Skip to main content

Performance evaluation of pair selection algorithms in device-to-device communication using relay-assisted techniques

Abstract

Communication services that are dependable are crucial, particularly during emergencies when the regular infrastructure for communication may be disrupted or nonexistent. In such situations, device-to-device (D2D) communication can be a helpful choice since it allows user equipment (UE) that is close to one another to connect directly, bypassing the cellular network infrastructure. The primary focus of this thesis is the application of D2D communication in a decentralized emergency scenario with a damaged eNodeB. The main objective is to find an appropriate strategy for finding and selecting D2D couples by simulating several methods in MATLAB. This study compares three D2D pair selection algorithms: distance-based, Signal-to-Interference and Noise Ratio (SINR)-based, and data rate-based distance-based. The simulation results show that the data rate-based strategy is the most effective method for selecting D2D couples in emergency scenarios. In contrast to algorithms that rely on distance and SINR, this one reduces the chance of an outage by 20%. Bit error rate (BER), capacity, spectral efficiency, and energy efficiency are the three types of links that are assessed: direct links, relay links, and UE relay links. The results show that, with the lowest BER and maximum data throughput, the direct link is the most reliable and efficient communication option. However, the relay connection and the UE relay link show better overall spectral efficiency in comparison to the direct link, indicating their ability to transport more data per unit of bandwidth. The option that consumes the least energy among the three is the direct link. The study demonstrates the great potential of D2D communication in emergency scenarios where conventional communication infrastructure may not be available. The direct link is the most dependable and effective alternative for communication, according to the data, although the UE link can still function effectively in the event that the direct link is compromised. The data rate-based method is a useful strategy for finding and choosing D2D partners. The results of this study can direct the development of D2D emergency communication solutions in 5G networks.

1 Introduction

Among the most significant events that harm infrastructure globally are disasters like earthquakes, landslides, and tornadoes [1, 2]. Between individuals and disaster management agencies, communication is essential for the post-disaster period [3,4,5]. Rapid and precise information gathering from the disaster area can help governments accomplish effective disaster management [6, 7]. Communication can break down during or after a disaster because of damage to the infrastructure supporting it or because users are overburdened trying to stay in touch with friends and family. As a result, rescue workers cannot observe disaster victims, and they are unable to contact people outside of the damaged area [8, 9]. By lowering call volume in the cellular communication network, D2D communication technology offers communication services in catastrophe scenarios without the aid of network infrastructure [10,11,12]. D2D communication technology is anticipated to be essential in next-generation 5G communication networks since everyone will be using smart mobile devices (UEs) [13, 14]. In terms of post-disaster search, rescue, and communication, the D2D system is unique. According to the base station's (BS) signal coverage, recent D2D research can be classified into coverage areas and out of coverage areas [15, 16]. The UEs can communicate with other UEs within the coverage region as well as with central BSs.

Device discovery and communication are the two fundamental components of D2D communication. Finding neighboring devices to create a direct communication link (direct mode) is the process of D2D discovery. Direct discovery and evolved packet core-level discovery are the two categories of device discovery [17]. In the event of direct discovery, the UE independently looks for adjacent UE devices; in order for this process to function well, UE devices must take part in the device discovery. People who study the Public Security Network (PSN) mostly use D2D discovery to look into schema design [18], routing (multihop) [19,20,21,22], clustering [23, 24], energy-spectrum efficiency [25,26,27], performance evaluation [28, 29], and UE discovery [30, 31].

A key factor in peer-to-peer (P2P) discovery is the SINR measure. Some D2D discovery algorithms are suggested in Osman's paper [31], based on SINR measurements and UE distances. The short-distance algorithm, Maximum SINR with no limit on the distance of discovery, and Maximum SINR with a limit on the distance of discovery are these. The short-distance-based algorithm only chooses the two closest couples after finding the D2D pairs based on the shortest distance. The second discovery algorithm locates D2D couples based on the greatest SINR between UEs without a distance cap. The third discovery method looks for D2D couples with high SINR values within a set distance. These methods do have some flaws and weak spots, though. UEs are more likely to communicate if there are more matching D2D pairings.

Conventional modes of communication, which include email, cell phone, and telephone, ought to be considered a disaster in the event that they are accessible. Whereas both natural and man-made events may restrict at least one of these interchange mediums, as a rule, no less than one stays feasible. Depending on the extent of the catastrophe, setting up correspondence might be more troublesome and require inventiveness. In these cases, non-conventional specialized techniques, for example, satellite telephones and hand-held radios, ought to be used. Away from these resources, singular innovativeness must be gotten to endure requests to set up correspondence, yet endeavors in such a manner must not stop until correspondence is built up.

An emergency communication system (ECS) is any system that is organized for the primary purpose of supporting one-way and two-way communication of emergency information between both individuals and groups of individuals. These systems are commonly designed to convey information over multiple types of devices, from signal lights to text messaging to live, streaming video, forming a unified communication system intended to optimize communications during emergencies. Contrary to emergency notification systems, which generally deliver emergency information in one direction, emergency communication systems are typically capable of both initiating and receiving information from multiple parties. These systems are often made up of both input devices, sensors, and output/communication devices. Therefore, the origination of information can occur from a variety of sources and locations, from which the system will disseminate that information to one or more target audiences.

A throughput-based discovery algorithm is suggested in this article [32] to locate D2D peers among devices on the PSN in the aftermath of a disaster. A test case was made to see how well the suggested algorithm worked. It was compared to other discovery algorithms, such as a short distance-based algorithm, a maximum SINR algorithm with no limit on the distance, and a maximum SINR algorithm with a limit on the distance. For D2D discovery in the disaster region, the suggested throughput discovery algorithm outperformed the existing discovery algorithms.

D2D communication enhances network performance and cost-effectiveness for both 3GPP (Third Generation Partnership Project) and LTE (Long Term Evolution) cellular networks. D2D communication specifically enhances network effectiveness, end-to-end latency, resource usage, and energy efficiency. D2D enables a wide range of applications concurrently, including social networks, data exchange, and games. As a result, enabling D2D communication over LTE dramatically enhances network performance. In 3GPP, LTE version 12 [7, 33, 34], ProSe (Proximity Service) is used for D2D communication. D2D communication and discovery are essential components of the ProSe D2D service. The 3GPP looked at the architecture of the D2D system that supports the ProSe service, which consists of D2D communication and discovery. In LTE version 13, the use of D2D/ProSe and important communications like 3GPP, small cells, resource efficiency, spectrum bands, and heterogeneous networks got better. In particular, version 13 also kept up with version 12's public safety features, such as D2D discovery based on LTE and D2D communications, which are necessary for public security. The partial coverage and extension coverage for out-of-coverage aspects of D2D communication have also been improved [7, 16].

In Doppler and colleagues' study, D2D communication, which is the basis of the 3GPP LTE-Advanced (LTE-A) cell phone network, was seen as a way to improve regional services while causing little to no interference on the main cell phone network [35]. Innovative management methods for D2D communication processes and their session setup in the LTE network were put forth. Another work by Doppler and his associates proposed a revolutionary beaconing technique for a service and device discovery radio. The orthogonal frequency-division multiple access concept and the LTE beacon structure serve as the foundation for this system. Energy consumption analysis has shown that devices like smartphones can construct a background network using the suggested marking method without significantly reducing standby operating time [36].

To enable D2D communication in conventional LTE cellular networks, Tang and her colleagues' study tackled the issue of neighbor discovery. When LTE was deployed, the effectiveness of the neighbor detection methods that were suggested was assessed [37] in terms of several system metrics. In order to compare the performances of three discovery resource selection algorithms, such as the greedy, random, and coordinated algorithms, Simsek and her friends suggest a system-level simulator based on 3GPP [38]. The findings indicate that the random technique is inferior to the other algorithms. The approach was suggested and examined for the finding of neighboring nodes in wireless networks in the paper by Vasudevan and his colleagues. An ALOHA-like neighbor discovery approach was given with a single-hop wireless node network in the same article [39]. Sun and his friends present a friend-neighbor discovery protocol scheme. This plan was put forth by placing handshaking subgroups in front of regular slots [40].

Yang and his coworkers presented an LTE-A network distributed mapping protocol. To lower the amount of resources used during discovery, this study suggested a method similar to the adaptive FlashLinqQ structure that is based on the number of D2D UEs that were asked. Comparing P2P and UE finding times was done in the same study [41]. Zou and her colleagues studied a signal and came up with the idea that it could be the discovery signal that starts P2P communication at the physical layer level of an orthogonal frequency-division multiple access cellular system. The suggested signal has low overhead, good noise tolerance, and high power efficiency [42]. Another piece of research by Zou and her colleagues offered a signature-based discovery technique as a hypothetical example for cellular networks [43]. In their paper [44], Yang and his colleagues talked about how to design an LTE cellular network that uses a marker along with the usual packet-based method to find devices. This method is similar to the FlashLinqQ structure. To secure D2D communication, Hayat and his friends presented the sphere decoder-like discovery technique inside a lattice area with a radius of R [45]. The study by Fodor and his colleagues came up with the idea of procedure-based clustering, which is a way to design a system that combines cellular and particular modes of operation. The dependability of this system has been enhanced to rely on LTE network substructure nodes, specifically D2D communication. The Mobile and Wireless Communications Enablers for the 2020 Information Society, which is the European 5G research project, acknowledges the suggested method as a technological component of 5G [24].

For virtual and distributed LTE mobile networks, Gomez and her colleagues came up with the hybrid base station method to make UE, eNBs, and the evolved packet core less dependent on each other [18]. In a fully utilized cellular network for D2D communication, Yuan and his coworkers jointly provided dynamically chosen multi-path routes. Communication infrastructure is harmed in their study's "modeling scenario" of a terrorist attack in Ottawa. It has been demonstrated that interference-aware routing performs superiorly to shortest-path routing and broadcast routing [46]. An overview of 3GPP ProSE was provided in Lin and colleagues' work. In the absence of cellular networks, LTE devices with D2D capability were said to work better on PSN than on commercial networks [17].

In their study, Babun and his colleagues looked at D2D communication as a way to expand the coverage of active BSs in the event that the PSN had insufficient coverage. In order to take into account PSN scenarios that are 3GPP standard-compliant, a system-level simulator for HetNet and D2D technologies was presented. The simulator was employed to demonstrate D2D multi-hop communication performance in cellular networks with partial coverage [22].

The performance of transmission architectures backed by relays, which can boost PSN capacity and power savings, was the main emphasis of Kamran and his colleagues' study. In order to reduce power transfer and computational complexity, a distance-based technique was also developed [47]. In a different project, Kamran and his buddies were given the idea to use a clustering process to create a system structure that combined D2D and cellular working modes. To facilitate PSN, and particularly D2D communication, this technique relies on the availability of substructure nodes [10]. Another study that Kamran and his friends presented concentrated on the reuse mode in terms of spectrum efficiency. In order to increase the lifespan of the energy-constrained network, simultaneous wireless information, power transmission, and energy harvesting were implemented in the relay (R). When the cellular infrastructure is partially broken, the cluster construction technique, along with D2D communication, can be integrated into cellular networks to maintain communication services [23]. Wang and his coworkers concentrated on restoring the post-disaster network's capacity using the acclaimed Steiner Tree. Using a multi-hop approach, it was intended to restore the network from the still-running BS to the out-of-service evacuation locations. Utilizing BS data, the actual evacuation site in the city of Tokyo, and big data analysis based on the post-disaster service model, the proposed plan was reviewed in order to more precisely convey the assessment results [48]. Osman's study looked at D2D communication and discovery techniques in 5G communication systems. This study found the output D2D percentages from D2D devices that were placed at random. It also compared the short distance-based, maximum SINR with no distance-based limit, and maximum SINR with a distance-based limit algorithms for single and multiple cells [33]. The capacity, bandwidth, spectrum, and energy efficiency estimates in the LTE network standard were looked into for an example scenario in the study by Marttin and his colleagues. As the communication distance between the D2D increases, it was demonstrated in this study that the energy efficiency of the UE with a large bandwidth decreases quickly in comparison to the UE with a small bandwidth [26]. In the study by Hossain and his associates, a unique technique called SmartDR was suggested that uses smartphones to aid in post-disaster recovery. This approach incorporates D2D neighbor finding and multihop routing [49]. Under the name SSA, Hayat and his coworkers introduced the device discovery-based scanning technique for the cell sector. According to the received signal strength in a particular area, this technique uses random walk and velocity scenarios [30].

The harmonic Sierpinski gasket can be used as a geometric configuration of small antennas, and its performance can be characterized by the associated entropy. The theory of harmonic functions can be generalized to the Sierpinski gasket through the concept of energy, which enables the study of probability theory and harmonic analysis [50]. Fractal geometry is used in modeling natural phenomena, image compression, and data analysis [51]. The key factors that affect fusion performance in multi-resolution decomposition algorithms include the number of decomposition levels, the choice of filter, and the shift-invariant property. The appropriate setting for the number of decomposition levels is four, which is a trade-off between the capability of catching spatial details and the sensitivity to noise and transform artifacts. Short filters usually provide better fusion results than long filters, and the shift-invariant property is important for image fusion, not only for misregistered images but also for strictly registered source images. The latest image decomposition methods, such as curvelet and contourlet, have been introduced to pursue a "true" two-dimensional transform that can capture the intrinsic geometrical structure of images. In comparison to traditional methods like wavelet, the experimental results show that the curvelet and contourlet methods perform better in image fusion, especially for multi-modality images. The dual-tree complex wavelet (DTCWT) and stationary wavelet transform (SWT), which produce results that are similar to those of the nonsubsampled contourlet transform (NSCT), are typically the next best performers. The curvelet transform (CVT) performs better than the discrete wavelet transform (DWT) for multi-focus images, while the DWT presents better results than CVT for infrared-visible images and medical images. The contourlet transform (CT) is the worst one [52]. This work discusses a wavelet expansion theory for positive definite distributions on the real line and defines a fractional derivative operator for complex functions in the sense of distributions. The Ortigueira-Caputo fractional derivative operator is rewritten as a convolution product using the fractional calculus of real distributions. This lets us describe the complex fractional derivative using theoretical distributions. In particular, the fractional derivative of the Gabor-Morlet wavelet is computed together with its plots and main properties [53]. This work delves into the analysis of Chebyshev wavelets' differentiability and explores the potential application of their derivatives in reconstructing functions. It looks closely at the unique features that make Chebyshev wavelets unique. These features are shown using connection coefficients in finite series that include the Kronecker delta. Moreover, the investigation delves into the p-order derivative of Chebyshev wavelets and computes its Fourier transform. The introduction of the Taylor expansion of the mother wavelet facilitates the introduction of the concept of local fractional derivatives for Chebyshev wavelets. Adding local fractional calculus to these wavelet bases makes it possible for local fractional derivatives to be used on functions that are not smooth and continuous [54].

This work deals with an emergency situation in which there is no proper infrastructure for the network considered. In such a situation, the main aim of this work is to send the information to the destination. In the D2D algorithm, the first step is identifying the availability of any D2D device. If a device is identified, it communicates with it. It identifies the following device and sends data in the following step to make sure the receiving device receives it. Since it is in an emergency situation and communicating without infrastructure, this work is not worried about low efficiency and waste of resources. The only concern is information delivery.

2 Methods/Experimental

By using model equations, the D2D discovery system model is explained briefly in this section. When device detection is successful, UEs can intercommunicate right away via D2D communication. As an example of a scenario, Fig. 1 depicts the D2D system model for device discovery in a single cell. The orange dashed lines in this figure show the interference between D2D transmitters and receivers, whereas the blue solid lines show the direct connection between UE pairs.

Fig. 1
figure 1

Model of the D2D discovery system in a single cell [35]

Allow S to be the power of the incoming signal, I to be the power of the other signals' interference inside the network, and N to be the noise.

The D2D discovery system model's SINR metric (\(\upgamma\)) can be calculated using the formula

$$\upgamma =\frac{{\text{S}}}{{\text{I}}+{\text{N}}}$$
(1)

Assume that \({{\text{S}}}^{({\text{i}},{\text{j}})}\) is the signal power between the ith and jth User Equipments; Transmitting power is denoted by \({{\text{P}}}_{{\text{T}}}^{({\text{i}},{\text{j}})}\); \({{\text{G}}}_{{\text{T}}}^{({\text{i}},{\text{j}})}\) and \({{\text{G}}}_{{\text{R}}}^{({\text{i}},{\text{j}})}\) represent transmitter and receiver antenna gains, respectively; \({\text{PL}}\) indicates path loss; \({{\text{d}}}_{{\text{i}},{\text{j}}}\) is the distance between the ith and jth User Equipments; and the fading coefficient is denoted by \({{\text{h}}}_{{\text{i}}}\). Using Eq. 2, one may determine the power of the incoming signal S.

$${{\text{S}}}^{({\text{i}},{\text{j}})}={{\text{G}}}_{{\text{T}}}^{({\text{i}},{\text{j}})}{{\text{G}}}_{{\text{R}}}^{({\text{i}},{\text{j}})}{{\text{P}}}_{{\text{T}}}^{({\text{i}},{\text{j}})}{\text{PL}}{({{\text{d}}}_{{\text{i}},{\text{j}}})}^{-1}{\left|{{\text{h}}}_{{\text{i}}}\right|}^{2}$$
(2)

Equation (3) provides the formula needed to calculate interference between the ith and jth User Equipments:

$${{\text{I}}}^{({\text{i}},{\text{j}})}=\sum_{{\text{k}}=1,\mathrm{ k}\ne {\text{i}},{\text{j}}}^{{\text{K}}}{{\text{G}}}_{{\text{T}}}^{({\text{k}},{\text{j}})}{{\text{G}}}_{{\text{R}}}^{({\text{k}},{\text{j}})}{{\text{P}}}_{{\text{T}}}^{({\text{k}},{\text{j}})}{\text{PL}}{({{\text{d}}}_{{\text{k}},{\text{j}}})}^{-1}{\left|{{\text{h}}}_{{\text{k}}}\right|}^{2}$$
(3)

where \({{\text{I}}}^{({\text{i}},{\text{j}})}\) indicates interference between the transmitter (the ith UE) and the receiver (the jth UE). The SINR metric is computed using Additive White Gaussian Noise as the noise.

Below are the path loss model, Log-Normal Shading model [55], and constant propagation loss [56]:

$${\text{PL}}\left({\text{d}}\right)=\overline{{\text{PL}} }\left({{\text{d}}}_{0}\right)+10{\text{nlog}}\left(\frac{{\text{d}}}{{{\text{d}}}_{0}}\right)+{{\text{X}}}_{\upsigma }$$
(4)

where the random shadowing effect is represented by \({{\text{X}}}_{\upsigma }\), the reference distance is represented by \({{\text{d}}}_{0}\), and \({\text{n}}\) is the route loss exponent.

Equation (5) provides the route loss at the reference distance (\({{\text{d}}}_{0}\)), or \(\overline{{\text{PL}} }\left({{\text{d}}}_{0}\right)\).

$$\overline{{\text{PL}} }\left({{\text{d}}}_{0}\right)=22.7+26{\text{log}}({f}_{c})$$
(5)

"\({(f}_{c})\)" represents the frequency of transmission. Separate consideration is given to the distances for every D2D point. In the coordinate plane, the Euclidean distance relation is applied as follows to determine the separation between two nodes:

$${\text{d}}=\sqrt{{({{\text{x}}}_{{\text{T}}}-{{\text{x}}}_{{\text{R}}})}^{2}+{({{\text{y}}}_{{\text{T}}}-{{\text{y}}}_{{\text{R}}})}^{2}}$$
(6)

where the locations of the UE transmitter and receiver are denoted by \(({{\text{x}}}_{{\text{T}}},{{\text{x}}}_{{\text{R}}})\) and \(({{\text{y}}}_{{\text{T}}},{{\text{y}}}_{{\text{R}}})\), respectively.

2.1 Minimum distance of discovery between D2D devices algorithm

The shortest distance between UEs is the basis for the selection process in this discovery approach. The best D2D pair is identified by selecting the pair with the smallest distance and determining whether this pair also satisfies the minimal SINR threshold. Figure 2 depicts the flow chart of the algorithm for the minimum distance of discovery between D2D devices.

Fig. 2
figure 2

Flow chart for minimum distance of discovery between D2D devices algorithm

figure a

2.2 Maximum SINR with no limit on distance of discovery algorithm

SINR values are used as the basis for selection in this method. Since this technique does not take the distance of the discovery threshold into account, it selects D2D couples if they match the minimal signal to the interference and noise ratio threshold and selects the pair with the largest SINR in both directions. The flow chart for the maximum SINR method with no distance of discovery constraint is shown in Fig. 3.

Fig. 3
figure 3

Flow chart for the maximum SINR with no limit on the distance of discovery algorithm

figure b

2.3 Maximum data rate with no limit on the distance discovery algorithm

In this technique, the variables that determine the selections are the modulation index (MI) and the data rate. The flow chart for the distance finding algorithm with no limit at the maximum data rate is shown in Fig. 4.

Fig. 4
figure 4

Flow chart for the maximum data rate with no limit on the distance discovery algorithm

figure c

2.4 D2D discovery algorithm with amplify and forward (AF) relay

With this approach, the D2D serves as a basic repeater. UE2 in the center picks up the signal, amplifies it, and sends it on to UE3 at the right end of Fig. 5. Notwithstanding their simplicity and extremely low delay durations, AF relays are helpful in many noise-limited system deployments because of their capacity to enhance the desired signal in addition to any interference or noise that may be present. The D2D discovery method flow chart using AF Relay is displayed in Fig. 6.

Fig. 5
figure 5

Simple model of a D2D discovery algorithm with AF Relay method

Fig. 6
figure 6

Flow chart for the D2D discovery algorithm with AF Relay

figure d

2.5 Performance metrics

The performance of the proposed D2D discovery algorithms in this work is analyzed using the following measures:

2.5.1 Signal-to-noise power ratio (SNR)

The SNR formula determines, in decibels (dB), the ratio of the power of the received signal to the power of the received noise. A higher signal-to-noise ratio (SNR) indicates improved signal quality, a more dependable communication link, and easier signal separation from noise.

$${\text{SNR}}= 10{{\text{log}}}_{10}(\frac{{\text{abs}}({\mathrm{signal\; power})}^{2}}{{\text{abs}}({\mathrm{noise\; power})}^{2}})$$
(7)

2.5.2 Channel capacity

The channel capacity (C) is measured in bits per second and is calculated by the formula

$${\text{C}}={\text{B}}* {{\text{log}}}_{2}\left(1+{\text{SNR}}\right)$$
(8)

where B is the transmitting signal bandwidth in Hertz.

2.5.3 Data rate or throughput

With a given bandwidth and signal-to-noise ratio (SNR), the data rate formula calculates the maximum number of bits that can pass over a communication channel in a second.

$$\mathrm{Data\; Rate}={\text{bandwidth}}*\frac{{\text{sum}}(\frac{{{\text{log}}}_{2}(1+{\text{abs}}(\mathrm{received\; signal\; power\; with\; noise}{)}^{2}) }{{\text{abs}}{\left(\mathrm{noise\; power}\right)}^{2}})}{{\text{packet}}\_{\text{size}}}$$
(9)

where \({\text{packet}}\_{\text{size}}\) is measure in bits.

2.5.4 Spectral efficiency

The quantity of data that may be sent through a communication channel per unit of bandwidth is known as spectral efficiency. It represents the effectiveness of the system in making use of the available bandwidth and signal-to-noise ratio (SNR) to transfer data, and is commonly stated in bits per second per Hz (bps/Hz). The spectral efficiency of the direct connection, relay link, and UE relay links are determined in this work using three distinct spectral efficiency formulas.

The spectral efficiency formula for the direct link is as follows:

$${\text{direct}}\_{\text{spectral}}\_\mathrm{efficiency }=\frac{{\text{mean}}({\text{direct}}\_{\text{data}}\_{\text{rate}})}{{\text{bandwidth}}}$$
(10)

The \({\text{direct}}\_{\text{data}}\_{\text{rate}}\) in this work refers to the average data rate that is obtained during a number of transmission frames. The Shannon capacity formula, which provides the highest data rate possible for a given channel bandwidth and signal-to-noise ratio (SNR), is used to determine the average data rate.

The following is the spectral efficiency formula for the relay link:

$${\text{relay}}\_{\text{spectral}}\_\mathrm{efficiency }=\frac{{\text{mean}}({\text{relay}}\_{\text{data}}\_{\text{rate}})}{{\text{bandwidth}}}$$
(11)

The average data rate obtained across a number of transmission frames is called \({\text{relay}}\_{\text{data}}\_{\text{rate}}\) in this case. The relay amplification gain is taken into consideration in addition to the direct link Shannon capacity formula when calculating the data rate.

The formula for spectral efficiency for the UE relay links is as follows:

$${\text{ue}}\_{\text{relay}}\_{\text{spectral}}\_{\text{efficiency}}=\frac{{\text{mean}}({\text{ue}}\_{\text{relay}}\_{\text{data}}\_{\text{rate}})}{{\text{bandwidth}}}$$
(12)

The array of average data rates obtained for each UE relay over several transmission frames is called \({\text{ue}}\_{\text{relay}}\_{\text{data}}\_{\text{rate}}\) in this case. The UE relay amplification gain is a new term that is included in the Shannon capacity formula used to compute the data rate for the direct link.

2.5.5 Energy efficiency (EE)

How effectively a wireless communication system uses its power resources to transmit data is determined by its energy efficiency. The link between the data rate reached and the power consumed to get there defines it. The energy efficiency formula used in this study is:

$${\text{energy}}\_\mathrm{efficiency }=\frac{{\text{data}}\_\mathrm{rate }}{({\text{power}}\_\mathrm{consumption }*\mathrm{ bandwidth})}$$
(13)

2.5.6 Bit error rate (BER)

The bit-error rate (BER) is a metric used to assess the effectiveness of digital communication systems. It is calculated by dividing the total number of bits broadcast by the number of bits received incorrectly. A lower BER denotes improved system performance. The direct connection, the relay link, and the UE (User Equipment) relay link are the three transmission links for which the BER (Bit Error Rate) is computed in this study.

The following formula is used to get the BER of a direct link:

$${{\text{direct}}}_{{\text{BER}}}=\frac{{\text{direct}}\_{\text{error}}\_\mathrm{bits }}{({\text{packet}}\_\mathrm{size }*\mathrm{ num}\_{\text{frames}})}$$
(14)

The variable \({\text{direct}}\_{\text{error}}\_{\text{bits}}\) represents the total number of errors for the direct link over all frames.

The formula below is used to determine the relay link BER:

$${{\text{relay}}}_{{\text{BER}}}=\frac{{\text{sum}}({\text{relay}}\_{\text{error}}\_{\text{bits}}) }{({\text{packet}}\_\mathrm{size }*\mathrm{ num}\_\mathrm{frames }*\mathrm{ num}\_{\text{relays}})}$$
(15)

where the number of errors for each relay and each frame is contained in a matrix called \({\text{relay}}\_{\text{error}}\_{\text{bits}}\), which has size \({\text{num}}\_{\text{relays}}\) -by-\({\text{num}}\_{\text{frames}}\).

The number of UE relays is utilized in place of the number of relays in the UE relay link BER calculation, which is computed similarly to the relay link BER calculation:

$${{\text{ue}}}_{{{\text{relay}}}_{{\text{BER}}}}=\frac{{\text{sum}}({\text{ue}}\_{\text{relay}}\_{\text{error}}\_{\text{bits}})}{({\text{packet}}\_\mathrm{size }*\mathrm{ num}\_\mathrm{frames }*\mathrm{ num}\_{\text{ue}}\_{\text{relays}})}$$
(16)

The number of errors for each UE relay and frame is contained in the matrix \({\text{ue}}\_{\text{relay}}\_{\text{error}}\_{\text{bits}}\), which has a dimension of \({\text{num}}\_{\text{ue}}\_{\text{relays}}\) -by-\({\text{num}}\_{\text{frames}}\).

3 Results and discussion

This section evaluates the performance of the suggested D2D discovery algorithms in detail.

3.1 Overall environment parameters and assumptions

Table 1 summarizes the most frequently used simulation parameters in wireless cellular network simulations, which are used to assess the simulations' performance.

Table 1 Overall simulation parameters

3.2 General structure of the proposed network

The proposed network is made up of a grid of uniformly spaced hexagonal cells across the designated region, as shown in Fig. 7. Six neighboring cells surround each hexagonal cell, which symbolizes a single cell in the proposed cellular network.

Fig. 7
figure 7

Proposed network structure

The cells are utilized to give wireless coverage to the surrounding area by connecting to a central base station or cell tower. To simulate various situations and assess the network's performance under various circumstances, the number of D2D devices in the network can be changed. The network's performance can be maximized by analyzing the resulting network topology to find possible areas for development. All things considered, the network architecture is built to minimize noise and interference while offering dependable and effective wireless coverage to the designated area.

As a result, Fig. 8 displays the distribution of D2D devices within the network as well as the hexagonal cells that comprise the cellular network. The uniform and random placement of D2D devices within the network enables a realistic simulation of the device distribution inside an actual network. Since every device is assigned a unique number for identification, it is simple to monitor each device's performance inside the network.

Fig. 8
figure 8

Network distribution with different UEs

3.3 Using minimum distance discovery algorithm between the devices

The distance method is used to choose pairs of devices based on the shortest distance between them and the minimal SINR threshold, as shown in Fig. 9. The number of device pairs chosen based on the smallest distance between them and the total number of devices used are displayed in a graph. The graph shows that the average number of pairs selected rises as the number of devices increases. In a similar vein, the average number of D2D (device-to-device) pairs increases when the distance threshold between devices rises. The distance method results, as shown in Fig. 10, yield the highest proportion of outages at a threshold of 100. Nevertheless, the percentage of outages decreases as the threshold distance increases. As the number of devices increases, there doesn't appear to be an increase in the proportion of devices having outages.

Fig. 9
figure 9

Minimum distance discovery algorithm based on the active pair

Fig. 10
figure 10

Minimum distance discovery algorithms based on the outage percentage

3.4 Using SINR discovery algorithm between the devices

A modified version of the discovery process using SINR with different thresholds is shown in Fig. 11. Based on a distance constraint between UEs, this algorithm determines which D2D pair among the UEs in the network has the largest SINR value. A higher SINR results in the discovery of more active pairs, whereas a lower SINR results in fewer active pairs. The number of active pairs and the number of devices are directly correlated; thus, as the number of devices rises, so does the number of pairings. Additionally, the graph shows that low SINR directly affects UE detection. As can be seen in Fig. 12, the percentage of outages is nearly 100% at the low SINR threshold but begins to decline as the SINR improves. The red color line in the graph shows that the SINR of − 16 dBm is preferable since it has the lowest percentage of outages, which increases the likelihood of finding UEs.

Fig. 11
figure 11

SINR discovery algorithm based on the active number of pairs

Fig. 12
figure 12

Percentage of outage according to the SINR discovery algorithm

3.5 Using data rate discovery algorithm between the devices

The relationship between the number of active pairs and the total number of devices is shown in Fig. 13. Three data rate thresholds were selected, and while the two graphs may appear to be identical, the number of active pairs is greater in the 1500 m2 area. Depending on the threshold, it begins to grow as the number of devices grows.

Fig. 13
figure 13

Active number of pairs according to the data rate discovery algorithm

The three algorithms provide similar results, with high data rates for a 5000 m2 area (see Fig. 14 on the right), but higher data rates lead to a larger number of active pairs.

Fig. 14
figure 14

Percentage of outage according to the data rate discovery algorithm

3.6 Performance comparison of the proposed algorithms

Three methods were employed, as described in the prior graphs, to choose the D2D pair with a different threshold; however, in the figures below, the three techniques were combined under the same environmental circumstances.

Using the data rate discovery method produced a larger number of active pairings than the distance approach, according to the results presented in Fig. 15 above. The difference is approximately three times greater than the minimum distance and SINR-based discovery algorithms. In comparison to the other two algorithms, the SINR algorithm's outcomes were in the center. The graphs show that while there were few devices, all of the algorithms operated in the same way. However, after around fifty users, a noticeable difference occurred, and the number of active pairings began to rise sharply.

Fig. 15
figure 15

Comparison of the three algorithms according to the active number of pairs

Outage rates for the three methods are displayed in Fig. 16. When compared to other algorithms, the distance method has the highest rate of failure. The data rate algorithm performed the best and had the lowest outage compared to the SINR method, which has an outage rate of around 50%. After categorizing the device peer-finding procedures, the D2D will be employed as a relay, and its performance in its (Amplify and Forward) mode will be measured. Table 2 shows the comparison of suggested algorithms according to the percentage of outages.

Fig. 16
figure 16

Comparison of algorithms according to percentage of outage

Table 2 Comparison of algorithms according to percentage of outages

3.7 Performance evaluation of D2D discovery algorithms with AF relay

Based on the output scenario we provided, the average SNR values for each link are:

Direct link: 1.922058

Relay link: 1.181670

UE relay links range from 1.033123 to 8.821325, with an overall average of 3.793029.

In this simulation, the direct link provides a lower average SNR value compared to the high SNR value simulation output we provided. This indicates that in this scenario, the quality of the direct link is not as good as in the high SNR simulation. The relay link also provides a low average SNR value, indicating that the relay link is not a good option for communication in this scenario. The average SNR values for the UE relay links are closer to the average SNR value of the direct link, and some UE relay links provide significantly higher SNR values compared to the direct link. This indicates that in this scenario, the UE relay links may be a better option for communication compared to the direct link or the relay link. However, it is important to note that the specific UE relay links that provide the best SNR values may vary depending on the specific frame and the location of the UE relay nodes. Therefore, based on the simulation output we provided, it appears that the UE relay links may be the best option for communication in this scenario. However, the choice of the best link also depends on other factors, such as the data rate, latency, and reliability requirements of the specific application and use case. It is important to carefully evaluate and test the performance of the wireless network in a real-world scenario to ensure that it meets the requirements of the specific application and use case.

Based on the output of the console and Fig. 17, it can be seen that the average SNR values for the direct link, relay link, and UE relay link are different for each SNR value. However, we can make some general observations:

Fig. 17
figure 17

SNR vs. Frame Index at a constant SINR of 10 dB

For the first two SNR values (10 dB and 100 dB), the average SNR value for the direct link is low compared to the UE relay link. For the highest SNR value (200 dB), the average SNR value for the direct link is higher than the average SNR value for the relay links. It is clear from the analysis that the SNR value has a direct impact on the performance of the three links. Increasing the SNR will improve the performance of all three links, while decreasing the SNR will lead to poorer performance. Therefore, it is important to consider the SNR value when designing and analysing communication systems and to ensure that the SNR is sufficient to meet the performance requirements of the system. Table 3 displays the simulation results of the average SNR for the three suggested links.

Table 3 Simulation results of the average SNR for three suggested links

3.8 BER of direct link and relay links

Using the output from Fig. 18 and the console results, the suggested scenario creates a wireless communication system inside, and three different links are tested to see how well they work in terms of bit error rate (BER). The direct link and the relay link have a fixed transmit power and antenna gain, which may limit their coverage and capacity. The transmit power and antenna gain are not optimized for the specific scenario and may not provide the best coverage or capacity. Additionally, the UE relay link may have lower transmit power and antenna gain due to the limitations of the UE device, which may limit its coverage and capacity compared to the direct link or the relay link. However, the UE relay link can provide additional coverage and capacity by acting as a relay node, which can improve the signal quality and extend the range of the communication system.

Fig. 18
figure 18

Comparison of BER over relay links and direct links (500 UE)

Based on the output results and simulation provided, it appears that the UE relay link has the lowest average BER, which suggests that it provides the most reliable and error-free communication channel in this scenario. However, the differences between the average BERs for the three links are very small, which indicates that all three links are performing well in this scenario. In summary, based on the figure provided below, the best link in our scenario appears to be the UE relay link, although the choice of the best link depends on several factors. In our scenario, the fading and distance between the UE are random, so our output can change every time, but mostly the BER of the links is close to each other. Table 4 shows the simulation results of the average BER for the suggested three links.

Table 4 Simulation results of the average BER for three suggested links

3.9 Comparison of capacity of relay links and direct link

Figure 19 shows that the mean capacity of the direct link is 86.32 Mbps, the mean capacity of the relay link with fixed nodes is 83.83 Mbps, and the mean capacity of the relay link with UE relay nodes is 84.29 Mbps. These findings show that the direct link, the relay link with UE relay nodes, and the relay link with fixed nodes all have the highest capacity. The standard deviation of each link's capacity is also calculated for each frame of data. The standard deviation of the direct link's capacity is the highest, with a value of 3910307.08 bps. This indicates that the capacity of the direct link varies widely over time. The standard deviation of the relay link with fixed nodes is 2990834.86 bps, which is also relatively high, while the standard deviation of the relay link with UE relay nodes is much lower, with a value of 247306.51 bps. This suggests that the capacity of the relay link with UE relay nodes is more stable over time than the other two links. The simulation results of the average capacity for the three proposed linkages are displayed in Table 5.

Fig. 19
figure 19

Comparison of relay links and direct links based on capacity

Table 5 Average capacity for three suggested links

3.10 Comparison of spectral efficiencies between direct link and relay links

Based on the spectral efficiencies calculated for the suggested links, Fig. 20 depicts that the spectral efficiency of the direct link is 10.028330 bps/Hz, while the spectral efficiency of the fixed relay link is 17.599456 bps/Hz. The spectral efficiencies of the UE relay links range from 17.622612 to 17.903864 bps/Hz, with an average spectral efficiency of 17.756052 bps/Hz across all UE relay nodes.

Fig. 20
figure 20

Comparison of spectral efficiency between direct link and relay links

Comparing the spectral efficiencies of the different transmission scenarios, we can see that the fixed relay link and the UE relay links provide higher spectral efficiencies than the direct link. This is because the relay links can mitigate the effects of path loss and fading and provide additional diversity gains, resulting in higher data rates and spectral efficiencies. Among the UE relay links, we can see that the spectral efficiencies are fairly consistent across the different relay nodes, with only a small variation in the range of 17.622612 bps/Hz to 17.903864 bps/Hz. This work suggests that the UE relay nodes are able to effectively relay the data and provide reliable communication links.

Figure 21 shows the randomly generated positions of the UE relays, which are scattered across the simulation area. The advantage of using UE relays is that they can provide a cost-effective solution for extending the coverage and improving the reliability of the wireless connection, particularly in areas with poor signal strength or high interference. All three of the proposed links' overall spectrum efficiencies are shown in Table 6.

Fig. 21
figure 21

Pictorial representation of relay positions

Table 6 Overall spectral efficiencies for three suggested links

4 Conclusion

This study looks at how well relay-assisted strategies for pair selection algorithms work in device-to-device communication for Fifth Generation Systems. It does this by looking at two parts: how D2D devices find each other and how they send information between devices. The initial part of device peer discovery, which is centered on an emergency scenario, has three main techniques for choosing a D2D pair in place. The data rate algorithm may lower the chance of an outage by 20%, according to MATLAB simulations of the algorithms. The data rate method won out when compared to the SINR and distance algorithms. Our section shows that, out of the three links, the direct link has the lowest bit error rate (BER) of 0.004991, indicating that it offers the most dependable communication. In comparison to the relay connection (83.83 Mbps) and the UE relay link (84.29 Mbps), the direct link has the maximum capacity and gives the highest data throughput (86.32 Mbps). This implies that more data can be transmitted over the direct link in a given amount of time. However, the relay connection and the UE relay link both show greater values than the direct link when it comes to total spectral efficiency. The UE relay link has an overall spectral efficiency of 17.756052 bps/Hz, compared to 17.599456 bps/Hz for the relay link. This indicates that both of these links are more effective at using the available spectrum than the direct link, as they can transfer more data per unit of bandwidth. The relay links' D2D_relay_avg_energy_efficiency and ue_relay_avg_energy_efficiency are 0.001193 bps/Hz and 0.001117 bps/Hz, respectively, whereas the direct link has the highest average energy efficiency of 0.735408 bps/Hz. This suggests that out of the three, the direct link is the most energy-efficient. Accordingly, the direct link is the most dependable and effective choice for communication, according to the simulation that was provided. In contrast, the UE relay link has a significantly lower standard deviation for the transmitted frame when compared to the other two links, which might suggest a more consistent and stable transmission performance. In this research, three various algorithms, such as minimum distance-based, SINR-based, and data rate-based, have been simulated only in certain experimental environments that were created using MATLAB. So, the proposed algorithms are also to be applied for the analysis of public safety networks. During the real-time implementation, public safety will be considered.

Availability of data and materials

Data sharing is not applicable to this article as no datasets were generated or analysed during the current study.

Abbreviations

D2D:

Device-to-device

UE:

User equipment

SINR:

Signal-to-interference and noise ratio

BER:

Bit error rate

BS:

Base station

EPC:

Evolved packet core

PSN:

Public security network

P2P:

Peer-to-peer

3GPP:

Third generation partnership project

LTE:

Long term evolution

ProSe:

Proximity service

LTE-A:

LTE-advanced

References

  1. H. Nishiyama, M. Ito, N. Kato, Relay-by-smartphone: realizing multihop device-to-device communications. IEEE Commun. Mag. 52(4), 56–65 (2014)

    Article  Google Scholar 

  2. M. Hicham, N. Abghour, M. Ouzzif, Device-to-device (D2D) communication under LTE advanced networks. Int. J. Wirel. Mob. Netw. 8(1), 11–22 (2016)

    Article  Google Scholar 

  3. G. Baldini, S. Karanasios, D. Allen, F. Vergari, Survey of wireless communication technologies for public safety. IEEE Commun. Surv. Tutor. 16(2), 619–641 (2014)

    Article  Google Scholar 

  4. D. He, S. Chan, M. Guizani, Drone-assisted public safety networks: the security aspect. IEEE Commun. Mag. 55(8), 218–224 (2017)

    Article  Google Scholar 

  5. S.T. Shah, S.F. Hasan, B.C. Seet, P.H.J. Chong, M.Y. Chung, Device-to-device communications: a contemporary survey. Wirel. Pers. Commun. 98, 1247–1284 (2018)

    Article  Google Scholar 

  6. A. Kumbhar, F. Koohifar, I. Güvenç, B. Mueller, A survey on legacy and emerging technologies for public safety communications. IEEE Commun. Surv. Tutor. 19(1), 97–124 (2017)

    Article  Google Scholar 

  7. W. Yu, H. Xu, J. Nguyen, E. Blasch, A. Hematian, W. Gao, Survey of public safety communications: user-side and network-side solutions and future directions. IEEE Access 6, 70397–70425 (2018)

    Article  Google Scholar 

  8. J.P. Pinelli, M. Esteva, E.M. Rathje, D. Roueche, S.J. Brandenberg, G. Mosqueda, J. Padgett, F. Haan, Disaster risk management through the designsafe cyberinfrastructure. Int. J. Disaster Risk Sci. 11(6), 719–734 (2020)

    Article  Google Scholar 

  9. Z. Qadir, F. Ullah, H.S. Munawar, F. Al-Turjman, Addressing disasters in smart cities through UAVs path planning and 5G communications: a systematic review. Comput. Commun. 168, 114–135 (2021). https://doi.org/10.1016/j.comcom.2021.01.003

    Article  Google Scholar 

  10. K. Ali, H. X. Nguyen, P. Shah, Q. T. Vien, Energy efficient and scalable D2D architecture design for public safety network. 2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 Proceedings (2017).

  11. U.N. Kar, D.K. Sanyal, A critical review of 3GPP standardization of device-to-device communication in cellular networks. SN Comput. Sci. (2020). https://doi.org/10.1007/s42979-019-0045-5

    Article  Google Scholar 

  12. I.F. Akyildiz, S. Nie, S.C. Lin, M. Chandrasekaran, 5G roadmap: 10 key enabling technologies. Comput. Netw. 106, 17–48 (2016)

    Article  Google Scholar 

  13. P. Gandotra, R.K. Jha, Device-to-device communication in cellular networks: a survey. J. Netw. Comput. Appl. (2016). https://doi.org/10.1016/j.jnca.2016.06.004

    Article  Google Scholar 

  14. P. Mukherjee, T. De, Content independent location based clustering for 5G device to device communications. Wirel. Pers. Commun. 118, 2573–2599 (2021)

    Article  Google Scholar 

  15. C. Chakraborty, J.J.C.P. Rodrigues, A comprehensive review on device-to-device communication paradigm: trends, challenges and applications. Wirel. Pers. Commun. 114, 185–207 (2020)

    Article  Google Scholar 

  16. O. Hayat, R. Ngah, Y. Zahedi, In-band device to device (D2D) communication and device discovery: a survey. Wirel. Pers. Commun. 106(2), 451–472 (2019)

    Article  Google Scholar 

  17. X. Lin, J.G. Andrews, A. Ghosh, R. Ratasuk, An overview of 3GPP device-to-device proximity services. IEEE Commun. Mag. 52(4), 40–48 (2014)

    Article  Google Scholar 

  18. K. Gomez, L. Goratti, T. Rasheed, L. Reynaud, Enabling disaster-resilient 4G mobile communication networks. IEEE Commun. Mag. 52(12), 66–73 (2014)

    Article  Google Scholar 

  19. N. Ben Halima, H. Boujemâa, Optimal routing and one hop routing for D2D communications in the presence of mutual interference. Telecommun. Syst. 71(1), 55–64 (2019)

    Article  Google Scholar 

  20. G. Chen, J. Tang, J.P. Coon, Optimal routing for multihop social-based D2D communications in the internet of things. IEEE Internet Things J. 5(3), 1880–1889 (2018)

    Article  Google Scholar 

  21. F.S. Shaikh, R. Wismuller, Routing in multi-hop cellular device-to-device (D2D) networks: a survey. IEEE Commun. Surv. Tutor. 20(4), 2622–2657 (2018)

    Article  Google Scholar 

  22. L. Babun, A. I. Yürekli, I. Güvenç, Multi-hop and D2D communications for extending coverage in public safety scenarios, Conference on local computer networks, LCN 2015, 912–919 (2015).

  23. K. Ali, H.X. Nguyen, Q.T. Vien, P. Shah, Z. Chu, Disaster management using D2D communication with power transfer and clustering techniques. IEEE Access 6, 14643–14654 (2018)

    Article  Google Scholar 

  24. G. Fodor, S. Parkvall, S. Sorrentino, P. Wallentin, Q. Lu, N. Brahmi, Device-todevice communications for national security and public safety. IEEE Access 2, 1510–1520 (2014)

    Article  Google Scholar 

  25. Z. Kuang, G. Liu, G. Li, X. Deng, Energy efficient resource allocation algorithm in energy harvesting-based D2D heterogeneous networks. IEEE Internet Things J. 6(1), 557–567 (2019)

    Article  Google Scholar 

  26. V. Marttin, U. Yuzgec, C. Bayilmis, K. Kucuk, D2D communication and energy efficiency on LTE for public safety networks. UBMK 2018 - 3rd International Conference on Computer Science and Engineering 547–551 (2018).

  27. Y. Kwak, S. Ro, S. Kim, Y. Kim, J. Lee, Performance evaluation of D2D discovery with eNB based power control in LTE-advanced. 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall). 1–5 (2014).

  28. E. Ever, E. Gemikonakli, H.X. Nguyen, F. Al-Turjman, A. Yazici, Performance evaluation of hybrid disaster recovery framework with D2D communications. Comput. Commun. 152, 81–92 (2020)

    Article  Google Scholar 

  29. O. Hayat, R. Ngah, S.Z. Mohd Hashim, Performance analysis of device discovery algorithms for D2D communication. Arab. J. Sci. Eng. 45(3), 1457–1471 (2020)

    Article  Google Scholar 

  30. O. Hayat, R. Ngah, S.Z. Mohd Hashim, Sector scanning algorithm (SSA) for device discovery in D2D communication. Int. J. Electron. 108(1), 45–66 (2021)

    Article  Google Scholar 

  31. E. A. M. Osman, Device discovery methods in D2D communications for 5G communications system. Master’s Thesis, Tallinn University of Technology. (2018).

  32. V. Marttin, U. Yüzgeç, C. Bayılmış, K. Küçük, A novel approach to D2D discovery in PSN for post-disaster: throughput based discovery algorithm (TDA). Wirel. Pers. Commun. 119(4), 3339–3363 (2021)

    Article  Google Scholar 

  33. U.N. Kar, D.K. Sanyal, An overview of device-to-device communication in cellular networks. ICT Express 4(4), 203–208 (2018)

    Article  Google Scholar 

  34. G. Araniti, A. Raschellá, A. Orsino, L. Militano, M. Condoluci, Device-to-device communications over 5G systems: standardization, challenges and open issues. 5G Mob. Commun. (2016). https://doi.org/10.1007/978-3-319-34208-5_12

    Article  Google Scholar 

  35. K. Doppler, M. Rinne, C. Wijting, C.B. Ribeiro, K. Hug, Device-to-device communication as an underlay to LTE-advanced networks. IEEE Commun. Mag. 47(12), 42–49 (2009)

    Article  Google Scholar 

  36. K. Doppler, C. B. Ribeiro, J. Kneckt, Advances in D2D communications: Energy efficient service and device discovery radio. 2011 2nd ınternational conference on wireless communication, vehicular technology, ınformation theory and aerospace and electronic systems technology, wireless VITAE 2011. 1–6 (2011).

  37. H. Tang, Z. Ding, B.C. Levy, Enabling D2D communications through neighbor discovery in LTE cellular networks. IEEE Trans. Signal Process. 62(19), 5157–5170 (2014)

    Article  MathSciNet  Google Scholar 

  38. M. Simsek, A. Merwaday, N. Correal, I. Güvenç, Device-to-device discovery based on 3GPP system level simulations, 2013 IEEE globecom workshops. 555–560 (2013).

  39. S. Vasudevan, M. Adler, D. Goeckel, D. Towsley, Efficient algorithms for neighbor discovery in wireless networks. IEEE/ACM Trans. Netw. 21(1), 69–83 (2013)

    Article  Google Scholar 

  40. G. Sun, F. Wu, X. Gao, G. Chen, W. Wang, Time-efficient protocols for neighbor discovery in wireless Ad Hoc networks. IEEE Trans. Veh. Technol. 62(6), 2780–2791 (2013)

    Article  Google Scholar 

  41. Z. J. Yang, J. C. Huang, C. T. Chou, H. Y. Hsieh, C. W. Hsu, P. C. Yeh, C. C. Alex Hsu, Peer discovery for device-to-device (D2D) communication in LTE in LTE-A networks. 2013 IEEE globecom workshops 665–670 (2013).

  42. J. Zou, M. Wang, J. Zhang, F. Shu, J. Wang, Y. Qian, W. Sheng, Q. Chen, Discovery signal design and its application to peer-to-peer communications in OFDMA cellular networks. IEEE Trans. Wirel. Commun. 12(8), 3995–4009 (2013)

    Article  Google Scholar 

  43. K.J. Zou, M.W. Wang, K. Yang, J. Zhang, W. Sheng, Q. Chen, X. You, Proximity discovery for device-to-device communications over a cellular network. IEEE Commun. Mag. 52(6), 98–107 (2014)

    Article  Google Scholar 

  44. K. Yang, M. Wang, K. Zou, M. Hua, J. Hu, J. Zhang, W. Sheng, X. You, Device discovery for multihop cellular networks with its application in LTE. IEEE Wirel. Commun. 21(5), 24–34 (2014)

    Article  Google Scholar 

  45. O. Hayat, R. Ngah, Y. Zahedi, Device discovery for D2D communication in in-band cellular networks using sphere decoder like (SDL) algorithm. EURASIP J. Wirel. Commun. Netw. 74, 1–7 (2018)

    Google Scholar 

  46. H. Yuan, W. Guo, S. Wang, Emergency route selection for D2D cellular communications during an urban terrorist attack. 2014 IEEE International Conference on Communications Workshops, ICC 2014. 237–242 (2014).

  47. K. Ali, H. X. Nguyen, P. Shah, Q. T. Vien, N. Bhuvanasundaram, Architecture for public safety network using D2D communication. 2016 IEEE Wireless Communications and Networking Conference Workshops, WCNCW 2016. 206–211 (2016).

  48. X. Wang, H. Zhou, L. Zhong, Y. Ji, K. Takano, S. Yamada, G. Xue, Capacity-aware cost-efficient network reconstruction for post-disaster scenario, IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC. (2016).

  49. M.A. Hossain, S.K. Ray, J. Lota, SmartDR: a device-to-device communication for post disaster recovery. J. Netw. Comput. Appl. 171, 1–29 (2020)

    Article  Google Scholar 

  50. E. Guariglia, Harmonic Sierpinski gasket and applications. Entropy 20(714), 1–12 (2018)

    MathSciNet  Google Scholar 

  51. K. J. Falconer, in Fractal Geometry: Mathematical Foundations and Applications (3rd Edition, Wiley, 2014).

  52. S. Li, B. Yang, Hu. Jianwen, Performance comparison of different multi-resolution transforms for image fusion. Inf. Fusion. 12(2), 74–84 (2011)

    Article  Google Scholar 

  53. E. Guariglia, S. Silvestrov, in Fractional-Wavelet Analysis of Positive definite Distributions and Wavelets on D’(C), vol. 179 (Springer Proceedings in Mathematics & Statistics, 2016), pp. 337–353

  54. E. Guariglia, R. Capobianco Guido, Chebyshev wavelet analysis. J. Funct. Spaces (2022). https://doi.org/10.1155/2022/5542054

    Article  MathSciNet  Google Scholar 

  55. Y. Wu, W. Liu, S. Wang, W. Guo, X. Chu, Network coding in device-to-device (D2D) communications underlaying cellular networks. IEEE International Conference on Communications. 2072–2077 (2015).

  56. T. S. Rappaport, in Wireless Communications: Principles and Practice (Prentice Hall Communications Engineering & Emerging Technologies Series, 2001).

Download references

Acknowledgements

Not applicable.

Funding

There is no funding source.

Author information

Authors and Affiliations

Authors

Contributions

All authors have reviewed and edited the manuscript and have approved the final manuscript.

Corresponding author

Correspondence to Kannan Pauliah Nadar.

Ethics declarations

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Omar, A.A., Nadar, K.P., Vivekanand, C.V. et al. Performance evaluation of pair selection algorithms in device-to-device communication using relay-assisted techniques. J Wireless Com Network 2024, 15 (2024). https://doi.org/10.1186/s13638-024-02336-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-024-02336-w

Keywords