Abstract

In this paper, we propose an underlay two-way relaying scheme with the successive interference cancellation (SIC) solution in which two secondary sources transmit simultaneously their data to each other through secondary relays. The proposed scheme is operated in only two time slots and under an interference constraint of a primary receiver, denoted as the UTW-2TS scheme. In the UTW-2TS scheme, the secondary relays employ the SIC operation to decode successively the data from received broadcast signals and then encode these data by two techniques: digital network coding (DNC) enforced by XOR operations (denoted as the UTW-2TS-DNC protocol) and superposition coding (SC) enforced by power domain additions (denoted as the UTW-2TS-SC protocol). A selected secondary relay which subjects to maximize decoding capacities and to minimize collection time of channel state information in two protocols UTW-2TS-DNC and UTW-2TS-SC experiences residual interferences from imperfect SIC operations. Outage probabilities and throughputs are solved in terms of exact closed-form expressions to evaluate the system performance of the proposed protocols. Simulation and analysis results provide performance enhancement of the proposed protocols UTW-2TS-DNC and UTW-2TS-SC owing to increase the number of the cooperative secondary relays, the interference constraints, and the distances from the secondary network to the primary receiver. The best throughputs are pointed at optimal interference power allocation coefficients and optimal locations of the selected secondary relay. Considering the same power consumption, the UTW-2TS-DNC protocol outperforms the UTW-2TS-SC protocol. Finally, the simulation results are collected to confirm the exact analysis values of the outage probabilities and throughputs.

1. Introduction

In recent years, the radio spectrum has become scarce due to the increasing bandwidth demand for mobile multimedia services and the explosive development of next-generation wireless networks such as wireless sensor networks, Internet of Things (IoT), and fifth-generation (5G) networks. On the other hand, the utilization of the licensed frequency spectrum versus time and space is low [1]. In this context, cognitive radio was proposed as an effective spectrum sharing solution in which secondary users (SUs) coexist with primary users (PUs) [2]. The SUs can operate flexibly and intelligently in (interweave, overlay, and underlay) protocols to access the licensed frequency spectra of the PUs as long as quality of service (QoS) of the primary network is maintained [3, 4]. In the interweave cognitive radio [5], the SUs use spectrum sensing methods to detect the unoccupied spectra to avoid interference to the PUs. In an opposite way, the SUs in the overlay and underlay methods can access the licensed bands at the same time with the PUs [69]. The overlay approach requires the cooperation between the SUs and the PUs; i.e., the secondary transmitters have to combine the data of the SUs and the PUs and then send the combined data to the intended secondary and primary receivers [6]. The SUs in the underlay approach can access the spectra at any time provided that the interferences affected on the PUs must be below a tolerable interference level [79]. Based on the required QoS, the PUs can calculate the tolerable interference level and send it to the secondary network so that the SUs can appropriately adjust their transmit powers.

Two-way communication networks have been much interested in switching data between interactive users in which many research studies have been launched to enhance performance [10]. Two-way cooperation solutions investigated in [10] have great attractions owing to increase significantly spectrum utilization efficiency. The operation of two-way relaying is to exchange data between users with the help of other intermediate users as amplify-and-forward (AF) and decode-and-forward (DF) devices, denoted as relays. In [11], an optimum relay is selected to decode received signals from the transmit users, mix these data by XOR operation, and then broadcast back to both users. The operation of the optimum relay in [11] is named as digital network coding (DNC).

1.1. Related Work and Motivation

Proposals for increasing performance in the underlay two-way relaying networks have been studied in [1218]. The authors in [12] combined DNC and opportunistic relay selection (ORS) to decrease the outage performance of the secondary two-way relaying network under the interference constraint required by the primary receiver. Moreover, the best relay selection strategy in the third time slot, which follows a max-min criterion, was proposed in [12] to significantly decrease the system outage probabilities, as compared with the traditional DNC approach [12]. By expanding the published work [12], Toan et al. in [13, 14] analyzed the performance of the underlay two-way relaying communication systems with the presence of multiple primary receivers. The authors in [15] evaluated the outage probabilities and symbol error probabilities of many primary one-way networks and a secondary two-way network operating on both the independent and identically distributed (i.i.d.) and independent but nonidentically distributed (i.n.i.d.) Nakagami- fading channels. Imperfect channel state information (CSI) from the SUs to the PUs have been included in probability analyses [16]. The authors exploited both the direct and relaying links with appropriate diversity combinations in an underlay three-phase two-way scheme [17]. In [18], the authors considered an underlay wiretap cognitive two-way relaying network in which two SUs exchange their messages via multiple secondary DF relays in the presence of an eavesdropper. In [18], DNC, ORS, and artificial noises were used to mitigate eavesdropping attacks. However, above investigations perform on three orthogonal time slots, and hence, the bandwidth utilization efficiency is only 2/3 (two data per three time slots). This motivates us to propose new two-way relaying approaches for the underlay cognitive radio network, where only two time slots are used to obtain the data rate of 2/2.

In [19], the authors applied successive interference cancellation (SIC) technique to sequentially decode signals received from multiple sources. With SIC, the spectral efficiency of the two-way relaying systems is improved because the number of time slots decreases. Indeed, SIC is one of the core technologies in nonorthogonal multiple access (NOMA) systems which can assign nonorthogonal resources such as power, time, and code to different users [20]. For the NOMA systems operating in the power domain, multiple transmit signals that are allocated with different transmit powers are merged by the superposition coding (SC) before they are sent to intended receivers. At each receiver, the signal with higher transmit power is first decoded, and it is then removed from the received signal. This process, named SIC, is repeated until the receiver obtains the desired signal [21]. The authors in [19] pointed out some implementation problems of the SIC utilization such as complexity and residual interference after performing interference cancellations. These issues will lead to lower decoding capacities than expected ones. In [22], the authors evaluated two-way relaying NOMA systems fully in terms of the outage probability, outage floor, ergodic capacity, and power allocation. The system performance of the proposed protocol in [22] outperforms that of three-time slot two-way relaying systems with orthogonal multiple access. In addition, we have applied the SIC scheme with DNC and ORS at the last time slot (the second time slot) for traditional two-way relaying networks in [23]. The results obtained in [23] presented improvements of the system performances as well as bandwidth utilization efficiencies, as compared with the corresponding scenarios without using SIC. However, the previous published works [19, 22, 23] only considered the conventional wireless networks; i.e., the underlay cognitive network was not studied.

1.2. Contributions

Motivated by above issues, in this paper, we propose an underlay two-way relaying scheme with the SIC solution in which two secondary sources send concurrently their data to each other through multiple secondary relays under an interference constraint of a primary receiver. The proposed scheme is operated in two time slots, denoted as the UTW-2TS scheme. In the UTW-2TS scheme, the secondary relays employ the SIC operation to decode successively the data from received broadcast signals. The data carried by the stronger channel gains is decoded firstly and will be subtracted to detect the remaining data. These decoded data are encoded by two techniques: the DNC enforced by XOR operations (denoted as the UTW-2TS-DNC protocol) and the SC enforced by power domain additions (denoted as the UTW-2TS-SC protocol). In addition, because of imperfect operations of the SIC, the secondary relays experience residual interferences. A secondary relay is selected in two protocols UTW-2TS-DNC and UTW-2TS-SC which subjects to maximize decoding capacities and to minimize collection time of CSI. Outage probabilities and throughputs are solved in terms of exact closed-form expressions to evaluate the system performance of the proposed UTW-2TS-DNC and UTW-2TS-SC protocols. These outage probability and throughput expressions are proved by doing the Monte Carlo simulations. The contributions of this paper are cataloged as follows:(1)Proposing SIC-based underlay two-way relaying cognitive protocols which enhance the data rate, as compared with the corresponding ones without using the SIC(2)Exactly analyzing the outage probabilities and throughputs of two secondary sources in two operation protocols UTW-2TS-DNC and UTW-2TS-SC with the same two-way relaying model in which the SIC solution in the selected secondary relay is practically considered in the perfect and imperfect cases(3)The UTW-2TS-DNC protocol outperforms the UTW-2TS-SC protocol with the same power consumption(4)The proposed UTW-2TS-DNC and UTW-2TS-SC protocols can achieve the best throughputs at optimal interference power allocation coefficients and optimal locations of the selected secondary relay. In addition, we examine the throughputs of the UTW-2TS-SC protocol versus the changes of the power allocation coefficients(5)The system performances in terms of the outage probabilities and throughputs are improved when the number of the cooperative secondary relays, the interference constraints, and the distances from the secondary nodes to the primary receiver are increased as well as when the residual interference powers decrease

1.3. Paper Organization and Notations

This paper is organized into sections as follows. Section 2 presents a system model of an underlay two-way relaying scheme with multiple secondary relays. Section 3 analyzes outage probabilities and throughputs of the proposed protocols UTW-2TS-DNC and UTW-2TS-SC. Results and discussions are shown in Section 4. Lastly, Section 5 summarizes contributions.

The notations used in this paper are denoted as follows: and denote, respectively, the probability density function (PDF) and the cumulative distribution function (CDF) of a random variable (RV) ; denotes the probability operation of an event ; denotes the expectation operator; denotes the binomial coefficient ; denotes XOR math operation; and is the upper incomplete Gamma function.

2. System Model

Figure 1 presents a system model of an underlay two-way relaying scheme. In this scheme, secondary sources and own data and ( and ), respectively. The exchange of information is achieved between the and the through a cluster of intermediate secondary relays , where [12]. More specifically, the data of is exchanged with the data of . The secondary network including , , and suffers an interference constraint of a primary receiver (PR), denoted as . The secondary relays can perform the SIC technique to decode the received data-carried signals successively in an interval of a time slot.

We assume that a direct link between the secondary sources and does not exist due to the far distance or deep shadow fading [18, 23, 24]. It is also assumed that the secondary and primary nodes are installed with a single antenna, and additive noises at all the receivers are zero-mean Gaussian random variables (RVs) whose mean is zero, and variance is .

In Figure 1, and denote the flat-block Rayleigh fading channel coefficient and the normalized link distance of link -, respectively, where . Because the secondary relays are located in the cluster, where the secondary relays are close to each other, the normalized distances can be assumed to be identical, i.e., , , , , and [25, 26]. Because have Rayleigh distributions, the channel gains are exponential RVs with the PDFs and the CDFs , where , and is a path loss exponent (see [23, 27, 28]). Moreover, we have , , , , and .

In the underlay cognitive radio network, the secondary network coexisted in the same frequency with the primary network and satisfies that the interference power at the primary receiver (PR) is less than or equal the constraint [29, 30]. We have the inequalitywhere , , and are transmit powers of the secondary source , the secondary source , and the secondary relays , respectively.

From (1), the transmit powers of the secondary transmitters can be set as , , and , where and are interference power allocation coefficients, , , and .

Comment 1. In practice, the transmit powers must be below a maximum power (denoted by ), where . Therefore, should be formulated as , where . Suppose that (e.g., the nodes are near the PR node); hence, we can approximate by . It is worth noting that this assumption is used in many published literatures, i.e., [12, 26, 3036].

The operation principle of the UTW-2TS schemes happens in two time slots as follows. In the first time slot, secondary sources and transmit simultaneously the data-carried signals and , respectively, to all secondary relays under interference constraint of the primary receiver (PR). A selected secondary relay, denoted as , where , decodes the desired data by applying the SIC process. In the second time slot (last time slot), the creates the new data by the DNC technique, denoted as the UTW-2TS-DNC protocol, or by the SC technique, denoted as the UTW-2TS-SC protocol. The new data will be transmitted back to two secondary sources and . Collection of CSI and system parameters for decoding data, cancelling interferences, subtracting self-interference components, and selecting the cooperative relay are performed by the medium access control (MAC) protocol as specified in [37].

The secondary sources and transmit simultaneously the data and , respectively, to the secondary relays at the same time (the first time slot) and the same frequency as the uplink NOMA operation, where . The received signal at the is expressed aswhere , and presents the Gaussian noises at the secondary relays with the same variance .

The secondary relays can compute the distances and by taking coordinate parameters in received request-to-send (RTS) messages of the secondary sources and in the setup phase [37]. Coordinates of the nodes can be received from the navigation systems. Hence, the secondary relays can make decoding decisions of the signals and in (2) by the SIC technique as follows.

Case 1. ( or ( is closer than )).
In this case, the data in (2) is decoded by the secondary relay firstly whereas a signal containing is treated as interference. The received signal-to-interference-plus-noise ratios (SINRs) at the to decode are obtained from (2) aswhere .
In (3), to increase the decoding capacity for the data , decrease the collection of the CSI, and minimize help of the cooperative secondary relays, we only select one secondary relay among secondary relays. Indeed, the selected secondary relay is obtained as . Then, the CDF and PDF of the RV are correspondingly expressed as ([28], eqs. 7–14)After decoding successfully, the inference component in (2) can be cancelled completely or partly by the SIC technique in which the transmit power and the channel coefficient were known in the setup phase [37]. The remaining received SINR at the selected secondary relay to decode is inferred aswhere is a residual interference part at the secondary relay due to the imperfect SIC operations and can be modeled as an identical complex normal distribution [19] with zero mean and same variance ( is also the power of the residual interference part), and hence, are also exponentially distributed RVs with the PDF as and the CDF as ([28], eqs. 6–68), where ; and denote perfect and imperfect interference cancellation at the secondary relay , respectively.
Substituting into (6), is expressed as

Case 2. ( or ( is closer than )).
Similarly, the secondary relay decodes the data firstly with the interference signal , where . The SINRs at the for decoding and are expressed, respectively, as

In the second time slot, if the selected secondary relay decodes successfully both data and in the first time slot, the creates a new data aswhere and are power allocation coefficients to data and , respectively, and satisfy conditions as [21]

We remark that for the UTW-2TS-SC protocol as in (10) and (11), the selected secondary relay performs the downlink NOMA operation to allocate powers to data and as in which and are the desired data of the secondary sources and , respectively [21]. If the is closer to the , the will allocate the lower power for the data , where and and vice versa. More specifically, in Case 1 (), the is the nearby user and the is the distant user. Hence, the uses the lower power allocation coefficient () to transmit the data to the and the higher power allocation coefficient to transmit the data to the . In addition, we note that the secondary relay in Case 2 is selected by .

The coded data in (10) will be broadcasted back to two secondary sources and , and then the received signals at the secondary sources are expressed aswhere presents the Gaussian noises at the secondary sources with the same variance .

For the UTW-2TS-DNC protocol with in (12), the received SINRs at the secondary sources can be obtained from (12) to take as

The decoding method of the secondary sources to take the desired data is performed by decoding operations of the network coding; i.e., the takes the data by XOR operations of its data with the compressed data as .

For the UTW-2TS-SC protocol, the received signals at the secondary sources are shown more clearly as

In (14), the secondary source owns the data and does not decode this data. In addition, the can estimate the fading channel coefficient from receiving the setup messages of the selected secondary relay and takes the system parameters as the transmit power and the power allocation coefficient during the setup time, where , [37]. Hence, the knows the parameters , , , and , which then can cancel out the self-interference component in (14) [38, 39]. The received signals at the after subtracting the known self-interference components are obtained as

The received SINRs at the secondary sources can be computed to take the desired data as

3. Outage Probability and Throughput Analyses

In this paper, it is assumed that an outage event occurs when the received SINR is less than a threshold SINR [30, 40]. In addition, the data transmission in the secondary network is fixed to the delay-limited mode in which the secondary receivers such as the selected secondary relay and the secondary sources and decode the desired data block by block without using buffers [30, 40]. Throughput has been considered to characterize the spectrum utilization of the communication systems [30, 40, 41] (known as the mean spectral efficiency) and is related to outage analyses aswhere 1/2 denotes that the protocol operates in the two time slots, ; is the threshold data rate and is given by (bits/s/Hz) [30, 38, 40, 41]; is the outage probability at the secondary source in the case () and is defined as probability that the secondary source cannot decode successfully the desired data.

3.1. The UTW-2TS-DNC Protocol
3.1.1. Case 1:

The outage probability of the secondary source occurs when the secondary source cannot successfully decode the data of the opposite secondary source . Due to the exploitation of the SIC technique at the selected secondary relay which was set up in the initial phase, the outage probability of the secondary source happens when (1) the fails to decode the data ; or (2) the decodes the data successfully but does not decode the data ; or (3) the decodes both and successfully, but the cannot decode the DNC-coded data to get the desired data in the second time slot. We express the outage probability of the secondary source by the mathematical expression

In (18), the probability is considered when the secondary relay fails to decode the data while applying the SIC technique. The probability is the decoding error of the data at the secondary relay . Finally, the probability measures the decoding error of the coded data at the secondary source . The event occurs independently with the events and ; thus, we have an equivalent representation of (18) as

To analyze the probabilities , , and , we define , where , , and ; then, by referring from [30] (eqs. 24–25), the CDF and PDF of the RV are obtained as

For the selected secondary relay from the links (), the CDF of the RV is given as

Substituting the CDF of the RV in (4) and the PDF of the RV into (22), we have a final result as

The probabilities and are solved by Lemmas 1 and 2 as follows.

Lemma 1. The probability is solved aswhere , , , and are functions versus count variable and are defined, respectively, as and .

Proof. (proven in Appendix A).

Lemma 2. The probability is given in two cases of as follows:
Case (perfect SICs):Cas (imperfect SICs):where is the upper incomplete Gamma function ([42], eq. 8.350.2).

Proof. (see the proof and notations in Appendix B).

The last probability in (19) is obtained by using formula (13) with as

Substituting (27) into (19), the outage probability of the secondary source is obtained by the closed-form expressionwhere and are given by closed-form expressions in Lemmas 1 and 2, respectively.

The secondary source expects to receive the desired data of the secondary source . Hence, the outage probability of the secondary source occurs when (1) the selected secondary relay cannot decode the data or (2) the fails to decode the data transmitted by the after the data is decoded successfully. We formulate the outage probability of the secondary source as

In (29), the probability part shows transmission errors of the data from the selected secondary relay to the desired secondary source . Because the event occurs independently, and with the help of (13) with , the outage probability of the secondary source is manipulated and solved aswhere is given exactly by Lemma 1.

Next, the throughput of the UTW-2TS-DNC protocol as in (17) is solved in Case 1 () bywhere and are taken from Lemmas 1 and 2, respectively.

3.1.2. Case 2:

In this case, a selected secondary relay must decode the data firstly. Because the system model of the UTW-2TS-DNC protocol in Figure 1 is symmetric, we can model the outage probabilities in Case 1 as functions versus symmetric parameters as and . Hence, in Case 2 (), the outage probability of the secondary sources and can be inferred from Case 1 as follows:where and are closed-form outage probability expressions of the secondary sources and in Case 1 with replacing and .

The throughput of the UTW-2TS-DNC protocol as in (17) is obtained in Case 2 bywhere and are presented in (32) and (33), respectively.

3.2. The UTW-2TS-SC Protocol

Operation of the UTW-2TS-SC protocol is different to the UTW-2TS-DNC protocol in the time slot 2 (the last time slot) with power allocation coefficients and to decoded data and . Similar to the UTW-2TS-DNC protocol for Case 1 () and Case 2 (), the outage probability and corresponding throughput of the secondary sources and will be obtained briefly in the next subsections.

3.2.1. Case 1:

The decoding operation of the UTW-2TS-SC protocol is similar to that of the UTW-2TS-DNC protocol. One difference is that the secondary source expects to decode the desired data directly from the received signal as in (14) where and . Hence, the outage probability of the secondary source (denoted as ) is expressed in Case 1 () aswhere and are obtained from Lemmas 1 and 2.

In (35), the probability directly calculates the decoding error of the data at the secondary source .

Substituting (16) with and into the probability in (35) and performing similarly as (27), we have a result as

Hence, the outage probability is solved in a closed-form expression with , , and from Lemmas 1 and 2 and (36).

We see that because , then which leads to .

Similarly, the remaining outage probability of the secondary source is obtained as

Then, the throughput of the UTW-2TS-SC protocol is solved in Case 1 () by

3.2.2. Case 2:

We can also model the outage probabilities in Case 1 as functions versus parameters as and . Because of the symmetry model of the UTW-2TS-SC protocol in Figure 1, the outage probability of the secondary sources and in Case 2 can be concluded from Case 1 as follows:where and are closed-form outage probability expressions of the secondary sources and in Case 1 with replacing , , and .

The corresponding throughput of the UTW-2TS-SC protocol is obtained in Case 2 aswhere and are given in (39) and (40), respectively.

4. Results and Discussions

This section presents analysis and simulation results in terms of outage probabilities and throughputs of the protocols UTW-2TS-DNC and UTW-2TS-SC in the two-dimensional plane. These proposed protocols are considered in two cases of perfect SICs (, denoted by pSIC) and imperfect SICs (, denoted by ipSIC). The simulation results are performed by the Monte Carlo method to validate the analysis ones which are shown from exact closed-form expressions. Coordinates of the nodes , , PR, and the cluster with secondary relay are set as , , , and , where and . The normalized distances are calculated from the coordinates as , , , , and . It is assumed that the threshold SINR and the path loss exponent are fixed by and , and (dB) on the -axis is defined as (dB). Markers denote simulated results, and solid lines present analyzed ones.

Figure 2 shows the outage probabilities of the secondary sources and in the protocols UTW-2TS-DNC and UTW-2TS-SC versus (dB) when , , , , , and interference allocation coefficients [19, 30]. The normalized distances are calculated as , , , , and ; hence, the results are presented following Case 1 (). The power allocation coefficients and at the selected secondary relay are suitably set as and . We note that the power allocation coefficients and to carry the desired data and from the selected relay to the and , respectively. Simulated results are performed from equations (18) and (29) by making RVs in (3), (7), and (13), whereas exact theory values are calculated by closed-form expressions in (28) and (30) for the secondary sources and , respectively. From Figure 2, some findings are watched as follows. Firstly, the outage probabilities of the secondary source and in both protocols with the perfect SICs and imperfect SICs decrease when the interference constraint parameters increase. Secondly, the system performances of the secondary source with the perfect SICs are always better than those with the imperfect SICs. We note that the outage probabilities of the secondary source in both protocols are not affected by SIC operations, and thus, the system performances of the secondary source with the perfect SICs and the imperfect SICs are identical (markers and solid line are merged in Figure 2). Thirdly, in this case, the outage probabilities of the secondary source are almost smaller than those of the secondary source . Finally, the results (solid lines) from the theory expressions of the outage probabilities are exact to the Monte Carlo simulations. These findings can be reasoned that the received SINRs in (3) and (7) to decode the data and declined by more interferences from transmittance of the data-carried signal , affecting of the residual interference signal and interference constraints as in (1). In addition, with large values of , the transmit powers of the nodes , , and increase as in (1) which correspond to large SINRs to decode the data , , and as in (3), (7), (13), and (16), where .

Figure 3 compares the throughputs of the UTW-2TS-DNC and UTW-2TS-SC protocols versus (dB) when , , , (dB), , , , and the number of intermediate secondary relays is set as . Exact throughput curves of the UTW-2TS-DNC and UTW-2TS-SC protocols are obtained by theoretic analyses in (31) and (38). Simulation markers are carried out by (17) with separate outage probabilities for each protocol. From Figure 3, the throughputs of the UTW-2TS-DNC protocol are larger than those of the UTW-2TS-SC protocol with all the cases of SICs and . In addition, the throughputs of both protocols increase when the UTW-2TS systems use more secondary relays ( is increased). These contributions are based on observations from SINRs (13) and (16). With and , the SINRs in (13) of the UTW-2TW-DNC protocol are always larger than those in (16) of the UTW-2TW-SC protocol. Furthermore, with more cooperative secondary relays, the diversity capacity of both protocols will be increased by the relay selection methods.

Figure 4 presents the throughputs of the protocols UTW-2TS-DNC and UTW-2TS-SC versus when (dB), , , (dB), , , , , and can be set as . In Figure 4, the throughputs of the protocols UTW-2TS-DNC and UTW-2TS-SC achieve the large values at an approximate interference power allocation coefficient for both cases (perfect SICs and imperfect SICs). The value is to balance constraints such as interferences from the secondary network to the primary network, locations of the secondary relays, and perfect/imperfect SIC operations.

Figure 5 shows the throughputs of the protocols UTW-2TS-DNC and UTW-2TS-SC versus when (dB), , , (dB), , , , , and is changed as . As observed from Figure 5, the UTW-2TS-DNC protocol is not affected by the power allocation coefficients and , and the UTW-2TS-SC protocol reaches the largest throughputs at approximate values and corresponding to perfect SICs and imperfect SICs, respectively. These values and are to equalize the SINR qualities between two hops from the selected secondary relay to the secondary sources.

Figure 6 shows the throughputs of the protocols UTW-2TS-DNC and UTW-2TS-SC versus and in the three-dimensional plane when (dB), (dB), , , , , and and are set as and . The value ranges of and are established between 0.1 and 0.9. The results from Figure 6 confirm the contributions from Figures 4 and 5.

Figure 7 presents the throughputs of the protocols UTW-2TS-DNC and UTW-2TS-SC versus when (dB), , , (dB), , , and is fixed as . In this simulation, the normalized distances and are fixed at the same value 0.7 and the remaining normalized distances , , and are changed from 0.1 to 0.9 for , 0.9 to 0.1 for (the distance has a reverse change versus the distance ), and 0.64 to 0.5 and back to 0.64 for . From Figure 7, these proposed protocols UTW-2TS-DNC and UTW-2TS-SC achieve the largest throughputs at asymmetric locations of the selected secondary relay as and because of decoding the received data sequentially (SIC operations). In addition, at the symmetric location , the throughputs of both protocols again have the lowest values.

Figure 8 presents the throughputs of the protocols UTW-2TS-DNC and UTW-2TS-SC versus when (dB), , , , (dB), , , , and is fixed at . In this case, the normalized distances and are fixed to 0.3 and 0.7, respectively, and the primary receiver (PR) is moving farther the secondary network characterized by changing the normalized distances , , and from 0.22 to 0.92 for and from 0.51 to 1.03 for and . As shown in Figure 8, the throughputs of the protocols UTW-2TS-DNC and UTW-2TS-SC are enhanced when the value of increases because of low influence of the interference constraint to the sources and relays in the secondary network. Therefore, the secondary sources and relays can transmit with the maximum power, and interference cancelling and decoding capacity at the secondary relays and the secondary sources increase.

Figure 9 presents the throughputs of the protocols UTW-2TS-DNC and UTW-2TS-SC versus the residual interference powers when (dB), , , , , , , and . Considering the case of the imperfect SICs for both protocols, the throughput performances decrease when the residual interference powers increase. Furthermore, the throughputs of the protocols UTW-2TS-DNC and UTW-2TS-SC in the perfect SICs are upper limitations (expectations) of the ones in the imperfect SICs when (dB).

5. Conclusions

In this paper, we proposed and analyzed the underlay two-way relaying scheme with two secondary sources and multiple secondary relays, known as the UTW-2TS scheme. The UTW-2TS scheme with the SIC solution operated in only two time slots and under an interference constraint of the primary receiver. The secondary relays decode successively the data transmitted by two secondary sources and then encode these data by two techniques: the DNC enforced by XOR operations (known as the UTW-2TS-DNC protocol) and the SC enforced by power domain additions (known as the UTW-2TS-SC protocol). A selected secondary relay which subjects to maximize the decoding capacities and to minimize the collection time of CSI in the proposed protocols UTW-2TS-DNC and UTW-2TS-SC suffered the residual interferences from the imperfect SIC operations. Exact outage probabilities and throughputs were derived to evaluate the system performance of the proposed UTW-2TS-DNC and UTW-2TS-SC protocols. Simulation and analysis results provided discoveries of the performance improvements by increasing of the number of the cooperative secondary relays, the interference constraints, and the distances from the secondary network to the primary receiver. In addition, the proposed UTW-2TS-DNC and UTW-2TS-SC protocols achieved the best throughputs at optimal interference power allocation coefficients and optimal locations of the selected secondary relay. Considering the same power consumption, the UTW-2TS-DNC protocol performed better than the UTW-2TS-SC protocol. Finally, the analysis results of the outage probabilities and throughputs were validated by the Monte Carlo simulations.

Appendix

A. Proof of Lemma 1

Substituting (3) into the formula of as in (18), we have the expression

From (23), we infer the CDF and the corresponding PDF of the RV as

Substituting (23) and (A.3) into (A.1), we have the equivalent formula:

By performing variable transformations for the integral in (A.4) as and , where and , Lemma 1 is proven completely.

B. Proof of Lemma 2

Substituting (3) and (6) into the formula of as in (18), the probability is expressed as

In (B.1), we consider two cases of perfect SICs and imperfect SICs to solve the following:

Case: formula (B.1) is expressed and manipulated aswhere is the CDF of the RV at a value (see (A.2)).

By using the PDF of the RV as in (A.3) and the CDF of the RV as in (23), formula (B.2) is rewritten as

Solving (B.3) also by variable transformations as in (A.4), is presented as (25) in Lemma 2.

Case: formula (B.1) is performed as

Using the result of (B.2) for the inner integral of (B.4) and the PDF of RV , we have the next result:

We solve sequentially the integrals , , and in (B.5) aswhere is the upper incomplete Gamma function ([42], eq. 8.350.2).

Substituting (B.6), (B.7), and (B.8) into (B.5), the probability is analyzed for the case as (26) in Lemma 2. Hence, the lemma is proven completely.

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that there is no conflict of interest regarding the publication of this paper.

Acknowledgments

This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.04-2019.13. Khuong Ho-Van acknowledges the support of time and facilities from Ho Chi Minh City University of Technology (HCMUT), VNU-HCM, for this study.