Hidden Terminal Aware Clustering for Large-scale D2D Networks

  • Seung Hyong Rhee
  • Xiaoying Lei


In device-to-device (D2D) environments where a number of wireless nodes are connected in ad hoc mode, the most popular mechanism for multiple access control is CSMA/CA as in IEEE 802.11 networks. Consequently, a considerable number of hidden terminals can be found in large-scale and dense D2D networks, and usually they may cause severe performance problems. Previous studies to improve the hidden terminal problem in dense wireless networks have suggested various solutions: e.g., channel assignment, transmit power control, and grouping schemes. In this paper, we adopt a different approach—a hidden terminal aware clustering mechanism, which detects the hidden terminals and enables the nodes to form clusters based on the detected information. A simple polling-based channel access scheme is also proposed such that all nodes belonging to a same cluster can access channel through their neighbors’ polling, which eliminates the hidden terminal problem. Mathematical analysis and simulations show that our proposed scheme significantly improves the performance of large-scale D2D networks.


Hidden terminal Clustering Large-scale D2D networks 



This work was supported by Natural Science Foundation of the Jiangsu Higher Education Institutions (16KJB520044), Basic Science Research Program through the National Research Foundation of Korea (2017R1D1A1B03028184), and in part by the Sabbatical Grant of Kwangwoon University in 2017.


  1. 1.
    Asadi, A., & Mancuso, V. (2013). WiFi direct and LTE D2D in action. In 2013 IFIP Wireless Days (WD) (pp. 1–8) IEEE.Google Scholar
  2. 2.
    Camps-Mur, D., Garcia-Saavedra, A., & Serrano, P. (2013). Device-to-device communications with Wi-Fi Direct: Overview and experimentation. IEEE Wireless Communications, 20(3), 96–104.CrossRefGoogle Scholar
  3. 3.
    Liu, K., et al. (2016). Development of mobile Ad-hoc networks over Wi-Fi direct with off-the-shelf android phones. In 2016 IEEE International Conference on Communications (ICC) (pp. 1–6) IEEE.Google Scholar
  4. 4.
    IEEE 802.11-2012. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE (2012).Google Scholar
  5. 5.
    Wang, X., Derakhshani, M., & Le-Ngoc, T. (2014). Self-organizing channel assignment for high density 802.11 WLANs. In 2014 IEEE 25th annual international symposium on personal, indoor, and mobile radio communication (PIMRC) (pp. 1637–1641) IEEE.Google Scholar
  6. 6.
    Deng, D.-J., Chen, Y.-S., & Wong, Y.-S. (2013). Adaptive channel allocation strategy for mobile ad hoc networks. Mathematical and Computer Modeling, 57(11–12), 2720–2730.MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Lei, X., & Rhee, S. H. (2015). Performance enhancement of overlapping BSSs via dynamic transmit power control. EURASIP Journal on Wireless Communications and Networking, 2015(8), 1–8.Google Scholar
  8. 8.
    Marchanga, J., Ghita, B., & Lancaster, D. (2017). Location based transmission using a neighbor aware with optimized EIFS MAC for ad hoc networks. Ad Hoc Networks, 63, 62–78.CrossRefGoogle Scholar
  9. 9.
    Chau, C.-K., et al. (2017). Effective static and adaptive carrier sensing for dense wireless CSMA networks. IEEE Transactions on Mobile Computing, 16(2), 355–366.CrossRefGoogle Scholar
  10. 10.
    Lei, X., & Rhee, S. H. (2016). Improving the IEEE 802.11 power-saving mechanism in the presence of hidden terminals. EURASIP Journal on Wireless Communications and Networking, 2016(26), 1–10.Google Scholar
  11. 11.
    Yuan, Y., Arbaugh, W. A., & Lu, S. (2007). Towards scalable MAC design for High-speed Wireless LANs. EURASIP Journal on Wireless Communications and Networking, 2007, 12597.CrossRefGoogle Scholar
  12. 12.
    Abichar, Z., & Chang, J. M. (2013). Group-based medium access control for IEEE 802.11n wireless LANs. IEEE Transactions on Computing, 2(12), 304–317.CrossRefGoogle Scholar
  13. 13.
    Yang, Y., & Roy, S. (2014). Grouping-based MAC protocols for EV charging data transmission in smart metering network. IEEE Journal on Selected Areas in Communications, 32(7), 1328–1343.CrossRefGoogle Scholar
  14. 14.
    Yoon, S.-G., Seo, J.-O., & Bahk, S. (2016). Regrouping algorithm to alleviate the hidden node problem in 802.11ah networks. Computer Networks, 105(5), 22–32.CrossRefGoogle Scholar
  15. 15.
    Damayanti, W., Kim, S., & Yun, J.-H. (2016). Collision chain mitigation and hidden device-aware grouping in large-scale IEEE 802.11ah networks. Computer Networks, 108(5), 296–306.CrossRefGoogle Scholar
  16. 16.
    Tseng, Y.-C., Ni, S.-Y., & Shih, E.-Y. (2003). Adaptive approaches to relieving broadcast storms in a wireless multihop mobile Ad hoc network. IEEE Transactions on Computer, 52(5), 545–557.CrossRefGoogle Scholar
  17. 17.
    Bianchi, Giusepe. (2000). Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications, 18, 535–547.CrossRefGoogle Scholar
  18. 18.
    OPNET modeler. Accessed 1 Feb 2018.

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Electronics Convergence EngineeringKwangwoon UniversitySeoulKorea
  2. 2.College of Information EngineeringYangzhou UniversityYangzhouChina

Personalised recommendations