Article

Device-to-Device Communication in 5G Cellular Networks: Challenges, Solutions, and Future Directions

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

In a conventional cellular system, devices are not allowed to directly communicate with each other in the licensed cellular bandwidth and all communications take place through the base stations. In this article, we envision a two-tier cellular network that involves a macrocell tier (i.e., BS-to-device communications) and a device tier (i.e., device-to-device communications). Device terminal relaying makes it possible for devices in a network to function as transmission relays for each other and realize a massive ad hoc mesh network. This is obviously a dramatic departure from the conventional cellular architecture and brings unique technical challenges. In such a two-tier cellular system, since the user data is routed through other users?? devices, security must be maintained for privacy. To ensure minimal impact on the performance of existing macrocell BSs, the two-tier network needs to be designed with smart interference management strategies and appropriate resource allocation schemes. Furthermore, novel pricing models should be designed to tempt devices to participate in this type of communication. Our article provides an overview of these major challenges in two-tier networks and proposes some pricing schemes for different types of device relaying.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... In device-to-device communication, various topologies are used. Specifcally, D2D communications are classifed into four distinct categories by many authors and specialists, as shown in Figure 1 [20][21][22]. ...
... (i) DR-OC (device relaying with operator controlled link establishment): Tis is a D2D communication mode where a device located in a poorly covered area or on edge can relay information to the base station via other neighboring devices. Te base station manager controls the link and allocates resources, either partially or completely [20,21]. (ii) DC-OC (direct D2D communication with operator controlled link establishment): In this case, the source and destination devices communicate directly without the need for routing data through a base station. ...
... (ii) DC-OC (direct D2D communication with operator controlled link establishment): In this case, the source and destination devices communicate directly without the need for routing data through a base station. However, the base station still plays a role in establishing control links for efcient radio resource management [20,21]. (iii) DR-DC (device relaying with device controlled link establishment): In this mode, D2D communication operates similarly to DR-OC but without the involvement of a base station. ...
Article
Full-text available
This paper seeks to improve mobile communications performance by integrating artificial intelligence (AI) techniques. The study is centered on device-to-device (D2D) communication, which has emerged as a significant aspect in the 5th generation of mobile networks (5G) and is expected to be extended to the 6th generation (6G). Based on the fuzzy system, the proposed solution tackles the critical issue of energy harvesting in D2D communication. The solution presents a support system that selects the best relay for the transmitter-receiver communication to minimize energy consumption and maximize the network’s lifetime. Minimizing energy consumption optimizes the network’s lifetime, thus providing a reliable and efficient communication system. The approach taken in this study offers a novel perspective in addressing the energy harvesting challenge in D2D communication. It is expected to have a significant impact on the performance of mobile communications.
... Device-to-device (D2D) communication enables Internet of Things (IoT) devices to communicate directly, bypassing base stations, and holds significant promise for the evolution of wireless networks. This paradigm promises reduced latency, enhanced energy efficiency, and offloading of cellular infrastructure burdens [1], [2]. However, challenges including limited range, signal blockage, and interference hinder its performance. ...
... We denote the channel vectors between the j-th transmitter and the STAR-RIS, and from the STAR-RIS to the k-th receiver as g j ∈ C N ×1 and u k ∈ C N ×1 , respectively. 1 Since receivers can be located on either the reflection or transmission side of the STAR-RIS, we define two sets: U r containing the indices of receivers on the reflection side and U t containing those on the transmission side. Assuming obstructions in the direct paths between transmitters and receivers, the effective channel gain from the j-th transmitter to the k-th receiver can be expressed as ...
Article
Full-text available
Device-to-device (D2D) communication offers significant potential for future wireless networks but faces challenges such as limited range, signal blockage, and interference. Reconfigurable intelligent surfaces (RISs) can mitigate these issues by dynamically controlling signal reflections. However, existing RIS-assisted D2D systems often rely on impractical infinite-resolution phase shifters and achieve limited coverage. This paper addresses these limitations by proposing a novel D2D communication system using simultaneous transmitting and reflecting RISs (STAR-RISs) with coupled and low-resolution phase shifters for cost-effective and full-space coverage D2D communication. We further introduce irregular STAR-RIS configurations where a subset of elements is strategically activated for enhanced spatial diversity. To optimize this system, a unified cross-entropy optimization (CEO) framework is developed for joint optimization of element selection (for irregular configurations) and the continuous amplitudes for transmission and reflection, along with the discrete phase shifts. Simulation results reveal that the proposed CEO-based algorithm achieves significantly higher sum rates compared to the benchmark algorithms. Furthermore, irregular STAR-RIS configurations provide additional gains in both sum rate and energy efficiency.
... This work was supported by Prof. G.K. Chandramani Chair, IIT Delhi. into communication standards (LTE-Advanced) due to their promise to improve both the reliability and range of the communication network [5], they are especially important in self-sustaining networks since the large variations in the link signal-to-noise (SNR) ratio greatly limit the quality of service (QoS) that can be attained. Consequently, cooperative communication links with EH self-sustaining nodes are important for enhancing energy efficiency, reliability, and range of wireless-powered cooperative communication networks (WPCCN). ...
... Since |b 5 | ≈ |b 6 |, a 12 in (88) reduces to a 12 ≈ |b 5 (89) ...
Preprint
Full-text available
In this paper, we analyze the secrecy performance of a two-hop cooperative network consisting solely of energy-harvesting self-sustaining nodes drawing energy from a multi-antenna power beacon (PB). Performance of such networks is quite different from that with powered nodes. We consider optimal combining of the direct and relayed signals at the multi-antenna destination as well as the multi-antenna eavesdropper. Since availability of channel state information at the source is impractical in such networks, we assume fixed-rate signaling. To implement incremental signaling, we utilize feedback bits from the destination. Assuming practical nonlinear EH, exact and approximate expressions are derived for the secrecy outage probability of the selective decode-and-forward (SDF) and the incremental decode-and-forward (IDF) relaying schemes. It is demonstrated that IDF has much better secrecy performance than SDF just as with powered nodes. However, unlike with powered nodes, the secrecy performance is a convex function of the transmit power of PB. We propose a novel power back-off scheme to improve secrecy under different network operating conditions. The security-reliability trade-off (SRT) is analyzed to highlight the trade-off between outage and secrecy performance with the power back-off scheme. Simulation results validate the analytical expressions.
... Optimization Algorithms [11], [33] Our survey explores optimization algorithms for D2D communication and their applicability and effectiveness in 6G V2X Sidelink environments, highlighting key findings and challenges. ...
... Where K is the total number of vehicles in the network, and R tot is the total amount of resources available in the system. The constraint (33) ensures that the sum of allocated resources across all vehicles does not exceed the total available resources R tot . This optimization problem seeks an optimal resource allocation strategy that achieves the highest network utility while adhering to the resource constraint, contributing to enhanced efficiency and performance in 6G V2X networks. ...
Article
Full-text available
The advent of 6G marks a transformative phase in wireless communication, ushering in a hyperconnected experience. This paper explores optimizing sidelink technologies in Vehicle-to-Everything (V2X) communication through integrating 6G capabilities. Emphasizing challenges in sidelink resource allocation, the study introduces mathematical solutions. The survey further investigates the evolution of Cellular-V2X (C-V2X) and sidelink standardization within the 6G V2X Sidelink context, highlighting key features and applications. Additionally, it examines inter-UE coordination, resource re-evaluation, and pre-emption operations in 5G-V2X Sidelink, addressing associated challenges and mathematical formulations. The paper focuses on power-based resource allocation in 5G-V2X, addressing challenges and proposing solutions for the 6G V2X Sidelink landscape. Encompassing direct communication, collision issues, spectrum compliance, resource fairness, uncertainty, and interference management, the survey comprehensively explores challenges and solutions in current sidelink resource allocation. It evaluates traditional and emerging techniques, such as cognitive radio, cooperative communication, power control, dynamic spectrum access, ML-aided allocation, blockchain-enabled allocation, and edge computing-driven allocation. The resource allocation requirements for diverse V2X services in 6G V2X Sidelink are outlined, explicitly focusing on Vehicular to Vehicular (V2V), Vehicular to Infrastructure (V2I), Vehicular to Pedestrian (V2P), and other V2X services, addressing their specific needs.
... The result and discussion of the proposed work are highlighted in section V. Section VI is used for conclusions and followed by listed references. mobile users are seeking high bandwidth for multimedia communication [24], [25]. The D2D communication technology often refers to that allows mobile user equipment to communicate with each nearby corresponding mobile node with/minimum or without the involvement of network infrastructures such as access points or mobile base stations [26], [27]. ...
... Bd SA dt. (24) Now we can write the overall performance metric function as in equation (25) ...
Article
Full-text available
With the exponential growth of mobile devices and high capabilities of intelligence, global communication network traffic is expected to experience remarkable growth in the next few years, as it leads us to poor network experience. The Device-to-Device (D2D) is a prominent solution to further expand the user experience and network performance. To improve it many nature-inspired computing algorithms are widely used. In line with this, we use swarm-based algorithms for network performance improvement. In this paper, we propose a swarm optimization-based resource allocation methodology for Device-to-Device communication, especially since we are focusing on the Bee fly pattern to optimize the resource available resources within the network’s proximity area. Where all bees are working together to find the best optimal availability of the network’s services, hereafter mobile users get served with a respective set of resources. If the performance is not up to the pre-defined threshold value then the system adds another set of available network resources and relay nodes. It leads to relay-assisted D2D pair communication based on the Bee fly pattern. It improves the D2D mobile pair’s user experience in terms of energy, delay, and mobility support. To validate our results we compare our outcome with state-of-the-art works and provide detailed observations subject to various listed parameters.
... employed in IoT networks to improve spectrum efficiency and data rates, along with reducing transmission delays [2][3][4]. Depending on whether radio frequency (RF) resources are shared between D2D users (DUs) and traditional cellular users (CUs), D2D communication can be classified into two categories: underlay and overlay communication. In particular, underlay D2D communication has been proven to provide a higher spectrum efficiency and match spectrum sharing nature in IoT networks [5]. ...
... For the sake of practicality, it is supposed that each DU can only select one relay for assistance and each relay is allowed to be attached to, at most, one DU at a time. To describe whether DU n ∈ N transmits data with the help of relay r ∈ R, we introduce another decision matrix for relay selection: α ∈ (α n,r ) N * R (2) where α n,r is a binary variable. Specifically, α n,r = 1 denotes that relay r aids DU n; otherwise, α n,r = 0. Furthermore, the drone relays involved in the aid utilize the mixed VLC/RF decode-and-forward protocol with a half duplex mode to transfer data, thus dividing the data transmission into two-hops: (1) DU-TX s transfers data to the corresponding relay r by reusing resource c m ∈ C; (2) the drone relay r forwards the data to the corresponding DU-RX d by reusing c m . ...
Article
Full-text available
Relay-aided Device-to-Device (D2D) communication combining visible light communication (VLC) with radio frequency (RF) is a promising paradigm in the internet of things (IoT). Static relay limits the flexibility and maintaining connectivity of relays in Hybrid VLC/RF IoT systems. By using a drone as a relay station, it is possible to avoid obstacles such as buildings and to communicate in a line-of-sight (LoS) environment, which naturally aligns with the requirement of VLC Systems. To further support the application of VLC in the IoT, subject to the challenges imposed by the constrained coverage, the lack of flexibility, poor reliability, and connectivity, drone relay-aided D2D communication appears on the horizon and can be cost-effectively deployed for the large-scale IoT. This paper proposes a joint resource allocation and drones relay selection scheme, aiming to maximize the D2D system sum rate while ensuring the quality of service (QoS) requirements for cellular users (CUs) and D2D users (DUs). First, we construct a two-phase coalitional game to tackle the resource allocation problem, which exploits the combination of VLC and RF, as well as incorporates a greedy strategy. After that, a distributed cooperative multi-agent reinforcement learning (MARL) algorithm, called WoLF policy hill-climbing (WoLF-PHC), is proposed to address the drones relay selection problem. Moreover, to further reduce the computational complexity, we propose a lightweight neighbor–agent-based WoLF-PHC algorithm, which only utilizes historical information of neighboring DUs. Finally, we provide an in-depth theoretical analysis of the proposed schemes in terms of complexity and signaling overhead. Simulation results illustrate that the proposed schemes can effectively improve the system performance in terms of the sum rate and outage probability with respect to other outstanding algorithms.
... The concept of Device-to-Device (D2D) communications, although out there for a few years, is booming in cutting-edge technologies such as 5G networks and beyond, besides local networking methods for dynamic information distribution [1]. It consists of peer-to-peer (P2P) communication without relying on fixed network infrastructure [2,3]. Moreover, its ability to be a stand-alone network has allowed it to enhance existing network infrastructures or to leverage them for stand-alone services. ...
... In terms of its interface, AtomD has two particular fragments for managing experiments, shown in Figure 3. 3 The first one, called "Dashboard," allows the user to define the roles that a node can play in the D2D communication and allows the user to observe the status and progress of the connection. The second one, called "Experiments," allows the user to set the different actions that the application can take during the D2D transfers. ...
... To satisfy the rapidly increasing demand for higher data rates, ultra-low latency, and massive connectivity, several appealing technologies have been developed and widely used in the fifth generation (5G) mobile communication systems [16,19]. As one of those technologies, D2D communication, which allows two proximate physical users to exchange data directly without traversing the base station (BS), has been widely employed in 5G to alleviate the traffic load of cellular networks [5,34]. Generally, the D2D devices can share the same licensed spectrum of cellular users in the D2D underlay structure [24]. ...
... (1) Complexity for making action decisions: In the case of each decaying DQN agent with 3 layers NN for discrete phase shifts selection, the complexity of a decaying DQN agent to make a decision is Oð A 2 j jà n þ s q ðtÞ Ã n þ nÞ, where A 2 j j indicates the size of the discrete action space in (30), s q ðtÞ indicates the dimensions of state presented in (34), and n is the number of the nodes in the hidden layers. ...
Article
Full-text available
Device-to-device (D2D) communication has been regarded as a promising solution to alleviate the mobile traffic explosion problem for its capabilities of improving system data rate and resource utilization. A reconfigurable intelligent surface (RIS) aided mobile D2D communications framework is investigated, where the RIS is deployed to improve communication quality. As the transmission distance of D2D pairs changes, the mode selection for D2D pairs and the phase shift design for RIS is essential for mobile scenarios. Therefore, we formulate a joint optimization problem of mode selection, channel assignment, power allocation, and discrete phase shift selection to maximize the average sum data rate of D2D pairs. This problem is also constrained by the maximum transmit power and the minimum data rate requirements of users, where the latter is to guarantee the fairness of D2D pairs. We first reformulate the original sequential decision-making problem into a Markov game (MG) problem to solve the challenging optimization. Furthermore, a multi-agent deep reinforcement learning (MADRL) framework is proposed, in which multiple agents cooperatively determine the joint mode selection and resource allocation strategy. The proposed MADRL-based framework combines both the multi-pass deep Q-networks (MP-DQN) algorithm and the decaying DQN algorithm to solve the optimization problem. Specifically, we adopt the MP-DQN algorithm for D2D pairs to handle the hybrid discrete-continuous action space. Moreover, the decaying DQN algorithm is invoked by the RIS agent to select discrete phase shifts. Simulation results demonstrate that the proposed algorithm can converge under different cases. The proposed MADRL-based algorithm outperforms the combination algorithm of DQN and the deep deterministic policy gradient (DDPG) in terms of system performance. Moreover, it is also shown that the average sum data rate of D2D pairs can be significantly improved by deploying the RIS and further enhanced by increasing the number of reflecting elements (REs).
... • Improve production and delivery to better serve more consumers. • Increase the flexibility of distribution networks and integrate renewable energy sources to improve system performance [109]. • Use smart meters to improve diagnostic efficiency and insight into grid operations. ...
Article
Full-text available
The integration of IoT (Internet of Things) in the energy sector has the potential to transform the way it generates, distributes, and consumes energy. IoT can enable real-time monitoring, control, and optimization of energy systems, leading to improved efficiency, reliability, and sustainability. This work is an attempt to provide an in-depth analysis of the integration of the IoT in the energy sector, examining the characteristics of IoT, its components, and protocols. It also explores the architecture of IoT, the latest advancements and challenges in the field of IoT, including the IoT communications model, IoT sensor boards, and the current challenges facing the industry and related security threats, and also provides suggestions for solutions to address IoT vulnerabilities. The work further delves into IoT in the energy sector aspect and explores the latest advancements and challenges in the field of IoT, including IoT in energy generation, smart cities, smart grids, smart buildings, and intelligent transportation. Additionally, the work explores the challenges of applying IoT in the energy sector discusses future trends in IoT in the energy sector, and aims to provide a detailed understanding of the latest developments and challenges of IoT in the energy sector, as well as its potential impact on the future of the industry. The work critically analyzes securing IoT devices and offers practical solutions to mitigate risks associated with IoT vulnerabilities. This work serves as a valuable resource for researchers, policymakers, and practitioners interested in understanding the impact of IoT on energy security. Graphical Abstract Taxonomy of the study.
... 2 Policy: According to Bozkurt et al. (2023), the use of ChnatGPT technology may need the modification of institutional norms and rules, including those pertaining to academic honesty and secrecy. According to Tehrani et al. (2014), institutions may find it essential to confirm their compliance with all applicable data privacy and student data protection laws and regulations. An educational institution could be requested, e.g., to confirm that ChatGPT magic is being used in a way that protects student data and confidentiality. ...
... Ефективність сучасних високошвидкісних комп'ютерних мереж різноманітних класів є критичною характеристикою для багатьох сервісів [1,2]. Для визначе-ння ефективності мультисервісної комп'ютер-ої мережі (МСМ) необхідно дотримуватись основних визначень, які існують у міжнародних стандартах [3]. ...
Article
Full-text available
Метою даної роботи є проведення аналізу методів управління процесами передачі даних та трафіком які зможуть забезпечити підвищення ефективності передачі даних у мультисервісних комп'ютерних мережах. Зростаючі потреби суспільства в нових послугах телекомунікаційних мереж призводять до зміни ідеології побудови останніх кожне десятиріччя. Сьогодні, на зміну технологіям, що використовують мультиплексування з розділенням та ущільненням за довжиною хвилі, приходять мультисервісні технології, основним принципом концепції яких є відділення одна від одної функцій перенесення та комутації, функцій керування транзакціями та функцій керування послугами. Зокрема, це можуть бути різноманітні корпоративні мережі, де важливо контролювати доступ до ресурсів, хмарні середовищах, де надаються різноманітні послуги, онлайн-ігрові сервіси, де потрібна низька затримка та стабільне з'єднання. Щоб підвищити ефективність мультисервісних комп’ютерних мереж сьогодні інтегрують технічні засоби, що використовують асинхронний режим передачі (технологія АТМ або B-ISDN), з застосунками для мережі Інтернет. При побудові таких мереж важливо враховувати класифікацію мережевих характеристик, а саме категорію трафіку для вибору оптимального методу управління. В даній статті розглянуто метод програмного управління параметрами з'єднанням та методи статистичного мультиплексування передачі даних, проаналізовані основні переваги та проблеми означених методів, які вимагають подальшого їх дослідження.
... Gadgets can also communicate with information garage agents to deliver captured statistics, update stored records, or retrieve saved records for computerized decision-making. In [28], a complete end-to-end solution for each application is needed to be provided for the healthcare strategy to cover the technical details. From the standpoint of verbal communication technology, the survey looked at crucial application-specific criteria. ...
Article
Peer-to-Peer communication is based on an important feature of communication which is Device-to-Device (D2D) communication. IoT is a computational device that is equipped with accurate identifiers and the capacity to speak data across a network without the assistance of a human. D2D communication is referred to as “Direct verbal exchange among the taking part gadgets without the use of the centralized infrastructure”. This research study examines the advantages and barriers of D2D communication as a means of meeting the IoT's requirements. Many companies and quality management organizations have demonstrated a strong interest in implementing the D2D approach in wireless networks. The thought of working without the necessary control of centralized supervision and making Wi-Fi networks wider as well as energy saving can be made possible with D2D communication in IoT. These devices' technical limitations and the connection's support limitations provide an upward push to numerous problems that must be addressed. Some of the IoT studies Electricity production, connectivity, security, scenario technologies, and so forth are all issues. We cognizance’s on troubles that in the IoT there is an influence in D2D communication surroundings. We also discovered some important stumbling blocks to the success of smart D2D speech communication in the Internet of Things. We talked about how to deal with these difficult situations. This research explains the idea of a tool to tool verbal exchange and IoT system and defines its predominant techniques and applications imparting a subsequent era therefore as procedure strategy to the demanding situations. To boost research and development in the domains IoT problems have been studied. Every cited research work's contribution and limitations are discussed as well as any potential problem statement and open rely.
... The Multi-access Edge Computing (MEC) standard [5] [6] enables the movement of IT traffic and services from a centralized cloud to an edge network closer to the customer. Instead of sending all the data to be processed to a cloud, the edge network analyzes, processes, and stores the data. ...
Article
In this paper, we study the coexistence of two key technologies in the same fifth-generation network, namely D2D (Device-to-Device) communication and MEC (Multi-Access Edge Computing) technology. These two promising technologies each have important roles to play in future telecommunications networks. D2D communication is a technology that aims to improve communication efficiency, increase overall throughput, and decrease latency. Multi-Access Edge Computing, a promising new concept, overcomes the burden of core cloud servers. This makes it possible to provide large storage, compute, and resource capacities to mobile edge nodes. With its closest deployment to users, it significantly reduces end-to-end transmission time. Our architecture consists of an access network and a central network, a base station (gNodeB), users, an MEC server and a gateway (UPF) to connect it to the RAN (Radio Access Network) of the core network. The base station controls communication by managing signaling and interference. The MEC server is placed next to the BS to provide data to the devices. It plays the role of the cloud that is located in the core network and allows you to store data and then do calculations for good communication between devices. Finally, we did a simulation using the OMNeT software. The results showed us that the data transmission passed well between the end devices, the antennas and the MEC server with very low latency and reliability.
... 1) Scheduling: Since the device-to-device functionality can facilitate effective sharing of resources [13], we consider the D2D communication in this work. Based on the information mixing procedure described in the previous subsection, each device needs to aggregate information of its neighbors. ...
Article
Full-text available
Federated learning (FL) is an emerging technique that enables privacy-preserving distributed learning. Most related works focus on centralized FL, which leverages the coordination of a parameter server to implement local model aggregation. However, this scheme heavily relies on the parameter server, which could cause scalability, communication, and reliability issues. To tackle these problems, decentralized FL, where information is shared through gossip, starts to attract attention. Nevertheless, current research mainly relies on first-order optimization methods that have a relatively slow convergence rate, which leads to excessive communication rounds in wireless networks. To design communication-efficient decentralized FL, we propose a novel over-the-air decentralized second-order federated algorithm. Benefiting from the fast convergence rate of the second-order method, total communication rounds are significantly reduced. Meanwhile, owing to the low-latency model aggregation enabled by over-the-air computation, the communication overheads in each round can also be greatly decreased. The convergence behavior of our approach is then analyzed. The result reveals an error term, which involves a cumulative noise effect, in each iteration. To mitigate the impact of this error term, we conduct system optimization from the perspective of the accumulative term and the individual term, respectively. Numerical experiments demonstrate the superiority of our proposed approach and the effectiveness of system optimization.
... To work on these perspectives, there is need to deploy the sensor nodes with higher lifetime so that there is minimum decay or loss of signals strength. UWSN can be equipped with the 5G network based communication for higher security and better transmission rate [8,9]. Following is the traditional scenario of underwater network having assorted constituents deployed in the ocean region with the monitoring cells. ...
Article
Wireless Networks are known to be susceptible from different energy consumption issues and enormous algorithms are devised so far to improve the lifetime of sensor networks. Low-energy adaptive clustering hierarchy (LEACH) is one of the classical approaches that is adopted in many wireless implementations along with the variants of LEACH to escalate the overall life of nodes as well as ne twork. Underwater Sensor Network or Acoustic Network (UWSN / UWAN) is a type of wireless network that is deployed under the ocean to monitor the movements of enemy or specific corporate purposes. The UWSN are having their base stations at the ships to keep a nd log the signals from underwater sensor nodes (USN). Such nodes are difficult to track physically and once their lifetime is over because of energy depletion, there is need to redeploy these nodes. To improve the lifetime of such underwater network, a novel and energy efficient approach of population based optimization is used in this research work with integration of soft computing. In this approach, the behavior of the bees in selecting their heads is adopted to form the dynamic cluster head in underwater wireless networks. It is found from the results that the bee colony based energy optimization approach is better as compared to the traditional approach in terms of multiple parameters.
... Device-to-device (D2D) communication, which allows devices to share their radio access connections, emerged as a potential solution to reduce the cost of local service provision and address the rising density of networks. This change was in line with evolving trends in the telecommunications market [55]. Indeed, the centralized architecture of mobile networks required some adjustments to support the growing traffic. ...
Article
Full-text available
Smart cities and 6G are technological areas that have the potential to transform the way we live and work in the years to come. Until this transformation comes into place, there is the need, underlined by research and market studies, for a critical reassessment of the entire wireless communication sector for smart cities, which should include the IoT infrastructure, economic factors that could improve their adoption rate, and strategies that enable smart city operations. Therefore, from a technical point of view, a series of stringent issues, such as interoperability, data privacy, security, the digital divide, and implementation issues have to be addressed. Notably, to concentrate the scrutiny on smart cities and the forthcoming influence of 6G, the groundwork laid by the current 5G, with its multifaceted role and inherent limitations within the domain of smart cities, is embraced as a foundational standpoint. This examination culminates in a panoramic exposition, extending beyond the mere delineation of the 6G standard toward the unveiling of the extensive gamut of potential applications that this emergent standard promises to introduce to the smart cities arena. This paper provides an update on the SC ecosystem around the novel paradigm of 6G, aggregating a series of enabling technologies accompanied by the descriptions of their roles and specific employment schemes.
... It is observed that fifthgeneration technology remarkably develops the modern world's speeds of user-level experience. Additionally, recent research in this field indicates that 5G affords quicker download speeds in comparison to wifi [4] [5]. ...
Article
Full-text available
In today's globalized world, there is a continuously growing interest in next-generation (5G) communication of versatile wireless network services for its popularity. A great technological transformation has been made in next-generation (5G) communication in cellular phone services in terms of screen size, data processing capacity, resolution density, and cost. To develop network coverage area, proper energy and bandwidth utilization, and faster communication with a cheap rate, next-generation (5G) communication has been introduced at several interconnected communication levels. No doubt, we still have to handle some remarkable challenges like the cell internal interference problem of a heterogeneous network, appropriate implementation of software-defined network concept at network architecture stage, network storage, resource management, and security in this 5G communication area. Additionally, upgraded signal processing, perfect channel estimation, network optimization, and successful mobility management are the important challenges to be faced in this field. Our main aim is to identify the key challenges and issues that area related to 5G communications and to discuss how these issues and challenges can be handled effectively in various commercial applications. In our research paper, we will attempt to emphasize some particular challenges and issues of next-generation (5G) communication as well as introduce a specific strategy to manage those challenges in this field. Moreover, a comparative analysis will be presented which will evidently make a distinction between the existing research work and our research in next-generation (5G) communication in a wireless network application.
... It is important to note that the mode of use for any communication depends on the distance between the devices involved in the communication, the channel gain, the quality of service (QoS), and the transmission power of the sending device. Analytical Technique (Wei et al., 2014) Poisson point process (Peng et al., 2009) Interference avoidance mechanism (Ghazanfari et al., 2015) Lagrangian algorithm (Tanbourgi et al., 2014) Poisson Veronoi tessellation (Shah et al., 2015) Proportional fair resource allocation (Tehrani et al., 2014) Game theory Successive interference cancellation (Hoang et al., 2014) Resource and power allocation algorithm Joint algorithm (He et al., 2014) Stackelberg game ...
Article
Several efforts are being made to improve the capacity of 5G networks using emerging technologies of interest. One of the indispensable technologies to fulfill the need is device-to-device (D2D) communication with its untapped associated benefits. Interference is introduced at the base station due to massive traffic congestion. The purpose of this research is to expand the knowledge of interference mitigation in D2D using stochastic geometrical tools which will result in capacity enhancement. This study uses a literature review method based on 5G and other already existing literature on D2D communication. More than one hundred and twenty papers on D2D communications in cellular networks exist but no precise survey paper on interference management to enhance capacity using stochastic geometrical tools exists. The contribution of this survey to theory is that apart from already existing capacity enhancement methods, interference mitigation using stochastic geometrical tools is another technique that can also be used for capacity enhancement in D2D communications.
Article
An ultracompact broadside and backfire pattern reconfigurable Huygens dipole antenna (HDA) is developed that achieves a quasi-isotropic and uniformly-polarized radiation pattern. A novel reconfiguration scheme is adopted that only switches the phase of the electric dipole by 180° in an electrically small Huygens (complementary) source antenna. Its magnetic dipole is left unchanged. The system is realized by an Egyptian axe dipole (EAD), a reconfigurable capacitively-loaded loop (CLL) with one PIN diode, a reconfigurable short driven-dipole with one PIN diode, one capacitor, four DC biasing lines, and four RF chokes. The antenna radiates a broadside Huygens pattern when all the diodes are off. By turning on the diode in the middle of the additional thin strip below the top strip of the CLL, a 180° phase alteration will be obtained and a backfire Huygens pattern is realized. To achieve an overlapped operating band for the two pattern modes, the diode in the short driven-dipole is turned on to extend its length to compensate for the ensuing impedance mismatch. Measured results confirm the simulations. The antenna is attractive for wireless applications that require compact antennas with large radiation coverage and uniform polarization.
Article
Full-text available
Device-to-device (D2D) communications underlaying cellular networks enhance system capacity and bandwidth utilization. In this approach, secondary users (D2D devices) share the radio resources allocated to primary users (cellular UE), achieving increased system capacity and spectrum efficiency. However, the allocation of inappropriate resources and transmission power to devices introduces excessive co-channel interference, which could impair primary user communication. The proposed research addresses this challenge by developing a Multi-Value Bipartite Matching (MBM) Algorithm that jointly allocates resources and transmission power for both primary and secondary users maintaining individual data rate constraints. Numerical analyses show that this approach outperforms existing algorithms in determining appropriate power levels while meeting specified constraints, ultimately improving system capacity and reducing interference.
Chapter
The dependencies, interdependencies, and interrelationships between artificial intelligence (AI) and Internet of Things (IoT) are discussed in this chapter. The interaction between these fields creates a new convergence that permits standardisation, interoperability, and security. The focus of this chapter is on applications, underlying technologies, 6G network systems, and D2D communication within the framework of an intelligent and integrated ecosystem for computing, communication, coordination, and decision making. This chapter highlights some of the core 6G technologies that are anticipated to make it possible for IoT and AI to seamlessly converge.
Article
Full-text available
The throughput maximization, economic issues and truthful bidding are the essential parameters for resource sharing between the cellular user (CU) and Device‐to‐Device (D2D) users in 5G networks. However, most of the literature on D2D focuses on optimizing system throughput without considering the economic issues and truthful bidding. Therefore, we are focusing on financial matters and truthful bidding along with system throughput optimization. This article also encourages users to trade their resources and achieve high auction efficiency with honest bidding strategies. This article presents an experience weighted attraction‐double auction (EWA‐DA)‐based resource allocation method for 5G networks. The proposed method divides the cellular users into seller cellular users (SCU) and buyer cellular users (BCU). The SCU broadcasts the beacon packet, and the proximity cellular users responded immediately to the beacon considered BCU and formed a D2D group. The buyer and seller cellular users send their bid values to the base station side. The BS applies an experience weighted attraction‐learning model for getting truthful bidding values. Finally, an ask to mean value double auction model was used over the truthful bid values. Extensive simulation results show that the proposed method achieves high auction efficiency and truthful profits for seller and buyer cellular users. With the obtained results, it was observed that the system throughput increased comparatively. We also observed that the participant users have achieved truthful bidding and utilized fewer resource blocks than existing methods image
Chapter
The primary objective of researching the Internet of Things as a tool is to regulate and oversee agriculture in order to facilitate the growth of a greater variety of crops and an increase in the quantity of crops produced overall. Farmers are subjected to a wide range of challenges, including uneven distribution of water, unstable weather conditions (such as wind, hailstorm, UV radiations, and pesticide assaults), and a diverse range of soil types. Because water should be spread in an equal manner, it becomes extremely difficult to control the uneven distribution of water; hence, a new irrigation system has to be created in order to circumvent this challenge. Greenhouse has shown to be a very helpful tool in resolving all of these issues. An inclined technology is one that utilizes the Internet of Things in order to make greenhouse a more adaptable platform. In this case, a GSM module is used for the purpose of managing the tube well, in addition to a fogger and a variety of sensors for regulating the temperature and the relative humidity. Large regions are now covered by sensor networks, which is helpful since it allows for the creation of greenhouses with realistic environments, which plays a significant role in the development of crops.
Conference Paper
In this paper, systematic review of Doherty power amplifier for future wireless communication applications is presented. The Doherty power amplifier works on the principle basic operation and design of Doherty power amplifier is presented. The Doherty power amplifier is mainly facing limited bandwidth operation while maintaining the desired efficiency and linearity. The design challenges highlighting the bandwidth limiting factors are discussed in detail. The latest research trends focused on improving the performance of Doherty amplifier using various architectures and their main challenges as well as solutions are addressed. The latest techniques are reviewed to enhance the performance of Doherty power amplifier in terms of peak, back-off efficiency, and bandwidth along with maintaining the linearity to make it most suitable and preferable candidate for future wireless communication applications.
Article
In fifth-generation (5G)-based vehicular networks, vehicles share information about the road’s condition to make driving safer and alleviate traffic congestion. Given the public nature of the medium, addressing issues of confidentiality and security is of paramount importance. Existing systems are vulnerable to a distributed denial-of-service (DDoS) attack from an attacker or high traffic in a dense area because of the time-consuming and complex operations based on bilinear pair and elliptic curve cryptographies used. In order to protect vehicle-to-vehicle communication in 5G-based vehicular networks from DDoS attacks, a strategy based on the Chebyshev polynomial is proposed in this study. The semi-group and chaotic features of the Chebyshev polynomial are utilised in our proposal. Our solutions also meet all applicable standards for security and privacy, such as node authentication, message integrity, preserving identity privacy, traceability, unlinkability, and resistance to attacks. Finally, our innovation decreases the computational burden to produce a message signature by 66.67% and the burden to verify a signature by 33.33%. However, the size of the message-signature tuple is affected by the communication expenses of our work by 5.00%.
Article
Full-text available
The fifth generation (5G) mobile communication systems employ technologies such as massive MIMO, millimeter-wave (mmWave), and ultra-dense networks to support higher transmission data rate and lower latency, thereby enabling commercial deployment. Furthermore, the forthcoming sixth generation (6G) networks will integrate terrestrial and non-terrestrial networks, aiming to achieve full spectrum, full applications, and global coverage. Whether in the context of 5G or 6G networks, base transceiver stations (BTS) require a substantial number of radio frequency (RF) transceiver chains and antenna array, particularly in mmWave frequency bands. It is known that bandpass RF filters between antenna elements and transceivers are key components for suppressing out-of-band spurs and interference. The single board seamless integration of transceivers and antennas has become a growing trend. It means there is no extra room for a large number of filters at mmWave bands, leading to the emergence of integrated designs that combine filtering circuitry with antennas, known as filtenna or filtering antenna. With illustrated examples, the design methodologies, operational principles, and implementation strategies of filtennas are reviewed in this paper.
Article
Decentralized Federated Learning (DFL) is a novel distributed machine learning paradigm where participants collaborate to train machine learning models without the assistance of the central server. The decentralized framework can effectively overcome the communication bottleneck and single point of failure issues encountered in Federated Learning (FL). However, most existing DFL methods may ignore the communication resource constraints of the system. This may result in these methods unsuitable for many practical scenarios because the given resource constraints cannot be guaranteed. In this paper, we propose a novel DFL, called AdapCom-DFL, that can adaptively adjust the compression ratio of transmission data to keep the communication latency within the constraint. Furthermore, we propose a communication network topology pruning approach to reduce communication overhead by pruning poor links with low data rates while ensuring the convergence. Additionally, a power allocation approach is presented to improve the performance by reallocating the power of communication links while complying with the communication energy constraint. Extensive simulation results demonstrate that the proposed AdapCom-DFL with network pruning and power allocation approach achieves better performance and requires less bandwidth under the given resource constraints compared with some existing approaches.
Conference Paper
A coplanar waveguide-fed multiband composite right/left-handed (CRLH) antenna, a class of metamaterials (MTMs) is presented in this paper. It is designed by embedding two unit-cells of CRLH transmission line on the top and bottom surfaces of an FR4 epoxy substrate with the help of metallic vias. The multiband characteristic is obtained by generating four resonances due to CRLH unit-cells, feed-patch and the ground plane. The simulated results show three frequency bands spanning over 1.3 to 1.87 GHz, 2.36 to 2.63 GHz and 3.14 to 4.62 GHz with return loss below-10 dB. The realized gains have been found as 2.5, 2.56, 4.85 and 4.9 dB at the resonant frequencies of 1.57, 2.4, 3.4 and 4.2 GHz respectively. The radiation efficiency is well above 77% at each resonant frequency with a peak value of 94.76%.
Article
Federated learning (FedL) has emerged as a popular technique for distributing model training over a set of wireless devices, via iterative local updates (at devices) and global aggregations (at the server). In this paper, we develop parallel successive learning (PSL), which expands the FedL architecture along three dimensions: (i) Network , allowing decentralized cooperation among the devices via device-to-device (D2D) communications. (ii) Heterogeneity , interpreted at three levels: (ii-a) Learning: PSL considers heterogeneous number of stochastic gradient descent iterations with different mini-batch sizes at the devices; (ii-b) Data: PSL presumes a dynamic environment with data arrival and departure, where the distributions of local datasets evolve over time, captured via a new metric for model/concept drift . (ii-c) Device: PSL considers devices with different computation and communication capabilities. (iii) Proximity , where devices have different distances to each other and the access point. PSL considers the realistic scenario where global aggregations are conducted with idle times in-between them for resource efficiency improvements, and incorporates data dispersion and model dispersion with local model condensation into FedL. Our analysis sheds light on the notion of cold vs. warmed up models, and model inertia in distributed machine learning. We then propose network-aware dynamic model tracking to optimize the model learning vs. resource efficiency tradeoff, which we show is an NP-hard signomial programming problem. We finally solve this problem through proposing a general optimization solver. Our numerical results reveal new findings on the interdependencies between the idle times in-between the global aggregations, model/concept drift, and D2D cooperation configuration.
Article
With the explosive increase of intelligent applications and smart terminals, the high-speed transmission is the fundamental requirement for the future network. As a powerful deployment strategy, the heterogeneous network (HetNet) is of great significance for improving network throughput. This paper investigates the resource allocation problem in the HetNet with device-to-device (D2D) communication, where sub-channel allocation and power allocation are jointly optimized to maximize the network throughput under the constraints of sub-channel allocation, transmitting power and throughput. The formulated optimization problem is a mixed-integer non-linear programming (MINLP) problem, which is difficult to be solved directly, due to the coupling of discrete sub-channel allocation variables and continuous power optimization variables. To deal with this issue, the time sharing factor (TSF) method is exploited to transform the original MINLP problem into a tractable continuous problem. Since the traditional centralized schemes necessarily aggravates computational burden on the central node and reduces network reliability, an integrated cooperative distributed resource allocation algorithm (CDRAA) is proposed in this paper, where all the small base stations (SBSs) and macro base stations (MBSs) cooperatively participate in resource allocation instead of the unique manipulation by the central node. Simulation results demonstrate the performance gap and the running time comparison between the proposed algorithms and the centralized algorithm. In addition, the convergence of the proposed algorithms is verified in several different network settings. The network throughput achieved by the proposed CDRAA is higher than that obtained by the alternating optimization (AO) algorithm and the centralized algorithm based on the TSF method when a great number of sub-channels is provided.
Thesis
Full-text available
During large-scale disasters, emergency communication systems that are reliable, responsive, and energy-efficient are crucial. This thesis focuses on designing reliable emergency communication systems for disaster scenarios in out-of-coverage areas. The proposed systems are designed to work seamlessly across the data link, network, and application layers. At the data link layer, a new decoding scheme named Cyclic Triangular Successive Interference Cancellation (Cyclic T-SIC) is proposed to enhance the reliability in Asynchronous NOMA-assisted D2D communications. Moreover, at the network layer, new multi-hop protocols namely Multi-Hop Emergency caLl Protocol (M-HELP) and 5G Standalone Service (5G-SOS) that comply with 3GPP standards are introduced to reduce control traffic and improve emergency information transfer reliability. Moreover, a new Multi Victim Localization Algorithm (MVLA) is proposed at the application layer to locate victim devices during emergencies. This scheme uses radio data from outband D2D-assisted multi-hop emergency calls and applies constraint satisfaction methods to locate victims in a progressive propagation manner. Additionally, an emergency service architecture is also proposed comprising an optimized machine learning model to locate population-congested areas during pandemics. By comparing and evaluating the proposed methods and schemes with conventional state-of-the-art approaches, valuable insights are obtained into the design of efficient and optimal emergency communication systems for areas with limited network coverage.
Chapter
Reflecting intelligent surface (RIS) assisted millimeter wave (mmWave) device to device (D2D) communication in single input single output (SISO) mode is considered. RIS can bypass the blocked D2D pairs since mmWaves are highly susceptible to blockages. However, the RIS is composed of passive elements which cannot accurately measure the state of the given channel and may suffer outages from moving obstacles (blockages) or due to moving devices (communication out of range) causing uncertainty in link quality. Each data packet will have some probability to be successfully transmitted towards the destination device via a RIS in each time unit. When a packet is lost it has to be re-transmitted which will induce extra delay. In this paper, the impact of link success probability on delay is studied. A lower bound on delay such that all packets are received successfully for the given link success probability has been derived. Later, we have derived a new term called apparent success probability which captures the trade-off between delay and link success probability. Simulations are performed which conforms with the derived theoretical results.KeywordsReflecting Intelligent Surface (RIS)D2D communicationObstaclesChernoff’s boundLink Success Probability
Article
Full-text available
Device-to-device (D2D) communications underlaying a cellular infrastructure has been proposed as a means of taking advantage of the physical proximity of communicating devices, increasing resource utilization, and improving cellular coverage. Relative to the traditional cellular methods, there is a need to design new peer discovery methods, physical layer procedures, and radio resource management algorithms that help realize the potential advantages of D2D communications. In this article we use the 3GPP Long Term Evolution system as a baseline for D2D design, review some of the key design challenges, and propose solution approaches that allow cellular devices and D2D pairs to share spectrum resources and thereby increase the spectrum and energy efficiency of traditional cellular networks. Simulation results illustrate the viability of the proposed design.
Article
Full-text available
This article studies direct communications between user equipments in the LTE-advanced cellular networks. Different from traditional device-to-device communication technologies such as Bluetooth and WiFi-direct, the operator controls the communication process to provide better user experience and make profit accordingly. The related usage cases and business models are analyzed. Some technical considerations are discussed, and a resource allocation and data transmission procedure is provided.
Article
Full-text available
Sensors have varied constraints, which makes the network challenging for communicating with its peers. In this paper, an extension to the security of physical layer of a predictive sensor network model using the ant system is pro-posed. The Denial of Service (DoS) attack on sensor networks not only diminishes the network performance but also affects the reliability of the information making detection of a DoS threat is more crucial than recovering from the attack. Hence, in this paper, a novel approach in detecting the DoS attack is introduced and analyzed for a variety of scenarios. The DoS attack is dependent on the vulnerabilities in each layer, with the physical layer being the lowest layer and the first to be attacked by jammers. In this paper, the physical layer DoS attack is analyzed and a defense mechanism is proposed. Classification of the jammer under various attack scenarios is formulated to predict the genunity of the DoS attacks on the sensor nodes using receiver operating characteristics (ROC). This novel approach helps in achieving maximum reliability on DoS claims improving the Quality of Service (QoS) of WSN.
Article
Full-text available
Machine-to-machine (M2M) communication is viewed as one of the next frontiers in wireless communications. M2M communication applications and scenarios are growing and lead the way to new business cases. Because of the nature of M2M scenarios, involving unguarded, distributed devices, new security threats emerge. The use case scenarios for M2M communication also address the new requirement on flexibility, because of deployment scenarios of the M2ME in the field. We believe that these new requirements require a paradigm shift. One important pillar of such a shift will be a new, more balanced mix of device-centric trust and traditional enforcement of security properties.
Article
Full-text available
In this article device-to-device (D2D) communication underlaying a 3GPP LTE-Advanced cellular network is studied as an enabler of local services with limited interference impact on the primary cellular network. The approach of the study is a tight integration of D2D communication into an LTE-Advanced network. In particular, we propose mechanisms for D2D communication session setup and management involving procedures in the LTE System Architecture Evolution. Moreover, we present numerical results based on system simulations in an interference limited local area scenario. Our results show that D2D communication can increase the total throughput observed in the cell area.
Article
Full-text available
Wireless sensor network applications include ocean and wildlife monitoring, manufacturing machinery performance monitoring, building safety and earthquake monitoring, and many military applications. A major benefit of these systems is that they perform in-network processing to reduce large streams of raw data into useful aggregated information. Protecting it all is critical. Because sensor networks pose unique challenges, traditional security techniques used in traditional networks cannot be applied directly. To make sensor networks economically viable, sensor devices are limited in their energy, computation, and communication capabilities research. People cover several important security challenges, including key establishment, secrecy, authentication, privacy, robustness to denial-of-service attacks, secure routing, and node capture. Security is sometimes viewed as a standalone component of a system's architecture, where a separate module provides security. To achieve a secure system, security must be integrated into every component, since components designed without security can become a point of attack.
Article
Full-text available
With the ever growing demand of data applications, traditional cellular networks face the challenges of providing enhanced system capacity, extended cell coverage, and improved minimum throughput in a cost-effective manner. Wireless relay stations, especially when operating in a halfduplex operation, make it possible without incurring high site acquisition and backhaul costs. Design of wireless relay stations faces the challenges of providing backward compatibility, minimizing complexity, and maximizing efficiency. This article provides an overview of the challenges and solutions in the design of relay stations as one of the salient features for 3GPP LTE advanced.
Article
As the specification of Release 11 of the LTE standards is approaching its completion, 3GPP is gradually moving its focus toward the next major step in the evolution of LTE. The drivers of the LTE evolution include the increasing demand for mobile broadband services and traffic volumes as well as emerging usage scenarios involving short-range and machine-type communications. In this article we provide an overview of the key technology areas/components that are currently considered by 3GPP for Rel-12, including support for further enhanced local area access by tight interaction between the wide area and local area layers, signaling solutions for wireless local area network integration, multi-antenna enhancements, improved support for massive MTC, and direct device-to-device communications.
Article
Device-to-device (D2D) communication is a promising technology for wireless communication in the near future. Since D2D communication usually reuses the resource of cellular users, interference management is a key element. However, when secrecy capacity is taken into consideration, the interference caused by D2D communication could be taken advantage of as a kind of help against eavesdroppers. In this paper, we novelly introduce D2D communication into the problem of secrecy capacity, such that D2D pair could achieve its own transmission while the secrecy requirement of cellular communication is still satisfied. Moreover, we utilize secrecy outage probability to better depict the imperfect channel state information at the eavesdropper. We also derive the optimal transmission power and propose the access control mechanism.
Article
In cellular networks, proximity users may communicate directly without going through the base station, which is called Device-to-device (D2D) communications and it can improve spectral efficiency. However, D2D communications may generate interference to the existing cellular networks if not designed properly. In this paper, we study a resource allocation problem to maximize the overall network throughput while guaranteeing the quality-of-service (QoS) requirements for both D2D users and regular cellular users (CUs). A three-step scheme is proposed. It first performs admission control and then allocates powers for each admissible D2D pair and its potential CU partners. Next, a maximum weight bipartite matching based scheme is developed to select a suitable CU partner for each admissible D2D pair to maximize the overall network throughput. Numerical results show that the proposed scheme can significantly improve the performance of the hybrid system in terms of D2D access rate and the overall network throughput. The performance of D2D communications depends on D2D user locations, cell radius, the numbers of active CUs and D2D pairs, and the maximum power constraint for the D2D pairs.
Article
As the specification of Release 11 of the LTE standards is approaching its completion, 3GPP is gradually moving its focus toward the next major step in the evolution of LTE. The drivers of the LTE evolution include the increasing demand for mobile broadband services and traffic volumes as well as emerging usage scenarios involving short-range and machine-type communications. In this article we provide an overview of the key technology areas/components that are currently considered by 3GPP for Rel-12, including support for further enhanced local area access by tight interaction between the wide area and local area layers, signaling solutions for wireless local area network integration, multi-antenna enhancements, improved support for massive MTC, and direct device-to-device communications.
Article
Device-to-device (D2D) communications help improve the performance of wireless multicast services in cellular networks via cooperative retransmissions among multicast recipients within a cluster. Resource utilization efficiency should be taken into account in the design of D2D communication systems. To maximize resource efficiency of D2D retransmissions, there is a tradeoff between multichannel diversity and multicast gain. In this paper, by analyzing the relationship between the number of relays and minimal time-frequency resource cost on retransmissions, we derive a closed-form probability density function (pdf) for an optimal number of D2D relays. Motivated by the analysis, we then propose an intracluster D2D retransmission scheme with optimized resource utilization, which can adaptively select the number of cooperative relays performing multicast retransmissions and give an iterative subcluster partition algorithm to enhance retransmission throughput. Exploiting both multichannel diversity and multicast gain, the proposed scheme achieves a significant gain in terms of resource utilization if compared with its counterparts with a fixed number of relays.
Article
Are you involved in designing the next generation of wireless networks? With spectrum becoming an ever scarcer resource, it is critical that new systems utilize all available frequency bands as efficiently as possible. The revolutionary technology presented in this book will be at the cutting edge of future wireless communications. Dynamic Spectrum Access and Management in Cognitive Radio Networks provides you with an all-inclusive introduction to this emerging technology, outlining the fundamentals of cognitive radio-based wireless communication and networking, spectrum sharing models, and the requirements for dynamic spectrum access. In addition to the different techniques and their applications in designing dynamic spectrum access methods, you'll also find state-of-the-art dynamic spectrum access schemes, including classifications of the different schemes and the technical details of each scheme. This is a perfect introduction for graduate students and researchers, as well as a useful self-study guide for practitioners.
Article
The significant advances of hardware manufacturing technology and the development of efficient software algorithms make technically and economically feasible a network composed of numerous, small, low-cost sensors using wireless communications, that is, a wireless sensor network. WSNs have attracted intensive interest from both academia and industry due to their wide application in civil and military scenarios. In hostile scenarios, it is very important to protect WSNs from malicious attacks. Due to various resource limitations and the salient features of a wireless sensor network, the security design for such networks is significantly challenging. In this article, we present a comprehensive survey of WSN security issues that were investigated by researchers in recent years and that shed light on future directions for WSN security.
  • D Astely
D. Astely et al., " LTE Release 12 and Beyond, " IEEE Commun. Mag., vol. 51, no. 7, 2013, pp. 154–60.
His research interests cover many aspects of wireless technologies with special emphasis on cellular networks. He has coauthored more than 60 IEEE journal papers on wireless technologies. His collaborative research with industry has resulted in about 15 patents
  • Halim Yanikomeroglu
HALIM YANIKOMEROGLU [M] (halim@sce.carleton.ca) is a full professor in the Department of Systems and Computer Engineering at Carleton University, Ottawa, Canada. His research interests cover many aspects of wireless technologies with special emphasis on cellular networks. He has coauthored more than 60 IEEE journal papers on wireless technologies. His collaborative research with industry has resulted in about 15 patents (granted and applied). He is a Distinguished Lecturer for the IEEE Vehicular Technology Society.
respectively, and his Ph.D. degree from the University of Waterloo, Canada, in 2013, all in electrical engineering. His current research interests are in the broad areas of resource allocation for wireless communication systems He is currently a postdoctoral fel
  • Mohsen Nader Tehrani
MOHSEN NADER TEHRANI (mnaderte@uwaterloo.ca) received his B.S. and M.Sc. degrees from Isfahan University of Technology, Iran, in 2006 and 2009, respectively, and his Ph.D. degree from the University of Waterloo, Canada, in 2013, all in electrical engineering. His current research interests are in the broad areas of resource allocation for wireless communication systems. He is currently a postdoctoral fel