Skip to main content

ORIGINAL RESEARCH article

Front. Comms. Net., 13 October 2021
Sec. Communications Theory
This article is part of the Research Topic Improper Gaussian Signaling and Asymmetric Discrete Constellations for Future Communication Networks View all 4 articles

Isotropic and Non-Isotropic Signaling in Multivariate α-Stable Noise

  • CITI Laboratory, Univ Lyon, INSA Lyon, Inria, Villeurbanne, France

A wide range of communication systems are corrupted by non-Gaussian noise, ranging from wireless to power line. In some cases, including interference in uncoordinated OFDM-based wireless networks, the noise is both impulsive and multivariate. At present, little is known about the information capacity and corresponding optimal input distributions. In this paper, we derive upper and lower bounds of the information capacity by exploiting non-isotropic inputs. For the special case of sub-Gaussian α-stable noise models, a numerical study reveals that isotropic Gaussian inputs can remain a viable choice, although the performance depends heavily on the dependence structure of the noise.

1 Introduction

In many communication systems, additive Gaussian noise is the dominant form of signal corruption due to thermal fluctuations in the electronic devices comprising the receiver. Nevertheless, additive non-Gaussian noise has also been observed to play an important role in power line (Zimmermann and Dostert, 2002) and molecular communications (Farsad et al., 2015). Even in wireless communications, interference from uncoordinated transmitters, such as in the Internet of Things (IoT), has been suggested to admit non-Gaussian statistics (Clavier et al., 2021b). Another form of wireless communications where non-Gaussian noise arises is in underwater communications (Chitre et al., 2004).

A particularly important family of non-Gaussian noise models are impulsive, where the probability of large amplitude noise is significantly higher than predicted by corresponding Gaussian models; that is, impulsive noise is heavy-tailed. A key property of impulsive noise is that higher-order moments are often infinite or undefined, arising in Student’s t (Hall, 1966), generalized Gaussian (Dytso et al., 2018), and α-stable models (Middleton, 1977; Sousa, 1992; Ilow and Hatzinakos, 1998; Gulati et al., 2010; Pinto and Win, 2010).

Of all impulsive noise families, one of the most ubiquitous are the α-stable models. As a generalization of Gaussian models admitting the key property known as stability under convolution, these models arise via several mechanisms. The first mechanism, relevant for molecular communications, is via the distribution of the first hitting time of the standard Wiener process (Farsad et al., 2015). The second mechanism is via the generalized central limit theorem, which characterizes the behavior of partial sums of n independent and identically distributed random variables under the scaling n1α (Mahmood et al., 2014).

The third mechanism to obtain α-stable models relevant for interference in wireless communication systems was first identified by Middleton (Middleton, 1977) and further clarified in (Sousa, 1992; Ilow and Hatzinakos, 1998). In particular, given uncoordinated transmitting devices located according to a homogeneous Poisson point process on the plane, the interference under power-law path loss converges almost surely to an α-stable random variable by identification with the LePage series (Samorodnitsky and Taqqu, 1994). This third mechanism has recently seen application in interference studies for the IoT (Egan et al., 2018). Indeed both theory and recent experimental data (Lauridsen et al., 2017) in the 868 MHz band, utilized by SigFox and LoRa devices, has indicated the presence of heavy-tailed interference which may be modeled via α-stable models (Clavier et al., 2021b).

Despite the utility of α-stable noise models in communications, the vast majority of work has focused on real-valued noise. In this setting, information capacity bounds have been derived in (de Freitas et al., 2017) and the structure of optimal input distributions characterized in (Fahs and Abou-Faycal, 2017). The design of symbol detection strategies and their performance has been addressed in (Niranjayan and Beaulieu, 2009; Ghannudi et al., 2010; Clavier et al., 2021a) and decoding algorithms developed in (Gu and Clavier, 2012; Mestrah et al., 2020). Noise parameter estimation algorithms have also been developed in (Kuruoglu, 2001) and power control strategies in (Freitas et al., 2018).

On the other hand, baseband signals in wireless communications are typically complex-valued for which few signal processing strategies and studies of performance analysis have been developed, with notable exceptions in (Gulati et al., 2010; Mahmood et al., 2014) for the narrowband case. The situation is further complicated when transmissions utilize orthogonal frequency division multiplexing (OFDM), where signals are transmitted over multiple subcarriers. In such cases, the noise forms a random vector and real-valued α-stable models are insufficient. Nevertheless, it has recently been shown that multivariate α-stable models can naturally arise from statistical analysis of interference in complex baseband signals over multiple subcarriers (Egan et al., 2018). However, little is known about performance limits or optimal signaling strategies in the presence of multivariate α-stable noise. In particular, the information capacity remains an open question in such channels, which is useful for selecting coding rates—via the noisy channel coding theorem—and in designing resource allocation strategies (Freitas et al., 2018).

In this paper, as a step towards resolving these open questions, we study the information capacity and signaling in multivariate symmetric α-stable noise channels with 1 < α < 2. We first return to the question of the information capacity in real-valued symmetric α-stable noise channels, where we establish new upper and lower bounds that are tighter and more general than those given in (de Freitas et al., 2017). In particular, bounds are also given for power-constrained inputs as well as fractional moment constraints. In the case of a power constraint, we establish that the information capacity is within a constant of the information capacity for the Gaussian noise channel and that Gaussian inputs yield this behavior.

We then turn to the case of multivariate symmetric α-stable noise. We show that there exists a unique optimal input achieving the information capacity and also derive a general upper bound, which is applicable to all multivariate symmetric α-stable noise channels subject to fractional moment and power constraints. We then derive a general lower bound applicable for fractional moment constraints with exponent r < α. In the case of sub-Gaussian α-stable models, we also obtain a lower bound on the information capacity subject to a power constraint.

Our bounds suggest, at least from an analytical point of view, that it is desirable to match the dependence structure of the input distribution to that of the noise. Indeed, our lower bounds are obtained with non-isotropic inputs, often matched to the dependence structure of the noise distribution. To study the performance of non-isotropic inputs, we consider communication in sub-Gaussian α-stable noise subject to a power constraint, and numerically study the behavior of the bounds. In this particular case, we observe that isotropic Gaussian inputs nearly achieve the capacity upper bound, suggesting that matching the input to the dependence structure of the noise is not always desirable.

1.1 Notation

Vectors are denoted by bold lowercase letters and random vectors by bold uppercase letters, respectively (e.g., x, X). We denote the distribution of a random vector X by PX. If X, Y are two random vectors equal in distribution, then we write XdY.

Let zRd, then ‖zr, 1 ≤ r ≤ 2 is given by

zr=i=1d|zi|r1r(1)

and ‖·‖r is called the r-norm on Rd. For two vectors a,bRn, ab indicates that aibi, i = 1, … , n.

Let f:RR and g:RR. We use the Landau notation where f(x) = o(g(x)) if limxf(x)g(x)=0 and f(x) = O(g(x)) if there exists C > 0 and x0R such that f(x) ≤ Cg(x), ∀xx0.

2 Problem Formulation

In this section, we detail the problem of characterizing the information capacity and optimal input distributions in multivariate symmetric α-stable noise channels (1 < α < 2). To this end, we first recall preliminary definitions and properties of scalar and multivariate α-stable models that will be used in the sequel. For further details, we refer the reader to (Samorodnitsky and Taqqu, 1994).

2.1 α-Stable Models

The probability density function of an α-stable random variable is described by four parameters: the exponent 0 < α ≤ 2; the scale parameter γR+; the skew parameter β ∈ ( − 1, 1); and the shift parameter δR. If X has an α-stable distribution, then we write XSα(γ, β, δ). In the case β = δ = 0, X is said to be a symmetric α-stable random variable.

In general, α-stable random variables do not have closed-form probability density functions. Instead, they are more compactly represented by the characteristic function, given by (Samorodnitsky and Taqqu, 1994, Eq. 1.1.6)

E[eiθX]=expγα|θ|α1iβ(signθ)tanπα2+iδθ,α1expγ|θ|1+iβ2π(signθ)log|θ|+iδθ,α=1(2)

Observe that in the special case α = 2, the α-stable distribution is Gaussian. As such, the family of α-stable distribution generalize the family of Gaussian distributions. In fact, like Gaussian models, if X(1) and X(2) are independent copies of an α-stable random variable X, then for a, b > 0, there exists constants c>0,dR such that

aX(1)+bX(2)dcX+d.(3)

More precisely, the following property holds (Samorodnitsky and Taqqu, 1994).

Property 1 Suppose Z1, Z2 are independent with Z1Sα(γ1, β1, δ1) and Z2Sα(γ2, β2, δ2). Then, Z1 + Z2Sα(γ, β, δ), where

γ=(γ1α+γ2α)1α,β=β1γ1α+β2γ2αγ1α+γ2αδ=δ1+δ2.(4)

When β = δ = 0 in Eq. 2, the resulting α-stable distribution is said to be symmetric. An important alternative characterization of symmetric α-stable random variables is via the LePage series.

Theorem 1 [Theorem 1.4.2 (Samorodnitsky and Taqqu, 1994)]. Suppose 0 < α < 2,(Γi)i=1 is a homogeneous Poisson point process with intensity 1, and (Wi)i=1 are symmetric, independent and identically distributed random variables satisfying E[|Wi|α]<. Then,

i=1Γi1αWi(5)

converges almost surely to a random variable XSα((Cα1E[|W1|α])1/α,0,0), where

Cα=1αΓ(2α)cos(πα/2),α12/π,α=1.(6)

In the multivariate setting, we consider random vectors X in Rdd>1. Analogously to the scalar case (d = 1), a random vector XRd is a symmetric α-stable random vector if for all a, b > 0 there exists c > 0 such that

aX(1)+bX(2)dcX,(7)

where X(1) and X(2) are independent copies of X.A sufficient condition for a random vector X in Rd to be a symmetric α-stable random vector is that all linear combinations of the elements of X are symmetric α-stable (Samorodnitsky and Taqqu, 1994). In general, d-dimensional symmetric α-stable random vectors can be represented via their characteristic function, given by (Samorodnitsky and Taqqu, 1994)

E[eiθX]=expSd1k=1dθkskαΓ(ds),(8)

where Γ is the unique symmetric measure on the surface of the d-dimensional unit sphere.In the case that a d-dimensional α-stable random vector X is truly d-dimensional, there exists a joint probability density function pX(⋅) on Rd. Note that a simple necessary and sufficient condition for X to be truly d-dimensional is for the support of the spectral measure to span Rd (Byczkowski et al., 1993). This condition means that degenerate α-stable random vectors (e.g., when Xi = Xj for some ij, i, j ∈ {1, … , d}) are not considered.A key family of truly α-stable random vectors are the sub-Gaussian α-stable random vectors, defined as follows.

Definition 1 Any vector X satisfying Xd(A1/2G1,,A1/2Gd), where

ASα/2((cosπα/4)2/α,1,0),(9)

and G=[G1,,Gd]TN(0,Σ) is called a sub-Gaussian α-stable random vector in Rd with underlying Gaussian vector G. IfΣ = σ2I with σ > 0, then X is said to be an isotropic sub-Gaussian α-stable random vector.

2.2 The Information Capacity Problem

Consider the memoryless, stationary, linear and point-to-point communication channel

Y=X+N,(10)

where N is a truly symmetric α-stable random vector with 1 < α < 2, admitting a multivariate probability density function pN(⋅), with X and N independent. The random vector X is defined on1(Rd,B(Rd)) with probability measure μX lying in the set ΛX (P, r), where

ΛX(P,r)={μX:(EμX[|X1|r],,E[|Xd|r])P},(11)

for a given PR+d and 1 ≤ r ≤ 2. As such, the set ΛX(P, r) corresponds to the set of inputs satisfying element-wise moment constraints. Note that by virtue of N admitting a probability density function, Y also admits a probability density function pY(⋅).

The main focus of this paper is to investigate the information capacity and corresponding optimal inputs for communication channels of the form Eq. 10. To this end, let P(Rd) be the set of probability measures on (Rd,B(Rd)) equipped with the topology of weak convergence (Billingsley, 1999).

C(P,r)=supμXΛX(P,r)I(X;Y)(12)

where the mutual information I(X; Y) is given by

I(X;Y)=RdRdpN(yx)logpN(yx)pY(y)dyμX(dx).(13)

In the case an optimal input exists, it satisfies

μX*argmaxμXΛX(P,r)I(X;Y).(14)

Note that, by a generalization of Shannon’s noisy channel coding theorem for vector non-Gaussian channels (Han, 2003), the information capacity may be interpreted as the maximum achievable rate with asymptotically zero average probability of error.

In the remainder of this paper, we address the following questions:

(i) What is the value of C(P, r) for varying P and r?

(ii) Does an optimal input μX*ΛX(P,r) exist?

(iii) What is the structure of nearly optimal inputs?

In this work, we will allow μX to be non-isotropic; that is, for all d × d orthogonal matrices OO(d), it does not hold that

OXdX,(15)

where X has probability measure μX. In the following section, we begin with scalar channels—which have not previously been comprehensively studied—before considering more general vector channels in Section 4.

3 Scalar Channels

Before turning to multivariate α-stable noise channels, we first consider the scalar case. In particular, we first improve on the capacity bounds in (de Freitas et al., 2017) and in the process develop techniques that will be generalized to the multivariate setting in the sequel. To begin, we specialize the problem in Eq. 12 to the scalar case: a stationary and memoryless scalar additive symmetric α-stable noise channel is given by

Y=X+N,(16)

where the noise N is a symmetric α-stable random variable with scale parameter γN, admiting a probability density function pN(⋅), with X and N independent. The input random variable X is required to satisfy the constraint

E[|X|r]P,(17)

where 1 ≤ r ≤ 2. In terms of the probability measure of X, the constraint can be written as

ΛX(P,r)={μXP(R):EμX[|X|r]P}.(18)

In this case, the information capacity of the channel (16) is defined as

C(P)=supμΛX(P,r)I(X;Y)(19)

It follows from (Fahs and Abou-Faycal, 2016) that an optimal solution of Eq. 19 exists and is unique. Indeed, the optimal input is known to be discrete (Fahs and Abou-Faycal, 2017).

3.1 Capacity Upper Bounds

In (de Freitas et al., 2017), an upper bound on C(P, r) was established when r = 1 and 1 < α < 2.

Theorem 2 Letλ > 0 and r = 1. For the channel (16), the capacity C(P, 1) in (19) is upper bounded by

C(P,1)log2Γ1αλγαπ+λ2γΓ11απ+P.(20)

It was shown in (de Freitas et al., 2017) that this bound was tight for moderate values of P and appropriate values of λ, but quickly diverged. An asymptotic upper bound, that is, the upper bound is only guaranteed to hold as P, was established. In the following theorem, we establish an upper bound which holds for all 1 ≤ r ≤ 2 and p > 0.

Theorem 3 Let 1 ≤ r ≤ 2 and p > 0. For the channel (16), the capacity C(P, r) in (19) is upper bounded by

C(P,r)CUB(P,r)=log2P1r+2Γ11απγNeh(N).(21)

Proof. Note that under the constraint that E[|Y|]=cY,cY>0, the entropy is maximized by the Laplace distribution (Cover and Thomas, 2006). This yields a bound of

h(Y)log(2cYe).(22)

By the triangle inequality,

E[|Y|]E[|X|]+E[|N|].(23)

We also have by (Zolotarev, 1957)

E[|N|]=2Γ11απγN.(24)

All that remains is to obtain E[|X|r]. By construction, E[|X|r]P. Using Hölder’s inequality then yields

E[|X|](E[|X|r])1r=P1r.(25)

Substituting Eqs 2325 into Eq. 22 gives

C(P)log2P1r+2Γ11απγNeh(N),(26)

as required.

3.2 Capacity Lower Bounds

We now turn to lower bounding C(P, r). We first consider the case where 1 ≤ r < α.

Theorem 4 Let 1 ≤ r < α. For the channel (16), the capacity C(P, r) in (19) is lower bounded by

C(P,r)CLB(P,r)=1αlog1+PαrγNααπΓr22r+1Γr+12Γrα1r.(27)

Proof. Let XSα(γX, 0, 0) with γXR+. Consider the random variable USα(1, 0, 0). By the scaling and translation properties of α-stable random variables, we can write

XdγXUNdγNU.(28)

By the stability property

Y=X+NSα(γXα+γNα)1α,0,0(29)

and hence

YdγYU,(30)

where γY=(γXα+γNα)1α.We then have

I(X;Y)=h(Y)h(Y|X)=h(γYU)h(γNU)=h(U)+log(γY)h(U)log(γN)=log(γXα+γNα)1αγN=1αlog1+γXαγNα.(31)

Using (Shao and Nikias, 1993, Theorem 4)

E[|X|r]=2r+1Γr+12ΓrααπΓr2γXr.(32)

and the constraint E[|X|r]P, it follows that

C(P)1αlog1+PαrγNααπΓr22r+1Γr+12Γrα1r.(33)

Remark 1 When r = 1, Theorem 4 specializes to the lower bound in (de Freitas et al., 2017).

Since 1 ≤ r < α and α < 2, it follows that Theorem 4 does not apply in the important case where the input X is constrained to satisfy E[X2]P. In the following theorem, we establish a lower bound in this setting.

Theorem 5 Let r = 2. For the channel (16), the capacity C(P, 2) in (19) is lower bounded by

C(P,2)CLB(P,2)=012pA(a)log(2πe(P+a))dah(N),(34)

where pA(a) is the probability density function of a totally skewed α/2-stable random variable with scale parameter cos2/α(π4α).

Proof. Let XN(0,P) and GN(0,2γN2). Then,

h(Y)=h(X+N)=h(X+A1/2G)h(X+A1/2G|A)=h(GA|A),(35)

where GAN(0,P+AγN2). Hence,

h(Y)012pA(a)log(2πe(P+2aγN2))da.(36)

As such,

C(P)012pA(a)log(2πe(P+2aγN2))dah(N),(37)

as required.

A key question is whether the capacity bounds we have established so far are tight. To this end, we make the following observation.

Corollary 1 Let 1 ≤ r < α. For the channel (16), the capacity C(P, r) in (19) satisfies

C(P,r)=1rlogP+O(1),P.(38)

Proof. Observe that

CLB(P,r)=1rlogP+O(1),P,CUB(P,r)=1rlogP+O(1),P.(39)

Since

CLB(P,r)CCUB(P,r),(40)

the corollary follows.

By the same argument, we also have the following corollary.

Corollary 2 Let r = 2. For the channel (16), the capacity C(P, 2) in (19) satisfies

C(P,2)=12logP+O(1),P.(41)

As a consequence, for sufficiently large values of P and r = 2, the rate achievable using a Gaussian input is within a constant of the capacity C(P, 2). A further observation, which will be useful in the sequel, is that matching the input distribution to the noise distribution yields a rate that forms a good approximation of the capacity. Finally, the capacity of symmetric α-stable noise channels is within a constant of the capacity for an additive Gaussian noise channel.

3.3 Numerical Results

In order to further verify the tightness of the upper bound in Theorem 3, we compare the bound with the numerical computation of the capacity via the Blahut-Arimoto algorithm (Blahut, 1972; Arimoto, 1972). Figure 1 plots the power against the information capacity for varying and α. The scale parameter is set as γN = 0.01. Observe that the upper bound and the numerical approximation are in good agreement. Note that the lower bound is obtained based on a Gaussian input is also in good agreement, despite the fact that the optimal input is discrete (Fahs and Abou-Faycal, 2017).

FIGURE 1
www.frontiersin.org

FIGURE 1. Capacity of symmetric α-stable noise channels subject to a power constraint P, with γN = 0.01.

Figure 2 plots the capacity upper bounds in Theorem 2 [from (de Freitas et al., 2017)] and our new upper bound in Theorem 3 in the case of the constraint E[|X|]P with γN = 0.01 and α = 1.8. The parameter λ required in the bound from Theorem 2 corresponds to λ = 1. Observe that for all plotted values of P, the new bound in Theorem 3 is below that of Theorem 2, implying that the new bound is tighter. Note that the improvement over the bound in (de Freitas et al., 2017) is already evident from the form of the bounds for large P, due to the fact that P dominates log  P.

FIGURE 2
www.frontiersin.org

FIGURE 2. Capacity of symmetric α-stable noise channels subject to the constraint E[|X|]P, with γN = 0.01 and α = 1.8.

4 Vector Channels

In this section, we return to the general problem in Eq. 12 for vector channels with d > 1.

4.1 Existence and Uniqueness of Optimal Inputs

While existence and uniqueness of optimal inputs is well understood in the scalar case (Fahs and Abou-Faycal, 2016), it has not yet been established in the vector case. We prove this result in the following theorem by utilizing the theory of weak convergence (Billingsley, 1999).

Theorem 6 For the optimization problem in (12), there exists a unique input probability measure μ* corresponding to an input random vector X* on (Rd,Bd) such that C(P, r) = I(X*; Y).

Proof. The proof proceeds in three steps: (i) weak compactness of the constraint set ΛX(P, r); (ii) weak continuity of I(X; Y) on ΛX(P, r), yielding existence of μX*; and (iii) uniqueness of μX*.

(i) For any ϵ > 0, there exists aϵ=[a1,ϵ,,ad,ϵ]T0 such that for all μ ∈ ΛX(P, r)

Pr|X1|r>a1,ϵ,,|Xd|r>ad,ϵ<ϵ.(42)

The inequality in Eq. 42 holds as a consequence of the generalized Markov inequality in (Marshall, 1984, Example 2.3). In more detail,

Pr|X1|r>a1,ϵ,,|Xd|r>ad,ϵmini=1,,dE[|Xi|r]ai,ϵmini=1,,dciai,ϵ<ϵ.(43)

Now, choose Kϵ=[a1,ϵ,a1,ϵ]××[ad,ϵ,ad,ϵ]. Then, Kϵ is compact subset of Rd and μ(Kϵ)1ϵ for all μ ∈ ΛX(P, r). Hence, ΛX(P, r) is tight.To establish closure, we apply a variation of the Portmanteau theorem (Billingsley, 1999). Let {μn}n=1 be a weakly convergent sequence in ΛX(P, r) with limit μ0. By a consequence of the Portmanteau theorem, it follows that

Eμ0[|X1|r],,E[|Xd|r]T=|x1|rdμ0(x),,|xd|rdμ0(x)Tlim infn|x1|rdμn(x),,lim infn|xd|rdμn(x)TP.(44)

Hence, μ0 ∈ ΛX(P, r). Since the choice of sequence is arbitrary, it follows that ΛX(P, r) is closed in the topology of weak convergence. Since ΛX(P, r) is tight and closed in the topology of weak convergence, it then follows by Prokhorov’s theorem (Billingsley, 1999) that ΛX(P, r) is compact.

(ii) The second step is to establish that I(X; Y) is weakly continuous on ΛX(P, r). In particular, we need to show that for any weakly convergent sequence of probability measures (μn)n=1 with limit μ0

limnpYn(y)logpYn(y)dy=pY0(y)logpY0(y)dy,(45)

where Yn is the output corresponding to an input Xn with probability measure μn. Note that Yn = Xn + N admits a probability density function since N is truly d-dimensional.Observe that if the limit and the integral in Eq. 45 can be swapped, the result follows from the definition of weak convergence if the probability density function of N, pN, is bounded and continuous. Note that this is indeed the case since the characteristic function of N, ΦN(t)=E[eitN] is integrable when N is truly d-dimensional.To complete the proof, we must justify swapping of the limit and integral in Eq. 45. Let 1 < s < α. We need to establish that for all n ≥ 0 and any δ > 0, there exists R(δ) > 0 such that

ys>R(δ)pYn(y)logpYn(y)dy<δ.(46)

To proceed, let

q(y)=1πd1i=1d(1+yi2),yRd.(47)

which is a Cauchy density on Rd. Observe that

ys>R(δ)pYn(y)logpYn(y)dy=ys>R(δ)pYn(y)logq(y)dyys>R(δ)pYn(y)logpYn(y)q(y)dyys>R(δ)pYn(y)logπd+logi=1d(1+yi2)dy+1eys>R(δ)q(y)dy,(48)

where the last term follows from the fact that aloga1e,a>0.Note that by the Markov inequality,

ys>R(δ)logπdpYn(y)dydlogπE[Ys]R(δ)dlogπLR(δ),(49)

which tends to zero as R(δ) → . Here, L < since by the Jensen and Hölder inequalities

E[Xs]=Ei=1d|Xi|s1/sEi=1d|Xi|s1/si=1dE|Xi|rs/r1/s(50)

which implies

E[Ys]E[Xs]+E[Ns]i=1dE|Xi|rs/r1/s+E[Ns]<L<,(51)

since the probability measure μ corresponding to X lies in ΛX(P, r). Similarly,

1eys>R(δ)q(y)dy1eR(δ)Eq[Ys],(52)

which tends to zero as R(δ) → .Moreover,

ys>R(δ)pYn(y)logi=1d(1+yi2)dy2ys>R(δ)pYn(y)logi=1d(1+|yi|)dy2supys>R(δ)logi=1d(1+|yi|)ysys>R(δ)yspYn(y)dy.(53)

Note that

logi=1d(1+|yi|)ysi=1d|yi|ys1,(54)

by Hölder’s inequality. As such, Eq. 53 is finite and tends to zero as R(δ) → .After an application of the dominated convergence theorem, for any δ > 0

limnyrR(δ)pYn(y)logpYn(y)dy=yrR(δ)pY0(y)logpY0(y)dy.(55)

Since the identities in Eqs 49, 52, 53, 55 hold for all δ > 0, weak continuity of I(X; Y) follows by taking δ → 0 (and hence R(δ) → ). The existence part of Theorem 6 then holds by applying the extreme value theorem.

(iii) The uniqueness of the optimal input follows from the fact that the entropy h(Y) is a strictly concave function of the distribution PY. By the fact that the characteristic function of N is strictly positive, PY is a one-to-one function of the distribution PX. Hence, h(Y) is a strictly concave function of PX. As the mutual information can be written as

I(X;Y)=h(Y)h(N)(56)

it follows that I(X; Y) is a strictly concave function of PX since h(N) does not depend on PX. Since this holds for any input lying in Λ(P, r), it then follows that the optimal input probability measure μX* is unique.

4.2 Capacity Upper Bound

We now obtain a general upper bound on the capacity in multivariate α-stable noise, which holds for constraints with 1 ≤ r ≤ 2.

Theorem 7 Let 1 < α < 2, 1 ≤ r ≤ 2,P0 and γNi be the scale parameter for the ith element of N. The capacity C(P, r) in (12) is upper bounded by

C(P,r)CUB(P,r)=i=1dlog2Pi1r+2Γ11απγNieh(N).(57)

Proof. Recall that

h(Y)i=1dh(Yi).(58)

For each term h(Yi), the same argument as Theorem 3 yields

h(Yi)log2Pi1r+2Γ11απγNie.(59)

The result then follows since for all X with probability measure μX ∈ Λ(P, r),

I(X;Y)i=1dh(Yi)h(N).(60)

As for the scalar case, the term h(N) is not available in closed-form and must be numerically evaluated. In the numerical study in Section 4.4, h(N) will be estimated via nearest neighbor methods.

4.3 Capacity Lower Bounds

We now generalize the results in Section 3.2 to the case of vector channels. As for scalar channels, we consider the two cases: 1 ≤ r < α; and r = 2.

Theorem 8 Let 1 < α < 2, 1 ≤ r < α and P0. The capacity C(P, r) in (12) is lower bounded by

C(P,r)CLB(P,r)=1αi=1dlog1+γXiα,(61)

where

γXi=PiαπΓr22r+1Γr+12ΓrαγNir1r.

Proof. Let

A=diag(γX1,,γXd)Aα=diag(γX1α,,γXdα)(63)

and set X=dAN. We then have

I(X;Y)=h(Y)h(N)=h(X+N)h(N)=h(Aα+I)1αNh(N)=logdet(Aα+I)1α+h(N)h(N)=1αi=1dlog(1+γXiα).(64)

In order to ensure that μX ∈ ΛX(P, r), we recall (Shao and Nikias, 1993, Theorem 4)

E[|Xi|r]=E[|γXiNi|r]=γXir2r+1Γr+12ΓrααπΓr2γNirPi.(65)

It then follows that

γXi=PiαπΓr22r+1Γr+12ΓrαγNir1r,(66)

as required.

Theorem 9 Let 1 < α < 2, r = 2, and P0 For the channel (10) with N sub-Gaussian α-stable with underlying random vector GN(0,Σ), the capacity C(P, 2) in (12) is lower bounded by

C(P,2)CLB(P,2)=max0,012pA(a)logdet(2πe(ΣX+aΣ))dah(N),(67)

where ΣX is any positive definite matrix with diagonal elements

ΣX,ii=Pi,i=1,,d(68)

and ASα/2(cos2/α(π4α),1,0).

Proof. Let XN(0,ΣX) and GN(0,Σ). Then,

h(Y)=h(X+N)=h(X+A1/2G)h(X+A1/2G|A)=h(GA|A),(69)

where GAN(0,ΣX+AΣ). Hence,

h(Y)012pA(a)logdet(2πe(ΣX+aΣ))da.(70)

In order to satisfy the power constraints, we require

ΣX,iiPi,i=1,,d,(71)

which yields the desired result.

4.4 Numerical Results

In this section, we study the behavior of the bounds in the case of two-dimensional sub-Gaussian α-stable noise, where inputs are subject to a power constraint.

Figure 3 plots the capacity bounds in the previous section for varying values of P in the presence of sub-Gaussian α-stable noise, with α = 1.2 and

Σ=20.01210.70.71.(72)

In order to compute the entropy h(N), the 1-nearest neighbor method (Berrett et al., 2019) was used. Observe there is roughly a gap of approximately one nat between the upper bound in Theorem 7 and the lower bound in Theorem 9 with ΣX chosen to proportional to Σ.

FIGURE 3
www.frontiersin.org

FIGURE 3. Capacity bounds for two-dimensional sub-Gaussian α-stable noise channels subject to a power constraint P, with Σ given in Eq. 72 and α = 1.2.

The third curve in red corresponds to the case of a two-dimensional isotropic Gaussian input where each component has variance P. Observe that the mutual information obtained with this input is close to the upper bound. This suggests that for sub-Gaussian α-stable noise channels, Gaussian inputs perform well and, moreover, independent components are desirable. This can be understood by an inspection of Theorem 9, where choosing ΣX to be diagonal maximizes the determinant when Σ = 0.

Figure 4 plots the capacity bounds in the previous section subject to a power constraint p = 0.01 for varying values of ρ in the presence of sub-Gaussian α-stable noise, with α = 1.2 and

Σ=20.0121ρρ1.(73)

The results are consistent with Figure 3, with the isotropic Gaussian input performing well for all values of ρ. We also observe that the curves also increase for sufficient large values of ρ, suggesting that increasing the dependence can lead to performance improvements. This is relevant for communication systems, such as in (Zheng et al., 2019, 2020), where noise is dominated by interference, which may be modified via changes to access policies.

FIGURE 4
www.frontiersin.org

FIGURE 4. Capacity bounds for two-dimensional sub-Gaussian α-stable noise channels for varying noise dependence ρ subject to a power constraint p = 0.01, with Σ given in Eq. 73 and α = 1.2.

5 Conclusion

Multivariate α-stable models have been suggested to capture the heavy-tailed nature of interference in OFDM-based wireless communication systems. In this paper, we studied the capacity of fractional moment and power constrained signaling in the presence of such noise. By considering non-isotropic inputs, we obtained upper and lower bounds, which provide insights into the behavior of the capacity and its relation to Gaussian noise models. Via a numerical study in two-dimensional channels with sub-Gaussian α-stable noise, we compared the performance of isotropic and non-isotropic Gaussian inputs. This suggests, at least for this special case, isotropic Gaussian inputs remain a desirable choice.

Data Availability Statement

The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.

Author Contributions

ME formulated the problem, carried out the mathematical analysis and numerical study, and wrote the paper.

Funding

This work has been (partly) funded by the French National Agency for Research (ANR) under grant ANR-16-CE25-0001-ARBURST.

Conflict of Interest

The author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s Note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Acknowledgments

We would like to acknowledge useful discussions with L. Clavier, G. W. Peters, N. Azzaoui, and J.-M. Gorce.

Footnotes

1The notation B(Rd) denotes the Borel σ-algebra on Rd.

References

Arimoto, S. (1972). An Algorithm for Computing the Capacity of Arbitrary Discrete Memoryless Channels. IEEE Trans. Inform. Theor. 18, 14–20. doi:10.1109/tit.1972.1054753

CrossRef Full Text | Google Scholar

Berrett, T., Samworth, R., and Yuan, M. (2019). Efficient Multivariate Entropy Estimation via K-Nearest Neighbour Distances. Ann. Stat. 47, 288–318. doi:10.1214/18-aos1688

CrossRef Full Text | Google Scholar

Billingsley, P. (1999). Convergence of Probability Measures. John Wiley & Sons.

Google Scholar

Blahut, R. (1972). Computation of Channel Capacity and Rate-Distortion Functions. IEEE Trans. Inform. Theor. 18, 460–473. doi:10.1109/tit.1972.1054855

CrossRef Full Text | Google Scholar

Byczkowski, T., Nolan, J. P., and Rajput, B. (1993). Approximation of Multidimensional Stable Densities. J. Multivariate Anal. 46, 13–31. doi:10.1006/jmva.1993.1044

CrossRef Full Text | Google Scholar

Chitre, M., Potter, J., and Heng, O. (2004). “Underwater Acoustic Channel Characterisation for Medium-Range Shallow Water Communications,” in MTS/IEEE Techno-Ocean’04 (IEEE).

Google Scholar

Clavier, L., Pedersen, T., Larrad, I., Lauridsen, M., and Egan, M. (2021b). Experimental Evidence for Heavy Tailed Interference in the IoT. IEEE Commun. Lett. 25, 692–695. doi:10.1109/lcomm.2020.3034430

CrossRef Full Text | Google Scholar

Clavier, L., Peters, G., Septier, F., and Nevat, I. (2021a). Impulsive Noise Modeling and Robust Receiver Design. EURASIP J. Wireless Commun. Networking 13, 1. doi:10.1186/s13638-020-01868-1

CrossRef Full Text | Google Scholar

Cover, T., and Thomas, J. (2006). Elements of Information Theory. Second Edition. Hoboken, NJ: John Wiley & Sons.

Google Scholar

de Freitas, M. L., Egan, M., Clavier, L., Goupil, A., Peters, G. W., and Azzaoui, N. (2017). Capacity Bounds for Additive Symmetric $\alpha $ -Stable Noise Channels. IEEE Trans. Inform. Theor. 63, 5115–5123. doi:10.1109/tit.2017.2676104

CrossRef Full Text | Google Scholar

Dytso, A., Bustin, R., Vincent Poor, H., and Shamai, S. (2018). Analytical Properties of Generalized Gaussian Distributions. J. Stat. Distributions Appl. 5, 1–40. doi:10.1186/s40488-018-0088-5

CrossRef Full Text | Google Scholar

Egan, M., Clavier, L., Zheng, C., de Freitas, M., and Gorce, J.-M. (2018). Dynamic Interference for Uplink SCMA in Large-Scale Wireless Networks without Coordination. EURASIP J. Wireless Commun. Networking 213, 1. doi:10.1186/s13638-018-1225-z

CrossRef Full Text | Google Scholar

Egan, M. (2019). “On Capacity Sensitivity in Additive Vector Symmetric α-stable Noise Channels,” in Proc. IEEE Wireless Communications and Networking Conference Workshop (WCNCW) (IEEE). doi:10.1109/wcncw.2019.8902901

CrossRef Full Text | Google Scholar

Fahs, J., and Abou-Faycal, I. (2017). On Properties of the Support of Capacity-Achieving Distributions for Additive Noise Channel Models with Input Cost Constraints. IEEE Trans. Inf. Theor. 64, 1178–1198. doi:10.1109/TIT.2017.2771815

CrossRef Full Text | Google Scholar

Fahs, J., and Abou-Faycal, I. (2016). On the Finiteness of the Capacity of Continuous Channels. IEEE Trans. Commun. 64, 166–173. doi:10.1109/tcomm.2015.2503403

CrossRef Full Text | Google Scholar

Farsad, N., Guo, W., Chae, C.-B., and Eckford, A. (2015). “Stable Distributions as Noise Models for Molecular Communication,” in Proc. IEEE Global Communications Conference (IEEE). doi:10.1109/glocom.2015.7417583

CrossRef Full Text | Google Scholar

Freitas, M., Egan, M., Clavier, L., Savard, A., and Gorce, J.-M. (2018). “Power Control in Parallel Symmetric α-stable Noise Channels,” in IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (IEEE).

Google Scholar

Ghannudi, H. E., Clavier, L., Azzaoui, N., Septier, F., and Rolland, P.-a. (2010). α-Stable Interference Modeling and Cauchy Receiver for an IR-UWB Ad Hoc Network. IEEE Trans. Commun. 58, 1748–1757. doi:10.1109/tcomm.2010.06.090074

CrossRef Full Text | Google Scholar

Gu, W., and Clavier, L. (2012). Decoding Metric Study for Turbo Codes in Very Impulsive Environment. IEEE Commun. Lett. 16, 256–258. doi:10.1109/lcomm.2011.112311.111504

CrossRef Full Text | Google Scholar

Gulati, K., Evans, B. L., Andrews, J. G., and Tinsley, K. R. (2010). Statistics of Co-channel Interference in a Field of Poisson and Poisson-Poisson Clustered Interferers. IEEE Trans. Signal. Process. 58, 6207–6222. doi:10.1109/tsp.2010.2072922

CrossRef Full Text | Google Scholar

Hall, H. (1966). A New Model for Impulsive Phenomena: Application to Atmospheric-Noise Communication Channels. Stanford, CA: Tech. Rep. 3412-8, Stanford Electronics Labs, Stanford University.

Google Scholar

Han, T. (2003). Information-Spectrum Methods in Information Theory. Berlin Heidelberg: Springer-Verlag.

Google Scholar

Ilow, J., and Hatzinakos, D. (1998). Analytic Alpha-Stable Noise Modeling in a Poisson Field of Interferers or Scatterers. IEEE Trans. Signal. Process. 46, 1601–1611. doi:10.1109/78.678475

CrossRef Full Text | Google Scholar

Kuruoglu, E. E. (2001). Density Parameter Estimation of Skewed α-stable Distributions. IEEE Trans. Signal. Process. 49, 2192–2201. doi:10.1109/78.950775

CrossRef Full Text | Google Scholar

Lauridsen, M., Vejlgaard, B., Kovács, I., Nguyen, H., and Mogensen, P. (2017). “Interference Measurements in the European 868 MHz ISM Band with Focus on LoRa and SigFox,” in IEEE Wireless Communications and Networking Conference (WCNC) (IEEE). doi:10.1109/wcnc.2017.7925650

CrossRef Full Text | Google Scholar

Mahmood, A., Chitre, M., and Armand, M. A. (2014). On Single-Carrier Communication in Additive white Symmetric Alpha-Stable Noise. IEEE Trans. Commun. 62, 3584–3599. doi:10.1109/tcomm.2014.2351819

CrossRef Full Text | Google Scholar

Marshall, A. W. (1984). Markov’s Inequality for Random Variables Taking Values in a Linear Topological Space. Inequalities Stat. Probab. 5, 104–108. doi:10.1214/lnms/1215465634

CrossRef Full Text | Google Scholar

Mestrah, Y., Savard, A., Goupil, A., Gellé, G., and Clavier, L. (2020). An Unsupervised Llr Estimation with Unknown Noise Distribution. EURASIP J. Wireless Commun. Networking 26, 1. doi:10.1186/s13638-019-1608-9

CrossRef Full Text | Google Scholar

Middleton, D. (1977). Statistical-physical Models of Electromagnetic Interference. IEEE Trans. Electromagn. Compat. EMC-19, 106–127. doi:10.1109/temc.1977.303527

CrossRef Full Text | Google Scholar

Niranjayan, S., and Beaulieu, N. (2009). The BER Optimal Linear Rake Receiver for Signal Detection in Symmetric Alpha-Stable Noise. IEEE Trans. Commun. 57, 3585–3588. doi:10.1109/tcomm.2009.12.0701392

CrossRef Full Text | Google Scholar

Pinto, P. C., and Win, M. Z. (2010). Communication in a Poisson Field of Interferers--Part I: Interference Distribution and Error Probability. IEEE Trans. Wireless Commun. 9, 2176–2186. doi:10.1109/twc.2010.07.060438

CrossRef Full Text | Google Scholar

Samorodnitsky, G., and Taqqu, M. (1994). Stable Non-gaussian Random Processes. New York, NY: CRC Press.

Google Scholar

Shao, M., and Nikias, C. L. (1993). Signal Processing with Fractional Lower Order Moments: Stable Processes and Their Applications. Proc. IEEE 81, 986–1010. doi:10.1109/5.231338

CrossRef Full Text | Google Scholar

Sousa, E. S. (1992). Performance of a Spread Spectrum Packet Radio Network Link in a Poisson Field of Interferers. IEEE Trans. Inform. Theor. 38, 1743–1754. doi:10.1109/18.165447

CrossRef Full Text | Google Scholar

Zheng, C., Egan, M., Clavier, L., Pedersen, T., and Gorce, J.-M. (2020). “Linear Combining in Dependent α-stable Interference,” in IEEE International Conference on Communications (ICC) (IEEE). doi:10.1109/icc40277.2020.9148724

CrossRef Full Text | Google Scholar

Zheng, C., Egan, M., Clavier, L., Peters, G., and Gorce, J.-M. (2019). “Copula-based Interference Models for IoT Wireless Networks,” in Proc. IEEE International Conference on Communications (ICC) (IEEE). doi:10.1109/icc.2019.8761783

CrossRef Full Text | Google Scholar

Zimmermann, M., and Dostert, K. (2002). Analysis and Modeling of Impulsive Noise in Broad-Band Powerline Communications. IEEE Trans. Electromagn. Compat. 44, 249–258. doi:10.1109/15.990732

CrossRef Full Text | Google Scholar

Zolotarev, V. M. (1957). Mellin-stieltjes Transforms in Probability Theory. Theor. Probab. Appl. 2, 433–460. doi:10.1137/1102031

CrossRef Full Text | Google Scholar

Keywords: α-stable distributions, heavy-tailed noise, non-isotropic inputs, information capacity, discrete inputs

Citation: Egan  M (2021) Isotropic and Non-Isotropic Signaling in Multivariate α-Stable Noise. Front. Comms. Net 2:718945. doi: 10.3389/frcmn.2021.718945

Received: 01 June 2021; Accepted: 21 September 2021;
Published: 13 October 2021.

Edited by:

Ebrahim Bedeer, University of Saskatchewan, Canada

Reviewed by:

Filbert Juwono, Curtin University Sarawak, Malaysia
Ye Wu, University of North Carolina at Chapel Hill, United States

Copyright © 2021 Egan . This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Malcolm Egan , bWFsY29tLmVnYW5AaW5yaWEuZnI=

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.