15,546 research outputs found
Energy Harvesting Wireless Communications: A Review of Recent Advances
This article summarizes recent contributions in the broad area of energy
harvesting wireless communications. In particular, we provide the current state
of the art for wireless networks composed of energy harvesting nodes, starting
from the information-theoretic performance limits to transmission scheduling
policies and resource allocation, medium access and networking issues. The
emerging related area of energy transfer for self-sustaining energy harvesting
wireless networks is considered in detail covering both energy cooperation
aspects and simultaneous energy and information transfer. Various potential
models with energy harvesting nodes at different network scales are reviewed as
well as models for energy consumption at the nodes.Comment: To appear in the IEEE Journal of Selected Areas in Communications
(Special Issue: Wireless Communications Powered by Energy Harvesting and
Wireless Energy Transfer
A Comprehensive Survey of Potential Game Approaches to Wireless Networks
Potential games form a class of non-cooperative games where unilateral
improvement dynamics are guaranteed to converge in many practical cases. The
potential game approach has been applied to a wide range of wireless network
problems, particularly to a variety of channel assignment problems. In this
paper, the properties of potential games are introduced, and games in wireless
networks that have been proven to be potential games are comprehensively
discussed.Comment: 44 pages, 6 figures, to appear in IEICE Transactions on
Communications, vol. E98-B, no. 9, Sept. 201
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Estimation Diversity and Energy Efficiency in Distributed Sensing
Distributed estimation based on measurements from multiple wireless sensors
is investigated. It is assumed that a group of sensors observe the same
quantity in independent additive observation noises with possibly different
variances. The observations are transmitted using amplify-and-forward (analog)
transmissions over non-ideal fading wireless channels from the sensors to a
fusion center, where they are combined to generate an estimate of the observed
quantity. Assuming that the Best Linear Unbiased Estimator (BLUE) is used by
the fusion center, the equal-power transmission strategy is first discussed,
where the system performance is analyzed by introducing the concept of
estimation outage and estimation diversity, and it is shown that there is an
achievable diversity gain on the order of the number of sensors. The optimal
power allocation strategies are then considered for two cases: minimum
distortion under power constraints; and minimum power under distortion
constraints. In the first case, it is shown that by turning off bad sensors,
i.e., sensors with bad channels and bad observation quality, adaptive power
gain can be achieved without sacrificing diversity gain. Here, the adaptive
power gain is similar to the array gain achieved in Multiple-Input
Single-Output (MISO) multi-antenna systems when channel conditions are known to
the transmitter. In the second case, the sum power is minimized under
zero-outage estimation distortion constraint, and some related energy
efficiency issues in sensor networks are discussed.Comment: To appear at IEEE Transactions on Signal Processin
Network Information Flow with Correlated Sources
In this paper, we consider a network communications problem in which multiple
correlated sources must be delivered to a single data collector node, over a
network of noisy independent point-to-point channels. We prove that perfect
reconstruction of all the sources at the sink is possible if and only if, for
all partitions of the network nodes into two subsets S and S^c such that the
sink is always in S^c, we have that H(U_S|U_{S^c}) < \sum_{i\in S,j\in S^c}
C_{ij}. Our main finding is that in this setup a general source/channel
separation theorem holds, and that Shannon information behaves as a classical
network flow, identical in nature to the flow of water in pipes. At first
glance, it might seem surprising that separation holds in a fairly general
network situation like the one we study. A closer look, however, reveals that
the reason for this is that our model allows only for independent
point-to-point channels between pairs of nodes, and not multiple-access and/or
broadcast channels, for which separation is well known not to hold. This
``information as flow'' view provides an algorithmic interpretation for our
results, among which perhaps the most important one is the optimality of
implementing codes using a layered protocol stack.Comment: Final version, to appear in the IEEE Transactions on Information
Theory -- contains (very) minor changes based on the last round of review
Distributed Optimal Rate-Reliability-Lifetime Tradeoff in Wireless Sensor Networks
The transmission rate, delivery reliability and network lifetime are three
fundamental but conflicting design objectives in energy-constrained wireless
sensor networks. In this paper, we address the optimal
rate-reliability-lifetime tradeoff with link capacity constraint, reliability
constraint and energy constraint. By introducing the weight parameters, we
combine the objectives at rate, reliability, and lifetime into a single
objective to characterize the tradeoff among them. However, the optimization
formulation of the rate-reliability-reliability tradeoff is neither separable
nor convex. Through a series of transformations, a separable and convex problem
is derived, and an efficient distributed Subgradient Dual Decomposition
algorithm (SDD) is proposed. Numerical examples confirm its convergence. Also,
numerical examples investigate the impact of weight parameters on the rate
utility, reliability utility and network lifetime, which provide a guidance to
properly set the value of weight parameters for a desired performance of WSNs
according to the realistic application's requirements.Comment: 27 pages, 10 figure
- …