Next Article in Journal
m-Health: Lessons Learned by m-Experiences
Next Article in Special Issue
HiMeter: Telling You the Height Rather than the Altitude
Previous Article in Journal
Features of Cross-Correlation Analysis in a Data-Driven Approach for Structural Damage Assessment
Previous Article in Special Issue
An INS/WiFi Indoor Localization System Based on the Weighted Least Squares
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimal Resource Allocation for NOMA-TDMA Scheme with α-Fairness in Industrial Internet of Things

1
School of Information and Control Engineering, China University of Mining and Technology, Xuzhou 221116, China
2
School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
3
Department of IoT Engineering, Xi’an University of Technology, Xi’an 710048, China
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(5), 1572; https://doi.org/10.3390/s18051572
Submission received: 19 April 2018 / Revised: 27 April 2018 / Accepted: 29 April 2018 / Published: 15 May 2018

Abstract

:
In this paper, a joint non-orthogonal multiple access and time division multiple access (NOMA-TDMA) scheme is proposed in Industrial Internet of Things (IIoT), which allowed multiple sensors to transmit in the same time-frequency resource block using NOMA. The user scheduling, time slot allocation, and power control are jointly optimized in order to maximize the system α -fair utility under transmit power constraint and minimum rate constraint. The optimization problem is nonconvex because of the fractional objective function and the nonconvex constraints. To deal with the original problem, we firstly convert the objective function in the optimization problem into a difference of two convex functions (D.C.) form, and then propose a NOMA-TDMA-DC algorithm to exploit the global optimum. Numerical results show that the NOMA-TDMA scheme significantly outperforms the traditional orthogonal multiple access scheme in terms of both spectral efficiency and user fairness.

1. Introduction

Industrial Internet of Things (IIoT) offers interconnection and interoperability to industrial systems through sensing nodes and actuators with ubiquitous communication and computation abilities [1], and has been applied in numerous areas such as industrial production, traffic monitoring, and so on [2,3,4]. As a significant component of the future transformation of industrial systems, IIoT has attracted enormous attention from academics and industries.
In conventional IIoT, sensors periodically transmit the collected data to the sink through time division multiple access (TDMA) [5]. However, TDMA only supports access of a single node in each time slot, which cause low spectrum efficiency and high transmission delay, thus it cannot meet the requirement of the IIoT with massive nodes to access [6].
Recently, the non-orthogonal multiple access (NOMA) technique has attracted significant research interest for its potential to enhance spectrum efficiency and to support different QoS requirements by allowing multiple users to transmit in the same time-frequency resource block, which is different from conventional orthogonal multiple access (OMA) techniques (e.g., TDMA, frequency division multiple access (FDMA)) [7,8,9]. To avoid the inter-user interference in NOMA network, successive interference cancellation (SIC) technique is applied to decode the received signals [10,11,12]. Inspired by the potential benefits of NOMA, many researchers have explored NOMA schemes in different kinds of communications, such as cellular IoT, machine-to-machine communications and cooperation communications [13,14,15]. Several works have been carried out on performance analysis and optimization of NOMA, including spectral efficiency, energy efficiency, physical layer security, and visible light communications [16,17,18,19]. In [16], the resource allocation for multicarrier NOMA system with full-duplex base station and multiple half-duplex downlink and uplink users is explored. where both optimal and suboptimal schemes are proposed to maximize the weighted throughput. In [17], the machine-to-machine communication for uplink NOMA system is studied to minimize the total energy consumption of the network. In [18], the physical layer security issue is investigated in NOMA system. The secrecy sum rate of NOMA system is maximized and the closed-form of optimal power is derived.
As a promising multiple access scheme proposed in 5G, NOMA is superior to the conventional multiple access scheme in the massive uplink scenario of IIoT where massive nodes transmit small data packets. The technical features of NOMA enable it to support more users or devices than conventional orthogonal multiple access technologies (TDMA, FDMA, OFDMA) and are more suited for IIoT, which has a large number of connections and low speed requirements [20]. Therefore, we investigate NOMA mechanism in IIoT in this paper, considering fairness of system.
The commonly used fairness models include proportional fairness, max-min fairness, and α -fairness. However, the proportional fairness and max-min fairness can only achieve absolute fairness, which means that all users have the same performance (e.g., the same outage probability or the same ergodic rate) [21,22,23]. α -fairness only utilizes a single variable α to achieve different well-known efficiency-fairness tradeoffs and user fairness levels [24], including sum-rate maximization, proportional fairness, and max-min fairness. It is suitable for IIoT with massive sensors, because as a unified fairness model, α -fairness can achieve different fairness levels for different sensors without employing different fairness models. The relationship between efficiency and fairness in the system is expressed by α -fair utility.
Considering the performance improvement achieved by NOMA, in this paper we propose a joint non-orthogonal multiple access and time division multiple access (NOMA-TDMA) scheme in IIoT considering α -fairness. In our system, the transmission time is divided into multiple time slots with different length in TDMA scheme and each time slot can be assigned to one or more nodes who complete their transmissions in NOMA scheme. The main contributions of this paper are summarized as follows:
(1)
A NOMA-TDMA communication scheme considering α -fairness is proposed in IIoT, which allows multiple sensors to transmit data through NOMA in each time slot and total available transmission time is allocated for all nodes in TDMA scheme.
(2)
Incorporating user scheduling, power allocation and time slot assignment based on the NOMA-TDMA scheme, an optimization problem is formulated to maximize the α -fair utility of the IIoT system under the constraint on sensors’ transmit rate and constraint on aggregate power. To tackle the resource allocation problem, the original optimal problem is transformed into a D.C. structure by variable substitution. Furthermore, we proposed an algorithm regarded as NOMA-TDMA-DC, which can quickly find global optimal solution.

2. System Model and Problem Formulation

2.1. System Model

Consider an uplink IIoT scenario with one sink and N sensors as shown in Figure 1. The channel fading coefficient from the sensor i to the sink is denoted by h i . Without loss of generality, it is assumed that h 1 h 2 h N . Multiple sensors can transmit data to the sink using NOMA to enhance spectrum efficiency and acceptable concurrent nodes number. Considering the computing ability of the sink in IIoT, the decoding complexity, and the possible delay of arrival signal, we only focus on the case that two sensors are associated with NOMA. In the following, between the two sensors that are paired in NOMA, the sensor with a poor channel fading coefficient is regarded as “weak sensor”, and the other one is regarded as “strong sensor”.

2.2. NOMA-TDMA Scheme

The proposed NOMA-TDMA scheme is described as follows: The available transmission time T is divided into N ( N / 2 + 1 ) time slots, each of which is identified by a two-dimensional vector ( i , j ) and denoted as T i j . In time slot T i j , sensor i and sensor j send data to the sink using NOMA. When i = j , sensor i exclusively occupies this slot and sends data to the sink in time slot T i i . The length of the time slot T i j is γ i j T , where i = 1 N j = i N γ i j 1 i N , j N | γ i j 0 . As shown in Figure 2.

2.3. Problem Formulation

According to the NOMA-TDMA scheme, sensor i and sensor j transmit their messages i < j over the same channel using NOMA with transmission powers p i and p j , respectively. The received signal y at sink can be represented as
y = p i h i x i + p j h j x j + n 0
where x i and x j are the messages transmitted by sensor i and sensor j, respectively. The NOMA scheme is designed such that the messages can be reliably extracted from the combined message y. The sink decode x j firstly and the received Signal to Interference plus Noise Ratio (SINR) can be expressed as
S I N R j = h j 2 p j h i 2 p j + n 0 .
Then the sink employs successive interference cancellation (SIC) to deduct the successfully decoded message x j from the received y before decoding x i . Hence, the received SINR of sensor i is given by
S I N R i = h i 2 p i N 0 .
The achievable data rate of the sensor i in the available transmission time T can be expressed according to the sum rate of the sensor i pairing with other nodes
R ( i ) = T ( k = 1 i 1 γ k i R k i ( i ) + j = i + 1 N γ i j R i j ( i ) + γ i i R i i ) .
In the first term, R k i ( i ) denotes the rate of sensor i as the weak sensor in time slot T k i ( k < i ) , in which sensor i and sensor k transmit their signals in NOMA scheme. In the second term, R i j ( i ) denotes the rate of sensor i as the strong sensor in time slot T i j ( i < j ) , in which sensor i and sensor j transmit their signals in NOMA scheme. In the third term, R i i denotes the rate of sensor i transmit alone in T i i time slot. The rate of each situation can be expressed respectively as
R k i ( i ) = log 2 ( 1 + p k i ( i ) h i 2 n 0 + p k i ( k ) h i 2 )
R i j ( i ) = log 2 ( 1 + p i j ( i ) h i 2 n 0 )
R i i = log 2 ( 1 + p i i h i 2 n 0 )
where p k i ( i ) , p i j ( i ) and p i i denote the transmission power of sensor i in time slot T k i , T i j and T i i , respectively.
According to each sensor’s QoS requirement, transmit rate should not be less than a certain threshold R r e q , i.e.,
R i R r e q i N .
In addition, the transmission power of each sensor cannot exceed a certain maximum transmission power P m a x . Hence, we have
0 p i j i p m a x i , j N .
We denote the α -fair utility function as U α ( x ) ( α 0 ) , which can be expressed as [25]
U α = ln ( x ) i f α = 1 1 1 α x 1 α o t h e r w i s e
Assume that sensor i receives utility U α ( R ( i ) ) when its received rate is R ( i ) . We should note that the optimization problem with α = 0 , α = 1 , and α = just correspond to sum-rate maximization, proportional fairness, and max-min fairness, respectively [26], and we only focus on the condition that 0 < α < 1 in this paper for it is fair enough in IIoT when the α = 1.
We aim at maximizing the sum α -fair utility of system while guaranteeing each user’s QoS by joint user scheduling, time slot allocation, and power control. Then, the optimization problem can be formulated as
max γ , p i = 1 N 1 1 α ( T ( k = 1 i 1 γ k i R k i ( i ) + j = i + 1 N γ i j R i j ( i ) + γ i i R i i ) ) 1 α
subject to C 1 : 0 p i j i p m a x i , j N
C 2 : R ( i ) R r e q i N
C 3 : i = 1 N j = i N γ i j 1
where (11b) and (11c) denote that the sensor’s QoS constraints and maximum transmit power constraints, respectively. (11d) denotes that available transmission time constraints allocated to all sensors.

3. Optimal Resource Allocation

In order to handle the situation where the sensor’s rate requirement is zero, we first present a remark about the optimal solution of the problem in (11a).
Remark 1.
Even if R r e q = 0 for all sensors, the optimal rate of each sensor is always greater than zero for 0 < α < 1 .
Proof. 
Because the derivative of U α ( x ) is infinite at x = 0 and finite at x > 0 , there is always a positive value C in i = 1 N U α ( R ( i ) ) such that the optimal rate of sensor i is not less than C. ☐
According to Remark 1, in the remainder of this paper, we replace constraint C 2 of problem (11b) by C 2 given by
C 2 : R ( i ) C i N ,
where C > 0 and the value of C is discussed as follows.
When R r e q > 0 , C = R r e q . In this case, constraint C2′ and C2 are equivalent, and therefore, the optimality has not changed.
When R r e q = 0 , C equals a very small positive value. According to Remark 1, the optimality also has not changed.
In the following, we first transform the objective function of the problem in (11a) into a D.C. function. Then, an algorithm is designed, followed by the discussion of the validity, optimality, convergence, parameter setting, and the expansion of the NOMA-TDMA-DC.

3.1. Transformation of the Objective Function

The rate expression of R ( i ) , which is non-convex, is first converted to the D.C. form. Denote p ^ k i ( i ) = γ k i p k i ( i ) , p ^ i j ( i ) = γ i j p i j ( i ) and p ^ i i ( i ) = γ i i p i i ( i ) , then we can get a new variable set p ^ and γ k i p k i ( i ) , γ i j p i j ( i ) and γ i i p i i ( i ) can be converted to
L 1 , k i K 1 , k i = γ k i R k i ( i ) = γ k i log 2 ( 1 + p ^ k i ( k ) h i 2 n 0 γ k i + p ^ k i ( i ) h i 2 n 0 γ k i ) γ k i log 2 ( 1 + p ^ k i ( k ) h i 2 n 0 γ k i ) ,
L 2 , k i = γ i j R i j ( i ) = γ i j log 2 ( 1 + p ^ i j ( i ) h i 2 n 0 γ i j ) ,
L 3 , k i = γ i i R i i ( i ) = γ i i log 2 ( 1 + p ^ i i ( i ) h i 2 n 0 γ i i ) .
We can easily see that L 1 , k i , L 2 , i j , L 3 , i i and k 1 , k i are concave on p ^ and γ . Then the rate of sensor i can be expressed as
R ( i ) = u i ( p ^ , γ ) v i ( p ^ , γ ) ,
where both u i ( p ^ , γ ) and v i ( p ^ , γ ) are concave given by
u i ( p ^ , γ ) = L 1 , k i + L 2 , i j + L 3 , i i ,
v i ( p ^ , γ ) = K 1 , k i .
The constraints C 2 has been transformed to a D.C. function, and now we focus on the objective function (11a) which can be expressed as
U α ( R ( i ) ) = U α ( u i ( p ^ , γ ) v i ( p ^ , γ ) ) = g i ( p ^ , γ ) h i ( p ^ , γ ) ,
where g i ( p ^ , γ ) and h i ( p ^ , γ ) are given by
g i ( p ^ , γ ) = U α ( R ( i ) ) + Z i v i ( p ^ , γ ) ,
h i ( p ^ , γ ) = Z i v i ( p ^ , γ )
respectively. It can be easily deduced that U α ( R ( i ) ) = g i ( p ^ , γ ) h i ( p ^ , γ ) and Z i is a constant that is greater than or equal to 1 C α . According to Remark 1, the value of C is always greater than zero.
To prove that (19) is a D.C. function, we need to prove that both g i ( p ^ , γ ) and h i ( p ^ , γ ) are concave. Since v i ( p ^ , γ ) is a concave function and Z i is a positive scalar, h i ( p ^ , γ ) is a concave function. Then, in order to prove that g i ( p ^ , γ ) is also a concave function, we present Theorem 1.
Theorem 1.
g i ( p ^ , γ ) given by (20) is concave.
Proof. 
First, note that U α ( t ) is a concave function at C , + and its derivative is 1 t α , so we have
U α ( t ) U α ( θ ) + 1 θ α ( t θ ) t C
for all θ C , + and is equal at t = θ . Therefore, U α ( t ) can be written as
U α ( t ) = inf θ C , + U α ( θ ) + 1 θ α ( t θ ) = inf θ C , + U α ( θ ) + t θ α θ 1 α .
Substituting t for U α ( u i ( p ^ , γ ) v i ( p ^ , γ ) ) , we can get
U α ( u i ( p ^ , γ ) v i ( p ^ , γ ) ) = inf θ C , + U α ( θ ) + u i ( p ^ , γ ) v i ( p ^ , γ ) θ α θ 1 α .
Hence, (20) can be formulated as:
g i ( p ^ , γ ) = U α ( R ( i ) ( p ^ , γ ) ) + Z i v i ( p ^ , γ ) = inf θ C , + U α ( θ ) + u i ( p ^ , γ ) v i ( p ^ , γ ) θ α θ 1 α + Z i v i ( p ^ , γ ) = inf θ C , + U α ( θ ) + u i ( p ^ , γ ) θ α + ( Z i 1 θ α ) v i ( p ^ , γ ) θ 1 α .
Since Z i 1 C α 1 θ α for all θ C , + , and both u i ( p ^ , γ ) and v i ( p ^ , γ ) are concave, g i ( p ^ , γ ) can be regarded as the infimum of an infinite set of concave functions and is, thus, concave.
Therefore, we complete the proof. ☐
According to Theorem 1, it can be concluded that U α ( R ( i ) ) = g i ( p ^ , γ ) h i ( p ^ , γ ) is a D.C. function, and U α ( R ( i ) ) can be written as
i = 1 N U α ( R ( i ) ) = i = 1 N ( g i ( p ^ , γ ) h i ( p ^ , γ ) ) = i = 1 N g i ( p ^ , γ ) i = 1 N h i ( p ^ , γ ) = g ( p ^ , γ ) h ( p ^ , γ )
where i = 1 N g i ( p ^ , γ ) and i = 1 N h i ( p ^ , γ ) are concave. The objective function (11a) and the constraint (12) can be expressed by the D.C. structure.

3.2. NOMA-TDMA Based on D.C. Programming (NOMA-TDMA-DC)

In this section, NOMA-TDMA-DC algorithm is proposed to solve the optimization problem. First, we perform the first-order Taylor expansion of h ( p , γ ) , i.e., h ( p ^ ε , γ ε ) + h T ( p ^ ε , γ ε ) ( p ^ , γ p ^ ε , γ ε ) T . Similarly, the first-order Taylor expansion of v i ( p , γ ) is performed. Then the initial point p ^ ε , γ ε for the ε iteration is set and [ p ^ ε + 1 , γ ε + 1 ] is optimized in the ε + 1 iteration, which is obtained by solving the problem P1.
P 1 : max γ , p g ( p ^ , γ ) ( h ( p ^ ε , γ ε ) + h T ( p ^ ε , γ ε ) ( p ^ , γ p ^ ε , γ ε ) T )
s . t . p ^ i , j ( i ) γ i , j P m a x 0 i , j N
u i ( p ^ , γ ) ( v i ( p ^ ε , γ ε ) + v i T ( p ^ ε , γ ε ) ( p ^ , γ p ^ ε , γ ε ) T ) C i N
i = 1 N j = i N γ i j 1
p ^ 0 γ 0
After Taylor expansion on the initial point, (27a) and (27c) are convex, so P1 is convex optimization problem and can be solved by interior point method.
The detailed process of NOMA-TDMA-DC is summarized in Algorithm 1, where ε is the iterative index of the algorithm , B ε is the sum α -fair utility of system in the ε th iterative and δ is the convergence accuracy of the algorithm.
Algorithm 1 NOMA-TDMA-DC
Initialization:
  Set the initial point p 0 , γ 0 , and δ ;
   ε = 0;
 1:  repeat
 2: Solve the convex optimization problem P1 to obtain the solution p , γ ;
    ε = ε + 1 ;
    p ε , γ ε = p , γ ;
 3: until B ε B ε + 1 δ

3.3. Algorithm Performance Analysis

The validity, convergence and complexity of the NOMA-TDMA-DC discussed in this section.
Validity: In each iteration of the NOMA-TDMA-DC, the second concave function approximating the objective function, i.e., h ( p ^ , γ ) , is expanded by its first-order Taylor expansion. Because of its logarithmic structure, h ( p ^ , γ ) is well approximated by its first-order Taylor expansion in the relatively large neighborhood of p ^ ε , γ ε due to its low sensitivity to the variation of the variable ( p ^ , γ ) . Therefore, the non-convex optimization problem (11a) is well approximated by the convex optimization problem (27a). In mathematical essence, the transformation of optimal problem of in [27,28] is the same as (27a).
Convergence: The NOMA-TDMA-DC always converges to the optimal point of the original resource allocation problem (11a), whose problem of each iteration is convex and can be solved by the interior point method. In the NOMA-TDMA-DC, the last step follows from the concavity of h ( p ^ , γ ) . Thus, for any given ( p ^ ε , γ ε ) , we have
g ( p ^ ε , γ ε ) h ( p ^ ε , γ ε ) g ( p ^ ε + 1 , γ ε + 1 ) ( h ( p ^ ε , γ ε ) + h T ( p ^ ε , γ ε ) ( p ^ ε + 1 , γ ε + 1 p ^ ε , γ ε ) T ) g ( p ^ ε + 1 , γ ε + 1 ) h ( p ^ ε + 1 , γ ε + 1 ) .
Hence, the solution of (27a) is always improved after each iteration and due to the compactness of the constraint set, the improved solution sequence ( p ^ ε , γ ε ) always converges.
Complexity: In our system, the sensors transmit their channel fading coefficients to the sink and the main computation process is implemented in a centralized manner at the sink. After deriving the optimization results, the sink broadcasts the necessary control information to sensors. The computational complexity of NOMA-TDMA-DC includes two parts: the computational complexity of each iteration and the number of iterations required for algorithm convergence. In each iteration, the interior point method is employed with the computational complexity of O ( M 3 ) , where M is the number of variables in (11a) as M = N 2 + 2 N . On the other hand, since g ( p ^ , γ ) and h ( p ^ , γ ) are all concave piecewise linear, the NOMA-TDMA-DC converges linearly with a complexity O ( log 1 δ ) , where δ is the convergence accuracy of the algorithm.Therefore, the NOMA-TDMA-DC has the complexity of O ( M 3 log 1 δ ) .

3.4. Discussion on the Value of Z i

In this subsection, we analyze the impact of Z i on the solution to problem (27a).
Z i needs to be large enough to guarantee the convexity of g i ( p ^ , γ ) given in (25), meanwhile Z i cannot be too large for the following reason. In the ε + 1 iteration, the objective function is
g ( p ^ ε + 1 , γ ε + 1 ) ( h ( p ^ ε , γ ε ) + h T ( p ^ ε , γ ε ) ( p ^ ε + 1 , γ ε + 1 p ^ ε , γ ε ) T ) = i = 1 N U α ( R ( i ) ) + Z i ( v i ( p ^ ε + 1 , γ ε + 1 ) v i ( p ^ ε , γ ε ) v i T ( p ^ ε , γ ε ) ( p ^ ε + 1 , γ ε + 1 p ^ ε , γ ε ) T ) .
Z i ( v i ( p ^ ε + 1 , γ ε + 1 ) v i ( p ^ ε , γ ε ) v i T ( p ^ ε , γ ε ) ( p ^ ε + 1 , γ ε + 1 p ^ ε , γ ε ) T ) will be the main part of the objective function when Z i is too large. Because v i ( p ^ , γ ) is concave on p ^ , γ , there is v i ( p ^ ε + 1 , γ ε + 1 ) v i ( p ^ ε , γ ε ) v i T ( p ^ ε , γ ε ) ( p ^ ε + 1 , γ ε + 1 p ^ ε , γ ε ) T 0 , equivalent if and only if p ^ ε + 1 , γ ε + 1 = p ^ ε , γ ε . Hence, optimizing (27a) when Z i is too large leads to p ^ ε + 1 , γ ε + 1 very close to p ^ ε , γ ε , which means algorithm convergence will be very slow. So we set Z i = 1 C α .

4. Simulation Results and Discussion

In this section, the performance of the proposed NOMA-TDMA scheme is evaluated through simulations, where we set the noise as an additive white Gaussian variable with zero mean and unit variance, and the transmit signal-to-noise-ratio (SNR) is equivalent to the transmit power. Furthermore, we utilize Jain’s index to evaluate the degree of system fairness, which is defined as [29]:
Jain s Index = ( i = 1 N R i ) 2 N i = 1 N R i 2 .
The result is between 1 N , 1 and a larger Jain’s index indicates that the system is more fair.
Figure 3 shows the IIoT sum rate with different power constraints, where the number of sensor in system is 20 and minimum rate requirement of each sensor is 0.5 b / s . From Figure 3, the proposed NOMA-TDMA scheme is significantly better than TDMA scheme, since NOMA allows two sensors transmitting at the same time-frequency resource block, which enhances the spectrum efficiency and improve the throughput of the system. Furthermore, we can see that the curves of NOMA-TDMA scheme are very close even for different values of α . The transmission of a strong sensor is always accompanied by the transmission of a weak sensor and this transmission scheme guarantees the fairness in the system, thus NOMA-TDMA scheme is less affected by the system fairness requirements than the TDMA scheme.
Figure 4 depicts the IIoT sum rate with different rate thresholds of sensors. It can be seen that, compared with the TDMA scheme, the proposed NOMA-TDMA scheme is more suitable for the IIoT scenario with massive sensors access. The TDMA scheme will allocate resources to the sensors which have better transmission conditions, and the performance of the system will be significantly reduced as the rate threshold of each sensor increases. While the NOMA-TDMA scheme allows the sink to serve the sensor that needs to meet the minimum rate requirement and the sensor that has a good channel gain at the same resource block, which will increase the sum rate satisfying the rate requirement of each sensor. Therefore, the IIoT will be less affected by the rate threshold and be more stable.
Figure 5 shows the relationship between the Jain’s Index and the value of α . As can be observed, Jain’s Index and the value of α are positively related, indicating that the degree of IIoT fairness is increasing with the increase of α . The Jain’s Index can reach 0.9964 when α = 1 by using the proposed NOMA-TDMA scheme, which can meet the fairness requirements of most IIoT scenarios. Furthermore, compared to other fairness models, α -fairness provides a smooth tradeoff between system sum rate and fairness.
Figure 6 presents the IIoT sum rate with different access number. We can see that as the number of sensors increases, the sum rate will drop significantly, since the TDMA scheme needs limited resources to be allocated to more sensors. Benefiting from the multi-user diversity gain of the NOMA-TDMA scheme, IIoT sum rate will increase in a certain range with the number of sensors, both in the case of α = 0 . 9 that emphasizes fairness, and α = 0 . 001 that emphasizes throughput. This indicates that the NOMA-TDMA is more suitable for massive sensors access IIoT scenarios.

5. Conclusions

In this paper, we proposed a NOMA-TDMA scheme for IIoT scenarios, which allowed multiple sensors to transmit in the same time-frequency resource block. To maximize the sum α -fair utility of system, a joint user scheduling, time slot allocation and power control problem is formulated. Furthermore, the original non-convex optimization problem is converted into an equivalent D.C. problem and NOMA-TDMA-DC algorithm is developed, which can converge to the optimal solution under a limited iterations. The simulation results showed that the proposed NOMA-TDMA scheme outperforms the OMA scheme in terms of fairness and throughput; it also improves the spectrum efficiency, indicating that the NOMA-TDMA scheme has a better application prospect in the IIoT.

Author Contributions

Y.S. designed the algorithm, performed the theoretical analysis, and wrote the manuscript. Y.G. and S.L. implemented the simulation and contributed to the manuscript preparation. D.W. and B.W. contributed to polishing the revised manuscript and provided suggestions on simulation evaluation.

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grant 51504255, Grant 51504214, Grant 61771417 and Grant 51734009, in part by the Natural Science Foundation of Jiangsu province of China under Grant BK20150204, in part by the China Postdoctoral Science Foundation under Grant 2015M581884, in part by the State Key Research Development Program of China under Grant 2016YFC0801403, and in part by the Research Development Programme of Jiangsu Province under Grant BE2015040.

Conflicts of Interest

The authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

References

  1. Li, Z.; Kang, J.; Yu, R.; Ye, D.; Deng, Q.; Zhang, Y. Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things. IEEE Trans. Ind. Inform. 2017. [Google Scholar] [CrossRef]
  2. Li, J.Q.; Yu, F.R.; Deng, G.; Luo, C.; Ming, Z.; Yan, Q. Industrial internet: A survey on the enabling technologies, applications, and challenges. IEEE Commun. Surv. Tutor. 2017, 19, 1504–1526. [Google Scholar] [CrossRef]
  3. Zhou, J.; Chen, C.P.; Chen, L.; Zhao, W. A user-customizable urban traffic information collection method based on wireless sensor networks. IEEE Trans. Intell. Transp. Syst. 2013, 14, 1119–1128. [Google Scholar] [CrossRef]
  4. Wei, W.; Song, H.; Li, W.; Shen, P.; Vasilakos, A. Gradient-driven parking navigation using a continuous information potential field based on wireless sensor network. Inf. Sci. 2017, 408, 100–114. [Google Scholar] [CrossRef]
  5. Chang, C.L.; Ho, K.Y. Slot assignment for TDMA MAC in industrial wireless sensor network. In Proceedings of the 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS), Okayama, Japan, 26–29 June 2016; pp. 1–5. [Google Scholar]
  6. Raza, M.; Aslam, N.; Le-Minh, H.; Hussain, S.; Cao, Y.; Khan, N.M. A Critical Analysis of Research Potential, Challenges and Future Directives in Industrial Wireless Sensor Networks. IEEE Commun. Surv. Tutor. 2017, 20, 39–95. [Google Scholar] [CrossRef]
  7. Saito, Y.; Benjebbour, A.; Kishiyama, Y.; Nakamura, T. System-level performance evaluation of downlink non-orthogonal multiple access (NOMA). In Proceedings of the 2013 IEEE 24th International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), London, UK, 8–11 September 2013; pp. 611–615. [Google Scholar]
  8. Saito, Y.; Kishiyama, Y.; Benjebbour, A.; Nakamura, T.; Li, A.; Higuchi, K. Non-orthogonal multiple access (NOMA) for cellular future radio access. In Proceedings of the 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2–5 June 2013; pp. 1–5. [Google Scholar]
  9. Montalban, J.; Scopelliti, P.; Fadda, M.; Iradier, E.; Desogus, C.; Angueira, P.; Murroni, M.; Araniti, G. Multimedia Multicast Services in 5G Networks: Subgrouping and Non-Orthogonal Multiple Access Techniques. IEEE Commun. Mag. 2018, 56, 91–95. [Google Scholar] [CrossRef]
  10. Dai, L.; Wang, B.; Yuan, Y.; Han, S.; Chih-Lin, I.; Wang, Z. Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends. IEEE Commun. Mag. 2015, 53, 74–81. [Google Scholar] [CrossRef]
  11. Ahmad, A.; Rehmani, M.H.; Tembine, H.; Mohammed, O.A.; Jamalipour, A. IEEE Access Special Section Editorial: Optimization for emerging wireless networks: IoT, 5G, and smart grid communication networks. IEEE Access 2017, 5, 2096–2100. [Google Scholar] [CrossRef]
  12. Islam, S.R.; Avazov, N.; Dobre, O.A.; Kwak, K.S. Power-domain non-orthogonal multiple access (NOMA) in 5G systems: Potentials and challenges. IEEE Commun. Surv. Tutor. 2017, 19, 721–742. [Google Scholar] [CrossRef]
  13. Shirvanimoghaddam, M.; Dohler, M.; Johnson, S.J. Massive non-orthogonal multiple access for cellular IoT: Potentials and limitations. IEEE Commun. Mag. 2017, 55, 55–61. [Google Scholar] [CrossRef]
  14. Yang, Z.; Pan, Y.; Xu, W.; Guan, R.; Wang, Y.; Chen, M. Energy efficient resource allocation for machine-to-machine communications with NOMA and energy harvesting. In Proceedings of the 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Atlanta, GA, USA, 1–4 May 2017; pp. 145–150. [Google Scholar]
  15. Yang, Z.; Ding, Z.; Fan, P.; Al-Dhahir, N. The impact of power allocation on cooperative non-orthogonal multiple access networks with SWIPT. IEEE Trans. Wirel. Commun. 2017, 16, 4332–4343. [Google Scholar] [CrossRef]
  16. Sun, Y.; Ng, D.W.K.; Ding, Z.; Schober, R. Optimal joint power and subcarrier allocation for full-duplex multicarrier non-orthogonal multiple access systems. IEEE Trans. Commun. 2017, 65, 1077–1091. [Google Scholar] [CrossRef]
  17. Yang, Z.; Xu, W.; Xu, H.; Shi, J.; Chen, M. Energy efficient non-orthogonal multiple access for machine-to-machine communications. IEEE Commun. Lett. 2017, 21, 817–820. [Google Scholar] [CrossRef]
  18. Liu, Y.; Qin, Z.; Elkashlan, M.; Gao, Y.; Hanzo, L. Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans. Wirel. Commun. 2017, 16, 1656–1672. [Google Scholar] [CrossRef]
  19. Marshoud, H.; Kapinas, V.M.; Karagiannidis, G.K.; Muhaidat, S. Non-orthogonal multiple access for visible light communications. IEEE Photonics Technol. Lett. 2016, 28, 51–54. [Google Scholar] [CrossRef]
  20. Liu, Y.; Qin, Z.; Elkashlan, M.; Ding, Z.; Nallanathan, A.; Hanzo, L. Nonorthogonal Multiple Access for 5G and Beyond. Proc. IEEE 2017, 105, 2347–2381. [Google Scholar] [CrossRef]
  21. Hojeij, M.R.; Nour, C.A.; Farah, J.; Douillard, C. Waterfilling-based proportional fairness scheduler for downlink non-orthogonal multiple access. IEEE Wirel. Commun. Lett. 2017, 6, 230–233. [Google Scholar] [CrossRef]
  22. Xu, P.; Cumanan, K. Optimal Power Allocation Scheme for Non-Orthogonal Multiple Access With α-Fairness. IEEE J. Sel. Areas Commun. 2017, 35, 2357–2369. [Google Scholar] [CrossRef]
  23. Liu, Y.; Elkashlan, M.; Ding, Z.; Karagiannidis, G.K. Fairness of user clustering in MIMO non-orthogonal multiple access systems. IEEE Commun. Lett. 2016, 20, 1465–1468. [Google Scholar] [CrossRef]
  24. Shi, H.; Prasad, R.V.; Onur, E.; Niemegeers, I. Fairness in wireless networks: Issues, measures and challenges. IEEE Commun. Surv. Tutor. 2014, 16, 5–24. [Google Scholar]
  25. Mo, J.; Walrand, J. Fair end-to-end window-based congestion control. IEEE/ACM Trans. Netw. 2000, 8, 556–567. [Google Scholar] [CrossRef]
  26. Guo, C.; Zhang, Y.; Sheng, M.; Wang, X.; Li, Y. α-Fair Power Allocation in Spectrum-Sharing Networks. IEEE Trans. Veh. Technol. 2016, 65, 3771–3777. [Google Scholar] [CrossRef]
  27. Tang, R.; Zhao, J.; Qu, H.; Zhang, Z. User-centric joint admission control and resource allocation for 5G d2d extreme mobile broadband: A sequential convex programming approach. IEEE Commun. Lett. 2017, 21, 1641–1644. [Google Scholar] [CrossRef]
  28. Li, Y.; Sheng, M.; Yang, C.; Wang, X. Energy efficiency and spectral efficiency tradeoff in interference-limited wireless networks. IEEE Commun. Lett. 2013, 17, 1924–1927. [Google Scholar] [CrossRef]
  29. Cao, Q.; Sun, Y.; Ni, Q.; Li, S.; Tan, Z. Statistical CSIT aided user scheduling for broadcast MU-MISO system. IEEE Trans. Veh. Technol. 2017, 66, 6102–6114. [Google Scholar] [CrossRef]
Figure 1. System model of uplink IIoT.
Figure 1. System model of uplink IIoT.
Sensors 18 01572 g001
Figure 2. The time slot assignment of NOMA-TDMA scheme.
Figure 2. The time slot assignment of NOMA-TDMA scheme.
Sensors 18 01572 g002
Figure 3. Performance of system sum rate with power constraints.
Figure 3. Performance of system sum rate with power constraints.
Sensors 18 01572 g003
Figure 4. Performance of system sum rate with rate constraints.
Figure 4. Performance of system sum rate with rate constraints.
Sensors 18 01572 g004
Figure 5. Jain’s Index versus the value of α .
Figure 5. Jain’s Index versus the value of α .
Sensors 18 01572 g005
Figure 6. Performance of system sum rate with number of sensors.
Figure 6. Performance of system sum rate with number of sensors.
Sensors 18 01572 g006

Share and Cite

MDPI and ACS Style

Sun, Y.; Guo, Y.; Li, S.; Wu, D.; Wang, B. Optimal Resource Allocation for NOMA-TDMA Scheme with α-Fairness in Industrial Internet of Things. Sensors 2018, 18, 1572. https://doi.org/10.3390/s18051572

AMA Style

Sun Y, Guo Y, Li S, Wu D, Wang B. Optimal Resource Allocation for NOMA-TDMA Scheme with α-Fairness in Industrial Internet of Things. Sensors. 2018; 18(5):1572. https://doi.org/10.3390/s18051572

Chicago/Turabian Style

Sun, Yanjing, Yiyu Guo, Song Li, Dapeng Wu, and Bin Wang. 2018. "Optimal Resource Allocation for NOMA-TDMA Scheme with α-Fairness in Industrial Internet of Things" Sensors 18, no. 5: 1572. https://doi.org/10.3390/s18051572

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop