42 research outputs found

    Relaying in the Internet of Things (IoT): A Survey

    Get PDF
    The deployment of relays between Internet of Things (IoT) end devices and gateways can improve link quality. In cellular-based IoT, relays have the potential to reduce base station overload. The energy expended in single-hop long-range communication can be reduced if relays listen to transmissions of end devices and forward these observations to gateways. However, incorporating relays into IoT networks faces some challenges. IoT end devices are designed primarily for uplink communication of small-sized observations toward the network; hence, opportunistically using end devices as relays needs a redesign of both the medium access control (MAC) layer protocol of such end devices and possible addition of new communication interfaces. Additionally, the wake-up time of IoT end devices needs to be synchronized with that of the relays. For cellular-based IoT, the possibility of using infrastructure relays exists, and noncellular IoT networks can leverage the presence of mobile devices for relaying, for example, in remote healthcare. However, the latter presents problems of incentivizing relay participation and managing the mobility of relays. Furthermore, although relays can increase the lifetime of IoT networks, deploying relays implies the need for additional batteries to power them. This can erode the energy efficiency gain that relays offer. Therefore, designing relay-assisted IoT networks that provide acceptable trade-offs is key, and this goes beyond adding an extra transmit RF chain to a relay-enabled IoT end device. There has been increasing research interest in IoT relaying, as demonstrated in the available literature. Works that consider these issues are surveyed in this paper to provide insight into the state of the art, provide design insights for network designers and motivate future research directions

    Secrecy performance enhancement for underlay cognitive radio networks employing cooperative multi-hop transmission with and without presence of hardware impairments

    Get PDF
    In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data. Under a maximum interference level required by a primary user, the secondary source and relay nodes must adjust their transmit power. We first formulate effective signal-to-interference-plus-noise ratio (SINR) as well as secrecy capacity under the constraints of the maximum transmit power, the interference threshold and the hardware impairment level. Furthermore, when the hardware impairment level is relaxed, we derive exact and asymptotic expressions of end-to-end secrecy outage probability over Rayleigh fading channels by using the recursive method. The derived expressions were verified by simulations, in which the proposed scheme outperformed the conventional multi-hop direct transmission protocol.Web of Science212art. no. 21

    Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments

    Get PDF
    In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70

    Security–Reliability Tradeoff Analysis for SWIPT- and AF-Based IoT Networks With Friendly Jammers

    Get PDF
    Radio-frequency (RF) energy harvesting (EH) in wireless relaying networks has attracted considerable recent interest, especially for supplying energy to relay nodes in the Internet of Things (IoT) systems to assist the information exchange between a source and a destination. Moreover, limited hardware, computational resources, and energy availability of IoT devices have raised various security challenges. To this end, physical-layer security (PLS) has been proposed as an effective alternative to cryptographic methods for providing information security. In this study, we propose a PLS approach for simultaneous wireless information and power transfer (SWIPT)-based half-duplex (HD) amplify-and-forward (AF) relaying systems in the presence of an eavesdropper. Furthermore, we take into account both static power splitting relaying (SPSR) and dynamic power splitting relaying (DPSR) to thoroughly investigate the benefits of each one. To further enhance secure communication, we consider multiple friendly jammers to help prevent wiretapping attacks from the eavesdropper. More specifically, we provide a reliability and security analysis by deriving closed-form expressions of outage probability (OP) and intercept probability (IP), respectively, for both the SPSR and DPSR schemes. Then, simulations are also performed to validate our analysis and the effectiveness of the proposed schemes. Specifically, numerical results illustrate the nontrivial tradeoff between reliability and security of the proposed system. In addition, we conclude from the simulation results that the proposed DPSR scheme outperforms the SPSR-based scheme in terms of OP and IP under the influences of different parameters on system performance

    Integrating Drones and Wireless Power Transfer into Beyond 5G Networks

    Get PDF
    As fifth generation (5G) standards have been established and 5G commercial products are just around the corner, both academia and industry have started to look at requirements for beyond 5G networks. Network flexibility and long battery life are among the key requirements for beyond 5G wireless communication systems. These critical requirements, which have not been sufficiently addressed in the previous generations, are the focus of this thesis. The first half of this thesis explores two important use cases of drones to provide flexible communication networks. First, the performance of a cellular network with underlay drone cell for temporary events inside a stadium is studied. Using stochastic geometry, a general analytical framework is proposed to analyze the uplink and the downlink coverage probabilities for both the aerial and the terrestrial systems. Our results show that for urban environment and dense urban environment, the drone is best deployed at a low height (e.g., 200 m or lower), regardless of the distance between the center of the stadium and the terrestrial base station. However, for suburban environment and high-rise urban environment, the best drone altitude varies. Second, the performance of emergency information dissemination in public safety scenarios using drone is studied. A drone-assisted multihop multicast device-to-device (D2D) network is considered, where an emergency alert message broadcasted by a drone at the first time slot is multicasted by the D2D users that have successfully received the message through multihop. The impact of different system parameters on the link and the network performance is investigated. Our results demonstrate that a higher drone altitude provides better link and network coverage probabilities and lower mean local delay. Under practical setups, the cell edge user located 2 km from the ground projection of the drone has a link coverage probability around 90% after 5 time slots and a mean local delay of 2.32 time slots with a drone height as low as 200 m. The second half of this thesis investigates wireless power transfer networks. Specifically, the use of power beacons in a millimeter wave wireless ad hoc network is considered, where transmitters adopt the harvest-then-transmit protocol. First, the characteristic of the aggregate received power from power beacons is analyzed and the lognormal distribution is found to provide the best complementary cumulative distribution function approximation compared to other distributions considered in the literature. Then, a tractable model with discrete transmit power for each transmitter is proposed to compute the channel coverage probability and the total coverage probability. Our results show that our model provides a good accuracy and reveal the impact of different system parameters on the total coverage probability. Our results also illustrate that under practical setups, for power beacon transmit power of 50 dBm and transmitters with maximum transmit power between 20 - 40 dBm, which are safe for human exposure, the total coverage probability is around 90%. Thus, it is feasible and safe to power transmitters in a millimeter wave ad hoc network using power beacons

    Analysis of Selective-Decode and Forward Relaying Protocol over κ-µ Fading Channel Distribution, Journal of Telecommunications and Information Technology, 2020, nr 1

    Get PDF
    In this work, the performance of selective-decode and forward (S-DF) relay systems over κ-µ fading channel conditions is examined in terms of probability density function (PDF), system model and cumulative distribution function (CDF) of the κ-µ distributed envelope, signal-to-noise ratio and the techniques used to generate samples that rely on κ-µ distribution. Specifically, we consider a case where the sourceto-relay, relay-to-destination and source-to-destination link is subject to independent and identically distributed κ-µ fading. From the simulation results, the enhancement in the symbol error rate (SER) with a stronger line of sight (LOS) component is observed. This shows that S-DF relaying systems may perform well even in non-fading or LOS conditions. Monte Carlo simulations are conducted for various fading parameter values and the outcomes turn out to be a close match for theoretical results, which validates the derivations mad

    Recent Advances in Cellular D2D Communications

    Get PDF
    Device-to-device (D2D) communications have attracted a great deal of attention from researchers in recent years. It is a promising technique for offloading local traffic from cellular base stations by allowing local devices, in physical proximity, to communicate directly with each other. Furthermore, through relaying, D2D is also a promising approach to enhancing service coverage at cell edges or in black spots. However, there are many challenges to realizing the full benefits of D2D. For one, minimizing the interference between legacy cellular and D2D users operating in underlay mode is still an active research issue. With the 5th generation (5G) communication systems expected to be the main data carrier for the Internet-of-Things (IoT) paradigm, the potential role of D2D and its scalability to support massive IoT devices and their machine-centric (as opposed to human-centric) communications need to be investigated. New challenges have also arisen from new enabling technologies for D2D communications, such as non-orthogonal multiple access (NOMA) and blockchain technologies, which call for new solutions to be proposed. This edited book presents a collection of ten chapters, including one review and nine original research works on addressing many of the aforementioned challenges and beyond

    Short-Packet Communications in Multi-Hop WPINs: Performance Analysis and Deep Learning Design

    Get PDF
    In this paper, we study short-packet communications (SPCs) in multi-hop wireless-powered Internet-of-Things networks (WPINs), where IoT devices transmit short packets to multiple destination nodes by harvesting energy from multiple power beacons. To improve system block error rate (BLER) and throughput, we propose a best relay-best user (bR-bU) selection scheme with an accumulated energy harvesting mechanism. Closed-form expressions for the BLER and throughput of the proposed scheme over Rayleigh fading channels are derived and the respective asymptotic analysis is also carried out. To support real-time settings, we design a deep neural network (DNN) framework to predict the system throughput under different channel settings. Numerical results demonstrate that the proposed bR-bU selection scheme outperforms several baseline ones in terms of the BLER and throughput, showing to be an efficient strategy for multi-hop SPCs. The resulting DNN can estimate accurately the throughput with low execution time. The effects of message size on reliability and latency are also evaluated and discussed
    corecore