382 research outputs found

    Data Collection in Two-Tier IoT Networks with Radio Frequency (RF) Energy Harvesting Devices and Tags

    Get PDF
    The Internet of things (IoT) is expected to connect physical objects and end-users using technologies such as wireless sensor networks and radio frequency identification (RFID). In addition, it will employ a wireless multi-hop backhaul to transfer data collected by a myriad of devices to users or applications such as digital twins operating in a Metaverse. A critical issue is that the number of packets collected and transferred to the Internet is bounded by limited network resources such as bandwidth and energy. In this respect, IoT networks have adopted technologies such as time division multiple access (TDMA), signal interference cancellation (SIC) and multiple-input multiple-output (MIMO) in order to increase network capacity. Another fundamental issue is energy. To this end, researchers have exploited radio frequency (RF) energy-harvesting technologies to prolong the lifetime of energy constrained sensors and smart devices. Specifically, devices with RF energy harvesting capabilities can rely on ambient RF sources such as access points, television towers, and base stations. Further, an operator may deploy dedicated power beacons that serve as RF-energy sources. Apart from that, in order to reduce energy consumption, devices can adopt ambient backscattering communication technologies. Advantageously, backscattering allows devices to communicate using negligible amount of energy by modulating ambient RF signals. To address the aforementioned issues, this thesis first considers data collection in a two-tier MIMO ambient RF energy-harvesting network. The first tier consists of routers with MIMO capability and a set of source-destination pairs/flows. The second tier consists of energy harvesting devices that rely on RF transmissions from routers for energy supply. The problem is to determine a minimum-length TDMA link schedule that satisfies the traffic demand of source-destination pairs and energy demand of energy harvesting devices. It formulates the problem as a linear program (LP), and outlines a heuristic to construct transmission sets that are then used by the said LP. In addition, it outlines a new routing metric that considers the energy demand of energy harvesting devices to cope with routing requirements of IoT networks. The simulation results show that the proposed algorithm on average achieves 31.25% shorter schedules as compared to competing schemes. In addition, the said routing metric results in link schedules that are at most 24.75% longer than those computed by the LP

    Optimization of Mobile RFID Platforms: A Cross-Layer Approach.

    Get PDF

    Wireless Localization Systems: Statistical Modeling and Algorithm Design

    Get PDF
    Wireless localization systems are essential for emerging applications that rely on context-awareness, especially in civil, logistic, and security sectors. Accurate localization in indoor environments is still a challenge and triggers a fervent research activity worldwide. The performance of such systems relies on the quality of range measurements gathered by processing wireless signals within the sensors composing the localization system. Such range estimates serve as observations for the target position inference. The quality of range estimates depends on the network intrinsic properties and signal processing techniques. Therefore, the system design and analysis call for the statistical modeling of range information and the algorithm design for ranging, localization and tracking. The main objectives of this thesis are: (i) the derivation of statistical models and (ii) the design of algorithms for different wire- less localization systems, with particular regard to passive and semi-passive systems (i.e., active radar systems, passive radar systems, and radio frequency identification systems). Statistical models for the range information are derived, low-complexity algorithms with soft-decision and hard-decision are proposed, and several wideband localization systems have been analyzed. The research activity has been conducted also within the framework of different projects in collaboration with companies and other universities, and within a one-year-long research period at Massachusetts Institute of Technology, Cambridge, MA, USA. The analysis of system performance, the derived models, and the proposed algorithms are validated considering different case studies in realistic scenarios and also using the results obtained under the aforementioned projects

    Defeating Super-Reactive Jammers WithDeception Strategy: Modeling, SignalDetection, and Performance Analysis

    Get PDF
    This paper aims to develop a novel framework to defeat a super-reactive jammer, one of the mostdifficult jamming attacks to deal with in practice. Specifically, the jammer has an unlimited power budgetand is equipped with the self-interference suppression capability to simultaneously attack and listen tothe transmitter’s activities. Consequently, dealing with super-reactive jammers is very challenging. Thus,we introduce a smart deception mechanism to attract the jammer to continuously attack the channel andthen leverage jamming signals to transmit data based on the ambient backscatter communication whichis resilient to radio interference/jamming. To decode the backscattered signals, the maximum likelihood(ML) detector can be adopted. However, the method is notorious for its high computational complexityand require a specific mathematical model for the communication system. Hence, we propose a deeplearning-based detector that can dynamically adapt to any channel and noise distributions. With the LongShort-Term Memory network, our detector can learn the received signals’ dependencies to achieve theperformance close to that of the optimal ML detector. Through simulation and theoretical results, wedemonstrate that with proposed approaches, the more power the jammer uses to attack the channel, thebetter bit error rate performance we can achiev

    Defeating Super-Reactive Jammers WithDeception Strategy: Modeling, SignalDetection, and Performance Analysis

    Get PDF
    This paper aims to develop a novel framework to defeat a super-reactive jammer, one of the mostdifficult jamming attacks to deal with in practice. Specifically, the jammer has an unlimited power budgetand is equipped with the self-interference suppression capability to simultaneously attack and listen tothe transmitter’s activities. Consequently, dealing with super-reactive jammers is very challenging. Thus,we introduce a smart deception mechanism to attract the jammer to continuously attack the channel andthen leverage jamming signals to transmit data based on the ambient backscatter communication whichis resilient to radio interference/jamming. To decode the backscattered signals, the maximum likelihood(ML) detector can be adopted. However, the method is notorious for its high computational complexityand require a specific mathematical model for the communication system. Hence, we propose a deeplearning-based detector that can dynamically adapt to any channel and noise distributions. With the LongShort-Term Memory network, our detector can learn the received signals’ dependencies to achieve theperformance close to that of the optimal ML detector. Through simulation and theoretical results, wedemonstrate that with proposed approaches, the more power the jammer uses to attack the channel, thebetter bit error rate performance we can achiev

    A Prospective Look: Key Enabling Technologies, Applications and Open Research Topics in 6G Networks

    Get PDF
    The fifth generation (5G) mobile networks are envisaged to enable a plethora of breakthrough advancements in wireless technologies, providing support of a diverse set of services over a single platform. While the deployment of 5G systems is scaling up globally, it is time to look ahead for beyond 5G systems. This is driven by the emerging societal trends, calling for fully automated systems and intelligent services supported by extended reality and haptics communications. To accommodate the stringent requirements of their prospective applications, which are data-driven and defined by extremely low-latency, ultra-reliable, fast and seamless wireless connectivity, research initiatives are currently focusing on a progressive roadmap towards the sixth generation (6G) networks. In this article, we shed light on some of the major enabling technologies for 6G, which are expected to revolutionize the fundamental architectures of cellular networks and provide multiple homogeneous artificial intelligence-empowered services, including distributed communications, control, computing, sensing, and energy, from its core to its end nodes. Particularly, this paper aims to answer several 6G framework related questions: What are the driving forces for the development of 6G? How will the enabling technologies of 6G differ from those in 5G? What kind of applications and interactions will they support which would not be supported by 5G? We address these questions by presenting a profound study of the 6G vision and outlining five of its disruptive technologies, i.e., terahertz communications, programmable metasurfaces, drone-based communications, backscatter communications and tactile internet, as well as their potential applications. Then, by leveraging the state-of-the-art literature surveyed for each technology, we discuss their requirements, key challenges, and open research problems
    • …
    corecore