worst case encoder-decoder policies for a ...attempting to disrupt this communication. in this...

60
August 1988 UILU-ENG-88-2243 DC-107 COORDINATED SCIENCE LABORATORY Colege of Engineering Decision and Control Laboratory AD-AIcS 24 WORST CASE ENCODER-DECODER POLICIES FOR A COMMUNICATION SYSTEM IN THE PRESENCE OF AN UNKNOWN PROBABILISTIC JAMMER DTIC David Michael Cascio ELECTE AUG2 219881 S D UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Approved for Public Release. Distribution Unlimited. I V88 -. 8 '22 08

Upload: others

Post on 21-Jan-2021

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

August 1988 UILU-ENG-88-2243DC-107

COORDINATED SCIENCE LABORATORYColege of EngineeringDecision and Control Laboratory

AD-AIcS 24

WORST CASEENCODER-DECODERPOLICIES FOR ACOMMUNICATIONSYSTEM INTHE PRESENCEOF AN UNKNOWNPROBABILISTIC JAMMER

DTIC

David Michael Cascio ELECTEAUG2 219881

S D

UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN

Approved for Public Release. Distribution Unlimited. IV88 -. 8 '22 08

Page 2: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

SECURITY CLASSIFICATION OF THIS PAGE RP TDOUE AINPAREPORT DOCUMENTATION PAGE

I&. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 'Unclassified None

F a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION / AVAILABILITY OF REPORT

bApproved for public release;2b. DECLASSIFICATION I DOWNGRADING SCHEDULE dis t ribut ion unlimi ted

4. PERFORMING ORGANIZATION REPORT NUMBER(S) S. MONITORING ORGANIZATION REPORT NUMBER(S) UILU-ENG-88-2243DC-107 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

6a. NAME OF PERFORMING ORGANIZATION 6b. OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATIONCoordinated Science Lab (if applicable)University of Illinois N/A Office of Naval Research

6c. ADDRESS (City, Staie, and ZIP Code) 7b. ADDRESS (City, State, and ZIP Code)

1101 W. Springfield Ave. 800 N. Quincy St.Urbana, IL 61801 Arlington, VA 22217

Sa. NAME OF FUNDING /SPONSORING 8b. OFFICE SYMBOL 9. PROCUREMENT INSTRUMENT IDENTIFICATION NUMBERORGANIZATION Joint Services (ifapplicable) N00014-84-C-0149

Electronics Program I N00014-84-_-0149___

8c. ADDRESS (City, State, and ZIP Code) 10. SOURCE OF FUNDING NUMBERS

800 N. Quincy St. PROGRAM IPROJECT ITASK WORK UNITArlington, VA 22217 ELEMENT NO. NO. NO. ACCESSION N-

11. TITLE (Include Security Clasfication)WORST CASE ENCODER-DECODER POLICIES FOR A COMMUNICATION SYSTEM IN THE PRESENCE OFAN UNKNOWN PROBABILISTIC JAM..ER

12. PERSONAL AUTHOR(S)CASCIOT DAVID MICHAEL TMC D14. DATE OF REPORT (Year, Month, Day) 1. PAGE COUNT

Technical |FROM TO 1988 May , 58 >16. SUPPLEMENTARY NOTATION

17. COSATI CODES 18. SUBJECT TERMS (Continue on reverse if necessary and identify by block number)FED GROUP ISUB-GROUP probabilistic jammer, encoder-decoder,.minimax and

maximin decision problemst

'9. ABSTRACT (Continue on reverse if necessary and identify by block number)

- States of nature or observed data are often stochastically modelled as Gaussianrandom variables. At times it is desirable to transmit this information from a sourceto a destination with minimal distortion. Complicating this objective is the possiblepresence of an adversary attempting to disrupt this communication.

In this report, solutions are provided to a class of minimax and maximin decisionproblems, which involve the transmission of a Gaussian random variable over a communi-cations channel corrupted by both additive Gaussian noise and probabilistic jammingnoise. The jamming noise is termed probabilistic in the sense that with nonzero proba-bility 1-P, the jamming noise is prevented from corrupting the channel. We shall seekto obtain optimal linear encoder-decoder policies which minimize given quadraticdistortion measures. ,%

20. DISTRIBUTION / AVAILABIUTY OF ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATIONMUNCLASSIFIEDUNLIMITED [0 SAME AS RPT. 0 OTIC USERS Unclassified

22a. NAME OF RESPONSIBLE INDIVIDUAL 22b. TELEPHONE Include Area Code) 22c. OFFICE SYMBOL

DD FORM 1473, 4 MAR 83 APR edition may be used until exhausted. SECURITY CLASSIFICATION OF THIS PAGEAll other editions are obsolete. U

,N

Page 3: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

.0

IWORST CASE ENCODER-DECODER POLICIES

FOR A COMMUNICATION SYSTEM IN THE PRESENCEOF AN UNKNOWN PROBABILISTIC JAMMER

BY

DAVID MICHAEL CASCIO

B.S., University of Virginia, 1984

THESIS

Submitted in partial fulfillment of the requirementsfor the degree of Master of Science in Electrical Engineering

in the Graduate College of theUniversity of Illinois at Urbana-Champaign, 1988

Urbana, Illinois

Page 4: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

ACKNOWLEDGMENTS

I would like to express my appreciation to my advisor Professor

Tamer Basar for his guidance in the preparation of this thesis.

S

Accession For

NTIS GRA&I

DTIC TAB 1Unannounced

just if bat be

~ BySDistribution/Ce

-- Avail -and/or

Dist Special

I 0

p ~ ~ - - -5 -

Page 5: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

TABLE OF CONTENTS

Page

CHAPTER I PROBLEM FORMULATIONS ................................ I

1.1 Introduction and Review of Literature ............ 1

1.2 Complete Description of Problems ................. 2

CHAPTER 2 PROBLEM SOLUTIONS FOR THE COMMUNICATION SYSTEM ...... 12

2.1 Problem 1 ......................................... 12 1 e.

2.1.1 Saddle-Point Solution under HardConstraints (P1.1) ...... 0............... 12 6

2.1.2 Partial Saddle-Point Solution underSoft Constraints (P1.2) ................. 23

2.1.3 Partial Saddle-Point Solution under

a Hard Constraint for the Encoder(P1.3) ...... ........................ ... 32

2.1.4 Minimax Solution under a Hard 0

Constraint for the Jammer (P1.4) ........ 34

2.2 Problems 2 and 3 ................................... 3 .. ..... 38

2.2.1 Saddle-Point Solution for MixedEncoder (P2) .... . ...... ...... ...... 38

2.2.2 Minimax Solution for DeterministicEncoder (P3)................... .......... 42

2.2.3 Maximin Solution for DeterministicEncoder (P3)............................. 46,

2.3 Summary and Discussion of Solutions ............. 48

CHAPTER 3 CONCLUSIONS ..... .................. . ............. 50

3.1 Summary of Results ............................... 503.2 Continuation and Extensions ...................... 51

APPENDIX A FORTRAN LISTING OF PROGRAM USED IN NUMERICALSOLUTION OF PROBLEM P.2 ............................. 54

REFERENCES- ........................................................ 55 *- A,

iv

Page 6: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

CHAPTER I

PROBLEM FORMULATIONS

1.1 Intrrduction and Review of Literature

States of nature or observed data are often stochastically modelled

as Gaussian random variables. At times it is desirable to transmit this

information from a source to a destination with minimal distortion.

Complicating this objective is the possible presence of an adversary

attempting to disrupt this communication.

In this thekis, solutions are provided to a class of minimax and

maximin decision problems, which involve the transmission of a Gaussian

random variable over a communications channel corrupted by both additive

Gaussian noise and probabilistic jamming noise. The jamming noise is

termed probabilistic in the sense that with nonzero probability 1-P, the

jamming noise is prevented from corrupting the channel. We shall seek

to obtain optimal linear encoder-decoder policies which -inimize given

quadratic distortion measures.

Both deterministic (pure) and mixed encoder strategies are

investigated. If the encoder mapping is allowed to be a mixed policy,

it is assumed the decoder has access to the particular encoding policy

adopted. This could be via a side channel which informs the decoder of

the outcome of the chance mechanism that determines the encoder policy

adopted. Or, as noted in [1], this can be considered third party

information fed separately to both the encoder and the decoder, which is

a structure often prevalent in antijamming systems.

If the jammer has access to the encoded message (or in one case a . J

Page 7: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

_0

noisy version of it), solutions under four different distortion measures

are considered. When the jammer has access to the source message

itself, the problem is formulated with hard constraints on the channel

input power and jammer power. In this thesis, we allow only

0 < P < 1. For the case of P - 0, i.e., with probability 1, the jammer

is prevented from corrupting the channel, the model reduces to the

simple Gaussian test channel treated in [4] and [5], where complete

solutions are given. The case of P 1 1, i.e., with probability 1, the

jammer is present on the channel, has also been previously examined.

Optimal solutions among all encoder-decoder policies for the P -1 case

are given for problems in [1], [3], and [4]. Optimal linear solutions

are found for an extended model with a vector channel in [2]. Reference

[6] obtains performance bounds of block codes used for the transmission

of a sequence of random variables. The transmission of a scalar

discrete-time Markov process over a channel is studied in [7], and in

[8), the problem of transmission of a stochastic process over a

continuous-time channel is treated.

For the communication problems with a probabilistic jammer "IN

formulated in this thesis, we restrict ourselves to obtaining linear

solutions mainly because of problem tractability, and also to ensuring

that the resulting structures are readily implementable. -i

1.2 Complete Description of Problems

The primary references for these problems are [1], [31 and [4]. We

consider two basic communication structures, depending on whether the !

jammer has access to the source message or the encoded message.

2

% J

Page 8: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

Problem I Jamming Noise Correlated with Encoded Message

Consider the communication system depicted in Fig. I. After

appropriate scaling, if necessary, the source message is considered to

be a zero mean unit variance Gaussian random variable. Let r be the

space of all deterministic linear mappings from KtoT, for the encoder,

D be the space of all deterministic linear mappings from R to R for

the decoder, and F? be the space of random mappings for the jammer. The

output of the channel (input of the decoder) is z where

z (x + w) + V + w(1.)

v w.p. I-P (1.2a)v w.p. P

v - 8(y) (1.2b)

0

Here 8 e is in general a random mapping, and the channel noises w,

and w2 are zero mean independent Gaussian random variables with

covariances I and 2* respectively. Further, w, and w2 are independent

of x, v, and v. From (1.2a) we see the jammer is probabilistic, in that

with probability (w.p.) 1-P the jammer's output does not corrupt the

channel. The jamming noise is otherwise arbitrary in terms of its

statistical description.

Within this framework, four different problems are considered.

3

Page 9: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

,A-

Jammer

+~~

-4-~

elN

Page 10: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

Problem 1.1 Hard Constraints on Encoder and Jammer Power i k5

It is assumed that there exists a channel input Power constraint

E{[y(u)] 2 } 4 c2 (1.3)

and a jammer power constraint V

E([8(y)] } k 2 (1.4)

where E{-} denotes the unconditional expectation operation. Performance

is measured by the quadratic fidelity criterion

A2

Cl: R(y,6,3) E{[u-S(z)12 } (1.5)

We seek a triple (y , , ) Dx ,

satisfying

R(y*, 8 0) 4 R(y*,6* *)4 R(y,6,8*) (1.6)

for all (y,6,S) e Fx D~ x fl

A triple satisfying (1.6) constitutes a saddle-point solution, and (1.6)

is termed the saddle-point inequality. For Problem 1.1, such a triple u u

is obtained and verified. 9u-u.

p..,

The risk functional given by criterion C1 is the mean square error,

5'.

V

Page 11: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

I',

where the error is the difference between the source message and decoded

message. The objective of the encoder-decoder pair is to minimize this _ p

functional, under the hard constraint of (1.3), while the jamming policy " ,

attempts to maximize this functional, under the hard constraint of '.N

(1.4). As noted in [31, it may sometimes be desirable to incorporate

the power levels of the encoder and decoder into the actual risk

functional. When this is done, the power constraints are termed soft.

For the following three problems, further assumptions are made to

the structure given in Fig. 1. Specifically, a 0, 01M 0, and w2 w_

so that the decision variable z becomes

z x +v +w (1.7) --

and .-

V 0 w .•p • I -P

-

B(x) w.p. P (1.8)

Here, the jammer now has access to the exact value of the encoded

message. This leads to the structure depicted in Fig. 2, which is

analyzed under three different soft constraint fidelity criteria given h

below:

Problem 1.2 Soft Constraints on Encoder and Jammer

C2: R(Y,6,8) = E(c y2 (u) + lu-6(z)J2 - k v (.q)0 0

0

6 I.

Page 12: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

0IR

O

Jammer

--V

Encoder Decoder

(- 7- --- -+

0

Fig. 2. Structure for Problems 1.2, 1.3, and t.4

lee%

Page 13: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

Problem 1.3 Soft Constraint on Jammer

C3: R(y,6,8) - E([u-6(z)] - kov2 (1.10) "

and )} < c 2

Problem 1.4 Soft Constraint on Encoder

2 2C4: R(y,6,8) = E{cy(u) + [u-6(z)] (1.11)

and E{v 2 k 2 .

For these problems, co and k are positive scalars.

We find that Problems 1.2 and 1.3 admit saddle-point solutions,

just as Problem 1.1 does. However, Problem 1.4 does not; hence we seek

encoder-decoder policies (y , 6 ) e lx Di satisfying

sup R(y , 6 , 8) = inf su R(y,6,8) (1.12) .

deD£

Such policies constitute minimax decision policies for the encoder-

decoder pair. Further, we denote the policy 8*: which maximizes *

R(y ,6 ,8), if it exists, by 8 , and call the triple (y , 6 , 8 )

minisax solution. For Problem 1.4, a minimax solution is obtained.

We can also seek a jammer policy 8 S satisfying N

inf R(y,6,8 ) = sup inf R(y,6,B) (1.13)

6eD~ SeD

8 e %

....... ~ ..... ]

Page 14: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

Such a policy is called a naximin policy for the jammer.

Correspondingly, we denote a pair (Y,6) e Fx D which minimizes

R(y,S,8 by (y*,s, an call the triple (~, 8)a maxiuin

solution.

Finally, we note that if a pure strategy saddle-point solutionr*-*

exists in F'XD x r , then the encoder-decoder pair (y ,6 ) satisfyingJ -- -* -

(1.6) will be the same pair as (Y , 6 ) in (1.12), i.e.) it also

constitutes a minimax policy. Also, letting v denote the probability

distribution which generates the random mapping 0 in (1.6), then p* is •

said to be the least favorable distribution for the random

variable v. For a more complete treatment of minimax and saddle-point

policies, see [9]. 5

For the following two problems it is assumed that the jammer has

uncorrupted access to the source message.

Problem 2 Jamming Noise Correlated with Source Message,

Mixed Encoder

The communication system considered is depicted in Fig. 3. We now

allow the encoder to adopt mixed policies and introduce a forward side

channel from the encoder to the decoder. This side channel carries

probabilistic information to the decoder, when the encoder policy isS

random. To incorporate the possibility of a random encoder mapping into ..

the problem formulation, we introduce an additional notation and let re

be the space of all random linear encoder policies. Then the problem is

formulated as in PI.1, with I" replaced by e. Hence, we have hard

constraints on both the encoder power and jammer power, and adopt the

mean square error fidelity criterion C1. For this problem, a saddle-

point solution is verified.

9

-Ok~~~ .ft..'.r . I

Page 15: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

JIM.

Jammer

sidenhanne

Fig. 3. Structure for Problems 2 and 3

S- A

-10- "

'7

w .-. .. %

Page 16: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

Problem 3 Jamming Noise Correlated with Source Message,

Deterministic Encoder !

This problem is the same as formulated in Problem 2, but here the

encoder is restricted to be deterministic. For this problem, minimax

and maximin solutions are obtained.

I

0

2

,.

,S?::

Page 17: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

CHAPTER 2

PROBLEM SOLUTIONS FOR THE COMMUNICATION SYSTEM

In this chapter, solutions are presented for the communication

problems introduced in Chapter 1. First, in Section 2.1, the solutions

to problem 1 are presented. In Section 2.1.1, saddle-point solutions

for problem 1.1 are derived. Next, in Section 2.1.2, the case of soft

constraints on both the encoder and the decoder (problem 1.2) is

examined. This problem is partially solved, in that for some regions of

the parameter space, a saddle-point solution is shown to exist. A

partial saddle-point solution is also obtained for problem 1.3, and a

minimax solution is derived for problem 1.4.

In Section 2.2, solutions to problems 2 and 3 are presented. For

these problems, the jammer has access to the source message. A saddle-

point solution is given in Section 2.2.1 for the case in which the

encoder is allowed to be mixed. This is followed by minimax and raximin

solutions for problem 3 where the encoder is restricted to be

deterministic.

Finally, Section 2.3 summarizes and discusses the solutions of the

6 problems which were examined.

2.1 Problem 1

2.1.1 Saddle-Pjint Solution under Hard Constraints (P1.1)

The communication system under consideration is depicted in

Fig. 1. We define the following regions of the parameter space.

12

dr", 1.

Page 18: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

Sr %

R k 2 1 c2 +

R2 2 2 R P 2 [c 2+"ij +>

R3 [ ck 2 " /2C + 2 > 0

R Pk2 - Pk(c2"2( )

[ c+i I2 2 € 0(2.1)

4 c2* +F 1/22(

Theorem 2.1 The communications problem PI. I admits 2 saddle-point

solutions (y ,6 ,S ) and (-y ,-6 ,B ) over Ix Di xlj where

* (u) (arbitrary in R1(2.2)cu R2

-y/P•(y) - -ky/(c 2 l1/2 in R I

(y) R2 R3 (2.3)

2 cl(Pkc 4)y- +2

2 2JR 4P(c-

n is a zero-mean random variable, independent of x,v,v,wlw 2, and

with second moment

2 2 (Pk2+2)2 (c 2+01+a)

Zn } k - [ 2 2 2P (c2+01)

13

- -~~'J .~ ~ ~*~ ~~ ~ Tki i~2frA b

Nv - ft

Page 19: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

in R I (.

(Z) c(l+PX) A *

(c + 1 )(1+2PX+PX ) + PX a+2 A'2

c A *

(z2 + &R 4Z2

and the saddle-point value of R is

1 in R 1

R(y",&*,8") = (AR3c-I) +(AR3)2( 1+ 2+pk2) + R2 11R3

2Pk£ 2 +a] 1/2

22 (2.5)

c 22 2 (11 2+01+2 + :") 2 4

(c2+i)

where

AR3 (a + c)

L [-(A* 2 R~a

R2R 2R3 -13 (C2+a )

The solution is the same even if the encoder is allowed to use mixed

policies on r , provided that a private side channel is available from

the encoder to the decoder.

Proof. We show that the solutions given by Theorem 2.1 satisfy both the

left-hand side (LHS) and right-hand side (RHS) inequalities of (1.6).

Consistent with the problem formulation, let y(u) - eu, 6(z) Az for

some value of e and A. Thus, using the fidelity criterion Cl,

14-1

Page 20: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

R(y,S,$) =E{(u-S(z)) 2

-E{(u-&(v+eu+w 1- w2)) 21 (2.6)

Evaluating, we obtain

R - (Ae-1) 2 + a 2 2~$ + A2 P2 + 2A(Ae-l)t + 2A 2q (2.7)

where

P 2- PEMBy) 2

q PE{w 18(y)} (2.8)

t mPE~uB(y)I.

We first optimize over the decoding coefficient A. Taking the

derivative of R with respect to &,

__ 2TA 2(Ae-1)e + 2A( 1 2 +p )+ 2(ZAe-1)t +4Aq

and setting WRaA 0 yield

e + t

derivteiue miiizn A isg oat r hany eo e I-u rvddtescn

asrivteiue mini/& izinsgeafr tan zenodecu rvddtescn

15

VP ...~ .~ .~ .% .~ ...iV L4V

Page 21: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

Substituting (2.9) into (2.7), we obtain

2+ 12) + 2q-t 2 (

RA (e 2 +p 2 "2 2 +2et+2q)

Further,

a2R 2 22[e 2 ( +"2+p ) + 2et + 2q] (2.11)

With this preliminary work established, we now verify the 2 inequalities

for each of the parameter regions

a) RHS

RI. From (2.3), fix 8(y) - -y/P. Since

2 1 12 1 2 2E{O(y) 2} -(e +a) < -(c + +a) 4 k in RP

8(y) as chosen is an admissible policy. From (2.8), t -e;

thus A 0 from (2.9), verifying (2.4) in Ri, provided a 2 a2 > 0.

We have

and a

q j

so that

a2 1 1 24L2R 2[e - 1) + -1( + 2 > 0

as needed, since 0 < P < 1.

16

Page 22: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

It follows that R admits a global minimum R* 1 achieved

by A '0, y(u)- eu, e being arbitrary but e < c, thus verifying (2.2)

and (2.4) in R1 . In this case, the jammer has sufficient power to do

the best that could possibly be achieved.

R2 (R 3 . From (2.3), fix 8(y) = Xy. Since

E{B(y)2 } fi 2 k (e2 + +Q) 4 k 2 in R 2 R ,(c ++c. ,- ))

8(y) as chosen is an admissible policy.

From (2.8), p 2 . 2 (e2+ l+a), q - PX0 1, and t = PXe.

Thus, (2.11) becomes

~~~2R - 2[e2(I+2PX~ 2 + 0 (I+2PX+FX 2 ) + +PX]2 2 2 + >2

as needed. From (2.9)

* = e(I+PX) (2.12)

(e 2(1+2PX+PX ) + 1(1+2PX+PX 2 + 2 + PX 2a]

and from (2.10)

e (PX -2P 2X) + (1+2PX+PX2 + *2+ PX2RI 2 2 2

S e2(+2PX+PX2) + 0 1 (1+2PX+PX) + 0 2 + PX a,,

We now optimize R*I over the coefficient e. Since

(1+2PX+px 2 ) > 0, (PX2- p X2 > 0, and (1+2PX+Px2 (p2-22 > C, ,

is strictly decreasing in e; thus, RI , is minimized by choosing e s 2as1A

17

p - ~ - - ,-hp * ~ ~,P,

Page 23: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

large as possible, i.e., e = c. This verifies (2.2) and (2.4) in

R 2 R 3 •

R2 fR 4 From (2.3), fix 8(y) -a y+n,

2 2where ap (Pk 2"2)/P(c 2l). Since

2 2

E{8(y) 2 k 2 2 2 (c 2 e ) k inp (c 2 2 n 2 R4 , -

8(y) as chosen is an admissible policy. From (2.8)

2 P(k 2 2(c2 2 = -Papal, and t -Pa e.

Thus, (2.11) becomes

2a2R ,2[e2 (2Pap+Pa2p + l(l- 2Pa) + Pk 2-a2Pc2+ *2 ]

Using (l-2Pa +Pa 2) > 0, then

2R ) 2( l(l-2Pa ) + ( Pa 2-iPap2) + Pk2-a 2P2

22 2 =(l2 7.,

Noting that Pk + *2-Pap (c 2+y ( ( +2)(-a p )

it follows that- > 0 provided a <1. -"

2 [1/2Using the definitions of ap and R4 , we have ap k/Cc + . Xs ap

function of k/Cc2 + 1/2 the boundary equation for R is quadratic andI

18

*'4AI

Page 24: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

A

has roots

r2- 2 1)2 4, 42/ +)2 2

2P

Since the quantity under the radical is positive in R lR4 , and since

2n 41

2 2 2 1/(c" M)/(c 2+ ) < 1, then this implies k/(c 1 ) < 1 in R2 nR 4 .

2 2Thus it follows that a < 1 and 3 R/aA > 0. Continuing, it can be

shown that R * is again decreasing in e2 ; thus, e - * c, and that withA * (2

e c in (2.9) we obtain A c/Cc +0,), verifying (2.2) and (2.4) in

R 2 R4 .

b) LHS

R I. Fix (y,d) as in (2.2) and (2.4). With 6(z) 0, R 1

and hence is independent of a Ell making any 8 e a maximizing

solution, thus verifying (2.3) in R1 .

R nl R . Fix CyS) as Ccu, AR z). Using (2.7), then R is given by* 2 *2

R (A c-I) + A C3(0 + +

c-1) +*2 E(8sy )} + *2 (w(y)

The problem becomes

19

Page 25: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

t- t - R. -

SU (A* C1 [BY}+A*2 E~~)2]3*32 3

+ 2AR*3E{wlS(y)} (2.13)

subject to E{B(y)2 } k

y - cu + w 1 + S

We use a result from [41, (Equation 17, p. 155), which shows us that

this supremum is achieved by the policy

* -kly

l( E [{1r(y)2 , 1/2

where [

, AR3 (AR 3+c)n(y) -, -AR3 + ,-,2

R (C + + a)

provided Z > 0. .

.1l

It can be shown, after some algebra, that

A 2 rAR 2 Pk(c

(1+PX)(c 2 +a) (c2+a) 1 /2 +2 ]

which is positive in R2 n R3. Thus, the policy 8 (y) reduces

to 6 (y) -ky/(c + / _+a) = Xy , verifying (2.3) in R2fn R3.

R2 R 4 Fix (y,S) as (cu, A z). It can be shown that %

20

"d wS

Page 26: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

2 2R 22PC E 22v, u

2 2 ( 1+ 2+1/c + 2 2 C ) (2.14)

where v B(y), y = cu + w + s. Using the fact that *N

[4] shows that the maximizing solution is any probability measure U with

the property

22f 2du(v) k

8 (y) as given by (2.3) in R2()R 4 satisfies this condition.

Saddle-point Value of R '.' -

R . Clearly, with A E 0, R = 1.

R2 R3. Using (2.7) and the definition of Z, R becomes

R*(__*,__ * *3 A3)(I+2p2)+PK(2+]

* *,S ) - (* c-1) + 2 2 + 2 )1/2

R~~~ ' R3 (R 3) ( 1-4.24P 1 2K~ ~a

R2 fnR 4. Using (2.14), we obtain

R (y ,,B ) C (Pk 2 + 2 + * +

21

e. A: '-- r

Page 27: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

=~~i ~ ~ w .

i N .•. i.-i - . .- i .. - -. . . .

Equation (2.5) is verified in each case.

The proof of Theorem 2.1 is thus complete. In passing, we note _4

that when P-1 the solution obtained here is identical to the solution

obtained in [4]. With P-1, the solution is optimal among all encoder-

decoder policies under the additional specification that the random

variable n also is Gaussian. This is true because, as noted in [4], all

random variables are Gaussian, and the optimal estimator E{ulz}, the

conditional mean, is linear in the observation z. With PO, the problem

becomes the Gaussian test channel treated in [5].

We now discuss the problem of the encoder-decoder adopting a mixed

strategy of the form (y,S) = ( cu, Az), where

w.p. r(2.15)

w.p. l-r 0 < r < 1

As noted previously, in this case we assume the decoder has access

through a side channel, as in Fig. 3, (but with the jammer tapping the

channel after encoding), to the chance mechanism whici determines the

particular coding strategy adopted. If this is so, using (2.13) and

(2.15), the problem faced by the jammer becomes

sup [2A(Ac-l) E{ uS(y)} + 2A E(w 3(y)} + A E(W(y) 1]

where y Ccu + w1 + S. However, conditioning on y we find that

2) '.- As

E{uiy} cy/(c 2+1 +a) independent of r .'

22

Page 28: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

tp

and

E{wlly} - Y/(c2+.+a) also independent of r.

Consequently, the jammer faces the same problem as if the encoder-

decoder policies were pure. A mixed policy of this type can not further

help to defeat the jammer.

In summary, we have shown that both (y ,6 ,8 ) and (-y ,-6 ,8 ) are

saddle-point solutions for P1.1.

2.1.2 Partial Saddle-Point Solution under Soft Constraints (P1.2)

The communication system under consideration is depicted in

Fig. 2. We define the following regions of the parameter space.

R1 : c0 k/P 2

R <2 c < ko/P2 (2.16)

A saddle-point solution is presented for region Rl. For region R2 ,

p•-sufficient conditions are obtained for a linear jamming policy to be in

saddle-point equilibrium. Using computer verification, it is found that

these conditions are met for a broad subregion of R2.

Theorem 2.2 The communication problem P1.2 admits a saddle-point

solution (y*,6 a8 in region R over r xD F, wh~ere

01 Y (u) 0

(x) -x/P (2.1 7a)

23

Page 29: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

6* (z) 0,

and the saddle-point value of R is

* 2.17b)

Proof. We use a reasoning similar to that used in the proof of Theorem

2.1. Letting y(u) - eu, 6(z) - Az, along with fidelity criterion C2, we

obtain -4

R(y,6,8) [(Ae-1) 2 + A 2 +2 A 2 + 2A(Ae-l)t] (2.18)

+ [coe - ko/PP2

where

2 A 2p PE{S(x)2}

A PE{uB(x)} (2.19)

Optimizing (2.18) first over A yields !

2 2 (2.20)

as the unique minimizing A for any x - eu, provided a 2R/A2 > 0

Substituting (2.19) into (2.18) yields

2+ -t 2 2 k 2

A (e 2+p+ +2et) 0 P

Further,

-

24

:1

" ' " " " '' ,W'''','" w . ' - ' - - "W' '%'w"W" ' w .- ; ," , -,- " w", - . . .- W".',*" " - • %.. • ,

Page 30: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

a2R 2[e 2 + (O+02 + 2 et] • (2.22)

We now verify the 2 inequalities of (1.6).

a) RHS Fix 8(x) -x/P. Then, from (2.11), t - -e, and p e 2/P.

*2 2From (2.20), A = 0, and from (2.2Z) 3 R/aA > 0.

Using (2.21)

RI 1 + (c0-k0/P2 2

2 00

Since co-k 0/P is positive in RI, RI A is clearly minimized by e* =0.

o *A*

b) LHS With (e ,A ) - (0,0), the problem faced by the jammer is

sup E l-k PS(x)2 1.

Thus, any choice 8 such that E{8(x) 2 0 attains the supremum, and,

with x-e u - 0 almost surely, 8(x) - -x/P is one such policy.

This verifies (2.17a). Clearly, R(y ,6 ,8 ) 1, verifying

(2.17b). This completes the proof of Theorem 2.2.

Region R2 is now considered. We fix the jammer's policy to be

linear in its observation, i.e.,B(x) - Ax. Using the notation developed - L

in the proof of Theorem 2.2, p 2 PX2e 2 and t - PXe, so chat

232R 2[e2(1 + 2PX + PA2 + f] > 0 in R2 2

25

fa*. ~

Page 31: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

Therefore,

TO

2 e(+PX) 2(.3

[e (1+2PX+PX )+

and RI e 2(PA-2PA 2 - + (C -k X 2)e 2(.4

A e 2(1+2PX+PX 2) +00

We now minimize (2.23) over the coefficient e.

A2Let a e

a 1 PX -P x > 0

a 2 =1+2PX+PX 2> 0

and C% c C 'x3 0 0

Rewriting (2.24),

a a1 +R * aa 2 + *+ a3 a

and solving

as 0 yield

( -a)1/2 -/2 a

(3) a/2 a a2

provided a 2 UI> 0, and a3> 0, where the former is always satisfied.

Requiring a to be real and positive leads to constraint Bi:-'4

26

Page 32: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

1/2 0

Bi: ( 2 1 > 0 (2.25)3) 1/2 - >

33If constraint BI is met, ?3 > 0 is satisfied and thus the optimum

encoding coefficient is given by

* a*)12 L a a / 2 - 1/2

(a 3()) 1/2 a

or

*(1+PX) 1/2 (2.26)(1+2P+pX2)/ 2 L(c-k 2)i/2

Equation (2.26) gives the minimizing encoding coefficient since it is

easily shown that a2R1 */a 2 > 0 when B1 is satisfied.A , ,

We now proceed in the other direction. Fixing 6(y) e u, S(z) = A z.

and using 2.18, the risk is given by

** 2 *2 '

R (Ae-) + A * +

ell,

P[2A (A e-1) E{uB(x)} + A *2E(8(x)}] + c e 2 k E(8(x) 1.

The problem faced by the jammer becomes

40

27

w-w- v-Vi- ? w' ~ - _ -

Page 33: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

sup [(A 2 k /P) E(8(x) 2 + 2A*(A e -)E(u(x)}]

8 0

If e *0, the supremum is achieved by

O(x) = - A (A e -1) x (2.27)

e *(A*2 -k /P)0

provided the constraint B2 below is satisfied

B2: A*2_ k /P < 0 (2.28)o

Hence, in R2 , we have a saddle point if:

i) - A*(Ae-1) =)X , (2.29)

e (A*2-k /P)0

where A and e*are given by (2.23) and (2.26)

and

ii) constraints BI and B2 are satisfied.

Equation (2.29) is a 4th order polynomial in X. It can be rewritten as

x4 [k° (-P) 2 + k2 +

3X [2k (k /P + c )I +

o 0 -

Page 34: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

O

2 [-co(-P)2+ 2co k (l+l/P) + *Co2 + Oko21p] +

0 0030

2

X[ 24co(c +k /P)] + C 2 0 (2.30)

A closed-form solution of (2.30) has not been found. However, as

given in Tables 1-5, (2.30) has been investigated numerically for a rich

class of parameters and has been found to possess real solutions

satisfying constraints BI and B2, in most instances. Appendix A lists a

FORTRAN program which was used to solve for the real roots of (2.30).

From the tables note that e and A are decreasing in P,

whereas IX*I is increasing in P. We see that the actual power expended

by the jammer, E{8(x) 2 } 2 -([Xeu] 2}, increases as P increases, since as

P increases, the jammer is more likely to be on the channel. In the

extreme case where P-I, the problem reduces to that treated in [3], and

(2.30) can be shown to be satisfied by X - - co/k . Further, from Table

5, as the variance of the channel noise 0 becomes dominant, a constraint

(BI) becomes violated, as expected, because this noise now dominates the

channel.

We have thus shown that for region R2 of problem P1.2, the optimum

jamming policy in most instances is a linear policy.

29

Page 35: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

Numerical Solution for Problem 1.2 in Region R2

Table 1. Soft Constraint Parameters: c = 1.0, k 1.0Channel Noise Variance: *o 0.5

P e R R

0.1 0.454 0.642 -0.049 0.9157

0.2 0.452 0.636 -0.095 0.9202_ :

0.3 0.447 0.626 -0.140 0.9275

0.4 0.438 0.609 -0.184 0.9375

0.5 0.424 0.583 -0.230 0.9501

0.6 0.398 0.541 -0.280 0.9651

0.7 0.349 0.464 -0.337 0.9819

0.8 0.215 0.277 -0.407 0.9972

0.9 BI < 0, constraint violation2

1.0 co< ko/P2, not region R 2

Table 2. Soft Constraint Parameters: c 1.0, k 1.0

Channel Noise Variance: o 0.5 o "

* * * R* '.

P e A XR

0.1 0.454 0.642 -0.046 0.9156

0.2 0.452 0.636 -0.087 0.9197

0.3 0.448 0.628 -0.129 0.9264 "

0.4 0.440 0.613 -0.171 0.9357 eo,

0.5 0.428 0.589 -0.214 0.9475

0.6 0.406 0.552 -0.261 0.9617

0.7 0.366 0.488 -0.315 0.9780

0.8 0.267 0.346 -0.381 0.9942 *

0.9 BI < 0, constraint violation

1.0 BI < 0, constraint violation .

30030- •

'p

Page 36: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

Table 3. Soft Constraint Parameters: c 0 1.0, k - 1.5SChannel Noise Variance: =0.5 o 0

Pe

0.1 0.455 0.642 -0.033 0.9152

0.2 0.453 0.639 -0.066 0.9183

0.3 0.450 0.632 -0.099 0.9243

0.4 0.445 0.621 -0.132 0.9306

0.5 0.437 0.605 -0.167 0.9399

0.6 0.425 0.581 -0.206 0.9515

0.7 0.403 0.543 -0.249 0.9653

0.8 0.361 0.474 -0.303 0.9813

0.9 0.242 0.303 -0.379 0.9969

1.0 B1 < 0, constraint violation

Table 4. Soft Constraint Parameters: c 1.0, k 0.25Channel Noise Variance: *o= 0.5 0

P * A* x* R*

e R

0.1 0.452 0.637 -0.163 0.9196

0.2 0.440 0.616 -0.265 0.9323

0.3 0.417 0.581 -0.339 0.9489

0.4 0.377 0.523 -0.402 0.9675

> 0.5 c 0 < k /P, not region R2

Table 5. Soft Constraint Parameters: c - 1.0, k 1.0Channel Noise Variance: 0'- 1.5 0

P eA

0.1-0.9 Bi < 0, constraint violation2

1.0 ( <k 0/P ,not regionR 2

31

Page 37: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

2.1.3 Partial Saddle-Point Solution under a Hard Constraint

for the Encoder (P1.3)

Again we consider the system depicted in Fig. 2. For this problem,

fidelity criterion C3 is used. A saddle-point solution is obtained for

the following region of the parameter space.

2 2RI: k > P(c/c +0) (2.31)

0

Theorem 2.3 The communications problem PI.3 admits a saddle-point

solution (y , ,8 ) in region R over Ix D x where I

y (u) cu (2.32)

6 (z) -2 ) A(X)z (2.33)

c 2(1+2PX + PX *) + NO

8 (x) = X x (2.34)

9-

X arg max [(A(X)c-l) 2+A(X) 2 (+PX 2 c2 )+2PA(X)Xc(A(X)c-1)] (2.35)X - 2c

-k0X

Proof.

a) RHS

From (2.34), fix 8(x) X x. Using fidelity criterion C3, the

problem faced by the encoder-decoder is

inf Ef(6(z)-u)2 -k X*2 y(u) 2 (2.36)

32

Page 38: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

Y'6m

Recall from Theorem 2.1, the problem

inf E{((z)-u)2 } subject to E{y(u) 2 } ( c

was shown to have a minimizing solution given by y(u) = cu. Since

k 0'2 E{y(u) 2 is maximized by y(u) - cu, the infimization of (2.36) is

also solved by y (u) - cu, verifying (2.32). Straightforwardly, it is

easy to show the optimum decoding policy is given by

6 (z) "2 * *2 A(X*)z (2.37)c (1+2PX +P, )+X

verifying (2.33)

b) LHS

Fix y(u) cu, 6(z) = A(X)z. The problem now faced by the jammer

is exactly the same as that treated in Section 2.1.2, i.e.,

sup ((A(A)2-k /P) E{S(x) 2 + 2A(A)(A(A)c-1)E{u8(x)I]B

The supremum is achieved by

* )(A(X )c-1) ,0(x) x2 X (.8

c(W(X ) -k /P)

33 J

Page 39: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

provided

A(X*) 2 -ko/P < 0 (2.39)

Usingw(2.35),ta it is easy to show that X e(-I/P,O). From (2.37), it '

0 < AMX < c/(c 2+ for X e(-I/P,0) •0

Consequently, A(X*) -ko0/P < 0 is satisfied whenever ko0/P > c2/(c2+)'

which is precisely region R I . The proof is now complete.

2.1.4 Minimax Solution under a Hard Constraint for the Jammer (P1.4)

We again consider the system depicted in Fig. 2. For this problem,•

fidelity criterion C4 is used. A minimax solution is obtained for the r,

following regions of the parameter space.

R : (e*2 >

VR : e 0 (2.40

2

where ,)

e )arg min f(c) (2.41)

c c [(~c~-I)+ c) +pk)-2KPcA(c)(A(c)-I/c) 2oPk 2

f(c) 2 2 2

c c + c 2<Pk 2

0

(2.42) -

344

2.1. Miima Soutio uner Had Costrintforthe ammr (174

VX6' C'z

Page 40: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

"0

and ~."W%

W

- 2 cc) (2.43)[c 2-2kPc +Pk 2 +]

We first will show that problem P1.4 with an enlarged information

structure admits a saddle-point solution. Then we will show this

saddle-point solution corresponds to the minimax solution of our

original problem.

Consider first the problem

min Ef((z)-u) 2 E(y(u) 2 1 c 2 E(v 2 < k2

Y'6

which is a simplified version of problem P1.1 obtained by

setting a - - 0 and 02 - 0 in Fig. 1. Suppose the jammer has S

2 A 2 -- 4knowledge of Ax 2 E(x } and uses the strategy 8(x) -kx/lxl. It

2 2.follows that E{v 2 k Further, the minimum value of this problem

using this policy, denoted by R*(c), is a decreasing function of c, and

2. 2 .is achieved by E(y(u) - c • Using Theorem 2.1, we can rewrite (2.42)

as 1 J

2 2 B 2

c c + R (c) c ; Pkf(c) {co (2.44)2 2 2

00

where R* (c) < I for c2 > Pk2 . For our problem, we use fidelity .P'g

criterion C4, and the problem becomes %

*,4, .%7

35 "..w 4

4e - . . . .' ,, . . .. . . . . . . .. . .. ... . . .. . . .-

Page 41: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

min min E{c Y(u) 2 + (6(z)-u) 2 (2.45)C>O Y,6 0

.A2

2 2 A

E{y(u) = c

E{v 2 k k

or equivalently

2min [cc + R (c)I (2.46)c>O 0

It follows that, if e given by (2.41) satisfies M

e A P 2 ,0

which is precisely region RI, the optimum encoding-decoding policies are

given by y(u) = e u, S(z) - A(e )z. Using these policies, it is clear

that the optimum strategy for the jammer is to use maximum power,

i.e., s (x) = -kx/Oxg.* p2 *

From (2.41), it follows that either e > Pk or e = 0. We now

co.-,:ider the case e 0. For this encoding policy, it follows that the

optimum decoding policy is 6 (z) = 0. Hence, the cost becomes N

independent of the jammer's policy making any policy C c a maximizing

policy. If the jammer's policy is fixed as B(x) = -x/P, the problem , :.

faced by the encoder-decoder reduces to .o

min E(c y 2(u) + }1

Y,6 0 * * .11iwhich is clearly minimized by (y S ) = (0,0).

What we have shown above is that a saddle-point solution exists to

36

Page 42: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

the problem with enlarged information structure in two regions of the

parameter space. Equivalently, a saddle-point exists if the jammer is S

assumed to tap the source message directly.

Theorem 2.4 The communication problem P1.4 admits a minimax

solution (y ,6 , ) over x x

(u) e u (2.47)

*(z) = in R1 (2.48)

0 R2S

* -(ko/e )x in R18 (x) (2.49)

-X/P R2

with e* given by (2.41), and A(e*) by (2.43).

Proof.

We need to show that the minimax solution to problem P1.4

corresponds to the saddle-point solution to the problem with enlarged

information structure discussed above. For 6 fixed, let $ be an

72

arbitrary element of satisfying E(5Cx)2 -

k2 Let C r, where B B(x,6)

2 2satisfies Ef$(x,6) } k. Then .. ..,

min [max R(y,5,W)] = win [max R(y,6,8)] (2.50)Y,6 8Y'6 6 B*, .. ,, -

37

V V % %

Page 43: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

because for fixed y,S, the inner maximization problems are the same.

The LHS of (2.50) corresponds to the problem with enlarged information,

whereas the RHS is the problem P1.4. Equations (2.47)-(2.49) thus

follow, where IlxI - e is used in (2.49). The proof is now complete.

2.2 Problems 2 and 3

2.2.1 Saddle-Point Solution for Mixed Encoder (P2)

The communication system under consideration is depicted in Fig. 3.

Theorem 2.5 The communications problem P2 admits a unique saddle-pointsolution (y ,6 ,8 ) over r x D x where

2 2• cu, cz/(c +Pk w.p. 0.5

(y* ,5 ) = (2.51) .{.cu, -cz/(c 2 +pk2 + b) w.p. 0.5 .

* (u) = n, E(n} = 0, E{n = k (2.52)

independent of u, v, and w

and the saddle-point value of R is

R (y ,6 ,8 ) = (Pk + *)I(c +Pk +6) • (2.53)

Proof. Since ye , the encoder policy can be expressed

as y(u) ;cu for some random variable , assumed to be independent of

38

y,%

" . . . ' '" 1" " , ," ' ,V . .. . . ,e ,', - ,, - - " . . . " .- .- .- o . v" ,, . .,%,., ." ., . ." , p.

Page 44: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

u, w, and v. Thus E{ 2 ( I is necessary to satisfy the channel input

power constraint. Using criterion Cl, the risk becomes

R - E{A C-l)EA c-1uO() + PA2E{8(u) 2 (2.54)

where the decoding coefficient A is a deterministic scalar dependent on

the distribution of the random variable . We now verify that the

solution given by Theorem 2.5 satisfies the LHS and RHS inequalities of

a saddle point.

a) RHS

Fix B(y) = n as given by (2.52). Then (2.54) becomes

R A 2 + E {A cc-1)2 } + PA2k2 (2.55)

2 2 2 2Conditioning on C, (2.55) reduces to A + (A ;c-l) + PA k

Setting aR/M, M 0 yields

N

A c (2.56)

Equation (2.56) gives the unique optimum linear decoding coefficient,

2 2since D R/aA > 0. Substituting (2.56) into (2.55), we lower bound R by

UA..

(A€ 2 Z2}R E (A* + (A*C -l) + P(A*)

39

fs..',

Page 45: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

Since 6(z) = A z is an admissible decoding policy (because of the

presence of the side channel) equality holds in the above and the

problem becomes

inf E 2(Pk 2+ ~2 (.7X(2) (€2c + ,2 + El 2 subject to E{ 2 (2.57)_

where X e - set of all probability measures on x D Recall

that D, = the space of all linear deterministic mappings from p to

Any X d-thus induces a pair (y, 6 X) E Fe x DZ.

The infimization of (2.57) depends only on the second moment

of , and thus can be achieved by any X such that E{f 2 1 1. Clearly,

. I ~w.p. 0.5 .-'

:1:1 0.5(2.58)

-1 w.p. 0.5

is an optimal measure. Using (2.56) and (2.58) we obtain (2.51) as the

optimal encoding-decoding strategy.

b) LHS2+2 *

I. First, fix (y, 6 ) - (cu,cz/(c2 +Pk )) (cu,A z) • Then, the risk

associated with this pair is given by

(1) * 2 :07~R E{(A z-u) 2}*• 2* 2} *

= (A*c-1) 2 + (A*) 2 + P(A ) 2E{(u) 2 + 2PA (A c-I) EtuS(u)}

2. Now fix (y,S) (-cu,-A z)

Then, %IM

R = E{(-A z-u)2 } K

40

Page 46: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

(2) * 2 *2 *2 2 2P*(Ac * ~ B~)R (A c-I) + (A)2 + P(A ) E{B(u2)) - 2PA (A c-I) E~u8(u)}

Clearly then, the value under the mixed policy given by (2.51) is

R - 0.5 R1 + 0.5 R2

* 2 * 2 * 2 2}- (A c-I) + (A 2) + P(A ) E(O(u) 2

IIThis is independent of the correlation E{u6(u)}, and is maximized by the

choice of a random variable n - 8(u) such that E(u)2 2 k 2, verifying

(2.52). Further, from (2.57), the saddle-point value of R is given by

(2.53). This completes the proof of Theorem 2.5.

Corollary. The encoder-decoder policy given by (2.51) is the unique

optimal solution over Fe' x D, where the space e' is induced by

X L, where L the set of all probability measures on Fx DZ such

that ].cJ ( c w.p. 1. Further, in this case, 8 * e has the property

that E{uB(u)) - 0.

Proof. Under the restriction that Iw'.p. 1, the entire class of

optimum policies for the encoder-decoder is given by

cu, cz/(c 2+Pk2+ ) w.p. r, 2- (2.59)-cu, -cz /(c+Pk2) w.p. -r

Using this mixed policy,

41K

IX

__

Page 47: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

* 2 2 2 2R (A c-) + (A ) + P(A ) Ef8(u) I + (2r-1) PA (A c-l)Efua()}

Since A c-I < 0, the jammer could use 8(u) - -sgn(2r-1)ku, so

2 2that E{8(u)2 } = k , but results in R > R . Clearly (2.59) is optimal

only if r = 0.5.

Now, suppose E{u$(u)} * 0. Then the encoder-decoder pair can be

chosen as in (2.59) with r=O if E{u$(u)} > O,and r 1 if E{uB(u)} < 0,

leading to R < R*. Thus, a B er with E{uB(u)} * 0 cannot be optimal

for the jammer.

2.2.2 Minimax Solution for Deterministic Encoder (P3)

Consider first the structure depicted in Fig. 2, where the jammer

has access to the encoded message. The structure of Fig. 2 can be

obtained, by setting a = 0 and 2 in Fig. 1. Clearly then,

21

inf sup R(y,6,8(x)) 4 inf sup(y,S,8(u)) (2.60)(,,6). [-x D z Oe ( (YS). F. D z B :

since x - y(u). Recalling P1.1 admits a saddle-point solution, denote

the LHS of (2.60) by R , where the tilde signifies the simplified

version of P1.1. The RHS of (2.60) is the minimax problem of P3.

Equation (2.60) says that the minimax value for P3 is bounded from below

by R , i.e.,

R R (2.61) ..

42

-Z Z' Y

Page 48: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

Theorem 2.6 The communications problem P3 admits two minimax-* -* -* -* -* "-* xD wer /e

solutio,, 'y ,6 ,8 ) and (-y ,-6 ,-£ ) over x j whare

', C) arbitrary in (262

y (u) =(2.62)

cuR

0 in R1(Z) c-kP 2 (2.63)

( c -2kPc+Pk 2 +,3z R2 R3

(l/c)z R2 n R4

B(U) 8 ei arbitrary inR18(u) -ku 2 2 R2 R4 (2.64)

S(u) s.t. E{8(u) I k R3 nR 4

and

2 in RIR (y 6 8 ) = (AR c-1) + AR3 3 _, R_2 (),R3

(Pk 2+) R2 R4

2(2.65)

The regions of the parameter space are given by Z 'f

R : k/c I 1/P

R:k/c < 1/PW

43

'4*? N

Page 49: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

R Pk 2 -kPc + > 0 (2.66)2

R : Pk2 -kPc + 0

Proof. This proof follows closely the proof of Theorem 3 in (I].

First, note that the above regions correspond precisely to the regions

given in Theorem 2.1 with the simplifications a = = 0, and. 2 .2

The parameter X of Theorem (2.1) simplifies to X - -k/c. Next, the

minimax value R for problem 3 satisfies

R 4 sup R(y,6,0(u)) for all y e , D

We will verify that with (y,6) fixed as in (2.62) and (2.63), the

following equation holds.

sup R(y , 6 , 8(u)) - R(y , 6, 8 (u)) R (2.67)Be r~j

Along with (2.61), this shows that R - R . That is, the minimax

value of problem P3 is identical to the saddle-point value of the

simplified version of P1.1. Hence, (y , 6 , 8 ) constitutes a minimax

solution for P3. " -

The proof proceeds by verifying (2.67) in the different regions.

RI. Since 6 (z) = 0, from (2.63), using criterion CI we obtain

R(y,6 ,8) - E{(u-0)) - 1

44

Page 50: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

.1 - -- - AM .- W

for all Berj Clearly then (2.67) holds in R1 .

R2(R,. With (yS)given by (2.62) and (2.63), we obtain

R(Y ~ ~ 2 R 3 2-) A + 2P&R (&R 3c-i) E{uB(u)} (2.68)

+~ P( )8 (2 c-i)u 2A)c

3R 3

The above is maximized uniquely by 8 (u) - -ku, since the coefficient

A * (A*c-i) is negative in R2 (IR. Substituting into (2.68) yieldsR 3R 32 3

(A* c-i)2 + (* )2~) -OP * (*c-iR~ d 8~ R (R R (~AR c1

3 3 3 3

Using Theorem 2.1 with *i a -0, it is easy to show that

R(Y ,S ,B8) R

Thus, (2.67) is verified in R2 fR 3.

R 2 nR 4 With (y*,6 ) given by (2.62) and (2.63), we obtain

1 2R(y ,S ,) -E((u- - (cu+v+w))

0+-p2E((u)) 2

c2 2

This is maximized by any random variable B(u) with second moment equal

45 r

Page 51: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

Ak

2- - - -2 - 2 + 2 . .to k 2 . Thus R(y , , ) = /C Again using Theorem 2.1, we see -

.. .- -* ..- -* .. * AR(y , ,8 ) -. X o that (2.67) is verified in R2 R4

From all of the above, it is clear that (-Y ,-6 ,-8 ) also

constitutes another minimax solution for problem 3. The proof is now

complete.

2.2.3 Maximin Solution for Deterministic Encoder (P3)

Theorem 2.7 The communications problem P3 admits 2 maximin solutions

(y ,6 ,8 ) and (-Y ,-6 ,8 ) over x D£ x |j where

*%

y (u) cu (2.69)

(z) = cz/(c +Pk ) (2.70)

k 2 2

(u) - n E(n2 } k , E(un} - 0 (2.71)

R (Y_,6*,-- ) , (Pk 2 +/(c 2 +Pk 2 +0) (2.72)

Proof. This proof follows closely to that of Theorem 5 in [1].

Let y(u) - eu and S(z) - Az.

Thus, using criterion C1, we obtain

#

R(y,6,0) - E{(u-A(eu+v+w)2 )} (2.73)2 2 2 2 .~ ..

- (Ae-l) + A 2 + 2PA(Ae-l)t + A 2 -",

.. , '

46

I-

Page 52: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

I.

where p2 - PE{B(u) 2 (2.74)t - PE{u8(u)}

S

Setting aR/3A 0 yields

* (e.)A 2e 2 (2.75)

(e 2+p +0+ 2et)

as the unique minimizing A for any encoder x = eu since

a2R/aA 2 2e2 + 20+ 22 + 4et > 0

Substituting (2.75) into (2.73) yields... a

RI 2+4-t2 (2.76)A* e 2+p 2+ +2et ID

2S

Now, optimizing with respect to the encoding coefficient, we see that e2

should be chosen as large as possible. The term et should also be

chosen. to be as large as possible. This leads to the optimum encoding. V

coefficient e where I',

e " -c t < 0 (2.77)c,-c t = 0 . .

Substituting (2.77) into (2.76), we obtain

47. W4 7 , W-

r~ ~ j ~f~L ~ ~ ~ k.~V . *~ * .- .-.

Page 53: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

P2+ - t 2

2 20c + +-2ct 7

RA*,e* p t0 2

2We observe that (2.78) is an increasing function of p and thus is

maximized over p 2 subject to p 2 < Pk2 by p 2 Pk 2 . Now maximizing over

2 2t, after substituting p Pk , we obtainII

RA e k= 2 +-ct)(tc) (2.79)

at -(Pk2+O+ct)(t+c) t > 0 (7

(c2 +Pk 2 ++2ct),.

Equation (2.79) is continuous in t, decreasing for t > 0, increasing for

t < 0. Thus, (2.78) has a unique maximum at t - 0. Substituting t = 0

into (2.75) and (2.77) yields the encoding-decoding e

pairs (_ , ) and (-y ,-S ) ,verifying (2.69) and (2.70). Further, Iusing these encoding-decoding policies, it follows that the optimum ZY.

jamming policy is any second-order and random variable n such

2 2 2that t - PEtun} = 0 and p PE{n I pk2 . This verifies (2.71).

ISubstituting t = 0 into (2.78) verifies (2.72). This completes the i.

proof of Theorem 2.7. Note that this maximin value is the same as the

saddle-point value obtained in Theorem 2.5.

2.3 Summary and Discussion of Solutions '4

In the previous two sections, 6 different communications problems .%. ,"

Id.

48

., .

Page 54: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

A

were examined. In some cases saddle-pol-t solutions were derived,

whereas in other cases, minimax or maximin solutions were obtained. We

have seen that the solutions often differed for different regions of the

parameter space. In most instances, the optimum jamming policy w-L

found to be a linear transformation of the observed variable, plus, in

some cases, an additional independent noise variable. The optimum

encoding and decoding coefficients were shown to be highly dependent on

the regions of the parameter space.

%

0

49

Sflr..~ dt.~ . X .' 4 P . . A J a .P.4 ,-..* .~ - * 7

Page 55: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

CHAPTER 3

CONCLUSIONS

3.1 Summary of Results 'U.."

The principal objective of this thesis has been to obtain saddle-

point or worst-case solutions for a class of communication problems 2'

involving an unknown probabilistic jammer. Although the basic

communication structures have been examined previously, this treatment

is the first considering a probabilistic jammer. Specifically, the

problems involved the transmission of a Gaussian random variable over an

additive white Gaussian channel subject to unknown probabilistic jamming

noise generated by an intelligent jammer. The jammer was intelligent e

because he had access to the encoded message (or a noisy version

thereof) or the actual source message. Equivalently, the problems can

also be viewed as the . transmission of a sequence of independent,

identically distributed Gaussian random variables over a discrete-time

additive white Gaussian channel. A variety of quadratic distortion

criteria were used to measure performance.

In Chapter 1, we first introduced the problems and provided some .; .

brief motivation. This was followed by a quick review of the recent h.

literature. Next, a complete description of the 6 communications

problems was given. Chapter 2 presented the results via the theorem- .. -

proof type approach. Either saddle-point, minimax, or maximin solutions "i '

were obtained for each of the problems; however, for 2 problems (P1.2 '

and P1.3) only partial solutions were found, meaning that solutions for

all regions of the parameter space could not be obtained. In the case '- ,.

50

U..

.. ~ UU ~ ~ *,...-/U. .'V ~ ~ %*'U * UU .~w. ~ ''~-f-...U'~~. U-U- U-. 'vU U'.'i" U' -aU.. U'..p.. *~~.**U*-UU* UU.vUU ,*

Page 56: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

of saddle-point solutions, the main technique was to show that the

policies satisfy the LHS and RHS inequalities of a saddle-point.

Various other techniques were used in the derivation of other

solutions. For example, in Section 2.1.4 a problem with enlarged

information structure was first considered; then, it was shown that the

solution to problem P1.4 was equivalent to the solution obtained with

the enlarged information structure.

3.2 Continuation and Extensions

As mentioned in Chapter 1, we have restricted ourselves to

obtaining optimal linear encoding-decoding policies due to problem

tractability. In previous work, where with P = I the jammer is always

present, the optimal decoding policy when criteria C1 is used is the

conditional mean estimate. It turns out that this conditional mean

estimate is linear in the observation variable. However, for the case

of the probabilistic jammer treated here, the conditional mean estimate

is highly nonlinear involving integral expressions. This motivated the

restriction to obtaining optimal linear policies. A possible extension

would be to consider general probability distributions on the jammer's

output as opposed to a two-point measure (present w.p. P, not present

w.p. l-P) which might result in a more implementable form for the

conditional mean estimator.

This restriction to obtaining optimal linear policies was also made ',, m. .

in [2] where an extened model with a vector communication channel is .'

considered. As mentioned in [21, even when no jammer is present, the %.. %,.,

optimal solution is nonlinear. It seems feasible, however, that optimal

51

N-.

Page 57: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

linear policies for the case of probabilistic jammer could be obtained "m

for that vector case also.S

An interesting extension to the problems considered here would be

to investigate the structure depicted in Fig. 4. This structure is

similar to that in [7]. The source is considered to be a discrete-time

Markov process {mt) described by

mrt+ I Aitm t + B t t t=0,1,... N

KI

The sequence {t is an appropriately dimensioned white noise process,

At and Bt are matrices, and mo is Gaussian with zero mean and variance0

q. The times denoted by {t. j=l,...,n} are subtime indices between t .Jqand t+1, and refer to the fact that the channel can be used n times

between successive input variables m. and mr+I. Also notice in Fig. 4

the presence of a noiseless feedback link between the input of the

decoder and encoder. This enables the encoder to monitor the input to

the decoder, hence leads to the encoder possibly solving a detection

problem (in the case of a probabilistic jammer) to decide if on its

previous transmission the jammer were present.

In [7], the jamming noise {v tj was considered to be correlated 0

with the encoded signal {x }, or taken to be independent of {x } andti ti *

all other random processes. It was shown that saddle-point solutions

exist for both problems. Possible further work could be done in ,

examining the structure of Fig. 4 and obtaining minimax and maximin .*

solutions under various performance criteria. ":

52

Page 58: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

Jammer

feedback

S.. Fig. 4 Structure for Extended Model .

-- 5-

Page 59: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

APPENDIX A PFORTRAN LISTING OF PROGRAM USED IN

ISNUMERICAL SOLUTION OF PROBLEM P1.2

PROGRAMI ROOTS ( ROUT, O u' F'U I'--ROUJT)c:

REAL A(5) ,91,D2,KOCO,PHE,L,E.D,RCOMPLEX Z(4)INTEGER ZER

NOL (G-4

PRINT-, CO, KO,. PHL, C0/K0)DO 1.0 P- i, .i 0i ..

AC4 )24PH-EOC04*(CO4KO/P)A (5 - F*HE*CO4*-w2

CAL. -ZPOLhk (A, NLDI:G , -, I k"R)

CPRTNT-, PF-,RINTx. I-HE 4 REUOTS AkE,

FRiNr*, zFR]:rwcoNsr3RA.TNr,;

IF CC, .LT. IOV*~' E

*-RcTNT ,(.0

DO 20 -4S

IF C-(*~ .GF. Q' TH-ENl~i=PHE*.~*(i+*L)(C0KO*L)*~~ -Fl-E

IF (81 .GE. 0) THENF*RINT*, 'rEJ >- 0, CONSTRAINT O.K.'

t (E4' .Lf*. 0) VI'BEN~-RI-J*. t2< 0, coN!3Trk~Nr i

7 wPRINT.. 'ENCODING.. DECODING, L-AMDA. P, X

k E * *2 F,L**2. ( 1. -4 F: !lEV '-- 2.. 2 ft .- *2 F,4* 1- *B E)( (C0- K 0 lou*4021) 4C. K*.

i-RINT*.E.DL,R I

ELSE

L N T .F.Nt F ~ N A )? C

PR I NTw, -. E, 0, tONS TRA I (jT i c-rir J-N'

PRINTo,

PRINT.. tCO-K~002 NE(.A-JVh. (ONUTRAINT VIC)LArION,PR.INTao,

-10 CON T INLJC -.

i.LS I<F-RINTr- 'C,) NtUT* < )/ NUTY ..'rz:L .LON R;-'

-%

-54-

I

Page 60: WORST CASE ENCODER-DECODER POLICIES FOR A ...attempting to disrupt this communication. In this thekis, solutions are provided to a class of minimax and maximin decision problems, which

REFERENCES

[1] T. Basar and Y. W. Wu, "A complete characterization of minimax andmaxmin encoder-decoder policies for communication channels withincomplete statistical description," IEEE Trans. Info-m Theory,vol. IT-31, no. 4, July 1985.

(21 T. Basar and Y. W. Wu, "Solutions to a class of minimax decisionproblems arising in communication systems," Journal of OptimizationTheory and Applications , vol. 51, no. 3, Dec. 1986.

(3] R. Bansal and T. Basar, "Communication Games with Partially SoftPower Constraints," IEEE Symposium on Inform. Theory, Ann Arbor,MI, Oct. 1986.

[4] T. Basar, "The gaussian test channel with an intelligent jammer,"IEEE Trans. Inform. Theory vol. IT-29, no. 1, pp. 152-157, 1983.

[5] R. G. Gallager, Information Theory and Reliable Communication! NewYork: John Wiley, 1968, pp. 475-482. 0

[6] B. Hughes and P. Narayan, "Gaussian arbitrarily varying channels,"IEEE Trans. Inform. Theory. vol. IT-33, no. 2, pp. 267-284, March1987.

(7) T. Basar and T. U. Basar, "A bandwidth expanding scheme for fcommunication channels with noiseless feedback in the presence ofunknown jamming noise," Journal of the Franklin Institute, Feb.,1984.

[8] T. Basar and T. U. Basar, "Optimum coding and decoding schemes for

the transmission of a stochastic process over a continuous-timestochastic channel with partially unknown statistics," Stochastics,vol. 8, pp. 213-237, 1982.

[9] T. Basar and G. J. Olsder, Dynamic Noncooperative Game Theory.London/New York: Academic Press, 1982.

5

555