scholarly journals Joint Power Splitting and Relay Selection in Energy-Harvesting Communications for IoT Networks

2020 ◽  
Vol 7 (1) ◽  
pp. 584-597 ◽  
Author(s):  
Yulong Zou ◽  
Jia Zhu ◽  
Xiao Jiang
2019 ◽  
Vol 11 (2) ◽  
pp. 47 ◽  
Author(s):  
Xin Song ◽  
Siyang Xu ◽  
Zhigang Xie ◽  
Xiuwei Han

In this paper, we propose a joint power allocation, time switching (TS) factor and relay selection scheme for an energy harvesting two-way relaying communication network (TWRN), where two transceivers exchange information with the help of a wireless-powered relay. By exploiting the TS architecture at the relay node, the relay node needs to use additional time slots for energy transmission, reducing the transmission rate. Thus, we propose a joint resource allocation algorithm to maximize the max-min bidirectional instantaneous information rate. To solve the original non-convex optimization problem, the objective function is decomposed into three sub-problems and solved sequentially. The closed-form solution of the transmit power of two sources and the optimal TS factor can be obtained by the information rate balancing technology and the proposed time allocation scheme, respectively. At last, the optimal relay node can be obtained. Simulation results show that the performance of the proposed algorithm is better than the traditional schemes and power-splitting (PS) scheme.


2015 ◽  
Vol 22 (7) ◽  
pp. 823-827 ◽  
Author(s):  
Zheng Zhou ◽  
Mugen Peng ◽  
Zhongyuan Zhao ◽  
Yong Li

2021 ◽  
Author(s):  
xiao jiang ◽  
Peng Li ◽  
ruchuan wang

Abstract In this paper, we consider an energy-harvesting (EH) relay network composing of multiple sources, a destination and multiple EH decode-and-forward (DF) relays. The EH relays all equip with a power splitter to divide the received signal power into two parts, one for information decoding and the remaining for signal relaying. The power splitting ratio (PSR) depicts the trade-off between the relaying energy and decoding energy. We propose an optimal power splitting and joint source-relay selection (OPS-JSRS) scheme where the optimal power-splitting ratio is obtained and the best source-relay pair is selected to transmit the message. For the purpose of comparison, we examine the optimal power splitting and round-robin (OPS-RR) scheme and the traditional power splitting and joint source-relay selection (TPS-JSRS) scheme. The exact and asymptotic closed-form expressions of outage probability for OPS-RR, TPS-JSRS and OPS-JSRS schemes are derived. Numerical results show that OPS-JSRS scheme is better than OPS-RR and TPS-JSRS schemes in terms of outage probability, explaining the superiority of the proposed OPS-JSRS scheme. Additionally, outage probability performance of OPS-JSRS scheme can be improved by increasing the number of sources and relays.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Khuong Ho-Van ◽  
Thiem Do-Dac

This paper selects an unlicensed relay among available self-powered relays to not only remain but also secure information transmission from an unlicensed source to an unlicensed destination. The relays harvest energy in signals of the unlicensed source and the licensed transmitter. Then, they spend the harvested energy for their relaying operation. Conditioned on the licensed outage restriction, the peak transmission power restriction, Rayleigh fading, and the licensed interference, the current paper proposes an exact closed-form formula of the secrecy outage probability to quickly evaluate the secrecy performance of the proposed relay selection method in cognitive radio networks with energy harvesting. The proposed formula is corroborated by computer simulations. Several results illustrate the effectiveness of the relay selection in securing information transmission. Additionally, the security capability is saturated at large peak transmission powers or large preset outage probabilities of licensed users. Furthermore, the security capability depends on many specifications among which the power splitting ratio, the relays’ positions, and the time switching ratio can be optimally selected to obtain the best security performance.


2013 ◽  
Vol 2 (2) ◽  
pp. 239-242 ◽  
Author(s):  
Imtiaz Ahmed ◽  
Aissa Ikhlef ◽  
Robert Schober ◽  
Ranjan K. Mallik

Sign in / Sign up

Export Citation Format

Share Document