Next Article in Journal
A Hybrid Approach to Short-Term Load Forecasting Aimed at Bad Data Detection in Secondary Substation Monitoring Equipment
Previous Article in Journal
Detection and Tracking of Moving Targets for Thermal Infrared Video Sequences
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Outage-Based Resource Allocation for DF Two-Way Relay Networks with Energy Harvesting

1
Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
2
School of Electrical Engineering and Computer Science, Oregon State University Corvallis, OR 97331, USA
3
School of Communication Engineering, Chongqing College of Electronic Engineering, Chongqing 401331, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2018, 18(11), 3946; https://doi.org/10.3390/s18113946
Submission received: 15 October 2018 / Revised: 5 November 2018 / Accepted: 8 November 2018 / Published: 14 November 2018
(This article belongs to the Section Sensor Networks)

Abstract

:
A joint resource allocation algorithm to minimize the system outage probability is proposed for a decode-and-forward (DF) two-way relay network with simultaneous wireless information and power transfer (SWIPT) under a total power constraint. In this network, the two sources nodes exchange information with the help of a passive relay, which is assumed to help the two source nodes’ communication without consuming its own energy by exploiting an energy-harvesting protocol, the power splitting (PS) protocol. An optimization framework to jointly optimize power allocation (PA) at the source nodes and PS at the relay is developed. Since the formulated joint optimization problem is non-convex, the solution is developed in two steps. First, the conditionally optimal PS ratio at the relay node for a given PA ratio is explored; then, the closed-form of the optimal PA in the sense of minimizing the system outage probability with instantaneous channel state information (CSI) is derived. Analysis shows that the optimal design depends on the channel condition and the rate threshold. Simulation results are obtained to validate the analytical results. Comparison with three existing schemes shows that the proposed optimized scheme has the minimum system outage probability.

1. Introduction

Two-way relay (TWR) communications [1,2] to extend transmission range and improve communications reliability have been studied extensively. The traditional TWR network with two source nodes exchanging information between each other via a relay requires four time slots. Combined with appropriate network coding, the number of time slots can be reduced to two [3]. Two of the most commonly-used relay strategies are the amplify-and-forward (AF) [4] and DF [5] protocols. With the AF and DF protocols, plenty of significant research efforts designing optimal resource allocation schemes have been proposed, aiming at further improving essential performance objectives for such networks. For example, a power allocation (PA) scheme for an AF-TWR system and its achievable rates over Rayleigh fading channels were studied in [6]. In [7], based on maximizing the objective rate under a total power budget, a power allocation method for a specific DF relay network by exploiting physical-layer network coding was proposed. In [8], optimization of PA and time allocation (TA) was investigated to minimize the system outage probability to support asymmetric data rates for DF-TWR networks.
The aforementioned works all assumed that the relay spends its own power to support the TWR transmission. In most practical cases, it will be very attractive if the relay can harvest the energy it needs for relaying the information between the source nodes. One promising energy-harvesting technique is SWIPT, with which the relay performs energy harvesting (EH) by scavenging radio-frequency signals, typically transmitted by the source nodes, and then utilizes the harvested energy to forward information. Recent work has studied AF-TWR networks with SWIPT extensively. An AF-TWR with SWIPT that employs the PS protocol is proposed in [9] together with the derivation of tight upper- and lower-bounds of the outage probability and the ergodic capacity of the network. To further improve the AF-TWR performance, a joint optimization of the PS ratio and the transmission PA based on minimizing the outage probability was studied in [10]. A distributed energy beamforming scheme was proposed in [11] to maximize the achievable sum-rate of AF-TWR network with SWIPT. There are also some research efforts of SWIPT based on the DF-TWR network; for example, an energy-harvesting protocol for three-step TWR was proposed and analyzed [12]. A joint optimization scheme for a DF-TWR with energy harvesting was developed in [13].
In this paper, we focus on jointly optimizing the PS ratio and the PA ratio for a power-constrained, two-way relay network with a wireless powered relay that employs the DF protocol, a problem that has not been studied yet, to our knowledge. The major contributions of our works are summarized as follows. We form a jointly optimizing PS ratio and PA ratio problem to minimize the system outage probability in the context of a two-way energy-harvesting relay network that is subject to a total transmit power constraint. Since this original optimization problem is very difficult to solve, if not impossible, a two-step solution is developed to obtain a closed-form solution efficiently. Simulation results are obtained to verify the proposed algorithm and to assess the impact of various network parameters on system performance. The performances of three existing schemes are also simulated and compared with that of the proposed scheme.
The remainder of this paper is organized as follows. In Section 2, we describe the model of the two-way relay network being considered and formulate the joint resource allocation problem, aiming to minimize the outage probability. Transformation of the joint resource allocation problem to a two-step optimization problem is described in Section 3. Numerical results are presented in Section 4, and conclusions are given in Section 5.

2. System Model and Problem Formulation

2.1. System Model

The TWR network under consideration is shown in Figure 1, where two communicating devices S 1 and S 2 exchange their messages assisted by a passive relay node (no power is available for its information forwarding) with energy harvesting ability, denoted as R. It is assumed that there are no direct links between the two source nodes; thus, the information exchange must rely on the passive relay, which harvests the energy it needs from the RF signals transmitted by the two source nodes through the power splitting protocol. We assume all the nodes are single-antenna devices and operate in a half-duplex mode. In addition, we assume that the channel between any two nodes is reciprocal and that perfect channel state information is known at all nodes. The transmit power at S 1 and S 2 is denoted by P 1 and P 2 , respectively, which share a total power budget constraint P 1 + P 2 = P T for each transmission round.
Two consecutive phases are involved to complete each round of information transmission: a multiple access (MA) phase and a broadcast (BC) phase.
During the MA phase, nodes S 1 and S 2 broadcast their signals simultaneously to relay R. The received signal at R in this phase is expressed as:
y R = h 1 P 1 x 1 + h 2 P 2 x 2 + n a , w
where h i denotes the coefficient of the channel between S i and R and n a , w CN 0 , σ a 2 is the noise generated at the receiver antenna.
The power splitter at R then splits the received signal y R into two portions ρ : ( 1 ρ ) , of which ρ y R is utilized for energy harvesting, and the remaining portion in the amount of 1 ρ y R is used for information decoding. Let the energy conversion efficiency be η . The harvested energy at the relay is expressed as:
E = T 2 · η ρ ( | h 1 | 2 P 1 + | h 2 | 2 P 2 + σ a 2 )
Note that power splitting is done before the received signal is converted from passband to baseband; hence, the signal in the information decoding (ID) receiver can be expressed as:
y ID = 1 ρ h 1 P 1 x 1 + h 2 P 2 x 1 + n a , w + n b , w
where n b , w CN 0 , σ b 2 is the noise generated in the down-conversion process of the received signal [8]. Since in practice, the power of the noise generated at the antenna σ a 2 is generally much smaller than the noise generated in the down-conversion process of the received signal σ b 2 , to simplify the derivation, the noise term σ a 2 will be neglected in the following analysis. This kind of assumption has been wildly used in SWIPT system analysis, such as [9,10,11,12,13].
During the BC phase, the relay exploits one of the decoding methods—physical layer network coding—to decode y ID , and the decoded information is written as x R = x 1 x 2 . Then, the relay exhausts the harvested power P R to broadcast x R . The received signal at S i , i 1 , 2 is given by:
y S i = h i P R x R + n i
where P R = 2 E T = η ρ ( | h 1 | 2 P 1 + | h 2 | 2 P 2 ) , n i CN 0 , σ i 2 , i = 1 , 2 , is the noise generated at source S i . For the noise components in the source and relay nodes, it is reasonable to assume σ 1 2 = σ 2 2 = σ b 2 = σ 2 .
Finally, the source node S i , i = { i , 2 } decodes x R and derives the information from S j , j { 1 , 2 | j i } by using its own information. For example, S 1 decodes the information from S 2 as x 2 = x R x 1 .

2.2. Performance Metric

The network outage probability is used as the performance metric. The outage probability of the network we considered is defined as the probability that the achievable instantaneous received rate pair ( R 12 , R 21 ) falls below an outage rate pair threshold ( R th 1 , R th 2 ) . The achievable instantaneous received rate pair is constrained by the achievable rate regions D , which can be obtained by using the results in [14] (Refer to Equations (37)–(39) in reference [14]). The rate region is mathematically expressed as:
D = { ( R 12 , R 21 ) | 0 R 12 min ( R 1 R , R R 2 ) , 0 R 21 min ( R 2 R , R R 1 ) , R 12 + R 21 R MA }
where R i j , i , j [ 1 , 2 , R ] denotes the end-to-end transmission rate from node i to node j, R MA denotes the MA information transfer rate region. The transmission rate R i j , i , j [ 1 , 2 , R ] and R MA can be calculated by R i j = 1 2 log 2 ( 1 + γ i j ) and R MA = 1 2 log 2 ( 1 + γ MA ) , respectively, where γ i j , γ MA are the related signal-to-noise ratios (SNR).
From Equations (3) and (4), we can obtain the SNR of each transmission as the following equations:
γ 1 R = ( 1 ρ ) α k 1
γ R 2 = | h 2 | 2 η ρ ( α k 1 + ( 1 α ) k 2 )
γ 2 R = ( 1 ρ ) ( 1 α ) k 2
γ R 1 = | h 1 | 2 η ρ ( α k 1 + ( 1 α ) k 2 )
γ MA = ( 1 ρ ) ( α k 1 + ( 1 α ) k 2 )
where k 1 = | h 1 | 2 P t σ 2 , k 2 = | h 2 | 2 P t σ 2 , α is the power allocation ratio and P 1 = α P t , P 2 = ( 1 α ) P t .
With the required target transmission rate threshold R th 1 and R th 2 at the receiving nodes S 1 and S 2 , respectively, the outage probability can be expressed as:
P out = Pr ( R th 1 , R th 2 ) D = Pr R 12 < R th 1 Pr R 21 < R th 2 Pr R MA < R th 1 + R th 2 = Pr min ( R 1 R , R R 2 ) < R th 1 Pr min ( R 2 R , R R 1 ) < R th 2 Pr R MA < R th 1 + R th 2 = Pr min ( γ 1 R , γ R 2 ) < γ th 1 Pr min ( γ 2 R , γ R 1 ) < γ th 2 Pr γ MA < γ th Σ = Pr min γ 1 R γ th 1 , γ R 2 γ th 1 , γ 2 R γ th 2 , γ R 1 γ th 2 , γ MA γ th Σ < 1
where γ th i = 2 2 R th i 1 , i = 1 , 2 , γ th Σ = 2 2 ( R th 1 + R th 2 ) 1 .
Denote F X ( · ) as the cumulative distribution function (CDF) of a random variable X. We can rewrite Equation (7) as:
P out = F Λ ( 1 ) .
where:
Λ = min γ 1 R γ th 1 , γ R 2 γ th 1 , γ 2 R γ th 2 , γ R 1 γ th 2 , γ MA γ th Σ = min ( 1 ρ ) α k 1 γ th 1 , | h 2 | 2 η ρ ( α k 1 + ( 1 α ) k 2 ) γ th 1 , ( 1 ρ ) ( 1 α ) k 2 γ th 2 , | h 1 | 2 η ρ ( α k 1 + ( 1 α ) k 2 ) γ th 2 , ( 1 ρ ) ( α k 1 + ( 1 α ) k 2 ) γ th Σ .

2.3. Problem Formulation

Our goal is to provide insights into the optimal PS at the relay and the optimal PA at each source node for the proposed SWIPT-TWR network to minimize the network outage probability derived in Equation (7). That is, the optimization problem is formulated as:
OP 0 : ( α o , ρ o ) = arg min α , ρ P out ( α , ρ ) subject to 0 < α < 1 and 0 < ρ < 1 .
With the available instantaneous channel state information (CSI), it is more desirable to formulate an equivalent joint optimization problem, which aims at maximizing the normalized SNR Λ shown in Equation (9). This transformed optimization problem is expressed as:
OP 1 : ( α o , ρ o ) = arg max α , ρ Λ ( α , ρ ) subject to 0 < α < 1 and 0 < ρ < 1 .
Since Λ is a complex minimization function of two variables α and ρ , it is very difficult, if not impossible, to solve for a solution directly based on the optimization formed in (11), but Λ ( α , ρ ) in Equation (9) is observed to be a concave function of ρ for a fixed α . This observation leads to a two-step approach to solve this joint resource allocation problem, which is developed in the next section.

3. A Two-Step Optimization Algorithm

To solve Equation (11) effectively, we adopt a successive approach to transform the original problem into two subproblems. First, an optimal PS ratio is obtained by fixing α . Then, the resulting PS ratio is substituted into Equation (11) to derive a closed-form solution of the optimal PA ratio through case studies. This kind of method, which transforms a complex original problem into a series of easily-solved convex problems, is a typical non-convex problem solution, which has been widely used in solving mathematical problems [15] and solving formulated optimization problems applied in communication scenarios [16].
For a fixed α , the optimization problem reduces to a one-dimensional problem related to the power splitting ratio ρ . For α , the optimization problem can be expressed as:
OP 2 : ρ o = arg max ρ Λ ( ρ ) subject to 0 < ρ < 1 .
where Λ ( ρ ) is rewritten as:
Λ ( ρ ) = min ( 1 ρ ) g 1 ( α ) , ρ g 2 ( α )
and g 1 ( α ) , g 2 ( α ) are expressed as:
g 1 ( α ) = min α k 1 γ th 1 , ( 1 α ) k 2 γ th 2 , α k 1 + ( 1 α ) k 2 γ th Σ
g 2 ( α ) = min | h 2 | 2 γ th 1 , | h 1 | 2 γ th 2 · [ η ( α k 1 + ( 1 α ) k 2 ) ]
It is easy to notice that Equation (13) is a convex function of ρ for a given α . Thus, the optimal ρ derived from Equation (13) is obtained when ( 1 ρ ) g 1 ( α ) = ρ g 2 ( α ) , i.e.,
ρ o = g 1 ( α ) g 1 ( α ) + g 2 ( α ) .
Note that ρ o is a function of α . Substituting Equation (15) into Λ leads to a one-dimensional function of α written as:
Λ ( α ) = g 1 ( α ) g 2 ( α ) g 1 ( α ) + g 2 ( α ) .
The optimal power allocation ratio α o can be obtained by maximizing Equation (16), which is equivalent to minimizing its reciprocal transformation Λ ¯ ( α ) = 1 g 1 ( α ) + 1 g 2 ( α ) . The transformed problem is written as follows.
OP 3 : α o = arg min Λ ¯ ( α ) = arg min 1 g 1 ( α ) + 1 g 2 ( α ) subject to 0 < α < 1
Equation (17) shows that the optimal α o is determined by g 1 ( α ) and g 2 ( α ) . Define the three components of g 1 ( α ) in Equation (14a) as f 1 = α k 1 / γ th 1 , f 2 = ( 1 α ) k 2 / γ th 2 and f 3 = ( α k 1 + ( 1 α ) k 2 ) / γ th Σ . Let α 12 , α 13 and α 23 be, respectively, the points of intersection of f 1 and f 2 , f 1 and f 3 and f 2 and f 3 . The analytical expression of Λ ¯ ( α ) can be classified as two cases, which is shown in the following Theorem 1.
Theorem 1.
Λ ¯ ( α ) is a continuous piecewise function and can be divided into two cases dependent on the size of α 13 and α 23 . The two cases are:
Case 1: When α 13 α 23 :
Λ ¯ ( α ) = 1 f 1 + 1 v · ( α k 1 + ( 1 α ) k 2 ) 1 , 0 < α α 12 1 f 2 + 1 v · ( α k 1 + ( 1 α ) k 2 ) 1 , α 12 α < 1
Case 2: When α 13 < α 23 :
Λ ¯ ( α ) = 1 f 1 + 1 v · ( α k 1 + ( 1 α ) k 2 ) 1 , 0 < α α 13 1 f 3 + 1 v · ( α k 1 + ( 1 α ) k 2 ) 1 , α 13 α α 23 1 f 2 + 1 v · ( α k 1 + ( 1 α ) k 2 ) 1 , α 23 α < 1
where v = η · min | h 2 | 2 γ th 1 , | h 1 | 2 γ th 2 ,
α 12 = k 2 γ th 1 k 1 γ th 2 + k 2 γ th 1 α 13 = k 2 γ th 1 k 1 ( γ th Σ γ th 1 ) + k 2 γ th 1 α 23 = k 2 ( γ th Σ γ th 2 ) k 2 ( γ th Σ γ th 2 ) + k 1 γ th 2
Proof. 
The proof is given in Appendix A. ☐
It can be concluded that the monotony of f 3 = ( α k 1 + ( 1 α ) k 2 ) / γ th Σ , g 2 ( α ) = v · ( α k 1 + ( 1 α ) k 2 ) has a relationship with the size of k 1 and k 2 . When k 1 = k 2 , f 3 and g 2 ( α ) are constant; when k 1 > k 2 , f 3 and g 2 ( α ) are monotonically increasing functions of α ; and when k 1 < k 2 , f 3 and g 2 ( α ) are monotonically decreasing functions of α . Thus, the monotony of Λ ¯ ( α ) for each case in Theorem 1 has three subcases. With the above analysis, we analyze OP3 with case studies.

3.1. Case 1: α 13 α 23

In this case, Λ ¯ ( α ) is a continuous two-segment piecewise function generated from Equation (18), With the size of k 1 and k 2 , Λ ¯ ( α ) and OP3 have three subcases, which are analyzed as follows.

3.1.1. Subcase 1: k 1 = k 2

In this subcase, g 2 ( α ) is a constant for all values of α ; thus, the variation of Λ ¯ ( α ) is determined by f 1 or f 2 . From Equation (18), it is easy to get that, in the range of α ( 0 , α 12 ] , Λ ¯ ( α ) = f 1 1 + v 1 · ( α k 1 + ( 1 α ) k 2 ) 1 is a decreasing function of α ; and in the range of α ( α 12 , 1 ) , Λ ¯ ( α ) = f 2 1 + v 1 · ( α k 1 + ( 1 α ) k 2 ) 1 is an increasing function of α . Thus, in this subcase, Λ ¯ ( α ) is non-negative convex, which gets its minimum at α = α 12 . The solution of OP3occurs at α = α 12 .

3.1.2. Subcase 2: k 1 > k 2

In this subcase, g 2 ( α ) is an increasing function, and f 3 does not affect Λ ¯ ( α ) . Through analysis, Lemma 1 can be obtained as follows.
Lemma 1.
The optimal power allocation of Subcase 2 is unique and lies in the range of α [ α 12 , 1 ] , which can be calculated by α o = α case 1 * = max ( α * , α 12 ) . α * is the stationary point of the second segment of Λ ¯ ( α ) , which is obtained by solving ( Λ ¯ ( α ) ) = ( f 2 1 + v 1 · ( α k 1 + ( 1 α ) k 2 ) 1 ) = 0 , and the solved α * is:
α * = k 2 ( k 1 k 2 ) k 2 v γ th 2 k 2 ( k 1 k 2 ) + ( k 1 k 2 ) v γ th 2
Proof. 
With the former analysis that g 1 ( α ) is a non-negative convex function with its maxima at α = α 12 and g 2 ( α ) is an increasing function in this subcase, it is easy to see that Λ ¯ ( α = α 12 ) is the minima in the range of α [ 0 , α 12 ] . Given Λ ¯ ( α 12 ) as the initial value of Λ ¯ in the range of α [ α 12 , 1 ] , the variation of Λ ¯ ( α ) in the range α [ α 12 , 1 ] is analyzed as follows. There is the conclusion that g 1 ( α ) = f 1 decreases as α increases and g 2 ( α ) increases as α increases in the range of α [ α 12 , 1 ] . This characteristic leads to the conclusion that the optimal value of Λ ¯ occurs in the range of [ α 12 , 1 ] . In this range, Λ ¯ ( α ) = 1 f 2 + 1 g 2 . The second-order derivative of Λ ¯ ( α ) given in Equation (22a) is greater than zero; thus, the optimal α can be obtained by solving Λ ¯ ( α ) α = 1 f 2 + 1 v · ( α k 1 + ( 1 α ) k 2 ) 1 α = 0 . The first-order derivative Λ ¯ ( α ) α is given in Equation (22b).
2 Λ ¯ ( α ) α 2 = 2 γ th 2 k 2 1 ( 1 α ) 3 + 1 v ( k 1 k 2 ) 2 ( α k 1 + ( 1 α ) k 2 ) 4
Λ ¯ ( α ) α = γ th 2 k 2 1 ( 1 α ) 2 1 v k 1 k 2 ( α k 1 + ( 1 α ) k 2 ) 2 .
 ☐
By solving Equation (22b), one obtains the minimum of [ 1 f 2 + 1 v · ( α k 1 + ( 1 α ) k 2 ) 1 ] α , which is shown in Equation (21). Compared with the boundary value in the range of α [ α 12 , 1 ] , we get the conclusion that if α * < α 12 , the optimal power allocation ratio is α o = α 12 ; else, if α * α 12 , the optimal power allocation ratio is α o = α * . Rephrasing the above analysis results in Lemma 1.

3.1.3. Subcase 3: k 1 < k 2

In this subcase, g 2 ( α ) is a decreasing function and f 3 does not affect Λ ¯ ( α ) . Through analysis, Lemma 2 can be derived as follows.
Lemma 2.
The optimal power allocation of Subcase 3 is unique and lies in the range of α [ 0 , α 12 ] , which can be calculated by α o = α case 1 + = min ( α + , α 12 ) . α + is the stationary point of the first segment of Λ ¯ ( α ) , which is obtained by solving ( Λ ¯ ( α ) ) = ( f 1 1 + v 1 · ( α k 1 + ( 1 α ) k 2 ) 1 ) = 0 , and the solved α + is:
α + = k 2 v · γ th 1 k 2 k 1 ( k 1 + v · γ th 1 ( k 2 k 1 ) )
Proof. 
The convexity of this case can be verified using a similar analysis as Lemma 1. Given α 12 as an initial value, it is easy to see that g 1 ( α ) decreases as α decreases from this initial value; however, g 2 ( α ) increases as α decreases from this initial value. This characteristic shows that the optimal value of Λ ¯ ( α ) occurs in the range of [ 0 , α 12 ] , where g 1 ( α ) = f 1 ( α ) . Thus, Λ ¯ ( α ) = 1 f 1 + v 1 · ( α k 1 + ( 1 α ) k 2 ) 1 . Since the second-order derivative of Λ ¯ ( α ) given in Equation (24a) is greater than zero, the optimal α is obtained by letting the first derivative Λ ¯ ( α ) α = [ 1 f 1 + v 1 · ( α k 1 + ( 1 α ) k 2 ) 1 ] α expressed in (24b) equal zero.
2 Λ ¯ ( α ) α 2 = 2 γ th 1 k 1 1 α 3 + 1 v ( k 1 k 2 ) 2 ( α k 1 + ( 1 α ) k 2 ) 4
Λ ¯ ( α ) α = γ th 1 k 1 1 α 2 1 v k 1 k 2 ( α k 1 + ( 1 α ) k 2 ) 2
 ☐
By solving Equation (24b), one obtains the minimum of [ 1 f 1 + 1 v · ( α k 1 + ( 1 α ) k 2 ) 1 ] α , which is shown in Equation (23). Compared with the boundary value in the range of α [ 0 , α 12 ] , we get the conclusion that if α + < α 12 , the optimal power allocation ratio is α o = α + ; else, if α + α 12 , the optimal power allocation ratio is α o = α 12 . Rephrasing the above analysis results in Lemma 2.

3.2. Case 2: α 13 < α 23

In this case, Λ ( α ) is generated from Equation (19), which is a three-segment continuous function. Since f 3 and g 2 ( α ) have a relationship with the size of the channel gains k 1 and k 2 , the same as for Case 1, Case 2 has three subcases, as well.

3.2.1. Subcase 1: k 1 = k 2

In this subcase, f 3 and g 2 ( α ) are constants for all values of α . From Equation (19), it is easy to get that, the first segment of Λ ¯ ( α ) is a decreasing function, the third segment of Λ ¯ ( α ) is an increasing function and the second segment of Λ ¯ ( α ) is a constant. Thus, Λ ¯ will get its minimum at α [ α 13 , α 23 ] .

3.2.2. Subcase 2: k 1 > k 2

In this subcase, f 3 and g 2 ( α ) are monotonically increasing functions. Through analysis, Lemma 3 can be obtained as follows.
Lemma 3.
The optimal power allocation for this subcase is unique and lies in the range of α [ α 23 , 1 ) , which can be calculated by α o = α case 2 * = max ( α * , α 23 ) . α * is the stationary point of the third segment of Λ ¯ ( α ) , which is equivalent to that obtained in Equation (21).
Proof. 
Since f 1 and f 2 are respectively an increasing function and a decreasing function with the increase of α , since f 3 and g 2 ( α ) are monotonic functions in this subcase, it is easy to obtain that the first and second segments of Λ ¯ ( α ) are decreasing functions. Due to the continuous feature, Λ ¯ ( α = α 23 ) is the minima in the range of α [ 0 , α 23 ] . Given Λ ¯ ( α 23 ) as the initial value of Λ ¯ in the range of α [ α 23 , 1 ] , the variation of Λ ¯ ( α ) in the range of α [ α 23 , 1 ] is analyzed as follows. In the range, Λ ¯ ( α ) = 1 f 2 + 1 g 2 . The second-order derivation and first-order derivation of Λ ¯ ( α ) can be obtained as shown in Equations (22a) and (22b). α * is the minima of [ 1 f 2 + 1 v · ( α k 1 + ( 1 α ) k 2 ) 1 ] α , which is shown in Equation (21). Compared with the boundary value in the range of α [ α 23 , 1 ] , we get the conclusion that if α * < α 23 , the optimal power allocation value is α o = α 23 ; else, if α * α 23 , the optimal power allocation value is α o = α * . Rephrasing the above analysis results in Lemma 3. ☐

3.2.3. Subcase 3: k 1 < k 2

In this subcase, f 3 and g 2 ( α ) are monotonically decreasing functions. Through analysis, Lemma 4 can be obtained as follows.
Lemma 4.
The optimal power allocation for this subcase is unique and lies in the range of α ( 0 , α 13 ] , which can be calculated by α o = α case 2 + = min ( α + , α 13 ) . α + is the stationary point of the first segment of Λ ¯ ( α ) , which is equivalent to that obtained in Equation (23).
Proof. 
With monotonically decreasing functions of f 3 and g 2 ( α ) , the second and third segments of Λ ¯ ( α ) are increasing functions. Due to the continuous feature, Λ ¯ ( α = α 13 ) is the minima in the range of α [ α 13 , 1 ] ; whereas in the range of α [ 0 , α 13 ] , Λ ¯ ( 1 f 1 ) + 1 v · ( α k 1 + ( 1 α ) k 2 ) . The second-order derivation and first-order derivation of Λ ¯ ( α ) can be obtained as shown in Equations (24a) and (24b). α + is the minima of [ 1 f 1 + 1 v · ( α k 1 + ( 1 α ) k 2 ) 1 ] α , which is shown in Equation (23). Compared with the boundary value in the range of α [ 0 , α 13 ] , we get the conclusion that if α + < α 13 , the optimal power allocation value is α o = α + ; else, if α + α 13 , the optimal power allocation value is α o = α 13 . Rephrasing the above analysis results in Lemma 4. ☐

4. The Closed-Form of PA and PS

From the above analysis, the closed-form of optimal power allocation ratio α o is calculated and presented below.
When α 12 α 23 :
α o = α 12 , if k 1 = k 2 α c a s e 1 * , if k 1 > k 2 α c a s e 1 + , if k 1 < k 2
When α 12 < α 23 :
α o = α [ α 13 , α 23 ] , if k 1 = k 2 α c a s e 2 * , if k 1 > k 2 α c a s e 2 + , if k 1 < k 2
Substituting α o into Equation (15), the optimal power splitting ratio is obtained below.
ρ o = g 1 ( α o ) g 1 ( α o ) + g 2 ( α o )
Algorithm 1 summarizes the optimal power allocation ratio and power splitting ratio design for a given set of η , | h 1 | 2 , | h 2 | 2 , R th 1 , R th 2 and P t .
Algorithm 1 Optimal joint resource allocation for α o , ρ o .
1:
Given η , | h 1 | 2 , | h 2 | 2 , R th 1 , R th 2 and P t   
2:
Compute k 1 = | h 1 | 2 P t σ 2 and k 2 = | h 2 | 2 P t σ 2   
3:
Compute α 13 , α 23 .   
4:
if α 13 α 23 then
5:
if k 1 = k 2 then
6:
   α o = α 12   
7:
else if k 1 > k 2 then
8:
  Compute α * , α 12   
9:
   α o = α c a s e 1 * = max ( α * , α 12 )   
10:
else if k 1 < k 2 then
11:
  Compute α + , α 12   
12:
   α o = α c a s e 1 + = min ( α + , α 12 )   
13:
end if  
14:
else if α 13 < α 23 then
15:
if k 1 = k 2 then
16:
   α o = α o [ α 13 , α 23 ]   
17:
else if k 1 > k 2 then
18:
  Compute α *   
19:
   α o = α c a s e 2 * = max ( α * , α 23 )   
20:
else if k 1 < k 2 then
21:
  Compute α +   
22:
   α o = α c a s e 2 + = min ( α + , α 13 )   
23:
end if  
24:
end if
25:
Compute ρ o = g 1 ( α o ) g 1 ( α o ) + g 2 ( α o )   

5. Numerical Results

In this section, some numerical and simulation results are presented to verify the proposed algorithm and to assess the influence of various system parameters. To better display the superiority of the proposed resource allocation scheme, three benchmark schemes: optimal α equal ρ , optimal ρ equal α and equal α and ρ are presented as a comparison. The parameters are set as follows: the energy conversion efficiency is set to be η = 0 . 8 ; the distance between the two sources is d = 10 ; the noise power is set to be σ 2 = 90 dBm; the channel gains are set to be | h i | = | g i | · ( 1 + d i ) m , where g i CN ( 0 , λ i ) represents the Rayleigh fading coefficient; d i is the distance between S i and R; m is the channel path loss exponent ( m = 2 ); and λ 1 = λ 2 = 1 . All results are generated from 10 4 channel realizations.
Figure 2 depicts the effects of total power constraint on the system outage probability with rate threshold ( R th 1 , R th 1 ) = ( 1 , 1 ) bit/s/Hz. Since Algorithm 1 shows that the asymmetry of the channel affects the optimal parameters, and thus further affects the outage performance, this simulation chose two channel conditions to assess the system performance: symmetric channel condition d 1 = d 2 = 5 m (the left figure); asymmetric channel condition ( d 1 , d 2 ) = ( 3 , 7 ) m (the right figure). Note that ( d 1 , d 2 ) = ( 3 , 7 ) is just a case of the asymmetric channel condition, which we chose to reflect the system performance; relay deployments of ( d 1 , d 2 ) = { ( 1 , 9 ) , ( 2 , 8 ) , ( 4 , 6 ) , } are asymmetric channel conditions, as well. From this figure, we can see that the outage probability decreases with the increase of total power constraint P t . P out of the proposed jointly optimal resource allocation obtained by using the proposed Algorithm (A1) matches precisely with that obtained by using numerical search (NS) over the range of α [ 0 , 1 ] (step size of 0.005). The P out of three benchmark schemes are presented, as well, which verified that the proposed jointly optimal resource allocation scheme outperforms the three benchmark schemes. The advantage of the proposed schemes is more obvious when the channel is asymmetric.
Figure 3 shows the system outage probabilities P out versus the relay deployment. For relay deployment, the distance between source S 1 and relay R ( d 1 ) is used as the x-axis. Simulation parameters are set as: γ t = 15 dBm (the left figure) or γ t = 20 dBm (the right figure), ( R th 1 , R th 1 ) = ( 1 , 1 ) bit/s/Hz. It is observed that increasing the distance between source S 1 and relay (i.e., d 1 ) leads to a concave characteristic of the outage probability. This behavior shows that the outage performance is much better when the relay is close to any of the source nodes than when the relay is in the middle of the two sources. It can be also noted that compared with the other three benchmark schemes, the proposed scheme has the best outage performance when the channels are asymmetric. When the channel is symmetric, the proposed scheme has the same outage performance as the scheme optimal ρ equal α . This is because when the channels are symmetric, the optimal α is equal to α with ( R th 1 , R th 1 ) = ( 1 , 1 ) bit/s/Hz. Thus, to better enhance the system performance, the relay should be deployed close to each of the source nodes.
Figure 4 shows the outage performance P out versus the rate threshold R th 1 with setting R th 2 = 1 bit/s/Hz. The simulation evaluates two situations: (a) the target transmit power is P t = 15 dBm (the left figure); (b) the target transmit power is P t = 20 dBm (the right figure). The relay is deployed at d 1 = 3 m and d 2 = 7 m. It is observed that as R th 1 bit/s/Hz increases, the outage probability becomes worse. This is because with the increase of the threshold rate, the achievable rate region is more prone to less than the rate threshold. Thus, the outage probability increases based on Equation (7). This figure also shows that the jointly optimal resource allocation scheme outperforms the other three benchmark schemes with any of the threshold settings.

6. Conclusions

We have derived a joint optimal resource allocation design for DF-TWR networks with SWIPT to minimize its system outage probability. The optimization of such a network is a very complex problem. To make it easy to tackle, a two-step method is proposed. With the two-step method, the optimal PS ratio for a given PA ratio is derived first, from which it is found that it is a function of the PA ratio. Then, the obtained PS ratio is substituted back into the main optimization problem to determine the closed-form of the optimal PA ratio. Simulation results matched the analytical results well and confirmed that the optimized system achieved a lower outage probability than existing schemes, especially in asymmetric channel conditions.

Author Contributions

The main contributions of C.P. and G.W. were to create the main ideas and execute the performance evaluations by theoretical analysis and simulation, while F.L. and H.L. worked as the advisors of C.P. to discuss, create and advise on the main ideas and performance evaluations together.

Funding

This research was supported by The National Science Foundation of China (61771084, 61601071) and The Ph.D. Project of Chongqing University of Posts and Telecommunications (BYJS2016006).

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

DFDecode-and-forward
SWIPTSimultaneous wireless information and power transfer
PSPower splitting
PAPower allocation
CSIChannel state information
TWRTwo-way relay
AFAmplify-and-forward
EHEnergy harvesting
MAMultiple access
BCBroadcast
IDInformation decoding
SNRSignal-to-noise ratio
CDFCumulative distribution function
CSIChannel state information

Appendix A

From Equations (14a) and (14b), we obtain that 1 g 1 ( α ) = max ( γ th 1 α k 1 , γ th 2 ( 1 α ) k 2 , γ th Σ α k 1 + ( 1 α ) k 2 ) and 1 g 2 ( α ) = v 1 · ( α k 1 + ( 1 α ) k 2 ) . Denote q 1 ( α ) = γ th 1 α k 1 , q 2 ( α ) = γ th 2 ( 1 α ) k 2 , q 3 ( α ) = γ th Σ α k 1 + ( 1 α ) k 2 ; it is easy to get that q 1 ( α ) and q 2 ( α ) are, respectively, an increasing function and a decreasing function in the range of α [ 0 , 1 ] . q 3 ( α ) is either constant or a monotonic function depending on the relative values of k 1 and k 2 in the range of α [ 0 , 1 ] . The domain boundary values of q i , i { 1 , 2 , 3 } are calculated as:
q 1 ( 0 ) = + , q 1 ( 1 ) = γ th 1 k 1 q 2 ( 0 ) = γ th 2 k 2 , q 2 ( 1 ) = + q 3 ( 0 ) = γ th Σ k 2 , q 3 ( 1 ) = γ th Σ k 1
Since γ th Σ > γ th 1 and γ th Σ > γ th 2 , q 1 ( α ) , q 2 ( α ) and q 3 ( α ) have three intersection points in the range α [ 0 , 1 ] : α 12 , α 13 and α 23 , where α i j , i , j { 1 , 2 , 3 } are the intersections of q i and q j . Since q i = f i 1 , the intersections of q i and q j are the same as the intersection of f i and f j . When α 13 α 23 , max ( q 1 , q 2 ) is always larger than q 3 , which results in g 1 ( α ) , as shown in Equation (18); when α 13 < α 23 , any of the segments f 1 and f 2 might be less than f 3 in some certain range, which results in g 1 ( α ) , as shown in Equation (19). On the other hand, 1 g 2 ( α ) is a monotonic function of α ; thus, we can get Λ ( α ) = 1 g 1 ( α ) + 1 g 2 ( α ) , as shown in Equations (14a) and (14b) for these two cases. Theorem 1 is proven.

References

  1. Liu, K.J.R.; Sadek, A.K.; Su, W.; Kwasinski, A. Cooperative Communications and Networking; Cambridge University Press: Cambridge, UK, 2009; ISBN 9780521895132. [Google Scholar]
  2. Hong, Y.W.P.; Huang, W.J.; Kuo, C.C.J. Cooperative Communications and Networking: Technologies and System Design; Springer: Berlin, Germany, 2010; ISBN 1489998578. [Google Scholar]
  3. Zhang, S.; Liew, S.; Lam, P. Hot Topic: Physical-Layer Network Coding. In Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, Los Angeles, CA, USA, 23–29 September 2006; pp. 358–365. [Google Scholar] [CrossRef]
  4. Kim, S.J.; Mitran, P.; Tarokh, V. Performance bounds for bidirectional coded cooperation protocols. IEEE Trans. Inf. Theory 2008, 54, 5235–5241. [Google Scholar] [CrossRef] [Green Version]
  5. Liu, P.; Kim, I.M. Performance analysis of bidirectional communication protocols based on decode-and-forward relaying. IEEE Trans. Commun. 2010, 58, 2683–2696. [Google Scholar] [CrossRef]
  6. Rodríguez, L.J.; Tran, N.; Le-Ngoc, T. Achievable rates and power allocation for two-way AF relaying over Rayleigh fading channels. In Proceedings of the 2013 IEEE International Conference on Communications (ICC), Budapest, Hungary, 9–13 June 2013; pp. 5914–5918. [Google Scholar] [CrossRef]
  7. Pang, L.; Zhang, Y.; Li, J.; Ma, Y.; Wang, J. Power allocation and relay selection for two-way relaying systems by exploiting physical-layer network coding. IEEE Trans. Veh. Technol. 2014, 63, 2723–2730. [Google Scholar] [CrossRef]
  8. Do, T.P.; Kim, Y.H. Outage-optimal power and time allocation for rate-aware two-way relaying with a decode-and-forward protocol. IEEE Trans. Veh. Technol. 2016, 65, 9673–9686. [Google Scholar] [CrossRef]
  9. Chen, Z.; Xia, B.; Liu, H. Wireless information and power transfer in two-way amplify-and-forward relaying channels. In Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Atlanta, GA, USA, 3–5 December 2014; pp. 168–172. [Google Scholar] [CrossRef]
  10. Men, J.; Ge, J.; Zhang, C.; Li, J. Joint optimal power allocation and relay selection scheme in energy harvesting asymmetric two-way relaying system. IET Commun. 2015, 9, 1421–1426. [Google Scholar] [CrossRef]
  11. Fang, Z.; Yuan, X.; Wang, X. Distributed energy beamforming for simultaneous wireless information and power transfer in the two-way relay channel. IEEE Signal Process. Lett. 2015, 22, 656–660. [Google Scholar] [CrossRef]
  12. Nguyen, T.P.V.; Syed, F.H.; Xiang, G.; Subhas, M.; Hung, T. Three-Step Two-Way Decode and Forward Relay With Energy Harvesting. IEEE Commun. Lett. 2017, 21, 857–860. [Google Scholar] [CrossRef]
  13. Do, T.P.; Song, I.; Kim, Y.H. Simultaneous Wireless Transfer of Power and Information in a Decode-and-Forward Two-Way Relaying Network. IEEE Trans. Wirel. Commun. 2017, 16, 1579–1592. [Google Scholar] [CrossRef]
  14. Kim, S.; Devroye, N.; Mitra, P.; Tarokh, V. Achievable rate regions and performance comparison of half duplex bi-directional relaying protocols. IEEE Trans. Inf. Theory 2011, 57, 6405–6418. [Google Scholar] [CrossRef]
  15. Ciccone, V.; Ferrante, A.; Zorzi, M. An alternating minimization algorithm for Factor Analysis. arXiv, 2018; arXiv:1806.04433. [Google Scholar]
  16. Mishra, D.; De, S.; Chiasserini, C. Joint Optimization Schemes for Cooperative Wireless Information and Power Transfer Over Rician Channels. IEEE Trans. Commun. 2016, 64, 554–571. [Google Scholar] [CrossRef] [Green Version]
Figure 1. (a) System model (b) energy-harvesting protocol.
Figure 1. (a) System model (b) energy-harvesting protocol.
Sensors 18 03946 g001
Figure 2. Comparison of outage performance vs. the total power constraint of different resource allocation schemes: (a) ( d 1 , d 2 ) = ( 5 , 5 ) (the left figure); (b) ( d 1 , d 2 ) = ( 3 , 7 ) (the right figure).
Figure 2. Comparison of outage performance vs. the total power constraint of different resource allocation schemes: (a) ( d 1 , d 2 ) = ( 5 , 5 ) (the left figure); (b) ( d 1 , d 2 ) = ( 3 , 7 ) (the right figure).
Sensors 18 03946 g002
Figure 3. Comparison of the outage performance vs. the distance between source S 1 and relay R ( d 1 ) of different schemes: (a) P t = 15 dBm (the left figure); (b) P t = 20 dBm (the right figure).
Figure 3. Comparison of the outage performance vs. the distance between source S 1 and relay R ( d 1 ) of different schemes: (a) P t = 15 dBm (the left figure); (b) P t = 20 dBm (the right figure).
Sensors 18 03946 g003
Figure 4. Comparison of outage performance vs. the rate threshold R th 1 of different schemes: (a) P t = 15 dBm (the left figure); (b) P t = 20 dBm (the right figure).
Figure 4. Comparison of outage performance vs. the rate threshold R th 1 of different schemes: (a) P t = 15 dBm (the left figure); (b) P t = 20 dBm (the right figure).
Sensors 18 03946 g004

Share and Cite

MDPI and ACS Style

Peng, C.; Li, F.; Liu, H.; Wang, G. Outage-Based Resource Allocation for DF Two-Way Relay Networks with Energy Harvesting. Sensors 2018, 18, 3946. https://doi.org/10.3390/s18113946

AMA Style

Peng C, Li F, Liu H, Wang G. Outage-Based Resource Allocation for DF Two-Way Relay Networks with Energy Harvesting. Sensors. 2018; 18(11):3946. https://doi.org/10.3390/s18113946

Chicago/Turabian Style

Peng, Chunling, Fangwei Li, Huaping Liu, and Guozhong Wang. 2018. "Outage-Based Resource Allocation for DF Two-Way Relay Networks with Energy Harvesting" Sensors 18, no. 11: 3946. https://doi.org/10.3390/s18113946

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop