Wireless powered communication networks : from security challenges to loT applications
著者
書誌事項
Wireless powered communication networks : from security challenges to loT applications
Springer, c2019
大学図書館所蔵 全2件
  青森
  岩手
  宮城
  秋田
  山形
  福島
  茨城
  栃木
  群馬
  埼玉
  千葉
  東京
  神奈川
  新潟
  富山
  石川
  福井
  山梨
  長野
  岐阜
  静岡
  愛知
  三重
  滋賀
  京都
  大阪
  兵庫
  奈良
  和歌山
  鳥取
  島根
  岡山
  広島
  山口
  徳島
  香川
  愛媛
  高知
  福岡
  佐賀
  長崎
  熊本
  大分
  宮崎
  鹿児島
  沖縄
  韓国
  中国
  タイ
  イギリス
  ドイツ
  スイス
  フランス
  ベルギー
  オランダ
  スウェーデン
  ノルウェー
  アメリカ
注記
Includes bibliographical references
内容説明・目次
内容説明
This textbook introduces Wireless Powered Communication Networks (WPCNs) as a promising paradigm to overcome the energy bottleneck suffered by traditional wireless communication networks, as well as emerging Internet-of-Things networks. It selectively spans a coherent spectrum of fundamental aspects in WPCNs, such as wireless energy transfer (WEH) techniques, radio frequency (RF) energy harvesting receiver model, simultaneous wireless information and power transfer (SWIPT), as well as the rate-energy tradeoff arising from the joint transmission of information and energy using the same waveform. It covers network models for WPCNs, including the baseline and dual-hop WPCN models and a variety of related extensions. This book further examines the key factors including throughput, fairness, and security that must be taken into account for impeccable operation of WPCNs. The new IoT applications are targeted as a key element in those factors. It will also include exercises and examples throughout the book, as well as their PLS solutions.
This is the first textbook examining the current research to provide a unified view of wireless power transfer (WPT) and information transmission in WPCNs from a physical layer security (PLS) perspective. Focused on designing efficient secure transmission schemes, analyzing energy evolvement process, and evaluating secrecy outage performance under different channel state information (CSI), the results presented in this book shed light on how to best balance security and throughput with prudent use of harvested energy in WCNs. It also provides an overview of the WPCNs by introducing the background of WPT, followed by a summary of the research conducted in the field. The authors describe the physical-layer security (PLS) problem in WPCNs, including the causes and the impacts of the problem on the performance of WPCNs. The authors extend the discussions by introducing the applications of WPCNs in the IoT.
From the Internet of Things (IoT) point of view, this textbook reviews the opportunities and challenges for the lately-emerged WPCN to seamlessly integrate into the IoT ecosystem. It specifically addresses the maximization problem of uplink and downlink sum-throughout in a dual-hop WPCN, while taking fairness among WPCN users as a constraint. The results provided in this book reveal valuable insights into improving the design and deployment of future WPCNs in the upcoming IoT environment.
This textbook targets advanced-level students studying wireless communications and research engineers working in this field. Industry engineers in mobile device and network development business with an interest in WPCNs and IoT, as well as their PLS solutions, will also find this book useful.
目次
1. Introduction to Wireless Powered Communication Networks
1.1. Overview
1.1.1. Wireless Energy Transfer
1.1.2. Radio Frequency Energy Harvesting
1.2. Simultaneous Wireless Information and Power Transfer
1.2.1. Rate-Energy Tradeoff
1.2.2. Receiver Architecture Design in SWIPT
1.3. Wireless Powered Communication Networks
1.3.1. Baseline WPCN Model
1.3.2. Dual-Hop WPCN Model
1.3.3. WPCN Extensions and Challenges
1.4. IoT Applications
1.4.1. The Internet of Things
1.4.2. Application Requirements of the IoT
1.4.3. Wireless Powered Communications for IoT
1.5. Summary
References
2. Enhancing Physical Layer Security in Wireless Powered Communication Networks
2.1. Introduction to Physical Layer Security
2.2. The State of The Art of PLS Schemes in WPCNs: A Signal Processing Perspective
2.3. Accumulate-then-Transmit: Secure WPCN in the Presence of Multiple Eavesdroppers
2.3.1. System Model and Protocol Design
2.3.2. Battery State Analysis
2.3.3. Performance Evaluation
2.3.4. Numerical Results
2.4. Accumulate-and-Jam: Secure WPCN via A Wireless-Powered Full-Duplex Jammer
2.4.1. System Model and Protocol Design
2.4.2. Hybrid Energy Storage State Analysis
2.4.3. Performance Evaluation
2.4.4. Numerical Results
2.5. Summary
References
3. Extending Wireless Powered Communication Networks for Future Internet of Things
3.1. Introduction to Internet of Things
3.2. Throughput Maximization in DH-WPCN
3.2.1. Related Work
3.2.2. System Model
3.2.3. Throughput Maximization in Uplink and Downlink
3.2.4. Numerical Results
3.3. Fairness Enhancement in DH-WPCN
3.3.1. Related Work
3.3.2. System Model
3.3.3. Minimum Throughput Maximization
3.3.4. Numerical Results
3.4. Summary
References
4. Future Directions for Wireless Powered Communications
4.1. New Application Trends in IoT and Telecommunications Networks
4.2. Future Research Directions
References
「Nielsen BookData」 より