Archive

Framework for Secure Code Updates for Wireless Sensor Nodes

In wireless sensor networks securing code update is essential for many crucial military applications. The nodes deployed in border areas in the military region called the border sensor nodes are the more sensitive nodes. The border sensor nodes need to do some special tasks compared to other intermediate sensor nodes. So the code update to […]

Analyses and experiments of field-circuit coupling equations for wireless power transfer using solenoidal coils

Wireless power transfer (WPT) is a kind of power transmission technology with which load devices can be supported to take power from the power source in a non-contacting way. Hollow solenoidal coils are used as resonant coils extensively in engineering projects which are usually analyzed based on magnetostatic fields. In practice coils are often excited by […]

Fiber-wireless technology for small cell backhauling

In this paper, we review some work we have carried out in the area of fiber-based small cell backhauling in particular focussing on the energy efficient transport schemes and network planning. Our study shows that for densely packed small cells in an urban scenario, analog transport of thewireless signals over the optical link is most energy […]

Area Transmission Efficiency of Single-User and Multi-User MIMO in Grid-Topology Wireless Mesh Networks

In this paper, we propose area transmission efficiency to evaluate the performance of single-user multiple-input multiple-output (SU-MIMO) and multi-user MIMO (MU-MIMO) in wireless mesh networks (WMNs). The area transmission efficiency is the number of packets that can be transmitted per unit time and per area, and is calculated by considering the multiplexing effect of MIMO and the […]

A Minimally Invasive 64-Channel Wireless μECoG Implant

Emerging applications in brain-machine interface systems require high-resolution, chronic multisite cortical recordings, which cannot be obtained with existing technologies due to high power consumption, high invasiveness, or inability to transmit data wirelessly. In this paper, we describe a microsystem based on electrocorticography (ECoG) that overcomes these difficulties, enabling chronic recording and wireless transmission of neural signals from […]

Adaptive Mechanism for Distributed Opportunistic Scheduling

Distributed opportunistic scheduling (DOS) techniques have been recently proposed for improving the throughput performance of wireless networks. With DOS, each station contends for the channel with a certain access probability. If a contention is successful, the station measures the channel conditions and transmits in case the channel quality is above a certain threshold. Otherwise, the station does […]

Power Allocation for HARQ-IR Systems Under QoS Constraints and Limited Feedback

This paper investigates power allocation for reliable downlink transmission in cellular networks subject to quality-of-service (QoS) constraints. The reliability of data transmissions is assured by hybrid automatic repeat request protocol with incremental redundancy (HARQ-IR). By developing and evaluating the effective throughput of the HARQ-IR protocol for the downlink transmission under buffer-limited QoS constraints, we propose […]

Optimal and Suboptimal Full-Duplex Secure Beamforming Designs for MISO Two-Way Communications

In this letter, we investigate full-duplex (FD) secure beamforming design problem for multiple-input-single-output two-way communication systems. Our objective is to maximize sum secrecy rate under sum transmit power constraint. We propose a globally optimal solution which solves the optimization problem by two-dimensional (2-D) search. In each iteration of 2-D search, a semidefinite programming is solved. To reduce […]

Energy-Efficient Resource Allocation in Single-Cell OFDMA Systems: Multi-Objective Approach

In this paper, we investigate the energy-efficient resource allocation problem in a single-cell orthogonal frequency division multiple access (OFDMA) system to achieve the energy efficiency (EE) tradeoff among users. Rather than overall system EE, our objective is to maximize the EE for each individual user. Therefore, a multiple-objective optimization problem is formulated, which in general […]

Capacity Scaling and Diversity Order for Secure Cooperative Relaying With Untrustworthy Relays

This paper presents an investigation of the secrecy performance of amplify-and-forward (AF) distributed beamforming (DBF) and opportunistic relaying (OR) through K untrustworthy relays. The capacity scaling and achievable diversity order of a secure communication are derived for K → ∞ and in high signal-to-noise-ratio (SNR) regimes, respectively. The DBF is shown to convey confidential messages with a […]