Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Aylin Yener is active.

Publication


Featured researches published by Aylin Yener.


IEEE Journal on Selected Areas in Communications | 2011

Transmission with Energy Harvesting Nodes in Fading Wireless Channels: Optimal Policies

Omur Ozel; Kaya Tutuncuoglu; Jing Yang; Sennur Ulukus; Aylin Yener

Wireless systems comprised of rechargeable nodes have a significantly prolonged lifetime and are sustainable. A distinct characteristic of these systems is the fact that the nodes can harvest energy throughout the duration in which communication takes place. As such, transmission policies of the nodes need to adapt to these harvested energy arrivals. In this paper, we consider optimization of point-to-point data transmission with an energy harvesting transmitter which has a limited battery capacity, communicating in a wireless fading channel. We consider two objectives: maximizing the throughput by a deadline, and minimizing the transmission completion time of the communication session. We optimize these objectives by controlling the time sequence of transmit powers subject to energy storage capacity and causality constraints. We, first, study optimal offline policies. We introduce a directional water-filling algorithm which provides a simple and concise interpretation of the necessary optimality conditions. We show the optimality of an adaptive directional water-filling algorithm for the throughput maximization problem. We solve the transmission completion time minimization problem by utilizing its equivalence to its throughput maximization counterpart. Next, we consider online policies. We use stochastic dynamic programming to solve for the optimal online policy that maximizes the average number of bits delivered by a deadline under stochastic fading and energy arrival processes with causal channel state feedback. We also propose near-optimal policies with reduced complexity, and numerically study their performances along with the performances of the offline and online optimal policies under various different configurations.


IEEE Transactions on Information Theory | 2008

The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming

Ender Tekin; Aylin Yener

The general Gaussian multiple-access wiretap channel (GGMAC-WT) and the Gaussian two-way wiretap channel (GTW-WT) are considered. In the GGMAC-WT, multiple users communicate with an intended receiver in the presence of an eavesdropper who receives their signals through another GMAC. In the GTW-WT, two users communicate with each other over a common Gaussian channel, with an eavesdropper listening through a GMAC. A secrecy measure that is suitable for this multiterminal environment is defined, and achievable secrecy rate regions are found for both channels. For both cases, the power allocations maximizing the achievable secrecy sum rate are determined. It is seen that the optimum policy may prevent some terminals from transmission in order to preserve the secrecy of the system. Inspired by this construct, a new scheme cooperative jamming is proposed, where users who are prevented from transmitting according to the secrecy sum rate maximizing power allocation policy ldquojamrdquo the eavesdropper, thereby helping the remaining users. This scheme is shown to increase the achievable secrecy sum rate. Overall, our results show that in multiple-access scenarios, users can help each other to collectively achieve positive secrecy rates. In other words, cooperation among users can be invaluable for achieving secrecy for the system.


IEEE Transactions on Wireless Communications | 2012

Optimum Transmission Policies for Battery Limited Energy Harvesting Nodes

Kaya Tutuncuoglu; Aylin Yener

Wireless networks with energy harvesting battery equipped nodes are quickly emerging as a viable option for future wireless networks with extended lifetime. Equally important to their counterpart in the design of energy harvesting radios are the design principles that this new networking paradigm calls for. In particular, unlike wireless networks considered to date, the energy replenishment process and the storage constraints of the rechargeable batteries need to be taken into account in designing efficient transmission strategies. In this work, such transmission policies for rechargeable nodes are considered, and optimum solutions for two related problems are identified. Specifically, the transmission policy that maximizes the short term throughput, i.e., the amount of data transmitted in a finite time horizon is found. In addition, the relation of this optimization problem to another, namely, the minimization of the transmission completion time for a given amount of data is demonstrated, which leads to the solution of the latter as well. The optimum transmission policies are identified under the constraints on energy causality, i.e., energy replenishment process, as well as the energy storage, i.e., battery capacity. For battery replenishment, a model with discrete packets of energy arrivals is considered. The necessary conditions that the throughput-optimal allocation satisfies are derived, and then the algorithm that finds the optimal transmission policy with respect to the short-term throughput and the minimum transmission completion time is given. Numerical results are presented to confirm the analytical findings.


IEEE Journal on Selected Areas in Communications | 2015

Energy Harvesting Wireless Communications: A Review of Recent Advances

Sennur Ulukus; Aylin Yener; Elza Erkip; Osvaldo Simeone; Michele Zorzi; Pulkit Grover; Kaibin Huang

This paper summarizes recent contributions in the broad area of energy harvesting wireless communications. In particular, we provide the current state of the art for wireless networks composed of energy harvesting nodes, starting from the information-theoretic performance limits to transmission scheduling policies and resource allocation, medium access, and networking issues. The emerging related area of energy transfer for self-sustaining energy harvesting wireless networks is considered in detail covering both energy cooperation aspects and simultaneous energy and information transfer. Various potential models with energy harvesting nodes at different network scales are reviewed, as well as models for energy consumption at the nodes.


IEEE Transactions on Signal Processing | 2004

Transceiver optimization for multiuser MIMO systems

Semih Serbetli; Aylin Yener

We consider the uplink of a multiuser system where the transmitters as well as the receiver are equipped with multiple antennas. Each user multiplexes its symbols by a linear precoder through its transmit antennas. We work with the system-wide mean squared error as the performance measure and propose algorithms to find the jointly optimum linear precoders at each transmitter and linear decoders at the receiver. We first work with the case where the number of symbols to be transmitted by each user is given. We then investigate how the symbol rate should be chosen for each user with optimum transmitters and receivers. The convergence analysis of the algorithms is given, and numerical evidence that supports the analysis is presented.


IEEE Transactions on Information Theory | 2010

Cooperation With an Untrusted Relay: A Secrecy Perspective

Xiang He; Aylin Yener

We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario, an interesting question is whether the relay node should be deployed at all. That is, whether cooperation with an untrusted relay node can ever be beneficial. We first provide an achievable secrecy rate for the general untrusted relay channel, and proceed to investigate this question for two types of relay networks with orthogonal components. For the first model, there is an orthogonal link from the source to the relay. For the second model, there is an orthogonal link from the relay to the destination. For the first model, we find the equivocation capacity region and show that answer is negative. In contrast, for the second model, we find that the answer is positive. Specifically, we show, by means of the achievable secrecy rate based on compress-and-forward, that by asking the untrusted relay node to relay information, we can achieve a higher secrecy rate than just treating the relay as an eavesdropper. For a special class of the second model, where the relay is not interfering itself, we derive an upper bound for the secrecy rate using an argument whose net effect is to separate the eavesdropper from the relay. The merit of the new upper bound is demonstrated on two channels that belong to this special class. The Gaussian case of the second model mentioned above benefits from this approach in that the new upper bound improves the previously known bounds. For the Cover-Kim deterministic relay channel, the new upper bound finds the secrecy capacity when the source-destination link is not worse than the source-relay link, by matching with achievable rate we present.


IEEE Transactions on Information Theory | 2008

The Gaussian Multiple Access Wire-Tap Channel

Ender Tekin; Aylin Yener

We consider the Gaussian multiple access wire-tap channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and informed wire-tapper who receives a degraded version of the signal at the receiver. We define suitable security measures for this multiaccess environment. Using codebooks generated randomly according to a Gaussian distribution, achievable secrecy rate regions are identified using superposition coding and time-division multiple access (TDMA) coding schemes. An upper bound for the secrecy sum-rate is derived, and our coding schemes are shown to achieve the sum capacity. Numerical results are presented showing the new rate region and comparing it with the capacity region of the Gaussian multiple-access channel (GMAC) with no secrecy constraints, which quantifies the price paid for secrecy.


IEEE Communications Magazine | 2008

Rethinking information theory for mobile ad hoc networks

Jeffrey G. Andrews; Sanjay Shakkottai; Robert W. Heath; Nihar Jindal; Martin Haenggi; Randy Berry; Dongning Guo; Michael J. Neely; Steven Weber; Syed Ali Jafar; Aylin Yener

The subject of this article is the long standing open problem of developing a general capacity theory for wireless networks, particularly a theory capable of describing the fundamental performance limits of mobile ad hoc networks. A MANET is a peer-to-peer network with no preexisting infrastructure. MANETs are the most general wireless networks, with single-hop, relay, interference, mesh, and star networks comprising special cases. The lack of a MANET capacity theory has stunted the development and commercialization of many types of wireless networks, including emergency, military, sensor, and community mesh networks. Information theory, which has been vital for links and centralized networks, has not been successfully applied to decentralized wireless networks. Even if this was accomplished, for such a theory to truly characterize the limits of deployed MANETs it must overcome three key roadblocks. First, most current capacity results rely on the allowance of unbounded delay and reliability. Second, spatial and timescale decompositions have not yet been developed for optimally modeling the spatial and temporal dynamics of wireless networks. Third, a useful network capacity theory must integrate rather than ignore the important role of overhead messaging and feedback. This article describes some of the shifts in thinking that may be needed to overcome these roadblocks and develop a more general theory.


international symposium on information theory | 2009

The multi-way relay channel

Deniz Gunduz; Aylin Yener; Andrea J. Goldsmith; H. Vincent Poor

The multi-user communication channel, in which multiple users exchange information with the help of a single relay terminal, called the multi-way relay channel, is considered. In this model, multiple interfering clusters of users communicate simultaneously, where the users within the same cluster wish to exchange messages among themselves. It is assumed that the users cannot receive each others signals directly, and hence the relay terminal is the enabler of communication. A relevant metric to study in this scenario is the symmetric rate achievable by all users, which we identify for amplify-and-forward (AF), decode-and-forward (DF) and compress-and-forward (CF) protocols. We also present an upper bound for comparison. The two extreme cases, namely full data exchange, in which every user wants to receive messages of all other users, and pairwise data exchange, consisting of multiple two-way relay channels, are investigated and presented in detail.


Journal of Communications and Networks | 2012

Sum-rate optimal power policies for energy harvesting transmitters in an interference channel

Kaya Tutuncuoglu; Aylin Yener

This paper considers a two-user Gaussian interference channel with energy harvesting transmitters. Different than conventional battery powered wireless nodes, energy harvesting transmitters have to adapt transmission to availability of energy at a particular instant. In this setting, the optimal power allocation problem to maximize the sum throughput with a given deadline is formulated. The convergence of the proposed iterative coordinate descent method for the problem is proved and the short-term throughput maximizing offline power allocation policy is found. Examples for interference regions with known sum capacities are given with directional waterfilling interpretations. Next, stochastic data arrivals are addressed. Finally, online and/or distributed near-optimal policies are proposed. Performance of the proposed algorithms are demonstrated through simulations.

Collaboration


Dive into the Aylin Yener's collaboration.

Top Co-Authors

Avatar

Xiang He

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Kaya Tutuncuoglu

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Ahmed A. Zewail

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Basak Guler

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Burak Varan

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Mohamed S. Nafea

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Ye Tian

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ender Tekin

Pennsylvania State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge