Next Article in Journal
Semiosis as a Source of Providing Empirical Phenomena with a New Type of Cohesion
Previous Article in Journal
Improved Adaptive Multipoint Optimal Minimum Entropy Deconvolution and Application on Bearing Fault Detection in Random Impulsive Noise Environments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Outage Performance Analysis of Improper Gaussian Signaling for Two-User Downlink NOMA Systems with Imperfect Successive Interference Cancellation

1
School of Information Science and Engineering, Southeast University, Nanjing 210096, China
2
Guangdong Communications and Networks Institute, Guangzhou 510070, China
3
School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
4
Frontiers Science Center for Mobile Information Communication and Security, Southeast University, Nanjing 210096, China
*
Authors to whom correspondence should be addressed.
Entropy 2023, 25(8), 1172; https://doi.org/10.3390/e25081172
Submission received: 9 May 2023 / Revised: 26 July 2023 / Accepted: 30 July 2023 / Published: 6 August 2023
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
The improper Gaussian signaling (IGS) technique can improve the achievable rate of an interference-limited network by fully exploiting the second-order statistics of complex signaling. This paper addresses the outage performance analysis of a two-user downlink non-orthogonal multiple access (NOMA) system using the IGS technique in the presence of imperfect successive interference cancellation (SIC). The strong channel user (SU) adopts the IGS, while the weak channel user (WU) adopts the traditional proper Gaussian signaling (PGS). Considering a practical scenario where the transmitter has obtained the statistics of the channel coefficients instead of the instantaneous channel state information (CSI), the expressions of the achievable rates of both users under residual interference due to imperfect SIC are derived, together with their outage probabilities, subject to predetermined target rates and channel statistics. Given a fixed transmit power of the WU, both the transmit power and the degree of impropriety of the SU are optimized to minimize the outage probability subject to the outage constraint of the WU. Numerical results are provided to assess the benefits of the proposed IGS-based downlink NOMA system, which are consistent with the analysis.

1. Introduction

The fifth generation (5G) and beyond communication systems support numerous wireless devices and a variety of services. To meet the massive demand for data throughput, non-orthogonal multiple access (NOMA) has been proposed as a promising technology to improve the spectral efficiency of communication systems [1,2,3,4]. The existing NOMA schemes can be mainly divided into two categories: power domain multiplexing [5,6] and code domain multiplexing [7,8,9]. Power domain multiplexing means different users are allowed to transmit data using the same communication resources with different power levels according to their channel conditions, and the base station (BS) broadcasts the superposed signals for multiple users at different power levels. Typically, the BS allocates more power to the user with a weak channel strength. The weak channel user decodes its signal by treating the signal intended for the user with the strong channel strength as interference, and the strong channel user needs to first remove the signal for the weak channel user from the received signal through successive interference cancellation (SIC) [10] and then decode its own signal. Recently, several works have considered discrete signaling, which can be formed by practical modulation schemes without SIC [11,12]. The discrete signaling was adopted in a multi-user downlink NOMA system without SIC in [11], where the outage rates were very close to the outage capacity region given in [13]. Similarly, the discrete signaling without SIC achieves a rate close to Gaussian signaling with perfect SIC for the interference channel [12]. However, the assumption of Gaussian signaling is still common in the theoretical analysis of communication systems and is useful for its simplicity in mathematical manipulations, and SIC should be considered under the Gaussian signaling setting to characterize the capacity and achievable rate region of a NOMA system. In a real-world scenario, a perfect SIC is impractical because the interference cannot be canceled completely due to deep fading, imperfect decoding, channel estimation errors, and so on [10,14,15]. It has been discovered in [16] that the NOMA system performance converges to an error floor in the high signal-to-noise ratio (SNR) region with imperfect SIC and, thus, a zero diversity order is obtained. Therefore, it is of great interest to consider the detrimental impacts of residual interference due to the imperfect SIC on NOMA systems.
Mitigating interference in communication systems is a challenging research problem. It is well known that statistical signal characteristics significantly affect achievable rates and communication performance. Proper Gaussian signaling (PGS) is a common assumption in communication systems, where the real and imaginary parts of complex signals are uncorrelated zero-mean Gaussian random variables with equal power [17,18]. Most existing studies on communication systems have adopted the PGS assumption without any justification because it is known to achieve the maximum achievable rate in an additive white Gaussian noise channel [17]. However, by allowing the real and imaginary parts of the signals to be correlated or to have unequal powers, improper Gaussian signaling (IGS) can increase the achievable rates and enlarge the capacity regions in interference-limited scenarios, including interference channels [19,20], cognitive radio scenarios [21], relay networks [22,23], and so on. Fundamental studies on the second-order statistics of improper complex random vectors were performed in [24,25,26,27]. IGS was used to model the resultant signals from in-phase and quadrature imbalance in [28]. The usefulness of the IGS for interference alignment in wireless communications was investigated in [29]. In [30], maximally IGS was applied to a two-user single-input–single-output (SISO) interference channel to achieve a close-to-optimal sum rate in the interference-limited regime with strong interference and relatively weak noise. In [31], an achievable rate expression for a general multi-user multiple-input–multiple-output interference channel with IGS was derived, followed by the Pareto boundary characterization of the achievable rate region in a two-user SISO setting. The study was further extended to the multiple-input–single-output scenario in [32]. In [21], IGS was adopted to underlay cognitive radio networks to improve the achievable rate of the unlicensed secondary user. A similar cognitive radio scenario was studied in [33], where only statistical channel state information (CSI) was assumed to be available at the secondary user nodes, and IGS was shown to improve the outage performance of the secondary user while satisfying the quality-of-service (QoS) constraint of the primary user. The benefits of adopting IGS in a two-hop alternate relaying system were investigated in [22], where significant performance improvement can be achieved by IGS, especially when the first hop is a bottleneck.
Although research has been conducted to optimize IGS-based schemes in various wireless communication scenarios to improve the system throughput and reliability, the application of IGS in NOMA systems has just emerged. A two-user downlink NOMA system with imperfect SIC was considered in [34], where the closed-form expressions of the sum rates of both users using IGS were carried out. Assuming that the strong user and the weak user employ IGS and PGS, respectively, the degree of impropriety of the strong user was optimized to maximize the sum rate. The two-user NOMA system was further investigated in [35], where the strong user employs PGS, and the weak user adopts IGS. Optimization problems were formulated to maximize the rate of either the strong user or the weak user subject to its power and the impropriety degree of the weak user, assuming a fixed power and a predetermined QoS requirement of the other user. The sum rate was also maximized using a Q-learning-based algorithm. In [36], the outage probabilities and ergodic capacities were studied in a NOMA system with imperfect SIC, in which the strong user applies IGS, and a characterization of the system performance at high SNR was given. The fairness optimization problem was formulated to minimize the maximum outage probability of the two users by adjusting the power allocation factor and the circularity coefficient of the strong user. However, when different QoS constraints are imposed on the two users, other metrics should be considered.
In this paper, we investigate a downlink NOMA system with imperfect SIC, where a BS serves a strong channel user and a weak channel user. The strong user (SU) can employ either proper or improper signaling, while the weak user (WU) adopts proper signaling. Only the statistical CSI is assumed to be known at the BS, which is more practical than the knowledge of the instantaneous CSI assumed in [34,35]. We provide a solution to improve the performance of the SU while satisfying the QoS of the WU. The main contributions of this paper are summarized as follows:
  • We derive the instantaneous rates of both users in the downlink NOMA system with imperfect SIC. Based on the rate expressions and the Rayleigh fading channel statistics, their outage probabilities are also derived in closed form.
  • Unlike the previous attempt to optimize the fairness of both users [36], we consider a scenario where the two users have different requirements for data throughput and reliability. The performance optimization problem of the SU is formulated, where its power and degree of impropriety are adjusted to minimize its outage probability, subject to a predetermined target rate, while fulfilling the specific maximum outage probability constraint of the WU. The solution to the problem is derived, followed by an analysis of the condition for the IGS scheme to outperform the PGS one, which is mainly determined by the target rates of both users, the power of the signal intended for the WU, and the power ratio between two users.
  • We investigate the outage probabilities of the SU in both PGS and IGS designs at extreme SNRs and find that the IGS can bring benefits at a high target rate of the WU and a large power ratio between the SU and WU. Through simulation, it is shown that the SU benefits from the IGS-based transmission strategy in a certain SNR range under certain conditions involving the target rates of both users and their power ratio.
The rest of this paper is organized as follows. Section 2 describes the two-user downlink NOMA system model. Section 3 derives the outage probabilities for both users in the NOMA system. In Section 4, the signal parameters of the SU are adjusted to minimize its outage probability under both PGS and IGS constraints while guaranteeing the QoS of the WU, along with a brief characterization of the system performance at low and high SNRs. Numerical experiments are then conducted to investigate the outage probabilities of both users in Section 5. Finally, we conclude the paper in Section 6.
The notations that will be used throughout the paper are listed and explained in Table 1.

2. System Model

2.1. Preliminaries for Improper Random Variables

For a zero-mean complex random variable x, its variance σ x 2 and complementary variance σ ˜ x 2 are, respectively, defined as [17]
σ x 2 = E x 2 , σ ˜ x 2 = E x 2 ,
where E { · } denotes the statistical expectation. It is easy to verify that σ x 2 0 and | σ ˜ x 2 | σ x 2 , which is the sufficient and necessary condition for the variance σ x 2 and complementary variance σ ˜ x 2 to be a valid pair. The impropriety degree, or circularity coefficient of x, is defined as
κ x = | σ ˜ x 2 | σ x 2 .
Obviously, we have 0 κ x 1 . The random variable x is called proper if σ ˜ x 2 = 0 , i.e., κ x = 0 ; otherwise, it is called improper. Specifically, x is called maximally improper if κ x = 1 . Furthermore, if x is a Gaussian variable, then the differential entropy of x is a function of both its variance and complementary variance, given by [18]
h x = 1 2 log 2 π e σ x 4 σ ˜ x 2 2 = 1 2 log 2 π e σ x 4 1 κ x 2 .
The interested readers are referred to [18,25,37] for a comprehensive treatment of the topic.

2.2. System Description

Consider a downlink NOMA system where a single-antenna base station (BS) sends independent information to two single-antenna receivers, including a strong channel user (SU, user 1) and a weak channel user (WU, user 2), as shown in Figure 1. The channel condition of the SU is satisfactory, but that of the WU is significantly degraded.
The received signal of the SU and WU can, respectively, be expressed as
y 1 = p 2 h 1 x 2 + p 1 h 1 x 1 + n 1 z 12 ,
y 2 = p 2 h 2 x 2 + p 1 h 2 x 1 + n 2 z 2 ,
where h i denotes the channel coefficient from the BS to user i , i = 1 , 2 , modeled as a Rayleigh fading channel; n i represents the noise at the receiver end of user i, modeled as a zero-mean white proper Gaussian additive random variable with variance σ n i 2 ; p i is the allocated power of user i, and x i is the transmitted signal intended for user i with zero mean and unit variance. According to the NOMA principle, the WU should be allocated with a higher power than the SU, i.e., p 1 p 2 , so that the WU can decode its signal directly by treating the signal of the SU as interference, and the term z 2 in (5) denotes the interference-plus-noise component of the WU. As for the SU, it first decodes the signal of the WU and subtracts it from the received signal y 1 by performing SIC, and then detects its own signal. The term z 12 in (4) denotes the interference-plus-noise component to decode the signal of the WU at the SU end. In practice, the SIC detector at the SU is likely to be imperfect, so there is a residual interference component after decoding. The received signal of the SU after SIC can be modeled as [34]
y 1 , sic = p 1 h 1 x 1 + p 2 h r x 2 + n 1 z 1 ,
where h r represents the residual interference channel coefficient for the imperfect SIC at the SU, and z 1 is the interference-plus-noise component to decode its own signal after SIC.
By the maximum entropy theorem, the PGS can achieve the maximum achievable rate in an additive white Gaussian noise channel [17]. Since the channel condition of the WU has been severely degraded, but the channel condition of the SU makes its QoS requirement easy to fulfill, we assume that the WU uses PGS, and the SU can adopt either PGS or IGS according to its power constraints. Therefore, x 1 in (4)–(6) is an improper Gaussian signal with its impropriety degree denoted as κ , and x 2 is proper. Since both x 1 and x 2 have unit variance, i.e., σ x 1 2 = σ x 2 2 = 1 , their complementary variances obey | σ ˜ x 1 2 | = κ and σ ˜ x 2 2 = 0 , respectively. Based on the analysis in [31], for a received signal y and an interference-plus-noise signal z, the achievable rate is given by
R = h y h z = 1 2 log 2 σ y 4 σ ˜ y 2 2 σ z 4 σ ˜ z 2 2 .
According to (5), the variances and complementary variances of y 2 and z 2 can be, respectively, given by
σ y 2 2 = p 2 h 2 2 + p 1 h 2 2 + σ n 2 2 , σ z 2 2 = p 1 h 2 2 + σ n 2 2 , σ ˜ y 2 2 = σ ˜ z 2 2 = p 1 h 2 2 κ .
Upon substituting (8) into (7), the achievable rate of the WU can be given by
R 2 = h y 2 h z 2 = 1 2 log 2 1 + p 2 2 γ 2 2 + 2 p 2 γ 2 p 1 γ 2 + 1 p 1 γ 2 + 1 2 p 1 2 γ 2 2 κ 2 ,
where γ 2 = | h 2 | 2 / σ n 2 2 is the instantaneous channel-to-noise ratio (CNR) of the WU. Similarly, according to (4), the variances and complementary variances of y 1 and z 12 can, respectively, be given by
σ y 1 2 = p 2 h 1 2 + p 1 h 1 2 + σ n 1 2 , σ z 12 2 = p 1 h 1 2 + σ n 1 2 , σ ˜ y 1 2 = σ ˜ z 12 2 = p 1 h 1 2 κ ,
and the achievable rate to decode the signal of the WU at the SU end is given by
R 12 = h y 1 h z 12 = 1 2 log 2 1 + p 2 2 γ 1 2 + 2 p 2 γ 1 p 1 γ 1 + 1 p 1 γ 1 + 1 2 p 1 2 γ 1 2 κ 2 ,
where γ 1 = | h 1 | 2 / σ n 1 2 is the instantaneous CNR of the SU. It can also be obtained from (6) that
σ y 1 , sic 2 = p 1 h 1 2 + p 2 h r 2 + σ n 1 2 , σ z 1 2 = p 2 h r 2 + σ n 1 2 , σ ˜ y 1 , sic 2 = p 1 h 1 2 κ , σ ˜ z 1 2 = 0 ,
and the achievable rate of the SU when decoding its own signal after SIC is given by
R 1 = h y 1 , sic h z 1 = 1 2 log 2 1 + p 1 2 γ 1 2 1 κ 2 + 2 p 1 γ 1 p 2 γ r + 1 p 2 γ r + 1 2
according to (10) and (7), where γ r = | h r | 2 / σ n 1 2 is the instantaneous CNR of the residual interference channel.

3. Outage Probability Analysis

In practice, since the instantaneous CSI may be unavailable at the BS, owing to the lack of uplink feedback resources, only the statistical CSI of both links is available. The channel coefficients from the BS to user i , i = 1 , 2 , i.e., h i , can be modeled as independent zero-mean proper Gaussian random variables; thus, the instantaneous CSI γ i = | h i | 2 / σ n i 2 are exponential random variables with means E { γ i } = σ h i 2 / σ n i 2 γ ¯ i . The cumulative distribution functions (CDF) and probability density functions of γ i are, respectively, given by
F γ i γ = Pr γ i < γ = 1 exp γ γ ¯ i , γ > 0 , p γ i γ = d d γ F γ i γ = 1 γ ¯ i exp γ γ ¯ i , γ > 0 ,
where Pr [ · ] denotes the probability. The average CNR of the SU is greater than that of the WU, i.e., γ ¯ 1 γ ¯ 2 . The residual interference channel CNR γ r can also be modeled as an exponential random variable with a mean of E { γ r } = σ h r 2 / σ n 1 2 = ξ γ ¯ 1 , where ξ represents the level of residual interference [36,38,39,40,41]. The CDF of γ r is given by
F γ r γ r = Pr γ r < γ = 1 exp γ ξ γ ¯ 1 , γ > 0 , 0 , γ 0 .
The case ξ = 0 refers to perfect SIC, and ξ = 1 means fully imperfect SIC. In what follows, the overall outage probability of the proposed downlink NOMA system employing IGS is investigated to assess its error performance.

3.1. Weak User Outage Probability

Let R 0 , i be the target rate of user i , i = 1 , 2 . The outage probability of the WU, denoted by P out , 2 , is defined as
P out , 2 = Pr R 2 < R 0 , 2 .
Substituting (9) into (16), we have
P out , 2 = Pr p 2 2 γ 2 2 + 2 p 2 γ 2 p 1 γ 2 + 1 p 1 γ 2 + 1 2 p 1 2 γ 2 2 κ 2 < Γ 2 = Pr γ 2 1 + p 2 v ˜ 2 γ 2 1 p 2 v 2 > 0 ,
where Γ 2 = 2 2 R 0 , 2 1 ,
v ˜ 2 = p 2 2 1 + Γ 2 + Γ 2 2 p 1 2 κ 2 p 2 + Γ 2 p 1 p 2 Γ 2 > 0 ,
v 2 = p 2 2 1 + Γ 2 + Γ 2 2 p 1 2 κ 2 + p 2 Γ 2 p 1 p 2 Γ 2 .
Since γ 2 1 + p 2 v ˜ 2 > 0 , if v 2 > 0 , according to (14), the outage probability of the WU in (17) can be rewritten as
P out , 2 = Pr γ 2 < 1 p 2 v 2 = 1 exp 1 γ ¯ 2 p 2 v 2 .
Otherwise, if v 2 0 , then the inequality inside the probability in (17) holds as long as γ 2 > 0 , to yield P out , 2 = 1 . Overall, the outage probability of the WU is given by
P out , 2 = 1 exp 1 γ ¯ 2 p 2 v 2 , v 2 > 0 , 1 , v 2 0 ,
where v 2 is given in (19).
The rest of this paper only considers the case when P out , 2 < 1 , or equivalently, v 2 > 0 holds, so that the outage does not always occur.

3.2. Strong User Outage Probability

An outage occurs at the SU end when the achievable rate to decode its signal is lower than its target rate R 0 , 1 , or the rate to decode the signal of the WU is lower than the target rate R 0 , 2 of the WU. The outage probability of the SU is given by
P out , 1 = Pr R 12 < R 0 , 2 R 1 < R 0 , 1 .
Upon substituting (11) and (13) into (22), we have
P out , 1 = Pr p 2 2 γ 1 2 + 2 p 2 γ 1 p 1 γ 1 + 1 p 1 γ 1 + 1 2 p 1 2 γ 1 2 κ 2 < Γ 2 p 1 2 γ 1 2 1 κ 2 + 2 p 1 γ 1 p 2 γ r + 1 p 2 γ r + 1 2 < Γ 1 ,
where Γ 1 = 2 2 R 0 , 1 1 . Similar to the analysis in Section 3.1, when v 2 > 0 , the first inequality in (23) holds if and only if γ 1 < 1 / ( p 2 v 2 ) . Note that both γ 1 and γ r are in the second inequality in (23). Given a fixed γ 1 , this inequality can be rewritten as
γ r > γ r , 0 γ 1 v 1 γ 1 1 p 2 ,
where
v 1 p 1 1 + 1 + Γ 1 1 κ 2 p 2 Γ 1 .
Therefore, P out , 1 is given by
P out , 1 = Pr γ 1 < 1 p 2 v 2 γ r > γ r , 0 γ 1 = Pr γ 1 < 1 p 2 v 2 + Pr γ 1 1 p 2 v 2 γ r > γ r , 0 γ 1 = F γ 1 1 p 2 v 2 + 1 p 2 v 2 Pr γ r > γ r , 0 γ 1 γ 1 p γ 1 γ 1 d γ 1 = F γ 1 1 p 2 v 2 + 1 p 2 v 2 1 F γ r γ r , 0 γ 1 p γ 1 γ 1 d γ 1 E .
According to (14) and (15), function E in (26) can be rewritten as
E = 1 γ ¯ 1 1 p 2 v 2 exp γ r , 0 γ 1 ξ γ ¯ 1 γ 1 γ ¯ 1 d γ 1 , v 1 > v 2 , F γ 1 1 p 2 v 1 F γ 1 1 p 2 v 2 + 1 γ ¯ 1 1 p 2 v 1 exp γ r , 0 γ 1 ξ γ ¯ 1 γ 1 γ ¯ 1 d γ 1 , v 1 v 2 .
Upon combining (14), (24), (26), and (27), it is not difficult to verify that the SU outage probability P out , 1 can be further expressed as
P out , 1 = 1 exp 1 γ ¯ 1 p 2 v 2 1 exp 1 p 2 ξ γ ¯ 1 v 1 v 2 1 v 1 ξ + 1 , v 1 > v 2 , 1 exp 1 γ ¯ 1 p 2 v 1 1 1 v 1 ξ + 1 , v 1 v 2 ,
where v 1 and v 2 are functions of p 1 , p 2 , and κ , given in (25) and (19), respectively.

4. Optimal Signaling Design

We next study the outage performance optimization of the SU by jointly optimizing its power p 1 and impropriety degree κ , subject to a predetermined QoS of the WU represented by a maximum outage probability threshold P out , th for a target rate R 0 , 2 . The outage performance optimization problem can be formulated as
min p 1 , κ P out , 1
subject to P out , 2 P out , th ,
0 < p 1 p 1 , max ,
0 κ 1 ,
v 2 > 0 ,
where p 1 , max represents the maximum power budget of the SU. According to our system model, the WU is allocated with more power than the SU, so p 1 , max should not be greater than p 2 . However, we will ignore this constraint while solving the optimization (29) in order to show that our proposed optimal signaling design still works when p 1 > p 2 . In the PGS design, the impropriety degree κ of the SU is always zero, so its power p 1 should be optimized subject to (29a,b,d).
According to (28), P out , 1 can be viewed as a function of v 1 and v 2 with the following properties:
  • Given a fixed v 2 , P out , 1 decreases in v 1 .
  • Given a fixed v 1 , P out , 1 decreases in v 2 when v 2 < v 1 and remains static when v 2 v 1 . Note that when v 2 < v 1 , the partial derivative of P out , 1 with respect to v 2 is
    P out , 1 v 2 = 1 γ ¯ 1 p 2 v 2 2 exp 1 γ ¯ 1 p 2 v 2 1 exp 1 p 2 ξ γ ¯ 1 v 1 v 2 1 < 0 .
Upon considering the expression of P out , 2 in (21) together, it is obvious that a greater v 2 may improve the outage performance of both the SU and the WU, and a greater v 1 can improve the outage performance of the SU while maintaining the outage probability of the WU.
Upon replacing P out , 2 in (29a) with the expression in (21), we have
v 2 v 2 , th 1 γ ¯ 2 p 2 log 1 P out , th .
According to (25), we have v 1 > 0 , and
κ 2 = 1 p 2 p 1 v 1 p 2 Γ 1 p 1 v 1 2 .
Substituting (32) into (19) yields p 1 = λ ( v 1 , v 2 ) p 2 , where
λ v 1 , v 2 Γ 1 v 1 2 + v 2 1 Γ 2 2 1 + Γ 2 Γ 2 2 2 v 1 v 2 + 1 Γ 2 .
Therefore, p 1 and κ 2 can, respectively, be expressed as
p 1 = λ v 1 , v 2 p 2 , κ 2 = 1 v 1 λ v 1 , v 2 Γ 1 v 1 λ v 1 , v 2 2 .
Substituting (34) into conditions (29b,c) yields
κ 2 0 λ v 1 , v 2 1 + Γ 1 1 v 1 , κ 1 λ v 1 , v 2 Γ 1 v 1 2 , p 1 p 1 , max λ v 1 , v 2 λ m ,
where λ m = p 1 , max / p 2 . To ease the analysis, denote v 2 p ( v 1 ) , v 2 i ( v 1 ) , and v 2 m ( v 1 ) as the values of v 2 that make both sides of the inequalities in (35) equal, respectively, given by
v 2 p v 1 = 1 1 + Γ 2 1 1 + Γ 1 1 v 1 , v 2 i v 1 = 1 + Γ 2 Γ 2 2 + Γ 1 2 v 1 2 4 Γ 1 v 1 2 + 1 Γ 2 , v 2 m v 1 = λ m 2 + 2 λ m v 1 Γ 1 v 1 2 + 1 + Γ 2 Γ 2 2 + 1 Γ 2 λ m .
Both v 2 p ( v 1 ) and v 2 i ( v 1 ) decrease in v 1 . The function v 2 m ( v 1 ) increases in v 1 when 0 < v 1 λ m / Γ 1 and decreases in v 1 when v 1 λ m / Γ 1 . Next, the following cases are considered to simplify the conditions in (35):
  • When v 1 v 2 + 1 / Γ 2 = 0 , the numerator on the right-hand side of (33) must be zero. After a few mathematical manipulations, we have
    v 1 = v 1 c 1 + Γ 2 Γ 2 1 + Γ 1 , v 2 = v 2 c 1 Γ 2 1 + 1 + Γ 2 1 + Γ 1 ,
    and
    p 1 = v 1 c p 2 Γ 1 1 + 1 + Γ 1 1 κ 2 ,
    where κ can be assigned any value under the conditions in (29b,c). Note that p 1 given in (38) is increasing in κ , so that when κ = 0 , p 1 reaches its minimum v 1 c p 2 ( 1 + Γ 1 1 ) , which has to be no greater than p 1 , max , and thus v 1 c v 1 pm , in which
    v 1 pm = λ m 1 + Γ 1 1
    is the value of v 1 at p 1 = p 1 , max and κ = 0 , to give v 2 p ( v 1 pm ) = v 2 m ( v 1 pm ) . We prefer to let κ = 0 in order to achieve the lowest power of the signal of the SU. Moreover, it is not difficult to verify that
    v 2 c = v 2 p v 1 c = v 2 i v 1 c = v 2 m v 1 c .
  • When v 1 v 2 + 1 / Γ 2 < 0 , according to (35), we have
    κ 2 0 v 2 v 2 p v 1 , κ 1 v 2 v 2 i v 1 , p 1 p 1 , max v 2 v 2 m v 1 .
    Both v 2 p ( · ) and v 2 i ( · ) are decreasing functions according to (36), and v 1 c v 2 c + 1 / Γ 2 = 0 according to (37), to give v 1 < v 1 c and v 2 > v 2 c . According to (36), the inequality v 2 p ( v 1 ) > v 2 i ( v 1 ) holds as long as 0 < v 1 < v 1 c . Since the inequality v 2 p ( v 1 ) v 2 m ( v 1 ) can be equivalently written as ( v 1 v 1 c ) ( v 1 v 1 pm ) 0 , v 1 lies in the interval ( 0 , v 1 pm ] ( 0 , v 1 c ) .
  • When v 1 v 2 + 1 / Γ 2 > 0 , according to (35), we have
    κ 2 0 v 2 v 2 p v 1 , κ 1 v 2 v 2 i v 1 , p 1 p 1 , max v 2 v 2 m v 1 .
    Similar to the analysis in case 2, v 1 and v 2 satisfy v 1 > v 1 c and v 2 < v 2 c , the inequality v 2 p ( v 1 ) < v 2 i ( v 1 ) holds for any v 1 > v 1 c , and v 2 p ( v 1 ) v 2 m ( v 1 ) , as long as 0 v 1 v 1 pm . Hence, v 1 ( v 1 c , v 1 pm ] .
In summary, the conditions in (29) can be equivalently rewritten as
v 2 L v 1 v 2 v 2 U v 1 , v 2 v 2 , th , 0 < v 1 v 1 pm ,
where v 2 L ( · ) and v 2 U ( · ) are, respectively, given by
v 2 L v 1 = max v 2 i v 1 , v 2 m v 1 , v 1 v 1 c , v 2 p v 1 , v 1 > v 1 c ,
v 2 U v 1 = v 2 p v 1 , v 1 v 1 c , min v 2 i v 1 , v 2 m v 1 , v 1 > v 1 c , = v 2 p v 1 , v 1 v 1 c , v 2 i v 1 , v 1 c < v 1 v 1 im , v 2 m v 1 , v 1 > max v 1 c , v 1 im ,
and
v 1 im = 2 λ m Γ 1
is the value of v 1 at p 1 = p 1 , max and κ = 1 , making v 2 i ( v 1 im ) = v 2 m ( v 1 im ) . Since v 2 U v 1 < v 2 U 0 = ( 1 + Γ 2 1 ) 1 for each v 1 > 0 , v 2 , th must be smaller than ( 1 + Γ 2 1 ) 1 , to give p 2 > ( 1 + Γ 2 1 ) / [ γ ¯ 2 log ( 1 P out , th ) ] . Figure 2 plots the feasible region of v 1 and v 2 for an exemplary NOMA scheme for R 1 = 1 bps/Hz, R 2 = 1 bps/Hz, λ m = 0.75 , and v 2 , th = 0.4 , where the quantities v 1 c , v 1 im , v 1 , th p , v 1 , th m , v 1 pm , v 1 zm , and v 1 zp are the values of v 1 at the intersection points. See Table 1 for detailed explanations of these quantities.
Next, the following theorem provides a detailed characterization of the outage probability of the SU, P out , 1 , which helps to find the optimal v 1 and v 2 to minimize it.
Figure 2. Feasible region of v 1 and v 2 with R 1 = 1 bps/Hz, R 2 = 1 bps/Hz, λ m = 0.75 , and v 2 , th = 0.4 .
Figure 2. Feasible region of v 1 and v 2 with R 1 = 1 bps/Hz, R 2 = 1 bps/Hz, λ m = 0.75 , and v 2 , th = 0.4 .
Entropy 25 01172 g002
Theorem 1.
Given that v 2 is a monotonically decreasing function of v 1 , and ( d v 2 d v 1 ) is a non-decreasing function of v 1 . Let v 1 d = arg min v 1 P out , 1 . Then P out , 1 monotonically decreases in v 1 when v 1 v 1 d and increases when v 1 v 1 d , and v 1 d > v e > v 2 ( v 1 d ) , where v e is the value of v 1 , such that v 2 = v 1 .
Proof. 
The derivative of P out , 1 in (28) with respect to v 1 is given by
d P out , 1 d v 1 = 1 p 2 γ ¯ 1 v 2 exp 1 γ ¯ 1 p 2 min v 1 , v 2 1 p 2 ξ γ ¯ 1 max v 1 v 2 1 , 0 × 1 v 2 exp 1 p 2 ξ γ ¯ 1 max v 1 v 2 1 , 0 1 d v 2 d v 1 v 1 + ξ + p 2 γ ¯ 1 ξ v 2 v 1 + ξ 2 D v 1 ,
where D ( v 1 ) is an increasing function of v 1 that is smaller than zero when v 1 v e and goes to infinity when v 1 / v 2 . Therefore, there is a unique v 1 d that makes D ( v 1 d ) = 0 , and v 1 d > v e . When v 1 < v 1 d , we have d P out , 1 d v 1 < 0 ; thus, P out , 1 decreases in v 1 . When v 1 > v 1 d , we have d P out , 1 d v 1 > 0 and, thus, P out , 1 increases in v 1 . □

4.1. PGS Design

In the PGS design, the impropriety degree of the SU κ 0 and, thus, v 2 v 2 p ( v 1 ) , where v 1 has to meet the constraints in (43). Note that the first condition in (43), i.e., v 2 L ( v 1 ) v 2 v 2 U ( v 1 ) , holds as long as 0 < v 1 v 1 pm , so this condition is irrelevant to the range of v 1 . Therefore, the original problem can be equivalently expressed as
min v 1 P out , 1 subject to v 2 p v 1 v 2 , th , 0 < v 1 v 1 pm .
According to Theorem 1, since
d v 2 p v 1 d v 1 = 1 + Γ 1 1
is a constant, there exists a v 1 dp , such that P out , 1 decreases in v 1 when 0 < v 1 v 1 dp and increases in v 1 when v 1 v 1 dp , and v 1 dp > v e p , where
v e p = 1 1 + Γ 1 1 + Γ 2 1
is the value of v 1 , making v 2 p ( v 1 ) = v 1 . The substitution of v 2 p ( · ) in (36) into the first constraint in (48) yields
v 1 v 1 , th p 1 1 + Γ 1 1 1 1 + Γ 2 1 v 2 , th .
Therefore, the optimal v 1 = min { v 1 pm , v 1 , th p , v 1 dp } . Note that by replacing d v 2 d v 1 in D ( · ) given in (47) with the expression in (49), we obtain
D p v 1 1 + Γ 1 1 v 2 p v 1 exp 1 p 2 ξ γ ¯ 1 max v 1 v 2 p v 1 1 , 0 1 v 1 + ξ + p 2 γ ¯ 1 ξ v 2 p v 1 v 1 + ξ 2 ,
which is a monotonically increasing function, and D p ( v 1 dp ) = 0 , so that the optimal v 1 is given by
v 1 op = min v 1 pm , v 1 , th p , D p min v 1 pm , v 1 , th p 0 , v 1 dp , D p min v 1 pm , v 1 , th p > 0 ,
where v 1 dp can be obtained with a bisection search, and the optimal transmit power of the SU for minimizing P out , 1 in the PGS design is given by p 1 op = v 1 op p 2 ( 1 + Γ 1 1 ) .

4.2. IGS Design

When the SU adopts IGS, the quantities v 1 and v 2 are jointly optimized to minimize P out , 1 subject to the constraints given in (43). To solve the optimization problem (29) with two variables, we first represent one of the variables with the other one, so as to convert the original problem to a single-variable optimization. Since both P out , 1 and P out , 2 decrease in v 2 , we first set v 2 = v 2 U ( v 1 ) . Similar to the analysis in Section 4.1, the first condition in (43), i.e., v 2 L ( v 1 ) v 2 v 2 U ( v 1 ) , is irrelevant to the range of v 1 . Therefore, the original problem (29) can be simplified to
min v 1 P out , 1 subject to v 2 U v 1 v 2 , th , 0 < v 1 v 1 pm .
Since all three functions v 2 p ( · ) , v 2 i ( · ) , and v 2 m ( · ) defined in (36) are decreasing functions, v 2 U ( · ) given in (45) is also decreasing. Therefore, the conditions in (54) can be equivalently written as 0 < v 1 v 1 , th , where
v 1 , th v 1 , th p , v 2 , th max v 2 c , v 2 p v 1 pm , v 1 , th i , v 2 i v 1 im < v 2 , th < v 2 c , v 1 , th m , v 2 p v 1 pm v 2 , th min v 2 i v 1 im , v 2 c , v 1 pm , v 2 , th < v 2 p v 1 pm ,
v 1 , th i and v 1 , th m are the solutions to v 2 i ( · ) = v 2 , th and v 2 m ( · ) = v 2 , th , given by
v 1 , th i 1 + Γ 2 Γ 2 v 2 , th 1 2 Γ 1 Γ 2 Γ 2 v 2 , th 1
and
v 1 , th m λ m + λ m 2 Γ 1 v 2 , th 1 Γ 2 + λ m 2 λ m 2 1 + Γ 2 Γ 2 2 Γ 1 ,
respectively.
Since v 2 U ( v 1 ) given in (45) can be any of v 2 p ( v 1 ) , v 2 i ( v 1 ) , or v 2 m ( v 1 ) , three cases are studied in the sequel to determine the optimal v 1 :
  • v 2 U ( v 1 ) = v 2 p ( v 1 ) .
    In this case, we have v 1 v 1 c , and the IGS scheme reduces to the PGS scheme introduced in Section 4.1. Since v 1 c < v 2 c = v 2 p ( v 1 c ) , v e p = v 2 p ( v e p ) , and v 2 p ( · ) is a decreasing function, we have v 1 c < v e p < v 1 dp ; thus, P out , 1 decreases in v 1 as v 1 v 1 c . If v 1 , th v 1 c , then the optimal solution to (54) is given by v 1 = v 1 , th , and the optimal power and impropriety degree of the SU are p 1 = p 1 op = v 1 , th p 2 ( 1 + Γ 1 1 ) and κ = 0 , respectively, which are the same as the results presented in Section 4.1. Otherwise, if v 1 , th > v 1 c , then the optimal v 1 that minimizes the SU outage probability P out , 1 cannot be achieved in ( 0 , v 1 c ] .
  • v 2 U ( v 1 ) = v 2 m ( v 1 ) .
    In this case, we have v 1 v 1 c and v 2 m ( v 1 ) v 2 i ( v 1 ) , i.e., max ( v 1 c , v 1 im ) v 1 v 1 , th . Since
    d d v 1 d v 2 m v 1 d v 1 = Γ 1 + 1 λ m 2 + Γ 1 1 + Γ 2 Γ 2 2 λ m 2 + 2 λ m v 1 Γ 1 v 1 2 + 1 + Γ 2 Γ 2 2 3 / 2 > 0 ,
    there exists a v 1 dm , such that P out , 1 decreases in v 1 when v 1 v 1 dm and increases when v 1 v 1 dm according to Theorem 1. Moreover, we have v 1 dm v 2 m ( v 1 dm ) and D m ( v 1 dm ) = 0 , where
    D m v 1 1 v 2 m v 1 exp 1 p 2 ξ γ ¯ 1 max v 1 v 2 m v 1 1 , 0 1 × d v 2 m v 1 d v 1 v 1 + ξ + p 2 γ ¯ 1 ξ v 2 m v 1 v 1 + ξ 2 ,
    d v 2 m v 1 d v 1 = Γ 1 v 1 λ m λ m 2 + 2 λ m v 1 Γ 1 v 1 2 + 1 + Γ 2 Γ 2 2 .
    Therefore, if max ( v 1 c , v 1 im ) v 1 , th , then the optimal v 1 in [ max ( v 1 c , v 1 im ) , v 1 , th ] that minimizes P out , 1 can be expressed as
    v 1 om = v 1 im , D m v 1 im 0 , v 1 , th , D m v 1 , th 0 , v 1 dm , otherwise ,
    where v 1 dm can be obtained with the bisection search.
  • v 2 U ( v 1 ) = v 2 i ( v 1 ) .
    In this case, we have v 1 c v 1 min ( v 1 im , v 1 , th ) . Unfortunately, the optimization is not simple compared with the previous cases, which have some interesting monotonic characteristics. However, inspired by the solution trend of the previous cases, v 1 can be given by
    v 1 oi = min v 1 im , v 1 , th , D i min v 1 im , v 1 , th 0 , v 1 di , D i min v 1 im , v 1 , th > 0 ,
    where v 1 di is the solution to D i ( v 1 ) = 0 with D i ( · ) given by
    D i v 1 1 v 2 i v 1 exp 1 p 2 ξ γ ¯ 1 max v 1 v 2 i v 1 1 , 0 1 × d v 2 i v 1 d v 1 v 1 + ξ + p 2 γ ¯ 1 ξ v 2 i v 1 v 1 + ξ 2 ,
    in which
    d v 2 i v 1 d v 1 = Γ 1 2 Γ 1 2 v 1 2 4 1 + Γ 2 Γ 2 2 + Γ 1 2 v 1 2 .
    Likewise, v 1 di can be obtained with the bisection search.
In summary, the solution to (54) can be given by
v 1 = v 1 , th , v 1 , th v 1 c , v 1 om , v 1 im v 1 c < v 1 , th , v 1 oi , v 1 c < v 1 , th v 1 im , arg min v 1 v 1 om , v 1 oi P out , 1 , v 1 c < v 1 im < v 1 , th .
Consider the situation that v 1 c < v 1 im < v 1 , th . Since P out , 1 ( v 1 , v 2 ) is non-increasing in v 2 , when v 1 > v 1 im , we have v 2 i ( v 1 ) > v 2 m ( v 1 ) and P out , 1 ( v 1 , v 2 i ( v 1 ) ) P out , 1 ( v 1 , v 2 m ( v 1 ) ) , so when v 1 = v 1 im , we have d d v 1 P out , 1 ( v 1 , v 2 i ( v 1 ) ) d d v 1 P out , 1 ( v 1 , v 2 m ( v 1 ) ) and, thus, D i ( v 1 im ) D m ( v 1 im ) according to (47), (59), and (63). By combining (61) and (62), the optimal v 1 can be given by
arg min v 1 v 1 om , v 1 oi P out , 1 = v 1 di , D i v 1 im > 0 , v 1 im , D i v 1 im 0 D m v 1 im , v 1 , th , D m v 1 , th 0 , v 1 dm , otherwise .
By combining (65) and (66), the solution to (54) can be expressed as
v 1 = v 1 , th , v 1 im v 1 , th and D m v 1 , th 0 , or , v 1 im > v 1 , th and D i v 1 , th 0 , v 1 im , v 1 im v 1 , th and D i v 1 im 0 D m v 1 im , v 1 di , D i min v 1 im , v 1 , th > 0 , v 1 dm , otherwise ,
where both v 1 di ( v 1 c , min ( v 1 im , v 1 , th ) ] and v 1 dm [ max ( v 1 im , v 1 c ) , v 1 , th ] can be obtained with the bisection search. The corresponding power and impropriety degree of the SU, i.e., p 1 and κ , of the proposed IGS design for minimizing the outage probability of the SU, P out , 1 , are given by
p 1 = v 1 p 2 1 + Γ 1 1 , v 1 v 1 c , v 1 p 2 Γ 1 / 2 , v 1 c < v 1 v 1 im , p 1 , max , v 1 > max v 1 c , v 1 im
and
κ = 0 , v 1 v 1 c , 1 , v 1 c < v 1 v 1 im , 1 v 1 p 2 p 1 , max Γ 1 v 1 p 2 p 1 , max 2 , v 1 > max v 1 c , v 1 im ,
respectively.
Based on the above analysis, the IGS design outperforms the PGS design if v 2 U ( v 1 ) v 2 p ( v 1 ) , or equivalently, v 1 c < v 1 < v 1 pm according to (45). Since v 1 is given in (67), this condition can also be expressed as, v 1 , th > v 1 c , and either v 1 , th < v 1 pm or D m ( v 1 pm ) > 0 is satisfied. According to (55), if v 2 , th < v 2 c and either v 2 , th > v 2 p ( v 1 pm ) or D m ( v 1 pm ) > 0 is guaranteed, then the IGS design can achieve a lower outage probability of the SU than the PGS design.

4.3. Optimal Outage Performance in Extreme SNR

In what follows, the power ratio λ m = p 1 , max / p 2 is assumed to be a constant in order to investigate how the SNR affects the optimality of our proposed IGS scheme. Note that all the expressions of v 2 p ( · ) , v 2 i ( · ) , and v 2 m ( · ) given in (36) are irrelevant to the value of p 2 , so v 1 c , v 1 pm , and v 1 im all remain constant as p 2 increases. However, both v 2 , th defined in (31) and D ( v 1 ) given in (47) monotonically decrease in p 2 .
At low SNRs, v 2 , th reaches a greater value. The PGS design achieves the optimal outage performance of the SU when the SNR is low enough so that v 2 , th v 2 c , or equivalently, p 2 [ γ ¯ 2 v 2 c log ( 1 P out , th ) ] 1 . Therefore, the IGS design is unlikely to provide better outage performance than the traditional PGS design at a low SNR.
In contrast, at high SNRs, v 2 , th reaches a smaller value and even approaches zero as p 2 . According to (55), v 1 , th can be expressed as
v 1 , th = v 1 , th m , v 2 , th v 2 p v 1 pm , v 1 pm , v 2 , th < v 2 p v 1 pm = min v 1 , th m , v 1 pm
at a high SNR, which is greater than v 1 im since v 2 m ( · ) is decreasing and v 2 , th = v 2 m ( v 1 , th m ) < v 2 m ( v 1 im ) . when p 2 is large enough so that both D i ( v 1 im ) and D i ( v 1 , th ) are negative, according to (67), v 1 can be given by
v 1 = v 1 , th , D m v 1 , th 0 , v 1 dm , otherwise .
Note that (71) has a similar form to the expression of v 1 op given in (53). According to (28), as p 2 approaches infinity, the outage probability of the SU converges to
lim p 2 P out , 1 = ξ v 1 + ξ .
If v 2 p ( v 1 pm ) 0 , i.e., λ m 1 + Γ 2 1 1 according to (36) and (39), then v 2 , th > 0 v 2 p ( v 1 pm ) , so the IGS design would continue to achieve a lower outage probability of the SU than the PGS design as p 2 approaches infinity.
In the PGS design, since v 2 p ( · ) is a decreasing function, and v 2 , th = v 2 p ( v 1 , th p ) > v 2 p ( v 1 pm ) , we have v 1 pm > v 1 , th p and, thus, min { v 1 pm , v 1 , th p } = v 1 , th p v 1 zp as p 2 , where v 1 zp is the solution to v 2 p ( · ) = 0 , given by
v 1 zp = 1 1 + Γ 1 1 1 + Γ 2 1 .
Since D p ( v 1 ) approaches as p 2 and approaches as v 1 v 1 zp , the solution to D p ( · ) = 0 , i.e., v 1 dp , approaches v 1 zp as p 2 . Therefore, v 1 op given in (53) approaches v 1 zp and, consequently, the outage probability of the SU, P out , 1 , approaches ξ / ( v 1 zp + ξ ) as p 2 . In the IGS design, according to (70), the quantity v 1 , th = v 1 , th m v 1 zm as p 2 , where
v 1 zm = λ m + λ m 2 + Γ 1 2 λ m + 1 / Γ 2 Γ 1
is the solution to v 2 m ( · ) = 0 . Similarly, since D m ( v 1 ) approaches as p 2 and approaches as v 1 v 1 zm , according to (71), the quantity v 1 v 1 zm and, thus, P out , 1 approaches ξ / ( v 1 zm + ξ ) as p 2 . When v 2 p ( v 1 pm ) < 0 , we have v 1 zm > v 1 zp ; therefore, the IGS design always yields an outage probability of the SU that is strictly smaller than that of the PGS design. This indicates that the IGS design outperforms the PGS design at a high SNR with a high target rate of the WU or a high maximum allowable power ratio between the SU and the WU.
Otherwise, if v 2 p ( v 1 pm ) > 0 , i.e., λ m < ( 1 + Γ 2 1 ) 1 , then a sufficiently high SNR would make v 2 , th < v 2 p ( v 1 pm ) , so v 1 , th = v 1 pm according to (70). Since D m ( v 1 pm ) as p 2 , the optimal v 1 is v 1 = v 1 pm , and, thus, the optimal outage performance of the SU is achieved by the PGS with the maximum power budget of the SU, and the IGS design reduces to the PGS one with P out , 1 approaching ξ / ( v 1 pm + ξ ) as the SNR increases. Therefore, the proposed IGS design outperforms the PGS design only in a certain SNR range.

5. Numerical Results

In order to evaluate the benefits of our designed IGS scheme for the downlink two-user NOMA system under imperfect SIC, numerical experiments were conducted in the MATLAB programming environment. Throughout the comparisons between PGS and IGS schemes, the effects of different system parameters on the benefits of the IGS-based system over the PGS-based system were highlighted. The experiments simulated both users’ outage probabilities for both the PGS- and IGS-based systems versus the SNR of the WU, assuming the different maximum power ratios between two users λ m , levels of residual interference due to imperfect SIC ξ , and CNR ratios between two users γ ¯ 1 / γ ¯ 2 . The SNR of the WU was defined as p 2 / σ n 2 2 . Unless otherwise specified, the simulation parameters were set according to Table 2. In the PGS scheme, both v 1 op and v 2 p ( v 1 op ) were calculated according to (53) and (36) to obtain both users’ outage probabilities, given in (21) and (28). In the IGS scheme, we calculated v 1 according to (67) and v 2 U ( v 1 ) according to (45), and obtained both users’ outage probabilities accordingly.
We first simulated the outage probabilities of both users for both the PGS- and IGS-based systems, assuming different maximum power ratios λ m , given R 1 = R 2 = 1 bps/Hz, as shown in Figure 3. The outage performance of the SU in both the PGS and IGS schemes improves with the increase in SNR. When the SNR of the WU is lower than 14.4 dB, both the PGS and IGS schemes at different λ m share the same outage probabilities of the WU. This is because p 2 is small enough, so that v 2 , th is no smaller than both v 2 c and v 2 p ( v 1 pm ) , making v 1 = v 1 op v 1 , th < v 1 pm . Thus, the PGS scheme achieves the optimal outage performance with p 1 < p 1 , max = λ m p 2 , indicating that the minimum achievable P out , 1 is irrelevant to λ m . As the SNR increases, the outage probability of the SU under the PGS scheme continues to decrease and eventually saturates at high SNR when p 1 reaches p 1 , max . In comparison, the IGS scheme achieves a lower outage probability of the SU for λ m 0.75 , but the benefit of using IGS eventually decreases and even disappears as the SNR increases, i.e., the IGS scheme outperforms PGS only in a certain range of SNR, which is consistent with the analysis given at the end of Section 4.3. It can also be observed that the IGS scheme is more likely to outperform the PGS one with a larger λ m = p 1 , max / p 2 , i.e., a higher maximum power threshold of the SU. This result is consistent with the one in [36], in that improper signaling can achieve higher fairness with a higher power allocation factor of the SU. The outage probability of the WU is equal to its maximum threshold P out , th at a low SNR. As the SNR increases, the WU achieves a lower outage probability while satisfying the optimal outage performance of the SU. When λ m < 1 , since v 2 p ( v 1 pm ) > 0 , according to Section 4.3, the optimal outage performance of the SU is achieved by the PGS design with the maximum power of the SU, p 1 , max , and P out , 2 is inversely proportional to SNR and identical in both the PGS and IGS designs. However, when λ m = 1 , we have v 2 p ( v 1 pm ) = 0 ; therefore, P out , 2 decreases more slowly. The IGS-based system achieves a lower outage probability of the WU.
Next, we considered another pair of the target rates of both users, given by R 1 = 1 bps/Hz and R 2 = 1.5 bps/Hz. The outage probabilities of both users versus the SNR of the WU are shown in Figure 4. It is clear that for λ m = 0.75 , the outage probabilities of the SU under PGS and IGS saturate at different values at high SNR. The IGS achieves a lower outage probability, and the gap between the IGS and PGS probabilities is about 0.005. This is because v 2 p ( v 1 pm ) < 0 and, thus, v 1 > v 1 op at a high SNR, which makes P out , 1 smaller according to (72). This is consistent with the benefits of IGS in interference-limited scenarios, which have been mentioned in various previous works, including [36]. However, since the outage probability is used as a metric in our design, only with a high target rate can IGS achieve such benefits.
We further investigated the outage probabilities of both users for both signaling schemes assuming different levels of residual interference ξ after SIC, as shown in Figure 5. As ξ increases, the outage probabilities of the SU increase due to stronger residual interference. Note that the minimum SNRs that allow IGS to achieve a better performance than the PGS scheme are the same for different ξ since the values of p 2 that satisfy v 2 , th = v 2 c are the same. Figure 6 shows the outage probabilities of both users as functions of ξ , assuming different powers of the WU. It can be observed that P out , 1 is approximately linear in ξ at a high SNR, which is consistent with (72).
Figure 4. The outage probabilities of both the SU and WU versus the SNR of the WU for different λ m when R 1 = 1 bps/Hz, R 2 = 1.5 bps/Hz.
Figure 4. The outage probabilities of both the SU and WU versus the SNR of the WU for different λ m when R 1 = 1 bps/Hz, R 2 = 1.5 bps/Hz.
Entropy 25 01172 g004
Figure 7 shows the outage probabilities of both users assuming different CNRs of the SU, i.e., γ ¯ 1 . Since the CNR of the WU is 0 dB, γ ¯ 1 can also be considered as the CNR ratio between the SU and the WU. As the CNR of the SU increases, the outage probability of the SU decreases due to its stronger channel strength. The outage probability of the WU is higher at a high SNR as γ ¯ 1 increases. Similarly, the minimum SNR for IGS to outperform PGS is the same for different γ ¯ 1 . However, P out , 1 approaches the same value at a high SNR because lim p 2 P out , 1 given in (72) is irrelevant to γ ¯ 1 .

6. Conclusions

We investigated the outage performance of a two-user downlink NOMA system with a strong user (SU) and a weak user (WU) by adopting improper Gaussian signaling (IGS) and proper Gaussian signaling (PGS) schemes, respectively. With the statistical CSI available at the base station, we derived the closed-form outage probabilities of both users and provided the solution to the optimization by adjusting the power and the impropriety degree of the SU, subject to the outage probability constraints on the WU. We have shown that, whether the proposed IGS design can outperform the PGS design is mainly determined by the target rates of both users, the SNR of the WU, and the maximum allowable power ratio between the SU and the WU. The IGS is more likely to achieve a lower outage of the SU at a medium SNR than at a low SNR. The IGS design can also improve the outage performance of the SU at a fairly high SNR with a high target rate of the WU and a large power ratio between the SU and the WU. Numerical results on the downlink NOMA systems with both PGS and IGS support the analysis.
In future work, we shall consider the case where both users in the system employ IGS, and optimize the outage performance by jointly designing the powers and the impropriety degrees of both users, which can potentially achieve better outage performance than the current results, since in this work we assumed that the WU uses traditional PGS with a fixed signal power. Moreover, since we only investigated the SISO scenario to simplify the performance analysis in this work, we shall further extend our outage performance analysis of NOMA systems with more generalized multi-antenna settings, such as multiple-input–single-output (MISO) and multiple-input–multiple-output (MIMO), to enable a higher data rate and satisfy the high-throughput demand for the expansion of the Internet of Things. It is also of interest to explore the outage performance of IGS-based NOMA systems with advanced interference cancellation techniques, such as deep learning-based approaches or iterative interference cancellation.

Author Contributions

Conceptualization, Y.L., H.C. and Y.X.; formal analysis, Y.L.; funding acquisition, H.G., Y.X. and W.P.; investigation, Y.L.; methodology, Y.L.; project administration, Y.X.; supervision, Y.X. and W.P.; validation, Y.L. and H.C.; visualization, Y.L.; writing—original draft, Y.L.; writing—review and editing, H.C. and Y.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Key-Area Research and Development Program of Guangdong Province under grant 2019B090904014 and the Fundamental Research Funds for the Central Universities under grant 2242022k30002.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Simulation parameters and formulae were given in this article. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
NOMAnon-orthogonal multiple access
IGSimproper Gaussian signaling
SICsuccessive interference cancellation
SUstrong channel user
WUweak channel user
PGSproper Gaussian signaling
CSIchannel state information
BSbase station
SNRsignal-to-noise ratio
SISOsingle-input-single-output
QoSquality-of-service
CDFcumulative distribution function

References

  1. Benjebbour, A.; Saito, K.; Li, A.; Kishiyama, Y.; Nakamura, T. Non-orthogonal Multiple Access (NOMA): Concept, Performance Evaluation and Experimental Trials. In Proceedings of the 2015 International Conference on Wireless Networks and Mobile Communications (WINCOM), Marrakech, Morocco, 20–23 October 2015; pp. 1–6. [Google Scholar] [CrossRef]
  2. Dai, L.; Wang, B.; Yuan, Y.; Han, S.; I, C.L.; Wang, Z. Non-Orthogonal Multiple Access for 5G: Solutions, Challenges, Opportunities, and Future Research Trends. IEEE Commun. Mag. 2015, 53, 74–81. [Google Scholar] [CrossRef]
  3. Xu, L.; Xing, H.; Deng, Y.; Nallanathan, A.; Zhuansun, C. Fairness-Aware Throughput Maximization for Underlaying Cognitive NOMA Networks. IEEE Syst. J. 2021, 15, 1881–1892. [Google Scholar] [CrossRef]
  4. Kwon, Y.; Baek, H.; Lim, J. Uplink NOMA Using Power Allocation for UAV-Aided CSMA/CA Networks. IEEE Syst. J. 2021, 15, 2378–2381. [Google Scholar] [CrossRef]
  5. Higuchi, K.; Kishiyama, Y. Non-Orthogonal Access with Random Beamforming and Intra-Beam SIC for Cellular MIMO Downlink. In Proceedings of the 2013 IEEE 78th Vehicular Technology Conference (VTC Fall), Las Vegas, NV, USA, 2–5 September 2013; pp. 1–5. [Google Scholar] [CrossRef]
  6. Saito, Y.; Kishiyama, Y.; Benjebbour, A.; Nakamura, T.; Li, A.; Higuchi, K. Non-Orthogonal Multiple Access (NOMA) for Cellular Future Radio Access. In Proceedings of the 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2–5 June 2013; pp. 1–5. [Google Scholar] [CrossRef]
  7. Hoshyar, R.; Wathan, F.P.; Tafazolli, R. Novel Low-Density Signature for Synchronous CDMA Systems Over AWGN Channel. IEEE Trans. Signal Process. 2008, 56, 1616–1626. [Google Scholar] [CrossRef] [Green Version]
  8. Nikopour, H.; Baligh, H. Sparse Code Multiple Access. In Proceedings of the 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), London, UK, 8–11 September 2013; pp. 332–336. [Google Scholar] [CrossRef]
  9. Yu, Q.Y.; Chen, H.H.; Meng, W.X. A Unified Multiuser Coding Framework for Multiple-Access Technologies. IEEE Syst. J. 2019, 13, 3781–3792. [Google Scholar] [CrossRef]
  10. Zeng, M.; Yadav, A.; Dobre, O.A.; Tsiropoulos, G.I.; Poor, H.V. Capacity Comparison Between MIMO-NOMA and MIMO-OMA With Multiple Users in a Cluster. IEEE J. Sel. Areas Commun. 2017, 35, 2413–2424. [Google Scholar] [CrossRef]
  11. Qiu, M.; Huang, Y.C.; Yuan, J.; Wang, C.L. Lattice-Partition-Based Downlink Non-Orthogonal Multiple Access Without SIC for Slow Fading Channels. IEEE Trans. Commun. 2019, 67, 1166–1181. [Google Scholar] [CrossRef]
  12. Qiu, M.; Huang, Y.C.; Yuan, J. Discrete Signaling and Treating Interference as Noise for the Gaussian Interference Channel. IEEE Trans. Inf. Theory 2021, 67, 7253–7284. [Google Scholar] [CrossRef]
  13. Zhang, W.; Kotagiri, S.P.; Laneman, J.N. On Downlink Transmission Without Transmit Channel State Information and With Outage Constraints. IEEE Trans. Inf. Theory 2009, 55, 4240–4248. [Google Scholar] [CrossRef]
  14. Xu, Y.; Wang, G.; Wei, S.; Blasch, E.; Pham, K.; Chen, G. High-Throughput, Cyber-Secure Multiuser Superposition Covert Avionics System. IEEE Aerosp. Electron. Syst. Mag. 2018, 33, 4–15. [Google Scholar] [CrossRef]
  15. Kang, J.M.; Kim, I.M.; Chun, C.J. Deep Learning-Based MIMO-NOMA with Imperfect SIC Decoding. IEEE Syst. J. 2020, 14, 3414–3417. [Google Scholar] [CrossRef]
  16. Yue, X.; Qin, Z.; Liu, Y.; Kang, S.; Chen, Y. A Unified Framework for Non-Orthogonal Multiple Access. IEEE Trans. Commun. 2018, 66, 5346–5359. [Google Scholar] [CrossRef] [Green Version]
  17. Neeser, F.D.; Massey, J.L. Proper Complex Random Processes with Applications to Information Theory. IEEE Trans. Inf. Theory 1993, 39, 1293–1302. [Google Scholar] [CrossRef] [Green Version]
  18. Schreier, P.J.; Scharf, L.L. Statistical Signal Processing of Complex-Valued Data: The Theory of Improper and Noncircular Signals; Cambridge University Press: Cambridge, UK, 2010. [Google Scholar] [CrossRef]
  19. Jafar, S.A.; Cadambe, V.; Wang, C. Interference Alignment with Asymmetric Complex Signaling. In Proceedings of the 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 30 September–2 October 2009; pp. 991–996. [Google Scholar] [CrossRef]
  20. Lagen, S.; Agustin, A.; Vidal, J. On the Superiority of Improper Gaussian Signaling in Wireless Interference MIMO Scenarios. IEEE Trans. Commun. 2016, 64, 3350–3368. [Google Scholar] [CrossRef] [Green Version]
  21. Lameiro, C.; Santamaría, I.; Schreier, P.J. Benefits of Improper Signaling for Underlay Cognitive Radio. IEEE Wirel. Commun. Lett. 2015, 4, 22–25. [Google Scholar] [CrossRef] [Green Version]
  22. Gaafar, M.; Amin, O.; Ikhlef, A.; Chaaban, A.; Alouini, M.S. On Alternate Relaying With Improper Gaussian Signaling. IEEE Commun. Lett. 2016, 20, 1683–1686. [Google Scholar] [CrossRef] [Green Version]
  23. Gaafar, M.; Khafagy, M.G.; Amin, O.; Schaefer, R.F.; Alouini, M.S. Full-Duplex Relaying With Improper Gaussian Signaling Over Nakagami-m Fading Channels. IEEE Trans. Commun. 2018, 66, 64–78. [Google Scholar] [CrossRef] [Green Version]
  24. Picinbono, B. On Circularity. IEEE Trans. Signal Process. 1994, 42, 3473–3482. [Google Scholar] [CrossRef]
  25. Picinbono, B.; Chevalier, P. Widely Linear Estimation with Complex Data. IEEE Trans. Signal Process. 1995, 43, 2030–2033. [Google Scholar] [CrossRef]
  26. Picinbono, B. Second-Order Complex Random Vectors and Normal Distributions. IEEE Trans. Signal Process. 1996, 44, 2637–2640. [Google Scholar] [CrossRef]
  27. Schreier, P.J.; Scharf, L.L. Second-Order Analysis of Improper Complex Random Vectors and Processes. IEEE Trans. Signal Process. 2003, 51, 714–725. [Google Scholar] [CrossRef]
  28. Jalali, F.; Zaimbashi, A. Cognitive Radio Spectrum Sensing Under Joint TX/RX I/Q Imbalance and Uncalibrated Receiver. IEEE Syst. J. 2020, 14, 105–112. [Google Scholar] [CrossRef]
  29. Cadambe, V.R.; Jafar, S.A.; Wang, C. Interference Alignment With Asymmetric Complex Signaling–Settling the Høst-Madsen-Nosratinia Conjecture. IEEE Trans. Inf. Theory 2010, 56, 4552–4565. [Google Scholar] [CrossRef]
  30. Ho, Z.K.; Jorswieck, E. Improper Gaussian Signaling on the Two-User SISO Interference Channel. IEEE Trans. Wirel. Commun. 2012, 11, 3194–3203. [Google Scholar] [CrossRef]
  31. Zeng, Y.; Yetis, C.M.; Gunawan, E.; Guan, Y.L.; Zhang, R. Transmit Optimization With Improper Gaussian Signaling for Interference Channels. IEEE Trans. Signal Process. 2013, 61, 2899–2913. [Google Scholar] [CrossRef] [Green Version]
  32. Zeng, Y.; Zhang, R.; Gunawan, E.; Guan, Y.L. Optimized Transmission with Improper Gaussian Signaling in the K-User MISO Interference Channel. IEEE Trans. Wirel. Commun. 2013, 12, 6303–6313. [Google Scholar] [CrossRef] [Green Version]
  33. Amin, O.; Abediseid, W.; Alouini, M.S. Underlay Cognitive Radio Systems With Improper Gaussian Signaling: Outage Performance Analysis. IEEE Trans. Wirel. Commun. 2016, 15, 4875–4887. [Google Scholar] [CrossRef] [Green Version]
  34. Abu Mahady, I.; Bedeer, E.; Ikki, S.; Yanikomeroglu, H. Sum-Rate Maximization of NOMA Systems Under Imperfect Successive Interference Cancellation. IEEE Commun. Lett. 2019, 23, 474–477. [Google Scholar] [CrossRef]
  35. Cheng, H.; Xia, Y.; Huang, Y.; Yang, L. Improper Gaussian Signaling for Downlink NOMA Systems With Imperfect Successive Interference Cancellation. IEEE Trans. Wirel. Commun. 2022, 21, 7753–7763. [Google Scholar] [CrossRef]
  36. Hong, S.G.; Bahk, S. Performance Analysis and Fairness Maximization in NOMA Systems With Improper Gaussian Signaling Under Imperfect Successive Interference Cancellation. IEEE Access 2020, 8, 50439–50451. [Google Scholar] [CrossRef]
  37. Xia, Y.; Mandic, D.P. Augmented Performance Bounds on Strictly Linear and Widely Linear Estimators With Complex Data. IEEE Trans. Signal Process. 2018, 66, 507–514. [Google Scholar] [CrossRef]
  38. Kader, M.F.; Shahab, M.B.; Shin, S.Y. Exploiting Non-Orthogonal Multiple Access in Cooperative Relay Sharing. IEEE Commun. Lett. 2017, 21, 1159–1162. [Google Scholar] [CrossRef]
  39. Im, G.; Lee, J.H. Outage Probability for Cooperative NOMA Systems With Imperfect SIC in Cognitive Radio Networks. IEEE Commun. Lett. 2019, 23, 692–695. [Google Scholar] [CrossRef]
  40. Cui, F.; Qin, Z.; Cai, Y.; Zhao, M.; Li, G.Y. Rethinking Outage Constraints for Resource Management in NOMA Networks. IEEE J. Sel. Topics Signal Process. 2019, 13, 423–435. [Google Scholar] [CrossRef]
  41. Yue, X.; Liu, Y.; Kang, S.; Nallanathan, A.; Chen, Y. Modeling and Analysis of Two-Way Relay Non-Orthogonal Multiple Access Systems. IEEE Trans. Commun. 2018, 66, 3784–3796. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Two-user downlink non-orthogonal multiple access (NOMA) system model.
Figure 1. Two-user downlink non-orthogonal multiple access (NOMA) system model.
Entropy 25 01172 g001
Figure 3. The outage probabilities of both the strong user (SU) and weak user (WU) versus the signal-to-noise ratio (SNR) of the WU for different λ m when R 1 = 1 bps/Hz, R 2 = 1 bps/Hz.
Figure 3. The outage probabilities of both the strong user (SU) and weak user (WU) versus the signal-to-noise ratio (SNR) of the WU for different λ m when R 1 = 1 bps/Hz, R 2 = 1 bps/Hz.
Entropy 25 01172 g003
Figure 5. The outage probabilities of both the SU and WU versus the SNR of the WU for different ξ .
Figure 5. The outage probabilities of both the SU and WU versus the SNR of the WU for different ξ .
Entropy 25 01172 g005
Figure 6. The outage probabilities of both the SU and WU versus the level of residual interference ξ for different p 2 .
Figure 6. The outage probabilities of both the SU and WU versus the level of residual interference ξ for different p 2 .
Entropy 25 01172 g006
Figure 7. The outage probabilities of both the SU and WU versus the SNR of the WU for different γ ¯ 1 .
Figure 7. The outage probabilities of both the SU and WU versus the SNR of the WU for different γ ¯ 1 .
Entropy 25 01172 g007
Table 1. Notations.
Table 1. Notations.
NotationExplanationExpression
p i Power of user i
κ Impropriety degree of the signal of the strong user (SU)
σ n i 2 Noise power at the receiver of user i
γ i , γ r Instantaneous channel-to-noise ratios (CNRs) of user i and the residual interference channel, respectively
R 1 Instantaneous rate of the SU to decode its own signal after successive interference cancellation (SIC)(13)
R 12 Instantaneous rate to decode the signal of the weak user (WU) at the SU end(11)
R 2 Instantaneous rate of the WU(9)
γ ¯ i Average CNR of user i E { γ i }
ξ Level of residual interference after SIC E { γ r } / γ ¯ 1
R 0 , i Target rate of user i
Γ i 2 2 R 0 , i 1
v 1 , v 2 Functions of p 1 and κ , used as parameters for optimization(25) and (19)
P out , i Outage probability of user i(28) and (21)
P out , th Maximum outage threshold of the WU
p 1 , max Maximum power budget of the SU
λ m Maximum power ratio between SU and WU p 1 , max / p 2
v 2 , th Value of v 2 when P out , 2 = P out , th (31)
v 2 p ( v 1 ) Value of v 2 when κ = 0 (proper Gaussian signaling, PGS)(36)
v 2 i ( v 1 ) Value of v 2 when κ = 1 (maximally improper Gaussian signaling, maximally IGS)(36)
v 2 m ( v 1 ) Value of v 2 when p 1 = p 1 , max (36)
v 2 L ( v 1 ) Lower bound of a feasible v 2 given a v 1 (44)
v 2 U ( v 1 ) Upper bound of a feasible v 2 given a v 1 (45)
v 1 c , v 2 c Values of v 1 and v 2 when v 1 v 2 + 1 / Γ 2 = 0 , making v 2 p ( v 1 c ) = v 2 i ( v 1 c ) = v 2 m ( v 1 c ) = v 2 c (37)
v 1 pm Value of v 1 at p 1 = p 1 , max and κ = 0 , making v 2 p ( v 1 pm ) = v 2 m ( v 1 pm ) (39)
v 1 im Value of v 1 at p 1 = p 1 , max and κ = 1 , making v 2 i ( v 1 im ) = v 2 m ( v 1 im ) (46)
v e p Value of v 1 making v 2 p ( v 1 ) = v 1 (50)
D p ( v 1 ) A term of d P out , 1 ( v 1 , v 2 p ( v 1 ) ) / d v 1 , as an increasing function(52)
D i ( v 1 ) A term of d P out , 1 ( v 1 , v 2 i ( v 1 ) ) / d v 1 (63)
D m ( v 1 ) A term of d P out , 1 ( v 1 , v 2 m ( v 1 ) ) / d v 1 , as an increasing function(59)
v 1 dp Extreme point of v 2 p ( · ) ; solution to D p ( · ) = 0
v 1 di Extreme point of v 2 i ( · ) ; solution to D i ( · ) = 0
v 1 dm Extreme point of v 2 m ( · ) ; solution to D m ( · ) = 0
v 1 , th p Solution to v 2 p ( · ) = v 2 , th (51)
v 1 , th i Solution to v 2 i ( · ) = v 2 , th (56)
v 1 , th m Solution to v 2 m ( · ) = v 2 , th (57)
v 1 , th Solution to v 2 U ( · ) = v 2 , th (55)
v 1 op Optimal value of v 1 in PGS design; solution to the problem (48)(53)
v 1 oi Optimal value of v 1 when κ = 1 (62)
v 1 om Optimal value of v 1 when p 1 = p 1 , max (61)
v 1 Optimal value of v 1 in improper Gaussian signaling (IGS) design; solution to the problem (54)(67)
p 1 op Optimal power of the SU in PGS design v 1 op p 2 ( 1 + Γ 1 1 )
p 1 Optimal power of the SU in IGS design(68)
κ Optimal impropriety degree of the signal of the SU in the IGS design(69)
Table 2. Simulation parameters.
Table 2. Simulation parameters.
ParameterValueParameterValue
σ n i 2 0 dBW P out , th 0.05
γ ¯ 1 10 dB R 0 , 1 1 bps/Hz
γ ¯ 2 0 dB R 0 , 2 1.5 bps/Hz
ξ 0.01 λ m 0.5
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, Y.; Gao, H.; Cheng, H.; Xia, Y.; Pei, W. Outage Performance Analysis of Improper Gaussian Signaling for Two-User Downlink NOMA Systems with Imperfect Successive Interference Cancellation. Entropy 2023, 25, 1172. https://doi.org/10.3390/e25081172

AMA Style

Liu Y, Gao H, Cheng H, Xia Y, Pei W. Outage Performance Analysis of Improper Gaussian Signaling for Two-User Downlink NOMA Systems with Imperfect Successive Interference Cancellation. Entropy. 2023; 25(8):1172. https://doi.org/10.3390/e25081172

Chicago/Turabian Style

Liu, Yaxuan, Huadong Gao, Hao Cheng, Yili Xia, and Wenjiang Pei. 2023. "Outage Performance Analysis of Improper Gaussian Signaling for Two-User Downlink NOMA Systems with Imperfect Successive Interference Cancellation" Entropy 25, no. 8: 1172. https://doi.org/10.3390/e25081172

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop