Location-Based Operation Strategy for SIC-enabled D2D Communications

Jehyun Heo, Hyunsoo Kim, Insik Jung, Joonki Kim, Daesik Hong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we propose a novel location-based operation strategy for Device-to-Device (D2D) communication which exploits successive interference cancellation (SIC). First, we investigate the characteristics of SIC-enabled D2D, and then propose a new resource selection scheme to fully exploit cellular uplink (UL) resources and downlink (DL) resources using only location information. Second, we propose a new power allocation scheme designed to overcome the problem of excess outages in cellular users. Simulation results show that the proposed schemes show good D2D throughput performance compared to the existing schemes, while guaranteeing reliability for cellular users.

Original languageEnglish
Title of host publication2020 IEEE 92nd Vehicular Technology Conference, VTC 2020-Fall - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728194844
DOIs
Publication statusPublished - 2020 Nov
Event92nd IEEE Vehicular Technology Conference, VTC 2020-Fall - Virtual, Victoria, Canada
Duration: 2020 Nov 18 → …

Publication series

NameIEEE Vehicular Technology Conference
Volume2020-November
ISSN (Print)1550-2252

Conference

Conference92nd IEEE Vehicular Technology Conference, VTC 2020-Fall
Country/TerritoryCanada
CityVirtual, Victoria
Period20/11/18 → …

Bibliographical note

Funding Information:
ACKNOWLEDGEMENTS This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No.2018R1A2A1A05021029).

Publisher Copyright:
© 2020 IEEE.

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Location-Based Operation Strategy for SIC-enabled D2D Communications'. Together they form a unique fingerprint.

Cite this