77,910 research outputs found
Safe and Secure Wireless Power Transfer Networks: Challenges and Opportunities in RF-Based Systems
RF-based wireless power transfer networks (WPTNs) are deployed to transfer
power to embedded devices over the air via RF waves. Up until now, a
considerable amount of effort has been devoted by researchers to design WPTNs
that maximize several objectives such as harvested power, energy outage and
charging delay. However, inherent security and safety issues are generally
overlooked and these need to be solved if WPTNs are to be become widespread.
This article focuses on safety and security problems related WPTNs and
highlight their cruciality in terms of efficient and dependable operation of
RF-based WPTNs. We provide a overview of new research opportunities in this
emerging domain.Comment: Removed some references, added new references, corrected typos,
revised some sections (mostly I-B and III-C
Secrecy Wireless Information and Power Transfer in OFDMA Systems
In this paper, we consider simultaneous wireless information and power
transfer (SWIPT) in orthogonal frequency division multiple access (OFDMA)
systems with the coexistence of information receivers (IRs) and energy
receivers (ERs). The IRs are served with best-effort secrecy data and the ERs
harvest energy with minimum required harvested power. To enhance physical-layer
security and yet satisfy energy harvesting requirements, we introduce a new
frequency-domain artificial noise based approach. We study the optimal resource
allocation for the weighted sum secrecy rate maximization via transmit power
and subcarrier allocation. The considered problem is non-convex, while we
propose an efficient algorithm for solving it based on Lagrange duality method.
Simulation results illustrate the effectiveness of the proposed algorithm as
compared against other heuristic schemes.Comment: To appear in Globecom 201
Joint Secure Beamforming for Cognitive Radio Networks with Untrusted Secondary Users
In this paper, we consider simultaneous wireless information and power
transfer (SWIPT) in orthogonal frequency division multiple access (OFDMA)
systems with the coexistence of information receivers (IRs) and energy
receivers (ERs). The IRs are served with best-effort secrecy data and the ERs
harvest energy with minimum required harvested power. To enhance physical-layer
security and yet satisfy energy harvesting requirements, we introduce a new
frequency-domain artificial noise based approach. We study the optimal resource
allocation for the weighted sum secrecy rate maximization via transmit power
and subcarrier allocation. The considered problem is non-convex, while we
propose an efficient algorithm for solving it based on Lagrange duality method.
Simulation results illustrate the effectiveness of the proposed algorithm as
compared against other heuristic schemes.Comment: To appear in Globecom 201
Empowering Distributed Solar PV Energy For Malaysian Rural Housing: Towards Energy Security And Equitability Of Rural Communities
This paper illustrates on how Malaysia’s development landscapes has been powered by cheap oil and gas making it dependent and addicted on using large amounts of fossil fuels. As a country that is primarily depended on fossil fuels for generating power supply, Malaysia needs to cogitate of long-term energy security due to fossil fuel depletion and peak oil issues. Loss of these resources could leadto thereduction of power generation capacitywhich will threaten the stability of the electricity supply in Malaysia. This could potentially influence in an increase in electricity costs which lead to a phase of power scarcity and load shedding for the country. With the risk of interrupted power supplies, rural households, especially those of low-income groups are particularly vulnerable to the post-effects of a power outage and an inequitable distribution to the people. Distributed generation of electricity by solar PVs diminishes the vulnerability of these households and can also offer an income to them by feeding the power supply to the national grid through Feed-in Tariff scheme. At the moment, the deployment of solar PV installations is still in the introductory stage in Malaysia, where roof-mounted PV panels are only available to commercial and urban residential buildings. This is due to the lack of a suitable renewable energy policy for rural householdsandthe high cost of the solar PV technology. This paper will put forward an analysis for incorporating solar photovoltaic on roofs of rural houses by identifying the energy consumption of these households and the extent to which PVs can alleviate electricity insecurity. The results present significant potential for distributed PV power generation in rural areas in Malaysia which shown a considerable amount of electricity needed to be harvested from roof-mounted solar PV for rural people in Malaysi
Transmitter Optimization Techniques for Physical Layer Security
Information security is one of the most critical issues in wireless networks as the signals transmitted through wireless medium are more vulnerable for interception. Although the existing conventional security techniques are proven to be safe, the broadcast nature of wireless communications introduces different challenges in terms of key exchange and distributions. As a result, information theoretic physical layer security has been proposed to complement the conventional security techniques for enhancing security in wireless transmissions. On the other hand, the rapid growth of data rates introduces different challenges on power limited mobile devices in terms of energy requirements. Recently, research work on wireless power transfer claimed that it has been considered as a potential technique to extend the battery lifetime of wireless networks. However, the algorithms developed based on the conventional optimization approaches often require iterative techniques, which poses challenges for real-time processing. To meet the demanding requirements of future ultra-low latency and reliable networks, neural network (NN) based approach can be employed to determine the resource allocations in wireless communications.
This thesis developed different transmission strategies for secure transmission in wireless communications. Firstly, transmitter designs are focused in a multiple-input single-output simultaneous wireless information and power transfer system with unknown eavesdroppers. To improve the performance of physical layer security and the harvested energy, artificial noise is incorporated into the network to mask the secret information between the legitimate terminals. Then, different secrecy energy efficiency designs are considered for a MISO underlay cognitive radio network, in the presence of an energy harvesting receiver. In particular, these designs are developed with different channel state information assumptions at the transmitter. Finally, two different power allocation designs are investigated for a cognitive radio network to maximize the secrecy rate of the secondary receiver: conventional convex optimization framework and NN based algorithm
Secrecy Capacity for Multi-Antenna Wireless-Powered AF Relaying Systems
This paper analyzes the ergodic secrecy capacity of an energy-constrained multiple-antennas amplify-and-forward (AF) relaying system in the presence of a passive eavesdropper. In the first phase, the source broadcasts information signal, while the destination sends an artificial jamming signal. The jamming signal has two main purposes: 1) enhancing the system security; 2) increasing the energy harvesting (EH) at the relay node. In the second phase, the relay uses the harvested energy to amplify and forward the received signal to the destination. For this system model, explicit mathematical expressions for the ergodic secrecy capacity are derived for three different common EH-relaying protocols, namely, power splitting relaying (PSR), antenna selection and power splitting (ASPS) receiver, and ideal relaying receiver (IRR). Monte-Carlo simulations are included to validate the analysis and the effect of different parameters on the system security are investigated. The results show that, the ASPS receiver outperforms PSR in terms of secrecy capacity
Smart Meter Privacy with an Energy Harvesting Device and Instantaneous Power Constraints
A smart meter (SM) periodically measures end-user electricity consumption and
reports it to a utility provider (UP). Despite the advantages of SMs, their use
leads to serious concerns about consumer privacy. In this paper, SM privacy is
studied by considering the presence of an energy harvesting device (EHD) as a
means of masking the user's input load. The user can satisfy part or all of
his/her energy needs from the EHD, and hence, less information can be leaked to
the UP via the SM. The EHD is typically equipped with a rechargeable energy
storage device, i.e., a battery, whose instantaneous energy content limits the
user's capability in covering his/her energy usage. Privacy is measured by the
information leaked about the user's real energy consumption when the UP
observes the energy requested from the grid, which the SM reads and reports to
the UP. The minimum information leakage rate is characterized as a computable
information theoretic single-letter expression when the EHD battery capacity is
either infinite or zero. Numerical results are presented for a discrete binary
input load to illustrate the potential privacy gains from the existence of a
storage device.Comment: To be published in IEEE ICC201
Optimal Checkpointing for Secure Intermittently-Powered IoT Devices
Energy harvesting is a promising solution to power Internet of Things (IoT)
devices. Due to the intermittent nature of these energy sources, one cannot
guarantee forward progress of program execution. Prior work has advocated for
checkpointing the intermediate state to off-chip non-volatile memory (NVM).
Encrypting checkpoints addresses the security concern, but significantly
increases the checkpointing overheads. In this paper, we propose a new online
checkpointing policy that judiciously determines when to checkpoint so as to
minimize application time to completion while guaranteeing security. Compared
to state-of-the-art checkpointing schemes that do not account for the overheads
of encrypted checkpoints we improve execution time up to 1.4x.Comment: ICCAD 201
- …