115 research outputs found

    Optimal Scheduling for Broadcast Erasure Channels with Energy Harvesting Receivers

    Get PDF
    In this paper, an optimal scheduling for broadcasting packets to two receivers over erasure channels with feedback is studied. We propose a probabilistic algorithm for packet broadcasting to two receivers, and it is demonstrated that the algorithm is capacity achieving. The probabilistic algorithm is a feedback-based network coding algorithm. By using the probabilistic broadcasting algorithm, we formulate the problem of maximizing the weighted sum of energy harvesting receivers throughputs for any desired number of channel uses. We consider that the harvesting rate of each receiver changes during time slots and is known prior to transmissions. We optimize number broadcasted packets and charging time in order to maximize the weighted sum of throughputs, and then, a packet broadcasting policy is proposed

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Power-Optimal Feedback-Based Random Spectrum Access for an Energy Harvesting Cognitive User

    Full text link
    In this paper, we study and analyze cognitive radio networks in which secondary users (SUs) are equipped with Energy Harvesting (EH) capability. We design a random spectrum sensing and access protocol for the SU that exploits the primary link's feedback and requires less average sensing time. Unlike previous works proposed earlier in literature, we do not assume perfect feedback. Instead, we take into account the more practical possibilities of overhearing unreliable feedback signals and accommodate spectrum sensing errors. Moreover, we assume an interference-based channel model where the receivers are equipped with multi-packet reception (MPR) capability. Furthermore, we perform power allocation at the SU with the objective of maximizing the secondary throughput under constraints that maintain certain quality-of-service (QoS) measures for the primary user (PU)

    Average age of information with hybrid ARQ under a resource constraint

    Get PDF
    Scheduling the transmission of status updates over an error-prone communication channel is studied in order to minimize the long-term average age of information (AoI) at the destination under a constraint on the average number of transmissions at the source node. After each transmission, the source receives an instantaneous ACK/NACK feedback, and decides on the next update without prior knowledge on the success of future transmissions. First, the optimal scheduling policy is studied under different feedback mechanisms when the channel statistics are known; in particular, the standard automatic repeat request (ARQ) and hybrid ARQ (HARQ) protocols are considered. Then, for an unknown environment, an average-cost reinforcement learning (RL) algorithm is proposed that learns the system parameters and the transmission policy in real time. The effectiveness of the proposed methods are verified through numerical simulations

    Energy Harvesting Communication Networks: Online Policies, Temperature Considerations, and Age of Information

    Get PDF
    This dissertation focuses on characterizing energy management policies for energy harvesting communication networks in the presence of stochastic energy arrivals and temperature constraints. When the energy arrivals are stochastic and are known only causally at the transmitter, we study two performance metrics: throughput and age of information (AoI). When the energy harvesting system performance is affected by the change of the temperature, we consider the throughput metric. When the energy arrivals are stochastic, we study the throughput maximization problem for several network settings. We first consider an energy harvesting broadcast channel where a transmitter serves data to two receivers on the downlink. The battery at the transmitter in which the harvested energy is stored is of finite size. We focus on online transmission schemes where the transmitter knows the energy arrivals only causally as they happen. We consider the case of general independent and identically distributed (i.i.d.) energy arrivals, and propose a near-optimal strategy coined fractional power constant cut-off (FPCC) policy. We show that the FPCC policy is near-optimal in that it yields rates that are within a constant gap from the optimal rate region, for all system parameters. Next, we study online transmission policies for a two-user multiple access channel where both users harvest energy from nature. The energy harvests are i.i.d. over time, but can be arbitrarily correlated between the two users. The transmitters are equipped with arbitrary but finite-sized batteries. We propose a distributed fractional power (DFP) policy, which users implement distributedly with no knowledge of the other user's energy arrival or battery state. We show that the proposed DFP is near-optimal as in the broadcast channel case. Then, we consider online power scheduling for energy harvesting channels in which the users incur processing cost per unit time that they are on. The presence of processing costs forces the users to operate in a bursty mode. We consider the single-user and two-way channels. For the single-user case, we consider the case of the general i.i.d.~energy arrivals. We propose a near-optimal online policy for this case. We then extend our analysis to the case of two-way energy harvesting channels with processing costs; in this case, the users incur processing costs for being on for transmitting or receiving data. Our proposed policy is distributed, which users can apply independently with no need for cooperation or coordination between them. Next, we consider a single-user channel in which the transmitter is equipped with finite-sized data and energy buffers. The transmitter receives energy and data packets randomly and intermittently over time and stores them in the finite-sized buffers. The arrival amounts are known only causally as they happen. We focus on the special case when the energy and data arrivals are fully-correlated. We propose a structured policy and bound its performance by a multiplicative gap from the optimal. We then show that this policy \emph{is optimal} when the energy arrivals dominate the data arrivals, and is \emph{near-optimal} when the data arrivals dominate the energy arrivals. Then, we consider another performance metric which captures the freshness of data, i.e., AoI. For this metric, we first consider an energy harvesting transmitter sending status updates to a receiver over an erasure channel. The energy arrivals and the channel erasures are i.i.d. and Bernoulli distributed in each slot. In order to combat the effects of the erasures in the channel and the uncertainty in the energy arrivals, we use channel coding to encode the status update symbols. We consider two types of channel coding: maximum distance separable (MDS) codes and rateless erasure codes. For each of these models, we study two achievable schemes: best-effort and save-and-transmit. We analyze the average AoI under each of these policies. We show that rateless coding with save-and-transmit outperforms all other schemes. Next, we consider a scenario where the transmitter harvests i.i.d. Bernoulli energy arrivals and status updates carry information about an independent message. The transmitter encodes this message into the timings of the status updates. The receiver needs to extract this encoded information, as well as update the status of the observed phenomenon. The timings of the status updates, therefore, determine both the AoI and the message rate (rate). We study the trade-off between the achievable message rate and the achievable average AoI. We propose several achievable schemes and compare their rate-AoI performances. Then, with the motivation to understand the effects of temperature sensitivity on wireless data transmission performance for energy harvesting communication networks, we study several temperature models. We assume non-causal knowledge of the energy arrivals. First, we consider throughput maximization in a single-user energy harvesting communication system under continuous time energy and temperature constraints. We model three main temperature related physical defects in wireless sensors mathematically, and investigate their impact on throughput maximization. Specifically, we consider temperature dependent energy leakage, effects of processing circuit power on temperature, and temperature increases due to the energy harvesting process itself. In each case, we determine the optimum power schedule. Next, different from the previous work, we consider a discrete time system where transmission power is kept constant in each slot. We consider two models that capture different effects of temperature. In the first model, the temperature is constrained to be below a critical temperature at all time instants; we coin this model as explicit temperature constrained model. We investigate throughput optimal power allocation for multiple energy arrivals under general, as well as temperature and energy limited regimes. In the second model, we consider the effect of the temperature on the channel quality via its influence on additive noise power; we coin this model as implicit temperature constrained model. In this model, the change in the variance of the additive noise due to previous transmissions is non-negligible. In particular, transmitted signals contribute as interference for all subsequent slots and thus affect the signal to interference plus noise ratio (SINR). In this case, we investigate throughput optimal power allocation under general, as well as low and high SINR regimes. Finally, we consider the case in which implicit and explicit temperature constraints are simultaneously active. Finally, we extend the discrete time explicit temperature constraint model to a multi-user setting. We consider a two-user energy harvesting multiple access channel where the temperatures of the nodes are affected by the electromagnetic waves due to data transmission. We study the optimal power allocations when the temperatures of the nodes are subject to peak temperature constraints, where each node has a different peak temperature requirement and the nodes have different temperature parameters. We study the optimal power allocation in this case and derive sufficient conditions under which the rate region collapses to a single pentagon
    corecore