Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-m9kch Total loading time: 0 Render date: 2024-05-12T01:03:25.332Z Has data issue: false hasContentIssue false

5 - Multiple Antennas and Beamforming for SWIPT Systems

from Part II - Architectures, Protocols, and Performance Analysis

Published online by Cambridge University Press:  01 December 2016

Derrick Wing Kwan Ng
Affiliation:
University of New South Wales, Sydney, Australia
Shiyang Leng
Affiliation:
The Pennsylvania State University, USA
Robert Schober
Affiliation:
Friedrich–Alexander–Universität Erlangen–Nürnberg, Erlangen, Germany
Dusit Niyato
Affiliation:
Nanyang Technological University, Singapore
Ekram Hossain
Affiliation:
University of Manitoba, Canada
Dong In Kim
Affiliation:
Sungkyunkwan University, Korea
Vijay Bhargava
Affiliation:
University of British Columbia, Vancouver
Lotfollah Shafai
Affiliation:
University of Manitoba, Canada
Get access

Summary

Introduction

The development of wireless communication networks worldwide has triggered an exponential growth in the number of wireless communication devices and sensors for applications such as e-health, automated control, environmental monitoring, energy management, and safety management. It is expected that, by 2020, the number of inter-connected devices on the planet may reach 50 billion. Recent efforts in next-generation communication system development aim at providing secure, ubiquitous, and high-speed communication with guaranteed quality of service (QoS). However, the related tremendous increase in the number of transmitters and receivers has also led to a huge demand for energy. A relevant technique for reducing the energy consumption of wireless devices is multiple-input multiple-output (MIMO), since it offers extra degrees of freedom for more efficient resource allocation. In particular, multiuser MIMO, where a transmitter equipped with multiple antennas serves multiple single-antenna receivers, is considered an effective solution for realizing the potential performance gains offered by multiple antennas to improve the system spectral efficiency and reduce the transmit power. On the other hand, battery-powered mobile devices such as wireless sensors have been widely deployed and have become critical components of many wireless communication networks over the past decades. However, batteries have limited energy storage capacity and their replacement can be costly or even impossible, which creates a performance bottleneck in wireless networks. As a result, energy harvesting technology is foreseen as a viable solution to remove the last wires of wireless devices. The integration of energy harvesting (EH) capabilities into communication devices facilitates self-sustainability of energy limited communication systems. Solar, wind, hydroelectric, and piezoelectric are the major conventional energy sources for EH. For instance, energy harvesters for harvesting wind and solar energy have been successfully integrated into base station transmitters for providing communication services in remote areas [1]. However, the availability of these natural energy sources is usually limited by location, climate, and time of day. Besides, the implementation of conventional energy harvesters may be problematic and renewable energy from natural sources may not be available in indoor environments. Thus, a new form of controllable energy source for portable wireless devices is needed in order to extend the lifetime of communication networks.

Type
Chapter
Information
Wireless-Powered Communication Networks
Architectures, Protocols, and Applications
, pp. 170 - 216
Publisher: Cambridge University Press
Print publication year: 2016

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[1] Huawei, Green Energy Solution by Huawei (available at www.huawei.com/en/solutions/gogreener/hw-001339-greencommunication-energyefficiency-emissionreduct.htm).
[2] L., Varshney, “Transporting information and energy simultaneously,” in Proc. IEEE International Symposirshney, “Transporting information and energy simultaneously,” in Proc. IEEE International Symposium on Information Theory, July 2008, pp. 1612–1616.Google Scholar
[3] P., Grover and A., Sahai, “Shannon meets Tesla: Wireless information and power transfer,” in Proc. IEEE International Symposium on Information Theory, June 2010, pp. 2363–2367.Google Scholar
[4] I., Krikidis, S., Timotheou, S., Nikolaou et al., “Simultaneous wireless information and power transfer in modern communication systems,” IEEE Communications Magazine, vol. 52, no. 11, pp. 104–110, November 2014.Google Scholar
[5] Z., Ding, C., Zhong, D. W. K., Ng et al., “Application of smart antenna technologies in simultaneous wireless information and power transfer,” IEEE Communications Magazine, vol. 53, no. 4, pp. 86–93, April 2015.Google Scholar
[6] X., Chen, Z., Zhang, H.-H., Chen, and H., Zhang, “Enhancing wireless information and power transfer by exploiting multi-antenna techniques,” IEEE Communications Magazine, no. 4, pp. 133–141. April 2015.Google Scholar
[7] Powercast Coporation, RF Energy Harvesting and Wireless Power for Low-Power Applications, 2011 (available at www.mouser.com/pdfdocs/Powercast-Overview-2011-01-25.pdf).
[8] A., Sample and J., Smith, “Experimental results with two wireless power transfer systems,” in Proc. IEEE Radio and Wireless Symposium, January 2009, pp. 16–18.Google Scholar
[9] R., Zhang and C. K., Ho, “MIMO broadcasting for simultaneous wireless information and power transfer,” in Proc. IEEE Global Telecommunications Conference, December 2011, pp. 1–5.Google Scholar
[10] L., Liu, R., Zhang, and K.-C., Chua, “Wireless information transfer with opportunistic energy harvesting,” IEEE Transactions of Wireless Communications, vol. 12, no. 1, pp. 288–300, January 2013.Google Scholar
[11] X., Zhou, R., Zhang, and C. K., Ho, “Wireless information and power transfer: Architecture design and rate–energy tradeoff,” IEEE Transaction on Communication, vol. 61, pp. 4754–4767, November 2013.Google Scholar
[12] D. W. K., Ng, E. S., Lo, and R., Schober, “Wireless information and power transfer: Energy efficiency optimization in OFDMA systems,” IEEE Transaction on Wireless Communications, vol. 12, pp. 6352–6370, December 2013.Google Scholar
[13] D. W. K., Ng and R., Schober, “Resource allocation for secure communication in systems with wireless information and power transfer,” in Proc. IEEE Global Telecommunications Conference, December 2013.
[14] D. W. K., Ng and R., Schober, “Spectral efficient optimization in OFDM systems with wireless information and power transfer,” in 21st European Signal Processing Conference (EUSIPCO), September 2013, pp. 1–5.Google Scholar
[15] D. W. K., Ng, E. S., Lo, and R., Schober, “Energy-efficient power allocation in OFDM systems with wireless information and power transfer,” in Proc. IEEE International Communications Conference, June 2013, pp. 4125–4130.Google Scholar
[16] D. W. K., Ng, E. S., Lo, and R., Schober, “Robust beamforming for secure communication in systems with wireless information and power transfer,” IEEE Transactions on Wireless Communications, vol. 13, pp. 4599–4615, August 2014.Google Scholar
[17] R. T., Marler and J. S., Arora, “Survey of multi-objective optimization methods for engineering,” Structural and Multidisciplinary Optimization, vol. 26, pp. 369–395, April 2004.Google Scholar
[18] L., Liu, R., Zhang, and K.-C., Chua, “Secrecy wireless information and power transfer with MISO beamforming,” IEEE Transactions on Signal Processing, vol. 62, pp. 1850–1863, April 2014.Google Scholar
[19] C. Y., Wong, R. S., Cheng, K. B., Letaief, and R. D., Murch, “Multiuser OFDM with adaptive subcarrier, bit, and power allocation,” IEEE Journal on Selected Areas in Communications, vol. 17, pp. 1747–1758, October 1999.Google Scholar
[20] V. K. N., Lau and Y. K., Kwok, Channel Adaptation Technologies and Cross Layer Design for Wireless Systems with Multiple Antennas – Theory and Applications, 1st edn. New York : Wiley, 2005.
[21] W.-L., Li, Y. J., Zhang, A.-C., So, and M., Win, “Slow adaptive OFDMA systems through chance constrained programming,” IEEE Transactions on Signal Processing, vol. 58, pp. 3858–3869, July 2010.Google Scholar
[22] D. W. K., Ng, E. S., Lo, and R., Schober, “Energy-efficient resource allocation in multicell OFDMA systems with limited backhaul capacity,” IEEE Transactions on Wireless Communications, vol. 11, pp. 3618–3631, October 2012.Google Scholar
[23] D. W. K., Ng and R., Schober, “Cross-layer scheduling for OFDMA amplify-and-forward relay networks,” IEEE Transactions on Vehicular Technology, vol. 59, pp. 1443–1458, March 2010.Google Scholar
[24] D. W. K., Ng, E. S., Lo, and R., Schober, “Dynamic resource allocation in MIMO-OFDMA systems with full-duplex and hybrid relaying,” IEEE Transactions on Communication, vol. 60, May 2012.Google Scholar
[25] H., Jabbar, Y., Song, and T., Jeong, “RF energy harvesting system and circuits for charging of mobile devices,” IEEE Transactions on Consumer Electronics, vol. 56, pp. 247–253, February 2010.Google Scholar
[26] X., Zhou, R., Zhang, and C. K., Ho, “Wireless information and power transfer: Architecture design and rate–energy tradeoff,” in Proc. IEEE Global Telecommunications Conference, December 2012.
[27] R., Zhang and C. K., Ho, “MIMO broadcasting for simultaneous wireless information and power transfer,” IEEE Transactions on Wireless Communications, vol. 12, pp. 1989–2001, May 2013.Google Scholar
[28] E., Boshkovska, D., Ng, N., Zlatanov, and R., Schober, “Practical non-linear energy harvesting model and resource allocation for SWIPT systems,” IEEE Communication Letters, arXiv:1509.02956v1, 2015.
[29] S., Leng, D. W. K., Ng, N., Zlatanov, and R., Schober, “Multi-objective beamforming for energy-efficient SWIPT systems,” in Proc. International Conference on Computing, Networking and Communications, February 2016.
[30] D. W. K., Ng, E. S., Lo, and R., Schober, “Energy-efficient resource allocation in multiuser OFDM systems with wireless information and power transfer,” in Proc. IEEE Wireless Communications and Networking Conference, 2013.
[31] S., Leng, D. W. K., Ng, and R., Schober, “Power efficient and secure multiuser communication systems with wireless information and power transfer,” in Proc. IEEE International Communications Conference, June 2014.
[32] D. W. K., Ng, L., Xiang, and R., Schober, “Multi-objective beamforming for secure communication in systems with wireless information and power transfer,” in Proc. IEEE Personal, Indoor and Mobile Radio Communication Symposium, September 2013.
[33] D. W. K., Ng, R., Schober, and H., Alnuweiri, “Secure layered transmission in multicast systems with wireless information and power transfer,” in Proc. IEEE International Communications Conference, June 2014, pp. 5389–5395.
[34] D. W. K., Ng and R., Schober, “Resource allocation for coordinated multipoint networks with wireless information and power transfer,” in Proc. IEEE Global Telecommunications Conference, December 2014, pp. 4281–4287.Google Scholar
[35] M., Chynonova, R., Morsi, D. W. K., Ng, and R., Schober, “Optimal multiuser scheduling schemes for simultaneous wireless information and power transfer,” in 23rd European Signal Processing Conference (EUSIPCO), August 2015.
[36] Q., Wu, M., Tao, D. W. K., Ng, W., Chen, and R., Schober, “Energy-efficient transmission for wireless powered multiuser communication networks,” in Proc. IEEE International Communications Conference, June 2015.
[37] D., Ng and R., Schober, “Max–min fair wireless energy transfer for secure multiuser communication systems,” in IEEE Information Theory Workshop (ITW), November 2014, pp. 326–330.Google Scholar
[38] X., Chen, C., Yuen, and Z., Zhang, “Wireless energy and information transfer tradeoff for limited-feedback multiantenna systems with energy beamforming,” IEEE Transactions on Vehicular Technology, vol. 63, pp. 407–412, January 2014.Google Scholar
[39] H., Wang, W., Wang, X., Chen, and Z., Zhang, “Wireless information and energy transfer in interference aware massive MIMO systems,” in Proc. IEEE Global Telecommunications Conference, December 2014, pp. 2556–2561.Google Scholar
[40] IEEE P802.11 Wireless LANs, “TGn channel models”, IEEE 802.11-03/940r4, technical report, May 2004.
[41] J. F., Sturm, “Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones,” Optimization Methods and Software, vol. 11–12, pp. 625–653, September 1999.Google Scholar
[42] K. C., Toh, M. J., Todd, and R. H., Tütüncü, “SDPT3 – A Matlab software package for semidefinite programming, version 1.3,” Optimization Methods and Software, vol. 11, pp. 545–581, January 1999.Google Scholar
[43] G., Zheng, K. K., Wong, and T. S., Ng, “Robust linear MIMO in the downlink: A worst-case optimization with ellipsoidal uncertainty regions,” EURASIP Journal on Advances in Signal Processing, article ID 609028, 2008.
[44] C., Shen, T.-H., Chang, K.-Y., Wang, Z., Qiu, and C.-Y., Chi, “Distributed robust multicell coordinated beamforming with imperfect CSI: An ADMM approach,” IEEE Transactions on Signal Processing, vol. 60, pp. 2988–3003, June 2012.Google Scholar
[45] N., Vucic and H., Boche, “Robust QoS-constrained optimization of downlink multiuser MISO systems,” IEEE Transactions on Signal Processing, vol. 57, pp. 714–725, February 2009.Google Scholar
[46] J., Wang and D., Palomar, “Worst-case robust MIMO transmission with imperfect channel knowledge,” IEEE Transactions on Signal Processing, vol. 57, pp. 3086–3100, August 2009.Google Scholar
[47] S., Boyd and L., Vandenberghe, Convex Optimization. Cambridge : Cambridge University Press, 2004.
[48] M., Grant and S., Boyd, CVX: Matlab Software for Disciplined Convex Programming, Version 2.0 Beta, September 2013 (available at https://cvxr.com/cvx).
[49] D. W. K., Ng, E. S., Lo, and R., Schober, “Multi-objective resource allocation for secure communication in cognitive radio networks with wireless information and power transfer,” IEEE Transactions on Vehicular Technology, arXiv:1403.0054, May 2015.
[50] E., Björnson and E., Jorswieck, Optimal Resource Allocation in Coordinated Multi-Cell Systems. Boston, MA : Now Publishers Inc., 2013.
[51] Z., Hasan, G., Bansal, E., Hossain, and V., Bhargava, “Energy-efficient power allocation in OFDM-based cognitive radio systems: A risk–return model,” IEEE Transactions on Wireless Communications, vol. 8, pp. 6078–6088, December 2009.Google Scholar
[52] D. W. K., Ng, E., Lo, and R., Schober, “Energy-efficient resource allocation in OFDMA systems with large numbers of base station antennas,” IEEE Transactions on Wireless Communications, vol. 11, pp. 3292–3304, September 2012.Google Scholar
[53] D. W. K., Ng, E. S., Lo, and R., Schober, “Energy-efficient resource allocation in OFDMA systems with hybrid energy harvesting base station,” IEEE Transactions on Wireless Communications, vol. 12, pp. 3412–3427, July 2013.Google Scholar
[54] X., Chen, X., Wang, and X., Chen, “Energy-efficient optimization for wireless information and power transfer in large-scale MIMO systems employing energy beamforming,” IEEE Wireless Communications Letters, vol. 2, pp. 1–4, December 2013.Google Scholar
[55] A. D., Wyner, “The wire-tap channel,” The Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, October 1975.Google Scholar
[56] S., Goel and R., Negi, “Guaranteeing secrecy using artificial noise,” IEEE Transactions on Wireless Communications, vol. 7, pp. 2180–2189, June 2008.Google Scholar
[57] D. W. K., Ng, E. S., Lo, and R., Schober, “Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks,” IEEE Transications on Wireless Communiations, vol. 10, pp. 3528–3540, August 2011.Google Scholar
[58] X., Chen and H.-H., Chen, “Physical layer security in multi-cell MISO downlinks with incomplete CSI – A unified secrecy performance analysis,” IEEE Transactions on Signal Processing, vol. 62, pp. 6286–6297, December 2014.Google Scholar
[59] D. W. K., Ng, E. S., Lo, and R., Schober, “Efficient resource allocation for secure OFDMA systems,” IEEE Transactions on Vehicular Technology, vol. 61, pp. 2572–2585, July 2012.Google Scholar
[60] J., Zhu, V. K., Bhargava, and R., Schober, “Secure downlink transmission in massive MIMO system with zero-forcing precoding,” in Proc. European Wireless Conference, May 2014, pp. 1–6.Google Scholar
[61] L., Liu, R., Zhang, and K.-C., Chua, “Secrecy wireless information and power transfer with MISO beamforming,” in Proc. IEEE Global Telecommunications Conference, December 2013.
[62] D. W. K., Ng and R., Schober, “Secure and green SWIPT in distributed antenna networks with limited backhaul capacity,” IEEE Transactions on Wireless Communications, vol. 14, no. 9, pp. 5082–5097, September 2015.Google Scholar
[63] Q., Wang, H., Su, K., Ren, and K., Kim, “Fast and scalable secret key generation exploiting channel phase randomness in wireless networks,” in Proc. IEEE International Conference on Computer Communications, April 2011, pp. 1422–1430.Google Scholar
[64] J., Zhu, R., Schober, and V., Bhargava, “Secure transmission in multicell massive MIMO systems,” IEEE Transactions Wireless Communications, vol. 13, pp. 4766–4781, September 2014.Google Scholar
[65] X., Chen, J., Chen, and T., Liu, “Secure wireless information and power transfer in large-scale MIMO relaying systems with imperfect CSI,” in Proc. IEEE Global Telecommunications Conference, December 2014, pp. 4131–4136.Google Scholar
[66] A., Charnes and W. W., Cooper, “Programming with linear fractional functions,” Naval Research Logistics Quarterly, vol. 9, pp. 181–186, April 1962.Google Scholar
[67] Q., Li and W. K., Ma, “Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization,” IEEE Transactions on Signal Processing, vol. 61, pp. 2704–2717, May 2013.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×