Next Article in Journal
Analyzing Sensor-Based Time Series Data to Track Changes in Physical Activity during Inpatient Rehabilitation
Next Article in Special Issue
Sensor-Data Fusion for Multi-Person Indoor Location Estimation
Previous Article in Journal
Ag-Modified In2O3 Nanoparticles for Highly Sensitive and Selective Ethanol Alarming
Previous Article in Special Issue
An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Smart Bandwidth Assignation in an Underlay Cellular Network for Internet of Vehicles

by
Idoia De la Iglesia
1,2,*,
Unai Hernandez-Jayo
1,2,
Eneko Osaba
1,2 and
Roberto Carballedo
1,2
1
DeustoTech-Fundacion Deusto, Deusto Foundation, Av. Universidades, 24, 48007 Bilbao, Spain
2
Facultad Ingeniería, Universidad de Deusto, Avda. Universidades, 24, 48007 Bilbao, Spain
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(10), 2217; https://doi.org/10.3390/s17102217
Submission received: 31 August 2017 / Revised: 18 September 2017 / Accepted: 25 September 2017 / Published: 27 September 2017
(This article belongs to the Special Issue Next Generation Wireless Technologies for Internet of Things)

Abstract

:
The evolution of the IoT (Internet of Things) paradigm applied to new scenarios as VANETs (Vehicular Ad Hoc Networks) has gained momentum in recent years. Both academia and industry have triggered advanced studies in the IoV (Internet of Vehicles), which is understood as an ecosystem where different types of users (vehicles, elements of the infrastructure, pedestrians) are connected. How to efficiently share the available radio resources among the different types of eligible users is one of the important issues to be addressed. This paper briefly analyzes various concepts presented hitherto in the literature and it proposes an enhanced algorithm for ensuring a robust co-existence of the aforementioned system users. Therefore, this paper introduces an underlay RRM (Radio Resource Management) methodology which is capable of (1) improving cellular spectral efficiency while making a minimal impact on cellular communications and (2) ensuring the different QoS (Quality of Service) requirements of ITS (Intelligent Transportation Systems) applications. Simulation results, where we compare the proposed algorithm to the other two RRM, show the promising spectral efficiency performance of the proposed RRM methodology.

1. Introduction

Cooperative driving is expected to provide advance services in order to increase road safety, improve traffic management and create different new business opportunities for mobility services. In this way, the automobile industry is expected to increase their profit margin of Euro 54 billion in 2012 to Euro 79 billion by 2020 [1].
In the scenario of ITS, cooperative vehicular systems are a key factor not only to report information to the drivers in real time but also to gather accurate information about the traffic flow and events that occur during driving. Then, vehicles in a VANET can be considered as moving nodes that can address FCD (Floating Car Data), thanks to the creation of V2V and Vehicle-to-Infrastructure (V2I or I2V) links, giving rise to -ITS (Cooperative-ITS) [2]. In this context, the evolution of the Internet of Things (IoT) paradigm into new application scenarios as VANETs, introduced the definition of new terms such as Internet of Vehicles (IoV) [3] , creating a development framework that requires specific QoS attributes, as very a low latency to provide fast response to the events on the road [4].
Then, moving the concept of IoT into IoV , we find an ecosystem where vehicles (cars, trucks, motorbikes) and elements of the infrastructure (signals, sensors, actuators, etc.), besides pedestrians in an urban scenario, are interconnected thanks to an IP-based communication platform. Therefore, all these nodes (static and in movement at very different relative speeds) can generate, aggregate, consume and exchange information directly (using device-to-device communications) or indirectly (through a traffic management center, for example), with the goal of resolving different kinds of events, to result in providing a more safe, efficient and eco-friendly Intelligent Transport Systems.
As a result of this information exchange, vehicles can benefit from the information which might have been generated not only by surrounding information sources (sensors located on the road, elements of the infrastructure) but even by other vehicles that are located at a certain distance, for example, to obtain information about the traffic density on the road.
Nevertheless, a cooperative vehicular scenario like this must face multiple communication challenges, such as the adverse propagation conditions, high vehicles’ mobility pattern and their unpredictable direction of motion, not to mention the limited communication resources. Then, the technologies adopted to provide the communication architecture are a key factor that determine the performance of the network. Two candidate technologies are competing to enable V2X (Vehicle-to-Everything) communications: IEEE 802.11p and cellular network communications. Although IEEE 802.11p was specifically designed for V2X communications and to cater for ITS applications, it suffers from certain technical limitations. The main identified deficiency is poor performance in high vehicle density scenarios resulting from the MAC (Medium Access Control) layer implementation based on a regular IEEE 802.11 CSMA (Carrier Sense Multiple Access). Moreover, it does not guarantee the QoS which is essential to fulfill the different performance requirements of ITS applications [5,6].
In the scope of cellular networks, LTE-A supports D2D (Device-to-Device) functionality since 3GPP Rel.12, so it has already been tested in other IoT scenarios where nodes are static with the aim of maximizing the energy efficiency of the nodes. However, this technology was not meant to meet stringent V2X requirements in terms of latency, reliability and mobility. These limitations have motivated the research community to investigate cellular-based V2X communications. Additionally, D2D systems offer four different types of gain, i.e., proximity gain, hop gain, pairing gain and reuse gain. Based on these advantages, the applicability of D2D techniques for V2V communications has been analyzed in different works, such as [7]. In particular, there has been a reuse of gain stems from the fact that D2D and cellular links can share the same radio resources. Thus, in a D2D underlay cellular infrastructure, the same resources can be simultaneously utilized by the V-UE (Vehicular User Equipment) involved in V2V communication and by the ordinary C-UE (Common User Equipment), that is, a regular mobile user. This could improve the utilization of cellular spectrum and reduce the energy consumption of V2V communications. However, the reuse gain comes at the expense of increased interference level what in turn has to be neatly controlled by the network. In this context, the design of an efficient RRM for V2V communications which underlays the cellular network with minimal impact on cellular communications is a key problem. Therefore, efficient RRM is indisputably an element of paramount importance for deploying ITS applications with different QoS requirements.
Consequently, the motivation of this paper is to design an underlay RRM capable of improving cellular spectral efficiency while trying not to affect the performance of C-UEs’ communications. In this way, one of the contribution of this paper is that we design a three-step methodology to, first, mitigate the interferences generated by sharing radio resources between C-UEs and V-UEs and, secondly, to ensure the QoS requirements for the transmission of CAMs (Cooperative Awareness Messages) by vehicles. In this methodology, we, first, calculate which are the possible C-UE-V-UE pairs that could share radio resources; then, we define the transmission powers that satisfy both transmitters QoS requirements; and finally, using a metaheuristic, which gives an additional originality to our study, we select the pairs that allow us to provide a more efficient radio resource assignment than the RRMs we are comparing them against.
In addition, the main innovation of this paper is that, before applying the presented RRM, we organize the vehicles in clusters to reduce infrastructure connections and improve radio efficiency. That is, we understand each cluster as a moving zone to whom we assign variable-size pools depending on the transmission needs of vehicles of each cluster. In this way, the CH is the vehicle in charge of asking for resources to the infrastructure and distributing them among the CMs (Cluster Members). Therefore, the novelty of our proposal arises from how we allocate resources among V2X clusters with a presence of non-V2X UE (User Equipment)on the same bandwidth.
In the remaining sections, the paper is organized as follows. In Section 2, a literature review about RRM for D2D and V2V communications is presented. Section 3 presents the system model and problem definition. Next, Section 4 explains the Radio Resource Allocation procedure and Section 5 the simulation conditions and results obtained to validate our proposal. Finally, Section 6 presents a discussion about results and Section 7 presents the paper’s conclusions.

2. Literature

D2D communications have been proposed to allow nearby users to communicate with each other without passing through the infrastructure. It has enabled the devices to transmit at higher data rates, with lower power consumptions, lower latencies and improved spectral efficiency. Based on these advantages, the applicability of D2D techniques for V2V communications has been analyzed in different works, such as [7,8]. Khelil et al. [8] evaluated the suitability of existing D2D techniques for V2V communications and concluded that, in order to meet the stringent QoS of ITS applications, a careful adaption of the legacy D2D concepts is necessary to exploit them in the road safety domain.
A similar understanding prevails among the 3GPP community. As a consequence, in December 2015 a WI (Work Item) was approved [9] whose primarily goal was to standardize V2V system operating on the basis of LTE sidelink. D2D, specified in 3GPP Release 12 and 13, has been chosen to serve as a core technology but numerous areas for enhancement have been identified with the aim to fulfill V2V requirements. The most straightforward aspects that distinguish V2V from the pure D2D are related to the V-UEs’ velocity, the density of V-UEs and to the latency constraints. For example, one of the objectives of the V2V WI was to develop a solution capable of supporting relative velocities of up to 500 kph what inevitably implied changes to the physical layer structure. To cater for such rigorous requirements, reference signals’ density in time has been doubled in comparison to the legacy D2D. Other issues addressed in the course of this WI include, e.g., partitioning the relevant area into the zones with associated resource pools, targeted at minimizing the interference level and mitigating the “near-far” effect, or standardizing SPS (Semi-Persistent Scheduling) for sidelink transmissions in order to effectively serve a periodical part of V2V traffic. According to the official time-line, the WI is on the verge of completion (i.e., approval at September’s 3GPP RAN Plenary meeting), at least with respect to the feature subset concerning UE autonomous resource selection (so-called “Mode 2”).
Inside the extensive research carried out in the context of traditional D2D systems, e.g., [10,11,12] to refer to a few relevant papers, the work presented in [13] offers an excellent introduction to the underlay RRM problem. In this paper, authors propose an RRM solution which performs admission control and power allocation for each admissible D2D pair and its potential C-UE partners. Once they get all the admissible pairs and their corresponding power levels, they apply a maximum weight bipartite matching to define the final pairs.
Focusing our attention on V2X communications, Cheng et al. [7] study the coexistence of V2I and V2V communications in a D2D underlay mode and conclude that D2D in ITS exhibit transmission rate advantage with respect to the traditional V2V-only mode, the V2I-only mode, or the V2V overlay mode. Nevertheless, only a few studies have applied this underlay mode possibility to vehicular environments [7,8,14,15,16,17].
Botsov et al. [14] solve the interference problem originating from the reuse gain by dividing the cell coverage area into zones and assigning a pool of resources to each zone. With such approach, they guarantee a maximum acceptable interference level caused by C-UE in the V2V underlay. However, it suffers from a lack of scalability, it does not consider QoS requirements and its performance depends entirely on the zone definition and associated pool assignment. Xing et al. [15], instead of dividing the coverage area into zones and assigning pools, group together the road vehicles into multiple clusters. In their approach, each uplink resource can be allocated to only one cluster, that is, the number of resources that are reused by vehicles is in fact equal to the amount of clusters. As a result, they accomplish their primary aim which was to minimize the cellular radio resources consumption, but their approach does not satisfy QoS requirements for ITS applications deployment.
In traditional D2D systems, the performance objectives have typically been to maximize the overall network throughput of the existing C-UEs and admissible D2D pairs and to prioritize cellular links [11,18]. However, in vehicular environments most of the messages are relatively small and they have very strict requirements in terms of latency and reliability. Thus, the aforementioned performance will not be fulfilled for the deployment of ITS applications and, additionally, a number of other performance objectives have to be defined [16,17]. Wanlu et al. [17] propose an analytical method to transform latency and reliability requirements of V2V safety applications into optimization constraints. However, this concept does not consider the QoS requirements of other ITS applications. Ren et al. [16] study two different power control problems: (1) SPC (Sum Rate Oriented Power Control) aimed at maximizing the sum rate of all V2V links associated with infotainment services and (2) MPC (Minimum Rate Oriented Power Control) attempting to maximize the minimum achievable rate among all V2V links corresponding to the active safety applications which usually rely on small, fixed-size packets. Although in this approach the authors assume vehicles will spontaneously form clusters while traveling along the highway, they do not leverage the opportunities offered by clustering as they do not tie them with the resource reuse mechanism.
Once the performance objectives are defined, methodologies have to work out the RBAP (Resource Block Assignation Problem). Throughout history, it could be said that the most used method for solving the RBAP is the HA (Hungarian Algorithm) [19]. The HA is a combinatorial optimization algorithm originally designed for addressing assignment problems in a polynomial time. In this sense, it is interesting to point out that the HA is a deterministic algorithm. This method has been applied to RBAP problems in works such as [13,17] or [20]. Furthermore, HA has been applied in other fields such as transport [21] or economics [22]. In addition to the HA, some other alternatives have been proposed in the literature for solving similar problems as the RBAP. In [23], for example, two different methods are presented, the first one based on dynamic programming, and the second one consisting on a greedy algorithm. On the other hand, in [23], a distributed dynamic spectrum protocol is developed.
Although, as can be seen in the literature, HA is the most used algorithm for solving RBAP, this method presents some drawbacks. First of all, HA is an exact approach with a high complexity for large scenarios. Additionally, as it has been mentioned before, HA is a deterministic method. This is not a disadvantage by itself, but as it is demonstrated below, the presence of some randomness leads to higher quality solutions. There are many algorithms in the scientific community which base their execution on the application of some kind of randomness. Arguably, heuristics and metaheuristics [24] are the most used and well-known methods that can be classified in this group. Concretely, we have decided to use a metaheuristic for the resolution of the RBAP. A metaheuristic is an optimization technique that solves a specific problem using only general information and knowledge common to a wide variety of optimization problems with similar characteristics. Furthermore, metaheuristics explore the solution space in order to achieve good optimization results with independence of the problem. In this sense, the main reason of the utilization of a metaheuristic is its adaptability, and its easy implementation. Additionally, metaheuristics are flexible techniques, and their efficiency has been proved in a wide range of fields [25].
To summarize this section, we propose a more comprehensive methodology for underlaying RRM than the works presented hitherto in the literature. Accordingly, we organize vehicles in clusters because instead of assigning fixed radio resource pools to static zones as in [14] do, variable-size pools are assigned to moving vehicle clusters. Therefore, as we explained at the end of the Introduction section, the novelty of our proposal emerges from how we allocate radio resources among V2X clusters with a presence of non-V2X UE on the same bandwidth. In this way, in our proposal the CH is in charge of asking for resources for all the vehicles of the cluster and, then, distribute the resource polls among them. Finally, and to the best of our knowledge, it is interesting to point out that this is the first time in the literature that the presented kind of metaheuristic is utilized for solving this RBAP, which gives an additional originality to our study.

3. Problem Definition

In this section, we first introduce the system model and, then, the resource allocation problem for V2V communication inside vehicular clusters is formulated.

3.1. System Model

The scope of this work is focused on how radio resources can be reused for V2V communications underlying cellular network, where in M V2V communications coexist with N cellular C-UE communications. In this system, C-UEs and V-UEs share the available uplink resources and only V-UEs utilize D2D communications.
Through our research, we propose to share uplink resources as the interference generated on the cellular links affects only to the eNodeB-side which is assumed to possess advanced signal processing capabilities to mitigate such detrimental phenomena. Furthermore, the interference suffered by the V2X links can be handled through spatial separation. On the other hand, if the downlink reuse was implemented, the transmission from the eNodeB could have serious negative impacts on the V-UE receivers, because it could violate the reliability requirement of safety applications, which are the main focus of this paper. Additionally, most of the existing studies consider the UL (uplink) resources to support D2D communications since there are some regulatory restrictions in certain regions for reusing the DL (downlink) resources [26].
The proposed system, shown in Figure 1, can be decomposed into three main components: (i) users; (ii) scenario and (iii) network systems, whose properties vary over a number of dimensions. There are two different type of users: (1) C-UEs which are the typical cellular users and (2) V-UEs which are the vehicles. These users move in the given scenario and have access to network infrastructure resources, called RBs (Resource Blocks). They use these RBs to send their messages to other users but, depending on the type of user and the type of message, they send them though the network infrastructure or directly, by means of V2V communication link.
One feature of our proposal is that V-UEs are organized into clusters. Considering that clustering is a technique for grouping devices in the geographical vicinity to make the network more robust and scalable, it is very common in VANETs to find vehicles organized in clusters for deploying ITS applications. These clusters are usually defined based on some common characteristics such as vehicle movement, velocity, direction or transmission range, among others [27].
In our proposed method, as the clustering creation is not the aim of our research, we define a simple centralized clustering algorithm based on the vehicle with the highest number of neighbor vehicles, meaning a neighboring vehicle in its coverage area. The steps to define the CHs, and then, the CMs, are represented by means of Algorithm 1. Therefore, using the information about the V-UEs’s position which is known by a central server (called GeoServer), our algorithm organizes V-UEs into clusters. Each cluster is formed by one CH, which is the most famous vehicle, and some CMs, its neighbors.
Algorithm 1: Clustering algorithm.
Sensors 17 02217 i001
At this point, each cluster is formed by one CH and some CMs. The CH is responsible of updating the infrastructure with relevant information of the cluster and updating its CMs with relevant information received from the infrastructure. In this way, the novelty of this clustering strategy comes from the fact that in this case, instead of each V-UE requests for resources to the eNodeB, the CH (Cluster Head) is the user in charge of requesting RB for all its CMs’ transmissions.
Therefore, let R B t : = { r b 1 , r b 2 , , r b k } be the set of uplink orthogonal RBs that could be assigned in one frame. This R B t set of orthogonal RBs is divided into different resource pools, R P t : = { r p 1 , r p 2 , , r p k } , where each r p x is formed by a variable number of RBs depending on the existing transmission requirements.
Formally, the set of C-UEs, V-UEs and clusters in the scenario at time interval t can be define as C t : = { c 1 , c 2 , , c n } , V t : = { v 1 , v 2 , , v m } and C L U t : = { c l u 1 , c l u 2 , , c l u j } , respectively. During the observation or simulation period, additional users may join or leave the scenario, subject to their routes, which may vary with V-UEs’ and C-UE’ densities over time and space. In addition, the properties of the scenario impact users’ mobility and communications’ reliability.
Furthermore, the network system comprises the cellular infrastructure and GeoServer which manages the creation and maintenance of clusters and where some ITS applications are implemented, e.g., congestion prediction, planning of routes, etc.

3.2. Problem Formulation

This paper addresses an efficient radio resource assignment in an underlay cellular network where V-UEs communications coexist with cellular C-UEs communications. We denote this assignment efficient because we aim for improving the spectral efficiency of the underlay network by maximizing the number of users served with the minimum number of radio resources.
In the same way as in [16], we study two different resource sharing situations: (1) SPC when V-UE asks for an infotainment transmission and (2) MPC for safety, management and efficiency ITS applications transmissions. However, in this paper we will focus only on transmission on CAM transmissions, which follow the second situation. We decided to center this research in CAMs because information distributed by CAM Management is commonly used by related use cases, e.g., Approaching Emergency Vehicle or Slow Vehicle Warning, and therefore the CAM Management is a mandatory facility [28].
Therefore, we will have a multi-objective optimization problem with two different terms: one related with C-UE optimization conditions and the other one associated to CAM transmissions QoS requirements. The first term is defined by the maximization of C-UE’s sum-rate Equation (1), which is a common performance requirement.
T h C U E = n = 1 N log 2 ( 1 + ε n c )
being ε n c the SINR (Signal-to-Interference-plus-Noise Ratio) of the C-UE-eNodeB link.
On the other hand, CAM’s QoS requirements can be defined as a MPC problem, so the other term of the optimization problem is defined by Equation (2)
T h D 2 D = m i n k ϵ { 1 , , M } log 2 ( 1 + ε m d )

4. Methodology

In this section, we introduce the RRM methodology proposed in this paper to improve the spectral efficiency of users’ communications. The main problem it has to resolve is to optimize the spectral efficiency being capable of mitigating the interferences and ensuring the different QoS requirements of ITS applications.
Therefore, with the intention of solving the overall problem, we divide the main one into three subproblems, which are shown in Figure 2.
  • Pairing Problem: The first one is the pairing problem, in which in order to determine if a C-UE and a V-UE can share the same RB to transmit their messages, we calculate the minimum distance there should be between a C-UE and a V-UE transmitter to mitigate the interference. Knowing this distance, the eNodeB can select which are all the possible pairs.
  • Transmission Power Allocation: After solving the pairing problem, we continue with the second subproblem which is the transmission power assignation for each possible pair of C-UE and V-UE transmissions. Thereby, we have a bipartite graph with all the possible pairs with their respective transmission powers. With this transmission powers, it is easy to calculate the achievable throughput of the pair of communications which will be considered the weight of each pair in the bipartite graph.
  • RB Assignation: Having reached this point, we move to the third subproblem, where we end up with the RB assignation. To solve this combinatorial optimization subproblem we have design a specific parallel meta-heuristic.This subproblems are explained in the following subsections.

4.1. Minimum Distance between C-UE and V-UE Transmitter

The eNodeB can only assign the same RB to a C-UE and a V-UE if constraints Equations (3)–(6) are satisfied. Let ε n c and ε m d denote the SINR of C-UE-eNodeB n communication and V2V m communication, respectively, P n c and P m d denote the transmit power of the C-UE n and V-UE transmitter m, respectively, and g n B , g m , h m B , h m n denote channel gains of the links that participate in the system, being n the C-UE, m the V-UE transmitter and B the eNodeB.
ε n c = P n c g n B σ 2 + P m d h m B ε m i n c
ε m d = P m d g m σ 2 + P n c h m n ε m i n d
P n c P m a x c
P m d P m a x d
These constraints mean that the minimum SINR requirement have to be guaranteed for both communications Equations (3) and (4) and the power transmission of the C-UE and V-UE must be lower than the maximum permitted Equations (5) and (6). The power of additive white Gaussian noise on each channel is assumed to be σ 2 .
Moreover, there are also minimum transmission powers that the C-UE Equation (7) and the V-UE Equation (8) have to fulfill in order to guarantee the message achieves the receiver. The transmission power is minimum when there is no interference and we only guarantee the minimum SINR.
P n , m i n c = ε n , m i n c σ 2 g n B
P m , m i n d = ε m , m i n d σ 2 g m
Therefore, the values of transmission power the system has to assign to C-UE Equation (9) and V-UE Equation (10) are limited by the minimum transmission power which depends on the propagation losses and the maximum transmission power which depends on the LTE-Advanced configuration parameters.
P n , m i n c < P n c P m a x c
P m , m i n d < P m d P m a x d
The pairing process can be easily understood in Figure 3 where the rectangle delimits maximum transmission powers for C-UE and V-UE and lines l c and l d represents constraints Equations (3) and (4).
The area on the right of l d are the possible combinations of transmission powers that fulfill restriction Equation (4) and the area over l c are the possible combinations of transmission powers that meet Equation (3). Therefore, the area between both lines contains all the possible power transmission combinations which fulfill all the constrains needed for sharing a RB between C-UE and a V-UE. That is, if the intersection of both lines, point A, is inside the rectangle of maximum transmission powers, C-UE and V-UE can be paired, as it is shown in Figure 3a. However, if the intersection is outside the rectangle, as in Figure 3b, those C-UE and V2V pair cannot share the same RB fulfilling all the constraints.
Moreover, from Figure 3 it is deduced that point A comprises the pair of minimum transmission powers that fulfill all the pairing constraints. Since the equations of l d and l c are Equations (11) and (12), respectively,
P m d = g m ε m i n d h n m P m d σ 2 h n m
P n c = ε m i n c h m B g n B P m d + ε m i n c σ 2 g n B
calculating the intersection of both lines the coordinates of point A Equation (13) are obtained.
P A c = σ 2 ( g j ε m i n c + ε m i n c ε m i n d h m B ) g j g n B ε m i n d h m B h n m P A d = σ 2 ( g n B ε m i n d + ε m i n c ε m i n d h n m ) g j g n B ε m i n d h m B h n m
Owing to fading affects randomly influencing the LTE-A signal quality with time, geographical position or radio frequency, we take into account this random property in the parametrization of the channel link. As we consider both the fast fading due to multi-path propagation and slow fading due to shadowing, the channel gain between C-UE n and the eNodeB B can be expressed as
h n B = K · β n B · ζ n B · d n B α
where K is a constant determined by system parameters, β i , B is fast fading gain with exponential distribution, z e t a i , B is the slow fading gain with log-normal distribution, α is the path-loss exponent, and d ( i , B ) is the distance between C-UE n and the eNodeB. In the same way, we can define the channel gain of V2V communication as g m , the channel gain between the transmitter m of the V2V pair and the eNodeB as h m B , and the channel gain between C-UE n and V-UE transmitter m as h m n .
Thus, having the minimum transmission powers for C-UE and V-UE, the minimum distance between C-UE and V-UE transmitter that can satisfy all the constraints can be calculated getting the value of h n m from P A c and P A d , and next, finding the values of d n m . Knowing the minimum distance it is easier for the eNodeB to pairing C-UEs and V-UE.
L n m = k β n m ζ n m ε m i n d ε m i n c P m a x c h m B P m a x c g n B g m σ 2 ε m i n c g m ε m i n d h m B 1 α if P m a x c g n B σ 2 + P m a x d h m B ε m i n c k β n m ζ n m ε m i n d ε m i n c P m a x c h m B + σ 2 g n B P m a x d g m ε m i n d σ 2 1 α if P m a x c g n B σ 2 + P m a x d h m B ε m i n c

4.2. Transmission Power Allocation

In the previous subsection we have addressed the possible pairing of C-UE and V-UE. Once we have finished the pairing process and obtained the possible pairs, we have to assign the transmission power for each user using the formula defined by Equation (15)
P t x = min ( P R B m a x , P o P a t h G a i n α )
where P R B m a x is the maximum transmission power each C-UE or V-UE is allowed to use per RB, P o is the minimum threshold for RSRP (Reference Signal Received Power), P a t h G a i n is attenuation of the signal as it propagates through space from source to destination, and α is the pathloss compensation factor that can vary from 0.1 to 1.

4.3. RB Allocation: XueBlockSolver Algorithm

In this section, the algorithm developed to face the designed radio resource assignation problem RBAP is described. In this case, we have formulated the RBAP as a combinatorial optimization problem [29]. Combinatorial optimization is one of the most studied fields in artificial intelligence, optimization, logistics, and other applications. Multiple research works are published annually in this area, both in journals [30], and conferences [31], and also in books [32]. Different sort of problems exist within this kind of optimization. In this specific study, we have modeled the RBAP as a combinatorial design problem [33]. In line with this, many different metaheuristics can be found in the literature that are able to deal with this type of problems. In this sense, some of these methods are based on a single search, such as Simulated Annealing [34] and Tabu Search [35], and some others are based on a multiple search (population based algorithms), such as genetic algorithm [36], and the ant colony optimization [37]. Metaheuristics can also be classified in search based algorithms and constructive algorithms. Search based algorithms start from an initial complete solution or an initial set of complete solutions which are modified until reaching a final solution, while constructive algorithms start from a partial solution or a set of partial solutions which are built until reaching an final complete solution.
In this study, a population based search algorithm has been designed for solving the RBAP. The philosophy of the presented technique is to have a population of autonomous individuals, which perform single local searches in parallel until the ending criterion is reached. For this reason, the developed technique has been called Multiple and Parallel Block Solver Algorithm (MP-BSA).
As it has been mentioned, the RBAP is formulated as a combinatorial design problem. The objective of this problem is to find a configuration which guarantees the QoS, minimizing the number of resource blocks used and maximizing the total throughput. Thus, the problem has been treated as a hierarchical multi-objective one, with a two-leveled objective function. In order to understand this objective function, it is convenient to clarify that we count with three different sets, containing the throughput of every singles CUE and VUE, and every CUE-VUE pair:
X : { T _ C U E 1 , T _ C U E 2 , T _ C U E 3 , , T _ C U E n }
Y : { T _ V U E 1 , T _ V U E 2 , T _ V U E 3 , , T _ V U E m }
Z : { T _ V U E _ C U E 1 , T _ V U E _ C U E 2 , , T _ V U E _ C U E l }
Now, the two-leveled objective function that we should minimize is as follows:
i = 1 n x i j = 1 m y j k = 1 l z k
i = 1 n T _ C U E i x i j = 1 m T _ C U E j y j k = 1 l T _ V U E _ C U E k z k
The first objective (Equation (16)) is to minimize the number of resource block used. After that, and considering solutions with the same number of resource blocks, the objective is to maximize the total throughput (Equation (17)). To correctly understand these functions, it should be pointed out that x i , y i and z i are binary variables, which are 1 if the corresponding CUE, VUE and VUE-CUE pair are present in the solution.
As can be read in some studies of the literature [38], something important when any algorithm is developed, or operator, is the codification used to represent the partial, or complete solutions of the problem. For this reason, the codification chosen has to be clearly described, since depending on the representation used, some operators can be developed or not. In this study, the permutation representation has been utilized. Thus, each solution is represented by a permutation of the different elements of the environment. Additionally, each resource block is divided by a semicolon, and the elements of the same pair by a coma. As an example, and taking into account a system with four CUEs and four VUEs, one possible solution could be represented in the following way:
X : { C U E _ 02 , V U E _ 03 ; C U E _ 01 , V U E _ 04 ;
C U E _ 03 , V U E _ 01 ; C U E _ 04 ; V U E _ 02 }
In this case, this specific solution is composed by three pairs ({ C U E _ 02 , V U E _ 03 }, { C U E _ 01 , V U E _ 04 }, { C U E _ 03 , V U E _ 01 }) and two lone elements ( C U E _ 04 and V U E _ 02 ).
The working way of the developed MP-BSA has been summarized in the Algorithm 2. As can be seen in this algorithm, the first steps of the MP-BSA is to randomly generate the initial population and to define the above described objective function. After that, an iterative process starts, in which every individual of the population performs a small modification on its structure. If this newly generated solution improves the previous one, it is accepted. In any other case, the new solutions is discarded. For the modification of individuals, the well-known exchange operator has been used, which has been widely used in other fields [39]. For this movement, first, two elements of the solution are randomly selected, in this case the elements in boldface. Then, the position of these two elements are exchanged. After this interchange, the blocks are built again. This step is used with the aim of no generating infeasible solutions. For this reason, it may be that new solutions have a different number of blocks than the previous ones. Taking the previous individual X, and assuming, for example, C U E _ 01 and C U E _ 04 have been randomly selected:
X : { C U E _ 02 , V U E _ 03 ; CUE _ 01 , V U E _ 04 ;
C U E _ 03 , V U E _ 01 ; CUE _ 04 ; V U E _ 02 }
One possible new individual could be the following one:
X : { C U E _ 02 , V U E _ 03 ; CUE _ 04 , V U E _ 04 ;
C U E _ 03 , V U E _ 01 ; CUE _ 01 ; V U E _ 02 }
Finally, this iterative process is repeated until the termination criteria is reached. In this case, this termination criteria is composed by two conditions: a fixed number of total generations and a number of generations with no improvements in the best found solution. If any of these conditions are fulfilled, the algorithm finishes its execution and returns it best individual.
Algorithm 2: Pseudocode of the proposed MP-BSA.
Sensors 17 02217 i002

5. Proposed Solution Tests and Validation

In this section, we present the scenarios and metrics used to validate our underlay RRM proposal presented in previous sections and provide system-level simulation results for evaluating its performance.

5.1. Scenarios and Parameters

We assume a single cell outdoor system with a carrier frequency of 2 GHz where each RB has a bandwidth of 180 KHz for the uplink communication. Radio resources are organized in 100 RBs following the SC-FDMA (Single Carrier Frequency Divison Multiple Access) scheme used in the UL [40]. According to the agreed 3GPP V2X deployment scenario for highways [41], a straight highway with 6 lanes in total, 3 in each direction, passes through the cell, and M V-UEs and N C-UEs are distributed in the scenario defined to check the proposed solution. The number of V-UEs and C-UEs varies depending on the scenarios simulated explained in Section 5.2 and V-UEs move with a speed of 140 km/h. The used channel models are specified by [42] and the simulation parameters are summarized in Table 1.

5.2. Performance Metrics and Baseline Methods

Proposed solution will be evaluated using three metrics, which will provide a set of results that allow us to analyze the performance of the solution:
  • Throughput, defined as the average number of bits per second transmitted through users’ links. In other words, the sum of the data rates that are delivered by all users considered in the tested scenarios.
  • Spectral Efficiency, defined as the average number of bytes transmitted per RB. Spectral Efficiency is a key metric as the radio spectrum is a limited resource. As it was introduced in the problem definition section, the main aim of our proposal is to define an underlay RRM capable of increasing the spectral efficiency of the cellular networks for giving access to a higher number of users with the same resources.
  • Energy Efficiency, defined as the average number of bytes transmitted per Watt consumed. This metric evaluates how the RRM methodology takes benefit from the transmission power used.
Previous metrics are evaluated from two different points of view:
  • Results obtained from V2V communication links to analyze the communication performance offered to V-UEs by the RRM methodology.
  • Results obtained from all the communication links to evaluate the communication performance offered to all the users of the scenario by the proposed RRM methodology.
As it has been exposed in Section 1, the design of an efficient underlaying RRM for co-existing C-UEs and V-UEs users with minimal impact on cellular communications is a key problem. Therefore, we evaluate the previous metrics depending on C-UEs’ type of traffic, interpreted as the variation of transmitted C-UEs’ packet size. This variable allows to analyze how the V-UEs’ links performance depends on C-UEs’ traffic pattern.
To carry out the analysis, the scenarios presented in Table 2 have been defined, where it has been taken into consideration the relationship between the number of C-UEs and V-UEs in the scenario, with the total number of users being constant and equal to 50 users. This analysis enables us to evaluate in which situations the proposed RRM method performs better, in the ones where predominate the number of C-UEs or, on the contrary, where the number of V-UEs is predominant.
To obtain a realistic analysis, we compare our RRM proposal with the following already tested and checked methods:
  • Underlay RRM methodology which maximizes the sum rate of both C-UE and V-UE using the possibility of sharing both users the same RB for the transmission.
  • Overlay RRM methodology which maximize the sum rate of users using one RB for each transmission with the maximum transmission power.

5.3. Simulation Results

This section introduces and analyzes the results obtained according to C-UEs’ traffic pattern. These outputs are discussed at Section 6. Therefore, 15 groups of simulation instances have been carried out by varying in each group the size of packets transmitted by C-UEs. Each group of instances have been evaluated in the nine scenarios defined in Table 2.
The analysis starts with the presentation of throughput results. First of all, Figure 4 shows the throughput offered to V-UE users by the three different RRM algorithms evaluated. On the one hand, Figure 4a shows the average throughput reached by V-UEs in each scenario. On the other hand, Figure 4b exposes the total average throughput given to V-UEs by each RRM algorithm according to C-UEs’ traffic pattern. Figure 4 shows that the RRM proposed in this paper provides higher throughput values to V-UE users than the other RRM algorithms that have been evaluated.
In addition, Figure 4 shows us that values of V-UEs’ throughput are independent of the C-UEs’ traffic pattern. This conclusion comes from the linear trend followed by the V-UEs’ throughput results of all the RRM solutions evaluated. The reason is that V-UE packets always follow the same traffic pattern defined by 3GPP TR 36.885 v14.0.0 (2016-06), which defines the CAM traffic pattern followed by V-UEs. This traffic pattern consists of periodically transmitting first a packet of 300 bytes followed by 4 of 190 bytes.
In addition, by delving into results of Figure 4a, it is noticed that while the number of V-UEs increases, the throughput given to V-UEs rises, since the maximum throughput value is achieved at Scenario 9, where there are 45 V-UEs and 5 C-UEs, and the minimum value is accomplished at Scenario 1, where 5 V-UEs and 45 C-UEs coexist.
Table 3 summarizes the average V-UE’ throughput results showed in Figure 4b. These values demonstrate the previous conclusions because, first of all, values show that the three RRM solutions are linear according to C-UEs’ packet size and, secondly, they evidence that the highest throughput average value of V-UEs is achieved by the RRM solution proposed in this paper.
Figure 5 presents the total average throughput offered to the set of users , C-UEs and V-UEs, according to the C-UEs’ packet size in the nine previously explained scenarios. Values of total throughput for all the set of users in each scenario is presented in Figure 5a. Nevertheless, Figure 5b shows the total average values obtained in each RRM solution for all users according to the C-UEs’ packet size.
Figure 5a shows that the three evaluated RRM solutions follow a similar and increasing trend which coincides with the increment of the C-UEs packet size. This increasing trend is understandable because the bigger the C-UE packet is, the higher number of resources it requests. This trend is also clear in Figure 5b, which additionally shows that the RRM algorithm proposed in this paper provides higher values of throughput to the users. In addition, looking into results from Figure 5a, we obtain that the highest throughput accomplished is in the Scenario 9, where 5 V-UEs and 45 C-UEs coexist. This is owing to C-UEs generating a higher volume of information than V-UEs. Finally, Figure 5b reveals that comparing the other RRM evaluated alternatives, the underlay solution offers higher throughput than the overlay one. These conclusions are revealed again in Table 4. In the manner of Table 3, Table 4 presents the average throughput offered to all the users by the different RRM solutions analyzed.
Figure 6 displays the spectral efficiency achieved by V2V links. In this case, Figure 6a shows the average spectral efficiency reached by V2V links in each evaluated scenario and Figure 6b presents the total average spectral efficiency of these V2V communications taking into account the results of all the scenarios.
Figure 6a shows that the maximum value of spectral efficiency delivered by the proposed RRM solution is achieved at the Scenario 1, where the number of V-UEs is the highest one (45) and the number of C-UEs is the lowest one (5). This proves that the proposed methodology performs better when the number of V-UEs is high, which demonstrate this solution is focused on increasing the spectral efficiency of V2V links. In addition, Figure 6b reveals that the average spectral efficiency offered by the RRM methodology proposed in this paper is higher than the methodologies which it is compared to. Table 5 sums up these average values of V2V spectral efficiency represented in Figure 6b, and shows that the total average spectral efficiency of V2V communications reaches its highest value with the presented RRM. In addition, Table 5 reveals that the maximum value of spectral efficiency for V2V links is accomplished when the C-UEs’ message size is 100 bytes using the RRM presented in this paper. In other words, while the C-UEs’s packet size increases, the spectral efficiency of V2V links decreases. However, this does not happen in the overlay RRM solution since it assigns individual RBs to each transmission which makes it independent of the rest of the users’ transmissions.
To end up with the spectral efficiency analysis, Figure 7 presents the total spectral efficiency of the solutions evaluated. In this way, Figure 7a shows the total spectral efficiency results obtained in the different scenarios and, Figure 7b reveals the total average results for the set of users.
Figure 7a shows that the proposed RRM reaches its maximum spectral efficiency value at Scenario 5, where 25 C-UEs and 25 V-UEs coexist. This fact evidences that our aim is to minimize the number of RBs used, or in other words, maximize the number of pairs which is easier when there is the same number of C-UEs and V-UEs.
Figure 7b provides evidence that our proposal offers the highest spectral efficiency compared with the other alternatives evaluated. Therefore, according to the results obtained, the presented RRM methodology is able to take advantage of RBs sending a higher number of bytes than the alternatives. This fact allows us to provide a service to a higher number of users, or at least, to provide better service to the users. Table 6 summarizes the results presented in Figure 7b and remarks the better performance of the RRM solution proposed in this paper. As it is defined in Table 1, the maximum spectral efficiency per RB is 180 bytes. Therefore, from Figure 7a where the maximum value reached by our RRM proposal is 160 bytes, we could say this proposal accomplishes the 88.89% of the maximum spectral efficiency value and, on average, it reaches 66.32%.
This section finishes with the analysis of energy efficiency, i.e., the number of bytes transmitted per watt. First, Figure 8 shows the energy efficiency offered to V2V links. On the one hand, Figure 8a presents the energy efficiency of V-UEs’ transmissions in each scenario and, on the other hand, Figure 8b reveals the total average results of this metric for the different RRM evaluated.
In Figure 8a, similar results are presented for all the scenarios except at the Scenario 9, which provides higher energy efficiency. Furthermore, Figure 8b demonstrates that the proposed solution provides higher energy efficiency for V2V links than the other RRM methodologies evaluated. These values are summarized in Table 7 which also evidences that the energy efficiency of V2V communications is not related with the C-UEs’ packet size.
Finally, Figure 9 presents the total energy efficiency offered by the RRMs to users. In this way, Figure 9a shows the total energy efficiency in each scenario and Figure 9b presents the total average energy efficiency for all the scenarios.
In Figure 9a, the highest values for energy efficiency are reached in Scenario 1, where there are 5 C-UEs and 45 V-UEs. This means that the energy efficiency of V2V communications is higher than the common cellular communications, which makes sense because the distance between transmitter and receiver in a V2V communication is usually lower than a cellular one. However, Figure 9b shows that in some cases the overlay RRM offers higher energy efficiency than the RRM proposed in this paper. This is owing to the fact that overlay RRM does not have to mitigate interferences between cellular and V2V users. This values are exposed in Table 8 and provide evidence that for small C-UEs’ packet size, from 100 to 600 bytes, the energy efficiency offered by our RRM proposal performs better than the overlay one, but, for bigger C-UEs’ packet size, the overlay RRM offers better performance. In any case, for the simulations carried out in this evaluation the total average energy efficiency offered by our RRM proposal is higher that the overlay one.

6. Discussion

The aim of this discussion section is to summarize the meaningful results presented in the previous section. Regarding the throughput results, we could have validated that V-UEs’ throughput is independent of the C-UEs’ traffic pattern. This conclusion comes from the linear trend followed by the V-UEs’ throughput for all the different C-UEs’ packet size, as it is shown in Figure 4. In addition, the total throughput results provide evidence that the RRM we propose provides the highest values of total throughput, as it is presented in Figure 5.
On the other hand, in Figure 6, the V2V’s efficiency results prove that the proposed methodology performs better when the number of V-UEs is high and that V2V’s efficiency is also independent of C-UEs’s traffic pattern. Additionally, the total efficiency results demonstrate that our approach is more efficient than the other alternatives, as it is demonstrated in Figure 7.
The last metric evaluated is the energy efficiency, which results shown in Figure 8 provide evidence that the proposed methodology performs better than the compared ones. In addition, the energy efficiency of V2V links is independent of the C-UEs’ traffic pattern. On the other hand, the total energy efficiency results provide evidence that energy efficiency of V2V communications is higher than the common cellular ones, which is a coherent consequence of a V2V communication because the distance between transmitter and receiver is usually lower than in a cellular one.
Finally, Table 9 collects the average results obtained for the presented metrics.

7. Conclusions

The possibility of using D2D underlay cellular technology for VANETs could improve the utilization of cellular spectrum and reduce the energy consumption of V2V (Vehicle-to-Vehicle) communications. Although the reuse gain comes at the expense of increasing the interference level, it is possible to be neatly controlled by the network designing an RRM to mitigate the interferences and ensure the different QoS requirements of ITS applications.
In this paper, firstly, we briefly analyze various concepts presented hitherto in the literature related to efficient sharing of the available radio resources between common cellular and V2X communications. Secondly, this paper presents the design of an underlay RRM methodology capable of improving cellular spectral efficiency while having minimal impact on cellular communications. Finally, we provide system-simulations results, which evidence the improvement of spectral efficiency provided by the presented methodology. As future work, in order to improve the energy efficiency results obtained, we plan to design a more accurate power transmission assignment, which will reduce the interference generated.

Acknowledgments

This work has been made thanks to the grant offered by the Basque Government, under the predoctoral formation program (ref: PRE_2016_2_0163).

Author Contributions

All the authors of this article have contributed significantly to the research work and the writing of the paper. Unai Hernandez-Jayo and the corresponding author have contributed in the principal design of the work, Eneko Osaba and Roberto Carballedo have design and implement the metaheuristic algorithm. The corresponding author have developed the implementation of the rest of the methodology and carried out the simulations and the analysis of the results. The drafting of the article have been done by the corresponding author and, at least, one section of the paper has been written by each author.

Conflicts of Interest

The authors declare no conflict of interest.

Acronyms List

CAMCooperative Awareness Message
CHCluster Head
C-ITSCooperative-ITS
CMCluster Member
CSMACarrier Sense Multiple Access
C-UECommon User Equipment
DLdownlink
D2DDevice-to-Device
ETSIEuropean Telecommunications Standards Institute
FCDFloating Car Data
FDDFrequency Division Duplexing
HAHungarian Algorithm
I2VInfrastructure-to-Vehicle
IoTInternet of Things
IoVInternet of Vehicles
ITSIntelligent Transportation Systems
LOSLine of Sight
LTE-ALTE-Advanced
LTELong Term Evolution
MACMedium Access Control
MPCMinimum Rate Oriented Power Control
QoSQuality of Service
RBResource Block
RBAPResource Block Assignation Problem
RRMRadio Resource Management
RSRPReference Signal Received Power
SC-FDMASingle Carrier Frequency Divison Multiple Access
SINRSignal-to-Interference-plus-Noise Ratio
SPCSum Rate Oriented Power Control
SPSSemi-Persistent Scheduling
UEUser Equipment
ULuplink
V2IVehicle-to-Infrastructure
V2VVehicle-to-Vehicle
V2XVehicle-to-Everything
VANETVehicular Ad Hoc Network
V-UEVehicular User Equipment
VRUVulnerable Road User
WIWork Item

References

  1. McKinsey & Company. The Road to 2020 and Beyond What’s Driving the Global Automotive Industry; McKinsey & Company: New York, NY, USA, 2013. [Google Scholar]
  2. Hernandez-Jayo, U.; De-la Iglesia, I.; Perez, J. V-Alert: Description and Validation of a Vulnerable Road User Alert System in the Framework of a Smart City. Sensors 2015, 15, 18480–18505. [Google Scholar] [CrossRef] [PubMed]
  3. Wang, X.; Wang, C.; Zhang, J.; Zhou, M.; Jiang, C. Improved Rule Installation for Real-Time Query Service in Software-Defined Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 2017, 18, 225–235. [Google Scholar] [CrossRef]
  4. Kombate, D.; Wanglina. The Internet of Vehicles Based on 5G Communications. In Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Chengdu, China, 15–18 December 2016; pp. 445–448. [Google Scholar]
  5. Popovski, P. Ultra-reliable communication in 5G wireless systems. In Proceedings of the 2014 1st International Conference on 5G for Ubiquitous Connectivity (5GU), Akaslompolo, Finland, 26–28 November 2014; pp. 146–151. [Google Scholar]
  6. Mir, Z.H.; Filali, F. LTE and IEEE 802.11p for vehicular networking: A performance evaluation. EURASIP J. Wirel. Commun. Netw. 2014, 2014, 89. [Google Scholar]
  7. Cheng, X.; Yang, L.; Shen, X. D2D for Intelligent Transportation Systems: A Feasibility Study. IEEE Trans. Intell. Transp. Syst. 2015, 16, 1784–1793. [Google Scholar] [CrossRef]
  8. Khelil, A.; Soldani, D. On the suitability of Device-to-Device communications for road traffic safety. In Proceedings of the 2014 IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea, 6–8 March 2014; pp. 224–229. [Google Scholar]
  9. RP-152293 Support for V2V Services Based on LTE Sidelink. Available online: http://portal.3gpp.org/ngppapp/CreateTDoc.aspx?mode=view&contributionUid=RP-152293 (accessed on 26 September 2017).
  10. Fodor, G.; Dahlman, E.; Mildh, G.; Parkvall, S.; Reider, N.; Miklós, G.; Turányi, Z. Design aspects of network assisted device-to-device communications. IEEE Commun. Mag. 2012, 50, 170–177. [Google Scholar] [CrossRef]
  11. Phunchongharn, P.; Hossain, E.; Kim, D.I. Resource allocation for device-to-device communications underlaying LTE-advanced networks. IEEE Wirel. Commun. 2013, 20, 91–100. [Google Scholar] [CrossRef]
  12. Asadi, A.; Wang, Q.; Mancuso, V. A Survey on Device-to-Device Communication in Cellular Networks. IEEE Commun. Surv. Tutor. 2014, 16, 1801–1819. [Google Scholar] [CrossRef]
  13. Feng, D.; Lu, L.; Yi, Y.; Li, G.Y.; Feng, G.; Li, S. Device-to-Device Communications Underlaying Cellular Networks. IEEE Trans. Commun. 2013, 61, 3541–3551. [Google Scholar] [CrossRef]
  14. Botsov, M.; Klügel, M.; Kellerer, W.; Fertl, P. Location dependent resource allocation for mobile device-to-device communications. In Proceedings of the 2014 IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey, 6–9 April 2014; pp. 1679–1684. [Google Scholar]
  15. Xing, W.; Wang, N.; Wang, C.; Liu, F.; Ji, Y. Resource Allocation Schemes for D2D Communication Used in VANETs. In Proceedings of the 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), Vancouver, BC, Canada, 14–17 September 2014; pp. 1–6. [Google Scholar]
  16. Ren, Y.; Liu, F.; Liu, Z.; Wang, C.; Ji, Y. Power Control in D2D-Based Vehicular Communication Networks. IEEE Trans. Veh. Technol. 2015, 64, 5547–5562. [Google Scholar] [CrossRef]
  17. Sun, W.; Strom, E.; Brannstrom, F.; Sou, K.; Sui, Y. Radio Resource Management for D2D-based V2V Communication. IEEE Trans. Veh. Technol. 2016, 65, 6636–6650. [Google Scholar] [CrossRef]
  18. Zulhasnine, M.; Huang, C.; Srinivasan, A. Efficient resource allocation for device-to-device communication underlaying LTE network. In Proceedings of the 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, Niagara Falls, NU, Canada, 11–13 October 2010; pp. 368–375. [Google Scholar]
  19. Kuhn, H.W. The Hungarian method for the assignment problem. Nav. Res. Logist. Q. 1955, 2, 83–97. [Google Scholar] [CrossRef]
  20. Sun, W.; Yuan, D.; Strom, E.; Brannstrom, F. Cluster-Based Radio Resource Management for D2D-Supported Safety-Critical V2X Communications. IEEE Trans. Wirel. Commun. 2016, 15, 2756–2769. [Google Scholar] [CrossRef]
  21. Almoustafa, S.; Hanafi, S.; Mladenović, N. New exact method for large asymmetric distance-constrained vehicle routing problem. Eur. J. Oper. Res. 2013, 226, 386–394. [Google Scholar] [CrossRef]
  22. Dütting, P.; Henzinger, M.; Weber, I. Sponsored search, market equilibria, and the Hungarian Method. Inf. Process. Lett. 2013, 113, 67–73. [Google Scholar] [CrossRef]
  23. Kaufman, B.; Lilleberg, J.; Aazhang, B. Spectrum sharing scheme between cellular users and ad-hoc device-to-device users. IEEE Trans. Wirel. Commun. 2013, 12, 1038–1049. [Google Scholar] [CrossRef]
  24. Glover, F.W.; Kochenberger, G.A. Handbook of Metaheuristics; Springer Science & Business Media: New York, NY, USA, 2006; Volume 57. [Google Scholar]
  25. BoussaïD, I.; Lepagnot, J.; Siarry, P. A Survey on Optimization Metaheuristics. Inf. Sci. 2013, 237, 82–117. [Google Scholar] [CrossRef]
  26. Lin, X.; Andrews, J.G.; Ghosh, A.; Ratasuk, R. An overview of 3GPP device-to-device proximity services. IEEE Commun. Mag. 2014, 52, 40–48. [Google Scholar] [CrossRef]
  27. Hernandez-Jayo, U.; Mammu, A.S.K.; De-la Iglesia, I. Reliable Communication in Cooperative Ad hoc Networks. In Contemporary Issues in Wireless Communications; InTech: Rijeka, Croatia, 2014. [Google Scholar]
  28. European Telecommunications Standards Institute (ETSI). ETSI TS 102 637-2 V1.2.1 (2011-03) Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service; ETSI: Sophia Antipolis, France, 2011. [Google Scholar]
  29. Du, D.Z.; Pardalos, P.M. Handbook of Combinatorial Optimization: Supplement; Springer Science & Business Media: New York, NY, USA, 2013; Volume 1. [Google Scholar]
  30. Kasperski, A.; Zieliński, P. Combinatorial optimization problems with uncertain costs and the OWA criterion. Theor. Comput. Sci. 2015, 565, 102–112. [Google Scholar] [CrossRef]
  31. Bezerra, L.C.; López-Ibáñez, M.; Stützle, T. Automatic design of evolutionary algorithms for multi-objective combinatorial optimization. In Parallel Problem Solving from Nature; Springer: Cham, Switzerland, 2014; pp. 508–517. [Google Scholar]
  32. Levin, M.S. System Configuration and Combinatorial Optimization. In Modular System Design and Evaluation; Springer: Berlin, Germany, 2015; pp. 89–109. [Google Scholar]
  33. Colbourn, C.J. CRC Handbook of Combinatorial Designs; CRC Press: Boca Raton, FL, USA, 2010. [Google Scholar]
  34. Kirkpatrick, S.; Gellat, C.; Vecchi, M. Optimization by simmulated annealing. Science 1983, 220, 671–680. [Google Scholar] [CrossRef] [PubMed]
  35. Glover, F. Tabu search, part I. ORSA J. Comput. 1989, 1, 190–206. [Google Scholar] [CrossRef]
  36. Goldberg, D. Genetic Algorithms in Search, Optimization, and Machine Learning; Addison-Wesley Professional: Boston, MA, USA, 1989. [Google Scholar]
  37. Dorigo, M.; Blum, C. Ant colony optimization theory: A survey. Theor. Comput. Sci. 2005, 344, 243–278. [Google Scholar] [CrossRef]
  38. Osaba, E.; Carballedo, R.; Diaz, F.; Onieva, E.; Masegosa, A.; Perallos, A. Good practice proposal for the implementation, presentation, and comparison of metaheuristics for solving routing problems. Neurocomputing 2017. [Google Scholar] [CrossRef]
  39. Larrañaga, P.; Kuijpers, C.M.H.; Murga, R.H.; Inza, I.; Dizdarevic, S. Genetic algorithms for the travelling salesman problem: A review of representations and operators. Artif. Intell. Rev. 1999, 13, 129–170. [Google Scholar] [CrossRef]
  40. Evolved Universal Terrestrial Radio Access (E-UTRA); Physical channels and modulation. Available online: http://www.etsi.org/deliver/etsi_ts/136200_136299/136211/11.05.00_60/ts_136211v110500p.pdf (accessed on 26 September 2017).
  41. Study on LTE-based V2X Services. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2934 (accessed on 26 September 2017).
  42. 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Further advancements for E -UTRA physical layer aspects (Release 9). Available online: http://www.qtc.jp/3GPP/Specs/36814-900.pdf (accessed on 26 September 2017).
Figure 1. Overview of the system.
Figure 1. Overview of the system.
Sensors 17 02217 g001
Figure 2. Resource Allocation steps.
Figure 2. Resource Allocation steps.
Sensors 17 02217 g002
Figure 3. Representation of pairing constraints. (a) possible pair; (b) impossible pair.
Figure 3. Representation of pairing constraints. (a) possible pair; (b) impossible pair.
Sensors 17 02217 g003
Figure 4. Throughput offered to V-UEs based on C-UEs’ traffic pattern. (a) Average Throughput of V-UEs in different scenarios; (b) Total Average Throughput of V-UEs.
Figure 4. Throughput offered to V-UEs based on C-UEs’ traffic pattern. (a) Average Throughput of V-UEs in different scenarios; (b) Total Average Throughput of V-UEs.
Sensors 17 02217 g004
Figure 5. Throughput offered to V-UEs based on C-UEs’ traffic pattern. (a) Total Average Throughput in different scenarios; (b) Total Average Throughput for all set of users.
Figure 5. Throughput offered to V-UEs based on C-UEs’ traffic pattern. (a) Total Average Throughput in different scenarios; (b) Total Average Throughput for all set of users.
Sensors 17 02217 g005
Figure 6. Spectral Efficiency offered to V-UEs based on C-UEs’ traffic pattern. (a) Total Average Spectral Efficiency for V-UEs in different scenarios; (b) Total Average Spectral Efficiency for V-UEs.
Figure 6. Spectral Efficiency offered to V-UEs based on C-UEs’ traffic pattern. (a) Total Average Spectral Efficiency for V-UEs in different scenarios; (b) Total Average Spectral Efficiency for V-UEs.
Sensors 17 02217 g006
Figure 7. Spectral Efficiency offered to V-UEs based on C-UEs’ traffic pattern. (a) Total Average Spectral Efficiency in different scenarios; (b) Total Average Spectral Efficiency for all set of users.
Figure 7. Spectral Efficiency offered to V-UEs based on C-UEs’ traffic pattern. (a) Total Average Spectral Efficiency in different scenarios; (b) Total Average Spectral Efficiency for all set of users.
Sensors 17 02217 g007
Figure 8. Energy Efficiency offered to V-UEs based on C-UEs’ traffic pattern. (a) Total Average Energy Efficiency for V-UEs in different scenarios; (b) Total Average Energy Efficiency for V-UEs.
Figure 8. Energy Efficiency offered to V-UEs based on C-UEs’ traffic pattern. (a) Total Average Energy Efficiency for V-UEs in different scenarios; (b) Total Average Energy Efficiency for V-UEs.
Sensors 17 02217 g008
Figure 9. Energy Efficiency offered to V-UEs based on C-UEs’ traffic pattern. (a) Total Average Energy Efficiency in different scenarios; (b) Total Average Energy Efficiency for all set of users.
Figure 9. Energy Efficiency offered to V-UEs based on C-UEs’ traffic pattern. (a) Total Average Energy Efficiency in different scenarios; (b) Total Average Energy Efficiency for all set of users.
Sensors 17 02217 g009
Table 1. Simulation Parameters.
Table 1. Simulation Parameters.
ParameterValue
Carrier Frequency2 GHz
Number of RBs100
RB bandwidth180 kHz
Scenario1 km highway
Number of users50
V-UEs velocity140 kmph
Channel modelLine of Sight
V2V coverage radio100 m
Number of Scenarios9
Simulation time2 s
Number of runs per scenario6
Frame size1 ms
P R B m a x 125 mW
P o −162.5 dBm
α 0.8
Table 2. Definition of Scenarios.
Table 2. Definition of Scenarios.
ScenarioC-UEsV-UEs
1545
21040
31535
42030
52525
63020
73515
84010
9455
Table 3. Average Throughput offered to V-UEs based on C-UEs’ traffic pattern.
Table 3. Average Throughput offered to V-UEs based on C-UEs’ traffic pattern.
CUE’s Message
Size (Bytes)
Underlay V2V
Throughput (Gbps)
Our Approach V2V
Throughput (Gbps)
Overlay V2V
Throughput (Gbps)
1001.97982.21961.9911
2001.96812.20811.9744
3001.96842.17941.9757
4001.96762.17451.9801
5001.96502.16741.9820
6001.96352.17001.9746
7001.95562.16341.9600
8001.94982.16171.9623
9001.96362.17831.9613
10001.95862.16711.9548
11001.95582.16981.9579
12001.94912.16731.9521
13001.95422.16881.9526
14001.94892.16701.9546
15001.94742.16521.9456
Media1.95972.17521.9653
Table 4. Average Total Throughput achieved based on C-UEs’ traffic pattern.
Table 4. Average Total Throughput achieved based on C-UEs’ traffic pattern.
CUE’s Message
Size (Bytes)
Underlay Total
Throughput (Gbps)
Our Approach Total
Throughput (Gbps)
Overlay Total
Throughput (Gbps)
1002.68702.93512.6186
2003.07293.39672.8166
3003.38203.79433.0143
4003.63634.16143.1914
5003.88904.51043.3809
6004.14324.86883.5563
7004.37505.22243.7543
8004.59235.57843.9307
9004.84775.95754.1163
10005.07826.30534.3020
11005.28716.67254.4930
12005.50137.03324.7124
13005.70407.39524.8591
14005.88997.75275.0409
15006.08698.11005.2257
Media4.54485.57963.9342
Table 5. Average Spectral Efficiency offered to V-UEs based on C-UEs’ traffic pattern.
Table 5. Average Spectral Efficiency offered to V-UEs based on C-UEs’ traffic pattern.
CUE’s Message
Size (Bytes)
Underlay V2V
Spectral Efficiency (Bytes)
Our Approach V2V
Spectral Efficiency (Bytes)
Overlay V2V
Spectral Efficiency (Bytes)
10075.5158111.500982.0601
20074.5242105.059382.1765
30074.6291102.432482.4734
40074.5778101.648282.4722
50074.6811101.245183.0456
60074.6977101.413683.2602
70074.5434101.348383.2362
80074.2527100.925983.1750
90073.9347101.039883.1834
100073.948599.672983.6675
110073.860798.253383.3569
120073.545897.919483.1306
130073.131097.918683.2180
140073.573197.149683.5048
150073.780396.513883.6841
Media74.2130100.936183.0430
Table 6. Average Total Spectral Efficiency (bytes) achieved based on C-UEs’ traffic pattern.
Table 6. Average Total Spectral Efficiency (bytes) achieved based on C-UEs’ traffic pattern.
CUE’s Message
Size (Bytes)
Underlay V2V
Spectral Efficiency (Bytes)
Our Approach V2V
Spectral Efficiency (Bytes)
Overlay V2V
Spectral Efficiency (Bytes)
10095.7937129.227382.1711
20099.1588133.130083.8041
300102.5021134.452084.8239
400103.5603130.084485.0603
500104.5878127.024985.6566
600104.7855122.701085.9722
700105.0782119.770886.3758
800104.3845116.712586.3510
900104.8364114.889486.6161
1000104.5595113.013986.5990
1100104.4074111.584886.8759
1200104.9000110.924887.2326
1300104.4592109.795687.4499
1400105.0987109.263287.5854
1500104.7921108.193987.6160
Media103.5269119.384686.0127
Table 7. Average Energy Efficiency offered to V-UEs based on C-UEs’ traffic pattern.
Table 7. Average Energy Efficiency offered to V-UEs based on C-UEs’ traffic pattern.
CUE’s Message
Size (Bytes)
Underlay V2V
Energy Efficiency (Bytes)
Our Approach V2V
Energy Efficiency (Bytes)
Overlay V2V
Energy Efficiency (Bytes)
10017.90525.39819.747
20016.83922.82918.611
30016.75522.85918.645
40018.61025.26221.175
50015.69920.79717.476
60017.30722.65519.176
70017.83723.17919.706
80016.22121.36318.259
90018.30523.99520.832
100019.62523.77822.438
110014.71418.25916.685
120015.91119.99618.002
130014.81719.09216.931
140016.30320.62018.934
150017.38420.64319.225
Media16.94922.04819.056
Table 8. Average Total Energy Efficiency achieved based on C-UEs’ traffic pattern.
Table 8. Average Total Energy Efficiency achieved based on C-UEs’ traffic pattern.
CUE’s Message
Size (Bytes)
Underlay V2V
Energy Efficiency (Bytes)
Our Approach V2V
Energy Efficiency (Bytes)
Overlay V2V
Energy Efficiency (Bytes)
1004.46186.79025.3890
2003.92245.75855.0450
3003.89785.45454.9905
4003.79325.01354.8062
5003.66564.72674.5924
6003.69054.60724.5828
7003.46004.16994.2278
8003.37314.05704.2021
9003.45234.07404.1365
10003.28473.78353.8812
11003.42723.87184.0592
12003.25583.60183.8385
13003.29773.55243.8314
14003.28703.53933.7257
15003.19503.39543.6664
Media3.56434.42644.3317
Table 9. Summary of Average Simulation Results.
Table 9. Summary of Average Simulation Results.
MetricsUnderlayOur ApproachOverlay
V2V Throughput (Gbps)1.95972.17521.9653
Total Throughput (Gbps)4.54485.57963.9342
V2V Spectral Efficiency (bytes)74.2130100.936183.0430
Total Spectral Efficiency (bytes)103.5269119.384686.0127
V2V Energy Efficiency (Gb/W)16.94922.04819.056
Total Energy Efficiency (Gb/W)3.56434.42644.43317

Share and Cite

MDPI and ACS Style

De la Iglesia, I.; Hernandez-Jayo, U.; Osaba, E.; Carballedo, R. Smart Bandwidth Assignation in an Underlay Cellular Network for Internet of Vehicles. Sensors 2017, 17, 2217. https://doi.org/10.3390/s17102217

AMA Style

De la Iglesia I, Hernandez-Jayo U, Osaba E, Carballedo R. Smart Bandwidth Assignation in an Underlay Cellular Network for Internet of Vehicles. Sensors. 2017; 17(10):2217. https://doi.org/10.3390/s17102217

Chicago/Turabian Style

De la Iglesia, Idoia, Unai Hernandez-Jayo, Eneko Osaba, and Roberto Carballedo. 2017. "Smart Bandwidth Assignation in an Underlay Cellular Network for Internet of Vehicles" Sensors 17, no. 10: 2217. https://doi.org/10.3390/s17102217

APA Style

De la Iglesia, I., Hernandez-Jayo, U., Osaba, E., & Carballedo, R. (2017). Smart Bandwidth Assignation in an Underlay Cellular Network for Internet of Vehicles. Sensors, 17(10), 2217. https://doi.org/10.3390/s17102217

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop