Sei sulla pagina 1di 6

NOMA-based D2D Communications: Towards 5G

Jingjing Zhao∗ , Yuanwei Liu∗ , Kok Keong Chai∗ , Yue Chen∗ , Maged Elkashlan∗ , and Jesus Alonso-Zarate†
∗ Queen Mary University of London, London, UK
† Centre Tecnològic de Telecomunicacions de Catalunya (CTTC), Barcelona, Spain

Abstract—In this paper, a novel non-orthogonal multiple access was considered in which one base station (BS) was capable of
(NOMA)-based device-to-device (D2D) communications frame- communicating with 𝑀 randomly deployed users. In [8], the
work is proposed. A major novelty of the proposed framework fairness issue of NOMA networks was addressed with knowing
is that it introduces the new concept of “D2D group” which
utilizes NOMA transmission, enabling one D2D transmitter to different channel state information (CSI) at the BS. Considering
communicate with multiple D2D receivers simultaneously. Based the energy consumption issues, a new cooperative NOMA with
on the considered framework, a resource allocation optimization invoking wireless power transfer protocol was proposed in [9].
problem is formulated, where multiple D2D groups are allowed Inspired by the aforementioned potential benefits of NOMA,
to reuse the same subchannel. The objective of this work is we aim to investigate the promising application of NOMA
to maximize the system sum rate by satisfying the signal-
to-interference-plus-noise (SINR) constraints of both D2D and technology in the D2D communications in this paper. More
traditional cellular users. Note that the formulated problem is specifically, we propose a NOMA-based D2D communications
non-deterministic polynomial-time (NP) hard in nature, thus a framework. In this new framework, the proposed concept of
novel resource allocation algorithm based on the many-to-one two- “D2D group” means that one D2D transmitter is able to
sided matching theory is proposed for obtaining a suboptimal communicate with several D2D receivers via NOMA protocol,
solution. It is proved that the proposed algorithm converges to
a stable state within limited number of iterations. Numerical which is fundamentally different from the previous common
results illustrate that: i) the proposed algorithm is an effective used concept of “D2D pair”. Several D2D groups are allowed
approach for obtaining near-optimal performance with acceptable to reuse the same subchannel occupied by a cellular user to
complexity; and ii) the proposed NOMA-based D2D framework is improve the spectrum utilization. One of the common issues
capable of achieving promising gains over traditional orthogonal for both D2D and NOMA is the existence of interference
multiple access (OMA)-based D2D framework.
among users in the same subchannel. As such, considering
the interference management problem through investigating
I. I NTRODUCTION
effective resource allocation strategies is more than necessary.
Device-to-device (D2D) communications is considered as Note that allocating different D2D groups to different orthog-
one of the pieces of the fifth generation (5G) jigsaw puzzle in onal subchannels generally turns out to be a non-deterministic
order to improve spectral efficiency [1]. Driven by the potential polynomial-time (NP) hard problem. The computational prohi-
benefits of D2D communications, many works have been bition with performing exhaustive search motivates us to invoke
prompted recently under different scenarios [2–4]. Solution matching theory, which is a powerful tool for tackling this
approaches that allowed cellular devices and D2D pairs to share kind of combinatorial problems [10]. The main contributions
spectrum resources were proposed in [2], thereby improved of this work can be summarized as follows: 1) We formulate an
the spectral efficiency of traditional cellular networks. In [3], optimization problem of resource allocation for the proposed
the functions to facilitate D2D session setup and mechanisms NOMA-based D2D framework, aiming for maximizing the sys-
to control and limit the interference of D2D communications tem sum rate; 2) With the aid of matching theory, we propose
to the cellular network were illustrated. In [4], D2D spectrum an effective resource allocation algorithm for obtaining a stable
sharing and mode selection using a hybrid network model and many-to-one matching between D2D groups and subchannels;
a unified analytical approach were jointly studied. 3) It is demonstrated that the proposed algorithm is capable of
Apart from invoking D2D technique to improve the spec- converging to a stable state within limited rounds of interaction
tral efficiency of the wireless networks, another emerging and of achieving much lower complexity than a traditional com-
technique—non-orthogonal multiple access (NOMA)—is able binational allocation; and 4) Numerical results demonstrate that
to address the spectral efficiency enhancement issue, on the the proposed algorithm can achieve the near-optimal system
standpoint of realizing a new power dimension for multiple sum rate, and outperform the one-to-one matching algorithm. It
access. Having been included in 3GPP long term evolution is also shown that the NOMA-based D2D framework achieves
(LTE) [5], NOMA is regarded as one of the promising can- higher system sum rate and larger number of accessed users
didates in future 5G networks for its potential ability to than the OMA-based D2D framework.
significantly improve the spectral efficiency [6]. Different from
II. N ETWORK M ODEL
the conventional orthogonal multiple access (OMA) technique,
NOMA is capable of supporting users to share the same A. System Description
resource (e.g., time/frequency/code) with using different power In this work, we focus on a single-cell uplink transmission
level. In [7], a general downlink NOMA transmission scenario scenario, as illustrated in Fig. 1. We consider that 𝑀 cellular

978-1-5090-1328-9/16/$31.00 ©2016 IEEE


users, i.e. 𝒞 = {𝐶1 , ..., 𝐶𝑀 }, communicate with one BS in the
traditional cellular mode. Each cellular user 𝐶𝑚 is allocated …
in one subchannel 𝑆𝐶𝑚 ∈ 𝒮𝒞, 𝒮𝒞 = {𝑆𝐶1 , . . . , 𝑆𝐶𝑀 } and
all the subchannels are orthogonal with each other. There are
𝑁 D2D groups 𝒟 = {𝐷1 , . . . , 𝐷𝑛 , . . . , 𝐷𝑁 } communicating
underlaying cellular networks. Unlike the traditional D2D- ... DR1 DT1
DRLn
pair communications, we consider the 𝑛-th D2D transmit- DRk
...
ter 𝐷𝑇𝑛 communicates with a group of 𝐿𝑛 D2D receivers, ...
DRLn D2D Group D1
i.e., {𝐷𝑅1 , ..., 𝐷𝑅𝑘 , ..., 𝐷𝑅𝐿𝑛 }, simultaneously by applying DTn BS Reuse
DR1 Subchannel
NOMA transmission protocol, which introduces the concept of Reuse
Subchannel
“D2D group” (as shown in Fig. 1). In the NOMA-based D2D D2D Group Dn
framework, there exists three kinds of co-channel interference:
∙ The intra-group interference refers to the interference of Cellular User

superposition signals from the D2D transmitter in the same


Fig. 1: System model.
D2D group;
∙ The inter-group interference indicates the interference
from the D2D transmitters of other D2D groups that reuse distance from 𝐶𝑚 to the BS, and 𝑑𝑛,𝑏 is the distance from
2
the same subchannel; 𝐷𝑇𝑛 to the BS. 𝛼 is the path-loss exponent.
∙ Last, the cellular interference represents the interference
The received signal at the 𝑘-th, 𝑘 ∈ {1, ⋅ ⋅ ⋅ , 𝐿𝑛 } receiver
from the cellular user reusing the same subchannel. 𝐷𝑅𝑛,𝑘 in the 𝑛-th D2D group is given by
It is assumed that the cellular users and D2D transmitters
∑ 𝐿𝑛 √ √
are uniformly distributed in the cell. The 𝐿𝑛 receivers in each 𝑧𝑛,𝑘 =𝑓𝑛,𝑘 𝑎𝑛,𝑘′ 𝑃𝑑 𝑠𝑛,𝑘′ + 𝑃𝑐 ℎ𝑚,𝑛,𝑘 𝑥𝑚

D2D group are uniformly distributed within a disc with radius ∑ 𝑘 =1 √
𝑑𝑚𝑎𝑥 , and the origin of the disc is the corresponding 𝐷𝑇𝑛 . All + 𝜂𝑛∗,𝑛 𝑃𝑑 𝑔𝑛∗,𝑛,𝑘 𝑡𝑛∗ + 𝜁𝑛,𝑘 , (3)
𝑛∗∕=𝑛
channels are assumed to undergo quasi-static Rayleigh fading,
where the channel coefficients are constant for each channel. where 𝑎𝑛,𝑘′ denotes the power allocation coefficient for
We also assume that the perfect CSI is available at all D2D 𝐷𝑅𝑛,𝑘′ , and 𝑠𝑛,𝑘′ is the transmit signal from 𝐷𝑇𝑛 to 𝐷𝑅𝑛,𝑘′ .
and cellular users. 𝑓𝑛,𝑘 , ℎ𝑚,𝑛,𝑘 , and 𝑔𝑛∗,𝑛,𝑘 are the channel coefficients between
𝐷𝑇𝑛 and 𝐷𝑅𝑛,𝑘 , that between 𝐶𝑚 and 𝐷𝑅𝑛,𝑘 , and that
B. Channel Model between 𝐷𝑇𝑛∗ and 𝐷𝑅𝑛,𝑘 , respectively. 𝜁𝑛,𝑘 is the AWGN
We assume that each subchannel which is occupied by a at 𝐷𝑅𝑛,𝑘 with variance 𝜎 2 . 𝜂𝑛∗,𝑛 represents the presence of
cellular user can be reused by multiple D2D groups. As a interference, i.e., if D2D group 𝐷𝑛 and 𝐷𝑛∗ reuse the same
consequence, the received signal at the BS corresponding to subchannel, 𝜂𝑛∗,𝑛 = 1; otherwise, 𝜂𝑛∗,𝑛 = 0.
subchannel 𝑆𝐶𝑚 is given by For the NOMA-based D2D communications, without loss
√ ∑ √ of generality, it is assumed that all channels in D2D group
𝑦𝑚 = 𝑃𝑐 ℎ𝑚,𝑏 𝑥𝑚 + 𝜂𝑛,𝑚 𝑃𝑑 𝑔𝑛,𝑏 𝑡𝑛 + 𝜁𝑚 , (1) 2 2
𝐷𝑛 follows the order as ∣𝑓𝑛,1 ∣ ≤ ∣𝑓𝑛,2 ∣ ≤ ⋅ ⋅ ⋅ ≤ ∣𝑓𝑛,𝐿𝑛 ∣ .
2
𝑛
where 𝑥𝑚 and 𝑡𝑛 are the transmit signals of 𝐶𝑚 and 𝐷𝑇𝑛 , re- The power allocation coefficients of these NOMA users should
spectively. 𝜁𝑚 is the additive white Gaussian noise (AWGN) at follow the order as 𝑎𝑛,1 ≥ 𝑎𝑛,2 ≥ ⋅ ⋅ ⋅ ≥ 𝑎𝑛,𝐿𝑛 with
∑ 𝐿𝑛
the BS on subchannel 𝑆𝐶𝑚 with variance 𝜎 2 . 𝜂𝑛,𝑚 represents 𝑙=1 𝑎𝑛,𝑙 = 1. As a result, successive interference cancellation
the presence of interference, i.e., if 𝑆𝐶𝑚 is assigned to 𝐷𝑛 , (SIC) can be carried out at the users with stronger channels.
𝜂𝑛,𝑚 = 1; otherwise, 𝜂𝑛,𝑚 = 0. 𝑃𝑐 and 𝑃𝑑 are the transmit Assuming that 1 ≤ 𝑗 ≤ 𝑘 < 𝑖, the 𝑘-th user can decode the
power of the cellular users and D2D transmitters, respectively. message of the 𝑗-th user and treats the message of the 𝑖-th
In this paper, we assume that all the cellular users have the same user as interference. Specifically, the 𝑘-th user first decodes
transmit power and so do all the D2D transmitters. ℎ𝑚,𝑏 and the messages of all the (𝑘 − 1) users with lower channel gains,
𝑔𝑛,𝑏 are the channel coefficients including small-scale fading and then successively subtracts these messages to obtain its
and path-loss between 𝐶𝑚 and the BS, and that between 𝐷𝑇𝑛 own information. Therefore, according to the received signal
and the BS, respectively. expressed in (3), the received SINR at the 𝑘-th receiver in the
Based on (1), we obtain the received signal-to-interference- 𝑛-th D2D group to decode the information of the 𝑗-th receiver
plus-noise ratio (SINR) at the BS corresponding to 𝑆𝐶𝑚 as is given by
2 2
𝑃𝑐 ∣ℎ𝑚,𝑏 ∣ 𝑗 ∣𝑓𝑛,𝑘 ∣ 𝑃𝑑 𝑎𝑛,𝑗
𝛾𝑚 = ∑ , (2) 𝛾𝑛,𝑘 = 𝑖𝑛 + 𝐼 𝑜𝑢𝑡 + 𝐼 𝑐 + 𝜎 2
, (4)
2
𝜂𝑛,𝑚 𝑃𝑑 ∣𝑔𝑛,𝑏 ∣ + 𝜎 2 𝐼𝑛,𝑘 𝑛,𝑘 𝑛,𝑘
𝑛
∑𝐿 𝑛
where ∣ℎ𝑚,𝑏 ∣2 = ∣ℎ̂𝑚,𝑏 ∣2 (𝑑𝑚,𝑏
1 )
−𝛼
and ∣𝑔𝑛,𝑏 ∣2 = 𝑖𝑛
where 𝐼𝑛,𝑘
2
= ∣𝑓𝑛,𝑘 ∣ 𝑃𝑑 𝑖=𝑗+1 𝑎𝑛,𝑖 is the interference
𝑛,𝑏
𝑔𝑛,𝑏 ∣2 (𝑑2 )−𝛼 . Here, ℎ̂𝑚,𝑏 and 𝑔ˆ𝑛,𝑏 are small-scale fading
∣ˆ from the ∑ superimposed signals in the same D2D group,
2
with ℎ̂𝑚,𝑏 ∼ 𝒞𝒩 (0, 1) and 𝑔ˆ𝑛,𝑏 ∼ 𝒞𝒩 (0, 1). 𝑑𝑚,𝑏 1 is the 𝑜𝑢𝑡
𝐼𝑛,𝑘 = 𝑛∗∕=𝑛 𝜂𝑛∗,𝑛 𝑃𝑑 ∣𝑔𝑛∗,𝑛,𝑘 ∣ is the interference from
𝑐
∑ 2
other D2D groups, and 𝐼𝑛,𝑘 = 𝑚 𝜂𝑚,𝑛 𝑃𝑐 ∣ℎ𝑚,𝑛,𝑘 ∣ is the threshold. Constraint (8d) shows that the value of 𝜂𝑛,𝑚
2 should be either 0 or 1. It is indicated in (8e) that at most one
the interference from the cellular user. Here, ∣𝑓𝑛,𝑘 ∣ =
2( )−𝛼
∣𝑓ˆ𝑛,𝑘 ∣2 (𝑑𝑛,𝑘
2
3 )
−𝛼
, ∣𝑔𝑛∗,𝑛,𝑘 ∣ = ∣ˆ 𝑔𝑛∗,𝑛,𝑘 ∣ 𝑑𝑛∗,𝑛
5 , and subchannel can be allocated to each D2D group.
2 2 𝑚,𝑛,𝑘 −𝛼 The formulated problem is a mixed integer nonlinear pro-
∣ℎ𝑚,𝑛,𝑘 ∣ = ∣ℎ̂𝑚,𝑛,𝑘 ∣ (𝑑4 ) . Note that the 𝐿𝑛 -th receiver
of the 𝑛-th D2D group can decode the signals of all the other gramming (MINLP) problem [11], which is NP-hard to solve
receivers in the same group, thus the SINR is expressed as and exhaustive search yields prohibitive complexity. Therefore,
2 we invoke the many-to-one two-sided matching theory for
𝐿𝑛 ∣𝑓 𝑛 ∣ 𝑃𝑑 𝑎𝑛,𝐿𝑛
𝛾𝑛,𝐿 = 𝐼𝑛,𝐿 𝑜𝑢𝑡 𝑐 2 . To ensure that the 𝑘-th user can
𝑛 𝑛,𝑘 +𝐼𝑛,𝑘 +𝜎 obtaining a suboptimal solution of the formulated problem.
decode the 𝑗-th user’s signal, the following constraints should
𝑗 𝑡ℎ𝑟 𝑘 𝑡ℎ𝑟
be satisfied: 𝛾𝑛,𝑘 ≥ 𝛾𝑛,𝑗 and 𝛾𝑛,𝑘 ≥ 𝛾𝑛,𝑘 , ∀𝑘 ∈ {1, ..., 𝐿𝑛 }. B. Proposed Subchannel Allocation Algorithm Based on Many-
𝑡ℎ𝑟 𝑡ℎ𝑟
Here, 𝛾𝑛,𝑗 and 𝛾𝑛,𝑘 are the SINR thresholds for decoding the to-One Matching
received signals of 𝐷𝑅𝑗 and 𝐷𝑅𝑘 , respectively. The matching problem we formulate here is the many-to-
one two sided matching between D2D groups and subchannels.
C. Sum Rate
The set of D2D groups and subchannels can be regarded as
Based on (2) and (4), the rate for the 𝑚-th cellular user 𝐶𝑚 two opposite groups of selfish and rational players who try to
and the sum rate for the 𝑛-th D2D group 𝐷𝑛 are give by enhance their own benefits during the matching process. To
( ) proceed with proposing the subchannel allocation algorithm,
2
𝑃𝑐 ∣ℎ𝑚,𝑏 ∣
𝑅𝑚 = log2 1 + ∑ 2 , (5) we first introduce some notations and basic definitions for the
2
𝑛 𝜂𝑛,𝑚 𝑃𝑑 ∣𝑔𝑛,𝑏 ∣ + 𝜎 matching model.
and Definition 1: In the many-to-one matching model, a matching
( ) Ω is a function from the set 𝒮𝒞 ∪ 𝒟 into the set of all subsets
∑𝐿𝑛 −1 2
∣𝑓𝑛,𝑘 ∣ 𝑃𝑑 𝑎𝑛,𝑘
𝑅𝑛 = log2 1 + 𝑖𝑛 of 𝒮𝒞 ∪ 𝒟 such that 1) ∣Ω(𝐷𝑛 )∣ = 1, ∀𝐷𝑛 ∈ 𝒟, and Ω(𝐷𝑛 ) =
𝑘=1 𝑜𝑢𝑡 + 𝐼 𝑐 + 𝜎 2
𝐼𝑛,𝑘 + 𝐼𝑛,𝑘 𝑛,𝑘 𝐷𝑛 if Ω(𝐷𝑛 ) ∈ / 𝒮𝒞; 2) ∣Ω(𝑆𝐶𝑚 )∣ ≤ 𝑁 , ∀𝑆𝐶𝑚 ∈ 𝒮𝒞, and
( )
2 Ω(𝑆𝐶𝑚 ) = ∅ if 𝑆𝐶𝑚 is not matched to any D2D group; 3)
∣𝑓𝑛,𝐿 ∣ 𝑃𝑑 𝑎𝑛,𝐿𝑛
+ log2 1 + 𝑜𝑢𝑡 𝑛 𝑐 , (6) Ω(𝐷𝑛 ) = 𝑆𝐶𝑚 iff 𝐷𝑛 ∈ Ω(𝑆𝐶𝑚 ).
𝐼𝑛,𝑘 + 𝐼𝑛,𝑘 + 𝜎 2 D2D groups have preferences over individual subchannels,
respectively. As such, we can obtain the sum rate of all the just as in a one-to-one matching model, and subchannels have
cellular users and D2D groups as preferences {over subsets of 𝒟. Thus, the preference list is given}
∑𝑀 ( ∑𝑁 ) as: PL = P (𝐷1 ) , . . . , P (𝐷𝑁 ) , P† (𝑆𝐶1 ) , . . . , P† (𝑆𝐶𝑀 ) .
𝑅𝑠𝑢𝑚 = 𝑅𝑚 + 𝜂𝑛,𝑚 𝑅𝑛 . (7) Here, P(𝐷𝑛 ) is the preference list of 𝐷𝑛 over the individual
𝑚=1 𝑛=1
subchannels, and P† (𝑆𝐶𝑚 ) is the preference list of 𝑆𝐶𝑚 over
III. P ROBLEM F ORMULATION AND P ROPOSED sets of D2D groups. The preference lists of players are formed
O PTIMIZATION M ETHOD in descending order with respect to the preference values. For
In this section, we formulate the problem to maximize the D2D groups, the preference value over each subchannel
the sum rate by allocating proper subchannels for the D2D is the data rate of the D2D group. Thus, the relationship of
groups. To solve the formulated problem, a novel algorithm “prefer” for D2D groups can be expressed as

based on the many-to-one two-sided matching is proposed. The 𝑆𝐶𝑚 ≻𝐷𝑛 𝑆𝐶𝑚′ ⇔ 𝑅𝑛𝑚 > 𝑅𝑛𝑚 , (9)
theoretical analysis is provided to demonstrate the effectiveness ′
of the proposed algorithm. where 𝑅𝑛𝑚 and 𝑅𝑛𝑚 are the data rates of 𝐷𝑛 when it reuses
𝑆𝐶𝑚 and 𝑆𝐶𝑚′ , respectively. 𝑆𝐶𝑚 ≻𝐷𝑛 𝑆𝐶𝑚′ implies that
A. Problem Formulation 𝐷𝑛 prefers 𝑆𝐶𝑚 to 𝑆𝐶𝑚′ .
In order to maximize the sum rate given by (7), the opti- Next we define the preference values for subchannels over a
mization problem can be formulated as: set of D2D groups. Although we allow multiple D2D groups
to reuse the same subchannel, it is worth noticing that the sum
max𝜂𝑛,𝑚 𝑅𝑠𝑢𝑚 , (8a) rate on the latter term is deteriorated if the number of D2D
𝑘 𝑡ℎ𝑟 groups occupying it keeps increasing. This is due to the fact
𝑠.𝑡. 𝛾𝑛,𝑘 ≥ 𝛾𝑛,𝑘 , ∀𝑛 ∈ {1, ..., 𝑁 } , 𝑘 ∈ {1, ..., 𝐿𝑛 } , (8b)
that the co-channel interference enhances. Therefore, we define
𝑡ℎ𝑟
𝛾𝑚 ≥ 𝛾𝑚 , ∀𝑚 ∈ {1, ..., 𝑀 } , (8c) the preference values of subchannels on a set of D2D groups
as the sum rate of all the D2D groups and the corresponding
𝜂𝑛,𝑚 ∈ {0, 1} , ∀𝑛 ∈ {1, ..., 𝑁 } , ∀𝑚 ∈ {1, ..., 𝑀 } , (8d)
cellular user. If 𝑆𝐶𝑚 prefers the set of D2D groups 𝒮 to 𝒮 ′ ,

𝜂𝑛,𝑚 ≤ 1, ∀𝑛 ∈ {1, ..., 𝑁 } , (8e) the relationship between 𝒮 and 𝒮 ′ can be expressed as
𝑚 ∑ ∑
𝒮′
𝑡ℎ𝑟 𝑡ℎ𝑟 𝒮 ≻𝑆𝐶𝑚 𝒮 ′ ⇔ 𝑅𝑚 𝒮
+ 𝑅𝑛𝑚 > 𝑅𝑚 + 𝑅𝑛𝑚 , (10)
where 𝛾𝑛,𝑘 and 𝛾𝑚 are the SINR thresholds for the 𝑘-th
𝐷𝑛 ∈𝒮 𝐷𝑛 ∈𝒮 ′
receiver of the 𝑛-th D2D group and that for the 𝑚-th cellular

𝒮 𝒮
user, respectively. The constraints in (8b) and (8c) represent where 𝑅𝑚 and 𝑅𝑚 are the data rates of 𝐶𝑚 sharing the
that the SINR for D2D and cellular users should be larger than subchannel with the set of D2D groups 𝒮 and 𝒮 ′ , respectively.
Faced with a set 𝒮 of D2D groups, each subchannel 𝑆𝐶𝑚 can Algorithm 1 Matching Theory Based Subchannel Allocation
determine which subset of 𝒮 it would most prefer. Call this the (MTBSA)
choice of 𝑆𝐶𝑚 from 𝒮, and denote it by 𝐶ℎ𝑆𝐶𝑚 (𝒮). That is, 1: – Initialization Phase:
for any subset 𝒮 of 𝒟, the choice of 𝑆𝐶𝑚 is 𝐶ℎ𝑆𝐶𝑚 (𝒮) = 𝒮 ★ 2: Construct the preference lists for all D2D groups:
such that 𝒮 ★ ⊆ 𝒮, and 𝒮 ★ ≻𝑆𝐶𝑚 𝒮 ★★ for all 𝒮 ★★ contained in {P(𝐷1 ), ..., P(𝐷𝑁 )}.
𝒮. The subchannels’ preferences over sets of D2D groups have 3: Set up a list of unmatched D2D groups 𝒰 𝒟 containing
the property of substitutability, which is defined as follows. all the D2D groups that are not matched.
Definition 2: The preference of a subchannel 𝑆𝐶𝑚 over 4: – Matching Phase:
sets of D2D groups has the property of substitutability if, for 5: while 𝒰 𝒟 is not empty as well as the preference list for
any set 𝒮 that contains D2D group 𝐷𝑛 and 𝐷𝑛′ , if 𝐷𝑛 is in any D2D group in 𝒰 𝒟 is not empty do
𝐶ℎ𝑆𝐶𝑚 (𝒮), then 𝐷𝑛 is in 𝐶ℎ𝑆𝐶𝑚 (𝒮 ∖ {𝐷𝑛′ }). 6: for ∀𝐷𝑛 ∈ 𝒰 𝒟 do
A matching Ω can be improved upon by a pair (𝐷𝑛 , 𝑆𝐶𝑚 ) 7: 𝐷𝑛 proposes to the most preferred subchannel 𝑆𝐶𝑚∗ .
if 𝐷𝑛 and 𝑆𝐶𝑚 are not matched at Ω but would both prefer 8: Suppose that the current D2D groups occupying
if they are matched together, i.e. if Ω(𝐷𝑛 ) ∕= 𝑆𝐶𝑚 and if 𝑆𝐶𝑚∗ constitute the set 𝒮𝑚∗ .
𝑆𝐶𝑚 ≻𝐷𝑛 Ω(𝐷𝑛 ) and 𝐷𝑛 ∈ 𝐶ℎ𝑆𝐶𝑚 (Ω(𝑆𝐶𝑚 ) ∪ {𝐷𝑛 }). In 9: if there exists 𝒮 ⊆ 𝒮𝑚∗ ∪ {𝐷𝑛 }, and 𝐷𝑛 ∈ 𝒮
𝑡ℎ𝑟
this case, we also call (𝐷𝑛 , 𝑆𝐶𝑚 ) a blocking pair. We define satisfying that 𝒮 ≻𝑆𝐶𝑚∗ 𝒮𝑚∗ , 𝛾𝑚∗ ≥ 𝛾𝑚 ∗ , and
𝑘 𝑡ℎ𝑟
stable matching as the following. 𝛾𝑛′ ,𝑘 ≥ 𝛾𝑛′ ,𝑘 , ∀𝐷𝑛 ∈ 𝒮, ∀𝑘 ∈ {1, ..., 𝐿𝑛 } then
′ ′

Definition 3: A matching Ω is stable if it cannot be improved 10: Update 𝒮𝑚∗ = 𝒮;


upon by any individual player or any pair (𝐷𝑛 , 𝑆𝐶𝑚 ). 11: Remove 𝐷𝑛 from 𝒰 𝒟 and add all the D2D groups
Since the largest coalition it considers is a (𝐷𝑛 , 𝑆𝐶𝑚 ) pair, of {𝒮𝑚∗ ∪ {𝐷𝑛 }} ∖ 𝒮 into 𝒰 𝒟.
this is a definition of pairwise stability. It has been proved in 12: end if
[12] that, the set of stable matchings is always nonempty for 13: 𝐷𝑛 removes 𝑆𝐶𝑚∗ from the preference list.
matching models with substitutable preferences. 14: end for
15: end while
The work in [13] introduced an efficient algorithm, known
as the deferred acceptance (DA) algorithm which can find a
stable matching. Inspired by the DA algorithm, we propose
a distributed matching algorithm, i.e. MTBSA, between D2D 2) Convergence: As shown in MTBSA, the matching pro-
groups and subchannels, as shown in Algorithm 1. First, each cess ends when all the D2D groups are matched or the
D2D group 𝐷𝑛 , 𝐷𝑛 ∈ 𝒟 forms a descending order preference preference lists for all unmatched D2D groups are empty. In
list with respect to (9). Then each D2D group proposes to each round, every unmatched D2D group proposes to its most
its most preferred subchannel, and each subchannel decides to preferred subchannel who has not previously rejected it. In
accept or reject these proposals based on the preference values other words, each D2D group proposes to each subchannel
on the current set of D2D groups. In the subsequent steps, only once. After at most 𝑀 rounds, the preference lists for
each D2D group which received one or more rejections at the all D2D groups are empty, and no D2D group tends to make
previous steps proposes to its most preferred subchannel who any further proposals even though it is not matched with any
has not yet rejected it. The algorithm stops after any step where subchannel. Therefore, within limited number of rounds, the
all the D2D groups have been matched or the preference lists matching process converges to the final state which is stable.
for all the unmatched D2D groups are empty. 3) Complexity: For the optimal approach, the exhaustive
search needs to be performed on each subchannel. It is like
C. Analysis of The Proposed Algorithm that to partition an set with 1, 2, ..., 𝑁 elements into 𝑀 disjoint
subsets with the sizes with 𝑙1𝑛 , 𝑙2𝑛 , ..., 𝑙𝑀
𝑛
, respectively, where
𝑛 𝑛 𝑛
To evaluate the effectiveness of the proposed algorithm, the constraints 𝑙1 + 𝑙2 + ... + 𝑙𝑀 = 𝑛 should be satisfied.
we analyze the properties of MTBSA in terms of stability, Inspired by the multinomial theorem, the number of possible
convergence and complexity in this subsection. ways for allocating
( 𝑛 D2D ) groups∏to𝑀𝑀 identical subchannels
𝑛 𝑛
1) Stability: The final matching Ω∗ of MTBSA is a is given by 𝑙1 +𝑙2 +...+𝑙 𝑀
= 𝑛!/ 𝑚=1 𝑚 𝑙 !. Considering that
pairwise-stable matching. The proof is given as follows: all the subchannels are different in our scenario, the number
Proof: In MTBSA, each D2D group proposes to its most pre- of all the possible ways ∑ according ∏ to the exhaustive search
𝑁 𝑀 𝑛
ferred subchannel who has not previously rejected it. Assume can be expressed as 𝑀 ! 𝑛=1 𝑛!/ 𝑚=1 𝑙𝑚 !. Note that the
/ Ω∗ satisfying
that there exists a blocking pair (𝐷𝑛 , 𝑆𝐶𝑚 ) ∈ complexity of the exhaustive search is mainly determined by
that 1) 𝑆𝐶𝑚 ≻𝐷𝑛 Ω (𝐷𝑛 ), and 2) 𝐷𝑛 ∈ 𝐶ℎ𝑆𝐶𝑚 (Ω∗ (𝑆𝐶𝑚 ) ∪
∗ the largest number 𝑁 . As ( a consequence, we can obtain the
∏𝑀 𝑁 )
{𝐷𝑛 }). At some step of the algorithm where the matching was approximate results as 𝒪 𝑀 !𝑁 !/ 𝑚=1 𝑙𝑚 ! . For MTBSA, in
Ω, 𝐷𝑛 proposed to 𝑆𝐶𝑚 and was subsequently rejected, so the initialization phase, D2D groups need to set the preference
𝐷𝑛 prefers Ω(𝐷𝑛 ) to 𝑆𝐶𝑚 , and Ω is not improved upon by lists, for which the complexity is 𝒪(𝑁 𝑀 2 ). In the matching
the pair (𝐷𝑛 , 𝑆𝐶𝑚 ). Since 𝐷𝑛 and 𝑆𝐶𝑚 are arbitrary, Ω∗ is phase, each D2D group proposes at most 𝑀 times. There-
pairwise stable. fore, the total complexity of MTBSA is 𝒪(𝑁 𝑀 2 ). Similarly,
the complexity of the one-to-one matching algorithm is also
6
𝒪(𝑁 𝑀 2 ). It is seen that the complexity of MTBSA is quite Optimal

smaller than that of the exhaustive search when the number of MTBSA
One−to−one matching

Number of accessed D2D groups


5
D2D groups grows large. Table I summarizes the characteristics
of the exhaustive search, the MTBSA, and the one-to-one 4
matching algorithm, respectively. The comparison between the
complexity and performance are clearly illustrated. 3

TABLE I: Comparison Among Different Algorithms 2

Algorithm Exhaustive MTBSA One-to-one 1


( ) matching
𝑀 !𝑁 !
Complexity 𝒪 ∏𝑀 𝑁 𝒪(𝑁 𝑀 2 ) 𝒪(𝑁 𝑀 2 ) 0
𝑚=1 𝑙𝑚 ! 1 3 5 7 9 11
Total sum rate Optimal Near-optimal Low Number of D2D groups (N)
Number of accessed
D2D groups High High Low Fig. 2: Number of accessed D2D groups versus different
number of D2D groups in the network, with K=3.

IV. N UMERICAL R ESULTS AND D ISCUSSIONS


35
In this section, numerical results are provided to demon- Optimal
MTBSA
strate the performance of the proposed MTBSA algorithm. One−to−one matching

The specific parameters are summarized in Table II unless 30 Optimal (OMA)

Total sum rate (bits/(s*Hz))


Many−to−one matching (OMA)

otherwise specified. The performance of the exhaustive search One−to−one matching (OMA)

and the one-to-one matching based algorithm are provided 25


as benchmarks for comparison to show the effectiveness of
MTBSA. More particularly, the exhaustive search is capable of 20
achieving the upper bound of the sum rate. In the one-to-one
matching algorithm, one D2D group can use no more than one
15
subchannel, and one subchannel can only be allocated to one
D2D group. Additionally, the performance of the traditional
10
OMA-based D2D communications is illustrated in an effort 1 3 5 7 9 11
Number of D2D groups (N)
to demonstrate the potential benefits of the proposed NOMA-
based D2D framework. Fig. 3: Total sum rate versus different number of D2D groups
TABLE II: Simulation Parameters in the network, with K=3.

Cellular radius 40 m
Maximum distance between D2D pairs 5m This is because that with increasing 𝑁 , the probability of D2D
Cellular-user SINR threshold 1.8 dB
D2D-user SINR threshold 1.3 dB
groups with less interference to the cellular UEs being assigned
Transmission power of users 23 dBm to them increases, which leads to the larger number of accessed
Noise power -98 dBm D2D groups that can meet the SINR constraints of cellular UEs.
Path-loss exponent 4 This phenomenon is similar to the effect of multi-user diversity.
Number of subchannels 3
It is worth noting that with the increase of the number of D2D
groups in the network, the increasing rate of the number of
For simplicity, in the following simulation results, we assume accessed D2D groups becomes smaller due to the enhanced
that all the D2D groups have the same number of receivers, co-channel interference. One can also observe that the number
i.e., 𝐿𝑛 = 𝐾, ∀𝑛 ∈ {1, ..., 𝑁 }, and the power allocation for of accessed D2D groups can get saturated quickly in the one-
each receiver is fixed. In Fig. 2 to Fig. 4, we set 𝐾 = 3 and to-one matching algorithm. This is due to the fact that each
the corresponding power allocation coefficients as 𝑎1 = 0.5, subchannel can be allocated to no more than one D2D group.
𝑎2 = 0.3, and 𝑎3 = 0.2. In Fig. 5, we give three values of 𝐾: Fig. 3 plots the total sum rate versus different number of
1) 𝐾 = 2, where the power allocation coefficients are 𝑎1 = D2D groups in the network. One can observe that the sum rate
0.6, and 𝑎2 = 0.4; 2) 𝐾 = 3, where the power allocation increases with the number of D2D groups, which follows the
coefficients are 𝑎1 = 0.5, 𝑎2 = 0.3, and 𝑎3 = 0.2; and 3) intuition that more D2D groups contribute to a higher total sum
𝐾 = 4, where the power allocation coefficients are 𝑎1 = 0.4, rate. It is also observed that MTBSA achieves much higher
𝑎2 = 0.3, 𝑎3 = 0.2, and 𝑎4 = 0.1. sum rate compared to the one-to-one matching algorithm.
Fig. 2 shows that, the number of accessed D2D groups in- Meanwhile, MTBSA is capable of reaching around 95.8%
creases as the number of D2D groups in the network increases. of the optimal result. Recall the complexity of the proposed
algorithm, which is much lower than the exhaustive search,
16
unequivocally substantiates the plausibility of the proposed Optimal
MTBSA
algorithm. Fig. 3 also demonstrates that the NOMA-based D2D 14 One−to−one matching
Optimal (OMA)

Number of accessed receivers


framework achieves larger sum rate than the traditional OMA- 12 Many−to−one matching (OMA)
One−to−one matching (OMA)
based D2D framework. It is worth pointing out that the power
10
allocation among the D2D receivers is a key issue which will
significantly influence the network performance for delivering 8
higher sum rate. This problem is out of the scope of this paper
6
and will be included in our future work.
Fig. 4 plots the number of accessed receivers versus different 4

number of D2D groups in the network. It can be seen from the 2


figure that the number of accessed receivers in the MTBSA is
0
larger than that in the one-to-one matching algorithm. This is 1 3 5 7 9 11
Number of D2D groups (N)
because more than one D2D groups are allowed to be allocated
to one subchannel in the MTBSA, and thus the resource utiliza- Fig. 4: Number of accessed receivers versus different number
tion is improved. It is also noted that the NOMA-based D2D of D2D groups in the network, with K=3.
communications achieves a larger number of accessed D2D
receivers than the OMA-based D2D communications, which
further shows the merits of applying NOMA transmission 18
Optimal

protocol in D2D communications. MTBSA


One−to−one matching
Fig. 5 depicts the total sum rate versus different number 17.5

Total sum rate (bits/(s*Hz))


of receivers in each D2D group. It can be seen that the
sum rate increases as the number of receivers in each D2D 17
group increases. However, if the number of receivers in each
D2D group keeps increasing, the co-channel interference is 16.5
enhanced, and thus the sum rate and number of accessed D2D
groups may be deteriorated. Therefore, there exists an optimal
16
value of the number of receivers in each D2D group, which
can be a promising future research direction.
15.5
2 3 4
V. C ONCLUSION Number of receivers in each D2D group (K)

In this paper, the application of non-orthogonal multiple Fig. 5: Total sum rate versus different number of receivers in
access (NOMA) to the device-to-device (D2D) communications each D2D group, with N=3.
has been studied. A novel algorithm invoking many-to-one
matching theory has been proposed for tackling the subchan-
nel allocation problem in the considered NOMA-based D2D [5] Z. Ding and et al., “Application of non-orthogonal multiple access
framework. It was analytically demonstrated that the proposed in LTE and 5G networks,” IEEE Commun. Mag., submitted. [Online].
algorithm had a acceptable complexity of 𝒪(𝑁 𝑀 2 ), where a Available: http://arxiv.org/abs/1511.08610
[6] Y. Saito, A. Benjebbour, Y. Kishiyama, and T. Nakamura, “System-
stable matching between the D2D groups and subchannels was level performance evaluation of downlink non-orthogonal multiple access
obtained. Numerical results showed that the proposed algorithm (NOMA),” in Proc. IEEE Annual Symposium on Personal, Indoor and
achieved the near-optimal performance compared to the upper Mobile Radio Communications (PIMRC), London, UK, Sept. 2013.
[7] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance of non-
bound obtained by the exhaustive-search method. It was also orthogonal multiple access in 5G systems with randomly deployed users,”
shown that the proposed NOMA-based D2D framework out- IEEE Signal Process. Lett., vol. 21, no. 12, pp. 1501–1505, Dec. 2014.
performed the conventional OMA-based D2D framework. [8] S. Timotheou and I. Krikidis, “Fairness for non-orthogonal multiple
access in 5G systems,” IEEE Signal Process. Lett., vol. 22, no. 10, pp.
1647–1651, Oct. 2015.
R EFERENCES [9] Y. Liu, Z. Ding, M. Elkashlan, and H. V. Poor, “Cooperative non-
[1] J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. Soong, orthogonal multiple access with simultaneous wireless information and
and J. C. Zhang, “What will 5G be?” IEEE J. Sel. Areas Commun., power transfer,” IEEE J. Sel. Areas Commun., vol. 34, no. 4, Apr. 2016.
vol. 32, no. 6, pp. 1065–1082, Jun. 2014. [10] Y. Gu, W. Saad, M. Bennis, M. Debbah, and Z. Han, “Matching theory for
[2] G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Miklós, future wireless networks: fundamentals and applications,” IEEE Commun.
and Z. Turányi, “Design aspects of network assisted device-to-device Mag., vol. 53, no. 5, pp. 52–59, May 2015.
communications,” IEEE Commun. Mag., vol. 50, no. 3, pp. 170–177, [11] D. Bertsimas and J. N. Tsitsiklis, Introduction to linear optimization.
Mar. 2012. Athena Scientific Belmont, MA, 1997, vol. 6.
[3] K. Doppler, M. Rinne, C. Wijting, C. B. Ribeiro, and K. Hugl, “Device-to- [12] A. E. Roth and M. A. O. Sotomayor, Two-sided matching: A study in
device communication as an underlay to LTE-advanced networks,” IEEE game-theoretic modeling and analysis. Cambridge University Press,
Commun. Mag., vol. 47, no. 12, pp. 42–49, Dec. 2009. 1992, no. 18.
[4] X. Lin, J. G. Andrews, and A. Ghosh, “Spectrum sharing for device- [13] D. Gale and L. S. Shapley, “College admissions and the stability of
to-device communication in cellular networks,” IEEE Trans. Wireless marriage,” The American Mathematical Monthly, vol. 69, no. 1, pp. 9–15,
Commun., vol. 13, no. 12, pp. 6727–6740, Dec. 2014. Jan. 1962.

Potrebbero piacerti anche