Quadratically Constrained Channels with Causal Adversaries

We consider the problem of communication over a channel with a causal jamming adversary subject to quadratic constraints. A sender Alice wishes to communicate a message to a receiver Bob by transmitting a real-valued length-n codeword \mathbf{x}=(x_{1}, \ldots, x_{n}) through a communication channel...

Full description

Saved in:
Bibliographic Details
Published in2018 IEEE International Symposium on Information Theory (ISIT) pp. 621 - 625
Main Authors Li, Tongxin, Dey, Bikash Kumar, Jaggi, Sidharth, Langberg, Michael, Sarwate, Anand D.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.06.2018
Subjects
Online AccessGet full text
ISSN2157-8117
DOI10.1109/ISIT.2018.8437839

Cover

Abstract We consider the problem of communication over a channel with a causal jamming adversary subject to quadratic constraints. A sender Alice wishes to communicate a message to a receiver Bob by transmitting a real-valued length-n codeword \mathbf{x}=(x_{1}, \ldots, x_{n}) through a communication channel. Alice and Bob do not share common randomness. Knowing Alice's encoding strategy, a jammer James chooses a real-valued length- n adversarial noise sequence \mathbf{s}=(s_{1}, \ldots, s_{n}) in a causal manner: each s_{t}\ (1\leq t\leq n) can only depend on (x_{1}, \ldots, x_{t}) . Bob receives y, the sum (over \mathbb{R} ) of Alice's transmission x and James' jamming vector s, and is required to reliably estimate Alice's message from this sum. In addition, Alice and James's transmission powers are restricted by quadratic constraints P > 0 and N > 0 such that \sum_{t=1}^{n}x_{t}^{2}\leq nP and \sum_{t=1}^{n}\ s_{t}^{2}\leq nN . In this work, we characterize the channel capacity for such a channel as the limit superior of the optimal values C_{n}\left(\frac{P}{N}\right) of a series of optimizations. Upper and lower bounds on C_{n}\left(\frac{P}{N}\right) are provided both analytically and numerically. Interestingly, unlike many communication problems, in this causal setting Alice's optimal codebook may not have a uniform power allocation - for certain SNR a codebook with a two-level uniform power allocation results in a strictly higher rate than a codebook with a uniform power allocation would.
AbstractList We consider the problem of communication over a channel with a causal jamming adversary subject to quadratic constraints. A sender Alice wishes to communicate a message to a receiver Bob by transmitting a real-valued length-n codeword \mathbf{x}=(x_{1}, \ldots, x_{n}) through a communication channel. Alice and Bob do not share common randomness. Knowing Alice's encoding strategy, a jammer James chooses a real-valued length- n adversarial noise sequence \mathbf{s}=(s_{1}, \ldots, s_{n}) in a causal manner: each s_{t}\ (1\leq t\leq n) can only depend on (x_{1}, \ldots, x_{t}) . Bob receives y, the sum (over \mathbb{R} ) of Alice's transmission x and James' jamming vector s, and is required to reliably estimate Alice's message from this sum. In addition, Alice and James's transmission powers are restricted by quadratic constraints P > 0 and N > 0 such that \sum_{t=1}^{n}x_{t}^{2}\leq nP and \sum_{t=1}^{n}\ s_{t}^{2}\leq nN . In this work, we characterize the channel capacity for such a channel as the limit superior of the optimal values C_{n}\left(\frac{P}{N}\right) of a series of optimizations. Upper and lower bounds on C_{n}\left(\frac{P}{N}\right) are provided both analytically and numerically. Interestingly, unlike many communication problems, in this causal setting Alice's optimal codebook may not have a uniform power allocation - for certain SNR a codebook with a two-level uniform power allocation results in a strictly higher rate than a codebook with a uniform power allocation would.
Author Jaggi, Sidharth
Li, Tongxin
Sarwate, Anand D.
Dey, Bikash Kumar
Langberg, Michael
Author_xml – sequence: 1
  givenname: Tongxin
  surname: Li
  fullname: Li, Tongxin
  email: tongxin@caltech.edu
  organization: Caltech
– sequence: 2
  givenname: Bikash Kumar
  surname: Dey
  fullname: Dey, Bikash Kumar
  email: bikash@ee.iitb.ac.in
  organization: IIT Bombay
– sequence: 3
  givenname: Sidharth
  surname: Jaggi
  fullname: Jaggi, Sidharth
  email: jaggi@ie.cuhk.edu.hk
  organization: CUHK
– sequence: 4
  givenname: Michael
  surname: Langberg
  fullname: Langberg, Michael
  email: mikel@buffalo.edu
  organization: SUNY Buffalo
– sequence: 5
  givenname: Anand D.
  surname: Sarwate
  fullname: Sarwate, Anand D.
  email: asarwate@ece.rutgers.edu
  organization: Rutgers
BookMark eNotz99KwzAUgPEoCs7ZBxBv-gKdOfl3Eu9GcVoYiDivR9KeskjtJOmUvb2Cu_rdffBds4txPxJjt8AXANzdN2_NZiE42IVVEq10Z6xwaEFLa9Sf8pzNBGisLABesSLnD865MFYZBzP28HrwXfJTbP0wHMt6P-Yp-ThSV9Y7P4405PInTruy9ofsh3LZfVPKPkXKN-yy90Om4uScva8eN_VztX55aurluoqAeqpkEKpHp1BDEAEDaGEC9YjStL3HYIBM16LmhBK4kNKgk2CRSGGrTS_n7O6_G4lo-5Xip0_H7elW_gKH2kly
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/ISIT.2018.8437839
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9781538647813
1538647818
EISSN 2157-8117
EndPage 625
ExternalDocumentID 8437839
Genre orig-research
GroupedDBID 6IE
6IH
6IK
6IL
6IN
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IJVOP
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-i175t-3b24f794751b2b7b1526bef7736cfa7b61e6dc750e73102336793187ee47c56f3
IEDL.DBID RIE
IngestDate Wed Aug 13 06:22:37 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-3b24f794751b2b7b1526bef7736cfa7b61e6dc750e73102336793187ee47c56f3
PageCount 5
ParticipantIDs ieee_primary_8437839
PublicationCentury 2000
PublicationDate 2018-June
PublicationDateYYYYMMDD 2018-06-01
PublicationDate_xml – month: 06
  year: 2018
  text: 2018-June
PublicationDecade 2010
PublicationTitle 2018 IEEE International Symposium on Information Theory (ISIT)
PublicationTitleAbbrev ISIT
PublicationYear 2018
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0002684691
ssj0037302
Score 1.7208887
Snippet We consider the problem of communication over a channel with a causal jamming adversary subject to quadratic constraints. A sender Alice wishes to communicate...
SourceID ieee
SourceType Publisher
StartPage 621
SubjectTerms Channel capacity
Encoding
Jamming
Lower bound
Optimization
Receivers
Reliability
Resource management
Signal to noise ratio
Vectors
Title Quadratically Constrained Channels with Causal Adversaries
URI https://ieeexplore.ieee.org/document/8437839
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED21nZgKtIhveWAkKYkdO2GtqFqkIhCt1K2KnYuEqFJEkwF-PWcnLQIxsEUZIst353c537sHcJWTX_A0055KtPKE1JmXEix5IlCEd4oyisiykacPcjwX94to0YLrHRcGEV3zGfr20d3lZ2tT2VLZIBZcEaC3oU1uVnO1dvUUO7XEzX2pT2FOnhs2t5jBTTKYPE9mtpEr9puP_FBTcWAy6sJ0u4y6h-TVr0rtm89fExr_u8596H_T9tjjDpAOoIXFIXS3ug2sCeMe3D5VaWYtT_ZZfTCr2emUIjBjlmxQEFwyW59lw7TapCvmRJs37qe6D_PR3Ww49hoNBe-FEoPS4zoUOcWcigIdaqUJrqXGXCkuTZ4qLQOUmaG0ARW3Uxy4pIANYoUolIlkzo-gU6wLPAYWa24wkbGlfgiMMRYmMzlXieIm0WFyAj27Fcu3ekzGstmF079fn8GeNUfddXUOnfK9wgvC91JfOsN-AQpyoxI
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMsBUoEV844GRpCR27IS1omqgrUC0Urcqdi4SokoRTQb49dhOWgRiYIs8RJbP53c-37sHcJXpfUGTVDoiksJhXKZOomHJYZ7QeCd0RBEYNvJozAdTdj8LZg243nBhENEWn6FrPu1bfrpUpUmVdUNGhQb0LdjWuM-Ciq21yaiYviW280t1DlO9d_36HdO7ibrxczwxpVyhW__mh56KhZN-C0briVRVJK9uWUhXff7q0fjfme5B55u4Rx43kLQPDcwPoLVWbiC1I7fh9qlMUmN7baHFBzGqnVYrAlNi6Aa5BkxiMrSkl5SrZEGsbPPKXqs7MO3fTXoDp1ZRcF50aFA4VPos014nAk_6UkgN2FxiJgTlKkuE5B7yVOnAAQU1fRwo1y7rhQKRCRXwjB5CM1_meAQklFRhxEND_mAYYshUqjIqIkFVJP3oGNpmKeZvVaOMeb0KJ38PX8LOYDIazofx-OEUdo1pqhqsM2gW7yWea7Qv5IU18hfHCqZf
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+IEEE+International+Symposium+on+Information+Theory+%28ISIT%29&rft.atitle=Quadratically+Constrained+Channels+with+Causal+Adversaries&rft.au=Li%2C+Tongxin&rft.au=Dey%2C+Bikash+Kumar&rft.au=Jaggi%2C+Sidharth&rft.au=Langberg%2C+Michael&rft.date=2018-06-01&rft.pub=IEEE&rft.eissn=2157-8117&rft.spage=621&rft.epage=625&rft_id=info:doi/10.1109%2FISIT.2018.8437839&rft.externalDocID=8437839