Optimal energy requesting strategy for RF-based energy harvesting wireless communications

Yu Luo, Lina Pu, Yanxiao Zhao, Guodong Wang, Min Song

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

16 Scopus citations

Abstract

Energy harvesting is emerging as a promising alternative source to power the next generation of wireless networks. This paper introduces a new energy harvesting strategy that uses a dedicated energy source to optimally replenish energy for radio frequency (RF) based wireless communication systems. Specifically, we develop a two-step dual tunnel energy requesting (DTER) strategy that allows an energy harvesting device to effectively obtain energy from a dedicated energy source. While minimizing the system energy consumption, DTER takes into account the practical constraints on both the energy source and the energy harvesting device. Additionally, the overhead issue and the charge characteristics of an energy storage component are examined to make the proposed strategy practical. To solve the nonlinear optimization problem in DTER, we convert the design of optimal energy requesting problem into a classic shortest path problem and thus enable us to find a global optimal solution through dynamic programming algorithms. Theoretical analysis and simulation study verify that DTER outperforms two other schemes in the literature.

Original languageEnglish
Title of host publicationINFOCOM 2017 - IEEE Conference on Computer Communications
ISBN (Electronic)9781509053360
DOIs
StatePublished - 2 Oct 2017
Event2017 IEEE Conference on Computer Communications, INFOCOM 2017 - Atlanta, United States
Duration: 1 May 20174 May 2017

Publication series

NameProceedings - IEEE INFOCOM
ISSN (Print)0743-166X

Conference

Conference2017 IEEE Conference on Computer Communications, INFOCOM 2017
Country/TerritoryUnited States
CityAtlanta
Period1/05/174/05/17

Fingerprint

Dive into the research topics of 'Optimal energy requesting strategy for RF-based energy harvesting wireless communications'. Together they form a unique fingerprint.

Cite this