Simultaneously Wireless InFormation and energy Transfer (SWIFT)

Lead Research Organisation: King's College London
Department Name: Informatics

Abstract

Abstracts are not currently available in GtR for all funded research. This is normally because the abstract was not required at the time of proposal submission, but may be because it included sensitive information such as personal details.

Publications

10 25 50
 
Description In the first work, secrecy transmission with the aid of a group of wireless energy harvesting-enabled amplify-and-forward (AF) relays performing cooperative jamming (CJ) and relaying. The source node in the network does simultaneous wireless information and power transfer with each relay employing a power splitting receiver in the first phase; each relay further divides its harvested power for forwarding the received signal and generating artificial noise for jamming the eavesdroppers in the second transmission phase. In the centralized case with global channel state information (CSI), we provided the closed-form expressions for the optimal and/or suboptimal AF-relay beamforming vectors to maximize the achievable secrecy rate subject to individual power constraints of the relays, using the technique of semidefinite relaxation (SDR), which is proved to be tight. A fully distributed algorithm utilizing only local CSI at each relay is also proposed as a performance benchmark. This work has been published in IEEE Transactions on Wireless Communications.
In the second work, we presented theoretical limits and practical designs of jamming approaches for physical layer security. In particular, the theoretical limits explore the achievable secrecy rates of user cooperation based jamming whilst the centralized, and game theoretic based precoding techniques are reviewed for practical implementations. This work has been published in IEEE ACCESS. In the third work, we investigated the downlink/uplink of wireless powered networks (WPNs), which are exposed to the effect of the cascaded near-far problem, i.e., the asymmetric overall degradation of the users' performance, due to different path-loss values. More specifically, assuming that the users are able to harvest energy both from interference and desired signals, higher path-loss reduces the downlink rate of the far user, while it also negatively affects its uplink rate, since less energy can be harvested during downlink. In the fourth work a new frame structure is proposed for cognitive radio networks in which energy constrained secondary users (SUs) can harvest energy from the randomly deployed power beacons. These works are useful for the sensors in massive IoT where the conventional power supply is not feasible.
Exploitation Route We planned to arrange the workshop to disseminate the research outcome to academics as well as to suitable industries. We also planned to participate in the industrial forums such as mobile world congress and disseminate the research outcome. We are now extending this work to non-orthogonal multiple access (NOMA) schemes and to mobile edge computing (MEC)
Sectors Digital/Communication/Information Technologies (including Software),Education

 
Description Simultaneous Wireless Information and Power transfer is highly suitable technique in massive IoT system where millions of sensors need to be powered. Our findings in this project have been disseminated in numerous top IEEE journals and IEEE Flagship conferences and attracted the interest of non-academic industries. More specifically, industries are interested in the secure wireless power transmission. In our findings, we demonstrated the secrecy transmission with the aid of a group of wireless energy harvesting-enabled amplify-and-forward (AF) relays performing cooperative jamming (CJ) and relaying. We also developed highly practical designs of jamming approaches for physical layer security. In particular, we demonstrated the achievable secrecy rates of user cooperation based jamming whilst the centralized, and game theoretic based precoding techniques are reviewed for practical implementations. In addition, we investigated the downlink/uplink of wireless powered networks (WPNs), which are exposed to the effect of the cascaded near-far problem. Finally, a new frame structure has been developed for cognitive radio networks in which energy constrained secondary users (SUs) can harvest energy from the randomly deployed power beacons. These findings are highly useful for the industries which develop sensors for massive IoT where the conventional power supply is not feasible.
First Year Of Impact 2017
Sector Digital/Communication/Information Technologies (including Software),Education
Impact Types Economic