Next Article in Journal
Nanomechanical Characterization of Vertical Nanopillars Using an MEMS-SPM Nano-Bending Testing Platform
Next Article in Special Issue
K-Means Spreading Factor Allocation for Large-Scale LoRa Networks
Previous Article in Journal
Vehicle Logo Recognition Based on Enhanced Matching for Small Objects, Constrained Region and SSFPD Network
Previous Article in Special Issue
A Dynamic Access Probability Adjustment Strategy for Coded Random Access Schemes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Interference-Aware Subcarrier Allocation for Massive Machine-Type Communication in 5G-Enabled Internet of Things

1
School of Information and Control Engineering, China University of Mining and Technology, Xuzhou 221000, China
2
school of Communication and Information Engineering, Xi’an University of Science and Technology, Xi’an 710054, China
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(20), 4530; https://doi.org/10.3390/s19204530
Submission received: 3 August 2019 / Revised: 5 October 2019 / Accepted: 14 October 2019 / Published: 18 October 2019
(This article belongs to the Special Issue Internet of Things and Sensors Networks in 5G Wireless Communications)

Abstract

:
Massive machine-type communication (mMTC) is investigated as one of three typical scenes of the 5th-generation (5G) network. In this paper, we propose a 5G-enabled internet of things (IoT) in which some enhanced mobile broadband devices transmit video stream to a centralized controller and some mMTC devices exchange short packet data with adjacent devices via D2D communication to promote inter-device cooperation. Since massive MTC devices have data transmission requirements in 5G-enabled IoT with limited spectrum resources, the subcarrier allocation problem is investigated to maximize the connectivity of mMTC devices subject to the quality of service (QoS) requirement of enhanced Mobile Broadband (eMBB) devices and mMTC devices. To solve the formulated mixed-integer non-linear programming (MINLP) problem, which is NP-hard, an interference-aware subcarrier allocation algorithm for mMTC communication (IASA) is developed to maximize the number of active mMTC devices. Finally, the performance of the proposed algorithm is evaluated by simulation. Numerical results demonstrate that the proposed algorithm outperforms the three traditional benchmark methods, which significantly improves the utilization of the uplink spectrum. This indicates that the proposed IASA algorithm provides a better solution for IoT application.

1. Introduction

In the future industrial internet of things (IIoT), a large number of devices including monitoring sensors and execution control units will be deployed to support factory automation and industry control system [1]. Massive periodic/non-periodic data will be transferred to a centralized control unit or adjacent devices via an industry wireless network, including video monitoring information, sensing data, operation instructions. However, due to the limited capacity and throughput of the current cellular system, it is insufficient in supporting future IoT applications with a tremendous number of devices and heterogeneous information traffic [2].
Massive machine-type communication (mMTC), as one of three typical application scenarios in the 5th-generation (5G) network, is investigated to support communication among a massive number of devices, which provides a feasible solution for future industrial IoT (IIoT) [3]. Due to limited spectrum resources in the cellular system, massive devices access the wireless network in a spectrum-sharing manner in which multiple devices are allocated in the same spectrum at the same time. Thus, the co-channel interference among devices restricts the number of devices connected to the cellular system. Effective interference management plays a vital role in mMTC to support the simultaneous access of more devices. The features and challenges of mMTC in IoT are as follows. First, devices in IoT need to exchange information with their neighbor devices frequently. In other words, the communication is performed between adjacent devices [4]. Second, the coding blocklengths for IoT are usually short, to reduce the transmission delay. The transmission rate cannot be estimated by the conventional Shannon’s capacity, which assumes an infinite blocklength [5]. Third, a massive number of devices in IoT need to be supported. Thus, efficient resource allocation in mMTC needs to be investigated to address these challenges.
A wide range of works have contributed to the resource allocation problem in mMTC. In [6], the authors establish an interference model and a formulate resource allocation problem between users and machine-type communication (MTC) gateways in mMTC burst scenarios. In [7], the authors investigated the access management issues for MTC devices with heterogeneous quality of service (QoS) in the same cellular network. This work does not consider bandwidth utilization because transmission opportunities are reserved for a group of MTC devices at the same time. The authors in [8] propose two relay schemes and transmission protocols to specifically stimulate system capacity. In a multi-cell MTC system, Kwon et al. [9] establishes the interference model and analyzes the signal-to-interference-plus-noise-ratio (SINR) distributions and drives efficient resource allocation schemes. In [10], the authors propose a dynamic resource allocation algorithm based on the estimation of the number of MTC devices to handle massive and dynamic MTC devices while satisfying the random access delay requirement of MTC devices. To achieve effective resource utilization, a resource allocation metric based on statistical priority is proposed in  [11]. In this way, effective resource utilization is achieved by letting MTC devices send a reduced set of their data. In [12], the authors consider a connectivity maximization problem for narrowband IoT with non-orthogonal multiple-access (NOMA). However, articles [6,7,8,9,10,11,12] assume that all devices communicate with the base station or centralized controller directly and do not consider the communications between adjacent devices.
D2D technology, as another promising technology in 5G, can establish communication between adjacent nodes, which can improve the spectrum efficiency and offload the load of Base Station (BS). D2D communication is introduced to mMTC system to stimulate spectrum efficiency and support more mMTC devices accessed with limited spectrum resources. However, designing better resource allocation algorithms to manage the inter-user interference between D2D users and cellulars is the key challenge for improving system performance. Resource allocation and interference problems of D2D communication have been investigated in many works [13,14,15]. The authors in [16] propose a cell sectorization scheme to alleviate the interference between cellular users and D2D users. In [17], the authors investigate interference coordination for downlink full-dimension multiple-output systems with underlying D2D communications.
Adopting D2D technology, the number of supported devices can be improved in mMTC scenarios [18]. By allowing unauthorized devices to reuse the frequency bands of authorized cellular users, bandwidth utilization can be improved [19,20,21]. The literature  [22] proposes a heuristic subcarrier allocation method to set the user’s signal-to-noise ratio (SNR) threshold to meet the QoS of the system. The authors in [23] propose a mobile traffic offloading scheme that combines small base stations with D2D offloading. The goal is to accommodate a large number of MTC connections by maximizing the throughput of the network system. The impact of radio frequency energy harvesting on the spectral efficiency of the D2D-assisted MTC system is analyzed first in [24]. In [25], the authors propose two solutions to manage the communication between D2D devices and the BS to lighten the overhead of MTC devices on the 5G network. However, resource allocation [19,20,21,22,23,24,25] mainly focuses on throughput maximization or interference minimization. In an IIoT enabled by D2D communications, massive devices demand access to the network via D2D mode. Thus, the connectivity maximization problem becomes a challenging issue to tackle. To support a system in which the number of users is higher than the number of subcarriers, a range of fair subcarrier allocation algorithms is proposed that always improves the reliability [26]. However, the author only considers the scenario of mobile users in the downlink and does not consider the influence of interference.
In this paper, we investigate a D2D-enabled internet of things in which some devices (enhanced Mobile Broadband (eMBB) devices) connect to the centralized controller while other devices (mMTC devices) communicate with their adjacent devices via D2D communication to promote inter-device cooperation in industry automation. Specifically, mMTC devices reuse the spectrum resource with eMBB devices. We establish the connectivity maximization problem of mMTC devices while guaranteeing the QoS of eMBB devices and mMTC devices. Furthermore, we propose an interference-aware subcarrier allocation algorithm to tackle the problem. The main contributions of this paper are as follows:
  • We establish a problem of maximizing the number of accessed mMTC pairs subject to the constraints of QoS in a system with both eMBB and mMTC devices, which is proven to be a mixed-integer non-linear programming (MINLP) problem.
  • We propose an interference-aware subcarrier allocation algorithm for mMTC (IASA) considering the interference range of each mMTC device.
  • In order to evaluate the proposed algorithm, a simulation is conducted. The results demonstrate that the proposed algorithm outperforms two benchmark algorithms significantly in terms of the number of mMTC pairs accessed under the same constraints.
The remainder of the paper is organized as follows. The system model and assumptions is elaborated in the “System Model” section. The optimization problem and constraints are introduced in the “Problem Formulation” section. The proposed subcarrier allocation algorithm is presented in the “Interference-Aware Subcarrier Allocation for mMTC Communication Algorithm” section. Comprehensive simulation results are provided in the “Simulation result analysis” section. Finally, we conclude the paper in the ”Conclusion” section.

2. System Model

In this paper, we investigate an industrial wireless network in which some devices, referred to as eMBB devices (such as monitoring cameras), transmit video information to a centralized controller, while devices referred to as mMTC devices (such as sensors and actuators), transmit short blocklength packets to their adjacent devices to promote inter-device cooperation and industrial automation. The system model is illustrated in Figure 1, where N eMBB devices and M mMTC devices are randomly distributed, represented by sets N = C U 1 , , C U i , , C U N and M = M U 1 , , M U j , , M U M , respectively. The mMTC devices transmit information from the transmitters to receivers by the D2D communication mode, and the mMTC pairs reuse the eMBB devices’ uplink resources in order to improve the spectrum efficiency. The mMTC pairs and eMBB devices are represented by M U j and C U i , respectively. Each mMTC pair is composed of one mMTC transmitter and one mMTC receiver represented by M U j t and M U j r , respectively. All available spectrum resources are divided into sub-carriers with the same bandwidth. Each eMBB device occupies mutually orthogonal sub-carriers. Therefore, there is no co-channel interference between the eMBB devices. We assume that the eMBB device C U i occupies the subcarrier i. Considering the impact of devices on each other, each mMTC pair is allowed to access no more than one subcarrier, and each subcarrier can be accessed by multiple mMTC devices. All of the channels in the system are assumed to be quasi-static Rayleigh fading channels. The channel gain remains constant for each symbol transmission period but varies independently between different symbol periods. The parameters in the article are shown in Table 1.
We define a binary subcarrier allocation matrix A { 0 , 1 } M × N , where α i j = 1 indicates that M U j occupies subcarrier i, otherwise α i j = 0 , i N , j M . Thus, the received signal of the base station on subcarrier i is
y i = P i c g i , B x i + j M α i j P j d h j , B x j + n 0 ,
where x i and x j are the transmitted signals of the eMBB devices C U i and the mMTC transmitter M U j t , respectively. n 0 represents normalized additive white Gaussian noise, n 0 C N 0 , σ 0 2 . When the centralized controller receives the uplink signals of the eMBB device C U i , the SINR at centralized controller can be calculated as
γ c u i = g i , B 2 P i c I + σ 0 2 B ,
where B is the subcarrier bandwidth and I represents the interference caused by the mMTC pairs which access the subcarrier i:
I = j = 1 M α i j P j d h j , B 2 .
Since the eMBB devices transmit long packet data, the achievable transmission rate of the eMBB device C U i can be obtained by Shannon’s theorem:
R c u i = B log 1 + γ c u i .
The signal received by the jth mMTC pair M U j is
z j = P j d g j x j + i N α i j P i c h i , j x i + j = 1 j j M i N α i j P j d f j , j x j + n 0 ,
where the first term is the signal receiver M U j r received from mMTC transmitter M U j t . The second term is the interference from the eMBB device C U i . The third term is the interference signal from the transmitter of the mMTC pair M U j that occupies the same subcarrier with mMTC pair M U j . According to (5), the SINR of the mMTC receiver M U j r can be derived as
γ j = P j d g j 2 i N α i j P i c h i , j 2 + j = 1 j j M i N α i j P j d f j , j 2 + σ 0 2 .
Since mMTC communication is mostly aimed at periodic monitoring data in IoT applications such as smart cities, the length of data packets transmitted is usually very short. According to information theory, the rate of short packets cannot achieve the Shannon limit. Therefore, the transmission rate of the mMTC devices is represented by the short packet rate [27], as shown in (7):
R j = log 2 ( 1 + γ j ) 1 m log 2 ( e ) Q 1 ( ε ) 1 1 ( 1 + γ j ) 2
where m is the block length, ε is the transmission error probability, and Q 1 ( x ) is the inverse of the Gaussian Q function.

3. Problem Formulation

The optimization goal of this paper is to maximize the total number of mMTC devices accessed under the QoS of each eMBB device. All of the mMTC devices access the network adhere to the following criteria:
(i)
Each mMTC device is allowed to access no more than one subcarrier.
(ii)
To ensure the transmission quality of the eMBB devices, the interference each subcarrier can suffer should be below a threshold.
(iii)
Both eMBB devices and mMTC devices should satisfy their own transmission rate requirements.
When the jth mMTC pair is allowed to access the subcarrier i, the SINR of the receiver of M U j is
γ j = P j d g j 2 P i c h i , j 2 + j = 1 j j M α i j P j d f j , j 2 + σ 0 2 .
Taking γ j in (8) into (7), we can get the transmission rate R j after mMTC pair M U j is allowed to access the subcarrier i. In order to ensure the QoS of the mMTC pair M U j , the achievable rate R j of the mMTC pair M U j should not be less than the minimum required rate R j - min , i.e.,
R j R j - min .
When the mMTC pair M U j is allowed to access the subcarrier i, the minimum transmission rate of the eMBB device C U i is R c u - min i . Under the QoS constraint of the eMBB devices and the mMTC pairs, we maximize the number of mMTC pairs accessed in the network. Mathematically, the optimization problem is formulated as
max α i j i = 1 N j = 1 M α i j ,
s . t R c u i R c u - min i ,
R j R j - min ,
α i j { 0 , 1 } , i N j M ,
i = 1 N α i j 1 .
The constraints described in (10b) and (10c) indicate that the respective minimum transmission rate requirements of the eMBB devices and the mMTC pairs should be satisfied. Equation (10e) reveals that each mMTC pair is allowed to occupy at most one subcarrier. The optimization problem is a binary optimization problem, and the traversal complexity of the problem is 2 M N . In the following section, we propose a lower complexity algorithm named interference-aware subcarrier allocation for mMTC communication.

4. Interference-Aware Subcarrier Allocation for mMTC Communication Algorithm

According to the constraint condition (10b), the accumulated interference allowed by the eMBB device C U i can be derived from the minimum transmission rate R c u - min i
I c u - max i = P i c g i , B 2 2 R c u - min i 1 σ 0 2 B .
When the jth mMTC pair M U j occupies the subcarrier i, the interference caused by M U j to the base station is
I j , B = P j d h j , B 2 .
To ensure the rate requirement of the eMBB device, the interference caused by the mMTC pair M U j should not exceed the maximum interference allowed by the subcarrier i, i.e.,
I j , B I c u - max i .
Therefore, a set of mMTC pairs allowed to occupy subcarrier i can be selected according to Equation (13). For all mMTC pairs that can be accessed, we first define the normalized interference caused by each pair as I j , i = I j , B / I c u - max i . Define the interference matrix as
Ω = I 1 1 I 2 1 I M 1 I 1 2 I 2 2 I M 2 I 1 N I 2 N I M N .
When the mMTC pair M U j , j j , attempts to access the subcarrier i, the following two conditions should be satisfied.
(i)
The interference caused by M U j and the total interference of mMTC pairs cannot exceed the maximum interference allowed by subcarrier i, i.e., I c u - max i .
(ii)
All of the accessed mMTC pairs should satisfy their own QoS.
When both conditions are satisfied, the mMTC pair is allowed to access the subcarrier. In order to facilitate the calculation, we convert the rate constraint of the eMBB device in (11) into an interference limit:
I c u i I c u - max i ,
where
I c u i = j M I j , B i N .
Substituting (14) for (11), then the optimization problem is converted into
max α i j i = 1 N j = 1 M α i j ,
s . t I c u i I c u - max i ,
R j R j - min ,
α i j { 0 , 1 } , i N j M ,
i = 1 N α i j 1 j M .
The optimization variables of this problem are all binary variables, and the optimization problem (16a) is an NP-hard problem that cannot be solved by the convex optimization method. The traditional way to solve an NP-hard problem is to carry out an exhaustive search, which involves unaccepted computational complexity. Thus, it is difficult to obtain the optimal result by direct solution. This paper proposes a heuristic algorithm with lower complexity to tackle the problem, referred to as interference-aware subcarrier allocation for mMTC.
Firstly, the mMTC pair with minimal interference to the base station is selected in the two-dimensional matrix Ω , and the access conditions (16b) and (16c) are updated according to the QoS of the eMBB devices and other mMTC pairs. Once an mMTC pair occupies a subcarrier, the mMTC pair is prohibited from accessing other subcarriers. When the sum of the interference ratio accumulated on subcarrier i is not less than 1, other mMTC pairs will be no longer allowed to access the subcarrier i.
For the constraint condition (16c), we can estimate whether the QoS requirements are still satisfied after each mMTC pair occupies the subcarrier according to (7) and (9). Due to the interference between mMTC pairs accessing the same channel, the interference range of the mMTC pair is defined in this paper to suppress interference between mMTC pairs. The interference range of an mMTC pair M U j is defined as the range in which the mMTC pairs suffer from the interference of M U j . Thus, the mMTC pairs in the interference range of M U j cannot access the same subcarrier with M U j to avoid interference. In other words, when mMTC pair M U j accesses subcarrier i, the other pairs within the interference range of M U j cannot access subcarrier i to reduce the interference between the mMTC pairs and to ensure the QoS of each mMTC pair.
The IASA algorithm is summarized in Algorithm 1. Lines 1–5 of the algorithm calculate the maximum interference that all subcarriers can support (line 3) and the proportion of the interference from each mMTC pair (line 5). Then a two-dimensional matrix is formed. Lines 6–12 of the algorithm sort the data in the two-dimensional matrix in ascending order one-dimensionally. Firstly, we find the mMTC pair and subcarrier corresponding to the minimum interference ratio. Then we estimate whether the accumulated interference caused by the mMTC pair exceeds the maximum interference allowed by the subcarrier so as to determine whether the mMTC pair can access the sub-carrier (line 7). After the mMTC pair M U j accesses subcarrier i, the mMTC pair within the interference range of M U j is prohibited from accessing subcarrier i (line 9).
Algorithm 1 Interference-Aware Spectrum Allocation for mMTC Communication Algorithm.
1:
Initialize: B, P i c , P j d , R c u - min i , R j , α i j = 0 i N , j M .
2:
Calculate I c u - max i , i N in accordance with (11).
3:
Calculate the interference I j , B caused by all mMTC pairs accessing subcarriers according to (10c).
4:
Calculate the proportion of all mMTC pairs to the maximum interference that each subcarrier can withstand I c u - max i and obtain the interference matrix Ω .
5:
Select the smallest element i * , j * in matrix Ω . For C U i * , M U j * , judge whether (9) and (14) is established.
6:
If I c u i I c u - max i , the mMTC pair is allowed to access subcarriers, α i j = 1 .
If I c u i > I c u - max i , the mMTC pair is not allowed to access the subcarrier, α i j = 0 .
7:
α i j = 0 , i N , i i .
8:
Filter out the mMTC pair set J within the pair M U j interference range. Assign all the α i j     j J corresponding to subcarrier i to 0.
9:
Assign the ratio Ω ( : , j ) of the mMTC pair to the corresponding subcarrier in this cycle to s ( s 1 ) .
10:
Repeat 6–9 until all of the mMTC pairs have been assigned.
11:
Output matrix A .
The IASA algorithm is a centralized algorithm that can be implemented by a centralized controller. First, the centralized controller collects the information from mMTC devices who want to transmit packets with their neighborhood devices, including the channel state information and the required transmission rate. Then the centralized controller obtains the spectrum allocation results according to the IASA algorithm and broadcasts the allocation results to each mMTC pair. Then each mMTC transmitter completes the packets transmission on its allocated subcarrier.

5. Simulation Result Analysis

In this section, we present numerical results to verify the performance of the proposed IASA algorithm. We compare the number of mMTC pairs accessing the network successfully according to the proposed subcarrier allocation algorithm, the random access algorithm, and the sequential access algorithm. The two benchmark algorithms are described as follows.
Random access algorithm (RAA): Firstly, an interference ratio is randomly selected in the two-dimensional interference matrix. Then, we find out the corresponding mMTC devices and the access to subcarrier i. According to (9) and (14), it can be judged whether the QoS of the eMBB devices and the mMTC devices is satisfied, that is, whether the mMTC devices can access the subcarrier i. In the end, we repeat the above selection and access process until all subcarriers achieve the limit of interference they can sustain.
Sequential access algorithm (SAA): All of the mMTC devices sequentially judge whether the QoS of the eMBB devices and the mMTC devices are satisfied. When the sum of the interference ratio of subcarrier i is more than 1, other mMTC devices are prohibited from accessing the subcarrier i.
Greedy algorithm (GA): In the greedy algorithm, each subcarrier gives priority to its own access number. Specifically, the mMTC pair with minimum interference to a certain subcarrier is firstly accessed, when the QoS of the eMBB device and mMTC pair can be satisfied. When the cumulative interference of subcarrier i exceeds 1, other mMTC pairs are forbidden from accessing the subcarrier.
It is assumed that the eMBB and mMTC devices are evenly distributed in a circular region where the radius is 200 m. All of the devices are served by the same base station that controls the allocation of subcarriers. This paper considers a flat Rayleigh fading channel. The distance-dependent path loss PL ( D ) is [12]
P L ( D ) = 120 . 9 + 37 . 6 log ( D / 1000 ) + L + A G ,
where D is the communication distance and AG is the antenna gain. The value of AG is 0.4 dB. L is the indoor penetration loss. we assume that 80% of mMTC equipment is indoor equipment, where L takes 20 dB; 20% is outdoor mMTC equipment, where L takes 0 dB.
Figure 2 is a location distribution diagram of eMBB devices and mMTC devices. We consider an area with a radius of 200 m, in which the eMBB devices and mMTC devices are evenly and randomly distributed in the area, and the base station is set at the origin.
Figure 3 shows the number of mMTC pairs that successfully access subcarriers for different eMBB devices with P i c = 10 dB, P j d = 7 dB, R c u - min i = 10 bps, R j = 5 bps. The total number of mMTC pairs is 150, and the interference range of the mMTC pair is 80 m. Among the four algorithms, the number of mMTC pairs accessed increases as the number of subcarriers increases. The reason is that when the number of subcarriers increases, the mMTC pairs will be more likely to access the subcarriers. Some mMTC pairs with large interference also have the opportunity to access the subcarriers. Compared to the three contrastive algorithms, the IASA algorithm can realize more mMTC devices accessed in the system. The reason is that under the premise of guaranteeing the QoS of the eMBB devices and the mMTC pairs, the mMTC pair with the least interference to the subcarriers is selected first according to the IASA algorithm. The distance limitation is established to reduce the interference between the adjacent mMTC pairs. Meanwhile, the complexity of the algorithm is reduced. For GA, each subcarrier gives priority to the access number optimization of itself rather than the access performance of the whole system, so the access number of the system cannot be maximized. However, since GA considers the mMTC priority access with less interference in each subcarrier, its performance is better than RAA and SAA. For RAA and SAA, there may be an mMTC pair with large interference accessing the subcarrier at any time, which occupies a large proportion of the interference space that the subcarrier can sustain. Under these circumstances, some mMTC pairs with small interference cannot access the subcarrier because the space for interference is finite. Therefore, the IASA algorithm enables the system to accommodate more mMTC pairs.
Figure 4 depicts the number of mMTC pairs that access subcarriers for different eMBB devices with P i c = 10 dB, P j d = 7 dB, R j = 5 bps. The interference range of the mMTC pairs is 80 m. The number of mMTC pairs that access the subcarriers decreases gradually when the minimum transmission rate of the eMBB devices gradually increases. The reason is that when the minimum transmission rate of the eMBB devices increases, the maximum interference that each subcarrier can sustain is reduced. In the case where the interference caused by the mMTC pair is unchanged, the number of mMTC pairs that can access the subcarriers is reduced. In the low-rate phase, the RAA exhibits much lower access performance than the IASA algorithm. And the SAA exhibits a comparable access performance with IASA algorithm. However, as the rate of eMBB devices increase, the performance of SAA have dropped significantly compared to the IASA algorithm.
Figure 5 presents the number of mMTC pairs accessed when the power of the mMTC pairs transmitter change with P i c = 10 dB, R c u - min = 10 bps, R j = 5 bps. The interference range of the mMTC pairs is 80 m. The number of accessed mMTC devices gradually decreases as the power of the mMTC transmitter increases. This is due to the fact that the interference to subcarriers increases while the power of the mMTC transmitting increases. Therefore, the number of mMTC devices accessed is relatively reduced. Compared to the variables such as the number of eMBB devices and the minimum transmission rate of eMBB devices, the power of the mMTC transmitter has a relatively small impact on the number of mMTC pairs accessed in the system.
Figure 6 investigates the number of mMTC pairs accessed when there are different numbers of mMTC pairs in the system. The parameter settings are the same as in Figure 3. The number of mMTC devices accessed increases as the number of mMTC pairs in the system increases. Before the number of subcarriers is saturated, the more mMTC devices in the system, the greater the opportunity to access devices that satisfy the QoS requirements of the eMBB devices. Thus, the total number of mMTC pairs accessed will increase. However, when the power and the minimum transmission rate of the eMBB devices are fixed, the number of mMTC devices accessed by all subcarriers is constant, so the number of mMTC pairs accessed will gradually become saturated. Among the three algorithms shown in Figure 6, the RAA achieves the access saturation state first.

6. Conclusions

In this paper, an interference-aware subcarrier allocation algorithm for mMTC is proposed for the subcarrier allocation problem of D2D communication in mMTC scenarios. Initially, we establish a model maximizing the number of mMTC pairs accessed. When carrying out subcarrier allocation, we calculate the maximum interference that each subcarrier can sustain. Then we determine the mMTC pair with the least interference to the subcarrier and estimate the access property according to whether the QoS of the mMTC pair is satisfied. When the accumulated interference caused by the mMTC pair is greater than the maximum interference limit that the subcarrier can sustain, the subcarrier will be not be accessible to other mMTC pairs anymore. Simulation results demonstrated the effectiveness of the proposed algorithm.

Author Contributions

W.H. designed the algorithm, performed the theoretical analysis, and wrote the manuscript. S.L. and Y.S. implemented the simulation and contributed to the manuscript preparation. J.Z. analyzed the data. X.Y. and N.L. contributed to polishing the revised manuscript and provided suggestions on simulation evaluation.

Acknowledgments

This work was supported by the Science and Technology Project of Xuzhou (KC18105 KC18068), the National Natural Science Foundation of China (61771417 51734009 51804304), the National Key Research and Development Program (2016YFC0801403), and the Fundamental Research and Development Foundation of Jiangsu Province.

Conflicts of Interest

The authors declare no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

References

  1. Meng, Z.; Wu, Z.; Gray, J. A Collaboration-Oriented M2M Messaging Mechanism for the Collaborative Automation between Machines in Future Industrial Networks. Sensors 2017, 17, 2694. [Google Scholar] [CrossRef] [PubMed]
  2. Park, J.H. Advances in Future Internet and the Industrial Internet of Things. Symmetry 2019, 11, 244. [Google Scholar] [CrossRef]
  3. Al-Sakran, A.; Qutqut, M.H.; Almasalha, F.; Hassanein, H.S.; Hijjawi, M. An Overview of the Internet of Things Closed Source Operating Systems. In Proceedings of the 2018 14th International Wireless Communications Mobile Computing Conference (IWCMC), Limassol, Cyprus, 25–29 June 2018; pp. 291–297. [Google Scholar] [CrossRef]
  4. Laya, A.; Alonso, L.; Alonso-Zarate, J. Is the random access channel of LTE and LTE-A suitable for M2M communications? A survey of alternatives. IEEE Commun. Surv. Tutor. 2013, 16, 4–16. [Google Scholar] [CrossRef]
  5. Kawabata, H.; Ishibashi, K.; Vuppala, S.; de Abreu, G.T. Robust relay selection for large-scale energy-harvesting IoT networks. IEEE Internet Things J. 2016, 4, 384–392. [Google Scholar] [CrossRef]
  6. Hu, X.; Sun, J. Interference Analysis and Resource Allocation of Burst Scenario in Massive Machine-Type Communications. In Proceedings of the 2018 IEEE 18th International Conference on Communication Technology (ICCT), Chongqing, China, 8–11 October 2018; pp. 822–826. [Google Scholar] [CrossRef]
  7. Lien, S.; Chen, K. Massive Access Management for QoS Guarantees in 3GPP Machine-to-Machine Communications. IEEE Commun. Lett. 2011, 15, 311–313. [Google Scholar] [CrossRef] [Green Version]
  8. Tefek, U.; Lim, T.J. Relaying and Radio Resource Partitioning for Machine-Type Communications in Cellular Networks. IEEE Trans. Wirel. Commun. 2017, 16, 1344–1356. [Google Scholar] [CrossRef]
  9. Kwon, T.; Choi, J. Multi-Group Random Access Resource Allocation for M2M Devices in Multicell Systems. IEEE Commun. Lett. 2012, 16, 834–837. [Google Scholar] [CrossRef]
  10. Oh, C.; Hwang, D.; Lee, T. Joint Access Control and Resource Allocation for Concurrent and Massive Access of M2M Devices. IEEE Trans. Wirel. Commun. 2015, 14, 4182–4192. [Google Scholar] [CrossRef]
  11. Mostafa, A.E.; Gadallah, Y. Uniqueness-Based Resource Allocation for M2M Communications in Narrowband IoT Networks. In Proceedings of the 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, Canada, 24–27 September 2017; pp. 1–5. [Google Scholar] [CrossRef]
  12. Mostafa, A.E.; Zhou, Y.; Wong, V.W. Connectivity maximization for narrowband IoT systems with NOMA. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar]
  13. Han, S.; Xu, X.; Zhao, L.; Tao, X. Joint time and power allocation for uplink cooperative non-orthogonal multiple access based massive machine-type communication Network. Int. J. Distrib. Sens. Netw. 2018, 14, 1550147718778215. [Google Scholar] [CrossRef]
  14. Li, J.; Zhang, X.; Feng, Y.; Li, K.C. A Resource Allocation Mechanism Based on Weighted Efficiency Interference-Aware for D2D Underlaid Communication. Sensors 2019, 19, 3194. [Google Scholar] [CrossRef] [PubMed]
  15. Li, Z.; Gui, J.; Xiong, N.; Zeng, Z. Energy-Efficient Resource Sharing Scheme With Out-Band D2D Relay-Aided Communications in C-RAN-Based Underlay Cellular Networks. IEEE Access 2019, 7, 19125–19142. [Google Scholar] [CrossRef]
  16. Ningombam, D.D.; Lee, C.G.; Shin, S. Interference Mitigation for Multicast D2D Communications Underlay Cellular Networks. In Proceedings of the 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Okinawa, Japan, 11–13 February 2019; pp. 1–4. [Google Scholar] [CrossRef]
  17. Li, X.; Qin, N.; Sun, T. Interference coordination for FD-MIMO cellular network with D2D communications underlaying. China Commun. 2018, 15, 75–88. [Google Scholar]
  18. Asadi, A.; Wang, Q.; Mancuso, V. A survey on device-to-device communication in cellular networks. IEEE Commun. Surv. Tutor. 2014, 16, 1801–1819. [Google Scholar] [CrossRef]
  19. Kai, Y.; Wang, J.; Zhu, H.; Wang, J. Resource Allocation and Performance Analysis of Cellular-Assisted OFDMA Device-to-Device Communications. IEEE Trans. Wirel. Commun. 2019, 18, 416–431. [Google Scholar] [CrossRef]
  20. Lu, B.; Lin, S.; Shi, J.; Wang, Y. Resource Allocation for D2D Communications Underlaying Cellular Networks Over Nakagami-m Fading Channel. IEEE Access 2019, 7, 21816–21825. [Google Scholar] [CrossRef]
  21. Chour, H.; Jorswieck, E.A.; Bader, F.; Nasser, Y.; Bazzi, O. Global Optimal Resource Allocation for Efficient FD-D2D Enabled Cellular Network. IEEE Access 2019, 7, 59690–59707. [Google Scholar] [CrossRef]
  22. Huang, Y.F.; Tan, T.H.; Liu, S.P.; Liu, T.Y.; Chen, C.M. Performance of subcarrier allocation of D2D multicasting for wireless communication systems. In Proceedings of the 2018 Tenth International Conference on Advanced Computational Intelligence (ICACI), Xiamen, China, 29–31 March 2018; pp. 193–196. [Google Scholar]
  23. Cao, W.; Feng, G.; Qin, S.; Liang, Z. D2D Communication Assisted Traffic Offloading for Massive Connections in HetNets. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar] [CrossRef]
  24. Atat, R.; Liu, L.; Mastronarde, N.; Yi, Y. Energy Harvesting-Based D2D-Assisted Machine-Type Communications. IEEE Trans. Commun. 2017, 65, 1289–1302. [Google Scholar] [CrossRef]
  25. Bagaa, M.; Ksentini, A.; Taleb, T.; Jantti, R.; Chelli, A.; Balasingham, I. An efficient D2D-based strategies for machine type communications in 5G mobile systems. In Proceedings of the 2016 IEEE Wireless Communications and Networking Conference, Doha, Qatar, 3–6 April 2016; pp. 1–6. [Google Scholar] [CrossRef]
  26. Shi, J.; Yang, L.L. Novel subcarrier-allocation schemes for downlink MC DS-CDMA systems. IEEE Trans. Wirel. Commun. 2014, 13, 5716–5728. [Google Scholar] [CrossRef]
  27. Xu, S.; Chang, T.; Lin, S.; Shen, C.; Zhu, G. Energy-Efficient Packet Scheduling With Finite Blocklength Codes: Convexity Analysis and Efficient Algorithms. IEEE Trans. Wirel. Commun. 2016, 15, 5527–5540. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Sensors 19 04530 g001
Figure 2. Distribution of eMBB devices and mMTC devices in cellular systems.
Figure 2. Distribution of eMBB devices and mMTC devices in cellular systems.
Sensors 19 04530 g002
Figure 3. Number of mMTC pairs accessed versus different eMBB devices using different algorithms.
Figure 3. Number of mMTC pairs accessed versus different eMBB devices using different algorithms.
Sensors 19 04530 g003
Figure 4. Number of mMTC pairs accessed versus different rate requirements of eMBB devices.
Figure 4. Number of mMTC pairs accessed versus different rate requirements of eMBB devices.
Sensors 19 04530 g004
Figure 5. Number of mMTC pairs accessed versus different mMTC device transmit powers.
Figure 5. Number of mMTC pairs accessed versus different mMTC device transmit powers.
Sensors 19 04530 g005
Figure 6. Number of mMTC pairs accessed versus different number of mMTC devices.
Figure 6. Number of mMTC pairs accessed versus different number of mMTC devices.
Sensors 19 04530 g006
Table 1. System parameters.
Table 1. System parameters.
NotationDescription
g j Gain between M U j t and M U j r
g i , B Gain between C U i and the centralized controller
h i , j Interference gain between C U i and M U j r
h j , B Interference gain between M U j t and the centralized controller
f j , j Interference gain between M U j t and M U j r
P i c The transmit power of C U i
P j d The transmit power of M U j t

Share and Cite

MDPI and ACS Style

Hou, W.; Li, S.; Sun, Y.; Zhou, J.; Yun, X.; Lu, N. Interference-Aware Subcarrier Allocation for Massive Machine-Type Communication in 5G-Enabled Internet of Things. Sensors 2019, 19, 4530. https://doi.org/10.3390/s19204530

AMA Style

Hou W, Li S, Sun Y, Zhou J, Yun X, Lu N. Interference-Aware Subcarrier Allocation for Massive Machine-Type Communication in 5G-Enabled Internet of Things. Sensors. 2019; 19(20):4530. https://doi.org/10.3390/s19204530

Chicago/Turabian Style

Hou, Wenjun, Song Li, Yanjing Sun, Jiasi Zhou, Xiao Yun, and Nannan Lu. 2019. "Interference-Aware Subcarrier Allocation for Massive Machine-Type Communication in 5G-Enabled Internet of Things" Sensors 19, no. 20: 4530. https://doi.org/10.3390/s19204530

APA Style

Hou, W., Li, S., Sun, Y., Zhou, J., Yun, X., & Lu, N. (2019). Interference-Aware Subcarrier Allocation for Massive Machine-Type Communication in 5G-Enabled Internet of Things. Sensors, 19(20), 4530. https://doi.org/10.3390/s19204530

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop