A priority-based access control model for device-to-device communications underlaying cellular network using network calculus

Jun Huang, Zi Xiong, Jibi Li, Qianbin Chen, Qiang Duan, Yanxiao Zhao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Device-to-Device (D2D) communication has been proposed as a beneficial complement for cellular networks. Access control for D2D communications underlaying cellular network, however, has not received attention yet. In this paper, we investigate the access control for cellular and D2D communications in a single cell setting. We propose a prioritybased model to characterize access control of both cellular and D2D users. The proposed model prioritizes the cellular communications, cellular mode D2D communications, and reuse mode D2D communications with different priority levels. We then apply Network Calculus theory to analyze the worst-case performance for access control, including service rate, delay, and backlog for processing service requests of cellular and D2D communications. Both of the theoretical analysis and the numerical results verify that the proposed model is valid and applicable to characterize the access control for D2D underlaying cellular network.

Original languageEnglish (US)
Title of host publicationWireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings
EditorsSiyao Cheng, Hongzhi Wang, Hong Gao, Chaokun Wang, Zhipeng Cai
PublisherSpringer Verlag
Pages613-623
Number of pages11
ISBN (Electronic)9783319077819
StatePublished - Jan 1 2014
Event9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014 - Harbin, China
Duration: Jun 23 2014Jun 25 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8491
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014
CountryChina
CityHarbin
Period6/23/146/25/14

Fingerprint

Network Calculus
Cellular radio systems
Cellular Networks
Access Control
Access control
Communication Networks
Communication
Model
Worst-case Performance
Reuse
Theoretical Analysis
Complement
Valid
Verify
Numerical Results
Processing
Cell

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Huang, J., Xiong, Z., Li, J., Chen, Q., Duan, Q., & Zhao, Y. (2014). A priority-based access control model for device-to-device communications underlaying cellular network using network calculus. In S. Cheng, H. Wang, H. Gao, C. Wang, & Z. Cai (Eds.), Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings (pp. 613-623). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8491). Springer Verlag.
Huang, Jun ; Xiong, Zi ; Li, Jibi ; Chen, Qianbin ; Duan, Qiang ; Zhao, Yanxiao. / A priority-based access control model for device-to-device communications underlaying cellular network using network calculus. Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings. editor / Siyao Cheng ; Hongzhi Wang ; Hong Gao ; Chaokun Wang ; Zhipeng Cai. Springer Verlag, 2014. pp. 613-623 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{d346f53510d641849b0a1939e41bbe7d,
title = "A priority-based access control model for device-to-device communications underlaying cellular network using network calculus",
abstract = "Device-to-Device (D2D) communication has been proposed as a beneficial complement for cellular networks. Access control for D2D communications underlaying cellular network, however, has not received attention yet. In this paper, we investigate the access control for cellular and D2D communications in a single cell setting. We propose a prioritybased model to characterize access control of both cellular and D2D users. The proposed model prioritizes the cellular communications, cellular mode D2D communications, and reuse mode D2D communications with different priority levels. We then apply Network Calculus theory to analyze the worst-case performance for access control, including service rate, delay, and backlog for processing service requests of cellular and D2D communications. Both of the theoretical analysis and the numerical results verify that the proposed model is valid and applicable to characterize the access control for D2D underlaying cellular network.",
author = "Jun Huang and Zi Xiong and Jibi Li and Qianbin Chen and Qiang Duan and Yanxiao Zhao",
year = "2014",
month = "1",
day = "1",
language = "English (US)",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "613--623",
editor = "Siyao Cheng and Hongzhi Wang and Hong Gao and Chaokun Wang and Zhipeng Cai",
booktitle = "Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings",
address = "Germany",

}

Huang, J, Xiong, Z, Li, J, Chen, Q, Duan, Q & Zhao, Y 2014, A priority-based access control model for device-to-device communications underlaying cellular network using network calculus. in S Cheng, H Wang, H Gao, C Wang & Z Cai (eds), Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8491, Springer Verlag, pp. 613-623, 9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014, Harbin, China, 6/23/14.

A priority-based access control model for device-to-device communications underlaying cellular network using network calculus. / Huang, Jun; Xiong, Zi; Li, Jibi; Chen, Qianbin; Duan, Qiang; Zhao, Yanxiao.

Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings. ed. / Siyao Cheng; Hongzhi Wang; Hong Gao; Chaokun Wang; Zhipeng Cai. Springer Verlag, 2014. p. 613-623 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8491).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - A priority-based access control model for device-to-device communications underlaying cellular network using network calculus

AU - Huang, Jun

AU - Xiong, Zi

AU - Li, Jibi

AU - Chen, Qianbin

AU - Duan, Qiang

AU - Zhao, Yanxiao

PY - 2014/1/1

Y1 - 2014/1/1

N2 - Device-to-Device (D2D) communication has been proposed as a beneficial complement for cellular networks. Access control for D2D communications underlaying cellular network, however, has not received attention yet. In this paper, we investigate the access control for cellular and D2D communications in a single cell setting. We propose a prioritybased model to characterize access control of both cellular and D2D users. The proposed model prioritizes the cellular communications, cellular mode D2D communications, and reuse mode D2D communications with different priority levels. We then apply Network Calculus theory to analyze the worst-case performance for access control, including service rate, delay, and backlog for processing service requests of cellular and D2D communications. Both of the theoretical analysis and the numerical results verify that the proposed model is valid and applicable to characterize the access control for D2D underlaying cellular network.

AB - Device-to-Device (D2D) communication has been proposed as a beneficial complement for cellular networks. Access control for D2D communications underlaying cellular network, however, has not received attention yet. In this paper, we investigate the access control for cellular and D2D communications in a single cell setting. We propose a prioritybased model to characterize access control of both cellular and D2D users. The proposed model prioritizes the cellular communications, cellular mode D2D communications, and reuse mode D2D communications with different priority levels. We then apply Network Calculus theory to analyze the worst-case performance for access control, including service rate, delay, and backlog for processing service requests of cellular and D2D communications. Both of the theoretical analysis and the numerical results verify that the proposed model is valid and applicable to characterize the access control for D2D underlaying cellular network.

UR - http://www.scopus.com/inward/record.url?scp=84919326951&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84919326951&partnerID=8YFLogxK

M3 - Conference contribution

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 613

EP - 623

BT - Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings

A2 - Cheng, Siyao

A2 - Wang, Hongzhi

A2 - Gao, Hong

A2 - Wang, Chaokun

A2 - Cai, Zhipeng

PB - Springer Verlag

ER -

Huang J, Xiong Z, Li J, Chen Q, Duan Q, Zhao Y. A priority-based access control model for device-to-device communications underlaying cellular network using network calculus. In Cheng S, Wang H, Gao H, Wang C, Cai Z, editors, Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings. Springer Verlag. 2014. p. 613-623. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).