2,166 research outputs found
On the Capacity of SWIPT Systems with a Nonlinear Energy Harvesting Circuit
In this paper, we study information-theoretic limits for simultaneous
wireless information and power transfer (SWIPT) systems employing a practical
nonlinear radio frequency (RF) energy harvesting (EH) receiver. In particular,
we consider a three-node system with one transmitter that broadcasts a common
signal to separated information decoding (ID) and EH receivers. Owing to the
nonlinearity of the EH receiver circuit, the efficiency of wireless power
transfer depends significantly on the waveform of the transmitted signal. In
this paper, we aim to answer the following fundamental question: What is the
optimal input distribution of the transmit waveform that maximizes the rate of
the ID receiver for a given required harvested power at the EH receiver? In
particular, we study the capacity of a SWIPT system impaired by additive white
Gaussian noise (AWGN) under average-power (AP) and peak-power (PP) constraints
at the transmitter and an EH constraint at the EH receiver. Using Hermite
polynomial bases, we prove that the optimal capacity-achieving input
distribution that maximizes the rate-energy region is unique and discrete with
a finite number of mass points. Furthermore, we show that the optimal input
distribution for the same problem without PP constraint is discrete whenever
the EH constraint is active and continuous zero-mean Gaussian, otherwise. Our
numerical results show that the rate-energy region is enlarged for a larger PP
constraint and that the rate loss of the considered SWIPT system compared to
the AWGN channel without EH receiver is reduced by increasing the AP budget.Comment: 7 pages, 4 figures, submitted for possible conference publicatio
Sum Rate and Fairness Analysis for the MU-MIMO Downlink under PSK Signalling: Interference Suppression vs Exploitation
In this paper, we analyze the sum rate performance of multi-user
multiple-input multiple-output (MU-MIMO) systems, with a finite constellation
phase-shift keying (PSK) input alphabet. We analytically calculate and compare
the achievable sum rate in three downlink transmission scenarios: 1) without
precoding, 2) with zero forcing (ZF) precoding 3) with closed form constructive
interference (CI) precoding technique. In light of this, new analytical
expressions for the average sum rate are derived in the three cases, and Monte
Carlo simulations are provided throughout to validate the analysis.
Furthermore, based on the derived expressions, a power allocation scheme that
can ensure fairness among the users is also proposed. The results in this work
demonstrate that, the CI strictly outperforms the other two schemes, and the
performance gap between the considered schemes increases with increase in the
MIMO size. In addition, the CI provides higher fairness and the power
allocation algorithm proposed in this paper can achieve maximum fairness index
Wireless Information and Power Transfer in Communication Networks: Performance Analysis and Optimal Resource Allocation
Energy harvesting is considered as a prominent solution to supply the energy demand for low-power consuming devices and sensor nodes. This approach relinquishes the requirements of wired connections and regular battery replacements. This thesis analyzes the performance of energy harvesting communication networks under various operation protocols and multiple access schemes. Furthermore, since the radio frequency signal has energy, in addition to conveying information, it is also possible to power energy harvesting component while establishing data connectivity with information-decoding component. This leads to the concept of simultaneous wireless information and power transfer. The central goal of this thesis is to conduct a performance analysis in terms of throughput and energy efficiency, and determine optimal resource allocation strategies for wireless information and power transfer.
In the first part of the thesis, simultaneous transfer of information and power through wireless links to energy harvesting and information decoding components is studied considering finite alphabet inputs. The concept of non-uniform probability distribution is introduced for an arbitrary input, and mathematical formulations that relate probability distribution to the required harvested energy level are provided. In addition, impact of statistical quality of service (QoS) constraints on the overall performance is studied, and power control algorithms are provided.
Next, power allocation strategies that maximize the system energy efficiency subject to peak power constraints are determined for fading multiple access channels. The impact of channel characteristics, circuit power consumption and peak power level on the node selection, i.e., activation of user equipment, and the corresponding optimal transmit power level are addressed. Initially, wireless information transfer only is considered and subsequently wireless power transfer is taken into account. Assuming energy harvesting components, two scenarios are addressed based on the receiver architecture, i.e, having separated antenna or common antenna for the information decoding and energy harvesting components. In both cases, optimal SWIPT power control policies are identified, and impact of the required harvested energy is analyzed.
The second line of research in this thesis focuses on wireless-powered communication devices that operate based on harvest-then-transmit protocol. Optimal time allocation for the downlink and uplink operation interval are identified formulating throughput maximization and energy-efficiency maximization problems. In addition, the performance gain among various types of downlink-uplink operation protocols is analyzed taking into account statistical QoS constraints.
Furthermore, the performance analysis of energy harvesting user equipment is extended to full-duplex wireless information and power transfer as well as cellular networks. In full-duplex operation, optimal power control policies are identified, and the significance of introducing non-zero mean component on the information-bearing signal is analyzed. Meanwhile, SINR coverage probabilities, average throughput and energy efficiency are explicitly characterized for wireless-powered cellular networks, and the impact of downlink SWIPT and uplink mmWave schemes are addressed.
In the final part of the thesis, energy efficiency is considered as the performance metric, and time allocation strategies that maximize energy efficiency for wireless powered communication networks with non-orthogonal multiple access scheme are determined. Low complex algorithms are proposed based on Dinkelbach’s method. In addition, the impact of statistical QoS constraints imposed as limitations on the buffer violation probabilities is addressed
An Overview of Physical Layer Security with Finite-Alphabet Signaling
Providing secure communications over the physical layer with the objective of
achieving perfect secrecy without requiring a secret key has been receiving
growing attention within the past decade. The vast majority of the existing
studies in the area of physical layer security focus exclusively on the
scenarios where the channel inputs are Gaussian distributed. However, in
practice, the signals employed for transmission are drawn from discrete signal
constellations such as phase shift keying and quadrature amplitude modulation.
Hence, understanding the impact of the finite-alphabet input constraints and
designing secure transmission schemes under this assumption is a mandatory step
towards a practical implementation of physical layer security. With this
motivation, this article reviews recent developments on physical layer security
with finite-alphabet inputs. We explore transmit signal design algorithms for
single-antenna as well as multi-antenna wiretap channels under different
assumptions on the channel state information at the transmitter. Moreover, we
present a review of the recent results on secure transmission with discrete
signaling for various scenarios including multi-carrier transmission systems,
broadcast channels with confidential messages, cognitive multiple access and
relay networks. Throughout the article, we stress the important behavioral
differences of discrete versus Gaussian inputs in the context of the physical
layer security. We also present an overview of practical code construction over
Gaussian and fading wiretap channels, and we discuss some open problems and
directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision
- …