Optimized access control and efficient resource allocation for sum rate maximization in D2D communication

被引:0
作者
Gupta, Rajesh [1 ]
Tanwar, Sudeep [1 ]
机构
[1] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad 382481, India
关键词
One-to-one maximum matching; Fisher Jenks natural break optimization; Access control; Sum rate; Device-to-device communication; USERS;
D O I
10.1016/j.phycom.2024.102466
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Device-to-device communication (D2D-C) is one of the breakthrough technologies of the fifth-generation (5G) network that has attracted researchers working in data-regroup applications. It offers great advantages, such as minimum delay, base station load balancing, improved spectral efficiency, and many more. Despite these benefits, efficient resource allocation is one of the major concerns. Existing state-of-the-art solutions are based on game theory, graph theory, etc. The one-to-one Maximum matching scheme offers the best solution in graph theory and has not been explored to its potential. Also, the number of eavesdroppers in the system can affect the existing resource allocation schemes and degrade the system's performance. This can be taken care of by implementing a D2D-C user access control mechanism, which restricts D2D-C users from having eavesdropping intentions. So, considering these issues, we propose a Fisher Jenks natural break (FJNB) optimization and kernel density estimation clustering-based resource allocation scheme with a D2D-C user access control mechanism. It improves the overall system's total sum rate and computation time performance.
引用
收藏
页数:11
相关论文
共 24 条
[1]   Secrecy Ensured Socially Aware Resource Allocation in Device-to-Device Communications Underlaying HetNet [J].
Ahmed, Manzoor ;
Li, Yong ;
Zhuo Yinxiao ;
Sheraz, Muhammad ;
Xu, Dianlei ;
Jin, Depeng .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (05) :4933-4948
[2]   Socially Aware Secrecy-Ensured Resource Allocation in D2D Underlay Communication: An Overlapping Coalitional Game Scheme [J].
Ahmed, Manzoor ;
Shi, Han ;
Chen, Xinlei ;
Li, Yong ;
Waqas, Muhammad ;
Jin, Depeng .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (06) :4118-4133
[3]   User-priority-based resource allocation for device-to-device communications in 5G underlaying cellular networks [J].
Ba, Xinran ;
Wang, Yafeng ;
Fan, Jiangsheng ;
Xiang, Wei .
IET COMMUNICATIONS, 2019, 13 (08) :1016-1024
[4]  
Budhiraja I., 2021, IEEE Trans. Mob. Comput.
[5]   Cross-Layer Interference Management Scheme for D2D Mobile Users Using NOMA [J].
Budhiraja, Ishan ;
Kumar, Neeraj ;
Tyagi, Sudhanshu .
IEEE SYSTEMS JOURNAL, 2021, 15 (02) :3109-3120
[6]   Interference Mitigation and Secrecy Ensured for NOMA-Based D2D Communications Under Imperfect CSI [J].
Budhiraja, Ishan ;
Gupta, Rajesh ;
Kumar, Neeraj ;
Tyagi, Sudhanshu ;
Tanwar, Sudeep ;
Rodrigues, Joel J. P. C. .
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
[7]   SWIPT-Enabled D2D Communication Underlaying NOMA-Based Cellular Networks in Imperfect CSI [J].
Budhiraja, Ishan ;
Kumar, Neeraj ;
Tyagi, Sudhanshu ;
Tanwar, Sudeep ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (01) :692-699
[8]   Cross Layer NOMA Interference Mitigation for Femtocell Users in 5G Environment [J].
Budhiraja, Ishan ;
Tyagi, Sudhanshu ;
Tanwar, Sudeep ;
Kumar, Neeraj ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (05) :4721-4733
[9]  
Chen H., 2022, Mob. Inf. Syst., V2022
[10]  
Cisco, 2019, CISC VIS NETW IND GL