Communications and Networking: 11th EAI International Conference, ChinaCom 2016 Chongqing, China, September 24–26, 2016, Proceedings, Part II

Harvesting energy from the environment is a method to improve the energy utilization efficiency. However, most renewable energy has a poor stability due to the weather and the climate. The reliability of the communication systems will be influenced to a large extent. In this paper, an energy-efficient downlink resource allocation problem is investigated in the energy harvesting communication systems by exploiting wireless power transfer technology. The resource allocation problem is formulated as a mixed-integer nonlinear programming problem. The objective is to maximize the energy efficiency while satisfying the energy causality and the data rate requirement of each user. In order to reduce the computational complexity, a suboptimal solution to the optimization problem is obtained by employing a quantum-behaved particle swarm optimization (QPSO) algorithm. Simulation results show that the QPSO algorithm has a higher energy efficiency than the traditional particle swarm optimization (PSO) algorithm.

[1]  Chung-Ju Chang,et al.  Modeling and Analysis for Spectrum Handoffs in Cognitive Radio Networks , 2012, IEEE Transactions on Mobile Computing.

[2]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[3]  T. Aaron Gulliver,et al.  A Secure Code Based Cryptosystem via Random Insertions, Deletions, and Errors , 2016, IEEE Communications Letters.

[4]  Mohsen Guizani,et al.  Analyzing Cognitive Network Access Efficiency Under Limited Spectrum Handoff Agility , 2014, IEEE Transactions on Vehicular Technology.

[5]  Karthika Viswanath,et al.  Cryptocoding system based on AES and concatenated coding scheme involving BCH and QC-LDPC , 2015, 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).

[6]  Sri Parameswaran,et al.  Advanced modes in AES: Are they safe from power analysis based side channel attacks? , 2014, 2014 IEEE 32nd International Conference on Computer Design (ICCD).

[7]  Yu Kou,et al.  Low Density Parity Check Codes Based on Finite Geometries: A Rediscovery and More , 1999 .

[8]  Chung-Ju Chang,et al.  Optimal Target Channel Sequence Design for Multiple Spectrum Handoffs in Cognitive Radio Networks , 2012, IEEE Transactions on Communications.

[9]  Masoumeh Nasiri-Kenari,et al.  Optimal Probabilistic Initial and Target Channel Selection for Spectrum Handoff in Cognitive Radio Networks , 2015, IEEE Transactions on Wireless Communications.

[10]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .

[11]  Luminita Scripcariu,et al.  A study of methods used to improve encryption algorithms robustness , 2015, 2015 International Symposium on Signals, Circuits and Systems (ISSCS).

[12]  Jian-Hong Chen,et al.  Reconfigurable system for high-speed and diversified AES using FPGA , 2007, Microprocess. Microsystems.

[13]  V. Fischer,et al.  Countermeasure against the SPA attack on an embedded McEliece cryptosystem , 2015, 2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA).

[14]  T. Mattfeldt Stochastic Geometry and Its Applications , 1996 .

[15]  Ajoy Kumar Khan,et al.  Side channel attacks and their mitigation techniques , 2014, 2014 First International Conference on Automation, Control, Energy and Systems (ACES).

[16]  Min Wang,et al.  A method for pico-specific upper bound CRE bias setting in HetNet , 2013, 2013 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[17]  Jian-Hong Chen,et al.  Diversified Mixcolumn transformation of AES , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.