14,415 research outputs found
Wireless Power Transfer in Massive MIMO Aided HetNets with User Association
This paper explores the potential of wireless power transfer (WPT) in massive
multiple input multiple output (MIMO) aided heterogeneous networks (HetNets),
where massive MIMO is applied in the macrocells, and users aim to harvest as
much energy as possible and reduce the uplink path loss for enhancing their
information transfer. By addressing the impact of massive MIMO on the user
association, we compare and analyze two user association schemes. We adopt the
linear maximal ratio transmission beam-forming for massive MIMO power transfer
to recharge users. By deriving new statistical properties, we obtain the exact
and asymptotic expressions for the average harvested energy. Then we derive the
average uplink achievable rate under the harvested energy constraint.Comment: 36 pages, 11 figures, to appear in IEEE Transactions on
Communication
Robust Transmissions in Wireless Powered Multi-Relay Networks with Chance Interference Constraints
In this paper, we consider a wireless powered multi-relay network in which a
multi-antenna hybrid access point underlaying a cellular system transmits
information to distant receivers. Multiple relays capable of energy harvesting
are deployed in the network to assist the information transmission. The hybrid
access point can wirelessly supply energy to the relays, achieving multi-user
gains from signal and energy cooperation. We propose a joint optimization for
signal beamforming of the hybrid access point as well as wireless energy
harvesting and collaborative beamforming strategies of the relays. The
objective is to maximize network throughput subject to probabilistic
interference constraints at the cellular user equipment. We formulate the
throughput maximization with both the time-switching and power-splitting
schemes, which impose very different couplings between the operating parameters
for wireless power and information transfer. Although the optimization problems
are inherently non-convex, they share similar structural properties that can be
leveraged for efficient algorithm design. In particular, by exploiting
monotonicity in the throughput, we maximize it iteratively via customized
polyblock approximation with reduced complexity. The numerical results show
that the proposed algorithms can achieve close to optimal performance in terms
of the energy efficiency and throughput.Comment: 14 pages, 8 figure
Coexistence of RF-powered IoT and a Primary Wireless Network with Secrecy Guard Zones
This paper studies the secrecy performance of a wireless network (primary
network) overlaid with an ambient RF energy harvesting IoT network (secondary
network). The nodes in the secondary network are assumed to be solely powered
by ambient RF energy harvested from the transmissions of the primary network.
We assume that the secondary nodes can eavesdrop on the primary transmissions
due to which the primary network uses secrecy guard zones. The primary
transmitter goes silent if any secondary receiver is detected within its guard
zone. Using tools from stochastic geometry, we derive the probability of
successful connection of the primary network as well as the probability of
secure communication. Two conditions must be jointly satisfied in order to
ensure successful connection: (i) the SINR at the primary receiver is above a
predefined threshold, and (ii) the primary transmitter is not silent. In order
to ensure secure communication, the SINR value at each of the secondary nodes
should be less than a predefined threshold. Clearly, when more secondary nodes
are deployed, more primary transmitters will remain silent for a given guard
zone radius, thus impacting the amount of energy harvested by the secondary
network. Our results concretely show the existence of an optimal deployment
density for the secondary network that maximizes the density of nodes that are
able to harvest sufficient amount of energy. Furthermore, we show the
dependence of this optimal deployment density on the guard zone radius of the
primary network. In addition, we show that the optimal guard zone radius
selected by the primary network is a function of the deployment density of the
secondary network. This interesting coupling between the two networks is
studied using tools from game theory. Overall, this work is one of the few
concrete works that symbiotically merge tools from stochastic geometry and game
theory
- …