Pub Date : 2015-08-01DOI: 10.1109/ISWCS.2015.7454333
A. Caponi, A. Detti, M. Luglio, C. Roseti, F. Zampognaro
Mobile user terminals allow to access different networks through several interfaces. Seamless communications is an essential requirement and service continuity is its main metric from user perspective. Mobile IPv6, ad-hoc routing, dynamic link layer protocol, SDN paradigm greatly facilitate mobility and network flexibility. Nonetheless, full mobility is limited by NAT routers or proxy agents, which break end-to-end semantic, as Performance Enhancing Proxies (PEPs), mandatory component over satellite networks to optimize performance. PEP spoofs TCP connections to end-users and hides connection context to the end-user control. Thus, any dynamic path change leads to the drop of the ongoing connections impairing service continuity. In this paper, we present an enhanced PEP implementation, Mobile-PEP, able to manage handovers without connection context transfer. Main operations and added value in several satellite-based operational scenarios are herein shown, leveraging on a Mobile-PEP prototype implementation.
{"title":"Mobile-PEP: Satellite terminal handover preserving service continuity","authors":"A. Caponi, A. Detti, M. Luglio, C. Roseti, F. Zampognaro","doi":"10.1109/ISWCS.2015.7454333","DOIUrl":"https://doi.org/10.1109/ISWCS.2015.7454333","url":null,"abstract":"Mobile user terminals allow to access different networks through several interfaces. Seamless communications is an essential requirement and service continuity is its main metric from user perspective. Mobile IPv6, ad-hoc routing, dynamic link layer protocol, SDN paradigm greatly facilitate mobility and network flexibility. Nonetheless, full mobility is limited by NAT routers or proxy agents, which break end-to-end semantic, as Performance Enhancing Proxies (PEPs), mandatory component over satellite networks to optimize performance. PEP spoofs TCP connections to end-users and hides connection context to the end-user control. Thus, any dynamic path change leads to the drop of the ongoing connections impairing service continuity. In this paper, we present an enhanced PEP implementation, Mobile-PEP, able to manage handovers without connection context transfer. Main operations and added value in several satellite-based operational scenarios are herein shown, leveraging on a Mobile-PEP prototype implementation.","PeriodicalId":383105,"journal":{"name":"2015 International Symposium on Wireless Communication Systems (ISWCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127698105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ISWCS.2015.7454457
Conrad Dandelski, Bernd-Ludwig Wenning, M. Kuhn, D. Pesch
This paper presents an analysis of the performance of a dense wireless lighting control network under the impact of a broadcast storm. The analysis consists of models for the CSMA/CA mechanism and MAC operations specified by the IEEE 802.15.4 non-beacon enabled mode. The paper compares lighting networks of various densities, transmit powers and varying MAC protocol parameters. The network performance is analysed with respect to QoS parameters, such as packet loss rate and latency. The results of this analysis show clearly that today's standard protocols are not able to deliver sufficient performance in the presence of a Broadcast Storm to fulfil the requirements of a lighting control network.
{"title":"Broadcast storm problem in dense wireless lighting control networks","authors":"Conrad Dandelski, Bernd-Ludwig Wenning, M. Kuhn, D. Pesch","doi":"10.1109/ISWCS.2015.7454457","DOIUrl":"https://doi.org/10.1109/ISWCS.2015.7454457","url":null,"abstract":"This paper presents an analysis of the performance of a dense wireless lighting control network under the impact of a broadcast storm. The analysis consists of models for the CSMA/CA mechanism and MAC operations specified by the IEEE 802.15.4 non-beacon enabled mode. The paper compares lighting networks of various densities, transmit powers and varying MAC protocol parameters. The network performance is analysed with respect to QoS parameters, such as packet loss rate and latency. The results of this analysis show clearly that today's standard protocols are not able to deliver sufficient performance in the presence of a Broadcast Storm to fulfil the requirements of a lighting control network.","PeriodicalId":383105,"journal":{"name":"2015 International Symposium on Wireless Communication Systems (ISWCS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121378550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ISWCS.2015.7454438
Marcos Eduardo Pivaro Monteiro, J. L. Rebelatto, R. Souza, O. Rayel, G. Moritz, B. Filho
We evaluate the secrecy performance of a cooperative network where the destination node is wiretapped by a malicious and passive eavesdropper. We propose the application of the network coding technique as an alternative to increase the secrecy at the destination node, in a scenario without channel state information (CSI) at the transmitter side. Network coding is leveraged by assuming that the legitimate cooperative nodes are able to perform non-binary linear combinations of different frames before the transmission. Theoretic and numerical analyses show that the secrecy can be considerably increased through the use of network coding when compared to the direct transmission and traditional cooperative techniques.
{"title":"Secrecy outage probability of network-coded cooperation without channel state information","authors":"Marcos Eduardo Pivaro Monteiro, J. L. Rebelatto, R. Souza, O. Rayel, G. Moritz, B. Filho","doi":"10.1109/ISWCS.2015.7454438","DOIUrl":"https://doi.org/10.1109/ISWCS.2015.7454438","url":null,"abstract":"We evaluate the secrecy performance of a cooperative network where the destination node is wiretapped by a malicious and passive eavesdropper. We propose the application of the network coding technique as an alternative to increase the secrecy at the destination node, in a scenario without channel state information (CSI) at the transmitter side. Network coding is leveraged by assuming that the legitimate cooperative nodes are able to perform non-binary linear combinations of different frames before the transmission. Theoretic and numerical analyses show that the secrecy can be considerably increased through the use of network coding when compared to the direct transmission and traditional cooperative techniques.","PeriodicalId":383105,"journal":{"name":"2015 International Symposium on Wireless Communication Systems (ISWCS)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116377969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ISWCS.2015.7454376
Qing Bai, J. Nossek
In the recent years, resource allocation problems for energy harvesting nodes have been studied extensively. While a large portion of these contributions focus on the transmit side, less attention has been paid to the receive side or jointly on both sides. In this work, we investigate the joint optimization of transmit and receive policies for a pair of energy harvesting nodes, in the basic setting of point-to-point communication over a single link. The discrete energy arrivals at the two nodes are assumed as independent Poisson processes, and are only known to the respective nodes causally. To this end, we model the system as two decentralized Markov decision processes, which do not share information about their local states but are coupled only through a global reward function, namely, the average throughput of the system. We first compute an upper bound on the system performance by assuming a central controller which is aware of the states of both nodes, and applying the policy-iteration algorithm. Then, based on the transition-independent property of the problem, we employ a low-complexity bilinear programming approach, which, via comparison with the obtained upper bound, is shown to produce local policies with very good performance.
{"title":"Joint optimization of transmission and reception policies for energy harvesting nodes","authors":"Qing Bai, J. Nossek","doi":"10.1109/ISWCS.2015.7454376","DOIUrl":"https://doi.org/10.1109/ISWCS.2015.7454376","url":null,"abstract":"In the recent years, resource allocation problems for energy harvesting nodes have been studied extensively. While a large portion of these contributions focus on the transmit side, less attention has been paid to the receive side or jointly on both sides. In this work, we investigate the joint optimization of transmit and receive policies for a pair of energy harvesting nodes, in the basic setting of point-to-point communication over a single link. The discrete energy arrivals at the two nodes are assumed as independent Poisson processes, and are only known to the respective nodes causally. To this end, we model the system as two decentralized Markov decision processes, which do not share information about their local states but are coupled only through a global reward function, namely, the average throughput of the system. We first compute an upper bound on the system performance by assuming a central controller which is aware of the states of both nodes, and applying the policy-iteration algorithm. Then, based on the transition-independent property of the problem, we employ a low-complexity bilinear programming approach, which, via comparison with the obtained upper bound, is shown to produce local policies with very good performance.","PeriodicalId":383105,"journal":{"name":"2015 International Symposium on Wireless Communication Systems (ISWCS)","volume":"927 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116421560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ISWCS.2015.7454315
Daiki Nakajima, Yusuke Takahashi, Y. Yuda, M. Hoshino, K. Higuchi
We propose a distributed transmission power control method based on soft fractional frequency reuse (SFR) for cellular downlink orthogonal frequency division multiple access (OFDMA). The proposed method adaptively controls the transmission power density in the protected and non-protected bands of SFR depending on the user distribution within a cell in order to maximize the geometric mean of the user throughput (in other words, log sum of user throughput). Thus, it is based on the proportional fair (PF) criteria. The proposed method assumes a decentralized approach, in which complicated inter-base station (BS) cooperation is not required. Since the optimal power allocation to the protected and non-protected bands is dependent on the resource allocation of the protected and non-protected bands to the respective users, the proposed method jointly optimizes the power allocation and resource allocation by using an iterative algorithm. Computer simulation results show the effectiveness of the proposed method compared to conventional universal frequency reuse (UFR) and non-adaptive SFR.
{"title":"Distributed transmission power control method based on soft FFR for cellular downlink","authors":"Daiki Nakajima, Yusuke Takahashi, Y. Yuda, M. Hoshino, K. Higuchi","doi":"10.1109/ISWCS.2015.7454315","DOIUrl":"https://doi.org/10.1109/ISWCS.2015.7454315","url":null,"abstract":"We propose a distributed transmission power control method based on soft fractional frequency reuse (SFR) for cellular downlink orthogonal frequency division multiple access (OFDMA). The proposed method adaptively controls the transmission power density in the protected and non-protected bands of SFR depending on the user distribution within a cell in order to maximize the geometric mean of the user throughput (in other words, log sum of user throughput). Thus, it is based on the proportional fair (PF) criteria. The proposed method assumes a decentralized approach, in which complicated inter-base station (BS) cooperation is not required. Since the optimal power allocation to the protected and non-protected bands is dependent on the resource allocation of the protected and non-protected bands to the respective users, the proposed method jointly optimizes the power allocation and resource allocation by using an iterative algorithm. Computer simulation results show the effectiveness of the proposed method compared to conventional universal frequency reuse (UFR) and non-adaptive SFR.","PeriodicalId":383105,"journal":{"name":"2015 International Symposium on Wireless Communication Systems (ISWCS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116795124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ISWCS.2015.7454366
Sebastian Bittl, Berke Aydinli, Karsten Roscher
Car-to-X communication systems, often called vehicular ad-hoc networks (VANETs), are in the process of entering the mass market in upcoming years. Thereby, security is a core point of concern due to the intended use for safety critical driver assistance systems. However, currently suggested security mechanisms introduce significant overhead into Car-to-X systems in terms of channel load and delay. Especially, the usage of on the fly distributed pseudonym certificates leads to a trade off between channel load and authentication delay, which may lead to significant packet loss. Thus, this work studies a novel concept for pseudonym certificate distribution in VANETs using rate-adaptive certificate distribution based on monitoring a vehicle's environment. Thereby, the cyclic certificate emission frequency is adapted on the fly based on cooperative awareness metrics for discrete parts of the vehicle's surrounding. The obtained mechanism is evaluated in a highway as well as an urban simulation scenario to show its suitability for a broad range of traffic conditions. Thereby, we find that it is able to significantly outperform the currently standardized approach for pseudonym certificate distribution in VANETs based on ETSI ITS standards. Thus, it should be regarded for further development of future VANETs.
{"title":"Efficient rate-adaptive certificate distribution in VANETs","authors":"Sebastian Bittl, Berke Aydinli, Karsten Roscher","doi":"10.1109/ISWCS.2015.7454366","DOIUrl":"https://doi.org/10.1109/ISWCS.2015.7454366","url":null,"abstract":"Car-to-X communication systems, often called vehicular ad-hoc networks (VANETs), are in the process of entering the mass market in upcoming years. Thereby, security is a core point of concern due to the intended use for safety critical driver assistance systems. However, currently suggested security mechanisms introduce significant overhead into Car-to-X systems in terms of channel load and delay. Especially, the usage of on the fly distributed pseudonym certificates leads to a trade off between channel load and authentication delay, which may lead to significant packet loss. Thus, this work studies a novel concept for pseudonym certificate distribution in VANETs using rate-adaptive certificate distribution based on monitoring a vehicle's environment. Thereby, the cyclic certificate emission frequency is adapted on the fly based on cooperative awareness metrics for discrete parts of the vehicle's surrounding. The obtained mechanism is evaluated in a highway as well as an urban simulation scenario to show its suitability for a broad range of traffic conditions. Thereby, we find that it is able to significantly outperform the currently standardized approach for pseudonym certificate distribution in VANETs based on ETSI ITS standards. Thus, it should be regarded for further development of future VANETs.","PeriodicalId":383105,"journal":{"name":"2015 International Symposium on Wireless Communication Systems (ISWCS)","volume":"78 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113978605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ISWCS.2015.7454307
Giancarlo Pastor, I. Norros, R. Jäntti, A. Caamaño
This paper introduces Stochastic Compressive Data Aggregation (S-CDA) for wireless sensor networks (WSN) under random deployments. The Poisson point process (PPP) models the random deployment, and at the same time, allows the efficient implementation of an adequate sparsifying matrix, the random discrete Fourier transform (RDFT). The signal recovery is based on the RDFT which reveals the frequency content of smooth signals, such as temperature or humidity maps, which consist of few frequency components. The recovery methods are based on the accelerated iterative hard thresholding (AIHT) which sets all but the largest (in magnitude) frequency components to zero. The adoption of the PPP allows to analyze the communication and compression aspects of S-CDA using previous results from stochastic geometry and compressed sensing, respectively.
{"title":"Compressive Data Aggregation from Poisson point process observations","authors":"Giancarlo Pastor, I. Norros, R. Jäntti, A. Caamaño","doi":"10.1109/ISWCS.2015.7454307","DOIUrl":"https://doi.org/10.1109/ISWCS.2015.7454307","url":null,"abstract":"This paper introduces Stochastic Compressive Data Aggregation (S-CDA) for wireless sensor networks (WSN) under random deployments. The Poisson point process (PPP) models the random deployment, and at the same time, allows the efficient implementation of an adequate sparsifying matrix, the random discrete Fourier transform (RDFT). The signal recovery is based on the RDFT which reveals the frequency content of smooth signals, such as temperature or humidity maps, which consist of few frequency components. The recovery methods are based on the accelerated iterative hard thresholding (AIHT) which sets all but the largest (in magnitude) frequency components to zero. The adoption of the PPP allows to analyze the communication and compression aspects of S-CDA using previous results from stochastic geometry and compressed sensing, respectively.","PeriodicalId":383105,"journal":{"name":"2015 International Symposium on Wireless Communication Systems (ISWCS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128572135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ISWCS.2015.7454449
J. M. Castro-Arvizu, A. Moragrega, P. Closas, J. Fernández-Rubio
Received Signal Strength (RSS) for indoor localization is widely used due to its simplicity and availability in most mobile devices. The RSS channel model is defined by the propagation losses and the shadow fading. This paper studies two-slope RSS channel model and compares its validity to classical one-slope path loss model. Particularly, the work presents real-data results of a Bayesian calibration method. Validation of the model fitting is then performed in a dynamic scenario where the distance to a reference node is tracked by a Kalman Filter. Results show the superiority of two-slope model, specially at large distances.
{"title":"Assessment of RSS model calibration with real WLAN devices","authors":"J. M. Castro-Arvizu, A. Moragrega, P. Closas, J. Fernández-Rubio","doi":"10.1109/ISWCS.2015.7454449","DOIUrl":"https://doi.org/10.1109/ISWCS.2015.7454449","url":null,"abstract":"Received Signal Strength (RSS) for indoor localization is widely used due to its simplicity and availability in most mobile devices. The RSS channel model is defined by the propagation losses and the shadow fading. This paper studies two-slope RSS channel model and compares its validity to classical one-slope path loss model. Particularly, the work presents real-data results of a Bayesian calibration method. Validation of the model fitting is then performed in a dynamic scenario where the distance to a reference node is tracked by a Kalman Filter. Results show the superiority of two-slope model, specially at large distances.","PeriodicalId":383105,"journal":{"name":"2015 International Symposium on Wireless Communication Systems (ISWCS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134115692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ISWCS.2015.7454455
João Guerreiro, R. Dinis, P. Montezuma
The linear amplification with nonlinear components (LINC) techniques allow a highly efficient amplification of orthogonal frequency division multiplexing (OFDM) signals, but also introduce nonlinear distortion. For this reason, it is important to study the impact of this distortion in the performance of OFDM schemes. Usually this impact is studied by taking advantage of the Gaussian nature of OFDM signals and using intermodulation products (IMP) tools. However, this approach suffers from complexity and/or even convergence problems especially when the nonlinearities are severe, as is the case LINC nonlinearities. In this work we define equivalent nonlinearities that can be employed to substitute the conventional LINC nonlinearities, but that lead to signals with the same spectral characterization. We then use these equivalent nonlinearities to provide accurate estimates for the power spectral density (PSD) and for the optimum performance of OFDM signals that are subjected to LINC structures.
{"title":"A simple method for the analytical characterization of OFDM schemes with LINC transmitter structures","authors":"João Guerreiro, R. Dinis, P. Montezuma","doi":"10.1109/ISWCS.2015.7454455","DOIUrl":"https://doi.org/10.1109/ISWCS.2015.7454455","url":null,"abstract":"The linear amplification with nonlinear components (LINC) techniques allow a highly efficient amplification of orthogonal frequency division multiplexing (OFDM) signals, but also introduce nonlinear distortion. For this reason, it is important to study the impact of this distortion in the performance of OFDM schemes. Usually this impact is studied by taking advantage of the Gaussian nature of OFDM signals and using intermodulation products (IMP) tools. However, this approach suffers from complexity and/or even convergence problems especially when the nonlinearities are severe, as is the case LINC nonlinearities. In this work we define equivalent nonlinearities that can be employed to substitute the conventional LINC nonlinearities, but that lead to signals with the same spectral characterization. We then use these equivalent nonlinearities to provide accurate estimates for the power spectral density (PSD) and for the optimum performance of OFDM signals that are subjected to LINC structures.","PeriodicalId":383105,"journal":{"name":"2015 International Symposium on Wireless Communication Systems (ISWCS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121983738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ISWCS.2015.7454347
Sung Hoon Kim, Dong In Kim
In this paper we study two-zone based wireless powered communication networks (WPCNs) to overcome doubly near-far problem which causes a severe range discrimination. In the two-zone based WPCNs, near users in the inner region (Region 1) from the hybrid access point (H-AP) help far users in the outer region (Region 2) to relay their information to the H-AP in the uplink. We define the minimum energy harvested in the downlink for information transmission of near users in Region 1, and then propose an algorithm to determine a proper boundary for the greedy algorithm being used for relay pairing. The convex optimization technique is used to maximize the throughput of two-zone based WPCNs, whose performance, in terms of throughput and fairness, is compared with those with sum-throughput and common-throughput maximization techniques operated by the harvest-then-transmit protocol.
{"title":"Performance tradeoff in two-zone based wireless powered communication networks","authors":"Sung Hoon Kim, Dong In Kim","doi":"10.1109/ISWCS.2015.7454347","DOIUrl":"https://doi.org/10.1109/ISWCS.2015.7454347","url":null,"abstract":"In this paper we study two-zone based wireless powered communication networks (WPCNs) to overcome doubly near-far problem which causes a severe range discrimination. In the two-zone based WPCNs, near users in the inner region (Region 1) from the hybrid access point (H-AP) help far users in the outer region (Region 2) to relay their information to the H-AP in the uplink. We define the minimum energy harvested in the downlink for information transmission of near users in Region 1, and then propose an algorithm to determine a proper boundary for the greedy algorithm being used for relay pairing. The convex optimization technique is used to maximize the throughput of two-zone based WPCNs, whose performance, in terms of throughput and fairness, is compared with those with sum-throughput and common-throughput maximization techniques operated by the harvest-then-transmit protocol.","PeriodicalId":383105,"journal":{"name":"2015 International Symposium on Wireless Communication Systems (ISWCS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127149664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}