Professional Documents
Culture Documents
Received January 11, 2019, accepted January 17, 2019, date of publication February 18, 2019, date of current version February 27, 2019.
Digital Object Identifier 10.1109/ACCESS.2019.2896582
ABSTRACT Device-to-device (D2D) communication has been a potential solution to improve spectral
efficiency of cellular systems due to frequency resource sharing. This paper considers D2D communications
underlaying an uplink cellular system enabling sparse code multiple access (SCMA) technology, where
the base station (BS) can decode the signals of cellular users without mutual interference. The demands
for high data rate as well as low latency in massive connectivity is the main challenging requirement in
D2D communications, along with ensuring the quality of service (QoS) for the on-running cellular user
equipment (CUEs). To tackle the problem, the BS is designed to first assigns the codewords in a codebook to
CUEs based on the lower bound of the achievable CUE rates, so that the sum rate (SR) of CUEs is maximized.
With the usage of mutual-interference suppression in the SCMA-enabled system, the BS then attempts to
maximize the SR of D2Ds in a transmission block through a joint power and resource allocation subject
to the QoS requirements for both CUEs and D2Ds. This task is formulated as a mixed-integer non-convex
programming. We propose a low-complexity two-phase algorithm of joint heuristic and inner approximation
method to efficiently solve the problem. The numerical results verify that the codebook assignment problem
based on the lower bound of SR is easily solved, and the proposed algorithm to maximize the SR of D2Ds
outperforms existing methods.
INDEX TERMS Device-to-device (D2D), heuristic search, inner approximation, power allocation, resource
allocation, sparse code multiple access (SCMA), spectral efficiency.
2169-3536
2019 IEEE. Translations and content mining are permitted for academic research only.
21756 Personal use is also permitted, but republication/redistribution requires IEEE permission. VOLUME 7, 2019
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
H. M. Kim et al.: D2D Communications Underlaying an Uplink SCMA System
encountering pullbacks [10]. Therefore, substantial attention Reference [33] has considered the SR of D2Ds subject to
has recently turned into developing a new multiple access rate requirements for CUEs. However, when the numbers of
method. CUEs and D2Ds increase, the strong interference between
The non-orthogonal multiple access (NOMA) technol- D2Ds and CUEs degrades the system performance in terms
ogy, where the mutual interference is manageable and the of both the complexity and data rate. In [34], a weighted SR
non-orthogonal frequency resources are allocated to the maximization has been proposed with consideration of the
users [11], has been proposed as a promising solution to effi- proportional fairness among D2D links. Wei et al. [26] con-
ciently utilize the limited frequency resources. Two main cat- sidered the SR maximization for all CUEs and V2Xs, where
egories of NOMA, i.e., power domain NOMA (PD-NOMA) power allocation and resource assignment are handled in
and code domain NOMA (CD-NOMA), have attracted a separate steps. Although the algorithm of maximum weighted
lot of attention [12], [13]. The PD-NOMA is more suit- matching on bipartite graph provided low complexity, V2Xs
able for exploiting channel condition, while the CD-NOMA were matched to resources by one-by-one assignments, which
utilizes spreading gain for resource allocation [14]. In the cannot be extended to an SCMA scheme with several orthog-
CD-NOMA literature, many recent attempts have involved onal frequency division multiple access (OFDMA) tones per
sparse code multiple access (SCMA), featuring the mixture SCMA layer.
of quadrature amplitude modulation (QAM) symbol map- In very recent works, SCMA-assisted D2D communica-
ping and spreading, which has been proposed to enhance tions, where D2Ds can share several OFDMA tones with
the sum spectral efficiency (SE) [15]–[17]. With the SCMA CUEs served by an SCMA-enabled system, have been
technique, the transmitted information of a user mapped to a actively studied to further improve the SE [35]–[37]. Such
multidimensional complex codeword is decoded at the BS. model, also known as a hybrid network, can take advantage
Subsequently, SCMA allows improving spectral efficiency of SCMA as follows: (i) The mutual interference between
due to resource sharing among multiple users. CUEs can be completely eliminated; (ii) It allows to exploit
Device-to-device (D2D) communication, where two multiple resources for D2Ds, i.e., codeword with several
devices are allowed to directly communicate with each resources assigned. Accordingly, those relevant works have
other, has recently attracted much interest, due to its widely attracted attention to a further development of both CUEs
prospective applications in next-generation wireless systems and D2Ds. In [35], a graph-based method was proposed
[18]–[21]. Many recent works have investigated resource to improve the total rate of D2Ds and CUEs in the whole
sharing among D2Ds and cellular user equipment (CUEs), network. Nevertheless, this approach cannot simultaneously
in which the same resources are allocated to D2Ds as well manage the power control, since the matching criteria require
as CUEs. As an extension of D2D communications, a lot of the transmit power to be predefined. To further enhance
vehicle-to-everything (V2X) categories, such as vehicle-to- SR, the hybrid network was investigated in [36] and [37],
vehicle (V2V), vehicle-to-infrastructure (V2I), and vehicle- with both resource and power allocation taken into account.
to-network (V2N), have been considered to improve traffic However, these designs primarily focused on the resource
safety and SE [22], [23]. In Long-Term Evolution (LTE) and assignment at first, while the transmit power for D2Ds was
LTE-Advanced (LTE-A), the LTE-Vehicle (LTE-V) and LTE- uniformly allocated in [36] or derived under the condition
Unlicensed (LTE-U) standards were developed in [24]–[26]. of optimized resource assignment in the prior stage [37].
Although D2D communication is a promising candidate for Therefore, a joint optimization for both resource and power
IoT networks with numerous devices, the main challenge is allocation is still open, and it will be a promising tool to
the mutual interference among CUEs and D2Ds. Therefore, enhance the system performance.
proper control of interference among CUEs and D2Ds is
required to guarantee the QoS of both CUEs and D2Ds. B. MOTIVATION AND CONTRIBUTION
Since interference management between D2Ds and CUEs in Even when the preceding researches provide a continuous
downlink transmission is difficult, most of the existing studies renovation for the evolution path towards next-generation
on D2D communication have focused on resource sharing in network, there still remain some critical challenges in D2D
uplink transmission (spectrum in FDD, sub-frame in TDD). communications underlaying an SCMA system. In partic-
However, bandwidth bottleneck with dense devices is still a ular, the network throughput, i.e., the summation of CUE
challenging problem [27], [28]. and D2D rates, is usually considered as the objective func-
tion, which causes complicated computation for resource
A. RELATED WORKS allocation. Moreover, various levels of QoS requirements
In earlier works, D2D communications have been studied should be satisfied for cellular links. In addition, a joint
in the perspective of resource allocation [26], [29]–[34]. optimization of resource and power allocation for D2D
Nguyen et al. [30], [31] have proposed methods based on communications underlaying an SCMA-enabled cellular net-
the bipartite graph matching problem for resource sharing work is not easy, since the problem belongs to the class
among D2Ds and CUEs, to reduce the outage probability of of mixed-integer non-convex programs. Despite many chal-
D2D links. Zhong et al. [32] have considered sum rate (SR) lenges in D2D communications in the uplink SCMA sys-
maximization by using game-theoretic resource allocation. tem, its large benefit motivates us to further investigate the
where p2c,kn and p2d,km are the transmit power of the n-th i.e.,
CUE and the m-th D2D-Tx, respectively. The channel vectors N
hcb,kn ∈ CNr ×1 and gdb,km ∈ CNr ×1 are associated to 1X
Rck (β) = ln 1 + βkn γk,n
c
c , 0)
(pmax
(nats/s/Hz), (3)
the links from the n-th CUE and from the m-th D2D-Tx to L
n=1
the BS, respectively. Let pc , pc,kn k∈K,n∈N and pd ,
pd,km k∈K,m∈M , while σkn2 denotes the power of the additive max
pc is the transmit power
where budget for CUEs, and β ,
white Gaussian noise (AWGN) at the BS. Herein, the inter- βkn k∈K,n∈N . Let β̃ ∈ {0, 1}J ×N be the assignment matrix,
ference from other CUEs is completely removed thanks to the whose entry is β̃jn = 1 (j ∈ J = {0, 1, . . . , J }) if the n-th
SCMA decoder at the BS. The SINR at the m-th D2D-Rx is CUE is assigned to the j-th codeword, and β̃jn = 0, otherwise.
given as It is clear that β is a function of β̃, i.e., β = Jc β̃ where
the matrix Jc ∈ {0, 1}K ×J stands for the codebook. Hence,
p2d,km |hdd,km |2 the codebook assignment problem can be expressed as
γk,m
d
(pc , pd = d , (2)
φkm pc , pd K
X
maximize Rck (β) (4a)
where hdd,km is the channel response between the m- β̃ k=1
th D2D-Tx and D2D-Rx. The
PN interference-plus-noise subject to β̃jn ∈ {0, 1}, j ∈ J, n ∈ N, (4b)
is given as φkm d p ,p
n=1 βkn pc,kn |gcd,knm | +
2 2
c d = N
PM
m0 =1,m0 6=m pd,km0 |gdd,km0 m | + σkm , where the predefined
2 2 2
X
β̃jn ≤ 1, j ∈ J, (4c)
constant βkn ∈ {0, 1} indicates whether the k-th element of n=1
the codeword is assigned to the n-th CUE or not. It can be XJ
seen that the interference components in (2) contain the given β̃jn = 1, n ∈ N . (4d)
assignment parameters βkn , which are not in (1). Though j=1
pc,kn can be dynamically optimized, its aggregation with βkn
makes it faster to find pc,kn since the binary values of βkn It can be seen that the cost function Rck (β) in (4) corresponds
are aware in the cellular network. Meanwhile, the similar to the total rate of all CUEs at the k-th resource. Meanwhile,
aggregation in (1) generates a complicated formulation, since the feasible region with respect to the assignment variables
the assignment between the m-th D2D and the k-th resource β̃jn represents a set of the matchings between the j-th code-
is undetermined. gcd,knm and gdd,km0 m denote the channel word and the n-th CUE. This implies that Rck (β) is determined
responses from the n-th CUE and from the m0 -th D2D-Tx via the row of β, only after collecting all assignment variables
(m0 ∈ M) to the m-th D2D-Rx, respectively. σkm 2 denotes the of β̃jn . In other words, the problem (4) has an objective func-
power of AWGN at the m-th D2D-Rx. tion with respect to β row-by-row, while β is derived from
the permutations of the columns in Jc through assignment
variable β̃. This is known as a non-linear assignment problem.
B. PROBLEM FORMULATION
In the literature, the total number of cases of β̃ is given as NJ ,
We consider the SR maximization in two separate stages. and thus, the global optimization in (4) is NP-hard.
The first stage is to maximize the SR of CUEs through an In the second stage, we aim to maximize the SR of D2D
assignment problem without D2D pairs, where N CUEs are pairs under the power control, the target SINRs of CUEs and
assigned to N codewords in the codebook. The second stage D2Ds, and D2D assignment constraints. From (2), the achiev-
aims to maximize the SR of D2D pairs subject to the target able rate for the m-th D2D using the k-th resource is given as
SINRs for CUEs in the cellular system. In fact, the SR for all
Rdk,m = ln 1 + γk,m
d
pc , pd
CUEs and D2Ds might be inconvenient and impractical. This (nats/s/Hz). (5)
is because the BS continuously serves CUEs while D2D com-
munication underlaying cellular operation temporarily occurs Then, the SR optimization problem can be formulated as
between two devices in the proximity condition. Therefore, K X
X M
the SR optimization problems for CUEs and D2Ds are usually maximize αkm Rdk,m , (6a)
α,pc ,pd
separate topics in the literature. k=1 m=1
With SCMA technique, the BS can decode the information subject to d,km ,
p2d,km ≤ Pmax k ∈ K, m ∈ M, (6b)
of all CUEs without mutual interference. This make the SR pd,km ≥ 0, k ∈ K, m ∈ M, (6c)
of CUEs depend only on the channels from CUEs to the
BS, which are different from one another due to the CUEs’ c,kn ,
p2c,kn ≤ Pmax k ∈ K, n ∈ N , (6d)
positions and occupied resources. Therefore, we can take pc,kn ≥ 0, k ∈ K, n ∈ N , (6e)
advantage of the best assignment between codebook and kα m k1 ≤ S, m ∈ M, (6f)
CUEs, no matter what the power allocation for CUEs is. If we αkm ∈ {0, 1}, k ∈ K, m ∈ M, (6g)
set the transmit power of CUEs to the maximum of the power
γk,m pc , pd ≥ αkm γ̄k,m , k ∈ K, m ∈ M, (6h)
d d
budget, then the achievable rate of the k-th sub-carrier for the
γk,n
c
pc , pd ≥ βkn γ̄k,n
c
, k ∈ K, n ∈ N ,
multiple access channel (MAC) is given as in [17] and [38], (6i)
J
where Pmax max
d,km and Pc,kn are the transmit power budgets of the
X
β̃jn = 1, n ∈ N, (9d)
m-th D2D and the n-th CUE for the k-th resource, respec-
j=1
tively. The variable αkm ∈ {0, 1} indicates whether the m-th
PK
D2D occupies the k-th resource (α km = 1) or not (αkm = 0). , k=1 ln NL +βkn γk,n
where R̃cn,6 (β n ) c (pmax , 0) represents
c
We define α m , [αkm ]k∈K , α , α m m∈M , while S (S ≤ K ) the per-user rate for the n-th CUE. Differently from (4),
denotes the maximum number of resources assigned to each the cost function R̃cn,6 (β n ) in (9) corresponding to the rate
D2D. γ̄k,m
d and γ̄ c stand for the per-resource target SINR for
k,n of the n-th user is independently determined, no matter what
the m-th D2D and the n-th CUE, respectively. Note that the the other users’ assignments are chosen, and thus, we get a
right-hand sides of constraints (6h) and (6i) are equal to zero cost matrix, C ∈ RJ ×N , of which each entry is computed as
if αkm and βkn are inactive, respectively. Since constraints (6f)
and (6g) contain binary variables and the objective function Cjn , R̃cn,6 (Jc β̄ j ), (10)
is non-concave, (6) is a mixed-integer non-convex problem. T
. . 0} 1 |0 .{z
with β̄ j = 0| .{z . . 0} corresponding to β̃jn = 1.
j−1 J −j
III. PROPOSED ALGORITHM FOR CODEBOOK
Here, Cjn denotes the total rate of the n-th user to which
ASSIGNMENT PROBLEM
the j-th codeword is assigned, and it can be computed in
It is clear that (4) is an integer programing problem, and the
advance. It is obvious that if β̃jn = 1, β̃j0 n = 0, ∀j0 6=
composition function Rck (β) in (4a) is the natural logarithm
j, due to constraints (9d). Therefore, R̃cn,6 (β n ) in (9a) can
of the summation of all users’ SINR, corresponding to the
be expressed as Jj=1 Cjn β̃jn , leading to a standard linear
P
entries on the k-th row of β as well as the k-th row of code-
book Jc . Meanwhile, the assignment variable β̃ indicates that program. Note that (4) and (9) have the same feasible region,
one CUE is matched to a codebook, represented as a column and thus an arbitrary point is either feasible or infeasible
of Jc . With brute-force search, it takes O(J !) which might to both problems. Accordingly, we can efficiently solve the
be infeasible in real communication systems. In this section, linear problem (9) instead of the non-linear problem (4).
we propose a method to efficiently solve the problem (4) with To solve (9),we consider the following problem. We define
the polynomial complexity. We first consider the following G , J , N ; E to be a complete bipartite graph, in which J
lemma. and N stand for two vertex sets, representing the codewords
Lemma 1: By using Jensen’s inequality, the lower bound of the codebook and CUEs, respectively. E denotes the set of
of Rck (β) is expressed as all edges with the weights given as the matrix C. We consider
a maximum weighted bipartite matching (MWBM) problem,
N
N 1 X L where a matching M ⊆ E needs to be found such that
Rck (β) ≥ ln + ln + βkn γk,n
c
c , 0) .
(pmax (7)
L N N 1) The size of M is the largest.
n=1
2) M contains the edges without common vertices.
3) The sum of weights of the edges in M is a maximal
Proof: See Appendix A. value.
By using Lemma 1, the objective function (4a) is lower
Let ejn ∈ E be an assignment from the j-th codeword to the
bounded as
n-th CUE. Consider that ejn ∈ M iff β̃jn = 1 and ejn ∈ / M
K K N
X 1 XX L iff β̃jn = 0, as constraints (9b). In this regard, the first
Rck (β) ≥ ln + βkn γk,n
c
(pmax
c , 0)
N N two conditions of the MWBM problem are equivalent to the
k=1 k=1 n=1
constraints (9c) and (9d), while the last condition corresponds
K
X N to the objective function (9a). Therefore, the problem (9)
+ ln . (8)
L is considered as the MWBM problem. The Kuhn-Munkres
k=1
algorithm is applied to efficiently find the optimal solution
Based on the concavity of the logarithm function, the maxi- for this problem [39], which is summarized in Algorithm 1.
mization for the right-hand side of (8) provides at least a local Remark 1: We can also apply an algorithm based on GS
maximum for the left-hand side. Since N1 and ln NL are con- to solve problem (9), in which all codewords are successively
stant, we can omit them in the optimization problem without matched to the first CUE, and thus the first CUE is simply
altering the optimal solution. Let β n be the n-th column of β, assigned to the codeword that provides the best rate. Then,
then the objective function of (4) is lower bounded by that of the codeword assigned to the second CUE is selected among
the following problem. the codewords in the rest of codebook, such that the rate of
N
X the second CUE is maximized, and so on. Although the GS
maximize R̃cn,6 (β n ) (9a) method does not devise an optimal solution for problem (9)
β̃ n=1 as compared to the MWBM method, it provides a suboptimal
subject to β̃jn ∈ {0, 1}, j ∈ J, n ∈ N, (9b) solution with a lower complexity computation.
In particular,
N
X it takes O N KL , as compared to O N 2 KL in the MWBM
β̃jn ≤ 1, j ∈ J, (9c) problem. Note that the GS method cannot be directly applied
n=1 to the original problem (4), since this scheme is to maximize
Algorithm 1 Proposed Algorithm Based on MWBM for the solve (6) is expressed as
Codebook Assignment Problem (4)
K X
M
1: Compute the cost matrix C as in (10). (κ+1)
X d,(κ)
2: Let J and N be the sets of codewords (columns in the
maximize R̃6 , αkm R̃k,m , (15a)
α,pc ,pd
k=1 m=1
codebook) and CUEs, respectively. Let E be the set of
subject to (6b) − (6i). (15b)
edges with the weights given by C.
3: Establish the MWBM problem on a graph G = d,(κ)
It is clear that R̃k,m is a concave function, and thus at the
J , N ; E as in (9). optimum, we obtain the equality as
4: Apply Kuhn-Munkres algorithm to find the optimal solu-
∗
tion β̃ for (9), which provides the lower bound of SR d,(κ)
Rdk,m = R̃k,m . (16)
given by (9a).
∗
5: The effective SR is obtained by applying β̃ to the objec- However, the problems in (15) are still mixed-integer non-
∗
tive function (4a) as β = Jc β̃ . convex since the binary variables α are involved in the objec-
tive function and constraints. Here, the integer constraints are
related to the assignment variable α, while the variables pc
and pd are responsible for the continuous domain. Therefore,
the per-user rate by selecting a vacant codeword. Meanwhile,
we next handle the integer variables by using the following
the per-resource rate in (4a) is obtained only when all CUEs
lemma.
are assigned to codewords in priority.
Lemma 2: At the convergence of the program in (15),
we suppose that the optimal point for problem (6) is given
IV. PROPOSED ALGORITHM FOR D2D SUM RATE
as X∗ = {α ∗ , p∗c , p∗d }. If we obtain an arbitrary assignment
MAXIMIZATION PROBLEM
variable αk∗0 m0 = 0, ∀k 0 ∈ K, ∀m0 ∈ M, then p∗d,k 0 m0 = 0.
A. TWO-PHASE ITERATIVE ALGORITHM BASED ON
HEURISTIC SEARCH
Proof: See Appendix B.
It can be seen that (6) is a mixed-integer non-convex problem. Remark 2: From Lemma 2, it is realized that p∗d,km > 0,
This is because the objective function and constraints (6h)- αkm must be active to obtain the optimum. On the other hand,
∗
(6i) are non-convex, while (6f) and (6g) are the integer con- when p∗d,km = 0, Rdk,m = 0 regardless of αkm ∗ . However, α ∗
km
straints. In the rest of the paper, we introduce the approach should be set to 0, representing that the m-th D2D is inactive
of a joint heuristic algorithm and an inner approximation as p∗d,km = 0. In other words, the optimal values of α are
method to efficiently solve the problem. strongly associated with those of pd , so that α ∗ can be derived
Let us handle Rdk,m in the objective function. We consider via p∗d .
the logarithm function as g(x) = ln 1 + 1/x , x > 0. Now, the program (15) can be executed by omitting α as
As in [40], g(x) is convex for x > 0, since its Hessian is a follows. By exploiting the relationship between α and pd from
positive-define matrix. Then, the concave minorant of g(x) is Lemma 2 and Remark 2, we fix the values of α to 1, and then
given as the program (15) becomes
Algorithm
(κ+1)3 Proposed Algorithm
(κ+1) Based on Binary Search to Algorithm 4 Proposed Iterative Algorithm Based on GS for
Find δm and 1m
the D2D SR Maximization Problem (6)
(κ+1)
1: Input: pd , S, and ε := 10−3 . 1: Initialization: Set ε := 10−3 , α ∗ = 0 and R̃6 := −∞.
2: for m ∈ M do 2: for m ∈ M do
3: Set δmax := 1, and δmin := 0. 3: Set isAdded := 0 and α := α ∗ .
4: while (δmax − δmin > ε) do 4: for v ∈ Sα do
Set δ := δmax +δ
(κ+1)
5: 2
min
and 1 := δmax{pd,km }. 5:
(0)
Set α m := v, κ := 0, R̃6,2 := −∞ and randomly
k∈K (0) (0)
6: Calculate Km 0 by replacing 1 (κ)
m with 1 in (19).
choose an initial point pc , pd .
0 | < (K − S) then Update the sets Km 0 , {k ∈ K|α
7: if |Km 6: km = 0} instead
8: δmin := δ. of (19).
9: else 7: repeat
Solve (21) to obtain R̃6,2 , and p?c , p?d .
(κ+1)
10: δmax := δ. 8:
:= p?c and pd := p?d .
(κ+1) (κ+1)
11: end if 9: Update pc
12: end while 10: Set κ := κ + 1.
(κ+1) (κ+1) (κ) (κ−1)
13: Set δm := δ and 1m := 1. 11: until R̃6,2 − R̃6,2 < ε.
end for (κ)
if R̃6,2 > R̃6 or isAdded = 0 then
14: 12:
(κ+1) (κ+1)
15: Output: δm and 1m . (κ)
13: Set isAdded := 1 and R̃6 := R̃6,2 .
(κ) (κ)
Update α ∗ := α and p∗c , p∗d := pc , pd .
14:
15: end if
constraints. The number of constraints in (18) and (21) are 16: end for
determined by c1 = 3K (N + M ) and c2 = 3KN + (2K + 17: end for
S)M , respectively. Two programs have the same number of Output: The solution α ∗ , p∗c , p∗d ; The corresponding
18:
variables, denoted by υ = K (N + M ). As in [42], the com- achievable rate is given by R̃6 .
plexities of (18) and (21) are given as O(c2.5 2
1 (υ + c1 )) and
2.5 2
O(c2 (υ + c2 )), respectively.
v ∈ Sα , {v ∈ {0, 1}K ×1 |card(v) = S} and assign v to
α m . Then, α m is used to maximize the total rate of added
B. CONVERGENCE RATE AND COMPLEXITY
D2Ds by solving the program (21) as in Algorithm 2. The
IMPROVEMENT
pattern of resource allocation α m that provides the best total
To relieve the complexity, at Step 6 of the first phase in
rate is assigned to the corresponding D2D, and the algorithm
Algorithm 2, we apply a binary search to find the values of
(κ) (κ) considers the next D2D pair. Algorithm 4 summarizes the
δm as well as 1m ; and then the sets of Km 0 are determined
proposed method based on GS.
to solve problem (21) in the next phase. Algorithm 3 briefly
summarizes the binary search method. The convergence rate V. NUMERICAL RESULTS
of Algorithm 2 is further boosted by considering the follow- To evaluate the performance of the proposed algorithm,
ing lemma. we consider an SCMA-enabled cellular network with 6 uplink
(κ) (κ)
Lemma 3: Suppose that s∗1 = (pc , pd ) is the optimal CUEs randomly placed within a 100-meter radius from the
(κ) (κ)
solution obtained in (18). Then, s∗2 = (pc , p̃d ), where BS at the center of the cell. An underlaid D2D system consists
(κ) (κ)
p̃d is generated by forcing some elements of pd to zeros, of M D2Ds, sharing K = 4 resources with CUEs. Each D2Ds
is called the heuristic pattern solution of s1 . s∗2 is also a
∗
can be assigned to S = L = 2 resources by mapping to
feasible point of (21). a codeword in the codebook used for SCMA scheme. The
Proof: See Appendix C. information channel vectors for√ the link from CUEs and D2D
By applying Lemma 3, at Step 11 in Algorithm 2, we do to BS are generated as h = 10−PLU,BS /10 ĥ, where h ∈
not have to reset κ and randomly generate the initial point {hcb,kn , gdb,km } corresponds to the communication links from
(0) (0) (κ) (κ)
pc , pd . Instead, pc , pd obtained by solving (18) is U ∈ {Cn , Dm } to the BS at the distance dU,BS in kilometer.
used as the initial feasible point to solve (21). Here, the path loss (PL) model, PLU,BS , represents the large-
scale fading, and the entries of ĥ ∼ CN (0, 1) stand for
C. ACHIEVABLE RATE IMPROVEMENT the small-scale fading. Similarly, the channel responses from
Although the HS-based algorithm provides a low-complexity, D2D-Tx√ to D2D-Rx and from CUEs to D2D-Rx are set as
there exists rate loss as compared to the optimal value. g = 10−PLU,U /10 ĝ, where g ∈ {hdd,km , gcd,knm , gdd,km0 m },
Therefore, we further propose a method based on GS for and PLU,U is the PL with the distance dU,U (in kilometer) and
resource allocation, while using the same power alloca- the entries ĝ ∼ CN (0, 1). According to [43], the other param-
tion algorithm. To do this, we successively consider the eters are tabulated in Table 1. In all figures, the achievable
D2Ds one-by-one. For the m-th additional D2D to the rates of CUEs and D2Ds in the whole K resources are divided
system, the algorithm executes a loop to pick a vector by ln 2, to be presented in bps/Hz.
tive SRs when using random and exhaustive search methods we compare the proposed HS- and GS-based methods (as in
are obtained by directly applying the solutions to (3). For Algorithms 2 and 4, respectively) with the other two schemes
the MWBM and GS methods, we have to find their solutions for the resource allocation as follows.
via the lower bound as in (9), and then apply the optimized • Random scheme, where α m , ∀m ∈ M are randomly
solutions to (3). The MWBM provides better performance assigned to a vector v ∈ Sα .
than GS in terms of both the lower bound and effective SR; • Exhaustive search scheme, where all combinations gen-
in particular, the gap between MWBM and GS rises along erated by choosing α m ∈ Sα , ∀m ∈ M, are considered.
and inner approximation methods. To further improve the As in (2), we obtain γk,m d (p∗ , p̃ ) < γ d (p∗ , p∗ ) for
c d k,m c d
convergence, we have investigated the binary search algo- (k, m) 6 = (k , m ). In fact, since p̃d,k 0 m0 > p∗d,k 0 m0 =
0 0
are equivalent to (18c), (6i), (6b), and (6c) in problem (18), [15] H. Nikopour and H. Baligh, ‘‘Sparse code multiple access,’’ in Proc.
respectively. This means that all values of pd,km with αkm = 1 IEEE Annu. Int. Symp. Pers. Indoor Mobile Radio Commun. (PIMRC),
Sep. 2013, pp. 332–336.
make (21b)-(21d) hold. [16] F. Wei and W. Chen, ‘‘Low complexity iterative receiver design for
When αkm = 0, k ∈ Km 0 , s∗ ∈ F only if p
2 2 d,km satisfies sparse code multiple access,’’ IEEE Trans. Commun., vol. 65, no. 2,
constraints (6h), (6i), and (21e). First, Lemma 2 indicates pp. 621–634, Feb. 2017.
[17] Z. Yang, J. Cui, X. Lei, Z. Ding, P. Fan, and D. Chen, ‘‘Impact of factor
that pd,km = 0, so that the constraint (21e) holds. We need graph on average sum rate for uplink sparse code multiple access systems,’’
to show that constraints (6h) and (6i) also hold. Obviously, IEEE Access, vol. 4, pp. 6585–6590, 2016.
constraints (6h) and (6i) related to αkm = 0 become [18] G. Araniti, C. Campolo, M. Condoluci, A. Iera, and A. Molinaro, ‘‘LTE
for vehicular networking: A survey,’’ IEEE Commun. Mag., vol. 51, no. 5,
γk,m
d
s∗2 |pd,km = 0 ≥ 0, m ∈ M, k ∈ Km 0
,
(28) pp. 148–157, May 2013.
[19] D. Feng, L. Lu, Y. Yuan-Wu, G. Li, S. Li, and G. Feng, ‘‘Device-to-device
γk,n s2 |pd,km = 0 ≥ βkn γ̄k,n , k ∈ K, n ∈ N . (29)
c ∗ c
communications in cellular networks,’’ IEEE Commun. Mag., vol. 52,
no. 4, pp. 49–55, Apr. 2014.
From (2), we have γk,m d s∗ |p
2 d,km = 0 = 0 as constraint (28) [20] Technical Specification Group SA; Study on Architecture Enhancements to
(κ) (κ)
hold. Since pd p̃d , the denominator of γk,n c s∗ resulting Support Proximity Services (ProSe) (Release 12), document 23.703 V2.0.0,
1 3GPP, Mar. 2014.
from (2) is larger than that of γk,n c s∗ |p
2 d,km = 0 , leading to [21] K. Zheng, Q. Zheng, P. Chatzimisios, W. Xiang, and Y. Zhou, ‘‘Hetero-
γk,n 2 d,km = 0 ≥ γk,n s1 . Moreover, γk,n s1 ≥ βkn γ̄k,n
c s∗ |p c ∗ c ∗ c geneous vehicular networking: A survey on architecture, challenges, and
solutions,’’ IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2377–2396,
holds due to s1 ∈ F1 . They demonstrate that γk,n s2 |pd,km =
∗ c ∗
4th Quart., 2015.
0 ≥ βkn γ̄k,nc , as constraint (29) hold.
[22] IEEE Guide for Wireless Access in Vehicular Environments (WAVE)—
(κ) Architecture, IEEE Standard 1609.0-2013, 2016.
In summary, for both cases of αkm , p̃d satisfy all corre- [23] K. Abboud, H. A. Omar, and W. Zhuang, ‘‘Interworking of DSRC and
sponding constraints and s∗2 ∈ F2 . cellular network technologies for V2X communications: A survey,’’ IEEE
Trans. Veh. Technol., vol. 65, no. 12, pp. 9457–9470, Dec. 2016.
[24] Evolved Universal Terrestrial Radio Access (e-Utra) and Evolved
REFERENCES
Universal Terrestrial Radio Access Network (e-Utran); Overall
[1] M. R. Palattella et al., ‘‘Internet of Things in the 5G era: Enablers, archi- Description; Stage 2 (v14.3.0, Release 14), document 3GPP 36.300,
tecture, and business models,’’ IEEE J. Sel. Areas Commun., vol. 34, no. 3, Jun. 2016.
pp. 510–527, Mar. 2016. [25] R. Molina-Masegosa and J. Gozalvez, ‘‘LTE-V for sidelink 5G V2X
[2] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, vehicular communications: A new 5G technology for short-range vehicle-
‘‘Internet of Things: A survey on enabling technologies, protocols, and to-everything communications,’’ IEEE Veh. Technol. Mag., vol. 12, no. 4,
applications,’’ IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2347–2376, pp. 30–39, Dec. 2017.
4th Quart., 2015. [26] Q. Wei, L. Wang, Z. Feng, and Z. Ding, ‘‘Wireless resource management
[3] C. Perera, C. H. Liu, and S. Jayawardena, ‘‘The emerging Internet of in LTE-U driven heterogeneous V2X communication networks,’’ IEEE
Things marketplace from an industrial perspective: A survey,’’ IEEE Trans. Trans. Veh. Technol., vol. 67, no. 8, pp. 7508–7522, Aug. 2018.
Emerg. Topics Comput., vol. 3, no. 4, pp. 585–598, Dec. 2015.
[27] M. N. Tehrani, M. Uysal, and H. Yanikomeroglu, ‘‘Device-to-device
[4] E. Hossain and M. Hasan, ‘‘5G cellular: Key enabling technologies
communication in 5G cellular networks: Challenges, solutions, and
and research challenges,’’ IEEE Instrum. Meas. Mag., vol. 18, no. 3,
future directions,’’ IEEE Commun. Mag., vol. 52, no. 5, pp. 86–92,
pp. 11–21, Jun. 2015.
May 2014.
[5] H. S. Dhillon, H. Huang, and H. Viswanathan, ‘‘Wide-area wireless com-
[28] B. Antonescu, M. T. Moayyed, and S. Basagni, ‘‘mmWave channel prop-
munication challenges for the Internet of Things,’’ IEEE Commun. Mag.,
agation modeling for V2X communication systems,’’ in Proc. IEEE Annu.
vol. 55, no. 2, pp. 168–174, Feb. 2017.
Int. Symp. Pers., Indoor, Mobile Radio Commun. (PIMRC), Oct. 2017,
[6] A. Damnjanovic et al., ‘‘A survey on 3GPP heterogeneous networks,’’
pp. 1–6. doi: 10.1109/PIMRC.2017.8292718.
IEEE Wireless Commun., vol. 18, no. 3, pp. 10–21, Jun. 2011.
[29] P. Phunchongharn, E. Hossain, and D. I. Kim, ‘‘Resource allocation for
[7] M. Siekkinen, M. Hiienkari, J. K. Nurminen, and J. Nieminen, ‘‘How
device-to-device communications underlaying LTE-advanced networks,’’
low energy is Bluetooth low energy? Comparative measurements with
IEEE Wireless Commun., vol. 20, no. 4, pp. 91–100, Aug. 2013.
ZigBee/802.15.4,’’ in Proc. IEEE Wireless Commun. Netw. Conf. Work-
shops (WCNCW), Apr. 2012, pp. 232–237. [30] H. V. Nguyen, Q. Duong, V.-D. Nguyen, Y. Shin, and O.-S. Shin, ‘‘Opti-
[8] C. Gomez, J. Oller, and J. Paradells, ‘‘Overview and evaluation of blue- mization of resource allocation for underlay device-to-device commu-
tooth low energy: An emerging low-power wireless technology,’’ Sensors, nications in cellular networks,’’ Peer-Peer Netw. Appl., vol. 9, no. 5,
vol. 12, no. 9, pp. 11734–11753, 2012. pp. 965–977, Sep. 2016.
[9] ‘‘The need for low cost, high reach, wide area connectivity for the Inter- [31] H. V. Nguyen, Q. Duong, and O. S. Shin, ‘‘Resource allocation optimiza-
net of Things: A mobile network operator’s perspective,’’ Machina Res., tion for device-to-device communications in cellular networks,’’ in Proc.
London, U.K., White Paper, 2014. Int. Conf. Inf. Commun. Technol. Converg. (ICTC), Oct. 2014, pp. 377–378.
[10] S. Rangan, T. S. Rappaport, and E. Erkip, ‘‘Millimeter-wave cellular [32] W. Zhong, Y. Fang, S. Jin, K.-K. Wong, S. Zhong, and Z. Qian, ‘‘Joint
wireless networks: Potentials and challenges,’’ Proc. IEEE, vol. 102, no. 3, resource allocation for device-to-device communications underlaying
pp. 366–385, Mar. 2014. uplink MIMO cellular networks,’’ IEEE J. Sel. Areas Commun., vol. 33,
[11] L. Dai, B. Wang, Y. Yuan, S. Han, C.-L. I, and Z. Wang, no. 1, pp. 41–54, Jan. 2015.
‘‘Non-orthogonal multiple access for 5G: Solutions, challenges, [33] W. Zhao and S. Wang, ‘‘Resource sharing scheme for device-to-device
opportunities, and future research trends,’’ IEEE Commun. Mag., communication underlaying cellular networks,’’ IEEE Trans. Commun.,
vol. 53, no. 9, pp. 74–81, Sep. 2015. vol. 63, no. 12, pp. 4838–4848, Oct. 2015.
[12] S. M. R. Islam, N. Avazov, O. A. Dobre, and K.-S. Kwak, ‘‘Power-domain [34] T. D. Hoang, L. B. Le, and T. Le-Ngoc, ‘‘Resource allocation for D2D com-
non-orthogonal multiple access (NOMA) in 5G systems: Potentials and munications under proportional fairness,’’ in Proc. IEEE Global Commun.
challenges,’’ IEEE Commun. Surveys Tuts., vol. 19, no. 2, pp. 721–742, Conf. (GLOBECOM), Dec. 2014, pp. 1–6.
2nd Quart., 2017. [35] Y. Dai, M. Sheng, K. Zhao, L. Liu, J. Liu, and J. Li, ‘‘Interference-
[13] L. Song, Y. Li, Z. Ding, and H. V. Poor, ‘‘Resource management in non- aware resource allocation for D2D underlaid cellular network using
orthogonal multiple access networks for 5G and beyond,’’ IEEE Netw., SCMA: A hypergraph approach,’’ in Proc. IEEE Wireless Commun. Netw.
vol. 31, no. 4, pp. 8–14, Jul. 2017. Conf. (WCNC), Apr. 2016, pp. 1–6.
[14] Y. Cai, Z. Qin, F. Cui, G. Y. Li, and J. A. McCann, ‘‘Modulation and [36] J. Liu, M. Sheng, L. Liu, Y. Shi, and J. Li, ‘‘Modeling and analysis of
multiple access for 5G networks,’’ IEEE Commun. Surveys Tuts., vol. 20, SCMA enhanced D2D and cellular hybrid network,’’ IEEE Trans. Com-
no. 1, pp. 629–646, 1st Quart., 2018. mun., vol. 65, no. 1, pp. 173–185, Jan. 2017.
[37] Y. Li, M. Sheng, Y. Zhu, T. Jiang, and J. Li, ‘‘Sum rate maximization GIL-MO KANG received the B.S. and M.S.
in underlay SCMA device-to-device networks,’’ in Proc. IEEE Global degrees in electronic engineering from Soongsil
Commun. Conf. (GLOBECOM), Dec. 2016, pp. 1–6. doi: 10.1109/GLO- University, Seoul, South Korea, in 2013 and 2015,
COM.2016.7842305. respectively, where he is currently pursuing the
[38] M. Al-Imari, M. A. Imran, R. Tafazolli, and D. Chen, ‘‘Subcarrier and Ph.D. degree with the Department of ICMC Con-
power allocation for LDS-OFDM system,’’ in Proc. IEEE Veh. Technol. vergence Technology.
Conf. (VTC), Budapest, Hungary, May 2011, pp. 1–5. Since 2013, he has been with the Wireless
[39] H. W. Kuhn, The Hungarian Method for the Assignment Problem. Berlin,
Communication Laboratory, Soonsgil University.
Germany: Springer, 2010.
In 2016, he received the Global Ph.D. Fellows
[40] H. V. Nguyen, V.-D. Nguyen, O. A. Dobre, and O.-S. Shin, ‘‘Sum rate max-
imization based on sub-array antenna selection in a full-duplex system,’’ Scholarship from the National Research Founda-
in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2017, pp. 1–6. tion of Korea, during the period of 2016–2019. His research interests include
doi: 10.1109/GLOCOM.2017.8254806. wireless communications, with particular focus on device-to-device commu-
[41] E. J. Candès, M. B. Wakin, and S. P. Boyd, ‘‘Enhancing sparsity by nications, beamforming, 5G systems, and V2X communications.
reweighted `1 minimization,’’ J. Fourier Anal. Appl., vol. 14, nos. 5–6,
pp. 877–905, 2008.
[42] D. Peaucelle, D. Henrion, Y. Labit, and K. Taitz, ‘‘User’s guide for SeDuMi
interface 1.04,’’ in Proc. LAAS-CNRS, Toulouse, France, Jun. 2002, YOAN SHIN received the B.S. and M.S. degrees
pp. 1–36. in electronics engineering from Seoul National
[43] Evolved Universal Terrestrial Radio Access (E-UTRA): Further Advance- University, Seoul, South Korea, in 1987 and 1989,
ments for E-UTRA Physical Layer Aspects (Release 9), document 3GPP respectively, and the Ph.D. degree in electrical
TS 36.814 V9.0.0, 3GPP Technical Specification Group Radio Access and computer engineering from The University of
Network, 2010. Texas at Austin, in 1992.
From 1992 to 1994, he was with Microelec-
tronics and Computer Technology Corporation,
Austin, TX, USA, as a Member of Technical Staff.
Since 1994, he has been with the School of Elec-
HYEON MIN KIM received the B.S. degree in tronic Engineering, Soongsil University, Seoul, where he is currently a Pro-
electronic engineering from Soongsil University, fessor. From 2009 to 2010, he was a Visiting Professor with the Department
Seoul, South Korea, in 2012, where he is currently of Electrical and Computer Engineering, The University of British Columbia,
pursuing the joint master’s and Ph.D. degree with Vancouver, BC, Canada. His research interests include magnetic induction
the Department of ICMC Convergence Technol- communication, localization, and compressive sensing. He has been serving
ogy. as an Organizing/Technical Committee Member for various prominent inter-
Since 2012, he has been with the Wireless Com- national conferences, including VTC 2003, ISITA 2006, ISPLC 2008, APCC
munications Laboratory, Soongsil University. His 2008, ISIT 2009, APWCS 2009, APWCS 2010, APCC 2010, ICTC 2010,
research interests include wireless communica- APWCS 2011, ICTC 2011, ISAP 2011, APWCS 2012, and APCC 2012.
tions, with particular focus on device-to-device In particular, he was the Technical Program Committee Chair of APWCS
communications, 5G systems, and signal processing. 2013 and the General Co-Chair of APWCS 2014 and APWCS 2015.
HIEU V. NGUYEN received the B.S. degree OH-SOON SHIN received the B.S., M.S., and
in electronics and telecommunications from the Ph.D. degrees in electrical engineering and com-
Danang University of Science and Technology, puter science from Seoul National University,
Danang, Vietnam, in 2011, and the M.S. degree Seoul, South Korea, in 1998, 2000, and 2004,
in electronic engineering from Soongsil Univer- respectively.
sity, South Korea, in 2016, where he is currently From 2004 to 2005, he was with the Division of
pursuing the Ph.D. degree with the Department of Engineering and Applied Sciences, Harvard Uni-
Information and Telecommunication Engineering. versity, Cambridge, MA, USA, as a Postdoctoral
From 2011 to 2013, he was with the Danang Fellow. From 2006 to 2007, he was a Senior Engi-
University of Science and Technology, as an Assis- neer with Samsung Electronics, Suwon, South
tant Researcher and a Lecturer. Since 2014, he has been with the Wireless Korea. In 2007, he joined the School of Electronic Engineering, Soongsil
Communications Laboratory, Soongsil University. His research interests University, Seoul, where he is currently a Professor. His research interests
include wireless communications, with particular focus on optimization tech- include communication theory, wireless communication systems, and signal
niques, device-to-device communications, 5G systems, energy harvesting, processing for communication.
beamforming design, and cognitive radio.