Peer-to-peer communication has been recently considered as a popular issue for local areaservices. An innovative resource allocation scheme is proposed to improve the performance of mobile peer-to-peer, i.e., device-to-device (D2D), communications as an underlay in the downlink (DL) cellular networks. To optimize the system sum rate over the resource sharing of both D2D and cellular modes, we introduce a reverse iterative combinatorial auction as the allocation mechanism.In the auction, all the spectrum resources are considered as a set of resource units, which as bidders compete to obtain business while the packages of the D2D pairs are auctioned off as goods in each auction round. We first formulate the valuation of each resource unit, as a basis of the proposed auction. And then a detailed non-monotonic descending price auction algorithm is explained depending on the utility function that accounts for the channel gain from D2D and the costs for the system. Further, we prove that the proposed auction-based scheme is cheat-proof, and converges in a finite number of iteration rounds. We explain non-monotonicity in the price update process and show lower complexity compared to a traditional combinatorial allocation. The simulation results demonstrate that the algorithm efficiently leads to a good performance on the system sum rate.
Abstract-At the time of writing, vehicle-to-vehicle (V2V) communication is enjoying substantial research attention as a benefit of its compelling applications. However, the ever-increasing teletraffic is expected to result in overcrowding of the available band. As a first resort, multiple-input multiple-output (MIMO) can be utilized to enhance the attainable bandwidth efficiency or link reliability. However, in hostile V2V wireless propagation environments the achievable multiple-antenna gain is eroded by the channel correlation. As a promising MIMO technique, spatial modulation (SM) only activates a single transmit antenna (TA) in any symbol-interval and hence completely avoids the inter-antenna interference (IAI), hence showing robustness against channel correlation. As a further powerful solution, non-orthogonal multiple access (NOMA) has been proposed for improving the bandwidth efficiency. Inspired by the robustness of SM against channel correlation and the benefits of NOMA, we intrinsically amalgamate them into NOMA-SM in order to deal with the deleterious effects of wireless V2V environments as well as to support improved bandwidth efficiency. Moreover, the bandwidth efficiency of NOMA-SM is further boosted with the aid of a massive TA configuration. Specifically, a spatiotemporally correlated Rician channel is considered for a V2V scenario. We investigate the bit error ratio (BER) performance of NOMA-SM via Monte Carlo simulations, where the impact of the Rician K-factor, spatial correlation of the antenna array, time-varying effect of the V2V channel, and the power allocation factor is discussed. Furthermore, we also analyse the capacity of NOMA-SM. By analysing the capacity and deriving closedform upper bounds on the capacity, a pair of power allocation optimization schemes are formulated. The optimal solutions are demonstrated to be achievable with the aid of our proposed algorithm. Again, instead of simply invoking a pair of popular techniques, we intrinsically amalgamate SM and NOMA to conceive a new system component exhibiting distinct benefits in the V2V scenarios considered.Index Terms-Spatial modulation (SM), non-orthogonal multiple access (NOMA), massive multiple-input multiple-output (MIMO), vehicle-to-vehicle (V2V), channel capacity, bit error ratio (BER).
In this paper, we investigate joint relay and jammer selection in two-way cooperative networks, consisting of two sources, a number of intermediate nodes, and one eavesdropper, with the constraints of physical-layer security. Specifically, the proposed algorithms select two or three intermediate nodes to enhance security against the malicious eavesdropper. The first selected node operates in the conventional relay mode and assists the sources to deliver their data to the corresponding destinations using an amplify-and-forward protocol. The second and third nodes are used in different communication phases as jammers in order to create intentional interference upon the malicious eavesdropper. First, we find that in a topology where the intermediate nodes are randomly and sparsely distributed, the proposed schemes with cooperative jamming outperform the conventional nonjamming schemes within a certain transmitted power regime. We also find that, in the scenario where the intermediate nodes gather as a close cluster, the jamming schemes may be less effective than their nonjamming counterparts. Therefore, we introduce a hybrid scheme to switch between jamming and nonjamming modes. Simulation results validate our theoretical analysis and show that the hybrid switching scheme further improves the secrecy rate.
In this paper, we investigate joint relay and jammer selection in two-way cooperative networks, consisting of two sources, a number of intermediate nodes, and one eavesdropper, with the constraints of physical layer security. Specifically, the proposed algorithms select two or three intermediate nodes to enhance security against the malicious eavesdropper. The first selected node operates in the conventional relay mode and assists the sources to deliver their data to the corresponding destinations using an amplify-and-forward protocol. The second and third nodes are used in different communication phases as jammers in order to create intentional interference upon the eavesdropper node. Firstly, we find that in a topology where the intermediate nodes are randomly and sparsely distributed, the proposed schemes with cooperative jamming outperform the conventional nonjamming schemes within a certain transmitted power regime. We also find that, in the scenario in which the intermediate nodes gather as a close cluster, the jamming schemes may be less effective than their non-jamming counterparts. Therefore, we introduce a hybrid scheme to switch between jamming and non-jamming modes. Simulation results validate our theoretical analysis and show that the hybrid switching scheme further improves the secrecy rate.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.