36 research outputs found

    Relaying in the Internet of Things (IoT): A Survey

    Get PDF
    The deployment of relays between Internet of Things (IoT) end devices and gateways can improve link quality. In cellular-based IoT, relays have the potential to reduce base station overload. The energy expended in single-hop long-range communication can be reduced if relays listen to transmissions of end devices and forward these observations to gateways. However, incorporating relays into IoT networks faces some challenges. IoT end devices are designed primarily for uplink communication of small-sized observations toward the network; hence, opportunistically using end devices as relays needs a redesign of both the medium access control (MAC) layer protocol of such end devices and possible addition of new communication interfaces. Additionally, the wake-up time of IoT end devices needs to be synchronized with that of the relays. For cellular-based IoT, the possibility of using infrastructure relays exists, and noncellular IoT networks can leverage the presence of mobile devices for relaying, for example, in remote healthcare. However, the latter presents problems of incentivizing relay participation and managing the mobility of relays. Furthermore, although relays can increase the lifetime of IoT networks, deploying relays implies the need for additional batteries to power them. This can erode the energy efficiency gain that relays offer. Therefore, designing relay-assisted IoT networks that provide acceptable trade-offs is key, and this goes beyond adding an extra transmit RF chain to a relay-enabled IoT end device. There has been increasing research interest in IoT relaying, as demonstrated in the available literature. Works that consider these issues are surveyed in this paper to provide insight into the state of the art, provide design insights for network designers and motivate future research directions

    Throughput Optimization for NOMA Energy Harvesting Cognitive Radio with Multi-UAV-Assisted Relaying under Security Constraints

    Get PDF
    This paper investigates the throughput of a non-orthogonal multiple access (NOMA)-based cognitive radio (CR) system with multiple unmanned aerial vehicle (UAV)-assisted relays under system performance and security constraints. We propose a communication protocol that includes an energy harvesting (EH) phase and multiple communication phases. In the EH phase, the multiple UAV relays (URs) harvest energy from a power beacon. In the first communication phase, a secondary transmitter (ST) uses the collected energy to send confidential signals to the first UR using NOMA. Simultaneously, a ground base station communicates with a primary receiver (PR) under interference from the ST. In the subsequent communication phases, the next URs apply the decode-and-forward technique to transmit the signals. In the last communication phase, the Internet of Things destinations (IDs) receive their signals in the presence of an eavesdropper (EAV). Accordingly, the outage probability of the primary network, the throughput of the secondary network, and the leakage probability at the EAV are analyzed. On this basis, we propose a hybrid search method combining particle swarm optimization (PSO) and continuous genetic algorithm (CGA) to optimize the UR configurations and the NOMA power allocation to maximize the throughput of the secondary network under performance and security constraints

    Secondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraints

    Get PDF
    Recently, the combination of cognitive radio networks with the nonorthogonal multiple access (NOMA) approach has emerged as a viable option for not only improving spectrum usage but also supporting large numbers of wireless communication connections. However, cognitive NOMA networks are unstable and vulnerable because multiple devices operate on the same frequency band. To overcome this drawback, many techniques have been proposed, such as optimal power allocation and interference cancellation. In this paper, we consider an approach by which the secondary transmitter (STx) is able to find the best licensed channel to send its confidential message to the secondary receivers (SRxs) by using the NOMA technique. To combat eavesdroppers and achieve reasonable performance, a power allocation policy that satisfies both the outage probability (OP) constraint of primary users and the security constraint of secondary users is optimized. The closed-form formulas for the OP at the primary base station and the leakage probability for the eavesdropper are obtained with imperfect channel state information. Furthermore, the throughput of the secondary network is analyzed to evaluate the system performance. Based on that, two algorithms (i.e., the continuous genetic algorithm (CGA) for CR NOMA (CGA-CRN) and particle swarm optimization (PSO) for CR NOMA (PSO-CRN)), are applied to optimize the throughput of the secondary network. These optimization algorithms guarantee not only the performance of the primary users but also the security constraints of the secondary users. Finally, simulations are presented to validate our research results and provide insights into how various factors affect system performance

    Secondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraints

    Get PDF
    Recently, the combination of cognitive radio networks with the nonorthogonal multiple access (NOMA) approach has emerged as a viable option for not only improving spectrum usage but also supporting large numbers of wireless communication connections. However, cognitive NOMA networks are unstable and vulnerable because multiple devices operate on the same frequency band. To overcome this drawback, many techniques have been proposed, such as optimal power allocation and interference cancellation. In this paper, we consider an approach by which the secondary transmitter (STx) is able to find the best licensed channel to send its confidential message to the secondary receivers (SRxs) by using the NOMA technique. To combat eavesdroppers and achieve reasonable performance, a power allocation policy that satisfies both the outage probability (OP) constraint of primary users and the security constraint of secondary users is optimized. The closed-form formulas for the OP at the primary base station and the leakage probability for the eavesdropper are obtained with imperfect channel state information. Furthermore, the throughput of the secondary network is analyzed to evaluate the system performance. Based on that, two algorithms (i.e., the continuous genetic algorithm (CGA) for CR NOMA (CGA-CRN) and particle swarm optimization (PSO) for CR NOMA (PSO-CRN)), are applied to optimize the throughput of the secondary network. These optimization algorithms guarantee not only the performance of the primary users but also the security constraints of the secondary users. Finally, simulations are presented to validate our research results and provide insights into how various factors affect system performance

    Power Management Strategies in Energy-Harvesting Wireless Sensor Networks

    Get PDF
    Power management strategies are extremely important in Wireless Sensor Networks (WSNs). The objective is to make the nodes operate as long as possible. In the same context, in this article, our aim is to provide the optimal transmission power to maximize the network lifetime using the Orthogonal Multiple Access Channel (OMAC) in Harvesting System (HS). We consider that the nodes have direct communication with a Fusion Center (FC) with causal Channel Side Information (CSI) at the sender and receiver.We begin the analysis by considering a single transmitter node powered by a rechargeable battery with limited capacity energy. Afterward, we generalize the analysis with M transmitter nodes. In both cases, the transmitters are able to harvest energy from nature.Eventually, we show the viability of our approach in simulations results

    Reconfigurable Intelligent Surface for Physical Layer Security in 6G-IoT: Designs, Issues, and Advances

    Full text link
    Sixth-generation (6G) networks pose substantial security risks because confidential information is transmitted over wireless channels with a broadcast nature, and various attack vectors emerge. Physical layer security (PLS) exploits the dynamic characteristics of wireless environments to provide secure communications, while reconfigurable intelligent surfaces (RISs) can facilitate PLS by controlling wireless transmissions. With RIS-aided PLS, a lightweight security solution can be designed for low-end Internet of Things (IoT) devices, depending on the design scenario and communication objective. This article discusses RIS-aided PLS designs for 6G-IoT networks against eavesdropping and jamming attacks. The theoretical background and literature review of RIS-aided PLS are discussed, and design solutions related to resource allocation, beamforming, artificial noise, and cooperative communication are presented. We provide simulation results to show the effectiveness of RIS in terms of PLS. In addition, we examine the research issues and possible solutions for RIS modeling, channel modeling and estimation, optimization, and machine learning. Finally, we discuss recent advances, including STAR-RIS and malicious RIS.Comment: Accepted for IEEE Internet of Things Journa

    SWIPT model adopting a PS framework to aid IoT networks inspired by the emerging cooperative NOMA technique

    Get PDF
    We present the design for an ultra-low latency and low energy Internet of Things (IoT) network inspired by the emerging cooperative Non-Orthogonal Multiple Access (NOMA) wireless communication technique. The IoT network model consists of a source at the center of the network, a near device inside the network, and a far device outside the network. The far device is in the near proximity of the near device, however. We deploy the near device as a relay to assist the far device. The near device is assumed to be a low energy node. As a result, the near device cannot forward signals to the far device through its own power. We therefore design the IoT network to apply the Simultaneous Wireless Information and Power Transfer (SWIPT) technique so that the near device would be able to harvest energy and use it to forward signals. Two cooperative IoT network scenarios are examined: Half-Duplex (HD) and Full-Duplex (FD) relaying, each with and without eavesdroppers. The design also exploits Power Splitting (PS) factors for fairness in Quality of Service (QoS) for the devices. Novel analysis expressions are obtained accuracy and approximation of closed-forms for Outage Probability (OP), secrecy OP, system throughput and Jain's fairness index. The analysis results are proved and verified by Monte Carlo simulation results.Web of Science9615126148
    corecore