Papers
Topics
Authors
Recent
Search
2000 character limit reached

Joint Identification and Sensing with Noisy Feedback: A Task-Oriented Communication Framework for 6G

Published 31 Mar 2026 in cs.IT | (2603.29649v1)

Abstract: Task-oriented communication is a key enabler of emerging 6G systems, where the objective is to support decisions and actions rather than full message reconstruction. From an information-theoretic perspective, identification (ID) codes provide a natural abstraction for this paradigm by enabling receivers to test whether a task-relevant message was sent, without decoding the entire message. Motivated by the strong impact of feedback on ID and by the growing interest in integrated communication and sensing, this paper studies joint identification and sensing (JIDAS) over state-dependent discrete memoryless channels with noisy strictly causal feedback. The transmitter conveys identification messages while simultaneously estimating the channel state from the feedback signal. For both deterministic and randomized coding schemes, we derive lower and upper bounds on the capacity--distortion function. The results quantify the fundamental limits of JIDAS under noisy feedback and recover existing noiseless-feedback characterizations as special cases.

Summary

  • The paper presents new bounds on identification capacity under distortion constraints with noisy feedback in 6G systems.
  • It introduces joint coding schemes using superposition and random hashing, effectively achieving both identification and state sensing.
  • The analysis provides practical insights for enhancing control and inference in next-generation wireless networks.

Joint Identification and Sensing with Noisy Feedback: A Task-Oriented Communication Framework for 6G

Introduction and Context

Task-oriented communication, in contrast to classical communication paradigms, optimizes information transfer for supporting task execution and decision making rather than for message reconstruction. Emergent 6G applications such as autonomous systems, industrial automation, and machine-type coordination demand stringent requirements where actionable messages, rather than high-throughput data, are central. Identification (ID) coding, as developed by Ahlswede and Dueck, offers a binary hypothesis test for whether a given message was sent, embodying task-centric communication with unique asymptotic properties distinct from Shannon transmission coding. The incorporation of feedback, especially noisy feedback as encountered in practical wireless systems, plays a non-trivial role in ID — a departure from its ineffectual role in boosting classical channel capacity.

Simultaneously, the integration of sensing with communication in wireless systems underscores the need for co-design strategies aligning communication efficiency with state estimation accuracy, particularly in state-dependent channels where feedback is inevitably corrupted. The work "Joint Identification and Sensing with Noisy Feedback: A Task-Oriented Communication Framework for 6G" (2603.29649) develops non-asymptotic and asymptotic bounds for the identification capacity under distortion constraints, providing theoretical foundations for state-aware task-driven wireless system design under realistic (i.e., noisy) feedback.

System Model and Problem Formulation

The system is a state-dependent discrete memoryless channel (SD-DMC), with transition law W(y,zx,s)W(y,z|x,s), where the input XX, output YY, feedback observation ZZ, and state SS are finite-alphabet, discrete random variables. The encoder does not have access to the channel output YY but instead observes ZZ — a strictly causal, possibly noisy function of YY. The state sequence SnS^n is independent and identically distributed (i.i.d), and the system imposes a per-symbol distortion criterion on the transmitter's state estimate, operationalized via a distortion function d(s,s^)d(s,\hat{s}).

Task-oriented communication is instantiated as identification codes: the receiver does not decode the message but answers whether a specific message index was sent, with both type I and II error probabilities vanishing in the limit. Both deterministic and randomized identification code paradigms are considered.

The main performance metric is the capacity–distortion function, characterizing the tradeoff between the achievable identification rates (in the doubly exponential regime) and the sensing distortion under noisy strictly causal feedback.

Main Results: Bounds on Capacity–Distortion

The core results consist of nontrivial lower and upper bounds for both deterministic (DIF) and randomized (RIF) identification codes with sensing, under noisy strictly causal feedback. These bounds depend on the noise statistics of the feedback, the underlying state process, and the distortion threshold.

For deterministic identification codes, the DIF capacity–distortion function is bounded by

XX0

where XX1 is the admissible input symbol set for which the average distortion constraint is met. If the underlying channel capacity is zero, the identification capacity with feedback is also zero.

For randomized codes, the RIF capacity–distortion function is bounded by

XX2

where XX3 is the set of input pmfs meeting the average distortion constraint.

Key assertions include:

  • Noisy feedback fundamentally reduces the identification capacity compared to noiseless feedback, due to both reduced codebook common randomness generation and degraded state estimation performance.
  • The bounds collapse to the noiseless-feedback case when the feedback channel is error free (XX4).

Coding Theorems: Achievability and Converse

The achievability schemes employ superposition coding and structured generation of common randomness leveraging noisy feedback, followed by random hashing for message indexing. In both deterministic and randomized scenarios, reliable identification is guaranteed provided the code construction carefully aligns the rate of common randomness with the task-dependent (distortion) constraints.

The converse bounds utilize type-enumeration and regular-subcode arguments to show that any identification code must obey the mutual information constraint linking the input–feedback process and the output observation, under distortion.

Numerical Example: Binary Channel Tradeoffs

A particular instantiation is considered: a binary state multiplicative channel with XX5 and XX6. With binary Hamming distortion and analytically tractable parameter regimes, the derived lower and upper bounds are evaluated against a time-sharing baseline. The results indicate a strictly positive capacity–distortion region wherein the proposed JIDAS co-design approach outperforms naïve time-sharing. Notably, increasing feedback noise (XX7) diminishes the performance gap, highlighting the nuanced interplay between feedback noise and identification–sensing tradeoff. Figure 1

Figure 1: Lower and upper bounds on the capacity–distortion function XX8 for XX9 in the binary example; JIDAS outperforms conventional time sharing.

Theoretical and Practical Implications

The results rigorously delineate the role of strictly causal, noisy feedback in 6G-oriented task-driven physical-layer systems, clarifying both the limits and operative regimes for identification and state sensing co-design. They generalize the noiseless feedback paradigm, firmly rooting the framework in more realistic feedback environments.

Practically, such a characterization undergirds the design of closed-loop wireless systems for control, autonomy, and collaborative inference, tightly coupling perception and communication objectives—a foundational requirement for next-generation communication-control systems.

Theoretically, the identification–sensing framework exposes new operating points for wireless information theory, stimulating new research at the interface of random coding, feedback communication, rate–distortion theory, and action-oriented system design.

Future Directions

Several non-trivial research avenues emerge:

  • Identifying parametric or structural conditions under which the presented lower and upper bounds coincide, i.e., capacity–distortion optimality.
  • Extending the analysis to rate-limited or delayed feedback scenarios, which are ubiquitous in practical control and edge intelligence networks.
  • Generalizing results to non-discrete (e.g., Gaussian or finite blocklength) channels, multiuser/multiaccess identification–sensing scenarios, and quantum communication frameworks.

Conclusion

The paper establishes a comprehensive information-theoretic foundation for joint identification and sensing in state-dependent channels with noisy feedback, enabling a precise understanding of the identification–sensing tradeoff relevant for 6G and beyond. Both achievability and converse bounds are developed, and the operational implications for task-oriented communication system design are elucidated. The integration of feedback noise considerations marks a critical advance in the theory and practice of wireless communication for control and inference (2603.29649).

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.