Two-way interference channels with jammers

S. Jaggi, M. Langberg

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Alice and Bob want to exchange information over an additive interference channel that also contains a malicious eavesdropper-jammer James who aims to disrupt this two-way communication. In the baseline model (motivated by wireless jamming scenarios), Alice and Bob transmit length-n q-arj encodings xA and xB respectively of their own messages. James observes the interference pattern z = xA + xB, and as a non-causal function of ζ and his knowledge of Alice and Bob's codebooks, chooses a jamming pattern s of power (Hamming weight) at most pn. Alice and Bob then both observe the interfered-jammed signal xA + xB + s, and aim to decode each others' messages despite the jamming pattern s. We demonstrate that in such a model, the fact of interference actually AIDS communication by allowing for communication to occur in each direction at a rate of 1 - Hq(p), i.e., the jammer can do no worse than act like 'random noise'.1 Interestingly, neither linear codes nor random codes (as 'usually' defined) achieve this performance - we thus define and analyze a new class of codes we call linearish codes that do. We then extend our results to general q-avy additive-error channels with asymmetric jamming patterns (with potentially different powers) to Alice and Bob, and also demonstrate how to simultaneously ensure information-theoretic secrecy of both Alice and Bob's messages from James.

Original languageEnglish
Title of host publication2017 IEEE International Symposium on Information Theory, ISIT 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages491-495
Number of pages5
ISBN (Electronic)9781509040964
DOIs
StatePublished - 9 Aug 2017
Externally publishedYes
Event2017 IEEE International Symposium on Information Theory, ISIT 2017 - Aachen, Germany
Duration: 25 Jun 201730 Jun 2017

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
ISSN (Print)2157-8095

Conference

Conference2017 IEEE International Symposium on Information Theory, ISIT 2017
Country/TerritoryGermany
CityAachen
Period25/06/1730/06/17

Bibliographical note

Publisher Copyright:
© 2017 IEEE.

Fingerprint

Dive into the research topics of 'Two-way interference channels with jammers'. Together they form a unique fingerprint.

Cite this