237 research outputs found

    Power Switching Protocol for Two-way Relaying Network under Hardware Impairments

    Get PDF
    In this paper, we analyze the impact of hardware impairments at relay node and source node (i.e. imperfect nodes) on network performance by evaluating outage probability based on the effective signal to noise and distortion ratio (SNDR). Especially, we propose energy harvesting protocol at the relay and source nodes, namely, power switching imperfect relay (PSIR) and power switching imperfect source (PSIS). Aiming to determine the performance of energy constrained network, we first derive closed-form expressions of the outage probability and then the throughput can be maximized in delay-limited transmission mode. The simulation results provide practical insights into the impacts of hardware impairments and power switching factors of the energy harvesting protocol on the performance of energy harvesting enabled two-way relaying network

    Energy harvesting-based spectrum access with incremental cooperation, relay selection and hardware noises

    Get PDF
    In this paper, we propose an energy harvesting (EH)-based spectrum access model in cognitive radio (CR) network. In the proposed scheme, one of available secondary transmitters (STs) helps a primary transmitter (PT) forward primary signals to a primary receiver (PR). Via the cooperation, the selected ST finds opportunities to access licensed bands to transmit secondary signals to its intended secondary receiver (SR). Secondary users are assumed to be mobile, hence, optimization of energy consumption for these users is interested. The EH STs have to harvest energy from the PT's radio-frequency (RF) signals to serve the PTPR communication as well as to transmit their signals. The proposed scheme employs incremental relaying technique in which the PR only requires the assistance from the STs when the transmission between PT and PR is not successful. Moreover, we also investigate impact of hardware impairments on performance of the primary and secondary networks. For performance evaluation, we derive exact and lower-bound expressions of outage probability (OP) over Rayleigh fading channel. Monte-Carlo simulations are performed to verify the theoretical results. The results present that the outage performance of both networks can be enhanced by increasing the number of the ST-SR pairs. In addition, the outage performance of both primary and secondary networks is severely degraded with the increasing of hardware impairment level. It is also shown that fraction of time used for EH and positions of the secondary users significantly impact on the system performance.Web of Science26125024

    Multi-source in DF cooperative networks with the PSR protocol based full-duplex energy harvesting over a Rayleigh fading channel: performance analysis

    Get PDF
    Due to the tremendous energy consumption growth with ever-increasing connected devices, alternative wireless information and power transfer techniques are important not only for theoretical research but also for saving operational costs and for a sustainable growth of wireless communications. In this paper, we investigate the multi-source in decode-and-forward cooperative networks with the power splitting protocol based full-duplex energy harvesting relaying network over a Rayleigh fading channel. In this system model, the multi-source and the destination communicate with each other by both the direct link and an intermediate helping relay. First, we investigate source selection for the best system performance. Then, the closed-form expression of the outage probability and the symbol error ratio are derived. Finally, the Monte Carlo simulation is used for validating the analytical expressions in connection with all main possible system parameters. The research results show that the analytical and simulation results matched well with each other.Web of Science68327526

    Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments

    Get PDF
    In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70

    Enabling non-linear energy harvesting in power domain based multiple access in relaying networks: Outage and ergodic capacity performance analysis

    Get PDF
    The Power Domain-based Multiple Access (PDMA) scheme is considered as one kind of Non-Orthogonal Multiple Access (NOMA) in green communications and can support energy-limited devices by employing wireless power transfer. Such a technique is known as a lifetime-expanding solution for operations in future access policy, especially in the deployment of power-constrained relays for a three-node dual-hop system. In particular, PDMA and energy harvesting are considered as two communication concepts, which are jointly investigated in this paper. However, the dual-hop relaying network system is a popular model assuming an ideal linear energy harvesting circuit, as in recent works, while the practical system situation motivates us to concentrate on another protocol, namely non-linear energy harvesting. As important results, a closed-form formula of outage probability and ergodic capacity is studied under a practical non-linear energy harvesting model. To explore the optimal system performance in terms of outage probability and ergodic capacity, several main parameters including the energy harvesting coefficients, position allocation of each node, power allocation factors, and transmit signal-to-noise ratio (SNR) are jointly considered. To provide insights into the performance, the approximate expressions for the ergodic capacity are given. By matching analytical and Monte Carlo simulations, the correctness of this framework can be examined. With the observation of the simulation results, the figures also show that the performance of energy harvesting-aware PDMA systems under the proposed model can satisfy the requirements in real PDMA applications.Web of Science87art. no. 81

    Secrecy performance of TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under joint constraint of interference and hardware imperfection

    Get PDF
    In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.Web of Science195art. no. 116
    corecore