4 research outputs found

    Feedback Enhances Simultaneous Wireless Information and Energy Transmission in Multiple Access Channels

    Get PDF
    In this report, the fundamental limits of simultaneous information and energy transmission in the two-user Gaussian multiple access channel (G-MAC) with and without feedback are fully characterized. More specifically, all the achievable information and energy transmission rates (in bits per channel use and energy-units per channel use, respectively) are identified. Furthermore, the fundamental limits on the individual and sum- rates given a minimum energy rate ensured at an energy harvester are also characterized. In the case without feedback, an achievability scheme based on power-splitting and successive interference cancellation is shown to be optimal. Alternatively, in the case with feedback (G-MAC-F), a simple yet optimal achievability scheme based on power-splitting and Ozarow's capacity achieving scheme is presented. Finally, the energy transmission enhancement induced by the use of feedback is quantified. Feedback can at most double the energy transmission rate at high SNRs when the information transmission sum-rate is kept fixed at the sum-capacity of the G-MAC, but it has no effect at very low SNRs.Comment: INRIA REPORT N{\deg}8804, accepted for publication in IEEE transactions on Information Theory, March, 201

    Feedback Enhances Simultaneous Wireless Information and Energy Transmission in Multiple Access Channels

    Get PDF
    International audienceIn this paper, the fundamental limits of simultaneous information and energy transmission in the two-user Gaussian multiple access channel (G-MAC) with and without feedback are fully characterized. More specifically, all the achievable information and energy transmission rates (in bits per channel use and energy-units per channel use, respectively) are identified. Furthermore, the fundamental limits on the individual and sum-rates given a minimum energy rate ensured at an energy harvester are also characterized. In the case without feedback, an achievability scheme based on power-splitting and successive interference cancellation is shown to be optimal. Alternatively, in the case with feedback (G-MAC-F), a simple yet optimal achievability scheme based on power-splitting and Ozarow's capacity achieving scheme is presented. Finally, the energy transmission enhancement induced by the use of feedback is quantified. Feedback can at most double the energy transmission rate at high SNRs when the information transmission sum-rate is kept fixed at the sum-capacity of the G-MAC, but it has no effect at very low SNRs. Index Terms—Feedback, Gaussian multiple access channel, simultaneous information and energy transmission, RF harvesting, information-energy capacity region

    Feedback Enhances Simultaneous Wireless Information and Energy Transmission in Multiple Access Channels

    Get PDF
    accepted for publication in IEEE Transactions on Information Theory, March 2017.In this report, the fundamental limits of simultaneous information and energy transmission in the two-user Gaussian multiple access channel (G-MAC) with and without feedback are fully characterized. More specifically, all the achievable information and energy transmission rates (in bits per channel use and energy-units per channel use, respectively) are identified. Furthermore, the fundamental limits on the individual and sum- rates given a minimum energy rate ensured at an energy harvester are also characterized. In the case without feedback, an achievability scheme based on power-splitting and successive interference cancellation is shown to be optimal. Alternatively, in the case with feedback (G-MAC-F), a simple yet optimal achievability scheme based on power-splitting and Ozarow's capacity achieving scheme is presented. Finally, the energy transmission enhancement induced by the use of feedback is quantified. Feedback can at most double the energy transmission rate at high SNRs when the information transmission sum-rate is kept fixed at the sum-capacity of the G-MAC, but it has no effect at very low SNRs.Dans le présent-rapport, les limites fondamentales de la transmission simultanée d'information et d'énergie dans le canal Gaussien à accès multiple (G-MAC) avec et sans voie de retour sont déterminées.L'ensemble des débits atteignables de transmission d'information et d'énergie (en bits par utilisation canal et en unités d'énergie par utilisation canal respectivement) est identifié.En outre, on caractérise les limites fondamentales sur les débits individuels et le débit-somme de transmission de l'information pour un débit d'énergie donné à l'entrée d'un collecteur d'énergieDans le cas sans voie de retour, on démontre qu'un schéma d'atteignabilité, basé sur la division de puissance et sur l'annulation successive de l'interférence, est optimal.En contrepartie, dans le cas avec voie de retour (G-MAC-F), un schéma d'atteignabilité, simple mais optimal, basé sur la division de puissance et sur le schéma d'Ozarow qui atteint la capacité, est présenté. Finalement, le gain en énergie induit par l'exploitation de la voie de retour est quantifié. La voie de retour peut au mieux dédoubler le débit d'énergie à fort rapport signal sur bruit (RSB) pour un débit-somme d'information égal à la capacité-somme. En revanche, l'utilisation de la voie de retour n'a aucun effect à très faibles RSBs

    Physical layer security solutions against passive and colluding eavesdroppers in large wireless networks and impulsive noise environments

    Get PDF
    Wireless networks have experienced rapid evolutions toward sustainability, scalability and interoperability. The digital economy is driven by future networked societies to a more holistic community of intelligent infrastructures and connected services for a more sustainable and smarter society. Furthermore, an enormous amount of sensitive and confidential information, e.g., medical records, electronic media, financial data, and customer files, is transmitted via wireless channels. The implementation of higher layer key distribution and management was challenged by the emergence of these new advanced systems. In order to resist various malicious abuses and security attacks, physical layer security (PLS) has become an appealing alternative. The basic concept behind PLS is to exploit the characteristics of wireless channels for the confidentiality. Its target is to blind the eavesdroppers such that they cannot extract any confidential information from the received signals. This thesis presents solutions and analyses to improve the PLS in wireless networks. In the second chapter, we investigate the secrecy capacity performance of an amplify-andforward (AF) dual-hop network for both distributed beamforming (DBF) and opportunistic relaying (OR) techniques. We derive the capacity scaling for two large sets; trustworthy relays and untrustworthy aggressive relays cooperating together with a wire-tapper aiming to intercept the message. We show that the capacity scaling in the DBF is lower bounded by a value which depends on the ratio between the number of the trustworthy and the untrustworthy aggressive relays, whereas the capacity scaling of OR is upper bounded by a value depending on the number of relays as well as the signal to noise ratio (SNR). In the third chapter, we propose a new location-based multicasting technique, for dual phase AF large networks, aiming to improve the security in the presence of non-colluding passive eavesdroppers. We analytically demonstrate that the proposed technique increases the security by decreasing the probability of re-choosing a sector that has eavesdroppers, for each transmission time. Moreover, we also show that the secrecy capacity scaling of our technique is the same as for broadcasting. Hereafter, the lower and upper bounds of the secrecy outage probability are calculated, and it is shown that the security performance is remarkably enhanced, compared to the conventional multicasting technique. In the fourth chapter, we propose a new cooperative protocol, for dual phase amplify-andforward large wireless sensor networks, aiming to improve the transmission security while taking into account the limited capabilities of the sensor nodes. In such a network, a portion of the K relays can be potential passive eavesdroppers. To reduce the impact of these untrustworthy relays on the network security, we propose a new transmission protocol, where the source agrees to share with the destination a given channel state information (CSI) of source-trusted relay-destination link to encode the message. Then, the source will use this CSI again to map the right message to a certain sector while transmitting fake messages to the other sectors. Adopting such a security protocol is promising because of the availability of a high number of cheap electronic sensors with limited computational capabilities. For the proposed scheme, we derived the secrecy outage probability (SOP) and demonstrated that the probability of receiving the right encoded information by an untrustworthy relay is inversely proportional to the number of sectors. We also show that the aggressive behavior of cooperating untrusted relays is not effective compared to the case where each untrusted relay is trying to intercept the transmitted message individually. Fifth and last, we investigate the physical layer security performance over Rayleigh fading channels in the presence of impulsive noise, as encountered, for instance, in smart grid environments. For this scheme, secrecy performance metrics were considered with and without destination assisted jamming at the eavesdropper’s side. From the obtained results, it is verified that the SOP, without destination assisted jamming, is flooring at high signal-to-noise-ratio values and that it can be significantly improved with the use of jamming
    corecore