DOI QR코드

DOI QR Code

Interference Cancellation for Relay-Assisted D2D Communication

  • Zhao, Hongyi (School of Electronics Information and Communications, Huazhong University of Science and Technology) ;
  • Cao, Yang (School of Electronics Information and Communications, Huazhong University of Science and Technology) ;
  • Liu, Yingzhuang (School of Electronics Information and Communications, Huazhong University of Science and Technology)
  • Received : 2014.10.17
  • Accepted : 2015.07.20
  • Published : 2015.09.30

Abstract

Relay-assisted D2D communication extends the communication range of the D2D pairs and helps users to form D2D pairs effectively. However, due to the introduction of the multi-hop relaying, the D2D communication has to occupy extra transmission time, which may decrease the efficiency of the communication system. In this paper, we propose a scheme to make node receive D2D signal and BS signal at overlapping time to improve the spectrum efficiency according to ZigZag decoding and successive-interference-cancellation (SIC). In this way, more data can be delivered during the same duration, thus the network throughput can be further improved. Numerical results verify the performance improvement of the proposed scheme when compared with a baseline scheme. Moreover, we expand the proposed scheme from one-hop relay scenario to multi-hop relay scenario.

Keywords

1. Introduction

With the tremendous growing of the demand for user services and data requests, the traditional cellular network may not meet the requirements of massive data link services. Meanwhile the direct data exchange between mobile users is possible via device-to-device (D2D) communication, which has the potential to improve the spectrum efficiency. Recently, D2D communication has attracted much attention from both academic and industrial fields [1][5]. By means of spectrum sharing, D2D users can exploit the network topology to render additional gains in the network throughput[2][3][6].

D2D communication without multi-hop relaying has been widely discussed, and the introduction of relay-assisted D2D communication can significantly reduce the system outage probability[12]. Generally, the relay selection directly affects the performance of relay-assisted D2D communication system [7]. The relaying technology expands the communication range of the D2D pair and enhances the reliability of the D2D communication. Therefore, the relay-assisted D2D communication is attracting more and more attention.

A plethora of studies are about improving the efficiency of the relay-assisted D2D system. In [12], the authors derived out the premise of interference constraint for the relay-assisted D2D communication mode, and gave the advice of criteria based on the optimal path selection and system capacity in cellular network. In [13], authors considered interference constraint conditions using different algorithms such as Kuhn-Munkras (KM) algorithm and greedy algorithm to make the relay routing selection decision. In [7][22], authors developed several distributed resource management schemes for D2D communication underlaying cellular networks. In the distributed resource management scheme, each D2D user could decide the transmission resources and power independently. In [8], authors proposed two types of efficient algorithms, analyzed the optimal design of D2D spatial density and transmit power, and derived the achievable transmission capacity of multi-hop D2D system in closed-form expression, to achieve the maximum capacity while minimizing the total interference power. In [16], authors propose a solution using message passing technique where each user equipment sends and information messages to/from the relay node in an iterative manner with the goal of achieving an optimal allocation. In [9][21], authors proposed a D2D cooperative relay scheme to relieve the congestion problem.

In summary, the introduction of relay-assisted D2D communication will bring many benefits, but there will also be a lot of challenges[10]. Generally, the circumstance of interference and the transmission strategy will have different characteristics, which need to be considered. For example, [12] and [13] have provided solutions to the case of interference constraints. One salient feature of our paper is the utilization of interference cancellation and ZigZag[14][15], i.e., we exploit interferences, and then propose a solution to remove such interferences. Despite the introduction of the interference, the proposed solution can signidicantly improve the spectrum efficiency of D2D communication. We provide an idea that they may work together under the premise of meeting certain delay constraint. It does help some cases like multi video conference or applications which need the help of both BS and other user under the premise of meeting certain delay constraint. Besides, Our strategy can be used not only in one-hop relay assist D2D communication but also in multi-hop relay assisted D2D communication. We expand the sense to multi-hop relay assisted D2D communication and found that it is even better than one-hop case.

 

2. System Model

The basic scenario with two types of communication mode is depicted in Fig. 1. Specifically, one mode is cellular communication mode, i.e., users communicate with the base station (BS) through the coordination and scheduling of the BS. The other mode is D2D communication mode, in which users communicate with each other directly or via relay nodes. In such scenario, there are several cellular users and D2D users share the downlink frequency of the cellular network in underlaying method.

Fig. 1The cellular network scenario with D2D communication. The solid line represents the signal transmission and the dashed line represents the interference caused by BS to node R

A relay-assisted D2D communication model is illustrated in Fig. 1, we assume that the data from BS can be transmitted to node D directly while the data from node S cannot be transmitted tonode D directly, thus node S needs to transmit the data via a relay node R. Specifically,, the data has to be transmitted from node S to node R, and then goes ahead from node R to node D. In the conventional inteference avoidance scheme (as show in Table 1.), such process needs to occupy three time slots at least. Specifically, the node D needs to keep idle state at the first time slot, since the data is transmitted from node S to node R, and the BS is not allowed to cause interferece to the S-to-R communucation link. At the second time slot, node R forwards the received data to node D, while node S and the BS have to keep silent. At the third time slot, the BS transmits data to node D. Therefore, node D can receive all the packets from the BS and node S. The BS does not transmit data to node D at the first time slot in the conventional scheme to avoid interference to node R, even through node D has the possibility to receive the data. In contrast, when we consider the case that the interference is allowed, i.e., the S-to-R and BS-to-D communcations can occur at the same time slot, a novel interference cancellation scheme can be proposed to improve the system throughput. Table 2 shows the two-slot operation of the proposed scheme, which is different from the three-slot operation of the conventional schcme. The spectrum efficiency improvement of the proposed scheme can be significant. However, the obtaining the data from the BS and node S at node D correctly via the proposed scheme is a challenging problem. We will solve such problem in the following sections of this paper.

Table 1.The timeline of the conventional scheme

Table 2.The timeline of the proposed scheme

 

3. Using the interference cancellation scheme to improve the spectrum efficiency

The communication process can be described as follows: at the first time slot, node S sends the packet to relay node R, and the BS transmits packet to the node D at the same time slot. At this instant, we can imagine that node D can decode the complete packet from the BS, which is interference-free, while relay node R gets a collision packet. Since the collision packet consists of two different packets from two different sources, the collision of packets will be slightly staggered over the timeline as shown in Fig. 2 even though node S and the BS transmit packets at the same time slot.

Fig. 2Packet collision at the relay node. Sb represents the packet from the BS and Ss represents the packet from node S

At the second time slot, since node R cannot decode the collision packet, the collision packet will be amplify-forwarded to node D. The collision packet can be decoded at node D with the assitance of the packet obtained from the BS at the first time slot. Based on this observation, we come up with a interference cancellation scheme to decode the collision packet at node D.

Now we use the equation to describe the communication process. The packet from node S to node D is expressed as S , and the packet fromthe BSto node D is represented by X . At the first time slot T1 , the signals received by node R and node D can be expressed as follows, respectively

At the second time slot T2 , the signal received by node D can be expressed as:

where H represents the channel matrix between two nodes (the subscript) and we suppose that node D and node R can obtain H . We use α to denote the forward amplification factor of node R. N0 , N1 and N2 represent Gaussian additive white noises.

Put (1) into (2) and(3), we have two linear equations with two unknown variables, thus node D can get S and X :

If the channel condition is good enough, i.e., the signal-to-noise ratio (SNR) of data from the BS to node D and the SNR of data from node S to node R are adequately high, the noise signal N0 , N1 and N2 can be negligible. If the relay forward amplification factor α is 1, then S and X can be simplified as :

Clearly, this is a closed-form expression, which can be solved directly with low complexity.

 

4. The performance analysis

We assume that the data transmission is synchronous at the packet-level, while it is asynchronous at the symbolic-level. In this section, we will theoretically analyze the impact of the proposed scheme on the system performances of the relay-assisted D2D communication.

4.1 The impact on the throughput performance

We first analyze the impact on the system throughput. The rate of D2D communication ( S → R, R → D ) is denoted by rs (in bit/second), the rate of BS → D is denoted by rb (in bit/second). The length of the packet, which is defined as the number of contained bits, is denoted by ls (for packet from node S to node D) and lb (for packet from BS to node D), they are the same for both schemes. The completion time (in second) of the communication process is ts (for packet from node S to node D) or tb (for packet from the BS to node D). For each scheme (Table 1, Table 2), we have the following equations:

For the conventional scheme, the total transmission time is

The total transmission rate is

If we use the interference cancellation scheme, the total transmission time is

Here represents the overlapping time for a collision packet.

Clearly, the total transmission rate is

The ratio of rIC to r can be obtained as follows

We assume that ls = lb and the data rate in each time slot is the same (rBS → D = rS → R = rR → D) for both schemes, thus we have tsr = trd = tb for both schemes. The transmission sequence is illustrated in Fig. 3 . According to the above equations, we know that the interference cancellation scheme can improve the overall transmission rate by up to 50% if the overlapping time at the first time slot is close to tb or tsr . However, the throughput would be degraded when the interference caused by the proposed scheme results in a high bit error rate (BER).

Fig. 3Transmission sequence and collision packet at the relay node

4.2 The impact on the BER performance

In this section, we will analyze the impact of the interference cancellation scheme on the BER.

Based on equations (1) - (7), the collision packet can be decoded accordingly.

Generally, the distance between node S and node R is relatively shorter than the distance between the BS and node R. We assume that the packet from node S arrives at node R first. In fact, if the packet from the BS arrives at R first, the process of analysis is similar.

In Fig. 3, we suppose that Ss and Sb represent the packets from node S and the packet from the BS, respectively. yR(t) represents the continuous-time signal received by node R at the first time slot. yRD(t) represents the continuous-time signal received by node D at the first time slot. yRD(t) represents the continuous-time signal received at the second time slot from node R to node D. . Moreover, yR[k] = yR[kTs] , k is an integer. To simplify the analysis, we assume that the BPSK (Binary Phase Shift Keying) modulation is adopted in the system, so that in each time slot we have yR[k] = yR(kTs) , yD[k] = yD(kTs) , yRD[k] = yRD(kTs) ∈ {-1, 1}2 [4]. Notice that, the analysis can also be extended to other modulation cases. The continuous-time signals received by node R and node D can be represented as follows:

Combining (15) and (16) with (17), we have

Then, (15) and (18) need to be solved. Specifically, compute sRD(t) by using (15), which represents the estimate of sb . Therefore, yRD(t) without interference in (18) can be expressed as:

If the BER of sb(t) (the estimate of sb(t) ) is Pb , we have additional estimation error eb[k - Δ1] =sb[k - Δ1] - sb[k - Δ1] ∈ {-2, 0, 2} according to (19),. For a given channel, the BER of the data from node S can be expressed as:

If the BPSK modulation Q (which is defined as: ) is uniformly distributed, in equation (20) the two elements of the right side are equal. So we have

According to (19), w(t) consists of three parts actually, due to the method of interference cancellation. Then, the error probability of w(t) also consists of three parts.

Here hRDz2(t) + z3(t) is AWGN (Additive White Gaussian Noise) with variance

Next, we define , then, means that function V just takes the real part. Therefore, the probability of V can be described by function Q(x) , where . The two elements in (23) also have similar expressions.

If we define then Ps(k) can be expressed as

Here

4.3 Improve the BER performance

To improve the BER performance of the proposed scheme, the decoding accuracy can be enhanced based on SISO (Soft-In Soft-Out) and iterative decoding, thus the error propagation can be mitigated in the presence of collisions. This section primarily introduces how to further reduce the BER, and how to manage the frequency offset and the sample offset problems that may arise in practical scenarios.

As shown in Fig. 4, at the first time slot, node D decodes packet Sb from the BS correctly. At the second time slot, node D receives the packet from node R, then, it compares the packet with the former one and makes the correlation to get the exact location of the collision point. Notice that, the correlation spikes when the correlated former message aligns with the same part in the second time slot message [14].

Fig. 4.The decomposition of the collision packet

If the length of Sb is M , we have which are exactly the same in fact. If we take interference and different route path into consideration, such two packets can be different. We can decode Sb with SISO and iterative decoding to reduce the BER. The process is shown in Fig. 5.

Fig. 5.The flow diagram for iterative decoding

Generally, the decoding process is similar with the Turbo code decoding. The Decoder1 decodes the first, and then the Decoder2 will take Decoder1's output LLR (Loglikelihood Ratio) as extrinsic information to decode . Similarly, the Decoder2 decodes , and then the Decoder1 will take Decoder2's output LLR as the extrinsic information to decode . The iteration is done until the difference between adjacent verdicts is small enough, they will output the final result.

The decoding process uses the time diversity characteristics of signal Sb to reduce the BER. This is also beneficial for other parts of the decoding.

In a practical system, the frequency of the transmitter and the receiver are not often completely uniform, so there is a problem of frequency offset. Frequency offset can result in a time-linear distortion increasing on phase, i.e., y[k] = Hx[k]ej2πkδfT + z[k] , so the receiver has to estimate δf for compensation.

In a time slot, frequency offset will not change dramatically. We can obtain the coarse estimate of the initial deviation from the part without collisions (like Ss at the duration Δ1 in Fig. 4) first. This coarse estimate is not sufficient because any residual error in the sub-packet will affect the next sub-packet and be accumulated in the linear phase distortions of the period. As a result, when we reconstruct the collision packet C (As shown in Fig. 4), ss[k], k ∈ { Δ1+1, Δ1+2,…N} ; sb[k], k ∈ { 1, 2,…Δ2} , we have to track the phase.

If we subdivide the part of collision (that is collision part in Fig. 4), as showed in Fig. 6, then the relationship between adjacent parts, i.e., the block of slash lines and the block of horizontal lines (at right side in Fig. 6) of the frequency offset can be estimated by the following formula:

Fig. 6.Part of the subdivision map for part of collision

We can use the tail of Sb (Fig. 4), which is interference-free to estimate δf1 and δϕ . The collision part of Sb can be estimated by the signal received by node D at the first time slot. The estimated packet sb is the block of horizontal lines. Then, compute the estimated value ss at the corresponding position in Ss ,which is the block of vertical lines in Fig. 6.Clearly, when node D estimating value ss , it does not know the frequency offset in Ss . The frequency offset in Ss can be estimated by the interference-free part in Ss by using (24). We can perform the reconstruction of Ss (the block of vertical lines)with the estimated value of the frequency offset. It can be brought into collision part to re-evaluate the block of slash lines. For the following parts, the method to deal with the white blocks is just like the method to deal with the block of slash lines and the block of horizontal lines before. As depicted in Fig. 7, we can step through the iterative manner to calibrate the deviation. Specifically, the iterative termination condition is that the difference between adjacent estimated values of the frequency offset is less than an extremely tiny value.

Fig. 7The flow diagram for iterative reconstruct data decoding

We have just described the way of the forward recovery process. Similarly, the recovery process of Ss can be done in the backward direction. The final output considers both forward and backward results of the recovery processes. The same principles and strategies can be used to solve the transmission problem of the sampling offset and the final result can take all of them into consideration.

 

5. Numerical Results

In this section, we compare the numerical results of the conventional scheme and the interference cancellation scheme. We focus on the normalized throughput, which is the ratio of the actual rate of correct data to the theoretically maximum data rate at certain duration. It is clear that a higher BER renders a lower throughput.

Fig. 8 shows the normalized total throughput, throughput of the BS (data from the BS to node D), throughput of D2D (data from node S to node D). The total throughput means the sum throughputs at node D of the data streams from the BS and node S. We can observe that the total throughput will increase when the SNR of the D2D link increases if the SNR of the BS is perfect (e.g., 20DB). When the throughput of the D2D link reaches its maximum value, the proposed scheme can reach a much higher total throughput. If the SNR of the D2D link is good enough (e.g., 20DB or more), the total throughput could reach 1. By contrast, the maximum total throughput of the conventional scheme is around 0.667. It is not difficult to understand why the proposed scheme can reach 1. When the channel condition is good, one half of the valid data comes from the BS (it sends one packet in one time slot and then keep silent for one time slot), the other one half of the valid data comes from node S (it sends one packet in two time slot). In the simulation, we assume that the BS and node S send the same amount of data, and each packet has a fixed length. For the conventional scheme, it has to send two packets at three time-slots even with a good channel condition, so it can just achieve 0.667 throughput as the SNR of the D2D link increases.

Fig. 8.Normalized throughputs of conventional scheme and interference cancellation scheme when the SNR of the BS is 20DB

In Fig. 9, we set the SNR of the BS to 14DB. In such situation, some data from the BS cannot be decoded correctly, thus the BER performance is average. The normalized throughput of the BS is below 0.4, which means that about 20% data had been re-transmitted. As the SNR of the D2D link increases, the proposed scheme performs much better than the conventional scheme. The ratio of maximum normalized throughputs of two schemes is 0.7911 to 0.627, which means the gains can up to 26% when the channel condition of the BS is medium.

Fig. 9.Normalized throughputs of conventional scheme and interference cancellation scheme when the SNR of the BS is 14DB

In Fig. 10, we set the SNR of the BS to 12DB. The throughput of the BS shows really unsatisfactory performance. In such situation, the proposed scheme loses its advantage. The reason lies in the fact that it is difficult for node D to decode the data from the BS, which means it is difficult to figure out the base data of the collision packet. Therefore, the node D cannot perform the interference cancellation effectively. We can find that it is not suitable to utilize the proposed scheme when the channel condition of the BS is bad.

Fig. 10.Normalized throughputs of conventional scheme and interference cancellation scheme when the SNR of the BS is 12DB

Finally, the relationship between the SNR and the BER of the data from node S to node D is illustrated in Fig. 11, where X-axis represents the SNR of data S and Y-axis represents the BER of data S. The blue curve represents that the SNR of the BS is -20DB. The red curve represents that the SNR of the BS is 0DB. The black curve represents that the SNR of the BS is 20DB.We could obtain that, when the SNR of the data from the BS is -20DB, pb (the BER of the data from the BS) varies from 0.4325 to 0.4667. The blue curve shows that the BER of data S is around 0.44. From the previous derivation, we know that the vibration range is related to the variance of the noise. A smaller variance shows a gradual decreasing trend. In this simulation, the variance of the noise does not change, and therefore the vibration range is substantially similar during the whole process. ps (the BER of data from node S) does not increase as the SNR of data S increases. However, it approaches a stable value as the SNR of data S increases. The red curve represents that node D receives the data from the BS when the SNR of the data from the BS is 0DB. At this time, pb approaches 0.10. We can find that, under such scenario, the BER of data S is related to both pb and ps . When the SNR of data S becomes larger, ps becomes smaller and approaches a stable value as the SNR of data S increases. From the previous derivation, we know that ps is related to pb at this time. Similar to the blue curve, the vibration range is related to the variance of the noise. The black curve represents that node D receives the data from the BS when the SNR of data from BS is 20DB. As the SNR of data S increases, ps approaches zero. Clearly, the numerical results are consistent with our theoretical derivations.

Fig. 11.The relationship between the SNR and the BER of the data from node S when they are decoded at node D, the blue line represents the case that the SNR of the BS is -20DB, the red line represents the case that the SNR of the BS is 0DB, the black line represents the case that the SNR of the BS is 20DB

In short, the simulation told us when the channel condition of the BS is good or not too bad, the proposed scheme performs much better than the conventional scheme. However, when the channel condition of the BS is really bad, the node D cannot perform the interference cancellation effectively.

 

6. Multi relay-forward case

Multi-hop relay-assisted D2D seems to be a field which is still untapped. In this section, we will discuss the proposed scheme applied to a multi-hop relay-assisted D2D case.

As illustrated in Fig. 12, the proposed scheme is applied to a multiple relay-assisted case. Specifically, before each forwarding behavior, each relay node is required to exclude the known interference of the previous relay node first, and then forwards the received data to the next relay node. Since the current relay could receive the packet from the BS, which is the interference at the former relay, the current relay has the condition to figure it out. That means the last packet from the BS received by the current relay can be excluded from the collision packet comes from the former relay.

Fig. 12.Multi relay-forward case

As illustrated in Fig. 13, it needs to eliminate the white part packet first since the relay can receive the complete white part packet. The correlation calculation can find the exact location in the collision packet, and it can be removed. In this case, if it needs k relay nodes to complete D2D communication, the conventional scheme takes k + 1 time slots to obtain the data from node S. By using the interference cancellation scheme, node D not only obtains one packet from node S in the k + 1 time slots but also obtains k packets from the BS.

Fig. 13.Collision packet in a multi relay-forward case

Considering the number of data packets transferred per unit time, the packets rate R, in conventional scheme:

By using the interference cancellation scheme:

compare (25) and (24) we have:

We can see that as K become larger, using the interference cancellation scheme will have greater improvement in relay-assisted D2D communication, under the condition that a certain level of BER is tolerable.

Thus, the total throughput of node D can be significantly increased.

 

7. Conclusions

In this paper, we have presented a scheme to improve the performance of the relay-assisted D2D communication system in cellular communication networks, with the help of ZigZag decoding and interference cancellation. The proposed scheme can guarantee that both cellular communication and D2D communication achieve higher total throughputs in the condition of good BS channel. Moreover, we have theoretically proved that the proposed scheme can achieve a satisfactory BER performance. Numerical results have verified the effectiveness of the proposed scheme compared to the conventional scheme.

References

  1. W. Xia, S. Shao, and J. Sun, “Relay selection strategy for device to device communication,” IET International Conference on Information and Communications Technologies (IETICT), pp. 318-323, 2013. Article(CrossRef Link)
  2. B. Kaufman and B. Aazhang, “Cellular networks with an overlaid device to device network,” Asilomar Conference on Signals, Systems and Computers, 2008, pp. 1537-1541. Article (CrossRef Link)
  3. J. C. F. Li, M. Lei, and F. Gao, “Device-to-device (D2D) communication in MU-MIMO cellular networks,” IEEE GLOBECOM, pp. 3583-3587, 2012. Article (CrossRef Link)
  4. X. Zhang and K. G. Shin, “DAC: distributed asynchronous cooperation for wireless relay networks,” IEEE INFOCOM, pp. 1-9, 2010. Article (CrossRef Link)
  5. A. Asadi, Q. Wang, and V. Mancuso, “A survey on device-to-device communication in cellular networks,” IEEE Communications Surveys & Tutorials. Article (CrossRef Link)
  6. K. Vanganuru, S. Ferrante, and G. Sternberg, “System capacity and coverage of a cellular network with D2D mobile relays,” IEEE MILCOM, pp. 1-6, 2012. Article (CrossRef Link)
  7. X. Ma, R. Yin, G. Yu, and Z. Zhang, “A distributed relay selection method for relay assisted device-to-device communication system,” IEEE PIMRC, pp. 1020-1024, 2012. Article (CrossRef Link)
  8. S. Wen, X. Zhu, Z. Lin, X. Zhang, and D. Yang, “Distributed resource management for device-to-device (D2D) communication underlay cellular networks,” IEEE PIMRC, pp. 1624-1628, 2013. Article (CrossRef Link)
  9. J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: efficient protocols and outage behavior,” IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3062-3080, 2004. Article (CrossRef Link) https://doi.org/10.1109/TIT.2004.838089
  10. C. Hucher and P. Sadeghi, “Embracing asynchronism: achieving cooperative diversity using Zigzag interference cancellation,” IEEE Transactions on Wireless Communications, vol. 11, no. 9, pp. 3240-3249, 2012. Article (CrossRef Link) https://doi.org/10.1109/TWC.2012.061912.111416
  11. S. Wen, X. Zhu, Y. Lin, Z. Lin, X. Zhang, and D. Yang, “Achievable transmission capacity of relay-assisted device-to-device (D2D) communication underlay cellular networks,” IEEE VTC Fall, pp. 1-5, 2013. Article (CrossRef Link)
  12. L. Wang, T. Peng, Y. Yang, and W. Wang, “Interference constrained D2D communication with relay underlaying cellular networks,” IEEE VTC Fall, pp. 1-5, 2013. Article (CrossRef Link)
  13. L. Wang, T. Peng, Y. Yang, and W. Wang, "Interference constrained relay selection of D2D communication for relay purpose underlaying cellular networks," in Proc. of International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp. 1-5, 2012. Article (CrossRef Link)
  14. G. Shyamnath and K. Dina, “ZigZag decoding: combating hidden terminals in wireless networks,” ACM SIGCOMM, 2008, pp. 159-170. Article (CrossRef Link)
  15. M. S. Rahman, Y. Li, and B. Vucetic, “An iterative Zigzag decoding for combating collisions in wireless networks,” IEEE Communications Letters, vol. 14, no. 3, pp. 242-244, 2010. Article (CrossRef Link) https://doi.org/10.1109/LCOMM.2010.03.092252
  16. M. Hasan and E. Hossain, “Distributed resource allocation for relay-aided device-to-device communication: a message passing approach,” IEEE Transactions on Wireless Communications. Article (CrossRef Link)
  17. P. Xie, L. Li, J. Zhu, J. Jin, and Y. Liu, “Cooperative spectrum leasing using parallel communication of secondary users,” KSII Transactions on Internet and Information Systems, vol. 7, no. 8, pp. 1770-1785, 2013. Article (CrossRef Link) https://doi.org/10.3837/tiis.2013.08.002
  18. D. Chen and G. Chang, “A survey on security issues of M2M communications in cyber-physical systems,” KSII Transactions on Internet and Information Systems, vol. 6, no. 1, pp. 24-45, 2012. Article (CrossRef Link) https://doi.org/10.3837/tiis.2012.01.002
  19. Y. Cao, X. Chen, T. Jiang, and J. Zhang, “SoCast: social ties based cooperative video multicast,” IEEE INFOCOM, 2014, pp. 415–423. Article (CrossRef Link)
  20. Y. Cao, T. Jiang, C. Wang, and L. Zhang, “CRAC: cognitive radio assisted cooperation for downlink transmissions in OFDMA-based cellular networks,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 9, pp. 1614–1622, 2012. Article (CrossRef Link) https://doi.org/10.1109/JSAC.2012.121004
  21. R. Cheng, C. Huang, and G. Cheng, "A D2D cooperative relay scheme for machine-to-machine communication in the LTE-A cellular network," in Proc. of International Conference on Information Networking (ICOIN), 2015, pp. 153-158. Article (CrossRef Link)
  22. Q. Ye, M. Al-Shalash, C. Caramanis, and J.G. Andrews, “Distributed resource allocation in device-to-device enhanced cellular networks,” IEEE Transactions on Communications, vol. 63, no. 2, pp. 441-454, 2015. Article (CrossRef Link) https://doi.org/10.1109/TCOMM.2014.2386874