Robust Optimality of Secure TIN
In order to discover larger networks and parameter regimes where sharp Generalized Degrees of Freedom (GDoF) characterizations may be found based on the optimality of robust schemes for interference and broadcast networks with channel state information at the transmitters (CSIT) limited to finite pr...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on wireless communications 2022-05, Vol.21 (5), p.3071-3082 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3082 |
---|---|
container_issue | 5 |
container_start_page | 3071 |
container_title | IEEE transactions on wireless communications |
container_volume | 21 |
creator | Chan, Yao-Chia Geng, Chunhua Jafar, Syed A. |
description | In order to discover larger networks and parameter regimes where sharp Generalized Degrees of Freedom (GDoF) characterizations may be found based on the optimality of robust schemes for interference and broadcast networks with channel state information at the transmitters (CSIT) limited to finite precision, we explore the impact of secrecy constraints. In the absence of secrecy constraints, the largest such parameter regime for K user interference networks is the CTIN regime (so named for the C onvexity of the GDoF region achieved by Treating Interference as Noise (TIN)) originally discovered by Yi and Caire, whose optimality was established by Chan et al. For the corresponding broadcast networks the largest regime is the SLS (Simple Layered Superposition) regime discovered by Davoodi and Jafar, but only for small networks with K\leq 3 users. By including secrecy constraints, we identify much larger regimes, the STIN regime and the SLS regime, where GDoF are fully characterized for arbitrary number of users under finite precision CSIT, for interference networks and broadcast networks, respectively. The optimal achievable scheme in both cases is based on TIN along with power control and jamming. Proofs of optimality rely on a combination of secrecy constraints and Aligned Images sum-set inequalities. |
doi_str_mv | 10.1109/TWC.2021.3118019 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_9576597</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9576597</ieee_id><sourcerecordid>2662091274</sourcerecordid><originalsourceid>FETCH-LOGICAL-c291t-71cbb5314250691add4290af07baa0e2756d321b09942163eb2966abe1ceb7583</originalsourceid><addsrcrecordid>eNo9kEFLAzEQhYMoWKt3wYMLnrfOTDbJ5ijFaqFY0BWPIdnNQkt1a7J76L83ZYunmcN7M-99jN0izBBBP1Zf8xkB4YwjloD6jE1QiDInKsrz485ljqTkJbuKcQuASgoxYffvnRtin633_ebb7jb9Ieva7MPXQ_BZtXy7Zhet3UV_c5pT9rl4ruav-Wr9spw_rfKaNPa5wto5wbEgAVKjbZqCNNgWlLMWPCkhG07oQOuCUHLvSEtpncfaOyVKPmUP49196H4HH3uz7Ybwk14akpJAp-xFUsGoqkMXY_Ct2YcUOxwMgjliMAmDOWIwJwzJcjdaNt77f7kWqb5W_A9htlWs</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2662091274</pqid></control><display><type>article</type><title>Robust Optimality of Secure TIN</title><source>IEEE Electronic Library (IEL)</source><creator>Chan, Yao-Chia ; Geng, Chunhua ; Jafar, Syed A.</creator><creatorcontrib>Chan, Yao-Chia ; Geng, Chunhua ; Jafar, Syed A.</creatorcontrib><description><![CDATA[In order to discover larger networks and parameter regimes where sharp Generalized Degrees of Freedom (GDoF) characterizations may be found based on the optimality of robust schemes for interference and broadcast networks with channel state information at the transmitters (CSIT) limited to finite precision, we explore the impact of secrecy constraints. In the absence of secrecy constraints, the largest such parameter regime for <inline-formula> <tex-math notation="LaTeX">K </tex-math></inline-formula> user interference networks is the CTIN regime (so named for the C onvexity of the GDoF region achieved by Treating Interference as Noise (TIN)) originally discovered by Yi and Caire, whose optimality was established by Chan et al. For the corresponding broadcast networks the largest regime is the SLS (Simple Layered Superposition) regime discovered by Davoodi and Jafar, but only for small networks with <inline-formula> <tex-math notation="LaTeX">K\leq 3 </tex-math></inline-formula> users. By including secrecy constraints, we identify much larger regimes, the STIN regime and the SLS regime, where GDoF are fully characterized for arbitrary number of users under finite precision CSIT, for interference networks and broadcast networks, respectively. The optimal achievable scheme in both cases is based on TIN along with power control and jamming. Proofs of optimality rely on a combination of secrecy constraints and Aligned Images sum-set inequalities.]]></description><identifier>ISSN: 1536-1276</identifier><identifier>EISSN: 1558-2248</identifier><identifier>DOI: 10.1109/TWC.2021.3118019</identifier><identifier>CODEN: ITWCAX</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>aligned image bounds ; extremal network theory ; Interference ; Interference channels ; Jamming ; MISO communication ; Networks ; Optimization ; Parameters ; Power control ; Robustness ; secure generalized degrees of freedom ; Signal to noise ratio ; Tin ; Transmitters ; treating interference as noise</subject><ispartof>IEEE transactions on wireless communications, 2022-05, Vol.21 (5), p.3071-3082</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c291t-71cbb5314250691add4290af07baa0e2756d321b09942163eb2966abe1ceb7583</citedby><cites>FETCH-LOGICAL-c291t-71cbb5314250691add4290af07baa0e2756d321b09942163eb2966abe1ceb7583</cites><orcidid>0000-0002-5766-8824 ; 0000-0003-2038-2977 ; 0000-0001-9340-8598</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9576597$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9576597$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chan, Yao-Chia</creatorcontrib><creatorcontrib>Geng, Chunhua</creatorcontrib><creatorcontrib>Jafar, Syed A.</creatorcontrib><title>Robust Optimality of Secure TIN</title><title>IEEE transactions on wireless communications</title><addtitle>TWC</addtitle><description><![CDATA[In order to discover larger networks and parameter regimes where sharp Generalized Degrees of Freedom (GDoF) characterizations may be found based on the optimality of robust schemes for interference and broadcast networks with channel state information at the transmitters (CSIT) limited to finite precision, we explore the impact of secrecy constraints. In the absence of secrecy constraints, the largest such parameter regime for <inline-formula> <tex-math notation="LaTeX">K </tex-math></inline-formula> user interference networks is the CTIN regime (so named for the C onvexity of the GDoF region achieved by Treating Interference as Noise (TIN)) originally discovered by Yi and Caire, whose optimality was established by Chan et al. For the corresponding broadcast networks the largest regime is the SLS (Simple Layered Superposition) regime discovered by Davoodi and Jafar, but only for small networks with <inline-formula> <tex-math notation="LaTeX">K\leq 3 </tex-math></inline-formula> users. By including secrecy constraints, we identify much larger regimes, the STIN regime and the SLS regime, where GDoF are fully characterized for arbitrary number of users under finite precision CSIT, for interference networks and broadcast networks, respectively. The optimal achievable scheme in both cases is based on TIN along with power control and jamming. Proofs of optimality rely on a combination of secrecy constraints and Aligned Images sum-set inequalities.]]></description><subject>aligned image bounds</subject><subject>extremal network theory</subject><subject>Interference</subject><subject>Interference channels</subject><subject>Jamming</subject><subject>MISO communication</subject><subject>Networks</subject><subject>Optimization</subject><subject>Parameters</subject><subject>Power control</subject><subject>Robustness</subject><subject>secure generalized degrees of freedom</subject><subject>Signal to noise ratio</subject><subject>Tin</subject><subject>Transmitters</subject><subject>treating interference as noise</subject><issn>1536-1276</issn><issn>1558-2248</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kEFLAzEQhYMoWKt3wYMLnrfOTDbJ5ijFaqFY0BWPIdnNQkt1a7J76L83ZYunmcN7M-99jN0izBBBP1Zf8xkB4YwjloD6jE1QiDInKsrz485ljqTkJbuKcQuASgoxYffvnRtin633_ebb7jb9Ieva7MPXQ_BZtXy7Zhet3UV_c5pT9rl4ruav-Wr9spw_rfKaNPa5wto5wbEgAVKjbZqCNNgWlLMWPCkhG07oQOuCUHLvSEtpncfaOyVKPmUP49196H4HH3uz7Ybwk14akpJAp-xFUsGoqkMXY_Ct2YcUOxwMgjliMAmDOWIwJwzJcjdaNt77f7kWqb5W_A9htlWs</recordid><startdate>202205</startdate><enddate>202205</enddate><creator>Chan, Yao-Chia</creator><creator>Geng, Chunhua</creator><creator>Jafar, Syed A.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-5766-8824</orcidid><orcidid>https://orcid.org/0000-0003-2038-2977</orcidid><orcidid>https://orcid.org/0000-0001-9340-8598</orcidid></search><sort><creationdate>202205</creationdate><title>Robust Optimality of Secure TIN</title><author>Chan, Yao-Chia ; Geng, Chunhua ; Jafar, Syed A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c291t-71cbb5314250691add4290af07baa0e2756d321b09942163eb2966abe1ceb7583</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>aligned image bounds</topic><topic>extremal network theory</topic><topic>Interference</topic><topic>Interference channels</topic><topic>Jamming</topic><topic>MISO communication</topic><topic>Networks</topic><topic>Optimization</topic><topic>Parameters</topic><topic>Power control</topic><topic>Robustness</topic><topic>secure generalized degrees of freedom</topic><topic>Signal to noise ratio</topic><topic>Tin</topic><topic>Transmitters</topic><topic>treating interference as noise</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chan, Yao-Chia</creatorcontrib><creatorcontrib>Geng, Chunhua</creatorcontrib><creatorcontrib>Jafar, Syed A.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on wireless communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chan, Yao-Chia</au><au>Geng, Chunhua</au><au>Jafar, Syed A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Robust Optimality of Secure TIN</atitle><jtitle>IEEE transactions on wireless communications</jtitle><stitle>TWC</stitle><date>2022-05</date><risdate>2022</risdate><volume>21</volume><issue>5</issue><spage>3071</spage><epage>3082</epage><pages>3071-3082</pages><issn>1536-1276</issn><eissn>1558-2248</eissn><coden>ITWCAX</coden><abstract><![CDATA[In order to discover larger networks and parameter regimes where sharp Generalized Degrees of Freedom (GDoF) characterizations may be found based on the optimality of robust schemes for interference and broadcast networks with channel state information at the transmitters (CSIT) limited to finite precision, we explore the impact of secrecy constraints. In the absence of secrecy constraints, the largest such parameter regime for <inline-formula> <tex-math notation="LaTeX">K </tex-math></inline-formula> user interference networks is the CTIN regime (so named for the C onvexity of the GDoF region achieved by Treating Interference as Noise (TIN)) originally discovered by Yi and Caire, whose optimality was established by Chan et al. For the corresponding broadcast networks the largest regime is the SLS (Simple Layered Superposition) regime discovered by Davoodi and Jafar, but only for small networks with <inline-formula> <tex-math notation="LaTeX">K\leq 3 </tex-math></inline-formula> users. By including secrecy constraints, we identify much larger regimes, the STIN regime and the SLS regime, where GDoF are fully characterized for arbitrary number of users under finite precision CSIT, for interference networks and broadcast networks, respectively. The optimal achievable scheme in both cases is based on TIN along with power control and jamming. Proofs of optimality rely on a combination of secrecy constraints and Aligned Images sum-set inequalities.]]></abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TWC.2021.3118019</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0002-5766-8824</orcidid><orcidid>https://orcid.org/0000-0003-2038-2977</orcidid><orcidid>https://orcid.org/0000-0001-9340-8598</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1536-1276 |
ispartof | IEEE transactions on wireless communications, 2022-05, Vol.21 (5), p.3071-3082 |
issn | 1536-1276 1558-2248 |
language | eng |
recordid | cdi_ieee_primary_9576597 |
source | IEEE Electronic Library (IEL) |
subjects | aligned image bounds extremal network theory Interference Interference channels Jamming MISO communication Networks Optimization Parameters Power control Robustness secure generalized degrees of freedom Signal to noise ratio Tin Transmitters treating interference as noise |
title | Robust Optimality of Secure TIN |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T11%3A20%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Robust%20Optimality%20of%20Secure%20TIN&rft.jtitle=IEEE%20transactions%20on%20wireless%20communications&rft.au=Chan,%20Yao-Chia&rft.date=2022-05&rft.volume=21&rft.issue=5&rft.spage=3071&rft.epage=3082&rft.pages=3071-3082&rft.issn=1536-1276&rft.eissn=1558-2248&rft.coden=ITWCAX&rft_id=info:doi/10.1109/TWC.2021.3118019&rft_dat=%3Cproquest_RIE%3E2662091274%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2662091274&rft_id=info:pmid/&rft_ieee_id=9576597&rfr_iscdi=true |