Next Article in Journal
Near-Field Communication in Biomedical Applications
Next Article in Special Issue
Self-Detecting Traffic Interference Control for Multi-Zone Services under 5G-Based Cellular Networks
Previous Article in Journal
Joint Image Encryption and Screen-Cam Robust Two Watermarking Scheme
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

D2D Mobile Relaying Meets NOMA—Part I: A Biform Game Analysis

1
NEST Research Group, LRI Lab., ENSEM, Hassan II University of Casablanca, Casablanca 20000, Morocco
2
Laoratoire de Reacherche en Informatique, Sorbonne Université, CNRS, LIP6, F-75005 Paris, France
3
Department of Computer Science, University of Quebec at Montreal, Montreal, QC H2L 2C4, Canada
4
TICLab, International University of Rabat, Rabat 11100, Morocco
5
School of Computer Science, Mohammed VI Polytechnic University, Ben Guerir 43150, Morocco
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(3), 702; https://doi.org/10.3390/s21030702
Submission received: 28 November 2020 / Revised: 10 January 2021 / Accepted: 13 January 2021 / Published: 20 January 2021
(This article belongs to the Special Issue Device to Device (D2D) Communication)

Abstract

:
Structureless communications such as Device-to-Device (D2D) relaying are undeniably of paramount importance to improving the performance of today’s mobile networks. Such a communication paradigm requires implementing a certain level of intelligence at device level, allowing to interact with the environment and select proper decisions. However, decentralizing decision making sometimes may induce some paradoxical outcomes resulting, therefore, in a performance drop, which sustains the design of self-organizing, yet efficient systems. Here, each device decides either to directly connect to the eNodeB or get access via another device through a D2D link. Given the set of active devices and the channel model, we derive the outage probability for both cellular link and D2D link, and compute the system throughput. We capture the device behavior using a biform game perspective. In the first part of this article, we analyze the pure and mixed Nash equilibria of the induced game where each device seeks to maximize its own throughput. Our framework allows us to analyse and predict the system’s performance. The second part of this article is devoted to implement two Reinforcement Learning (RL) algorithms enabling devices to self-organize themselves and learn their equilibrium pure/mixed strategies, in a fully distributed fashion. Simulation results show that offloading the network by means of D2D-relaying improves per device throughput. Moreover, detailed analysis on how the network parameters affect the global performance is provided.

1. Introduction

1.1. Motivations & New Trends

The last twenty years have known a noteworthy growth in the demand for more network capacity. This was mainly caused by the unprecedented Internet built-out and the huge traffic generated by a massive number of devices. To cope with this neverseen demand, substantial research effort is being conducted to enhance the performance of next generation mobile networks. Current fifth Generation (5G) of wireless networks addresses a wider range of applications and many innovative use-cases [1]. It is expected that a single 5G tower will serve up to 1 Million device per km 2 , which generates massive data traffic in cellular networks. The sixth Generation (6G) of wireless networks is foreseen to support novel data-hungry applications, a plethora of autonomous services and new communication scenarios around 2030. These technologies encompass holographic videos, flying networks and vehicles, teleoperated driving, telemedicine, haptics, human bond communications, brain-computer interfaces, connected autonomous systems, high-definition video streaming and the tactile Internet, to name a few. Thus, the volume of wireless data traffic and the number of connected objects are expected to increase hundred-folds in a given cubic meter [2]. 6G will connect millions of users and billions of machines everywhere through the emergence of the Internet of Everything (IoE) ecosystem. Thus, many strict requirements need to be met such as low energy consumption, long battery life, high intelligence, extremely larger bandwidth than 5G (The THz band is defined from 0.1 THz to 10 THz), high reliability, low latency, and high data rates, etc. [3,4,5,6].
Device-to-Device (D2D) relaying has been proposed as an efficient solution to lower energy consumption and extend the battery life of the mobile device, while expanding the network coverage and improving local performance in a rapid and cost-effective way. This is met by offloading the traffic to devices exhibiting better channel conditions. D2D communication allows devices to communicate directly between each other instead of going through the Base Station (BS) [7,8]. Unfortunately, the infrastructureless nature of D2D communications raises challenges on how to efficiently integrate D2D communication within the current cellular ecosystem. Yet, a D2D communication requires lower transmission power for mobile devices, and improves network performance both under inband and outband schemes. Nonetheless, a large number of D2D users may induce higher uncontrollable interference and might lead to capacity failure at relay level. This is why it is crucial to strategically set the devices that need to use D2D links and those that need to be relays within a cell.
Under legacy networks, the BS needs to have complete information about the network and the active devices. Then, it computes the optimal parameters and the best Radio Access Network (RAN) association. Next, it remotely configures devices through a heavy signaling. However unfortunately, such a centralized system is known to suffer from a heavy overhead and complex signaling mechanisms, under massive environments, which greedily misuse the network resources. Consequently, a fully distributed system is recommended for dense/ultra-dense networks, as it offloads the network and minimizes the dependency on its connectivity.
Nowadays, we live in a hyper connected world where the performance of each device is mutually affected by decisions taken by the other devices. Hence, to opt for the best strategies under partial information, a decentralized scheme is the natural solution. Moreover, decentralizing decision-making exhibits promising scalability features and can efficiently avoid server break-downs due to unsupported number of requests. To ensure a distributed system with ubiquitous intelligence, self-organized devices are by design the master-pieces. It is an autonomous system designed to enable the devices automated resource management, diminishes BSs tasks, reduces human intervention, and optimizes available resources, etc. The general aim of this work is to offload the BS and avoid the system breakout, via self-organized devices implementing some Artificial Intelligence (AI) techniques and decentralized Machine Learning (ML) algorithms. The updating pattern at the device level only requires local actions and observed/measured payoffs perceived. Such an adaptive algorithm is very important in dynamic/stochastic environments where many parameters are unavailable, unobservable or simply unknown.
Today’s 5G networks underuse artificial intelligence and machine learning, which results in poor self-organizing capabilities. In contrast, it is foreseen that AI/ML will be the signature for 6G for smarter and more powerful networks, as it will penetrate network, service, content and user equipment’s. Everything will be very intelligent, giving rise to the concept of IoE, with an enormous amount of data and information. AI-empowered 6G is believed to be able to provide a series of all new features, e.g., network decentralization, self-organization, context-awareness, self-configuration and self-healing properties. It will also enable reliable device-to-device (D2D) communications in a fully intelligent way [3,5]. Unfortunately, self-organized devices could make sub-optimal decisions, lead to unwanted and unexpected/paradoxical results. Thus, it is of paramount importance to make sure the devices are reasoning properly and converge to efficient operation points with satisfactory performance, the network should be carefully designed. This study could be done either through test beds or real implementations and/or simulations which are costly and time consuming. In this work, we analyze the network by means of game theory. In other words, a network designer (e.g., the network builder or the operator) will analyze the performance of the network and predict its operation points using game theory before rolling it out. The benefits of game theory rely on providing strong tools and theoretic framework to analyze the agents/devices interaction. This allows us to accurately predict the system performance. Game theory is useful in predicting the network performance while considering self-organized devices. Henceforth, the network designer can build efficient mechanisms granting the whole system to run properly under almost a zero-touch paradigm.

1.2. Our Contributions

To allow User Equipment (UE) to communicate and connect to the BS, a multiple access technology is utilized. Multiple access techniques can broadly be categorized into two different approaches, namely, Orthogonal Multiple Access (OMA) and Non-Orthogonal Multiple Access (NOMA). On one hand, OMA allows UEs to use orthogonal signals to eliminate interference, such as Orthogonal Frequency-Division Multiple Access (OFDMA) used in 4G mobile networks. On the other hand, NOMA is envisioned to be used as a candidate radio access technology for beyond 5G and 6G cellular systems. It allows allocating one frequency channel to multiple users at the same time within the same cell either in the power domain or the code domain. Moreover, NOMA offers a number of advantages, including improved spectral efficiency, enhanced resource allocation, higher cell-edge throughput, and lower latency (no scheduling request from users to base station is required) [9,10,11].
In a nutshell, we use game theory in the first part of this article to analyze and solve the conflict of interest raised between self-organized devices. The individual average throughput is considered as the payoff function. More precisely, we build a biform game, for which we analyze the pure/mixed Nash equilibria. The second part of our work [12] presents two distributed reinforcement learning algorithms to be implemented at the device level in order to reach equilibrium strategies. Our mechanism is robust as it is based on Nash equilibrium concept, and reduces the risk of bad decisions, allowing thereby to benefit from appreciated self-organizing and self-configuring features.
The main contributions of this work are fivefold:
Part I’s contributions are related to performance analysis of a self-organizing D2D relaying scheme:
1.
We consider a hybrid two-tier scheme where cellular links use NOMA, whilst D2D links use OMA. This scheme is suitable for both inband and outband D2D schemes;
2.
We fully characterize the Rayleigh channel model and derive closed forms for the outage probability of both OMA and NOMA links, and then compute the average throughput perceived by each device in the network;
3.
To the best of our knowledge, this work is the first to implement a biform game to capture the devices’ behaviors while deciding which Radio Access Network (RAN) to connect. In order to evaluate the outcome of the game, detailed analysis of pure and mixed Nash equilibria are provided for 3-person game and generalized to n-person game;
Part II’s contributions are related to implementing a self-organized mode selection using RL:
4.
We propose to empower devices with a self-organize capability allowing to reach pure Nash equilibria (Linear-Reward Inaction) and mixed Nash equilibria (Boltzmann-Gibbs dynamics), in a fully distributed manner;
5.
We perform extensive simulations to analyze the effect of different parameters on the learning schemes. Insights on accuracy and convergence are also provided.
The rest of this article is organized as follows: A comprehensive literature review is presented in Section 2. The problem is formulated in Section 3. We provide a full equilibrium analysis for the 3-person game in Section 4. The general case of n-player game is discussed in Section 5. Numerical investigations are presented in Section 6. Finally, we draw some concluding remarks and list future works in Section 7. Part II [12] of this research, presents the proposed decentralized reinforcement learning algorithms and access their dynamics and performance.

2. Related Work

D2D communications are widely used to relay information and improve local/overall performance by offloading traffic to other devices in the network, extending system coverage, mitigating wireless fading through improving the capture effect and exploiting spatial diversity. Also, reducing transmit power allows us to lower the impact of cross-interference, which helps to improve the network performance, enhance the QoS (improved throughput, reduced latency, and increased reliability) [13,14,15]. In latter researches, and in most of D2D published papers, a great attention is given to the performance enhancement of other technologies by introducing D2D communication (e.g., IoT [13] and Massive MIMO Systems [15]). In our article, we discuss the importance of strategically selecting the best RAN (i.e., either cellular or D2D) according to the network status, in a way to improve the devices experienced QoS. Game theory is a set of applied mathematical tools aiming to understand and solve decision-making problems, such as competing and independent actors during conflicts. It has been extensively used in wireless networks [16,17], and more specifically in solving cooperation and competition problems between devices over limited resources [18,19,20,21,22,23,24,25,26].
In the last few years, a tremendous research effort has been conducted in order to adapt and adopt self-organized networks. Self-organizing resource management approaches have attracted attention because of their low complexity, scalability and their important role in reducing information exchange [27]. It has been investigated for various networks from different perspectives including learning mechanisms, heuristic and game-theoretic approaches [28,29,30]. The authors in [28] propose a distributed utility-based SINR adaptation at small-cells that diminishes the cross-tier interference. The authors in [29] carry out a comparison among two decentralized heuristic algorithms, with no involvement of any centralized entity, for joint power assignment and resource allocation in small-cells. In [30], the authors present an energy-efficient self-organized cross-layer optimization scheme where each D2D transmitter strategically selects the resource blocks and the power levels for improving its energy efficiency while maintaining a certain QoS requirement of other tiers. However, the autonomy and self-organization of autonomous collaborative networks of devices make them especially vulnerable to attacks. Thus, such a network needs a dependable mechanism to detect and identify attackers and enable appropriate reactions. That is why the authors in [31] propose a scalable adversary detection for autonomous networks, a scheme to efficiently identify malicious devices within large networks of collaborating entities. It is designed to run in truly autonomous environments, i.e., without a central trusted entity. Unlike related works on D2D mode selection appended in Table 1, where authors focus on optimizing the network performance, we aim to model and understand the interplay between D2D, NOMA and OMA. Then, we use biform game theory to predict, and decentralized machine scheme to learn what options each device should pursue to earn the “best” long-term average profit.

3. System Model

Consider the uplink case of a single 4G/5G/6G cell, where a finite number of devices N = { 1 , 2 , . , n } , are randomly distributed around the serving BS. The devices communicate using NOMA in cellular links combined with conventional OMA for D2D links as shown in Figure 1. We use a separate band for D2D users (i.e., D2D overlay mode). We use OMA for D2D links to (1) study a hybrid access system; and (2) eliminate interference effect between cellular and D2D UEs. Here, we use stochastic geometry to estimate the performance of D2D users. Each device i N transmits its data to the BS using power P i from a distance d i while experiencing a channel gain h i . For better readability, the main notations and symbols used in this article are listed in Table 2.
For the sake of simplicity and without loss of generality, device numbered 1 is the closest device to the BS, with distance d 1 . It transmits with the lowest power P 1 and experiences the strongest channel h 1 . Whilst device n is the farthest with distance d n from the BS, uses the highest transmission power P n and experiences the poorest channel h n . Namely, we have | h 1 | 2 | h 2 | 2 | h n 1 | 2 | h n | 2 . Let w ( t ) be the received noise at the BS and assume each device i transmits its individual signal s i ( t ) . Then, the aggregate received signal at the BS writes:
S ( t ) = i = 1 n P i h i s i ( t ) + w ( t ) ,
The BS decodes the signals by applying the Successive Interference Cancellation (SIC) technique [41,42]. The received signal power corresponding to the strongest channel user is likely the strongest at the BS and is therefore the first to be decoded at the BS and experiences interference from all the remaining weaker channels’ users in the cluster. So, the transmission of device 1 experiences interference from users with weaker channels in the cluster, whereas the transmission of device n experiences zero interference. In contrast to downlink NOMA, each user in uplink NOMA can independently utilize its battery power up to the maximum since the channel gains of all the users are sufficiently distinct [43].

3.1. Channel Model

Within this article, the radio signal experiences attenuation due to the path-loss with exponent α and a Rayleigh fading. We denote by γ i the instantaneous Signal-to-Interference-and-Noise-Ratio (SINR) of device i, which is given by:
γ i = P i | h i | 2 d i α j = i + 1 n P j | h j | 2 d j α + σ N 2 ,
It is worth nothing that the SINR of the weakest device n experiences no interference according to NOMA operation, i.e., γ n = P n | h n | 2 d n α σ N 2 . σ N 2 denotes the variance of the thermal additive white Gaussian noise. Through this article, each device aims at guaranteeing an instantaneous SINR above a certain threshold γ i , t h to have successful communication. The outage probability denotes the probability that the SINR is less or equal than a given SINR threshold ( γ i , t h ). It is calculated as follows:
P i o u t ( γ i ) = P r ( γ i γ i , t h ) = P r P i | h i | 2 d i α σ N 2 + j = i + 1 n P j | h j | 2 d j α γ i , t h = P r | h i | 2 γ i , t h σ N 2 P i d i α + γ i , t h P i d i α j = i + 1 n P j | h j | 2 d j α = 0 + f | h n 1 | 2 ( x n 1 ) 0 + f | h n 2 | 2 ( x n 2 ) 0 + f | h 1 | 2 ( x 1 ) 0 A f | h i | 2 ( x i ) d x 1 d x 2 d x n 1 .
with A = γ i , t h σ N 2 P i d i α + γ i , t h P i d i α j = i + 1 n P j | h j | 2 d j α . Assuming that all channels undergo Rayleigh fading, the channel power gain | h | 2 is an exponential random variable with PDF f | h | 2 ( x , λ ) = λ e λ x , where 1 λ ≥ 0 is the mean and scale parameter of the distribution, often taken equal to 1. Therefore, the outage probability can be expressed as:
P i o u t ( γ i ) = 1 j = i + 1 n λ j . e γ i , t h σ N 2 λ i P i d i α j = i + 1 n λ j + γ i , t h P j d j α P i d i α λ i

3.2. Average Throughput

In general, device i transmits data with a rate R i in every channel use (i.e., in every packet or frame transmission), in a condition that R i must not exceed its channel capacity, i.e., R i log ( 1 + γ i ) . We define the throughput of the transmission as the rate of successful data bits that are transmitted to the destination over a communication channel. As the channel is variable, random and unknown, the throughput of device i is a function of the outage probability P i o u t ( γ i ) that depends on the average of the channel gain, expressed as follows:
Θ i ( γ i ) = M L R i ( 1 P i o u t ( γ i ) ) = ρ i ( 1 P i o u t ( γ i ) ) ,
with ρ i = M L R i . M is the data length. L denotes the total number of bits in a frame with L = M + H data bits, and H is the length of the header.

3.3. Biform Game Analysis

The main goal of game theory is to study the strategic relations between rational players that strive to maximize their payoffs in the game and where the actions and choices of all the players affect the outcome of each player. In this work, the devices inside the cell decide either to communicate through the cellular link or to switch to D2D communication. Each device aims at making a decision that allows it to maximize its throughput. However, since each device decision influences the throughput of the other devices, we are concerned here about finding an equilibrium point and a prediction of what options players may take to earn the best profit. For this purpose, we use biform game theory. Biform game is a two-stage game that combines a competitive and cooperative game in one formal model. In the first stage, decisive players choose their strategies in a non-cooperative way to maximize their expected payoffs. Each profile of strategic choices at the first stage leads to the second stage, which is a cooperative game, where the actual payoff is realized. This gives the competitive environment created by the choices of the players in the first stage [44,45].
Let G = { N , { A i } i N , { U i } i N } be a biform game. N is the set of players of G . A i is the set of actions of each player i, either to be a relay a i = 0 or to communicate through D2D a i = 1 . U i is the payoff of each device i that represents its throughput. There are two cases of modeling the problem:
-
The first case is to consider the game from the perspective of one of the players, and define what is the action that each player needs to take to maximize its throughput depending on the network parameters and on the other players’ probabilities of relaying.
-
The second case is to consider the problem from an equilibrium perspective. In fact, we need to seek for the equilibrium probability vector where no player has incentive to deviate unilaterally. In this case also, each player could attain its maximum utility function at the equilibrium, depending on its own strategy and the strategy of other players.

4. Equilibrium Analysis for the Three-Player Game

Consider a three devices power-domain NOMA operation in a single cell network. Each device is communicating through uplink as shown in Figure 2.
Each device i = { 1 , 2 , 3 } , is transmitting its data to the BS with a power P i , from a distance d i and with h i as the channel coefficient between device i and the BS.

4.1. Channel Model

Let us consider device 1 as the closest to the BS with the lowest transmit power P 1 , the smallest distance d 1 and best channel condition h 1 . Device 3 has the farthest distance d 3 from the BS with the highest transmit power P 3 , and the weakest channel gain h 3 .
Device 1 is considered as the strongest device experiencing the strongest channel, while device 3 is the weakest. According to the conventional uplink NOMA operation, the BS successively decodes and cancels the signal of device 1 that experiences interference from the two other devices, then device 2 which is affected only by interference of device 3 and finally decodes the signal of device 3 that experiences zero interference. Each device’s SINR is then expressed as:
γ 1 = P 1 | h 1 | 2 d 1 α P 2 | h 2 | 2 d 2 α + P 3 | h 3 | 2 d 3 α + σ N 2 , γ 2 = P 2 | h 2 | 2 d 2 α P 3 | h 3 | 2 d 3 α + σ N 2 , γ 3 = P 3 | h 3 | 2 d 3 α σ N 2
The outage probability of each device i, is given by:
P 1 o u t , c ( γ 1 ) = 1 λ 2 λ 3 e γ 1 , t h σ N 2 λ 1 P 1 d 1 α ( λ 2 + γ 1 , t h P 2 d 2 α P 1 d 1 α λ 1 ) ( λ 3 + γ 1 , t h P 3 d 3 α P 1 d 1 α λ 1 ) , P 2 o u t , c ( γ 2 ) = 1 λ 3 e γ 2 , t h σ N 2 λ 2 P 2 d 2 α ( λ 3 + γ 2 , t h P 3 d 3 α P 2 d 2 α λ 2 ) , P 3 o u t , c ( γ 3 ) = 1 e γ 3 , t h σ N 2 λ 3 P 3 d 3 α .

4.2. Throughput

At each time slot, each device can choose to communicate through cellular and serves as a relay or, communicate through D2D. D2D links use OMA as a multiplexing access method. Also, the D2D transmitters operate in an overlaying mode, where D2D and cellular devices are allocated distinct frequency resources which enables to suppress interference between cellular and D2D devices. Depending on the devices choices, each device i earns a throughput and experiences an outage probability as follows:
-
If all the devices communicate through cellular mode, then the throughput of each device is:
T h p i c = Θ i c ( γ i ) = M L R ( 1 P i o u t , c ( γ i ) ) = ρ ( 1 P i o u t , c ( γ i ) ) .
We suppose that the BS allocates the same transmit rate R to all devices. For each device i, P i o u t , c ( γ i ) is defined in Equation (7).
-
If device i decides to be a relay while devices j and k transmit through D2D, i , j , k { 1 , 2 , 3 } , then:
T h p i c , d = x i Θ i c , d ( γ i ) = x i ρ ( 1 P i o u t , c d ( γ i ) ) , P i o u t , c d = 1 e γ t h σ N 2 λ i P i d i α T h p j d = ( 1 x i ) 2 ρ ( 1 P i o u t , c d ( γ i ) ) ( 1 P j o u t , d ( γ j ) ) , P j o u t , d = 1 λ k e γ t h σ N 2 λ j P j , d d j , d α λ k + γ t h f j , k P k , d d k , d α P j , d d j , d α d λ j
If there is at least one device in the D2D group, then the relay device allocates a fraction of its throughput x i to that group. x i allows also to define the mode selection of device i. For instance, x i = 1 means device i fully opts for cellular mode. Meanwhile x i = 0 means device i chooses to communicate through D2D link. When x i ] 0 , 1 [ the device i plays the role of a relay. Here, we assume that the fraction given from the relay will be equally divided between the devices in D2D mode. P j , d and d j , d are the transmit power and the distance of the D2D device j, respectively. The power transmission in cellular communication is much higher than the D2D transmit power because of the short distances between D2D devices in comparison with the distances between a device and its serving BS.
Theoretically, if there is a perfect synchronization of time and frequency, there will be no interference and the sub-carriers will be considered orthogonal. However, in real networks, although frequency synchronization can be performed with certain accuracy, small frequency synchronization errors can still cause significant interference among different users. f j , k is the orthogonality factor between device j and device k.
-
If device i and j decide to act as relays while device k transmits through D2D link, and by considering device i the strongest ( d i d j ), then:
T h p i c , d = x i ρ ( 1 P i o u t , c d ( γ i ) ) , P i o u t , c d = 1 λ j e γ t h σ N 2 λ i P i d i α ( λ j + γ t h P j d j α P i d i α λ i ) T h p j c , d = x j ρ ( 1 P j o u t , c d ( γ j ) ) , P j o u t , c d = 1 e γ t h σ N 2 λ j P j d j α
T h p k d = ρ ( 1 x i ) ( 1 P i o u t , c d ( γ i ) ) + ( 1 x j ) ( 1 P j o u t , c d ( γ j ) ) ( 1 P k o u t , d ( γ k ) ) , P k o u t , d = 1 e γ t h σ N 2 λ k P k , d d k , d α d
-
If all devices decide to switch to D2D communication, each device earns a regret of being disconnected from the network and the throughput is given by:
T h p i d = r i

4.3. Biform Game Analysis

Consider a two-stage decision problem of three devices. Each player i ’s profit (with i = { 1 , 2 , 3 } ) is its throughput as presented in Figure 3. Recall that at each transmission, each device has the choice of staying connected to the BS or instead switch to a D2D communication. A device has the right to switch to the D2D side and go back to the cellular side whenever it wants, it is a random and reversible process.
The players decide to cooperate and choose whether to be connected to the cellular or D2D link to improve their throughput. If a device stays connected to the cellular link and there is at least one device in the D2D side, the cellular device must serve as a relay to D2D devices.
There are 2 3 different cooperation combinations between the three devices as shown in Figure 4. Depending on the devices combinations, they earn different throughput as follows:
-
If all the devices decide to stay connected to cellular link, each of them earns T h p i c as throughput.
-
If at least one player switches to D2D mode, it earns T h p j d , while those who stay connected to the BS earn T h p i c , d , i j .
-
If all the devices decide to switch to D2D communication, each of them will have r i that represents regret of being disconnected from the network.
As mentioned before, biform game consists of two stages:
First Stage: This stage is considered as a non-cooperative game. The decision of player i { 1 , 2 , 3 } , is either to communicate through the cellular link and serve as relay or to communicate through D2D. This could be represented by a binary decision variable a i { 0 , 1 } with:
-
a i = 0 refers to the choice of the action of being a relay.
-
a i = 1 refers to the action of communicating through D2D.
Second Stage: This stage is considered as a cooperative game, where the value created U(a) (i.e., the characteristic function) is investigated, with a = ( a 1 , a 2 , a 3 ) refers to the decisions taken by the devices in the first stage. In other words, U(a) is the value (i.e., throughput profit) that the players gain as a result of cooperating in the second-stage game given that strategies ( a 1 , a 2 , a 3 ) were played in the first stage. To analyze the game, we start by analyzing the cooperative part and then work back to find the optimal strategy for the devices. Each case of the second-stage cooperative games has a single point core:
-
The core of the game a = ( 0 , 0 , 0 ) is an allocation in which each player i gets T h p i c .
-
The core of a = ( 1 , 0 , 0 ) is an allocation in which player 1 gets T h p 1 d while player 2 and 3 get T h p 2 c , d and T h p 3 c , d , respectively. Similarly for a = ( 0 , 1 , 0 ) and a = ( 0 , 0 , 1 ) .
-
The core of a = ( 1 , 1 , 0 ) is an allocation in which player 1 and 2 earn T h p 1 d and T h p 2 d , respectively, while player 3 earns T h p 3 c , d . Similarly for a = ( 0 , 1 , 1 ) and a = ( 1 , 0 , 1 ) .
-
The core of the game a = ( 1 , 1 , 1 ) is an allocation in which each player i earns a regret because all the devices are disconnected totally from the BS.
Hence the second-stage in each game is deterministic as a result of first-stage devices’ decisions, as shown in Figure 4.
Note that these choices are made simultaneously. The profit that represents each device’s throughput depending on their choices is expressed as follows:
U ( 0 , 0 , 0 ) = { T h p 1 c , T h p 2 c , T h p 3 c } U ( 0 , 0 , 1 ) = { T h p 1 c , d , T h p 2 c , d , T h p 3 d } U ( 0 , 1 , 0 ) = { T h p 1 c , d , T h p 2 d , T h p 3 c , d } U ( 0 , 1 , 1 ) = { T h p 1 c , d , T h p 2 d , T h p 3 d } U ( 1 , 0 , 0 ) = { T h p 1 d , T h p 2 c , d , T h p 3 c , d } U ( 1 , 0 , 1 ) = { T h p 1 d , T h p 2 c , d , T h p 3 d } U ( 1 , 1 , 0 ) = { T h p 1 d , T h p 2 d , T h p 3 c , d } U ( 1 , 1 , 1 ) = { T h p 1 d , T h p 2 d , T h p 3 d }
As explained before, there are two cases of analyzing the problem:

4.3.1. First Case

The first-stage decision of player i is represented by a binary decision variable a i { 0 , 1 } . In the second stage, after the first stage switching choice a has taken place, the corresponding cooperative game is then played. Let U i (a) denotes the second stage profits for a player i given first stage choice a. The programming problem of player i can be written as:
max a i { 0 , 1 } E [ U i ( a ) ]
Here the player i chooses the action a i that maximizes its second stage profit, with:
U i ( a ) = T h p i c i f a 1 = a 2 = a 3 = 0 T h p i c , d i f a i = 0 a n d a 1 + a 2 + a 3 2 T h p i d i f a i = 1 a n d a 1 + a 2 + a 3 2 r i i f a 1 = a 2 = a 3 = 1
Let us take for example the case of the player 1. Let a 1 be the binary decision variable of player 1, with a 1 { 0 , 1 } . Let ϵ 2 , ϵ 3 be random variables representing player 2 and player 3 decision values, where ϵ 2 and ϵ 3 { 0 , 1 } . Let U 1 ( a 1 , ϵ 2 , ϵ 3 ) represents the second stage gain achievable by player 1 given its first stage choice a 1 , player 2’s and player 3’s decisions ϵ 2 , ϵ 3 , respectively.
The problem of player 1 can be written as:
max a 1 { 0 , 1 } E ϵ 2 , ϵ 3 [ U 1 ( a 1 , ϵ 2 , ϵ 3 ) ]
Note that E ϵ 2 , ϵ 3 [ U 1 ( a 1 , ϵ 2 , ϵ 3 ) ] is the expected utility of player 1 depending on player 2 and player 3 decisions.
In Equation (16), player 1 is selecting a 1 , which maximizes its second-stage expected profit. Suppose that player 1 believes that players 2 and 3 will choose to communicate through the cellular link with a probability of belief y 2 0 and y 3 0 , respectively. So we can rewrite the above problem as:
max a 1 { 0 , 1 } y 2 y 3 ( U 1 ( a 1 , 1 , 1 ) ) + y 2 ( 1 y 3 ) ( U 1 ( a 1 , 1 , 0 ) ) + ( 1 y 2 ) y 3 ( U 1 ( a 1 , 0 , 1 ) ) + ( 1 y 2 ) ( 1 y 3 ) ( U 1 ( a 1 , 0 , 0 ) ) .
In Equation (17), device 1 chooses the action that allows it to attain its maximum throughput depending on some probability beliefs it has on which action other devices can choose. The second stage throughput profit of player 1 can be written as:
U 1 ( a 1 , ϵ 2 , ϵ 3 ) = T h p 1 c i f a 1 = 0 and ϵ 2 = ϵ 3 = 0 T h p 1 c , d i f a 1 = 0 and ϵ 2 + ϵ 3 1 T h p 1 d i f a 1 = 1 and ϵ 2 + ϵ 3 1 r 1 i f a 1 = 1 and ϵ 2 = ϵ 3 = 1
The result is that player 1 should switch to D2D if he believes that his profit in D2D is higher than his profit in cellular and vice-versa, while he is indifferent between the two options when the benefits are equal.

4.3.2. Second Case

In this case, we aim to find both the pure and mixed strategy Nash equilibria that allow the devices to attain their equilibrium in terms of the highest throughput. In game theory, if each player has chosen an action strategy, and no player can benefit by modifying its strategy while the other players keep theirs unchanged, then the current set of strategy choices and their corresponding payoffs form a Nash equilibrium. Likewise, there exists a Nash equilibrium for every finite game. The Nash equilibrium could be either a pure strategy or a mixed strategy.
Pure strategy Nash Equilibrium (PNE): A pure strategy determines the action a device will choose with probability 1 and every other action with probability 0 to attain its best profit.
Lemma 1.
-
The action (0,0,0) is a PNE iff:
( 1 P 1 o u t , c ( 0 , 0 , 0 ) ) ( 1 P 1 o u t , d ( 1 , 0 , 0 ) ) ( ( 1 x 2 ) ( 1 P 2 o u t , c d ( 1 , 0 , 0 ) ) + ( 1 x 3 ) ( 1 P 3 o u t , c d ( 1 , 0 , 0 ) ) ) ,
and
( 1 P 2 o u t , c ( 0 , 0 , 0 ) ) ( 1 P 2 o u t , d ( 0 , 1 , 0 ) ) ( ( 1 x 1 ) ( 1 P 1 o u t , c d ( 0 , 1 , 0 ) ) + ( 1 x 3 ) ( 1 P 3 o u t , c d ( 0 , 1 , 0 ) ) ) ,
and
( 1 P 3 o u t , c ( 0 , 0 , 0 ) ) ( 1 P 3 o u t , d ( 0 , 0 , 1 ) ) ( ( 1 x 1 ) ( 1 P 1 o u t , c d ( 0 , 0 , 1 ) ) + ( 1 x 2 ) ( 1 P 2 o u t , c d ( 0 , 0 , 1 ) ) ) .
-
The action (0,0,1) is a PNE iff:
x 1 ( 1 P 1 o u t , c d ( 0 , 0 , 1 ) ) 1 x 2 2 ( 1 P 2 o u t , c d ( 1 , 0 , 1 ) ) ( 1 P 1 o u t , d ( 1 , 0 , 1 ) ) ,
and
x 2 ( 1 P 2 o u t , c d ( 0 , 0 , 1 ) ) 1 x 1 2 ( 1 P 1 o u t , c d ( 0 , 1 , 1 ) ) ( 1 P 2 o u t , d ( 0 , 1 , 1 ) ) ,
and
( 1 P 3 o u t , d ( 0 , 0 , 1 ) ) ( ( 1 x 1 ) ( 1 P 1 o u t , c d ( 0 , 0 , 1 ) ) + ( 1 x 2 ) ( 1 P 2 o u t , c d ( 0 , 0 , 1 ) ) ) ( 1 P 3 o u t , c ( 0 , 0 , 0 ) ) .
-
The action (0,1,0) is a PNE iff:
x 1 ( 1 P 1 o u t , c d ( 0 , 1 , 0 ) ) 1 x 3 2 ( 1 P 3 o u t , c d ( 1 , 1 , 0 ) ) ( 1 P 1 o u t , d ( 1 , 1 , 0 ) ) ,
and
( 1 P 2 o u t , d ( 0 , 1 , 0 ) ) ( ( 1 x 1 ) ( 1 P 1 o u t , c d ( 0 , 1 , 0 ) ) + ( 1 x 3 ) ( 1 P 3 o u t , c d ( 0 , 1 , 0 ) ) ) ( 1 P 2 o u t , c ( 0 , 0 , 0 ) ) ,
and
x 3 ( 1 P 3 o u t , c d ( 0 , 1 , 0 ) ) 1 x 1 2 ( 1 P 1 o u t , c d ( 0 , 1 , 1 ) ) ( 1 P 3 o u t , d ( 0 , 1 , 1 ) ) .
-
The action (0,1,1) is a PNE iff:
x 1 ρ ( 1 P 1 o u t , c d ( 0 , 1 , 1 ) ) r 1 ,
and
1 x 1 2 ( 1 P 1 o u t , c d ( 0 , 1 , 1 ) ) ( 1 P 2 o u t , d ( 0 , 1 , 1 ) ) x 2 ( 1 P 2 o u t , c d ( 0 , 0 , 1 ) ) ,
and
1 x 1 2 ( 1 P 1 o u t , c d ( 0 , 1 , 1 ) ) ( 1 P 3 o u t , d ( 0 , 1 , 1 ) ) x 3 ( 1 P 3 o u t , c d ( 0 , 1 , 0 ) ) .
-
The action (1,0,0) is a PNE iff:
( 1 P 1 o u t , d ( 1 , 0 , 0 ) ) ( ( 1 x 2 ) ( 1 P 2 o u t , c d ( 1 , 0 , 0 ) ) + ( 1 x 3 ) ( 1 P 3 o u t , c d ( 1 , 0 , 0 ) ) ) ( 1 P 1 o u t , c ( 0 , 0 , 0 ) ) ,
and
x 2 ( 1 P 2 o u t , c d ( 1 , 0 , 0 ) ) 1 x 3 2 ( 1 P 3 o u t , c d ( 1 , 1 , 0 ) ) ( 1 P 2 o u t , d ( 1 , 0 , 0 ) ) ,
and
x 3 ( 1 P 3 o u t , c d ( 1 , 0 , 0 ) ) 1 x 2 2 ( 1 P 2 o u t , c d ( 1 , 0 , 1 ) ) ( 1 P 3 o u t , d ( 1 , 0 , 1 ) ) ,
-
The action (1,1,0) is a PNE iff:
1 x 3 2 ( 1 P 3 o u t , c d ( 1 , 1 , 0 ) ) ( 1 P 1 o u t , d ( 1 , 1 , 0 ) ) x 1 ( 1 P 1 o u t , c d ( 0 , 1 , 0 ) ) ,
and
1 x 3 2 ( 1 P 3 o u t , c d ( 1 , 1 , 0 ) ) ( 1 P 2 o u t , d ( 1 , 1 , 0 ) ) x 2 ( 1 P 2 o u t , c d ( 1 , 0 , 0 ) ) ,
and
x 3 ( 1 P 3 o u t , c d ( 1 , 1 , 0 ) ) r 3 .
-
The action (1,0,1) is a PNE iff:
1 x 2 2 ( 1 P 2 o u t , c d ( 1 , 0 , 1 ) ) ( 1 P 2 o u t , d ( 1 , 0 , 1 ) ) x 1 ( 1 P 1 o u t , c d ( 0 , 0 , 1 ) ) ,
and
x 2 ( 1 P 2 o u t , c d ( 1 , 0 , 1 ) ) r 2 ,
and
1 x 2 2 ( 1 P 2 o u t , c d ( 1 , 0 , 1 ) ) ( 1 P 3 o u t , d ( 1 , 0 , 1 ) ) x 3 ( 1 P 3 o u t , c d ( 1 , 0 , 0 ) ) .
-
The action (1,1,1) is a PNE iff:
r 1 x 1 ( 1 P 1 o u t , c d ( 0 , 1 , 1 ) ) ,
and
r 2 x 2 ( 1 P 2 o u t , c d ( 1 , 0 , 1 ) ) ,
and
r 3 x 3 ( 1 P 3 o u t , c d ( 1 , 1 , 0 ) ) .
One can clearly see that the action strategy (1,1,1) could never be a PNE. This is because the throughput could not be a negative value.
Proof. 
See Appendix A.1
Different from the pure equilibria analysis, where we consider unknown, slow fading and stationary channels, in the mixed analysis we consider random and fast fading channels. In a fast fading channel, a device can find itself unable to reach a pure equilibrium strategy in some situations, but it can attain the equilibrium by adopting each strategy with a certain probability.
Mixed strategy Nash Equilibrium (MNE): A mixed strategy is an attribution of a probability to each pure strategy, i.e., a device chooses an action with a certain probability. A pure strategy can be considered as a degenerate case of a mixed strategy. Let p i denotes the probability of relaying of each device i, so ( 1 p i ) is its probability of choosing to communicate through D2D.
-
If player 1 is indifferent between choosing to be a relay or to switch to D2D, then:
E [ U 1 ( 0 , a 2 , a 3 ) ] = E [ U 1 ( 1 , a 2 , a 3 ) ] , with:
E [ U 1 ( 0 , a 2 , a 3 ) ] = U 1 ( 0 , 0 , 0 ) p 2 p 3 + U 1 ( 0 , 1 , 0 ) ( 1 p 2 ) p 3 + U 1 ( 0 , 0 , 1 ) p 2 ( 1 p 3 ) + U 1 ( 0 , 1 , 1 ) ( 1 p 2 ) ( 1 p 3 ) E [ U 1 ( 1 , a 2 , a 3 ) ] = U 1 ( 1 , 0 , 0 ) p 2 p 3 + U 1 ( 1 , 1 , 0 ) ( 1 p 2 ) p 3 + U 1 ( 1 , 0 , 1 ) p 2 ( 1 p 3 ) + U 1 ( 1 , 1 , 1 ) ( 1 p 2 ) ( 1 p 3 )
-
If player 2 is indifferent between choosing to be a relay or to switch to D2D, then:
E [ U 2 ( a 1 , 0 , a 3 ) ] = E [ U 2 ( a 1 , 1 , a 3 ) ] , with:
E [ U 2 ( a 1 , 0 , a 3 ) ] = U 2 ( 0 , 0 , 0 ) p 1 p 3 + U 2 ( 1 , 0 , 0 ) ( 1 p 1 ) p 3 + U 2 ( 0 , 0 , 1 ) p 1 ( 1 p 3 ) + U 2 ( 1 , 0 , 1 ) ( 1 p 1 ) ( 1 p 3 ) E [ U 2 ( a 1 , 1 , a 3 ) ] = U 2 ( 0 , 1 , 0 ) p 1 p 3 + U 2 ( 1 , 1 , 0 ) ( 1 p 1 ) p 3 + U 2 ( 0 , 1 , 1 ) p 1 ( 1 p 3 ) + U 2 ( 1 , 1 , 1 ) ( 1 p 1 ) ( 1 p 3 )
-
If player 3 is indifferent between choosing to be a relay or to switch to D2D, then:
E [ U 3 ( a 1 , a 2 , 0 ) ] = E [ U 3 ( a 1 , a 2 , 1 ) ] , with:
E [ U 3 ( a 1 , a 2 , 0 ) ] = U 3 ( 0 , 0 , 0 ) p 1 p 2 + U 3 ( 1 , 0 , 0 ) ( 1 p 1 ) p 2 + U 3 ( 0 , 1 , 0 ) p 1 ( 1 p 2 ) + U 3 ( 1 , 1 , 0 ) ( 1 p 1 ) ( 1 p 2 ) E [ U 3 ( a 1 , a 2 , 1 ) ] = U 3 ( 0 , 0 , 1 ) p 1 p 2 + U 3 ( 1 , 0 , 1 ) ( 1 p 1 ) p 2 + U 3 ( 0 , 1 , 1 ) p 1 ( 1 p 2 ) + U 3 ( 1 , 1 , 1 ) ( 1 p 1 ) ( 1 p 2 )
Then, the equilibrium probability vector p * = ( p 1 * , p 2 * , p 3 * ) could be obtained by solving the following system of equations:
E [ U 1 ( 0 , a 2 , a 3 ) ] = E [ U 1 ( 1 , a 2 , a 3 ) ] , E [ U 2 ( a 1 , 0 , a 3 ) ] = E [ U 2 ( a 1 , 1 , a 3 ) ] , E [ U 3 ( a 1 , a 2 , 0 ) ] = E [ U 3 ( a 1 , a 2 , 1 ) ] .

5. Equilibrium Analysis for n-Person Game

Consider a two-stage decision problem of a fixed number n of devices inside a single cell. At each step of the game, each of the players chooses an action. The result of each play is a random payoff defined as the throughput of each player i N . Depending on the devices choices of belonging to cellular or D2D group, each device earns a throughput as follows:
-
If all the devices are in cellular, then the throughput of each device is:
T h p i c = Θ i c ( γ i ) = ρ ( 1 P i o u t , c ( γ i ) ) , P i o u t , c = 1 j = i + 1 n c λ j e γ i , t h σ N 2 λ i P i d i α j = i + 1 n c λ j + γ i , t h P j d j α P i d i α λ i .
-
If there are N c = { 1 , 2 , . . . , n c } devices in cellular and N d = { 1 , 2 , . . . , n d } devices in D2D, then each device i in cellular has:
T h p i c , d = x i Θ i c , d ( γ i ) = x i ρ ( 1 P i o u t , c d ( γ i ) ) , P i o u t , c d = 1 j = i + 1 n c λ j e γ i , t h σ N 2 λ i P i d i α j = i + 1 n c λ j + γ i , t h P j d j α P i d i α λ i
On the other hand, each device k in D2D group communicates with the following throughput:
T h p k d = i = 1 n c ( 1 x i ) ρ 1 P i o u t , c d ( γ i ) N d 1 P k o u t , d ( γ k ) , P k o u t , d = 1 j N d \ { k } λ j e γ t h σ N 2 λ k P k , d d k , d α j N d \ { k } λ k + γ t h f k , j P j , d d j , d α P k , d d k , d α d λ j
We assume that the fraction of throughput given from the cellular devices is equally divided between devices in D2D.
-
If all devices decide to switch to D2D communication, each device earns a regret, because there is no link left with the BS so all transmissions fail:
T h p i d = r i
At each transmission, each device has the choice of staying connected to the BS and serves as a relay or instead switch to D2D communication. A device has the right to join either the cellular or the D2D group whenever it wants to maximize its profit. Once in the cellular group, all the devices serve as relays to the D2D-transmitters in the other group. There are 2 n different cooperation combinations between the n devices inside the cell. Either all of them are communicating through cellular links, or all the devices choose to join the D2D group, or some devices communicate through cellular and serve as relays to others in the D2D group.
In the first stage, the decision of player i N , is to choose the mode of communication. In the second stage, we investigate the throughput U(a) that players generate as a result of cooperating in the second-stage game given that strategies a = ( a 1 , a 2 , . . . , a n ) were played in the first stage. Then, let us denote U(a) as a second stage cooperative game. For example, U ( 0 , 0 , . . . , 0 ) is the case where all devices are in the cellular group while U ( 1 , 1 , . . . , 1 ) is the case where all devices choose to join the D2D group.

5.1. First Case

For each device i, a i is its binary decision variable, with a i { 0 , 1 } . Let ϵ k { 0 , 1 } be the decision of device k { 1 , . . . , n } \ { i } . U i ( a i , ϵ k ) denotes the second stage profit achievable by device i given its first stage action and other devices decisions.
The problem of device i can be written as follows:
max a i { 0 , 1 } E ϵ k ( k { 1 , . . . , n } \ { i } ) [ U i ( a i , ϵ k ) ] ,
where E ϵ k ( k { 1 , . . . , n } \ { i } ) [ U i ( a i , ϵ k ) ] is the expected value of device i when choosing action a i depending on the other devices decisions.
Here the player i chooses the action a i that maximizes its second stage earning, with:
U i ( a i , ϵ k ) = T h p i c i f a i = 0 a n d ϵ k = 0 T h p i c , d i f a i = 0 a n d ϵ k 1 T h p i d i f a i = 1 a n d ϵ k n 2 r i i f a i = 1 a n d ϵ k = 1

5.2. Second Case

In this case, we aim to find the PNE and the MNE of the n-device game. The concept of NE is used to describe a strategy as the most rational behavior by players acting to maximize their gains.
Definition 1.
The strategy profile  A * = ( a i * , a i * ) is a pure Nash equilibrium if and only if:
i N , a i A i U i ( A * ) U i ( a i , A i * ) .
Nonetheless, a finite game might not always have a PNE, but it always has a MNE.
Definition 2.
A mixed action profile p * ] 0 , 1 [ is a mixed Nash equilibrium if for each player i { 1 , 2 , . . . , n } ,
p i * p i Δ ( A i ) U i ( p i , p i * ) ,
where p i is a mixed action for player i and p i is the profile of mixed actions for all players other than i. Δ ( A i ) is the set of all probability distributions over A i , which is the set of player i pure strategies.
From the network designer, the solutions produced by the biform game framework require complete network information, which may not scale well with the network size, and might cause high overload. Thus, for networks with incomplete information, the devices need to be self-organized and use decentralized learning algorithms to reach their equilibrium strategies. This only requires a minimal signaling to the users, and no recommendation from the BS. Part II [12] of this work covers the distributed schemes enabling the devices to reach Nash equilibrium, only based on their local information and observations.

6. Performance Analysis

In this section, we evaluate the performance of the biform game using Mathworks Matlab R2020a. For illustrative purpose, we perform simulations for the three-device case. Figures are produced using the following setup: P 1 c = 10 mW, P 2 c = 30 mW, P 3 c = 50 mW, P d = 5 mW, R = 1 Mbit/s, L = M = 1024 bits, γ t h = 40 dB, α c = α d = 3 and σ N 2 = 116 dBm, d 1 = 100 m, d 2 = 300 m, d 3 = 500 m, f = 10 5 , x 1 = x 2 = x 3 = 0.5 , h 1 2 = 0.6 , h 2 2 = 0.5 , and h 3 2 = 0.2 . Figure 5, Figure 6 and Figure 7 report the action that a device might choose to maximize its expected utility depending on its belief on its competitors.
Figure 5 shows that when the strongest device 1 believes devices 2 and 3 have a low chance to relay data, it has incentives to act as a relay to maximize its expected utility. Meanwhile, it is more likely to communicate over a D2D link when it believes its competitors are likely to serve as relays. We notice that the maximum throughput for device 1 is attained when it acts as relay while the other devices have a high chance to communicate through D2D. Here, it prevents earning regrets by being disconnected from the mobile service and it gets rid of all interference from the other two devices. Moreover, device 1 chooses to communicate through D2D to maximize its utility if it believes one of its competitors might be a relay. This way, it gets rid of cellular interference and transmits at lower power.
Figure 6 depicts the average throughput of device 2 while changing its beliefs on the other devices willingness to relay. We notice that the relaying probability of device 2 increases when the relaying probability of the weakest device 3 decreases. This can be explained as follows: device 3 may harm the second strongest device while transmitting over cellular link, while it is indifferent about device 1 strategy. It switches to D2D when the relaying probability of device 1 increases and that of device 3 decreases. Following this behavior, device 2 is able to get rid of high interference in cellular, transmit at lower power, use better RAN and experience satisfactory QoS brought by the strongest device.
Similarly, Figure 7 depicts the average throughput of the weakest device. When this latter decides to serve as a relay, it will experience low QoS due to the long distance and the bad channel gain leading to the BS. It also has to transmit with high power and share its throughput with other devices via D2D. However, switching to D2D allows it to benefit from a better channel quality, to transmit at lower power and to experience improved QoS offered from the stronger relays. We notice that device 3 might experience high throughput when the strongest device serves as a relay and device 2 uses D2D. In this case, device 1 gets rid of interference and perceives high throughput, meanwhile device 3 gets a fraction of that throughput, resulting in a win-win scenario.

7. Conclusions and Perspectives

In this article, we considered the uplink case of n devices, where each device chooses whether to communicate through cellular (e.g., 5G/6G) or via D2D link to maximize its throughput. Cellular devices use NOMA, whilst they may serve neighboring devices using an orthogonal multiple access method (e.g., OFDMA/SC-FDMA). We formulated the problem as a biform game: Step 1) the devices competed over two available radio access technologies (cellular and D2D); Step 2) Devices connected to cellular cooperate with other devices in order to provide access to available services. Next, we analyzed the game pure/mixed equilibria. Simulation results show that D2D-relaying improves the devices’ average throughput. The second part of this article [12] deals with implementing distributed reinforcement learning to self-explore optimal strategies in a fully distributed manner.

Author Contributions

Conceptualization, S.D., E.S. and M.G.; Formal analysis, S.D., E.S. and M.G.; Funding acquisition, M.G. and E.-M.A.; Investigation, S.D.; Methodology, S.D. and E.S.; Project administration, E.S. and M.G.; Software, S.D. and E.-M.A.; Supervision, E.S. and M.G.; Validation, E.S., M.G. and E.-M.A.; Writing—original draft, S.D.; Writing—review & editing, E.S. and E.-M.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partly supported by the International University of Rabat, and Mohammed VI Polytechnic university.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Acknowledgments

We would like to thank the anonymous reviewers for their valuable and insightful comments. Part of this work has been conducted during the internship of Safaa Driouech at TICLab at the International University of Rabat (UIR) under the supervision of Mounir Ghogho and Essaid Sabir.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Appendix A.1. Proof of Lemma 1

The proof is straightforward by applying the definition of pure Nash equilibrium.
-
The action (0,0,0) is a PNE iff:
U 1 ( 0 , 0 , 0 ) U 1 ( 1 , 0 , 0 ) and U 2 ( 0 , 0 , 0 ) U 2 ( 0 , 1 , 0 ) and U 3 ( 0 , 0 , 0 ) U 3 ( 0 , 0 , 1 )
-
The action (0,1,0) is a PNE iff:
U 1 ( 0 , 1 , 0 ) U 1 ( 1 , 1 , 0 ) and U 2 ( 0 , 1 , 0 ) U 2 ( 0 , 0 , 0 ) and U 3 ( 0 , 1 , 0 ) U 3 ( 0 , 1 , 1 )
-
The action (0,0,1) is a PNE iff:
U 1 ( 0 , 0 , 1 ) U 1 ( 1 , 0 , 1 ) and U 2 ( 0 , 0 , 1 ) U 2 ( 0 , 1 , 1 ) and U 3 ( 0 , 0 , 1 ) U 3 ( 0 , 0 , 0 )
-
The action (0,1,1) is a PNE iff:
U 1 ( 0 , 1 , 1 ) U 1 ( 1 , 1 , 1 ) and U 2 ( 0 , 1 , 1 ) U 2 ( 0 , 0 , 1 ) and U 3 ( 0 , 1 , 1 ) U 3 ( 0 , 1 , 0 )
-
The action (1,0,0) is a PNE iff:
U 1 ( 1 , 0 , 0 ) U 1 ( 0 , 0 , 0 ) and U 2 ( 1 , 0 , 0 ) U 2 ( 1 , 1 , 0 ) and U 3 ( 1 , 0 , 0 ) U 3 ( 1 , 0 , 1 )
-
The action (1,1,0) is a PNE iff:
U 1 ( 1 , 1 , 0 ) U 1 ( 0 , 1 , 0 ) and U 2 ( 1 , 1 , 0 ) U 2 ( 1 , 0 , 0 ) and U 3 ( 1 , 1 , 0 ) U 3 ( 1 , 1 , 1 )
-
The action (1,0,1) is a PNE iff:
U 1 ( 1 , 0 , 1 ) U 1 ( 0 , 0 , 1 ) and U 2 ( 1 , 0 , 1 ) U 2 ( 1 , 1 , 1 ) and U 3 ( 1 , 0 , 1 ) U 3 ( 1 , 0 , 0 )
-
The action (1,1,1) is a PNE iff:
U 1 ( 1 , 1 , 1 ) U 1 ( 0 , 1 , 1 ) and U 2 ( 1 , 1 , 1 ) U 2 ( 1 , 0 , 1 ) and U 3 ( 1 , 1 , 1 ) U 3 ( 1 , 1 , 0 )

References

  1. Sachs, J.; Wikstrom, G.; Dudda, T.; Baldemair, R.; Kittichokechai, K. 5G Radio Network Design for Ultra-Reliable Low-Latency Communication. IEEE Netw. 2018, 32, 24–31. [Google Scholar] [CrossRef]
  2. Aazhang, B.; Ahokangas, P.; Alves, H.; Alouini, M.S.; Beek, J.; Benn, H.; Bennis, M.; Belfiore, J.; Strinati, E.; Chen, F.; et al. Key Drivers and Research Challenges for 6G Ubiquitous Wireless Intelligence (White Paper); 6G Flagship, University of Oulu: Oulu, Finland, 2019. [Google Scholar]
  3. Alsharif, M.H.; Kelechi, A.H.; Albreem, M.A.; Chaudhry, S.A.; Zia, M.S.; Kim, S. Sixth Generation (6G) Wireless Networks: Vision, Research Activities, Challenges and Potential Solutions. Symmetry 2020, 12, 676. [Google Scholar] [CrossRef]
  4. Saad, W.; Bennis, M.; Chen, M. A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research Problems. IEEE Netw. 2020, 34, 134–142. [Google Scholar] [CrossRef] [Green Version]
  5. Dang, S.; Amin, O.; Shihada, B.; Alouini, M.S. What should 6G be? Nat. Electron. 2019, 3, 20–29. [Google Scholar] [CrossRef] [Green Version]
  6. Tariq, F.; Khandaker, M.R.A.; Wong, K.K.; Imran, M.A.; Bennis, M.; Debbah, M. A Speculative Study on 6G. IEEE Wirel. Commun. 2020, 27, 118–125. [Google Scholar] [CrossRef]
  7. Driouech, S.; Sabir, E. Turning Competition Onto Cooperation in D2D Communications: A Quitting Game Perspective. In Proceedings of the 2018 25th International Conference on Telecommunications (ICT), Saint Malo, France, 26–28 June 2018; pp. 505–510. [Google Scholar]
  8. Adnan, M.H.; Ahmad Zukarnain, Z. Device-To-Device Communication in 5G Environment: Issues, Solutions, and Challenges. Symmetry 2020, 12, 1762. [Google Scholar] [CrossRef]
  9. Attaoui, W.; Sabir, E. Combined Beam Alignment and Power Allocation for NOMA-Empowered mmWave Communications; Ubiquitous, Networking; Habachi, O., Meghdadi, V., Sabir, E., Cances, J.P., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 82–95. [Google Scholar]
  10. Do, D.T.; Nguyen, M.S.V.; Lee, B.M. Outage Performance Improvement by Selected User in D2D Transmission and Implementation of Cognitive Radio-Assisted NOMA. Sensors 2019, 19, 4840. [Google Scholar] [CrossRef] [Green Version]
  11. Singh, K.; Wang, K.; Biswas, S.; Ding, Z.; Khan, F.A.; Ratnarajah, T. Resource Optimization in Full Duplex Non-Orthogonal Multiple Access Systems. IEEE Trans. Wirel. Commun. 2019, 18, 4312–4325. [Google Scholar] [CrossRef] [Green Version]
  12. Driouech, S.; Sabir, E.; Ghogho, M.; Amhoud, E.M. D2D Mobile Relaying Meets NOMA –Part II: A Reinforcement Learning Perspective. Sensors 2021, in press. [Google Scholar]
  13. Pradhan, A.; Basu, S.; Sarkar, S.; Mitra, S.; Roy, S.D. Implementation of relay hopper model for reliable communication of IoT devices in LTE environment through D2D link. In Proceedings of the 2018 10th International Conference on Communication Systems & Networks (COMSNETS), Bangalore, India, 3–7 January 2018; pp. 569–572. [Google Scholar]
  14. Yang, H.H.; Lee, J.; Quek, T.Q. Heterogeneous cellular network with energy harvesting-based D2D communication. IEEE Trans. Wirel. Commun. 2015, 15, 1406–1419. [Google Scholar] [CrossRef]
  15. Afzal, A.; Feki, A.; Debbah, M.; Zaidi, S.A.; Ghogho, M.; McLernon, D. Leveraging D2D communication to maximize the spectral efficiency of massive MIMO systems. In Proceedings of the 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Paris, France, 15–19 May 2017; pp. 1–6. [Google Scholar]
  16. Altman, E.; Boulogne, T.; El-Azouzi, R.; Jiménez, T.; Wynter, L. A survey on networking games in telecommunications. Comput. Oper. Res. 2006, 33, 286–311. [Google Scholar] [CrossRef]
  17. Gu, W.; Zhu, Q. Stackelberg Game Based Social-Aware Resource Allocation for NOMA Enhanced D2D Communications. Electronics 2019, 8, 1360. [Google Scholar] [CrossRef] [Green Version]
  18. Driouech, S.; Sabir, E.; Bennis, M.; Elbiaze, H. A Quitting Game Framework for Self-Organized D2D Mobile Relaying in 5G. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, UAE, 9–13 December 2018; pp. 1–7. [Google Scholar]
  19. Huang, J.; Yin, Y.; Zhao, Y.; Duan, Q.; Wang, W.; Yu, S. A game-theoretic resource allocation approach for intercell device-to-device communications in cellular networks. IEEE Trans. Emerg. Top. Comput. 2014, 4, 475–486. [Google Scholar] [CrossRef] [Green Version]
  20. Yang, C.; Li, J.; Semasinghe, P.; Hossain, E.; Perlaza, S.M.; Han, Z. Distributed interference and energy-aware power control for ultra-dense D2D networks: A mean field game. IEEE Trans. Wirel. Commun. 2016, 16, 1205–1217. [Google Scholar] [CrossRef]
  21. Lyu, J.; Chew, Y.H.; Wong, W.C. A stackelberg game model for overlay D2D transmission with heterogeneous rate requirements. IEEE Trans. Veh. Technol. 2015, 65, 8461–8475. [Google Scholar] [CrossRef] [Green Version]
  22. Li, Y.; Jin, D.; Yuan, J.; Han, Z. Coalitional games for resource allocation in the device-to-device uplink underlaying cellular networks. IEEE Trans. Wirel. Commun. 2014, 13, 3965–3977. [Google Scholar] [CrossRef]
  23. Zhang, Y.; Li, F.; Ma, X.; Wang, K.; Liu, X. Cooperative energy-efficient content dissemination using coalition formation game over device-to-device communications. Can. J. Electr. Comput. Eng. 2016, 39, 2–10. [Google Scholar] [CrossRef]
  24. Su, S.T.; Huang, B.Y.; Wang, C.Y.; Yeh, C.W.; Wei, H.Y. Protocol design and game theoretic solutions for device-to-device radio resource allocation. IEEE Trans. Veh. Technol. 2016, 66, 4271–4286. [Google Scholar] [CrossRef]
  25. Baniasadi, M.; Maham, B.; Kebriaei, H. Power control for D2D underlay cellular communication: Game theory approach. In Proceedings of the 2016 8th International Symposium on Telecommunications (IST), Tehran, Iran, 27–28 September 2016; pp. 314–319. [Google Scholar]
  26. Driouech, S.; Sabir, E.; Tembine, H. Self-organized device-to-device communications as a non-cooperative quitting game. In Proceedings of the 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM), Rabat, Morocco, 1–4 November 2017; pp. 1–8. [Google Scholar]
  27. Aliu, O.G.; Imran, A.; Imran, M.A.; Evans, B. A survey of self organisation in future cellular networks. IEEE Commun. Surv. Tutor. 2012, 15, 336–361. [Google Scholar] [CrossRef] [Green Version]
  28. Chandrasekhar, V.; Andrews, J.G.; Muharemovic, T.; Shen, Z.; Gatherer, A. Power control in two-tier femtocell networks. IEEE Trans. Wirel. Commun. 2009, 8, 4316–4328. [Google Scholar] [CrossRef] [Green Version]
  29. Shahid, A.; Aslam, S.; Lee, K.G. A decentralized heuristic approach towards resource allocation in femtocell networks. Entropy 2013, 15, 2524–2547. [Google Scholar] [CrossRef] [Green Version]
  30. Shahid, A.; Kim, K.S.; De Poorter, E.; Moerman, I. Self-organized energy-efficient cross-layer optimization for device to device communication in heterogeneous cellular networks. IEEE Access 2017, 5, 1117–1128. [Google Scholar] [CrossRef]
  31. Abera, T.; Brasser, F.; Gunn, L.J.; Koisser, D.; Sadeghi, A.R. SADAN: Scalable Adversary Detection in Autonomous Networks. arXiv 2019, arXiv:1910.05190. [Google Scholar]
  32. Gui, J.; Deng, J. Multi-hop relay-aided underlay D2D communications for improving cellular coverage quality. IEEE Access 2018, 6, 14318–14338. [Google Scholar] [CrossRef]
  33. Lei, L.; Hao, Q.; Zhong, Z. Mode selection and resource allocation in device-to-device communications with user arrivals and departures. IEEE Access 2016, 4, 5209–5222. [Google Scholar] [CrossRef]
  34. Li, Y.; Song, W.; Su, Z.; Huang, L.; Gao, Z. A distributed mode selection approach based on evolutionary game for device-to-device communications. IEEE Access 2018, 6, 60045–60058. [Google Scholar] [CrossRef]
  35. Algedir, A.A.; Refai, H.H. Energy Efficiency Optimization and Dynamic Mode Selection Algorithms for D2D Communication Under HetNet in Downlink Reuse. IEEE Access 2020, 8, 95251–95265. [Google Scholar] [CrossRef]
  36. Asuhaimi, F.A.; Bu, S.; Nadas, J.P.B.; Imran, M.A. Delay-Aware Energy-Efficient Joint Power Control and Mode Selection in Device-to-Device Communications for FREEDM Systems in Smart Grids. IEEE Access 2019, 7, 87369–87381. [Google Scholar] [CrossRef]
  37. Liu, R.; Yu, G.; Qu, F.; Zhang, Z. Device-to-device communications in unlicensed spectrum: Mode selection and resource allocation. IEEE Access 2016, 4, 4720–4729. [Google Scholar]
  38. Yan, J.; Kuang, Z.; Yang, F.; Deng, X. Mode selection and resource allocation algorithm in energy-harvesting D2D heterogeneous network. IEEE Access 2019, 7, 179929–179941. [Google Scholar] [CrossRef]
  39. Li, J.; Lei, G.; Manogaran, G.; Mastorakis, G.; Mavromoustakis, C.X. D2D communication mode selection and resource optimization algorithm with optimal throughput in 5G network. IEEE Access 2019, 7, 25263–25273. [Google Scholar] [CrossRef]
  40. Li, J.; Feng, R.; Sun, W.; Chen, L.; Xu, X.; Li, Q. Joint mode selection and resource allocation for scalable video multicast in hybrid cellular and D2D network. IEEE Access 2018, 6, 64350–64358. [Google Scholar] [CrossRef]
  41. Islam, S.R.; Avazov, N.; Dobre, O.A.; Kwak, K.S. Power-domain non-orthogonal multiple access (NOMA) in 5G systems: Potentials and challenges. IEEE Commun. Surv. Tutor. 2016, 19, 721–742. [Google Scholar] [CrossRef] [Green Version]
  42. Ding, Z.; Lei, X.; Karagiannidis, G.K.; Schober, R.; Yuan, J.; Bhargava, V.K. A survey on non-orthogonal multiple access for 5G networks: Research challenges and future trends. IEEE J. Sel. Areas Commun. 2017, 35, 2181–2195. [Google Scholar] [CrossRef] [Green Version]
  43. Tabassum, H.; Ali, M.S.; Hossain, E.; Hossain, M.; Kim, D.I. Non-orthogonal multiple access (NOMA) in cellular uplink and downlink: Challenges and enabling techniques. arXiv 2016, arXiv:1608.05783. [Google Scholar]
  44. Brandenburger, A.; Stuart, H. Biform games. Manag. Sci. 2007, 53, 537–549. [Google Scholar] [CrossRef] [Green Version]
  45. Summerfield, N.S.; Dror, M. Biform game: Reflection as a stochastic programming problem. Int. J. Prod. Econ. 2013, 142, 124–129. [Google Scholar] [CrossRef]
Figure 1. Cellular offloading using D2D cooperative relaying.
Figure 1. Cellular offloading using D2D cooperative relaying.
Sensors 21 00702 g001
Figure 2. Network model for three−device case.
Figure 2. Network model for three−device case.
Sensors 21 00702 g002
Figure 3. Strategic Form of the game, representing the payoffs of each device according to their choices.
Figure 3. Strategic Form of the game, representing the payoffs of each device according to their choices.
Sensors 21 00702 g003
Figure 4. Game combination possibilities depending on each device choices.
Figure 4. Game combination possibilities depending on each device choices.
Sensors 21 00702 g004
Figure 5. Throughput of device 1 as function of its beliefs on the relaying probabilities of device 2 ( y 2 ) and device 3 ( y 3 ), both when relaying ( a 1 = 0 ) and not relaying ( a 1 = 1 ).
Figure 5. Throughput of device 1 as function of its beliefs on the relaying probabilities of device 2 ( y 2 ) and device 3 ( y 3 ), both when relaying ( a 1 = 0 ) and not relaying ( a 1 = 1 ).
Sensors 21 00702 g005
Figure 6. Throughput of device 2 as function of its beliefs on the relaying probabilities of device 1 ( y 1 ) and device 3 ( y 3 ), both when relaying ( a 2 = 0 ) and not relaying ( a 2 = 1 ).
Figure 6. Throughput of device 2 as function of its beliefs on the relaying probabilities of device 1 ( y 1 ) and device 3 ( y 3 ), both when relaying ( a 2 = 0 ) and not relaying ( a 2 = 1 ).
Sensors 21 00702 g006
Figure 7. Throughput of device 3 as function of its beliefs on the relaying probabilities of device 1 ( y 1 ) and device 3 ( y 3 ), both when relaying ( a 3 = 0 ) and not relaying ( a 3 = 1 ).
Figure 7. Throughput of device 3 as function of its beliefs on the relaying probabilities of device 1 ( y 1 ) and device 3 ( y 3 ), both when relaying ( a 3 = 0 ) and not relaying ( a 3 = 1 ).
Sensors 21 00702 g007
Table 1. Related works on Device-to-Device (D2D) mode selection vs. our work.
Table 1. Related works on Device-to-Device (D2D) mode selection vs. our work.
RefD2D
Mode
Multiple
Access
Main GoalToolsUEs Access Mode
[32]UnderlayOMAImprove Cellular
Coverage Quality
Optimization mechanism
Greedy algorithm based
on a distributed local
search
- Cellular mode
- Multi-hop D2D
relaying mode
[33]OverlayOMAMinimize the average
energy consumption
of flow transmission
Markov Decision Process- Cellular mode
- D2D mode
[34]UnderlayOMAAchieve high spectrum
efficiency
Evolutionary game model- Cellular mode
- Direct reuse mode
- D2D Relay mode
[35]UnderlayOMAOptimize the network
energy efficiency-
Maximize the number
of connected D2D users
Fuzzy C mean -
clustering algorithm
- Dedicated D2D mode
- D2D reuse mode
[36]UnderlayOMAIncrease the data rate
Improve the energy
efficiency-
Satisfy stringent delay
constraints
Energy Efficiency and
Delay-Optimization
algorithm based
on the brute-force
searching method
- Direct transmission
- D2D-assisted relaying
[37]Outband
Underlay
Listen-before-
talk (LBT)/
Duty-cycle
method
Minimize the mutual
interference - Guarantee
the QoS requirements-
Maximize the overall
throughput
Heuristic algorithms- Licensed reusing mode
- Duty-cycle based
- LBT based unlicensed
modes
[38]UnderlayOMAMaximize the system
throughput
Mode Selection and
Resource Allocation
algorithm based on
Lagrangian dual
decomposition
- Cellular mode
- D2D mode
[39]Underlay
Overlay
OMAOptimize the total
throughput- Reduce
interference
Probabilistic integrated
resource allocation
strategy Quasi-convex
optimization algorithm
- Reusing Mode
- Dedicated Mode
- Cellular Mode
[40]UnderlayOMAMaximize the number
of D2D users - Increase
the system capacity
- Improve the overall
throughput
Greedy algorithm
Heuristic algorithm
- Cellular mode
- Direct D2D mode
Our
work
OverlayNOMA
OMA
Pure and Mixed
Equilibrium in
terms of throughput
and reliability
Game theory
Distributed reinforcement
learning
- Cellular mode
- Relay mode
- D2D mode
Table 2. Main symbols and their meanings.
Table 2. Main symbols and their meanings.
SymbolMeaning
nNumber of devices in the cell
P i Transmission power of device i
d i Distance between device i and the BS
h i Channel gain of device i
γ i SINR of device i
γ i , t h SINR-threshold
P i o u t ( γ i ) Outage probability of device i
1 λ Mean of the channel gain
RTransmission rate
P i o u t , c Outage probability of device i if it communicates through cellular
P i o u t , c d Outage probability of device i if it is a relay
P i o u t , d Outage probability of device i if it communicates through D2D
T h p i c Throughput of device i if it communicates through cellular
T h p i c , d Throughput of device i if it is a relay
T h p i d Throughput of device i if it communicates through D2D
P i , d Transmission power of device i if it communicates through D2D
d i , d Distance between device i and another D2D device
fOrthogonality factor
α c , α d Path-loss exponent in cellular and D2D, respectively
x i Fraction of throughput device i gives to D2D devices
U i ( a i ) Utility of device i that denotes its throughput when choosing the action a i
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Driouech, S.; Sabir, E.; Ghogho, M.; Amhoud, E.-M. D2D Mobile Relaying Meets NOMA—Part I: A Biform Game Analysis. Sensors 2021, 21, 702. https://doi.org/10.3390/s21030702

AMA Style

Driouech S, Sabir E, Ghogho M, Amhoud E-M. D2D Mobile Relaying Meets NOMA—Part I: A Biform Game Analysis. Sensors. 2021; 21(3):702. https://doi.org/10.3390/s21030702

Chicago/Turabian Style

Driouech, Safaa, Essaid Sabir, Mounir Ghogho, and El-Mehdi Amhoud. 2021. "D2D Mobile Relaying Meets NOMA—Part I: A Biform Game Analysis" Sensors 21, no. 3: 702. https://doi.org/10.3390/s21030702

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop