Maximizing the Link Throughput between Smart meters and Aggregators as Secondary Users under Power and Outage Constraints
This paper assesses the communication link from smart meters to aggregators as (unlicensed) secondary users that transmit their data over the (licensed) primary uplink channel. The proposed scenario assumes: (i) meters’ and aggregators’ positions are fixed so highly directional antennas are employed, (ii) secondary users transmit with limited power in relation to the primary, (iii) meters’ transmissions are coordinated to avoid packet collisions, and (iv) the secondary links’ robustness is guaranteed by an outage constraint. Under these assumptions, the interference caused by secondary users in both primary (base-stations) and other secondary users can be neglected. As unlicensed users, however, meter-aggregator links do experience interference from the mobile users of the primary network, whose positions and traffic activity are unknown. To cope with this uncertainty, we model the mobile users spatial distribution as a Poisson point process. We then derive a closed-form solution for the maximum achievable throughput with respect to a reference secondary link subject to transmit power and outage constraints. Our numerical results illustrate the effects of such constraints on the optimal throughput, evincing that more frequent outage events improve the system performance in the scenario under study. We also show that relatively high outage probabilities have little effect on the reconstruction of the average power demand curve that is transmitted from the smart meter to the aggregator.
cognitive network, Poisson point process, smart grid communication, spectrum sharing
Over the last few years, cognitive radios have appeared as the solution for more effective use of the frequency spectrum [1, 2]. Following the concept proposed by Haykin , the radio nodes should understand their environment to establish a wireless network “(…) with two primary objectives in mind: highly reliable communication whenever and wherever needed; efficient utilization of the radio spectrum.” Owing to their cognitive ability, radios would be then capable of sensing the environment to decide on their transmission.
An interesting approach to the cognitive radio concept is the so-called spectrum sharing , where unlicensed – secondary – users want to transmit some information without disturbing the licensed – primary – users over the same frequency band. Secondary users then need to sense the spectrum usage to decide about their transmissions. The transmission occurs if the channel is sensed free, which depends on the primary user activity . Otherwise, the secondary user either searches for a different band or postpones its transmission.
Although the basic idea is simple, both analysis and implementation are challenging due to interactive dynamics of the decision-making procedures . The solution gets even harder when we consider different possible applications and their specific requirements, yielding no universal solution . Notwithstanding, the idea of spectrum sharing is now widespread in both new generations of cellular system (allowing for co-existence of macro- and small-cells as in ) and different sensor applications (e.g. [9, 10, 11]).
In this paper, we focus on the specific application of spectrum sharing in the deployment of part of the communication network in the modern electric power grids [12, 13] – the so-called smart grids. As one would expect, the different applications of the electric power grid have different requirements from the communication network perspective . For instance, control operations in the high-voltage grid must be close to real-time (scale of milliseconds) so the communication link must have both extremely low latency and very high reliability (greater than ). In contrast, remote reading of meters would allow for less stringent communication requirements (latency of minutes and a reliability of ). As a consequence, the communication network design should be fine-tuned with the specific power grid application and its needs. An informative survey about the different applications and requirements is found in .
Looking specifically at how to implement cognitive radio for smart grid applications, the authors in  presented an interesting hardware study case using software defined radio in a micro-grid testbed. In , a Lyapunov-drift framework was proposed to differentiate traffic priorities and then use the cognitive radio strategy called “dynamic spectrum access” to improve the communications in smart grids. Additionally,  provides a recent survey on how to combine cognitive radio approach into smart grid scenarios.
In our case, references  and  introduce the idea of employing a spectrum sharing scheme within households where home appliances use unlicensed channel bands to build a home area network (HAN). In neighborhood area networks (NANs), different scenarios may be considered for the smart meters: (i) licensed users within the cellular systems directly connected with the distribution operator , (ii) users of unlicensed bands of unused TV frequencies (TV white spaces) , (iii) secondary users of licensed band [19, 20] and (iv) hybrid licensed-unlicensed users . When using solutions (i) and (iv), the smart grid elements are subscribers (licensed users) of cellular networks. In this case, although quality of service shall be guaranteed, they may involve prohibitive high costs and a dramatic increase in data traffic , making them not so attractive for electricity providers if compared to (ii) and (iii). And yet, the latter solutions will have a strong dependence on specific country legislation.
Despite such drawbacks, these solutions are interesting and related to ours. We believe, however, that the analysis provided by the aforementioned works are focused on network-layer considerations without a dedicated performance study involving specific topological considerations as node positions and mobility. Herein, we attempt to cope with such limitations by studying a novel application of spectrum sharing technique for distribution grids considering that some elements are fixed and others are mobile.
In specific terms, a spectrum sharing scheme (e.g ) will be assumed such that secondary users transmit in the up-link channel of the cellular system. As meters and aggregators are generally static nodes, their communication link may be built using directional antennas (e.g. ) while respecting a transmit power constraint. In this way, the harmful effects caused by the secondary user transmissions on the primary users, as well as on other secondary users, due to co-channel interference are limited. By properly designing the antenna beamforming and setting the power constraint, the probability that the secondary users interfere in the primary transmissions would be low as far as directional antennas with limited power have a restrict radiation pattern. Besides, by using the up-link channel, the cellular base-stations are disturbed by the secondary transmissions and, due to their more robust reception procedures , the interference can be further mitigated.
On the other hand, the secondary users do experience the interference caused by the primary users. Since the up-link is employed by the former, the interference normally comes from mobile devices, whose positions and traffic are unknown. To account for such uncertainties, the interferers’ spatial distribution and traffic characteristics will be modeled using point process theory . Thereby, it is possible to derive closed-form expressions for important performance metrics of wireless systems as outage probability and link throughput. It is worth mentioning that the communication between different smart meters and their respective aggregator is coordinated so they do not interfere to each other.
Our goal in this work is to optimize the link throughput (which is defined as the spectral efficiency, given in bits per second per hertz, times the probability that the packet is successfully decoded by the aggregator) of the secondary link under power (to not affect the primary users) and outage (secondary link reliability) constraints. Using a similar optimization procedure as in [26, 27, 28], we find the signal-to-interference ratio threshold and the transmit power employed by the secondary link so as to maximize its throughput while respecting the imposed constraints.
Then, we found a closed-form equation for the optimal link throughput as a non-linear function of the system constraints and the density of interferers, as well as other system parameters. Interestingly, our results show that frequent outage situations have an unexpected positive effect on the system performance for the scenario of interest (maximum value of outage constraint is ). We use actual data from the average power demand of a household (obtained from “The Reference Energy Disaggregation Data Set” database [29, 30]) to show that relatively high outage probabilities do not lead to a poor signal reconstruction if the information is sampled and sent periodically, for example, every minutes. All in all, our main contribution and novelty are the theoretical evidences that up-link spectrum sharing is a good candidate for deploying the communication network in the distribution electricity grids.
The rest of this paper is divided as follows. Section II explains the scenario under analysis, justifying our assumptions and presenting the optimization problem to be solved. In Section III, we focus on the solution of the optimization problem and illustrate how the system performance changes with the configuration parameters. Section IV shows how the outage events affect the reconstruction of the average power demand curve. In section V, we discuss some implications of our theoretical results, indicating how they might be used in actual deployments. Section VI concludes this paper.
Ii System model
In this section, we describe the basic assumptions used to build our model and their implications. The assumptions are stated as follows:
Assumption 1: Spectrum-sharing scenario where licensed (primary) and unlicensed (secondary) users share the frequency bands allocated to the up-link channel.
Assumption 2: Primary link is established between static cellular base-stations and mobile users. Secondary terminals are smart meters that need to forward data to a given aggregator through the uplink channel and their positions are fixed.
Assumption 3: The smart meters transmit with limited power such that where is the maximum power allowed for the secondary users (which can be seen as an imposition from the primary network).
Assumption 4: Smart meters associated with the same aggregator are able to perfectly coordinate their transmissions using time scheduling.
In this case, Assumption 2 indicates the possibility of employing directional antennas in the secondary links as far as their positions are fixed. Orientation errors as defined in  can be then completely avoided when deploying the secondary network, making highly directional antennas worth. In its turn, Assumption 3 imposes the maximum range that the signal transmitted by the smart meters can reach. Putting all together, the radiation pattern generated by the secondary transmission can be seen as a line segment starting in the smart meter, passing through the aggregator and ending in a point related to .
Let us now look at the interference related to the proposed spectrum sharing. Assumptions 1, 2 and 4 indicate the co-channel interference occurs: (i) from smart meters to cellular base-stations, (ii) from smart meters to aggregators that they are not associated, and (iii) from mobile users to aggregators. From the implications discussed in the previous paragraph, the cases (i) and (ii) can be neglected by designing the specific locations when the deploying either the secondary or primary networks. Even if the positions are considered random in two-dimensions, the chance of having a base-station or an aggregator in the line segment related to the smart meter transmitted signal approaches zero, which further indicated that such cases should not be considered.
Hence, only case (iii) is relevant for our analysis. To evaluate its impact in the system performance, we first need to model uncertainty of the mobile users’ positions and traffic activity. We assume here a Poisson field of interferers  such that the interferer nodes are distributed over an infinite plane following a -dimensional Poisson point process with density , given in interferers per square-meter. The wireless channel model employed in this paper consists of two components: one related to the distance-dependent path-loss such that the received power decays with the distance and other related to fast-fading . The received power at the node of interest can be computed as , where is the distance between the reference receiver and the node, is the channel gain between them, and the path-loss exponent.
Hereafter, we focus our analysis on a reference smart meter-aggregator link, as shown in Fig. 1. During transmissions intervals, we assume that the interferers’ positions and the channel gains do not change. We also consider an interference-limited scenario wherein the noise effects can be neglected. As pointed in , the inclusion of the noise power leads to a more complex analysis without providing any significant qualitative difference.
If the primary users are equipped with omni-directional antennas and transmit with the same fixed power , the signal-to-interference ratio (SIR) at the aggregator can be computed as :
where the index denotes the reference link.
We assume that the reference link employs both point-to-point Gaussian codes and the interference-as-noise decoding rule [33, 28] so that a spectral efficiency of in bits/s/Hz is achieved only if the SIR is greater than . In this case, the probability that a packet is successfully decoded by the aggregator is the probability that . Then, an outage event happens with probability . In our scenario, retransmissions are not allowed so that the information contained in packets received in outage is lost.
To compute , we assume quasi-static channel gains (squared envelops) that are independent and identically distributed exponential random variables (Rayleigh fading), and also a dynamic topology where interferers’ positions change every transmission interval. Therefore, every transmission attempt can be viewed as a different realization of the point processes and the channel gains . We consider here that the distance between the reference meter and aggregator is known and has a fixed value . Finally, the success probability is computed as :
where with being the Gamma function. It is also worth noting that the primary users might employ different power control strategies, but it will not affect the qualitiative results of our analysis due to the stochastic geometry approach employed (e.g. ).
We are now ready to define the performance metric and carry out the optimization problem under consideration.
Definition 1 (Link throughput)
The throughput of the reference link using the system model described in this section is defined as:
Our goal in this paper is to find the setting of parameters for the secondary users to maximize their link throughput while respecting the imposed power limit and outage constraints. In our case, the variables in hand are the coding rate and the transmit power of the reference link. Mathematically, we have the following problem:
where is the maximum acceptable outage probability, reflecting the reference link robustness.
Iii Maximum throughput under power and outage constraints
In this section, we solve the optimization problem previously stated. We then provide some numerical results to illustrate how the constraints imposed to our smart meter-aggregator reference link will affect the maximum achievable throughput. Before we start, we still need to present a Lemma that tells us how the throughput behaves as a function of the secondary transmit power and the SIR threshold when no constraint is considered.
Let us consider the throughput equation, given by (3), as a function of the variables and , i.e. . The function is monotonically crescent in respect to , and it is concave in respect to if .
The proof of this Lemma is straightforward from the analysis of the function in terms of the (strictly positive) variables and , and knowing that the function is twice differentiable in terms of . Any increase in leads to an increase in the exponential term of (3) and then in . Increasing , on the other hand, has a two-fold effect: it increases the logarithmic term while decreases the exponential one. The function , however, is not always concave in relation to ; nevertheless, in the region that , is concave. \qed
Since is concave for some values of , we may try to find the value of that leads to the maximum . This is shown in the next Lemma.
Let denote the value of that maximizes assuming that is in the region where . Then, is the solution of the following (transcendental) equation:
Let us first consider that is in the region where the inequality holds. Then, from Lemma 1, the value of that maximizes is the solution of the derivative equation . By doing so in (3), we end up in (5), which has no closed-form solution. If a solution does not exist, then our initial assumption the inequality does not hold and cannot be obtained. \qed
Nonetheless, in the cases of interest, (5) has a solution and therefore is in the region where as we shall see next. It is noteworthy that even though (5) does not have a closed-form solution, it can be easily evaluated numerically through standard mathematical software as, for instance, .
Fig. 2 exemplifies the behavior of the link throughput with the transmit power and the threshold . The curve behaves as predicted by Lemmas 1 and 2. Intuitively, when all parameters are kept the same, it is advantageous for the smart meter to increase its transmit power so that the SIR experienced by the aggregetor tends to increase. This behavior, although individually optimal, is not good for the other links as transmitting with more power would increase the interference level throughout the network (refer to  for a deeper assessment of an optimization problem wherein the optimal individual solution can be socially harmful). For this reason, the power constraint that our problem assumes is needed, as we will discuss later.
When analyzing the effects of the threshold , there is a trade-off involved. An increase of leads to a more efficient transmission where more bits/s/Hz can be transmitted in the same message. This gain, however, comes at expense of more frequent outage events, which in turn decreases the link throughput. From Lemma 2, the value of that leads to the optimal operating point can be found by numerically solving (5). In our case, we use the function from the Python library SciPy .
We are now almost ready to present the main result of this paper, which is the solution of the constrained optimization problem presented in the previous section. But first, we still need to state a lemma about the relation between the optimal values of the constrained and unconstrained SIR thresholds .
In the optimal unconstrained operating point given in Lemma 2, the following equality must hold:
Then, although we cannot analytically compute the actual value of , we do know that the outage probability , given in (2), related to it will be given by: , which is a monotonically decreasing function of .
In this case, if that probability is smaller than the constraint , then the constrained optimal threshold is the unconstrained one, i.e. . Otherwise, the optimal constrained threshold must be smaller than since the outage probability is a decreasing function of . \qed
Let us assume that the pair is the solution of the optimization problem given by (4). If , the pair is computed as:
The optimal throughput is then:
Let us start by considering the variable . From Lemma 1, we know that the throughput is a monotonically increasing function of , regardless of . Then, must assume its highest possible value: .
To find , we first use the assumption that . From Lemma 3, the inequality holds. Then, we use the fact that is also a monotonically crescent function of in the range so that should be the highest value that satisfies the inequality . Manipulating the constraint by assuming , we obtain . In this case, equality gives . \qed
This result is only valid if the initial assumption holds, which is true for the cases of interest, namely and . Notice that comprises indoor and outdoor scenarios as well as rural and urban areas . For example, when and (the value of in the example used in Fig. 2), the outage probability is . If that inequality does not hold, the optimal solution is and the optimal power should be computed accordingly. In other words, the value of is kept fixed, while the optimal power is the variable used to optimize the link throughput.
The optimal throughput can be approximated by:
when is small.
Corollary 1 holds for the cases under study. For example, when the system variables are set as follows: , , , , and , the term is , therefore the approximation works well.
Next we will illustrate the analytic results just presented to get more insights on how the maximum link throughput is affected by the activity of the primary users, as well as the system constraints. Fig. 3 shows how the optimal constrained throughput in the smart meter-to-aggregator link behaves in relation to the density of active mobile users that interfere in its communication. As expected, increasing the density of interfering nodes decreases the maximum throughput achieved by the reference link, regardless of values of and assumed. It is interesting to see that exponentially decays with , which indicates that the secondary link performance is dramatically affected by the primary users’ increase of activity.
We can also see from Fig. 3 that the values of the constraints and affect the maximum throughput curves. Higher values of either or leads to higher , when is fixed. While the result is intuitive for (by increasing the transmission power, we obtain higher SIR and link throughput), it is not so when the outage constraint is considered: a less strict constraint leads to higher throughputs.
To better understand those behaviors, we present in Figs. 4 and 5 the maximum throughput versus and , respectively. Fig. 4 shows that the maximum throughput linearly grows with , which was predicted by Corollary 1. This means that any relaxation in the power constraint provides a linear gain in the secondary link throughput, whose slope is directly defined by the system variables; therefore, a combination between a relatively high outage constraint and low density of interferers provides the best performance.
The behavior of as a function of the outage constraint is more complicated since there is a trade-off involved, as shown in (10) and (11). However, from our assumption that is a relatively small probability, i.e. , then is a (non-linear) crescent function of . Fig. 5 illustrates this growth, evincing that an increase for smaller values of leads to lower variation in the maximum throughput. In this case, allowing for more outage events is more advantageous for the link: the spectral efficiency gains obtained by setting higher SIR thresholds dominates the system performance. It is worth reinforcing that this behavior – which is somehow counter-intuitive – is only valid for lower values of . If outages are not a constraint in our system, the results of Proposition 1 should be reviewed under the perspective of Lemmas 1 and 2, and Remark 1.
Iv Outage events and signal reconstruction
We just showed in the previous section that allowing for more frequent outage events increases the link throughput. However, outage events will affect the information that needs to be sent by the smart meter to the aggregator.
Let be the discrete signal transmitted by the smart meter and be the signal received by the aggregator, where with being the last sample. We consider the is the average power demand over a fixed period of time . The aggregator needs then to use to reconstruct the signal . We assume here that the signal is reconstructed via linear interpolation between two adjacent points. If the communication is perfect (i.e. ) the interpolation is always between and , with .
This, however, is not the case in our model since outage events may occur due to the primary users activity. If a sample is lost, the aggregator will interpolate the missing value(s) using the latest two received samples. Consider the transmitted sequence: with . If the samples and are successfully received but is not, the reconstruction is based on the linear interpolation of and . The estimation of the missing point is then .
To carry out this procedure, we use the “The Reference Energy Disaggregation Data Set” database [29, 30] from where we build our signal , which is the 15-minute average power demand over a timespan of hours (one day). The information from the smart meter is transmitted to the aggregator every minutes (yielding hour and samples), which reconstructs the signal as previously described.
Fig. 6 illustrates the effects of the outage probability on the signal reconstruction by showing the original signal and a snapshot of outputs assuming the constraints and , where the missing points in the and curves are identified by the red squares. At first sight, one cannot notice a big difference between the three signals, and the most noticeable differences are in the curve (specifically in the “peaks”), not in the one. This interesting fact happens due to the nature of the signal itself and the randomness of outage events. The power demand signal seems to have a burst nature with a floor level and few peaks, which is related to personal habits when the house is occupied and people are engaged in activities like cooking or showering.
For example, we can see in Fig. 6 that the peaks are around 8:00 in the morning and noon. These peaks are probably related to people getting ready to work and having lunch. Other than this, specially between 10:00 in the evening and 6:00 in the morning of the following day, we can see that the energy consumption is quite low and constant, most probably related to appliances in stand-by and refrigerator cycles . In this way, most of the samples will have similar values. If independent and identically distributed erasures occur, the probability that the estimated point approximates the missing one is high.
Consider again the transmitted sequence: with and that the samples and are successfully received but is not. Then, the reconstruction is . As in most of the cases , then . However, during the peaks, this does not hold and errors become evident. The snapshot presented for is an unlucky one as far as the transmissions failure happened in the peak periods. Conversely, although more samples were lost when , they were mostly in the floor-level periods and the signal reconstruction was not affected in this specific snapshot.
To statistically analyze the effects of the outage events in the signal reconstruction, we use the root-mean-square deviation (RMSD) such that the reconstruction error of the is computed as:
Fig. 7 presents how the RMSD changes with the maximum allowed outage probability . As expected, more frequent outage events (indicated by higher ) leads to a worse signal reconstruction (indicated by higher RMSDs). Our results show, however, that has relatively little effect on reconstructing the signal. Let us first analyze the example presented in Fig. 6 (black curve in Fig. 7). For the highest value considered , the RMSD is watts for a signal with mean of watts and with range watts. In this case, the normalized RMSD with respect to the mean is approximately while with respect to the range is less than . Looking back to the signal itself in top plot of Fig. 6, one can see that there are few points that, if erased, would cause a significant distortion on its reconstruction.
In order to have a more robust analysis, we also present in Fig. 7 the best and the worst cases in terms of RMSD among households, whose data is available in . For this scenario, our example is closer to the worst case than to the best one. We further show in Fig. 8 the frequency diagram (histogram) of RMSD for the scenario where . As one can see, most households perform better than the example presented Fig. 6 (RMSD W); they are in fact much closer to the best case presented in Fig. 7. All in all, these results reinforces even more our argument that, for the scenario under consideration, the signal reconstruction is weakly affected by relatively frequent outage events.
Throughout the last two sections, we studied a spectrum sharing scenario where a given smart meter-aggregator pair communicates using a licensed cellular uplink channel. For this scenario, we analytically assessed how the system constraints for being a secondary user affect the link throughput and the signal reconstruction. In this section, we start from the presented results to discuss how the proposed spectrum-sharing scheme could be implemented in actual systems.
V-a Relation between licensed and unlicensed users
In our theoretical model, we assume that the secondary, unlicensed, users do not affect the primary users (base-stations). As discussed before, this can indeed be the case when deploying our strategy in a real system. Since the positions of the smart meters, aggregators and base-stations are fixed, the use of highly directional antennas in the smart meter-aggregator link with low transmit power will decrease the interference level at the base-station, which in turn still has capabilities of dealing with such residual interference.
Looking at the interference caused by the mobile users in the aggregator, our analysis assume that the density of these nodes are fixed. This, however, will probably not hold because the primary user activity probably would intensify during periods that match with power demand peaks. Then, in a practical scenario, this traffic variations is somehow predicted and the smart meter may adaptively change its operation point either by setting a pre-determined, predicted, density of interferers to optimize its communication link (simpler solution) or by sensing and estimating such a density from time to time (more complex solution).
Another important point that our model can be useful relates to Denial-of-Service (DoS) attacks in the physical layer . In this scenario, a node or a group of nodes intentionally interfering in the aggregator reception could characterize a DoS. From the analysis presented here, we could infer how frequent outage events need to be to affect the signal reconstruction. A dedicate study would be also possible by modeling the attackers as another Poisson point process.
V-B Outage constraint and link robustness
While the power constraint is required by the secondary link to not interfere in the primary users, the outage constraint is set to guarantee a minimum robustness at the secondary link. Conversely to what one would expect, our results show that allowing for more frequent outage events improves the link throughput due to the contradictory effects of the SIR requirement on the system performance (lower outage constraints lead to higher SIR constraints, which results in higher spectral efficiency, while it decreases the success probability).
The question that arises from this result is how robust against outage events the secondary link should be? One can only reply this answer knowing the information that is sent to the aggregator. Our example shows that, if the information to be sent is the average power demand, the signal reconstruction is possible even with relatively loose outage constraints. While this happens due to the nature of the input signal as discussed in the previous section, higher outage probabilities might be not desirable for other kind of signals or if the aggregator should provide some kind of feedback to the smart meter change the power demand behavior, as in strategies of demand-side management .
V-C Power demand signal processing and transmission
The signal presented in Fig. 6 exemplifies a -minute sampling interval of the power demand of a household. The signal characteristic indicates that time-based sampling might not be the most efficient way of collecting and then send the data to the aggregator. For instance, by using event-based sampling[40, 41], the communication link should be much more robust (i.e. lower values of the outage constraint) since there will be much less redundant data and therefore the loss of any sample will have a more dramatic effect on the signal reconstruction.
Although this is not the focus of the present paper, we would like to mention that there is a trade-off between the sampling strategies and communication. A more efficient way of sampling leads to less points for reconstructing the original signal and vice-versa. If this is the case, the transmission strategies and then the outage constraint should be evaluated in combination with the sampling procedure. In the scenario used here, the time-based sampling generate redundant information about the signal so that outage events do not have drastic effects on the signal reconstruction.
For this new study, however, it is important to have a stochastic characterization of power demand signal as in [42, 43]. By doing so, the signal processing framework would be generalized and adapted to different consumption patterns. This would allow us to study ways to optimize different sampling strategies (time-based, event-based and hybrid) and transmission system designs (coding rate, medium access protocol and retransmissions), while considering the different requirements as reconstruction error and information privacy. Looking at the reconstruction procedure, more advanced strategies like machine learning would probably offer better options to reconstruct the data than linear interpolation, but at expense of higher computational costs . From this perspective, it would be worth evaluating the cost of the sampling-reconstruction and the benefits of link throughput.
In this paper, however, we have chosen to employ a two-dimensional analysis so as to understand the relations between optimal throughput and the reconstruction error itself; our goal is provide the knowledge of what combination of requirements is possible to achieve. For example, an application that requires a very high reliability would imply in a lower throughput. Consequently, a cost-benefit analysis involving those aspects would require more information about the application requirement.
Another different scenario might consider (hybrid) Automatic Repeat Request (ARQ) strategies in order to enhance the communication link, which reduces outage events . This scenario may also include MAC protocols in order to control re-transmissions as well as coordination among nodes. One recent example of a MAC protocol designed in a similar scenario was developed in , where the authors introduced a centralized strategy that resorts to a specialized frame structure that support co-existence between a cognitive and primary networks. Along the same line, the idea to include a routing protocol that protects the primary users while meeting the utility requirements of smart grid network was proposed in . Another scenario of interest deals with security and privacy of the transmitted data, since there is a trade-off between security and reliability as pointed out in , where the authors resort to information theoretical tools in order to guarantee security already at the physical layer. All in all, combining these more advanced communication techniques to decrease the outage events with a more efficient sampling and enhanced security at the physical layer would be an interesting next step for the present work.
This paper assesses a spectrum sharing scenario where smart meters send periodic information to an aggregator over licensed cellular uplink channels. We assume that the secondary link uses directional antennas with limited transmit power so its interference in the primary users can be neglected. Mobile primary users, on the other hand, interfere with the aggregator reception. Modeling the interferers’ spatial distribution as a Poisson point process, we analyzed the secondary link throughput, finding then its optimal value under power and outage constraints.
Our results show that relatively high outage constraints surprisingly improve the link throughput for the cases of interest, even though more samples will be lost. It is worth mentioning the fact that smart meter reading application with scheduled intervals requires nowadays a reliability of at least [15, Table 3]; this is a fairly high value if compared to our results. In fact, the discrepancy between the actual requirement and our results was a surprise. We also show that, due to the burst nature of the power demand signal that is transmitted in the smart meter-aggregator link, outage events do not have a dramatic effect in the signal reconstruction in comparison to the perfect transmission.
We plan to study in future works how outage events will affect the signal reconstruction under different sampling strategies. In this way, we plan to build a joint sampling-transmission technique that can improve the system efficiency, as discussed in Section V-C. We also expect to implement the ideas proposed here in an actual demonstration to verify the validity of our assumptions and proposed optimization strategy.
-  I. F. Akyildizet et al., “Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey,” Computer Netw., vol. 50, no. 13, pp. 2127–2159, 2006.
-  C. Cormio and K. R. Chowdhury, “A survey on MAC protocols for cognitive radio networks,” Ad Hoc Netw., vol. 7, no. 7, pp. 1315 – 1329, 2009.
-  S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201–220, Feb. 2005.
-  J. Peha, “Sharing spectrum through spectrum policy reform and cognitive radio,” Proc. IEEE, vol. 97, no. 4, pp. 708–719, Apr. 2009.
-  Y. Saleem and M. H. Rehmani, “Primary radio user activity models for cognitive radio networks: A survey,” J. Netw. Comput. Appl., vol. 43, pp. 1–16, 2014.
-  B. Wang et al., “Game theory for cognitive radio networks: An overview,” Computer Netw., vol. 54, no. 14, pp. 2537–2561, 2010.
-  A. Ahmad et al., “A survey on radio resource allocation in cognitive radio sensor networks,” Commun. Surveys Tuts., vol. 17, no. 2, pp. 888–917, 2015.
-  C. H. de Lima et al., “Coordination mechanisms for self-organizing femtocells in two-tier coexistence scenarios,” IEEE Trans. Wireless Commun., vol. 11, no. 6, pp. 2212–2223, 2012.
-  L. D. Xu et al., “Internet of things in industries: A survey,” IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2233–2243, Nov. 2014.
-  S. D. T. Kelly et al., “Towards the implementation of IoT for environmental condition monitoring in homes,” IEEE Sensors J., vol. 13, no. 10, pp. 3846–3853, Oct. 2013.
-  A. Bradai et al., “EMCOS: Energy-efficient mechanism for multimedia streaming over cognitive radio sensor networks,” Pervasive Mob. Comput., vol. 22, pp. 16–32, 2015.
-  S. F. Bush, Smart grid: Communication-enabled intelligence for the electric power grid. John Wiley & Sons, 2014.
-  P. H. J. Nardelli et al., “Models for the modern power grid,” EPJ-ST, vol. 223, no. 12, pp. 2423–2437, 2014.
-  Y. Yan et al., “A survey on smart grid communication infrastructures: Motivations, requirements and challenges,” Commun. Surveys Tuts., vol. 15, no. 1, pp. 5–20, 2013.
-  M. Kuzlu et al., “Communication network requirements for major smart grid applications in HAN, NAN and WAN,” Computer Netw., vol. 67, pp. 74–88, 2014.
-  R. C. Qiu et al., “Cognitive radio network for the smart grid: Experimental system architecture, control algorithms, security, and microgrid testbed,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 724–740, Dec. 2011.
-  G. Shah et al., “A cross-layer QoS-aware communication framework in cognitive radio sensor networks for smart grid applications,” IEEE Trans. Ind. Informat., vol. 9, no. 3, pp. 1477–1485, Aug. 2013.
-  A. A. Khan et al., “Cognitive radio for smart grids: Survey of architectures, spectrum sensing mechanisms, and networking protocols,” Commun. Surveys Tuts., 2015, to appear.
-  R. Yu et al., “Cognitive radio based hierarchical communications infrastructure for smart grid,” IEEE Netw., vol. 25, no. 5, pp. 6–14, 2011.
-  V. C. Gungor and D. Şahin, “Cognitive radio networks for smart grid applications: A promising technology to overcome spectrum inefficiency,” IEEE Veh. Technol. Mag, vol. 7, no. 2, pp. 41–46, Jun. 2012.
-  J. J. Nielsen et al., “What can wireless cellular technologies do about the upcoming smart metering traffic?” IEEE Commun. Mag., vol. 53, no. 9, pp. 41–47, Sep. 2015.
-  Y. Zhang et al., “Cognitive machine-to-machine communications: Visions and potentials for the smart grid,” IEEE Netw., vol. 26, no. 3, pp. 6–13, May 2012.
-  J. Wildman et al., “On the joint impact of beamwidth and orientation error on throughput in directional wireless Poisson networks,” IEEE Trans. Wireless Commun, vol. 13, no. 12, pp. 7072–7085, Dec. 2014.
-  J. Andrews, “Interference cancellation for cellular systems: A contemporary overview,” IEEE Wireless Commun., vol. 12, no. 2, pp. 19–29, April 2005.
-  M. Haenggi, Stochastic geometry for wireless networks. Cambridge University Press, 2012.
-  P. H. J. Nardelli et al., “Optimal transmission capacity of ad hoc networks with packet retransmissions,” IEEE Trans. Wireless Commun., vol. 11, no. 8, pp. 2760 –2766, Aug. 2012.
-  ——, “Throughput optimization in wireless networks under stability and packet loss constraints,” IEEE Trans. Mobile Comput., vol. 13, no. 8, pp. 1883–1895, Aug. 2014.
-  P. H. J. Nardelli et al., “Throughput analysis of cognitive wireless networks with Poisson distributed nodes based on location information,” Ad Hoc Netw., 2015.
-  J. Z. Kolter and M. J. Johnson, “REDD: A public data set for energy disaggregation research,” in Workshop on Data Mining Applications in Sustainability (SIGKDD), San Diego, CA, vol. 25. Citeseer, 2011, pp. 59–62.
-  ——. [Online]. Available: http://redd.csail.mit.edu/
-  P. Cardieri, “Modeling interference in wireless ad hoc networks,” Commun. Surveys Tuts., vol. 12, no. 4, pp. 551–572, 2010.
-  S. Weber et al., “An overview of the transmission capacity of wireless networks,” IEEE Trans. Commun., vol. 58, no. 12, pp. 3593–3604, Dec. 2010.
-  F. Baccelli et al., “Interference networks with point-to-point codes,” IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 2582–2596, May 2011.
-  S. Weber et al., “The effect of fading, channel inversion, and threshold scheduling on ad hoc networks,” IEEE Trans. Inf. Theory, vol. 53, no. 11, pp. 4127–4149, Nov. 2007.
-  [Online]. Available: http://docs.scipy.org/doc/scipy-0.14.0/reference/generated/scipy.optimize.fsolve.html
-  A. Goldsmith, Wireless Communications. Cambridge University Press, 2005.
-  M. Pipattanasomporn et al., “Load profiles of selected major household appliances and their demand response opportunities,” IEEE Trans. Smart Grid, vol. 5, no. 2, pp. 742–750, March 2014.
-  E.-K. Lee et al., “Physical layer security in wireless smart grid,” IEEE Commun. Mag., vol. 50, no. 8, pp. 46–52, 2012.
-  G. Strbac, “Demand side management: Benefits and challenges,” Energy policy, vol. 36, no. 12, pp. 4419–4426, 2008.
-  Y. Tsividis, “Event-driven data acquisition and digital signal processing: A tutorial,” IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 57, no. 8, pp. 577–581, 2010.
-  M. Simonov et al., “Gathering process data in low-voltage systems by enhanced event-driven metering,” IEEE Syst. J, vol. PP, no. 99, pp. 1–12, 2015.
-  J. Munkhammar et al., “Characterizing probability density distributions for household electricity load profiles from high-resolution electricity use data,” Appl. Energ., vol. 135, pp. 382–390, 2014.
-  I. Sajjad et al., “Probabilistic generation of time-coupled aggregate residential demand patterns,” IET Gener. Transm. Dis., vol. 9, no. 9, pp. 789–797, 2015.
-  M. Abu Alsheikh et al., “Machine learning in wireless sensor networks: Algorithms, strategies, and applications,” Commun. Surveys Tuts, vol. 16, no. 4, pp. 1996–2018, 2014.
-  A. Aijaz and H. Aghvami, “PRMA based cognitive machine-to-machine communication in smart grid networks,” IEEE Trans. Veh. Technol, vol. PP, no. 99, pp. 1–1, 2014.
-  A. Aijaz et al., “CORPL: A routing protocol for cognitive radio enabled AMI networks,” IEEE Trans. Smart Grid, vol. 6, no. 1, pp. 477–485, Jan 2015.
-  H. Alves et al., “Enhanced Transmit Antenna Selection Scheme for Secure Throughput Maximization Without CSI at the Transmitter and its Applications on Smart Grids,” IEEE Trans. Inf. Forensics and Security, pp. Submitted – Online:, Nov 2015. [Online]. Available: http://arxiv.org/pdf/1511.06518