Efficient Resource Allocation for D2D-Enabled Social IoT Networks: A Tripartite and Time-Scale Optimization Approach | TUP Journals & Magazine | IEEE Xplore

Efficient Resource Allocation for D2D-Enabled Social IoT Networks: A Tripartite and Time-Scale Optimization Approach


Abstract:

In the densification of Device-to-Device (D2D)-enabled Social Internet of Things (SIoT) networks, improper allocation of resources can lead to high interference, increase...Show More

Abstract:

In the densification of Device-to-Device (D2D)-enabled Social Internet of Things (SIoT) networks, improper allocation of resources can lead to high interference, increased signaling overhead, latency, and disruption of Channel State Information (CSI). In this paper, we formulate the problem of sum throughput maximization as a Mixed Integer Non-Linear Programming (MINLP) problem. The problem is solved in two stages: a tripartite graph-based resource allocation stage and a time-scale optimization stage. The proposed approach prioritizes maintaining Quality of Service (QoS) and resource allocation to minimize power consumption while maximizing sum throughput. Simulated results demonstrate the superiority of the proposed algorithm over standard benchmark schemes. Validation of the proposed algorithm using performance parameters such as sum throughput shows improvements ranging from 17% to 93%. Additionally, the average time to deliver resources to CSI users is minimized by 60.83% through optimal power usage. This approach ensures QoS requirements are met, reduces system signaling overhead, and significantly increases D2D sum throughput compared to the state-of-the-art schemes. The proposed methodology may be well-suited to address the challenges SIoT applications, such as home automation and higher education systems.
Published in: Intelligent and Converged Networks ( Volume: 5, Issue: 4, December 2024)
Page(s): 380 - 401
Date of Publication: December 2024
Electronic ISSN: 2708-6240
Figures are not available for this document.

SECTION 1

Introduction

The rise in connectivity of intelligent devices such as smartphones and tablets has raised the challenge of managing the increasing number of on-demand service requests. It has created opportunities to implement the Internet of Things (IoT) to improve the efficiency of service delivery in areas such as home automation, smart city, and smart healthcare. Unlike the traditional mobile networks, the IoT has the potential to provide built-in intelligence system for our daily lives. The massive amount of data collected by cellular networks can lead to congestion due to limited spectrum resources. As the amount of data being collected by cellular networks increases, the need for efficient data caching becomes more critical. This technology can reduce the traffic load on the network by caching data on the device. The vast majority of the information collected through the IoT is cacheable, making it a type of reusable content. This content can be stored in smart objects with high storage capacity can reduce back-haul costs and improve download latency. The possibility of Device-to-Device (D2D) communication to improve the effectiveness and reliability of wireless communication networks has gained significant attention in recent years. Devices can connect directly over D2D networks without intervention of the base station[1], [2]. This technology has the potential to reduce latency, improve network capacity, and provide better quality of service for users. There have been significant advancements in D2D communication technology, including new protocols, algorithms, and hardware designs have made D2D communication more reliable, secure, and efficient. Moreover, the emergence of Beyond Fifth-Generation (B5G) networks [3] has created new opportunities for D2D communication[4], as these networks offer higher bandwidth, lower latency, and more advanced features for direct communication[5]. Through D2D communication, devices with close proximity can connect more efficiently, maximizing spectrum reuse and enhancing cellular coverage. D2D also offers advantages such as content privacy and robust anonymity, as shared information is not stored in a central repository. D2D communications can improve energy efficiency, throughput, spectral efficiency, resource allocation, and minimize the delay and interference[5]. Additionally, D2D can provide lower power consumption due to the shorter communication range[6]. However, in a cellular network with underlay D2D communication, mutual interference between D2D and cellular communication can be occurred, as D2D users are given access to share the spectrum that is reserved for cellular users. Efficient allocation of resources, in terms of spectrum bandwidth and power, is the most effective way to mitigate this interference. The convergence of mobile communication and IoT technologies has led to the concept of the Social Internet of Things (SIoT)[7], where smart devices, sensors, and objects are interconnected through wireless communication networks, enabling seamless data sharing and intelligent interactions. As the SIoT ecosystem continues to evolve, the proliferation of D2D communication has emerged as a promising paradigm to enhance communication efficiency, reduce latency, and improve overall network performance. One of the key challenges in D2D communication for SIoT applications is efficient resource allocation.

In D2D communication, perturbation refers to the introduction of disturbances or variations in the communication system that can affect its performance and characteristics. Perturbations can arise from various sources and can impact D2D communication in several ways. Perturbations during resource allocation in D2D communication can affect several parameters crucial for maximizing throughput, including signal strength, link stability, latency, and Quality of Service (QoS), respectively[8]. To mitigate the effects of perturbations in D2D communication, various techniques such as resource management, channel equalization, power control, interference management, and link adaptation algorithms can be employed [9]–​[13], These techniques aim to enhance the robustness, reliability, and performance of D2D communication in the presence of perturbations.

Resource allocation plays a critical role in optimizing the use of network resources, such as bandwidth, power, and spectrum, to meet the diverse and dynamic communication demands of IoT devices[14]. The tripartite graph is a powerful mathematical framework that represents complex relationships between three distinct sets of entities. In the context of D2D communication for SIoT applications, the tripartite graph can capture the intricate interactions between IoT devices, social relationships, and available resources. By integrating social context into resource allocation decisions, this approach enables more context-aware and personalized communication, contributing to the efficient deployment of D2D links. In this paper, we delve into the implementation of our proposed resource allocation strategy. We present a detailed exploration of the tripartite graph's theoretical foundation and its practical applicability in SIoT networks. Additionally, we outline the timescale D2D association and resource management mechanism[15], providing insights into how it enhances the adaptability and responsiveness of the networks. To evaluate the performance and effectiveness of our strategy, we conduct extensive simulations and performance analyses. The results demonstrate significant improvements in communication efficiency, resource utilization, and overall network performance compared to conventional resource allocation schemes. The main aim is to optimize the allocation of spectrum resources while considering social relationships among IoT devices. By leveraging this approach, we intend to improve communication performance in terms of throughput, enhance user experience, and alleviate network congestion.

In summary, this paper introduces a novel resource allocation strategy based on the tripartite graph and timescale D2D association and resource management for D2D communication in SIoT networks. By combining the tripartite graph for resource allocation with adaptive time scaling for power management with minimum delay. The proposed strategy contributes to enhancing communication throughput, optimizing resource utilization, and enabling context-aware interactions in SIoT networks by minimizing the impact of perturbation. Paving the way towards a more connected D2D-enabled SIoT devices and intelligent IoT ecosystem. Abbreviations and symbols used in this article are given in Table 1.

SECTION 2

Related Work and Motivation

2.1 Related Work

Table 1 List of abbreviations and notations.
Table 1- List of abbreviations and notations.

A resource distribution scheme can be used for resource allocation and Particle Swarm Optimization (PSO)-based power allocation method for D2D-supporting cellular networks with insufficient Channel State Information (CSI). Authors of Ref. [16] presented an innovative solution to address spatial and social mismatch issues. They utilized a 3-D-Social Identifier Structure (3-D-SIS) model to analyze the link between the various sensors and devices connected to the SIoT ecosystem. In Ref. [17], utilized a matching-method approach to analyze the users' attributes and determine the factors that affected their satisfaction. They then utilized the same approach to improve the efficiency of their platform. The algorithm makes an educated determination of the capabilities of the Cellular User Devices (CUD) and D2D pair sharing the same channel. They used the maximum weight matching algorithm, which was based on the results of the particle swarm optimization (PSO)-based power allocation strategy, to solve the channel assignment problem[18], [19]. Through the use of the Non-Orthogonal Multiple Access (NOMA) protocol, two D2D receivers can connect with a D2D transmitter. However, in cellular networks based on NOMA, the power distribution employed for D2D communication is not optimal. In Ref. [20], the authors introduced a solution that supports D2D communication that provide high-quality service to time-critical applications by integrating social ties into the communication process. They used heuristic algorithm to analyze the tasks and improve their efficiency. The authors of Ref. [21] focused on the issue of establishing an effective and stable connection between various social users based on their mobility across different networks. They developed an adaptive framework for D2D communication that can handle the complexity of this issue. The authors of Ref. [22] proposed an algorithm that can help identify and recommend users who can interact with smart objects on the IoT. In Ref. [23], a Lagrange pairwise method is used to solve the transformed problem after it is divided into two subproblems using an alternating optimization strategy. Successive Interference Cancellation (SIC) is suggested for real-world scenarios when the SIC decoding process may be inaccurate, taking into account both user equity and energy efficiency in great detail. The authors of Ref. [24] used a Partly Observable Markov Decision Process (POMDP) to concentrate largely on the battery life of cellular users, in addition to the deployment of transmitters and the mode selection[13]. There are many ways to approach it. To be more specific, creating sophisticated optimization issues can be difficult to achieve in a decentralized setting, entail a significant amount of overhead, and/or demand a significant amount of processing and resources. In particular, the work presented here focuses on different ways to use a power-efficient method adaptation to improve the standard of resource allocation for D2D networks[16], [25], [26].

Perturbation in the allocation of resources causes inaccuracies. An increase in interference may conflict on assigning resources. Perturbation may cause an imbalance in resource allocation[27]. Perturbation effect may longer the route or cause long delay in device discovery time. These concepts include perturbed and unperturbed D2D user channel links due to multipath propagation. Furthermore, Signal-to-Interference-plus-Noise Ratios (SINRs) also affect due to perturbation for both D2D and cellular users. Therefore, we have two types of SINR in our system model, that is perturbed SINR and unperturbed SINR. Due to perturbation, channel state information of the system also effects. CSI can be Multi-path Channel State Information (MCSI) and Unobstructed Path Channel State Information (UCSI) [28]–​[30]. Effect on CSI[12] due to perturbationincludes the impact of resource allocation, signal blockages caused by environmental dynamics, link failures due to instability, and challenges in satisfying QoS constraints. None of these studies consider the perturbation effect on CSI with low-latency devices that can be used to control the interference in the D2D network between the SIoT and the underlay pair. Researchers have been trying to optimize the utilization of the available spectrum to address the increasing interference between SIoT and D2D. Various strategies have been proposed to address this issue, such as resource pooling[31], bargaining games through bipartite graphs[32], cluster partitioning[33], [34], greedy optimization[35], [36], and Hungarian-based methods[5], [37]. These techniques require a high amount of time computation and may lead to an increase in the signal overhead. Some of the major research gaps are identified from the extensive literature works:

  1. Lack of consideration of the effect of perturbation on CSI: The SIoT relies on minimal delay and high throughput to perform at its best. This is due to how time-sensitive the system is. Due to the increasing number of complex SIoT components and the need for faster and more accurate computation, the creation of D2D software for the education sector is being considered.

  2. Analysis and impact of perturbation on resource allocation, signal blockages due to environment dynamics, and latency while deciding on resource allocation: Even if the transmission delay is longer, some devices prefer a higher computation rate in order to cope with the issue. On the other hand, devices with lower capacities may need to implement a resource management strategy to cope with the delays. Even though a device has a lower capacity, it can still cope with the delays provided they implement a resource management strategy.

  3. Lack of analysis of QoS assurance in dynamic environments: Dynamic environments pose a challenge when it comes to analyzing and monitoring the quality of service provided by D2D-enabled IoT networks. These environments are characterized by varying user demands and network conditions, which can make it difficult to maintain consistent service levels. It can be hard to develop effective mechanisms to cope with sudden changes in network traffic without thorough analysis. This can also affect the efficiency of the system. In addition to prioritizing data flows, managing resources properly and responding to network traffic can help guarantee QoS.

To overcome the identified gaps in the existing work, we propose a tripartite graph-based resource allocation algorithm that utilizes time scaling concept to optimize the power consumption and minimize the signaling overhead, thereby maximizing the throughput. Further research on QoS assurance in dynamic environments can improve the efficiency and resilience of IoT networks. The proposed work is utilized by developing a resource allocation model that is comparable to traditional resource allocation procedure, considering the perturbation effects. The proposed work takes into account the three key components of the tripartite matching process: resource sharing, throughput, and low power consumption. There has been a limited number of studies on the D2D-SIoT communication capabilities of various applications in the field of SIoT. These studies have primarily focused on the efficiency of the resource allocation process for the transmission of information between nodes with higher throughput.

2.2 Motivations

Due to the numerous advantages of distributed caching and SIoT, it is important to take advantage of the platform to improve the quality of service and download latency. Various D2D User Equipment's (DUEs) and Cellular User Devices (CUDs) in a distributed fashion can be linked using D2D connections. The spectrum of cellular users can be utilized to match the three graph attributes of the linked DUEs. When a CUD requests to pair with SIoT and D2D, the latter typically delivers the requested information to the nearby base station. However, if the link fails to deliver, the device will be able to access the requested data from the neighboring station, which leads to higher download latency[38], [39]. Since a CUD can provide a service to a single D2D user at the same time, the allocation of resources should be modeled as a tripartite problem. In addition, we consider the sharing of information between DUE and CUD in the context of the SIoT. For instance, if a cellular network has the same spectrum allocation for multiple D2D links, the utilization of that spectrum can be improved. The channel state information is affected by the perturbation[40], which can lead to co-channel interference[11], [12], [41] between D2D users when they reuse the same cellular spectrum. Perturbation effects are considered one of the most challenging issues when it comes to the design and implementation of social connections. The key contributions of this work as follows:

  1. An optimal throughput formulation under the constraints of QoS and transmit power has been derived. This optimization problem is a Mixed Integer Non-Linear Programming (MINLP) problem which makes it hard to solve directly. Hence, it can be handled by decomposes into subproblems and solved in a tractable manner.

  2. A tripartite graph-based resource allocation strategy is proposed in first stage. Then, time scaling optimization strategy is proposed in the next stage.

  3. The subproblems are formulated to achieve the sum throughput maximization by minimizing the impact of perturbation effect on CSI and enhance the allocation of resources, the device re-association, and reduction of power consumption within each time slot.

  4. Latency and power get optimized by using Lagrange dual method in a given period by identifying the power variable that meets the immediate QoS of the users.

The remaining part of this article is organized as follows: Section 3 presents the D2D based SIoT framework and problem formulation to achieve the objective. In Section 4, we detail the mathematical analysis and implementation of the proposed resource allocation algorithm covering the tripartite graph representation and the timescale D2D association and resource management approach. Section 5 presents extensive simulation results and performance evaluations. Finally, Section 6 concludes the paper, highlighting the improvements from the proposed approach and discussing the potential future research directions.

SECTION 3

System Model and Problem Formulation

A framework for conceptualizing D2D-SIoT networks is presented in Fig. 1. It comprises the applications under social and physical domains. The physical domain includes various wireless devices and SIoT devices that are involved in establishing direct links and sharing spectrum to communicate with each other. The paper proposes a method for allocating resources through a tripartite graph in interconnected cellular networks. The application domain is composed of the physical domain that's responsible for determining if the requesting devices will allow data transmission using the Resource Block (RB) and caching device. It takes into account various factors such as the relevance of the social relationships of the users and the mobile relevance of the devices.

Fig. 1 - Scenario illustration of D2D-enabled SIoT network.
Fig. 1

Scenario illustration of D2D-enabled SIoT network.

3.1 Social Network Model

A social network model consists of various users and devices that are connected through a communication network. D2D users can help social users to communicate and monitor objects within the network. Users can easily connect with various smart devices, such as smart cameras, and operate these objects directly from their own devices if a direct link is available. This establishes a social relationship between people and objects. In this section, we will discuss various models of communication and social networks, including interference and communication models. This paper explores the use of D2D technology in an urban environment for the development of SIoT. Most communication within the network is carried out through the use of D2D and cellular connections. Each device autonomously chooses the appropriate link for the communication task at hand. We assume that there are $N$ D2D pairs and $M$ CUD pairs in the D2D-based network, where $N=1,2, \ldots,n$ is given as the D2D set, and $M=1,2, \ldots,m$ is the CUD set. Delay-sensitive service of DUE $u$ is represented by $U=\{1,2, \ldots,u\}$. To uplink the service, network uses orthogonal frequency division multiple access. There are $K$ orthogonal RBs, where $K=1,2, \ldots,k$ denotes reused RBs between CUDs and DUEs and set $L=1,2, \ldots, l$ denotes unused exclusive RBs that available in dedicated or cellular mode. We continue to hold that a single RB can only be assigned to a single CUD and that a single D2D pair can only be supported by a single RB. Each D2D pair is only permitted to reuse one RB from the CUD.

3.2 Physical Network Model

The communication domain of SIoT networks is responsible for the allocation of spectrum and the establishment of D2D-SIoT and D2D connections. The RB's collection mark is responsible for establishing and maintaining the communication link between the data request and the RB. It also allocates the spectrum resources for the transmissions of both D2D-SIoT and D2Ds within the range of the communication device. On the other hand, as the cacher for establishing and maintaining the link between the RB and the collection number is responsible for the reuse of the resources for both D2D-SIoT and D2Ds.

The physical network model is utilized to model the various elements of a D2D-SIoT network. For example, the channel gain in a social network can be affected by both slow and fast fading. The channel gain between the D2D-SIoT source and destination is determined by the social network's boundary. Calculation of channel gain is expressed as \begin{equation*}h_{i,j}=vu_{i,j}D_{i,j}d_{i,j}^{-z}\tag{1}\end{equation*}View SourceRight-click on figure for MathML and additional features. where $v$ is the constant pathloss factor, $u$ represents the fast-fading gain follows exponential distribution function, and $D$ denotes the slow fading gain under consideration of log-normal distribution with mean one and 8 dB of standard deviation. $d$ refers D2D-SIoT link distance, and path loss exponent is represented by $z$. This model takes a look at the channel gain between a cellular base station and a D2D-SIoT device. Figure 1 also encapsulates the different aspects of the interference link of the network. $h_{D_{i,n}}^{S}, h_{D_{i}}^{C},h_{i,B}^{C}$, and $h_{D_{i,n}}^{B}$ are the interferences considered in the network model. Assume $P_{\max}$ is the maximum power that a device can use while transmitting information. This can be used to determine the ideal ratio of signal power to the noise generated by nearby devices. It is expressed as \begin{gather*}\text{SINR}_{i,m}^{C}=\frac{P_{i,m}^{C} h_{i,B}^{C}}{I_{CD_{i}}+ \sigma_{o}^{2}}\tag{2}\\ I_{CD_{i}}= \sum\limits_{i=1}^{M} P_{i,n}^{D} h_{D_{i}}^{C}\tag{3}\end{gather*}View SourceRight-click on figure for MathML and additional features. where $P_{i,m}^{C}$ is the amount of power that a cellular device transmits. $h_{i,B}^{C}$ is the channel gain that a cellular link allows information to be transmitted. $I_{CD_{i}}$ represents the interference link between a receiver of device pair and a cellular device, and additive white gaussian noise can be denoted as $\sigma_{o}^{2}$.

Similarly, the SINR of the D2D user is given as \begin{equation*}\text{SINR}_{i,j,n}^{D}=\frac{P_{i,n}^{D}h_{i,n}^{D}}{I_{D_{i}B}+I_{CD_{i}}+\sigma_{o}^{2}}\tag{4}\end{equation*}View SourceRight-click on figure for MathML and additional features. where $P_{i,n}^{D}$ is the power that a D2D user transmits to communicate with cellular devices directly. $h_{i,n}^{D}$ is the D2D user's channel link between the transmit and receiver device pair. $I_{D_{i}B}$ and $I_{CD_{i}}$ represent the interference of transmitter side of device pair with a centralized base station, and a cellular device, respectively.

3.3 Perturbation-Based Interference Model

The allocation of the D2D mode is also important to mitigate the intruder caused by the large number of users connectivity in the network. When a link pair is activated, devices can start distribution of information to the other D2D user pair. The D2D mode is primarily used to reduce the network's interference. Whenever a link pair is activated to transmit information, inference is performed. It is calculated as \begin{align*}I_{D_{i}B}+ I_{D_{i} S_{j}}+ I_{CD_{i}}= \sum\limits_{i,j=1,i\neq j}^{M,N}A_{i,j} P_{i,n}^{D} h_{D_{i,n}}^{B}+ & \\ \sum\limits_{i,j=1,i\neq j}^{M,N} A_{i,j} P_{i,n}^{D} h_{D_{i,j}}^{S}+ \sum\limits_{i,j=1,i\neq j}^{M} A_{i,j} P_{i,n}^{D} h_{D_{i}}^{C} &\tag{5}\end{align*}View SourceRight-click on figure for MathML and additional features. where $A_{i,j}$ represents the resource indicator that indicates the resource under which mode. If $A_{i,j}$ is 1, it works on D2D mode and if $A_{i,j}$ is 0, it works on cellular mode. It is represented as \begin{equation*}A_{i,j}=\begin{cases} 1, & \mathrm{D}2\mathrm{D}\ \text{mode};\\ 0, & \text{otherwise}\end{cases}\tag{6}\end{equation*}View SourceRight-click on figure for MathML and additional features.

In a network that supports D2D, users can select any one of the following:

  • Reuse mode: Because the communication distance between the kth D2D pair's transmitter and receiver fully satisfies the fundamental requirements, in reuse mode, two DUEs transmitters and the receiver can have direct communication with one another. The $n-\text{th}$ D2D pair recycles the RB that the $m-\text{th}$ CUD has been utilizing so that they can get the most out of the spectrum that is available to them. In this specific circumstance, there is not the slightest shred of doubt that each other is causing the interference that is being experienced. As a result of this, the uplink SINR of the $m-\text{th}$ CUD and the $n-\text{th}$ DUE can be defined independently of one another.

  • Dedicated mode: The $n-\text{th}$ D2D pair's transmitter and receiver are capable of direct communication between two DUEs in dedicated mode. Instead of being shared by the CUD and other DUEs, the RB can only be provided by the $k-\text{th}$ D2D pair.

  • Cellular mode: Two DUEs that would normally communicate over the Base Station (BS) do so because they are too far apart and do not match the requirements for D2D communication distance. In this scenario, we give the D2D pair two uplink RBs and consider it safe to assume that no additional CUDs or DUEs will be able to use the RBs.

The signal strength for the D2D-SIoT pairs can be expressed as \begin{equation*}\text{SINR}_{i,j,n,S}^{D}=\frac{P_{i,n}^{D}h_{D_{i,n}}^{S}}{I_{D_{i}B}+I_{D_{i}S_{j}}+I_{CD_{i}}+\sigma_{o}^{2}}\tag{7}\end{equation*}View SourceRight-click on figure for MathML and additional features.

The achievable throughput gained by the underlay D2D communication in the network is given as \begin{equation*}T_{i,j}=W\log_{2}\left(1+\text{SINR}_{i,j}^{D}\right)\tag{8}\end{equation*}View SourceRight-click on figure for MathML and additional features.

We assume that the total bandwidth of a D2D-SIoT network is $W$, with each subchannel having a bandwidth $\beta_{o}$. There are $k$ RBs that can distribute the resources equally. Each RB can also allocate up to $W/n\cdot\beta_{o}$, with mutually independent sub-channels. Each D2D-SIoT link may be multiplexed at a single D2D link. The D2D-SIoT and D2D links may be connected at the same and D2D and D2D-SIoT connection. If the number of resource collection and RBs provide caching services, then the collection where these two entities are located is then combined into a single data-sharing set. Since both the resource collection and the RBs offer caching services, this collection may be further consolidated into a single data-sharing set. The low height of the D2D transceiver antenna is due to its high-speed mobility. In addition, the fading signal from the surroundings and the influence of environmental factors can affect its performance. Various factors such as shadow fading, path loss and other effects must be considered when determining the channel between data-sharing set and $k-\text{th}$ RB.

3.4 Problem Formulation

This work aims to raise the sum throughput of the D2D system while maintaining the immediate QoS specifications for CUDs and DUEs. A joint D2D association, power control optimization, and spectrum assignment problem have been formulated as \begin{equation*}\max\limits_{\phi,X,P_{i,n}^{\max},P_{i,m}^{\max}}\sum\limits_{i\in I}\sum\limits_{\substack{n\in N,\\ m\in M}} \sum\limits_{k\in K}\sum\limits_{t\in T}\phi_{i,m}^{t}\cdot X_{i,m}^{t}\cdot W\log_{2}(1+\text{SINR}_{i,m,t,k}^{D})\tag{9}\end{equation*}View SourceRight-click on figure for MathML and additional features. s.t. \begin{align*}& \mathrm{C}1: \log_{2}(1+\text{SINR}_{m,t,k}^{C})\geqslant C_{th,i,k}^{t},\forall i,k,m,t;\\ & \mathrm{C}2: \sum\limits_{k\in K} \sum\limits_{m\in M}\phi_{i,m}^{t} \log_{2}(1+\text{SINR}_{m,t,k}^{D})\geqslant C_{th,i,k}^{t},\forall i,k,m,t;\\ & \mathrm{C}3: \sum\limits_{k\in K} \sum\limits_{m\in M}\phi_{i,k}^{t} X_{i,m}^{t}\in\{0,1\},\forall i,k,m,t;\\ & \mathrm{C}4: \sum\limits_{k\in K} \phi_{i,k}^{t}=1,\forall i,k,t;\\ & \mathrm{C}5: \sum\limits_{m\in M} X_{i,m}^{t}=1,\forall i,m,t;\\ & \mathrm{C}6: \sum\limits_{n\in N,k\in K} X_{i,k}^{t}\leqslant\frac{W}{n\cdot \beta_{o}},\forall i,k,t;\\ & \mathrm{C}7: 0\leqslant P_{i,m}^{t}\leqslant P_{i,m}^{\max},\forall m\in M;\\ & \mathrm{C}8: 0\leqslant P_{i,n}^{t}\leqslant P_{i,n}^{\max},\forall n\in N.\end{align*}View SourceRight-click on figure for MathML and additional features.

The binary variable $\phi_{i,k}^{t}\cdot X_{i,m}^{t}\in\{0,1\}$ is defined as the association factor at time slot $i$ and $t$. The $i-\text{th}$ time slot is associated with the association factor and no tolerance factor, $\phi_{i,k}^{t}=1$, and $X_{i,m}^{t}=1$, otherwise, $\phi_{i,k}^{t}=0. C_{th,i,m}^{t}$ and $C_{th,i,k}^{t}$ denote the threshold data rate that reflects from the $t-\text{th}$ time slot. The data rate thresholds for the $m-\text{th}$ CUD and the $n-\text{th}$ DUE at their bare minimum, respectively. The $m-\text{th}$ CUD's maximum transmit power and $n-\text{th}$ DUEs maximum transmit power are denoted as $P_{i,m}^{\max}$ and $P_{i,n}^{\max}$. The minimal data rate threshold is guaranteed by ln in accordance with limitations C1 and C2, the $m-\text{th}$ CUD, and the $n-\text{th}$ DUE. It has been demonstrated by constraint C3 that the judgments regarding device association and spectrum assignment are binary variables. As required by constraint C4, there is a Resource Allocation Unit (RSU) that corresponds to each DUE. Because of constraint C5, within a particular time window, a DUE can only access one RB that is being utilized by one CUD. This limitation is imposed on DUEs. The constraint C6 places a limit on the amount of power that can be transmitted by the n-th DUE during each scale slot. C7 and C8 are the maximum transmission power constraints. The problem Formula (9) is an MINLP problem, which is non-convex and intractable to solve directly to get the optimal solution. In the following section, we will talk about the various methods that can be used to solve this problem.

SECTION 4

Tripartite Graph-Based Resource Allocation and Time Scaling Power Optimization Algorithm

In this section, we will discuss the solution of the formulated problem in Formula (9). The formulated problem is an MINLP problem, and there is no way to solve directly and it is hard to get the solution. Because D2D networks are often having a large number of connectives, employing an optimization strategy that operates for a short period may lead high amount of signalling overhead. Also, CSI gets affected due to perturbation. To overcome this issue, we propose a method that requires a low amount of signalling overhead, and the precise strategy involved in providing the optimize solution. In order to minimize the perturbation effect caused by D2D spectrum reuse, we achieve the overall throughput optimization problem by dividing the original problem into subproblems. To make this tractable, the problem is categorized into different sub-problems and can be solved in different stages. In the first stage, to increase the system sum throughput and signaling overhead reduction, a combined device association and a resource management plan are developed by using a tripartite matching-based resource allocation method. The second stage involves proposing an effective power control plan for each time slot to meet the users' immediate QoS requirements.

4.1 Tripartite Graph-Based Resource Allocation Strategy for Throughput Maximization

As we have seen in Fig. 2, the concept of the resource allocation model based on a tripartite graph takes into account the social relations between the various users of the IoT ecosystem. For instance, the cellular user provides the cache resources and the spectrum allocation. On the other hand, the D2D user provides the request for the link establishment phase.

Fig. 2 - Tripartite graph-based resource allocation in D2D-enabled SIoT network.
Fig. 2

Tripartite graph-based resource allocation in D2D-enabled SIoT network.

In the first stage of the proposed solution, the concept of the tripartite matching theory as shown in Fig. 2 has been used. A direct link has been established between the D2D-SIoT system and the cellular users. We also address the related problems of the three-dimensional graph matching between cellular users and D2D users. As shown in Fig. 3, two algorithms are proposed to solve the problems in the various phases of the link establishment and spectrum allocation process. The first algorithm is a one-to-one stable matching method that utilizes the social D2D connection. The other is a channel-state approach. The channel-state algorithm is mainly used to ensure that the link between the various D2D users is close. The importance of social and mobile similarity is acknowledged to ensure that the information and content delivered to users are reliable and efficient. The channel-state algorithm takes into account the interference and fading issues to improve the transmission rate.

In addition, the results of the tripartite matching algorithm[42] are proposed to improve the D2D throughput of SIoT services. This method can be performed simultaneously with global optimization.

Based on the stability model, a one-to-one framework for connecting social D2D users has been developed. This framework provides a link between the two users that is necessary for their activities. D2D users will benefit from having a shared data kink, as it allows them to successfully download the desired data while maintaining their QoS. Thus, the user reassociation ratio is \begin{align*}& A_{j,m}^{D}= \frac{\phi_{j,m} \xi_{\text{th}}}{\alpha T_{j,m}^{D}}\tag{10}\\ & \alpha=1-\mathrm{e}^{-\frac{\chi\cdot^{l}{}_{j}}{d_{j,m}}}\tag{11}\end{align*}View SourceRight-click on figure for MathML and additional features. where $\chi$ is the weight parameter, $d_{j,m}$ is the Euclidean distance, and $\alpha$ is the position correlation function. $\chi$ is defined as \begin{equation*}\chi=\begin{cases} 1,\mathrm{D}2\mathrm{D}\ \text{relationship with SIoT};\\ 1/2,\mathrm{D}2\mathrm{D}\ \text{with CUE}.\end{cases}\end{equation*}View SourceRight-click on figure for MathML and additional features.

Fig. 3 - Flow chart of the two-stage resource allocation and power optimization for throughput maximization.
Fig. 3

Flow chart of the two-stage resource allocation and power optimization for throughput maximization.

The channel state information of the D2D link multiplexing system leads to a one-to-one matching model[17] between the link multiplexing and the allocation of the social IoT link spectrum. This model ensures that the link multiplexes the allocated downlink spectrum for communication. Suppose that a total of $N$ D2D links and $M$ Cellular links with SIoT links are formed in the previous stage and the D2D links are denoted as $N=\{n_{1},n_{2},\ldots,n_{i}, \ldots,n_{I}\}$. The condition of the constraint indicates that each D2D link can reuse only one CUD resources. This means that the allocation problem can be solved by turning it into a one-to-one matching problem.

One-to-one matching can be performed in the allocation process by mapping the cellular user, D2D user, and SIoT user. This can be done by satisfying the following cases. Such that,

Case 1. If $\vert \gamma(r)\vert \leqslant 1,\ \forall r\in R$, then $r$ does not multiplex the resources of any D2D-SIoT link of the D2D users, $\gamma(a)=\beta$.

Case 2. If $\vert \gamma(\mathrm{D}2\mathrm{D})\vert \leqslant Q/\rho\cdot\beta$, then the total bandwidth available in the D2D-SIoT network model is $W$, and the bandwidth of each sub-carrier is $\beta_{o}. n$ represents the number of D2D users for equally distribution of overall resources. So, each D2D can allocate up to $W/n\cdot\beta_{o}$ resources.

$W/n\cdot\beta_{o}$ indicates the mutually independent orthogonality sub-channel sub-carrier to the D2D-SIoT link.

If the D2D-SIoT link in D2D resources does not match any $r$, then $\gamma(\mathrm{D}2\mathrm{D})=\beta$.

Case 3. If $\gamma(r)=\mathrm{D}2\mathrm{D},\ r\in\gamma(\mathrm{D}2\mathrm{D})$, then the first assumption is implied that only one D2D-SIoT connection can access $R$ resource block, within the D2D resource constraints. $r$ represents the density of D2D users. This means that each D2D link may reuse the allocated resources $R$ at most. The second assumption indicates that D2D users can support up to $W/n\cdot\beta_{o}$ D2D links multiplex with the D2D-SIoT link spectrum in the D2D communication region. This means that if $r$ is located in the D2D communication area, it can be mapped to the D2D user. The third assumption indicates that the link's symmetric, and transitivity are related to its allocation.

The channel must be considered when multiplexing the downlink spectrum. It should be regarded as the interference of the D2D transmitter to the receiver of the D2D device and the SIoT receiver when the link is multiplexed. The link between the D2D devices and the SIoT network should be considered as a means to meet the service requirements of the users. Therefore, the objective function is defined as \begin{align*}T(\mathrm{D}2\mathrm{D},\mathrm{Q})= & \log_{2}\left(1+ P_{i,n}^{D} h_{i,n}^{D}\left(\sigma_{o}^{2}+ \sum\limits_{i=1}^{N-1} \sum\limits_{j=1}^{M-1} A_{i,j} P_{i,n}^{D} h_{D_{i,n}}^{B}+\right.\right.\\ &\left.\left. \sum\limits_{i=1}^{N-1} \sum\limits_{j=1}^{M-1} A_{i,j} P_{i,j}^{D} h_{D_{i,j}}^{S}+ \sum\limits_{i=1}^{N-1} \sum\limits_{j=1}^{M-1} A_{i,j} P_{i,j}^{D} h_{D_{i}}^{C}\right)^{-1}\right)\tag{12}\\ T (C,Q) = & \log_{2}\left(1+\frac{P_{i,m}^{C} h_{i,B}^{C}}{\sigma_{o}^{2}+ \sum\limits_{i=1}^{N-1} \sum\limits_{j=1}^{M-1} A_{i,j} P_{t}^{C} h_{D_{i}}^{C}}\right)\tag{13}\end{align*}View SourceRight-click on figure for MathML and additional features.

When the time comes to choosing the optimal solution, make sure that the D2D and SIoT links are allocated to the appropriate resources. This can be done through a tripartite matching model.

4.2 Time Scale Optimization Approach To Minimize Signaling Overhead

The optimization strategy ensures that users' average QoS needs are met. The system sum throughput may, however, be significantly reduced if the instantaneous QoS requirements of delay-sensitive services are not met, leading to additional signaling overhead. This problem has a proposed solution, where a power control technique that among other things, maximizes the sum throughput of DUEs at each time slot. As a consequence of this, the optimal issue for each time slot is formulated as follows: \begin{gather*}\mathrm{P}1: \max\limits_{P_{m^{\prime}}^{i,t}} f(P_{i,n,t}^{D})\\ \mathrm{s}.\mathrm{t}.\qquad \mathrm{C}1, \mathrm{C}2,\ \text{and}\ \mathrm{C}6\ \text{in Formula} (9).\tag{14}\end{gather*}View SourceRight-click on figure for MathML and additional features. where $f(P_{i,n,t}^{D})= \sum\limits_{i\in I} \sum\limits_{\substack{n\in N\\ m\in M}}\sum\limits_{k\in K}\sum\limits_{t\in T}(\log_{2}(1+\text{SINR}_{i,n,k,t}^{D}))$.

Analysis shows that the objective function $f(P_{i,n,t}^{D})$, in Eq. (12) is nonconvex. By converting $P_{i,n,t}^{D}$ into $\mathrm{e}^{P_{i,n,t}^{D}}\,\ f(P_{i,n,t}^{D})$, can be equivalently transformed into a convex function which is \begin{equation*}f(P_{i,n,t}^{D})= \frac{1}{\ln 2}\sum\limits_{i\in I}\sum\limits_{n\in N}\sum\limits_{k\in K}(-\ln\delta+P_{i,n}^{D}+\ln(h_{D_{i,n,k}}^{t}))\tag{15}\end{equation*}View SourceRight-click on figure for MathML and additional features. where $\delta=\sum\limits_{m\in M} \sum\limits_{i\in I,j\neq i} \mathrm{e}^{\left(P_{t}^{D}+\ln h_{B,o}^{o}\right)}+P_{t,m}^{C}h_{B,o}^{o}+\sigma_{o}^{2}$.

Problem P1 will be solved using Lagrange dual decomposition[43], [44]. Here define $\gamma_{k}\in\varLambda=\{\gamma_{1},\gamma_{2}, \ldots, \gamma_{k}\},\ \mu_{m}\in M=\{\mu_{1},\mu_{2}, \ldots,\mu_{m}\}$, and $w_{m}\in\omega=\{w_{1},w_{2}, \ldots, w_{m}\}$ are the multiple variables of Lagrange dual decomposition[45] which is called as Lagrange multiplier. These variables are connected to the constraints C1, C2, and C8 in their respective order. The Karush-Kuhn-Tucker (KKT) conditions[46] are utilized in this analysis and the derivative of Lagrange function $L(P_{i,t}^{D},\varLambda,\mu,w)$, with respect to $P_{t}^{D\ast}$, the optimal solution of Formula (9) can be attainable.

Translating $\mathrm{e}^{\left(P_{i,t}^{D}\right)}$ into $P_{t}^{D\ast}$, the optimal solution is given by \begin{equation*}P_{t}^{D\ast}= \max\left\{\frac{1+\mu_{k}}{\sum\limits_{m\in M}\sum\limits_{k\in K}\sum\limits_{i\in I,j\neq i}y+(\gamma_{k}h_{i,m}^{t}+w_{k})\ln(2)},0\right\}\tag{16}\end{equation*}View SourceRight-click on figure for MathML and additional features. in which $y= \frac{h_{i,j}^{t}(1+\mu)}{\sum\limits_{m\in M}\sum\limits_{i\in I,j\neq i}P_{t}^{D}h_{ij}^{D}+P_{t,m}^{C}h_{B,o}^{o}+\sigma_{o}^{2}}$.

Lagrange multipliers in $l-\text{th}$ iteration are adjusted by the sub-gradient approach. \begin{gather*} \gamma_{t}^{(1+l)}= \gamma_{t}^{l}-\alpha\left(\frac{P_{t,m}^{C} h_{B,0}^{0}}{C_{k,th}^{i,t}}- \sigma_{o}^{2}- \sum\limits_{m\in M} P_{t,m}^{C} h_{B,i}^{t}\right)\tag{17}\\ \gamma_{t}^{(1+l)}= \gamma_{t}^{l}+\beta(C_{k,th}^{i,t}- \log_{2}(1+\text{SINR}_{i,m,k,t}^{D}))\tag{18}\\ w_{t}^{(1+l)}= W_{t}^{l}+\eta(P_{t,i,m}^{D}- P_{t,i,m}^{\max})\tag{19} \end{gather*}View SourceRight-click on figure for MathML and additional features. where $\alpha,\beta$, and $\eta$ are the step size.

The suggested solution can be formulated using a multi-slotted time-scale analysis method if the statistical data on CSI is available. The suggested strategy can also be affected by how fast the channel's behavioral changes. CSI's statistical behavior may change slowly, which can result in a reduction in complexity while increasing it with diminished mobility. Formula (9) can be rewritten as \begin{equation*}\max\limits_{a,b,c}T(P_{\max}^{D},\tau,\xi,\delta)\tag{20}\end{equation*}View SourceRight-click on figure for MathML and additional features. where $T(P_{\max}^{D},\tau,\xi,\delta)=\phi_{k}\log_{2}(1+\text{SINR}_{k}^{D}(P_{\max}^{D},\tau,\delta))$.

Due to the existence of multiple D2D users and the non-linear nature of objective function, the solution of the formulated problem is complex. The problem mentioned in Formula (20) can be solved by offloads the delay and time scaling concept for the optimization of transmission power level. Device power gets distributed at different time slot. Based on the requirement of the power by the distance dependent users, power will be utilized. With the help of lemma 1, we will study the impact of threshold SINR and maximum transmission power constraints C7 and C8 given in Formula (9).

Lemma 1

Let $f(x)\ {\buildrel \triangle\over=}\ \max(x)$ and $f_{m}(h) \ {\buildrel \triangle\over=}\ \frac{1}{P_{m}}\ln\left(\sum\limits_{m=1}^{M}\mathrm{e}_{m}^{P_{m}h}\right)$, where $h=[h_{1},h_{2}, \ldots,h_{i}]^{\mathrm{T}}\in \mathbb{R}^{i\times 1},\ i$ is a positive integer, and $m$ is a real number.

Proof

Lemma 1 indicates the log-sum exponential procedure can be utilized to approximate the maximum functions, which are both tractable and varied, where $h$ is obtained from the Rayleigh fading. Then, we have \begin{gather*}f(x)\leqslant f_{m}(x)\tag{21}\\ \lim\limits_{m\rightarrow+\infty} f_{m}(x)=f(x)\tag{22}\end{gather*}View SourceRight-click on figure for MathML and additional features.

When $i\geqslant 2$ and $m > 0$, the approximate gap is upper bound by $f_{m}(x)$.

Lemma 1 is important for analyzing the complex problems in the network, particularly constraints such as threshold SINR and maximum transmission power, as seen in constraints C7 and C8 of Formula (9). The lemma introduced an approximation of mathematical expression where the max function, difficult to optimize due to its non-differentiable behavior, which is replaced by the log-sum-exponential function. This approximation transforms the original problem into a easier and more tractable form, making it amenable to gradient-based optimization techniques. The log-sum-exponential function is particularly advantageous because it closely approximates the maximum function as the maximum transmission power parameter increases, ensures that the solution maintains reliability while benefiting from enhanced throughput. Lemma 1 allows for a more flexible and reliable approach to handle randomness and variability in channel conditions, enabling more effective analysis and optimization of the system performance under varying channel conditions. This is crucial and important to help in the proof of Theorem 1 to optimize the problem that can robustly meet SINR thresholds and maximum transmission power constraints, ensures reliable and efficient communication in challenging environments.

By resorting to lemma 1 and the fact that $1+ \text{SINR}_{i,j}^{D}(P_{\max}^{D},\tau,\delta) > 0$, then throughput $T(P_{\max}^{D},\tau,\xi,\delta)$ can be lower bounded by \begin{align*}\tau & (P_{\max}^{D},\tau,\xi,\delta) > \bar{T}(P_{\max},\tau,\xi,\delta)\ {\buildrel\triangle\over=}\\ &\quad\ \ \phi\log(1+\text{SINR}_{i,j}^{D}(P_{\max}^{D},\tau,\delta))-\\ &\quad\ \ \frac{1}{P_{m}}\beta\log(1+\text{SINR}_{i,j}^{C}(P_{\max}^{D},\tau,\delta))\tag{23}\end{align*}View SourceRight-click on figure for MathML and additional features.

The problem in Formula (9) can be transformed into \begin{equation*}\max\limits_{P_{t}^{D},P_{t}^{C}} T(P_{\max}^{D},\tau,\delta)\tag{24}\end{equation*}View SourceRight-click on figure for MathML and additional features.

The transmit power and link data issue in Equation (16) and Formula (24) can be considered as an approximation of the problem given in the equation. If the issue is not finite, then the solution becomes comparable. The challenge arises since the short-term and long-term variables, $P_{n}$ and $P_{m}$ are coupled. To solve this issue, we use the primal decomposition technique to decompose it into two subproblems: transmission power and channel realization denoted as $P_{t}$ and $h$, respectively.

The channel realization is related to one interval of time and can be solved in different available slotted times. Here, $P_{n}$ is fixed and $h$ is vary. Instead of having full Instantaneous CSI coverage, the low-dimensional form of the fading channels in each slot provides a distinct and efficient coverage contrast. The stationary solution can be found by solving the subproblems of constraints $P_{\max}\leqslant P_{t,n}^{D}$, for each D2D user under Instantaneous CSI.

We observe that $P_{t}^{D}(\tau,\delta)$ still difficult to solve as its objective function $T(P_{\max}^{D},\tau,\xi,\delta)$, and the power constraints are non-dynamic. To transform into a more tractable form, we will minimize the power consumption by minimizing the delay, which is discussed in the next part of this section. The allocation of power is expressed as \begin{equation*}P_{i,n,t}^{D}=\begin{cases} P^{n}(i), & 0 < P^{n}(i) < P_{\max};\\ P_{\max}, & P^{n}(i)\geqslant P_{\max}\end{cases}\tag{25}\end{equation*}View SourceRight-click on figure for MathML and additional features.

The above Eq. (25) is applied to satisfy the constraints of Formula (9), that is, C7 and C8.

4.2.1 Minimal Delay Strategy Based on User Reassociation and Resource Allocation Ratio

The first step is to fix the resource computations and get the optimal amount of offloading traffic in D2D-enabled SIoT network. This will transform the issue into a system delay minimization problem.

Total delay minimization can be expressed as \begin{gather*}\tau_{k}^{D}=\frac{\xi_{k}^{D}(\delta)}{CT_{k}^{D}}\tag{26}\\ \tau_{k}^{C}=\frac{B \xi_{k}^{C}(\delta)}{\alpha_{m,n} T_{k}^{C}}\tag{27}\end{gather*}View SourceRight-click on figure for MathML and additional features.

Now, the latency minimization problem P2.1 can be formulated as \begin{align*}& \mathbf{P}\mathbf{2.1}:\\ & \min\limits_{\text{SINR}_{\text{th}}, C_{\text{th}}}\left\{\max\limits_{P_{\max}^{D},P_{\max}^{D}}\left\{\tau_{k}^{D}, \tau_{k}^{C}\right\}\right\}=\\ & \min\limits_{\text{SINR}_{\text{th}}, C_{\text{th}}}\left\{\max\limits_{P_{\max}^{D},P_{\max}^{D}}\left\{\frac{\xi_{k}^{D}(\delta)}{CT_{k}^{D}}, \frac{B \xi_{k}^{C}(\delta)}{\alpha_{m,k}^{C} T_{k}^{C}}\right\}, \frac{\left(1-\sum \beta\right) \xi_{k}^{T}}{\alpha_{n,k}^{D} T_{k}^{D}}\right\}\tag{28}\end{align*}View SourceRight-click on figure for MathML and additional features.

The reduction of the overall delay can be achieved through jointly optimizing the reassociation and resource allocation ratios. \begin{align*}& \min\limits_{\text{SINR}_{\text{th}}, C_{\text{th}}} \{\tau\}=\\ & \min\limits_{\text{SINR}_{\text{th}}, C_{\text{th}}}\left\{\frac{1}{N+2}\left(\sum\limits_{n=0}^{N}\left(\frac{B \xi_{k}^{C}(\delta)}{\alpha_{m,k}^{C} T_{k}^{C}}+\frac{\xi_{k}^{D}(\delta)}{CT_{k}^{D}}\right)\right), \frac{\left(1-\sum \beta\right) \xi_{k}^{T}}{\alpha_{n,k}^{D} T_{k}^{D}}\right\}\tag{29}\end{align*}View SourceRight-click on figure for MathML and additional features.

From the above Eq. (27), it can be assumed that the total delay $\tau$ for every D2D user when the allocation ratio $\alpha_{k}$ is fixed and proportional to the reassociation ratio $\beta_{k}$.

The total delay is inversely proportional to the resource allocation ratio $\alpha_{k}$. The user association ratio fixed $\beta_{k}$, the overall delay $\tau$, which is proportional to the resource allocation ratio $\alpha_{k}$.

The reassociation ratio beta's negative correlation with the local processing latency can prevent us from achieving a resource allocation ratio with this method. The optimization of the resource allocation and user reassignment ratios is carried out through the use of the gradient descent method.

Based on the allocation ratio for each resource, when $\frac{\left(1-\sum\beta_{k}\right)\xi_{k}}{\alpha_{k}T_{k}}=\frac{\beta_{k}\xi_{k}^{C}}{T_{k}^{C}}+\frac{\beta_{k}\xi_{k}^{D}}{\alpha_{m,k}^{D}T_{k}^{D}}$, the optimal reassociation ratio for users $\beta_{k}$ can be determined by \begin{equation*}\beta_{k}=\frac{1}{\left(\frac{1}{\alpha_{k}T_{k}^{D}}+\frac{k}{T_{k}^{D}}\right)\left(\sum\limits_{k=0}^{K}\left(\frac{1}{\alpha_{k}T_{k}^{C}}+\frac{k}{T_{k}^{C}}\right)+\frac{1}{k/T_{k}}\right)}\tag{30}\end{equation*}View SourceRight-click on figure for MathML and additional features.

The minimum throughput of a system $\min\limits_{\alpha_{k}}T_{k}$, often a MINLP problem when the user re-association ratio $\beta_{k}$, which is fixed due to $\frac{\partial^{2}T_{k}}{\partial\alpha_{k}^{2}}\geqslant 0$. The solution to this problem is to utilize the Lagrange method. The Lagrange equation is \begin{align*}L(\alpha,\gamma)= & \frac{1}{K+2}\left(\sum\limits_{k=0}^{K}\frac{\beta_{k} \xi_{k}^{D}}{\alpha_{k} T_{k}^{D}}+\frac{\beta_{k} \xi_{k}^{C}}{T_{k}^{C}}\right)+\\ & \frac{\left(1-\sum \beta_{k} \xi_{k}^{C}\right)}{T_{k}^{C}}+\gamma\left(\sum\limits_{k=0}^{K} \alpha_{k}-1\right)\tag{31}\end{align*}View SourceRight-click on figure for MathML and additional features. where $\gamma$ is the Lagrangian multiplier.

The KKT provides a relaxation condition that can be used as a factor that influences the allocation of certain resources. It can be expressed as \begin{equation*}\gamma\left(\sum\limits_{k=0}^{K}\alpha_{k}-1\right)=0\tag{32}\end{equation*}View SourceRight-click on figure for MathML and additional features.

We are going to discuss these two cases.

  • Case 1:

    When $\gamma > 0, \sum\limits_{k=0}^{K}\alpha_{k}-1=0$, by the derivative $\frac{\partial L(\alpha,\gamma)}{\partial\alpha_{k}}=0$, we have $\alpha_{k}=\sqrt{\frac{\beta_{k}\xi_{k}^{C}}{\gamma T_{k}^{C}}}$.

  • Case 2:

    When $\gamma=0$, $\sum\limits_{k=0}\alpha_{k}-1 < 0$, then the reduction in the delay offloads is caused by the increase in the resource allocation ratio and the decrease in the user reassociation ratio. As a result, we increase the allocation ratio until it satisfies the objective of reducing the total delay that is $\sum\limits_{k=0}^{K}\alpha_{k}-1=0$. As a solution, we increase the ratio to reduce the total delay. Similar to the case in case 1, this occurs as we try to minimize the total amount of delay.

When $\sum\limits_{k=0}^{K}\alpha_{k}-1=0$ D2D users' allocation of resources can be determined by considering the various factors that affect the system is expressed as \begin{equation*}\alpha_{k}=\sqrt{\frac{\beta_{k}\xi_{k}^{C}}{\gamma T_{k}^{C}}}\tag{33}\end{equation*}View SourceRight-click on figure for MathML and additional features.

Equation (33) indicates that the optimal expression can be obtained in a closed-form equation by merging $\alpha_{k}$ with $\sum\limits_{k=0}^{K}\alpha_{k}-1$. It is expressed as \begin{equation*}\gamma=\xi_{k}\left(\sum\limits_{k=0}^{K}\sqrt{\frac{\beta_{k}}{T_{k}}}\right)^{2}\tag{34}\end{equation*}View SourceRight-click on figure for MathML and additional features.

Equation (34) refers to the Lagrange multiplier used to minimize or offloads the delay by improving the user re-association and resource allocation ratio.

4.2.2 Power Optimization Strategy To Improve Quality of Service

To optimize the transmission power by satisfying the QoS of the D2D-enabled SIoT devices, throughput maximization of the network can be reformulated as \begin{align*}& T\left(P_{\max}^{D},\tau,\xi,\delta\right)=\\ & \max\limits_{P_{\max }^{D}, P_{\max}^{C}}\left(\sum\limits_{k=1}^{K} \phi_{k} \log_{2}(1+\text{SINR}_{n}^{D}(P_{\max}^{D},\tau,\delta))\right)\tag{35}\\ &\qquad\qquad \mathbf{P}\mathbf{2.2}: \max\limits_{P_{\max}^{D},\tau, \xi,\delta} T\left(P_{\max}^{D},\tau,\xi,\delta\right)\end{align*}View SourceRight-click on figure for MathML and additional features.

The optimal solution for addressing the transmission power issue to maximize throughput is not feasible since it is related to the algorithm's objective.

The objective function in Formula (9) can be equivalently written with the help of the Lagrange dual transform is \begin{equation*}\sum\limits_{k=1}^{K}A_{k}\log_{2}(1+Z_{k})-\sum\limits_{k=1}^{K}A_{k}Z_{k}+\sum\limits_{n=1}^{N}\sum\limits_{k=1}^{K}\frac{(1+Z_{k})A_{k}\text{SINR}_{n}^{D}}{1+\text{SINR}_{n}^{D}}\tag{36}\end{equation*}View SourceRight-click on figure for MathML and additional features. where $A_{k}$ denotes the power variable and $Z_{k}$ is Auxiliary Variables which can be introduced in Theorem 1.

The optimal $Z_{k}$ can be obtained by setting the derivations to zero, and we get $Z_{k}=\text{SINR}_{n}$.

Then, for the fixed optimal $Z_{k}$, discard drop or ignore the irrelevant parts of $SINR$ in Eq. (7). \begin{align*}\mathbf{P}\mathbf{3}: & \\ &\qquad \mathrm{P}3: \max\limits_{P_{t}^{D}}\sum\limits_{k=1}^{K}\frac{(1+ Z_{k})A_{k}\sum\limits_{r=1}^{R} P_{r} G_{r}}{\sum\limits_{l=1}^{L} \sum\limits_{r=1}^{R} P_{r} G_{r}+ N_{o}}\tag{37}\\ \end{align*}View SourceRight-click on figure for MathML and additional features.

The Quadratic transform can be used to solve the above-formulated problem in Eq. (26) by resorting to the following theorem with the help of Lemma 1, and Formula (23) and (24).

Theorem 1

Let's introduce some auxiliary variables, such as $w,\ x,\ y$, and $z$, where $w\in C,\ x\in C$, $y\in C$, and $z\in C$.

Then the following problem: \begin{equation*}\min\limits_{w,x,y,z,P_{t}}\left(ze(w,x,P)-\log(z)+\frac{1}{\alpha}xe\left(w,P_{t}^{D}\right)-\frac{1}{\alpha}\log(x)\right)\tag{38}\end{equation*}View SourceRight-click on figure for MathML and additional features. where $e(w,x,P)\ {\buildrel \triangle\over=}\ x^{2}h_{i}^{D}P_{t}^{D}+x^{2}N_{o}^{2}+P_{t}^{2}Gy^{2}+1-2R\{x^{\ast}w \cdot G\}$, and $D(w,P)\ {\buildrel \triangle\over=}\ \sum\left[1+\text{SINR}_{n}^{D}(w,x,P_{t})\right]$, since that it is equivalent to that of the global optimal solution for the two identical subproblems.

Proof

According to Lemma 1 and the statement of Theorem 1, optimizing $T\left(P_{\max}^{D},\tau,\xi,\delta\right)$, can be achieved by minimizing the problem's objective function. We must note that solving the issue in Formula (37) will be less complex with the addition of auxiliary variables, as doing so makes it easier to fix the others.

To proceed further, we introduce a set of auxiliary variables the problem in Eq. (13) can be equivalently transformed into the following problem: \begin{align*}& \min\limits_{w,x,y,z, P_{t}}\left(ze(w,x,P)-\log(z)+\right.\\ &\qquad\left. \frac{1}{\alpha}x\left(\sum 1+\text{SINR}_{\text{th}}\right)-\frac{1}{\alpha}\log(x)\right),\\ & \mathrm{s}.\mathrm{t}.\ \text{SINR}_{n}^{D}(w,x,P)\leqslant \text{SINR}_{\text{th}}\tag{39}\end{align*}View SourceRight-click on figure for MathML and additional features.

The equivalence between Formula (37) and (38) can be easily verified as the optimal SINR* of Formula (41) must be satisfied. \begin{equation*}\text{SINR}_{n}^{\ast}=\zeta_{n}^{\ast}=\text{SINR}_{n}^{D}(w,x,P)\tag{40}\end{equation*}View SourceRight-click on figure for MathML and additional features.

If the problem defined in Formulas (39) does not satisfy the SINR, then it will automatically reduce the objective value by minimizing it without affecting the constraints. This method can lead to the optimal solution of Formula (38). We present a method that can solve the problem defined in Formula (39) by considering the auxiliary variables in the gradient descent procedure. We must first recognize that the constraints related to power consumption and the SINR threshold are difficult to handle. To solve these problems, we have introduced the upper bounds for Maximum Transmission power and SINR. \begin{equation*}\text{SINR}_{n,ij}^{D}\leqslant\frac{P_{n,t}^{D}h_{ij}^{D}}{P_{m,t}^{C}h_{ij}^{D}+2R\sum\limits_{n=m=1}^{N,M}P_{m,t}^{C}h_{B,0}^{0}+\sigma_{o}^{2}}\tag{41}\end{equation*}View SourceRight-click on figure for MathML and additional features.

The problem in Formula (41) can be rewritten as \begin{align*}& \min\limits_{w,x,y,z, P_{t}}\left(ze(w,x,P)-\log(z)+\right.\\ &\qquad\left. \frac{1}{\alpha}x\left(\sum 1+\text{SINR}_{\text{th}}\right)-\frac{1}{\alpha}\log(x)\right)\tag{42}\end{align*}View SourceRight-click on figure for MathML and additional features. s.t. \begin{align*}& \mathrm{C}1: \frac{P_{n,t}^{D} h_{ij}^{D}}{P_{m,t}^{C} h_{ij}^{D}+2R \sum\limits_{m=1}^{C} P_{m,t}^{C} h_{B,0}^{0}+ \sigma_{o}^{2}}\leqslant \text{SINR}_{\text{th}},\\ & \mathrm{C}2: -P \cdot h-P\cdot w+2R\left\{\sum\limits_{m=1}^{M} P_{t,m}^{C} h_{B,0}^{0}+ \sigma_{o}^{2}\right\}\geqslant y_{m},\end{align*}View SourceRight-click on figure for MathML and additional features. where $P_{m,\max}^{D}(a,b,c)\Rightarrow P\cdot h$ and $P\cdot w$ is approximated by the first-order Taylor series expansions. $P$ is the transmission power and $w$ denote the CSI carried out during data transmission.

With fixed one variable (auxiliary) $x$ and $\{w,\ P$, SINR}, the optimal solution can be easily obtained as $Z= \frac{1}{e(w,P,\text{SINR})}$ and $y= \frac{1}{\sum(1+\text{SINR})}$, by resorting to the first-order optimality condition.

With fixed variable { $w,\ P$, SINR} and $\{z,\ y\}$, the optimal solution is given by \begin{equation*}x= \frac{P_{t}^{D}h_{t}^{D}}{P_{t}^{C}h_{io}^{C}+\sum P_{t}^{D}h_{ij}^{D}+\sigma_{o}^{2}}\tag{43}\end{equation*}View SourceRight-click on figure for MathML and additional features.

By solving the problem formulated in Formula (42) with the help of Eq. (43), we have calculated the optimal SINR* of Eq. (40). Then, sum throughput gets calculated and maximized through efficient resource allocation and achieved low latency with low power consumption in D2D based Social IoT Networks from Eq. (35). Impact of perturbation in CSI gets minimized with the help of proposed approach for Social IoT Applications. Pseudo code of the proposed method is given in Algorithm 1.

SECTION 5

Numerical Result and Discussion

In this section, numerical results are provided to evaluate the performance of the proposed tripartite graph-based resource allocation and time scale optimization algorithm. Figure 4 illustrates the deployment of users in a cellular cell. The coordinates of D2D users, cellular users and base station have been observed to reflect the real ground truth of the users in the network. All users are distributed in a cellular cell within a radius of 500 m. The simulation parameters are set with a BS at the centre of the area under consideration and the number of RSUs spaced apart by 150 m. The typical distance between devices is 50 m, while the distance from a cellular user to the base station is 150 m. We also set the following values: maximum D2D power set as $P_{\max}^{D}=23\ \text{dBm}$, power at base station is $P_{\max}^{B}=40\ \text{dBm}$, and $\sigma_{o}^{2}=-174\ \text{dBm}$. The D2D link receiver has an SINR threshold of 6 dB and the cellular link receiver has SINR thresholds of 0 dB. For both the link shadowing standard deviations are 8 dB and 4 dB, respectively. Here, $\tau=10$ ms, $l= 10\ \mathrm{s}$, and $t=[10,50]\ \mathrm{s}$. The total simulation time is given by the formula $\tau$ given in Eqs. (26) and (27) for D2D users and cellular users. The table of system simulation parameters is given in Table 2.

SECTION Algorithm 1

Tripartite graph-based resource allocation and time scaling power optimization algorithm

1:

Initialization: Set the initial value of the system parameters and then create directed edges for each D2D node. Then, label the edges to indicate the current state of the system. Initialize variables such as transmission power, the distance between users, resource block, path loss exponent, etc. to a feasible value and set the iteration index $i=0$.

2:

Stage 1: Initialize and establish a connected tripartite graph for the allocation of resources.

3:

Arbitrarily assign a sub-carrier to the node's location of the DUE and CUD.

4:

Link establishment phase.

5:

From Eq. (18), to establish the initial stable link, obtain the resource matching, update the edges, and call Theorem 1.

6:

Spectrum sharing edges.

7:

From Theorem 1, to allocate the spectrum, repeat line 5.

8:

Stage 2a: A time-scale optimization algorithm based on Stochastic and maximum-spanning tree

9:

for $P\neq P_{t}^{D}$ do

10:

for $\forall\alpha_{k}\in \mathrm{D}_{k}, 1\leqslant k\leqslant T$ do

11:

Select the edges in the D2D users from $\gamma$ the beginning

12:

if there is a node $\gamma$ around $\alpha_{k}$ and the edges between points is empty, then

13:

Change the location of the edges of the D2D users into set L

14:

else

15:

Repeat lines 2 and 3 until there is a node $\gamma$ around $\alpha_{k}$

16:

end if

17:

end for

18:

end for

19:

Repeat lines 2-4 until there is no blockage in the resource allocation and low latency in the network.

20:

Stage 2b: Evaluation of throughput

21:

for $i=1:N$ do

22:

do device re-association, power control, and spectrum assignment

23:

for $t=1:T$ do

24:

Determine the throughput $T$ from Eq. (35)

25:

end for

26:

end for

27:

Output: Obtain the enhanced throughput and optimal power consumption with low latency.

Results from simulations demonstrate that how the system's performance in terms of sum-rate is influenced by the quantity of DUE and the length of the time slot, probability of satisfying the QoS requirements will meet across all users and signaling overhead. We determine the signaling overhead of the system by the calculation of the ratio of D2D user reassociation and reassignment of resources, which is denoted by the notation $W/n\cdot\beta_{o}$, where $Q$ is the number of times that users re-associated themselves with resource bandwidth. The fact is that decreasing the ratio between them is an efficient method for lowering the amount of overhead caused by the systems signalling. For checking the effectiveness of the proposed approach is compared with the benchmark schemes such as bipartite[46], greedy, heuristic, and hungarian algorithms[47].

Fig. 4 - Deployment of users in a proposed scenario.
Fig. 4

Deployment of users in a proposed scenario.

Table 2 Parameters used in the simulation.
Table 2- Parameters used in the simulation.

Figures 5 and 6 demonstrate the impact of varying the number of D2D pairs and the variation in the length of the time slot affect the performance of the sum throughput. In Fig. 5, as we increase the number of D2D users, sum throughput also increases. Performance gain of the proposed approach compared to other standard approaches ranges anywhere from 17% to 66.67%. The sum throughput is affected by the number of pairs of D2D. This is due to the interference between cellular and D2D users. The proposed method performed better than the baselines in the sum throughput category. In Fig. 6, as the duration of the time increases, the D2D user's sum rate decreases. The proposed algorithm's performance is better compared to other standard methods would range from a low of 21% to a high of 93%. In general, it performs better when compared to the other benchmark algorithms.

Fig. 5 - Sum throughput of D2D-SIoT devices for different numbers of DUEs.
Fig. 5

Sum throughput of D2D-SIoT devices for different numbers of DUEs.

Fig. 6 - Sum throughput vs. length of the time slot.
Fig. 6

Sum throughput vs. length of the time slot.

Figures 7 and 8 illustrates the instant requirement of QoS may be satisfied based on the provided strategy; nevertheless, the baselines cannot guarantee that the users will not exceed their instantaneous QoS constraints. According to Fig. 7, when the recommended proposed approach is compared to other algorithms, it has the lowest signaling overhead across all of the simulated schemes. On the other hand, the random algorithm has the highest signaling overhead of all of the methods. This is a result of the fact that random guarantees quality of service criteria and improves the performance of the network by increasing the sum throughput, both of which lead to a considerable increase in signaling overhead. In Fig. 8, as the value of the time slot is increased using various techniques, the probability of satisfying the requirement of QoS decreases.

Fig. 7 - QoS satisfaction with respect to variant numbers of D2D users.
Fig. 7

QoS satisfaction with respect to variant numbers of D2D users.

Fig. 8 - QoS satisfaction with respect to variation in the length of time slot.
Fig. 8

QoS satisfaction with respect to variation in the length of time slot.

Fig. 9 - D2D user reassociation and reallocation with respect to variation in number of D2D pairs.
Fig. 9

D2D user reassociation and reallocation with respect to variation in number of D2D pairs.

Figures 9 and 10 illustrates the graph plotted for user re-association and resource re-allocation ratio versus variation in D2D connected pairs and time slot length. As D2D pairs increase, it becomes hard to satisfy the instant QoS needs with an increasing number of D2D pairs. In Fig. 9, resource re-allocation and user re-allocation has been performed, which significantly raises the signaling overhead. The simulation results validate the impact of the time slot duration and variant number of D2D users on user re-allocation and resource re-allocation ratio as shown in Fig. 10. Also, the ratio of D2D users re association and reassignment of resources increases. As we know the fact that, extending a time slot makes it challenging to meet immediate QoS requirements, which declines the D2D network's sum-rate performance and forces resource reallocation. Finally, there will be an increase in signal overhead as a result of this.

Fig. 10 - D2D user reassociation and reallocation with respect to variation in the length of the time slot.
Fig. 10

D2D user reassociation and reallocation with respect to variation in the length of the time slot.

Figure 11 shows the graph of time computation vs. different numbers of DUEs. The Hungarian algorithm shows a linear increase in computing time, while the other methods maintained little change in their initial performance even as the data increased. The proposed method maintains the same amount of computing time for each data type. The graph shows the trend in the time spent performing computation since various benchmark algorithms use a combination of factors and direct proportion increases in DUEs.

The power consumption of various subchannels is shown in Fig. 12. This is to show the efficiency of optimizing the number of channels. Up to 8% of the total power consumptions have been saved by minimizing the interference due to reuse the allocated resources. These results indicate that the power requirements for downlink transmission increase with number of users. This is due to the rise in delay requirements.

Fig. 11 - Time computation vs. different numbers of DUEs.
Fig. 11

Time computation vs. different numbers of DUEs.

Fig. 12 - D2D user reassociation and reallocation with respect to different power levels vs. length of the time slot.
Fig. 12

D2D user reassociation and reallocation with respect to different power levels vs. length of the time slot.

In Fig. 13, the impact of variation of maximum transmission power $P_{i,n}^{\max}$ on sum throughput of the D2D user is observed and compared with the benchmark schemes. It can be observed that the increase in sum throughput is monotonically with the increase in $P_{i,n}^{\max}$. The proposed scheme can achieve a better SINR with the increase in transmit power by exploiting the optimal solution of Formula (9). In Fig. 13, the sum throughput of different benchmark schemes has been compared to validate the performance of the proposed scheme. It shows that the proposed scheme has a significantly higher throughput than the other benchmark schemes due to the optimized subcarrier allocation and power allocation. In addition, the underutilization of the available spectral resources can limit the system throughput of benchmark schemes. For instance, the sum throughput of the proposed scheme has been improved by 6.52%, 9.33%, 14.77%, and 25.58% than that of the benchmark schemes.

Fig. 13 - Sum throughput vs. maximum transmission power.
Fig. 13

Sum throughput vs. maximum transmission power.

Figure 14 depicts the impact of variations in the SINR threshold on throughput and the compared with the benchmark algorithms. The proposed algorithm enhancement is visible once the SINR value surpasses the threshold. The increase in throughput becomes apparent as D2D users get access to higher numbers. The impact of SINR on throughput is evaluated by varying the threshold value of SINR. Higher the value of SINR, throughput gets better because we are increasing the signal strength. For instance, the sum throughput of the proposed scheme improved by 10.57%,17.12%,20.12%, and 27.29% than that of the benchmark schemes.

Fig. 14 - Sum throughput vs. threshold SINR.
Fig. 14

Sum throughput vs. threshold SINR.

SECTION 6

Conclusion

This paper investigates the challenges in D2D-based Social IoT Networks. One of the most significant challenges is the dynamic behavior of channel state conditions, which leads to substantial perturbation. A perturbation-based interference model is considered within the Social IoT framework. The problem is formulated with a focus on minimizing signaling overhead and maximizing sum-throughput for reliable D2D communication. The objective is to maximize sum throughput while mitigating the effects of perturbation in channel conditions. The perturbation impacts various parameters that are analyzed in this work. The formulated problem is an MINLP problem, which is non-convex in nature, making it challenging to solve directly. Therefore, the problem is addressed in two stages by decomposing it into subproblems: a tripartite graph-based resource allocation strategy is proposed in the first stage, followed by a time scaling-based power optimization approach in the next stage to maximize the network's sum throughput. The Lagrangian dual method is employed for optimal power consumption with minimal delay. Simulation results demonstrate that the proposed method effectively enhances the system's sum throughput while minimizing signaling overhead. A comprehensive theoretical analysis of various aspects of our proposed algorithms is conducted, thoroughly evaluating their advantages against state-of-the-art schemes. For algorithm validation, sum throughput is measured and found to improve by 21% to 93%, depending on variations in the length of the time slot, and by 17% to 66.67% with varying numbers of D2D users, compared to state-of-the-art schemes. The proposed approach may have applications in SIoT contexts such as home automation, smart classrooms, smart city, and intelligent transportation systems. Future work may involve developing models for social relationships with automated Internet of Vehicular Things (IoVT), aiming to minimize the Age of Information (AoI) to timely updates on the freshness of information of devices.

References

References is not available for this document.