Next Article in Journal
Disentangling the Contribution of Spatial Reference Frames to Executive Functioning in Healthy and Pathological Aging: An Experimental Study with Virtual Reality
Previous Article in Journal
Influence of Axial Load on Electromechanical Impedance (EMI) of Embedded Piezoceramic Transducers in Steel Fiber Concrete
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Energy Harvesting over Rician Fading Channel: A Performance Analysis for Half-Duplex Bidirectional Sensor Networks under Hardware Impairments

by
Tan N. Nguyen
1,2,
Tran Hoang Quang Minh
3,
Phuong T. Tran
1,* and
Miroslav Vozňák
2
1
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City, Vietnam
2
Faculty of Electrical Engineering and Computer Science, VŠB-Technical University of Ostrava, 17. Listopadu 15/2172, 708 00 Ostrava, Czech Republic
3
Optoelectronics Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City, Vietnam
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(6), 1781; https://doi.org/10.3390/s18061781
Submission received: 29 April 2018 / Revised: 19 May 2018 / Accepted: 28 May 2018 / Published: 1 June 2018
(This article belongs to the Section Sensor Networks)

Abstract

:
In this paper, a rigorous analysis of the performance of time-switching energy harvesting strategy that is applied for a half-duplex bidirectional wireless sensor network with intermediate relay over a Rician fading channel is presented to provide the exact-form expressions of the outage probability, achievable throughput and the symbol-error-rate (SER) of the system under the hardware impairment condition. Using the proposed probabilistic models for wireless channels between mobile nodes as well as for the hardware noises, we derive the outage probability of the system, and then the throughput and SER can be obtained as a result. Both exact analysis and asymptotic analysis at high signal-power-to-noise-ratio regime are provided. Monte Carlo simulation is also conducted to verify the analysis. This work confirms the effectiveness of energy harvesting applied in wireless sensor networks over a Rician fading channel, and can provide an insightful understanding about the effect of various parameters on the system performance.

Graphical Abstract

1. Introduction

Wireless sensor networks (WSNs) are subject to the constraint of energy storage at each mobile node [1,2]. Saving on energy consumption or extending the battery life for sensor nodes has become an important research issue in wireless sensor networks. Recently, energy harvesting (EH) has attracted enormous attention from researchers as a promising cost-effective technique to maximize energy efficiency of a wireless network [3,4,5], especially in wireless sensor networks [6,7,8,9]. Various energy harvesting sources have been studied, such as natural sources (solar [10], wind [11], thermal [12], etc.), strongly coupled magnetic resonances [13], etc. Among them, radio frequency (RF) energy from the ambient transmitters is the most popular source for energy harvesting since it can be received more effectively from RF signals [4]. Because RF signals can convey both energy and information simultaneously, an RF-based energy harvesting technique, called simultaneous wireless information and power transfer (SWIPT), is becoming a more and more promising research topic for WSNs [14,15]. The idea of SWIPT was first introduced in 2008 in the seminal paper of Varshney [16], in which authors proposed an ideal receiver design that is able to simultaneously observe the information and extract power from the same received signal. Zhou et al. [17] connected Varshney’s idea to practice by proposing two realizable receiver architectures design: time switching (TS) and power splitting (PS). The performance analysis of these two EH protocols was conducted rigorously by Nasir et al. [18]. The authors derived analytical expressions for the outage probability and the ergodic capacity of one-way amplify-and-forward (AF) relay networks over a Rayleigh fading channel.
The applications of SWIPT to wireless sensor networks have been investigated in recent works. In [7], the authors proposed a distributed iteration algorithm to solve an energy-efficient cooperative transmission problem for SWIPT in clustered WSNs. In [9], the authors employed wireless energy harvesting techniques and realistic energy converters in dense and often randomly deployed WSNs, and quantified the potential energy gains that can be achieved in the network. Peng et al. [19] considered a wireless energy harvesting two-way relay network (TWRN) using power splitting protocol, where the effects of practical hardware impairments were taken into consideration. Mouapi and Hakem [20] proposed a new approach to defining the specifications of a stand-alone wireless node based on an RF EH system and implemented a hardware circuit to illustrate their energy optimization method. The performance of wireless powered sensor networks for Internet of Things (IoT) application was studied in [4], where the authors proposed the optimal power allocation to maximize the system throughput and also derived the closed-form of that solution. However, in those papers, the channel gains are assumed either to be constant or to be a Rayleigh distributed random variable.
Wireless communication systems in the real radio environments are not only affected by the short-term fading (multipath), but are also subject to the shadowing effects. The vital issue in studying the performance of energy-harvesting-based wireless networks in these conditions is the outage probability analysis. An important statistical characteristic that can describe the behavior of the wireless channels is the probability density function (PDF) of the signal-to-noise-ratio (SNR) at the receiver output. To derive this PDF for different radio propagation environments is sometimes a difficult mathematical task, especially for complicated channel models such as Nakagami-m or Rician channels. In fact, not only the papers we mentioned about SWIPT for WSN, but most of the other results on outage performance up to now [21,22] also focus on Rayleigh fading channels, where we can exploit the fact that the square of channel gain magnitude is exponentially distributed.
As a general comment, it is noted that very few publications about energy harvesting for Rician fading channel exist in the open technical literature. In fact, together with Rayleigh channel, Rician channel should be also considered as one of the small-scale fading models for WSNs, especially for the cases of relatively short range power transfer distance and with existence of a strong line-of-sight (LOS) path [23]. Recently, Zhao et al. [24] have derived the capacity expressions for wireless powered communication systems over a Rician fading channel. However, there is no relay in this study. The source directly harvests the energy from the power beacon. In [25], the authors provided the throughput analysis of relay networks with two energy harvesting protocols (continuous and discrete) over a Rician fading channel, but were only limited in the case of perfect hardware. Furthermore, the paper only provided the integral form of the throughput for the continuous case, so it is not a computationally friendly result. Mishra et al. [26] did provide impressive results on joint optimization of power allocation, power splitting for EH, and relay placement for SWIPT over a Rician channel. Nevertheless, they only use an approximation expression of outage probability to formulate the optimization problem, and did not consider the hardware impairment at the nodes. In practice, the transceiver hardware is imperfect due to phase noise, I/Q (In-phase/Quadrature) imbalance and amplifier nonlinearities [27]. The modeling of hardware impairment in system performance analysis has been presented in many works, for instance, in [28], where the authors analyzed the performance of dual-hop relaying systems in hardware impairment condition, in terms of the capacity, throughput and symbol error rate (SER). We also proposed and evaluated an energy harvesting-based spectrum access model in cognitive radio network with hardware impairment [29]. Again, these works about hardware impairment considered the Rayleigh channels only.
In our current work, we tackle the problem of investigating the performance analysis of SWIPT for WSN over a Rician fading channel, which takes into account the hardware impairment at source and relay nodes. Specifically, we consider an AF two-way half-duplex energy harvesting relay network model suffering from hardware impairments at all nodes over the Rician fading channels. The exact analytical expressions of the achievable throughput, outage probability, and the exact-form expression for the PDF of SNR at each destination node of a half-duplex AF bidirectional wireless sensor networks over a Rician fading channel are derived rigorously. The main contributions of this paper can be described in more details as follows:
  • The exact form expression of outage probability and achievable throughput at each destination node with imperfect hardware and in Rician fading environment are derived mathematically.
  • We derive the exact-form cumulative distribution function (CDF) of the SNR at each destination node, and use this result to derive the integral exact-form of the SER at destination nodes.
  • We also conduct the asymptotic analysis and provide the approximation of all performance factors mentioned above at high P / N 0 regime.
  • The analytical results are all confirmed by Monte Carlo simulations. Using the simulation results, the effect of various system parameters on the system performance is carefully studied.
The rest of this paper is organized as follows. Section 2 describes the system model and the EH protocol that is used in this paper. Section 3 provides the detailed performance analysis of the system, including exact analysis and asymptotic analysis. The numerical results to validate the analysis are presented in Section 4. Finally, conclusions are drawn in Section 5.

2. System Model

2.1. System Model Description

We consider a bidirectional network with two sources and one relay as illustrated in Figure 1. The transmission model follows the principles of analog network coding [30,31]. This concept is the extension of linear network coding to multihop wireless networks. Traditionally, two sources transmit their data to the relay node in two different time slots to avoid interference. However, with analog coding, the data can be transmitted simultaneously to the relay. The relay node forwards this noisy sum of two signals during the next time slot. Because each node already knows one of the signals by virtue of having forwarded it earlier, it can cancel its own part in the received signals and decode the message sent by the other source.
In our model, every terminal has only one antenna and operates in a half-duplex mode. Let S 1 and S 2 denote the first node and the second node that are going to exchange their messages, respectively, and R denote the relay node. We denote the channel gain between node S i and the relay R as g i , for i = 1 , 2 . Here, both channels are assumed to be Rician fading channels and be reciprocal. In this research, we take into account the hardware impairment at both source nodes S 1 , S 2 , and relay node R. Regarding the communication between two nodes, we assume that the direct link between two nodes is very weak, and the communication relies solely with the help of relay. However, the relay has only the energy to serve their own purpose, so it needs to harvest the energy from the two nodes of interest before forwarding the information messages. As in many previous publications on two-way half-duplex channels, we assume that the two sources as well as the relay know the channel gains.

2.2. Energy Harvesting and Information Transfer Protocols

The energy harvesting protocol for this system is illustrated in Figure 2. In this protocol, the transmission is divided into blocks of length T. Each transmission block consists of three time slots. In the first time slot, which has the duration of α T , the relay harvests energy from the nodes S 1 and S 2 . The two remaining time slots are used for information transferring. First, S 1 and S 2 simultaneously transmit to R at the second time slot with the transmitted power P. Then, at the third time slot, R amplifies the signal that it received during the second time slot and broadcasts it to S 1 and S 2 . Both the second and third time slots have the same length of ( 1 α ) T / 2 .
Let P denote the average power transmitted by each node S 1 and S 2 during the first time slot. After the first time slot, the amount of the harvested energy at node R can be computed as
E r = P g 1 2 + P g 2 2 η α T ,
where η is the energy harvesting efficiency.
Let s 1 and s 2 denote the information-bearing symbols transmitted from S 1 and S 2 , respectively. Again, assume that both s 1 and s 2 have the same average power P, i.e. E s i 2 = P . Thus, the received signal at R at the second time slot can be written as [28]
y r = i = 1 2 g i ( s i + η i ) + n r , i = 1 , 2 ,
where:
  • η i denotes the hardware distortion noise at S i with zero mean and variance κ 2 P . Here, κ is sufficient to characterize the aggregate level of impairments of the channel [1].
  • n r is the additive white Gaussian noise (AWGN) at R with zero mean and variance σ r 2 .
At the second time slot, R amplifies the signal y r with an amplifying coefficient β and then retransmits it to S 1 and S 2 . The received signal y i at node S i at the third time slot is
y i = g i ( β y r + η r ) + n i , i = 1 , 2 ,
where η r denotes the distortion noise with zero mean and variance κ r 2 P r , n i is the additive white Gaussian noise (AWGN) at S i with zero mean and variance σ i 2 , for i = 1 , 2 .
According to the law of energy conservation, the total energy that node R uses to transmit the amplified signal to S 1 and S 2 must be equal to the energy that R received from S 1 and S 2 at the first time slot, E r . Now, because the transmission duration of the relay is ( 1 α ) T 2 , the average power of the signal transmitted by R at the third time slot can be computed as
P r = E r ( 1 α ) T / 2 = ψ P g 1 2 + P g 2 2 ,
where ψ = 2 η α 1 α .
In order to ensure that the transmission power at R is P r , the amplifying coefficient β can be chosen as
β = r y r = P r X 1 P + X 1 P κ 2 + X 2 P + X 2 P κ 2 + σ r 2 ,
where X i = g i 2 denotes the square of channel gain amplitude between S i and R.
Note that the relay node R does not need to estimate the hardware noise parameters as well as the individual channel gains g i because the denominator of Equation (5) is the received symbol power during the 2nd time slot. Now, because of the similarity between the roles of S 1 and S 2 , we can focus only on node S 1 . In fact, the received signal y 1 can be rewritten as
y 1 = β g 1 2 s 1 + β g 1 2 η 1 + β g 1 g 2 s 2 + β g 1 g 2 η 2 + β g 1 n r + g 1 η r + n 1 .
This signal contains both messages s 1 and s 2 , while only s 2 is the desired signal at s 1 . Since node S 1 perfectly knows its own transmitted symbol s 1 , it can eliminate the corresponding the self-interference term β g 1 2 s 1 from y 1 .
From this fact, Equation (6) can be rewritten as
y 1 = β g 1 g 2 s 2 s i g n a l + β g 1 2 η 1 + β g 1 g 2 η 2 + β g 1 n r + g 1 η r + n 1 n o i s e .
Therefore, the end-to-end signal-to-noise-ratio at S 1 for detection of the symbol s 1 is given by
γ 1 = E s i g n a l 2 E n o i s e 2 = β 2 g 1 2 g 2 2 P β 2 g 1 4 P κ 2 + β 2 g 1 2 g 2 2 P κ 2 + β 2 g 1 2 σ r 2 + g 1 2 P r κ r 2 + σ 1 2 .
After doing some algebra and using the fact that σ 1 2 σ r 2 P r 0 , combining with Equation (6), we obtain:
γ 1 = X 1 X 2 X 1 X 2 a + X 1 2 a + X 1 b + c ,
where a = κ 2 + κ r 2 ( 1 + κ 2 ) , b = ( 1 + κ r 2 ) P / σ r 2 , c = ( 1 + κ 2 ) ψ P / σ 1 2 (assume that σ 1 2 = σ 2 2 = σ r 2 = N 0 ).

3. System Performance

3.1. Outage Probability

Since the random variable (RV) X i is Rician distributed for i = 1 , 2 , the probability density function (PDF) of X i can be found as
f X i ( x ) = ( K + 1 ) e K λ i e ( K + 1 ) x λ i I 0 2 K ( K + 1 ) x λ i ,
where λ i is the mean value of the RV X i , i = 1 , 2 , K is the Rician K-factor defined as the ratio of the power of the line-of-sight (LOS) component to the scattered components and I 0 · is the zero-th order modified Bessel function of the first kind.
Using the equality I 0 ( x ) = l = 0 x 2 l 2 2 l ( l ! ) 2 [32], Equation (10) can be rewritten as
f X i ( x ) = ζ i e K l = 0 ( ζ i K ) l ( l ! ) 2 x l e ζ i x ,
where ζ i = K + 1 λ i .
The cumulative density function (CDF) of the RV X i ( i = 1 , 2 ) can be derived as in [33]:
F X i ( x ) = 0 x f X i ( t ) d t = 1 e K l = 0 m = 0 l K l ζ i m l ! m ! x m e ζ i x .
The outage probability of this system is defined as the probability that the end-to-end SNR falls below a desired threshold—let us say, γ t h . In this case, it can be derived as
P o u t _ 1 = F γ 1 ( γ t h ) = Pr γ 1 < γ t h = Pr X 1 X 2 X 1 X 2 a + X 1 2 a + X 1 b + c < γ t h ,
where γ t h = 2 2 R 1 , R is the source transmission rate:
Pr X 1 X 2 X 1 X 2 a + X 1 2 a + X 1 b + c < γ t h = Pr X 2 ( X 1 γ t h X 1 a ) < γ t h X 1 2 a + γ t h X 1 b + γ t h c , = Pr X 2 < γ t h X 1 2 a + γ t h X 1 b + γ t h c X 1 γ t h X 1 a , if 1 γ t h a 0 , 1 , if 1 γ t h a < 0 .
In this subsection, we assume that 1 γ t h a is positive, which is reasonable in practice. From Equation (14), we can derive the exact-form expression for the outage probability of the system. This is stated by the following theorem.
Theorem 1 (Outage probability—Exact form).
The exact outage probability for node S 1 of the proposed half-duplex bidirectional wireless sensor network using time-switching energy harvesting strategy over a Rician fading channel can be expressed as
P o u t _ 1 = 1 2 ζ 1 e 2 K e b 1 ζ 2 γ ˜ t h l = 0 k = 0 m = 0 l n = 0 m p = 0 n K l + k ζ 1 k ( ζ 2 γ ˜ t h ) 3 m 2 n + p + k + 1 2 a m n b p c m p + k + 1 2 l ! p ! ( n p ) ! ( m n ) ! ( k ! ) 2 ( ζ 1 + a ζ 2 γ ˜ t h ) m 2 n + p + k + 1 2 × K m 2 n + p + k + 1 2 ( ζ 1 + a ζ 2 γ ˜ t h ) ζ 2 γ ˜ t h c ,
where a = κ 2 + κ r 2 ( 1 + κ 2 ) , b = ( 1 + κ r 2 ) P / σ r 2 , c = ( 1 + κ 2 ) ψ P / σ i 2 , ζ i = K + 1 λ i , and γ ˜ t h = γ t h 1 a γ t h .
Proof of Theorem 1.
See Appendix A. ☐
Remark 1.
The outage probability at node S 2 can also be obtained by exchanging the roles of ζ 1 and ζ 2 in Equation (15).

3.2. Achievable Throughput

With the outage probability obtained from Theorem 1, the achievable throughput of the considered system can be given by
τ i = ( 1 P o u t _ i ) . R 2 . ( 1 α ) , i { 1 , 2 } .

3.3. SER Analysis

In this section, we derive the formula for symbol error rate (SER) at the destination. In fact, the theoretical SER at the receiving node can be computed in terms of the end-to-end SNR at that node [34]. By taking into account the randomness of the SNR in our model, the SER at node S i can be derived by taking the expectation with respect to the random variable SNR:
S E R i = E ω Q 2 θ γ i , i 1 , 2 ,
where Q ( t ) = 1 2 π t e x 2 / 2 d x is the Gaussian Q-function; ω and θ are constants that are specific for each modulation type—in particular, ω = 1 , θ = 1 for Binary Phase Shift keying (BPSK) and ω = 1 , θ = 2 for Quadrature Phase Shift Keying (QPSK). Hence, before obtaining the SER formula, the CDF of γ i is needed. Let F γ i ( x ) be the CDF of γ i . By exchanging the order of integration and changing variable, we come up with the following formula:
S E R i = ω θ 2 π 0 e θ x x F γ i ( x ) d x .
Now, we can claim the following theorem on SER.
Theorem 2 (SER—Exact form).
The exact symbol error rate for node S 1 of the proposed half-duplex bidirectional wireless sensor network using time-switching energy harvesting strategy over a Rician fading channel can be expressed as:
S E R 1 = ω 2 ζ 1 e 2 K ω θ l = 0 k = 0 m = 0 l n = 0 m p = 0 n K l + k ζ 1 k a m n b p c m p + k + 1 2 l ! p ! ( n p ) ! ( m n ) ! ( k ! ) 2 × × 0 e θ x b ζ 2 γ ˜ t h ( x ) π x K m 2 n + p + k + 1 2 [ ζ 1 + a ζ 2 γ ˜ t h ( x ) ] ζ 2 γ ˜ t h ( x ) c [ ζ 2 γ ˜ t h ( x ) ] 3 m 2 n + p + k + 1 2 [ ζ 1 + a ζ 2 γ ˜ t h ( x ) ] m 2 n + p + k + 1 2 d x ,
where γ ˜ t h ( x ) = x 1 a x .
Proof of Theorem 2.
See Appendix B. ☐

3.4. Asymptotic Analysis

The asymptotic analysis is significant to provide further insights into the impact of hardware impairments on the network performance. It can also be used to verify the correctness of the exact analysis. In this section, the asymptotic outage probability and SER at the high SNR regime are going to be derived rigorously.

3.4.1. Outage Probability

As the P / N 0 approaches infinity, it is obvious to see that the SNR in Equation (9) is asymptotically equal to
γ 1 = X 2 a X 2 + a X 1 = X 2 a ( X 1 + X 2 ) ,
and, similarly,
γ 2 = X 1 a ( X 1 + X 2 ) ,
where a = κ 2 + κ r 2 ( 1 + κ 2 ) .
By using the similar approach as in the exact analysis of outage probability, we can get the results as stated in the following theorem.
Theorem 3 (Outage probability—Asymptotic form).
The asymptotic outage probability and achievable throughput for node S 1 of the proposed half-duplex bidirectional wireless sensor network using time-switching energy harvesting strategy over a Rician fading channel can be provided as
P o u t _ 1 = 1 ζ 1 e 2 K l = 0 k = 0 m = 0 l K l + k ζ 1 k ζ 2 m l ! m ! ( k ! ) 2 a γ ˜ t h m Γ ( m + k + 1 ) ( ζ 2 a γ ˜ t h + ζ 1 ) m + k + 1
and
τ 1 ( 1 P o u t _ 1 ) R 2 = ζ 1 R e 2 K 2 l = 0 k = 0 m = 0 l K l + k ζ 1 k ζ 2 m l ! m ! ( k ! ) 2 a γ ˜ t h m Γ ( m + k + 1 ) ( ζ 2 a γ ˜ t h + ζ 1 ) m + k + 1 ,
where a = κ 2 + κ r 2 ( 1 + κ 2 ) , b = ( 1 + κ r 2 ) P / σ r 2 , c = ( 1 + κ 2 ) ψ P / σ i 2 , ζ i = K + 1 λ i , γ ˜ t h = γ t h 1 a γ t h , and Γ ( · ) is the complete Gamma function, which is defined by Γ ( z ) 0 x z 1 e x d x .
Proof of Theorem 3.
See Appendix C. ☐

3.4.2. SER Analysis

As P / N 0 approaches infinity, the symbol-error-rate at node S 1 becomes
S E R 1 = ω θ 2 π 0 e θ x x F γ 1 ( x ) d x ,
where F γ 1 ( x ) is the CDF of γ 1 as P / N 0 goes to infinity.
The result of our asymptotic SER analysis is presented in Theorem 4.
Theorem 4 (SER—Asymptotic form).
The asymptotic symbol error rate for node S 1 of the proposed half-duplex bidirectional wireless sensor network using a time-switching energy harvesting strategy over a Rician fading channel can be provided as the following:
  • If ξ 1 = ξ 2 :
    S E R 1 = ω 2 ω θ 2 π ζ 1 e 2 K l = 0 k = 0 m = 0 l v = 0 k + 1 k + 1 v K l + k ζ 1 k ζ 2 m a m + v ( 1 ) v Γ ( m + k + 1 ) l ! m ! ( k ! ) 2 ζ 1 m + 1 θ m + v + 1 2 γ m + v + 1 2 , θ a .
  • If ξ 1 ξ 2 :
    S E R 1 = ω 2 ω θ 2 π ζ 1 e 2 K l = 0 k = 0 m = 0 l v = 0 k + 1 p = 0 ( m + k + 1 ) p ( ξ 1 ξ 2 ) p k + 1 v × K l + k ζ 2 m a m + v + p ( 1 ) v Γ ( m + k + 1 ) l ! m ! ( k ! ) 2 p ! ζ 1 m + p + 1 θ m + v + p + 1 2 γ m + v + p + 1 2 , θ a ,
where a = κ 2 + κ r 2 ( 1 + κ 2 ) , b = ( 1 + κ r 2 ) P / σ r 2 , c = ( 1 + κ 2 ) ψ P / σ i 2 , ζ 1 = K + 1 λ 1 , γ ˜ t h = γ t h 1 a γ t h , Γ ( · ) is the complete Gamma function, γ ( · , · ) is the incomplete Gamma function, and ( · ) p is the Pochhammer symbol.
Proof of Theorem 4.
See Appendix D. ☐

3.5. Optimal Time-Switching Factor

It is not difficult to learn that there is always a trade-off between the amount of energy used for transmission and the duration of the transmission in the considered protocol. Specifically, if more time is allocated for energy harvesting, a higher available transmission power can be obtained, which may lead to a higher throughput. However, at the same time, less time resources are left for signal transmission, which may lead to the decrease of the transmission rate. Hence, there exists an optimal time-switching factor α * that provides the best throughput performance.
Given the throughput expression obtained in Equation (16), the optimal time switching can be obtained by solving Equation d τ i ( α ) d α = 0 . However, due to the complicated infinite series and Bessel function in each throughput expression, this optimization problem can hardly admit a closed-form solution.
Here, we apply an iterative algorithm to solve this problem numerically. In particular, the Golden section search algorithm, which has been used in many global optimization problems in communications (for example, in [35]), is chosen for this work. For a detailed algorithm as well as its related theory, please refer to [36].

4. Numerical Results and Discussion

For the purpose of validation, the correctness of the derived outage probability and SER expressions as well as investigation of the effect of various parameters on the system performance, a set of Monte Carlo simulations are conducted and presented in this section. For each simulation, we first provide the graphs of the outage probability and throughput obtained by the analytical formulas. Secondly, we plot the same outage probability and throughput curves that result from Monte Carlo simulation. To do this, we generate 10 5 random samples of each channel gain, which are Rician distributed. Using these random samples, the SNR at destination node S 1 is calculated and compared with the threshold value γ. The outage probability occurs if this SNR falls below the threshold. By taking the number of cases that S N R < γ divided by the number of samples, we can estimate the outage probability and then the throughput of system. The analytical curve and the simulation one should match together to verify the correctness of our analysis.
The hardware impairment parameters are chosen as κ = κ r = 0.1 . The ideal hardware impairment situation ( κ = κ r = 0 ) is also considered as a benchmark performance for simulation. The channel gains are considered as Rician fading with λ 1 = λ 2 = 0.5 and with the Rician K-factors equal to 3 for both channels. The transmit power are set to the same value P 1 = P 2 = P for both two sources, so that the ratio P / N 0 varies in the range from 0 to 50 dB. The energy harvesting efficiency is set to be 0.7. The source transmission rate is chosen as 1.5 bps/Hz. From the Shannon’s theorem on capacity of the channel, we can calculate the S N R threshold as γ = 2 2 R 1 . All simulation parameters are listed in Table 1.

4.1. Effects of Various Parameters on the System Performance

Figure 3 and Figure 4 show the effect of P / N 0 on the outage probability and throughput of the proposed system, respectively. For this simulation, the utilized parameter settings are: κ = κ r = 0.1 or 0.2 , α = 0.5 and η = 0 . 7 . We choose α = 0.5 to consider the case that the duration of energy harvesting and the duration of transmission are balanced. The case κ = 0 (no hardware impairment) is also introduced for comparison. The first observation is that the outage probability and throughput obtained from mathematical analysis match with the corresponding Monte Carlo simulations. Regarding the effect of κ, the outage probability decreases and the throughput increases as κ varies from 0 to 0.2. When P / N 0 increases, the outage probability and throughput approach the corresponding asymptotic values obtained from analysis. Furthermore, the lower the value of κ, the faster the outage probability and throughput converge to their asymptotic values.
The effect of hardware impairment level on the outage probability and the achievable throughput at each node is presented more thoroughly in Figure 5 and Figure 6. Here, P / N 0 is set at 20 dB and the transmission rate is fixed at 1.5 bps. Three values of α are chosen: 0.2, 0.5, and 0.8, corresponding to three cases: the energy harvesting duration is dominant, there is a balance between energy harvesting and information transmission, and the information transmission duration is dominant.
Again, it is observed that the exact-form expressions of outage probability and throughput obtained by the analysis coincide with the ones that are obtained by Monte Carlo simulations. From the numerical results, it is evident that the achievable throughput decreases and the outage probability increases significantly at each destination node when the impairment level κ increases. In addition, the outage probability tends to reduce at higher time-switching factor. This can be explained because the larger value of α means more power is used for data transmission. However, this doesn’t mean that the throughput is better for larger α. In Figure 6, the throughput performance is improved when α increases from 0.2 to 0.5, but then degraded when α increases from 0.5 to 0.8.
Figure 7 and Figure 8 illustrate more clearly the effect of time-switching factor on the outage and throughput performance. In this simulation, the parameters are chosen as η = 0.7 and P / N 0 = 20 dB (this value is chosen because it is in the middle range of P / N 0 ). The transmission rate varies among three values: 0.5 bps/Hz, 1 bps/Hz and 1.5 bps/Hz, while the time-switching factor varies in the range ( 0 , 1 ) . The results confirm what we mentioned just above. There should be a unique value of α that maximizes the throughput. This is because, when we increase α initially, there is more power used for transmission, so the outage probability is reduced and the throughput increases correspondingly. However, when α keeps increasing, the duration of transmission is also reduced, hence, less data is transmitted during a given time interval. As a result, the throughput performance becomes worse.

4.2. Effect of Various Parameters on SER

The purpose of the following simulations is to confirm the correctness of the SER formulas provided in the analysis. First, Figure 9 presents the effect of the hardware impairment level on the SER performance. In this simulation, the time-switching factor is chosen as α = 0.5 with the same reason as in Section 4.1, the transmission rate is fixed at 1 bps/Hz, and the ratio P / N 0 varies in the range from 0 dB to 40 dB. From the results, it is showed that SER decreases to the asymptotic value when the ratio P s / N 0 increases. The Monte Carlo simulation curves overlap with the corresponding analysis curves. This confirms the validity of our analysis. When the hardware impairment level goes higher, the SER also has a larger value, as expected. Furthermore, the SER performance of the QPSK scheme is better than the one of the BPSK scheme in the same simulation condition. This can be explained because the QPSK modulation scheme can transmit two bits in one symbol while the BPSK scheme can only transmit one bit per symbol. Hence, if we have the same constraint on the transmission rate for both methods, the required SNR for maintaining good communication would be smaller for the QPSK method. As a result, the outage probability and the SER for QPSK modulation would be smaller than the ones of BPSK.
In a similar way, the influence of the time-switching factor on the symbol-error-rate at the destination node is illustrated in Figure 10. The simulation parameters are κ = 0.1 , R = 1 bps/Hz, and P / N 0 varies from 0 dB to 40 dB. Again, the simulation curves match perfectly with the corresponding analysis curves. The SER tends to approach its asymptotic value, and QPSK modulation still provides the better SER performance than BPSK for both values of α. Note that, for this simulation, the asymptotic values do not depend on the time-switching factor α. However, α surely has an effect on the immediate value of SER. In fact, the SER performance should be better with the value of α that is in the middle of its range. For example, in Figure 10, the SER value for α = 0.5 is less than the one with α = 0.2 . The explanation is the same as the case of Figure 8.

4.3. Optimal Time-Switching Factor

As mentioned in Section 3, the optimal time-switching factor to maximize the achievable throughput of the considered system can be found numerically by using an iterative algorithm such as the golden section search method [36]. Figure 11 plots the optimal value α * for various values of the ratio P / N 0 at different hardware impairment levels.
It can be observed that the optimal time-switching factor decreases as the ratio P / N 0 increases. This is because, for large P / N 0 , the outage probability tends to reduce, so it is not necessary to use a large amount of energy to transmit data. Reversely, we need to spend more time resources to increase the throughput of the system.
On the other hand, we can learn from this simulation that the optimal α does not change much for different hardware impairment levels. Especially, for small κ, the value of α * is nearly the same as the one for a perfect hardware case.

5. Conclusions

Recent development in wireless sensor networks have led to an exponential growth of the energy demand for operating the networks, which raises a question about how to efficiently use the available energy in the wireless environment. This paper rigorously analyzes the performance of a half-duplex AF bidirectional sensor network in which the relay node is equipped with time-switching-based energy harvesting protocol. The channel considered in this paper is a Rician fading channel. We also take into account the hardware impairment at source and relay nodes. We derive both exact and asymptotic forms of the outage probability, achievable throughput, as well as the symbol-error-rate at each destination node. The analysis results are validated by Monte Carlo simulation. From the results of this work, we can gain an insightful understanding of the effect of various parameters on the system performance. Furthermore, the optimal time-switching factor (i.e., the best energy harvesting strategy) is also founded by numerical algorithms.

Author Contributions

Tan N. Nguyen created the main idea and developed the performance evaluation by analysis and simulation for the basic case that λ 1 = λ 2 . Tran Hoang Quang Minh set up the simulation configurations, performed the numerical experiments and wrote the paper. Phuong T. Tran extended the analysis for the general case. Phuong T. Tran and Miroslav Voznak were working as the advisors of Tan N. Nguyen to discuss and advise the main idea and performance analysis together.

Funding

This research received funding from the grant No. SP2018/59 conducted by VSB–Technical University of Ostrava, Czech Republic.

Conflicts of Interest

The authors declare no conflict of interest. The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
AFamplify-and-forward
AWGNadditive white Gaussian noise
BPSKbinary phase shift keying
CDFcumulative distribution function
EHenergy harvesting
I/QIn-phase/Quadrature
LOSline-of-sight
PDFprobability density function
PSpower splitting
QPSKquadrature phase shift keying
RFradio frequency
RVrandom variable
SERsymbol-error-rate
SNRsignal-to-noise ratio
SWIPTsimultaneous wireless information and power transfer
TStime switching
TWRNtwo-way relay network
WSNwireless sensor network

Appendix A. Proof of Theorem 1

In this section, the detailed proof of Theorem 1 is provided. Without loss of generality, we can consider the node S 1 only. From Equation (14), we can fix X 1 at some value x 1 and compute the probability in Equation (14) in terms of x 1 . Then, we take the average of the obtained function with respect to the distribution of X 1 to get the outage probability. Using this approach, Equation (14) can be rewritten as
P o u t _ 1 = 0 F X 2 γ t h x 1 2 a + γ t h x 1 b + γ t h c x 1 γ t h x 1 a f X 1 ( x 1 ) d x 1 .
Let us denote γ ˜ t h γ t h 1 a γ t h . Then, we have γ t h x 1 2 a + γ t h x 1 b + γ t h c x 1 γ t h x 1 a = γ ˜ t h x 1 a + c x 1 + b . Now, Equation (A1) can be rewritten as
P o u t _ 1 = = 1 0 l = 0 m = 0 l e K K l ( ζ 2 γ ˜ t h ) m l ! m ! x 1 a + c x 1 + b 1 m e ζ 2 γ ˜ t h a x 1 + c x 1 + b ζ 1 e K k = 0 ( ζ 1 K x 1 ) k e ζ 1 x 1 ( k ! ) 2 d x 1 = 1 ζ 1 e 2 K 0 l = 0 k = 0 m = 0 l K l + k ζ 2 m γ ˜ t h m l ! m ! ( k ! ) 2 x 1 a + c x 1 + b m e ζ 2 γ ˜ t h x 1 a + c x 1 + b ( ζ 1 x 1 ) k e ζ 1 x 1 d x 1 .
By applying the formula ( x + y ) m = n = 0 m m n x m n y n and letting ξ 12 ζ 1 e 2 K e b ζ 2 γ ˜ t h , we obtain:
P o u t _ 1 = 1 ξ 12 0 l = 0 k = 0 m = 0 l K l + k ζ 2 m γ ˜ t h m l ! m ! ( k ! ) 2 n = 0 m m n x 1 a m n c x 1 + b n e ζ 2 γ ˜ t h x 1 a + c x 1 ( ζ 1 x 1 ) k e ζ 1 x 1 d x 1 = 1 ξ 12 0 l = 0 k = 0 m = 0 l n = 0 m K l + k ζ 1 k ζ 2 m γ ˜ t h m a m n l ! n ! ( m n ) ! ( k ! ) 2 x 1 m n + k p = 0 n n p c x 1 n p b p e ζ 2 γ ˜ t h x 1 a + c x 1 e ζ 1 x 1 d x 1 = 1 ξ 12 0 l = 0 k = 0 m = 0 l n = 0 m p = 0 n K l + k ζ 1 k ζ 2 m γ ˜ t h m a m n b p c n p l ! p ! ( n p ) ! ( m n ) ! ( k ! ) 2 x 1 m 2 n + k + p e ζ 2 γ ˜ t h x 1 a + c x 1 e ζ 1 x 1 d x 1 = 1 ξ 12 l = 0 k = 0 m = 0 l n = 0 m p = 0 n K l + k ζ 1 k ζ 2 m γ ˜ t h m a m n b p c n p l ! p ! ( n p ) ! ( m n ) ! ( k ! ) 2 0 x 1 m 2 n + k + p e ( ζ 1 + a ζ 2 γ ˜ t h ) x 1 ζ 2 γ ˜ t h c x 1 d x 1 .
Now, by letting ζ 12 ζ 1 + a ζ 2 γ ˜ t h and using Equation (3.471.9) in [32], we obtain the outage probability:
P o u t _ 1 = 1 ξ 12 l = 0 k = 0 m = 0 l n = 0 m p = 0 n K l + k ζ 1 k ζ 2 m γ ˜ t h m a m n b p c n p l ! p ! ( n p ) ! ( m n ) ! ( k ! ) 2 2 ζ 2 γ ˜ t h c ζ 12 m 2 n + p + k + 1 2 K m 2 n + p + k + 1 2 ζ 12 ζ 2 γ ˜ t h c = 1 2 ξ 12 l = 0 k = 0 m = 0 l n = 0 m p = 0 n K l + k ζ 1 k ( ζ 2 γ ˜ t h ) 3 m 2 n + p + k + 1 2 a m n b p c m p + k + 1 2 l ! p ! ( n p ) ! ( m n ) ! ( k ! ) 2 ζ 12 m 2 n + p + k + 1 2 K m 2 n + p + k + 1 2 ζ 12 ζ 2 γ ˜ t h c ,
where K v ( · ) is the ν t h -order modified Bessel function of the second kind.

Appendix B. Proof of Theorem 2

Again, without loss of generality, we can only consider the case i = 1 (the SER at node 1). Obviously, the CDF of the SNR at node S 1 , denoted by F γ 1 ( x ) , is the outage probability at S 1 when the threshold SNR is equal to x. Thus, it can be written as
F γ 1 ( x ) = Pr X 1 X 2 X 1 X 2 a + X 1 2 a + X 1 b + c < x = Pr X 2 < x X 1 2 a + x X 1 b + x c X 1 x X 1 a , if x 1 a , 1 , if x > 1 a .
Then, we can substitute Equation (A5) into Equation (19) to get
S E R 1 = ω θ 2 π 0 e θ x x F γ 1 ( x ) d x = ω θ 2 π 0 1 / a e θ x x F γ 1 ( x ) d x + ω θ 2 π 1 / a e θ x x d x .
By using the results from the previous version, the CDF F γ 1 ( x ) for x 1 / a is given by
F γ 1 ( x ) = 1 2 ζ 1 e 2 K e b ζ 2 γ ˜ t h l = 0 k = 0 m = 0 l n = 0 m p = 0 n K l + k ζ 1 k ( ζ 2 γ ˜ t h ) 3 m 2 n + p + k + 1 2 a m n b p c m p + k + 1 2 l ! p ! ( n p ) ! ( m n ) ! ( k ! ) 2 ( ζ 1 + a ζ 2 γ ˜ t h ) m 2 n + p + k + 1 2 × K m 2 n + p + k + 1 2 ( ζ 1 + a ζ 2 γ ˜ t h ) ζ 2 γ ˜ t h c .
Let us denote Ξ ( x ) 1 F γ 1 ( x ) . Then, Equation (A6) can be rewritten as
S E R 1 = ω θ 2 π 0 1 / a e θ x x 1 Ξ ( x ) d x + ω θ 2 π 1 / a 1 e θ x x d x = ω θ 2 π 0 e θ x x d x ω θ 2 π 0 1 / a e θ x x Ξ ( x ) d x = ω 2 ω θ 2 π 0 1 / a e θ x x Ξ ( x ) d x .
Then, Equation (19) can be obtained by substituting Ξ ( x ) 1 F γ 1 ( x ) and Equation (A7) into Equation (18).

Appendix C. Proof of Theorem 3

The PDF of the random variable X i is given by f X i ( x ) = ζ i e K l = 0 ( ζ i K ) l ( l ! ) 2 x l e ζ i x . Hence, the asymptotic outage probability at node S 1 can be written as
P o u t _ 1 = Pr ( γ 1 < γ t h ) = Pr X 2 X 1 + X 2 < a γ t h = Pr X 2 < a γ t h X 1 1 a γ t h = 0 F X 2 a γ t h x 1 1 a γ t h f X 1 ( x 1 ) d x 1 = 1 0 e K l = 0 m = 0 l K l ζ 2 m l ! m ! a γ ˜ t h x 1 m e ζ 2 a γ ˜ t h x 1 ζ 1 e K k = 0 ( ζ 1 K ) k ( k ! ) 2 x 1 k e ζ 1 x 1 d x 1 = 1 ζ 1 e 2 K 0 l = 0 k = 0 m = 0 l K l + k ζ 1 k ζ 2 m l ! m ! ( k ! ) 2 a γ ˜ t h x 1 m e ζ 2 a γ ˜ t h x 1 x 1 k e ζ 1 x 1 d x 1 = 1 ζ 1 e 2 K l = 0 k = 0 m = 0 l K l + k ζ 1 k ζ 2 m l ! m ! ( k ! ) 2 a γ ˜ t h m 0 x 1 m + k . e ( ζ 2 a γ ˜ t h + ζ 1 ) x 1 d x 1 .
Using the Formula (3.381.4) in [32], we obtain the asymptotic formula:
P o u t _ 1 = 1 ζ 1 e 2 K l = 0 k = 0 m = 0 l K l + k ζ 1 k ζ 2 m l ! m ! ( k ! ) 2 a γ ˜ t h m Γ ( m + k + 1 ) ( ζ 2 a γ ˜ t h + ζ 1 ) m + k + 1 ,
where Γ ( · ) is the complete gamma function.
The asymptotic throughput can be obtained by substituting Equation (A9) into the definitive formula of the throughput.

Appendix D. Proof of Theorem 4

The CDF of γ 1 as high SNR regime can be written as
F γ 1 ( x ) = Pr ( γ 1 < x ) = Pr X 2 a X 2 + a X 1 < x = Pr X 2 < a x X 1 1 a x , if x 1 a , 1 , if x > 1 a .
Now, we can rewrite the formula of SER by substituting Equation (A10) into Equation (24)
S E R 1 = ω θ 2 π 0 e θ x x F γ 1 ( x ) d x = ω θ 2 π 0 1 / a e θ x x F γ 1 ( x ) d x + ω θ 2 π 1 / a e θ x x d x .
For x 1 a , we can apply the result of Theorem 3 with γ ˜ t h ( x ) = x 1 a x to get
F γ 1 ( x ) = Pr ( γ 1 < x ) = 1 ζ 1 e 2 K l = 0 k = 0 m = 0 l K l + k ζ 1 k ζ 2 m l ! m ! ( k ! ) 2 a γ ˜ t h ( x ) m Γ ( m + k + 1 ) [ ζ 2 a γ ˜ t h ( x ) + ζ 1 ] m + k + 1 = 1 ζ 1 e 2 K l = 0 k = 0 m = 0 l K l + k ζ 1 k ζ 2 m a m l ! m ! ( k ! ) 2 . x m ( 1 a x ) k + 1 Γ ( m + k + 1 ) [ ( ζ 2 ζ 1 ) a x + ζ 1 ] m + k + 1 = 1 ζ 1 e 2 K l = 0 k = 0 m = 0 l v = 0 k + 1 k + 1 v K l + k ζ 1 k ζ 2 m a m + v ( 1 ) v x m + v Γ ( m + k + 1 ) l ! m ! ( k ! ) 2 [ ( ζ 2 ζ 1 ) a x + ζ 1 ] m + k + 1 = 1 ζ 1 e 2 K l = 0 k = 0 m = 0 l v = 0 k + 1 k + 1 v K l + k ζ 2 m a m + v ( 1 ) v x m + v Γ ( m + k + 1 ) l ! m ! ( k ! ) 2 ζ 1 m + 1 1 + ( ζ 2 ζ 1 ) a x ζ 1 m + k + 1 .
The aymptotic SER is now obtained by substituting Equation (A12) into Equation (A11):
S E R 1 = ω θ 2 π 0 e θ x x d x ω θ 2 π ζ 1 e 2 K l = 0 k = 0 m = 0 l v = 0 k + 1 k + 1 v K l + k ζ 1 k ζ 2 m a v k 1 ( 1 ) v Γ ( m + k + 1 ) l ! m ! ( k ! ) 2 ( ζ 2 ζ 1 ) m + k + 1 0 x m + v 1 2 e θ x d x x + ζ 1 ( ζ 2 ζ 1 ) a m + k + 1 = ω 2 ω θ 2 π ζ 1 e 2 K l = 0 k = 0 m = 0 l v = 0 k + 1 k + 1 v K l + k ζ 1 k ζ 2 m a v k 1 ( 1 ) v Γ ( m + k + 1 ) l ! m ! ( k ! ) 2 ( ζ 2 ζ 1 ) m + k + 1 0 1 / a x m + v 1 2 e θ x d x x + ζ 1 ( ζ 2 ζ 1 ) a m + k + 1 .
We consider three cases:
Case 1: ξ 2 =ξ 1 .
Equation (A13) can be rewritten as
S E R 1 = ω 2 ω θ 2 π ζ 1 e 2 K l = 0 k = 0 m = 0 l v = 0 k + 1 k + 1 v K l + k ζ 1 k ζ 2 m a m + v ( 1 ) v Γ ( m + k + 1 ) l ! m ! ( k ! ) 2 ζ 1 m + 1 0 1 / a x m + v 1 2 e θ x d x = ω 2 ω θ 2 π ζ 1 e 2 K l = 0 k = 0 m = 0 l v = 0 k + 1 k + 1 v K l + k ζ 1 k ζ 2 m a m + v ( 1 ) v Γ ( m + k + 1 ) l ! m ! ( k ! ) 2 ζ 1 m + 1 θ m v 1 2 γ m + v + 1 2 , θ a ,
where γ ( α , z ) 0 z e t t α 1 d t is the incomplete gamma function as defined in Equation (8.350.1) in [32] and the last equality comes from the Formula (3.381.1) in [32].
Case 2: ξ 2 <ξ 1 .
For all x [ 0 , 1 a ] , we have x < 1 a . ξ 1 ξ 1 ξ 2 . Hence, we can apply the Taylor’s series expansion of 1 1 ( ξ 1 ξ 2 ) a x ξ 1 m + k + 1 as in [37]:
1 1 ( ξ 1 ξ 2 ) a x ξ 1 m + k + 1 = p = 0 ( m + k + 1 ) p p ! ( ξ 1 ξ 2 ) a x ξ 1 p ,
where ( · ) p is the Pochhammer symbol, which is defined as
( α ) p 1 , if p = 0 , α ( α + 1 ) . . . ( α + p 1 ) , if p 0 .
Now, we can obtain the following equation by substituting Equation (A15) into Equation (A13) and applying (3.381.1) in [32]:
S E R 1 = ω 2 ω θ 2 π ζ 1 e 2 K l = 0 k = 0 m = 0 l v = 0 k + 1 k + 1 v K l + k ζ 1 k ζ 2 m a v k 1 ( 1 ) v Γ ( m + k + 1 ) l ! m ! ( k ! ) 2 ( ζ 2 ζ 1 ) m + k + 1 0 1 / a x m + v 1 2 e θ x d x x + ζ 1 ( ζ 2 ζ 1 ) a m + k + 1 = ω 2 ω θ 2 π ζ 1 e 2 K l = 0 k = 0 m = 0 l v = 0 k + 1 k + 1 v K l + k ζ 2 m a m + v ( 1 ) v Γ ( m + k + 1 ) l ! m ! ( k ! ) 2 ζ 1 m + 1 0 1 / a x m + v 1 2 e θ x d x 1 + ( ζ 2 ζ 1 ) a x ζ 1 m + k + 1 = ω 2 ω θ 2 π ζ 1 e 2 K l = 0 k = 0 m = 0 l v = 0 k + 1 k + 1 v K l + k ζ 2 m a m + v ( 1 ) v Γ ( m + k + 1 ) l ! m ! ( k ! ) 2 ζ 1 m + 1 × 0 1 / a x m + v 1 2 e θ x p = 0 ( m + k + 1 ) p p ! ( ξ 1 ξ 2 ) a x ξ 1 p d x = ω 2 ω θ 2 π ζ 1 e 2 K l = 0 k = 0 m = 0 l v = 0 k + 1 p = 0 ( m + k + 1 ) p ( ξ 1 ξ 2 ) p k + 1 v K l + k ζ 2 m a m + v + p ( 1 ) v Γ ( m + k + 1 ) l ! m ! ( k ! ) 2 p ! ζ 1 m + p + 1 × 0 1 / a x m + v + p 1 2 e θ x d x = ω 2 ω θ 2 π ζ 1 e 2 K l = 0 k = 0 m = 0 l v = 0 k + 1 p = 0 ( m + k + 1 ) p ( ξ 1 ξ 2 ) p k + 1 v K l + k ζ 2 m a m + v + p ( 1 ) v Γ ( m + k + 1 ) l ! m ! ( k ! ) 2 p ! ζ 1 m + p + 1 θ m + v + p + 1 2 × γ m + v + p + 1 2 , θ a .
Case 3: ξ 2 >ξ 1 .
Using the same approach as in Case 2, with the Taylor’s series expansion 1 1 + ( ξ 2 ξ 1 ) a x ξ 1 m + k + 1 = p = 0 ( 1 ) p ( m + k + 1 ) p p ! ( ξ 2 ξ 1 ) a x ξ 1 p , we get the following result:
S E R 1 = ω 2 ω θ 2 π ζ 1 e 2 K l = 0 k = 0 m = 0 l v = 0 k + 1 p = 0 ( m + k + 1 ) p ( ξ 1 ξ 2 ) p k + 1 v × K l + k ζ 2 m a m + v + p ( 1 ) v Γ ( m + k + 1 ) l ! m ! ( k ! ) 2 p ! ζ 1 m + p + 1 θ m + v + p + 1 2 γ m + v + p + 1 2 , θ a .

References

  1. De Rango, F.; Lonetti, P.; Marano, S. MEA-DSR: A multipath energy-aware routing protocol for wireless Ad Hoc Networks. IFIP Int. Fed. Inf. Process. 2008, 265, 215–225. [Google Scholar] [CrossRef]
  2. Nguyen, H.S.; Do, D.T.; Voznak, M. Two-way relaying networks in green communications for 5G: Optimal throughput and trade-off between relay distance on power splitting-based and time switching-based relaying SWIPT. AEU-Int. J. Electron. Commun. 2016, 70, 1637–1644. [Google Scholar] [CrossRef]
  3. Nguyen, H.S.; Bui, A.H.; Do, D.T.; Voznak, M. Imperfect channel state information of AF and DF energy harvesting cooperative networks. China Commun. 2016, 13, 11–19. [Google Scholar] [CrossRef]
  4. Chu, Z.; Zhou, F.; Zhu, Z.; Hu, R.Q.; Xiao, P. Wireless Powered Sensor Networks for Internet of Things: Maximum Throughput and Optimal Power Allocation. IEEE Internet Things J. 2018, 5, 310–321. [Google Scholar] [CrossRef] [Green Version]
  5. Mekikis, P.V.; Lalos, A.S.; Antonopoulos, A.; Alonso, L.; Verikoukis, C. Wireless Energy Harvesting in Two-Way Network Coded Cooperative Communications: A Stochastic Approach for Large Scale Networks. IEEE Commun. Lett. 2014, 18, 1011–1014. [Google Scholar] [CrossRef] [Green Version]
  6. Sudevalayam, S.; Kulkarni, P. Energy Harvesting Sensor Nodes: Survey and Implications. IEEE Commun. Surv. Tutor. 2011, 13, 443–461. [Google Scholar] [CrossRef] [Green Version]
  7. Guo, S.; Wang, F.; Yang, Y.; Xiao, B. Energy-Efficient Cooperative Tfor Simultaneous Wireless Information and Power Transfer in Clustered Wireless Sensor Networks. IEEE Trans. Commun. 2015, 63, 4405–4417. [Google Scholar] [CrossRef]
  8. Fotino, M.; Gozzi, A.; Cano, J.C.; Calafate, C.; Rango, F.; Manzoni, P.; Marano, S. Evaluating energy consumption of proactive and reactive routing protocols in a MANET. IFIP Int. Fed. Inf. Process. 2007, 248, 119–130. [Google Scholar] [CrossRef]
  9. Mekikis, P.V.; Antonopoulos, A.; Kartsakli, E.; Lalos, A.S.; Alonso, L.; Verikoukis, C. Information Exchange in Randomly Deployed Dense WSNs with Wireless Energy Harvesting Capabilities. IEEE Trans. Wirel. Commun. 2016, 15, 3008–3018. [Google Scholar] [CrossRef]
  10. Wang, C.; Li, J.; Yang, Y.; Ye, F. Combining Solar Energy Harvesting with Wireless Charging for Hybrid Wireless Sensor Networks. IEEE Trans. Mob. Comput. 2018, 17, 560–576. [Google Scholar] [CrossRef]
  11. Kosunalp, S. An energy prediction algorithm for wind-powered wireless sensor networks with energy harvesting. Energy 2017, 139, 1275–1280. [Google Scholar]
  12. Prijić, A.; Vračar, L.; Vučković, D.; Milić, D.; Prijić, Z. Thermal Energy Harvesting Wireless Sensor Node in Aluminum Core PCB Technology. IEEE Sens. J. 2015, 15, 337–345. [Google Scholar] [CrossRef]
  13. Guo, S.; Wang, C.; Yang, Y. Joint Mobile Data Gathering and Energy Provisioning in Wireless Rechargeable Sensor Networks. IEEE Trans. Mob. Comput. 2014, 13, 2836–2852. [Google Scholar] [CrossRef]
  14. Perera, T.D.P.; Jayakody, D.N.K.; Sharma, S.K.; Chatzinotas, S.; Li, J. Simultaneous Wireless Information and Power Transfer (SWIPT): Recent Advances and Future Challenges. IEEE Commun. Surv. Tutor. 2018, 20, 264–302. [Google Scholar] [CrossRef]
  15. Nguyen, H.S.; Nguyen, T.S.; Voznak, M. Relay selection for SWIPT: Performance analysis of optimization problems and the trade-off between ergodic capacity and energy harvesting. AEU-Int. J. Electron. Commun. 2018, 85, 59–67. [Google Scholar] [CrossRef]
  16. Varshney, L.R. Transporting information and energy simultaneously. In Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, 6–11 July 2008; pp. 1612–1616. [Google Scholar]
  17. Zhou, X.; Zhang, R.; Ho, C.K. Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff. IEEE Trans. Commun. 2013, 61, 4754–4767. [Google Scholar] [CrossRef]
  18. Nasir, A.A.; Zhou, X.; Durrani, S.; Kennedy, R.A. Relaying Protocols for Wireless Energy Harvesting and Information Processing. IEEE Trans. Wirel. Commun. 2013, 12, 3622–3636. [Google Scholar] [CrossRef] [Green Version]
  19. Peng, C.; Li, F.; Liu, H. Wireless Energy Harvesting Two-Way Relay Networks with Hardware Impairments. Sensors 2017, 17, 2604. [Google Scholar] [CrossRef]
  20. Mouapi, A.; Hakem, N. A New Approach to Design Autonomous Wireless Sensor Node Based on RF Energy Harvesting System. Sensors 2018, 18, 133. [Google Scholar] [CrossRef]
  21. Le, Q.N.; Bao, V.N.Q.; An, B. Full-duplex distributed switch-and-stay energy harvesting selection relaying networks with imperfect CSI: Design and outage analysis. J. Commun. Netw. 2018, 20, 29–46. [Google Scholar] [CrossRef]
  22. Nguyen, D.K.; Jayakody, D.N.K.; Chatzinotas, S.; Thompson, J.S.; Li, J. Wireless Energy Harvesting Assisted Two-Way Cognitive Relay Networks: Protocol Design and Performance Analysis. IEEE Access 2017, 5, 21447–21460. [Google Scholar] [CrossRef]
  23. Olofsson, T.; Ahlén, A.; Gidlund, M. Modeling of the Fading Statistics of Wireless Sensor Network Channels in Industrial Environments. IEEE Trans. Signal Process. 2016, 64, 3021–3034. [Google Scholar] [CrossRef]
  24. Zhao, F.; Lin, H.; Zhong, C.; Hadzi-Velkov, Z.; Karagiannidis, G.K.; Zhang, Z. On the Capacity of Wireless Powered Communication Systems over Rician Fading Channels. IEEE Trans. Commun. 2018, 66, 404–417. [Google Scholar] [CrossRef]
  25. Hu, Y.; Cao, N.; Chen, Y. Analysis of Wireless Energy Harvesting Relay Throughput in Rician Channel. Mob. Inf. Syst. 2016, 2016. [Google Scholar] [CrossRef]
  26. Mishra, D.; De, S.; Chiasserini, C.F. Joint Optimization Schemes for Cooperative Wireless Information and Power Transfer over Rician Channels. IEEE Trans. Commun. 2016, 64, 554–571. [Google Scholar]
  27. Schenk, T. RF Imperfections in High-Rate Wireless Systems: Impact and Digital Compensation, 1st ed.; Springer: New York, NY, USA, 2008; ISBN 978-1-4020-6903-1. [Google Scholar]
  28. Bjornson, E.; Matthaiou, M.; Debbah, M. A New Look at Dual-Hop Relaying: Performance Limits with Hardware Impairments. IEEE Trans. Commun. 2013, 61, 4512–4525. [Google Scholar] [Green Version]
  29. Nguyen, T.N.; Duy, T.T.; Luu, G.T.; Tran, P.T.; Voznak, M. Energy Harvesting-based Spectrum Access with Incremental Cooperation, Relay Selection and Hardware Noises. Radioengineering 2017, 10, 240–250. [Google Scholar] [CrossRef]
  30. Katti, S.; Gollakota, S.; Katabi, D. Embracing Wireless Interference: Analog Network Coding. SIGCOMM Comput. Commun. Rev. 2007, 37, 397–408. [Google Scholar] [CrossRef]
  31. Qin, J.; Zhu, Y.; Zhe, P. Broadband Analog Network Coding with Robust Processing for Two-Way Relay Networks. IEEE Commun. Lett. 2017, 21, 1115–1118. [Google Scholar] [CrossRef]
  32. Zwillinger, D.; Moll, V.; Gradshteyn, I.; Ryzhik, I. Table of Integrals, Series, and Products, 8th ed.; Zwillinger, D., Ed.; Academic Press: Boston, MA, USA, 2015; ISBN 978-0-12-384933-5. [Google Scholar]
  33. Bhatnagar, M.R. On the Capacity of Decode-and-Forward Relaying over Rician Fading Channels. IEEE Commun. Lett. 2013, 17, 1100–1103. [Google Scholar] [CrossRef] [Green Version]
  34. McKay, M.R.; Grant, A.J.; Collings, I.B. Performance Analysis of MIMO-MRC in Double-Correlated Rayleigh Environments. IEEE Trans. Commun. 2007, 55, 497–507. [Google Scholar] [CrossRef] [Green Version]
  35. Duong, T.Q.; Duy, T.T.; Matthaiou, M.; Tsiftsis, T.; Karagiannidis, G.K. Cognitive cooperative networks in dual-hop asymmetric fading channels. In Proceedings of the 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA, 9–13 December 2013; pp. 955–961. [Google Scholar]
  36. Chong, E.K.P.; Zak, S.H. An Introduction to Optimization, 3rd ed.; John Wiley & Sons: Hoboken, NJ, USA, 2013; ISBN 978-1-118-27901-4. [Google Scholar]
  37. Morosi, C.; Pizzocchero, L. On the expansion of the Kummer function in terms of incomplete Gamma functions. Arch. Inequal. Appl. 2004, 2, 49–72. [Google Scholar]
Figure 1. System model.
Figure 1. System model.
Sensors 18 01781 g001
Figure 2. The energy harvesting and information processing in the system model.
Figure 2. The energy harvesting and information processing in the system model.
Sensors 18 01781 g002
Figure 3. Outage probability versus P / N 0 .
Figure 3. Outage probability versus P / N 0 .
Sensors 18 01781 g003
Figure 4. Achievable throughput versus P / N 0
Figure 4. Achievable throughput versus P / N 0
Sensors 18 01781 g004
Figure 5. Outage probability versus κ.
Figure 5. Outage probability versus κ.
Sensors 18 01781 g005
Figure 6. Achievable throughput versus κ.
Figure 6. Achievable throughput versus κ.
Sensors 18 01781 g006
Figure 7. Outage probability versus α.
Figure 7. Outage probability versus α.
Sensors 18 01781 g007
Figure 8. Achievable throughput versus α.
Figure 8. Achievable throughput versus α.
Sensors 18 01781 g008
Figure 9. Effect of κ and modulation scheme on SER.
Figure 9. Effect of κ and modulation scheme on SER.
Sensors 18 01781 g009
Figure 10. Effect of α and modulation scheme on SER.
Figure 10. Effect of α and modulation scheme on SER.
Sensors 18 01781 g010
Figure 11. Effect of α and modulation scheme on SER.
Figure 11. Effect of α and modulation scheme on SER.
Sensors 18 01781 g011
Table 1. Simulation parameters.
Table 1. Simulation parameters.
SymbolParameter NamesValues
η Energy harvesting efficiency0.7
λ 1 Mean of | g 1 | 2 0.5
λ 2 Mean of | g 2 | 2 0.5
KRician K-factor3
P / N 0 Source-power-to-noise ratio0–50 dB
κ = κ r Hardware impairment levels0, 0.15, 0.25
RSource transmission rate1.5 bps/Hz

Share and Cite

MDPI and ACS Style

Nguyen, T.N.; Quang Minh, T.H.; Tran, P.T.; Vozňák, M. Energy Harvesting over Rician Fading Channel: A Performance Analysis for Half-Duplex Bidirectional Sensor Networks under Hardware Impairments. Sensors 2018, 18, 1781. https://doi.org/10.3390/s18061781

AMA Style

Nguyen TN, Quang Minh TH, Tran PT, Vozňák M. Energy Harvesting over Rician Fading Channel: A Performance Analysis for Half-Duplex Bidirectional Sensor Networks under Hardware Impairments. Sensors. 2018; 18(6):1781. https://doi.org/10.3390/s18061781

Chicago/Turabian Style

Nguyen, Tan N., Tran Hoang Quang Minh, Phuong T. Tran, and Miroslav Vozňák. 2018. "Energy Harvesting over Rician Fading Channel: A Performance Analysis for Half-Duplex Bidirectional Sensor Networks under Hardware Impairments" Sensors 18, no. 6: 1781. https://doi.org/10.3390/s18061781

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop