Pham Ngoc Son, Tran Trung Duy, Phuc Quang Truong, Son Ngoc Truong, Pham Viet Tuan, Van-Ca Phan, Khuong Ho-Van

Main Article Content


In this paper, we analyze an underlay two-way decode-and-forward scheme in which secondary relays use successive interference cancellation (SIC) technology to decode data of two secondary sources sequentially, and then generate a coded signal by superposition coding (SC) technology, denoted as SIC-SC protocol. The SIC-SC protocol is designed to operate in two time slots under effects from an interference constraint of a primary receiver and residual interference of imperfect SIC processes. Transmit powers provided to carry the data are allocated dynamically according to channel powers of interference and transmission, and a secondary relay is selected from considering strongest channel gain subject to increase in decoding capacity of the first data and decrease in collection time of channel state information. Closed-form outage probability expressions are derived from mathematical manipulations and verified by performing Monte Carlo simulations. An identical scheme of underlay two-way decodeand-forward relaying with random relay selection and fixed power allocations is considered to compare with the proposed SIC-SC protocol, denoted as RRS protocol. Simulation and analysis results show that the non-identical outage performances of the secondary sources in the proposed SIC-SC protocol are improved by increasing the number of the secondary relays and the interference constraint as well as decreasing the residual interference powers. Secondly, the performance of the nearer secondary source is worse than that of the farther secondary source. In addition, the proposed SIC-SC protocol outperforms the RRS comparison protocol, and effect of power allocations through channel powers is discovered. Finally, derived theory values are precise to simulation results.


Successive interference cancellation, superposition coding, power allocation, underlay cognitive radio, non-orthogonal multiple access, outage probability.


[1] Popovski, H. Yomo, Physical Network Coding in Two-Way Wireless Relay Channels, presented at 2007 IEEE International Conference on Communications (ICC), Glasgow, 2007, pp. 707-712.

[2] Cao, X. Ji, J. Wang, S. Zhang, Y. Ji, J. Wang, Security-Reliability Tradeoff Analysis for Underlay Cognitive Two-Way Relay Networks, IEEE Transactions on Wireless Communications 18(12) (2019) 6030-6042. TWC.2019.2941944.

[3] Mitola, G.Q. Maguire, Cognitive radio: making software radios more personal, IEEE Personal Communications 6(4) (1999) 13-18. https://doi. org /10.1109/98.788210.

[4] M.C. Chu, H. Zepernick, Performance Optimization for Hybrid Two-Way Cognitive Cooperative Radio Networks With Imperfect Spectrum Sensing, IEEE Access 6 (2018) 70582-70596.

[5] Ho-Van, T. Do-Dac, Security Analysis for Underlay Cognitive Network with Energy-Scavenging Capable Relay over Nakagami-m Fading Channels, Wireless Communications and Mobile Computing 2019 1-16. 10.1155/2019/5080952.

[6] Zhang, Z. Zhang, J. Xing, R. Yu, P. Zhang, W.Wang, Exact Outage Analysis in Cognitive Two-WayRelay Networks With Opportunistic Relay SelectionUnder Primary User’s Interference, IEEE Transactionson Vehicular Technology 64(6) (2015) 2502-2511.

[7] T. Duy, H.Y. Kong, Exact outage probability of cognitive two-way relaying scheme with opportunistic relay selection under interference constraint, IET Communications 6(16) (2012), 2750-2759. 10.1049/iet-com. 2012.0235.

[8] V. Toan, V.N.Q. Bao, Opportunistic relaying for cognitive two-way network with multiple primary receivers over Nakagami-m fading, presented at 2016 International Conference on Advanced Technologies for Communications (ATC), Hanoi city, 2016, pp.141-146.

[9] V. Toan, V.N.Q. Bao, H. Nguyen-Le, Cognitive two-way relay systems with multiple primary receivers: exact and asymptotic outage formulation, IET Communications 11(16) (2017) 2490-2497. 0400.

[10] V.Toan, V.N.Q. Bao, K.N. Le,Performance analysis of cognitive underlay two-wayrelay networks with interference and imperfect channelstate information, EURASIP Journal on WirelessCommunications and Networking 2018 53 (2018).

[11] Solanki, P.K. Sharma, P.K. Upadhyay,Adaptive Link Utilization in Two-Way SpectrumSharing Relay Systems Under Average Interference Constraints, IEEE Systems Journal 12(4) (2018) 3461-3472. JSYST.2017.2713887.

[12] Yue, Y. Liu, S. Kang, A. Nallanathan, Y. Chen, Modeling and Analysis of Two-WayRelay Non-Orthogonal Multiple Access Systems, IEEETransactions on Communications 66(9) (2018) 3784-3796. 2018.2816063.

[13] Zou, B. He, H. Jafarkhani, An Analysis of TwoUser Uplink Asynchronous Non-orthogonal MultipleAccess Systems, IEEE Transactions on WirelessCommunications 18(2) (2019) 1404-1418.

[14] Yang, Z. Ding, P. Fan, N. Al-Dhahir, TheImpact of Power Allocation on Cooperative Nonorthogonal Multiple Access Networks With SWIPT,IEEE Transactions on Wireless Communications 16(7) (2017) 4332-4343.

[15] N. Son, T.T. Duy, K. Ho-Van, SIC-Coding Schemes for Underlay Two-Way Relaying Cognitive Networks, Wireless Communications and Mobile Computing 2020, pp.1-24. 10.1155/2020/8860551.

[16] F. Kader, M.B. Shahab, S.Y. Shin, ExploitingNon-Orthogonal Multiple Access in Cooperative RelaySharing, IEEE Communications Letters 21(5) (2017) 1159-1162.

[17] Yue, Y. Liu, S. Kang, A. Nallanathan, Z. Ding,Spatially Random Relay Selection for Full/Half-DuplexCooperative NOMA Networks, IEEE Transactions onCommunications 66(8) (2018) 3294-3308. 2018.2809740.

[18] Liu, Z. Ding, M. Elkashlan, J. Yuan,Nonorthogonal Multiple Access in Large-Scale UnderlayCognitive Radio Networks, IEEE Transactions onVehicular Technology 65(12) (2016)10152-10157. TVT.2016.2524694.

[19] Song, W. Yang, Z. Xiang, N. Sha, H. Wang, Y.Yang, An Analysis on Secure Millimeter Wave NOMACommunications in Cognitive Radio Networks, IEEE Access 8 (2020), 78965-78978.

[20] Ding, T. Song, Y. Zou, X. Chen, L. Hanzo,Security-Reliability Tradeoff Analysis of Artificial NoiseAided Two-Way Opportunistic Relay Selection, IEEE Transactions on Vehicular Technology 66(5) (2017) 3930-3941.

[21] Zheng, M. Wen, F. Chen, J. Tang, F. Ji, SecureNOMA Based Full-Duplex Two-Way Relay Networkswith Artificial Noise against Eavesdropping, presented at 2018IEEE International Conference on Communications(ICC), Kansas City, 2018,pp.1-6. 10.1109/ICC.2018.8422946.

[22] N. Son,H.Y. Kong, Exact Outage Analysisof Energy Harvesting Underlay Cooperative CognitiveNetworks, IEICE Transactions on Communications E98-B(4) (2015),pp.661-672.

[23] Tourki, K.A. Qaraqe, M. Alouini, OutageAnalysis for Underlay Cognitive Networks UsingIncremental Regenerative Relaying, IEEE Transactions on Vehicular Technology 62(2) (2013) 721-734. 2012.2222947.

[24] Papoulis, S.U. Pillai, Probability, randomvariables and stochastic processes, 4th ed., McGrawHill, New York, 2002.

[25] Pei, T. Zhifeng, L. Zinan, E. Erkip, S.Panwar, Cooperative wireless communications: a cross-layer approach, IEEE Wireless Communications 13(4) (2006) 84-92.

[26] Ghasemi, E.S. Sousa, Fundamental limitsof spectrum-sharing in fading environments, IEEETransactions on Wireless Communications 6(2) (2007) 649-658. 2007.05447.

[27] M. Peha, Approaches to spectrum sharing, IEEECommunications Magazine 43(2) (2005) 10-12. 1391490.

[28] Kim, S. Lim, H. Wang, D. Hong, Optimal PowerAllocation and Outage Analysis for Cognitive FullDuplex Relay Systems, IEEE Transactions on Wireless Communications 11(10) (2012) 3754-3765. 2012.083112.120127.

[29] N. Son,T.T. Duy, Performance analysisof underlay cooperative cognitive full-duplexnetworks with energy-harvesting relay, ComputerCommunications 122 (2018) 9-19.

[30] V. Nguyen, T. Do, V.N.Q. Bao, D.B.d.Costa, B. An, On the Performance of MultihopCognitive Wireless Powered D2D Communications inWSNs, IEEE Transactions on Vehicular Technology 69(3) (2020) 2684-2699.

[31] Ruan, Y. Li, C. Wang, R. Zhang, H.Zhang, Energy Efficient Power Allocation for DelayConstrained Cognitive Satellite Terrestrial NetworksUnder Interference Constraints, IEEE Transactions on Wireless Communications 18(10) (2019) 4957-4969. 2019.2931321.

[32] Gao, S. Zhang, Y. Su, M. Diao, M. Jo, Joint Multiple Relay Selection and Time Slot Allocation Algorithm for the EH-Abled Cognitive Multi-User Relay Networks, IEEE Access 7 (2019) 111993- 112007.

[33] Arezumand, H. Zamiri-Jafarian, E. Soleimani-Nasab, Exact and Asymptotic Analysis of Partial Relay Selection for Cognitive RF-FSO Systems With Non-Zero Boresight Pointing Errors, IEEE Access 7 (2019) 58611-58625.

[34] N. Son, H.Y. Kong, Energy-Harvesting Relay Selection Schemes for Decode-and-Forward Dual-Hop Networks, IEICE TRANSACTIONS on Communications E98-B(12) (2015) 2485-2495.

[35] N. Nguyen, T.H. Quang Minh, P.T. Tran, M. Voznak, T.T. Duy, T.-L. Nguyen, P.T. Tin, Performance enhancement for energy harvesting based two-way relay protocols in wireless ad-hoc networks with partial and full relay selection methods, Ad Hoc Networks 84 (2019) 178-187.

[36] Pan, Z. Li, Z. Wang, F. Zhang, Joint Relay Selection and Power Allocation for the Physical Layer Security of Two-Way Cooperative Relaying Networks, Wireless Communications and Mobile Computing, 2019, pp. 1-7.

[37] A. Nasir, Z. Xiangyun, S. Durrani, R.A. Kennedy, Relaying Protocols for Wireless Energy Harvesting and Information Processing, IEEE Transactions on Wireless Communications 12(7) (2013) 3622-3636. 2013.062413.122042.

[38] I. Gradshteyn, I.M. Ryzhik, A.Jeffrey, D. Zwillinger, Table of integral, series and products, 7th ed., Elsevier, Amsterdam, 2007.

[39] Haiyan, L. Zan, S. Jiangbo, G. Lei, Underlay cognitive relay networks with imperfect channel state information and multiple primary receivers, IET Communications 9(4) (2015) 460-467.

[40] Zhong, Z. Zhang, Opportunistic Two-Way Full-Duplex Relay Selection in Underlay Cognitive Networks, IEEE Systems Journal 12(1) (2018) 725-734. 2016.2514601.