On the capacity of state-dependent Gaussian cognitive interference channel
© Ghasemi-Goojani and Behroozi; licensee Springer. 2014
Received: 30 June 2014
Accepted: 27 October 2014
Published: 22 November 2014
A Gaussian cognitive interference channel with state (G-CICS) is studied. In this paper, we focus on the two-sender, two-receiver case and consider the communication situation in which two senders transmit a common message to two receivers. Transmitter 1 knows only message W1, and transmitter 2, referred to as the cognitive user, knows both messages W1 and W2 and also the channel’s states sequence non-causally. Receiver 1 needs to decode only W1 while receiver 2 needs to decode both messages. In this paper, we investigate the weak and moderate interference case where we assume that the channel gain a satisfies |a|≤1. In addition, inner and outer bounds on the capacity region are derived in the regime of high state power, i.e., the channel state sequence has unbounded variance. First, we show that the achievable rate by Gelfand-Pinsker coding vanishes in the high state power regime under a condition over the channel gain. In contrast, we propose a transmission scheme (based on lattice codes) that can achieve positive rates, independent of the interference. Our transmission scheme can achieve the capacity region in a high signal-to-noise ratio (SNR) regime. Also, regardless of all channel parameters, the gap between the achievable rate region and the outer bound is at most 0.5 bits.
In the exchange of information among many nodes, the interference between different transmitter and receiver pairs is unavoidable. In the classical interference channel (IC), this interference exists between two different transmitters and receivers. In , Carleial, using superposition coding, obtains general bounds on the capacity region of discrete memoryless interference channels. By using rate splitting at transmitters and sequential decoding at destinations, Han and Kobayashi establish the best achievable rate region known to date . Unfortunately, the problem of characterizing the capacity region of a general IC has been open for more than 30 years. Except for very strong Gaussian IC, strong Gaussian IC, the sum capacity of the degraded Gaussian IC and very weak interference, characterizing the capacity region of a Gaussian IC is still an open problem [3–6]. Etkin et al., by deriving new outer bounds, show that an explicit Han-Kobayashi version scheme can achieve capacity region within 1 bit for all channel parameters .
The cognitive interference channel, where one user has full non-causal knowledge of the other user’s message, is studied in [8–10]. This setup is also referred to as the interference channels with degraded message sets.
Recently, interference channels with state have received considerable attention. In general, channels with random states can model a time-varying wireless channel as well as interfering signals. The two-user state-dependent Gaussian interference channel where the state information is non-causally known at both encoders is studied in . By proposing an active interference-cancellation mechanism, which is a generalized dirty-paper coding (DPC)  technique, some achievable rate regions for this channel are obtained. A Gaussian IC with the same state at both links which is scaled differently at two receivers is studied in . For the very strong interference regime, as well as for the weak regime, the sum capacity is obtained under certain conditions on channel parameters . In , a state-dependent Gaussian Z-interference channel model in the regime of high state power is investigated. By utilizing a layered coding scheme, inner and outer bounds on the capacity region are derived.
In , a model of cognitive state-dependent interference channels is studied, in which one of the transmitters knows both messages and also the states of the channel in a non-causal manner while the other transmitter knows only one of the messages and does not know the channel states. Each of the two decoders try to decode only its intended message. By using a generalized binning principle, inner and outer bounds on the capacity region are established.
The main result of this paper is designing a novel transmission scheme for the Gaussian interference channel with state where we aim to recover a common message at two decoders. To reach this goal, we treat this channel as two state-dependent Gaussian multiple-access channels (MACs) and try to simultaneously recover the common message at both decoders. Prior to this work, different types of the state-dependent two-user MAC are investigated in the literature (See e.g., [17–24]). In , a two-user state-dependent multi-access channel in which the state is known only at the encoder (that sends both messages) is investigated. By generalizing the Gelfand-Pinsker model, the capacity region for both non-causal and causal state information is characterized. If the state information is non-causally known only at the encoder that sends the common message, then the capacity region for the Gaussian scenario in some cases is characterized in . In [19–21], the state-dependent two-user multi-access channel in which the states of the channel are known non-causally at one of the encoders and only strictly causally at the other encoder is considered. By generalizing the framework of , the capacity region of this model is fully characterized in , and the optimal schemes for achieving the capacity region are also studied. In [22–24], the two-user multiple-access channel with state is considered in which the states are known causally or strictly causally at both encoders or only at one encoder. For the causal state, it is shown that the capacity region is fully achievable. If the state is known strictly causally at both the encoders or only at one encoder, then the capacity region at some cases is characterized.
The capacity region of relay channel with state is investigated in [25–32]. The relay channel and the cooperative relay broadcast channel controlled by random parameters are studied in . It is shown that when the state is non-causally known to the transmitter and intermediate nodes, the decode-and-forward can achieve the capacity region under some cases. The relay channel with the state known non-causally at the relay is investigated in  and . Using Gelfand-Pinsker coding, rate splitting, and decode-and-forward, a lower bound on channel capacity is obtained for this channel, and it is shown that for the degraded Gaussian channels, the lower bound meets the upper bound and thus the capacity region is achievable. The relay channel when the state is available only at the source is studied in [28–30]. By obtaining lower and upper bounds, it is shown that in a number of special cases the capacity region is achievable. A partially cooperative relay broadcast channel (PC-RBC) with state is studied in  where two situations including the availability of the state non-causally at both the source and the relay and only at the source are analyzed. The relay interference channel with a cognitive source where only the source knows (non-causally) the interference from the interferer is considered in , and some achievable rate regions are obtained.
All achievable rate regions in  are based on random coding. In this paper, we use the lattice-based coding scheme (especially lattice alignment) to establish capacity regions for this channel. A comprehensive study on the performance of lattices is presented in . Performance of lattice codes over the additive white Gaussian noise (AWGN) channel is studied in . A dirty paper AWGN channel in which the interference is known non-causally or causally at the transmitter is investigated in . In , it is shown that the lattice coding strategy may outperform the DPC in a doubly dirty MAC. In , we also show that if the noise’s variance satisfies some constraints, then the capacity region of an additive state-dependent Gaussian interference channel with two independent channel states is achieved when the state power goes to infinity. In , a Gaussian relay channel with a state is considered in which the additive state is either added at the destination and known non-causally at the source or experienced at the relay and known at the destination. It is shown that a scheme based on nested lattice codes can achieve the capacity region within 0.5 bits. In , by using nested lattice codes, the generalized degrees of freedom for the two-user cognitive interference channel are characterized where one of the transmitters has knowledge of a linear combination of the two information messages. Using lattice codes for the state-dependent Gaussian Z-interference channel, some rate regions are established in .
Here, we evaluate the performance of lattice-based coding schemes on obtaining achievable rate regions for the G-CICS. Similar to [14, 36], we assume that the channel state has unbounded variance. This is referred to as a high state power regime. In addition, we consider the weak and moderate interference cases, i.e., the channel gain is smaller than one; |a|≤1. First, we show that the achievable rate region by random coding vanishes in a high state power regime under a condition over the channel gain. Then, by using a lattice-based coding scheme, we obtain an achievable rate region for the G-CICS. As Figure 1 shows, we can see that the G-CICS can be treated as two state-dependent MACs with a common message: one from encoders 1 and 2 to decoder 1, and the other from encoders 1 and 2 to decoder 2. For both these MACs, the capacity region is completely characterized in . However in the G-CICS, we need to decode the common message simultaneously at both decoders. Since these two MACs are different, we cannot apply the proposed scheme in  for this channel.
The main challenge of this paper is designing a scheme that can achieve a rate region close to the outer bound for the state-dependent Gaussian interference channel with a common message (set W2=0 in Figure 1). Although this channel can be treated as two state-dependent MACs with a common message, these two MACs are different, and since the common message should be recovered simultaneously at both decoders, the known schemes in the literature cannot be directly applied. To solve this problem, we use lattice codes and obtain a linear combination of the common message, sent by two transmitters, at the decoders. Note that lattice codes are among the best codes in finding the linear combination of messages . As we will show, at high signal-to-noise ratios (SNRs), the achievable rate region meets the outer bound, and regardless all channel parameters, the achievable rate region is within 0.5 bits.
The paper is organized as follows: We present the channel model in Section 2. The achievable rate region by random coding is presented at Section 3. Section 4, by using lattice codes, establishes an achievable rate region for the G-CICS. Using numerical examples, achievable rate regions of our proposed scheme and random coding are compared in Section 5. Section 6 concludes the paper.
2 System model
Throughout the paper, random variables and their realizations are denoted by capital and small letters, respectively. x stands for a vector of length n, (x1,x2,…,x n ). Also, ∥.∥ denotes the Euclidean norm, and all logarithms are with respect to base 2.
A rate pair (R1,R2) of non-negative real values is achievable if there exists a sequence of code such that The capacity region is defined as the convex closure of the set of all achievable rate pairs (R1,R2).
3 Achievable rate region by random coding
In this Section, we evaluate achievable rate regions by random coding for the G-CICS in the regime of high state power. In , by using random coding, two inner bounds for the G-CICS are provided when |a|≤1. By evaluating the inner bound 1 of Proposition 3 in  (and replacing ), we can see that this inner bound when the channel gain tends to zero vanishes, and thus, we cannot achieve any positive rate region by such scheme. The following theorem presents the second inner bound. To achieve this region, the Gelfand-Pinsker coding and rate splitting in transmitter 2 is used.
See Proposition 4 in .
4 Lattice alignment
4.1 Lattice definitions
where is the Voronoi region volume, i.e., .
that maps x into a point in the fundamental Voronoi region.
and, for a fixed volume-to-noise ratio greater than 2π e, decays exponentially in n.
Poltyrev showed that sequences of such lattices exist . The existence of a sequence of lattices Λ(n) which is good in both senses (i.e., simultaneously are Poltyrev-good and Rogers-good) has been shown in .
(Nested lattices): A lattice Λ is said to be nested in lattice Λ1 if Λ⊆Λ1. Λ is referred to as the coarse lattice and Λ1 as the fine lattice.
Note that if , then always a Λ⊆Λ.
In the following, we present a key property of dithered nested lattice codes.
The Crypto Lemma [34, 48]. Let V be a random vector with an arbitrary distribution over . If D is independent of V and uniformly distributed over , then (V+D) mod Λ is also independent of V and uniformly distributed over .
See Lemma 2 in .
Before presentation of our proposed scheme, we prove the following lemma that plays an important role in the proof of achievable rate region by lattice codes.
where (11) is based on the fact that Λ⊆Λ1. Now, by comparing (10) and (12), the proof of the lemma is complete.
4.2 Our proposed scheme
In this section, we obtain an achievable rate region using lattice codes for the G-CICS. If we use the common encoding and decoding as it is explained in , then similar to random coding, we cannot achieve the capacity region within a constant gap. Thus, we require to introduce a new scheme for this channel. For presenting this scheme, we use two modulo operations at the decoder. Then using Lemma 3, we interchange modulo operations. As we will see, this scheme can achieve the capacity region at high SNRs and within 0.5 bits regardless of all channel parameters. In the following, we present our scheme in more detail.
A method to obtain a rate region is achieving two corner points of that region. Then, by time sharing between two corner points, we can achieve a rate region. Suppose that V1 and V2 are two lattice codewords that carry the information for user 1 and 2, respectively. We use DPC or a lattice scheme to decode V2 at decoder 2 and a scheme which estimates linear combination of the common message at both decoders to decode V1 for both users. In the following, we explain both schemes in more details.
Sending the private message, V2 (for decoder 2):
Encoding the common message, V1:
where D1 and D2 are two independent dithers which are uniformly distributed on the Voronoi region . Note that by the crypto lemma, we know that the power constraint is satisfied. Now, we explain decoding at decoder 1 and 2.
Decoding the common message, V1, at decoder 1
Note that to decode [(1+a) q V1]mod Λ, since we have used a quantizer associated with lattice q Λ1, we may map some points of lattice q Λ1 to [(1+a) q V1]mod Λ. That’s by finding some points of q Λ1, since we used a one-to-one mapping, we can recover [(1+a)q V1]mod Λ.
where (25) follows from (24), and (26) is based on Rogers goodness of Λ.
Now, we have and must try to decode V1. In the following lemma, we show that it is possible to decode it correctly.
if Λ≠a Λ1.
Decoding the common message, V1, at decoder 2:
By comparing (31) with (15), we can see that at encoder 1, instead of sending V1, we transmit −V1. At the decoder, instead of decoding , we find . But since p≥0 and q≤0, thus p−q≥−q which enables us to estimate V1 correctly. Note that for the case −1≤a≤0, if we estimate [(q+p)V1] mod Λ, since p+q≤−q, we cannot find the desired lattice point correctly.
4.2.1 Rate-region outer bound
For comparison, an outer bound on the capacity region of the G-CICS is provided. This outer bound is similar to the bound provided in  obtained using a different approach.
where the union is taken over all parameters 0≤ρ21 and ρ2s≤1 such that .
4.3 Capacity results
By comparing the outer region (33) and the achievable region in (29), we conclude that the outer region is indeed tight at high SNRs for the weak and moderate interference case in the high state power regime. Thus, we have the following Corollary
where o(1)→0 as .
where (38) is based on the fact that the maximum gap occurs at for i=1,2. Thus, we have the following result.
The capacity region of the state-dependent Gaussian cognitive interference channel for the weak and moderate interference case in the high state power regime is achievable within 0.5 bits.
5 Numerical results
In this paper, the state-dependent Gaussian cognitive interference channel in the weak and moderate interference case and in the high state power regime is studied. First, we showed that the achievable rate by random coding, which is based on Gelfand-Pinsker coding, vanishes under a condition over the channel gain. Then, we showed that a scheme that is based on lattice codes can achieve the capacity region at high SNRs and within 0.5 bits of the outer bound for all channel parameters.
The authors are members of IEEE.
This work has been supported in part by the Iran NSF under Grant No. 88114.46. The material in this paper was presented in part at the 2nd Iran Workshop on Communication and Information Theory (IWCIT 2014), Tehran, Iran.
- Carleial AB: Interference channels. IEEE Trans. Inf. Theory 1978, 24(1):60-70. 10.1109/TIT.1978.1055812MATHMathSciNetView ArticleGoogle Scholar
- Han TS, Kobayashi K: A new achievable for the interference channel. IEEE Trans. Inf. Theory 1981, 27(1):49-60. 10.1109/TIT.1981.1056307MATHMathSciNetView ArticleGoogle Scholar
- Sato H: The capacity of the Gaussian interference channel under strong interference. IEEE Trans. Inf. Theory 1981, 27(6):786-788. 10.1109/TIT.1981.1056416MATHView ArticleGoogle Scholar
- Carleial AB: A case where interference does not reduce capacity. IEEE Trans. Inf. Theory 1975, 21(5):569-570. 10.1109/TIT.1975.1055432MATHMathSciNetView ArticleGoogle Scholar
- Sason I: On achievable rate regions for the Gaussian interference channel. IEEE Trans. Inf. Theory 2004, 53(12):1345-1356.MathSciNetView ArticleGoogle Scholar
- Motahari A, Khandani A: Capacity bounds for the Gaussian interference channel. IEEE Trans. Inf. Theory 2009, 55(2):620-643.MathSciNetView ArticleGoogle Scholar
- Etkin RH, Tse DNC, Wang H: Gaussian interference channel capacity to within one bit. IEEE Trans. Inf. Theory 2008, 54(12):5534-5562.MATHMathSciNetView ArticleGoogle Scholar
- Wu W, Vishwanath S, Arapostathis A: Capacity of a class of cognitive radio channels: interference channels with degraded message sets. IEEE Trans. Inf. Theory 2007, 53(11):4391-4399.MathSciNetView ArticleGoogle Scholar
- Maric I, Goldsmith A, Kramer G, Shamai (Shitz) S: On the capacity of interference channels with one cooperating transmitter. Eur. Trans. Telecomm 2008, 19: 405-420. 10.1002/ett.1298View ArticleGoogle Scholar
- Jovicic A, Viswanath P: Cognitive radio: an information-theoretic perspective. IEEE Trans. Inf. Theory 2009, 55(9):3945-3958.MathSciNetView ArticleGoogle Scholar
- Zhang L, Jinhua J, Shuguang C: Gaussian interference channel with state information. IEEE Trans. Wireless Commun 2013, 12(8):4058-4071.View ArticleGoogle Scholar
- Costa M: Writing on dirty paper. IEEE Trans. Inf. Theory 1983, 29(3):439-441. 10.1109/TIT.1983.1056659MATHView ArticleGoogle Scholar
- Duan R, Liang Y, Shamai (Shitz) S: On the capacity region of Gaussian interference channels with state. In Proc. IEEE ISIT. Istanbul, Turkey; 2013:1097-1101.Google Scholar
- Duan R, Liang Y, Khisti A, Shamai (Shitz) S: State-dependent Gaussian Z-channel with mismatched side-information and interference. In Proc. IEEE Inf. Theory Workshop (ITW). Sevilla, Spain; 2013.Google Scholar
- Somekh-Baruch A, Shamai (Shitz) S, Verdu S: Cognitive interference channels with state information. In Proc. IEEE Int. Symp. Information Theory (ISIT). Toronto, Canada; 2008:1353-1357.Google Scholar
- Duan R, Liang Y, Shamai (Shitz) S: Bounds and capacity theorems for cognitive interference channels with state. IEEE Trans. Inf. Theory . June 2012, revised Oct 2013 [http://arxiv.org/abs/1207.0016]
- Somekh-Baruch A, Shamai (Shitz) S, Verdu S: Cooperative multiple access encoding with states available at one transmitter. IEEE Trans. Inf. Theory 2008, 54(1):4448-4469.View ArticleGoogle Scholar
- Zaidi A, Vandendorpe L, Kotagiri SP, Laneman JN: Multiaccess channels with state known to one encoder: another case of degraded message sets. In Proc. IEEE ISIT. Seoul, South Korea; 2009:2376-2380.Google Scholar
- Zaidi A, Piantanida P, Shamai (Shitz) S: Capacity region of cooperative multiple-access channel with states. IEEE Trans. Inf. Theory 2013, 59(10):6153-6174.View ArticleGoogle Scholar
- Zaidi A, Piantanida P, Shamai (Shitz) S: Wyner-Ziv type versus noisy network coding for a state-dependent MAC. In Proc. IEEE ISIT. Cambridge, MA; 2012:1682-1686.Google Scholar
- Zaidi A, Piantanida P, Shamai (Shitz) S: Multiple access channel with states known noncausally at one encoder and only strictly causally at the other encoder. In Proc. IEEE ISIT. Saint Petersburg, Russia; 2011:2801-2805.Google Scholar
- Zaidi A, Shamai (Shitz) S: On cooperative multiple access channels with delayed CSI at transmitters. IEEE Trans. Inf. Theory 2014, 60(10):6204-6230.View ArticleGoogle Scholar
- Zaidi A, Shamai (Shitz) S: Asymmetric cooperative multiple access channels with delayed CSI. In Proc. IEEE ISIT. Honolulu, HI; 2014:1186-1190.Google Scholar
- Zaidi A, Shamai (Shitz) S: On cooperative multiple access channels with delayed CSI. In Proc. IEEE ISIT. Istanbul, Turkey; 2013:982-986.Google Scholar
- Zaidi A, Vandendorpe L, Duhamel P: Lower bounds on the capacity regions of the relay channel and the cooperative relay-broadcast channel with non-causal side-information. In IEEE Int. Commun. Conf. (ICC). Glasgow, Scotland; 2007:6005-6011.Google Scholar
- Zaidi A, Kotagiri SP, Laneman JN, Vandendorpe L: Cooperative relaying with state available non-causally at the relay. IEEE Trans. Inf. Theory 2010, 56(5):2272-2298.MathSciNetView ArticleGoogle Scholar
- Zaidi A, Kotagiri SP, Laneman JN, Vandendorpe L: Cooperative relaying with state at the relay. In Proc. IEEE Information Theory Workshop(ITW). Porto, Portugal; 2008:139-143.Google Scholar
- Zaidi A, Shamai S, Piantanida P, Vandendorpe L: Bounds on the capacity of the relay channel with noncausal state at source. IEEE Trans. Inf. Theory 2013, 59(5):2639-2672.MathSciNetView ArticleGoogle Scholar
- Zaidi A, Vandendorpe L: Lower bounds on the capacity of the relay channel with states at the source. Eurasip J. Wireless Commun. Netw 2009, 2009: 1-23.View ArticleGoogle Scholar
- Zaidi A, Shamai (Shitz) S, Piantanida P, Vandendorpe L: Bounds on the capacity of the relay channel with noncausal state information at source. In Proc. IEEE ISIT. Austin, TX; 2010:639-643.Google Scholar
- Zaidi A, Vandendorpe L: Rate regions for the partially-cooperative relay broadcast channel with non-causal side information. In Proc. IEEE ISIT. Nice, France; 2007:1246-1250.Google Scholar
- Zaidi A, Vandendorpe L: Achievable rates for the Gaussian relay interferer channel with a cognitive source. In IEEE Int. Commun. Conf. (ICC). Dresden, Germany; 2009:1-6.Google Scholar
- Zamir R: Lattices are everywhere. In Proceedings of the 4th Annual Workshop on Information Theory and its Applications (ITA 2009). San Diego, CA; 2009:392-421.View ArticleGoogle Scholar
- Erez U, Zamir R: Achieving 1/2 log(1 +SNR) on the AWGN channel with lattice encoding and decoding. IEEE Trans. Inf. Theory 2004, 50(22):2293-2314.MATHMathSciNetView ArticleGoogle Scholar
- Erez U, Shamai (Shitz) S, Zamir R: Capacity and lattice strategies for canceling known interference. IEEE Trans. Inf. Theory 2005, 51(14):3820-3833.MATHView ArticleGoogle Scholar
- Philosof T, Zamir R, Erez U, Khisti AJ: Lattice strategies for the dirty multiple access channel. IEEE Trans. Inf. Theory 2011, 57(8):5006-5035.MathSciNetView ArticleGoogle Scholar
- Ghasemi-Goojani S, Behroozi H: On the transmission strategies for the two-user state-dependent Gaussian interference channel. In Proc. Tenth International Symposium on Wireless Communication Systems (ISWCS). Ilmenau, Germany; 2013.Google Scholar
- Song Y, Devroye N: Structured interference-mitigation in two-hop networks. In Information Theory and Applications Workshop. UCSD,, San Diego; 2011.Google Scholar
- Hong S-N, Caire G: Generalized degrees of freedom for network-coded cognitive interference channel. In Proc. IEEE ISIT. Istanbul, Turkey; 2013:1769-1773.Google Scholar
- Ghasemi-Goojani S, Behroozi H: State-dependent Gaussian Z-interference channel: new results. In Proc. IEEE ISITA. Melbourne, Australia; 2014.Google Scholar
- Nazer B, Gastpar M: Compute-and-forward: harnessing interference through structured codes. IEEE Trans. Inf. Theory 2011, 57(10):6463-6486.MathSciNetView ArticleGoogle Scholar
- Jafarian A, Vishwanath S: Achievable rates for k-user Gaussian interference channels. IEEE Trans. Inf. Theory 2012, 58(7):4367-4380.MathSciNetView ArticleGoogle Scholar
- Ordentlich O, Erez U: On the robustness of lattice interference alignment. IEEE Trans. Inf. Theory 2013, 59(5):2735-2759.MathSciNetView ArticleGoogle Scholar
- Conway JH, Sloane NJA: Sphere Packings, Lattices and Groups. Springer-Verlag, New York; 1992.Google Scholar
- Zamir R, Feder M: On lattice quantization noise. IEEE Trans. Inf. Theory 1996, 42(4):1152-1159. 10.1109/18.508838MATHView ArticleGoogle Scholar
- Erez U, Litsyn S, Zamir R: Lattices which are good for (almost) everything. IEEE Trans. Inf. Theory 2005, 51(16):3401-3416.MATHMathSciNetView ArticleGoogle Scholar
- Poltyrev G: On coding without restrictions for the AWGN channel. IEEE Trans. Inf. Theory 1994, 40(9):409-417.MATHMathSciNetView ArticleGoogle Scholar
- Forney GD: On the role of MMSE estimation in approaching the information theoretic limits of linear Gaussian channels: Shannon meets Wiener. In Proc. 41st Ann. Allerton Conf. Monticello, IL; 2003:430-439.Google Scholar
- Gamal HE, Caire G, Damen MO: Lattice coding and decoding achieve the optimal diversity multiplexing tradeoff of MIMO channels. IEEE Trans. Inf. Theory 2004, 50(6):968-985. 10.1109/TIT.2004.828067MATHView ArticleGoogle Scholar
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.