Next Article in Journal
Dynamical System-Based Fuzzy Adaptive Admittance Control for Uncertain Environments
Previous Article in Journal
Distribution Network Fault Location Method Based on Limited Measurement Information
Previous Article in Special Issue
Radio Frequency Resonate and Fire (RF-RAF) Neurons Supporting Device Classification
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Joint Optimization for Uplink/Downlink Intelligent Decoupled Access in Heterogeneous C-V2X Communications

by
Luofang Jiao
1,2,*,
Pin Li
1,2,
Yuhao Yang
1,2,
Linghao Xia
1,2,
Qiang Cheng
1,2,
Ang Liu
1,2,
Jingbei Yang
1,2 and
Xianzhe Xu
1,2
1
Nanjing Research Institute of Electronics Technology, Nanjing 210023, China
2
National Key Laboratory of Radar Detection and Sensing, Nanjing 210023, China
*
Author to whom correspondence should be addressed.
Electronics 2026, 15(10), 2046; https://doi.org/10.3390/electronics15102046
Submission received: 1 April 2026 / Revised: 28 April 2026 / Accepted: 7 May 2026 / Published: 11 May 2026
(This article belongs to the Special Issue Advances in 5G and Beyond Mobile Communication)

Abstract

The uplink/downlink (UL/DL) decoupled access, which allows users to associate with different base stations (BSs), including small BSs (SBSs) and macro BSs (MBSs), has emerged as a network architecture in heterogeneous cellular vehicle-to-everything (C-V2X) communications. It can be tailored to mitigate the signal interference and attenuation impairments that cell-edge vehicles face, while vehicles closer to a BS can opt for coupled access. Therefore, a UL/DL intelligent decoupled access network that integrates decoupled and coupled access approaches is urgently needed for C-V2X communications. In this paper, we present a novel framework for UL/DL intelligent decoupled access in C-V2X networks in the context of fifth-generation mobile communications (5G) and beyond 5G (B5G). We propose a joint optimization approach for radio resource allocation, power control, and user association to enhance the network throughput of UL and DL while meeting the service quality requirements of vehicle users. Specifically, we formulate the problem as a mixed-integer nonlinear programming (MINLP) problem and transform it into a standard convex optimization problem by introducing various auxiliary variables. An efficient iterative algorithm based on successive convex optimization techniques is introduced to obtain a sub-optimal solution. The proposed framework uniquely integrates decoupled and coupled access modes within a unified optimization formulation, enabling dynamic mode selection based on network load. Extensive simulation results demonstrate a significant performance improvement of the proposed UL/DL intelligent decoupled access in C-V2X networks compared with benchmark schemes.

1. Introduction

With the rapid development of cellular vehicle-to-everything (C-V2X) technology in the fifth-generation mobile communication networks (5G) and beyond 5G (B5G), its potential to enhance road safety [1], improve transportation efficiency through intelligent scheduling [2], and enrich in-vehicle information services via dynamic resource management [3] is being progressively harnessed. With an increase in vehicle density, C-V2X networks face a series of challenges in achieving efficient spectrum reuse through centralized resource allocation [4], reliability of ultra-high-reliability connections [5], accommodation of heterogeneity in network deployment [6], and adaptability to diverse quality-of-service (QoS) requirements [7]. Particularly, vehicles at the edge of a cell face more signal interference and attenuation than those closer to the base station (BS), further exacerbating the asymmetry of uplink (UL) and downlink (DL) connections [8]. Thus, the UL/DL decoupled access approach, as an innovative network solution, allows user devices to connect to different BSs and different types of BSs, such as small BS (SBS) and macro BS (MBS) in the UL and DL, thereby addressing the aforementioned challenges [9,10], especially for C-V2X communications [1,11].
The UL/DL decoupled access can effectively enhance signal quality and communication stability in the cell-edge areas by allowing vehicles to independently select the best BSs for UL and DL [12,13,14]. Vehicle users in the core area of a cell, who are closer to the BS, can opt for the coupled access method [15,16]. Therefore, UL/DL decoupled access can be an effective complement to traditional UL/DL coupled access. To enhance network performance, by integrating UL/DL decoupled access and coupled access, the C-V2X can allocate resources and associate users based on real-time network conditions and user demands. The hybrid network is referred to as the UL/DL intelligent decoupled access C-V2X network.
The main advantage of the intelligent decoupled access network avoids the limitation of traditional coupled technology that UL must be associated with the same BS in DL [17]. Instead, the network dynamically selects the most appropriate BSs for both UL and DL, taking into account the user’s real-time location, service requirements, and prevailing network conditions. Subsequently, the user’s access mode is ascertained based on the specific BSs with which they have established a connection. This user-centric network design not only can significantly improve the communication quality for users at the edge of a cell, but also can fully exploit the overall performance of C-V2X, achieving efficient resource utilization and satisfactory service quality.
In this paper, we explore the potential of UL/DL intelligent decoupled access to address the challenges associated with C-V2X We propose an effective resource allocation and user association strategy to enhance the overall network performance while meeting the QoS requirements of vehicle users both in DL and UL. The key contributions of this work are summarized below:
  • We present a novel UL/DL intelligent decoupled access framework for C-V2X in the 5G/B5G era. This framework provides a foundation for potential performance improvement of UL/DL intelligent decoupled access in C-V2X. The framework uniquely supports dynamic switching between decoupled and coupled access modes, enabling vehicles to adaptively select the optimal access strategy based on their location and network conditions.
  • We aim to maximize system throughput by jointly optimizing the association matrices, transmission power, and radio spectrum allocation between vehicles and BSs for UL and DL. Thus, we formulate the maximum throughput of all vehicles as a mixed-integer nonlinear programming problem (MINLP), which is non-convex and difficult to solve. By introducing auxiliary variables, we transform the MINLP into a standard convex optimization problem. This joint formulation captures the inherent coupling between user association, power control, and bandwidth allocation across both UL and DL.
  • We propose an efficient iterative algorithm for a sub-optimal solution by employing successive convex optimization techniques. Extensive simulations are conducted to demonstrate the effectiveness of the successive convex approximation (SCA) iterative algorithm. Simulation results demonstrate that the proposed framework achieves substantial throughput gains in both UL and DL compared with coupled access and distance-based association benchmarks.
The subsequent sections of this paper are structured as follows. We briefly introduce the existing research works related to UL/DL decoupled access and intelligent decoupled access in Section 2. In Section 3, we propose the UL/DL intelligent decoupled access framework for C-V2X. Section 4 and Section 5 presents an iteration optimization method to maximize the system throughput for both UL and DL. As a comparison, the coupled access optimization problem is formulated in Section 6. The SCA-based optimization iterative algorithm is provided in Section 7. In Section 8, simulation results are presented to evaluate the performance of the proposed UL/DL intelligent decoupled access C-V2X framework. Section 9 presents the concluding remarks of this study.

2. Related Work

The UL/DL decoupled access has emerged as a promising network solution for enabling C-V2X in intelligent transportation systems (ITSs) [18]. Yu et al. first introduced the UL/DL decoupled access into C-V2X and investigated the feasibility of C-V2X [19]. Jiao et al. modeled the C-V2X as a Cox process and analyzed the performance of UL/DL decoupled access in C-V2X [1].
For resource optimization of UL/DL decoupled access in C-V2X, Liu et al. proposed a streamlined algorithm to enhance energy efficiency in the context of 5G/B5G vehicular networks [20]. Yu et al. introduced a two-tier radio access network (RAN) slicing strategy to dynamically distribute radio resources for V2X services [21]. Jiang et al. considered DL/UL decouple access and proposed a resource allocation algorithm in a two-tier heterogeneous network to improve the total system throughput in the UL [22]. Beyond vehicular networks, joint optimization of clustering, transmission, and trajectory has also been studied for UAV-assisted wireless powered communication networks to minimize age-of-information [23], demonstrating the broad applicability of joint resource optimization in heterogeneous wireless systems.
Despite potential advantages of UL/DL decoupled access, users in close proximity to the BS typically benefit from a strong signal from the BS, making coupled access a prevalent choice for these users [24]. As a result, the application of UL/DL decoupled access should be tailored to the peripheral regions of the cell, where the benefits of UL/DL decoupled access can be effectively realized [12]. Thus, a UL/DL intelligent decoupled access framework that integrates both decoupled and coupled access should be studied for C-V2X. In cellular networks, preliminary research on hybrid decoupled and coupled access networks has been conducted. Sekander et al. developed a comprehensive framework to analyze the usefulness of UL/DL decouple access in a full-duplex multi-tier cellular network [15]. Different from most existing studies, in this paper, we focus on the framework analysis and resource allocation of UL/DL intelligent decoupled access in C-V2X, for applications such as real-time vehicular communication, traffic management, and road safety in ITS [25].

3. System Model and Problem Formulation

In this section, we first introduce the system model for UL/DL intelligent decoupled access C-V2X. Then, we present the channel and interference models. Finally, a MINLP is formulated to maximize the throughputs of UL and DL for all vehicle users.

3.1. UL/DL Intelligent Decoupled Access

As depicted in Figure 1, we consider a scenario of UL/DL intelligent decoupled access, where vehicles have the freedom to choose BSs for their UL and DL transmissions, which can be either the same or different. When the selected BSs for UL and DL are not identical, it is referred to as UL/DL decoupled access; otherwise, it is coupled access. A central controller collects the information of the entire network, including signal-to-noise-and-interference ratio (SINR) and transmit power [15]. This centralized coordination assumption is consistent with the C-RAN and NFV-enabled 5G/B5G network architecture, and has been widely adopted in the UL/DL decoupled access literature [15,19,20]. In this heterogeneous network, two types of BSs are deployed along the road, i.e., MBSs with higher transmit power located farther away from the road, and SBSs with lower transmit power situated closer to the road [1]. Here, B = { 1 , , B } and 𝒱 = { 1 , 2 , , V } denote the index sets of BSs and vehicles, respectively. The MBS set is denoted as M = { 1 , , M } and the SBS set is denoted as S = { 1 , , S } . Thus, B = M S and B = M + S . The radio spectrum bandwidth of BS b allocates to the vehicle v in DL and UL is denoted by W v , b d and W v , b u , respectively. Each BS can serve only a limited number of vehicles [15], with the maximum number for MBS/SBS in DL/UL given by
q b d = q m d , b M q s d , b S , q b u = q m u , b M q s u , b S .
The UL/DL decoupled access allows a vehicle to access different BSs in UL and DL, with the two BSs not being the same, while coupled access requires that the UL and DL must use the same BS [26]. Thus, there are six access cases:
  • Coupled Case 1: U = D = MBS   i
  • Coupled Case 2: U = D = SBS j
  • Decoupled Case 3: U = MBS i, D = MBS j, ( i j )
  • Decoupled Case 4: U = SBS i, D = MBS j
  • Decoupled Case 5: U = MBS i, D = SBS j
  • Decoupled Case 6: U = SBS i, D = SBS j, ( i j ),
where U and D denote the connected BS in UL and DL, respectively.

3.2. Channel Propagation and Interference Models

When a vehicle connects to BS b, the BS is activated with transmit power P v , b d in DL, while the UL transmit power between BS b and vehicle v is denoted by P v , b u . The maximum transmit power of MBS, SBS, and vehicle is denoted by P m a x m , P m a x s , and  P m a x v , respectively.
The channel gain between BS b and vehicle v, G v , b d for DL is modeled as G v , b d = g v , b d l v , b d , and G v , b u for UL is modeled as G v , b u = g v , b u l v , b u . Here, g v , b ( · ) denotes the composite channel power gain between BS b and vehicle v due to Rayleigh fading γ v , b ( · ) and log-normal shadowing χ v , b ( · ) under consideration [27], where the fading component follows an exponential distribution with a mean of 1 / μ , γ e x p ( 1 / μ ) [28]. The shadowing component follows a log-normal distribution, given by 10 log 10 χ d ω d , δ d 2 , where ω d represents the mean of χ d in dB and δ d represents the standard deviation of χ d in dB [27]. The path loss, l v , b ( · ) with ( · ) = { d , u } , between BS b and vehicle v, is a function of BS-vehicle distance [29]. We consider an Urban Macro (UMa) scenario path model, with details given on Page 28 of [29] and omitted here.
The received power is P r e c d ( v ) = x v , b d P v , b d G v , b d in the DL and P r e c u ( b ) = x v , b u P v , b u G v , b u in the UL, where x v , b d { 0 , 1 } is a binary decision variable given by
x v , b d = 1 , if vehicle   v   is associated to BS   b   B   in DL 0 , otherwise ,
x v , b u = 1 , if vehicle   v   is associated to BS   b   B   in UL 0 , otherwise .
Under the assumption that a vehicle can access only a BS in UL or DL, we have b = 1 B x v , b ( · ) = 1 ,   ( · ) = { d , u } .
Different frequency bands are used for the UL and DL, respectively [18]. In the DL, the aggregate interference, I d , at a typical vehicle is composed of the interference from the MBSs and SBSs. In the UL, assuming directional antennas at vehicles, interference experienced by a BS is from nearby vehicles [1]. Thus, when vehicle v is associated with MBS or SBS in the DL, the SINR is
S I N R d = x v , b d P v , b d G v , b d I d + σ d 2 ,
where σ d 2 is the received noise power and I d is given by
I d = b = 1 B 1 x v , b d P v , b d G v , b d .
The SINR of UL is
S I N R u = x v , b u P v , b u G v , b u I u + σ u 2 ,
where σ u 2 is the received noise power, interference I u is
I u = v = 1 V P v , b u G v , b u x v , b u P v , b u G v , b u .
In DL, each vehicle can connect to only one BS, so the interference to the BS can be directly represented by 1 x v , b d P v , b d G v , b d . However, in UL, one BS can serve multiple vehicles. Therefore, when determining UL interference, the binary decision variable matrix may have multiple 1s in a column. The UL interference should be determined as in Equation (4).

3.3. Data Transmission Rate

According to the Shannon–Hartley theorem [30], the rate for vehicle v in DL and UL is given by the following:
τ v , b d = W v , b d log 2 1 + S I N R d ,
τ v , b u = W v , b u log 2 1 + S I N R u .

3.4. Problem Formulation

The objective is to maximize the cumulative throughput of all vehicles in both UL and DL. The optimization problem is formulated as follows:
max W v , b ( · ) , P v , b ( · ) , x v , b ( · ) b = 1 B v = 1 V ( τ v , b d + τ v , b u )
s . t . τ v , b ( · ) > τ m i n ( · ) ,   b B , v 𝒱
v = 1 V W v , b ( · ) W b , t ( · ) ,   b B , v 𝒱
0 W v , b ( · ) W b , m a x ( · ) ,   b B , v 𝒱
b = 1 B x v , b ( · ) = 1 ,   v 𝒱
v = 1 V x v , b ( · ) q b ( · ) ,   b B , v 𝒱
x v , b ( · ) { 0 , 1 } ,   b B , v 𝒱
0 P v , b ( · ) P c , m a x ( · ) ,   b B , v 𝒱
v = 1 V P v , b ( · ) P c , t ( · ) ,   b B , v 𝒱 .
In problem (7), ( · ) = { d , u } , c B in DL and c 𝒱 in UL, W b , t ( · ) is the total radio spectrum bandwidth in DL and UL, P c , t ( · ) is the total transmit power of BS in DL and vehicle in UL. Constraint (8) ensures QoS satisfaction for both DL and UL communication of each vehicle, respectively. In constraints (11) and (15), to avoid extreme cases where most of the bandwidth and power are allocated to a single vehicle during the multi-vehicle and multi-BS optimization process, we have set a maximum bandwidth limit W b , m a x ( · ) and maximum transmit power P c , m a x ( · ) allocated for each vehicle from each BS in DL and from each vehicle in UL. This ensures a balanced bandwidth and power distribution, to align with real-world scenarios. Constraint (11) indicates that each vehicle can access only one BS both in UL and DL, and constraint (12) ensures that the number of vehicles accessing the BS does not exceed the maximum.
Problem (7) is a MINLP problem [31,32], and it is challenging to find an optimal solution in general. In the following, we aim to obtain an efficient sub-optimal solution.
In an intelligent UL/DL decoupled access network, there are no restrictions on the allocation of UL and DL connections to the same BS. Furthermore, as the frequency bands used for UL and DL are different, the problem can be simplified to separately optimize the throughput of the UL and DL. The optimization problem is transformed to
max W v , b d , P v , b d , x v , b d b = 1 B v = 1 V τ v , b d s . t . ( 8 ) ( 15 ) ,
for the DL with ( · ) = d , c B and
max W v , b u , P v , b u , x v , b u b = 1 B v = 1 V τ v , b u s . t . ( 8 ) ( 15 ) ,
for the UL with ( · ) = u , c 𝒱 .

4. DL Joint Optimization

Problem (16) and its constraints do not fit the standard convex optimization problem form; convex optimization (CVX) tools are inapplicable. We use some mathematical methods for a sub-optimal solution. Specifically, we first introduce a penalty term to relax the discrete BS-vehicle association binary variables into continuous variables. Then, by introducing an alternative variable, the objective function is transformed into a problem of maximizing the lower bound. Subsequently, through some mathematical transformations, the radio resource constraints are converted into standard concave constraints.

4.1. Association Variable and Objective Function Optimization for DL

Due to the discrete nature of association variable x v , b d , we first relax x v , b d to a continuous variable in the range of 0 to 1; thus, 0 x v , b d 1 [31]. At the same time, to maintain the binary nature of the association variables, we introduce a penalty, x v , b d ( 1 x v , b d ) . Thus, τ v , b d is rewritten as
τ v , b d + λ d x v , b d ( 1 x v , b d ) ,
where λ d is a hyperparameter. Although the penalty term is a concave function, the penalty term is a univariate quadratic function, with its maximum point at 0.5. In order to guide x v , b d towards convergence to 0 or 1, we perform a first-order Taylor expansion on it as follows [33]:
x v , b d , o ( 1 x v , b d , o ) + ( x v , b d x v , b d , o ) ( 1 2 x v , b d , o ) ,
where x v , b d , o is the expansion point.
Since the function in Equation (5) for rate τ v , b d is not concave, it cannot be optimized using convex optimization tools. To maximize an objective function, we can find its maximum value approximately by maximizing its lower bound [34]. Thus, we introduce an auxiliary variable, Υ v , b d , such that log 2 1 + S I N R d > Υ v , b d . Therefore, τ v , b d is relaxed to W v , b d Υ v , b d .
In convex optimization, maximizing an objective function requires that the function itself be concave [35]. To meet this requirement, we perform the following mathematical transformation. Using mathematical identity 4 x y = ( x + y ) 2 ( x y ) 2 , W v , b d Υ v , b d can be equivalently expressed as 1 4 ( W v , b d + Υ v , b d ) 2 ( W v , b d Υ v , b d ) 2 . As the function is still not concave, we proceed to linearize it using a first-order Taylor expansion:
W v , b d Υ v , b d 1 4 ( W v , b d , o + Υ v , b d , o ) 2 + 2 ( W v , b d W v , b d , o ) ( W v , b d , o + Υ v , b d , o ) + ( Υ v , b d Υ v , b d , o ) ( W v , b d , o + Υ v , b d , o ) ( W v , b d Υ v , b d ) 2 ,
where W v , b d , o and Υ v , b d , o are the expansion points. Thus, W v , b d Υ v , b d is transformed into a concave function. Due to the overly complex form of Equation (20), for ease of expression, we denote it as J v , b d .
Thus, τ v , b d in Equation (16) is rewritten as
R v , b d = J v , b d + λ d x v , b d , o ( 1 x v , b d , o ) + ( x v , b d x v , b d , o ) ( 1 2 x v , b d , o ) .

4.2. Radio Resource Allocation for DL

After executing the above mathematical transformation in Section 4.1, constraint (8) is transformed into the following two constraints:
J v , b d > τ m i n d ,   b B , v 𝒱 ,
log 2 1 + S I N R d > Υ v , b d , b B , v 𝒱 ,
where constraint (22) is concave, while constraint (23) is not. To handle constraint (23), which involves power P v , b d and continuous variable x v , b d , we transform it to the following relaxed form:
1 ln 2 ln b = 1 B P v , b d G v , b d + σ d 2 ln b = 1 B F v , b d , o G v , b d + σ d 2 b = 1 B F v , b d F v , b d , o G v , b d b = 1 B F v , b d , o G v , b d + σ d 2 > Υ v , b d , b B , v 𝒱 ,
where F v , b d is an alternative variable, and  F v , b d 1 x v , b d P v , b d , F v , b d , o is the first-order Taylor expansion point. Constraint (24) is a concave constraint with respect to P v , b d and F v , b d . The detailed derivation of Equation (24) is given as follows:
Proof. 
We first expand the S I N R d term and perform the following operation.
log 2 1 + x v , b d P v , b d G v , b d I d + σ d 2 = log 2 I d + x v , b d P v , b d G v , b d + σ d 2 I d + σ d 2 = ( a ) l o g 2 b = 1 B P v , b d G v , b d + σ d 2 b = 1 B 1 x v , b d P v , b d G v , b d + σ d 2 = log 2 b = 1 B P v , b d G v , b d + σ d 2 log 2 b = 1 B 1 x v , b d P v , b d G v , b d + σ d 2 ,
where I d = b = 1 B 1 x v , b d P v , b d G v , b d in (a).
The convexity of (25) is uncertain. To address this, we introduce alternative variables, such that F v , b d 1 x v , b d P v , b d . By substituting F v , b d into (25), the (25) is directly converted to the difference of two concave functions with regard to P v , b d and F v , b d and the DC programming method can be used [36]. We perform the first-order Taylor expansion on the DC form in (25) and obtain its lower bound as
log 2 b = 1 B P v , b d G v , b d + σ d 2 log 2 b = 1 B 1 x v , b d P v , b d G v , b d + σ d 2 = ( a ) 1 ln 2 ln b = 1 B P v , b d G v , b d + σ d 2 ln b = 1 B F v , b d G v , b d + σ d 2 = b 1 ln 2 ln b = 1 B P v , b d G v , b d + σ d 2 ln b = 1 B F v , b d , o G v , b d + σ d 2 b = 1 B F v , b d F v , b d , o G v , b d b = 1 B F v , b d , o G v , b d + σ d 2 .
In (a), the first half is in the form of ln ( x ) , which is concave. For the second half, we perform a first-order Taylor expansion around the point F v , b d , o to obtain a lower bound in (b).
   □
Note that the introduced variable F v , b d has
F v , b d 1 x v , b d P v , b d , b B , v 𝒱 ,
which is not concave; we can approximately linearize it using a first-order Taylor expansion as in Equation (20), and obtain
P v , b d 1 4 2 x v , b d x v , b d , o + P v , b d P v , b d , o x v , b d , o + P v , b d , o + ( x v , b d , o + P v , b d , o ) 2 ( x v , b d P v , b d ) 2 F v , b d , b B , v 𝒱 .
Through the mathematical processing above, constraint (27) has been transformed into a concave constraint, allowing for further calculations using SCA.
By substituting the obtained upper or lower bounds derived above into problem (16), we can obtain a convex optimization problem for the t-th iteration as follows:
max T d b = 1 B v = 1 V R v , b d s . t . ( 9 ) ( 15 ) , ( · ) = d , c B ( 22 ) , ( 24 )   and   ( 28 )
W v , b d / W b , m a x d x v , b d , b B , v 𝒱
P v , b d / P b , m a x d x v , b d , b B , v 𝒱 ,
where matrix T d = { W v , b d , P v , b d , x v , b d , F v , b d , Υ v , b d } is the set of optimization variables. The complete expression of problem (29) is at the top of the next page. Specifically, the convex optimization problem for the ( t + 1 ) -th iteration is as shown in Equations (29)–(31). Constraints (30) and (31) ensure that radio spectral bandwidth and power are allocated as much as possible to the connected vehicles, thereby enhancing the optimization effect.
Proof. 
The detailed expressions of problem (29) are at the top of the next page.
max W v , b d , P v , b d , x v , b d , F v , b d , Υ v , b d b = 1 B v = 1 V 1 4 [ ( W v , b d , o + Υ v , b d , o ) 2 + 2 ( W v , b d W v , b d , o ) ( W v , b d , o + Υ v , b d , o ) + ( Υ v , b d Υ v , b d , o ) ( W v , b d , o + Υ v , b d , o ) ( W v , b d Υ v , b d ) 2 ] + λ d x v , b d , o ( 1 x v , b d , o ) + ( x v , b d x v , b d , o ) ( 1 2 x v , b d , o )
s . t . ( 9 ) ( 15 ) , ( · ) = d , c B 1 4 [ ( W v , b d , o + Υ v , b d , o ) 2 + 2 ( W v , b d W v , b d , o ) ( W v , b d , o + Υ v , b d , o ) + ( Υ v , b d Υ v , b d , o ) ( W v , b d , o + Υ v , b d , o ) ( W v , b d Υ v , b d ) 2 ] > τ m i n d , b B , v 𝒱
1 ln 2 ln b = 1 B P v , b d G v , b d + σ d 2 ln b = 1 B F v , b d , o G v , b d + σ d 2 b = 1 B F v , b d F v , b d , o G v , b d b = 1 B F v , b d , o G v , b d + σ d 2 > Υ v , b d , b B , v 𝒱 ,
F v , b d P v , b d 1 4 2 x v , b d x v , b d , o + P v , b d P v , b d , o x v , b d , o + P v , b d , o +                 ( x v , b d , o + P v , b d , o ) 2 ( x v , b d P v , b d ) 2 , b B , v 𝒱 ,
W v , b d / W b , m a x d x v , b d , b B , v 𝒱 ,
P v , b d / P b , m a x d x v , b d , b B , v 𝒱 .
   □

5. UL Joint Optimization

The UL throughput maximization problem has been formulated in problem (17). In this section, we aim to maximize the throughput of UL by following a similar method as described in Section 4.

5.1. Association Variable and Objective Function Optimization for UL

Following the similar steps of Section 4.1, τ v , b u in Equation (17) is rewritten as
R v , b u = J v , b u + λ u x v , b u , o ( 1 x v , b u , o ) + ( x v , b u x v , b u , o ) ( 1 2 x v , b u , o ) ,
where λ u is a hyperparameter, J v , b u is the UL formula expression symbol corresponding to J v , b d in DL, and x v , b u , o is the first-order Taylor expansion point.

5.2. Wireless Resource Allocation Optimization for UL

After executing the above mathematical transformation in Section 5.1, constraint (8) in UL is transformed into the following two constraints:
J v , b u τ m i n u ,   b B , v 𝒱 ,
log 2 1 + S I N R u > Υ v , b u , b B , v 𝒱 ,
where the constraint (40) is a non-concave constraint; we first expand it and then perform the following mathematical transformation:
log 2 1 + x v , b u P v , b u G v , b u I u + σ u 2 = log 2 I u + x v , b u P v , b u G v , b u + σ u 2 I u + σ u 2 = ( a ) log 2 v = 1 V P v , b u G v , b u + σ u 2 log 2 1 = 1 V P v , b u G v , b u x v , b u P v , b u G v , b u + σ u 2 ,
where I u = 1 = 1 V P v , b u G v , b u x v , b u P v , b u G v , b u . In (a), the  first part is a concave function, while the second part is of indeterminate concavity or convexity due to the two variables P v , b u , x v , b u . Therefore, we introduce an auxiliary variable F v , b u 1 = 1 V P v , b u G v , b u x v , b u P v , b u G v , b u . Constraint (41) is transformed to a concave function as follows:
1 ln 2 ln v = 1 V P v , b u G v , b u + σ u 2 ln v = 1 V F v , b u , o G v , b u + σ u 2 v = 1 V F v , b u F v , b u , o G v , b u v = 1 V F v , b u , o G v , b u + σ u 2 ,
The detailed derivation of Equation (42) is shown as follows:
Proof. 
The detailed derivation of (42) is formulated as
log 2 v = 1 V P v , b u G v , b u + σ u 2 l o g 2 1 = 1 V P v , b u G v , b u x v , b u P v , b u G v , b u + σ u 2 = 1 ln 2 ln v = 1 V P v , b u G v , b u + σ u 2 ln v = 1 V F v , b u G v , b u + σ u 2 = a 1 ln 2 ln v = 1 V P v , b u G v , b u + σ u 2 ln v = 1 V F v , b u , o G v , b u + σ u 2 v = 1 V F v , b u F v , b u , o G v , b u v = 1 V F v , b u , o G v , b u + σ u 2 ,
where F v , b u 1 = 1 V P v , b u G v , b u x v , b u P v , b u G v , b u , (a) is Taylor expanded at point F v , b u , o , transforming the function into an affine function.    □
Constraint (40) turns into a concave constraint as follows:
1 ln 2 ln v = 1 V P v , b u G v , b u + σ u 2 ln v = 1 V F v , b u , o G v , b u + σ u 2 v = 1 V F v , b u F v , b u , o G v , b u v = 1 V F v , b u , o G v , b u + σ u 2 > Υ v , b u , b B , v 𝒱 .
Since constraint (44) is taking the lower bound of log 2 1 + S I N R u , an additional constraint needs to be added for the auxiliary variable F v , b u to require
F v , b u 1 = 1 V P v , b u G v , b u x v , b u P v , b u G v , b u , b B , v 𝒱 .
The introduced constraint (45) is not a standard convex constraint. Therefore, we introduce auxiliary variable A v , b u ( x v , b u P v , b u G v , b u ) and constraint (45) is rewritten as
F v , b u 1 = 1 V P v , b u G v , b u + A v , b u , b B , v 𝒱 ,
where constraint (46) is a affine constraint and can be solved by the CVX tool. We perform the first-order Taylor expansion on ( x v , b u P v , b u G v , b u ) and obtain its upper bound as
A v , b u 1 4 G v , b u x v , b u P v , b u 2 x v , b u , o + P v , b u , o 2       2 x v , b u x v , b u , o + P v , b u P v , b u , o x v , b u , o + P v , b u , o x v , b u P v , b u G v , b u .
Thus, constraint (48) is added as follows to constrain the auxiliary variable A v , b u .
A v , b u 1 4 G v , b u x v , b u P v , b u 2 x v , b u , o + P v , b u , o 2       2 x v , b u x v , b u , o + P v , b u P v , b u , o x v , b u , o + P v , b u , o ,         b B , v 𝒱 .
By substituting these bounds into the related terms of problem (17), the optimization problem can be rewritten as in problem (49).
max T u b = 1 B v = 1 V R v , b u
s . t . ( 9 ) ( 15 ) , ( · ) = u , c 𝒱 ( 39 ) , ( 44 ) , ( 46 )   a n d   ( 48 ) W v , b u / W b , m a x u < = x v , b u , b B , v 𝒱 P v , b u / P b , m a x u < = x v , b u , b B , v 𝒱 .
In problem (49), T u = { W v , b u , P v , b u , x v , b u , F v , b u , A v , b u , Υ v , b u } is the set of variables. The complete expressions of problem (49) are at the top of the next page. Constraint (50) ensures that vehicles only transmit power to the connected BS in UL, thereby reducing UL interference among vehicles. Both problems (29) and (49) are standard convex optimization problems and can be solved by the CVX toolbox.
Proof. 
The detailed expressions of problem (49) are at the top of the next page.
max W v , b u , P v , b u , x v , b u , F v , b u , A v , b u , Υ v , b u b = 1 B v = 1 V 1 4 [ ( W v , b u , o + Υ v , b u , o ) 2 + 2 ( W v , b u W v , b u , o ) ( W v , b u , o + Υ v , b u , o ) + ( Υ v , b u Υ v , b u , o ) ( W v , b u , o + Υ v , b u , o ) ( W v , b u Υ v , b u ) 2 ] + λ u x v , b u , o ( 1 x v , b u , o ) + ( x v , b u x v , b u , o ) ( 1 2 x v , b u , o )
s . t . ( 9 ) ( 15 ) , ( · ) = u , c 𝒱 1 4 [ ( W v , b u , o + Υ v , b u , o ) 2 + 2 ( W v , b u W v , b u , o ) ( W v , b u , o + Υ v , b u , o ) + ( Υ v , b u Υ v , b u , o ) ( W v , b u , o + Υ v , b u , o ) ( W v , b u Υ v , b u ) 2 ] > τ m i n u , b B , v 𝒱
1 ln 2 ln u = 1 V P v , b u G v , b u + σ u 2 ln v = 1 V F v , b u , o G v , b u + σ u 2 v = 1 V F v , b u F v , b u , o G v , b u v = 1 V F v , b u , o G v , b u + σ u 2 > Υ v , b u , b B , v 𝒱 ,
F v , b u 1 = 1 V P v , b u G v , b u + A v , b u , b B , v 𝒱 ,
A v , b u 1 4 G v , b u x v , b u P v , b u 2 x v , b u , o + P v , b u , o 2 2 x v , b u x v , b u , o + P v , b u P v , b u , o x v , b u , o + P v , b u , o , b B , v 𝒱 .
W v , b u / W b , m a x u x v , b u , b B , v 𝒱 .
P v , b u / P b , m a x u x v , b u , b B , v 𝒱 .
   □

6. Coupled Access Optimization

For the coupled access optimization problem, unlike intelligent decoupled access, which imposes no restrictions on the UL and DL access BSs, coupled access requires that the UL and DL BSs must be the same one. Therefore, the optimization problem for coupled access is as follows:
c c l max T c u , T c d b = 1 B v = 1 V J v , b d + J v , b u + λ c x v , b u , o ( 1 x v , b u , o ) + ( x v , b u x v , b u , o ) ( 1 2 x v , b u , o )
s . t . ( 9 ) ( 15 ) , ( · ) = d , c B , ( 9 ) ( 15 ) , ( · ) = u , c 𝒱 , ( 33 ) ( 36 ) , ( 52 ) ( 56 ) ,
x v , b u = x v , b d ,
where T c u and T c d are the variable sets, and  T c u = { W v , b u , P v , b u , x v , b u , F v , b u , A v , b u , Υ v , b u } , T c d = { W v , b d , P v , b d , x v , b d , F v , b d , Υ v , b d } . In Equations (10)–(15), ( · ) = d , c B and (33)–(36) are DL constraints. In Equations (10)–(15), ( · ) = u , c 𝒱 and (52)–(56) are UL constraints. Constraint (59) ensures that the BS accessed for UL and DL is the same BS. Therefore, the penalty term involving x v , b ( · ) can represent both x v , b u and x v , b d . Here, we choose to use x v , b u .
After the mathematical transformations in the previous two sections, problem (58) is a standard convex optimization problem and can be solved by using the CVX toolbox, as in Algorithm 1 in the following section. The detailed steps are omitted here.
Algorithm 1: SCA for maximizing system throughput
Electronics 15 02046 i001

7. Optimization Algorithm for Maximizing System Throughput

Based on the mathematical transformations in Section 4 and Section 5, we convert the non-standard convex optimization problems of UL and DL into standard convex optimization problems. Using the CVX toolbox, we propose Algorithm 1 to solve the optimization variables in problems (29) and (49). Firstly, we obtain the channel information for UL and DL, with initial values T o d = { W v , b d , o , P v , b d , o , x v , b d , o , F v , b d , o , Υ v , b d , o } , T o u = { W v , b u , o , P v , b u , o , x v , b u , o , F v , b u , o , A v , b u , o , Υ v , b u , o } that satisfy all constraints. Then, we use the CVX toolbox to solve problems (29) and (49) and obtain the optimal values T d = { W v , b d , P v , b d , x v , b d , F v , b d , Υ v , b d } , T u = { W v , b u , P v , b u , x v , b u , F v , b u , A v , b u , Υ v , b u } for the current iteration. Subsequently, we assign optimal values T d , T u to the initial values T o d , T o u and continue the iterative optimization process. This process continues until the difference between the maximum values of the objective function before and after optimization in two consecutive iterations is less than a predefined threshold. When this condition is met or the maximum number of iterations is reached, we consider the problem solved and terminate the solution process.
The computational complexity of Algorithm 1 is analyzed as follows. At each iteration, the DL and UL convex subproblems are solved using an interior-point method. Each subproblem involves O ( V B ) optimization variables, and the interior-point method has a per-iteration complexity of O ( ( V B ) 3.5 ) . Therefore, the total complexity of Algorithm 1 is O ( N i t e r · ( V B ) 3.5 ) , where N i t e r is the number of SCA iterations. As shown in Figure 3, the algorithm converges within 4∼5 iterations in practice, demonstrating its computational efficiency.
To determine the vehicle access mode, we propose Algorithm 2. By comparing the types and identifiers of BSs accessed by each vehicle in UL and DL, the BS access mode is determined, thereby achieving a intelligent decoupled BS access selection strategy.
Algorithm 2: Access Mode Classification for Intelligent Decoupled Access
Electronics 15 02046 i002

8. Simulation Results

In this section, we consider a scenario of UL/DL intelligent decoupled access heterogeneous C-V2X with 1200 m two bidirectional single lanes, where two MBSs and four SBSs are evenly deployed along the road with distances of 30 m and 10 m from the road center, respectively, as in Figure 2. Other system parameters are listed in Table 1 [29].
To demonstrate the performance of Algorithm 1, we have chosen to present the iterative results in DL as an example for illustration, as shown in Figure 3. In Figure 3, we depict the convergence process for various numbers of vehicles, with each iteration process repeated 10 times to ensure the reliability of the results. It can be observed that Algorithm 1 requires only 4∼5 iterations to convergence. Moreover, the number of vehicles has a negligible impact on the iteration speed.
Figure 4 presents the cumulative distribution function (CDF) of the DL/UL rates. In Figure 4, we have also distinguished the rates under MBS and SBS. In Figure 4a, it can be observed that the DL CDF curves for the intelligent decoupled access are all positioned to the right of those for the coupled access. This indicates that a higher proportion of vehicles with intelligent access have higher DL rates. The CDF curve for coupled access to the MBS consistently lies further to the right compared to that for coupled access to the SBS. Meanwhile, there is an intersection between the MBS and SBS segments in the case of intelligent decoupled access. This is primarily because intelligent decoupled access breaks the restriction that UL and DL must be accessed through the same BS, fully exploiting the latent performance potential of SBS due to its lower transmit power.
Figure 4b presents a comparison of the CDF for UL. The enhancement in UL rates due to intelligent decoupled access is not significant. However, the UL rate for vehicles connected to an SBS is higher than that for those connected to an MBS. This is primarily because SBSs are typically closer to the vehicles compared to MBSs, resulting in overall better channel conditions. Considering Figure 4a,b together, the UL gain remains limited while the DL gain is significant, primarily due to C-V2X’s inherent characteristics. In UL, vehicles inherently prefer SBS over distant MBS even in coupled access, yet UL performance is dominated by vehicle-to-vehicle interference—not BS selection—as vehicle density increases. This is confirmed by Figure 7b, where SBS’s UL proportion decreases under high density, indicating that SBS capacity saturation and escalating vehicle-to-vehicle interference negate proximity advantages. Conversely, DL gain thrives via decoupling, avoiding MBS interference. UL gains emerge under two conditions: (1) sparse SBS deployment forcing MBS reliance in coupled access, or (2) vehicles in MBS coverage but far from SBS, leveraging SBS proximity advantage.
Figure 5 presents the average rate of DL/UL. In Figure 5a, regardless of whether it is MBS or SBS access, the average DL rate for intelligent decoupled access is higher than that for coupled access. Additionally, the impact of the number of vehicles on the average rate of intelligent decoupled access is relatively small. In Figure 5b, the UL rate exhibits a trend similar to the DL. When the number of vehicles is large, the average UL rate for access to an SBS is greater than that for an MBS. This is because the UL rate is more significantly affected by the channel conditions, especially path loss. Therefore, although the number of vehicles increases and interference grows, the SBS is closer to the vehicles compared to the MBS. As a result, the SINR for SBS access is overall higher, leading to better performance under high vehicle load conditions.
Figure 6 depicts the proportion of access modes versus the number of vehicles in UL/DL intelligent access C-V2X. Figure 6a compares the proportion of vehicles choosing decoupled and coupled access in intelligent decoupled access C-V2X. With the increase in the number of vehicles, the proportion of decoupled access first decreases and then rises, because the UL/DL decoupled access significantly improves the communication quality for edge users. Therefore, when the load is low, most vehicles still opt for coupled access. As the vehicle load increases to a certain level and coupled access becomes fully loaded, the decoupled mode begins to gradually increase. Figure 6b more intricately displays the proportion of the six access modes. The proportions for Case 1 and Case 2 have consistently been higher. During the optimization process of intelligent decoupled access, the restriction that UL and DL must be accessed through the same BS in a purely coupled access is broken, leading to a situation where there is more access to SBSs for UL and DL. As the number of vehicles increases, the distance between SBSs and vehicles effectively decreases, and UL interference grows, resulting in a rise in the proportion of Case 6.
Figure 7 illustrates the proportion of UL/DL access to MBS and SBS by vehicle users in the intelligent decoupled access network, choosing between coupled access, Case 1 and Case 2, and decoupled access, Case 3∼6. Figure 7a illustrates the UL/DL access ratios in Case 1 and Case 2. With the increase in vehicle number, the proportion of UL access to the MBS has been continuously rising. This is because, as the number of vehicles increases, the SBSs are in close proximity, resulting in less interference when accessing the MBS compared to the SBS; consequently, the SINR for accessing the MBS is relatively higher. In DL, the proportion of access to MBS first increases and then decreases, because the power of MBS is higher, leading to more access. As the number of vehicles grow, the load on an MBS increases. However, the proximity to SBSs compensates for the power disadvantage. In Figure 7b, it can be observed that the trend for both MBS and SBS is similar to that in Figure 7a. However, in the decoupled scenario, the proportion of DL access to SBSs is overall higher than in the coupled access scenario. This is because vehicles that are decoupled are often users at the edge of the cell, which are farther away from the MBS.
Figure 8 provides a comparison of the average rates of UL and DL under different association policies. We present a comparison between the UL/DL intelligent decoupled access, which is the optimization method proposed in this paper, and two other association policies based on the nearest distance and the best channel gain, as well as the coupled access method. It can be observed that regardless of whether it is UL or DL, UL/DL intelligent decoupled access achieves the highest average rate. As the number of vehicles increases and the network load becomes heavier, the average rates for both UL and DL decrease.

9. Conclusions

We have proposed a UL/DL intelligent decoupled access framework for C-V2X, which significantly enhances network performance. By modeling the maximizing system throughput for both UL and DL as an MINLP, we have optimized the radio resource bandwidth, transmit power, and association variables of UL and DL, and have solved this NP-hard problem by using an efficient iterative algorithm while meeting the QoS requirements. The simulation results validate the effectiveness of the proposed framework and resource allocation strategy, showcasing the potential of UL/DL intelligent decoupled access in addressing the challenges faced by C-V2X. The findings provide important insight for the practical deployment of C-V2X in ITS, demonstrating that intelligent decoupled access achieves substantial throughput gains in both UL and DL while satisfying QoS requirements. The current work focuses on steady-state resource allocation optimization under given channel conditions. Incorporating vehicle mobility, dynamic channel variability, and control plane signaling overhead into the optimization framework represents an important direction for future work.

Author Contributions

Conceptualization, L.J.; methodology, L.J.; software, L.J.; validation, P.L.; formal analysis, P.L.; investigation, Y.Y.; resources, Y.Y.; data curation, L.X.; writing—original draft preparation, L.X.; writing—review and editing, Q.C.; visualization, Q.C.; supervision, J.Y., A.L. and X.X.; project administration, J.Y., A.L. and X.X.; funding acquisition, J.Y., A.L. and X.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by by National Key Laboratory of Science and Technology on Radar Detection and Sensing, and the High-level Innovation and Entrepreneurship Talent Introduction Program Team of Jiangsu Province.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Acknowledgments

During the writing phase of this manuscript, the authors used Gemini 3 only for language editing. All outputs were reviewed and revised by the authors, who take full responsibility for the final content.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
UL/DLUplink/Downlink
SBSSmall Base Stations
MBSMacro Base Stations
C-V2XCellular Vehicle-to-Everything
5GFifth-generation Mobile Communications
B5GBeyond 5G
ITSIntelligent Transportation Systems
SINRSignal-to-Noise-and-Interference-Ratio
UMaUrban Macro
CVXConvex Optimization
CDFCumulative Distribution Function

References

  1. Jiao, L.; Yu, K.; Chen, J.; Liu, T.; Zhou, H.; Cai, L. Performance Analysis of Uplink/Downlink Decoupled Access in Cellular-V2X Networks. IEEE Trans. Mob. Comput. 2023, 23, 5616–5630. [Google Scholar] [CrossRef]
  2. Xu, Y.; Zhou, H.; Ma, T.; Zhao, J.; Qian, B.; Shen, X. Leveraging multiagent learning for automated vehicles scheduling at nonsignalized intersections. IEEE Internet Things J. 2021, 8, 11427–11439. [Google Scholar] [CrossRef]
  3. Ojaghi, B.; Adelantado, F.; Verikoukis, C. Enhancing V2X QoS: A Dual Approach of Packet Duplication and Dynamic RAN Slicing in B5G. IEEE Trans. Intell. Transp. Syst. 2024, 25, 7848–7860. [Google Scholar] [CrossRef]
  4. Sabeeh, S.; Wesołowski, K.; Sroka, P. C-V2X centralized resource allocation with spectrum re-partitioning in highway scenario. Electronics 2022, 11, 279. [Google Scholar] [CrossRef]
  5. Husain, S.; Kunz, A.; Prasad, A.; Pateromichelakis, E.; Samdanis, K.; Song, J. The road to 5G V2X: Ultra-high reliable communications. In Proceedings of the 2018 IEEE Conference on Standards for Communications and Networking (CSCN); IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar]
  6. Yin, X.; Liu, J.; Cheng, X.; Xiong, X. A C-V2X Compatible Massive Data Download Scheme Based on Heterogeneous Vehicular Network. IEEE Trans. Consum. Electron. 2023, 69, 962–973. [Google Scholar] [CrossRef]
  7. Jiao, L.; Zhao, J.; Xu, Y.; Zhang, T.; Zhou, H.; Zhao, D. Performance Analysis for Downlink Transmission in Multi-Connectivity Cellular V2X Networks. IEEE Internet Things J. 2023, 11, 11812–11824. [Google Scholar] [CrossRef]
  8. Siddiqui, M.U.A.; Qamar, F.; Ahmed, F.; Nguyen, Q.N.; Hassan, R. Interference management in 5G and beyond network: Requirements, challenges and future directions. IEEE Access 2021, 9, 68932–68965. [Google Scholar] [CrossRef]
  9. Zhang, Y.; Zheng, F.; Luo, J. HetNets under Decoupled Uplink and Downlink Access with UE Random Discontinuous Transmission: Local Delay and Energy Efficiency. China Commun. 2024, 21, 205–216. [Google Scholar] [CrossRef]
  10. Xu, Y.; Liu, Z.; Qian, B.; Du, H.; Chen, J.; Kang, J.; Zhou, H.; Niyato, D. Fully-Decoupled RAN for Feedback-Free Multi-Base Station Transmission in MIMO-OFDM System. IEEE J. Sel. Areas Commun. 2025, 43, 780–794. [Google Scholar] [CrossRef]
  11. Shang, J.; Shang, J.; Yao, Z.; Yu, S.; Xu, J. Research and Design on Antenna Performance of Intelligent Connected Vehicles. Mod. Radar 2025. [Google Scholar] [CrossRef]
  12. Sial, N.; Ahmed, J. A novel and realistic hybrid downlink-uplink coupled/decoupled access scheme for 5G HetNets. Turk. J. Electr. Eng. Comput. Sci. 2017, 25, 4457–4473. [Google Scholar] [CrossRef]
  13. Xu, Y.; Qian, B.; Yu, K.; Ma, T.; Zhao, L.; Zhou, H. Federated Learning Over Fully-Decoupled RAN Architecture for Two-Tier Computing Acceleration. IEEE J. Sel. Areas Commun. 2023, 41, 789–801. [Google Scholar] [CrossRef]
  14. Yu, K.; Zhou, H.; Xu, Y.; Liu, Z.; Du, H.; Shen, X. Large Sequence Model for MIMO Equalization in Fully Decoupled Radio Access Network. IEEE Open J. Commun. Soc. 2025, 6, 4491–4504. [Google Scholar] [CrossRef]
  15. Sekander, S.; Tabassum, H.; Hossain, E. Decoupled uplink-downlink user association in multi-tier full-duplex cellular networks: A two-sided matching game. IEEE Trans. Mob. Comput. 2016, 16, 2778–2791. [Google Scholar] [CrossRef]
  16. Yu, K.; Yu, Q.; Tang, Z.; Zhao, J.; Qian, B.; Xu, Y.; Zhou, H.; Shen, X. Fully-Decoupled Radio Access Networks: A Flexible Downlink Multi-Connectivity and Dynamic Resource Cooperation Framework. IEEE Trans. Wirel. Commun. 2023, 22, 4202–4214. [Google Scholar] [CrossRef]
  17. Meneguette, R.I.; Bittencourt, L.F.; Madeira, E.R. User-centric mobility management architecture for vehicular networks. In Mobile Networks and Management, Proceedings of the 4th International Conference, MONAMI 2012, Hamburg, Germany, 24–26 September 2012; Revised Selected Papers 4; Springer: Berlin/Heidelberg, Germany, 2013; pp. 42–56. [Google Scholar]
  18. Jiao, L.; Yu, K.; Xu, Y.; Zhang, T.; Zhou, H.; Shen, X. Spectral Efficiency Analysis of Uplink-Downlink Decoupled Access in C-V2X Networks. In Proceedings of the GLOBECOM 2022—2022 IEEE Global Communications Conference; IEEE: Piscataway, NJ, USA, 2022; pp. 2062–2067. [Google Scholar]
  19. Yu, K.; Zhou, H.; Tang, Z.; Shen, X.; Hou, F. Deep reinforcement learning-based RAN slicing for UL/DL decoupled cellular V2X. IEEE Trans. Wirel. Commun. 2021, 21, 3523–3535. [Google Scholar] [CrossRef]
  20. Liu, T.; Zhou, H.; Li, J.; Shu, F.; Han, Z. Uplink and downlink decoupled 5G/B5G vehicular networks: A federated learning assisted client selection method. IEEE Trans. Veh. Technol. 2022, 72, 2280–2292. [Google Scholar] [CrossRef]
  21. Yu, K.; Zhou, H.; Qian, B.; Tang, Z.; Shen, X. A reinforcement learning aided decoupled RAN slicing framework for cellular V2X. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference; IEEE: Piscataway, NJ, USA, 2020; pp. 1–6. [Google Scholar]
  22. Jiang, L.; Sha, X.; Wu, X.; Zhang, N. A novel resource allocation algorithm based on downlink and uplink decouple access scheme in heterogeneous networks. China Commun. 2016, 13, 22–31. [Google Scholar] [CrossRef]
  23. Liu, X.; Liu, H.; Zheng, K.; Liu, J.; Taleb, T.; Shiratori, N. AoI-minimal clustering, transmission and trajectory co-design for UAV-assisted WPCNs. IEEE Trans. Veh. Technol. 2024, 74, 1035–1051. [Google Scholar] [CrossRef]
  24. Shi, Y.; Alsusa, E.; Baidas, M.W. On the application of uplink/downlink decoupled access in heterogeneous mobile edge computing. Comput. Netw. 2023, 223, 109593. [Google Scholar] [CrossRef]
  25. Peng, J.; Shangguan, W.; Chai, L.; Chen, J.; Peng, C.; Cai, B. V2X Enabled Platoon Control for Aperiodic Congestion Mitigation via Moving Bottlenecks in Mixed Traffic Environments. IEEE Trans. Veh. Technol. 2025. [Google Scholar] [CrossRef]
  26. Boccardi, F.; Andrews, J.; Elshaer, H.; Dohler, M.; Parkvall, S.; Popovski, P.; Singh, S. Why to decouple the uplink and downlink in cellular networks and how to do it. IEEE Commun. Mag. 2016, 54, 110–117. [Google Scholar] [CrossRef]
  27. Chetlur, V.V.; Dhillon, H.S. Coverage and rate analysis of downlink cellular vehicle-to-everything (C-V2X) communication. IEEE Trans. Wirel. Commun. 2019, 19, 1738–1753. [Google Scholar] [CrossRef]
  28. Andrews, J.G.; Baccelli, F.; Ganti, R.K. A tractable approach to coverage and rate in cellular networks. IEEE Trans. Commun. 2011, 59, 3122–3134. [Google Scholar] [CrossRef]
  29. ETSI. Study on Channel Model for Frequencies from 0.5 to 100 GHz; Technical Report 3GPP TR 38.901; ETSI: Valbonne, France, 2022. [Google Scholar]
  30. Singh, A.; Marzetta, T.L. Shannon theory for wireless communication in a resonant chamber. IEEE J. Sel. Areas Commun. 2024, 42, 1494–1503. [Google Scholar] [CrossRef]
  31. Zhan, C.; Zeng, Y.; Zhang, R. Energy-efficient data collection in UAV enabled wireless sensor network. IEEE Wirel. Commun. Lett. 2017, 7, 328–331. [Google Scholar] [CrossRef]
  32. Geng, S.; Wei, Z.; Zhao, J.; Shen, F.; Joung, J.; Sun, S. Joint Deployment and Resource Allocation for Service Provision in Multi-UAV-Assisted Wireless Networks. IEEE Internet Things J. 2024, 11, 37269–37286. [Google Scholar] [CrossRef]
  33. André, R.; Luciani, X.; Moreau, E. Joint eigenvalue decomposition algorithms based on first-order Taylor expansion. IEEE Trans. Signal Process. 2020, 68, 1716–1727. [Google Scholar] [CrossRef]
  34. Boyd, S.P.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  35. Von Hohenbalken, B. A finite algorithm to maximize certain pseudoconcave functions on polytopes. Math. Program. 1975, 9, 189–206. [Google Scholar] [CrossRef]
  36. An, L.T.H.; Tao, P.D. The DC (difference of convex functions) programming and DCA revisited with DC models of real world nonconvex optimization problems. Ann. Oper. Res. 2005, 133, 23–46. [Google Scholar] [CrossRef]
Figure 1. The system illustration of UL/DL intelligent decoupled access in C-V2X.
Figure 1. The system illustration of UL/DL intelligent decoupled access in C-V2X.
Electronics 15 02046 g001
Figure 2. The simulation scenario of UL/DL intelligent decoupled access in C-V2X.
Figure 2. The simulation scenario of UL/DL intelligent decoupled access in C-V2X.
Electronics 15 02046 g002
Figure 3. The convergence process of Algorithm 1 in DL.
Figure 3. The convergence process of Algorithm 1 in DL.
Electronics 15 02046 g003
Figure 4. The CDF of rate for DL and UL in intelligent decoupled access and coupled access C-V2X networks ( V = 10 ): (a) Downlink; (b) Uplink.
Figure 4. The CDF of rate for DL and UL in intelligent decoupled access and coupled access C-V2X networks ( V = 10 ): (a) Downlink; (b) Uplink.
Electronics 15 02046 g004
Figure 5. The average rate of UL/DL intelligent decoupled access for UL/DL compared with coupled access in C-V2X: (a) Downlink average rate; (b) Uplink average rate.
Figure 5. The average rate of UL/DL intelligent decoupled access for UL/DL compared with coupled access in C-V2X: (a) Downlink average rate; (b) Uplink average rate.
Electronics 15 02046 g005
Figure 6. The proportion of access modes versus the number of vehicles in UL/DL intelligent access C-V2X: (a) Comparison between decoupled and coupled access; (b) The proportion of 6 cases.
Figure 6. The proportion of access modes versus the number of vehicles in UL/DL intelligent access C-V2X: (a) Comparison between decoupled and coupled access; (b) The proportion of 6 cases.
Electronics 15 02046 g006
Figure 7. UL/DL MBS/SBS access ratios in intelligent decoupled access C-V2X: (a) Coupled Access: Case 1, 2; (b) Decoupled Access: Case 3∼6.
Figure 7. UL/DL MBS/SBS access ratios in intelligent decoupled access C-V2X: (a) Coupled Access: Case 1, 2; (b) Decoupled Access: Case 3∼6.
Electronics 15 02046 g007
Figure 8. Comparison of optimized average rates under different BS association policies: (a) Downlink; (b) Uplink.
Figure 8. Comparison of optimized average rates under different BS association policies: (a) Downlink; (b) Uplink.
Electronics 15 02046 g008
Table 1. Main parameters.
Table 1. Main parameters.
Channel ParametersValue
MBS transmit power P m a x m = P m , t d (dBm)46
SBS transmit power P m a x s = P s , t d (dBm)30
Vehicle transmit power P m a x v = P v , t u (dBm)29
Mean of shadowing gain ω d for LOS, NLOS (dB) 2 , 6
STD of shadowing gain ω d for LOS, NLOS (dB) 4 , 6
Mean of Rayleigh fading 1 / μ (dBi)1
The antenna heights of MBS, SBS, vehicle (m)25, 10, 1.8
The DL communication frequency (GHz)5
The UL communication frequency (GHz)5.9
Simulation ParametersValue
The minimum DL rate (Mbps)0.5
The minimum UL rate (Mbps)0.1
The length of road (m)1200
The total bandwidth W b , t d of MBS, SBS (MHz)15, 6
The total bandwidth W b , t u of MBS, SBS (MHz)15, 6
The maximum bandwidth W b , m a x d of MBS, SBS (MHz)3, 3
The maximum bandwidth W b , m a x u of MBS, SBS (MHz)3, 3
The maximum q b d for MBS/SBS in DL5, 2
The maximum q b u for MBS/SBS in UL5, 2
The proportion of vehicles in LOS80%
The number V of vehicles6∼18
The number M of MBS2
The number S of SBS4
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Jiao, L.; Li, P.; Yang, Y.; Xia, L.; Cheng, Q.; Liu, A.; Yang, J.; Xu, X. Joint Optimization for Uplink/Downlink Intelligent Decoupled Access in Heterogeneous C-V2X Communications. Electronics 2026, 15, 2046. https://doi.org/10.3390/electronics15102046

AMA Style

Jiao L, Li P, Yang Y, Xia L, Cheng Q, Liu A, Yang J, Xu X. Joint Optimization for Uplink/Downlink Intelligent Decoupled Access in Heterogeneous C-V2X Communications. Electronics. 2026; 15(10):2046. https://doi.org/10.3390/electronics15102046

Chicago/Turabian Style

Jiao, Luofang, Pin Li, Yuhao Yang, Linghao Xia, Qiang Cheng, Ang Liu, Jingbei Yang, and Xianzhe Xu. 2026. "Joint Optimization for Uplink/Downlink Intelligent Decoupled Access in Heterogeneous C-V2X Communications" Electronics 15, no. 10: 2046. https://doi.org/10.3390/electronics15102046

APA Style

Jiao, L., Li, P., Yang, Y., Xia, L., Cheng, Q., Liu, A., Yang, J., & Xu, X. (2026). Joint Optimization for Uplink/Downlink Intelligent Decoupled Access in Heterogeneous C-V2X Communications. Electronics, 15(10), 2046. https://doi.org/10.3390/electronics15102046

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop