2,489 research outputs found

    Simultaneous wireless information and power transfer (SWIPT) in cooperative networks

    Get PDF
    2019 Spring.Includes bibliographical references.In recent years, the capacity and charging speed of batteries have become the bottleneck of mobile communications systems. Energy harvesting (EH) is regarded as a promising technology to significantly extend the lifetime of battery-powered devices. Among many EH technologies, simultaneous wireless information and power transfer (SWIPT) proposes to harvest part of the energy carried by the wireless communication signals. In particular, SWIPT has been successfully applied to energy-constrained relays that are mainly or exclusively powered by the energy harvested from the received signals. These relays are known as EH relays, which attract significant attention in both the academia and the industry. In this research, we investigate the performance of SWIPT-based EH cooperative networks and the optimization problems therein. Due to hardware limitations, the energy harvesting circuit cannot decode the signal directly. Power splitting (PS) is a popular and effective solution to this problem. Therefore, we focus on PS based SWIPT in this research. First, different from existing work that employs time-switching (TS) based SWIPT, we propose to employ PS based SWIPT for a truly full-duplex (FD) EH relay network, where the information reception and transmission take place simultaneously at the relay all the time. This more thorough exploitation of the FD feature consequently leads to a significant capacity improvement compared with existing alternatives in the literature. Secondly, when multiple relays are available in the network, we explore the relay selection (RS) and network beamforming techniques in EH relay networks. Assuming orthogonal bandwidth allocation, both single relay selection (SRS) and general relay selection (GRS) without the limit on the number of cooperating relays are investigated and the corresponding RS methods are proposed. We will show that our proposed heuristic GRS methods outperform the SRS methods and achieve very similar performance compared with the optimal RS method achieved by exhaustive search but with dramatically reduced complexity. Under the shared bandwidth assumption, network beamforming among EH relays is investigated. We propose a joint PS factor optimization method based on semidefinite relaxation. Simulations show that network beamforming achieves the best performance among all other cooperative techniques. Finally, we study the problem of power allocation and PS factor optimization for SWIPT over doubly-selective wireless channels. In contrast to existing work in the literature, we take the channel variation in both time and frequency domains into consideration and jointly optimize the power allocation and the PS factors. The objective is to maximize the achievable data rate with constraints on the delivered energy in a time window. Since the problem is difficult to solve directly due to its nonconvexity, we proposed a two-step approach, named joint power allocation and splitting (JoPAS), to solve the problem along the time and frequency dimensions sequentially. Simulations show significantly improved performance compared with the existing dynamic power splitting scheme. A suboptimal heuristic algorithm, named decoupled power allocation and splitting (DePAS), is also proposed with significantly reduced computational complexity and simulations demonstrate its near-optimum performance

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Resource Allocation in Wireless Networks with RF Energy Harvesting and Transfer

    Full text link
    Radio frequency (RF) energy harvesting and transfer techniques have recently become alternative methods to power the next generation of wireless networks. As this emerging technology enables proactive replenishment of wireless devices, it is advantageous in supporting applications with quality-of-service (QoS) requirement. This article focuses on the resource allocation issues in wireless networks with RF energy harvesting capability, referred to as RF energy harvesting networks (RF-EHNs). First, we present an overview of the RF-EHNs, followed by a review of a variety of issues regarding resource allocation. Then, we present a case study of designing in the receiver operation policy, which is of paramount importance in the RF-EHNs. We focus on QoS support and service differentiation, which have not been addressed by previous literatures. Furthermore, we outline some open research directions.Comment: To appear in IEEE Networ
    • …
    corecore