Abstract

In this paper, we propose and evaluate performance of multihop multipath underlay cognitive radio networks. In a primary network, an uplink nonorthogonal multiple access method is employed to allow primary transmitters to simultaneously transmit their data to a primary receiver. Using an underlay spectrum-sharing method, secondary source and secondary relays must adjust their transmit power to guarantee quality of service of the primary network. Under the limited transmit power, cochannel interference from the primary transmitters, and hardware noises caused by impairments, we propose best-path selection methods to improve the end-to-end performance for the secondary network. Moreover, both multihop decode-and-forward and amplify-and-forward relaying protocols are considered in this paper. We derive expressions of outage probability for the primary and secondary networks and propose an efficient method to calculate the transmit power of the secondary transmitters. Then, computer simulations employing the Monte-Carlo approach are realized to validate the derivations.

1. Introduction

Multihop relaying protocols [15] are commonly used to enhance performance for wireless networks, e.g., wireless sensor networks (WSNs) and wireless ad hoc networks (WANs). In WSNs and WANs, the transmit power of wireless devices is often limited, and hence, the source cannot directly communicate with the destination at a far distance. In multihop decode-and-forward protocol (M-DF-P) [68], intermediate nodes (or relays) decode the received signals, reencode, and send the encoded ones to next hop. In multihop amplify-and-forward protocol (M-AF-P) [911], relays amplify the received signals and forward the amplified ones to a next node. The implementation of M-DF-P is more complex than that of M-AF-P, but M-DF-P obtains better end-to-end (e2e) performance due to the decoding process at each hop. As shown in [12, 13], M-DF-P outperforms M-AF-P over fading and limited cochannel interference (CCI) environments, in terms of outage probability (OP) and bit error rate (BER). References [14, 15] evaluated the e2e OP of M-AF-P in a random presence of interference sources. In [16], the authors studied the impact of I/Q imbalance on the performance of M-AF-P. In [17], joint impact of hardware impairments (HI) and CCI on the e2e OP and average channel capacity of M-DF-P was studied. As shown in [17], in fading and CCI environments, the performance of multihop relaying protocols is significantly degraded.

To enhance the performance for multihop relaying protocols over fading environments, various diversity methods have been proposed in [1826]. The authors of [18, 19] introduced cooperative multihop protocols, where the relays can exploit the broadcast nature of wireless medium to obtain spatial diversity. Particularly, the relays attempt to receive the signals from all the previous nodes and process them appropriately to enhance reliability of the data decoding. Different with [18, 19], diversity-based multihop transmission protocols in [20, 21] perform cooperative communication at each hop by using external nodes that are not on the source-destination route. In [22, 23], relay selection approaches in cluster-based multihop transmission networks were studied. In the system models proposed in [22, 23], the source data is transmitted to the destination via intermediate clusters. Moreover, opportunistic relay selection methods are performed at each cluster to attain the diversity gain. In [2426], the authors introduced ultradense wireless networks in which there exist multiple available paths between a source and a destination. In addition, path selection strategies were proposed to obtain better performance.

Cognitive radio (CR) [27] was first proposed by J. Mitola in 1999 to solve the spectrum scarcity issue and inefficient spectrum usage. In CR, primary users who are used licensed bands at any time can share spectrum to secondary users. Underlay cognitive radio (UCR) [2830] is one of efficient spectrum-sharing methods that can guarantee the continuous data transmission for the secondary network. However, the secondary transmitters in the UCR networks must adjust their transmit power so that quality of service (QoS) of the primary network is not harmful. In [31], the authors considered the performance of multihop UCR AF relaying protocols over the Nakagami-m fading channels. In [32, 33], the authors proposed M-DF-P in the UCR networks, where the secondary transmitters can harvest wireless energy from a power beacon deployed in the secondary network. References [34, 35] proposed cluster-based multihop UCR protocols using the DF technique and relay selection methods at each cluster. A best-path selection method was studied in [36] to improve the e2e performance of the UCR networks under the interference constraint and presence of an active eavesdropper.

Recently, nonorthogonal multiple access (NOMA) [3739] has gained much attention as a promising method to improve data rate for wireless systems. In downlink NOMA scenarios [40, 41], a base station linearly combines signals with different transmit power levels before transmitting them to intended users at the same time, frequency, and code. At these users, the successive interference cancellation (SIC) technique can be performed to obtain their desired signals. For uplink NOMA methods [42, 43], the users can simultaneously send their signals to the base station. Similarly, different transmit power levels have to be used at the users so that the base station can realize SIC for decoding the received signals. References [4446] studied the outage performance of dual-hop relaying protocols in the UCR networks. The authors in [47] proposed multihop energy-harvesting WSNs employing NOMA and cooperative jamming methods to enhance the e2e secrecy performance.

In this paper, we propose best-path selection methods to enhance the OP performance for both M-DF-P and M-AF-P in the UCR networks under the joint impact of CCI from primary transmitters and HI. In particular, a secondary source selects one of available paths providing maximum instantaneous e2e channel capacity to send its data to a secondary destination. We also propose an uplink NOMA method to increase the data rate for the primary network, i.e., multiple primary transmitters send their data to a primary receiver at the same time. Different with [45, 46], we consider multihop DF and AF UCR networks where the primary network uses NOMA to enhance the system throughput. Unlike [34, 35], this paper concerns with path selection strategies in the UCR networks (see Table 1). Although various path selection methods were proposed in [2426], these published works did not consider the UCR networks. Moreover, unlike [2426, 34, 35], the joint impact of CCI and HI is studied in this paper. Although references [17, 48] evaluated the performance of M-DF-P in the presence of the limited interference and hardware noises, the authors in [17] only considered a single-path scheme, and reference [48] did not consider the UCR environment. In addition, our proposed models consider both DF and AF protocols, while only M-DF-P is studied in [17, 48]. Unlike [36], we propose the uplink NOMA scheme for the primary network. Furthermore, reference [36] assumed that the transceiver hardware of all wireless devices is perfect, and CCI from the primary transmitter to secondary receivers can be relaxed.

The main contribution of this paper can be listed as follows: (i)Firstly, the NOMA approach is proposed to provide a higher data rate for the primary network. Moreover, we also propose an efficient method to allocate transmit power for the secondary transmitters to guarantee QoS for the primary network, i.e., the secondary transmitters have to adjust their transmit power so that the outage performance of the primary network is lower than a predetermined threshold(ii)Secondly, the best-path selection methods are proposed to enhance the e2e OP for the secondary networks under the joint impact of the interference constraint, CCI from the primary transmitters, and Rayleigh fading channel. In addition, we consider a practical scenario, i.e., the secondary nodes are low-cost devices (e.g., sensor nodes), and hence, their transceiver hardware may be not perfect(iii)Next, we derive an exact closed-form expression of OP for the primary network. The e2e OP of M-DF-P and M-AF-P of the secondary networks is also analyzed. Particularly, we derive the exact and asymptotic closed-form formulas of the e2e OP for M-DF-P, and lower-bound ones of the e2e OP for M-AF-P(iv)Finally, the Monte-Carlo based computer simulations are realized to validate the derived formulas as well as to compare the e2e OP performance of M-DF-P and M-AF-P.

The rest of this paper is organized as follows. The system model of multihop multipath UCR networks is described in “System Model.” Performance evaluation is given in “Performance Analysis.” “Numerical Results” presents both simulation and analytical results to compare performance of M-DF-P and M-AF-P. Finally, conclusions are given in “Conclusion.”

2. System Model

Figure 1 illustrates the system model of the proposed M-DF-P and M-AF-P in the UCR networks. In the primary network, primary transmitters attempt to send their data to a primary receiver (PR). To enhance the throughput for the primary network, the primary transmitters at the same time send their data to the PR node by using NOMA. In addition, the PT nodes use different transmit power levels, and the PR node uses SIC to decode the received data. In the secondary network, a source (S) wants to transmit its data to a destination (D). Because the direct link between S and D does not exist, the multihop relaying technique is employed to relay the source data to the destination. Assume that there are available paths between S and D , and one of them is selected for the data transmission. Let denote the number of relay nodes on the path, where , . As depicted in Figure 1, the relays on the path are named by , ,…, . For ease of presentation and analysis, we also denote S and D by and (), respectively. Assume that all the nodes have only a single antenna and operate on a half-duplex mode, where , .

Let us denote as the Rayleigh fading channel coefficient between and , where . Hence, channel gain, i.e., , is an exponential random variable (RV) whose distributions are given as where and are cumulative distribution function (CDF) and probability density function (PDF) of a RV , respectively, [3436], is an expected operator, is distance between and , and is a path-loss exponent.

2.1. Hardware Impairments

Considering the data transmission between a transmitter and a receiver , under the impact of HI (assume that there is no CCI), the signal received by is written as where is transmit power of , is signal of , is the hardware noise caused by the hardware imperfection at and , and is the additive white Gaussian noise (AWGN) at with zero-mean. Similar to [49, 50], can be modeled as a zero-mean Gaussian RV whose variance is ,( is called to be total hardware impairment level of the link).

2.1.1. Assumption and Notation

Assume that variance of AWGN at all of the receivers is same, i.e., . It is assumed that the transceiver hardware of the primary terminals is perfect, i.e., . Next, we denote , , and as the total hardware impairment levels of the , , and links, respectively, for all .

2.2. Operation Principle

In this subsection, assume that the path is selected, and hence, the data transmission is split into orthogonal time slots. At the first time slot, the source () sends its data to , while the primary transmitters simultaneously transmit their data to PR. (1)Primary network: under the joint impact of CCI and HI, the received signal at PR in this time slot can be given as

In (3), is the signal of the source, is the signal of in the first time slot, is the transmit power of the source, and is the maximum transmit power of all the primary transmitters. Following the NOMA principle, the primary transmitters must use different transmit powers so that PR can decode the received signals. As presented in (3), is the transmit power of , where . With this power allocation method, PR will decode the signal , next uses SIC to remove the component from , and then decodes . Indeed, if the SIC operation is perfect, the signal used for decoding can be rewritten as where we note that .

For the last signal , Equation (4) reduces to

Combining (3), (4), and (5), the signal-to-interference-plus-noise (SINR) obtained by PR for decoding is obtained as (2)Secondary network: considering the secondary network at the first time slot, the received signal at can be expressed as

From (7), the SINR received by is calculated as

Next, we describe the operation of the proposed M-DF-P and M-AF-P models at next time slots. (3)M-DF-P: in this protocol, decodes , encodes again, and then forwards it to in the second time slot. Generally, at the time slot, sends to , and the received signal at PR and can be formulated, respectively, aswhere is the signal of PTn in this time slot and is the transmit power of .

Similar to the first time slot, PR uses SIC to decode all the data. Then, the SINR obtained at PR, with respect to , is shown as

Using (10), the SINR at can be given as follows:

Due to usage of the DF relaying method, the e2e channel capacity of the path can be expressed as where the factor implies that the data transmission of the secondary network is split into time slots. (4)M-AF-P: in M-AF-P, amplifies the received signal , i.e., , and sends to in the second time slot. Because , using (7), the amplify factor can be determined as

Next, the received signal at PR and can be expressed, respectively, as

Similar to [49], variances of and can be calculated, respectively, as

Combining (15) and (17), the SINR obtained at PR, with respect to , is given as

Next, combining (7), (16), and (18), we can formulate the SINR received at by where it is worth noting that and are given as in (12).

Similarly, amplifies and then forwards the amplified signal to in the third time slot. Using an inductive method, we can obtain an exact formula of the SINR obtained at at the time slot as follows: where . Then, the e2e channel capacity of the path can be computed as

Remark 1. In both M-DF-P and M-AF-P, the SINRs obtained at PR at the time slot is the same (see (11)). Therefore, the channel capacity of the link at the hop of the path is shown as

2.3. Best-Path Selection Methods

To maximize the e2e channel capacity, we propose the best-path selection methods for M-DF-P and M-AF-P as follows: where denotes the best path, and .

Remark 2. To select the best path, the secondary nodes on the paths have to estimate the channel state information (CSI) of the data links and the interference links. In addition, the secondary transmitters including source and relays also have to know their transmit power (see “Transmit Power of Secondary Transmitters”). Via operation of the routing set-up and maintenance, the secondary nodes can exchange the estimated CSIs and their transmit power together. Therefore, the source can obtain information of the instantaneous SINR (and instantaneous channel capacity as well) of all the hops so that it can select the best path by using the algorithm given in (24). It is also assumed that the operation of the CSI estimation is perfect, and the channels between the nodes are slow Rayleigh fading, which remain unchanged in each the source-destination data transmission.

3. Performance Analysis

This section evaluates OP of the primary and secondary networks. We also derive expressions of the transmit power for the secondary transmitters to guarantee QoS for the primary network.

3.1. OP of Primary Network

When the path is selected, let us consider the minimum channel capacity between and PR at the time slot:

We now define OP of the primary network as the probability that is lower than a positive threshold, i.e., , and is expressed as where

Equation (26) also implies that the primary network is in outage if one of the signals cannot be correctly decoded. In particular, employing the independence of RVs , Equation (26) can be rewritten as where is the probability that the decoding of fails.

Combining (11) and (28) yields (29) as where

Substituting CDF and PDF given by (1) into (29), after some manipulation, we obtain where

Substituting (31) into (28), OP of the primary network at the time slot can be expressed by an exact closed-form expression as follows:

3.2. Transmit Power of Secondary Transmitters

At first, QoS of the primary network in the time slot is given as where is an allowable maximum value of OP at any time slot, and it is an important design parameter of the primary network.

Hence, the transmit power of can be obtained by solving equation. More particularly, we have to find a positive real solution (denoted by ) of the following equation:

Then, the transmit power of is obtained as . In case that Equation (35) has no positive real solution, we have , which means is not allowed to access the licensed band.

For example, when , is a solution of (36): where . Moreover, if Equation (36) has a positive real solution, we have

Proposition 3. Equation (35) cannot have two distinct positive real solutions.

Proof. Firstly, we consider the following function: Assume that there exist at least two distinct positive real solutions, e.g., and , ; we then have Differentiating with respect to yields Since when , increases in interval . This means that , and hence, we cannot obtain (39).

Corollary 4. Assume that Equation (35) has one positive real solution; the transmit power is lower with higher QoS of the primary network (or lower value of εOP).

Proof. Let us denote as the positive real solution of (35), we have . Therefore, it is straightforward that for the fixed values of and , if decreases, then (or ) also decreases.

Proposition 5. Equation (35) has one positive real solution when

Proof. As proved in Proposition 3, is a continuous and increasing function in . Therefore, it is obvious that if , Equation (35) always has one real positive solution. Using (38), we obtain (41) and finish the proof.

For example, with , the condition in (41) can be written as

Proposition 6. If Equation (35) has one positive real solution, at high values (i.e., ), is a linear function of .

Proof. As , we have Therefore, at high values, Equation (35) becomes If is a positive real solution of (44), does not depend on . Hence, becomes a linear function of , i.e., .

Remark 7. Before the secondary source starts the data transmission, the best path is chosen by the source, and all the secondary transmitters on the selected path have to adjust their transmit power. In practice, the value of can be calculated by the primary network and is then sent to the secondary network. In the conventional UCR schemes (see [45, 46]), the secondary transmitters have to adjust their transmit power, following the instantaneous CSIs between themselves and the primary receivers. However, these methods are very complex due to requirement of perfect CSI estimation and frequent change of the link channels.

3.3. Outage Probability of Secondary Network

This subsection evaluates the e2e OP of M-DF-P and M-AF-P, which can be defined as where , is a predetermined target rate of the secondary network, and is the e2e OP of the path. In the following, we attempt to calculate . (1)M-DF-P: in this protocol, the e2e OP of the path is calculated as follows:(1)M-AF-P: because it is too difficult to find an exact expression of , we attempt to obtain a lower-bound one.

Proposition 8. can be expressed by an exact closed-form expression as where

Proof. See Appendix A.

Corollary 9. If , at high values can be approximated as where

Proof. Substituting and into (46), we obtain (48).

Similar to [31], we consider two RVs: and , where and is the highest integer that is smaller or equal to . Then, the e2e SINR (see (21) or (22)) can be bounded as in [31]:

Our next objective is to find the distributions of and which are presented in Proposition 10.

Proposition 10. CDF of and can be given, respectively, as follows: where

Proof. See Appendix B.

From (52), if , , and if , PDF of can be obtained as

Next, we derive the lower-bound expression of as given in Proposition 11.

Proposition 11. If , then , and if is bounded by where

Proof. See Appendix C.

Remark 12. Firstly, can be numerically calculated by using MATLAB or Mathematica. Secondly, as , the e2e OP of M-DF-P and M-AF-P does not depend on . Indeed, in (12) can be approximated as We can observe from (58) that at high values do not depend on , and it is the reason why converges to a constant as . This also means that the diversity order of both M-DF-P and M-AF-P is zero.

Corollary 13. always equals to 1 if .

Proof. At first, we can rewrite the e2e SINR under the following form: Combining (12) and (59), it is straightforward that where Therefore, if , then .

Remark 14. From Proposition 8, we can see that if , all of the paths in M-DF-P are in outage, and hence, M-DF-P is always in outage, regardless of the values of the other system parameters. For the AF method, from Corollary 13, M-AF-P is always in outage if where and are called as limited hardware impairment levels of M-DF-P and M-AF-P, respectively. Because , M-AF-P is more sensitive to HI than M-DF-P.

Proposition 15. When the transceiver hardware is perfect, i.e., , we obtain a lower-bound closed-form expression of by where

Proof. See Appendix D.

4. Numerical Results

This section provides the Monte-Carlo-based computer simulations to verify the analysis as well as to compare the e2e OP of M-DF-P and M-AF-P. Simulation environment is a two-dimensional plane Oxy, in which all the primary and secondary nodes are placed. We assume that there are two primary transmitters, and their coordinates are and , while PR is located at (0.45, 0.5). As mentioned in “System Model,” the transmit power of is higher than that of ; hence, we can set and . In the secondary network, assume that there are 03 available paths (), and the number of relays on the paths is , , and . In addition, the source and destination nodes are located at (0,0) and (0,1), respectively, and the relay node is placed at , where and . To focus on performance trend and performance comparison between M-DF-P and M-AF-P, some system parameters are fixed in all the simulations, as given in Table 2.

Remark 16. Although we do not investigate the impact of the number of paths and the number of the primary transmitters on the e2e OP of the secondary networks, we can guess that the performance of M-DF-P and M-AF-P is better with a higher value of and a lower value of . Also, we can expect that the performance of M-DF-P and M-AF-P is better with higher value of , and vice verse.

In Figure 2, we assume that the third path is selected and presents the transmit power of (Source), , , and as a function of in dB. As seen from Figure 2, the transmit power of all the secondary transmitters is higher than zero when changes from 12 dB to 32 dB. This means that the secondary transmitters are allowed to access the licensed band to transmit the data. As proved in Proposition 6, we also observe that the transmit power linearly increases with the increase of . Also in this figure, the transmit power of is highest, and that of is lowest. It is due to the fact that the distance between and PR is furthest, and is nearest to PR.

Figure 3 compares the performance of M-DF-P and M-AF-P when and . We can see that the performance of M-DF-P is better than that of M-AF-P for all values of . As mentioned in Remark 12, the e2e OP of M-DF-P and M-AF-P in Figure 3 converge to a constant when is high enough. In addition, the performance of the proposed protocols is better as decreases. It is worth noting that for M-DF-P, the simulation results (denoted by Sim) verify the theoretical ones, where Exact denotes the theoretical results obtained by using (46) and Asymp denotes the approximate expression of the e2e OP at high regimes (see (48)). For M-AF-P, there exists gap between the simulation results (Sim) and the theoretical results (LowB) because the usage of (56) for evaluating the outage performance.

In Figure 4, the e2e OP of M-DF-P and M-AF-P presents as a function of in dB when . In this figure, we consider two cases: the transceiver hardware is perfect and imperfect .

As expected, the outage performance of the proposed protocols with perfect transceiver hardware is better. Similar to Figure 3, M-DF-P outperforms M-AF-P, and the OP curves rapidly converge to constants. It is worth noting that when the hardware impairments are relaxed, the closed-form expression in (63) is used to calculate the lower-bound e2e OP for M-AF-P, instead of (56).

Figure 5 compares the performance of M-DF-P and M-AF-P with different values of . In this figure, the perfect transceiver hardware is assumed, and the transmit power is fixed by 15 dB. We can see from Figure 5 that the e2e OP values of the proposed protocols increase as increases. Moreover, the performance of M-DF-P is better than that of M-AF-P, and the performance gap is higher as increases.

In Figure 6, we present the outage performance of M-DF-P as a function of when , and .

Figure 6 illustrates that the e2e OP rapidly increases as increases. We also see that when the HI level is high enough, M-DF-P is always in outage. As given in Remark 14, the limited hardware impairment levels of M-DF-P in this figure can be obtained as

Figure 7 depicts the performance of M-AF-P as a function of when , and . Similar to M-DF-P in Figure 6, the performance of M-AF-P is worse when increases. Also, M-AF-P is always in outage if , where is calculated by using (62):

From Figures 37, we can see that M-DF-P not only outperforms M-AF-P but also obtains much higher value of the limited HI level.

5. Conclusion

This paper proposed, evaluated, and compared the e2e OP of M-DF-P and M-AF-P in the UCR networks. The interesting results obtained in this paper can be summarized as follows: (i) the transmit power of the secondary transmitters can linearly increase with the transmit power of the primary transmitters, (ii) the OP performance of M-DF-P is significantly better than that of M-AF-P, (iii) there exist error floors that means the diversity gain of M-DF-P and M-AF-P equals to zero, and (iv) M-AF-P is more sensitive to the HI than M-DF-P, i.e., the limited HI level of M-AF-P is much lower than that of M-DF-P. Finally, the OP performance for M-DF-P and M-AF-P can be enhanced by increasing the number of paths between the secondary source and destination and by equipping better transceiver hardware for the secondary nodes (i.e., lower hardware impairment level).

Appendix

A. Proof of Proposition 8

Using (13), we have

where is given by (47).

Combining (12) and (A.1) yields

We can see from (A.2) that if , and if , we have

where and are given by (47).

Substituting CDF and PDF in (1) into (A.3), after some manipulation, we can obtain . Then, we substitute into (A.1) to obtain (46), and the proof is also completed.

B. Proof of Proposition 10

At first, using (12), CDF of is formulated as

It can be observed that if , then , and if , we have where and are given as in (53).

Then, in (B.2) can be expressed as in (51) if if , where is given by (53).

Next, with the same method deriving , we can obtain as presented in (52), if .

C. Proof of Proposition 11

At first, using (50), we have

Considering in (C.1), it can be formulated as

It is straightforward that if , then

In case that , Equation (C.2) can be written as follows:

Combining (57), (C.1), and (C.4) together, we can obtain (56), and Proposition 11 is then proved.

D. Proof of Proposition 15

Firstly, using and (12), we have the following inequality:

Setting and , we have

Similar to the derivation of (see (C.1)–(C.4)), we also obtain

Interchanging RV, i.e., , we arrive at

Similar to the derivation of in (51), we have where and are given by (64).

With the same manner as deriving in (55), we have where and are expressed in (64).

Plugging (D.4), (D.5), and (D.6) together yields where , , and are given by (64), and .

After calculating the integrals in (D.7) and substituting the obtained result into (D.2), we obtain (63).

Data Availability

The simulation data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that they have no conflicts of interest.