Distributed interference-aware energy-efficient resource allocation for device-to-device communications underlaying cellular networks

Zhenyu Zhou, Mianxiong Dong, Kaoru Ota, Jun Wu, Takuro Sato

Research output: Chapter in Book/Report/Conference proceedingConference contribution

40 Citations (Scopus)

Abstract

The introduction of device-to-device (D2D) into cellular networks poses many new challenges in the resource allocation design due to the co-channel interference caused by spectrum reuse and limited battery life of user equipments (UEs). In this paper, we propose a distributed interference-aware energy-efficient resource allocation algorithm to maximize each UE's energy efficiency (EE) subject to its specific quality of service (QoS) and maximum transmission power constraints. We model the resource allocation problem as a noncooperative game, in which each player is self-interested and wants to maximize its own EE. The formulated EE maximization problem is a non-convex problem and is transformed into a convex optimization problem by exploiting the properties of the nonlinear fractional programming. An iterative optimization algorithm is proposed and verified through computer simulations.

Original languageEnglish
Title of host publication2014 IEEE Global Communications Conference, GLOBECOM 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages4454-4459
Number of pages6
ISBN (Electronic)9781479935116
DOIs
Publication statusPublished - 2014 Feb 9
Event2014 IEEE Global Communications Conference, GLOBECOM 2014 - Austin, United States
Duration: 2014 Dec 82014 Dec 12

Other

Other2014 IEEE Global Communications Conference, GLOBECOM 2014
Country/TerritoryUnited States
CityAustin
Period14/12/814/12/12

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications
  • Communication

Fingerprint

Dive into the research topics of 'Distributed interference-aware energy-efficient resource allocation for device-to-device communications underlaying cellular networks'. Together they form a unique fingerprint.

Cite this