3,106 research outputs found
Power Beacon-Assisted Millimeter Wave Ad Hoc Networks
Deployment of low cost power beacons (PBs) is a promising solution for
dedicated wireless power transfer (WPT) in future wireless networks. In this
paper, we present a tractable model for PB-assisted millimeter wave (mmWave)
wireless ad hoc networks, where each transmitter (TX) harvests energy from all
PBs and then uses the harvested energy to transmit information to its desired
receiver. Our model accounts for realistic aspects of WPT and mmWave
transmissions, such as power circuit activation threshold, allowed maximum
harvested power, maximum transmit power, beamforming and blockage. Using
stochastic geometry, we obtain the Laplace transform of the aggregate received
power at the TX to calculate the power coverage probability. We approximate and
discretize the transmit power of each TX into a finite number of discrete power
levels in log scale to compute the channel and total coverage probability. We
compare our analytical predictions to simulations and observe good accuracy.
The proposed model allows insights into effect of system parameters, such as
transmit power of PBs, PB density, main lobe beam-width and power circuit
activation threshold on the overall coverage probability. The results confirm
that it is feasible and safe to power TXs in a mmWave ad hoc network using PBs.Comment: This work has been submitted to the IEEE for possible publication.
Copyright may be transferred without notice, after which this version may no
longer be accessibl
Stochastic Geometry for Modeling, Analysis and Design of Future Wireless Networks
This thesis focuses on the modeling, analysis and design of
future wireless networks with smart devices, i.e., devices with
intelligence and ability to communicate with one another
with/without the control of base stations (BSs). Using stochastic
geometry, we develop realistic yet tractable frameworks to model
and analyze the performance of such networks, while incorporating
the intelligence features of smart devices.
In the first half of the thesis, we develop stochastic geometry
tools to study arbitrarily shaped network regions. Current
techniques in the literature assume the network regions to be
infinite, while practical network regions tend to be arbitrary.
Two well-known networks are considered, where devices have the
ability to: (i) communicate with others without the control of
BSs (i.e., ad-hoc networks), and (ii) opportunistically access
spectrum (i.e., cognitive networks). First, we propose a general
algorithm to derive the distribution of the distance between the
reference node and a random node inside an arbitrarily shaped
ad-hoc network region, which helps to compute the outage
probability. We then study the impact of boundary effects and
show that the outage probability in infinite regions may not be a
meaningful bound for arbitrarily shaped regions. By extending the
developed techniques, we further analyze the performance of
underlay cognitive networks, where different secondary users
(SUs) activity protocols are employed to limit the interference
at a primary user. Leveraging the information exchange among SUs,
we propose a cooperation-based protocol. We show that, in the
short-term sensing scenario, this protocol improves the network's
performance compared to the existing threshold-based protocol.
In the second half of the thesis, we study two recently emerged
networks, where devices have the ability to: (i) communicate
directly with nearby devices under the control of BSs (i.e.,
device-to-device (D2D) communication), and (ii) harvest radio
frequency energy (i.e., energy harvesting networks). We first
analyze the intra-cell interference in a finite cellular region
underlaid with D2D communication, by incorporating a mode
selection scheme to reduce the interference. We derive the outage
probability at the BS and a D2D receiver, and propose a spectrum
reuse ratio metric to assess the overall D2D communication
performance. We demonstrate that, without impairing the
performance at the BS, if the path-loss exponent on cellular link
is slightly lower than that on D2D link, the spectrum reuse ratio
can have negligible decrease while the average number of
successful D2D transmissions increases with the increasing D2D
node density. This indicates that an increasing level of D2D
communication is beneficial in future networks. Then we study an
ad-hoc network with simultaneous wireless information and power
transfer in an infinite region, where transmitters are wirelessly
charged by power beacons. We formulate the total outage
probability in terms of the power and channel outage
probabilities. The former incorporates a power activation
threshold at transmitters, which is a key practical factor that
has been largely ignored in previous work. We show that, although
increasing power beacon's density or transmit power is not always
beneficial for channel outage probability, it improves the
overall network performance
Performance Enhancement for Full-Duplex Relaying with Time-Switching-Based SWIPT in Wireless Sensors Networks
Full-duplex (FD) with simultaneous wireless information and power transfer (SWIPT) in
wireless ad hoc networks has received increased attention as a technology for improving spectrum
and energy efficiency. This paper studies the outage performance for a SWIPT-based decode-andforward
(DF) FD relaying network consisting of a single-antenna source S, a two-antenna relay
R, and a multi-antenna destination D. Specifically, we propose four protocols, namely static timeswitching
factor with selection combining (STSF-SC), static time-switching factor with maximal ratio
combining (STSF-MRC), optimal dynamic time-switching factor with selection combining (ODTSFSC),
and optimal dynamic time-switching factor with maximal ratio combining (ODTSF-MRC) to
fully investigate the outage performance of the proposed system. In particular, the optimal timeswitching
factor from the ODTSF-SC and ODTSF-MRC methods is designed to maximize the total
received data at the destination. In this context, we derive exact closed-formed expressions for all
schemes in terms of the outage probability (OP). Finally, the Monte Carlo simulations are conducted
to corroborate the theoretical analysis’s correctness and the proposed schemes’ effectiveness
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Half-duplex energy harvesting relay network over different fading environment: System performance with effect of hardware impairment
In this paper, we introduce a half-duplex (HD) energy harvesting (EH) relay network over the different fading environment with the effect of hardware impairment (HI). The model system was investigated with the amplify-and-forward (AF) and the power splitting (PS) protocols. The system performance analysis in term of the outage probability (OP), achievable throughput (AT), and bit error rate (BER) were demonstrated with the closed-form expressions. In addition, the power splitting (PS) factor was investigated. We verified the analytical analysis by Monte Carlo simulation with all primary parameters. From the results, we can state that the analytical and simulation results match well with each other.Web of Science911art. no. Unsp 228
Spatial networks with wireless applications
Many networks have nodes located in physical space, with links more common
between closely spaced pairs of nodes. For example, the nodes could be wireless
devices and links communication channels in a wireless mesh network. We
describe recent work involving such networks, considering effects due to the
geometry (convex,non-convex, and fractal), node distribution,
distance-dependent link probability, mobility, directivity and interference.Comment: Review article- an amended version with a new title from the origina
Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy
This paper studies physical layer security in a wireless ad hoc network with
numerous legitimate transmitter-receiver pairs and eavesdroppers. A hybrid
full-/half-duplex receiver deployment strategy is proposed to secure legitimate
transmissions, by letting a fraction of legitimate receivers work in the
full-duplex (FD) mode sending jamming signals to confuse eavesdroppers upon
their information receptions, and letting the other receivers work in the
half-duplex mode just receiving their desired signals. The objective of this
paper is to choose properly the fraction of FD receivers for achieving the
optimal network security performance. Both accurate expressions and tractable
approximations for the connection outage probability and the secrecy outage
probability of an arbitrary legitimate link are derived, based on which the
area secure link number, network-wide secrecy throughput and network-wide
secrecy energy efficiency are optimized respectively. Various insights into the
optimal fraction are further developed and its closed-form expressions are also
derived under perfect self-interference cancellation or in a dense network. It
is concluded that the fraction of FD receivers triggers a non-trivial trade-off
between reliability and secrecy, and the proposed strategy can significantly
enhance the network security performance.Comment: Journal paper, double-column 12 pages, 9 figures, accepted by IEEE
Transactions on Wireless Communications, 201
- …