12 research outputs found

    Optimum Wirelessly Powered Relaying

    Get PDF
    This letter maximizes the achievable throughput of a relay-assisted wirelessly powered communications system, where an energy constrained source, assisted by an energy constrained relay and both powered by a dedicated power beacon (PB), communicates with a destination. Considering the time splitting approach, the source and relay first harvest energy from the PB, which is equipped with multiple antennas, and then transmits the information to destination. Simple closed-form expressions are derived for the optimal PB energy beamforming vector and time split for energy harvesting and information transmission. Numerical results and simulations demonstrate the superior performance compared with some intuitive benchmark beamforming scheme. Also, it is found that placing the relay at the middle of the source-destination path is no longer optimal

    Optimization and Analysis of Wireless Powered Multi-antenna Cooperative Systems

    Get PDF
    In this paper, we consider a three-node cooperative wireless powered communication system consisting of a multi-antenna hybrid access point (H-AP) and a single-antenna relay and a single-antenna user. The energy constrained relay and user first harvest energy in the downlink and then the relay assists the user using the harvested power for information transmission in the uplink. The optimal energy beamforming vector and the time split between harvest and cooperation are investigated. To reduce the computational complexity, suboptimal designs are also studied, where closed-form expressions are derived for the energy beamforming vector and the time split. For comparison purposes, we also present a detailed performance analysis in terms of the achievable outage probability and the average throughput of an intuitive energy beamforming scheme, where the H-AP directs all the energy towards the user. The findings of the paper suggest that implementing multiple antennas at the H-AP can significantly improve the system performance, and the closed-form suboptimal energy beamforming vector and time split yields near optimal performance. Also, for the intuitive beamforming scheme, a diversity order of (N+1)/2 can be achieved, where N is the number of antennas at the H-AP

    Wireless powered communication networks using peer harvesting

    Get PDF
    For an energy-constrained wireless network, energy harvesting (EH) is a promising technology to prolong the network life. Whether traditional near-field wireless power transfer (WPT) using inductive and resonant coupling or far-field WPT via radiated electromagnetic waves, both of them draw considerable research interests these years [1], [2]. In particular, the far-field WPT is meaningful for wireless powered communication (WPC) networks. A fundamental tradeoff was first studied for simultaneous wireless information and power transfer (SWIPT) in [3], [4]. These results aroused the interest of researchers. Subsequently, wireless communication with EH technology was presented in [5], [6]

    Game theory-based resource allocation for secure WPCN multiantenna multicasting systems

    Get PDF
    This paper investigates a secure wireless-powered multiantenna multicasting system, where multiple power beacons (PBs) supply power to a transmitter in order to establish a reliable communication link with multiple legitimate users in the presence of multiple eavesdroppers. The transmitter has to harvest radio frequency (RF) energy from multiple PBs due to the shortage of embedded power supply before establishing its secure com- munication. We exploit a novel and practical scenario that the PBs and the transmitter may belong to different operators and a hierarchical energy interaction between the PBs and the transmitter is considered. Specifically, the monetary incentives are required for the PBs to assist the transmitter for secure communications. This leads to the formulation of a Stackelberg game for the secure wireless-powered multiantenna multicasting system, where the transmitter and the PB are modelled as leader and follower, respectively, each maximizing their own utility function. The closed-form Stackelberg equilibrium of the formulated game is then derived where we study various scenarios of eavesdroppers and legitimate users that can have impact on the optimality of the derived solutions. Finally, numerical results are provided to validate our proposed schemes

    Game theory-based resource allocation for secure WPCN multiantenna multicasting systems

    Get PDF
    This paper investigates a secure wireless-powered multiantenna multicasting system, where multiple power beacons (PBs) supply power to a transmitter in order to establish a reliable communication link with multiple legitimate users in the presence of multiple eavesdroppers. The transmitter has to harvest radio frequency (RF) energy from multiple PBs due to the shortage of embedded power supply before establishing its secure com- munication. We exploit a novel and practical scenario that the PBs and the transmitter may belong to different operators and a hierarchical energy interaction between the PBs and the transmitter is considered. Specifically, the monetary incentives are required for the PBs to assist the transmitter for secure communications. This leads to the formulation of a Stackelberg game for the secure wireless-powered multiantenna multicasting system, where the transmitter and the PB are modelled as leader and follower, respectively, each maximizing their own utility function. The closed-form Stackelberg equilibrium of the formulated game is then derived where we study various scenarios of eavesdroppers and legitimate users that can have impact on the optimality of the derived solutions. Finally, numerical results are provided to validate our proposed schemes

    Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks

    Get PDF
    CCBY By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas (LSMA) system, while the rest are equipped with a single-antenna. To prevent the untrusted relay from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as destination-based cooperative jamming (DBCJ). Given this system model, novel closed-form expressions are presented in the high signal-to-noise ratio (SNR) regime for the ergodic secrecy rate (ESR) and the secrecy outage probability (SOP). We further improve the secrecy performance of the system by optimizing the associated hardware design. The results reveal that by beneficially distributing the tolerable hardware imperfections across the transmission and reception radio-frequency (RF) front ends of each node, the system & #x2019;s secrecy rate may be improved. The engineering insight is that equally sharing the total imperfections at the relay between the transmitter and the receiver provides the best secrecy performance. Numerical results illustrate that the proposed OPA together with the most appropriate hardware design significantly increases the secrecy rate
    corecore