215 research outputs found

    Recent Advances in Joint Wireless Energy and Information Transfer

    Full text link
    In this paper, we provide an overview of the recent advances in microwave-enabled wireless energy transfer (WET) technologies and their applications in wireless communications. Specifically, we divide our discussions into three parts. First, we introduce the state-of-the-art WET technologies and the signal processing techniques to maximize the energy transfer efficiency. Then, we discuss an interesting paradigm named simultaneous wireless information and power transfer (SWIPT), where energy and information are jointly transmitted using the same radio waveform. At last, we review the recent progress in wireless powered communication networks (WPCN), where wireless devices communicate using the power harvested by means of WET. Extensions and future directions are also discussed in each of these areas.Comment: Conference submission accepted by ITW 201

    Secure Full-Duplex Device-to-Device Communication

    Get PDF
    This paper considers full-duplex (FD) device-to-device (D2D) communications in a downlink MISO cellular system in the presence of multiple eavesdroppers. The D2D pair communicate sharing the same frequency band allocated to the cellular users (CUs). Since the D2D users share the same frequency as the CUs, both the base station (BS) and D2D transmissions interfere each other. In addition, due to limited processing capability, D2D users are susceptible to external attacks. Our aim is to design optimal beamforming and power control mechanism to guarantee secure communication while delivering the required quality-of-service (QoS) for the D2D link. In order to improve security, artificial noise (AN) is transmitted by the BS. We design robust beamforming for secure message as well as the AN in the worst-case sense for minimizing total transmit power with imperfect channel state information (CSI) of all links available at the BS. The problem is strictly non-convex with infinitely many constraints. By discovering the hidden convexity of the problem, we derive a rank-one optimal solution for the power minimization problem.Comment: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 201

    Secure Full-Duplex Device-to-Device Communication

    Get PDF
    This paper considers full-duplex (FD) device-to-device (D2D) communications in a downlink MISO cellular system in the presence of multiple eavesdroppers. The D2D pair communicate sharing the same frequency band allocated to the cellular users (CUs). Since the D2D users share the same frequency as the CUs, both the base station (BS) and D2D transmissions interfere each other. In addition, due to limited processing capability, D2D users are susceptible to external attacks. Our aim is to design optimal beamforming and power control mechanism to guarantee secure communication while delivering the required quality-of-service (QoS) for the D2D link. In order to improve security, artificial noise (AN) is transmitted by the BS. We design robust beamforming for secure message as well as the AN in the worst-case sense for minimizing total transmit power with imperfect channel state information (CSI) of all links available at the BS. The problem is strictly non-convex with infinitely many constraints. By discovering the hidden convexity of the problem, we derive a rank-one optimal solution for the power minimization problem.Comment: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 201

    Physical Layer Service Integration in 5G: Potentials and Challenges

    Full text link
    High transmission rate and secure communication have been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems. In this context, the concept of physical-layer security becomes attractive, as it can establish perfect security using only the characteristics of wireless medium. Nonetheless, to further increase the spectral efficiency, an emerging concept, termed physical-layer service integration (PHY-SI), has been recognized as an effective means. Its basic idea is to combine multiple coexisting services, i.e., multicast/broadcast service and confidential service, into one integral service for one-time transmission at the transmitter side. This article first provides a tutorial on typical PHY-SI models. Furthermore, we propose some state-of-the-art solutions to improve the overall performance of PHY-SI in certain important communication scenarios. In particular, we highlight the extension of several concepts borrowed from conventional single-service communications, such as artificial noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These techniques are shown to be effective in the design of reliable and robust PHY-SI schemes. Finally, several potential research directions are identified for future work.Comment: 12 pages, 7 figure

    Secrecy Throughput Maximization for Full-Duplex Wireless Powered IoT Networks under Fairness Constraints

    Full text link
    In this paper, we study the secrecy throughput of a full-duplex wireless powered communication network (WPCN) for internet of things (IoT). The WPCN consists of a full-duplex multi-antenna base station (BS) and a number of sensor nodes. The BS transmits energy all the time, and each node harvests energy prior to its transmission time slot. The nodes sequentially transmit their confidential information to the BS, and the other nodes are considered as potential eavesdroppers. We first formulate the sum secrecy throughput optimization problem of all the nodes. The optimization variables are the duration of the time slots and the BS beamforming vectors in different time slots. The problem is shown to be non-convex. To tackle the problem, we propose a suboptimal two stage approach, referred to as sum secrecy throughput maximization (SSTM). In the first stage, the BS focuses its beamforming to blind the potential eavesdroppers (other nodes) during information transmission time slots. Then, the optimal beamforming vector in the initial non-information transmission time slot and the optimal time slots are derived. We then consider fairness among the nodes and propose max-min fair (MMF) and proportional fair (PLF) algorithms. The MMF algorithm maximizes the minimum secrecy throughput of the nodes, while the PLF tries to achieve a good trade-off between the sum secrecy throughput and fairness among the nodes. Through numerical simulations, we first demonstrate the superior performance of the SSTM to uniform time slotting and beamforming in different settings. Then, we show the effectiveness of the proposed fair algorithms

    Research Issues, Challenges, and Opportunities of Wireless Power Transfer-Aided Full-Duplex Relay Systems

    Get PDF
    We present a comprehensive review for wireless power transfer (WPT)-aided full-duplex (FD) relay systems. Two critical challenges in implementing WPT-aided FD relay systems are presented, that is, pseudo FD realization and high power consumption. Existing time-splitting or power-splitting structure based-WPT-aided FD relay systems can only realize FD operation in one of the time slots or only forward part of the received signal to the destination, belonging to pseudo FD realization. Besides, self-interference is treated as noise and self-interference cancellation (SIC) operation incurs high power consumption at the FD relay node. To this end, a promising solution is outlined to address the two challenges, which realizes consecutive FD realization at all times and forwards all the desired signal to the destination for decoding. Also, active SIC, that is, analog/digital cancellation, is not required by the proposed solution, which effectively reduces the circuit complexity and releases high power consumption at the FD relay node. Specific classifications and performance metrics of WPT-aided FD relay systems are summarized. Some future research is also envisaged for WPT-aided FD systems

    Power Efficient and Secure Full-Duplex Wireless Communication Systems

    Full text link
    In this paper, we study resource allocation for a full-duplex (FD) radio base station serving multiple half-duplex (HD) downlink and uplink users simultaneously. The considered resource allocation algorithm design is formulated as a non-convex optimization problem taking into account minimum required receive signal-to-interference-plus-noise ratios (SINRs) for downlink and uplink communication and maximum tolerable SINRs at potential eavesdroppers. The proposed optimization framework enables secure downlink and uplink communication via artificial noise generation in the downlink for interfering the potential eavesdroppers. We minimize the weighted sum of the total downlink and uplink transmit power by jointly optimizing the downlink beamformer, the artificial noise covariance matrix, and the uplink transmit power. We adopt a semidefinite programming (SDP) relaxation approach to obtain a tractable solution for the considered problem. The tightness of the SDP relaxation is revealed by examining a sufficient condition for the global optimality of the solution. Simulation results demonstrate the excellent performance achieved by the proposed scheme and the significant transmit power savings enabled optimization of the artificial noise covariance matrix.Comment: 6 pages, invited paper, IEEE Conference on Communications and Network Security (CNS) 2015 in Florence, Italy, on September 30, 201
    corecore