• Title/Summary/Keyword: wireless-powered communication networks

Search Result 44, Processing Time 0.021 seconds

Backscatter Communication for Wireless-Powered Communication Networks (무선전력 통신네트워크를 위한 Backscatter 통신)

  • Choi, Shin Hyuk;Kim, Dong In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1900-1911
    • /
    • 2015
  • In this paper, we introduce backscatter communication for power-limited sensors to enable long-range transmission in wireless sensor networks, and envision a way to avoid doubly near-far problem in wireless-powered communication network (WPCN) with this technology. In backscatter based WPCN, users harvest energy from both the signal broadcasted by the hybrid access point and the carrier signal transmitted by the carrier emitter in the downlink, and then transmit their own information in a passive way via the reflection of the carrier signal using frequency-shift keying modulation in the uplink. We characterize the energy-free condition and the signal-to-noise ratio (SNR) outage zone in backscatter based WPCN. Further, we propose backscatter based harvest-then-transmit protocol to maximize the sum-throughput of the backscatter based WPCN by optimally allocating time for energy harvesting and information transmission. Numerical results demonstrate that the backscatter based WPCN increases significantly the transmission range and diminishes greatly the SNR outage zone.

Achievable Rate Region Bounds and Resource Allocation for Wireless Powered Two Way Relay Networks

  • Di, Xiaofei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.565-581
    • /
    • 2019
  • This paper investigates the wireless powered two way relay network (WPTWRN), where two single-antenna users and one single-antenna relay firstly harvest energy from signals emitted by a multi-antenna power beacon (PB) and then two users exchange information with the help of the relay by using their harvested energies. In order to improve the energy transfer efficiency, energy beamforming at the PB is deployed. For such a network, to explore the performance limit of the presented WPTWRN, an optimization problem is formulated to obtain the achievable rate region bounds by jointly optimizing the time allocation and energy beamforming design. As the optimization problem is non-convex, it is first transformed to be a convex problem by using variable substitutions and semidefinite relaxation (SDR) and then solve it efficiently. It is proved that the proposed method achieves the global optimum. Simulation results show that the achievable rate region of the presented WPTWRN architecture outperforms that of wireless powered one way relay network architecture. Results also show that the relay location has significant impact on achievable rate region of the WPTWRN.

Optimal Cluster Head Selection Method for Sectorized Wireless Powered Sensor Networks (섹터기반 무선전력 센서 네트워크를 위한 최적 클러스터 헤드 선택 방법)

  • Choi, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.176-179
    • /
    • 2022
  • In this paper, we consider a sectorized wireless powered sensor network (WPSN), wherein sensor nodes are clustered based on sectors and transmit data to the cluster head (CH) using energy harvested from a hybrid access point. We construct a system model for this sectorized WPSN and find optimal coordinates of CH that maximize the achievable transmission rate of sensing data. To obtain the optimal CH with low overhead, we perform an asymptotic geometric analysis (GA). Simulation results show that the proposed GA-based CH selection method is close to the optimal performance exhibited by exhaustive search with a low feedback overhead.

An Optimal Multi-hop Transmission Scheme for Wireless Powered Communication Networks (무선전력 통신 네트워크에서 최적의 멀티홉 전송 방식)

  • Choi, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.11
    • /
    • pp.1679-1685
    • /
    • 2022
  • In this paper, we propose an optimal multi-hop transmission scheme to maximize the end-to-end data rate from the source to the destination node in a wireless powered communication network. The frame structure for multi-hop transmission is presented to transmit multi-hop data while harvesting energy. Then, the transmission time of each node that maximizes the end-to-end transmission rate is determined through mathematical analysis in consideration of different harvested energy and link quality among nodes. We derive an optimization problem through system modeling of the considered wireless powered multi-hop transmission, and prove that there is a global optimal solution by verifying the convexity of this optimization problem. This analysis facilitates to find the optimal solution of the considered optimization problem. The proposed optimal multi-hop transmission scheme maximizes the end-to-end rate by allocating the transmission time for each node that equalizes the transmission rates of all links.

Performance Analysis of Energy-Efficient Secure Transmission for Wireless Powered Cooperative Networks with Imperfect CSI

  • Yajun Zhang;Jun Wu;Bing Wang;Hongkai Wang;Xiaohui Shang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2399-2418
    • /
    • 2023
  • The paper focuses on investigating secure transmission in wireless powered communication networks (WPCN) that involve multiple energy-constrained relays and one energy-constrained source. The energy is harvested from a power beacon (PB) while operating in the presence of a passive eavesdropper. The study primarily aims to achieve energy-efficient secure communications by examining the impact of channel estimation on the secrecy performance of WPCN under both perfect and imperfect CSI scenarios. To obtain practical insights on improving security and energy efficiency, we propose closed-form expressions for secrecy outage probability (SOP) under the linear energy harvesting (LEH) model of WPCN. Furthermore, we suggest a search method to optimize the secure energy efficiency (SEE) with limited power from PB. The research emphasizes the significance of channel estimation in maintaining the desired performance levels in WPCN in real-world applications. The theoretical results are validated through simulations to ensure their accuracy and reliability.

An Adaptive-Harvest-Then-Transmit Protocol for Wireless Powered Communications: Multiple Antennas System and Performance Analysis

  • Nguyen, Xuan Xinh;Do, Dinh-Thuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.1889-1910
    • /
    • 2017
  • This paper investigates a protocol so-called Adaptive Harvest Then Transmit (AHTT) for wireless powered communication networks (WPCNs) in multiple-input single-output (MISO) downlink systems, which assists in transmitting signals from a multi-antenna transmitter to a single-antenna receiver. Particularly, the power constrained relay is supplied with power by utilizing radio frequency (RF) signals from the source. In order to take advantage of multiple antennas, two different linear processing schemes, including Maximum Ratio Combining (MRC) and Selection Combination (SC) are studied. The system outage capacity and ergodic capacity are evaluated for performance analysis. Furthermore, the optimal power allocation is also considered. Our numerical and simulation results prove that the implementation of multiple antennas helps boost the energy harvesting capability. Therefore, this paper puts forward a new way to the energy efficiency (EE) enhancement, which contributes to better system performance.

Full-Duplex Operations in Wireless Powered Communication Networks

  • Ju, Hyungsik;Lee, Yuro;Kim, Tae-Joong
    • ETRI Journal
    • /
    • v.39 no.6
    • /
    • pp.794-802
    • /
    • 2017
  • In this paper, a wireless powered communication network (WPCN) consisting of a hybrid access point (H-AP) and multiple user equipment (UE), all of which operate in full-duplex (FD), is described. We first propose a transceiver structure that enables FD operation of each UE to simultaneously receive energy in the downlink (DL) and transmit information in the uplink (UL). We then provide an energy usage model in the proposed UE transceiver that accounts for the energy leakage from the transmit chain to the receive chain. It is shown that the throughput of an FD WPCN using the proposed FD UE (FD-WPCN-FD) can be maximized by optimal allocation of the UL transmission time to the UE by solving a convex optimization problem. Simulation results reveal that the use of the proposed FD UE efficiently improves the throughput of a WPCN with a practical self-interference cancellation capability at the H-AP. Compared to the WPCN with FD H-AP and half-duplex (HD) UE, FD-WPCN-FD achieved an 18% throughput gain. In addition, the throughput of FD-WPCN-FD was shown to be 25% greater than that of WPCN in which an H-AP and UE operated in HD.

Interference Aware Multipath Routing in Multi-rate Wireless Sensor Networks

  • Lee, Kang Gun;Park, Hyung Kun
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.8
    • /
    • pp.909-914
    • /
    • 2015
  • In wireless sensor networks, sensor nodes have a short transmission range and data is transferred from source to destination node using the multi-hop transmission. Sensor nodes are powered by battery and the link qualities are different, and the routing protocol in the wireless sensor network is one of the important technical issues. Multipath routing was proposed to reduce the data congestion and increase data throughput. In the multipath routing, however, each path can be interfered by the other path, and it can aggravate network performance. In this paper, we propose the multipath routing scheme for multi-rate wireless sensor networks. The multipath routing selects transmission paths to minimize transmission delay and path interference.

Residual Power based Routing Protocol to Extend Network Lifetime in Wireless Sensor Networks (무선센서네트워크에서 네트워크 수명연장을 위한 잔여전력 기반 라우팅 프로토콜)

  • Won, Jongho;Park, Hyung-Kun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.5
    • /
    • pp.592-598
    • /
    • 2018
  • In wireless sensor networks where there is no centralized base station, each node has limited transmission range and the multi-hop routing for transmitting data to the destination is the one of the important technical issues. In particular, the wireless sensor network is not powered by external power source but operates by its own battery, so it is required to maximize the network life through efficient use of energy. To balance the power consumption, the residual power based adaptive power control is required in routing protocol. In this paper, we propose a routing protocol that prolongs the network lifetime by balancing the power consumption among the nodes by controlling the transmit power according to the residual power. We evaluate the proposed routing protocol using extensive simulation, and the results show that the proposed routing scheme can balance the power consumption and prolong network lifetime.

Towards Choosing Authentication and Encryption: Communication Security in Sensor Networks

  • Youn, Seongwook;Cho, Hyun-chong
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.3
    • /
    • pp.1307-1313
    • /
    • 2017
  • Sensor networks are composed of provide low powered, inexpensive distributed devices which can be deployed over enormous physical spaces. Coordination between sensor devices is required to achieve a common communication. In low cost, low power and short-range wireless environment, sensor networks cope with significant resource constraints. Security is one of main issues in wireless sensor networks because of potential adversaries. Several security protocols and models have been implemented for communication on computing devices but deployment these models and protocols into the sensor networks is not easy because of the resource constraints mentioned. Memory intensive encryption algorithms as well as high volume of packet transmission cannot be applied to sensor devices due to its low computational speed and memory. Deployment of sensor networks without security mechanism makes sensor nodes vulnerable to potential attacks. Therefore, attackers compromise the network to accept malicious sensor nodes as legitimate nodes. This paper provides the different security models as a metric, which can then be used to make pertinent security decisions for securing wireless sensor network communication.