Skip to main content
PLOS One logoLink to PLOS One
. 2024 Mar 18;19(3):e0295369. doi: 10.1371/journal.pone.0295369

Linear feedback coding scheme for multiple-access fading channels with degraded message sets

Yuan Liao 1,#, Xiaofang Wang 1,*,#
Editor: Praveen Kumar Donta2
PMCID: PMC10947716  PMID: 38498407

Abstract

Channel coding technology plays an important role in wireless communication systems, and it serves as a crucial mechanism to reduce interference during the transmission process. As the fifth-generation (5G) and sixth-generation (6G) wireless communication systems rapidly advance, requirements of the users on the quality and security of wireless service are increasing. To solve these problems, it calls for us to explore the new channel coding technologies. In this paper, a linear feedback coding scheme for fading multiple-access channels with degraded message sets (FMAC-DMS) is proposed. In this scheme, the transmitting beamforming and channel splitting are used to transform the channel with complex signals into scalar equivalent sub-channels. Then, the extended Schalkwijk-Kailath coding scheme (SK) is further applied to each sub-channel. The channel capacity, finite blocklength (FBL) sum-rate and FBL secrecy achievable sum-rate of the FMAC-DMS in single-input single-output (SISO) and multi-input single-output (MISO) cases are derived. Finally, we show that the proposed scheme not only provides a FBL coding solution but also guarantees physical layer security(PLS). The numerical and simulation results show the effectiveness of the proposed scheme as a channel coding solution. The study of this paper provides a new method to construct a practical FBL scheme for the FMAC-DMS.

1 Introduction

The fastest-growing field in the telecommunications industry is wireless communication systems, with 5G currently in the early stages of commercial deployment worldwide. However, researchers need to develop new enabling technologies to overcome existing technical barriers. Channel coding, as one of the fundamental techniques in wireless communication systems, plays a crucial role in error detection and correction. It is the primary method to combat noise interference and improve signal quality during transmission. To meet the growing demands for high reliability and low latency, exploring new channel coding schemes is necessary.

Multiple-access fading channel (FMAC) is a typical channel model in wireless communication, and researchers [15] have studied linear feedback coding schemes for FMAC from an information theory perspective. Among them, [13] have extended the classical Schalkwijk-Kailath (SK) coding scheme [6] to wireless intelligent reflecting surfaces, single-input multi-output (SIMO) Rayleigh channels, and two-way full-duplex fading channels, respectively. These proposed schemes have been shown to possess self-secrecy when the code length exceeds a certain threshold, significantly enhancing the confidentiality of the target communication system and ensuring physical layer security (PLS). In [4], a linear coding scheme for fading broadcast channels with additive Gaussian white noise (AWGN) was proposed, which achieves rates close to the posterior matching scheme derived in [4] by choosing specific parameters.

With the deepening research on channel coding, many researchers have turned their attention to the field of PLS. [7, 8] have indicated that feedback signals can generate a secret key and encrypt the transmitted messages during the transmission process, thereby enhancing the secrecy capacity of discrete memoryless wiretap channels to the same channel capacity as the unconstrained secrecy case. However, these key-based feedback schemes are constructed based on Shannon’s classical random coding theory [9] and are not practical or implementable in real communication systems. Therefore, there is a need for research on finite blocklength (FBL) coding schemes. [9] proved that the classical SK feedback coding scheme [6] is an excellent FBL coding scheme for point-to-point Gaussian white noise channels. This paper, based on the demands for high reliability, low latency, and data protection in communication, takes an information-theoretic approach and combines the favorable properties of SK coding to design a linear feedback coding scheme for single-input single-output fading multiple-access channels with degraded message sets (SISO-FMAC-DMS), satisfying the requirements of PLS. The following questions are the focus of this study:

  1. Can the classical SK coding scheme be extended to SISO-FMAC-DMS, considering its own favorable properties?

  2. Can the proposed scheme be extended to multi-input single-output fading multiple-access channels with degraded message sets (MISO-FMAC-DMS)?

  3. Can the proposed scheme ensure physical layer security (PLS) in the presence of eavesdroppers?

In this paper, we first present the main idea of the layered SK scheme and apply it to FMAC-DMS in both single-input single-output (SISO) and multi-input single-output antenna systems (MISO). The channel capacities and FBL achievable rate expressions for both scenarios are derived. The FBL achievable secure rate expressions are also analyzed in the presence of eavesdroppers. Finally, data simulations are performed, and compared to classical LDPC codes, Turbo codes, and LDGM codes, the proposed layered SK coding scheme significantly reduces the blocklength. Further analysis of the characteristics of this scheme is conducted.

This paper is organized as follows. In Section 2, we briefly review the related works. Formal definition of the SISO-FMAC-DMS and MISO-FMAC-DMS models studied in this paper and previous results is introduced in Section 3. Our proposed coding schemes for SISO-FMAC-DMS and MISO-FMAC-DMS are shown in Section 4. Section 5 shows that our proposed scheme for the MISO-FMAC-DMS is also a secure FBL scheme when the coding blocklength is lager than a certain threshold. Simulation results and numerical examples are given in Section 6. Section 7 summary of all results in this paper and discusses future work.

2 Discussion

As early as 1966, Schalkwijk and Kailath [6] proposed a capacity-achieving coding scheme for point-to-point channels with AWGN, known as the SK coding scheme. The SK coding scheme [6] is an excellent constructive coding scheme for the white Gaussian channel, and it has extremely low complexity in encoding and decoding. Furthermore, the decoding error probability of SK scheme doubly exponentially decays as the coding code length increases, which indicates that the SK scheme [6] necessitates an extremely short coding code length to achieve a target decoding error probability. Then, Ozarow [10] extended the SK coding [6] to the multiple access channel (MAC) with AWGN, it showed that the feedback can increase the achievable rate region of the MAC, and this coding scheme is also capacity-achieving for the MAC with feedback. In [11], the SK-type scheme proposed in [10] was further extended to L-user (L ≥ 3) Gaussian MAC with noiseless feedback, and the sum-rate capacity was determined for some specific cases. Recently, [1] has extended the classical SK scheme [6] to intelligent reflecting surfaces in the presence of an eavesdropper, and it was shown that the proposed scheme is self-secure when the code length exceeds a certain threshold. Reference [2] extended the classical SK scheme [6] to both SIMO Rayleigh channels and wire-tap channels, and it demonstrated that the extended scheme is self-secure capacity-achieving. In [3], the classical SK scheme [6] was extended to two-way full-duplex Gaussian channels, and further prove that the proposed scheme is self-secure. A self-secure capacity-achieving feedback scheme for the Gaussian MAC with degraded message sets (DMS) is proposed in [12], which is an extended version of the classical SK scheme [6]. Furthermore, a summary of all works in the linear feedback coding scheme can be found in Table 1.

Table 1. Summarizing all works in the linear feedback coding scheme.

Related Work siso simo PLS MAC DMS
[1] FMAC
[2]
[3]
[6]
[10]
[11] L-user (L ≥ 3) Gaussian MAC
[12] Gaussian MAC
This Work FMAC

Though the SK-type coding scheme is well investigated in various channel models, however, SK-type FBL scheme for the FMAC with DMS remains unknown. In this paper, we focus on the SISO-FMAC-DMS and MISO-FMAC-DMS models and study how to design the SK-type FBL schemes for these models. Additionally, we also investigated whether these proposed schemes can achieve perfect secrecy by themselves.

3 Model formulation

For convenience, Table 2 summarizes the key notations introduced in this paper.

Table 2. Key notations.

Symbols Definitions
N Codeword blocklength
ε Decoding error probability
N(0,σ2) Gaussian distribution with mean 0 and variance σ2
CN(0,σ2) Circularly symmetric complex Gaussian distribution with mean 0 and variance σ2
CM×N A complex matrix of size M × N
U(a, b) A uniform distribution on the interval [a, b]
|| ⋅ || The 2-norm of a vector
| ⋅ | The cardinality of a finite set
X¯ The conjugate of the complex-valued X
I N The identity matrix of size N × N
E[⋅] and Var[⋅] The expected value and variance of a random variable, respectively
XH The conjugate transpose of X
Q(x) The value of the right tail function of the standard normal distribution at x
Q(x)-1 The inverse function of the Q(x)
Rsum(N, ε) Achievable sum rate of the SISO-FMAC-DMS
Rsum(N,ε) The maximum sum-rate of the SISO-FMAC-DMS
Rsummiso(N, ε) Achievable sum rate of the MISO-FMAC-DMS
Rsum-miso(N,ε) The maximum sum-rate of the MISO-FMAC-DMS
Wa and Wb Transmitted messages
Pa, Pb and P Power constraints
ha, hb, ga and gb Channel gains
Pa and Pb Power constraints
εn and εn Estimation errors of messages
Δ Normalized equivocation of the eavesdropper characterizes the secrecy level
δ Secrecy level
(Xa,n, Xb,n) and Yn The channel outputs and the channel input, respectively
ρ Correlation coefficient of Xa,n and Xb,n

Assumptions:(1) In low-latency communication systems, the transmission time of data packets is much shorter compared to the time scale of fading variations. Therefore, such communication channels are often considered as quasi-static fading. Hence, we assume that the forward link and its feedback link are static fading channels, where the channel coefficients remain constant during the transmission process, and both the receiver and the transmitters perfectly know the channel state information (CSI).

(2) From similar argument in [13], we assume that the external eavesdropper is an active user but is untrusted by the legitimate receiver, which indicates that the perfect CSI of eavesdropper’s channel is known by the eavesdropper and the transceiver. In addition, we assume that the eavesdropper also knows the perfect CSI of the legitimate receiver’s channel.

The model formulation for the SISO-FMAC-DMS is given in Subsection 3.1, see details below.

3.1 Model formulation of the SISO-FMAC-DMS

For the SISO-FMAC-DMS (see Fig 1), the n-th (n = 1, 2, …, N) channel inputs and output relationship is given by

Yn=haXa,n+hbXb,n+ηn (1)

here note that YnC1×1, Xa,nC1×1, Xb,nC1×1, and ηnC1×1CN(0,σ2).

Fig 1. The model of SISO-FMAC-DMS.

Fig 1

Definition 1. Xa,n and Xb,n are the outputs of the channel encoders subject to the average power constraints

1Nn=1NE[Xa,nX¯a,n]Pa,1Nn=1NE[Xb,nX¯b,n]Pb. (2)

The messages Wa and Wb are uniformly distributed on finite sets {1,2,...,|Wa|} and {1,2,...,|Wb|}, respectively. The legitimate receiver generates an estimation W^a=ψa(YN) and W^b=ψb(YN), where ψa and ψb are the legitimate receiver’s decoding function.

Definition 2. The average decoding error probability equals

Pe=1|Wa||Wb|waWa,wbWbPr{ψ(YN)(wa,wb)|(wa,wb)sent}. (3)

Definition 3. The (N, ε)-rate pair (Ra(N, ε), Rb(N, ε)) is achievable if for given blocklength N and decoding error probability ε, there exists a (N,|Wa|,|Wb|,Pa,Pb)-code satisfying Definition 1 such that

log|Wa|N=Ra(N,ε),log|Wb|N=Rb(N,ε),Peε. (4)

For the SISO-FMAC-DMS, the achievable sum rate is denoted by

Rsum(N,ε)=Ra(N,ε)+Rb(N,ε), (5)

and the maximal sum-rate, denoted as Rsum(N,ε), corresponds to the maximum sum-rate Rsum(N, ε) defined in (5). Then, the model formulation for the MISO-FMAC-DMS is given in Subsection 3.2, see details below.

3.2 Model formulation of the MISO-FMAC-DMS

For the MISO-FMAC-DMS (see Fig 2), the transmitter is equipped with A and B antennas, respectively, while the receiver is equipped with a single antenna. The channel fading coefficients are represented by haC1×A and hbC1×B. At time n (n ∈ {1, 2, …, N}), the channel inputs and output relationship is given by

Yn=haXa.n+hbXb.n+ηn (6)

here note that YnC1×1, Xa,nCA×1, Xb,nCB×1, and ηnC1×1CN(0,σ2).

Fig 2. The model of MISO-FMAC-DMS.

Fig 2

Definition 4. Xa,n and Xb,n are the outputs of the channel encoders subject to the average power constraint

1Nn=1NE[||Xa,n||2]Pa,1Nn=1NE[||Xb,n||2]Pb. (7)

The messages Wa and Wb are uniformly distributed on finite sets {1,2,...,|Wa|} and {1,2,...,|Wb|}, respectively. The legitimate receiver generates an estimation W^a=ψa(YN) and W^b=ψb(YN), where ψa and ψb are the legitimate receiver’s decoding function.

Definition 5. The average decoding error probability is the same that of the Definition 2.

Definition 6. The (N, ε)-rate pair (Ramiso(N, ε), Rbmiso(N, ε)) is achievable if for given blocklength N and decoding error probability ε there exists a (N,|Wa|,|Wb|,Pa,Pb)-code satisfying Definition 4 such that

log|Wa|N=Ra-miso(N,ε),log|Wb|N=Rb-miso(N,ε),Peε. (8)

For the MISO-FMAC-DMS, the achievable sum rate is denoted by

Rsum-miso(N,ε)=Ra-miso(N,ε)+Rb-miso(N,ε). (9)

and the maximal sum-rate, denoted as Rsum-miso(N,ε), corresponds to the maximum sum-rate Rsummiso(N, ε) defined in (9).

4 SK feedback scheme for the FMAC-DMS

The SK feedback coding schemes for the SISO-FMAC-DMS is given in Subection 4.1, see details below.

4.1 Main results of the SISO-FMAC-DMS

Theorem 1. For given decoding error probability ε and codeword length N, the maximal sum-rate of the SISO-FMAC-DMS is lower bounded by

Rsum*(N,ε)Rsum(N,ε), (10)

where

Rsum(N,ε)=maxρ[0,1]logMaMb-1Nlog([Q-1(ε8)]4(b2P*+r2)r29b4P*Pw(1-ρ2)), (11)

here note that

P*=a2b2Pv+ρ2Pw+2abPvPwρ,Pv=12Pa,Pw=12Pb,ρ=E[XaXb]PaPb,r=b2(1-ρ2)Pv+σ12,Ma=1+b2P*r2,Mb=1+b2Pw(1-ρ2)σ12, (12)

and a and b are the magnitudes of ha and hb, respectively.

Proof:

Let

Xa,n=h¯aaXa,nXa,n=haXa,na,Xb,n=h¯bbXb,nXb,n=hbXb,nb, (13)

where a and b represent the magnitudes of ha and hb, respectively.

The power constraints of Xa,n and Xb,n are given by

E[Xa,nX¯a,n]=Pa,E[Xb,nX¯b,n]=Pb, (14)

which indicates that the power constraints of Xa,n and Xb,n are equivalent to those of the Xa,n and Xb,n, respectively. Therefore, the input-output relationship of the channel can be described as follows

Yn=haXa,n+hbXb,n+ηnYn=aXa,n+bXb,n+ηn. (15)

By channel splitting, (15) is equivalent to

YR,n+jYI,n=a(XaR,n+jXaR,n)+b(XbR,n+jXbR,n)+ηR,n+jηI,n,YR,n=aXaR,n+bXbR,n+ηR,n,YI,n=aXal,n+bXbI,n+ηI,n, (16)

where XaR,n and XaI,n are the real part and imaginary part of Xa,n, respectively, and the other items are analogous. Here let E(XaR,n)2=PaR=E(XaI,n)2=PaI=12Pa=Pv,E(XbR,n)2=PbR=E(XbI,n)2=PbI=12Pb=Pw,Var[ηR,n]=Var[ηI,n]=σ22=σ12.

Brief introduction about the proposed two-step SK coding scheme: Fig 3 plot the equivalent channel of two-step SK encoding. The two encoders encode the common message Wa and private message Wb, respectively. Encoder 1 encodes the message Wa and feedback YN−1 into XaN with power Pa. Encoder 2 encodes the message Wa and feedback YN−1 into UN with power ρ2Pb, and encodes the message Wb and feedback YN−1 into VN with power (1 − ρ2)Pb, where 0 ≤ ρ ≤ 1. The receiver decodes UN and XaN first, and then subtracts them from the received message to further decode VN. Therefore, when Encoder 2 encodes Wb, the influence of message Wa can be completely eliminated. This indicates that for message Wb, the encoding equivalent channel is single-input single-output with AWGN noise. As for the encoding process for message Wa, the input to the encoding equivalent channel is bUN+aXaN, and the noise of the channel is non-Gaussian white noise ηN + bVN.

Fig 3. The steps of the SISO-FMAC-DMS two-step coding scheme.

Fig 3

Since the expressions of the two sub-channels are similar, analyzing one of them is sufficient. Doubling the achievable sum rate obtained from the analysis will give the achievable rate of the original channel. The following is an introduction to the encoding and decoding process for the real part of the subchannel. The expression for the output of the real part subchannel at time n(n ∈ {1, 2, …, N}) is as follows

YR,n=aXaR,n+b(UR,n+VR,n)+ηR,nYR,nb=(abXaR,n+UR,n)+VR,n+ηR,nb. (17)

Define

Xn*=abXaR,n+UR,n,ηR,n=VR,n+ηR,nb. (18)

The expression for the real part sub-channel at time n is Xn*N(0,P*), where P* is given by

P*=a2b2Pv+ρ2Pw+2abPvPwρρna2b2Pv+ρ2Pw+2abPvPwρ=P*, (19)

where ρ=E[XaXb]PaPb, 0ρn1 and ρn is given by

ρn=E[abXaR,nUR,n]ρabPvPw=E[XaR,nUR,n]ρPvPw·ab, (20)

and XaR,nN(0,Pv), UR,nN(0,(1-ρ2)Pw, the relationship between UR,n and XaR,n is given by

UR,n=ρPwPvXaR,n. (21)

Message mapping: Dividing Wa into two parts (WaR, WaI), where WaR and WaI take values in WaR={1,2,...,2NRaR(N,ε)} and WaI={1,2,...,2NRaI(N,ε)}, respectively. Then divide the interval [-0.5,0.5] into 2NRaR(N, ε) equally spaced sub-intervals, and the center of each sub-interval is mapped to a message value in WaR. Let θ1 be the center of the sub-interval with respect to the message WaR. Since WaR is equi-probably distributed over the set WaR, θ1 is approximately uniformly distributed over the interval [−0.5, 0.5] and its variance approximately equals 112, i.e. E[θ1]2=112. Wb, WbR and θ2 are similar to Wa, WaR and θ1, respectively, hence we omit them here.

At time 1, the encoder 1 transmits

XaR,1=0, (22)

the encoder 2 transmits

VR,1=12(1-ρ2)Pwθ2, (23)

and

UR,1=ρPwPvXaR,1=0. (24)

The receiver receives YR,1b, and obtains an estimation of θ2 by computing

θ^2,1=YR,1b12(1-ρ2)Pw=θ2+ηR,1b12(1-ρ2)Pw=θ2+ε1, (25)

where ε1=ηR,1b12(1-ρ2)Pw, and α1Var(ε1)=σ1212b2(1-ρ2)Pw.

At time 2, the encoder 1 transmits XaR,2, encoder 2 transmits

UR,2=ρPwPvXaR,2,VR,2=(1-ρ2)Pwα1ε1, (26)

X2* is given by

X2*=abXaR,2+UR,2=12P*θ1. (27)

the receiver obtains YR,2b, and gets an estimation of θ1 by computing

YR,2b=X2*+VR,2+ηR,2b=12P*θ1+(VR,2+ηR,2b),θ^1,1=YR,2b12P*=θ1+VR,2+ηR,2b12P*=θ1+ε2, (28)

where ε2=VR,2+ηR,2b12P* and α2Var(ε2)=b2(1-ρ2)Pw+σ1212b2P*XaR,2.

At time n (3 ≤ nN), the transmitter 1 transmits XaR,n and UR,n=ρPwPvXaR,n, Xn* is given by

Xn*=UR,n+XaR,nb=P*αn-1εn-1, (29)

and transmitter 2 transmits

VR,n=(1-ρ2)Pwαn-1εn-1. (30)

The receiver obtains YR,nb, and gets the estimation of θ1,n and θ2,n by computing

θ^1,n=θ^1,n-1-E[YR,nbεn-1]E[(YR,nb)2]YR,nb,θ^2,n=θ^2,n-1-E[YR,nbεn-1]E[(YR,nb)2]YR,nb, (31)

where

εn-1=εn-2-E[YR,n-1bεn-2]E[(YR,n-1b)2]YR,n-1b=θ^1,n-1-θ1,εn-1=εn-2-E[YR,n-1bεn-2]E[(YR,n-1b)2]YR,n-1b=θ^2,n-1-θ2. (32)

Lemma 1: For given decoding error probability ε and codeword length N, if the transmission rates Ra(N, ε) and Rb(N, ε) satisfy

Ra(N,ε)=log(1+b2P*r2)-1Nlog(b2P*+r23b2P*·[Q-1(ε8)]2),Rb(N,ε)=log(1+b2(1-ρ2)Pwσ12)-1Nlog(b2(1-ρ2)Pw+σ123b2(1-ρ2)Pw·[Q-1(ε8)]2), (33)

the decoding error probability satisfy Peε.

Proof: See S1 Appendix.

Finally, from (33), the achievable sum rate Rsum(N, ε) given in (11) is obtained. The details about SK feedback coding scheme for the MISO-FMAC-DMS are given in Subection 4.2.

4.2 Main results of MISO-FMAC-DMS

Theorem 2. For given decoding error probability ε and codeword length N, the maximal sum-rate of the MISO-FMAC-DMS is lower bounded by

Rsum-miso*(N,ε)Rsum-miso(N,ε), (34)

where

Rsum-miso(N,ε)=maxρ[0,1]logM1M2-1Nlog([Q-1(ε8)]4·(P˜+t2)29||hb||2P˜P2(1-ρ2)), (35)

and

M1=1+P˜t2,M2=1+||h2||2P2(1-ρ2)σ12,t=||hb||2(1-ρ2)P2+σ12,P˜=||ha||2P1+||hb||2ρ2P2+2||ha||·||hb||P1P2ρ, (36)

and ρ is given in Theorem 1.

Proof:

Transmit beamforming strategy for the feedforward channel: In (6), letting

Xa,n=haH||ha||Xa,nXa,n=haXa,n||ha||,Xb,n=hbH||hb||Xb,nXb,n=hbXb,n||hb|| (37)

here note that Xa,nCA×1, Xb,nCB×1, haC1×A, hbC1×B.

Therefore, the input-output relationship of the channel can be described as

Yn=haXa,n+hbXb,n+ηnYn=||ha||Xa,n+||hb||Xb,n+ηn, (38)

By channel splitting, we have

YR,n+jYI,n=||ha||(XaR,n+jXaI,n)+||hb||(XbR,n+jXbI,n)+ηR,n+jηI,nYR,n=||ha||XaR,n+||hb||XbR,n+ηR,n,YI,n=||ha||XaI,n+||hb||XbI,n+ηI,n, (39)

and the power constraints are given below, E(XaR,n)2=PaR=E(XaI,n)2=PaI=12Pa=P1,E(XbR,n)2=PbR=E(XbI,n)2=PbI=12Pb=P2,Var[ηR,n]=Var[ηI,n]=σ22=σ12.

Define

X˜n=abXaR,n+UR,n,ηR,n=VR,n+ηR,nb. (40)

The expression for the real part sub-channel at time n is X˜nN(0,P˜), where P˜ is given by

P˜=||ha||2P1+||hb||2ρ2P2+2||ha||·||hb||P1P2ρρ˜n||ha||2P+||hb||2ρ2P2+2||ha||·||hb||P1P2ρ=P˜, (41)

where ρ=E[XaXb]PaPb, 0ρ˜n1, and ρ˜n is given by

ρ˜n=E[XaR,nUR,n]ρP1P2·||ha||·||hb||, (42)

and XaR,nN(0,P1), UR,nN(0,(1-ρ2)P2), the relationship between UR,n and XaR,n is given by

UR,n=ρP2P1XaR,n. (43)

The encoding-decoding procedure of our proposed SK-type scheme for the MISO-FMAC-DMS of Fig 4 is described.

Fig 4. Procedure of our proposed SK-type scheme for the MISO-FMAC-DMS.

Fig 4

Along the lines of the encoding-decoding procedure in Section 4.1, we conclude that the transmission rates RaRmiso(N, ε) and RbRmiso(N, ε) can be expressed as

RaR-miso(N,ε)=12log(1+P˜t2)-12Nlog(P˜+t23P˜·[Q-1(ε8)]2),RbR-miso(N,ε)=12log(1+||hb||2(1-ρ2)P2σ12)-12Nlog(||hb||2(1-ρ2)P2+σ123b2(1-ρ2)P2·[Q-1(ε8)]2). (44)

Therefore, the sum rate Rsummiso(N, ε) given in (35) is obtained, and we complete the proof.

5 A secure FBL SK-type coding scheme for the MISO-FMAC-DMS with an external eavesdropper

The model formulation for MISO-FMAC-DMS with an external eavesdropper is given in Subsection 5.1, see details below.

5.1 Model formulation for MISO-FMAC-DMS with an external eavesdropper

The information-theoretic schematic diagram for the MISO-FMAC-DMS with an external eavesdropper is almost the same as that in Subsection 3.2 (see Fig 5), except that the existence of an eavesdropper equipped with C (C ≥ 1) antennas, the channel gains of eavesdropping channels for Transmitter 1 and Transmitter 2 are denoted by gaCA×C, gbCB×C, respectively, and they are mutually independent of each other and stay constants during the transmission.

Fig 5. The MISO-FMAC-DMS with an external eavesdropper.

Fig 5

At time n-th (n ∈ {1, 2, …, N}), the signal received by the eavesdropper is given by

Zn=gaXa,n+gbXb,n+ζn, (45)

where ζnCN(0,σζ2).

Definiton 7. By using the secrecy criteria defined in [14, 15], in this paper, a normalized equivocation of the eavesdropper characterizes the secrecy level and it is given by

Δ=H(Wa,Wb|ZN,h,g)H(Wa,Wb),0Δ1, (46)

where h = (ha, hb), g = (ga, gb).

The rate pair (Ramiso(N, ε, δ), Rbmiso(N, ε, δ)) is said to be achievable with δ-secrecy, if for given blocklength N, decoding error probability ε there exists a (N, |Wa|, |Wb|, Pa, Pb)-code described in Definition 4 such that

log|Wa|N=Ra-miso(N,ε,δ),log|Wb|N=Rb-miso(N,ε,δ),Peε,Δδ. (47)

Here note that 0 ≤ δ ≤ 1 is the required secrecy level. δ = 1 corresponds to perfect secrecy. For given N, ε and δ, a (N, |Wa|, |Wb|, Pa, Pb)-code defined in Definition 4 is said to be secure if (47) is satisfied, and the achievable secrecy sum rate is denoted by

Rsum-miso(N,ε,δ)=Ra-miso(N,ε,δ)+Rb-miso(N,ε,δ). (48)

Then, we show that our proposed scheme for the MISO-FMAC-DMS is also a secure FBL scheme when the coding blocklength is lager than a certain threshold in Subsection 5.2.

5.2 A secure FBL SK-type coding scheme for the MISO-FMAC-DMS with an external eavesdropper

Theorem 3. For given decoding error probability ε and secrecy level δ, if the blocklength N satisfies

NM121-δ+log([Q-1(ε8)]4·(P˜+t2)·t29||hb||2P˜P2(1-ρ2))logM1M2, (49)

an achievable secrecy sum rate Rsummiso(N, ε, δ) of the MISO-FMAC-DMS with an external eavesdropper is given by

Rsum-miso(N,ε,δ)=Rsum-miso(N,ε), (50)

where

M12=logdet(IC+P1gahaHhagaH||ha||2σζ2+ρ2P2gbhbHhbgbH||hb||2σζ2)+logdet(IC+(1-ρ2)P2gbhbHhbgbH||hb||2σζ2). (51)

Proof:

At time n-th (n ∈ {1, 2, …, N}), the signal received by the eavesdropper can be rewritten as

Zn=gahaH||ha||Xa,n+gbhbH||hb||(Un+Vn)+ζn. (52)

To calculate the equivocation Δ=H(Wa,Wb|ZN,h,g)H(Wa,Wb), we bound H(Wa, Wb|ZN, h, g) first, which is given by

H(Wa,Wb|ZN,h,g)=H(Wa|ZN,h,g)+H(Wb|Wa,ZN,h,g)H(Wa|Wb,ZN,h,g)+H(Wa|Wb,ZN,h,g). (53)

Next, the term H(Wa|Wb, ZN, h, g) can be further bounded by

H(Wa|Wb,ZN,h,g)(a)H(Wa|Wb,ZN,h,g,η1,η2,...,ηN-1,ζ1,ζ3,ζ4,...,ζN)(b)H(Wa|Wb,gahaH||ha||Xa,2+gbhbH||hb||(U2+V2)+ζ2,h,g,η1,η2,...,ηN-1,ζ1,ζ3,ζ4,...,ζN)=(c)H(Wa|gahaH||ha||Xa,2+gbhbH||hb||U2+ζ2)=(d)H(Wa)+h(ζ2)-h(gahaH||ha||Xa,2+gbhbH||hb||U2+ζ2)=(e)H(Wa)-logdet(IC+P1gahaHhagaH||ha||2σζ2+ρ2P2gbhbHhbgbH||hb||2σζ2), (54)

where (a) follows from conditioning reduce entropy, (b) is due to the fact that ZN can be concretely expressed as

Z1=gbhbH||hb||Vn+ζn,Z2=gahaH||ha||Xa,2+gbhbH||hb||(U2+V2)+ζ2,Z3=gahaH||ha||Xa,3+gbhbH||hb||(U3+V3)+ζ3,...ZN-1=gahaH||ha||Xa,N-1+gbhbH||hb||(UN-1+VN-1)+ζ2,ZN=gahaH||ha||Xa,N+gbhbH||hb||(UN+VN)+ζN, (55)

when n = 2, 3, …, N, Xa,N is a function of (η2, η3, …, ηN−1), and VN is a function of (η1, η2, …, ηN−1), (c) follows from (Wb,gbhbH||hb||V2,h,g,η1,η2,...,ηN-1,ζ1,ζ3,ζ4,...,ζN) are independent of (Wa, Xa,2, ζ2), (d) follows from Xa,2 and U2 is a function of Wa, and Wa is independent of ζ1), (e) follows from

h(gahaH||ha||Xa,2+gbhbH||hb||U2+ζ2)-h(ζ2)=logdet(πe(E[gahaH||ha||Xa,2][gahaH||ha||Xa,2]H)+E([gbhbH||hb||U2][gbhbH||hb||U2]H+σζ2IC))-logdet(πeσζ2IC)=logdet(IC+P1gahaHhagaH||ha||2σζ2+ρ2P2gbhbHhbgbH||hb||2σζ2). (56)

Analogously, the term H(WbWa, ZN, h, g) can be bounded by

H(WbWa,ZN,h,g)H(Wb)-logdet(IC+(1-ρ2)P2gbhbHhbgbH||hb||2σζ2). (57)

Substituting (54) and (57) into Δ, we conclude that

H(Wa,WbZN,h,g)H(Wa,Wb)H(Wa|Wb,ZN,h,g)+H(Wa|Wb,ZN,h,g)H(Wa,Wb)(f)1-M12H(Wa)+H(Wb)=(g)1-M12NRsum-miso(N,ε,δ)(h)1-M12NlogM1M2-log[Q-1(ε8)]4·(P˜+t2)·t29||hb||2P˜P2(1-ρ2)). (58)

where (f) follows from H(Wa, Wb) = H(Wa) + H(Wb) and M12=logdet(IC+P1gahaHhagaH||ha||2σζ2+ρ2P2gbhbHhbgbH||hb||2σζ2)+logdet(IC+(1-ρ2)P2gbhbHhbgbH||hb||2σζ2), (g) is due to H(Wa) + H(Wb) = N(Ramiso(N, ε, δ) + Rbmiso(N, ε, δ)) = NRsummiso(N, ε, δ), (h) is follows from Rsummiso(N, ε, δ) = Rsummiso(N, ε). From (58), we conclude that Δ ≥ δ is guaranteed if

1-M12NlogM1M2-log((Q-1(ε8))4·(P˜+t2)·t29||hb||2P˜P2(1-ρ2))δ, (59)

which can be rewritten as

NM121-δ+log((Q-1(ε8))4·(P˜+t2)·t29||hb||2P˜P2(1-ρ2))logM1M2, (60)

and the proof is completed.

6 Simulation results

Here note that all simulation results are based on an average of 1000 independent channel realizations. Also, Table 3 provides a summary of the parameters used in the simulation.

Table 3. Parameters in simulation.

Notations Values
ρ 0.5
ha, hb, ga and gb i.i.d. as CN(0,1)
A, B and C 6
PA and PB 10
σ 2 20
ε 10−6
σζ2 20

Figs 6 and 7 show the results of the comparison between the SNR, blocklength and decoding error probability of the LDPC code [15], Turbo code [16], LDGM code [17] and the proposed linear feedback coding scheme for the FMAC-DMS channel. From Figs 6 and 7, we see that the required coding blocklength and SNR for achieving the desired decoding error probability are significantly lower than the LDPC, Turbo, and LDGM codes. This significant reduction is attributed to the doubly exponential decay of the decoding error probability in our scheme as the coding blocklength increases, and error probabilities of other coding schemes only single-exponentially decay to zero as the blocklength length increases, which indicates that our proposed linear feedback coding scheme is a high-reliability and low-latency coding scheme.

Fig 6. Comparison of the SNR and decoding error probability of the LDPC code, Turbo code, LDGM code and the proposed linear feedback coding scheme for the FMAC-DMS.

Fig 6

Fig 7. Comparison of the blocklength and decoding error probability of the LDPC code, Turbo code, LDGM code and the proposed linear feedback coding scheme for the FMAC-DMS.

Fig 7

Fig 8 plots the relationship between the sum rate, number of transmitting antenna and power constraint of the feedback channels for the MISO-FMAC-DMS, and let blocklength N = 30. From Fig 8, we conclude that the sum rate is increasing while the number of transmitting antenna and power constraint of the feedback channel are increasing.

Fig 8. The relationship between the sum rate, number of transmitting antenna A = B and power constraint PA = PB = P for the MISO-FMAC-DMS.

Fig 8

Fig 9 plots the relationship between the FBL sum rate, decoding error probability and blocklength for the MISO-FMAC-DMS. From Fig 9, we conclude that the sum rate is increasing while the blocklength is increasing, and the blocklength reaches a threshold, reducing the bit error rate has little effect to the FBL sum rate. Furthermore, the required blocklength for achieving the desired decoding error probability is significantly short. The reason is that the decoding error probability of our scheme doubly exponentially decays as the coding blocklength increases.

Fig 9. The relationship between the FBL sum rate, decoding error probability and blocklength for the MISO-FMAC-DMS.

Fig 9

Fig 10 plots the relationship between the sum rate, decoding error probability and power constraint for the MISO-FMAC-DMS. Note that the power constraint PA = PB = P, blocklength N = 20. Furthermore, the LDPC code [15] in Fig 10 based on the secret key scheme [7, 8] (message encrypted by the key). Fig 10 shows that the sum rate is increasing while power constraint and decoding error probability are increasing. Additionally, when the decoding error probability is the same, the sum rate of our scheme is higher than that of LDPC code [15] based on the secret key scheme [7, 8]. This is because the feedback can enlarge the capacity region of the MAC.

Fig 10. The relationship between the sum rate, decoding error probability and power constraint for the MISO-FMAC-DMS.

Fig 10

Fig 11 shows that when the blocklength is greater than a threshold 129, the achievable secrecy sum rate Rsummiso(N, ε, δ) approaches the corresponding achieveable sum rate Rsummiso(N, ε) for the MISO-FMAC-DMS, which indicates that the proposed scheme is secure when the blocklength is larger than certain threshold. Here note that the secrecy level equal to 1 corresponds to perfect secrecy.

Fig 11. The sum rate and secrecy sum rate when the blocklength is larger than a threshold for the MISO-FMAC-DMS and external eavesdropper.

Fig 11

Fig 12 plots the relationship between the blocklength threshold satisfying secrecy constraint, the decoding error probability, and the secrecy level for the MISO-FMAC-DMS and external eavesdropper. From Fig 12, according to the simulation results, it can be seen that if the decoding error probability is smaller or the blocklength is bigger, the more stringent security requirements can be met. Furthermore, the secrecy level increases as the decoding error probability and code blocklength increase, this observation aligns with the theoretical analysis. For example, when the decoding error probability ϵ = 10−7 and the secrecy level δ = 0.99, the blocklength threshold satisfying secrecy constraint is about 400.

Fig 12. The relationship between the blocklength threshold satisfying secrecy constraint, the decoding error probability, and the secrecy level for the MISO-FMAC-DMS and external eavesdropper.

Fig 12

7 Conclusion and future work

This paper focuses on channel coding from an information theory perspective, addressing the demands for high reliability, low latency, and data transmission security in FMAC-DMS. A linear feedback coding scheme for FMAC-DMS is designed, incorporating the beamforming strategy, channel splitting method, and layered SK coding scheme. The proposed scheme is extended to SISO-FMAC-DMS and MISO-FMAC-DMS. This coding scheme not only provides a FBL coding solution but also guarantees PLS. The subsequent data simulation results demonstrate the effectiveness of the proposed scheme as a channel coding solution, and it ensures PLS when there is an eavesdropper, especially for sufficiently long code lengths. In future work, the application of the proposed scheme to FMAC-DMS with non-causal channel state information (NCSI) at the transmitter can be considered, along with the investigation of FBL achievability and rates, channel capacity, and security capacity in such a system.

Supporting information

S1 Appendix

(PDF)

pone.0295369.s001.pdf (353.6KB, pdf)

Data Availability

All relevant data are within the paper.

Funding Statement

The authors received no specific funding for this work.

References

  • 1. Xie G., Yang C., Feng Y. and Dai B., “Secure Finite Blocklength Coding Schemes for Reconfigurable Intelligent Surface Aided Wireless Channels With Feedback,” IEEE Transactions on Communications, vol. 75, no. 5, pp. 2931–2946, May. 2023. doi: 10.1109/TCOMM.2023.3256418 [DOI] [Google Scholar]
  • 2.S. Yin and B. Dai, “Self-Secure Capacity-Achieving Feedback Scheme for SIMO Rayleigh Channel,” 2022 IEEE 8th International Conference on Computer and Communications (ICCC), Chengdu, China, 2022, pp. 79–83.
  • 3.D. Xia, C. Yang and B. Dai, “A Finite Blocklength Coding Scheme for the Two-Way Full-duplex Fading Channel,” 2022 IEEE/CIC International Conference on Communications in China (ICCC Workshops), Sanshui, Foshan, China, 2022, pp. 1–6.
  • 4.S. Li, D. Tuninetti and N. Devroye, “A Control-Theoretic Linear Coding Scheme for the Fading Gaussian Broadcast Channel with Feedback,” 2021 IEEE International Symposium on Information Theory (ISIT), Melbourne, Australia, 2021, pp. 1–6.
  • 5.S. Li, D. Tuninetti and N. Devroye, “The Fading Gaussian Broadcast Channel with Channel State Information and Output Feedback,” 2020 IEEE International Symposium on Information Theory (ISIT), Los Angeles, CA, USA, 2020, pp. 1474–1479.
  • 6. Schalkwijk J. and Kailath T., “A coding scheme for additive noise channels with feedback–I: No bandwidth constraint,” IEEE Transactions on Information Theory, vol. 12, no. 2, pp. 172–182, 1966. doi: 10.1109/TIT.1966.1053880 [DOI] [Google Scholar]
  • 7. Ahlswede R. and Cai N., “Transmission, identification and common randomness capacities for wire-tap channels with secure feedback from the decoder,” Gen. Theory Inf. Trans. Comb., pp. 258–275, 2006. [Google Scholar]
  • 8. Schaefer R. F., Khisti A. and Poor H. V., “Secure Broadcasting Using Independent Secret Keys,” IEEE Transactions on Communications, vol. 66, no. 2, pp. 644–661, Feb. 2018. doi: 10.1109/TCOMM.2017.2764892 [DOI] [Google Scholar]
  • 9. Cover T. M. and Thomas J. A., Elements of Information Theory, New York: Wiley, 1991. [Google Scholar]
  • 10. Ozarow L., “The capacity of the white Gaussian multiple access channel with feedback,” IEEE Transactions on Information Theory, vol. 30, no. 4, pp. 623–629, July 1984. doi: 10.1109/TIT.1984.1056935 [DOI] [Google Scholar]
  • 11. Kramer G., “Feedback strategies for white Gaussian interference networks,” IEEE Transactions on Information Theory, vol. 48, no. 6, pp. 1423–1438, June 2002. doi: 10.1109/TIT.2002.1003831 [DOI] [Google Scholar]
  • 12. Dai B., Li C., Liang Y., Ma Z. and Shamai S., “Self-Secure Capacity-Achieving Feedback Schemes of Gaussian Multiple-Access Wiretap Channels With Degraded Message Sets,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 1583–1596, 2022. doi: 10.1109/TIFS.2022.3164196 [DOI] [Google Scholar]
  • 13. Mukherjee A., Fakoorian S. A. A., Huang J. and Swindlehurst A. L., “Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey,” IEEE Communications Surveys & Tutorials, vol. 16, no. 3, pp. 1550–1573, Third Quarter 2014. doi: 10.1109/SURV.2014.012314.00178 [DOI] [Google Scholar]
  • 14.E. Tekin and A. Yener, “The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints,” 2006 IEEE International Symposium on Information Theory, Seattle, WA, USA, 2006, pp. 1164–1168.
  • 15.Y. Li, L. Wang and Y. Sun, “The Design of Network Low Density Parity Check Codes for Wireless Multiple-Access Relay Networks,” 2011 IEEE International Conference on Advanced Information Networking and Applications, Biopolis, Singapore, 2011, pp. 653–658.
  • 16.J. Del Ser, P. M. Crespo, B. H. Khalaj and J. Gutierrez-Gutuirrez, “On Combining Distributed Joint Source-Channel-Network Coding and Turbo Equalization in Multiple Access Relay Networks,” Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007), White Plains, NY, USA, 2007, pp. 18–18.
  • 17.W. Zhong and J. Garcia-Frias, “Parallel LDGM Codes for the Transmission of Highly Correlated Senders over Rayleigh Fading Multiple Access Channels,” 2006 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, USA, 2006, pp. 1230–1235.

Decision Letter 0

Praveen Kumar Donta

24 Sep 2023

PONE-D-23-28003Linear Feedback Coding Scheme for Multiple-access Fading Channels with Degraded Message SetsPLOS ONE

Dear Dr. Wang,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

Please submit your revised manuscript by Nov 08 2023 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.

  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.

  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Praveen Kumar Donta, Ph.D.

Academic Editor

PLOS ONE

Journal Requirements:

When submitting your revision, we need you to address these additional requirements.

1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at 

https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and 

https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf

2. Please note that PLOS ONE has specific guidelines on code sharing for submissions in which author-generated code underpins the findings in the manuscript. In these cases, all author-generated code must be made available without restrictions upon publication of the work. Please review our guidelines at https://journals.plos.org/plosone/s/materials-and-software-sharing#loc-sharing-code and ensure that your code is shared in a way that follows best practice and facilitates reproducibility and reuse.

3. Thank you for stating the following financial disclosure: 

"The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript." 

At this time, please address the following queries:

a) Please clarify the sources of funding (financial or material support) for your study. List the grants or organizations that supported your study, including funding received from your institution. 

b) State what role the funders took in the study. If the funders had no role in your study, please state: “The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.”

c) If any authors received a salary from any of your funders, please state which authors and which funders.

d) If you did not receive any funding for this study, please state: “The authors received no specific funding for this work.”

Please include your amended statements within your cover letter; we will change the online submission form on your behalf.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Partly

Reviewer #2: Yes

Reviewer #3: Yes

**********

2. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Yes

**********

3. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Yes

**********

4. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Yes

**********

5. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: This manuscript proposed a linear feedback coding scheme for fading multiple-access channels with degraded message sets (FMAC-DMS). My concerns are listed in the following.

1. In Lines 52-56, the introduction of sections is missing.

2. Why there are two repeated “SK feedback scheme for the FMAC-DMS” in Line 108 and 109?

3. In Line 277 and Line 278, please be careful about English writing “From this figure, According to the…”.

4. In figure, you use Fig. But in description, you use Figure. Please unify your expression.

5. “From Figure 6, we see that the required coding blocklength achieving desired decoding error probability is significantly shorter than LDPC, Turbo and LDGM codes.” But I find that after 39 SNR(dB), the LDPC code has shorter error probability than your proposed model. It seems that the trend of plots is different from your conclusion. Could you give some explanations?

6. What are the advantages of your channel coding scheme? What are the contributions of your coding scheme in high reliability, low latency and data transmission security of FMAC-DMS? Please add more experiments to support your conclusions.

Reviewer #2: This presents the main idea of the layered SK scheme and applies it 42

to FMAC-DMS in both single-input single-output (SISO) and multi-input single-output 43

antenna systems (MISO). The channel capacities and FBL achievable rate expressions 44

for both scenarios are derived. The FBL achievable secure rate expressions are also 45

analyzed.

All the objectives are well addressed in a systematic way with a proper english.

Congratulations to the authors for the good work.

Reviewer #3: The authors present the article entitled “Linear Feedback Coding Scheme for Multiple-access Fading Channels with Degraded Message Sets”

The article presents the following general concerns:

Please avoid using first-person sentences. Use instead third or passive-voice sentences.

I suggest to improve the Abstract section. This section should give a pertinent overview of the work by presenting a brief background of the work, methods, results and conclusion. Also, present quantitative results in order to highlight the novelty of the work.

Improve image quality

Validate that all variables and parameters of the equations are correctly defined.

The numbering of the sections that make up the writing needs to be displayed correctly.

Also, I suggest to add a Discussion section. Here, add a table that compares the proposed work vs the already reported in the state-of-the-art in order to highlight the contributions of the work.

Please update your references.

Put a brief introduction between sections and subsections.

**********

6. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: No

Reviewer #2: No

Reviewer #3: No

**********

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

Decision Letter 1

Praveen Kumar Donta

7 Nov 2023

PONE-D-23-28003R1Linear Feedback Coding Scheme for Multiple-access Fading Channels with Degraded Message SetsPLOS ONE

Dear Dr. Wang,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

Please submit your revised manuscript by Dec 22 2023 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.

  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.

  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Praveen Kumar Donta, Ph.D.

Academic Editor

PLOS ONE

Journal Requirements:

Please review your reference list to ensure that it is complete and correct. If you have cited papers that have been retracted, please include the rationale for doing so in the manuscript text, or remove these references and replace them with relevant current references. Any changes to the reference list should be mentioned in the rebuttal letter that accompanies your revised manuscript. If you need to cite a retracted article, indicate the article’s retracted status in the References list and also include a citation and full reference for the retraction notice.

Additional Editor Comments:

Please address the following before recommend this paper for publication.

1. Summarize all notations used in this paper through a table. Since many notations, summary table helps to cross check when needed.

2. From line 163 (page 6/24) to rest of the document is in italic. please rectify it.

3. Simulation parameters are summarized through a table. It is recommended to provide the source code of simulation through a link.

4. Discussions related to the plots is very limited. Recommended to provide sufficient discussion for each plot describing axis, reasons for improvements of proposed work over others, challenges etc.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation.

Reviewer #2: All comments have been addressed

Reviewer #3: All comments have been addressed

**********

2. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #2: Yes

Reviewer #3: Yes

**********

3. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #2: Yes

Reviewer #3: Yes

**********

4. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #2: Yes

Reviewer #3: Yes

**********

5. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #2: Yes

Reviewer #3: Yes

**********

6. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #2: The manuscript is well improved by addressing the revision (R1) comments.

Now the paper can be accepted as per the protocol of the journal.

Reviewer #3: (No Response)

**********

7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #2: Yes: V. B Murali Krishna

Reviewer #3: No

**********

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

Decision Letter 2

Praveen Kumar Donta

21 Nov 2023

Linear Feedback Coding Scheme for Multiple-access Fading Channels with Degraded Message Sets

PONE-D-23-28003R2

Dear Dr. Wang,

We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements.

Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication.

An invoice for payment will follow shortly after the formal acceptance. To ensure an efficient process, please log into Editorial Manager at http://www.editorialmanager.com/pone/, click the 'Update My Information' link at the top of the page, and double check that your user information is up-to-date. If you have any billing related questions, please contact our Author Billing department directly at authorbilling@plos.org.

If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

Kind regards,

Praveen Kumar Donta, Ph.D.

Academic Editor

PLOS ONE

Additional Editor Comments (optional):

Reviewers' comments:

Acceptance letter

Praveen Kumar Donta

28 Dec 2023

PONE-D-23-28003R2

PLOS ONE

Dear Dr. Wang,

I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now being handed over to our production team.

At this stage, our production department will prepare your paper for publication. This includes ensuring the following:

* All references, tables, and figures are properly cited

* All relevant supporting information is included in the manuscript submission,

* There are no issues that prevent the paper from being properly typeset

If revisions are needed, the production department will contact you directly to resolve them. If no revisions are needed, you will receive an email when the publication date has been set. At this time, we do not offer pre-publication proofs to authors during production of the accepted work. Please keep in mind that we are working through a large volume of accepted articles, so please give us a few weeks to review your paper and let you know the next and final steps.

Lastly, if your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

If we can help with anything else, please email us at customercare@plos.org.

Thank you for submitting your work to PLOS ONE and supporting open access.

Kind regards,

PLOS ONE Editorial Office Staff

on behalf of

Dr. Praveen Kumar Donta

Academic Editor

PLOS ONE

Associated Data

    This section collects any data citations, data availability statements, or supplementary materials included in this article.

    Supplementary Materials

    S1 Appendix

    (PDF)

    pone.0295369.s001.pdf (353.6KB, pdf)
    Attachment

    Submitted filename: response-plos one.pdf

    pone.0295369.s002.pdf (1.4MB, pdf)
    Attachment

    Submitted filename: response letter-v2.pdf

    pone.0295369.s003.pdf (403.1KB, pdf)

    Data Availability Statement

    All relevant data are within the paper.


    Articles from PLOS ONE are provided here courtesy of PLOS

    RESOURCES