ArticlePDF Available

Energy Efficient Resource Allocation in Machine-to-Machine Communications With Multiple Access and Energy Harvesting for IoT

Authors:

Abstract and Figures

This paper studies energy efficient resource allocation for a machine-to-machine (M2M) enabled cellular network with non-linear energy harvesting, especially focusing on two different multiple access strategies, namely non-orthogonal multiple access (NOMA) and time division multiple access (TDMA). Our goal is to minimize the total energy consumption of the network via joint power control and time allocation while taking into account circuit power consumption. For both NOMA and TDMA strategies, we show that it is optimal for each machine type communication device (MTCD) to transmit with the minimum throughput, and the energy consumption of each MTCD is a convex function with respect to the allocated transmission time. Based on the derived optimal conditions for the transmission power of MTCDs, we transform the original optimization problem for NOMA to an equivalent problem which can be solved suboptimally via an iterative power control and time allocation algorithm. Through an appropriate variable transformation, we also transform the original optimization problem for TDMA to an equivalent tractable problem, which can be iteratively solved. Numerical results verify the theoretical findings and demonstrate that NOMA consumes less total energy than TDMA at low circuit power regime of MTCDs, while at high circuit power regime of MTCDs TDMA achieves better network energy efficiency than NOMA. Index Terms-Internet of Things (IoT), machine-to-machine (M2M), non-orthogonal multiple access (NOMA), energy harvesting , resource allocation.
Content may be subject to copyright.
1
Energy Efficient Resource Allocation in
Machine-to-Machine Communications with Multiple
Access and Energy Harvesting for IoT
Zhaohui Yang, Wei Xu, Senior Member, IEEE, Yijin Pan, Cunhua Pan, and Ming Chen
Abstract—This paper studies energy efficient resource alloca-
tion for a machine-to-machine (M2M) enabled cellular network
with non-linear energy harvesting, especially focusing on two dif-
ferent multiple access strategies, namely non-orthogonal multiple
access (NOMA) and time division multiple access (TDMA). Our
goal is to minimize the total energy consumption of the network
via joint power control and time allocation while taking into
account circuit power consumption. For both NOMA and TDMA
strategies, we show that it is optimal for each machine type
communication device (MTCD) to transmit with the minimum
throughput, and the energy consumption of each MTCD is a
convex function with respect to the allocated transmission time.
Based on the derived optimal conditions for the transmission
power of MTCDs, we transform the original optimization prob-
lem for NOMA to an equivalent problem which can be solved
suboptimally via an iterative power control and time allocation
algorithm. Through an appropriate variable transformation, we
also transform the original optimization problem for TDMA to
an equivalent tractable problem, which can be iteratively solved.
Numerical results verify the theoretical findings and demonstrate
that NOMA consumes less total energy than TDMA at low circuit
power regime of MTCDs, while at high circuit power regime of
MTCDs TDMA achieves better network energy efficiency than
NOMA.
Index Terms—Internet of Things (IoT), machine-to-machine
(M2M), non-orthogonal multiple access (NOMA), energy har-
vesting, resource allocation.
I. INT ROD UC TI ON
Machine-to-machine (M2M) communications have been
considered as one of the promising technologies to realize
the Internet of Things (IoT) in the future 5th generation
network. M2M communications can be applied to many IoT
applications, which mainly involve new business models and
opportunities, such as smart grids, environmental monitoring
and intelligent transport systems [2]. Different from conven-
tional human type communications, M2M communications
have many unique features [3]. The unique features include
This work was supported in part by the National Nature Science Foundation
of China under grants 61471114, 61372106 & 61221002, in part by the
Six Talent Peaks project in Jiangsu Province under grant GDZB-005, in
part by the UK Engineering and Physical Sciences Research Council under
Grant EP/N029666/1, and in part by the Scientific Research Foundation of
Graduate School of Southeast University under Grant YBJJ1650. This paper
was presented at the IEEE Infocom Workshops 2017 in Atlanta, GA, USA
[1]. (Corresponding authors: Wei Xu; Cunhua Pan.)
Z. Yang, W. Xu, Y. Pan, and M. Chen are with the National Mobile
Communications Research Laboratory, Southeast University, Nanjing 210096,
China, (Email: {yangzhaohui, wxu, panyijin, chenming}@seu.edu.cn).
C. Pan is with the School of Electronic Engineering and Computer
Science, Queen Mary, University of London, London E1 4NS, U.K., (Email:
c.pan@qmul.ac.uk).
massive transmissions from a large number of machine type
communication devices (MTCDs), small bursty natured traffic
(periodically generated), extra low power consumption of
MTCDs, high requirements of energy efficiency and security.
A key challenge for M2M communications is access control,
which manages the engagement of massive MTCDs to the
core network. To tackle this challenge, various solutions have
been proposed, e.g., by using wired access (cable, DSL)
[4], wireless short distance techniques (WLAN, Bluetooth),
and wide area cellular network infrastructure (Long Term
Evolution-Advanced (LTE-A), WiMAX) [5]. Among all these
solutions, an effective approach is to deploy machine type
communication gateways (MTCGs) to act as relays of MTCDs
[3]. With the help of MTCGs, all MTCDs can be successfully
connected to the base station (BS) at the additional cost of
energy consumption [6]–[9]. To enable multiple MTCDs to
transmit data to the same MTCG, time division multiple access
(TDMA) was adopted in [10]. However, since there are a
vast number of MTCDs to be served, TDMA leads to large
transmission delay and synchronization overhead. By splitting
users in the power domain, non-orthogonal multiple access
(NOMA) can simultaneously serve multiple users at the same
frequency or time resource [11]. Consequently, NOMA based
access scheme yields a significant gain in spectral efficiency
over the conventional orthogonal TDMA [11]–[16]. This fa-
vorable characteristic makes NOMA an attractive solution for
supporting massive MTCDs in M2M networks. Considering
NOMA, [17] investigated an M2M enabled cellular network,
where multiple MTCDs simultaneously transmit data to the
same MTCG and multiple MTCGs simultaneously transmit
the gathered data to the BS.
Besides, another key challenge is the energy consumption of
MTCDs [18]–[20]. According to [3], the total system through-
put of an M2M network is mainly limited by the energy budget
of the MTCDs. To improve the system performance, energy
harvesting (EH) has been applied to wireless communication
networks [21]–[24]. In particular, direct and non-direct energy
transfer based schemes for EH were investigated in [23], while
in [24], the optimization of green-energy-powered cognitive
radio networks was surveyed. Recently, the downlink resource
allocation for EH in small cells was studied in [25]–[27]. By
using EH, MTCDs are able to harvest wireless energy from
radio frequency (RF) signals [28]–[31], and the system energy
can be significantly improved. Consequently, implementing
EH is promising in M2M communications especially with
MTCDs configured with low power consumption. In previous
2
wireless powered communication networks using relays [32]–
[34], it was assumed that an energy constrained relay node
harvests energy from RF signals and the relay uses that
harvested energy to forward source information to destination.
Due to the extra low power budget of MTCDs in M2M
communications, it is reasonable to let the MTCD transmit
data to an MTCG, and then the MTCG relays the information
while the MTCD simultaneously harvests energy from the
MTCG, which is different from existing works, e.g., [32]–[34].
Enabling the source node to harvest energy from the relay
node, a power-allocation scheme for a decode-and-forward
relaying-enhanced wireless system was proposed in [35] with
one source node, one relay node and one destination node.
The above-mentioned energy consumption models, consid-
ered in [1], [8]–[10], [17]–[19], [28]–[31], are only concerned
with the RF transmission power and ignore the circuit power
consumption of MTCDs and MTCGs. However, as stated in
[36], the circuit power consumption is non-negligible com-
pared to RF transmission power. Without considering the
circuit power consumption, energy saving can always benefit
from longer transmission time [37], [38]. While considering
the circuit power consumption which definitely exists in prac-
tice, the results vary significantly in that it can not be always
energy efficient for long transmission time due to the fact that
the total energy consumption becomes infinity as transmission
time goes infinity. Hence, it is of importance to investigate the
optimal transmission time when taking into account the circuit
power consumption in applications.
Given access control and energy consumption challenges in
M2M communications, both TDMA and NOMA based M2M
networks with EH are proposed in this work. The MTCDs first
transmit data to the corresponding MTCGs, and then MTCGs
transmit wireless information to the BS and wireless energy to
the MTCDs. To prolong the lifetime of the considered network,
the harvested energy for each MTCD is set to be no less
than the consumed energy in information transmission (IT)
stage. The main contributions of this paper are summarized as
follows:
We formulate the total energy minimization problem for
the M2M enabled cellular network with non-linear energy
harvesting (EH) model via joint power control and time
allocation. In the non-linear EH model, we consider the
receiver sensitivity, on which energy conversion starts
beyond a threshold. Besides, we explicitly take into ac-
count the circuit energy consumption of both MTCDs and
MTCGs. All theses factors are critical in practical appli-
cations which inevitably affect the system performance.
Specifically, the non-linear EH model leads to a non-
smooth objective function and non-smooth constraints,
and the circuit energy consumption affects the optimal
transmission time of the system.
For the NOMA strategy, we observe that: 1) it is optimal
for each MTCD to transmit with minimal throughput;
2) it is further revealed that the energy consumption of
each MTCD is a convex function with respect to the
allocated transmission time. Given these observations,
it indicates that a globally optimal transmission time
always exists that the optimal transmission time equals
the maximally allowed transmission time if it does not
exceed a quantified threshold derived in closed form.
To solve the original total energy minimization problem
for the NOMA strategy, we devise a low-complexity
iterative power control and time allocation algorithm.
Specifically, to deal with the non-smooth EH function, we
introduce new sets during which MTCDs can effectively
harvest energy. Given new sets, the EH function of
MTCDs can be presented as a continuous one. Moreover,
to deal with nonconvex objective function, nonconvex
minimal throughput constraints, and nonconvex energy
causality constraints, we transform these nonconvex ones
into convex ones by manipulations with the optimal
conditions. The convergence of the iterative algorithm is
strictly proved.
For the TDMA strategy, we verify that the two observa-
tions for NOMA are also valid. Although the original total
energy minimization problem for the TDMA strategy
is nonconvex, the problem can be transformed into an
equivalent tractable one, which can be iteratively solved
to its suboptimality. For the total energy minimization,
numerical results identify that NOMA is superior over
TDMA at small circuit power regime of MTCDs, while
TDMA outperforms NOMA at large circuit power regime
of MTCDs.
This paper is organized as follows. In Section II, we in-
troduce the system and power consumption model. Section III
and Section IV provide the energy efficient resource allocation
for NOMA and TDMA, respectively. Numerical results are
displayed in Section V and conclusions are drawn in Section
VI.
II. SY ST EM A ND POW ER CONSUMPTION MO DE L
A. System Model
Consider an uplink M2M enabled cellular network with
NMTCGs and MMTCDs, as shown in Fig. 1. Denote
the sets of MTCGs and MTCDs by N={1,·· · , N }
and M={1,·· · , M }, respectively. Each MTCG serves
as a relay for some MTCDs. Assume that the decode-and-
forward protocol [39] is adopted at each MTCG. Denote
Ji={Ji1+ 1,·· · , Ji}as the specific set of MTCDs served
by MTCG i∈ N, where J0= 0,JN=M,Ji=i
l=1 |Jl|,
and |·|is the cardinality of a set.1To reduce the receiver
complexity at the MTCG, the maximal number of MTCDs
associated to one MTCG is set as four. Obviously, we have
i∈N Ji=M.
B. NOMA Strategy
In time constraint T, each MTCD has some payloads to
transmit to the BS. By using superposition coding at the
transmitter and successive interference cancellation (SIC) at
1In this paper, we assume that MTCDs are already associated to MTCGs by
using the cluster formation methods for M2M communications, e.g., in [40]–
[43]. Joint optimization of cluster formation and resource allocation in M2M
communications with NOMA/TDMA and EH can certainly further improve
the performance, but we leave it in future work in order to focus on the power
control and time allocation in the current submission.
3
ĂĂ
MTCG 1 MTCG N
MTCD 2
MTCD 1
BS
MTCD M-1
MTCD M
Information transmission (IT)
Energy harvesting (EH)
M
Fig. 1. The considered uplink M2M enabled cellular network.
ĂĂ
t1
MTCDs
tN+1
T
MTCGsMTCDs
tN+K
MTCGs
ĂĂ
MTCD uplink IT
MTCG uplink IT & MTCD EH
t1
tN
Fig. 2. Time sharing scheme for NOMA strategy during one uplink
transmission period.
the receiver, multiple MTCDs (or MTCGs) can simultaneously
transmit signals to the corresponding receiver using NOMA.
To reduce the receiver complexity and error propagation due
to SIC, it is reasonable for the same resource to be multiplexed
by a small number (usually two to four) of devices [44]. Con-
sidering the receiver complexity at the BS, the sets of MTCGs
are further classified into multiple small clusters. For MTCGs,
the set Nis classified into Kclusters. Let K={1,2,·· · , K}
be the set of clusters. Denote Ik={Ik1+ 1,·· · , Ik}as
the specific set of MTCGs in cluster k∈ K, where I0= 0,
IK=N,Ik=k
l=1 |Il|, and |Ik| ≤ 4.2
Note that our major motivation of using NOMA is to
enhance the ability of serving more terminals simultaneously
[11]. However, the number of terminals occupying the same
resource cannot be arbitrarily large in order to make NOMA
effective in practice. Therefore, if there would be an even
higher number of IoT terminals, we believe that a number
of ways including NOMA should be further incorporated to
better address the access problem for higher number of IoT
terminals [47].
As depicted in Fig. 2, time Tconsists of N+Kuplink
transmission phases for MTCDs and MTCGs. NOMA is
adopted for MTCDs to transmit data to MTCGs in the first
Nphases. Both NOMA and EH are in operation in the
last K phases where MTCGs transmit data to the BS and
2A scheme for cluster formation for uplink NOMA is in [45]. According
to [45] and [46], one common scheme with two devices in each cluster is
the strong-weak scheme, i.e., the device with the strongest channel condition
is paired with the device with the weakest, and the device with the second
strongest is paired with one with the second weakest, and so on.
simultaneously MTCDs harvest energy from all MTCGs. In
the i-th (iN) phase with allocated time ti, all MTCDs
in Jisimultaneously transmit data to MTCG iaccording to
the NOMA principle and MTCG idetects the signal. In the
(N+k)-th (kK) phase with allocated time tN+k, all
MTCGs in Iksimultaneously transmit the decoded data from
the served MTCDs to the BS by using the NOMA strategy. As
a result, we have the following transmission time constraint
N+K
i=1
tiT. (1)
In the i-th (iN) phase, all MTCDs in Jisimultaneously
transmit data to MTCG ifollowing the NOMA principle. The
received signal of MTCG iis
yi=
Ji
j=Ji1+1
hij pjsj+ni,(2)
where hij is the channel between MTCD jand MTCG
i,pjdenotes the transmission power of MTCD j,sjis
the transmitted message of MTCD j, and nirepresents the
additive zero-mean Gaussian noise with variance σ2. Without
loss of generality, the channels are sorted as |hi(Ji1+1)|2
·· · ≥ |hiJi|2. By applying SIC to decode the signals [14]–
[16], the achievable throughput of MTCD j∈ Jiis
rij =Btilog21 + |hij |2pj
Ji
l=j+1 |hil|2pl+σ2,(3)
where Bis the available bandwidth for transmission. Note
that we consider the case where MTCDs associated to dif-
ferent MTCGs are allocated with orthogonal time resource.
Therefore, the interference from other MTCDs associated to
different MTCDs is ignored.
In the (N+k)-th (kK) phase with allocated time tN+k,
after having successfully decoded the messages in the last N
phases, MTCGs in Iksimultaneously transmit the gathered
data to the BS based on the NOMA principle. Denote the
channel between MTCG iand the BS by hi. Without loss
of generality, the channels are sorted as |hIk1+1|2≥ ·· · ≥
|hIk|2,k∈ K. Hence, the achievable throughput of MTCG
i∈ Ikcan be expressed as [14]–[16]
ri=BtN+ilog21 + |hi|2qi
Ik
n=i+1 |hn|2qn+σ2,(4)
where qiis the transmission power of MTCG i.
According to [3], MTCDs are always equipped with finite
batteries, which limit the lifetime of the M2M enabled cellular
network. To further prolong the lifetime, EH technology is
adopted for MTCDs to harvest energy remotely from RF
signals radiated by MTCGs [22]. Specifically, each MTCD
harvests energy when MTCGs transmit data to the BS. Since
the noise power is much smaller than the received power of
MTCGs in practice [48]–[50], the energy harvested from the
channel noise is negligible. Assume that uplink channel and
downlink channel follow the channel reciprocity [51]. The
4
0
Input RF power
Harvested power
Linear EH model
Non-linear EH model
0
P
Fig. 3. Comparison between the linear and non-linear EH model.
total energy harvested by MTCD jserved by MTCG ican
be evaluated as
EH
ij =
K
k=1
tN+ku
Ik
n=Ik1+1 |hnj |2qn
,i∈ N, j ∈ Ji,
(5)
where Ik
n=Ik1+1 |hnj |2qnis the received RF power of
MTCD jduring time tN+k, and function u(·)captures the EH
model which maps input RF power into harvested power. Two
commonly used EH models are shown in Fig. 3, i.e., linear
and non-linear EH models. According to [52] and [53], linear
EH model may lead to resource allocation mismatch. In order
to capture the effects of practical EH circuits on the end-to-
end power conversion, we adopt the more practical non-linear
EH model proposed in [52]:
u(x) = M(1+eab)
eab+ea(x2b)M
eab ,if xP0
0,elsewise ,(6)
where a,b,Mand P0are positive parameters which capture
the joint effects of different non-linear phenomena caused by
hardware constraints. Note that P0is the receiver sensitivity
threshold of each MTCD, in which energy conversion starts.
Hence, it is possible that some MTCDs cannot effectively
harvest energy in some slots, since the received power is below
the receiver sensitivity threshold P0.
The total energy consumption of the M2M enabled commu-
nication network consists of two parts: the energy consumed
by MTCDs and MTCGs. For each part, the energy consump-
tion of a transmitter consists of both RF transmission power
and circuit power due to hardware processing [54]. According
to [55], the energy consumption when MTCDs or MTCGs are
in idle model, i.e., do not transmit RF signals, is negligible.
During the i-th (iN) phase, MTCD j∈ Jiserved by
MTCG ijust transmits data to MTCG iwith allocated time
tiand transmission power pj. Thus, the energy Eij consumed
by MTCD j∈ Jican be modeled as
Eij =tipj
η+PC,i∈ N, j ∈ Ji,(7)
where η(0,1] and PCdenote the power amplifier (PA)
efficiency and the circuit power consumption of each MTCD,
respectively. According to the energy causality constraint in
EH networks, Eij has to satisfy Eij EH
ij . Summing the
energy consumed by all MTCDs in Ji, we can obtain the
energy Eiconsumed during the i-th phase as
Ei=
Ji
j=Ji1+1
Eij ,i∈ N.(8)
During the (N+k)-th phase, the system energy consump-
tion, denoted by EN+k, is modeled as
EN+k=
Ik
i=Ik1+1
tN+kqi
ξ+QC
N
i=1
Ji
j=Ji1+1
tN+ku
Ik
n=Ik1+1 |hnj |2qn
,(9)
where ξ(0,1] and QCare the PA efficiency and the circuit
power consumption of each MTCG, respectively. According
to the law of energy conservation [56], we must have
Ik
i=Ik1+1
tN+kqi
N
i=1
Ji
j=Ji1+1
tN+ku
Ik
n=Ik1+1|hnj |2qn
>0,
(10)
which is the energy loss due to wireless propagation.
Based on (5)-(9), the total energy consumption, ETot, of the
whole system during time Tcan be expressed as
ETot =
N+K
i=1
Ei
=
N
i=1
Ji
j=Ji1+1
tipj
η+PC
+
K
k=1
Ik
i=Ik1+1
tN+kqi
ξ+QC
K
k=1
N
i=1
Ji
j=Ji1+1
tN+ku
Ik
n=Ik1+1 |hnj |2qn
.(11)
C. TDMA Strategy
With the TDMA strategy, time Tconsists of M+Nuplink
transmission phases for MTCDs and MTCGs, as illustrated in
Fig. 4. All MTCDs transmit data to the corresponding MTCGs
in the first Mphases with TDMA, and all MTCGs transmit
the collected data to the BS in the last Nphases with TDMA.
Then, we obtain the following transmission time constraint
M+N
i=1
tiT. (12)
In the j-th (jM) phase, MTCD j∈ Jitransmits data to
its serving MTCG iwith achievable throughput
rij =Btjlog21 + |hij |2pj
σ2,i∈ N, j ∈ Ji.(13)
5
ĂĂ
t1
MTCD 1
tM+1
T
MTCG 1
tM
MTCD M
tM+N
MTCG N
ĂĂ
MTCD uplink IT
MTCG uplink IT & MTCD EH
Fig. 4. Time sharing scheme for TDMA strategy during one uplink
transmission period.
In the (M+i)-th phase, after having decoded all the messages
of its served MTCDs, MTCG itransmits the collected data to
the BS with achievable throughput
ri=BtM+ilog21 + |hi|2qi
σ2,i∈ N.(14)
Similar to (5), the total energy harvested of MTCD jserved
by MTCG iis
EH
ij =
N
n=1
tM+nu(|hnj |2qn),i∈ N, j ∈ Ji.(15)
According to (6), it is possible that some MTCDs cannot
effectively harvest energy in some slots, due to the fact that
the received power is below the receiver sensitivity threshold
P0.
As in (7) and (9), the energy consumption of a transmitter
includes both RF transmission power and circuit power [54].
With allocated transmission time tj, the energy Eij consumed
by MTCD j∈ Jican be modeled as
Eij =tjpj
η+PC,i∈ N, j ∈ Ji.(16)
With allocated transmission time tM+i, the system energy
consumption, denoted by EM+i, is modeled as
EM+i=tM+iqi
ξ+QC
N
n=1
Jn
j=Jn1+1
tM+iu(|hij |2qi),
(17)
where N
n=1 Jn
j=Jn1+1 tM+iu(qi|hij |2)is the energy har-
vested by all MTCDs during the transmission time tM+ifor
MTCG ito transmit data to the BS.
According to (15)-(17), the total energy consumption, ETot,
of the whole system during time Tcan be expressed as
ETot =
N
i=1
Ji
j=Ji1+1
Eij +
M+N
i=M+1
Ei
=
N
i=1
Ji
j=Ji1+1
tjpj
η+PC+
N
i=1
tM+iqi
ξ+QC
N
i=1
Ji
j=Ji1+1
N
n=1
tM+nu(|hnj |2qn).(18)
III. ENE RG Y EFFIC IE NT RESOURCE ALLOCATI ON F OR
NOMA
In this section, we study the resource allocation for an
uplink M2M enabled cellular network with NOMA and EH.
Specifically, we aim at minimizing the total energy consump-
tion via jointly optimizing power control and time allocation
for NOMA. The system energy minimization problem is
formulated as
min
p
p
p,q
q
q,t
t
tETot (19a)
s.t. rij Dj,i∈ N, j ∈ Ji(19b)
ri
Ji
j=Ji1+1
Dj,i∈ N (19c)
Eij EH
ij ,i∈ N, j ∈ Ji(19d)
N+K
i=1
tiT(19e)
0pjPj,0qiQi,i∈ N, j ∈ Ji(19f)
t
t
t0
0
0,(19g)
where p
p
p= [p1,·· · , pM]T,q
q
q= [q1,·· · , qN]T,t
t
t= [t1,·· · ,
tN+K]T,Djis the payload that MTCD jhas to upload within
time constraint T,Pjis the maximal transmission power of
MTCD j, and Qiis the maximal transmission power of MTCG
i. It is assumed that all payloads are positive, i.e., Dj>0, for
all j. The objective function (19a) defined in (11) is the total
energy consumption of both MTCDs and MTCGs. Constraints
(19b) and (19c) reflect that the minimal required payloads for
MTCDs can be uploaded to the BS. The consumed energy of
each MTCD should not exceed its harvested energy in time T,
as stated in (19d). Constraints (19e) reflect that the payloads
for all MTCDs are transmitted in time T.
Note that problem (19) is nonconvex due to nonconvex
objective function (19a) and constraints (19b)-(19d). In gen-
eral, there is no standard algorithm for solving nonconvex
optimization problems. In the following, we first find the
optimal conditions for problem (19) by exploiting the special
structure of the uplink NOMA rate, and then provide an
iterative power control and time allocation algorithm.
A. Optimal Conditions
By analyzing problem (19), we have the following lemma.
Lemma 1: The optimal solution (p
p
p,q
q
q,t
t
t) to problem (19)
satisfies
r
ij =Dj,i∈ N, j ∈ Ji.(20)
This observation states that the minimal throughput leads
to more energy saving, which is similar to [17] and is also
widely known in the information theory community.
Lemma 1 states that the optimal transmit throughput for
each MTCD is required minimum. Note that the optimal
throughput for each MTCG is not always as its minimum
requirement, i.e., constraints (19c) are active at the optimum,
since MTCGs should transmit more power to maintain that the
harvested energy of each MTCD is no less than the consumed
energy.
6
Based on Lemma 1, we further have the following lemma
about the optimal transmission power of MTCDs.
Lemma 2: If (p
p
p,q
q
q,t
t
t) is the optimal solution to problem
(19), we have
p
j=
Ji
l=j+1
σ2
|hij |2e
al
t
i1e
aj
t
i1e
bjl
t
i
+σ2
|hij |2e
aj
t
i1,i∈ N, j ∈ Ji,(21)
where
al=(ln 2)Dl
B, bjl =l1
s=j+1(ln 2)Ds
B,i∈ N, j, l ∈ Ji.
(22)
Besides, the optimal transmission power p
jof MTCD j∈ Ji
is always non-negative and decreases with the transmission
time t
i.
Proof: Please refer to Appendix A.
From Lemma 2, large transmission time results in low
transmission power. This is reasonable as the minimal payload
is limited and large transmission time requires low achievable
rate measured in bits/s. It is also revealed from Lemma 2
that the optimal transmission power of MTCD j∈ Jiserved
by MTCG idepends only on the variable of the allocated
transmission time ti. As a result, the energy Eij consumed by
MTCD jin Jiis a function of the allocated transmission time
ti. Based on (7) and (21), we have
Eij =
Ji
l=j+1
σ2ti
η|hij |2e
al
ti1e
aj
ti1e
bjl
ti
+σ2ti
η|hij |2e
aj
ti1+tiPC.(23)
Theorem 1: The energy Eij defined in (23) is convex with
respect to (w.r.t.) the transmission time ti. When PC= 0, the
energy Eij monotonically decreases with ti. When PC>0,
the energy Eij first decreases with tiwhen 0tiT
ij and
then increases with tiwhen ti> T
ij , where T
ij is the unique
zero point of the first-order derivative ∂Eij
∂ti, i.e.,
∂Eij
∂titi=T
ij
= 0.(24)
Proof: Please refer to Appendix B.
Fig. 5 exemplifies the energy Eij given in (23) versus ti.
When PC= 0, i.e., the circuit energy consumption of MTCDs
is not considered, we come to the same conclusion as in [37]
and [38] that the consumed energy decreases as the transmis-
sion time increases according to Theorem 1. Without consid-
ering the circuit power consumption, R= log2(1 + SNR)and
the energy efficiency increases with the decrease of power.
Consequently, when PC= 0 and the minimal throughput
demand Djis given, the consumed energy Eij is a decreasing
function w.r.t. ti. This fundamentally follows the Shannon’s
law.
When PC>0, i.e., the circuit energy consumption of
MTCDs is taken into account, however, we find from Theorem
1 that the consumed energy first decreases and then increases
C0P>
C0P=
*
ij
T
i
t
0
Fig. 5. The energy Eij versus transmission time ti.
with the transmission time, which is different from the pre-
vious conclusion in [37] and [38]. This is because that the
total energy contains two parts balancing each other, i.e., the
RF transmission energy part which monotonically decreases
with the transmission time and the circuit energy part which
linearly increases with the transmission time. In the following
of this section, we assume that the circuit power consumption
of MTCDs and MTCGs is in general positive, i.e., PC>0
and QC>0.
Theorem 2: If Tmaxi∈N minj∈Ji{T
ij }, the optimal
time allocation t
t
tto problem (19) satisfies
N+K
i=1
t
i=T. (25)
If TTUpp, where TUpp is defined in (C.4), the optimal time
allocation t
t
tto problem (19) satisfies
N+K
i=1
t
i< T. (26)
Proof: Please refer to Appendix C.
From Theorem 2, it is observed that transmitting with the
maximal transmission time Tis optimal when Tis not large.
This is because that the reduced energy of RF transmis-
sion dominates the additional energy of circuit by increasing
transmission time. When the available time Tbecomes large
enough, Theorem 2 states that it is not optimal to transmit with
the maximal transmission time T. This is due to the fact that
the increased energy of circuit power dominates the power
consumption while the energy reduction of RF transmission
becomes relatively marginal.
B. Joint Power Control and Time Allocation Algorithm
Problem (19) has two difficulties: one comes from the
non-smooth EH function defined in (6), and the other one
is the non-convexity of both objective function (19a) and
constraints (19b)-(19d). To deal with the first difficulty, we
introduce notation Sij as the set of phases during which
7
MTCD j∈ Jican effectively harvest energy, i.e., Sij =
{k|Ik
n=Ik1+1 |hnj |2qn> P0,k∈ K}. With Sij in hand,
the harvested power of MTCD j∈ Jican be presented by the
smooth function ¯u(x)defined in (28). To deal with the second
difficulty, we substitute (3)-(7), (11) and (21) into (19), and the
original problem (19) with fixed sets Sij ’s can be equivalently
transformed into the following problem:
min
q
q
q,t
t
t
N
i=1
Ji
j=Ji1+1
Ji
l=j+1
σ2ti
η|hij |2e
al
ti1e
aj
ti1e
bjl
ti
+
N
i=1
Ji
j=Ji1+1
σ2ti
η|hij |2e
aj
ti1
+
N
i=1
Ji
j=Ji1+1
tiPC
+
K
k=1
Ik
i=Ik1+1
tN+kqi
ξ+QC
N
i=1
Ji
j=Ji1+1
k∈Sij
tN+k¯u
Ik
n=Ik1+1 |hnj |2qn
(27a)
s.t. |hi|2qi2
j∈JiDj
BtN+1 1
Ik
l=i+1 |hl|2ql+σ2
,
k∈ K, i ∈ Ik(27b)
Ji
l=j+1
σ2
η|hij |2tie
al
ti1e
aj
ti1e
bjl
ti
+σ2
η|hij |2tie
aj
ti1+tiPC
k∈Sij
tN+k¯u
Ik
n=Ik1+1|hnj |2qn
,i∈ N, j ∈ Ji
(27c)
Ik
n=Ik1+1|hnj |2qnP0,i∈ N, j ∈ Ji, k ∈ Sij (27d)
N+K
i=1
tiT(27e)
Ji
l=j+1
σ2
|hij |2e
al
ti1e
aj
ti1e
bjl
ti
+σ2
|hij |2e
aj
ti1Pj,i∈ N, j ∈ Ji(27f)
0qiQi,i∈ N (27g)
t
t
t0
0
0,(27h)
where
¯u(x) = M(1 + eab)
eab +ea(x2b)M
eab ,x0.(28)
Problem (27) is still nonconvex w.r.t. (q
q
q, t
t
t) due to nonconvex
objective function (27a) and constraints (27b)-(27c). Before
solving problem (27), we have the following theorem.
Theorem 3: Given transmission time τ
τ
τ= [tN+1,· ·· ,
tN+K]T, problem (27) is a convex problem w.r.t. (q
q
q, ¯
t
t
t), where
¯
t
t
t= [t1,·· · , tN]T. Given (q
q
q, ¯
t
t
t), problem (27) is equivalent to
a linear problem w.r.t. τ
τ
τ.
Proof: Please refer to Appendix D.
According to Theorem 3, problem (27) with given transmis-
sion time τ
τ
τcan be effectively solved by using the standard
convex optimization method, such as interior point method
[57]. Besides, problem (27) with given (q
q
q, ¯
t
t
t) is a linear prob-
lem, which can be optimally solved via the simplex method.
Based on Theorem 3, we propose an iterative power control
and time allocation for NOMA (IPCTA-NOMA) algorithm
with low complexity to obtain a suboptimal solution of prob-
lem (19). The idea is to iteratively update sets Sij’s according
to the power and time variables obtained in the previous step.
Algorithm 1: Iterative Power Control and Time Allocation for
NOMA (IPCTA-NOMA) Algorithm
1: Set S(0)
ij ={k|j∈ ∪n∈IkJn, k ∈ K},i∈ I,j∈ Jij ,
initialize a feasible solution (q
q
q(0), t
t
t(0)) to problem (27)
with S(0)
ij ’s, the tolerance θ, the iteration number v= 0,
and the maximal iteration number Vmax.
2: repeat
3: Set τ
τ
τ= [t(v)
N+1,· ·· , t(v)
N+K]T.
4: repeat
5: Obtain the optimal (q
q
q,¯
t
t
t) of convex problem (27)
with fixed τ
τ
τand sets S(v)
ij .
6: Obtain the optimal τ
τ
τof linear problem (27) with
fixed (q
q
q,¯
t
t
t) and sets S(v)
ij .
7: until the objective value (27a) with fixed sets S(v)
ij
converges.
8: Set v=v+ 1.
9: Denote q
q
q(v)=q
q
q,t
t
t(v)= [¯
t
t
tT,τ
τ
τT]T.
10: Calculate the objective value (27a) with fixed sets S(v)
ij
as U(v)
Obj =ETot(q
q
q(v),t
t
t(v)).
11: Update S(v)
ij ={k|Ik
n=Ik1+1 |hnj |2q(v)
n> P0,k
K},i∈ I, j ∈ Ji.
12: until v1and |U(v)
Obj U(v1)
Obj |/U(v1)
Obj < θ or v > Vmax .
C. Convergence and Complexity Analysis
Theorem 4: Assuming Vmax → ∞, the sequence (q
q
q, t
t
t)
generated by the IPCTA-NOMA algorithm converges.
Proof: Please refer to Appendix E.
According to the IPCTA-NOMA algorithm, the major com-
plexity lies in solving the convex problem (27) with fixed τ
τ
τ.
Considering that the dimension of the variables in problem
(27) with fixed τ
τ
τis 2N, the complexity of solving problem
(27) with fixed τ
τ
τby using the standard interior point method is
O(N3)[57, Pages 487, 569]. As a result, the total complexity
of the proposed IPCTA-NOMA algorithm is O(LNOLIT N3),
where LNO denotes the number of outer iterations of the
IPCTA-NOMA algorithm, and LIT denotes the number of
inner iterations of the IPCTA-NOMA algorithm for iteratively
solving nonconvex problem (27) with fixed sets Sij ’s.
8
IV. ENERGY EFFIC IE NT RE SO UR CE AL LO CATI ON F OR
TDMA
In this section, we study the energy minimization for the
M2M enabled cellular network with TDMA. According to
(13)-(16) and (18), the energy minimization problem can be
formulated as
min
p
p
p,q
q
q,ˆ
t
t
t
N
i=1
Ji
j=Ji1+1
tjpj
η+PC+
N
i=1
tM+iqi
ξ+QC
N
i=1
Ji
j=Ji1+1
N
n=1
tM+nu(|hnj |2qn)(29a)
s.t. Btjlog21 + |hij |2pj
σ2Dj,i∈ N, j ∈ Ji
(29b)
BtM+ilog21 + |hi|2qi
σ2
Ji
j=Ji1+1
Dj,i∈ N
(29c)
tjpj
η+PC
N
n=1
tM+nu(|hnj |2qn),i∈ N, j ∈ Ji
(29d)
N+1
i=1
tiT(29e)
0pjPj,0qiQi,i∈ N, j ∈ Ji(29f)
ˆ
t
t
t0
0
0,(29g)
where ˆ
t
t
t= [t1,·· · , tM+N]T.
Obviously, problem (29) is nonconvex due to nonconvex
objective function (29a) and constraints (29b)-(29d). In the
following, we first provide the optimal conditions for problem
(29), and then we propose a low-complexity algorithm to solve
problem (29).
A. Optimal Conditions
Similar to Lemma 1, it is also optimal for each MTCD to
transmit with the minimal throughput requirement. According-
ly, the following lemma is directly obtained.
Lemma 3: The optimal solution (p
p
p,q
q
q,ˆ
t
t
t) to problem (29)
satisfies
Bt
jlog21 + |hij|2p
j
σ2=Dj,i∈ N, j ∈ Ji.(30)
According to (30), the optimal transmission power of
MTCD jcan be presented as
pj=1
|hij |22
Dj
Btj1,i∈ N, j ∈ Ji.(31)
Substituting (31) into (16) yields
Eij =tj
|hij |2η2
Dj
Btj1+tjPC,i∈ N, j ∈ Ji.(32)
By analyzing (32), we can obtain the following theorem.
Theorem 5: The energy Eij defined in (32) is convex w.r.t.
tj. When PC= 0, the energy Eij monotonically decreases
with the transmission time tj. When PC>0, the energy Eij
first decreases with tjwhen 0tjT
ij and then increases
with tjwhen tj> T
ij , where T
ij is the unique zero point of
the first-order derivative ∂Eij
∂tj, i.e.,
∂Eij
∂tjtj=T
ij
= 0.(33)
Since Theorem 5 can be proved by checking the first-order
derivative ∂Eij
∂tjas in Appendix B, the proof of Theorem 4
is omitted. Similar to Theorem 2 for NOMA, we come to
the similar conclusion for TDMA that transmitting with the
maximal transmission time Tis optimal when Tis not large,
while for large Tit is not optimal to transmit with the maximal
transmission time T.
B. Iterative Power Control and Time Allocation Algorithm
Similar to problem (19), problem (29) has two difficulties:
one is the non-smooth EH function in (6), and the other is
the nonconvex objective function (29a) and constraints (29b)-
(29d). To deal with the first difficulty, we introduce notation
Sij as the set of MTCGs from which MTCD j∈ Jican
effectively harvest energy, i.e., Sij ={n||hnj|2qn> P0,n
I}. With Sij in hand, the harvested power of MTCD j∈ Ji
from MTCG n∈ Sij can be presented by the smooth function
¯u(x)defined in (28). To tackle the second difficulty, we show
that problem (29) with fixed sets Sij ’s can be transformed into
an equivalent convex problem.
Theorem 6: The original problem in (29) with fixed sets
Sij ’s can be equivalently transformed into the following con-
vex problem as
min
ˆ
p
p
p,ˆ
q
q
q,ˆ
t
t
t
N
i=1
Ji
j=Ji1+1 ˆpj
η+tjPC+
N
i=1 ˆqi
ξ+tM+iQC
N
i=1
Ji
j=Ji1+1
n∈Sij
tM+n¯u|hnj |2ˆqn
tM+n(34a)
s.t. Btjlog21 + |hij |2ˆpj
σ2tjDj,i∈ N, j ∈ Ji
(34b)
BtM+ilog21 + |hi|2ˆqi
σ2tM+i
Ji
j=Ji1+1
Dj,i∈ N
(34c)
ˆpj
η+tjPC
n∈Sij
tM+n¯u|hnj|2ˆqn
tM+n,iN, j Ji
(34d)
|hnj |2ˆqn> P0tM+n,i∈ N, j ∈ Ji, n ∈ Sij (34e)
N+1
i=1
tiT(34f)
0ˆpjPjtj,i∈ N, j ∈ Ji(34g)
0ˆqiQitM+i,i∈ N (34h)
ˆ
t
t
t0
0
0,(34i)
where ˆ
p
p
p= [ˆp1,·· · ,ˆpM]Tand ˆ
q
q
q= [ˆq1,·· · ,ˆqN]T.
9
Proof: Please refer to Appendix F.
Based on Theorem 6, we propose an iterative power control
and time allocation for TDMA (IPCTA-TDMA) algorithm
with low complexity to obtain a suboptimal solution of prob-
lem (29). The idea is to iteratively update sets Sij’s according
to the power and time variables obtained in the previous step.
Algorithm 2: Iterative Power Control and Time Allocation for
TDMA (IPCTA-TDMA) Algorithm
1: Set S(0)
ij ={i},i∈ I,j∈ Jij , the tolerance θ, the
iteration number v= 0, and the maximal iteration number
Vmax.
2: repeat
3: Obtain the optimal (ˆ
p
p
p(v),ˆ
q
q
q(v),ˆ
t
t
t(v)) of convex problem
(34) with fixed sets S(v)
ij .
4: Calculate the objective value (34a) with fixed sets S(v)
ij
as U(v)
Obj =ETot(ˆ
p
p
p(v),ˆ
q
q
q(v),ˆ
t
t
t(v)).
5: Set v=v+ 1.
6: Update S(v)
ij =n
|hnj |2ˆq(v1)
n
t(v1)
M+n
> P0,n∈ I,i
I, j ∈ Ji.
7: until v2and |U(v)
Obj U(v1)
Obj |/U(v1)
Obj < θ or v > Vmax .
8: Output p
p
p=ˆ
p
p
p(v),ˆ
t
t
t=ˆ
t
t
t(v), q
i= ˆq(v)
i/t(v)
M+i,i∈ I.
C. Convergence and Complexity Analysis
Theorem 7: Assuming Vmax → ∞, the sequence (ˆ
p
p
p, ˆ
q
q
q, ˆ
t
t
t)
generated by the IPCTA algorithm converges.
Theorem 7 can be proved by using the same method as in
Appendix E. The proof of Theorem 7 is thus omitted.
According to the IPCTA-TDMA algorithm, the major com-
plexity lies in solving the convex problem (34). Consid-
ering that the dimension of the variables in problem (34)
is 2(M+N), the complexity of solving problem (34) by
using the standard interior point method is O((M+N)3)
[57, Pages 487, 569]. As a result, the total complexity of
the proposed IPCTA-TDMA algorithm is O(LTD(M+N)3),
where LTD denotes the number of iterations of the IPCTA-
TDMA algorithm.
V. NUMERICAL RE SU LTS
In this section, we evaluate the proposed schemes through
simulations. There are 40 MTCDs uniformly distributed with
a BS in the center. We adopt the “data-centric” clustering
technique in [41] for cluster formation of MTCDs, the number
of MTCGs is set as 12, and the maximal number of MTCDs
associated to one MTCG is 4. For NOMA, all MTCGs are
classified into 6 clusters based on the strong-weak scheme
[45], [46].
The path loss model is 128.1+37.6 log10 d(dis in km) and
the standard deviation of shadow fading is 4dB [58]. The noise
power σ2=104 dBm, and the bandwidth of the system is
B= 18 KHz. For the non-linear EH model in (6), we set
M= 24 mW, a= 1500 and b= 0.0014 according to [52],
which are obtained by curve fitting from the measurement
0.05 0.1 0.15 0.2
0
0.5
1
1.5
2
2.5 x 10−3
Transmission time t1 (s)
Energy E11 (J)
NOMA, PC=0
NOMA, PC=5 mW
NOMA, PC=10 mW
Fig. 6. Energy E11 consumed by MTCD 1 versus the transmission time t1
for NOMA strategy.
1 2 3 4 5 6 7 8 9 10
0
2
4
6
8
10
12
14
Number of iterations
Total energy (J)
NOMA
TDMA
Fig. 7. Convergence behaviors of IPCTA-NOMA and IPATC-TDMA.
data in [59]. The receiver sensitivity threshold P0is set as
0.1mW. The PA efficiencies of each MTCD and MTCG are
set to η=ξ= 0.9, and the circuit power of each MTCG
is QC= 500 mW as in [55]. We assume equal throughput
demand for all MTCDs, i.e., D1=·· · =DM=D, and
equal maximal transmission power for each MTCD or MTCG,
i.e., P1=·· · =PM=P, and Q1=·· · =QN=Q.
Unless otherwise specified, parameters are set as P= 5 mW,
PC= 0.5mW, Q= 1 W, D= 10 Kbits, and T= 5 s.
Fig. 6 depicts, for instance, E11 in (23) consumed by MTCD
1 served by MTCG 1 versus the transmission time t1for
NOMA. It is observed that E11 monotonically decreases with
t1when PC= 0. For the case with PC= 5 mW or PC= 10
mW, E11 first decreases and then increases with t1. Both
observations validate our theoretical findings in Theorem 1.
The convergence behaviors of IPCTA-NOMA and IPCTA-
TDMA are illustrated in Fig. 7. From this figure, the total
energy of both algorithms monotonically decreases, which
confirms the convergence analysis in Section III-C and IV-C.
It can be seen that both IPCTA-NOMA and IPCTA-TDMA
converge rapidly.
In Fig. 8, we illustrate the total energy consumption versus
the circuit power of each MTCD. According to Fig. 8, the total
energy of NOMA outperforms TDMA when the circuit power
of each MTCD is low, i.e., PC4mW in the test case. At
low circuit power regime, the total energy consumption of the
network mainly lies in the RF transmission power of MTCDs
10
01234567
1.5
2
2.5
3
3.5
4
4.5
5
Circuit power of each MTCD (mW)
Total energy (J)
NOMA
TDMA
Fig. 8. Total energy versus the circuit power of each MTCD.
and the energy consumed by MTCGs to charge the MTCDs
through EH. For the NOMA strategy, MTCDs served by the
same MTCG can simultaneously upload data and the MTCG
decodes the messages according to NOMA detections, which
requires lower RF transmission power of MTCDs than the
TDMA strategy. Thus, the total energy of NOMA is less than
TDMA for low circuit power of each MTCD. From Fig. 8, we
can find that the total energy of TDMA outperforms NOMA
when the circuit power of each MTCD becomes high, i.e.,
PC5mW in our tests. At high circuit power regime, the
total energy consumption of the network mainly lies in the
circuit power of MTCDs and the energy consumed by MTCGs
to charge the MTCDs through EH. For the NOMA strategy,
the transmission time of each MTCD with NOMA is always
longer than that with TDMA, which leads to higher circuit
power consumption of MTCDs than the TDMA strategy. As
a result, TDMA enjoys better energy efficiency than NOMA
for high circuit power of each MTCD.
Fig. 9 illustrates the total energy versus the maximal trans-
mission power of each MTCG. It is observed that the total
energy decreases with the increase of maximal transmission
power of each MTCG for both NOMA and TDMA. This is
because that the increment of maximal transmission power
of each MTCG allows the MTCG to transmit with large
transmission power, which leads to short EH time of MTCDs
to harvest enough energy and low total energy consumption
of the network. Moreover, it is found that the total energy of
NOMA is more sensitive to the maximal transmission power
of each MTCG than that of TDMA for high circuit power case
as PC= 5 mW for each MTCD. The reason is that MTCD
with low channel gain receives intra-cluster interference due to
NOMA and the energy consumption is hence especially large
for low maximal transmission power of each MTCG and high
circuit power of each MTCD.
The total energy versus the maximal transmission power
of each MTCD is shown in Fig. 10. It is observed that the
total energy decreases with growing maximal transmission
power of each MTCD for both NOMA and TDMA. This is
due to the fact that a larger maximal transmission power of
each MTCD ensures MTCDs can transmit with more power,
and the required payload can be uploaded in a shorter time,
which results in low circuit power consumption and low
0.2 0.4 0.6 0.8 1
0
2
4
6
8
10
12
Maximal transmission power of each MTCG (W)
Total energy (J)
NOMA, PC=0.5 mW
TDMA, PC=0.5 mW
NOMA, PC=5 mW
TDMA, PC=5 mW
Fig. 9. Total energy versus the maximal transmission power of each MTCG.
1 2 3 4 5
1.5
2
2.5
3
3.5
4
4.5
5
5.5
6
6.5
Maximal transmission power of each MTCD (mW)
Total energy (J)
NOMA, PC=0.5 mW
TDMA, PC=0.5 mW
NOMA, PC=5 mW
TDMA, PC=5 mW
Fig. 10. Total energy versus the maximal transmission power of each MTCD.
energy consumption. It can be found that the total energy of
TDMA converges faster than that of NOMA as the maximal
transmission power of each MTCD increases. This is because
that the MTCDs served by the same MTCG simultaneously
transmit data for NOMA, and the required transmission power
of each MTCD for NOMA is always larger than that of MTCD
for TDMA.
Finally, in Fig. 11, we illustrate the total energy versus
the required payload of each MTCD. The figure shows that
the total energy increases with the required payload of each
MTCD. This is due to the fact that large payload of each
MTCD requires large energy consumption of MTCDs and
MTCGs, which leads to high energy consumption of the
network.
VI. CO NC LU SI ON S
This paper compares the total energy consumption between
NOMA and TDMA strategies in uplink M2M communications
with EH. We formulate the total energy minimization problem
subject to minimal throughput constraints, maximal transmis-
sion power constraints and energy causality constraints, with
the circuit power consumption taken into account. By applying
the conditions that it is optimal to transmit with the minimal
throughput for each MTCD, we transform the original problem
for NOMA strategy into an equivalent problem, which is
suboptimally solved through an iterative algorithm. By using
a proper variable transformation, we transform the nonconvex
problem for TDMA into an equivalent problem, which can
11
10 12 14 16 18 20
2
3
4
5
6
7
8
9
Required payload of each MTCD (kbits)
Total energy (J)
NOMA, PC=0.5 mW
TDMA, PC=0.5 mW
NOMA, PC=5 mW
TDMA, PC=5 mW
Fig. 11. Total energy versus the required payload of each MTCD.
be effectively solved. Through simulations, either NOMA
strategy or TDMA strategy may be preferred depending on
different circuit power regimes of MTCDs. At low circuit
power regime of MTCDs, NOMA consumes less energy,
while TDMA is preferred at high circuit power regime of
MTCDs since the energy consumption for NOMA increases
significantly as the circuit power of MTCDs increases.
APP EN DI X A
PROO F OF LE MM A 2
By inserting rij =Djinto (3) from Lemma 1, we have
2
Dj
Bti
Ji
l=j+1 |hil|2pl+σ22
Dj
Bti1=
Ji
l=j|hil|2pl,(A.1)
for j=Ji1+ 1,·· · , Ji. To solve those JiJi1equations,
we first define
uj=
Ji
l=j|hil|2pl,j∈ Ji.(A.2)
Applying (A.2) into (A.1) yields
uj= 2
Dj
Btiuj+1 +σ22
Dj
Bti1,j∈ Ji.(A.3)
Denote u
u
ui= [uJi1+1,··· , uJi]T,
v
v
vi=σ22
DJi1+1
Bti1,···, σ22
DJi
Bti1T
,(A.4)
and
W
W
Wi=
0 2
DJi1+1
Bti
0 2
DJi1+2
Bti
......
0 2
DJi1
Bti
0
.(A.5)
Equations in (A.3) can be rewritten as
(E
E
EW
W
Wi)u
u
ui=v
v
vi,(A.6)
where E
E
Eis an identity matrix of size (JiJi1)×(JiJi1).
From (A.6), we have
u
u
ui= (E
E
EW
W
Wi)1v
v
vi.(A.7)
Before obtaining the inverse matrix (E
E
EW
W
Wi)1, we present
the following lemma.
Lemma 4: When l[1, JiJi11], the l-th power of
matrix W
W
Wican be expressed as
W
W
Wl
i=
0
0
0T
l2
Ji1+l
s=Ji1+1Ds
Bti
0 2
Ji1+l+1
s=Ji1+2Ds
Bti
......
0 2
Ji1
s=JilDs
Bti
0
0
0l
,
(A.8)
where 0
0
0ldenotes a l×1vector of zeros. When l=JiJi1,
W
W
Wl
i= 0
0
0(JiJi1)×(JiJi1), where 0
0
0(JiJi1)×(JiJi1)is a
(JiJi1)×(JiJi1)matrix of zeros.
Proof: Lemma 4 can be proved by the principle of
mathematical induction.
Basis: It can be verified that Lemma 4 is valid for l= 1.
Induction Hypothesis: For l[1, JiJi12], assume
that the l-th power of matrix W
W
Wican be expressed as (A.8).
Induction Step: According to (A.8), we can obtain
W
W
Wl+1
i=W
W
Wl
iW
W
Wi
=
0
0
0T
l2
Ji1+l
s=Ji1+1Ds
Bti
0 2
Ji1+l+1
s=Ji1+2Ds
Bti
......
0 2
Ji1
s=JilDs
Bti
0
0
0l
·
0 2
DJi1+1
Bti
0 2
DJi1+2
Bti
......
0 2
DJi1
Bti
0
=
0
0
0T
l+1 2
Ji1+l+1
s=Ji1+1Ds
Bti
0 2
Ji1+l+2
s=Ji1+2Ds
Bti
......
0 2
Ji1
s=Jil1Ds
Bti
0
0
0l+1
,
which verifies that the (l+ 1)-th power of matrix W
W
Wican
also be expressed as (A.8). According to (A.8) and (A.5), it
is verified that
W
W
WJiJi1
i=W
W
WJiJi11
iW
W
Wi= 0
0
0(JiJi1)×(JiJi1).
(A.9)
Therefore, Lemma 4 is proved.
12
Now, it is ready to obtain the inverse matrix (E
E
EW
W
Wi)1.
Since
(E
E
EW
W
Wi)
E
E
E+
JiJi11
l=1
W
W
Wl
i
=E
E
EW
W
WJiJi1
i=E
E
E,
(A.10)
we have
(E
E
EW
W
Wi)1=E
E
E+
JiJi11
l=1
W
W
Wl
i.(A.11)
Substituting (A.8) and (A.11) into (A.7) yields
uj=
Ji
l=j
σ22
Dl
Bti12
l1
s=jDs
Bti,j∈ Ji,(A.12)
where we define j1
s=j2Ds
Bti= 20. From (A.12), we can obtain
uj=σ22
Ji
s=jDs
Bti1. Since Ji
l=Ji+1 pj= 0, we have
uJi+1 = 0.(A.13)
From (A.2) and (A.13), we can obtain the transmission power
of MTCD jas
pij =ujuj+1
|hij |2,j∈ Ji.(A.14)
Applying (A.12) and (A.13) to (A.14), we have
pj=
Ji
l=j
σ2
|hij |22
Dl
Bti12
l1
s=jDs
Bti
Ji
l=j+1
σ2
|hij |22
Dl
Bti12
l1
s=j+1 Ds
Bti
=
Ji
l=j+1
σ2
|hij |22
Dl
Bti1
2
Dj
Bti1
2
l1
s=j+1 Ds
Bti
+σ2
|hij |22
Dj
Bti12
j1
s=jDs
Bti,
=
Ji
l=j+1
σ2
|hij |2e
al
ti1e
aj
ti1e
bjl
ti
+σ2
|hij |2e
aj
ti1,j∈ Ji.(A.15)
where aland bjl are defined in (22). Since ex1with x0
is non-negative and decreases with ti,pjis also non-negative
and decreases with tifrom (A.15).
APPENDIX B
PROO F OF TH EO RE M 1
To show that the energy Eij is convex w.r.t. ti, we first
define function
fijl (x) = (ealx1)(eajx1)ebjlx,x0.(B.1)
Then, the second-order derivative follows
f′′
ijl (x) = (a2
l+ 2albjl )(eajx1)e(al+bjl)x
+2alaje(al+aj+bjl )x
+(a2
j+ 2ajbjl )(aalx1)e(aj+bjl)x
+b2
jl (ealx1)(eajx1)ebjlx0,(B.2)
which indicates that fijl (x)is convex w.r.t. x. According
to [57, Page 89], the perspective of u(x)is the function
v(x, t)defined by v(x, t) = tu(x/t),dom v={(x, t)|x/t
dom u, t > 0}. If u(x)is a convex function, then so is its
perspective function v(x, t)[57, Page 89]. Since fijl(x)is
convex, the perspective function
¯
fijl (x, ti) = tifijl x
ti(B.3)
is convex w.r.t. (x, ti). Thus, function ¯
fijl (1, ti)is also convex
w.r.t. ti.
Defining function
gij (x) = eajx1,(B.4)
which is convex w.r.t. x. By using the property of perspective
function [57, Page 89], we also have that function
¯gij (x, ti) = tigij x
ti(B.5)
is convex w.r.t. (x, ti) and function ¯gij (1, ti)is accordingly
convex w.r.t. ti.
Substituting (B.3) and (B.5) into (23), we can obtain
Eij =
Ji
l=j+1
σ2
η|hij |2¯
fijl (1, ti) + σ2
η|hij |2¯gij (1, ti) + tiPC.
(B.6)
Due to the fact that both ¯
fijl (1, ti)and ¯gij (1, ti)are convex,
Eij is consequently convex w.r.t. tifrom (B.6).
According to (23), the first-order derivative of Eiw.r.t. ti
is expressed as
∂Eij
∂ti
=
Ji
l=j+1
σ2
η|hij |2e
al
ti1e
aj
ti1e
bjl
ti
Ji
l=j+1
σ2al
η|hij |2tie
aj
ti1e
al+bjl
ti
Ji
l=j+1
σ2aj
η|hij |2tie
al
ti1e
aj+bjl
ti
Ji
l=j+1
σ2bjl
η|hij |2tie
al
ti1e
aj
ti1e
bjl
ti
+σ2
η|hij |2e
aj
ti1σ2aj
η|hij |2ti
e
aj
ti+PC.(B.7)
Since Eij is convex w.r.t. ti, function ∂Eij
∂tiincreases with ti.
Because Djis positive for all j, we have al>0,bijl >0and
cijl >0from (22). To calculate the limit of ∂Eij
∂tiat ti= 0+,
13
we calculate the following limit,
lim
ti0+
σ2
η|hij |2e
al
ti1e
aj
ti1e
bjl
ti
σ2al
η|hij |2tie
aj
ti1e
al+bjl
ti
= lim
x+
σ2
η|hij |2(ealx1) (eajx1) ebjl x
σ2alx
η|hij |2(eajx1) e(al+bjl )x
= lim
x+
σ2(1 alx)
η|hij |2e(al+aj+bjl )x
=−∞.(B.8)
Thus, when tiapproaches zero in the positive direction, we
have
lim
ti0+
∂Eij
∂ti
=−∞.(B.9)
When tiapproaches positive infinity, the limit of first-order
derivative ∂Eij
∂tican be calculated as
lim
ti+
∂Eij
∂ti
=PC.(B.10)
If PC= 0, then ∂Eij
∂ti0for all ti0. In this case,
the energy Eij always decreases with ti. If PC>0, we
can observe that limti+∂Eij
∂ti>0from (B.10). Since
limti0+ ∂Eij
∂ti<0and Eij
∂tiincreases with ti, there exists
one unique solution T
ij satisfying (24), which can be solved
by using the bisection method. In particular, Eij decreases
with 0tiT
ij and increases with tij > T
ij .
APPENDIX C
PROO F OF TH EO RE M 2
We first consider the case that Tmaxi∈N
minj∈Ji{T
ij }. Without loss of generality, we denote T
T
nm = maxi∈N minj∈Ji{T
ij }. Assume that the optimal
solution (p
p
p,q
q
q,t
t
t) to problem (19) satisfies N+K
i=1 t
i< T.
Due to that t
i0for all i, we can obtain that t
nT
nm
T
nl,l∈ Jn. With all other power p
j,q
iand time t
kfixed,
j M \ Jn,i∈ N,k N \ {n}, we increase the time t
n
to t
n=t
n+ϵby an arbitrary amount (0, T N
i=1,i̸=nt
i].
Using (21), the corresponding power p
lstrictly deceases to p
l,
l∈ Jn. According to Theorem 1, the energy Enl decreases
with the transmission time 0tnT
nl,l∈ Jn. As
a result, with new power-time pair (p
Jn1+1,··· , p
Jn, t
n),
the objective function (19a) decreases with all the constraints
satisfied. By contradiction, we must have N+K
i=1 t
i=Tfor
the optimal solution. This completes the proof of the first half
part of Theorem 2.
The last half part of Theorem 2 indicates that transmitting
with maximal transmission time is not optimal when Tis
larger than a threshold TUpp. This can be proved by using
the contradiction method. Specifically, assuming that total
transmission time of the optimal solution is the maximal
transmission time T, we can find a special solution with total
transmission time less than T, which strictly outperforms the
optimal solution. To obtain the threshold TUpp, we consider
a special solution that satisfies all the constraints of problem
(19) except the maximal transmission time constraint (19e).
Since Eij is convex w.r.t. tiaccording to Theorem 1, the
energy Ei=Ji
j=Ji1+1 Eij consumed by all MTCDs in Ji
served by MTCG iis also convex w.r.t. ti. Based on the proof
of Theorem 1, we directly obtain the following lemma.
Lemma 5: The energy Eiconsumed by all MTCDs in Ji
first decreases with the transmission time tiwhen 0tiT
i
and then increases with the transmission time tiwhen ti> T
i,
where T
iis the unique zero point of first-order derivative ∂Ei
∂ti,
i.e.,
∂Ei
∂titi=T
i
=
Ji
j=Ji1+1
∂Eij
∂titi=T
i
= 0.(C.1)
Since Lemma 5 can be proved by checking the first-order
derivative ∂Ei
∂tias in Appendix B, the proof of Lemma 5 is
omitted here.
Set ˜
ti=T
i, and ˜pjcan be obtained from (21) with ˜
ti,
i∈ N,j∈ Ji. For the transmission power of the MTCGs,
we set ˜qi=Qi,i∈ N. Denote ˜
p
p
p= [˜p1,·· · ,˜pM]T,
˜
q
q
q= [˜q1,···,˜qN]T. With power (˜
p
p
p, ˜
q
q
q)and time (˜
ti,·· · ,˜
tN)
fixed for now, the energy minimization problem (19) without
constraint (19e) becomes
min
τ
τ
τ
K
k=1
Ik
i=Ik1+1
tN+kQi
ξ+QC
K
k=1
N
i=1
Ji
j=Ji1+1
tN+1u
Jk
n=Jk1+1|hnj |2Qn
(C.2a)
s.t. BtN+ilog21+ |hi|2Qi
Ik
n=i+1|hn|2Qn+σ2
j∈Ji
Dj,
k∈ K, i ∈ Ik(C.2b)
˜
ti˜pj
η+PC
K
k=1
tN+ku
Ik
n=Ik1+1|hnj |2Qn
,
i∈ N, j ∈ Ji(C.2c)
τ
τ
τ0
0
0,(C.2d)
where τ
τ
τ= [tN+1,··· , tN+K]T. Problem (C.2) can be ob-
tained by substituting (11) into (19a), (4) into (19b), and (5)
and (7) into (19c). Problem (C.2) is a linear problem, which
can be optimally solved via the simplex method. Denote the
optimal solution of problem by τ
τ
τ= [T
N+1,··· , T
N+K]T.
Denote ˜
tN+k=T
N+k,k∈ K, and ˜
t
t
t= [˜
t1,·· · ,˜
tN+K]T.
As a result, we obtain a special solution (˜
p
p
p, ˜
q
q
q, ˜
t
t
t) that satisfies
all the constraints of problem (19) except the maximal trans-
mission time constraint (19e). With solution (˜
p
p
p, ˜
q
q
q, ˜
t
t
t), the total
energy consumption ˜
ETot obtained from (11) can be expressed
14
as
˜
ETot =
N+K
i=1
˜
Ei
=
N
i=1
Ji
j=Ji1+1
˜
ti˜pj
η+PC
+
K
k=1
Ik
i=Ik1+1
˜
tN+k˜qi
ξ+QC
K
k=1
N
i=1
Ji
j=Ji1+1
˜
tN+ku
Ik
n=Ik1+1|hnj |2˜qn
,(C.3)
where ˜
Eiis the energy consumed by all MTCDs in Ji,i
N, and ˜
EN+kis the system energy consumption during the
(N+k)-th phase.
Denote an upper bound of maximal transmission time by
TUpp = max N+K
i=1
T
i, TAmp,(C.4)
where
TAmp =1 + N
i=1 βiK
k=1 ˜
EN+k
αQC,(C.5)
with αdefined in (C.8) and βidefined in (C.11). If TTUpp,
we show that optimal solution (p
p
p,q
q
q,t
t
t) to problem (19) must
satisfy constraint (26), i.e., (19e) is inactive, by contradiction.
Assume that
N+K
i=1
t
i=T. (C.6)
With (p
p
p,q
q
q,t
t
t), we denote E
ias the energy consumed by
all MTCDs in Ji,i∈ N,E
N+kas the system energy
consumption during the (N+k)-th phase, and E
Tot as the
total energy of the whole system. Thus, we have
E
Tot =
N+K
i=1
E
i
(a)
N+1
i=1
˜
Ei+
K
k=1
E
N+k
(b)
=
N
i=1
˜
Ei+
K
k=1
t
N+k
Ik
n=Ik1+1
q
n
ξ
N
i=1
Ji
j=Ji1+1
u
Ik
n=Ik1+1|hnj |2q
n
+QC
K
k=1
t
N+k(IkIk1)
(c)
>
N
i=1
˜
Ei+αQC
K
k=1
t
N+k
(d)
N+K
i=1
˜
Ei=˜
ETot,(C.7)
where inequality (a) follows from the fact that Eiachieves the
minimum when ti=T
iaccording to Lemma 5, equality (b)
holds from (5) and (9), and inequality (c) follows from (5),
(10), ξ(0,1] and
α,min
k∈K(IkIk1).(C.8)
To explain procedure (d), we substitute (5) and (7) into energy
causality constraints (19d) to obtain
t
ip
j
η+PC
K
k=1
t
N+ku
Ik
n=Ik1+1 |hnj |2qn
,(C.9)
for all i∈ N, j ∈ Ji.
Considering that p
j0in the left hand side of (C.9) and
u(x)is a increasing function as well as q
iQiin the right
hand side of (C.9), we have
t
imin
j∈Ji
K
k=1 t
N+kuIk
n=Ik1+1 |hnj |2Qn
PC
,
βi
K
k=1
t
N+k,i∈ N,(C.10)
where
βi= min
j∈Ji
max
k∈K
uIk
n=Ik1+1 |hnj |2Qn
PC
.(C.11)
Combining (C.6) and (C.8) yields
K
k=1
t
N+kT
1 + N
i=1 βi
.(C.12)
Hence, inequality (d) follows from (C.4) and (C.12).
According to (C.2) and (C.4), solution (˜
p
p
p, ˜
q
q
q, ˜
t
t
t) is a feasible
solution to problem (19). From (C.7), the objective value (19a)
can be decreased with solution (˜
p
p
p, ˜
q
q
q, ˜
t
t
t), which contradicts that
(p
p
p,q
q
q,t
t
t) is the optimal solution to problem (19). Hence, the
optimal solution to problem (19) must satisfy constraint (26).
APPENDIX D
PROO F OF TH EO RE M 3
We first show that the feasible set of problem (27) with
given τ
τ
τis convex. Obviously, constraints (27b), (27d), (27e)
and (27g) and (27h) are all linear w.r.t. (q
q
q, ¯
t
t
t). According to
(B.1) and (B.3), constraints (27c) and (27f) can be, respec-
tively, reformulated as
Ji
l=j+1
¯
fijl (1, ti) + tiPC
k∈Sij
tN+k¯u
Ik
n=Ik1+1 |hnj |2qn
(D.1)
for all i∈ N, j ∈ Ji, and
Ji
l=j+1
fijl 1
tiPj,i∈ N, j ∈ Ji.(D.2)
Based on (28), we have
¯u′′(x) = Ma2(1 + eab)ea(xb)
eab(1 + ea(xb))30,x0,(D.3)
15
which shows that ¯u(x)is concave, and ¯u(x)is convex.
Since ¯
fijl (1, ti)is convex w.r.t. tiaccording to Appendix B,
constraints (D.1) are convex, i.e., constraints (27c) are convex.
Due to that fijl (x)is convex and non-decreasing, and 1
xis
convex, fijl 1
xis also convex according to the composition
property of convex functions [57, Page 84]. Thus, constraints
(D.2) are convex, i.e., constraints (27f) are convex.
We then show that the objective function (27a) is convex.
Substituting (B.3) and (B.5) into (27a) yields
N
i=1
Ji
j=Ji1+1
Ji
l=j+1
σ2
η|hij |2¯
fijl (1, ti)
+
N
i=1
Ji
j=Ji1+1
σ2
η|hij |2¯gij (1, ti)
+
N
i=1
Ji
j=Ji1+1
tiPC+
K
k=1
Ik
i=Ik1+1
tN+kqi
ξ+QC
N
i=1
Ji
j=Ji1+1
k∈Sij
tN+k¯u
Ik
n=Ik1+1 |hnj |2qn
,(D.4)
which is convex w.r.t. (q
q
q, ¯
t
t
t) because ¯
fijl (1, ti),¯gij (1, ti)and
¯u(x)are convex according to Appendix B and (D.3). As a
result, problem (27) is convex w.r.t. (q
q
q, ¯
t
t
t).
With given (q
q
q, ¯
t
t
t), constraints (27b) can be equivalently
transformed into
BtN+ilog21 + |hi|2qi
Ik
n=i+1 |hn|2qn+σ2
Ji
j=Ji1+1
Dj,
(D.5)
which is linear w.r.t. tN+i. By replacing constraints (27b) with
(D.5), problem (27) with given (q
q
q, ¯
t
t
t) is a linear problem.
APP EN DI X E
PROO F OF TH EO RE M 4
The proof is established by showing that the total energy
value (27a) is non-increasing when sequence (q
q
q, t
t
t) is updated.
According to the IPCTA-NOMA algorithm, we have
U(v1)
Obj =ETot(q
q
q(v1), t
t
t(v1))ETot(q
q
q(v),t
t
t(v)) = U(v)
Obj ,
(E.1)
where the inequality follows from that (q
q
q(v),t
t
t(v)) is a subop-
timally optimal solution of problem (27) with fixed sets S(v)
ij ,
while (q
q
q(v1), t
t
t(v1)) is the initial feasible solution of problem
(34) with fixed sets S(v)
ij . Furthermore, the total energy value
(27a) is always non-negative. Since the total energy value (27a)
is non-increasing in each iteration according to (E.1) and the
total energy value (27a) is finitely lower-bounded, the IPCTA-
NOMA algorithm must converge.
APPENDIX F
PROO F OF TH EO RE M 6
We first show that problem (29) can be equivalently trans-
formed into problem (34). We introduce a set of new non-
negative variables:
ˆpj=tjpj,ˆqi=tM+iqi,i∈ N, j ∈ Ji.(F.1)
Substituting (F.1) into problem (29), we show that problem
(29) is equivalent to problem (34).
Then, we show that problem (34) is a convex problem. Since
constraints (34e)-(34i) are all linear, we only need to check
that objective function (34a) and constraints (34b)-(34d) are
convex. Due to the fact that ¯u(|hnj |2ˆqn)is convex w.r.t. ˆqn
from (D.3), tM+n¯u|hnj |2ˆqn
tM+nis convex w.r.t. (tM+n,ˆqn)
according to the property of perspective function [57, Page 89].
Thus, objective function (34a) is convex. Analogously, con-
straints (34b)-(34d) can also be shown convex. As a result,
problem (34) is a convex problem.
REF ER EN CE S
[1] Z. Yang, Y. Pan, W. Xu, R. Guan, Y. Wang, and M. Chen, “Energy
efficient resource allocation for machine-to-machine communications
with NOMA and energy harvesting,” in Proc. IEEE Int. Conf. Compt.
Commun. Workshops, Atlanta, GA, USA, May 2017, pp. 1–6.
[2] G. Wu, S. Talwar, K. Johnsson, and N. Himayat, “M2M: From mobile
to embedded internet,” IEEE Commun. Mag., vol. 49, no. 4, pp. 36–43,
Apr. 2011.
[3] K. Zheng, F. Hu, W. Wang, and W. Xiang, “Radio resource allocation
in LTE-advanced cellular networks with M2M communications,” IEEE
Commun. Mag., vol. 50, no. 7, pp. 184–192, Jul. 2012.
[4] M. Hasan, E. Hossain, and D. Niyato, “Random access for machine-
to-machine communication in LTE-advanced networks: Issues and ap-
proaches,” IEEE Commun. Mag., vol. 51, no. 6, pp. 86–93, Jun. 2013.
[5] K. Zheng, S. Ou, J. Alonso-Zarate, M. Dohler, F. Liu, and H. Zhu,
“Challenges of massive access in highly dense LTE-advanced networks
with machine-to-machine communications,” IEEE Wireless Commun.,
vol. 21, no. 3, pp. 12–18, Jun. 2014.
[6] D. Niyato, P. Wang, and D. I. Kim, “Performance modeling and analysis
of heterogeneous machine type communications,” IEEE Trans. Wireless
Commun., vol. 13, no. 5, pp. 2836–2849, May 2014.
[7] M. Condoluci, M. Dohler, G. Araniti, A. Molinaro, and K. Zheng,
“Toward 5G densenets: Architectural advances for effective machine-
type communications over femtocells,IEEE Commun. Mag., vol. 53,
no. 1, pp. 134–141, Jan. 2015.
[8] A. Aijaz, M. Tshangini, M. R. Nakhai, X. Chu, and A. H. Aghvami,
“Energy-efficient uplink resource allocation in LTE networks with
M2M/H2H co-existence under statistical QoS guarantees,” IEEE Trans.
Commun., vol. 62, no. 7, pp. 2353–2365, Jul. 2014.
[9] G. Zhang, A. Li, K. Yang, L. Zhao, and D. Cheng, “Optimal power
control for delay-constraint machine type communications over cellular
uplinks,” IEEE Commun. Lett., vol. 20, no. 6, pp. 1168–1171, Jun. 2016.
[10] G. Zhang, A. Li, K. Yang, L. Zhao, Y. Du, and D. Cheng, “Energy-
efficient power and time-slot allocation for cellular-enabled machine type
communications,” IEEE Commun. Lett., vol. 20, no. 2, pp. 368–371, Feb.
2016.
[11] Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and
K. Higuchi, “Non-orthogonal multiple access (NOMA) for cellular
future radio access,” in Proc. IEEE Veh. Technol. Conf., Dresden,
German, Jun. 2013, pp. 1–5.
[12] Z. Yang, C. Pan, W. Xu, Y. Pan, M. Chen, and M. Elkashlan, “Power
control for multi-cell networks with non-orthogonal multiple access,”
IEEE Trans. Wireless Commun., vol. PP, no. 99, pp. 1–1, 2017.
[13] Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, and H. V. Poor, “Ap-
plication of non-orthogonal multiple access in LTE and 5G networks,”
IEEE Commun. Mag., vol. 55, no. 2, pp. 185–191, Feb. 2017.
[14] X. Chen, A. Benjebbour, A. Li, and A. Harada, “Multi-user proportional
fair scheduling for uplink non-orthogonal multiple access (NOMA),” in
Proc. IEEE Veh. Technol. Conf., Seoul, Korea, May 2014, pp. 1–5.
[15] M. Al-Imari, P. Xiao, M. A. Imran, and R. Tafazolli, “Uplink non-
orthogonal multiple access for 5G wireless networks,” in Proc. IEEE
Int. Symp. Wireless Commun. Syst., Barcelona, Spain, Aug. 2014, pp.
781–785.
[16] N. Zhang, J. Wang, G. Kang, and Y. Liu, “Uplink nonorthogonal multiple
access in 5G systems,” IEEE Commun. Lett., vol. 20, no. 3, pp. 458–461,
Mar. 2016.
[17] Z. Yang, W. Xu, H. Xu, J. Shi, and M. Chen, “Energy efficient non-
orthogonal multiple access for machine-to-machine communications,”
IEEE Commun. Lett., vol. 21, no. 4, pp. 817–820, Apr. 2017.
16
[18] D. Malak, H. S. Dhillon, and J. G. Andrews, “Optimizing data aggre-
gation for uplink machine-to-machine communication networks,” IEEE
Trans. Commun., vol. 64, no. 3, pp. 1274–1290, Mar. 2016.
[19] H. S. Dhillon, H. C. Huang, H. Viswanathan, and R. A. Valenzuela,
“Power-efficient system design for cellular-based machine-to-machine
communications,” IEEE Trans. Wireless Commun., vol. 12, no. 11, pp.
5740–5753, Nov. 2013.
[20] X. Xiong, K. Zheng, R. Xu, W. Xiang, and P. Chatzimisios, “Low power
wide area machine-to-machine networks: Key techniques and prototype,”
IEEE Commun. Mag., vol. 53, no. 9, pp. 64–71, Sep. 2015.
[21] L. R. Varshney, “Transporting information and energy simultaneously,
in Proc. IEEE Int. Symp. Inf. Theory, Toronto, ON, Canada, Jul. 2008,
pp. 1612–1616.
[22] S. Bi, C. K. Ho, and R. Zhang, “Wireless powered communication:
Opportunities and challenges,” IEEE Commun. Mag., vol. 53, no. 4, pp.
117–125, Apr. 2015.
[23] X. Huang and N. Ansari, “Energy sharing within EH-enabled wireless
communication networks,” IEEE Wireless Commun., vol. 22, no. 3, pp.
144–149, Jun. 2015.
[24] X. Huang, T. Han, and N. Ansari, “On green-energy-powered cognitive
radio networks,” IEEE Commun. Surveys Tut., vol. 17, no. 2, pp. 827–
842, Secondquarter 2015.
[25] T. K. Thuc, E. Hossain, and H. Tabassum, “Downlink power control
in two-tier cellular networks with energy-harvesting small cells as
stochastic games,” IEEE Trans. Commun., vol. 63, no. 12, pp. 5267–
5282, Dec. 2015.
[26] S. Lohani, E. Hossain, and V. K. Bhargava, “On downlink resource
allocation for SWIPT in small cells in a two-tier HetNet,” IEEE Trans.
Wireless Commun., vol. 15, no. 11, pp. 7709–7724, Nov. 2016.
[27] S. Maghsudi and E. Hossain, “Distributed user association in energy
harvesting small cell networks: An exchange economy with uncertainty,”
IEEE Trans. Green Commun. Netw., vol. 1, no. 3, pp. 294–308, Sep.
2017.
[28] D. W. K. Ng and R. Schober, “Energy-efficient power allocation for
M2M communications with energy harvesting transmitter,” in Proc.
IEEE Global Commun. Conf. Workshops, Anaheim, CA, USA, Dec.
2012, pp. 1644–1649.
[29] J. Rinne, J. Keskinen, P. R. Berger, D. Lupo, and M. Valkama, “Viability
bounds of M2M communication using energy-harvesting and passive
wake-up radio,” IEEE Access, vol. PP, no. 99, pp. 1–1, 2017.
[30] M. A. Andersson, A. ¨
Ozc¸elikkale, M. Johansson, U. Engstr¨
om, A. Voro-
biev, and J. Stake, “Feasibility of ambient RF energy harvesting for
self-sustainable M2M communications using transparent and flexible
graphene antennas,” IEEE Access, vol. 4, pp. 5850–5857, 2016.
[31] Z. Yang, W. Xu, Y. Pan, R. Guan, and M. Chen, “Energy minimization
in machine-to-machine systems with energy harvesting,” in Proc. IEEE
Veh. Technol. Conf., Sydney, Austrlia, Jun. 2017, pp. 1–5.
[32] A. A. Nasir, X. Zhou, S. Durrani, and R. A. Kennedy, “Relaying
protocols for wireless energy harvesting and information processing,
IEEE Trans. Wireless Commun., vol. 12, no. 7, pp. 3622–3636, Jul.
2013.
[33] Y. Liu, S. A. Mousavifar, Y. Deng, C. Leung, and M. Elkashlan,
“Wireless energy harvesting in a cognitive relay network,” IEEE Trans.
Wireless Commun., vol. 15, no. 4, pp. 2498–2508, Apr. 2016.
[34] S. Atapattu and J. Evans, “Optimal energy harvesting protocols for
wireless relay networks,” IEEE Trans. Wireless Commun., vol. 15, no. 8,
pp. 5789–5803, Aug. 2016.
[35] X. Huang and N. Ansari, “Optimal cooperative power allocation for
energy-harvesting-enabled relay networks,IEEE Trans. Veh. Technol.,
vol. 65, no. 4, pp. 2424–2434, Apr. 2016.
[36] H. Kim and G. de Veciana, “Leveraging dynamic spare capacity in
wireless systems to conserve mobile terminals’ energy,” IEEE/ACM
Trans. Netw., vol. 18, no. 3, pp. 802–815, Jun. 2010.
[37] V. Angelakis, A. Ephremides, Q. He, and D. Yuan, “Minimum-time link
scheduling for emptying wireless systems: Solution characterization and
algorithmic framework,IEEE Trans. Inf. Theory, vol. 60, no. 2, pp.
1083–1100, Feb. 2014.
[38] C. K. Ho, D. Yuan, L. Lei, and S. Sun, “Power and load coupling
in cellular networks for energy optimization,IEEE Trans. Wireless
Commun., vol. 14, no. 1, pp. 509–519, Jan. 2015.
[39] S. Karmakar and M. K. Varanasi, “The diversity-multiplexing tradeoff of
the dynamic decode-and-forward protocol on a MIMO half-duplex relay
channel,” IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6569–6590, Oct.
2011.
[40] S.-E. Wei, H.-Y. Hsieh, and H.-J. Su, “Joint optimization of cluster for-
mation and power control for interference-limited machine-to-machine
communications,” in IEEE Global Commun. Conf., Anaheim, CA, USA,
Dec. 2012, pp. 5512–5518.
[41] T.-C. Juan, S. E. Wei, and H. Y. Hsieh, “Data-centric clustering for data
gathering in machine-to-machine wireless networks,” in IEEE Int. Conf.
Commun. Workshops, Budapest, Hungary, Jun. 2013, pp. 89–94.
[42] G. Miao, A. Azari, and T. Hwang, “E2-MAC: Energy efficient medium
access for massive m2m communications,IEEE Trans. Commun.,
vol. 64, no. 11, pp. 4720–4735, Nov. 2016.
[43] H. Tabassum, E. Hossain, and J. Hossain, “Modeling and analysis of
uplink non-orthogonal multiple access in large-scale cellular networks
using poisson cluster processes,” IEEE Trans. Commun., vol. 65, no. 8,
pp. 3555–3570, Aug. 2017.
[44] A. Zafar, M. Shaqfeh, M. S. Alouini, and H. Alnuweiri, “On multiple
users scheduling using superposition coding over rayleigh fading chan-
nels,” IEEE Commun. Lett., vol. 17, no. 4, pp. 733–736, Apr. 2013.
[45] M. A. Sedaghat and R. R. M¨
uller, “On user pairing in NOMA
uplink,” CoRR, vol. abs/1707.01846, 2017. [Online]. Available:
http://arxiv.org/abs/1707.01846
[46] Z. Ding, P. Fan, and H. V. Poor, “Impact of user pairing on 5G
nonorthogonal multiple-access downlink transmissions,” IEEE Trans.
Veh. Technol., vol. 65, no. 8, pp. 6010–6023, Aug. 2016.
[47] M. Shirvanimoghaddam, M. Condoluci, M. Dohler, and S. J. Johnson,
“On the fundamental limits of random non-orthogonal multiple access
in cellular massive iot,IEEE J. Sel. Areas Commun., vol. 35, no. 10,
pp. 2238–2252, Oct. 2017.
[48] H. Ju and R. Zhang, “Throughput maximization in wireless powered
communication networks,” IEEE Trans. Wireless Commun., vol. 13,
no. 1, pp. 418–428, Jan. 2014.
[49] ——, “Optimal resource allocation in full-duplex wireless-powered
communication network,” IEEE Trans. Commun., vol. 62, no. 10, pp.
3528–3540, Oct. 2014.
[50] X. Zhou, R. Zhang, and C. K. Ho, “Wireless information and power
transfer in multiuser OFDM systems,” IEEE Trans. Wireless Commun.,
vol. 13, no. 4, pp. 2282–2294, Dec. 2014.
[51] M. Guillaud, D. T. Slock, and R. Knopp, “A practical method for
wireless channel reciprocity exploitation through relative calibration.
in Proc. Int. Symp. Signal Process. Its Applcat., Sydney, Australia, Aug.
2005, pp. 403–406.
[52] E. Boshkovska, D. W. K. Ng, N. Zlatanov, and R. Schober, “Practical
non-linear energy harvesting model and resource allocation for SWIPT
systems,” IEEE Commun. Lett., vol. 19, no. 12, pp. 2082–2085, Dec.
2015.
[53] E. Boshkovska, R. Morsi, D. W. K. Ng, and R. Schober, “Power
allocation and scheduling for SWIPT systems with non-linear energy
harvesting model,” in IEEE Int. Conf. Commun., May 2016, pp. 1–6.
[54] Q. Wu, W. Chen, M. Tao, J. Li, H. Tang, and J. Wu, “Resource allocation
for joint transmitter and receiver energy efficiency maximization in
downlink OFDMA systems,” IEEE Trans. Commun., vol. 63, no. 2, pp.
416–430, Feb. 2015.
[55] Q. Wu, M. Tao, D. W. K. Ng, W. Chen, and R. Schober, “Energy-efficient
resource allocation for wireless powered communication networks,
IEEE Trans. Wireless Commun., vol. 15, no. 3, pp. 2312–2327, Mar.
2016.
[56] D. W. K. Ng, E. S. Lo, and R. Schober, “Wireless information and
power transfer: Energy efficiency optimization in OFDMA systems,
IEEE Trans. Wireless Commun., vol. 12, no. 12, pp. 6352–6370, Dec.
2013.
[57] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge
University Press, 2004.
[58] Evolved Universal Terrestrial Radio Access (E-UTRA); Further ad-
vancements for E-UTRA physical layer aspects, 3GPP TR 36.814 V9.
0.0, Mar. 2010.
[59] J. Guo and X. Zhu, “An improved analytical model for rf-dc conversion
efficiency in microwave rectifiers,” in IEEE/MTT-S Int. Microwave Symp.
Digest, Montreal, QC, Canada, Jun. 2012, pp. 1–3.
... One of the challenges of this method is that network conditions are not considered. In [28], energy-efficient resources are allocated for a cellular network with Machine-to-Machine capability with nonlinear energy harvesting. Focus on multiple access strategies is different, i.e., non-orthogonal multiple access and time division multiple access, to minimize the total energy consumption of the network. ...
... In this section, the efficiency of the proposed method is compared in terms of three parameters, i.e., packet delivery (28) Energy Consumed = ∑ n i=1 (Initial Energy − Residual Energy) N ratio, packet loss, and throughout. First, Fig. 7 shows the packet delivery ratio in the simulated area with a size of 100 * 100. Figure 7 shows the linear diagram of the packet delivery ratio depending on the number of nodes, from 10 to 200, for the proposed method and the AC RM, the QOS-Driven RM, the C-DRL-PER RM, and the FGF schemes. ...
Article
Full-text available
The increasing demand for data collection from various Internet of Things (IoT) devices and limited energy of nodes in these networks led to the complex network conditions. Currently, the role of energy consumption for a large number of interconnected nodes in IoT is one of the research subjects. In many IoT applications, IoT devices are deployed in environments that are difficult to physically access. Therefore, an energy-efficient mechanism is important. This article proposes a new method for energy-efficient improvement based on machine learning from the point of view of cognitive networks, which is estimated using learning automata of network parameters. Then, transmission power of the network nodes to improve energy consumption is adjusted in a self-organized, self-aware and dynamic manner, and the behavior of the network nodes is adapted according to the current conditions of the network. One of the strengths of this method compared to the existing methods is that network conditions are estimated through parameters of Delay (D), Channel Status (S) and data rate, and this mechanism makes all decisions based on the network conditions. The results of the experiments show that examining energy-efficient from the perspective of cognitive network not only leads to the improvement of Quality of Service (QoS) parameters such as operational power and end to end delay in the network, but also an increase in the life of the network compared to other energy-efficient methods.
... The optimal power and subcarrier allocation for a multiuser multi-carrier uplink NOMA system was considered in [16], where the authors examined the sum rate maximization problem and energy efficiency maximization problem. Yang et al. [17] considered Machineto-Machine (M2M) enabled cellular network with multiple access and energy harvesting capability for machine type communication devices. They minimized the total energy consumption of the network in NOMA and TDMA strategies, in a way that the minimal required payloads for devices must be met which could be uploaded to the BS. ...
... The corresponding and for case 3, could be obtained by substituting (14) and (17) in (10), thus, the optimization problem converted to ...
Article
Full-text available
There is a growing demand for low-power network devices; therefore, enabling technologies for the Internet of Things (IoT) is significantly important. This paper proposed resource allocation by maximizing the harvested energy to substantially improve Energy Efficiency (EE) and regulate transmission power for the scheduled IoT devices. Energy Harvesting (EH) is a viable technology that enables long-term and self-sustainable operations for IoT devices. The Simultaneous Wireless Information and Power Transfer (SWIPT) has been proposed as a promising solution for maximizing EE while ensuring the quality of service of all IoT devices, where the ultra-low power devices harvest energy in Power Splitting (PS) mode. This paper applied the proposed Optimal Transmit Power and PS Ratio (OTPR) algorithm to maximize the EE for SWIPT based on the partial derivative of Lagrange dual decomposition methods. The algorithm jointly optimized the allocation of the channel, PS, and power control to solve the distributed non-convex and NP-hardness caused by co-channel interference. A novel training was proposed for Deep Neural Network (DNN) algorithms chain rules to minimize the loss function based on updating the parameters of the weights hidden layer and convergence training to achieve near-optimal performance and minimize unneeded label data. The simulation results showed that the DNN training for the chain rule provided a near-optimal performance EE with the shortest training time. This observation indicated that decreasing the loss function at every training optimizes the co-channel conditions for IoT devices by assigning the EH requirement to meet the minimum harvesting need.
Article
Full-text available
Micro-energy harvesting (MEH) is a technology of renewable power generation which is a key technology for hosting the future low-powered electronic devices for wireless sensor networks (WSNs) and, the Internet of Things (IoT). Recent technological advancements have given rise to several resources and technologies that are boosting particular facets of society. Many researchers are now interested in studying MEH systems for ultra-low power IoT sensors and WSNs. A comprehensive study of IoT will help to manage a single MEH as a power source for multiple WSNs. The popular database from Scopus was used in this study to perform a review analysis of the MEH system for ultra-low power IoT sensors. All relevant and important literature studies published in this field were statistically analysed using a review analysis method by VOSviewer software, and research gaps, challenges and recommendations of this field were investigated. The findings of the study indicate that there has been an increasing number of literature studies published on the subject of MEH systems for IoT platforms throughout time, particularly from 2013 to 2023. The results demonstrate that 67% of manuscripts highlight problem-solving, modelling and technical overview, simulation, experimental setup and prototype. In observation , 27% of papers are based on bibliometric analysis, systematic review, survey, review and based on case study, and 2% of conference manuscripts are based on modelling, simulation, and review analysis. The top-cited articles are published in 5 different countries and 9 publishers including IEEE 51%, Elsevier 16%, MDPI 10% and others. In addition, several MEH system-related problems and challenges are noted to identify current limitations and research gaps, including technical, modelling, economic, power quality, and environmental concerns. Also, the study offers guidelines and recommendations for the improvement of future MEH technology to increase its energy efficiency, topologies, design, operational performance, and capabilities. This study's detailed information, perceptive analysis, and critical argument are expected to improve MEH research's viable future.
Article
Emergence of 5G and beyond promise development of several applications specific Internet-of-Things (IoT) services involving consumer electronics devices doing trustworthy intelligent operations. One such application is smart healthcare support in hospital or home premises where battery driven wearable wireless nodes collect patient data, transmit securely and seamlessly in cooperative communications for monitoring. To meet the goal, this work suggests device-to-device (D2D) communications, operated in cognitive radio network (CRN), protecting from eavesdropping by exploiting artificial intelligence driven channel state information (CSI) estimation. IoT devices (IoDs) harvest energy from radio frequency (RF) signals and transmit own data with relaying message of primary users (PUs). The goal is to maximize energy efficiency (EE) of IoDs satisfying the constraints of own data transmission rate, cooperative outage of PUs, and secrecy outage rate with self-powering. A long short term memory (LSTM) based CSI estimation on indoor complex D2D links is suggested and shows comparable performance on EE maximization and outage secrecy, when compared with known CSI. Simulation results show about 20% EE performance improvement at 7 dB signal-to-noise-ratio (SNR) over 8 dB SNR at the power splitting factor 0.5 and time switching factor 0.07 using LSTM based CSI.
Article
In this article, a deep- $Q$ network (DQN)-based approach is proposed to improve the harvested energy and the secrecy capacity by optimizing the beamforming vectors in multiple-input–multiple-output (MIMO) networks with simultaneous wireless information and power transmission (SWIPT). Here, in the presence of multiantenna eavesdroppers, a multiantenna hybrid access point (HAP) serves energy harvesting Internet of Things (EH-IoT) nodes and information decoding (ID) receiver. The EH-IoT nodes and the ID receiver are separated from each other and experience different channels from the HAP. Two cases of signal models are studied to maximize the harvested energy. The first case is the consolidated signal case, where the HAP transmits an information-bearing signal to both the EH-IoT nodes and the ID receiver. The second case is the split signal case, where the HAP sends both information-carrying signal and energy signals to the EH-IoT nodes and the ID receiver. For both these cases, the optimization strategies for maximizing the harvested energy under Quality-of-Service (QoS) constraints are formulated with the secrecy capacity and the harvested energy requirements. The harvested energy maximization problems are complex to handle due to the presence of high-dimensional variables. An efficient, robust, and secure DQN-based algorithm is proposed, where $Q$ -learning and deep neural network (DNN) methods are extended to solve these problems. Simulation results show that the proposed DQN approach can achieve a balance between harvested energy and security. By incorporating action and reward spaces that are adaptable to the formulated problem, significant performance gains are achieved.
Article
Non-orthogonal multiple access (NOMA) and energy-harvesting (EH) relay have been envisioned as promising technologies in Narrowband Internet of Things (NB-IoT) networks to efficiently improve the spectral-energy efficiency of networks and the massive connectivity of devices. However, the successive interference cancellation (SIC) ordering of NOMA has become a bottleneck affecting the performance of uplink transmission in NB-IoT networks. Also, while using NOMA, the data rate based fairness across NB-IoT devices cannot be ensured due to the difference between individual channels. To address these issues, this paper investigates the integration of NOMA and EH relay into the NB-IoT network. Correspondingly, we aim to maximize the data rate based proportional fairness across all NB-IoT devices by jointly optimizing the resource allocation and SIC ordering. We first prove the NP-hardness of this joint optimization problem and then tackle this mathematically intractable problem by decomposing it into resource allocation and SIC ordering problems. To solve the resource allocation problem, we exploit the convexity of the problem through transformation and reparameterization and then derive the optimal solution based on its Lagrangian function. We also propose a low-complexity SIC ordering algorithm by leveraging tabu search to obtain the sub-optimal SIC ordering. Simulation results validate the effectiveness of the proposed algorithm and the superiority of NOMA compared to frequency division multiple access (FDMA).
Article
As one of the most important metrics to sustainably provide communication services in green Industrial Internet of Things (IIoT), the problem of improving energy efficiency has constantly attracted extraordinary concerns from industry so far as to academia. In this paper, we intend to investigate the energy efficiency issue for an Energy Harvesting (EH)-enabled Machine-to-Machine (EH-M2M) communication underlaying Unmanned Aerial Vehicles (UAVs) networks from the perspective of resource management. Specifically, we are aiming at maximizing the average energy efficiency of EH-M2M communications by conjointly considering the EH time slot assignment, transmit power control and bandwidth allocation under the limitations of Quality of Service (QoS) and the available energy status of the EH-M2M devices. However, as the optimization problem is non-convex and NP-hard which is hard to tackle directly, we first transform the primitive objective function into a convex form equivalently by non-linear fractional programming and variable relaxation approach. After that, an iterative algorithm on the basis of Dinkelbach and Lagrangian theory is designed to optimize the resource management strategy. Finally, extensive simulation results demonstrate that the proposed scheme can establish more energy efficient communications compared to the benchmark schemes in different network settings.
Article
Wireless powered internet of thing (IoT) systems allow small IoT devices to operate without accompanying dedicated power sources. A well-known protocol for such networks utilizes the harvest and then transmit concept which involves wireless energy transfer (WET) followed by wireless information transfer (WIT). We formulate two optimization problems for wireless powered IoT systems to maximize weighted sum-rate for time division multiple access (TDMA) and non-orthogonal multiple access (NOMA) by optimizing the harvesting time and transmission time variables. First, we derive a semi-closed form solution,which achieves the global optimum, for both problems. The proposed approach is highly computationally efficient for large IoT networks. We prove that the scalar equations in both TDMA and NOMA maintain a unique solution which can be found via bisection. It is revealed that when the device’s circuit power consumption is negligible, NOMA outperforms TDMA. However, when devices consume large circuit power, TDMA is more efficient than NOMA. Numerical results determine a critical point where NOMA surpasses TDMA in weighted sum-rate if plotted versus WET transmit power. The critical point depends on the WET power, device’s circuit power consumption, conversion efficiency and saturation level of the (non-)linear energy harvester, and finally the number of devices and their associated weights.
Conference Paper
Full-text available
In this paper, we investigate the sum energy minimization problem in an uplink machine-to-machine (M2M) system with energy harvesting. To solve this nonconvex sum energy minimization problem, we first transform it into an equivalent convex problem and provide the optimal condition of the original problem. Then, we propose a low-complexity iterative scheme, which yields the optimal solution. The complexity of the proposed scheme is also analyzed. Numerical results show that the proposed scheme can achieve good performance.
Conference Paper
Full-text available
The vast amount of the machine type communication devices (MTCDs) in machine-to-machine (M2M) communications and their limited energy budget are the crucial challenges to transmission scheme design. This paper proposes an energyefficient power control and time scheduling scheme in M2M communications with non-orthogonal multiple access (NOMA) and energy harvesting. User equipment (UEs) are configured as gateways for MTCDs. Our aim is to minimize the total energy consumption of both MTCDs and UEs, on condition that the throughput constraints for both MTCDs and UEs as well as the minimal required harvested energy constraints for MTCDs are satisfied. We obtain the optimal conditions for the total energy minimization problem. Numerical results show that the proposed algorithm achieves the optimal energy consumption.
Article
Full-text available
User pairing in Non-Orthogonal Multiple-Access (NOMA) uplink based on channel state information is investigated considering some predefined power allocation schemes. The base station divides the set of users into disjunct pairs and assigns the available resources to these pairs. The combinatorial problem of user pairing to achieve the maximum sum rate is analyzed in the large system limit for various scenarios, and some optimum and sub-optimum algorithms with a polynomial-time complexity are proposed. In the first scenario, $2M$ users and the base station have a single-antenna and communicate over $M$ subcarriers. The performance of optimum pairing is derived for $M\rightarrow \infty$ and shown to be superior to random pairing and orthogonal multiple access techniques. In the second setting, a novel NOMA scheme for a multi-antenna base station and single carrier communication is proposed. In this case, the users need not be aware of the pairing strategy. Furthermore, the proposed NOMA scheme is generalized to multi-antenna users. It is shown that random and optimum user pairing perform similarly in the large system limit, but optimum pairing is significantly better in finite dimensions. It is shown that the proposed NOMA scheme outperforms a previously proposed NOMA scheme with signal alignment.
Article
Full-text available
In this paper, we investigate the problems of sum power minimization and sum rate maximization for multi-cell networks with non-orthogonal multiple access. Considering the sum power minimization, we obtain closed-form solutions to the optimal power allocation strategy and then successfully transform the original problem to a linear one with a much smaller size, which can be optimally solved by using the standard interference function. To solve the nonconvex sum rate maximization problem, we first prove that the power allocation problem for a single cell is a convex problem. By analyzing the Karush-Kuhn-Tucker conditions, the optimal power allocation for users in a single cell is derived in closed form. Based on the optimal solution in each cell, a distributed algorithm is accordingly proposed to acquire efficient solutions. Numerical results verify our theoretical findings showing the superiority of our solutions compared to the orthogonal frequency division multiple access and broadcast channel.
Article
Full-text available
Techniques for wireless energy harvesting (WEH) are being emerged as a fascinating set of solutions to extend the lifetime of energy-constrained wireless networks. They are commonly regarded as a key functional technique for almost perpetual communications. With the WEH technology, wireless devices are able to harvest energy from, e.g., different light sources or RF signals broadcast by ambient/dedicated wireless transmitters to support their operation and communications capabilities. The WEH technology will have increasingly wider range of use in upcoming applications for, e.g., wireless sensor networks, Machine-to-Machine (M2M) communications, and the Internet of Things. In this paper, the usability and fundamental limits of solar cell or photovoltaic harvesting based M2M communication systems are studied and presented. The derived theoretical bounds are in essence based on the Shannon capacity theorem, combined with selected propagation loss models, assumed additional link nonidealities, as well as the given energy harvesting and storage capabilities. Fundamental performance limits and available capacity of the communicating link are derived and analyzed, together with extensive numerical results evaluated in different practical scenarios, including realistic implementation losses and state-of-the-art printed supercapacitor performances. In particular, low power sensor type communication applications using passive wake-up radio (WuR) assisted operation are addressed in the study. The results show the benefits of using passive WuR, especially when the number of nodes is small. Moreover, the presented analysis principles and results establish clear feasibility regions and performance bounds for wireless energy harvesting based low rate M2M communications in the future IoT networks.
Article
Full-text available
Machine-to-machine (M2M) constitutes the communication paradigm at the basis of Internet of Things (IoT) vision. M2M solutions allow billions of multi-role devices to communicate with each other or with the underlying data transport infrastructure without, or with minimal, human intervention. Current solutions for wireless transmissions originally designed for human-based applications thus require a substantial shift to cope with the capacity issues in managing a huge amount of M2M devices. In this paper, we consider the multiple access techniques as promising solutions to support a large number of devices in cellular systems with limited radio resources. We focus on non-orthogonal multiple access (NOMA) where, with the aim to increase the channel efficiency, the devices share the same radio resources for their data transmission. This has been shown to provide optimal throughput from an information theoretic point of view.We consider a realistic system model and characterise the system performance in terms of throughput and energy efficiency in a NOMA scenario with a random packet arrival model, where we also derive the stability condition for the system to guarantee the performance.
Article
Full-text available
This letter investigates an uplink energy minimization problem for machine-to-machine (M2M) communications with non-orthogonal multiple access (NOMA). To solve this nonconvex problem, we first prove that transmitting with minimum rate and full time is optimal. Then, the original problem can be transformed into an equivalent convex problem, which can be effectively solved by the proposed optimal power control and time scheduling scheme. Numerical results show that the proposed scheme achieves the optimal energy consumption.
Article
Full-text available
Non-orthogonal multiple access (NOMA) serves multiple users by superposing their distinct message signals. The desired message signal is decoded at the receiver by applying successive interference cancellation (SIC). Using the theory of Poisson cluster process (PCP), we provide a framework to analyze multi-cell uplink NOMA systems. Specifically, we characterize the rate coverage probability of a NOMA user who is at rank $m$ (in terms of the distance from its serving BS) among all users in a cell and the mean rate coverage probability of all users in a cell. Since the signal-to-interference-plus-noise ratio (SINR) of $m$-th user relies on efficient SIC, we consider three scenarios, i.e., perfect SIC (in which the signals of $m-1$ interferers who are stronger than $m$-th user are decoded successfully), imperfect SIC (in which the signals of of $m-1$ interferers who are stronger than $m$-th user may or may not be decoded successfully), and imperfect worst case SIC (in which the decoding of the signal of $m$-th user is always unsuccessful whenever the decoding of its relative $m-1$ stronger users is unsuccessful). The derived expressions are customized to capture the performance of a user at rank $m$ in an equivalent orthogonal multiple access (OMA) system. Finally, numerical results are presented to validate the derived expressions.
Article
Full-text available
Lifetime is a critical parameter in ubiquitous, battery-operated sensors for machine-to-machine (M2M) communication systems, an emerging part of the future Internet of Things. In this practical article, the performance of radio frequency (RF) to DC energy converters using transparent and flexible rectennas based on graphene in an ambient RF energyharvesting scenario is evaluated. Full-wave EM simulations of a dipole antenna assuming the reported state-of-the-art sheet resistance for few-layer, transparent graphene yields an estimated ohmic efficiency of 5 %. In the power budget calculation, the low efficiency of transparent graphene antennas is an issue because of the relatively low amount of available ambient RF energy in the frequency bands of interest, which together sets an upper limit on the harvested energy available for the RF-powered device. Using a commercial diode rectifier and an off-the-shelf wireless system for sensor communication, the graphene-based solution provides only a limited battery lifetime extension. However, for ultra-low-power technologies currently at the research stage, more advantageous ambient energy levels, or other use cases with infrequent data transmission, graphene-based solutions may be more feasible.
Article
We consider a user association problem in the downlink of a small cell network, where small cells are powered solely through ambient energy harvesting. Since energy harvesting is opportunistic in nature, the amount of harvested energy is a random variable, without a priori known statistical characteristics. Thus, at the time of user association, the amount of available energy is unknown. We model the network as a competitive market with uncertainty, where self-interested small cells, modeled as consumers, are willing to maximize their utility scores by selecting users, represented as commodities. The utility scores of small cells depend on the random amount of harvested energy, formulated as nature’s state. For this model we prove the existence of Arrow-Debreu equilibrium. In addition, we analyze the equilibrium with respect to uniqueness, Pareto-efficiency, and social-optimality. Moreover, based on the Walras’ tatonnoment process and the static knapsack problem, we develop an efficient distributed user association scheme which converges to the equilibrium. We demonstrate the effectiveness of our proposed model through intensive numerical analysis.