Interference Alignment with Imperfect Channel Knowledge and Secrecy Constraints

In this thesis, the degrees of freedom (DOF) of wireless networks are studied with imperfect channel state information at transmitters (CSIT) and/or secrecy constraints. Different interference alignment schemes are proposed to establish the DOF lower bound for a variety of wireless networks. For th...

Full description

Bibliographic Details
Main Author: Wang, Zhao
Format: Doctoral Thesis
Language:English
Published: KTH, Kommunikationsteori 2015
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166266
http://nbn-resolving.de/urn:isbn:978-91-7595-590-2
id ndltd-UPSALLA1-oai-DiVA.org-kth-166266
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-kth-1662662015-07-09T04:52:58ZInterference Alignment with Imperfect Channel Knowledge and Secrecy ConstraintsengWang, ZhaoKTH, KommunikationsteoriStockholm2015In this thesis, the degrees of freedom (DOF) of wireless networks are studied with imperfect channel state information at transmitters (CSIT) and/or secrecy constraints. Different interference alignment schemes are proposed to establish the DOF lower bound for a variety of wireless networks. For the imperfections of CSIT, we mainly have two practical concerns. The first concern is the long delay of the high-resolution feedback from receivers to transmitters such that the obtained CSIT is totally outdated. The second concern is the inaccurate estimation on the instantaneous CSIT. Specifically, the first scenario is solely investigated in a delayed CSIT model, and a combination of these two types of imperfections is studied in a mixed CSIT model. The DOF of wireless networks are studied based on these two CSIT models. Regarding secrecy constraints, we also consider two scenarios, to be specific, the weak secrecy where the confidentiality is measured by the normalized information leakage with respect to the codeword length, and the strong secrecy where the total information leakage of the whole codeword is used as the secrecy measure. In the first part of the thesis, the impact of imperfect CSIT is investigated for the multi-hop broadcast networks. The Maddah-Ali \&amp; Tse (MAT) alignment is extended to the considered multi-hop network to make use of the delayed CSIT, and it is also shown that the MAT scheme can be integrated with linear beamforming to achieve the optimal sum DOF of a two-user multi-hop broadcast network with mixed CSIT. In the second part of the thesis, the secrecy constraints are subjected to the studied networks. With weak secrecy constraints, we propose artificial noise alignment approaches for seeking the optimal secure degrees of freedom (SDOF) of wireless $X$ networks, the multiple-input single-output (MISO) broadcast channel and the two-hop interference channel. It is worth noting that the proposed alignment schemes are also based on divergent CSIT conditions, i.e., delayed, mixed or even no CSIT. With strong secrecy constraints, the secure coding based on channel resolvability and the signaling method by interference alignment are combined to provide the optimal SDOF of the $K$-user interference channel with confidential messages. It is worth noting that a general framework of the secure interference alignment encoder is provided in the thesis, which consists of two functional sections: the stochastic encoding section to provide secure codes and the alignment section to provide signaling solutions. This framework can be applied to all the network models studied in the latter part of the thesis.    <p>QC 20150507</p>Doctoral thesis, monographinfo:eu-repo/semantics/doctoralThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166266urn:isbn:978-91-7595-590-2TRITA-EE, 1653-5146 ; 2015:023application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Doctoral Thesis
sources NDLTD
description In this thesis, the degrees of freedom (DOF) of wireless networks are studied with imperfect channel state information at transmitters (CSIT) and/or secrecy constraints. Different interference alignment schemes are proposed to establish the DOF lower bound for a variety of wireless networks. For the imperfections of CSIT, we mainly have two practical concerns. The first concern is the long delay of the high-resolution feedback from receivers to transmitters such that the obtained CSIT is totally outdated. The second concern is the inaccurate estimation on the instantaneous CSIT. Specifically, the first scenario is solely investigated in a delayed CSIT model, and a combination of these two types of imperfections is studied in a mixed CSIT model. The DOF of wireless networks are studied based on these two CSIT models. Regarding secrecy constraints, we also consider two scenarios, to be specific, the weak secrecy where the confidentiality is measured by the normalized information leakage with respect to the codeword length, and the strong secrecy where the total information leakage of the whole codeword is used as the secrecy measure. In the first part of the thesis, the impact of imperfect CSIT is investigated for the multi-hop broadcast networks. The Maddah-Ali \&amp; Tse (MAT) alignment is extended to the considered multi-hop network to make use of the delayed CSIT, and it is also shown that the MAT scheme can be integrated with linear beamforming to achieve the optimal sum DOF of a two-user multi-hop broadcast network with mixed CSIT. In the second part of the thesis, the secrecy constraints are subjected to the studied networks. With weak secrecy constraints, we propose artificial noise alignment approaches for seeking the optimal secure degrees of freedom (SDOF) of wireless $X$ networks, the multiple-input single-output (MISO) broadcast channel and the two-hop interference channel. It is worth noting that the proposed alignment schemes are also based on divergent CSIT conditions, i.e., delayed, mixed or even no CSIT. With strong secrecy constraints, the secure coding based on channel resolvability and the signaling method by interference alignment are combined to provide the optimal SDOF of the $K$-user interference channel with confidential messages. It is worth noting that a general framework of the secure interference alignment encoder is provided in the thesis, which consists of two functional sections: the stochastic encoding section to provide secure codes and the alignment section to provide signaling solutions. This framework can be applied to all the network models studied in the latter part of the thesis.    === <p>QC 20150507</p>
author Wang, Zhao
spellingShingle Wang, Zhao
Interference Alignment with Imperfect Channel Knowledge and Secrecy Constraints
author_facet Wang, Zhao
author_sort Wang, Zhao
title Interference Alignment with Imperfect Channel Knowledge and Secrecy Constraints
title_short Interference Alignment with Imperfect Channel Knowledge and Secrecy Constraints
title_full Interference Alignment with Imperfect Channel Knowledge and Secrecy Constraints
title_fullStr Interference Alignment with Imperfect Channel Knowledge and Secrecy Constraints
title_full_unstemmed Interference Alignment with Imperfect Channel Knowledge and Secrecy Constraints
title_sort interference alignment with imperfect channel knowledge and secrecy constraints
publisher KTH, Kommunikationsteori
publishDate 2015
url http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166266
http://nbn-resolving.de/urn:isbn:978-91-7595-590-2
work_keys_str_mv AT wangzhao interferencealignmentwithimperfectchannelknowledgeandsecrecyconstraints
_version_ 1716807974352060416