iconOpen Access

ARTICLE

crossmark

Adaptive Time Slot Resource Allocation in SWIPT IoT Networks

Yunong Yang1, Yuexia Zhang2,3,*, Zhihai Zhuo2

1 Key Laboratory of Information and Communication Systems, Ministry of Information Industry, Beijing Information Science and Technology University, Beijing, 100101, China
2 Key Laboratory of Modern Measurement & Control Technology, Ministry of Education, Beijing Information Science & Technology University, Beijing, 100101, China
3 Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing, Beijing, 100101, China

* Corresponding Author: Yuexia Zhang. Email: email

(This article belongs to the Special Issue: Recent Advances in Backscatter and Intelligent Reflecting Surface Communications for 6G-enabled Internet of Things Networks)

Computer Modeling in Engineering & Sciences 2023, 136(3), 2787-2813. https://doi.org/10.32604/cmes.2023.027351

Abstract

The rapid advancement of Internet of Things (IoT) technology has brought convenience to people’s lives; however further development of IoT faces serious challenges, such as limited energy and shortage of network spectrum resources. To address the above challenges, this study proposes a simultaneous wireless information and power transfer IoT adaptive time slot resource allocation (SIATS) algorithm. First, an adaptive time slot consisting of periods for sensing, information transmission, and energy harvesting is designed to ensure that the minimum energy harvesting requirement is met while the maximum uplink and downlink throughputs are obtained. Second, the optimal transmit power and channel assignment of the system are obtained using the Lagrangian dual and gradient descent methods, and the optimal time slot assignment is determined for each IoT device such that the sum of the throughput of all devices is maximized. Simulation results show that the SIATS algorithm performs satisfactorily and provides an increase in the throughput by up to 14.4% compared with that of the fixed time slot allocation (FTS) algorithm. In the case of a large noise variance, the SIATS algorithm has good noise immunity, and the total throughput of the IoT devices obtained using the SIATS algorithm can be improved by up to 34.7% compared with that obtained using the FTS algorithm.

Keywords


1  Introduction

With the continuous development in communication technology, Internet of Things (IoT) has been gradually integrated into many aspects of public life (e.g., public safety, smart city, enemy reconnaissance, and many other fields) [16]. According to statistics, the number of Internet of Things devices (IoDs) may reach 30 billion by 2025. The widespread application of IoT enables the communication between people and things and among things at any time and place [7,8]. In addition to increasing convenience, it also promotes intelligence development in public life. Thus, the proliferation of IoT has greatly improved the quality of life, and it is of great practical significance to study IoT.

Although IoT has become an irreplaceable part of public life, the IoT system faces challenges, such as limited energy storage of the IoDs and the scarcity of spectrum resources [9]. The emergence of simultaneous wireless information and power transfer (SWIPT) technology has provided a new method of solving the problem of the limited energy of the IoDs [10]. The application of the SWIPT technology allows IoDs to harvest energy from radio frequency (RF) waves and convert it into electrical energy, which can be stored in the battery of the device, thus maximizing the usable time of the device [11,12] and reducing the additional cost of battery replacement or manual charging of the device [13]. However, there is a limit to the amount of energy that can be stored in the battery, and excessive energy harvesting puts a greater burden on the operation of the device. Less than the appropriate amount of energy disrupts the normal operation of the device, and adequate energy harvesting using SWIPT IoT enables the entire network system to continue operating. Meanwhile, the normal communication of IoDs requires the support of large amounts of the radio spectrum, and the recent shortage of spectrum resources has restricted the development of IoT [14]. Therefore, reasonable allocation of the limited spectrum resources has become the focus of research in regard to SWIPT IoT.

A number of recent studies have considered the issue of resource allocation in regard to energy harvesting in SWIPT IoT. Zhu et al. [15] determined the user maximized minimum energy harvesting subject to the secrecy rate and total transmit power constraints in the presence of channel estimation errors, ensuring the fairness of user energy harvesting. Masood et al. [16] proposed an algorithm to achieve a compromise between energy efficiency and spectral efficiency in the SWIPT system, which is based on using the Lagrange multiplier method to find the optimal solution without iterative computation. Simulation results proved that the algorithm achieved the maximum energy transmission by using the optimal power split ratio. Han et al. [17] studied fair resource allocation in terms of the maximum–minimum energy requirement for wireless power transmission in edge computing systems. They solved the nonconvex mixed-integer nonlinearity that arises when using a logarithmic nonlinear energy harvesting model by using a continuous relaxation method. Yazdani et al. [18] proposed a parametric power control method that allows each sub-user to adjust its power according to the stored energy such that the lower limit of the sum of the uplink rates is maximized. Xu et al. [19] studied the resource allocation problem with perfect channel state information under the constraints of minimum energy harvesting and quality of service. Qi et al. [20] considered channel uncertainty, receiver nonlinearity, and decoding message cancellation for imperfect continuous messages in SWIPT-based non-orthogonal multiple access (NOMA) large scale IoT in the process of designing a resource allocation method.

Researchers have also considered joint optimization and allocation of multiple resources in SWIPT IoT. Prathima et al. [21] considered a collaborative cognitive radio (CR) network with two primary and secondary users, wherein power splitting and time-switching energy harvesting techniques were used and the system throughput and energy efficiency were maximized by using a particle swarm optimization algorithm. Acosta et al. [22] jointly considered the energy harvesting of the system, data rate, and the maximum power level allowed to interfere with the users to minimize the transmit power of the auxiliary base station. They solved the external and internal optimizations using a particle swarm optimization algorithm and a semidefinite relaxation algorithm, respectively. Tuan et al. [23] investigated resource allocation with respect to maximizing the total energy harvesting and energy harvesting efficiency under linear and nonlinear energy harvesting models in a SWIPT system consisting of a multi-input single-output interference channel to jointly optimize the beam formation vector of the transmitter and the power splitting ratio of the receiver. Hu et al. [24] maximized the secrecy rate in a multi-input multi-output bidirectional relay-assisted CR NOMA network by jointly optimizing the power allocation of the users and power splitting factor under the constraints of quality of service, energy harvesting, and transmission power. Tang et al. [25] jointly optimized the transmission rate and harvested energy in a SWIPT-enabled NOMA system using power splitting to simultaneously fulfill the minimum rate and harvested energy requirements for each user. Yang et al. [26] used resource management methods based on deep reinforcement learning to jointly optimize radio allocation and control strategies of transmission power in cognitive IoT. Ramzan et al. [27] simultaneously optimized device selection, unmanned aerial vehicle (UAV) relay allocation, and power splitting ratio in an IoT system based on UAV relay communication with energy harvesting, where the optimization results showed significant advantages in the above aspects. Xiao et al. [28] maximized the energy efficiency in RF energy-driven CR networks by jointly optimizing transmission time and power control and also proposed a resource allocation scheme called the co-channel interference approximation convex strategy. These studies investigated resource allocation in regard to SWIPT IoT and obtained adequate results. However, most researchers only focused on the uplink or downlink information transmission in SWIPT IoT systems without considering that most IoDs required alternating uplink and downlink information transmissions in real-time. This problem can be addressed by jointly allocating resources for uplink and downlink information transmissions and energy harvesting in SWIPT IoT such that the results obtained can be more in line with actual situations.

The main contributions of this study are summarized as follows:

•   An adaptive time slot (ATS) structure is designed that consists of a sensing time period at the beginning, time periods for several alternating uplink and downlink information transmissions, and a common time period for downlink energy harvesting and information transmission. The ATS structure allows the IoD to adaptively allocate time in a time slot to obtain the maximum uplink and downlink throughputs while satisfying the minimum energy harvesting requirements.

•   A SWIPT IoT ATS resource allocation (SIATS) algorithm is proposed. The algorithm first solves the coupling problem in the optimization function by using the method of pre-setting sensing time, time allocation factor, and time slot allocation parameters and transforms the optimization function into a convex function. Second, the optimal transmit power and channel assignment of the system is obtained by using the Lagrangian dual and gradient descent methods. Finally, by comparing the throughput results with different sensing times, time allocation factors, and time slot allocation parameters, the optimal time slot allocation for each IoD is determined such that the sum of the throughputs of all IoDs in the system is maximized.

•   The simulation compares the system throughput and energy harvesting when using the SIATS algorithm proposed in this paper with the fixed time slot allocation (FTS) algorithm, and analyzes in detail the effects of parameters such as sensing time, time allocation factor, and noise on the total system throughput and energy harvesting.

2  System Model

The SWIPT IoT network system is shown in Fig. 1, and it is composed of B IoT base stations, denoted as BS1,BS2,,BSB. Each base station possesses a certain communication range and can communicate with and provide energy to the IoDs within its communication range in real-time. Each IoD is equipped with an antenna, an energy harvesting module, and a battery that can be charged with the power provided by the energy harvesting module.

images

Figure 1: SWIPT IoT network system

The spectrum resources of the SWIPT IoT network system are divided into C available channels, denoted by the set C={CH1,CH2,,CHj,,CHC}. The IoT base stations in this network can sense the available spectrum resources to ensure that different frequencies are used for the IoDs in their respective coverage areas. Let us suppose that the communication range of BS1 contains D IoDs, denoted by the set D={IoD11,IoD12,,IoD1i,,IoD1D}, where IoD1i denotes the ith IoD in the communication range of BS1. The communication range of BS2 contains E IoDs, denoted by the set E={IoD21,IoD22,,IoD2i,,IoD2E}, where IoD2i denotes the ith IoD in the communication range of BS2.

The communication mode between the IoT base station and IoD is the time division duplex, for which an ATS structure is designed, as shown in Fig. 2.

images

Figure 2: Adaptive time slot structure

The ATS consists of periods for sensing, uplink information transmission, downlink information transmission, and energy harvesting. The total duration of the time slot is T, where the first time period is used for sensing, and the duration is ts. The subsequent Tts durations are divided into L time periods of equal length, which can be denoted as t1,t2,,tL1,tL. The time periods t1 to tL1 are primarily used for information transmission, where m time periods are used for the uplink information transmission and n time periods are used for the downlink information transmission, and the values of m and n in a time slot are determined adaptively. Thus, the duration of the uplink information transmission in time periods t1 to tL1 can be calculated by the following equation:

Tu=mTtsm+n+1(1)

Furthermore, the duration of the downlink information transmission in the time period t1 to tL1 can be calculated by the following equation:

To,d=nTtsm+n+1(2)

The time period tL in the time slot is the common time for energy harvesting and downlink information transmission. The time period tL is split by a time allocation factor α[0,1]. This parameter varies with the channel conditions and IoD requirements in different time slots. Thus, the duration of time to perform energy harvesting in time period tL can be calculated as:

Tc,e=αTtsm+n+1(3)

The duration of time for the downlink information transmission is calculated as:

Tc,d=(1α)Ttsm+n+1(4)

Finally, the duration of the complete time slot for the downlink information transmission is calculated as:

Td=To,d+Tc,d=(n+1α)Ttsm+n+1(5)

The following is an illustration of the IoT SWIPT network communication considering the IoT base station BS1 as an example; let us assume BS1 and BS2 are adjacent base stations, as shown in Fig. 1. Each IoD within the communication range of BS1 senses the state of all channels at the beginning of each time slot, and the results of the sensing are categorized into two cases.

(1) The first case: The IoD within the communication range of BS1 senses that the channel is idle. The channel is not used by the IoD within the communication range of BS1, and it is also not used by the IoD within the adjacent base station BS2. The probability of this case is assumed to be pjtrue.

(2) The second case: The IoD within the communication range of BS1 senses the channel is idle. The channel is not used by the IoD within the communication range of BS1, but it is used by the IoD within the neighboring base station BS2. The probability of this case is assumed to be pjfalse.

The two cases are discussed separately in the following section.

2.1 The First Case

Based on the previous assumptions, the probability pjtrue is computed as:

pjtrue=p(Hj(0))(1perror,j(ts)),(6)

where p(Hj(0)) denotes the probability that CHj is idle and perror,j denotes the probability of a false alarm for CHj, which can be computed as follows:

perror,j(ts)=F(2SNRj+1F1(pp)+tsfsSNRj),(7)

where SNRj denotes the signal-to-noise ratio of the signal received by the IoD using CHj communication, fs denotes the sampling frequency of the signal, and F() denotes the standard Gaussian complementary cumulative distribution function, which can be expressed as follows:

F(x)=x12πe(t22)dt(8)

Notably, F1() is the inverse function of F().

The IoD within the communication range of BS1 selects one or more available channels to communicate with BS1 after the sensing, and this system ensures that one channel is available for each IoD. During the communication process between BS1 and the IoD, the uplink is primarily used to transmit the information from the IoD to BS1.

The rate of transmission corresponding to IoD1i for the uplink information transmission using CHj in this case can be determined using Shannon's formula, as follows:

ri,jtrue(Tu)=Wlog2(1+Pi,j,u1hi,jN),(9)

where the superscript true in ri,jtrue denotes the first case; the subscript i represents the device IoD1i, and the subscript j represents the channel CHj used by the device. Pi,j,u1 denotes the transmit power of IoD1i when using CHj for the uplink information transmission, where the superscript 1 denotes the communication range of BS1 the subscript i denotes IoD1i, the subscript j denotes CHj used by the device, and the subscript u indicates uplink information transmission. In the above equation, W denotes the channel bandwidth, hi,j denotes the channel gain for communication between BS1 and IoD1i using CHj, and N denotes the variance of the additive Gaussian white noise.

The downlink in the communication process is primarily used to send data from BS1 to the IoD within its communication range and to provide energy to the IoD when needed. Thus, the rate of transmission for the downlink information transmission between IoD1i and BS1 using CHj is computed as:

ri,jtrue(Td)=Wlog2(1+Pi,j,d1hi,jN),(10)

where Pi,j,d1 denotes the transmit power for the downlink information transmission between BS1 and IoD1i using CHj, wherein the subscript d indicates downlink information transmission.

2.2 The Second Case

Based on the previous assumptions, the probability pjfalse is computed as:

pjfalse=p(Hj(1))(1pp),(11)

where p(Hj(1)) is the probability that CHj is busy and p(Hj(1))=1p(Hj(0)). pp is the probability of target detection that adequately protects the IoD.

In this case, the signal emitted by BS2 during the uplink information transmission with IoD2i interferes with the uplink information transmission using the co-channel within the communication range of BS1. Therefore, the rate of transmission corresponding to IoD1i during the uplink information transmission using CHj is computed as:

ri,jfalse(Tu)=Wlog2(1+Pi,j,u1hi,jPi,j,u2gi,j+N),(12)

where the superscript false in ri,jfalse denotes the second case. Pi,j,u2 denotes the transmit power received by BS1 when IoD2i uses the co-channel of CHj for the uplink information transmission; the superscript 2 denotes the communication range of BS2, the subscript i denotes the device IoD2i, the subscript j denotes the co-channel of CHj, and the subscript u indicates uplink information transmission. Additionally, gi,j denotes the channel gain for communication between IoD2i and BS1 performed using the co-channel of CHj.

The uplink interference generated by IoD1i and BS1 using CHj for the uplink information transmission to IoD2i within the communication range of BS2 using the co-channel of CHj can be computed as:

Ij,u=TuTpjfalsei=1Dli,jPi,j,u1ϕi,j,(13)

where li,j is the channel gain for communication between IoD1i to BS2 performed using the co-channel of CHj. ϕi,j={0,1} is used to indicate whether IoD1i uses CHj, and it is called the channel assignment factor. When IoD1i uses CHj, ϕi,j=1; conversely, ϕi,j=0.

The uplink throughput of IoD1i on CHj can be expressed as:

ri,j,u=TuT[pjtrueri,jtrue(Tu)+pjfalseri,jfalse(Tu)](14)

The rate of transmission for the downlink information transmission between IoD1i and BS1 performed using CHj is computed as:

ri,jfalse(Td)=Wlog2(1+Pi,j,d1hi,jPi,j,d2li,j+N),(15)

where Pi,j,d2 denotes the transmit power of BS2 when the co-channel of CHj is used for the downlink information transmission.

The downlink interference generated by BS1 and IoD1i using CHj for the downlink information transmission to BS2 using the co-channel of CHj can be computed as:

Ij,d=TdTpjfalsei=1Dgi,jPi,j,d1ϕi,j(16)

The downlink throughput can be expressed as:

ri,j,d=TdT[pjtrueri,jtrue(Td)+pjfalseri,jfalse(Td)](17)

2.3 Energy Harvesting

For energy harvesting in the downlink, a linear energy harvesting model is used in this study. Thus, the energy harvested by IoD1i using CHj can be expressed as:

Ei,j=βTc,eT[hi,j(pjtrue+pjfalse)Pi,j,d1+N]ϕi,j,(18)

where β is the energy efficiency conversion constant, and β[0,1].

It is assumed in this study that the IoD can simultaneously use more than one channel to communicate with the base station. Therefore, the total energy harvested by IoD1i in a time slot can be expressed as:

Ei=j=1CEi,j(19)

3  SWIPT IoT ATS Resource Allocation Algorithm

In order to achieve an optimal system, a joint optimization is performed to maximize the sum of the uplink and downlink throughputs of all IoDs within the communication range of BS1. This optimization problem can be stated as follows:

maxi=1Dj=1Cϕi,j(ri,j,u+ri,j,d)(20a)

s.t.TdTpjfalsei=1Dgi,jPi,j,d1ϕi,jImax,j,d,jC(20b)

TuTpjfalsei=1Dli,jPi,j,u1ϕi,jImax,j,u,jC(20c)

TdTi=1Dj=1C(pjtrue+pjfalse)Pi,j,d1ϕi,jPmax,d(20d)

TuTj=1C(pjtrue+pjfalse)Pi,j,u1ϕi,jPmax,i,u,iD(20e)

j=1CβTc,eTϕi,j[hi,j(pjtrue+pjfalse)Pi,j,d1+N]Emin,i,iD(20f)

i=1Dϕi,j=1,jC(20g)

0<tsT(20h)

0<α1(20i)

ϕi,j={0,1},iD,jC(20j)

Pi,j,u10,iD,jC(20k)

Pi,j,d10,iD,jC(20l)

Here, Imax,j,d denotes the maximum acceptable downlink interference in the communication range of BS2, Imax,j,u denotes the maximum acceptable uplink interference in the communication range of BS2, Pmax,d is the maximum value of the transmit power of BS1, Pmax,i,u is the maximum value of the transmit power of IoD1i and Emin,i is the minimum energy to be harvested by IoD1i in the time slot.

In this optimization problem, the constraint represented by Eq. (20b) indicates that the interference of the downlink information transmission within the communication range of BS1 to the downlink information transmission in BS2 using the co-channel is less than the maximum acceptable threshold for downlink interference. The constraint represented by Eq. (20c) indicates that the interference of the uplink information transmission within the communication range of BS1 to the uplink information transmission in BS2 using the co-channel is less than the maximum acceptable threshold for uplink interference. The constraint represented by Eq. (20d) indicates that the sum of the power transmitted by BS1 to the IoD within its communication range is less than the maximum transmit power of the base station. The constraint represented by Eq. (20e) indicates that the sum of the transmit power of each IoD for the uplink information transmission over the available channel is less than the maximum transmit power of the device. The constraint represented by Eq. (20f) indicates that the sum of the energy harvested by each IoD through its available channels is greater than the minimum energy harvesting requirement. The constraint represented by Eq. (20g) indicates that each channel cannot be used by more than one IoD. The constraint represented by Eq. (20h) provides the range of values for sensing time. The constraint represented by Eq. (20i) provides the range of values for the time allocation factor; The constraint in Eq. (20j) provides the range of values for the channel allocation factor. Finally, the constraints in Eqs. (20k) and (20l) ensure that neither the uplink nor downlink transmit power is less than zero.

To solve the optimization problem, a SIATS algorithm is proposed in this study that can be described as follows.

The channel assignment factor ϕi,j={0,1} in Eqs. (20a)(20g) renders the original optimization problem a mixed-integer programming problem, which causes the original problem to become intractable. Therefore, the value of the channel assignment factor ϕi,j can be relaxed as ϕi,j=[0,1] in the derivation process. In this study, we introduce the auxiliary variables φi,j,d=ϕi,jPi,j,d1, φi,j,u=ϕi,jPi,j,u1, which can be incorporated into Eqs. (9), (10), (12), and (15) to obtain the following four equations:

ri,jtrue(Tu)=Wlog2(1+φi,j,uhi,jϕi,jN)(21)

ri,jtrue(Td)=Wlog2(1+φi,j,dhi,jϕi,jN)(22)

ri,jfalse(Tu)=Wlog2(1+φi,j,uhi,jϕi,j(Pi,j,u2gi,j+N))(23)

ri,jfalse(Td)=Wlog2(1+φi,j,dhi,jϕi,j(Pi,j,d2li,j+N))(24)

According to Eqs. (14) and (17), the optimization objective Eq. (20a) can be expressed as:

ψ=i=1Dj=1Cϕi,j{TuT[pjtrueri,jtrue(Tu)+pjfalseri,jfalse(Tu)]+TdT[pjtrueri,jtrue(Td)+pjfalseri,jfalse(Td)]}(25)

Subsequently, upon incorporating Eqs. (21)(24) into the optimization problem in Eq. (20), it can be transformed into the formulation expressed by Eqs. (26a)(26n):

maxψ(26a)

s.t. TdTpjfalsei=1Dgi,jφi,j,dImax,j,d,jC(26b)

TuTpjfalsei=1Dli,jφi,j,uImax,j,u,jC(26c)

TdTi=1Dj=1C(pjtrue+pjfalse)φi,j,dPmax,d(26d)

TuTj=1C(pjtrue+pjfalse)φi,j,uPmax,i,u,iD(26e)

j=1CβTc,eT[hi,j(pjtrue+pjfalse)φi,j,d+ϕi,jN]Emin,i,iD(26f)

i=1Dϕi,j=1,jC(26g)

0<tsT(26h)

0<α1(26i)

0ϕi,j1,iD,jC(26j)

Pi,j,u10,iD,jC(26k)

Pi,j,d10,iD,jC(26l)

φi,j,u0,iD,jC(26m)

φi,j,d0,iD,jC(26n)

In this optimization problem, the constraints in Eqs. (26m) and (26n) ensure that the auxiliary variables are not less than zero. The reason for adding these two constraints is that the auxiliary variables are calculated by multiplying the transmit power and the channel assignment factor, while the transmit power takes a value greater than or equal to 0 and the channel assignment factor takes a value between 0 and 1. Therefore, the auxiliary variables also need to comply with the condition that they are not less than zero. The optimization problem expressed by Eqs. (26a)(26n) is a nonconvex problem, and a coupling exists between the sensing time ts, time allocation factor α, time slot allocation parameters m and n, and auxiliary variables φi,j,u and φi,j,d. Therefore, the optimal solutions ts, α, m, and n can be solved by using the method of predetermined values, and the optimization problem presented in Eqs. (26a)(26n) is transformed into a convex optimization problem using the four determined parameters ts, α, m, and n. This study uses the dual gradient descent method to address the convex optimization problem with the given parameters. The problem formulated by Eqs. (26a)(26n) is transformed into a dual problem using a Lagrangian function, which is expressed as Eq. (27), where λj, χj, ω, θi, ϑi, and ξj are the Lagrangian variables.

L(φi,j,u,φi,j,d,ϕi,j;λj,χj,ω,θi,ϑi,ξj)=ψ+j=1Cλj(Imax,j,dTdTpjfalsei=1Dgi,jφi,j,d)+j=1Cχj(Imax,j,uTuTpjfalsei=1Dli,jφi,j,u)+ω[Pmax,dTdTi=1Dj=1C(pjtrue+pjfalse)φi,j,d]+j=1Cξj(1i=1Dϕi,j)+i=1Dθi[Pmax,i,uTuTj=1C(pjtrue+pjfalse)φi,j,u]+i=1Dϑi[j=1CβTc,eT(hi,j(pjtrue+pjfalse)φi,j,d+Nϕi,j)Emin,i](27)

The problem, as described by Eqs. (26a)(26n) can be transformed into a dual problem, which can be expressed as follows:

minλj,ω,θi,ϑi,ξj0f(λj,χj,ω,θi,ϑi,ξj),(28)

where

f(λj,χj,ω,θi,ϑi,ξj)=maxL(φi,j,d,φi,j,u,ϕi,j;λj,χj,ω,θi,ϑi,ξj)(29)

According to the principle of the Karush–Kuhn–Tucker (KKT) condition, the partial derivative of the Lagrangian function with respect to φi,j,u satisfies the following conditions:

Lφi,j,u{=0φi,j,u>0<0φi,j,u<0,(30)

where x represents the optimal solution for x.

ri,jtrue(Tu) and ri,jfalse(Tu) in the Lagrangian function are related to φi,j,u. The derivatives of the above two functions with respect to φi,j,u can be expressed as:

ri,jtrue(Tu)φi,j,u=Whi,jln2(ϕi,jNi,j,u+φi,j,uhi,j,u)ri,jfalse(Tu)φi,j,u=Whi,jln2(ϕi,j(Pi,j,u2gi,j+N)+φi,j,uhi,j)(31)

The partial derivative of Lagrangian function with respect to φi,j,u be expressed as:

Lφi,j,u=ϕi,jTuT[pjtrueWhi,jln2(ϕi,jN+φi,j,uhi,j)+pjfalseWhi,jln2(ϕi,j(Pi,j,u2gi,j+N)+φi,j,uhi,j)]θiTuT(pjtrue+pjfalse)χjTuTpjfalseli,j(32)

For Lφi,j,u=0, the optimal solution φi,j,u can be obtained by using the quadratic formula. According to the definition of the auxiliary variables, the optimal uplink transmit power can be obtained by using the condition: Pi,j,u1=φi,j,u/ϕi,j.

According to the principle of the KKT condition, the partial derivative of the Lagrangian function with respect to φi,j,d satisfies the following conditions:

Lφi,j,d{=0φi,j,d>0<0φi,j,d<0(33)

Furthermore, ri,jtrue(Td) and ri,jfalse(Td) in the Lagrangian function are related to φi,j,d. Thus, the derivatives of the above two functions with respect to φi,j,d can be expressed as:

ri,jtrue(Td)φi,j,d=Whi,jln2(ϕi,jN+φi,j,dhi,j)ri,jfalse(Td)φi,j,d=Whi,jln2(ϕi,j(Pi,j,d2li,j+N)+φi,j,dhi,j)(34)

The partial derivative of L with respect to φi,j,d be expressed as:

Lφi,j,d=ϕi,jTdT[pjtrueWhi,jln2(ϕi,jN+φi,j,dhi,j)+pjfalseWhi,jln2(ϕi,j(Pi,j,d2li,j+N)+φi,j,dhi,j)]+(pjtrue+pjfalse)(ϑiβhi,jTc,eTωTdT)λjTdTpjfalsegi,j(35)

For Lφi,j,d=0, the optimal solution φi,j,d can be obtained by using the quadratic formula. According to the definition of the auxiliary variables, the optimal uplink transmit power can be obtained by using the condition: Pi,j,d1=φi,j,d/ϕi,j.

According to the principle of the KKT condition, the partial derivative of the Lagrangian function with respect to ϕi,j satisfies the following conditions:

Lϕi,j{<0ϕi,j=0=00<ϕi,j<1>0ϕi,j=1(36)

ri,jtrue(Tu), ri,jfalse(Tu), ri,jtrue(Td), and ri,jfalse(Td) in the Lagrangian function are related to ϕi,j. Therefore, the derivatives of the above four functions with respect to ϕi,j can be expressed as:

ri,jtrue(Td)ϕi,j=Wφi,j,dhi,jln2(Nϕi,j2+φi,j,dhi,jϕi,j)ri,jfalse(Td)ϕi,j=Wφi,j,dhi,jln2((Pi,j,d2li,j+N)ϕi,j2+φi,j,dhi,jϕi,j)ri,jtrue(Tu)ϕi,j=Wφi,j,uhi,jln2(Ni,j,uϕi,j2+φi,j,uhi,j,uϕi,j)ri,jfalse(Tu)ϕi,j=Wφi,j,uhi,jln2((Pi,j,u2gi,j+N)ϕi,j2+φi,j,uhi,jϕi,j)(37)

The partial derivative of the L with respect to ϕi,j be expressed as:

Lϕi,j=TuT[pjtrue(ri,jtrue(Tu)+ϕi,jri,jtrue(Tu)ϕi,j)+pjfalse(ri,jfalse(Tu)+ϕi,jri,jfalse(Tu)ϕi,j)]+TdT[pjtrue(ri,jtrue(Td)+ϕi,jri,jtrue(Td)ϕi,j)+pjfalse(ri,jfalse(Td)+ϕi,jri,jfalse(Td)ϕi,j)]+ϑiβTc,eTNξj(38)

Let

ϖi,j=TuT[pjtrue(ri,jtrue(Tu)+ϕi,jri,jtrue(Tu)ϕi,j)+pjfalse(ri,jfalse(Tu)+ϕi,jri,jfalse(Tu)ϕi,j)]+TdT[pjtrue(ri,jtrue(Td)+ϕi,jri,jtrue(Td)ϕi,j)+pjfalse(ri,jfalse(Td)+ϕi,jri,jfalse(Td)ϕi,j)]+ϑiβTc,eTN(39)

In order to maximize the system throughput, different channel assignments are compared, and the result that maximizes ϖi,j is the optimal channel assignment; hence, the expression for ϕi,j can be reformulated as:

ϕi,j={0other1argmax ϖi,j(40)

After determining the optimal φi,j,u, φi,j,d, Pi,j,u1, Pi,j,d1, and ϕi,j using the above method, the values for the Lagrangian variable for the kth iteration can be obtained based on the principle of the gradient descent method, which is described as follows:

λjk+1=[λjk+α1kλjkf(λjk,χjk,ωk,θik,ϑik,ξjk)]+χjk+1=[χjk+α2kχjkf(λjk,χjk,ωk,θik,ϑik,ξjk)]+ωk+1=[ωk+α3kωkf(λjk,χjk,ωk,θik,ϑik,ξjk)]+,θik+1=[θik+α4kθikf(λjk,χjk,ωk,θik,ϑik,ξjk)]+ϑik+1=[ϑik+α5kϑikf(λjk,χjk,ωk,θik,ϑik,ξjk)]+(41)

where [x]+=max(x,0) and α1k, α2k, α3k, α4k, α5k denote the step size of the kth iteration, which are both set to constants less than zero, and the superscript k denotes the kth iteration. Additionally, xf(x,y) represents the partial derivative of f(x,y) with respect to x.

The five partial derivatives in Eq. (41) can be computed as:

λjkf(λjk,χjk,ωk,θik,ϑik,ξjk)=Imax,j,dTdTpjfalsei=1Dgi,jφi,j,d(42)

χjkf(λjk,χjk,ωk,θik,ϑik,ξjk)=Imax,j,uTuTpjfalsei=1Dli,jφi,j,u(43)

ωkf(λjk,χjk,ωk,θik,ϑik,ξjk)=Pmax,dTdTi=1Dj=1C(pjtrue+pjfalse)φi,j,d(44)

θikf(λjk,χjk,ωk,θik,ϑik,ξjk)=Pmax,i,uTuTj=1C(pjtrue+pjfalse)φi,j,u(45)

ϑikf(λjk,χjk,ωk,θik,ϑik,ξjk)=Emin,i+j=1CβTc,eT(hi,j(pjtrue+pjfalse)φi,j,d+N)(46)

The new Lagrangian variables obtained by Eqs. (41)(46) are compared with the old values, and the iteration ends when it satisfies Eq. (47). Otherwise, the gradient descent step is repeated. Notably, ||x||2 denotes the two-parametric number of x.

λjk+1λjk2ε1χjk+1χjk2ε2ωk+1ωk2ε3,θik+1θik2ε4ϑik+1ϑik2ε5(47)

where ε1, ε2, ε3, ε4 and ε5 represent the maximum tolerable error for each of the five Lagrangian variables.

Based on the above mentioned process, the overall flow of the SIATS algorithm is described as follows:

images

:

The complexity of the SIATS algorithm proposed in this paper is jointly determined by the cyclic iterations of the four pre-set parameters and the Lagrangian dual problem iterations. The complexity of the four pre-set parameters sensing time ts, time allocation factor α, and time slot allocation parameters m and n iterations is O(12T/ιtιαιmιn), where ιt, ια, ιm, and ιn represent the iteration step size of ts, α, m, and n, respectively. And the complexity of the Lagrangian dual problem iteration is O(CDG), where G represents the number of iterations of the Lagrangian dual problem. Therefore, the complexity of the whole algorithm is O(12TCDG/ιtιαιmιn).

4  Simulation Results and Analysis

In this section, the effectiveness of the SIATS algorithm is verified using simulations. During the simulation, it is assumed that all channels in the system conform to the Rayleigh fading channel model [2931] and that the channel gains follow an exponential distribution. It is also assumed that a total of eight channels are available for the IoDs in the entire system. Some of the parameter settings referred to in this section have been reported previously [3235], and the specific parameter values are listed in Table 1.

images

The simulation is performed for four cases in which the number of IoDs within the communication range of BS1 communication range are 8, 7, 6, and 5. For the convenience of subsequent calculations, the channel bandwidth is fixed at 1 Hz, therefore, the unit of throughput is expressed as bit/s/Hz [36].

Moreover, the throughput and energy harvesting results obtained during the simulation using the proposed SIATS and FTS algorithms are compared in this study.

The time slot structure in the FTS algorithm is shown in Fig. 3, and it consists of periods for sensing, uplink information transmission, downlink information transmission, and energy harvesting. The total duration of the time slot is T, where the first time period is used for sensing whose duration is ts. The remaining duration Tts is divided into three time periods of equal duration (Tts)/3, denoted as t1,t2,t3. The time period t1 is used for the uplink information transmission, and the time period t2 is used for the downlink information transmission. The time period t3 is similar to the time period tL in the SIATS algorithm and is split by the time allocation factor α. The time period αt3 is used for energy harvesting, and the time period (1α)t3 is used for the downlink information transmission.

images

Figure 3: Fixed time slot structure

During the simulation, several scenarios may occur when performing the channel assignments. Fig. 4 shows one of the possible scenarios when the number of IoDs within the communication range of BS1 is 8, 7, 6, and 5. The horizontal coordinates in Fig. 4 represent the channel number, and the vertical coordinates represent the IoD number. The shaded cells in the figure indicate that the corresponding channel is assigned to the IoD, while the blank cells indicate that the corresponding channel is not available for use by the IoD. For example, in Fig. 4a, the first row indicates that CH1 is used by IoD16 and the third row indicates that CH3 is used by IoD12.

images

Figure 4: Example of channel assignment. (a) Number of IoDs D = 8; (b) Number of IoDs D = 7; (c) Number of IoDs D = 6; and (d) Number of IoDs D = 5

Fig. 5 presents a comparison of the variation in the system throughput with sensing time obtained using the proposed SIATS algorithm with that obtained using FTS algorithm. The horizontal coordinate represents the sensing time, and the vertical coordinate represents the total throughput of all IoDs within the communication range of BS1. The figure provides a comparison of the total throughput of the proposed SIATS and FTS algorithms for D = 8, 7, 6, and 5. The total throughput obtained by using both algorithms with different numbers of IoDs shows a trend of increasing and then decreasing with the increase in the sensing time. The reason for this is that the increase in the sensing time gradually decreases the probability of false alarm, thus increasing the throughput of the system. Additionally, the increase in the sensing time leads to a decrease in the information transmission time that reduces the throughput, thus corresponding to the decreasing trend of the variation. Comparing the curves for the same algorithm for different numbers of IoDs demonstrates that the total throughput increases as the number of IoDs increases, provided that the number of IoDs does not exceed the number of channels. Comparing the curves for different algorithms for the same number of IoDs demonstrates that the throughputs obtained using the SIATS algorithm can be increased by 14.4%, 13.4%, 12.2%, and 10.8% compared with that obtained using the FTS algorithm for D = 8, 7, 6, and 5, respectively. The throughput obtained by using the proposed SIATS algorithm is greater than that obtained by using the FTS algorithm, and the proposed algorithm exhibits better performance in terms of the throughput.

images

Figure 5: Variation in total throughput of all IoDs within the communication range of BS1 communication with sensing time

Fig. 6 presents a comparison of the variation in the system throughput with the time allocation factor obtained using the proposed SIATS and FTS algorithms when the sensing time is fixed at ts = 0.008 s. The horizontal coordinate represents the value of the time allocation factor α, and the vertical coordinate represents the total throughput of all IoDs within the communication range of BS1. The figure compares the total throughputs obtained using the proposed SIATS algorithm with that obtained using the FTS algorithm for D = 8, 7, 6, and 5. As can be seen from the figure, the total throughput obtained using both algorithms decreases as α increases, because the time allocated to energy harvesting increases as α increases, leading to a decrease in the time available for information transfer, resulting in a decrease in the total throughput. Upon comparing the total throughput results for different algorithms with the same number of IoDs, it can be seen that the proposed SIATS algorithm cannot only obtain a higher total throughput compared with that obtained using the FTS algorithm, but also has a smaller reduction in throughput as the α increases. The reason is that when the value of α is small, the SIATS algorithm increases the time available for energy harvesting by appropriately reducing the proportion of time used for the uplink and downlink information transmissions to ensure that the energy harvesting can meet the system requirements. When the value of α is large, it reduces the time available for energy harvesting by increasing the proportion of time used for uplink and downlink information transmissions, thus significantly increasing the total throughput.

images

Figure 6: Variation in the total throughput of all IoDs within the communication range of BS1 with the time allocation factor

Fig. 7 presents the comparison of the energy harvested by each IoD in the proposed SIATS with that in the FTS algorithm when the time allocation factor is fixed at α=0.2. The horizontal coordinate represents the sensing time, and the vertical coordinate represents the energy harvested by the IoD. The figure compares the energy harvesting of the proposed SIATS algorithm with that of the FTS algorithm for the IoD quantities D = 8, 7, 6, and 5. From subplots 7a and 7b, it can be seen that the energy harvested by each IoD for D = 8 is approximately equal regardless of the value of the sensing time. From subplots 7c and 7d, it can be seen that for D = 7, one IoD harvests more energy than the other IoD regardless of the value of sensing time, because one IoD uses two channels while the other IoD uses one channel. Similarly, from subplots 7e, and 7f, it can be observed that because two IoDs use two channels, the two IoDs harvest more energy than the other IoDs for D = 6. From subplots 7g and 7h, it can be observed that because three IoDs use two channels, the three IoDs harvest more energy than the other IoDs for D = 5. Comparing the energy harvesting results of the SIATS and FTS algorithms for the same number of IoDs, it can be seen that although both algorithms can fulfill the requirements for the predefined minimum energy harvesting, the energy harvested by the IoDs for the SIATS algorithm is significantly less than that for the FTS algorithm. This is because the SIATS algorithm can fulfill the energy harvesting requirement by reducing the proportion by reducing the proportion of time shared between energy harvesting and downlink information transmission and by allocating more time to information transmission, thus obtaining a higher throughput.

imagesimages

Figure 7: Energy harvesting for IoDi. (a) D = 8, SIATS algorithm; (b) D = 8, FTS algorithm; (c) D = 7, SIATS algorithm; (d) D = 7, FTS algorithm; (e) D = 6, SIATS algorithm; (f) D = 6, FTS algorithm; (g) D = 5, SIATS algorithm; and (h) D = 5, FTS algorithm

Fig. 8 presents a comparison for the total throughput of all IoDs, the throughput of a single IoD with maximum throughput, and the throughput of a single IoD with minimum throughput for different noise variances obtained by using the proposed SIATS algorithm and FTS algorithms. In the figure, the horizontal coordinates represent the Gaussian white noise variance, and the vertical coordinates represents the throughput. The figure compares the throughput of the proposed SIATS algorithm with that of the FTS algorithm for D = 8 and 5. As can be seen from the figures, the total throughput of all IoDs, the throughput of a single IoD with maximum throughput, and the throughput of a single IoD with minimum throughput obtained using the SIATS and FTS algorithms for different numbers of IoDs decrease with increasing noise variance. This is because increasing the noise variance decreases the information transfer rate and thus reduces the throughput. Comparing the results of the two algorithms, it can be concluded that the total throughput of all IoDs, the throughput of a single IoD with maximum throughput, and the throughput of a single IoD with minimum throughput obtained using the SIATS algorithm are 34.7%, 28.0%, and 33.4% higher than that obtained using the FTS algorithm, respectively, for D = 8 and a noise variance of 2. The total throughput of all IoDs, the throughput of a single IoD with maximum throughput, and the throughput of a single IoD with minimum throughput obtained using the SIATS algorithm are 34.0%, 30.9%, and 32.1% higher than that obtained using the FTS algorithm, respectively, for D = 5 and a noise variance of 2. The total throughput of all IoDs and the throughputs of a single IoD with maximum throughput, and a single IoD with minimum throughput obtained using the proposed SIATS algorithm are higher compared with that obtained using the FTS algorithm when the noise variance is large. Therefore, it can be concluded that the SIATS algorithm has good noise immunity.

imagesimagesimages

Figure 8: IoD throughput at different noise variances. (a) D = 8, total throughput of all IoDs; (b) D = 8, throughput of a single IoD with maximum throughput; (c) D = 8, throughput of a single IoD with minimum throughput; (d) D = 5, total throughput of all IoDs; (e) D = 5, throughput of a single IoD with maximum throughput; and (f) D = 5, throughput of a single IoD with minimum throughput

5  Conclusion

In this study, the SIATS algorithm is proposed to solve the coupling problem in the optimization of resource allocation by using the method of pre-setting the sensing time, time allocation factor, and time slot allocation parameters. Additionally, the optimal transmit power and channel assignment of the system are obtained by using the Lagrangian dual and gradient descent methods. Finally, the optimal time slot parameters of the SIATS algorithm are determined by comparing the throughput results for different values of the sensing time, time allocation factor, and time slot allocation parameters. Simulation results show that the proposed SIATS algorithm performs better, with a maximum throughput improvement of 14.4%, than the FTS algorithm. Meanwhile, by using the SIATS algorithm, the IoD can harvest less energy while satisfying its energy harvesting requirements, thus devoting more time to information transmission. In the case of a large noise variance, the SIATS algorithm displays good noise immunity, and the total throughput of all IoDs obtained using the SIATS algorithm can be improved by up to 34.7% compared with that obtained using the FTS algorithm. Furthermore, throughputs of the best-performing and worst-performing IoDs both improve upon using the proposed SIATS algorithm.

Funding Statement: The work was supported in part by Sub Project of National Key Research and Development Plan in 2020. No. 2020YFC1511704, Beijing Information Science & Technology University. Nos. 2020KYNH212, 2021CGZH302, Beijing Science and Technology Project (Grant No. Z211100004421009), and in part by the National Natural Science Foundation of China (Grant No. 61971048).

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

References

1. An, H., Park, H. (2022). Energy-balancing resource allocation for wireless cooperative IoT networks with SWIPT. IEEE Internet of Things Journal, 9(14), 12258–12271. https://doi.org/10.1109/JIOT.2021.3135282 [Google Scholar] [CrossRef]

2. Sun, L., Wang, Y., Qu, Z., Xiong, N. N. (2022). BeatClass: A sustainable ECG classification system in IoT-based eHealth. IEEE Internet of Things Journal, 9(10), 7178–7195. https://doi.org/10.1109/JIOT.2021.3108792 [Google Scholar] [CrossRef]

3. Pavani, B., Devi, L. N., Subbareddy, K. V. (2022). Energy enhancement and efficient route selection mechanism using H-SWIPT for multi-hop IoT networks. Intelligent and Converged Networks, 3(2), 173–189. https://doi.org/10.23919/ICN.2022.0013 [Google Scholar] [CrossRef]

4. Shukla, A. K., Sharanya, J., Yadav, K., Upadhyay, P. K. (2022). Exploiting SWIPT-enabled IoT-based cognitive nonorthogonal multiple access with coordinated direct and relay transmission. IEEE Sensors Journal, 22(19), 18988–18999. https://doi.org/10.1109/JSEN.2022.3198627 [Google Scholar] [CrossRef]

5. Luo, Y., Pu, L. (2021). Practical issues of RF energy harvest and data transmission in renewable radio energy powered IoT. IEEE Transactions on Sustainable Computing, 6(4), 667–678. https://doi.org/10.1109/TSUSC.2020.3000085 [Google Scholar] [CrossRef]

6. Sandhu, M. M., Khalifa, S., Jurdak, R., Portmann, M. (2021). Task scheduling for energy-harvesting-based IoT: A survey and critical analysis. IEEE Internet of Things Journal, 8(18), 13825–13848. https://doi.org/10.1109/JIOT.2021.3086186 [Google Scholar] [CrossRef]

7. Lombardi, M., Pascale, F., Santaniello, D. (2021). Internet of Things: A general overview between architectures, protocols and applications. Information, 12(2), 87. https://doi.org/10.3390/info12020087 [Google Scholar] [CrossRef]

8. Li, X., Xie, Z., Chu, Z., Menon, V. G., Mumtaz, S. et al. (2022). Exploiting benefits of IRS in wireless powered NOMA networks. IEEE Transactions on Green Communications and Networking, 6(1), 175–186. https://doi.org/10.1109/TGCN.2022.3144744 [Google Scholar] [CrossRef]

9. Sun, W., Song, Q., Zhao, J., Guo, L., Jamalipour, A. (2022). Adaptive resource allocation in SWIPT-enabled cognitive IoT networks. IEEE Internet of Things Journal, 9(1), 535–545. https://doi.org/10.1109/JIOT.2021.3084472 [Google Scholar] [CrossRef]

10. Krikidis, I., Timotheou, S., Nikolaou, S., Zheng, G., Ng, D. W. K. et al. (2014). Simultaneous wireless information and power transfer in modern communication systems. IEEE Communications Magazine, 52(11), 104–110. https://doi.org/10.1109/MCOM.2014.6957150 [Google Scholar] [CrossRef]

11. Kwon, G., Park, H., Win, M. Z. (2021). Joint beamforming and power splitting for wideband millimeter wave SWIPT systems. IEEE Journal of Selected Topics in Signal Processing, 15(5), 1211–1227. https://doi.org/10.1109/JSTSP.2021.3089026 [Google Scholar] [CrossRef]

12. Liu, Y., Han, F., Zhao, S. (2022). Flexible and reliable multiuser SWIPT IoT network enhanced by UAV-mounted intelligent reflecting surface. IEEE Transactions on Reliability, 71(2), 1092–1103. https://doi.org/10.1109/TR.2022.3161336 [Google Scholar] [CrossRef]

13. Wang, Y., Yang, K., Wan, W., Zhang, Y., Liu, Q. (2021). Energy-efficient data and energy integrated management strategy for IoT devices based on RF energy harvesting. IEEE Internet of Things Journal, 8(17), 13640–14651. https://doi.org/10.1109/JIOT.2021.3068040 [Google Scholar] [CrossRef]

14. Ali, A., Feng, L., Bashir, A. K., EI-Sappagh, S., Ahmed, S. H. (2020). Quality of service provisioning for heterogeneous services in cognitive radio-enabled Internet of Things. IEEE Transactions on Network Science and Engineering, 7(1), 328–342. https://doi.org/10.1109/TNSE.2018.2877646 [Google Scholar] [CrossRef]

15. Zhu, Z., Wang, N., Hao, W., Wang, Z., Lee, I. (2021). Robust beamforming designs in secure MIMO SWIPT IoT networks with a nonlinear channel model. IEEE Internet of Things Journal, 8(3), 1702–1715. https://doi.org/10.1109/JIOT.2020.3014933 [Google Scholar] [CrossRef]

16. Masood, Z., Park, H., Jang, H. S., Yoo, S., Jung, S. P. et al. (2021). Optimal power allocation for maximizing energy efficiency in DAS-based IoT network. IEEE Systems Journal, 15(2), 2342–2348. https://doi.org/10.1109/JSYST.2020.3013693 [Google Scholar] [CrossRef]

17. Han, J., Lee, G. H., Park, S., Choi, J. K. (2022). Joint subcarrier and transmission power allocation in OFDMA-based WPT system for mobile-edge computing in IoT environment. IEEE Internet of Things Journal, 9(16), 15039–15052. https://doi.org/10.1109/JIOT.2021.3103768 [Google Scholar] [CrossRef]

18. Yazdani, H., Vosoughi, A. (2021). Steady-state rate-optimal power adaptation in energy harvesting opportunistic cognitive radios with spectrum sensing and channel estimation errors. IEEE Transactions on Green Communications and Networking, 5(4), 2104–2120. https://doi.org/10.1109/TGCN.2021.3087456 [Google Scholar] [CrossRef]

19. Xu, Y., Sun, H., Ye, Y. (2021). Distributed resource allocation for SWIPT-based cognitive Ad-hoc networks. IEEE Transactions on Cognitive Communications and Networking, 7(4), 1320–1332. https://doi.org/10.1109/TCCN.2021.3068396 [Google Scholar] [CrossRef]

20. Qi, Q., Chen, X., Ng, D. W. K. (2020). Robust beamforming for NOMA-based cellular massive IoT with SWIPT. IEEE Transactions on Signal Processing, 68, 211–224. https://doi.org/10.1109/TSP.2019.2959246 [Google Scholar] [CrossRef]

21. Prathima, A., Gurjar, D. S., Nguyen, H. H., Bhardwaj, A. (2020). Performance analysis and optimization of bidirectional overlay cognitive radio networks with hybrid-SWIPT. IEEE Transactions on Vehicular Technology, 69(11), 13467–13481. https://doi.org/10.1109/TVT.2020.3029067 [Google Scholar] [CrossRef]

22. Acosta, M. R. C., Moreta, C. E. G., Koo, I. (2021). Joint power allocation and power splitting for MISO-RSMA cognitive radio systems with SWIPT and information decoder users. IEEE Systems Journal, 15(4), 5289–5300. https://doi.org/10.1109/JSYST.2020.3032725 [Google Scholar] [CrossRef]

23. Tuan, P. V., Koo, I. (2020). Optimizing efficient energy transmission on a SWIPT interference channel under linear/nonlinear EH models. IEEE Systems Journal, 14(1), 457–468. https://doi.org/10.1109/JSYST.2019.2924265 [Google Scholar] [CrossRef]

24. Hu, C., Li, Q., Zhang, Q., Qin, J. (2022). Security optimization for an AF MIMO two-way relay-assisted cognitive radio nonorthogonal multiple access networks with SWIPT. IEEE Transactions on Information Forensics and Security, 17, 1481–1496. https://doi.org/10.1109/TIFS.2022.3163842 [Google Scholar] [CrossRef]

25. Tang, J., Yu, Y., Liu, M., So, D. K. C., Zhang, X. et al. (2020). Joint power allocation and splitting control for SWIPT-enabled NOMA systems. IEEE Transactions on Wireless Communications, 19(1), 120–133. https://doi.org/10.1109/TWC.2019.2942303 [Google Scholar] [CrossRef]

26. Yang, H., Zhong, W., Chen, C., Alphones, A., Du, P. (2020). Deep-reinforcement-learning-based energy-efficient resource management for social and cognitive Internet of Things. IEEE Internet of Things Journal, 7(6), 5677–5689. https://doi.org/10.1109/JIOT.2020.2980586 [Google Scholar] [CrossRef]

27. Ramzan, M. R., Naeem, M., Altaf, M., Ejaz, W. (2022). Multicriterion resource management in energy-harvested cooperative UAV-enabled IoT networks. IEEE Internet of Things Journal, 9(4), 2944–2959. https://doi.org/10.1109/JIOT.2021.3094810 [Google Scholar] [CrossRef]

28. Xiao, H., Jiang, H., Shi, F., Luo, Y., Deng, L. et al. (2021). Energy-efficient resource allocation in radio-frequency-powered cognitive radio network for connected vehicles. IEEE Transactions on Intelligent Transportation Systems, 22(8), 5426–5436. https://doi.org/10.1109/TITS.2020.3026746 [Google Scholar] [CrossRef]

29. Shahini, A., Kiani, A., Ansari, N. (2019). Energy efficient resource allocation in EH-enabled CR networks for IoT. IEEE Internet of Things Journal, 6(2), 3186–3193. https://doi.org/10.1109/JIOT.2018.2880190 [Google Scholar] [CrossRef]

30. Vu, T., Nguyen, T., Kim, S. (2022). Cooperative NOMA-enabled SWIPT IoT networks with imperfect SIC: Performance analysis and deep learning evaluation. IEEE Internet of Things Journal, 9(3), 2253–2266. https://doi.org/10.1109/JIOT.2021.3091208 [Google Scholar] [CrossRef]

31. Zhang, Y., He, W., Li, X., Peng, H., Rabie, K. et al. (2022). Covert communication in downlink NOMA systems with channel uncertainty. IEEE Sensors Journal, 22(19), 19101–19112. https://doi.org/10.1109/JSEN.2022.3201319 [Google Scholar] [CrossRef]

32. Stotas, S., Nallanathan, A. (2011). Optimal sensing time and power allocation in multiband cognitive radio networks. IEEE Transactions on Communications, 59(1), 226–235. https://doi.org/10.1109/TCOMM.2010.110310.090473 [Google Scholar] [CrossRef]

33. Zhou, F., Li, Z., Cheng, J., Li, Q., Si, J. (2017). Robust AN-aided beamforming and power splitting design for secure MISO cognitive radio with SWIPT. IEEE Transactions on Wireless Communications, 16(4), 2450–2464. https://doi.org/10.1109/TWC.2017.2665465 [Google Scholar] [CrossRef]

34. Yang, H., Ye, Y., Chu, X., Dong, M. (2020). Resource and power allocation in SWIPT-enabled device-to-device communications based on a nonlinear energy harvesting model. IEEE Internet of Things Journal, 7(11), 10813–10825. https://doi.org/10.1109/JIOT.2020.2988512 [Google Scholar] [CrossRef]

35. Ma, R., Wu, H., Ou, J., Yang, S., Gao, Y. (2020). Power splitting-based SWIPT systems with full-duplex jamming. IEEE Transactions on Vehicular Technology, 69(9), 9822–9836. https://doi.org/10.1109/TVT.2020.3002976 [Google Scholar] [CrossRef]

36. Li, G., Liu, H., Huang, G., Li, X., Raj, B. et al. (2021). Effective capacity analysis of reconfigurable intelligent surfaces aided NOMA network. EURASIP Journal on Wireless Communications and Networking, 198(1), 1–16. https://doi.org/10.1186/s13638-021-02070-7 [Google Scholar] [CrossRef]


Cite This Article

APA Style
Yang, Y., Zhang, Y., Zhuo, Z. (2023). Adaptive time slot resource allocation in SWIPT iot networks. Computer Modeling in Engineering & Sciences, 136(3), 2787-2813. https://doi.org/10.32604/cmes.2023.027351
Vancouver Style
Yang Y, Zhang Y, Zhuo Z. Adaptive time slot resource allocation in SWIPT iot networks. Comput Model Eng Sci. 2023;136(3):2787-2813 https://doi.org/10.32604/cmes.2023.027351
IEEE Style
Y. Yang, Y. Zhang, and Z. Zhuo, “Adaptive Time Slot Resource Allocation in SWIPT IoT Networks,” Comput. Model. Eng. Sci., vol. 136, no. 3, pp. 2787-2813, 2023. https://doi.org/10.32604/cmes.2023.027351


cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1025

    View

  • 790

    Download

  • 0

    Like

Share Link