You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

18 May 2019

Social-Aware Peer Discovery for Energy Harvesting-Based Device-To-Device Communications

,
,
,
and
1
Department of Information Management, National Taiwan University of Science and Technology, Taipei 106, Taiwan
2
Department of Information Management, National Taipei University of Nursing and Health Sciences, Taipei 112, Taiwan
3
Bachelor Program in Interdisciplinary Studies, National Yunlin University of Science and Technology, Yunlin 640, Taiwan
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Green, Energy-Efficient and Sustainable Networks

Abstract

In Device-to-Device (D2D) communications, the first step is to find all of the neighboring peers in the network by performing a peer discovery process. Most previous studies use the social behaviors of the users to adjust the sending rates of the peer discovery messages (i.e., beacons) under the constraint of consumed power for increasing the Peer Discovery Ratio (PDR). However, these studies do not consider the potential for energy harvesting, which allows for the User Equipments (UEs) to procure additional power within charging areas. Accordingly, this paper proposes an Energy-Ratio Rate Decision (ERRD) algorithm that comprises three steps, namely Social Ratio Allocation (SRA), Energy Ratio Allocation (ERA), and Beacon Rate Decision (BRD). The SRA step determines the allocated power quantum for each UE from the total budget power based on the social behavior of the UE. The ERA step then adjusts this allocated power quantum in accordance with the power that is harvested by the UE. Finally, the BRD step computes the beacon rate for the UE based on the adjusted power quantum. The simulation results show that ERRD outperforms the previously-reported Social-Based Grouping (SBG) algorithm by 190% on the PDR for a budget power of one watt and 8% for a budget power of 20 watts.

1. Introduction

The demands that are placed on wireless communications have exponentially increased in recent years due to the proliferation of User Equipments (UEs) and the unceasing development of new mobile services. Consequently, the lack of spectrum resources has emerged as a significant concern for communication operators. Currently, any UE that wishes to transmit data to another UE must transmit this data via the Base Station (BS) in the cellular network. However, if the distance between the two UEs is sufficiently small, then the potential exists for the UEs to communicate directly, thereby saving cellular spectrum resources. Accordingly, a new communication paradigm designated as Device-to-Device (D2D) communication has been proposed as a means of achieving short-distance transmissions in 5G networks with improved resource utilization efficiency.
In implementing D2D communications, the first, and most critical, step is that of peer discovery, in which the UEs attempt to identify all of their neighbors in the network [1]. The peer discovery process is generally performed using a beacon mechanism and it aims to maximize the Peer Discovery Ratio (PDR), which is defined as the number of peers that are found in the discovery process divided by the total number of peers in the network. Most previous studies on peer discovery focus on the problems of improving the efficiency of the search process, minimizing the number of collisions, and determining a suitable beacon rate for the UEs [2,3,4,5,6,7,8,9,10,11,12,13,14].
In practice, a large proportion of D2D communications stems from the interaction between users over social media, such as Facebook, Twitter, Plurk, and so on [15,16]. Consequently, many studies have investigated the problem of social-aware peer discovery [17,18,19,20,21]. In general, the results have shown that the social behavior of the users provides a useful tool for adjusting the beacon rates of the UEs in such a way to improve the overall efficiency of the peer discovery process [17,18,19,20,21].
Energy (Energy and power are used interchangeably in this paper) is a critical concern in D2D communications, since the UEs generally only have limited energy resources and they often consume energy extremely rapidly when running user applications. Furthermore, the devices (e.g., mobile phones/sensors) in mine pine or oil well also encounter the energy issue, because they cannot recharge the power with any metal contact, hence avoiding the sparkles and reducing the explosion probabilities. Energy harvesting has thus attracted growing interest in recent years as a means of enabling UEs to scavenge energy from surrounding energy sources, especially for limited capacity energy storage electrical devices and systems [22,23,24,25,26,27,28,29]. Broadly speaking, the scavenged energy can be classified as either renewable energy or nonrenewable energy. In the former case, the energy is obtained from natural sources (e.g., thermal, solar, and wind), while in the latter case, the energy is obtained from artificial sources (e.g., electromagnetic resonance, electromagnetic induction, and radio frequency). The energy harvesting mainly adopts the technology of wireless power transfer (WPT) via radio frequency (RF) to transmit power, and then uses the rectifying antenna to convert the received radio signal to direct current (DC) and charge the battery [23]. In light of the promising flexibility of energy harvesting, many organizations [24] (i.e., International Telecommunications Union, European Cooperation in Science and Technology, Wireless Power Transfer Consortium for Practical Applications) and scholars [25,26] have been involved in variable application developments, which include drone powered wireless sensor network [27], emergency ubiquitous power source system [28], and wireless power transfer in electric vehicles environments [29]. Some studies have focused on energy harvesting-based D2D networks, which use harvested energy to promote the D2D data communications [30,31,32].
As stated above, the literature contains many studies on the use of social behavior mechanisms to enhance the performance of D2D communications. However, while some of these studies actively address the problem of limiting the energy that is consumed in the peer discovery process, none of them consider an environment in which the UEs are able to procure additional energy from the environment while using energy-harvesting techniques. Nonetheless, such a strategy is of considerable benefit in improving the performance of the peer discovery process. In particular, UEs that acquire additional energy can send a greater number of beacon messages (thereby increasing the PDR), while those that acquire no additional energy can reduce their beacon rate in order to minimize the out-of-energy risk and prolong their participation in the discovery process.
Consequently, the present study proposes a novel peer discovery algorithm for energy-harvesting environments, designated the Energy-Ratio Rate Decision (ERRD) algorithm. ERRD comprises three steps, namely Social Ratio Allocation (SRA), Energy Ratio Allocation (ERA), and Beacon Rate Decision (BRD). SRA determines an initial allocation power quantum for each UE that is based on its social behavior. ERA then adjusts this power quantum based on the harvested power of the UE. Finally, BRD computes the beacon rate for the UE based on the adjusted power quantum. For UEs with a high harvested power, ERRD increases the beacon rate, thereby increasing the PDR. By contrast, for UEs with low (or no) harvested power, ERRD reduces the beacon rate, and hence prolongs the lifetime of the UE, thereby increasing the time for which the UE can perform beacon discovery.
This study attempts to determine the suitable beacon rates of all UEs to maximize PDR for D2D communications in an energy-harvesting environment. The contributions of this paper are across three orientations: (1) regarding the problem orientation, to the best of our knowledge, this study is the first paper to consider the social-aware peer discovery problem for D2D communications in an energy-harvesting environment, (2) regarding the solution orientation, we propose ERRD, which determines the beacon rate according to UE’s social behavior and the harvested power quantum to increase its PDR, and (3) regarding the evaluation orientation, some of the simulations are conducted to investigate many important parameters along with significant observations.
The remainder of this paper is organized, as follows. Section 2 introduces the related work in the field. Section 3 describes the system model that is considered in the present study and formulates the related problem. Section 4 introduces the ERRD algorithm and describes its detailed operation. Section 5 presents and discusses the simulation results. Finally, Section 6 provides some brief concluding remarks and indicates the intended direction of future research.

3. Problem Description

This section commences by introducing the system model and associated notations. The problem statement is then formally defined.

3.1. System Model

The interval between the time t at which UE i comes within range of UE j and the time at which it was last within range of UE j, t0, is referred to as the D2D contact interval of the two UEs, CIi,j, and it is defined as
C I i , j = min t { ( t t 0 ) : L i L j R i , j ,   t > t 0 } ,
where . denotes the distance between the two UEs; Li and Lj are the locations of UEs i and j, respectively; and, Ri,j is the coverage range between the two UEs.
Based on the contact interval between the two UEs, the D2D contact rate between them, denoted as λi,j, is defined as
λ i , j =   1 E [ C I i , j ] ,
where E[.] denotes the expectation. The average contact rate of UE i, denoted as λi, is then computed as
λ i =   j = 1 , j i N λ i , j N 1 ,
where N is the total number of UEs in the network. Let C I i , j follow a cumulative distribution function (CDF) of F C I i , j ( x ) , with rate λi,j. Assume further that F C I i , j ( x ) is a uniform distribution, and can thus be written as
F C I i , j ( x ) = { 0 ,                 x < 0 , x 2 E [ C I i , j ] ,     0 < x < 2 E [ C I i , j ] ,   1 ,     x > 2 E [ C I i , j ] .
Let the social ratio of UE i be defined as the square root of its average contact rate over the sum of the square root of each average contact rate, i.e.,
r i = λ i 1 2 j = 1 N λ j 1 2 .
In modeling the energy-harvesting environment, it is assumed that the charging devices (CDs) and BS convert their power into RF signals. Furthermore, any UEs within the coverage of these CDs or the BS acquire this RF signal and then convert it into power through special equipment. The power that is obtained by UE i from energy harvesting, denoted as OPi, is thus calculated as
O P i = σ ( C D P m L i C D L m ,   i C D R m υ ) ,
where σ is an energy harvesting efficiency factor that reflects the ability of UE i to change the RF signal into power; v is the path loss exponent that is caused by interference, which increases with an increasing distance; and, Li is the location of UE i. In addition, CDPm, CDRm, and CDLm are the transmitted power, coverage, and location, respectively, of CD m, when UE i lies within its coverage [30,31,32].

3.2. Problem Statement

Before formally defining the problem statement, the used notations are listed in Table 2. As shown, the notations fall into six categories that relate to the system, range, power, location, contact, and beacon, respectively. The system parameters define the number of UEs in the network and the total peer discovery time, respectively, while the range parameters describe the coverage of the devices. The power parameters define the transmission powers of the devices and the various power variables that are used in the ERRD model. The location parameters define the positions of the devices. The contact parameters describe the contact behaviors of the UEs. Finally, the beacon parameters define the beacon rates of the UEs.
Table 2. Notation table.
The energy harvesting technology that is considered in this study is wireless power transfer (WPT) via radio frequency (RF), as shown in Figure 1 [23]. The basic idea is that the RF transmitter transmits radio signal towards the receiving antenna at the desired frequency and power level. The RF receiver then applies electromagnetic radiation to charge the battery, that is, the receiving antenna receives the traveling signal and the rectifier converts the alternating current (AC) to direct current (DC) to charge the battery. The energy carrier can be located at 2.4 GHz or 5 GHz frequency band under the considerations that these bands are internationally reserved for Industrial, Scientific, and Medical (ISM) purposes. Energy harvesting can explore sufficient power sources in significant radio coverage by increasing the transmitting power under the regulation of the government.
Figure 1. The energy harvesting technology considered in this study.
This study attempts to determine the suitable beacon rates of all UEs to explore most peers in a D2D network under the constraints of budget power, the limitation of overall power consumption. This study further introduces a new scenario, i.e., energy harvesting, which previous studies did not consider. The energy harvesting enables UEs within charging areas to procure additional power from surrounding energy sources. Thus, under considering the UE may be out-of-energy and the study determines the suitable beacon rates of all UEs to maximize PDR according to the budget power and harvested power.
The problem that we investigated is formally described, as follows. First, for a beacon rate of UE i equal to μi, the peer discovery ratio (PDR) of the UE can be calculated as [33]
PDR = 1 2 μ i 2 0 1 μ i 0 y F C I i , j ( x ) d x d y .
The second term denotes the missing probability and the probability UE i cannot detect the contact. In other words, it is the probability that the UE i cannot find other peers.
According to the arrival contact rate of each UE, the aim of the peer discovery process is to maximize the total PDR, as
i = 1 N λ i ( 1 2 μ i 2 0 1 μ i 0 y F C I i , j ( x ) d x d y ) . s . t .   1 N μ i × T P B P ,
where TP is the transmission power used to send a beacon message and BP is the total budget power quantum of the network. However, if a UE is out-of-energy, it cannot find any peers in the network and any other peers cannot find it. Thus, in performing the peer discovery process, the objective given in Equation (8) should be modified, as follows:
max   PDR = i = 1 N { λ i ( 1 2 μ i 2 0 1 μ i 0 y F C I i , j ( x ) d x d y ) ,       P i > 0 0 ,     P i 0 s . t .   1 N μ i × T P B P ,
where Pi is the power reserved for peer discovery of UE i. Differing from Equation (8), the UE cannot find other peers and it cannot be found by any other peers when P i 0 in Equation (9), because it is a more reasonable condition. Also note that the constraint denotes that the total power consumption must be less than the budget power quantum.
Thus, the problem statement is formally given, as follows.
Input: the parameters marked input in Table 2.
Output: the beacon rate of UE i, μ i ,   i .
Objective: max   PDR = i = 1 N { λ i ( 1 2 μ i 2 0 1 μ i 0 y F C I i , j ( x ) d x d y ) ,     P i > 0 0 ,     P i 0 . ,
Constraint: 1 N μ i × T P B P .

4. Solutions

Before introducing the ERRD algorithm in detail, the overall operations of UEs and BS are first described. The peer discovery is conducted per time period T. At the beginning of time period, each UE will send its ID and its harvested power quantum to BS. Thus, BS will know which UEs in its coverage and immediately extracts their social features from the database. According to UEs’ social features and the harvested power quantum, and the pre-determined budget power quantum, BS can run ERRD to determine the beacon rate for each UE, and then sends the determined beacon rate to the corresponding UE. After receiving this rate, the UE will send the beacons accordingly. Since each UE only calculates the harvested power quantum, according to Equation (8), its operation is very simple. Therefore, below, we focus on describing the algorithm in BS, i.e., ERRD.
In D2D communications, the beacon rate is proportional to the amount of consumed power. Hence, the ERRD algorithm that is proposed in this study first virtually allocates a proper power quantum to each UE and then determines the corresponding beacon rate according to this allocated power quantum. As described in the following sub-sections, ERRD comprises three steps, namely Social Ratio Allocation (SRA), Energy Ratio Allocation (ERA), and Beacon Rate Decision (BRD). SRA first allocates the budget power among the UEs, depending on their social ratios. For each UE, ERA then adjusts this allocated power quantum according to the amount of energy that is harvested by the UE. Finally, BRD computes the beacon rate of each UE, depending on the adjusted allocated power quantum.
Below, the concept of ERRD is first explained. As ERRD is composed of three steps, we describe SRA, ERA, and BRD in sequence in Section 4.1. After describing the concept of ERRD, we formally exhibit the pseudo code of ERRD in Section 4.2. Finally, an example to illustrate the overall ERRD operation is given in Section 4.3.

4.1. ERRD Algorithm

4.1.1. Social Ratio Allocation

Let AP be the total allocated power quantum and GPi be the amount of power that is allocated to UE i. Since the peer discovery process is subject to the constraint that the total consumed power must be less than or equal to budget power BP, AP is initialized as BP. According to [21], when F C I i , j ( x ) has a uniform distribution (as shown in Equation (4)), the maximum PDR is achieved when the beacon rate of each UE is set proportional to its social ratio, i.e., μ i r i . Thus, the initially allocated power quantum for every UE is given by G P i = A P × r i .

4.1.2. Energy Ratio Allocation

The ERA step is the most critical step in ERRD. In order to properly explain the step, it is appropriate to introduce the following intuitive thought regarding the approach for allocating the power quantum, depending on the amount of power that is obtained from energy harvesting. The smart approach employed by ERRD is then introduced.
  • Intuitive thought
The SRA step in the ERRD algorithm allocates the budget power quantum among the UEs based on their social ratios. However, some UEs can obtain power from energy harvesting, and hence their obtained power quantum OPi may exceed the allocated power quantum GPi. In this case, the UEs can utilize the obtained power quantum, rather than the originally allocated power quantum to perform their beacon transmissions. The unused portion of the allocated power quantum can then be returned to AP for the re-allocation to other UEs. Conversely, if OPi is less than GPi, i.e., the UE only acquires little (or no) energy via harvesting, the UE uses the original allocated power quantum GPi and returns its obtained power quantum OPi to AP. Combining these two cases, the unused power quantum of UE i is given by the minimum of OPi and GPi, i.e., min(OPi, GPi).
Since AP and GPi are dependent, it is necessary to obtain them alternately while using an iterative approach. Let x k denote the value of x in the k-th iteration and k = 0 denote the initial value. Therefore, the initial value of AP, A P 0 , is set as the budget power quantum, BP, and it is allocated to each UE in accordance with r i , i.e., P i 0 = A P 0 × r i . Any unused power quantum must be returned to AP. Consequently, AP is equal to the sum of BP and the returned power quantum of all the UEs, i.e.,
A P k + 1 = B P + i = 1 N min   ( O P i ,   G P i k ) ,   k 0 .
Once A P k + 1 is calculated, the new allocated power quantum of each UE can be obtained as G P i k + 1 = A P k + 1 × r i , and used to calculate   A P k + 2 accordingly. As shown in Lemma 1, AP is non-decreasing as the number of iterations increases.
Lemma 1:
A P k + 1 A P k ,   k 0 .
Proof. 
  • As A P 0 = B P and A P 1 = B P + i = 1 N min ( O P i + G P i 0 ) , it follows that A P 1 A P 0 since all O P i and G P i 0 are non-negative. Thus, k = 1 holds.
  • Suppose that k = n 1 holds, i.e., A P n A P n 1 . A P n A P n 1 implies that G P i n G P i n 1 ,     1 i N since G P i n = A P n × r i . Hence,
    B P + i = 1 N min ( O P i , G P i n ) B P + i = 1 N min ( O P i , G P i n 1 ) A P n + 1 A P n
    Thus,   k = n holds.
  • From mathematical induction, A P k + 1 A P k ,   k 0 .  □
Intuitively, A P k can be iteratively calculated until no further change in its value is obtained, i.e., A P k + 1 = A P k . However, while such an approach is technically feasible, it requires many iterations to converge, causing high complexity, and it is hence impractical for real-world peer discovery applications. Consequently, the following smart approach is proposed instead.
  • Smart approach
According to the relationship between OPi and GPi, ERRD classifies the UEs into two groups, namely G1 when O P i < G P i and G2 when O P i G P i . Therefore, Equation (10) can be re-formulated as
A P k + 1 = B P + i G 1 k O P i + i G 2 k G P i k .
Lemma 2:
In each iteration, the UEs in G2may be shifted to G1, but the UEs in G1cannot be shifted to G2.
Proof. 
  • From Lemma 1, AP is non-decreasing and G P i is also non-decreasing, i.e.,   G P i k + 1 G P i k ,   i .
  • Since O P i is fixed, the condition O P i < G P i k implies that O P i < G P i k + 1 . Therefore, any member in G1 will not be shifted to G2.
  • Consequently, in each iteration, only the UEs in G2 may be shifted to G1, but no UEs in G1 will be shifted to G2.  □
From Lemma 2, the ERA process seeks to shift any UEs belonging to G2 to G1 if possible in each iteration in order to reduce the convergence time. However, to achieve this, two issues must first be addressed, namely (1) which UE should be considered first to be shifted and (2) whether this UE can actually be shifted.
ERA determines the answer to the first issue by inspecting the ratio of the obtained power quantum over the corresponding social ratio, i.e., OPRi = O P i / r i . A smaller value of OPRi implies that OPi is more likely to be less than GPi. In other words, UE i is more likely to belong to G1. Thus, in the k-th iteration, according to the current grouping, UE mk, whose O P R m k is the smallest among those of all the UEs in G 2 k , is chosen as the pivot UE, and it is most likely to be shifted from G 2 k to G 1 k , as described in the following lemma.
Lemma 3:
The pivot UE mk among G 2 k is most likely be shifted to G 1 k .
Proof. 
  • O P R i = O P i r i O P R i A P k = O P i A P k × r i O P R i A P k = O P i G P i k O P R i = O P i G P i k A P k .
  • In the k-th iteration, as A P k   is fixed, UE mk has the smallest OPR in G2, i.e., O P m k G P m k k is the smallest, and hence O P m k is most likely to be less than G P m k k . Consequently, UE mk is most likely to be shifted from G 2 k to G 1 k .  □
ERA considers whether or not this UE can actually be shifted after determining the pivot UE. To achieve this, a virtual critical point, defined as O P m k = G P m k , is considered. At this critical point, the virtual total allocated power quantum, V A P k , obtained using m k as the baseline, is given as
V A P k = B P + i G 1 k O P i + i G 2 k G P i k = B P + i G 1 k O P i + i G 2 k G P m k × r i r m k = B P + i G 1 k O P i + i G 2 k O P m k × r i r m k .
The virtual allocated power quantum for m k is then obtained as V G P m k k = V A P k × r m k . The virtual critical point represents the threshold between G 2 k and G 1 k . Thus, checking whether V G P m k k is more than   O P m k provides an efficient means of determining whether UE m k belongs to G 2 k or G 1 k . If V G P m k k is larger than   O P m k , the pivot UE m k should be shifted from G 2 k to G 1 k and the iteration process should continue to the next round. Otherwise, the pivot UE m k should remain in G 2 k . As the pivot UE mk among G 2 k is the most likely be shifted to G 1 k , the other UEs belonging to G 2 k also remain in G 2 k . In other words, the grouping process is complete and no further changes in the memberships of G1 and G2 are required.
Once the grouping process is finished (in iteration *), G P m * *   can be computed as
  G P m * * r m * = B P + i G 1 * O P i + i G 2 *   G P m * * × r i r m * .
After solving Equation (13), G P m * * can be obtained as
  G P m * * = r m * × ( B P + i G 1 * O P i ) 1 i G 2 * r i .
AP* can then be computed as A P * = G P m * * / r m * . In addition, each G P i * can be computed with AP*. Finally, the allocated power quantum for each UE is set as the maximum between G P i * and OPi.

4.1.3. Beacon Rate Decision

In the BRD step, since OPi is considered, the sum of all the allocated power quanta is equal to the budget power quantum plus all the obtained power quanta, as shown in Lemma 4.
Lemma 4:
i = 1 N max ( O P i , G P i * ) = B P + i = 1 N O P i .
Proof. 
  • For UE i in G2, the allocated power quantum is G P i * . As the UE has an obtained power quantum of O P i , the allocated power quantum occupying the budget power quantum is equal to G P i * O P i . Thus, it follows that i G 2 * ( G P i * O P i ) = B P .
  • i = 1 N max ( O P i , G P i * ) = i G 1 * O P i + i G 2 * G P i *       = i G 1 * O P i + i G 2 * ( G P i * O P i ) + i G 2 * O P i          = i = 1 N O P i + i G 2 * ( G P i * O P i ) = B P + i = 1 N O P i   .  □
Due to this value exceeding the BP quantum, the final allocated power quantum should be normalized through multiplication by R, i.e., the ratio of BP over the sum of the allocated power quanta. That is,
R = B P i = 1 N max ( O P i , G P i * ) = B P B P + i = 1 N O P i .
Finally, the μi of each UE i is computed as the allocated power quantum multiplied by R and divided by TP.

4.2. Pseudo Code

Algorithm 1 shows the pseudo code of the ERRD algorithm, where lines 1–7 correspond to the SRA step, lines 8–24 describe the ERA step, and lines 25–29 are the BRD step. In the SRA step, lines 1–7 initialize the variables and compute ri, G P i , and OPRi for all the UEs. In the ERA step, lines 8–12 classify the UEs into two groups. In particular, UEs with an OPi greater than or equal to GPi are shifted into group G2. Lines 15–17 then select UE m whose OPRm is the smallest among those of all the UEs in G2 as the pivot UE and compute VAP and VGPm accordingly. Line 18 checks whether the pivot UE meets the condition that OPm is larger than VGPm. If the condition holds, the final AP is computed in lines 19 and 20. Otherwise, lines 14–23 are repeated iteratively until this condition is reached. Finally, in the BRD step, R is calculated in line 25. Line 27 then computes GPi based on the final AP obtained in the ERA process and line 28 normalizes the allocated power quantum and computes the normalized μi.
Algorithm 1 Energy Ratio Rate Allocation Algorithm
1 : A P B P ,   G 1 { 1 ~ N } ,   G 2
2 :   Calculate   all   λ i   from   C I i , j ;   λ A L L i = 1 N λ i 1 2
3 : for   i = 1   to   N   do
4 : r i λ 1 2 λ A L L
5 : G P i A P × r i
6 : O P R i O P i r i
7 : e n d   f o r
8 :       f o r   i = 1   to   N   d o
9 :           i f   O P i G P i   t h e n
10 :           G 2 G 2   i ,   G 1 G 1 i
11 : e n d   i f
12 :   e n d   f o r
13 :   i f   G 2   t h e n
14 :       r e p e a t
15 : m argmin   O P R i ,   i G 2
16 : V A P B P + ( i G 1 O P i ) + ( i G 2 O P m × r i r m )
17 : V G P m V A P × r m
18 : i f   O P m V G P m   t h e n
19 : G P m r m × ( B P + i G 1 O P i ) 1 i G 2 r i
20 : A P G P m r m
21 : e n d   i f
22 : G 1 G 1   m ,   G 2 G 2 m
23 : u n t i l   O P m V G P m   o r   G 2 =
24 :   e n d   i f
25 :   R B P B P + i = 1 N O P i
26 :   f o r   i = 1   to   N   d o
27 : G P i A P × r i
28 : μ i max ( O P i ,   G P i ) × R T P
29 :   e n d   f o r
Note that the pseudo code of ERRD is run in BS at the beginning of each time period T. All allocating, returning, and re-allocating power quanta from the BS to the UEs are virtually calculated in BS, rather than the real transfer between BS and UEs. Therefore, the communication between BS and UEs happens when each UE sends its ID and its harvested power quantum to BS at the beginning of each time period, and BS sends the determined beacon rate to the corresponding UE after it has executed ERRD.
The time complexity of ERRD is calculated, as follows. The lines 1–2, lines 3–7, lines 8–12, line 25, and lines 26–28 individually requires O(N). The repeat loop of lines 14–23 are executed as most N times, because at least a UE will be shifted from G2 into G1 in each iteration. The time complexities of calculating m in line 15, VAP in line 16, and GPm in line 19 are O(N). Thus, the time complexity of the repeat loop is O(N2). Therefore, ERRD has low time complexity O(N2) and it can be implemented in a real-time environment.

4.3. Illustrative Example

The following discussions present an illustrative example to demonstrate the detailed operational steps of ERRD. It is assumed that the network contains five UEs with average social contacts, λi, of 1, 4, 9, 16, and 25, respectively. It is further assumed that the OPi values of the five UEs are 5, 4, 5, 3, and 1, respectively. Finally, the total BP is assumed to be 15 and TP is set as 1.
The SRA step first computes ri in accordance with the average social contacts, λi, i.e., r 1 = 1 1 + 4 + 9 + 16 + 25 = 1 15 . Thus, r 1 , r 2 , r 3 , r 4 , and r 5 are obtained as 1 15 ,   2 15 .   3 15 ,   4 15 , and   5 15 , respectively (see Table 3). For each UE, G P i is then computed as the product of AP, which is initialized as BP, and r i , i.e., G P i = A P × r i . In other words, G P 1 , G P 2 , G P 3 , G P 4 and G P 5 are obtained as 1, 2, 3, 4, and 5, respectively. In addition, OPRi is calculated as O P i / r i . For example, OPR1= 5 1 15 = 75 . The UEs are then classified into two groups, namely G1 or G2, by comparing O P i with G P i . In the present example, O P 1 , O P 2 , and O P 3 are greater than G P 1 , G P 2 , and G P 3 , respectively, while O P 4 and O P 5 are less than G P 4 and G P 5 , respectively. Consequently, group G1 is determined to be {4, 5}, while group G2 is obtained as {1, 2, 3}.
Table 3. Initialized values.
Based on the results that are presented in Table 3, the ERA step selects UE 3 as the pivot UE, since the value of OPR3 is the smallest among all of the OPR values in G2, To check whether the grouping process is finished, ERA uses the ratio of ri over r3 to compute VAP as B P + O P 5 + O P 4 + O P 3 × r 3 r 3 + O P 3 × r 2 r 3 + O P 3 × r 1 r 3 = 15 + 3 + 1 + 5 3 + 10 3 + 5 = 29 . The VAP result is then used to compute VGP3 as 29 × 3 15 = 29 5 . OP3 is less than VGP3, that is, the virtually allocated power quantum exceeds the obtained power quantum. Hence, UE 3 is shifted from group G2 to group G1.
The procedure that is described above is iteratively repeated until the grouping process is complete. For the present example, G 1 * is obtained as {3, 4, 5} and G 2 * , as {1, 2}. Once the grouping process is finished, G P 2 * is G P m *   and in accordance with Equation (14) (line 19 in the algorithm), G P 2 * is computed as 2 15 × ( 15 + 5 + 3 + 1 ) 1 ( 1 15 + 2 15 ) = 4. Thus, A P * is obtained as 4 2 15 = 30 (line 20). Finally, the values of G P i * are computed using the determined value of A P * . Choosing the larger value between OPi and G P i * for each UE, the total consumed power quantum is obtained as 5 + 4 + 6 + 8 + 10 = 33, which is equal to the sum of BP and all OPi (15+5+4+5+3+1). As the total consumed power quantum is larger than BP, normalization by R = 15 33 = 5 11 is performed and used to compute μi. For example, μ 1 = 5 × 5 11 × 1 T P = 25 11 . Table 4 shows the final results for all the UEs.
Table 4. Final results of the illustrative example.

5. Performance Evaluation

The PDR performance of the proposed ERRD algorithm was compared with that of the previously reported Social-Based Grouping (SBG) algorithm [21]. In SBG, the UEs are grouped based on their social feature: centrality and the UEs in the same group are assigned the same beacon rate. In the present simulations, SBG classifies the UEs into three groups.

5.1. Dataset and Environment

The simulations were performed using the Infocom06 user mobility trace [34], which consisted of the D2D communication contacts of 98 individuals that were recorded over the IEEE Infocom Conference in 2006. The first half of the dataset was used to calculate the beacon rates from the contact rates of the UEs, while the second half was used to evaluate and compare the performance of the two schemes (ERRD and SBG). The dataset contains no information regarding the actual physical locations of the users and the BS. Consequently, in performing the simulations, an artificial environment for energy harvesting was created, with dimensions of 600 × 600 m2. The simulation field was partitioned into a 3 × 3 grid containing a BS with a 10-watt power in the center and eight CDs with a five-watt power distributed around the outside (see Figure 2). The UEs were uniformly deployed in the 3 × 3 grid initially and their locations were then randomly moved as the simulations proceeded to simulate the mobility of UEs. Thus, the UEs obtained harvested power from different CDs (or the BS) at different points in the simulation process.
Figure 2. Simulation environment.
The adopted dataset is the same as the dataset used in [21], because it is the most popular realistic dataset used in D2D communications, although it does not include the actual locations of UEs. To the best of our knowledge, there is no typical dataset that includes UE contacts and UE locations. Thus, in this study, we adopted the dataset in [21] and simulated the UE locations and their mobility by ourselves.
Each simulation was run for 1000 seconds. The plotted simulation results were then computed as the average value obtained over 100 simulations that were performed under identical conditions. The default environmental parameters were set as shown in Table 5. In accordance with the Infocom06 dataset, the number of UEs was set as N = 98. Moreover, the path loss exponent, v, of the BS and CD RF transmissions was set as 2, the energy harvesting efficiency factor, σ, was set as 0.7, and the transmission power of the beacon messages was set as 20 mW. The BP of the peer discovery process (with a duration of 1000 s) was set as 10 W. Finally, the mobility (moving speed) of the UEs was set as 1 under the assumption that the mobility in the Infocom06 dataset is 1. In general, as the moving speed of the UEs increases, the contact interval between them reduces, and vice versa. Thus, for a mobility value that is equal to 2, the contact interval between the UEs is equal to half that in the Infocom06 dataset.
Table 5. Default parameter settings in performance evaluation simulations.
Some assumptions are made for simplifying the simulations: (1) The harvested power quantum is according to Equation (6), although this quantum will be affected by interferences or other factors in a real environment. (2) The locations of UEs are limited in this area 600 × 600 m2. That is, if a UE moves outside this area, then its location will be randomly located within this area. (3) The beacon is perfectly transmitted, i.e., it will not encounter any collision or be interfered by other noises.
The simulations compared the performance of the ERRD algorithm with that of SBG under different settings of the BP, CDP, and mobility parameters. We compared ERRD and SBG, rather than other solutions because of two points. (1) As described in Section 2, ERRD and SBG belong to the same type: social-aware and network-assisted, but other solutions belong to different types. (2) As SBG used social features to adjust the beacon rate, it always outperforms other solutions without social-awareness. The evidence was exhibited in [21]. The UEs were classified into two types to facilitate the comparison between the two schemes, namely those with an increased beacon rate (IBR) and those with a decreased beacon rate (DBR), respectively. In the former case, the UEs using ERRD had a higher beacon rate than those using SBG, while, in the latter case, the beacon rate of the UEs using ERRD was lower than that of those using SBG.

5.2. Effect of BP

Figure 3 shows the PDR that was obtained under the two schemes for various values of the BP in the range of 0–20 W. For both schemes, the PDR exhibits a logarithmic-type increase as BP increases. This result is reasonable, since, intuitively, as the BP initially increases, the beacon rates of the UEs also increase, and hence a greater number of peers can be found. However, as the BP continues to increase, the number of originally unfound peers reduces, and hence the improvement in the PDR also reduces. The contact intervals in the Infocom06 dataset are not uniformly distributed and some of the intervals are extremely short. Thus, if the beacon rate is assigned a very high value in an attempt to increase the number of discovered peers, the consumed BP significantly increases. Therefore, in practical implementations, the BP should be set in such a way as to achieve a satisfactory tradeoff between the PDR and the consumed BP.
Figure 3. Peer Discovery Ratio (PDR) vs. total budget power quantum of the network (BP).
For a given value of the BP, ERRD consistently achieves a higher PDR than SBG. For example, the PDR achieved under ERRD for a BP of 1 W is around 190% higher than that obtained under SBG, while for a BP of 20 W, the PDR is approximately 8% higher. This performance improvement can be attributed to two main factors. First, the IBR UEs using ERRD can send more beacons than those using SBG, and hence achieve a higher PDR. Second, although the DBR UEs using ERRD send fewer beacons than those using SBG, they have a longer lifetime. Consequently, the UEs can still achieve a higher PDR than those using SBG. However, the performance improvement that is offered by ERRD reduces with an increasing BP. This finding is reasonable, since, under a large BP, the amount of harvested energy is relatively smaller than that directly allocated by the BS. In other words, for most UEs, OPi < GPi, and hence the value of GPi under ERRD is similar to that under SBG. Consequently, the PDR performance gap between the two schemes reduces.
Some intermediate results can be observed to better understand the differences between ERRD and SBG. First, note that the overall power consumptions for ERRD and SBG are the same as the overall power consumption is always limited by the budget power quantum; so, showing this value is unnecessary. However, the power consumption of each UE is quite different for these two approaches. Thus, we observe two intermediate results: Number of out-of-energy UEs (NoE) and the coefficient of variation (CV) of power in UEs. The NoE represents the number of UEs that power quantum reserved for peer discovery has been exhausted, that is, the power consumption exceeds the value of the power quantum reserved for peer discovery plus the harvested power quantum. The out-of-energy UEs cannot find other peers and cannot be found by other peers. The CV represents the power distribution among the UEs. The lower CV means a better balance of UE battery power.
Figure 4 shows the NoE and CV that were obtained under the two schemes for various values of the BP. Observing this figure, NoE increases as BP exceeds a threshold. When BP increases, the UE can send more beacons. Therefore, the probability that a UE exhausts its battery power becomes larger, resulting in the increase of NoE. The out-of-energy UE appears when BP is 6 for SBG, while the out-of-energy UE appears when BP is 16 for ERRD. This is because SBG only considers the social ratio to send the beacons, while ERRD not only considers the social ratio, but also harvested power. When a UE has low harvested power and a high social ratio, ERRD reduces its beacon rate to reduce the probability of out-of-energy. However, in this case, SBG still lets this UE send beacons at a high rate, so it is very likely to be out-of-energy. On the other hand, CVs for ERRD and SBG almost linearly increase as BP increases, but SBG has a sharper slope. SBG generates many out-of-energy UEs and many UEs having much power, as they obtain much harvested power and send few beacons, resulting in more unbalanced battery power distribution among UEs, i.e., a higher CV.
Figure 4. Number of out-of-energy User Equipments (NoE) and coefficient of variation (CV) vs. BP.

5.3. Effect of CDP

Figure 5 shows the variation of the PDR with the CDP. In general, a larger CDP indicates that more UEs can harvest energy, or individual UEs can acquire a greater amount of energy. However, the total consumed power in the network is limited to BP, irrespective of the value assigned to CDP. In other words, for a larger CDP, ERRD cannot consume more power than BP, but can only allocate the power quantum to each UE more precisely, such that all of the UEs can more efficiently send their beacons. As shown in Figure 5, the PDR obtained under ERRD rapidly increases as the CDP first rises since the beacon rate decision made by ERRD reduces the probability that the UEs run out of energy. For a CDP value greater than 2, almost none of the UEs are out of energy. In this case, the PDR slightly increases, since the IBR UEs can find a greater number of peers. However, the PDR is not guaranteed to continuously increase when the number of UEs with an energy-harvesting capability exceeds a certain threshold. Therefore, in implementing the ERRD algorithm, a threshold should be set, whereby when the number of UEs with an energy-harvesting capability is greater than this threshold, ERRD should let some of the UEs store the harvested energy in their batteries, rather than expending it on beacon transmissions in order to provide power for other applications.
Figure 5. PDR vs. CDP.
For the SBG scheme, the PDR also increases with an increasing CDP. However, it increases at a slower rate than under ERRD, since, even though SBG does not explicitly consider the power obtained from energy harvesting, the number of out-of-energy UEs still decreases as the number of UEs having an energy-harvesting capability increases.
Figure 6 shows the NoE and CV that were obtained under the two schemes for various values of the CDP. Observing this figure, NoE decreases as CDP increases, because UEs can harvest more power. Therefore, the probability that a UE exhausts its battery power becomes lesser, resulting in the decrease of NoE. However, the NoE of SBG is significantly larger than that of ERRD, because of the reasons that are described in Figure 4. On the other hand, CVs for ERRD and SBG almost linearly decrease as CDP increases. When CDP is small, the UE in the BS coverage still can harvest much power, but the UEs in the CD coverage only harvest less power, resulting in a larger CV. Similar to Figure 4, we can see SBG has a sharper slope of CV than ERRD.
Figure 6. NoE and CV vs. CDP.

5.4. Effect of Mobility

Figure 7 shows the effect of the UE mobility on the PDR under the two schemes. As expected, the PDR reduces with an increasing mobility for both schemes, since, as the UEs move more rapidly, the contact rate between them increases, and hence the peers are less easily found for a given beacon rate. Nonetheless, the ERRD algorithm consistently outperforms SBG by around 10% for all the values of the UE mobility. Although the duration available for energy harvesting from one particular CD reduces as the UE mobility increases, the chance of harvesting energy from the other CDs increases. As a result, the UE mobility has no significant effect on the amount of harvested energy under the ERRD scheme. A similar tendency also occurs under the SBG scheme. Consequently, the performance advantage of ERRD over SBG is maintained, irrespective of the value of the UE mobility.
Figure 7. PDR vs. mobility.

6. Conclusions and Future Works

This study has proposed a social-aware peer discovery mechanism, designated as ERRD, for energy harvesting-based D2D communications. ERRD first allocates the budget power of the network among the UEs, depending on their social ratios and then adjusts the allocated power quantum of each UE, depending on its harvested energy. Finally, ERRD sets the beacon rates of the UEs based on their adjusted power quanta subject to the constraint that the total power allocated to the UEs may not exceed the BP quantum of the network. ERRD improves the PDR performance by increasing the beacon rates of the high-energy-harvesting UEs, thereby increasing the number of peers that they can discover; and, reducing the beacon rates of the low-energy-harvesting UEs, thereby extending their lifetimes and prolonging the period for which they can participate in the peer discovery process. The simulation results have shown that ERRD outperforms the SBG scheme that is reported in the literature by around 8–190%, depending on the BP quantum of the network. The PDR performance of ERRD does not significantly increase as the BP increases beyond 10 W or the CDP exceeds 2. However, in mobile environments, ERRD retains a 10% performance advantage over SBG, irrespective of the moving speed of the UEs.
Currently, 5G D2D communications and energy-harvesting devices are not so popular to give a realistic example of use case. Therefore, the paper is more research-oriented, rather than system-oriented. However, we believe that D2D communications and energy-harvesting devices will become more popular in the future. The scenario that is considered in the study will actually happen and our proposed solution, ERRD, can be applied.
A complete D2D communication not only includes peer discovery, but also mode selection and resource allocation. Future studies will aim to establish a more comprehensive energy harvesting-based D2D communication model that includes mode selection and resource allocation. In its current form, ERRD considers the past behavior (sociality) and present condition (energy harvesting) of the UEs, but it does not consider the impact of the surrounding information, such as the number of peers in the network or the interference. Therefore, in future studies, ERRD will be extended to take such information into account in order to obtain a more robust estimation of the most appropriate beacon rate for D2D communications. Finally, the performance of ERRD in a realistic environment should be further investigated, as our study proves the outperformance of ERRD by simulations. For example, a UE who has a social-network account and, at the same time, can harvest energy can enhance how much of PDR. To observe this, ERRD should be realistically implemented in BS. We will pay the efforts on this implementation in the future.

Author Contributions

Conceptualization, Z.L.H. and Y.-C.L.; methodology, Z.L.H. and Y.-C.L.; software, Y.-H.W.; validation, Y.-H.W.; formal analysis, Y.-C.L.; writing—original draft preparation, Y.-H.C.; writing—review and editing, Y.-C.L. and A.C.

Funding

This research was funded by Ministry of Science and Technology of Taiwan, MOST 107-2221-E-011-083.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wei, L.; Hu, R.Q.; Qian, Y.; Wu, G. Enabling device-to-device communications underlying cellular networks: Challenges and research aspects. IEEE Commun. Mag. 2014, 52, 90–96. [Google Scholar] [CrossRef]
  2. Baccelli, F.; Khude, N.; Laroia, R.; Li, J.; Richardson, T.; Shakkottai, S.; Tavildar, S.; Wu, X. On the design of device-to-device autonomous discovery. In Proceedings of the International Conference on Communication Systems and Networks, Bangalore, India, 3–7 January 2012. [Google Scholar]
  3. Lim, C.; Jang, M.; Kim, S.H. Trellis tone modulation multiple-access for peer discovery in D2D networks. Sensors 2018, 18, 1228. [Google Scholar] [CrossRef] [PubMed]
  4. Li, H.B.; Miura, R.; Kojima, F. Channel access proposal for enabling quick discovery for D2D wireless networks. In Proceedings of the International Conference on Computing, Networking and Communications (ICNC), Santa Clara, CA, USA, 26–29 January 2017. [Google Scholar]
  5. Tang, H.; Ding, Z.; Levy, B.C. Enabling D2D communications through neighbor discovery in LTE cellular networks. IEEE Trans. Signal Process. 2014, 62, 5157–5170. [Google Scholar] [CrossRef]
  6. Nasraoui, L.; Atallah, L.N. SRS-based D2D neighbor discovery scheme for LTE cellular networks. In Proceedings of the IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, QC, Canada, 8–13 October 2017. [Google Scholar]
  7. Doppler, K.; Ribeiro, C.B.; Kneckt, J. Advances in D2D communications: Energy efficient service and device discovery radio. In Proceedings of the IEEE Wireless VITAE, Chennai, India, 28 February–3 March 2011. [Google Scholar]
  8. Yang, Z.J.; Huang, J.C.; Chou, C.T.; Hsieh, H.Y.; Hsu, C.W.; Yeh, P.C.; Hsu, C.C. Peer discovery for device-to-device (D2D) communication in LTE-A networks. In Proceedings of the IEEE Globecom Workshops, Atlanta, GA, USA, 9–13 December 2013. [Google Scholar]
  9. Nguyen, P.; Wijesinghe, P.; Palipana, R.; Lin, K.; Vasic, D. Network-assisted device discovery for LTE-based D2D communication systems. In Proceedings of the IEEE ICC, Sydney, Australia, 10–14 June 2014. [Google Scholar]
  10. Naslcheraghi, M.; Marandi, L.; Ghorashi, S.A. A novel device-to-device discovery scheme for underlay cellular networks. In Proceedings of the Iranian Conference on Electrical Engineering (ICEE), Tehran, Iran, 2–4 May 2017. [Google Scholar]
  11. Choi, K.W.; Han, Z. Device-to-device discovery for proximity-based service in LTE-Advanced system. IEEE J. Sel. Areas Commun. 2015, 33, 55–66. [Google Scholar] [CrossRef]
  12. Lee, W.; Kim, J.; Choi, S.W. New D2D peer discovery scheme based on spatial correlation of wireless channel. IEEE Trans. Veh. Technol. 2016, 65, 10120–10125. [Google Scholar] [CrossRef]
  13. Xenakis, D.; Kountouris, M.; Merakos, L.; Passas, N.; Verikoukis, C. Performance analysis of network-assisted D2D discovery in random spatial networks. IEEE Trans. Wirel. Commun. 2016, 15, 5695–5707. [Google Scholar] [CrossRef]
  14. Nguyen, N.T.; Choi, K.W.; Song, L.; Han, Z. ROOMMATEs: An unsupervised indoor peer discovery approach for LTE D2D communications. IEEE Trans. Veh. Technol. 2018, 67, 5069–5083. [Google Scholar] [CrossRef]
  15. Nitti, M.; Stelea, G.A.; Popescu, V.; Fadda, M. When social networks meet D2D communications: A survey. Sensors 2019, 19, 396. [Google Scholar] [CrossRef] [PubMed]
  16. Li, Y.; Wu, T.; Hui, P.; Jin, D.; Chen, S. Social-aware D2D communications: Qualitative insights and quantitative analysis. IEEE Commun. Mag. 2014, 52, 150–158. [Google Scholar] [CrossRef]
  17. Zhang, Z.; Wang, L.; Liu, D.; Zhang, Y. Peer discovery for D2D communications based on social attribute and service attribute. J. Netw. Comput. Appl. 2017, 86, 82–91. [Google Scholar] [CrossRef]
  18. Tan, Z.; Li, X.; Ji, H.; Wang, K.; Zhang, H. Social-aware peer discovery and resource allocation for device-to-device communication. In Proceedings of the Digital Media Industry & Academic Forum, Santorini, Greece, 4–6 July 2016. [Google Scholar]
  19. Wu, H.; Wang, Y. Socially-inspired peer discovery for D2D communications. In Proceedings of the IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, Guangzhou, China, 8–12 October 2018. [Google Scholar]
  20. Xu, C.; Gao, C.; Zhou, Z.; Chang, Z.; Jia, Y. Social network-based content delivery in device-to-device underlay cellular networks using matching theory. IEEE Access 2017, 5, 924–937. [Google Scholar] [CrossRef]
  21. Zhang, B.; Li, Y.; Jin, D.; Hui, P.; Han, Z. Social-aware peer discovery for D2D communications underlaying cellular networks. IEEE Trans. Wirel. Commun. 2015, 14, 2426–2439. [Google Scholar] [CrossRef]
  22. Tang, X.; Wang, X.; Cattley, R.; Gu, F.; Ball, A.D. Energy harvesting technologies for achieving self-powered wireless sensor networks in machine condition monitoring: A review. Sensors 2018, 18, 4113. [Google Scholar] [CrossRef] [PubMed]
  23. Tran, L.-G.; Cha, H.-K.; Park, W.-T. RF power harvesting: A review on designing methodologies and applications. Micro Nano Syst. Lett. 2017, 5, 14. [Google Scholar] [CrossRef]
  24. ITU. Applications of Wireless Power Transmission via Radio Frequency Beam. Available online: https://www.itu.int/pub/R-REP-SM.2392 (accessed on 18 May 2019).
  25. Bouchouicha, D.; Dupont, F.; Latrach, M.; Ventura, L. Ambient RF energy harvesting. In Proceedings of the International Conference on Renewable Energies and Power Quality, Granada, Spain, 23–25 March 2010. [Google Scholar]
  26. Pinuela, M.; Mitcheson, P.D.; Lucyszyn, S. Ambient RF energy harvesting in urban and semi-urban environments. IEEE Trans. Microw. Theory Tech. 2013, 61, 2715–2726. [Google Scholar] [CrossRef]
  27. Shinohara, N.; Kamiyoshikawa, N. Study of flat beam in near-field for beam-type wireless power transfer via microwaves. In Proceedings of the 2017 11th European Conference on Antennas and Propagation (EUCAP), Paris, France, 19–24 March 2017. [Google Scholar]
  28. Mitani, T.; Yamakawa, H.; Shinohara, N.; Hashimoto, K.; Kawasaki, S.; Takahashi, F.; Yonekura, H.; Hirano, T.; Fujiwara, T.; Nagano, K.; et al. Demonstration experiment of microwave power and information transmission from an airship. In Proceedings of the 2nd International Symposium on Radio System and Space Plasma, Sofia, Bulgaria, 25–27 August 2010. [Google Scholar]
  29. Huang, C.-C.; Lin, C.-L. Wireless power and bidirectional data transfer scheme for battery charger. IEEE Trans. Power Electron. 2018, 33, 4679–4689. [Google Scholar] [CrossRef]
  30. Lakhlan, P.; Trivedi, A. Energy harvesting-based two-hop D2D communication in cellular networks. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics, Jaipur, India, 21–24 September 2016. [Google Scholar]
  31. Yao, Y.; Huang, S.; Beaulieu, N.C.; Yin, C. Cooperative transmission in cognitive and energy harvesting-based D2D networks. In Proceedings of the IEEE Wireless Communications and Networking Conference, San Francisco, CA, USA, 19–22 March 2017. [Google Scholar]
  32. Sakr, A.H.; Hossain, E. Cognitive and energy harvesting-based D2D communication in cellular networks: Stochastic geometry modeling and analysis. IEEE Trans. Commun. 2015, 63, 1867–1880. [Google Scholar] [CrossRef]
  33. Wang, W.; Srinivasan, V.; Motani, M. Adaptive contact probing mechanisms for delay tolerant applications. In Proceedings of the ACM International Conference on Mobile Computing Networking, Montréal, QC, Canada, 9–14 September 2007. [Google Scholar]
  34. Chaintreau, A.; Hui, P.; Scott, J.; Gass, R.; Crowcroft, J.; Diot, C. Impact of human mobility on opportunistic forwarding algorithms. IEEE Trans. Mob. Comput. 2007, 6, 606–620. [Google Scholar] [CrossRef]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.