This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Double reflections Assisted RIS Deployment and Energy-efficient Group Selection in mmWaves D2D Communication

Authors    Lakshmikanta Sau and Sasthi C. Ghosh L. Sau and S. C. Ghosh are with the Advanced Computing & Microelectronics Unit, Indian Statistical Institute, Kolkata 700108, India. (E-mail: [email protected], [email protected]).
Abstract

Reconfigurable intelligent surfaces (RISs) offer a viable way to improve the performance of the multi-hop device-to-device (D2D) communication. However, due to the substantial propagation and penetration losses of the millimeter waves (mmWaves), a direct line of sight (LoS) link and close proximity of a device pair are required for a high data rate. Static obstacles like trees and buildings can easily impede the direct LoS connectivity between a device pair. Hence, RIS placement plays a crucial role in establishing an indirect LoS link between them. Therefore, in this work, we propose a set cover-based RIS deployment strategy for both single and double RIS-assisted D2D communication. In particular, we have demonstrated that permitting reflections via two consecutive RISs can greatly lower the RIS density in the environment, preventing resource waste and enabling the service of more obstructed device pairs. After the RIS deployment, for information transfer, we also propose an energy-efficient group selection criteria. Moreover, we prove that sometimes double reflections are more beneficial than single reflection, which is counter-intuitive. Numerical results show that our approach outperforms a random and a recent deployment strategy.

Index Terms:
Reconfigurable Intelligent Surfaces (RISs), Millimeter Waves (mmWaves), Device to Device (D2D) Communication, RIS Deployment, Energy-efficiency, Group Selection.

I introduction

Due to the exponential increase in the number of users and the demand for a high data rate, there is a heavy crisis in bandwidth [1]. Device-to-device (D2D) [2] communication is one of the prominent solutions for this need. In D2D communication, two proximity users can directly communicate with each other without the help of a base station. Note that we can deliver a high data rate over a limited distance in millimeter waves (mmWaves) D2D communication [3]. However, in mmWaves D2D communication, penetration loss is very high due to the presence of randomly located obstacles and trees [4]. In this context, over the past few decades, technologies called beamforming have been developed to address this need for increased data rates [5]. Regardless of the technical details, the common goal of all of them is to intelligently adapt to the randomly fluctuating wireless channel rather than to control it. Therefore, the so-called reconfigurable intelligent surface (RIS)[6] is a novel technology that claims to solve this problem. An RIS consists of an array of reconfigurable passive elements embedded in a flat metasurface [7]. Every passive element contains a series of embedded PIN diodes that may be switched between the ON and OFF states by adjusting the biased voltage using a direct current (DC) input line. RISs can change a propagation environment into a desired form [8]. As RIS reflects an incident signal in a desired direction, it does not need any radio frequency chains. The main aim of using RIS is to give an indirect line-of-sight (LoS) path through RIS to blocked device pairs and it also reduces hardware cost [9]. It is noted that an RIS can be used as an amplify and forward (AF) relay, that is, it reflects all signals with an amplification factor 11 [10]. Since RISs consist of many patches, grouping strategies have been proposed by several works [11, 12, 13] to minimize the significant channel estimation overhead in RIS-assisted systems.

I-A Motivation and Contributions

Nowadays RIS-assisted D2D communication forms a new research direction [14, 15, 16], and the majority of recent research focuses on RIS usage by assuming that RISs are already set up and accessible. There are few works of RIS deployment strategy and most of them deployed the RISs considering a single reflection, i.e., for RIS deployment, they considered that a device can communicate with another one via a single RIS. In practice, the secondary reflections are not insignificant, especially in metropolitan settings where the RISs are not widely dispersed [17, 18]. Therefore, in a few cases, double reflections can be impactful when a single reflection are insufficient for RIS-assisted communication. Additionally, by allowing double reflections, we can serve more obstructed device pairs without deploying more RIS. As a result, if we allow two or more consecutive RIS-assisted communications, using less number of RISs, we can get more coverage as well as sum throughput. In this work, we ignored the role of triple and higher order reflections due to significant effective path loss [17]. Here, we employ RISs to create an indirect LoS link between a transmitter and receiver pair in order to establish communication when there is no direct LoS link between them. After deploying the RISs, if a device pair wants to communicate with each other, multiple RIS may be available to assist their communication. Note that a subgroup may provide more energy-efficiency than the entire RIS [19]. Therefore, without using a full RIS, we select a specific energy-efficient subgroup for information transfer among all the available RISs. Our contribution is as follows.

  • By dividing the service area into regions, we model the environment by determining which places or regions are obscured from one another’s view by the known obstructions. If a pair of devices lie in two zones such that their LoS link is obstructed then we term them a blind pair. In this typical scenario, our proposed RIS deployment strategy helps to connect these blind pairs by forming an indirect LoS link via reflections from RISs. It identifies the blind pairs, determines candidate locations for RIS deployment and finally selects the exact locations based on a set cover formulation.

  • We observe that, it may not be possible to provide an indirect LoS via a single RIS reflections for a few device pairs due to the obstacles’s shape and density. In this case, it is possible to provide an indirect LoS via secondary reflections. Our RIS deployment strategy uses both single and double reflections to cover more blind pairs using less number of RISs.

  • Each RIS is divided into a number of non-overlapping subgroups to avoid the channel estimation overhead. After the RISs deployment, we propose an energy-efficient algorithm to find out the appropriate subgroups of an RIS to achieve higher sum throughput.

  • We have mathematically proved that in some specific scenarios, double reflections are more energy-efficient than single reflection, which is quite counter-intuitive.

Simulation results demonstrate that our proposed strategy can increase sum throughput significantly and reduce the number of overall RIS deployments in comparison to a random [14] as well as a recent deployment strategy [9].

This paper is organized as follows. In Section II, we have introduced the related and existing works. We have discussed the system model and preliminaries in Section III. The problem formulation is discussed in Section IV. RIS deployment strategy, the group selection strategy, and their analysis are discussed in Section V. Thereafter, in section VI, we have discussed the simulation results and compared this with the existing placement strategies. Finally, in Section VII, we give concluding remarks and the future direction of research.

II Related Work

Numerous recent studies have examined the effects and advantages of RISs in mmWaves D2D communication. The authors in [15] focuses on the uplink of an RIS-assisted D2D-enabled cellular network. Additionally, in [3], the authors discussed the utilization of high-frequency signals like mmWaves to achieve the goal of producing high-speed data rates for short-distance communication. Due to the randomly located obstacles, there is a heavy path loss in mmWaves wireless communication. As a result, if a direct LoS link between a device pair does not exist, we need to bypass the signal. The signals can be bypassed using a single reflection via one RIS or reflections via more than one consecutive RISs. Therefore, RIS-assisted communication is one of the ways to achieve a indirect LoS link between a obstructed device pair [20, 21].

The authors in [9] have provided simulation evidence on how locating RISs near users enhances performance but they have not given any placement strategy for double reflections. In [22], the authors exploit the randomly located obstacles for RIS deployment. But, after RIS deployment, there are still many device pairs that can not communicate with each other and there is a placement strategy in [23] which tries to provide indirect LoS to them using single reflections only. In a single base station and single-user downlink network, the authors of [9] have developed an RIS placement optimization issue to optimize the cell coverage by optimizing the RIS orientation and horizontal distance. A placement strategy using the set cover approach for single RIS-assisted communication has been described in [24]. Note that all the above-mentioned RIS placement strategies are applicable to single RIS-assisted communication. However, the work in [17] shows that the multi-RIS secondary reflections may be used to considerably increase the communication’s range by properly tuning the RISs. In order to increase the data rate, the authors in [15] used the ability of the RISs to change the phase shifts of the elements and provide advantageous beam steering. Assuming that the RISs are already deployed, the authors of [19] have demonstrated that both single- and double-reflected RISs significantly affect multi-hop RIS-assisted communication.

It is clear that RISs are put to innovative use in a variety of ways to improve the caliber of wireless communication services. More specifically, in a D2D communication context, RISs are used to reduce blind pairs, eliminate interferences, and avoid obstacles. However, most of the recent studies assume that the RISs are already deployed randomly [14] or strategically in single-reflected RIS communications [9, 25]. Also in the multi-hop scenario, where secondary reflections are allowed, they assumed that RISs are already deployed. Furthermore, for a large RIS, we have to compute a huge number of channel estimations. As a result, the authors in [13] and [26] discussed a novel RIS grouping strategy to reduce the channel estimation overhead. The study in [17] and [27] examines how RISs can improve energy-efficiency in mmWaves D2D communication. Moreover, wireless communication is greatly impacted by the strategic placement of RISs where double reflections are allowed. Our goal in this work is to strategically position a minimum number of RISs considering both single and double reflections, and select an energy-efficient subgroup to improve network performance.

III System Model and Preliminaries

III-A Network Topology

Consider a wireless communication system that operates in a rectangular area that is partitioned into small squares or grids of unit size which is shown in Fig 1. The rectangular area consists of MM rows and NN columns. We assume that each unit square grid is identical with respect to their center and we also assume that the center of the leftmost corner square is the origin. It is noted that the device that will operate in this setting will have highly directed antennas. The position of a user is approximated to the center of the grid within which it lies. We assume that a device can communicate with another device directly if there is a LoS link between them and they are within a threshold distance rr.

Now, we are presenting a few definitions below which will be used throughout our discussion.

Definition III.1 (Direct LoS link).

If there is no blockage between two users uu and vv and they are within a distance rr then the link between them is called a direct LoS link [22].

Definition III.2 (Blind pair).

A device pair (u,v)(u,v) lies within a distance rr is said to be a blind pair if there is no direct LoS link between them.

Definition III.3 (single reflection).

A device pair (u,v)(u,v) is said to be coverable via single reflection if there is no direct LoS link between uu and vv but they are connected via an intermediate RIS, i.e., there is a direct LoS link between uu to an RIS and that RIS to vv.

Definition III.4 (Double reflections).

The device pair (u,v)(u,v) lie within a distance rr is said to be coverable via double reflections if uu and vv can communicate with each other in two-hop using two consecutive RISs RiR_{i} and RjR_{j}, i.e., there is a direct LoS link between uu to RiR_{i}, RiR_{i} to RjR_{j}, and RjR_{j} to vv, respectively.

Definition III.5 (Coverable blind pairs).

If a device pair (u,v)(u,v) is coverable via single reflection or double reflections or both of them, then it is considered as a coverable blind pair, else it is called a totally blind pair.

III-B User Characteristic

We consider all the devices in this communication scenario to be pseudo-stationary [28], i.e., during communication time, a device does not move outside the grid. We also assume that a device follows any mobility model within a grid at any time instance. However, we presume that a device’s location in a unit grid is roughly determined by the grid’s center. It is noted that if we consider a device is within a grid that means it lies at the center of the grid.

Refer to caption
Figure 1: Grid and obstacle model

III-C Obstacle Characteristic

Here, we position the obstacle inside the grids following the acquisition of the satellite images. We assume that the satellite images give the proper position of the obstacles. In Fig. 1, we consider that the black cells represent the location of the obstacles. We assume that, if a grid/cell is blocked, it means the whole cell is blocked and there will not be any partially block cells. Multiples of these blocked zones combine to build a polygon that closely resembles the shape and size of the obstruction. Within a blocked cell, a device can not lie, i.e., a device can lie only within the free cells. It is noted that an RIS can not be placed within a blocked cell, it will be strategically placed on poles in the free cells.

III-D RIS Grouping

Obstacles prevent a device pair from directly communicating with one another. Therefore, to provide an indirect LoS between them, we use single and double reflections via one and two consecutive RISs. Let us assume that an RIS RiR_{i} consists of MrM_{r} rows and NrN_{r} columns which are effectively controlled to adjust both the amplitude and phase of the incident waveform. However, only the phase is tuned or optimized, and the amplitude factor is fixed to unity for the purposes of simplicity and mathematical tractability [13]. We use a grouping approach in order to minimize the channel estimation overhead [12]. Furthermore, for a large RIS, the phase shift computation is hard, and a minimum energy is required for each phase shift. Therefore, we divide RiR_{i} into KgK_{g} number of non-overlapping subgroups RitR^{t}_{i} to minimize the energy consumption where 1tKg1\leq t\leq K_{g}, and each RitR^{t}_{i} consists of Ng×NgN_{g}\times N_{g} number of patches, i.e, Kg×Ng×Ng=Mr×NrK_{g}\times N_{g}\times N_{g}=M_{r}\times N_{r}. It is noted that the number of partitions and the ensuing sub-surfaces are decided upon beforehand [13], and each subgroup is capable of providing a desired throughput. In this scenario, RitR^{t}_{i} can be in one of two states: ON or OFF. An incident signal’s phase can be altered to a desired direction when an element is in the ON state; when it is in the OFF state, it cannot reflect [13]. Here, we use one particular subgroup instead of using total RIS, and we also assume that a subgroup can serve a single request at a particular instant [29]. Our objective is to select the energy-efficient subgroups for information transfer.

III-E Channel Model

In this communication scenario, let there be ndn_{d} number of devices that lie within the free zones. We assume that any two devices uu and vv want to communicate with each other and they lie within the free zone z1z_{1} and z2z_{2}, respectively. Now, depending on the position of the obstacles, uu and vv can communicate in three different ways as follows: (i) directly, uu and vv can communicate directly if there is no obstacle in between them, i.e., there is a LoS link between them. (ii) via single reflection, and (iii) via double reflections. We suppose that the wireless link experiences both small-scale block fading and large-scale path loss effects. The direct channel from uu to vv exhibits small-scale fading and their corresponding path loss factor is ρL12duvα2\rho_{L}^{\frac{1}{2}}d^{-\frac{\alpha}{2}}_{uv}, where ρL\rho_{L} is the path loss at one meter distance, α\alpha is the path loss exponent and duvd_{uv} denote the distance between uu and vv.

We also assume that each group RitR^{t}_{i} of an RIS RiR_{i} consists of Ng×NgN_{g}\times N_{g} number of elements. Let 𝐡uRitNg×1,𝐡RitRjsNg×Ng\mathbf{h}_{uR^{t}_{i}}\in\mathbb{C}^{N_{g}\times 1},\mathbf{h}_{R^{t}_{i}R^{s}_{j}}\in\mathbb{C}^{N_{g}\times N_{g}} and 𝐡Rit/Rjsv1×Ng\mathbf{h}_{R^{t}_{i}/R^{s}_{j}v}\in\mathbb{C}^{1\times N_{g}} be the channel matrix from uu to RitR^{t}_{i}, RitR^{t}_{i} to RjsR^{s}_{j} and, Rit/RjsR^{t}_{i}/R^{s}_{j} to vv, respectively. Note that, unlike the conventional RIS-based approach, the grouping-based approach does not involve a diagonal phase shift matrix of non-zero Ng×NgN_{g}\times N_{g} elements [13]. A common phase shift is applied on the incoming signals, and the product of each point-to-point link determines the total path loss for each of these channel matrices [17]. As a result, the effective channel gain for single and double reflection is given by 𝐡Ritv𝐡uRit×ejϕi,t\mathbf{h}_{R^{t}_{i}v}\mathbf{h}_{uR^{t}_{i}}\times e^{j\phi_{i,t}} and 𝐡Rjs𝐡RitRjs𝐡uRit×ej(ϕi,t+ϕj,s)\mathbf{h}_{R^{s}_{j}}\mathbf{h}_{R^{t}_{i}R^{s}_{j}}\mathbf{h}_{uR^{t}_{i}}\times e^{j(\phi_{i,t}+\phi_{j,s})}, where ejϕi,te^{j\phi_{i,t}} and ejϕj,se^{j\phi_{j,s}} are the common phase shift of RitR^{t}_{i} and RjsR^{s}_{j}, respectively.

III-F Throughput Computation

Here we define a metric, data rate that will be used to quantify the performance of our proposed strategy. Here we assume orthogonal frequency-division multiplexing (OFDM) [30] is used in our communication scenario. Let PP be the transmitted power, then the signal-to-noise-ratio (SNR) at the receiver for single RIS-assisted communication is

γsr=PρL2dRitvαduRitασ2|𝐡Ritv×𝐡uRit×ejϕi,t|2,\gamma_{\rm sr}=\frac{P\rho_{\rm L}^{2}d_{R^{t}_{i}v}^{-\alpha}d_{uR^{t}_{i}}^{-\alpha}}{{\sigma^{2}}}\Big{|}\mathbf{h}_{R^{t}_{i}v}\times\mathbf{h}_{uR^{t}_{i}}\times e^{j\phi_{i,t}}\Big{|}^{2}, (1)

and SNR for double RISs reflected communication is

γdr=PρL3dRjsvαduRitαdRitRjsασ2|𝐡Rjs×𝐡RitRjs×𝐡uRit×ej(ϕi,t+ϕj,s)|2,\gamma_{\rm dr}=\frac{P\rho_{\rm L}^{3}d_{R^{s}_{j}v}^{-\alpha}d_{uR^{t}_{i}}^{-\alpha}d_{R^{t}_{i}R^{s}_{j}}^{-\alpha}}{\sigma^{2}}\Big{|}\mathbf{h}_{R^{s}_{j}}\times\mathbf{h}_{R^{t}_{i}R^{s}_{j}}\times\mathbf{h}_{uR^{t}_{i}}\times e^{j(\phi_{i,t}+\phi_{j,s})}\Big{|}^{2}, (2)

where σ2\sigma^{2} is the variance of the circularly symmetric zero mean additive white Gaussian noise. Note that, we adjust the common phase shift of (1) and (2) to attain the optimal SNR. Therefore, from Shannon’s capacity formula, we can get the throughput R(γ)=log(1+γsr/dr)R(\gamma)=\log(1+\gamma_{\rm{sr/dr}}). Hence, by calculating the throughput we can compare the performances.

III-G Energy Efficiency

Here, we define the energy efficiency metric (Eeff)(\rm E_{eff}) [19], which will be used to measure how well our suggested approach performs. Let R(γ)R(\gamma) be the throughput obtained at the receiver end. Additionally, it requires a total Eci\rm E^{i}_{c} amount of energy for information transfer via a single RIS RiR_{i}, where

Eci=β×ϕ×1Ri(γ)×(P+Pphase(Ri)).{\rm E^{i}_{c}}=\beta\times\phi\times\frac{1}{R_{i}(\gamma)}\times\Big{(}P+P_{\rm{phase}}(R_{i})\Big{)}. (3)

For two consecutive RIS (RiR_{i} and RjR_{j}) assisted communication the total energy consumption is denoted by Eci,j\rm E^{i,j}_{c} where

Eci,j=βϕRi,j(γ)(P+Pphase(Ri)+Pphase(Rj)),{\rm E^{i,j}_{c}}=\frac{\beta\phi}{R_{i,j}(\gamma)}\Big{(}P+P_{\rm phase}(R_{i})+P_{\rm phase}(R_{j})\Big{)}, (4)

β\beta is the number of packets each with ϕ\phi bits, PP is the transmitted power, and Pphase(Ri)P_{\rm phase}(R_{i}) is phase shift power for RIS RiR_{i}.

Therefore, energy efficiency for single reflection and double reflections are defined by

Eeffi=Ri(γ)EciandEeffi,j=Ri,j(γ)Eci,j{\rm E^{i}_{eff}}=\frac{R_{i}(\gamma)}{\rm E^{i}_{c}}\quad\text{and}\quad{\rm E^{i,j}_{eff}}=\frac{R_{i,j}(\gamma)}{\rm E^{i,j}_{c}} (5)

respectively. Moreover, we use this metric to select an appropriate subgroup for the information transfer of each blind pair.

IV Problem Formulation

Our objective is to place the minimum number of RISs in strategic locations and for each information transfer, we aim to find an energy-efficient subgroup for abstracted device pair. Therefore, we formulate the problem and break it down into two separate parts: i) RIS deployment and ii) Group selection. Now we are describing these two parts in detail below:

IV-A RIS Deployment

In the first part, we want to formulate an optimization problem to cover a maximum number of blind pairs using the least number of RISs. Note that we do not consider those device pairs that have direct LoS and are totally blind. Let \mathcal{B} be the set of all coverable blind pairs, i.e., no element of \mathcal{B} remains uncovered after deploying the RISs. Moreover, to formulate the optimization problem, we define a few notations below.

Let ii and jj be two locations and aija_{ij} be an indicating variable that describes the status of having LoS between them, where 1i,jn21\leq i,j\leq n^{2}. That is,

aij={1,dist(i,j)r&LoS between i and j 0,else\displaystyle a_{ij}=\begin{cases}1,&\text{dist}\;(i,j)\leq r\;\&\;\exists\;\;\text{LoS between i and j }\\ 0,&\text{else}\end{cases} (6)

Additionally, let SiS_{i} be the set of all blind pairs covered by an RIS at the ii-th cell. That is,

Si={(p,q):api+aiq=2}i.S_{i}=\Big{\{}(p,q):\;\;\;a_{pi}+a_{iq}=2\Big{\}}\quad\forall\;\;i. (7)

Note that a blind pair of \mathcal{B} may be visible via a single or double reflections. Therefore, we also consider DijD_{ij} as a set of all blind pairs that are coverable via double reflections using two RISs located at ii-th and jj-th cell but not coverable by either ii-th or jj-th RIS via a single reflection. Hence, DijD_{ij} can be represented as

Dij=\displaystyle D_{ij}= {(p,q):(p,j)Si&(i,q)Sj,(p,q)Si,\displaystyle\Big{\{}(p,q):\quad(p,j)\in S_{i}\;\;\&\quad(i,q)\in S_{j},\quad(p,q)\notin S_{i},
(p,q)Sj}i<j.\displaystyle\qquad\quad\quad(p,q)\notin S_{j}\Big{\}}\quad i<j.\vspace{-2mm} (8)

However, we define ZijZ_{ij} as a set of all blind pairs that are coverable via single as well as double reflections using RIS placed at ii-th and jj-th locations. That is,

Zij=SiSjDij,i<j.Z_{ij}=S_{i}\cup S_{j}\cup D_{ij},\;\;\;i<j. (9)

We now introduce the following binary variable:

xi={1,i-th cell is selected for RIS deployment,0,else.\displaystyle x_{i}=\begin{cases}1,&\text{i-th cell is selected for RIS deployment},\\ 0,&\text{else.}\end{cases}

Hence, we formulate the optimization problem as follows:

Minimize\displaystyle{\rm Minimize}\quad i=1n2xi\displaystyle\sum_{i=1}^{n^{2}}x_{i} (10)
such that i,j:ijZijxixj=i<j.\displaystyle\bigcup_{i,j:i\leq j}Z_{ij}x_{i}x_{j}=\mathcal{B}\;\;\forall\;\;i<j. (11)

This integer program can be linearized by using an intermediate binary variable yijy_{ij} as follows:

Minimize\displaystyle{\rm Minimize}\quad i=1n2xi\displaystyle\sum_{i=1}^{n^{2}}x_{i} (12)
such that i,j:ijZijyij=,\displaystyle\bigcup_{i,j:i\leq j}Z_{ij}y_{ij}=\mathcal{B}, (13)
yijxji<j,\displaystyle y_{ij}\leq x_{j}\quad\forall\;\;i<j, (14)
yijxii<j,\displaystyle y_{ij}\leq x_{i}\quad\forall\;\;i<j, (15)
yijxi+xj1i<j.\displaystyle y_{ij}\geq x_{i}+x_{j}-1\quad\forall\;\;i<j. (16)

Note that the above integer linear program (ILP) is nothing but a classical set cover problem which is a well-known NP-hard problem. Therefore, in Section V-A, we present a greedy solution for the RIS deployment problem.

IV-B Group selection

In the second part, for group selection, we assume that RISs have already been deployed. Moreover, we also know which blind pair will be covered by which RISs. Note that, a blind pair may be covered by single as well as double reflections. Hence, for a blind pair, more than one subgroup may be available to complete the information transfer. However, we allow a single subgroup for information transfer because of the scenario of energy constraints. Therefore, our primary objective is to identify a specific energy-efficient subgroup for each blind pair. Let us assume that there are nbn_{b} number of blind pairs, and RR number of RISs are deployed in the surroundings and each of them is subdivided into ll number of subgroups. Let Gis\rm G^{s}_{i} be the set of all subgroups that can provide an indirect LoS link to the ii-th blind pair via single reflection. Hence, we can represent Gis\rm G^{s}_{i} as

Gis={Rjk:i-th pair is visible via k-th subgroup of RIS Rj}.{\rm G^{s}_{i}}=\Big{\{}R^{k}_{j}\;\;:\text{$i$-th pair is visible via $k$-th subgroup of RIS $R_{j}$}\Big{\}}.

Similarly, let Gid\rm G^{d}_{i} be the set of all subgroups that can provide an indirect LoS link to the ii-th blind pair via double reflections. That is,

Gid=\displaystyle{\rm G^{d}_{i}}= {Rl,mp,q:i-th pair is visible via p-th subgroup\displaystyle\Big{\{}R^{p,q}_{l,m}\;\;:\text{$i$-th pair is visible via $p$-th subgroup}
of RIS Rl & q-th subgroup of RIS Rm}.\displaystyle\text{of RIS $R_{l}$ \& $q$-th subgroup of RIS $R_{m}$}\Big{\}}.

Hence, if a blind pair is visible by single reflection, our problem is to find a more energy-efficient subgroup RjkR^{k^{*}}_{j^{*}} from Gis\rm G^{s}_{i} such that

Eeffk(j)=argmax(Eeffk(j)).{\rm E^{k^{*}}_{eff}}\big{(}j^{*}\big{)}=\operatorname*{arg\,max}\Big{(}{\rm E^{k}_{eff}}\big{(}j\big{)}\Big{)}.\vspace{-2mm}
1
Input : L,ziZ,(u,v)L,z_{i}\in Z,(u,v)
Output : Visible or not
2 Join uziuz_{i} and zivz_{i}v
3 if uzizivuz_{i}\|z_{i}v intersectatleastonelinesegmentofL{\rm intersect\>\>at\>\>least\>\>one\>\>line\>\>segment\>\>of\>\>L} then
4      not visible via ziz_{i}
5 else
6      visible via ziz_{i}
7 end if
Algorithm 1 Visibility Algorithm

If a blind pair is visible via double reflections, we select Rl,mp,qR^{p^{*},q^{*}}_{l^{*},m^{*}} as energy-efficient subgroups from Gid\rm G^{d}_{i} such that

Eeffp,q(l,m)=argmax(Eeffp,q(l,m)).{\rm E^{p^{*},q^{*}}_{eff}}\big{(}l^{*},m^{*}\big{)}=\operatorname*{arg\,max}\Big{(}{\rm E^{p,q}_{eff}}\big{(}l,m\big{)}\Big{)}.

Note that if a blind pair is visible via single as well as double reflections, we will select the more energy-efficient case for them. In Section. V-B, we have discussed the group selection strategy in detail.

V Proposed Strategy

In this section, we discuss the RIS deployment and group selection strategy by considering both single and double reflections. Accordingly, we divide this section into two parts: i) RIS deployment strategy and ii) Group selection criteria. In the first part, we propose a greedy deployment strategy, and in the second part, we investigate an energy-efficient group selection criteria.

V-A Proposed RIS Deployment Strategy

In our proposed RIS deployment strategy, we first identify which blind pairs are present in the surroundings. After identifying the blind pairs, we will find the candidate locations for RIS deployment, and finally select the candidate locations for final deployment. All these steps are now discussed in detail below.

V-A1 Blind Pairs Identification

Let there be non_{o} number of obstacles and ndn_{d} number of device pairs in a region, whose locations are known. We assume that the sides of an obstacle are formed by line segments and LL is the set of all line segments of non_{o} obstacles. Additionally, we assume that a device pair (u,v)(u,v) can communicate with each other if they reside within rr distance. Let ZZ be the set of all free cells. Algorithm 1 finds whether a device pair (u,v)(u,v) is visible via a free cell ziZz_{i}\in Z or not. Here, we aim to find all the blind pairs in a region. To achieve this, we first find the set of all device pairs that may be obstructed by a particular obstacle. Finally, continuing this process for all obstacles, we get the set of all blind pairs, which is described below.

1
Input : Li,DL_{i},\;\;D
Output : BB
2 Initialize: B=ϕB=\phi;
3 for i{1,,no}i\in\{1,\cdots,n_{o}\} do
4       Bi=ϕ,Di=ϕB_{i}=\phi,\;D_{i}=\phi;
5       for (ut,vt)(u^{t},v^{t}) in DD do
6             if ximinruxt,vxtximax+randyiminruyt,vytyimax+rx^{\min}_{i}-r\leq u^{t}_{x},v^{t}_{x}\leq x^{\max}_{i}+r\;\;\text{and}\;\;y^{\min}_{i}-r\leq u^{t}_{y},v^{t}_{y}\leq y^{\max}_{i}+r then
7                  Di=Di{(ut,vt)}D_{i}=D_{i}\cup\{(u^{t},v^{t})\}
8             end if
9            
10       end for
11      for (ut,vt)(u^{t},v^{t}) in DiD_{i} do
12             for lLil\in L_{i} do
13                   if ll intersect utvtu^{t}v^{t} then
14                         Bi=Bi{(ut,vt)}B_{i}=B_{i}\cup\{(u^{t},v^{t})\}
15                         Break;
16                   end if
17                  
18             end for
19            
20       end for
21      B=BBiB=B\cup B_{i}
22 end for
23Return BB
Algorithm 2 Blind Pairs Identification Algorithm

Let OiO_{i} be the ii-th obstacle, LiL_{i} be the set of all line segments that constitute OiO_{i}, and

Ci={(xt,yt):t=1,ni}C_{i}=\Big{\{}(x_{t},y_{t}):\;\;\;t=1,\cdots n_{i}\Big{\}} (17)

denote the set of all nin_{i} vertices of OiO_{i}. Therefore, let

ximax=max{xt:t=1,ni},\displaystyle x^{\max}_{i}=\max\big{\{}x_{t}:\;\;\;t=1,\cdots n_{i}\big{\}},\>\>
ximin=min{xt:t=1,ni},\displaystyle x^{\min}_{i}=\min\big{\{}x_{t}:\;\;\;t=1,\cdots n_{i}\big{\}},
yimax=max{yt:t=1,ni},\displaystyle y^{\max}_{i}=\max\big{\{}y_{t}:\;\;\;t=1,\cdots n_{i}\big{\}},
yimin=min{yt:t=1,ni}\displaystyle\>\>y^{\min}_{i}=\min\big{\{}y_{t}:\;\;\;t=1,\cdots n_{i}\big{\}}\vspace{-4mm}

be the maximum and minimum xx-coordinate and yy-coordinate of the vertices of OiO_{i}, respectively. Let

D\displaystyle D ={(ut,vt):t=1,,nd}\displaystyle=\Big{\{}(u^{t},v^{t})\;:\;\;\;t=1,\cdots,n_{d}\Big{\}}
={((uxt,uyt),(vxt,vyt)):t=1,,nd}\displaystyle=\Big{\{}((u^{t}_{x},u^{t}_{y}),(v^{t}_{x},v^{t}_{y})):\;\;\;t=1,\cdots,n_{d}\Big{\}}\vspace{-3mm}

be the set of xx and yy coordinates of all the device pairs. Let DiD_{i} be the set of device pairs that could potentially be obstructed by OiO_{i}. That is,

Di={(ut,vt)\displaystyle D_{i}=\Big{\{}(u^{t},v^{t}) D:ximinruxt,vxtximax+r,\displaystyle\in D\;\;:\;\;x^{\min}_{i}-r\leq u^{t}_{x},v^{t}_{x}\leq x^{\max}_{i}+r,
yiminruyt,vytyimax+r}.\displaystyle\;\;y^{\min}_{i}-r\leq u^{t}_{y},v^{t}_{y}\leq y^{\max}_{i}+r\Big{\}}.\vspace{-2mm} (18)

Let BiB_{i} be a set of all blind pairs that could potentially be obstructed by OiO_{i}. That is,

Bi={(ut,vt)Di:\displaystyle B_{i}=\Big{\{}(u^{t},v^{t})\in D_{i}\;\;: utvtu^{t}v^{t} intersect at least
one line segment ofLi}.\displaystyle\text{ one line segment of}\;L_{i}\Big{\}}.\vspace{-2mm} (19)

Continuing this process, for each obstacle, we can compute the set BB of all blind pairs as follows:

B=B1B2Bno=i=1noBiB=B_{1}\cup B_{2}\cup\cdots\cup B_{n_{o}}=\bigcup\limits_{i=1}^{n_{o}}B_{i}\vspace{-2mm} (20)

The complete process of blind pair identification is shown in Algorithm 2. Note that our main motivation is to serve a maximum number of blind pairs using indirect LoS via single or double reflections. In this context, we use a novel technique to find out the candidate zones for RIS deployment below.

V-A2 Finding Candidate Locations for RIS Deployment

Our goal is to find the candidate locations for RIS deployment such that we can serve a maximum number of blind pairs with fewer RISs. Since the grid consists of 𝐌\mathbf{M} rows and 𝐍\mathbf{N} columns, there are 𝐌×𝐍\mathbf{M}\times\mathbf{N} zones in the grid. Out of 𝐌𝐍\mathbf{M}\mathbf{N} zones, few are covered by obstacles, and the remaining are obstacle-free zones. Let there be pp free zones where p<𝐌𝐍p<\mathbf{M}\mathbf{N} and ZZ be the set of all free zones. That is,

Z={zi:i=1,2,,p},Z=\Big{\{}z_{i}:i=1,2,\cdots,p\Big{\}},\vspace{-1mm} (21)

where ziz_{i} denotes the ii-th free zone.

Let AiA_{i} be the set of all blind pairs that are visible via ziz_{i}, i.e., for blind pair (u,v)Ai(u,v)\in A_{i} there is a direct LoS between uu to ziz_{i} and ziz_{i} to vv. Additionally, we denote the cardinality of AiA_{i} as card(Ai)card(A_{i}). Let AA be an array of pp elements whose ii-th element represents the cardinality of AiA_{i}, i.e., card(Ai)card(A_{i}). Let max(A)\max(A) be the maximum element of AA, and tt be the corresponding index of max(A)\max(A) in the array AA. Therefore, ztz_{t} is the corresponding zone from where the maximum number of blind pairs can be served. Hence, we select ztz_{t} as the first candidate location for RIS deployment and AtA_{t} be the set of all blind pairs that are visible via ztz_{t}. Here we rename the set AtA_{t} as A1mA^{m}_{1} and ztz_{t} as zc1z_{c}^{1}. Therefore, after finding the initial RIS location, let Brem1B^{1}_{rem} represent the set of all the remaining blind pairs, i.e.,

Brem1=BA1m=(A1m)c,B^{1}_{rem}=B\setminus A^{m}_{1}=\big{(}A_{1}^{m}\big{)}^{c},\vspace{-2mm} (22)

where XcX^{c} denotes the complement of the set XX.

After fixing the first candidate location zc1z_{c}^{1}, the remaining blind pairs may be visible via i)\rm i) single reflection or ii)\rm ii) double reflections. In particular, the remaining blind pairs in Brem1B^{1}_{rem} may be visible via single reflection using any free cell other than zc1z_{c}^{1}, or via double reflections using zc1z_{c}^{1} plus one of the remaining free cells. Therefore, we select that free cell as a second candidate location for RIS deployment from where the maximum elements of Brem1B^{1}_{rem} will be served using single or double reflections. Let us denote zc2z_{c}^{2} as the second candidate zone for RIS deployment, and Brem2B^{2}_{rem} as the set of remaining blind pairs. In a similar way, we can find out the other candidate locations. Therefore, after finding the kk-th candidate location, the remaining set of blind pairs is given by

Bremk=(A1mA2mAk1mAkm)c=Bremk1AkmB^{k}_{rem}=\Big{(}A^{m}_{1}\cup A^{m}_{2}\cdots\cup A^{m}_{k-1}\cup A^{m}_{k}\Big{)}^{c}=B^{k-1}_{rem}\setminus A^{m}_{k}\vspace{-1mm} (23)

where AkmA^{m}_{k} is the set of all blind pairs that are served by the kk-th candidate location, and Bremk1B^{k-1}_{rem} is the set of all remaining blind pairs before finding the kk-th candidate location and the process will stop if Bremk=Bremk1B^{k}_{rem}=B^{k-1}_{rem} or Bremk=ϕB^{k}_{rem}=\phi. Finally, we receive the set ZcZ_{c} of all candidate zones from where we can cover the greatest number of blind pairs. The RISs will actually be placed at the center of each free zone ziZcz_{i}\in Z_{c}. The proposed strategy is described in Fig. 2.

Complexity of the proposed algorithm

Let there be pp free cells and |B||B| many blind pairs. According to our proposed strategy, for selecting the first RIS location, we consider each free cell and compute the number of blind pairs that can be served by it using single reflection only. This requires p|B|p|B| complexity. Next, for finding the k-th RIS location (k2k\geq 2), we consider each of the remaining (pk+1)(p-k+1) free cells and compute how many blind pairs can be covered by it using single as well as double reflections. This requires (pk+1)|B|+(k1)(pk+1)|B|+(k12)|B|(p-k+1)|B|+(k-1)(p-k+1)|B|+{k-1\choose 2}|B| complexity. Hence, the worst case complexity of the proposed algorithm is O(p2|B|)O(p^{2}|B|).

From the above discussion and observation, we get the following remarks.

Refer to caption
Figure 2: Proposed strategy for finding candidate locations
Remark 1.

If BremkϕB^{k}_{rem}\neq\phi and Bremk=Bremk1B^{k}_{rem}=B^{k-1}_{rem} holds then Bun=BremkB_{un}=B^{k}_{rem} is the total number of uncovered blind pairs. That is, Bun=(A1mA2mAk1mAkm)cB_{un}=\Big{(}A^{m}_{1}\cup A^{m}_{2}\cdots\cup A^{m}_{k-1}\cup A^{m}_{k}\Big{)}^{c}.

Remark 2.

If only kk number of RISs are allowed to deploy then the total number of blind pairs that can be served is given by (Brem1Brem2Bremk)c=BBremk\Big{(}B^{1}_{rem}\cap B^{2}_{rem}\cap\cdots\cap B^{k}_{rem}\Big{)}^{c}=B\setminus B^{k}_{rem}.

Remark 3.

In a particular scenario, if no blind pair is visible via double reflections, then our proposed strategy will be converted into the RIS deployment strategy for single reflection.

Below, we have illustrated the proposed RIS deployment strategy using an example.

V-A3 Illustrative Example of the Proposed Deployment Strategy

A specific scenario of our proposed strategy is demonstrated in Fig. 3. Here we consider a grid that consists of four rows and four columns. As this grid consists of sixteen cells, we label these cells from 11 to 1616. Moreover, we assume that the obstacles are located in the black cells, which correspond to the cell numbers 3,103,10, and 1414. We also consider that a device can lie only within a free cell. Here, {1,2,4,5,6,7,8,9,11,12,13,15,16}\{1,2,4,5,6,7,8,9,11,12,13,15,16\} is the set of all free cells. Here, we assume that each pair of cells is within rr distance apart from each other. Therefore, in this communication environment,

B={\displaystyle B=\{ (1,4),(1,8),(1,11),(1,15),(1,16),(2,4),(2,7),(2,8),\displaystyle(1,4),(1,8),(1,11),(1,15),(1,16),(2,4),(2,7),(2,8),
(2,13),(2,12),(2,15),(4,5),(4,6),(4,7),(4,9),(4,13),\displaystyle(2,13),(2,12),(2,15),(4,5),(4,6),(4,7),(4,9),(4,13),
(5,12),(5,11),(5,15),(5,16),(6,9),(6,13),(6,11),\displaystyle(5,12),(5,11),(5,15),(5,16),(6,9),(6,13),(6,11),
(6,15),(6,16),(7,9),(7,13),(8,9),(8,13),(9,11),\displaystyle(6,15),(6,16),(7,9),(7,13),(8,9),(8,13),(9,11),
(9,12),(9,15),(9,16),(11,13),(12,13),\displaystyle(9,12),(9,15),(9,16),(11,13),(12,13),
(13,15),(13,16)}\displaystyle(13,15),(13,16)\}\vspace{-4mm}

is the complete set of all the blind pairs. Specifically, there is no direct LoS link between any device pair of BB. As obstacles block the direct LoS of the blind pairs, RISs can be strategically deployed to provide an indirect LoS link. It can be observed that each of the blind pairs in {(4,9),(4,13),(9,15),(11,13),(12,13),(13,15),(13,16)}\big{\{}(4,9),(4,13),(9,15),(11,13),(12,13),(13,15),(13,16)\big{\}} can not be covered via single reflection, even if we deploy RISs in all the free cells. However, in our proposed strategy, we can serve more blind pairs using double reflections along with the single reflection. It can be observed that maximum number of blind pairs can be served by placing an RIS at cell 1212. Thus, our strategy will choose cell 1212 as the first RIS location. Also, note that cells 11 and 1212 together can serve all the remaining blind pairs using single and double reflections. That is, according to our proposed strategy, {1,12}\big{\{}1,12\big{\}} will be the set of locations for RIS deployment.

Refer to caption
Figure 3: Example of a communication environment

In Subsection V-B, we will address which subgroup of an RIS will be selected for information transformation.

V-B Group Selection Criteria

In section IV above, we have strategically found RR, the set of all deployed RISs, and the set of all coverable blind pairs =BBun\mathcal{B}=B\setminus B_{un}. A blind pair (u,v)(u,v)\in\mathcal{B} can be covered in three different ways: i) via only single reflection ii) via only double reflections, and iii) via both single and double reflections. Since energy consumption is a very important parameter in wireless communication scenarios, we discuss in the following the process to find the energy-efficient group considering the above-mentioned three cases.

V-B1 Energy-efficient Subgroup Selection for Single Reflection

In this case, uu sends all the packets to vv using one subgroup of an RIS as an intermediate reflector. Let Su,vS_{u,v} be the set of RISs each of which can provide indirect LoS between uu and vv via single reflection. That is, Su,v={Ri:Riis visible from bothS_{u,v}=\{R_{i}:\;\;R_{i}\;\text{is visible from both}\;uandv}\;\text{and}\;v\}. Since each RIS is partitioned into kk non-overlapping subgroups, different subgroups may provide different data rates. In this context, from subsection III-G, the required energy Ec(i)\rm E_{c}(i) for information transfer from uu to vv using ii-th subgroup of ss-th RIS is given by

Ecs(i)=β×ϕ×1Rsi(γ)×(P+Pphase(Rsi)),{\rm E^{s}_{c}}(i)=\beta\times\phi\times\frac{1}{R^{i}_{s}(\gamma)}\times\Big{(}P+P_{\rm phase}(R^{i}_{s})\Big{)},\vspace{-2mm} (24)

where Pphase(Rsi)P_{\rm phase}(R^{i}_{s}) is the phase shift power of ii-th subgroup of RsR_{s}.

Therefore, the energy-efficiency Eeffs(i){\rm E^{s}_{eff}}(i) for a particular (u,v)(u,v) pair using ii-th subgroup is

Eeffs(i)=Rsi(γ)Ecs(i).{\rm E^{s}_{eff}}(i)=\frac{R^{i}_{s}(\gamma)}{{\rm E^{s}_{c}}(i)}.\vspace{-2mm} (25)

Now, we form an optimization problem to select an energy-efficient subgroup as below:

max\displaystyle\max\quad Eeffs(i)\displaystyle{\rm E^{s}_{eff}}(i) (26)
s.t. Rsi(γ)Rth,i=1,kandsSu,v,\displaystyle R^{i}_{s}(\gamma)\geq R_{th},\;i=1,\cdots k\;\;\text{and}\;\;s\in S_{u,v}, (27)
Ecs(i)>0i=1,kandsSu,v,\displaystyle{\rm E^{s}_{c}}(i)>0\;\;\;\;i=1,\cdots k\;\;\text{and}\;\;s\in S_{u,v},\vspace{-3mm} (28)

where RthR_{th} is a predefined threshold.

1
Input : R,(u,v)R,(u,v)
Output : Rsi,Ri,jl,mR^{i^{*}}_{s^{*}},R^{l^{*},m^{*}}_{i^{*},j^{*}}
2 % single reflection
3 for sRs\in R do
4       if (u,v)(u,v) visible via RsR_{s} then
5             for iRsi\in R_{s} do
6                  compute Eeffs(i){\rm E^{s}_{eff}}(i)
7             end for
8            
9            Eeffs(i)=argmax(Eeffs(i)){\rm E^{s^{*}}_{eff}}\big{(}i^{*}\big{)}=\operatorname*{arg\,max}\Big{(}{\rm E^{s}_{eff}}\big{(}i\big{)}\Big{)}
10       else
11            Eeffs(i)=0{\rm E^{s^{*}}_{eff}}\big{(}i^{*}\big{)}=0
12       end if
13      
14 end for
15% Double Reflections
16 for iRi\in R do
17       for jRj\in R do
18             if (u,v)(u,v) visible via RiR_{i} and RjR_{j} then
19                   for lRil\in R_{i} do
20                         for mRjm\in R_{j} do
21                               if (u,v)(u,v) visible via RilR^{l}_{i} and RjmR^{m}_{j} then
22                                    Compute Eeffi,j(l,m){\rm E^{i,j}_{eff}}{\big{(}l,m\big{)}}
23                               end if
24                              
25                         end for
26                        
27                   end for
28                  Eeffi,j(l,m)=argmax(Eeffi,j(l,m)){\rm E^{i^{*},j^{*}}_{eff}}\big{(}l^{*},m^{*}\big{)}=\operatorname*{arg\,max}\Big{(}{\rm E^{i,j}_{eff}}\big{(}l,m\big{)}\Big{)}
29             else
30                  Eeffi,j(l,m)=0{\rm E^{i^{*},j^{*}}_{eff}}\big{(}l^{*},m^{*}\big{)}=0
31             end if
32            
33       end for
34      
35 end for
36% Both Single and Double reflections
37 if Eeffs(i)Eeffi,j(l,m){\rm E^{s^{*}}_{eff}}\big{(}i^{*}\big{)}\geq{\rm E^{i^{*},j^{*}}_{eff}}\big{(}l^{*},m^{*}\big{)} then
38      Return RsiR^{i^{*}}_{s^{*}}
39 else
40      Return Ri,jl,mR^{l^{*},m^{*}}_{i^{*},j^{*}}
41 end if
Algorithm 3 Group Selection Algorithm

V-B2 Energy-efficient Subgroup Selection for Double Reflections

In this communication environment, uu transfers the packets to vv using two consecutive RISs RiR_{i} and RjR_{j}, respectively. We also assume that Du,vD_{u,v} be the set of RISs each of which can provide indirect LoS between uu and vv. That is, Du,v={(Ri,Rj):(Riis visible from uandRj)&(Rjis visible fromv})D_{u,v}=\{(R_{i},R_{j}):\;\;\;(R_{i}\;\text{is visible from $u$}\;\text{and}\;R_{j})\;\&\;(R_{j}\;\text{is visible from}\;v\}). Since each RIS is partitioned into kk non-overlapping subgroups, one subgroup from RiR_{i} and another from RjR_{j} will be selected for complete information transfer from uu to vv. Therefore, from (4), the required energy for complete information transfer using ll-th and mm-th subgroup of RiR_{i} and RjR_{j} respectively, is given by

Eci,j(l,m)=βϕRi,jl,m(γ)(P+Pphase(Ril)+Pphase(Rjm)),{{\rm E^{i,j}_{c}}(l,m)}=\frac{\beta\phi}{R^{l,m}_{i,j}(\gamma)}\Big{(}P+P_{\rm phase}(R^{l}_{i})+P_{\rm phase}(R^{m}_{j})\Big{)},\vspace{-2mm} (29)

where, Pphase(Rjm)P_{\rm phase}(R^{m}_{j}) and Pphase(Ril)P_{\rm phase}(R^{l}_{i}) are the phase shift power for mm-th and ll-th subgroup of RjR_{j} and RiR_{i}, respectively. Moreover, using (5), we compute the energy-efficiency as

Eeffi,j(l,m)=Ri,jl,m(γ)Eci,j(l,m).{{\rm E^{i,j}_{eff}}(l,m)}=\frac{R^{l,m}_{i,j}(\gamma)}{{\rm E^{i,j}_{c}}(l,m)}.\vspace{-2mm} (30)

Now, we formulate an optimization problem to select the energy-efficient subgroups as follows:

max\displaystyle\max\quad Eeffi,j(l,m)\displaystyle{\rm E^{i,j}_{eff}}(l,m) (31)
s.t. Ri,jl,m(γ)Rth,l,m=1,k&i,jDu,v\displaystyle R^{l,m}_{i,j}(\gamma)\geq R_{th},\;l,m=1,\cdots k\;\&\;i,j\in D_{u,v} (32)
Eci,j(l,m)>0l,m=1,k&i,jDu,v.\displaystyle{\rm E^{i,j}_{c}}(l,m)>0\;\;\;\;l,m=1,\cdots k\;\&\;i,j\in D_{u,v}.\vspace{-2mm} (33)

V-B3 Energy-efficient Subgroup Selection for both Single and Double Reflections

In this communication environment, a device pair (u,v)(u,v) is covered by both single and double reflections. That is, Su,vϕS_{u,v}\neq\phi and Du,vϕD_{u,v}\neq\phi. Therefore, using case V-B1 above, we get a subgroup that provides the maximum energy-efficiency for single reflection. Similarly, using case V-B2 above, we get a pair of subgroups that provide the maximum energy-efficiency for double reflections. Finally, we select the best among them for information transfer between uu and vv.

In the following lemmas, we will prove two interesting facts for a device pair covered via both single and double reflections.

Lemma 1.

Let a device pair (u,v)(u,v) be visible through RilR^{l}_{i} using single reflection, and through RilR^{l}_{i} and RjmR^{m}_{j} together via double reflections. In that case, single reflection are always more beneficial than double reflections.

Refer to caption
Figure 4: Sometimes double reflections are more beneficial than single reflection
Refer to caption
(a)
Refer to caption
(b)
Refer to caption
(c)
Figure 5: Impact of (a) Coverage area (b) Number of devices, and (c) Number of obstacles on number of RISs.
Proof.

See Appendix A. ∎

From (24) and (29), we observe that energy consumption is a function of data rate, transmit power, and phase shift power. Again, the data rate is a function of distance. Moreover, if a device pair (u,v)(u,v) is visible via RstR^{t}_{s} using single reflection and, RilR^{l}_{i} and RjmR^{m}_{j} for double reflections where Rst,RilR^{t}_{s},R^{l}_{i} and RjmR^{m}_{j} are three distinct subgroups, the result may be quite different which is counter-intuitive. More specifically, in the following lemma, we prove that double reflections may be more energy-efficient than single reflection depending on the power consumption and the distance traveled by the signal.

Lemma 2.

Let a device pair (u,v)(u,v) be visible through RstR^{t}_{s} using single reflection, and through RilR^{l}_{i} and RjmR^{m}_{j} together via double reflections, where Rst,RilR^{t}_{s},R^{l}_{i} and RjmR^{m}_{j} are three distinct subgroups. If the following conditions hold:

i)P+Pphase(Rst)P+Pphase(Ril)+Pphase(Rjm)and\displaystyle{\rm i})\;\;P+P_{\rm phase}(R^{t}_{s})\leq P+P_{\rm phase}(R^{l}_{i})+P_{\rm phase}(R^{m}_{j})\;\;\text{and}
ii)ρLdRstvduRstdRjmvduRildRilRjm\displaystyle{\rm ii})\;\;\rho_{\rm L}d_{R^{t}_{s}v}d_{uR^{t}_{s}}\geq d_{R^{m}_{j}v}d_{uR^{l}_{i}}d_{R^{l}_{i}R^{m}_{j}}\vspace{-4mm}

then double reflections are more energy-efficient than single reflection.

Proof.

See Appendix B. ∎

In the following subsection, we illustrate with an example, the situation where double reflections are more energy-efficient than single reflection.

V-B4 Illustrative Example where Double Reflection is more Beneficial than Single Reflection

In Fig. 4, uu wants to communicate with vv and two possible paths are available in between them, one is via R14R^{4}_{1} using single reflection, and another one via R23R^{3}_{2} and R32R^{2}_{3} together using double reflections. Since R14R^{4}_{1} is located far away from uu and vv, the achieved data rate at vv is not very high. Moreover, due to the close proximity of uu to R23R^{3}_{2}, R23R^{3}_{2} to R32R^{2}_{3}, and R32R^{2}_{3} to vv the achievable data rate at vv is more than the achievable data rate via the path using R14R^{4}_{1} which follows from lemma 2. Therefore, in this case, the second path is more energy-efficient. As a result, uu selects the path via R23R^{3}_{2} and R32R^{2}_{3} for complete information transfer using double reflections.

VI Simulation Results

In this section, we conduct comprehensive simulations to verify the effectiveness of our suggested approach and compare it with the closest available methods [9], [14] and [21]. Here we consider a two-dimensional square area of 400×400m2400\times 400\;m^{2} [24]. Furthermore, we assume that two devices can communicate only if they lie within a specific coverage radius. Moreover, we anticipate that D2D communication will occur at a frequency of 6060 GHz with a 500500 MHz bandwidth [31]. The transmit power PP is 3030 dBm [19] and Pphase=5P_{\rm phase}=5 dBm [32]. Here, we consider a Rician fading scenario [33], incorporating a Rician factor K=10K=10 dB [19]. The default parameters taken into account are: path loss at one-meter distance ρL=103.53\rho_{L}=10^{-3.53} [34], the path loss exponent is α=2\alpha=2 and the packet length is 10001000 bits. Below we briefly describe the existing methods [9], [14] and [21] with which we have compared our proposed approach.

  • OPRIS [9]: This work investigates the optimal placement of RISs for a single reflected scenario. In other words, it does not allow double reflections.

  • Rand [14]: In this work, the RISs are placed arbitrarily in the geographically separated locations. Here too, the authors investigate the aspect of single reflection.

  • DAR [21]: This work proposes an approach to connect a particular device pair by considering the aspect of double reflections. However, it does not include the feature of RIS grouping in the communication scenarios.

Refer to caption
(a)
Refer to caption
(b)
Figure 6: Impact of the number of obstacles on (a) Sum throughput, and (b) Unserved pairs.
Refer to caption
(a)
Refer to caption
(b)
Figure 7: Impact of the number of elements in a group on (a) Energy consumptions, and (b) Energy efficiency.

Fig. 5(a) shows how many RISs are needed to cover the largest possible region as a function of coverage radius. Here, we consider three different scenarios with three different RIS placement strategies. Consequently, we look at the number of RISs used in these scenarios to get the maximum coverage. Note that, with increasing coverage radius, the number of RISs used exhibits a non-increasing trend, which is quite intuitive. We observe that our strategy outperforms both OPRIS and Rand. This is because, there are many device pairs which are visible via double reflections, but for a single reflection, we need to install a new RIS. As a result, our strategy brings down the requirement of RISs in comparison to OPRIS and Rand, as they did not allow double reflections.

Fig. 5(b) and Fig. 5(c) show how many RISs are needed to cover the largest possible region as a function of device density and number of obstacles, respectively. Accordingly, we look at the number of RISs used in three different scenarios to get the maximum coverage. We find that, for a given situation, the number of RISs increases with the growing density of devices (obstacles), which is quite intuitive. Here too, we observed that our strategy outperforms OPRIS and Rand for the same reason as stated earlier.

Fig. 6(a) shows how the sum throughput and obstacle density are related to each other, where the sum throughput is calculated using equations (1) and (2). Here, we observe that, for a particular scenario, the sum throughput shows a decreasing trend with an increasing number of obstacles. Moreover, our proposed strategy outperforms in comparison to OPRIS and Rand in terms of sum throughput. This is because in our proposed strategy we can serve more blind pairs due to considering the double reflections.

From Fig. 6(b), we observe that, in relation to the growing obstacles, the number of unserved device pairs exhibits a increasing trend. As the number of obstacles increases, the number of blind pairs is also increases. As a result, the likelihood of having more blind pairs that are not served rises. Note that using double reflections, sometimes we can serve some blind pairs that are not possible to serve by single reflection even after deploying more RISs. As a results, our proposed strategy outperforms the performance of OPRIS and Rand in terms of number of unserved blind pairs.

The significance of RIS grouping on the performance metrics, such as achievable throughput and energy efficiency (Eeff\rm{E_{eff}}), as a function of the number of elements in a RIS, is shown in Fig. 7(a). In particular, we examine the effects of distinguishing between a grouping-based scenario (GBS) and a no grouping-based scenario (nGBS). In nGBS, the entire RIS is used for information transfer, whereas in GBS, the RIS is divided into four equal-sized groups and only one of them is used for information transfer. Here, we observe that in both cases, achievable throughput follows an increasing trend with the growing number of elements. This is because a growing number of patches supports better throughput. As a results, nGBS provides higher data throughput as compared to GBS. This makes sense because, in contrast to GBS, nGBS makes use of the entire RIS, whereas GBS only uses a portion of the RIS’s total number of patches. We also observed from 7(a) that, in relation to the rising number of elements in a RIS, the Eeff\rm E_{eff} for nGBS is in a decreasing trend whereas it is in an increasing trend for GBS. This is because the required phase shift power in nGBS is proportional to the number of patches of an RIS, whereas a common phase shift power is used for GBS. As a results, usage of the GBS leads to better Eeff\rm E_{eff} performance.

In Fig. 7(b), a comparison of energy consumption (Ec)(\rm E_{c}) and energy efficiency (Eeff)(\rm E_{eff}) between the proposed strategy and the existing benchmark DAR, is shown. Here, as mentioned in 7(a), we partitioned a RIS into four equal parts and selected one of them for communication purposes. Additionally, we consider a scenario, where both strategies use double reflections. In 7(b), we observed that in relation to the growing number of patches of an RIS, Ec(Eeff)\rm E_{c}(\rm E_{eff}) exhibits an increasing (decreasing) trend in DAR, and Ec(Eeff)\rm E_{c}(\rm E_{eff}) exhibits a decreasing (increasing) trend in our proposed strategy. This improvement is because of the fact that the required phase shift power in DAR is proportional to the number of patches of an RIS as it uses the entire RIS, whereas a particular group is being used and a common phase shift power is used in our proposed strategy.

VII Conclusion

In this work, we proposed a novel RIS deployment strategy in the double RIS-assisted D2D wireless communication scenario, which takes into account the elements grouping of an RIS. The proposed strategy prevents resource wastage by deploying the RIS strategically taking care of both single and double reflections and partitioning the RIS into non-overlapping subgroups. Subsequently, we proposed an energy-efficient group selection strategy for a device pair to complete their communication. It is interesting to note that under some conditions, double reflections are more energy-efficient than single reflection. The simulation results show that a significant reduction in the number of RISs is achievable by allowing double reflections. In addition, double reflections provide more energy efficient communication, and also bring down the number of unserved blind pairs in comparison to some existing benchmarks.

Appendix A Proof of Lemma 1

Let (u,v)(u,v) be a blind pair that is visible via RilR^{l}_{i} using single reflection. Let dRilud_{R^{l}_{i}u} and dRilvd_{R^{l}_{i}v} be the distances between uu and RilR^{l}_{i}, and RilR^{l}_{i} and vv, respectively. It is also given that (u,v)(u,v) is visible via RilR^{l}_{i} and RjmR^{m}_{j} together using double reflections, where RilR^{l}_{i} is a common subgroup that is used in both single and double reflections. Let dRilRjmd_{R^{l}_{i}R^{m}_{j}} and dRjmvd_{R^{m}_{j}v} be the distances between RilR^{l}_{i} and RjmR^{m}_{j}, and RjmR^{m}_{j} and vv, respectively. Additionally, we assume that dRilRjm>1d_{R^{l}_{i}R^{m}_{j}}>1, dRjmv>1d_{R^{m}_{j}v}>1 and the channel conditions for single and double-reflected communication are the same. Therefore, using triangular inequality, we can claim that

dRilu<dRilRjm+dRjmv.d_{R^{l}_{i}u}<d_{R^{l}_{i}R^{m}_{j}}+d_{R^{m}_{j}v}.\vspace{-3mm} (34)

Moreover, from (2), we have

P|𝐡Rjm𝐡RilRjm𝐡uRil×ej(ϕi,l+ϕj,m)|2×ρL3dRjmvαduRilαdRilRjmα\displaystyle P|\mathbf{h}_{R^{m}_{j}}\mathbf{h}_{R^{l}_{i}R^{m}_{j}}\mathbf{h}_{uR^{l}_{i}}\times e^{j(\phi_{i,l}+\phi_{j,m})}|^{2}\times\rho_{\rm L}^{3}d_{R^{m}_{j}v}^{-\alpha}d_{uR^{l}_{i}}^{-\alpha}d_{R^{l}_{i}R^{m}_{j}}^{-\alpha}
P|𝐡Rjm𝐡RilRjm𝐡uRil×ej(ϕi,l+ϕj,m)|2×ρL2dRjmvαduRilαdRilRjmα\displaystyle\leq P|\mathbf{h}_{R^{m}_{j}}\mathbf{h}_{R^{l}_{i}R^{m}_{j}}\mathbf{h}_{uR^{l}_{i}}\times e^{j(\phi_{i,l}+\phi_{j,m})}|^{2}\times\rho_{\rm L}^{2}d_{R^{m}_{j}v}^{-\alpha}d_{uR^{l}_{i}}^{-\alpha}d_{R^{l}_{i}R^{m}_{j}}^{-\alpha}
(  0<ρ<1)\displaystyle\;\;\left(\because\>\>0<\rho<1\right)
P|𝐡Rjm𝐡RilRjm𝐡uRil×ej(ϕi,l+ϕj,m)|2×ρL2duRilαdRilvα\displaystyle\leq P|\mathbf{h}_{R^{m}_{j}}\mathbf{h}_{R^{l}_{i}R^{m}_{j}}\mathbf{h}_{uR^{l}_{i}}\times e^{j(\phi_{i,l}+\phi_{j,m})}|^{2}\times\rho_{\rm L}^{2}d_{uR^{l}_{i}}^{-\alpha}d_{R^{l}_{i}v}^{-\alpha}\;\;
(from (34) and dRilRjm>1,dRjmv>1d_{R^{l}_{i}R^{m}_{j}}>1,d_{R^{m}_{j}v}>1) (35)

Therefore, from (35), (2) and (1), we can claim that

P|𝐡Rjm𝐡RilRjm𝐡uRil×ej(ϕi,l+ϕj,m)|2×ρL3dRjmvαduRilαdRilRjmασ2\displaystyle\frac{P|\mathbf{h}_{R^{m}_{j}}\mathbf{h}_{R^{l}_{i}R^{m}_{j}}\mathbf{h}_{uR^{l}_{i}}\times e^{j(\phi_{i,l}+\phi_{j,m})}|^{2}\times\rho_{\rm L}^{3}d_{R^{m}_{j}v}^{-\alpha}d_{uR^{l}_{i}}^{-\alpha}d_{R^{l}_{i}R^{m}_{j}}^{-\alpha}}{\sigma^{2}}
P|𝐡Rjm𝐡RilRjm𝐡uRil×ej(ϕi,l+ϕj,m)|2×ρL2duRilαdRilvασ2\displaystyle\leq\frac{P|\mathbf{h}_{R^{m}_{j}}\mathbf{h}_{R^{l}_{i}R^{m}_{j}}\mathbf{h}_{uR^{l}_{i}}\times e^{j(\phi_{i,l}+\phi_{j,m})}|^{2}\times\rho_{\rm L}^{2}d_{uR^{l}_{i}}^{-\alpha}d_{R^{l}_{i}v}^{-\alpha}}{\sigma^{2}}
γdrγsrRi,jl,m(γ)Ril(γ)\displaystyle\implies\gamma_{dr}\leq\gamma_{sr}\implies R^{l,m}_{i,j}(\gamma)\leq R^{l}_{i}(\gamma)
Ril(γ)Ri,jl,m(γ)0.\displaystyle\implies R^{l}_{i}(\gamma)-R^{l,m}_{i,j}(\gamma)\geq 0. (36)

Now, from (25) and (30), we have

Eeffi(l)Eeffi,j(l,m)=Ril(γ)βϕRil(γ)×(P+Pphase(Ril))\displaystyle{\rm E^{i}_{eff}}(l)-{\rm E^{i,j}_{eff}}(l,m)=\frac{R^{l}_{i}(\gamma)}{\frac{\beta\phi}{R^{l}_{i}(\gamma)}\times\Big{(}P+P_{\rm phase}(R^{l}_{i})\Big{)}}
Ri,jl,m(γ)βϕRi,jl,m(γ)×(P+Pphase(Ril)+Pphase(Rjm))\displaystyle-\frac{R^{l,m}_{i,j}(\gamma)}{\frac{\beta\phi}{R^{l,m}_{i,j}(\gamma)}\times\Big{(}P+P_{\rm phase}(R^{l}_{i})+P_{\rm phase}(R^{m}_{j})\Big{)}} (37)
=1βϕ×{(P+Pphase(Ril)+Pphase(Rjm))(Ril(γ))2(P+Pphase(Ril)+Pphase(Rjm))(P+Pphase(Ril))\displaystyle=\frac{1}{\beta\phi}\times\left\{\frac{\Big{(}P+P_{\rm phase}(R^{l}_{i})+P_{\rm phase}(R^{m}_{j})\Big{)}\Big{(}R^{l}_{i}(\gamma)\Big{)}^{2}}{\Big{(}P+P_{\rm phase}(R^{l}_{i})+P_{\rm phase}(R^{m}_{j})\Big{)}\Big{(}P+P_{\rm phase}(R^{l}_{i})\Big{)}}\right.
(P+Pphase(Ril))(Ri,jl,m(γ))2(P+Pphase(Ril)+Pphase(Rjm))(P+Pphase(Ril))}\displaystyle\qquad-\left.\frac{\Big{(}P+P_{\rm phase}(R^{l}_{i})\Big{)}\Big{(}R^{l,m}_{i,j}(\gamma)\Big{)}^{2}}{\Big{(}P+P_{\rm phase}(R^{l}_{i})+P_{\rm phase}(R^{m}_{j})\Big{)}\Big{(}P+P_{\rm phase}(R^{l}_{i})\Big{)}}\right\} (38)
=1βϕ×{(P+Pphase(Ril))((Ril(γ))2(Ri,jl,m(γ))2)(P+Pphase(Ril)+Pphase(Rjm))(P+Pphase(Ril))\displaystyle=\frac{1}{\beta\phi}\times\left\{\frac{\Big{(}P+P_{\rm phase}(R^{l}_{i})\Big{)}\left(\Big{(}R^{l}_{i}(\gamma)\Big{)}^{2}-\Big{(}R^{l,m}_{i,j}(\gamma)\Big{)}^{2}\right)}{\Big{(}P+P_{\rm phase}(R^{l}_{i})+P_{\rm phase}(R^{m}_{j})\Big{)}\Big{(}P+P_{\rm phase}(R^{l}_{i})\Big{)}}\right.
+Pphase(Rjm)(Ril(γ))2(P+Pphase(Ril)+Pphase(Rjm))(P+Pphase(Ril))}\displaystyle+\left.\frac{P_{\rm phase}(R^{m}_{j})\Big{(}R^{l}_{i}(\gamma)\Big{)}^{2}}{\Big{(}P+P_{\rm phase}(R^{l}_{i})+P_{\rm phase}(R^{m}_{j})\Big{)}\Big{(}P+P_{\rm phase}(R^{l}_{i})\Big{)}}\right\}
0((Ril(γ))2(Ri,jl,m(γ))20\displaystyle\geq 0\quad\left(\because\;\;\Big{(}R^{l}_{i}(\gamma)\Big{)}^{2}-\Big{(}R^{l,m}_{i,j}(\gamma)\Big{)}^{2}\geq 0\;\;\right.
(from(36))andPphase(Rjm)(Ril(γ))20)\displaystyle\left.(\text{from}\;\eqref{d_ratio})\;\;\text{and}\;\;P_{\rm phase}(R^{m}_{j})\Big{(}R^{l}_{i}(\gamma)\Big{)}^{2}\geq 0\right)
Eeffi(l)Eeffi,j(l,m)0.\displaystyle\implies{\rm E^{i}_{eff}}(l)-{\rm E^{i,j}_{eff}}(l,m)\geq 0. (39)

Therefore, we can conclude from (34) that the transmitted signals from uu require a longer route for double reflections than for single reflection in order to reach vv. As a result, due to having a longer path and substantial path loss, the achievable data rate at vv for double reflections are lower than the single reflection when utilizing a common subgroup. Hence, from (39), we can conclude that if a device pair is coverable by single and double reflections using a common subgroup, single reflection are more beneficial than double reflections which is quite intuitive.

Appendix B Proof of Lemma 2

Here we want to prove that double reflections may be more beneficial than single reflection in some specific scenarios. In this context, Eeffs(t){\rm E^{s}_{eff}}(t) for single reflection must be less than Eeffi,j(l,m){\rm E^{i,j}_{eff}}(l,m) for double reflections. Therefore, from (25) and (30), we have

Eeffi,j(l,m)Eeffs(t)\displaystyle{\rm E^{i,j}_{eff}}(l,m)\geq{\rm E^{s}_{eff}}(t) Ri,jl,m(γ)Eci,j(l,m)Rsi(γ)Ecs(i)\displaystyle\iff\frac{R^{l,m}_{i,j}(\gamma)}{{\rm E^{i,j}_{c}}(l,m)}\geq\frac{R^{i}_{s}(\gamma)}{\rm{E^{s}_{c}}(i)}
Ri,jl,m(γ)Rsi(γ)Eci,j(l,m)Ecs(i).\displaystyle\iff\frac{R^{l,m}_{i,j}(\gamma)}{R^{i}_{s}(\gamma)}\geq\frac{\rm{E^{i,j}_{c}}(l,m)}{\rm{E^{s}_{c}}(i)}. (40)

Now, by using Eci,j(l,m){\rm E^{i,j}_{c}}(l,m) and Ecs(i){\rm E^{s}_{c}}(i) from (24) and (29), respectively, we obtain

(Ri,jl,m(γ)Rsi(γ))2P+Pphase(Ril)+Pphase(Rjm)P+Pphase(Rst).\displaystyle\left(\frac{R^{l,m}_{i,j}(\gamma)}{R^{i}_{s}(\gamma)}\right)^{2}\geq\frac{P+P_{\rm phase}(R^{l}_{i})+P_{\rm phase}(R^{m}_{j})}{P+P_{\rm phase}(R^{t}_{s})}. (41)

From the stated condition (i)\rm(i), the required phase shift power for double reflections is always greater than the required phase shift power for single reflection. That is,

(P+Pphase(Rst))(P+Pphase(Ril)+Pphase(Rjm))\displaystyle\Big{(}P+P_{\rm phase}(R^{t}_{s})\Big{)}\leq\Big{(}P+P_{\rm phase}(R^{l}_{i})+P_{\rm phase}(R^{m}_{j})\Big{)} (42)
P+Pphase(Ril)+Pphase(Rjm)P+Pphase(Rst)1.\displaystyle\iff\frac{P+P_{\rm phase}(R^{l}_{i})+P_{\rm phase}(R^{m}_{j})}{P+P_{\rm phase}(R^{t}_{s})}\geq 1.\vspace{-2mm} (43)

Therefore, from (41) and (43), we can claim that

(Ri,jl,m(γ)Rsi(γ))21Ri,jl,m(γ)Rst(γ)0\displaystyle\left(\frac{R^{l,m}_{i,j}(\gamma)}{R^{i}_{s}(\gamma)}\right)^{2}\geq 1\iff R^{l,m}_{i,j}(\gamma)-R^{t}_{s}(\gamma)\geq 0 (44)
(Ri,jl,m(γ)>0andRsi(γ)>0)\displaystyle\qquad\left(\because\>\>R^{l,m}_{i,j}(\gamma)>0\>\>\text{and}\>\>R^{i}_{s}(\gamma)>0\right)

Therefore, from (1), (2) and (44), we have

P|𝐡Rjm𝐡RilRjm𝐡uRil×ej(ϕi,l+ϕj,m)|2×ρL3dRjmvαduRilαdRilRjmασ2\displaystyle\frac{P|\mathbf{h}_{R^{m}_{j}}\mathbf{h}_{R^{l}_{i}R^{m}_{j}}\mathbf{h}_{uR^{l}_{i}}\times e^{j(\phi_{i,l}+\phi_{j,m})}|^{2}\times\rho_{\rm L}^{3}d_{R^{m}_{j}v}^{-\alpha}d_{uR^{l}_{i}}^{-\alpha}d_{R^{l}_{i}R^{m}_{j}}^{-\alpha}}{\sigma^{2}}
P|𝐡Rstv×𝐡uRit×ejϕs,t|2dRstvαduRstαρL2σ20.\displaystyle\qquad-\frac{P|\mathbf{h}_{R^{t}_{s}v}\times\mathbf{h}_{uR^{t}_{i}}\times e^{j\phi_{s,t}}|^{2}d_{R^{t}_{s}v}^{-\alpha}d_{uR^{t}_{s}}^{-\alpha}\rho_{\rm L}^{2}}{\sigma^{2}}\geq 0.\vspace{-2mm} (45)

Now, from the stated condition (ii)\rm(ii), we can show that

ρLdRstvduRstdRjmvduRildRilRjm\displaystyle\rho_{\rm L}d_{R^{t}_{s}v}d_{uR^{t}_{s}}\geq d_{R^{m}_{j}v}d_{uR^{l}_{i}}d_{R^{l}_{i}R^{m}_{j}} (46)
ρL3dRjmvαduRilαdRilRjmαρL2dRstvαduRstα.\displaystyle\iff\rho^{3}_{L}d_{R^{m}_{j}v}^{-\alpha}d_{uR^{l}_{i}}^{-\alpha}d_{R^{l}_{i}R^{m}_{j}}^{-\alpha}\geq\rho^{2}_{L}d_{R^{t}_{s}v}^{-\alpha}d_{uR^{t}_{s}}^{-\alpha}.\vspace{-3mm} (47)

Therefore, from (45) and (47), we can claim that

|𝐡Rjm𝐡RilRjm𝐡uRil×ej(ϕi,l+ϕj,m)|2|𝐡Rstv𝐡uRst×ejϕs,t|2.|\mathbf{h}_{R^{m}_{j}}\mathbf{h}_{R^{l}_{i}R^{m}_{j}}\mathbf{h}_{uR^{l}_{i}}\times e^{j(\phi_{i,l}+\phi_{j,m})}|^{2}\geq|\mathbf{h}_{R^{t}_{s}v}\mathbf{h}_{uR^{t}_{s}}\times e^{j\phi_{s,t}}|^{2}.\vspace{-1mm} (48)

That is, the power gain at the receiver end is greater in double reflections than in single reflection.

Moreover, from (48), we can conclude that if a device pair is visible via single and double reflection and it satisfies the stated conditions, then double reflection is more beneficial than single reflection.

References

  • [1] Ericsson Mobility Report, Nov. 2024. [Online]. Available: https://www.ericsson.com/en/mobility-report/reports/november-2024.
  • [2] R. I. Ansari, C. Chrysostomou, S. A. Hassan, M. Guizani, S. Mumtaz, J. Rodriguez, and J. J. Rodrigues, “5G D2D networks: Techniques, challenges, and future prospects,” IEEE Syst. J., vol. 12, no. 4, pp. 3970–3984, 2017.
  • [3] J. Qiao, X. S. Shen, J. W. Mark, Q. Shen, Y. He, and L. Lei, “Enabling device-to-device communications in millimeter-wave 5G cellular networks,” IEEE Commun. Mag., vol. 53, pp. 209–215, Jan. 2015.
  • [4] H. Zhao, R. Mayzus, S. Sun, M. Samimi, J. K. Schulz, Y. Azar, K. Wang, G. N. Wong, F. Gutierrez, and T. S. Rappaport, “28 GHz millimeter wave cellular communication measurements for reflection and penetration loss in and around buildings in New York city,” in 2013 IEEE Int. Conf. on Commun., pp. 5163–5167, 2013.
  • [5] Q. Xu, C. Jiang, Y. Han, B. Wang, and K. R. Liu, “Waveforming: An overview with beamforming,” IEEE Commun. Surv. Tutorials, vol. 20, no. 1, pp. 132–149, 2017.
  • [6] E. Basar, M. Di Renzo, J. De Rosny, M. Debbah, M.-S. Alouini, and R. Zhang, “Wireless communications through reconfigurable intelligent surfaces,” IEEE Access, vol. 7, pp. 116753–116773, Aug. 2019.
  • [7] B. Zheng, C. You, and R. Zhang, “Double-IRS assisted multi-user MIMO: Cooperative passive beamforming design,” IEEE Trans. Wireless Commun., vol. 20, pp. 4513–4526, July 2021.
  • [8] Z. Zhang, Y. Xiao, Z. Ma, M. Xiao, Z. Ding, X. Lei, G. K. Karagiannidis, and P. Fan, “6G wireless networks: Vision, requirements, architecture, and key technologies,” IEEE Veh. Tech. Mag., vol. 14, pp. 28–41, Sep. 2019.
  • [9] S. Zengrenzo, H. Zhang, B. Di, Z. Han, and L. Song, “Reconfigurable intelligent surface (RIS) assisted wireless coverage extension: RIS orientation and location optimization,” IEEE Commun. Lett., vol. 25, pp. 269–273, Jan. 2021.
  • [10] G. Levin and S. Loyka, “Amplify-and-forward versus decode-and-forward relaying: Which is better?,” in Proc. 22nd Int. Zurich Seminar Commun. (IZS), (Zürich, Switzerland), 2012.
  • [11] Z. Li, N. K. Kundu, J. Rao, S. Shen, M. R. McKay, and R. Murch, “Performance analysis of RIS-assisted communications with element grouping and spatial correlation,” IEEE Wireless Commun. Lett., vol. 12, pp. 630–634, Apr. 2023.
  • [12] A. Nicolaides, C. Psomas, G. M. Kraidy, S. Yang, and I. Krikidis, “Outage and DMT analysis of partition-based schemes for RIS-aided MIMO fading channels,” IEEE J. Sel. Areas Commun., vol. 41, pp. 2336 – 2349, Aug. 2023.
  • [13] Y. Yang, B. Zheng, S. Zhang, and R. Zhang, “Intelligent reflecting surface meets OFDM: Protocol design and rate maximization,” IEEE Trans. Commun., vol. 68, pp. 4522–4535, Jul. 2020.
  • [14] S. Jia, X. Yuan, and Y.-C. Liang, “Reconfigurable intelligent surfaces for energy efficiency in D2D communication network,” IEEE Wireless Commun. Lett., vol. 10, no. 3, pp. 683–687, 2020.
  • [15] Y. Chen, B. Ai, H. Zhang, Y. Niu, L. Song, Z. Han, and H. Vincent Poor, “Reconfigurable intelligent surface assisted device-to-device communications,” IEEE Trans. Wireless Commun., vol. 20, pp. 2792–2804, May 2021.
  • [16] S. Jia, X. Yuan, and Y.-C. Liang, “Reconfigurable intelligent surfaces for energy efficiency in D2D communication network,” IEEE Wireless Commun. Lett., vol. 10, pp. 683–687, Mar. 2021.
  • [17] T. V. Nguyen, D. N. Nguyen, M. D. Renzo, and R. Zhang, “Leveraging secondary reflections and mitigating interference in multi-IRS/RIS aided wireless networks,” IEEE Trans. Wireless Commun., vol. 22, pp. 502–517, Jan. 2023.
  • [18] X. Huan, K. S. Kim, S. Lee, E. G. Lim, and A. Marshall, “A beaconless asymmetric energy-efficient time synchronization scheme for resource-constrained multi-hop wireless sensor networks,” IEEE Trans. Commun., vol. 68, pp. 1716–1730, Mar. 2020.
  • [19] L. Sau, P. Mukherjee, and S. C. Ghosh, “DRAMS: Double-RIS assisted multihop routing scheme for device-to-device communication,” Comput. Commun., vol. 220, pp. 52–63, Apr. 2024.
  • [20] J. He, H. Wymeersch, and M. Juntti, “Channel estimation for RIS-aided mmWave MIMO systems via atomic norm minimization,” IEEE Trans.Wireless Commun., vol. 20, no. 9, pp. 5786–5797, 2021.
  • [21] Z. Kang, C. You, and R. Zhang, “Double-Active-IRS aided wireless communication: Deployment optimization and capacity scaling,” IEEE Wireless Commun. Lett., vol. 12, pp. 1821–1825, Nov. 2023.
  • [22] M. A. Kishk and M.-S. Alouini, “Exploiting randomly located blockages for large-scale deployment of intelligent surfaces,” IEEE J. Sel. Areas Commun., vol. 39, pp. 1043–1056, Apr. 2020.
  • [23] L. Sau and S. C. Ghosh, “A geometry-based strategic placement of RISs in millimeter wave device to device communication,” in Proc. 3rd Int. Conf. Comput. Commun. Engineering. (CCCE), pp. 1–13, Mar. 2023.
  • [24] S. Deb and S. C. Ghosh, “An RIS deployment strategy to overcome static obstacles in millimeter wave D2D communication,” in Proc. IEEE 20th Int. Symp. Netw. Comput. Appl. (NCA), pp. 1–8, Nov. 2021.
  • [25] X. Mo, L. Gui, K. Ying, X. Sang, and X. Diao, “Reconfigurable intelligent surface deployment for wideband millimeter wave systems,” IEEE Trans. Commun., vol. 72, pp. 2989–3004, May. 2024.
  • [26] L. Sau, P. Mukherjee, and S. C. Ghosh, “Priority-aware grouping-based multihop routing scheme for RIS-assisted wireless networks,” IEEE Trans. Network Sci. Eng., 2025. early access.
  • [27] S. Tewes, M. Heinrichs, R. Kronberger, and A. Sezgin, “IRS-enabled breath tracking with colocated commodity WiFi transceivers,” IEEE Internet Things J., vol. 10, pp. 6870–6886, Apr. 2022.
  • [28] D. Singh and S. C. Ghosh, “Mobility-aware relay selection in 5G D2D communication using stochastic model,” IEEE Trans. Veh. Technol., vol. 68, no. 3, pp. 2837–2849, 2019.
  • [29] M. Jung, W. Saad, M. Debbah, and C. S. Hong, “On the optimality of reconfigurable intelligent surfaces (RISs): Passive beamforming, modulation, and resource allocation,” IEEE Trans. Wireless Commun., vol. 20, pp. 4347–4363, July 2021.
  • [30] T. Weiss, J. Hillenbrand, A. Krohn, and F. Jondral, “Mutual interference in OFDM-based spectrum pooling systems,” in 2004 IEEE 59th Veh. Technol. Conf., vol. 4, pp. 1873–1877, 2004.
  • [31] A. Al-Hourani, S. Chandrasekharan, and S. Kandeepan, “Path loss study for millimeter wave device-to-device communications in urban environment,” in 2014 IEEE Int. Conf. on Commun. Workshops (ICC), pp. 102–107, 2014.
  • [32] C. Huang, A. Zappone, G. C. Alexandropoulos, M. Debbah, and C. Yuen, “Reconfigurable intelligent surfaces for energy efficiency in wireless communication,” IEEE Trans. Wireless Commun., vol. 18, pp. 4157–4170, Aug. 2019.
  • [33] P. Mukherjee, D. Mishra, and S. De, “Gaussian mixture based context-aware short-term characterization of wireless channels,” IEEE Trans. Veh. Technol., vol. 69, pp. 26–40, Jan. 2020.
  • [34] Z. Yang, M. Chen, W. Saad, W. Xu, M. Shikh-Bahaei, H. V. Poor, and S. Cui, “Energy-efficient wireless communications with distributed reconfigurable intelligent surfaces,” IEEE Trans. Wireless Commun., vol. 21, pp. 665–679, Jan. 2021.