Quadratically Constrained Channels with Causal Adversaries
We consider the problem of communication over a channel with a causal jamming adversary subject to quadratic constraints. A sender Alice wishes to communicate a message to a receiver Bob by transmitting a real-valued length-n codeword \mathbf{x}=(x_{1}, \ldots, x_{n}) through a communication channel...
Saved in:
Published in | 2018 IEEE International Symposium on Information Theory (ISIT) pp. 621 - 625 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.06.2018
|
Subjects | |
Online Access | Get full text |
ISSN | 2157-8117 |
DOI | 10.1109/ISIT.2018.8437839 |
Cover
Abstract | We consider the problem of communication over a channel with a causal jamming adversary subject to quadratic constraints. A sender Alice wishes to communicate a message to a receiver Bob by transmitting a real-valued length-n codeword \mathbf{x}=(x_{1}, \ldots, x_{n}) through a communication channel. Alice and Bob do not share common randomness. Knowing Alice's encoding strategy, a jammer James chooses a real-valued length- n adversarial noise sequence \mathbf{s}=(s_{1}, \ldots, s_{n}) in a causal manner: each s_{t}\ (1\leq t\leq n) can only depend on (x_{1}, \ldots, x_{t}) . Bob receives y, the sum (over \mathbb{R} ) of Alice's transmission x and James' jamming vector s, and is required to reliably estimate Alice's message from this sum. In addition, Alice and James's transmission powers are restricted by quadratic constraints P > 0 and N > 0 such that \sum_{t=1}^{n}x_{t}^{2}\leq nP and \sum_{t=1}^{n}\ s_{t}^{2}\leq nN . In this work, we characterize the channel capacity for such a channel as the limit superior of the optimal values C_{n}\left(\frac{P}{N}\right) of a series of optimizations. Upper and lower bounds on C_{n}\left(\frac{P}{N}\right) are provided both analytically and numerically. Interestingly, unlike many communication problems, in this causal setting Alice's optimal codebook may not have a uniform power allocation - for certain SNR a codebook with a two-level uniform power allocation results in a strictly higher rate than a codebook with a uniform power allocation would. |
---|---|
AbstractList | We consider the problem of communication over a channel with a causal jamming adversary subject to quadratic constraints. A sender Alice wishes to communicate a message to a receiver Bob by transmitting a real-valued length-n codeword \mathbf{x}=(x_{1}, \ldots, x_{n}) through a communication channel. Alice and Bob do not share common randomness. Knowing Alice's encoding strategy, a jammer James chooses a real-valued length- n adversarial noise sequence \mathbf{s}=(s_{1}, \ldots, s_{n}) in a causal manner: each s_{t}\ (1\leq t\leq n) can only depend on (x_{1}, \ldots, x_{t}) . Bob receives y, the sum (over \mathbb{R} ) of Alice's transmission x and James' jamming vector s, and is required to reliably estimate Alice's message from this sum. In addition, Alice and James's transmission powers are restricted by quadratic constraints P > 0 and N > 0 such that \sum_{t=1}^{n}x_{t}^{2}\leq nP and \sum_{t=1}^{n}\ s_{t}^{2}\leq nN . In this work, we characterize the channel capacity for such a channel as the limit superior of the optimal values C_{n}\left(\frac{P}{N}\right) of a series of optimizations. Upper and lower bounds on C_{n}\left(\frac{P}{N}\right) are provided both analytically and numerically. Interestingly, unlike many communication problems, in this causal setting Alice's optimal codebook may not have a uniform power allocation - for certain SNR a codebook with a two-level uniform power allocation results in a strictly higher rate than a codebook with a uniform power allocation would. |
Author | Jaggi, Sidharth Li, Tongxin Sarwate, Anand D. Dey, Bikash Kumar Langberg, Michael |
Author_xml | – sequence: 1 givenname: Tongxin surname: Li fullname: Li, Tongxin email: tongxin@caltech.edu organization: Caltech – sequence: 2 givenname: Bikash Kumar surname: Dey fullname: Dey, Bikash Kumar email: bikash@ee.iitb.ac.in organization: IIT Bombay – sequence: 3 givenname: Sidharth surname: Jaggi fullname: Jaggi, Sidharth email: jaggi@ie.cuhk.edu.hk organization: CUHK – sequence: 4 givenname: Michael surname: Langberg fullname: Langberg, Michael email: mikel@buffalo.edu organization: SUNY Buffalo – sequence: 5 givenname: Anand D. surname: Sarwate fullname: Sarwate, Anand D. email: asarwate@ece.rutgers.edu organization: Rutgers |
BookMark | eNotz99KwzAUgPEoCs7ZBxBv-gKdOfl3Eu9GcVoYiDivR9KeskjtJOmUvb2Cu_rdffBds4txPxJjt8AXANzdN2_NZiE42IVVEq10Z6xwaEFLa9Sf8pzNBGisLABesSLnD865MFYZBzP28HrwXfJTbP0wHMt6P-Yp-ThSV9Y7P4405PInTruy9ofsh3LZfVPKPkXKN-yy90Om4uScva8eN_VztX55aurluoqAeqpkEKpHp1BDEAEDaGEC9YjStL3HYIBM16LmhBK4kNKgk2CRSGGrTS_n7O6_G4lo-5Xip0_H7elW_gKH2kly |
ContentType | Conference Proceeding |
DBID | 6IE 6IH CBEJK RIE RIO |
DOI | 10.1109/ISIT.2018.8437839 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP) 1998-present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9781538647813 1538647818 |
EISSN | 2157-8117 |
EndPage | 625 |
ExternalDocumentID | 8437839 |
Genre | orig-research |
GroupedDBID | 6IE 6IH 6IK 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP OCL RIE RIL RIO |
ID | FETCH-LOGICAL-i175t-3b24f794751b2b7b1526bef7736cfa7b61e6dc750e73102336793187ee47c56f3 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 13 06:22:37 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-3b24f794751b2b7b1526bef7736cfa7b61e6dc750e73102336793187ee47c56f3 |
PageCount | 5 |
ParticipantIDs | ieee_primary_8437839 |
PublicationCentury | 2000 |
PublicationDate | 2018-June |
PublicationDateYYYYMMDD | 2018-06-01 |
PublicationDate_xml | – month: 06 year: 2018 text: 2018-June |
PublicationDecade | 2010 |
PublicationTitle | 2018 IEEE International Symposium on Information Theory (ISIT) |
PublicationTitleAbbrev | ISIT |
PublicationYear | 2018 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0002684691 ssj0037302 |
Score | 1.7208887 |
Snippet | We consider the problem of communication over a channel with a causal jamming adversary subject to quadratic constraints. A sender Alice wishes to communicate... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 621 |
SubjectTerms | Channel capacity Encoding Jamming Lower bound Optimization Receivers Reliability Resource management Signal to noise ratio Vectors |
Title | Quadratically Constrained Channels with Causal Adversaries |
URI | https://ieeexplore.ieee.org/document/8437839 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED21nZgKtIhveWAkKYkdO2GtqFqkIhCt1K2KnYuEqFJEkwF-PWcnLQIxsEUZIst353c537sHcJWTX_A0055KtPKE1JmXEix5IlCEd4oyisiykacPcjwX94to0YLrHRcGEV3zGfr20d3lZ2tT2VLZIBZcEaC3oU1uVnO1dvUUO7XEzX2pT2FOnhs2t5jBTTKYPE9mtpEr9puP_FBTcWAy6sJ0u4y6h-TVr0rtm89fExr_u8596H_T9tjjDpAOoIXFIXS3ug2sCeMe3D5VaWYtT_ZZfTCr2emUIjBjlmxQEFwyW59lw7TapCvmRJs37qe6D_PR3Ww49hoNBe-FEoPS4zoUOcWcigIdaqUJrqXGXCkuTZ4qLQOUmaG0ARW3Uxy4pIANYoUolIlkzo-gU6wLPAYWa24wkbGlfgiMMRYmMzlXieIm0WFyAj27Fcu3ekzGstmF079fn8GeNUfddXUOnfK9wgvC91JfOsN-AQpyoxI |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMsBUoEV844GRpCR27IS1omqgrUC0Urcqdi4SokoRTQb49dhOWgRiYIs8RJbP53c-37sHcJXpfUGTVDoiksJhXKZOomHJYZ7QeCd0RBEYNvJozAdTdj8LZg243nBhENEWn6FrPu1bfrpUpUmVdUNGhQb0LdjWuM-Ciq21yaiYviW280t1DlO9d_36HdO7ibrxczwxpVyhW__mh56KhZN-C0briVRVJK9uWUhXff7q0fjfme5B55u4Rx43kLQPDcwPoLVWbiC1I7fh9qlMUmN7baHFBzGqnVYrAlNi6Aa5BkxiMrSkl5SrZEGsbPPKXqs7MO3fTXoDp1ZRcF50aFA4VPos014nAk_6UkgN2FxiJgTlKkuE5B7yVOnAAQU1fRwo1y7rhQKRCRXwjB5CM1_meAQklFRhxEND_mAYYshUqjIqIkFVJP3oGNpmKeZvVaOMeb0KJ38PX8LOYDIazofx-OEUdo1pqhqsM2gW7yWea7Qv5IU18hfHCqZf |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+IEEE+International+Symposium+on+Information+Theory+%28ISIT%29&rft.atitle=Quadratically+Constrained+Channels+with+Causal+Adversaries&rft.au=Li%2C+Tongxin&rft.au=Dey%2C+Bikash+Kumar&rft.au=Jaggi%2C+Sidharth&rft.au=Langberg%2C+Michael&rft.date=2018-06-01&rft.pub=IEEE&rft.eissn=2157-8117&rft.spage=621&rft.epage=625&rft_id=info:doi/10.1109%2FISIT.2018.8437839&rft.externalDocID=8437839 |