• ### Secrecy Rate Region of SWIPT Wiretap Interference Channels(1709.00906)

Feb. 28, 2019 cs.IT, math.IT
The secrecy rate region of wiretap interference channels with a multi-antenna passive eavesdropper is studied under receiver energy harvesting constraints. To stay operational in the network, the legitimate receivers demand energy alongside information, which is fulfilled by power transmission and exploiting a power splitting (PS) receiver. By simultaneous wireless information and power transfer (SWIPT), the amount of leakage to the eavesdropper increases, which in turn reduces the secrecy rates. For this setup, lower-bounds for secure communication rate are derived without imposing any limitation at the eavesdropper processing. These lower-bounds are then compared with the rates achieved by assuming the worst-case linear eavesdropper processing. We show that in certain special cases the worst-case eavesdropper does not enlarge the achievable secure rate region in comparison to the unconstrained eavesdropper case. It turns out that in order to achieve the Pareto boundary of the secrecy rate region, smart tuning of the transmit power and receiver PS coefficient is required. Hence, we propose an efficient algorithm to optimize these parameters jointly in polynomial-time. The secrecy rate region characterization is formulated as a weighted max-min optimization problem. This problem turns out to be a non-convex problem due to the non-convex constrained set. This set is replaced by a convex subset that in consequence leads to an achievable suboptimal solution which is improved iteratively. By solving the problem efficiently, we obtain the amount of rate loss for providing secrecy, meanwhile satisfying the energy demands.
• ### A Power-Efficient Scheme for Cellular Uplink with Inter-cell Interference(1804.04580)

April 12, 2018 cs.IT, math.IT
We investigate Gaussian widely linear precoding well-known as improper Gaussian signaling for the cellular uplink with inter-cell interference (known as interference multiple access channel (IMAC)). This transmission scheme provides extra degrees of freedom by treating the real and imaginary components of the complex Gaussian signal differently. Since current standards mainly utilize proper Gaussian signaling, we highlight the benefits of joint improper Gaussian signaling and precoding over multiple temporal dimensions (symbol extension in time) in IMAC. This scheme achieves significantly high information rates at the expense of extra complexity at the transmission phase. We study the sum-power minimization problem under rate constraints. This problem is a difference of convex (DC) program, hence a non-convex problem. We derive a convex subset of the original non-convex set that belongs to its interior. The convex subset expands and approaches the original non-convex set from its interior iteratively. By numerical simulations, we observe the benefits of improper Gaussian signaling alongside symbol extension in power consumption for both single-antenna and multi-antenna base stations. Interestingly, we observe that at high interference scenarios, the efficiency of improper Gaussian signaling outperforms conventional proper Gaussian signaling at low rate demands. Moreover, in such scenarios the sum-power required for achieving particular rate demands is significantly reduced.

March 11, 2018 cs.IT, math.IT
An emerging trend of next generation communication systems is to provide network edges with additional capabilities such as storage resources in the form of caches to reduce file delivery latency. To investigate this aspect, we study the fundamental limits of a cache-aided broadcast-relay wireless network consisting of one central base station, $M$ cache-equipped transceivers and $K$ receivers from a latency-centric perspective. We use the normalized delivery time (NDT) to capture the per-bit latency for the worst-case file request pattern, normalized with respect to a reference interference-free system with unlimited transceiver cache capabilities. The objective is to design the schemes for cache placement and file delivery in order to minimize the NDT. To this end, we establish a novel converse and two types of achievability schemes applicable to both time-variant and invariant channels. The first scheme is a general one-shot scheme for any $M$ and $K$ that synergistically exploits both multicasting (coded) caching and distributed zero-forcing opportunities. We show that the proposed one-shot scheme (i) attains gains attributed to both individual and collective transceiver caches (ii) is NDT-optimal for various parameter settings, particularly at higher cache sizes. The second scheme, on the other hand, designs beamformers to facilitate both subspace interference alignment and zero-forcing at lower cache sizes. Exploiting both schemes, we are able to characterize for various special cases of $M$ and $K$ which satisfy $K+M\leq 4$ the optimal tradeoff between cache storage and latency. The tradeoff illustrates that the NDT is the preferred choice to capture the latency of a system rather than the commonly used sum degrees-of-freedom (DoF). In fact, our optimal tradeoff refutes the popular belief that increasing cache sizes translates to increasing the achievable sum DoF.
• ### Delivery Time Minimization in Cache-Assisted Broadcast-Relay Wireless Networks with Imperfect CSI(1803.04059)

March 11, 2018 cs.IT, math.IT
An emerging trend of next generation communication systems is to provide network edges with additional capabilities such as storage resources in the form of caches to reduce file delivery latency. To investigate the impact of this technique on latency, we study the delivery time of a cache-aided broadcast-relay wireless network consisting of one central base station, $M$ cache-equipped transceivers and $K$ receivers under finite precision channel state information (CSI). We use the normalized delivery time (NDT) to capture the worst-case per-bit latency in a file delivery. Lower and upper bounds on the NDT are derived to understand the influence of $K,M$, cache capacity and channel quality on the NDT. In particular, regimes of NDT-optimality are identified and discussed.
• ### Degrees-of-Freedom of the MIMO Three-Way Channel with Node-Intermittency(1708.08161)

May 31, 2019 cs.IT, math.IT
The characterization of fundamental performance bounds of many-to-many communication systems in which participating nodes are active in an intermittent way is one of the major challenges in communication theory. In order to address this issue, we introduce the multiple-input multiple-output (MIMO) three-way channel (3WC) with an intermittent node and study its degrees-of-freedom (DoF) region and sum-DoF. We devise a non-adaptive encoding scheme based on zero-forcing, interference alignment and erasure coding, and show its DoF region (and thus sum-DoF) optimality for non-intermittent 3WCs and its sum-DoF optimality for (node-)intermittent 3WCs. However, we show by example that in general some DoF tuples in the intermittent 3WC can only be achieved by adaptive schemes, such as decode-forward relaying. This shows that non-adaptive encoding is sufficient for the non-intermittent 3WC and for the sum-DoF of intermittent 3WCs, but adaptive encoding is necessary for the DoF region of intermittent 3WCs. Our work contributes to a better understanding of the fundamental limits of multi-way communication systems with intermittency and the impact of adaptation therein.
• ### Fundamental Limits on Latency in Transceiver Cache-Aided HetNets(1707.09029)

July 27, 2017 cs.IT, math.IT
Stringent mobile usage characteristics force wire- less networks to undergo a paradigm shift from conventional connection-centric to content-centric deployment. With respect to 5G, caching and heterogeneous networks (HetNet) are key technologies that will facilitate the evolution of highly content- centric networks by facilitating unified quality of service in terms of low-latency communication. In this paper, we study the impact of transceiver caching on the latency for a HetNet consisting of a single user, a receiver and one cache-assisted transceiver. We define an information-theoretic metric, the delivery time per bit (DTB), that captures the delivery latency. We establish coinciding lower and upper bounds on the DTB as a function of cache size and wireless channel parameters; thus, enabling a complete characterization of the DTB optimality of the network under study. As a result, we identify cache beneficial and non-beneficial channel regimes.
• ### Fundamental Limits on Delivery Time in Cloud- and Cache-Aided Heterogeneous Networks(1706.07627)

June 23, 2017 cs.IT, math.IT
A Fog radio access network is considered as a network architecture candidate to meet the soaring demand in terms of reliability, spectral efficiency, and latency in next generation wireless networks. This architecture combines the benefits associated with centralized cloud processing and wireless edge caching enabling primarily low-latency transmission under moderate fronthaul capacity requirements. The F-RAN we consider in this paper is composed of a centralized cloud server which is connected through fronthaul links to two edge nodes serving two mobile users through a Z-shaped partially connected wireless network. We define an information-theoretic metric, the delivery time per bit (DTB), that captures the worst-case per-bit delivery latency for conveying any requested content to the users. For the cases when cloud and wireless transmission occur either sequentially or in parallel, we establish coinciding lower and upper bounds on the DTB as a function of cache size, backhaul capacity and wireless channel parameters. Through optimized rate allocation, our achievability scheme determines the best combination of private, common signalling and interference neutralization that matches the converse. Our converse bounds use subsets of wireless, fronthaul and caching resources of the F-RAN as side information that enable a single receiver to decode either one or both users' requested files. We show the optimality on the DTB for all channel regimes. In case of serial transmission, the functional DTB-behavior changes at fronthaul capacity thresholds. In this context, we combine multiple channel regimes to classes of channel regimes which share the same fronthaul capacity thresholds and as such the same DTB-functional. In total, our analysis identifies four classes; in only three of those edge caching and cloud processing can provide nontrivial synergestic and non-synergestic performance gains.
• ### Optimal Power Splitting for Simultaneous Information Detection and Energy Harvesting(1704.04459)

April 14, 2017 cs.IT, math.IT
This letter deals with the joint information and energy processing at a receiver of a point-to-point communication channel. In particular, the trade-off between the achievable information rate and harvested energy for a multiple-antenna power splitting (PS) receiver is investigated. Here, the rate- energy region characterization is of particular interest, which is intrinsically a non-convex problem. In this letter, an efficient algorithm is proposed for obtaining an approximate solution to the problem in polynomial time. This algorithm is mainly based on the Taylor approximation in conjunction with semidefinite relaxation (SDR) which is solved by interior-point methods. Moreover, we utilize the Gaussian randomization procedure to obtain a feasible solution for the original problem. It is shown that by proper receiver design the rate-energy region can be significantly enlarged compared to the state of the art, while at the same time the receiver hardware costs is reduced by utilizing less number of energy harvesting circuitry.
• ### On the Degrees-of-Freedom of the MIMO Three-Way Channel with Intermittent Connectivity(1701.08005)

Jan. 27, 2017 cs.IT, math.IT
The degrees-of-freedom (DoF) of the multi-antenna three-way channel (3WC) with an intermittent node is studied. Special attention is given to the impact of adaptation. A nonadaptive transmission scheme based on interference alignment, zero-forcing, and erasure-channel treatment is proposed, and its corresponding DoF region is derived. Then, it is shown that this scheme achieves the sum-DoF of the intermittent channel, in addition to the DoF region of the nonintermittent one. Thus, adaptation is not necessary from those perspectives. To the contrary, it is shown that adaptation is necessary for achieving the DoF region of the intermittent case. This is shown by deriving an outer bound for the intermittent channel with nonadaptive encoding, and giving a counterexample of an adaptive scheme which achieves DoF tuples outside this bound. This highlights the importance of cooperation in this intermittent network.
• ### The Passive Eavesdropper Affects my Channel: Secret-Key Rates under Real-World Conditions (Extended Version)(1701.03904)

Jan. 14, 2017 cs.IT, math.IT, cs.CR
Channel-reciprocity based key generation (CRKG) has gained significant importance as it has recently been proposed as a potential lightweight security solution for IoT devices. However, the impact of the attacker's position in close range has only rarely been evaluated in practice, posing an open research problem about the security of real-world realizations. Furthermore, this would further bridge the gap between theoretical channel models and their practice-oriented realizations. For security metrics, we utilize cross-correlation, mutual information, and a lower bound on secret-key capacity. We design a practical setup of three parties such that the channel statistics, although based on joint randomness, are always reproducible. We run experiments to obtain channel states and evaluate the aforementioned metrics for the impact of an attacker depending on his position. It turns out the attacker himself affects the outcome, which has not been adequately regarded yet in standard channel models.
• ### On the Capacity of an Elemental Two-Way Two-Tier Network(1606.00127)

Oct. 20, 2016 cs.IT, math.IT
A basic setup of a two-tier network, where two mobile users exchange messages with a multi-antenna macrocell basestation, is studied from a rate perspective subject to beamforming and power constraints. The communication is facilitated by two femtocell basestations which act as relays as there is no direct link between the macrocell basestation and the mobile users. We propose a scheme based on physical-layer network coding and compute-and-forward combined with a novel approach that solves the problem of beamformer design and power allocation. We also show that the optimal beamformers are always a convex combination of the channels between the macro- and femtocell basestations. We then establish the cut-set bound of the setup to show that the presented scheme almost achieves the capacity of the setup numerically.
• ### Three-Way Channels with Multiple Unicast Sessions: Capacity Approximation via Network Transformation(1510.09046)

Sept. 19, 2016 cs.IT, math.IT
A network of 3 nodes mutually communicating with each other is studied. This multi-way network is a suitable model for 3-user device-to-device communications. The main goal of this paper is to characterize the capacity region of the underlying Gaussian 3-way channel (3WC) within a constant gap. To this end, a capacity outer bound is derived using cut-set bounds and genie-aided bounds. For achievability, the 3WC is first transformed into an equivalent star-channel. This latter is then decomposed into a set of `successive' sub-channels, leading to a sub-channel allocation problem. Using backward decoding, interference neutralization, and known results on the capacity of the star-channel relying of physical-layer network coding, an achievable rate region for the 3WC is obtained. It is then shown that the achievable rate region is within a constant gap of the developed outer bound, leading to the desired capacity approximation. Interestingly, in contrast to the Gaussian two-way channel (TWC), adaptation is necessary in the 3WC. Furthermore, message splitting is another ingredient of the developed scheme for the 3WC which is not required in the TWC. The two setups are, however, similar in terms of their sum-capacity pre-log which is equal to 2. Finally, some interesting networks and their approximate capacities are recovered as special cases of the 3WC, such as the cooperative BC and MAC.
• ### Green Cloud Radio Access Networks(1607.06231)

July 21, 2016 cs.IT, math.IT
Cloud radio access networks (C-RAN) are a promising technology to enable the ambitious vision of the fifth generation (5G) communication networks. In spite of the potential benefits of C-RAN, the operational costs are still a challenging issue, mainly due to the centralized processing scheme and the large number of operating remote radio head (RRH) connecting to the cloud. In this work we consider a setup in which a CRAN is powered partially with a set of renewable energy sources (RESs), our aim is to minimize the processing/backhauling costs at the cloud centre as well as the transmission power at the RRHs, while satisfying some user quality of service (QoS). This problem is first formulated as a mixed integer non linear program (MINLP) with a large number of optimization variables. The underlying NLP is non-convex, though we address this issue through reformulating the problem using the mean squared error (MSE)-rate relation. To account to the large-scale of the problem, we introduce slack variables to decompose the reformulated (MINLP) and enable the application of a distributed optimization framework by using the alternating direction method of multipliers (ADMM) algorithm.
• ### Improper signaling and symbol extensions: How far can we go with Gaussian P2P codebooks in the interfering MAC with TIN?(1607.01995)

July 7, 2016 cs.IT, math.IT
Meeting the challenges of 5G demands better exploitation of the available spectrum by allowing multiple parties to share resources. For instance, a secondary unlicensed system can share resources with the cellular uplink of a primary licensed system for an improved spectral efficiency. This induces interference which has to be taken into account when designing such a system. A simple yet robust strategy is treating interference as noise (TIN), which is widely adapted in practice. It is thus important to study the capabilities and limitations of TIN in such scenarios. In this paper, we study this scenario modelled as Multiple Access Channel (MAC) interfered by a Point-to-Point (P2P) channel. Here, we focus on rate maximization and power minimization problems separately. We use improper Gaussian signaling (instead of proper) at the transmitters to increase the design flexibility, which offers the freedom of optimizing the transmit signal pseudo-variance in addition to its variance. Furthermore, we allow correlation among the transmitted signals over orthogonal resource basis (i.e., time or frequency) for the purpose of optimal signaling design over the extended channel. We formulate the rate maximization problem as a semidefinite program, and use semidefinite relaxation (SDR) to obtain a near-optimal solution. Numerical optimizations show that, by improper Gaussian signaling the achievable rates can be improved upto three times depending on the strength of the interfering links. Furthermore, we observe significant benefits in power consumption by improper Gaussian signaling with symbol extensions compared to the traditional proper Gaussian signaling. Interestingly, by minimizing sum power given the solution of the rate maximization problem improves the energy efficiency significantly.
• ### On SDoF of Multi-Receiver Wiretap Channel With Alternating CSIT(1503.06333)

March 24, 2016 cs.IT, math.IT
We study the problem of secure transmission over a Gaussian multi-input single-output (MISO) two receiver channel with an external eavesdropper, under the assumption that the state of the channel which is available to each receiver is conveyed either perfectly ($P$) or with delay ($D$) to the transmitter. Denoting by $S_1$, $S_2$, and $S_3$ the channel state information at the transmitter (CSIT) of user 1, user 2, and eavesdropper, respectively, the overall CSIT can then alternate between eight possible states, i.e., $(S_1,S_2,S_3) \in \{P,D\}^3$. We denote by $\lambda_{S_1 S_2 S_3}$ the fraction of time during which the state $S_1S_2S_3$ occurs. Under these assumptions, we first consider the Gaussian MISO wiretap channel and characterize the secure degrees of freedom (SDoF). Next, we consider the general multi-receiver setup and characterize the SDoF region of fixed hybrid states $PPD$, $PDP$, and $DDP$. We then focus our attention on the symmetric case in which $\lambda_{PDD}=\lambda_{DPD}$. For this case, we establish bounds on SDoF region. The analysis reveals that alternating CSIT allows synergistic gains in terms of SDoF; and shows that, by opposition to encoding separately over different states, joint encoding across the states enables strictly better secure rates. Furthermore, we specialize our results for the two receivers channel with an external eavesdropper to the two-user broadcast channel. We show that, the synergistic gains in terms of SDoF by alternating CSIT is not restricted to multi-receiver wiretap channels; and, can also be harnessed under broadcast setting.
• ### Harvesting the (Self-)Interference in Heterogeneous Full-Duplex Networks For Joint Rate-Energy Optimization(1603.00203)

March 1, 2016 cs.IT, math.IT
Wireless nodes in future communication systems are expected to overcome three barriers when compared to their transitional counterparts, namely to support significantly higher data rates, have long-lasting energy supplies and remain fully operational in interference-limited heterogeneous networks. This could be achieved by providing three promising features, which are radio frequency (RF) energy harvesting, improper Gaussian signaling and operating in full-duplex communication mode, i.e., transmit and receive at the same time within the same frequency band. In this paper, we consider these aspects jointly in a multi-antenna heterogeneous two-tier-network. Thus, the users in the femto-cell are sharing the scarce resources with the cellular users in the macro-cell and have to cope with the interference from the macro-cell base station as well as the transmitter noise and residual self-interference (RSI) due to imperfect full-duplex operation. Interestingly enough, while these impairments are detrimental from the achievable rate perspective, they are beneficial from the energy harvesting aspect as they carry RF energy. In this paper, we consider this natural trade-off jointly and propose appropriate optimization problems for beamforming and optimal resource allocation. Various receiver structures are employed for both information detection (ID) and energy harvesting (EH) capabilities. The paper aims at characterizing the trade-off between the achievable rates and harvested energies. Rate and energy maximization problems are thoroughly investigated. Finally, the numerical illustrations demonstrate the impact of the energy harvesting on the achievable rate performance.
• ### Cloud Radio Access Networks with Coded Caching(1512.02385)

Feb. 10, 2016 cs.IT, math.IT
A cloud radio access network (C-RAN) is considered as a candidate to meet the expectations of higher data rate de- mands in wireless networks. In C-RAN, low energy base stations (BSs) are deployed over a small geography and are allowed to connect to the cloud via finite capacity backhaul links where the information is processed. A conventional C-RAN, however, requires high capacity backhaul links, since the requested files need to be transferred first from the cloud to the BS before conveying them to the users. One approach to overcome the limitations of the backhaul links is to introduce local storage caches at the BSs, in which the popular files are stored locally in order to reduce the load of the backhaul links. Furthermore, we utilize coded caching with the goal to minimize the total network cost, i.e., the transmit power and the cost associated with the backhaul links. The initial formulation of the optimization problem for this model is non-convex. We first reformulate and then convexify the problem through some relaxation techniques. In comparison to the uncoded caching at the BSs, our results highlight the benefits associated with coded caching and show that it decreases the backhaul cost.
• ### Full-Duplex vs. Half-Duplex Secret-Key Generation(1506.08565)

Jan. 20, 2016 cs.IT, math.IT, cs.CR
Full-duplex (FD) communication is regarded as a key technology in future 5G and Internet of Things (IoT) systems. In addition to high data rate constraints, the success of these systems depends on the ability to allow for confidentiality and security. Secret-key agreement from reciprocal wireless channels can be regarded as a valuable supplement for security at the physical layer. In this work, we study the role of FD communication in conjunction with secret-key agreement. We first introduce two complementary key generation models for FD and half-duplex (HD) settings and compare the performance by introducing the key-reconciliation function. Furthermore, we study the impact of the so called probing-reconciliation trade-off, the role of a strong eavesdropper and analyze the system in the high SNR regime. We show that under certain conditions, the FD mode enforces a deteriorating impact on the capabilities of the eavesdropper and offers several advantages in terms of secret-key rate over the conventional HD setups. Our analysis reveals as an interesting insight that perfect self-interference cancellation is not necessary in order to obtain performance gains over the HD mode.
• ### Individual Secrecy for the Broadcast Channel(1511.09070)

Nov. 29, 2015 cs.IT, math.IT
This paper studies the problem of secure communication over broadcast channels under the individual secrecy constraints. That is, the transmitter wants to send two independent messages to two legitimate receivers in the presence of an eavesdropper, while keeping the eavesdropper ignorant of each message (i.e., the information leakage from each message to the eavesdropper is made vanishing). Building upon Carleial-Hellman's secrecy coding, Wyner's secrecy coding, the frameworks of superposition coding and Marton's coding together with techniques such as rate splitting and indirect decoding, achievable rate regions are developed. The proposed regions are compared with those satisfying joint secrecy and without secrecy constraints, and the individual secrecy capacity regions for special cases are characterized. In particular, capacity region for the deterministic case is established, and for the Gaussian model, a constant gap (i.e., 0.5 bits within the individual secrecy capacity region) result is obtained. Overall, when compared with the joint secrecy constraint, the results allow for trading-off secrecy level and throughput in the system.
• ### Interplay Between Delayed CSIT and Network Topology for Secure MISO BC(1510.07930)

Oct. 27, 2015 cs.IT, math.IT
We study the problem of secure transmission over a Gaussian two-user multi-input single-output (MISO) broadcast channel under the assumption that links connecting the transmitter to the two receivers may have unequal strength statistically. In addition to this, the state of the channel to each receiver is conveyed in a strictly causal manner to the transmitter. We focus on a two state topological setting of strong v.s. weak links. Under these assumptions, we first consider the MISO wiretap channel and establish bounds on generalized secure degrees of freedom (GSDoF). Next, we extend this model to the two-user MISO broadcast channel and establish inner and outer bounds on GSDoF region with different topology states. The encoding scheme sheds light on the usage of both resources, i.e., topology of the model and strictly causal channel state information at the transmitter (CSIT); and, allows digitization and multi-casting of overheard side information, while transmitting confidential message over the stronger link. Furthermore, for a special class of channels, we show that the established bounds agree and so we characterize the sum GSDoF.
• ### Cyclic Communication and the Inseparability of MIMO Multi-way Relay Channels(1510.03380)

Oct. 12, 2015 cs.IT, math.IT
The $K$-user MIMO multi-way relay channel (Y-channel) consisting of $K$ users with $M$ antennas each and a common relay node with $N$ antennas is studied in this paper. Each user wants to exchange messages with all the other users via the relay. A transmission strategy is proposed for this channel. The proposed strategy is based on two steps: channel diagonalization and cyclic communication. The channel diagonalization is applied by using zero-forcing beam-forming. After channel diagonalization, the channel is decomposed into parallel sub-channels. Cyclic communication is then applied, where signal-space alignment for network-coding is used over each sub-channel. The proposed strategy achieves the optimal DoF region of the channel if $N\leq M$. To prove this, a new degrees-of-freedom outer bound is derived. As a by-product, we conclude that the MIMO Y-channel is not separable, i.e., independent coding on separate sub-channels is not enough, and one has to code jointly over several sub-channels.
• ### Cooperation for interference management: A GDoF perspective(1505.05277)

May 20, 2015 cs.IT, math.IT
The impact of cooperation on interference management is investigated by studying an elemental wireless network, the so called symmetric interference relay channel (IRC), from a generalized degrees of freedom (GDoF) perspective. This is motivated by the fact that the deployment of relays is considered as a remedy to overcome the bottleneck of current systems in terms of achievable rates. The focus of this work is on the regime in which the interference link is weaker than the source-relay link in the IRC. Our approach towards studying the GDoF goes through the capacity analysis of the linear deterministic IRC (LD-IRC). New upper bounds on the sum-capacity of the LD-IRC based on genie-aided approaches are established. These upper bounds together with some existing upper bounds are achieved by using four novel transmission schemes. Extending the upper bounds and the transmission schemes to the Gaussian case, the GDoF of the Gaussian IRC is characterized for the aforementioned regime. This completes the GDoF results available in the literature for the symmetric GDoF. It is shown that in the strong interference regime, in contrast to the IC, the GDoF is not a monotonically increasing function of the interference level.
• ### Device-Relaying in Cellular D2D Networks: A Fairness Perspective(1505.00114)

May 1, 2015 cs.IT, math.IT
Device-to-Device (D2D) communication is envisioned to be an integral component of 5G networks, and a technique for meeting the demand for high data rates. In a cellular network, D2D allows not only direct communication between users, but also device relaying. In this paper, a simple instance of device-relaying is investigated, and the impact of D2D on fairness among users is studied. Namely, a cellular network consisting of two D2D-enabled users and a base-station (BS) is considered. Thus, the users who want to establish communication with the BS can act as relays for each other's signals. While this problem is traditionally considered in the literature as a multiple-access channel with cooperation in the uplink, and a broadcast channel with cooperation in the downlink, we propose a different treatment of the problem as a multi-way channel. A simple communication scheme is proposed, and is shown to achieve significant gain in terms of fairness (measured by the symmetric rate supported) in comparison to the aforementioned traditional treatment.
• ### Sub-optimality of Treating Interference as Noise in the Cellular Uplink with Weak Interference(1401.8265)

April 20, 2015 cs.IT, math.IT
Despite the simplicity of the scheme of treating interference as noise (TIN), it was shown to be sum-capacity optimal in the Gaussian interference channel (IC) with very-weak (noisy) interference. In this paper, the 2-user IC is altered by introducing an additional transmitter that wants to communicate with one of the receivers of the IC. The resulting network thus consists of a point-to-point channel interfering with a multiple access channel (MAC) and is denoted PIMAC. The sum-capacity of the PIMAC is studied with main focus on the optimality of TIN. It turns out that TIN in its naive variant, where all transmitters are active and both receivers use TIN for decoding, is not the best choice for the PIMAC. In fact, a scheme that combines both time division multiple access and TIN (TDMA-TIN) strictly outperforms the naive-TIN scheme. Furthermore, it is shown that in some regimes, TDMA-TIN achieves the sum-capacity for the deterministic PIMAC and the sum-capacity within a constant gap for the Gaussian PIMAC. Additionally, it is shown that, even for very-weak interference, there are some regimes where a combination of interference alignment with power control and treating interference as noise at the receiver side outperforms TDMA-TIN. As a consequence, on the one hand treating interference as noise in a cellular uplink is approximately optimal in certain regimes. On the other hand those regimes cannot be simply described by the strength of interference.