Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Self-secure feedback control based scheme for ultra-reliable and low-latency communication

  • Zheng Yang ,

    Contributed equally to this work with: Zheng Yang, Xiaofang Wang, Shuguang Lu, Jia Wang, Haoheng Yuan

    Roles Formal analysis, Writing – original draft

    Affiliation Geely University of China, Chengdu, China

  • Xiaofang Wang ,

    Contributed equally to this work with: Zheng Yang, Xiaofang Wang, Shuguang Lu, Jia Wang, Haoheng Yuan

    Roles Methodology, Writing – review & editing

    wangxiaofang@guc.edu.cn (XW); 403634831@qq.com (HY)

    Affiliation Geely University of China, Chengdu, China

  • Shuguang Lu ,

    Contributed equally to this work with: Zheng Yang, Xiaofang Wang, Shuguang Lu, Jia Wang, Haoheng Yuan

    Roles Formal analysis, Writing – review & editing

    Affiliation School of Intelligent Manufacturing, HongHe Vocational and Technical College, Mengzi, Yunnan, China

  • Jia Wang ,

    Contributed equally to this work with: Zheng Yang, Xiaofang Wang, Shuguang Lu, Jia Wang, Haoheng Yuan

    Roles Formal analysis, Writing – review & editing

    Affiliation School of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, China

  • Haoheng Yuan

    Contributed equally to this work with: Zheng Yang, Xiaofang Wang, Shuguang Lu, Jia Wang, Haoheng Yuan

    Roles Conceptualization, Supervision, Writing – review & editing

    wangxiaofang@guc.edu.cn (XW); 403634831@qq.com (HY)

    Affiliation School of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, China

Abstract

Ultra-reliable and low-latency communication (URLLC) is one of the key requirements in future wireless communications. In practical URLLC scenarios, an enhanced mobile broadband (eMBB) message together with an URLLC message are simultaneously encoded as codewords and transmitted over the same channels. Traditionally, the coding design of URLLC message often treats the eMBB codeword as interference corrupting the coding performance. In this paper, for the additive white Gaussian noise (AWGN) channel, we show that if noise-free channel feedback is available, there exists a feedback control based coding scheme for the URLLC message, which not only perfectly eliminates the interference caused by the eMBB codeword, but also approaches the maximum rate of the URLLC message when the codeword length tends to infinity. Furthermore, we show that this scheme satisfies the physical layer security requirement by itself, which indicates that our proposed scheme is a self-secure scheme. The results of this paper are explicitly explained by numerical examples, and this work provides a possible way to design efficient coding schemes for URLLC message transmission.

1 Introduction

Ultra-reliable and low-latency communications (URLLC) and enhanced mobile broadband (eMBB) are two critical services in 5G and future 6G wireless communications [13]. URLLC service (e.g., road safety information and autonomous driving) aims to guarantee high reliability levels, and requires coding scheme with short coding blocklength due to its strict latency constraint. Whereas, eMBB service (e.g., high-resolution video streaming and entertainment applications) aims to provide high transmission rate, and adopts coding scheme with long coding blocklength due to its non-critical latency requirement.

Recently, the coexistence of both URLLC and eMBB services receives much attention. In particular, for the Vehicle-to-Everything (V2X) systems, [4] provided a coexistence mechanism for URLLC and eMBB services, where the arrival URLLC transmission is allowed to puncture eMBB transmission. In addition, [5] studied resource allocation strategy between eMBB and URLLC messages in one-way highway vehicular network. However, note that in practical wireless communication systems, during the eMBB transmission, URLLC messages arrives randomly, and in the meanwhile, the eMBB time slot is divided into mini ones, where the newly arrived URLLC messages are immediately scheduled in the next mini-slot by puncturing the on-going eMBB transmission. In [6], it was shown that treating the eMBB codewords as interference which is non-causally known by the transmitter and applying dirty paper coding scheme, the impact of eMBB codewords on the performance of URLLC messages can be perfectly eliminated. However, note that the proposed scheme in [6] is based on Shannon’s random coding argument, which indicates that the encoding-decoding complexity is too high and the coding blocklength should tend to infinity, and this is unrealistic in practical scenarios. Then it is natural to ask: for the transmission of URLLC message, can we design a low-complexity coding scheme which can also perfectly eliminate the impact of eMBB codeword on the coding performance of the URLLC message? If there does exist such a scheme, can it be a secure scheme satisfying the physical layer security (PLS) requirement, namely, when an external eavesdropper attempts to eavesdropping the URLLC message over an additional noisy channel, no information is leaked to him.

A possible effective solution to the above questions is feedback control based coding scheme, which was first proposed in [7], known as the Schalkwijk-Kailath (SK) scheme. In [7], the additive white Gaussian noise (AWGN) channel with feedback was studied, where the feedback channel is noise free and it helps the transmitter to construct a highly efficient coding scheme. In this scheme, at the first time instant, the message is directly transmitted over the AWGN channel, and the receiver adopts a zero-forcing method to do his first estimation about the message. By noise free channel feedback, the transmitter knows the message’s first estimation by the receiver, and sends the estimation error (difference between the estimation and the real message) at the second time instant. Once receiving the signal, the receiver applies linear minimum mean square estimation (LMMSE) to the received signal and obtains a new estimation about the estimation error at the last time instant, and then he updates his estimation about the message by using this new estimation and the initial estimation. By iteration, it was shown that the receiver’s estimation error about the message vanishes with the grow of the coding blocklength. Later, [8] showed that the SK scheme is in fact a feedback control based scheme, and re-presented this scheme from control-theoretic aspect.

Another interesting property of the SK scheme is that it satisfies the PLS requirement by itself. Here recall that the PLS was first investigated by Shannon [9], and subsequently, Wyner [10] studied how to transmit a message over a noisy channel with perfect secrecy guaranteed. The secrecy capacity, which is the maximum transmission rate with perfect secrecy, was characterized. [11] showed that for the AWGN channel with noise-free feedback and an external eavesdropper, the SK scheme is the optimal secure scheme for such a model, which indicates that the SK scheme not only achieves the optimality, but also is self-secure. This self-secure property of the SK scheme has been extensively studied in literature, see [12,13].

In this paper, we aim to extend the SK scheme to the URLLC message transmission with co-existence of eMBB codewords, and check whether the proposed scheme is self-secure or not. Specifically, for the AWGN channel with noise-free feedback, we propose an SK-type scheme which perfectly eliminates the impact of the eMBB codewords on the coding performance of the URLLC message, and show that the proposed scheme is self-secure. Numerical examples show that our proposed scheme performs well comparing with some existing methods.

Organization of this paper: Model formulations and main results are given in Sect 2. Detailed proof of theorems are given in Sect 3. Sect 4 concludes this paper and discusses our possible future research.

For convenience, Table 1 summarizes the notations used in this paper.

2 Model formulation and main results

Assuming a scenario where URLLC and eMBB services coexist under a superposition multiplexing scheme, the receiver wishes to correctly decode eMBB and URLLC messages from the transmitter. The eMBB message arrives at the beginning of a transmission block and is continuously transmitted throughout the whole block, with the block length L. On the other hand, to meet the low-latency requirement of URLLC services, the transmission time of URLLC message should be significantly shorter than that of eMBB message, thereby reducing channel occupation duration. Therefore, the eMBB transmission block length is divided into B subblocks, each with a length N, namely,

(1)

At the start of these subblocks, URLLC message arrives randomly with a probability in . The transmitter simultaneously sends the eMBB message and newly arrived URLLC message within the subblock. Since eMBB service has non-critical latency requirement, its coding scheme with longer codeword length can be used. In this paper, we assume that the codeword length of eMBB message is sufficiently long and obviously the transmitter knows the eMBB codeword in advance since it is designed by himself, and this indicates that the eMBB codeword can be treated as non-causally known state interference at the transmitter. In the meanwhile, assume that the transmission of URLLC messages occurring K times during the entire transmission of eMBB codeword. When eMBB and URLLC messages are superimposed on the same resource for transmission, the receiver identifies whether the current signal contains a URLLC message, and if it does, the receiver feeds back the signal to the transmitter via a feedback channel.

2.1 Coexistence of URLLC and eMBB messages transmission over an AWGN channel with feedback

The information-theoretic model for the coexistence of URLLC and eMBB transmission with noiseless feedback is shown in Fig 1. In the u-th () sub-block, at time instant i, the input-output relationship is given by

(2)

where Xu,i is the input of the feedforward channel, Su,i is the codeword of the eMBB message, is the noise of the AWGN feedforward channel.

thumbnail
Fig 1. The information-theoretic schematic diagram of the URLLC message transmission in the presence of noiseless feedback.

Here Xu,i denotes the URLLC codeword at time instant i and in the u-th () sub-block, and represents the eMBB codewords in the u-th sub-block with blocklength N.

https://doi.org/10.1371/journal.pone.0339035.g001

Definition 1: An -code with power constraint consists of:

(a) The URLLC message Wu in the u-th () sub-block is uniformly distributed over the set .

(b) The output of the feedforward encoder is and it satisfies the following power constraint

(3)

where .

(c) The output of the receiver’s decoder is , where is the receiver’s decoding function.

(d) The receiver’s decoding error probability of the URLLC message Wu in the u-th () sub-block is defined as

(4)

and the average decoding error probability Pe of all Wu is denoted by

(5)

Definition 2: The -rate Ru is achievable if for given blocklength N and decoding error probability , there exists a -code such that

(6)

In (6), the maximum achievable rate Ru is defined as , and the capacity C is given by

(7)

Here Ru represents the achievable rate of URLLC message within a single block. According to (1) and (6), the average achievable rate R of all URLLC messages is expressed as

(8)

2.2 The model of Fig 1 with an external eavesdropper

The information-theoretic schematic diagram for the model of Fig 1 with an external eavesdropper is shown in Fig 2. In the u-th () sub-block, at time instant i, the eavesdropper eavesdrops the feedforward and feedback channels by additional AWGN eavesdropping channels, and the input-output relationship of these eavesdropping channels are given by

(9)

where and are white Gaussian noises and they are independent of each other.

thumbnail
Fig 2. The information-theoretic schematic diagram for the model of Fig 1 with an external eavesdropper.

https://doi.org/10.1371/journal.pone.0339035.g002

Definition 3: Similar to the secrecy criteria defined in [14], in this paper, a normalized eavesdropper’s equivocation (also called secrecy level) for the URLLC message in the u-th sub-block is denoted by

(10)

where , and . Here note that = 1 corresponds to perfect secrecy, which was first introduced by [9]. The average secrecy level of all URLLC messages

(11)

equals since of each sub-block remains the same. Hence in this paper, we only need to focus on the security performance in a certain sub-block, namely, .

2.3 Main results

Theorem 1: For the model of Fig 1, given decoding error probability and blocklength N, an average achievable rate for all URLLC messages is given by

(12)

where denotes the feedforward signal-to-noise ratio, and C is the capacity of the AWGN channel without eMBB codewords [15], which is given by

(13)

The detailed proof is given in Sect 3.1.

Remark: Define the random variable Ku as the effective capacity of the u-th sub-block:

(14)

According to the expected linear properties, the long-term average channel capacity at the system level is given by

(15)

If the signal-to-noise ratio of each transmission sub-block remains constant, according to (13), it can be known that Cu is a fixed constant. Therefore, its expected value is equal to itself, that is, . Thus, the system-level long-term average channel capacity of the AWGN channel is . It can be analyzed as the theoretical upper bound on the average achievable rate .

The rate expression given by Theorem 1 is similar to that of the finite block-length scenario. Specifically, both of them characterize the actual achievable rate by subtracting the rate loss caused by the given code length and decoding error probability from the channel capacity.

Theorem 2: For given decoding error probability and codeword length N, the secrecy level for the model of Fig 2 is lower bounded by

(16)

where the function [x] +  = max,

(17)

, and and in (16) respectively represent the information leakage occurring at the first time instant in feedforward and feedback channels.

The proof is in Sect 3.2.

Remark: From (16), we conclude that when the coding blocklength N in a certain sub-block u tends to infinity, the secrecy level tends to 1, which indicates that our proposed scheme is a self-secure scheme in general.

The following Corollary 1 shows that for a given secrecy threshold (), the minimum coding blocklength N* such that is guaranteed.

Corollary 1: For given secrecy threshold , decoding error probability , the minimum coding blocklength N* of our proposed scheme satisfying is given by

(18)

where

(19)(20)

From Corollary 1, we can easily check that when which corresponds to the perfect secrecy, the minimum coding blocklength needs to be infinity.

Proof: Letting the lower bound of Theorem 2 satisfy , the proof of Corollary 1 is completed.

2.4 Numerical results

In the experiment setting, we define , which implies that the URLLC message arrives in a certain subblock with almost equal probability. Besides this, parameters such as P = 10dB are chosen based on the parameter setting of the experiment section in [5]. Fig 3 compares the achievable rate of the proposed scheme and in the case of noiseless feedback. We see that the achievable rate of the proposed scheme almost approaches the Shannon capacity when the codeword length increases.

thumbnail
Fig 3. Comparison of the achievable rates and under noiseless feedback at different codeword length ( = 0.4, = 10 dB, and = 0 dB).

https://doi.org/10.1371/journal.pone.0339035.g003

Fig 4 plots the relationship between the achievable rate , the decoding error probability and the codeword length N of the proposed scheme. It can be seen that for fixed codeword length, the achievable rate decreases as the decoding error probability decreases. This indicates that in the process of information transmission, the higher requirement for decoding accuracy, the greater impact on the efficiency of information transmission, consisting with the contradictory relationship between reliability and efficiency. In addition, for fixed decoding error probability, as the codeword length increases, the variation trend of the achievable rate shows that it first rises and then tends to stabilize. This result is in line with the theoretical analysis. According to Theorem 1, under finite-length encoding, the rate loss value caused by is negatively correlated with the codeword length. Therefore, in the early stage when the codeword length keeps increasing, the rate loss value continuously decreases, resulting in a corresponding increase in the achievable rate. However, when the codeword length further increases, the rate loss value gradually approaches zero, and the reachable rate also tends to stabilize accordingly. Furthermore, through further observation of Fig 4, it can be known that a lower decoding error probability can be achieved with a shorter codeword length.

thumbnail
Fig 4. The relationship between the achievable rate , decoding error probability and codeword length N of the proposed scheme for the model with noiseless feedback case ( = 0.4, = 10 dB and = 0 dB).

https://doi.org/10.1371/journal.pone.0339035.g004

Fig 5 plots the relationship between the secrecy level , decoding error probability and codeword length N of the proposed scheme. It can be seen that when the decoding error probability remains unchanged, the confidentiality level increases with the increase of the codeword length. Specifically, when the decoding error probability is 10−7, the codeword length is 50, and the secrecy level is close to 1 (approximately 0.955), this is because in the proposed extended SK coding scheme in a noiseless feedback environment, the feedforward channel and the feedback channel only carry the original transmission message at the first transmission moment, i.e., the information leakage phenomenon only occurs at the first moment. With the continuous increase of the codeword length, the average information leakage of the system gradually decreases. In the meanwhile, as the codeword length tends to infinity, the average information leakage vanishes, indicating that the secrecy level tends to 1, approaching perfect secrecy.

thumbnail
Fig 5. The relationship between the secrecy level , decoding error probability and codeword length N of the proposed scheme for the model with noiseless feedback case ( = 0.4, = 10 dB and = 0 dB).

https://doi.org/10.1371/journal.pone.0339035.g005

In addition, we compare our proposed SK-type channel coding scheme with LDPC code based dirty paper coding scheme [16] and a modulo lattice based scheme [17]. Figs 6 and 7 show the comparison between the scheme in [16], the modulo lattice based scheme [17] and our proposed scheme for the model with or without interference, respectively. It can be seen that the our scheme gains advantages over the existing schemes. Specifically, when no interference is involved, at the same transmission rate R = 1 , to achieve the same decoding error probability, both the codeword length and the feedforward power required by our scheme are smaller than those of existing schemes. This is because the decoding error probability of our scheme decays doubly exponentially with the codeword length, while that of existing schemes decays exponentially with the increasing of codeword length. On the other hand, when interference is involved and it equals 7.5 dB, it can be seen that our scheme gains advantages over the existing schemes due to the same reason stated above.

thumbnail
Fig 6. Performance comparison between the LDPC based scheme and the modulo lattice based scheme for = 0.4, = 0 dB when no interference involved.

https://doi.org/10.1371/journal.pone.0339035.g006

thumbnail
Fig 7. Performance comparison between the LDPC based scheme and the modulo lattice based scheme for = 0.4, = 0 dB when interference equals 7.5 dB.

https://doi.org/10.1371/journal.pone.0339035.g007

3 Proof of theorems

3.1 Proof of Theorem 1

The intuition behind the proposed scheme of Theorem 1 is that since the transmitter knows all state interference in advance, an estimation offset caused by these state interference in the SK scheme can be computed by the transmitter. Then at the first time instant, if the transmitter inserts a negative value of this estimation offset into the transmission codeword, the entire offset can be perfectly eliminated when the transmission is completed.

Message mapping:

For given blocklength N and decoding error probabilty , assume that the URLLC message Wu takes values in the set . The transmitter equally divides the interval into sub-intervals, and maps the transmitted message Wu to the midpoint of sub-interval by defining

(21)

Since Wu is uniformly distributed in , is approximately uniformly distributed over the interval and its variance is approximately equal to , i.e., .

Coding procedure:

At time instant 1, the transmitter encodes

(22)

where

(23)

and is the MMSE estimation coefficient (see (30)). Here note that the transmission power at instant 1 is bounded, which is directly from [18].

Once receiving the signal , the receiver obtains the first estimation of , i.e.,

(24)

where the receiver’s estimation error , and the variance of is .

Iteration:

At time instant i, the transmitter sends

(25)

where the variance of the estimation error is .

Then the receiver receives , and computes the -th estimation

(26)

where (a) follows from , (b) follows from

(27)

and denotes the receiver’s estimation error, which is directly given by

(28)

the variance of is

(29)

where (a) follows from , and the MMSE estimation coefficient

(30)

(b) follows from .

End of iteration:

Finally, From (26), we obtain that the estimation of at time instant N is given by

(31)

which is due to the fact that AN + 1 = 0. From (26), we conclude that the receiver’s estimation does not contain any eMBB’s codeword at the final time instant, i.e., the proposed SK-type noiseless feedback scheme eliminates the influence of eMBB message.

Decoding error probability analysis:

According to the decoding scheme, the situation where the receiver has a decoding error at the final moment is defined as:

(32)

From (32), we have

(33)

Here, is the tail function of the Gaussian distribution.

According to (33) and (29), the achievable rate for the noiseless feedback case is given by

(34)

where .

Finally, based on Eqs (8) and (34), the achievable average rate in the case of noiseless feedback is:

(35)

where (a) follows from , which is realized when the number of sub-blocks is sufficiently large, i.e., the law of large numbers. Thus completing the proof of Theorem 1.

3.2 Proof of Theorem 2

The intuition behind the security analysis is that the transmitted message of our proposed scheme is only involved into the codeword sequence at the very beginning, which indicates that information leakage only occurs at the first time instant, resulting in the average information leakage vanishes as the coding blocklength tends to infinity.

To analyze the secrecy level defined in (10), is first bounded by

(36)

where

(a) follows from conditioning reduces entropy,

(b) follows from (9),

(c) follows from that the code word sent at the first moment and the code word sent at the moment are functions of the estimation error (channel noise ), and and in are independent of each other,

(d) follows from (22) that , here O is a function of ,

(e) follows from the fact that ,

(f) follows from that the fact that

(37)

From (36) and the fact that , we conclude that

(38)

Therefore, the average secrecy level of the overall URLLC message can be expressed as

(39)

where is given in (34). Since , the proof of Theorem 2 is completed.

4 Conclusion and future work

In this paper, the URLLC message transmission with co-existence of eMBB codewords is investigated. Specifically, for the AWGN channel with noise-free feedback, we propose a feedback control based coding scheme for the URLLC message, which not only perfectly eliminates the interference caused by the eMBB codeword, but also approaches the maximum rate of the URLLC message when the codeword length tends to infinity. Furthermore, we show that this scheme satisfies the physical layer security requirement by itself. One possible future work is to extend the proposed scheme to fading and MIMO channels. Another interesting problem is to check whether the SK-type scheme is suitable for the covert communication or not, and if so, how to achieve positive rate of covert communication by the SK-type scheme, like [19] does.

Supporting information

References

  1. 1. Ge X. Ultra-reliable low-latency communications in autonomous vehicular networks. IEEE Trans Veh Technol. 2019;68(5):5005–16.
  2. 2. Tang J, Shim B, Quek TQS. Service multiplexing and revenue maximization in sliced C-RAN incorporated with URLLC and multicast eMBB. IEEE J Select Areas Commun. 2019;37(4):881–95.
  3. 3. Anand A, de Veciana G, Shakkottai S. Joint scheduling of URLLC and eMBB traffic in 5G wireless networks. IEEE/ACM Trans Networking. 2020;28(2):477–90.
  4. 4. Kassab R, Simeone O, Popovski P. Coexistence of URLLC and eMBB services in the C-RAN uplink: an information-theoretic study. In: 2018 IEEE Global Communications Conference (GLOBECOM). 2018. p. 1–6. https://doi.org/10.1109/glocom.2018.8647460
  5. 5. Anand A, de Veciana G. Resource allocation and HARQ optimization for URLLC traffic in 5G wireless networks. IEEE J Select Areas Commun. 2018;36(11):2411–21.
  6. 6. Nikbakht H, Ruzomberka E, Wigger M, Shitz SS, Poor HV. Joint Coding of eMBB and URLLC in Vehicle- to-Everything (V2X) communications. In: GLOBECOM 2023 - 2023 IEEE Global Communications Conference. 2023. p. 1–6. https://doi.org/10.1109/globecom54140.2023.10437105
  7. 7. Schalkwijk J, Kailath T. A coding scheme for additive noise channels with feedback–I: No bandwidth constraint. IEEE Trans Inform Theory. 1966;12(2):172–82.
  8. 8. Elia N. When bode meets shannon: control-oriented feedback communication schemes. IEEE Trans Automat Contr. 2004;49(9):1477–88.
  9. 9. Shannon CE. Communication theory of secrecy systems*. Bell System Technical Journal. 1949;28(4):656–715.
  10. 10. Wyner AD. The wire-tap channel. Bell System Technical Journal. 1975;54(8):1355–87.
  11. 11. Gunduz D, Brown DR, Poor HV. Secret communication with feedback. In: 2008 International Symposium on Information Theory and Its Applications. 2008. https://doi.org/10.1109/isita.2008.4895417
  12. 12. Dai B, Li C, Liang Y, Ma Z, Shamai S. Self-secure capacity-achieving feedback schemes of gaussian multiple-access wiretap channels with degraded message sets. IEEE TransInformForensic Secur. 2022;17:1583–96.
  13. 13. Li C, Liang Y, Poor HV, Shamai Shitz S. Secrecy capacity of colored gaussian noise channels with feedback. IEEE Trans Inform Theory. 2019;65(9):5771–82.
  14. 14. Tekin E, Yener A. The Gaussian multiple access wire-tap channel. IEEE Trans Inform Theory. 2008;54(12):5747–55.
  15. 15. Costa M. Writing on dirty paper (Corresp.). IEEE Trans Inform Theory. 1983;29(3):439–41.
  16. 16. Rege KM, Balachandran K, Kang JH, Kemal Karakayali M. Practical dirty paper coding with sum codes. IEEE Trans Commun. 2016;64(2):441–55.
  17. 17. Ben-Yishai A, Shayevitz O. Interactive schemes for the AWGN channel with noisy feedback. IEEE Trans Inform Theory. 2017;63(4):2409–27.
  18. 18. Rosenzweig A. The capacity of Gaussian multi-user channels with state and feedback. IEEE Trans Inform Theory. 2007;53(11):4349–55.
  19. 19. Kang B, Ye N, An J. Achieving positive rate of covert communications covered by randomly activated overt users. IEEE TransInformForensic Secur. 2025;20:2480–95.