• ### Finite Blocklength Analysis of Energy Harvesting Channels(1612.06844)

March 20, 2019 cs.IT, math.IT
We consider Additive White Gaussian Noise channels and Discrete Memoryless channels when the transmitter harvests energy from the environment. These can model wireless sensor networks as well as Internet of Things. By providing a unifying framework that works for any energy harvesting channel, we study these channels assuming an infinite energy buffer and provide the corresponding achievability and converse bounds on the channel capacity in the finite blocklength regime. We additionally provide moderate deviation asymptotic bounds as well.
• ### Queuing Theoretic Models for Multicast and Coded-Caching in Downlink Wireless Systems(1804.10590)

April 27, 2018 cs.PF
We consider a server connected to $L$ users over a shared finite capacity link. Each user is equipped with a cache. File requests at the users are generated as independent Poisson processes according to a popularity profile from a library of $M$ files. The server has access to all the files in the library. Users can store parts of the files or full files from the library in their local caches. The server should send missing parts of the files requested by the users. The server attempts to fulfill the pending requests with minimal transmissions exploiting multicasting and coding opportunities among the pending requests. We study the performance of this system in terms of queuing delays for the naive multicasting and several coded multicasting schemes proposed in the literature. We also provide approximate expressions for the mean queuing delay for these models and establish their effectiveness with simulations.
• ### Optimal Sensor Collaboration for Parameter Tracking Using Energy Harvesting Sensors(1803.01885)

March 25, 2018 eess.SP
In this paper, we design an optimal sensor collaboration strategy among neighboring nodes while tracking a time-varying parameter using wireless sensor networks in the presence of imperfect communication channels. The sensor network is assumed to be self-powered, where sensors are equipped with energy harvesters that replenish energy from the environment. In order to minimize the mean square estimation error of parameter tracking, we propose an online sensor collaboration policy subject to real-time energy harvesting constraints. The proposed energy allocation strategy is computationally light and only relies on the second-order statistics of the system parameters. For this, we first consider an offline non-convex optimization problem, which is solved exactly using semidefinite programming. Based on the offline solution, we design an online power allocation policy that requires minimal online computation and satisfies the dynamics of energy flow at each sensor. We prove that the proposed online policy is asymptotically equivalent to the optimal offline solution and show its convergence rate and robustness. We empirically show that the estimation performance of the proposed online scheme is better than that of the online scheme when channel state information about the dynamical system is available in the low SNR regime. Numerical results are conducted to demonstrate the effectiveness of our approach.
• ### Finite Blocklength Rates over a Fading Channel with CSIT and CSIR(1705.07863)

May 30, 2017 cs.IT, math.IT
In this work, we obtain lower and upper bounds on the maximal transmission rate at a given codeword length $n$, average probability of error $\epsilon$ and power constraint $\bar{P}$, over a block fading additive white Gaussian noise (AWGN) channel with channel state information (CSI) at the transmitter and the receiver. These bounds characterize deviation of the finite blocklength coding rates from the channel capacity which is in turn achieved by the water filling power allocation across time. The bounds obtained also characterize the rate enhancement possible due to the CSI at the transmitter in the finite blocklength regime. The results are further elucidated via numerical examples.
• ### An Achievable Rate for an Optical Channel with Finite Memory(1704.06124)

April 20, 2017 cs.IT, math.IT
A fiber optic channel is modeled in a variety of ways; from the simple additive white complex Gaussian noise model, to models that incorporate memory in the channel. Because of Kerr nonlinearity, a simple model is not a good approximation to an optical fiber. Hence we study a fiber optic channel with finite memory and provide an achievable bound on channel capacity that improves upon a previously known bound.
• ### A Distributed Scheduling Algorithm to Provide Quality-of-Service in Multihop Wireless Networks(1704.05684)

April 19, 2017 cs.NI
Control of multihop Wireless networks in a distributed manner while providing end-to-end delay requirements for different flows, is a challenging problem. Using the notions of Draining Time and Discrete Review from the theory of fluid limits of queues, an algorithm that meets delay requirements to various flows in a network is constructed. The algorithm involves an optimization which is implemented in a cyclic distributed manner across nodes by using the technique of iterative gradient ascent, with minimal information exchange between nodes. The algorithm uses time varying weights to give priority to flows. The performance of the algorithm is studied in a network with interference modelled by independent sets.
• ### Algorithms for Nash and Pareto Equilibria for Resource Allocation in Multiple Femtocells(1703.07647)

March 22, 2017 cs.NI, cs.GT
We consider a cellular system with multiple Femtocells operating in a Macrocell. They are sharing a set of communication channels. Each Femtocell has multiple users requiring certain minimum rate guarantees. Each channel has a peak power constraint to limit interference to the Macro Base Station (BS). We formulate the problem of channel allocation and power control at the Femtocells as a noncooperative Game. We develop decentralized algorithms to obtain a Coarse Correlated equilibrium that satisfies the QoS of each user. If the QoS of all the users cannot be satisfied, then we obtain a fair equilibrium. Finally we also provide a decentralized algorithm to reach a Pareto and a Nash Bargaining solution which has a much lower complexity than the algorithm to compute the NE.
• ### Joint Routing, Scheduling and Power Control Providing Hard Deadline in Wireless Multihop Networks(1702.04749)

Feb. 15, 2017 cs.NI
We consider optimal/efficient power allocation policies in a single/multihop wireless network in the presence of hard end-to-end deadline delay constraints on the transmitted packets. Such constraints can be useful for real time voice and video. Power is consumed in only transmission of the data. We consider the case when the power used in transmission is a convex function of the data transmitted. We develop a computationally efficient online algorithm, which minimizes the average power for the single hop. We model this problem as dynamic program (DP) and obtain the optimal solution. Next, we generalize it to the multiuser, multihop scenario when there are multiple real time streams with different hard deadline constraints.
• ### Enhancing Secrecy Rates in a wiretap channel(1505.01374)

Feb. 11, 2017 cs.IT, math.IT, cs.CR
Reliable communication imposes an upper limit on the achievable rate, namely the Shannon capacity. Wyner's wiretap coding, which ensures a security constraint also, in addition to reliability, results in decrease of the achievable rate. To mitigate the loss in the secrecy rate, we propose a coding scheme where we use sufficiently old messages as key and for this scheme prove that multiple messages are secure with respect to (w.r.t.) all the information possessed by the eavesdropper. We also show that we can achieve security in the strong sense. Next we consider a fading wiretap channel with full channel state information of the eavesdropper's channel and use our coding/decoding scheme to achieve secrecy capacity close to the Shannon capacity of the main channel (in the ergodic sense). Finally we also consider the case where the transmitter does not have the instantaneous information of the channel state of the eavesdropper, but only its distribution.
• ### Enhancing Secrecy Rate Region for Recent Messages for a Slotted Multiple Access Wiretap Channel to Shannon Capacity Region(1505.02085)

Jan. 15, 2017 cs.IT, math.IT, cs.CR
Security constraint results in \textit{rate-loss} in wiretap channels. In this paper we propose a coding scheme for two user Multiple Access Channel with Wiretap (MAC-WT), where previous messages are used as a key to enhance the secrecy rates of both the users until we achieve the usual capacity region of a Multiple Access Channel (MAC) without the wiretapper (Shannon capacity region). With this scheme all the messages transmitted in the recent past are secure with respect to all the information of the eavesdropper till now. To achieve this goal we introduce secret key buffers at both the users, as well as at the legitimate receiver (Bob). Finally we consider a fading MAC-WT and show that with this coding/decoding scheme we can achieve the capacity region of a fading MAC (in ergodic sense).
• ### A Distributed Algorithm for Quality-of-Service Provisioning in Multihop Networks(1612.08352)

Dec. 26, 2016 cs.NI
We present a distributed algorithm for joint power control, routing and scheduling in multihop wireless networks. The algorithm also provides for Quality of Service (QoS) guarantees, namely, end-to-end mean delay guarantees and hard deadline guarantees, for different users. It is easily implementable and works by giving local dynamic priority to flows requiring QoS, the priority being a function of the queue length at the nodes. We provide theoretical bounds for the stability properties of the algorithm. We also compare the performance of the algorithm with other existing algorithms by means of extensive simulations, and demonstrate its efficacy in providing QoS on demand.
• ### Information and Power Transfer by Energy Harvesting Transmitters over a Fading Multiple Access Channel with Minimum Rate Constraints(1612.04165)

Dec. 13, 2016 cs.IT, math.IT
We consider the problem of Simultaneous Wireless Information and Power Transfer (SWIPT) over a fading multiple access channel with additive Gaussian noise. The transmitters as well as the receiver harvest energy from ambient sources. We assume that the transmitters have two classes of data to send, viz. delay sensitive and delay tolerant data. Each transmitter sends the delay sensitive data at a certain minimum rate irrespective of the channel conditions (fading states). In addition, if the channel conditions are good, the delay tolerant data is sent. {Along with data, the transmitters also transfer power to aid the receiver in meeting its energy requirements.} In this setting, we characterize the \textit{minimum-rate capacity region} which provides the fundamental limit of transferring information and power simultaneously with minimum rate guarantees. Owing to the limitations of current technology, these limits might not be achievable in practice. Among the practical receiver structures proposed for SWIPT in literature, two popular architectures are the \textit{time switching} and \textit{power splitting} receivers. For each of these architectures, we derive the minimum-rate capacity regions. We show that power splitting receivers although more complex, provide a larger capacity region.
• ### Jointly Broadcasting Data and Power with Quality of Service Guarantees(1612.04176)

Dec. 13, 2016 cs.IT, math.IT
• ### Throughput of TCP over Cognitive Radio Channels(1611.05556)

Nov. 17, 2016 cs.NI
In this paper, we study the performance of a TCP connection over cognitive radio networks. In these networks, the network may not always be available for transmission. Also, the packets can be lost due to wireless channel impairments. We evaluate the throughput and packet retransmission timeout probability of a secondary TCP connection over an ON/OFF channel. We first assume that the ON and OFF time durations are exponential and later extend it to more general distributions. We then consider multiple TCP connections over the ON/OFF channel. We validate our theoretical models and the approximations made therein via ns2 simulations.
• ### An Asymptotic Approximation of TCP CUBIC(1510.08496)

Nov. 17, 2016 cs.NI
In this paper, we derive an expression for computing average window size of a single TCP CUBIC connection under random losses. Throughput expression for TCP CUBIC has been computed earlier under deterministic periodic packet losses. We validate this expression theoretically. We then use insights from the deterministic loss based model to derive an expression for computing average window size of a single TCP CUBIC connection under random losses. For this computation, we first consider the sequence of TCP CUBIC window evolution processes indexed by the drop rate, p and show that with a suitable scaling this sequence converges to a limiting Markov chain as p tends to 0. The stationary distribution of the limiting Markov chain is then used to derive the average window size for small packet error rates. We validate our model and approximations via simulations.
• ### On Strategic Multi-Antenna Jamming in Centralized Detection Networks(1608.04705)

Aug. 16, 2016 cs.IT, math.IT, cs.CR, cs.GT
In this paper, we model a complete-information zero-sum game between a centralized detection network with a multiple access channel (MAC) between the sensors and the fusion center (FC), and a jammer with multiple transmitting antennas. We choose error probability at the FC as the performance metric, and investigate pure strategy equilibria for this game, and show that the jammer has no impact on the FC's error probability by employing pure strategies at the Nash equilibrium. Furthermore, we also show that the jammer has an impact on the expected utility if it employs mixed strategies.
• ### Performance Based Evaluation of Various Machine Learning Classification Techniques for Chronic Kidney Disease Diagnosis(1606.09581)

July 18, 2016 cs.AI, cs.LG, cs.CY
Areas where Artificial Intelligence (AI) & related fields are finding their applications are increasing day by day, moving from core areas of computer science they are finding their applications in various other domains.In recent times Machine Learning i.e. a sub-domain of AI has been widely used in order to assist medical experts and doctors in the prediction, diagnosis and prognosis of various diseases and other medical disorders. In this manuscript the authors applied various machine learning algorithms to a problem in the domain of medical diagnosis and analyzed their efficiency in predicting the results. The problem selected for the study is the diagnosis of the Chronic Kidney Disease.The dataset used for the study consists of 400 instances and 24 attributes. The authors evaluated 12 classification techniques by applying them to the Chronic Kidney Disease data. In order to calculate efficiency, results of the prediction by candidate methods were compared with the actual medical results of the subject.The various metrics used for performance evaluation are predictive accuracy, precision, sensitivity and specificity. The results indicate that decision-tree performed best with nearly the accuracy of 98.6%, sensitivity of 0.9720, precision of 1 and specificity of 1.
• ### Resource Allocation in a MAC with and without security via Game Theoretic Learning(1607.01346)

July 5, 2016 cs.IT, math.IT, cs.LG
In this paper a $K$-user fading multiple access channel with and without security constraints is studied. First we consider a F-MAC without the security constraints. Under the assumption of individual CSI of users, we propose the problem of power allocation as a stochastic game when the receiver sends an ACK or a NACK depending on whether it was able to decode the message or not. We have used Multiplicative weight no-regret algorithm to obtain a Coarse Correlated Equilibrium (CCE). Then we consider the case when the users can decode ACK/NACK of each other. In this scenario we provide an algorithm to maximize the weighted sum-utility of all the users and obtain a Pareto optimal point. PP is socially optimal but may be unfair to individual users. Next we consider the case where the users can cooperate with each other so as to disagree with the policy which will be unfair to individual user. We then obtain a Nash bargaining solution, which in addition to being Pareto optimal, is also fair to each user. Next we study a $K$-user fading multiple access wiretap Channel with CSI of Eve available to the users. We use the previous algorithms to obtain a CCE, PP and a NBS. Next we consider the case where each user does not know the CSI of Eve but only its distribution. In that case we use secrecy outage as the criterion for the receiver to send an ACK or a NACK. Here also we use the previous algorithms to obtain a CCE, PP or a NBS. Finally we show that our algorithms can be extended to the case where a user can transmit at different rates. At the end we provide a few examples to compute different solutions and compare them under different CSI scenarios.
• ### Achieving Shannon Capacity in a Wiretap Channel via Previous Messages(1404.5701)

July 5, 2016 cs.IT, math.IT, cs.CR
In this paper we consider a wiretap channel with a secret key buffer. We use the coding scheme of [1] to enhance the secrecy rate to the capacity of the main channel, while storing each securely transmitted message in the secret key buffer. We use the oldest secret bits from the buffer to be used as a secret key to transmit a message in a slot and then remove those bits. With this scheme we are able to prove stronger results than those in [1]. i.e., not only the message which is being transmitted currently, but all the messages transmitted in last $N_1$ slots are secure with respect to all the information that the eavesdropper possesses, where $N_1$ can be chosen arbitrarily large.
• ### Analysis of Multiple Flows using Different High Speed TCP protocols on a General Network(1602.06653)

Feb. 22, 2016 cs.NI
We develop analytical tools for performance analysis of multiple TCP flows (which could be using TCP CUBIC, TCP Compound, TCP New Reno) passing through a multi-hop network. We first compute average window size for a single TCP connection (using CUBIC or Compound TCP) under random losses. We then consider two techniques to compute steady state throughput for different TCP flows in a multi-hop network. In the first technique, we approximate the queues as M/G/1 queues. In the second technique, we use an optimization program whose solution approximates the steady state throughput of the different flows. Our results match well with ns2 simulations.
• ### Learning Equilibria of a Stochastic Game on Gaussian Interference Channels with Incomplete Information(1503.02839)

Feb. 3, 2016 cs.IT, math.IT
We consider a wireless communication system in which $N$ transmitter-receiver pairs want to communicate with each other. Each transmitter transmits data at a certain rate using a power that depends on the channel gain to its receiver. If a receiver can successfully receive the message, it sends an acknowledgment (ACK), else it sends a negative ACK (NACK). Each user aims to maximize its probability of successful transmission. We formulate this problem as a stochastic game and propose a fully distributed learning algorithm to find a correlated equilibrium (CE). In addition, we use a no regret algorithm to find a coarse correlated equilibrium (CCE) for our power allocation game. We also propose a fully distributed learning algorithm to find a Pareto optimal solution. In general Pareto points do not guarantee fairness among the users, therefore we also propose an algorithm to compute a Nash bargaining solution which is Pareto optimal and provides fairness among users. Finally, under the same game theoretic setup, we study these equilibria and Pareto points when each transmitter sends data at multiple rates rather than at a fixed rate. We compare the sum rate obtained at the CE, CCE, Nash bargaining solution and the Pareto point and also via some other well known recent algorithms.
• ### Distributed Algorithms for Complete and Partial Information Games on Interference Channels(1601.07976)

Jan. 29, 2016 cs.IT, math.IT
We consider a Gaussian interference channel with independent direct and cross link channel gains, each of which is independent and identically distributed across time. Each transmitter-receiver user pair aims to maximize its long-term average transmission rate subject to an average power constraint. We formulate a stochastic game for this system in three different scenarios. First, we assume that each user knows all direct and cross link channel gains. Later, we assume that each user knows channel gains of only the links that are incident on its receiver. Lastly, we assume that each user knows only its own direct link channel gain. In all cases, we formulate the problem of finding a Nash equilibrium (NE) as a variational inequality (VI) problem. We present a novel heuristic for solving a VI. We use this heuristic to solve for a NE of power allocation games with partial information. We also present a lower bound on the utility for each user at any NE in the case of the games with partial information. We obtain this lower bound using a water-filling like power allocation that requires only knowledge of the distribution of a user's own channel gains and average power constraints of all the users. We also provide a distributed algorithm to compute Pareto optimal solutions for the proposed games. Finally, we use Bayesian learning to obtain an algorithm that converges to an $\epsilon$-Nash equilibrium for the incomplete information game with direct link channel gain knowledge only without requiring the knowledge of the power policies of the other users.
• ### Finite Blocklength Achievable Rates for Energy Harvesting AWGN Channels with Infinite Buffer(1601.06410)

Jan. 26, 2016 cs.IT, math.IT
We consider an additive White Gaussian channel where the transmitter is powered by an energy harvesting source. For such a system, we provide a lower bound on the maximal code book at finite code lengths that improves upon previously known bounds.
• ### Asymptotic Approximations for TCP Compound(1511.01344)

Jan. 22, 2016 cs.NI
In this paper, we derive an approximation for throughput of TCP Compound connections under random losses. Throughput expressions for TCP Compound under a deterministic loss model exist in the literature. These are obtained assuming the window sizes are continuous, i.e., a fluid behaviour is assumed. We validate this model theoretically. We show that under the deterministic loss model, the TCP window evolution for TCP Compound is periodic and is independent of the initial window size. We then consider the case when packets are lost randomly and independently of each other. We discuss Markov chain models to analyze performance of TCP in this scenario. We use insights from the deterministic loss model to get an appropriate scaling for the window size process and show that these scaled processes, indexed by p, the packet error rate, converge to a limit Markov chain process as p goes to 0. We show the existence and uniqueness of the stationary distribution for this limit process. Using the stationary distribution for the limit process, we obtain approximations for throughput, under random losses, for TCP Compound when packet error rates are small. We compare our results with ns2 simulations which show a good match.
• ### Distributed Nonparametric Sequential Spectrum Sensing under Electromagnetic Interference(1410.4074)

April 30, 2015 cs.IT, math.IT
A nonparametric distributed sequential algorithm for quick detection of spectral holes in a Cognitive Radio set up is proposed. Two or more local nodes make decisions and inform the fusion centre (FC) over a reporting Multiple Access Channel (MAC), which then makes the final decision. The local nodes use energy detection and the FC uses mean detection in the presence of fading, heavy-tailed electromagnetic interference (EMI) and outliers. The statistics of the primary signal, channel gain or the EMI is not known. Different nonparametric sequential algorithms are compared to choose appropriate algorithms to be used at the local nodes and the FC. Modification of a recently developed random walk test is selected for the local nodes for energy detection as well as at the fusion centre for mean detection. It is shown via simulations and analysis that the nonparametric distributed algorithm developed performs well in the presence of fading, EMI and is robust to outliers. The algorithm is iterative in nature making the computation and storage requirements minimal.