Next Article in Journal
Reinforcement Learning Based Speed Control with Creep Rate Constraints for Autonomous Driving of Mining Electric Locomotives
Next Article in Special Issue
Ransomware Detection Model Based on Adaptive Graph Neural Network Learning
Previous Article in Journal
DIC-Based Hydration Absorption Detection and Displacement Field Evolution of Outcrop Porous Sandstone
Previous Article in Special Issue
Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Prediction of Power Beacon-Aided Wireless Sensor-Powered Non-Orthogonal Multiple-Access Internet-of-Things Networks under Imperfect Channel State Information

1
Faculty of Applied Sciences, Ton Duc Thang University, Ho Chi Minh City 70000, Vietnam
2
Faculty of Electrical Engineering and Computer Science, VSB-Technical University of Ostrava, 70800 Ostrava, Czech Republic
3
Faculty of Fundamental 2, Posts and Telecommunications Institute of Technology, Ho Chi Minh City 70000, Vietnam
4
Faculty of Engineering and Technology, Nguyen Tat Thanh University, Ho Chi Minh City 754000, Vietnam
5
Faculty of Electrical Engineering and Informatics, University of Pardubice, 53210 Pardubice, Czech Republic
6
Department of Artificial Intelligence, Korea National University of Transportation (KNUT), Uiwang-si 16106, Gyeonggi-do, Republic of Korea
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2024, 14(11), 4498; https://doi.org/10.3390/app14114498
Submission received: 19 April 2024 / Revised: 19 May 2024 / Accepted: 21 May 2024 / Published: 24 May 2024

Abstract

:
In this paper, we investigate a novel power beacon (PB)-aided wireless sensor-powered non-orthogonal multiple-access (NOMA) Internet-of-Things (IoT) network under imperfect channel state information (CSI). Furthermore, the exact expression outage probability (OP) of two IoT users is derived to analyze the performance of the considered network. To give further insight, the expression asymptotic OP and diversity order are also expressed when the transmit power at the PB goes to infinity. Furthermore, a deep neural network (DNN) framework is proposed to concurrently forecast IoT users’ OP in relation to real-time setups for IoT users. Additionally, when compared to the traditional analysis, our created DNN shows the shortest run-time prediction, and the outcomes predicted by the DNN model almost match those of the simulation. In addition, numerical results validate our analysis, simulation, and prediction through a Monte Carlo Simulation. Furthermore, the results show the impact of the main parameter on our proposed system. Finally, these findings show that NOMA performs better than the conventional orthogonal multiple-access (OMA) techniques.

1. Introduction

Recently, the Internet of Things (IoTs) has seen significant improvements in machine-to-machine (M2M) interactions, as well as a rising demand for IoT connections. IoT applications use intelligent devices to gather, process, and publish data on a regular basis. Billions of smart devices are connected to the Internet to enable a variety of applications, including smart building, industrial automation, smart health, and smart agriculture. Smart devices can access multimedia devices connected to the Internet of Things [1,2]. Several studies have supported the use of IoT wireless technology. However, it remains difficult to satisfy the demands of IoT applications in the future that will support hundreds of billions of linked devices [3,4]. Non-orthogonal multiple-access (NOMA) approaches are a well-studied strategy for offering significant spectral efficiency (SE) use in IoT networks [5,6,7], satellite networks [8,9,10], and V2V networks [11,12]. NOMA enables several users to use the same time and frequency block with varying transmit power allocations [13,14]. Furthermore, it employs superposition coding (SC) on the transmitter to accommodate signals from numerous users, and successive interference cancellation (SIC) at the receiver to separate and decrease interference [15,16]. NOMA technology is critical for future network capacity expansion. In particular, NOMA has been enhanced to increase cooperative communications, allowing users with superior channel conditions to act as a decode-and-forward (DF) or amplify-and-forward (AF) relay, improving information delivery and transmission reliability [17,18,19,20]. Moreover, the outage performance of a DF-based NOMA system under full-duplex (FD) and half-duplex (HD) situations was studied in [17]. Furthermore, over Nakagami-m fading, the outage probability (OP) and sum rate of the cooperative NOMA system with DF relay were investigated [18]. Additionally, the authors examined the downlink NOMA outage patterns using both DF and AF protocols [19], where it was possible to ascertain the decoding order of cell-edge users’ data based on incomplete channel status information. The two-way relay cooperative NOMA system’s OP and ergodic rate were studied in light of the possible performance boost provided by FD cooperative NOMA [20].
Wireless power transfer (WPT) is a potential technique for extending the life of energy-constrained wireless networks, such as wireless sensor networks and post-disaster emergency communication [21]. WPT-based networks are classified into two types: simultaneous wireless information and power transfer (SWIPT) [22,23,24] and wireless-powered communication networks (WPCN) [25,26,27]. SWIPT transports both information and energy via radio frequency (RF) signals, whereas WPCN harvests energy from a specialized power station and utilizes it for wireless information transmission (WIT) such as a power beacon (PB) or a hybrid access point (HAP). Both models have been thoroughly investigated in a variety of settings, focusing on the trade-off between data rate and energy harvesting (EH) amount with two techniques: the time-switching (TS) and power-splitting (PS) protocols.
Furthermore, the RF-EH protocols for a dual-hop relaying communication system are modeled after the TS and PS SWIPT protocols for non-relay point-to-point networks. In particular, these techniques, called time switching-based relaying (TSR) and power splitting-based relaying (PSR), collect energy from the source information stream [28]. The authors of [29] investigate multiple DF energy-constrained relays utilizing best relay selection and a hybrid TSR/PSR SWIPT RF-EH protocol, calculating OP and ergodic capacity with the extreme value theorem. In [30], the authors investigate a dual-hop cooperative relaying system with numerous energy-constrained relays utilizing the TSR SWIPT RF-EH protocol. The system’s OP is calculated using Nakagami-m fading in tight lower limits. In [31], the authors proposed a dual-hop cooperative relaying system with an energy-constrained DF relay that harvests energy from the source information stream. The exact closed-form OP equations are generated using special functions.
Recently, NOMA and cooperative relaying NOMA (C-NOMA) combined with EH have been hotly studied [32,33,34,35,36,37,38]. In [32], the authors investigated spatial modulation-based CNOMA for the BS downlink using a full-duplex near user that might collect energy and transmit data to a far user. Ref. [33] investigated collaborative user pairing and resource allocation for WPT-based CNOMA with EH near users. In [34], EH is carried out with CNOMA, and it is taken into consideration by choosing the optimal (decode-and-forward) DF relay. Only a two-user downlink NOMA and the dual-hop scenario are taken into account in the system model and analysis. When there are many EH-based amplify-and-forward (AF) relays between the base station and the far user, the best one can be chosen for data forwarding [35]. In [36], a two-user CNOMA network is explored, with the source node’s power consumption lowered to meet the needed transmission rates using both TS relaying and PS relaying strategies. The Lyapunov optimization methodology is utilized by the authors in [37] in order to maximize throughput or restrict transmit power levels. For a wireless-enabled IoT network, the author in [38] proposes a fairness-aware NOMA-based scheduling system. Additionally, they suggest boosting network through throughput-aware NOMA-based scheduling.
Recent research has demonstrated that deep learning (DL) methodologies can help with a variety of real-world challenges in wireless communication networks, such as resource allocation, congestion control, and queue management [39]. In [40], a deep neural network (DNN) was utilized to boost a cell-edge user’s productivity under both perfect SIC and imperfect SIC in wireless-powered CR-NOMA-based IoT relay networks. In [41], a DNN was developed to tackle classification and regression issues in cognitive two-way relay networks for a relay. The authors of [42] investigated a DNN incorporated into a NOMA system and achieved outstanding performance in terms of channel encoding, decoding, and detection. Ref. [43] described a unique way to improve service distribution in IoT networks that employed DL to discover the best distribution strategy.

Motivation and Contribution

Due to the benefit of sharing SE and achieving EE through the combination of NOMA and RF-EH, evaluating the performance of integrated systems of IoT networks has become more difficult and has garnered attention in several recent studies. In [44], the authors investigated the optimal sum throughput (STP) of SWIPT IoT relay NOMA systems in relation to the TS factor. The maximum throughput for the PB-assisted EH NOMA multiuser relaying systems across Nakagami-m channels was examined in [45] in order to enhance the NOMA IoT-based system performance. In the meanwhile, with faulty CSI and hardware impairment, the throughput and OP of cooperative PB-assisted EH were studied in [46]. In a recent study, ref. [47] looked into the cooperative multiple PBs’ OP for uplink NOMA systems in wirelessly powered IoT applications. However, these works do not consider DNN methods to be able to predict with a low latency and high accuracy, towards practical real-time configurations of C-NOMA IoT networks.
Based on these advantages, we propose a wireless sensor-powered NOMA IoT network under imperfect channel state information (CSI). Furthermore, the PB transmits energy to both the BS and relay to transmit the information. Subsequently, the exact OP is derived to evaluate the outage performance of the proposed network. In particular, we employ the DNN model to predict the performance of the considered system to reduce the complexity of the simulation and calculation. The key differences between our study and previous research are summarized in Table 1. The main contribution of our paper can be summarized as follows:
  • We investigate a novel wireless sensor-powered NOMA IoT network, where a PB adopts the TS protocol to transmit the energy to both BS and relaying to transmit information. In particular, the imperfect CSI is considered in the information transmission phase to estimate the complex channel intricacies.
  • We analyze the performance in terms of outage probability (OP). To obtain more insight into the considered network, the asymptotic expression OP and diversity order are given. Based on the asymptotic expression OP, we show the main parameters that affect the considered network in high SNR.
  • We design the DNN frame to reduce the complexity of the Monte Carlo simulation and the traditional analysis towards practical real-time configurations. The DNN models are demonstrated to be efficient in predicting performance in complicated network scenarios using a low-latency inference technique.
The remainder of this work is organized as follows. Section 2 describes the proposed system model. The performance of the proposed system is given in Section 3. The numerical findings of our suggested system are presented in Section 5. Finally, the conclusion is summarized in Section 6.

2. System Model

This paper considered the power beacon (PB)-aided wireless sensor-powered NOMA IoT networks as in Figure 1, where a base station ( S ) harvests energy from a PB to transmit the information to two users (an IoT far user (FU) and an IoT near user (NU)) through a DF relay (R). In addition, we assumed that every node had a single antenna and that every node had complete knowledge of the CSI. g P S and g P R are the channel coefficients from PB to S and R, respectively; g S R , g R N , and g R F are the channel coefficients from S to R, R to NU and FU, respectively. Furthermore, all channels follow Rayleigh fading. Thus, | g j | 2 , j { P S , P R , S R , R N , R F } is an exponential random variable with the probability density function (PDF) and the cumulative distribution function (CDF) expressed, respectively, as
f g j x = 1 Ω j e x Ω j
F g j x = 1 e x Ω j
where Ω j = d j denotes the average channel gain, d j denotes the distance, and denotes the path-loss exponent.
Furthermore, we considered the TS protocol for our proposed network as depicted in Figure 2. In particular, the PB transmits the energy to S and R during the period time of β T in the EH phase, where β denotes the TS factor, and T denotes the coherence time block. For the information transmission phase, the remaining time, ( 1 β ) T , is divided evenly into two hops of transmission, where S and R employ the transmit power derived from the gathered energy for transmitting and relaying operations. Moreover, in the information phase, the channel cannot be perfectly estimated due to the complex channel intricacies. Thus, the channel for the information phase can be modeled as [50]
g z = ε g ^ z + 1 ε 2 g ˜ z
where z { S R , R N , R F } , h ˜ z denotes a circular symmetric complex Gaussian random variable with zero mean and the same variance of h z , and ε denotes the channel correlation factor that models the accuracy of the channel estimate.

2.1. Energy-Harvesting Phase

In the EH phase, S and R harvest energy from PB during the time period of β T . The total harvested energy at S and R are expressed, respectively, as [48]
E S = η β T P P B g P S 2
E R = η β T P P B g P R 2
where η denotes the energy efficiency, and P P B denotes the transmit power of PB. Furthermore, the transmit power of S and R that was attained in the remaining time ( 1 β ) T / 2 can be given, respectively, as
P S = E S 1 β T 2 = 2 η β P P B g P S 2 1 β = ϑ P P B g P S 2
P R = E R 1 β T 2 = 2 η β P P B g P R 2 1 β = ϑ P P B g P R 2
where ϑ = 2 η β 1 β .

2.2. Information Transmission Phase

In the first information transmission phase, by applying the NOMA protocol, S transmits the superimposed signal α N x N + α F x F to R, where x N and x F denotes the signal of NU and FU, respectively, with E [ | x N | 2 ] = E [ | x F | 2 ] = 1 ; α N and α F are the power allocation with α N < α F and α N + α F = 1 . Thus, the received signal at R is given by
y R = g S R α N x N + α F x F P S + n R
where n R denotes the additive white Gaussian noise with CN ( 0 , N 0 ) . The signal-to-interference-plus-noise ratios (SINRs) at R when detecting x F and x N are given, respectively, as
γ R x F = P S ε 2 α F g ^ S R 2 P S α N ε 2 g ^ S R 2 + P S 1 ε 2 Ω S R + N 0
= ϑ ε 2 α F g ^ S R 2 g P S 2 ρ P B α N ε 2 g ^ S R 2 ρ P B + ϑ 1 ε 2 Ω S R g P S 2 ρ P B + N 0
γ R x N = ϑ α N ε 2 h ^ S R 2 h P S 2 ρ P B ϑ 1 ε 2 Ω S R h P S 2 ρ P B + 1
where ρ P B = P P B N 0 denotes the average signal-to-noise ratio (SNR).
In the second information transmission phase, R decodes the signal from S and transmits a superimposed signal to two users NU and FU. The received signal at NU and FU are given, respectively, by
y N U = g R N α N x N + α F x F P S + n N U
y N F = g R F α N x N + α F x F P S + n F U
where n N U and n F U are the AWGN with CN ( 0 , N 0 ) . The SINR at FU when detecting its own signal x F is given by
γ F U x F = P R ε 2 α F g ^ F U 2 P R α N ε 2 g ^ F U 2 + P R 1 ε 2 Ω F U + 1 = ϑ ε 2 α F g P R 2 g ^ F U 2 ρ P B ϑ α N ε 2 g P R 2 g ^ F U 2 ρ P B + ϑ 1 ε 2 Ω F U g P R 2 ρ P B + 1
By adopting the SIC process, NU first detects the signal of FU, i.e., x F , then detects its own signal, i.e., x n . Thus, the SINRs at NU when detecting signals x F and x N are given, respectively, by
γ N U x F = ϑ ε 2 α F g P R 2 g ^ N U 2 ρ P B ϑ α N ε 2 g P R 2 g ^ N U 2 ρ P B + ϑ 1 ε 2 Ω N U g P R 2 ρ P B + 1
γ N U x U = ϑ α N ε 2 g P R 2 g ^ N U 2 ρ P B ϑ 1 ε 2 Ω N U g P R 2 ρ P B + 1

3. Outage Performance Analysis

3.1. Outage Probability Analysis

The outage event takes place when R and FU cannot properly decode the x F signal. Therefore, the OP of FU can be determined as
P F U = Pr min γ R x F , γ F U x F < γ F U
where γ F U = 2 2 R F 1 β 1 denotes the threshold, and R F denotes the target rate.
Theorem 1.
The exact expression OP of FU is expressed as
P F U = 1 4 θ F U e 2 θ F U ϑ 1 ε 2 ρ P B Ω S R Ω P S Ω F U Ω P R K 1 2 θ F U Ω S R Ω P S K 1 2 θ F U Ω F U Ω P R
Proof of Theorem 1.
It can be seen in Appendix A. □
The outage event of NU takes place when R and NU cannot properly decode the x N signal. Thus, the OP of NU can be given by
P N U = Pr min γ R x N , γ N U x N < γ N U
Theorem 2.
The exact expression OP of NU is expressed as
P N U = 1 4 θ N U e 2 θ N U ϑ 1 ε 2 ρ P B Ω S R Ω P S Ω N U Ω P R K 1 2 θ N U Ω S R Ω P S K 1 2 θ N U Ω N U Ω P R
Proof of Theorem 2.
With help from (10) and (15), the OP of NU is expressed as
P N U = 1 Pr g ^ S R 2 > ϑ 1 ε 2 Ω S R θ N U ρ P B + θ N U g P S 2 × Pr g ^ N U 2 > ϑ 1 ε 2 Ω N U θ N U ρ P B + θ N U g P R 2
where θ N U = γ N U ϑ ε 2 ρ P B α N . Then, the P N U in (20) can be calculated as
P N U = 1 0 f g P S 2 x 0 f g P R 2 y × F g ^ S R 2 ϑ 1 ε 2 Ω S R θ N U ρ P B + θ N U x d z × F g ^ N U 2 ϑ 1 ε 2 Ω N U θ N U ρ P B + θ N U y d y
Similarly, in Appendix A, the exact expression OP of NU is given in (19). The proof is completed. □

3.2. Diversity Order Analysis

In this subsection, we express the diversity order to evaluate the OP in high SNRs (i.e., ρ P B ) to obtain more insight into the proposed network. The diversity order is given by [27]
d = lim ρ P B log P ρ P B log ρ P B
where P ρ P B denotes the asymptotic OP of IoT users.
Corollary 1.
In high SNR ( ρ P B ), we can approximate as K 1 ( x ) 1 x . Thus, the expression asymptotic OP of FU is expressed as
P F U 1 e 2 γ F U 1 ε 2 ε 2 α F γ F U α N
Remark 1.
Corollary 1 gives some useful insights: (i) the main parameters that affect the OP of FU are the target rate of FU γ F U , the power allocation ( α F , α N ), and the channel correlation factor ε; ( i i ) upon substituting (23) into (22), the diversity order of FU is zero.
Corollary 2.
The expression asymptotic OP of NU is expressed as
P N U 1 e 2 γ N U 1 ε 2 ε 2 α N
Remark 2.
Corollary 2 gives some useful insights: (i) the main parameters that affect the OP of NU are the target rate of NU γ N U , the power allocation ( α F , α N ), and the channel correlation factor ε; ( i i ) upon substituting (24) into (22), the diversity order of FU is zero.

4. Deep Neural Networks Analysis

In this section, we design and suggest a DNN that can predict the OP in situations where traditional analysis and Monte Carlo simulations are not practical, while having a fast run time and little computing cost. We describe our suggested strategy in more detail below.

4.1. Description of the DNN

Firstly, in order to solve a regression problem, we generated a DNN model. As shown in Figure 3, the DNN model was composed of an input layer, multiple hidden layers, and an output layer. Moreover, in an input layer, we had 15 neurons corresponding to 15 parameters as shown in Table 2. Next, each hidden layer k = 1 , , D h i d e n had D n e u neurons. Furthermore, each hidden neuron employed the rectified linear unit (ReLU) as the nonlinear activation function, defined as [51]
R e L U ( x ) = m a x ( x , 0 )
The output layer was composed of a single neuron that utilized the linear activation function to yield the anticipated OP value, P P r e [ 1 ] . This was because the regression issue sought to estimate an output value without requiring any further conversions.

4.2. Setup for Dataset

In this subsection, each hidden layer k generated the row vector data set M with data set [ k ] = [ X [ k ] , P S i m ] , where X [ k ] denotes the feature vector made up of all inputs from each of the parameters in Table 2. Next, the real-value OP sets from (16) and (18) were generated using each X [ k ] feature vector, which were then input into the simulation to obtain a distinct matching P S i m . In summary, the data set was created by concatenating the 10 5 samples and was then separated into three new data sets: 80% for training ( M t r a i n ), 10% for validation ( M v a l i ), and 10% for testing ( M t e s t ).
The mean squared error (MSE), defined as M S E = 1 M t e s t k = 0 M t e s t 1 ( P P r e P s i m ) , was used to assess how effectively the suggested DL approach performed. To calculate the difference between the natural and predicted OP values for the full test set, we use the root-mean-square error (RMSE) in the OP prediction, and it can be defined as R M S E = M S E .

5. Numerical Result

In this section, we provide illustrative numerical results to evaluate the performance of the proposed network in terms of OP by using a Monte Carlo simulation. The main parameters were set as β = 0.2 , d S R = 10 m, η = 0.7 , d P S = 10 m, α F = 0.85 , d P R = 10 m, α N = 0.15 , d R F = 20 m, d R N = 15 m, R N = 0.01 , R F = 0.01 , N 0 = 94 [dBm], ε = 0.95 , and = 2.7 , except for the special case. Furthermore, Ana., Sim., and Asymp. are the abbreviations for analytical, simulation, and asymptotic, respectively. For the DNN, we set five hidden layers with each layer having 128 neurons, which was implemented in Python 3.11.4 using Keras 2.8.0 and TensorFlow 2.8.0, with 100 epochs for training the DNN.
In Figure 4, we utilized the MSE of the training and the validation to evaluate the accuracy of the proposed DNN. As can be seen, the MSE converged to a value lower than 10 5 after 40 epochs. Figure 5 plots the OP of two users (FU and NU) versus P P B in dBm while varying the target rate R F = R N . It can be observed that over the whole range of P P B in dBm, the OP curves and analytical results agreed exceptionally well based on the Monte Carlo simulation. Furthermore, the asymptotic findings produced in (23) and (24) were extremely valid with the theoretical analysis ones at high P P B , confirming the accuracy of our developed analysis approach. In addition, we can observe that the outage performance was improved when increasing the transmit power but did not change in high P P B . The fact that the OP depended on more factors than only transmitting P P B can be shown in Remark 1 and 2. Another observation is that the excellent agreement between the simulation and DNN prediction outcomes validated our proposed methods.
Figure 6 depicts the OP of users versus P P B in dBm with varying ε . As shown in Figure 6, we can observe that the OP increased when β decreased and converge with a large P P B . This is due to the OP depending on the interference channels in the SINR of two users when decoding the signal. In Figure 7, we plotted the OP versus α F when varying P P B in dBm. First, we can observe that the OP of FU decreased when α F increased. The reason was that when α F increased, the transmit power of FU was greater than that of NU. Furthermore, the OP of NOMA was better that OMA in the range 0.5 < β < 0.8 . In addition, there existed an optimal point α F for the OP of two users. Specifically, when P P B = 10 dBm the optimal point for the OP of two users was α F = 0.64 , α F = 0.59 for P P B = 0 dBm, and α F = 0.54 for P P B = 10 dBm.
Figure 8 shows the OP of two users versus η when varying P P B . It can be observed that the OP was improved when increasing the energy efficiency η . This is due to the energy efficiency η being larger, leading to a greater transmit power of PB in (4) and (5). Figure 9 illustrates the OP of two users versus β when varying P P B . The TS factor β is important because it controls both the data transport and the amount of energy collected at S and R. We can observe that the best OP for two users for P P B = 0 dBm can be achieved when 0.4 < β < 0.5 , and for P P B = 10 dBm, the best OP can be achieved when 0.1 < β < 0.2 .

6. Conclusions

This paper investigated the PB-aided wireless sensor-powered NOMA IoT networks under imperfect CSI. The exact expression OP, expression asymptotic OP, and diversity order were derived to obtain more insight into the system characteristics. Based on the expression asymptotic OP, we showed the main parameter that affected the proposed network such as the channel correlation factor, the power allocation, the factor of TS, and the target rate of users. A DNN was developed to predict the performance in terms of OP with minimal complexity and high accuracy. In the numerical result, this paper found that using a DNN model for system performance evaluation, the OP outcomes closely resembled the Monte Carlo simulation and analysis results.

Author Contributions

N.-L.N. proposed the system model and idea. A.-T.L. and P.-L.T.N. derived the expressions to examine the system performance. B.V.M. and L.R. double-checked the manuscript and simulated the figures. N.-L.N. and Y.-H.K. wrote the whole paper. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2022R1F1A1074975) and in part by the Korea Institute of Energy Technology Evaluation and Planning (KETEP) and the Ministry of Trade, Industry and Energy (MOTIE) of the Republic of Korea (No. 20221A10100011).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A

Proof of Theorem 1.
From (9) and (13), the OP of FU can be rewritten as
P F U = 1 Pr g ^ S R 2 > ϑ 1 ε 2 Ω S R θ F U ρ P B + θ F U g P S 2 × Pr g ^ F U 2 > ϑ 1 ε 2 Ω F U θ F U ρ P B + θ F U g P R 2
where θ F U = γ F U ϑ ε 2 ρ P B α F γ F U α N . Next, P F U can be calculated as
P F U = 1 0 f g P S 2 x 0 f g P R 2 y × F g ^ S R 2 θ F U ϑ 1 ε 2 Ω S R ρ P B + θ F U x d z × F g ^ F U 2 θ F U ϑ 1 ε 2 Ω F U ρ P B + θ F U y d y
With (1), (2) and Eq. (3.471.4) from [52], we obtain
P F U = 1 e 2 θ F U ϑ 1 ε 2 ρ P B Ω P S Ω P R 0 e x Ω P S e θ F U Ω S R x d z 0 e y Ω P R e θ F U Ω F U y d y = 1 4 e 2 θ F U ϑ 1 ε 2 ρ P B θ F U Ω S R Ω P S Ω F U Ω P R K 1 2 θ F U Ω S R Ω P S K 1 2 θ F U Ω F U Ω P R
where K v denotes the v-order modified Bessel function of the second kind. The proof is completed. □

References

  1. Guo, F.; Yu, F.R.; Zhang, H.; Li, X.; Ji, H.; Leung, V.C.M. Enabling Massive IoT Toward 6G: A Comprehensive Survey. IEEE Internet Things J. 2021, 8, 11891–11915. [Google Scholar] [CrossRef]
  2. Suo, H.; Wan, J.; Zou, C.; Liu, J. Security in the Internet of Things: A Review. In Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering, Hangzhou, China, 23–25 March 2012; Volume 3, pp. 648–651. [Google Scholar] [CrossRef]
  3. Vu, T.H.; Nguyen, T.V.; Nguyen, T.T.; Kim, S. Performance Analysis and Deep Learning Design of Wireless Powered Cognitive NOMA IoT Short-Packet Communications With Imperfect CSI and SIC. IEEE Internet Things J. 2022, 9, 10464–10479. [Google Scholar] [CrossRef]
  4. Nguyen, H.; Nguyen, T.N.; Minh, B.V.; Pham, T.H.T.; Le, A.T.; Voznak, M. Security-Reliability Analysis in CR-NOMA IoT Network Under I/Q Imbalance. IEEE Access 2023, 11, 119045–119056. [Google Scholar] [CrossRef]
  5. Ghosh, S.; Al-Dweik, A.; Alouini, M.S. On the Performance of End-to-End Cooperative NOMA-Based IoT Networks With Wireless Energy Harvesting. IEEE Internet Things J. 2023, 10, 16253–16270. [Google Scholar] [CrossRef]
  6. Le, S.P.; Nguyen, H.N.; Nguyen, N.T.; Van, C.H.; Le, A.T.; Voznak, M. Physical layer security analysis of IRS-based downlink and uplink NOMA networks. Eurasip J. Wirel. Commun. Netw. 2023, 2023, 105. [Google Scholar] [CrossRef]
  7. Le, A.T.; Hieu, T.D.; Nguyen, T.N.; Le, T.L.; Nguyen, S.Q.; Voznak, M. Physical layer security analysis for RIS-aided NOMA systems with non-colluding eavesdroppers. Comput. Commun. 2024, 219, 194–203. [Google Scholar] [CrossRef]
  8. Le, A.T.; Ha, N.D.X.; Do, D.T.; Yadav, S.; Lee, B.M. Enabling NOMA in Overlay Spectrum Sharing in Hybrid Satellite-Terrestrial Systems. IEEE Access 2021, 9, 56616–56629. [Google Scholar] [CrossRef]
  9. Nguyen, N.T.; Nguyen, H.N.; Nguyen, N.L.; Le, A.T.; Nguyen, T.N.; Voznak, M. Performance Analysis of NOMA-Based Hybrid Satellite-Terrestrial Relay System Using mmWave Technology. IEEE Access 2023, 11, 10696–10707. [Google Scholar] [CrossRef]
  10. Chen, B.; Xu, D. Outage Performance of Overlay Cognitive Satellite-Terrestrial Networks With Cooperative NOMA. IEEE Syst. J. 2024, 18, 222–233. [Google Scholar] [CrossRef]
  11. Jaiswal, N.; Purohit, N. Performance Analysis of NOMA-Enabled Vehicular Communication Systems With Transmit Antenna Selection Over Double Nakagami-m Fading. IEEE Trans. Veh. Technol. 2021, 70, 12725–12741. [Google Scholar] [CrossRef]
  12. Hieu, T.C.; Cuong, N.L.; Nguyen, B.C.; Hiep, P.T. Full-duplex protocol for vehicle-to-vehicle NOMA relay system over double Rayleigh fading. Telecommun. Syst. 2022, 80, 337–347. [Google Scholar] [CrossRef]
  13. Do, D.T.; Le, A.T.; Lee, B.M. NOMA in Cooperative Underlay Cognitive Radio Networks Under Imperfect SIC. IEEE Access 2020, 8, 86180–86195. [Google Scholar] [CrossRef]
  14. Mlika, Z.; Cherkaoui, S. Massive IoT Access With NOMA in 5G Networks and Beyond Using Online Competitiveness and Learning. IEEE Internet Things J. 2021, 8, 13624–13639. [Google Scholar] [CrossRef]
  15. Ding, Z.; Liu, Y.; Choi, J.; Sun, Q.; Elkashlan, M.; Chih-Lin, I.; Poor, H.V. Application of Non-Orthogonal Multiple Access in LTE and 5G Networks. IEEE Commun. Mag. 2017, 55, 185–191. [Google Scholar] [CrossRef]
  16. Sirait, R.; Hardjawana, W.; Wibisono, G. Performance of Downlink NOMA for a Massive IoT Network Over a Nakagami-m Fading Channel With Optimized Power Allocation. IEEE Access 2023, 11, 67779–67790. [Google Scholar] [CrossRef]
  17. Yue, X.; Liu, Y.; Kang, S.; Nallanathan, A.; Ding, Z. Exploiting Full/Half-Duplex User Relaying in NOMA Systems. IEEE Trans. Commun. 2018, 66, 560–575. [Google Scholar] [CrossRef]
  18. Chu, T.M.C.; Zepernick, H.J. Performance of a Non-Orthogonal Multiple Access System With Full-Duplex Relaying. IEEE Commun. Lett. 2018, 22, 2084–2087. [Google Scholar] [CrossRef]
  19. Wan, D.; Wen, M.; Ji, F.; Liu, Y.; Huang, Y. Cooperative NOMA Systems With Partial Channel State Information Over Nakagami-m Fading Channels. IEEE Trans. Commun. 2018, 66, 947–958. [Google Scholar] [CrossRef]
  20. Wang, X.; Jia, M.; Ho, I.W.H.; Guo, Q.; Lau, F.C.M. Exploiting Full-Duplex Two-Way Relay Cooperative Non-Orthogonal Multiple Access. IEEE Trans. Commun. 2019, 67, 2716–2729. [Google Scholar] [CrossRef]
  21. Zhao, N.; Lu, W.; Sheng, M.; Chen, Y.; Tang, J.; Yu, F.R.; Wong, K.K. UAV-Assisted Emergency Networks in Disasters. IEEE Wirel. Commun. 2019, 26, 45–51. [Google Scholar] [CrossRef]
  22. Zhang, X.; Wang, J.; Poor, H.V. Statistical Delay and Error-Rate Bounded QoS Provisioning for SWIPT Over CF M-MIMO 6G Mobile Wireless Networks Using FBC. IEEE J. Sel. Top. Signal Process. 2021, 15, 1272–1287. [Google Scholar] [CrossRef]
  23. Tin, P.T.; Nguyen, T.N.; Tran, D.H.; Voznak, M.; Phan, V.D.; Chatzinotas, S. Performance enhancement for full-duplex relaying with time-switching-based SWIPT in wireless sensors networks. Sensors 2021, 21, 3847. [Google Scholar] [CrossRef]
  24. Nguyen, T.N.; Tran, D.H.; Van Chien, T.; Phan, V.D.; Voznak, M.; Chatzinotas, S. Security and Reliability Analysis of Satellite-Terrestrial Multirelay Networks With Imperfect CSI. IEEE Syst. J. 2023, 17, 2824–2835. [Google Scholar] [CrossRef]
  25. Huang, K.; Lau, V.K.N. Enabling Wireless Power Transfer in Cellular Networks: Architecture, Modeling and Deployment. IEEE Trans. Wirel. Commun. 2014, 13, 902–912. [Google Scholar] [CrossRef]
  26. Nguyen, B.C.; Hoang, T.M.; Tran, P.T.; Nguyen, T.N. Outage probability of NOMA system with wireless power transfer at source and full-duplex relay. AEU-Int. J. Electron. Commun. 2020, 116, 152957. [Google Scholar] [CrossRef]
  27. Le, A.T.; Tran, D.H.; Le, C.B.; Tin, P.T.; Nguyen, T.N.; Ding, Z.; Poor, H.V.; Voznak, M. Power Beacon and NOMA-Assisted Cooperative IoT Networks With Co-Channel Interference: Performance Analysis and Deep Learning Evaluation. IEEE Trans. Mob. Comput. 2023, 23, 7270–7283. [Google Scholar] [CrossRef]
  28. Nasir, A.A.; Zhou, X.; Durrani, S.; Kennedy, R.A. Relaying Protocols for Wireless Energy Harvesting and Information Processing. IEEE Trans. Wirel. Commun. 2013, 12, 3622–3636. [Google Scholar] [CrossRef]
  29. Subhash, A.; Kalyani, S. Cooperative Relaying in a SWIPT Network: Asymptotic Analysis Using Extreme Value Theory for Non-Identically Distributed RVs. IEEE Trans. Commun. 2021, 69, 4360–4372. [Google Scholar] [CrossRef]
  30. Hoang, T.M.; Nguyen, B.C.; Tran, P.T.; Dung, L.T. Outage Analysis of RF Energy Harvesting Cooperative Communication Systems Over Nakagami-m Fading Channels With Integer and Non-Integer m. IEEE Trans. Veh. Technol. 2020, 69, 2785–2801. [Google Scholar] [CrossRef]
  31. Do, T.N.; da Costa, D.B.; Duong, T.Q.; An, B. Improving the Performance of Cell-Edge Users in MISO-NOMA Systems Using TAS and SWIPT-Based Cooperative Transmissions. IEEE Trans. Green Commun. Netw. 2018, 2, 49–62. [Google Scholar] [CrossRef]
  32. Si, Q.; Jin, M.; Tsiftsis, T.A.; Zhao, N.; Wang, X. Cooperative SM-Based NOMA Scheme With SWIPT. IEEE Trans. Veh. Technol. 2021, 70, 6195–6199. [Google Scholar] [CrossRef]
  33. Wu, M.; Song, Q.; Guo, L.; Jamalipour, A. Joint User Pairing and Resource Allocation in a SWIPT-Enabled Cooperative NOMA System. IEEE Trans. Veh. Technol. 2021, 70, 6826–6840. [Google Scholar] [CrossRef]
  34. Rauniyar, A.; Engelstad, P.; Østerb, O.N. RF Energy Harvesting and Information Transmission Based on Power Splitting and NOMA for IoT Relay Systems. In Proceedings of the 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, 1–3 November 2018; pp. 1–8. [Google Scholar] [CrossRef]
  35. Li, X.; Wang, Q.; Liu, M.; Li, J.; Peng, H.; Piran, M.J.; Li, L. Cooperative Wireless-Powered NOMA Relaying for B5G IoT Networks With Hardware Impairments and Channel Estimation Errors. IEEE Internet Things J. 2021, 8, 5453–5467. [Google Scholar] [CrossRef]
  36. Lan, X.; Zhang, Y.; Chen, Q.; Cai, L. Energy Efficient Buffer-Aided Transmission Scheme in Wireless Powered Cooperative NOMA Relay Network. IEEE Trans. Commun. 2020, 68, 1432–1447. [Google Scholar] [CrossRef]
  37. Ren, J.; Lei, X.; Zhou, F.; Diamantoulakis, P.D.; Dobre, O.A.; Karagiannidis, G.K. Throughput Maximization in Buffer-aided Wireless-Powered NOMA Networks. In Proceedings of the ICC 2020–2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–7. [Google Scholar] [CrossRef]
  38. Liu, Y.; Chen, X.; Cai, L.X.; Chen, Q.; Zhang, R. Nonorthogonal Multiple Access for Wireless-Powered IoT Networks. IEEE Internet Things J. 2021, 8, 112–128. [Google Scholar] [CrossRef]
  39. Huang, H.; Guo, S.; Gui, G.; Yang, Z.; Zhang, J.; Sari, H.; Adachi, F. Deep Learning for Physical-Layer 5G Wireless Techniques: Opportunities, Challenges and Solutions. IEEE Wirel. Commun. 2020, 27, 214–222. [Google Scholar] [CrossRef]
  40. Vu, T.H.; Nguyen, T.V.; Kim, S. Wireless Powered Cognitive NOMA-Based IoT Relay Networks: Performance Analysis and Deep Learning Evaluation. IEEE Internet Things J. 2022, 9, 3913–3929. [Google Scholar] [CrossRef]
  41. Zhang, Z.; Lu, Y.; Huang, Y.; Zhang, P. Neural Network-Based Relay Selection in Two-Way SWIPT-Enabled Cognitive Radio Networks. IEEE Trans. Veh. Technol. 2020, 69, 6264–6274. [Google Scholar] [CrossRef]
  42. Gui, G.; Huang, H.; Song, Y.; Sari, H. Deep Learning for an Effective Nonorthogonal Multiple Access Scheme. IEEE Trans. Veh. Technol. 2018, 67, 8440–8450. [Google Scholar] [CrossRef]
  43. Manogaran, G.; Nguyen, T.N.; Gao, J.; Kumar, P.M. Deep Learning-Based Service Distribution Model for Wireless Network Assisted Internet of Everything. IEEE Trans. Netw. Sci. Eng. 2022, 9, 3004–3014. [Google Scholar] [CrossRef]
  44. Rauniyar, A.; Engelstad, P.; Østerbø, O.N. RF Energy Harvesting and Information Transmission in IoT Relay Systems based on Time Switching and NOMA. In Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), Sydney, Australia, 21–23 November 2018; pp. 1–7. [Google Scholar] [CrossRef]
  45. Hoang, T.M.; Tan, N.T.; Tran, X.N. Performance analysis of power beacon-assisted energy harvesting NOMA multi-user relaying system over Nakagami-m fading channels. AEU-Int. J. Electron. Commun. 2020, 115, 153022. [Google Scholar] [CrossRef]
  46. Li, X.; Liu, M.; Deng, D.; Li, J.; Deng, C.; Yu, Q. Power beacon assisted wireless power cooperative relaying using NOMA with hardware impairments and imperfect CSI. AEU-Int. J. Electron. Commun. 2019, 108, 275–286. [Google Scholar] [CrossRef]
  47. Do, D.T.; Nguyen, M.S.V.; Nguyen, T.N.; Li, X.; Choi, K. Enabling Multiple Power Beacons for Uplink of NOMA-Enabled Mobile Edge Computing in Wirelessly Powered IoT. IEEE Access 2020, 8, 148892–148905. [Google Scholar] [CrossRef]
  48. Vu, T.H.; Kim, S. Performance Evaluation of Power-Beacon-Assisted Wireless-Powered NOMA IoT-Based Systems. IEEE Internet Things J. 2021, 8, 11655–11665. [Google Scholar] [CrossRef]
  49. Zhang, Y.; Feng, S.; Tang, W. Performance Analysis and Optimization for Power Beacon-Assisted Wireless Powered Cooperative NOMA Systems. IEEE Access 2020, 8, 198436–198450. [Google Scholar] [CrossRef]
  50. Vu, T.H.; Kim, S. Performance Analysis of Full-Duplex Two-Way RIS-Based Systems With Imperfect CSI and Discrete Phase-Shift Design. IEEE Commun. Lett. 2023, 27, 512–516. [Google Scholar] [CrossRef]
  51. Nwankpa, C.; Ijomah, W.; Gachagan, A.; Marshall, S. Activation functions: Comparison of trends in practice and research for deep learning. arXiv 2018, arXiv:1811.03378. [Google Scholar]
  52. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products; Academic Press: Cambridge, MA, USA, 2014. [Google Scholar]
Figure 1. The wireless sensor-powered NOMA IoT network.
Figure 1. The wireless sensor-powered NOMA IoT network.
Applsci 14 04498 g001
Figure 2. The operational design of the time of the system.
Figure 2. The operational design of the time of the system.
Applsci 14 04498 g002
Figure 3. The operational design of DNN for the system.
Figure 3. The operational design of DNN for the system.
Applsci 14 04498 g003
Figure 4. The MSE for DNN training and validation.
Figure 4. The MSE for DNN training and validation.
Applsci 14 04498 g004
Figure 5. The outage probability versus P P B in dBm when varying the target rate R F = R N .
Figure 5. The outage probability versus P P B in dBm when varying the target rate R F = R N .
Applsci 14 04498 g005
Figure 6. The outage probability versus P P B in dBm when varying ε .
Figure 6. The outage probability versus P P B in dBm when varying ε .
Applsci 14 04498 g006
Figure 7. The outage probability versus α F when varying P P B dBm.
Figure 7. The outage probability versus α F when varying P P B dBm.
Applsci 14 04498 g007
Figure 8. The outage probability versus η when varying P P B .
Figure 8. The outage probability versus η when varying P P B .
Applsci 14 04498 g008
Figure 9. The outage probability versus β when varying P P B .
Figure 9. The outage probability versus β when varying P P B .
Applsci 14 04498 g009
Table 1. Comparison of this work with the reference works.
Table 1. Comparison of this work with the reference works.
Our Work[44][45][46][47][48][49]
NOMA
Energy harvesting
Imperfect CSI
Outage probability analysis
Diversity order
DNN method
Table 2. The parameters of the DNN.
Table 2. The parameters of the DNN.
InputValueInputValue
β 0.2 d S R [10,20] [m]
η 0.7 d P S [10,20] [m]
α F 0.85 d P R [10,20] [m]
α N 0.15 d R F [20,40] [m]
R F [0.01, 0.02] d R N [15,30] [m]
R N [0.01, 0.02] N 0 −94 [dBm]
ε 0.95 P P B [−30,30] [dBm]
2.7
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Nguyen, N.-L.; Le, A.-T.; Nguyen, P.-L.T.; Minh, B.V.; Rejfek, L.; Kim, Y.-H. Performance Prediction of Power Beacon-Aided Wireless Sensor-Powered Non-Orthogonal Multiple-Access Internet-of-Things Networks under Imperfect Channel State Information. Appl. Sci. 2024, 14, 4498. https://doi.org/10.3390/app14114498

AMA Style

Nguyen N-L, Le A-T, Nguyen P-LT, Minh BV, Rejfek L, Kim Y-H. Performance Prediction of Power Beacon-Aided Wireless Sensor-Powered Non-Orthogonal Multiple-Access Internet-of-Things Networks under Imperfect Channel State Information. Applied Sciences. 2024; 14(11):4498. https://doi.org/10.3390/app14114498

Chicago/Turabian Style

Nguyen, Ngoc-Long, Anh-Tu Le, Phuong-Loan T. Nguyen, Bui Vu Minh, Lubos Rejfek, and Yong-Hwa Kim. 2024. "Performance Prediction of Power Beacon-Aided Wireless Sensor-Powered Non-Orthogonal Multiple-Access Internet-of-Things Networks under Imperfect Channel State Information" Applied Sciences 14, no. 11: 4498. https://doi.org/10.3390/app14114498

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop