Two-way interference channels with jammers

Alice and Bob want to exchange information over an additive interference channel that also contains a malicious eavesdropper-jammer James who aims to disrupt this two-way communication. In the baseline model (motivated by wireless jamming scenarios), Alice and Bob transmit length-n q-arj encodings x<inf>A</inf> and x<inf>B</inf> respectively of their own messages. James observes the interference pattern z = x<inf>A</inf> + x<inf>B</inf>, and as a non-causal function of ζ and his knowledge of Alice and Bob's codebooks, chooses a jamming pattern s of power (Hamming weight) at most pn. Alice and Bob then both observe the interfered-jammed signal x<inf>A</inf> + x<inf>B</inf> + s, and aim to decode each others' messages despite the jamming pattern s. We demonstrate that in such a model, the fact of interference actually aids communication by allowing for communication to occur in each direction at a rate of 1 − H<inf>q</inf>(p), i.e., the jammer can do no worse than act like “random noise”. <sup>1</sup> Interestingly, neither linear codes nor random codes (as “usually” defined) achieve this performance — we thus define and analyze a new class of codes we call linearish codes that do. We then extend our results to general q-avy additive-error channels with asymmetric jamming patterns (with potentially different powers) to Alice and Bob, and also demonstrate how to simultaneously ensure information-theoretic secrecy of both Alice and Bob's messages from James.

[1]  Michael Langberg,et al.  A Characterization of the Capacity of Online (causal) Binary Channels , 2014, STOC.

[2]  Peter Elias,et al.  List decoding for noisy channels , 1957 .

[3]  Toby Berger,et al.  Coding for noisy channels with input-dependent insertions , 1977, IEEE Trans. Inf. Theory.

[4]  E. Gilbert A comparison of signalling alphabets , 1952 .

[5]  Michael Langberg,et al.  Sufficiently myopic adversaries are blind , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[6]  R. Zamir,et al.  Lattice Coding for Signals and Networks: A Structured Coding Approach to Quantization, Modulation and Multiuser Information Theory , 2014 .

[7]  Michael Gastpar,et al.  Typical sumsets of linear codes , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[8]  Venkatesan Guruswami,et al.  On the List-Decodability of Random Linear Codes , 2010, IEEE Transactions on Information Theory.

[9]  Soumen Chakrabarti Date $date$ , 1962 .

[10]  Claude E. Shannon,et al.  Two-way Communication Channels , 1961 .

[11]  Venkatesan Guruswami,et al.  Algorithmic Results in List Decoding , 2006, Found. Trends Theor. Comput. Sci..

[12]  Robert J. McEliece,et al.  New upper bounds on the rate of a code via the Delsarte-MacWilliams inequalities , 1977, IEEE Trans. Inf. Theory.

[13]  Anand D. Sarwate,et al.  Coding against myopic adversaries , 2010, 2010 IEEE Information Theory Workshop.

[14]  Ameya Velingker,et al.  Communication with Partial Noiseless Feedback , 2015, APPROX-RANDOM.

[15]  Michael Langberg,et al.  The Capacity of Online (Causal) $q$ -Ary Error-Erasure Channels , 2019, IEEE Transactions on Information Theory.

[16]  Yury Polyanskiy Upper Bound on List-Decoding Radius of Binary Codes , 2016, IEEE Trans. Inf. Theory.

[17]  Colin McDiarmid,et al.  Surveys in Combinatorics, 1989: On the method of bounded differences , 1989 .

[18]  Michael Langberg,et al.  Private codes or succinct random codes that are (almost) perfect , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.

[19]  Prakash Narayan,et al.  Reliable Communication Under Channel Uncertainty , 1998, IEEE Trans. Inf. Theory.

[20]  Richard W. Hamming,et al.  Error detecting and error correcting codes , 1950 .