{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:16:05Z","timestamp":1764936965924,"version":"3.41.2"},"reference-count":40,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,1,23]],"date-time":"2018-01-23T00:00:00Z","timestamp":1516665600000},"content-version":"vor","delay-in-days":22,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571240","61671253"],"award-info":[{"award-number":["61571240","61671253"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005374","name":"Nanjing University of Posts and Telecommunications","doi-asserted-by":"publisher","award":["KFJJ20170305","XK0010915026"],"award-info":[{"award-number":["KFJJ20170305","XK0010915026"]}],"id":[{"id":"10.13039\/501100005374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005320","name":"Xidian University","doi-asserted-by":"publisher","award":["ISN17-04"],"award-info":[{"award-number":["ISN17-04"]}],"id":[{"id":"10.13039\/501100005320","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>Device\u2010to\u2010Device communication underlaying cellular network can increase the spectrum efficiency due to direct proximity communication and frequency reuse. However, such performance improvement is influenced by the power interference caused by spectrum sharing and social characteristics in each social community jointly. In this investigation, we present a dynamic game theory with complete information based D2D resource allocation scheme for D2D communication underlaying cellular network. In this resource allocation method, we quantify both the rate influence from the power interference caused by the D2D transmitter to cellular users and rate enhancement brought by the social relationships between mobile users. Then, the utility function maximization game is formulated to optimize the overall transmission rate performance of the network, which synthetically measures the final influence from both power interference and sociality enhancement. Simultaneously, we discuss the Nash Equilibrium of the proposed utility function maximization game from a theoretical point of view and further put forward a utility priority searching algorithm based resource allocation scheme. Simulation results show that our proposed scheme attains better performance compared with the other two advanced proposals.<\/jats:p>","DOI":"10.1155\/2018\/5084842","type":"journal-article","created":{"date-parts":[[2018,1,23]],"date-time":"2018-01-23T23:32:07Z","timestamp":1516750327000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Game\u2010Theoretic Social\u2010Aware Resource Allocation for Device\u2010to\u2010Device Communications Underlaying Cellular Network"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4994-805X","authenticated-orcid":false,"given":"Lei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Can","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yanbin","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3888-2881","authenticated-orcid":false,"given":"Guan","family":"Gui","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,1,23]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7143335"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2375934"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2319555"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2014.6807947"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2775199"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350367"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2452492"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2752844"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7166190"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2013.sup.0513031"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.1166"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2597283"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/35.900644"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2014.0436"},{"key":"e_1_2_10_15_2","doi-asserted-by":"crossref","unstructured":"ShahV.andFapojuwoA. O. Socially aware resource allocation for device-to-device communication in downlink OFDMA networks Proceedings of the 2014 IEEE Wireless Communications and Networking Conference WCNC 2014 April 2014 Istanbul Turkey 1673\u20131678 https:\/\/doi.org\/10.1109\/WCNC.2014.6952481 2-s2.0-84912077329.","DOI":"10.1109\/WCNC.2014.6952481"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2014.6829957"},{"key":"e_1_2_10_17_2","doi-asserted-by":"crossref","unstructured":"WangF. SongL. HanZ. ZhaoQ. andWangX. Joint scheduling and resource allocation for device-to-device underlay communication Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC \u203213) April 2013 Shanghai China IEEE 134\u2013139 https:\/\/doi.org\/10.1109\/WCNC.2013.6554552 2-s2.0-84881592559.","DOI":"10.1109\/WCNC.2013.6554552"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2753280"},{"key":"e_1_2_10_19_2","doi-asserted-by":"crossref","unstructured":"AzimiS. M. ManshaeiM. H. andHendessiF. Hybrid cellular and device-to-device communication power control: Nash bargaining game Proceedings of the 2014 7th International Symposium on Telecommunications IST 2014 September 2014 Tehran Iran 1077\u20131081 https:\/\/doi.org\/10.1109\/ISTEL.2014.7000864 2-s2.0-84931035725.","DOI":"10.1109\/ISTEL.2014.7000864"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2615718"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2621010"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2322352"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2016.7833457"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2015.0201"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2169033"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2014.2365333"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2737651"},{"key":"e_1_2_10_28_2","unstructured":"Zachary\u2019s karate club https:\/\/en.wikipedia.org\/wiki\/Zachary%27s_karate_club."},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2700621"},{"key":"e_1_2_10_30_2","doi-asserted-by":"crossref","unstructured":"HuangJ. YinY. SunY. ZhaoY. XingC.-C. andDuanQ. Game theoretic resource allocation for multicell D2D communications with incomplete information Proceedings of the IEEE International Conference on Communications ICC 2015 June 2015 London UK 3039\u20133044 https:\/\/doi.org\/10.1109\/ICC.2015.7248790 2-s2.0-84953718675.","DOI":"10.1109\/ICC.2015.7248790"},{"key":"e_1_2_10_31_2","doi-asserted-by":"crossref","unstructured":"XiaoY. ChenK.-C. YuenC. andDaSilvaL. A. Spectrum sharing for device-to-device communications in cellular networks: a game theoretic approach Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN \u203214) April 2014 McLean Va USA IEEE 60\u201371 https:\/\/doi.org\/10.1109\/dyspan.2014.6817780 2-s2.0-84902177309.","DOI":"10.1109\/DySPAN.2014.6817780"},{"key":"e_1_2_10_32_2","doi-asserted-by":"crossref","unstructured":"NiyatoD.andHossainE. A game-theoretic approach to competitive spectrum sharing in cognitive radio networks Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC \u203207) March 2007 Kowloon China 16\u201320 https:\/\/doi.org\/10.1109\/WCNC.2007.9 2-s2.0-36348951960.","DOI":"10.1109\/WCNC.2007.9"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.1006\/game.1996.0044"},{"key":"e_1_2_10_34_2","doi-asserted-by":"crossref","unstructured":"NieN.andComaniciuC. Adaptive channel allocation spectrum etiquette for cognitive radio networks Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN \u203205) November 2005 Baltimore Md USA 269\u2013278 https:\/\/doi.org\/10.1109\/DYSPAN.2005.1542643 2-s2.0-33749074248.","DOI":"10.1109\/DYSPAN.2005.1542643"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.50"},{"key":"e_1_2_10_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.09.010"},{"key":"e_1_2_10_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2325552"},{"key":"e_1_2_10_38_2","doi-asserted-by":"crossref","unstructured":"RyuH.andParkS.-H. Performance comparison of resource allocation schemes for D2D communications Proceedings of the 2014 IEEE Wireless Communications and Networking Conference Workshops WCNCW 2014 April 2014 Istanbul Turkey 266\u2013270 https:\/\/doi.org\/10.1109\/WCNCW.2014.6934897 2-s2.0-84912054951.","DOI":"10.1109\/WCNCW.2014.6934897"},{"key":"e_1_2_10_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2015.2410768"},{"key":"e_1_2_10_40_2","unstructured":"LaurensonD. I. CruickshankD. G. M. andPoveyG. J. R. Computationally efficient multipath channel simulator for the COST 207 models Proceedings of the IEE Colloquium on Computer Modelling of Communication Systems May 1994 London UK 8\/1\u20138\/6 2-s2.0-0028422726."}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/5084842.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/5084842.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/5084842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T07:17:34Z","timestamp":1723015054000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/5084842"}},"subtitle":[],"editor":[{"given":"Mu","family":"Zhou","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/5084842"],"URL":"https:\/\/doi.org\/10.1155\/2018\/5084842","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2017-10-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-12-20","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-01-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5084842"}}