Вы находитесь на странице: 1из 12

IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO.

3, JUNE 2018 1527

A Social-Aware Group Formation Framework


for Information Diffusion in Narrowband
Internet of Things
Zhaolong Ning , Member, IEEE, Xiaojie Wang, Student Member, IEEE,
Xiangjie Kong, Senior Member, IEEE, and Weigang Hou, Member, IEEE

Abstract—Due to the heterogeneous and resource-constrained facilitating our daily life from various aspects, such as envi-
characters of Internet of Things (IoT), how to guarantee ubiqui- ronmental monitoring, health care, product management, and
tous network connectivity is challenging. Although LTE cellular smart cities [1]. According to the mobility report from
technology is the most promising solution to provide network
connectivity in IoTs, information diffusion by cellular network Ericsson,1 mobile traffic will reach more than 120 exabytes
not only occupies its saturating bandwidth, but also costs addi- per month in 2018, which is about 12 times comparing with
tional fees. Recently, NarrowBand-IoT (NB-IoT), introduced by the counterpart in 2012. The rapid growth of traffic chal-
3GPP, is designed for low-power massive devices, which intends lenges the current communication infrastructure, especially in
to refarm wireless spectrum and increase network coverage. For urban areas and at peak periods [2]. Since devices in IoTs
the sake of providing high link connectivity and capacity, we stim-
ulate effective cooperations among user equipments (UEs), and would be interconnected by heterogeneous network architec-
propose a social-aware group formation framework to allocate tures, how to guarantee network connectivity is a fundamental
resource blocks (RBs) effectively following an in-band NB-IoT issue. Due to the various advantages of LTE cellular technol-
solution. Specifically, we first introduce a social-aware multihop ogy (such as wide coverage, security, and licensed spectrum),
device-to-device (D2D) communication scheme to upload infor- it is a promising alternative to offer network connectivity in
mation toward the eNodeB within an LTE, so that a logical
cooperative D2D topology can be established. Then, we formulate IoTs. However, global cellular traffic has reached 94 exabytes
the D2D group formation as a scheduling optimization problem in 2015, and it is estimated to reach around 910 exabytes
for RB allocation, which selects the feasible partition for the UEs per month in 2020 [3]. Therefore, the increasingly scarce
by jointly considering relay method selection and spectrum reuse spectrum resource and additional cost fees have become the
for NB-IoTs. Since the formulated optimization problem has a obstacles for the implementation of LTE cellular technology
high computational complexity, we design a novel heuristic with
a comprehensive consideration of power control and relay selec- in IoTs [4].
tion. Performance evaluations based on synthetic and real trace In order to enable machine-type communications in 5G,
simulations manifest that the presented method can significantly novel technology components, such as NarrowBand-IoT (NB-
increase link connectivity, link capacity, network throughput, and IoT) radio interface, device-to-device (D2D) communications,
energy efficiency comparing with the existing solutions. and licensed assisted access are advocated by 3GPP. NB-IoT
Index Terms—Device-to-device (D2D) communications, group technology, included in 3GPP LTE-standard Release 13, has
formation, NarrowBand-Internet of Things (NB-IoT), power been demonstrated to effectively reduce the required time of
control, relay selection, social selfishness. specific applications in LTE by reusing network resources,
I. I NTRODUCTION such as downlink orthogonal frequency division multiple
access (OFDMA), channel coding, and so forth [5]. NB-IoT
ILLIONS of devices in Internet of Things (IoT) with
B sensing, computing, and communication capabilities are
is initially designed to coexist with the 3GPP devices, and
can be deployed by LTE operators through allocating physical
Manuscript received August 9, 2017; revised November 8, 2017; accepted resource blocks (RBs) of 180 kHz [6]. In September 2015,
November 21, 2017. Date of publication November 24, 2017; date of cur- the normative phase of the NB-IoT work item in 3GPP has
rent version June 8, 2018. This work was supported in part by the National launched, and the core specifications have been accomplished
Natural Science Foundation of China under Grant 61502075, Grant 61401082,
and Grant 61471109, in part by the Fundamental Research Funds for in June 2016.
Central Universities under Grant DUT17RC(4)49, Grant N161604004, Grant In IoTs, each thing or person with a locatable, addressable,
N161608001, and Grant N150401002, in part by the Liaoning BaiQianWan and readable counterpart can be connected, and objects can
Talents Program, and in part by the China Post-Doctoral Science Foundation
Project under Grant 2015M580224. (Corresponding authors: Xiangjie Kong; collaborate with each other toward the same goal [7]. The
Weigang Hou.) evolutionary direction of IoTs is changing from smart objects
Z. Ning, X. Wang, and X. Kong are with the School of Software, to social objects, which calls for the comprehensive man-
Dalian University of Technology, Dalian 116620, China, and also with the
Key Laboratory for Ubiquitous Network and Service Software of Liaoning agement of interaction among D2D, device-to-infrastructure,
Province, Dalian 116620, China (e-mail: xjkong@ieee.org). and device-to-human [8]. D2D communications between user
W. Hou is with the College of Computer Science and
Engineering, Northeastern University, Shenyang 110169, China (e-mail:
houweigang@cse.neu.edu.cn). 1 [Online]. Available: https://www.ericsson.com/assets/local/news/2013/6/
Digital Object Identifier 10.1109/JIOT.2017.2777480 ericsson-mobility-report-june-2013.pdf
2327-4662 c 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
1528 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 3, JUNE 2018

equipments (UEs) within mutual proximity are promising low computational complexity is proposed to solve the formu-
to offload the ever-saturating bandwidth of cellular net- lated problem approximately. The main contributions of this
works, increase spectrum utilization and provide high network paper can be summarized as follows.
throughput [9]. Existing communication techniques (such as 1) We develop a cooperative D2D-enabled NB-IoT frame-
radio frequency identification, Zigbee, Bluetooth, and low- work, where D2D communication links can be sched-
power Wi-Fi) are investigated to support D2D communications uled by the base stations (BSs) in LTE. According to
by unlicensed frequency bands. Although multihop D2D channel state and required transmission rate of cellu-
communications can be fulfilled to provide wide coverage, lar links, D2D links within a cell can be stimulated to
additional backhaul links are required and link interruption upload information cooperatively following an in-band
may also occur. Besides, the utilization of unlicensed spec- NB-IoT solution.
trum lowers network reliability and availability, and adds 2) We present a social-aware relay selection scheme to
communication delay. upload information toward the eNodeB. Driven by gain-
As an important branch of IoTs, NB-IoTs can support large ing extra benefit from network operator, short-range low-
number of devices with the characters of low bandwidth, power D2D communications are preferred in NB-IoTs.
low device cost, low power consumption, and low delay sen- Through encouraging long-range transmissions to be
sitivity [10]. Although commercial applications of NB-IoT separated into multihop D2D transmissions, more oppor-
products and services have been launched in 2017, how to tunities can be created to increase spectrum utilization
design a social-aware framework for information diffusion in via cooperative communication in NB-IoTs.
D2D-enabled NB-IoT is still in its infancy. Furthermore, since 3) We define a group formation game to integrate the D2D
cellular network is initially designed for human-to-human communications for RB allocation in a cellular network
communications, additional requirements deserve to be inves- under the constraints of communication cost, transmis-
tigated for D2D-enabled NB-IoTs, such as link connectivity, sion power, network load, and so on. Our framework
energy limitation of devices, social factors of individuals, and can effectively allocate RBs by grouping UEs into a
so on. Generally speaking, the following issues need to be well formulation.
addressed for D2D-enabled information diffusion in NB-IoTs. 4) Since the computational complexity of the formulated
1) Although D2D communication enables devices to problem is high, we propose a novel heuristic method
interact directly in LTE networks, existing works mainly to relax the constraints of link scheduling and power
focus on reducing multihop transmission delay in D2D- control. Based on the synthetic and real trace-based sim-
enabled NB-IoT systems. How to guarantee link con- ulations, the superiority of our presented optimal method
nectivity has not been fully discussed. and the effectiveness of our heuristic method can be
2) It is significant to achieve a win-win situation between demonstrated meanwhile.
cellular and D2D users, so that wireless spectrum can be The remainder of this paper is organized as follows.
fully utilized by jointly considering social features and Section II illustrates the related works, and the system model
network communication constraints in NB-IoTs. is stated in Section III. Section IV describes the social-aware
3) Different relay methods coexist in NB-IoTs. How to group formation framework for information diffusion in NB-
take advantage of the transmission features of D2D IoTs, and a heuristic approximation algorithm is proposed in
communication and cellular network, and integrate the Section V. Section VI shows the performance evaluations, and
existing relay techniques optimally for fully exploring some concluding remarks are given in Section VII.
the wireless spectrum is challenging.
4) In order to increase link capacity in NB-IoTs, high-speed II. R ELATED W ORKS
content transmission is preferred. However, it is sen-
NB-IoTs can be deployed inside the LTE carrier, so that no
sitive to network interference and the potential ability
additional cost is produced by reusing the 180 KHz bandwidth
for spectrum spatial reuse is limited. Therefore, how to
of LTE physical resource. Since NB-IoT technology is promis-
make a tradeoff between transmission rate and spectrum
ing for low-power wide-area machine-type communications,
utilization deserves to be investigated.
this section focuses on the studies from the aspects of infor-
To cope with the abovementioned issues, we consider the
mation diffusion, spectrum reuse, and network optimization in
D2D-enabled cooperative uploading, and design a social-aware
NB-IoTs.
group formation framework (named as SAGA) to allocate
RBs effectively for information diffusion following an in-band
NB-IoT solution. First, we formulate a general D2D commu- A. Information Diffusion in NB-IoTs
nication model to improve link connectivity and bandwidth Due to the widespread deployment of IoT devices, they
following an in-band NB-IoT solution. Then, we present a have become key components to enable information and
double auction-based social-aware scheme to upload informa- communication technology developments in smart cities. In
tion toward the eNodeB so that a logical cooperative D2D order to timely upload information toward the eNodeB,
topology among UEs can be established. After that, we for- Militano et al. [11] allocated short-range D2D chains to lower
mulate an optimization framework to allocate the RBs within upload delay. Furthermore, the authors formulated a coalition
an LTE, where the communication links inside can be acti- game to stimulate cooperation among UEs with social selfish-
vated simultaneously. Finally, a novel heuristic method with ness by considering their channel diversity. A context-aware
NING et al.: SAGA FRAMEWORK FOR INFORMATION DIFFUSION IN NB-IoT 1529

information diffusion scheme for alerting message delivery


in 5G was studied in [12], where both the networking and
sociality-based metrics have been considered for information
diffusion time estimation. The context-aware information can
be acquired by D2D communications, and the collected data
can be integrated and elaborated at the BS before sending
out. Cao et al. [13] developed a D2D-enabled social-aware
multicast system by taking social trust and social reciprocity
into account. The social relationship-based group formation
is modeled as a coalitional game for video multicasting, and
then the authors allocated resource for BS to handle D2D
radio resource requests from UEs. Since user selfishness would
largely affect the performance of information diffusion in
NB-IoTs, Gao et al. [14] investigated the impact of selfish-
ness in D2D communications. First, two kinds of selfishness Fig. 1. Illustrative example of D2D communications in LTE networks.
transmission patterns are modeled, i.e., connected and oppor-
tunistic transmission patterns. Then, a time-varying graph
model is designed to study the selfishness impact on D2D capacity in NB-IoTs, Deng et al. [19] decoupled the joint
communications. rate and battery control problem into subproblems by dual
decomposition. A Stackelberg game-based optimization model
B. Spectrum Reuse in NB-IoTs was formulated to study the interactions between the cellu-
Although D2D communication technology is promising to lar and D2D users [20]. First, the competition among D2D
increase spectrum efficiency in cellular networks, how to stim- users is investigated based on noncooperative game theory.
ulate resource sharing between cellular and D2D users is After that, two optimal algorithms are developed for pricing
challenging. In [15], a social community aware D2D resource according to the acquired information of BSs. Since the IoT
allocation framework was investigated to encourage cellular devices with high mobility in the cellular networks challenge
users share channel resource with D2D users in the same com- the establishment and maintenance of D2D communication
munity with strong social relationship. A two-step coalition links, Alim et al. [21] formulated an optimal model for time
game was further presented to select D2D resource alloca- sensitive content transmission in NB-IoTs. By considering the
tion method so that wireless spectrum in the same community community-based social encounters, the studied method can
can be fully leveraged. Zhang et al. [16] studied the quality effectively stimulate D2D communications and reduce the cost
of service (QoS) provisioning for NB-IoTs, and investigated of BSs. In order to keep load balancing of D2D communi-
the interplay of resource allocation between macrocells and cations, a multislot online procurement auction framework is
femtocells. The idea of effective bandwidth is utilized to formulated as an optimization problem for the sake of mini-
guarantee UE’s QoS. Then the corresponding interplay is for- mizing social cost [3]. Then, an online approximation method
mulated into a two-level Stackelberg game. Its objective is to is presented to solve the formulated NP-hard problem while
maximize UE’s own utility by the joint optimization of macro- guaranteeing auction truthfulness.
cell’s interference price and femtocell’s spectrum utilization.
In order to effectively share spectrum resource in NB-IoTs, III. S YSTEM M ODEL
Wang et al. [17] formulated the optimal matching problem
We consider a D2D-enabled OFDMA-based LTE network,
of cellular and D2D UEs by increasing sum transmission
where multiple devices inside upload content following an in-
rates under transmission power and link outage constraints.
band NB-IoT solution. As illustrated in Fig. 1, an LTE cell
Zhang et al. [18] utilized graph theory to alleviate the inter-
locates in the center and operates over a licensed spectrum
ference between D2D and cellular UEs. The constructed
band. Direct D2D communications are possible if the distance
interference graph includes two stages, i.e., the announcement
of two UEs is within a specific range, and the requirement of
stage and the collision-resolution stage. The former broadcasts
signal-to-interference-plus-noise ratio (SINR) can be satisfied.
the existing D2D links of UEs to their neighboring area, while
The considered system can be a small-scale area, such as uni-
the latter focuses on handling the generated collisions during
versity campus, shopping center, or transportation junction,
the first stage.
where an LTE cell exists for connectivity ensurence. When
an emergency accident happens (such as campus violence,
C. Joint Optimization in NB-IoTs fire disaster, or traffic accident), terminal UEs and rescuers
In NB-IoTs, transmission data repetition and signal over- should acquire the updated information to handle the corre-
head control are viewed promising for network coverage sponding situation. Therefore, the objective of our framework
enhancement. An uplink adaptation for NB-IoTs was designed is to provide high link connectivity and capacity by D2D com-
at first, including the adaptations of inner and outer loop links munications, so that the updated information can be diffused
for transmission block error ratio guarantee. By jointly study- effectively and timely in NB-IoTs. We consider a time divi-
ing the spatiotemporally constraints of coupled link and battery sion multiple access-based scheduler at the eNodeB, which
1530 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 3, JUNE 2018

TABLE I
M AIN VARIABLES AND N OTATIONS U SED IN T HIS PAPER the transmission power control and interference coordination
of concurrent transmission links.
Define C and D as the sets of cellular and D2D UEs, respec-
tively, where C D = V. Let xc,j and xj ,j be binary variables
to denote whether cellular-based or D2D-enabled transmis-
sion link is activated (for links from the cellular node to j
and from j to j, respectively). A D2D-enabled session can be
constructed if users j and j can directly interact with each
other. Otherwise, an intermediate node i is required to assist
the D2D-enabled transmission, and we denote the node group
j − i − j as one session. When we consider a uplink trans-
mission from a cellular user c to the BS (or vice versa), the
generated interference by concurrent transmissions to reuse the
same RB can be calculated by

Ic = xc,j · Pc,j · Gc,j . (2)
j ∈D−{j}

Therefore, the SINR calculation for cellular transmission for


the cellular user c is
Pc,j Gc,j
γc,j = (3)
η + Ic
and the corresponding achievable data rate (bits per second per
Hertz) is Cc,j = Wlog2 (1 + γc,j ). Herein, W is the bandwidth
is in charge of allocating the RBs to the scheduled device. If of the current RB, and we assume the bandwidth of each link
D2D communications are employed, we select UEs that can be is the same for simplicity.
stimulated concurrently and grouped together, and utilize var-
ious RBs to avoid interference. In the following, we introduce
B. D2D-Enabled System Model
the system backgrounds of LTE and D2D communications,
respectively. The major notations to be utilized in this paper Generally speaking, two kinds of D2D communication
are shown in Table I. schemes can be categorized for spectrum resource utilization,
i.e., licensed and unlicensed spectrum resources. The former
can be further classified into three kinds of modes, i.e., the
A. LTE-Based System Model underlay, overlay, and cooperative modes, for reusing the wire-
In an LTE-based system model, the BS (i.e., eNodeB) is in less spectrum with cellular users [22]. We first briefly state the
charge of RB allocation before assigning RBs to the scheduled underlay and overlay modes for D2D communications. After
UEs. The network is modeled as a directed graph G = (V, E), that, we elaborate the cooperative mode.
where V and E are collections of nodes and links, respectively. 1) Underlay and Overlay Modes: In the underlay D2D
Based on the free space propagation loss model, the general communication mode, the UEs of both the cellular and
received SINR from UEs j to j by D2D communication can D2D communications simultaneously share the same spectrum
be expressed by band. The main challenge is the management of generated
Pj ,j Gj ,j interference between D2D and cellular transmission links. In
γj ,j =  ≥ Cj ,j (1) the overlay D2D communication mode, the transmission rates
η+ h∈V−{j } Ph,j Gh,j of cellular links should be satisfied before allocating net-
where Pj ,j and Gj ,j , respectively, represent the transmission work resource (channel or RB) to D2D communication links.
power and channel gain of node pair j − j. The thermal noise Although the interference between D2D and cellular links can
is illustrated by η. V is the group of devices. Since all the be decreased by overlay mode, network efficiency of spectrum
devices perform a half-duplex fashion, the concurrent trans- reuse is lower than that of the underlay mode.
mitted D2D links may interfere with each other if utilizing The main concern for the underlay D2D communication
the same RB. If the obtained SINR value is above a thresh- mode is to reduce network interference. When a D2D link
old Cj ,j with transmission rate Cj ,j , it is acceptable for the j − j is activated for information diffusion, the interference at
direct link transmission between j and j. Otherwise, multihop node j can be computed by
 
transmission is required to fulfill the transmission task in the Ij = xc,j · Pc,j · Gc,j + xj ,j · Pj ,j · Gj ,j . (4)
direct link. c∈C j ∈D−{j}
We also assume all the subcarriers within one RB have the
same channel condition as in [12], thus cellular and D2D The SINR calculation for underlay D2D transmission from
UEs reuse the same portion of radio spectrum and mutual UEs j to j is
interference exists. It is noted that the main differences for Pj ,j Gj ,j
γj ,j = (5)
cellular-based and D2D-enabled transmissions concentrate on η + Ij
NING et al.: SAGA FRAMEWORK FOR INFORMATION DIFFUSION IN NB-IoT 1531

and the achievable data rate gained by the underlay D2D UEs during one scheduling cycle. Similar with [24], it is
communication is: Cj ,j = Wlog2 (1 + γj ,j ). calculated by
For the overlay mode, a portion of an OFDMA frame is
1  bj ,j
reserved for D2D communication. That is the cellular UEs FNj =    (6)
Qj  h∈V−j bh,j
utilize part of the whole frame length (ξ ) for information j ∈V
diffusion, and the D2D UEs leverage the remaining por-
tion. The corresponding transmission rates of cellular-based where bj ,j isthe number of packets to be forwarded from UEs
and D2D-enabled links under overlay mode are: Cc,j = j to j, and h∈V−j bh,j is the sum of packets from other UEs
ξ Wlog2 (1 + γc,j ) and Cj ,j = (1 − ξ )Wlog2 (1 + γj ,j ), respec- received by destination UE j. |Qj | illustrates the amount of
tively. It should be noted that interference between cellular and neighboring UEs of UE j. It is one type strength that has an
D2D links does not exist under this mode. In order to maxi- influence on other nodes.
mize transmission rate of Cj ,j , ξ can be defined as the portion The friendship of associated UEs for UE j, noted by FAj ,
between the required data rate and the maximum achievable evaluates the friendship between one UE and its associ-
data rate of a cellular link. Although the overlay mode does ated UEs through the normalization of SINR value over the
not reuse wireless spectrum effectively compared with the associated link. Similar with [25], FAj can be computed by
underlay model, it has a smaller overhead over the control 1  γj ,j
FAj =   (7)
channel [23]. Aj  1 + γj ,j
2) Cooperative Mode: Due to the easy deployment and j ∈V
resource efficient economy, cooperation among terminals plays where |Aj | is the number of UEs that j connects with.
a critical role in D2D-enabled NB-IoTs. It not only encour- The friendship of community for j (FCj ) is computed by
ages devices with selfish character to forward information for (|Aj |/|V|), and |V| is the sum of network UEs. It identifies the
others, but also selects optimal relay method to fully leverage quality of UE’s friendship within the community. ϕj denotes
wireless spectrum resource. If the maximum transmission rate the social relationship of UE j, and is a weighted value of the
of cellular users cannot reach the rate threshold, a relay is nec- three submetrics mentioned above.
essary. Furthermore, it is a fact that communication between
devices can be handled in a multihop pattern even there exists
a direct path. The reason behind is that high power is necessary B. Social-Aware D2D-Enabled Relay Selection
for direct transmission with long transmission distance, which On one hand, the UEs far from the BS relay their content via
brings more interference to other concurrent transmissions. other UEs to guarantee network connectivity and increase net-
Although the information can be collected and distributed by work throughput. On the other hand, communication between
pervasively deploying sensing, computation, and communica- devices can be performed in a multihop pattern even a direct
tion infrastructures, they are costly and energy consuming. In path exists to lower transmission power and network interfer-
order to reduce the generated interference between cellular and ence. If we respectively view the commodity as relay service,
D2D UEs, relay-based cooperative transmission is advocated the relay and source nodes as seller and buyer, the social-
in NB-IoTs. aware D2D-enabled relay selection for NB-IoTs becomes a
Generally speaking, the objective of cooperative mode is to double auction problem. The auction proceeds periodically,
maximize D2D user’s summation of link capacity under the and one-round double auction process is illustrated as follows.
condition that the data requirement of cellular UEs can be For direct transmission, the corresponding rates for cellular
satisfied. This paper concentrates on the design of cooperative and D2D UEs can be calculated by Shannon equation, i.e.,
D2D communications due to its advantages for NB-IoTs, and Cc,j = Wlog2 (1 + γc,j ) and Cj ,j = Wlog2 (1 + γj ,j ), respec-
we propose a social-aware group formation game to upload tively. If a relay-based session is imperative with the assistance
information toward the eNodeB following an in-band NB-IoT of the node i, the required time for fulfilling data transmission
solution to allocate RB in the following section. is the total transmission time for links j − i and i − j , i.e.,
T = (1/Cj,i ) + (1/Ci,j ). Thus, the relay-based transmission
IV. S OCIAL -AWARE G ROUP F ORMATION G AME rate on link j−i−j is Cj ,i,j = (1/T) = [Cj,i Ci,j /(Cj,i + Ci,j )].
This section first presents social-oriented metrics to evalu- From the viewpoint of the buyer (i.e., source node), the
ate UE’s relationship. Then, a social-aware D2D-enabled relay achievable rate promoted by the relay-assisted transmission
selection scheme is investigated. After that, an optimal group is: Cji = Cj,i,j − Cj,j , where Cji is the gain that buyer j obtains
game is formulated in SAGA to allocate RB in D2D-enabled from seller i. For intermediate nodes (i.e., sellers), they incline
NB-IoTs. to relay for the source nodes under the condition that their
resource consumptions can be compensated. We leverage the
A. Social-Oriented Metrics utility function in [26] to demonstrate the interaction between
network utility and transmission rate
The presented social-oriented metrics analyze the informa-  
tion exchanges with surrounding UEs from the aspects of F(C) = α 1 − e−βC (8)
network density, quality and community. The following three
aspects of friendships are considered comprehensively. where α determines the upper bound of the utility function,
The friendship of neighboring UEs for node j, denoted by the curve shape of the function is reflected by β, and C is the
FNj , evaluates the impact degree of UE j with its surrounding achievable link rate.
1532 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 3, JUNE 2018

If packets are forwarded via relay node i from nodes j to j , A single cell in the LTE network is considered in this paper,
the increased utility Uj comparing with direct transmission is where multiple UEs intend to upload their content toward the
  eNodeB. Different from the traditional cellular mode trans-
Uj = F Cj ,i,j − F Cj ,j (9)
mission, UEs with pool link state can upload content toward
where F(Cj ,i,j ) and F(Cj ,j ), respectively, represent the utilities the eNodeB UEs in reciprocal proximity by forming groups
acquired by the relay assisted and direct transmissions. in a D2D-enabled cooperative NB-IoT mode. Under the con-
After offering relay service, the lost ability of relay node i trol of the eNodeB, UEs within a group can form a logical
(Li ) in increasing network utility is multihop D2D chain to upload content. We assume a cen-
     tral bank model, and each UE’s account is recorded in the
Li = F Ci,j Pi,j − F Ci,j Pi,j − Pcon i,j (10)
network system. The access channel contains control and data
where Pi,j and (Pi,j − Pcon i,j ) represent the available forwarding
subchannels. The subchannel includes the information of chan-
ability of relay i before and after packet relay, respectively. nel condition and central bank. After the content of source UE
The consumed power for packet relay is denoted by Pcon has been delivered with success, virtual money is transferred
i,j .
The available transmission rates before and after relay can to the relay UE from the central bank, and the winning relay
be expressed by Ci,j (Pi,j ) and Ci,j (Pi,j − Pcon i,j ), respec-
UE will receive the corresponding virtual money through the
tively. F(Ci,j (Pi,j )) and F(Ci,j (Pi,j − Pcon
i,j )) are the available central bank.
utilities before and after packet relay, respectively. The payoff (PO) for the winning out source node j is
In real market, participants are generally unwilling to reveal POj = Uj − Payj (15)
the commodity’s real value or cost. On one hand, buyer j tends
to provide a lower bid than the commodity’s real value. On the where Payj is node j’s actual payment.
other hand, seller i inclines to offer a higher ask than its real Similarly, the PO for the winning out intermediate
cost. The mark-up deviated from the actual value is defined as node i is
the extra part in economic terminology. Correspondingly, the POi = Reci − Li (16)
bid and ask of the source UE j and relay UE i are
 where Reci is the actual reception of node i.
Ujbid = Uj 1 − mj (11) We assume that the economic profit of the central bank is 0
Liask = Li (1 + mi ) (12) during the double auction. According to the economic theory
in [28], the payment Payj and reception Reci equal to
where mj ∈ [0, 1] and mi ∈ [0, 1] are the mark-ups of buyer j
and seller i, respectively. Ujbid + Liask
Payj = Reci = . (17)
Li et al. [27] assumed the mark-up of all the nodes is 2
the same, while the mark-up in this paper varies according UE’s virtual money in the central bank varies according to
to node social relationship and residual energy in NB-IoTs. (15) and (16) after one-round double auction process termi-
The reasons are twofold: 1) UEs with socially selfish char- nates. It is demonstrated in the Appendix that our method can
acter prefer to relay messages for those with strong social approach a win-win situation for both seller and buyer.
relationship and 2) the source UE would not incline to buy Our presented double-auction-based game model can
the relay service if its residual resource is plenty. Under these achieve an equilibrium. This is because the achievable trans-
two circumstances, the source UE would bid a relative low mission rates of source nodes are strictly convex and contin-
price. Otherwise, it prefers to provide a truthful bid to acquire uous, and the gained profits of our game are non-negative.
transaction opportunities. The mark-up of the source node is Furthermore, for the n-player normal form game, at least one
 AEj Nash equilibrium point exists if both the amounts of player
mj = ζj ϕj + 1 − ζj (13) and the strategy are finite, some existing schemes (such as [29]
TEj
and [30]) can be employed to obtain the Nash equilibrium in
where ζj is the weighting factor of node j s social relationship,
our formulated game.
and ϕj is the social relationship factor of UE j. AEj and TEj ,
respectively, illustrate the available (residual) energy and total
C. Optimized Group Formation Game
energy of UE j.
For the relay UE, the corresponding mark-up calculation The transmission rate of cellular UE has a minimum require-
is diverse. For one thing, the seller is unwilling to provide ment, while the counterpart in D2D communications does not
service for other UEs if its residual energy is not sufficient. have. Similar with [22], we also focus on the situation that
This is because its communication task should be fulfilled uplink cellular links share the spectrum with D2D communi-
before gaining extra profit. Besides, the source UE with strong cation links, and the investigated model can be also generalized
social relationship is possible to obtain more relay services by to downlink cellular links for RB allocation. Before describ-
bidding. On these occasions, a high price is asked, and the ing the details of the optimized group formation game, we first
corresponding mark-up is illustrate the main principles for spectrum allocation between

cellular and D2D communication links are as follows.
AEi
mi = ζi ϕi + (1 − ζi ) 1 − (14) 1) Each cellular link is allocated to one configuration, and
TEi each D2D communication link is assigned to no more
where the variables in (14) are defined similarly with (13). than one configuration.
NING et al.: SAGA FRAMEWORK FOR INFORMATION DIFFUSION IN NB-IoT 1533

2) If the required transmission rate of cellular link can be mode is determined by node i, constraint (21) guarantees no
satisfied, D2D communication links can share with the more than one link can be stimulated within one scheduling
spectrum occupied by the cellular link. period.
3) If the cellular link transmission is fulfilled via the assis- Constraint (22) demonstrates that transmission links deserve
tant of D2D communication terminals, it can obtain to be activated long enough so that all the transmission tasks
reward from the BS directly. can be accomplished. In (22), Wi,j s indicates the number of

For the sake of decreasing interference between the cel- transmission packets on link i → j within one scheduling
j
lular and D2D links, D2D links within close proximity to period. Yi represents the number of unicast traffic via node
the cellular links are identified to guarantee that they do not i on link i → j. For the multiple access phase of DNF, traffic
reuse the same RBs. For multihop D2D communications, it amount transmitted by links j → i and j → i can be illus-
 j,j
is essential to reduce the generated interference by concur- trated by j ∈V − −{j} Yi . For the broadcast process of CNC
i
rent transmissions within the same RB. After performing the and DNF, the broadcasted traffic via node i on links i → j and
 j,j
social-aware D2D-enabled relay selection in Section IV-B, i → j can be illustrated by j ∈V + −{j} Yi .
i
long-range transmission links can be substituted by short-range Constraints (23) to (27) are employed for transmission mode
multihop transmissions, so that devices can communicate with selection of relay node i. In (23), it means if over one outgoing
each other in a small-world network with strong relationship. flow is from node i, either CNC or DNF method is selected.
In order to fully leverage wireless spectrum, this section Constraint (24) means DNF method would be chosen if over
presents an optimized group formation game so that differ- one incoming flow is to node i. However, if merely one incom-
ent relay methods, including physical-layer network coding ing flow (usi = 1 or csi = 1) to node i exists, dis should be 0
(PNC), conventional network coding (CNC), space-division as shown in (25). The maximum amount of incoming links
multiple access, and plain routing, can be integrated in an is limited to 2 if DNF is selected for decodability ensurance
optimal way to form a group for RB allocation, where D2D as illustrated in (26). Constraint (27) means over one outgo-
communication links inside can be activated simultaneously. ing link exists if the coded packets (csi = 1 or dis = 1) are
Details for the illustration of the corresponding relay methods broadcasted by the relay node
can refer to [31]. We focus on the denoise and forward (DNF) 
scheme of PNC since it can well resist noise. csi + dis ≥ s
xi,j −1 (23)
We define S as the configuration of formulated link groups, j∈Vi+
and denote an integer variable ωs to illustrate the required 
number of time slots for activating a specific configuration s ∈ dis ≥ s
xi,j −1 (24)
S. Unicast, CNC and DNF-based transmissions are represented j∈Vi−

by the binary variables usi , csi , and dis , respectively. For a relay dis ≤ s
xi,j − usi − csi (25)
node i, Vi is a collection of relay node i’s associated nodes. If
j∈Vi−
node j ∈ Vi− or j ∈ Vi+ , it is an incoming or outgoing node of 
relay node i, respectively. The optimal group formation game
s
xi,j ≤ 1 + dis (26)
within one scheduling period can be modeled as follows: j∈Vi−
 
min ωs (18) 1+ s
xi,j  ≥ xi,j + ci + di .
s s s
(27)
s∈S j ∈Vi+ −{j}

subject to Next, we investigate the power constraint of different


transmission methods. For unicast transmission, the SINR
s
xi,j + xj,i
s
≤1 (19) constraint is shown as
usi + csi+ dis ≤1 (20)    
  Pj,j Gj,j + Mj,j
s
 1 − xj,j + Mj,j 1 − uj
s s s
s
xi,j ≤ 1 + 1 − usi (21) ⎡ ⎤
j∈V−{i}   
 s j ≥ Cj,j ⎣η + Ph,j Gh,j ush + Ph,BC Gh,j csh + dhs ⎦.
usi + csi + dis xi,j ωs Wi,j
s
≥ usi Yi h∈V−{j} h∈V−{j}
s∈S
 j,j   j,j
(28)
+ dis Yi + csi + dis Yi . (22)
j ∈Vi− −{j} j ∈Vi+ −{j}
In (28), Ph,BC represents the broadcast power on node h
for CNC or DNF. In order to ensure the decodability of the
The objective of the group formation game is to maximize destination nodes, the maximum power of Pi,j and Pi,j should
the achievable network throughput within one RB in NB-IoTs, be selected as the broadcast power of relay node i (Pi,BC ).
and itis equivalent to minimize the totally required activating s is a constant value, which equals to the summation of the
Mj,j 
time s∈S ωs by the comprehensive selection of relay method. right-side in (28). It guarantees the limitation of the cumulative
Constraint (19) is the half-duplex requirement, i.e., any node interference (generated by other concurrent transmission links)
cannot simultaneously receive and transmit packets. Constraint on destination node is below a threshold.
(20) illustrates merely one transmission pattern can be selected In the multiple access process of DNF, we employ the
by relay node i within one scheduling period. If the unicast minimum received power (min (Pj,i Gj,i , Pj ,i Gj ,i )) for SINR
1534 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 3, JUNE 2018

computation, and assume Pj,i Gj,i < Pj ,i Gj ,i without loss of A. Prune Edges
generality, the SINR constraint of multiple access in DNF can Generally speaking, UEs forward information to their
be shown as nearby neighbors with high rate, while to the farther neighbors
    with low rate. Thus, a large number of potential paths with
Pj,i Gj,i + Mj,i
s
1 − xj,i
s
+ Mj,i
s
1 − djs various transmission rates exist between the source and desti-
⎡ ⎤
  nation nodes. Since the computational complexity of the group

≥ Cj,i ⎣η + Ph,i Gh,i ush + Ph,BC Gh,i csh + dhs ⎦ formation increases sharply as the number of edges adds. In
h∈V−{j} h∈V−{j} the first step, we compute the k-shortest paths between one
(29) node and the other communication nodes according to Yen’s
algorithm [33]. Similar with [34], we set link cost as the recip-
where Mj,is is no less than the right part of (29). rocal of the maximum possible transmission link. It is obvious
The SINR constraint of node j for the broadcast process of that the selection of parameter k makes a tradeoff between
CNC and DNF methods can be demonstrated as computational speed and obtained network performance.
  
Pi,BC Gi,j + Mi,j
s
1 − xi,j
s
+ Mi,j
s
1 − csi − dis B. Problem Relaxation
⎡ ⎤ We relax the integer constraint of ωs to real value νs , and
  
≥ Ci,j ⎣η + Ph,j Gh,j ush + Ph,BC Gh,j csh + dhs ⎦. start to solve the formulated problem preliminary with S0 ∈ S.
h∈V−{i} h∈V−{i}
The objective of the relaxed optimization problem becomes

(30) min νs (31)
s∈S0
Thus, one schedule S within an RB contains such a col- subject to
lection of current configurations, i.e., s ∈ S, which can  s j
s , us , cs , d s , and trans-
be identified by binary variables xi,j i i i
usi + csi + dis xi,j νs Wi,j
s
≥ usi Yi
mission power. By constraints (23) to (30), we can make s∈S0
 j,j   j,j
sure the corresponding available relay method. Then, by con- + dis Yi + csi + dis Yi . (32)
straints (19) to (22), the minimum activation time slot can be
j ∈Vi− −{j} j ∈Vi+ −{j}
calculated. However, the corresponding link scheduling prob-
lem with fixed transmission rate has been acknowledged as The relaxed master problem in (32) can be solved by linear
an NP-complete problem [32]. In the next section, we pro- programming (LP), and we can obtain a preliminary optimal
pose a joint power control and relay selection heuristic to solution. After that, νs is restricted to an integer variable in
lower the computational complexity for group formation to the LP problem. If the optimal solution can be found, the
allocate RB. problem relaxation process terminates. Otherwise, the current
gained value is a lower bound of the optimal solution, and we
start to solve the slave problem.
V. J OINT P OWER C ONTROL AND R ELAY S ELECTION Denote ϑ as the dual variable of νs in (32), the reduced
H EURISTIC FOR G ROUP F ORMATION cost can be computed by (1 − xi,j s ϑ s ) according to the LP
i,j
We can observe that the high computational complexity theory [35]. In order to minimize νs in the master problem,
the value of xi,js ϑ s should be maximized in the slave problem,
of our formulated integer linear programming (ILP) problem i,j
mainly comes from two parts, i.e., relay method selection and i.e., (1 − xi,j ϑi,j
s s ) should be minimized. Therefore, during each

transmission power allocation. We notice that the formulated


s , with the most negative value of (1 − xs ϑ s ), is
iteration, ϑi,j i,j i,j
optimization problem can be solved approximately by some selected. If the reduced cost cannot be less than 0, the iteration
existing methods in polynomial time if the transmission rate terminates. Since the current slave problem still has binary and
can be fixed by power control. However, the number of link continuous variables, the next section presents a distributed
combinations with various transmission power is huge, not power control method to reduce the computation complexity
to mention the selection of different relay methods by link further.
scheduling. In this section, we present a joint power control
and relay selection heuristic (named as PORS), which consists C. Power Control
of the following four procedures. In order to relax power constraints in (28)–(30), we propose
1) Prune Edges: We first remove some extra-essential link a distributed power control-based scheme to select the D2D-
edges from graph G to reduce link searching space. enabled concurrent transmission links. On one hand, the link
2) Relaxation of the formulated ILP problem. with large transmission power can obtain a high rate. On the
3) Power Control: We then regulate transmission power to other hand, large transmission power brings high interference
join concurrent transmission links into the configuration to others and limits the concurrent transmissions of neigh-
iteratively. boring nodes. In order to increase link capacity in NB-IoTs,
4) Link Combination Selection: We propose a heuristic how to make a tradeoff between the number of concurrent
method to select link allocation combinations by jointly transmission links and the achievable link rates deserves to be
considering various communication factors. studied.
NING et al.: SAGA FRAMEWORK FOR INFORMATION DIFFUSION IN NB-IoT 1535

A straightforward way to balance transmission rate and spa- D. Link Combination Selection
tial reuse is to control the transmission power, so that the With the objective of increasing link capacity in NB-IoTs,
interference range can be limited to a special area. Our core utilizing all the possible coding opportunities at the relay node
concept is to join links into the configuration iteratively, so is not always effective. Instead, how to consider the interplay
that the interference among concurrent transmission links can among different relay methods and select the proper set of
be controlled. If the SINR constraint cannot be satisfied, the packets for coding deserves to be investigated. In this section,
corresponding link cannot join into the configuration. we study a link combination selection scheme by considering
At beginning, the initial link set in Configuration s is null. different communication factors for RB allocation.
With the objective of decreasing interference, the links are The information of coding opportunity, network cost, packet
selected to join into the configuration from the one with the size, channel condition, etc. has impact on the performance
best channel state. For one link, the channel state can be of group formation. Although the optimal solution can be
reflected by two factors, i.e., achievable SINR value and the obtained by checking all the group formations, it is time
ability of interference resistance. Interference range illustrates consuming on one hand; on the other hand, the coding
the distance, within which the SINR threshold can be reached opportunity of some packets in CNC and DNF may not
for the transmission link when other interference links also be overheard successfully, which would lower the overall
exist. Obviously, a larger SINR value accompanies with a throughput. Therefore, it is not always the best choice to
longer interference range, and it is tolerant to more interfer- encode as many packets as possible.
ence caused by concurrent transmission links. We define the For one scheduled node, the most important component is
link selection criteria as follows: to decide the combination of concurrent transmission links
  
Ci,j Gi,j with different relay method. First, the relay node checks all
li,j → arg max  . (33) the possible link combinations of the corresponding sched-
i,j∈V h∈V−{i} Gh,j
ule task. Then, we utilize the information of link rate, coding
When the first activated link is determined, the minimum opportunity, overhead, and packet size to determine the suit-
required transmission power is able combination of link transmissions, so that link capacity
Ci,j η can be increased by RB allocation in NB-IoTs. Due to the
Pi,j ≥ . (34) high computational complexity of the formulated optimiza-
Gi,j
tion problem in Section IV-C, a heuristic solution is leveraged
After that, we continue to add other links into the configu- to handle this issue. We define si as the sum achievable link
ration. According to link selection criteria, if another link lm,n rate by link combination, and the target of the optimal group
is supplemented into configuration s with transmission power formation game becomes
Psm,n , the corresponding interference generated by the newly

added link is min si (39)
Ij ≥ Psm,n Gm,j . (35) s∈S i∈V

To avoid the interruption of the current transmission links where


after new links are joined into Configuration s, the transmis- ⎧
sion power should be increased by at least ⎪
⎪ 2nC nC × L

⎪ csi × Ci,BC × C i × C i , if CNC

⎨ 2ni − 1 ni × LC + L
Ij Ci,j Pm,n Gm,j Ci,j
Pi,j = ≥ (36) si = nD nD × L
Gi,j Gi,j ⎪
⎪ dis × Ci,BC × D i × D i , if DNF

⎪ ni − 1 ni × LD + L
which sets a threshold on Psm,n , i.e., ⎪
⎩ s
ui × Ci,j × φ, others.

Pi,j Gi,j Pmax − Pi,j Gi,j (40)
Pm,n ≤ = . (37)
Gm,j Ci,j Gm,j Ci,j
In (40), the corresponding transmission rates for broadcast
The link selection problem can be transferred as maximizing and unicast are Ci,BC and Ci,j , respectively. For decod-
the SINR value at the destination node, i.e., ability, the broadcast power should be the maximum one
   
among all the unicast transmission power. [2nC i /(2ni − 1)]
C
Pmax − Pi,j Gi,j
li,j → arg max min . (38) and [ni /(ni − 1)] are the gains, respectively, achieved by
D D
m,n∈V−{i,j} i,j∈V Gm,j Ci,j Ij
CNC and DNF [36]. The number of nodes selected for
The iteration of supplementing unicast links into the con- conducting CNC and DNF is illustrated by nC D
i and ni , respec-
figuration continues until the transmission power of the newly tively. The number of concurrent activated links is denoted by
joined link exceeds Pmax or no more links need to be activated. φ, and unicast transmission corresponds to φ = 1. LC and
Since our presented PORS is distributed, the high compu- LD are extra header costs for the implementation of CNC and
tational complexity in constraints (28)–(30) can be largely DNF, respectively. Packet size is denoted by L. The combina-
decreased. After this section, one configuration with multi- tion of the three component in (40) illustrates the achievable
ple interference-free unicast links can be generated for current transmission rate in configuration s. Our presented metric is
transmission within one RB. different from the solution in [37], which only focuses on
1536 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 3, JUNE 2018

(a) (b) (c) (d)

Fig. 2. Performance comparisons in synthetic-based simulations. (a) Number of UEs in each group. (b) Outage probability ratio. (c) Throughput gain.
(d) Energy gain.

(a) (b) (c) (d)

Fig. 3. Performance comparisons in real trace-based simulations. (a) Number of UEs in each group. (b) Outage probability ratio. (c) Throughput gain.
(d) Energy gain.

the number of coding pairs in CNC. Instead, we take cod- we can acquire the corresponding information of physical
ing opportunity. network cost in CNC and DNF, multirate proximity.
transmission, and spatial reuse into consideration. In order to demonstrate the superiority of our SAGA, we
After Section V-A, we can eliminate some trivial links in consider both the heuristic method PORS and the D2D-
the network graph to increase searching ability. Section V-B enhanced information diffusion scheme in [12] (we call it
relaxes the formulated ILP problem in Section IV-C. In DIDS for convenience), and evaluate the following four
Section V-C, we can transform the joint power and rate con- performance indexes.
trol problem to a fixed link rate allocation problem. Then, 1) Average number of UEs in each group, which illustrates
Section V-D uses an opportunistic link combination scheme the average number of UEs in a multihop D2D chain
to solve the group formulation problem for RB allocation. within a group.
2) Outage probability ratio, which is the ratio of link trans-
mission that cannot satisfy the rate requirement among
VI. P ERFORMANCE E VALUATION all the intended transmission links.
Before providing performance analysis in this section, we 3) Average throughput gain, which is the ratio between
illustrate the experiment setup first, which consists of the the required time slots by merely employing cellular
setups of synthetic simulation and real trace-based simulation. scheduling and the counterpart by leveraging the studied
For synthetic simulation setup, up to 50 nodes are randomly group formation game.
distributed over a 500 m × 500 m area within a single cell. 4) Average energy gain, which illustrates the percent of
Data requests are generated uniformly between 6 and 10 Kbits. energy saving by implementing the designed group
The maximum coverage regions for cellular and D2D com- formation game comparing with cellular uploading only.
munications are 500 m and 100 m, respectively. Specifically, Figs. 2(a) and 3(a) demonstrate the average number of
we consider an urban microcell circumstance-based wireless UEs in each group in both synthetic and real trace-based
transmission model in WINNER II channel models [38]. We simulations. We can observe that the number of UEs within
set the weighting factors of the three social-oriented submet- each group increases as the number of UEs adds in the cell,
rics equal to (1/3), and carrier frequency equal to 2.1 GHz. In which means UEs have more opportunities to be formulated
our simulation, α = 1, β = (ln(0.1)/12.5), and η = 10−6 mW into one group for current transmission. Both SAGA and
according to [26]. PORS outperform DIDS, especially when the number of UE
For real trace-based simulation setup, we use SIGCOMM09 is large. This is mainly because our method jointly considers
data set [39] for performance evaluation. It includes the infor- the interplay among different relay methods in D2D-enabled
mation of social and contact among 100 UEs generated by cell communications, which can activate more concurrent trans-
phones, and users log onto Facebook to obtain their interests mission links and have a better utilization of spectrum reuse.
and profiles. By the analysis of contact records among UEs, Besides, DIDS focuses on minimizing the diffusion time of
NING et al.: SAGA FRAMEWORK FOR INFORMATION DIFFUSION IN NB-IoT 1537

content transmission for emergency circumstance, while our scheduling and power control. Performance evaluations based
solution concentrates on RB allocation in D2-D-based NB- on both synthetic and real trace simulation results illustrate the
IoTs. Furthermore, since the searching space of the heuristic superiority of our present scheme in group efficiency, outage
algorithms (i.e., PORS and DIDS) is limited, the performance probability, throughput gain, and energy efficiency.
gap between SAGA and them enlarges as the number of UEs
increases. A PPENDIX
Performances of average outage probability ratio versus the Theorem 1: The double auction-based scheme proceeds until
number of UEs are shown in Figs. 2(b) and 3(b). As the num- the gained profits by the source and relay nodes are negative,
ber of UEs increases, these three schemes can reduce link which should satisfy: Ujbid ≥ Liask .
outage probabilities significantly by D2-D-enabled coopera-
Proof: Since Ujbid ≥ Liask according to (11) and (12), it
tive transmission. Both SAGA and PORS have lower outage
is obvious that
probabilities than DIDS, which shows the effectiveness of 
our presented incentive group formation for RB allocation. Uj 1 − mj ≥ Li (1 + mi ). (41)
Because a win-win situation can be gained by our method,
more intermediate UEs are inclined to participate in the Thus, we can get the result that
double-auction game, so that more opportunities can be found Uj − Li ≥ Uj × mj + Li × mi . (42)
for packet forwarding. Thus, the outage probability can be
largely decreased. According to (11), (12), and (17), we can find that
In Figs. 2(c) and 3(c), we can observe that the achieved Ujbid + Liask
average network throughput gain by SAGA is around 10% Payj = Uj −
higher than that in DIDS. Although both networking and  2
Uj 1 − mj ≥ Li (1 + mi )
sociality-based metrics have been considered in DIDS, our = Uj −
method not only considers various relay methods, but also 2
Uj − Li + Uj × mj − Li × mi
studies the interplay among transmission rate and interfer- = . (43)
ence. We note that PORS can approach the performance gained 2
by SAGA effectively with low computational complexity, the According to (33), we can obtain that
minor degradation mainly comes from the searching space Uj − Li + Uj × mj − Li × mi
reduction, and the relaxation of relay method selection and Payj =
2
transmission power. Uj × mj + Li × mi + Uj × mj − Li × mi
The performances of energy gain obtained by different num- ≥
2
ber of UEs have been illustrated in Figs. 2(d) and 3(d). It is = Uj × mj ≥ 0. (44)
obvious that by both D2-D and relay-based communications,
Similarly, the conclusion is
the obtained energy gains increase constantly. It is noted that,
at the beginning, the increase of energy gain keeps almost Reci ≥ Ii × mi ≥ 0. (45)
linear as the number of UEs enhances. When the amount of
UEs adds up to a certain degree, there are plenty of opportuni- Thus, a win-win situation can be achieved by our
ties for source and relay nodes selection in the double auction method.
game, and the curves become stable. Since our method encour-
ages long-term transmission links to be conveyed by multihop R EFERENCES
short range transmissions, it can effectively avoid long-range [1] Z. Ning et al., “A cooperative quality-aware service access system for
transmissions and strong interference among UEs, so that high social Internet of vehicles,” IEEE Internet Things J., to be published,
doi: 10.1109/JIOT.2017.2764259.
energy gain can be obtained. [2] W. Hou, Z. Ning, L. Guo, Z. Chen, and M. S. Obaidat,
“Novel framework of risk-aware virtual network embedding in
optical data center networks,” IEEE Syst. J., to be published,
VII. C ONCLUSION doi: 10.1109/JSYST.2017.2673828.
[3] M. H. Hajiesmaili, L. Deng, M. Chen, and Z. Li, “Incentivizing
The implementation of NB-IoT is still in its infancy, how device-to-device load balancing for cellular networks: An online auc-
to guarantee link connectivity and provide high link capacity tion design,” IEEE J. Sel. Areas Commun., vol. 35, no. 2, pp. 265–279,
Feb. 2017.
is challenging. In this paper, we first present a D2-D-enabled [4] H. Zhou, J. Chen, H. Zheng, and J. Wu, “Energy efficiency and contact
communication framework for NB-IoTs by encouraging UEs opportunities tradeoff in opportunistic mobile networks,” IEEE Trans.
to upload information with a cooperative manner. Then, we Veh. Technol., vol. 65, no. 5, pp. 3723–3734, May 2016.
[5] J. Chen et al., “Narrow-band Internet of Things: Implementations
propose a social-aware D2-D-enabled relay selection method and applications,” IEEE Internet Things J., to be published,
for information uploading to the eNodeB. After that, we study doi: 10.1109/JIOT.2017.2764475.
a group formation game to activate concurrent transmission [6] Y.-P. E. Wang et al., “A primer on 3GPP narrowband Internet of Things,”
IEEE Commun. Mag., vol. 55, no. 3, pp. 117–123, Mar. 2017.
links for RB allocation. Since the computational complexity [7] Z. Ning, F. Xia, X. Hu, Z. Chen, and M. S. Obaidat, “Social-oriented
of the formulated problem is rather high, we propose a novel adaptive transmission in opportunistic Internet of smartphones,” IEEE
heuristic scheme to solve the studied problem iteratively by Trans. Ind. Informat., vol. 13, no. 2, pp. 810–820, Apr. 2017.
[8] A. I. Sulyman, S. M. A. Oteafy, and H. S. Hassanein, “Expanding
comprehensively investigating the interplay between transmis- the cellular-IoT umbrella: An architectural approach,” IEEE Wireless
sion rate and relay method, and relaxing the constraints of link Commun., vol. 24, no. 3, pp. 66–71, Jun. 2017.
1538 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 3, JUNE 2018

[9] X. Kong, F. Xia, J. Wang, A. Rahim, and S. K. Das, “Time-location- [32] J. El-Najjar, H. M. K. AlAzemi, and C. Assi, “On the interplay between
relationship combined service recommendation based on taxi trajectory spatial reuse and network coding in wireless networks,” IEEE Trans.
data,” IEEE Trans. Ind. Informat., vol. 13, no. 3, pp. 1202–1212, Wireless Commun., vol. 10, no. 2, pp. 560–569, Feb. 2011.
Jun. 2017. [33] J. Y. Yen, “An algorithm for finding shortest routes from all source nodes
[10] Z. Ning, F. Xia, N. Ullah, X. Kong, and X. Hu, “Vehicular social net- to a given destination in general networks,” Quart. Appl. Math., vol. 27,
works: Enabling smart mobility,” IEEE Commun. Mag., vol. 55, no. 5, no. 4, pp. 526–530, 1970.
pp. 49–55, May 2017. [34] J. J. Gálvez and P. M. Ruiz, “Joint link rate allocation, routing and
[11] L. Militano, A. Orsino, G. Araniti, A. Molinaro, and A. Iera, “A channel assignment in multi-rate multi-channel wireless networks,” Ad
constrained coalition formation game for multihop D2D content upload- Hoc Netw., vol. 29, no. 6, pp. 78–98, 2015.
ing,” IEEE Trans. Wireless Commun., vol. 15, no. 3, pp. 2012–2024, [35] D. G. Luenberger and Y. Ye, Linear and Nonlinear Programming, vol. 2.
Mar. 2016. New York, NY, USA: Springer, 1984.
[12] G. Araniti, A. Orsino, L. Militano, L. Wang, and A. Iera, “Context-aware [36] H. Su and X. Zhang, “Modeling throughput gain of network coding in
information diffusion for alerting messages in 5G mobile social net- multi-channel multi-radio wireless ad hoc networks,” IEEE J. Sel. Areas
works,” IEEE Internet Things J., vol. 4, no. 2, pp. 427–436, Apr. 2017. Commun., vol. 27, no. 5, pp. 593–605, Jun. 2009.
[13] Y. Cao, T. Jiang, X. Chen, and J. Zhang, “Social-aware video multi- [37] H. Yomo and P. Popovski, “Opportunistic scheduling for wireless
cast based on device-to-device communications,” IEEE Trans. Mobile network coding,” IEEE Trans. Wireless Commun., vol. 8, no. 6,
Comput., vol. 15, no. 6, pp. 1528–1539, Jun. 2016. pp. 2766–2770, Jun. 2009.
[38] J. Meinilä, P. Kyösti, T. Jämsä, and L. Hentilä, “Winner II channel mod-
[14] C. Gao et al., “Impact of selfishness in device-to-device communication
els,” in Radio Technologies and Concepts for IMT-Advanced. Hoboken,
underlying cellular networks,” IEEE Trans. Veh. Technol., vol. 66, no. 10,
NJ, USA: Wiley, 2009, pp. 39–92.
pp. 9338–9349, Oct. 2017.
[39] J. Scott et al. (2009). Crawdad Trace Cambridge/
[15] F. Wang, Y. Li, Z. Wang, and Z. Yang, “Social-community-aware
Haggle/Imote/Infocom2006 (v.2009-05-29). [Online]. Available:
resource allocation for D2D communications underlaying cellular net-
https://www.crawdad.org/uoi/haggle/20160828/
works,” IEEE Trans. Veh. Technol., vol. 65, no. 5, pp. 3628–3640,
May 2016.
[16] R. Zhang, M. Wang, X. Shen, and L.-L. Xie, “Probabilistic analysis Zhaolong Ning (M’14) received the M.S. and Ph.D.
on QoS provisioning for Internet of Things in LTE-A heterogeneous degrees from Northeastern University, Shenyang,
networks with partial spectrum usage,” IEEE Internet Things J., vol. 3, China.
no. 3, pp. 354–365, Jun. 2016. He was a Research Fellow with Kyushu
[17] L. Wang, H. Tang, H. Wu, and G. L. Stüber, “Resource allocation University, Fukuoka, Japan. He is an Assistant
for D2D communications underlay in rayleigh fading channels,” IEEE Professor with the School of Software, Dalian
Trans. Veh. Technol., vol. 66, no. 2, pp. 1159–1170, Feb. 2017. University of Technology, Dalian, China. He has
[18] Y. Zhang, J. Zheng, P.-S. Lu, and C. Sun, “Interference graph con- authored or co-authored over 70 technical papers in
struction for cellular D2D communications,” IEEE Trans. Veh. Technol., international journals and conferences. His current
vol. 66, no. 4, pp. 3293–3305, Apr. 2017. research interests include social computing, Internet
[19] R. Deng, Y. Zhang, S. He, J. Chen, and X. Shen, “Maximizing network of Things, and big data.
utility of rechargeable sensor networks with spatiotemporally coupled
constraints,” IEEE J. Sel. Areas Commun., vol. 34, no. 5, pp. 1307–1319,
May 2016. Xiaojie Wang (S’16) received the M.S. degree
[20] Y. Liu, R. Wang, and Z. Han, “Interference-constrained pricing for D2D from Northeastern University, Shenyang, China, in
networks,” IEEE Trans. Wireless Commun., vol. 16, no. 1, pp. 475–486, 2011. She is currently pursuing the Ph.D. degree
Jan. 2017. at the School of Software, Dalian University of
[21] M. A. Alim, T. Pan, M. T. Thai, and W. Saad, “Leveraging social Technology, Dalian, China.
communities for optimizing cellular device-to-device communications,” From 2011 to 2015, she was a Software Engineer
IEEE Trans. Wireless Commun., vol. 16, no. 1, pp. 551–564, Jan. 2017. with the NeuSoft Corporation, Shenyang. Her cur-
[22] Y. Cao, T. Jiang, and C. Wang, “Cooperative device-to-device commu- rent research interests include vehicular social net-
nications in cellular networks,” IEEE Wireless Commun., vol. 22, no. 3, works and network security.
pp. 124–129, Jun. 2015.
[23] A. Asadi, Q. Wang, and V. Mancuso, “A survey on device-to-device
communication in cellular networks,” IEEE Commun. Surveys Tuts.,
vol. 16, no. 4, pp. 1801–1819, 4th Quart., 2014.
[24] L. Guardalben, T. Gomes, P. Salvador, and S. Sargento, “Improving Xiangjie Kong (SM’16) received the Ph.D. degree
MAC layer association through social-based metrics in mobile net- from Zhejiang University, Hangzhou, China.
works,” IEEE Commun. Mag., vol. 50, no. 6, pp. 91–98, Jun. 2012. He is currently an Associate Professor with
the School of Software, Dalian University of
[25] Y. Li and A. Ephremides, “A joint scheduling, power control, and routing
Technology, Dalian, China. He has authored or co-
algorithm for ad hoc wireless networks,” Ad Hoc Netw., vol. 5, no. 7,
authored over 50 scientific papers in international
pp. 959–973, 2007.
journals and conferences. His current research inter-
[26] T. C.-Y. Ng and W. Yu, “Joint optimization of relay strategies and ests include big traffic data, social computing, and
resource allocations in cooperative cellular networks,” IEEE J. Sel. Areas mobile computing.
Commun., vol. 25, no. 2, pp. 328–339, Feb. 2007.
[27] Y. Li, C. Liao, Y. Wang, and C. Wang, “Energy-efficient optimal
relay selection in cooperative cellular networks based on double auc-
tion,” IEEE Trans. Wireless Commun., vol. 14, no. 8, pp. 4093–4104,
Aug. 2015. Weigang Hou (M’13) received the Ph.D. degree
[28] R. B. Myerson and M. A. Satterthwaite, “Efficient mechanisms for in communication and information systems from
bilateral trading,” J. Econo. Theory, vol. 29, no. 2, pp. 265–281, 1983. Northeastern University, Shenyang, China, in 2013.
[29] B. Cao, X. Sun, Y. Li, C. Wang, and H. Mei, “Understanding the He is currently an Associate Professor with
impact of employing relay node on wireless networks,” IEEE Trans. the School of Computer Science and Engineering,
Veh. Technol., vol. 66, no. 5, pp. 4287–4299, May 2017. Northeastern University, Shenyang. His current
[30] M. W. Baidas and M. S. Bahbahani, “Game-theoretic modeling and research interests include Internet of Things, opti-
analysis of relay selection in cooperative wireless networks,” Wireless cal network + traffic grooming, optical network +
Commun. Mobile Comput., vol. 16, no. 5, pp. 500–518, 2016. SDN, optical network + cloud data center, and opti-
[31] Z. Ning, Q. Song, L. Guo, Z. Chen, and A. Jamalipour, “Integration cal network + chip. He has authored or co-authored
of scheduling and network coding in multi-rate wireless mesh net- over 100 technical papers in international journals
works: Optimization models and algorithms,” Ad Hoc Netw., vol. 36, and conferences in the above areas.
pp. 386–397, Jan. 2016. Dr. Hou is a member of the OSA.

Вам также может понравиться