Next Article in Journal
Editorial: Edge Computing for the Internet of Things
Previous Article in Journal
Implementation of Elliptic Curves in the Polynomial Blom Key Pre-Distribution Scheme for Wireless Sensor Networks and Distributed Ledger Technology
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Power Distribution of D2D Communications in Case of Energy Harvesting Capability over κ-μ Shadowed Fading Conditions

1
Advanced Systems Engineering Lab (ASELab), Ibn Tofail University, Kenitra 14000, Morocco
2
SIRC-LAGES, Electrical Engineering Department, Hassania School of Public Labors, Casablanca 20250, Morocco
*
Author to whom correspondence should be addressed.
J. Sens. Actuator Netw. 2023, 12(1), 16; https://doi.org/10.3390/jsan12010016
Submission received: 9 June 2022 / Revised: 6 August 2022 / Accepted: 17 August 2022 / Published: 10 February 2023

Abstract

:
Device-to-device (D2D) communication will play a meaningful role in future wireless networks and standards, since it ensures ultra-low latency for communication among near devices. D2D transmissions can take place together with the actual cellular communications, so handling the interference is very important. In this paper, we consider a D2D couple operating in the uplink band in an underlaid mode, and, using the stochastic geometry, we propose a cumulative distribution function (CDF) of the D2D transmit power under κ - μ shadowed fading. Then, we derive some special cases for some fading channels, such as Nakagami and Rayleigh environments, and for the interference-limited scenario. Moreover, we propose a radio frequency energy harvesting, where the D2D users can harvests ambient RF energy from cellular users. Finally, the analytical results are validated via simulation.

1. Introduction

The Internet of Things (IoT) has revolutionized the world through its centric concepts, such as augmented reality, high-resolution video streaming, self-driven cars, smart environment, e-health care, etc. This new paradigm is based on various technologies, such as the combining of sensing devices and embedded systems with cyber-physical systems, device-to-device (D2D) communications and 5G wireless systems [1]. One of the most important features of 5G networks is that it allows seamless connectivity for any type of devices, applications and heterogeneous networks. On the other hand, D2D communication is a promising technology that enables two or more neighbor devices to communicate directly, in either a stand-alone or a network-coordinated fashion. The potential of D2D communication in 6G cellular networks for applications of smart factories (such as industry 5.0) and vehicular communications, according to [2], has recently been underlined (e.g., autonomous driving and vehicular platooning). Infotainment is also one of the services provided among D2D. D2D communication provides some advantages, such as cellular coverage extension, data offloading, information sharing and energy efficiency [3]. This kind of communication can be also used for safety applications (rescue and search missions, road safety, etc.) [4]. While in [5], the authors tackled the problem of connectivity and security in terms of public safety based on D2D systems.
Regarding the spectrum allocated for D2D communications, two strategies can be envisioned [6]: (i) in-band, where cellular communication and D2D communication share the same spectrum licensed to the cellular network. This spectrum can be divided into non-overlapping or shared bands (respectively, overlaying and underlaying); (ii) out-band, where D2D communication exploits an unlicensed spectrum (ISM band). The overlay mode is easy to implement; even so, the underlay one is more efficient for spectrum usage. The coexistence of D2D and cellular communications in the same frequency band is challenging due to the hardness of interference handling as illustrated in Figure 1. This problem can be solved through power control and resource allocation [7]. This power control mechanism also contributes in device battery usage optimization. The issue of energy consumption in the context of D2D communication is very active in the research community [8,9,10]. In addition, energy harvesting techniques can substantially improve the operation duration of D2D equipments through the additional energy gathered [11].
In this paper, we focus on the power control mechanism using stochastic geometry tools while considering general fading channel conditions. Further, we analyze the energy-harvesting capability in the D2D case. The contributions of this paper are summarized as follows:
  • In the context of D2D underlaid communications, we analyze the SINR at the receiver side when the channel fading is modeled as κ - μ shadowed. We then derive the CDF of the required transmission power to achieve the target where the SINR is greater than a threshold.
  • Based on the general form of CDF, some particular cases of channel fading, especially Nakagami and Rayleigh fading channels, are also derived. We also derive the transmit power distribution in a noiseless environment.
  • We consider the case where D2D transmitters are equipped with a radio frequency harvesting system. We assume that the power is gathered from the cellular users’ equipment transmitted energy. Then, we derive the expectation of the harvested energy. In addition, we calculate the expectation of the transmit power of D2D transmitters. Based on this finding, we suggest the probability that a D2D transmitter can achieve its transmission successfully.
  • Finally, the accuracy of the analytical results under different fading channel schemes is assessed through an extensive numerical simulation.
The remainder of this paper is structured as follows: In Section 2 we discuss some related works. Section 3 presents the system model for D2D communications under κ - μ shadowed fading channels. Section 4 analytically provides the distribution of transmit power and derives some relevant special cases. In Section 5, we present an RF energy-harvesting model based on the cellular ambient RF transmissions. Section 6 provides numerical results for both simulations and analytical derivations. Finally, the Section 7 concludes the paper.

2. Related Work

In order to deal with the interference issue, generally, transmit power control uses channel state information (CSI) between the sender and receiver to meet the required signal-to-noise ratio [12]. In order to model the channel, many recent works use some basic distributions, but the fitting of the shadowed κ - μ distribution to experimental data is better than that achieved by the classical distributions previously mentioned. It provides a general multi-path model for a line-of-sight (LOS) propagation scenario controlled by two shape parameters κ and μ , in which, the LOS component is subject to shadowing. In addition, some classical fading distributions are included in the shadowed κ - μ distribution as particular cases, e.g., one-sided Gaussian, Rayleigh, Nakagami-m, Rician and κ - μ [13]. More recently, other generalized fading models are proposed, such as α - κ - μ , α - η - μ and α - κ - μ shadowed [14,15].
D2D equipments are battery-powered leading to consider the energy as a main concern for the communication networks. Some literature works have energy management and optimization as the main concern ([16,17,18,19]). Recently, in [20], the authors proposed a technique to handle the battery non-linearity in order to extend the network usage duration.
Another interesting technology that can significantly help in increasing the D2D device lifetime is radio frequency energy harvesting (RF-EH). It is defined as the capability to convert the received RF signals into electricity in order to help the device in its information processing and transmission [21]. This technique is commonly utilized in energy-constrained wireless networks, as they have a limited lifetime that largely confines the network performance. It can be applied in multiple fields, such as wireless sensor networks, wireless body networks and wireless charging systems. In RF-EH, radio signals with frequencies from 3 kHz to 300 GHz are used as a medium to carry energy in an electromagnetic radiation form. The received signal strength decays inversely proportionally to the traveled distance, specifically at 20 dB per decade of the distance [22]. Hence, the RF-EH depends on three main factors: the transmit power, the distance between the energy source and the harvester and the wavelength of the RF signals [23]. It has been shown that it is possible to harvest 3.5 mW of power at a distance of 0.6 m and 1 μ W at a distance of 11 m using a Powercast RF energy harvester module operating at 915 MHz [24]. RF-EH was discussed in [25] for cognitive radio networks. An RF power conversion circuit extracts DC power from the received RF signals. The circuit is activated only when the received RF power is greater than a predefined threshold, which depends on circuit sensitivity. Similarly, in [26], an energy-harvesting region was considered for relay users, where they harvest ambient RF energy from access points. By considering energy harvesting, the distribution of relays is derived in order to increase the D2D transmission opportunities. Authors in [27] have proposed an IoT energy-harvesting model that does not require battery storage, nor a voltage converter. The implementation tests of the proposed system showed an 8% increase in the amount of harvested power and a 60% increase in the device lifetime. More recently, in [28], the authors conducted experiments with zero energy IoT devices, where the needed power supply was scavenged from the RF signal. In the context of energy harvesting, RF sources can be devised into two categories: dedicated RF sources and ambient ones. Dedicated RF sources use ISM frequency bands. They are used when a more predictable energy supply is needed, but they have some inconveniences, such as generating a high deployment cost, and their power can be limited by federal regulations due to health and safety concerns about RF radiation. On the other side, as the ambient RF sources are not intended specifically for RF energy transfer, they provide free energy [22]. More recently, in [29], authors considered the impact of the RF power density variation on the instantaneous charging capacity of the energy buffer in the RF energy-harvesting system. Although RF-EH has the lowest energy intensity compared to other sources of energy, it has some advantages. In particular, it does not depend on the weather or geographical conditions (unlike solar and wind energy); it can be used in any location where there is ambient RF waves; and it can serve multiple device at the same time [24]. It is important to note that a wireless power transfer can be used for equipments that required an important power supply, as experimented in [30].
In Table 1, we summarize the contribution of the present work as a comparison to the literature review.
The list of all of the abbreviations cited in this paper is summarized in the following Table 2:

3. System Model

In this work, we considered an underlaid scenario where multiple macro-cellular UEs and D2D users share the same frequency band as depicted in Figure 2. Independent homogeneous Poisson point processes (PPP) Φ C and Φ D with constant intensity λ C and λ D were used to model the location of cellular and D2D equipment, respectively. In order to transmit, each UE uses independent and identically distributed (i.i.d.) transmit powers.
We assumed that all links are affected by i.i.d. κ - μ shadowed fading, and we denoted by H the fading power. For the sake of brevity, we say that: H S ( β , κ , μ , m ) , where β = E [ H ] is the mean of H, and κ , μ , m are the parameters of the κ , μ shadowed distribution, with the conditions that: μ , m N , and μ m .
With this setting, and from [35], eqn. (4b)], the PDF of H is expressed as:
f H ( x ) ω d Γ ( d ) . x d 1 . e ω . x
with parameters defined as d = m μ ( 1 + κ ) 2 m + μ κ 2 + 2 m κ , and ω = d β .
In addition, the CCDF of H (from [36], Equation (13)]) is given as:
F ¯ H ( x ) = i = 0 m μ b i . e c . x j = 0 m i 1 1 j ! c j . x j ,
with c = m μ ( 1 + κ ) β ( μ κ + m ) , and b i = ( m μ ) ! i ! ( m μ i ) ! . ( m μ κ + m ) i ( μ κ μ κ + m ) m μ i .
For a transmitter–receiver distance R, the path loss has a standard singular model of R α with a path-loss exponent α with 2 < α < 6 .
We supposed that each D2D receiver only connects to the nearest D2D transmitter and that each D2D transmitter communicates with exactly one D2D receiver. This is ensured if the D2D receiver outnumbers the D2D transmitter, if not, some D2D transmitters will have no receiver, and these D2D transmitters will be inactive [32].
Without a loss of generality, we are interested in a typical D2D link where the transmitter is located at the origin O , and denote it as subscript 0. Let P 0 be the typical D2D transmitter transmit power, H 0 be the fading power in the typical D2D communication channel and the distance between the typical D2D transmitter and receiver be R 0 . Hence, we can express the received power in the typical D2D link as
P r = P 0 , D . H 0 , D . R 0 , D α ,
At the typical D2D receiver, the total interference caused by the other D2D transmitters is given as:
I D = i { ϕ D \ O } P i , D . H i , D . R i , D α ,
and the interference caused by all cellular transmitters is given by the following expression:
I C = i ϕ C P i , C . H i , C . R i , C α ,
where P i , . , H i , . and R i , . represent the transmit power, the channel fading power and the locations of the cellular user (subscript C) and D2D users (subscript D), respectively. In the expression of D2D interference I D , we exclude the signal power generated by our D2D typical transmitter. Note that I C and I D are independents, as we consider that the transmit power, the fading power and the location of cellular and D2D users are all independent of each other.
In this paper, we focus our study on one macro-cell area, and we consider that the interference from other neighbor cells is negligible. Thus, the S I N R at the typical D2D receiver is given by
S I N R = P r I C + I D + N 0 = P 0 , D . H 0 , D . R 0 , D α I C + I D + N 0 T ,
where N 0 is the noise power and T is the minimum S I N R threshold required for a successful communication between a D2D pair. Table 3 recaps all variables used in our system model:

4. CDF of Transmit Power

Theorem 1.
In a D2D-underlaid cellular network with multiple macro-cellular UEs and D2D users, the converged C D F  of the transmit power of D2D users, assuming κ-μ shadowed fading channels, is
P ( P p ) = i , j f ( i , j ) . 0 r 1 + α j . e k 1 . r α k 2 . r 2 d r + i , j , k , l , M g ( i , j , k , l , M ) . 0 r 1 + 2 l + α ( j k ) . e k 1 . r α k 2 . r 2 d r + i , j , k , t , l , s , M h ( i , j , k , t , l , s , M ) 0 r 1 + 2 ( l + s ) + α ( j k ) . e k 1 r α k 2 r 2 d r
where  k 1 ,  k 2 ,  f ( . ) ,  g ( . , . )  and  h ( . , . )  will be detailed by the end of the proof.
Proof. 
The C D F of the D2D transmit power, where it is conditioned on R 0 and considering I = I C + I D , is
P ( P p ) = P H 0 T . R 0 α ( I + N 0 ) p = E R [ P ( H 0 T . R 0 α ( I + N 0 ) p | R 0 ) ] = E R [ i = 0 m μ b i . e c T R 0 α ( I + N 0 ) p j = 0 m i 1 1 j ! c j T . R 0 α ( I + N 0 ) p j ] = i = 0 m μ b i j = 0 m i 1 1 j ! ( T c p ) j E R R 0 α . j . e c T N 0 p R 0 α . ( I + N 0 ) j . e c T p I . R 0 α = i = 0 m μ b i j = 0 m i 1 1 j ! ( T . c p ) j E R R 0 α . j . e c T N 0 p R 0 α . E I [ ( I + N 0 ) j . e c T R 0 α p I | R 0 ] = i = 0 m μ b i j = 0 m i 1 1 j ! ( T c p ) j k = 0 j C j k . N 0 j k E R R 0 α . j . e c T N 0 p R 0 α . E I [ I k . e c T R 0 α p I | R 0 ]
where C j k = j ! k ! ( j k ) ! . Separating the terms when j = 0 and k = 0 and making some development, we obtained
P ( P p ) = i = 0 m μ b i j = 0 m i 1 1 j ! ( T . c p ) j N 0 j E R R 0 α . j . e c . T . N 0 p R 0 α . E I [ e c . T . R 0 α p I | R 0 ] + i = 0 m μ b i j = 1 m i 1 1 j ! ( T . c p ) j k = 1 j C j k . N 0 j k E R R 0 α . j . e c . T . N 0 p R 0 α . E I [ I k . e c . T . R 0 α p I | R 0 ]
Starting with the first expectation over I and putting s = c T R 0 α / p , we obtain
E I 1 = E I [ e s . I ] = L I ( s )
Since the total interference is: I = I D + I C and I D and I C are independent, we have
E I 1 = L I D ( s ) . L I C ( s )
Thus, in the first step, we try to calculate L I D ( s ) :
L I D ( s ) = E I D [ e s . I D ] = E I D e s . i { ϕ D \ O } P i , D . H i , D . R i , D α = E P , H , ϕ i { ϕ D \ O } e s . P i , D . H i , D . R i , D α = E ϕ i { ϕ D \ O } E P [ 0 e s y R i , D α P i , D . ω d Γ ( d ) . y d 1 e ω y d y ] = E ϕ i { ϕ D \ O } E P [ ω d ( ω + s R i , D α P i , D ) d ]
Based on the probability-generating functional ( P G F L ) theorem for P P P , and neglecting the small integration from 0 to R 0 , we obtain:
L I D ( s ) = e x p λ D R 2 1 E P [ ω d ( ω + s P i , D . x α ) d ] d x = e x p λ D . E P R 2 ( 1 ω d ( ω + s P i , D . x α ) d ) d x = e x p λ D . E P 2 π 0 ( 1 1 ( 1 + s P i , D . r α ω ) d ) r . d r = e x p λ D . E P π ( s P D / ω ) 2 / α Γ ( 1 2 α ) . Γ ( d + 2 α ) Γ ( d ) = e x p λ D π ( s ω ) 2 α . Γ ( 1 2 α ) . Γ ( d + 2 α ) Γ ( d ) E P P D 2 / α
By the same way, we obtain for the Laplace transform L I C ( s ) with the following result:
L I C ( s ) = e x p λ C π ( s ω ) 2 α . Γ ( 1 2 α ) . Γ ( d + 2 α ) Γ ( d ) E P P C 2 / α
hence, the final expression of E I 1 is:
E I 1 = e x p π ( s ω ) 2 α . Γ ( 1 2 α ) . Γ ( d + 2 α ) Γ ( d ) ( λ D E P P D 2 / α + λ C E P P C 2 / α )
now, passing to the second expectation over I in (8), denoted by E I 2 :
E I 2 = E I [ I k . e s . I ] = E I [ ( I D + I C ) k . e s ( I D + I C ) ] = E I [ t = 0 k C k t I D t I C k t e s . I D . e s . I C ] = t = 0 k C k t E I [ ( I D t . e s . I D ) . ( I C k t . e s . I C ) ] = t = 0 k C k t E I D [ I D t . e s . I D ] . E I C [ I C k t . e s . I C ] = E I D [ e s . I D ] . E I C [ I C k . e s . I C ] + E I D [ I D k . e s . I D ] . E I C [ e s . I C ] + t = 1 k 1 C k t E I D [ I D t . e s . I D ] . E I C [ I C k t . e s . I C ]
We note that C k t = k ! t ! ( k t ) ! . The last step comes from the fact that the expected value of the product of independent variables is the product of expected values.
Thus, we start by calculating the first term in the last equation, denoted by E I 2 , D . Using Theorem 2 in [37] for t N * , we have
E I 2 , D = E I D [ I D t . e s . I D ] = exp ( λ D R 2 \ D ( 1 E H , P [ exp ( s H i , D . x α P i , D ) ] ) d x ) . l = 1 t M N l C M l ! i = 1 l λ D . R 2 E H , P [ exp ( s H i , D . x α P i , D ) ( H i , D . x α P i , D ) m i ] d x
where C M = t ! r = 1 l m r ! , N l is the set of vectors M with l natural elements, M 1 = i = 1 l m i = t and D is the disk of origin O and radius R 0 .
Let us calculate the expressions of E H , P [ 1 ] and E H , P [ 2 ] , related to the expectations given in (11), respectively:
E H , P [ 1 ] = E H , P [ exp ( s H i , D R α P i , D ) ] = e s P i , D R α . H i , D . f ( H ) . f ( P ) d H d P = 0 0 e s y P i , D R α ω d Γ ( d ) y d 1 e ω y d y f ( P ) d P = E P 1 ( 1 + s R α P i , D ω ) d
The second expectation can be defined as:
E H , P [ 2 ] = E H , P [ exp ( s H i , D . R α P i , D ) . ( H i , D . R α P i , D ) m 1 ] = E P 0 e s y P i , D R α . ( y P i , D R α ) m i . ω d Γ ( d ) . y d 1 . e ω y d y = E P ( P i , D R α ) m i . ω d Γ ( d ) 0 y m i + d 1 . e ( s P i , D R α + ω ) y d y = E P ω d . Γ ( m i + d ) Γ ( d ) . ( P i , D R α ) m i ( ω + s P i , D R α ) m i + d
Based on (11) and (12), the expression of E I 2 , D is given as:
E I 2 , D = exp λ D R 2 \ D ( 1 E P [ 1 ( 1 + s x α P i , D ω ) d ] ) d x l = 1 t M N l C M l ! i = 1 l λ D R 2 E P ω d . Γ ( m i + d ) Γ ( d ) . ( x α P i , D ) m i ( ω + s x α P i , D ) m i + d d x = exp λ D E P [ R 2 \ D ( 1 1 ( 1 + s x α P i , D ω ) d ) d x ] l = 1 t M N l C M l ! i = 1 l λ D E P R 2 ω d . Γ ( m i + d ) Γ ( d ) . ( x α P i , D ) m i ( ω + s x α P i , D ) m i + d d x
We express both integrals with respect to x:
J = R 2 \ D 1 1 ( 1 + s P D . x α ω ) d d x 2 π 0 1 1 ( 1 + s P D . r α ω ) d r . d r π ( s P D ω ) 2 / α . Γ ( 1 2 / α ) . Γ ( d + 2 / α ) Γ ( d )
The second integral is:
K = ω d . Γ ( m i + d ) Γ ( d ) R 2 ( P D x α ) m i ( ω + s P D x α ) d + m i d x = 2 π ω d . Γ ( m i + d ) Γ ( d ) . 0 + ( P D . r α ) m i ( ω + s P D . r α ) d + m i r . d r = 2 π α . s m i . ( s P D ω ) 2 / α . Γ ( m i 2 α ) . Γ ( d + 2 α ) Γ ( d )
Thus, the final form of E I 2 , D is given as:
E I 2 , D = exp π λ D Γ ( d ) . ( s ω ) 2 / α . Γ ( 1 2 α ) . Γ ( d + 2 α ) . E P [ P D 2 α ] l = 1 t M N l C M l ! i = 1 l 2 π λ D α . s m i Γ ( d ) . ( s ω ) 2 / α Γ ( d + 2 α ) . Γ ( m i 2 α ) . E P [ P D 2 α ]
Using the same method as done with E I 2 , D , we have:
E I 2 , C = E I C [ I C k t . e s . I C ] = exp π λ C Γ ( d ) . ( s ω ) 2 / α . Γ ( 1 2 α ) . Γ ( d + 2 α ) . E P [ P C 2 α ] l = 1 k t M N l C M l ! i = 1 l 2 π λ C α . s m i Γ ( d ) . ( s ω ) 2 / α Γ ( d + 2 α ) . Γ ( m i 2 α ) . E P [ P C 2 α ]
Now, we can calculate the total expression of E I 2 based on (13), (14) and (10):
E I 2 = exp π Γ ( d ) . ( s ω ) 2 / α . Γ ( 1 2 α ) . Γ ( d + 2 α ) ( λ D . E D + λ C . E C ) . [ l = 1 k M N l C M l ! i = 1 l 2 π α . s m i Γ ( d ) . ( s ω ) 2 / α Γ ( d + 2 α ) . Γ ( m i 2 α ) ( λ D E D + λ C E C ) + t = 1 k 1 C k t l = 1 t M N l C M l ! i = 1 l 2 π α . s m i Γ ( d ) . ( s ω ) 2 / α Γ ( d + 2 α ) . Γ ( m i 2 α ) λ D E D l = 1 k t M N l C M l ! i = 1 l 2 π α . s m i Γ ( d ) . ( s ω ) 2 / α Γ ( d + 2 α ) Γ ( m i 2 α ) λ C E C ]
where E D = E P [ P D 2 α ] and E C = E P [ P C 2 α ] .
We can then have the expression of our C D F using the P D F of R 0 expressed in [38]: f R 0 ( r ) = 2 π λ D r . e π λ D . r 2 .
Thus, (8) becomes:
P ( P p ) = i = 0 m μ b i j = 0 m i 1 1 j ! ( T . c p ) j . N 0 j 0 2 π λ r . e π λ r 2 r α j . e c . T . N 0 p r α . e π Γ ( d ) ( c T ω p ) 2 α . Γ ( 1 2 α ) Γ ( d + 2 α ) ( λ D E D + λ C E C ) r 2 d r + i = 0 m μ b i j = 1 m i 1 1 j ! ( T . c p ) j . k = 1 j C j k . N 0 j k 0 2 π λ r . e π λ r 2 r α j . e c . T . N 0 p r α . e π Γ ( d ) ( c T ω p ) 2 α . Γ ( 1 2 α ) Γ ( d + 2 α ) . ( λ D E D + λ C E C ) . r 2 l = 1 k M N l C M l ! i = 1 l 2 π α Γ ( d ) ( 1 ω ) 2 α ( c T p ) 2 α m i Γ ( d + 2 α ) . Γ ( m i 2 α ) ( λ D E D + λ C E C ) r 2 α m i + i = 0 m μ b i j = 1 m i 1 1 j ! ( T . c p ) j . k = 1 j C j k . N 0 j k 0 2 π λ r . e π λ r 2 r α j . e c . T . N 0 p r α . e π Γ ( d ) ( c T ω p ) 2 α . Γ ( 1 2 α ) Γ ( d + 2 α ) . ( λ D E D + λ C E C ) r 2 t = 1 k 1 C k t l = 1 t M N l C M l ! i = 1 l 2 π α Γ ( d ) . ( 1 ω ) 2 / α ( c T p ) 2 / α m i Γ ( d + 2 α ) . Γ ( m i 2 α ) λ D E D r 2 α m i l = 1 k t M N l C M l ! i = 1 l 2 π α Γ ( d ) ( 1 ω ) 2 α ( c T p ) 2 α m i Γ ( d + 2 α ) Γ ( m i 2 α ) λ C E C r 2 α m i d r
Finally, the transmit power CDF is expressed as follows:
P ( P p ) = i , j f ( i , j ) 0 r 1 + α j e k 1 r α k 2 r 2 d r + i , j , k , l , M g ( i , j , k , l , M ) 0 r 1 + 2 l + α ( j k ) e k 1 r α k 2 r 2 d r + i , j , k , t , l , M h ( i , j , k , t , l , M ) 0 r 1 + 2 ( l + s ) + α ( j k ) e k 1 r α k 2 r 2 d r
where k 1 = c T N 0 p , k 2 = π λ D + π ( c T ω p ) 2 / α . Γ ( 1 2 α ) . Γ ( d + 2 α ) Γ ( d ) ( λ D E D + λ C E C ) .
Therefore, we have the first integral multiplier i , j f ( i , j ) = i = 0 m μ b i j = 0 m i 1 2 π λ D j ! ( T c p ) j . N 0 j , the second i , j , k , l , M g ( i , j , k , l , M ) = i = 0 m μ b i j = 1 m i 1 2 π λ D j ! ( T c p ) j k = 1 j C j k N 0 j k l = 1 k M N l C M l ! i = 1 l 2 π α Γ ( d ) . ( 1 ω ) 2 / α ( c T p ) 2 / α m i Γ ( m i 2 α ) Γ ( d + 2 α ) ( λ D E D + λ C E C ) , and the last integral multiplier i , j , k , t , l , M h ( i , j , k , t , l , M ) = i = 0 m μ b i j = 1 m i 1 2 π λ D j ! ( T c p ) j k = 1 j C j k N 0 j k t = 1 k 1 C k t l = 1 t s = 1 k t ( λ D E D ) l ( λ C E C ) s ( M N l C M l ! i = 1 l 2 π α Γ ( d ) . ( 1 ω ) 2 / α ( c T p ) 2 / α m i Γ ( m i 2 α ) Γ ( d + 2 α ) ) ( M N s C M s ! i = 1 s 2 π α Γ ( d ) . ( 1 ω ) 2 / α ( c T p ) 2 / α m i Γ ( m i 2 α ) Γ ( d + 2 α ) )
  • There is a circularity in our CDF, in which, E D depends on the PDF of P D . Thus, by differentiating (17) and making some variables change, we obtain:
E D = i , j f ( i , j ) 0 1 2 A 2 2 j . x j 1 2 α + A 1 x j 2 α + 2 A 3 α x j 1 + 2 A 4 α E D x j 1 . e A 1 x A 3 x 2 / α A 4 . E D . x 2 α d x + 1 2 A 2 2 i , j , k , l g ( i , j , k , l ) 0 ( k 2 l α j ) x 1 + A 1 + 2 α A 3 x 2 α 1 + 2 α A 4 . E D . x 2 α 1 . x 2 l α + j 2 α k . e A 1 x A 3 x 2 / α A 4 . E D . x 2 α d x + 1 2 A 2 2 i , j , k , l h ( i , j , k , l ) 0 ( k 2 ( l + s ) α j ) x 1 + A 1 + 2 α A 3 x 2 α 1 + 2 α A 4 . E D . x 2 α 1 . x 2 ( l + s ) α + j 2 α k . e A 1 x A 3 x 2 / α A 4 . E D . x 2 α d x
with: A 1 = c T N 0 ; A 2 = π λ D ;   A 3 = π ( c T ω ) 2 α . Γ ( 1 2 α ) . Γ ( d + 2 α ) Γ ( d ) λ C E C ;   A 4 = π ( c T ω ) 2 α . Γ ( 1 2 α ) . Γ ( d + 2 α ) Γ ( d ) λ D ;
i , j f ( i , j ) = i = 0 m μ b i j = 0 m i 1 2 π λ D j ! ( T . c ) j . N 0 j ; i , j , k , l g ( i , j , k , l ) = i = 0 m μ b i j = 1 m i 1 2 π λ D j ! ( T c ) j k = 1 j C j k N 0 j k l = 1 k M N l C M l ! i = 1 l 2 π α Γ ( d ) . ( 1 ω ) 2 / α ( c T ) 2 / α m i Γ ( m i 2 α ) Γ ( d + 2 α ) ( λ D E D + λ C E C ) ,
i , j , k , l h ( i , j , k , l ) = i = 0 m μ b i j = 1 m i 1 2 π λ D j ! ( T c ) j k = 1 j C j k N 0 j k t = 1 k 1 C k t l = 1 t s = 1 k t ( λ D E D ) l ( λ C E C ) s ( M N l C M l ! i = 1 l 2 π α Γ ( d ) . ( 1 ω ) 2 / α ( c T ) 2 / α m i Γ ( m i 2 α ) Γ ( d + 2 α ) ) ( M N s C M s ! i = 1 s 2 π α Γ ( d ) . ( 1 ω ) 2 / α ( c T ) 2 / α m i Γ ( m i 2 α ) Γ ( d + 2 α ) )
This result is still difficult to solve analytically, so we should use numerical techniques to solve it.
The convergence of our power distribution is obtained with the Foschini–Miljanic algorithm described in Section 5.
  • Based on Table I in [39], we can obtain many distributions. As the κ - μ distribution is a special case of a κ - μ shadowed distribution (when μ m ), we can easily express our CDF in the case of the κ - μ fading environment by putting m . We will highlight other special cases in the following corollaries, as they have more closed forms.
Corollary 1.
In the Nakagami fading case, the CDF is
P ( P p ) = j f ( j ) 0 r 1 + α j e k 1 r α k 2 r 2 d r + j , k , l , M g ( j , k , l , M ) 0 r 1 + 2 l + α ( j k ) e k 1 r α k 2 r 2 d r + j , k , t , l , s , M h ( j , k , t , l , s , M ) 0 r 1 + 2 ( l + s ) + α ( j k ) e k 1 r α k 2 r 2 d r
The CDF has the same general form, but the external parameters are more simplified:
k 1 = T . N 0 θ . p ,  
k 2 = π λ D + π ( T p ) 2 / α . Γ ( 1 2 / α ) . Γ ( n + 2 / α ) ( n 1 ) ! ( λ D E D + λ C E C ) ,
   j f ( j ) = j = 0 n 1 2 π λ D j ! ( T p θ ) j . N 0 j ,
j , k , l , M g ( j , k , l , M ) = j = 1 n 1 2 π λ D j ! ( T p θ ) j k = 1 j C j k N 0 j k l = 1 k M N l C M l ! i = 1 l 2 π θ 2 / α α ( n 1 ) ! ( T p θ ) 2 / α m i Γ ( m i 2 α ) Γ ( n + 2 α ) ( λ D E D + λ C E C ) ,
j , k , t , l , s , M h ( j , k , t , l , s , M ) = j = 1 n 1 2 π λ D j ! ( T p θ ) j k = 1 j C j k N 0 j k t = 1 k 1 C k t l = 1 t s = 1 k t ( λ D E D ) l ( λ C E C ) s ( M N l C M l ! i = 1 l 2 π θ 2 / α α ( n 1 ) ! ( T p θ ) 2 / α m i Γ ( m i 2 α ) Γ ( n + 2 α ) ) . ( M N s C M s ! i = 1 s 2 π θ 2 / α α ( n 1 ) ! ( T p θ ) 2 / α m i Γ ( m i 2 α ) Γ ( n + 2 α ) )
This result is found by putting κ = 0 , μ = m = n and β = n θ , where n is the shape parameter and θ is the scale parameter of gamma distribution.
Corollary 2.
In the case of Rayleigh fading, the CDF can be written as
P ( P p ) = 0 e k 1 r α / 2 k 2 r d r
with k 1 = T . N 0 σ p ( π λ D ) α / 2 , k 2 = 1 + 1 s i n c ( 2 / α ) ( T p ) 2 α ( E D + λ C λ D E C )
This result is found by putting κ = 0 , μ = m = 1 and β = σ , where σ is the mean of e x p ( 1 / σ ) distribution.
Corollary 3.
In an interference-limited scenario, i.e N 0 0 , the C D F of the D 2 D transmit power in the Rayleigh environment is simplified to
P ( P p ) = 1 1 + ( T p ) 2 α 1 s i n c ( 2 / α ) ( E D + λ C λ D E C )

5. RF Energy-Harvesting Model

In our model, we considered RF energy harvesting for D2D users, where the locations of cellular transmitters contribute to the aggregate RF energy at the D2D harvester. We focused on energy harvesting for D2D users rather than cellular users, since the D2D transmitter requires much less power to communicate over short distances [40]. In addition, similar to [26], we assumed that D2D users cannot simultaneously transmit and harvest RF energy. This is due to the fact that the device can have only one antenna that can be switched between the transmit/receive mode and harvesting mode.

5.1. Expected RF Energy Harvesting Rate

Theorem 2.
The expected RF energy-harvesting rate in the case of Rayleigh fading with mean σ is given as
η = 2 π τ ν e σ λ C E C α / 2 ( α 2 ) R 0 α 2 ,
where τ represents the fraction of the time period where the device harvests the RF energy—that is, 0 < τ 1 ν e  is the RF energy conversion efficiency and  E C = E [ P C 2 / α ] .
Proof. 
The energy is harvested from the interferences in the τ product time frame. Let E [ I C ] be the expectation of the interferences
E [ I C ] = E i { ϕ C } σ . R i , C α E [ P C ] = i { ϕ C } E σ . R i , C α E [ P C ] = σ . E [ P C ] i { ϕ C } E ϕ C [ R i , C α ] = σ . E [ P C ] E ϕ C [ i { ϕ C } R i , C α ] = ( a ) σ . E [ P C ] λ C R 2 x α d x = 2 π σ . E [ P C ] λ C 0 r 1 α d r
where ( a ) follows from Campbell’s theorem. The last integral diverges due to the lower bound, which is a consequence of the path loss law and the property of PPP where nodes can be arbitrarily close. However, in a real scenario, the interferers cannot coexist in the same location as the typical user. Thus, a small distance R 0 from the closest interferer is considered. In addition, assuming that the cellular transmit power is constant, then E [ P C ] = E C α / 2 . Substituting in (23) concludes the proof. □
Corollary 4.
In the case of a relatively lossy environment ( α = 4 ), the energy harvesting rate is expressed as
η = π τ ν e σ λ C ( E C R 0 ) 2 ,

5.2. Energy Utilization Rate

In the case of Rayleigh fading and a noiseless scenario, we express the D2D transmit power expectation as follows:
Lemma 1.
E [ P D ] = P m a x . 2 F 1 ( 1 , α 2 ; α 2 + 1 ; P m a x 2 / α κ )
where  κ = ( T ) 2 / α 1 s i n c ( 2 / α ) ( E D + λ c λ D E C ) ,  E D = κ [ ln ( 1 + P m a x 2 / α κ ) P m a x 2 / α κ + P m a x 2 / α ] and 2 F 1 ( . ) is the hypergeometric function.
Proof. 
Based on the transmit power limitation, we can rewrite the C D F of the D2D transmit power in the case of noiseless communication given in [33] as:
P ( P D p ) = 1 1 + ( β D p ) 2 / α 1 s i n c ( 2 / α ) ( E D + λ c λ D E C ) , i f   p P m a x 1 , i f   p > P m a x
Knowing that E [ P D ] = 0 ( 1 C D F ( x ) ) d x , we can easily obtain the result. □
In the case of α = 4 , E [ P D ] is simplified as in Lemma 2:
Lemma 2.
E [ P D ] = 2 κ 2 P m a x 1 / 2 κ ln ( P m a x 1 / 2 κ + 1 )
where  κ = T π 2 ( E D + λ C λ D E C )  and  E D = κ [ ln ( 1 + P m a x 1 / 2 κ ) P m a x 1 / 2 κ + P m a x 1 / 2 ]
In order to solve the equation of κ , we used the Matlab tool “fsolve”, which uses the trust region dogleg algorithm [41].
We already supposed that the device harvests the energy within a τ fraction of time, and transmits during 1 τ . Assuming that the major energy consumption is due to the transmission operation, we obtain the following result.
Theorem 3.
The energy utilization rate in a noiseless scenario and relatively lossy environment ( α = 4 ) can be expressed as
ν = 2 ( 1 τ ) κ 2 P m a x 1 / 2 κ ln ( P m a x 1 / 2 κ + 1 )

5.3. D2D User Transmission Probability

In the case of α = 4 , and knowing that ρ = m i n ( 1 , η ν ) as defined in [21], we have:
ρ = m i n ( 1 , π τ ν e σ λ C E c 2 2 R 0 2 ( 1 τ ) κ 2 P m a x 1 / 2 κ ln ( P m a x 1 / 2 κ + 1 ) ) ,

6. Numerical Study

This section aims to provide numerical results that validate our finding. We start by presenting the parameters that we used in this assessment. Then, we give the obtained results and provide some interpretations.

6.1. Simulation Parameters

In this work, we considered a hexagonal cell with R c e l l = 250 m, in which, all UEs are uniformly and independently distributed, since the PPP is equivalent to the uniform distribution when the nodes number is already known [42]. For our experiments, we worked with the following values of the used parameters: κ = 5 , μ = 2 , m = 6 , β = 1 , λ C = 10 4 , λ D = 9 × 10 4 , N 0 = 100 dBm, E C = 5 × 10 8 , P m a x = 23 dBm and T = 0 dB. The transmitter power allocation was performed in a distributed fashion using the Foschini–Miljanic algorithm [43]. It allows transmitters devices to select their transmission power to achieve the SINR threshold at all links in a distributed manner. The i t h D2D transmitter calculates its transmit power at k + 1 time by:
P i ( k + 1 ) = ( 1 γ ) P i ( k ) 1 + γ 1 γ T β i ,
where T is the SINR threshold, β i is the actual SINR of the i t h D2D link and γ is the convergence rate constant. Thus, each device i should have the information about the value of γ , T and β i at each time k to execute the algorithm, which converges when T = β i . We set the convergence rate constant to γ = 0.062 .

6.2. Results and Discussions

Figure 3 shows the analytical and simulated transmit power CDF for different values of path loss exponent α . For a large value of α , the power required of each transmitter, in compensation of the severe channel power attenuation, becomes large. In addition, we can clearly observe that the analytical curves match the simulation ones.
Now, we want to investigate the behavior of our transmit power CDF with regard to different values of the parameter κ . We used the following simulation parameters: the densities λ C = λ D = 10 4 , the fading parameters m = 7 , μ = 1 , β = 0.01 , α = 3 , E C = 5 × 10 8 W 2 / 3 and SINR threshold as T = 0 dB. Figure 4 shows that, when κ 0 (in the case of Nakagami and Rayleigh fading), i.e the fading power of dominant components becomes negligible, the C D F decreases, i.e., the needed transmit power becomes large. Since increasing κ reduces the fading severity, the C D F curves shifts to the left, i.e., the transmit power decreases. In addition, as depicted in this figure, we observe that the transmit power CDF curves become likely identical when the parameter κ increases. This result is explained by the fact that, when κ increases, the PDF of the fading channel becomes slowly dependent on this parameter. Figure 5 depicts the transmit power CDF for different values of the parameter m. In this experimentation, we worked with the same parameters as above, with κ = 10 . We noticed that, for large values of m, the C D F curve shifts to the left side, i.e., for a specified power, the C D F becomes large when m grows, which means that the required transmit power decreases. The reason behind this is that lower values of m means a larger probability of having low S I N R values, i.e., a larger fading severity. When m grows, the effect of line of sight (LOS) fluctuation vanishes and the S I N R values tend to be more concentrated around its mean value (see Figure 4 in [15]).
In the last assessment, we considered the energy harvesting in the transmitter devices. The used parameters were as follows: β = 1 , α = 4 , τ = 0.99 , E C = 5 × 10 3 W 1 / 2 and T = 10 dB; the channel power is considered as exponential, with mean σ = 1 , as the channel is assumed to be Rayleigh. Figure 6 depicts the variation in the user transmission probability (the parameter ρ ). As represented, the simulation and analytic results match well. We can observe from this figure that the values of ρ are much less than 1. However, when the cell-users’ density increases, the user transmission probability increases since more cellular equipments are present in the neighborhood of devices; then, they can harvest more energy that they exploit to transmit data. Considering the harvested energy, it appears more interesting to gather energy from the down-link channel rather than the up-link one since the base station can transmit energy with relatively higher power compared to users’ equipment, and then more energy can be harvested.

7. Conclusions

In this work, we derived the transmit power distribution of a D2D communication under a κ - μ shadowed fading channel using stochastic geometry and considering an underlaid situation of spectrum sharing. Exploiting the finding, we derived the transmit power CDF of some special cases of fading channels—Nakagami and Rayleigh—and we also provided a simple-form CDF in the case of na noiseless environment. Based on the case of Rayleigh fading, we investigated the mechanism of harvesting the RF energy for the device transmitter from its cellular interferers. The simulations showed a good correspondence between the analytical and numerical results, which confirms the validity of our analysis.

Author Contributions

Conceptualization, A.B. and O.Z.; methodology, A.B. and O.Z.; validation, A.B., O.Z., H.E.F. and R.S.; formal analysis, A.B.; investigation, A.B.; writing—original draft preparation, A.B., O.Z. and H.E.F.; writing—review and editing, A.B., O.Z., H.E.F. and R.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shafique, K.; Khawaja, B.A.; Sabir, F.; Qazi, S.; Mustaqim, M. Internet of Things (IoT) for Next-Generation Smart Systems: A Review of Current Challenges, Future Trends and Prospects for Emerging 5G-IoT Scenarios. IEEE Access 2020, 8, 23022–23040. [Google Scholar] [CrossRef]
  2. Porambage, P.; Gur, G.; Osorio, D.P.M.; Liyanage, M.; Gurtov, A.; Ylianttila, M. The roadmap to 6G security and privacy. IEEE Open J. Commun. Soc. 2021, 2, 1094–1122. [Google Scholar] [CrossRef]
  3. Kar, U.N.; Sanyal, D.K. An overview of device-to-device communication in cellular networks. ICT Express 2018, 4, 203–208. [Google Scholar] [CrossRef]
  4. Alnoman, A.; Anpalagan, A. On D2D communications for public safety applications. In Proceedings of the 2017 IEEE Canada International Humanitarian Technology Conference (IHTC), Toronto, ON, Canada, 21–22 July 2017; pp. 124–127. [Google Scholar] [CrossRef]
  5. Goratti, L.; Steri, G.; Gomez, K.M.; Baldini, G. Connectivity and security in a D2D communication protocol for public safety applications. In Proceedings of the 2014 11th International Symposium on Wireless Communications Systems (ISWCS), Barcelona, Spain, 26–29 August 2014; pp. 548–552. [Google Scholar] [CrossRef]
  6. Liu, J.; Kato, N.; Ma, J.; Kadowaki, N. Device-to-Device Communication in LTE-Advanced Networks: A Survey. IEEE Commun. Surv. Tutor. 2014, 17, 1923–1940. [Google Scholar] [CrossRef]
  7. Han, L.; Zhang, Y.; Zhang, X.; Mu, J. Power Control for Full-Duplex D2D Communications Underlaying Cellular Networks. IEEE Access 2019, 7, 111858–111865. [Google Scholar] [CrossRef]
  8. Wen, S.; Zhu, X.; Lin, Z.; Zhang, X.; Yang, D. Energy Efficient Power Allocation Schemes for Device-to-Device(D2D) Communication. In Proceedings of the 2013 IEEE 78th Vehicular Technology Conference (VTC Fall), Las Vegas, NV, USA, 2–5 September 2013; pp. 1–5. [Google Scholar] [CrossRef]
  9. Bulashenko, A.; Piltyay, S.; Demchenko, I. Energy Efficiency of the D2D Direct Connection System in 5G Networks. In Proceedings of the 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, Ukraine, 6–9 October 2020; pp. 537–542. [Google Scholar] [CrossRef]
  10. Nguyen, K.K.; Duong, T.Q.; Vien, N.A.; Le-Khac, N.-A.; Nguyen, M.-N. Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach. IEEE Access 2019, 7, 100480–100490. [Google Scholar] [CrossRef]
  11. Doan, T.X.; Hoang, T.M.; Duong, T.Q.; Ngo, H.Q. Energy Harvesting-Based D2D Communications in the Presence of Interference and Ambient RF Sources. IEEE Access 2017, 5, 5224–5234. [Google Scholar] [CrossRef]
  12. Sun, P.; Shin, K.G.; Zhang, H.; He, L. Transmit Power Control for D2D-Underlaid Cellular Networks Based on Statistical Features. IEEE Trans. Veh. Technol. 2017, 66, 4110–4119. [Google Scholar] [CrossRef]
  13. Paris, J.F. Statistical Characterization of κ-μ Shadowed Fading. IEEE Trans. Veh. Technol. 2014, 63, 518–526. [Google Scholar] [CrossRef]
  14. Goswami, A.; Kumar, A. Statistical Characterization and Performance Evaluation of α-η-μ/Inverse Gamma and α-κ-μ/Inverse Gamma Channels. Wirel. Pers. Commun. 2022, 124, 2313–2333. [Google Scholar] [CrossRef]
  15. Ramirez-Espinosa, P.; Moualeu, J.M.; da Costa, D.B.; Lopez-Martinez, F.J. The α-κ-μ Shadowed Fading Distribution: Statistical Characterization and Applications. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Big Island, HI, USA, 9–13 December 2019. [Google Scholar]
  16. Hunukumbure, M.; Moulsley, T.; Oyawoye, A.; Vadgama, S.; Wilson, M. D2D for energy efficient communications in disaster and emergency situations. In Proceedings of the 2013 21st International Conference on Software, Telecommunications and Computer Networks—(SoftCOM 2013), Split-Primosten, Croatia, 18–20 September 2013; pp. 1–5. [Google Scholar] [CrossRef]
  17. Anamuro, C.V.; Varsier, N.; Schwoerer, J.; Lagrange, X. Simple modeling of energy consumption for D2D relay mechanism. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Barcelona, Spain, 15–18 April 2018; pp. 231–236. [Google Scholar] [CrossRef]
  18. Shang, B.; Zhao, L.; Chen, K.-C.; Chu, X. Energy Efficient D2D-Assisted Offloading with Wireless Power Transfer, GLOBECOM 2017. In Proceedings of the 2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar] [CrossRef]
  19. Amiri, M.H.Z.; Nazemi, A.M.; Namazi, M.; Amri, K.J.; Amiri, F.Z. Energy Saving in D2D Cellular 6G Networks. In Proceedings of the 2020 10th International Conference on Computer and Knowledge Engineering (ICCKE), Mashhad, Iran, 29–30 October 2020; pp. 676–682. [Google Scholar] [CrossRef]
  20. Zytoune, O.; Fouchal, H.; Zeadally, S. A realistic relay selection scheme for cooperative MIMO networks. Ad Hoc Netw. 2022, 124, 102706. [Google Scholar] [CrossRef]
  21. Atat, R.; Liu, L.; Mastronarde, N.; Yi, Y. Energy Harvesting-Based D2D-Assisted Machine-Type Communications. IEEE Trans. Commun. 2017, 65, 1289–1302. [Google Scholar] [CrossRef]
  22. Lu, X.; Wang, P.; Niyato, D.; Kim, D.I.; Han, Z. Wireless Networks With RF Energy Harvesting: A Contemporary Survey. IEEE Commun. Surv. Tutor. 2015, 17, 757–789. [Google Scholar] [CrossRef]
  23. Atat, R.; Chen, H.; Liu, L. Fundamentals of spatial RF energy harvesting for D2D cellular networks. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar]
  24. Zungeru, A.M.; Ang, L.-M.; Prabaharan, S.R.S.; Seng, K.P. Radio frequency energy harvesting and management for wireless sensor networks. In Green Mobile Devices and Networks; Venkataraman, H., Muntean, G.-M., Eds.; CRC Press: Boca Raton, FL, USA, 2012; Chapter 13; pp. 341–368. [Google Scholar]
  25. Lee, S.; Zhang, R.; Huang, K. Opportunistic wireless energy harvesting in cognitive radio networks. IEEE Trans. Wirel. Commun. 2013, 12, 4788–4799. [Google Scholar] [CrossRef]
  26. Yang, H.H.; Lee, J.; Quek, T.Q.S. Heterogeneous cellular network with energy harvesting-based D2D communication. IEEE Trans. Wirel. Commun. 2016, 15, 1406–1419. [Google Scholar] [CrossRef]
  27. Wang, Y.; Liu, Y.; Wang, C.; Li, Z.; Sheng, X.; Lee, H.G.; Chang, N.; Yang, H. Storage-less and converter-less photovoltaic energy harvesting with maximum power point tracking for internet of things. IEEE Trans. Comput.-Aided Design Integr. Circuits Syst. 2016, 35, 173–186. [Google Scholar] [CrossRef]
  28. Zeb, H.; Gohar, M.; Ali, M.; Rahman, A.U.; Ahmad, W.; Ghani, A.; Choi, J.-G.; Koh, S.-J. Zero Energy IoT Devices in Smart Cities Using RF Energy Harvesting. Electronics 2023, 12, 148. [Google Scholar] [CrossRef]
  29. Luo, Y.; Pu, L.; Lei, L. Impact of Varying Radio Power Density on Wireless Communications of RF Energy Harvesting Systems. IEEE Trans. Commun. 2021, 69, 1960–1974. [Google Scholar] [CrossRef]
  30. Oulcaid, M.; El Fadil, H.; Njili, S.; Zytoune, O.; Bajit, A. Experimental Implementation of a Wireless Communication System for Electric Vehicle WPT Charger. E3S Web Conf. 2022, 351, 01006. [Google Scholar] [CrossRef]
  31. Sun, C.; Alemseged, Y.D.; Tran, H.N.; Harada, H. Transmit Power Control for Cognitive Radio Over a Rayleigh Fading Channel. IEEE Trans. Veh. Technol. 2010, 59, 1847–1857. [Google Scholar] [CrossRef]
  32. Erturk, M.C.; Mukherjee, S.; Ishii, H.; Arslan, H. Distributions of Transmit Power and SINR in Device-to-Device Networks. IEEE Commun. Lett. 2013, 17, 273–276. [Google Scholar] [CrossRef]
  33. Banagar, M.; Maham, B.; Popovski, P.; Pantisano, F. Power Distribution of Device-to-Device Communications in Underlaid Cellular Networks. IEEE Commun. Lett. 2016, 5, 204–207. [Google Scholar] [CrossRef] [Green Version]
  34. Boumaalif, A.; Zytoune, O. Power Distribution of Device-to-Device Communications Under Nakagami Fading Channel. IEEE Trans. Mob. Comput. 2022, 21, 2158–2167. [Google Scholar] [CrossRef]
  35. ElHalawany, B.M.; Jameel, F.; da Costa, D.B.; Dias, U.S.; Wu, K. Performance Analysis of Downlink NOMA Systems Over κ-μ Shadowed Fading Channels. IEEE Trans. Veh. Technol. 2020, 69, 1046–1050. [Google Scholar] [CrossRef]
  36. Lopez-Martinez, F.J.; Paris, J.F.; Romero-Jerez, J.M. The κ-μ Shadowed Fading Model With Integer Fading Parameters. IEEE Trans. Veh. Technol. 2017, 66, 7653–7662. [Google Scholar] [CrossRef]
  37. Schilcher, U.; Toumpis, S.; Haenggi, M.; Crismani, A.; Brandner, G.; Bettstetter, C. Interference Functionals in Poisson Networks. IEEE Trans. Inf. Theory 2016, 62, 370–383. [Google Scholar] [CrossRef]
  38. Andrews, J.G.; Baccelli, F.; Ganti, R.K. A Tractable Approach to Coverage and Rate in Cellular Networks. IEEE Trans. Commun. 2011, 59, 3122–3134. [Google Scholar] [CrossRef]
  39. Moreno-Pozas, L.; Lopez-Martinez, F.J.; Paris, J.F.; Martos-Naya, E. The κ-μ Shadowed Fading Model: Unifying the κ-μ and η-μ Distributions. IEEE Trans. Veh. Technol. 2016, 65, 9630–9641. [Google Scholar] [CrossRef]
  40. Drayson Technologies. RF Energy Harvesting for the Low Energy Internet of Things. 2015, pp. 1–7. Available online: http://www.getfreevolt.com (accessed on 8 May 2012).
  41. Powell, M.J.D. A Fortran Subroutine for Solving Systems of Nonlinear Algebraic Equations. In Numerical Methods for Nonlinear Algebraic Equations; Rabinowitz, P., Ed.; Gordon and Breach: London, UK, 1970; Chapter 7. [Google Scholar]
  42. Stoyan, D.; Kendall, W.; Mecke, J. Stochastic Geometry and Its Applications, 3rd ed.; John Wiley & Sons: Hoboken, NJ, USA, 2013. [Google Scholar]
  43. Foschini, G.J.; Miljanic, Z. A Simple Distributed Autonomous Power Control Algorithm and its Convergence. IEEE Trans. Veh. Technol. 2002, 42, 641–646. [Google Scholar] [CrossRef]
Figure 1. D2D communications—interference challenge.
Figure 1. D2D communications—interference challenge.
Jsan 12 00016 g001
Figure 2. System model.
Figure 2. System model.
Jsan 12 00016 g002
Figure 3. CDF of the transmit power for different values of α .
Figure 3. CDF of the transmit power for different values of α .
Jsan 12 00016 g003
Figure 4. CDF of the transmit power for different values of κ .
Figure 4. CDF of the transmit power for different values of κ .
Jsan 12 00016 g004
Figure 5. CDF of the transmit power for different values of m.
Figure 5. CDF of the transmit power for different values of m.
Jsan 12 00016 g005
Figure 6. D2D user transmission probability ρ vs. λ C .
Figure 6. D2D user transmission probability ρ vs. λ C .
Jsan 12 00016 g006
Table 1. Contribution of this work related to literature review.
Table 1. Contribution of this work related to literature review.
PaperCellular/D2D Frequency BandChannel FadingContribution
Sun et al. [31]Ad hoc networksRayleighTransmit power CDF
Erturk et al. [32]differentRayleighTransmit power CDF and SINR
Banagar et al. [33]sameRayleighTransmit power CDF
Boumaalif et al. [34]sameNakagamiTransmit power CDF and device lifetime
Our present worksame κ - μ shadowedTransmit power CDF and user transmit probability in case of energy harvesting
Table 2. List of abbreviations.
Table 2. List of abbreviations.
AbbreviationSignification
D2DDevice-to-Device
CDFCumulative Distribution Function
RF-EHRadio Frequency Energy Harvesting
IoTInternet of Things
CSIChannel State Information
LOSLine-Of-Sight
SINRSignal to Interference plus Noise Ratio
PPPPoisson Point Processes
PDFProbability Density Function
CCDFComplementary Cumulative Distribution Function
PGFLProbability Generating Functional
Table 3. List of variables.
Table 3. List of variables.
VariableSignification
Φ C The location of cellular equipments following independent homogeneous PPP
Φ D The location of D2D equipments following independent homogeneous PPP
λ C The intensity of Φ C
λ D The intensity of Φ D
HThe fading power
f H ( x ) The PDF of H
F ¯ H ( x ) The CCDF of H
P 0 The typical D2D transmitter transmit power
H 0 The fading power in the typical D2D communication channel
R 0 The distance between the typical D2D transmitter and receiver
P r The received power in the typical D2D link
I D The interference caused by the other D2D transmitters to the typical D2D receiver
I C The interference caused by all cellular transmitters to the typical D2D receiver
S I N R The S I N R at the typical D2D receiver
N 0 The noise power
TThe minimum S I N R threshold
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Boumaalif, A.; Zytoune, O.; El Fadil, H.; Saadane, R. Power Distribution of D2D Communications in Case of Energy Harvesting Capability over κ-μ Shadowed Fading Conditions. J. Sens. Actuator Netw. 2023, 12, 16. https://doi.org/10.3390/jsan12010016

AMA Style

Boumaalif A, Zytoune O, El Fadil H, Saadane R. Power Distribution of D2D Communications in Case of Energy Harvesting Capability over κ-μ Shadowed Fading Conditions. Journal of Sensor and Actuator Networks. 2023; 12(1):16. https://doi.org/10.3390/jsan12010016

Chicago/Turabian Style

Boumaalif, Adil, Ouadoudi Zytoune, Hassan El Fadil, and Rachid Saadane. 2023. "Power Distribution of D2D Communications in Case of Energy Harvesting Capability over κ-μ Shadowed Fading Conditions" Journal of Sensor and Actuator Networks 12, no. 1: 16. https://doi.org/10.3390/jsan12010016

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop