proactive relay selection with joint impact of hardware ...maged/proactive relay... · proactive...

13
1594 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 5, MAY 2015 Proactive Relay Selection With Joint Impact of Hardware Impairment and Co-Channel Interference Tran Trung Duy, Trung Q. Duong, Senior Member, IEEE, Daniel Benevides da Costa, Senior Member, IEEE, Vo Nguyen Quoc Bao, Member, IEEE, and Maged Elkashlan, Member, IEEE Abstract—In this paper, we investigate the end-to-end perfor- mance of dual-hop proactive decode-and-forward relaying net- works with Nth best relay selection in the presence of two practical deleterious effects: i) hardware impairment and ii) co-channel interference. In particular, we derive new exact and asymptotic closed-form expressions for the outage probability and average channel capacity of Nth best partial and opportunistic relay selec- tion schemes over Rayleigh fading channels. Insightful discussions are provided. It is shown that, when the system cannot select the best relay for cooperation, the partial relay selection scheme out- performs the opportunistic method under the impact of the same co-channel interference (CCI). In addition, without CCI but under the effect of hardware impairment, it is shown that both selection strategies have the same asymptotic channel capacity. Monte Carlo simulations are presented to corroborate our analysis. Index Terms—Hardware impairment, decode-and-forward re- laying, partial relay selection, opportunistic relay selection, outage probability, channel capacity. I. I NTRODUCTION A LONG the last decade, the concept of cooperative diver- sity [1] has been well exploited as an efficient means to enhance the performance of wireless communications. The basic idea is to allow single-antenna terminals to share their antennas to mimic a physical multiple-antenna array so that spatial diversity can be explored. However, the use of mul- tiple relays may invoke a spectral efficiency loss and relay selection schemes arise as a promising solution for alleviating this problem. Two proactive relay selection strategies 1 that have been widely investigated in the literature are opportunistic relay selection (ORS) [2]–[11] and partial relay selection (PRS) [12]–[19]. In ORS the best relay is chosen relying on the Manuscript received April 20, 2014; revised August 14, 2014 and December 15, 2014; accepted January 16, 2015. Date of publication January 28, 2015; date of current version May 14, 2015. D. B. da Costa’s work was supported by the CNPq (Grant No. 302106/2011-1). This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.01-2014.33. The editor coordinating the review of this paper and approving it for publication was A. Ghrayeb. T. T. Duy and V. N. Q. Bao are with the Department of Telecommunications, Posts and Telecommunications Institute of Technology, Ho Chi Minh City, Vietnam (e-mail: [email protected]; [email protected]). T. Q. Duong is with the Department of Electronics, Electrical Engineering and Computer Science, Queen’s University Belfast, Belfast BT7 1NN, U.K. (e-mail: [email protected]). D. B. da Costa is with the Department of Electrical Engineering, Federal Uni- versity of Ceará, 60020-181 Fortaleza, Brazil (e-mail: [email protected]). M. Elkashlan is with the School of Electronic Engineering and Computer Science, Queen Mary University of London, London E1 4NS, U.K. (e-mail: [email protected]). Digital Object Identifier 10.1109/TCOMM.2015.2396517 1 In proactive relay selection, the relay is chosen before the source transmission. channel state information (CSI) of both source-relay and relay- destination links. The pioneering idea of ORS was proposed in [2], while [3] presented an asymptotic analysis of the sym- bol error rate (SER) of a selection amplify-and-forward (AF) network. In [4], it was shown that optimal transmission of a single relay among a set of multiple AF relays minimize the outage probability (OP) and outperform any other strategies that involve simultaneous transmissions from more than one AF relay under an aggregate power constraint. In [5], the OP of a cooperative network with multiple potential decode-and- forward (DF) relays and multiple simultaneous transmissions was investigated, in which a selection cooperation scheme was proposed. In [6], closed-form expressions for the OP and the bit error rate (BER) of uncoded threshold-based ORS were derived assuming arbitrary signal-to-noise ratio (SNR) levels, arbitrary number of available DF relays, and arbitrary source-destination channel conditions. In [7], with independent non-identically distributed (i.n.i.d.) Rician fading channels, approximate for- mulas for the SER of ORS were derived. Considering i.n.i.d. Nakagami-m fading and a selection combining (SC) receiver at the destination, the outage performance of ORS was examined in [8], while [9] derived closed-form expressions for the SER. In [10], exact closed-form expressions for the OP and ergodic capacity (EC) of selection cooperative relaying were derived assuming a maximal-ratio combiner (MRC) at the destination. In [11], an incremental DF ORS scheme was proposed in which the selected relay chooses to cooperate only if the source- destination channel is of an unacceptable quality. A closed-form expression for the OP was derived. A common feature of all the aforementioned papers is that full diversity gain can be attained. On the other hand, in these works there is the need for continuous channel feedback from all the links, which results in a high power consumption and large overhead, a non-desirable feature for ad-hoc and sensor networks. To alleviate this problem, PRS was proposed in [12], where only CSI of the source-relay link is used to select the best relay. Thus, by monitoring the connectivity of only one-hop rather than two-hop, the lifetime of the network can be prolonged. In [13], tight closed-form approximations for the EC of dual-hop AF relaying networks with PRS were derived. Relying on the channel quality of the second-hop for selecting the best relay, the work in [14] examined the outage performance of DF relaying networks subject to Nakagami- m and employing a MRC receiver at the destination. In [15], a comprehensive performance analysis of dual-hop relaying networks with fixed-gain semi-blind relays was carried out. In particular, closed-form expressions for the OP, probability 0090-6778 © 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Upload: others

Post on 23-Mar-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

1594 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 5, MAY 2015

Proactive Relay Selection With Joint Impact ofHardware Impairment and Co-Channel Interference

Tran Trung Duy, Trung Q. Duong, Senior Member, IEEE, Daniel Benevides da Costa, Senior Member, IEEE,Vo Nguyen Quoc Bao, Member, IEEE, and Maged Elkashlan, Member, IEEE

Abstract—In this paper, we investigate the end-to-end perfor-mance of dual-hop proactive decode-and-forward relaying net-works with Nth best relay selection in the presence of two practicaldeleterious effects: i) hardware impairment and ii) co-channelinterference. In particular, we derive new exact and asymptoticclosed-form expressions for the outage probability and averagechannel capacity of Nth best partial and opportunistic relay selec-tion schemes over Rayleigh fading channels. Insightful discussionsare provided. It is shown that, when the system cannot select thebest relay for cooperation, the partial relay selection scheme out-performs the opportunistic method under the impact of the sameco-channel interference (CCI). In addition, without CCI but underthe effect of hardware impairment, it is shown that both selectionstrategies have the same asymptotic channel capacity. Monte Carlosimulations are presented to corroborate our analysis.

Index Terms—Hardware impairment, decode-and-forward re-laying, partial relay selection, opportunistic relay selection, outageprobability, channel capacity.

I. INTRODUCTION

A LONG the last decade, the concept of cooperative diver-sity [1] has been well exploited as an efficient means

to enhance the performance of wireless communications. Thebasic idea is to allow single-antenna terminals to share theirantennas to mimic a physical multiple-antenna array so thatspatial diversity can be explored. However, the use of mul-tiple relays may invoke a spectral efficiency loss and relayselection schemes arise as a promising solution for alleviatingthis problem. Two proactive relay selection strategies1that havebeen widely investigated in the literature are opportunistic relayselection (ORS) [2]–[11] and partial relay selection (PRS)[12]–[19]. In ORS the best relay is chosen relying on the

Manuscript received April 20, 2014; revised August 14, 2014 andDecember 15, 2014; accepted January 16, 2015. Date of publication January28, 2015; date of current version May 14, 2015. D. B. da Costa’s work wassupported by the CNPq (Grant No. 302106/2011-1). This research is fundedby Vietnam National Foundation for Science and Technology Development(NAFOSTED) under grant number 102.01-2014.33. The editor coordinatingthe review of this paper and approving it for publication was A. Ghrayeb.

T. T. Duy and V. N. Q. Bao are with the Department of Telecommunications,Posts and Telecommunications Institute of Technology, Ho Chi Minh City,Vietnam (e-mail: [email protected]; [email protected]).

T. Q. Duong is with the Department of Electronics, Electrical Engineeringand Computer Science, Queen’s University Belfast, Belfast BT7 1NN, U.K.(e-mail: [email protected]).

D. B. da Costa is with the Department of Electrical Engineering, Federal Uni-versity of Ceará, 60020-181 Fortaleza, Brazil (e-mail: [email protected]).

M. Elkashlan is with the School of Electronic Engineering and ComputerScience, Queen Mary University of London, London E1 4NS, U.K. (e-mail:[email protected]).

Digital Object Identifier 10.1109/TCOMM.2015.2396517

1In proactive relay selection, the relay is chosen before the sourcetransmission.

channel state information (CSI) of both source-relay and relay-destination links. The pioneering idea of ORS was proposedin [2], while [3] presented an asymptotic analysis of the sym-bol error rate (SER) of a selection amplify-and-forward (AF)network. In [4], it was shown that optimal transmission of asingle relay among a set of multiple AF relays minimize theoutage probability (OP) and outperform any other strategiesthat involve simultaneous transmissions from more than oneAF relay under an aggregate power constraint. In [5], the OPof a cooperative network with multiple potential decode-and-forward (DF) relays and multiple simultaneous transmissionswas investigated, in which a selection cooperation scheme wasproposed. In [6], closed-form expressions for the OP and the biterror rate (BER) of uncoded threshold-based ORS were derivedassuming arbitrary signal-to-noise ratio (SNR) levels, arbitrarynumber of available DF relays, and arbitrary source-destinationchannel conditions. In [7], with independent non-identicallydistributed (i.n.i.d.) Rician fading channels, approximate for-mulas for the SER of ORS were derived. Considering i.n.i.d.Nakagami-m fading and a selection combining (SC) receiver atthe destination, the outage performance of ORS was examinedin [8], while [9] derived closed-form expressions for the SER.In [10], exact closed-form expressions for the OP and ergodiccapacity (EC) of selection cooperative relaying were derivedassuming a maximal-ratio combiner (MRC) at the destination.In [11], an incremental DF ORS scheme was proposed in whichthe selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. A closed-formexpression for the OP was derived.

A common feature of all the aforementioned papers is thatfull diversity gain can be attained. On the other hand, in theseworks there is the need for continuous channel feedback fromall the links, which results in a high power consumption andlarge overhead, a non-desirable feature for ad-hoc and sensornetworks. To alleviate this problem, PRS was proposed in[12], where only CSI of the source-relay link is used to selectthe best relay. Thus, by monitoring the connectivity of onlyone-hop rather than two-hop, the lifetime of the network canbe prolonged. In [13], tight closed-form approximations forthe EC of dual-hop AF relaying networks with PRS werederived. Relying on the channel quality of the second-hop forselecting the best relay, the work in [14] examined the outageperformance of DF relaying networks subject to Nakagami-m and employing a MRC receiver at the destination. In [15],a comprehensive performance analysis of dual-hop relayingnetworks with fixed-gain semi-blind relays was carried out.In particular, closed-form expressions for the OP, probability

0090-6778 © 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

DUY et al.: PROACTIVE RELAY SELECTION WITH JOINT IMPACT OF HARDWARE IMPAIRMENT AND CCI 1595

density function (PDF), moment generating functions (MGFs),and generalized moments of the end-to-end SNR were derived.In addition, the second-order statistics of the end-to-end en-velope was studied and the corresponding level crossing rateand average fade duration were obtained in an exact manner. In[16], assuming the presence of the direct link between sourceand destination, an exact performance analysis of DF dual-hopnetworks with relay selection and subject to i.n.i.d Nakagami-m fading was presented. The diversity and coding gains ofPRS schemes subject to Nakagami-m fading were attained in[17], while the impact of feedback delay was analyzed in [18].Finally, in [19], three novel PRS schemes were proposed.

Common to all these works dealing with ORS and PRSis the assumption of perfect transceiver hardware (i.e., idealhardware) of the terminals. However, in practice, the transceiverhardware is imperfect due to phase noise, I/Q imbalance andamplifier nonlinearities [20]–[22]. Very few works have inves-tigated the effect of hardware impairments in dual-hop coop-erative networks and they are briefly discussed next. In [23],the authors quantified the impact of hardware impairments ondual-hop AF and DF relaying networks subject to Nakagami-m fading. Expressing the OP as a function of the effectiveend-to-end signal-to-noise-and-distortion ratio (SNDR), exactclosed-form and asymptotic formulas for the OP were derivedconsidering hardware impairments at the source, relay, and des-tination. Upper bounds for the EC were derived as well. In thatwork, fundamental design guidelines for selecting hardwarethat satisfies the requirements of a practical relaying systemwere pointed out. In [24], the authors analyzed the impact ofhardware impairments at the relay on the OP and the SER intwo-way AF relaying.

Another channel impairment that may be taken into accountin practical systems is co-channel interference (CCI). Differ-ently from hardware impairments, the study of CCI in cooper-ative networks has already been extensively investigated alongthe last years. In the sequel, three representative works will bediscussed. In [25], the outage behavior of dual-hop DF ORSschemes was investigated with CCI at both the relays and thedestination. It was shown that the co-channel interferers do notaffect the diversity gain. However, such interferers degrade theoutage performance by affecting the coding gain of the system.In [26], assuming a multiuser relay network composed by asingle source, a single AF relay, and multiple destinations, theoutage performance of opportunistic scheduling was examinedin which the relay and the multiple destinations undergo CCI.Exact expressions and closed-form lower bounds for the OPwere derived. In addition, the impact of CSI feedback delaywhen CCI is considered only at the relay was studied. Finally,in [27], the impact of CCI in two-way AF relaying systems wasanalyzed.

In this paper, we investigate the end-to-end performance ofdual-hop DF relaying networks in the presence of two practicaldeleterious effects: i) hardware impairment and ii) CCI. BothORS and PRS schemes are considered. To the best of theauthors’ knowledge, this is the first attempt to analyze the jointimpact of hardware impairment and CCI in a dual-hop relayingnetwork. Assuming Rayleigh fading, new exact and asymptoticclosed-form expressions for the OP and the average channel

Fig. 1. Dual-hop relay networks in presence of hardware impairments andco-channel interference.

capacity are derived. Insightful discussions are provided. Itis shown that, when the system cannot select the best relayfor cooperation, PRS scheme outperforms the opportunisticmethod under the impact of the same CCI. In addition, withoutCCI but under the effect of hardware impairment, it is shownthat both selection strategies have the same asymptotic channelcapacity. Monte Carlo simulations are presented to corroborateour analysis.

The rest of this paper is organized as follows. The systemmodel is described in Section II. In Section III, closed-formexpressions for the OP and average channel capacity are de-rived. Simulation results are presented in Section IV alongwith representative numerical results. Finally, this paper isconcluded in Section V. Appendices A–F present the proofs ofthe Lemmas and the Theorems.

II. SYSTEM/CHANNEL MODELS AND

PRELIMINARY RESULTS

A. System and Channel Models

Consider a dual-hop proactive relay network in which asource S attempts to transmit its data to the destination Dthrough the help of M available relays Rm, m = 1,2, . . . ,M,as shown in Fig. 1. Each terminal is equipped with a singleantenna and operates in a half-duplex mode. Assuming that thedirect link between S and D experiences deep shadowing, thecommunication is realized into two time-slots. In our analysis,depending on the available CSI, we consider two well-knownproactive relay selection methods: partial relay selection [12]and opportunistic relay selection [28]. In this case, only onerelay Rb satisfying a predefined criterion is selected for helpingto forward the source message.

In the first time slot, the source transmits its signal s tothe chosen relay Rb. Assume that there are K1 interferencesources I1v, v = 1,2, . . . ,K1, which are currently using the samechannel, and hence creating interferences to the relay Rb. In thesecond time slot, the relay Rb forwards the source signal to thedestination by using a DF protocol. Also, we assume that thereare K2 interference sources I2t , t = 1,2, . . . ,K2. In the presenceof the hardware impairments and co-channel interference, thereceived signal at Rb and D can be expressed, respectively, as

yRb =h1b(s+η1)+K1

∑v=1

gv(sv +η1v)+µ1 +nRb , (1)

yD =h2b(s+η2)+K2

∑t=1

lt(st +η2t)+µ2 +nD, (2)

1596 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 5, MAY 2015

where nRb and nD are, respectively, the additive white Gaussiannoise (AWGN) terms at R and D, with zero mean and varianceN0, sv and st are the signals transmitted by the interferencesources I1v and I2t , respectively, h1b, h2b, gv, and lt are thechannel coefficients of the links S→Rb, Rb →D, I1v →Rb, andRb →D, respectively. In addition, η1, η1v, η2 and η2t denote thenoises caused by the hardware impairments at the transmittersS, I1v, Rb, and I2t, respectively, while µ1 and µ2 are the noisesgenerated by the hardware impairments at the receivers Rb andD, respectively.

Assume that all the channels follow a Rayleigh distribution.Thus, the corresponding channel gains ϕSRm = |h1m|2, ϕRmD =|h2m|2 for m = 1,2, . . . ,M, |gv|2, and |lt |2 are exponential ran-dom variables (RVs) with parameters λSRm , λRmD, λRI1v , andλDI2t , respectively.

Remark 1: Similar to [23], [24], we can model the distortionnoises η1, η1v, η2, η2t , µ1 and µ2 as circularly-symmetric com-plex Gaussian distribution with zero-mean and variance σ2

1PS,σ2

3vPI, σ22PS, σ2

4tPI, σ23(|h1b|2PS+ |gv|2PI), and σ2

4(|h2b|2PS+|lt |2PI), respectively. In this case, PS and PI denote the transmitpowers of the source (and relays) and the interference sources,respectively, while σ1, σ3v, σ2, σ4t , σ3 and σ4 present the levelof the hardware impairments at the corresponding transmittersand receivers. Without loss of generality, it is also assumed thatall of the nodes have the same structure so that the impairmentlevels are the same, i.e., σ1 = σ3v = σ4t = σa, and σ3 = σ4 =σb[23], [24].2

From (1) and (2), the received signal-to-interference-plus-noise ratio (SINR) at Rb and D can be written, respectively,as

ψSRb =PSϕSRb(

σ21 +σ2

3

)PSϕSRb+

K1

∑v=1

(1+σ2

1v+σ23

)PI|gv|2 +N0

=γSRb

κγSRb +Z1 +1, (3)

ψRbD =PSϕRbD(

σ22 +σ2

4

)PSϕRbD+

K2

∑t=1

(1+σ2

2t +σ24

)PI|lt |2+N0

=γRbD

κγRbD +Z2 +1, (4)

where

γSRb =PSϕSRb

N0,γRbD=

PSϕRbD

N0,Z1=

K1

∑v=1

(1+κ)PI|gv|2

N0,

Z2 =K2

∑t=1

(1+κ)PI|lt |2

N0,κ = σ2

a +σ2b.

2In case of different levels of hardware impairment, our results can be appliedto derive the upper-bound and/or lower-bound of the outage probability andaverage channel capacity. Moreover, in practice, with knowledge of impairmenttransceiver levels, we should select the transceivers with similar impairmentlevels, to optimize the system performance (see , Corollary 3[23].

B. Preliminary Results

In partial relay selection method, the Nth best relay Rb isselected by the following strategy:

Rb = Nth argmaxm=1,2,...,M

(ϕSRm). (5)

On the other hand, in the opportunistic relay selection strategy,the Nth best relay Rb is chosen according to

Rb = Nth argmaxm=1,2,...M

min(ϕSRm ,ϕRmD). (6)

We can observe from (5) and (6) that the relay selection processin the ORS protocol requires each relay to obtain the channelstate information (CSI) of the S → R and R → D links, whilethat in the PRS only needs the CSI of the first link. Hence, theimplementation of the ORS protocol is more complex than thatof the PRS protocol. Moreover, we note that the relay selectionoperation in the ORS protocol can be realized by a distributedmanner as presented in [2].

Remark 2: Throughout this paper, we assume clusteringrelay networks where data links are independent and identicallydistributed (i.i.d.), i.e., λSRm = λSR and λRmD = λRD for all m.In addition, since the interferers can originate from differentcells, the interference links are presumed to be independentnon-identically distributed (i.n.i.d.), i.e., λRI1m �= λRI1n if m �= n,and λDI2m �= λDI2n if m �= n.3

The PDF of Za, a ∈ {1,2}, can be expressed as

fZa(za) =Ka

∑u=1

αXIau exp(−ΩXIau) , (7)

where X ≡ R if a = 1, X ≡ D if a = 2,

ΩXIau =Ω̃XIau

γ̄,Ω̃XIau =

λXIau

(1+κ)rP,

γ̄ =PI

N0=

PS

N0=

P

N0, αXIau =

α̃XIau

γ̄rP,

α̃XIau =Ω̃XIau

Ka

∏w=1,w�=u

Ω̃XIaw

Ω̃XIaw − Ω̃XIau

.

Since the DF relaying protocol is employed, the end-to-endSINR is given by

ψYe2e = min

(ψSRb ,ψRbD

), (8)

where Y ∈ (ORS,PRS).

III. PERFORMANCE ANALYSIS

A. Outage Probability

In this subsection, exact closed-form expressions for the OPof both PRS and ORS schemes will be derived. By definition,the OP is the probability that the end-to-end received SINR islower than a pre-determined threshold γth.

3Our derivation can be easily extended to i.n.i.d. data links and/or i.i.d.interference links.

DUY et al.: PROACTIVE RELAY SELECTION WITH JOINT IMPACT OF HARDWARE IMPAIRMENT AND CCI 1597

1) Partial Relay Selection (PRS): The outage probability ofthe PRS protocol can be formulated as

PoutPRS = Pr

(ψPRS

e2e < γth)= FψPRS

e2e(γth), (9)

where FψPRSe2e

(.) denotes the CDF of ψPRSe2e .

Theorem 1: If x ≥ κ−1, then FψPRSe2e

(x) = 1, and if x < κ−1, itfollows that

FψPRSe2e

(x) = 1−N

∑m=1

M−m+1

∑n=0,m+n>1

K1

∑v=1

K2

∑t=1

(−1)n+1Δ1Δ2

× (1−κx)2

(Φ1 + x)(Φ2 + x)exp

(− (Θ1 +Ω2)x

1−κx

), (10)

where Ω1 = N0λSR/P, Cab = b!

a!(b−a)! , Θ1 = (n + m − 1)Ω1,

Δ1 = Cm−1M Cn

M−m+1αRI1v/(Θ1 − κΩRI1v), Φ1 = ΩRI1v/(Θ1 −κΩRI1v), Ω2 = λRDN0/P, Δ2 = αDI2t/(Ω2 −ΩDI2t κ) and Φ2 =ΩDI2t/(Ω2 −κΩDI2t ).

Proof 1: The proof is presented in Appendix A.Lemma 1: Without interference sources, i.e., by setting PI →

0 or rP → 0, and x < κ−1, the CDF FψPRSe2e

(·) can be expressed as

FψPRSe2e

(x) = 1−N

∑m=1

M−m+1

∑n=0,m+n �=1

(−1)n+1Cm−1M Cn

M−m+1

×exp

(−(Θ1 +Ω2)x

1−κx

). (11)

Proof 2: The proof is given in Appendix B.Theorem 2: At high transmit SNR and assuming x < κ−1,

the CDF FψPRSe2e

(·) can be approximated by

FψPRSe2e

(x)γ→+∞≈ 1−

N

∑m=1

M−m+1

∑n=0,m+n>1

K1

∑v=1

K2

∑t=1

(−1)n+1

×Δ1Δ2(1−κx)2

(Φ1 + x)(Φ2 + x). (12)

Proof 3: For high values of γ, (3) and (4) can be approxi-mated by

ψSRb

γ→+∞≈ γSRb

κγSRb +Z1,

ψRbDγ→+∞≈ γRbD

κγRbD +Z2. (13)

From (13), with the same manner with Appendix A, we canobtain

FψSRb(x)

γ→+∞≈ 1−

N

∑m=1

M−m+1

∑n=0,m+n>1

K1

∑v=1

(−1)n+1Δ11−κxΦ1 + x

,

FψRbD(x)γ→+∞≈ 1−

K2

∑t=1

Δ21−κxΦ2 + x

.

By substituting the results above into (A.1), (12) can beattained.

Then, similar to Appendix A, (12) can be attained.

Lemma 2: Without interference sources, i.e., by setting PI →0 or rP → 0, and x < κ−1, the CDF FψPRS

e2e(·) at high transmit

SNR can be expressed as

FψPRSe2e

(x)γ→+∞≈

{Ω2x/(1−κx); if N < M(MΩ1 +Ω2)x/(1−κx); if N = M

. (14)

Proof 4: The proof is given in Appendix C. FromLemma 2, one can observe that when x < κ−1, the diversityorder equals 1.

2) Opportunistic Relay Selection (ORS): The OP of theORS scheme can be formulated as

PoutORS = Pr

(ψORS

e2e < γth)= FψORS

e2e(γth), (15)

Theorem 3: If x ≥ κ−1, then FψORSe2e

(x) = 1, and if x < κ−1, itfollows that

FψORSe2e

(x) =1−N

∑m=1

M−m+1

∑n=0, m+n>1

K1

∑v=1

K2

∑t=1

(−1)n+1

×[

Δ3

Φ3 + x+

Δ4

Φ4 + x+

Δ5

Φ6 + x+

Δ6

Φ7 + x

]

× (1−κx)2

(Φ5 + x)exp

(− Θ2x

1−κx

), (16)

where Ω = Ω1 + Ω2, Θ2 = (n + m − 1)Ω, Φ3 = ΩRI1v/Ω1 − κΩRI1v), Φ4 = ΩRI1v/(Θ2 − κΩRI1v), Φ5 = (ΩRI1v +ΩDI2t)/(Θ2 − κ(ΩRI1v + ΩDI2t)), Φ6 = ΩDI2t/(Ω2 − κΩDI2t),Φ7 = ΩDI2t/(Θ2 −κΩDI2t),

Δ3 =(n+m−1)Cm−1M Cn

M−m+1Ω2αRI1v αDI2t

Ω2 +(n+m−2)Ω

× 1(Θ2 −κ(ΩRI1v +ΩDI2t))(Ω1 −κΩRI1v)

,

Δ4 =(n+m−2)Cm−1M Cn

M−m+1Ω1αRI1v αDI2t

Ω2 +(n+m−2)Ω

× 1(Θ2 −κΩRI1v)(Θ2 −κ(ΩRI1v +ΩDI2t))

,

Δ5 =(n+m−1)Cm−1M Cn

M−m+1Ω1αRI1v αDI2t

Ω1 +(n+m−2)Ω

× 1(Θ2 −κ(ΩRI1v +ΩDI2t))(Ω2 −κΩDI2t)

,

Δ6 =(n+m−2)Cm−1M Cn

M−m+1Ω2αRI1v αDI2t

Ω1 +(n+m−2)Ω

× 1(Θ2 −κΩDI2t)(Θ2 −κ(ΩRI1v +ΩDI2t))

.

Proof 5: The proof is presented in Appendix D.Lemma 3: Without interference sources, i.e., by setting

PI → 0 or rP → 0, and x < κ−1, the CDF FψORSe2e

(·) can beexpressed as

FψORSe2e

(x) = 1−N

∑m=1

M−m+1

∑n=0,n+m>1

(−1)n+1Cm−1M Cn

M−m+1

×exp

(−(n+m−1)

Ωx1−κx

). (17)

Proof 6: From (D.3), (17) can be obtained.

1598 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 5, MAY 2015

Theorem 4: At high transmit SNR and assuming x < κ−1,the CDF FψPRS

e2e(·) can be approximated by

FψORSe2e

(x)γ→+∞≈ 1−

N

∑m=1

M−m+1

∑n=0, m+n>1

K1

∑v=1

K2

∑t=1

(−1)n+1

×[

Δ3

Φ3 + x+

Δ4

Φ4 + x+

Δ5

Φ6 + x+

Δ6

Φ7 + x

]

× (1−κx)2

Φ5 + x. (18)

Proof 7: Note that, for high γ values, (3) and (4) can beapproximated by (13). Hence, similar as obtained (13) from(12), (18) can be attained by omitting the term exp(− Θ2x

1−κx )from (16).

Lemma 4: Without interference sources and considering x <κ−1, the CDF FψORS

e2e(·) at high transmit SNR can be written as

Fγ1b(x)γ→+∞≈ CN−1

M

(Ωx

1−κx

)M−N+1

. (19)

Proof 8: The proof is similar to that of Lemma 2. From(19), one can attest that the diversity order of the ORS strategyequals to M−N +1.

B. Average Channel Capacity

The average channel capacity can be mathematicallydefined as

CYavg =

12E{

log2

(1+ψY

e2e

)}

=1

2ln2

∫ κ−1

0ln(1+ x) fψY

e2e(x)dx, (20)

where Y ∈ {PRS,ORS}, E{.} symbolizes expectation, andfψY

e2e(·) denotes the PDF of ψY

e2e.From (10) and (16), (20) can be rewritten as

CYavg =

12ln2

∫ κ−1

0

1−FψYe2e(x)

1+ xdx. (21)

Proposition 1: In the presence of hardware impairments, i.e.,κ > 0, the average channel capacity of both PRS and ORSmethods is bounded by

CAavg ≤

12ln2

ln

(1+

). (22)

Proof 9: From (3) and (4), it is easy to see that ψ1b ≤ κ−1

and ψ2b ≤ κ−1, which implies in ψYe2e ≤ κ−1. Thus, combining

with (20), (22) can be readily obtained. Before calculating the

average capacity of the PRS and ORS strategies, the followingintegral will be introduced.

J(κ,Ω,Φ) =∫ κ−1

0

1Φ+ x

exp

(− Ωx

1−κx

)dx

= exp

(ΩΦ

Φκ+1

)E1

(ΩΦ

Φκ+1

)

− exp

(Ωκ

)E1

(Ωκ

), (23)

where E1(.) denotes the exponential integral function [29].Proof 10: By interchanging the variable t = 1/(1− κx),

J(κ,Ω,Φ) can be rewritten as

J(κ,Ω,Φ) =exp(Ω/κ)

κΦ+1

∫ +∞

1

exp(−tΩ/κ)t(t −1/(κΦ+1))

dt

= exp

(ΩΦ

κΦ+1

)∫ +∞

κΦκΦ+1

exp(−tΩ/κ)t

dt

− exp

(Ωκ

)∫ +∞

1

exp(−tΩ/κ)t

dt.

Then, by using the definition of the exponential integral func-tion E1(x) =

∫ +∞x

exp(−t)t dt, we can easily obtain (23).

1) Partial Relay Selection (PRS):Theorem 5: The average channel capacity of the PRS

method can be expressed as (24), (See equation at the bottomof the page) with δ1 = (1+ κΦ1)

2/(Φ2 −Φ1) and δ2 = (1+κΦ2)

2/(Φ1 −Φ2).Proof 11: The proof is presented in Appendix E.

Lemma 5: Without interference sources, the average channelcapacity of the PRS method is given by

CPRSavg =

12ln2

N

∑m=1

M−m+1

∑n=0, m+n>1

K1

∑v=1

K2

∑t=1

(−1)n+1

×Δ1Δ2J(κ,Θ1 +Ω2,1). (25)

Proof 12: Relying on (1), (21), and (23), Lemma 5 can beeasily proved.

Theorem 6: At high transmit SNR γ, the asymptotic averagechannel capacity of the PRS method can be derived as (26).(See equation at the bottom of the next page)

Proof 13: (26) can be attained from (24) by perform-ing the appropriate substitutions, i.e., replacing J(κ,Θ1 +Ω2,1), J(κ,Θ1 +Ω2,Φ1), and J(κ,Θ1 +Ω2,Φ2) by J(κ,0,1),J(κ,0,Φ1) and J(κ,0,Φ1), respectively. In addition, note thatJ(κ,0,Ω) = ln((1+κΦ)/κΦ). Finally, one can see that without

CPRSavg =

12ln2

N

∑m=1

M−m+1

∑n=0, m+n>1

K1

∑v=1

K2

∑t=1

(−1)n+1Δ1Δ2

×[(

δ1

Φ1 −1+

δ2

Φ2 −1+κ2

)J(κ,Θ1 +Ω2,1)−

δ1

Φ1 −1J(κ,Θ1 +Ω2,Φ1)−

δ2

Φ2 −1J(κ,Θ1 +Ω2,Φ2)

]. (24)

DUY et al.: PROACTIVE RELAY SELECTION WITH JOINT IMPACT OF HARDWARE IMPAIRMENT AND CCI 1599

interference sources, the asymptotic average capacity of thePRS method is given as in (22), i.e.,

CPRSavg

γ→+∞≈ 1

2ln2ln

(1+

). (27)

2) Opportunistic Relay Selection (ORS):Theorem 7: The average channel capacity of the ORS

method can be given as (28), (See equation at the bottom of thepage) with δ3 =(1+κΦ3)

2/(Φ5−Φ3), δ4 =(1+κΦ5)2/(Φ3−

Φ5), δ5 = (1+κΦ4)2/(Φ5−Φ4), δ6 = (1+κΦ5)

2/(Φ4−Φ5),δ7 = (1+κΦ6)

2/(Φ5−Φ6), δ8 = (1+κΦ5)2/(Φ6−Φ5), δ9 =

(1+κΦ7)2/(Φ5 −Φ7), and δ10 = (1+κΦ5)

2/(Φ7 −Φ5).Proof 14: The proof is presented in Appendix F.

Lemma 6: Without interference sources, the average channelcapacity can be rewritten as

CORSavg =

N

∑m=1

M−m+1

∑n=0,n+m>1

(−1)nCm−1M Cn

M−m+1

×J(κ,(n+m−1)Ωx,1) . (29)

Proof 15: Based on (17), (21), and (23), Lemma 6 can bereadily proved.

Theorem 8: At high transmit SNR γ, the asymptotic averagechannel capacity of the PRS method can be derived as (30).(See equation at the bottom of the page).

Proof 16: The proof of Theorem 8 is similar to that ofTheorem 6. One can easily prove that the asymptotic averagecapacity of the PRS method at high γ is given as in (27), i.e.,

CORSavg

γ→+∞≈ 1

2ln2ln

(1+

). (31)

From (27) and (31), note that under the impact of hardwareimpairment and without co-channel interference, the PRS andORS schemes have the same average channel capacity at hightransmit SNR.

IV. NUMERICAL RESULTS AND SIMULATIONS

In this Section, representative numerical results are presentedto illustrate the performance of the two proposed relay selectionschemes in the presence of hardware impairment and CCI.

CPRSavg

γ→+∞≈ 1

2ln2

N

∑m=1

M−m+1

∑n=0, m+n>1

K1

∑v=1

K2

∑t=1

(−1)n+1Δ1Δ2

×[(

δ1

Φ1 −1+

δ2

Φ2 −1+κ2

)ln

(1+κ

κ

)− δ1

Φ1 −1ln

(1+κΦ1

κΦ1

)− δ2

Φ2 −1ln

(1+κΦ2

κΦ2

)]. (26)

CORSavg =

12ln2

N

∑m=1

M−m+1

∑n=0, m+n>1

K1

∑v=1

K2

∑t=1

(−1)n+1

×(

Δ3δ3

Φ3 −1+

Δ4δ5

Φ4 −1+

Δ5δ7

Φ6 −1+

Δ6δ9

Φ7 −1+

Δ3δ4 +Δ4δ6 +Δ5δ8 +Δ6δ10

Φ5 −1+(Δ3 +Δ4)κ2

)J(κ,Θ2,1)

− Δ3δ3

Φ3 −1J(κ,Θ2,Φ3)−

Δ4δ5

Φ4 −1J(κ,Θ2,Φ4)−

Δ5δ7

Φ6 −1J(κ,Θ2,Φ6)−

Δ6δ9

Φ7 −1J(κ,Θ2,Φ7)

−(

Δ3δ4 +Δ4δ6 +Δ5δ8 +Δ6δ10

Φ5 −1

)J(κ,Θ2,Φ5). (28)

CORSavg

γ→+∞≈ 1

2ln2

N

∑m=1

M−m+1

∑n=0, m+n>1

K1

∑v=1

K2

∑t=1

(−1)n+1

×(

Δ3δ3

Φ3 −1+

Δ4δ5

Φ4 −1+

Δ5δ7

Φ6 −1+

Δ6δ9

Φ7 −1+

Δ3δ4 +Δ4δ6 +Δ5δ8 +Δ6δ10

Φ5 −1+(Δ3 +Δ4)κ2

)ln

(1+κ

κ

)

− Δ3δ3

Φ3 −1ln

(1+κΦ3

κΦ3

)− Δ4δ5

Φ4 −1ln

(1+κΦ4

κΦ4

)− Δ5δ7

Φ6 −1ln

(1+κΦ6

κΦ6

)− Δ6δ9

Φ7 −1ln

(1+κΦ7

κΦ7

)

−(

Δ3δ4 +Δ4δ6 +Δ5δ8 +Δ6δ10

Φ5 −1

)ln

(1+κΦ5

κΦ5

). (30)

1600 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 5, MAY 2015

Fig. 2. Outage probability as a function of the transmit SNR γ when M = 4,K1 = K2 = 2, rP = 1, γth = 1, κ = 0.075, λSR = 0.3, λRD = 0.5, λRI1v ∈ {1,2},and λDI2t ∈ {1.5,2.5}.

Monte Carlo simulation results are also shown to corroboratethe proposed analysis. Without any loss of generality, we setγth < κ−1.

In Fig. 2, the outage probability is plotted as a functionof transmit SNR γ. The following parameters are employed:M = 4, K1 = K2 = 2, rP = 1, γth = 1, κ = 0.075, λSR = 0.3,λRD = 0.5, λRI1v ∈ {1,2}, and λDI2t ∈ {1.5,2.5}. It can beobserved that the outage performance of the ORS and PRSschemes is better if the system can select the best relay forthe cooperation (N = 1). In addition, when N = 1, the outageprobability of the ORS scheme is lower than that of the PRSone. However, such a metric of the PRS is higher than that ofthe ORS when N = 2. It is because that when the best relaycannot be selected, the end-to-end SINR of the ORS protocolis no longer maximum. Hence, PRS can provide a higherend-to-end SINR than ORS. Finally, it can be seen that theoutage probability decreases when the transmit SNR increases.However, the outage performance of both protocols convergesto positive constant at high SNR regime. Therefore, we canconclude that the system obtains the zero-diversity order whenthere are the interference sources in the network.

In Fig. 3, the outage performance is depicted as a functionof transmit SNR γ when there is no interference source and bysetting M = 3, rP = 0, γth = 1.5, κ = 0.08 and λSR = λRD =1.1. Note that the ORS scheme outperforms the PRS one forboth N = 1,2, with the performance gap being higher for thecase N = 1. The reason is that the diversity order4of the ORSscheme equals to 3 for N = 1, while it is 2 for N = 2. Indeed, forN = 2, the performance of both schemes is almost the same atlow and medium SNRs, and only at high SNR region a practicaldifference in performance can be detected.

In Fig. 4, we investigate the impact of the ratio rP (PI/PS)on the outage performance of the proposed protocols. For theillustrative purpose, we fix the parameters γ, M, N, K1, K2, γth,κ, λSR, λRD, λRI11 and λDI21 by 10 dB, 6, 2, 1, 1, 0.5, 0.08, 1,

4The diversity order of the PRS scheme is always 1, regardless of the valueof N.

Fig. 3. Outage probability as a function of the transmit SNR γ when M = 3,rP = 0, γth = 1.5, κ = 0.08, λSR = 1.1, and λRD = 1.1.

Fig. 4. Outage probability as a function of the ratio rP when γ= 10 dB, M = 6,N = 2, K1 = K2 = 1, γth = 0.5, κ = 0.08, λSR = 1, λRD = 0.5, λRI11 = 1.5, andλDI21 = 2.

0.5, 1.5 and 2, respectively. It can be seen from this figure thatthe outage performance of both protocols decreases when theratio rP increases. Different with the results presented in Fig. 2,although the system can only select the second-best relay forthe cooperation, the ORS protocol obtains better performanceas compared with the PRS protocol.

Fig. 5 presents the average channel capacity of the PRS andORS protocols as a function of the transmit SNR γ. In thisfigure, we fix the parameters as follows: M = 2, K1 = K2 = 1,rP = 1, κ= 0.075 and λSR = 1.1, λRD = 1.3, and λRI11 = λDI21 =0.7. Similar to Fig. 2, the ORS scheme achieves higher channelcapacity than PRS one when the system can select the bestrelay (i.e., N = 1) for cooperation. Otherwise, for N = 2, i.e.,the system selects one the second best relay for cooperation,the PRS strategy attains better performance. Finally, note thatthe channel capacity of both schemes converges to the asymp-totic values at high SNR region.

In Fig. 6, the effect of the hardware impairment level κ onthe average channel capacity is investigated. It is assumed that

DUY et al.: PROACTIVE RELAY SELECTION WITH JOINT IMPACT OF HARDWARE IMPAIRMENT AND CCI 1601

Fig. 5. Average channel capacity as a function of the transmit SNR γ whenM = 2, K1 = K2 = 1, rP = 1, κ = 0.075, λSR = 1.1, λRD = 1.3, and λRI11 =λDI21 = 0.7.

Fig. 6. Average channel capacity as a function of the transmit SNR γ whenM = 4, N = 1, rP = 0, and λSR = λRD = 0.1.

there is no CCI, i.e., rP = 0. The remaining parameters aredesigned as follows: M = 4, N = 1, and λSR = λRD = 0.1.One can notice that the PRS and ORS schemes have the sameasymptotic channel capacity. In addition, it is shown that bothstrategies obtain better performance as the value of κ decreases,with ORS presenting better performance than PRS.

Fig. 7 presents the average channel capacity as a function ofκ when γ = 10 dB, M = 5, K1 = K2 = 1, rP = 1, λSR = λRD = 1,λRI11 = 0.5, and λRI11 = 0.75. It can be observed from thisfigure that the channel capacity of the PRS and ORS protocolsdecreases with the increasing of κ. Again, we can obversethat the performance of the ORS scheme is better than that ofthe PRS scheme when the best relay can be selected for thecooperation.

V. CONCLUSION

In this paper, analyzing the impact of hardware impairmentand CCI, the end-to-end performance of dual-hop proactive DF

Fig. 7. Average channel capacity as a function of κ when γ = 10 dB, M = 5,K1 = K2 = 1, rP = 1, λSR = λRD = 1, λRI11 = 0.5, and lambdaRI11 = 0.75.

relaying networks with Nth PRS and Nth ORS is investigated.Exact and asymptotic closed-form expressions for the outageprobability and average channel capacity of both relay selectionschemes were derived. Insightful discussions were provided.For instance, it was shown that, when the system cannot selectthe best relay for cooperation, the partial relay selection schemeoutperforms the opportunistic method under the impact of thesame co-channel interference.

APPENDIX APROOF OF THEOREM 1

Firstly, we rewrite FψPRSe2e

(x) as follows

FψPRSe2e

(x) = 1−(

1−FψSRb(x)

)(1−FψRbD(x)

). (A.1)

Thus, to attain (A.1), the CDFs FψSRb(·) and FψRbD(·) are

required. Considering first the CDF of ψSRb , we have that

FψSRb(x) = Pr

(ψSRb < x

)

=

{1; if x ≥ κ−1

γSRb <x+xZ11−κx ; if x < κ−1 (A.2)

For x < κ−1, (A.2) can be formulated as

FψSRb(x) =

∫ +∞

0FγSRb

(x+ xz1

1−κx

)fZ1(z1)dz1. (A.3)

Now, using the N-best order statistics [30], the CDF of γSRb canbe written as

FγSRb(y) =

N

∑m=1

Cm−1M (1− exp(−Ω1y))M−m+1

× exp(−(m−1)Ω1y)

=1−N

∑m=1

M−m+1

∑n=0,n+m>1

(−1)n+1Cm−1M Cn

M−m+1

× exp(−(n+m−1)Ω1y) , (A.4)

1602 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 5, MAY 2015

where Ω1 = N0λSR/P and Cab = b!

a!(b−a)! , with a and b beingintegers and b > a.

Combining (7), (A.3) and (A.4), and after some algebraicmanipulation, it follows that

FψSRb(x) = 1−

N

∑m=1

M−m+1

∑n=0, m+n>1

K1

∑v=1

(−1)n+1Δ1

× 1−κxΦ1 + x

exp

(− Θ1x

1−κx

), (A.5)

where Θ1 = (n + m − 1)Ω1, Δ1 = Cm−1M Cn

M−m+1αRI1v/(Θ1 −κΩRI1v), and Φ1 = ΩRI1v/(Θ1 − κΩRI1v). For simplicity, weassume that Θ1 −κΩRI1v �= 0.

Similarly, one can see that, if x ≥ κ−1, FψRbD(x) = 1, while if

x < κ−1, then

FψRbD(x) = 1−K2

∑t=1

Δ21−κxΦ2 + x

exp

(− Ω2x

1−κx

), (A.6)

where Ω2 = λRDN0/P, Δ2 = αDI2t/(Ω2 − ΩDI2tκ), Φ2 =ΩDI2t/(Ω2 −κΩDI2t), and Ω2 −κΩDI2t �= 0.

Finally, by substituting (A.5) and (A.6) into (A.1), (10) isattained, which completes the proof.

APPENDIX BPROOF OF LEMMA 1

Without interference sources, (3) and (4) can be rewritten as

ψSRb =γSRb

κγSRb +1,

ψRbD =γRbD

κγRbD +1. (B.1)

Similar to (A.2)–(A.5), the CDFs FψSRb(·) and FψRbD(·) can be

obtained as

FψSRb(x) =1−

N

∑m=1

M−m+1

∑n=0,m+n �=1

(−1)n+1

×Cm−1M Cn

M−m+1 exp

(− Θ1x

1−κx

),

FψRbD(x) =1− exp

(− Ω2x

1−κx

). (B.2)

Then, combining the above results with (A.1), the proof ofLemma 1 is concluded.

APPENDIX CPROOF OF LEMMA 2

From (A.1) in Appendix A, we can approximate FψPRSe2e

(x) athigh SNR region by

FψPRSe2e

(x)γ→+∞≈ FψSRb

(x)+FψRbD(x), (C.1)

where ψSRb and ψRbD are given as (B.1) in Appendix B.

In addition, since 1− exp(−t)t→0≈ t and exp(−t)

t→0≈ 1,asymptotic expressions for (B.2) can be written as

Fγ1b(x)γ→+∞≈

N

∑m=1

Cm−1M

(Ω1x

1−κx

)M−m+1

γ→+∞≈ CN−1

M

(Ω1x

1−κx

)M−N+1

,

Fγ2b(x)γ→+∞≈ Ω2x

1−κx. (C.2)

Combining (C.1) and (C.2), (14) is attained, which completesthe proof.

APPENDIX DPROOF OF THEOREM 3

Firstly, it is easy to see that FψORSe2e (x) = 1 when x ≥ κ−1. Thus,

considering the case when x < κ−1, (16) can be rewritten as

FψORSe2e

(x) =1−Pr(ψSRb ≥ x,ψRbD ≥ x

)

=1−Pr

(γSRb ≥

x+ xZ1

1−κx,γRbD ≥ x+ xZ2

1−κx

).

(D.1)

Since γSRb and γRbD are not independent, the method proposedin [11] will be employed to calculate (D.1). Initially, we willderive the probability Pr(γSRb ≥ u1,γRbD ≥ u2). To this end,similar to [11], this probability can be formulated as

Pr(γSRb ≥ u1,γRbD ≥ u2

)=

∫ +∞

0

∂G(z)∂z

fTmax(z)fTi(z)

dz. (D.2)

In (D.2), Tmax = Nth maxm=1,2,...,M

min(γSRm ,γRmD), in which its

CDF can be expressed similarly to (A.4) as

FTmax(z) = 1−N

∑m=1

M−m+1

∑n=0,n+m>1

(−1)n+1Cm−1M Cn

M−m+1

×exp(−(n+m−1)Ωz) , (D.3)

where Ω = Ω1 +Ω2. Thus, the PDF of Tmax can be derived as

fTmax(z) =N

∑m=1

M−m+1

∑n=0, m+n>1

(−1)nCm−1M Cn

M−m+1

×(m+n−1)Ωexp(−(n+m−1)Ωz) . (D.4)

By its turn, in (D.2), Ti = min(γSRi ,γRiD), i = 1,2, . . . ,M, suchthat its PDF can be expressed as

fTi(z) = Ωexp(−Ωz). (D.5)

Finally, the term G(z) in (D.2) can be formulated as

G(z) = Pr(γSRi ≥ u1,γRiD ≥ u2,min(γSRi ,γRiD)< z) . (D.6)

DUY et al.: PROACTIVE RELAY SELECTION WITH JOINT IMPACT OF HARDWARE IMPAIRMENT AND CCI 1603

To calculate G(z), two cases will be considered:• Case 1: u1 ≥ u2In this case, G(z) can be obtained as

G(z)=

⎧⎪⎪⎪⎨⎪⎪⎪⎩

0; if z ≤ u2

exp(−Ω1u1 −Ω2u2)−exp(−Ω1u1 −Ω2z); if u2 ≤ z < u1

exp(−Ω1u1 −Ω2u2)−exp(−Ωz); if z ≥ u1

(D.7)

• Case 2:u1 < u2In this case, it follows that

G(z)=

⎧⎪⎪⎪⎨⎪⎪⎪⎩

0; if z ≤ u1

exp(−Ω1u1 −Ω2u2)−exp(−Ω2u2 −Ω1z); if u2 ≤ z < u1

exp(−Ω1u1 −Ω2u2)−exp(−Ωz); if z ≥ u1

(D.8)

Combining (D.4), (D.5), (D.7) and (D.8), and after somealgebraic manipulations, Pr(γSRb ≥ u1,γRbD ≥ u2) is derived forCase 1 and Case 2 in (D.9) and (D.10), (See equation at thebottom of the page) respectively.

Now, replacing u1 = (x + xZ1)/(1 − κx) and u2 = (x +xZ2)/(1 − κx) in (D.9) and (D.10), the outage probabilityFψORS

e2e(x) can be calculated as5

FψORSe2e

(x) = 1−S1 −S2, (D.11)

where

S1 =

∫ +∞

0

∫ z1

0Pr

(γSRb ≥

x+ xz1

1−κx,γRbD ≥ x+ xz2

1−κx

)

× fZ1(z1) fZ2(z2)dz2dz1, (D.12)

S2 =∫ +∞

0

∫ z2

0Pr

(γSRb ≥

x+ xz1

1−κx, γRbD ≥ x+ xz2

1−κx

)

× fZ1(z1) fZ2(z2)dz1dz2. (D.13)

5u1 ≥ u2 is equivalent to Z1 ≥ Z2, and vice versa.

By substituting (7) and (D.9) into (D.12), and after somealgebraic manipulations, it follows that

S1 =N

∑m=1

M−m+1

∑n=0, m+n>1

K1

∑v=1

K2

∑t=1

(−1)n+1

×[

Δ3(1−κx)2

(Φ3 + x)(Φ5 + x)+

Δ4(1−κx)2

(Φ4 + x)(Φ5 + x)

]

× exp

(− Θ2x

1−κx

), (D.14)

where Θ2 = (n+m− 1)Ω, Φ3 = ΩRI1v/(Ω1 − κΩRI1v), Φ4 =ΩRI1v/(Θ2 − κΩRI1v), Φ5 = (ΩRI1v +ΩDI2t)/(Θ2 − κ(ΩRI1v +ΩDI2t)), and

Δ3 =(n+m−1)Cm−1M Cn

M−m+1Ω2αRI1v αDI2t

Ω2 +(n+m−2)Ω

× 1(Θ2 −κ(ΩRI1v +ΩDI2t))(Ω1 −κΩRI1v)

,

Δ4 =(n+m−2)Cm−1M Cn

M−m+1Ω1αRI1v αDI2t

Ω2 +(n+m−2)Ω

× 1(Θ2 −κΩRI1v)(Θ2 −κ(ΩRI1v +ΩDI2t))

.

Similarly, from (7), (D.10) and (D.13), S2 can be obtained as

S2 =N

∑m=1

M−m+1

∑n=0, m+n>1

K1

∑v=1

K2

∑t=1

(−1)n+1

×[

Δ5(1−κx)2

(Φ6+x)(Φ5+x)+

Δ6(1−κx)2

(Φ7+x)(Φ5+x)

]exp

(− Θ2x

1−κx

),

(D.15)

Pr(γSRb ≥ u1,γRbD ≥ u2

)=

N

∑m=1

M−m+1

∑n=0,m+n>1

(−1)nCm−1M Cn

M−m+1

×[

(n+m−1)Ω2

Ω2 +(n+m−2)Ωexp(−Ω1u1 − (Ω2 +(n+m−2)Ω)u2)+

(n+m−2)Ω1

Ω2 +(n+m−2)Ωexp(−(n+m−1)Ωu1)

]

(D.9)

Pr(γSRb ≥ u1,γRbD ≥ u2

)=

N

∑m=1

M−m+1

∑n=0, m+n>1

(−1)nCm−1M Cn

M−m+1

×[

(n+m−1)Ω1

Ω1 +(n+m−2)Ωexp(−Ω2u2 − (Ω1 +(n+m−2)Ω)u1)+

(n+m−2)Ω2

Ω1 +(n+m−2)Ωexp(−(n+m−1)Ωu2)

]

(D.10)

1604 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 5, MAY 2015

where Φ6 = ΩDI2t/(Ω2 −κΩDI2t), Φ7 = ΩDI2t/(Θ2 −κΩDI2t),and

Δ5 =(n+m−1)Cm−1M Cn

M−m+1Ω1αRI1v αDI2t

Ω1 +(n+m−2)Ω

× 1(Θ2 −κ(ΩRI1v +ΩDI2t))(Ω2 −κΩDI2t)

,

Δ6 =(n+m−2)Cm−1M Cn

M−m+1Ω2αRI1v αDI2t

Ω1 +(n+m−2)Ω

× 1(Θ2 −κΩDI2t)(Θ2 −κ(ΩRI1v +ΩDI2t))

.

Finally, combining (D.11), (D.14) and (D.15), the proof isconcluded.

APPENDIX EPROOF OF THEOREM 5

Firstly, we rewrite (10) as

FψPRSe2e

(x) = 1−N

∑m=1

M−m+1

∑n=0, m+n>1

K1

∑v=1

K2

∑t=1

(−1)n+1Δ1Δ2

×(

δ1

Φ1 + x+

δ2

Φ2 + x+κ2

)exp

(− (Θ1 +Ω2)x

1−κx

), (E.1)

where δ1 = (1+κΦ1)2/(Φ2−Φ1) and δ2 = (1+κΦ2)

2/(Φ1−Φ2). Now, by substituting (E.1) into (21), we have

CPRSavg =

12ln2

N

∑m=1

M−m+1

∑n=0, m+n>1

K1

∑v=1

K2

∑t=1

(−1)n+1Δ1Δ2

×∫ κ−1

0

(δ1

(1+ x)(Φ1 + x)+

δ2

(1+ x)(Φ2 + x)+

κ2

1+ x

)

× exp

(− (Θ1 +Ω2)x

1−κx

)dx. (E.2)

Next, rewriting (E.2) as

CPRSavg =

12ln2

N

∑m=1

M−m+1

∑n=0, m+n>1

K1

∑v=1

K2

∑t=1

(−1)n+1Δ1Δ2

×∫ κ−1

0L1(x)exp

(− (Θ1 +Ω2)x

1−κx

)dx, (E.3)

in which

L1(x) =δ1

Φ1 −1

(1

1+ x− 1

Φ1 + x

)

+δ2

Φ2 −1

(1

1+ x− 1

Φ2 + x

)+

κ2

1+ x.

Finally, applying (23) for the corresponding integral in (E.3),we finish the proof of Theorem 5.

APPENDIX FPROOF OF THEOREM 7

Firstly, we rewrite (16) as (F.1), (See equation at the bottomof the page) where δ3 = (1 + κΦ3)

2/(Φ5 − Φ3), δ4 = (1 +κΦ5)

2/(Φ3 − Φ5), δ5 = (1 + κΦ4)2/(Φ5 − Φ4), δ6 = (1 +

κΦ5)2/(Φ4 − Φ5), δ7 = (1 + κΦ6)

2/(Φ5 − Φ6), δ8 = (1 +κΦ5)

2/(Φ6 − Φ5), δ9 = (1 + κΦ7)2/(Φ5 − Φ7), and δ10 =

(1+κΦ5)2/(Φ7−Φ5). Now, by substituting (F.1) into (21), and

after some algebraic manipulations, it follows that

CORSavg =

12ln2

N

∑m=1

M−m+1

∑n=0, m+n>1

K1

∑v=1

K2

∑t=1

(−1)n+1

×κ−1∫

0

L2(x)exp

(− Θ2x

1−κx

)dx, (F.2)

where L2(x) is a function of x, which is given in (F.3), (Seeequation at the bottom of the page) . Next, applying (23) for thecorresponding integral in (F.2), the proof is concluded.

FψORSe2e

= 1−N

∑m=1

M−m+1

∑n=0, m+n>1

K1

∑v=1

K2

∑t=1

(−1)n+1 exp

(− Θ2x

1−κx

)Δ3

(δ3

Φ3 + x+

δ4

Φ5 + x+κ2

)

+Δ4

(δ5

Φ4 + x+

δ6

Φ5 + x+κ2

)+Δ5

(δ7

Φ6 + x+

δ8

Φ5 + x+κ2

)+Δ6

(δ9

Φ7 + x+

δ10

Φ5 + x+κ2

). (F.1)

L2(x) = Δ3

(δ3

Φ3 −1

(1

1+ x− 1

Φ3 + x

)+

δ4

Φ5 −1

(1

1+ x− 1

Φ5 + x

)+

κ2

1+ x

)

+Δ4

(δ5

Φ4 −1

(1

1+ x− 1

Φ4 + x

)+

δ6

Φ5 −1

(1

1+ x− 1

Φ5 + x

)+

κ2

1+ x

)

+Δ5

(δ7

Φ6 −1

(1

1+ x− 1

Φ6 + x

)+

δ8

Φ5 −1

(1

1+ x− 1

Φ5 + x

)+

κ2

1+ x

)

+Δ6

(δ9

Φ7 −1

(1

1+ x− 1

Φ7 + x

)+

δ10

Φ5 −1

(1

1+ x− 1

Φ5 + x

)+

κ2

1+ x

). (F.3)

DUY et al.: PROACTIVE RELAY SELECTION WITH JOINT IMPACT OF HARDWARE IMPAIRMENT AND CCI 1605

REFERENCES

[1] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity inwireless networks: Efficient protocols and outage behavior,” IEEE Trans.Inf. Theory, vol. 50, no. 12, pp. 3062–3080, Dec. 2004.

[2] A. Bletsas, A. Khisti, D. P. Reed, and A. Lippman, “A simple cooperativediversity method based on network path selection,” IEEE J. Sel. AreasCommun., vol. 24, no. 3, pp. 559–572, Mar. 2006.

[3] Y. Zhao, R. Adve, and T. J. Lim, “Symbol error rate of selectionamplify-and-forward relay systems,” IEEE Commun. Lett., vol. 10, no. 11,pp. 757–759, Nov. 2006.

[4] A. Bletsas, H. Shin, and M. Z. Win, “Outage optimality of opportunis-tic amplify-and-forward relaying,” IEEE Commun. Lett., vol. 11, no. 3,pp. 261–263, Mar. 2007.

[5] E. Beres and R. Adve, “Selection cooperation in multi-source cooperativenetworks,” IEEE Commun. Lett., vol. 7, no. 1, pp. 118–127, Jan. 2008.

[6] D. S. Michalopoulos and G. K. Karagiannidis, “Performance analy-sis of single relay selection in Rayleigh fading,” IEEE Trans. WirelessCommun., vol. 7, no. 10, pp. 3718–3724, Oct. 2008.

[7] B. Maham and A. Hjorungnes, “Performance analysis of amplify-and-forward opportunistic relaying in Rician fading,” IEEE Signal Process.Lett., vol. 16, no. 8, pp. 643–646, Aug. 2009.

[8] F. Xu, F. C. M. Lau, Q. F. Zhou, and D.-W. Yue, “Outage performanceof cooperative communication systems using opportunistic relaying andselection combining receiver,” IEEE Signal Process. Lett., vol. 16, no. 2,pp. 237–240, Apr. 2009.

[9] T. Q. Duong, V. N. Q. Bao, and H.-J. Zepernick, “On the performanceof selection decode-and-forward relay networks over Nakagami-m fadingchannels,” IEEE Commun. Lett., vol. 13, no. 8, pp. 172–174, Mar. 2009.

[10] A. Adinoyi, Y. Fan, H. Yanikomeroglu, H. V. Poor, and F. Al-Shaalan,“Performance of selection relaying and cooperative diversity,” IEEETrans. Wireless Commun., vol. 8, no. 12, pp. 5790–5795, Dec. 2009.

[11] K. Tourki, H.-C. Yang, and M.-S. Alouini, “Accurate outage analysisof incremental decode-and-forward opportunistic relaying,” IEEE Trans.Wireless Commun., vol. 10, no. 4, pp. 1021–1025, Apr. 2011.

[12] I. Krikidis, J. Thompson, S. McLaughlin, and N. Goertz, “Amplify-and-forward with partial relay selection,” IEEE Commun. Lett., vol. 12, no. 4,pp. 235–237, Apr. 2008.

[13] D. B. da Costa and S. Aïssa, “Capacity analysis of cooperative systemswith relay selection in Nakagami-m fading,” IEEE Commun. Lett., vol. 13,no. 9, pp. 637–639, Sep. 2009.

[14] K. Yan, J. Jiang, Y. G. Wang, and H. T. Liu, “Outage probability ofselection cooperation with MRC in Nakagami-m fading channels,” IEEESignal Process. Lett., vol. 16, no. 12, pp. 1031–1034, Dec. 2009.

[15] D. B. da Costa and S. Aissa, “End-to-end performance of dual-hop semi-blind relaying systems with partial relay selection,” IEEE Trans. WirelessCommun., vol. 8, no. 8, pp. 4306–4315, Aug. 2009.

[16] G. C. Alexandropoulos, A. Papadogiannis, and K. Berberidis, “Per-formance analysis of cooperative networks with relay selection overNakagami-m fading channels,” IEEE Signal Process. Lett., vol. 17, no. 5,pp. 1–4, May 2010.

[17] H. Ding, J. Ge, D. B. da Costa, and Z. Jiang, “Diversity and codinggains of fixed-gain amplify-and-forward with partial relay selection inNakagami-m fading,” IEEE Commun. Lett., vol. 14, no. 8, pp. 734–736,Aug. 2010.

[18] H. Suraweera, M. Soysa, C. Tellambura, and H. Garg, “Performance anal-ysis of partial relay selection with feedback delay,” IEEE Signal Process.Lett., vol. 17, no. 6, pp. 531–534, Jun. 2010.

[19] Y. Chen, C.-X. Wang, H. Xiao, and D. Yuan, “Novel partial selectionschemes for AF relaying in Nakagami-m fading channels,” IEEE Trans.Veh. Technol., vol. 60, no. 7, pp. 3497–3503, Sep. 2011.

[20] E. Costa and S. Pupolin, “ m-QAM-OFDM system performance inthe presence of a nonlinear amplifier and phase noise,” IEEE Trans.Commun., vol. 50, no. 3, pp. 462–472, Mar. 2002.

[21] M. Mokhtar, A. Gomaa, and N. Al-Dhahir, “OFDM AF relaying underI/Q imbalance: Performance analysis and baseband compensation,” IEEETrans. Commun., vol. 61, no. 4, pp. 1304–1313, Apr. 2013.

[22] M. Mokhtar, A.-A. A. Boulogeorgos, G. K. Karagiannidis, andN. Al-Dhahir, “OFDM opportunistic relaying under joint transmit/receiveI/Q imbalance,” IEEE Trans. Commun., vol. 62, no. 5, pp. 1458–1468,May 2014.

[23] E. Björnson, M. Matthaiou, and M. Debbah, “A new look at dual-hoprelaying: Performance limits with hardware impairments,” IEEE Trans.Commun., vol. 61, no. 11, pp. 4512–4525, Nov. 2013.

[24] M. Matthaiou and A. Papadogiannis, “Two-way relaying under the pres-ence of relay transceiver hardware impairments,” IEEE Commun. Lett.,vol. 17, no. 6, pp. 1136–1139, Jun. 2013.

[25] A. Salhab, F. Al-Qahtani, S. Zummo, and H. Alnuweiri, “Exact outageprobability of opportunistic DF relay systems with interference at boththe relay and the destination over Nakagami-m fading channels,” IEEETrans. Veh. Technol., vol. 62, no. 2, pp. 920–927, Feb. 2013.

[26] K. T. Hemachandra and N. C. Beaulieu, “Outage analysis of opportunis-tic scheduling in dual-hop multiuser relay networks in the presence ofinterference,” IEEE Trans. Commun., vol. 61, no. 5, pp. 1786–1796,May 2013.

[27] E. Soleimani-Nasab, M. Matthaiou, M. Ardebilipour, andG. Karagiannidis, “Two-way AF relaying in the presence of co-channelinterference,” IEEE Trans. Commun., vol. 61, no. 8, pp. 3156–3169,Aug. 2013.

[28] A. Bletsas, H. Shin, and M. Z. Win, “Cooperative communicationswith outage-optimal opportunistic relaying,” IEEE Trans. WirelessCommun., vol. 6, no. 9, pp. 3450–3460, Sep. 2007.

[29] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, Products,6th ed. San Diego, CA, USA: Academic, 2000.

[30] S. Ikki and M. Ahmed, “On the performance of adaptive decode-and-forward cooperative diversity with the nth best-relay selection scheme,”in Proc. Global Telecommun. Conf., Honolulu, HI, USA, Nov./Dec. 2009,pp. 1–6.

Tran Trung Duy was born in Nha Trang City,Vietnam, in 1984. He received the B.E. degreein electronics and telecommunications engineeringfrom the French-Vietnamese training program forexcellent engineers (PFIEV), Ho Chi Minh City Uni-versity of Technology, Vietnam in 2007. In 2013, hereceived the Ph.D. degree in electrical engineeringfrom University of Ulsan, South Korea. In 2013,he joined the Department of Telecommunications,Posts and Telecommunications Institute of Technol-ogy (PTIT), as a Lecturer. His major research in-

terests are cooperative communications, cognitive radio, and physical layersecurity.

Trung Q. Duong (S’05–M’12–SM’13) received thePh.D. degree in telecommunications systems fromBlekinge Institute of Technology (BTH), Sweden,in 2012, and then continued working at BTH as aproject manager. Since 2013, he has joined Queen’sUniversity Belfast, UK, as a Lecturer (Assistant Pro-fessor). He held a visiting position at the Polytech-nic Institute of New York University and SingaporeUniversity of Technology and Design in 2009 and2011, respectively. His current research interests in-clude cooperative communications, cognitive radio

networks, physical layer security, massive MIMO, cross-layer design, mm-waves communications, and localization for radios and networks.

Dr. Duong has served as an Editor for the IEEE COMMUNICATIONS LET-TERS, IET Communications, Transactions on Emerging TelecommunicationsTechnologies (Wiley). He has also served as the Lead Guest Editor of thespecial issue on Location Awareness for Radios and Networks of the IEEEJOURNAL IN SELECTED AREAS ON COMMUNICATIONS, the Lead GuestEditor of the special issue on Secure Physical Layer Communications of theIET Communications, Guest Editor of the special issue on Green Media: TheFuture of Wireless Multimedia Networks of the IEEE WIRELESS COMMUNI-CATIONS MAGAZINE, Guest Editor of the special issue on Millimeter WaveCommunications for 5G and Energy Harvesting Communications of the IEEECOMMUNICATIONS MAGAZINE, Guest Editor of the special issue on Coopera-tive Cognitive Networks of the EURASIP Journal on Wireless Communicationsand Networking, Guest Editor of special issue on Security Challenges andIssues in Cognitive Radio Networks of the EURASIP Journal on AdvancesSignal Processing. He was awarded the Best Paper Award at the IEEE VehicularTechnology Conference (VTC-Spring) in 2013, IEEE International Conferenceon Communications (ICC) 2014, and the Exemplary Reviewer Certificate ofthe IEEE COMMUNICATIONS LETTERS in 2012.

1606 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 5, MAY 2015

Daniel Benevides da Costa was born in Fortaleza,Ceará, Brazil, in 1981. He received the B.Sc. degreein telecommunications from the Military Institute ofEngineering, Rio de Janeiro, Brazil, in 2003 andthe M.Sc. and Ph.D. degrees in telecommunicationsfrom the University of Campinas, Campinas, Brazil,in 2006 and 2008, respectively. His Ph.D. disserta-tion was awarded the Best Ph.D. Thesis in ElectricalEngineering by the Brazilian Ministry of Education(CAPES) at the 2009 CAPES Thesis Contest. From2008 to 2009, he was a Postdoctoral Research Fellow

with INRS-EMT, University of Quebec, Montreal, QC, Canada. At that time,he was the recipient of two scholarships: 1) the Merit Scholarship Programfor Foreign Students in Quebec and 2) the Natural Sciences and EngineeringResearch Council of Canada Postdoctoral Scholarship. Since 2010, he has beenwith the Federal University of Ceará, Brazil, where he is currently an AssistantProfessor.

He has authored or coauthored more than 60 papers in IEEE/IET journalsand more than 45 papers in international conferences. His research interestslie in the area of wireless communications and include channel modelingand characterization, relaying/multihop/mesh networks, cooperative systems,cognitive radio networks, tensor modeling, physical layer security, and per-formance analysis/design of multiple-input multiple-output systems. He iscurrently an Editor of the IEEE COMMUNICATIONS LETTERS, IEEE TRANS-ACTIONS ON VEHICULAR TECHNOLOGY, EURASIP Journal on WirelessCommunications and Networking, and the KSII Transactions on Internet andInformation Systems. He has also served as Associate Technical Editor for theIEEE COMMUNICATIONS MAGAZINE. He served as the Lead Guest Editorfor EURASIP Journal on Wireless Communications and Networking in theSpecial Issue on Cooperative Cognitive Networks, Lead Guest Editor for KSIITransactions on Internet and Information Systems for the Special Issue onCognitive Radio Networks: Survey, Tutorial, and New Introduction, and a GuestEditor for IET Communications in the Special Issue on Secure Physical LayerCommunications. Also, he was a Workshop Chair of the 2nd InternationalConference on Computing, Management and Telecommunications (ComMan-Tel 2014) and he served as a TPC chair for the IEEE GLOBECOM 2013,Workshop on Trusted Communications with Physical Layer Security. He alsoacts as a reviewer for major international journals of the IEEE and IET, and hehas been Member of the Technical Program Committee of several internationalconferences, such as ICC, WCNC, GLOBECOM, PIRMC, and VTC. He iscurrently a Scientific Consultant of the National Council of Scientific andTechnological Development (CNPq), Brazil, and of the Brazilian Ministry ofEducation (CAPES). He is also a Productivity Research Fellow of CNPq. From2010 to 2012, he was a Productivity Research Fellow of the Ceará Councilof Scientific and Technological Development (FUNCAP). Currently, he is amember of the Advisory Board of FUNCAP, Area: Telecommunications. Dr. daCosta is the recipient of three conference paper awards: one at the 2009 IEEEInternational Symposium on Computers and Communications, one at the 13thInternational Symposium on Wireless Personal Multimedia Communicationsin 2010, and another at the XXIX Brazilian Telecommunications Symposiumin 2011. In 2013, he received the Exemplary Reviewer Certificate of the IEEEWIRELESS COMMUNICATIONS LETTERS and the Certificate of Appreciationof Top Associate Editor for outstanding contributions to IEEE TRANSACTIONS

ON VEHICULAR TECHNOLOGY. He is Member of IEEE Communications So-ciety, IEEE Vehicular Technology Society, and Brazilian TelecommunicationsSociety.

Vo Nguyen Quoc Bao was born in Khanh Hoa,Vietnam, in 1979. He received the B.E. and M.Eng.degree in electrical engineering from Ho Chi MinhCity University of Technology (HCMUT), Vietnam,in 2002 and 2005, respectively, and the Ph.D. degreein electrical engineering from University of Ulsan,South Korea, in 2010. In 2002, he joined the Depart-ment of Electrical Engineering, Posts and Telecom-munications Institute of Technology (PTIT), as alecturer. Since February 2010, he has been with theDepartment of Telecommunications, PTIT, where he

is currently an Assistant Professor. His major research interests are modulationand coding techniques, MIMO system, combining technique, cooperative com-munications and cognitive radio. Dr. Bao is a Member of Korea Informationand Communications Society (KICS), The Institute of Electronics, Informationand Communication Engineers (IEICE), and the Institute of Electrical andElectronics Engineers (IEEE).

Maged Elkashlan (M’06) received the Ph.D. de-gree in electrical engineering from the University ofBritish Columbia, Canada, 2006. From 2006 to 2007,he was with the Laboratory for Advanced Network-ing at University of British Columbia. From 2007to 2011, he was with the Wireless and NetworkingTechnologies Laboratory at Commonwealth Scien-tific and Industrial Research Organization (CSIRO),Australia. During this time, he held an adjunctappointment at University of Technology Sydney,Australia. In 2011, he joined the School of Electronic

Engineering and Computer Science at Queen Mary University of London,UK, as an Assistant Professor. He also holds visiting faculty appointmentsat the University of New South Wales, Australia, and Beijing University ofPosts and Telecommunications, China. His research interests fall into the broadareas of communication theory, wireless communications, and statistical signalprocessing for distributed data processing, millimeter wave communications,heterogeneous networks, and security.

Dr. Elkashlan currently serves as an Editor of IEEE TRANSACTIONS

ON WIRELESS COMMUNICATIONS, IEEE TRANSACTIONS ON VEHICULAR

TECHNOLOGY, and IEEE COMMUNICATIONS LETTERS. He also serves asLead Guest Editor for the special issue on Green Media: The Future ofWireless Multimedia Networks of the IEEE WIRELESS COMMUNICATIONS

MAGAZINE, Lead Guest Editor for the special issue on Millimeter WaveCommunications for 5G of the IEEE COMMUNICATIONS MAGAZINE, GuestEditor for the special issue on Energy Harvesting Communications of theIEEE COMMUNICATIONS MAGAZINE, and Guest Editor for the special issueon Location Awareness for Radios and Networks of the IEEE JOURNAL ON

SELECTED AREAS IN COMMUNICATIONS. He received the Best Paper Awardat the IEEE International Conference on Communications (ICC) in 2014,the International Conference on Communications and Networking in China(CHINACOM) in 2014, and the IEEE Vehicular Technology Conference (VTC-Spring) in 2013. He received the Exemplary Reviewer Certificate of the IEEECOMMUNICATIONS LETTERS in 2012.