[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Next Article in Journal
Characteristic Analysis and Structural Design of Hollow-Core Photonic Crystal Fibers with Band Gap Cladding Structures
Next Article in Special Issue
Experimental Analysis of the Application of Serverless Computing to IoT Platforms
Previous Article in Journal
Secure Patient Data Transfer Using Information Embedding and Hyperchaos
Previous Article in Special Issue
Distributed Algorithm for Base Station Assignment in 4G/5G Machine-Type Communication Scenarios with Backhaul Limited Conditions
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

System Performance Analysis for an Energy Harvesting IoT System Using a DF/AF UAV-Enabled Relay with Downlink NOMA under Nakagami-m Fading

1
Applied Network Technology (ANT) Laboratory, Department of Computer Science, Faculty of Science, Khon Kaen University, Khon Kaen 40002, Thailand
2
Faculty of Information Technology, Duy Tan University, Da Nang 550000, Vietnam
3
Institute of Research and Development, Duy Tan University, Da Nang 550000, Vietnam
4
Faculty of Electrical-Electronic Engineering, Duy Tan University, Da Nang 550000, Vietnam
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(1), 285; https://doi.org/10.3390/s21010285
Submission received: 24 November 2020 / Revised: 25 December 2020 / Accepted: 29 December 2020 / Published: 4 January 2021
(This article belongs to the Special Issue Communications and Computing in Sensor Network)
Figure 1
<p>System model for an EH UR downlink NOMA system in the IoT context.</p> ">
Figure 2
<p>The U-TSAPS protocol. The time block <span class="html-italic">T</span> is used for both the information processing and EH phase and the information relaying phase.</p> ">
Figure 3
<p>OPs versus <math display="inline"><semantics> <msub> <mi>γ</mi> <mn>0</mn> </msub> </semantics></math> (dB) DF and AF for BFID and BNID with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mi>K</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math> (bit/s/Hz).</p> ">
Figure 4
<p>OPs for DF versus EH time (<math display="inline"><semantics> <mi>α</mi> </semantics></math>) for BFID and BNID with various <math display="inline"><semantics> <msub> <mi>h</mi> <mi>U</mi> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>d</mi> <mrow> <mi>O</mi> <mi>B</mi> </mrow> </msub> </semantics></math>, and <math display="inline"><semantics> <msub> <mi>d</mi> <mrow> <mi>O</mi> <msub> <mi>I</mi> <mi>i</mi> </msub> </mrow> </msub> </semantics></math> and with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mi>K</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>γ</mi> <mn>0</mn> </msub> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math> (dB), <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math> (bit/s/Hz).</p> ">
Figure 5
<p>OPs for AF versus EH time (<math display="inline"><semantics> <mi>α</mi> </semantics></math>) BFID and BNID with various <math display="inline"><semantics> <msub> <mi>h</mi> <mi>U</mi> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>d</mi> <mrow> <mi>O</mi> <mi>B</mi> </mrow> </msub> </semantics></math>, and <math display="inline"><semantics> <msub> <mi>d</mi> <mrow> <mi>O</mi> <msub> <mi>I</mi> <mi>i</mi> </msub> </mrow> </msub> </semantics></math> and with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mi>K</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>γ</mi> <mn>0</mn> </msub> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math> (dB), <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math> (bit/s/Hz).</p> ">
Figure 6
<p>OPs versus <math display="inline"><semantics> <msub> <mi>γ</mi> <mn>0</mn> </msub> </semantics></math> (dB) DF and AF for BFID and BNID with various numbers of antennas (<span class="html-italic">N</span>) and with <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mi>K</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math> (bit/s/Hz).</p> ">
Figure 7
<p>OPs versus <math display="inline"><semantics> <msub> <mi>γ</mi> <mn>0</mn> </msub> </semantics></math> (dB) DF and AF for BFID and BNID with various numbers of IDs in the far cluster (<span class="html-italic">M</span>) and with <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math> (bit/s/Hz).</p> ">
Figure 8
<p>OPs versus <math display="inline"><semantics> <msub> <mi>γ</mi> <mn>0</mn> </msub> </semantics></math> (dB) DF and AF for BFID and BNID with various numbers of IDs in the near cluster (<span class="html-italic">K</span>) and with <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math> (bit/s/Hz).</p> ">
Figure 9
<p>Throughput <math display="inline"><semantics> <mi>τ</mi> </semantics></math> versus <math display="inline"><semantics> <msub> <mi>γ</mi> <mn>0</mn> </msub> </semantics></math> (dB) DF and AF for BFID and BNID with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mi>K</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> (bit/s/Hz).</p> ">
Figure 10
<p>Throughput <math display="inline"><semantics> <mi>τ</mi> </semantics></math> versus <math display="inline"><semantics> <mi>α</mi> </semantics></math> and <math display="inline"><semantics> <msub> <mi>h</mi> <mi>U</mi> </msub> </semantics></math> (m) DF and AF for BFID and BNID with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mi>K</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>γ</mi> <mn>0</mn> </msub> <mo>=</mo> <mn>30</mn> </mrow> </semantics></math> (dB), <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> (bit/s/Hz).</p> ">
Figure 11
<p>Throughput <math display="inline"><semantics> <mi>τ</mi> </semantics></math> versus <math display="inline"><semantics> <mi>α</mi> </semantics></math> and <math display="inline"><semantics> <msub> <mi>d</mi> <mrow> <mi>B</mi> <mi>O</mi> </mrow> </msub> </semantics></math> (m) DF and AF for BFID and BNID with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mi>K</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>γ</mi> <mn>0</mn> </msub> <mo>=</mo> <mn>30</mn> </mrow> </semantics></math> (dB), <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> (bit/s/Hz).</p> ">
Figure 12
<p>Throughput <math display="inline"><semantics> <mi>τ</mi> </semantics></math> versus <math display="inline"><semantics> <msub> <mi>h</mi> <mi>U</mi> </msub> </semantics></math> (m) and <math display="inline"><semantics> <msub> <mi>d</mi> <mrow> <mi>B</mi> <mi>O</mi> </mrow> </msub> </semantics></math> (m) DF and AF for BFID and BNID with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mi>K</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>γ</mi> <mn>0</mn> </msub> <mo>=</mo> <mn>30</mn> </mrow> </semantics></math> (dB), <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> (bit/s/Hz).</p> ">
Figure 13
<p>Throughput <math display="inline"><semantics> <mi>τ</mi> </semantics></math> versus <math display="inline"><semantics> <msub> <mi>h</mi> <mi>U</mi> </msub> </semantics></math> (m) and <math display="inline"><semantics> <msub> <mi>d</mi> <mrow> <mi>O</mi> <msub> <mi>I</mi> <mi>i</mi> </msub> </mrow> </msub> </semantics></math> (m) DF and AF for BFID and BNID with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mi>K</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>γ</mi> <mn>0</mn> </msub> <mo>=</mo> <mn>30</mn> </mrow> </semantics></math> (dB), <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>R</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> (bit/s/Hz).</p> ">
Versions Notes

Abstract

:
This paper investigates system performance in the Internet of Things (IoT) with an energy harvesting (EH) unmanned aerial vehicle (UAV)-enabled relay under Nakagami-m fading, where the time switching (TS) and adaptive power splitting (APS) protocols are applied for the UAV. Our proposed system model consists of a base station (BS), two IoT device (ID) clusters (i.e., a far cluster and a near cluster), and a multiantenna UAV-enabled relay (UR). We adopt a UR-aided TS and APS (U-TSAPS) protocol, in which the UR can dynamically optimize the respective power splitting ratio (PSR) according to the channel conditions. To improve the throughput, the nonorthogonal multiple access (NOMA) technique is applied in the transmission of both hops (i.e., from the BS to the UR and from the UR to the ID clusters). The U-TSAPS protocol is divided into two phases. In the first phase, the BS transmits a signal to the UR. The UR then splits the received signal into two streams for information processing and EH using the APS scheme. In the second phase, the selected antenna of the UR forwards the received signal to the best far ID (BFID) in the far cluster and the best near ID (BNID) in the near cluster using the decode-and-forward (DF) or amplify-and-forward (AF) NOMA scheme. We derive closed-form expressions for the outage probabilities (OPs) at the BFID and BNID with the APS ratio under imperfect channel state information (ICSI) to evaluate the system performance. Based on these derivations, the throughputs of the considered system are also evaluated. Moreover, we propose an algorithm for determining the nearly optimal EH time for the system to minimize the OP. In addition, Monte Carlo simulation results are presented to confirm the accuracy of our analysis based on simulations of the system performance under various system parameters, such as the EH time, the height and position of the UR, the number of UR antennas, and the number of IDs in each cluster.

1. Introduction

In recent years, the Internet of Things (IoT) paradigm has undergone incredible growth and received extensive attention [1,2,3,4,5]. The IoT requires a large number of sensors deployed throughout a huge space, including in remote areas and areas that are inaccessible to humans [6,7]. Under such circumstances, collecting sensor data becomes a challenging task. Consequently, unmanned aerial vehicles (UAVs) have emerged as a practical solution to such problems [8,9,10].
UAVs offer advantageous performance because of their maneuverability, which allows the position of a UAV to be automatically adjusted to best suit the current communication needs [11]. For example, in [12], the authors considered a UAV-enabled relay (UR) network with a UAV acting as a decode-and-forward (DF) relay to extend the coverage of the BS. Song et al. studied the use of a UAV as an aerial amplify-and-forward (AF) relay to receive information being transmitted from the BS to an IoT device (ID) and considered how to maximize the energy efficiency of a UAV-supported IoT system [13].
A UAV is a highly mobile device, but one of its drawbacks is the requirement for a strong power source to be able to sustain its flight time and communication processes [14]. Recently, radio frequency (RF) EH has emerged as a promising solution for prolonging the lifetime of low-power devices due to its constant energy production capabilities [15,16]. Some studies have explored UR-assisted communication with RF EH. For example, Hua et al. analyzed an AF UR network in which the UR harvests energy using a power splitting (PS) protocol and derives multiple parameters through joint optimization to maximize the system throughput [17]. The outage probability (OP) of a DF UR with PS and time switching (TS) protocols was analyzed in [18] under the assumption of a perfect UR-to-destination channel, with the BS-to-UR channel modeled as a Nakagami-m fading channel with interference at the destination. However, an equal time switching ratio (TSR) for data transfer was assumed, and the PSR was not optimized.
To further enhance the system capacity and provide an enhanced experience for the IDs, especially for IDs at a cell edge, nonorthogonal multiple access (NOMA) has recently been proposed as a promising solution for 5G wireless networks [19,20,21]. Furthermore, the NOMA technique can also be used for performance enhancement in UAV-enabled wireless networks [22,23]. For example, in [24], a power allocation scheme was proposed to maximize the sum rate in NOMA. The results showed that the proposed scheme achieved a better sum rate than the classical system. However, UAVs communicate with ground users through air links, and the channel state information (CSI) is not perfectly perceived in practice due to estimation errors and finite data feedback [25], as discussed in regard to the resource allocation problem for cellular networks operating under the NOMA scheme with imperfect channel state information (ICSI). Therefore, in [26], the authors maximized the energy efficiency in a UAV-enabled NOMA downlink network while considering ICSI between the UAV and the IDs.
In addition, for an RF EH UR operating based on a PS protocol, the received signal is divided into two parts throughout the whole receiving time. One part is fed to the EH circuitry, while the other part is fed to the information processing circuitry. Currently, PS protocols can be divided into two categories: fixed power splitting (FPS) protocols and adaptive power splitting (APS) protocols. In an FPS protocol, the PSR is constant across all receiving times. However, the system performance depends on parameters such as the PSR. Therefore, to achieve optimal performance, this parameter needs to be adaptive.
Motivated by the above discussion, we study the performance of a UR IoT communication network using NOMA with ICSI under Nakagami-m fading channels. Note that, the Nakagami-m distribution is a general case that encompasses three distributions as special cases. Thus, the analysis for Nakagami-m fading is equally applicable in any of the corresponding fading environments ( m < 1 for Hoyt, m = 1 for Rayleigh, and m > 1 for Rician) [27]. To save the electric power of the UAV’s battery and enhance its flight endurance, we apply the RF EH technique for the UAV, where the energy harvested from the BS is used for the transmit power of the UR [28]. Specifically, we adopt the UR-aided TS and APS (U-TSAPS) protocol, in which the UR can adjust the APS ratio in accordance with the channel conditions. Moreover, the DF/AF schemes are adopted at the UR. The main contributions of this paper are summarized as follows:
  • We investigate a UR-assisted IoT communication network using RF EH and downlink NOMA with ICSI under Nakagami-m fading channels.
  • We derive an APS ratio that maximizes the channel capacity of the system. The channel capacity maximization is achieved by maximizing the signal-to-interference-plus-noise ratio (SINR) of the system.
  • We also derive closed-form expressions for the system OPs for the DF and AF schemes, considering the APS ratio. In addition, the system throughputs are obtained for both the DF and AF schemes.
  • We propose an algorithm for finding the nearly optimal EH time for the system.
The remainder of this paper is organized as follows. In Section 2, related work on UR-assisted IoT communication networks using RF EH and NOMA is presented. In Section 3, the system model, the communication protocol, and the APS protocol for DF and AF are introduced. In Section 4, the OPs for the DF and AF schemes is analyzed. In Section 5, numerical results are presented and discussed. Finally, conclusions and future work are presented in Section 6.

2. Related Work

In this section, we briefly summarize the related work concerning UR-assisted communication networks.
The UAV-enabled relay (UR) concept, in which UAVs are deployed to assist in communication between terrestrial nodes, has been investigated in the literature under various relaying schemes, including the DF and AF schemes [29,30,31]. In [29], it was shown that the communication throughput achievable with a DF UR can be significantly improved compared with that achievable using a conventional DF relay by allowing the UR to transmit when it is flying closer to the destination and receive when it is flying closer to the source. In contrast to DF relaying, the work presented in [30] studied the use of an AF UR to minimize the communication OP and maximize the communication throughput. Furthermore, Chen et al. analyzed the outage performance of DF and AF URs under Nakagami-m fading channels. However, the above studies on URs were performed without considering EH, mostly focusing on analyzing the OP and throughput of the system.
Later, RF EH technology was introduced to alleviate the energy consumption problem for UAV equipment [32,33,34]. For example, Yang et al. studied the performance of UR networks in urban environments. The OP of an AF UR with a TS protocol was analyzed by considering Rician fading for the channel from the BS to the UR and shadowed Rayleigh fading for the channel from the UR to the destination [32]. In addition, Yin et al. studied the throughput maximization problem with a focus on UAV-assisted wireless communication, considering a communication system with one pair of a BS and an ID, in which a UAV serves as an aerial relay based on an AF scheme and harvests energy using a PS protocol [33]. However, the studies above on RF EH URs focused only on analyzing the OP and throughput of a system with an equal TSR for data transfer and a constant PSR across all receiving times. In contrast, Kim et al. considered a DF UR network in which the UR performs EH and information decoding simultaneously with a PS protocol, and they adapted the PS ratio to minimize the OP for transferring data from the source to the destination. To evaluate the performance of this system, the OP with the proposed APS ratio was analyzed under a generalized UR channel model with Nakagami-m fading [34]. However, this work focused on a simplified system (i.e., a source, a UR and a destination).
On the other hand, UAV-enabled communication and NOMA can be combined in a hybrid network to achieve both superior spectral efficiency and ubiquitous coverage [35,36]. Wang et al. considered a DF UR system based on downlink NOMA, in which the UR forwards information from the BS to multiple access points. They presented a joint design for the power allocation for NOMA at the UR to minimize the maximum OP among all links [35]. In addition, Zaidi et al. proposed a network in which ground users and a UR use NOMA, with the DF UR playing the role of extending the coverage of the source. The performance of the proposed model was evaluated based on the OPs with different levels of transmit power and fading environments. Moreover, the authors compared the system throughput of the proposed system with that of an orthogonal multiple access (OMA)-based network and showed that their proposed network was superior in performance [36]. However, EH at the UR to further enhance the system performance was not considered in the studies discussed above.
Note that the above works assumed perfect CSI to be feasible at the receiver; however, perfect CSI is difficult to obtain because of channel estimation errors [26]. Thus, considering ICSI in wireless communication systems is essential to investigate systems that are representative of real-world applications. In [37], the performance of a DF UR-assisted NOMA network over Rician fading channels was studied. The authors derived approximate closed-form expressions for the OPs for a far user and a near user under ICSI conditions. Additionally, system throughput is evaluated and discussed. However, although the impact of ICSI on the system performance was analyzed, EH at the UR to enhance the system performance was not investigated.
Based on the above review, URs that apply the RF EH and NOMA techniques simultaneously have not been studied extensively in recent works. Thus, in this paper, we focus on APS for an RF EH IoT system using DF/AF UR downlink NOMA with ICSI under Nakagami-m fading.

3. System and Channel Model

3.1. System Model

In this paper, we consider the downlink NOMA UR assisted IoT system depicted in Figure 1, where the system model consists of a BS B, two clusters (i.e., a far cluster with M IDs and a near cluster with K IDs), and single energy-limited UR U that uses the DF or AF scheme to send the information it collects to the IDs. All nodes are operated in half-duplex mode. We assume that the BS and IDs are single-antenna devices and that the UR is equipped with N antennas. It is noted that the UR equipped with multiple antennas can provide improved connectivity performance and extend the range of communication [38]. However, the use of multiple antennas also increases the impact of interference on the UR. Therefore, to reduce the effect of interference on the UR, the BS is deployed with a single antenna by adopting the approach presented in [39,40,41]. There are no direct links between B and the IDs due to the presence of obstacles. For clarity, we define the notations adopted throughout the remainder of this paper in Table 1.
We assume that the channel coefficients g X Y are independent and identically distributed (i.i.d) and modeled as Nakagami-m fading channels [42,43] with fading parameters m X Y , E { g X Y 2 } = Ω X Y , and g X Y 2 is a random variable (RV) [19], where X Y B U n , U n I i . In practice, it is not feasible to obtain perfect CSI for a wireless network due to channel estimation errors. Therefore, the channel coefficients can be modeled as [21,44]
g X Y = g ^ X Y + e X Y ,
where g ^ X Y represents the estimated channel coefficient and e X Y C N 0 , E X Y denotes the channel estimation error, which can be approximated as a Gaussian RV [20]. In addition, Ω ^ X Y = Ω X Y E X Y can be obtained by assuming that Ω ^ X Y is statistically independent of e X Y . Let μ X Y = E X Y / Ω X Y denote the relative channel estimation error; we have E X Y = μ X Y d X Y σ and Ω ^ X Y = 1 μ X Y d X Y σ [45]. Accordingly, the cumulative distribution function (CDF) and probability density function (PDF) of the channel gain g ^ X Y 2 are given as follows [46]:
F g ^ X Y 2 y = 1 e y m X Y Ω ^ X Y s = 0 m X Y 1 1 s ! y m X Y Ω ^ X Y s ,
f g ^ X Y 2 y = y m X Y 1 m X Y 1 ! m X Y Ω ^ X Y m X Y e y m X Y Ω ^ X Y .

3.2. Communication Protocol

In the considered system, we apply a U-TSAPS communication protocol that is divided into two phases, as illustrated in Figure 2. This communication protocol is described as follows:
  • In the first phase, B transmits information x B = a k x k + a m x m to U n in accordance with the NOMA principle within a length of time α T , where x m and x k are the signals to be received by I m and I k and a m and a k are power allocation coefficients that satisfy the conditions a m + a k = 1 and a m > a k [20]. As described in [47], at U n , the received power is divided into two streams, with ρ P B for information processing and ( 1 ρ ) P B for EH (the APS ratio in Section III.C). Thus, the signal received at U n is written as follows:
    z U n = ρ P B a k x k + a m x m g B U n + n U n ,
    where g B U n = g ^ B U n + e B U n , P B is the transmit power of B, and n U n C N 0 , N 0 is additive white Gaussian noise (AWGN) [21,48].
    Thus, the energy harvested at U n can be expressed as follows [49,50,51]:
    E U n = η α 1 ρ P B g ^ B U n 2 + E B U n T ,
    where η is the EH efficiency coefficient, which depends on the rectification ( 0 < η < 1 ) . Here, we assume that the EH efficiency coefficient is the same for all antennas of the UR.
    The antenna U n of the UR first decodes the message for I m (i.e., x m ) by treating the message for I k (i.e., x k ) as noise (because the power allocation coefficient for I m is higher than that for I k ). U n then cancels out the message x m using successive interference cancellation (SIC) to obtain the message x k . Here, we assume that U n can decode x k successfully by adopting the method proposed in [52,53,54]. Therefore, the received signal-to-interference-plus-noise ratios (SINRs) at U n for detecting x m and x k are expressed as follows:
    γ B U n x m = ρ P B a m g ^ B U n 2 ρ P B a k g ^ B U n 2 + ρ P B E B U n + N 0 ,
    γ B U n x k = ρ P B a k g ^ B U n 2 ρ P B E B U n + N 0 ,
  • In the second phase, the transmit power at the n-th antenna during the remaining time 1 α T is expressed as
    P U n = E U n 1 α T = υ 1 ρ P B g ^ B U n 2 + E B U n ,
    where υ = η α 1 α .
    Furthermore, UAV U n utilizes either DF or AF scheme to perform relaying transmission.
    (1)
    DF scheme
    For the DF scheme, UR first decodes the received superimposed messages from B and then re-encodes and forwards them to the IDs. Then, the received signal at I i is given by
    z I i D F = P U n a k x k + a m x m g U n I i + n I i ,
    where g U n I i = g ^ U n I i + e U n I i and n I i C N 0 , N 0 is the AWGN at I i . Thus, the SINRs for detecting x m and x k transmitted from U n at I m and I k are expressed as
    γ U n I m D F = P U n a m g ^ U n I m 2 P U n a k g ^ U n I m 2 + P U n E U n I m + N 0 ,
    γ U n I k D F = P U n a k g ^ U n I k 2 ρ γ B E U n I k + N 0 .
    (2)
    AF scheme
    For the AF scheme, U n transmits z U n to all IDs after multiplying it by an amplifying factor G n . To satisfy the output power constraint at U n , it is required that E G n z U n 2 = P U n , where P U n is given in (8). Here, the amplification factor is approximated by assuming a high signal-to-noise ratio (SNR) from B to U n [55,56]. Thus, G n is given by
    G n = υ 1 ρ P B g ^ B U n 2 + E B U n ρ P B g ^ B U n 2 + E B U n + N 0 υ 1 ρ ρ .
    Therefore, the signal received at I i is given by
    z I i A F = G n ρ P B a k x k + a m x m g B U n g U n I i + G n g U n I i n B U n + n I i .
    Thus, the SINRs for detecting x m and x k transmitted from U n at I m and I k are expressed as
    γ e 2 e , m A F = ρ a m γ B g ^ B U n 2 g ^ U n I m 2 ρ γ B a k g ^ B U n 2 g ^ U n I m 2 + g ^ U n I m 2 E B U n + g ^ B U n 2 E U n I m + E B U n E U n I m + g ^ U n I m 2 + E U n I m + ρ / υ 1 ρ ,
    γ e 2 e , k A F = ρ a k γ B g ^ B U n 2 g ^ U n I k 2 ρ γ B g ^ U n I k 2 E B U n + g ^ B U n 2 E U n I k + E B U n E U n I k + g ^ U n I k 2 + E U n I k + ρ / υ 1 ρ ,
    where γ B = P B N 0 .

3.3. APS Ratio

In this subsection, we present the APS ratios ρ for the DF and AF schemes.
  • DF scheme
    The PS protocol is applied in the EH process to improve the reliability of transmission. That is, as much energy is harvested from the signals as possible under the condition that the signals received at U can be decoded successfully.
    Let the target SINRs for I m and I k be denoted by γ m and γ k , respectively. Therefore, at U n , the received SINRs for decoding the signals must satisfy γ B U n x m γ m and γ B U n x k γ k . To harvest as much energy as possible, we let γ B U n x m = γ m and γ B U n x k = γ k , that is [57],
    ρ γ B a m g ^ B U n 2 ρ γ B a k g ^ B U n 2 + ρ γ B E B U n + 1 = γ m , ρ γ B a k g ^ B U n 2 ρ γ B E B U n + 1 = γ k ,
    where γ m = 2 R m 1 α 1 and γ k = 2 R k 1 α 1 . Here, R m and R k denote the target data rates for IDs in the two clusters. After some algebraic manipulations, (16) can be rewritten as follows:
    1 a k γ m a k a k = γ m γ k .
    From (17), it is easy to find that the power allocation coefficient a k is given by
    a k = γ k ϖ ,
    where ϖ = 2 R m + R k 1 α 1 . By substituting (18) into (16), the APS ratio ρ * D F can be expressed as
    ρ * D F = ϖ γ B g ^ B U n 2 ϖ E B U n .
    Note that 0 ρ * D F 1 . When ρ * D F = 1 , this means that all of the energy of the received signals must be used to decode information, and the relay cannot harvest any energy. Thus, ρ * D F can be further expressed as
    ρ * D F = min 1 , ϖ γ B g ^ B U n 2 ϖ E B U n .
Remark 1.
The UR uses the DF scheme to decode the signals from the BS. The UR has to first ensure the detection of the messages from the BS; then, it can carry out EH. Therefore, the choice of the PSR in (19) is optimal [57,58,59]. Particularly, if the PSR is set as ρ > ρ * D F , too much power is directed to the EH circuit. and there is not sufficient signal power for decoding, which leads to a decoding failure. If the PSR is set as ρ < ρ * D F , too much signal power is directed to the detection circuit: the circuit needs only ρ * D F P B to guarantee correct decoding. Therefore, a choice of ρ < ρ * D F leads to an inefficient use of the incoming signals. Thus, the optimal choice of the PSR is ρ = ρ * D F .
  • Based on (8) and (20), the maximal transmission power at U can be obtained as follows:
    P U n = υ γ B g ^ B U n 2 + E B U n υ ϖ g ^ B U n 2 + E B U n g ^ B U n 2 ϖ E B U n .
  • Thus, based on (10), (11), and (21), the end-to-end SINRs at I k and I m can be derived
    γ e 2 e , m D F = g ^ B U n 2 Δ a m g ^ U n I m 2 g ^ B U n 2 Δ a k g ^ U n I m 2 + g ^ B U n 2 Δ E U n I m + g ^ B U n 2 ϖ E B U n / υ γ B g ^ B U n 2 + E B U n ,
    γ e 2 e , k D F = g ^ B U n 2 Δ a k g ^ U n I k 2 g ^ B U n 2 Δ E U n I k + g ^ B U n 2 ϖ E B U n / υ γ B g ^ B U n 2 + E B U n ,
    where Δ = 1 + γ B E B U n ϖ γ B .
  • AF scheme
    The goal of this subsection is to identify the APS ratio ρ * , i A F that maximizes the SINRs:
    ρ * , i A F = arg max 0 ρ 1 γ e 2 e , i A F ,
    where γ e 2 e , i A F { γ e 2 e , k A F , γ e 2 e , m A F } . To find the value of ρ that maximizes γ e 2 e , i A F , we differentiate γ e 2 e , i A F with respect to ρ and set it equal to zero. After some simplifications, we have the following possible roots for ρ * , i A F :
    ρ * , i A F = υ g ^ U n I i 2 + E U n I i 1 + υ g ^ U n I i 2 + E U n I i ,
    or
    ρ * , i A F = υ g ^ U n I i 2 + E U n I i 1 υ g ^ U n I i 2 + E U n I i .
    Accordingly, we choose ρ * , i A F = υ g ^ U n I i 2 + E U n I i 1 + υ g ^ U n I i 2 + E U n I i as the root because ρ * , i A F = υ g ^ U n I i 2 + E U n I i 1 υ g ^ U n I i 2 + E U n I i < 0 .
Remark 2.
The end-to-end SINR γ e 2 e , i A F is a concave function in terms of the PSR ρ. Clearly, the second-order derivative 2 γ e 2 e , i A F ρ 2 is negative for 0 ρ 1 [58,60,61]. Therefore, we conclude that γ e 2 e , i A F is a concave function of ρ for 0 ρ 1 .
  • For this AF scheme, we analyze two cases of APS ratio selection to improve the system performance.
    (1)
    Case I: In this case, the PSR dynamically varies towards achieving the maximum end-to-end SINR for the signal x m . Therefore, the APS ratio of the system is
    ρ * A F , C 1 = ρ * , m A F = υ g ^ U n I m 2 + E U n I m 1 + υ g ^ U n I m 2 + E U n I m .
    After substituting this root into (14) and (15), we can rewrite the end-to-end SINRs at I m and I k as expressed
    γ e 2 e , m A F , C 1 = υ a m γ B g ^ B U n 2 g ^ U n I m 2 υ γ B a k g ^ B U n 2 g ^ U n I m 2 + g ^ U n I m 2 E B U n + g ^ B U n 2 E U n I m + E B U n E U n I m + B C 1 2 ,
    γ e 2 e , k A F , C 1 = υ γ B a k A C 1 g ^ B U n 2 g ^ U n I k 2 υ γ B A C 1 g ^ U n I k 2 E B U n + g ^ B U n 2 E U n I k + E B U n E U n I k + υ B C 1 g ^ U n I k 2 + E U n I k + C C 1 ,
    where A C 1 , B C 1 , and C C 1 are defined as follows:
    A C 1 = υ g ^ U n I m 2 + E U n I m ,
    B C 1 = 1 + A C 1 ,
    C C 1 = A C 1 B C 1 .
    (2)
    Case II: In this case, the APS ratio varies towards achieving the maximum end-to-end SINR for the signal x k . Therefore, the APS ratio of the system is
    ρ * A F , C 2 = ρ * , k A F = υ g ^ U n I k 2 + E U n I k 1 + υ g ^ U n I k 2 + E U n I k .
    After substituting this root into (14) and (15), we can rewrite the end-to-end SINRs at I m and I k as expressed
    γ e 2 e , m A F , C 2 = υ γ B a m A C 2 g ^ B U n 2 g ^ U n I m 2 υ γ B A C 2 a k g ^ B U n 2 g ^ U n I m 2 + g ^ U n I m 2 E B U n + g ^ B U n 2 E U n I m + E B U n E U n I m + υ B C 2 g ^ U n I m 2 + E U n I m + C C 2 ,
    γ e 2 e , k A F , C 2 = υ a k γ B g ^ B U n 2 g ^ U n I k 2 υ γ B g ^ U n I k 2 E B U n + g ^ B U n 2 E U n I k + E B U n E U n I k + B C 2 2 ,
    where A C 2 , B C 2 , and C C 2 are defined as follows:
    A C 2 = υ g ^ U n I k 2 + E U n I k ,
    B C 2 = 1 + A C 2 ,
    C C 2 = A C 2 B C 2 .

3.4. Selection of the Antenna and ID

In this subsection, we demonstrate in detail how to select the best antenna and best ID for both clusters to enhance the quality of communication. The antenna that provides the highest channel gain between itself and the BS in the first phase B U n is determined as the best one and is selected as follows [56]:
U S = arg max n = 1 , , N g ^ B U n 2 .
In the second phase U n I i , the proposed user selection process is conducted through the signaling and channel state information estimation system. Specifically, a near user and a far user that have the best respective channel conditions will be selected in each transmission slot. Therefore, the BNID I N and the BFID I F can be given as [62]
I N = arg max k = 1 , , K g ^ U n I k 2 ,
I F = arg max m = 1 , , M g ^ U n I m 2 .
Note that to save power for the UAV, we use antenna selection to forward information to the IDs instead of using multiple antennas. This means that all antennas maintain established connections at all times. The signals are then combined and presented to the receiver. Depending on the sophistication of the system, the signals can be added directly (equal gain combining) or weighted and added coherently (maximal-ratio combining). Such a system provides the greatest resistance to fading; however, since all of the receive paths must remain energized, it also consumes the most power [63,64].
In this paper, we constrain the fading parameter m between links to integer values. Accordingly, the PDF and CDF of g ^ X Y 2 are obtained as follows [46,56]:
f g ^ X Y 2 y = O y m X Y 1 m X Y 1 ! m X Y Ω ^ X Y m X Y e y m X Y Ω ^ X Y 1 e y m X Y Ω ^ X Y t = 0 m X Y 1 1 t ! y m X Y Ω ^ X Y t O 1 ,
F g ^ X Y 2 y = ı = 0 O ı 1 ı Φ ı 1 Φ ı 2 y ı ¯ e ı y m X Y Ω ^ X Y ,
where X Y B U S , U S I N , U S I F , O N , K , M , and ı , Φ ı 1 , Φ ı 2 , and ı ¯ are defined as follows:
ı = ı 1 = 0 ı ı 2 = 0 ı ı 1 ı m X Y 1 = 0 ı ı 1 ı m X Y 2 ,
Φ ı 1 = O ı ı ı 1 ı ı 1 ı 2 ı ı 1 ı m X Y 2 ı m X Y 1 ,
Φ ı 2 = s = 0 m X Y 2 1 s ! m X Y Ω ^ X Y s ı s + 1 1 m X Y 1 ! m X Y Ω ^ X Y m X Y 1 ı ı 1 ı m X Y 1 ,
ı ¯ = m X Y 1 ı ı 1 m X Y 2 ı 2 m X Y 3 ı 3 ı m X Y 1 .

4. Performance Analysis

In this section, we derive closed-form expressions for the OPs in the investigated EH IoT system using a DF/AF UR with NOMA under Nakagami-m fading, considering ICSI and the APS ratio. A performance analysis is presented in terms of the OPs for the BFID and BNID; a DF UR is considered in the first subsection, and an AF UR is considered in the second subsection. Finally, we discuss the throughput for each ID in the third subsection.
Following [65,66], the system OP is the probability that the instantaneous SINR falls below a target rate. We let R I N = R I F = R , where R I N and R I F (bit/s/Hz) are the target rates for the BNID and BFID, respectively. Thus, the OP P o u t , I Ξ can be calculated as
P o u t , I Ξ = Pr 1 α log 2 1 + γ e 2 e , I Ξ < R = 1 Pr γ e 2 e , I Ξ > θ ,
where Pr . is the probability function, Ξ D F , A F , I I N , I F , and θ = 2 R / 1 α 1 .

4.1. OP Analysis of the DF Scheme

  • OP at the BFID
Lemma 1.
The closed-form expression for OP at the BFID is given by
P o u t , I F D F = F g ^ B U S 2 Δ + π ψ 2 Q j = 0 N 1 h = 0 M q = 1 Q Θ j , h ξ 1 ϑ m B U S + j ¯ 1 λ F ln ω q h ¯ e ϑ j + 1 m B U S Ω ^ B U S ω q λ F h m U S I F Ω ^ U S I F ,
where ζ q = cos π 2 q 1 2 Q , ω q = ζ q + 1 2 , Q is the complexity vs. accuracy trade-off coefficient of the Gauss-Chebyshev quadrature method [67]; and ϑ , ψ , λ F , Θ ( j , h ) , and ξ 1 are defined as follows:
ϑ = 1 ln ω q + Δ ,
ψ = N m B U S 1 ! m B U S Ω ^ B U S m B U S ,
λ F = θ E U S I F ln ω q + ϑ ϖ E B U S υ γ B ϑ + E B U S a m θ a k ,
Θ ( j , h ) = j h 1 j + h Φ j 1 Φ j 2 Φ h 1 Φ h 2 ,
ξ 1 = 1 ζ q 2 ω q ln 2 ω q .
Proof. 
See Appendix A.    □
  • OP at the BNID
Lemma 2.
The closed-form expression for the OP at the BNID is given by
P o u t , I N D F = F g ^ B U S 2 Δ + π ψ 2 Q j = 0 N 1 g = 0 K q = 1 Q Θ j , g ξ 1 ϑ m B U S + j ¯ 1 λ N ln ω q g ¯ e ϑ j + 1 m B U S Ω ^ B U S ω q λ N g m U S I N Ω ^ U S I N ,
where λ N and Θ ( j , g ) are defined as follows:
λ N = θ E U S I N ln ω q + λ ϖ E B U S υ γ B λ + E B U S a k ,
Θ ( j , g ) = j g 1 j + g Φ j 1 Φ j 2 Φ g 1 Φ g 2 .
Proof. 
See Appendix B.    □

4.2. OP Analysis of the AF Scheme

In this subsection, we analyze the OPs at the BNID and BFID in the two cases APS of the AF scheme presented in Section 3.3.
  • For case I:
    (1)
    OP at the BFID
Lemma 3.
The closed-form expression for the OP at the BFID is given by
P o u t , I F A F , C 1 = F g ^ U S I F 2 Δ F + π ψ F 2 Q h = 0 M 1 j = 0 N q = 1 Q Θ h , j ξ 1 φ F m U S I F + h ¯ 1 ϕ F ln ω q j ¯ e h + 1 φ F m U S I F Ω ^ U S I F ω q j m B U S ϕ 1 , F Ω ^ B U S ,
where Δ F , φ F , ϕ 1 , F , ψ F , and Θ h , j are defined as follows:
Δ F = θ E U S I F a m θ a k ,
φ F = 1 ln ω q + Δ F ,
ϕ 1 , F = Δ F υ γ B E B U S φ F + E U S I F + B φ F C 1 2 υ γ B E U S I F ,
ψ F = M m U S I F 1 ! m U S I F Ω ^ U S I F m U S I F ,
Θ h , j = h j 1 j + h Φ h 1 Φ h 2 Φ j 1 Φ j 2 .
Proof. 
See Appendix C.    □
  • (2)
    OP at the BNID
Lemma 4.
The closed-form expression for the OP at the BFID is given by
P o u t , I N A F , C 1 = 1 + π 2 ψ 1 4 Q W h = 0 M 1 g = 0 K 1 j = 1 N q = 1 Q w = 1 W Θ h , g , j ξ 2 ln 1 ω w m U S I F + h ¯ 1 × φ N m U S I N + g ¯ 1 ln ω q ϕ 1 , N j ¯ e g + 1 φ N m U S I N Ω ^ U S I N ω w h + 1 m U S I F ln 2 ω w Ω ^ U S I F ω q j m B U S ϕ 1 , N Ω ^ B U S ,
where ζ w = cos π 2 w 1 2 W , ω w = ζ w + 1 2 , W is the complexity vs. accuracy trade-off coefficient of the Gauss-Chebyshev quadrature method; and Δ N , φ N , φ 1 , N , ϕ 1 , N , ψ 1 , Θ h , g , j , and ξ 2 are defined as follows:
Δ N = θ E U S I N a k ,
φ N = 1 ln ω q + Δ N ,
φ 1 , N = υ γ B A 1 ln ω w C 1 E B U S + B 1 ln ω w C 1 ,
ϕ 1 , N = Δ N φ 1 , N φ N + E U S I N + C 1 ln ω w C 1 γ B υ A 1 ln ω w C 1 E U S I N ,
ψ 1 = π 2 ψ 1 , F K 4 Q W m U S I N 1 ! m U S I N Ω ^ U S I N m U S I N ,
Θ h , g , j = h g j 1 h + j + g Φ h 1 Φ h 2 Φ g 1 Φ g 2 Φ j 1 Φ j 2 ,
ξ 2 = 1 ζ q 2 1 ζ w 2 ω q ln 2 ω q ω w ln 2 ω w .
Proof. 
See Appendix D.    □
  • For case II:
    (1)
    OP at the BFID
Lemma 5.
The OP at the BFID is given by
P o u t , I F A F , C 2 = 1 + π 2 ψ 1 4 Q W h = 0 M 1 g = 0 K 1 j = 1 N q = 1 Q w = 1 W Θ h , g , j ξ 2 ln 1 ω w m U S I N + g ¯ 1 × φ F m U S I F + h ¯ 1 ϕ 2 , F ln ω q j ¯ e h + 1 φ F m U S I F Ω ^ U S I F ω w g + 1 m U S I N ln 2 ω w Ω ^ U S I N ω q j m B U S ϕ 2 , F Ω ^ B U S ,
where φ 2 , F and ϕ 2 , F are defined as follows:
φ 2 , F = υ γ B A 1 ln ω w C 1 E B U S + B 1 ln ω w C 1 ,
ϕ 2 , F = Δ N φ 2 , F φ N + E U S I N + C 1 ln ω w C 1 γ B υ A 1 ln ω w C 1 E U S I N .
Proof. 
See Appendix E.    □
  • (2)
    OP at the BNID
Lemma 6.
The OP at the BNID in case II can be written as
P o u t , I N A F , C 2 = F g ^ U S I N 2 Δ N + π ψ N 2 Q g = 0 K 1 j = 0 N q = 1 Q Θ g , j ξ 1 φ N m U S I N + g ¯ 1 ϕ 2 , N ln ω q j ¯ e g + 1 φ N m U S I N Ω ^ U S I N ω q j m B U S ϕ 2 , N Ω ^ B U S ,
where ϕ 2 , N , ψ N , and Θ g , j are defined as follows:
ϕ 2 , N = Δ N υ γ B E B U S φ N + E U S I N + B φ N C 1 2 υ γ B E U S I N ,
ψ N = K m U S I F 1 ! m U S I N Ω ^ U S I N m U S I N ,
Θ g , j = g j 1 j + g Φ g 1 Φ g 2 Φ j 1 Φ j 2 .
Proof. 
See Appendix F.    □

4.3. Throughput Analysis

In this subsection, the throughput for each ID in the delay-limited mode is investigated. Suppose that the source transmits signals to the IDs at a fixed rate; thus, the throughput is mainly determined by the OP [20,48]. The throughput for each ID is given by
τ I = 1 α 1 P o u t , I Ξ R .
The OPs in (49), (55), (58), (64), (72), and (75) are functions of the EH time α [68]. When the value of α is smaller, there is less time for EH and more time for information transmission. Thus, less energy is harvested, and the throughput achieved at the IDs is greater. In contrast, when the value of α is greater, there is more time for EH but less time for information transmission. It is desirable to find the value of α such that the considered system achieves the best performance. However, it is quite challenging to calculate this optimal value of α based on the closed-form expressions obtained above. Therefore, we propose Algorithm 1 to find the nearly optimal EH time for the proposed system [69].
The possible values of α are specified in an array 0 1 with L elements. We set initial parameters of Δ α = 0.001 , α * = 0 and P o u t , I Ξ * = 1 . Next, we update α * = 0 and P o u t , I Ξ * through l iterations. The iterative process stops when P o u t , I Ξ * > P o u t , I Ξ ( Δ α ) , and the optimal value of α is found using the formula α * = Δ α (where Δ α is the value when the iterative process stops).
Algorithm 1 Algorithm for determining the nearly optimal EH time for the system
Input: α 0 , , 1
Output: α * ( α * is the optimal point)
1:
functionLoop( α [ ] )
2:
     α * ← 0;
3:
     Δ α 0.001 ;
4:
     P o u t , I Ξ * ← 1;
5:
    L l e n g t h ( α ) ;
6:
    for l 0 to L 1 do
7:
        if P o u t , I i Ξ * > P o u t , I Ξ ( Δ α ) then
8:
            α * Δ α ;
9:
            P o u t , I Ξ * P o u t , I Ξ ( Δ α ) ;
10:
            Δ α Δ α + l ;
11:
        else
12:
            b r e a k ;
13:
        end if
14:
    end for
15:
    return α * ;
16:
end function

5. Numerical Results

In this section, we present simulation results to validate the OP and throughput analyses of the DF/AF UR-assisted IoT communication network using NOMA with ICSI under Nakagami-m fading channels. In particular, we investigate the impacts of the average transmit SNR, the EH time, the number of UR antennas and the number of IDs in each cluster on the OPs and throughput of the BFID and BNID.
Specifically, we consider the following system parameters in all simulations: transmit SNR, γ 0 (dB); distance from B to U, d B U n = h U h B 2 + d B O 2 ; distance from U to far ID, d U I m = h U 2 + d O I m 2 ; and distance from U to near ID, d U I k = h U 2 + d O I k 2 . The following system parameters are used for both analysis and simulation [18,32,54]: h B = 1 (m), d B O [ 10 , 20 ] (m), d O I i [ 10 , 25 ] (m), h U [ 10 , 20 ] (m), m B U n = m U n I i = 2 , μ B U n = μ U n I i = 0.001 , R [ 0.01 , 0.5 ] (bit/s/Hz), α [ 0.1 , 0.9 ] , η [ 0.1 , 0.9 ] , γ 0 [ 0 , 30 ] (dB), M = K [ 5 , 15 ] , and N [ 1 , 3 ] .
Figure 3 shows the impact of the transmit SNR γ 0 (dB) on the OPs. The simulated curves match the analytical curves very closely, illustrating the exactness of the derived expressions. As shown in this figure, the OPs for the BFID and BNID with the DF scheme are lower than those with the AF scheme in all cases. This means that the DF scheme offers better performance than the AF scheme. This finding can be explained as follows. For the DF scheme, the UR needs to confirm that the signals transmitted by the BS have been correctly received (i.e., the received signals must be successfully decoded by the UR) before performing relaying transmission. By contrast, in the AF scheme, the UR merely amplifies the received signals and forwards the information to the IDs. Thus, the reliability for the IDs cannot be improved in the case that the UR cannot decode the received signals successfully. In addition, we compare our investigated system with the corresponding system with a fixed PSR. The results show that our system is superior.
Figure 4 and Figure 5 present the effects of the EH time coefficient α on the OPs in different cases of the height of U (a), the distance from B to O (b), and the distance from U to the best ID (c), respectively. The value of the EH time coefficient ranges from 0.1 to 0.9, while γ 0 remains at 20 dB. At first glance, it can be seen there is always an optimal value of α for which the value of the OP is minimized. Moreover, the optimal value of α depends on the height of the UR, the distance from B to O, and the distance from O to the ID; specifically, the smaller the h U , d B O and d O I i values are, the lower the OP. This is because when the UR is farther from the BS or the ID is farther from the UR, the channel conditions become poorer due to the higher path loss, causing the ID to have difficulty detecting the signal. Another important observation is that the nearly optimal value of α that minimizes the OP is approximately 0.7140 for the AF scheme and 0.7940 for the DF scheme when determined with our proposed algorithm.
Figure 6 illustrates the effects of γ 0 (dB) on the OPs for different numbers of antennas (N). The results show that the OP of the system improves as the number of antennas increases. Increasing the number of antennas will provide more opportunities for selecting links from B to U, not only improving the achievable decoding performance but also increasing the amount of energy harvested. Overall, the DF scheme enables better OPs for the system than the AF scheme does.
Figure 7 and Figure 8 present the impact of γ 0 (dB) on the OPs for different numbers of IDs in the far cluster and the near cluster, respectively. For both clusters, increasing the number of IDs leads to a decrease in the OP. This is because the best ID is chosen based on the channel conditions, and increasing the number of IDs provides a greater variety of possibilities for the best ID.
Figure 9 shows the impact of γ 0 (dB) on the system throughput. Similar to the OP results, the throughput with the DF scheme is better than that with the AF scheme. Furthermore, in contrast to the OP results, the throughput improves as γ 0 increases within a certain range but then stabilizes when γ 0 is sufficiently large. This is because an ID can obtain the signal more easily when the power of the BS is higher.
Figure 10 and Figure 11 show the effects of the EH time and the height of the UR or the distance d B O on the throughput for both the DF and AF schemes. The results show that the throughput of the DF scheme is slightly better than that of the AF scheme because the noise at UR is eliminated in the DF scheme, while it is accumulated and amplified in AF scheme. Similar to Figure 4 and Figure 5, we can see that there is always an optimal α value that can maximize the system throughput. In addition, the system throughput improves as the UR height and distance decrease, whereas the throughput decreases with increasing height and distance d O I i .
Figure 12 and Figure 13 show the effects of the height of the UR and the distance d B O or the distance d O I i on the throughput for both the DF and AF schemes. The results show that the throughput decreases gradually as the UR height and distance increase since the path loss will also increase with an increase in the distance or height, leading to a decrease in the information received at the ID.

6. Conclusions

This paper investigated the performance of an RF EH IoT system with a DF/AF UR using downlink NOMA, where the system model consists of a BS, two ID clusters, and a multiantenna UR. A UAV-aided U-TSAPS protocol was adopted to implement EH and information transmission. The system performance of the proposed IoT system under conditions of ICSI and Nakagami-m fading was analyzed. Closed-form expressions for the OPs at the BFID and BNID with respect to the APS ratio were derived for performance evaluation, and the throughput for each ID was also evaluated. Accordingly, we proposed an algorithm for finding the optimal EH time that minimizes the OP. The results show that the DF scheme offers better performance than the AF scheme. Moreover, our investigated system with an adaptive PSR outperforms the corresponding fixed-PSR system. In addition, the system performance improves with an increasing number of antennas on the UR and an increasing number of IDs. In future work, we will consider issues related to sensitive and nonlinear EH models [70,71], joint maximum likelihood (ML) decoding [72,73] and imperfect SIC [74,75] for NOMA in IoT systems, including consideration of multihop URs to improve the OP and throughput performance for IoT applications.

Author Contributions

The main contributions of A.-N.N. and V.N.V. were to create the main ideas and execute performance evaluation by extensive simulation while C.S.-I. and D.-B.H. worked as the advisors to discuss, create, and advise the main ideas and performance evaluations together. All authors have read and agreed to the submitted version of the manuscript.

Funding

This work was supported by Thailand Science Research and Innovation (TSRI) and the National Research Council of Thailand (NRCT) via the International Research Network Program (IRN61W0006) and by Khon Kaen University.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proof of Lemma 1

Following [57], the OP at the BFID can be written as
P o u t , I F D F = 1 Pr P U S > 0 , γ e 2 e , I F D F > θ .
By substituting (21) and (22) into (A1), we can rewrite the OP at the BFID as
P o u t , I F D F = 1 Pr g ^ B U S 2 > Δ , g ^ U S I F 2 > λ ¯ F g ^ B U S 2 ,
where λ ¯ F g ^ B U S 2 = θ g ^ B U S 2 Δ E U S I F + g ^ B U S 2 ϖ E B U S υ γ B g ^ B U S 2 + E B U S a m θ a k g ^ B U S 2 Δ .
Based on (A2), the OP at the BFID can be rewritten as
P o u t , I F D F = 1 Δ f g ^ B U S 2 y 1 F g ^ U S I F 2 λ ¯ F y d y = 0 Δ f g ^ B U S 2 y d y + Δ f g ^ B U S 2 y F g ^ U S I F 2 λ ¯ F y d y .
By combining the PDF in (42) and the CDF in (43) into (A3), we can rewrite the OP at the BFID as
P o u t , I F D F = F g ^ B U S 2 Δ + ψ j = 0 N 1 h = 0 M Θ ( j , h ) Δ y m B U S + j ¯ 1 λ ¯ F y h ¯ e j + 1 y m B U S Ω ^ B U S λ ¯ F y h m U S I F Ω ^ U S I F d y Ψ I F D F .
Let z = y Δ ; then, Ψ I F D F can be written as
Ψ I F D F = 0 z + Δ m B U S + j ¯ 1 λ ¯ F z + Δ h ¯ e j + 1 z + Δ m B U S Ω ^ B U S λ ¯ F z + Δ h m U S I F Ω ^ U S I F d z .
Let t = e 1 z and Ψ I F D F in (A5) can be rewritten as
Ψ I F D F = 0 1 ln 1 t + Δ m B U S + j ¯ 1 t ln 2 t λ ¯ F ln 1 t h ¯ e j + 1 ln 1 t + Δ m B U S Ω ^ B U S t ln 1 t λ ¯ F ln 1 t h m U S I F Ω ^ U S I F d t .
Next, the Gauss-Chebyshev quadrature method [67] is applied to solve the integral in (A6), Ψ I F D F can be expressed as
Ψ I F D F = π 2 Q q = 1 Q ξ 1 ϑ m B U S + j ¯ 1 λ F ln ω q h ¯ e ϑ j + 1 m B U S Ω ^ B U S ω q λ F h m U S I F Ω ^ U S I F ,
where ζ q = cos π 2 q 1 2 Q , ω q = ζ q + 1 2 , and Q is the complexity vs. accuracy trade-off coefficient of the Gauss-Chebyshev quadrature method. By substituting (A7) into (A4), the proof of Lemma 1 is completed.

Appendix B. Proof of Lemma 2

Similar to (A1), the OP at the BNID is defined as follows:
P o u t , I N D F = 1 Pr P U S > 0 , γ e 2 e , I N D F > θ I N D F .
By substituting (21) and (23) into (A8), we can rewrite the OP at the BNID as
P o u t , I D F = 1 Pr g ^ B U S 2 > Δ , g ^ U S I N 2 > λ ¯ N g ^ B U S 2 ,
where λ ¯ N g ^ B U S 2 = θ g ^ B U S 2 Δ E U S I N + g ^ B U S 2 ϖ E B U S υ γ B g ^ B U S 2 + E B U S a k g ^ B U S 2 Δ .
By again using the PDF and CDF in (42) and (43), we can rewrite the OP at the BNID as
P o u t , I N D F = F g ^ B U S 2 Δ + ψ j = 0 N 1 g = 0 K Θ j , g Δ y m B U S + j ¯ 1 λ ¯ N y g ¯ e j + 1 y m B U S Ω ^ B U S λ ¯ N y g m U S I N Ω ^ U S I N d y Ψ I N D F .
From (A10), the analysis of Ψ I N D F follows steps similar to those in Appendix A. Finally, the closed-form expression for the OP at the BNID is given in Lemma 2.

Appendix C. Proof of Lemma 3

From (48), the OP at the BFID can be written as
P o u t , I F A F , C 1 = 1 Pr γ e 2 e , I F A F , C 1 > θ .
By substituting (28) into (A11), we can rewrite the OP at the BFID as
P o u t , I F A F , C 1 = 1 Pr g ^ U S I F 2 > Δ F , g ^ B U S 2 > ϕ ¯ 1 , F g ^ U S I F 2 ,
where ϕ ¯ 1 , F g ^ U S I F 2 = Δ F υ γ B E B U S g ^ U S I F 2 + E U S I F + B g ^ U S I F 2 C 1 2 υ γ B E U S I F g ^ U S I F 2 Δ F .
Equation (A12) is obtained on the condition that a m > θ a k [55]. Using the conditional probability property with respect to y, P o u t , I F A F , C 1 for the BFID can be rewritten as
P o u t , I F A F , C 1 = 0 Δ F f g ^ U S I F 2 y d y + Δ F f g ^ U S I F 2 y F g ^ B U S 2 ϕ ¯ 1 , F y d y ,
By plugging the PDF in (42) and the CDF in (43) into (A13), we can rewrite the OP at the BFID as
P o u t , I F A F , C 1 = F g ^ U S I F 2 Δ F + ψ F h = 0 M 1 j = 1 N Θ h , j Δ F y m U S I F + h ¯ 1 ϕ ¯ 1 , F y j ¯ e h + 1 y m U S I F Ω ^ U S I F ϕ ¯ 1 , F y j m B U S Ω ^ B U S d y Ψ I F A F , C 1 .
From (A14), the analysis of Ψ I F A F , C 1 follows steps similar to those in Appendix A. The proof of Lemma 3 is completed.

Appendix D. Proof of Lemma 4

Similar to (A11), the OP at the BNID can be written as
P o u t , I N A F , C 1 = 1 Pr γ e 2 e , I N A F , C 1 > θ .
By substituting the end-to-end SINR at the BNID given in (29) into (A15) and letting g ^ U S I F 2 = x and g ^ U S I N 2 = y , P o u t , I N A F , C 1 can rewrite as
P o u t , I N A F , C 1 = 1 0 Pr y > Δ N , g ^ B U S 2 > ϕ ¯ 1 , N x , y f g ^ U S I F 2 x d x ,
where ϕ ¯ 1 , N x , y = Δ N υ γ B A x C 1 E B U n + B x C 1 y + E U S I N + C x C 1 γ B υ A x C 1 E U S I N y Δ N .
Using the conditional probability property with respect to y, the OP at the BFID can be rewritten as
P o u t , I N A F , C 1 = 1 0 Δ N 1 F g ^ B U S 2 ϕ ¯ 1 , N x , y f g ^ U S I N 2 y d y Ψ 1 , I N A F , C 1 f g ^ U S I F 2 x d x Ψ 2 , I N A F , C 1 .
By substituting (42) and (43) into (A17). After some manipulation similar to Appendix A, Ψ 1 , I N A F , C 1 can be rewritten as
Ψ 1 , I N A F , C 1 = π ψ N 2 Q g = 0 K 1 j = 1 N q = 1 Q Θ g , j ξ 1 φ N m U S I N + g ¯ 1 ϕ ¯ 1 , N x , ln 1 ω q j ¯ × ω q ln 1 ω q ϕ ¯ 1 , N x , ln 1 ω q j m B U S Ω ^ B U S e φ N g + 1 m U S I N Ω ^ U S I N .
Next, we substitute Ψ 1 , I N A F , C 1 in (A18) and the PDF in (42) into Ψ 2 , I N A F , C 1 in (A17); finally, let u = e 1 x . By again applying the Gauss-Chebyshev quadrature method to solve the integral, Ψ 2 , I N A F , C 1 can be rewritten as
Ψ 2 , I N A F , C 1 = π ψ 1 2 Q h = 0 M 1 g = 0 K 1 j = 1 N q = 1 Q Θ h , g , j ξ 1 φ N m U S I N + g ¯ 1 e φ N g + 1 m U S I N Ω ^ U S I N × 0 x m U S I F + h ¯ 1 ϕ ¯ 1 , N x j ¯ e x h + 1 m U S I F Ω ^ U S I F ω q ln 1 ω q ϕ ¯ 1 , N x j m B U S Ω ^ B U S d x = π 2 ψ 1 4 Q W h = 0 M 1 g = 1 K j = 0 N 1 q = 1 Q w = 1 W Θ h , g , j ξ 2 ln 1 ω w m U S I F + h ¯ 1 φ N m U S I N + g ¯ 1 × ϕ 1 , N ln ω q j ¯ e φ N g + 1 m U S I N Ω ^ U S I N ω w h + 1 m U S I F ln 2 ω w Ω ^ U S I F ω q ϕ 1 , N j m B U S Ω ^ B U S .
By substituting (A19) into (A17), the proof is completed.

Appendix E. Proof of Lemma 5

Similar to (A11), the OP at the BFID can be expressed as
P o u t , I F A F , C 2 = 1 Pr γ e 2 e , I F A F , C 2 > θ .
By substituting (34) into (A20) and letting g ^ U S I N 2 = x and g ^ U S I F 2 = y , similar to (A17), P o u t , I F A F , C 2 can be rewritten as
P o u t , I F A F , C 2 = 1 0 Pr y > Δ F , g ^ B U S 2 > ϕ ¯ 2 , F x , y f g ^ U S I N 2 x d x = 1 0 Δ F 1 F g ^ B U S 2 ϕ ¯ 2 , F x , y f g ^ U S I F 2 y d y Ψ 1 , I F A F , C 2 f g ^ U S I N 2 x d x Ψ 2 , I F A F , C 2 ,
where ϕ ¯ 2 , F x , y = Δ F υ γ B A x C 2 E B U S + B x C 2 y + E U S I F + C x C 2 υ γ B A x C 2 y Δ F .
From (A21), Ψ 1 , I F A F , C 2 and Ψ 2 , I F A F , C 2 are derived by using the steps shown in Appendix D.

Appendix F. Proof of Lemma 6

Similar to (A15), the OP at the BNID in case II is defined as follows:
P o u t , I N A F , C 2 = 1 Pr γ e 2 e , I N A F , C 2 > θ .
By substituting (35) into (A22), P o u t , I N A F , C 2 can be rewritten as
P o u t , I N A F , C 2 = 1 Pr g ^ U S I N 2 > Δ N , g ^ B U S 2 > ϕ ¯ 2 , N g ^ U S I N 2 ,
where ϕ ¯ 2 , N g ^ U S I N 2 = Δ N υ γ B E B U S g ^ U S I N 2 + E U S I N + B g ^ U S I N 2 C 2 2 υ γ B E U S I N g ^ U S I N 2 Δ N .
Using the conditional probability property with respect to y and after some manipulations, we obtain the expression for the OP given by
P o u t , I N A F , C 2 = 0 Δ N f g ^ U S I N 2 y d y + Δ N f g ^ U S I N 2 y F g ^ B U S 2 ϕ ¯ 2 , N y d y = F g ^ U S I N 2 Δ N + ψ N g = 0 K 1 j = 1 N Θ g , j Δ N y m U S I F + g ¯ 1 ϕ ¯ 2 , N y j ¯ e g + 1 y m U S I F Ω ^ U S I F ϕ ¯ 2 , N y g m B U S Ω ^ B U S d y Ψ I N A F , C 2 .
From (A24), Ψ I N A F , C 2 is derived by using the steps shown in Appendix C.

References

  1. Al-Turjman, F.; Radwan, A. Data Delivery in Wireless Multimedia Sensor Networks: Challenging and Defying in the IoT Era. IEEE Wirel. Commun. 2017, 24, 126–131. [Google Scholar] [CrossRef]
  2. Kaur, N.; Sood, S.K. An Energy-Efficient Architecture for the Internet of Things (IoT). IEEE Syst. J. 2017, 11, 796–805. [Google Scholar] [CrossRef]
  3. Xu, L.D.; He, W.; Li, S. Internet of Things in Industries: A Survey. IEEE Trans. Ind. Inf. 2014, 10, 2233–2243. [Google Scholar] [CrossRef]
  4. Vo, V.N.; Tran, D.; So-In, C.; Tran, H. Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things with Untrusted Relays. IEEE Access 2018, 6, 48247–48258. [Google Scholar]
  5. Vo, V.N.; So-In, C.; Tran, H.; Tran, D.; Heng, S.; Aimtongkham, P.; Nguyen, A. On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA. IEEE Access 2019, 7, 149341–149354. [Google Scholar] [CrossRef]
  6. Boursianis, A.D.; Papadopoulou, M.S.; Diamantoulakis, P.; Liopa-Tsakalidi, A.; Barouchas, P.; Salahas, G.; Karagiannidis, G.; Wan, S.; Goudos, S.K. Internet of Things (IoT) and Agricultural Unmanned Aerial Vehicles (UAVs) in smart farming: A comprehensive review. Internet Things 2020, 100187–100203. [Google Scholar] [CrossRef]
  7. Marcu, A.; Suciu, G.; Olteanu, E.; Miu, D.; Drosu, A.; Marcu, I. IoT System for Forest Monitoring. In Proceedings of the 2019 42nd International Conference on Telecommunications and Signal Processing (TSP), Budapest, Hungary, 1–3 July 2019; pp. 629–632. [Google Scholar]
  8. Zeng, Y.; Zhang, R.; Lim, T.J. Wireless communications with unmanned aerial vehicles: Opportunities and challenges. IEEE Commun. Mag. 2016, 54, 36–42. [Google Scholar] [CrossRef] [Green Version]
  9. Hayat, S.; Yanmaz, E.; Muzaffar, R. Survey on Unmanned Aerial Vehicle Networks for Civil Applications: A Communications Viewpoint. IEEE Commun. Surv. Tuts. 2016, 18, 2624–2661. [Google Scholar] [CrossRef]
  10. Cheng, F.; Gui, G.; Zhao, N.; Chen, Y.; Tang, J.; Sari, H. UAV-Relaying-Assisted Secure Transmission with Caching. IEEE Trans. Commun. 2019, 67, 3140–3153. [Google Scholar] [CrossRef] [Green Version]
  11. Fotouhi, A.; Qiang, H.; Ding, M.; Hassan, M.; Giordano, L.G.; Garcia-Rodriguez, A.; Yuan, J. Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges. IEEE Commun. Surv. Tuts. 2019, 21, 3417–3442. [Google Scholar] [CrossRef] [Green Version]
  12. Zeng, S.; Zhang, H.; Bian, K.; Song, L. UAV Relaying: Power Allocation and Trajectory Optimization Using Decode-and-Forward Protocol. In Proceedings of the 2018 IEEE International Conference on Communications Workshops (ICC Workshops), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
  13. Song, K.; Zhang, J.; Ji, Z.; Jiang, J.; Li, C. Energy-Efficiency for IoT System with Cache-Enabled Fixed-Wing UAV Relay. IEEE Access 2020, 8, 117503–117512. [Google Scholar] [CrossRef]
  14. Gupta, L.; Jain, R.; Vaszkun, G. Survey of Important Issues in UAV Communication Networks. IEEE Commun. Surveys Tuts. 2016, 18, 1123–1152. [Google Scholar] [CrossRef] [Green Version]
  15. Lu, X.; Wang, P.; Niyato, D.; Kim, D.I.; Han, Z. Wireless Networks with RF Energy Harvesting: A Contemporary Survey. IEEE Commun. Surv. Tuts. 2015, 17, 757–789. [Google Scholar] [CrossRef] [Green Version]
  16. Ponnimbaduge Perera, T.D.; Jayakody, D.N.K.; Sharma, S.K.; Chatzinotas, S.; Li, J. Simultaneous Wireless Information and Power Transfer (SWIPT): Recent Advances and Future Challenges. IEEE Commun. Surv. Tuts. 2018, 20, 264–302. [Google Scholar] [CrossRef] [Green Version]
  17. Hua, M.; Li, C.; Huang, Y.; Yang, L. Throughput maximization for UAV-enabled wireless power transfer in relaying system. In Proceedings of the 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 11–13 October 2017; pp. 1–5. [Google Scholar]
  18. Ji, B.; Li, Y.; Zhou, B.; Li, C.; Song, K.; Wen, H. Performance Analysis of UAV Relay Assisted IoT Communication Network Enhanced with Energy Harvesting. IEEE Access 2019, 7, 38738–38747. [Google Scholar] [CrossRef]
  19. Tran, D.; Ha, D.; Vo, V.N.; So-In, C.; Tran, H.; Nguyen, T.G.; Baig, Z.A.; Sanguanpong, S. Performance Analysis of DF/AF Cooperative MISO Wireless Sensor Networks with NOMA and SWIPT Over Nakagami-m Fading. IEEE Access 2018, 6, 56142–56161. [Google Scholar] [CrossRef]
  20. Vo, V.N.; Nguyen, T.G.; So-In, C.; Tran, H. Outage Performance Analysis of Energy Harvesting Wireless Sensor Networks for NOMA Transmissions. Mob. Netw. Appl. 2020, 225, 23–41. [Google Scholar] [CrossRef]
  21. Vo, V.N.; So-In, C.; Tran, D.; Tran, H. Optimal System Performance in Multihop Energy Harvesting WSNs Using Cooperative NOMA and Friendly Jammers. IEEE Access 2019, 7, 125494–125510. [Google Scholar] [CrossRef]
  22. Liu, Y.; Qin, Z.; Cai, Y.; Gao, Y.; Li, G.Y.; Nallanathan, A. UAV Communications Based on Non-Orthogonal Multiple Access. IEEE Wirel. Commun. 2019, 26, 52–57. [Google Scholar] [CrossRef] [Green Version]
  23. Hou, T.; Liu, Y.; Song, Z.; Sun, X.; Chen, Y. Exploiting NOMA for UAV Communications in Large-Scale Cellular Networks. IEEE Trans. Commun. 2019, 67, 6897–6911. [Google Scholar] [CrossRef] [Green Version]
  24. Sohail, M.F.; Leow, C.Y.; Won, S. Non-Orthogonal Multiple Access for Unmanned Aerial Vehicle Assisted Communication. IEEE Access 2018, 6, 22716–22727. [Google Scholar] [CrossRef]
  25. Fang, F.; Zhang, H.; Cheng, J.; Roy, S.; Leung, V.C.M. Joint User Scheduling and Power Allocation Optimization for Energy-Efficient NOMA Systems with Imperfect CSI. IEEE J. Sel. Areas Commun. 2017, 35, 2874–2885. [Google Scholar] [CrossRef]
  26. Zhang, H.; Zhang, J.; Long, K.; Nallanathan, A.; Leung, V.C.M. Resource Allocation for Energy Efficient NOMA UAV Network under Imperfect CSI. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC) 2020, Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar]
  27. Abuelenin, S. On the similarity between Nakagami-m Fading distribution and the Gaussian ensembles of random matrix theory. arXiv 2018, arXiv:1803.08688. [Google Scholar]
  28. Chang, T.; Yu, H. Improving Electric Powered UAV’s Endurance by Incorporating Battery Dumping Concept. Procedia Eng. 2015, 99, 168–179. [Google Scholar] [CrossRef] [Green Version]
  29. Zeng, Y.; Zhang, R.; Lim, T.J. Throughput Maximization for UAV-Enabled Mobile Relaying Systems. IEEE Trans. Commun. 2016, 64, 4983–4996. [Google Scholar] [CrossRef]
  30. Zhang, S.; Zhang, H.; He, Q.; Bian, K.; Song, L. Joint Trajectory and Power Optimization for UAV Relay Networks. IEEE Commun. Lett. 2018, 22, 161–164. [Google Scholar] [CrossRef]
  31. Chen, Y.; Feng, W.; Zheng, G. Optimum Placement of UAV as Relays. IEEE Commun. Lett. 2018, 22, 248–251. [Google Scholar] [CrossRef] [Green Version]
  32. Yang, L.; Chen, J.; Hasna, M.O.; Yang, H. Outage Performance of UAV-Assisted Relaying Systems with RF Energy Harvesting. IEEE Commun. Lett. 2018, 22, 2471–2474. [Google Scholar] [CrossRef]
  33. Yin, S.; Zhao, Y.; Li, L. UAV-assisted Cooperative Communications with Power-splitting SWIPT. In Proceedings of the 2018 IEEE International Conference on Communication Systems (ICCS), Chengdu, China, 19–21 December 2018; pp. 162–167. [Google Scholar]
  34. Kim, Y.H.; Chowdhury, I.A.; Song, I. Design and Analysis of UAV-Assisted Relaying with Simultaneous Wireless Information and Power Transfer. IEEE Access 2020, 8, 27874–27886. [Google Scholar] [CrossRef]
  35. Wang, L.; Hu, B.; Chen, S.; Cui, J. UAV-Enabled Reliable Mobile Relaying Based on Downlink NOMA. IEEE Access 2020, 8, 25237–25248. [Google Scholar] [CrossRef]
  36. Zaidi, S.K.; Hasan, S.F.; Gui, X.; Siddique, N.; Ahmad, S. Exploiting UAV as NOMA based Relay for Coverage Extension. In Proceedings of the 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 1–3 May 2019; pp. 1–5. [Google Scholar]
  37. Li, X.; Wang, Q.; Peng, H.; Zhang, H.; Do, D.; Rabie, K.M.; Kharel, R.; Cavalcante, C.C. A Unified Framework for HS-UAV NOMA Networks: Performance Analysis and Location Optimization. IEEE Access 2020, 8, 13329–13340. [Google Scholar] [CrossRef]
  38. Sharawi, M.S.; Aloi, D.N.; Rawashdeh, O.A. Design and Implementation of Embedded Printed Antenna Arrays in Small UAV Wing Structures. IEEE Trans. Antennas Propag. 2010, 58, 2531–2538. [Google Scholar] [CrossRef]
  39. Izydorczyk, T.; Bucur, M.; Tavares, F.M.L.; Berardinelli, G.; Mogensen, P. Experimental Evaluation of Multi-Antenna Receivers for UAV Communication in Live LTE Networks. In Proceedings of the 2018 IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, UAE, 9–13 December 2018. [Google Scholar]
  40. Song, Q.; Zheng, F. Energy efficient multi-antenna UAV-enabled mobile relay. China Commun. 2018, 15, 41–50. [Google Scholar] [CrossRef]
  41. Zhan, P.; Yu, K.; Swindlehurst, A.L. Wireless Relay Communications with Unmanned Aerial Vehicles: Performance and Optimization. IEEE Trans. Aerosp. Electron. Syst. 2011, 47, 2068–2085. [Google Scholar] [CrossRef]
  42. Khuwaja, A.A.; Chen, Y.; Zheng, G. Effect of User Mobility and Channel Fading on the Outage Performance of UAV Communications. IEEE Wirel. Commun. Lett. 2020, 9, 367–370. [Google Scholar] [CrossRef]
  43. Do, D.T.; Nguyen, T.T.T.; Le, C.B.; Voznak, M.; Kaleem, Z.; Rabie, K.M. UAV Relaying Enabled NOMA Network with Hybrid Duplexing and Multiple Antennas. IEEE Access 2020, 8, 186993–187007. [Google Scholar] [CrossRef]
  44. Guo, S.; Zhou, X. Robust Resource Allocation with Imperfect Channel Estimation in NOMA-Based Heterogeneous Vehicular Networks. IEEE Trans. Commun. 2019, 67, 2321–2332. [Google Scholar] [CrossRef]
  45. Gong, X.; Yue, X.; Liu, F. Performance Analysis of Cooperative NOMA Networks with Imperfect CSI over Nakagami-m Fading Channels. Sensors 2020, 20, 424. [Google Scholar] [CrossRef] [Green Version]
  46. Men, J.; Ge, J.; Zhang, C. Performance Analysis for Downlink Relaying Aided Non-Orthogonal Multiple Access Networks with Imperfect CSI Over Nakagami-m Fading. IEEE Access 2017, 5, 998–1004. [Google Scholar] [CrossRef]
  47. Singh, V.; Ochiai, H. An Efficient Time Switching Protocol with Adaptive Power Splitting for Wireless Energy Harvesting Relay Networks. In Proceedings of the 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), Sydney, Australia, 4–7 June 2017. [Google Scholar]
  48. Nguyen, A.; Nhan Vo, V.; So-In, C.; Ha, D.; Sanguanpong, S.; Baig, Z.A. On Secure Wireless Sensor Networks with Cooperative Energy Harvesting Relaying. IEEE Access 2019, 7, 139212–139225. [Google Scholar] [CrossRef]
  49. Kwan, J.C.; Fapojuwo, A.O. Radio Frequency Energy Harvesting and Data Rate Optimization in Wireless Information and Power Transfer Sensor Networks. IEEE Sens. J. 2017, 17, 4862–4874. [Google Scholar] [CrossRef]
  50. Vo, V.N.; Tran, H.; Dao, V.L.; So-In, C.; Tran, D.D.; Uhlemann, E. On Communication Performance in Energy Harvesting WSNs Under a Cooperative Jamming Attack. IEEE Syst. J. 2020, 14, 4955–4966. [Google Scholar] [CrossRef]
  51. Saito, Y.; Kishiyama, Y.; Benjebbour, A.; Nakamura, T.; Li, A.; Higuchi, K. Non-Orthogonal Multiple Access (NOMA) for Cellular Future Radio Access. In Proceedings of the 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2–5 June 2013; pp. 1–5. [Google Scholar]
  52. Jiang, X.; Wu, Z.; Yin, Z.; Yang, Z.; Zhao, N. Power Consumption Minimization of UAV Relay in NOMA Networks. IEEE Wirel. Commun. Lett. 2020, 9, 666–670. [Google Scholar] [CrossRef]
  53. Sohail, M.F.; Leow, C.Y.; Won, S. Energy-Efficient Non-Orthogonal Multiple Access for UAV Communication System. IEEE Trans. Veh. Technol. 2019, 68, 10834–10845. [Google Scholar] [CrossRef]
  54. Deng, D.; Zhou, Q. Outdated relay selection for UAV-enabled networks with cooperative NOMA. Phys. Commun. 2019, 32, 112–119. [Google Scholar] [CrossRef]
  55. Hoang, T.M.; Van, N.L.; Nguyen, B.C.; Dung, L.T. On the Performance of Energy Harvesting Non-Orthogonal Multiple Access Relaying System with Imperfect Channel State Information over Rayleigh Fading Channels. Sensors 2019, 19, 3327. [Google Scholar] [CrossRef] [Green Version]
  56. Han, W.; Ge, J.; Men, J. Performance analysis for NOMA energy harvesting relaying networks with transmit antenna selection and maximal-ratio combining over Nakagami-m fading. IET Commun. 2016, 10, 2687–2693. [Google Scholar] [CrossRef]
  57. Yang, Z.; Ding, Z.; Fan, P.; Al-Dhahir, N. The Impact of Power Allocation on Cooperative Non-orthogonal Multiple Access Networks with SWIPT. IEEE Trans. Wirel. Commun. 2017, 16, 4332–4343. [Google Scholar] [CrossRef] [Green Version]
  58. Ashraf, M.; Jang, J.; Han, J.; Lee, K.G. Capacity Maximizing Adaptive Power Splitting Protocol for Cooperative Energy Harvesting Communication Systems. IEEE Commun. Lett. 2018, 22, 902–905. [Google Scholar] [CrossRef]
  59. Ding, Z.; Perlaza, S.M.; Esnaola, I.; Poor, H.V. Power Allocation Strategies in Energy Harvesting Wireless Cooperative Networks. IEEE Trans. Wirel. Commun. 2014, 13, 846–860. [Google Scholar] [CrossRef] [Green Version]
  60. Zhou, Z.; Peng, M.; Zhao, Z.; Li, Y. Joint Power Splitting and Antenna Selection in Energy Harvesting Relay Channels. IEEE Signal Process. Lett. 2015, 22, 823–827. [Google Scholar] [CrossRef] [Green Version]
  61. Nguyen, T.N.; Tran, M.; Nguyen, T.L.; Ha, D.H.; Voznak, M. Performance Analysis of a User Selection Protocol in Cooperative Networks with Power Splitting Protocol-Based Energy Harvesting Over Nakagami-m/Rayleigh Channels. Electronics 2019, 8, 448. [Google Scholar] [CrossRef] [Green Version]
  62. Do, N.T.; Da Costa, D.B.; Duong, T.Q.; An, B. A BNBF User Selection Scheme for NOMA-Based Cooperative Relaying Systems with SWIPT. IEEE Commun. Lett. 2017, 21, 664–667. [Google Scholar] [CrossRef] [Green Version]
  63. Sanayei, S.; Nosratinia, A. Antenna selection in MIMO systems. IEEE Commun. Mag. 2004, 42, 68–73. [Google Scholar] [CrossRef]
  64. Bai, Q.; Nossek, J.A. Energy efficiency maximization for 5G multi-antenna receivers. Trans. Emerg. Telecommun. Technol. 2015, 26, 3–14. [Google Scholar] [CrossRef]
  65. Nguyen, B.C.; Hoang, T.M.; Tran, P.T.; Nguyen, T.N. Outage probability of NOMA system with wireless power transfer at source and full-duplex relay. AEU Int. J. Electron. Commun. 2020, 116, 152957–152965. [Google Scholar] [CrossRef]
  66. Ha, D.B.; Nguyen, S.Q. Outage Performance of Energy Harvesting DF Relaying NOMA Networks. Mob. Netw. Appl. 2017, 23, 1572–1585. [Google Scholar] [CrossRef]
  67. Judd, K.L. Quadrature Methods Presented at University of Chicago’s Initiative for Computational Economics. 2012. Available online: https://ice.uchicago.edu/2012_presentations/Faculty/Judd/ICE12Intro.pdf (accessed on 4 January 2021).
  68. Nasir, A.A.; Zhou, X.; Durrani, S.; Kennedy, R.A. Relaying Protocols for Wireless Energy Harvesting and Information Processing. IEEE Trans. Wirel. Commun. 2013, 12, 3622–3636. [Google Scholar] [CrossRef] [Green Version]
  69. Vo, V.N.; Gia Nguyen, T.; So-In, C.; Tran, H.; Sanguanpong, S. Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers. Mob. Netw. Appl. 2019, 25, 193–210. [Google Scholar] [CrossRef]
  70. Alevizos, P.N.; Bletsas, A. Sensitive and Nonlinear Far-Field RF Energy Harvesting in Wireless Communications. IEEE Trans. Wirel. Commun. 2018, 17, 3670–3685. [Google Scholar] [CrossRef] [Green Version]
  71. Darsena, D. Noncoherent Detection for Ambient Backscatter Communications Over OFDM Signals. IEEE Access 2019, 7, 159415–159425. [Google Scholar] [CrossRef]
  72. Yeom, J.S.; Jang, H.S.; Ko, K.S.; Jung, B.C. BER Performance of Uplink NOMA with Joint Maximum-Likelihood Detector. IEEE Trans. Veh. Technol. 2019, 68, 10295–10300. [Google Scholar] [CrossRef]
  73. Xia, W.; Zhou, Y.; Meng, Q. Performance Improvement on Nonorthogonal Multiple Access without CSIT. Wirel. Commun. Mob. Comput. 2020, 2020, 1–6. [Google Scholar] [CrossRef]
  74. Han, A.; Lv, T.; Zhang, X. Outage Performance of NOMA-based UAV-Assisted Communication with Imperfect SIC. In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, 15–18 April 2019; pp. 1–6. [Google Scholar]
  75. Kara, F.; Kaya, H. Improved User Fairness in Decode-Forward Relaying Non-Orthogonal Multiple Access Schemes with Imperfect SIC and CSI. IEEE Access 2020, 8, 97540–97556. [Google Scholar] [CrossRef]
Figure 1. System model for an EH UR downlink NOMA system in the IoT context.
Figure 1. System model for an EH UR downlink NOMA system in the IoT context.
Sensors 21 00285 g001
Figure 2. The U-TSAPS protocol. The time block T is used for both the information processing and EH phase and the information relaying phase.
Figure 2. The U-TSAPS protocol. The time block T is used for both the information processing and EH phase and the information relaying phase.
Sensors 21 00285 g002
Figure 3. OPs versus γ 0 (dB) DF and AF for BFID and BNID with N = 2 , M = K = 10 , α = 0.5 , η = 0.75 , and R = 0.01 (bit/s/Hz).
Figure 3. OPs versus γ 0 (dB) DF and AF for BFID and BNID with N = 2 , M = K = 10 , α = 0.5 , η = 0.75 , and R = 0.01 (bit/s/Hz).
Sensors 21 00285 g003
Figure 4. OPs for DF versus EH time ( α ) for BFID and BNID with various h U , d O B , and d O I i and with N = 2 , M = K = 10 , γ 0 = 20 (dB), η = 0.75 , and R = 0.01 (bit/s/Hz).
Figure 4. OPs for DF versus EH time ( α ) for BFID and BNID with various h U , d O B , and d O I i and with N = 2 , M = K = 10 , γ 0 = 20 (dB), η = 0.75 , and R = 0.01 (bit/s/Hz).
Sensors 21 00285 g004
Figure 5. OPs for AF versus EH time ( α ) BFID and BNID with various h U , d O B , and d O I i and with N = 2 , M = K = 10 , γ 0 = 20 (dB), η = 0.75 , and R = 0.01 (bit/s/Hz).
Figure 5. OPs for AF versus EH time ( α ) BFID and BNID with various h U , d O B , and d O I i and with N = 2 , M = K = 10 , γ 0 = 20 (dB), η = 0.75 , and R = 0.01 (bit/s/Hz).
Sensors 21 00285 g005
Figure 6. OPs versus γ 0 (dB) DF and AF for BFID and BNID with various numbers of antennas (N) and with M = K = 10 , α = 0.4 , η = 0.75 , and R = 0.01 (bit/s/Hz).
Figure 6. OPs versus γ 0 (dB) DF and AF for BFID and BNID with various numbers of antennas (N) and with M = K = 10 , α = 0.4 , η = 0.75 , and R = 0.01 (bit/s/Hz).
Sensors 21 00285 g006
Figure 7. OPs versus γ 0 (dB) DF and AF for BFID and BNID with various numbers of IDs in the far cluster (M) and with α = 0.4 , N = 2 , η = 0.75 , and R = 0.01 (bit/s/Hz).
Figure 7. OPs versus γ 0 (dB) DF and AF for BFID and BNID with various numbers of IDs in the far cluster (M) and with α = 0.4 , N = 2 , η = 0.75 , and R = 0.01 (bit/s/Hz).
Sensors 21 00285 g007
Figure 8. OPs versus γ 0 (dB) DF and AF for BFID and BNID with various numbers of IDs in the near cluster (K) and with α = 0.4 , N = 2 , η = 0.75 , and R = 0.01 (bit/s/Hz).
Figure 8. OPs versus γ 0 (dB) DF and AF for BFID and BNID with various numbers of IDs in the near cluster (K) and with α = 0.4 , N = 2 , η = 0.75 , and R = 0.01 (bit/s/Hz).
Sensors 21 00285 g008
Figure 9. Throughput τ versus γ 0 (dB) DF and AF for BFID and BNID with N = 2 , M = K = 15 , α = 0.4 , η = 0.75 , and R = 0.5 (bit/s/Hz).
Figure 9. Throughput τ versus γ 0 (dB) DF and AF for BFID and BNID with N = 2 , M = K = 15 , α = 0.4 , η = 0.75 , and R = 0.5 (bit/s/Hz).
Sensors 21 00285 g009
Figure 10. Throughput τ versus α and h U (m) DF and AF for BFID and BNID with N = 2 , M = K = 15 , γ 0 = 30 (dB), η = 0.75 , and R = 0.5 (bit/s/Hz).
Figure 10. Throughput τ versus α and h U (m) DF and AF for BFID and BNID with N = 2 , M = K = 15 , γ 0 = 30 (dB), η = 0.75 , and R = 0.5 (bit/s/Hz).
Sensors 21 00285 g010
Figure 11. Throughput τ versus α and d B O (m) DF and AF for BFID and BNID with N = 2 , M = K = 15 , γ 0 = 30 (dB), η = 0.75 , and R = 0.5 (bit/s/Hz).
Figure 11. Throughput τ versus α and d B O (m) DF and AF for BFID and BNID with N = 2 , M = K = 15 , γ 0 = 30 (dB), η = 0.75 , and R = 0.5 (bit/s/Hz).
Sensors 21 00285 g011
Figure 12. Throughput τ versus h U (m) and d B O (m) DF and AF for BFID and BNID with N = 2 , M = K = 15 , γ 0 = 30 (dB), η = 0.75 , and R = 0.5 (bit/s/Hz).
Figure 12. Throughput τ versus h U (m) and d B O (m) DF and AF for BFID and BNID with N = 2 , M = K = 15 , γ 0 = 30 (dB), η = 0.75 , and R = 0.5 (bit/s/Hz).
Sensors 21 00285 g012
Figure 13. Throughput τ versus h U (m) and d O I i (m) DF and AF for BFID and BNID with N = 2 , M = K = 15 , γ 0 = 30 (dB), η = 0.75 , and R = 0.5 (bit/s/Hz).
Figure 13. Throughput τ versus h U (m) and d O I i (m) DF and AF for BFID and BNID with N = 2 , M = K = 15 , γ 0 = 30 (dB), η = 0.75 , and R = 0.5 (bit/s/Hz).
Sensors 21 00285 g013
Table 1. List of notations.
Table 1. List of notations.
NotationDescription
BThe BS
UThe energy-limited UR
K , M The numbers of IDs in the near and far clusters, respectively
NThe number of antennas of the UR
I k The k-th ID of the near cluster, where k { 1 , , K }
I m The m-th ID of the far cluster, where m { 1 , , M }
I i The i-th ID, where i { m , k }
U n The n-th antenna of the UR, where n { 1 , , N }
h U The height of the UR
h B The height of the BS
OThe vertical projection point of the UR
g X Y The channel coefficient of the X Y link
d X Y The distance of the X Y link
σ The path loss exponent
E { . } The expectation operator
Ω X Y The mean of a RV, where Ω X Y = d X Y σ
α The TSR, where 0 α 1
ρ The PSR, where 0 ρ 1
TThe length of a time block
E U n The energy harvested at U n
ρ * ( . ) The APS ratio
γ e 2 e , ( . ) ( . ) The end-to-end SINR
P o u t , ( . ) ( . ) The OP
RThe target rate
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Nguyen, A.-N.; Vo, V.N.; So-In, C.; Ha, D.-B. System Performance Analysis for an Energy Harvesting IoT System Using a DF/AF UAV-Enabled Relay with Downlink NOMA under Nakagami-m Fading. Sensors 2021, 21, 285. https://doi.org/10.3390/s21010285

AMA Style

Nguyen A-N, Vo VN, So-In C, Ha D-B. System Performance Analysis for an Energy Harvesting IoT System Using a DF/AF UAV-Enabled Relay with Downlink NOMA under Nakagami-m Fading. Sensors. 2021; 21(1):285. https://doi.org/10.3390/s21010285

Chicago/Turabian Style

Nguyen, Anh-Nhat, Van Nhan Vo, Chakchai So-In, and Dac-Binh Ha. 2021. "System Performance Analysis for an Energy Harvesting IoT System Using a DF/AF UAV-Enabled Relay with Downlink NOMA under Nakagami-m Fading" Sensors 21, no. 1: 285. https://doi.org/10.3390/s21010285

APA Style

Nguyen, A. -N., Vo, V. N., So-In, C., & Ha, D. -B. (2021). System Performance Analysis for an Energy Harvesting IoT System Using a DF/AF UAV-Enabled Relay with Downlink NOMA under Nakagami-m Fading. Sensors, 21(1), 285. https://doi.org/10.3390/s21010285

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop