SlideShare a Scribd company logo
Indonesian Journal of Electrical Engineering and Computer Science
Vol. 21, No. 2, February 2021, pp. 886~894
ISSN: 2502-4752, DOI: 10.11591/ijeecs.v21.i2.pp886-894  886
Journal homepage: http://ijeecs.iaescore.com
Performance enhancement of wireless sensor network by using
non-orthogonal multiple access and sensor node selection
schemes
Duy Hung Ha1
, Dac-Binh Ha2
, Van-Truong Truong3
, Van-Duc Phan4
, Q. S. Vu5
1
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang
University, Ho Chi Minh City, Vietnam
2,3
Faculty of Electrical-Electronic Engineering, Duy Tan University, Da Nang, Vietnam
4
Faculty of Automobile Technology, Van Lang University, Ho Chi Minh City, Vietnam
5
School of Engineering-Technology & Arts, Hong Bang International University, Ho Chi Minh City, Vietnam
Article Info ABSTRACT
Article history:
Received Jun 4, 2020
Revised Aug 3, 2020
Accepted Aug 11, 2020
In this paper, we investigate a relaying wireless sensor network (WSN) with
the non-orthogonal multiple access (NOMA) and sensor node selection
schemes over rayleigh fading. Precisely, the system consists of two sensor
clusters, a sink node, and an amplify-and-forward (AF) relay. These sensors
applying the NOMA and sensor node selection schemes transmit the sensing
data from the sensor clusters via the relay to the sink. We derived the
expressions of outage probability and throughput for two sensor nodes. We
also provide numerical results to examine the behavior of the system. Finally,
we verify the validity of our analysis by using the monte-carlo simulation.
Keywords:
Amplify-and-forward
Best sensor node selection
NOMA
Outage probability
Throughput
WSN
This is an open access article under the CC BY-SA license.
Corresponding Author:
Dac-Binh Ha
Faculty of Electrical-Electronic Engineering
Duy Tan University, Da Nang, Vietnam
Email: hadacbinh@duytan.edu.vn
1. INTRODUCTION
In the last decades, wireless sensor networks (WSN) have been widely applied in many fields, such
as monitoring environmental parameters in industry and agriculture, smart transport, smart grids, wearable
medical care devices [1-3]. The main advantage of wireless sensor networks is that the use of existing
infrastructure may not incur additional costs of wiring and equipment, and further, the cloud availability and
IoT protocol for a fast connection. However, WSN also contains many problems that need to be addressed,
typically data transmission between devices in the network when the scale of the network becomes very large
with a massive amount of data [4]. The non-orthogonal multiple access (NOMA) technique was proposed as
the best solution to solve the above problem when satisfying the very high data rate and massive connectivity
demand both in uplink and downlink transmissions [5-7]. NOMA can support multiple users at the same time
and the same frequency resource. In WSN, the uplink channel plays a critical role, as this is the path that the
sensors used to perform the task of transmitting the data they collect to the sink node. However, studies on
WSN using uplink NOMA are still relatively small [8-12]. In [8], the authors proposed WSN to use the
uplink NOMA application to measure parameters in agriculture. The sensors are divided into clusters and use
short-range multi-hop communication technology to transfer data to the sink node. The authors used the sum
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 
Performance enhancement of wireless sensor network by using non-orthogonal multiple… (Duy Hung Ha)
887
data rate and outage probability to examine the performance of the system. In [9], the uplink NOMA
multiuser model was proposed.
The base station is equipped with N antennas, and each user equipment unit has a single antenna, the
users are divided into two groups: robust set and weak set depending on the channel status. The paper
proposes that the power control scheme can maximize the sum capacity with a minimum target rate. Another
common problem with WSN is the transmission distance in the network. The sensor nodes located at the
network edge can only communicate with neighboring nodes and need support from the relay to
communicate with the sink node. Transition techniques combined with NOMA helps solve this problem in
WSN [13-25]. In [13], the authors proposed the uplink NOMA model for two users with the support of the
decode-and-forward relay to communicate with the base station. The paper goes into system analysis by
providing formulas for system probability and throughput based on critical parameters such as signal to noise
ratio, transmission power. In [16], two users communicated with the base station simultaneously with the
existence of a half-duplex relay employing the decode-and-forward scheme to assist the far user. With the
given target data rates, the authors proposed the method to determine the most optimal power allocation
factors.
Different from previous studies, in this study, we propose a NOMA scenario for the uplink of two
sensor node clusters, in which the two sensors apply the uplink NOMA scheme to transmit their information
to the sink via the AF relay. The proposed model uses the best combination of direct link and forward-link
selection mechanism based on the maximum signal to end-to-end noise ratio. To analyze the performance of
this system, we derive expressions of the outage probability and throughput by using the Gaussian-
Chebyshev quadratic. The numerical results will be calculated according to the main parameters:
transmission power, the number of sensor nodes to find ways to improve the performance of this system.
The remainder of this research can be formulated as follows. Section 2 presents the system model.
Section 3 analyzes the system performance. Section 4 shows the numerical results with some discussions.
Finally, Section 5 concludes the study.
2. SYSTEM MODEL
We consider an uplink NOMA relaying system for WSN as Figure 1. This system consists of two
sensor clusters P with N sensor nodes and Q with M sensor nodes, a relay node, and a sink. Two sensor nodes
selected respectively from P and Q transmit their messages to the sink node (S) with the help of a single AF
R. Assuming that the sensing data, i.e., confidential data, video data, from P is more important than the data,
i.e., humidity, temperature, from Q. Therefore, the best sensor node is selected from P (SNP*), meantime, the
sensor node of Q (SNQ) is randomly chosen to transmit their data to S via R. All sensor nodes, relay, and
sink have single-antenna and work in half-duplex mode. Suppose R has sufficient channel information from
the sensor cluster, thus according to the maximum channel power gain, R assigns a sensor node as the best
node SNP* from P to send sensing data to it.
Figure 1. System model
The proposed operating protocol for this system is given as follows:
Phase 1: SNP* and SNQ simultaneously transmit their signals (s1, s2) to R during the period of T/2, where T
denotes as transmission block time.
 ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 2, February 2021 : 886 - 894
888
Phase 2: During the remaining T/2 period, R amplifies and forwards the signal received from SNP* and
SNQ to S. Finally, S uses the successive interference cancellation (SIC) to detect the signal of SNP* and
SNQ to obtain the information of each node.
We describe in detail each phase mathematically as follows.
Phase 1: Apply NOMA scheme, SNP*, and SNQ simultaneously to transmit their signals (s1, s2) to R by using
their transmit power on the same frequency in the same period T/2.
The signal received at R has the following form:
1 2
1 1 1 2 2 1
1 2
,
P P
y h s h s n
d d
 
  
(1)
where hk (k = {1, 2}) are Rayleigh fading channel coefficients of links from SNP* and SNQ to R, respectively,
n1 is AWGN with zero mean and the variance of
2
 ,
2
2 ~ (0, )
n CN 
, d1 and d2 are the Euclidean distances of
SNP* and SNQ to R, respectively, and  represents the path-loss exponent.
Phase 2: Applying the AF scheme, the transmission signal at R has the transmission power PR can be
formulated by,
1.
R
y Gy

(2)
In particular, G is the relaying gain of the AF relay R, which is defined by the fact that the P3
bounds the transfer power of the relay. Therefore, G is given by,
3
2 2 2
1 1 1 2 2 2
.
| | / | | /
P
G
P h d P h d
 


 
(3)
Therefore, the signal received at S is written as,
3 1 2
2 1 1 2 2 1 2
2 2
3
,
Gh P P
y h s h s n n
d d
d
 

 
   
 
 
  (4)
where h3 and d3 are the Rayleigh fading channel coefficient and Euclidean distance of R and S, respectively
2
2 ~ (0, )
n CN 
.
Finally, S applies SIC to detect the signals of SNP* and SNQ. The process is as follows: s1 will be
detected first due to better channel condition, then separation of signal s2 by subtracting s1 from y2. The
instantaneous SINR for detecting s1 at S is given by,
 
1
2 2
2
1 1 3 1 3
2 2
2 2 2
2 2 2 3 3
2 2
1 3 1 3
2 2 2 2 2
2 3 2 3 1 1 2 2 3 3
/
/ /
,
1
s
PG h h d d
G P h d h d
h h
h h h h h
 
 

 
 
    

 

   
(5)
where
1 2 3
1 2 3
2 2 2
1 2 3
, , .
P P P
d d d
  
  
  
  
After subtracting s1 from y2, we obtain instantaneous SINR to detect s2 at S as follows,
2
2 2
2 3 2 3
2 2 2
1 1 2 2 3 3
.
1
s
h h
h h h
 

  

  
(6)
The Probability Density Function (PDF) and Cumulative Distribution Function (CDF) functions of
the random variable Xi (i = {1, 2}) are calculated as, respectively,
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 
Performance enhancement of wireless sensor network by using non-orthogonal multiple… (Duy Hung Ha)
889
 
1
.
i
i
x
X
i
f x e 



(7)
  1 .
i
i
x
X
F x e 

 
(8)
Meanwhile, due to selecting the best channel of links P-R, the CDF and PDF of channel power gain
 
2
1 1
1
max i
i N
Y h
 

is given as follows,
   
1 1
1
0
1 1 ,
N
x ix
N
i
Y
i
N
F x e e
i
 
 

   
   
   
   
 

(9)
   
1 1 1
1
1 ( 1)
1
0
1 1
1
1 1 .
N i x
x x N
i
Y
i
N
N N
f x e e e
i
  
 
 

  

  
 
   
   
   
 

(10)
For the later calculation, we obtain the expression of CDF for
1 1
1
2 2 1
Y
U
X




as follows:
  1 1
1
1 1 1 1
1
2 2 1 1 2 2
Pr 1 ( 1) .
1
ix
N
i
U
i
N
Y
F x x e
i
X i x
 
 
   


   
    
   
   
 

(11)
 
 
1 1
1
1 1 1 2 2
2
1 1 1 2 2
1 1 2 2
1
( 1) .
ix
N
i
U
i
N
f x ie
i i x
i x
 
  
  
  



 
 
 
  
   


   

(12)
3. PERFORMANCE ANALYSIS
The outage probability Pout for detection of s1 and s2 are expressed as follows, respectively:
1
1
2
Pr 2 1
s
out s t
P  

 
   
 
  (13)
 
2
2
Pr
s
out s t
P  
 
(14)
Theorem 1.
Under quasi-static Rayleigh fading, the closed-form expression of Pout to detect s1 for this considered system
is given by,
 
1 1 3 3 1 1
1
1
2
1 1 2 2 1 1 2 2 2 2
2
1 1 1 1 2 2 2 2
1 ( 1) 1 ,
2
t
l
i i
N L
s i l l t l
out l
i l l t l l
N i i
P ie e a
i
L i i


      
             
         
 
 
 
 
 
 
 
    
   
 
 
 
 
   
 
(15)
where
1
ln ,
2
l
l
a



 
3 3
1
t t
 

 


,
2 1
cos
2
l
l
a
L


 
  
  .
Proof: See Appendix A.
Theorem 2.
Using quasi-static Rayleigh fading, the closed-form expression of the outage probability to detect s2 for this
considered system is given by
 ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 2, February 2021 : 886 - 894
890
 
2 2
2 2 3 3
2
1 1 2
2 1
3 3
2
0 1
2 2 1 1 3 3
1 1
1 ( 1) .
2 ( 1)
l
t N L
l
s i
out
i l l t l
N e a
N
P e
i
L i

  

   
  
        
 

 
 
 
 
 
 
 
  
 
 
 
 
(16)
Proof: See Appendix B.
The expressions of throughput for SNP* and SNQ are formulated as,
 
1
1
1
.
2
s
out
P

 

(17)
 
2
2
1
.
2
s
out
P

 

(18)
From (15)-(18), the closed-form expressions for SNP* and SNQ can be calculated, respectively.
4. NUMERICAL RESULTS AND DISCUSSION
We use the Monte Carlo simulation to verify the numerical results on the impact of key system
parameters, i.e., transmit power, number of sensor nodes, on the system performance [21-25]. The primary
simulation parameters are presented in Table 1. From Table 1, the distances of SNP* and SNQ to R and from
R to S are calculated as follows:
Table 1. Simulation parameters
Parameters Notation Typical Values
Environment Rayleigh
Transmit power of sensor nodes P1, P2 5, 10 dBm
Transmit power of the relay P3 0-20 dBm
The minimum required data rate  1 bps/Hz
The coordinate of S {x0, y0} {0,0}
The coordinate of SNP* {x1, y1} {1,0}
The coordinate of SNQ {x2, y2} {0,1}
The coordinate of R {x3, y3} {0.5,0.5}
The path-loss exponent  2
The parameters of the exponential distribution  1
Number of sensor nodes of P N 2, 4, 6
Number of sensor nodes of Q M 1
The complexity-vs-accuracy trade-off coefficient L 100
2 2
1 1 3 1 3
( ) ( )
d x x y y
   
(19)
2 2
2 2 3 2 3
( ) ( )
d x x y y
   
(20)
2 2
3 0 3 0 3
( ) ( )
d x x y y
   
(21)
Figure 2 depicts the outage probability Pout versus the transmit power of relay by varying the
transmit power of sensor nodes. As we observe from this Figure 2 that Pout to detect s1 and s2 decreases when
the transmit power increases. It means that the system performance can be improved by increasing the power
at the relay. However, the impact of transmit power of sensor nodes on the system performance is quite
different. Correctly, when increasing P1 we can see that
1
s
out
P
decreases and
2
s
out
P
increases, on the contrary,
1
s
out
P
increases and
2
s
out
P
decreases when P2 increases. It is explained that when increasing P1 the interference
affected the detection of s2 at S is much more serious; thus, it makes
2
s
out
P
increases. It is similar to the case of
increasing P2.
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 
Performance enhancement of wireless sensor network by using non-orthogonal multiple… (Duy Hung Ha)
891
Figure 3 depicts the flux of SNP* and SNQ (τ1 and τ2) versus P3 with different transmit power of
sensor clusters. We see that τ1 and τ2 increase with increasing P3. It means that the performance of the system
improves as the transmit power at the relay node R increases. Figure 3 also shows that when the transmit
power of sensor cluster P decreases, the throughput τ1 decreases while the throughput τ2 increases.
Furthermore, vice versa, when reducing the transmit power of sensor cluster Q, the throughput τ2 decreases,
while throughput τ1 increases.
Figure 2. Pout versus the transmit power P3 with
different P1 and P2 (P1, P2)
Figure 3. Throughput  versus the transmit power P3
with different P1 and P2 (P1, P2)
Figure 4 and Figure 5 depict the effect of the number of sensor nodes at the sensor cluster P on the
outage probability and throughput, respectively. The results once again confirm that when increasing the
transmit power at R, the system performance improves, as the Pout decreases and τ increases.
Figure 4. Pout versus the transmit power P3 with different N
Figure 4 draws the increase in the number of sensor nodes N,
1
s
out
P
decreases, and
2
s
out
P
increases. This
can be explained as the more sensor nodes at P, and the more likely the system is to find the best sensor node
to carry out the data transmission of the sensor cluster P. The better the signal from the sensor cluster P, the
more interference it will generate for the sensor cluster Q, resulting in
2
s
out
P
increases.
 ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 2, February 2021 : 886 - 894
892
As shown in Figure 5, the number of sensor nodes N increases, τ1 increases, and τ2 decreases,
meaning that the performance of the sensor cluster P is improved while the performance of the sensor cluster
Q is worse. This conclusion is also consistent with the results obtained from Figure 5.
Figure 5. Throughput  versus the transmit power P3 with different N
5. CONCLUSION
In this work, we have investigated the multiuser uplink NOMA wireless sensor network with the
best user selection scheme. The closed-form expressions of the system performance are derived. The results
show that the system performance can be improved by increasing the transmit power at the relay. Increasing
the number of sensor nodes at the sensor cluster P helps improve its performance but causes a decrease in the
performance of the sensor cluster Q. The Monte Carlo simulation is conducted for validating the numerical
results. In future studies, we will expand the system model with multi-relay.
REFERENCES
[1] Alam, M. M., Hamida, E. B., Rehmani, M., & Pathan, A. “Wearable wireless sensor networks: Applications,
standards, and research trends.” In Emerging Communication Technologies Based on Wireless Sensor Networks:
Current Research and Future Applications, pp. 59-88, 2016.
[2] Kurt, S., Yildiz, H. U., Yigit, M., Tavli, B., & Gungor, V. C. “Packet size optimization in wireless sensor networks
for smart grid applications.” IEEE Transactions on Industrial Electronics, vol. 64, no.3, pp. 2392-2401, 2016.
[3] Noel, A. B., Abdaoui, A., Elfouly, T., Ahmed, M. H., Badawy, A., & Shehata, M. S. “Structural health monitoring
using wireless sensor networks: A comprehensive survey.” IEEE Communications Surveys & Tutorials, vol. 19, no.
3, pp. 1403-1423, 2017.
[4] Harb, H., Idrees, A. K., Jaber, A., Makhoul, A., Zahwe, O., & Taam, M. A. “Wireless sensor networks: A big data
source in Internet of Things.” International Journal of Sensors Wireless Communications and Control, vol. 7, no. 2,
pp. 93-109, 2017.
[5] Z. Zhang, H. Sun, and R. Q. Hu, “Downlink and uplink non-orthogonal multiple access in a dense wireless
network,” IEEE J. Sel. Areas Commun., vol. 35, no. 12, pp. 2771-2784, 2017.
[6] L. Dai, B. Wang, Y. Yuan, S. Han, C. I, and Z. Wang, “Non-orthogonal multiple access for 5G: solutions,
challenges, opportunities, and future research trends,” IEEE Commun. Mag., vol. 53, no. 9, pp. 74-81, 2015.
[7] Z. Ding, M. Peng, and H. V. Poor, “Cooperative non-orthogonal multiple access in 5G systems,” IEEE Commun.
Lett., vol. 19, no. 8, pp. 1462-1465, 2015.
[8] Hu, Z., Xu, L., Cao, L., Liu, S., Luo, Z., Wang, J., & Wang, L. “Application of Non-Orthogonal Multiple Access in
Wireless Sensor Networks for Smart Agriculture.” IEEE Access, vol. 7, pp. 87582-87592, 2019.
[9] Kim, B., Chung, W., Lim, S., Suh, S., Kwun, J., Choi, S., & Hong, D. “Uplink NOMA with multi-antenna.” In
2015 IEEE 81st vehicular technology conference (VTC Spring), pp. 1-5, 2019.
[10] Mouapi, A.; Hakem, N. A New Approach to Design Autonomous Wireless Sensor Node Based on RF Energy
Harvesting System. Sensors 2018, 18, 133, doi:10.3390/s18010133.
[11] Liu, L., Sheng, M., Liu, J., Dai, Y., & Li, J. “Stable Throughput Region and Average Delay Analysis of Uplink NOMA
Systems With Unsaturated Traffic.” IEEE Transactions on Communications, vol. 67, no. 12, pp. 8475-8488, 2019.
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 
Performance enhancement of wireless sensor network by using non-orthogonal multiple… (Duy Hung Ha)
893
[12] Shin, W., Yang, H., Vaezi, M., Lee, J., & Poor, H. V. “Relay-aided NOMA in uplink cellular networks.” IEEE
Signal Processing Letters, vol. 24, no. 12, pp. 1842-1846, 2017.
[13] Truong, V. T., Vo, M. T., Lee, Y., & Ha, D. B. “Amplify-and-Forward Relay Transmission in Uplink Non-
Orthogonal Multiple Access Networks.” In 2019 6th NAFOSTED Conference on Information and Computer
Science (NICS), pp. 1-6, 2019.
[14] Tran, D. D., Ha, D. B., So-In, C., Tran, H., Nguyen, T. G., Baig, Z. A., & Sanguanpong, S. “ Performance Analysis
of DF/AF Cooperative MISO Wireless Sensor Networks With NOMA and SWIPT Over Nakagami-$ m $ Fading.”
IEEE Access, vol. 6, pp. 56142-56161, 2018.
[15] Liu, H., Miridakis, N. I., Tsiftsis, T. A., Kim, K. J., & Kwak, K. S. “ Coordinated uplink transmission for
cooperative NOMA systems.” In 2018 IEEE Global Communications Conference (GLOBECOM,) pp. 1-6, 2018.
[16] Abdel-Razeq, S., Zhou, S., Bansal, R., & Zhao, M. “Uplink NOMA transmissions in a cooperative relay network
based on statistical channel state information.” IET Communications, vol. 13, no. 4, pp. 371-378, 2018.
[17] Kader, M. F., Shin, S. Y., & Leung, V. C. “Full-duplex non-orthogonal multiple access in cooperative relay sharing
for 5G systems.” IEEE Transactions on Vehicular Technology, vol. 67, no. 7, pp. 5831-5840, 2018.
[18] Lv, L., Chen, J., Ni, Q., Ding, Z., & Jiang, H. “Cognitive non-orthogonal multiple access with cooperative relaying: A
new wireless frontier for 5G spectrum sharing.” IEEE Communications Magazine, vpl. 56, no. 4, pp. 188-195, 2018.
[19] Santamaria, P. Raimondo, M. Tropea, F. D. Rango, and C. Aiello, “An IoT Surveillance System Based on a
Decentralised Architecture,” Sensors, vol. 19, no. 6, p. 1469, 2019.
[20] P. Fazio, M. Tropea, F. Veltri, and S. Marano, “A Novel Rate Adaptation Scheme for Dynamic Bandwidth
Management in Wireless Networks,” 2012 IEEE 75th Vehicular Technology Conference (VTC Spring), 2012.
Zeng Hu, Longqin Xu, Liang Cao, Shuangyin Liu, Zhijie Luo, Jing Wang, Xiangli Li, Lu Wang. "Application of
Non-Orthogonal Multiple Access in Wireless Sensor Networks for Smart Agriculture", IEEE Access, 2019.
[21] Duy-Hung Ha, Dac-Binh Ha, Jaroslav Zdralek, Miroslav Voznak. "Performance Analysis of Hybrid Energy
Harvesting AF Relaying Networks over Nakagami-m Fading Channels", 2018 International Conference on
Advanced Technologies for Communications (ATC), 2018.
[22] "Industrial Networks and Intelligent Systems", Springer Science and Business Media LLC, 2019.
[23] Van-Vinh Nguyen, Trong-Tuyen Tran, Vo Viet Tri, Van-Van Huynh, Hoang-Sy Nguyen, Miroslav Voznak.
"Power-Splitting Protocol Non-Orthogonal Multiple Access (NOMA) in 5G Systems", Proceedings of the Tenth
International Symposium on Information and Communication Technology - SoICT 2019, 2019.
[24] Dac-Binh Ha, Jai P. Agrawal. "Chapter 6 Performance Analysis for NOMA Relaying System in Next-Generation
Networks with RF Energy Harvesting", Intech Open, 2020.
APPENDIX
APPENDIX A: Proof of Theorem 1.
Here, the expression of Pout for SNP* can be formulated as
 
   
 
 
 
 
 
 
1 1 3 1 3
2 2 3 3 1 1 2 2
1 1 2 2 3 3 1 1 2 2
1 1 2 2
1 1 2 2 3 1 1 2 2
1 1 2 2 3
1 1
3
2 2
Pr
1 1
Pr 1 1
1
Pr 1 0 Pr , 1 0
1
Pr Pr
1
s
out t
t t
t
t t
t
t
t
Y X
P
X X Y X
Y X X Y X
Y X
Y X X Y X
Y X
Y
X
X
 

   
      
  
     
   




 
 
 
 
   
 
       
 
 
 
 
        
 
   
 
 
 
 
   
 

 
1 1
2 2 1 1
2 2
1 1
3
2 2
1
1
,
1
1
t
t
Y
X Y
X
Y
X

 



 

 
 

 
 

 
  
 

 
 

 
 

 
 
 
 
3 3 1 1
1
( ) 1 1 2 2
2
1 1 1 2 2
1 1 2 2
1
1 ( 1)
t
t
t
u i
N u
a
u
i
i
N
i e e du
i i u
i u

    

  
  
  

  


 
 
   
 
 


 
   
 
 
 
   
 
3 3 1 1
1 1 3 3
1 ( )
1 1 2 2
2
1 1 1 2 2
0 1 1 2 2
1
1 1 2 2 1 1 2 2 2 2
1 1 1 2 2
1
1 ( 1)
ln ln ln
1 ( 1)
ln
t t t
t
t i t
N
t
i
i t
t
i
N
b
t
i
i
N
i e e dt
i i t
i t
N z z i z i
ie
i z i
  
   

   
  
   
   
         

   
  
  

 
 
 
 
 

 
 
 
   
 
 
 
 
   
  
 
  
 

 
 

 
1 1
1 1 3 3
1 1
1
ln
2
0 2 2
1
1 1 2 2 1 1 2 2 2 2
2
1 1
1 1 2 2 2 2
ln ln
1 1 1
ln ln ln
2 2 2
1 ( 1)
2 1 1 1
ln ln ln
2 2 2
t
i
z
t
i i
l l l
N L
c t
i
i l l l l
t
e dz
z i z
a a a
i i
N ie
e
i L a a a
i i

 


   
 
  
         

      
 
 
 
 
 
 

 
  
 
  
   
  
   
  
 
 
 
 
 
 
 

 
1
ln
2
2
1 .
l
a
l
a


 ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 2, February 2021 : 886 - 894
894
APPENDIX B: Proof of Theorem 2.
Here, the expression of Pout for SNQ can be calculated by
 
 
   
 
2
2 3 2 1
2
1
3 3 2 2 1
2 3 2 3
1 1 2 2 3 3
1 2
2 3 2
0
1 ( 1)
1
0 1 2
0 0
Pr
1
1
1
1 ( 1)
1
1 ( 1
t
t t t
s
out t
t
t
X X X Y
t
y t t i y
t
N
i
i
X X
P
Y X X
y x
F F f x dyf y dx
x
N e
dydt
i
N
i


   
    
 

  
  

   
 
 
    
  
 


 
 
 
  
 
 
 
 
   
   

   

 
  
 
 

 
  
 
 
 
 
 
 
1
3 3 2 2
3 3 1
2 2 3 3 3 3 2 2
1
1
1
0 1 2
0 0
1
1 1
1
3 3
0 2 1 1 3 3
0
1
1
0
)
1
1 ( 1)
[ ( 1) ]
1
1 ( 1)
t t t
t
t t
t
t t
i
t
N y
t
i
i
t
N
t
i
i t
N
i
i
e
e dydt
N t
e e dt
i i t
N
e
i
  
 
   
  
 

       

 
 
    
  
   

 
  
 
 
 

  

    
 
 
 

 


 
  
 
 
 

 
  
 
 
  
 
 2 2 3 3 2 2
1 1 2
ln
3 3
2
2 1 1 3 3
0 [ ln ( 1) ]ln
t
z
t
e dz
z i z


    
  
     
 

 
 
  
 

2 2
2 2 3 3
1
ln
1 1 2
2 2
1
3 3
2
0 1
2 2
1 1 3 3
1 1
1 ( 1) .
1 1
2
ln ln ( 1)
2 2
l
t
a
N L
l
i
i l l l
t
N e a
N
e
a a
i
L
i

 

   
  
 
    

 

 
 
 
 
 
 
 
  
   
 
   
 
 
 

More Related Content

PDF
Tractable computation in outage performance analysis of relay selection NOMA
PDF
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
PDF
Enabling relay selection in non-orthogonal multiple access networks: direct a...
PDF
Performance analysis for power-splitting energy harvesting based two-way full...
PDF
A low complexity distributed differential scheme based on orthogonal space t...
PDF
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
PDF
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
PDF
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
Tractable computation in outage performance analysis of relay selection NOMA
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Performance analysis for power-splitting energy harvesting based two-way full...
A low complexity distributed differential scheme based on orthogonal space t...
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...

Similar to Performance enhancement of wireless sensor network by using non-orthogonal multiple access and sensor node selection schemes (20)

PDF
Security performance analysis for power domain NOMA employing in cognitive ra...
PDF
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
PDF
Secure outage probability of cognitive radio network relying non-orthogonal m...
PDF
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
PDF
Secured binary codes generation for computer network communication
PDF
Physical security with power beacon assisted in half-duplex relaying networks...
PDF
Distributed Spatial Modulation based Cooperative Diversity Scheme
PDF
Enhanced Threshold Sensitive Stable Election Protocol
PDF
E017332733
PDF
Exact secure outage probability performance of uplinkdownlink multiple access...
PDF
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...
PDF
Performance of cluster-based cognitive multihop networks under joint impact o...
PDF
Physical layer security in DF full-duplex relaying network: performance analysis
PDF
Exploiting Outage Performance of Wireless Powered NOMA
PDF
1. 20934.pdf
PDF
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
PDF
Analysis on the performance of pointing error effects for RIS-aided FSO link ...
PDF
Outage analysis of simo system over nakagami n fading channel
PDF
Physical layer network coding
PDF
Study on outage performance gap of two destinations on CR-NOMA network
Security performance analysis for power domain NOMA employing in cognitive ra...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Secure outage probability of cognitive radio network relying non-orthogonal m...
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
Secured binary codes generation for computer network communication
Physical security with power beacon assisted in half-duplex relaying networks...
Distributed Spatial Modulation based Cooperative Diversity Scheme
Enhanced Threshold Sensitive Stable Election Protocol
E017332733
Exact secure outage probability performance of uplinkdownlink multiple access...
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...
Performance of cluster-based cognitive multihop networks under joint impact o...
Physical layer security in DF full-duplex relaying network: performance analysis
Exploiting Outage Performance of Wireless Powered NOMA
1. 20934.pdf
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Analysis on the performance of pointing error effects for RIS-aided FSO link ...
Outage analysis of simo system over nakagami n fading channel
Physical layer network coding
Study on outage performance gap of two destinations on CR-NOMA network
Ad

More from nooriasukmaningtyas (20)

PDF
Analysis of active islanding detection techniques for gridconnected inverters...
PDF
Influence of non-sinusoidal power supply on the performance of a single-phase...
PDF
Cellular automata model for emergent properties of pressure flow in single ne...
PDF
Load shifting impact on generating adequacy assessment during peak period
PDF
Performance comparison and impact of weather conditions on different photovol...
PDF
Emergency congestion management of power systems by static synchronous series...
PDF
Analysis and comparison of a proposed mutation operator and its effects on th...
PDF
Social cyber-criminal, towards automatic real time recognition of malicious p...
PDF
Music genres classification by deep learning
PDF
Predicting students' learning styles using regression techniques
PDF
Soft computing techniques for early diabetes prediction
PDF
Different analytical frameworks and bigdata model for Internet of Things
PDF
Network intrusion detection system: machine learning approach
PDF
An unsupervised generative adversarial network based-host intrusion detection...
PDF
Crime prediction using a hybrid sentiment analysis approach based on the bidi...
PDF
Hybrid dynamic chunk ensemble model for multi-class data streams
PDF
Chaotic elliptic map for speech encryption
PDF
Efficient processing of continuous spatial-textual queries over geo-textual d...
PDF
Modular reduction with step-by-step using of several bits of the reducible nu...
PDF
An efficient and robust parallel scheduler for bioinformatics applications in...
Analysis of active islanding detection techniques for gridconnected inverters...
Influence of non-sinusoidal power supply on the performance of a single-phase...
Cellular automata model for emergent properties of pressure flow in single ne...
Load shifting impact on generating adequacy assessment during peak period
Performance comparison and impact of weather conditions on different photovol...
Emergency congestion management of power systems by static synchronous series...
Analysis and comparison of a proposed mutation operator and its effects on th...
Social cyber-criminal, towards automatic real time recognition of malicious p...
Music genres classification by deep learning
Predicting students' learning styles using regression techniques
Soft computing techniques for early diabetes prediction
Different analytical frameworks and bigdata model for Internet of Things
Network intrusion detection system: machine learning approach
An unsupervised generative adversarial network based-host intrusion detection...
Crime prediction using a hybrid sentiment analysis approach based on the bidi...
Hybrid dynamic chunk ensemble model for multi-class data streams
Chaotic elliptic map for speech encryption
Efficient processing of continuous spatial-textual queries over geo-textual d...
Modular reduction with step-by-step using of several bits of the reducible nu...
An efficient and robust parallel scheduler for bioinformatics applications in...
Ad

Recently uploaded (20)

PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Geotechnical Engineering, Soil mechanics- Soil Testing.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
anatomy of limbus and anterior chamber .pptx
PPT
Drone Technology Electronics components_1
PDF
BRKDCN-2613.pdf Cisco AI DC NVIDIA presentation
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
“Next-Gen AI: Trends Reshaping Our World”
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
24AI201_AI_Unit_4 (1).pptx Artificial intelligence
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
ETO & MEO Certificate of Competency Questions and Answers
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
Geotechnical Engineering, Soil mechanics- Soil Testing.pdf
OOP with Java - Java Introduction (Basics)
anatomy of limbus and anterior chamber .pptx
Drone Technology Electronics components_1
BRKDCN-2613.pdf Cisco AI DC NVIDIA presentation
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
“Next-Gen AI: Trends Reshaping Our World”
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
24AI201_AI_Unit_4 (1).pptx Artificial intelligence
Structs to JSON How Go Powers REST APIs.pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Model Code of Practice - Construction Work - 21102022 .pdf
ETO & MEO Certificate of Competency Questions and Answers
Embodied AI: Ushering in the Next Era of Intelligent Systems
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx

Performance enhancement of wireless sensor network by using non-orthogonal multiple access and sensor node selection schemes

  • 1. Indonesian Journal of Electrical Engineering and Computer Science Vol. 21, No. 2, February 2021, pp. 886~894 ISSN: 2502-4752, DOI: 10.11591/ijeecs.v21.i2.pp886-894  886 Journal homepage: http://ijeecs.iaescore.com Performance enhancement of wireless sensor network by using non-orthogonal multiple access and sensor node selection schemes Duy Hung Ha1 , Dac-Binh Ha2 , Van-Truong Truong3 , Van-Duc Phan4 , Q. S. Vu5 1 Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City, Vietnam 2,3 Faculty of Electrical-Electronic Engineering, Duy Tan University, Da Nang, Vietnam 4 Faculty of Automobile Technology, Van Lang University, Ho Chi Minh City, Vietnam 5 School of Engineering-Technology & Arts, Hong Bang International University, Ho Chi Minh City, Vietnam Article Info ABSTRACT Article history: Received Jun 4, 2020 Revised Aug 3, 2020 Accepted Aug 11, 2020 In this paper, we investigate a relaying wireless sensor network (WSN) with the non-orthogonal multiple access (NOMA) and sensor node selection schemes over rayleigh fading. Precisely, the system consists of two sensor clusters, a sink node, and an amplify-and-forward (AF) relay. These sensors applying the NOMA and sensor node selection schemes transmit the sensing data from the sensor clusters via the relay to the sink. We derived the expressions of outage probability and throughput for two sensor nodes. We also provide numerical results to examine the behavior of the system. Finally, we verify the validity of our analysis by using the monte-carlo simulation. Keywords: Amplify-and-forward Best sensor node selection NOMA Outage probability Throughput WSN This is an open access article under the CC BY-SA license. Corresponding Author: Dac-Binh Ha Faculty of Electrical-Electronic Engineering Duy Tan University, Da Nang, Vietnam Email: [email protected] 1. INTRODUCTION In the last decades, wireless sensor networks (WSN) have been widely applied in many fields, such as monitoring environmental parameters in industry and agriculture, smart transport, smart grids, wearable medical care devices [1-3]. The main advantage of wireless sensor networks is that the use of existing infrastructure may not incur additional costs of wiring and equipment, and further, the cloud availability and IoT protocol for a fast connection. However, WSN also contains many problems that need to be addressed, typically data transmission between devices in the network when the scale of the network becomes very large with a massive amount of data [4]. The non-orthogonal multiple access (NOMA) technique was proposed as the best solution to solve the above problem when satisfying the very high data rate and massive connectivity demand both in uplink and downlink transmissions [5-7]. NOMA can support multiple users at the same time and the same frequency resource. In WSN, the uplink channel plays a critical role, as this is the path that the sensors used to perform the task of transmitting the data they collect to the sink node. However, studies on WSN using uplink NOMA are still relatively small [8-12]. In [8], the authors proposed WSN to use the uplink NOMA application to measure parameters in agriculture. The sensors are divided into clusters and use short-range multi-hop communication technology to transfer data to the sink node. The authors used the sum
  • 2. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  Performance enhancement of wireless sensor network by using non-orthogonal multiple… (Duy Hung Ha) 887 data rate and outage probability to examine the performance of the system. In [9], the uplink NOMA multiuser model was proposed. The base station is equipped with N antennas, and each user equipment unit has a single antenna, the users are divided into two groups: robust set and weak set depending on the channel status. The paper proposes that the power control scheme can maximize the sum capacity with a minimum target rate. Another common problem with WSN is the transmission distance in the network. The sensor nodes located at the network edge can only communicate with neighboring nodes and need support from the relay to communicate with the sink node. Transition techniques combined with NOMA helps solve this problem in WSN [13-25]. In [13], the authors proposed the uplink NOMA model for two users with the support of the decode-and-forward relay to communicate with the base station. The paper goes into system analysis by providing formulas for system probability and throughput based on critical parameters such as signal to noise ratio, transmission power. In [16], two users communicated with the base station simultaneously with the existence of a half-duplex relay employing the decode-and-forward scheme to assist the far user. With the given target data rates, the authors proposed the method to determine the most optimal power allocation factors. Different from previous studies, in this study, we propose a NOMA scenario for the uplink of two sensor node clusters, in which the two sensors apply the uplink NOMA scheme to transmit their information to the sink via the AF relay. The proposed model uses the best combination of direct link and forward-link selection mechanism based on the maximum signal to end-to-end noise ratio. To analyze the performance of this system, we derive expressions of the outage probability and throughput by using the Gaussian- Chebyshev quadratic. The numerical results will be calculated according to the main parameters: transmission power, the number of sensor nodes to find ways to improve the performance of this system. The remainder of this research can be formulated as follows. Section 2 presents the system model. Section 3 analyzes the system performance. Section 4 shows the numerical results with some discussions. Finally, Section 5 concludes the study. 2. SYSTEM MODEL We consider an uplink NOMA relaying system for WSN as Figure 1. This system consists of two sensor clusters P with N sensor nodes and Q with M sensor nodes, a relay node, and a sink. Two sensor nodes selected respectively from P and Q transmit their messages to the sink node (S) with the help of a single AF R. Assuming that the sensing data, i.e., confidential data, video data, from P is more important than the data, i.e., humidity, temperature, from Q. Therefore, the best sensor node is selected from P (SNP*), meantime, the sensor node of Q (SNQ) is randomly chosen to transmit their data to S via R. All sensor nodes, relay, and sink have single-antenna and work in half-duplex mode. Suppose R has sufficient channel information from the sensor cluster, thus according to the maximum channel power gain, R assigns a sensor node as the best node SNP* from P to send sensing data to it. Figure 1. System model The proposed operating protocol for this system is given as follows: Phase 1: SNP* and SNQ simultaneously transmit their signals (s1, s2) to R during the period of T/2, where T denotes as transmission block time.
  • 3.  ISSN: 2502-4752 Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 2, February 2021 : 886 - 894 888 Phase 2: During the remaining T/2 period, R amplifies and forwards the signal received from SNP* and SNQ to S. Finally, S uses the successive interference cancellation (SIC) to detect the signal of SNP* and SNQ to obtain the information of each node. We describe in detail each phase mathematically as follows. Phase 1: Apply NOMA scheme, SNP*, and SNQ simultaneously to transmit their signals (s1, s2) to R by using their transmit power on the same frequency in the same period T/2. The signal received at R has the following form: 1 2 1 1 1 2 2 1 1 2 , P P y h s h s n d d      (1) where hk (k = {1, 2}) are Rayleigh fading channel coefficients of links from SNP* and SNQ to R, respectively, n1 is AWGN with zero mean and the variance of 2  , 2 2 ~ (0, ) n CN  , d1 and d2 are the Euclidean distances of SNP* and SNQ to R, respectively, and  represents the path-loss exponent. Phase 2: Applying the AF scheme, the transmission signal at R has the transmission power PR can be formulated by, 1. R y Gy  (2) In particular, G is the relaying gain of the AF relay R, which is defined by the fact that the P3 bounds the transfer power of the relay. Therefore, G is given by, 3 2 2 2 1 1 1 2 2 2 . | | / | | / P G P h d P h d       (3) Therefore, the signal received at S is written as, 3 1 2 2 1 1 2 2 1 2 2 2 3 , Gh P P y h s h s n n d d d                (4) where h3 and d3 are the Rayleigh fading channel coefficient and Euclidean distance of R and S, respectively 2 2 ~ (0, ) n CN  . Finally, S applies SIC to detect the signals of SNP* and SNQ. The process is as follows: s1 will be detected first due to better channel condition, then separation of signal s2 by subtracting s1 from y2. The instantaneous SINR for detecting s1 at S is given by,   1 2 2 2 1 1 3 1 3 2 2 2 2 2 2 2 2 3 3 2 2 1 3 1 3 2 2 2 2 2 2 3 2 3 1 1 2 2 3 3 / / / , 1 s PG h h d d G P h d h d h h h h h h h                       (5) where 1 2 3 1 2 3 2 2 2 1 2 3 , , . P P P d d d             After subtracting s1 from y2, we obtain instantaneous SINR to detect s2 at S as follows, 2 2 2 2 3 2 3 2 2 2 1 1 2 2 3 3 . 1 s h h h h h           (6) The Probability Density Function (PDF) and Cumulative Distribution Function (CDF) functions of the random variable Xi (i = {1, 2}) are calculated as, respectively,
  • 4. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  Performance enhancement of wireless sensor network by using non-orthogonal multiple… (Duy Hung Ha) 889   1 . i i x X i f x e     (7)   1 . i i x X F x e     (8) Meanwhile, due to selecting the best channel of links P-R, the CDF and PDF of channel power gain   2 1 1 1 max i i N Y h    is given as follows,     1 1 1 0 1 1 , N x ix N i Y i N F x e e i                         (9)     1 1 1 1 1 ( 1) 1 0 1 1 1 1 1 . N i x x x N i Y i N N N f x e e e i                                 (10) For the later calculation, we obtain the expression of CDF for 1 1 1 2 2 1 Y U X     as follows:   1 1 1 1 1 1 1 1 2 2 1 1 2 2 Pr 1 ( 1) . 1 ix N i U i N Y F x x e i X i x                               (11)     1 1 1 1 1 1 2 2 2 1 1 1 2 2 1 1 2 2 1 ( 1) . ix N i U i N f x ie i i x i x                                   (12) 3. PERFORMANCE ANALYSIS The outage probability Pout for detection of s1 and s2 are expressed as follows, respectively: 1 1 2 Pr 2 1 s out s t P              (13)   2 2 Pr s out s t P     (14) Theorem 1. Under quasi-static Rayleigh fading, the closed-form expression of Pout to detect s1 for this considered system is given by,   1 1 3 3 1 1 1 1 2 1 1 2 2 1 1 2 2 2 2 2 1 1 1 1 2 2 2 2 1 ( 1) 1 , 2 t l i i N L s i l l t l out l i l l t l l N i i P ie e a i L i i                                                                       (15) where 1 ln , 2 l l a      3 3 1 t t        , 2 1 cos 2 l l a L          . Proof: See Appendix A. Theorem 2. Using quasi-static Rayleigh fading, the closed-form expression of the outage probability to detect s2 for this considered system is given by
  • 5.  ISSN: 2502-4752 Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 2, February 2021 : 886 - 894 890   2 2 2 2 3 3 2 1 1 2 2 1 3 3 2 0 1 2 2 1 1 3 3 1 1 1 ( 1) . 2 ( 1) l t N L l s i out i l l t l N e a N P e i L i                                                  (16) Proof: See Appendix B. The expressions of throughput for SNP* and SNQ are formulated as,   1 1 1 . 2 s out P     (17)   2 2 1 . 2 s out P     (18) From (15)-(18), the closed-form expressions for SNP* and SNQ can be calculated, respectively. 4. NUMERICAL RESULTS AND DISCUSSION We use the Monte Carlo simulation to verify the numerical results on the impact of key system parameters, i.e., transmit power, number of sensor nodes, on the system performance [21-25]. The primary simulation parameters are presented in Table 1. From Table 1, the distances of SNP* and SNQ to R and from R to S are calculated as follows: Table 1. Simulation parameters Parameters Notation Typical Values Environment Rayleigh Transmit power of sensor nodes P1, P2 5, 10 dBm Transmit power of the relay P3 0-20 dBm The minimum required data rate  1 bps/Hz The coordinate of S {x0, y0} {0,0} The coordinate of SNP* {x1, y1} {1,0} The coordinate of SNQ {x2, y2} {0,1} The coordinate of R {x3, y3} {0.5,0.5} The path-loss exponent  2 The parameters of the exponential distribution  1 Number of sensor nodes of P N 2, 4, 6 Number of sensor nodes of Q M 1 The complexity-vs-accuracy trade-off coefficient L 100 2 2 1 1 3 1 3 ( ) ( ) d x x y y     (19) 2 2 2 2 3 2 3 ( ) ( ) d x x y y     (20) 2 2 3 0 3 0 3 ( ) ( ) d x x y y     (21) Figure 2 depicts the outage probability Pout versus the transmit power of relay by varying the transmit power of sensor nodes. As we observe from this Figure 2 that Pout to detect s1 and s2 decreases when the transmit power increases. It means that the system performance can be improved by increasing the power at the relay. However, the impact of transmit power of sensor nodes on the system performance is quite different. Correctly, when increasing P1 we can see that 1 s out P decreases and 2 s out P increases, on the contrary, 1 s out P increases and 2 s out P decreases when P2 increases. It is explained that when increasing P1 the interference affected the detection of s2 at S is much more serious; thus, it makes 2 s out P increases. It is similar to the case of increasing P2.
  • 6. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  Performance enhancement of wireless sensor network by using non-orthogonal multiple… (Duy Hung Ha) 891 Figure 3 depicts the flux of SNP* and SNQ (τ1 and τ2) versus P3 with different transmit power of sensor clusters. We see that τ1 and τ2 increase with increasing P3. It means that the performance of the system improves as the transmit power at the relay node R increases. Figure 3 also shows that when the transmit power of sensor cluster P decreases, the throughput τ1 decreases while the throughput τ2 increases. Furthermore, vice versa, when reducing the transmit power of sensor cluster Q, the throughput τ2 decreases, while throughput τ1 increases. Figure 2. Pout versus the transmit power P3 with different P1 and P2 (P1, P2) Figure 3. Throughput  versus the transmit power P3 with different P1 and P2 (P1, P2) Figure 4 and Figure 5 depict the effect of the number of sensor nodes at the sensor cluster P on the outage probability and throughput, respectively. The results once again confirm that when increasing the transmit power at R, the system performance improves, as the Pout decreases and τ increases. Figure 4. Pout versus the transmit power P3 with different N Figure 4 draws the increase in the number of sensor nodes N, 1 s out P decreases, and 2 s out P increases. This can be explained as the more sensor nodes at P, and the more likely the system is to find the best sensor node to carry out the data transmission of the sensor cluster P. The better the signal from the sensor cluster P, the more interference it will generate for the sensor cluster Q, resulting in 2 s out P increases.
  • 7.  ISSN: 2502-4752 Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 2, February 2021 : 886 - 894 892 As shown in Figure 5, the number of sensor nodes N increases, τ1 increases, and τ2 decreases, meaning that the performance of the sensor cluster P is improved while the performance of the sensor cluster Q is worse. This conclusion is also consistent with the results obtained from Figure 5. Figure 5. Throughput  versus the transmit power P3 with different N 5. CONCLUSION In this work, we have investigated the multiuser uplink NOMA wireless sensor network with the best user selection scheme. The closed-form expressions of the system performance are derived. The results show that the system performance can be improved by increasing the transmit power at the relay. Increasing the number of sensor nodes at the sensor cluster P helps improve its performance but causes a decrease in the performance of the sensor cluster Q. The Monte Carlo simulation is conducted for validating the numerical results. In future studies, we will expand the system model with multi-relay. REFERENCES [1] Alam, M. M., Hamida, E. B., Rehmani, M., & Pathan, A. “Wearable wireless sensor networks: Applications, standards, and research trends.” In Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications, pp. 59-88, 2016. [2] Kurt, S., Yildiz, H. U., Yigit, M., Tavli, B., & Gungor, V. C. “Packet size optimization in wireless sensor networks for smart grid applications.” IEEE Transactions on Industrial Electronics, vol. 64, no.3, pp. 2392-2401, 2016. [3] Noel, A. B., Abdaoui, A., Elfouly, T., Ahmed, M. H., Badawy, A., & Shehata, M. S. “Structural health monitoring using wireless sensor networks: A comprehensive survey.” IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1403-1423, 2017. [4] Harb, H., Idrees, A. K., Jaber, A., Makhoul, A., Zahwe, O., & Taam, M. A. “Wireless sensor networks: A big data source in Internet of Things.” International Journal of Sensors Wireless Communications and Control, vol. 7, no. 2, pp. 93-109, 2017. [5] Z. Zhang, H. Sun, and R. Q. Hu, “Downlink and uplink non-orthogonal multiple access in a dense wireless network,” IEEE J. Sel. Areas Commun., vol. 35, no. 12, pp. 2771-2784, 2017. [6] L. Dai, B. Wang, Y. Yuan, S. Han, C. I, and Z. Wang, “Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends,” IEEE Commun. Mag., vol. 53, no. 9, pp. 74-81, 2015. [7] Z. Ding, M. Peng, and H. V. Poor, “Cooperative non-orthogonal multiple access in 5G systems,” IEEE Commun. Lett., vol. 19, no. 8, pp. 1462-1465, 2015. [8] Hu, Z., Xu, L., Cao, L., Liu, S., Luo, Z., Wang, J., & Wang, L. “Application of Non-Orthogonal Multiple Access in Wireless Sensor Networks for Smart Agriculture.” IEEE Access, vol. 7, pp. 87582-87592, 2019. [9] Kim, B., Chung, W., Lim, S., Suh, S., Kwun, J., Choi, S., & Hong, D. “Uplink NOMA with multi-antenna.” In 2015 IEEE 81st vehicular technology conference (VTC Spring), pp. 1-5, 2019. [10] Mouapi, A.; Hakem, N. A New Approach to Design Autonomous Wireless Sensor Node Based on RF Energy Harvesting System. Sensors 2018, 18, 133, doi:10.3390/s18010133. [11] Liu, L., Sheng, M., Liu, J., Dai, Y., & Li, J. “Stable Throughput Region and Average Delay Analysis of Uplink NOMA Systems With Unsaturated Traffic.” IEEE Transactions on Communications, vol. 67, no. 12, pp. 8475-8488, 2019.
  • 8. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  Performance enhancement of wireless sensor network by using non-orthogonal multiple… (Duy Hung Ha) 893 [12] Shin, W., Yang, H., Vaezi, M., Lee, J., & Poor, H. V. “Relay-aided NOMA in uplink cellular networks.” IEEE Signal Processing Letters, vol. 24, no. 12, pp. 1842-1846, 2017. [13] Truong, V. T., Vo, M. T., Lee, Y., & Ha, D. B. “Amplify-and-Forward Relay Transmission in Uplink Non- Orthogonal Multiple Access Networks.” In 2019 6th NAFOSTED Conference on Information and Computer Science (NICS), pp. 1-6, 2019. [14] Tran, D. D., Ha, D. B., So-In, C., Tran, H., Nguyen, T. G., Baig, Z. A., & Sanguanpong, S. “ Performance Analysis of DF/AF Cooperative MISO Wireless Sensor Networks With NOMA and SWIPT Over Nakagami-$ m $ Fading.” IEEE Access, vol. 6, pp. 56142-56161, 2018. [15] Liu, H., Miridakis, N. I., Tsiftsis, T. A., Kim, K. J., & Kwak, K. S. “ Coordinated uplink transmission for cooperative NOMA systems.” In 2018 IEEE Global Communications Conference (GLOBECOM,) pp. 1-6, 2018. [16] Abdel-Razeq, S., Zhou, S., Bansal, R., & Zhao, M. “Uplink NOMA transmissions in a cooperative relay network based on statistical channel state information.” IET Communications, vol. 13, no. 4, pp. 371-378, 2018. [17] Kader, M. F., Shin, S. Y., & Leung, V. C. “Full-duplex non-orthogonal multiple access in cooperative relay sharing for 5G systems.” IEEE Transactions on Vehicular Technology, vol. 67, no. 7, pp. 5831-5840, 2018. [18] Lv, L., Chen, J., Ni, Q., Ding, Z., & Jiang, H. “Cognitive non-orthogonal multiple access with cooperative relaying: A new wireless frontier for 5G spectrum sharing.” IEEE Communications Magazine, vpl. 56, no. 4, pp. 188-195, 2018. [19] Santamaria, P. Raimondo, M. Tropea, F. D. Rango, and C. Aiello, “An IoT Surveillance System Based on a Decentralised Architecture,” Sensors, vol. 19, no. 6, p. 1469, 2019. [20] P. Fazio, M. Tropea, F. Veltri, and S. Marano, “A Novel Rate Adaptation Scheme for Dynamic Bandwidth Management in Wireless Networks,” 2012 IEEE 75th Vehicular Technology Conference (VTC Spring), 2012. Zeng Hu, Longqin Xu, Liang Cao, Shuangyin Liu, Zhijie Luo, Jing Wang, Xiangli Li, Lu Wang. "Application of Non-Orthogonal Multiple Access in Wireless Sensor Networks for Smart Agriculture", IEEE Access, 2019. [21] Duy-Hung Ha, Dac-Binh Ha, Jaroslav Zdralek, Miroslav Voznak. "Performance Analysis of Hybrid Energy Harvesting AF Relaying Networks over Nakagami-m Fading Channels", 2018 International Conference on Advanced Technologies for Communications (ATC), 2018. [22] "Industrial Networks and Intelligent Systems", Springer Science and Business Media LLC, 2019. [23] Van-Vinh Nguyen, Trong-Tuyen Tran, Vo Viet Tri, Van-Van Huynh, Hoang-Sy Nguyen, Miroslav Voznak. "Power-Splitting Protocol Non-Orthogonal Multiple Access (NOMA) in 5G Systems", Proceedings of the Tenth International Symposium on Information and Communication Technology - SoICT 2019, 2019. [24] Dac-Binh Ha, Jai P. Agrawal. "Chapter 6 Performance Analysis for NOMA Relaying System in Next-Generation Networks with RF Energy Harvesting", Intech Open, 2020. APPENDIX APPENDIX A: Proof of Theorem 1. Here, the expression of Pout for SNP* can be formulated as                   1 1 3 1 3 2 2 3 3 1 1 2 2 1 1 2 2 3 3 1 1 2 2 1 1 2 2 1 1 2 2 3 1 1 2 2 1 1 2 2 3 1 1 3 2 2 Pr 1 1 Pr 1 1 1 Pr 1 0 Pr , 1 0 1 Pr Pr 1 s out t t t t t t t t t Y X P X X Y X Y X X Y X Y X Y X X Y X Y X Y X X                                                                                              1 1 2 2 1 1 2 2 1 1 3 2 2 1 1 , 1 1 t t Y X Y X Y X                                              3 3 1 1 1 ( ) 1 1 2 2 2 1 1 1 2 2 1 1 2 2 1 1 ( 1) t t t u i N u a u i i N i e e du i i u i u                                                       3 3 1 1 1 1 3 3 1 ( ) 1 1 2 2 2 1 1 1 2 2 0 1 1 2 2 1 1 1 2 2 1 1 2 2 2 2 1 1 1 2 2 1 1 ( 1) ln ln ln 1 ( 1) ln t t t t t i t N t i i t t i N b t i i N i e e dt i i t i t N z z i z i ie i z i                                                                                                 1 1 1 1 3 3 1 1 1 ln 2 0 2 2 1 1 1 2 2 1 1 2 2 2 2 2 1 1 1 1 2 2 2 2 ln ln 1 1 1 ln ln ln 2 2 2 1 ( 1) 2 1 1 1 ln ln ln 2 2 2 t i z t i i l l l N L c t i i l l l l t e dz z i z a a a i i N ie e i L a a a i i                                                                                       1 ln 2 2 1 . l a l a  
  • 9.  ISSN: 2502-4752 Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 2, February 2021 : 886 - 894 894 APPENDIX B: Proof of Theorem 2. Here, the expression of Pout for SNQ can be calculated by           2 2 3 2 1 2 1 3 3 2 2 1 2 3 2 3 1 1 2 2 3 3 1 2 2 3 2 0 1 ( 1) 1 0 1 2 0 0 Pr 1 1 1 1 ( 1) 1 1 ( 1 t t t t s out t t t X X X Y t y t t i y t N i i X X P Y X X y x F F f x dyf y dx x N e dydt i N i                                                                                                    1 3 3 2 2 3 3 1 2 2 3 3 3 3 2 2 1 1 1 0 1 2 0 0 1 1 1 1 3 3 0 2 1 1 3 3 0 1 1 0 ) 1 1 ( 1) [ ( 1) ] 1 1 ( 1) t t t t t t t t t i t N y t i i t N t i i t N i i e e dydt N t e e dt i i t N e i                                                                                                     2 2 3 3 2 2 1 1 2 ln 3 3 2 2 1 1 3 3 0 [ ln ( 1) ]ln t z t e dz z i z                              2 2 2 2 3 3 1 ln 1 1 2 2 2 1 3 3 2 0 1 2 2 1 1 3 3 1 1 1 ( 1) . 1 1 2 ln ln ( 1) 2 2 l t a N L l i i l l l t N e a N e a a i L i                                                       