11,943 research outputs found
A Stochastic Geometry-based Demand Response Management Framework for Cellular Networks Powered by Smart Grid
In this paper, the production decisions across multiple energy suppliers in
smart grid, powering cellular networks are investigated. The suppliers are
characterized by different offered prices and pollutant emissions levels. The
challenge is to decide the amount of energy provided by each supplier to each
of the operators such that their profitability is maximized while respecting
the maximum tolerated level of CO2 emissions. The cellular operators are
characterized by their offered quality of service (QoS) to the subscribers and
the number of users that determines their energy requirements. Stochastic
geometry is used to determine the average power needed to achieve the target
probability of coverage for each operator. The total average power requirements
of all networks are fed to an optimization framework to find the optimal amount
of energy to be provided from each supplier to the operators. The generalized
-fair utility function is used to avoid production bias among the
suppliers based on profitability of generation. Results illustrate the
production behavior of the energy suppliers versus QoS level, cost of energy,
capacity of generation, and level of fairness.Comment: 6 pages, 4 figure
Joint Uplink and Downlink Coverage Analysis of Cellular-based RF-powered IoT Network
Ambient radio frequency (RF) energy harvesting has emerged as a promising
solution for powering small devices and sensors in massive Internet of Things
(IoT) ecosystem due to its ubiquity and cost efficiency. In this paper, we
study joint uplink and downlink coverage of cellular-based ambient RF energy
harvesting IoT where the cellular network is assumed to be the only source of
RF energy. We consider a time division-based approach for power and information
transmission where each time-slot is partitioned into three sub-slots: (i)
charging sub-slot during which the cellular base stations (BSs) act as RF
chargers for the IoT devices, which then use the energy harvested in this
sub-slot for information transmission and/or reception during the remaining two
sub-slots, (ii) downlink sub-slot during which the IoT device receives
information from the associated BS, and (iii) uplink sub-slot during which the
IoT device transmits information to the associated BS. For this setup, we
characterize the joint coverage probability, which is the joint probability of
the events that the typical device harvests sufficient energy in the given time
slot and is under both uplink and downlink signal-to-interference-plus-noise
ratio (SINR) coverage with respect to its associated BS. This metric
significantly generalizes the prior art on energy harvesting communications,
which usually focused on downlink or uplink coverage separately. The key
technical challenge is in handling the correlation between the amount of energy
harvested in the charging sub-slot and the information signal quality (SINR) in
the downlink and uplink sub-slots. Dominant BS-based approach is developed to
derive tight approximation for this joint coverage probability. Several system
design insights including comparison with regularly powered IoT network and
throughput-optimal slot partitioning are also provided
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
- …