Next Article in Journal
Development and Validation of an Explainable Machine Learning-Based Prediction Model for Drug–Food Interactions from Chemical Structures
Previous Article in Journal
Use, Validity and Reliability of Inertial Movement Units in Volleyball: Systematic Review of the Scientific Literature
Previous Article in Special Issue
A Privacy-Preserving Desk Sensor for Monitoring Healthy Movement Breaks in Smart Office Environments with the Internet of Things
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Exploiting Cooperative Downlink NOMA in D2D Communications

1
Sustainable Communication Technologies, SINTEF Digital, 7034 Trondheim, Norway
2
Telenor Research, 1360 Oslo, Norway
3
Autonomous Systems and Sensor Technologies Research Group, Department of Technology Systems, University of Oslo, 0316 Oslo, Norway
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(8), 3958; https://doi.org/10.3390/s23083958
Submission received: 20 January 2023 / Revised: 1 March 2023 / Accepted: 15 March 2023 / Published: 13 April 2023

Abstract

:
We propose and investigate a bidirectional device-to-device (D2D) transmission scheme that exploits cooperative downlink non-orthogonal multiple access (NOMA) (termed as BCD-NOMA). In BCD-NOMA, two source nodes communicate with their corresponding destination nodes via a relaying node while exchanging bidirectional D2D messages simultaneously. BCD-NOMA is designed for improved outage probability (OP) performance, high ergodic capacity (EC) and high energy efficiency by allowing two sources to share the same relaying node for data transmission to their corresponding destination nodes while also facilitating bidirectional D2D communications exploiting downlink NOMA. Simulation and analytical expressions of the OP, EC and ergodic sum capacity (ESC) under both perfect and imperfect successive interference cancellation (SIC) are used to demonstrate the effectiveness of BCD-NOMA compared to conventional schemes.

1. Introduction

The use of wireless communication and data transfer is expanding rapidly worldwide. With the advent of new technologies such as holographic communications, Metaverse, and Internet of Things (IoT) applications in smart cities has triggered unprecedented exponential growth in data traffic. It has been predicted that global wireless traffic will surpass an incredible 5016 exabytes by 2030 [1]. Addressing these needs necessitates innovative solutions to meet the ever-increasing demand for wireless data. To satisfy these applications’ capacity and connectivity requirements, non-orthogonal multiple access (NOMA) is regarded as a potential key candidate for the upcoming sixth generation (6G) networks due to its high spectral efficiency [2,3,4]. NOMA can support a large number of users and provide a high data rate transmission by allowing multiple users to share the same frequency band and time slot. Additionally, NOMA can enhance the reliability of communication and reduce the latency in network communication [5]. In contrast to orthogonal multiple access (OMA) approaches such as orthogonal frequency-division multiple access (OFDMA) and time-division multiple access (TDMA), NOMA does not rely on orthogonal resources to separate the users [6,7]. Instead, it transmits different signals to different users simultaneously via superposition coding [8,9]. In particular, different users can share the same orthogonal resources in NOMA by assigning them to different power levels and using successive interference cancellation (SIC) at the receiver side [10,11,12]. NOMA can be used to support heterogeneous services by allowing users with different channel conditions to share the same resources, which can support a variety of services with different quality-of-service (QoS) requirements [13]. Furthermore, cooperative NOMA (CNOMA) with a decode-and-forward (DF) relaying scheme has been introduced in the literature to further enhance the performance of NOMA systems [14,15]. Cooperative NOMA leverages the proximity of near users to a base station (BS) to enhance the communication quality of cell edge users that are located further away. In this setup, the users closest to the BS act as relays for those situated further away. By doing so, cooperative NOMA can improve the overall reliability and capacity of the network [16]. The combination of cooperative relaying and NOMA is particularly effective because of the SIC technique. SIC allows for the near users to decode and remove the signals intended for the far users, as the information for the far users is already known to them. By leveraging this knowledge, cooperative NOMA can reduce interference and increase the data rate for all users.
On the other hand, device-to-device (D2D) communication can further improve the spectral efficiency (SE) and has already been used in NOMA settings [17,18,19]. Instead of utilizing a central BS, D2D communication enables devices to connect with one another directly. In areas where the BS’s signal is poor, D2D communication can improve coverage [20,21]. Moreover, D2D communication allows for devices to communicate with each other directly, which can reduce latency and power consumption compared to traditional cellular communication [22,23].
In [24], a D2D-aided transmission strategy utilizing uplink NOMA is proposed where two similar gain near users and a far user are served in a cooperative scenario where nearby users are able to communicate directly with the BS. In contrast, cell edge users far from the BS need the help of one of the nearby users to facilitate communication. A cooperative NOMA relaying strategy (NOMA-RS), where two sources communicate with their corresponding destinations in parallel over the same frequency band via a common relay, is proposed in [25]. In order to maximize the uplink energy efficiency and throughput, a joint sub-channel and power allocation algorithm based on Kuhn-Munkres (KM) technique for D2D communication in NOMA is considered in [26]. A strategy for the power allocation optimization by using the sub-gradient method in NOMA-enabled D2D communication is proposed in [27]. The authors formulated the optimization problem to maximize the sum data rate while adhering to the QoS requirements for cellular users and transmit power restrictions for D2D communication. To address the issue of maximizing network throughput in D2D Communications With NOMA, the authors in [28] have utilized a swarm intelligence approach called the Whale Optimization Algorithm (WOA). This approach investigates a joint resource allocation optimization problem involving user clustering, power control, and D2D mode selection. Similarly, to increase the total achievable rate, and cellular coverage, a power allocation strategy for NOMA-based D2D systems is introduced in [29]. Moreover, incorporating bidirectional communication in NOMA can further boost spectral efficiency [30]. A bidirectional D2D communication in cooperative uplink NOMA is explored in [31], where two far users can exchange D2D messages while sending their messages to the BS via a cooperative relaying node. A hybrid cellular and bidirectional D2D cooperative NOMA system, where two users require downlink signals from the BS for energy harvesting and data transmission while simultaneously exchanging information with each other, is investigated in [32]. While these research works have explored D2D-enabled NOMA communication, the effective integration of cooperative downlink NOMA and bidirectional D2D communication that can further boost the system’s capacity and energy efficiency remains relatively unexplored. Cooperative downlink NOMA and bidirectional D2D communications can enable a new range of applications and services, such as peer-to-peer content sharing, multiplayer gaming, etc.
On the basis of the existing research on NOMA-enabled D2D communications, there is a significant interest in developing schemes that can further boost the system’s capacity and energy efficiency. Motivated by the works in [24,25,31], we propose and investigate a bidirectional D2D transmission scheme that exploits cooperative downlink NOMA scheme (termed as BCD-NOMA). Unlike previous works, BCD-NOMA is designed for improved outage probability (OP) performance, high ergodic capacity (EC), and high energy efficiency by allowing two source nodes to share the same relaying node for data transmission to their corresponding destination nodes while also facilitating bidirectional D2D communications between them by exploiting downlink NOMA. The main contributions of this work are outlined as follows:
  • We investigate and propose a BCD-NOMA transmission strategy that uses cooperative downlink NOMA, allowing users to transmit data to the shared relay and D2D device in tandem and transfer their decoded signal at the relay in parallel as well to their respective destination nodes.
  • We derive the analytical expressions for the OP, EC, and ergodic sum capacity (ESC) under both perfect SIC (pSIC) and imperfect SIC (ipSIC) scenarios and verify them with the simulation results.
  • We verify the effectiveness of the BCD-NOMA scheme in terms of OP, ESC and average energy efficiency through simulations and mathematical analysis over schemes such as orthogonal multiple access (OMA), cooperative NOMA with OMA (CNOMA-OMA) and other conventional schemes.
The paper is structured as follows: Section 2 presents the proposed BCD-NOMA system and its corresponding channel model. In Section 3, the OP performance of the BCD-NOMA system is examined, including its analytical expressions. Section 4 focuses on the evaluation of the ergodic capacity and ergodic sum capacity of the proposed BCD-NOMA system, along with their corresponding analytical derivations. To support the performance evaluations, numerical results and discussions are presented in Section 5. These results demonstrate the effectiveness of the proposed BCD-NOMA system in enhancing ESC, average energy efficiency and improved OP performance. Finally, the conclusions drawn from the study are presented in Section 6, summarizing the main contributions of the research and highlighting potential areas for future work.

2. System Model

We consider a cooperative downlink NOMA scenario as shown in Figure 1, where two source-destination pairs, S 1 D 1 and S 2 D 2 , communicate through a shared relay node R. R is considered a single antenna half-duplex relay employing a DF strategy. Due to deep fading or blocking, there is no direct connection between the S 1 D 1 and S 2 D 2 links [18]. Thus, their data exchange relies on the relay node R. Further, to facilitate D2D bidirectional communications, the source nodes S 1 and S 2 communicate with each other by exchanging D2D messages. We have also assumed that channel state information (CSI) is perfectly known to the receivers and is in line with previous works such as [33,34]. The nodes are assumed to be equipped with a single antenna and operate in the half-duplex mode. The channel between any two nodes is subjected to the independent Rayleigh block fading plus additive white Gaussian noise. Furthermore, h 1 r C N ( 0 , λ 1 r ) is the complex channel coefficient between S 1 and R node with zero mean and variance λ 1 r . Similarly, h 2 r C N ( 0 , λ 2 r ) , h r 1 C N ( 0 , λ r 1 ) , and h r 2 C N ( 0 , λ r 2 ) are the complex channel coefficient for the links S 2 R , R D 1 , and R D 2 , respectively. In addition, h 12 C N ( 0 , λ h 12 ) is the complex channel coefficient between S 1 and S 2 nodes with zero mean and variance λ h 12 . The channel between S 1 and S 2 node is considered reciprocal. Therefore, h 12 h 21 . Furthermore, without the loss of generality, we consider that λ 12 > λ 1 r > λ 2 r and λ r 2 > λ r 1 . So, it is expected that | h 12 | 2 > | h 1 r | 2 > | h 2 r | 2 , and | h r 2 | 2 > | h r 1 | 2 . Though λ 12 > λ 1 r > λ 2 r and λ r 2 > λ r 1 may not guarantee | h 12 | 2 > | h 1 r | 2 > | h 2 r | 2 , and | h r 2 | 2 > | h r 1 | 2 , it is a simple but effective strategy to employ this assumption under statistical channel state information [35]. This is also in line with previous works such as [24,36]. As shown in Figure 1, the data transmission of the BCD-NOMA scheme is divided into three communication phases which are described below.

2.1. Phase-1 ( t 1 )

In this phase, S 1 transmits a composite NOMA signal x t 1 = a 1 P S 1 x S 1 + a 2 P S 1 x S 1 S 2 , where x S 1 is the downlink message, x S 1 S 2 is the D2D message, P S 1 is the transmit power of S 1 node, and a 1 , a 2 are the NOMA power allocation coefficients with a 1 > a 2 and a 1 + a 2 = 1 . Following downlink NOMA, the received signal-to-interference-plus-noise ratio (SINR) at S 2 node is given as:
γ S 2 S 1 R x S 1 = ρ a 1 | h 12 | 2 ρ a 2 | h 12 | 2 + 1 ,
γ S 2 S 1 S 2 S 1 S 2 = ρ a 2 | h 12 | 2 ρ a 1 | h 12 ^ | 2 + 1 ,
where ρ = P S 1 σ 2 , σ 2 denotes noise variance, and h 12 ^ C N ( 0 , ξ λ 12 ) , and the parameter ξ ( 0 ξ 1 ) denotes the level of residual interference because of SIC imperfection. In particular, ξ = 1 and ξ = 0 represent imperfect and perfect SIC cases, respectively.
The received SINR at R is given as:
γ R S 1 x S 1 = ρ a 1 | h 1 r | 2 ρ a 2 | h 1 r | 2 + 1 ,

2.2. Phase-2 ( t 2 )

In this phase, S 2 transmits a composite NOMA signal x t 2 = a 3 P S 2 x S 2 + a 4 P S 2 x S 2 S 1 , where x S 2 is the downlink message, x S 2 S 1 is the D2D message, P S 2 is the transmit power of S 2 node, respectively, and a 3 , a 4 are the NOMA power allocation coefficients with a 3 > a 4 and a 3 + a 4 = 1 . Following downlink NOMA, the received SINR at S 1 node can be given as:
γ S 1 S 2 R x S 2 = ρ a 3 | h 12 | 2 ρ a 4 | h 12 | 2 + 1 ,
γ S 1 S 2 S 1 S 2 S 1 = ρ a 4 | h 12 | 2 ρ a 3 | h 12 ^ | 2 + 1 ,
where ρ = P S 2 σ 2 .
The received SINR at R in this phase is given as:
γ R S 2 x S 2 = ρ a 3 | h 2 r | 2 ρ a 4 | h 2 r | 2 + 1 ,

2.3. Phase-3 ( t 3 )

In this phase, R transmits a composite NOMA signal x t 3 = b 1 P r x S 1 ^ + b 2 P r x S 2 ^ , where x S 1 ^ is the decoded downlink message of S 1 for the destination D 1 , x S 2 ^ is the decoded downlink message of S 2 for the destination D 2 , P r is the transmit power of the relay node R, and b 1 , b 2 are the NOMA power allocation coefficients with b 1 > b 2 and b 1 + b 2 = 1 . Again, following downlink NOMA, the received SINR at D 2 node can be given as:
γ D 2 S 1 x S 1 = ρ r b 1 | h r 2 | 2 ρ r b 2 | h r 2 | 2 + 1 ,
γ D 2 S 2 x S 2 = ρ r b 2 | h r 2 | 2 ρ r b 1 | h r 2 ^ | 2 + 1 ,
where ρ r = P r σ 2 , and h r 2 ^ C N ( 0 , ξ λ r 2 ) .
The received SINR at the D 1 node is given as:
γ D 1 S 1 x S 1 = ρ r b 1 | h r 1 | 2 ρ r b 2 | h r 1 | 2 + 1 ,

3. Outage Probability Analysis

The outage probability is defined as the probability that the end-to-end signal-to-noise ratio (SNR) at the destination falls below a given SNR threshold. This section presents the outage probability analysis for our BCD-NOMA system.

3.1. Outage Probability of S 1 Node Associated with the x S 1 Symbol

The S 1 node associated with the x S 1 symbol will be in an outage if any of the following conditions hold true:
  • S 2 cannot decode the symbol x S 1 in phase-1.
  • R cannot decode the symbol x S 1 in phase-1.
  • D 2 cannot decode the downlink message of S 1 transmitted from R in phase-3.
  • D 1 cannot decode the downlink message of S 1 transmitted from R in phase-3.
The above conditions for the outage probability of S 1 node associated with the x S 1 symbol can be expressed as:
P S 1 o u t = 1 ( Pr ( γ S 2 S 1 R x S 1 γ S 1 T ) Pr ( γ R S 1 x S 1 γ S 1 T ) Pr ( γ D 2 S 1 x S 1 γ S 1 T ) Pr ( γ D 1 S 1 x S 1 γ S 1 T ) )
where γ i T , = 2 3 R i 1 is the lower SINR threshold value, i.e., the outage probability, i { S 1 , S 2 , S 1 S 2 , S 2 S 1 } with R i denoting the target data rate of the users.
Let, | h 12 | 2 = Z 1 , | h 1 r | 2 = X 1 , | h r 2 | 2 = Y 2 and | h r 1 | 2 = Y 1 .
Substituting these in Equation (10), we obtain
P S 1 o u t = 1 ( Pr Z 1 γ S 1 T ρ ( a 1 γ S 1 T a 2 ) Pr X 1 γ S 1 T ρ ( a 1 γ S 1 T a 2 ) Pr Y 2 γ S 1 T ρ r ( b 1 γ S 1 T b 2 ) Pr Y 1 γ S 1 T ρ r ( b 1 γ S 1 T b 2 ) ) P S 1 o u t = 1 e λ 12 γ S 1 T ρ ( a 1 γ S 1 T a 2 ) e λ 1 r γ S 1 T ρ ( a 1 γ S 1 T a 2 ) e λ r 2 γ S 1 T ρ r ( b 1 γ S 1 T b 2 ) e λ r 1 γ S 1 T ρ r ( b 1 γ S 1 T b 2 )
After rearranging the terms, the closed-form analytical expression for the outage probability of S 1 node associated with the x S 1 symbol can be expressed as:
P S 1 o u t A n a = 1 e ( λ 12 + λ 1 r ) γ S 1 T ρ ( a 1 γ S 1 T a 2 ) e ( λ r 2 + λ r 1 ) γ S 1 T ρ ( b 1 γ S 1 T b 2 )
As it can be seen in Equation (11), it does not contain any ξ term. Therefore, the outage probability of S 1 node associated with symbol x 1 is not affected by ipSIC.

3.2. Outage Probability of S 2 Node Associated with the x S 2 Symbol

The S 2 node associated with the x S 2 symbol will be in an outage if any of the following conditions hold true:
  • S 1 cannot decode the symbol x S 2 in phase-2.
  • R cannot decode the symbol x S 2 in phase-2.
  • D 2 cannot decode the downlink message of S 2 transmitted from R in phase-3.
The above conditions for the outage probability of S 2 node associated with the x S 2 symbol can be expressed as:
P S 2 o u t = 1 Pr ( γ S 1 S 2 R x S 2 γ S 2 T ) Pr ( γ R S 2 x S 2 γ S 2 T ) Pr ( γ D 2 S 2 x S 2 γ S 2 T )
Let, | h 12 | 2 = Z 1 , | h 2 r | 2 = X 2 , and | h r 2 | 2 = Y 2 .
Substituting these in Equation (12), we obtain
P S 2 o u t = 1 Pr ( Z 1 γ S 2 T ρ ( a 3 γ S 2 T a 4 ) ) Pr ( X 2 γ S 2 T ρ ( a 3 γ S 2 T a 4 ) ) Pr ( Y 2 γ S 2 T ρ r ( b 2 γ S 2 T ξ b 1 ) )
P S 2 o u t = 1 e λ 12 γ S 2 T ρ ( a 3 γ S 2 T a 4 ) e λ 2 r γ S 2 T ρ ( a 3 γ S 2 T a 4 ) e λ r 2 γ S 2 T ρ r ( b 2 γ S 2 T ξ b 1 )
After rearranging the terms, the closed-form analytical expression for the outage probability of S 2 node associated with the x S 2 symbol can be expressed as:
P S 2 o u t A n a = 1 e ( λ 12 + λ 2 r ) γ S 2 T ρ ( a 3 γ S 2 T a 4 ) e λ r 2 γ S 2 T ρ r ( b 2 γ S 2 T ξ b 1 )

3.3. Outage Probability of S 1 D2D Message Associated with the x S 1 S 2 Symbol

The S 1 D2D message associated with the x S 1 S 2 symbol will be in an outage if the S 2 node cannot decode it during phase-1. Therefore, the outage probability of S 1 D2D message associated with the x S 1 S 2 symbol can be expressed as:
P D 2 D , S 1 S 2 o u t = 1 Pr γ S 2 S 1 S 2 S 1 S 2 γ S 1 S 2 T
Let, | h 12 | 2 = Z 1 . Substituting this in Equation (14), we obtain
P D 2 D , S 1 S 2 o u t = 1 Pr ρ a 2 Z 1 ρ a 1 ξ Z 1 + 1 γ S 1 S 2 T
P D 2 D , S 1 S 2 o u t = 1 Pr ( Z 1 γ S 1 S 2 T ρ ( a 2 γ S 1 S 2 T ξ a 1 ) )
Therefore, the closed-form analytical expression for the outage probability of of S 1 D2D message associated with the x S 1 S 2 symbol can be expressed as:
P D 2 D , S 1 S 2 o u t A n a = 1 e λ 12 γ S 1 S 2 T ρ ( a 2 γ S 1 S 2 T ξ a 1 )

3.4. Outage Probability of S 2 D2D Message Associated with the x S 2 S 1 Symbol

The S 2 D2D message associated with the x S 2 S 1 symbol will be in an outage if the S 1 node cannot decode it during phase-2. Therefore, the outage probability of S 2 D2D message associated with the x S 2 S 1 symbol can be expressed as:
P D 2 D , S 2 S 1 o u t = 1 Pr ( γ S 1 S 2 S 1 S 2 S 1 γ S 2 S 1 T )
Let, | h 12 | 2 = Z 1 . Substituting this in Equation (16), we obtain
P D 2 D , S 2 S 1 o u t = 1 Pr ρ a 4 Z 1 ρ a 3 ξ Z 1 + 1 γ S 2 S 1 T
P D 2 D , S 2 S 1 o u t = 1 Pr Z 1 γ S 2 S 1 T ρ ( a 4 γ S 2 S 1 T ξ a 3 )
Therefore, the closed-form analytical expression for the outage probability of S 2 D2D message associated with the x S 2 S 1 symbol can be expressed as:
P D 2 D , S 2 S 1 o u t A n a = 1 e λ 12 γ S 2 S 1 T ρ ( a 4 γ S 2 S 1 T ξ a 3 )

4. Ergodic Capacity Analysis

In this section, we will analyze the achievable data rate of each of the nodes and the achievable sum rate of the proposed BCD-NOMA system.

4.1. Achievable Rate of S 1 Node Associated with the x S 1 Symbol

According to our system model, the achievable capacity for the S 1 node associated with the x S 1 symbol is given by:
C x 1 = E 1 3 log 2 1 + min γ S 2 S 1 R x S 1 , γ R S 1 x S 1 , γ D 2 S 1 x S 1 , γ D 1 S 1 x S 1
where E [·] denotes the statistical expectation operator, and the factor 1 3 represents that three transmission phases are involved in the BCD-NOMA system.
Theorem 1. 
The closed-form analytical expression for the achievable capacity for the S 1 node associated with the x S 1 symbol can be expressed as:
C x 1 A n a = 1 3 ln 2 e K + D a 1 + a 2 E 1 K + D a 1 + a 2 e K + D a 2 E 1 K + D a 2
where K = ( λ 12 + λ 1 r ) ρ , and D = ( λ r 1 + λ r 2 ) ρ r and E 1 ( · ) is exponential integral of order 1.
Proof. 
Let γ = min γ S 2 S 1 R x S 1 , γ R S 1 x S 1 , γ D 2 S 1 x S 1 , γ D 1 S 1 x S 1 .
The cumulative distributive function (CDF) of γ can be given as:
F γ ( γ ) = 1 e ( λ 12 + λ 1 r ) γ ρ ( a 1 γ a 2 ) e ( λ r 2 + λ r 1 ) γ ρ r ( b 1 γ b 2 )
By using x = 0 log 2 ( 1 + x ) f X ( x ) d x = 1 ln 2 x = 0 1 F X ( x ) 1 + x d x , the analytical expression for EC of S 1 node, i.e., C x 1 A n a can be computed as:
C x 1 A n a = 1 3 ln 2 γ = 0 1 1 + γ e ( λ 12 + λ 1 r ) γ ρ ( a 1 γ a 2 ) e ( λ r 2 + λ r 1 ) γ ρ r ( b 1 γ b 2 ) d γ
Now, for mathematical tractability, we assume that a 1 = b 1 and a 2 = b 2 . Other than this, for different cases, the proof remains the same as of Theorem 2 and can be derived by following the similar steps as in the proof of Theorem 2.
Therefore, the above expression becomes:
C x 1 A n a = 1 3 ln 2 γ = 0 a 1 a 2 e ( K + D ) γ ( a 1 γ a 2 ) 1 + γ d γ
where K = ( λ 12 + λ 1 r ) ρ , and D = ( λ r 1 + λ r 2 ) ρ r .
Now, by changing variable x = γ a 1 γ a 2 and applying partial fraction decomposition, we obtain
C x 1 A n a = 1 3 ln 2 x = 0 ( a 1 + a 2 ) ( 1 + ( a 1 + a 2 ) x e ( K + D ) x d x x = 0 a 2 ( 1 + a 2 x ) e ( K + D ) x d x
The above integrals can be easily expressed in terms of the exponential integral function E 1 ( x ) by:
C x 1 A n a = 1 3 ln 2 e K + D a 1 + a 2 E 1 K + D a 1 + a 2 e K + D a 2 E 1 K + D a 2
This completes the proof of Theorem 1. □
As it can be seen in Equation (19), it does not contain any ξ term. Therefore, the EC of S 1 node associated with symbol x 1 is not affected by ipSIC.

4.2. Achievable Rate of S 2 Node Associated with the x S 2 Symbol

Similarly, the achievable capacity for the S 2 node associated with the x S 2 symbol is given by:
C x 2 = E 1 3 log 2 1 + min γ S 1 S 2 R x S 2 , γ R S 2 x S 2 , γ D 2 S 2 x S 2
Theorem 2. 
The closed-form analytical expression for the achievable capacity for the S 2 node associated with the x S 2 symbol can be expressed as:
C x 2 A n a = when a 3 a 4 < b 2 ξ b 1 , e L b 2 M a 3 a 4 b 2 a 3 ξ b 1 3 ln 2 J b 2 ( a 3 + a 4 ) a 3 ( b 2 + ξ b 1 ) , M a 3 a 4 b 2 a 3 ξ b 1 , L b 2 a 4 b 2 a 3 ξ b 1 J b 2 a 4 ξ b 1 a 3 , M a 3 a 4 b 2 a 3 ξ b 1 , L b 2 a 4 b 2 a 3 ξ b 1 , when a 3 a 4 > b 2 ξ b 1 , e L b 2 M a 3 a 4 b 2 a 3 ξ b 1 3 ln 2 J a 3 ( ξ b 1 + b 2 ) b 2 ( a 3 + a 4 ) , L b 2 ξ b 1 a 3 b 2 a 4 , M a 3 ξ b 1 a 3 b 2 a 4 J a 3 ξ b 1 a 4 b 2 , L b 2 ξ b 1 a 3 b 2 a 4 , M a 3 ξ b 1 a 3 b 2 a 4 , when a 3 a 4 = b 2 ξ b 1 , 1 3 ln 2 e L b 2 + M a 3 ( a 3 + a 4 ) b 2 E 1 L b 2 + M a 3 ( a 3 + a 4 ) b 2 e L b 2 + M a 3 a 4 b 2 E 1 L b 2 + M a 3 a 4 b 2
where L = ( λ 12 + λ 2 r ) ρ , M = λ r 2 ρ r and J ( a , b , c ) = e ( c a a b ) E 1 ( ( a 1 ) c a ) i = 1 1 a i 1 E i ( c ) ( e a b k = 0 i 1 ( a b ) k k ! ) .
Proof. 
Let Z = min ( γ S 1 S 2 R x S 2 , γ R S 2 x S 2 , γ D 2 S 2 x S 2 ) .
The CDF of Z can be given as:
F Z ( z ) = 1 e ( λ 12 + λ 2 r ) z ρ ( a 3 z a 4 ) e λ r 2 z ρ r ( b 2 z ξ b 1 )
By using x = 0 log 2 ( 1 + x ) f X ( x ) d x = 1 ln 2 x = 0 1 F X ( x ) 1 + x d x ,
The analytical expression for EC of S 2 node associated with symbol x 2 , i.e., C x 2 A n a can be computed as:
C x 2 A n a = 1 3 ln 2 z = 0 1 1 + z e ( λ 12 + λ 2 r ) z ρ ( a 3 z a 4 ) e λ r 2 z ρ r ( b 2 z ξ b 1 ) d z
In the above equation, z should be less than min ( a 3 a 4 , b 2 ξ b 1 ) .
Therefore, we now evaluate the above expression in three different cases, as explained below.
Case 1: When a 3 a 4 < b 2 ξ b 1 , the above C x 2 A n a expression in Equation (22) becomes:
C x 2 A n a = 1 3 ln 2 z = 0 a 3 a 4 1 1 + z e ( λ 12 + λ 2 r ) z ρ ( a 3 z a 4 ) e λ r 2 z ρ r ( b 2 z ξ b 1 ) d z
Now, by changing variable x = z a 3 z a 4 and applying partial fraction decomposition, we obtain
C x 2 A n a = 1 3 ln 2 x = 0 ( a 3 + a 4 ) ( 1 + ( a 3 + a 4 ) x ) e L x M a 3 x b 2 + ( a 4 b 2 a 3 ξ b 1 ) x d x x = 0 a 4 ( 1 + a 4 x ) e L x M a 3 x b 2 + ( a 4 b 2 a 3 ξ b 1 ) x d x
where L = ( λ 12 + λ 2 r ) ρ and M = λ r 2 ρ r .
Now, we make substitution u = 1 + ( a 4 b 2 a 3 ξ b 1 ) x b 2 and transforming the integrals to:
C x 2 A n a = e L b 2 M a 3 a 4 b 2 a 3 ξ b 1 3 ln 2 u = 1 b 2 ( a 3 + a 4 ) a 3 ( b 2 + ξ b 1 ) 1 b 2 ( a 3 + a 4 ) a 3 ( b 2 + ξ b 1 ) u e M a 3 ( a 4 b 2 a 3 ξ b 1 ) u L b 2 u a 4 b 2 a 3 ξ b 1 d u u = 1 b 2 a 4 ξ b 1 a 3 1 b 2 a 4 ξ b 1 a 3 u e M a 3 ( a 4 b 2 a 3 ξ b 1 ) u L b 2 u a 4 b 2 a 3 ξ b 1 d u
We can express the above integral in the form J ( a , b , c ) = y = 1 a e b y c y 1 a y d y .
Hence,
C x 2 A n a = e L b 2 M a 3 a 4 b 2 a 3 ξ b 1 3 ln 2 ( J b 2 ( a 3 + a 4 ) a 3 ( b 2 + ξ b 1 ) , M a 3 a 4 b 2 a 3 ξ b 1 , L b 2 a 4 b 2 a 3 ξ b 1 J b 2 a 4 ξ b 1 a 3 , M a 3 a 4 b 2 a 3 ξ b 1 , L b 2 a 4 b 2 a 3 ξ b 1 )
Now, after some algebraic manipulation J ( a , b , c ) can be easily expressed as: J ( a , b , c ) = e ( c a a b ) E 1 ( ( a 1 ) c a ) i = 1 1 a i 1 E i ( c ) ( e a b k = 0 i 1 ( a b ) k k ! ) .
Substituting the expression for J ( a , b , c ) in Equation (22), gives the analytical expression for C x 2 A n a for Case 1.
Case 2: When a 3 a 4 > b 2 ξ b 1 , the expression in Equation (22) becomes:
C x 2 A n a = 1 3 ln 2 z = 0 b 2 ξ b 1 1 1 + z e ( λ 12 + λ 2 r ) z ρ ( a 3 z a 4 ) e λ r 2 z ρ r ( b 2 z ξ b 1 ) d z
Following the similar steps as in Case 1, the analytical expression for C x 2 A n a for Case 2 can be given as:
C x 2 A n a = e L b 2 M a 3 a 4 b 2 a 3 ξ b 1 3 ln 2 J a 3 ( ξ b 1 + b 2 ) b 2 ( a 3 + a 4 ) , L b 2 ξ b 1 a 3 b 2 a 4 , M a 3 ξ b 1 a 3 b 2 a 4 J a 3 ξ b 1 a 4 b 2 , L b 2 ξ b 1 a 3 b 2 a 4 , M a 3 ξ b 1 a 3 b 2 a 4
Case 3: When a 3 a 4 = b 2 ξ b 1 , the expression in Equation (22) can be easily expressed in terms of the exponential integral as:
C x 2 A n a = 1 3 ln 2 e L b 2 + M a 3 ( a 3 + a 4 ) b 2 E 1 L b 2 + M a 3 ( a 3 + a 4 ) b 2 e L b 2 + M a 3 a 4 b 2 E 1 L b 2 + M a 3 a 4 b 2
This completes the proof of Theorem 2. □
Since the analytical expression for C x 2 A n a , as shown in Cases 1 and 2, contains an infinite summation term in J ( a , b , c ) . We now provide the convergence analysis of the infinite summation term in J ( a , b , c ) .
Since, J ( a , b , c ) = e ( c a a b ) E 1 ( ( a 1 ) c a ) i = 1 1 a i 1 E i ( c ) ( e a b k = 0 i 1 ( a b ) k k ! ) , we first define the truncated exponential sum S i ( x ) = k = i x k k ! .
Now, J ( a , b , c ) can be further expressed as:
J ( a , b , c ) = e ( c a a b ) E 1 ( ( a 1 ) c a ) i = 1 E i ( c ) a i 1 S i ( a b ) A 1 .
We have to show that the above infinite summation term A 1 in J ( a , b , c ) converges.
Now, A 1 = i = 1 E i ( c ) a i 1 S i ( a b ) = e a b E 1 ( c ) + i = 2 E i ( c ) a i 1 S i ( a b ) .
Since we have S i ( a b ) e a b and E i ( c ) E i ( c = 0 ) = 1 i 1 .
This implies that E i ( c ) a i 1 S i ( a b ) e a b ( i 1 ) a i 1 e a b a i 1 for i 2 , and it follows that the series A 1 is convergent since the series i = 2 e a b a i 1 is convergent for a > 1 .
We now also derive the analytical expression for C x 2 A n a at a high SNR region.
At high SNR, it holds that Z min ( a 3 a 4 , γ D 2 S 2 x S 2 ) .
Therefore following [37], C x 2 A n a , ρ at high SNR can be approximated as:
C x 2 A n a , ρ γ = 0 a 3 a 4 e λ r 2 γ ρ r ( b 2 γ ξ b 1 ) 1 + γ d γ
Now, by changing variable x = γ b 2 γ ξ b 1 , applying partial fraction decomposition, and transforming the integrals in exponential form, we finally obtain:
C x 2 A n a , ρ 1 3 ln 2 ( e P ( E 1 ( P ) E 1 ( Q ) ) e R ( E 1 ( R ) E 1 ( S ) ) )
where P = λ r 2 ρ r ( b 2 + ξ b 1 ) , Q = λ r 2 ρ r 1 ( b 2 + ξ b 1 ) + a 3 ( a 4 b 2 a 3 ξ b 1 ) , R = λ r 2 ρ r ξ b 1 , and S = λ r 2 ρ r 1 ξ b 1 + a 3 ( a 4 b 2 a 3 ξ b 1 ) .

4.3. Achievable Rate of S 1 D2D Message Associated with the x S 1 S 2 Symbol

The achievable capacity for the S 1 D2D message associated with symbol x S 1 S 2 is given as:
C D 2 D x S 1 S 2 = E 1 3 log 2 1 + γ S 2 S 1 S 2 S 1 S 2
Theorem 3. 
The closed-form analytical expression for the achievable capacity S 1 D2D message associated with the x S 1 S 2 symbol can be expressed as:
C D 2 D x S 1 S 2 A n a = 1 3 ln 2 e λ 12 ρ ( a 2 + ξ a 1 ) E 1 λ 12 ρ ( a 2 + ξ a 1 ) e λ 12 ρ ξ a 1 E 1 λ 12 ρ ξ a 1
Proof. 
Let γ = γ S 2 S 1 S 2 S 1 S 2 .
The CDF of γ = γ S 2 S 1 S 2 S 1 S 2 can be expressed as:
F γ ( γ ) = 1 e λ 12 γ ρ ( a 2 γ ξ a 1 ) .
By using x = 0 log 2 ( 1 + x ) f X ( x ) d x = 1 ln 2 x = 0 1 F X ( x ) 1 + x d x , the analytical expression for EC of S 1 D2D message associated with symbol x S 1 S 2 , i.e., C D 2 D x S 1 S 2 A n a can be computed as:
C D 2 D x S 1 S 2 A n a = 1 3 ln 2 γ = 0 1 1 + γ e λ 12 γ ρ ( a 2 γ ξ a 1 ) d γ
Let, x = γ ( a 2 γ ξ a 1 ) γ = a 2 x 1 + ξ a 1 x d γ = a 2 ( 1 + ξ a 1 x ) 2 d x
C D 2 D x S 1 S 2 A n a = 1 3 ln 2 x = 0 e λ 12 x ρ 1 + ( a 2 + ξ a 1 ) x a 2 ( 1 + ξ a 1 x ) d x
Now, applying partial fraction decomposition, we obtain
C D 2 D x S 1 S 2 A n a = ( ξ a 1 + a 2 ) 3 ln 2 x = 0 e λ 12 x ρ 1 + ( a 2 + ξ a 1 ) x d x I 1 ( ξ a 1 ) 3 ln 2 x = 0 e λ 12 x ρ ( 1 + ξ a 1 x ) d x I 2
After some straightforward algebraic manipulation, I 1 can be expressed as:
I 1 = e λ 12 ρ ( a 2 + ξ a 1 ) ( a 2 + ξ a 1 ) E 1 λ 12 ρ ( a 2 + ξ a 1 ) .
Similarly, I 2 can be expressed as: I 2 = e λ 12 ρ ξ a 1 ξ a 1 E 1 λ 12 ρ ξ a 1 .
Substituting the value for I 1 and I 2 , gives the final analytical expression for C D 2 D x S 1 S 2 A n a as:
C D 2 D x S 1 S 2 A n a = 1 3 ln 2 e λ 12 ρ ( a 2 + ξ a 1 ) E 1 λ 12 ρ ( a 2 + ξ a 1 ) e λ 12 ρ ξ a 1 E 1 λ 12 ρ ξ a 1
This completes the proof of Theorem 3. □

4.4. Achievable Rate of S 2 D2D Message Associated with the x S 2 S 1 Symbol

Finally, the achievable capacity for the S 2 D2D message associated with symbol x S 2 S 1 is given as:
C D 2 D x S 2 S 1 = E 1 3 log 2 1 + γ S 1 S 2 S 1 S 2 S 1
Theorem 4. 
The closed-form analytical expression for the achievable capacity S 2 D2D message associated with the x S 2 S 1 symbol can be expressed as:
C D 2 D x S 2 S 1 A n a = 1 3 ln 2 e λ 12 ρ ( a 4 + ξ a 3 ) E 1 λ 12 ρ ( a 4 + ξ a 3 ) e λ 12 ρ ξ a 3 E 1 λ 12 ρ ξ a 3
Proof. 
Following the similar steps as for the analytical derivation of C D 2 D x S 1 S 2 A n a in Theorem 3, the final analytical expression for C D 2 D x S 2 S 1 A n a can be derived as in Equation (29). □

4.5. ESC of the BCD-NOMA System

The ESC of the BCD-NOMA system is given by:
C S y s = C x 1 + C x 2 + C D 2 D x S 1 S 2 + C D 2 D x S 2 S 1 = ( 18 ) + ( 20 ) + ( 26 ) + ( 28 )
Combining Equations (19), (21), (27) and (29) gives the analytical expression for the ESC of the BCD-NOMA system.
Furthermore, we may find an approximation for high SNR by expanding both e x and E 1 ( x ) to the first order, i.e., by taking e x 1 + x and E 1 ( x ) γ ln ( x ) + x . For C x 2 approximation, we also used the high SNR approximation as shown in Equation (25).

5. Results and Discussions

For simplicity, we consider the normalized distances of the nodes and the relay node as in [31], i.e., d S 1 R = 0.25 , d S 2 R = 0.50 , d R D 1 = 0.50 , d R D 2 = 0.25 and d S 1 S 2 = 0.20 . Furthermore, path loss exponent vs. is set to 4, ρ = ρ r and fixed NOMA power allocation method is used [25], i.e., a 1 = 0.7 , a 2 = 0.3 , a 3 = 0.8 , a 4 = 0.2 , b 1 = 0.7 , and b 2 = 0.3 . We average over 10 6 randomly generated Rayleigh block fading channels in MATLAB to run the Monte-Carlo simulation and obtain the simulation results. The list of simulation parameters are given in Table 1.
OMA, hybrid CNOMA-OMA and NOMA relaying scheme (NOMA-RS) of Ref. [25] are used as benchmarks to show the performance gain of the proposed BCD-NOMA scheme. Six time slots are required to complete the data transmission in the OMA scheme. In the hybrid CNOMA-OMA scheme, four time slots are required, i.e., S 1 and S 2 utilize uplink NOMA in the first time slot to send their data to the relay node, and the relay node transmits the data to the destination nodes utilizing downlink NOMA in the second time slot. Two time slots are required by S 1 and S 2 for their D2D message transmission, which is accomplished by using OMA. NOMA-RS scheme of Ref. [25] utilizes two time slots without D2D data transmission.
In Figure 2 and Figure 3, we examine the OP performance of our proposed BCD-NOMA system and compare it with the benchmarks. Specifically, in Figure 2, we plot the OP of each of the symbols, i.e., x S 1 , x S 2 , x S 1 S 2 , x S 2 S 1 and the OP of the BCD-NOMA system under pSIC and ipSIC. We observe that the x S 2 symbol has the worst outage performance, and x S 1 S 2 has the best outage performance compared to other symbols in the BCD-NOMA system. Moreover, ipSIC also tends to increase the outage probability in the BCD-NOMA system, as indicated in Figure 2. To further gain insight into the OP performance, we compare the OP performance of the BCD-NOMA with different benchmarks, as shown in Figure 3. We observe that the OP performance of the BCD-NOMA system under pSIC is better than the CNOMA-OMA scheme and shows a comparable OP performance to the CNOMA-OMA scheme under ipSIC, especially at a transmitting SNR higher than 10 dB. In addition, the OP performance of BCD-NOMA under pSIC is better than the NOMA-RS scheme of Ref. [25], especially at a transmitting SNR greater than 15 dB. The NOMA-RS scheme shows a better OP than the BCD-NOMA at a transmitting SNR less than 15 dB. The reason is that in the NOMA-RS scheme, no D2D communication is considered. Therefore, a better outage performance is expected for the NOMA-RS scheme even under the ipSIC case, as clearly depicted in Figure 2. Moreover, the OMA scheme shows improved outage performance compared to our BCD-NOMA scheme, which is due to the fact that in the OMA scheme, the nodes transmit at full power, which further improves its OP performance compared to our BCD-NOMA scheme. However, this can be compensated with the increased ESC and energy efficiency performance as indicated in Figure 4 and Figure 5, respectively. Additionally, there is a close match between the analytical and simulation results, demonstrating the integrity of the analytical expressions we deduced.
In Figure 4, we compare the ESC of the BCD-NOMA scheme with the benchmark schemes. We observe that the ESC performance of the BCD-NOMA scheme, especially for the pSIC case, outperforms all the benchmark schemes against all transmit SNR ρ values. The ESC performance gain between pSIC and ipSIC depends on the level of residual interference. It can be clearly observed at medium to high ρ values. Moreover, at higher ρ values, the hybrid CNOMA-OMA scheme has almost comparable ESC performance with the BCD-NOMA scheme. This is because in a hybrid CNOMA-OMA scheme, the D2D nodes, i.e., S 1 and S 2 , transmit at full transmit power in the last two time slots, thereby increasing their overall ESC performance at high ρ values. In addition, a close match between the analytical and simulation results is observed in Figure 4, which indicates that our derived analytical expressions for the BCD-NOMA scheme are intact.
Energy efficiency (EE) is an important metric to check the performance of next-generation wireless systems. The EE metric is defined as the ratio of the total data rate of the system over the total energy consumed by the system [38]. In Figure 5, we compare the average EE of the BCD-NOMA scheme against all the benchmark schemes. We notice that our proposed BCD-NOMA scheme is more energy-efficient compared to all other schemes. Moreover, we can also observe that ipSIC tends to lower the EE performance and thus significantly impacts the ESC performance. Therefore, more intelligent SIC techniques can further enhance the ESC and EE performance of the proposed BCD-NOMA system.

6. Conclusions and Future Works

We proposed and investigated a BCD-NOMA scheme that exploits cooperative downlink NOMA in D2D communications. One of the key advantages of BCD-NOMA over previous works is that it enables bidirectional D2D communications by utilizing downlink NOMA while also allowing two sources to utilize a single relaying node for data transmission to their destination nodes and thereby increasing its overall outage probability, ESC and EE performance. We derived the analytical expressions for the OP and ESC under both pSIC and ipSIC scenarios and verified them with the simulation results. Comprehensive results verified the effectiveness of the BCD-NOMA scheme in terms of OP, ESC and average EE through simulations and mathematical analysis over schemes such as OMA, hybrid CNOMA-OMA and other conventional schemes.
The performance of the BCD-NOMA system can be further enhanced through the dynamic power allocation scheme. In future, we plan to explore the game theoretical approach and artificial intelligence-based solutions to devise an efficient power allocation scheme for the proposed BCD-NOMA system.

Author Contributions

A.R., O.N.Ø., J.E.H. and P.E. conceived the idea; A.R. designed the experiments, performed the simulation experiments and analyzed the data; A.R., O.N.Ø., J.E.H. and P.E. contributed to developing mathematical analysis part; A.R. wrote the paper; O.N.Ø., J.E.H. and P.E. critically reviewed the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This research work was supported by the COPS (Comprehensive Privacy and Security for Resilient CPS/IoT) project funded by the Research Council of Norway under project number 300102.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Jiang, W.; Han, B.; Habibi, M.A.; Schotten, H.D. The road towards 6G: A comprehensive survey. IEEE Open J. Commun. Soc. 2021, 2, 334–366. [Google Scholar] [CrossRef]
  2. Ni, W.; Liu, Y.; Eldar, Y.C.; Yang, Z.; Tian, H. STAR-RIS Integrated Nonorthogonal Multiple Access and Over-the-Air Federated Learning: Framework, Analysis, and Optimization. IEEE Internet Things J. 2022, 9, 17136–17156. [Google Scholar] [CrossRef]
  3. Li, K.; Cui, Y.; Li, W.; Lv, T.; Yuan, X.; Li, S.; Ni, W.; Simsek, M.; Dressler, F. When Internet of Things meets Metaverse: Convergence of Physical and Cyber Worlds. arXiv 2022, arXiv:2208.13501. [Google Scholar] [CrossRef]
  4. Liu, Y.; Zhang, S.; Mu, X.; Ding, Z.; Schober, R.; Al-Dhahir, N.; Hossain, E.; Shen, X. Evolution of NOMA toward next generation multiple access (NGMA) for 6G. IEEE J. Sel. Areas Commun. 2022, 40, 1037–1071. [Google Scholar] [CrossRef]
  5. Xiao, C.; Zeng, J.; Ni, W.; Su, X.; Liu, R.P.; Lv, T.; Wang, J. Downlink MIMO-NOMA for ultra-reliable low-latency communications. IEEE J. Sel. Areas Commun. 2019, 37, 780–794. [Google Scholar] [CrossRef]
  6. Sun, Y.; Guo, Y.; Li, S.; Wu, D.; Wang, B. Optimal resource allocation for NOMA-TDMA scheme with α-fairness in industrial internet of things. Sensors 2018, 18, 1572. [Google Scholar] [CrossRef] [Green Version]
  7. Wei, X.; Al-Obiedollah, H.; Cumanan, K.; Zhang, M.; Tang, J.; Wang, W.; Dobre, O.A. Resource allocation technique for hybrid TDMA-NOMA system with opportunistic time assignment. In Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops), Dublin, Ireland, 7–11 June 2020; IEEE: New York, NY, USA, 2020; pp. 1–6. [Google Scholar]
  8. Choi, J. On the power allocation for a practical multiuser superposition scheme in NOMA systems. IEEE Commun. Lett. 2016, 20, 438–441. [Google Scholar] [CrossRef]
  9. Sarieddeen, H.; Abdallah, A.; Mansour, M.M.; Alouini, M.S.; Al-Naffouri, T.Y. Terahertz-band MIMO-NOMA: Adaptive superposition coding and subspace detection. IEEE Open J. Commun. Soc. 2021, 2, 2628–2644. [Google Scholar] [CrossRef]
  10. Rauniyar, A.; Engelstad, P.; Østerbø, O.N. RF energy harvesting and information transmission based on NOMA for wireless powered IoT relay systems. Sensors 2018, 18, 3254. [Google Scholar] [CrossRef] [Green Version]
  11. Liu, Y.; Yi, W.; Ding, Z.; Liu, X.; Dobre, O.A.; Al-Dhahir, N. Developing NOMA to next generation multiple access (NGMA): Future vision and research opportunities. IEEE Wirel. Commun. 2022, 29, 120–127. [Google Scholar] [CrossRef]
  12. Xia, B.; Wang, J.; Xiao, K.; Gao, Y.; Yao, Y.; Ma, S. Outage performance analysis for the advanced SIC receiver in wireless NOMA systems. IEEE Trans. Veh. Technol. 2018, 67, 6711–6715. [Google Scholar] [CrossRef]
  13. Zhang, H.; Fang, F.; Cheng, J.; Long, K.; Wang, W.; Leung, V.C. Energy-efficient resource allocation in NOMA heterogeneous networks. IEEE Wirel. Commun. 2018, 25, 48–53. [Google Scholar] [CrossRef] [Green Version]
  14. Rauniyar, A.; Østerbø, O.N.; Håkegård, J.E.; Engelstad, P.E. Secrecy Performance Analysis of Cooperative Nonorthogonal Multiple Access in IoT Networks. IEEE Sensors J. 2022, 22, 19030–19045. [Google Scholar] [CrossRef]
  15. Liu, H.; Ding, Z.; Kim, K.J.; Kwak, K.S.; Poor, H.V. Decode-and-forward relaying for cooperative NOMA systems with direct links. IEEE Trans. Wirel. Commun. 2018, 17, 8077–8093. [Google Scholar] [CrossRef] [Green Version]
  16. Zeng, M.; Hao, W.; Dobre, O.A.; Ding, Z. Cooperative NOMA: State of the art, key techniques, and open challenges. IEEE Netw. 2020, 34, 205–211. [Google Scholar] [CrossRef]
  17. Kim, J.B.; Lee, I.H.; Lee, J. Capacity scaling for D2D aided cooperative relaying systems using NOMA. IEEE Wirel. Commun. Lett. 2017, 7, 42–45. [Google Scholar] [CrossRef]
  18. Zou, L.; Chen, J.; Lv, L.; He, B. Capacity enhancement of D2D aided coordinated direct and relay transmission using NOMA. IEEE Commun. Lett. 2020, 24, 2128–2132. [Google Scholar] [CrossRef]
  19. Kai, C.; Wu, Y.; Peng, M.; Huang, W. Joint uplink and downlink resource allocation for NOMA-enabled D2D communications. IEEE Wirel. Commun. Lett. 2021, 10, 1247–1251. [Google Scholar] [CrossRef]
  20. Xu, Y.; Wang, G.; Li, B.; Jia, S. Performance of D2D aided uplink coordinated direct and relay transmission using NOMA. IEEE Access 2019, 7, 151090–151102. [Google Scholar] [CrossRef]
  21. Budhiraja, I.; Kumar, N.; Tyagi, S.; Tanwar, S.; Guizani, M. SWIPT-enabled D2D communication underlaying NOMA-based cellular networks in imperfect CSI. IEEE Trans. Veh. Technol. 2021, 70, 692–699. [Google Scholar] [CrossRef]
  22. Cheng, Y.; Liang, C.; Chen, Q.; Yu, F.R. Energy-efficient D2D-assisted computation offloading in NOMA-enabled cognitive networks. IEEE Trans. Veh. Technol. 2021, 70, 13441–13446. [Google Scholar] [CrossRef]
  23. Budhiraja, I.; Tyagi, S.; Tanwar, S.; Kumar, N.; Rodrigues, J.J. DIYA: Tactile internet driven delay assessment NOMA-based scheme for D2D communication. IEEE Trans. Ind. Informatics 2019, 15, 6354–6366. [Google Scholar] [CrossRef]
  24. Kader, M.F.; Islam, S.R.; Dobre, O.A. Simultaneous cellular and D2D communications exploiting cooperative uplink NOMA. IEEE Commun. Lett. 2021, 25, 1848–1852. [Google Scholar] [CrossRef]
  25. Kader, M.F.; Shahab, M.B.; Shin, S.Y. Exploiting non-orthogonal multiple access in cooperative relay sharing. IEEE Commun. Lett. 2017, 21, 1159–1162. [Google Scholar] [CrossRef]
  26. Alemaishat, S.; Saraereh, O.A.; Khan, I.; Choi, B.J. An efficient resource allocation algorithm for D2D communications based on NOMA. IEEE Access 2019, 7, 120238–120247. [Google Scholar] [CrossRef]
  27. Yu, S.; Khan, W.U.; Zhang, X.; Liu, J. Optimal power allocation for NOMA-enabled D2D communication with imperfect SIC decoding. Phys. Commun. 2021, 46, 101296. [Google Scholar] [CrossRef]
  28. Le, M.; Pham, Q.V.; Kim, H.C.; Hwang, W.J. Enhanced resource allocation in D2D communications with NOMA and unlicensed spectrum. IEEE Syst. J. 2022, 16, 2856–2866. [Google Scholar] [CrossRef]
  29. Zhao, J.; Liu, Y.; Chai, K.K.; Chen, Y.; Elkashlan, M. Joint Subchannel and Power Allocation for NOMA Enhanced D2D Communications. IEEE Trans. Commun. 2017, 65, 5081–5094. [Google Scholar] [CrossRef]
  30. Rauniyar, A.; Engelstad, P.E.; Østerbø, O.N. On the performance of bidirectional NOMA-SWIPT enabled iot relay networks. IEEE Sensors J. 2020, 21, 2299–2315. [Google Scholar] [CrossRef]
  31. Chrysologou, A.P.; Chatzidiamantis, N.D.; Karagiannidis, G.K. Cooperative Uplink NOMA in D2D Communications. IEEE Commun. Lett. 2022, 26, 2567–2571. [Google Scholar] [CrossRef]
  32. Zhang, Y.; Feng, S.; Tang, W. Performance analysis of hybrid cellular and bidirectional device-to-device cooperative NOMA communication systems. IEEE Trans. Veh. Technol. 2021, 70, 10420–10435. [Google Scholar] [CrossRef]
  33. Men, J.; Ge, J.; Zhang, C. Performance analysis of nonorthogonal multiple access for relaying networks over Nakagami-m fading channels. IEEE Trans. Veh. Technol. 2016, 66, 1200–1208. [Google Scholar] [CrossRef]
  34. Uddin, M.B.; Kader, M.F.; Shin, S.Y. Uplink cooperative diversity using power-domain nonorthogonal multiple access. Trans. Emerg. Telecommun. Technol. 2019, 30, e3678. [Google Scholar] [CrossRef]
  35. Wei, Z.; Dai, L.; Ng, D.W.K.; Yuan, J. Performance analysis of a hybrid downlink-uplink cooperative NOMA scheme. In Proceedings of the 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), Sydney, Australia, 4–7 June 2017; IEEE: New York, NY, USA, 2017; pp. 1–7. [Google Scholar]
  36. Kader, M.F.; Shin, S.Y. Coordinated direct and relay transmission using uplink NOMA. IEEE Wirel. Commun. Lett. 2017, 7, 400–403. [Google Scholar] [CrossRef]
  37. Fang, Z.; Hu, J.; Lu, Y.; Ni, W. Three-user cooperative NOMA transmission. IEEE Wirel. Commun. Lett. 2019, 9, 465–469. [Google Scholar] [CrossRef]
  38. Yue, X.; Liu, Y.; Kang, S.; Nallanathan, A.; Ding, Z. Exploiting full/half-duplex user relaying in NOMA systems. IEEE Trans. Commun. 2017, 66, 560–575. [Google Scholar] [CrossRef] [Green Version]
Figure 1. System model.
Figure 1. System model.
Sensors 23 03958 g001
Figure 2. Outage probability of BCD-NOMA scheme.
Figure 2. Outage probability of BCD-NOMA scheme.
Sensors 23 03958 g002
Figure 3. Outage probability comparison of BCD-NOMA scheme with benchmarks.
Figure 3. Outage probability comparison of BCD-NOMA scheme with benchmarks.
Sensors 23 03958 g003
Figure 4. ESC comparison of BCD-NOMA scheme and benchmarks.
Figure 4. ESC comparison of BCD-NOMA scheme and benchmarks.
Sensors 23 03958 g004
Figure 5. Energy efficiency comparison of BCD-NOMA scheme and benchmarks, where P S 1 = P S 2 = P r = 10 W.
Figure 5. Energy efficiency comparison of BCD-NOMA scheme and benchmarks, where P S 1 = P S 2 = P r = 10 W.
Sensors 23 03958 g005
Table 1. Simulation Parameters.
Table 1. Simulation Parameters.
ParameterSymbolValues
Distance between S 1 and R d S 1 R 0.25
Distance between S 2 and R d S 2 R 0.50
Distance between R and D 1 d R D 1 0.50
Distance between R and D 2 d R D 2 0.25
Distance between S 1 and S 2 d S 1 S 2 0.20
Path Loss Exponentv4
Power Allocation Factor for NOMA a 1 0.7
Power Allocation Factor for NOMA a 2 0.3
Power Allocation Factor for NOMA a 3 0.8
Power Allocation Factor for NOMA a 4 0.2
Power Allocation Factor for NOMA b 1 0.7
Power Allocation Factor for NOMA b 2 0.3
Residual Interfering Signal ξ 10 4 , 10 3 , 10 2
S 1 Data Rate R S 1 0.50 bps/Hz
S 2 Data Rate R S 2 0.70 bps/Hz
S 1 D2D Data Rate R S 1 S 2 1.65 bps/Hz
S 2 D2D Data Rate R S 2 S 1 1.75 bps/Hz
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Rauniyar, A.; Østerbø, O.N.; Håkegård, J.E.; Engelstad, P. Exploiting Cooperative Downlink NOMA in D2D Communications. Sensors 2023, 23, 3958. https://doi.org/10.3390/s23083958

AMA Style

Rauniyar A, Østerbø ON, Håkegård JE, Engelstad P. Exploiting Cooperative Downlink NOMA in D2D Communications. Sensors. 2023; 23(8):3958. https://doi.org/10.3390/s23083958

Chicago/Turabian Style

Rauniyar, Ashish, Olav N. Østerbø, Jan Erik Håkegård, and Paal Engelstad. 2023. "Exploiting Cooperative Downlink NOMA in D2D Communications" Sensors 23, no. 8: 3958. https://doi.org/10.3390/s23083958

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop