9,863 research outputs found
Optimization and Analysis of Wireless Powered Multi-antenna Cooperative Systems
In this paper, we consider a three-node cooperative wireless powered
communication system consisting of a multi-antenna hybrid access point (H-AP)
and a single-antenna relay and a single-antenna user. The energy constrained
relay and user first harvest energy in the downlink and then the relay assists
the user using the harvested power for information transmission in the uplink.
The optimal energy beamforming vector and the time split between harvest and
cooperation are investigated. To reduce the computational complexity,
suboptimal designs are also studied, where closed-form expressions are derived
for the energy beamforming vector and the time split. For comparison purposes,
we also present a detailed performance analysis in terms of the achievable
outage probability and the average throughput of an intuitive energy
beamforming scheme, where the H-AP directs all the energy towards the user. The
findings of the paper suggest that implementing multiple antennas at the H-AP
can significantly improve the system performance, and the closed-form
suboptimal energy beamforming vector and time split yields near optimal
performance. Also, for the intuitive beamforming scheme, a diversity order of
(N+1)/2 can be achieved, where N is the number of antennas at the H-AP
Beamforming Optimization for Full-Duplex Wireless-powered MIMO Systems
We propose techniques for optimizing transmit beamforming in a full-duplex
multiple-input-multiple-output (MIMO) wireless-powered communication system,
which consists of two phases. In the first phase, the wireless-powered mobile
station (MS) harvests energy using signals from the base station (BS), whereas
in the second phase, both MS and BS communicate to each other in a full-duplex
mode. When complete instantaneous channel state information (CSI) is available,
the BS beamformer and the time-splitting (TS) parameter of energy harvesting
are jointly optimized in order to obtain the BS-MS rate region. The joint
optimization problem is non-convex, however, a computationally efficient
optimum technique, based upon semidefinite relaxation and line-search, is
proposed to solve the problem. A sub-optimum zero-forcing approach is also
proposed, in which a closed-form solution of TS parameter is obtained. When
only second-order statistics of transmit CSI is available, we propose to
maximize the ergodic information rate at the MS, while maintaining the outage
probability at the BS below a certain threshold. An upper bound for the outage
probability is also derived and an approximate convex optimization framework is
proposed for efficiently solving the underlying non-convex problem. Simulations
demonstrate the advantages of the proposed methods over the sub-optimum and
half-duplex ones.Comment: 14 pages, accepte
Secure Communication with a Wireless-Powered Friendly Jammer
In this paper, we propose to use a wireless-powered friendly jammer to enable
secure communication between a source node and destination node, in the
presence of an eavesdropper. We consider a two-phase communication protocol
with fixed-rate transmission. In the first phase, wireless power transfer is
conducted from the source to the jammer. In the second phase, the source
transmits the information-bearing signal under the protection of a jamming
signal sent by the jammer using the harvested energy in the first phase. We
analytically characterize the long-time behavior of the proposed protocol and
derive a closed-form expression for the throughput. We further optimize the
rate parameters for maximizing the throughput subject to a secrecy outage
probability constraint. Our analytical results show that the throughput
performance differs significantly between the single-antenna jammer case and
the multi-antenna jammer case. For instance, as the source transmit power
increases, the throughput quickly reaches an upper bound with single-antenna
jammer, while the throughput grows unbounded with multi-antenna jammer. Our
numerical results also validate the derived analytical results.Comment: accepted for publication in IEEE Transactions on Wireless
Communication
- …