1. Introduction
With the increasing popularity of intelligent terminal devices, the demand for wireless network resources continues to grow. Several initial technologies for 5G networks have been identified by industry experts, among which D2D communication is considered an effective solution to the shortage of spectrum resources [1]. D2D technology allows users to communicate directly within the cellular network without the need for base station relay. This approach helps to reduce base station load and can also improve spectrum efficiency through reuse of radio resources. However, D2D technology also introduces co-channel interference between cellular and D2D links, which presents new challenges for interference suppression strategies [2], [3].
As another method for improving network spectrum efficiency, NOMA technology has also attracted the attention of researchers, opening up new directions for large-scale network access with its unique power domain multiplexing technology. Unlike traditional Orthogonal Multiple Access (OMA) techniques [4]-[8], NOMA allows multiple users to share the same resource block. In NOMA, user signals are multiplexed using superposition coding at the transmitter and demultiplexed using successive interference cancellation (SIC) at the receiver. This improves rate, user fairness, and scheduling flexibility while reducing intra-user interference caused by multiplexing. Therefore, NOMA is considered one of the key technologies for future mobile communication networks [9]-[21].
1.1 Related Work
In recent years, the combined application of NOMA and D2D has received extensive attention [9]-[14]. Generally, the resource allocation model that combines NOMA and D2D can be divided into two categories. The first category is NOMA groups composed of cellular users and D2D pairs [9]-[11]. The second category is D2D NOMA groups consisting of Device Transmitter (DT) and multiple Device Receivers (DRs) [12]-[14].
In the first category, NOMA is generally used for uplink cellular users and D2D communication. Reference [9] proposes a D2D-interlay communication mode that adopts a graph-based multi-mode selection and channel allocation strategy in the NOMA-D2D system. This mode supports power domain multiplexing of user signals and eliminates strong interference between D2D and cellular users through SIC decoding. Reference [10] proposes a convex approximation algorithm to solve the channel allocation and power control problems and designs a convolutional neural network algorithm to reduce computational complexity. Unlike references [9]-[11] applies the SIC scheme to both the Base Station (BS) and D2D receivers to further reduce co-channel interference.
In the second category, NOMA is only used in D2D NOMA groups. Reference [12] proposes the concept of D2D NOMA groups. Unlike traditional D2D pairs, the D2D transmitters in D2D NOMA group can use NOMA technology to communicate with multiple receivers using the same resources, thereby improving spectrum efficiency. Reference [13] establishes a three-dimensional matching game model for joint user group association and sub-carrier allocation and optimizes the power of D2D using branch-and-bound techniques. In [14], the authors propose a DT-DR grouping scheme and then design resource allocation for cellular mobile users and D2D mobile groups using a many-to-many mapping scheme. Simulation in [14] shows that the pairing of DT and DR significantly affects resource allocation and thus the performance of the D2D system. Inspired by the advantages of user pairing, channel resource allocation and power control in improving system performance, we investigate a novel joint optimization scheme considering DT-DR paring based on greedy algorithm, sub-channel allocation and power allocation.
1.2 Contribution
Although the resource allocation problem for D2D communication underlaying cellular systems has been extensively studied in the existing literature, most of them are based on the assumption that D2D users have been paired. Therefore, this paper studies how to jointly optimize user pairing and wireless resource allocation to improve the system more effectively. Different from the existing work, DTs and DRs are matched into D2D NOMA group or D2D pair (collectively called the D2D) according to a given algorithm. By designing user grouping and resource allocation between D2D and cellular users (CUEs), we maximize the sum rate of the network while ensuring the minimum rate of CUEs. The main contributions of this paper are as follows:
1. We introduce a novel network model that allows for the simultaneous existence of D2D NOMA groups and D2D pairs. For D2D NOMA groups, each DT can communicate with multiple DRs simultaneously through the NOMA protocol, requiring fewer spectrum resources compared to the OMA model. Then, based on this model, a joint optimization problem is formulated to improve the system sum rate by introducing two types of 0-1 integer variables, one for the DT-DR user matching and the other for sub-channel assignment.
2. To solve the formulated mixed integer nonlinear optimization problem, we divide the problem into three sub-problems: DT-DR grouping, D2D sub-channel allocation, and DT power control. What’s more, We prove its convergence and stability theoretically.
3. For DT-DR grouping, we propose a greedy algorithm to find the appropriate matching relationship and improve DR access rates. Based on the maximum communication distance of DT-DR, each DT is paired with DR in the form of a NOMA group or a pair. When there is no DR within the range of DT, DT is treated as a cellular user for uplink transmission and will not reuse cellular user’s sub-channel.
4. When DT-DR grouping and DT transmission power are fixed, we convert the problem into a many-to-one matching problem. To maximize the total system rate, a D2D swap matching algorithm is proposed to reduce co-channel interference.
5. With fixed DT-DR grouping and sub-channel allocation, a power control scheme based on local search is designed to further improve the sum rate. In addition, we evaluate the performance of the proposed algorithm through simulations.
2. System Description
In this section, the system scenario and D2D communication model are introduced, and the optimization problem is formulated based on the interference analysis.
2.1 System Model
We consider a time-division duplex (TDD) NOMA-D2D uplink communication system, as shown in Fig. 1. The system model consists of one BS, I cellular users, J DTs, and F DRs. There are two combination modes of DT and DR, namely D2D NOMA group (i.e. one DT to two DRs) and D2D pair (i.e. one DT to one DR). We define \(\mathscr{I}=\{1,\ldots,i,\ldots,I\},\mathcal{J}=\{1,\ldots,j,\ldots,J\}\), \(\mathcal{F}=\{1,\ldots,f,\ldots,F\}, \mathcal{N}=\{1,\ldots,n,\ldots,N\}\) as the sets of CUEs, DTs, DRs, and RBs (Resource Blocks), respectively. We use \({\rho}\) to represent the pairing relationship between DT and DR. If the f-th DR is paired with the j-th DT, then \(\rho_{j,f}=1\), otherwise \(\rho_{j,f}=0\). We represent the pairing matrix of the j-th DT and DR as \(\beta_{j\times\mathcal{F}}=[\rho_{j,1},\ldots,\rho_{j,f},\ldots,\rho_{j,F}]\). Furthermore, we represent all DT-DR pairing matrices as \(\beta_{\mathcal{J}\times\mathcal{F}}=\left[\beta_{1\times\mathcal{F}},\ldots,\beta_{j\times\mathcal{F}},\ldots,\beta_{J\times\mathcal{F}}\right]^{\mathrm{T}}\). If \(\sum_{f=1}^F\rho_{j,f}=2\), DT and DRs are paired as a D2D NOMA group. Otherwise, if \(\sum_{f=1}^F\rho_{j,f}=1\), DT and DR are paired as a D2D pair.
2.2 SINR Analysis
1) SINR analysis for cellular users: In the uplink scenario, the signal received at the BS from the i-th cellular user on the n-th RB is given by:
\[\begin{equation*} y_{i,B}^{n}=|h_{i,B}^{n}|\sqrt{P_{i}}x_{i,B}^{n}+\sum_{j=1}^{J}\phi_{j,i}^{n}|h_{j,B}^{n}| \sqrt{P_{j}}x_{j,B}^{n}+\xi_{i,B}^{n} \tag{1} \end{equation*}\] |
where \(\phi\) identifies the RBs used by the user or not. If the i-th CUE and the j-th DT reuse the n-th RB, \(\phi_{j,i}^n=1\), otherwise \(\phi_{j,i}^n=0\). \(P_{i}\) and \(P_{j}\) represent the transmit power of i-th CUE and j-th DT, respectively. \(\xi_{i,B}^n\) is the Gaussian white noise. \(h_{i,B}^n\) denotes the channel gain from i-th CUE to BS on the n-th RB, which can be expressed as:
\[\begin{align} h_{i,B}^{n}=Gg_{i,B}^{n}\beta_{i,B}^{n}d_{i,B}^{-\theta} \tag{2} \end{align}\] |
where G is the path loss constant, \(g_{i,B}^n\) and \(\beta_{i,B}^n\) are the log-normal shadowing fading and small-scale fading respectively. \(d_{i,B}\) is the distance between i-th CUE and BS, \(\theta\) is the path loss exponent. Similarly, \(h_{j,B}^n\) is channel gain from j-th DT to BS on the n-th RB. Therefore, the SINR of the i-th CUE can be expressed as:
\[\begin{align} r_i^n=\frac{P_i|h_{i,B}^n|^2}{\sum_{j=1}^J\phi_{j,i}^nP_j\Big|h_{j,B}^n\Big|^2+N_0} \tag{3} \end{align}\] |
2) SINR analysis for D2D NOMA groups: In each D2D NOMA group, power signal reuse is achieved at the DT by using superimposed coding, while SIC is used at the DR to reduce intra-group interference. Specifically, the superimposed signal transmitted by DT can be represented as \(\alpha_{j,f_{s}}x_{j,f_{s}}^{n}+\alpha_{j,f_{w}}x_{j,f_{w}}^{n}\), where \(f_{s}\) and \(f_{w}\) represent the stronger DR and the weaker DR associated with the j-th DT, respectively. \(\alpha_{j,\epsilon}\) and \(x_{j,\epsilon}^n\) represent the power allocation coefficient and signal, respectively, where \(\epsilon=f_{s}\) or \(\epsilon=f_{w}\). If \(|h_{j,f_s}^n|>|h_{j,f_w}^n|\), the signal received at the DR \(f_{w}\) can be expressed as:
\[\begin{align} & y_{j,f_w}^n=\underbrace{\sqrt{P_j\alpha_{j,f_w}}\left|h_{j,f_w}^n\right|x_{j,f_w}^n}_{\text{Expected signal}}+\underbrace{\sqrt{P_j\alpha_{j,f_s}}\left|h_{j,f_s}^n\right|x_{j,f_s}^n+}_{\text{intra-group interference}\left(I_{j,f_w}^{in}\right)} \nonumber\\ & \underbrace{\sum_{j^{\prime}\neq j}^{J}\phi_{j^{\prime},j}^n\sqrt{P_{j^{\prime}}}\left|h_{j^{\prime},j,f_{w}}^n\right|x_{j^{\prime},j,f_{w}}^n}_{\text{Cochannel interference}\left(I_{j,f_{w}}^{out}\right)}+\underbrace{\phi_{j,i}^n\sqrt{P_{i}}\left|h_{i,j,f_{w}}^n\right|x_{i,j,f_{w}}^n}_{\text{CUE interference}(I_{j,f_{w}}^c)} \nonumber\\ & +\xi_{j,f_w}^n \tag{4} \end{align}\] |
The five terms on the right side of Eq. (4), from left to right, are the expected signal, the intra-group interference signal, the co-channel interference signal from other DTs, the co-channel interference from the cellular user and the Gaussian white noise \(\xi_{j,f_{w}}^{n}\). Hence, the SINR of the DR \(f_{w}\) can be expressed as:
\[\begin{align} r_{j,f_{w}}^{n}=\frac{|h_{j,f_{s}}^{n}|^{2}P_{j}\alpha_{j,f_{s}}}{I_{j,f_{w}}^{in}+I_{j,f_{w}}^{out}+I_{j,f_{w}}^{c}+N_{0}} \tag{5} \end{align}\] |
The interference cancellation is successful if DR \(f_{s}\) received SINR for DR \(f_{w}\)’s signal is not smaller than the received SINR at DR \(f_{w}\) for its own signal [12], that is:
\[\begin{align} \frac{|h_{j,f_s}^n|^2P_j\alpha_{j,f_s}}{I_{j,f_s}^{in}+I_{j,f_s}^{out}+I_{j,f_s}^c+N_0}\geq\frac{|h_{j,f_w}^n|^2P_j\alpha_{j,f_w}}{I_{j,f_w}^{in}+I_{j,f_w}^{out}+I_{j,f_w}^c+N_0} \tag{6} \end{align}\] |
(6) can be rewritten as:
\[\begin{align} & Q_j(\phi)\hat{=}|h_{j,f_s}^n|^2\alpha_{j,f_s}\big(I_{j,f_w}^{in}+I_{j,f_w}^{out}+I_{j,f_w}^c+N_0\big)-\nonumber\\ & |h_{j,f_w}^n|^2\alpha_{j,f_w}(I_{j,f_s}^{in}+I_{j,f_s}^{out}+I_{j,f_s}^c+N_0)\geq0 \tag{7} \end{align}\] |
\(Q_j(\phi)\) indicates succcessful SIC. By SIC, the stronger DR removes intra-group interference and decodes its own information successfully, so the SINR of DR \(f_{s}\) can be expressed as:
\[\begin{align} r_{j,f_{s}}^{n}=\frac{|h_{j,f_{w}}^{n}|^{2}P_{j}\alpha_{j,f_{w}}}{I_{j,f_{w}}^{out}+I_{j,f_{w}}^{c}+N_{0}} \tag{8} \end{align}\] |
3) SINR analysis for D2D pairs: For traditional D2D pairs, DRs receive interference from cellular users and other DTs on the same RB, so the SINR of the f-th DR can be expressed as:
\[\begin{equation*} r_{j,f}^{n}=\frac{|h_{j,f}^{n}|^{2}P_{j}\alpha_{j,f}}{\Sigma_{j^{\prime}\neq j}^{J}\phi_{j^{\prime},j}^{n}|h_{j^{\prime},j,f}^{n}|^{2}P_{j^{\prime}}+\phi_{j,i}^{n}|h_{i,j,f}^{n}|^{2}P_{i}+N_{0}} \tag{9} \end{equation*}\] |
2.3 Problem Description
According to Shannon Theory and (3), the data rate of the i-th CUE is given by:
\[\begin{align} R_i^n=log_2(1+r_i^n) \tag{10} \end{align}\] |
From (5) and (8), the total rate of DRs in the D2D NOMA group mode can be obtained as:
\[\begin{align} R_{j,f_{s}+f_{w}}^{n}=log_{2}\big(1+r_{j,f_{s}}^{n}\big)+log_{2}\big(1+r_{j,f_{w}}^{n}\big) \tag{11} \end{align}\] |
Similarly, the data rate of the f-th DR in D2D pair mode can be expressed as:
\[\begin{align} R_{j,f}^n=log_2(1+r_{j,f}^n) \tag{12} \end{align}\] |
Therefore, the sum rate of CUEs and the sum rate of DRs in D2D NOMA group mode are given by:
\[\begin{align} R_i=\sum_{n=1}^NR_i^n \tag{13} \end{align}\] |
and
\[\begin{align} R_{f_s+f_w}=\sum_{n=1}^N\sum_{j=1}^Jm_jR_{j,f_s+f_w}^n \tag{14} \end{align}\] |
respectively. Here, \(m_j\) indicates whether the D2D user is in D2D NOMA group mode or not. Specifically, for any \(j\in\mathcal{J}\), if \(\sum_{f=1}^{F}\rho_{j,f}=2\), then \(m_j=1\), otherwise \(m_j=0\). The sum rate of DRs in D2D pair can be obtained as follows:
\[\begin{align} R_f=\sum_{n=1}^N\sum_{j=1}^J\nu_j\mathrm{~}R_{j,f}^n \tag{15} \end{align}\] |
Here, \(\nu_{j}\) indicates whether the D2D user is in D2D pair mode. For any \(j\in\mathcal{J}\), if \(\sum_{f=1}^{F}\rho_{j,f}=1\), then \(\nu_j=1\), otherwise \(\nu_j=0\). Therefore, the sum rate of the system can be expressed as:
\[\begin{align} R_{i+f}(\rho,\phi,\alpha)=R_i+R_{f_s+f_w}+R_f \tag{16} \end{align}\] |
To maximize the sum-rate of the system while ensuring the minimum rate of CUEs, we formulate the optimization problem as:
\[\begin{align} &\max_{\rho,\phi,\alpha}R_{i+f}(\rho,\phi,\alpha) \tag{17} \\ \text{s.t.}& \sum_{j=1}^J\rho_{j,f}^n\leq1,\forall f\in\mathcal{F} \tag{17a} \\ &\rho_{j,f}\in\{0,1\},\forall j\in\mathcal{J},f\in\mathcal{F} \tag{17b}\\ &\sum_{f=1}^F\rho_{j,f}\in\{0,1,2\},\forall j\in\mathcal{J}\tag{17c}\\&Q_j(\phi)\geq0,\forall j\in\mathcal{J} \tag{17d}\\ &R_i^n>R_i^{n,min},\forall i\in\mathscr{I},n\in\mathcal{N}\tag{17e}\\ &\phi_{j,i}^n,\phi_{j^{\prime},j}^n\in\{0,1\}, && \nonumber \\ &\forall j\in\mathcal{J},f\in\mathcal{F},n\in\mathcal{N} \tag{17f} \\ &d_{j,f}<d_{\max},\forall j\in\mathcal{J},f\in\mathcal{F}\tag{17g} \\ &\alpha_{j,f}\geq0,\alpha_{j,f_s}\geq0,\alpha_{j,f_w}\geq0, && \nonumber\\ &\forall j\in\mathcal{J},f,f_{s,},f_w\in\mathcal{F} \tag{17h} \\ &\alpha_{j,f_s}+\alpha_{j,f_w}\leq1, && \nonumber\\ &\forall j\in\mathcal{J},f_{s,},f_w\in\mathcal{F} \tag{17i}\end{align}\] |
The constraint (17a) indicates that each DR can be assigned to at most one DT. (17b) represents the integer constraint on the DT-DR pairing identifier. Constraint (17c) means that each DT can be paired with DR to form a D2D NOMA group, D2D pair, or perform OMA transmission. Constraint (17d) ensures successful SIC at stronger DR in D2D NOMA groups. Constraint (17e) guarantees the minimum rate of CUEs. Constraint (17f) ensures each CUE and D2D can only use one RB. Constraint (17g) represents the maximum constraint value for the distance between DTs and DRs. Constraint (17h) is the non-negative constraint for the DT power allocation coefficient. Constraint (17i) represents the transmission power constraint of DTs.
3. Sum-Rate Optimization Scheme
Due to the presence of binary and continuous variables, the optimization problem (17) is a MINLP problem and cannot be solved directly. Therefore, we convert this problem into three sub-problems: DT-DR grouping, D2D channel allocation, and DT power allocation. For DT-DR grouping, we match DRs and DTs into D2D NOMA group or D2D pair by greedy algorithm, with the goal of maximizing the DR access rate. To solve the D2D channel allocation problem, we exchange D2D channels to reduce intra-layer and inter-layer interference based on matching game theory. Finally, in the phase of power allocation, a local power search algorithm is designed to optimize the DT’s transmission power.
3.1 DT-DR Grouping
In this sub-section, we optimize the binary variables \(\rho_{j,f}\) with fixed channel allocation and power allocation factors, and rewrite the optimization problem of (17) as:
\[\begin{align} \max_\rho R_{i+f}(\rho)\quad\text{s.t. (17a)-(17c), (17g)} \tag{18} \end{align}\] |
To solve problem (18), we pair DRs and DTs into D2D NOMA groups or D2D pairs by greedy algorithm, as shown in Algorithm 1. Firstly, each DT obtains the list of all DRs that can be paired with it within the range of \(d_{max}\). We give priority to pairing DTs with lists of length greater than or equal to 2. Next, the two DRs with the highest rate are selected and paired with the corresponding DT. DTs and DRs that are successfully paired do not participate in subsequent pairing. This pairing process does not stop until all DT lists are less than 2 in length. For the remaining DTs, if the length of the DT list is 1, the DT is paired with its corresponding DR to form the D2D pair. If the length of the DT list is 0, the DT is treated as a cellular user for uplink transmission. If the DR is not paired with any DT, it will perform OMA transmission.
3.2 Sub-Channel Allocation for D2D Users
In the previous section, the parameter \({\rho}\) is optimized, i.e., DTs and DRs are paired into D2D NOMA group or D2D pair. In this section, we optimize the D2D channel with fixed DT power. The optimization problem of (17) is rewritten as:
\[\begin{align} \max_\phi R_{i+f}(\phi)\quad \text{s.t. (17d)-(17f)} \tag{19} \end{align}\] |
In order to solve the 0-1 integer programming problem (19), we propose a swap matching algorithm to reduce the cross-layer co-channel interference between CUEs and D2D users, while reducing the co-layer interference between D2D users. Let \(\textbf{X}_{\mathscr{I}\times\mathcal{J}}\) be the sub-channel matching matrix, \(\mathrm{D2D}_j\) is the \(j\)-th D2D pair or D2D NOMA group that has been paired successfully. Each CUE is assigned a sub-channel in advance, if \(\mathrm{D2D}_j\) multiplexes \(i\)-th CUE’s channel, then the \(i\)-th row and the \(j\)-th column of \(\textbf{X}_{\mathscr{I}\times\mathcal{J}}\) is 1, otherwise, it’s 0. The utility function of \(\mathrm{D2D}_j\) is denoted as \(u_{j}(\mathbf{X})\), which represents the sum rate of DRs with \(\mathrm{D2D}_j\) in the matching state X. The utility function of the n-th RB is denoted as \(u_{n}(\mathbf{X})\), which represents the sum rate over the n-th RB in the matching state X. The swap-matching algorithm is defined as follows:
Definition: For a matching X, the corresponding matching set is denoted as \(\begin{aligned}M_X=\{(j,n)\}\end{aligned}\), where the matching pairs \(i\)-th CUE and \(\mathrm{D}2\mathrm{D}_j\) satisfy \(\phi_{j,i}^n=1\). For any two elements \((j,n),(j^{\prime},n^{\prime})\in M_X\), we denote the matching matrix after swapping as \(\mathbf{X^{\prime}}\) and the corresponding matching set is \(M_{X{\prime}}\), which is defined as \(M_{X'}=M_X\cup\{(j,n^{\prime}),(j^{\prime},n)\}\backslash\{(j,n),(j^{\prime},n^{\prime})\}\). It is worth noting that swap matching is only performed when certain conditions are satisfied in order to effectively improve system performance.
Exchange condition: For an existing matching X, where \(\phi_{j,i}^n=1\) and \(\phi_{j',i'}^{n'}=1\), D2D users \({(j,j^{\prime})\in\mathcal{J}}\) are allowed to be exchanged if and only if the following two constraints are satisfied.
1) \(\forall j,j^{\prime},n,n^{\prime}\), we have \(u_j(\mathbf{X}^{\prime})\geq u_j(\mathbf{X})\), \(u_{j\prime}(\mathbf{X}^{\prime})\geq u_{j\prime}(\mathbf{X})\) and \(u_n(\mathbf{X}')+u_{n'}(\mathbf{X}')\geq u_n(\mathbf{X})+u_{n'}(\mathbf{X})\).
2) \(\exists j,j^{\prime},n,n^{\prime}\), s.t. \(u_j(\mathbf{X}^\prime)>u_j(\mathbf{X})\), \(u_{j\prime}(\mathbf{X}^{\prime})>u_{j\prime}(\mathbf{X})\) or \(u_n(\mathbf{X}^{\prime})+u_{n\prime}(\mathbf{X}^{\prime})>u_n(\mathbf{X})+u_{n\prime}(\mathbf{X})\) holds.
Constraint 1 indicates that the utility of participating users or RB should not be reduced in a swap operation, and constraint 2 indicates that the utility of at least one participating user or RB is improved after the exchange. If the above conditions hold, the exchange request of the D2D is allowed, otherwise the current matching remains unchanged. The D2D channel allocation process is described in Algorithm 2.
Notice that the final channel matching is a stable exchange matching. This is because, assuming that there still exists a D2D that satisfies the exchange condition in the last output matching state of Algorithm 2, the algorithm continues to iterate according to Algorithm 2. Therefore, there are no exchange pairs that satisfy the exchange condition in the final channel matching, and the algorithm reaches a stable state in the final channel matching. This also indicates that the initialization of the algorithm does not affect the final allocation result. Moreover, the exchange matching algorithm converges within a finite number of iterations. This is because exchange operations are only performed when the exchange condition is met. Furthermore, if \(u_j(\mathbf{X}^\prime)>u_j(\mathbf{X})\), \(u_{j\prime}(\mathbf{X}^{\prime})>u_{j\prime}(\mathbf{X})\) and \(u_n(\mathbf{X}^{\prime})+u_{n\prime}(\mathbf{X}^{\prime})>u_n(\mathbf{X})+u_{n\prime}(\mathbf{X})\) holds, it implies that the system throughput is not decreased. On the other hand, the number of users is limited, which indicates the number of swap operations is limited. Therefore, when the exchange operation stops, the sum rate of the system is saturated. In the next section, we will evaluate the convergence of Algorithm 2.
3.3 DT Power Allocation
In the previous two sections, we optimize the integer variable \(\rho\) and \(\phi\) by greedy algorithm and swap matching respectively, and obtain the optimized value \(\rho^{*}\) and \(\phi^{*}\). In this section, we further optimize the power allocation of DTs based on the given DT-DRs grouping and channel allocation, and decompose the power optimization into n subproblems where the power of DT is assigned in each RB separately. The original problem is rewritten as:
\[\begin{align} \max_\alpha R_{i+f}(\alpha)\quad\text{s.t. (17h), (17i)} \tag{20} \end{align}\] |
To solve the problem (20), we propose a local search algorithm to optimize the power of DTs. Define \(L_{n}\) as the number of D2Ds in \(n\)-th RB, the total power allocation vector of DTs is represented by \(P=[P_1,\ldots,P_j,\ldots,P_J]\), and \(P_j=[P_1,P_2,\ldots,P_{L_n}]\) is the power allocation vector of DTs in RB n. Denote the sum rate in \(n\)-th RB of the current step as \(\eta(\boldsymbol{P}_n)\), \(\eta^{\prime}(\boldsymbol{P}_n)\) is sum rate of the last power search in RB n, and \(\varepsilon\) indicates the iteration threshold. We solve the transmission power of DTs by \(P_j^*=\underset{P_j} {\operatorname*{\textit{argmax}}}\eta(\boldsymbol{P}_n)\), where the transmit power of other DTs is fixed. After \(P_j^*\) is obtained, we continue to optimize the intra-group power allocation of DT in the D2D NOMA group. The proposed power allocation algorithm based on local search is described in Algorithm 3.
4. Simulation Results and Analysis
Here, we analyze the performance of the proposed scheme for D2D-NOMA communication underlaying cellular systems by simulations. In the simulation, the BS is located at the origin, CUEs, DTs and DRs are randomly distributed between 20 m and 200 m from the BS [21], [22]. The path-loss is calculated by \(d^{-\theta}\) where \(d\) is the distance between the transmitter and the receiver [22]. The specific simulation parameters are shown in Table 1.
The five comparative algorithms are presented below, where all algorithms adopt the local search power allocation in Algorithm 3:
1. DGRA: The proposed Algorithm 4.
2. Greedy: joint GDGA and greedy channel allocation algorithm.
3. Random: joint GDGA and random channel allocation algorithm.
4. OMA swap: the DT-DR grouping algorithm employing the OMA model and channel allocation through swapping match algorithm.
5. OMA random: the DT-DR grouping algorithm employing the OMA model and random channel allocation algorithm.
Figure 2 illustrates that the proposed algorithm (DGRA) has the highest sum rate compared with the other four comparison algorithms. When the number of DTs is 10, the proposed algorithm outperforms the Greedy algorithm, random algorithm, OMA swap algorithm, and OMA random algorithm by 11.5%, 22.5%, 27.16% and 61.4%, respectively. It is also observed that when J=10, the sum rate of the random algorithm is higher than that of the OMA swap algorithm. This is because the random algorithm accesses more DRs by adopting NOMA. Although the OMA swap algorithm reasonably allocates resources, the achievable rate is still not good enough. Next, in order to verify the advantages of the proposed grouping algorithm in Algorithm 1, the required RB number and the spectrum utilization ratio are compared in Figs. 3-5. In the figures, GDGA is the proposed Algorithm 1, where DTs can form D2D pairs or D2D NOMA groups with DRs. In Case 1, DTs are only allowed to form D2D NOMA groups with DRs, while in case 2, DTs can only form D2D pairs with DRs. In both case 1 and case 2, the greedy algorithm is used during the DT-DR grouping stage.
Figure 3 illustrates that the CUE rate of our proposed algorithm decreases as the number of DTs increases, and the CUE rate is always greater than the threshold value we set, 2 bps/Hz. This shows that although the CUE rate decreases with increasing interference, the performance is still guaranteed.
Figure 4 plots the CDF of the required RBs (the required subchannel) in the network when J = 8 and F = 20, based on 1000 simulation results. It is observed that the RBs required by the proposed GDGA are significantly less than those required by case 1 and case 2, indicating the proposed model requires fewer spectrum resources. Therefore, GDGA has an absolute advantage compared with case1 and case 2 in the RB tight scenario, because it can accommodate more users to access the network.
Figure 5 illustrates the variation of the required RBs in the network with the increase of DRs. It can be observed that as the number of DRs increases, the required RBs also increase. This is because, after the pairing of DRs and DTs in algorithm 1, the number of idle DRs increases, requiring separate spectrum resources for transmission, hence increasing the required RBs. It also shows that the required RBs of our proposed GDGA is significantly lower than case 1 and case 2. Furthermore, compared to case 1, in the proposed model, after DTs and DRs are paired into the D2D NOMA group, the remained DT continues to be paired into D2D pair with the DRs within its range. The D2D pairs use the resources of CUE using multiplexing mode without occupying additional idle spectrum, which saving resources for the network.
Figure 6 plots the spectrum utilization ratio in three different scenarios. Here, the spectrum utilization ratio is defined as the total system rate (including DTs and DRs under OMA mode) divided by the total number of RBs occupied. It can be observed that the spectrum utilization ratio increases with the increase of the number of DTs. This is because as the number of DTs increases, the number of DRs under the multiplexing mode also increases, resulting in a decrease in the number of RBs occupied. When J=10, the proposed GDGA significantly outperforms the other two cases because more DRs are connected to DTs, and the CUE spectrum can be reused to access the network, resulting in a decrease in the total number of occupied RBs. Additionally, it is observed that the growth rate of case 1 and case 2 is relatively slow. This is because, although increasing DTs brings about the access gain of DRs, the pairing patterns of DT and DR in case 1 and case 2 are fixed, and the unpaired DTs and DRs occupy numerous idle RBs, resulting in low spectrum utilization.
Figure 7 shows the CDF of the number of exchange time in Algorithm 2, where F=20. It shows that the proposed exchange matching algorithm converges after a finite number of iterations. In addition, as J increases, the number of exchanges also increases, because the more D2D users there are, the more D2D users meet the exchange conditions.
Figure 8 shows the access number of D2D NOMA groups, D2D pairs, DRs of NOMA, and DRs of OMA with J=8. As the number of DRs to be connected increases, the access number increases except for the D2D pairs. This is because there are more DRs available to be selected for DTs within range. In order to increase the access rate of DRs, DT and DR are preferentially paired into D2D NOMA group, which leads to a corresponding decrease in the number of D2D pairs. It also shows that, the proposed new model with NOMA has a significantly higher DR access rate than the OMA model. This is because, in the NOMA model, DTs can pair with DRs to form D2D NOMA groups or D2D pairs, while in the OMA model, DTs can only pair with DRs to form traditional D2D pairs.
In Fig. 9, we compare the performance of the proposed LPSA in Algorithm 3, water-filling power control algorithm, no power control algorithm and random power control algorithm. It can be observed that the proposed LPSA power algorithm significantly improves the sum rate compared to the other three methods. When J=10, the performance of the proposed LPSA is 4.9%, 6.5%, and 7.1% higher than the water injection power control algorithm, random power control algorithm, and no power control algorithm, respectively.
5. Conclusion
This paper investigates the uplink wireless resource allocation problem in NOMA-D2D communication systems and proposes a system model that allows both D2D pairs and D2D NOMA groups to coexist. For the case where multiple D2D pairs can reuse the sub-channel of the cellular user, we propose a problem of maximizing the sum rate while ensuring the minimum rate of CUEs, where we focus on multi-variable design including user classification parameter, sub-channel allocation and power allocation. To address this problem, we propose a joint user grouping and resource allocation scheme. Specifically, we first use a greedy algorithm to pair DTs and DRs, and then use the exchange matching algorithm to find the optimal RB for D2D. Finally, the power of DT is optimized by the local power search algorithm. Simulation results show that the proposed scheme improves the spectrum utilization ratio and DR access rate significantly, and achieves a higher sum rate than the OMA scheme.
References
[1] R.M. Radaydeh, F.S. Al-Qahtani, A. Celik, K.A. Qaraqe, and M.S. Alouini, “Generalized imperfect D2D associations in spectrum-shared cellular networks under transmit power and interference constraints,” IEEE Access, vol.8, pp.182517-182536, 2020.
CrossRef
[2] G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Miklós, and Z. Turányi, “Design aspects of network assisted device-to-device communications,” IEEE Commun. Mag., vol.50, no.3, pp.170-177, 2012.
CrossRef
[3] J. Lee and J.H. Lee, “Performance analysis and resource allocation for cooperative D2D communication in cellular networks with multiple D2D pairs,” IEEE Commun. Lett., vol.23, no.5, pp.909-912, 2019.
CrossRef
[4] D. Feng, L. Lu, Y. Yuan-Wu, G.Y. Li, G. Feng, and S. Li, “Device-to-device communications underlaying cellular networks,” IEEE Trans. Commun., vol.61, no.8, pp.3541-3551, 2013.
CrossRef
[5] G. Yu, L. Xu, D. Feng, R. Yin, G.Y. Li, and Y. Jiang, “Joint mode selection and resource allocation for device-to-device communications,” IEEE Trans. Commun., vol.62, no.11, pp.3814-3824, 2014.
CrossRef
[6] L. Lei, Y. Kuang, N. Cheng, X. Shen, Z. Zhong, and C. Lin, “Delay-optimal dynamic mode selection and resource allocation in device-to-device communications ― Part II: Practical algorithm,” IEEE Trans. Veh. Technol., vol.65, no.5, pp.3491-3505, 2015.
CrossRef
[7] J. Liu, Y. Kawamoto, H. Nishiyama, N. Kato, and N. Kadowaki, “Device-to-device communications achieve efficient load balancing in LTE-advanced networks,” IEEE Wireless Commun., vol.21, no.2, pp.57-65, 2014.
CrossRef
[8] H. Nishiyama, M. Ito, and N. Kato, “Relay-by-smartphone: Realizing multihop device-to-device communications,” IEEE Commun. Mag., vol.52, no.4, pp.56-65, 2014.
CrossRef
[9] Y. Dai, M. Sheng, J. Liu, N. Cheng, X. Shen, and Q. Yang, “Joint mode selection and resource allocation for D2D-enabled NOMA cellular networks,” IEEE Trans. Veh. Technol., vol.68, no.7, pp.6721-6733, 2019.
CrossRef
[10] H. Sun, D. Zhai, Z. Zhang, J. Du, and Z. Ding, “Channel allocation and power control for device-to-device communications underlaying cellular networks incorporated with non-orthogonal multiple access,” IEEE Access, vol.7, pp.168593-168605, 2019.
CrossRef
[11] C. Ma, W. Wu, Y. Cui, and X. Wang, “On the performance of successive interference cancellation in D2D-enabled cellular networks,” 2015 IEEE Conference on Computer Communications (INFOCOM), pp.37-45, IEEE, 2015.
CrossRef
[12] J. Zhao, Y. Liu, K.K. Chai, Y. Chen, and M. Elkashlan, “Joint subchannel and power allocation for NOMA enhanced D2D communications,” IEEE Trans. Commun., vol.65, no.11, pp.5081-5094, 2017.
CrossRef
[13] I. Budhiraja, N. Kumar, and S. Tyagi, “ISHU: Interference reduction scheme for D2D mobile groups using uplink NOMA,” IEEE Trans. Mobile Comput., vol.21, no.9, pp.3208-3224, 2021.
CrossRef
[14] I. Budhiraja, N. Kumar, and S. Tyagi, “Cross-layer interference management scheme for D2D mobile users using NOMA,” IEEE Syst. J., vol.15, no.2, pp.3109-3120, 2020.
CrossRef
[15] L.P. Qian, Y. Wu, H. Zhou, and X. Shen, “Joint uplink base station association and power control for small-cell networks with non-orthogonal multiple access,” IEEE Trans. Wireless Commun., vol.16, no.9, pp.5567-5582, 2017.
CrossRef
[16] D. Zhai, R. Zhang, L. Cai, B. Li, and Y. Jiang, “Energy-efficient user scheduling and power allocation for NOMA-based wireless networks with massive IoT devices,” IEEE Internet Things J., vol.5, no.3, pp.1857-1868, 2018.
CrossRef
[17] B. Di, L. Song, Y. Li, and Z. Han, “V2X meets NOMA: Non-orthogonal multiple access for 5G-enabled vehicular networks,” IEEE Wireless Commun., vol.24, no.6, pp.14-21, 2017.
CrossRef
[18] Y. Pan, C. Pan, Z. Yang, and M. Chen, “Resource allocation for D2D communications underlaying a NOMA-based cellular network,” IEEE Wireless Commun. Lett., vol.7, no.1, pp.130-133, 2017.
CrossRef
[19] C. Kai, Y. Wu, M. Peng, and W. Huang, “Joint uplink and downlink resource allocation for NOMA-enabled D2D communications,” IEEE Wireless Commun. Lett., vol.10, no.6, pp.1247-1251, 2021.
CrossRef
[20] M.M. Al-Wani, A. Sali, S.D. Awad, A.A. Salah, Z. Ding, N.K. Noordin, S.J. Hashim, and C.Y. Leow, “Interference cancellation via D2D CSI sharing for MU-MISO-NOMA system with limited feedback,” IEEE Trans. Veh. Technol., vol.70, no.5, pp.4569-4584, 2021.
CrossRef
[21] S. Solaiman, L. Nassef, and E. Fadel, “User clustering and optimized power allocation for D2D communications at mmWave underlaying MIMO-NOMA cellular networks,” IEEE Access, vol.9, pp.57726-57742, 2021.
CrossRef
[22] C. Kai, H. Li, L. Xu, Y. Li, and T. Jiang, “Joint subcarrier assignment with power allocation for sum rate maximization of D2D communications in wireless cellular networks,“IEEE Trans. Veh. Technol., vol.68, no.5, pp.4748-4759, 2019.
CrossRef