Most cited article - PubMed ID 33266932
Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments
The evolution of next-generation Internet-of-Things (IoT) in recent years exhibits a unique segment that wireless communication paradigms are oriented towards not only improved spectral efficiency transmission but also energy efficiency. This paper addresses these critical issues by proposing a novel communication model, namely power beacon-assisted energy-harvesting symbiotic radio. In particular, the limited energy primary IoT source communicates with its destination by first harvesting energy from a dedicated power beacon and then performing information exchange, while the backscatter device communicates by exploiting the available radio frequency emitted by the primary IoT source. The destination uses successive interference cancellation mechanisms to decode both its received signals. To assess the performance quality of the proposed communication model, we theoretically derive the coexistence outage probability (COP) in terms of highly accurate expressions and upper-bound and lower-bound approximations. Subsequently, we carry out a series of numerical results to verify the developed theory frameworks on the one hand, and on the other hand, analyze the COP performance against the variations of system key parameters (transmit signal-to-noise ratio, the time-splitting coefficient, the energy conversion efficiency factor, the reflection coefficient, and the coexistent decoding threshold). Our numerical results demonstrate that the proposed communication model can potentially work well in practices with reliable communication over 90% (COP is less than 0.1). Additionally, it also demonstrates that optimizing the reflection coefficient at the backscatter device can facilitate achieving minimal COP performance.
In the present paper, we investigate the performance of the simultaneous wireless information and power transfer (SWIPT) based cooperative cognitive radio networks (CCRNs). In particular, the outage probability is derived in the closed-form expressions under the opportunistic partial relay selection. Different from the conventional CRNs in which the transmit power of the secondary transmitters count merely on the aggregate interference measured on the primary networks, the transmit power of the SWIPT-enabled transmitters is also constrained by the harvested energy. As a result, the mathematical framework involves more correlated random variables and, thus, is of higher complexity. Monte Carlo simulations are given to corroborate the accuracy of the mathematical analysis and to shed light on the behavior of the OP with respect to several important parameters, e.g., the transmit power and the number of relays. Our findings illustrate that increasing the transmit power and/or the number of relays is beneficial for the outage probability.
- Keywords
- SWIPT, cognitive radio network, decode–and–forward, outage probability, relay selection,
- MeSH
- Algorithms * MeSH
- Cognition MeSH
- Monte Carlo Method MeSH
- Computer Communication Networks * MeSH
- Probability MeSH
- Publication type
- Journal Article MeSH
Full-duplex (FD) with simultaneous wireless information and power transfer (SWIPT) in wireless ad hoc networks has received increased attention as a technology for improving spectrum and energy efficiency. This paper studies the outage performance for a SWIPT-based decode-and-forward (DF) FD relaying network consisting of a single-antenna source S, a two-antenna relay R, and a multi-antenna destination D. Specifically, we propose four protocols, namely static time-switching factor with selection combining (STSF-SC), static time-switching factor with maximal ratio combining (STSF-MRC), optimal dynamic time-switching factor with selection combining (ODTSF-SC), and optimal dynamic time-switching factor with maximal ratio combining (ODTSF-MRC) to fully investigate the outage performance of the proposed system. In particular, the optimal time-switching factor from the ODTSF-SC and ODTSF-MRC methods is designed to maximize the total received data at the destination. In this context, we derive exact closed-formed expressions for all schemes in terms of the outage probability (OP). Finally, the Monte Carlo simulations are conducted to corroborate the theoretical analysis's correctness and the proposed schemes' effectiveness.
- Keywords
- SWIPT, decode-and-forward (DF), energy harvesting, full-duplex, outage probability, time-switching relaying (TSR),
- Publication type
- Journal Article MeSH
Relay communication, in which the relay forwards the signal received by a source to a destination, has a massive consideration in research, due to its ability to expand the coverage, increase the capacity, and reduce the power consumption. In this paper, we proposed and investigated energy harvesting (EH) based two-way half-duplex (TWHD) relaying sensors network using selection combining (SC) over block Rayleigh fading channel. In this model, we proposed the direct link between two sources for improving the system performance. For the system performance analysis, we investigated and derived the closed-form of the exact and upper bound Ergodic capacity (EC) and the exact form of the symbol error ratio (SER). By using the Monte Carlo simulation, the correctness of the research results is verified in the influence of the main system parameters. From the discussions, we can see that the analytical and simulation agree well with each other.
- Keywords
- SER, energy harvesting (EH), ergodic capacity (EC), sensors network, two-way,
- Publication type
- Journal Article MeSH
In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.
- Keywords
- co-channel interference, energy harvesting, hardware impairments, rateless codes, transmit antenna selection,
- Publication type
- Journal Article MeSH