You are on page 1of 13

SPECIAL SECTION ON D2D COMMUNICATIONS: SECURITY

ISSUES AND RESOURCE ALLOCATION

Received January 11, 2019, accepted January 17, 2019, date of publication February 18, 2019, date of current version February 27, 2019.
Digital Object Identifier 10.1109/ACCESS.2019.2896582

Device-to-Device Communications Underlaying


an Uplink SCMA System
HYEON MIN KIM 1 , HIEU V. NGUYEN2 , GIL-MO KANG1 , (Student Member, IEEE),
YOAN SHIN 2 , (Senior Member, IEEE), AND OH-SOON SHIN 1,2 , (Member, IEEE)
1 Department of ICMC Convergence Technology, Soongsil University, Seoul 06978, South Korea
2 School of Electronic Engineering, Soongsil University, Seoul 06978, South Korea
Corresponding author: Oh-Soon Shin (osshin@ssu.ac.kr)
This work was supported by Institute for Information and Communications Technology Promotion (IITP) grant funded by the Korean
Government (MSIT) (No. 2017-0-00724, Development of Beyond 5G Mobile Communication Technologies (Ultra-Reliable, Low-Latency,
and Massive Connectivity) and Combined Access Technologies for Cellular-based Industrial Automation Systems).

ABSTRACT Device-to-device (D2D) communication has been a potential solution to improve spectral
efficiency of cellular systems due to frequency resource sharing. This paper considers D2D communications
underlaying an uplink cellular system enabling sparse code multiple access (SCMA) technology, where
the base station (BS) can decode the signals of cellular users without mutual interference. The demands
for high data rate as well as low latency in massive connectivity is the main challenging requirement in
D2D communications, along with ensuring the quality of service (QoS) for the on-running cellular user
equipment (CUEs). To tackle the problem, the BS is designed to first assigns the codewords in a codebook to
CUEs based on the lower bound of the achievable CUE rates, so that the sum rate (SR) of CUEs is maximized.
With the usage of mutual-interference suppression in the SCMA-enabled system, the BS then attempts to
maximize the SR of D2Ds in a transmission block through a joint power and resource allocation subject
to the QoS requirements for both CUEs and D2Ds. This task is formulated as a mixed-integer non-convex
programming. We propose a low-complexity two-phase algorithm of joint heuristic and inner approximation
method to efficiently solve the problem. The numerical results verify that the codebook assignment problem
based on the lower bound of SR is easily solved, and the proposed algorithm to maximize the SR of D2Ds
outperforms existing methods.

INDEX TERMS Device-to-device (D2D), heuristic search, inner approximation, power allocation, resource
allocation, sparse code multiple access (SCMA), spectral efficiency.

I. INTRODUCTION small base stations (BSs) and the exploitation of various


The explosive number of Internet of Things (IoT) devices and new frequencies. First, the miniaturization of communication
users with massive connectivity as well as the variety of appli- networks could increase the data rate of many devices and
cations, i.e., smart farms, smart factories, and autonomous distribute the network traffic load, due to a sufficient number
vehicles have put pressure on future wireless communica- of small cells, i.e., femtocells and picocells, which support
tions [1]–[3]. In fact, the increase in IoT devices results in the reuse of frequency resources [6]. However, the expensive
scarce radio resources, while the frequency reuse may cause cost for infrastructure and interference among small BSs
dense interference among devices. In addition, the demand is an obstacle to realize small cells. Second, the IEEE has
for high-speed data traffic is uninterruptedly growing day- supported the use of 5.8GHz frequency band as a solution for
by-day. As a result, it is necessary to develop new mobile the near future to resolve the problem of saturation in 2.4GHz,
communication technologies [4], [5]. on which Wi-Fi, Bluetooth and ZigBee operate [7]–[9].
In the last decade, the research on wireless communica- Moreover, IEEE 802.11ac/ad with mmWave band is the
tions has focused on a few perspectives, e.g., the use of forthcoming standard. However, Wi-Fi is difficult to support
mobility, Bluetooth technology supports limited connection
The associate editor coordinating the review of this manuscript and distance, and ZigBee provides low data rate. Meanwhile,
approving it for publication was Mauro Fadda. the mmWave band suffers from strong attenuation when

2169-3536
2019 IEEE. Translations and content mining are permitted for academic research only.
21756 Personal use is also permitted, but republication/redistribution requires IEEE permission. VOLUME 7, 2019
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
H. M. Kim et al.: D2D Communications Underlaying an Uplink SCMA System

encountering pullbacks [10]. Therefore, substantial attention Reference [33] has considered the SR of D2Ds subject to
has recently turned into developing a new multiple access rate requirements for CUEs. However, when the numbers of
method. CUEs and D2Ds increase, the strong interference between
The non-orthogonal multiple access (NOMA) technol- D2Ds and CUEs degrades the system performance in terms
ogy, where the mutual interference is manageable and the of both the complexity and data rate. In [34], a weighted SR
non-orthogonal frequency resources are allocated to the maximization has been proposed with consideration of the
users [11], has been proposed as a promising solution to effi- proportional fairness among D2D links. Wei et al. [26] con-
ciently utilize the limited frequency resources. Two main cat- sidered the SR maximization for all CUEs and V2Xs, where
egories of NOMA, i.e., power domain NOMA (PD-NOMA) power allocation and resource assignment are handled in
and code domain NOMA (CD-NOMA), have attracted a separate steps. Although the algorithm of maximum weighted
lot of attention [12], [13]. The PD-NOMA is more suit- matching on bipartite graph provided low complexity, V2Xs
able for exploiting channel condition, while the CD-NOMA were matched to resources by one-by-one assignments, which
utilizes spreading gain for resource allocation [14]. In the cannot be extended to an SCMA scheme with several orthog-
CD-NOMA literature, many recent attempts have involved onal frequency division multiple access (OFDMA) tones per
sparse code multiple access (SCMA), featuring the mixture SCMA layer.
of quadrature amplitude modulation (QAM) symbol map- In very recent works, SCMA-assisted D2D communica-
ping and spreading, which has been proposed to enhance tions, where D2Ds can share several OFDMA tones with
the sum spectral efficiency (SE) [15]–[17]. With the SCMA CUEs served by an SCMA-enabled system, have been
technique, the transmitted information of a user mapped to a actively studied to further improve the SE [35]–[37]. Such
multidimensional complex codeword is decoded at the BS. model, also known as a hybrid network, can take advantage
Subsequently, SCMA allows improving spectral efficiency of SCMA as follows: (i) The mutual interference between
due to resource sharing among multiple users. CUEs can be completely eliminated; (ii) It allows to exploit
Device-to-device (D2D) communication, where two multiple resources for D2Ds, i.e., codeword with several
devices are allowed to directly communicate with each resources assigned. Accordingly, those relevant works have
other, has recently attracted much interest, due to its widely attracted attention to a further development of both CUEs
prospective applications in next-generation wireless systems and D2Ds. In [35], a graph-based method was proposed
[18]–[21]. Many recent works have investigated resource to improve the total rate of D2Ds and CUEs in the whole
sharing among D2Ds and cellular user equipment (CUEs), network. Nevertheless, this approach cannot simultaneously
in which the same resources are allocated to D2Ds as well manage the power control, since the matching criteria require
as CUEs. As an extension of D2D communications, a lot of the transmit power to be predefined. To further enhance
vehicle-to-everything (V2X) categories, such as vehicle-to- SR, the hybrid network was investigated in [36] and [37],
vehicle (V2V), vehicle-to-infrastructure (V2I), and vehicle- with both resource and power allocation taken into account.
to-network (V2N), have been considered to improve traffic However, these designs primarily focused on the resource
safety and SE [22], [23]. In Long-Term Evolution (LTE) and assignment at first, while the transmit power for D2Ds was
LTE-Advanced (LTE-A), the LTE-Vehicle (LTE-V) and LTE- uniformly allocated in [36] or derived under the condition
Unlicensed (LTE-U) standards were developed in [24]–[26]. of optimized resource assignment in the prior stage [37].
Although D2D communication is a promising candidate for Therefore, a joint optimization for both resource and power
IoT networks with numerous devices, the main challenge is allocation is still open, and it will be a promising tool to
the mutual interference among CUEs and D2Ds. Therefore, enhance the system performance.
proper control of interference among CUEs and D2Ds is
required to guarantee the QoS of both CUEs and D2Ds. B. MOTIVATION AND CONTRIBUTION
Since interference management between D2Ds and CUEs in Even when the preceding researches provide a continuous
downlink transmission is difficult, most of the existing studies renovation for the evolution path towards next-generation
on D2D communication have focused on resource sharing in network, there still remain some critical challenges in D2D
uplink transmission (spectrum in FDD, sub-frame in TDD). communications underlaying an SCMA system. In partic-
However, bandwidth bottleneck with dense devices is still a ular, the network throughput, i.e., the summation of CUE
challenging problem [27], [28]. and D2D rates, is usually considered as the objective func-
tion, which causes complicated computation for resource
A. RELATED WORKS allocation. Moreover, various levels of QoS requirements
In earlier works, D2D communications have been studied should be satisfied for cellular links. In addition, a joint
in the perspective of resource allocation [26], [29]–[34]. optimization of resource and power allocation for D2D
Nguyen et al. [30], [31] have proposed methods based on communications underlaying an SCMA-enabled cellular net-
the bipartite graph matching problem for resource sharing work is not easy, since the problem belongs to the class
among D2Ds and CUEs, to reduce the outage probability of of mixed-integer non-convex programs. Despite many chal-
D2D links. Zhong et al. [32] have considered sum rate (SR) lenges in D2D communications in the uplink SCMA sys-
maximization by using game-theoretic resource allocation. tem, its large benefit motivates us to further investigate the

VOLUME 7, 2019 21757


H. M. Kim et al.: D2D Communications Underlaying an Uplink SCMA System

SR enhancement for D2Ds subject to QoS constraints of


CUEs.
In this paper, we exploit the model of resource shar-
ing between D2Ds and CUEs, where the D2D pairs are
allowed to share the same resources with CUEs in an uplink
SCMA-enabled system. We first propose a new scheme to
improve the SR of network, comprised of two stages. In the
first stage, CUEs in different channel conditions are assigned
to the codebook so that their SR is maximized. Then, the sec-
ond stage is designed to maximize the SR of D2Ds under
the QoS constraints for both CUEs and D2Ds. Accordingly,
the D2D assignments are dynamically optimized along with FIGURE 1. A multiuser system model at the k-th resource with M D2Ds
underlaying a cellular network, where the BS serves N UL users.
the resource allocation for CUEs. Moreover, the power con-
trol is jointly optimized with resource allocation. This model for the program in the later phase. In addition, we use a
offers a few advantages as follows. First, the SR maximiza- binary search to efficiently handle the cardinality constraints.
tion for D2Ds can be simply executed without the resource To further improve the SR of D2Ds, a greedy search (GS)
replacement for on-running cellular systems. The second pay- based algorithm is proposed as an alternative to the HS-based
off is to conveniently satisfy the QoS requirements of CUEs program in the first phase. Numerical results demonstrate that
due to no interference among CUEs in the SCMA system, and the proposed scheme provides good performance and low
to allow a joint optimization of CUE and D2D power alloca- complexity for both SCMA codebook assignment and D2D
tion as well as D2D resource assignment. Another benefit of SR maximization.
this scheme is that D2Ds can be assigned to several OFDMA Notation: diag(x) is the diagonal matrix, where the ele-
tones, which assists D2Ds in exploiting SCMA codebook, ments on its main diagonal are formed by vector x. k · k1 ,
when the number of assigned resources is equal to the number k · k, and | · | denote the `1 -norm, Euclidean norm of a
of nonzero entries in the codeword. Finally, the simple objec- vector, and absolute value of a complex scalar, respectively.
tive function allows D2Ds to be easily released from or admit- x ∼ CN (µ, σ 2 ) indicates that the variable x follows the
ted to the regarding network, which better supports the low- complex normal distribution with mean µ and variance σ 2 .
complexity methods as well as multiple concurrent users’
requests. II. SYSTEM MODEL AND PROBLEM FORMULATION
The benefit of combining D2D communications with A. SIGNAL PROCESSING MODEL
SCMA technique is paralleled with the difficulties in solving We consider the D2D communication system shown in Fig. 1,
the design problem. Based on the proposed scheme, we first with M pairs of D2Ds underlaying a cellular network. Each
introduce an SR maximization problem for CUEs as the code- D2D pair consists of a transmit device (D2D-Tx) and receive
book assignments, which is a nonlinear assignment problem. device (D2D-Rx) in close proximity. In the cellular network,
To resolve this issue, we derive a lower bound for the SR the BS equipped with Nr receive antennas serves N UL CUEs.
of CUEs which is a linear assignment problem. Therefore, The m-th D2D, with m ∈ M , {1, 2, . . . , M }, and n-
the bipartite-graph matching and greedy-based methods are th CUE, with n ∈ N , {1, 2, . . . , N }, are denoted by
efficiently applied to solve the problem. Meanwhile, an SR Dm and Cn , respectively. To decode the signals from CUEs,
maximization problem for D2Ds is formulated through a joint the BS applies SCMA technique, with the K -dimensional
CUE and D2D power allocation and resource assignments for complex codewords of the codebook being sparse vectors
D2Ds, subject to QoS constraints of CUEs and D2Ds with with L (L < K ) nonzero entries. Herein, the number of CUEs
the predefined thresholds of target signal-to-interference- is assumed not to exceed the maximum number of codewords
in the codebook, denoted by J , i.e., N ≤ J = KL , and

plus-noise ratio (SINR). This problem belongs to a class of
mixed-integer non-convex programs, which is hard to solve. then the number of codewords multiplexed per resource is
−1
To address this problem, we propose a two-phase algorithm df = KL−1 . Thus, one CUE is assigned to one codeword
of a joint heuristic method and first-order inner approxi- in the codebook, and each codeword is assigned to one CUE
mation, where the association between transmit power and at most. For D2D communication, a D2D pair is assigned to
resource assignment variables is efficiently exploited. In the some of the K frequency resources.
first phase, a heuristic search (HS)-based program expressed We consider the signal model under the k-th frequency
as an `1 -norm problem under the cardinality constraints is resource, and all channels are assumed to be unchanged
derived to calculate the frequency resource assignments for during a short time of transmission block. The signal-to-
D2Ds. Then, the power allocation for both CUEs and D2Ds interference-plus-noise ratio (SINR) at the BS for decoding
is computed in the second phase by using the first-order inner the information of the n-th CUE can be expressed as
approximation. To further relieve the complexity of the two-
p2c,kn khcb,kn k2
phase algorithm, we prove that the optimal solution obtained γk,n
c
(pc , pd = PM ,

(1)
in the former phase can be simply applied, so that it is feasible 2
m=1 pd,km kgdb,km k
2 + σkn
2

21758 VOLUME 7, 2019


H. M. Kim et al.: D2D Communications Underlaying an Uplink SCMA System

where p2c,kn and p2d,km are the transmit power of the n-th i.e.,
CUE and the m-th D2D-Tx, respectively. The channel vectors N
hcb,kn ∈ CNr ×1 and gdb,km ∈ CNr ×1 are associated to 1X
Rck (β) = ln 1 + βkn γk,n
c
c , 0)
(pmax

(nats/s/Hz), (3)
the links from the n-th CUE and from the m-th D2D-Tx to L
n=1
the BS, respectively. Let pc , pc,kn k∈K,n∈N and pd ,
pd,km k∈K,m∈M , while σkn2 denotes the power of the additive max
  pc is the transmit power
where budget for CUEs, and β ,
 

white Gaussian noise (AWGN) at the BS. Herein, the inter- βkn k∈K,n∈N . Let β̃ ∈ {0, 1}J ×N be the assignment matrix,
ference from other CUEs is completely removed thanks to the whose entry is β̃jn = 1 (j ∈ J = {0, 1, . . . , J }) if the n-th
SCMA decoder at the BS. The SINR at the m-th D2D-Rx is CUE is assigned to the j-th codeword, and β̃jn = 0, otherwise.
given as It is clear that β is a function of β̃, i.e., β = Jc β̃ where
the matrix Jc ∈ {0, 1}K ×J stands for the codebook. Hence,
 p2d,km |hdd,km |2 the codebook assignment problem can be expressed as
γk,m
d
(pc , pd = d  , (2)
φkm pc , pd K
X
maximize Rck (β) (4a)
where hdd,km is the channel response between the m- β̃ k=1
th D2D-Tx and D2D-Rx. The
PN interference-plus-noise subject to β̃jn ∈ {0, 1}, j ∈ J, n ∈ N, (4b)
is given as φkm d p ,p
n=1 βkn pc,kn |gcd,knm | +
2 2

c d = N
PM
m0 =1,m0 6=m pd,km0 |gdd,km0 m | + σkm , where the predefined
2 2 2
X
β̃jn ≤ 1, j ∈ J, (4c)
constant βkn ∈ {0, 1} indicates whether the k-th element of n=1
the codeword is assigned to the n-th CUE or not. It can be XJ
seen that the interference components in (2) contain the given β̃jn = 1, n ∈ N . (4d)
assignment parameters βkn , which are not in (1). Though j=1
pc,kn can be dynamically optimized, its aggregation with βkn
makes it faster to find pc,kn since the binary values of βkn It can be seen that the cost function Rck (β) in (4) corresponds
are aware in the cellular network. Meanwhile, the similar to the total rate of all CUEs at the k-th resource. Meanwhile,
aggregation in (1) generates a complicated formulation, since the feasible region with respect to the assignment variables
the assignment between the m-th D2D and the k-th resource β̃jn represents a set of the matchings between the j-th code-
is undetermined. gcd,knm and gdd,km0 m denote the channel word and the n-th CUE. This implies that Rck (β) is determined
responses from the n-th CUE and from the m0 -th D2D-Tx via the row of β, only after collecting all assignment variables
(m0 ∈ M) to the m-th D2D-Rx, respectively. σkm 2 denotes the of β̃jn . In other words, the problem (4) has an objective func-
power of AWGN at the m-th D2D-Rx. tion with respect to β row-by-row, while β is derived from
the permutations of the columns in Jc through assignment
variable β̃. This is known as a non-linear assignment problem.
B. PROBLEM FORMULATION
In the literature, the total number of cases of β̃ is given as NJ ,

We consider the SR maximization in two separate stages. and thus, the global optimization in (4) is NP-hard.
The first stage is to maximize the SR of CUEs through an In the second stage, we aim to maximize the SR of D2D
assignment problem without D2D pairs, where N CUEs are pairs under the power control, the target SINRs of CUEs and
assigned to N codewords in the codebook. The second stage D2Ds, and D2D assignment constraints. From (2), the achiev-
aims to maximize the SR of D2D pairs subject to the target able rate for the m-th D2D using the k-th resource is given as
SINRs for CUEs in the cellular system. In fact, the SR for all
Rdk,m = ln 1 + γk,m
d
pc , pd

CUEs and D2Ds might be inconvenient and impractical. This (nats/s/Hz). (5)
is because the BS continuously serves CUEs while D2D com-
munication underlaying cellular operation temporarily occurs Then, the SR optimization problem can be formulated as
between two devices in the proximity condition. Therefore, K X
X M
the SR optimization problems for CUEs and D2Ds are usually maximize αkm Rdk,m , (6a)
α,pc ,pd
separate topics in the literature. k=1 m=1
With SCMA technique, the BS can decode the information subject to d,km ,
p2d,km ≤ Pmax k ∈ K, m ∈ M, (6b)
of all CUEs without mutual interference. This make the SR pd,km ≥ 0, k ∈ K, m ∈ M, (6c)
of CUEs depend only on the channels from CUEs to the
BS, which are different from one another due to the CUEs’ c,kn ,
p2c,kn ≤ Pmax k ∈ K, n ∈ N , (6d)
positions and occupied resources. Therefore, we can take pc,kn ≥ 0, k ∈ K, n ∈ N , (6e)
advantage of the best assignment between codebook and kα m k1 ≤ S, m ∈ M, (6f)
CUEs, no matter what the power allocation for CUEs is. If we αkm ∈ {0, 1}, k ∈ K, m ∈ M, (6g)
set the transmit power of CUEs to the maximum of the power
γk,m pc , pd ≥ αkm γ̄k,m , k ∈ K, m ∈ M, (6h)
d d

budget, then the achievable rate of the k-th sub-carrier for the
γk,n
c
pc , pd ≥ βkn γ̄k,n
c
, k ∈ K, n ∈ N ,

multiple access channel (MAC) is given as in [17] and [38], (6i)

VOLUME 7, 2019 21759


H. M. Kim et al.: D2D Communications Underlaying an Uplink SCMA System

J
where Pmax max
d,km and Pc,kn are the transmit power budgets of the
X
β̃jn = 1, n ∈ N, (9d)
m-th D2D and the n-th CUE for the k-th resource, respec-
j=1
tively. The variable αkm ∈ {0, 1} indicates whether the m-th
PK
D2D occupies the k-th resource (α  km = 1) or not (αkm = 0). , k=1 ln NL +βkn γk,n
where R̃cn,6 (β n ) c (pmax , 0) represents

c
We define α m , [αkm ]k∈K , α , α m m∈M , while S (S ≤ K ) the per-user rate for the n-th CUE. Differently from (4),
denotes the maximum number of resources assigned to each the cost function R̃cn,6 (β n ) in (9) corresponding to the rate
D2D. γ̄k,m
d and γ̄ c stand for the per-resource target SINR for
k,n of the n-th user is independently determined, no matter what
the m-th D2D and the n-th CUE, respectively. Note that the the other users’ assignments are chosen, and thus, we get a
right-hand sides of constraints (6h) and (6i) are equal to zero cost matrix, C ∈ RJ ×N , of which each entry is computed as
if αkm and βkn are inactive, respectively. Since constraints (6f)
and (6g) contain binary variables and the objective function Cjn , R̃cn,6 (Jc β̄ j ), (10)
is non-concave, (6) is a mixed-integer non-convex problem. T
. . 0} 1 |0 .{z
with β̄ j = 0| .{z . . 0} corresponding to β̃jn = 1.


j−1 J −j
III. PROPOSED ALGORITHM FOR CODEBOOK
Here, Cjn denotes the total rate of the n-th user to which
ASSIGNMENT PROBLEM
the j-th codeword is assigned, and it can be computed in
It is clear that (4) is an integer programing problem, and the
advance. It is obvious that if β̃jn = 1, β̃j0 n = 0, ∀j0 6=
composition function Rck (β) in (4a) is the natural logarithm
j, due to constraints (9d). Therefore, R̃cn,6 (β n ) in (9a) can
of the summation of all users’ SINR, corresponding to the
be expressed as Jj=1 Cjn β̃jn , leading to a standard linear
P
entries on the k-th row of β as well as the k-th row of code-
book Jc . Meanwhile, the assignment variable β̃ indicates that program. Note that (4) and (9) have the same feasible region,
one CUE is matched to a codebook, represented as a column and thus an arbitrary point is either feasible or infeasible
of Jc . With brute-force search, it takes O(J !) which might to both problems. Accordingly, we can efficiently solve the
be infeasible in real communication systems. In this section, linear problem (9) instead of the non-linear problem (4).
we propose a method to efficiently solve the problem (4) with To solve (9),we consider the following problem. We define
the polynomial complexity. We first consider the following G , J , N ; E to be a complete bipartite graph, in which J
lemma. and N stand for two vertex sets, representing the codewords
Lemma 1: By using Jensen’s inequality, the lower bound of the codebook and CUEs, respectively. E denotes the set of
of Rck (β) is expressed as all edges with the weights given as the matrix C. We consider
a maximum weighted bipartite matching (MWBM) problem,
N
N 1 X L  where a matching M ⊆ E needs to be found such that
Rck (β) ≥ ln + ln + βkn γk,n
c
c , 0) .
(pmax (7)
L N N 1) The size of M is the largest.
n=1
2) M contains the edges without common vertices.
 3) The sum of weights of the edges in M is a maximal
Proof: See Appendix A. value.
By using Lemma 1, the objective function (4a) is lower
Let ejn ∈ E be an assignment from the j-th codeword to the
bounded as
n-th CUE. Consider that ejn ∈ M iff β̃jn = 1 and ejn ∈ / M
K K N
X 1 XX L  iff β̃jn = 0, as constraints (9b). In this regard, the first
Rck (β) ≥ ln + βkn γk,n
c
(pmax
c , 0)
N N two conditions of the MWBM problem are equivalent to the
k=1 k=1 n=1
constraints (9c) and (9d), while the last condition corresponds
K
X N to the objective function (9a). Therefore, the problem (9)
+ ln . (8)
L is considered as the MWBM problem. The Kuhn-Munkres
k=1
algorithm is applied to efficiently find the optimal solution
Based on the concavity of the logarithm function, the maxi- for this problem [39], which is summarized in Algorithm 1.
mization for the right-hand side of (8) provides at least a local Remark 1: We can also apply an algorithm based on GS
maximum for the left-hand side. Since N1 and ln NL are con- to solve problem (9), in which all codewords are successively
stant, we can omit them in the optimization problem without matched to the first CUE, and thus the first CUE is simply
altering the optimal solution. Let β n be the n-th column of β, assigned to the codeword that provides the best rate. Then,
then the objective function of (4) is lower bounded by that of the codeword assigned to the second CUE is selected among
the following problem. the codewords in the rest of codebook, such that the rate of
N
X the second CUE is maximized, and so on. Although the GS
maximize R̃cn,6 (β n ) (9a) method does not devise an optimal solution for problem (9)
β̃ n=1 as compared to the MWBM method, it provides a suboptimal
subject to β̃jn ∈ {0, 1}, j ∈ J, n ∈ N, (9b) solution with a lower complexity computation.
 In particular,
N
X it takes O N KL , as compared to O N 2 KL in the MWBM
β̃jn ≤ 1, j ∈ J, (9c) problem. Note that the GS method cannot be directly applied
n=1 to the original problem (4), since this scheme is to maximize

21760 VOLUME 7, 2019


H. M. Kim et al.: D2D Communications Underlaying an Uplink SCMA System

Algorithm 1 Proposed Algorithm Based on MWBM for the solve (6) is expressed as
Codebook Assignment Problem (4)
K X
M
1: Compute the cost matrix C as in (10). (κ+1)
X d,(κ)
2: Let J and N be the sets of codewords (columns in the
maximize R̃6 , αkm R̃k,m , (15a)
α,pc ,pd
k=1 m=1
codebook) and CUEs, respectively. Let E be the set of
subject to (6b) − (6i). (15b)
edges with the weights given by C.
3: Establish  the MWBM problem on a graph G = d,(κ)
It is clear that R̃k,m is a concave function, and thus at the
J , N ; E as in (9). optimum, we obtain the equality as
4: Apply Kuhn-Munkres algorithm to find the optimal solu-

tion β̃ for (9), which provides the lower bound of SR d,(κ)
Rdk,m = R̃k,m . (16)
given by (9a).

5: The effective SR is obtained by applying β̃ to the objec- However, the problems in (15) are still mixed-integer non-

tive function (4a) as β = Jc β̃ . convex since the binary variables α are involved in the objec-
tive function and constraints. Here, the integer constraints are
related to the assignment variable α, while the variables pc
and pd are responsible for the continuous domain. Therefore,
the per-user rate by selecting a vacant codeword. Meanwhile,
we next handle the integer variables by using the following
the per-resource rate in (4a) is obtained only when all CUEs
lemma.
are assigned to codewords in priority.
Lemma 2: At the convergence of the program in (15),
we suppose that the optimal point for problem (6) is given
IV. PROPOSED ALGORITHM FOR D2D SUM RATE
as X∗ = {α ∗ , p∗c , p∗d }. If we obtain an arbitrary assignment
MAXIMIZATION PROBLEM
variable αk∗0 m0 = 0, ∀k 0 ∈ K, ∀m0 ∈ M, then p∗d,k 0 m0 = 0.
A. TWO-PHASE ITERATIVE ALGORITHM BASED ON

HEURISTIC SEARCH
Proof: See Appendix B.
It can be seen that (6) is a mixed-integer non-convex problem. Remark 2: From Lemma 2, it is realized that p∗d,km > 0,
This is because the objective function and constraints (6h)- αkm must be active to obtain the optimum. On the other hand,

(6i) are non-convex, while (6f) and (6g) are the integer con- when p∗d,km = 0, Rdk,m = 0 regardless of αkm ∗ . However, α ∗
km
straints. In the rest of the paper, we introduce the approach should be set to 0, representing that the m-th D2D is inactive
of a joint heuristic algorithm and an inner approximation as p∗d,km = 0. In other words, the optimal values of α are
method to efficiently solve the problem. strongly associated with those of pd , so that α ∗ can be derived
Let us handle Rdk,m in the objective function. We consider via p∗d . 
the logarithm function as g(x) = ln 1 + 1/x , x > 0. Now, the program (15) can be executed by omitting α as
As in [40], g(x) is convex for x > 0, since its Hessian is a follows. By exploiting the relationship between α and pd from
positive-define matrix. Then, the concave minorant of g(x) is Lemma 2 and Remark 2, we fix the values of α to 1, and then
given as the program (15) becomes

g(x) ≥ g(x̄) + g0 (x)(x − x̄) M


K X
d,(κ)
X
1 1 x maximize R̃k,m , (17a)
= ln 1 + + − 2 . (11) pc ,pd
x̄ x̄ + 1 x̄ + x̄ k=1 m=1
subject to (6b) − (6e), (6i), (17b)
By applying (11) to (5), we obtain the concave minorant of card(pd,m ) ≤ S, m ∈ M, (17c)
Rdk,m at the (κ + 1)-th iteration as
γk,m
d
pc , pd ≥ γ̄k,m
d

card(pd,km ),
φkm
d p ,p k ∈ K, m ∈ M, (17d)

(κ) (κ) c d d,(κ)
Rdk,m ≥ λk,m − ξk,m (κ) (κ)
:= R̃k,m , (12)
2pd,km pd,km − (pd,km )2 where card(x) represents the  number
 of nonzero elements
of vector x, and pd,m , pd,km k∈K . It can be seen that
where problem (17) only contains the continuous variables, and
d,(κ) at the optimum, the binary variable α is determined by the
(κ) d,(κ)  γk,m
λk,m , ln 1 + γk,m + d,(κ)
, (13) function card(pd,km ). However, the globally optimal solution
γk,m + 1 for (17) is still hard to obtain, since it takes high complexity
d,(κ)
(γk,m )2 to tackle the quasi-concave cardinality constraints in (17c)
(κ)
ξk,m , d,(κ)
, (14) and (17d). Instead of directly solving (17), we propose a two-
(γk,m + 1)|hdd,km |2 phase iterative algorithm to effectively derive the solution as
the following steps.
d,(κ) d p(κ) , p(κ) .
with γk,m , γk,m

c d In the first phase, we apply the HS method to (17), and at
Then, the successive program at the (κ + 1)-th iteration to the (κ + 1)-th iteration, the `1 -regularized form is expressed

VOLUME 7, 2019 21761


H. M. Kim et al.: D2D Communications Underlaying an Uplink SCMA System

as Algorithm 2 Proposed Iterative Algorithm Based on HS for


the D2D SR Maximization Problem (6)
K X
M M (0)
(κ+1)
X d,(κ)
X 1: Initialization: Set κ := 0, ε := 10−3 , and R̃6,1 := −∞.
maximize R̃6,1 , R̃k,m − fmp,(κ) (pd ), (18a)
pc ,pd 2: Generating an initial point: Randomly generate
k=1 m=1 m=1 (0) (0) 
subject to (6b) − (6e), (6i), (18b) pc , pd .
3: repeat
γk,m
d
pc , pd ≥ γ̄k,m
d
,

k ∈ K, m ∈ M, (18c) 4: Solve (18) to obtain
(κ+1)
the objective value R̃6,1 and
solution p?c , p?d .

p,(κ) (κ) (κ)
where fm (pd ) = δm k(Dm + I)−1 pd,m k1 − S , ∀m ∈

:= p?c and pd := p?d .
(κ+1) (κ+1)
(κ)
5: Update pc
M, are known as the penalty functions, with pd,m , 6: Find δm
(κ+1)
and 1m .
(κ+1)
(κ) (κ)
[pd,km ]k∈K being the m-th partitioned vector of pd and 7: Set κ := κ + 1.
(κ) (κ−1)
(κ) (κ)  (κ)
Dm , diag pd,m . In each iteration, δm is the smallest 8: until R̃6,1 − R̃6,1 < ε.
(κ) 9: Generate the sets Km 0 , ∀m, as in (19).
value that gives card(p̃d,m ) = S, in which a heuristic pattern
(κ) 10: Calculate α as in (20).

solution for the D2D transmit power, p̃d,m , is derived from (0)
Set κ := 0, R̃6,2 := −∞, and p∗c , p∗d 1 := 0; Randomly

(κ)
11:
pd,m . In particular, the problem (18) is initially solved with (0) (0) 
(0)
generate α (0) , pc , pd .
δm = 1, ∀m, while the constant  is always kept at  = 12: repeat
(κ)
0.1 [41]. Then, δm , which is used for the next iteration, 13: Solve (21) to obtain
(κ+1)
the objective value R̃6,2 and
(κ)
is minimized in the range [0, 1], such that card(p̃d,m ) = S, ?
solution pc , pd . ?

(κ)
:= p?c and pd := p?d .
where p̃d,m is determined by (κ+1) (κ+1)
14: Update pc
15: Set κ := κ + 1.
(κ) (κ−1)
(
(κ) 0,
(κ)
if pd,km < 1m ,
(κ)
16: until R̃6,2 − R̃6,2 < ε.
p̃d,km = Output: solution collects α ∗ in Step 10, and
 The (κ)
(κ)
pd,km , if otherwise, 17:
(κ)
pc , pd := pc , pd ; The achievable rate is given by
∗ ∗
(κ)
(κ) (κ)  (κ) (κ) R̃6,2 .
with 1m , δm max pd,km . Therefore, p̃d,m is considered
k∈K
as the heuristic pattern for pd,m , at which constraints (17b)-
(17d) hold.
Remark 3: Note that the D2D association variables in (15) problems, in which the problem at the (κ + 1)-th iteration is
are replaced by the cardinality functions with respect to the formulated as
D2D transmit power in (17). Accordingly, we just handle a K X
M
(κ+1) d,(κ)
X
simpler problem without integer variables. To solve (17) with maximize R̃6,2 , R̃k,m , (21a)
pc ,pd
cardinality function, an HS method is applied through the k=1 m=1
p,(κ) subject to (6d) − (6e), (6h), (6i), (21b)
penalty functions fm as in (18), in which δm is updated
p2d,km d,km ,
Pmax ,
0
per iteration to attempt splitting the K -length vector pd into ≤ m ∈ M, k ∈ K \ Km (21c)
two parts, such that the values of the S elements in one part pd,km ≥ 0, m ∈ M, k ∈ K \ Km ,
0
(21d)
are significantly higher than those of the (K − S) remaining
pd,km = 0, m 0
∈ M, k ∈ Km . (21e)
elements in the other one. 
At the convergence of problem (18), the sets of (K − S) In summary, the first phase is used to address the cardinal-
that include some indices of K are formulated as ity constraints in (17) and to find the value of α. To do these,
the `1 -form in (18) is solved to produce the heuristic patterns
(κ)
0
Km , {k ∈ K|pd,km < 1m
(κ)
}, ∀m ∈ M, (19) p̃d,m , such that (17c) holds. By using this pattern, the variables
of vector pd,m corresponding to the nonzero elements of p̃d,m
such that the number of elements |Km0 | = (K − S). Using are optimized, while the others are forced to be zero during
Remark 2, we can easily determine the value of assignment the later phase in (21). At the convergence, we obtain a heuris-
variable α as tic solution α ∗ , p∗c , p∗d for (6). The proposed algorithm is
summarized in Algorithm 2.
0 ,

0, if k ∈ Km Convergence Analysis: As in [40] and [41], the programs
αkm = (20)
1, if otherwise. in (18) and (21) generate non-decreasing objective function
values and satisfy the convergence condition at the Karush-
By substituting α into problem (15), the second phase derives Kuhn-Tucker point. In implementation, the iterative algo-
the solution for (6) by solving the convex successive rithms terminate when the difference between two successive
objective values is smaller than ε = 10−3 .
1 Note that α ∗ , p∗ , p∗ represents the optimal solution for (6), while
c d

Complexity Analysis: It is realized that the program (18)
p?c , p?d denotes a per-iteration optimal solution for (18) or (21).

and (21) contain linear and second-order cone (SOC)

21762 VOLUME 7, 2019


H. M. Kim et al.: D2D Communications Underlaying an Uplink SCMA System

Algorithm
 (κ+1)3 Proposed Algorithm
 (κ+1) Based on Binary Search to Algorithm 4 Proposed Iterative Algorithm Based on GS for
Find δm and 1m

the D2D SR Maximization Problem (6)
(κ+1)
1: Input: pd , S, and ε := 10−3 . 1: Initialization: Set ε := 10−3 , α ∗ = 0 and R̃6 := −∞.
2: for m ∈ M do 2: for m ∈ M do
3: Set δmax := 1, and δmin := 0. 3: Set isAdded := 0 and α := α ∗ .
4: while (δmax − δmin > ε) do 4: for v ∈ Sα do
Set δ := δmax +δ
(κ+1)
5: 2
min
and 1 := δmax{pd,km }. 5:
(0)
Set α m := v, κ := 0, R̃6,2 := −∞ and randomly
k∈K (0) (0) 
6: Calculate Km 0 by replacing 1 (κ)
m with 1 in (19).
choose an initial point pc , pd .
0 | < (K − S) then Update the sets Km 0 , {k ∈ K|α
7: if |Km 6: km = 0} instead
8: δmin := δ. of (19).
9: else 7: repeat
Solve (21) to obtain R̃6,2 , and p?c , p?d .
(κ+1) 
10: δmax := δ. 8:
:= p?c and pd := p?d .
(κ+1) (κ+1)
11: end if 9: Update pc
12: end while 10: Set κ := κ + 1.
(κ+1) (κ+1) (κ) (κ−1)
13: Set δm := δ and 1m := 1. 11: until R̃6,2 − R̃6,2 < ε.
end for  (κ)
if R̃6,2 > R̃6 or isAdded = 0 then
 
14: 12:
(κ+1)  (κ+1)
15: Output: δm and 1m . (κ)
13: Set isAdded := 1 and R̃6 := R̃6,2 .
(κ) (κ) 
Update α ∗ := α and p∗c , p∗d := pc , pd .

14:
15: end if
constraints. The number of constraints in (18) and (21) are 16: end for
determined by c1 = 3K (N + M ) and c2 = 3KN + (2K + 17: end for
S)M , respectively. Two programs have the same number of Output: The solution α ∗ , p∗c , p∗d ; The corresponding

18:
variables, denoted by υ = K (N + M ). As in [42], the com- achievable rate is given by R̃6 .
plexities of (18) and (21) are given as O(c2.5 2
1 (υ + c1 )) and
2.5 2
O(c2 (υ + c2 )), respectively.
v ∈ Sα , {v ∈ {0, 1}K ×1 |card(v) = S} and assign v to
α m . Then, α m is used to maximize the total rate of added
B. CONVERGENCE RATE AND COMPLEXITY
D2Ds by solving the program (21) as in Algorithm 2. The
IMPROVEMENT
pattern of resource allocation α m that provides the best total
To relieve the complexity, at Step 6 of the first phase in
rate is assigned to the corresponding D2D, and the algorithm
Algorithm 2, we apply a binary search to find the values of
(κ) (κ) considers the next D2D pair. Algorithm 4 summarizes the
δm as well as 1m ; and then the sets of Km 0 are determined
proposed method based on GS.
to solve problem (21) in the next phase. Algorithm 3 briefly
summarizes the binary search method. The convergence rate V. NUMERICAL RESULTS
of Algorithm 2 is further boosted by considering the follow- To evaluate the performance of the proposed algorithm,
ing lemma. we consider an SCMA-enabled cellular network with 6 uplink
(κ) (κ)
Lemma 3: Suppose that s∗1 = (pc , pd ) is the optimal CUEs randomly placed within a 100-meter radius from the
(κ) (κ)
solution obtained in (18). Then, s∗2 = (pc , p̃d ), where BS at the center of the cell. An underlaid D2D system consists
(κ) (κ)
p̃d is generated by forcing some elements of pd to zeros, of M D2Ds, sharing K = 4 resources with CUEs. Each D2Ds
is called the heuristic pattern solution of s1 . s∗2 is also a

can be assigned to S = L = 2 resources by mapping to
feasible point of (21).  a codeword in the codebook used for SCMA scheme. The
Proof: See Appendix C. information channel vectors for√ the link from CUEs and D2D
By applying Lemma 3, at Step 11 in Algorithm 2, we do to BS are generated as h = 10−PLU,BS /10 ĥ, where h ∈
not have to reset κ and randomly generate the initial point {hcb,kn , gdb,km } corresponds to the communication links from
(0) (0)  (κ) (κ) 
pc , pd . Instead, pc , pd obtained by solving (18) is U ∈ {Cn , Dm } to the BS at the distance dU,BS in kilometer.
used as the initial feasible point to solve (21). Here, the path loss (PL) model, PLU,BS , represents the large-
scale fading, and the entries of ĥ ∼ CN (0, 1) stand for
C. ACHIEVABLE RATE IMPROVEMENT the small-scale fading. Similarly, the channel responses from
Although the HS-based algorithm provides a low-complexity, D2D-Tx√ to D2D-Rx and from CUEs to D2D-Rx are set as
there exists rate loss as compared to the optimal value. g = 10−PLU,U /10 ĝ, where g ∈ {hdd,km , gcd,knm , gdd,km0 m },
Therefore, we further propose a method based on GS for and PLU,U is the PL with the distance dU,U (in kilometer) and
resource allocation, while using the same power alloca- the entries ĝ ∼ CN (0, 1). According to [43], the other param-
tion algorithm. To do this, we successively consider the eters are tabulated in Table 1. In all figures, the achievable
D2Ds one-by-one. For the m-th additional D2D to the rates of CUEs and D2Ds in the whole K resources are divided
system, the algorithm executes a loop to pick a vector by ln 2, to be presented in bps/Hz.

VOLUME 7, 2019 21763


H. M. Kim et al.: D2D Communications Underlaying an Uplink SCMA System

TABLE 1. Simulation parameters.

FIGURE 3. The average SR of CUEs.

FIGURE 2. The average lower bound SR of CUEs, when N = 6.

A. CODEBOOK ASSIGNMENT FOR CUES


FIGURE 4. The convergence rates of the programs in (18a) and (21a) with
We consider the first stage of our scheme, where the resources max = 10 dBm.
different values of M and Pd,km
are allocated to CUEs. Fig. 2 shows the lower bound of SR
versus the maximum transmit power of CUEs. By using the
with the number of CUEs. This is because the GS method
MWBM method, the SR obtained through the lower bound
finds the best solution for one CUE at once, while MWBM
form is exactly equal to the exhaustive search method. This
considers the assignments across all CUEs. Interestingly,
is because the Kuhn-Munkres algorithm used for solving the
as compared to exhaustive search, the rate loss of MWBM
MWBM problem is proven to find the optimal solution. It is
decreases when the number of CUEs increases. This truly
also shown that the GS-based method with lower complexity
reflects the property of the logarithm function that when the
gives lower SR, while the random scheme provides the worst
number of components in summation the lower bound in (7)
performance. As compared to the GS-based and random
becomes tight.
scheme, the MWBM method always provides better perfor-
mance when the maximum transmit power increases. This
verifies that the codebook assignment plays an important role B. D2D SUM RATE MAXIMIZATION
for performance improvement in the SCMA-enabled system. Without loss of generality, the per-resource target SINRs at
Fig. 3 further examines the lower bound of SR and effective D2D-Rx and BS for all CUEs are set as γ̄k,m d = 5 dB
SR as the number of CUEs increases. By using (3), the effec- and γ̄k,n = 10 dB, respectively. To assess the performance,
c

tive SRs when using random and exhaustive search methods we compare the proposed HS- and GS-based methods (as in
are obtained by directly applying the solutions to (3). For Algorithms 2 and 4, respectively) with the other two schemes
the MWBM and GS methods, we have to find their solutions for the resource allocation as follows.
via the lower bound as in (9), and then apply the optimized • Random scheme, where α m , ∀m ∈ M are randomly
solutions to (3). The MWBM provides better performance assigned to a vector v ∈ Sα .
than GS in terms of both the lower bound and effective SR; • Exhaustive search scheme, where all combinations gen-
in particular, the gap between MWBM and GS rises along erated by choosing α m ∈ Sα , ∀m ∈ M, are considered.

21764 VOLUME 7, 2019


H. M. Kim et al.: D2D Communications Underlaying an Uplink SCMA System

TABLE 2. Per-iteration complexities.

FIGURE 6. The SR of D2Ds versus the maximum transmit power at D2D-Tx.

FIGURE 5. The convergence rate of binary search to find δm in


Algorithm 3.

Then, based on the proposed program in (21), these basic


schemes can manage the power allocation efficiently.
Fig. 4 shows the convergence behaviors of the pro-
posed algorithms for resource and power allocation programs
in (18) and (21), respectively. It can be seen that both of the
proposed algorithms need only few iterations to reach the
convergence condition for the various number of D2Ds. Intu- FIGURE 7. The SR of D2Ds versus the number of D2Ds.
itively, the program (18) allows D2Ds to use all K resources,
and thus its objective value is higher than that of (21).
Although four methods can use the same program (21) for Algorithm 2 in Table 2, the computational time for binary
power allocation with the same number of iterations to con- search is negligible, which confirms the of the HS-based
vergence, their complexities are totally different, depending method.
on how to derive the resource allocation variables. By using Fig. 6 plots the SR of D2Ds as a function of the maximum
the complexity analysis in Section IV, Table 2 provides the power budget at D2D-Tx, Pmax d,km , with various number of
per-iteration complexities of the four methods. It is clear that D2Ds, M = {2, 3}. Clearly, the exhaustive search outper-
the complexity of the HS-based method is nearly double that forms all three other methods, while the random scheme gives
of the random method, implying that they can be merely the worst performance. For the two proposed algorithms,
approximate in big-O notation when c1 , c2 and υ become the gap between the GS-based and HS-based methods is
large. The complexity of the GS-based method increases as higher in the case of M = 3 than in the case of M = 2. This is
the product of M and the number of SCMA layers rises, while because the penalty function in the HS-based scheme is linear,
the complexity of exhaustive search follows the exponential which supports the better approximation for the smaller num-
function. To further observe the complexity, Fig. 5 describes ber of degrees of freedom. However, the HS-based method
the typical convergence rate of Algorithm 3 to find δm , which provides much better performance than random selection, and
is updated in the first phase of
 Algorithm
 2. At the beginning, it is well-adapted to the D2D system due to its low complex-
the search region of δm is δmin , δmax , with δmin = 0 and ity. To gain further insights into the algorithms, Fig. 7 shows
δmax = 1. The value of δm is obtained within only around the SR of D2Ds when the number of D2Ds increases. Here,
9 iterations, at which the gap between δmin and δmax is we omit the case of exhaustive search due to its very high
very small. Therefore, the total complexity of Algorithm 3 complexity, i.e., exponential growth along with the number
approximates to O(KM ). By connecting to the complexity of of D2Ds. The two proposed algorithms give the higher gain

VOLUME 7, 2019 21765


H. M. Kim et al.: D2D Communications Underlaying an Uplink SCMA System

with the greater number of D2Ds as compared to the random APPENDIX B


scheme, indicating that they are able to adapt to a dense PROOF OF LEMMA 2
network of devices. Equation (16) implies that the optimal solution for (6) is
achieved P at the P
convergence of program (15). We first let
fd (X∗ ) = K M ∗ d,(∗)
VI. CONCLUSION k=1 m=1 αkm Rk,m be the optimal value of (6),
We have studied a D2D system underlaying an uplink d,(∗)
where Rk,m is determined as in (5) through γk,m d (p∗ , p∗ ).
c d
SCMA-enabled cellular network. A joint SR optimization We need to prove that whenever αk 0 m0 = 0, ∀k ∈ K, ∀m0 ∈
∗ 0
of CUEs and D2Ds under resource and power allocation M and pd,k 0 m0 > 0, the corresponding primal value is not
requires high complexity. Therefore, a two-stage scheme has larger than fd (X∗ ).
been considered, where the first stage is to maximize the Suppose that an arbitrary feasible point X̃ = {α ∗ , p∗c , p̃d },
SR for CUEs, and the second stage focuses on the SR opti- such that ∃ αk∗0 m0 = 0 and p̃d,k 0 m0 ∈ (0, ε) for any k 0 ∈
mization for D2Ds. First, the resource allocation problem to K, m0 ∈ M, and ε is very small. Then, the primal value
maximize SR for CUEs has been introduced as a non-linear of (6) is expressed as
program, which is hard to solve. Accordingly, a lower bound XK XM
for the CUE rate is derived, so that the problem is effec- fd (X̃) = αk∗0 m0 R̃dk 0 ,m0 + αkm
∗ d
R̃k,m
k=1 m=1
tively solved by applying MWBM and GS-based methods. (k,m)6=(k 0 ,m0 )
In the second stage, a new design of the SR maximization XK XM
problem for D2Ds has been considered under the resource = α ∗ R̃d , (25)
k=1 m=1 km k,m
and power allocation subject to QoS requirements of CUEs, (k,m)6=(k ,m )
0 0

which is formulated as a mixed-integer non-convex pro-


where R̃dk,m is determined by (5) via γk,m d (p∗ , p̃ ). Since
c d
gramming. To tackle the problem, we have proposed a low-
complexity two-stage iterative algorithm based on heuristic αk 0 m0 = 0, αk 0 m0 R̃k 0 ,m0 = 0 no matter how R̃dk 0 ,m0 is calculated.
∗ ∗ d

and inner approximation methods. To further improve the As in (2), we obtain γk,m d (p∗ , p̃ ) < γ d (p∗ , p∗ ) for
c d k,m c d
convergence, we have investigated the binary search algo- (k, m) 6 = (k , m ). In fact, since p̃d,k 0 m0 > p∗d,k 0 m0 =
0 0

terms are given as φkm d p∗ , p̃ >



rithm and exploited the feasible point in the heuristic program 0, the interference c d
φkm
d p∗ , p∗ , while the function φ d p , p is inversely pro-

for the later step. In addition, the SR of D2Ds has been c d km c d
d,(∗)
further improved by using the GS-based method. Numerical portional to γk,m d (p , p ). This leads to 0 ≤ R̃d
c d k,m < Rk,m , and
results with realistic parameters have demonstrated that both thus αkm ∗ d,(∗)
k,m ≤ αkm Rk,m , where the equality holds when
∗ R̃d
the proposed algorithms provide substantial performance αkm
∗ = 0. From (25), we always obtain f (X̃) ≤ f (X∗ ).
d d
enhancement. Interestingly, the complexity of the heuristic- Moreover, k 0 and m0 are the arbitrary values in K and M,
based method has been proven to be comparable to that of respectively. Therefore, at the optimum, if αk∗0 m0 = 0, ∀k 0 ∈
the random approach. K, ∀m0 ∈ M, then p∗d,k 0 m0 = 0, which completes the proof.
APPENDIX A
APPENDIX C
PROOF OF LEMMA 1
PROOF OF LEMMA 3
From (3), the CUEs’ rate can be rewritten as
We denote the feasible sets for (18) and (21) as F1 and F2 ,
N + NL N n=1 βkn γk,n (pc , 0)
c max
P
respectively. Accordingly, F1 and F2 can be expressed as
 
c
Rk (β) = ln
N n o
F1 , pc , pd |(18b) and (18c) hold ,

PN (26)
c (pmax , 0)) 
(L + n=1 βkn γk,n
N
c
= ln L
n o
F2 , pc , pd |(21b) − (21e) hold .

N (27)
 N PN L
n=1 N + βkn γk,n (pc , 0)
c max

(κ) (κ)
= ln L
, (22) We have an assumption that s∗1 = (pc , pd ) ∈ F1 is the
N optimal solution for (18). It is realized that constraints (6b)
By applying Jensen’s inequality to the concave function and (6c) in (18b) are decomposed into (21c)-(21e). In addi-
(κ)
ln(x), the logarithm of the arithmetic mean-geometric mean tion, all elements of pc in s∗1 always satisfy constraints (6d)-
inequality is given as (6e) since the domains of these constraints in the two prob-
(κ) (κ)
N
lems are the same. To prove s∗2 = (pc , p̃d ) ∈ F2 , we need
 PN x  1 X ∗
n=1 n to show that s2 satisfies the constraints (6h), (6i), (21c)-
ln ≥ ln(xn ). (23)
N N (21e), which are associated with the variables pd,km , k ∈
n=1
K, m ∈ M. Therefore, we examine the feasibility of s∗2 in
From (22) and (23), we obtain problem (21), through the feasibility of pd,km in both cases of
N
N
1 X L  αkm = 1 and αkm = 0, ∀k, m.
Rck (β) ≥ ln + ln + βkn γk,n
c
c , 0) , (24)
(pmax For αkm = 1, k ∈ K\Km 0 , s∗ ∈ F only when p
2 d,km
L N N 2
n=1 satisfies constraints (6h), (6i), (21c) and (21d). With αkm =
which verifies the result in (7). 1, constraints (6h), (6i), (21c), and (21d) in problem (21)

21766 VOLUME 7, 2019


H. M. Kim et al.: D2D Communications Underlaying an Uplink SCMA System

are equivalent to (18c), (6i), (6b), and (6c) in problem (18), [15] H. Nikopour and H. Baligh, ‘‘Sparse code multiple access,’’ in Proc.
respectively. This means that all values of pd,km with αkm = 1 IEEE Annu. Int. Symp. Pers. Indoor Mobile Radio Commun. (PIMRC),
Sep. 2013, pp. 332–336.
make (21b)-(21d) hold. [16] F. Wei and W. Chen, ‘‘Low complexity iterative receiver design for
When αkm = 0, k ∈ Km 0 , s∗ ∈ F only if p
2 2 d,km satisfies sparse code multiple access,’’ IEEE Trans. Commun., vol. 65, no. 2,
constraints (6h), (6i), and (21e). First, Lemma 2 indicates pp. 621–634, Feb. 2017.
[17] Z. Yang, J. Cui, X. Lei, Z. Ding, P. Fan, and D. Chen, ‘‘Impact of factor
that pd,km = 0, so that the constraint (21e) holds. We need graph on average sum rate for uplink sparse code multiple access systems,’’
to show that constraints (6h) and (6i) also hold. Obviously, IEEE Access, vol. 4, pp. 6585–6590, 2016.
constraints (6h) and (6i) related to αkm = 0 become [18] G. Araniti, C. Campolo, M. Condoluci, A. Iera, and A. Molinaro, ‘‘LTE
for vehicular networking: A survey,’’ IEEE Commun. Mag., vol. 51, no. 5,
γk,m
d
s∗2 |pd,km = 0 ≥ 0, m ∈ M, k ∈ Km 0
,

(28) pp. 148–157, May 2013.
[19] D. Feng, L. Lu, Y. Yuan-Wu, G. Li, S. Li, and G. Feng, ‘‘Device-to-device
γk,n s2 |pd,km = 0 ≥ βkn γ̄k,n , k ∈ K, n ∈ N . (29)
c ∗ c

communications in cellular networks,’’ IEEE Commun. Mag., vol. 52,
no. 4, pp. 49–55, Apr. 2014.
From (2), we have γk,m d s∗ |p

2 d,km = 0 = 0 as constraint (28) [20] Technical Specification Group SA; Study on Architecture Enhancements to
(κ) (κ)
hold. Since pd  p̃d , the denominator of γk,n c s∗ resulting Support Proximity Services (ProSe) (Release 12), document 23.703 V2.0.0,

1 3GPP, Mar. 2014.
from (2) is larger than that of γk,n c s∗ |p
2 d,km = 0 , leading to [21] K. Zheng, Q. Zheng, P. Chatzimisios, W. Xiang, and Y. Zhou, ‘‘Hetero-
γk,n 2 d,km = 0 ≥ γk,n s1 . Moreover, γk,n s1 ≥ βkn γ̄k,n
c s∗ |p c ∗ c ∗ c geneous vehicular networking: A survey on architecture, challenges, and
solutions,’’ IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2377–2396,
holds due to s1 ∈ F1 . They demonstrate that γk,n s2 |pd,km =
∗ c ∗
4th Quart., 2015.
0 ≥ βkn γ̄k,nc , as constraint (29) hold.

[22] IEEE Guide for Wireless Access in Vehicular Environments (WAVE)—
(κ) Architecture, IEEE Standard 1609.0-2013, 2016.
In summary, for both cases of αkm , p̃d satisfy all corre- [23] K. Abboud, H. A. Omar, and W. Zhuang, ‘‘Interworking of DSRC and
sponding constraints and s∗2 ∈ F2 . cellular network technologies for V2X communications: A survey,’’ IEEE
Trans. Veh. Technol., vol. 65, no. 12, pp. 9457–9470, Dec. 2016.
[24] Evolved Universal Terrestrial Radio Access (e-Utra) and Evolved
REFERENCES
Universal Terrestrial Radio Access Network (e-Utran); Overall
[1] M. R. Palattella et al., ‘‘Internet of Things in the 5G era: Enablers, archi- Description; Stage 2 (v14.3.0, Release 14), document 3GPP 36.300,
tecture, and business models,’’ IEEE J. Sel. Areas Commun., vol. 34, no. 3, Jun. 2016.
pp. 510–527, Mar. 2016. [25] R. Molina-Masegosa and J. Gozalvez, ‘‘LTE-V for sidelink 5G V2X
[2] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, vehicular communications: A new 5G technology for short-range vehicle-
‘‘Internet of Things: A survey on enabling technologies, protocols, and to-everything communications,’’ IEEE Veh. Technol. Mag., vol. 12, no. 4,
applications,’’ IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2347–2376, pp. 30–39, Dec. 2017.
4th Quart., 2015. [26] Q. Wei, L. Wang, Z. Feng, and Z. Ding, ‘‘Wireless resource management
[3] C. Perera, C. H. Liu, and S. Jayawardena, ‘‘The emerging Internet of in LTE-U driven heterogeneous V2X communication networks,’’ IEEE
Things marketplace from an industrial perspective: A survey,’’ IEEE Trans. Trans. Veh. Technol., vol. 67, no. 8, pp. 7508–7522, Aug. 2018.
Emerg. Topics Comput., vol. 3, no. 4, pp. 585–598, Dec. 2015.
[27] M. N. Tehrani, M. Uysal, and H. Yanikomeroglu, ‘‘Device-to-device
[4] E. Hossain and M. Hasan, ‘‘5G cellular: Key enabling technologies
communication in 5G cellular networks: Challenges, solutions, and
and research challenges,’’ IEEE Instrum. Meas. Mag., vol. 18, no. 3,
future directions,’’ IEEE Commun. Mag., vol. 52, no. 5, pp. 86–92,
pp. 11–21, Jun. 2015.
May 2014.
[5] H. S. Dhillon, H. Huang, and H. Viswanathan, ‘‘Wide-area wireless com-
[28] B. Antonescu, M. T. Moayyed, and S. Basagni, ‘‘mmWave channel prop-
munication challenges for the Internet of Things,’’ IEEE Commun. Mag.,
agation modeling for V2X communication systems,’’ in Proc. IEEE Annu.
vol. 55, no. 2, pp. 168–174, Feb. 2017.
Int. Symp. Pers., Indoor, Mobile Radio Commun. (PIMRC), Oct. 2017,
[6] A. Damnjanovic et al., ‘‘A survey on 3GPP heterogeneous networks,’’
pp. 1–6. doi: 10.1109/PIMRC.2017.8292718.
IEEE Wireless Commun., vol. 18, no. 3, pp. 10–21, Jun. 2011.
[29] P. Phunchongharn, E. Hossain, and D. I. Kim, ‘‘Resource allocation for
[7] M. Siekkinen, M. Hiienkari, J. K. Nurminen, and J. Nieminen, ‘‘How
device-to-device communications underlaying LTE-advanced networks,’’
low energy is Bluetooth low energy? Comparative measurements with
IEEE Wireless Commun., vol. 20, no. 4, pp. 91–100, Aug. 2013.
ZigBee/802.15.4,’’ in Proc. IEEE Wireless Commun. Netw. Conf. Work-
shops (WCNCW), Apr. 2012, pp. 232–237. [30] H. V. Nguyen, Q. Duong, V.-D. Nguyen, Y. Shin, and O.-S. Shin, ‘‘Opti-
[8] C. Gomez, J. Oller, and J. Paradells, ‘‘Overview and evaluation of blue- mization of resource allocation for underlay device-to-device commu-
tooth low energy: An emerging low-power wireless technology,’’ Sensors, nications in cellular networks,’’ Peer-Peer Netw. Appl., vol. 9, no. 5,
vol. 12, no. 9, pp. 11734–11753, 2012. pp. 965–977, Sep. 2016.
[9] ‘‘The need for low cost, high reach, wide area connectivity for the Inter- [31] H. V. Nguyen, Q. Duong, and O. S. Shin, ‘‘Resource allocation optimiza-
net of Things: A mobile network operator’s perspective,’’ Machina Res., tion for device-to-device communications in cellular networks,’’ in Proc.
London, U.K., White Paper, 2014. Int. Conf. Inf. Commun. Technol. Converg. (ICTC), Oct. 2014, pp. 377–378.
[10] S. Rangan, T. S. Rappaport, and E. Erkip, ‘‘Millimeter-wave cellular [32] W. Zhong, Y. Fang, S. Jin, K.-K. Wong, S. Zhong, and Z. Qian, ‘‘Joint
wireless networks: Potentials and challenges,’’ Proc. IEEE, vol. 102, no. 3, resource allocation for device-to-device communications underlaying
pp. 366–385, Mar. 2014. uplink MIMO cellular networks,’’ IEEE J. Sel. Areas Commun., vol. 33,
[11] L. Dai, B. Wang, Y. Yuan, S. Han, C.-L. I, and Z. Wang, no. 1, pp. 41–54, Jan. 2015.
‘‘Non-orthogonal multiple access for 5G: Solutions, challenges, [33] W. Zhao and S. Wang, ‘‘Resource sharing scheme for device-to-device
opportunities, and future research trends,’’ IEEE Commun. Mag., communication underlaying cellular networks,’’ IEEE Trans. Commun.,
vol. 53, no. 9, pp. 74–81, Sep. 2015. vol. 63, no. 12, pp. 4838–4848, Oct. 2015.
[12] S. M. R. Islam, N. Avazov, O. A. Dobre, and K.-S. Kwak, ‘‘Power-domain [34] T. D. Hoang, L. B. Le, and T. Le-Ngoc, ‘‘Resource allocation for D2D com-
non-orthogonal multiple access (NOMA) in 5G systems: Potentials and munications under proportional fairness,’’ in Proc. IEEE Global Commun.
challenges,’’ IEEE Commun. Surveys Tuts., vol. 19, no. 2, pp. 721–742, Conf. (GLOBECOM), Dec. 2014, pp. 1–6.
2nd Quart., 2017. [35] Y. Dai, M. Sheng, K. Zhao, L. Liu, J. Liu, and J. Li, ‘‘Interference-
[13] L. Song, Y. Li, Z. Ding, and H. V. Poor, ‘‘Resource management in non- aware resource allocation for D2D underlaid cellular network using
orthogonal multiple access networks for 5G and beyond,’’ IEEE Netw., SCMA: A hypergraph approach,’’ in Proc. IEEE Wireless Commun. Netw.
vol. 31, no. 4, pp. 8–14, Jul. 2017. Conf. (WCNC), Apr. 2016, pp. 1–6.
[14] Y. Cai, Z. Qin, F. Cui, G. Y. Li, and J. A. McCann, ‘‘Modulation and [36] J. Liu, M. Sheng, L. Liu, Y. Shi, and J. Li, ‘‘Modeling and analysis of
multiple access for 5G networks,’’ IEEE Commun. Surveys Tuts., vol. 20, SCMA enhanced D2D and cellular hybrid network,’’ IEEE Trans. Com-
no. 1, pp. 629–646, 1st Quart., 2018. mun., vol. 65, no. 1, pp. 173–185, Jan. 2017.

VOLUME 7, 2019 21767


H. M. Kim et al.: D2D Communications Underlaying an Uplink SCMA System

[37] Y. Li, M. Sheng, Y. Zhu, T. Jiang, and J. Li, ‘‘Sum rate maximization GIL-MO KANG received the B.S. and M.S.
in underlay SCMA device-to-device networks,’’ in Proc. IEEE Global degrees in electronic engineering from Soongsil
Commun. Conf. (GLOBECOM), Dec. 2016, pp. 1–6. doi: 10.1109/GLO- University, Seoul, South Korea, in 2013 and 2015,
COM.2016.7842305. respectively, where he is currently pursuing the
[38] M. Al-Imari, M. A. Imran, R. Tafazolli, and D. Chen, ‘‘Subcarrier and Ph.D. degree with the Department of ICMC Con-
power allocation for LDS-OFDM system,’’ in Proc. IEEE Veh. Technol. vergence Technology.
Conf. (VTC), Budapest, Hungary, May 2011, pp. 1–5. Since 2013, he has been with the Wireless
[39] H. W. Kuhn, The Hungarian Method for the Assignment Problem. Berlin,
Communication Laboratory, Soonsgil University.
Germany: Springer, 2010.
In 2016, he received the Global Ph.D. Fellows
[40] H. V. Nguyen, V.-D. Nguyen, O. A. Dobre, and O.-S. Shin, ‘‘Sum rate max-
imization based on sub-array antenna selection in a full-duplex system,’’ Scholarship from the National Research Founda-
in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2017, pp. 1–6. tion of Korea, during the period of 2016–2019. His research interests include
doi: 10.1109/GLOCOM.2017.8254806. wireless communications, with particular focus on device-to-device commu-
[41] E. J. Candès, M. B. Wakin, and S. P. Boyd, ‘‘Enhancing sparsity by nications, beamforming, 5G systems, and V2X communications.
reweighted `1 minimization,’’ J. Fourier Anal. Appl., vol. 14, nos. 5–6,
pp. 877–905, 2008.
[42] D. Peaucelle, D. Henrion, Y. Labit, and K. Taitz, ‘‘User’s guide for SeDuMi
interface 1.04,’’ in Proc. LAAS-CNRS, Toulouse, France, Jun. 2002, YOAN SHIN received the B.S. and M.S. degrees
pp. 1–36. in electronics engineering from Seoul National
[43] Evolved Universal Terrestrial Radio Access (E-UTRA): Further Advance- University, Seoul, South Korea, in 1987 and 1989,
ments for E-UTRA Physical Layer Aspects (Release 9), document 3GPP respectively, and the Ph.D. degree in electrical
TS 36.814 V9.0.0, 3GPP Technical Specification Group Radio Access and computer engineering from The University of
Network, 2010. Texas at Austin, in 1992.
From 1992 to 1994, he was with Microelec-
tronics and Computer Technology Corporation,
Austin, TX, USA, as a Member of Technical Staff.
Since 1994, he has been with the School of Elec-
HYEON MIN KIM received the B.S. degree in tronic Engineering, Soongsil University, Seoul, where he is currently a Pro-
electronic engineering from Soongsil University, fessor. From 2009 to 2010, he was a Visiting Professor with the Department
Seoul, South Korea, in 2012, where he is currently of Electrical and Computer Engineering, The University of British Columbia,
pursuing the joint master’s and Ph.D. degree with Vancouver, BC, Canada. His research interests include magnetic induction
the Department of ICMC Convergence Technol- communication, localization, and compressive sensing. He has been serving
ogy. as an Organizing/Technical Committee Member for various prominent inter-
Since 2012, he has been with the Wireless Com- national conferences, including VTC 2003, ISITA 2006, ISPLC 2008, APCC
munications Laboratory, Soongsil University. His 2008, ISIT 2009, APWCS 2009, APWCS 2010, APCC 2010, ICTC 2010,
research interests include wireless communica- APWCS 2011, ICTC 2011, ISAP 2011, APWCS 2012, and APCC 2012.
tions, with particular focus on device-to-device In particular, he was the Technical Program Committee Chair of APWCS
communications, 5G systems, and signal processing. 2013 and the General Co-Chair of APWCS 2014 and APWCS 2015.

HIEU V. NGUYEN received the B.S. degree OH-SOON SHIN received the B.S., M.S., and
in electronics and telecommunications from the Ph.D. degrees in electrical engineering and com-
Danang University of Science and Technology, puter science from Seoul National University,
Danang, Vietnam, in 2011, and the M.S. degree Seoul, South Korea, in 1998, 2000, and 2004,
in electronic engineering from Soongsil Univer- respectively.
sity, South Korea, in 2016, where he is currently From 2004 to 2005, he was with the Division of
pursuing the Ph.D. degree with the Department of Engineering and Applied Sciences, Harvard Uni-
Information and Telecommunication Engineering. versity, Cambridge, MA, USA, as a Postdoctoral
From 2011 to 2013, he was with the Danang Fellow. From 2006 to 2007, he was a Senior Engi-
University of Science and Technology, as an Assis- neer with Samsung Electronics, Suwon, South
tant Researcher and a Lecturer. Since 2014, he has been with the Wireless Korea. In 2007, he joined the School of Electronic Engineering, Soongsil
Communications Laboratory, Soongsil University. His research interests University, Seoul, where he is currently a Professor. His research interests
include wireless communications, with particular focus on optimization tech- include communication theory, wireless communication systems, and signal
niques, device-to-device communications, 5G systems, energy harvesting, processing for communication.
beamforming design, and cognitive radio.

21768 VOLUME 7, 2019

You might also like