7,830 research outputs found

    Coexistence of RF-powered IoT and a Primary Wireless Network with Secrecy Guard Zones

    Get PDF
    This paper studies the secrecy performance of a wireless network (primary network) overlaid with an ambient RF energy harvesting IoT network (secondary network). The nodes in the secondary network are assumed to be solely powered by ambient RF energy harvested from the transmissions of the primary network. We assume that the secondary nodes can eavesdrop on the primary transmissions due to which the primary network uses secrecy guard zones. The primary transmitter goes silent if any secondary receiver is detected within its guard zone. Using tools from stochastic geometry, we derive the probability of successful connection of the primary network as well as the probability of secure communication. Two conditions must be jointly satisfied in order to ensure successful connection: (i) the SINR at the primary receiver is above a predefined threshold, and (ii) the primary transmitter is not silent. In order to ensure secure communication, the SINR value at each of the secondary nodes should be less than a predefined threshold. Clearly, when more secondary nodes are deployed, more primary transmitters will remain silent for a given guard zone radius, thus impacting the amount of energy harvested by the secondary network. Our results concretely show the existence of an optimal deployment density for the secondary network that maximizes the density of nodes that are able to harvest sufficient amount of energy. Furthermore, we show the dependence of this optimal deployment density on the guard zone radius of the primary network. In addition, we show that the optimal guard zone radius selected by the primary network is a function of the deployment density of the secondary network. This interesting coupling between the two networks is studied using tools from game theory. Overall, this work is one of the few concrete works that symbiotically merge tools from stochastic geometry and game theory

    Tight Lower Bounds on the Contact Distance Distribution in Poisson Hole Process

    Get PDF
    In this letter, we derive new lower bounds on the cumulative distribution function (CDF) of the contact distance in the Poisson Hole Process (PHP) for two cases: (i) reference point is selected uniformly at random from R2\mathbb{R}^2 independently of the PHP, and (ii) reference point is located at the center of a hole selected uniformly at random from the PHP. While one can derive upper bounds on the CDF of contact distance by simply ignoring the effect of holes, deriving lower bounds is known to be relatively more challenging. As a part of our proof, we introduce a tractable way of bounding the effect of all the holes in a PHP, which can be used to study other properties of a PHP as well.Comment: To appear in IEEE Wireless Communications Letter

    Joint Uplink and Downlink Coverage Analysis of Cellular-based RF-powered IoT Network

    Get PDF
    Ambient radio frequency (RF) energy harvesting has emerged as a promising solution for powering small devices and sensors in massive Internet of Things (IoT) ecosystem due to its ubiquity and cost efficiency. In this paper, we study joint uplink and downlink coverage of cellular-based ambient RF energy harvesting IoT where the cellular network is assumed to be the only source of RF energy. We consider a time division-based approach for power and information transmission where each time-slot is partitioned into three sub-slots: (i) charging sub-slot during which the cellular base stations (BSs) act as RF chargers for the IoT devices, which then use the energy harvested in this sub-slot for information transmission and/or reception during the remaining two sub-slots, (ii) downlink sub-slot during which the IoT device receives information from the associated BS, and (iii) uplink sub-slot during which the IoT device transmits information to the associated BS. For this setup, we characterize the joint coverage probability, which is the joint probability of the events that the typical device harvests sufficient energy in the given time slot and is under both uplink and downlink signal-to-interference-plus-noise ratio (SINR) coverage with respect to its associated BS. This metric significantly generalizes the prior art on energy harvesting communications, which usually focused on downlink or uplink coverage separately. The key technical challenge is in handling the correlation between the amount of energy harvested in the charging sub-slot and the information signal quality (SINR) in the downlink and uplink sub-slots. Dominant BS-based approach is developed to derive tight approximation for this joint coverage probability. Several system design insights including comparison with regularly powered IoT network and throughput-optimal slot partitioning are also provided

    Classical and quantum quasi-free position dependent mass; P\"oschl-Teller and ordering-ambiguity

    Full text link
    We argue that the classical and quantum mechanical correspondence may play a basic role in the fixation of the ordering-ambiguity parameters. We use quasi-free position-dependent masses in the classical and quantum frameworks. The effective P\"oschl-Teller model is used as a manifested reference potential to elaborate on the reliability of the ordering-ambiguity parameters available in the literature.Comment: 10 page

    Non-Hermitian von Roos Hamiltonian's η\eta-weak-pseudo-Hermiticity, isospectrality and exact solvability

    Full text link
    A complexified von Roos Hamiltonian is considered and a Hermitian first-order intertwining differential operator is used to obtain the related position dependent mass η\eta-weak-pseudo-Hermitian Hamiltonians. Using a Liouvillean-type change of variables, the η\eta-weak-pseudo-Hermitian von Roos Hamiltonians H(x) are mapped into the traditional Schrodinger Hamiltonian form H(q), where exact isospectral correspondence between H(x) and H(q) is obtained. Under a user-friendly position dependent mass settings, it is observed that for each exactly-solvable η\eta-weak-pseudo-Hermitian reference-Hamiltonian H(q)there is a set of exactly-solvable η\eta-weak-pseudo-Hermitian isospectral target-Hamiltonians H(x). A non-Hermitian PT-symmetric Scarf II and a non-Hermitian periodic-type PT-symmetric Samsonov-Roy potentials are used as reference models and the corresponding η\eta-weak-pseudo-Hermitian isospectral target-Hamiltonians are obtained.Comment: 11 pages, no figures

    A secure data outsourcing scheme based on Asmuth – Bloom secret sharing

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users’ queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients’ data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth–Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing

    Seasonal biodiversity and ecological studies on the epiphytic microalgae communities in polluted and unpolluted aquatic ecosystem at Assiut, Egypt

    Get PDF
    A qualitative and quantitative study on epiphytic microalgae was carried out seasonally from November 2015 to August 2016 to follow up their community structures on aquatic macrophytes related to some physico-chemical properties of two polluted and unpolluted water bodies at Assiut, Egypt. A total of 169 species related to 64 genera of epiphytic microalgae were recorded. The most dominant algal group was Bacillariophyceae (43.2%), followed by Chlorophyceae (34.91%), Cyanophyceae (20.71%) and Euglenophyceae (1.18%). The total number of epiphytic algae fluctuated between 11.1 Ă— 104 ind.g-1 plant dry wt. on Phragmites australis in summer at Nazlet Abdellah (polluted site) and 10.02 Ă— 107 ind.g-1 plant dry wt. on Myriophyllum spicatum in winter at El-Wasta (unpolluted site). Some epiphytic microalgae were dominant as Pseudanabaena limnetica, Calothrix braunii, Scenedesmus acutus, and Ulnaria ulna. Others were specific on certain macrophytes as Aphanocapsa thermalis and Ulothrix sp., which grow on Phragmites australis, while Synechocystis minuscula attached itself on Myriophyllum spicatum. Analysis of PERMANOVA showed that the most important factors that induced the variation in epiphytic microalgae were the temporal variation and host plant. Water temperature, pH, nitrate, chloride, phosphate and total dissolved salts were the highest abiotic factors correlated with the variation in composition of epiphytic microalgae
    • …
    corecore