Full-duplex Relaying for D2D Communication in mmWave …vincentw/J/MSMW-TWC-2018.pdfthe interference...

15
Full-duplex Relaying for D2D Communication in mmWave based 5G Networks Bojiang Ma, Hamed Shah-Mansouri Member, IEEE, and Vincent W.S. Wong, Fellow, IEEE Abstract—Device-to-device (D2D) communication, which can offload data from base stations by direct transmission between mobile devices, is a promising technology for the fifth generation (5G) wireless networks. However, the limited battery capacity of mobile devices is a barrier to fully exploit the benefits of D2D communication. Meanwhile, high data rate D2D communication is required to support the increasing traffic demand of emerging applications. In this paper, we study relay-assisted D2D com- munication in millimeter wave (mmWave) based 5G networks to address these issues. Multiple D2D user pairs are assisted by full- duplex relays that are equipped with directional antennas. To de- sign an efficient relay selection and power allocation scheme, we formulate a multi-objective combinatorial optimization problem, which balances the trade-off between total transmit power and system throughput. The problem is transformed into a weighted bipartite matching problem. We then propose a centralized relay selection and power allocation algorithm and prove that it can achieve a Pareto optimal solution in polynomial time. We further propose a distributed algorithm based on stable matching. Simulation results show that our proposed algorithms substantially reduce the total transmit power and improve the system throughput compared to two existing algorithms in the literature. Index Terms—Full-duplex relaying, D2D communication, multi-objective optimization, matching theory. I. I NTRODUCTION Device-to-device (D2D) communication, which is regarded as a promising technology for the fifth generation (5G) wire- less networks, allows mobile devices to communicate with each other directly. D2D communication can provide high data rate transmission and offload data traffic from cellular base stations [1]. Relays in D2D networks can further reduce the energy consumption of mobile devices, enhance the quality of data transmission, assist connection establishment among devices, and increase the range of D2D communication [2]. The recently developed full-duplex techniques allow relays to simultaneously transmit and receive signals by enabling Manuscript received on October 19, 2016; revised on April 4, 2017, September 20, 2017, and February 7, 2018; accepted March 25, 2018. This work was supported by the Natural Sciences and Engineering Research Council (NSERC) of Canada. The review of this paper was coordinated by Prof. Tarik Taleb and Prof. Guoliang Xue. Part of this paper was presented at the IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, May 2016. B. Ma is with Kwantlen Polytechnic University, Surrey, BC, Canada, V3W 2M8 (e-mail: [email protected]). H. Shah-Mansouri is with Vancosys Data Security Inc, Vancouver, Canada, V6B 2Y9 (email: [email protected]). V. W.S. Wong is with the Department of Electrical and Computer Engi- neering, The University of British Columbia, Vancouver, BC, Canada, V6T 1Z4 (e-mail: [email protected]). loop-interference cancellation. By using full-duplex relaying in D2D communication, where relays operate in full-duplex mode, the spectrum efficiency can be improved over traditional half-duplex relaying systems [3], [4]. Resource allocation in D2D networks has been widely studied in the literature [5]–[11]. Li et al. in [5] investigated uplink resource allocation for D2D networks. They proposed a scheme for transmission mode selection and resource sharing by formulating a coalition formation game. In [6], Wang et al. studied a joint channel and power allocation problem for D2D communication and proposed an iterative algorithm to optimize the energy efficiency. Qiao et al. in [7] proposed a resource sharing scheme to enable concurrent transmissions for D2D communication in millimeter wave (mmWave) wire- less networks. In [8], Nguyen et al. proposed fair scheduling policies to exploit spatial and frequency reuse in D2D-enabled cellular systems. Xing et al. in [9] proposed resource manage- ment algorithms to improve the spectrum efficiency of D2D communication in cellular networks. In [10], Sheng et al. pro- posed an iterative algorithm based on fractional programming and Lyapunov optimization to balance the trade-off between energy efficiency and delay in D2D communication. Zhang et al. in [11] studied the channel allocation problem by using hypergraph theory, where D2D users are allowed to share the uplink channels with cellular users. Several existing studies show that relaying can enhance the performance of D2D communication [12]–[16]. In [12], Shi et al. studied the energy-efficient spectrum sharing problem in D2D wireless networks. They proposed a mechanism for relay- assisted networks to optimize energy consumption and channel utilization. Hasan et al. studied a multi-user relay-assisted D2D network in [13] and formulated a robust optimiza- tion problem by considering the channel uncertainties. They showed that relay-assisted communication can improve the aggregate data rate. Wang et al. in [14] studied the feasibility of enabling full-duplex capability to D2D communication in heterogeneous networks. They provided solutions to address the interference mitigation issue in full-duplex D2D networks. In [15], Zhang et al. proposed a power allocation scheme which aims to maximize the data rate of D2D users in a relay-assisted D2D network underlaying the cellular system. Al-Hourani et al. in [16] derived a closed-form expression for energy saving geometrical zone where relaying is efficient. The aforementioned existing works reveal the benefits of using relays in D2D communication. Nevertheless, none of them jointly consider the importance of energy saving for battery- operated devices and system throughput for high data rate applications.

Transcript of Full-duplex Relaying for D2D Communication in mmWave …vincentw/J/MSMW-TWC-2018.pdfthe interference...

Page 1: Full-duplex Relaying for D2D Communication in mmWave …vincentw/J/MSMW-TWC-2018.pdfthe interference mitigation issue in full-duplex D2D networks. In [15], Zhang et al. proposed a

Full-duplex Relaying for D2D Communicationin mmWave based 5G Networks

Bojiang Ma, Hamed Shah-Mansouri Member, IEEE, and Vincent W.S. Wong, Fellow, IEEE

Abstract—Device-to-device (D2D) communication, which canoffload data from base stations by direct transmission betweenmobile devices, is a promising technology for the fifth generation(5G) wireless networks. However, the limited battery capacity ofmobile devices is a barrier to fully exploit the benefits of D2Dcommunication. Meanwhile, high data rate D2D communicationis required to support the increasing traffic demand of emergingapplications. In this paper, we study relay-assisted D2D com-munication in millimeter wave (mmWave) based 5G networks toaddress these issues. Multiple D2D user pairs are assisted by full-duplex relays that are equipped with directional antennas. To de-sign an efficient relay selection and power allocation scheme, weformulate a multi-objective combinatorial optimization problem,which balances the trade-off between total transmit power andsystem throughput. The problem is transformed into a weightedbipartite matching problem. We then propose a centralizedrelay selection and power allocation algorithm and prove thatit can achieve a Pareto optimal solution in polynomial time.We further propose a distributed algorithm based on stablematching. Simulation results show that our proposed algorithmssubstantially reduce the total transmit power and improve thesystem throughput compared to two existing algorithms in theliterature.

Index Terms—Full-duplex relaying, D2D communication,multi-objective optimization, matching theory.

I. INTRODUCTION

Device-to-device (D2D) communication, which is regardedas a promising technology for the fifth generation (5G) wire-less networks, allows mobile devices to communicate witheach other directly. D2D communication can provide high datarate transmission and offload data traffic from cellular basestations [1]. Relays in D2D networks can further reduce theenergy consumption of mobile devices, enhance the qualityof data transmission, assist connection establishment amongdevices, and increase the range of D2D communication [2].The recently developed full-duplex techniques allow relaysto simultaneously transmit and receive signals by enabling

Manuscript received on October 19, 2016; revised on April 4, 2017,September 20, 2017, and February 7, 2018; accepted March 25, 2018. Thiswork was supported by the Natural Sciences and Engineering ResearchCouncil (NSERC) of Canada. The review of this paper was coordinated byProf. Tarik Taleb and Prof. Guoliang Xue.

Part of this paper was presented at the IEEE International Conference onCommunications (ICC), Kuala Lumpur, Malaysia, May 2016.

B. Ma is with Kwantlen Polytechnic University, Surrey, BC, Canada, V3W2M8 (e-mail: [email protected]).

H. Shah-Mansouri is with Vancosys Data Security Inc, Vancouver, Canada,V6B 2Y9 (email: [email protected]).

V. W.S. Wong is with the Department of Electrical and Computer Engi-neering, The University of British Columbia, Vancouver, BC, Canada, V6T1Z4 (e-mail: [email protected]).

loop-interference cancellation. By using full-duplex relayingin D2D communication, where relays operate in full-duplexmode, the spectrum efficiency can be improved over traditionalhalf-duplex relaying systems [3], [4].

Resource allocation in D2D networks has been widelystudied in the literature [5]–[11]. Li et al. in [5] investigateduplink resource allocation for D2D networks. They proposed ascheme for transmission mode selection and resource sharingby formulating a coalition formation game. In [6], Wang etal. studied a joint channel and power allocation problem forD2D communication and proposed an iterative algorithm tooptimize the energy efficiency. Qiao et al. in [7] proposed aresource sharing scheme to enable concurrent transmissionsfor D2D communication in millimeter wave (mmWave) wire-less networks. In [8], Nguyen et al. proposed fair schedulingpolicies to exploit spatial and frequency reuse in D2D-enabledcellular systems. Xing et al. in [9] proposed resource manage-ment algorithms to improve the spectrum efficiency of D2Dcommunication in cellular networks. In [10], Sheng et al. pro-posed an iterative algorithm based on fractional programmingand Lyapunov optimization to balance the trade-off betweenenergy efficiency and delay in D2D communication. Zhang etal. in [11] studied the channel allocation problem by usinghypergraph theory, where D2D users are allowed to share theuplink channels with cellular users.

Several existing studies show that relaying can enhance theperformance of D2D communication [12]–[16]. In [12], Shiet al. studied the energy-efficient spectrum sharing problem inD2D wireless networks. They proposed a mechanism for relay-assisted networks to optimize energy consumption and channelutilization. Hasan et al. studied a multi-user relay-assistedD2D network in [13] and formulated a robust optimiza-tion problem by considering the channel uncertainties. Theyshowed that relay-assisted communication can improve theaggregate data rate. Wang et al. in [14] studied the feasibilityof enabling full-duplex capability to D2D communication inheterogeneous networks. They provided solutions to addressthe interference mitigation issue in full-duplex D2D networks.In [15], Zhang et al. proposed a power allocation schemewhich aims to maximize the data rate of D2D users in arelay-assisted D2D network underlaying the cellular system.Al-Hourani et al. in [16] derived a closed-form expression forenergy saving geometrical zone where relaying is efficient.The aforementioned existing works reveal the benefits of usingrelays in D2D communication. Nevertheless, none of themjointly consider the importance of energy saving for battery-operated devices and system throughput for high data rateapplications.

Page 2: Full-duplex Relaying for D2D Communication in mmWave …vincentw/J/MSMW-TWC-2018.pdfthe interference mitigation issue in full-duplex D2D networks. In [15], Zhang et al. proposed a

Similar resource allocation problems are studied in cog-nitive radio networks (CRNs). Gharehshiran et al. in [17]considered subchannel allocation for orthogonal frequency-division multiplexing (OFDM) based CRNs. Xu et al. in[18] proposed flexible cooperation schemes to coordinate theprimary and secondary users in orthogonal frequency-divisionmultiple access (OFDMA) based CRNs. In [19], Dadallageet al. formulated a joint beamforming, power, and channelallocation problem in CRNs. However, the aforementionedresource allocation problems in CRNs do not consider thecharacteristics of full-duplex relay-assisted D2D communica-tion with directional transmission [17]–[19]. Therefore, it isessential to utilize the distinct features of full-duplex relay-assisted communications to improve the system throughputand energy saving for D2D communication.

D2D communication, which can offload data from the basestation and utilize possible direct inter-device connections, ispromising for 5G systems. However, the limited battery ca-pacity of mobile devices and occasional poor link quality mayaffect the aforementioned benefits of D2D communication.Full-duplex relays with mmWave technology and directionaltransmission can save the power of mobile devices and im-prove the link quality and data rate. Furthermore, the relayselection schemes proposed for half-duplex relays may notbe efficient in full-duplex relay-assisted D2D communication,since loop-interference does not exist in half-duplex relayingsystems. Utilizing an efficient relay selection scheme designedfor full-duplex systems is essential to reduce the transmitpower of mobile devices, extend their battery lifetime, andincrease the data rate. Nonetheless, most of the existing works(e.g., [12]–[19]) do not consider the features of mmWave basedfull-duplex relaying in D2D communication.

In this paper, we study relay-assisted D2D communicationfor 5G wireless networks, where mobile devices transmit datausing directional antennas in mmWave frequency band. Weconsider that the relays have full-duplex capability, whileD2D users transmit in half-duplex mode. The relays canassist device discovery, connection establishment, and datatransmission for the potential D2D communication. We alsoconsider that loop-interference cannot be fully eliminated dueto imperfect self channel estimation and hardware constraints.

The contributions of this paper are as follows:• Full-duplex relaying in D2D communication: We design a

joint relay selection and power allocation scheme for full-duplex relay-assisted D2D communication in mmWavebased wireless networks. We formulate a multi-objectivecombinatorial optimization problem, which considers theimpact of loop-interference in full-duplex relaying sys-tems. The formulated problem aims to reduce the totaltransmit power and improve the system throughput whilesatisfying certain quality of service (QoS) requirementsand physical constraints.

• Low complexity centralized and distributed algorithmsbased on matching theory: We first transform the probleminto a one-to-one weighted bipartite matching problem.We then propose a centralized algorithm that solves thematching problem optimally in polynomial time. Weprove that the centralized algorithm achieves a Pareto

optimal solution of the multi-objective optimization prob-lem. Based on stable matching, we further propose adistributed algorithm, which has a lower informationexchange overhead than the centralized approach.

• Enhanced performance: Through extensive simulations,we evaluate the performance of our proposed algorithmsunder different network settings and compare them withexisting algorithms proposed in the literature. Simula-tion results illustrate the trade-off between total transmitpower and system throughput. Results also show that ourproposed algorithms improve the total transmit powerand system throughput substantially compared to thealgorithms proposed in [20] and [21].

We extend the work in [22] from several aspects. We im-prove the channel modeling by considering the possible non-line-of-sight (NLOS) communications. In [22], the objectiveis to minimize the power consumption. In this paper, we alsoconsider the system throughput as an important design goal.Different from the single-objective problem formulation in[22], our multi-objective optimization problem balances thetrade-off between total transmit power and system through-put. Our proposed centralized algorithm is proved to achievea Pareto optimal solution in polynomial time. We furtherpropose a distributed algorithm to reduce the informationexchange overhead compared to the centralized algorithm.

This paper is organized as follows. In Section II, we presentthe system model. In Section III, we formulate the jointrelay selection and power allocation problem and transformthe problem into a one-to-one weighted matching problem.We also propose the centralized and distributed algorithms inSection III. Simulation results are presented in Section IV.Conclusion is given in Section V. The key notations andvariables used in this paper are listed in Table I.

II. SYSTEM MODEL

We consider an mmWave cellular network with full-duplexrelay-assisted D2D communication as shown in Fig. 1. Full-duplex relays are deployed to assist D2D users1 who eithersuffer from poor direct link quality or require an extendedcommunication range. The base station sends control messagesthrough the control channel to D2D users and relays to coor-dinate the resource allocation process. We denote the set ofrelays as R. The sets of source and destination devices whichare assisted by relays are denoted as S and D, respectively,where S

⋂D = ∅. We further denote the set of source-

destination D2D user pairs as L. The ith source device si ∈ Sand the ith destination device di ∈ D form a source-destinationuser pair li = (si, di) ∈ L.

We assume that the base station, D2D users, and relaysare with the same service provider. The relays which assistD2D user pairs share parts of the channel resources that theservice provider owns, while those users that do not requireassistance from relays use different spectral resources. A relaycan assist multiple D2D communication pairs using differentchannels. Each relay is equipped with two sets of antennas that

1In the remaining parts of this paper, we use the terms “device” and “user”interchangeably.

Page 3: Full-duplex Relaying for D2D Communication in mmWave …vincentw/J/MSMW-TWC-2018.pdfthe interference mitigation issue in full-duplex D2D networks. In [15], Zhang et al. proposed a

TABLE ILIST OF KEY NOTATIONS AND VARIABLES.

Symbols MeaningB Bandwidth of each channelCli,rj Throughput of D2D user pair li assisted by relay rjCmin

liMinimum throughput requirement for D2D userpair li

D Set of destination devicesE Set of edgesF A matchingG Bipartite graphhi,j Channel gain between transmitter i and receiver jhLI Loop-interference channel gainL Set of source-destination user pairsL(z) Path loss functionN0 Background noise powerNrj Number of channels that relay rj can usePsi,rj transmit power of source device si to relay rjPrj ,di transmit power of relay rj to destination device diPmaxr Maximum transmit power of each relayPmaxs Maximum transmit power of a source device

Ps transmit power matrix of source devicesR Set of relaysRv Set of virtual relaysRv

liSet of virtual relays that D2D user pair li requests

S Set of source deviceswli,rj Weight of edge (li, rj)W Weighting matrix of the edgesWli Weighting vector of the feasible edges of D2D

user pair lixli,rj Relay selection indicator for user pair li and

relay rjX Relay selection matrixλ1 Non-negative coefficient for total transmit powerλ2 Non-negative coefficient for system throughput

enable full-duplex operation. Decode-and-forward protocol isemployed by the relays. As discussed in 3GPP specification[23, pp. 10] and related studies [24]–[26], each D2D user pairis assigned a non-overlapping orthogonal channel in dedicatedmode, where interference among users is avoided. In thispaper, the D2D user pairs communicate in dedicated modeand are allocated non-overlapping orthogonal channels.

A. Channel Model

Recently, over 10 GHz of spectrum above 24 GHz has beenmade available by the Federal Communications Commission(FCC) for 5G wireless communications [27]. One of themmWave frequency bands is the 38 GHz band [27]–[29].We consider a relay-assisted D2D communication system thatoperates on the frequency of 38 GHz. This band is selectedbased on its signal propagation feature and licensing issue. Thechannel model of mmWave communication is different fromthe current cellular channel model. One important differenceis that mmWave communications require directional antennas.We adopt the channel model introduced in [30] and considerthe impact of blockage and reflections for both line-of-sight(LOS) and NLOS cases. If the LOS is blocked, we considerpotential NLOS communications due to reflections [31], [32].Let z denote the distance between the transmitter and receiver.

Fig. 1. An mmWave based D2D network with full-duplex relays anddirectional transmissions. D2D user pairs can choose whether or not to usefull-duplex relays. The base station coordinates the resource allocation in thenetwork.

The path loss function L(z) in dB is

L(z) =

LLOS(z0) + 10αLOS log(z) + ZσLOS ,

if LOS exists,LNLOS(z0) + 10αNLOS log(z) + ZσNLOS ,

if LOS is blocked,

(1)

where LLOS(z0) and LNLOS(z0) are the free-space path loss atreference distance z0 for LOS and NLOS signals, respectively.Moreover, αLOS and αNLOS are the path loss exponents for LOSand NLOS cases, and ZσLOS and ZσNLOS are zero-mean Gaus-sian random variables with standard deviations σLOS and σNLOS

that model the shadowing effects of LOS and NLOS environ-ments, respectively. Channel estimation is used to determinethe aforementioned parameters. The transmitter and receiverperform channel estimation periodically via transmitting andanalyzing orthogonal pilot sequences [33].

In mmWave technology, directional antenna is used toimprove the antenna gain. A sectored directional transmittingantenna model is proposed in [34]. We use this sectoredantenna model, where the antennas achieve a constant highgain in the main lobe and a constant low gain in the sidelobe. Let Θt represent the angle of departure of signals. Thetransmitting antenna gain is given as follows:

Gt(Θt) =

M t, 0 ≤ Θt ≤ Θt

HPBW,

mt, ΘtHPBW < Θt ≤ 180,

(2)

where M t,mt, and ΘtHPBW are the main lobe gain, side lobe

gain, and half power beamwidth for the transmitting antenna,respectively. Similarly, let Θr represent the angle of arrival ofsignals. The receiving antenna gain is given as follows:

Gr(Θr) =

Mr, 0 ≤ Θr ≤ Θr

HPBW,

mr, ΘrHPBW < Θr ≤ 180,

(3)

where Mr,mr, and ΘrHPBW are the main lobe gain, side lobe

gain, and half power beamwidth for the receiving antenna,respectively. The antenna gain between devices i and j isdenoted as Gi,j = Gt(Θt

i,j)Gr(Θr

j,i), where Θti,j is the angle

of departure of signal from transmitter i to receiver j, andΘrj,i is the angle of arrival of signal in receiver j sent from

transmitter i. If i and j belong to a pair of communicating

Page 4: Full-duplex Relaying for D2D Communication in mmWave …vincentw/J/MSMW-TWC-2018.pdfthe interference mitigation issue in full-duplex D2D networks. In [15], Zhang et al. proposed a

devices, Θti,j and Θr

j,i are both 0o, since we assume thetransmitting and receiving antennas are accurately aligned.The total gain (including channel and antenna gains) betweendevices i and j can be represented as hi,j = Gi,j/L(zi,j),where zi,j is the distance between the corresponding devices.

B. Throughput of a User Pair

To obtain the throughput of a user pair, we need to deter-mine the signal-to-interference plus noise ratio (SINR) in eachhop of the relayed communication. For user pair li = (si, di)which is assisted by relay rj , we denote Psi,rj as the transmitpower of source device si to relay rj . We denote the transmitpower of relay rj to destination device di as Prj ,di . The SINRfrom source si to relay rj is

SINRsi,rj =hsi,rjPsi,rj

hLIPrj ,di +N0, (4)

where hLIPrj ,di represents the loop-interference received byfull-duplex relay rj and N0 is the noise power. Similar to [15],[35], [36], we use the loop-interference channel gain hLI todetermine the loop-interference power received by the full-duplex relay. The channel gain hLI is defined as the ratiobetween the received loop-interference power and transmitpower of the full-duplex relay. It characterizes the result ofpower leakage from the transmitter of the full-duplex relayto its receiver due to imperfect loop-interference cancellation.The mutual interference among different user pairs is avoidedsince each user pair is allocated an orthogonal channel. TheSINR from relay rj to destination device di is

SINRrj ,di =hrj ,diPrj ,di

hsi,diPsi,rj +N0, (5)

where hsi,diPsi,rj is the interference induced by source devicesi. Note that both the source-to-relay SINR and relay-to-destination SINR have included the effects of directional trans-mission and possible NLOS due to reflection in mmWave com-munications. In a full-duplex relaying system using decode-and-forward protocol, the throughput of user pair li ∈ Lassisted by relay rj ∈ R can be obtained from [35]

Bmin(log2(1 + SINRsi,rj ), log2(1 + SINRrj ,di)

), (6)

where B is the bandwidth of each channel.

III. PROBLEM FORMULATION

In this section, we formulate a joint relay selection andpower allocation problem by taking both the total transmitpower and the system throughput into consideration. This ismotivated from the fact that the limited battery capacity of mo-bile devices requires a low transmit power, while applicationssuch as video sharing require a high throughput data trans-mission. Our objective is to minimize the total transmit powerand simultaneously maximize the system throughput of theD2D network. We formulate the problem as a multi-objectiveoptimization problem to consider both of the aforementionedfactors. We consider the impact of loop-interference in full-duplex relaying systems and derive a closed-form expressionof the throughput of a user pair. Note that for full-duplex

relays, a higher transmit power of a relay increases the receivedpower in the destination device of D2D user pairs. However, italso induces a higher loop-interference at the same time. Thismeans that transmitting with full power does not necessarilyincrease the throughput. According to (6), the throughput ofa user pair assisted by a relay is the minimum throughputof the source-to-relay and relay-to-destination links. Thus, thetransmit power of the source device is wasted if the source-to-relay throughput is greater than the relay-to-destinationthroughput. The same situation holds regarding the transmitpower of the relays. In other words, the power of a full-duplexrelay can be adjusted according to the allocated transmit powerof the source devices. The source-to-relay throughput shouldbe equal to the relay-to-destination throughput in order to savetransmit power [36], [37]. This helps us to obtain a closed-form expression for the source-to-destination throughput. Con-sider D2D user pair li = (si, di) ∈ L and relay rj ∈ R, theabove condition implies that SINRsi,rj = SINRrj ,di . In thiscase, from (4) and (5), Prj ,di can be expressed as a functionof Psi,rj as follows:

Prj ,di(Psi,rj ) =

√frj ,di(Psi,rj ) +N2

0h2rj ,di−N0hrj ,di

2hLIhrj ,di,

(7)where

frj ,di(Psi,rj )

= 4hsi,rjhLIhrj ,dihsi,di + 4N0hsi,rjhLIhrj ,diPsi,rj .(8)

Therefore, when we substitute (5) and (7) into (6), the through-put of user pair li ∈ L assisted by relay rj ∈ R can beexpressed as follows:

Cli,rj (Psi,rj ) = B log2

(1 +

hrj ,diPrj ,di(Psi,rj )

hsi,diPsi,rj +N0

). (9)

To introduce our objectives, we consider the transmit powerof mobile devices. Since the relays are plugged into thepower source and have sufficient power supply, the objectiveis to minimize the total transmit power of the transmittingD2D devices by selecting relays efficiently. We denote Ps =(Psi,rj )si∈S,rj∈R as the transmit power matrix. The totaltransmit power can be represented as:

f1(Ps) =∑si∈S

∑rj∈R

Psi,rj . (10)

Another important design objective is to maximize thesystem throughput. Maximizing the system throughput isequivalent to minimizing the following function:

f2(Ps) = −∑li∈L

∑rj∈R

Cli,rj (Psi,rj ). (11)

We should note that different power consumption modelswill result in different trade-off between transmit power andthroughput. However, our proposed mechanism is applicableto general power consumption models. We will later addressthe trade-off between transmit power and throughput whenformulating the multi-objective optimization problem.

Both design objectives in (10) and (11) are important. Asingle-objective formulation that solely considers either (10)

Page 5: Full-duplex Relaying for D2D Communication in mmWave …vincentw/J/MSMW-TWC-2018.pdfthe interference mitigation issue in full-duplex D2D networks. In [15], Zhang et al. proposed a

or (11) is insufficient to capture the complete design goals ofthe system. However, these objectives are conflicting in thesense that a higher throughput may result in a higher transmitpower. This fact motivates us to formulate a multi-objectiveproblem, which considers both objectives simultaneously.

To formulate the multi-objective optimization problem, weintroduce the QoS requirements for different applications aswell as the physical constraints of the devices and relays.We denote Cmin

lias the minimum throughput requirement for

D2D user pair li. To guarantee that the minimum data raterequirement is satisfied for each D2D user pair, we introducethe following constraint:∑

rj∈RCli,rj (Psi,rj ) ≥ Cmin

li , ∀ li = (si, di) ∈ L. (12)

We define matrix X = (xli,rj )li∈L,rj∈R to indicate the relayselection for the user pairs, where binary variable xli,rj = 1 ifuser pair li selects relay rj . Otherwise, xli,rj = 0. Then, thefollowing constraint ensures that each user pair can be assistedby only one relay.∑

rj∈Rxli,rj = 1, ∀ li ∈ L. (13)

Furthermore, the number of D2D user pairs assisted by relayrj should be less than or equal to the number of channels thatrj can use. Let Nrj denote the number of channels in relayrj . We have ∑

li∈L

xli,rj ≤ Nrj , ∀ rj ∈ R. (14)

We denote Pmaxs as the maximum transmit power of each

mobile device, and Pmaxr as the maximum transmit power

of each relay. To ensure the transmit powers of mobiledevices and relays do not exceed the maximum transmit powerallowed, we introduce the following constraints:

0 ≤ Psi,rj ≤ xli,rjPmaxs ,∀ li = (si, di) ∈ L, rj ∈ R, (15)

0 ≤ Prj ,di(Psi,rj ) ≤ xli,rjPmaxr ,∀ li = (si, di) ∈ L, rj ∈ R.

(16)Notice that since Psi,rj ≥ 0, Prj ,di(Psi,rj ) is alwaysnon-negative. Let P−1rj ,di

(·) denote the inverse of functionPrj ,di(Psi,rj ). Since Prj ,di(Psi,rj ), given in (7), is strictlyincreasing, the inverse function always exists. Thus, from (16),we have

0 ≤ Psi,rj ≤ P−1rj ,di(xli,rjP

maxr ),∀ li = (si, di) ∈ L, rj ∈ R.

(17)When xli,rj = 1, P−1rj ,di

(xli,rjPmaxr ) = P−1rj ,di

(Pmaxr ), while

Psi,rj = 0 when xli,rj = 0. Therefore, inequality (17) can berewritten as:

0 ≤ Psi,rj ≤ xli,rjP−1rj ,di(Pmaxr ),∀ li = (si, di) ∈ L, rj ∈ R.

(18)Consequently, constraint (16) is equivalent to the followingconstraint:

0 ≤ Psi,rj ≤ xli,rj Pmaxs ,∀ li = (si, di) ∈ L, rj ∈ R,

(19)

where constant

Pmaxs = P−1rj ,di

(Pmaxr ). (20)

By combining (15) and (19), we have

0 ≤ Psi,rj ≤ xli,rj min(Pmaxs , Pmax

s

),

∀ li = (si, di) ∈ L, rj ∈ R.(21)

Then, the multi-objective relay selection and power allocationproblem can be formulated as:

minimizeX,Ps

F (Ps) =(f1(Ps), f2(Ps)

)T(22a)

subject to xli,rj ∈ 0, 1, ∀ li ∈ L, rj ∈ R, (22b)constraints (12)− (14), and (21).

Problem (22) is a multi-objective combinatorial optimizationproblem. The weighted sum approach is commonly used totransform a multi-objective optimization problem into a scalaroptimization problem [38]. Note that in problem (22), wetake the impact of the loop-interference channel gain intoconsideration when introducing constraints (12) and (21). Inaddition, the directional antenna gain and channel gain formmWave communications are incorporated in the data rate inconstraint (12).

A. Reformulation Using the Weighted Sum MethodIn this subsection, we reformulate problem (22) using the

weighted sum method. The weighted sum approach considersa linear combination of all design objectives and is commonlyused in solving multi-objective optimization problems [39].Pareto optimality is an important solution concept for themulti-objective optimization problems. An outcome is Paretooptimal when a single design objective (e.g, f1(Ps)) cannot beimproved without degrading the other objective (e.g, f2(Ps)).Problem (22), which considers both total transmit power andsystem throughput, can be reformulated as a weighted sumproblem. The Pareto optimal solution of problem (22) can beobtained by solving the following problem:

minimizeX,Ps

λ1f1(Ps) + λ2f2(Ps) (23)

subject to constraints (12)− (14), (21), and (22b),

where λ1 and λ2 are non-negative coefficients to adjust theweights of objectives f1 and f2. For example, if λ1 = 1, λ2 =0, problem (23) minimizes the total transmit power. Bychanging the value of λ1 and λ2, different Pareto optima canbe obtained. Problem (23) can be solved using methods suchas branch-and-bound, generalized Benders decomposition, orouter approximation. However, none of the aforementionedmethods can guarantee to obtain the solution in polynomialtime. In the next subsection, we transform the multi-objectivecombinatorial optimization problem into a matching problem[40] to obtain the Pareto optimal solution. We then propose aPareto optimal relay selection and power allocation algorithm.

B. Bipartite Graph ConstructionMatching theory can provide tractable solutions for com-

binatorial problems. For resource allocation in wireless net-

Page 6: Full-duplex Relaying for D2D Communication in mmWave …vincentw/J/MSMW-TWC-2018.pdfthe interference mitigation issue in full-duplex D2D networks. In [15], Zhang et al. proposed a

Fig. 2. (a) A bipartite graph with four D2D user pairs and three relays. (b) A matching example with four edges (l1, r2), (l2, r1), (l3, r2), and (l4, r3). (c)The one-to-one matching with virtual relays in dashed frames.

works, matching theory can address how resources can beallocated to users [40]. Users and resources are consideredas vertices in disjoint sets that will be matched to each other.In this paper, we regard vertex sets as the set of D2D userpairs L and the set of relays R. We consider all possiblerelay selections as different matchings. The goal is to find thebest matching (i.e., relay selection) between D2D user pairsand relays, which results in the optimal solution of problem(23) and is also the Pareto optimal solution of problem (22).To achieve this goal, we construct a bipartite graph, whichconsists two disjoint vertex sets and edges, as shown in Fig.2(a). A matching is represented by a set of distinct edges.We use tuple (li, rj) to denote the edge that connects D2Duser pair li with relay rj . For instance, as shown in Fig.2(b), the graph with four solid edges (l1, r2), (l2, r1), (l3, r2),and (l4, r3) corresponds to a matching example. A weightis allocated to each edge of the graph. The purpose ofconstructing the weighted graph is to transform problem (23)into an equivalent matching problem. Thus, we will determinethe weight of each edge in order to achieve this goal. Wealso define the minimum weighted matching as a matchingwhere the sum of the weights of those edges selected inthe matching has the minimum value. We then obtain theminimum weighted matching, from which we can determinethe optimal solution of problem (23).

To determine the weight of each edge in the graph, wefirst introduce the matching rules. These rules guarantee thatthe optimal matching is within the feasible region of problem(23). By considering constraint (13), only a single edge can beconnected with a D2D user pair in the matching. Meanwhile,we allow at most Nrj edges to be connected with relay rj ∈ Rin order to satisfy constraint (14). Constraints (13) and (14)indicate that the equivalent matching problem is a many-to-one matching. We further consider (12) and (21) which arerelated to the transmit power variables. According to (13), eachD2D user pair can only be assisted by one relay. We assumethat D2D user pair li is assisted by relay rj (i.e., xli,rj =1, xli,rk = 0, ∀rk ∈ R \ rj). If there exists a transmitpower Psi,rj that satisfies both of the following inequalities:

Cli,rj (Psi,rj ) ≥ Cminli , (24)

and0 ≤ Psi,rj ≤ min

(Pmaxs , Pmax

s

), (25)

then Psi,rj is in the feasible region determined by constraints(12) and (21), and rj is a feasible relay for D2D user pair li.Otherwise, we regard relay rj as an infeasible relay. That is,D2D user pair li will not use relay rj . In this case, infeasiblerelay rj is excluded from the consideration of D2D user pairli, and edge (li, rj) will not be selected in the matching. Bydoing so, the optimal matching will be in the feasible regionof problem (23) and satisfies all of its constraints.

To find the feasible relays for a D2D user pair, we firstconsider (24) and (25). By substituting (9) into (24), we have

B log2

(1 +

hrj ,diPrj ,di(Psi,rj )

hsi,diPsi,rj +N0

)≥ Cmin

li , (26)

which can be rewritten ashrj ,diPrj ,di(Psi,rj )

hsi,diPsi,rj +N0≥ 2(C

minli/B) − 1. (27)

Then, by substituting (7) into (27), we obtain√frj ,di(Psi,rj ) +N2

0h2rj ,di−N0hrj ,di

2hLI(hsi,diPsi,rj +N0)≥ 2(C

minli/B) − 1.

(28)The left-hand side of (28) is an increasing function of Psi,rj .When relay rj is selected to assist user pair li, we can find theminimum transmit power of source device si. To achieve theminimum data rate requirement Cmin

li, the minimum transmit

power of source device si with assistance of relay rj , denotedby Pmin

si,rj , can be obtained from (28). We have

Pminsi,rj

,hLIN0

(2(C

minli/B) − 1

)2+N0hrj ,di

(2(C

minli/B) − 1

)hsi,rjhrj ,di − hLIhsi,di

(2(Cminli/B) − 1

)2 .

(29)From (25), we can determine the maximum transmit power ofsource si to relay rj denoted by Pmax

si,rj , where

Pmaxsi,rj , min

(Pmaxs , Pmax

s

). (30)

Page 7: Full-duplex Relaying for D2D Communication in mmWave …vincentw/J/MSMW-TWC-2018.pdfthe interference mitigation issue in full-duplex D2D networks. In [15], Zhang et al. proposed a

If Pminsi,rj > Pmax

si,rj , there is no feasible transmit power thatsatisfies both (24) and (25). In this case, relay rj is aninfeasible relay for D2D user pair li and edge (li, rj) isan infeasible edge in the graph. In order to exclude suchinfeasible edge, we set its weight to +∞ so that the edgewill not be considered when using the minimum weightedmatching method. After excluding all infeasible edges fromconsideration, the remaining edges are the feasible relays forthe corresponding D2D user pairs.

We now determine the weight of each feasible edge in thegraph. We assume rj is a feasible relay for D2D user pair li(i.e, Pmin

si,rj ≤ Pmaxsi,rj ). We denote the weight of edge (li, rj) by

w(li, rj), where li = (si, di) ∈ L, rj ∈ R. To determinew(li, rj), we assume that only D2D user pair li and itsfeasible relay rj exist in the network. In this case, the bipartitegraph only has one edge (i.e., edge (li, rj)). This assumptionimplies that xli,rj = 1, xlm,rn = 0 and Psm,rn = 0 forall (lm, rn) 6= (li, rj), lm = (sm, dm) ∈ L, rn ∈ R. Wecan obtain the optimal transmit power of source device siby solving the following problem:

minimizePsi,rj

λ1Psi,rj − λ2Cli,rj (Psi,rj ) (31a)

subject to Pminsi,rj ≤ Psi,rj ≤ P

maxsi,rj . (31b)

For a particular edge (li, rj), the weight w(li, rj) is determinedby the optimal value of problem (31). We will later show thatsolving problem (23) is equivalent to finding the minimumweighted matching, where the sum of the weights of the edgesselected in the matching has the minimum value. Let P ∗si,rjdenote the optimal solution of problem (31) that uniquelyexists due to the following theorem.

Theorem 1. Problem (31) is a strictly convex optimizationproblem, which has a unique optimal solution.

The proof of Theorem 1 is given in the Appendix.Thus, the optimal solution P ∗si,rj , which represents the

optimal power of D2D user pair li = (si, di) assisted byrelay rj , can be obtained by using techniques such as interior-point method. Once P ∗si,rj has been obtained, the optimalthroughput, denoted by C∗li,rj = Cli,rj (P

∗si,rj ), can be found

as well. We can then compute the weight of edge (li, rj), whenwe assume that user pair li is assisted by relay rj . The weightof edge (li, rj) is set to gli,rj (P

∗si,rj ) = λ1P

∗si,rj − λ2C

∗li,rj

.Given a matching, the resource allocation matrix X is

fixed and the constraints of problem (23) are all satisfied. Forexample, in the matching shown in Fig. 2(b) that includesedges (l1, r2), (l2, r1), (l3, r2), and (l4, r3), we have xl1,r2 =xl2,r1 = xl3,r2 = xl4,r1 = 1. Let F denote a matching and Edenote the set of all edges of the bipartite graph. For matchingF ⊆ E , we show that the minimum weighted sum of transmitpower and throughput is equivalent to the summation of theweights of all edges in the matching. To do so, we formulatethe following problem which minimizes the weighted sum oftransmit power and throughput for matching F :

minimizePs

λ1∑

(li,rj)∈F

Psi,rj − λ2∑

(li,rj)∈F

Cli,rj (Psi,rj )

(32a)

subject to Pminsi,rj ≤ Psi,rj ≤ P

maxsi,rj , ∀ (li, rj) ∈ F , (32b)

where li = (si, di). Since λ1 and λ2 are constants, theobjective function is equal to∑

(li,rj)∈F

(λ1Psi,rj − λ2Cli,rj (Psi,rj )

)=

∑(li,rj)∈F

gli,rj (Psi,rj ). (33)

The objective of problem (32) is to minimize the summation ofall user pairs’ weighted sum for a given matching. Accordingto (32) and (33), the optimal transmit power of each sourcedevice is independent from others when we know the match-ing. Therefore, given matching F , for each edge (li, rj) ∈ F ,we can obtain the optimal transmit power of source device si,denoted by P ∗si,rj , by solving problem (31). The optimal valueof problem (31) for edge (li, rj) is gli,rj (P

∗si,rj ). Thus, given

matching F , the optimal value of problem (32) is∑(li,rj)∈F

gli,rj (P∗si,rj ). (34)

Notice that wli,rj = gli,rj (P∗si,rj ),∀ (li, rj) ∈ F . Thus, the

optimal value of problem (32) can also be represented as∑(li,rj)∈F wli,rj , which is the summation of the weights of all

edges in matching F . Up to now, given a matching, we haveshown that the minimum weighted sum of transmit power andthroughput equals to the summation of the weights of all edgesin the matching.

We now focus on finding the optimal matching (i.e.,minimum weighted matching). We construct bipartite graphG = (L,R, E ,W ), where D2D user pair set L and relay setR are the sets of vertices, and W = (wli,rj )li∈L,rj∈R isthe weighting matrix of the edges. The minimum weightedmatching can be obtained as follows:

F∗ = arg minF⊆E

∑(li,rj)∈F

wli,rj . (35)

By constructing the bipartite graph, we have transformed thecombinatorial relay selection and power allocation probleminto a many-to-one matching problem. However, it is stilldifficult to obtain the optimal solution for this many-to-onematching problem in an efficient manner. Although eachrelay can assist multiple D2D user pairs, each user pair isallocated a non-overlapping channel. By utilizing this feature,we can further transform the many-to-one matching probleminto a one-to-one matching problem which can be solvedoptimally in polynomial time. Since each relay rj has Nrjchannels, we replace rj with Nrj virtual relays, which arelocated at the same location. Each virtual relay is assigneda non-overlapping channel, as shown in Fig. 2(c). We userjk to represent the virtual relay that operates on the kth

channel of relay rj . We denote the set of virtual relaysas Rv = r11, · · · , r1Nr1 , · · · r|R|1, · · · , r|R|Nr|R|

, whichrepresents a new vertex set. For ease of exposition, we denotervj as the jth virtual relay in set Rv . We denote the new setof edges as Ev and the new weighting matrix as W v . Bydoing so, we transform the many-to-one matching problem

Page 8: Full-duplex Relaying for D2D Communication in mmWave …vincentw/J/MSMW-TWC-2018.pdfthe interference mitigation issue in full-duplex D2D networks. In [15], Zhang et al. proposed a

into a one-to-one matching problem denoted by a new bipartitegraph Gv = (L,Rv, Ev,W v). Note that one-to-one matchingproblems can be solved in polynomial time [41, Ch. 3].

C. Pareto Optimal Relay Selection

Up to now, we have constructed the bipartite graph to obtaina solution of problem (23) using a one-to-one matching. Inthe following, we prove that the obtained solution is a Paretooptimal resource allocation in terms of total transmit powerand system throughput. We first formally define the Paretooptimal resource allocation in Definition 2 with the help ofDefinition 1 [42, Ch. 1]:

Definition 1. In a minimization problem, given resourceallocation decision matrices A and A′, the allocation out-come

(f1(A), f2(A)

)is dominated by

(f1(A′), f2(A′)

)if

f1(A′) ≤ f1(A), f2(A′) ≤ f2(A) and(f1(A), f2(A)

)6=(

f1(A′), f2(A′)).

Definition 2. A resource allocation decision A is Paretooptimal if and only if there does not exist another resourceallocation A′ dominating A.

Based on the definition of Pareto optimal resource alloca-tion, we have the following theorem.

Theorem 2. The solution of problem (23), denoted by(X∗,P ∗s ), is a Pareto optimal resource allocation.

Proof. Assume (X∗,P ∗s ) is the solution of problem (23) andis not Pareto optimal. Then, there exists an allocation (X, Ps)

such that f1(Ps) ≤ f1(P ∗s ) and f2(Ps) ≤ f2(P ∗s ). Givenλ1 and λ2, we have λ1f1(Ps) + λ2f2(Ps) ≤ λ1f1(P ∗s ) +λ2f2(P ∗s ). This means that (X∗,P ∗s ) is not the optimalsolution of problem (23). Here, we have the contradictionwhich completes the proof.

D. Algorithm Design

In this subsection, we develop the centralized and distributedalgorithms.

1) Centralized Relay Selection and Power Allocation Al-gorithm: We first propose a centralized relay selection andpower allocation algorithm as shown in Algorithm 1 based onthe Hungarian method [43] to solve the one-to-one matchingproblem. As proven in Theorem 2, our proposed algorithmachieves a Pareto optimal solution of problem (23). We de-fine Xv∗ as the optimal virtual relay selection matrix. Thealgorithm contains two main steps. As shown in Algorithm1, we first create the weighted bipartite graph by computingthe weights of all edges in the graph (Lines 2 to 16). Bycomputing the minimum value of the weighted sum of transmitpower and minus throughput, we obtain the weight of eachedge (Line 7). If the minimum data rate requirement cannotbe satisfied, we set the corresponding weight to +∞ (Line9). Since the Hungarian algorithm used in this algorithm is tofind the minimum sum of all weights, those edges with weight+∞ will not be considered in the Hungarian algorithm (i.e.,Algorithm 2). Thus, we exclude the virtual relays which wouldresult in an infeasible solution for the corresponding D2D user

Algorithm 1: Centralized relay selection and power allo-cation algorithm

1 input L, S, D, Rv , Cminli, ∀li ∈ L, Pmax

s , Pmaxr , λ1, λ2, hLI ,

hsi,rj , hrj ,di , hsi,di ∀ li = (si, di) ∈ L, rj ∈ R2 for li ∈ L do3 for rvj ∈ Rv do4 Calculate Pmin

si,rvj

and Pmaxsi,r

vj

using (29) and (30)

5 if Pminsi,r

vj≤ Pmax

si,rvj

then6 Solve problem (31) to obtain P ∗si,rvj7 wv

li,rvj:= λ1P

∗si,r

vj− λ2C

∗li,r

vj(P ∗si,rvj )

8 else9 wv

li,rvj:= +∞

10 end11 end12 if Pmin

si,rvj> Pmax

si,rvj∀ rvj ∈ Rv then

13 Return infeasible14 end15 end16 W v := (wli,r

vj)li∈L,rvj ∈R

v

17 Xv∗ := Hungarian(W v)18 output: Virtual relay selection decision Xv∗, and transmit

power matrix P ∗s .

pairs. If the minimum data rate requirement for a user paircannot be satisfied regardless of which virtual relay the userpair uses (Line 12), this user pair will have to communicateusing the cellular base station (instead of D2D mode) andoperate under the resource allocation rules for regular cellularusers. If the minimum data rate requirement can be satisfied,then the Hungarian method is used to obtain the optimal virtualrelay selection matrix Xv∗ (Line 17).

The optimal matching that minimizes the summation of theweights can be obtained by the Hungarian method [43]. Forthe sake of completeness, we present the Hungarian methodin Algorithm 2. We use z∗ = (z∗l1 , · · · , z

∗li, · · · , z∗l|L|

) toindicate the current matching result. For example, z∗l3 = rv5means that user pair l3 is matched with virtual relay rv5 . Wedefine m = (mli,rvj

)li∈L,rvj∈Rv

as a marking indicator of the

edges of the bipartite graph (i.e., the elements of W v). Thisindicator is used to mark the element that has the minimumweight. The edge corresponding to the marked element isregarded as a potential edge in the optimal matching. Elementwli,rvj is marked when mli,rvj

is set to 1. If mli,rvj= 0,

element wli,rvj is not marked. We define cr = (crli)li∈L andcc = (ccrvj )

rvj∈Rvas the row cover indicator and column

cover indicator, respectively. The purpose of covering a row(or a column) is to exclude the elements of that row (orcolumn) from further operations. For example, row i of theweighting matrix W v is covered and excluded from operationsif crli = 1. The main steps of the algorithm are as follows.First, the minimum value of each row of W v is subtractedfrom all elements in its row (Lines 3 to 5). Then, zeros in themodified matrix W v are found and their indices are recordedin z∗ (Lines 6 to 10). Next, the algorithm verifies whetherall user pairs and virtual relays are matched by checking thenumber of zeros in z∗ (Lines 15 to 17). If there is no zeroin z∗, the matching is obtained. Otherwise, the weighting

Page 9: Full-duplex Relaying for D2D Communication in mmWave …vincentw/J/MSMW-TWC-2018.pdfthe interference mitigation issue in full-duplex D2D networks. In [15], Zhang et al. proposed a

Algorithm 2: Hungarian method1 input Weighting matrix W v

2 initialize z∗ = (z∗li)li∈L := 01×|L|,Xv∗ = (x∗li,rvj )li∈L,rvj ∈Rv

:= 0|L|×|Rv|,

m = (mli,rvj)li∈L,rvj ∈R

v:= 0|L|×|Rv|, A := L, and

B := Rv ,3 for li ∈ L do4 Set wli,r

vj:= wli,r

vj− min

rvk∈Rvwli,r

vk, ∀ rvk ∈ Rv

5 end6 while A 6= ∅ do7 Set z∗li := rvj , ∀ li ∈ A, rvj ∈ B, such that wli,r

vj= 0

8 Set A := A \ li9 Set B := B \ rvj

10 end11 while true do12 Set cr = (crli)li∈L := 01×|L|13 Set cc = (ccrvj )rvj ∈Rv

:= 01×|Rv|14 Set crli := 1, ∀ li ∈ L, such that z∗li > 015 if z∗li 6= 0 ∀ li ∈ L then16 Break17 end18 while true do19 Set mli,r

vj:= 1 ∀ li ∈ L, rvj ∈ Rv , such that

ccrvj = 0 and wli,rvj= 0

20 if @ (li, rvj ) ∀ li ∈ L, rvj ∈ Rv , such that

mli,rvj= 1, crli = 0, and wli,r

vj= 0 then

21 Break22 else23 Set crli := 1, ccrvj := 0 ∀ li ∈ L, rvj ∈ Rv , such

that mli,rvj= 1, crli = 0, and wli,r

vj= 0

24 end25 Set J := (li, rvj ) ∈ L ×Rv | crli = ccrvj = 026 Set a := min

(li,rvj )∈J

wli,rvj

27 Update wli,rvj:= wli,r

vj+ a ∀ li ∈ L, such that

crli = 028 Update wli,r

vj:= wli,r

vj− a ∀ rvj ∈ Rv , such that

ccrvj = 0

29 end30 Set z∗li := rvj ∀ li ∈ L, rvj ∈ Rv , such that wli,r

vj= 0,

mli,rvj= 1, and crli = ccrvj = 0

31 end32 for li ∈ L do33 Set x∗li,rvj := 1 ∀ rvj ∈ Rv , such that z∗li = rvj34 end35 output: Virtual relay selection decision Xv∗

matrix is updated according to the mark indicator m andcover indicators cr and cc (Lines 18 to 29). Specifically, theminimum uncovered element is subtracted from each coveredrow, and then added to each uncovered column. By doingso, new zeros will be resulted. The algorithm then finds andrecords the indices of the new zeros (Line 30) and runs thewhile loop (Lines 11 and 31) again. If z∗ has no zeros, therecorded indices will be returned as the matching results of thealgorithm (Lines 32 to 34). The convergence of the Hungarianmethod is proven in [43].

We now discuss the computational complexity of Algorithm1. The computational complexity of the Hungarian method isO(|L|3) [41]. The complexity of computing the weights of

Algorithm 3: Distributed relay selection and power allo-cation algorithm

1 input L, S, D, Rv , Cminli,Rv

li, ∀li ∈ L, Pmax

s , Pmaxr , λ1, λ2,

hLI , hsi,di ∀ li = (si, di) ∈ L2 for li ∈ L do3 D2D user pair li sends relay request. Relays that receive

the request join set Rvli

.4 for rvj ∈ Rv

lido

5 Relay rvj estimates hsi,rvj

, hrvj ,di, ∀ li = (si, di) ∈ L.

6 end7 end8 for li ∈ L do9 for rvj ∈ Rv

lido

10 Relay rvj calculates Pminsi,r

vj

and Pmaxsi,r

vj

using (29) and(30)

11 if Pminsi,r

vj≤ Pmax

si,rvj

then12 Solve problem (31) to obtain P ∗si,rvj13 wv

li,rvj:= λ1P

∗si,r

vj− λ2C

∗li,r

vj(P ∗si,rvj )

14 else15 Rv

li:= Rv

li\ rvj

16 end17 end18 if Rv

li= ∅ then

19 Return infeasible20 end21 W v

li:= (wli,r

vj)rvj ∈R

vli

22 end23 Xv∗ = (x∗li,rvj )li∈L,rvj ∈Rv

:= 0|L|×|Rv|,

24 while rank(Xv∗) 6= |L| do25 Find the smallest b such that wb,rv

k= 0, ∀ rvk ∈ Rv, and

set li := b26 a := rvj such that wli,r

vk= min

rvk∈Rvwli,r

vk, ∀ rvk ∈ Rv

li

27 for lk ∈ L \ li do28 if There exists (x∗lk,rvj )lk∈L\li,rvj ∈Rv

= a then

29 if wvli,r

vj< wv

lk,rvj

then30 x∗li,rvj := rvj31 x∗lk,rvj := 0

32 else33 x∗li,rvj := 0

34 Rvli:= Rv

li\ rvj

35 end36 else37 x∗li,rvj := rvj38 end39 end40 end41 output: Virtual relay selection decision Xv∗ and transmit

power matrix P ∗s .

all edges (Lines 2 to 16) is O(|L||Rv|), which is polynomial.Thus, Algorithm 1 can obtain a Pareto optimal solution inpolynomial time. However, the centralized algorithm needs toexchange the control messages between the relays and basestations. Each relay needs to send the channel state information(CSI) of its links to the base station. In return, the base stationsends the resource allocation decision to all relays.

2) Distributed Relay Selection and Power Allocation Al-gorithm: We now propose a suboptimal distributed relayselection and power allocation algorithm to reduce the commu-

Page 10: Full-duplex Relaying for D2D Communication in mmWave …vincentw/J/MSMW-TWC-2018.pdfthe interference mitigation issue in full-duplex D2D networks. In [15], Zhang et al. proposed a

nication overhead imposed by exchanging control messages.In this algorithm, D2D user pairs and relays act in a distributedmanner. As shown in Algorithm 3, D2D user pairs firstbroadcast their requests for potential relays locally. We denotethe set of relays which receive the request of D2D user pairli as Rvli (Line 3). Each relay in set Rvli estimates the CSIof the corresponding source-relay and relay-destination links(Lines 4 to 6). Note that the CSI of all links are not sharedglobally. The next step is to determine the feasible relays foreach D2D user pair (Lines 8 to 22). We exclude the virtualrelays which would result in an infeasible solution for thecorresponding D2D user pair (Line 15). After excluding theinfeasible relays, each D2D user pair can determine the setof all feasible relays. The weight of the feasible edges forD2D user pair li is stored in a vector denoted by W v

li(Line

21). Then, the distributed relay selection is executed basedon the idea of stable matching (Lines 24 to 40) [44]. Therelay allocation is completed when all D2D user pairs areallocated one virtual relay (Line 24). Any user pair that hasnot been allocated a virtual relay will send a request to itspreferred virtual relay (Line 26). That virtual relay will acceptthe request if no other user pair is allocated to the relay. If thevirtual relay (e.g., rvj ) has been allocated to another D2D userpair (Line 28), the virtual relay will autonomously comparethe weights of two edges. These weights are wvlk,rvj (i.e., theweight of the edge from rvj to its currently allocated D2D userpair lk), and wvli,rvj

(i.e., the weight of the edge from rvj toD2D user pair li which is requesting to be assisted by rvj )(Line 29). Virtual relay rvj will choose to assist the D2D userpair with a smaller weight (Lines 29 to 35). By repeating Lines25 to 39 until convergence, each user pair will be allocated avirtual relay and a stable relay selection will be achieved [44].

We now discuss the computational complexity of Algorithm3. The complexity of computing the weights of all edges (Lines2 to 22) is O(|L||Rv|). The complexity of stable matching isO(|L|2) [44]. The distributed algorithm does not require eachrelay to send (or receive) any CSI to (or from) the coordinator.The centralized algorithm requires information exchange toallocate the resources and incurs at least 2|L| more messageexchange compared to the distributed algorithm.

IV. PERFORMANCE EVALUATION

In this section, we evaluate the performance of our proposedalgorithms and compare them with two recently proposedrelay selection algorithms, namely all relays selection (ARS)algorithm [20] and distributed relay selection (DRS) algorithm[21]. Each relay can use four channels and communicate withup to four D2D user pairs simultaneously (i.e., Nrj = 4,∀rj ∈R) [45]. The bandwidth of each channel B = 100 MHz [1],and the noise power spectral density is −174 dBm/Hz. We alsoconsider a cell radius of 500 m [34]. Other simulation param-eters are as follows [30], [35]: Pmax

s = 2 Watt, Pmaxr = 10

Watt, Cminli

= 400 Mbps, ∀ li ∈ L, M t = Mr = 10 dB,mt = mr = −5 dB, Θt

HPBW = ΘrHPBW = 15o, α = 2,

and σ = 1.5. We use Monte Carlo simulations and calculatethe average value of the total transmit power and the systemthroughput over different network settings.

1 2 3 4 5 6 7 8 9 10 11 12 13

Number of D2D user pairs |L|

0

0.2

0.4

0.6

0.8

1

1.2

1.4

Total

tran

smitpow

er(m

W) Exponential Distribution

Uniform Distribution

Weibull Distribution

Fig. 3. Total transmit power versus number of D2D user pairs |L| with|R| = 4 (λ1 = 1 and λ2 = 0).

1 2 3 4 5 6 7 8 9 10 11 12 13

Number of D2D user pairs |L|

0

2

4

6

8

10

12

14

System

through

put(G

bps)

Weibull Distribution

Uniform Distribution

Exponential Distribution

Fig. 4. System throughput versus number of D2D user pairs |L| with|R| = 4 (λ1 = 0 and λ2 = 1).

We first investigate the performance of our proposed cen-tralized algorithm for different distributions of the distance be-tween the relays and base station. We consider Weibull, expo-nential, and uniform distributions. For the Weibull distribution,the cumulative distribution function (cdf) is F (drb; k, µ) =

1 − e−(drbµ )

k

, where drb is the distance between a relay andthe base station, and k and µ are constants. We set k = 7and µ = 400. For the exponential distribution, the cdf isF (drb; γ) = 1− e−

drbγ . For fair comparison, we set the mean

parameter γ = 374, which results in the same average distanceas Weibull distribution. For the uniform distribution, relays areuniformly distributed in the cell area.

The total transmit power and the system throughput areshown in Figs. 3 and 4, respectively. As can be observed,different distributions result in different total transmit powerand system throughput. However, our proposed algorithm isin general applicable for any distributions.

We now choose the Weibull distribution as an exampleto evaluate the performance of our proposed algorithms. Weassume that the distance between relays and the base station,drb, follows a Weibull distribution with the aforementionedparameters. We first set coefficients λ1 = 1 and λ2 = 0 tostudy the single-objective optimization problem for minimiz-

Page 11: Full-duplex Relaying for D2D Communication in mmWave …vincentw/J/MSMW-TWC-2018.pdfthe interference mitigation issue in full-duplex D2D networks. In [15], Zhang et al. proposed a

1 2 3 4 5 6 7 8 9 10 11 12 130

0.5

1

1.5

2

2.5

Number of D2D user pairs |L|

Totaltransm

itpower

(mW

)

DRS

Proposed Distributed Algorithm

ARS

Proposed Centralized Algorithm

26%

37%

Fig. 5. Total transmit power versus number of D2D user pairs |L| with|R| = 4.

4 5 6 7 8 90

0.5

1

1.5

2

2.5

Number of Relays |R|

Totaltransm

itpower

(mW

)

DRS

Proposed Distributed Algorithm

ARS

Proposed Centralized Algorithm

Fig. 6. Total transmit power versus number of relays |R| with |L| = 13.

ing the transmit power. In Fig. 5, we compare the total transmitpower of devices in our proposed algorithms with that obtainedby ARS and DRS algorithms for different number of D2Duser pairs. As shown in this figure, our proposed centralizedalgorithm substantially outperforms ARS. The proposed dis-tributed algorithm also outperforms DRS. When the number ofD2D user pairs is 13, the centralized algorithm results in 37%less transmit power than ARS, and our distributed algorithmachieves 26% less transmit power than DRS. This is becausethe centralized algorithm achieves the optimal solution withminimum weighted matching and our proposed distributedalgorithm based on stable matching can obtain a better solutionthan heuristic DRS.

In Fig. 6, we compare the total transmit power versusdifferent number of relays when the number of D2D userpairs is 13. Fig. 6 shows that the total transmit power isdecreasing in all algorithms as the number of relays increases.This is because each D2D user pair has more opportunity toselect a nearby relay. Results also show that our proposedcentralized algorithm significantly outperforms ARS, whileour proposed distributed algorithm achieves a lower transmitpower than DRS. The results indicates that our algorithms aremore efficient, especially in the networks with few relays.

In Fig. 7, we compare the total transmit power versusdifferent loop-interference channel gain. We consider the gain

−100−101−102−103−104−105−106−107−1080

0.5

1

1.5

2

2.5

3

Loop-interference channel gain hLI (dB)

Totaltransm

itpower

(mW

)

DRS

Proposed Distributed Algorithm

ARS

Proposed Centralized Algorithm

32%

38%

Fig. 7. Total transmit power versus loop-interference channel gain hLI .

1 2 3 4 5 6 7 8 9 10 11 12 130

2

4

6

8

10

12

14

Number of D2D user pairs |L|

System

throughput(G

bps)

Proposed Centralized Algorithm

ARS

Proposed Distributed Algorithm

DRS

12%

15%

Fig. 8. System throughput versus number of D2D user pairs |L| with|R| = 4.

range from −108 dB to −100 dB [46]. As shown in this figure,the total transmit power increases as the loop-interferencechannel gain increases. This is because a stronger loop-interference will result in a higher transmit power. When theloop-interference channel gain hLI = −108 dB, our proposedcentralized algorithm achieves 38% lower transmit powercompared to ARS. Furthermore, our distributed algorithmoutperforms DRS by 32%.

We now set λ1 = 0 and λ2 = 1 to obtain the relayselection and power allocation for maximizing the systemthroughput. In Fig. 8, we compare the system throughputversus different number of D2D user pairs when there arefour relays in the network. Results show that our proposedcentralized algorithm achieves a higher throughput comparedto ARS and our proposed distributed algorithm obtains ahigher throughput compared to DRS under different numberof D2D user pairs. When the number of D2D user pairs is13, the centralized algorithm achieves 12% higher throughputthan ARS and our distributed algorithm outperforms DRS by15%. Results also show that the throughput improvement ofour proposed algorithms over ARS and DRS increases as thenumber of D2D user pairs increases. This is because when thethe number of D2D user pairs increases, it is more difficult forARS and DRS to guarantee that each D2D user pair can useits preferred relay. This substantially degrades the performanceof the system.

Page 12: Full-duplex Relaying for D2D Communication in mmWave …vincentw/J/MSMW-TWC-2018.pdfthe interference mitigation issue in full-duplex D2D networks. In [15], Zhang et al. proposed a

4 5 6 7 8 99

10

11

12

13

14

15

16

Number of Relays |R|

System

throughput(G

bps)

Proposed Centralized Algorithm

ARS

Proposed Distributed Algorithm

DRS

Fig. 9. System throughput versus number of relays |R| with |L| = 13.

−100−102−104−106−1088

9

10

11

12

13

14

15

16

Loop-interference channel gain hLI (dB)

System

throughput(G

bps)

Proposed Centralized Algorithm

ARS

Proposed Distributed Algorithm

DRS

Fig. 10. System throughput versus loop-interference channel gain hLI .

In Fig. 9, we show the system throughput versus differentnumber of relays when the number of D2D user pairs is13. Our proposed centralized algorithm substantially improvesthe system throughput compared to ARS and our distributedalgorithm outperforms DRS under different number of relays.Note that the improvement slightly decreases as the numberof relays increases. This is because the ARS, DRS, and ourdistributed algorithm are more likely to allocate the optimalrelay for each D2D user pair when more relays are deployed.

In Fig. 10, we compare the system throughput versusdifferent loop-interference channel gain, which varies from−108 dB to −100 dB. As shown in this figure, the systemthroughput slightly decreases as the loop-interference channelgain increases. This shows that a stronger loop-interferencewill result in a lower throughput. However, our proposedcentralized algorithm always achieves a higher throughput thanARS and our distributed algorithm always outperforms DRS.

We now consider the multi-objective optimization problemto study the trade-off between the total transmit power andthe system throughput. In Fig. 11, we plot the optimal to-tal transmit power and system throughput obtained by thecentralized algorithm when λ1 = 1 and we vary λ2. FromFig. 11, we can observe that the optimal solution is sensitiveto the weight coefficients. When λ2 increases, improving thethroughput becomes more important than reducing the power.In this case, the optimal solution tends to consume more power

10−3

10−2

10−1

100

101

102

103

0

100

200

300

400

500

600

700

Weight coefficient

To

tal

tran

smit

po

wer

(m

W)

λ2

(a) Optimal power consumption

10−3

10−2

10−1

100

101

102

103

9.5

10

10.5

11

11.5

12

12.5

13

13.5

Weight coefficient

Syst

em t

hro

ughput

(Gbps)

λ2

(b) Optimal system throughput

Fig. 11. Optimal total transmit power and system throughput versus weightcoefficient λ2 when λ1 = 1 with |R| = 4 and |L| = 13.

to achieve a higher throughput. Results also show that theincrement of the throughput is not as fast as the increment ofthe power. In other words, the marginal throughput incrementbecomes smaller when the transmit power increases. Thisprovides useful insights of the system design to balance thetotal transmit power and system throughput.

V. CONCLUSION

In this paper, we studied the joint relay selection andpower allocation problem for full-duplex relay-assisted D2Dcommunication in mmWave based 5G networks. We firstformulated a multi-objective optimization problem to balancethe trade-off between total transmit power and system through-put. The formulated problem characterizes loop-interferencecancellation in full-duplex relaying systems. It also considersthe QoS requirements for different applications as well as thephysical constraints of the devices and relays. The problemis a combinatorial optimization problem which is complex tosolve using standard optimization techniques. To mitigate thecomplexity of the combinatorial problem, we transformed theproblem into a one-to-one matching problem by constructing aweighted bipartite graph. We then proposed a centralized algo-rithm to find the solution in polynomial time. We proved that

Page 13: Full-duplex Relaying for D2D Communication in mmWave …vincentw/J/MSMW-TWC-2018.pdfthe interference mitigation issue in full-duplex D2D networks. In [15], Zhang et al. proposed a

the solution obtained by the proposed centralized algorithm isPareto optimal. We further proposed a distributed algorithm toreduce the overhead imposed by exchanging control messages.We evaluated the performance of our proposed algorithmsthrough simulations. Results showed that our proposed al-gorithms substantially reduce the total transmit power andimprove the system throughput compared to recently proposedalgorithms in the literature. For future work, we will study theresource allocation problem when the mobile devices can alsocommunicate in full-duplex mode.

APPENDIX: PROOF OF THEOREM 1

Since Psi,rj is within a closed interval, constraint (31b)is a convex constraint. To prove that problem (31) is strictlyconvex, we need to show its objective function is strictly con-vex. We determine the second-order derivative of the objectivefunction. Since the first term of the objective function is linearin Psi,rj , the second-order derivative of the objective functionis −λ2C ′′li,rj (Psi,rj ). We rewrite Cli,rj (Psi,rj ) as follows:

Cli,rj (Psi,rj ) = B log2

(Ψli,rj (Psi,rj )

), (36)

where

Ψli,rj (Psi,rj ) = 1 +hrj ,diPrj ,di(Psi,rj )

hsi,diPsi,rj +N0. (37)

Then, according to (36), −C ′′li,rj (Psi,rj ) can be written as:

BΨ′2li,rj (Psi,rj )

Ψ2li,rj

(Psi,rj )−B

Ψ′′li,rj (Psi,rj )

Ψli,rj (Psi,rj ), (38)

where

Ψ′li,rj (Psi,rj )

=N0√

frj ,di(Psi,rj ) +N20h

2rj ,di(

hsi,di

(√frj ,di(Psi,rj ) +N2

0h2rj ,di−N0hrj ,di

)+ 2hsi,rjhLIhsi,diPsi,rj + 2hsi,rjhLIN0

)hrj ,di

2hLI(hsi,diPsi,rj +N0

)2ln 2

, (39)

and

Ψ′′li,rj (Psi,rj ) =

−Ωli,rj (Psi,rj )

hLI(hsi,diPsi,rj +N0

)3 (frj ,di(Psi,rj ) +N2

0h2rj ,di

) 32

ln 2

,

(40)

in which

Ωli,rj (Psi,rj )

= N0hrj ,dih2si,di

(frj ,di(Psi,rj ) +N2

0h2rj ,di

) 32

+ 8N0h2si,rjh

2LIh

2rj ,dih

3si,diP

3si,rj

+N0hrj ,di

(18h2si,rjh

2LIN0hrj ,dih

2si,di

− 6hsi,rjhLIN0h2rj ,dih

3si,di

)P 2si,rj

+N0hrj ,di

(12h2si,rjh

2LIN

20hrj ,dihsi,di

− 6hsi,rjhLIN20h

2rj ,dih

2si,di

)Psi,rj

−N40h

4rj ,dih

2si,di + 2h2si,rjh

2LIN

40h

2rj ,di . (41)

Note that Ψli,rj (Psi,rj ) > 0 and Ψ′li,rj (Psi,rj ) > 0 sincePsi,rj ≥ 0. If Ψ′′li,rj (Psi,rj ) is negative, then (38) is alwayspositive. Note that Ψ′′li,rj (Psi,rj ) is negative if Ωli,rj (Psi,rj ) >0. We now show that Ωli,rj (Psi,rj ) > 0. We first calculate thefirst-order derivative of Ωli,rj (Psi,rj ) as follows:

Ω′li,rj (Psi,rj )

= 6hsi,rjhLIN0h2rj ,dihsi,di

(2hsi,diPsi,rj +N0

)(hsi,di

√(frj ,di(Psi,rj ) +N2

0h2rj ,di−N0hrj ,dihsi,di

+ 2hsi,rjhLIhsi,diPsi,rj + 2hsi,rjhLIN0

). (42)

Since Ωli,rj (0) = 2h2si,rjh2LIN

30hrj ,di > 0 and

Ω′li,rj (Psi,rj ) > 0, we have Ωli,rj (Psi,rj ) > 0. Thus,Ψ′′li,rj (Psi,rj ) < 0. Given B > 0, Ψ′2li,rj (Psi,rj ) ≥ 0,Ψ2li,rj

(Psi,rj ) > 0 Ψ′′li,rj (Psi,rj ) < 0, and Ψli,rj (Psi,rj ) >0, the second-order derivative of −Cli,rj (Psi,rj ), shown in(38), is always positive, which proves the convexity of−Cli,rj (Psi,rj ) and the objective function of problem (31).Considering the constraint is also convex, problem (31) isproved to be a convex problem.

REFERENCES

[1] M. N. Tehrani, M. Uysal, and H. Yanikomeroglu, “Device-to-devicecommunication in 5G cellular networks: Challenges, solutions, andfuture directions,” IEEE Commun. Mag., vol. 52, no. 5, pp. 86–92, May2014.

[2] X. Chen, B. Proulx, X. Gong, and J. Zhang, “Exploiting social ties forcooperative D2D communications: A mobile social networking case,”IEEE/ACM Trans. Netw., vol. 23, no. 5, pp. 1471–1484, Oct. 2015.

[3] H. A. Suraweera, I. Krikidis, G. Zheng, C. Yuen, and P. J. Smith, “Low-complexity end-to-end performance optimization in MIMO full-duplexrelay systems,” IEEE Trans. Wireless Commun., vol. 13, no. 2, pp. 913–927, Feb. 2014.

[4] I. Krikidis, H. A. Suraweera, P. J. Smith, and C. Yuen, “Full-duplex relayselection for amplify-and-forward cooperative networks,” IEEE Trans.Wireless Commun., vol. 11, no. 12, pp. 4381–4393, Dec. 2012.

[5] Y. Li, D. Jin, J. Yuan, and Z. Han, “Coalitional games for resourceallocation in the device-to-device uplink underlaying cellular networks,”IEEE Trans. Wireless Commun., vol. 13, no. 7, pp. 3965–3977, Jul. 2014.

[6] F. Wang, C. Xu, L. Song, and Z. Han, “Energy-efficient resourceallocation for device-to-device underlay communication,” IEEE Trans.Wireless Commun., vol. 14, no. 4, pp. 2082–2092, Apr. 2015.

[7] J. Qiao, X. S. Shen, J. W. Mark, Q. Shen, Y. He, and L. Lei, “En-abling device-to-device communications in millimeter-wave 5G cellularnetworks,” IEEE Commun. Mag., vol. 53, no. 1, pp. 209–215, Jan. 2015.

[8] P. C. Nguyen and B. D. Rao, “Fair scheduling policies exploitingmultiuser diversity in cellular systems with device-to-device communi-cations,” IEEE Trans. Wireless Commun., vol. 14, no. 9, pp. 4757–4771,Sep. 2015.

Page 14: Full-duplex Relaying for D2D Communication in mmWave …vincentw/J/MSMW-TWC-2018.pdfthe interference mitigation issue in full-duplex D2D networks. In [15], Zhang et al. proposed a

[9] H. Xing and M. Renfors, “Resource management schemes for networkassisted device-to-device communication for an integrated OFDMAcellular system,” in Proc. of IEEE Int’l Symposium on Personal, Indoorand Mobile Radio Communications (PIMRC), Hong Kong, China, Aug.2015.

[10] M. Sheng, Y. Li, X. Wang, J. Li, and Y. Shi, “Energy efficiency anddelay tradeoff in device-to-device communications underlaying cellularnetworks,” IEEE J. Sel. Areas Commun., vol. 34, no. 1, pp. 92–106, Jan.2016.

[11] H. Zhang, L. Song, and Z. Han, “Radio resource allocation for device-to-device underlay communication using hypergraph theory,” IEEE Trans.Wireless Commun., vol. 15, no. 7, pp. 4852–4861, Jul. 2016.

[12] H. Shi, R. Prasad, V. Rao, I. Niemegeers, and M. Xu, “Spectrum- andenergy-efficient D2DWRAN,” IEEE Commun. Mag., vol. 52, no. 7, pp.38–45, Jul. 2014.

[13] M. Hasan, E. Hossain, and D. I. Kim, “Resource allocation underchannel uncertainties for relay-aided device-to-device communicationunderlaying LTE-A cellular networks,” IEEE Trans. Wireless Commun.,vol. 13, no. 4, pp. 2322–2338, Apr. 2014.

[14] L. Wang, F. Tian, T. Svensson, D. Feng, M. Song, and S. Li, “Exploit-ing full duplex for device-to-device communications in heterogeneousnetworks,” IEEE Commun. Mag., vol. 53, no. 5, pp. 146–152, May 2015.

[15] G. Zhang, K. Yang, P. Liu, and J. Wei, “Power allocation for full-duplexrelaying-based D2D communication underlaying cellular networks,”IEEE Trans. Veh. Technol., vol. 64, no. 10, pp. 4911–4916, Oct. 2015.

[16] A. Al-Hourani, S. Kandeepan, and E. Hossain, “Relay-assisted device-to-device communication: A stochastic analysis of energy saving,” IEEETrans. Mobile Comput., vol. 15, no. 12, pp. 3129–3141, Dec. 2016.

[17] O. Gharehshiran, A. Attar, and V. Krishnamurthy, “Collaborative sub-channel allocation in cognitive LTE femto-cells: A cooperative game-theoretic approach,” IEEE Trans. Commun., vol. 61, no. 1, pp. 325–334,Jan. 2013.

[18] H. Xu and B. Li, “Resource allocation with flexible channel cooperationin cognitive radio networks,” IEEE Trans. Mobile Comput., vol. 12,no. 5, pp. 957–970, May 2013.

[19] S. Dadallage, C. Yi, and J. Cai, “Joint beamforming, power, and channelallocation in multiuser and multichannel underlay MISO cognitive radionetworks,” IEEE Trans. Veh. Technol., vol. 65, no. 5, pp. 3349–3359,May 2016.

[20] H. Feng, H. Wang, X. Chu, and X. Xu, “On the tradeoff between optimalrelay selection and protocol design in hybrid D2D networks,” in Proc.of IEEE Int’l Conf. on Commun. (ICC), London, UK, Jun. 2015.

[21] X. Ma, R. Yin, G. Yu, and Z. Zhang, “A distributed relay selectionmethod for relay assisted device-to-device communication system,” inProc. of IEEE Int’l Symposium on Personal, Indoor and Mobile RadioCommunications (PIMRC), Sydney, Australia, Sep. 2012.

[22] B. Ma, H. Shah-Mansouri, and V. W.S. Wong, “A matching approachfor power efficient relay selection in full duplex D2D networks,” in Proc.of IEEE Int’l Conf. on Commun. (ICC), Kuala Lumpur, Malaysia, May2016.

[23] 3rd Generation Partnership Project (3GPP) TR 36.843 V. 12.0, “Tech-nical specification group, radio access network; Study on LTE device todevice proximity services-Radio aspects (Release 12),” Mar. 2014.

[24] C. H. Yu, K. Doppler, C. B. Ribeiro, and O. Tirkkonen, “Resourcesharing optimization for device-to-device communication underlayingcellular networks,” IEEE Trans. Wireless Commun., vol. 10, no. 8, pp.2752–2763, Aug. 2011.

[25] X. Lin, J. G. Andrews, and A. Ghosh, “Spectrum sharing for device-to-device communication in cellular networks,” IEEE Trans. WirelessCommun., vol. 13, no. 12, pp. 6727–6740, Dec. 2014.

[26] P. Mach, Z. Becvar, and T. Vanek, “In-band device-to-device communi-cation in OFDMA cellular networks: A survey and challenges,” IEEECommun. Surveys&Tuts., vol. 17, no. 4, pp. 1885–1922, Fourth Quarter2015.

[27] Federal Communications Commission (FCC) 16–89, “Enable higherfrequency spectrum for future wireless,” Jul. 2016.

[28] T. S. Rappaport, S. Sun, R. Mayzus, H. Zhao, Y. Azar, K. Wang,G. Wong, J. Schulz, M. Samimi, and F. Gutierrez, “Millimeter wavemobile communications for 5G cellular: It will work!” IEEE Access,vol. 1, pp. 335–349, May 2013.

[29] J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. K.Soong, and J. C. Zhang, “What will 5G be?” IEEE J. Sel. AreasCommun., vol. 32, no. 6, pp. 1065–1082, Jun. 2014.

[30] T. S. Rappaport, F. Gutierrez, E. Ben-Dor, J. N. Murdock, Y. Qiao,and J. Tamir, “Broadband millimeter-wave propagation measurementsand models using adaptive-beam antennas for outdoor urban cellular

communications,” IEEE Trans. Antennas Propag., vol. 61, no. 4, pp.1850–1859, Apr. 2013.

[31] T. S. Rappaport, E. Ben-Dor, J. N. Murdock, and Y. Qiao, “38 GHzand 60 GHz angle-dependent propagation for cellular and peer-to-peerwireless communications,” in Proc. of IEEE Int’l Conf. on Commun.(ICC), Ottawa, Canada, Jun. 2012.

[32] B. Ma, H. Shah-Mansouri, and V. W.S. Wong, “Multimedia contentdelivery in millimeter wave home networks,” IEEE Trans. WirelessCommun., vol. 15, no. 7, pp. 4826–4838, Jul. 2016.

[33] A. Alkhateeb, O. El Ayach, G. Leus, and R. W. Heath, “Channelestimation and hybrid precoding for millimeter wave cellular systems,”IEEE J. Sel. Topics Signal Process., vol. 8, no. 5, pp. 831–846, Jul.2014.

[34] T. Bai and R. W. Heath, “Coverage and rate analysis for millimeter-wavecellular networks,” IEEE Trans. Wireless Commun., vol. 14, no. 2, pp.1100–1114, Feb. 2015.

[35] T. Riihonen, S. Werner, and R. Wichman, “Hybrid full-duplex/half-duplex relaying with transmit power adaptation,” IEEE Trans. WirelessCommun., vol. 10, no. 9, pp. 3074–3085, Sep. 2011.

[36] ——, “Mitigation of loopback self-interference in full-duplex MIMOrelays,” IEEE Trans. Signal Process., vol. 59, no. 12, pp. 5983–5993,Dec. 2011.

[37] D. W. K. Ng, E. S. Lo, and R. Schober, “Dynamic resource allocation inMIMO-OFDMA systems with full-duplex and hybrid relaying,” IEEETrans. Commun., vol. 60, no. 5, pp. 1291–1304, May 2012.

[38] K. Li, Q. Zhang, S. Kwong, M. Li, and R. Wang, “Stable matching-basedselection in evolutionary multiobjective optimization,” IEEE Trans.Evolutionary Computation, vol. 18, no. 6, pp. 909–923, Dec. 2014.

[39] R. T. Marler and J. S. Arora, “Survey of multi-objective optimizationmethods for engineering,” Structural and Multidisciplinary Optimiza-tion, vol. 26, no. 6, pp. 369–395, Apr. 2004.

[40] Y. Gu, W. Saad, M. Bennis, M. Debbah, and Z. Han, “Matching theoryfor future wireless networks: Fundamentals and applications,” IEEECommun. Mag., vol. 53, no. 5, pp. 52–59, May 2015.

[41] D. B. West, Introduction to Graph Theory. Prentice Hall, 2001.[42] D. E. Goldberg, Genetic Algorithms in Search, Optimization and Ma-

chine Learning. Addison-Wesley, 1989.[43] H. W. Kuhn, “The Hungarian method for the assignment problem,”

Naval Research Logistics Quarterly, vol. 2, no. 1-2, pp. 83–97, Mar.1955.

[44] D. Gale and L. S. Shapley, “College admissions and the stability ofmarriage,” American Mathematical Monthly, vol. 69, no. 1, pp. 9–15,Jan. 1962.

[45] B. Bai, W. Chen, K. B. Letaief, and Z. Cao, “Joint relay selectionand subchannel allocation for amplify-and-forward OFDMA cooperativenetworks,” in Proc. of IEEE Int’l Conf. on Commun. (ICC), Ottawa,Canada, Jun. 2012.

[46] D. Korpi, M. Heino, C. Icheln, K. Haneda, and M. Valkama, “Com-pact inband full-duplex relays with beyond 100 dB self-interferencesuppression: Enabling techniques and field measurements,” IEEE Trans.Antennas Propag., vol. 65, no. 2, pp. 960–965, Feb. 2017.

Bojiang Ma received the B.Eng. degree from South-east University, Nanjing, JiangSu, China, in 2009,and the M.A.Sc. degree from University of Victo-ria, Victoria, BC, Canada, in 2011, and the Ph.D.degree from the University of British Columbia(UBC), Vancouver, BC, Canada, in 2016. Dr. Mais currently with Kwantlen Polytechnic University(KPU), Surrey, BC, Canada. His research interestsinclude interference management and resource al-location for small cell networks, smart home wire-less networks, device-to-device communication, and

mmWave communication systems, using optimization theory and game theory.

Page 15: Full-duplex Relaying for D2D Communication in mmWave …vincentw/J/MSMW-TWC-2018.pdfthe interference mitigation issue in full-duplex D2D networks. In [15], Zhang et al. proposed a

Hamed Shah-Mansouri (S’06, M’14) received theB.Sc., M.Sc., and Ph.D. degrees (Hons.) from SharifUniversity of Technology, Tehran, Iran, in 2005,2007, and 2012, respectively all in electrical engi-neering. From 2013 to 2018, he was a Post-doctoralResearch and Teaching Fellow at the Universityof British Columbia, Vancouver, Canada. Dr. Shah-Mansouri is currently with Vancosys Data SecurityInc., Vancouver, Canada. His research interests arein the area of stochastic analysis, optimization andgame theory and their applications in mobile cloud

computing and Internet of Things. He has served as the publication co–chairfor the IEEE Canadian Conference on Electrical and Computer Engineering(CCECE) 2016 and as the technical program committee (TPC) member forseveral conferences including the IEEE Globecom 2015, IEEE VTC–Fall(2016–2018), IEEE PIMRC 2017, and IEEE VTC–Spring 2018.

Vincent W.S. Wong (S’94, M’00, SM’07, F’16) re-ceived the B.Sc. degree from the University of Man-itoba, Winnipeg, MB, Canada, in 1994, the M.A.Sc.degree from the University of Waterloo, Waterloo,ON, Canada, in 1996, and the Ph.D. degree from theUniversity of British Columbia (UBC), Vancouver,BC, Canada, in 2000. From 2000 to 2001, he workedas a systems engineer at PMC-Sierra Inc. (nowMicrosemi). He joined the Department of Electricaland Computer Engineering at UBC in 2002 andis currently a Professor. His research areas include

protocol design, optimization, and resource management of communicationnetworks, with applications to wireless networks, smart grid, mobile cloudcomputing, and Internet of Things. Dr. Wong is an Editor of the IEEE Trans-actions on Communications. He has served as a Guest Editor of IEEE Journalon Selected Areas in Communications and IEEE Wireless Communications.He has also served on the editorial boards of IEEE Transactions on VehicularTechnology and Journal of Communications and Networks. He was a TechnicalProgram Co-chair of IEEE SmartGridComm’14, as well as a SymposiumCo-chair of IEEE ICC’18, IEEE SmartGridComm (’13, ’17) and IEEEGlobecom’13. He is the Chair of the IEEE Vancouver Joint CommunicationsChapter and has served as a Chair of the IEEE Communications SocietyEmerging Technical Sub-Committee on Smart Grid Communications. Hereceived the 2014 UBC Killam Faculty Research Fellowship.