384 research outputs found
Coexistence of RF-powered IoT and a Primary Wireless Network with Secrecy Guard Zones
This paper studies the secrecy performance of a wireless network (primary
network) overlaid with an ambient RF energy harvesting IoT network (secondary
network). The nodes in the secondary network are assumed to be solely powered
by ambient RF energy harvested from the transmissions of the primary network.
We assume that the secondary nodes can eavesdrop on the primary transmissions
due to which the primary network uses secrecy guard zones. The primary
transmitter goes silent if any secondary receiver is detected within its guard
zone. Using tools from stochastic geometry, we derive the probability of
successful connection of the primary network as well as the probability of
secure communication. Two conditions must be jointly satisfied in order to
ensure successful connection: (i) the SINR at the primary receiver is above a
predefined threshold, and (ii) the primary transmitter is not silent. In order
to ensure secure communication, the SINR value at each of the secondary nodes
should be less than a predefined threshold. Clearly, when more secondary nodes
are deployed, more primary transmitters will remain silent for a given guard
zone radius, thus impacting the amount of energy harvested by the secondary
network. Our results concretely show the existence of an optimal deployment
density for the secondary network that maximizes the density of nodes that are
able to harvest sufficient amount of energy. Furthermore, we show the
dependence of this optimal deployment density on the guard zone radius of the
primary network. In addition, we show that the optimal guard zone radius
selected by the primary network is a function of the deployment density of the
secondary network. This interesting coupling between the two networks is
studied using tools from game theory. Overall, this work is one of the few
concrete works that symbiotically merge tools from stochastic geometry and game
theory
Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals
We propose a new scheme to secure a wireless-powered untrusted cooperative-communication network, where a legitimate source node (Alice) transmits her information messages to a legitimate destination node (Bob) through the multiple amplify-and-forward untrusted relays. The relay nodes are assumed to be honest but curious nodes; hence, they are trusted at the service level but are untrusted at the information level. To reduce the energy consumption of the network, only one relay node is selected in each time slot to forward Alice's information signal. We assume a power-splitting-based energy-harvesting scheme, where each relay node splits its received signal into information and energy streams. Since the relay nodes are assumed to be untrusted at the information level, they attempt to decode the information intended to Bob while harvesting energy at the same time. When the relaying mode is selected, the scheme is realized over two non-overlapping time phases. To prevent any information leakage to the untrusted relay nodes, Bob and a cooperative jammer (John) inject jamming (artificial noise) signals during the first phase. During the second phase, the untrusted relay nodes that will not be forwarding the information signal must harvest energy to accumulate more energy to help Alice in future time slots. Moreover, the cooperative jammer will jam the untrusted relays to further power their batteries and prevent them from decoding the information-forwarding relay signal in case they decided to cheat and decode it. We model the battery state transitions at each relay as a finite-state Markov chain and analyze it. Our numerical results show the security gains of our proposed scheme relative to two benchmark schemes.This work was supported by NPRP from the Qatar National Research Fund (a member of Qatar Foundation) under Grant 8-627-2-260. The statements made herein are solely the responsibility of the authors.Scopu
Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer
In this paper, we propose a two-way secure communication scheme where two
transceivers exchange confidential messages via a wireless powered untrusted
amplify-and-forward (AF) relay in the presence of an external jammer. We take
into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ)
scenarios. Based on the time switching (TS) architecture at the relay, the data
transmission is done in three phases. In the first phase, both the
energy-starved nodes, the untrustworthy relay and the jammer, are charged by
non-information radio frequency (RF) signals from the sources. In the second
phase, the two sources send their information signals and concurrently, the
jammer transmits artificial noise to confuse the curious relay. Finally, the
third phase is dedicated to forward a scaled version of the received signal
from the relay to the sources. For the proposed secure transmission schemes, we
derive new closed-form lower-bound expressions for the ergodic secrecy sum rate
(ESSR) in the high signal-to-noise ratio (SNR) regime. We further analyze the
asymptotic ESSR to determine the key parameters; the high SNR slope and the
high SNR power offset of the jamming based scenarios. To highlight the
performance advantage of the proposed FJ, we also examine the scenario of
without jamming (WoJ). Finally, numerical examples and discussions are provided
to acquire some engineering insights, and to demonstrate the impacts of
different system parameters on the secrecy performance of the considered
communication scenarios. The numerical results illustrate that the proposed FJ
significantly outperforms the traditional one-way communication and the
Constellation rotation approach, as well as our proposed benchmarks, the
two-way WoJ and GNJ scenarios.Comment: 14 pages, 6 figures, Submitted to IEEE Transactions on Vehicular
Technolog
Relaying in the Internet of Things (IoT): A Survey
The deployment of relays between Internet of Things (IoT) end devices and gateways can improve link quality. In cellular-based IoT, relays have the potential to reduce base station overload. The energy expended in single-hop long-range communication can be reduced if relays listen to transmissions of end devices and forward these observations to gateways. However, incorporating relays into IoT networks faces some challenges. IoT end devices are designed primarily for uplink communication of small-sized observations toward the network; hence, opportunistically using end devices as relays needs a redesign of both the medium access control (MAC) layer protocol of such end devices and possible addition of new communication interfaces. Additionally, the wake-up time of IoT end devices needs to be synchronized with that of the relays. For cellular-based IoT, the possibility of using infrastructure relays exists, and noncellular IoT networks can leverage the presence of mobile devices for relaying, for example, in remote healthcare. However, the latter presents problems of incentivizing relay participation and managing the mobility of relays. Furthermore, although relays can increase the lifetime of IoT networks, deploying relays implies the need for additional batteries to power them. This can erode the energy efficiency gain that relays offer. Therefore, designing relay-assisted IoT networks that provide acceptable trade-offs is key, and this goes beyond adding an extra transmit RF chain to a relay-enabled IoT end device. There has been increasing research interest in IoT relaying, as demonstrated in the available literature. Works that consider these issues are surveyed in this paper to provide insight into the state of the art, provide design insights for network designers and motivate future research directions
Integrated Data and Energy Communication Network: A Comprehensive Survey
OAPA In order to satisfy the power thirsty of communication devices in the imminent 5G era, wireless charging techniques have attracted much attention both from the academic and industrial communities. Although the inductive coupling and magnetic resonance based charging techniques are indeed capable of supplying energy in a wireless manner, they tend to restrict the freedom of movement. By contrast, RF signals are capable of supplying energy over distances, which are gradually inclining closer to our ultimate goal – charging anytime and anywhere. Furthermore, transmitters capable of emitting RF signals have been widely deployed, such as TV towers, cellular base stations and Wi-Fi access points. This communication infrastructure may indeed be employed also for wireless energy transfer (WET). Therefore, no extra investment in dedicated WET infrastructure is required. However, allowing RF signal based WET may impair the wireless information transfer (WIT) operating in the same spectrum. Hence, it is crucial to coordinate and balance WET and WIT for simultaneous wireless information and power transfer (SWIPT), which evolves to Integrated Data and Energy communication Networks (IDENs). To this end, a ubiquitous IDEN architecture is introduced by summarising its natural heterogeneity and by synthesising a diverse range of integrated WET and WIT scenarios. Then the inherent relationship between WET and WIT is revealed from an information theoretical perspective, which is followed by the critical appraisal of the hardware enabling techniques extracting energy from RF signals. Furthermore, the transceiver design, resource allocation and user scheduling as well as networking aspects are elaborated on. In a nutshell, this treatise can be used as a handbook for researchers and engineers, who are interested in enriching their knowledge base of IDENs and in putting this vision into practice
Robust Transmissions in Wireless Powered Multi-Relay Networks with Chance Interference Constraints
In this paper, we consider a wireless powered multi-relay network in which a
multi-antenna hybrid access point underlaying a cellular system transmits
information to distant receivers. Multiple relays capable of energy harvesting
are deployed in the network to assist the information transmission. The hybrid
access point can wirelessly supply energy to the relays, achieving multi-user
gains from signal and energy cooperation. We propose a joint optimization for
signal beamforming of the hybrid access point as well as wireless energy
harvesting and collaborative beamforming strategies of the relays. The
objective is to maximize network throughput subject to probabilistic
interference constraints at the cellular user equipment. We formulate the
throughput maximization with both the time-switching and power-splitting
schemes, which impose very different couplings between the operating parameters
for wireless power and information transfer. Although the optimization problems
are inherently non-convex, they share similar structural properties that can be
leveraged for efficient algorithm design. In particular, by exploiting
monotonicity in the throughput, we maximize it iteratively via customized
polyblock approximation with reduced complexity. The numerical results show
that the proposed algorithms can achieve close to optimal performance in terms
of the energy efficiency and throughput.Comment: 14 pages, 8 figure
- …