center through a multiple-access channel. Then, the fusion center makes a decision about the environmental measured parameters by data processing on the received data from sensors. In these networks, one of the main concerns is the power limitation at sensors. As a result, we usually look for an encoding method that is not only simple but also has a nearly optimal... 

    Layered hybrid digital-analog coding with correlated interference

    , Article IEEE International Conference on Communications ; 2012 , Pages 2565-2569 ; 15503607 (ISSN) ; 9781457720529 (ISBN) Varasteh, M ; Behroozi, H ; Sharif University of Technology
    2012
    Abstract
    In this paper, we propose a modified joint source-channel coding (JSCC) scheme on the transmission of an analog Gaussian source over an additive white Gaussian noise (AWGN) channel in the presence of an interference, correlated with the source. This setting naturally generalizes the problem of sending a single Gaussian source over an AWGN channel, in the case of bandwidth-matched, and with uncorrelated interference in which separation-based scheme with Costa coding is optimal. We analyze the modifeied scheme to obtain achievable (mean-squared error) distortion-power tradeoff. For comparison, we also obtain a new outer bound for the achievable distortion-power tradeoff. Using numerical... 

    Capacity bounds for multiuser channels with non-causal channel state information at the transmitters

    , Article 2011 IEEE Information Theory Workshop, ITW 2011 ; 2011 , Pages 195-199 ; 9781457704376 (ISBN) Khosravi Farsani, R ; Marvasti, F ; Sharif University of Technology
    Abstract
    In this paper, capacity inner and outer bounds are established for multiuser channels with Channel State Information (CSI) known non-causally at the transmitters: The Multiple Access Channel (MAC), the Broadcast Channel (BC) with common information, and the Relay Channel (RC). For each channel, the actual capacity region is also derived in some special cases. Specifically, it is shown that for some deterministic models with non-causal CSI at the transmitters, similar to Costa's Gaussian channel, the availability of CSI at the deterministic receivers does not affect the capacity region  

    Capacity bounds for the three-user Cognitive Z-Interference Channel

    , Article 12th Canadian Workshop on Information Theory, CWIT 2011, 17 May 2011 through 20 May 2011 ; May , 2011 , Pages 34-37 ; 9781457707438 (ISBN) Mirmohseni, M ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    In this paper, we consider a three-user cognitive radio network with two primary users and one cognitive radio. We concentrate on a three-user Interference Channel (IFC) where one of the transmitters has cognitive capabilities and non-causally knows the messages of the other two transmitters. Moreover, we assume that the cognitive transmitter does not cause any interference at the receivers of the primary users and we introduce three-user Cognitive Z-Interference Channel (C-ZIFC). We first obtain an inner bound on the capacity region of three-user C-ZIFC, where our coding scheme makes use of collaborative strategy by rate splitting and cooperative strategy by superposition coding. Moreover,... 

    Imperfect and Perfect Secrecy in Compound Multiple Access Channel with Confidential Message

    , Article IEEE Transactions on Information Forensics and Security ; Volume 11, Issue 6 , 2016 , Pages 1239-1251 ; 15566013 (ISSN) Zivari Fard, H ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    In this paper, we study the problem of secret communication over a compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential, which is only decoded by its corresponding receiver and kept secret from the other receiver. We call this proposed setting the compound MAC with a confidential message. For this model, we derive general inner and outer bounds for both imperfect and perfect secrecy conditions for the second receiver. Also, as examples, we investigate less noisy and Gaussian versions of this channel, and extend the results of the discrete memoryless version to these cases. Moreover, providing numerical examples for the... 

    On the capacity of interference channel with causal and noncausal generalized feedback at the cognitive transmitter

    , Article IEEE Transactions on Information Theory ; Volume 58, Issue 5 , 2012 , Pages 2813-2837 ; 00189448 (ISSN) Mirmohseni, M ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this paper, taking into account the effect of link delays, we investigate the capacity region of the cognitive interference channel (C-IFC), where cognition can be obtained from either causal or noncausal generalized feedback. For this purpose, we introduce the causal C-IFC with delay (CC-IFC-WD) in which the cognitive user's transmission can depend on L future received symbols as well as the past ones. We show that the CC-IFC-WD model is equivalent to a classical causal C-IFC (CC-IFC) with link delays. Moreover, CC-IFC-WD extends both genie-aided and causal cognitive radio channels and bridges the gap between them. First, we derive an outer bound on the capacity region for the arbitrary... 

    Key agreement over multiple access channel

    , Article IEEE Transactions on Information Forensics and Security ; Volume 6, Issue 3 PART 1 , 2011 , Pages 775-790 ; 15566013 (ISSN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Golic, J. D ; Sharif University of Technology
    Abstract
    In this paper, a generalized multiple access channel (MAC) model for secret key sharing between three terminals is considered. In this model, there are two transmitters and a receiver where all three terminals receive noisy channel outputs. In addition, there is a one-way public channel from the transmitters to the receiver. Each of the transmitters intends to share a secret key with the receiver by using the MAC and the public channel, where the transmitters are eavesdroppers with respect to each other. Two strategies for secret key sharing are considered, namely, the pregenerated key strategy and the two-stage key strategy. For both of them, inner and outer bounds of the secret key... 

    Secret key sharing in a new source model: Rate regions

    , Article 2010 Australian Communications Theory Workshop, AusCTW 2010, Canberra, ACT, 3 February 2010 through 5 February 2010 ; 2010 , Pages 117-122 ; 9781424454334 (ISBN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; ANU - The Australian National University; ACoRN - ARC Communications Research Network; NICTA; UniSA; CSIRO ; Sharif University of Technology
    2010
    Abstract
    A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, at the other side via public channels where three users can observe i.i.d outputs of correlated sources. Each of users 1 and 2 intends to share a secret key with user 3 where user 1 acts as a wiretapper for user 2 and vice versa. In this model, two situations are considered: communication from users 1 and 2 to user 3 (forward key strategy) and from user 3 to users 1 and 2 (backward key strategy). This model is motivated by wireless communications when considering user 3 as a base station and users 1 and 2 as network users. In...