Processing math: 92%
LI Xingwang, GAO Xuesong, LIU Yingting, HUANG Gaojian, ZENG Ming, QIAO Dawei. Overlay CR-NOMA Assisted Intelligent Transportation System Networks with Imperfect SIC and CEEs[J]. Chinese Journal of Electronics, 2023, 32(6): 1258-1270. DOI: 10.23919/cje.2022.00.071
Citation: LI Xingwang, GAO Xuesong, LIU Yingting, HUANG Gaojian, ZENG Ming, QIAO Dawei. Overlay CR-NOMA Assisted Intelligent Transportation System Networks with Imperfect SIC and CEEs[J]. Chinese Journal of Electronics, 2023, 32(6): 1258-1270. DOI: 10.23919/cje.2022.00.071

Overlay CR-NOMA Assisted Intelligent Transportation System Networks with Imperfect SIC and CEEs

Funds: This work was supported by the Key Project of Guizhou Science and Technology Support Program through Grant Guizhou Key Science and Support ([2021]-001), the Doctoral Fund of Henan Polytechnic University (B2022-2), the National Natural Science Foundation of China (62171146, 61861041), the Natural Science Foundation of Gansu Province of China (20JR5RA536, 20JR10RA095), and the Gansu Postdoctoral Research Funding Project
More Information
  • Author Bio:

    LI Xingwang: Xingwang LI received the M.S. and Ph.D. degrees from University of Electronic Science and Technology of China and Beijing University of Posts and Telecommunications in 2010 and 2015, respectively. From 2010 to 2012, he worked as an Engineer at Comba Telecom Ltd. in Guangzhou, China. From 2017 to 2018, he was a Visiting Scholar at Queen’s University Belfast, Belfast, UK. He is also a Visiting Scholar at State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications from 2016 to 2018. He is currently an Associated Professor with the School of Physics and Electronic Information Engineering, Henan Polytechnic University, Jiaozuo, China. His research interests include MIMO communication, cooperative communication, hardware constrained communication, non-orthogonal multiple access, physical layer security, unmanned aerial vehicles, and the Internet of things. He has served as many TPC members, such as IEEE GLOBECOM’18, IEEE WCNC’20, IEEE VTC’20, IEEE ICCC’19 and so on. He has also served as the Co-Chair for the IEEE/IET CSNDSP’20 and IEEE PIMRC’21. He also serves as an Editor on the Editorial Boards of IEEE Transactions on Vehicular Technology, IEEE Systems Journal, IEEE Access, Computer Communications, IET Networks, Physical Communication, IET Quantum Communication, and KSII Transactions on Internet and Information Systems. He is also the Lead Guest Editor for the Special Issue on UAV-Enabled B5G/6Gnetworks: Emerging Trends and Challenges of Physical Communication, Special Issue on Recent Advances in Physical Layer Technologies for the 5G-Enabled Internet of Things of Wireless Communications and Mobile Computing, and Special Issue on Recent Advances in Multiple Access for 5G-Enabled IoT of Security and Communication Networks. (Email: lixingwangbupt@gmail.com)

    GAO Xuesong: Xuesong GAO received the B.S. degree in information engineering with the School of Physics and Information Engineering of Cangzhou Normal University, Cangzhou, China, in 2021. She is currently pursuing the M.S. degree in communication and information systems with the School of Physics and Electronic Information Engineering, Henan Polytechnic University, Jiaozuo, China. Her current research interests include non-orthogonal multiple access, cognitive radio, and cooperative communication. (Email: gaoxuesong@home.hpu.edu.cn)

    LIU Yingting: Yingting LIU received the B.S., M.S. and Ph.D. degrees, all in communication & information systems, from Xidian University in 2005, 2008 and 2012, respectively. From 2012 to 2015, he was a Senior Engineer of Information and Communication Company of Gansu Power Corporation. From 2016 to 2021, he was serving as an Associate Professor in Northwest Normal University. Now, he is serving as an Associate Professor with the School of Electronic and Information Engineering, Lanzhou Jiaotong University. His research mainly focuses on some hot fields in wireless communications, e.g., simultaneously wireless information and power transfer, non-orthogonal multiple assess and backscatter communications. Moreover, the performance optimization for the communication system is also his research interests. (Email: liuyt2018@163.com)

    HUANG Gaojian: Gaojian HUANG received the B.S. degree in electronic information engineering from the Guilin University of Electronic Technology (GUET), Guilin, China, in 2013, and received the Ph.D. degree in information and communications engineering from GUET, in 2021. From October 2017 to October 2018, he was a Visiting Researcher at Queen’s University Belfast, Northern Ireland, UK. He is now a Lecturer at the School of Physics and Electronic Information Engineering, Henan Polytechnic University, Jiaozuo, China. His research interests include integrated sensing and wireless communication designs, antenna array, physical layer security, emerging modulation techniques and 5G/6G related areas. (Email: g.huang@hpu.edu.cn)

    ZENG Ming: Ming ZENG received the B.E. and M.S. degrees from Beijing University of Post and Telecommunications, China in 2013 and 2016, respectively, and the Ph.D. degree in telecommunications engineering from Memorial University, Canada, in 2020. Currently, he is an Assistant Professor at the Department of Electrical Engineering and Computer Engineering, Université Laval, Canada. He has published more than 45 articles and conferences in first-tier IEEE journals and proceedings, and his work has been cited over 1150 times per Google Scholar. His research interests include resource allocation for beyond 5G systems, and machine learning empowered optical communications. He serves as an Associate Editor of the IEEE Open Journal of the Communication Society. (Email: ming.zeng@gel.ulaval.ca)

    QIAO Dawei: Dawei QIAO received the B.S. degree in public management with the School of Medicine, Henan Polytechnic University, Jiaozuo, China, in 2021. Before this, she worked at the Hospital of Henan Polytechnic University from 2015 to 2018. Her current research interests include artificial intelligence, health management, e-health and Internet of medical things. (Email: daweihpu@163.com)

  • Received Date: April 11, 2022
  • Accepted Date: June 27, 2022
  • Available Online: August 28, 2022
  • Published Date: November 04, 2023
  • With the development of the mobile communication and intelligent information technologies, the intelligent transportation systems driven by the sixth generation (6G) has many opportunities to achieve ultra-low latency and higher data transmission rate. Nonetheless, it also faces the great challenges of spectral resource shortage and large-scale connection. To solve the above problems, non-orthogonal multiple access (NOMA) and cognitive radio (CR) technologies have been proposed. In this regard, we study the reliable and ergodic performance of CR-NOMA assisted intelligent transportation system networks in the presence of imperfect successive interference cancellation (SIC) and non-ideal channel state information. Specifically, the analytical expressions of the outage probability (OP) and ergodic sum rate (ESR) are derived through a string of calculations. In order to gain more insights, the asymptotic expressions for OP and ESR at high signal-to-noise ratio (SNR) regimes are discussed. We verify the accuracy of the analysis by Monte Carlo simulations, and the results show: i) Imperfect SIC and channel estimation errors (CEEs) have negative impacts on the OP and ESR; ii) The OP decreases with the SNR increasing until convergence to a fixed constant at high SNR regions; iii) The ESR increases with increasing SNR and there exists a ceiling in the high SNR region.
  • As the key enabling technology of the future intelligent transportation systems (ITS), Internet-of-vehicles (IoV) will greatly promote the development of society towards intelligence and informatization [1], [2]. Generally, IoV communication includes vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I) and the vehicle-to-person (V2P) [3]. With the rapid development of the sixth generation (6G) mobile communication, the IoV of ITS networks driven by 6G can achieve higher data transmission rate, lower latency and higher quality-of-service (QoS) [4], [5]. However, it also faces great challenges, such as spectrum shortage and large-scale connections [6]. In order to effectively solve the above problems, some promising technologies have been proposed, such as non-orthogonal multiple access (NOMA) [7] and cognitive radio [8].

    NOMA is considered as a key technology in 6G since it can improve the spectral efficiency and reduce the latency by serving massive devices in the same resource block (time/frequency/code) using power multiplexing [9]. Moreover, at the transmitting side, the transmitter allocates different power to different users according to their channel conditions and carries out superposition coding. At the receiving side, the signal is detected through the successive interference cancelation (SIC) technology [10]. And specifically, NOMA can ensure fairness among the served users by allocating different users with different powers [11].

    There are numerous excellent research focusing on the investigations of NOMA in wireless networks [12]-[18]. The authors in [12] proposed a general framework to evaluate a downlink NOMA system performance. The authors in [13] studied the reliable performance of a downlink NOMA system under the conditions of second-order statistics of channel state information (CSI). In [14], Lu et al. designed a multi-carrier NOMA system for video transmission to meet the growing demands for video services such as massive traffic and low latency. The authors in [15] investigated the performance of NOMA-enabled unmanned aerial vehicle (UAV) relay networks by deducing the outage probability (OP) and ergodic capacity for both amplify-and-forward (AF) and decode-and-forward (DF) relaying protocols at UAV. The authors in [16] studied the effective capacity of a reconfigurable intelligent surfaces aided NOMA system. Xu et al. [17] proposed a cognitive orthogonal frequency-division multiplexing-NOMA network to increase the system capacity. To support ultra-reliability, high throughput and multiple concurrent connections, reference [18] investigated the variation of the diversity order of OP relative to the transmit power in a hybrid automatic repeat request assisted NOMA system.

    Cognitive radio (CR) is another promising technology to improve the frequency spectrum utilization [8], [19]. In the CR networks, the secondary network is allowed to selectively access the authorized frequency spectrum of the primary network to solve the problem of insufficient spectrum [20]. According to the spectrum access paradigms, interweave, underlay, overlay are the three most popular CR models [21]. In interweave model, the secondary user (SU) is allowed to access the authorized frequency bands only when primary user (PU) does not occupy it. Underlay cognitive radio allows the primary and secondary users to transmit messages simultaneously in the same frequency band, but the interference to the primary user needs to be less than a predefined value [22]. In overlay mode, the secondary network uses part of the energy to help the primary network transmit and obtain the right to access the authorized spectrum, and it improves the performance of the primary network while realizing the simultaneous transmission of the primary and secondary networks [23].

    Scanning the technical literature of recent years, the performance of CR network was discussed in many literature since CR technology can mitigate the shortage of spectrum resources to a certain extent [24]-[28]. In [24], the authors derived the analytical expression of OP and ergodic rate (ER) so as to compare the throughput performance of CR networks based on interweave and underlay. In more detail, to maximize the throughput of SU, Wang et al.. [25] proposed a channel-and-sensing-aware channel access strategy for an interweave cognitive network. In [26], the authors discussed the influence of improper Gaussian signaling on the underlay CR network performance. The authors in [27] designed a novel scheme of spatial modulation in overlay CR network and analyzed the system performance by calculating average symbol error rate. The authors in [28] designed a scheme about optimal transmitting power for underlay CR network to minimize the average symbol error probability.

    To address the challenges of the exponentially growing demand for mobile traffic [29], many researchers introduced the CR technology into the NOMA networks, see references [30]-[34]. Liu et al. [30] deduced the analytical expression of OP by means of stochastic geometry in order to characterize the reliable performance of the proposed CR-NOMA network. Wei et al. [31] deduced the analytical expressions of the secrecy sum rate to study the secrecy performance of a NOMA-enabled underlay CR network. The authors in [32] analyzed the performance of a NOMA assisted underlay CR network by deriving the analytical expression of pairwise error probability of SU. The authors in [33] proposed a novel spectrum sharing framework for multiuser CR-NOMA network to effectively improve the spectrum efficiency. In [34], the authors optimized the power allocation of the proposed spectrum leasing scheme for CR network so that the QoS of the primary network has been met while maximizing the performance of the secondary network.

    Based on the above discussions, the existing studies are mostly conducted under ideal conditions. However, the actual communication process is generally carried out under the non-ideal conditions, such as imperfect successive interference cancellation (ipSIC) and non-ideal CSI. ipSIC is produced by channel state information unattainable, receiver performance limitation or synchronization errors, residual impairments and error propagation during transmission, etc. [35]-[40], and the channel estimation errors (CEEs) result in non-ideal CSI. Chen et al. [36] designed a novel algorithm to reduce the influence of ipSIC on the considered system performance. In [37], the authors investigated the reliable and ergodic performance of a multi-input multi-output (MIMO) interference networks under the condition of non-ideal CSI. Yang et al. [38] studied the effect of non-ideal CSI on secrecy performance of multi-user massive MIMO networks. The authors in [39] considered nonlinear multi-objective optimization problem under ipSIC in order to maximize the sum capacity and minimize the total transmit power under the constraint of QoS. Further, the authors in [40] analyzed the influence of ipSIC, non-ideal CSI and imperfect timing synchronization on a space time block code-based NOMA network simultaneously.

    Although many researchers have conducted studies on NOMA, CR, imperfect SIC and non-ideal CSI, the joint impacts of the above factors on system performance are rarely studied. Sun et al. in [41] modeled a NOMA vehicular communication network, and deduced the analytical expression for the OP of the considered network. However, the non-ideal CSI, ipSIC and CR network were not involved. On the premise of ensuring quality-of-service, Xiao et al in [42] optimized transmission time and power control for the proposed radio-frequency-powered CR network to achieve maximum energy efficiency. Unfortunately, NOMA was not taken into consideration. The authors in [43] studied a CR-NOMA network and proposed a new dynamic power transmission scheme to guarantee the QoS of the considered system. The fly in the ointment was that non-ideal CSI has not been taken into account. Li et al. assessed the reliability and security of cooperative NOMA and non-cooperative NOMA systems by calculating secrecy outage probability and connection outage probability in [44]. However, ipSIC and non-ideal CSI were not taken into account. Luo et al. analyzed the performance of a cognitive NOMA system, and deduced the analytical expression of OP and throughput under high SNR regions in [45], but the non-ideal CSI was not considered. The authors in [46] analyzed and optimized the OP and throughput of the proposed underlay CR-NOMA in the presence of ipSIC. However, non-ideal CSI was not included. In [47], the authors proposed a CR assisted-NOMA network based on ITS and evaluated the reliability of the considered network by analyzing OP and throughput. Nonetheless, the ergodic performance of the network was not considered. The authors in [48] introduced wireless power transmission into CR-NOMA network to solve the challenges of energy consumption and large-scale connection in ITS. The fly in the ointment was that non-ideal CSI has not been mentioned.

    In order to fill these bridges, considering CEEs and ipSIC, we introduce a NOMA-based overlay CR (OCR) ITS system. In the considered system, the SR utilizes the spectrum resources of the primary network to transmit its own information. In return, the SU acts as a relay to transmit the information of the primary network to the primary receivers. The main contributions of this paper are as following.

    • We propose a novel NOMA-based OCR system for the ITS, which consists of a primary vehicle network and a secondary vehicle network. In the primary network, the primary transmitter sends superimposed information to both the primary and secondary receiving vehicles. In the secondary network, the secondary receiving vehicle receives their own information and acts as the relay of the primary network to transmit information to the primary receiving vehicles. Moreover, in order to make the work more realistic, we consider the CEEs and ipSIC. Specifically, two channel estimation models are considered: i) The CEEs is a fixed constant; ii) The CEEs is a function related to the SNR.

    • We evaluate the reliability performance of the system under consideration by deducing the analytical expressions of the OP. In order to obtain more precise insights, the asymptotic expressions of the OP at high SNR regions are analyzed. The derivations show that increasing transmit SNR enhances the reliability of the consideration system and the OP exists an error floor because of the constant estimation error.

    • The ergodic sum rate (ESR) of primary and secondary network are derived through a series of calculations to evaluate the ergodicity of the ITS system. In addition, the asymptotic expressions of ESR at high SNR regions are also performed. These results indicate that increasing SNR enhances the system ergodicity and the value of ESR tends to a constant at high SNR regime.

    Here are some notations about this paper. E() stands for expectation operation. CN(μ,σ2) represents the complex Gaussian random variable with mean μ and variance σ2. In addition, FX() and fX() denote the cumulative distribution function (CDF) and the probability dense function (PDF) respectively. Ei(x) is the exponential distribution function, and can be expressed as Ei(x)=0eρρdρ.

    As illustrated in Fig.1, we consider a NOMA-based OCR system of ITS, which consists of a primary transmitter (PT), a marginal vehicle (PR1), a stronger vehicle (PR2) in primary network, a secondary transmitter (ST), and a secondary receiving vehicle (SR) in secondary network. It is assumed that: i) All nodes are equipped with one antenna; ii) All channels follow the independent Rayleigh fading.

    Figure  1.  System model.

    It is difficult to obtain perfect CSI due to some practical factors, so the channel estimation method is introduced. By using linear minimum mean square error (LMMSE), the channel coefficient can be written as follows [49]:

    hi=ˆhi+ei (1)

    where ˆhi represents the estimated channel coefficient, eiCN(0,σ2ei) represents the estimated error. ˆhi and ei is independent and orthogonal because of the orthogonality of the LMMSE algorithm. The estimated channels are denoted as ˆhpp1CN(0,λpp1), ˆhpp2CN(0,λpp2), ˆhps1CN(0,λps1), ˆhss1CN(0,λss1), ˆhs1p1CN(0,λs1p1), ˆhs1p2CN(0,λs1p2).

    As in [50], we consider two channel estimation models:

    1) σ2ei is a fixed constant, which is independent of the average SNR.

    2) σ2ei is a function associated with the average SNR and the expression is σ2ei=Ωi/(1+δγΩi), where Ωi is the variance of hi, γ is the transmit SNR, while δ0 represents the quality of channel estimation.

    The whole communication process is divided into two slots.

    PT transmits the superimposed signal to PR1, PR2 and SR through power domain multiplexing, and thus, the signal received at PR1 can be written as

    ypp1=(ˆhpp1+epp1)(α1Ppxp,1+α2Ppxp,2)+npp1 (2)

    where xp,1 and xp,2 are the signals for PR1 and PR2 with E(|xp,1|2)=1 and E(|xp,2|2)=1. Pp is the transmit power of PT, α1 and α2 are the power allocation coefficients of the transmitting information xp,1 and xp,2 with satisfying α1+α2=1, respectively. npp1 is the complex Gaussian noise and it follows npp1CN(0,Nn).

    PR1 decodes xp,1 and regards xp,2 as a noise. The received signal-interference-plus-noise ratio (SINR) can be written as

    γpp1xp,1=|ˆhpp1|2α1ρp|ˆhpp1|2α2ρp+σ2epp1ρp+1 (3)

    where ρp=PpNn is the transmit SINR at PT.

    The signal received in PR2 can be expressed as

    ypp2=(ˆhpp2+epp2)(α1Ppxp,1+α2Ppxp,2)+npp2 (4)

    where npp2CN(0,Nn).

    PR2 first decodes xp,1 then decodes xp,2 by using SIC on the basis of NOMA protocol. When decoding xp,1, the SINR at PR2 can be represented as

    γpp2xp,1=|ˆhpp2|2α1ρp|ˆhpp2|2α2ρp+σ2epp2ρp+1 (5)

    In practice, the receiver always have some types of errors in transmitting and detecting process, such as synchronization error, residual impairments or intrinsic constraints, therefore we assume ipSIC happens at PR2. The SINR of decoding xp,2 at PR2 can be denoted by

    γpp2xp,2=|ˆhpp2|2α2ρpζ1|ˆhpp2|2α1ρp+σ2epp2ρp+1 (6)

    where ζ1 reprsents the coefficient of imperfect SIC and 0ζ11. ζ1=0 and ζ1=1 indicate perfect SIC and no SIC, respectively.

    The signal received at SR can be denoted as

    yps1=(ˆhps1+eps1)(α1Ppxp,1+α2Ppxp,2)+nps1 (7)

    where npp3CN(0,Nn).

    SR needs to decode the message xp,1 of PR1 before decoding the message xp,2 of PR2. The SINR of decoding xp,1 and xp,2 respectively at SR can be represented as

    γps1xp,1=|ˆhps1|2α1ρp|ˆhps1|2α2ρp+σ2eps1ρp+1 (8)
    γps1xp,2=|ˆhps1|2α2ρpζ2|ˆhps1|2α1ρp+σ2eps1ρp+1 (9)

    where ζ2 reprsents the coefficient of imperfect SIC and 0ζ21.

    During the second slot, SR receives the message xs from ST, while acting as a relay to decode and forward the messages xp,1 and xp,2 to PR1 and PR2 1.

    The two phases of receiving and decoding-and-forward the message are performed in the same resource block.

    The signal received at SR can be written as

    yss1=(ˆhss1+ess1)Psxs+nss1 (10)

    where xs denotes the message for SR with E(|xs|2)=1, Ps represents the transmit power of ST, and nss1CN(0,Nn).

    When decoding xs, the SINR at SR can be expressed as

    γss1xs=|ˆhss1|2ρsσ2ess1ρs+1 (11)

    where ρs=PsNn represents the transmit SINR of ST.

    The received signals at PR1 can be denoted by

    ys1p1=(ˆhs1p1+es1p1)(α3Ps1xp,1+α4Ps1xp,2)+ns1p1 (12)

    where ns1p1CN(0,Nn), Ps1 is the overall transmit power of SR, α3 and α4 are the power allocation coefficients of xp,1 and xp,2, respectively, and satisfying α3+α4=1.

    PR1 only decodes xp,1 by considering other signals as interference. The SINR at PR1 can be computed as

    γs1p1xp,1=|ˆhs1p1|2α3ρs1|ˆhs1p1|2α4ρs1+σ2es1p1ρs1+1 (13)

    where ρs1=Ps1Nn represents the transmit SINR of SR.

    The received signals at PR2 can be represented as

    ys1p2=(ˆhs1p2+es1p2)(α3Ps1xp,1+α4Ps1xp,2)+ns1p2 (14)

    where ns1p2CN(0,Nn).

    PR2 needs to decode the message xp,1 of marginal user before decoding its own message xp,2. Therefore, the SINR of decoding xp,1 and xp,2 at PR2 can be respectively computed as

    γs1p2xp,1=|ˆhs1p2|2α3ρs1|ˆhs1p2|2α4ρs1+σ2es1p2ρs1+1 (15)
    γs1p2xp,2=|ˆhs1p2|2α4ρs1ζ3|ˆhs1p2|2α3ρs1+σ2es1p2ρs1+1 (16)

    where ζ3 represents the coefficient of ipSIC, and it satisfies 0ζ31.

    The OP and ESR are the two important evaluation metrics of wireless communication systems. In this section, we study the reliability and ergodicity by calculating OP and ESR, and analyze the asymptotic expressions of OP and ESR at high SNR region.

    There are three conditions that the outage event occurs at PR1 according to the NOMA protocol: i) PR1 fails to decodes xp,1 in direct link; ii) SR fails to decode the message xp,1 and xp,2 from PT; iii) SR decodes the xp,1 and xp,2 successfully, but PR1 cannot decode the message xp,1 successfully. Therefore, the OP at PR1 can be computed as

    PPR1out=(1Pr(γpp1xp,1>γth1))×(1Pr(min(γps1xp,1γth1,γps1xp,2γth2,γs1p1xp,1γth1)>1)) (17)

    where γth1 and γth2 is the target SINR of xp,1 and xp,2, respectively.

    Theorem 1 The analytical expression of OP at PR1 is presented as

    PPR1out=(1eM1λpp1)(1eM4λps1M5λs1p1) (18)

    if 0<γth1<min(α3α4,α1α2) and 0<γth2<α2ζ2α1, otherwise PPR1out is equal to 1, where M1=γth1(σ2epp1ρp+1)ρp(α1α2γth1), M2=γth1(σ2eps1ρp+1)ρp(α1α2γth1), M3=γth2(σ2eps1ρp+1)ρp(α2ζ2α1γth2), M4=max(M2,M3), and M5=γth1(σ2es1p1ρs1+1)ρs1(α3α4γth1).

    Proof See Appendix A.

    Corollary 1 At high SNRs (ρp, ρs1), the OP approximate expression of PR1 can be expressed as

    PPR1out,=(1eM6λpp1)(1eM9λps1M10λs1p1) (19)

    where M6=γth1σ2epp1α1α2γth1, M7=γth1σ2eps1α1α2γth1, M8=γth2σ2eps1α2ζ2α1γth2, M9=max(M7,M8), and M10=γth1σ2es1p1α3α4γth1.

    There are three conditions when PR2 encounters outage event: i) PR2 cannot decodes xp,1 and xp,2 from the direct link successfully; ii) SR cannot decodes xp,1 and xp,2 from PT successfully; iii) SR decodes xp,1 and xp,2 from PT successfully, but PR2 fails to decode xp,1 and xp,2 from SR. Thus we can calculate the OP at PR2 as

    PPR2out=(1Pr(min(γpp2xp,1γth1,γpp2xp,2γth2)>1))×(1Pr(min(γps1xp,1γth1,γps1xp,2γth2,γs1p2xp,1γth1,γs1p2xp,2γth2)>1)) (20)

    Theorem 2 The analytical expression of OP at PR2 can be written as

    PPR2out=(1eM13λpp2)(1eM4λps1M16λs1p2) (21)

    if 0<γth1<min(α1α2,α3α4) and 0<γth2<min(α2ζ1α1,α4ζ2α3,α4ζ3α3), otherwise PPR2out is equal to 1, where M11=γth1(σ2epp2ρp+1)ρp(α1α2γth1), M12=γth2(σ2epp2ρp+1)ρp(α2ζ1α1γth2), M13=max(M11,M12), M14=γth1(σ2es1p2ρs1+1)ρs1(α3α4γth1), M15=γth2(σ2es1p2ρs1+1)ρs1(α4ζ3α3γth2), and M16=max(M14,M15).

    Proof See Appendix B.

    Corollary 2 At high SNRs (ρp, ρs1), the approximate expression of PR2 having outage event is

    PPR2out,=(1eM19λpp2)(1eM9λps1M22λs1p2) (22)

    In (22), M17=γth1σ2epp2α1α2γth1, M18=γth2σ2epp2α2ζ1α1γth2, M19=max(M17,M18), M20=γth1σ2es1p2α3α4γth1, M21=γth2σ2es1p2α4ζ3α3γth2, and M22=max(M20,M21).

    The outage event will happen when SR fails to decode the message xs, that is

    PSRout=1Pr(γss1xs>γths) (23)

    where γths represents the target SINR of decoding the message xs.

    Theorem 3 The analytical expression of OP at SR can be written as

    PSRout=1eM23λss1 (24)

    where M23=γths(σ2ess1ρs+1)ρs.

    Proof See Appendix C.

    Corollary 3 At high SNRs (ρs), the approximate expression of SR having outage event is

    PSRout,=1eγthsσ2ess1λss1 (25)

    To gain further insight, we discuss the diversity order of PR1, PR2 and SR. According to [7], the diversity order is defined as

    d=limρlog(Pout,)logρ (26)

    Corollary 4 The diversity orders of PR1, PR2 and SR can be represent as

    dPR1=dPR2=dSR=0 (27)

    Remark 1 From Corollary 1, Corollary 2 and Corollary 3, we can find that when the transmitted SNR approaches infinity, the asymptotic OPs of PR1, PR2 and SR become a fixed constant, indicating that the OP has an error floor, yielding the diversity order to be 0.

    The ESR of primary network can be expressed as

    Rp=RPR1+RPR2 (28)

    The ergodic rates (ERs) for PR1 and PR2 are inferred as follows.

    The ER of PR1 can be written as

    RPR1=E[12log2(1+W)] (29)

    where W=min(u1,u2,u3), u1=γpp1xp,1, u2=γps1xp,1, and u3=γs1p1xp,1.

    Theorem 4 The analytical expression of ER at PR1 can be written as

    RPR1=12ln2πN2kki=021ϕi22+N(ϕi+1)eM28M29M30 (30)

    where ϕi=cos((2i1)π2k), M25=w(σ2epp1ρp+1)λpp1ρp(α1wα2), M26=w(σ2eps1ρp+1)λps1ρp(α1wα2), M27=w(σ2es1p1ρs1+1)λs1p1ρs1(α3wα4), M28=N(ϕi+1)(σ2epp1ρp+1)λpp1ρp(2α1α2N(ϕi+1)), M29=N(ϕi+1)(σ2eps1ρp+1)λps1ρp(2α1α2N(ϕi+1)) and M30=N(ϕi+1)(σ2es1p1ρs1+1)λs1p1ρs1(2α3α4N(ϕi+1)).

    Proof See Appendix D.

    Corollary 5 At high SNRs (ρp, ρs1), we can calculate the ER asymptotic expression of PR1 as

    RPR1=12ln2πN2kki=021ϕi22+N(ϕi+1)eM31M32M33 (31)

    where M31=N(ϕi+1)σ2epp1λpp1(2α1α2N(ϕi+1)), M32=N(ϕi+1)σ2eps1λps1(2α1α2N(ϕi+1)) and M33=N(ϕi+1)σ2es1p1λs1p1(2α3α4N(ϕi+1)).

    The ER of PR2 can be represented as

    RPR2=E[12log2(1+Z)] (32)

    where Z=min(v1,v2,v3), v1=γpp2xp,2, v2=γps1xp,2, and v3=γs1p2xp,2.

    Theorem 5 The analytical expression of ER at PR2 is given by

    RPR2=12ln2πN22kki=021ϕi22+N2(ϕi+1)eM37M38M39 (33)

    where M34=z(σ2epp2ρp+1)λpp2ρp(α2zζ1α1), M35=z(σ2eps1ρp+1)λps1ρp(α2zζ2α1), M36=z(σ2es1p2ρs1+1)λs1p2ρs1(α4zζ3α3), M37=N2(ϕi+1)(σ2epp2ρp+1)λpp2ρp(2α2α1N2(ϕi+1)ζ1), M38=N2(ϕi+1)(σ2eps1ρp+1)λps1ρp(2α2α1N2(ϕi+1)ζ2) and M39 is expressed as M39=N2(ϕi+1)(σ2es1p2ρs1+1)λs1p2ρs1(2α4α3N2(ϕi+1)ζ3).

    Proof See Appendix E.

    Corollary 6 At high SNRs (ρp, ρs1), we can calculate the ER asymptotic expression of PR2 as

    RPR2=12ln2πN22kki=021ϕi22+N2(ϕi+1)eM40M41M42 (34)

    where M40 and M41 are M40=N2(ϕi+1)σ2epp2λpp2(2α2α1N2(ϕi+1)ζ1) and M41=N2(ϕi+1)σ2eps1λps1(2α2α1N2(ϕi+1)ζ2), respectively, M42 is M42=N2(ϕi+1)σ2es1p2λs1p2(2α4α3N2(ϕi+1)ζ3).

    Theorem 6 The ESR of primary network can be expressed as

    Rp=π4ln2(Nkki=021ϕi22+N(ϕi+1)eM28M29M30+N2kk2i=021ϕi22+N2(ϕi+1)eM37M38M39) (35)

    Corollary 7 At high SNRs (ρs), we can simplify the ESR asymptotic expression of primary network as

    RP=π4ln2(Nkki=021ϕi22+N(ϕi+1)eM31M32M33+N2kki=021ϕi22+N2(ϕi+1)eM40M41M42) (36)

    The ESR of secondary network can be expressed as

    RS=E[12log2(1+γss1xs)] (37)

    Theorem 7 The ESR of secondary network is given by

    RS=12ln2e(σ2ess1ρs+1)λss1ρsEi((σ2ess1ρs+1)λss1ρs) (38)

    Proof See Appendix F.

    Corollary 8 At high SNRs (ρs), we can simplify the ESR asymptotic expression of secondary network as

    RS=12ln2eσ2ess1λss1Ei(σ2ess1+1λss1) (39)

    Remark 2 From Corollary 7 and Corollary 8, we found that when the transmitted SNR approaches infinity, the asymptotic ESRs of primary network and secondary network become a fixed constant, implying that there exists a ceiling for ESR due to CEEs.

    In this section, we offer some numerical results to verify the correctness of the analysis in Section III, and these results are obtained based on the 106 Mente Carlo simulations. Unless otherwise specified, the parameter values are set as in Table 1.

    Table  1.  Parameters for numerical results
    Channel estimation error σ2epp1=σ2epp2=σ2eps1=σ2ess1=σ2es1p1=σ2es1p2=0.01
    Estimated channel coefficient {λpp1,λpp2,λps1,λss1,λs1p1,λs1p2}={0.1,0.5,2,0.1,4,3}
    Power allocation coefficient α1=α3=0.9α2=α4=0.1
    Noise power Nn=1
    Imperfect SIC {ζ1,ζ2,ζ3}=0.001
    Targeted date rate {γth1,γth2,γths}={1,1,2}
     | Show Table
    DownLoad: CSV

    Fig.2 shows the OP curves of the users under the ideal and non-ideal conditions. For the purpose of comparison, the parameter settings under the ideal conditions are provided, and the variances of CEEs are σ2epp1=σ2epp2=σ2eps1=σ2ess1=σ2es1p1=σ2es1p2=0. With transmit SNR increasing, the OPs of PR1, PR2, SR decrease gradually and finally converge to fixed values, which leads to error floors. This means that when there are CEEs, the transmit power is not always beneficial to the reliable performance. Under ideal conditions, the OPs decrease with the SNR. In addition, the OP value of each user under the ideal condition is smaller than that under the non-ideal condition. This indicates that the existence of ipSIC and CEEs reduce the reliability of the system.

    Figure  2.  The OP of the users in ideal and non-ideal conditions.

    Fig.3 provides the curves of OP versus SNR under two channel estimation models: i) the channel estimation error is a fixed constant; ii) the channel estimation error is a function of the SNR. As can be seen from Fig.3, the theoretical analysis curves are in consistence with the simulation results, validating the accuracy of our analysis. For the first model, the OP is a fixed constant in the high SNR regimes, while for the second mode, the OP decrease as the SNR grows large. This is because that when the SNR grows large, the estimated channel gradually approaches the real channel, yielding improves reliable performance.

    Figure  3.  The OP of the users in different channel estimation error models.

    Fig.4 plots the OPs of users versus power allocation parameter α2 for different target rates. It is clear that the OP first decreases and then increases with α2, we can draw the conclusion from equations (18) and (21). Fig.4 also indicates that when the target rates γth1 and γth2 are smaller, the OP of the considered system is smaller and the reliability of the system is higher. In addition, the optimal value of OP is insensitive to the target rates γth1 and γth2.

    Figure  4.  OP versus α2 for different γth1, γth2.

    Fig.5 shows the ESR versus SNR. We set N=8, N2=100, and k=k2=100. From Fig.5, we can observe that the ESR increases gradually with the SNR and then tends to a fixed constant under the non-ideal condition. In contrast, under the ideal condition (σ2epp1=σ2epp2=σ2eps1=σ2ess1=σ2es1p1=σ2es1p2=0 and ζ1=ζ2=ζ3=0), the ESR grows linearly with the SNR. At high SNR regions, the analytical and asymptotic values of the ESR are basically coincident.

    Figure  5.  The ESR under ideal and non-ideal condition.

    Fig.6 represents the relationship between ESR and transmitting SNR under the above mentioned two CEEs models. In this simulation, we set N=8, N2=100, k=k2=100 and δ={0.1,1}. we can see from Fig.6 that the ESR has a ceiling at high SNR regions when estimation error is a fixed constant, and the ESR decreases with δ when the estimation error is a unary function. Changes in δ have a negligible effect on the system ESR value in the low SNR region.

    Figure  6.  The ESR in different channel estimation error models.

    The relationship between ER and α2 under different SNRs is depicted in Fig.7. In simulation, we set N=8, N2=100, k=k2=100 and SNR={10,15} dB. The ER of PR1 decreases as the power allocation parameter α2 increases, while the ER of PR2 increases with α2, which can be inferred from equations (30) and (33). Generally speaking, the larger α2 is, the easier to decode xp,2 and the more difficult to decode xp,1. That is, the combination of xp,1 and xp,2 could explain the changes in the curves.

    Figure  7.  Ergodic Rate versus α2 for different SNR.

    To improve the spectral efficiency, we proposed a NOMA-based OCR system for ITS. The reliability and ergodicity of the proposed system were analyzed by considering ipSIC and two channel estimation models. We derived the analytical expressions of the OP and ESR, as well as the asymptotic expressions of OP and ESR at the high SNR region. A series of simulations were carried out to verify the accuracy of the analysis. In addition, the effect of a series of related parameters on the system performance were investigated through simulation.

    The proof starts by substituting equations (3), (8), (9), (13) into (17), the OP for PR1 can be written as

    PPR1out=(1Pr(γpp1xp,1>γth1))I1×(1Pr(min(γps1xp,1γth1,γps1xp,2γth2,γs1p1xp,1γth1)>1))I2

    where I1 and I2 are calculated as follows:

    I1=1Pr(γpp1xp,1>γth1)=1Pr(|ˆhpp1|2>M1)=1eM1λpp1

    and

    I2=1Pr(min(γps1xp,1γth1,γps1xp,2γth2,γs1p1xp,1γth1)>1)=1Pr(γps1xp,1>γth1,rps1xp,2>γth2,γs1p1xp,1>γth1)=1Pr(|ˆhps1|2>M2,|ˆhps1|2>M3,|ˆhs1p1|2>M5)=1Pr(|ˆhps1|2>M4,|ˆhs1p1|2>M5)=1eM4λps1M5λs1p1

    The proof starts by substituting equations (5), (6), (8), (9), (15), (16) into (20), the OP for PR2 can be written as

    PPR2out=(1Pr(min(γpp2xp,1γth1,γpp2xp,2γth2)>1))I3×(1Pr(min(γps1xp,1γth1,γps1xp,2γth2,γs1p2xp,1γth1,γs1p2xp,2γth2)>1))I4

    where I3 and I4 are calculated as follows:

    I3=1Pr(min(γpp2xp,1γth1,γpp2xp,2γth2)>1)=1Pr(γpp2xp,1>γth1,γpp2xp,2>γth2)=1Pr(|ˆhpp2|2>M11,|ˆhpp2|2>M12)=1Pr(|ˆhpp2|2>M13)=1eM13λpp2

    and

    I4=1Pr(min(γps1xp,1γth1,γps1xp,2γth2,γs1p2xp,1γth1,γs1p2xp,2γth2)>1)=1Pr(γps1xp,1>γth1,γps1xp,2>γth2,γs1p2xp,1>γth1,γs1p2xp,2>γth2)=1eM4λps1Pr(|ˆhs1p2|2>M14,|ˆhs1p2|2>M15)=1eM4λps1Pr(|ˆhs1p2|2>M16)=1eM4λps1M16λs1p2

    The proof starts by substituting equation (11) into (23), the OP for SR can be written as

    PSRout=1Pr(γss1xs>γths)=1Pr(|ˆhss1|2>M23)=1eM23λss1

    Based on the definition of expectation, equation (28) can be further calculated as

    RPR1=E[12log2(1+W)]=12ln2+01FW(w)1+wdw

    It is assumed that {f_W}(w) , {{F_W}(w)} are the PDF and CDF of random variable W respectively. {F_W}(w) can be computed as

    \begin{split} {F_W}\left( w \right) &= P_r\left( {W < w} \right) = P_r\left( {\min \left( {{u_1},{u_2},{u_3}} \right) < w} \right) \\ &= 1 - P_r\left( {\min \left( {{u_1},{u_2},{u_3}} \right) > w} \right) \\ &= 1 - P_r\left( {{u_1} > w,{u_2} > w,{u_3} > w} \right)\\ &= 1 - {{\rm{e}}^{ - {M_{25}} - {M_{26}} - {M_{27}}}} \end{split}\tag{D-2}

    We can figure out the ER of PR1 by plugging (D-2) into (D-1),

    \begin{split} {R_{P{R_1}}} &= \frac{1}{{2\ln 2}}\int_0^{ + \infty } {\frac{{1 - {F_W}(w)}}{{1 + w}}} {\rm{d}}w \\ &= \frac{1}{{2\ln 2}}\int_0^{ + \infty } {\frac{1}{{1 + w}}} {{\rm{e}}^{ - {M_{25}} - {M_{26}} - {M_{27}}}}{\rm{d}}w \;\;\;\;\;\; \end{split} \tag{D-3}

    It is difficult to acquire an accurate closed-formed solution. Alternatively, we obtain the approximation with the aid of Gaussian-Chebyshev quadrature as [51]

    \begin{split} {R_{P{R_1}}} &= \frac{1}{{2\ln 2}}\int_0^{ + \infty } {\frac{1}{{1 + w}}} {{\rm{e}}^{ - {M_{25}} - {M_{26}} - {M_{27}}}}{\rm{d}}w \\ &\approx \frac{1}{{2\ln 2}}\int_0^N {\frac{1}{{1 + w}}{{\rm{e}}^{ - {M_{25}} - {M_{26}} - {M_{27}}}}{\rm{d}}w} \\ &= \frac{1}{{2\ln 2}}\frac{{\pi N}}{{2k}}\sum\limits_{i = 0}^k {\frac{{2\sqrt {1 - {\phi _i}^2} }}{{2 + N({\phi _i} + 1)}}{{\rm{e}}^{ - {M_{28}} - {M_{29}} - {M_{30}}}}} \;\;\;\;\;\;\;\;\; \end{split} \tag{D-4}

    It is assumed that {F_Z}(z) is the CDF of random variable Z. We can obtain the expression by calculating as follows:

    \begin{split} {F_Z}(z)& = P_r\left( {Z < z} \right) = P_r\left( {\min \left( {{v_1},{v_2},{v_3}} \right) < z} \right) \\ &= 1 - P_r\left( {{v_1} > z,{v_2} > z,{v_3} > z} \right) \\ &= 1 - {{\rm{e}}^{ - {M_{34}} - {M_{35}} - {M_{36}}}} \end{split} \tag{E-1}

    The ER of PR2 can be written as

    \begin{split} {R_{P{R_2}}} &= \frac{1}{{2\ln 2}}\int_0^{ + \infty } {\frac{{1 - {F_Z}(z)}}{{1 + z}}{\rm{d}}z} \\ &= \frac{1}{{2\ln 2}}\int_0^{ + \infty } {\frac{1}{{1 + z}}} {{\rm{e}}^{ - {M_{34}} - {M_{35}} - {M_{36}}}}{\rm{d}}z \end{split} \tag{E-2}

    Since exact closed-formed expressions are not available, considering that when N_2 is a large number, we have the following equation according to Gaussian-Chebyshev quadrature.

    \begin{split} {R_{P{R_2}}} &= \frac{1}{{2\ln 2}}\int_0^{ + \infty } {\frac{1}{{1 + z}}} {{\rm{e}}^{ - {M_{34}} - {M_{35}} - {M_{36}}}}{\rm{d}}z\\ &\approx \frac{1}{{2\ln 2}}\int_0^{{N_2}} {\frac{1}{{1 + z}}} {{\rm{e}}^{ - {M_{34}} - {M_{35}} - {M_{36}}}}{\rm{d}}z \\ &= \frac{1}{{2\ln 2}}\frac{{\pi {N_2}}}{{2{k_2}}}\sum\limits_{i = 0}^{{k_2}} {\frac{{2\sqrt {1 - {\phi _i}^2} }}{{2 + {N_2}({\phi _i} + 1)}}} {{\rm{e}}^{ - {M_{37}} - {M_{38}} - {M_{39}}}} \\ \end{split} \tag{E-3}

    Letting \theta = r_{{x_s}}^{s{s_1}} to facilitate the calculation, we can obtain the PDF of \theta as

    \begin{split} {F_\theta }(\theta ) & = P_r\left( {\frac{{{{\left| {{{\hat h}_{s{s_1}}}} \right|}^2}{\rho _s}}}{{\sigma _{{e_{s{s_1}}}}^2{\rho _{_s}} + 1}} < \theta } \right) \\ & = P_r\left( {{{\left| {{{\hat h}_{s{s_1}}}} \right|}^2} < \frac{{\theta (\sigma _{{e_{s{s_1}}}}^2{\rho _{_s}} + 1)}}{{{\rho _s}}}} \right) \\ &= {{\rm{e}}^{ - \frac{{\theta (\sigma _{{e_{s{s_1}}}}^2{\rho _s} + 1)}}{{{\lambda _{s{s_1}}}{\rho _{_s}}}}}} \end{split} \tag{F-1}

    By inserting (F-1) into (37), equation (38) can be acquired.

    \begin{split} {R_{S}} & = E\left[{ {1 \over 2}}{\log _2}(1 + \gamma _{{x_s}}^{s{s_1}})\right] \\ &= \frac{1}{{2\ln 2}}\int_0^\infty {\frac{{1 - {F_\theta }(\theta )}}{{1 + \theta }}{\rm{d}}\theta } \\ &= \frac{1}{{2\ln 2}}\int_0^\infty {\frac{1}{{1 + \theta }}{{\rm{e}}^{ - \frac{{\theta (\sigma _{{e_{s{s_1}}}}^2{\rho _s} + 1)}}{{{\lambda _{s{s_1}}}{\rho _{_s}}}}}}{\rm{d}}\theta } \\ &= - \frac{1}{{2\ln 2}}{{\rm{e}}^{ - \frac{{(\sigma _{{e_{s{s_1}}}}^2{\rho _s} + 1)}}{{{\lambda _{s{s_1}}}{\rho _{_s}}}}}}E_i\left( { - \frac{{(\sigma _{{e_{s{s_1}}}}^2{\rho _s} + 1)}}{{{\lambda _{s{s_1}}}{\rho _{_s}}}}} \right) \;\;\; \;\;\; \end{split} \tag{F-2}

    1PT and ST can also send messages to SR at the same time, but the SR will cause interference, so this case is considered in this paper.

  • [1]
    J. H. Zhao, X. K. Sun, Q. P. Li, et al., “Edge caching and computation management for real-time internet of vehicles: an online and distributed approach,” IEEE Transactions on Intelligent Transportation Systems, vol.22, no.4, pp.2183–2197, 2021. DOI: 10.1109/TITS.2020.3012966
    [2]
    H. H. Yang, J. C. Shang , J. J. Li, et al., “Multi-traffic targets tracking based on an improved structural sparse representation with spatial-temporal constraint,” Chinese Journal of Electronics, vol.31, no.2, pp.266–276, 2022. DOI: 10.1049/cje.2020.00.007
    [3]
    Y. K. Zheng, X. W. Li, H. Zhang, et al., “Overlay cognitive ABCom-NOMA-Based ITS: an in-depth secrecy analysis,” IEEE Transactions on Intelligent Transportation Systems, vol.24, no.2, pp.2217–2228, 2023. DOI: 10.1109/TITS.2022.3140325
    [4]
    M. Y. Wang, Y. Lin, Q. Tian, et al., “Transfer learning promotes 6G wireless communications: recent advances and future challenges,” IEEE Transactions on Reliability, vol.70, no.2, pp.790–807, 2021. DOI: 10.1109/TR.2021.3062045
    [5]
    G. Y. Liu, Y. H. Huang, N. Li, et al., “Vision, requirements and network architecture of 6G mobile network beyond 2030,” China Communications, vol.17, no.9, pp.92–104, 2020. DOI: 10.23919/JCC.2020.09.008
    [6]
    M. Chen and Y. Q. Yang, “Iterative interference cancellation for non-orthogonal multiple access system,” Chinese Journal of Electronics, vol.29, no.3, pp.540–546, 2020. DOI: 10.1049/cje.2020.03.009
    [7]
    Z. G. Ding, P. Z. Fan, G. K. Karagiannidis, et al., “NOMA assisted wireless caching: strategies and performance analysis,” IEEE Transactions on Communications, vol.66, no.10, pp.4854–4876, 2018. DOI: 10.1109/TCOMM.2018.2841929
    [8]
    Z. Y. Xu, Z. G. Sun , L. L. Guo, et al., “Joint spectrum sensing and spectrum access for defending massive SSDF attacks: A novel defense framework,” Chinese Journal of Electronics, vol.31, no.2, pp.240–254, 2022. DOI: 10.1049/cje.2021.00.090
    [9]
    Y. Z. Tan and B. R. Chen, “Joint channel estimation and power allocation for the CRS-NOMA,” Chinese Journal of Electronics, vol.29, no.1, pp.177–182, 2020.
    [10]
    S. Arzykulov, T. A. Tsiftsis, G. Nauryzbayev, et al., “Outage performance of cooperative underlay CR-NOMA with imperfect CSI,” IEEE Communications Letters, vol.23, no.1, pp.176–179, 2019. DOI: 10.1109/LCOMM.2018.2878730
    [11]
    L. Bai, L. N. Zhu, Q. Yu, et al., “Transmit power minimization for vector-perturbation based NOMA Systems: a sub-optimal beamforming approach,” IEEE Transactions on Wireless Communications, vol.18, no.5, pp.2679–2692, 2019. DOI: 10.1109/TWC.2019.2906909
    [12]
    M. S. Van Nguyen, D. T. Do, S. Al-Rubaye, et al., “Exploiting impacts of antenna selection and energy harvesting for massive network connectivity,” IEEE Transactions on Communications, vol.69, no.11, pp.7587–7602, 2021. DOI: 10.1109/TCOMM.2021.3106099
    [13]
    Z. Yang, Z. G. Ding, P. Z. Fan, et al., “On the performance of non-orthogonal multiple access systems with partial channel information,” IEEE Transactions on Communications, vol.64, no.2, pp.654–667, 2016. DOI: 10.1109/TCOMM.2015.2511078
    [14]
    H. C. Lu, X. D. Jiang, and C. W. Chen, “Distortion-aware cross-layer power allocation for video transmission over multi-user NOMA systems,” IEEE Transactions on Wireless Communications, vol.20, no.2, pp.1076–1092, 2021. DOI: 10.1109/TWC.2020.3030785
    [15]
    D. T. Do, A. T. Le, Y. W. Liu, et al., “User grouping and energy harvesting in UAV-NOMA system with AF/DF relaying,” IEEE Transactions on Vehicular Technology, vol.70, no.11, pp.11855–11868, 2021. DOI: 10.1109/TVT.2021.3116101
    [16]
    G. Li, H. L. Liu, G. J. Huang, et al., “Effective capacity analysis of reconfigurable intelligent surfaces aided NOMA network,” EURASIP Journal on Wireless Communications and Networking, vol.2021, no.1, article no.198, 2021. DOI: 10.1186/s13638-021-02070-7
    [17]
    W. J. Xu, X. Li, C. H. Lee, et al., “Joint sensing duration adaptation, user matching, and power allocation for cognitive OFDM-NOMA Systems,” IEEE Transactions on Wireless Communications, vol.17, no.2, pp.1269–1282, 2018. DOI: 10.1109/TWC.2017.2777476
    [18]
    Z. Shi, C. M. Zhang, Y. R. Fu, et al., “Achievable diversity order of HARQ-Aided downlink NOMA systems,” IEEE Transactions on Vehicular Technology, vol.69, no.1, pp.471–487, 2020. DOI: 10.1109/TVT.2019.2950067
    [19]
    F. Lin, Z. Hu, S. J. Hou, et al., “Cognitive radio network as wireless sensor network (II): security consideration,” in Proceedings of 2011 IEEE National Aerospace and Electronics Conference, Dayton, OH, USA, pp.324–328, 2011.
    [20]
    H. Li, W. J. Zhao, C. Liu, et al., “A novel goodness of fit test spectrum sensing using extreme eigenvalues,” Chinese Journal of Electronics, vol.29, no.6, pp.1201–1206, 2020. DOI: 10.1049/cje.2020.10.007
    [21]
    S. Singh and M. Bansal,, “On the outage performance of overlay cognitive STBC-NOMA system with imperfect SIC,” IEEE Wireless Communications Letters, vol.10, no.11, pp.2587–2591, 2021. DOI: 10.1109/LWC.2021.3109444
    [22]
    P. Das and N. B. Mehta, “Direct link-aware optimal relay selection and a low feedback variant for underlay CR,” IEEE Transactions on Communications, vol.63, no.6, pp.2044–2055, 2015. DOI: 10.1109/TCOMM.2015.2432026
    [23]
    X. W. Li, Y. K. Zheng, M. D. Alshehri, et al., “Cognitive AmBC-NOMA IoV-MTS networks with IQI: reliability and security analysis,” IEEE Transactions on Intelligent Transportation Systems, vol.24, no.2, pp.2596–2607, 2023. DOI: 10.1109/TITS.2021.3113995
    [24]
    M. C. Filippou, D. Gesbert, and G. A. Ropokis, “A comparative performance analysis of interweave and underlay multi-antenna cognitive radio networks,” IEEE Transactions on Wireless Communications, vol.14, no.5, pp.2911–2925, 2015. DOI: 10.1109/TWC.2015.2396519
    [25]
    S. H. Wang, C. Y. Hsu, and Y. W. P. Hong, “Distributed exploitation of spectrum and channel state information for channel reservation and selection in interweave cognitive radio networks,” IEEE Transactions on Wireless Communications, vol.12, no.7, pp.3458–3472, 2013. DOI: 10.1109/TWC.2013.060313.121676
    [26]
    C. Lameiro, I. Santamaría, P. J. Schreier, et al., “Maximally improper signaling in underlay MIMO cognitive radio networks,” IEEE Transactions on Signal Processing, vol.67, no.24, pp.6241–6255, 2019. DOI: 10.1109/TSP.2019.2953665
    [27]
    A. Alizadeh, H. R. Bahrami, and M. Maleki, “Performance analysis of spatial modulation in overlay cognitive radio communications,” IEEE Transactions on Communications, vol.64, no.8, pp.3220–3232, 2016. DOI: 10.1109/TCOMM.2016.2581817
    [28]
    S. Kashyap and N. B. Mehta, “SEP-optimal transmit power policy for peak power and interference outage probability constrained underlay cognitive radios,” IEEE Transactions on Wireless Communications, vol.12, no.12, pp.6371–6381, 2013. DOI: 10.1109/TWC.2013.111013.130615
    [29]
    J. H. Zhao, S. J. Ni, L. H. Yang, et al., “Multiband cooperation for 5G HetNets: a promising network paradigm,” IEEE Vehicular Technology Magazine, vol.14, no.4, pp.85–93, 2019. DOI: 10.1109/MVT.2019.2935793
    [30]
    Y. W. Liu, Z. G. Ding, M. Elkashlan, et al., “Nonorthogonal multiple access in large-scale underlay cognitive radio networks,” IEEE Transactions on Vehicular Technology, vol.65, no.12, pp.10152–10157, 2016. DOI: 10.1109/TVT.2016.2524694
    [31]
    L. W. Wei, T. Jing, X. Fan, et al., “The secrecy analysis over physical layer in NOMA-enabled cognitive radio networks,” in Proceedings of 2018 IEEE International Conference on Communications, Kansas City, MO, USA, pp.1–6, 2018.
    [32]
    L. Bariah, S. Muhaidat, and A. Al-Dweik, “Error performance of NOMA-based cognitive radio networks with partial relay selection and interference power constraints,” IEEE Transactions on Communications, vol.68, no.2, pp.765–777, 2020. DOI: 10.1109/TCOMM.2019.2921360
    [33]
    L. Lv, L. Yang, H. Jiang, et al., “When NOMA meets multiuser cognitive radio: opportunistic cooperation and user scheduling,” IEEE Transactions on Vehicular Technology, vol.67, no.7, pp.6679–6684, 2018. DOI: 10.1109/TVT.2018.2805638
    [34]
    A. H. Bastami, “NOMA-based spectrum leasing in cognitive radio network: power optimization and performance analysis,” IEEE Transactions on Communications, vol.69, no.7, pp.4821–4831, 2021. DOI: 10.1109/TCOMM.2021.3069866
    [35]
    H. F. Shuai, K. F. Guo, K. An, et al., “NOMA-based integrated satellite terrestrial networks with relay selection and imperfect SIC,” IEEE Access, vol.9, pp.111346–111357, 2021. DOI: 10.1109/ACCESS.2021.3103944
    [36]
    X. M. Chen, R. D. Jia, and D. W. K. Ng, “On the design of massive non-orthogonal multiple access with imperfect successive interference cancellation,” IEEE Transactions on Communications, vol.67, no.3, pp.2539–2551, 2019. DOI: 10.1109/TCOMM.2018.2884476
    [37]
    X. M. Chen and C. Yuen, “On interference alignment with imperfect CSI: characterizations of outage probability, Ergodic rate and SER,” IEEE Transactions on Vehicular Technology, vol.65, no.1, pp.47–58, 2016. DOI: 10.1109/TVT.2015.2397000
    [38]
    T. H. Yang, R. Q. Zhang, X. Cheng, et al., “Secure massive MIMO under imperfect CSI: performance analysis and channel prediction,” IEEE Transactions on Information Forensics and Security, vol.14, no.6, pp.1610–1623, 2019. DOI: 10.1109/TIFS.2018.2883150
    [39]
    W. U. Khan, X. W. Li, A. Ihsan, et al., “NOMA-enabled optimization framework for next-generation small-cell IoV networks under imperfect SIC decoding,” IEEE Transactions on Intelligent Transportation Systems, vol.23, no.11, pp.22442–22451, 2022. DOI: 10.1109/TITS.2021.3091402
    [40]
    M. W. Akhtar, S. A. Hassan, S. Saleem, et al., “STBC-aided cooperative NOMA with timing offsets, imperfect successive interference cancellation, and imperfect channel state information,” IEEE Transactions on Vehicular Technology, vol.69, no.10, pp.11712–11727, 2020. DOI: 10.1109/TVT.2020.3017249
    [41]
    Y. S. Sun, Z. G. Ding, and X. C. Dai, “On the outage performance of network NOMA (N-NOMA) modeled by Poisson line cox point process,” IEEE Transactions on Vehicular Technology, vol.70, no.8, pp.7936–7950, 2021. DOI: 10.1109/TVT.2021.3095350
    [42]
    H. Xiao, H. Jiang, F. R. Shi, et al., “Energy-efficient resource allocation in radio-frequency-powered cognitive radio network for connected vehicles,” IEEE Transactions on Intelligent Transportation Systems, vol.22, no.8, pp.5426–5436, 2021. DOI: 10.1109/TITS.2020.3026746
    [43]
    Z. Yang, J. A. Hussein, P. Xu, et al., “Performance study of cognitive relay NOMA networks with dynamic power transmission,” IEEE Transactions on Vehicular Technology, vol.70, no.3, pp.2882–2887, 2021. DOI: 10.1109/TVT.2021.3060127
    [44]
    B. Li, X. H. Qi, K. Z. Huang, et al., “Security-reliability tradeoff analysis for cooperative NOMA in cognitive radio networks,” IEEE Transactions on Communications, vol.67, no.1, pp.83–96, 2019. DOI: 10.1109/TCOMM.2018.2873690
    [45]
    L. P. Luo, Q. Z. Li, and J. L. Cheng, “Performance analysis of overlay cognitive NOMA systems with imperfect successive interference cancellation,” IEEE Transactions on Communications, vol.68, no.8, pp.4709–4722, 2020. DOI: 10.1109/TCOMM.2020.2992471.(查阅网上资料,本条与第18条文献重复,请确认)
    [46]
    A. V. and B. A. V., “Performance analysis of NOMA-based underlay cognitive radio networks with partial relay selection,” IEEE Transactions on Vehicular Technology, vol.70, no.5, pp.4615–4630, 2021. DOI: 10.1109/TVT.2021.3071338
    [47]
    D. T. Do, T. A. Le, T. N. Nguyen, et al., “Joint impacts of imperfect CSI and imperfect SIC in cognitive radio-assisted NOMA-V2X communications,” IEEE Access, vol.8, pp.128629–128645, 2020. DOI: 10.1109/ACCESS.2020.3008788
    [48]
    D. T. Do, M. S. van Nguyen, M. Voznak, et al., “Performance analysis of clustering car-following V2X system with wireless power transfer and massive connections,” IEEE Internet of Things Journal, vol.9, no.16, pp.14610–14628, 2022. DOI: 10.1109/JIOT.2021.3070744
    [49]
    X. W. Li, Q. S. Wang, M. Liu, et al., “Cooperative wireless-powered NOMA relaying for B5G IoT networks with hardware impairments and channel estimation errors,” IEEE Internet of Things Journal, vol.8, no.7, pp.5453–5467, 2021. DOI: 10.1109/JIOT.2020.3029754
    [50]
    X. W. Li, J. J. Li, Y. W. Liu, et al., “Residual transceiver hardware impairments on cooperative NOMA networks,” IEEE Transactions on Wireless Communications, vol.19, no.1, pp.680–695, 2020. DOI: 10.1109/TWC.2019.2947670
    [51]
    Q. Q. Zhang, L. Zhang, Y. C. Liang, et al., “Backscatter-NOMA: a symbiotic system of cellular and internet-of-things networks,” IEEE Access, vol.7, pp.20000–20013, 2019. DOI: 10.1109/ACCESS.2019.2897822
  • Related Articles

    [1]CHEN Min, YANG Yongqin. Iterative Interference Cancellation for Non-orthogonal Multiple Access System[J]. Chinese Journal of Electronics, 2020, 29(3): 540-546. DOI: 10.1049/cje.2020.03.009
    [2]LIU Jingsen, LIU Li, LI Yu. A Differential Evolution Flower Pollination Algorithm with Dynamic Switch Probability[J]. Chinese Journal of Electronics, 2019, 28(4): 737-747. DOI: 10.1049/cje.2019.04.008
    [3]TANG Kun, SHI Ronghua, GUO Yabo, SHI Heyuan, DONG Jian. An Adaptive Transmission Scheme in Cooperative Relay Networks with Energy Accumulation[J]. Chinese Journal of Electronics, 2019, 28(1): 152-161. DOI: 10.1049/cje.2018.08.002
    [4]PAN Ziyu, ZHU Qi, LIANG Guangjun, HU Han. Coverage Probability and Average Rate of Uplink Cellular Networks Based on a 3-D Model[J]. Chinese Journal of Electronics, 2018, 27(5): 1098-1103. DOI: 10.1049/cje.2018.06.017
    [5]LIU Shuai, SUN Dechun, LIU Zujun, YI Kechu, YANG Hong, WANG Kan. Outage Performance of Cognitive AF Relay Networks with Imperfect CSI Based on Geometrical Analysis[J]. Chinese Journal of Electronics, 2017, 26(5): 1048-1056. DOI: 10.1049/cje.2017.04.008
    [6]ZHANG Jun, TIAN Hui. An Isotropic SPPP Model for Femtocells Networks with Outage Probability Constraints[J]. Chinese Journal of Electronics, 2015, 24(4): 824-831. DOI: 10.1049/cje.2015.10.027
    [7]LIANG Hui, ZHAO Xiaohui. Primary User QoS and Activity Concerned Resource Allocation Algorithm in OFDM Based Cognitive Radio System[J]. Chinese Journal of Electronics, 2013, 22(1): 167-172.
    [8]LI Weihua and JIAO Bingli. On the Outage Capacity of MIMO Systems withPeriodic Feedback[J]. Chinese Journal of Electronics, 2010, 19(2): 333-338.
    [9]WU Zhuang, YANG Yang, GUO Xun, AN Jianwei. Analysis of Collision Probability in IEEE 802.11Based VANETs[J]. Chinese Journal of Electronics, 2010, 19(1): 187-190.
    [10]ZOU Yulong, ZHENG Baoyu, ZHOU Liang. An Opportunistic Cooperation Scheme in Wireless Networks: When to Cooperate with the Relay?[J]. Chinese Journal of Electronics, 2009, 18(2): 361-367.
  • Cited by

    Periodical cited type(18)

    1. Chen, X., Shi, J., Zhu, J. et al. General Low-complexity Beamforming Designs for Reconfigurable Intelligent Surface-aided Multi-user Systems | [智能超表面辅助多用户系统的通用低复杂度波束成形设计]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2025, 47(1): 128-137. DOI:10.11999/JEIT240051
    2. Zhu, Z., Yang, C., Li, Z. et al. Resource Allocation Algorithm for Intelligent Reflecting Surface-assisted Secure Integrated Sensing And Communications System | [智能反射面辅助通感一体化系统安全资源分配算法]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2025, 47(1): 66-74. DOI:10.11999/JEIT240083
    3. Ren, Q., Lin, S., Cai, Y. et al. Resource Allocation and Slicing Strategy for Multiple Services Co-Existence in Wireless Train Communication Network. IEEE Transactions on Wireless Communications, 2025, 24(1): 401-414. DOI:10.1109/TWC.2024.3493240
    4. Sheng, X.. Effective capacity of STAR-RIS assisted RSMA network with imperfect SIC. Physical Communication, 2024. DOI:10.1016/j.phycom.2024.102449
    5. Herich, D., Vaščák, J. The Evolution of Intelligent Transportation Systems: Analyzing the Differences and Similarities between IoV and IoFV. Drones, 2024, 8(2): 34. DOI:10.3390/drones8020034
    6. Peng, H., Liu, M., Yang, L. et al. Ambient Backscatter Communication Symbiotic Intelligent Transportation Systems: Covertness Performance Analysis and Optimization. IEEE Transactions on Consumer Electronics, 2024, 70(1): 1833-1844. DOI:10.1109/TCE.2023.3329675
    7. Ananth Kumar, M.S.. Bio-inspired Hybrid Lyrebird Optimization based Power Allocation and Relay-Selection Scheme. Proceedings of SPIE - The International Society for Optical Engineering, 2024. DOI:10.1117/12.3030079
    8. Zhou, Y., Deng, F., Li, S. Jointly Active/Passive Beamforming Optimization for Intelligent-Reflecting Surface-Assisted Cognitive-IoT Networks. Electronics (Switzerland), 2024, 13(2): 299. DOI:10.3390/electronics13020299
    9. Li, X., Zhang, J., Han, C. et al. Reliability and Security of CR-STAR-RIS-NOMA-Assisted IoT Networks. IEEE Internet of Things Journal, 2024, 11(17): 27969-27980. DOI:10.1109/JIOT.2023.3340371
    10. Menaa, S., Khelil, A., Rabie, K.M. et al. On the ergodic capacity of MIMO-NOMA systems with JTRAS protocol under imperfect SIC and CSI. International Journal of Electronics, 2024, 111(10): 1760-1779. DOI:10.1080/00207217.2023.2240077
    11. Li, J., Ma, X., Ye, F. et al. Physical layer security of single-input multiple-out relay networks over Beaulieu-Xie fading channels. IET Communications, 2023, 17(16): 1928-1939. DOI:10.1049/cmu2.12663
    12. Li, X., Gao, X., Shaikh, S.A. et al. NOMA-based cognitive radio network with hybrid FD/HD relay in industry 5.0. Journal of King Saud University - Computer and Information Sciences, 2023, 35(6): 101363. DOI:10.1016/j.jksuci.2022.08.013
    13. Kumar, M., Dohare, U., Kumar, S. et al. Blockchain Based Optimized Energy Trading for E-Mobility Using Quantum Reinforcement Learning. IEEE Transactions on Vehicular Technology, 2023, 72(4): 5167-5180. DOI:10.1109/TVT.2022.3225524
    14. Bachan, P., Agarwal, D. Outage and Throughput Performance of NOMA Inspired Cognitive IoT Network with Imperfect SIC. 2023. DOI:10.1109/CISCT57197.2023.10351319
    15. Li, Y., Huang, H., Zhang, N. et al. Non-Orthogonal Multiple Access Techniques for Future Wireless Networks: Challenges, Applications and Emerging Directions. 2023. DOI:10.1109/Ucom59132.2023.10257635
    16. Islam, S., Budati, A.K., Hasan, M.K. et al. Sustainable Non-Cooperative User Detection Techniques in 5G Communications for Smart City Users. Sustainability (Switzerland), 2023, 15(1): 118. DOI:10.3390/su15010118
    17. Zhang, G., Chen, K., Ma, C. et al. Decision fusion for multi-route and multi-hop Wireless Sensor Networks over the Binary Symmetric Channel. Computer Communications, 2022. DOI:10.1016/j.comcom.2022.09.025
    18. Zhang, Y., He, W., Li, X. et al. Covert Communication in Downlink NOMA Systems With Channel Uncertainty. IEEE Sensors Journal, 2022, 22(19): 19101-19112. DOI:10.1109/JSEN.2022.3201319

    Other cited types(0)

Catalog

    Figures(7)  /  Tables(1)

    Article Metrics

    Article views (1593) PDF downloads (129) Cited by(18)
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return