22 research outputs found

    Wireless Information and Power Transfer in Communication Networks: Performance Analysis and Optimal Resource Allocation

    Get PDF
    Energy harvesting is considered as a prominent solution to supply the energy demand for low-power consuming devices and sensor nodes. This approach relinquishes the requirements of wired connections and regular battery replacements. This thesis analyzes the performance of energy harvesting communication networks under various operation protocols and multiple access schemes. Furthermore, since the radio frequency signal has energy, in addition to conveying information, it is also possible to power energy harvesting component while establishing data connectivity with information-decoding component. This leads to the concept of simultaneous wireless information and power transfer. The central goal of this thesis is to conduct a performance analysis in terms of throughput and energy efficiency, and determine optimal resource allocation strategies for wireless information and power transfer. In the first part of the thesis, simultaneous transfer of information and power through wireless links to energy harvesting and information decoding components is studied considering finite alphabet inputs. The concept of non-uniform probability distribution is introduced for an arbitrary input, and mathematical formulations that relate probability distribution to the required harvested energy level are provided. In addition, impact of statistical quality of service (QoS) constraints on the overall performance is studied, and power control algorithms are provided. Next, power allocation strategies that maximize the system energy efficiency subject to peak power constraints are determined for fading multiple access channels. The impact of channel characteristics, circuit power consumption and peak power level on the node selection, i.e., activation of user equipment, and the corresponding optimal transmit power level are addressed. Initially, wireless information transfer only is considered and subsequently wireless power transfer is taken into account. Assuming energy harvesting components, two scenarios are addressed based on the receiver architecture, i.e, having separated antenna or common antenna for the information decoding and energy harvesting components. In both cases, optimal SWIPT power control policies are identified, and impact of the required harvested energy is analyzed. The second line of research in this thesis focuses on wireless-powered communication devices that operate based on harvest-then-transmit protocol. Optimal time allocation for the downlink and uplink operation interval are identified formulating throughput maximization and energy-efficiency maximization problems. In addition, the performance gain among various types of downlink-uplink operation protocols is analyzed taking into account statistical QoS constraints. Furthermore, the performance analysis of energy harvesting user equipment is extended to full-duplex wireless information and power transfer as well as cellular networks. In full-duplex operation, optimal power control policies are identified, and the significance of introducing non-zero mean component on the information-bearing signal is analyzed. Meanwhile, SINR coverage probabilities, average throughput and energy efficiency are explicitly characterized for wireless-powered cellular networks, and the impact of downlink SWIPT and uplink mmWave schemes are addressed. In the final part of the thesis, energy efficiency is considered as the performance metric, and time allocation strategies that maximize energy efficiency for wireless powered communication networks with non-orthogonal multiple access scheme are determined. Low complex algorithms are proposed based on Dinkelbach’s method. In addition, the impact of statistical QoS constraints imposed as limitations on the buffer violation probabilities is addressed

    Fundamentals of Wireless Information and Power Transfer: From RF Energy Harvester Models to Signal and System Designs

    Full text link
    Radio waves carry both energy and information simultaneously. Nevertheless, Radio-Frequency (RF) transmission of these quantities have traditionally been treated separately. Currently, we are experiencing a paradigm shift in wireless network design, namely unifying wireless transmission of information and power so as to make the best use of the RF spectrum and radiations as well as the network infrastructure for the dual purpose of communicating and energizing. In this paper, we review and discuss recent progress on laying the foundations of the envisioned dual purpose networks by establishing a signal theory and design for Wireless Information and Power Transmission (WIPT) and identifying the fundamental tradeoff between conveying information and power wirelessly. We start with an overview of WIPT challenges and technologies, namely Simultaneous Wireless Information and Power Transfer (SWIPT),Wirelessly Powered Communication Network (WPCN), and Wirelessly Powered Backscatter Communication (WPBC). We then characterize energy harvesters and show how WIPT signal and system designs crucially revolve around the underlying energy harvester model. To that end, we highlight three different energy harvester models, namely one linear model and two nonlinear models, and show how WIPT designs differ for each of them in single-user and multi-user deployments. Topics discussed include rate-energy region characterization, transmitter and receiver architecture, waveform design, modulation, beamforming and input distribution optimizations, resource allocation, and RF spectrum use. We discuss and check the validity of the different energy harvester models and the resulting signal theory and design based on circuit simulations, prototyping and experimentation. We also point out numerous directions that are promising for future research.Comment: guest editor-authored tutorial paper submitted to IEEE JSAC special issue on wireless transmission of information and powe

    An Overview of Physical Layer Security with Finite-Alphabet Signaling

    Get PDF
    Providing secure communications over the physical layer with the objective of achieving perfect secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and we discuss some open problems and directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision

    Symbol-level and Multicast Precoding for Multiuser Multiantenna Downlink: A State-of-the-art, Classification and Challenges

    Get PDF
    Precoding has been conventionally considered as an effective means of mitigating or exploiting the interference in the multiantenna downlink channel, where multiple users are simultaneously served with independent information over the same channel resources. The early works in this area were focused on transmitting an individual information stream to each user by constructing weighted linear combinations of symbol blocks (codewords). However, more recent works have moved beyond this traditional view by: i) transmitting distinct data streams to groups of users and ii) applying precoding on a symbol-per-symbol basis. In this context, the current survey presents a unified view and classification of precoding techniques with respect to two main axes: i) the switching rate of the precoding weights, leading to the classes of block-level and symbol-level precoding, ii) the number of users that each stream is addressed to, hence unicast, multicast, and broadcast precoding. Furthermore, the classified techniques are compared through representative numerical results to demonstrate their relative performance and uncover fundamental insights. Finally, a list of open theoretical problems and practical challenges are presented to inspire further research in this area

    An Overview of Physical Layer Security with Finite Alphabet Signaling

    Get PDF
    Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and discuss some open problems and directions for future research

    A Tutorial on Interference Exploitation via Symbol-Level Precoding: Overview, State-of-the-Art and Future Directions

    Get PDF
    IEEE Interference is traditionally viewed as a performance limiting factor in wireless communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of work has shown that by manipulating the interfering signals such that they add up constructively at the receiver side, known interference can be made beneficial and further improve the system performance in a variety of wireless scenarios, achieved by symbol-level precoding (SLP). This paper aims to provide a tutorial on interference exploitation techniques from the perspective of precoding design in a multi-antenna wireless communication system, by beginning with the classification of constructive interference (CI) and destructive interference (DI). The definition for CI is presented and the corresponding mathematical characterization is formulated for popular modulation types, based on which optimization-based precoding techniques are discussed. In addition, the extension of CI precoding to other application scenarios as well as for hardware efficiency is also described. Proof-of-concept testbeds are demonstrated for the potential practical implementation of CI precoding, and finally a list of open problems and practical challenges are presented to inspire and motivate further research directions in this area

    Interference Exploitation via Symbol-Level Precoding: Overview, State-of-the-Art and Future Directions

    Get PDF
    Interference is traditionally viewed as a performance limiting factor in wireless communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of work has shown that by manipulating the interfering signals such that they add up constructively at the receiver side, known interference can be made beneficial and further improve the system performance in a variety of wireless scenarios, achieved by symbol-level precoding (SLP). This paper aims to provide a tutorial on interference exploitation techniques from the perspective of precoding design in a multi-antenna wireless communication system, by beginning with the classification of constructive interference (CI) and destructive interference (DI). The definition for CI is presented and the corresponding mathematical characterization is formulated for popular modulation types, based on which optimization-based precoding techniques are discussed. In addition, the extension of CI precoding to other application scenarios as well as for hardware efficiency is also described. Proof-of-concept testbeds are demonstrated for the potential practical implementation of CI precoding, and finally a list of open problems and practical challenges are presented to inspire and motivate further research directions in this area
    corecore