The Gaussian interference channel in the presence of a malicious jammer

Fatemeh Hosseinigoki, Oliver Kosut

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

This paper considers the two-user Gaussian interference channel in the presence of one or two adversarial jammers. Existing outer and inner bounds for the Gaussian interference channel are generalized in the presence of the jammer(s). We show that for certain problem parameters, precisely the same bounds hold, but with the noise variance increased by the received power of the jammer at each receiver. Thus, the jammers can do no better than to transmit Gaussian noise. For these problem parameters, this allows us to recover the half-bit theorem. Moreover, we show that, if the jammer has greater received power than the legitimate user, symmetrizability makes the capacity zero. The proof of the outer bound is straightforward, while the inner bound generalizes the Han-Kobayashi rate splitting scheme. As a novel aspect, the inner bound takes advantage of the common message acting as common randomness for the private message; hence, the jammer cannot symmetrize only the private codeword without being detected. We also prove a new version of a packing lemma for the Gaussian arbitrarily-varying channel.

Original languageEnglish (US)
Title of host publication54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages679-686
Number of pages8
ISBN (Electronic)9781509045495
DOIs
StatePublished - Feb 10 2017
Event54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016 - Monticello, United States
Duration: Sep 27 2016Sep 30 2016

Other

Other54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016
CountryUnited States
CityMonticello
Period9/27/169/30/16

Keywords

  • adversarial jammer
  • capacity region
  • Gaussian interference channel

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Hardware and Architecture
  • Control and Optimization

Fingerprint Dive into the research topics of 'The Gaussian interference channel in the presence of a malicious jammer'. Together they form a unique fingerprint.

  • Cite this

    Hosseinigoki, F., & Kosut, O. (2017). The Gaussian interference channel in the presence of a malicious jammer. In 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016 (pp. 679-686). [7852297] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ALLERTON.2016.7852297