+ All Categories
Home > Documents > Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... ·...

Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... ·...

Date post: 26-Feb-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
25
ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran Electrical Engineering Indian Institute of Technology Bombay Mumbai 400076 Channel-Code Detection by a Third-Party Receiver via the Likelihood Ratio Test
Transcript
Page 1: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

ISIT 2014, Honolulu HI

Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Electrical Engineering

Indian Institute of Technology Bombay

Mumbai 400076

Channel-Code Detection by a Third-Party Receiver via the Likelihood Ratio Test

Page 2: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

◊ The knowledge of channel encoding scheme seems essential to recover

the source or message

◊ Consider a listener, with access to “noisy” bits or symbols, who wants

to ascertain the channel code used

sender channel encoder + receiver

channeldecoder

source encoder

source decoder

noise

Listener on a channel

listener

07/012014 2 Animesh Kumar, EE, IIT Bombay

Page 3: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

This model has applications in security, or cognitive radios (where a

secondary may want to know primary’s message), or in link adaptation in

some wireless technologies

Applications of this model

eavesdropper, secondary, link adapter, ...

07/012014 3 Animesh Kumar, EE, IIT Bombay

sender channel encoder + receiver

channeldecoder

source encoder

source decoder

noise

Page 4: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Zooming in to the “right” problem

07/012014 4 Animesh Kumar, EE, IIT Bombay

◊ Observe Y1, Y2, …, YN and find out the channel code (map)

◊ This problem has been explained to be NP-hard [Valembois’01]

◊ With some extra information on the channel code, this problem will be

addressed by us

◊ We will address the problem in a hypothesis testing setup

channel code (map) +

Ei

Yi Vi Ui

Page 5: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

The code-detection problem: assumptions

07/012014 5 Animesh Kumar, EE, IIT Bombay

◊ Message words are equally likely, that is, codewords are equally likely

◊ Block length n is the same for the two codes

◊ In a large deviation setting, vectors (Y1, Y2, …, YN) of (binary,

synchronous) observations are available to detect the channel code

◊ Noise is IID Bernoulli(p), and indep of the hypothesis and messages

code 1

+

Ei

Yi

Vi U1, i

code 2 U2, i

Wi

Message words Ui are mapped

to codewords Vi (or Wi) by two

different binary linear block

codes with parameters [n, k1, d1]

and [n, k2, d2]

Page 6: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Related work

07/012014 6 Animesh Kumar, EE, IIT Bombay

◊ Single “low-weight” parity check equations have been used for: (i)

convolutional code detection [Moosavi-Larsson’11] and (ii) distinguishing

noise from codewords [Chabot’07]

◊ Estimation of channel code from noise-affected bits has been studied

for various settings [Valembois’01] [Cluzeau’06] [Dingel-Hagenauer’07]

convolutional code 1

+

Ei

Yi

Vi U1, i

convolutional code 2

U2, i

Wi

code 1

+

Ei

Yi

Vi U1, i

Bernoulli(½)

Wi

Page 7: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Our key contributions

07/012014 7 Animesh Kumar, EE, IIT Bombay

◊ We use the likelihood ratio test for this problem and show that

the Chernoff information, that is the optimal error-probability

exponent, for the code-detection problem is (strictly) positive if

the two hypothesis are different

◊ Likelihood computation, though it leads to min. error probability

test, can be difficult. Banking upon the (presence of) efficient BCJR

or GDL based decoding, methods to compute the likelihood ratio

for code-detection problem are detailed

Page 8: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Outline

07/012014 8 Animesh Kumar, EE, IIT Bombay

◊ Introduction

◊ Chernoff information bound for the code-detection problem

◊ Algorithms for computing likelihood ratio efficiently for code-

detection

◊ Concluding remarks and future work

Page 9: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Likelihood computation

07/012014 9 Animesh Kumar, EE, IIT Bombay

Y

V1

V0

V2

V3

◊ The likelihood ratio test will involve the comparison of f (Y, H1) against

f (Y, H2) where H1 and H2 are the two hypotheses

◊ The main difference between classical decoding and code-detection is

that the likelihood depends on the entire codeword constellation

◊ This likelihood f (Y, H1) is quite challenging

to compute and is the key stumbling block in

further analysis

Page 10: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Chernoff information

07/012014 10 Animesh Kumar, EE, IIT Bombay

◊ We have a hypotheses testing problem where two distributions, P and

Q, corresponding to code 1 and code 2 have to be distinguished where

◊ Then the optimal exponent of detection error-probability is given by

the Chernoff information [Cover-Thomas]. That is,

code 1 code 2

Page 11: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Lower bound on Chernoff information

07/012014 11 Animesh Kumar, EE, IIT Bombay

Chernoff information is difficult to compute since individual terms in P

and Q are NP-hard to compute. A lower bound on C(P,Q) can be used for

analysis [Sason’13]

where dTV(P,Q) is (half of) L1 distance between P and Q

Page 12: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Likelihood and cosets of the block code

07/012014 12 Animesh Kumar, EE, IIT Bombay

◊ For binary linear block codes, the likelihood only depends on which

coset the vector Y belongs to. This is because

{wt(Y+vi), vi in Code 1} = {wt(Y+vi+c), c fixed in code 1, vi in code 1}

◊ That is, the coset-leaders in standard-array used for decoding can be

used to ascertain likelihood for the entire row

Page 13: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Bounds on (py – qy)

07/012014 13 Animesh Kumar, EE, IIT Bombay

If y is a codeword in code 1 and code 2, then py can be computed and is

equal to p0. Similarly, if the same y is a codeword in code 2, then qy is q0

And |py – qy| is given by |p0 – q0|

If y is a codeword in code 1 and not in code 2, then py can be computed

and is equal to p0. The same y is not a codeword in code 2, then qy is

bounded using q0 as follows

[Ancheta’81] [Sullivan’67]

Page 14: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Main result

07/012014 14 Animesh Kumar, EE, IIT Bombay

p0 – q0 p0 – qyH

= max{q0 – pyH , pyL – q0 , 0} = max{pyL – qyH, qyL – pyH , 0}

Theorem: Assume p0 – q0 0. The dTV(P, Q) and consequently Chernoff

information has a strictly positive lower-bound for code-detection

where m is the dimension of code 1 intersection with code 2

Bounds on |py – qy|for cases where y belongs in code 1 or code 2 or both

Page 15: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Outline

07/012014 15 Animesh Kumar, EE, IIT Bombay

◊ Introduction

◊ Chernoff information bound for the code-detection problem

◊ Algorithms for computing likelihood ratio efficiently for code-

detection

◊ Concluding remarks and future work

Page 16: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Fast algorithms for likelihood calculation

07/012014 16 Animesh Kumar, EE, IIT Bombay

When the two channel codes “code 1” and “code 2” can be

(efficiently) decoded using (i) the GDL [Aji-McEliece’00] or the (ii)

BCJR algorithm [Bahl-Cocke-Jelinek-Raviv’74], then the likelihoods

f (Y, H1) against f (Y, H2) can be found efficiently using some

intermediate steps in the two algorithms

Page 17: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Algorithm based on the GDL

07/012014 17 Animesh Kumar, EE, IIT Bombay

Using Baye’s rule, it can be shown that

If code 1 has a junction tree, this can

be computed efficiently using GDL

The desired likelihood can be obtained using

Page 18: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Algorithm based on the BCJR algorithm

07/012014 18 Animesh Kumar, EE, IIT Bombay

◊ Let Si be the state random variable at depth i

◊ The BCJR algorithm calculates Prob(Si = m, Y) in an intermediate step

during decoding

◊ By adding Prob(Si = m, Y) over states m, f (Y, H1) can be obtained

Page 19: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Recap

07/012014 19 Animesh Kumar, EE, IIT Bombay

◊ Single “low-weight” parity check equations have been used for: (i)

convolutional code detection [Moosavi-Larsson’11] and (ii) distinguishing

noise from codewords [Chabot’07]

convolutional code 1

+

Ei

Yi

Vi U1, i

convolutional code 2

U2, i

Wi

code 1

+

Ei

Yi

Vi U1, i

Bernoulli(½)

Wi

Inner-product method

Parity-check method

Page 20: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Simulations for the average error-probability

07/012014 20 Animesh Kumar, EE, IIT Bombay

Plot of average error probability versus N for inner-product method

[Chabot’07], parity-check method [Moosavi-Larsson’11] and our method

for H1: Hamming(15,11) and H2: BCH(15,7) hypotheses

p = 0.1

Page 21: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Simulations for the average error-probability

07/012014 21 Animesh Kumar, EE, IIT Bombay

More simulations where two hypotheses are H1: Hamming(31,26) and

H2: BCH(31,16)

p = 0.1

Page 22: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Simulations for the Chernoff information

07/012014 22 Animesh Kumar, EE, IIT Bombay

Plot of Chernoff information for the inner-product method [Chabot’07],

parity-check method [Moosavi-Larsson’11] , our lower bound, and

likelihood ratio method for H1: Hamming(15,11) and H2: BCH(15,7)

Page 23: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Outline

07/012014 23 Animesh Kumar, EE, IIT Bombay

◊ Introduction

◊ Chernoff information bound for the code-detection problem

◊ Algorithms for computing likelihood ratio efficiently for code-

detection

◊ Concluding remarks and future work

Page 24: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Conclusions

07/012014 24 Animesh Kumar, EE, IIT Bombay

◊ The likelihood test’s error-exponent: we showed that the

Chernoff information for the code-detection problem is strictly

positive for two hypotheses consisting of binary linear block codes

◊ Likelihood calculation: banking upon the existence of efficient

GDL or BCJR decoding algorithms, efficient methods to compute

the likelihood ratio test was shown

Page 25: Channel-Code Detection by a Third-Party Receiver via the …animesh/files/pres/2014-07-10... · 2014-07-10 · ISIT 2014, Honolulu HI Arti Yardi, Animesh Kumar, and Saravanan Vijayakumaran

Future work

07/012014 25 Animesh Kumar, EE, IIT Bombay

Code-detection problem

◊ where two hypotheses consist of linear block codes with

unequal block lengths

◊ more than two hypotheses

◊ where codes which are not linear or do not have a block

structure

◊ when the two hypotheses consist of LDPC codes (where

decoding is efficient)

◊ …


Recommended