Next Article in Journal
Shape Sensing of Plate Structures Using the Inverse Finite Element Method: Investigation of Efficient Strain–Sensor Patterns
Next Article in Special Issue
Towards Energy Efficient Home Automation: A Deep Learning Approach
Previous Article in Journal
Sensor Technology for Smart Homes
Previous Article in Special Issue
Outage Probability and Ergodic Capacity of a Two-User NOMA Relaying System with an Energy Harvesting Full-Duplex Relay and Its Interference at the Near User
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Device-to-Device Aided Cooperative Relaying Scheme Exploiting Spatial Modulation: An Interference Free Strategy †

1
Department of Electrical and Electronic Engineering, University of Chittagong, Chittagong 4331, Bangladesh
2
Department of Computer Science and Engineering, Sejong University, Seoul 05006, Korea
3
Department of Electronics and Information Engineering, Korea University, Sejong 30019, Korea
*
Authors to whom correspondence should be addressed.
This paper is an extended version of our conference paper: Kamal, M.S.; Kader, M.F. Interference Free Device-to-Device Aided Cooperative Relaying Scheme. In Proceedings of the 2020 IEEE Region 10 Symposium (TENSYMP), Dhaka, Bangladesh, 5–7 June 2020.
Submission received: 6 November 2020 / Revised: 3 December 2020 / Accepted: 7 December 2020 / Published: 9 December 2020

Abstract

:
In this paper, a novel interference free dual-hop device-to-device (D2D) aided cooperative relaying strategy (CRS) based on spatial modulation (SM) (termed D2D-CRS-SM) is proposed. In D2D-CRS-SM, two cellular users (e.g., a near user (NU) and a relay-aided far user (FU)) and a pair of D2D transmitter (D 1 )-receivers (D 2 ) are served in two time-slots. Two different scenarios are investigated considering information reception criteria at the NU. Irrespective of the scenarios, the base station (BS) exploits SM to map information bits into two sets: modulation bits and antenna index, in phase-1. In the first scenario, the BS maps FU information as the modulation bits and NU information as antenna index, whereas modulation bits correspond to NU information and the antenna index carries FU’s information in scenario-2. The iterative-maximum ratio combining (i-MRC) technique is then used by NU and D 1 to de-map their desired information bits. During phase-2, D 1 also exploits SM to forward FU’s information received from BS and its own information bits to the D2D receiver D 2 . Then, FU and D 2 retrieve their desired information by using i-MRC. Due to exploiting SM in both phases, interference free information reception is possible at each receiving node without allocating any fixed transmit power. The performance of D2D-CRS-SM is studied in terms of bit-error rate and spectral efficiency considering M-ary phase shift keying and quadrature amplitude modulation. Finally, the efficiency of D2D-CRS-SM is demonstrated via the Monte Carlo simulation.

1. Introduction

1.1. Technological Background

Cellular communication is an essential part of the daily activities of billions of people. The number of cellular users are increasing exponentially. The existing radio resources are congested heavily because of continuously emerging applications and services. Therefore, more effective techniques are required to efficiently use the scarce radio resources [1,2]. Furthermore, existing wireless technologies such as fourth generation (4G) is unable to fulfill the ever-growing capacity demands by the wireless users. As a result, a new wireless communication technology termed fifth-generation (5G) [3,4] has started to be deployed in the different parts of the world. However, a single technology alone cannot fulfill the performance requirements of 5G and beyond networks; multiple technologies should be integrated [5,6]. This motivates us to exploit the spatial modulation (SM) in a cooperative relaying scenario with the aid of D2D communication to achieve interference free communication, the key work of this paper.
In a situation where the communication link between the source and destination becomes hostile for data transmission due to poor channel condition or fading in the channel (e.g., user located at cell edge), the use of cooperative communication techniques is a viable solution. In cooperative relaying strategy (CRS), the source transmits information data to the destination which is also heard by a relay node being somewhere in between the source and the destination. Because of its location, both source-to-relay and relay-to-destination channel conditions become favorable for reliable communications. Then the relay eventually processes and forwards the overheard data signal to the destination following some cooperation protocols. With the received signal from the relay, the destination decodes the information transmitted from the source [7,8,9]. Cooperative communication potentially improves network coverage and link reliability while reducing cost [10,11].
In recent years, wireless researchers around the globe have investigated various advanced communication paradigms, including SM multiple-input and multiple-output (MIMO) (termed SM-MIMO) to enhance the capacity and reliability performance of the system or network with reduced complexity [12,13,14,15,16,17,18]. In MIMO, multiple antennas transmit and receive at the same time using conventional modulation techniques that results in a capacity gain [19]. However, the performance of MIMO communications largely depend on antenna spacing of transmission and reception [20,21]. It also depends on antenna synchronization among the transmit antennas and the interference cancellation techniques used to reduce the inter-channel interference (ICI) at the receiver [22,23]. SM-MIMO is promising to solve these issues. Unlike MIMO, SM allows only one antenna to transmit at a particular time instant while other antennas remain silent. This in turn avoids ICI and interference cancellation techniques are therefore not required at the receiver. Furthermore, there is no correlation among the transmit antennas and no synchronization among them is required. Thus, SM-MIMO offers reduced receiver complexity [12,13,14,15,16,17,18].
Conventional modulation techniques such as M-ary phase shift keying (M-PSK) and M-ary quadrature amplitude modulation (M-QAM) map a certain number of information bits into a symbol. In SM, the two dimensional signal plane is extended to a new dimension called spatial dimension. The spatial domain is an outcome of the idea of using the antenna numbers as an additional source of information. Therefore, information bits are mapped not only into the transmitted symbol but also into an actual physical location of the antenna. The number of data bits that can be transmitted using SM-MIMO depends upon the constellation diagram used and the number of transmit antennas. To better understand this mapping, the following example is given. Suppose that five data bits can be mapped into 16-PSK and two transmit antennas. However, if the channel condition is not compatible with 16-PSK, the same data rate can be achieved by a combination of 8-PSK and four transmit antennas. Due to the expansion of modulation to the spatial domain, higher number of data bits is transferred by the transmitted symbol while the symbol duration remains the same. As a result, improved spectrum efficiency is achieved [12].
Every communication in a cellular network took place through the base station (BS) till 4G cellular networks and no direct communication was allowed between two devices under licensed spectrum. However, direct communication between devices using licensed cellular band is expected to be allowed in 5G systems which is called device-to-device (D2D) communication technology. D2D communication allows devices to communicate with each other without or limited involvement of a BS [24,25,26,27,28,29]. As D2D users can directly communicate among themselves using the same cellular infrastructure, it not only offloads traffic from the core network but also improves applications and services offered by the system. Additionally, higher bit rates are achieved along with reduced energy consumption.
Furthermore, D2D communication enables better connectivity and signal strength for cell edge or congested area users. Nevertheless, there exists a high susceptibility of interference between the D2D and cellular communication, since D2D users share licensed cellular frequency resources with the cellular users. Therefore, efficient power control, selection of communication mode, and efficient resource allocation are important issues for interference management in cellular network with D2D communications [30,31].

1.2. Related Works

In recent years, due to its advantageous unique characteristics, adopting SM in cooperative communications has received considerable attention from researchers [32]. To provide improved system performance, cooperative SM is applied in different areas such as cooperative relaying [32,33,34,35,36], spectrum sharing [37,38,39], wireless security [40,41], energy harvesting [42,43] and so on.
In [32], a cooperative scheme is proposed based on SM (termed CoSM) to mitigate the inter-cell interference experienced by the cell edge user. A multi-cell cellular network is considered where cells are sectored by rearranged fractional frequency reuse. Additionally, a three-tier cellular architecture is presented since extra amount of feedback is required to exploit CoSM to enhance the quality of service for cell edge mobile stations. In [33,34], SM-based half-duplex CRS are proposed, where a dedicated relay equipped with single antenna forwards source information to destination exploiting amplify-and-forward (AF) strategy. At the destination, maximum likelihood detector is used to estimate antenna and symbol information. The performance of [33] is studied over independent Rayleigh fading channel, whereas spatially correlated Rayleigh Channel is considered in [34]. In [35], a joint bit-to-symbol mapping scheme is proposed in a cooperative SM system for both AF and decode-and-forward (DF) relaying techniques to elevate the performance of the system by using the cosine similarity among the single-antenna relay nodes and channel state information (CSI) of each transmit antenna. A dedicated relay-aided cooperative SM system is proposed in [36] for two common relaying protocols AF and DF, considering multiple antennas at all nodes.
In [37], a cooperative spectrum sharing protocol based on overlay paradigm is proposed for cognitive radio networks (CRNs), where primary transmitter (PT) is equipped with single-antenna. A secondary transmitter (ST) exploiting SM assists the PT to communicate with the primary receiver (PR) in exchange of an opportunity of spectrum sharing. A cooperative spectrum sharing protocol for a CRN is proposed in [38] considering multiple antennas at all nodes. SM is adopted by both PT and ST, where ST acts as a DF relay to forward primary information and its own information simultaneously. In [39], a cooperative spectrum sharing protocol employing orthogonal SM is presented, where both PT and ST transmit simultaneously on the same frequency channel.
Considering the eavesdropping vulnerability of wireless communication, the information-theoretic secrecy performance of an SM-based cooperative AF relaying system adopting destination-based- jamming is investigated in [40]. In [41], the physical layer spoofing attack is studied for a dual-hop cooperative communication network that exploits SM. Considering the whole CSI is known to the spoofer, the investigation points out that the spoofing attack can extensively damage SM-based cooperative communication. A cooperative full-duplex DF relaying radio frequency energy harvesting protocol using time-switching architecture is proposed in [42]. A dual antenna relay exploiting SM harvests energy from the received source signal, where source is equipped with single antenna. In [43], a wireless-powered communication strategy is presented where SM is used to elevate system achievable rate. A wireless device adopts SM to simultaneously communicates with an information receiver and harvests radio frequency energy from a wireless energy transmitter. SM allows self-energy recycling at wireless device through partial energy harvesting from the energy that is used for information transmission. However, none of these works considered D2D communications in the proposed network scenarios [32,33,34,35,36,37,38,39,40,41,42,43].
D2D communication in cooperative communication scenarios are studied extensively in the literature without exploiting SM [44,45,46,47,48]. A comprehensive overview of the cooperative D2D techniques is presented in [44] along with future research directions. A brief discussion on different types of simulators including Vienna long term evolution-advanced is also provided. The performance of a D2D aided cellular downlink system is studied in [45], where a D2D user cooperatively relays the traffic of a cellular far user (FU) and transmits its signal to the D2D receiver simultaneously exploiting non-orthogonal multiple access. Two different types of D2D aided cooperative schemes for cellular uplink transmission system are proposed in [46], where D2D agents are selected randomly by the BS based on certain density. The performance of a cooperative cellular uplink network is investigated in [47], where a D2D transmitter acts as a cooperative relay for a cellular user and transmits its signal to the D2D receiver simultaneously. To maximize the achievable sum data rate, optimal power allocation coefficient and spectrum allocation indicator are also identified. Social aware cooperative D2D networks are investigated in [48]. Moreover, formation of social relationship, cooperative network evaluation based on social learning, and peer selection on the basis of social relationship are also discussed.
Furthermore, from the literature [25,45], it is apparent that each user is assigned a specific frequency band, time slot, or code in order to avoid inter-symbol or inter-user interference in orthogonal multiple access. In contrast, the main idea of non-orthogonal multiple access (NOMA) is that multiple users share the same physical resources (e.g., frequency, time, and code) by allocating different amounts of power to the different users. Therefore, it is clear that although same physical resources are shared by NOMA users, each user must be allocated a different amount of power to exploit successive interference cancellation at the receiving nodes to decode the corresponding symbols.
Unlike the existing works, this study proposes a dual-hop D2D aided CRS exploiting SM, where two cellular users (e.g., a near user (NU) and a relay aided FU) and a pair of D2D transmitter (D 1 )-receiver (D 2 ) are served in two cooperative phases (e.g., phase-1 ( P 1 ) and phase-2 ( P 2 )). Each phase requires one time-slot. The BS transmits data bits for NU and FU at the same time exploiting SM in P 1 . FU, located at cell edge, has poor channel condition with low signal-to-noise ratio (SNR). D2D capable device D 1 forwards FU information along with its own data for D 2 using SM in P 2 . While keeping all the benefits of cooperative D2D communication, the proposed scheme make the system interference free because of the inherent characteristics of SM. Moreover, there will be no leasing of time slots or power allocation for both cellular and D2D communication.

1.3. Contributions

The major contributions of this work are summarized as follows:
  • A novel D2D aided two-phase CRS exploiting SM-MIMO (termed D2D-CRS-SM) is proposed, where interference cancellation and management techniques are not required at any of the communication nodes. Two different scenarios are investigated considering information reception criteria at NU during P 1 .
  • The proposed protocol demonstrates how interference free information reception is possible at multiple cellulars and D2D users in the same frequency band considering downlink transmission scenario. Moreover, unlike other popular method such as NOMA, no fixed portion of transmitted power is required to be allocated for a user.
  • In conventional SM [12], both symbol and antenna indices of a transmitter are the desired information of a single receiver. However, in D2D-CRS-SM, symbol and antenna indices are the desired information of two different receivers; the protocol, thus, facilitates multi-user communication.
  • The performance of D2D-CRS-SM is analyzed and investigated, in terms of bit error rate (BER), spectral efficiency (SE), and sum SE considering M-PSK and M-QAM over independent Rayleigh fading channels. Moreover, comparative results with Vertical-Bell Laboratories layered space-time (VBLAST) spatial multiplexing MIMO technique [49] with zero-forcing (ZF) detector [50] (termed VBLAST-ZF) is also provided.
  • The efficiency of D2D-CRS-SM is validated via Monte Carlo simulation. It is observed that sum SE in both scenarios is almost identical for similar set of parameters.

1.4. Organization

The rest of the paper is organized as follows. The system and channel models of the proposed cooperative relaying scheme are described in Section 2. In Section 3 the performance evaluation of the proposed cooperative protocol is formulated for different users. The simulation and analytical results are presented in Section 4. The final section concludes our work. To look at a glance, Figure 1 presents the organization of this article.

2. System and Channel Models

Two different proposed network scenarios i.e., scenario-1 (S 1 ) and scenario-2 (S 2 ) in D2D-CRS-SM are shown in Figure 2 and Figure 3, respectively (Part of this work was presented in [51]. It should be mentioned that a very initial result was presented in  [51] by considering only the second scenario of the proposed network architecture in this paper. Moreover, the performance of [51] was studied in terms of BER and SE considering only BPSK and QPSK.). Each scenario consists of a BS, two cellular users (e.g., NU and FU) and a D2D transmitter-receiver pair (e.g., D 1 and D 2 ). The direct link between the BS and FU is assumed to be weak for data transmission because of poor conditions of channel. Hence, the direct link is not suitable for communication and it is neglected for this reason. So the BS solely depends upon D 1 for the purpose of communication with FU, where D 1 acts as half-duplex DF relay. The above assumptions are very much valid for cellular users such as FU situated far from BS e.g., a user located at the edge of a cellular network and suffers from very low SNR. Each node is a multi-antenna system. The communication nodes BS, NU, FU, D 1 and D 2 are equipped with A B S , A N U , A F U , A D 1 , and A D 2 antennas, respectively. It is important to mention that the data transmission policy in S 1 and S 2 is identical except that antenna index of BS is the desired information of NU in S 1 , whereas modulation symbol of BS is the desired information of NU in S 2 .
For the channel between any two communication nodes x and y, it is assumed that the channel experiences independent Rayleigh flat fading plus additive white Gaussian noise. The channel coefficient is denoted by h x , y CN ( 0 , λ x , y ) with zero mean and variance λ x , y , where ( x , y ) { B S , N U , F U , D 1 , D 2 } and x y . So the link gain will be α x , y = | h x , y | 2 , where α x , y is an exponentially distributed random variable with a scale parameter (or mean value) λ x , y ( λ x , y > 0 )  [52,53]. The transmit powers of BS and D 1 are represented as P B S and P D 1 , respectively. The average SNR is denoted by ρ . It is also assumed that the receivers are well aware of CSI i.e., CSI at NU and D 1 during P 1 and CSI at FU and D 2 during P 2 . The data transmission process in the proposed D2D-CRS-SM is completed in two cooperative phases which are described in detail in the following sections.

2.1. Phase-1 ( P 1 ): BS→ (D 1 , NU) Data Transmission

During P 1 , the BS transmits to NU and D 1 by invoking SM. The information bit stream of BS are mapped into two data carrying units: the M 1 -PSK/QAM modulation order bits and the antenna index. In S 1 , the BS maps NU data bits as antenna indices and FU data bits as M 1 -PSK/QAM modulation symbols. The mapping is shuffled in S 2 ; NU data bits are mapped as M 1 -PSK/QAM modulation symbols and FU data bits are mapped as antenna indices. Hence, in each transmission, the total number of bits that can be transmitted by BS in S 1 and S 2 are respectively given by [12,38]
X 1 , S 1 = Q 1 + N 1 = log 2 ( A B S ) + log 2 ( M 1 ) ,
X 1 , S 2 = Q 1 + N 1 = log 2 ( M 1 ) + log 2 ( A B S ) .
where Q 1 , N 1 , and M 1 represent number of bits per NU symbol, number of bits per FU symbol, and modulation order used by BS, respectively. Various order of modulation can be used, e.g., BPSK, QPSK/4-QAM, 8-PSK/8-QAM, 16-PSK/16-QAM, 32-PSK/32-QAM and 64-PSK/64-QAM which represent corresponding values of M 1 = [2, 4, 8, 16, 32 and 64], respectively. Exploiting SM allows BS to activate only one of its antennas for a particular transmission. As a result, ICI is avoided and synchronization among the antennas is not required anymore. The data blocks transmitted by the BS is then de-mapped using iterative-maximum ratio combining (i-MRC) [12] technique by NU and D 1 to retrieve their desired information.
From (1) and (2), it is apparent that there is a trade-off between the modulation order and the number of transmit antennas for any number of transmitted information bits. For example, three data bits per symbol can be sent with four transmit antennas using BPSK modulation. As a trade-off, the same three bits can be sent from two antennas using 4-QAM modulation.

2.2. Phase-2 ( P 2 ): D 1 → (D 2 , FU) Data Transmission

During P 2 , D 1 invokes SM as well to transmit data bits to FU and D 2 , only after decoding FU data bits from BS successfully. If the decoding of data bits is unsuccessful then D 1 remains idle during P 2 . Similar to P 1 , the information bits to be transmitted by D 1 is mapped into two data carrying units: the M 2 -PSK/QAM modulation order bits and the antenna index. Here, the modulation order bits are the data bits received from BS that need to be forwarded to FU and the antenna index is associated with D 1 ’s own information for transmitting to D 2 as part of D2D communication. It should be mentioned that D 1 must exploit M 2 = 2 N 1 -PSK/QAM modulation, in order to retransmit the decoded data bits of FU as the number of bits in a symbol of FU is N 1 . According to the concept of SM, only one antenna is allowed to be activated at D 1 at a particular time instant. D 1 selects the transmit antenna to be activated based on its own message symbol. Again, single antenna transmission avoids ICI along with synchronization among the antennas, as D 1 exploits SM-MIMO to retransmit FU data and and its own data to D 2 . As a result, an interference free data reception is possible by both FU and D 2 . Now, the number of data bits that can be transmitted by D 1 in S 1 and S 2 are respectively given by
X 2 , S 1 = N 1 + N 2 = log 2 ( M 1 ) + log 2 ( A D 1 ) ,
X 2 , S 2 = N 1 + N 2 = log 2 ( A B S ) + log 2 ( A D 1 ) .
where N 2 is the number of bits in each symbol of D 2 . Then i-MRC is used by both D 2 and FU, in order to de-map the data blocks from the received signal, where D 2 recovers the antenna index and the FU extracts desired modulation symbol. The proposed D2D aided CRS with the transmit antenna selection technique used by BS and D 1 is summarized in Algorithm 1. Moreover, the examples provided in Table 1 and Table 2 explain Algorithm 1 in a much simpler way. In Table 1, an example of SM mapping table at BS to transmit information to NU and FU is presented, whereas an example of SM mapping table at D 1 is demonstrated in Table 2. Here, error free transmission is assumed for the examples provided in the tables to make the explanation of the algorithms simple.
Algorithm 1 D2D-CRS-SM (A B S , N 1 , Q 1 A D 1 , N 2 )
1:
begin
2:
U s m ← block of data with length Q 1 corresponds to NU’s data
3:
F s m ← block of data with length N 1 corresponds to FU’s data
4:
B s m ← decoded block of data with length N 1 at D 1 during P 1
5:
D s m ←D 1 ’s own data divided into block of length N 2
Phase-I
6:
SM-based mapping table (e.g., Table 1) is constructed at BS.
7:
fori = 0 to A B S - 1 do
8:
    A i n d e x = i b ; equivalent binary bits of i
9:
    if U s m = A i n d e x [S 1 ] or, F s m = A i n d e x [S 2 ] then
10:
        BS transmits F s m in S 1 and U s m in S 2 by i t h antenna
11:
    end if
12:
end for
13:
NU and D 1 attempts to decode their corresponding information using i-MRC.
Phase-II
14:
if decoding is successful then
15:
    for i = 0 to A D 1 - 1 do
16:
        A i n d e x = i b ; equivalent binary bits of i
17:
        if D s m = A i n d e x then
18:
           D 1 transmits B s m by ith antenna
19:
        end if
20:
    end for
21:
else
22:
    D 1 remains idle during P 2 .
23:
end if
24:
end

3. Performance Analysis

In this section, we analyze the performance of D2D-CRS-SM, in terms of BER and SE over independent Rayleigh fading channels.

3.1. Bit-Error-Rate Computation

Data transmission from BS to FU is a dual-hop transmission. As mentioned in the previous section, D 1 forwards the signal of FU during P 2 , only if the received signal from BS is correctly estimated during P 1 , otherwise D 1 remains silent during P 2 . Hence, to determine the BER at FU, we have to consider the estimated error of links BS→ D 1 and D 1 →FU during P 1 and P 2 , respectively. Let P e , F U S , P 1 and P e , F U A , P 1 denote the probability of incorrect estimation of transmitted data of FU at D 1 in S 1 and S 2 , respectively during P 1 . Again, let P e , F U S , P 2 denote the probability of incorrect estimation of transmitted data at FU during P 2 . Therefore, the end-to-end (e2e) probability of error at FU in S 1 and S 2 can be written respectively as
P e 2 e , F U S 1 = 1 ( 1 P e , F U S , P 1 ) ( 1 P e , F U S , P 2 ) = P e , F U S , P 1 + P e , F U S , P 2 P e , F U S , P 1 × P e , F U S , P 2 ,
P e 2 e , F U S 2 = 1 ( 1 P e , F U A , P 1 ) ( 1 P e , F U S , P 2 ) = P e , F U A , P 1 + P e , F U S , P 2 P e , F U A , P 1 × P e , F U S , P 2 .
Apart from the node FU, other communication nodes (e.g., NU and D 2 ) in D2D-CRS-SM receive their data bits through the direct link. Hence, during P 1 , the probability of incorrect estimation of transmitted data at NU in S 1 and S 2 are denoted by P e , N U A , P 1 and P e , N U S , P 1 , respectively. In addition, the probability of incorrect estimation of antenna index at D 2 is denoted by P e , D 2 A , P 2 during P 2 . It is worth noting the following observations:
  • NU is only concerned about the correct estimate of antenna index and modulation symbol during P 1 in S 1 and S 2 , respectively. So the overall error probability of NU is only affected by the erroneous estimation of antenna index and modulation symbol in S 1 and S 2 , respectively.
  • The desired information of FU is the opposite of NU in P 1 , whereas the desired information of FU in P 2 is the transmitted modulation symbol by D 1 irrespective of S 1 and S 2 . Therefore, the overall error probability of FU as shown in (5) and (6) is only affected by erroneous estimation of modulation symbol and antenna index in S 1 and S 2 , respectively during P 1 as well as erroneous estimation of modulation symbol during P 2 .
  • Lastly, the overall error probability of D2D user D 2 is only affected by the erroneous estimation of antenna index in P 2 only.
Recall that BS and D 1 transmit by activating only one antenna due to the exploitation of SM. Hence, as a special case, any transmitted M-PSK/M-QAM symbol estimation at D 1 and FU in S 1 can be considered as 1 × A D 1 and 1 × A F U MRC detection, respectively [12]. Similarly, any transmitted M-PSK/M-QAM symbol estimation at NU in S 2 can be considered as 1 × A N U MRC detection. The analytical formulation of error probabilities of FU and NU under this special case is provided in Appendix A. Moreover, the overall error probability of the corresponding user for erroneous estimation of antenna number can be calculated by [12] (Equation (10)).

3.2. Spectral Efficiency Computation

3.2.1. Spectral Efficiency of FU

Recall that FU is not directly connected to the BS. It needs the assistance of D 1 to communicate with the BS. Therefore, both the first hop (BS→ D 1 ) and second hop (D 1 → FU) links need to be considered to compute the SE of FU. Now, using [54] (Equation (22)) and (5), the e2e overall SE of the FU in S 1 is obtained as
R S E , F U S 1 = 1 2 N 1 { 1 + P e 2 e , F U S 1 log 2 ( P e 2 e , F U S 1 ) + ( 1 P e 2 e , F U S 1 ) log 2 ( 1 P e 2 e , F U S 1 ) } .
where N 1 = log 2 ( M 1 ) in S 1 and N 1 = log 2 ( A B S ) in S 2 .
Again, using [54] (Equation (22)) and (6), the e2e overall SE of the FU in S 2 is obtained as
R S E , F U S 2 = 1 2 N 1 { 1 + P e 2 e , F U S 2 log 2 ( P e 2 e , F U S 2 ) + ( 1 P e 2 e , F U S 2 ) log 2 ( 1 P e 2 e , F U S 2 ) } .
Please note that the data transmission policy for S 1 and S 2 is different in P 1 but identical in P 2 . In (7) and (8), the scaling factor 1 2 is used to denote that the e2e data transmission is divided into two cooperative phases and each phase requires one time slot.

3.2.2. Spectral Efficiency of NU

As discussed in Section 2, NU directly communicates with the BS via the direct link in P 1 . However, NU keeps silent in P 2 . The overall SE of NU in S 1 and S 2 is therefore obtained respectively as
R S E , N U S 1 = 1 2 Q 1 { 1 + P e , N U A , P 1 log 2 ( P e , N U A , P 1 ) + ( 1 P e , N U A , P 1 ) log 2 ( 1 P e , N U A , P 1 ) ) } ,
R S E , N U S 2 = 1 2 Q 1 { 1 + P e , N U S , P 1 log 2 ( P e , N U S , P 1 ) + ( 1 P e , N U S , P 1 ) log 2 ( 1 P e , N U S , P 1 ) ) } .
where Q 1 = log 2 ( A B S ) in S 1 and Q 1 = log 2 ( M 1 ) in S 2 . In (9) and (10), the scaling factor 1 2 is used to denote that NU is unable to receive data from BS in P 2 .

3.2.3. Spectral Efficiency of D2D Link D 1 → D 2

Recall that D 1 stays silent during P 1 but forwards the decoded symbol of FU during P 2 . Irrespective of S 1 and S 2 , the desired information of D2D receiver D 2 is the antenna index of D 1 . Therefore, the overall SE of the D2D link D 1 → D 2 is expressed as
R S E , D 2 = 1 2 N 2 { 1 + P e , D 2 A , P 2 log 2 ( P e , D 2 A , P 2 ) + ( 1 P e , D 2 A , P 2 ) log 2 ( 1 P e , D 2 A , P 2 ) ) } .
In (11), the scaling factor 1 2 is used to denote that D 2 is unable to receive data from D 1 in P 1 .

3.2.4. Sum Spectral Efficiency of the Proposed D2D-CRS-SM

Using (7), (9), and (11), the sum SE of the proposed D2D-CRS-SM in S 1 is obtained as
R S E , s u m S 1 = R S E , F U S 1 + R S E , N U S 1 + R S E , D 2 .
Moreover, using (8), (10), and (11), the sum SE of the proposed D2D-CRS-SM in S 2 is obtained as
R S E , s u m S 2 = R S E , F U S 2 + R S E , N U S 2 + R S E , D 2 .

4. Numerical Results and Discussions

This section presents the performance of the proposed D2D-CRS-SM, in terms of BER, SE, and sum SE over independent and identically distributed Rayleigh fading channel. The channel coefficient of each link is assumed to be of zero mean and unit variance. Moreover, unless otherwise stated, the simulation parameters are summarized in Table 3.

4.1. Bit-Error-Rate

4.1.1. Bit-Error-Rate in S 1

In Figure 4, we present BER performance of both NU and D 2 with respect to SNR, where SNR varies from 0 to 30 dB. In S 1 , NU and D 2 have identical BERs because their BERs depend only on the incorrect antenna estimation. This is also true for BER of D 2 in S 2 . The terms in legend of Figure 4 represents the number of transmit and receive antennas. We observed that BER decreases with increasing SNR values, as expected. We also observed that the BER performance improves with an increase in the number of receive antennas. This is due to the increase of diversity order with an increase of the receive antenna numbers. On the other hand, an increase in the number of transmit antennas triggers more error. The reason is that when the number of transmit antennas increases, the likelihood of erroneous detection of antennas increases [12].
Figure 5 and Figure 6 illustrate the BER performance of FU in S 1 for different order of PSK and QAM modulation as a function of SNR, respectively, where two different types of antenna configurations are considered. Here, SNR ranges between 0 and 30 dB. The term in legends of the two figures denotes the number of antennas at BS (A B S ), D 1 (A D 1 ), FU (A F U ), and M-PSK/QAM modulation used by BS and D 1 to transmit FU data bits. In each instance, BER declines with an increase in SNR which is expected. We noted that in both figures higher order of modulation has higher BER compared to lower order of modulation when BS, D 1 and FU are all equipped with 4 antennas. This is because of the fact that when the number of modulation order increases, the likelihood of erroneous detection of constellation points increases due to the reduction of Euclidean distances among the points. Similar trend is observed in BER where all nodes are equipped with 2 antennas except that the BER curves tend to get closer to each other at high SNR.
In Figure 7, we plot BER of the different users in S 1 against SNR for a comparative analysis, where SNR varies between 0 and 30 dB. The legend terms show the corresponding information as we mentioned for the previous figures and additionally includes the transmitted number of data bits. Considering the same order of modulation, it is noticed that FU gives better BER performance with 4 antennas at all involving nodes compared to 2 antennas at all involving nodes. We also noticed similar trend in the BER performance of NU or D 2 , i.e., BER shows improved performance when all involving nodes are equipped with 4 antennas. It is worth noting that BER of NU or D 2 outperforms BER of FU for the transmission of the same number of data bits (e.g., 2 bits) when all the nodes in the system are equipped with four antennas. Recall that antenna indices are the desired information of NU and D 2 and modulation symbol is the desired information of FU in S 1 .

4.1.2. Bit-Error-Rate in S 2

Figure 8 demonstrates BER performance of NU in S 2 as a function of SNR for different order of PSK and QAM modulation, considering the BS and NU are equipped with the same number of of antennas. Here, SNR ranges between 0 to 30 dB. In each instance, BER gradually declines with increasing SNR which is expected. We observed that for both PSK and QAM higher order of modulation corresponds to higher BER. As we mentioned before, this is because of the fact that when the number of modulation order increases, the likelihood of erroneous detection of constellation points increases. We also noticed that for higher order of modulation BER performance with QAM is better compared to the ones with PSK.
In Figure 9, we portrait e2e BER performance of FU in S 2 with respect to SNR, where SNR holds values from 0 to 30 dB. The term in inset represents the following parameters: (i) A B S , A D 1 , and A F U denote the number of antennas at BS, D 1 and FU, respectively, and (ii) D 1 exploits SM to forward de-mapped FU information with 2 N 1 -PSK/QAM modulation. It is noted that an increase in the number of antennas at FU improves the BER performance, considering the same number of antennas at BS and D 1 . When the number of antennas at a receiver increases, the diversity order increases, which in turn improves the BER of FU with an increase in the number of receiving antennas. It is also observed that the improvement in BER is dramatic when the BS and D 1 are equipped with higher number of antennas.
In Figure 10, we show BER of the different users in S 2 against SNR for a comparative analysis. The legend terms denote the corresponding information as we mentioned for the previous two figures and additionally includes the transmitted number of data bits. Considering similar antenna configurations at the nodes involved in transmission, it is noticed that BER of NU is lower than other two users (D 2 and FU) while BER of FU is higher than others for the transmission of same number of data bits.

4.2. Spectral Efficiency

4.2.1. Spectral Efficiency in S 1

Figure 11 presents SE of both NU and D 2 in S 1 with respect to SNR that holds values between 0 and 30 dB. As we mentioned in the system model, SE of NU and D 2 solely depends on the antenna indices. Hence, their SE performance is identical in S 1 for the same antenna configuration. On the contrary, the SE performance of FU depends on the modulation order employed by BS and D 1 , during P 1 and P 2 , respectively in S 1 . It is observed that SE curves approach to the theoretical number of data bits at high SNR. This is because of the fact that at high SNR, BER tends to zero causing SE to reach its theoretical upper limit. It is also identified that an increase in the number of receiving antennas improves SE performance with the same number of transmitting antennas because of the improvement in diversity order. In Figure 12 and Figure 13, we illustrate SE performance of FU in S 1 for different PSK and QAM modulation order against SNR, considering two distinct antenna configurations. Here, SNR holds values from 0 to 30 dB. The term in legends of the figures represents the parameters as mentioned earlier in Figure 5 and Figure 6. The SE curves in both figures approach to the theoretical number of bits with increasing SNR, as expected. It is noticed that for the same antenna configuration SE performance is better with lower order of modulation compared to the ones with higher order of modulation at low SNR. However, the system shows better SE performance with higher modulation order for medium to high SNR.
Figure 14 demonstrates a comparative analysis of SE performance among different users in S 1 . The legend terms denote the corresponding parameters as mentioned earlier and additionally includes the transmitted number of data bits. As seen in the previous three figures, the SE curves here also lead to theoretical number of data bits eventually. We observe that SE performance of NU or D 2 is better than that of FU for the transmission of same number of data bits with a higher number of antennas at all of the involving nodes. We also observed that SE performance of FU with a higher number of antennas at all the nodes involved in transmission is lower compared to the one with a lower number of antennas at low SNR. On the other hand, for a higher number of antennas case, SE is better for medium to high SNR.

4.2.2. Spectral Efficiency in S 2

In Figure 15, we portrait SE performance of NU in S 2 for M-PSK/QAM modulation with respect to SNR, where SNR holds values between 0 and 30 dB. The term in legend of the figure denote M-PSK/QAM modulation order used by BS to transmit data to NU, the number of transmit antennas at BS (A B S ), and the number of receive antennas at NU (A N U ). It is noticed that the system achieves lower SE employing higher order of modulation at low SNR compared to the ones using lower order of modulation with identical antenna configuration at BS and NU. We noted that SE performance with QAM modulation is better than that with PSK modulation for the same modulation order. However, in each case, the SE curves approach the theoretical number of data bits with increasing SNR because of the same reason as mentioned before.
Figure 16 depicts SE performance of FU in S 2 with respect to SNR, where SNR ranges between 0 and 30 dB. The term in legend represents the parameters as mentioned earlier in Figure 9. Here, the SE curves lead to theoretical number of data bits with increasing SNR which is expected. It is duly noted that an increase in the number of antennas at FU improves SE performance of the system with the same antenna configuration at BS and D 1 , and same order of modulation used by D 1 .
In Figure 17, we plot SE of different users in S 2 against SNR for a comparative analysis. The legend terms show the corresponding parameters as mentioned earlier and additionally includes the transmitted number of data bits. As seen in the previous two figures, the SE curves here also lead to theoretical number of data bits eventually. We observed that NU achieves higher SE performance than other two users (D 1 and FU) while SE of FU is lower than others for the transmission of equal number of data bits with a similar antenna configuration at the nodes involved in transmission.

4.2.3. Sum Spectral Efficiency

Figure 18 portraits sum SE of the users in S 1 against SNR for different antenna combinations and order of modulations. The inset term represents the following parameters: (i) the number of antennas at BS (A B S ), NU (A N U ), D 1 (A D 1 ), D 2 (A D 2 ), and FU (A F U ), respectively, and (ii) the modulation order used by BS and D 1 to transmit FU symbol. We considered same number of antennas at all users for each instance to make consistent transmission. Please note that both BS and D 1 should use same modulation order for efficient transmission of information from BS to FU via D 1 , according to our system model; otherwise, inconsistency in data transmission will arise between P 1 and P 2 . We noted that in each instance sum SE curves approach to theoretical number of data bits which is anticipated because of the same reason as mentioned before. We recall that in S 1 , FU data bits depend on the modulation order employed by BS and D 1 . We observed that a higher order of modulation can be used to transmit FU information at a higher rate. This correspondingly effects the total SE of S 1 . As QAM is more spectral efficient than PSK modulation, we noticed that sum SE with QAM is better than that with PSK for the same order of modulation with identical antenna combination.
Figure 19 depicts sum SE of the users in S 2 against SNR for different antenna combinations and order of modulations. The inset term represents the following parameters: (i) BS uses M-PSK/QAM modulation to transmit NU information, (ii) the number of antennas at BS (A B S ), NU (A N U ), D 1 (A D 1 ), D 2 (A D 2 ), and FU (A F U ), respectively, and (iii) the modulation order used by D 1 to transmit FU data symbol. We considered same number of antennas at all users for each instance to make consistent transmission. We noted that in each instance sum SE curves approach to theoretical number of data bits which is obvious. Recall that in S 2 , NU data bits depend on the modulation order used by BS, whereas FU data bits depend on the number of antennas at BS. We observed that a higher order of modulation can be used by BS to transmit NU information at a higher rate, whereas D 1 is limited to use a modulation order that corresponds to the number of antennas available at BS to forward FU information. Different modulation orders and antenna combinations effect the total SE correspondingly.
Finally, we show a comparison of sum SE between our proposed scenarios S 1 and S 2 in Figure 20. We observed that sum of SE in S 1 and S 2 are quite identical to each other for the same combinations of antenna and modulation order. However, it needs to be mentioned that FU has the privilege of higher data rate through adoption of higher order of modulation in S 1 , whereas in S 2 , NU avails the benefits of modulation order.

4.3. Comparison between the Proposed D2D-CRS-SM and VBLAST MIMO with ZF Detection

Comparative results between the D2D-CRS-SM and spatial multiplexing MIMO (e.g., VBLAST) with ZF Detection, in terms of BER and SE are presented here. Recall that modulation order (i.e., symbol information) is the desired information of FU and NU in S 1 and S 2 , respectively. On the contrary, antenna indices of BS is the desired information of NU and FU in S 1 and S 2 , respectively. Therefore, for a fair comparison between the proposed D2D-CRS-SM and VBLAST-ZF, only the incorrect estimation of symbol information of FU in S 1 and NU in S 2 is considered in Figure 21 and Figure 22, respectively. From both figures, it is apparent that for the same set of modulation order and antenna configuration, the proposed SM-based model (i.e., D2D-CRS-SM) outperforms the VBLAST-ZF for any value of SNR, although higher number of bits can be transmitted by VBLAST-ZF than D2D-CRS-SM. Please note that the SE loss is not limitation of our system. Rather, it is the limitation of SM-based system [12,55]. Furthermore, it should be mentioned that SE obtained by SM-based system is sub-optimal because only one antenna of transmitter is activated at a particular time instant to transmit information. As a result, SM-based system can achieve lower SE than spatial multiplexing MIMO technique (e.g., VBLAST). Although SM-based systems provide sub-optimal SE, it has many advantages including simpler transmitter design, reduced receiver complexity, lower transmit power supply and so on. However, there are two alternative ways for SM-based system to achieve the SE as capacity achieving VBLAST: (i) having the same modulation order in both systems, SM-based systems should use a larger number of transmit antennas, or (ii) having the same antenna configuration in both systems, SM-based systems should use a higher modulation order [55]. In Table 4, the maximum achievable theoretical sum SE comparison is summarized between the proposed D2D-CRS-SM and VBLAST-ZF. From the table, it is apparent that the proposed system can achieve a competitive sum SE as in VBLAST-ZF by increasing modulation order for the same antenna configuration. Moreover, as shown in the simulation figures of the proposed system, by keeping the same modulation order, exploiting a larger number of transmit antennas can also achieve a better SE.
The maximum achievable theoretical sum SE of D2D-CRS-SM in S 1 and S 2 is given respectively by
R S E , s u m , S 1 D 2 D C R S S M = 1 2 log 2 A B S ̲ N U + min ( log 2 M 1 , log 2 M 2 ) ̲ F U + log 2 A D 1 ̲ D 2 ,
R S E , s u m , S 2 D 2 D C R S S M = 1 2 log 2 M 1 ̲ N U + min ( log 2 A B S , log 2 M 2 ) ̲ F U + log 2 A D 1 ̲ D 2 .
On the contrary, maximum achievable theoretical sum SE of VBLAST-ZF is given by
R S E , s u m V B L A S T = 1 4 ( A B S × N 1 ) ̲ N U + min ( ( A B S × N 1 ) , ( A D 1 × N 1 ) ) ̲ F U + ( A D 1 × N 1 ) ̲ D 2 .
It should be mentioned that the duplexing loss is taken into account due to two-hop communication model. That is why, overall SE is divided by 1/2 in D2D-CRS-SM and 1/4 in VBLAST-ZF. This means that four time-slots in total are required to receive data by all the three users (NU, FU, and D 2 ) if the considered network scenarios exploit VBLAST-ZF system, considering time-division multiple access. However, only two time slots are required in the proposed D2D-CRS-SM. Please note that for VBLAST-ZF, S 1 and S 2 are same.

5. Conclusions and Future Works

5.1. Conclusions

A D2D aided CRS exploiting SM (D2D-CRS-SM) considering two different scenarios for a downlink transmission was proposed and investigated, where each scenario consists of a BS, a NU, a FU, and a D2D transmitter (D 1 )-receiver (D 2 ) pair. In the proposed D2D-CRS-SM, D 1 cooperatively relays the traffic of a FU with no direct link with the BS. At the same time, D 1 gets the opportunity to communicate with D 2 without causing any mutual interference due to the exploitation of SM in D 1 . Moreover, no leasing of time slots or power allocation are required between the cellular and D2D user. The performance of D2D-CRS-SM is studied, in terms of BER, SE and sum SE, considering M-PSK and M-QAM. Moreover, a comparative study with VBLAST-ZF MIMO is also provided. The outcome of this study suggests that the proposed model can be a promising paradigm for the next generation wireless communications, where it is expected that cellular communication and D2D communication will coexist. It is worth mentioning that this is the basic model for a D2D aided CRS using SM.

5.2. Future Recommendations

Several possible improvements of this work can be possible, which can be the subject of future works. Firstly, a more general scenario with multiple NUs and FUs with the aid of multiple D2D pairs is anticipated to be studied. Secondly, hybrid DF- and AF-based cooperative D2D aided protocols can be investigated. Lastly, the proposed network models can be extended to the multi-cell scenario.
Although multiple technologies can be combined without too much effort in the simulation environment, there are many challenges to implement in a real environment. Some of them are as follows:
  • There should be both technical and policy requirements agreement among different service providers. For example, in the proposed technique, the cellular users and D2D users should be in consensus for their mutual benefits.
  • Whereas a simulation environment can assume perfect synchronization among the antennas or users and perfect channel estimation, the real environment introduces various challenging tasks.
  • During software simulation, it is considered that software algorithm can be realized perfectly by hardware design. However, algorithm design is often bounded by the hardware condition in real environment [56].
  • With the current 3rd generation partnership project (3GPP) cellular standards, different approaches need to be complied.

Author Contributions

Conceptualization, M.F.K.; Writing—original draft, M.S.K. and M.F.K.; Investigation, M.F.K. and S.M.R.I.; Writing—review and editing, M.F.K., S.M.R.I. and H.Y.; Supervision, M.F.K. All authors have read and agreed to the possible publication of the manuscript.

Funding

This research was supported by the National Research Foundation of Korea grant funded by the Korean government (Ministry of Science and ICT; 2019R1A2C1083988), by the Ministry of Science and ICT, Korea, under the Information Technology Research Center support program (IITP-2020-2016-0-00313) supervised by the Institute for Information & Communications Technology Planning & Evaluation, and by Sejong University through its faculty research program (20192021).

Acknowledgments

This work was technically supported by the University of Chittagong.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Analytical Symbol-Error-Rate Formulation

Appendix A.1. Analytical Symbol-Error-Rate of FU in S1

In accordance with the concept of SM, both BS and D 1 transmit FU data bits through the activation of a single antenna at a particular time instant. Therefore, we can consider the estimation of any transmitted M-PSK/M-QAM symbol at D 1 and FU as a special case of 1 × A D 1 and 1 × A F U MRC detection [12], respectively. Now by using [57] (Equation (41)), the error estimation of any transmitted M-PSK data symbol (SER) at D 1 and FU in S 1 can be obtained respectively as
P S E R , F U S 1 , P 1 = 1 π 0 ( M 1 1 ) π M 1 i = 1 A D 1 1 + ρ g F U , 1 sin 2 ϕ 1 d ϕ
P S E R , F U S 1 , P 2 = 1 π 0 ( M 2 1 ) π M 2 i = 1 A F U 1 + ρ g F U , 2 sin 2 ϕ 1 d ϕ
where P S E R , F U S 1 , P 1 and P S E R , F U S 1 , P 2 denote SER at D 1 and FU during P 1 and P 2 , respectively. Here, g F U , 1 = sin 2 ( ϕ M 1 ) , g F U , 2 = sin 2 ( ϕ M 2 ) , and M 2 = 2 N 1 . The average SNR, ρ at the receiving side is denoted by ρ P B S σ 2 P D 1 σ 2 , where σ 2 is the noise variance.
Again by using [57] (Equation (41)), the error estimation of any transmitted M-QAM data symbol at D 1 and FU in S 1 can be obtained respectively as
P S E R , F U S 1 , P 1 = 4 π 1 1 M 1 0 π 2 i = 1 A D 1 1 + ρ g Q A M , 1 sin 2 ϕ 1 d ϕ 4 π 1 1 M 1 2 0 π 4 i = 1 A D 1 1 + ρ g Q A M , 1 sin 2 ϕ 1 d ϕ
P S E R , F U S 1 , P 2 = 4 π 1 1 M 2 0 π 2 i = 1 A F U 1 + ρ g Q A M , 2 sin 2 ϕ 1 d ϕ 4 π 1 1 M 2 2 0 π 4 i = 1 A F U 1 + ρ g Q A M , 1 sin 2 ϕ 1 d ϕ
where g Q A M , 1 = 3 2 ( M 1 1 ) and g Q A M , 2 = 3 2 ( M 2 1 ) . Here, P S E R , F U S 1 , P 1 and P S E R , F U S 1 , P 2 denote SER at D 1 and FU during P 1 and P 2 , respectively.

Appendix A.2. Analytical Symbol-Error-Rate of NU in S2

In a similar manner, we can also consider the estimation of any transmitted M-PSK/M-QAM symbol at NU in S 2 as a special case of 1 × A N U MRC detection [12] due to the exploitation of SM. Now the error estimation of any transmitted M-PSK data symbol at NU during P 1 in S 2 can be obtained by using [57] (Equation (41)).
P S E R , N U S 2 , P 1 = 1 π 0 ( M 1 1 ) π M 1 i = 1 A N U 1 + ρ g N U , 1 sin 2 ϕ 1 d ϕ
where P S E R , N U S 2 , P 1 denotes SER at NU during P 1 and g N U , 1 = sin 2 ( ϕ M 1 ) . The average SNR, ρ at the receiving side is denoted by ρ P B S σ 2 , where σ 2 is the noise variance.
Again by using [57] (Equation (41)), the error estimation of any transmitted M-QAM data symbol at NU during P 1 in S 2 can be obtained as
P S E R , N U S 2 , P 1 = 4 π 1 1 M 1 0 π 2 i = 1 A N U 1 + ρ g Q A M , 1 sin 2 ϕ 1 d ϕ 4 π 1 1 M 1 2 0 π 4 i = 1 A N U 1 + ρ g Q A M , 1 sin 2 ϕ 1 d ϕ
where g Q A M , 1 = 3 2 ( M 1 1 ) and P S E R , N U S 2 , P 1 denotes SER at NU during P 1 .

References

  1. D’Andreagiovanni, F.; Mannino, C.; Sassano, A. GUB covers and power-indexed formulations for wireless network design. Manag. Sci. 2013, 59, 142–156. [Google Scholar] [CrossRef] [Green Version]
  2. Capone, A.; Chen, L.; Gualandi, S.; Yuan, D. A new computational approach for maximum link activation in wireless networks under the SINR model. IEEE Trans. Wirel. Commun. 2011, 10, 1368–1372. [Google Scholar] [CrossRef] [Green Version]
  3. Wong, V.W.S.; Schober, R.; Ng, D.W.K.; Wang, L.C. Key Technologies for 5G Wireless Systems; Cambridge University Press: Cambridge, UK, 2017. [Google Scholar] [CrossRef]
  4. Kim, H. Design and Optimization for 5G Wireless Communications; John Wiley & Sons: West Sussex, UK, 2020. [Google Scholar] [CrossRef]
  5. Chin, W.H.; Fan, Z.; Haines, R. Emerging technologies and research challenges for 5G wireless networks. IEEE Wirel. Commun. 2014, 21, 106–112. [Google Scholar] [CrossRef] [Green Version]
  6. Al-Falahy, N.; Alani, O.Y. Technologies for 5G networks: Challenges and opportunities. IT Prof. 2017, 19, 12–20. [Google Scholar] [CrossRef] [Green Version]
  7. Liu, K.J.R.; Sadek, A.K.; Su, W.; Kwasinski, A. Relay channels and protocols. In Cooperative Communications and Networking; Cambridge University Press: Cambridge, UK, 2008; pp. 119–151. [Google Scholar] [CrossRef]
  8. Jameel, F.; Wyne, S.; Kaddoum, G.; Duong, T.Q. A comprehensive survey on cooperative relaying and jamming strategies for physical layer security. IEEE Commun. Surv. Tutor. 2019, 21, 2734–2771. [Google Scholar] [CrossRef] [Green Version]
  9. Kader, M.F.; Shin, S.Y. Cooperative relaying using space-time block coded non-orthogonal multiple access. IEEE Trans. Veh. Technol. 2017, 66, 5894–5903. [Google Scholar] [CrossRef]
  10. Bletsas, A.; Khisti, A.; Reed, D.P.; Lippman, A. A simple cooperative diversity method based on network path selection. IEEE J. Sel. Areas Commun. 2006, 24, 659–672. [Google Scholar] [CrossRef] [Green Version]
  11. Li, Q.; Hu, R.Q.; Qian, Y.; Wu, G. Cooperative communications for wireless networks: Techniques and applications in LTE-advanced systems. IEEE Wirel. Commun. 2012, 19, 22–29. [Google Scholar] [CrossRef]
  12. Mesleh, R.Y.; Haas, H.; Sinanovic, S.; Ahn, C.W.; Yun, S. Spatial modulation. IEEE Trans. Veh. Technol. 2008, 57, 2228–2241. [Google Scholar] [CrossRef]
  13. Basar, E.; Wen, M.; Mesleh, R.; Di Renzo, M.; Xiao, Y.; Haas, H. Index modulation techniques for next-generation wireless networks. IEEE Access 2017, 5, 16693–16746. [Google Scholar] [CrossRef]
  14. Hussein, H.S.; Elsayed, M.; Mohamed, U.S.; Esmaiel, H.; Mohamed, E.M. Spectral efficient spatial modulation techniques. IEEE Access 2019, 7, 1454–1469. [Google Scholar] [CrossRef]
  15. Yang, P.; Xiao, Y.; Xiao, M.; Guan, Y.L.; Li, S.; Xiang, W. Adaptive spatial modulation MIMO based on machine learning. IEEE J. Sel. Areas Commun. 2019, 37, 2117–2131. [Google Scholar] [CrossRef]
  16. Wen, M.; Zheng, B.; Kim, K.J.; Di Renzo, M.; Tsiftsis, T.A.; Chen, K.; Al-Dhahir, N. A Survey on spatial modulation in emerging wireless systems: Research progresses and applications. IEEE J. Sel. Areas Commun. 2019, 37, 1949–1972. [Google Scholar] [CrossRef] [Green Version]
  17. Phan-Huy, D.; Kokar, Y.; Rachedi, K.; Pajusco, P.; Mokh, A.; Magounaki, T.; Masood, R.; Buey, C.; Ratajczak, P.; Malhouroux-Gaffet, N.; et al. Single-carrier spatial modulation for the internet of things: Design and performance evaluation by using real compact and reconfigurable antennas. IEEE Access 2019, 7, 18978–18993. [Google Scholar] [CrossRef]
  18. Gao, J.; Qiu, B.; Zhou, J. Spatial modulation and MP-WFRFT-aided multi-beam wireless communication scheme based on random frequency diverse array. Sensors 2020, 20, 5289. [Google Scholar] [CrossRef] [PubMed]
  19. Telatar, E. Capacity of multi-antenna Gaussian channels. Eur. Technol. Telecommun. 1999, 10, 585–595. [Google Scholar] [CrossRef]
  20. Da-Shan, S.; Foschini, G.J.; Gans, M.J.; Kahn, J.M. Fading correlation and its effect on the capacity of multielement antenna systems. IEEE Trans. Commun. 2000, 48, 502–513. [Google Scholar] [CrossRef] [Green Version]
  21. Loyka, S.; Tsoulos, G. Estimating MIMO system performance using the correlation matrix approach. IEEE Commun. Lett. 2002, 6, 19–21. [Google Scholar] [CrossRef] [Green Version]
  22. Chiani, M.; Win, M.Z.; Zanella, A. On the capacity of spatially correlated MIMO Rayleigh-fading channels. IEEE Trans. Inf. Theory 2003, 49, 2363–2371. [Google Scholar] [CrossRef] [Green Version]
  23. Nguyen, T.K.; Nguyen, H.H.; Nguyen, T.H. Multiuser massive MIMO systems with time-offset pilots and successive interference cancellation. IEEE Access 2019, 7, 132748–132762. [Google Scholar] [CrossRef]
  24. Tehrani, M.N.; Uysal, M.; Yanikomeroglu, H. Device-to-device communication in 5G cellular networks: Challenges, solutions, and future directions. IEEE Commun. Mag. 2014, 52, 86–92. [Google Scholar] [CrossRef]
  25. Uddin, M.B.; Kader, M.F.; Shin, S.Y. Exploiting NOMA in D2D assisted full-duplex cooperative relaying. Phys. Commun. 2020, 38, 1–10. [Google Scholar] [CrossRef]
  26. Fodor, G.; Dahlman, E.; Mildh, G.; Parkvall, S.; Reider, N.; Miklós, G.; Turányi, Z. Design aspects of network assisted device-to-device communications. IEEE Commun. Mag. 2012, 50, 170–177. [Google Scholar] [CrossRef]
  27. Iqbal, J.; Iqbal, M.A.; Ahmad, A.; Khan, M.; Qamar, A.; Han, K. Comparison of spectral efficiency techniques in device-to-device communication for 5G. IEEE Access 2019, 7, 57440–57449. [Google Scholar] [CrossRef]
  28. Zhou, L.; Wu, Y.; Yu, H. A two-layer, energy-efficient approach for joint power control and uplink–downlink channel allocation in D2D Communication. Sensors 2020, 20, 3285. [Google Scholar] [CrossRef] [PubMed]
  29. Chan, Y.W.; Chien, F.T.; Yang, C.T. Mode selection and spectrum allocation in coexisting D2D and cellular networks with cooperative precoding. Sensors 2019, 19, 5417. [Google Scholar] [CrossRef] [Green Version]
  30. Noura, M.; Nordin, R. A survey on interference management for device-to-device (D2D) communication and its challenges in 5G networks. J. Netw. Comput. Appl. 2016, 71, 130–150. [Google Scholar] [CrossRef]
  31. Adnan, M.H.; Ahmad Zukarnain, Z. Device-to-device communication in 5G environment: Issues, solutions, and challenges. Symmetry 2020, 12, 1762. [Google Scholar] [CrossRef]
  32. Wu, X.; Haas, H.; Grant, P.M. Cooperative spatial modulation for cellular networks. IEEE Trans. Commun. 2018, 66, 3683–3693. [Google Scholar] [CrossRef]
  33. Yu, X.; Pan, Q.; Leung, S.; Wang, C. Power allocation and performance analysis of cooperative spatial modulation in wireless relay networks. IEEE Access 2018, 6, 12145–12155. [Google Scholar] [CrossRef]
  34. Yu, X.; Li, Q.; Pan, Q.; Hu, Y.; Du, Y. Performance analysis for spatial modulation with AF relaying over spatially correlated Rayleigh channels. IEEE Access 2019, 7, 115926–115935. [Google Scholar] [CrossRef]
  35. Bai, Z.; Zhang, N.; Yang, Y.; Pang, K.; Zhang, H.; Han, T. A joint bit-to-symbol mapping scheme in cooperative spatial modulation system. IEEE Access 2019, 7, 38245–38254. [Google Scholar] [CrossRef]
  36. Altın, G.; Aygolu, U.; Basar, E.; Celebi, M.E. Multiple-input–multiple-output cooperative spatial modulation systems. IET Commun. 2017, 11, 2289–2296. [Google Scholar] [CrossRef]
  37. Ustunbas, S.; Basar, E.; Aygolu, U. Cooperative spectrum sharing protocol using spatial modulation. IET Commun. 2017, 11, 1759–1767. [Google Scholar] [CrossRef] [Green Version]
  38. Kader, M.F.; Irfan, M.; Shin, S.Y.; Chae, S. Cooperative spectrum sharing in cognitive radio networks: An interference free approach. Phys. Commun. 2017, 25, 66–74. [Google Scholar] [CrossRef]
  39. Chavan, A.; Dhanasekaran, S. Performance analysis of cell-center users in SM-based cooperative spectrum sharing systems. IEEE Wirel. Commun. Lett. 2020, 9, 198–201. [Google Scholar] [CrossRef]
  40. Hu, Y.; Yu, X.; Li, Q.; Liu, T. Secrecy performance of AF assisted cooperative spatial modulation system with destination-based-jamming. In Proceedings of the 2019 IEEE International Conference on Communications Workshops (ICC Workshops), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar] [CrossRef]
  41. Wang, X.; Li, N.; Li, M.; Tao, X. A physical layer spoofing attack in spatial modulation. In Proceedings of the 2019 IEEE Globecom Workshops (GC Wkshps), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–5. [Google Scholar] [CrossRef]
  42. Qu, W.; Cheng, X.; Zhang, M.; Chen, C. Spatial-modulation based wireless information and power transfer with full duplex relaying. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar] [CrossRef]
  43. Zhang, M.; Cheng, X. Spatial-modulation-based wireless-powered communication for achievable rate enhancement. IEEE Commun. Lett. 2017, 21, 1365–1368. [Google Scholar] [CrossRef]
  44. Malik, P.K.; Wadhwa, D.S.; Khinda, J.S. A survey of device to device and cooperative communication for the future cellular networks. Int. J. Wirel. Inf. Netw. 2020, 27, 411–432. [Google Scholar] [CrossRef]
  45. Kim, J.; Lee, I.; Lee, J. Capacity scaling for D2D aided cooperative relaying systems using NOMA. IEEE Wirel. Commun. Lett. 2018, 7, 42–45. [Google Scholar] [CrossRef]
  46. Li, Y.; Cai, L. Cooperative device-to-device communication for uplink transmission in cellular system. IEEE Trans. Wirel. Commun. 2018, 17, 3903–3917. [Google Scholar] [CrossRef]
  47. Lee, J.; Lee, J.H. Performance analysis and resource allocation for cooperative D2D communication in cellular networks with multiple D2D pairs. IEEE Commun. Lett. 2019, 23, 909–912. [Google Scholar] [CrossRef]
  48. Meng, Y.; Jiang, C.; Chen, H.; Ren, Y. Cooperative device-to-device communications: Social networking perspectives. IEEE Netw. 2017, 31, 38–44. [Google Scholar] [CrossRef]
  49. Wolniansky, P.W.; Foschini, G.J.; Golden, G.D.; Valenzuela, R.A. V-BLAST: An architecture for realizing very high data rates over the rich-scattering wireless channel. In Proceedings of the 1998 URSI International Symposium on Signals, Systems, and Electronics, Conference Proceedings (Cat. No.98EX167), Pisa, Italy, 2 October 1998; pp. 295–300. [Google Scholar] [CrossRef]
  50. Trotobas, B.; Nafkha, A.; Louët, Y. A.; Louët, Y. A review to massive MIMO detection algorithms: Theory and implementation. In Advanced Radio Frequency Antennas for Modern Communication and Medical Systems; IntechOpen: London, UK, 2020. [Google Scholar] [CrossRef]
  51. Kamal, M.S.; Kader, M.F. Interference free device-to-device aided cooperative relaying scheme. In Proceedings of the 2020 IEEE Region 10 Symposium (TENSYMP), Dhaka, Bangladesh, 5–7 June 2020; pp. 158–161. [Google Scholar] [CrossRef]
  52. Kader, M.F.; Shin, S.Y.; Leung, V.C.M. Full-duplex non-orthogonal multiple access in cooperative relay sharing for 5G systems. IEEE Trans. Veh. Technol. 2018, 67, 5831–5840. [Google Scholar] [CrossRef]
  53. Kader, M.F.; Uddin, M.B.; Islam, S.M.R.; Shin, S.Y. Capacity and outage analysis of a dual-hop decode-and-forward relay-aided NOMA scheme. Digit. Signal Process. 2019, 88, 138–148. [Google Scholar] [CrossRef] [Green Version]
  54. Prisecaru, F.A.; Hass, H. Mutual Information and Capacity of Spatial Modulation Systems; Jacobs University: Bremen, Germany, 2007. [Google Scholar]
  55. Di Renzo, M.; Haas, H.; Ghrayeb, A.; Sugiura, S.; Hanzo, L. Spatial modulation for generalized MIMO: Challenges, opportunities, and implementation. Proc. IEEE 2014, 102, 56–103. [Google Scholar] [CrossRef]
  56. Yang, Y.; Xu, J.; Shi, G.; Wang, C.X. Candidate technologies and evaluation challenges for 5G. In 5G Wireless Systems; Springer: New York, NY, USA, 2018; pp. 1–19. [Google Scholar] [CrossRef]
  57. Alouini, M.S.; Goldsmith, A.J. A unified approach for calculating error rates of linearly modulated signals over generalized fading channels. IEEE Trans. Commun. 1999, 47, 1324–1334. [Google Scholar] [CrossRef]
Figure 1. The organization of the article.
Figure 1. The organization of the article.
Sensors 20 07048 g001
Figure 2. Proposed system model: S 1 .
Figure 2. Proposed system model: S 1 .
Sensors 20 07048 g002
Figure 3. Proposed system model: S 2 .
Figure 3. Proposed system model: S 2 .
Sensors 20 07048 g003
Figure 4. BER of NU in S 1 or BER of D 1 –D 2 pair in both S 1 and S 2 . For D 1 –D 2 pair, we set A D 1 = A B S and A D 2 = A N U .
Figure 4. BER of NU in S 1 or BER of D 1 –D 2 pair in both S 1 and S 2 . For D 1 –D 2 pair, we set A D 1 = A B S and A D 2 = A N U .
Sensors 20 07048 g004
Figure 5. BER of FU in S 1 for M-PSK.
Figure 5. BER of FU in S 1 for M-PSK.
Sensors 20 07048 g005
Figure 6. BER of FU in S 1 for M-QAM.
Figure 6. BER of FU in S 1 for M-QAM.
Sensors 20 07048 g006
Figure 7. BER comparison among the users in S 1 .
Figure 7. BER comparison among the users in S 1 .
Sensors 20 07048 g007
Figure 8. BER of NU in S 2 .
Figure 8. BER of NU in S 2 .
Sensors 20 07048 g008
Figure 9. BER of FU in S 2 .
Figure 9. BER of FU in S 2 .
Sensors 20 07048 g009
Figure 10. BER comparison among the users in S 2 .
Figure 10. BER comparison among the users in S 2 .
Sensors 20 07048 g010
Figure 11. SE of NU in S 1 or SE of D 1 –D 2 pair in both S 1 and S 2 . For D 1 –D 2 pair, we set A D 1 = A B S and A D 2 = A N U .
Figure 11. SE of NU in S 1 or SE of D 1 –D 2 pair in both S 1 and S 2 . For D 1 –D 2 pair, we set A D 1 = A B S and A D 2 = A N U .
Sensors 20 07048 g011
Figure 12. SE of FU in S 1 for M-PSK.
Figure 12. SE of FU in S 1 for M-PSK.
Sensors 20 07048 g012
Figure 13. SE of FU in S 1 for M-QAM.
Figure 13. SE of FU in S 1 for M-QAM.
Sensors 20 07048 g013
Figure 14. SE comparison among the users in S 1 .
Figure 14. SE comparison among the users in S 1 .
Sensors 20 07048 g014
Figure 15. SE of NU in S 2 .
Figure 15. SE of NU in S 2 .
Sensors 20 07048 g015
Figure 16. SE of FU in S 2 .
Figure 16. SE of FU in S 2 .
Sensors 20 07048 g016
Figure 17. SE comparison among the users in S 2 .
Figure 17. SE comparison among the users in S 2 .
Sensors 20 07048 g017
Figure 18. Sum SE in S 1 for different combinations of antenna number and modulation order.
Figure 18. Sum SE in S 1 for different combinations of antenna number and modulation order.
Sensors 20 07048 g018
Figure 19. Sum SE in S 2 for different combinations of antenna number and modulation order.
Figure 19. Sum SE in S 2 for different combinations of antenna number and modulation order.
Sensors 20 07048 g019
Figure 20. Sum SE comparison between S 1 and S 2 .
Figure 20. Sum SE comparison between S 1 and S 2 .
Sensors 20 07048 g020
Figure 21. A comparative study between the proposed D2D-CRS-SM and VBLAST-ZF in terms of BER of FU in S 1 .
Figure 21. A comparative study between the proposed D2D-CRS-SM and VBLAST-ZF in terms of BER of FU in S 1 .
Sensors 20 07048 g021
Figure 22. A comparative study between the proposed D2D-CRS-SM and VBLAST-ZF in terms of BER of NU in S 2 .
Figure 22. A comparative study between the proposed D2D-CRS-SM and VBLAST-ZF in terms of BER of NU in S 2 .
Sensors 20 07048 g022
Table 1. An example of mapping table at BS for data transmission during P 1 . Transmission of 5-bits employing 2 antennas (A B S = 2) and 16-QAM/16-PSK ( M 1 = 16) or, 4 antennas (A B S = 4) and 8-QAM/8-QPSK ( M 1 = 8).
Table 1. An example of mapping table at BS for data transmission during P 1 . Transmission of 5-bits employing 2 antennas (A B S = 2) and 16-QAM/16-PSK ( M 1 = 16) or, 4 antennas (A B S = 4) and 8-QAM/8-QPSK ( M 1 = 8).
A B S = 2 and M 1 = 16A B S = 4 and M 1 = 8
Input Bits,AntennaTransmitAntennaTransmit
X 1 Index/NumberSymbolIndex/NumberSymbol
000000000000 (0)000
000010000100 (0)001
000100001000 (0)010
000110001100 (0)011
001000010000 (0)100
001010010100 (0)101
001100011000 (0)110
001110011100 (0)111
010000100001 (1)000
010010100101 (1)001
010100101001 (1)010
010110101101 (1)011
011000110001 (1)100
011010110101 (1)101
011100111001 (1)110
011110111101 (1)111
100001000010 (2)000
100011000110 (2)001
100101001010 (2)010
100111001110 (2)011
101001010010 (2)100
101011010110 (2)101
101101011010 (2)110
101111011110 (2)111
110001100011 (3)000
110011100111 (3)001
110101101011 (3)010
110111101111 (3)011
111001110011 (3)100
111011110111 (3)101
111101111011 (3)110
111111111111 (3)111
Table 2. An example of mapping table at D 1 for data transmission during P 2 . For N 1 ( = 1 and 2 ) bits of modulation symbol/antenna index from BS, D 1 uses 2 N 1 -QAM/PSK.
Table 2. An example of mapping table at D 1 for data transmission during P 2 . For N 1 ( = 1 and 2 ) bits of modulation symbol/antenna index from BS, D 1 uses 2 N 1 -QAM/PSK.
A D 1 = 8 and N 1 = 1A D 1 = 4 and N 1 = 2
Input Bits,AntennaTransmitAntennaTransmit
X 2 Index/NumberSymbolIndex/NumberSymbol
0000000 (0)000 (0)00
0001000 (0)100 (0)01
0010001 (1)000 (0)10
0011001 (1)100 (0)11
0100010 (2)001 (1)00
0101010 (2)101 (1)01
0110011 (3)001 (1)10
0111011 (3)101 (1)11
1000100 (4)010 (2)00
1001100 (4)110 (2)01
1010101 (5)010 (2)10
1011101 (5)110 (2)11
1100110 (6)011 (3)00
1101110 (6)111 (3)01
1110111 (7)011 (3)10
1111111 (7)111 (3)11
Table 3. Simulation Parameters.
Table 3. Simulation Parameters.
SL#NU [S 1 ]FU [S 1 ]D 1 →D 2 [S 1 & S 2 ]NU [S 2 ]FU [S 2 ]
1A B S = 2, A N U = 2 M 1 = M 2 = 4, A B S = 2, A D 1 = 2, A F U = 2A D 1 = 2, A D 2 = 2 M 1 = 4, A B S = 2, A N U = 2 M 2 = 2, A B S = 2, A D 1 = 2, A F U = 2
2A B S = 2, A N U = 3 M 1 = M 2 = 16, A B S = 2, A D 1 = 2, A F U = 2A D 1 = 2, A D 2 = 3 M 1 = 16, A B S = 2, A N U = 2 M 2 = 2, A B S = 2, A D 1 = 2, A F U = 3
3A B S = 2, A N U = 4 M 1 = M 2 = 32, A B S = 2, A D 1 = 2, A F U = 2A D 1 = 2, A D 2 = 4 M 1 = 32, A B S = 2, A N U = 2 M 2 = 2, A B S = 2, A D 1 = 2, A F U = 4
4A B S = 4, A N U = 2 M 1 = M 2 = 4, A B S = 4, A D 1 = 4, A F U = 4A D 1 = 4, A D 2 = 2 M 1 = 4, A B S = 4, A N U = 4 M 2 = 4, A B S = 4, A D 1 = 4, A F U = 2
5A B S = 4, A N U = 3 M 1 = M 2 = 16, A B S = 4, A D 1 = 4, A F U = 4A D 1 = 4, A D 2 = 3 M 1 = 16, A B S = 4, A N U = 4 M 2 = 4, A B S = 4, A D 1 = 4, A F U = 3
6A B S = 4, A N U = 4 M 1 = M 2 = 32, A B S = 4, A D 1 = 4, A F U = 4A D 1 = 4, A D 2 = 4 M 1 = 32, A B S = 4, A N U = 4 M 2 = 4, A B S = 4, A D 1 = 4, A F U = 4
Table 4. Maximum achievable theoretical sum SE comparison between D2D-CRS-SM and VBLAST-ZF.
Table 4. Maximum achievable theoretical sum SE comparison between D2D-CRS-SM and VBLAST-ZF.
ScenarioAntenna ConfigurationD2D-CRS-SMVBLAST-ZF
S 1 A B S = 4, A N U = 4, A D 1 = 4, A F U = 4, A D 2 = 4Modulation order 4/16/32/64 -QAM: 3/4/4.5/5 bits/s/HzModulation order 4-QAM: 6 bits/s/Hz
S 2 A B S = 4, A N U = 4, A D 1 = 4, A F U = 4, A D 2 = 4Modulation order 4/16/32/64 -QAM at BS: 3/4/4.5/5 bits/s/HzModulation order 4-QAM: 6 bits/s/Hz
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kamal, M.S.; Kader, M.F.; Islam, S.M.R.; Yu, H. Device-to-Device Aided Cooperative Relaying Scheme Exploiting Spatial Modulation: An Interference Free Strategy. Sensors 2020, 20, 7048. https://0-doi-org.brum.beds.ac.uk/10.3390/s20247048

AMA Style

Kamal MS, Kader MF, Islam SMR, Yu H. Device-to-Device Aided Cooperative Relaying Scheme Exploiting Spatial Modulation: An Interference Free Strategy. Sensors. 2020; 20(24):7048. https://0-doi-org.brum.beds.ac.uk/10.3390/s20247048

Chicago/Turabian Style

Kamal, Md. Shahriar, Md. Fazlul Kader, S. M. Riazul Islam, and Heejung Yu. 2020. "Device-to-Device Aided Cooperative Relaying Scheme Exploiting Spatial Modulation: An Interference Free Strategy" Sensors 20, no. 24: 7048. https://0-doi-org.brum.beds.ac.uk/10.3390/s20247048

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop