10,130 research outputs found
Achievable Secrecy Rates of an Energy Harvesting Device
The secrecy rate represents the amount of information per unit time that can
be securely sent on a communication link. In this work, we investigate the
achievable secrecy rates in an energy harvesting communication system composed
of a transmitter, a receiver and a malicious eavesdropper. In particular,
because of the energy constraints and the channel conditions, it is important
to understand when a device should transmit and to optimize how much power
should be used in order to improve security. Both full knowledge and partial
knowledge of the channel are considered under a Nakagami fading scenario. We
show that high secrecy rates can be obtained only with power and coding rate
adaptation. Moreover, we highlight the importance of optimally dividing the
transmission power in the frequency domain, and note that the optimal scheme
provides high gains in secrecy rate over the uniform power splitting case.
Analytically, we explain how to find the optimal policy and prove some of its
properties. In our numerical evaluation, we discuss how the maximum achievable
secrecy rate changes according to the various system parameters. Furthermore,
we discuss the effects of a finite battery on the system performance and note
that, in order to achieve high secrecy rates, it is not necessary to use very
large batteries.Comment: Accepted for publication in IEEE Journal on Selected Areas in
Communications (Mar. 2016
Energy Management Policies for Energy-Neutral Source-Channel Coding
In cyber-physical systems where sensors measure the temporal evolution of a
given phenomenon of interest and radio communication takes place over short
distances, the energy spent for source acquisition and compression may be
comparable with that used for transmission. Additionally, in order to avoid
limited lifetime issues, sensors may be powered via energy harvesting and thus
collect all the energy they need from the environment. This work addresses the
problem of energy allocation over source acquisition/compression and
transmission for energy-harvesting sensors. At first, focusing on a
single-sensor, energy management policies are identified that guarantee a
maximal average distortion while at the same time ensuring the stability of the
queue connecting source and channel encoders. It is shown that the identified
class of policies is optimal in the sense that it stabilizes the queue whenever
this is feasible by any other technique that satisfies the same average
distortion constraint. Moreover, this class of policies performs an independent
resource optimization for the source and channel encoders. Analog transmission
techniques as well as suboptimal strategies that do not use the energy buffer
(battery) or use it only for adapting either source or channel encoder energy
allocation are also studied for performance comparison. The problem of
optimizing the desired trade-off between average distortion and delay is then
formulated and solved via dynamic programming tools. Finally, a system with
multiple sensors is considered and time-division scheduling strategies are
derived that are able to maintain the stability of all data queues and to meet
the average distortion constraints at all sensors whenever it is feasible.Comment: Submitted to IEEE Transactions on Communications in March 2011; last
update in July 201
Optimal time sharing in underlay cognitive radio systems with RF energy harvesting
Due to the fundamental tradeoffs, achieving spectrum efficiency and energy
efficiency are two contending design challenges for the future wireless
networks. However, applying radio-frequency (RF) energy harvesting (EH) in a
cognitive radio system could potentially circumvent this tradeoff, resulting in
a secondary system with limitless power supply and meaningful achievable
information rates. This paper proposes an online solution for the optimal time
allocation (time sharing) between the EH phase and the information transmission
(IT) phase in an underlay cognitive radio system, which harvests the RF energy
originating from the primary system. The proposed online solution maximizes the
average achievable rate of the cognitive radio system, subject to the
-percentile protection criteria for the primary system. The
optimal time sharing achieves significant gains compared to equal time
allocation between the EH and IT phases.Comment: Proceedings of the 2015 IEEE International Conference on
Communications (IEEE ICC 2015), 8-12 June 2015, London, U
EC-CENTRIC: An Energy- and Context-Centric Perspective on IoT Systems and Protocol Design
The radio transceiver of an IoT device is often where most of the energy is consumed. For this reason, most research so far has focused on low power circuit and energy efficient physical layer designs, with the goal of reducing the average energy per information bit required for communication. While these efforts are valuable per se, their actual effectiveness can be partially neutralized by ill-designed network, processing and resource management solutions, which can become a primary factor of performance degradation, in terms of throughput, responsiveness and energy efficiency. The objective of this paper is to describe an energy-centric and context-aware optimization framework that accounts for the energy impact of the fundamental functionalities of an IoT system and that proceeds along three main technical thrusts: 1) balancing signal-dependent processing techniques (compression and feature extraction) and communication tasks; 2) jointly designing channel access and routing protocols to maximize the network lifetime; 3) providing self-adaptability to different operating conditions through the adoption of suitable learning architectures and of flexible/reconfigurable algorithms and protocols. After discussing this framework, we present some preliminary results that validate the effectiveness of our proposed line of action, and show how the use of adaptive signal processing and channel access techniques allows an IoT network to dynamically tune lifetime for signal distortion, according to the requirements dictated by the application
- …