Loading [MathJax]/jax/element/mml/optable/MathOperators.js
Novel Relay Selection Algorithms for Machine-to-Machine Communications With Static RF Interfaces Setting | IEEE Journals & Magazine | IEEE Xplore

Novel Relay Selection Algorithms for Machine-to-Machine Communications With Static RF Interfaces Setting


ORSA and MRSA are proposed as two relay selection algorithms for machine-to-machine communications with static RF interfaces setting.

Abstract:

Machine-to-Machine (M2M) communications play a significant role in the Internet of Things (IoT). Cooperation of machines in M2M communications can improve network perform...Show More

Abstract:

Machine-to-Machine (M2M) communications play a significant role in the Internet of Things (IoT). Cooperation of machines in M2M communications can improve network performance when the quality of connections between sources and their destinations is poor. Careful selection of machines as relays can play an effective role in improving the quality of communication in dense networks. Furthermore, the possibility of simultaneous use of different Radio Frequency (RF) interfaces can increase the capacity of data transmission over the network. In this paper, two novel M2M relay selection algorithms are proposed namely Optimal Relay Selection Algorithm (ORSA) and Matching based Relay Selection Algorithm (MRSA). ORSA is a centralized algorithm that transforms the relay selection problem to a k-cardinality assignment problem that can be solved using the Hungarian algorithm. MRSA is a decentralized algorithm that leverages concepts from matching theory to provide a stable relay assignment. In both proposed algorithms, static RF interfaces setting is applied to enable the simultaneous use of different interfaces. It is shown that ORSA results are optimal and MRSA results are stable. The simulations compare the capacity of data transmission of proposed and baseline algorithms. The results show that when the number of channels is not restricted, MRSA is only about 3% lower than ORSA and its results are higher than direct transmission and random relay selection, about 56% and 117%, respectively.
ORSA and MRSA are proposed as two relay selection algorithms for machine-to-machine communications with static RF interfaces setting.
Published in: IEEE Access ( Volume: 8)
Page(s): 189989 - 190008
Date of Publication: 16 October 2020
Electronic ISSN: 2169-3536

CCBY - IEEE is not the copyright holder of this material. Please follow the instructions via https://creativecommons.org/licenses/by/4.0/ to obtain full-text articles and stipulations in the API documentation.
SECTION I.

Introduction

Machine-to-Machine (M2M) communications is a notable part of the Internet of Things (IoT) [1]. In this kind of communication, machines can communicate with each other, without or with minimal human intervention. Cooperation between machines will improve the data rate and the bandwidth efficiency of wireless networks such as Long-Term Evolution-Advanced (LTE-A) cellular networks [1]–​[3].

In the cooperation of machines, some machines can act as relays between other machines. Especially when the direct link between a source and its destination (e.g. the base station) is weak, relays may save transmission power [4] and increase network coverage and performance [3]–​[7]. Appropriate assignment of relays to machines is a challenge for dense network communications, which is referred to as relay selection problem in this paper. This assignment of relays depends on various network condition parameters, such as Signal-to-Noise Ratio (SNR) which increases the complexity of this problem.

Some studies have used game theory and matching theory to solve relay selection problems in different networks [7]–​[10]. Matching theory can provide an appropriate framework for analysis and designing the decentralized methods for interactions between the rational and selfish players [11]. There are some studies that have applied matching theory to model the relay selection problem [12], [13]. Some works have modeled the relay selection problem as a maximum weighted matching problem in bipartite weighted graphs and the Hungarian algorithm has been applied in the relay selection process, as a solution [12], [14]–​[20].

In M2M communications, machines can be equipped with different radio frequency (RF) interfaces, such as Long Term Evolution (LTE), Bluetooth, Wireless Fidelity (WiFi), or multiple of them simultaneously. Machines can use their RF interfaces to support the different Quality of Services (QoS) and different requirements of the users [1]. The simultaneous use of different RF interfaces to transmit data from a machine to other machines or base station can increase M2M communications average throghput in a very dense network [21], [22]. The authors are not aware of any relay selection algorithms for M2M communications which considered the possibility of machines using multiple RF interfaces simultaneously.

This simultaneous RF interfaces setting can be static or dynamic. For example, M2M communications can use WiFi interface to transmit data among machines and they can use LTE interface for machine to base station communications, statically. In another case, machines may use WiFi, Bluetooth or ZigBee interfaces to transmit data among machines, dynamically.

For instance, a smart city can be considered. In this city, there are several uses for sending data by machines. In some of these applications, fixed machines send their data at different times using RF interfaces such as LTE or WiFi. As an example, smart urban lighting systems can be mentioned as an application in the smart city. These systems are turned on and off only at certain hours of the day and night. Therefore, these systems usually do not require data exchange at other times.

Security systems such as anti-theft systems or fire alarms in the city also need to send data to a security center such as the fire department or the police. In this case, the machines are idle most of the time and at certain times need to transmit data quickly to the base stations. At the time of data transmission, due to channel conditions, the direct connection of each source with the base station may not be appropriate. In this case, other devices in the smart city that are not currently sending data can be utilized as relays. In this manner, the sources send their data to the base station through the relays and appropriate relay selection will improve the network transmission quality.

A. Related Works

Relay selection may be useful in order to forward data to the base station to deliver to its destination. The network condition parameters, such as SNR or Signal-to-Interference-plus-Noise-Ratio (SINR), can be involved in selecting the appropriate relay [3], [23]. This relay selection can be very important, especially when the direct link between a source and its destination (e.g. the base station) is weak [7], the network coverage needs to be extended [6], [24], and the transmission power should be reducesd for increasing life time of the machine [25], [26]. Thus use of relays can increase network throughput [24]. In this subsection, some of the previous related works are summarized.

Recently, a relay selection algorithm based on the Basic Sequential Algorithmic Scheme (BSAS) is proposed for high density LTE networks [27]. Two layers of users are considered, in this work. The first layer users are directly connected to the base station and the second layer users use one of the first layer users as a relay to connect the base station. In this algorithm, the users form clusters and each cluster has a cluster head from the first layer nodes. These cluster heads transmit data of all other users in its cluster. The proposed algorithm improves the system capacity and energy consumption compared to other similar work [27].

Another paper provided two new approaches to modify the buffer-aided relay selection algorithms in equal maximum weight link conditions [28]. The authors proposed two metrics to use for this condition in each of the new approaches. The first parameter is used in one of the approaches is SNR. The results show that involving this parameter in relay selection improves the outage probability. The other parameter is prioritizing links between relays and destinations based on the occupied buffer space. Involving this parameter in the second approach can improve the delay and throughput performances [28].

In the other work, two relay selection schemes based on two different parameters, Signal-to-Interference Ratio (SIR) or location,for Machine-Type Communication (MTC) are proposed [29]. In this paper, gateways, as relays, receive MTC devices data and transmit it to the base station. In the relay selection based on SIR, gateways attempt to receive data from MTC transmitters that have the highest received power. The possibility of simultaneous data transmission by multiple MTC transmitters in this schema can lead to high interference and reduces the probability of successful data decoding. Furthermore, the data of each MTC transmitter may be received by the base station through multiple gateways. The relay selection based on location modifies the SIR based scheme, by assigning the nearest MTC transmitter to each gateway and farther MTC transmitters blocked by this gateway. Thus despite the cost of sending spatial data by MTC transmitters, the received interference by each gateway is reduced and the duplicate MTC data transmission to the base station is avoided [29].

1) Hungarian Based Relay Selection

The Hungarian algorithm is a solution for the maximum weighted matching problem in bipartite weighted graph [17]. Following, a review of Hungarian algorithm based relay selection schemes are mentioned:

A relay selection algorithm has been proposed with subchannel reusing in the Device-to-Device (D2D) communications [19]. In this algorithm, a graph coloring algorithm is applied to arrange the D2D peers into nonconflicting groups that have minimum intergroup interference. Then a matrix of D2D peers power consumption is constructed, and relay selection of D2D peers is formulated as a weighted bipartite graph matching problem. In the next phase, this problem is solved by the Hungarian algorithm [19].

A study has been conducted on the effectiveness of relay selection in 3GPP Narrowband networks in Internet of Things (NB-IoT) [18]. To increase the chance of successful transmission, NB-IoT adopts a repetition-based transmission. To reduce the number of repetitions, relay selection can be utilized. In this work, relay selection is modeled as a weighted bipartite matching problem and a solution is obtained using the Hungarian algorithm [18].

The assignment problem and relay selection for the relay-aided D2D communications underlying cellular networks has been studied. It is known that this problem is NP-complete, therefore researchers have proposed an Iterative Hungarian Method (IHM) to obtain a near-optimal solution for this problem [16].

A joint relay selection and resource allocation algorithm is investigated in cognitive networks [14]. In their study, these problems are modeled by bipartite weighted matching in two stages and are solved with the Hungarian algorithm [14].

2) Matching Theory Based Relay Selection

Matching theory can provide an appropriate framework for analysis and designing the distributed methods for interactions between rational and selfish players [11]. Here, some papers that used from the matching theory in relay selection are summarized.

Jointly optimizing resource management, relay selection, spectrum allocation, and power control is an NP-hard problem [8]. A pricing-based two-stage matching algorithm is provided to maximize energy efficiency. Firstly, a two-dimensional matching is modeled for the spectrum resources reused by relay-to-receiver links. Then, matching users, relays, optimal power control and the spectrum resources reused by transmitter-to-relay links are conducted by a three-dimensional matching [8].

A distributed satisfaction-aware relay assignment based on the many-to-one matching-game theory is provided [9]. In this work, sources request to relays, with limited resources, regarding their dynamic throughput requirements. Finally, the satisfaction and fairness of sources have been improved [9].

A distributed matching algorithm to select suitable relays among secondary users for primary users is proposed [7]. The secondary users negotiate with the primary users on the time of both cooperatively relaying the primary users data and allowed spectrum access [7].

B. Main Contributions

In this paper, two relay selection algorithms are introduced for M2M communications with static RF interfaces setting. In summary, this paper makes the following contributions:

  • A new solver for the k AP is provided by converting it to a standard assignment problem and this new problem is solved by the Hungarian algorithm. The proof of optimality of this solver is provided in Subsection III-A3.

  • A novel centralized Optimal Relay Selection Algorithm (ORSA) is proposed to provide the optimal solution for the relay selection problem in Section III-B. The presented method converts the M2M relay selection problem to a k -cardinality assignment problem (k AP).

  • A novel decentralized Matching based Relay Selection Algorithm (MRSA) is proposed that is developed by using matching theory. In this algorithm, all nodes (machines and base station) only need local information. The result of this algorithm provides a stable matching between sources, relays, and the base station, based on the deferred acceptance procedure [30]. The proof of stability of this algorithm is introduced in Appendix A. MRSA provides results comparable to the optimal solution and it is applicable in practical situations.

  • In both of novel relay selection algorithms for M2M communications, the static parallel usage of different RF interfaces is considered. This static RF interfaces setting can enable simultaneous transmission among machines and machines with the base station.

The rest of this article is organized as follows. The system model is described in section II. Then, the proposed centralized relay selection algorithm and the proposed decentralized relay selection algorithm are presented in sections III and IV, respectively. The simulation results are illustrated in section V. Finally, in section VI, the conclusion of this paper is provided.

SECTION II.

System Model

We consider a cell with one base station in the center of the cell, and N machines each equipped with two different RF interfaces. In this model, we consider only the uplink paths. The machines have fixed positions, and are divided to two sets, active machines (sources) and idle machines (relays). We denote active machines set as M^{a} that includes N^{s} = | M^{a} | sources and each source wants to send data to the base station to deliver its message to its destination.

Moreover, the channel between the sources and the base station may have low communication quality, due to path loss, fading and shadowing. We denote the set of idle machines by M^{i} , which contains N^{r}=| M^{i} | relays. In other words, M_{Total} is considered as a set of machines, such that M_{Total}= M^{a} \cup M^{i} and M^{a} \cap M^{i}= \phi . According to what was mentioned, N = N^{s} + N^{r} . It is assumed machines would cooperate with each other. The idle machines do not have data to send at that period of time, thus they can work as a relay. Therefore, when active machines need help, the idle machines can assist them as relays to increase data-rate. Unlike some works where one source can be connected to several relays at the same time [31], in our model, each source can not be connected to more than one relay.

The relays are using the Decode-and-Forward (DF) protocol. Fig. 1 shows the scheme of active and idle machines in the system model. These machines are randomly positioned with a uniform distribution.

FIGURE 1. - The scheme of active and idle machines in the system model.
FIGURE 1.

The scheme of active and idle machines in the system model.

The communication capacity or the maximum bit rate that can be used according to the link conditions between two nodes, i and j , in the network is denoted by C_{i,j} , that according to the Shannon-Hartley equation, will be as:\begin{equation*} C_{i,j} = B^{t} log_{2}(1+\mathrm {SINR}_{i,j}),\tag{1}\end{equation*} View SourceRight-click on figure for MathML and additional features. where B^{t} is the bandwidth of the communication channel with technology t used by two nodes i and j and \mathrm {SINR}_{i,j} is the SINR of the channel with i th node as the transmitter and j th node as the receiver.

The possibility of using different RF interfaces of the machines can help to provide high data rates. Therefore, for the static RF interfaces setting, we consider a WiFi interface for their M2M communication and an LTE interface for their direct communication with the base station. The frequency bands used by the LTE and WiFi interfaces are considered different from each other.

For the WiFi and LTE technologies, the achieved SINR of two nodes i and j is computed by the equations (2) and (3), respectively, which are described as:\begin{equation*} \mathrm {SINR}_{i,j}^{\mathrm {WiFi}} = \frac {P_{i}^{\mathrm {WiFi}} \times h_{(i,j)} }{\sigma ^{2} + \sum _{(k\in M^{a}, k \neq i)} P_{k}^{\mathrm {WiFi}} \times h_{(k,j)} },\tag{2}\end{equation*} View SourceRight-click on figure for MathML and additional features. and \begin{equation*} \mathrm {SINR}_{i,j}^{\mathrm {LTE}} = \frac {P_{i}^{\mathrm {LTE}} \times h_{(i,j)} }{\sigma ^{2} },\tag{3}\end{equation*} View SourceRight-click on figure for MathML and additional features. where P_{i}^{\mathrm {WiFi}} and P_{i}^{\mathrm {LTE}} are transmission powers of i th node for the WiFi and LTE interfaces, respectively, \sigma ^{2} is noise power and h_{(i,j)} is the gain of the channel between the i th and j th nodes. h_{(i,j)} is modeled by considering path loss, shadowing, and small scale fading. In more exact terms, the following formulation is used:\begin{align*}&\hspace {-.5pc} h_{(i,j)}(dB) = Path Loss_{(i,j)}(dB)+ Shadowing (dB) \\&\qquad\qquad\qquad\qquad\qquad\qquad\displaystyle { + Small Scale Fading(dB). } \tag{4}\end{align*} View SourceRight-click on figure for MathML and additional features. where path loss is modeled with path loss exponent \beta =4 (equation 5). Shadowing (dB)is modeled by a Normal random variable with zero mean and standard deviation of 8 (\mathcal {N}(0,64) ). Small scale fading (dB) is modeled by a Rayleigh random variable with scale parameter of \sigma _{r} = 1 .\begin{equation*} Path Loss_{(i,j)}(dB)=10 \beta log_{10} \big(\frac {d_{(i,j)}}{d_{0}},\tag{5}\end{equation*} View SourceRight-click on figure for MathML and additional features. where d_{0}=10 (m) , and d_{(i,j)} is the euclidean distance between node i and node j .

The interference experienced at a relay receiver when communicating with a source on the WiFi interface is calculated based on the total power originated from other sources with WiFi interfaces. However, since the WiFi and LTE frequencies are different, the connection between the sources and the relays does not interfere with the connection of the machines (sources or relays) with the base station. Thus the interference of LTE transmitters at the base station will be zero. It should be mention, to simplify our simulations, we consider maximum probable interference on both RF interfaces, WiFi and LTE. We have simulated the worst possible interference conditions, so it can be expected the results of the real world scenarios would be better than our simulation results.

In this model, any source can select a direct path to the base station or a relay for two hop data forwarding to the base station, by using the matching algorithm. The relays receive the source data on the WiFi interface and send it to the base station on the LTE interface in a time slot. The capacity of the channel between a source and a base station in two hops based on DF relaying is given by [12], [32]:\begin{equation*} C_{i,j} = min \lbrace C_{s,r}, C_{r,d} \rbrace,\tag{6}\end{equation*} View SourceRight-click on figure for MathML and additional features. where C_{s,r} is the communication capacity between the source and the relay and C_{r,d} is capacity between the relay and the base station.

A. Problem Formulation

In this paper, we propose an algorithm to assign link of the sources to their next hop, which can be either a relay or the base station. Some works have considered their selection criteria locally [23], for example based on the choice of the neighbor with the best channel conditions. But we seek to globally maximize the total connection capacity of the sources within the network. We formulated the problem of link assignment in equation (7). In the following, we presented two solutions for this problem:

  • an optimal relay selection that provides the highest capacity for all network sources,

  • A stable relay selection algorithm that provides a selection which is at least as well as the other possible stable selections for each network source.\begin{align*}&\mathop {\mathrm {Max}} _{ x, y, z}~\sum _{i=0}^{N_{s}-1}{\sum _{j=0}^{N_{r}-1}\sum _{k=0}^{0} x_{i,j} y_{j,k} \times min(c_{i,j}, c''_{j,k})} \\&\qquad + \sum _{i=0}^{N_{s}-1}\sum _{k=0}^{0} z_{i,k} c'_{i,k}, \tag{7}\\&\text {Subject to} ~x_{i,j} \in \lbrace 0, 1 \rbrace, \quad for ~0 \leq i < N_{s}, \tag{8}\\&\hphantom {\text {Subject to} ~} y_{j,k} \in \lbrace 0, 1 \rbrace, \quad for ~0 \leq j < N_{r}, \tag{9}\\&\hphantom {\text {Subject to} ~} z_{i,k} \in \lbrace 0, 1 \rbrace, \quad for ~k=0, \tag{10}\\&\hphantom {\text {Subject to} ~} \sum _{i=0}^{N_{s}-1} x_{i,j} \!\leq \! 1, \sum _{k=0}^{0} y_{j,k} \!\leq \!1 \quad for ~0 \leq j < N_{r}, \qquad \tag{11}\\&\hphantom {\text {Subject to} ~} \sum _{j=0}^{N_{r}-1} x_{i,j} \!\leq \!\! 1, \sum _{k=0}^{0} z_{i,k} \leq 1 \quad for ~0 \leq i < N_{s}, \tag{12}\\&\hphantom {\text {Subject to} ~}\sum _{i=0}^{N_{s}-1}{\sum _{j=0}^{N_{r}-1}\sum _{k=0}^{0} x_{i,j} y_{j,k}}\! +\! \sum _{i=0}^{N_{s}-1}\sum _{k=0}^{0} z_{i,k}\! \leq \! Q_{BS}.\tag{13}\end{align*} View SourceRight-click on figure for MathML and additional features.

The definition of the used variables is as follows:

  • x_{i,j} : is 1 if i th source has selected the j th relay and 0 otherwise,

  • y_{j,k} : is 1 if j th relay has selected the k th base station and 0 otherwise,

  • z_{i,k} : is 1 if i th source has selected the k th base station and 0 otherwise,

  • c_{i,j} : the capacity between i th source and j th relay,

  • c'_{i,k} : the capacity between i th source and k th base station,

  • c''_{j,k} : the capacity between j th relay and k th base station,

  • N_{s} : the number of sources,

  • N_{r} : the number of relays,

  • Q_{BS} : quota or connection capacity of the base station. This is equivalent to the number of LTE channels in the simulation scenarios.

  • The first summation in inequality (11) represents the constraint that each relay can only be assigned to a single source.

  • The second summation in inequality (11) represents the constraint that each relay can only be connected to a single base station. Although this constraint is written in a general form, however we have considered only one base station in our model.

  • The first summation in inequality (12) represents the constraint that each source can only be connected to a single relay.

  • The second summation in inequality (12) represents the constraint that each source can only be connected to a single base station. Although this constraint is written in a general form, however we have considered only one base station in our model.

  • The total number of two hop connections of sources to base station through relays (the first summation in inequality (13)) and total number of direct connections of sources to the base station (the second summation in inequality (13)) is less than or equal to the total number of available channels for connection to the base station (Q_{B}S ).

Fig. 2 shows the scheme of the graph model of our relay selection problem.

FIGURE 2. - The scheme of the graph model of our relay selection problem.
FIGURE 2.

The scheme of the graph model of our relay selection problem.

SECTION III.

Proposed Centralized Relay Selection Algorithm

In this section, we propose a new solver for the k -cardinality assignment problem that finds k maximum weighted matching in a bipartite graph. The k -cardinality assignment problem can be solved by a polynomial solver [33]. Some papers proposed solutions [34], [35], but we provide a new simple approach for solving it. In the following, we first describe the proposed solver of the k -cardinality assignment problem and then explain the details of the proposed centralized optimal relay selection algorithm. In Subsubsection III-A3, we prove that the proposed k -cardinality assignment solver obtains a mathematically optimal solution for the k -cardinality assignment problem.

Then, we use this solver to introduce a centralized relay selection algorithm to solve the problem formulated by equation (7). For this purpose, we transform the relay selection problem to a k -cardinality assignment problem and solve the problem using the proposed k -cardinality assignment solver. In Section III-B, we show that the proposed relay selection algorithm provides an optimal solution for the relay selection problem.

A. A New Solution for the k -Cardinality Assignment Problem

In this section, we provide a solution for the k -cardinality assignment problem, which is a generalization of the standard assignment problem [35]. The k -cardinality assignment problem is defined as finding the maximum weight matching among all matchings with at most k edges in a bipartite graph.

The Hungarian algorithm is a common solution for the standard assignment problem [36], but it can not solve a k -cardinality assignment problem. Therefore, we transform the k -cardinality assignment problem to a standard assignment problem that would be solved by the Hungarian algorithm [37]. The complexity of the algorithm is O(N^{3}) where N is the number of vertices of the standard assignment problem [36], [38].

Our model is a bipartite weighted graph G=(V \cup U, E) where \lbrace V \cup U \rbrace is set of vertices, |V|=n , |U|=m , E=\lbrace (v_{i}, u_{j})| v_{i} \in V \,\,\wedge u_{j} \in U \rbrace is the set of edges and w_{(}i, j) is the cost of edge (v_{i}, u_{j}) . We want to select k edges (k \leq min\lbrace m, n \rbrace) so that sum of the weights of selected edges is maximized. If k=n or k=m , the new problem will be equivalent to the standard assignment problem without any constraint on the number of selected edges [34], [35]. The scheme of the bipartite graph model of the k -cardinality assignment problem is shown in Fig. 3.

FIGURE 3. - The scheme of the bipartite graph model of the 
$k$
-cardinality assignment problem.
FIGURE 3.

The scheme of the bipartite graph model of the k -cardinality assignment problem.

1) Step 1: Transforming the k -Cardinality Assignment Problem to a Standard Assignment Problem

In the first step, we want to transform the assignment problem with the constraint on the number of edges to a standard assignment problem. In the standard assignment problem, we are looking for a set of edges in the bipartite weighted graph with the maximum total weight. Now, we are going to transform the restricted problem into an unconstrained one, so that the results coming from both problems would be corresponding to each other.

For this purpose, we add some additional vertices to each side. The number of vertices that are added to each side is equal to the difference between the size of another side, m or n , and constrained number of edges, k . In other words, we add n_{A}^{V} = m-k vertices to V side and n_{A}^{U} = n-k vertices to U side.

The weight of edges connected to new vertices with other new vertices on the other side is set to 0 and the weight of other added edges is set to a large enough value (A_{value} ) such as 1 + \sum _{e \in E} w_{e} or infinity. Intuitively, adding new vertices and their edges by this method causes the lower weight initial edges to be defeated by A_{value} -weighted edges. In Lemma 1 proved that exactly ((m-k)+(n-k)) edges with A_{value} -weight are selected, therefore, only k initial edges with maximum total weight can be selected in the optimal assignment.

Now, we can find maximum weighted matching in the new bipartite graph by the Hungarian algorithm. Fig. 4 shows the transformation of a k -cardinality assignment problem to a standard assignment problem.

FIGURE 4. - The transformation of a 
$k$
-cardinality assignment problem to a standard assignment problem.
FIGURE 4.

The transformation of a k -cardinality assignment problem to a standard assignment problem.

2) Step 2: Obtaining Final Results of the Transformed Assignment Problem

The output of the Hungarian algorithm is a vector with m+n-k size. Every component of this vector represents a vertex of the V side. The value of any component contains the index of a vertex from the U side. Therefore, it is enough to separate the n first components of the output vector that represent the initial vertices and check their content. If the value of the component is less than m , it indicates an edge between a vertex of the V side that is represented by the component index and a vertex of the U side that is represented by the component value. Otherwise, if the value of the component is greater than or equal to m , it means that this vertex does not have any edge in the original problem. In this way, we can obtain the solution of the k -cardinality assignment problem from the solution of the transformed standard assignment problem. The proof of correctness of the new method for solving the k -cardinality assignment problem will be shown in the Theorem 1.

3) Proof of Optimality of the Proposed k -Cardinality Assignment Solver

The mathematical formulation of finding a maximum matching with k -cardinality (k edges) in a weighted bipartite graph, is expressed in Equation (14) as:\begin{equation*} \mathop {\mathrm {Max}} _{| S_{se} |=k} \sum _{e_{i,j} \in S_{se}}{ w_{e_{i, j}} },\tag{14}\end{equation*} View SourceRight-click on figure for MathML and additional features. where S_{se} is the set of selected edges of the original problem.

The purpose of the discussion in this subsection is to prove that the method presented in Section III-A provides an optimal solution for equation (14).

The transformation from equation (14) to equation (15) can be summarized as adding new vertices with 0-weighted and A_{value} -weighted edges to each side. It is proved that the optimal solutions of the transformed equation (15) are in one-to-one correspondence with the optimal solutions of the original equation (14). The transformed equation is expressed as:\begin{equation*} \mathop {\mathrm {Max}} _{| S_{se} |= m+n-k} \lbrace n_{A_{s}} \times A_{value} + \sum _{{e_{i,j}} \in S_{se}} w_{e_{i, j}} \rbrace,\tag{15}\end{equation*} View SourceRight-click on figure for MathML and additional features. where n_{A_{s}} is the number of selected A_{value} -weighted edges and S_{se} is the set of selected edges of the transformed problem.

Lemma 1:

For maximization of the equation (15), the number of selected A_{value} -weighted edges, or n_{A_{s}} , is a constant value and n_{A_{s}} = (m-k)+(n-k) .

Proof:

It is demonstrated by contradiction.

  • Step 1-

    We assume n_{A_{s}} < (m-k)+(n-k) and the summation of edge weights is equal to w_{sum} . Therefore, at least one of the new vertices does not connect to the initial vertices with a A_{value} -weighted edge. Accordingly, for maximization of equation (15), we can replace at least an A_{value} -weighted edge with the lowest weight edge (w_{min} ). Hence, the new summation of edge weights (w_{sum_{new}}) is greater than or equal to w_{sum} - w_{min} + A_{value} . Since A_{value} > w_{min} , thus w_{sum_{new}} > w_{sum} . Now, we reach a solution with n_{A_{s}} \geq (m-k)+(n-k) . This number of A_{value} -weighted edges contradicts the initial assumption. Therefore, n_{A_{s}} \nless (m-k)+(n-k) .

  • Step 2-

    Now, we assume n_{A_{s}} > (m-k)+(n-k) . But, it is impossible, because, we have only (m-k)+(n-k) new vertices in total. Hence, we can have up to (m-k)+(n-k) of A_{value} -weighted edges. It contradicts the previous assumption. Therefore, n_{A_{s}} \ngtr (m-k)+(n-k) .

Hence, it can be concluded that the number of A_{value} -weighted edges is equal to n_{A_{s}} = (m-k)+(n-k) .

Now, we rewrite the equation (15) as below:\begin{equation*} \mathop {\mathrm {Max}} _{| \lbrace S_{se} - E_{A} \rbrace |= k} \lbrace \sum _{{e_{i,j}} \in \lbrace S_{se} - E_{A} \rbrace } w_{e_{i, j}} + n_{A_{s}}^{*} \times A_{value} \rbrace,\tag{16}\end{equation*} View SourceRight-click on figure for MathML and additional features. where n_{A_{s}}^{*}= (n-k)+(m-k) is the number of selected A_{value} -weighted edges for optimization of the equation (15), S_{se} is the set of selected edges of the transformed problem and E_{A} is the set of A_{value} -weighted edges.

Theorem 1:

Each optimal solution for the k -cardinality assignment problem corresponds to an optimal solution for the transformed standard assignment problem and vice versa.

Proof:

We denote the set of optimal solutions of equation (14) as S and the set of optimal solutions of equation (16) as S^{*} . Each solution has up to m+n-k edges. According to Lemma 1, the number of A_{value} -weighted edges is equal to n_{A_{s}}^{*} = (n-k)+(m-k) in optimal solutions. Hence, the number of edges other than A_{value} -weighted edges is equal to k . Therefore,

  • To construct the corresponding item of S from an item of S^{*} , it is enough to remove all the n_{A_{s}}^{*} edges with A_{value} -weight and the k remaining obtained edges are the S solution, and

  • To construct the corresponding item of S^{*} from an item of S , it is enough that n_ {A_{S}}^{*} edges with A_{value} -weight from the unassigned initial vertices are connected to the new vertices. Hence, the obtained edges are the S^{*} solution, and the number of them is equal to m+n-k .

Fig. 5 shows the scheme of the bijection between the answer space of the problems.

FIGURE 5. - The scheme of the bijection between answer space of the problems (14) and (16).
FIGURE 5.

The scheme of the bijection between answer space of the problems (14) and (16).

B. Centralized Optimal Relay Selection Algorithm (ORSA)

In this section, an optimal relay selection problem is solved. Thus we transform this problem in two steps to become a k AP. In the following, the optimal relay selection problem-solving process is described.

The configuration of our relay selection problem is shown in Fig. 2. As it can be seen in this figure, we have two sets of machines, the sources and the relays. The sources should be connected to the base station directly or by using a relay.

In the assignment, between the sources and relays through the original problem, each source can connect to only one relay and each relay can connect to only one source. Besides, the base station has Q_{BS} channels for communication with the machines, whether a source or a relay. The conditions of the channels are considered similar. On the other words, each source or relay can connect to only one of the channels of the base station, and the base station can connect to up to Q_{BS} machines. Therefore, in the final assignment, the total number of edges connected to the base station can be equal to Q_{BS} .

1) Step 1: Transform Our Optimal Relay Selection Problem to a k -Cardinality Assignment Problem

In this step, the transformations of the relay selection problem (Fig. 2) to a bipartite graph model (Fig. 6) is presented. To model the relay selection problem as a bipartite graph, we consider N_{s} vertices on the left side of the bipartite graph, where each vertex corresponds to a source of the network. On the right side of the bipartite graph, we consider N_{r} + Q_{BS} vertices where the first N_{r} vertices each correspond to one of the relays and the second Q_{BS} vertices each correspond to one of the Q_{BS} channels of the base station.

FIGURE 6. - The bipartite graph model of the relay selection problem.
FIGURE 6.

The bipartite graph model of the relay selection problem.

The bipartite graph model of the relay selection problem is shown in Fig. 6. In this modeling, an edge from the i th vertex of the left side to one the top N_{r} vertices of the right side, represents a connection from the i_{1} th source to a relay, and a connection from that relay to the base station. Furthermore an edge from the i_{2} th vertex of the left side to one of the Q_{BS} vertices represents a direct connection from the i_{2} th source to the base station without any relay.

The weight of the edge between two vertices on both sides of the graph is defined as follows:

  • the weight of the edge between a source and a relay is equal to the capacity of two hops path, that is minimum of the capacity of the source and the relay link and the capacity of the relay and the base station link, and

  • the weight of the edge between a source and each channel of the base station is equal to the capacity of the source and the base station link.

As mentioned, the original problem had the constraint of having at most Q_{BS} connections from the machines to the base station. This constraint is modeled by the selection of at most Q_{BS} edges in the bipartite graph assignment problem. From the modeling presented here, it is clear that the relay selection problem is equivalent to solving the k -cardinality assignment problem on this bipartite graph, with k = Q_{BS} .

2) Step 2: Transform Our k -Cardinality Assignment Problem to a Standard Assignment Problem Without Edge Number Constraint

We want to find Q_{BS} edges that maximize their total weight in the new problem. The current problem is similar to the problem mentioned in Section III-A1. Therefore, it can be solved in the same way.

As stated in Section III-A1, we add new vertices to both sides, N_{r} + Q_{BS} - Q_{BS} new vertices to the left side and N_{s} - Q_{BS} new vertices to the right side. Now, N_{s} + N_{r} vertices exist in both sides, and the new problem is a standard assignment problem that can be solved by a common solution such as the Hungarian algorithm. Fig. 7 shows the transformed bipartite graph model of the relay selection problem with the additional nodes.

FIGURE 7. - The transformed bipartite graph model of the relay selection problem with the additional nodes.
FIGURE 7.

The transformed bipartite graph model of the relay selection problem with the additional nodes.

3) Step 3: Obtaining Final Relay Selection From Solved Assignment Problem

After the two-step transformation, it is necessary to derive the solution of the initial problem from the obtained solution. Similar to Section III-A2, we have to extract the corresponding edges of the main problem from the set of output edges of the Hungarian algorithm. When the Hungarian algorithm is applied to the transformed problem, if it has a solution, its result will be a vector with N_{s} + N_{r} components. The content of the i th component represents the index of the vertex of the right side (j ), that is assigned to i th vertex of the left side by the Hungarian algorithm. But as mentioned earlier, in Section III-A2, the first N_{s} elements of the result vector are related to the main problem.

Now, there are three following possible situations for the value of j :

  1. 0 \le 0~j < N_{r} ,

  2. N_{r} \leq j < N_{r} + Q_{BS} ,

  3. j \geq N_{r} + Q_{BS} .

The first situation indicates that the i th source connects to the base station with two hops by the j th relay. The second situation indicates that the i th source connects to the base station directly. Finally, the last situation indicates that the i th source can not connect to any next hop of the network.

4) Centralized Algorithm Implementation

This section describes how to implement the transformation of our optimal relay selection problem to a standard assignment problem. We construct a capacity matrix in two steps. To achieve this goal, in the first step, the first part of the matrix is filled by the link capacity of the sources and the relays and each of the base station channels. Hence, we have a capacity matrix of the new k AP denoted by M . Then, to transform our k AP to a standard assignment problem, the rest of the matrix cells are filled by A_{value} , that \begin{equation*} A_{value} > \sum _{i = 0}^{N_{s}} \sum _{j = 0}^{N_{r}+Q_{BS} - 1} M_{i,j}.\tag{17}\end{equation*} View SourceRight-click on figure for MathML and additional features.

For example, A_{value} can be equal to (max(M_{i, j}) + 1) \times (N_{s}+ N_{r}+Q_{BS}) .

Now, to find the optimal assignment, the provided capacity matrix is given to an assignment problem solver such as the Hungarian algorithm. The Hungarian algorithm can be implemented in two different versions, one of which is used by default to find the maximum weighted matching and the other to find the minimum weighted matching. Therefore, if the Hungarian algorithm is implemented to find the maximum weighted matching, the capacity matrix and the number of vertices on each side are given as its inputs. Otherwise, If the Hungarian algorithm is implemented to find the minimum weighted matching, the negative matrix capacity and the number of vertices on each side are given as its inputs.

Finally, the desired output can be obtained from the output of the Hungarian algorithm using the method described in Section III-B3. The pseudo code of our proposed centralized matching relay selection algorithm is presented in Algorithm 1.

Algorithm 1 Proposed Centralized Optimum Relay Selection Algorithm

Step 1:

Transform our optimal relay selection problem to a k AP

1:

Construct the first part of the input capacity matrix of the standard assignment problem, M_{i, j} , according to the following rules:

  • M_{i, j} = min (C_{s,r}, C_{r, BS}) \quad for (0 \leq i < N_{s}) and (0 \leq j < N_{r}) ,

  • M_{i, j} = C_{s,BS} for (0 \leq i < N_{s}) and (N_{r} \leq j < N_{r}+ Q_{BS}) ,

Step 2:

Transform our k AP to a standard assignment problem and solve it

2:

A_{value} = (max(M_{i, j}) + 1) \times (N_{s}+ N_{r}+Q_{BS}) \quad for (0 \leq i < N_{s}) and (0 \leq j < N_{r}+ Q_{BS})

3:

Construct the second part of the input capacity matrix of the standard assignment problem, M_{i, j} , according to the following rules:

  • M_{i, j} = A_{value} for (0 \leq i < N_{s}) and (N_{r}+ Q_{BS} \leq j < N_{s} + N_{r}) ,

  • M_{i, j} = A_{value} for (N_{s} \leq i < N_{s} + N_{r}) and (0 \leq j < N_{s} + N_{r}) .

4:

Construct the set of edges E of the bipartite graph by edge_{i, j} = (left node index = i , right node index = j , M_{i, j} ),

5:

H^{o} vector = Hungarian(number of vertices = N_{s}+N_{r} , edges = E ),

Step 3:

Obtaining final relay selection from solved assignment problem

6:

Construct the final output assignment vector, O , from the output vector of the standard assignment solution, H^{o} , according to the following rules:

7:

for k \gets 1 to N do

8:

if H^{o}_{k} < N_{r} then

  • O_{k} = H^{o}_{k} : Meaning that the k th source is connected to the base station by the relay with index equal to O_{k} ,

9:

else if N_{r} \leq H^{o}_{k} < N_{r} + Q_{BS} then

  • O_{k} = N_{r} : Meaning that the k th source is assigned to the base station directly,

10:

else if H^{o}_{k} \geq N_{r} + Q_{BS} then

  • O_{k} = \phi : Meaning that the k th source can not connected to the base station.

5) Complexity of ORSA

ORSA is a centralized algorithm. So a central node should apply the proposed centralized relay selection algorithm. In this algorithm, we transform the relay selection problem to a standard assignment problem in two steps. Complexity of the transformation steps (Step 1 and item 1 to 4 of Step 2) is O((N_{s} + N_{r})^{2}) . But complexity of solving the standard assignment problem using the Hungarian algorithm is O(|vertices||E|)=O((N_{s} + N_{r}) \times (N_{s} + N_{r})^{2}) [36], [38]. Also Step 3 of Algorithm 1 has complexity of O(N_{s} + N_{r}) . Therefore, the total complexity of ORSA is O((N_{s} + N_{r})^{3}) . If the number of relays (N_{r} ) is constant and the number of sources is equal to N_{s} = n , the complexity of ORSA is O(n^{3}) .

SECTION IV.

Proposed Decentralized Relay Selection Algorithm

In this section, we propose a decentralized algorithm for relay selection based on matching theory to select a stable selection. First, we describe the matching theory elements, the proposed algorithm players and their preference lists. Then, the matching algorithm is presented to find a stable solution for the equation (7). The proof of stability of matching of MRSA is presented in Appendix A.

A. Matching Theory

Matching theory is a framework to model interaction between the rational and selfish players. We are mapping our problem to a matching theory problem. Some elements of our matching problem are mentioned below.

1) The Players

In our proposed algorithm, there are two types of players defined as follows:

  • Machines consist of sources and relays,

  • Base station.

In other words, each machine or the base station in matching algorithm are the rational and selfish players that they want to maximize their communication capacity.

2) Utility Function

The Utility function of machines and the base station in our algorithm is based on the capacity of the paths between the machines and with the base station. As previously mentioned, the capacity of direct and two hop paths are formulated by the equation (1) and the equation (6), respectively.

3) Preference Lists

The preference lists of machines or base stations are formed according to the node utility functions computed by received channel information between the node and its neighbors.

  • Each source has a preference list of its neighbor relays and base stations as their candidate next hops.

  • Each relay has two preference lists of its neighbors. The first list, or list of the candidate next hops list, ranks its neighbor base station as next hop for data forwarding of applicant sources. The second list, or the list of the previous hops, rank applicant sources that requested to this relay. For simplicity, in the proposed algorithm, the size of the second list is considered to be one.

  • Each base station has a list of its neighbor applicant sources and relays that requested it.

    We show the preference list of their candidate next hops of the machines by PL_{NH} and the preference list of the applicants of the base station and the relays by PL_{AP} .

Any source or relay sort candidate neighbors in the next hop preference list according to capacity in the path consist of this hop. Moreover, any relay or the base station sort the list of applications according to the capacity of the path traversed from that node.

In the following, we study the proposed decentralized relay selection algorithm players and the preference lists.

B. Decentralized Matching Based Relay Selection Algorithm (MRSA)

Due to high density of M2M communications, each machine can have local information from its neighbors and network conditions. On the other hand, although ORSA achieves optimal results, in practice, it can create a bottleneck in dense M2M communications. This bottleneck is either due to communication overhead between the central processor unit and the other nodes or the processing load on the central unit. In this regard, a decentralized algorithm for relay selection may be more suitable for this type of communication. The main idea of the proposed decentralized algorithm for each source is finding a stable matching to select a suitable path, direct path or two hop path, to the base station to reach its data to the destination. To achieve this aim, this algorithm provides a stable best relay selection.

The weak channel between sources and the base station causes a low data rate in the direct path of sources and the base station. Hence, if a relay is selected as the next hop of a source, the selected neighbor relay has two features. First, it must have enough connection capacity and second, the path containing that relay must have a higher data rate than the rate of the direct path between the source and the base station. Furthermore, the selected relay has an equal or higher data rate than the rate of the paths containing other neighbor relays with enough capacity.

The proposed decentralized matching based relay selection algorithm (MRSA) is executed in three steps. For simplicity, we assume the machines can synchronize with each other. Some methods are available to synchronize devices in a decentralized network [39], [40] which can be used for this manner.

Algorithm 2 presents the pseudo code of our proposed decentralized MRSA. At the beginning of the algorithm, the relays broadcast estimated capacity of data transmission with the base station, according to the estimated SINR with it. Therefore, the sources have enough information to sort the candidate next hops, the relays or the base station.

Algorithm 2 Proposed Decentralized Matching Based Relay Selection Algorithm: Initialization and Step 1

Step 0:

Initialization

  • Set BS= BS_{0} , M^{a} = \lbrace All \,\, of \,\, the \,\, sources \rbrace , M^{i} = \lbrace All \,\, of \,\, the \,\, relays \rbrace , and every m \in \lbrace M^{a} \cup M^{i} \rbrace is a machine

  • Set {\textit {MATCHLIST}} \leftarrow M^{a} ,

  • Construct Preference List of Next Hops (PL_{NH} ) for the Source, PL_{NH} \leftarrow \lbrace BS_{0} \cup \lbrace The \quad neighbor \quad relays \rbrace \rbrace ,

  • Construct Preference List of Next Hops (PL_{NH} ) for the Relays, PL_{NH} \leftarrow \lbrace BS_{0} \rbrace ,

  • Construct Preference List of Applicants (PL_{AP} ) for the Base Stations and the Relays, PL_{AP} \leftarrow \phi ,

Step 1:

Find a suitable next hop for each source

1:

while {\textit {MATCHLIST}} \neq \phi do

2:

m_{new} , the first machine in {\textit {MATCHLIST}} , requests to the first element in PL_{NH} (shown by NH_{curr} )

3:

if NH_{curr} has enough connection capacity then

4:

- Add m_{new} to PL_{AP} of NH_{curr} ,

5:

if NH_{curr} \in M^{i}~{\mathbf {and}} ~NH_{curr} does not exist in {\textit {MATCHLIST}} then

6:

- Add NH_{curr} to {\textit {MATCHLIST}} .

7:

else if m_{new} demand capacity > m_{curr}^{min} demand capacity (m_{curr}^{min} is the current m with minimum capacity) then

8:

(For m_{curr}^{min} )

9:

- Delete m_{curr}^{min} from PL_{AP} of NH_{curr} ,

10:

- Delete NH_{curr} from PL_{NH} of m_{curr}^{min} ,

11:

- Add m_{curr}^{min} to {\textit {MATCHLIST}} .

12:

(For m_{new} )

13:

- Add m_{new} to PL_{AP} of NH_{curr} ,

14:

- Delete m_{new} from {\textit {MATCHLIST}} .

15:

else if m_{new} demand capacity \leq m_{curr}^{min} demand capacity then

16:

(For m_{new} )

17:

- Delete NH_{curr} from PL_{NH} of m_{new} .

18:

if PL_{NH} of m_{new} = \phi then

19:

- Delete m_{new} from {\textit {MATCHLIST}} ,

20:

if m_{new} \in M^{i} then

21:

- Delete all of machines in PL_{AP} of m_{new} .

Step 2:

Finish matching section and Start data forwarding

1:

- Match each source with the first element in the Preference List of next hops,

2:

- Match each relay with the first element in the Preference List of next hops, and with the first element in the Preference List of applicant machines,

3:

- Match base station with the first element in the Preference List of applicant machines,

4:

- Any machine sends data to the matched next hop.

Furthermore, in the initialization section of the algorithm, the machines construct the preference list of their candidate next hops (PL_{NH} ). In addition, the base station and the relays construct the preference list of their applicants (PL_{AP} ). Then all of the sources are added to MATCHLIST. Any unmatched machines in MATCHLIST sort their candidate next hops List, according to channel conditions with their neighbors and received information from them, in the beginning of the matching time.

In step 1, every time the first unmatched machine in MATCHLIST requests its application to the first next candidate in its preference list.

On the other hand, each node receiving the request, either a relay or the base station, has a given quota as the connection capacity. The quota for relays is equal to one and the quota of the base station is equal to the number of LTE channels. Thus, any receiver node accepts to a maximum of its quota from the best applicant machines and rejects other machines.

If the relay or base station that received the machine application has enough quota (connection capacity), the applicant machine will be added to the relay or base station preference list. Otherwise, if the new applicant machine is preferred over the worst current applicant machine it will be replaced with it. If neither of these cases hold, the new applicant machine is rejected by the current relay or the base station. Then, the applicant machine requests to its next best hop candidate, until no candidate remains in its preference list of their candidate next hops.

If a relay that receives a request from a source, does not have a specified next hop, it will be added to MATCHLIST to specify its next hop. Besides, if the relay does not find any next hop, it will reject its applicant sources.

The algorithm continues until no machine remains in MATCHLIST. During the execution of step 1 of the algorithm, no machine forwards its data to the destination. In step 2, any nodes match with the final best candidate in preference lists of next hops or applicants. Then, any machine sends data to the base station by the matched next hop that is selected in the previous step.

1) Complexity of MRSA

MRSA can be implemented in a decentralized way for each source. We applied the deferred acceptance procedure [30] to implement this algorithm (Algorithm 2). In worst case, complexity of this procedure is O(|\textrm {MATCHLIST}|^{2}) . In MRSA, |\textrm {MATCHLIST}|=N_{s}+N_{r} , so the complexity of MRSA is O((N_{s}+N_{r})^{2}) . If the number of relays (N_{r} ) is constant and the number of sources is equal to N_{s} = n , the complexity of MRSA is O(n^{2}) .

C. Proof of Stability and Optimal Stability of MRSA

This proposed decentralized algorithm is based on the deferred acceptance procedure. It is proved that the result of this algorithm is a stable solution [30].

The following definitions are required in the proofs:

  • Definition (in terms of matching theory): In a stable matching, there are no two nodes that they want each other but they match with another node.

  • Definition (in terms of matching theory): The possible matching between an applicant node and another node means there exists at least one stable matching that assigns the applicant node to the other node.

1) Stable Result

We claim that after algorithm 2 is finished, the achieved matching result will be stable.

Proof:

It is demonstrated by contradiction. We assume the proposed matching result is not stable, so there are two nodes, for example, i and j , that prefer each other to the current matched node. Therefore, applicant node i , before requesting to the current matched node, has requested to node j and node j rejected node i . This means that node j prefers current matched node to node i . Thus it is a contradiction and the provided matching is stable.

It is important to note that in order to achieve stability in this procedure, it is necessary that the device’ s priority is not the same when selecting a path. In our scenario, according to a random location and channel condition between devices, the probability of equal capacity between two devices is near to zero. Therefore, it does not hinder the proof of the stability of the problem.

2) Optimal Stable Result for Sources

Moreover, we claim for each source (as applicant node in matching theory), the provided stable matching is at least as well as any other stable possible matching using the same nodes.

Proof:

We prove by induction. By the induction assumption, it is assumed that up to some point there is no applicant node that is rejected by a recipient node which was possible for the applicant node. Now, consider that at this point, an applicant node A is rejected by recipient node R . Now, we prove for the induction step that R is impossible for A . The recipient node keeps q of the best requests (q is the quota of the recipient node), such as s_{1}, \ldots, s_{q} and other requests, such as A , are rejected. It is clear that for each of s_{i} where {1 \leq i \leq q} , s_{i} prefers R to another recipient node except those that have rejected s_{i} . Now, we assume by contradiction that R is possible for A (i.e. a stable matching exists which has matched A with R ). It is clear that in this matching, at least one of the s_{i}\text{s} will be matched to a recipient with lower preference for it and rejected by R . However this matching is unstable because s_{i} and R could be matched which is preferred by both of them (due to the induction assumption). This means that the matching is unstable, and this is a contradiction. Therefore R is impossible for A and this proves the induction step. Therefore, we proved by induction that the matching is an optimal stable matching for sources.

In the following, we investigate the simulation results of the proposed algorithms in comparison with the direct transmission of data without a relay selection algorithm, as well as a completely random selection algorithm.

SECTION V.

Simulation Results

To evaluate the performance of the proposed relay selection algorithms, we simulate our algorithms in a square environment, 590 \times 590 (m^{2} ). In this square, N machines are randomly placed with a uniform distribution. Because of the random nature of the scenarios, the algorithm runs n=1000 times and the average value is provided by considering these runs. In each run, the number of sources is constantly N^{a} , and the rest of the N^{i} machines relays, where N^{i}=N-N^{a} . In these simulations, the LTE uplink frequency range is considered 1900–1920(MHz), and the WiFi uplink frequency range for outdoor connections is considered 5590–5610(MHz).

The simulations are implemented in the C++ language. The simulations were executed on a device with a 4-core Intel(R) CPU (Intel Core i7-4710HQ @ 2.50GHz) and 16 GB of RAM. The simulation parameters are given in Table 1.

TABLE 1 Simulation Parameters
Table 1- 
Simulation Parameters

We compare the proposed relay selection algorithms (ORSA and MRSA) results with two baseline algorithms namely the direct transmission Without any Relay Selection Algorithm (WRSA) and the fully Random Relay Selection Algorithm (RRSA).

WRSA is a decentralized algorithm. In WRSA, the sources do not select any relays and only select the neighbor base station (i.e. base stations that can transmit and receive messages to the source). In this algorithm, each source requests to the neighbor base stations and creates a connection if possible. For each applicant source, if the base station has connection capacity, it accepts the source and they are assigned to each other. Hence, if the number of sources is of order n , the complexity of the algorithm will be O(n) .

RRSA is also implemented in a decentralized way. In RRSA, each source selects its next hop completely randomly only once among all the relays and the base station. In RRSA, each source only requests a single relay or the base station, and if the request was possible a connection would be established, otherwise, no other request would be made. If the source selects a relay, and the relay is unable to communicate with the base station for any reason, such as lack of connection capacity or inability to communicate with the base station, the source will not change its selected choice. Additionally, if the source selects the base station, and the base station can not communicate with the source, the source will not change its selected choice. Thus the complexity of RRSA is O(n) .

It is noticeable that in WRSA only one type of RF interface (LTE) is used for direct communication of the machines to the base station, But when using relays in ORSA, MRSA, and RRSA, according to the static setting of the RF interfaces, two types of interfaces (LTE and WiFi) are used simultaneously and communication between machines does not affect the direct communication of the machines to the base station.

Table 1 provides the default parameters in our simulations. In the following, we compare the algorithms in different aspects and investigate the impact of some different parameters by changing the default values of parameters in the different scenarios that are discussed below.

The different scenarios are described below:

  • Scenario 1: The aim of this scenario is to compare all algorithms when the total number of network machines is constant and the number of relays and sources change proportionally.

  • Scenario 2: In this scenario, all algorithms are compared where the number of relays is constant and the number of sources is varied in a specific range.

  • Scenario 3: The impact of changing the relay number for ORSA and MRSA is investigated in this scenario.

  • Scenario 4: The impact of changing the number of the base station LTE channels for ORSA and MRSA is investigated in this scenario.

The evaluation metrics considered in the scenarios are as follows:

  • Average Capacity of Connections between Sources and the Base station: The capacity of each link is the maximum bit rate that can be used according to the link conditions. The average capacity of connections between sources and the base station after completing the execution of the algorithms. Hereinafter, this parameter is briefly referred to as the average capacity of sources.

  • Average Number of Unmatched Sources: The average of the number of sources that have not been matched after completing the execution of the algorithms.

  • Actual Execution Time of Proposed Algorithms: The average duration time of the proposed algorithms (ORSA and MRSA) execution is measured and recorded for all scenarios. The curves of time values are plotted as a scatter with smooth lines and markers. To better visualize the trend of these curves, we calculated the trendline of these time curves using the trendline feature of Microsoft Office. We selected the polynomial trendline that had a good fit with the main curve.

As this paper discusses uplink communication, it is important to transmit data of sources to their destinations via the base station as a bridge linking machines with the broadband infrastructure network. Therefore, the evaluation metrics include the average capacity of connections between matched sources and the base station and the number of unmatched sources.

A. Scenario 1

In this scenario, we investigate the difference of four algorithms, WRSA, RRSA, ORSA and MRSA, assuming the number of the base station LTE channels is a large enough constant and it does not restrict source assignment to it, directly or by one hop. Besides, the total number of network machines is constant and the number of relays and sources change proportionally.

We compare WRSA, RRSA, ORSA and MRSA in terms of the average capacity of sources, the number of unmatched sources and the complexity in equal conditions compared as in Table 2.

  1. Capacity

    Fig. 8 shows a comparison of the average capacity of sources of WRSA, RRSA, ORSA and MRSA. The curves of ORSA, MRSA and RRSA are in a descending trend. This is because of the following reasons:

    • increasing the number of sources along the graph increases the interference of the transmitters (sources) on the shared WiFi channel, and

    • decreasing the number of relays across the graph reduces the improvement of capacity created due to the help of the relays.

      Due to path loss, shadowing and fading effects, attenuation of direct communication between the sources and the base station occurs. ORSA and MRSA, which select the relays to achieve optimal or stable assignment respectively, generally yield more average capacities of sources than WRSA and RRSA.

      On the other hand, ORSA and MRSA converge to WRSA at the end of the curve because these algorithms have similar functionality in the absence of any relays. Furthermore, WRSA curve almost follows a constant trend along the graph. This is due to the fact that all of the assigned sources directly connect to an LTE channel of the base station with the same bandwidth. The small possible difference of WRSA points is related to the different channel conditions with each of the sources.

      Additionally, as can be observed, ORSA has the best average capacity of sources among these algorithms. This is a direct result of the optimality of ORSA compared to other algorithms (that is shown in Section III-B). MRSA has a result very close to the optimal result, which is at most 3% less than ORSA result. Moreover, MRSA result is higher than WRSA and RRSA results, about 56% and 117% on average, respectively. Furthermore, WRSA has the next rank about this parameter results and it is superior to RRSA, about 45% on average.

      To verify our results, we analyze the results of each of the relay selection algorithms. The standard deviation of the results on all runs of the algorithms are 0.27, 0.34, 0.16 and 0.16 for WRSA, RRSA, ORSA and MRSA, respectively.

  2. Unmatched Source Number

    Due to the fading and shadowing effects in all scenarios, as shown in Fig. 9, a number of sources still are not connected to the base station. This can be explained in more details as follows:

    • Using WRSA, all sources try to connect directly to the base station. However, as can be seen from the simulation results, the presence of fading and shadowing effects attenuates the direct connection channels. Without a relay, there is no other way to connect the sources to the base station when the direct channel conditions are poor. Therefore, as the number of sources increases, an approximately constant proportion of them are not matched to the base station.

    • Using RRSA, according to the fully random nature of RRSA, each source selects between the direct connection or connection through the relays to the base station with 50-50% probability. In other words, a request to connect any source to connect to the base station occurs in two forms:

    • Direct connection to the base station with a probability of 50%, in which case the conditions will be like WRSA.

    • Connection to the base station through random selection between relays with a probability of 50%, in which case the connection may not be established due to the lack of communication capacity of the randomly selected relay.

    Therefore, as shown in Fig. 9, the number of unmatched sources of the RRSA algorithm is even higher than WRSA.
    • As mentioned in the previous section, ORSA and MRSA increase the average capacities of sources compared to WRSA and RRSA, by selecting the optimal or stable relays. As a result, it is natural that the number of unmatched sources after the execution of ORSA and MRSA is less than the other two algorithms.

      Given that in Scenario 1 the total number of machines was fixed at 100, increasing the number of sources means decreasing the number of idle machines or relays. Hence up to the point where the number of sources is less than or equal to 50, the number of relays is more than or equal to the number of sources. Since each relay can help a maximum of one source to send data, after this point even if each source neighbors at least one relay, some sources still are not able to connect to relays to compensate the weakness of their direct connection with the base station. Therefore the pace of the increase in the number of unmatched sources in the second half of the ORSA and MRSA curves is greater than in the first half.

      In addition, it is clear that the optimal allocation in ORSA has been able to increase the number of unmatched sources compared to MRSA by an average of 0.5 sources and at maximum of 1.6 sources. The higher average of ORSA capacity compared to MRSA, observed in Fig. 8, is also in accordance with the aforementioned fact.

  3. Actual Execution Time of Proposed Algorithms

    Measured the actual execution time of our proposed algorithms is shown in Fig. 10. In the curve trendline, the coefficient of n^{3} is near zero and this shows that the complexity of execution time is of order O(n^{2}) . Therefore, as seen in Fig. 10, the order of trendline of actual execution time is at least less than or equal to the complexity of both of algorithms, ORSA and MRSA, that is calculated in Subsection III-B5 and IV-B1. Furthermore, it can be seen that ORSA actual execution time is more than MRSA actual execution time.

    According to Fig. 8, the algorithms can be ordered as ORSA, MRSA, WRSA and RRSA, in terms of the average capacity,. However, in terms of complexity, WRSA and RRSA, have lower complexity than MRSA and ORSA, respectively. Therefore, these algorithms possess a trade off between the better average capacity of sources and lower complexity and vice versa.

    It should be noted that in this scenario, as the number of sources increases, the number of relays decreases. As both sources and relays have an equal impact on the execution time, the worst case happens when the number of sources and the number of relays is equal in the middle point of the curve.

TABLE 2 Simulation Parameters of Scenario 1
Table 2- 
Simulation Parameters of Scenario 1
FIGURE 8. - The average capacity of sources for WRSA, RRSA, ORSA and MRSA vs. the number of sources in Scenario 1.
FIGURE 8.

The average capacity of sources for WRSA, RRSA, ORSA and MRSA vs. the number of sources in Scenario 1.

FIGURE 9. - The average number of unmatched sources for WRSA, RRSA, ORSA and MRSA vs. the number of sources in Scenario 1.
FIGURE 9.

The average number of unmatched sources for WRSA, RRSA, ORSA and MRSA vs. the number of sources in Scenario 1.

FIGURE 10. - The average actual execution time for ORSA and MRSA (ms) vs. the number of sources in Scenario 1.
FIGURE 10.

The average actual execution time for ORSA and MRSA (ms) vs. the number of sources in Scenario 1.

B. Scenario 2

This scenario is similar to Scenario 1 with a large enough constant number of LTE channels and the number of sources is varied in a specific range. But, it has a fixed number of relays. In the following, each of the four algorithms is compared under the same conditions as in Table 3.

  1. Capacity The comparison of the average capacity of sources of WRSA, RRSA, ORSA and MRSA is shown in Fig. 11. Due to the fact that WRSA does not use relays, the difference in the number of relays in Scenario 2 has no effect on its chart compared to Scenario 1. The curves of ORSA, MRSA and RRSA are in a descending trend similar to Scenario 1. Moreover, the number of relays in Scenario 2 is constant at 75, so when the number of sources is in the range [1, 25), the number of relays is less than the same range in Scenario 1. Also, in the range [25, 100], the number of relays is more than the same range is in scenario 1.

    Therefore, in Scenario 2, for all three algorithms in the range [1, 25), there are fewer options of next hops for the sources, which makes the average capacity a less than Scenario 1. In contrast, in the range [25, 100], sources have more options to select the next hop, and the average container is higher than Scenario 2.

    To verify this scenario results, we analyze them by the standard deviation of the results on all runs of the algorithms. The standard deviation of the results is equal to 0.27, 0.33, 0.15 and 0.15 for WRSA, RRSA, ORSA and MRSA, respectively.

  2. Unmatched Source Number

    As mentioned in the analysis of Fig. 11, in the range [25, 100], sources have more relays available to select as the next hop, and more sources can match with the base station by a relay. Therefore, ORSA, MRSA and RRSA which are dependent on relays have less unmatched sources with respect to Scenario 1. But as seen in Fig. 12, since WRSA does not use relays, the difference in the number of relays in Scenario 2 has no effect on the number of unmatched sources compared to Scenario 1.

  3. Actual Execution Time of Proposed Algorithms

    In this scenario, the actual execution time of our proposed algorithms is measured where the number of relays is relatively high constant (N_{r}=75 ). As shown in Fig. 13, the ORSA execution time has a small coefficient of n^{2} and the MRSA execution time is almost linear. For both of these curves, having an upper bound of O(n^{3}) for ORSA and O(n^{2}) for MRSA is observed, which was previously discussed in subsection III-B5 and IV-B1 respectively.

TABLE 3 Simulation Parameters of Scenario 2
Table 3- 
Simulation Parameters of Scenario 2
FIGURE 11. - The average capacity of sources for WRSA, RRSA, ORSA and MRSA algorithms vs. the number of sources in Scenario 2.
FIGURE 11.

The average capacity of sources for WRSA, RRSA, ORSA and MRSA algorithms vs. the number of sources in Scenario 2.

FIGURE 12. - The average number of unmatched sources for WRSA, RRSA, ORSA and MRSA algorithms vs. the number of sources in Scenario 2.
FIGURE 12.

The average number of unmatched sources for WRSA, RRSA, ORSA and MRSA algorithms vs. the number of sources in Scenario 2.

FIGURE 13. - The average actual execution time for ORSA and MRSA (ms) vs. the number of sources in Scenario 2.
FIGURE 13.

The average actual execution time for ORSA and MRSA (ms) vs. the number of sources in Scenario 2.

C. Scenario 3

The purpose of simulating this scenario is to investigate the effect of changing the number of relays on both ORSA and MRSA. We simulate ORSA and MRSA according to the parameters in Table 4.

  1. Capacity

    The results shown in Fig. 14 state that for ORSA and MRSA in equal conditions, a greater number of relays results in a more sources connecting to the base station. This yields in a higher average capacity of sources in the network. Additionally, similar to Scenario 1 (in Section V-A), ORSA results are slightly higher than MRSA in the absence of a channel constraint. The average standard deviation of the average capacity when the number of channels are 25, 50 and 75 are equal to 0.21, 0.17 and 0.15 for ORSA and 0.21, 0.18 and 0.16 for MRSA, respectively.

  2. Unmatched Source Number

    As shown in Fig. 15, Existence of more relays in the network will connect more sources to the base station and reduce the number of unmatched sources. As expected, ORSA unmatched sources are lower than MRSA.

  3. Actual Execution Time of Proposed Algorithms

    As see in Fig. 16, the average actual execution time trendline calculated in multiple settings (N_{r}=25 , N_{r}=50 and N_{r}=75 ) of Scenario 3 simulations indicates a small coefficient of n^{2} for ORSA and a linear trendline for MRSA. Therefore, having an upper bound of O(n^{3}) for ORSA and an upper bound of O(n^{2}) for MRSA, as mentioned in subsection III-B5 for ORSA and subsection IV-B1 for MRSA is confirmed.

TABLE 4 Simulation Parameters of Scenario 3
Table 4- 
Simulation Parameters of Scenario 3
FIGURE 14. - The average capacity of sources for ORSA and MRSA vs. the number of sources in Scenario 3.
FIGURE 14.

The average capacity of sources for ORSA and MRSA vs. the number of sources in Scenario 3.

FIGURE 15. - The average number of unmatched sources for ORSA and MRSA vs. the number of sources in Scenario 3.
FIGURE 15.

The average number of unmatched sources for ORSA and MRSA vs. the number of sources in Scenario 3.

FIGURE 16. - The average actual execution time for ORSA and MRSA in multiple settings (ms) vs. the number of sources in Scenario 3.
FIGURE 16.

The average actual execution time for ORSA and MRSA in multiple settings (ms) vs. the number of sources in Scenario 3.

D. Scenario 4

In this scenario, we want to evaluate the influence of changing the number of the base station LTE channels for ORSA and MRSA. Other parameters of this scenario are listed in Table 5.

  1. Capacity

    The results of the simulation of this scenario are presented in Fig. 17. These curves illustrate the following observations:

    • Regarding the fact that the total LTE bandwidth has a constant value (20MHz as stated in Table 1), a lower number of channels causes a greater capacity portion for each source. The optimal results show that despite a lower channel number in total, the ORSA-25 channel curve has the highest average capacity.

    • Optimal results provided by ORSA, show that when the number of LTE channels is 25 the average capacity of sources is higher than when the number of LTE channels is 50, and when the number of LTE channels is 50 the average capacity of sources is higher than when the number of LTE channels is 75.

    • When the number of sources reaches the number of channels (25, 50 and 75), all curves show the average capacity drop. This is due to the fact that when the number of sources exceeds the number of available LTE channels some sources to be unable to connect to the base station.

    The average standard deviation of the average capacity when the number of channels are 25, 50 and 75 are equal to 0.14, 0.13 and 0.14 for ORSA and 0.14 for MRSA in all cases., respectively.

  2. Unmatched Source Number

    As it can be seen in Fig. 18, when the base station has fewer LTE channels to communicate with machines, the number of sources able to communicate with the base station decreases and the number of unmatched sources increases.

    Also, The simulation results show that in both ORSA and MRSA, as long as the number of sources is less than the number of LTE channels available, most sources can be connected to the base station, and only a small number remain unaddressed due to conditions such as channel attenuation. Afterwards, bypassing the number of sources through the number of channels, it is seen that as the number of sources increases, the number of unmatched sources also increases linearly.

    the number of channels available to the sources determines the number of sources that can be connected to the base station, and the remaining sources over the number of available LTE channels are not matched.

    For example, when the number of LTE channels is equal to 25, until the number of sources in the graph is less than or equal to 25, there are no unmatched sources. But when the number of channels exceeded the number of channels available, additional sources can not be matched.

    Therefore, regardless of the type of relay selection algorithm, since the number of LTE channels of the base station determines the number of machines that can be connected to the base station, the restriction of the number of LTE channels directly affects the number of unmatched sources.

  3. Actual Execution Time of Proposed Algorithms

    The actual execution time of ORSA and MRSA and their trendlines is shown in Fig. 19. In this scenario with a constant relay number (N_{r}=100 ) and variable source number, it is again observed that the coefficient of n^{2} for ORSA is relatively small and the trendline of MRSA is linear. Therefore, in this scenario, as in the previous scenarios, the time complexity calculated in subsections III-B5 for ORSA and IV-B1 for MRSA is not violated.

TABLE 5 Simulation Parameters of Scenario 4
Table 5- 
Simulation Parameters of Scenario 4
FIGURE 17. - The average capacity of sources for ORSA and MRSA vs. the number of sources in Scenario 4.
FIGURE 17.

The average capacity of sources for ORSA and MRSA vs. the number of sources in Scenario 4.

FIGURE 18. - The average number of unmatched sources for ORSA and MRSA vs. the number of sources in Scenario 4.
FIGURE 18.

The average number of unmatched sources for ORSA and MRSA vs. the number of sources in Scenario 4.

FIGURE 19. - The average actual execution time for ORSA and MRSA in multiple settings (ms) vs. the number of sources in Scenario 4.
FIGURE 19.

The average actual execution time for ORSA and MRSA in multiple settings (ms) vs. the number of sources in Scenario 4.

SECTION VI.

Conclusion

In this paper, two novel algorithms were proposed for relay selection in M2M communications. The first method (ORSA) is a centralized algorithm to find the optimal relay selection. ORSA is implemented by two transformations. Throughout this algorithm a new solution for the k -cardinality assignment problem is provided. The second method (MRSA) is a decentralized algorithm designed based on concepts from matching theory. The result of MRSA is a stable solution for relay selection. In all of the algorithms, static RF interfaces setting is considered to allow the parallel use of interfaces for data transmission. This type of simultaneous usage can help to improve the performance of the network. In the future, a dynamic RF interfaces setting can be considered in the design of the relay selection method. The results show that ORSA has the optimal average capacity, providing solutions about 3% higher than MRSA, when there is no restriction on the number of channels. Following ORSA, MRSA leads to solutions with average capacity higher than WRSA and RRSA, about 56% and 117%, respectively. Moreover, the comparison of both proposed algorithms with WRSA and RRSA, shows that ORSA and MRSA are more successful in increasing the average capacity of connections between sources and the base station and decreasing the number of unmatched sources.

ACKNOWLEDGMENT

The authors would like to thank Dr. Hamid Zarrabi Zade, Dr. Hossein Ajorloo, and Mr. Ahmad Haj Reza Jafar Abadi for their helpful comments and guidance.

Appendix A

Proof of Stability and Optimal Stability of MRSA

This proposed decentralized algorithm is based on the deferred acceptance procedure. It is proved that the result of this algorithm is a stable solution [30].

The following definitions are required in the proofs:

  • Definition (in terms of matching theory): In a stable matching, there are no two nodes that they want each other but they match with another node.

    Definition (in terms of matching theory): The possible matching between an applicant node and another node means there exists at least one stable matching that assigns the applicant node to the other node.

SECTION 1)

Stable Result

We claim that after algorithm 2 is finished, the achieved matching result will be stable.

Proof:

It is demonstrated by contradiction. We assume the proposed matching result is not stable, so there are two nodes, for example, i and j , that prefer each other to the current matched node. Therefore, applicant node i , before requesting to the current matched node, has requested to node j and node j rejected node i . This means that node j prefers current matched node to node i . Thus it is a contradiction and the provided matching is stable.

It is important to note that in order to achieve stability in this procedure, it is necessary that the device’ s priority is not the same when selecting a path. In our scenario, according to a random location and channel condition between devices, the probability of equal capacity between two devices is near to zero. Therefore, it does not hinder the proof of the stability of the problem.

SECTION 2)

Optimal Stable Result for Sources

Moreover, we claim for each source (as applicant node in matching theory), the provided stable matching is at least as well as any other stable possible matching using the same nodes.

Proof:

We prove by induction. By the induction assumption, it is assumed that up to some point there is no applicant node that is rejected by a recipient node which was possible for the applicant node. Now, consider that at this point, an applicant node A is rejected by recipient node R . Now, we prove for the induction step that R is impossible for A . The recipient node keeps q of the best requests (q is the quota of the recipient node), such as s_{1}, \ldots, s_{q} and other requests, such as A , are rejected. It is clear that for each of s_{i} where {1 \leq i \leq q} , s_{i} prefers R to another recipient node except those that have rejected s_{i} . Now, we assume by contradiction that R is possible for A (i.e. a stable matching exists which has matched A with R ). It is clear that in this matching, at least one of the s_{i}\text{s} will be matched to a recipient with lower preference for it and rejected by R . However this matching is unstable because s_{i} and R could be matched which is preferred by both of them (due to the induction assumption). This means that the matching is unstable, and this is a contradiction. Therefore R is impossible for A and this proves the induction step. Therefore, we proved by induction that the matching is an optimal stable matching for sources.

References

References is not available for this document.