Next Article in Journal
LiDAR-Based GNSS Denied Localization for Autonomous Racing Cars
Next Article in Special Issue
A Capacitated House Allocation Game for the Energy Efficient Relays Selection in 5G Multicast Context
Previous Article in Journal
PeriSense: Ring-Based Multi-Finger Gesture Interaction Utilizing Capacitive Proximity Sensing
Previous Article in Special Issue
A Hybrid Interweave–Underlay Countrywide Millimeter-Wave Spectrum Access and Reuse Technique for CR Indoor Small Cells in 5G/6G Era
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Energy Efficient Constellation for Wireless Connectivity of IoT Devices

1
Department of Information Engineering, University of Florence, 50139 Florence, Italy
2
Leonardo SPA, Cyber-Security Division, Science and Technology Directorate, 50013 Campi Bisezio, Italy
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(14), 3991; https://doi.org/10.3390/s20143991
Submission received: 11 June 2020 / Revised: 14 July 2020 / Accepted: 16 July 2020 / Published: 17 July 2020
(This article belongs to the Special Issue Energy-Efficient Resource Allocation for beyond 5G and IoT Systems)

Abstract

:
Reducing energy consumption is one of the most important task of the approaching Internet of Things (IoT) paradigm. Existing communication standards, such as 3G/4G, use complex protocols (active mode, sleep modes) in order to address the waste of energy. These protocols are forced to transmit when one frame is only partially filled with information symbols. The hard task to adapt the power-saving mode with low latency to the discontinuity of the source is mainly due to the fact that the receiver cannot know a priori when the source has something to transmit. In this paper, we propose a modified signalling/constellation which can save energy by mapping a zero-energy symbol in the information source. This paper addresses the fundamentals of this new technique: the maximum a posteriori probability (MAP) criterion, the probability of error, the (energy) entropy, the (energy) capacity as well as the energy cost of the proposed technique are derived for the binary signalling case.

1. Introduction

Internet of things (IoT), mobile computing (MC), pervasive computing (PC), wireless sensor networks (WSNs), and, most recently, cyber-physical systems (CPS) are the promising research areas for the future smart world [1,2]. However, as technology and solutions progress in each of these fields, connectivity and energy consumption are always two of the most hard tasks to be handled [3,4,5,6,7].
Both the 5G and the next generation 6G wireless systems aim at dramatically increasing the throughput and latency performances, but also require to address low-power low-rates internet of things (IoT) devices with unseen energy efficiency targets. The desired efficiency requires substantial improvements at all layers. At the physical layer, orthogonal frequency division multiplexing (OFDM) modulation will be likely substituted by the promising filter-bank multi-carrier [8], which breaks the constraints imposed by DFT on the carrier modulating pulse shape. Signal constellation is also a potential field of improvements. As IoT concept spreads, the operational situations where sporadic transmission of burst data become more frequent. Efficient ways to exploit the discontinuity of radio sources may be of interest for several factors, ranging from energy efficiency to reduced radio interference. This work proposes a physical layer approach to burst transmissions management, where the signalling overhead is replaced by a contained increment of error ratio. This tradeoff is analysed in the paper, identifying the operational contexts where the proposed solution is convenient.

1.1. Literature Review

In the literature, there are various methods to exploit the discontinuity of the information sources to save energy. The LTE architecture exploits the idea of Discontinuous Reception (DRX) and Discontinuous Transmission (DTX) to provide a concrete solution to the power saving. LTE provides methods for the user equipment (UE) to micro-sleep even in the active state to reduce power consumption while providing high QoS and connectivity [9,10]. If no transmissions are detected for a specific period, the UE is allowed not to monitor the downlink control channel in the given subframe and to go to power saving mode for a short period (short DRX cycle). This is a simple method to keep the UE alive, especially useful for bursty traffic, as opposed to regular. If for several DRX Short Cycles there are no transmissions, a long DRX Cycle is activated. The long DRX cycle is used during UE’s inactivity periods, when it only has to check the control channels and no resources are assigned. During both short and long DRX Cycles, the radio-frequency (RF) modem is turned on periodically for several consecutive subframes to listen to the control channels. When data activity is detected both in downlink or uplink, the short DRX cycle for UE is triggered, increasing the responsiveness and connectivity of UE. Basically, the LTE standard, and others similarly, exploit the silence of the source using two power save periods with different granularity to adapt to different discontinuous sources. During these power saving periods, the RF module is activated regularly to control if transmissions are planned, thus consuming energy as well. Moreover, only two cycles (short and long) seem to be less adaptive to the traffic generated by discontinuous sources.
More recently, several papers have been published on this topic (see [11,12,13] and references therein). In particular, in [14] a joint optimization of constellation size, energy allocation per bit and relay location assuming fixed end-to-end distance is proposed. In [15], an energy-efficient collaborative space–time block code (STBC) is proposed. In [16], a multi-dimensional compact constellations that minimize the average symbol energy is given, while in [17] the energy-saving gained from optimizing the constellation size is investigated. In [18], a multidimensional secure constellation (MSC) design to improve the energy efficiency, security, and bit error rate (BER) performance is described. In [19], an energy-based pulse amplitude modulation (PAM) constellation design framework for noncoherent detection in massive single-input multiple-output (SIMO) systems is proposed, while in [20] an energy-efficient multi-layer modulation constellation to manage the multiuser interference for broadcast system over Poisson channel is given. In [21], a symbol-level precoding for multiuser multiple-input single-output (MISO) to minimize the peak transmission energy over symbol time slots in downlink scenario is described. In [22], performance of a device-to-device (D2D) multiple-input and multiple-output (MIMO) communications using an amplify-and-forward relaying for various energy-efficient modulation schemes is investigated. In [23], a quadrature space-frequency index modulation (QSF-IM) scheme for 5G system energy-efficiency is proposed, while in [24] implementation scenarios of spatial modulation (SM) techniques for spectral and energy efficiency of 5G wireless networks are discussed. In [25], an energy-efficient framework for adaptively controlling the transmit power and data rate of the IoT device in order to minimize the energy-consumption in 5G networks is discussed, while in [26] and [27] index modulation is proposed as a key technique to provide spectral and energy efficiency in 5G networks. In [28], an orbital angular momentum (OAM) based, energy-efficient multidimensional coded modulation is proposed. In [29], an energy model for a cooperative amplify-and-forward (AF) relay system is proposed.

1.2. Our Contribution

Differently, in this paper, the authors propose an alternative signal constellation for data carriers in 5G/6G systems. The proposed constellation is characterized by the insertion of a zero-energy symbol that sources can use in the presence of variable information rate and discontinuous activity. The impact of this new signaling scheme is twofold. First data carriers modulated with the “zero” symbol to save energy. In presence of different traffic flows transported by the same bearer, the suppression of the entire frame is possible only when all flows are silent. The proposed scheme map silences with much more flexibility within the single frame producing a fine granularity in energy consumption. Low-rate sources woken up by events (i.e., sensors), face a high signaling latency unless athey re assigned dedicated continuous resources. The presence of a silent symbol in the constellation avoids the high layer activity signaling, thus dramatically reducing the service latency for impulsive low rate sources.
In this paper, we provide the baseline of the proposed energy efficient constellation, where a zero-energy symbol is added to the classical binary phase shift keying (BPSK). This constellation maps silence states of the information source to that symbol which corresponds to a zero energy signal transmitted from the antenna. As shown below, the presence of a zero energy symbol increases the energy efficiency for low activity sources and provides an instant resume when the source leaves the silence state. The proposed signaling scheme differs from OOK (on–off keying) for the presence of a complete energy balanced set of information signals. The concept can be extended to multilevel constellation (QAM) and the transmitted signal is physically (but not semantically) backward compatible. In other words, the zero-energy symbol is one legitimate symbol of the constellation that the receiver could expect to receive from the source. This fact reaches a two-fold benefit: a) there is no need to send additional control bits to inform the receiver that a silent state is active; b) there is no need to implement a wake up of the receiver, since the zero-symbol is directly detected by the demodulator. A sleep state of the receiver can be implemented anyway to save energy in case of very long periods of inactivity. In this case, the wake-up strategy is exactly the same of any receiver, according to the protocol implemented, e.g., wake up is bond to the reaching of a specific date and time, etc.
Section 2 provides the maximum-a-posteriori and maximum-a-priori criterion for the proposed signaling scheme for AWGN channel. In Section 3 some performance metrics are proposed for a fair comparison with the traditional constellations. Section 4 provides some commented numerical results while Section 5 provides an evaluation of the attained energy efficiency and channel capacity. In Section 6 there is a evaluation of the equivalent signaling overhead in traditional constellations. Section 7 has some concluding remarks.

2. MAP Criterion for Z-BPSK in AWGN Channel

The recall of the maximum a posteriori criterion (MAP) is reported in Appendix A. Since this paper aims to describe the fundamentals of the new proposed mapping technique, we focus hereafter on a simple binary antipodal constellation (BPSK). Extension to multilevel constellations (QAM) is straightforward and can be easily derived from the following results.
In the case of a binary signaling plus the zero symbol, the matched filter vector representation is scalar and the signal space is s m 0 , E 1 , E 1 . It should be noted that E 1 does not equal the average signal energy E s , which is
E s = E s m * s m = ( 1 P 0 ) E 1
where E 1 is the energy per non-zero symbol. The received signal in the matched filter scalar representation is
r = s m + z
where z is Gaussian i.i.d. process with zero mean and variance σ n 2 . Under these conditions we have:
p ( r | s 0 ) = 1 2 π σ n e r 2 2 σ n 2
p ( r | s 1 ) = 1 2 π σ n e ( r E 1 ) 2 2 σ n 2
p ( r | s 2 ) = 1 2 π σ n e ( r + E 1 ) 2 2 σ n 2
If we assume the information symbols equally probable, we have from Equation (A5) in Appendix A
P ( s 0 ) = P 0 P ( s 1 ) = P ( s 2 ) = 1 P 0 2
The MAP criterion applied to this case yields a decision for the symbols s 0 when
p ( r | s 0 ) P 0 > p ( r | s i ) 1 P 0 2 i 0 .
By substituting Equation (3) in Equation (7) and taking the base-2 logarithm of both sides, we obtain the MAP decision region of symbol s 0 as
r < E 1 2 + σ n 2 E 1 ln 2 P 0 1 P 0 = θ 0 , 1 r > E 1 2 σ n 2 E 1 ln 2 P 0 1 P 0 = θ 1 , 0
i.e., θ 0 , 1 and θ 1 , 0 are the boundary points between the decision region of symbol zero and symbol +1 and -1, respectively. In the special case when all symbols, including the zero-energy one, are equally probable, Equation (8) becomes
E 1 2 < r < E 1 2
Analogously by defining the Euclidean distance d m of received signal from transmitted signal s ¯ m :
d m = d m ( r ¯ ) = r ¯ s ¯ m
substituting into Equation (7) yields the decision region of symbol s 0 expressed as:
d 0 2 < d i 2 + 2 σ n 2 ln P ( s 0 ) P ( s i ) i 0

3. Probability of Error

In this section, the probability of error as a performance metric is derived and discussed. The probability of error is not the only metric addressed here, anyway. Energy entropy, energy capacity and energy cost are also evaluated in the following sections.
Due to the presence of the zero-energy symbol in the constellation, the possible errors committed by the receivers are more complex than the traditional case.
Table 1 shows the possible types of mistakes that a receiver can commit. These classes of errors, false activity, false zero and symbol error produce three types of corresponding error probabilities: P F A , P F Z and P S E . We also define the aggregate probability of error as
P E = P F A + P F Z + P S E
In the Z-BPSK case, considering the decision region boundaries from Equation (8) we can write
P F A = P F A | s 0 = P ( s 0 ) 1 θ 0 , 1 θ 0 , 1 p ( r | s 0 ) d r
where θ 0 , 1 is the boundary point between the decision region of symbol zero and symbol +1. From Equation (8) we can observe that the boundary between symbol 1 and symbol zero is θ 1 , 0 = θ 0 , 1 .
For what concern the probability of false zero we can write
P F Z = P F Z | s 1 + P F Z | s 2 = P ( s 1 ) θ 0 , 1 θ 0 , 1 p ( r | s 1 ) d r + P ( s 2 ) θ 0 , 1 θ 0 , 1 p ( r | s 2 ) d r
While the probability of symbol error is
P S E = P S E | s 1 + P S E | s 2 = P ( s 1 ) θ 0 , 1 p ( r | s 1 ) d r + P ( s 2 ) θ 0 , 1 + p ( r | s 2 ) d r
In the case of AWGN channel the above equation can be expressed by using the Q-funtion
Q ( x ) = 1 2 π x + e x 2 2 d x , x 0
resulting in
P F A = 2 P 0 Q θ 0 , 1 σ n
P F Z = ( 1 P 0 ) Q E 1 θ 0 , 1 σ n Q E 1 + θ 0 , 1 σ n
P S E = ( 1 P 0 ) Q E 1 + θ 0 , 1 σ n .
The aggregate probability of error defined in Equation (12) results
P E = 2 P 0 Q θ 0 , 1 σ n + ( 1 P 0 ) Q E 1 θ 0 , 1 σ n

4. Numerical Analysis and Comments

The error probabilities computed in Section 3 can be compared to the traditional BPSK signaling. For a fair comparison we set the constant symbol energy of BPSK equal to the averaged symbol energy in Z-BPSK defined in Equation (1), i.e., E s [ B P S K ] = E s [ Z B P S K ] = ( 1 P 0 ) E 1 . This means that the probability of error of Z-BPSK and BPSK are computed with the same SNR γ = E s N 0 .
Figure 1 and Figure 2 show the three error components P F A , P F Z , P S E separately, the compound sum P E for the proposed Z-BPSK signaling as well as the symbol error probability for the legacy BPSK. The graph reports the probabilities versus the signal-to-noise ratio γ = E s / N 0 , where N 0 = 2 σ n 2 is the noise spectral density, for two values of P 0 = { 0 . 01 , 0 . 8 } . These two values have been selected to represent two extreme situations: when the probability of non-activity (silence) is very low (0.01), and when the probability of non-activity is high (0.8). When the probability of the zero energy symbol is low, the performance present two different behaviors: at low SNRs the zero energy decision region collapses, P F A is constantly equal to P 0 , P F Z drops to zero and the symbol error probability P S E approaches P E of legacy BPSK. For high SNRs, the zero symbol is progressively detected and the P S E outperforms the legacy BPSK.
A completely different situation is found in Figure 2. For a high probability P 0 , the zero symbol detection errors still dominate the performance but the constellation performs globally better than traditional BPSK.
The above comparisons do not take into account the different amount of information the signals are carrying. In a single symbol, Z-BPSK can expose three different states that legacy BPSK cannot deliver. For a more fair comparison, an additional correction has to be made. Let us consider a frame with N f three-state symbols. If the probability of emission of a zero symbol is P 0 < 1 / N f we can assume optimistically that we will have at most a single zero-energy symbol in the frame. For a legacy BPSK we need to send additional symbols in order to map the eventual occurrence (and position) of the zero energy symbol in the frame. These overhead symbols are N s = log 2 ( N f + 1 ) . Hence, with a legacy BPSK, we should transmit N f + N s symbols to deliver N f three-state symbols with a given P 0 . These additional symbols are transmitted at the expense of more energy. Therefore, a fair comparison would mean to set:
E s [ B P S K ] = E s [ Z B P S K ] N f N f + N s
where E s [ B P S K ] is the energy per symbol of BPSK and E s [ Z B P S K ] is the energy per symbol of the Z-BPSK. Note that the above computation is biased in favor of BPSK since if there are more than one zero energy symbol in a frame, the number of additional (overhead) symbols is higher.

5. Energy Entropy and Energy Capacity

In this section, we show how the proposed signal constellation, i.e., zero energy symbol mapping, can reach benefits from the energy consumption point of view. To show this we have derived the source entropy and the channel capacity of the Z-BPSK and compared it with the BPSK known results.

5.1. Entropy

Given a BPSK signalling, the entropy of the binary source H B ( X ) is well known [30]
H B ( X ) = p ( s 1 ) log p ( s 1 ) + p ( s 2 ) log p ( s 2 )
where X is a discrete random variable with possible values { s 1 , s 2 } . The values s 1 and s 2 can be interpreted as the symbols emitted by the informative source.
In the proposed Z-BPSK, the zero symbol s 0 has to be added to the binary symbols s 1 and s 2 . Thus, the entropy of the Z-BPSK H z ( X ) can be defined as
H Z ( X ) = P 0 log P 0 ( 1 P 0 ) log 1 P 0 2
where P 0 = P ( s 0 ) is the probability of generation of the zero symbol. The probability of emitting a non-zero symbol is supposed equiprobable p ( s 1 ) = p ( s 2 ) = 1 P 0 2 .
Defining the energy entropy as the number of symbols that a source can emit per energy unit
H 1 ( X ) H ( X ) E s ,
we can compare the bit-per-joule curves for the Z-BPSK and the BPSK. The energy per symbol E s is different for the Z-BPSK and the BPSK (Equation (1))
E s [ B P S K ] = E 1
E s [ Z B P S K ] = ( 1 P 0 ) E 1
The result of the comparison is shown in Figure 3. If the probability of emission of the zero symbol increases, the entropy of the Z-BPSK grows significantly over the entropy of the BPSK.

5.2. Capacity

The channel capacity C B of a binary erasure channel (BEC) is well known [30]
C B = 1 P S E
where P S E is the symbol error probability.
The transition probabilities P S E , P F A , P F Z in Equation (17) and the probability of zero symbol emission P 0 can be used to derive the capacity C Z for the Z-BPSK
C Z = i = 0 2 j = 0 2 p ( x j ) p ( y i | x j ) log p ( y i | x j ) p ( y i )
where x j is the symbol emitted by the source( { s 0 = 0 , s 1 = 1 , s 2 = 1 } in case of Z-BPSK) and y i is the symbol received by the destination. After some operations, the capacity can be written as
C Z = P F Z log P F Z P F Z 3 P F Z P 0 + P 0 + P S E ( 1 P 0 ) log P S E P F A P 0 + ( 1 P F A ) ( 1 P 0 2 ) + + ( 1 P F Z P S E ) ( 1 P 0 ) log 1 P F Z P S E P F A P 0 + ( 1 P F A ) ( 1 P 0 2 ) + + 2 P 0 P F A log P F A P F A P 0 + ( 1 P F A ) ( 1 P 0 2 ) + P 0 ( 1 2 P F Z ) log 1 2 P F Z P F Z 3 P F Z P 0 + P 0
If the transitions between source and destination have no error, the capacity reaches asymptotically the source entropy, as the classical BPSK
lim P S E 0 C B = 1
lim P S E , P F A , P F Z 0 C Z = P 0 log P 0 ( 1 P 0 ) log 1 P 0 2
It is important to note that, unlike C B , the capacity of the Z-BPSK is greater than one for 0 < P 0 < 0 . 55 . In fact,
lim P S E , P F A , P F Z , P 0 0 C Z = 1
lim P S E , P F A , P F Z 0 , P 0 1 C Z = 0
The capacity of the proposed constellation, i.e., the insertion of a zero-energy symbol, reaches a greater capacity compared to classic BPSK, in error-free channels.
The energy capacity, as defined in [31], can be thus derived
C 1 C E S .
We can then compare the bit-per-joule curves for the capacity of the Z-BPSK and the BPSK. The energy per symbol E s is different for the Z-BPSK and the BPSK, as reported in Equation (25). The capacity of Z-BPSK ( C Z ) is shown in Figure 4 as a function of the probability of emission of zero symbol ( P 0 ) and SNR.
The energy capacity of the Z-BPSK and BPSK are compared in Figure 5 as a function of the SNR for different values of P 0 , while in Figure 6 the energy capacity is drawn as a function of P 0 for a fixed SNR. The SNR ( E s / N 0 ) in Figure 5 is calculated by fixing the energy per symbol E s = 1 and varying the noise power N 0 .
The results clearly show how the proposed zero-energy mapping can assure a higher energy efficiency, in terms of higher bit-per-joule, even for low probability of emission of zero symbol.

6. Energy Cost

Most existing wireless mobile networks (including 3G and LTE) employ Discontinuous Reception (DRX) to conserve the power of mobile user devices (MSs). DRX allows an idle MS to power off the radio transceiver for a predefined period (called the DRX cycle) instead of continuously listening to the radio channel. The main idea is to let the MS switch off the radio receiver for several frames if there are not bits to be transmitted. While in sleep mode, the MS listens at the control channel in order to wake up (active mode) if the base station (BS) indicates that there are frames to be transmitted. All these BS-MS control bits (which are not information) are sent by means of additional power. Furthermore, one frame which is partially filled with non-zero symbols has to be transmitted anyway, consuming energy for nothing. Or, the frame is buffered waiting to accumulate non-zero symbols to fill the frame, but this policy does not apply well to delay-sensitive services such as voice and web browsing, or when there are several information sources with constant but different symbol emission rates.
Let us focus on a information source and model it with a two-state Markov chain: Talk State (T) and Silence State (S), as depicted in Figure 7.
Given the transition probabilities P T S , from Talk to Silence, and P S T from Silence to Talk, the probability of Talk P T and Silence P S can be derived
P T = P S T P S T + P T S
P S = 1 P T = P T S P S T + P T S = P 0
The probability P S is equivalent to the probability of zero-symbol emission that we depicted with P 0 in the previous sections. As known, the probability to stay in a state and to leave a state sum up to 1, e.g., P T T + P T S = 1 .
Let us focus now on a traditional frame-based transmission. In order to derive the average energy per transmitted frame ( E f ), we have to first calculate the probability of remaining in the silence state for a number of symbols (n) to fill entirely one frame ( N f )
P { n = N f } = ( 1 P S T ) N f 1 P S T
since in a traditional BPSK transmission, if at least one symbol is emitted in a frame, the frame has to be transmitted entirely, using an energy equal to N f E 1 , where E 1 is the energy per non-zero symbol. If the system remains in the silence state for an interval equal to N f symbols, then that frame is not transmitted and the energy cost is zero, for that frame. Thus, during a silence state, the average energy per frame can be written as
E f s = i = 1 N f 1 P S T ( 1 P S T ) N f 1 N f E 1 = N f E 1 [ 1 ( 1 P S T ) N f 1 ]
On the contrary, during a talk state, the average energy per frame is
E f t = P T N f E 1
Thus, the overall average energy per frame of the BPSK is
E f [ B P S K ] = E f s + E f t = N f E 1 P T + ( 1 ( 1 P S T ) N f 1 )
Let us now consider the Z-BPSK scheme. In this case the silent state is directly mapped into the symbol constellation (through a symbol “0”), and every time the source is in a silent state it simply transmits a zero-energy symbol. Thus, in this case, the average energy per frame can be written as
E f [ Z B P S K ] = N f E 1 1 P 0 = N f E 1 P S T P S T + P T S
The average energy-per-frame of a classical signalling method (such as a frame-based BPSK) and the proposed zero-energy mapping method (Z-BPSK) can be compared in order to highlight the cost in terms of energy to transmit a frame of symbols, as a function of the transition probabilities between the talk and silence states. The results are shown in Figure 8. The proposed method is able to reduce the cost of the energy by a factor 20 and more, depending on how frequent the zero symbol emission is and, in particular, the transition from talk to silence. For example, with P 0 = 0 . 4 , which is typical, e.g., of voice services, and P T S = 0 . 003 , the proposed method compared to the classical one was able to save 34% of energy, while with P T S = 0 . 01 the energy saved growed up to 84%. A low value of P T S means that the transition between the talk and silence state has low probability to occur. A more variable source, i.e., frequent zeros distributed in the stream like several aggregated sources with different constant rate, leads to more frequent transition between talk and silence state and a consequent growing of the energy saved with our method.

7. Conclusions

In this paper, a modification of the alphabet of the symbols transmitted by the source is proposed. In particular, a zero-energy symbol is mapped directly into the constellation. This makes the zero symbol part of the information sent to the receiver, without any need for additional control bits or strategies. The map criterion, the probability of error, the entropy and the capacity of the proposed zero-energy mapping are derived for binary signalling case (Z-BPSK) and compared to the classic binary signalling (BPSK). The results show that the proposed concept performs as the traditional modulation, while saving energy, in particular when the probability of zero-symbol emission is significant, i.e., when the source experiences many silent periods.
The proposed solution would be useful to save energy and overhead in all the contexts where bursty traffic of data is produced, like in voice or browsing services. The results show that our solution is able to save significant amount of energy with the same probability of error of a traditional system in the case of bursty traffic.

Author Contributions

Conceptualization, L.M. and L.S.R.; methodology, L.M. and L.S.R.; formal analysis, L.M. and L.S.R.; writing—original draft preparation, L.M. and S.J.; writing—review and editing, S.J. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the European Telecommunications Standards Institute (ETSI) SmartBAN, and in part by the European Union’s Horizon 2020 Research and Innovation Programme Grant 872752.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Maximum A-Posteriori Criterion

We first recall the base equations for maximum a-posteriori (MAP) criterion. Let us denote with P ( · ) the discrete probability function and with p ( · ) the probability density function (pdf). Given the a-posteriori observation of received vector r ¯ , we define the a-posteriori probability of signal s ¯ m as [32]
P ( s ¯ m | r ¯ ) m = 0 ... M 1
where M is the number of symbols in the constellation. By using the Bayes’s rule [32]:
P ( s ¯ m | r ¯ ) = p ( r ¯ | s ¯ m ) P ( s ¯ m ) p ( r ¯ )
we obtain that the a-posteriori probability is function of a-priori symbol probability and conditional pdf of the received vector observed. At denominator of Equation (A2) we find the term p ( r ¯ ) which can be written as
p ( r ¯ ) = m = 0 M 1 P ( s ¯ m ) p ( r ¯ | s ¯ m )
For an information source which maps also the zero symbol we can write
P ( s ¯ m ) P 0 m = 0 P m m = 1 M 1
where P 0 is the probability of emission of a zero-energy symbol and P m is the probability of emission of the m-th non-zero symbol. When the non-zero energy information symbols are equally probable, Equation (A4) can be rewritten as
P ( s ¯ m ) P 0 m = 0 1 P 0 M 1 otherwise
The MAP criterion is adopted when the decoded symbol which maximizes Equation (A2) is selected. Thus, the detected index m ^ is
m ^ = arg max m P ( s ¯ m | r ¯ )
Since denominator of Equation (A2) is independent of m, MAP criterion can be written as
m ^ = arg max m p ( r ¯ | s ¯ m ) P ( s ¯ m )

References

  1. Sheng, Z.; Pfersich, S.; Eldridge, A.; Zhou, J.; Tian, D.; Leung, V.C.M. Wireless acoustic sensor networks and edge computing for rapid acoustic monitoring. IEEE/CAA J. Autom. Sin. 2019, 6, 64–74. [Google Scholar] [CrossRef] [Green Version]
  2. Zhang, P.; Zhou, M.; Fortino, G. Security and trust issues in Fog computing: A survey. Future Gener. Comput. Syst. 2018, 88, 16–27. [Google Scholar] [CrossRef]
  3. Stankovic, J.A. Research Directions for the Internet of Things. IEEE Internet Things 2014, 1, 3–9. [Google Scholar] [CrossRef]
  4. Pan, J.; Jain, R.; Paul, S.; Vu, T.; Saifullah, A.; Sha, M. An Internet of Things Framework for Smart Energy in Buildings: Designs, Prototype, and Experiments. IEEE Internet Things 2015, 2, 527–537. [Google Scholar] [CrossRef] [Green Version]
  5. Chen, S.; Xu, H.; Liu, D.; Hu, B.; Wang, H. A Vision of IoT: Applications, Challenges, and Opportunities with China Perspective. IEEE Internet Things 2014, 1, 349–359. [Google Scholar] [CrossRef]
  6. Cheng, J.; Yuan, G.; Zhou, M.; Gao, S.; Liu, C.; Duan, H.; Zeng, Q. Accessibility Analysis and Modeling for IoV in an Urban Scene. IEEE Trans. Veh. Technol. 2020, 69, 4246–4256. [Google Scholar] [CrossRef]
  7. Duan, Y.; Li, W.; Fu, X.; Luo, Y.; Yang, L. A methodology for reliability of WSN based on software defined network in adaptive industrial environment. IEEE/CAA J. Autom. Sin. 2018, 5, 74–82. [Google Scholar] [CrossRef]
  8. Farhang-Boroujeny, B. OFDM Versus Filter Bank Multicarrier. IEEE Signal Process Mag. 2011, 28, 92–112. [Google Scholar] [CrossRef]
  9. Wang, H.C.; Tseng, C.C.; Chen, G.Y.; Kuo, F.C.; Ting, K.C. Accurate analysis of delay and power consumption of LTE DRX mechanism with a combination of short and long cycles. In Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications, Taipei, Taiwan, 24–27 September 2012; pp. 384–388. [Google Scholar]
  10. Gupta, M.; Koc, A.; Vannithamby, R. Analyzing mobile applications and power consumption on smartphone over LTE network. In Proceedings of the 2011 International Conference on Energy Aware Computing, Istanbul, Turkey, 30 November–2 December 2011; pp. 1–4. [Google Scholar]
  11. Zhou, L.; Wu, Y.; Yu, H. A Two-Layer, Energy-Efficient Approach for Joint Power Control and Uplink–Downlink Channel Allocation in D2D Communication. Sensors 2020, 20, 3285. [Google Scholar] [CrossRef] [PubMed]
  12. Pizzi, S.; Rinaldi, F.; Molinaro, A.; Iera, A.; Araniti, G. Energy-Efficient Multicast Service Delivery Exploiting Single Frequency Device-To-Device Communications in 5G New Radio Systems. Sensors 2018, 18, 2205. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  13. Algedir, A.; Refai, H.H. Energy-Efficient D2D Communication under Downlink HetNets. In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, 15–18 April 2019; pp. 1–6. [Google Scholar]
  14. Mehrotra, R.; Kundu, C.; Bose, R. Joint constellation size, energy allocation and relay location optimisation for energy-efficient DF relaying. IET Commun. 2016, 10, 1282–1293. [Google Scholar] [CrossRef]
  15. Gong, F.; Zhang, J.; Zhu, Y.; Ge, J. Energy-Efficient Collaborative Alamouti Codes. IEEE Wirel. Commun. Lett. 2012, 1, 512–515. [Google Scholar] [CrossRef]
  16. Beko, M.; Dinis, R. Designing Good Multi-Dimensional Constellations. IEEE Wirel. Commun. Lett. 2012, 1, 221–224. [Google Scholar] [CrossRef] [Green Version]
  17. Abo-Zahhad, M.; Farrag, M.; Ali, A.; Amin, O. An energy consumption model for wireless sensor networks. In Proceedings of the 5th International Conference on Energy Aware Computing Systems Applications, Cairo, Egypt, 24–26 March 2015; pp. 1–4. [Google Scholar]
  18. Li, W.; Ghogho, M.; Zhang, J.; McLernon, D.; Lei, J.; Zaidi, S.A.R. Design of an Energy-Efficient Multidimensional Secure Constellation for 5G Communications. In Proceedings of the 2019 IEEE International Conference on Communications Workshops (ICC Workshops), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
  19. Gao, X.; Zhang, J.; Chen, H.; Dong, Z.; Vucetic, B. Energy-Efficient and Low-Latency Massive SIMO Using Noncoherent ML Detection for Industrial IoT Communications. IEEE Internet Things 2019, 6, 6247–6261. [Google Scholar] [CrossRef]
  20. Si-Ma, L.; Yu, H.; Zhang, J. Energy-Efficient Uniquely-Decomposable Multilayer Modulation for Peak-Limited Broadcast DTP Channels. IEEE Photonics J. 2018, 10, 1–9. [Google Scholar] [CrossRef]
  21. Liu, Y.; Shao, M.; Ma, W. An Admm Algorithm for Peak Transmission Energy Minimization in Symbol-level Precoding. In Proceedings of the ICASSP 2019—2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK, 12–17 May 2019; pp. 4739–4743. [Google Scholar]
  22. Parvez, S.; Singya, P.K.; Bhatia, V. On ASER Analysis of Energy Efficient Modulation Schemes for a Device-to-Device MIMO Relay Network. IEEE Access 2020, 8, 2499–2512. [Google Scholar] [CrossRef]
  23. Patcharamaneepakorn, P.; Wang, C.; Fu, Y.; Aggoune, E.M.; Alwakeel, M.M.; Tao, X.; Ge, X. Quadrature Space-Frequency Index Modulation for Energy-Efficient 5G Wireless Communication Systems. IEEE Trans. Commun. 2018, 66, 3050–3064. [Google Scholar] [CrossRef]
  24. Başar, E. Spatial modulation techniques for 5G wireless networks. In Proceedings of the 2016 24th Signal Processing and Communication Application Conference (SIU), Zonguldak, Turkey, 16–19 May 2016; pp. 777–780. [Google Scholar]
  25. Al Homssi, B.; Al-Hourani, A.; Chavez, K.G.; Chandrasekharan, S.; Kandeepan, S. Energy-Efficient IoT for 5G: A Framework for Adaptive Power and Rate Control. In Proceedings of the 2018 12th International Conference on Signal Processing and Communication Systems (ICSPCS), Cairns, Australia, 17–19 December 2018; pp. 1–6. [Google Scholar]
  26. Basar, E. Index modulation techniques for 5G wireless networks. IEEE Commun. Mag. 2016, 54, 168–175. [Google Scholar] [CrossRef] [Green Version]
  27. Basar, E.; Wen, M.; Mesleh, R.; Di Renzo, M.; Xiao, Y.; Haas, H. Index Modulation Techniques for Next-Generation Wireless Networks. IEEE Access 2017, 5, 16693–16746. [Google Scholar] [CrossRef]
  28. Djordjevic, I.B.; Zhang, S.; Wang, T. Multidimensional coded modulation for wireless communications beyond 5G. In Proceedings of the 2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS), Nis, Serbia, 18–20 October 2017; pp. 293–299. [Google Scholar]
  29. Kudavithana, D.; Chaudhari, Q.; Evans, J.; Krongold, B. Energy Modelling and Optimization of Amplify-and-Forward Relay Transmission. In Proceedings of the 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), San Francisco, CA, USA, 19–22 March 2017; pp. 1–6. [Google Scholar]
  30. MacKay, D.J.C. Information Theory, Inference, and Learning Algorithms; Cambridge University Press: Cambridge, UK, 2003. [Google Scholar] [CrossRef]
  31. Hyuck Kwon, T.B. Channel capacity in bits per joule. IEEE J. Ocean. Eng. 1986, 11, 97–99. [Google Scholar] [CrossRef]
  32. Proakis, J. Digital Communications, 4th ed.; McGraw-Hill: New York, NY, USA, 2001. [Google Scholar]
Figure 1. Error probabilities of the Z-binary phase shift keying (BPSK) and BPSK for P 0 = 0 . 01 as a function of the SNR γ = E s / N 0 .
Figure 1. Error probabilities of the Z-binary phase shift keying (BPSK) and BPSK for P 0 = 0 . 01 as a function of the SNR γ = E s / N 0 .
Sensors 20 03991 g001
Figure 2. Error probabilities of the Z-BPSK and BPSK for P 0 = 0 . 8 as a function of the SNR γ = E s / N 0 .
Figure 2. Error probabilities of the Z-BPSK and BPSK for P 0 = 0 . 8 as a function of the SNR γ = E s / N 0 .
Sensors 20 03991 g002
Figure 3. Entropy per unit of energy of the Z-BPSK (solid line) and classic BPSK (dashed line) as a function of the probability of emission of the zero symbol.
Figure 3. Entropy per unit of energy of the Z-BPSK (solid line) and classic BPSK (dashed line) as a function of the probability of emission of the zero symbol.
Sensors 20 03991 g003
Figure 4. Capacity of the Z-BPSK as a function the probability of emission zero symbol and SNR.
Figure 4. Capacity of the Z-BPSK as a function the probability of emission zero symbol and SNR.
Sensors 20 03991 g004
Figure 5. Energy capacity of the Z-BPSK and BPSK as a function of the SNR for different values of P 0 .
Figure 5. Energy capacity of the Z-BPSK and BPSK as a function of the SNR for different values of P 0 .
Sensors 20 03991 g005
Figure 6. Energy capacity of the Z-BPSK and BPSK as a function of P 0 .
Figure 6. Energy capacity of the Z-BPSK and BPSK as a function of P 0 .
Sensors 20 03991 g006
Figure 7. Markov chain modelling the source emission of zero and non-zero symbols.
Figure 7. Markov chain modelling the source emission of zero and non-zero symbols.
Sensors 20 03991 g007
Figure 8. Average energy per frame E f of the Z-BPSK (solid line) and BPSK (dashed line) as a function of the probability of zero symbol emission P 0 for different values of the probability of transition from talk to silence state P T S .
Figure 8. Average energy per frame E f of the Z-BPSK (solid line) and BPSK (dashed line) as a function of the probability of zero symbol emission P 0 for different values of the probability of transition from talk to silence state P T S .
Sensors 20 03991 g008
Table 1. Error types.
Table 1. Error types.
SentDetectedError
s 0 s 0 no error
s 0 s 1 false activity
s 0 s 2 false activity
s 1 s 0 false zero
s 1 s 1 no error
s 1 s 2 symbol error
s 2 s 0 false zero
s 2 s 1 symbol error
s 2 s 2 no error

Share and Cite

MDPI and ACS Style

Mucchi, L.; Ronga, L.S.; Jayousi, S. Energy Efficient Constellation for Wireless Connectivity of IoT Devices. Sensors 2020, 20, 3991. https://doi.org/10.3390/s20143991

AMA Style

Mucchi L, Ronga LS, Jayousi S. Energy Efficient Constellation for Wireless Connectivity of IoT Devices. Sensors. 2020; 20(14):3991. https://doi.org/10.3390/s20143991

Chicago/Turabian Style

Mucchi, Lorenzo, Luca Simone Ronga, and Sara Jayousi. 2020. "Energy Efficient Constellation for Wireless Connectivity of IoT Devices" Sensors 20, no. 14: 3991. https://doi.org/10.3390/s20143991

APA Style

Mucchi, L., Ronga, L. S., & Jayousi, S. (2020). Energy Efficient Constellation for Wireless Connectivity of IoT Devices. Sensors, 20(14), 3991. https://doi.org/10.3390/s20143991

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop