The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider physical layer security in wireless communication networks in which a source (Alice) intends to send a confidential message to a legitimate destination (Bob) with the help of a cooperative jammer (CJ), in the presence of a passive eavesdropper (Eve). Assuming that only statistical channel state information (CSI) of Eve is available, artificial-noise (AN) assisted beamforming...
We devise a framework using tools from stochastic geometry and queuing theory for the study of irregular cellular networks when user traffic varies randomly in time and space. We consider a typical wireless cell with a guard zone surrounded by an interference environment comprised of a dominant node at the guard-edge plus an outer-bound Poisson field of sources. A systematic approach is presented...
In this paper, we determine the optimal battery capacity for an energy harvesting wireless node. The goal is to achieve transmission performances similar to an identical system, but with infinitely large battery. In our previous work, addressing a node without any energy storage constraints, we proposed a policy to optimize instantaneous transmission rate in order to maximize the average transmission...
Energy-efficient power allocation and wireless backhaul bandwidth allocation are studied for orthogonal frequency division multiple access heterogeneous small cell networks. Different from the existing resource allocation schemes that maximize the throughput, the studied scheme maximizes energy efficiency by allocating both transmit power of each small cell to users and bandwidth for backhauling,...
Energy harvesting and wireless energy transfer are capable of relieving the battery limitation of wireless devices. In this paper, an amplify-and-forward relay network (AF-RN) is considered, where an energy harvesting source node communicates with a destination node through an energy harvesting relay node. To further improve the performance, the relay is allowed to harvest energy from the radio frequency...
This paper studies the fairness of achievable energy efficiency (EE) in a multicell multiuser multiple-input single-output downlink. The objective is to maximize the minimum EE among all base stations (BSs) subject to per-BS power constraints. The resulting optimization problem is a max-min fractional program, and, thus, difficult to solve in general. Our goal is to develop a decentralized algorithm...
Wireless energy harvesting is one of the promising alternative techniques to power wireless networks. To improve the energy harvesting capability, energy beamforming has recently drawn significant attention. In this paper, we consider energy harvesting in a multi-user multi-input single-output (MU-MISO) network, and investigate two energy beamforming schemes which ensure fairness among the energy...
This work examines the user-pair selection problem for distributed-input distributed-output (DIDO) wireless systems. A DIDO system refers to a network of densely deployed transmitter and receiver pairs, where the transmitters are connected to and coordinated by a DIDO server. The system sum rate is known to grow without bound as the number of transmitter-receiver pairs increases. However, when zero-forcing...
This paper considers machine-to-machine (M2M) communication for wireless-powered Internet-of-Things (IoT) based networking systems. Motivated by the observation that transmitting signals generally requires more energy than receiving signals for most IoT-based systems, we study a special wireless-powered M2M communication system in which the receiver can send its surplus energy to the transmitter....
We consider the design of energy management policies for multimedia wireless sensor nodes that rely entirely on harvesting energy from the environment for both the data acquisition and transmission. In many high volume data sensing applications, the sampled data is compressed before transmission to meet the bandwidth and transmit power constraints. The compression results in data distortion, but it...
Wireless caching has been used to improve network performance and reduce bandwidth and energy consumption. In this paper, we study the issue of joint admission control and content caching for wireless access points with energy harvesting capability. Given limited energy supply, the access points, in a competitive environment, aim to maximize their payoff defined in terms of revenue by optimizing their...
In this paper, we propose a coordinated base-station energy management (CoBEM) technique in which the BSs in a coordinated multipoint (CoMP) with rate-limited backhaul links collaborate to keep the demand and supply balanced using local renewable energies. We formulate two sparse beamforming techniques as ¿0-norm optimisation problems and apply a method that can replace ℓ0-norm with ℓ1-norm and iteratively...
We consider a cellular Internet of things (CIoT) network where many source nodes aim at exchanging messages with a single concentrator node. To this end, they are assisted by anchor nodes that are trusted and securely connected with the concentrator node. In this context, we aim at providing a message authentication scheme based on the characteristics of the channel between the source nodes and the...
Computation offloading is a promising approach for reducing the computational load and extending the battery lifetime of mobile nodes. A network consisting of several wireless nodes accessing the cloud in a multi-hop fashion is considered. In multi-hop networks, offloading a computational task requires relaying the task by the intermediate nodes along the path towards the cloud. If the nodes are autonomous...
Transmission Control Protocol (TCP) has long been used host-to-host over the internet in order to provide reliable and ordered exchange of data. A core component of the protocol is congestion control. Traditional forms of TCP congestion control such as New Reno have been shown to perform poorly over wireless links as a result of non-congestive losses induced by variations in the wireless channel....
The concurrent deployment of heterogeneous wireless networks such as Wi-Fi, Bluetooth, and ZigBee has led to the severe interference problems in the 2.4GHz ISM band. In particular, ZigBee networks are susceptible to the interferences from other wireless technologies; For example, strong Wi-Fi signals trigger false alarms to ZigBee device that is performing low power idle listening and cause appreciable...
In Wireless Sensor Networks (WSNs), to supply energy to the sensor nodes, wireless energy transfer (WET) is a promising technique. One of the most efficient procedures to transfer energy to the sensor nodes consists in using a sharp wireless energy beam from the base station to each node at a time. A natural fundamental question is what is the lifetime ensured by WET and how to maximize the network...
Wireless radio-frequency (RF) technologies has had universal wide-scale deployment. Despite this, the practical limitations of the RF spectrum being unable to meet the challenges (e.g. lack of security, high interference, limited bandwidth, scalability) of RF based communication networks have become increasingly apparent over the past decade. With the ever-growing of data heavy wireless communications,...
The software-defined approach of cloud radio access networks (C-RANs) enables supporting multiple virtual operators (VOs) on the same physical infrastructure. In this shared environment, a coordinator is needed to manage the sharing of resources between the VOs. Designing a coordinator is about striking a good balance between the flexibility given to the VOs, and the efficiency of the resource utilization...
Receiver sensitivity is one of the most important parameters in determining the overall performance of a communication system. Industry has been using exhaustive search in a specified range to identify the achieved receiver sensitivity for wireless devices. Such an exhaustive search scheme is neither efficient in terms of measurement time, nor accurate due to the fixed stepsize. In this paper, we...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.