11,943 research outputs found

    A Stochastic Geometry-based Demand Response Management Framework for Cellular Networks Powered by Smart Grid

    Full text link
    In this paper, the production decisions across multiple energy suppliers in smart grid, powering cellular networks are investigated. The suppliers are characterized by different offered prices and pollutant emissions levels. The challenge is to decide the amount of energy provided by each supplier to each of the operators such that their profitability is maximized while respecting the maximum tolerated level of CO2 emissions. The cellular operators are characterized by their offered quality of service (QoS) to the subscribers and the number of users that determines their energy requirements. Stochastic geometry is used to determine the average power needed to achieve the target probability of coverage for each operator. The total average power requirements of all networks are fed to an optimization framework to find the optimal amount of energy to be provided from each supplier to the operators. The generalized α\alpha-fair utility function is used to avoid production bias among the suppliers based on profitability of generation. Results illustrate the production behavior of the energy suppliers versus QoS level, cost of energy, capacity of generation, and level of fairness.Comment: 6 pages, 4 figure

    Joint Uplink and Downlink Coverage Analysis of Cellular-based RF-powered IoT Network

    Get PDF
    Ambient radio frequency (RF) energy harvesting has emerged as a promising solution for powering small devices and sensors in massive Internet of Things (IoT) ecosystem due to its ubiquity and cost efficiency. In this paper, we study joint uplink and downlink coverage of cellular-based ambient RF energy harvesting IoT where the cellular network is assumed to be the only source of RF energy. We consider a time division-based approach for power and information transmission where each time-slot is partitioned into three sub-slots: (i) charging sub-slot during which the cellular base stations (BSs) act as RF chargers for the IoT devices, which then use the energy harvested in this sub-slot for information transmission and/or reception during the remaining two sub-slots, (ii) downlink sub-slot during which the IoT device receives information from the associated BS, and (iii) uplink sub-slot during which the IoT device transmits information to the associated BS. For this setup, we characterize the joint coverage probability, which is the joint probability of the events that the typical device harvests sufficient energy in the given time slot and is under both uplink and downlink signal-to-interference-plus-noise ratio (SINR) coverage with respect to its associated BS. This metric significantly generalizes the prior art on energy harvesting communications, which usually focused on downlink or uplink coverage separately. The key technical challenge is in handling the correlation between the amount of energy harvested in the charging sub-slot and the information signal quality (SINR) in the downlink and uplink sub-slots. Dominant BS-based approach is developed to derive tight approximation for this joint coverage probability. Several system design insights including comparison with regularly powered IoT network and throughput-optimal slot partitioning are also provided

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201
    • …
    corecore