2,233 research outputs found
Robust Transmissions in Wireless Powered Multi-Relay Networks with Chance Interference Constraints
In this paper, we consider a wireless powered multi-relay network in which a
multi-antenna hybrid access point underlaying a cellular system transmits
information to distant receivers. Multiple relays capable of energy harvesting
are deployed in the network to assist the information transmission. The hybrid
access point can wirelessly supply energy to the relays, achieving multi-user
gains from signal and energy cooperation. We propose a joint optimization for
signal beamforming of the hybrid access point as well as wireless energy
harvesting and collaborative beamforming strategies of the relays. The
objective is to maximize network throughput subject to probabilistic
interference constraints at the cellular user equipment. We formulate the
throughput maximization with both the time-switching and power-splitting
schemes, which impose very different couplings between the operating parameters
for wireless power and information transfer. Although the optimization problems
are inherently non-convex, they share similar structural properties that can be
leveraged for efficient algorithm design. In particular, by exploiting
monotonicity in the throughput, we maximize it iteratively via customized
polyblock approximation with reduced complexity. The numerical results show
that the proposed algorithms can achieve close to optimal performance in terms
of the energy efficiency and throughput.Comment: 14 pages, 8 figure
Secrecy performance of TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under joint constraint of interference and hardware imperfection
In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.Web of Science195art. no. 116
- …