Next Article in Journal
Tuning the Stiffness Balance Using Characteristic Frequencies as a Criterion for a Superconducting Gravity Gradiometer
Next Article in Special Issue
Performance Analysis of Diversity-Controlled Multi-User Superposition Transmission for 5G Wireless Networks
Previous Article in Journal
Mutual-Information-Based Incremental Relaying Communications for Wireless Biomedical Implant Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks

1
Department of Electrical and Electronic Engineering, Auckland University of Technology, Auckland 1010, New Zealand
2
School of Computing and Communications, Lancaster University, Lancaster LA1 4YW, UK
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(2), 516; https://doi.org/10.3390/s18020516
Submission received: 31 December 2017 / Revised: 3 February 2018 / Accepted: 7 February 2018 / Published: 8 February 2018
(This article belongs to the Special Issue Non-Orthogonal Multi-User Transmissions for 5G Networks)

Abstract

:
Ubiquitous wireless sensor networks (UWSNs) have become a critical technology for enabling smart cities and other ubiquitous monitoring applications. Their deployment, however, can be seriously hampered by the spectrum available to the sheer number of sensors for communication. To support the communication needs of UWSNs without requiring more spectrum resources, the power-domain non-orthogonal multiple access (NOMA) technique originally proposed for 5th Generation (5G) cellular networks is investigated for UWSNs for the first time in this paper. However, unlike 5G networks that operate in the licensed spectrum, UWSNs mostly operate in unlicensed spectrum where sensors also experience cross-technology interferences from other devices sharing the same spectrum. In this paper, we model the interferences from various sources at the sensors using stochastic geometry framework. To evaluate the performance, we derive a theorem and present new closed form expression for the outage probability of the sensors in a downlink scenario under interference limited environment. In addition, diversity analysis for the ordered NOMA users is performed. Based on the derived outage probability, we evaluate the average link throughput and energy consumption efficiency of NOMA against conventional orthogonal multiple access (OMA) technique in UWSNs. Further, the required computational complexity for the NOMA users is presented.

1. Introduction

Non-orthogonal multiple access (NOMA) is emerging as a strong candidate for adoption as the multiple access technology to enhance system capacity for 5th Generation (5G) cellular systems [1,2]. In NOMA, the transmitted signals of multiple users are multiplexed in the power domain using same time, frequency or code resource, and demultiplexed by applying an interference cancellation technique at the receiver [3].
Although originally proposed for cellular systems, NOMA exhibits strengths that we consider as highly relevant to addressing the deployment challenges of ubiquitous wireless sensor networks (UWSNs), i.e., large-scale networks of wireless sensors densely deployed for ubiquitous monitoring of physical environments. Specifically, for a given spectrum bandwidth, NOMA can enable more simultaneous connections than existing approaches without the overheads of coding and spreading to facilitate the separation of users’ signals at the receiver [4]. This is particularly attractive for supporting massive connectivity without requiring more spectrum resources in UWSNs.
NOMA can be applicable to both uplink (sensors-to-sink) and downlink (sink-to-sensors) communication where powerful sink nodes can perform the equivalent role of base stations (BSs) for the tasks of user grouping and transmission power allocation. In UWSN, however, there is a greater motivation and challenge to apply NOMA in the downlink (DL).
Firstly, UWSNs with large geographic coverage typically use short-range multi-hop communication to conserve energy [5]. The size of the routing table at each node increases with the number of destinations. Unlike in uplink communication where the sink node is the main destination of all sensors’ outgoing traffic, the routing table size for DL communication can grow prohibitively with a massive number of sensors as destinations [6]. In this case, NOMA can offer a practical solution by enabling direct DL transmissions from sink node to multiple sensors simultaneously. DL transmissions are initiated when sink node queries a specific sensor or group of sensors for some information [7,8], or communicates information essential for their operations such as sleep-wake schedules [9]. Further, unlike 5G, most UWSNs operate in unlicensed spectrum where sensors also experience cross-technology (CT) interferences [10] from other devices sharing the same spectrum.
The main novelty and contributions of this paper are as follows. For the first time, NOMA is proposed as a spectrum efficient means of supporting massive connectivity in UWSNs, and its performance in a DL scenario where sink transmits to a group of sensors using NOMA under CT and other interferences is investigated using stochastic geometry [11]. The sensors, sinks and CT nodes can reside randomly and independently of each other in a two-dimensional (2D) plane. Hence, their spatial topologies can be modeled with three different homogeneous Poisson Point Processes (PPPs). We further derive the closed-form expression for the outage probability at probe receiver’s location and analyze its diversity order. We also present the average link throughput and energy consumption efficiency analysis to gain better understanding of applying NOMA to UWSN and benchmark the performance against conventional orthogonal multiple access (OMA). Numerical results are shown to validate the accuracy of the performed analysis as well as compare the outage, throughput and energy efficiency performances between the NOMA and OMA based UWSNs. Moreover, a computational complexity analysis is performed to evaluate the complexity required by SIC units of sensor receivers to decode NOMA message signals.
The rest of the paper is organized as follows. Section 2 reviews the related works. Section 3 describes the network model underlying our study. Section 4 derives the outage probability and diversity order at the sensor receiver under interference constraints. The network performances in terms of the average link throughput and energy consumption efficiency are then defined based on the derived outage probability in Section 5. Next, we present the numerical results in Section 6, and conclude the paper in Section 7.

2. Related Works

Early studies have focused on the performance comparison between NOMA and orthogonal frequency division multiple access (OFDMA). Through system level simulations, the authors in [12] reported 30–40% gain in overall cell throughput for NOMA over OFDMA under frequency-selective wideband scheduling and power allocation.
In [13], the authors analyzed the performance of DL NOMA with randomly deployed users. They evaluated performance under two scenarios: i.e., when user’s quality of service (QoS) and user’s channel condition determine its rate. The results show that appropriate rate and power allocation would result in better outage and ergodic sum rate in NOMA than OMA.
The fairness achieved by DL NOMA is discussed in [14]. The authors proposed optimal power allocation coefficients based on the availability of perfect average channel state information. Results showed that NOMA with proposed power allocation maintains high fairness and achieves superior outage performance (user rate) compared to time division multiple access (TDMA) and NOMA with fixed power allocation.
The authors in [15] considered a NOMA employed in an underlay cognitive radio (CR) network. The secondary BS communicates with secondary users (SUs) using NOMA. The primary transmitters (PTs) spatial topology is modeled by a homogenous PPP in the primary network. The SU receptions are interfered by PTs transmissions. Stochastic geometry tools are then utilized to analyze interference and outage at the SU receiver. The results demonstrate that NOMA achieves lower outage probability compared to conventional OMA.
In [16], a multi-input multi-output (MIMO) NOMA framework based on the principle of signal alignment is proposed. The performance of MIMO NOMA system is evaluated under fixed and CR inspired power allocation strategies. Unlike conventional MIMO systems based on OFDM where a single sub-channel is allocated to one user, multiple users in MIMO NOMA system can share one sub-channel. The results show that the proposed framework can improve reception reliability of existing MIMO NOMA systems. The same authors further proposed a precoding design in [17] for MIMO NOMA in a DL scenario to suppress inter-cluster interference whereas intra-cluster interference is minimized using successive interference cancellation (SIC) technique. The authors in [18] analyzed the performance of MIMO NOMA and MIMO OMA systems when multiple users are grouped into clusters. Further, they proposed an admission control scheme to adaptively trade-off between sum rate and the number of users that can be admitted into a cluster. The results show that MIMO NOMA can outperform MIMO OMA in terms of both sum rate and user fairness.
NOMA with topological interference management (TIM) for single input single output (SISO) broadcast channel (BC) is proposed in [19]. The total K users are divided into T groups. The BS applies DL NOMA, which results in inter- and intra-group interferences. The authors applied the proposed TIM and SIC to minimize inter-group, and intra-group interference, respectively. Results showed that the proposed scheme achieves superior sum rate compared to traditional TDMA.
In [20], the authors analyzed a multi-cell uplink NOMA cellular network using stochastic geometry. The locations of BSs and cellular users are modeled by Poisson cluster process. Closed-form expressions for the Laplace transform of the interference at BS are derived by considering both intra- and inter-cluster interferences under various SIC scenarios. NOMA is shown to outperform OMA in terms of average rate coverage. The authors in [21] proposed a user scheduling scheme based on which a closed-form expression for power allocation is derived to maximize energy efficiency of downlink NOMA systems under imperfect channel state information. Results show that the proposed scheme can achieve higher energy efficiency than existing schemes and OMA. Similarly, in [22], the authors presented energy efficient user scheduling and power allocation schemes for NOMA with not only imperfect channel state information but also mutual cross-tier interference in heterogeneous networks. They studied the trade-offs between data rate and energy performances, and reported a high energy efficiency of NOMA in such networks. In [23], a joint subcarrier and power allocation method is proposed for NOMA based amplify-and-forward relaying that can secure communications in the presence of eavesdroppers through cooperative jamming. The proposed method shows enhanced NOMA energy efficiency and security over random resource allocation. More recently, the authors in [24] considered three cognitive NOMA architectures: underlay, overlay and CR-inspired NOMA architectures, and presented cooperative relaying strategies for mitigating inter- and intra-network interferences in order to improve their reception reliability.
To date, NOMA has been investigated only in the context of cellular networks. The use of NOMA for UWSN has not been proposed in literature, and the reported performance gains of NOMA over its counterparts cannot be straightforwardly claimed for UWSN. This is because, unlike in cellular network, the sink node in a UWSN has no control over all transmitters within its coverage, including sensors and sinks of other UWSNs under different administrative domains or CT nodes that share the same spectrum such as WiFi and Bluetooth devices. Hence, it is important to investigate the performance of a UWSN employing NOMA under interference-limited scenario.

3. Network Model

We consider a UWSN comprising of sensor and sink nodes, which are randomly distributed in an infinite 2D plane. Further, it is assumed that the CT nodes are also co-located with sensor and sink nodes. These CT nodes are not a part of UWSN but are operating in the same frequency band, and hence cause interference to the reception of probe receiver. The spatial topology of the sensor, sink and CT transmitter nodes is modeled by three homogenous PPPs, denoted by Ξ S E , Ξ S K and Ξ C T with intensities λ S E , λ S K and λ C T , respectively.
We focus on a DL transmission scenario where a sink node communicates with sensor nodes using NOMA. To avoid ambiguity, we refer to the sensor receivers as users. We also refer to the probe sink node as a test transmitter, which is considered to be located at the center of a disc A with radius R . The M NOMA users are considered to be uniformly distributed inside disc A , as shown in Figure 1. Further, by probe receiver, we always mean the m-th NOMA user.
All communication links in the network follow a composite Rayleigh fading and distance dependent path-loss channel model. The channel between the m-th user and test transmitter is given by h m = h ^ m ( 1 + d m α ) 1 / 2 , where h ^ m and d m represent the Rayleigh fading channel gain, and distance between the test transmitter and m-th user, respectively, and α is the path loss exponent. We use a bounded path loss model to avoid issue of singularity at small distances [11,13]. Without loss of generality, we assume NOMA users’ channel gains are ordered as | h 1 | 2 | h M | 2 . Consequently, the power allocation coefficients under NOMA are sorted as β 1 β M with i = m + 1 M β i = 1 . The test transmitter sends a superimposed signal to all NOMA users and the received signal at the m-th user is given as:
r m = h m i = 1 M β i P s i + n m ,
where P is the transmission power of test transmitter, s i is the message signal of i-th sensor node, and n m is the additive white Gaussian noise (AWGN) with zero mean and variance σ 2 .
For each NOMA user, there are two types of interference that interfere the reception of desired signal. First is the intra-user interference that is present due to the superposition of multiple users in NOMA, and the second is due to the transmission of undesired transmitters in the network. SIC is employed at each user receiver to mitigate the intra-user interference. The optimal decoding order of SIC is in the sequence of increasing channel gains. Therefore, m-th user decodes the message signals of all j users, j < m , before decoding its own message, and treats the message signals of the users j > m as noise.
For the second type, we consider that the interference links among unwanted transmitters and probe NOMA receiver are dominated by path loss. Assume the probe receiver is located at origin of the coordinate system i.e., d m = ( x 0 , 0 ) with x 0 0 , then the total interference at probe user’s location can be written as, I = w Ξ S E ( 1 + d w α ) 1 + x Ξ S K \ x 0 ( 1 + d x α ) 1 + y Ξ C T ( 1 + d y α ) 1 , where d w , d x and d y represent the distances between undesired transmitting sensors, sinks, CT nodes and the probe receiver, respectively. Further, sensors and sinks operate on very low power levels, thus the NOMA users may experience excessive interference from a nearby transmitter(s) leading to a situation of complete outage. To avoid this, we consider a guard zone of radius d 0 around each NOMA user, within which no unwanted transmitter is allowed to transmit [25].
A list of commonly used variables is summarized in Table 1.
Let Λ m j represents the signal-to-interference-and-noise ratio (SINR) at the m-th NOMA user to decode the message signal of j-th user, j < m , then Λ m j can be computed as follows:
Λ m j = | h m | 2 β j χ | h m | 2 χ i = j + 1 M β i + κ I + 1 ,
where χ P / σ 2 is the average system signal-to-noise ratio (SNR), κ P I / σ 2 is the average interference level, and P I is the common maximum transmission power available to sink, sensor and CT nodes.
If all the j < m users are decoded and removed successfully by the m-th user from its observation signal r m , then SINR required to decode its own message is given by:
Λ m m = | h m | 2 β m χ | h m | 2 χ i = m + 1 M β i + κ I + 1 .

4. Outage and Diversity Analysis

4.1. Outage Probability Analysis

In this section, we present an exact analysis of the outage probability for m-th user under the considered network setting. Let ϖ j and R j represent the target SINR, and the rate for user j , respectively, where 1 j M and ϖ j = 2 R j 1 . To simplify notation, we define Δ m , j { Λ m j < ϖ j } as the outage event at m-th user when it fails to decode the message of j-th user, 1 j m . Consequently, the outage probability for m-th user, denoted by P out m , can be written as follows:
P out m = 1 P r ( Δ m , 1 c Δ m , m c ) ,
where Δ m , j c is the complement event of Δ m , j . To proceed further, rewrite Δ m , j c as:
Δ m , j c = { Λ m j > ϖ j } = { | h m | 2 β j χ | h m | 2 χ i = j + 1 M β i + κ I + 1 > ϖ j } = { | h m | 2 χ ( β j ϖ j i = j + 1 M β i ) > ϖ j ( κ I + 1 ) } = ( a ) { | h m | 2 > τ j ( κ I + 1 ) } ,
where τ j = ϖ j [ χ ( β j ϖ j i = j + 1 M β i ) ] 1 . Step ( a ) provides the following essential condition to keep NOMA operational:
C 1 : β j ϖ j i = j + 1 M β i > 0 .
when condition C 1 is violated, the m-th user will always suffer outage, irrespective of the channel SNR. Further, by defining τ m * = max { τ 1 , , τ m } , P out m can be written as:
P out m = 1 Pr ( | h m | 2 > τ m * ( κ I + 1 ) )
.
To proceed forward, we notice that | h m | 2 are the ordered channel gains. Let F X ( ) and f X ( ) denote the cumulative distribution function (CDF), and the probability density function (PDF), of X respectively. Then, the ordered and unordered channel | h ˜ | 2 have following relationships [26]:
F | h m | 2 ( t ) = μ m q = 0 M m ( M m q ) ( 1 ) q m + q [ F | h ˜ | 2 ( t ) ] m + q .
f | h m | 2 ( t ) = μ m q = 0 M m ( M m q ) ( 1 ) q [ F | h ˜ | 2 ( t ) ] m + q 1 f | h ˜ | 2 ( t ) ,
where μ m = M ! [ ( M m ) ! ( m 1 ) ! ] 1 . To this end, the following theorem presents the exact expression for P out m .
Theorem 1. 
The outage probability of the m-th NOMA user can be derived as:
P out m = 1 Θ s = 1 S Ψ s e υ g s { k = 0 2 K Re [ e λ π [ ( e c k d 0 α 1 ) d 0 2 + c k t = 1 T η t e u t c k d 0 α ] + i π g s Θ ] × [ μ m q = 0 M m ( M m q ) ( 1 ) q n = 1 N ψ n ( Φ ( δ , 1 + δ ; a n ( κ g s + 1 ) ) + ε Φ ( 1 + δ , 2 + δ ; a n ( κ g s + 1 ) ) ) × ( 1 e τ m * ( κ g s + 1 ) t n Φ ( δ , 1 + δ ; a n ( κ g s + 1 ) ) ) m + q 1 ] } ,
where Ψ s = w s e g s , w s = Γ ( S + 1 ) g s S ! ( S + 1 ) 2 [ L S + 1 ( g s ) ] 2 , L S ( ) is the Laguerre polynomial of degree S , g s are the roots of L S ( ) , c k = υ 0 + i π k Θ , υ 0 = ρ log ( ξ ) / Θ , ρ is a real number, ξ is the desired relative accuracy, Θ is a scaling parameter, i = 1 , K is the number of terms used to invert the Laplace transform, λ = λ S E + λ S K + λ C T , η t = 1 2 d 0 2 α ω t 1 ϕ t 2 u t δ , ω t = π / T , u t = ( 1 + ϕ t ) / 2 , ϕ t = cos ( ( 2 t 1 ) π / 2 T ) , ψ n = ω n 1 θ n 2 τ m * ( κ z + 1 ) e τ m * ( κ z + 1 ) t n , θ n = cos ( ( 2 n 1 ) π / 2 N ) , ω t = π / N , t n = ( 1 + θ n ) / 2 , a n = τ m * t n R α , δ = 2 / α , ε = δ ( 1 + δ ) 1 R α , T and N are complexity-accuracy tradeoff parameters, and Φ ( , ; ) is a confluent hyper-geometric function.
Proof 1. 
See Appendix A. ☐

4.2. Diversity Analysis

In this subsection, we present the diversity analysis for the ordered NOMA users in high SNR regime. The diversity order of the m-th user outage probability is defined as:
D = lim χ log P out m log χ .
To obtain D, we first notice from Equation (7) that the asymptotic outage probability in high SNR regime, denoted as P m can be expressed as:
P m = Pr ( | h m | 2 < t * ) ,
where t * = τ ˜ m κ I χ 1 , τ ˜ m = max { τ ¯ 1 , , τ ¯ m } and τ ¯ m = ϖ m [ ( β m ϖ m i = m + 1 M β i ) ] 1 . Next, when χ and t * 0 , similar to Equation (8a), the CDF of the ordered channel is expressed as:
F | h m | 2 ( t * ) = μ m q = 0 M m ( M m q ) ( 1 ) q m + q [ F | h ˜ | 2 ( t * ) ] m + q
We notice in the CDF of the unordered channel in Appendix A that Φ ( δ , 1 + δ ; t * R α ) 1 and e t * 1 t * . Hence, F | h ˜ | 2 ( t * ) in Equation (12) can be approximated as:
F | h ˜ | 2 ( t * ) t *
Substituting Equation (13) into Equation (12), F | h m | 2 ( t * ) can be expressed as:
F | h m | 2 ( t * ) ϑ ( τ ˜ m κ I χ 1 ) m + o [ ( τ ˜ m κ I χ 1 ) m ] ,
where ϑ = μ m / m . Based on Equation (14), P m in (11) is given as:
P m 1 χ m 0 ϑ ( τ ˜ m κ z ) m f I ( z ) d z Ψ
It can be observed that Ψ is a constant. Hence, Equation (15) can be expressed as follows:
P m A χ m + o ( χ m ) .
Finally, substituting Equation (16) into Equation (10), the diversity order experienced by the m-th user is found to be m. It can be observed from Equation (15) that interference in integral Ψ is independent of χ and hence the factor χ m dominates Ψ in Equation (15) under high SNR. This indicates that the interference-limited NOMA based UWSN becomes equivalent to an interference-free network. This result on diversity order can be interpreted as follows. First, the m-th user avails exactly m chances to decode its own message. Second, the m-th user has (m-1) interferences from the higher order users that need to be cancelled out by applying SIC. Hence, it obtains a diversity of m.

5. Throughput and Energy Consumption Efficiency

5.1. Link Throughput Efficiency

The link throughput efficiency between the m-th user and the test transmitter, denoted by T P m and measured in [bits/s/Hz] is defined as [27]:
T P m = ( 1 P out m ) log 2 ( 1 + ϖ m ) .
Correspondingly, the average link throughput efficiency of the network can be found as:
T P a v g = ( m = 1 M T P m ) / M

5.2. Energy Consumption Efficiency

NOMA is used by the sink node to communicate with the sensors. Since NOMA is typically applied on top of an underlying access technology to better reuse the transmission resources, e.g., time slots, frequency channels, or spreading codes, an additional SIC unit is required at the sensors to decode the desired message. It is thus important to analyze the overall energy consumption efficiency ς of the NOMA based UWSN. The total energy consumption along the signal path (communication and circuits) can be decomposed into three main components [28]: the power consumed by power amplifiers P a , the power consumed by SIC unit to process information P s , and the power consumed by all other circuit units (filters, mixers, frequency synthesizer, etc.) P c . Hence, the overall ς in Joules/bit can be expressed as:
ς = ( P a + M P c + P s ) / R b
where R b = B T P a v g is the bit rate, B is the channel bandwidth in Hz, P a = ν P , ν = ν 2 / ν 1 , ν 1 is the drain efficiency of the power amplifier, and ν 2 is the peak-to-average ratio.
The P c is considered as a constant, and P s can be regarded as the average power consumed by SIC units of all scheduled sensor receivers. To find P s , we need to compute the power consumed by m-th sensor, P m , to process N b = | B T P m | bits. Our approach is to express P m in terms of the required computational complexity C m .
To proceed forward, we first require a power consumption model for the sensor device. Considering the sensor as CMOS device, the power consumed during computation in a static CMOS device is given as [29]:
P m = C e f f V m 2 m ,
where C e f f , V m and m are the effective switching capacitance, supply voltage, and clock frequency of m-th sensor, respectively. Further, V m and m are directly related as:
m = V m ,
where > 0 is a design parameter that takes a value of O ( B ) [30]. Dynamic voltage scaling (DVS) is a standard technique for conserving power in CMOS devices through dynamically adjusts the clock frequency by scaling the voltage according to processing load [31]. For a given Nb, V m can be scaled to match m with C m /s. Based on Equations (20) and (21), P m can be expressed as:
P m = C e f f [ C m ] 3
and Cm is given in terms of number of floating point operations (FLOPs) per bit decision [32] as:
C m = N b [ 2 N s M + 5 M + 8 m = 1 M 1 m + ( M 1 ) ( 5 + 2 N s ) ] + 2 M N s ( M 1 ) + 2 M N b + M + M log 2 ( M )
where N s is the number of samples to represent one bit. Finally, based on Equations (22) and (23), substituting P s = M 1 m = 1 M P m into Equation (19) obtains the overall ς .

6. Numerical Results

This section presents results to verify the accuracy of outage probability, link throughput and energy consumption analysis for a UWSN which uses NOMA for downlink (sink-to-source) transmission. We calculate the coefficients β m according to the power allocation scheme proposed for NOMA in [13], with β m = ( M m + 1 ) / μ , where μ is selected such that m = 1 M β m = 1 . In all the simulations, we use parameter values in Table 2 unless otherwise stated.
Figure 2 shows the outage probability of each m-th user under the impact of different transmission radius R of the sink node. The solid and dashed curves are analytical results obtained by plotting (9), while simulation results are shown in “●” and “+” to validate our derivations. It can be observed that increasing R results in higher outage probability due to increased path loss. Further, the ordered NOMA users have different outage performance, as each has a different channel condition.
Figure 3 demonstrates the average outage probability under different interference levels κ , defined immediately after Equation (2). Reducing κ expectedly lowers the outage probability. Figure 4 further shows the outage probability of each m-th user under the impact of different path loss α. The results show that NOMA achieves lower outage probability than OMA for different values of α. The link throughput efficiency of each m-th user with increasing transmit power of test transmitter (sink node) are shown in Figure 5. NOMA achieves better throughput efficiency than OMA, as all the ordered NOMA users have lower outage probability than their OMA counterparts.
Figure 6 shows the energy consumption efficiency ς comparison between NOMA and OMA as a function of transmit power P. The results are obtained by considering two and three users. The power allocation coefficients and SINR thresholds for M = 3 are given in Table 2. For M = 2, they are chosen as β m = { 0.8 , 0.2 } m = 1 , 2 , and ϖ m = { 0.9 , 1.5 } m = 1 , 2 respectively. Further, C e f f = 2 × 10 15 Farads for 70 nm CMOS technology [33], channel bandwidth B = 2 MHz, N s = 4 samples to represent one bit, and circuit power consumption P c = 20 dBm. Overall, NOMA achieves better ς than OMA due to a lower outage probability which results in larger R b in Equation (19) and consequently higher ς . However, the ς of both schemes are comparable beyond a transmit power of 15 dBm, which indicates the importance of optimizing the power and rate allocation in NOMA based UWSNs.
Another observation is that, for both NOMA and OMA, the ς with M = 2 are better that with M = 3 at low transmit powers. This can be explained as follows. First, compared to M = 3, the M P c term in Equation (19) is lower for M = 2 resulting in better ς . Second, at low transmit powers, NOMA with M = 2 achieves higher T P a v g than that with M = 3 because of less intra-user interference. Similarly, OMA with M = 2 has better TPavg than that with M = 3 because a higher fraction of B is available to each OMA user.
Since sensors have limited processing capacity, it is necessary to also analyze the complexity requirements of NOMA for these sensors. For downlink (sink-to-sensors) communication, the required complexity for the scheduled sensor receivers will be the complexity of their SIC units to process the received NOMA message. Figure 7 shows the computation complexity in terms of the number of floating-point operations (FLOPs) per bit decision, i.e., the number of FLOPs needed to decode one bit, obtained using Equation (23), under different M ordered users and Ns samples used to represent one bit. The results expectedly show the receiver’s complexity increases with M and Ns.
To evaluate whether the current sensor platforms can implement the SIC unit for NOMA in UWSNs, we consider ARM Cortex-M3 and Cortex-M7 processors, which are widely used processors for current lower-, and higher-end sensor platforms, respectively. Based on their specified capacity in terms of million floating-point operations per second (MFLOPS) [34], we calculate the required computational time per bit decision for M = 3 and M = 9 users with Ns = 4 samples, as shown in Table 3. Consider a maximum payload size of 127 bytes (or 1016 bits) widely used in low-powered UWSNs, the computational time per message with M = 3–9 users can range 115–411 ms, and 3.3–11.5 ms for Cortex-M3, and Cortex-M7 processor, respectively.

7. Conclusions

In this paper, we propose and investigate the performance of NOMA for UWSNs. Different from cellular use-case, NOMA in UWSNs are further subject to interferences from cross-technology nodes operating in the same unlicensed spectrum as the sensors. Focusing on the downlink (sink-to-sensors) scenario, we derived a new closed-form expression for outage probability at the probe receiver’s location by utilizing stochastic geometry and order statistics. Numerical analysis shows that NOMA achieves lower outage probability, resulting in higher average throughput and better energy consumption efficiency than conventional OMA, suggesting that NOMA is very attractive for interference-limited UWSNs. Further, the computational time complexity for NOMA message decoding is within acceptable limits when using current and upcoming generations of processors for UWSNs. For future work, we plan to investigate power and rate allocation strategies under similar channel conditions to further enhance NOMA performance in UWSNs.

Acknowledgments

This work was supported by a grant-in-aid from Auckland University of Technology to Boon-Chong Seet for sabbatical research in UK.

Author Contributions

B.S. conceived the initial concept of harnessing NOMA for UWSNs. A.A. modeled the transmission interference, implemented the simulations, and analyzed the data with guidance from B.S. and Z.D. The manuscript was drafted by A.A., revised by B.S., and proofread by Z.D.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proof of Theorem 1

P out m = 1 Pr ( | h m | 2 > τ m * ( κ I + 1 ) ) = 0 0 τ m * ( κ z + 1 ) f | h m | 2 ( x ) d x Q 1 f I ( z ) d z ,
where f I ( z ) is the PDF of interference I . Since NOMA users are uniformly distributed inside disc A and fading is Rayleigh distributed, the CDF of the unordered channel is given as [35]:
F | h ˜ | 2 ( x ) = 2 R 2 0 R ( 1 e ( 1 + t α ) x ) t d t F | h ˜ | 2 ( x ) = ( b ) 2 α R 2 0 R α ( 1 e ( 1 + y ) x ) y δ 1 d y = ( c ) 1 δ e x B ( 1 , δ ) Φ ( δ , 1 + δ ; x R α ) = 1 e x Φ ( δ , 1 + δ ; x R α ) ,
where ( b ) is obtained by a change of variable from t α y , ( c ) results from by applying ([36], Equation 3.383), B ( , ) is a beta function and δ B ( 1 , δ ) = 1 . The PDF f | h ˜ | 2 ( x ) is obtained by taking the derivative of (A2) as:
f | h ˜ | 2 ( x ) = ( d ) e x [ Φ ( δ , 1 + δ ; x R α ) + ε Φ ( 1 + δ , 2 + δ ; x R α ) ]
where ( d ) is obtained by applying ([36], Equation 9.213) and ε = δ ( 1 + δ ) 1 R α . Next, using Equations (8b), (A2) and (A3), Q 1 in Equation (A1) can be written as:
Q 1 = Ω m 0 τ m * ( κ z + 1 ) [ 1 e x Φ ( δ , 1 + δ ; x R α ) ] m + q 1 × e x [ Φ ( δ , 1 + δ ; x R α ) + ε Φ ( 1 + δ , 2 + δ ; x R α ) ] d x ,
where Ω m = μ m q = 0 M m ( M m q ) ( 1 ) q . The Gaussian–Chebyshev quadrature is applied to approximate Q 1 as:
Q 1 ( z ) = Ω m { n = 1 N ψ n [ Φ ( δ , 1 + δ ; a n ( κ z + 1 ) ) + ε Φ ( 1 + δ , 2 + δ ; a n ( κ z + 1 ) ) ] × [ 1 e τ m * ( κ z + 1 ) t n Φ ( δ , 1 + δ ; a n ( κ z + 1 ) ) ] m + q 1 } .
Next, the following lemma provides the PDF f I ( z ) of the interference to obtain P out m .
Lemma 1. 
Consider the interferers are distributed according to the homogenous PPP. Then the PDF of the interference at probe receiver can be given as:
f I ( z ) = e υ z Θ k = 0 2 K Re { e λ π [ ( e c k d 0 α 1 ) d 0 2 + c k t = 1 T η t e u t c k d 0 α ] + i π z Θ } ,
Proof 2. 
Please see Appendix B. ☐
Now, based on Equations (A5) and (A6), the outage probability for m-th user in Equation (A1) can be written as:
P out m = k = 0 2 K 0 Re { e λ π [ ( e c k d 0 α 1 ) d 0 2 + c k t = 1 T η t e u t c k d 0 α ] + i π z Θ } e υ z Θ Q 1 ( z ) d z Q 2 .
As it is challenging to solve Q 2 in Equation (A7), we approximate it by Gauss–Laguerre quadrature as follows:
Q 2 = s = 1 S Ψ s Re { e λ π [ ( e c k d 0 α 1 ) d 0 2 + c k t = 1 T η t e u t c k d 0 α ] + i π g s Θ } e υ g s Θ Q 1 ( g s ) ,
Finally, substituting Equation (A8) into Equation (A7) and using Q 1 ( z ) in Equation (A5) with z = g s , prove the result in Theorem 1.

Appendix B. Proof of Lemma 1

To derive the PDF of interference I , we first notice that the Laplace transform of I is given as [25]:
L I ( s ) = e λ π [ ( e s d 0 α 1 ) d 0 2 + s δ γ ( 1 δ , s d 0 α ) ] ,
where γ ( a , x ) = 0 x e t t a 1 d t is the lower incomplete gamma function. Next, we approximate γ ( 1 δ , s d 0 α ) by applying the Gaussian–Chebyshev quadrature:
γ ( 1 δ , s d 0 α ) = s 1 δ t = 1 T η t e u t s d 0 α .
Substituting Equation (A8) into Equation (A7), L I ( s ) can be written as:
L I ( s ) = e λ π [ ( e s d 0 α 1 ) d 0 2 + s t = 1 T η t e u t s d 0 α ] .
Applying Fourier series [37] to invert the Laplace transform of the interference, the PDF f I ( z ) can be written as:
f I ( z ) = e υ z Θ k = 0 2 K Re [ L I ( s ) e i π z Θ ] .
Replacing s in Equation (A11) with c k and then substituting it into Equation (A12) prove Lemma 1.

References

  1. Ding, Z.; Liu, Y.; Choi, J.; Sun, Q.; Elkashlan, M.; Chih-Lin, I.; Poor, H.V. Application of Non-orthogonal Multiple Access in LTE and 5G Networks. IEEE Commun. Mag. 2017, 55, 185–191. [Google Scholar] [CrossRef]
  2. Islam, S.M.R.; Avazov, N.; Dobre, O.A.; Kwak, K.S. Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges. IEEE Commun. Surv. Tutor. 2017, 19, 721–742. [Google Scholar] [CrossRef]
  3. Anwar, A.; Seet, B.-C.; Li, X.J. PIC-based Receiver Structure for 5G Downlink NOMA. In Proceedings of the 10th International Conference on Information, Communication, and Signal Processing, Singapore, 2–4 December 2015. [Google Scholar]
  4. Shirvanimoghaddam, M.; Dohler, M.; Johnson, S.J. Massive Non-Orthogonal Multiple Access for Cellular IoT: Potentials and Limitations. IEEE Commun. Mag. 2017, 55, 55–61. [Google Scholar] [CrossRef]
  5. Prommak, C.; Modhirun, S. Minimizing Energy Consumption in Wireless Sensor Networks Using Multi-Hop Relay Stations. In Proceedings of the 11th WSEAS International Conference on Applied Computer Science, Penang, Malaysia, 3–5 October 2011. [Google Scholar]
  6. Gurijala, A.; Das, P. Broadcast Server Architecture for Wireless Sensor Networks. In Proceedings of the International Conference on Wireless Networks (ICWN), Las Vegas, NV, USA, 26–29 June 2006. [Google Scholar]
  7. Liu, Y.; Seet, B.-C.; Al-Anbuky, A. Ambient Intelligence Context-based Cross-Layer Design in Wireless Sensor Networks. Sensors 2014, 14, 19057–19085. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Imran, N.; Seet, B.-C.; Fong, A.C.M. A Comparative Analysis of Video Codecs for Multihop Wireless Video Sensor Networks. Multimed. Syst. 2012, 18, 373–389. [Google Scholar] [CrossRef]
  9. Nazir, B.; Hasbullah, H.; Madani, S.A. Sleep/Wake Scheduling Scheme for Minimizing End-to-End Delay in Multi-Hop Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2011, 2011, 14. [Google Scholar] [CrossRef]
  10. Yang, P.; Yan, Y.; Li, X.; Zhang, Y.; Tao, Y.; You, L. Taming Cross-Technology Interference for WiFi and ZigBee Coexistence Networks. IEEE Trans. Mob. Comput. 2016, 15, 1009–1021. [Google Scholar] [CrossRef]
  11. Haenggi, M. Stochastic Geometry for Wireless Networks, 1st ed.; Cambridge University Press: New York, NY, USA, 2013. [Google Scholar]
  12. Saito, Y.; Kishiyama, Y.; Benjebbour, A.; Nakamura, T.; Li, A.; Higuchi, K. Non-Orthogonal Multiple Access (NOMA) for Cellular Future Radio Access. In Proceedings of the IEEE 77th Vehicular Technology Conference (VTC), Dresden, Germany, 2–5 June 2013. [Google Scholar]
  13. Ding, Z.; Yang, Z.; Fan, P.; Poor, H.V. On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users. IEEE Signal Process. Lett. 2014, 21, 1501–1505. [Google Scholar] [CrossRef]
  14. Timotheou, S.; Krikidis, I. Fairness for Non-Orthogonal Multiple Access in 5G Systems. IEEE Signal Process. Lett. 2015, 22, 1647–1651. [Google Scholar] [CrossRef]
  15. Liu, Y.; Ding, Z.; Elkashlan, M.; Yuan, J. Non-Orthogonal Multiple Access in Large-Scale Underlay Cognitive Radio Networks. IEEE Trans. Veh. Technol. 2016, 65, 10152–10157. [Google Scholar] [CrossRef]
  16. Ding, Z.; Schober, R.; Poor, H.V. A General MIMO Framework for NOMA Downlink and Uplink Transmission Based on Signal Alignment. IEEE Trans. Wirel. Commun. 2016, 15, 4438–4454. [Google Scholar] [CrossRef]
  17. Ding, Z.; Adachi, F.; Poor, H.V. The Application of MIMO to Non-Orthogonal Multiple Access. IEEE Trans. Wirel. Commun. 2016, 15, 537–552. [Google Scholar] [CrossRef]
  18. Zeng, M.; Yadav, A.; Dobre, O.A.; Tsiropoulos, G.I.; Poor, H.V. Capacity Comparison between MIMO-NOMA and MIMO-OMA with Multiple Users in a Cluster. IEEE J. Sel. Areas Commun. 2017, 35, 2413–2424. [Google Scholar] [CrossRef]
  19. Kalokidou, V.; Johnson, O.; Piechocki, R. A Hybrid TIM-NOMA Scheme for the SISO Broadcast Channel. In Proceedings of the IEEE International Conference on Communication Workshop, London, UK, 8–12 June 2015. [Google Scholar]
  20. Tabassum, H.; Hossain, E.; Hossain, M.J. Modeling and Analysis of Uplink Non-Orthogonal Multiple Access (NOMA) in Large-Scale Cellular Networks Using Poisson Cluster Processes. IEEE Trans. Commun. 2017, 65, 3555–3570. [Google Scholar] [CrossRef]
  21. Fang, F.; Zhang, H.; Cheng, J.; Roy, S.; Leung, V.C.M. Joint User Scheduling and Power Allocation Optimization for Energy-Efficient NOMA Systems with Imperfect CSI. IEEE J. Sel. Areas Commun. 2017, 35, 2874–2885. [Google Scholar] [CrossRef]
  22. Zhang, H.; Fang, F.; Cheng, J.; Long, K.; Wang, W.; Leung, V.C.M. Energy-Efficient Resource Allocation in NOMA Heterogeneous Networks. arXiv, 2018; arXiv:1801.04552. [Google Scholar]
  23. Zhang, H.; Yang, N.; Long, K.; Pan, M.; Karagiannidis, G.K.; Leung, V.C.M. Secure Communications in NOMA System: Subcarrier Assignment and Power Allocation. arXiv, 2018; arXiv:1801.04441. [Google Scholar]
  24. Lv, L.; Chen, J.; Ni, Q.; Ding, Z.; Jiang, H. Cognitive Non-Orthogonal Multiple Access with Cooperative Relaying: A New Wireless Frontier for 5G Spectrum Sharing. arXiv, 2018; arXiv:1801.04022. [Google Scholar]
  25. Venkataraman, J.; Haenggi, M.; Collins, O. Shot Noise Models for Outage and Throughput Analyses in Wireless Ad Hoc Networks. In Proceedings of the IEEE Military Communications Conference, Washington, DC, USA, 23–25 October 2006. [Google Scholar]
  26. David, H.A.; Nagaraja, H.N. Order Statistics, 3rd ed.; Willey: New York, NY, USA, 2003. [Google Scholar]
  27. Nardelli, P.H.J.; Kountouris, M.; Cardieri, P.; Latva-aho, M. Throughput Optimization in Wireless Networks under Stability and Packet Loss Constraints. IEEE Trans. Mob. Comput. 2014, 13, 1883–1895. [Google Scholar] [CrossRef]
  28. Cui, S.; Goldsmith, A.J.; Bahai, A. Energy-Efficiency of MIMO and Cooperative MIMO Techniques in Sensor Networks. IEEE J. Sel. Areas Commun. 2004, 22, 1089–1098. [Google Scholar] [CrossRef]
  29. Min, R.; Furrer, T.; Chandrakasan, A. Dynamic Voltage Scaling Techniques for Distributed Microsensor Networks. In Proceedings of the IEEE Computer Society Workshop on VLSI: System Design for a System-on-Chip Era, Orlando, FL, USA, 27–28 April 2000. [Google Scholar]
  30. Chen, J.-J.; Kuo, T.-W. Procrastination Determination for Periodic Real-Time Tasks in Leakage-Aware Dynamic Voltage Scaling Systems. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Jose, CA, USA, 4–8 November 2007. [Google Scholar]
  31. He, Z.; Liang, Y.; Chen, L.; Ahmad, I.; Wu, D. Power-Rate Distortion Analysis for Wireless Video Communication under Energy Constraints. IEEE Trans. Circ. Syst. Video Technol. 2005, 15, 645–658. [Google Scholar]
  32. Buehrer, R.M.; Correal-Mendoza, N.S.; Woerner, B.D. A Simulation Comparison of Multiuser Receivers for Cellular CDMA. IEEE Trans. Veh. Technol. 2000, 49, 1065–1085. [Google Scholar] [CrossRef]
  33. Martin, S.M.; Flautner, K.; Mudge, T.; Blaauw, D. Combined Dynamic Voltage Scaling and Adaptive Body Biasing for Lower Power Microprocessors under Dynamic Workloads. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Jose, CA, USA, 10–14 November 2002. [Google Scholar]
  34. Ivkovic, J.; Ivkovic, J.L. Analysis of the performance of the new generation of 32-bit Microcontrollers for IoT and Big Data Application. In Proceedings of the International Conference on Information Society and Technology (ICIST), Kopaonik, Serbia, 12–15 March 2017. [Google Scholar]
  35. Ding, Z.; Poor, H.V. Cooperative Energy Harvesting Networks with Spatially Random Users. IEEE Signal Process. Lett. 2013, 20, 1211–1214. [Google Scholar] [CrossRef]
  36. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series and Products, 7th ed.; Academia Press: New York, NY, USA, 2007. [Google Scholar]
  37. Kuhlman, K.L. Review of Inverse Laplace Transforms for Laplace-Space Numerical Approaches. Numer. Algorithms 2013, 63, 339–355. [Google Scholar] [CrossRef]
Figure 1. (a) A realization of Ξ S E , Ξ S K and Ξ C T transmitter processes; and (b) an illustration of sink-to-sensors communication using NOMA under interference of other sink, sensor and CT nodes.
Figure 1. (a) A realization of Ξ S E , Ξ S K and Ξ C T transmitter processes; and (b) an illustration of sink-to-sensors communication using NOMA under interference of other sink, sensor and CT nodes.
Sensors 18 00516 g001
Figure 2. Impact of R on outage probability of each m-th user.
Figure 2. Impact of R on outage probability of each m-th user.
Sensors 18 00516 g002
Figure 3. Impact of κ on average outage probability. The bottom first line (blue) is for k = 1 dB, second line (red) is for k = 5 dB, third line (green) is for k = 10 dB, and fourth line (purple) is for k = 20 dB, ordered by the direction of the arrow.
Figure 3. Impact of κ on average outage probability. The bottom first line (blue) is for k = 1 dB, second line (red) is for k = 5 dB, third line (green) is for k = 10 dB, and fourth line (purple) is for k = 20 dB, ordered by the direction of the arrow.
Sensors 18 00516 g003
Figure 4. Impact of α on outage probability of each m-th user.
Figure 4. Impact of α on outage probability of each m-th user.
Sensors 18 00516 g004
Figure 5. Link throughput efficiency comparison between NOMA and OMA.
Figure 5. Link throughput efficiency comparison between NOMA and OMA.
Sensors 18 00516 g005
Figure 6. Energy consumption efficiency comparison between NOMA and OMA.
Figure 6. Energy consumption efficiency comparison between NOMA and OMA.
Sensors 18 00516 g006
Figure 7. Computational complexity of NOMA receivers.
Figure 7. Computational complexity of NOMA receivers.
Sensors 18 00516 g007
Table 1. Commonly used variables.
Table 1. Commonly used variables.
NotationDescription
α Path loss exponent
β j Power allocation coefficient of j-th user
ϖ j Target SINR threshold for j-th user
P out m Outage probability of the m-th user
Φ ( , ; ) Confluent hyper-geometric function
Λ m j SINR at m -th user to decode j -th user message
Λ m SINR at m -th user to decode its own message
κ Average interference level
χ Average system SNR
d m Distance between test transmitter and m-th user
d 0 Guard zone radius around each sensor receiver
h m Channel between m-th NOMA user and test transmitter
M Total number of NOMA users
L S ( ) Laguerre polynomial of degree S
N , T Gaussian–Chebyshev parameters
P Transmit power of test transmitter
P c Constant power consumption of circuits
R Radius of disc A
T P m Average link throughput of user m
ς Overall energy consumption efficiency
Table 2. Simulation parameters.
Table 2. Simulation parameters.
ParameterDescriptionValue (s)
α Path loss exponent4
β m Power allocation coefficient of m-th user { 0.6 , 0.3 , 0.1 } 1 , 2 , 3
ϖ m SINR threshold for m-th user { 0.9 , 1.5 , 2 } 1 , 2 , 3
λ S E Intensity of Ξ S E 10 3
λ S K Intensity of Ξ S K 10 4
λ C T Intensity of Ξ C T 10 3
κ Average interference level1 dB
σ 2 Noise power−90 dBm
χ Average system SNR10 to 50 dB
K Fourier series terms10
M Total NOMA users3
N Gaussian–Chebyshev parameter3
P Test transmitter transmission power−10 to 30 dBm
R Transmission radius of test transmitter10 m
S Degree of Laguerre polynomial2
T Gaussian–Chebyshev parameter5
Table 3. Computational time per bit decision by SIC unit.
Table 3. Computational time per bit decision by SIC unit.
ProcessorCapacity (MFLOPS)Time (μs) for M = 3Time (μs) for M = 9
ARM Cortex-M30.618113405
ARM Cortex-M722.13.211.3

Share and Cite

MDPI and ACS Style

Anwar, A.; Seet, B.-C.; Ding, Z. Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks. Sensors 2018, 18, 516. https://doi.org/10.3390/s18020516

AMA Style

Anwar A, Seet B-C, Ding Z. Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks. Sensors. 2018; 18(2):516. https://doi.org/10.3390/s18020516

Chicago/Turabian Style

Anwar, Asim, Boon-Chong Seet, and Zhiguo Ding. 2018. "Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks" Sensors 18, no. 2: 516. https://doi.org/10.3390/s18020516

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop