Energy Consumption Performance of Opportunistic Device-to-Device Relaying under Log-Normal Shadowing

S. M. Zafaruddin*, Jan Plachy, Zdenek Becvar, Amir Leshem

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

Efficient transmission protocols are required to minimize the energy consumption of mobile devices for ubiquitous connectivity in the next-generation of wireless networks. In this article, we analyze the energy consumption performance of a two-hop opportunistic device-select relaying (ODSR) scheme, where a device can either transmit data directly to a base station (BS) or relay the data to a nearby device, which forwards the data to the BS. We select a single device opportunistically from a device-to-device (D2D) network based on the energy required for transmission, including the energy consumed in the circuitry of the devices. By considering the log-normal shadowing as the dominant factor between devices and the BS, and Rayleigh fading in D2D links, we derive analytical bounds and scaling laws on average energy consumption. The derived analytical expressions show that the energy consumption of the ODSR decreases logarithmically with an increase in the number of devices, and achieves near-optimal performance only with a few nearby devices. This is an important design criterion to reduce latency and overhead energy consumption in a relay-assisted large-scale network. We also demonstrate the performance of the ODSR using simulations in realistic scenarios of a wireless network.

Original languageAmerican English
Pages (from-to)5011-5022
Number of pages12
JournalIEEE Systems Journal
Volume15
Issue number4
DOIs
StatePublished - 1 Dec 2021
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2007-2012 IEEE.

Keywords

  • 5G
  • Raleigh fading
  • device-to-device (D2D) communications
  • energy consumption
  • log-normal shadowing
  • performance analysis
  • relaying

Fingerprint

Dive into the research topics of 'Energy Consumption Performance of Opportunistic Device-to-Device Relaying under Log-Normal Shadowing'. Together they form a unique fingerprint.

Cite this