3,106 research outputs found

    Power Beacon-Assisted Millimeter Wave Ad Hoc Networks

    Get PDF
    Deployment of low cost power beacons (PBs) is a promising solution for dedicated wireless power transfer (WPT) in future wireless networks. In this paper, we present a tractable model for PB-assisted millimeter wave (mmWave) wireless ad hoc networks, where each transmitter (TX) harvests energy from all PBs and then uses the harvested energy to transmit information to its desired receiver. Our model accounts for realistic aspects of WPT and mmWave transmissions, such as power circuit activation threshold, allowed maximum harvested power, maximum transmit power, beamforming and blockage. Using stochastic geometry, we obtain the Laplace transform of the aggregate received power at the TX to calculate the power coverage probability. We approximate and discretize the transmit power of each TX into a finite number of discrete power levels in log scale to compute the channel and total coverage probability. We compare our analytical predictions to simulations and observe good accuracy. The proposed model allows insights into effect of system parameters, such as transmit power of PBs, PB density, main lobe beam-width and power circuit activation threshold on the overall coverage probability. The results confirm that it is feasible and safe to power TXs in a mmWave ad hoc network using PBs.Comment: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessibl

    Stochastic Geometry for Modeling, Analysis and Design of Future Wireless Networks

    No full text
    This thesis focuses on the modeling, analysis and design of future wireless networks with smart devices, i.e., devices with intelligence and ability to communicate with one another with/without the control of base stations (BSs). Using stochastic geometry, we develop realistic yet tractable frameworks to model and analyze the performance of such networks, while incorporating the intelligence features of smart devices. In the first half of the thesis, we develop stochastic geometry tools to study arbitrarily shaped network regions. Current techniques in the literature assume the network regions to be infinite, while practical network regions tend to be arbitrary. Two well-known networks are considered, where devices have the ability to: (i) communicate with others without the control of BSs (i.e., ad-hoc networks), and (ii) opportunistically access spectrum (i.e., cognitive networks). First, we propose a general algorithm to derive the distribution of the distance between the reference node and a random node inside an arbitrarily shaped ad-hoc network region, which helps to compute the outage probability. We then study the impact of boundary effects and show that the outage probability in infinite regions may not be a meaningful bound for arbitrarily shaped regions. By extending the developed techniques, we further analyze the performance of underlay cognitive networks, where different secondary users (SUs) activity protocols are employed to limit the interference at a primary user. Leveraging the information exchange among SUs, we propose a cooperation-based protocol. We show that, in the short-term sensing scenario, this protocol improves the network's performance compared to the existing threshold-based protocol. In the second half of the thesis, we study two recently emerged networks, where devices have the ability to: (i) communicate directly with nearby devices under the control of BSs (i.e., device-to-device (D2D) communication), and (ii) harvest radio frequency energy (i.e., energy harvesting networks). We first analyze the intra-cell interference in a finite cellular region underlaid with D2D communication, by incorporating a mode selection scheme to reduce the interference. We derive the outage probability at the BS and a D2D receiver, and propose a spectrum reuse ratio metric to assess the overall D2D communication performance. We demonstrate that, without impairing the performance at the BS, if the path-loss exponent on cellular link is slightly lower than that on D2D link, the spectrum reuse ratio can have negligible decrease while the average number of successful D2D transmissions increases with the increasing D2D node density. This indicates that an increasing level of D2D communication is beneficial in future networks. Then we study an ad-hoc network with simultaneous wireless information and power transfer in an infinite region, where transmitters are wirelessly charged by power beacons. We formulate the total outage probability in terms of the power and channel outage probabilities. The former incorporates a power activation threshold at transmitters, which is a key practical factor that has been largely ignored in previous work. We show that, although increasing power beacon's density or transmit power is not always beneficial for channel outage probability, it improves the overall network performance

    Performance Enhancement for Full-Duplex Relaying with Time-Switching-Based SWIPT in Wireless Sensors Networks

    Get PDF
    Full-duplex (FD) with simultaneous wireless information and power transfer (SWIPT) in wireless ad hoc networks has received increased attention as a technology for improving spectrum and energy efficiency. This paper studies the outage performance for a SWIPT-based decode-andforward (DF) FD relaying network consisting of a single-antenna source S, a two-antenna relay R, and a multi-antenna destination D. Specifically, we propose four protocols, namely static timeswitching factor with selection combining (STSF-SC), static time-switching factor with maximal ratio combining (STSF-MRC), optimal dynamic time-switching factor with selection combining (ODTSFSC), and optimal dynamic time-switching factor with maximal ratio combining (ODTSF-MRC) to fully investigate the outage performance of the proposed system. In particular, the optimal timeswitching factor from the ODTSF-SC and ODTSF-MRC methods is designed to maximize the total received data at the destination. In this context, we derive exact closed-formed expressions for all schemes in terms of the outage probability (OP). Finally, the Monte Carlo simulations are conducted to corroborate the theoretical analysis’s correctness and the proposed schemes’ effectiveness

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    Half-duplex energy harvesting relay network over different fading environment: System performance with effect of hardware impairment

    Get PDF
    In this paper, we introduce a half-duplex (HD) energy harvesting (EH) relay network over the different fading environment with the effect of hardware impairment (HI). The model system was investigated with the amplify-and-forward (AF) and the power splitting (PS) protocols. The system performance analysis in term of the outage probability (OP), achievable throughput (AT), and bit error rate (BER) were demonstrated with the closed-form expressions. In addition, the power splitting (PS) factor was investigated. We verified the analytical analysis by Monte Carlo simulation with all primary parameters. From the results, we can state that the analytical and simulation results match well with each other.Web of Science911art. no. Unsp 228

    Spatial networks with wireless applications

    Get PDF
    Many networks have nodes located in physical space, with links more common between closely spaced pairs of nodes. For example, the nodes could be wireless devices and links communication channels in a wireless mesh network. We describe recent work involving such networks, considering effects due to the geometry (convex,non-convex, and fractal), node distribution, distance-dependent link probability, mobility, directivity and interference.Comment: Review article- an amended version with a new title from the origina

    Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy

    Full text link
    This paper studies physical layer security in a wireless ad hoc network with numerous legitimate transmitter-receiver pairs and eavesdroppers. A hybrid full-/half-duplex receiver deployment strategy is proposed to secure legitimate transmissions, by letting a fraction of legitimate receivers work in the full-duplex (FD) mode sending jamming signals to confuse eavesdroppers upon their information receptions, and letting the other receivers work in the half-duplex mode just receiving their desired signals. The objective of this paper is to choose properly the fraction of FD receivers for achieving the optimal network security performance. Both accurate expressions and tractable approximations for the connection outage probability and the secrecy outage probability of an arbitrary legitimate link are derived, based on which the area secure link number, network-wide secrecy throughput and network-wide secrecy energy efficiency are optimized respectively. Various insights into the optimal fraction are further developed and its closed-form expressions are also derived under perfect self-interference cancellation or in a dense network. It is concluded that the fraction of FD receivers triggers a non-trivial trade-off between reliability and secrecy, and the proposed strategy can significantly enhance the network security performance.Comment: Journal paper, double-column 12 pages, 9 figures, accepted by IEEE Transactions on Wireless Communications, 201
    corecore