1. Introduction
In the future industrial internet of things (IIoT), a large number of devices including monitoring sensors and execution control units will be deployed to support factory automation and industry control system [
1]. Massive periodic/non-periodic data will be transferred to a centralized control unit or adjacent devices via an industry wireless network, including video monitoring information, sensing data, operation instructions. However, due to the limited capacity and throughput of the current cellular system, it is insufficient in supporting future IoT applications with a tremendous number of devices and heterogeneous information traffic [
2].
Massive machine-type communication (mMTC), as one of three typical application scenarios in the 5th-generation (5G) network, is investigated to support communication among a massive number of devices, which provides a feasible solution for future industrial IoT (IIoT) [
3]. Due to limited spectrum resources in the cellular system, massive devices access the wireless network in a spectrum-sharing manner in which multiple devices are allocated in the same spectrum at the same time. Thus, the co-channel interference among devices restricts the number of devices connected to the cellular system. Effective interference management plays a vital role in mMTC to support the simultaneous access of more devices. The features and challenges of mMTC in IoT are as follows. First, devices in IoT need to exchange information with their neighbor devices frequently. In other words, the communication is performed between adjacent devices [
4]. Second, the coding blocklengths for IoT are usually short, to reduce the transmission delay. The transmission rate cannot be estimated by the conventional Shannon’s capacity, which assumes an infinite blocklength [
5]. Third, a massive number of devices in IoT need to be supported. Thus, efficient resource allocation in mMTC needs to be investigated to address these challenges.
A wide range of works have contributed to the resource allocation problem in mMTC. In [
6], the authors establish an interference model and a formulate resource allocation problem between users and machine-type communication (MTC) gateways in mMTC burst scenarios. In [
7], the authors investigated the access management issues for MTC devices with heterogeneous quality of service (QoS) in the same cellular network. This work does not consider bandwidth utilization because transmission opportunities are reserved for a group of MTC devices at the same time. The authors in [
8] propose two relay schemes and transmission protocols to specifically stimulate system capacity. In a multi-cell MTC system, Kwon et al. [
9] establishes the interference model and analyzes the signal-to-interference-plus-noise-ratio (SINR) distributions and drives efficient resource allocation schemes. In [
10], the authors propose a dynamic resource allocation algorithm based on the estimation of the number of MTC devices to handle massive and dynamic MTC devices while satisfying the random access delay requirement of MTC devices. To achieve effective resource utilization, a resource allocation metric based on statistical priority is proposed in [
11]. In this way, effective resource utilization is achieved by letting MTC devices send a reduced set of their data. In [
12], the authors consider a connectivity maximization problem for narrowband IoT with non-orthogonal multiple-access (NOMA). However, articles [
6,
7,
8,
9,
10,
11,
12] assume that all devices communicate with the base station or centralized controller directly and do not consider the communications between adjacent devices.
D2D technology, as another promising technology in 5G, can establish communication between adjacent nodes, which can improve the spectrum efficiency and offload the load of Base Station (BS). D2D communication is introduced to mMTC system to stimulate spectrum efficiency and support more mMTC devices accessed with limited spectrum resources. However, designing better resource allocation algorithms to manage the inter-user interference between D2D users and cellulars is the key challenge for improving system performance. Resource allocation and interference problems of D2D communication have been investigated in many works [
13,
14,
15]. The authors in [
16] propose a cell sectorization scheme to alleviate the interference between cellular users and D2D users. In [
17], the authors investigate interference coordination for downlink full-dimension multiple-output systems with underlying D2D communications.
Adopting D2D technology, the number of supported devices can be improved in mMTC scenarios [
18]. By allowing unauthorized devices to reuse the frequency bands of authorized cellular users, bandwidth utilization can be improved [
19,
20,
21]. The literature [
22] proposes a heuristic subcarrier allocation method to set the user’s signal-to-noise ratio (SNR) threshold to meet the QoS of the system. The authors in [
23] propose a mobile traffic offloading scheme that combines small base stations with D2D offloading. The goal is to accommodate a large number of MTC connections by maximizing the throughput of the network system. The impact of radio frequency energy harvesting on the spectral efficiency of the D2D-assisted MTC system is analyzed first in [
24]. In [
25], the authors propose two solutions to manage the communication between D2D devices and the BS to lighten the overhead of MTC devices on the 5G network. However, resource allocation [
19,
20,
21,
22,
23,
24,
25] mainly focuses on throughput maximization or interference minimization. In an IIoT enabled by D2D communications, massive devices demand access to the network via D2D mode. Thus, the connectivity maximization problem becomes a challenging issue to tackle. To support a system in which the number of users is higher than the number of subcarriers, a range of fair subcarrier allocation algorithms is proposed that always improves the reliability [
26]. However, the author only considers the scenario of mobile users in the downlink and does not consider the influence of interference.
In this paper, we investigate a D2D-enabled internet of things in which some devices (enhanced Mobile Broadband (eMBB) devices) connect to the centralized controller while other devices (mMTC devices) communicate with their adjacent devices via D2D communication to promote inter-device cooperation in industry automation. Specifically, mMTC devices reuse the spectrum resource with eMBB devices. We establish the connectivity maximization problem of mMTC devices while guaranteeing the QoS of eMBB devices and mMTC devices. Furthermore, we propose an interference-aware subcarrier allocation algorithm to tackle the problem. The main contributions of this paper are as follows:
We establish a problem of maximizing the number of accessed mMTC pairs subject to the constraints of QoS in a system with both eMBB and mMTC devices, which is proven to be a mixed-integer non-linear programming (MINLP) problem.
We propose an interference-aware subcarrier allocation algorithm for mMTC (IASA) considering the interference range of each mMTC device.
In order to evaluate the proposed algorithm, a simulation is conducted. The results demonstrate that the proposed algorithm outperforms two benchmark algorithms significantly in terms of the number of mMTC pairs accessed under the same constraints.
The remainder of the paper is organized as follows. The system model and assumptions is elaborated in the “System Model” section. The optimization problem and constraints are introduced in the “Problem Formulation” section. The proposed subcarrier allocation algorithm is presented in the “Interference-Aware Subcarrier Allocation for mMTC Communication Algorithm” section. Comprehensive simulation results are provided in the “Simulation result analysis” section. Finally, we conclude the paper in the ”Conclusion” section.
2. System Model
In this paper, we investigate an industrial wireless network in which some devices, referred to as eMBB devices (such as monitoring cameras), transmit video information to a centralized controller, while devices referred to as mMTC devices (such as sensors and actuators), transmit short blocklength packets to their adjacent devices to promote inter-device cooperation and industrial automation. The system model is illustrated in
Figure 1, where
N eMBB devices and
M mMTC devices are randomly distributed, represented by sets
and
, respectively. The mMTC devices transmit information from the transmitters to receivers by the D2D communication mode, and the mMTC pairs reuse the eMBB devices’ uplink resources in order to improve the spectrum efficiency. The mMTC pairs and eMBB devices are represented by
and
, respectively. Each mMTC pair is composed of one mMTC transmitter and one mMTC receiver represented by
and
, respectively. All available spectrum resources are divided into sub-carriers with the same bandwidth. Each eMBB device occupies mutually orthogonal sub-carriers. Therefore, there is no co-channel interference between the eMBB devices. We assume that the eMBB device
occupies the subcarrier
i. Considering the impact of devices on each other, each mMTC pair is allowed to access no more than one subcarrier, and each subcarrier can be accessed by multiple mMTC devices. All of the channels in the system are assumed to be quasi-static Rayleigh fading channels. The channel gain remains constant for each symbol transmission period but varies independently between different symbol periods. The parameters in the article are shown in
Table 1.
We define a binary subcarrier allocation matrix
, where
indicates that
occupies subcarrier
i, otherwise
,
,
. Thus, the received signal of the base station on subcarrier
i is
where
and
are the transmitted signals of the eMBB devices
and the mMTC transmitter
, respectively.
represents normalized additive white Gaussian noise,
. When the centralized controller receives the uplink signals of the eMBB device
, the SINR at centralized controller can be calculated as
where
B is the subcarrier bandwidth and
I represents the interference caused by the mMTC pairs which access the subcarrier
i:
Since the eMBB devices transmit long packet data, the achievable transmission rate of the eMBB device
can be obtained by Shannon’s theorem:
The signal received by the
jth mMTC pair
is
where the first term is the signal receiver
received from mMTC transmitter
. The second term is the interference from the eMBB device
. The third term is the interference signal from the transmitter of the mMTC pair
that occupies the same subcarrier with mMTC pair
. According to (
5), the SINR of the mMTC receiver
can be derived as
Since mMTC communication is mostly aimed at periodic monitoring data in IoT applications such as smart cities, the length of data packets transmitted is usually very short. According to information theory, the rate of short packets cannot achieve the Shannon limit. Therefore, the transmission rate of the mMTC devices is represented by the short packet rate [
27], as shown in (
7):
where
m is the block length,
is the transmission error probability, and
is the inverse of the Gaussian
Q function.
3. Problem Formulation
The optimization goal of this paper is to maximize the total number of mMTC devices accessed under the QoS of each eMBB device. All of the mMTC devices access the network adhere to the following criteria:
- (i)
Each mMTC device is allowed to access no more than one subcarrier.
- (ii)
To ensure the transmission quality of the eMBB devices, the interference each subcarrier can suffer should be below a threshold.
- (iii)
Both eMBB devices and mMTC devices should satisfy their own transmission rate requirements.
When the
jth mMTC pair is allowed to access the subcarrier
i, the SINR of the receiver of
is
Taking
in (
8) into (
7), we can get the transmission rate
after mMTC pair
is allowed to access the subcarrier
i. In order to ensure the QoS of the mMTC pair
, the achievable rate
of the mMTC pair
should not be less than the minimum required rate
, i.e.,
When the mMTC pair
is allowed to access the subcarrier
i, the minimum transmission rate of the eMBB device
is
. Under the QoS constraint of the eMBB devices and the mMTC pairs, we maximize the number of mMTC pairs accessed in the network. Mathematically, the optimization problem is formulated as
The constraints described in (10b) and (10c) indicate that the respective minimum transmission rate requirements of the eMBB devices and the mMTC pairs should be satisfied. Equation (10e) reveals that each mMTC pair is allowed to occupy at most one subcarrier. The optimization problem is a binary optimization problem, and the traversal complexity of the problem is . In the following section, we propose a lower complexity algorithm named interference-aware subcarrier allocation for mMTC communication.
4. Interference-Aware Subcarrier Allocation for mMTC Communication Algorithm
According to the constraint condition (10b), the accumulated interference allowed by the eMBB device
can be derived from the minimum transmission rate
When the
jth mMTC pair
occupies the subcarrier
i, the interference caused by
to the base station is
To ensure the rate requirement of the eMBB device, the interference caused by the mMTC pair
should not exceed the maximum interference allowed by the subcarrier
i, i.e.,
Therefore, a set of mMTC pairs allowed to occupy subcarrier
i can be selected according to Equation (13). For all mMTC pairs that can be accessed, we first define the normalized interference caused by each pair as
. Define the interference matrix as
When the mMTC pair , , attempts to access the subcarrier i, the following two conditions should be satisfied.
- (i)
The interference caused by and the total interference of mMTC pairs cannot exceed the maximum interference allowed by subcarrier i, i.e., .
- (ii)
All of the accessed mMTC pairs should satisfy their own QoS.
When both conditions are satisfied, the mMTC pair is allowed to access the subcarrier. In order to facilitate the calculation, we convert the rate constraint of the eMBB device in (11) into an interference limit:
where
Substituting (14) for (11), then the optimization problem is converted into
The optimization variables of this problem are all binary variables, and the optimization problem (16a) is an NP-hard problem that cannot be solved by the convex optimization method. The traditional way to solve an NP-hard problem is to carry out an exhaustive search, which involves unaccepted computational complexity. Thus, it is difficult to obtain the optimal result by direct solution. This paper proposes a heuristic algorithm with lower complexity to tackle the problem, referred to as interference-aware subcarrier allocation for mMTC.
Firstly, the mMTC pair with minimal interference to the base station is selected in the two-dimensional matrix , and the access conditions (16b) and (16c) are updated according to the QoS of the eMBB devices and other mMTC pairs. Once an mMTC pair occupies a subcarrier, the mMTC pair is prohibited from accessing other subcarriers. When the sum of the interference ratio accumulated on subcarrier i is not less than 1, other mMTC pairs will be no longer allowed to access the subcarrier i.
For the constraint condition (16c), we can estimate whether the QoS requirements are still satisfied after each mMTC pair occupies the subcarrier according to (7) and (9). Due to the interference between mMTC pairs accessing the same channel, the interference range of the mMTC pair is defined in this paper to suppress interference between mMTC pairs. The interference range of an mMTC pair is defined as the range in which the mMTC pairs suffer from the interference of . Thus, the mMTC pairs in the interference range of cannot access the same subcarrier with to avoid interference. In other words, when mMTC pair accesses subcarrier i, the other pairs within the interference range of cannot access subcarrier i to reduce the interference between the mMTC pairs and to ensure the QoS of each mMTC pair.
The IASA algorithm is summarized in Algorithm 1. Lines 1–5 of the algorithm calculate the maximum interference that all subcarriers can support (line 3) and the proportion of the interference from each mMTC pair (line 5). Then a two-dimensional matrix is formed. Lines 6–12 of the algorithm sort the data in the two-dimensional matrix in ascending order one-dimensionally. Firstly, we find the mMTC pair and subcarrier corresponding to the minimum interference ratio. Then we estimate whether the accumulated interference caused by the mMTC pair exceeds the maximum interference allowed by the subcarrier so as to determine whether the mMTC pair can access the sub-carrier (line 7). After the mMTC pair accesses subcarrier i, the mMTC pair within the interference range of is prohibited from accessing subcarrier i (line 9).
Algorithm 1 Interference-Aware Spectrum Allocation for mMTC Communication Algorithm. |
- 1:
Initialize: B, , , , , , . - 2:
Calculate , in accordance with (11). - 3:
Calculate the interference caused by all mMTC pairs accessing subcarriers according to (10c). - 4:
Calculate the proportion of all mMTC pairs to the maximum interference that each subcarrier can withstand and obtain the interference matrix . - 5:
Select the smallest element in matrix . For , , judge whether (9) and (14) is established. - 6:
If , the mMTC pair is allowed to access subcarriers, . If , the mMTC pair is not allowed to access the subcarrier, . - 7:
. - 8:
Filter out the mMTC pair set J within the pair interference range. Assign all the corresponding to subcarrier i to 0. - 9:
Assign the ratio of the mMTC pair to the corresponding subcarrier in this cycle to . - 10:
Repeat 6–9 until all of the mMTC pairs have been assigned. - 11:
Output matrix .
|
The IASA algorithm is a centralized algorithm that can be implemented by a centralized controller. First, the centralized controller collects the information from mMTC devices who want to transmit packets with their neighborhood devices, including the channel state information and the required transmission rate. Then the centralized controller obtains the spectrum allocation results according to the IASA algorithm and broadcasts the allocation results to each mMTC pair. Then each mMTC transmitter completes the packets transmission on its allocated subcarrier.
5. Simulation Result Analysis
In this section, we present numerical results to verify the performance of the proposed IASA algorithm. We compare the number of mMTC pairs accessing the network successfully according to the proposed subcarrier allocation algorithm, the random access algorithm, and the sequential access algorithm. The two benchmark algorithms are described as follows.
Random access algorithm (RAA): Firstly, an interference ratio is randomly selected in the two-dimensional interference matrix. Then, we find out the corresponding mMTC devices and the access to subcarrier i. According to (9) and (14), it can be judged whether the QoS of the eMBB devices and the mMTC devices is satisfied, that is, whether the mMTC devices can access the subcarrier i. In the end, we repeat the above selection and access process until all subcarriers achieve the limit of interference they can sustain.
Sequential access algorithm (SAA): All of the mMTC devices sequentially judge whether the QoS of the eMBB devices and the mMTC devices are satisfied. When the sum of the interference ratio of subcarrier i is more than 1, other mMTC devices are prohibited from accessing the subcarrier i.
Greedy algorithm (GA): In the greedy algorithm, each subcarrier gives priority to its own access number. Specifically, the mMTC pair with minimum interference to a certain subcarrier is firstly accessed, when the QoS of the eMBB device and mMTC pair can be satisfied. When the cumulative interference of subcarrier i exceeds 1, other mMTC pairs are forbidden from accessing the subcarrier.
It is assumed that the eMBB and mMTC devices are evenly distributed in a circular region where the radius is 200 m. All of the devices are served by the same base station that controls the allocation of subcarriers. This paper considers a flat Rayleigh fading channel. The distance-dependent path loss
is [
12]
where D is the communication distance and
is the antenna gain. The value of
is 0.4 dB.
L is the indoor penetration loss. we assume that 80% of mMTC equipment is indoor equipment, where
L takes 20 dB; 20% is outdoor mMTC equipment, where
L takes 0 dB.
Figure 2 is a location distribution diagram of eMBB devices and mMTC devices. We consider an area with a radius of 200 m, in which the eMBB devices and mMTC devices are evenly and randomly distributed in the area, and the base station is set at the origin.
Figure 3 shows the number of mMTC pairs that successfully access subcarriers for different eMBB devices with
dB,
dB,
bps,
bps. The total number of mMTC pairs is 150, and the interference range of the mMTC pair is 80 m. Among the four algorithms, the number of mMTC pairs accessed increases as the number of subcarriers increases. The reason is that when the number of subcarriers increases, the mMTC pairs will be more likely to access the subcarriers. Some mMTC pairs with large interference also have the opportunity to access the subcarriers. Compared to the three contrastive algorithms, the IASA algorithm can realize more mMTC devices accessed in the system. The reason is that under the premise of guaranteeing the QoS of the eMBB devices and the mMTC pairs, the mMTC pair with the least interference to the subcarriers is selected first according to the IASA algorithm. The distance limitation is established to reduce the interference between the adjacent mMTC pairs. Meanwhile, the complexity of the algorithm is reduced. For GA, each subcarrier gives priority to the access number optimization of itself rather than the access performance of the whole system, so the access number of the system cannot be maximized. However, since GA considers the mMTC priority access with less interference in each subcarrier, its performance is better than RAA and SAA. For RAA and SAA, there may be an mMTC pair with large interference accessing the subcarrier at any time, which occupies a large proportion of the interference space that the subcarrier can sustain. Under these circumstances, some mMTC pairs with small interference cannot access the subcarrier because the space for interference is finite. Therefore, the IASA algorithm enables the system to accommodate more mMTC pairs.
Figure 4 depicts the number of mMTC pairs that access subcarriers for different eMBB devices with
dB,
dB,
bps. The interference range of the mMTC pairs is 80 m. The number of mMTC pairs that access the subcarriers decreases gradually when the minimum transmission rate of the eMBB devices gradually increases. The reason is that when the minimum transmission rate of the eMBB devices increases, the maximum interference that each subcarrier can sustain is reduced. In the case where the interference caused by the mMTC pair is unchanged, the number of mMTC pairs that can access the subcarriers is reduced. In the low-rate phase, the RAA exhibits much lower access performance than the IASA algorithm. And the SAA exhibits a comparable access performance with IASA algorithm. However, as the rate of eMBB devices increase, the performance of SAA have dropped significantly compared to the IASA algorithm.
Figure 5 presents the number of mMTC pairs accessed when the power of the mMTC pairs transmitter change with
dB,
bps,
bps. The interference range of the mMTC pairs is 80 m. The number of accessed mMTC devices gradually decreases as the power of the mMTC transmitter increases. This is due to the fact that the interference to subcarriers increases while the power of the mMTC transmitting increases. Therefore, the number of mMTC devices accessed is relatively reduced. Compared to the variables such as the number of eMBB devices and the minimum transmission rate of eMBB devices, the power of the mMTC transmitter has a relatively small impact on the number of mMTC pairs accessed in the system.
Figure 6 investigates the number of mMTC pairs accessed when there are different numbers of mMTC pairs in the system. The parameter settings are the same as in
Figure 3. The number of mMTC devices accessed increases as the number of mMTC pairs in the system increases. Before the number of subcarriers is saturated, the more mMTC devices in the system, the greater the opportunity to access devices that satisfy the QoS requirements of the eMBB devices. Thus, the total number of mMTC pairs accessed will increase. However, when the power and the minimum transmission rate of the eMBB devices are fixed, the number of mMTC devices accessed by all subcarriers is constant, so the number of mMTC pairs accessed will gradually become saturated. Among the three algorithms shown in
Figure 6, the RAA achieves the access saturation state first.
6. Conclusions
In this paper, an interference-aware subcarrier allocation algorithm for mMTC is proposed for the subcarrier allocation problem of D2D communication in mMTC scenarios. Initially, we establish a model maximizing the number of mMTC pairs accessed. When carrying out subcarrier allocation, we calculate the maximum interference that each subcarrier can sustain. Then we determine the mMTC pair with the least interference to the subcarrier and estimate the access property according to whether the QoS of the mMTC pair is satisfied. When the accumulated interference caused by the mMTC pair is greater than the maximum interference limit that the subcarrier can sustain, the subcarrier will be not be accessible to other mMTC pairs anymore. Simulation results demonstrated the effectiveness of the proposed algorithm.