Next Article in Journal
Vulnerabilities of the Open Platform Communication Unified Architecture Protocol in Industrial Internet of Things Operation
Next Article in Special Issue
Research on Power Allocation in Multiple-Beam Space Division Access Based on NOMA for Underwater Optical Communication
Previous Article in Journal
UAV-Based Hyperspectral Monitoring Using Push-Broom and Snapshot Sensors: A Multisite Assessment for Precision Viticulture Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Empowering Intelligent Surfaces and User Pairing for IoT Relaying Systems: Outage Probability and Ergodic Capacity Performance

1
Electrical-Electronics Department, School of Engineering and Technology, Tra Vinh University, Tra Vinh 87000, Vietnam
2
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh City 70000, Vietnam
3
Department of Computer Science and Information Engineering, College of Information and Electrical Engineering, Asia University, Taichung 41354, Taiwan
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(17), 6576; https://doi.org/10.3390/s22176576
Submission received: 24 July 2022 / Revised: 24 August 2022 / Accepted: 29 August 2022 / Published: 31 August 2022

Abstract

:
The evolution of Internet of Things (IoT) networks has been studied owing to the associated benefits in useful applications. Although the evolution is highly helpful, the increasing day-to-day demands of mobile users have led to immense requirements for further performance improvements such as efficient spectrum utilization, massive device connectivity, and high data rates. Fortunately, reconfigurable intelligent surfaces (RIS) and non-orthogonal multiple access (NOMA) techniques have recently been introduced as two possible current-generation emerging technologies with immense potential of addressing the above-mentioned issues. In this paper, we propose the integration of RIS to the existing techniques (i.e., NOMA and relaying) to further enhance the performance for mobile users. We focus on a performance analysis of two-user group by exploiting two main performance metrics including outage probability and ergodic capacity. We provide closed-form expressions for both performance metrics to highlight how NOMA-aided RIS systems provide more benefits compared with the benchmark based on traditional orthogonal multiple access (OMA). Monte-Carlo simulations are performed to validate the correctness of obtained expressions. The simulations show that power allocation factors assigned to two users play a major role in the formation of a performance gap among two users rather than the setting of RIS. In particular, the strong user achieves optimal outage behavior when it is allocated 35% transmit power.

1. Introduction

The evolution of sixth-generation (6G) wireless communication has added value to various applications. Consequently, this has led to a tremendous increase in the requirement of data connectivity and speed among users. Inefficient spectrum utilization and insufficient resources have demonstrated a major impact on the quality of services provided by previous generation networks. Thanks to recent technological advances, the enormous increase in efficiency has facilitated vast coverage for a huge number of users simultaneously. Though RIS were invented recently, their ability to perform signal transmissions similar to the smart radio environment (SRE) has rendered it a desirable mode of communication in many technologies [1]. There has been a huge number of articles reporting on its efficient performance in several technologies such as millimeter-Wave (mmWave), NOMA, OMA, cognitive radio (CR), etc. [2]. RIS is a meta-surface device that can control radio wave propagation by means of either reflecting or refracting radio signals based on the location of the user. In simple terms, the operation of RIS appears similar to a mirror reflection and refraction. Furthermore, RIS is a passive device meaning it does not add any external boost to the signal unlike the relaying technique.
The promising applications of RIS were discussed in recent studies [3,4,5,6,7,8,9,10,11,12]. In [3], the authors proposed RIS-based index modulation to improve spectral efficiency. The obtained results prove that this method also can provide high data rates with low error rates. In [4], the authors studied the free-space path loss model in RIS by validating the modeling results with mathematical results. RIS-aided multi-user multiple-input and multiple-output (MIMO) systems were proposed in [5] to estimate the cascaded channels of RIS. The authors proposed an alternating optimization algorithm to manage the non-convex problems and an estimation scheme which proved to be effective. The implementation of real-time RIS-based MIMO quadrature amplitude modulation was proposed in [6], which is a robust and cost-effective model with less energy-consuming hardware architecture. To enhance diverse transmission channel communication in a radio frequency (RF) sensing environment, the authors in [7] proposed a posture-recognizing RF-sensing system based on RIS. To improve the accuracy of the proposed model, optimization of various RIS factors were considered and the proposed model proved to be highly effective in recognition accuracy. In [8], the authors considered the RIS-aided multi-user multiple-input single-output (MISO) system to maximize the weighted sum-rate by beamforming at the access point and phase matrix design at RIS in both perfect and imperfect channel state information (CSI) scenarios. To obtain the matrix design, a low-complexity algorithm is designed utilizing fractional programming techniques. In [9], the authors considered the path loss of a channel consisting of reflecting array RIS using RIS size and link geometry. The secrecy performance of RIS in the presence of an eavesdropper is studied in [10], where the authors designed access point transmit beamforming and RIS reflect beamforming to maximize the secrecy rate of legitimate users. In [11], the authors examined the performance of RIS-aided point-to-point MIMO system and studied the characterization of the fundamental capacity of the RIS.
Upon inspection of the multiple access scheme applied to the RIS system, one can observe benefits of NOMA and OMA. In particular, the NOMA technique has become quite popular in recent times owing to its ability to share the same resource with more than one user [13]. In NOMA, two users are formed as a single cluster where the same resource slot is allocated to both users [14]. The signals of the users are transmitted by superposition coding and the received signals are separated by using the successive interference cancellation (SIC) technique [15]. Power allocation for the users plays a key role in differentiating the signals as the near user is allotted less power and the far user is allotted more power [16]. There are quite a few research works being published on the integration of NOMA with various technologies such as CR, massive-input massive-output [17], satellite communications [18], and under various scenarios such as perfect and imperfect SIC, CSI, hybrid NOMA. NOMA-based vehicle to everything (V2X) enabled backscatter communication is proposed in [19] to obtain optimal performance of the network compared to other traditional networks. Karush–Kuhn–Tucker (KKT) condition and sub-gradient methods are designed and the performance analyzed via Monte-Carlo simulations.
Several studies were performed suggesting the integration of RIS technology with NOMA as this combination can enhance the spectrum and energy efficiency, and increase the coverage area of signal transmission. In [20], the authors compared the performance of NOMA and OMA networks in the presence of the RIS downlink communication system. The goal was to minimize the transmit power by optimizing a few parameters in the network and a low-complexity solution was designed to obtain near-optimal performance. The numerical analysis shows that NOMA has a better performance capacity compared to its predecessor. In [21,22], the authors evaluated the throughput performance of the NOMA-assisted RIS system. In an effort to maximize the system throughput, joint optimization of the channel assignment, reflection coefficient, and power allocation was proposed by the authors through a low-complexity decoding order optimization algorithm. The simulation results showed that the correct placement of RIS can improve the throughput performance, along with the optimization technique. Outage and ergodic performance of RIS-assisted NOMA networks were studied in [23] in the presence of perfect and imperfect SIC and compared to OMA and relaying techniques. NOMA demonstrated superior performance over the other two techniques and also achieved enhanced energy efficiency among the network. Meanwhile, in [24], the authors proposed RIS-enhanced mmWave NOMA communications to enhance the sum rate of the system by jointly optimizing the active and passive beamforming and power allocation. To achieve optimization, the authors proposed alternating optimization and successive convex approximation-based iterative algorithm. In [25], the authors proposed an RIS-based NOMA system to implement more user allocation to the network compared to the spatial direction than the spatial division multiple access (SDMA) technique. Furthermore, the authors demonstrated the effectiveness of hardware impairments on the network and the simulations results showed that the proposed RIS-NOMA scheme had better user allocation.

2. The Related Works

2.1. Considerations of the Related Works

In [26], the authors proposed an RIS-assisted NOMA system for robust and secure communication via the introduction of artificial noise. It is assumed that the network has imperfect CSI of eavesdropper and transmit beamforming and phase shift optimization is performed using alternating optimization (AO) algorithm developed by the authors. Simulation analysis shows the advantage of a robust beamforming scheme AO algorithm in performing secure data communication through the network. In [27], RIS-assisted NOMA and OMA networks are considered with a cell-edge user device over a Nakagami-m fading channel. The performance of the system was analyzed and simulations showed the superior performance of RIS over decode and forward (DF) relay. A distributed RIS-enabled NOMA network was proposed in [28] to study the system’s secrecy performance in the presence of a passive eavesdropper. To maximize the minimum secrecy rate among the users, the authors considered jointly optimizing the transmit beamforming and phase shift at RIS. The authors proposed a ring-penalty-based successive convex approximation (SCA) algorithm and efficient AO algorithm. The numerical analysis showed the importance of the number of reflecting elements at the distributed RIS and the performance comparison between centralized and distributed RISs. In [29], the authors considered multiple unmanned aerial vehicle (UAV) mounted base station-assisted NOMA networks in the presence of an RIS and studied the performance of the system considering various parameters. To maximize the sum rate, the authors proposed joint optimization of the 3D placement, transmit power at UAV and reflection matrix at RIS, and decoding orders at NOMA. The authors proposed a block-decent coordinated-based algorithm and penalty-based SCA algorithm to obtain optimization of the parameters. The numerical analysis showed that optimization of the UAV placement can greatly increase the network performance and greatly enhance the channel quality served to the users. In [30], the authors studied the effect of implementing the hardware impairments as a real-time scenario in an RIS-assisted NOMA network. The numerical results and simulation analysis showed that the effect of hardware impairments can be considerably complemented when the number of meta-surfaces is sufficiently high. In [31], the authors presented the impact of coherent phase-shifting and random phase-shifting in NOMA-assisted RIS networks. To improve the reliability of the random phase-shifting method, the authors also proposed a low-complexity phase selection scheme.
We provide a comparison of our work with related works, shown in Table 1.

2.2. Motivations and Our Contributions

With regard to the aforementioned papers, there still remains a gap in the literature concerning investigations of the NOMA network in the presence of hybrid RIS and relay approach, as both differ in their operational characteristics but still performing similar functionality. The reason behind this is that the relay is still being implemented in emerging networks, while RIS is a new component requiring evaluation in terms of its synergistic functionality in conjunction with the relay. The relay might be installed in existing locations. However, the received signals are still weak in certain locations due to blocking or shadowing. Therefore, by enabling RIS at the walls of buildings, performance can be improved since RIS enhances the incident and reflecting signals targeting dedicated groups of users. It is worth pointing out that the limitations of this study regarding artificial intelligence and hardware impairments are not addressed since they are beyond the scope of this paper. Further, since one can limit interference to each user, we refer to each group of users containing only two users. More users in a group weaken the signal received at destinations. We will pursue Artificial Intelligence, multiple users and hardware impairments in future work. The contributions of this paper are as follows:
  • We consider how RIS-NOMA and relay can work together to perform signal transmission to the two users in the framework over Rayleigh fading distribution and the network is considered as following perfect SIC and CSI.
  • We first aim to clarify how the hybrid scheme exhibits some advantageous points compared with the related benchmark such as RIS-OMA. In particular, we simulate and determine main factors affecting RIS-NOMA to increase the effectiveness of processing.
  • To conduct performance analysis, we introduce the closed-form expressions for outage probability (OP) and ergodic capacity (EC) for two representative users and some scenarios related to the presence of OMA, RIS and relay for comparison purposes.
  • The numerical analysis can be performed via Monte-Carlo simulations to verify the validity of the obtained expressions. The simulations were performed to confirm the number of meta-surfaces at RIS, and the transmit SNR at the source are the main parameters affecting system performance.
The remainder of the paper is presented as follows. Section 3 describes the system model. Section 4 and Section 5 provide the OP and EC expressions of the users in the RIS-NOMA network. Section 6 provides the OPs and EC expressions of the users in the RIS-OMA network. Section 7 illustrates Figures for evaluation of the performance. Finally, concluding remarks are provided in Section 8.

3. System Model

As mentioned in Figure 1, we consider a RIS-NOMA network consisting of an access point or base station ( B S ), a relay (R), an RIS ( R I ), and two NOMA users D 1 and D 2 . It is noted that many IoT devices can be divided to many sets of users, and each set has two users. We could refer to more benefits from the joint design of a DF relay [43]. In the traditional IoT, a relay plays an important role in improving the performance for long-distance users and providing larger coverage areas. This paper considers RIS as a solution to foster these benefits for the existing system. Unlike the R I which has Q reflecting elements, B S , R and D i ( i = 1 , 2 ) each have a single omni-directional antenna. It is assumed that B S and D i are located far apart from each other and there is no direct link between them owing to deep fading or obstructions [40,41]. Such transmission also requires two hops to deliver signals from B S to the destinations. During the first hop, B S transmits its signal to both R and R I , where the latter reflects the incident signal towards R. Therefore, the received signal at R can be given as [40,44]
y r = g s r d s r ε + q = 1 Q g s , q g r , q d s i ε d i r ε Ω q e j ω q P s χ 1 z 1 + P s χ 2 z 2 + δ r .
It is worth noting that the different demands of data service are required among two considered users, and hence we assume that χ 2 > χ 1 with χ 1 + χ 2 = 1 since B S adjusts the percentage of transmit antennas for each user [45]. Ω q is the amplitude reflection coefficient with Ω q 0 , 1 , ω q is the adjustable phase applied by the q-th reflecting element with ω q 0 , 2 π . In addition, g s r , g s , q , and g r , q are complex Gaussian random variables (RV) with zero mean and unit variance. The distances d s r , d s i , d i r are denoted for the links B S R , B S R I and R I R , respectively. With large Q, via the central limit theorem, we find that q = 1 Q g s , q g r , q C N 0 , Q and g s r C N 0 , λ s r [46]. The other main parameters are shown in Table 2.
The received signal to interference plus noise ratio (SINR) at the relay to decode z 2 can be given as
γ r z 2 = d s r ε g s r 2 + θ 1 Φ 1 2 χ 2 φ d s r ε g s r 2 + θ 1 Φ 1 2 χ 1 φ + 1 .
In order to simplify the analysis, Ideal Passive Beamforming (IPB) with Perfect Channel Estimation (PCE) is assumed at the RIS, and all elements have the same reflection amplitude. We have the phase ω q = arg g s r arg g s , q g r , q and Ω q = Ω , q [40], θ 1 = Ω 2 d s i ε d i r ε , φ = P s σ 0 , due to Φ 1 = q = 1 Q g s , q g r , q e j ω q = q = 1 Q g s , q g r , q in the case of perfect CSI [44,46]. It should be noted that perfect CSI is unattainable in practical scenarios. Therefore, the following analytical results can be treated as the upper bound of performance. We will deal with SIC and CSI imperfections in future work.
After conducting an SIC based on the principle of NOMA, the received SINR at the relay to decode z 1 can be given as
γ r z 1 = d s r ε g s r 2 + θ 1 Φ 1 2 χ 1 φ .
R transmits the decoded signal to R I and D 1 , where R I reflects the incident signal towards D 1 to be added constructively with the direct link from R. Therefore, after successful decoding of z 1 at R, the received signal at D 1 can be given as [40,44,46]
y D 1 = h r 1 d r 1 ε + q = 1 Q h r , q h 1 , q d r i ε d i 1 ε q e j q P r χ 1 z 1 + P r χ 2 z 2 + δ 1 ,
where q is the amplitude reflection coefficient, q is the adjustable phase applied by the q-th reflecting element. h r 1 , h r , q , h 1 , q are complex Gaussian RV with zero mean and unit variance, d r 1 , d r i , d i 1 are the distances for the R- D 1 , R- R I and R I - D 1 links, respectively. We place our attention on Rayleigh distribution for these channels since we aim to characterize complete system performance metrics in closed-form expressions. Such results provide helpful guidelines to confirm the crucial role of RIS in its development in practical scenarios compared with the benchmark. Regarding Nakagami-m fading distributions for these channels, the readers are recommended to refer to the recent work in [12]. With large Q, via the central limit theorem, we find that q = 1 Q h r , q h 1 , q C N 0 , Q and h r 1 C N 0 , λ r 1 [44,46].
The expected SINR at the user D 1 to decode z 2 can be formulated as
γ D 1 z 2 = d r 1 ε h r 1 2 + θ 2 Φ 2 2 χ 2 φ d r 1 ε h r 1 2 + θ 2 Φ 2 2 χ 1 φ + 1 ,
where in order to simplify the analysis, IPB with PCE is assumed at the RIS, and all elements have the same reflection amplitude. We have the phase q = arg h r 1 arg h r , q h 1 , q and q = , q [40], φ = P s σ 0 = P r σ 0 , θ 2 = 2 d r i ε d i 1 ε , Φ 2 = q = 1 Q h r , q h 1 , q e j q = q = 1 Q h r , q h 1 , q [44,46].
After SIC, the received SNR at user D 1 to decode z 1 can be given as
γ D 1 z 1 = d r 1 ε h r 1 2 + θ 2 Φ 2 2 χ 1 φ .
Similar to D 1 , the received signal at D 2 can be given as [40,44,46]
y D 2 = h r 2 d r 2 ε + q = 1 q h r , q h 2 , q d r i ε d i 2 ε ϖ q e j κ q P r χ 1 z 1 + P r χ 2 z 2 + δ 2 ,
where ϖ q is the amplitude reflection coefficient, κ q is the adjustable phase applied by the q-th reflecting element. h r 2 , h 2 , q are complex Gaussian RV with zero mean and unit variance, d r 2 , d i 2 are the distances for the R- D 2 and R I - D 2 links, respectively. With large Q, via the central limit theorem, we find that q = 1 Q h r , q h 2 , q C N 0 , Q and h r 2 C N 0 , λ r 2 [44,46].
The SINR at the user D 2 to decode z 2 can be formulated as
γ D 2 z 2 = d r 2 ε h r 2 2 + θ 3 Φ 3 2 χ 2 φ d r 2 ε h r 2 2 + θ 3 Φ 3 2 χ 1 φ + 1 .
Furthermore, IPB with PCE is assumed at the RIS, and all elements have the same reflection amplitude. We have the phase κ q = arg h r 2 arg h r , q h 2 , q and ϖ q = ϖ , q [40], θ 3 = ϖ 2 d r i ε d i 2 ε , Φ 3 = q = 1 Q h r , q h 2 , q e j κ q = q = 1 Q h r , q h 2 , q [44,46].
In the following sections, we shift our focus to system performance metrics, i.e., OP and EC, which provide meaningful guidelines to enable hybrid RIS and relay approach in practical applications.

4. OP Analysis

As mentioned in [13,14,15], we refer to evaluation of the main system performance metric, i.e., OP. In particular, an outage behavior of the considered system occurs when the achievable rate is less than the predetermined target rate.

4.1. OP of D 1

According to the NOMA protocol, the outage events of D 1 can be explained as below. The first is that R cannot detect z 1 . The second is that D 1 cannot detect its own message z 1 under the conditions that D 1 can detect z 2 successfully. Consequently, the OP of D 1 is expressed as [23,45]
O P D 1 = Pr γ r z 1 < ϑ 1 γ D 1 z 2 < ϑ 2 γ D 1 z 1 < ϑ 1 = 1 Pr γ r z 1 ϑ 1 , γ D 1 z 2 ϑ 2 , γ D 1 z 1 ϑ 1 = 1 Pr γ r z 1 ϑ 1 A 1 Pr γ D 1 z 2 ϑ 2 , γ D 1 z 1 ϑ 1 A 2 ,
where ϑ i = 2 2 R i 1 , i = 1 , 2 .
Proposition 1.
The closed-form expression for OP of the user D 1 is given by
O P D 1 = 1 d s r ε λ s r Q θ 1 d s r ε λ s r exp ϑ 1 d s r ε φ β 1 λ s r exp θ 1 d s r ε λ s r 1 Q ϑ 1 φ β 1 θ 1 1 × d r 1 ε λ r 1 θ 2 Q d r 1 ε λ r 1 exp ν d r 1 ε λ r 1 exp θ 2 d r 1 ε λ r 1 1 Q ν θ 2 1 ,
where ν = max ϑ 2 χ 2 χ 1 ϑ 2 φ , ϑ 1 χ 1 φ .
Proof. 
Please refer to Appendix A. □
Remark 1.
It is worth noting that although many parameters affect the performance in (10), we can reference several main values to control the system performance. To achieve the evaluation of OP, these derivations can be performed in reliable and computationally efficient software packages, e.g., Mathematica, Matlab, where these values can be found accordingly. For example, if the locations of RIS, relay, and users can be determined, OP can be efficiently adjusted to satisfy requirements in the design of RIS-NOMA systems.

4.2. OP of D 2

The outage events of D 2 can be explained two-fold. The first reason is that R cannot detect z 2 . The second reason is that D 2 cannot detect its own message z 2 . Based on these, the OP of D 2 is expressed as [23,45]
O P D 2 = Pr γ r z 2 < ϑ 2 γ D 2 z 2 < ϑ 2 = 1 Pr γ r z 2 ϑ 2 , γ D 2 z 2 ϑ 2 = 1 Pr γ r z 2 ϑ 2 B 1 Pr γ D 2 z 2 ϑ 2 B 2 .
Proposition 2.
The closed-form expression for OP of the user D 2 is given by
O P D 2 = 1 d s r ε λ s r θ 1 Q d s r ε λ s r exp ϑ 2 χ 2 χ 1 ϑ 2 φ d s r ε λ s r × exp θ 1 d s r ε λ s r 1 Q ϑ 2 χ 2 χ 1 ϑ 2 φ θ 1 1 × d r 2 ε λ r 2 θ 3 Q d r 2 ε λ r 2 exp ϑ 2 χ 2 χ 1 ϑ 2 φ d r 2 ε λ r 2 × exp θ 3 d r 2 ε λ r 2 1 Q ϑ 2 χ 2 χ 1 ϑ 2 φ θ 3 1 .
Proof. 
Please refer to Appendix B. □
Remark 2.
These expressions of outage performance of the two different users can be adjusted to obtain their expectation when B S varies the main parameters such as power channel gains and power allocation factors χ 1 , χ 2 . Furthermore, the distances among these nodes affect the performance. We expect to evaluate how differences in performance of the two users can be achieved in the numerical results section.

5. EC Analysis

If Quality of Service (QoS) requirements are set, the users’ data rates in the context of NOMA are opportunistically determined. In this section, ergodic capacity analysis is important to know since it defines the long-term average rate.

5.1. EC of D 1

On the condition that R and D 1 can detect z 1 , the achievable rate of D 1 can be written as 1 = 1 2 log 2 1 + min γ r z 1 , γ D 1 z 1 . The ergodic rate of D 1 can be obtained in the following [23,47,48]
¯ 1 = E 1 2 log 2 1 + Ξ 1 = 1 2 ln 2 0 1 F Ξ 1 t 1 + t d t ,
where Ξ 1 = min γ r z 1 , γ D 1 z 1 .
Proposition 3.
The closed expression of ergodic rate for D 1 is given by
¯ 1 = 1 2 ln 2 μ 1 μ 2 exp ξ Ei ξ ,
where μ 1 = d s r ε λ s r d s r ε λ s r Q θ 1 , μ 2 = d r 1 ε λ r 1 d r 1 ε λ r 1 Q θ 2 , ξ = 1 d s r ε χ 1 φ λ s r + 1 d r 1 ε χ 1 φ λ r 1 .
Proof. 
Please refer to Appendix C. □

5.2. EC of D 2

Since z 2 should be detected at R and D 2 as well as at D 1 for SIC, the achievable rate of D 2 is written as 2 = 1 2 log 2 1 + min γ r z 2 , γ D 1 z 2 , γ D 2 z 2 . The corresponding ergodic rate is given by [23,47,48]
¯ 2 = E 1 2 log 2 1 + Ξ 2 = 1 2 ln 2 0 1 F Ξ 2 t 1 + t d t ,
where Ξ 2 = min γ r z 2 , γ D 1 z 2 , γ D 2 z 2 .
Proposition 4.
The exact expression of ergodic rate for D 2 is given by
¯ 2 = 1 2 ln 2 0 1 χ 1 χ 2 μ 1 μ 2 μ 3 χ 1 + χ 2 w χ 1 exp ϕ χ 2 w χ 2 χ 2 w χ 1 d w ,
where μ 3 = d r 2 ε λ r 2 d r 2 ε λ r 2 θ 3 Q , ϕ = 1 φ d s r ε λ s r + 1 φ d r 1 ε λ r 1 + 1 φ d r 2 ε λ r 2 .
Proof. 
Please refer to Appendix D. □

5.3. The Asymptotic Expression for Ergodic Rate of D 2

From (16), by using the Gauss–Chebyshev integral [49,50], the asymptotic expression for ergodic rate of D 2 can provide the following integral approximation
¯ 2 a s y m = 1 2 ln 2 j = 1 K π Λ 2 K χ 1 χ 2 μ 1 μ 2 μ 3 χ 1 + χ 2 w j χ 1 exp ϕ χ 2 w j χ 2 χ 2 w j χ 1 ,
where w j = 1 2 1 + cos 2 j 1 G , Λ = sin 2 j 1 K , K is the Gauss–Chebyshev integral approximated sum term [50].
Remark 3.
It is worth noting that the EC performance presented in these derivations can be computed effectively if we use software packages, e.g., Mathematica, and Matlab, in which the values affecting EC can be found accordingly.

6. Benchmark Scheme: RIS-OMA

In this subsection, the RIS-OMA scheme in Figure 2 is regarded as a necessary benchmark for comparison purposes, where an R I is deployed to assist in the transmission from the B S to a user D o [23]. Similar to (1), the received signal at R can be given as
y r , o = g s r d s r ε + q = 1 Q g s , q g r , q d s i ε d i r ε Ω q e j ω q P s z o + δ r .
The received SNR at the relay to decode z o can be given as [23]
γ r , o = d s r ε g s r 2 + θ 1 Φ 1 2 φ .
R transmits the decoded signal to R I and D o , where R I reflects the incident signal towards D o to be added constructively with the direct link from R. Therefore, after successful decoding of z o at R, the received signal at D o can be given as
y D o = h r d d r d ε + q = 1 Q h r , q h d , q d r i ε d i d ε q e j q P r z o + δ d ,
where h r , q , h d , q are complex Gaussian RV with zero mean and unit variance, d r d , d i d are the distances for the R- D o and R I - D o links, respectively. With large Q, via the central limit theorem, we find that q = 1 Q h r , q h d , q C N 0 , Q and h r d C N 0 , λ r d [46].
The received SNR at user D o to decode z o can be given as [23]
γ D o = d r d ε h r d 2 + θ i , o Φ i , o 2 φ ,
where in order to simplify the analysis, IPB with PCE is assumed at the RIS, and all elements have the same reflection amplitude. We have the phase q = arg h r d arg h r , q h d , q and q = , q [40] θ i , o = 2 d r i ε d i d ε , Φ i , o = q = 1 Q h r , q h d , q e j q = q = 1 Q h r , q h d , q [46].

6.1. Outage Performance Analysis

For RIS-OMA, an outage event is defined as the probability that the instantaneous SNR γ r , o and γ D o fall below a threshold SNR ϑ o . Hence, the OP of user D o can be expressed as [23]
O P D o = Pr γ r , o < ϑ o γ D o < ϑ o = 1 Pr γ r , o ϑ o A 1 , o Pr γ D o ϑ o A 2 , o ,
where ϑ o = 2 6 R o 1 .
Proposition 5.
The closed-form expression for OP of the user D o is given by
O P D o = 1 d s r ε λ s r Q θ 1 d s r ε λ s r d r d ε λ r d Q θ i , o d r d ε λ r d exp ϑ o d s r ε φ λ s r ϑ o d r d ε φ λ r d × exp θ 1 d s r ε λ s r 1 Q ϑ o φ θ 1 1 exp θ i , o d r d ε λ r d 1 Q ϑ o φ θ i , o 1 .
Proof. 
The details are given in Appendix E. □

6.2. Computation of EC

For RIS-OMA, based on (19) and (21), the ergodic rate of user D o can be expressed as [23,47]
¯ O = E 1 6 log 2 1 + Ξ O = 1 6 ln 2 0 1 F Ξ O t 1 + t d t ,
where Ξ O = min γ r , o , γ D o .
Proposition 6.
The closed-form expression of ergodic rate for RIS-OMA is given by
¯ O = 1 6 ln 2 μ 1 d r d ε λ r d d r d ε λ r d Q θ i , o exp 1 d s r ε φ λ s r + 1 d r d ε φ λ r d Ei 1 d s r ε φ λ s r + 1 d r d ε φ λ r d .
Proof. 
The details are given in Appendix F. □

7. Numerical Results and Discussion

In this section, the numerical results are presented to confirm the rationality of the derived theoretical expressions for RIS-NOMA IoT networks. We show the impact of the reflecting elements on the performance of the RIS-assisted NOMA IoT network. In the simulation results, Rayleigh fading is assumed for all the channels [44]. The OP and EC are obtained via Monte Carlo simulations. The main parameters are presented in Table 3, excluding specific cases.
Figure 3 demonstrates the simulation of OP versus φ for different χ 1 . As can be observed from the simulation, the OMA demonstrates the worst performance compared to both users in the NOMA network. As the φ increases, the outage performance of the IoT users increases relatively. The power level coefficient of the D 1 varies, and for the higher power level, the D 1 provides better outage performance and vice versa. The user D 1 with χ 1 = 0.3 confirms its superior performance compared with the other cases.
Figure 4 exhibits the simulation of OP versus φ for different R 1 = R 2 . It is observed from the simulation that as the target rates of the users are increased, the performance is reduced. With the increase in transmit SNR, the performance of both users increases relatively and the gap between the curves of the two users is maintained for all cases of target rates. The lower requirement of target rate results in better outage behavior, i.e., R 1 = R 2 = 0.5 is reported as the best case.
Figure 5 shows the simulation of OP versus R 1 = R 2 for different d s r , i.e., distance between B S R . Here, we can observe that as the distance increases, the outage performance of the IoT users decreases. Additionally, for higher level target rates assigned in each scenario, the outage performance of each user enters saturation mode. This shows that an optimal distance between the B S R has a pivotal role in enhancing the performance of the system.
Figure 6 illustrates the simulation of OP versus χ 1 for different Q. As we can observe from the simulation, as the power allocation increases for user D 1 , the performance of the user increases rapidly. However, the number of elements also plays a major role in enhancing the performance of both users. In all cases, the highest number of elements produces the best performance. As we can see, the power coefficients χ 1 = χ 2 clearly affect the performance significantly. When χ 1 increases, the OP of user D 2 worsens, since it follows the principle of NOMA, while user D 1 meets the optimal OP values at χ 1 = 0.35 corresponding to the three values of Q. This finding provides a numerical way to achieve optimization for OP. It can be seen clearly that Q = 2000 exhibits its superiority over the other cases.
Figure 7 shows the simulation of EC versus φ for different Q while Figure 8 confirms the impact of the power allocation factor on EC performance. In Figure 7, the simulation demonstrates the performance comparison of NOMA and OMA networks in the proposed model for two different meta-surface elements. Asymptotic analysis of user D 2 has the worst case EC meanwhile, the near IoT user D 1 with a higher number of meta-surfaces has the best case EC. Similarly, we can see in Figure 8 that the EC for user D 1 increases if more power is assigned regardless any values of the average SNR at the source φ .
Design Guidelines Below, we provide the following design suggestions extracted from the insightful numerical findings. These analytical points can provide helpful advice in materializing the theoretical insights.
  • Considering the curves of OP versus φ for different χ 1 , in order to obtain OP of 0.65, φ for the OMA case is required to be 40 (dB). Furthermore, to satisfy the setting of NOMA in the case of χ 1 = 0.3 user D 1 needs φ at 33 (dB) while user D 2 needs φ = 37 (dB).
  • Considering the curves of OP versus φ for different R 1 = R 2 , if we want OP to equal 0.5 at R 1 = R 2 = 0.5 (bps/Hz), φ for user D 1 must be 36.5 (dB), and user D 2 requires φ = 37 (dB). However, increasing target rates to R 1 = R 2 = 0.7 (bps/Hz) and maintaining OP at 0.5, these requirements need user D 1 served by the average SNR at the source φ = 38.5 (dB), and D 2 corresponds to φ = 40 (dB).
  • We need to know how the distances among nodes enact changes in OP with respect to R 1 = R 2 , i.e., d s r need to be evaluated. When d s r = 10 (m), the expected OP of 0.5 occurs at user D 1 for the case R 1 = R 2 = 0.15 (bps/Hz), while user D 2 corresponds to R 1 = R 2 = 0.16 (bps/Hz). If we increase d s r to 20 (m), the expected OP of 0.5 for user D 1 occurs in the case of R 1 = R 2 = 0.05 (bps/Hz), and user D 2 corresponds to R 1 = R 2 = 0.1 (bps/Hz).
  • We shift our attention to EC versus φ for different Q with G = K = 1000. When Q = 100 the EC of 1 (bit/s/Hz) for user D 1 occurs when φ = 40 (dB), while user D 2 corresponds to φ = 49 (dB). If the setting of RIS is changed to Q = 500, the EC of 1 (bit/s/Hz) required at user D 1 when φ equals 41 (dB), and φ equals 46 (dB) D 2 for user D 2 .

8. Conclusions and Future Work

In this paper, we evaluated the performance of an IoT system consisting of RIS and relay when the channels are adopted Rayleigh fading distributions. The closed-form expressions are derived for the RIS-NOMA system and the system’s performance was analyzed in terms of OP and EC. The hybrid scheme demonstrated increased efficiency by comparing practical scenarios via simulations. Simulation analysis was performed using Monte-Carlo methodology, to verify the validity of the obtained expressions. The simulations reveal that the, transmit SNR, number of elements, power allocation, and target rates play a major role in enhancing the performance of IoT users. Meanwhile, the increase in distance and path loss decreases the performance of the system. However, the increase in amplitude coefficient does not show much effect on the performance of users. In future work, we extend our analysis to multiple users to further prove the benefits of NOMA and RIS approaches. Interestingly, we may deploy some machine learning tools to predict the OP and EC performance of users at the base station, which can adjust power allocation factors to better improve performance.

Author Contributions

H.-P.D. introduced the idea, contributed to developing some mathematical analysis; M.-S.V.N. performed the simulation experiments; D.-T.D. introduced the idea, contributed to developing some mathematical analysis; M.-H.N. and M.-T.P. provided valuable comments; A.-T.K. contributed to preparing the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This study was fully funded by Tra Vinh University under grant contract number 182/HD.HDKH&DT-DHTV.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Proposition 1.
From (9), A 1 can written by
A 1 = Pr d s r ε g s r 2 + θ 1 Φ 1 2 χ 1 φ ϑ 1 = Pr g s r 2 ϑ 1 χ 1 φ θ 1 Φ 1 2 d s r ε χ 1 φ ,
where (A1) must satisfy the condition ϑ 1 χ 1 φ θ 1 Φ 1 2 > 0 Φ 1 2 < ϑ 1 χ 1 φ θ 1 . Thus, the CDF and the PDF of all channels can be expressed as F X 2 x = 1 e x λ X and f X 2 x = 1 λ X e x λ X [44,45,46]. A 1 can given as
A 1 = Pr g s r 2 ϑ 1 χ 1 φ θ 1 Φ 1 2 d s r ε χ 1 φ , Φ 1 2 < ϑ 1 χ 1 φ θ 1 = 0 ϑ 1 χ 1 φ θ 1 1 F g s r 2 ϑ 1 χ 1 φ θ 1 x d s r ε χ 1 φ f Φ 1 2 x d x = 1 Q exp ϑ 1 d s r ε χ 1 φ λ s r 0 ϑ 1 χ 1 φ θ 1 exp θ 1 d s r ε λ s r 1 Q x d x = d s r ε λ s r Q θ 1 d s r ε λ s r exp ϑ 1 d s r ε χ 1 φ λ s r exp θ 1 d s r ε λ s r 1 Q ϑ 1 χ 1 φ θ 1 1 .
From (9), A 2 can written by
A 2 = Pr d r 1 ε h r 1 2 + θ 2 Φ 2 2 χ 2 φ d r 1 ε h r 1 2 + θ 2 Φ 2 2 χ 1 φ + 1 ϑ 2 , d r 1 ε h r 1 2 + θ 2 Φ 2 2 χ 1 φ ϑ 1 = Pr d r 1 ε h r 1 2 + θ 2 Φ 2 2 ϑ 2 χ 2 χ 1 ϑ 2 φ , d r 1 ε h r 1 2 + θ 2 Φ 2 2 ϑ 1 χ 1 φ = Pr d r 1 ε h r 1 2 + θ 2 Φ 2 2 max ϑ 2 χ 2 χ 1 ϑ 2 φ , ϑ 1 χ 1 φ .
We let ν = max ϑ 2 χ 2 χ 1 ϑ 2 φ , ϑ 1 χ 1 φ and (A3) must satisfy the condition ν θ 2 Φ 2 2 > 0 Φ 2 2 < ν θ 2 . A 2 can be calculated as follows
A 2 = Pr h r 1 2 ν θ 2 Φ 2 2 d r 1 ε , Φ 2 2 < ν θ 2 = 0 ν θ 2 1 F h r 1 2 ν θ 2 x d r 1 ε f Φ 2 2 x d x = 1 Q exp ν d r 1 ε λ r 1 0 ν θ 2 exp θ 2 d r 1 ε λ r 1 1 Q x d x = d r 1 ε λ r 1 θ 2 Q d r 1 ε λ r 1 exp ν d r 1 ε λ r 1 exp θ 2 d r 1 ε λ r 1 1 Q ν θ 2 1 .
Combining (A2), (A4) into (9), we can obtain (10). This completes the proof. □

Appendix B

Proof of Proposition 2.
From (11), B 1 can written by
B 1 = Pr d s r ε g s r 2 + θ 1 Φ 1 2 χ 2 φ d s r ε g s r 2 + θ 1 Φ 1 2 χ 1 φ + 1 ϑ 2 = Pr d s r ε g s r 2 + θ 1 Φ 1 2 ϑ 2 χ 2 χ 1 ϑ 2 φ = Pr g s r 2 ϑ 2 χ 2 χ 1 ϑ 2 φ θ 1 Φ 1 2 χ 2 χ 1 ϑ 2 φ d s r ε ,
where (A5) must satisfy the condition χ 2 > χ 1 ϑ 2 and Φ 1 2 < ϑ 2 χ 2 χ 1 ϑ 2 φ θ 1 . B 1 can be obtained as
B 1 = Pr g s r 2 ϑ 2 χ 2 χ 1 ϑ 2 φ θ 1 Φ 1 2 χ 2 χ 1 ϑ 2 φ d s r ε , Φ 1 2 < ϑ 2 χ 2 χ 1 ϑ 2 φ θ 1 = 0 ϑ 2 χ 2 χ 1 ϑ 2 φ θ 1 1 F g s r 2 ϑ 2 χ 2 χ 1 ϑ 2 φ θ 1 x χ 2 χ 1 ϑ 2 φ d s r ε f Φ 1 2 x d x = 1 Q exp ϑ 2 χ 2 χ 1 ϑ 2 φ d s r ε λ s r 0 ϑ 2 χ 2 χ 1 ϑ 2 φ θ 1 exp θ 1 d s r ε λ s r 1 Q x d x = d s r ε λ s r θ 1 Q d s r ε λ s r exp ϑ 2 χ 2 χ 1 ϑ 2 φ d s r ε λ s r exp θ 1 d s r ε λ s r 1 Q ϑ 2 χ 2 χ 1 ϑ 2 φ θ 1 1 .
From (11), B 2 can be rewritten as
B 2 = Pr d r 2 ε h r 2 2 + θ 3 Φ 3 2 χ 2 φ d r 2 ε h r 2 2 + θ 3 Φ 3 2 χ 1 φ + 1 ϑ 2 = Pr d r 2 ε h r 2 2 + θ 3 Φ 3 2 ϑ 2 χ 2 χ 1 ϑ 2 φ = Pr h r 2 2 ϑ 2 χ 2 χ 1 ϑ 2 φ θ 3 Φ 3 2 χ 2 χ 1 ϑ 2 φ d r 2 ε ,
where (A7) must satisfy the condition χ 2 > χ 1 ϑ 2 and Φ 3 2 < ϑ 2 χ 2 χ 1 ϑ 2 φ θ 3 . B 2 is given by
B 2 = Pr h r 2 2 ϑ 2 χ 2 χ 1 ϑ 2 φ θ 3 Φ 3 2 χ 2 χ 1 ϑ 2 φ d r 2 ε , Φ 3 2 < ϑ 2 χ 2 χ 1 ϑ 2 φ θ 3 = 0 ϑ 2 χ 2 χ 1 ϑ 2 φ θ 3 1 F h r 2 2 ϑ 2 χ 2 χ 1 ϑ 2 φ θ 3 x χ 2 χ 1 ϑ 2 φ d r 2 ε f Φ 3 2 x d x = 1 Q exp ϑ 2 χ 2 χ 1 ϑ 2 φ d r 2 ε λ r 2 0 ϑ 2 χ 2 χ 1 ϑ 2 φ θ 3 exp θ 3 d r 2 ε λ r 2 1 Q x d x = d r 2 ε λ r 2 θ 3 Q d r 2 ε λ r 2 exp ϑ 2 χ 2 χ 1 ϑ 2 φ d r 2 ε λ r 2 exp θ 3 d r 2 ε λ r 2 1 Q ϑ 2 χ 2 χ 1 ϑ 2 φ θ 3 1 .
Combining (A6), (A8) into (11), we can obtain (12). This completes the proof. □

Appendix C

Proof of Proposition 3.
From (13), F Ξ 1 t can be written as
F Ξ 1 t = Pr min γ r z 1 , γ D 1 z 1 < t = 1 1 F γ r z 1 t 1 F γ D 1 z 1 t .
From (A9), F γ r z 1 t can be calculated as
F γ r z 1 t = 1 Pr d s r ε g s r 2 + θ 1 Φ 1 2 χ 1 φ t = 1 Pr g s r 2 t χ 1 φ θ 1 Φ 1 2 d s r ε χ 1 φ = 1 0 1 F g s r 2 t χ 1 φ θ 1 x d s r ε χ 1 φ f Φ 1 2 x d x = 1 1 Q exp t d s r ε χ 1 φ λ s r 0 exp 1 Q θ 1 d s r ε λ s r x d x = 1 d s r ε λ s r d s r ε λ s r Q θ 1 exp t d s r ε χ 1 φ λ s r .
Then, F γ D 1 z 1 t can be written as
F γ D 1 z 1 t = 1 Pr d r 1 ε h r 1 2 + θ 2 Φ 2 2 χ 1 φ t = 1 Pr h r 1 2 t χ 1 φ θ 2 Φ 2 2 d r 1 ε χ 1 φ = 1 0 1 F h r 1 2 t χ 1 φ θ 2 x d r 1 ε χ 1 φ f Φ 2 2 x d x = 1 1 Q exp t d r 1 ε χ 1 φ λ r 1 0 exp 1 Q θ 2 d r 1 ε λ r 1 x d x = 1 d r 1 ε λ r 1 d r 1 ε λ r 1 Q θ 2 exp t d r 1 ε χ 1 φ λ r 1 .
From (A10) and (A11) into (A9), F Ξ 1 t can be written as
F Ξ 1 t = 1 μ 1 μ 2 exp ξ t ,
where μ 1 = d s r ε λ s r d s r ε λ s r Q θ 1 , μ 2 = d r 1 ε λ r 1 d r 1 ε λ r 1 Q θ 2 , ξ = 1 d s r ε χ 1 φ λ s r + 1 d r 1 ε χ 1 φ λ r 1 .
From (A12) into (13). Based on [51] (Equation (3.352.4)) and applying some polynomial expansion manipulations, ¯ 1 can be written as
¯ 1 = 1 2 ln 2 0 μ 1 μ 2 1 + t exp ξ t d t = 1 2 ln 2 μ 1 μ 2 exp ξ Ei ξ .
The proof is completed. □

Appendix D

Proof of Proposition 4.
From (15), F Ξ 2 t can be written as
F Ξ 2 t = Pr min γ r z 2 , γ D 1 z 2 , γ D 2 z 2 < t = 1 1 F γ r z 2 t 1 F γ D 1 z 2 t 1 F γ D 2 z 2 t .
From (A14), F γ r z 2 t can be expressed as
F γ r z 2 t = 1 Pr d s r ε g s r 2 + θ 1 Φ 1 2 χ 2 φ d s r ε g s r 2 + θ 1 Φ 1 2 χ 1 φ + 1 t = 1 Pr g s r 2 t χ 2 χ 1 t φ θ 1 Φ 1 2 χ 2 χ 1 t φ d s r ε = 1 0 1 F g s r 2 t χ 2 χ 1 t φ θ 1 x χ 2 χ 1 t φ d s r ε f Φ 1 2 x d x = 1 1 Q exp t χ 2 χ 1 t φ d s r ε λ s r 0 exp 1 Q θ 1 d s r ε λ s r x d x = 1 μ 1 exp t χ 2 χ 1 t φ d s r ε λ s r .
Then, F γ D 1 z 2 t can be expressed as
F γ D 1 z 2 t = 1 Pr d r 1 ε h r 1 2 + θ 2 Φ 2 2 χ 2 φ d r 1 ε h r 1 2 + θ 2 Φ 2 2 χ 1 φ + 1 t = 1 Pr h r 1 2 t χ 2 χ 1 t φ θ 2 Φ 2 2 χ 2 χ 1 t φ d r 1 ε = 1 0 1 F h r 1 2 t χ 2 χ 1 t φ θ 2 Φ 2 2 χ 2 χ 1 t φ d r 1 ε f Φ 2 2 x d x = 1 1 Q exp t χ 2 χ 1 t φ d r 1 ε λ r 1 0 exp 1 Q θ 2 d r 1 ε λ r 1 x d x = 1 μ 2 exp t χ 2 χ 1 t φ d r 1 ε λ r 1 .
Next, F γ D 2 z 2 t can be written as
F γ D 2 z 2 t = 1 Pr d r 2 ε h r 2 2 + θ 3 Φ 3 2 χ 2 φ d r 2 ε h r 2 2 + θ 3 Φ 3 2 χ 1 φ + 1 t = 1 Pr h r 2 2 t χ 2 χ 1 t φ θ 3 Φ 3 2 χ 2 χ 1 t φ d r 2 ε = 1 0 1 F h r 2 2 t χ 2 χ 1 t φ θ 3 x χ 2 χ 1 t φ d r 2 ε f Φ 3 2 x d x = 1 1 Q exp t χ 2 χ 1 t φ d r 2 ε λ r 2 0 exp 1 Q θ 3 d r 2 ε λ r 2 x d x = 1 d r 2 ε λ r 2 d r 2 ε λ r 2 θ 3 Q exp t χ 2 χ 1 t φ d r 2 ε λ r 2 .
From (A15)–(A17) into (A14), F Ξ 2 t can be expressed as
F Ξ 2 t = 1 μ 1 μ 2 μ 3 exp ϕ t χ 2 χ 1 t ,
where μ 3 = d r 2 ε λ r 2 d r 2 ε λ r 2 θ 3 Q , ϕ = 1 φ d s r ε λ s r + 1 φ d r 1 ε λ r 1 + 1 φ d r 2 ε λ r 2 .
From (A18) into (15), ¯ 2 is given by
¯ 2 = 1 2 ln 2 0 χ 2 χ 1 μ 1 μ 2 μ 3 1 + t exp ϕ t χ 2 χ 1 t d t .
We let w = χ 1 χ 2 t , ¯ 2 is written as
¯ 2 = 1 2 ln 2 0 1 χ 1 χ 2 μ 1 μ 2 μ 3 χ 1 + χ 2 w χ 1 exp ϕ χ 2 w χ 2 χ 2 w χ 1 d w .
The proof is completed. □

Appendix E

Proof of Proposition 5.
From (22), A 1 , o can be written as
A 1 , o = Pr d s r ε g s r 2 + θ 1 Φ 1 2 φ ϑ o = Pr g s r 2 ϑ o φ θ 1 Φ 1 2 d s r ε φ , Φ 1 2 < ϑ o φ θ 1 = 0 ϑ o φ θ 1 1 F g s r 2 ϑ o φ θ 1 x d s r ε φ f Φ 1 2 x d x = d s r ε λ s r Q θ 1 d s r ε λ s r exp ϑ o d s r ε φ λ s r exp θ 1 d s r ε λ s r 1 Q ϑ o φ θ 1 1 .
Then, A 2 , o can written by
A 2 , o = Pr d r d ε h r d 2 + θ i , o Φ i , o 2 φ ϑ o = Pr h r d 2 ϑ o φ θ i , o Φ i , o 2 d r d ε φ , Φ i , o 2 < ϑ o φ θ i , o = 0 ϑ o φ θ i , o 1 F h r d 2 ϑ o φ θ i , o x d r d ε φ f Φ i , o 2 x d x = d r d ε λ r d Q θ i , o d r d ε λ r d exp ϑ o d r d ε φ λ r d exp θ i , o d r d ε λ r d 1 Q ϑ o φ θ i , o 1 .
Combining (A21), (A22) into (22), we can obtain (23). It completes the proof. □

Appendix F

Proof of Proposition 6.
From (24), F Ξ O t can written by
F Ξ O t = Pr min γ r , o , γ D o < t = 1 1 F γ r , o t 1 F γ D o t .
From (A23), F γ r , o t can given as
F γ r , o t = 1 Pr d s r ε g s r 2 + θ 1 Φ 1 2 φ t = 1 Pr g s r 2 t φ θ 1 Φ 1 2 d s r ε φ = 1 0 1 F g s r 2 t φ θ 1 x d s r ε φ f Φ 1 2 x d x = 1 μ 1 exp t d s r ε φ λ s r .
Then, F γ D o t can given as
F γ D o t = Pr d r d ε h r d 2 + θ i , o Φ i , o 2 φ t = Pr h r d 2 t φ θ i , o Φ i , o 2 d r d ε φ = 0 1 F h r d 2 t φ θ i , o x d r d ε φ f Φ i , o 2 x d x = d r d ε λ r d d r d ε λ r d Q θ i , o exp t d r d ε φ λ r d .
From (A24) and (A25) into (A23), F Ξ O t can written by
F Ξ O t = 1 μ 1 d r d ε λ r d d r d ε λ r d Q θ i , o exp t d s r ε φ λ s r t d r d ε φ λ r d .
From (A26) into (24), ¯ O can given as
¯ O = 1 6 ln 2 μ 1 d r d ε λ r d d r d ε λ r d Q θ i , o 0 1 1 + t exp 1 d s r ε φ λ s r + 1 d r d ε φ λ r d t d t = 1 6 ln 2 μ 1 d r d ε λ r d d r d ε λ r d Q θ i , o exp 1 d s r ε φ λ s r + 1 d r d ε φ λ r d Ei 1 d s r ε φ λ s r + 1 d r d ε φ λ r d ,
where (A27) can be obtained by using [51] (Equation (3.352.4)). The proof is completed. □

References

  1. Wu, Q.; Zhang, S.; Zheng, B.; You, C.; Zhang, R. Intelligent Reflecting Surface-Aided Wireless Communications: A Tutorial. IEEE Trans. Commun. 2021, 69, 3313–3351. [Google Scholar] [CrossRef]
  2. Yuan, X.; Zhang, Y.-J.A.; Shi, Y.; Yan, W.; Liu, H. Reconfigurable-Intelligent-Surface Empowered Wireless Communications: Challenges and Opportunities. IEEE Wirel. Commun. 2021, 28, 136–143. [Google Scholar] [CrossRef]
  3. Basar, E. Reconfigurable Intelligent Surface-Based Index Modulation: A New Beyond MIMO Paradigm for 6G. IEEE Trans. Commun. 2020, 68, 3187–3196. [Google Scholar] [CrossRef]
  4. Tang, W.; Chen, M.Z.; Chen, X.; Dai, J.Y.; Han, Y.; Renzo, M.D.; Zeng, Y.; Jin, S.; Cheng, Q.; Cui, T.J. Wireless Communications With Reconfigurable Intelligent Surface: Path Loss Modeling and Experimental Measurement. IEEE Trans. Wirel. Commun. 2021, 20, 421–439. [Google Scholar] [CrossRef]
  5. Chen, J.; Liang, Y.; Cheng, H.V.; Wei, Y. Channel estimation for reconfigurable intelligent surface aided multi-user MIMO systems. arXiv 2019, arXiv:1912.03619. [Google Scholar]
  6. Tang, W.; Dai, J.Y.; Chen, M.Z.; Wong, K.; Li, X.; Zhao, X.; Jin, S.; Cheng, Q.; Cui, T.J. MIMO Transmission Through Reconfigurable Intelligent Surface: System Design, Analysis, and Implementation. IEEE J. Sel. Areas Commun. 2020, 38, 2683–2699. [Google Scholar] [CrossRef]
  7. Hu, J.; Zhan, H.; Di, B.; Li, L.; Bian, K.; Song, L.; Poor, H.V. Reconfigurable intelligent surface based RF sensing: Design, optimization, and implementation. IEEE J. Sel. Areas Commun. 2020, 38, 2700–2716. [Google Scholar] [CrossRef]
  8. Guo, H.; Liang, Y.; Chen, J.; Larsson, E.G. Weighted Sum-Rate Maximization for Reconfigurable Intelligent Surface Aided Wireless Networks. IEEE Trans. Wirel. Commun. 2020, 19, 3064–3076. [Google Scholar] [CrossRef]
  9. Ellingson, S.W. Path Loss in Reconfigurable Intelligent Surface-Enabled Channels. In Proceedings of the 2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Helsinki, Finland, 13–16 September 2021; pp. 829–835. [Google Scholar] [CrossRef]
  10. Cui, M.; Zhang, G.; Zhang, R. Secure Wireless Communication via Intelligent Reflecting Surface. IEEE Wirel. Commun. Lett. 2019, 8, 1410–1414. [Google Scholar] [CrossRef]
  11. Zhang, S.; Zhang, R. Capacity Characterization for Intelligent Reflecting Surface Aided MIMO Communication. IEEE J. Sel. Areas Commun. 2020, 38, 1823–1838. [Google Scholar] [CrossRef]
  12. Sharma, P.K.; Garg, P. Intelligent Reflecting Surfaces to Achieve the Full-Duplex Wireless Communication. IEEE Commun. Lett. 2021, 25, 622–626. [Google Scholar] [CrossRef]
  13. Do, D.-T.; Nguyen, T.-T.T.; Nguyen, T.N.; Li, X.; Voznak, M. Uplink and Downlink NOMA Transmission Using Full-Duplex UAV. IEEE Access 2020, 8, 164347–164364. [Google Scholar] [CrossRef]
  14. Do, D.-T.; Nguyen, M.-S.V.; Nguyen, T.N.; Li, X.; Choi, K. Enabling Multiple Power Beacons for Uplink of NOMA-Enabled Mobile Edge Computing in Wirelessly Powered IoT. IEEE Access 2020, 8, 148892–148905. [Google Scholar] [CrossRef]
  15. Do, D.-T.; Nguyen, T.-L.; Ekin, S.; Kaleem, Z.; Voznak, M. Joint User Grouping and Decoding Order in Uplink/Downlink MISO/SIMO-NOMA. IEEE Access 2020, 8, 143632–143643. [Google Scholar] [CrossRef]
  16. Dai, L.; Wang, B.; Ding, Z.; Wang, Z.; Chen, S.; Hanzo, L. A Survey of Non-Orthogonal Multiple Access for 5G. IEEE Commun. Surv. Tutor. 2018, 20, 2294–2323. [Google Scholar] [CrossRef]
  17. Ding, Z.; Adachi, F.; Poor, H.V. The Application of MIMO to Non-Orthogonal Multiple Access. IEEE Trans. Wirel. Commun. 2016, 15, 537–552. [Google Scholar] [CrossRef]
  18. Wei, X.; Liu, H.; Geng, Z.; Zheng, K.; Xu, R.; Liu, Y.; Chen, P. Application of Non-Orthogonal Multiple Access in LTE and 5G Networks. IEEE Commun. Mag. 2017, 55, 185–191. [Google Scholar]
  19. Khan, W.U.; Jameel, F.; Kumar, N.; Jäntti, R.; Guizani, M. Backscatter-Enabled Efficient V2X Communication With Non-Orthogonal Multiple Access. IEEE Trans. Veh. Technol. 2021, 70, 1724–1735. [Google Scholar] [CrossRef]
  20. Zheng, B.; Wu, Q.; Zhang, R. Intelligent Reflecting Surface-Assisted Multiple Access With User Pairing: NOMA or OMA? IEEE Commun. Lett. 2020, 24, 753–757. [Google Scholar] [CrossRef]
  21. Zuo, J.; Liu, Y.; Qin, Z.; Al-Dhahir, N. Resource allocation in intelligent reflecting surface assisted NOMA systems. IEEE Trans. Commun. 2020, 68, 7170–7183. [Google Scholar] [CrossRef]
  22. Zuo, J.; Liu, Y.; Qin, Z.; Shen, C. The Application of Intelligent Reflecting Surface in Downlink NOMA Systems. In Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar]
  23. Yue, X.; Liu, Y. Performance Analysis of Intelligent Reflecting Surface Assisted NOMA Networks. IEEE Trans. Wirel. Commun. 2022, 21, 2623–2636. [Google Scholar] [CrossRef]
  24. Zuo, J.; Liu, Y.; Basar, E.; Dobre, O.A. Intelligent Reflecting Surface Enhanced Millimeter-Wave NOMA Systems. IEEE Commun. Lett. 2020, 24, 2632–2636. [Google Scholar] [CrossRef]
  25. Ding, Z.; Poor, H.V. A Simple Design of IRS-NOMA Transmission. IEEE Commun. Lett. 2020, 24, 1119–1123. [Google Scholar] [CrossRef]
  26. Zhang, Z.; Lv, L.; Wu, Q.; Deng, H.; Chen, J. Robust and Secure Communications in Intelligent Reflecting Surface Assisted NOMA Networks. IEEE Commun. Lett. 2021, 25, 739–743. [Google Scholar] [CrossRef]
  27. Cheng, Y.; Li, K.H.; Liu, Y.; Teh, K.C.; Poor, H.V. Downlink and Uplink Intelligent Reflecting Surface Aided Networks: NOMA and OMA. IEEE Trans. Wirel. Commun. 2021, 20, 3988–4000. [Google Scholar] [CrossRef]
  28. Zhang, Z.; Chen, J.; Wu, Q.; Liu, Y.; Lv, L.; Su, X. Securing NOMA Networks by Exploiting Intelligent Reflecting Surface. IEEE Trans. Commun. 2022, 70, 1096–1111. [Google Scholar] [CrossRef]
  29. Mu, X.; Liu, Y.; Guo, L.; Lin, J.; Poor, H.V. Intelligent Reflecting Surface Enhanced Multi-UAV NOMA Networks. IEEE J. Sel. Areas Commun. 2021, 39, 3051–3066. [Google Scholar] [CrossRef]
  30. Hemanth, A.; Umamaheswari, K.; Pogaku, A.C.; Do, D.-T.; Lee, B.M. Outage Performance Analysis of Reconfigurable Intelligent Surfaces-Aided NOMA Under Presence of Hardware Impairment. IEEE Access 2020, 8, 212156–212165. [Google Scholar] [CrossRef]
  31. Ding, Z.; Schober, R.; Poor, H.V. On the Impact of Phase Shifting Designs on IRS-NOMA. IEEE Wirel. Commun. Lett. 2020, 9, 1596–1600. [Google Scholar] [CrossRef]
  32. Lin, Z.; Niu, H.; An, K.; Wang, Y.; Zheng, G.; Chatzinotas, S.; Hu, Y. Refracting RIS-Aided Hybrid Satellite-Terrestrial Relay Networks: Joint Beamforming Design and Optimization. IEEE Trans. Aerosp. Electron. Syst. 2022, 58, 3717–3724. [Google Scholar]
  33. Lin, Z.; Lin, M.; Wang, J.-B.; de Cola, T.; Wang, J. Joint Beamforming and Power Allocation for Satellite-Terrestrial Integrated Networks With Non-Orthogonal Multiple Access. IEEE J. Sel. Top. Signal Process. 2019, 13, 657–670. [Google Scholar] [CrossRef]
  34. An, K.; Liang, T.; Zheng, G.; Yan, X.; Li, Y.; Chatzinotas, S. Performance Limits of Cognitive-Uplink FSS and Terrestrial FS for Ka-Band. IEEE Trans. Aerosp. Electron. Syst. 2019, 55, 2604–2611. [Google Scholar] [CrossRef]
  35. An, K.; Lin, M.; Ouyang, J.; Zhu, W. Secure Transmission in Cognitive Satellite Terrestrial Networks. IEEE J. Sel. Areas Commun. 2016, 34, 3025–3037. [Google Scholar] [CrossRef]
  36. Mohamed, E.M.; Hashima, S.; Hatano, K.; Aldossari, S.A. Two-Stage Multiarmed Bandit for Reconfigurable Intelligent Surface Aided Millimeter Wave Communications. Sensors 2022, 22, 2179. [Google Scholar] [CrossRef]
  37. Mohamed, E.M.; Hashima, S.; Hatano, K. Energy Aware Multiarmed Bandit for Millimeter Wave-Based UAV Mounted RIS Networks. IEEE Wirel. Commun. Lett. 2022, 11, 1293–1297. [Google Scholar] [CrossRef]
  38. Mohamed, E.M.; Hashima, S.; Hatano, K.; Fouda, M.M. Cost-Effective MAB Approaches for Reconfigurable Intelligent Surface Aided Millimeter Wave Relaying. IEEE Access 2022, 10, 81642–81653. [Google Scholar] [CrossRef]
  39. Sodhro, A.H.; Zahid, N. AI-Enabled Framework for Fog Computing Driven E-Healthcare Applications. Sensors 2021, 21, 8039. [Google Scholar] [CrossRef]
  40. Abdullah, Z.; Chen, G.; Lambotharan, S.; Chambers, J.A. A Hybrid Relay and Intelligent Reflecting Surface Network and Its Ergodic Performance Analysis. IEEE Wirel. Commun. Lett. 2020, 9, 1653–1657. [Google Scholar] [CrossRef]
  41. Lee, D.; Lee, J.H. Outage probability of decode-and-forward opportunistic relaying in a multicell environment. IEEE Trans. Veh. Technol. 2011, 60, 1925–1930. [Google Scholar] [CrossRef]
  42. Wu, Q.; Zhang, R. Intelligent reflecting surface enhanced wireless network via joint active and passive beamforming. IEEE Trans. Wirel. Commun. 2019, 18, 5394–5409. [Google Scholar] [CrossRef]
  43. Do, D.; Le, A.; Liu, Y.; Jamalipour, A. User Grouping and Energy Harvesting in UAV-NOMA System with AF/DF Relaying. IEEE Trans. Veh. Technol. 2021, 70, 11855–11868. [Google Scholar] [CrossRef]
  44. Yang, L.; Yang, J.; Xie, W.; Hasna, M.O.; Tsiftsis, T.; Renzo, M.D. Secrecy Performance Analysis of RIS-Aided Wireless Communication Systems. IEEE Trans. Veh. Technol. 2020, 69, 12296–12300. [Google Scholar] [CrossRef]
  45. Yue, X.; Liu, Y.; Kang, S.; Nallanathan, A.; Ding, Z. Exploiting Full/Half-Duplex User Relaying in NOMA Systems. IEEE Trans. Commun. 2018, 66, 560–575. [Google Scholar] [CrossRef]
  46. Zhao, W.; Wang, G.; Atapattu, S.; Tsiftsis, T.A.; Tellambura, C. Is Backscatter Link Stronger than Direct Link in Reconfigurable Intelligent Surface-Assisted System? IEEE Commun. Lett. 2020, 24, 1342–1346. [Google Scholar] [CrossRef]
  47. Zou, L.; Chen, J.; Lv, L.; He, B. Capacity Enhancement of D2D Aided Coordinated Direct and Relay Transmission Using NOMA. IEEE Commun. Lett. 2020, 24, 2128–2132. [Google Scholar] [CrossRef]
  48. Xiao, Y.; Hao, L.; Ma, Z.; Ding, Z.; Zhang, Z.; Fan, P. Forwarding Strategy Selection in Dual-Hop NOMA Relaying Systems. IEEE Commun. Lett. 2018, 22, 1644–1647. [Google Scholar] [CrossRef]
  49. Hildebrand, E. Introduction to Numerical Analysis; Dover: New York, NY, USA, 1987. [Google Scholar]
  50. Yang, Z.; Ding, Z.; Wu, Y.; Fan, P. Novel Relay Selection Strategies for Cooperative NOMA. IEEE Trans. Veh. Technol. 2017, 66, 10114–10123. [Google Scholar] [CrossRef] [Green Version]
  51. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series and Products, 6th ed.; Academic Press: New York, NY, USA, 2000. [Google Scholar]
Figure 1. Hybrid relay RIS-aided IoT for downlink NOMA system.
Figure 1. Hybrid relay RIS-aided IoT for downlink NOMA system.
Sensors 22 06576 g001
Figure 2. Hybrid relay RIS-OMA system.
Figure 2. Hybrid relay RIS-OMA system.
Sensors 22 06576 g002
Figure 3. OP versus φ for different χ 1 .
Figure 3. OP versus φ for different χ 1 .
Sensors 22 06576 g003
Figure 4. OP versus φ for different R 1 = R 2 .
Figure 4. OP versus φ for different R 1 = R 2 .
Sensors 22 06576 g004
Figure 5. OP versus R 1 = R 2 for different d s r .
Figure 5. OP versus R 1 = R 2 for different d s r .
Sensors 22 06576 g005
Figure 6. OP versus χ 1 for different Q.
Figure 6. OP versus χ 1 for different Q.
Sensors 22 06576 g006
Figure 7. EC versus φ for different Q with G= K= 1000.
Figure 7. EC versus φ for different Q with G= K= 1000.
Sensors 22 06576 g007
Figure 8. EC versus χ 1 for different φ .
Figure 8. EC versus χ 1 for different φ .
Sensors 22 06576 g008
Table 1. Comparison between our work and existing works.
Table 1. Comparison between our work and existing works.
Context[30][31][32][33][34][35][36][37][38][39][40][41][42]Our Work
RIS-NOMA systemxxx xx
RIS-OMA systemxx xxx x x
Hardware Impairmentx
Artificial Intelligence x
Satellite Terrestrial xxxx
Hybrid RIS and relay approach x x
Rayleigh fadingx x xxxx
Perfect SIC and CSIx x x
Optimization xxx xxx x xx
OP Analysisxx x x
EC Analysis x
Asymptotic expressionxx xxx
Table 2. Main notations.
Table 2. Main notations.
SymbolDescription
Pr . Probability
F X . The cumulative distribution function (CDF) of an RV X
f X . The probability density function (PDF) of an RV X
E . Expectation operator
Ei . The exponential integral function
arg x The phase of a complex number x
P s The transmit power at B S
P r The transmit power at R
z i The information symbol of D i with E z i 2 = 1 , i = 1 , 2
z o The information symbol of D o with E z o 2 = 1
χ i The corresponding power allocation coefficients of D i
δ r The additive white Gaussian noise (AWGN) at R with zero mean and variance of σ 0
δ i The AWGN at D i with zero mean and variance of σ 0
δ d The AWGN at D o with zero mean and variance of σ 0
ε The path loss exponent
R i The target rate at the user D i to detect z i
R o The target rate at the user D o to detect z o
g s r The complex channel coefficient for the link B S  R
g s , q The complex channel coefficient for the link B S R I
g r , q The complex channel coefficient for the link R I R
h r 1 The complex channel coefficient for the link R   D 1
h r , q The complex channel coefficient for the link R R I
h 1 , q The complex channel coefficient for the link R I D 1
h r 2 The complex channel coefficient for the link R D 2
h 2 , q The complex channel coefficient for the link R I D 2
h r d The complex channel coefficient for the link R D o
h d , q The complex channel coefficient for the link R I D o
Table 3. Values used in simulations.
Table 3. Values used in simulations.
ParametersNotationValues
NOMA power splitting factors χ 1 , χ 2 0.2 , 0.8
The required rates R 1 = R 2 ; R o 0.5 (bps/Hz);
0.7 (bps/Hz)
Amplitude reflection coefficient of
RIS [46]
Ω = = ϖ 0.5
Path loss exponent ε 2.5
The number of meta-surface in RISQ100
Distances (Normalized)[42] d s r = d r 1 = d i 1 = d r d = d i d ;
d s i = d i r = d r i = d r 2 = d i 2
10 (m); 20 (m)
Channel gains [44] λ s r = λ r 1 = λ r 2 = λ r d 1
The average SNR at transmitter [42] φ 30 (dB)
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Dang, H.-P.; Nguyen, M.-S.V.; Do, D.-T.; Nguyen, M.-H.; Pham, M.-T.; Kim, A.-T. Empowering Intelligent Surfaces and User Pairing for IoT Relaying Systems: Outage Probability and Ergodic Capacity Performance. Sensors 2022, 22, 6576. https://doi.org/10.3390/s22176576

AMA Style

Dang H-P, Nguyen M-SV, Do D-T, Nguyen M-H, Pham M-T, Kim A-T. Empowering Intelligent Surfaces and User Pairing for IoT Relaying Systems: Outage Probability and Ergodic Capacity Performance. Sensors. 2022; 22(17):6576. https://doi.org/10.3390/s22176576

Chicago/Turabian Style

Dang, Huu-Phuc, Minh-Sang Van Nguyen, Dinh-Thuan Do, Minh-Hoa Nguyen, Minh-Triet Pham, and Anh-Tuan Kim. 2022. "Empowering Intelligent Surfaces and User Pairing for IoT Relaying Systems: Outage Probability and Ergodic Capacity Performance" Sensors 22, no. 17: 6576. https://doi.org/10.3390/s22176576

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop