Sensors 21 05861 v2
Sensors 21 05861 v2
Communication
Distributed Transmit Power Control for Energy-Efficient
Wireless-Powered Secure Communications
Kisong Lee
Department of Information and Communication Engineering, Dongguk University, Seoul 04620, Korea;
[email protected]; Tel.: +82-2-2260-3233
Keywords: secure communication; energy harvesting; secrecy energy efficiency; transmit power
control; distributed algorithm
signal transmission [20]. Regarding PLS and EH simultaneously, optimal policies for EH-
enabled relays [21,22] and an optimal resource allocation considering transmit power and
EH ratio [23] have been proposed for wireless-powered secure communications (WPSCs).
The optimal policy of a friendly jammer capable of EH has also been studied to help secure
communication between licensed nodes [24].
Unlike the aforementioned studies that focus only on energy efficiency [3–7,13–17] or
PLS [18–24], secrecy energy efficiency (SEE), which is defined as the ratio of the secrecy
rate to dissipated power, was suggested to achieve a balance between energy efficiency and
secure communication [25–30]. For example, resource allocations including transmit power
and beamforming vectors were optimized to maximize the SEE in CRNs [25,27] and multi-
antenna systems [26,28], respectively. Furthermore, the problem of SEE optimization was
investigated in multi-antenna and multi-user systems with confidentiality and reliability
constraints [29], and the optimal control parameters including first- and second-layer
power splitting ratios, beamforming vectors, and artificial noise covariance matrix were
derived to maximize the SEE in multi-antenna wireless-powered networks [30]. However,
only simple scenarios without co-channel interference were considered in [25,26], and high
computational complexity and information sharing among the nodes are needed to resolve
the problems noted in [27–30]. Therefore, a distributed algorithm with low complexity that
can be operated in real systems is required for energy-efficient WPSCs with co-channel
interference. The literature survey is summarized in Table 1.
In this study, we investigate a distributed transmit power control (TPC) for energy-
efficient WPCSs. The main contributions can be summarized as follows.
• We consider WPSCs where the EH nodes harvest energy from the transmitted signals
but are not allowed to decode private information shared between the transmitter and
receiver (Tx-Rx) pairs. Given this scenario, we formulate an optimization problem
to find the optimal transmit powers of the Txs to maximize the sum SEE while
guaranteeing that the amount of energy collected from each EH node is greater than a
minimum required value.
Sensors 2021, 21, 5861 3 of 12
Set i
gi,i hi,i
EH node i Rx i
gi,j Tx i hj,i
gj,j hj,j
Tx j Rx j
EH node j
Figure 1. System model of WPSCs showing only two node sets for brevity.
where zie ∼ CN 0, σ2 . Considering that each EH node can harvest energy not only from
the signal sent by Tx i but also from the signals sent by other Txs, the total harvested energy
at EH node i is given by
ei = ∑ ζ i p j | gj,i |2 , (4)
j ∈N
where ζ i is the energy conversion efficiency. On the other hand, if EH node i overhears the
signal sent by Tx i instead of harvesting energy, its achievable SE is represented by
!
e pi | gi,i |2
ri = log2 1 + 2 . (5)
σ + ∑k∈N\{i} pk | gk,i |2
From (2) and (5), the secrecy rate of node set i can be defined as the rate difference
between the legitimate and eavesdropping links [31] as follows:
pCE
i = pC + p i − ei , (7)
where pC is the constant energy consumed by the circuits of each node set.
From (6) and (7), the SEE of node set i can be defined as the ratio of secrecy rate to
total power consumption (bits/Hz/Joule), which can be formulated as follows:
ris
ηis = . (8)
pCE
i
It should be noted that this metric indicates how efficiently energy can be used to
transmit secret information.
Based on these equations, we develop the optimization problem to find the optimal
transmit powers of the Txs to maximize the sum SEE while guaranteeing the minimum EH
requirement, Emin , for each EH node, as follows.
max
0~p
∑ ηis
i ∈N
s.t. ei ≥ Emin , i ∈ N
pi ≤ Pmax , i ∈ N, (9)
where ~p = { p1 , p2 , · · · , p N } and Pmax is the maximum transmit power allowed for each
Tx. The problem in (9) is non-convex because of the fractional objective function and
interference term; hence, the optimal solution of ~p cannot be derived in a closed-form.
The optimal solutions can be numerically found by brute-force search, where each pi is
quantized with M equally spaced values and all possible combinations are evaluated to
find the optimal value. However, the channel state information (CSI) of all wireless links
must be available to implement this method, and a high computational complexity of
O M N is incurred, which increases exponentially with the number of node sets.
Sensors 2021, 21, 5861 5 of 12
max ηis
0≤ p i
s.t. C1 : ei ≥ Emin
C2 : pi ≤ Pmax . (10)
ris
With defining xi = , the objective function in (10) is converted from a fractional
pCE
i
form to an equivalent subtractive form, ris − xi pCE
i , using nonlinear fractional program-
ming [33]. Accordingly, the subproblem in (10) is reformulated as
To derive the transmit power of each Tx using the dual method, we denote the
Lagrangian function of (11) as follows.
L( pi , λi , µi ) = ris − xi pCE
i + λi( ei − Emin )+ µi( Pmax − pi ), (12)
where λi ≥ 0 and µi ≥ 0 are the respective Lagrange multipliers of each constraint of (11).
The dual objective is then defined as
Then, the transmit power that satisfies the KKT conditions in (15)–(18) can be derived
as follows.
" #+
1 Ψi
pi = − , (19)
ln 2( x (1 − ζ | g |2 ) + µ − λ ζ | g |2 )+ t
[s] |hi,i |2
i i i,i i i i i,i i
Sensors 2021, 21, 5861 6 of 12
[s]
where Ψi = σ2 + ∑ j∈N\{i} p j |h j,i |2 and ti is defined as
[s] | gi,i |2
ti = . (20)
σ2 + ∑l ∈N pl | gl,i |2
In (19), Rx i can easily calculate Ψi by subtracting the signal power received from
[s]
Tx i from the total received signal power. In addition, EH node i can measure ti readily
because the denominator of (20) is the total received signal power at EH node i. Therefore,
Tx i can determine its transmit power as shown in (19) by receiving information on Ψi from
[s]
Rx i and information on ti and gi,i from EH node i, respectively. It should be noted that
[s]
although the EH node is the untrusted node, it should send information on ti and gi,i to
Tx i to receive enough energy to meet the EH requirement for operation. Moreover, Tx i
does not need to share any information with the other node sets for calculating pi , thereby
allowing the proposed algorithm to operate in a distributed manner.
Moreover, the Lagrange multipliers are updated using a gradient algorithm as follows.
h i+
q +1 q
λi = λi − ν1 (ei − Emin ) ,
h i+
q +1 q
µi = µi − ν2 ( Pmax − pi ) , (21)
where ν1 and ν2 are sufficiently small step sizes for the update.
The operations of the proposed algorithm are described in Algorithm 1, where
~◦ = {◦1 , ◦2 , · · · , ◦ N }. Specifically, each Tx initializes the transmit power and Lagrange
multipliers randomly and calculates the SEE with the initialized transmit power. Next,
the Txs determine the transmit powers according to (19) and update the Lagrange mul-
tipliers according to (21) iteratively until the transmit powers converge. The Txs also
update the SEE and total consumed power with the converged transmit power to assess
the convergence of the SEE. This process is repeated until the SEE converges.
Given that e−2 iterations are needed to ensure that the norm of the gradient is less than
e in the worst-case scenario [34], the number of iterations required for convergence of the
inner loop is e−2 . Moreover, T denotes the number of iterations required for convergence
of the outer
loop [35], and the computational complexity of the proposed algorithm is
O TN 2 e−2 , where N 2 is the number of computations required to calculate ~p.
in which the maximum distance of each signal link and EH link in the same node set is 15 m.
Because EH circuits have low power sensitivity, e.g., −10∼−30 dBm for energy harvesters
while −60∼−80 dBm for information receivers [12,36], the small size area is appropriate for
wireless-powered networks. A simplified path loss model with a path loss exponent of 2.7
is considered for urban areas [21]. Moreover, Rayleigh fading is considered for the signal
links to reflect the non-line-of-sight (nLoS) characteristics while Rician fading with a K-
factor of 6 is considered for the EH links to reflect the line-of-sight (LoS) characteristics [12].
The following five schemes are considered for performance evaluation in terms
of the sum
SEE, which can be mathematically written as E ∏i∈N 1ei ≥Emin · ∑i∈N ηis . Note that a
penalty is assigned by setting the sum SEE to zero when the minimum EH constraint is
violated; therefore, the effects of EH violation are inherent in the sum SEE calculations.
• Optimal scheme: With the knowledge of the CSI of all wireless links, the near-optimal
performance can be found using a brute-force search with M = 100; however, the per-
formance for N ≥ 5 is found using a divide and conquer algorithm because of the
extremely high computational complexity of the brute-force search.
• Proposed scheme: The transmit powers of the Txs are determined using the proposed
algorithm given in Algorithm 1.
• r s max. scheme: The transmit powers of the Txs are determined to maximize the sum
secrecy rate, ∑i∈N ris , which is found from the divide and conquer algorithm.
• Equally reduced power (ERP) scheme [37]: All Txs use the same transmit power that
maximizes the sum SEE while meeting the minimum EH constraint, and the optimal
value of the transmit power is found by one-dimensional exhaustive search.
• EH max. scheme: The Txs use their maximum transmit powers to maximize the total
harvested energies of the EH nodes, ∑i∈N ei .
• Rand scheme: The transmit powers of the Txs are determined randomly.
Figure 2 depicts the transmit power of each Tx and the sum SEE against the number
of iterations, which shows the convergence of the proposed scheme. Each Tx adjusts the
transmit power to maximize its own SEE, which affects the SEEs of the other node sets.
Although the transmit power update at each Tx influences the other Txs, the transmit
powers of all Txs converge to stationary points with iteration progression; finally, the sum
SEE also converges to a value of 8.85 within 70 iterations.
300 10
Secrecy energy efficiency (bits/Hz/Joule)
Transmit power for each Tx (mW)
250 8
200 6
Tx 1
Tx 2
150 Tx 3 4
Ks
100 2
50 0
0 10 20 30 40 50 60 70 80 90 100
Number of iterations
Figure 2. Convergence of the proposed scheme.
Figure 3 depicts the sum SEE versus maximum transmit power (Pmax ). In the optimal,
proposed, and ERP schemes, the sum SEE increases with Pmax when Pmax < 27 dBm but
Sensors 2021, 21, 5861 8 of 12
converges to a stationary point when Pmax ≥ 27 dBm. This indicates that there is an optimal
transmit power at which the maximum SEE is achieved, i.e., the use of extra transmit power
beyond this value reduces the sum SEE. Therefore, these schemes do not use transmit
powers of more than 27 dBm even though Pmax increases over 27 dBm. On the other hand,
the r s max. and EH max. schemes use more transmit power to maximize the sum secrecy
rate and total harvested energy, respectively, as Pmax increases. However, the excessive use
of transmit power exceeding 27 dBm causes inefficient energy consumption rather than
improvement of the secrecy rate, so the sum SEE degrades seriously when Pmax is greater
than 27 dBm. The sum SEE of the rand scheme also decreases as Pmax increases because it
uses more transmit power without the adaptive TPC strategy.
Secrecy energy efficiency (bits/Hz/Joule)
10
Optimal
Proposed
2
rs max.
ERP
EH max.
0
Rand
18 21 24 27 30 33 36 39
Maximum transmit power, Pmax (dBm)
Figure 3. Sum secrecy energy efficiency vs. maximum transmit power (Pmax ) for different schemes.
Figures 4 and 5 depict the sum SEE versus required harvested energy (Emin ) and energy
conversion efficiency (η), respectively. In an environment where it is difficult to satisfy
the EH requirements, i.e., larger Emin and smaller η, the Txs should use the additional
transmit power inefficiently to satisfy the EH requirements. For some channel realizations,
e.g., deep fading, the EH requirements cannot be inherently guaranteed at extremely large
Emin or small η. Then, this causes serious degradation in the sum SEE because it is set to
zero when the minimum EH constraint is violated. Hence, the sum SEEs of all schemes
decrease as Emin increases or η decreases, especially when Emin ≥ −5 dBm and η ≤ 0.3.
However, we can see that the proposed scheme shows a trend similar to the optimal scheme
and outperforms the conventional schemes. In particular, the performance gain of the
proposed scheme compared to the conventional schemes is greater in an environment
that favorably satisfies the EH requirements, where the adaptive TPC strategy can operate
more effectively.
Sensors 2021, 21, 5861 9 of 12
0
-20.0 -17.5 -15.0 -12.5 -10.0 -7.5 -5.0 -2.5 0.0
Required harvested energy, Emin (dBm)
Figure 4. Sum secrecy energy efficiency vs. required harvested energy (Emin ) for different schemes.
Optimal
Secrecy energy efficiency (bits/Hz/Joule)
12
Proposed
rs max.
10 ERP
EH max.
Rand
8
Figure 5. Sum secrecy energy efficiency vs. energy conversion efficiency (η) for different schemes.
Figure 6 depicts the cumulative distribution function (CDF) versus sum SEE. It is
observed that the CDF of the proposed scheme is closest to that of the optimal scheme, thus
confirming the effectiveness of the proposed TPC strategy. Given that high values of SEE
are more distributed in the CDFs of the optimal and proposed schemes, rather than those
of the conventional schemes, we note that the effective TPC is important for improving
the SEE.
Sensors 2021, 21, 5861 10 of 12
1.0
0.6
0.4
Optimal
Proposed
0.2 rs max.
ERP
EH max.
Rand
0.0
0 5 10 15 20 25 30
Secrecy energy efficiency (bits/Hz/Joule)
Figure 6. Cumulative distribution function vs. sum secrecy energy efficiency for different schemes.
∑ ηs
Figure 7 depicts the average SEE for each node set ( i∈NN i ) and the computation time
against number of node sets (N). It should be noted that the computation time of the
EH max. and random schemes are omitted in subfigure (b) because they do not perform
any computations to determine the transmit powers. As N increases, the Txs experience
severe interference with each other. As a result, the improvement in the secrecy rate is
insignificant compared to the transmit power used, which in turn deteriorates the average
SEE with increasing N. However, the proposed scheme achieves a higher SEE than the
conventional schemes by coping with the interference and reduces the computation time
significantly compared with the optimal and r s max. schemes. Although the ERP scheme
can achieve the lowest computation time for a large number of N because the optimal
transmit power can be found by one-dimensional search even as N increases, the proposed
scheme achieves higher sum SEE than the ERP scheme, which verifies the effectiveness of
the proposed distributed method in term of energy efficiency and secure communication.
108
4 Optimal Optimal
Proposed Proposed
Average secrecy energy efficiency
107
rs max. rs max.
ERP ERP
Computation time (msec)
106
3 EH max.
Rand
(bits/Hz/Joule)
105
2 104
103
1
102
101
0
100
2 3 4 5 6 7 8 2 3 4 5 6 7 8
Number of node sets, N Number of node sets, N
(a) (b)
Figure 7. Performance comparison against number of node sets (N) for different schemes. (a) Average secrecy energy
efficiency per each node set vs. N. (b) Computation time vs. N.
Sensors 2021, 21, 5861 11 of 12
Thus, the simulation results show that the proposed scheme has a slight difference
in performance from the optimal scheme of about 10% because of its distributed nature;
however, it is confirmed that the proposed scheme improves the sum SEE using the effec-
tive TPC strategy compared with the conventional schemes while significantly reducing
computation time.
5. Conclusions
This study involves investigation of a distributed TPC algorithm for energy-efficient
WPSCs, in which the transmit powers of the Txs are optimized to maximize their own
SEEs while guaranteeing the minimum EH requirements for the corresponding EH nodes.
Specifically, we analytically derived the closed-form equation for the transmit power,
and proposed an iterative algorithm using a dual method, that can be operated in a
distributed manner without sharing information with the other node sets. The simulation
results confirm that the proposed scheme can achieve a higher sum SEE than existing
schemes by adjusting the transmit power with respect to secrecy rate and energy efficiency;
moreover, the computation time is significantly reduced compared with the optimal scheme.
It is expected that our solution will be used to solve the complex TPC problems of WPSCs
in a simple distributed manner. Interesting topics for future work include a deep learning-
based distributed TPC algorithm for improving the performance of WPSCs.
Funding: This work was supported by the National Research Foundation of Korea (NRF) grant
funded by the Korea government (MSIT) (No. 2021R1A2C4002024).
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Frustaci, M.; Pace, P.; Aloi, G.; Fortino, G. Evaluating critical security issues of the IoT world: Present and future challenges. IEEE
Internet Things J. 2018, 5, 2483–2495. [CrossRef]
2. Gui, G.; Liu, M.; Tang, F.; Kato, N.; Adachi, F. 6G: Opening new horizons for integration of comfort, security and intelligence.
IEEE Wirel. Commun. 2020, 27, 126–132. [CrossRef]
3. Li, S.; Kim, J.G.; Han, D.H.; Lee, K.S. A survey of energy-efficient communication protocols with QoS guarantees in wireless
multimedia sensor networks. Sensors 2019, 19, 199. [CrossRef]
4. Hoang, T.D.; Le, L.B.; Le-Ngoc, T. Energy-efficient resource allocation for D2D communications in cellular networks. IEEE Trans.
Veh. Technol. 2016, 65, 6972–6986. [CrossRef]
5. Shi, J.; Yu, W.; Ni, Q.; Liang, W.; Li, Z.; Xiao, P. Energy efficient resource allocation in hybrid non-orthogonal multiple access
systems. IEEE Trans. Commun. 2019, 67, 3496–3511. [CrossRef]
6. He, S.; Huang, Y.; Wang, J.; Yang, L.; Hong, W. Joint antenna selection and energy-efficient beamforming design. IEEE Signal
Process. Lett. 2016, 23, 1165–1169. [CrossRef]
7. Lee, K. Distributed joint optimization of beamforming and power allocation for maximizing the energy efficiency of cognitive
heterogeneous networks. Sensors 2021, 21, 3186. [CrossRef] [PubMed]
8. Raghunathan, V.; Chou, P.H. Design and power management of energy harvesting embedded systems. In Proceedings of the 2006
International Symposium on Low Power Electronics and Design (ISLPED), Tegernsee, Germany, 4–6 October 2006; pp. 369–374.
9. Lu, C.; Raghunathan, V.; Roy, K. Efficient design of micro-scale energy harvesting systems. IEEE J. Emerg. Sel. Top. Circuits Syst.
2011, 1, 254–266. [CrossRef]
10. Prauzek, M.; Konecny, J.; Borova, M.; Janosova, K.; Hlavica, J.; Musilek, P. Energy harvesting sources, storage devices and system
topologies for environmental wireless sensor networks: A review. Sensors 2018, 18, 2446. [CrossRef]
11. Pinuela, M.; Mitcheson, P.; Lucyszyn, S. Ambient RF energy harvesting in urban and semi-urban environments. IEEE Trans.
Microw. Theory Techn. 2013, 61, 2715–2726. [CrossRef]
12. Lu, X.; Wang, P.; Niyato, D.; Kim, D.I.; Han, Z. Wireless networks with RF energy harvesting: A contemporary survey. IEEE
Commun. Surv. Tut. 2015, 17, 757–789. [CrossRef]
13. Lee, K.; Hong, J. Energy-efficient resource allocation for simultaneous information and energy transfer with imperfect channel
estimation. IEEE Trans. Veh. Technol. 2016, 65, 2775–2780. [CrossRef]
Sensors 2021, 21, 5861 12 of 12
14. Chung, B.C.; Lee, K.; Cho, D. Proportional fair energy-efficient resource allocation in energy-harvesting-based wireless networks.
IEEE Syst. J. 2018, 12, 2106–2116. [CrossRef]
15. Lee, K.; Yoon, C.; Jo, O.; Lee, W. Joint optimization of spectrum sensing and transmit power in energy harvesting-based cognitive
radio networks. IEEE Access 2018, 6, 30653–30662. [CrossRef]
16. Shahini, A.; Kiani, A.; Ansari, N. Energy efficient resource allocation in EH-enabled CR networks for IoT. IEEE Internet Things J.
2019, 6, 3186–3193. [CrossRef]
17. Noor-A-Rahim, M.; Khyam, M.O.; Guan, Y.L. Energy harvesting two-way relaying with antenna selection scheme. IET Commun.
2019, 13, 198–204. [CrossRef]
18. Chu, S. Secrecy analysis of modify-and-forward relaying with relay selection. IEEE Trans. Veh. Technol. 2019, 68, 1796–1809.
[CrossRef]
19. Atapattu, S.; Ross, N.; Jing, Y.; He, Y.; Evans, J.S. Physical-layer security in full-duplex multi-hop multi-user wireless network
with relay selection. IEEE Trans. Wirel. Commun. 2019, 18, 1216–1232. [CrossRef]
20. Park, K.; Wang, T.; Alouini, M. On the jamming power allocation for secure amplify-and-forward relaying via cooperative
jamming. IEEE J. Sel. Areas Commun. 2013, 31, 1741–1750. [CrossRef]
21. Kalamkar, S.S.; Banerjee, A. Secure communication via a wireless energy harvesting untrusted relay. IEEE Trans. Veh. Technol.
2017, 66, 2199–2213. [CrossRef]
22. Lee, K.; Bang, J.; Choi, H. Secrecy outage minimization for wireless-powered relay networks with destination-assisted cooperative
jamming. IEEE Internet Things J. 2021, 8, 1467–1476. [CrossRef]
23. Xu, D.; Zhu, H. Secure transmission for SWIPT IoT systems with full-duplex IoT devices. IEEE Internet Things J. 2019, 6,
10915–10933. [CrossRef]
24. Liu, W.; Zhou, X.; Durrani, S.; Popovski, P. Secure communication with a wireless-powered friendly jammer. IEEE Trans. Wirel.
Commun. 2016, 15, 401–415. [CrossRef]
25. Ouyang, J.; Lin, M.; Zou, Y.; Zhu, W.; Massicotte, D. Secrecy energy efficiency maximization in cognitive radio networks. IEEE
Access 2017, 5, 2641–2650. [CrossRef]
26. Wang, G.; Meng, C.; Heng, W.; Chen, X. Secrecy energy efficiency optimization in AN-aided distributed antenna systems with
energy harvesting. IEEE Access 2018, 6, 32830–32838. [CrossRef]
27. Jiang, Y.; Zou, Y.; Ouyang, J.; Zhu, J. Secrecy energy efficiency optimization for artificial noise aided physical-layer security in
OFDM-based cognitive radio networks. IEEE Trans. Veh. Technol. 2018, 67, 11858–11872. [CrossRef]
28. Jiang, Y.; Zou, Y.; Ouyang, J.; Zhu, J. Beamforming aided secrecy energy efficiency maximization in heterogeneous cellular
networks. IEEE Trans. Veh. Technol. 2021, 70, 2576–2589. [CrossRef]
29. Zappone, A.; Lin, P.; Jorswieck, E.A. Secrecy energy efficiency for MIMO single- and multi-cell downlink transmission with
confidential messages. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2059–2073. [CrossRef]
30. Lu, Y.; Xiong, K.; Fan, P.; Ding, Z.; Zhong, Z.; Letaief, K.B. Secrecy energy efficiency in multi-antenna SWIPT networks with
dual-layer PS receivers. IEEE Trans. Wirel. Commun. 2020, 19, 4290–4306. [CrossRef]
31. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [CrossRef]
32. Yu, W.; Lui, R. Dual methods for nonconvex spectrum optimization of multicarrier systems. IEEE Trans. Commun. 2006, 54,
1310–1321. [CrossRef]
33. Dinkelbach, W. On nonlinear fractional programming. Manag. Sci. 1967, 13, 492–498. [CrossRef]
34. Fliege, J.; Vaz, A.I.F.; Vicente, L.N. Complexity of gradient descent for multiobjective optimization. Optim. Methods Softw. 2018, 34,
949–959. [CrossRef]
35. Venturino, L.; Prasad, N.; Wang, X. Coordinated scheduling and power allocation in downlink multicell OFDMA networks. IEEE
Trans. Veh. Technol. 2009, 58, 2835–2848. [CrossRef]
36. Stoopman, M.; Keyrouz, S.; Visser, H.J.; Philips, K.; Serdijn, W.A. Co-design of a CMOS rectifier and small loop antenna for highly
sensitive RF energy harvesters. IEEE J. Solid-State Circuits 2014, 49, 622–634. [CrossRef]
37. Lee, W.; Ban, T.; Jung, B.C. Distributed transmit power optimization for device-to-device communications underlying cellular
networks. IEEE Access 2019, 7, 87617–87633. [CrossRef]