Next Article in Journal
A Knowledge Sharing and Individually Guided Evolutionary Algorithm for Multi-Task Optimization Problems
Previous Article in Journal
Two-Stage Tour Route Recommendation Approach by Integrating Crowd Dynamics Derived from Mobile Tracking Data
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimization of Effective Throughput in NOMA-Based Cognitive UAV Short-Packet Communication

School of Information and Navigation, Air Force Engineering University, Xi’an 710077, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2023, 13(1), 599; https://doi.org/10.3390/app13010599
Submission received: 23 November 2022 / Revised: 27 December 2022 / Accepted: 28 December 2022 / Published: 1 January 2023
(This article belongs to the Section Electrical, Electronics and Communications Engineering)

Abstract

:
Unmanned aerial vehicles (UAVs) are considered an important component of 6G wireless technology. However, there are many challenges to the employment of UAVs, one of which is spectrum scarcity. To address this challenge, non-orthogonal multiple access (NOMA) and cognitive radio (CR) techniques are employed in UAV short-packet communication systems. In this paper, we consider a NOMA-based cognitive UAV short-packet communication system. Firstly, a mathematical expression for the effective throughput of the secondary users is derived. Then, we aim to maximize the effective throughput of the far secondary user by optimizing the sensing time, power allocation, and information bits under the constraints of the transmission power and effective decoding error probability. A joint optimization algorithm is used to solve this problem, where the bisection method and the one-dimensional linear search algorithm are used to solve the subproblem. The simulation results show that the proposed algorithm has low complexity and similar performance compared to the exhaustive method. In addition, the necessity of joint optimization is shown in the simulation results.

1. Introduction

1.1. Background and Related Works

With the development of 6G communication technology, UAV communication is becoming a hot research topic [1]. In ultra-reliable and low-latency communication (URLLC) scenarios, stable line-of-sight (LoS) communication can be obtained using UAV communication [2]. In addition, UAVs can rapidly change location and be deployed on demand [3] for emergency communication scenarios. However, they also face several challenges, one of which is spectrum scarcity. Due to the development of communication technologies and the increase in communication users [4,5,6], the problem of spectrum resource scarcity has become more severe. To solve this challenge, the concept of spectrum sharing is proposed and cognitive radio (CR) technology is created [7]. In addition, non-orthogonal multiple access (NOMA) techniques can also improve spectrum utilization efficiency [8].
By using cognitive radio technology, the state of the primary user (PU) can be sensed by the UAV and when the state of the PU is idle, the UAV uses the spectrum of the PU for communication [9]. In [10], the authors investigated the effect of the UAV’s sensing radius on the performance of the communication system under circular and straight trajectories. In [11], the sensing time and the transmitting power of the UAV were jointly optimized to improve the energy efficiency of the system. In [12], a cognitive UAV mobile relay network based on energy harvesting was studied and power control algorithms were proposed to maximize the throughput of the system. In [13], UAV cognitive communication systems in overlay mode and hybrid mode were investigated separately. Specifically, the energy and spectral efficiency of the system were improved by optimizing the system parameters. In [14], multiple PUs were considered in UAV cognitive communication systems. The results show that the trajectory of the UAV has an impact on the system transmission rate and the existence of an optimal trajectory.
Successive interference cancellation (SIC) is used in NOMA communications, which allows the receiver to process information on the same time/frequency carrier [15]. This provides an efficient way for UAVs to serve users with different types of service needs with limited spectrum resources. Until now, many studies have been conducted on the application of NOMA to UAVs. In [16], the height of the UAV was optimized to ensure the fairness of the NOMA-based UAV communication system under the single-user rate limit. In [17], the authors derived the outage probability of the NOMA-based UAV communication system under the Rician channel model and analyzed the effect of the parameters on the system. In [18], the NOMA-UAV transmitted data from the base station to multiple ground users and the authors considered jointly optimizing the location and transmission power of the UAV to minimize its total power consumption. In [19], a UAV was used as a relay node for emergency communication employing NOMA techniques while considering fair transmission for ground users. In [20], a scenario of data collection by NOMA-based UAV was considered. The UAV flew in a linear trajectory and the authors took the time efficiency of the data collection as the optimization objective.
As an important component of 6G wireless technology, UAVs need to provide URLLC, which typically uses short-packet communication (SPC) to reduce physical-layer transmission delays [21]. In [22], Professor Polyanskiy investigated the mathematical relationship between the transmission rate and relevant parameters in short-packet communication under additive Gaussian white noise (AWGN) channels. In contrast to long-packet communication, where the packets are shorter, the transmission rate of the packets was shown to be smaller than the Shannon capacity and the decoding error probability should be considered [23,24,25,26]. In [27], the reliability of the short-packet-based UAV relay communication system was taken as the optimization objective, and from the paper, it could be seen that the optimal transmit power and UAV locations could be obtained. In [28], a two-way communication model for UAVs was proposed. In the forward link, short packets are transmitted with control information and the backward link transmits the information collected through the long packets.
Until now, there have been relatively few studies combining CR and NOMA techniques for UAV communications. In [29], the authors considered maximizing the total rate of secondary users in a cognitive radio network by optimizing the relevant parameters. In addition, [30] investigated the problem of optimizing the safe transmission rate for UAVs. However, the effect of the decoding error probability on UAV communication has not been researched.

1.2. Motivation and Contributions

In mission-critical communication networks, information is always transmitted in short packets so we consider a UAV short-packet communication network. In addition, we find that the cognitive radio and non-orthogonal multiple-access techniques have been applied in previous studies to solve the spectrum scarcity problem and improve the spectrum efficiency in short-packet communication. In [31], the NOMA technique was applied in short-packet communication and the effective throughput of users with better channel gain was taken as the optimization objective. In [32], the authors improved the energy efficiency of the UAV short-packet communication system by optimizing the parameters such as the sensing time, transmit power, etc. Together with the above analysis, we consider a NOMA-based cognitive UAV short-packet communication system. The UAV in this system flies around the ground base station (GBS) in a circular path and detects its status by spectrum sensing. When the ground base station is idle, the UAV provides short-packet communication to secondary users using the NOMA technique.
The contributions of this paper are summarized in the following three points:
(1)
In the NOMA-based cognitive UAV short packet communication system, we present the problem of maximizing the effective throughput of far secondary users under the constraints of the transmission power and effective decoding error probability.
(2)
To solve this problem, the sensing time, information bits, and transmit power are optimized in the system.
(3)
The proposed optimization algorithm has low complexity and leads to similar results as the exhaustive method. The NOMA scheme can achieve higher throughput compared to some benchmark schemes.

1.3. Organization

The rest of this paper is organized as follows. Section 2 presents the model of the NOMA-based cognitive UAV short-packet communication system and formulates the problem under some constraints. Section 3 describes the method for the specific solution. Section 4 provides a simulation to verify the proposed method. Finally, Section 5 concludes the paper.

2. System Model and Problem Formulation

As shown in Figure 1a, we consider a NOMA-based cognitive UAV short-packet communication system consisting of a GBS, a UAV, and several secondary users, where the UAV is equipped with onboard sensors and transmits measurement information (e.g., meteorological, imagery, and electromagnetic information) to the secondary users. We assume that the UAV flies in a circular path around the GBS, where. its radius is R and the altitude is H. The GBS has priority to access the licensed spectrum with bandwidth B. Spectrum sensing is required to determine whether the GBS is idle or busy before UAV communication. When the GBS is idle, the UAV is allowed to access the licensed spectrum and provide communication to the secondary users around the flight path by utilizing NOMA. The secondary users are divided into multiple groups and the UAV provides communication services to one of the secondary user groups in one frame. In this paper, we focus on the effect of the system parameters on the effective throughput under the proposed model. Considering the high complexity of multi-user SIC in NOMA, we assume that each group has two secondary users. The horizontal distance from the UAV to the secondary user u i is r i , i { 1 , 2 } . In addition, since a GBS frame duration is usually very short, the distance between the UAV and u 1 , u 2 can be seen as unchanged for the duration of one frame.
The channel power gain from the UAV to the secondary user u i is denoted as h i . When the UAV is located above a certain altitude, the free-space channel model can be adopted [33]. Hence, h i can be represented as h i = β 0 ( H 2 + r i 2 ) 1 , where β 0 is the channel power gain at a distance of one meter. We assume that r 1 < r 2 and the distance between u 1 and the UAV is smaller than the distance between u 2 and the UAV. Then, it is obtained that h 1 > h 2 . Next, we provide the sensing model, the transmission model, and the optimization problem formulation.

2.1. Sensing Model

As shown in Figure 1b, each GBS frame consists of N symbol periods and the UAV frame is synchronized with the GBS frame. Each symbol period is 1/B seconds. To avoid interference with GBS communication, the UAV uses a periodic sensing scheme to determine the state of the GBS. In each UAV frame, N s symbol periods are used to sense the state of the GBS and N N s symbol periods are used to transmit information to the secondary users when the GBS is idle.
We assume that the UAV employs the energy detection method for spectrum sensing. Since the sensing is not perfect, the sensing results may not be correct. Based on [34], for a given detection probability P d , the false alarm probability P f can be calculated as
P f = Q 2 γ p + 1 Q 1 ( P d ) + γ p N s f s B ,
where f s is the sampling frequency at the UAV, γ p is the signal-to-noise ratio (SNR) of the sensed GBS signal at the UAV, and Q ( · ) is the Gaussian function, with Q ( x ) = x e ( t 2 / 2 ) d t / 2 π . Since P f is determined by N s , we use P f ( N s ) to replace P f .

2.2. Transmission Model

When the GBS is idle, the UAV will transmit N N s symbols to the secondary users using NOMA. In contrast to long-packet communication, the decoding error probability in short-packet communication is not negligible. According to [22], for a given transmission rate R, the decoding error probability of the secondary users can be approximated as
ε = Q f ( γ , N s , R ) ,
where f ( γ , N s , R ) = ln 2 N N s V ( log 2 ( 1 + γ ) R ) , γ denotes the SNR at the secondary users, and V denotes the channel dispersion, V = 1 ( 1 + γ ) 2 .
Considering the effect of the non-zero error decoding probability, a perfect SIC with the NOMA transmission scheme cannot be guaranteed. Thus, we introduce the effective decoding error probability, which is defined as ε ¯ i , i ( 1 , 2 ) , to represent the actual error probability at u i . In the following, we derive the expressions for the effective decoding error probability for u 1 and u 2 , respectively.
(1) Transmission to user u 1 : The received signal at u 1 can be expressed as
y 1 = p 1 h 1 x 1 + p 2 h 1 x 2 + n 1 ,
where n 1 C N ( 0 , δ 1 2 ) denotes the AWGN with zero mean and variance δ 1 2 at u 1 . x 1 and x 2 denote the signals sent by the UAV to u 1 and u 2 , respectively. p 1 and p 2 are the transmit power assigned to u 1 and u 2 , respectively.
For the received signal y 1 , the secondary user u 1 needs to eliminate x 2 before decoding x 1 . To this end, x 2 will be firstly decoded by u 1 and x 1 is regarded as interference. According to (2), for a given transmission rate R 2 , the decoding error probability of x 2 at u 1 is
ε 2 , 1 = Q f ( γ 2 , 1 , N s , R 2 ) ,
where γ 2 , 1 = p 2 h 1 p 1 h 1 + δ 1 2 is the signal-to-interference-plus-noise ratio (SINR) at u 1 .
Then, if the secondary user u 1 successfully decodes x 2 , u 1 can use SIC to remove the interference caused by x 2 . In this case, for a given transmission rate R 1 , the decoding error probability of x 1 at the secondary user u 1 is
ε 1 = Q f ( γ 1 , N s , R 1 ) ,
where γ 1 = p 1 h 1 δ 1 2 is the SNR at the secondary user u 1 .
If the secondary user u 1 fails to decode x 2 , u 1 can only decode x 1 and x 2 is regarded as interference. According to (2), for a given transmission rate R 1 , the decoding error probability of x 1 at u 1 is
ε 1 = Q f ( γ 1 , N s , R 1 ) ,
where γ 1 = p 1 h 1 p 2 h 1 + δ 1 2 is the SINR at the secondary user u 1 .
Based on the above analysis, the effective decoding error probability of x 1 at u 1 is given by
ε ¯ 1 = ( 1 ε 2 , 1 ) ε 1 + ε 2 , 1 ε 1
(2) Transmission to user u 2 : The received signal at u 2 can be expressed as
y 2 = p 1 h 2 x 1 + p 2 h 2 x 2 + n 2 ,
where n 2 C N ( 0 , δ 2 2 ) denotes the AWGN with zero mean and variance δ 2 2 at u 2 . According to the NOMA scheme, we decode x 2 at u 2 directly and x 1 is considered as interference.
According to (2), for a given transmission rate R 2 , the decoding error probability of x 2 at u 2 is
ε 2 = Q f ( γ 2 , N s , R 2 ) ,
where γ 2 = p 2 h 2 p 1 h 2 + δ 2 2 is the SINR at u 2 . Since u 2 decodes x 2 directly by treating x 1 as interference, ε 2 is equal to the effective decoding error probability ε ¯ 2 for u 2 , i.e., ε ¯ 2 = ε 2 .

2.3. Optimization Problem Formulation

In order to balance the effectiveness and reliability of the system, we evaluate the performance of the system using effective throughput as a metric. In this paper, the effective throughput of the secondary user u i is defined as
Φ i = P ( H 0 ) 1 P f ( N s ) ( 1 N s N ) R i ( 1 ε ¯ i ) ,
where P ( H 0 ) is the prior probability that the state of the GBS is idle.
In short-packet communication, we can use the bits-per-channel use (BPCU) instead of the bits per second as the transmission rate. Suppose that the UAV sends I bits of information to the secondary user u i in each frame, then, the transmission rate can be redefined as R i = I N N s [35]. Therefore, the effective throughput of the secondary user u i can be simplified as
Φ i = P ( H 0 ) 1 P f ( N s ) ( 1 ε ¯ i ) I N .
In this paper, we aim to maximize the effective throughput of the far secondary users by optimizing the sensing time, power allocation, and information bits with constraints on the transmission power and effective decoding error probability. Thus, the problem we are interested in is formulated as
max { N s , p 1 , p 2 , I } Φ 2
s . t . p 1 + p 2 P ,
0 < p 1 p 2 ,
0 < N s N ,
0 < I I max ,
ε ¯ 1 ε max ,
where P is the maximum transmit power of the UAV, I max is the maximum number of information bits transmitted by the UAV in each frame, ε max is the maximum decoding error probability at the secondary user u 1 , Constraint (12b) specifies the range of the UAV transmission power, Constraint (12c) guarantees that the UAV allocates more transmission power to the secondary user u 2 , Constraints (12d) and (12e) are the feasible regions of the sensing time and information bits, respectively, and Constraint (12f) is the acceptable range of the decoding error probability for the secondary user u 1 .

3. Solutions of the Formulated Problems

In this section, the problem of maximizing the effective throughput of the far secondary users is investigated. Firstly, the formulated problem is divided into three subproblems, which are solved by a successive optimization algorithm. Then, a joint optimization algorithm is proposed to obtain the optimal system parameters.

3.1. Sensing Time Optimization with Fixed p 1 , p 2 , and I

When the power allocation and information bits are given, we only need to optimize the sensing time N s . In the following theorem, it is proved that Φ 2 ( N s ) is a concave function with respect to N s .
Theorem 1.
Given the power allocation  p 1 , p 2  and the information bits I, Φ 2 ( N s )  is a concave function with respect to  N s .
Proof. 
Given the power allocation p 1 , p 2 and the information bits I, ε ¯ 2 is determined by N s . Therefore, we employ ε ¯ 2 ( N s ) instead of ε ¯ 2 . The first- and second-order derivatives of Φ 2 ( N s ) are, respectively,
Φ 2 ( N s ) = P ( H 0 ) I N P f ( N s ) ε ¯ 2 ( N s ) 1 + ε ¯ 2 ( N s ) P f ( N s ) 1 ,
Φ 2 ( N s ) = P ( H 0 ) I N P f ( N s ) ε ¯ 2 ( N s ) 1 + ε ¯ 2 ( N s ) P f ( N s ) 1 + 2 ε ¯ 2 ( N s ) P f ( N s ) .
In addition, the first- and second-order derivatives of P f ( N s ) are given by
P f ( N s ) = 1 2 A e D 2 2 < 0 ,
P f ( N s ) = 1 4 A e D 2 2 ( N s 1 2 + γ p f s 1 2 B 1 2 D ) > 0 ,
where A = γ p f s 1 2 ( 2 π B N s ) 1 2 , D = ( 2 γ p + 1 ) 1 2 Q 1 ( P d ) + γ p ( N s f s ) 1 2 B 1 2 . (15) shows that the first-order derivative of P f ( N s ) is less than or equal to zero. (16) shows that the second-order derivative of P f ( N s ) is greater than or equal to zero.
Then, to simplify the notation, we denote f ( N s ) = f ( γ 2 , N s , R 2 ) , and the first- and second-order derivatives of ε ¯ 2 ( N s ) are
ε ¯ 2 ( N s ) = 1 2 π e f 2 ( N s ) 2 f ( N s ) ,
ε ¯ 2 ( N s ) = 1 2 π e f 2 ( N s ) 2 f ( N s ) ( f ( N s ) ) 2 f ( N s ) ,
where the first- and second-order derivatives of f ( N s ) are given by
f ( N s ) = C I ( N N s ) 3 2 + log 2 ( 1 + γ 2 ) ( N N s ) 1 2 < 0 ,
f ( N s ) = C 3 2 I ( N N s ) 5 2 + 1 2 log 2 ( 1 + γ 2 ) ( N N s ) 3 2 < 0
and C = 1 2 ln 2 ( 1 / V 2 ) , V 2 = 1 ( 1 + γ 2 ) 2 .
According to (19) and (20), we can obtain that f ( N s ) < 0 and f ( N s ) < 0 . Then, we have ε ¯ 2 ( N s ) > 0 and ε ¯ 2 ( N s ) > 0 . In addition, we have P f ( N s ) < 1 and ε ¯ 2 ( N s ) < 1 . Combining the above analyses, it is easily derived that Φ 2 ( N s ) < 0 . Theorem 1 is proved.    □
Based on Theorem 1, we can obtain the optimal sensing time N s * via the bisection method by solving the following equation:
Φ 2 ( N s ) = 0 .

3.2. Power Allocation with Fixed N s and I

Given the sensing time and information bits, the optimization problem in (12) can be transformed into the following subproblem:
max p 1 , p 2 Φ 2
s . t . ( 12 b ) , ( 12 c ) , ( 12 f ) .
Theorem 2.
ε 2 is a monotonically decreasing function with respect to γ 2 .
Proof. 
The first-order derivative of ε 2 with respect to γ 2 is derived as
d ε 2 d γ 2 = 1 2 π e f 2 ( γ 2 ) 2 f ( γ 2 ) ,
where
f ( γ 2 ) = N N s ( 1 + γ 2 ) 2 1 1 ln 2 log 2 ( 1 + γ 2 ) R 2 ( 1 + γ 2 ) 2 1 .
Let λ = 1 + γ 2 define the function as Y ( λ ) = log 2 ( λ ) λ 2 1 . The first-order derivative of Y ( λ ) is given by
Y ( λ ) = y ( λ ) λ ( λ 2 1 ) 2 ,
where y ( λ ) = 1 ln 2 ( λ 2 1 ) 2 λ 2 log 2 ( λ ) .
We calculate the first-order derivative of y ( λ ) as y ( λ ) = 4 λ log 2 ( λ ) . Since λ 1 , we have y ( λ ) 0 . Hence, y ( λ ) is a monotonically decreasing function with respect to λ and y ( λ ) y ( 1 ) = 0 . When y ( λ ) 0 , we can obtain Y ( λ ) 0 . Since Y ( λ ) is a monotonically decreasing function with respect to λ , Y ( λ ) Y ( 1 ) = 1 2 ln 2 .
Based on the above analysis, we can derive
f ( γ 2 ) N N s ( 1 + γ 2 ) 2 1 1 Y ( λ ) ln 2 N N s 2 ( 1 + γ 2 ) 2 1 0 .
Following (26), it is easily derived that d ε 2 d γ 2 0 . Therefore, we can conclude that ε 2 is a monotonically decreasing function with respect to γ 2 . Theorem 2 is proved.    □
From Theorem 2, we know that the effective decoding error probability of x 2 at u 2 is decreased by increasing the value of γ 2 . Therefore, in order to maximize the value of Φ 2 , the value of γ 2 should be as large as possible under the constraints of the transmission power and effective decoding error probability. Next, we prove Theorem 3 based on Theorem 2.
Theorem 3.
To maximize Φ 2 , the equality of Constraint (12b) should be guaranteed.
Proof. 
Suppose that the optimal power allocation that maximizes the effective throughput of the far secondary users is p 1 * and p 2 * , satisfying p 1 * + p 2 * < P . Define β = P p 1 * + p 2 * . The new power allocation can be obtained as p 1 = β p 1 * and p 2 = β p 2 * , satisfying p 1 + p 2 = P .
Since p 1 * + p 2 * < P , we have β > 1 . It is easily derived that γ 2 * < γ 2 . According to Theorem 2, we have ε ¯ 2 * > ε ¯ 2 . Since Φ 2 is a monotonically decreasing function with respect to ε ¯ 2 , it is obtained that Φ 2 * > Φ 2 . This contradicts the supposition that Φ 2 * is the maximum effective throughput; hence, the optimal effective throughput is achieved when p 1 + p 2 = P . Theorem 3 is proved.    □
In order to reduce the complexity of the calculation, we investigate the feasible region of p 1 . Due to ε ¯ 1 = ε 1 + ε 2 , 1 ( ε 1 ε 1 ) ε 1 , we can obtain ε 1 ε max based on Constraint (12f). Then, we have p 1 f 1 ( Q 1 ( ε max ) ) δ 1 2 h 1 . Thus, the lower bound of p 1 can be denoted as
p 1 l b = f 1 ( Q 1 ( ε max ) ) δ 1 2 h 1 .
From Theorem 3 and Constraint (12c), we know that p 1 P / 2 . In addition, to guarantee the significance of ε ¯ 2 , log 2 ( 1 + γ 2 ) I N N s should be satisfied. Therefore, we can derive that p 1 2 I N N s P + δ 2 2 h 2 ( 2 I N N s 1 ) . The upper bound of p 1 can be denoted as
p 1 u b = min 2 I N N s P + δ 2 2 h 2 ( 2 I N N s 1 ) , P / 2 .
Theorem 4.
To maximize Φ 2 , the equality of Constraint (12f) should be guaranteed.
Proof. 
Suppose that the optimal power allocation that maximizes the effective throughput of the far secondary users is p 1 * and p 2 * . The effective decoding error probability for the near secondary user can be denoted as ε ¯ 1 ( p 1 * ) , which satisfies ε ¯ 1 ( p 1 * ) < ε max . From (27), we have ε ¯ 1 ( p 1 l b ) = ε max . Since ε ¯ 1 ( p 1 l b ) > ε 1 ( p 1 l b ) , we have ε ¯ 1 ( p 1 l b ) > ε max .
Based on the fact that ε ¯ 1 ( p 1 * ) < ε max and ε ¯ 1 ( p 1 l b ) > ε max , there must exist a value p ^ 1 ( p 1 l b , p 1 * ) that can make ε ¯ 1 ( p ^ 1 ) = ε max . Then, following p ^ 1 < p 1 * and Theorem 3, we have p ^ 2 > p 2 * . It is easily derived that γ ^ 2 > γ 2 * . According to Theorem 2, we can obtain Φ 2 ( p ^ 2 ) > Φ 2 ( p 2 * ) . This contradicts the assumption that p 1 * and p 2 * are the optimal values of power allocation. Therefore, ε ¯ 1 = ε max should be guaranteed in the optimization problem. Theorem 4 is proved.    □
Based on Theorem 4, we can use a one-dimensional linear search algorithm to find the optimal value of p 1 in the region p 1 l b p 1 p 1 u b . Then, we obtain the optimal value of p 2 by p 1 + p 2 = P .

3.3. Information Bits Optimization with Fixed p 1 , p 2 , and N s

When the power allocation and sensing time are given, we only need to optimize the information bits I. In the following theorem, we prove that Φ 2 ( I ) is a concave function with respect to I.
Theorem 5.
Given the power allocation p 1 , p 2 , and the sensing time N s , Φ 2 ( I ) is a concave function with respect to I.
Proof. 
Given the power allocation p 1 , p 2 and the sensing time N s , ε ¯ 2 is determined by I. Therefore, we employ ε ¯ 2 ( I ) instead of ε ¯ 2 . The first- and second-order derivatives of Φ 2 ( I ) are
Φ 2 ( I ) = P ( H 0 ) 1 N 1 P f ( N s ) 1 ε ¯ 2 ( I ) ε ¯ 2 ( I ) I ,
Φ 2 ( I ) = P ( H 0 ) 1 N 1 P f ( N s ) I ε ¯ 2 ( I ) + 2 ε ¯ 2 ( I ) .
Then, to simplify the notation, we denote f ( I ) = f ( γ 2 , N s , R 2 ) , the first- and second-order derivatives of ε ¯ 2 ( I ) are
ε ¯ 2 ( I ) = 1 2 π e f 2 ( I ) 2 f ( I ) ,
ε ¯ 2 ( I ) = 1 2 π e f 2 ( I ) 2 f ( I ) ( f ( I ) ) 2 f ( I ) ,
where the first- and second-order derivatives of f ( I ) are given by
f ( I ) = ln 2 V 2 ( N N s ) 1 2 ,
f ( I ) = 0 .
Based on (33) and (34), we can obtain that ε ¯ 2 ( I ) > 0 and ε ¯ 2 ( I ) > 0 . Thus, Φ 2 ( I ) < 0 , which leads to the fact that Φ 2 ( I ) is a concave function with respect to I. Theorem 5 is proved.    □
Based on Theorem 5, we can obtain the optimal information bits I * via the bisection method by solving the following equation:
Φ 2 ( I ) = 0 .

3.4. Joint Optimization and Analysis

Based on the above analysis, we propose a joint optimization algorithm to obtain the optimal solution of (12). Details of the joint optimization algorithm are given in Algorithm 1.
In Algorithm 1, the optimal sensing time is derived for the given information bits and power allocation. Then, the optimal information bits are derived for the given sensing time and power allocation. Then, the optimal power allocation is derived for the given sensing time and information bits. Finally, a joint optimization algorithm is used to obtain these optimal system parameters.
Algorithm 1: Proposed Algorithm for Problem (12)
 1:
Initialize N s ( 0 ) , I ( 0 ) , p 1 ( 0 ) , p 2 ( 0 ) , iteration index t = 0 , maximum iteration times t max , error tolerance ζ ;
 2:
repeat
 3:
 With the given I ( t ) , p 1 ( t ) , p 2 ( t ) , find the optimal N s * using the bisection method;
 4:
c 1 = N s * , c 2 = N s * , N s ( t + 1 ) = arg max ( c 1 , c 2 ) Φ 2 ;
 5:
 With the given N s ( t + 1 ) , p 1 ( t ) , p 2 ( t ) calculate the optimal I ( t + 1 ) using the bisection method;
 6:
 With the given N s ( t + 1 ) , I ( t + 1 ) derive the optimal p 1 ( t + 1 ) using the one-dimensional line search algorithm, and then p 2 ( t + 1 ) = P p 1 ( t + 1 ) ;
 7:
 Set t = t + 1 ;
 8:
until ( t t max ) & & ( Φ 2 ( t ) Φ 2 ( t 1 ) ζ );
Output: N s ( t ) , I ( t ) , p 1 ( t ) , p 2 ( t ) , Φ 2 ( t ) .
The complexity analysis of Algorithm 1 is as follows. The complexity of obtaining the optimal sensing time in step 3 of Algorithm 1 is Q 1 = O ( log 2 ( N / δ ) ) . The complexity of obtaining the optimal information bits in step 5 of Algorithm 1 is Q 2 = O ( log 2 ( I max / δ ) ) , where δ is the error tolerance of the bisection method. In step 6 of Algorithm 1, the complexity of obtaining the optimal power allocation is Q 3 = O ( ( p 1 u b p 1 l b ) / θ ) . Therefore, the complexity of Algorithm 1 is O ( t max ( Q 1 + Q 2 + Q 3 ) ) , where t max is the maximum number of iterations of Algorithm 1. In the simulations, the algorithm usually converges within ten iterations. By using a similar analysis, the complexity of the exhaustive search algorithm is O ( N I max P / σ ) , where σ is the error tolerance of the exhaustive search algorithm. The complexity of Algorithm 1 is significantly lower than that of the exhaustive search algorithm. From the simulation results, it can be seen that the performance of Algorithm 1 is almost the same as the exhaustive search algorithm.

4. Numerical and Simulation Results

In this section, we provide the simulation results to show the performance of the proposed algorithm. The simulation parameters are set as follows: B = 2 MHz, N = 200 , and H = 120 m. The horizontal distance from the UAV to u 1 and u 2 are r 1 = 10 m and r 2 = 200 m, respectively. The maximum transmission power of the UAV is P = 10 W. The sensing SNR is γ p = 10 dB. The noise power at the two secondary users is set to be δ 1 2 = δ 2 2 = 70 dBmW. The probability of the idle state of the GBS is P ( H 0 ) = 0.8 and the detection probability is P d = 0.9 . The channel power gain at a distance of one meter is β 0 = 50 dB. The maximum decoding error probability is ε max = 10 6 and the maximum number of iterations of Algorithm 1 is t max = 100 . In the OMA scheme, the resource allocation factor for u 2 is 50%.
Figure 2 shows Φ 2 versus the number of iterations for different values of P. As shown in Figure 2, Algorithm 1 converges rapidly. It usually reaches convergence in ten iterations for the considered UAV transmission power, which indicates that the proposed algorithm has low complexity.
Figure 3 shows the impact of the sensing time on Φ 2 when I = 270 bits, 300 bits, 330 bits. When the transmitted information bits are given, Φ 2 firstly increases and then decreases with the sensing time, and there is a unique optimal value such that Φ 2 achieves the maximum value. This coincides with the analysis in Theorem 1. When the value of N s is small, the increase in the sensing time mainly leads to a decrease in the false alarm probability, thus Φ 2 is increased. However, when N s is increased further, the increase in the sensing time mainly leads to an increase in ε ¯ 2 and Φ 2 is decreased. In addition, the optimal value of Φ 2 in the NOMA scheme is higher than that in the OMA scheme.
Figure 4 illustrates the impact of information bits on Φ 2 for different values of the sensing time. When the sensing time is given, Φ 2 firstly increases and then decreases with the increase in the information bits and there exists a unique value that maximizes Φ 2 . Therefore, Theorem 5 is verified. The increase in the information bits can enhance the value of Φ 2 , but when the information bits reach a certain value, ε ¯ 2 will decrease sharply, causing Φ 2 to decrease to zero. It can be observed in Figure 4 that the NOMA scheme can achieve higher optimal values compared to the OMA scheme with the same sensing time.
In Figure 5, the decoding error probability ε versus the SNR γ is shown. In Figure 5, it can be seen that the decoding error probability decreases as the SNR increases, which verifies Theorem 2. It can be seen in the figure that the information bits, sensing time, and SNR have a significant impact on the decoding error probability of the short-packet communication. Therefore, these three parameters need to be optimized in short-packet communication to reduce the impact of the decoding error probability on system communication performance.
Figure 6 describes the false-alarm probability versus the sensing time. In Figure 6, it can be seen that the false alarm probability decreases with the increase in the sensing time. It can also be seen in the figure that when γ p is smaller and P d is larger, the sensing time that the UAV uses to reduce the false-alarm probability will be larger. In order to ensure that the communication of the GBS is not interfered with by the UAV, the sensing SNR is usually required to be as low as possible, whereas the detection probability is less than but close to 1. In this case, the UAV requires more sensing time to reduce the probability of a false alarm but at the same time, increases the decoding error probability. Therefore, the optimization of the sensing time in (12) is essential.
In Figure 7, we can compare the performance of the different algorithms and schemes. In the NOMA scheme, the joint optimization algorithm can significantly improve the performance of the system compared to the other algorithms, which also reflects the importance of joint optimization. By comparing the performance of the NOMA scheme and the OMA scheme, we find that the NOMA scheme can obtain better results. The proposed algorithm almost matches the exhaustive search algorithm and verifies its global optimality.

5. Conclusions

In this paper, we derive an effective throughput for secondary users and optimize the power allocation, information bits, and sensing time to maximize the effective throughput for the secondary users under the constraints of the transmission power and effective decoding error probability. Specifically, we prove that the effective throughput is a concave function with respect to the sensing time and information bits, respectively, and then the bisection method is employed to obtain the optimal value. For the power allocation, we first reduce the feasible power range of u 1 . Then, the one-dimensional linear search method is used to obtain the optimal value. Therefore, the complexity of the proposed algorithm is considerably reduced compared to the exhaustive method. In the simulations, it can be seen that the NOMA scheme can achieve higher optimal values compared to the OMA scheme. In Figure 7, we can see that the proposed algorithm has a similar performance to that of the exhaustive method. In addition, when there are significant differences between the two channels, the NOMA is more appealing.

Author Contributions

Conceptualization, S.Z., H.H. (Hang Hu) and Y.H.; Methodology, S.Z., H.H. (Hang Hu) and H.H. (Huizhu Han); Software, H.H. (Huizhu Han); Validation, S.Z.; Writing—original draft, S.Z.; Writing—review & editing, H.H. (Hang Hu), Y.H., G.C., T.H. and H.H. (Huizhu Han); Visualization, S.Z. and Q.A.; Supervision, H.H. (Hang Hu), Y.H., G.C., T.H. and Q.A.; Project administration, H.H. (Hang Hu); Funding acquisition, H.H. (Hang Hu). All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by grants from the National Natural Science Foundation of China (No. 61901509) and the Natural Science Foundation of Shanxi Province of China (No. 2021JQ-366).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. You, X.; Wang, C.X.; Huang, J.; Gao, X.; Zhang, Z.; Wang, M.; Huang, Y.; Zhang, C.; Jiang, Y.; Wang, J.; et al. Towards 6G wireless communication networks: Vision, enabling technologies, and new paradigm shifts. Sci. China Inf. Sci. 2021, 64, 1–74. [Google Scholar] [CrossRef]
  2. Wu, Q.; Xu, J.; Zeng, Y.; Ng, D.W.K.; Al-Dhahir, N.; Schober, R.; Swindlehurst, A.L. A Comprehensive Overview on 5G-and-Beyond Networks With UAVs: From Communications to Sensing and Intelligence. IEEE J. Sel. Areas Commun. 2021, 39, 2912–2945. [Google Scholar] [CrossRef]
  3. Hellaoui, H.; Bekkouche, O.; Bagaa, M.; Taleb, T. Aerial Control System for Spectrum Efficiency in UAV-to-Cellular Communications. IEEE Commun. Mag. 2018, 56, 108–113. [Google Scholar] [CrossRef] [Green Version]
  4. Saad, W.; Bennis, M.; Chen, M. A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research Problems. IEEE Netw. 2020, 34, 134–142. [Google Scholar] [CrossRef] [Green Version]
  5. Wu, D.; Wang, J.; Hu, R.Q.; Cai, Y.; Zhou, L. Energy-Efficient Resource Sharing for Mobile Device-to-Device Multimedia Communications. IEEE Trans. Veh. Technol. 2014, 63, 2093–2103. [Google Scholar] [CrossRef]
  6. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef] [Green Version]
  7. Kakkavas, G.; Tsitseklis, K.; Karyotis, V.; Papavassiliou, S. A Software Defined Radio Cross-Layer Resource Allocation Approach for Cognitive Radio Networks: From Theory to Practice. IEEE Trans. Cogn. Commun. Netw. 2020, 6, 740–755. [Google Scholar] [CrossRef]
  8. Xia, B.; Wang, J.; Xiao, K.; Gao, Y.; Yao, Y.; Ma, S. Outage Performance Analysis for the Advanced SIC Receiver in Wireless NOMA Systems. IEEE Trans. Veh. Technol. 2018, 67, 6711–6715. [Google Scholar] [CrossRef]
  9. Arjoune, Y.; Kaabouch, N. A Comprehensive Survey on Spectrum Sensing in Cognitive Radio Networks: Recent Advances, New Challenges, and Future Research Directions. Sensors 2019, 19, 126. [Google Scholar] [CrossRef] [Green Version]
  10. Liu, X.; Guan, M.; Zhang, X.; Ding, H. Spectrum Sensing Optimization in an UAV-Based Cognitive Radio. IEEE Access 2018, 6, 44002–44009. [Google Scholar] [CrossRef]
  11. Pan, Y.; Da, X.; Hu, H.; Zhu, Z.; Xu, R.; Ni, L. Energy-Efficiency Optimization of UAV-Based Cognitive Radio System. IEEE Access 2019, 7, 155381–155391. [Google Scholar] [CrossRef]
  12. Li, H.; Zhao, X. Throughput Maximization With Energy Harvesting in UAV-Assisted Cognitive Mobile Relay Networks. IEEE Trans. Cogn. Commun. Netw. 2021, 7, 197–209. [Google Scholar] [CrossRef]
  13. Hu, H.; Da, X.; Huang, Y.; Zhang, H.; Ni, L.; Pan, Y. SE and EE Optimization for Cognitive UAV Network Based on Location Information. IEEE Access 2019, 7, 162115–162126. [Google Scholar] [CrossRef]
  14. Huang, Y.; Xu, J.; Qiu, L.; Zhang, R. Cognitive UAV Communication via Joint Trajectory and Power Control. In Proceedings of the 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata, Greece, 25–28 June 2018; pp. 1–5. [Google Scholar] [CrossRef] [Green Version]
  15. Islam, S.M.R.; Avazov, N.; Dobre, O.A.; Kwak, K.s. Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges. IEEE Commun. Surv. Tutorials 2017, 19, 721–742. [Google Scholar] [CrossRef] [Green Version]
  16. Sohail, M.F.; Leow, C.Y. Maximized fairness for NOMA based drone communication system. In Proceedings of the 2017 IEEE 13th Malaysia International Conference on Communications (MICC), Johor Bahru, Malaysia, 28–30 November 2017; pp. 119–123. [Google Scholar] [CrossRef]
  17. Sharma, P.K.; Kim, D.I. UAV-Enabled Downlink Wireless System with Non-Orthogonal Multiple Access. In Proceedings of the 2017 IEEE Globecom Workshops (GC Wkshps), Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar] [CrossRef]
  18. Jiang, X.; Wu, Z.; Yin, Z.; Yang, Z.; Zhao, N. Power Consumption Minimization of UAV Relay in NOMA Networks. IEEE Wirel. Commun. Lett. 2020, 9, 666–670. [Google Scholar] [CrossRef]
  19. Hu, B.; Wang, L.; Chen, S.; Cui, J.; Chen, L. An Uplink Throughput Optimization Scheme for UAV-Enabled Urban Emergency Communications. IEEE Internet Things J. 2022, 9, 4291–4302. [Google Scholar] [CrossRef]
  20. Wang, W.; Zhao, N.; Chen, L.; Liu, X.; Chen, Y.; Niyato, D. UAV-Assisted Time-Efficient Data Collection via Uplink NOMA. IEEE Trans. Commun. 2021, 69, 7851–7863. [Google Scholar] [CrossRef]
  21. Durisi, G.; Koch, T.; Popovski, P. Toward Massive, Ultrareliable, and Low-Latency Wireless Communication With Short Packets. Proc. IEEE 2016, 104, 1711–1726. [Google Scholar] [CrossRef] [Green Version]
  22. Polyanskiy, Y.; Poor, H.V.; Verdu, S. Channel Coding Rate in the Finite Blocklength Regime. IEEE Trans. Inf. Theory 2010, 56, 2307–2359. [Google Scholar] [CrossRef]
  23. Zhang, L.; Liang, Y.C. Average Throughput Analysis and Optimization in Cooperative IoT Networks With Short Packet Communication. IEEE Trans. Veh. Technol. 2018, 67, 11549–11562. [Google Scholar] [CrossRef]
  24. Durisi, G.; Koch, T.; Östman, J.; Polyanskiy, Y.; Yang, W. Short-Packet Communications Over Multiple-Antenna Rayleigh-Fading Channels. IEEE Trans. Commun. 2016, 64, 618–629. [Google Scholar] [CrossRef]
  25. Yang, W.; Caire, G.; Durisi, G.; Polyanskiy, Y. Optimum Power Control at Finite Blocklength. IEEE Trans. Inf. Theory 2015, 61, 4598–4615. [Google Scholar] [CrossRef]
  26. Yang, W.; Durisi, G.; Koch, T.; Polyanskiy, Y. Quasi-Static Multiple-Antenna Fading Channels at Finite Blocklength. IEEE Trans. Inf. Theory 2014, 60, 4232–4265. [Google Scholar] [CrossRef] [Green Version]
  27. Ren, H.; Pan, C.; Wang, K.; Xu, W.; Elkashlan, M.; Nallanathan, A. Joint Transmit Power and Placement Optimization for URLLC-Enabled UAV Relay Systems. IEEE Trans. Veh. Technol. 2020, 69, 8003–8007. [Google Scholar] [CrossRef]
  28. Cai, Y.; Jiang, X.; Liu, M.; Zhao, N.; Chen, Y.; Wang, X. Resource Allocation for URLLC-Oriented Two-Way UAV Relaying. IEEE Trans. Veh. Technol. 2022, 71, 3344–3349. [Google Scholar] [CrossRef]
  29. Deng, D.; Zhu, M. Joint UAV trajectory and power allocation optimization for NOMA in cognitive radio network. Phys. Commun. 2021, 46, 101328. [Google Scholar] [CrossRef]
  30. Tang, N.; Tang, H.; Li, B.; Yuan, X. Cognitive NOMA for UAV-Enabled Secure Communications: Joint 3D Trajectory Design and Power Allocation. IEEE Access 2020, 8, 159965–159978. [Google Scholar] [CrossRef]
  31. Sun, X.; Yan, S.; Yang, N.; Ding, Z.; Shen, C.; Zhong, Z. Short-Packet Downlink Transmission With Non-Orthogonal Multiple Access. IEEE Trans. Wirel. Commun. 2018, 17, 4550–4564. [Google Scholar] [CrossRef] [Green Version]
  32. Hu, H.; Huang, Y.; Cheng, G.; Kang, Q.; Zhang, H.; Pan, Y. Optimization of Energy Efficiency in UAV-Enabled Cognitive IoT With Short Packet Communication. IEEE Sens. J. 2022, 22, 12357–12368. [Google Scholar] [CrossRef]
  33. Lin, X.; Yajnanarayana, V.; Muruganathan, S.D.; Gao, S.; Asplund, H.; Maattanen, H.L.; Bergstrom, M.; Euler, S.; Wang, Y.P.E. The Sky Is Not the Limit: LTE for Unmanned Aerial Vehicles. IEEE Commun. Mag. 2018, 56, 204–210. [Google Scholar] [CrossRef] [Green Version]
  34. Zhang, L.; Liang, Y.C. Joint Spectrum Sensing and Packet Error Rate Optimization in Cognitive IoT. IEEE Internet Things J. 2019, 6, 7816–7827. [Google Scholar] [CrossRef]
  35. Wang, H.M.; Yang, Q.; Ding, Z.; Poor, H.V. Secure Short-Packet Communications for Mission-Critical IoT Applications. IEEE Trans. Wirel. Commun. 2019, 18, 2565–2578. [Google Scholar] [CrossRef]
Figure 1. (a) Illustration of a NOMA-based cognitive UAV short-packet communication system. (b) GBS and UAV frame structures.
Figure 1. (a) Illustration of a NOMA-based cognitive UAV short-packet communication system. (b) GBS and UAV frame structures.
Applsci 13 00599 g001
Figure 2. Convergence behavior of Algorithm 1 for various values of P.
Figure 2. Convergence behavior of Algorithm 1 for various values of P.
Applsci 13 00599 g002
Figure 3. Φ 2 versus the sensing time for different schemes and I.
Figure 3. Φ 2 versus the sensing time for different schemes and I.
Applsci 13 00599 g003
Figure 4. Φ 2 versus the information bits for different schemes and N s .
Figure 4. Φ 2 versus the information bits for different schemes and N s .
Applsci 13 00599 g004
Figure 5. Decoding error probability versus the SNR for different I and N s .
Figure 5. Decoding error probability versus the SNR for different I and N s .
Applsci 13 00599 g005
Figure 6. False-alarm probability versus sensing time for different γ p and P d .
Figure 6. False-alarm probability versus sensing time for different γ p and P d .
Applsci 13 00599 g006
Figure 7. Performance comparison for different algorithms and schemes.
Figure 7. Performance comparison for different algorithms and schemes.
Applsci 13 00599 g007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhao, S.; Hu, H.; Huang, Y.; Cheng, G.; Huang, T.; Han, H.; An, Q. Optimization of Effective Throughput in NOMA-Based Cognitive UAV Short-Packet Communication. Appl. Sci. 2023, 13, 599. https://doi.org/10.3390/app13010599

AMA Style

Zhao S, Hu H, Huang Y, Cheng G, Huang T, Han H, An Q. Optimization of Effective Throughput in NOMA-Based Cognitive UAV Short-Packet Communication. Applied Sciences. 2023; 13(1):599. https://doi.org/10.3390/app13010599

Chicago/Turabian Style

Zhao, Senhao, Hang Hu, Yangchao Huang, Guobing Cheng, Tao Huang, Huizhu Han, and Qi An. 2023. "Optimization of Effective Throughput in NOMA-Based Cognitive UAV Short-Packet Communication" Applied Sciences 13, no. 1: 599. https://doi.org/10.3390/app13010599

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop