Skip to main content

Advertisement

Log in

Underlay Device to Device Communication with Imperfect Interference Channel Knowledge

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Device-to-device (D2D) communication underlying cellular networks is an important technology to enhance spectrum efficiency in next generation wireless networks. One main challenge in this technology is the power control of D2D transmitter in order to preserve a certain level of transmit rate for cellular users. This challenge would be even more critical if there is imperfect knowledge on the interference channel to cellular users. To address this challenge, in this paper, D2D power control schemes including stochastic optimization, robust optimization, and a game theoretic approach are proposed. These schemes aim to maximize the achieved rate of an underlay D2D pair while satisfying a given transmit rate for a cellular user. Numerical results demonstrate the effectiveness of the proposed schemes. In particular, the results of the game theoretic approach match the case when there is perfect knowledge on the interference channel gain. Following this observation, the game theoretic approach is also extended for the case of multiple D2D pairs. Simulations reveal the performance degradation of the cellular user with the increase in the number of D2D pairs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Asadi, A., Wang, Q., & Mancuso, V. (2014). A survey on device-to-device communication in cellular networks. IEEE Communications Surveys & Tutorials, 16, 1801–1819.

    Article  Google Scholar 

  2. Lin, X., Andrews, J. G., & Ghosh, A. (2014). Spectrum sharing for device-to-device communication in cellular networks. IEEE Transactions on Wireless Communications, 13, 6727–6740.

    Article  Google Scholar 

  3. Yu, C.-H., et al. (2011). Resource sharing optimization for D2D communication underlaying cellular networks. IEEE Transactions on Wireless Communications, 10(8), 2752–2763.

    Article  Google Scholar 

  4. Xu, C., et al. (2012). Resource allocation using a reverse iterative combinatorial auction for device-to-device underlay cellular networks. In IEEE global communications conference (Globecom), Los Angeles, CA.

  5. Yu, C. H., Tirkkonen, O., Doppler, K., & Ribeiro, C. (2009). On the performance of device-to-device underlay communication with simple power control. In Proceedings of the IEEE vehicular technology conference (pp. 1–5).

  6. Zulhasnine, M., Huang, C., & Sinivasan, A. (2010). Efficient resource allocation for device-to-device communication underlaying LTE network. In Proceedings of the IEEE international wireless and mobile computing, networking and communications conference, Niagara Falls, NJ (pp. 368–375).

  7. Gu, J., Bae, S. J., Choi, B.-G., & Chung, M. Y. (2011). Dynamic power control mechanism for interference coordination of device-to-device communication in cellular networks. In Proceedings of the 3rd international conference on ubiquitous future network (pp. 71–75).

  8. Lee, N., Lin, X., Andrews, J. G., & Heath, R. W. (2015). Power control for D2D underlaid cellular networks: Modeling, algorithms, and analysis. IEEE Journal on Selected Areas in Communications, 33(1), 1–13.

    Article  Google Scholar 

  9. Hasan, M., Hossain, E., & Kim, D. I. (2014). Resource allocation under channel uncertainties for relay-aided device-to-device communication underlaying LTE-A cellular networks. IEEE Transactions on Wireless Communications, 13(4), 2322–2338.

    Article  Google Scholar 

  10. Yue, J., Ma, C., Yu, H., & Zhou, W. (2013). Secrecy-based access control for device-to-device communication underlaying cellular networks. IEEE Communications Letters, 17(11), 2068–2071.

    Article  Google Scholar 

  11. Yue, J., Ma, C., Yu, H., Yang, Z., & Gan, X. (2013). Secrecy-based channel assignment for device-to-device communication: An auction approach. In Proceedings of the IEEE wireless communications and signal processing (WCSP).

  12. Mas-Colell, A., Whinston, M. D., & Green, J. R. (1995). Microeconomic theory (Vol. 1). New York: Oxford University Press.

    MATH  Google Scholar 

  13. Fudenberg, D., & Tirole, J. (1991). Game theory. Cambridge: MIT Press.

    MATH  Google Scholar 

  14. Song, L., Niyato, D., Han, Z., & Hossain, E. (2014). Game-theoretic resource allocation methods for device-to-device communication. IEEE Wireless Communications, 21, 136–144.

    Article  Google Scholar 

  15. Felegyhazi, M., & Hubaux, J.-P. (2006). Game theory in wireless networks: A tutorial. Lausanne: EPFL Press.

    Google Scholar 

  16. Wang, F., Xu, C., Song, L., & Han, Z. (2015). Energy-efficient resource allocation for device-to-device underlay communication. IEEE Transactions on Wireless Communications, 14, 2082–2092.

    Article  Google Scholar 

  17. Wang, F., Song, L., Han, Z., Zhao, Q., & Wang, X. (2013). Joint scheduling and resource allocation for device-to-device underlay communication. In Wireless communications and networking conference (WCNC), IEEE, 2013 (pp. 134–139).

  18. Corson, M. S., Laroia, R., Li, J., Park, V., Richardson, T., & Tsirtsis, G. (2010). Toward proximity-aware internetworking. IEEE Wireless Communications, 17, 26–33.

    Article  Google Scholar 

  19. Saraydar, C. U., Mandayam, N. B., & Goodman, D. J. (2002). Efficient power control via pricing in wireless data networks. IEEE Transactions on Communications, 50, 291–303.

    Article  Google Scholar 

  20. Fathi, M. (2014). Price-based spectrum sharing and rate allocation in multicarrier wireless networks. IET Networks, 3(4), 252–258.

    Article  Google Scholar 

  21. Boyd, S., & Vandenberghe, L. (2004). Convex optimization. Cambridge: Cambridge University Press.

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Fathi.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

The constraint (5b) can be rewritten as

$$\sum\limits_{i} {\left( {\pi_{i} \log_{2} \left( {1 + \frac{{g_{ce} p_{c} }}{{g_{de}^{i} p_{d} + \sigma_{n}^{2} }}} \right)} \right)} \ge r_{c}^{T} .$$
(12)

The function \(\log_{2} \left( {1 + \frac{{g_{ce} p_{c} }}{{g_{de}^{i} p_{d} + \sigma_{n}^{2} }}} \right)\) is a convex function of \(g_{de}^{i}\). Based on the properties of convex functions, we can write [21]

$$\sum\limits_{i} {\left( {\pi_{i} \log_{2} \left( {1 + \frac{{g_{ce} p_{c} }}{{g_{de}^{i} p_{d} + n}}} \right)} \right) \ge \log_{2} \left( { 1 { + }\frac{{{\text{g}}_{\text{ce}} {\text{ p}}_{\text{c}} }}{{\sum\nolimits_{i} {\pi_{i} } {\text{g}}_{de}^{i} {\text{p}}_{\text{d}} { + }\sigma_{n}^{2} }}} \right)} .$$
(13)

Based on this inequality, we can substitute constraint (12) by

$$\log_{2} \left( { 1 { + }\frac{{{\text{g}}_{\text{ce}} {\text{ p}}_{\text{c}} }}{{\sum\nolimits_{i} {\pi_{i} } {\text{g}}_{de}^{i} {\text{p}}_{\text{d}} { + }\sigma_{n}^{2} }}} \right) \ge r_{c}^{T} .$$
(14)

Indeed, we replaced the right hand-side of (12) with a smaller value function in (14) that is monotonically decreasing in \(p_{d}\). Indeed, with a given \(r_{c}^{T}\), the feasible power in (14) is a lower bound on the feasible power in (12).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharifi, S., Fathi, M. Underlay Device to Device Communication with Imperfect Interference Channel Knowledge. Wireless Pers Commun 101, 619–634 (2018). https://doi.org/10.1007/s11277-018-5707-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5707-4

Keywords

Navigation