Next Article in Journal
Integration of Satellite Data with High Resolution Ratio: Improvement of Spectral Quality with Preserving Spatial Details
Next Article in Special Issue
A Software Defined Radio Evaluation Platform for WBAN Systems
Previous Article in Journal
Time-Matching Random Finite Set-Based Filter for Radar Multi-Target Tracking
Previous Article in Special Issue
Experimental Phantom-Based Security Analysis for Next-Generation Leadless Cardiac Pacemakers
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Relay-Assisted D2D Transmission for Mobile Health Applications

1
School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
2
Chongqing Engineering Research Center of Communication Software, Chongqing 400065, China
*
Authors to whom correspondence should be addressed.
Sensors 2018, 18(12), 4417; https://doi.org/10.3390/s18124417
Submission received: 2 November 2018 / Revised: 5 December 2018 / Accepted: 11 December 2018 / Published: 13 December 2018
(This article belongs to the Special Issue Wireless Body Area Networks and Connected Health)

Abstract

:
Relay-assisted Device-to-Device (D2D) communication, one of the important transmission modes in mobile health systems, can provide high transmission quality for servicing users at the edge of system coverage. However, the quality of the D2D relay communication is largely limited by the relay nodes. When a poor node is selected to assist the source node in the data transmission, it is likely to result in the loss of medical data and inaccurate transmission. Therefore, this paper focuses on how to select relay modes and relay nodes to improve the reliability of medical data transmission. Firstly, in order to eliminate the relay nodes with low energy or poor willingness, the acceptable energy consumption metric of relay nodes is proposed in this paper. The relay mode of each relay node is determined by the acceptable energy consumption metric, which can ensure the physical reliability of the relay communication links. Then a trust metric is proposed to measure the social reliability of each relay link, further excluding the malicious relay nodes. Finally, this paper proposes a relay selection algorithm based on compromise factors (RSCF). With the help of the proposed algorithm, the reliability of the relay communication can be guaranteed, and the spectrum efficiency can be promoted greatly. The simulation results show that the relay nodes selected by RSCF algorithm can greatly improve transmission rate and reliability compared with the traditional relay-assisted D2D communication schemes.

1. Introduction

With increased people’s interest in their own health, mobile health has gradually received widespread attention due to the capability of monitoring the physical conditions of healthy/diseased users in real time. Considering the privacy of medical data, most studies have focused on decreasing the eavesdropping probability of medical data during transmission by using encryption protocols or changing the medical delivery architecture [1,2]. However, in the mobile health system, communication modes have a great influence on medical data transmission, which is the basis of the entire mobile health system. For instance, the transmission reliability of relay communication itself is lower than that of the cellular communication. If a bad node is selected as a relay node in the relay communication, the medical data may not be correctly transmitted to the medical center or some data may even be lost. Thus, it is worthy to study the influence on the reliability of medical data transmission under different transmission modes. Moreover, all users in the mobile health system need to transmit information to the medical center through their own smart devices. Along with the continuous improvement and advancement of the mobile medical system, large-traffic applications such as online video diagnosis will gradually become popular. The ubiquitous biological information and various large-traffic medical data impose a great burden on the existing cellular system. Thus, it is worthy to consider how to offload the traffic of base stations and increase the spectrum utilization.
Device-to-Device (D2D) communication, a short-range communication technology, has great advantages in improving spectrum utilization of system and mitigating the base station’s load [3]. The D2D communication technology can directly multiplex the frequency resources of the cellular devices in the collaboration of base stations, thereby improving the spectrum utilization of the system. Furthermore, D2D communication can allow the direct data transmission among user devices without the assistance of base station. The signaling overhead of base stations and the number of repeated data transmissions can be reduced by D2D communication technology. Therefore, the traffic of base stations can be further offloaded. For the users, the user’s device can communicate with each other by a lower transmit power owing to the short-distance characteristic of D2D communication, thereby reducing the energy consumption of the user device. With the advantages of high spectrum utilization, low latency and low power consumption, D2D communication mode will obviously become an indispensable part in the future medical data transmission. In order to improve the transmission quality of user equipment at the edge of the cell, the relay-assisted D2D communication has also become one of the research hotspots. The relay-assisted D2D communication not only expands the communication distance, but also has the same advantages of high speed, low power consumption as D2D communication. However, when different nodes are selected to assist the source user in transmitting data, the quality of the relay communication may vary greatly. Each node in the system is selfish and limited by its own energy resources. Nodes with low energy and selfishness are likely to cause data loss or transmission interruptions, so it is extremely important to fully exploit the attributes and willingness of nodes. In summary, in order to ensure the reliability of medical transmission and effectively reduce the burden on the base stations, this paper discusses the influence of the system’s transmission modes on the medical data transmission, and focuses on the selection of both relay modes and relay nodes in D2D relay communication.
Consider the scenario of urban community where a medical center station is placed. The medical center station is equivalent to an edge node set by the hospital in each cell, which can uniformly manage various medical data of the cell, and provide corresponding services according to the request of the users. Users in the community wear various sensing devices (such as smart watches and smart glasses) to obtain all kinds of body sign data. The functions of the user’s smart device are as follows: (1) The user’s various medical data can be periodically transmitted to the edge medical node for storage and further analysis; (2) User equipment can directly connect to the edge medical node to request a diagnosis services, and the edge medical node also judges whether to provide online video diagnosis service according to the uploaded data; (3) For patients, when multiple physical data are not normal, the edge medical node will send early warning and guidance to the smart devices. In this scenario, the user’s device is considered as a hybrid full/half-duplex D2D communication device. The edge medical node, an edge node, can directly communicate with the user equipment. If users being far away from the edge node adopt the D2D straight-through communication mode, the transmission quality may not meet the needs of the transmission task. Therefore, the transmission quality can be improved through the relay-assisted D2D communication. Since the multi-hop D2D communication requires multiple relay nodes to forward data in turn, data will not be transmitted to the destination node if any relay node is interrupted. Considering that the possibility of data loss is high in multi-hop relay communication, this paper only discusses D2D relay communication with only two hops.
With the consideration of the privacy of medical data, how to ensure the transmission reliability is the key to this paper. The transmission reliability of D2D straight-through communication between fixed edge node and user devices is easy to be controlled. However, some users being farther away from the medical node need to D2D relay communication to improve the transmission quality, and the reliability of relay nodes is difficult to be controlled. Moreover, the frequent service requests of many users exert a great burden on the existing cellular system. In order to solve the above problems, this paper takes into account the equipment condition of relay nodes and the trust level of relay nodes. A relay selection mechanism based on the compromise factor is also designed. The contribution of this article is as follows:
  • The selection of communication modes is determined by the relative distance between users and the edge medical node. In view of the relatively unstable relay communication in communication modes, the acceptable energy consumption metric of each relay node is proposed to exclude the relay nodes with weak willingness or insufficient energy. The duplex mode of each relay node is defined by the acceptable energy consumption and relay’s energy consumption.
  • Considering the need of high reliability in medical data transmission, this paper evaluates the trust value of each relay node. The trust metric is divided into the average accuracy in previous relay communications and the possibility of generating D2D direct links. It is used to exclude the malicious relay nodes and comprehensive evaluate the reliability of relay nodes.
  • In order to effectively measure the possibility of generating D2D direct links, this paper also proposes a relative distance stability value, which can analyze the frequency and duration of the distance among users less than the maximum D2D communication distance.
  • Considering the varying importance of medical data, a relay node selection mechanism based on compromise factor is proposed. Through this mechanism, the maximum transmission rate can be prioritized under certain conditions.
The rest of this paper is organized as follows: Section 2 is about related work. Section 3 builds system patterns and problem descriptions. Section 4 proposes the method of relay pattern selection. In Section 5, the method of trust evaluation between the source node and the relay node is introduced in detail. Section 6 proposes relay selection mechanism based on compromise factor. Simulation results and performance analysis are presented in Section 7. Finally, a brief conclusion is provided in Section 8.

2. Related Work

The mobile health system can monitor the user’s physical condition at any time and send emergency signals in a crisis, which is considered a reliable way to effectively improve the medical treatment quality and ensure user’s health. In the existing medical systems, the user’s medical data is transmitted to the medical center via cellular communication [4,5]. However, with the development of technology and the increasing limitation of spectrum resources, the transmission of mobile medical data will not be constrained by cellular communication in the future. D2D communication has great advantages in traffic offloading and controllability, thus it undoubtedly becomes an important transmission tool in the medical field [6]. Niraj et al. [7] applied D2D communication to mobile health systems. However, they focused on data exchange among multiple sensors in the body’s local area network. In [3], the authors considered that the normal operation of medical equipment can be affected by the electromagnetic interference of D2D and cellular communication, so a power control scheme is proposed to reduce the electromagnetic interference. D2D communication, as a kind of wireless communication method, is vulnerable to security attacks such as eavesdropping, fake messages, and privacy violations. Therefore, a secure-D2D data transmission protocol is proposed to improve transmission security [8]. Since the possibility of data loss and link interruption is small in D2D communication, the above studies only concentrated on improving the protocol security index in D2D communication or changing the medical transmission architecture. However, the quality of D2D communication is susceptible to distance limitations. If the D2D user’s channel quality is poor, it is extremely easy for the probability of eavesdropping and loss of medical data to increase.
In cellular systems, the channel quality is usually related to the user’s own device and the geographical location. For instance, the channel quality in cell edge is generally not good. In order to ensure the transmission quality of cell-edge users and further increase the system capacity, the D2D relay communication becomes a better solution. Melki et al. [9] compared and evaluated the performances of traditional cellular communication, one-hope D2D communication and relay-assisted D2D communication. The final simulation results showed that the D2D relay communication effectively improves system’s transmission quality and increases the system capacity. In D2D relay communication, the quality of the selected relay nodes greatly affects the system’s transmission efficiency and stability. Therefore, with the consideration of both the non-ideal interference environment and the global power limitation, a relay selection mechanism that maximizes the system transmission rate is proposed in [10]. In addition, the remaining power of the user equipment also affects the user’s willingness to be a relay node. Thus, the authors in [11] propose a cross-multilayer relay selection method via combining the time delay and the remaining power of the users. The simulation results show that the selected relay nodes have good overall performance. The above-described relay selection methods are all applied to D2D half-duplex relay communication, and do not consider D2D full-duplex relay communication that can greatly increase system capacity and reduce transmission delay.
In the D2D full-duplex relay communication, the D2D relay node can receive data from the source node and transmit cached data to the destination node simultaneously on the same time/frequency resource. Hence, the spectrum efficiency and transmission rate of the D2D full-duplex relay communication are about twice that of the half-duplex under ideal conditions. However, the performances of the D2D full-duplex relay communication are affected by self-interference, so how to reduce self-interference has received great attention [12,13,14]. In the existing studies of the relay-assisted D2D communication, many scholars have separately discussed the HD relay communication mode and the FD relay communication mode. Little work has been done to study the hybrid FD/HD relay communication. The authors of [15] compared the energy efficiency of FD and HD relay communications in the case of the controllable self-interference and the fixed power of source nodes. The results showed that the energy efficiency of FD relay communication is obviously better than that of HD relay communication. In [16], a unified model was proposed to represent full-duplex and half-duplex communication, and the model was used to simplify the process of mode selection and power distribution solution based on the maximum total transmission rate. In [17], an adaptive HD/FD selection scheme is proposed to maximize system capacity. The above researches selecting HD/FD mode are to maximize certain efficiency of the system, which do not measure whether the relay node can accept the selected duplex mode. Different relay nodes have different willingness and capacity of transmission. The selection of duplex modes only considers maximizing the system throughput or energy efficiency, which is difficult to ensure reliability in transmission. Therefore, according to the residual energy ratio and the willingness value of the relay node, this paper determines the relay node’s acceptable transmission mode and eliminates some relay nodes with insufficient transmission capability.
As the terminal equipment is carried by the user, the social relationship and mobility among the users have a great influence on the data transmission. Therefore, it is a research hotspot to integrate the influence of social attributes in the social network into the physical network [18,19,20,21]. In general, the higher the social relationship between the relay node and the source user, the stronger the stability of the relay transmission. In [22], a relay selection mechanism based on social factors is proposed, in which the transmission power of relay user is proportional to the social intensity between the source user and relay user, and the relay node is selected by minimizing interrupt probability. In [23], the user’s social behaviors are used to dynamically detect better relay nodes and the existing relay nodes can be changed by the better nodes at any time, thereby improving the stability of D2D relay communication. To obtain nodes with high trust, nodes’ behavioral characteristics are measured by the historical behaviors of the users [24,25]. Although the node willingness and transmission stability can be affected by the social domain to a certain extent, the strength of social relation itself is difficult to define or express. Therefore, how to define the strength of social relation has always been a problem worth studying. In [26], the social influence of the user is determined by fitting the similarity of the requested content among users and exploring user’s potential interest group in online social network. Zhang et al. [27] highlighted the influence of the mobility, which takes the predicted contact time among users as a part of measuring relationship strength. Based on the above measurement of social relationship, it is difficult to evaluate whether the relay node itself is a trustworthy node, such as a malicious node. Moreover, in order to obtain better communication quality, the number of selectable relay nodes has been limited to a certain extent. If the stability of D2D relay communication is measured only by considering the social relationship strength based on above methods, it is possible to exclude good strange nodes that always performed well in previous D2D relay communications. Based on the above problems, the trust metric is proposed in this paper, which takes into account the historical performance of relay nodes and the transmission possibility between the relay node and the source node to eliminate the malicious and low-reliability relay nodes.

3. System Model and Problem Description

3.1. System Model

Consider a single cell scenario, where large numbers of user devices need to transmit medical data to an edge medical node. The base station as a mobile switching center controls the transmission modes and the power of wireless devices within its coverage. An edge medical node is placed in each cell and users are randomly distributed in the system. The specific scene diagram is shown in Figure 1.
In this system, the edge medical node is denoted as DL, and the users who need to transmit medical data at the current time are put in set Q. The set C refers to the cellular users set, and the remaining users set is R.
Coordinates of base station is the origin, the position coordinates of any user equipment ui and edge medical node DL within the its coverage can be represented as (rii) and (rDLDL), respectively. r and θ respectively represent the distance and the phase declination of the base station to the device. Therefore, the distance D u i D L from any user ui to the edge node DL can be expressed as:
D u i D L = | r i 2 + r D L 2 2 r i r D L cos ( θ i θ D L ) |
Similarly, the distance D u j u i between user ui and user uj can be expressed according to Equation (2):
D u j u i = | r u i 2 + r u j 2 2 r u i r u j cos ( θ u i θ u j ) |
Assuming that the transmission power of mobile devices is constant, the greater the transmission distance, the greater the attenuation of the signal. In order to ensure transmission quality, the transmission rate of the single-hop D2D communication cannot be lower than the minimum rate threshold, that is, the distance of any two D2D devices cannot be greater than the maximum communication distance R U . According to the maximum communication distance and the geographic location of communication devices, the communication mode of each device in the cell can be roughly classified into the following three categories by only considering the path fading, as shown in Figure 2.
Mode 1: D2D direct communication. When D u i N D L < R U , the distance from the user who needs to transmit medical data to the edge node DL is in line with the single-hop D2D communication. In this case, the user equipment (UE) can directly communicate with the edge node by D2D communication. It not only saves UE’s energy consumption but also guarantees the quality of data transmission.
Mode 2: D2D relay communication. Since the multi-hop D2D communication requires multiple relay nodes to forward data in turn, if any relay node is interrupted, data will not be transmitted to the destination node, resulting in data loss. In order to reduce the possibility of data loss in multi-hop D2D communication, the data is mainly transmitted in the form of opportunistic broadcasting in the existing researches [28,29,30], that is, data transfer of each time needs broadcast to multiple users around, greatly increasing the possibility of data leakage. In summary, considering the sensitivity of medical data, this paper only considers two-hop D2D relay communication with only one relay node. Since the maximum transmission distance of the source node is R U , the transmission power of relay nodes is generally not greater than the transmission power of the source device, that is, the maximum transmission radius of relay nodes is also R U . Therefore, when the distance from users and the edge node satisfies the condition R U < D u i N D L < 2 R U , the communication mode between the UEs and the edge node DL can adopt the two-hop D2D communication to improve the transmission performance.
Mode 3: Cellular communication. When D u i N D L 2 R U , it indicates that the distance form users to the edge node DL is relatively long. Considering that medical data pays more attention to transmission stability than video popular files, this paper does not consider multi-hop D2D communication. Therefore, cellular communication is used directly to transmit medical data.

3.2. Problem Description

According to the relative geographical location of users and edge node, the communication modes are divided into three categories, in which the D2D direct communication and the cellular communication between the user and the edge node DL are very stable transmission modes, and the stability of the link in the transmission process is determined by the quality of its own channel. However, relay-assist D2D communication requires relay equipment to cooperate for data transmission. The transmission quality for different relay nodes may be different, besides, the relay nodes also have the hybrid HD/FD communication capabilities. Therefore, the choice of both relay nodes and relay modes is the key to improve transmission quality and reliability.

4. Physical Network and the Acceptable Transmission Mode

4.1. Physical Network of Relay Communication

The source nodes set requiring two-hop D2D relay communication can be obtained by the judgment of Mode 2. Let sk denote one of the source nodes, and the Zsk is the candidate D2D relay set for source node sk. The selection criteria for any relay node di in the Zsk can be denoted as:
D s k d i R U   a n d   D d i D L R U
It is assumed that all channels obey independent Rayleigh fading, hi.j represents the channel gain among node i and node j, and obeys the exponential distribution of parameter λi,j. In order to improve the frequency utilization, the source nodes and the relay nodes can multiplex the uplink channel resources of the cellular devices, in which the same-frequency interference value is expressed as I. All relay nodes apply the decode-and-forward (DF) method. Therefore, in HD relay communication, the S I N R s k d i H D received by relay node di and S I N R d i D L H D between the relay node di and the edge node DL are respectively represented as:
S I N R s k d i H D = P s k g s k , d i | h s k , d i | 2 N 0 + I c , d i
S I N R d i D L H D = P d i H D g d i , D L | h d i , D L | 2 N 0 + I c , D L
where g represents the transmission path loss, N0 is the power of Gaussian white noise with 0 mean and σ2 variance. Ic,di indicates the same-frequency interference of the multiplexed cellular device c to the relay node di. Similarly, Ic,DL. indicates the same-frequency interference of the multiplexed cellular user c to the edge node DL. Psk represents the transmission power of the source node sk. The transmission power of the relay node di is P d i H D satisfied by P t h d i H D P d i H D . P t h d i H D represents the power threshold that satisfies the minimum transmission quality of the source user. Therefore, the value of P t h d i H D can be expressed as:
P t h d i H D = S I N R t h ( N 0 + I c , D L ) g d i , D L | h d i , D L | 2
SINRth represents a threshold for ensuring that the data of source node sk can correctly parse at the edge node DL. The source node does not reduce its own transmission power like the relay node due to its own energy limitation and selfishness. Therefore, the source node threshold is not considered in this paper and the transmission power of the source node is set to a constant value.
According to Equations (4) and (5), the total transmission rate R s u m d i H D in HD relay communication mode can be expressed as:
R s u m d i H D = 1 2 w c min ( log 2 ( 1 + S I N R s k d i H D ) , log 2 ( 1 + S I N R d i D L H D ) )
where wc indicates the spectrum bandwidth of the multiplexed cellular device.
Similarly, in FD relay communication mode, the S I N R s k d i F D received by relay node di and S I N R d i D L F D between the relay node di and the edge node DL are respectively represented as:
S I N R s k d i F D = P s k g s k , d i | h s k , d i | 2 N 0 + I c , d i + P d i F D Δ d i
S I N R d i D L F D = P d i F D g d i , D L | h d i , D L | 2 I c , D L + N 0
In Equation (8), P d i F D Δ d i indicates that the relay node di is interfered by itself forwarding the signal. The value of Δ d i is [0,1], which indicates the ability of the relay node di to resist self-interference. The stronger the anti-interference ability, the larger the value of Δ d i . P d i F D indicates the transmission power of the relay device in the full-duplex mode. Similarly, to ensure the quality of the FD relay communication, the power P d i F D needs to satisfy P t h d i F D P d i F D . The value of P t h d i F D is:
P t h d i F D = S I N R t h ( N 0 + I c , D L ) g d i , D L | h d i , D L | 2
Based on Equations (8) and (9), the total transmission rate R s u m d i F D in FD relay communication mode can be expressed as:
R s u m d i F D = w c min ( log 2 ( 1 + S I N R s k d i F D ) , log 2 ( 1 + S I N R d i D L F D ) )
It can be seen from Equations (7) and (11) that the transmission rate of full-duplex relay communication is nearly twice that of half-duplex in the case of controllable self-interference [16]. However, when the transmission power is constant, the energy consumption of relay node in the full-duplex relay communication is significantly higher than that in the half-duplex relay communication. If the selected relay node does not consider the self energy consumption in full-duplex communication mode, it is difficult for the relay node to guarantee the transmission quality.

4.2. Relay Transmission Mode Selection Based on Acceptable Energy Consumption

In [31], the energy consumption of the relay node is refined into transmission energy consumption, RF amplifier loss, encoding/decoding circuit loss, and other idle time transmission energy consumption. In this paper, we focus on the difference in energy consumption of the relay node under the full-duplex and half-duplex relay communication, so the relay communication energy consumption model is set to transmit energy, self-interference energy, and RF amplifier losses. To simplify the modeling process, RF amplifier losses are modeled as linear processes. Therefore, according to the relay energy consumption model proposed in [31], the respective energy consumption of the relay node di in half-duplex mode and full-duplex mode can be simplified as:
E d i H D = B s k R d i D L H D P max P d i H D 2 η d i
E d i F D = B s k R d i D L F D ( P max P d i F D 2 η d i + P d i F D Δ d i )
where Pmax represents the maximum transmission power of the relay node. Bsk represents the amount of data transmitted by the source user sk. R d i D L H D represents the transmission rate of relay node di in the half-duplex mode. R d i D L F D represents the transmission rate of relay node di in the full-duplex mode. The η d i ( 0.1 ) is the utility value of the RF amplifier. P d i F D Δ d i represents the energy value consumed by the full-duplex relay node in a unit time to cancel self-interference. The stronger the anti-interference ability of the user equipment, the more energy it consumes.
In general, different relay nodes have different residual energy, and the same relay node has different forwarding intentions for different source nodes. If the residual energy of the relay node is sufficient and the energy used for transmission is only a small part of the residual energy, the quality of the transmission will not be low even if the forwarding willingness is not strong. Similarly, if the residual energy of the relay node is general, but the relay node has a strong willingness to transmit data for the source node, the node can also be considered by the relay node. Above all, this paper proposes the acceptable energy consumption value in combination with the wishing value and residual energy ratio, so the acceptable energy consumption value Eaccept-di of the candidate relay node di is expressed as:
E a c c e p t d i = { E s e l f d i e ( σ 1 μ d i + ( 1 σ ) 1 S s k , d i ) , μ d i > 0 0 , μ d i < 0 w h e r e μ d i = E s e l f d i E d o u d i E d i
where μdi indicates that the residual energy after consumption accounts for the proportion of the total energy of the relay user di. The higher the residual energy ratio μdi, the smaller the influence on the relay user. Edi indicates the energy value when the device is fully charged. In order to exclude some nodes with low residual energy, the full-duplex energy consumption Edou di is used to indicate the energy consumption of relay node di. σ ∈ (0,1) is the weight value between the relay node’s willingness and the relay node’s residual energy ratio. In no particular case, σ = 0.5 to adequately reflect the effect of both residual energy ratio and willingness of relay node. S d i s k indicates the willingness of relay node to transmit data for the source node sk, which is measured by a social relationship based on requesting file similarity among users and common friend ratio. According to the literature [32], the willingness S s k , d i that the relay node relays data for the source node sk can be expressed as:
S s k , d i = e θ ω s k , d i + ( 1 e θ ) F s k , d i
The request file similarity ωsk,di and the shared common friend ratio Fsk,di are calculated according to the literature [30], and θ represents the density of users in the cell.
Based on acceptable energy consumption value and the energy consumption in the full-duplex and half-duplex mode, the relay transmission mode M d i s k of any candidate relay node di can be expressed as:
M d i s k = { 0 ,     E d i H D > E a c c e p t d i   a n d   E d i F D > E a c c e p t d i 1 ,     E d i H D E a c c e p t d i   a n d   E d i F D > E a c c e p t d i 2 ,     E d i H D E a c c e p t d i   a n d   E d i F D E a c c e p t d i , d i s k
where M d i s k = 0 indicates that the relay node cannot relay for the source node. M d i s k = 1 expresses that the relay node di can only provide half-duplex relay communication, and it is not will to full-duplex relay communication. M d i s k = 2 indicates that the candidate relay node di can act as both a half-duplex relay node and a full-duplex relay node.
The acceptable energy consumption value Eaccept-di indicates the maximum energy consumption value that the candidate relay node can provide for the source node sk. The relay transmission mode determined by Eaccept-di can ensure that the consumed energy in relay communication has little influence on the relay node itself. In addition, it can also eliminate the nodes with insufficient power or low wish in candidate relay nodes set Zsk. Under normal circumstances, the nodes with insufficient power or low wish are prone to link breaks, so excluding such nodes can effectively improve the stability of transmission.
Since M d i s k represents the relay mode of the candidate relay node di, the HD relay transmission rate and FD relay transmission rate calculated according to (7) and (11) are limited by M d i s k . When the M d i s k = 0 , it indicates that the candidate relay node di cannot relay data for the source node, then R s u m d i H D = 0 and R s u m d i F D = 0 ; M d i s k = 1 represents that the candidate relay node di can only provide HD relay mode for the source node, then R s u m d i F D = 0 . The relay nodes in the candidate relay set Zsk with the zero transmission rate of both the full-duplex mode and the half-duplex mode are excluded, and the remaining relay nodes are stored in Z s k .

5. Trust Metrics

In Section 4, the physical layer of the candidate relay nodes is considered. It can ensure that the transmission quality of the candidate relay nodes is higher than a minimum threshold. In addition, the acceptable energy consumption of relay node is proposed according to the residual energy ratio and the social relationship between source node and relay node. To ensure the transmission quality of relay communication, the mode of relay transmission and the capability of relay node are determined by acceptable energy consumption. Nevertheless, the transmission reliability of relay nodes is still questionable. In D2D relay communication, relay nodes that intentionally lose the source node’s data or forcibly interrupt the D2D relay communication are called malicious nodes. If a malicious node is selected as a relay node to transmit medical data, it is very likely that important medical data cannot be transmitted to the edge medical node, thereby causing great impact on the source node. However, such malicious nodes are difficult to discover through the transmission quality of the physical layer at this moment. Their discovery needs to explore the long-term social attributes of each relay node. Therefore, this section focuses on explore the long-term social attributes of each relay node and defines the trust degree of each relay node so as to improve relay communication reliability.
The trust metrics are divided into direct trust and indirect trust. The direct trust demonstrates the reliability of the actual transmission of relay nodes in the past. The indirect trust indicates the possibility that the source node and the relay node can direct communicate with each other. The stronger the possibility, the higher the degree of mutual dependence, and the reliability of one of them as a relay node to transmit data will be higher. The trust metric of relay nodes can be better evaluated by combining the direct trust and indirect trust.

5.1. Direct Trust

Since direct trust indicates the reliability of the actual transmission, it can be measured as the feedback data accuracy of all user equipment assisted by the relay node. Generally, the quality of the transmission is affected by the geographical location of the user. To improve the poor transmission quality, the system provides relay communication for users. When the system selects a particular relay node to assist the source node, the channel quality and transmission stability of the relay node are relatively high. However, some relay nodes suddenly show malicious behavior during relay communication, such as discarding the data of the source user or forcibly interrupting the transmission. In order to reduce the maliciousness of the selected relay node and improve the transmission security, the base station is responsible for storing the data accuracy of each relay communication. Wherein, in the maximum delay time Δti specified by the source node i, the data accuracy Li.j of relay node j is defined as:
L i , j = B j Δ t i B i
Bi indicates the amount of data that the source node itself needs to transmit, and B j Δ t i indicates that the destination node receives the data size through the relay node j at the maximum delay time Δti. Due to the instability of the wireless channel and the relay transmission rate affected by the wireless channel, the value of Δti is generally large to reduce the possibility of misjudging malicious node. Let Lth ∈ [0,1] be the data accuracy threshold and the value of Lth is based on the importance of the data transmitted by the current user. In general, the value of Lth is 0.5. If Li,j > Lth, it indicates the relay node discarded the data of the source node or forcibly interrupted the transmission.
Let Kdi = (k1, k2, …, kn) denote all source nodes set assisted by the relay node di, where n indicates the number of source nodes. Hence, the assist-trust value Hddi of relay node di can be written as:
H d d i = i = 1 n a = 1 m i L k i , d i a m i n , L k i , d i a L t h
where mi is the assist frequency of source node ki. The Lki,di-a indicates the data accuracy sent by the source user ki after transmitting data through the relay node di during the a-th relay transmission. The one-time data accuracy in relay communication is calculated based on Equation (17). However, most malicious nodes show indirect maliciousness, that is, relay nodes only show maliciousness once or twice in m times relays communication. In order to exclude malicious nodes as much as possible, when L k i , d i a < L t h , Hddi = 0. Since data accuracy represents the ratio between the forwarded data size and the send data size, the accuracy of the node as actual relay node is not vary greatly in different relay communications after excluding malicious relay nodes. Therefore, the assist-trust value in Equation (18) is calculated by the average value of the data accuracy.

5.2. Indirect Trust

The indirect trust is expressed as the possibility of mutual transmission between the source node and the candidate relay node. Generally, if the social relationship among users is relatively strong, the possibility of transmission among users is also relatively large. In the D2D communication mode, the distance among two users is less than the maximum distance of D2D communication for a long time, and the social relationship strength among users is measured by the similarity of the request files and the number of shared friends. When the social relationship is stronger, the possibility of file sharing among users is very large through D2D communication. In this case, if the demand node wants another node to assist in transferring the data to the edge node, the another node is likely to provide a high trust for the demand user in order to obtain the need files from the demand node for a long time. Therefore, the possibility of mutual transmission among the source node and the candidate relay node can be further described as relative distance stable value and social relationship strength.
The relative distance stability is expressed as the number of times and the duration, of which distance value between the source user and the relay user is less than the D2D maximum communication distance at different time points. The more times, the more likely D2D communication occurs between the source user and the relay user. The longer the duration time, the stronger the transmission stability among users and the more likely the transmission is successfully completed. If the value of relative distance stability of users is very high, it can be shown that users have a great similarity in their daily routines and they are often in close proximity to some extent. For instance, users on both sides of the same street, rarely meet due to the road structure of the community, but their relative distance is less than the maximum communication distance of D2D for a long time.
In general, user’s work habits are very regular, and the location that each user visits every day and the time spent at each location are relatively fixed. Therefore, the location where the user stays longer than tth is marked as the user’s location of interest. By exploring user’s daily location of interest, a set of points of interest for user ui can be represented as P u i = { p u i 1 T u i 1 , p u i 2 T u i 2 , , p u i k T u i k } , where k refers to the number of points of interest, p u i k T u i k indicates the position coordinates and time information of the k-th point of interest for user ui. The time domain T u i k records the average time of user arriving at a certain location of interest and the average leaving time for many months, and T u i k represents the average dwell time at the k-th point of interest. In general p u j k T u i k p u i 2 T u j k , because different two users ui, uj are interested in different locations. Therefore, the relative distance stability value Xui,uj for users ui and uj is expressed as:
X u i , u j = b = 1 m a = 1 k ( T u i a T u j b ) σ u i , u j a , b W h e r e σ u i , u j a , b = { 0 , D P u j b P u i a > R U 1 , D P u j b P u i a R U
When the σ u i , u j a , b = 1 , the distance between two users of interested location can meet the distance of D2D direct communication; T u i a T u j b means to find the same time period between two users ui, uj. m and k represent the number of interesting points for user ui and user uj, respectively.
By the relative distance stable value, it can be determined whether the position difference of any two users can satisfy the physical condition of D2D communication. In addition, the social relationship based on both file request similarity and the proportion of common friends affects the possibility of generating D2D links. According to Equation (15), the social relationship between the user i and the user j can be expressed as:
S i , j = e θ ω i , j + ( 1 e θ ) F i , j
where the request file similarity ωi,j and the shared common friend ratio Fi,j are calculated according to the literature [30], and θ represents the density of users in the cell.
Based on the above Equations (19) and (20), the relative distance stability and social relationship strength between the user i and the user j are considered respectively, so the indirect trust HIj of the source node i to the relay node j can be expressed as:
H I j = X i , j j i X i , j ( e θ ω i , j + ( 1 e θ ) F i , j )
where j Z i X i , j represents the sum of the relative distance stable value between the source node i and each relay node of the corresponding candidate set Z i . If the value of HIj is higher, the more likely the D2D link is generated, the value of higher trust would provide to the source node.
In view of the above consideration for the direct trust and indirect trust, the trust Hdi of the source node sk to the relay node di can be measured as:
H d i = α H d d i + ( 1 α ) H I d i , L k i , d i a L t h
The term α ∈ (0,1) is the weight values between the direct trust and the indirect trust. The direct trust is the comprehensive performance of each relay node in the past relay communication, which is the actual performance of the relay nodes in the past, whereas the indirect trust is obtained through prediction. Therefore, direct trust is more realistic and quantitative than indirect trust. In summary, it is more reasonable to set the weight value of direct trust to be higher than the weight value of indirect trust, and in order to balance the influence of indirect trust, the value of α is set to 0.7. if L k i , d i a < L t h , namely the relay node has discarded data of other source nodes, then Hddi = 0. In order to eliminate malicious nodes as much as possible, direct trust is more important than indirect trust. According to Equation (22), the trust value for each node in the candidate set Z s k can be calculated and put into the set Esk in turn.

6. Relay Selection Mechanism Based on Compromise Factor

In Section 4, the transmission capability and willingness of each relay node in the relay candidate set are considered, and the transmission mode of each relay user is determined. In the previous section, in order to measure the transmission reliability of each relay node, a relay node trust metric was proposed. When users need to transmit medical data through D2D relay communication, they pay more attention to the reliability of relay nodes to ensure that the medical data can be transmitted to the edge medical node securely, that is, users are more willing to choose the most reliable relay node under meeting their own minimum transmission rate. However, the types of medical data are diverse. For the same user, different data types generally have different requirements for the reliability of relay communication., such as environmental data and important disease monitoring data. For different users, the transmission requirements of the same data type on relay nodes are different, such as the vital signs data of healthy users and patients with chronic diseases. If all the source nodes simply look for the highest reliability relay node at acceptable transmission rate of source node, it would limits the overall spectrum utilization of the system to some extent. For instance, the health user needs to transmit vital sign data. In this paper, the bandwidth of the relay node multiplexing is the same, so when the trust value takes precedence over the transmission rate, the total spectrum utilization of the system is limited to some extent. Based on this, the compromise factor is proposed to give priority to the spectral efficiency of the system for optimal relay selection under certain conditions.
It is assumed that the user equipment determines all data types importance according to the key monitoring type set by the user. Then, the data importance value set by any source user equipment sk is represented as Ι s k = { ρ 1 , ρ 2 , ρ n } from high to low, in which ρ i ( 0 , 1 ) and n represents the sum of all data types of the source node s k . Different source nodes generally have different values of n. When source node sk transmits data type with degree of importance of ρ i , the overall importance of this data type for all data types Ask can be expressed as:
A s k = 1 e ρ i ρ n ρ 1 ρ n
Let A t h ( 0 , 1 ) denote the compromise factor threshold. The value is determined according to the overall physical condition of the source user. The patient’s Ath value is generally less than the healthy user. If the value of Ask is greater than the threshold Ath, it indicates that the current data is more important, and the user wants to prioritize trust maximization. If the value of Ask is less than the threshold Ath, it indicates that the data type transmitted by the user at this time is not high enough, and the transmission rate can be maximized. The specific relay node selection rules are as follows:
When Ask < Ath, indicating that the transmitting data type at this time is of low importance, the user can lower the requirement of the trust value and maximize the transmission rate under certain conditions. Therefore, the optimal relay selection condition is:
arg d i s k max R d i = arg d i s k max ( R s u m d i F D , R s u m d i H D ) s t : H d i > H t h s k
where R s u m d i F D , R s u m d i H D are determined according to the transmission mode M d i s k of the relay node di. Hth-sk is the lowest acceptable trust value of the source node sk to ensure that the selected relay node can meet the minimum requirements of the source node. Since the trust value required by the source node is larger with increasing data importance, the minimum acceptable trust value should be proportional to the importance of the data. Thus, the minimum acceptable trust value Hth-sk is denoted as:
H t h s k = ρ i ρ n ρ 1 ρ n H max
where Hmax represents the maximum trust value provided to the source node sk among all relay nodes of the set Esk.
When Ask < Ath, Hth-sk is proposed to ensure that the reliability of the selected relay node is not too bad. When Hth-sk is exceeded, the relay node with the highest transmission rate can be directly selected without considering the relay node with higher transmission reliability. By maximizing the transmission rate, it is possible to find a full-duplex relay node with a faster transmission rate, thereby increasing system spectrum utilization and reducing base station load.
When AskAth, it indicates that the privacy of the data type transmitted by the source node sk at this moment is very strong. It is more important to ensure that data can be safely transmitted to the edge medical node compared to reducing the system’s load. Therefore, the optimal relay node selection condition is:
arg d i s k max ( H d i ) s t   ( R s u m d i F D , R s u m d i H D ) > R s k t h
When AskAth, the relay node with the highest trust value is preferred. Rsk-th indicates the minimum required rate of the source user. The value of Rsk-th is the average rate at which this type of data is transmitted for the source node in a long time. The values of R s u m d i F D and R s u m d i H D are both limited by the acceptable transmission mode M d i s k of the relay node.
According to the above relay selection rules, this paper proposes a relay selection algorithm based on the compromise factor, as shown in Algorithm 1.
Algorithm 1. Relay selection algorithm based on compromise factor
1.Input: source node s k , corresponding candidate relay set s k , the importance of all data sets Ι s k for source node s k
2.Initialize: R max = 0 , H max = 0
3Output: Optimal relay node u o p t
4.calculate acceptable energy value E a c c e p t d i of any relay node d i in s k according to Formulas (14) and (15)
5.get corresponding relay mode M d i s k according to acceptable energy value E a c c e p t d i and Formulas (14) and (15)
6.if M d i s k 0 then: put d i in set s k
7.calculate the overall importance A s k according to Formula (23)
8.if A s k < A t h then:
9.    for d i s k do:
10.        get relay communication rate R d i subject to corresponding relay mode M d i s k according to (7) and (11) and trust value H d i according to (18), (21), (22)
11.        if H d i > H t h s k and R d i > R max then: u o p t = d i and R max = R d i
12.  end for
13.else:
14.    for d i s k do:
15.        get relay communication rate R d i subject to corresponding relay mode M d i s k according to (7) and (11) and trust value H d i according to (18), (21), (22)
        if H d i > H max and R d i > R s k t h then: u o p t = d i and H max = H d i
16.  end for
17.end if
18.End

7. Simulation Results and Analysis

This section will evaluate and analyze the performance of the relay selection algorithm based on compromise factor (RSCF) through MATLAB. The simulation environment is considered as a single-cell model, and the geographical location of users in the cell is subject to random distribution. D2D users reuse the uplink resources with cellular users. The channel model considers Rayleigh fading and path loss. Other specific parameters are shown in Table 1.
In order to fully demonstrate the performance of the proposed RSCF algorithm, several different relay selection algorithms and D2D direct communication are compared in the simulation experiment. The comparison algorithms include the Based on Maximum Throughput for Relay Selection Algorithm (MTRS), the Based on Maximum Social Stability for Selection Algorithm (MSRS) and the Random Relay Selection Algorithm (RRS). The MTRS algorithm and the MSRS algorithm are commonly used to select relay nodes in relay communication, while the algorithm proposed in this paper is the optimal selection algorithm of throughput and trust based on data importance. By comparing these above two algorithms, the performance of the proposed RSCF algorithm can be effectively proved. In addition, we also discuss the impact of different compromise factor thresholds and self-interference cancellation coefficients on the performance of the proposed RSCF algorithm. The specific comparison index is the relay communication’s transmission rate and social stability. Where, the social stability is the trust value between source node and relay node.

7.1. Effect of Different Parameter Settings on the Performance of the Proposed Algorithm

In the RSCF algorithm, the transmission mode of each relay node is measured according to the acceptable energy consumption of the relay node. In full-duplex relay communication, the self-interference elimination capability of relay nodes will greatly affect the performance of full-duplex relay communication. Thus, we respectively set the self-interference cancellation coefficient to 40 dB, 80 dB and 113 dB in the simulation experiments, and then compare the performance on the various aspects of the proposed RSCF algorithm. Since the compromise factor threshold Ath directly affects the optimization criteria of the proposed RSCF algorithm, this paper also discusses the performance changes of the proposed RSCF algorithm under different compromise factor thresholds.
Figure 3 shows that the transmission rate is improved greatly as the self-interference cancellation coefficient is increases. Since the larger self-interference cancellation coefficient indicates that the relay node is less susceptible to interference by its own signal, the performance of the full-duplex relay communication is better, thereby the transmission rate is significantly improved. However, the social stability is not affected by the self-interference coefficient. The reason is that social stability expresses the strength of the relationship among users in the social domain, and is not limited by the self-interference coefficient in the physical layer. As shown in Figure 3a,b, with the compromise factor threshold Ath increases, the transmission rate of the D2D relay communication system gradually increases, but the social stability decreases. That is because when the user’s transmission task has been determined, the increase of the compromise factor threshold Ath will cause the proposed RSCF algorithm to be more inclined to find the node that maximizes the transmission rate, so the social stability of the relay communication system is gradually reduced. It is seen from Figure 3a,b that the transmission rate and social stability of D2D relay communication are better as the compromise factor threshold Ath ∈ [0.4,0.6]. When the user pays attention to the transmission rate, the value of Ath is more suitable for 0.6, so that not only the transmission rate of the D2D relay communication is high, but also the reliability of the D2D relay communication can be guaranteed. Conversely, when the user needs to transmit a medical data type with high importance, the value of Ath is 0.4 to guarantee high reliability and meeting the user’s demand for the transmission rate. In the subsequent comparative experiments, the value of Ath is 0.5, which is more universal. From Figure 3b, although the social stability will decrease with the increasing threshold Ath, the social stability of the relay communication link is not very poor under the limit of the minimum trust threshold. Figure 3c–e mainly compare the effect of the number of relay candidate nodes N and the distance D u i D L between the user and the edge medical node on the relay transmission rate and social stability. From Figure 3e, with the distance D u i D L from the user to the edge medical node increases, the transmission rate is smaller due to the problem of the path fading.

7.2. Performance Comparison of Each Algorithm

In order to fully demonstrate the performance of the proposed RSCF algorithm, this paper compares the performances of the four algorithms under different parameters, as shown in Figure 4.
It can be seen from Figure 4a that the proposed RSCF algorithm is significantly superior to MTSR and RRS in terms of social stability. That is because the source user’s data request importance and compromise factor threshold are considered in the proposed algorithm. When the data request importance is not very high, the RSCF algorithm will focus on increasing the transmission rate. Although the RSCF algorithm is lower than the MSRS algorithm in terms of social stability, the difference between these is small. As shown in Figure 4b,c, the RSCF algorithm is significantly better than the other three algorithms in transmission rate. The main reason is that RSCF algorithm can switch the half-duplex/full-duplex relay communication mode according to the state of the relay node. The transmission rate of RSCF algorithm is improved effectively by using the full-duplex relay mode. As shown in Figure 4b shows that the transmission rates of the other three algorithms tend to be stable with the increasing number of relay candidate nodes N. Since the initial value of the number of relay candidate nodes is large and the transmission rate of the relay node is related to the channel quality, and the cell radius in the simulation is small, the relay node with good channel quality can be found at N = 20. The transmission rate of the RSCF algorithm proposed in this paper is slightly reduced because the data request importance of the source user will affect whether the relay node selection prioritizes the transmission rate or the trust value. As shown in Figure 4c, with the distance D u i D L from the user to the edge medical node increases, the transmission rate of the four algorithms is relatively reduced due to the problem of the channel fading.
Through the above experiments and analysis, the RSCF algorithm proposed in this paper can flexibly select optimization criteria. The social stability and transmission rate of D2D relay communication system is improved dramatically by the RSCF algorithm.

8. Conclusions

In mobile health care, users need to transmit medical data to the edge medical node of the cell through smart devices. In light of the fact that some users are far away from the edge medical node, D2D two-hop relay communication can be used to improve the transmission performance. However, the quality of the D2D relay transmission is affected by the social relationship between the relay node and the source node and the relay node’s residual energy. Especially in mobile health care, the reliability of the selected relay nodes must be good. Thus, in this paper, the acceptable energy consumption value of relay nodes is firstly proposed at the physical domain, and the half-duplex/full-duplex transmission mode of each relay nodes is considered, and the relay nodes with poor energy are eliminated. Then, the trust metric of the relay nodes is proposed to measure the social reliability of each relay link. Through the comprehensive measurement of the physical domain and the social domain, the transmission performance of each relay node can be obtained. Finally, based on the varying importance of medical data, this paper proposes a relay selection algorithm based on the compromise factor (RSCF). With the help of the RSCF algorithm, the low-importance data can increase the system throughput by reducing the requirement of the trust, further increasing the system’s spectrum utilization. Finally, the simulation results show that the RSCF algorithm proposed in this paper is superior to other algorithms in terms of transmission rate. Although the reliability of selected relay nodes is affected by compromise factor threshold, the reliability of selected relay nodes is still higher compared with other algorithms.

Author Contributions

The work presented in this paper is a collaborative development by all of the authors. H.H. and W.X. proposed the idea and involved in the theoretical performance analysis; Y.T. and B.L. designed and optimized the algorithm; W.X. and B.L. wrote the paper; M.H. participated in discussion and made many valuable suggestions.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant No. 61871062, and in part by the Scientific Research Foundation of CQUPT under Grant No. A2018-07.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Santosh, C.; Ahmed, I.; Mukesh, S. A novel access control protocol using proxy signatures for cloud-based health information exchange. Comput. Secur. 2017, 67, 73–88. [Google Scholar]
  2. Sultan, A.; Alangari, A. Reliable, intelligent, and large scale e-health architecture using wireless sensor networks. In Proceedings of the 32nd International Conference on Computers and Their Applications (CATA), Honolulu, HI, USA, 20–22 March 2017. [Google Scholar]
  3. Lin, D.; Tang, Y.; Vasilakos, A.V. User-Priority-Based Power Control over the D2D Assisted Internet of Vehicles for Mobile Health. IEEE Syst. J. 2018, 4, 824–831. [Google Scholar] [CrossRef]
  4. Adibi, S. Telemedicine health service using LTE-Advanced relay antenna. IEEE J. Biomed. Health Inform. 2014, 18, 345–351. [Google Scholar] [CrossRef] [PubMed]
  5. Bellavista, P.; De Benedetto, J.; De Rolt, C.R.; Foschini, L.; Montanari, R. LTE proximity discovery for supporting participatory mobile health communities. In Proceedings of the IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017. [Google Scholar]
  6. Wang, R.; Yan, J.; Wu, D.; Wang, H.; Yang, Q. Knowledge-Centric edge computing based on virtualized D2D communication systems. IEEE Commun. Mag. 2018, 56, 32–38. [Google Scholar] [CrossRef]
  7. Niraj, S. Next generation wearable devices: Smart health monitoring device and smart sousveillance hat using D2D communications in LTE assisted networks. Int. J. Interdiscip. Telecommun. Netw. 2014, 6, 25–51. [Google Scholar]
  8. Zhang, A.; Wang, L.; Ye, X. Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems. IEEE Trans. Inf. Forensics Secur. 2017, 12, 662–675. [Google Scholar] [CrossRef]
  9. Melki, L.; Najeh, S.; Besbes, H. System performance of two-way decode-and-forward relaying assisted D2D communication underlaying cellular networks. In Proceedings of the International Symposium on Signal, Image, Video and Communications (ISIVC), Tunis, Tunisia, 21–23 November 2016; pp. 270–275. [Google Scholar]
  10. Kim, S.H.; Chaitanya, T.V.K.; Le-Ngoc, T.; Kim, J. Rate Maximization Based Power Allocation and Relay Selection With IRI Consideration for Two-Path AF Relaying. IEEE Trans. Wirel. Commun. 2015, 14, 6012–6027. [Google Scholar] [CrossRef]
  11. Ma, R.; Chang, Y.; Chen, H.; Chiu, C. On Relay Selection Schemes for Relay-Assisted D2D Communications in LTE-A Systems. IEEE Trans. Veh. Technol. 2017, 66, 8303–8314. [Google Scholar] [CrossRef]
  12. Liu, Y.; Roblin, P.; Quan, X.; Pan, W.; Shao, S.; Tang, Y. A Full-Duplex Transceiver with Two-Stage Analog Cancellations for Multipath Self-Interference. IEEE Trans. Microw. Theory Tech. 2017, 65, 5263–5273. [Google Scholar] [CrossRef]
  13. Ahmed, E.; Eltawil, A.M. All-Digital Self-Interference Cancellation Technique for Full-Duplex Systems. IEEE Trans. Wirel. Commun. 2015, 14, 3519–3532. [Google Scholar] [CrossRef]
  14. Korpi, D.; Choi, Y.; Huusari, T.; Anttila, L.; Talwar, S.; Valkama, M. Adaptive Nonlinear Digital Self-Interference Cancellation for Mobile Inband Full-Duplex Radio: Algorithms and RF Measurements. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–7. [Google Scholar]
  15. Wei, Z.; Zhu, X.; Sun, S.; Huang, Y.; Dong, L.; Jiang, Y. Full-Duplex Versus Half-Duplex Amplify-and-Forward Relaying: Which is More Energy Efficient in 60-GHz Dual-Hop Indoor Wireless Systems? IEEE J. Sel. Areas Commun. 2015, 33, 2936–2947. [Google Scholar] [CrossRef]
  16. Li, Y.; Wang, T.; Zhao, Z.; Peng, M.; Wang, W. Relay Mode Selection and Power Allocation for Hybrid One-Way/Two-Way Half-Duplex/Full-Duplex Relaying. IEEE Commun. Lett. 2015, 19, 1217–1220. [Google Scholar] [CrossRef]
  17. Benítez Olivo, E.E.; Moya Osorio, D.P.; Alves, H.; Santos Filho, J.C.S.; Latva-aho, M. An Adaptive Transmission Scheme for Cognitive Decode-and-Forward Relaying Networks: Half Duplex, Full Duplex, or No Cooperation. IEEE Trans. Wirel. Commun. 2016, 15, 5586–5602. [Google Scholar] [CrossRef]
  18. Xiong, J.; Ren, J.; Chen, L. Enhancing privacy and availability for data clustering in intelligent electrical service of IoT. IEEE Internet Things J. 2018. [Google Scholar] [CrossRef]
  19. Wu, D.; Yan, J.; Wang, H.; Wu, D.; Wang, R. Social Attribute Aware Incentive Mechanism for Device-to-Device Video Distribution. IEEE Trans. Multimedia 2017, 19, 1908–1920. [Google Scholar] [CrossRef]
  20. Wu, D.; Liu, Q.; Wang, H.; Wu, D.; Wang, R. Socially Aware Energy-Efficient Mobile Edge Collaboration for Video Distribution. IEEE Trans. Multimedia 2017, 19, 2197–2209. [Google Scholar] [CrossRef]
  21. Xiong, J.; Zhang, Y.; Li, X. RSE-PoW: A role symmetric encryption PoW scheme with authorized deduplication for multimedia data. Mobile Netw. Appl. 2018, 23, 650–663. [Google Scholar] [CrossRef]
  22. Xu, S.; Zhang, P. Social Network Information Based Relay Selection and Power Allocation in D2D Communication Systems. J. Electron. Inf. Technol. 2017, 39, 1142–1149. [Google Scholar]
  23. Zhang, H.; Wang, Z.; Du, Q. Social-Aware D2D Relay Networks for Stability Enhancement: An Optimal Stopping Approach. IEEE Trans. Veh. Technol. 2018, 67, 8860–8874. [Google Scholar] [CrossRef]
  24. Wu, D.; Si, S.; Wu, S.; Wang, R. Dynamic Trust Relationships Aware Data Privacy Protection in Mobile Crowd-Sensing. IEEE Internet Things J. 2018, 5, 2958–2970. [Google Scholar] [CrossRef]
  25. Wu, D.; Zhang, F.; Wang, H.; Wang, R. Security-Oriented Opportunistic Data Forwarding in Mobile Social Networks. Future Gener. Comput. Syst. 2018, 87, 803–815. [Google Scholar] [CrossRef]
  26. Wang, X.; Sheng, Z.; Yang, S.; Leung, V.C.M. Tag-assisted social-aware opportunistic device-to-device sharing for traffic offloading in mobile social networks. IEEE Wirel. Commun. 2016, 23, 60–67. [Google Scholar] [CrossRef] [Green Version]
  27. Xu, X.; Zhang, Y.; Sun, Z.; Hong, Y.; Tao, X. Analytical Modeling of Mode Selection for Moving D2D-Enabled Cellular Networks. IEEE Commun. Lett. 2016, 20, 1203–1206. [Google Scholar] [CrossRef]
  28. Gui, J.; Deng, J. Multi-Hop Relay-Aided Underlay D2D Communications for Improving Cellular Coverage Quality. IEEE Access 2018, 6, 14318–14338. [Google Scholar] [CrossRef]
  29. Chang, J.; Chen, Y.W. A cluster-based relay station deployment scheme for multi-hop relay networks. J. Commun. Netw. 2015, 27, 84–92. [Google Scholar] [CrossRef]
  30. Sharma, M.K.; Murthy, C.R. Distributed Power Control for Multi-Hop Energy Harvesting Links with Retransmission. IEEE Trans. Wirel. Commun. 2018, 17, 4064–4078. [Google Scholar] [CrossRef]
  31. Nguyen, K.; Vu, Q.; Tran, L.; Juntti, M. Energy Efficiency Fairness for Multi-Pair Wireless-Powered Relaying Systems. IEEE J. Sel. Areas Commun. 2018. [Google Scholar] [CrossRef]
  32. Wang, R.; Liu, K.; Wu, D.; Wang, H.; Yan, J. Malicious-Behavior-Aware D2D Link Selection Mechanism. IEEE Access 2017, 5, 15162–15173. [Google Scholar] [CrossRef]
Figure 1. Medical scene graph in a single cell.
Figure 1. Medical scene graph in a single cell.
Sensors 18 04417 g001
Figure 2. Communication mode selection schematic diagram based on distance between users and edge medical node.
Figure 2. Communication mode selection schematic diagram based on distance between users and edge medical node.
Sensors 18 04417 g002
Figure 3. The effect of transmission rate and social stability: (a,b) Compromise factor Ath; (c,d) Number of relay candidate nodes N; (e) distance D u i D L .
Figure 3. The effect of transmission rate and social stability: (a,b) Compromise factor Ath; (c,d) Number of relay candidate nodes N; (e) distance D u i D L .
Sensors 18 04417 g003
Figure 4. Effect of different parameters on four algorithms: (a,b) Number of relay candidate nodes N for social stability and transmission rate; (c) Distance D u i D L of among users to edge medical center node.
Figure 4. Effect of different parameters on four algorithms: (a,b) Number of relay candidate nodes N for social stability and transmission rate; (c) Distance D u i D L of among users to edge medical center node.
Sensors 18 04417 g004
Table 1. Simulation Parameters.
Table 1. Simulation Parameters.
ParametersValues
Radius of neighborhood500 m
Channel bandwidth B180 KHz
Rayleigh fadingExponential distribution with a mean of 1
Transmit power of equipment terminals23 dBm
Users to edge medical center node distance D u i D L [50 m, 250 m]
Number of relay candidate nodes N[50, 250]
Self-interference cancellation coefficient{40 dB, 80 dB, 113 dB}

Share and Cite

MDPI and ACS Style

Huang, H.; Xiang, W.; Tao, Y.; Liu, B.; Hu, M. Relay-Assisted D2D Transmission for Mobile Health Applications. Sensors 2018, 18, 4417. https://doi.org/10.3390/s18124417

AMA Style

Huang H, Xiang W, Tao Y, Liu B, Hu M. Relay-Assisted D2D Transmission for Mobile Health Applications. Sensors. 2018; 18(12):4417. https://doi.org/10.3390/s18124417

Chicago/Turabian Style

Huang, Hongcheng, Wei Xiang, Yang Tao, Biao Liu, and Min Hu. 2018. "Relay-Assisted D2D Transmission for Mobile Health Applications" Sensors 18, no. 12: 4417. https://doi.org/10.3390/s18124417

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop