215 research outputs found
Recent Advances in Joint Wireless Energy and Information Transfer
In this paper, we provide an overview of the recent advances in
microwave-enabled wireless energy transfer (WET) technologies and their
applications in wireless communications. Specifically, we divide our
discussions into three parts. First, we introduce the state-of-the-art WET
technologies and the signal processing techniques to maximize the energy
transfer efficiency. Then, we discuss an interesting paradigm named
simultaneous wireless information and power transfer (SWIPT), where energy and
information are jointly transmitted using the same radio waveform. At last, we
review the recent progress in wireless powered communication networks (WPCN),
where wireless devices communicate using the power harvested by means of WET.
Extensions and future directions are also discussed in each of these areas.Comment: Conference submission accepted by ITW 201
Secure Full-Duplex Device-to-Device Communication
This paper considers full-duplex (FD) device-to-device (D2D) communications
in a downlink MISO cellular system in the presence of multiple eavesdroppers.
The D2D pair communicate sharing the same frequency band allocated to the
cellular users (CUs). Since the D2D users share the same frequency as the CUs,
both the base station (BS) and D2D transmissions interfere each other. In
addition, due to limited processing capability, D2D users are susceptible to
external attacks. Our aim is to design optimal beamforming and power control
mechanism to guarantee secure communication while delivering the required
quality-of-service (QoS) for the D2D link. In order to improve security,
artificial noise (AN) is transmitted by the BS. We design robust beamforming
for secure message as well as the AN in the worst-case sense for minimizing
total transmit power with imperfect channel state information (CSI) of all
links available at the BS. The problem is strictly non-convex with infinitely
many constraints. By discovering the hidden convexity of the problem, we derive
a rank-one optimal solution for the power minimization problem.Comment: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 201
Secure Full-Duplex Device-to-Device Communication
This paper considers full-duplex (FD) device-to-device (D2D) communications
in a downlink MISO cellular system in the presence of multiple eavesdroppers.
The D2D pair communicate sharing the same frequency band allocated to the
cellular users (CUs). Since the D2D users share the same frequency as the CUs,
both the base station (BS) and D2D transmissions interfere each other. In
addition, due to limited processing capability, D2D users are susceptible to
external attacks. Our aim is to design optimal beamforming and power control
mechanism to guarantee secure communication while delivering the required
quality-of-service (QoS) for the D2D link. In order to improve security,
artificial noise (AN) is transmitted by the BS. We design robust beamforming
for secure message as well as the AN in the worst-case sense for minimizing
total transmit power with imperfect channel state information (CSI) of all
links available at the BS. The problem is strictly non-convex with infinitely
many constraints. By discovering the hidden convexity of the problem, we derive
a rank-one optimal solution for the power minimization problem.Comment: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 201
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the
key targets that need to be effectively addressed by fifth generation (5G)
wireless systems. In this context, the concept of physical-layer security
becomes attractive, as it can establish perfect security using only the
characteristics of wireless medium. Nonetheless, to further increase the
spectral efficiency, an emerging concept, termed physical-layer service
integration (PHY-SI), has been recognized as an effective means. Its basic idea
is to combine multiple coexisting services, i.e., multicast/broadcast service
and confidential service, into one integral service for one-time transmission
at the transmitter side. This article first provides a tutorial on typical
PHY-SI models. Furthermore, we propose some state-of-the-art solutions to
improve the overall performance of PHY-SI in certain important communication
scenarios. In particular, we highlight the extension of several concepts
borrowed from conventional single-service communications, such as artificial
noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These
techniques are shown to be effective in the design of reliable and robust
PHY-SI schemes. Finally, several potential research directions are identified
for future work.Comment: 12 pages, 7 figure
Secrecy Throughput Maximization for Full-Duplex Wireless Powered IoT Networks under Fairness Constraints
In this paper, we study the secrecy throughput of a full-duplex wireless
powered communication network (WPCN) for internet of things (IoT). The WPCN
consists of a full-duplex multi-antenna base station (BS) and a number of
sensor nodes. The BS transmits energy all the time, and each node harvests
energy prior to its transmission time slot. The nodes sequentially transmit
their confidential information to the BS, and the other nodes are considered as
potential eavesdroppers. We first formulate the sum secrecy throughput
optimization problem of all the nodes. The optimization variables are the
duration of the time slots and the BS beamforming vectors in different time
slots. The problem is shown to be non-convex. To tackle the problem, we propose
a suboptimal two stage approach, referred to as sum secrecy throughput
maximization (SSTM). In the first stage, the BS focuses its beamforming to
blind the potential eavesdroppers (other nodes) during information transmission
time slots. Then, the optimal beamforming vector in the initial non-information
transmission time slot and the optimal time slots are derived. We then consider
fairness among the nodes and propose max-min fair (MMF) and proportional fair
(PLF) algorithms. The MMF algorithm maximizes the minimum secrecy throughput of
the nodes, while the PLF tries to achieve a good trade-off between the sum
secrecy throughput and fairness among the nodes. Through numerical simulations,
we first demonstrate the superior performance of the SSTM to uniform time
slotting and beamforming in different settings. Then, we show the effectiveness
of the proposed fair algorithms
Research Issues, Challenges, and Opportunities of Wireless Power Transfer-Aided Full-Duplex Relay Systems
We present a comprehensive review for wireless power transfer (WPT)-aided full-duplex (FD) relay systems. Two critical challenges in implementing WPT-aided FD relay systems are presented, that is, pseudo FD realization and high power consumption. Existing time-splitting or power-splitting structure based-WPT-aided FD relay systems can only realize FD operation in one of the time slots or only forward part of the received signal to the destination, belonging to pseudo FD realization. Besides, self-interference is treated as noise and self-interference cancellation (SIC) operation incurs high power consumption at the FD relay node. To this end, a promising solution is outlined to address the two challenges, which realizes consecutive FD realization at all times and forwards all the desired signal to the destination for decoding. Also, active SIC, that is, analog/digital cancellation, is not required by the proposed solution, which effectively reduces the circuit complexity and releases high power consumption at the FD relay node. Specific classifications and performance metrics of WPT-aided FD relay systems are summarized. Some future research is also envisaged for WPT-aided FD systems
Power Efficient and Secure Full-Duplex Wireless Communication Systems
In this paper, we study resource allocation for a full-duplex (FD) radio base
station serving multiple half-duplex (HD) downlink and uplink users
simultaneously. The considered resource allocation algorithm design is
formulated as a non-convex optimization problem taking into account minimum
required receive signal-to-interference-plus-noise ratios (SINRs) for downlink
and uplink communication and maximum tolerable SINRs at potential
eavesdroppers. The proposed optimization framework enables secure downlink and
uplink communication via artificial noise generation in the downlink for
interfering the potential eavesdroppers. We minimize the weighted sum of the
total downlink and uplink transmit power by jointly optimizing the downlink
beamformer, the artificial noise covariance matrix, and the uplink transmit
power. We adopt a semidefinite programming (SDP) relaxation approach to obtain
a tractable solution for the considered problem. The tightness of the SDP
relaxation is revealed by examining a sufficient condition for the global
optimality of the solution. Simulation results demonstrate the excellent
performance achieved by the proposed scheme and the significant transmit power
savings enabled optimization of the artificial noise covariance matrix.Comment: 6 pages, invited paper, IEEE Conference on Communications and Network
Security (CNS) 2015 in Florence, Italy, on September 30, 201
- …