14
Japan Advanced Institute of Science and Technology JAIST Repository https://dspace.jaist.ac.jp/ Title Rate-Distortion and Outage Probability Analyses for Single Helper Assisted Lossy Communications Author(s) Lin, Wensheng; Xue, Qiang; He, Jiguang; Juntti, Markku; Matsumoto, Tad Citation IEEE Transactions on Vehicular Technology, 68(11): 10882-10894 Issue Date 2019-09-05 Type Journal Article Text version author URL http://hdl.handle.net/10119/16045 Rights This is the author's version of the work. Copyright (C) 2019 IEEE. IEEE Transactions on Vehicular Technology, 68(11), pp.10882-10894, 2019, DOI:10.1109/TVT.2019.2939622. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Description

Rate-Distortion and Outage Probability Analyses for …...coding rates all falling inside the achievable rate region. Fol-lowing the same logic, for the theoretical performance analysis

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Rate-Distortion and Outage Probability Analyses for …...coding rates all falling inside the achievable rate region. Fol-lowing the same logic, for the theoretical performance analysis

Japan Advanced Institute of Science and Technology

JAIST Repositoryhttps://dspace.jaist.ac.jp/

TitleRate-Distortion and Outage Probability Analyses

for Single Helper Assisted Lossy Communications

Author(s)Lin, Wensheng; Xue, Qiang; He, Jiguang; Juntti,

Markku; Matsumoto, Tad

CitationIEEE Transactions on Vehicular Technology,

68(11): 10882-10894

Issue Date 2019-09-05

Type Journal Article

Text version author

URL http://hdl.handle.net/10119/16045

Rights

This is the author's version of the work.

Copyright (C) 2019 IEEE. IEEE Transactions on

Vehicular Technology, 68(11), pp.10882-10894,

2019, DOI:10.1109/TVT.2019.2939622. Personal use

of this material is permitted. Permission from

IEEE must be obtained for all other uses, in any

current or future media, including

reprinting/republishing this material for

advertising or promotional purposes, creating new

collective works, for resale or redistribution to

servers or lists, or reuse of any copyrighted

component of this work in other works.

Description

Page 2: Rate-Distortion and Outage Probability Analyses for …...coding rates all falling inside the achievable rate region. Fol-lowing the same logic, for the theoretical performance analysis

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 1

Rate-Distortion and Outage Probability Analyses forSingle Helper Assisted Lossy Communications

Wensheng Lin, Student Member, IEEE, Qiang Xue, Member, IEEE, Jiguang He, Student Member, IEEE,Markku Juntti, Senior Member, IEEE, and Tad Matsumoto, Fellow, IEEE

Abstract—The primary objective of this paper is to investigatethe performance improvement provided by a helper, with theaim of applications to a lossy communication system in wirelesssensor networks (WSNs) and/or Internet of Things (IoT). Initially,we formulate the system model as a problem of multiterminalsource coding with a helper, and determine an inner boundon the achievable rate-distortion region for binary sources.Based on Shannon’s lossy source-channel separation theorem, wefurther derive the outage probability of the system over blockRayleigh fading channels. The numerical results indicate that ahelper can obviously expand the achievable rate-distortion regionand provide diversity gains which in turn decrease the outageprobability. Finally, we evaluate the practical performance ofoutage probability through simulations with exclusive-or (XOR)as an example of the helper structure. Both the simulation andtheoretical results show second order diversity by introducing ahelper, and lower outage probability by increasing the acceptabledistortions.

Index Terms—Wireless sensor network, Internet of Things,rate-distortion, outage probability, Rayleigh fading.

I. INTRODUCTION

SensorSensor

Helper

Lossy

Lossless

Fig. 1. A scenario of lossy communications with a helper.

In smart society, sensors are widely deployed to detect andmonitor the objects, the information of which is exchanged

Copyright (c) 2015 IEEE. Personal use of this material is permitted.However, permission to use this material for any other purposes must beobtained from the IEEE by sending a request to [email protected].

Corresponding author: Wensheng Lin.This work is funded in part by China Scholarship Council (CSC) and in

part by JAIST Core-to-Core Program. This work has been also performed inpart under JSPS Kakenhi (B)15H04007, and in part by Academy of Finland6Genesis Flagship (grant 318927).

W. Lin is with the School of Information Science, Japan AdvancedInstitute of Science and Technology, Ishikawa 923-1292, Japan (email:[email protected]).

Q. Xue, J. He and M. Juntti are with the Centre for Wireless Communica-tions, University of Oulu, Oulu FI-90014, Finland (email: [email protected];[email protected]; [email protected])

T. Matsumoto is with the School of Information Science, Japan AdvancedInstitute of Science and Technology, Ishikawa 923-1292, Japan, and also withthe Centre for Wireless Communications, University of Oulu, Oulu FI-90014,Finland (email: [email protected])

via Internet of Things (IoT) [1]. For instance, as illustrated inFig. 1, there are some sensors detecting objects on the roadto provide support information for driving control of vehicles.Due to the diverse positions and detecting angles of sensors,their observations contain correlated information which canbe utilized in joint decoding. In order to further improve thesystem performance, the concept of helper has been introducedinto diverse communications systems to provide side informa-tion [2]–[5]. Besides, the relay in practical systems could alsobe regarded as a helper, which knows the source information(either fully or partially) and generates its own informationto assist transmissions. For instance, Joda and Lahouti [6]apply a broadcasting relay at orthogonal two-hop network anddesign the network code at the relay; He et al. [7] adopt anexclusive-OR (XOR) operation at the relay in non-orthogonalmultiple access relay channel (MARC). Likewise, a helperis located in the wireless sensor network (WSN) as shownin Fig. 1, to assist transmissions and make communicationsmore reliable1. It should be noted here that, in this paper, theconcept of “helper” represents a general device which collectsinformation only from the sensors, while the sensors do notcommunicate with each other. For simplicity, we assume thatthe helper can access the sensor observations through error-free channels, while the transmissions to the vehicle sufferfrom block Rayleigh fadings. The case where the helper canonly know the lossy version of the sensor observations is leftas the future work.

Due to the time varying nature of channel conditions invehicular networks resulted from fading, the final objectiveof this paper is to derive the outage probability analytically.In IoT, since the sensor observations are exploited to makea final judgement other than achieve lossless reconstruction,the received information sequences are still valuable if thedistortions are within a certain set of acceptable degrees.Therefore, in this paper, the outage event is defined as that therecovered observations cannot satisfy the specified distortionrequirements of both the sensor observations. Regarding thecalculation of theoretical outage probability, we can referto previous works presented in [8], [9], where the outageprobability is investigated for lossless communications with alossy-forwarding (LF) relay. The calculation of the theoreticaloutage probability based on the achievable rate region andShannon’s source-channel separation theorem [10], [11]. First,

1Introducing a helper may make the joint decoder more complicated andconsume more power; however, this paper only focuses on the performanceimprovement provided by a helper, while the trade-off between power con-sumption and performance enhancement is out of the scope.

Page 3: Rate-Distortion and Outage Probability Analyses for …...coding rates all falling inside the achievable rate region. Fol-lowing the same logic, for the theoretical performance analysis

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 2

given the channel capacity and the channel coding rate, thesource coding rate is determined. Then, the outage probabilityis the integral with respect to the multiple links’ instantaneoussignal-to-noise ratios (SNRs) that cannot support the sourcecoding rates all falling inside the achievable rate region. Fol-lowing the same logic, for the theoretical performance analysisof the system depicted in Fig. 1, we can start from the rate-distortion analysis of a multiterminal source coding problem.Then, based on Shannon’s lossy source-channel separationtheorem for multiterminal communications [12], the results ofrate-distortion analysis can be further utilized in the derivationof outage probability in block fading channels.

It should be noticed that, Shannon’s lossy source-channelseparation theorem states that the source sequence can becompressed until a certain rate by lossy source coding, suchthat the lossy-encoded codeword can be losslessly transmittedthrough the channel, given an instantaneous SNR. Here, chan-nel coding is regarded as a method for supporting reliabletransmission of the lossy-encoded codeword generated bysource coding, while the distortions occurring at the decoderoutput is due to the use of lossy source coding. We canthen easily derive the mathematical relationship between thechannel capacity and the distortions. Actually, in a practicalsystem, the distortions is due to the use of lossy source codingand/or the transmission through channel.

If sensors do not perform lossy source coding, distortionscan only be caused in the transmission through the channels.Since the instantaneous channel capacity itself is randomvariable due to fading, sensors do not know the instantaneouschannel capacity. Hence, they are not able to know whether thelossy-encoded codeword can be transmitted losslessly over thechannel. This indicates that even though the error occurrenceprocess in the practical systems may be different from whatShannon’s lossy source-channel separation theorem states, theoutage calculation described above can still be used, and theanalytically derived results can be used as reference.

Regarding the rate-distortion analysis, we are inspired byprevious researches belonging to the category of multiterminalsource coding. Slepian and Wolf first established the theo-retical basis of distributed source coding in [13], where theadmissible rate region is determined for losslessly recoveringtwo discrete memoryless sources. Surprisingly, even thoughthe encoders with multiple sources do not communicate witheach other, the admissible rate region is still the same as inthe case where the encoders communicate with each other.For the lossy case, Berger [14] and Tung [15] derived theouter and inner bounds on the rate-distortion region for dis-tributed lossy compression systems, where the recovered datasequence deviates from the original sequence at a distortionlevel specified by the rate-distortion region. When solvingthe binary chief executive officer (CEO) problem, He et al.[16] derived an outer bound of the rate-distortion region forbinary multiterminal source coding. Then, the outer bound wasextended to the case with arbitrary number of binary sourcesin [17].

Moreover, the system investigated in this paper containsa helper, providing compressed side information. Therefore,we can also obtain hints from the research achievements

for efficient exploitation of side information or a helper. In[18], Ahlswede and Korner determined the rate region of thelossless source coding problem with a helper. Wyner and Ziv[19] presented the result of their pioneering work on lossycompression with side information. The Wyner-Ziv theoremimplies that the system with noncausal side information onlyavailable at the decoder requires a lower transmission rate thanthe system without side information, despite encoding withoutnoncausal side information. Sechelea et al. in [20] analyzedthe problem of lossy compression with binary sources andcorrelated side information in depth. For the case with morethan one source, Wagner and Anantharam [21] studied a multi-terminal source coding problem with one link of uncompressedside information available. In [22], Jana and Blahut derivedthe bonds for lossless and lossy multiterminal source codingsystems where lossless and lossy links are mixed. Timo et al.[23] derived an upper bound on the rate-distortion function forlossy source coding with various side information utilized inmany decoders.

So far, there are also a number of research works relatedto outage probability analysis for communications with cor-related information. Laneman et al. characterized the outageprobabilities of amplify-and-forward (AF) and decode-and-forward (DF) relaying strategies for Rayleigh fading chan-nels in [24], where the relay and source messages can beregarded as correlated information. Zhou et al. [25] derived theoutage probability for the system with two correlated binarysources communicating through orthogonal MARC over blockRayleigh fadings. In [26], Lu et al. analyzed the outageprobability of the MARC system where two correlated sourcessuffer from block Rayleigh fadings, and the estimate of sourcein the relay may contain errors.

Nevertheless, the outage probability is still unknown forlossy end-to-end multiterminal communications with a helper.In order to conduct the outage probability analysis, it isnecessary to determine the achievable rate-distortion regionfor multiterminal source coding with a helper. Notice that theexact achievable rate-distortion region for lossy multiterminalsource coding is still an open problem. Thus, for the achiev-able rate-distortion region used in the derivation of outageprobability, we only consider the inner bound, i.e., the lossyrecoveries must satisfy the distortion requirements if the linkrates are larger than the inner bound.

The contributions of this paper are summarized as follows:• We derive an inner bound on the achievable rate-

distortion region of lossy multiterminal source codingproblem with two binary sources and a helper.

• Then, we calculate the outage probabilities base on thederived inner bound and Shannon’s lossy source-channelseparation theorem.

• By utilizing the derived mathematical results, we conductan in-depth investigation of performance improvement byintroducing a helper. It is remarkable that a helper can notonly enlarge the achievable rate-distortion region, but alsoprovide diversity gains and reduce the outage probability.

• In addition, we verify the tendency of theoretical resultsthrough simulations, in which a joint decoding algorithmis designed for the helper sequence generated by XOR

Page 4: Rate-Distortion and Outage Probability Analyses for …...coding rates all falling inside the achievable rate region. Fol-lowing the same logic, for the theoretical performance analysis

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 3

operation. The system can achieve second order diversityby introducing a helper, and have lower outage proba-bility for less strict distortion requirements, both in thesimulations and the theoretical analysis.

The remainder of this paper is organized as follows. Sec-tion II states the mathematical details of multiterminal sourcecoding with a helper and the channel model. In Section III,we analyze the trade-off between link rates and the distortionsremaining in the recoveries. Subsequently, Section IV derivesthe outage probability by utilizing the inner bound on theachievable rate-distortion region. We then conduct a series ofsimulations to evaluate the practical system performance forcomparison with theoretical results in Section V. Finally, weconclude this work in Section VI.

II. SYSTEM MODEL

Notations: The random variables and their realizations aredenoted by uppercase and lowercase letters, respectively. Cal-ligraphic letters X ,Y,M and Q denote the finite alphabets ofa variable. For a random variable and its realization, we usei to denote the time index, and the superscript to denote thelength of the vector. In particular, we use j ∈ {1, 2} and “H”at the subscript to represent the link index for two sources andthe helper, respectively.

As stated above, the performance analysis of lossy commu-nications with a helper follows two steps, i.e., the derivationof the achievable rate-distortion region, and the calculation ofoutage probability. In this section, we formulate the mathemat-ical framework of multiterminal source coding with a helper,and introduce the channel model to be used in the derivationof outage probability.

A. Multiterminal Source Coding with a Helper

Encoder 1X1

n M1

Joint

decoder

(X1n, D1)^

Encoder 2X2

n(X2

n, D2)^

Yn

Encoder H

R1

M2

R2

MH

RH

Zn

Fig. 2. The theoretical model of multiterminal source coding problem withtwo sources and one helper providing compressed side information.

Since the sensor observations and the helper information aretransmitted in the form of binary packets, they can be regardedas correlated binary sources. We consider the simplest case thatthere are only two sensors in the system as illustrated in Fig. 2.The sensor observations are assumed to be two independentand identically distributed (i.i.d.) sequences xn1 = {x1(i)}ni=1

and xn2 = {x2(i)}ni=1, generated by two correlated discretememoryless sources X1 and X2, respectively. At i-th timeslot, xj(i) takes values from the binary alphabet Xj = {0, 1}for j = 1, 2. Thus, X2 is equivalent to the output of a binarysymmetric channel (BSC) with input X1 and crossover proba-bility ρ and vice versa, i.e., X2 = X1⊕Z with Z ∼ Bern(ρ).

In this paper, we consider the sources Xj ∼ Bern(0.5) forj = 1, 2, with the joint probability mass function (PMF)pX1,X2(x1, x2) = Pr{X1 = x1, X2 = x2} given by

pX1,X2(x1, x2) =

1

2ρ, if x1 6= x2,

1

2(1− ρ), otherwise.

(1)

Notice that Xn1 and Xn

2 are correlated sequences, and hencethe helper should accumulate the information to avoid toomuch redundancy2. Since the helper sequence yn = {y(i)}ni=1

highly depends on the helper structure, we assume without lossof generality that Y is a function f(·) of X1 and X2.

To begin with, three sequences xn1 , xn2 and yn are inde-pendently encoded by encoder 1, encoder 2 and encoder Hat coding rates R1, R2 and RH, respectively. The encodingprocess can be performed by assigning an index M to eachsequence according to the following mapping rules:

ϕj : Xnj 7→ Mj = {1, 2, · · · , 2nRj} for j = 1, 2, (2)

ϕH : Yn 7→ MH = {1, 2, · · · , 2nRH}, (3)

where the numbers of codewords are 2nRj for Xj and 2nRH forY . If we separately focus on only one link, Rj < H(Xj) andRH < H(Y ) are lossy compression, while Rj ≥ H(Xj) andRH ≥ H(Y ) are lossless compression. Generally, the sourcecoding rate is assumed to be no larger than 1; otherwise, itdoes not make sense for source coding. Moreover, losslesscompression can be also regarded as a special case of lossycompression with the coding rate no less than the sourceentropy and the distortion equal to 0. Therefore, (2) and (3) canrepresent both lossy and lossless cases, and lossy compressionwill reduce to lossless compression by setting the coding rateno less than the source entropy.

After encoding, the outputs ϕ1(xn1 ), ϕ2(xn2 ) and ϕH(yn)are transmitted to a common receiver. In contrast to distributedcompressions in the encoders, the decoder can jointly constructthe estimates x̂n1 and x̂n2 from indices ϕ1(xn1 ) and ϕ2(xn2 )by utilizing the compressed side information ϕH(yn). Thereconstruction process can be implemented by the mappingas follows:

ψ :M1 ×M2 ×MH 7→ Xn1 ×Xn2 . (4)

Since the estimate x̂nj may occasionally deviate from theobservation xnj if the rates are not large enough, the Hammingdistortion measure dj : Xj×Xj 7→ {0, 1} is defined to describethe distortion level between xj and x̂j as

dj(xj , x̂j) =

{1, if xj 6= x̂j ,

0, if xj = x̂j ,for j = 1, 2. (5)

Moreover, we define the average distortion between the se-quences xnj and x̂nj as

dj(xnj , x̂

nj ) =

1

n

n∑i=1

dj(xj(i), x̂j(i)), j = 1, 2. (6)

2If the helper sequence is simply generated by concatenating all sourcesequences together, the helper sequence will have longer sequence length.However, in general, the resources allocated to the helper link are no morethan that of the original source link. Therefore, it is reasonable to assume thatthe helper sequence has the length of n for feasibility and efficiency.

Page 5: Rate-Distortion and Outage Probability Analyses for …...coding rates all falling inside the achievable rate region. Fol-lowing the same logic, for the theoretical performance analysis

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 4

For given distortion requirements (D1, D2), the rate-distortionregion R(D1, D2), consisting of all achievable rate triplets(R1, R2, RH), is defined as

R(D1, D2)

={

(R1, R2, RH) : (R1, R2, RH) is admissible such thatlimn→∞

E(dj(xnj , x̂

nj )) ≤ Dj + ε,

for j = 1, 2, and any ε > 0}. (7)

B. Channel Model

Due to the independent block Rayleigh fading assumptionon each link, the complex channel gains in the link of X1,X2 and Y are h1, h2 and hH, following the two dimensionalGaussian distribution.

It should be emphasized that the step of multiterminalsource coding is only utilized to equivalently derive the theo-retical performance limit, which can be achieved by the codingscheme used for the achievability proof of Shannon’s lossysource-channel separation theorem. However, in the practicalsystem depicted in Fig. 1, the sensor and helper sequencesare not actually encoded into the codeword M for lossycompression. As explained above, this difference does notviolate the theorem, which provides a universal inner bound.Therefore, in the derivation of outage probability, we use s ands′ to denote the modulated symbols and the received signals,respectively. The signals received at the i-th time index areexpressed as

s′j(i) =√Gjhjsj(i) + zj(i), for j = 1, 2, (8)

s′H(i) =√GHhHsH(i) + zH(i), (9)

where G is the geometric gain, and z represents the zero-meanadditive white Gaussian noise (AWGN).

Let Ej = E[|sj(i)|2] and EH = E[|sH(i)|2] be the trans-mitting symbol energies, and the variance of all z be equal toN0/2 per dimension. The average SNRs are given by

γj = Gj · E[|hj |2] · EjN0

, for j = 1, 2, (10)

γH = GH · E[|hH|2] · EH

N0. (11)

Then, the instantaneous SNRs can be calculated by

γj = |hj |2 · γj , for j = 1, 2, (12)

γH = |hH|2 · γH. (13)

We can finally obtain the probability density functions (PDFs)of instantaneous SNR as

p(γj) =1

γjexp(−γj

γj), for j = 1, 2, (14)

p(γH) =1

γHexp(−γH

γH). (15)

III. RATE-DISTORTION ANALYSIS

A. Achievable Rate-Distortion Region

First, from [27], the inner bound on the achievable rate-distortion region with general sources is

R1 > I(X1;U1|U2, V,Q), (16)

R2 > I(X2;U2|U1, V,Q), (17)R1 +R2 > I(X1, X2;U1, U2|V,Q), (18)

RH > I(Y ;V ), (19)

where Uj and V are auxiliary variables containing the com-pressed information in Mj and MH for Xj and Y , respectively;Q is an auxiliary variable resulting from time-sharing [28]between the cases that one of the coding rates is largeenough to independently satisfy the corresponding distortionrequirement. Since Q is an auxiliary variable of time-sharing,we calculate the inner bound with binary sources for |Q| = 1for the first step. Then, we equivalently implement the time-sharing scheme by using a dummy variable. Consider

R1 > I(X1;U1|U2, V )

= H(U1|U2, V )−H(U1|X1, U2, V )

= H(U1|U2, V )−H(U1|X1, X2, U2, V )

− I(U1;X2|X1, U2, V )

= H(U1|U2, V )−H(U1|X1, X2, U2)

− I(U1;X2|X1, U2, V ) (20)= H(U1|U2, V )−H(U1|X1)

− I(U1;X2|X1, U2, V ) (21)= H(U1|U2, V )−H(U1|X1)−H(X2|X1, U2, V )

+H(X2|X1, U1, U2, V )

= H(U1|U2, V )−H(U1|X1)−H(X2|X1, U2, V )

+H(X2|X1, U2, V ) (22)= H(U1|U2, V )−H(U1|X1)

= H(U1|U2)− I(U1;V |U2)−H(U1|X1)

= H2(D1 ∗ ρ ∗D2)− I(U1;V |U2)−H2(D1), (23)

where H2(·) is the binary entropy function and the operation∗ denotes the binary convolution process, i.e., a ∗ b = a(1 −b) + b(1 − a). (20-22) follow since V → Y → (X1, X2) →U1, U2 → X2 → X1 → U1 and U1 → X1 → X2 formthree Markov chains, respectively, with the first Markov chainresulting from the fact that Y is a function of X1 and X2.Symmetrically, we have

R2 > H2(D1 ∗ ρ ∗D2)−H2(D2)− I(U2;V |U1). (24)

Then, consider

R1 +R2 > I(X1, X2;U1, U2|V )

= H(U1, U2|V )−H(U1, U2|X1, X2, V )

= H(U1, U2|V )−H(U1, U2|X1, X2) (25)= H(U1, U2)− I(U1, U2;V )−H(U1, U2|X1, X2)

= H(U1) +H(U2|U1)− I(U1, U2;V )

−H(U1|X1, X2)−H(U2|X1, X2, U1)

= H(U1) +H(U2|U1)− I(U1, U2;V )

−H(U1|X1)−H(U2|X2) (26)= 1 +H2(D1 ∗ ρ ∗D2)− I(U1, U2;V )−H2(D1)

−H2(D2), (27)

where (25) follows since V → Y → (X1, X2) → (U1, U2)form a Markov chain, and (26) follows since X2 → X1 → U1

and U1 → X1 → X2 → U2 form two Markov chains.

Page 6: Rate-Distortion and Outage Probability Analyses for …...coding rates all falling inside the achievable rate region. Fol-lowing the same logic, for the theoretical performance analysis

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 5

Notice that in (23), (24) and (27), it is hard to calculateI(U1;V |U2), I(U2;V |U1) and I(U1, U2;V ) without a specifichelper structure. We consider the theoretical optimal case inwhich the helper sequence contains the mutual information ofsources as much as possible. From the Markov chain U1 →(X1, X2)→ Y → V , we have

I(U1;V |U2) ≤ I(U1;V )

≤ I(Y ;V )

≤ [RH]−, (28)

where [RH]− = min{1, RH}, and hence

R1 > H2(D1 ∗ ρ ∗D2)−H2(D1)− [RH]−. (29)

Likewise, we have

R2 > H2(D1 ∗ ρ ∗D2)−H2(D2)− [RH]−. (30)

Form the Markov chain (U1, U2)→ (X1, X2)→ Y → V , wehave

I(U1, U2;V ) ≤ I(Y ;V ) (31)

≤ [RH]−, (32)

and

R1 +R2 > 1 +H2(D1 ∗ ρ ∗D2)−H2(D1)

−H2(D2)− [RH]−. (33)

To visually present the inner bound with the time-sharingscheme, the rate-distortion region is divided into three parts,as follows:(a) for some 0 ≤ d̃ ≤ D2,{

R1 > H2(D1 ∗ ρ ∗ d̃)−H2(D1)− [RH]−,

R2 > 1−H2(d̃),(34)

(b) for some 0 ≤ d̃ ≤ D1,{R1 > 1−H2(d̃),

R2 > H2(d̃ ∗ ρ ∗D2)−H2(D2)− [RH]−,(35)

(c) common case,

R1 +R2 > 1 +H2(D1 ∗ ρ ∗D2)−H2(D1)

−H2(D2)− [RH]−, (36)

where d̃ is a dummy variable. We calculate the rates R1, R2

and R1 + R2 with given D1 and D2, respectively. Then, weplot the rate-distortion region by combining the three partsshown above, which is equivalent to the time-sharing concept.

B. Performance Evaluation

An overall view of the inner bound on the achievable rate-distortion region is provided in Fig. 3, where the correlationparameter ρ is set at 0.15 and the desired distortion pair(D1, D2) is set at (0.05, 0.05). Clearly, the helper can enhancethe robustness of transmissions by expanding the achievablerate-distortion region as RH increases. However, the above partof the region, i.e., RH ≥ 1, does not change even if the helperrate increases.

0

0 0

0.5

1

0.5 0.5

1.5

1 1

1.51.5

Fig. 3. An overall view of the inner bound on the achievable rate-distortionregion, with ρ = 0.15 and D1 = D2 = 0.05.

In order to verify the results by classical theorems, i.e., theSlepian-Wolf theorem and Berger-Tung inner bound, we plotthe achievable rate-distortion region for given values of RH asin Fig. 4. Note that the Slepian-Wolf theorem is for losslessmultiterminal source coding, i.e., D1 = D2 = 0. Hence, theinner bound is closer to the Slepian-Wolf region when therequired distortions are smaller, as shown in Fig. 4(c); con-versely, the constraints on the coding rates become less strictif more distortions are acceptable. Besides, the inner boundderived in this paper perfectly coincides with the Berger-Tung inner bound when RH = 0, in spite of the distortionrequirements and the correlation level between sources. Thisphenomenon results from the fact that the system model shownin Fig. 2 reduces to the model used in the Berger-Tung innerbound, if the helper link is removed, i.e., equivalently RH = 0.Consequently, the Berger-Tung inner bound can be utilized asa baseline for comparison when analyzing the performanceimprovement provided by the helper. It is noticeable that theachievable rate-distortion region is obviously enlarged as thehelper rate increases, i.e., the communications become morereliable after introducing a helper.

We can investigate the trade-off between the coding ratesand the desired distortions in depth from the curve of the rate-distortion, by setting two source links as symmetric links, i.e.,R1 = R2 and D1 = D2. As depicted in Fig. 5, the derivedinner bound with RH = 0 also precisely matches the Berger-Tung inner bound in terms of the rate-distortion function. ForRH > 0, we can observe significant performance gain providedby a helper. Another interesting observation is that there arestill some distortions when R1 = R2 = 0, even if RH ≥ 1. Thereason for the unavoidable distortion is that H(Xn

1 , Xn2 ) =

H(Xn1 ) + H(Xn

2 |Xn1 ) = n + nH2(ρ) > n ≥ H(Y n) for

all ρ > 0. Hence, the decoder can losslessly reconstruct X1

and X2 only by the helper information Y , if and only if the

Page 7: Rate-Distortion and Outage Probability Analyses for …...coding rates all falling inside the achievable rate region. Fol-lowing the same logic, for the theoretical performance analysis

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 6

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2

0

0.2

0.4

0.6

0.8

1

1.2

1.4

1.6

1.8

2

(a) ρ = 0.3, D1 = D2 = 0.05.

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2

0

0.2

0.4

0.6

0.8

1

1.2

1.4

1.6

1.8

2

(b) ρ = 0.15, D1 = D2 = 0.05.

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2

0

0.2

0.4

0.6

0.8

1

1.2

1.4

1.6

1.8

2

(c) ρ = 0.15, D1 = D2 = 0.005.

Fig. 4. The achievable rate-distortion region for given RH.

sources are completely correlated. There is also no doubt that

0 0.1 0.2 0.3 0.4 0.5

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Fig. 5. The rate-distortion function for symmetric source links.

more correlated sources, i.e., ρ is smaller, require lower codingrates for satisfying the same distortion requirements. However,the gap between the curves with different ρ becomes narroweras the distortion requirements go larger. Therefore, with theincrement of the desired distortions, the correlations betweensources have less effect on the coding rates.

IV. OUTAGE PROBABILITY ANALYSIS

A. Derivation of Outage Probability

From Shannon’s lossy source-channel separation theorem,the distortion requirements (D1, D2) can be satisfied if thefollowing inequalities hold:

Rj(Dj) ≤ Θj(γj) =C(γj)

rj, for j = 1, 2, (37)

RH ≤ ΘH(γH) =C(γH)

rH, (38)

where C(·) is the Shannon capacity using Gaussian code-book; rj and rH stand for the end-to-end coding rates.Therefore, if the link rates (R1, R2, RH) supported by(Θ1(γ1),Θ2(γ2),ΘH(γH)) fall outside the achievable rate-distortion region, the distortion requirements (D1, D2) cannotbe satisfied, i.e., outage event occurs.

For a given value of RH and specified distortion require-ments (D1, D2), the shape of achievable rate-distortion regioncan be illustrated as Fig. 6. In order to calculate the outageprobability, we divide the area of outage into six subareas withcorresponding probabilities P1, P2, · · · , P6. Hence, the outageprobability is calculated as

Pout =

6∑k=1

Pk. (39)

Page 8: Rate-Distortion and Outage Probability Analyses for …...coding rates all falling inside the achievable rate region. Fol-lowing the same logic, for the theoretical performance analysis

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 7

P�

P

P! P" P# P$

Achievable

Region

R�

R

H(X )

1 - H (D )

H (D�*ρ*D ) - H (D ) - [RH]-

H (ρ*D ) - H (D ) - [RH]-

H(X�)1 - H (D�)

H (D�*ρ*D ) - H (D�) - [RH]-

H (D�*ρ) - H (D�) - [RH]-

(D�, d~ )

(d~�, D )

(D�, D )

Fig. 6. Achievable rate-distortion region for calculating outage probability.

With specified distortion requirements, the probabilitiesP1, P2, · · · , P6 are directly determined by the multiple in-tegral with respect to the link rates (R1, R2, RH) for eachsubarea. Since the link rates are eventually supported by theinstantaneous SNRs, the probabilities P1, P2, · · · , P6 can befinally calculated by the multiple integral of the joint PDFwith respect to the instantaneous SNRs.

First, consider

P1 = Pr{0 ≤ R1 ≤ H2(D1 ∗ ρ)−H2(D1)− [RH]−,

H(X2) ≤ R2, 0 ≤ RH}= Pr{0 ≤ Θ1(γ1) ≤ λ1(0), H(X2) ≤ Θ2(γ2),

0 ≤ ΘH(γH)}= Pr{Θ−1

1 (0) ≤ γ1 ≤ Θ−11 [λ1(0)],

Θ−12 [H(X2)] ≤ γ2,Θ

−1H (0) ≤ γH}

=

∫ ∞Θ−1

H (0)

dγH

∫ Θ−11 [λ1(0)]

Θ−11 (0)

dγ1

·∫ ∞

Θ−12 [H(X2)]

p(γ2)p(γ1)p(γH)dγ2, (40)

where λj(d̃) = max{0, H2(Dj∗ρ∗d̃)−H2(Dj)−[ΘH(γH)]−}for j = 1, 2. Notice that H2(Dj ∗ρ∗ d̃) ≤ 1 and H2(Dj) ≥ 0;hence, λj(d̃) = 0 when ΘH(γH) = RH > 1. Therefore, P1 canbe further calculated as

P1 =

∫ Θ−1H (1)

Θ−1H (0)

dγH

∫ Θ−11 [λ1(0)]

Θ−11 (0)

dγ1

·∫ ∞

Θ−12 [H(X2)]

p(γ2)p(γ1)p(γH)dγ2

+

∫ ∞Θ−1

H (1)

dγH

∫ Θ−11 [0]

Θ−11 (0)

dγ1

·∫ ∞

Θ−12 [H(X2)]

p(γ2)p(γ1)p(γH)dγ2

=

∫ Θ−1H (1)

Θ−1H (0)

dγH

∫ Θ−11 [λ1(0)]

Θ−11 (0)

dγ1

·∫ ∞

Θ−12 [H(X2)]

p(γ2)p(γ1)p(γH)dγ2 + 0

=1

γH· exp

(−Θ−1

2 [H(X2)]

γ2

)·∫ Θ−1

H (1)

Θ−1H (0)

exp

(−γH

γH

)·[1− exp

(−Θ−1

1 [λ1(0)]

γ1

)]dγH. (41)

Next, consider

P2 = Pr{0 ≤ R1 ≤ H2(D1 ∗ ρ ∗ d̃2)−H2(D1)− [RH]−,

1−H2(D2) ≤ R2 < H(X2), 0 ≤ RH}= Pr{Θ−1

1 (0) ≤ γ1 ≤ Θ−11 [λ1(d̃2)],

Θ−12 [1−H2(D2)] ≤ γ2 < Θ−1

2 [H(X2)],

Θ−1H (0) ≤ γH}

=

∫ ∞Θ−1

H (0)

dγH

∫ Θ−12 [H(X2)]

Θ−12 [1−H2(D2)]

dγ2

·∫ Θ−1

1 [λ1(d̃2)]

Θ−11 (0)

p(γ1)p(γ2)p(γH)dγ1

=

∫ Θ−1H (1)

Θ−1H (0)

dγH

∫ Θ−12 [H(X2)]

Θ−12 [1−H2(D2)]

dγ2

·∫ Θ−1

1 [λ1(d̃2)]

Θ−11 (0)

p(γ1)p(γ2)p(γH)dγ1

+

∫ ∞Θ−1

H (1)

dγH

∫ Θ−12 [H(X2)]

Θ−12 [1−H2(D2)]

dγ2

·∫ Θ−1

1 [0]

Θ−11 (0)

p(γ1)p(γ2)p(γH)dγ1

=

∫ Θ−1H (1)

Θ−1H (0)

dγH

∫ Θ−12 [H(X2)]

Θ−12 [1−H2(D2)]

dγ2

·∫ Θ−1

1 [λ1(d̃2)]

Θ−11 (0)

p(γ1)p(γ2)p(γH)dγ1 + 0

=1

γ2γH·∫ Θ−1

H (1)

Θ−1H (0)

dγH

·∫ Θ−1

2 [H(X2)]

Θ−12 [1−H2(D2)]

exp

(−γ2

γ2

− γH

γH

[1− exp

(−Θ−1

1 [λ1(d̃2)]

γ1

)]dγ2, (42)

where d̃j = H−12 (1− [Rj ]

−) for j = 1, 2.For P3, consider

P3 = Pr{0 ≤ R1 < H2(D1 ∗ ρ ∗D2)−H2(D1)− [RH]−,

0 ≤ R2 < 1−H2(D2), 0 ≤ RH}= Pr{Θ−1

1 (0) ≤ γ1 < Θ−11 [λ1(D2)],

Θ−12 (0) ≤ γ2 < Θ−1

2 [1−H2(D2)],

Θ−1H (0) ≤ γH}

=

∫ ∞Θ−1

H (0)

dγH

∫ Θ−12 [1−H2(D2)]

Θ−12 (0)

dγ2

·∫ Θ−1

1 [λ1(D2)]

Θ−11 (0)

p(γ1)p(γ2)p(γH)dγ1

Page 9: Rate-Distortion and Outage Probability Analyses for …...coding rates all falling inside the achievable rate region. Fol-lowing the same logic, for the theoretical performance analysis

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 8

=

∫ Θ−1H (1)

Θ−1H (0)

dγH

∫ Θ−12 [1−H2(D2)]

Θ−12 (0)

dγ2

·∫ Θ−1

1 [λ1(D2)]

Θ−11 (0)

p(γ1)p(γ2)p(γH)dγ1

+

∫ ∞Θ−1

H (1)

dγH

∫ Θ−12 [1−H2(D2)]

Θ−12 (0)

dγ2

·∫ Θ−1

1 [0]

Θ−11 (0)

p(γ1)p(γ2)p(γH)dγ1

=

∫ Θ−1H (1)

Θ−1H (0)

dγH

∫ Θ−12 [1−H2(D2)]

Θ−12 (0)

dγ2

·∫ Θ−1

1 [λ1(D2)]

Θ−11 (0)

p(γ1)p(γ2)p(γH)dγ1 + 0

=1

γH·[1− exp

(−Θ−1

2 [1−H2(D2)]

γ2

)]·∫ Θ−1

H (1)

Θ−1H (0)

exp

(−γH

γH

)·[1− exp

(−Θ−1

1 [λ1(D2)]

γ1

)]dγH. (43)

To calculate P4, consider

P4 = Pr{H2(D1 ∗ ρ ∗D2)−H2(D1)− [RH]−

≤ R1 < 1−H2(D1),

0 ≤ R2 ≤ 1 +H2(D1 ∗ ρ ∗D2)−H2(D1)

−H2(D2)− [RH]− − [R1]−,

0 ≤ RH}= Pr{Θ−1

1 [λ1(D2)] ≤ γ1 ≤ Θ−11 [1−H2(D1)],

Θ−12 (0) ≤ γ2 ≤ Θ−1

2 (µ1),Θ−1H (0) ≤ γH}

=

∫ ∞Θ−1

H (0)

dγH

∫ Θ−11 [1−H2(D1)]

Θ−11 [λ1(D2)]

dγ1

·∫ Θ−1

2 (µ1)

Θ−12 (0)

p(γ2)p(γ1)p(γH)dγ2

=

∫ Θ−1H (1)

Θ−1H (0)

dγH

∫ Θ−11 [1−H2(D1)]

Θ−11 [λ1(D2)]

dγ1

·∫ Θ−1

2 (µ1)

Θ−12 (0)

p(γ2)p(γ1)p(γH)dγ2

+

∫ ∞Θ−1

H (1)

dγH

∫ Θ−11 [1−H2(D1)]

Θ−11 [0]

dγ1

·∫ Θ−1

2 (µ1)

Θ−12 (0)

p(γ2)p(γ1)p(γH)dγ2

=1

γ1γH·∫ Θ−1

H (1)

Θ−1H (0)

dγH

·∫ Θ−1

1 [1−H2(D1)]

Θ−11 [λ1(D2)]

exp

(−γ1

γ1

− γH

γH

)·[1− exp

(−Θ−1

2 (µ1)

γ2

)]dγ1

+1

γ1

· exp

(−Θ−1

H (1)

γH

)·∫ Θ−1

1 [1−H2(D1)]

Θ−11 [0]

exp

(−γ1

γ1

)·[1− exp

(−Θ−1

2 (µ′1)

γ2

)]dγ1, (44)

where µj = max{0, 1+H2(D1∗ρ∗D2)−H2(D1)−H2(D2)−[ΘH(γH)]−− [Θj(γj)]

−} and µ′j = max{0, H2(D1 ∗ρ∗D2)−H2(D1)−H2(D2)− [Θj(γj)]

−} for j = 1, 2.Similar to the calculation of P2 and P1, we have

P5 =1

γ1γH·∫ Θ−1

H (1)

Θ−1H (0)

dγH

·∫ Θ−1

1 [H(X1)]

Θ−11 [1−H2(D1)]

exp

(−γ1

γ1

− γH

γH

[1− exp

(−Θ−1

2 [λ2(d̃1)]

γ2

)]dγ1, (45)

P6 =1

γH· exp

(−Θ−1

1 [H(X1)]

γ1

)·∫ Θ−1

H (1)

Θ−1H (0)

exp

(−γH

γH

)·[1− exp

(−Θ−1

2 [λ2(0)]

γ2

)]dγH. (46)

Remark: Following the same logic, we can extend the sys-tem model to the case with more than two sensors, by applyingthe achievable rate-distortion region with multiple sources.However, the calculation of outage probability requires morecomplicated multiple integral.

B. Numerical Results

The outage probability for lossy communications with ahelper is depicted in Fig. 7, where the channel coding rateis set at 1

2 for all the sensors and the helper. For the purposeof plotting the curves in a 2D plane, the average SNRs areset at different values but change at the same speed for eachlink, i.e., γ1 = γ2 + 2 = γH − 3. It should be explainedhere that the curves for the case without a helper only showfirst order diversity, due to the definition of outage event,i.e., the recoveries of the both sources cannot satisfy thedistortion requirements. We can clearly observe from the decayof the curves that with a helper, second order diversity canbe achieved. Obviously, the case with a helper providing theside information achieves higher diversity order than the casewithout a helper. It is found from Fig. 7(a) and Fig. 7(b)that the smaller the correlation between the sources, i.e., ρis larger, the higher the outage probability, which is consistentto our expected results. In addition, it is noticeable that thesystem will have lower outage probability, if the distortionrequirements are less strict. Hence, identifying how to specifythe distortion requirements is valuable and interesting work inthe design of practical IoT systems.

Fig. 8 illustrates the outage probability for fixed averageSNR in the helper link, i.e., only γ1 = γ2 + 2. It is obviousthat the outage curves are shifted to left by increasing theaverage SNR in the helper link. However, the gap between the

Page 10: Rate-Distortion and Outage Probability Analyses for …...coding rates all falling inside the achievable rate region. Fol-lowing the same logic, for the theoretical performance analysis

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 9

-10 -5 0 5 10 1510

-3

10-2

10-1

100

Outa

ge p

robabili

ty

(a) ρ = 0.1.

-10 -5 0 5 10 1510

-3

10-2

10-1

100

Outa

ge p

robabili

ty

(b) ρ = 0.4.

Fig. 7. Outage probability for the sources with different correlation levels.

outage curves becomes narrower when γH is relatively small.Because the channel capacity of the helper link cannot supportlossless transmission of the helper information if γH < 0 dB,while there is no loss of the helper information for γH ≥ 0 dB.Besides, notice that the slope of curve in Fig. 8 is less steepthan that of the case with one helper in Fig. 7. The reasonfor this observation is because the value of γH is fixed (doesnot change along with γ1 and γ2) in Fig. 8, and the effect ofperformance improvement provided by a helper appears in theform of parallel shifting of outage curves. If we use a dashedline to connect the points where γ1 = γ2 + 2 = γH − 3 likein Fig. 7, we can observe second order diversity.

-10 -5 0 5 10 1510

-3

10-2

10-1

100

Outa

ge p

robabili

ty

Fig. 8. Outage probability for diverse average SNRs in the helper link, withρ = 0.2 and D1 = D2 = 0.1.

V. PRACTICAL PERFORMANCE EVALUATION

A. Simulation Design

Encoder 1X1

n

Joint

decoder

Encoder 2X2

n

Yn

Encoder H

Modulator

Modulator

Modulator

X1n^

X2n^

DeM

DeM

DeM

∏1,1 ∏2,1

Fig. 9. Simulation system.

In this section, we start to evaluate the outage probabilityover independent block Rayleigh fading channels for a prac-tical communication system depicted in Fig. 9. Two sensorsindependently encode two correlated sequences Xn

1 and Xn2 ,

and then send them to a common receiver after modulation.Meanwhile, a helper generates its information Y n from Xn

1

and Xn2 by XOR3. Notice that if the helper directly perform

XOR as Y = X1 ⊕ X2 bit by bit, Y n will be almost 0 forhighly correlated sources and waste the helper rate. To makethe XOR helper more efficient, Xn

1 and Xn2 are interleaved

by two interleavers Π1,1 and Π2,1 before XOR, respectively.Subsequently, the helper sequence Y n is encoded, modulatedand finally sent to the receiver. At the common receiver,the received signals are jointly decoded after demodulation(DeM), and the joint decoder finally outputs the hard decisionsX̂n

1 and X̂n2 .

The structure of encoders is illustrated in Fig. 10. Since twosequences Xn

1 and Xn2 are correlated, Xn

j is interleaved by

3Since the optimal helper structure is still an open problem and out of thescope of this paper, we choose a frequently used structure, i.e., XOR, for thepractical performance evaluation.

Page 11: Rate-Distortion and Outage Probability Analyses for …...coding rates all falling inside the achievable rate region. Fol-lowing the same logic, for the theoretical performance analysis

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 10

CC ACC∏j,2∏j,1X jn

(a) Sensor encoder j.

CC ACC∏HYn

(b) Helper encoder H.

Fig. 10. The structure of encoders.

Πj,1 for the first step, so as to disperse noises into differentbits. Then, the interleaved version of Xn

j is successivelyencoded by a convolutional code (CC) and an accumulator(ACC) [29]. In order to exploit the principle of turbo codesin iterative decoding, another interleaver Πj,2 is deployedbetween CC and ACC. For the helper encoder, only oneinterleaver ΠH is needed between CC and ACC.

∏2,2-1

CC-1

LLR2p

LLR2a

Extrinsic

informa on

exchanger

-

X2n^

LLR2e

ACC-1

CC-1

LLR1p

LLR1a

-

X1n^

LLR1e

ACC-1

CC-1

LLRHp

LLRHa

-

LLRHe

∏2,2

∏H-1

∏H

ACC-1

∏1,2-1

∏1,2

: local itera on : global itera on

Fig. 11. The structure of joint decoder.

Fig. 11 shows the structure of corresponding joint decoder,which separately decodes the received signals in local iterationand exchanges mutual information in global iteration. In localiteration, the bits encoded by ACC and CC are respectivelydecoded by the corresponding decoders ACC−1 and CC−1,which exchange log-likelihood ratio (LLR) via a deinterleaverΠ−1 and an interleaver Π. Then, the extrinsic LLR (LLRe)utilized in global iteration is calculated by subtracting thea priori LLR (LLRa) from the a posteriori LLR (LLRp).Subsequently, the extrinsic information exchanger updates thea priori LLRs based on the extrinsic LLRs yielded fromlocal iteration. The joint decoder performs local iteration andglobal iteration in turn, until it cannot obtain obvious iterationgains or exceeds the maximum iteration time. Finally, the harddecision X̂n

j is made from the a posteriori LLR in the lastround of local iteration.

Fig. 12 illustrates the structure of extrinsic informationexchanger. Since the helper information is generated by XOR,the extrinsic LLRs are exchanged among two sensors and

Check node

LLRHa

LLRHe

LLR1e

∏1,1-1

f (·)c

LLR2t

LLR1t

∏2,1

LLR2a

LLR1a

∏2,1-1

f (·)c ∏1,1LLR2e

Fig. 12. The structure of extrinsic information exchanger.

the helper, by the same principle of the check node in low-density parity-check (LDPC) codes. The check node outputstemporary results LLRtj for two sensors, and the a prioriLLRaH for the helper, by

LLRtj = −2 · arctanh(tanh−LLRek

2· tanh

−LLReH2

)

+ LLRej , (47)

LLRaH = −2 · arctanh(∏

j∈{1,2}

tanh−LLRej

2) + LLReH, (48)

where j ∈ {1, 2} and k = {1, 2} \ j. Meanwhile, Xn1 and

Xn2 also have correlations without the helper. For directly

exchanging the extrinsic information between two correlatedsources based on the correlation model [30], LLRej is pro-cessed in the order of Π−1

j,1 → fc(·) → Πk,1, where fc(·) isthe LLR updating function for correlated sources [31]. Finally,the LLRak for sensors is calculated by the sum of LLRtk andthe output from Πk,1.

B. Simulation Results

TABLE ISIMULATION PARAMETERS

Parameter Value

Frame length 104 bits

Number of frames 5× 105

Source coding rate 1

Channel coding rate 1/2

Generator polynomial of CC G = ([3, 2]3)8

Type of interleaver random interleaver

Modulation method BPSK

Maximum iteration time 20

With the setting of parameters listed in Table I4, we canobtain the simulation results of frame error rate (FER) withspecified distortion requirements as depicted in Fig. 13. Forsimplicity, the average SNR is set at the same level for allsensor links and the helper link. Clearly, although there is anobvious gap between the simulation and theoretical results, thesimulation results show the same tendency as the theoreticalresults, i.e., second order diversity, and the reduction of outage

4Due to the long frame length and large number of frames, the simulationrequires quite a long time. Moreover, the main purpose of simulations in thispaper is to verify the tendency of theoretical results, but not to achieve thetheoretical limit. Therefore, we choose relatively simple generator polynomialof CC to accelerate simulations.

Page 12: Rate-Distortion and Outage Probability Analyses for …...coding rates all falling inside the achievable rate region. Fol-lowing the same logic, for the theoretical performance analysis

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 11

-10 -5 0 5 10 15

Average SNR for each link (dB)

10-3

10-2

10-1

100

Outa

ge p

robabili

ty / F

ER

Fig. 13. Simulation results with ρ = 0.1.

probability for less strict distortion requirements. The reasonfor the obvious gap includes two aspects, i.e., the relativelysimple coding scheme, and incomplete utilization of jointtypicality [28] in sequence-wise. First, it is even not easyto achieve Shannon limit for point-to-point communication.In addition, the theoretical inner bound is achieved by jointtypicality coding scheme, which jointly reconstructs estimatesin sequence-wise. However, the joint decoder in simulationexchanges the extrinsic information in bit-wise, which cannotcompletely exploit the joint typicality among the source se-quences and the helper sequence. This observation inspires thenecessity to develop a joint decoding algorithm for exchangingextrinsic information in sequence-wise.

VI. CONCLUSION

In this work, we have analyzed the performance of lossycommunications with a helper in terms of rate-distortion andoutage probability over independent block Rayleigh fadingchannels. Based on Shannon’s lossy source-channel separationtheorem, we start the performance analysis from multiterminalsource coding with a helper, and then take the channel condi-tions into consideration in the derivation of outage probability.For the rate-distortion analysis, we derive an inner bound onthe achievable rate-distortion region for multiterminal sourcecoding with two binary sources and one helper. The theoreticalresults demonstrate that a helper can obviously enlarge theachievable rate-distortion region; moreover, the inner boundderived in this paper coincides with the Berger-Tung innerbound when the helper rate decreases to 0, i.e., the helper linkis equivalently removed. Then, we apply the derived innerbound into the outage probability analysis. In order to brieflycalculate the outage probability, the area outside the achiev-able rate-distortion region is divided into several subareas.Moreover, we investigate the performance improvement by

introducing a helper with respect to the outage probability.The curves of outage probability indicate that a helper canreduce the outage probability, and make the system achievehigher order of diversity. Finally, we design a joint decodingalgorithm for the helper structure being XOR, and conduct aseries of simulations to evaluate the practical performance oflossy communications with a helper. The simulation resultsverify the second order diversity observed in the theoreticalanalysis, and the reduction of outage probability by increasingthe acceptable distortions.

REFERENCES

[1] B. Ahlgren, M. Hidell, and E. C.-H. Ngai, “Internet of Things for smartcities: Interoperability and open data,” IEEE Internet Computing, vol. 20,no. 6, pp. 52–56, Dec. 2016.

[2] A. Irawan and T. Matsumoto, “Feedback-assisted correlated packettransmission with a helper,” IEEE Transactions on Vehicular Technology,May 2018.

[3] R. Tandon, S. Ulukus, and K. Ramchandran, “Secure source coding witha helper,” IEEE Transactions on Information Theory, vol. 59, no. 4, pp.2178–2187, Oct. 2013.

[4] P. Ostovari, J. Wu, and A. Khreishah, “Cooperative internet accessusing helper nodes and opportunistic scheduling,” IEEE Transactionson Vehicular Technology, vol. 66, no. 7, pp. 6439–6448, Jul. 2017.

[5] S. Gherekhloo and A. Sezgin, “Latency-limited broadcast channel withcache-equipped helpers,” IEEE Transactions on Wireless Communica-tions, Jul. 2017.

[6] R. Joda and F. Lahouti, “Network code design for orthogonal two-hopnetwork with broadcasting relay: A joint source-channel-network codingapproach,” IEEE Transactions on Communications, vol. 60, no. 1, pp.132–142, Jan. 2012.

[7] J. He, V. Tervo, S. Qian, Q. Xue, M. Juntti, and T. Matsumoto,“Performance analysis of lossy decode-and-forward for non-orthogonalMARCs,” IEEE Transactions on Wireless Communications, vol. 17,no. 3, pp. 1545–1558, Mar. 2018.

[8] X. Zhou, M. Cheng, X. He, and T. Matsumoto, “Exact and approximatedoutage probability analyses for decode-and-forward relaying systemallowing intra-link errors,” IEEE Transactions on Wireless Communi-cations, vol. 13, no. 12, pp. 7062–7071, Dec. 2014.

[9] J. He, V. Tervo, X. Zhou, X. He, S. Qian, M. Cheng, M. Juntti, andT. Matsumoto, “A tutorial on lossy forwarding cooperative relaying,”IEEE Communications Surveys & Tutorials, vol. 21, no. 1, pp. 66–87,Firstquarter 2018.

[10] C. E. Shannon, “A mathematical theory of communication,” Bell SystemTechnical Journal, vol. 27, no. 3, pp. 379–423, Jul. 1948.

[11] ——, “Coding theorems for a discrete source with a fidelity criterion,”IRE Nat. Conv. Rec, vol. 4, no. 142-163, p. 1, Mar. 1959.

[12] J.-J. Xiao and Z.-Q. Luo, “Multiterminal source–channel communicationover an orthogonal multiple-access channel,” IEEE Transactions onInformation Theory, vol. 53, no. 9, pp. 3255–3264, Sep. 2007.

[13] D. Slepian and J. Wolf, “Noiseless coding of correlated informationsources,” IEEE Transactions on Information Theory, vol. 19, no. 4, pp.471–480, Jul. 1973.

[14] T. Berger, “Multiterminal source coding,” in The Information TheoryApproach to Communications, G. Longo, Ed. New York: Springer-Verlag, 1978, pp. 171–231.

[15] S. Y. Tung, “Multiterminal source coding,” Ph.D. dissertation, Schoolof Electrical Engineering, Cornell University, Ithaca, New York, 1978.

[16] X. He, X. Zhou, P. Komulainen, M. Juntti, and T. Matsumoto, “A lowerbound analysis of hamming distortion for a binary CEO problem withjoint source-channel coding,” IEEE Transactions on Communications,vol. 64, no. 1, pp. 343–353, Jan. 2016.

[17] X. He, X. Zhou, M. Juntti, and T. Matsumoto, “A rate-distortion regionanalysis for a binary CEO problem,” in IEEE 83rd Vehicular TechnologyConference (VTC Spring), Nanjing, China, May 2016, pp. 1–5.

[18] R. Ahlswede and J. Korner, “Source coding with side information anda converse for degraded broadcast channels,” IEEE Transactions onInformation Theory, vol. 21, no. 6, pp. 629–637, Nov. 1975.

[19] A. Wyner and J. Ziv, “The rate-distortion function for source codingwith side information at the decoder,” IEEE Transactions on informationTheory, vol. 22, no. 1, pp. 1–10, Jan. 1976.

Page 13: Rate-Distortion and Outage Probability Analyses for …...coding rates all falling inside the achievable rate region. Fol-lowing the same logic, for the theoretical performance analysis

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 12

[20] A. Sechelea, A. Munteanu, S. Cheng, and N. Deligiannis, “On the rate-distortion function for binary source coding with side information,” IEEETransactions on Communications, vol. 64, no. 12, pp. 5203–5216, Dec.2016.

[21] A. B. Wagner and V. Anantharam, “An improved outer bound formultiterminal source coding,” IEEE Transactions on Information Theory,vol. 54, no. 5, pp. 1919–1937, May 2008.

[22] S. Jana and R. Blahut, “Canonical description for multiterminal sourcecoding,” in IEEE International Symposium on Information Theory(ISIT), Toronto, ON, Canada, Jul. 2008, pp. 697–701.

[23] R. Timo, T. Chan, and A. Grant, “Rate distortion with side-informationat many decoders,” IEEE Transactions on Information Theory, vol. 57,no. 8, pp. 5240–5257, Aug. 2011.

[24] J. N. Laneman, D. N. Tse, and G. W. Wornell, “Cooperative diversityin wireless networks: Efficient protocols and outage behavior,” IEEETransactions on Information Theory, vol. 50, no. 12, pp. 3062–3080,2004.

[25] X. Zhou, P.-S. Lu, K. Anwar, and T. Matsumoto, “Correlated sourcestransmission in orthogonal multiple access relay channel: Theoreticalanalysis and performance evaluation,” IEEE Transactions on WirelessCommunications, vol. 13, no. 3, pp. 1424–1435, Jan. 2014.

[26] P.-S. Lu, X. Zhou, and T. Matsumoto, “Outage probabilities of orthog-onal multiple-access relaying techniques with imperfect source-relaylinks,” IEEE Transactions on Wireless Communications, vol. 14, no. 4,pp. 2269–2280, Dec. 2015.

[27] W. Lin and T. Matsumoto, “An analysis of performance improvementby a helper for wireless sensor networks,” in IEEE 29th AnnualInternational Symposium on Personal, Indoor and Mobile Radio Com-munications (PIMRC), Bologna, Italy, Sep. 2018.

[28] A. El Gamal and Y.-H. Kim, Network information theory. CambridgeUniversity Press, 2011.

[29] K. Anwar and T. Matsumoto, “Accumulator-assisted distributed turbocodes for relay systems exploiting source-relay correlation,” IEEECommunications Letters, vol. 16, no. 7, pp. 1114–1117, Jul. 2012.

[30] J. Garcia-Frias and Y. Zhao, “Near-Shannon/Slepian-Wolf performancefor unknown correlated sources over AWGN channels,” IEEE Transac-tions on Communications, vol. 53, no. 4, pp. 555–559, Apr. 2005.

[31] X. Zhou, X. He, K. Anwar, and T. Matsumoto, “GREAT-CEO: larGescale distRibuted dEcision mAking Technique for wireless Chief Execu-tive Officer problems,” IEICE Transactions on Communications, vol. 95,no. 12, pp. 3654–3662, Dec. 2012.

Wensheng Lin (S’17) received the B.Eng. degreein communication engineering, and the M.Eng. de-gree in electronic and communication engineeringfrom Northwestern Polytechnical University, Xi’an,China, in 2013 and 2016, respectively. He is cur-rently pursuing the Ph.D. degree at the School ofInformation Science, Japan Advanced Institute ofScience and Technology (JAIST), Ishikawa, Japan.His research interests include network informationtheory, distributed source coding, helper structuredesign, and optimal encoding/decoding design.

Qiang Xue (S’09-M’17) received the M.Sc. de-gree in communications engineering from Univer-sity of York, UK, in 2008, and the Dr.Sc. degreein communications engineering from University ofOulu, Finland, in 2016. He is currently workingas a post-doc researcher at the Centre for WirelessCommunications, University of Oulu. His researchinterests span information theory, signal processing,and cooperative communications.

Jiguang He (S’16) received the B.Eng. degree fromHarbin Institute of Technology, Harbin, China, in2010, M.Sc. degree from Xiamen University, Xi-amen, China, in 2013, and Dr. Sc degree fromUnviersity of Oulu, Oulu, Finland, in 2018, all incommunications engineering. From September 2013to March 2015, he was with Key Laboratory ofMillimeter Waves at City University of Hong Kong,conducting research on channel tracking over mil-limeter wave MIMO systems. Since June 2015, hehas been with Centre for Wireless Communications

(CWC), University of Oulu, Oulu, Finland. His research interests spancooperative communications, network information theory, joint source andchannel coding, and distributed compressive sensing.

Markku Juntti (S’93-M’98-SM’04) received hisM.Sc. (EE) and Dr.Sc. (EE) degrees from Universityof Oulu, Oulu, Finland in 1993 and 1997, respec-tively.

Dr. Juntti was with University of Oulu in 1992-98.In academic year 1994-95, he was a Visiting Scholarat Rice University, Houston, Texas. In 1999-2000,he was a Senior Specialist with Nokia Networks.Dr. Juntti has been a professor of communicationsengineering since 2000 at University of Oulu, Centrefor Wireless Communications (CWC), where he

leads the Communications Signal Processing (CSP) Research Group. He alsoserves as Head of CWC - Radio Technologies (RT) Research Unit. Hisresearch interests include signal processing for wireless networks as wellas communication and information theory. He is an author or co-author insome 350 papers published in international journals and conference recordsas well as in books WCDMA for UMTS and Signal Processing Handbook. Dr.Juntti is also an Adjunct Professor at Department of Electrical and ComputerEngineering, Rice University, Houston, Texas, USA.

Dr. Juntti is an Editor of IEEE TRANSACTIONS ON COMMUNICATIONSand was an Associate Editor for IEEE TRANSACTIONS ON VEHICULARTECHNOLOGY in 2002-2008. He was Secretary of IEEE CommunicationSociety Finland Chapter in 1996-97 and the Chairman for years 2000-01.He has been Secretary of the Technical Program Committee (TPC) of the2001 IEEE International Conference on Communications (ICC 2001), andthe Co-Chair of the Technical Program Committee of 2004 Nordic RadioSymposium and 2006 IEEE International Symposium on Personal, Indoor andMobile Radio Communications (PIMRC 2006), and the General Chair of 2011IEEE Communication Theory Workshop (CTW 2011). He has served as Co-Chair of the Signal Processing for Communications Symposium of Globecom2014 Signal Processing for Communications Symposium and IEEE GlobalSIP2016 Symposium on Transceivers and Signal Processing for 5G Wireless andmm-Wave Systems, and ACM NanoCom 2018.

Page 14: Rate-Distortion and Outage Probability Analyses for …...coding rates all falling inside the achievable rate region. Fol-lowing the same logic, for the theoretical performance analysis

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 13

Tad Matsumoto (S’84-SM’95-F’10) received hisB.S., M.S., degrees, both under the mentorship byProf. Shin-Ichi Takahashi, and Ph.D. degree underthe supervision by Prof. Masao Nakagawa, fromKeio University, Yokohama, Japan, in 1978, 1980,and 1991, respectively, all in electrical engineer-ing.

He joined Nippon Telegraph and Telephone Cor-poration (NTT) in April 1980. Since he engagedin NTT, he was involved in a lot of researchand development projects, all for mobile wireless

communications systems. In July 1992, he transferred to NTT DoCoMo,where he researched Code-Division Multiple-Access techniques for MobileCommunication Systems. In April 1994, he transferred to NTT America,where he served as a Senior Technical Advisor of a joint project between NTTand NEXTEL Communications. In March 1996, he returned to NTT DoCoMo,where he served as a Head of the Radio Signal Processing Laboratory untilAugust of 2001; He worked on adaptive signal processing, multiple-inputmultiple-output turbo signal detection, interference cancellation, and space-time coding techniques for broadband mobile communications. In March2002, he moved to University of Oulu, Finland, where he served as a Professorat Centre for Wireless Communications. In 2006, he served as a VisitingProfessor at Ilmenau University of Technology, Ilmenau, Germany, funded bythe German MERCATOR Visiting Professorship Program. Since April 2007,he has been serving as a Professor at Japan Advanced Institute of Science andTechnology (JAIST), Japan, while also keeping a cross-appointment positionat University of Oulu (currently frozen).

He has led a lot of projects funded by Academy-of-Finland, European FP7,and Japan Society for the Promotion of Science as well as by Japanese privatecompanies.

Prof. Matsumoto has been appointed as a Finland Distinguished Professorfor a period from January 2008 to December 2012, funded by the FinnishNational Technology Agency (Tekes) and Finnish Academy, under whichhe preserves the rights to participate in and apply to European and Finnishnational projects. Prof. Matsumoto is a recipient of IEEE VTS OutstandingService Award (2001), Nokia Foundation Visiting Fellow Scholarship Award(2002), IEEE Japan Council Award for Distinguished Service to the Society(2006), IEEE Vehicular Technology Society James R. Evans Avant GardeAward (2006), and Thuringen State Research Award for Advanced AppliedScience (2006), 2007 Best Paper Award of Institute of Electrical, Communica-tion, and Information Engineers of Japan (2008), Telecom System TechnologyAward by the Telecommunications Advancement Foundation (2009), IEEECommunication Letters Exemplary Reviewer (2011), Nikkei Wireless JapanAward (2013), IEEE VTS Recognition for Outstanding Distinguished Lecturer(2016), and IEEE Transactions on Communications Exemplary Reviewer(2018). He is a Fellow of IEEE and a Member of IEICE. He is servingas an IEEE Vehicular Technology Distinguished Speaker since July 2016.