[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

A survey on device-to-device (D2D) communication

Published: 15 January 2017 Publication History

Abstract

The number of devices is expected to radically increase in near future, with an estimate of above 50 billion connected devices by 2020. The subscribers demand improved data rates, with reduced latency and increased system capacity. To endure the rising demands, cellular networks need to undergo suitable changes. For fulfillment of the rising needs of users and efficient utilization of the available scarce resources, device-to-device (D2D) communication is being looked upon as an important emerging technology for present and future cellular networks. It allows peer-to-peer communication between users, with improved spectral efficiency, energy efficiency and system throughput. In this paper, a detailed survey on device-to-device (D2D) communications has been offered, along with the challenges which exist for D2D (like resource allocation, security, interference management etc.) to become a successful paradigm of wireless networks. In order to fulfill the subscriber needs, architecture has been proposed which assures overcoming the various implementation challenges of D2D communication. The paper largely focuses on security in D2D communication and the possible attacks to which the direct links are susceptible to. For ensuring a secure D2D communication, solution has been proposed, based upon Internet Protocol Security (IP Sec). The proposed architecture aims at providing optimal amount of resources to all the users in the cellular system, be it cellular user or D2D user, in an adaptive manner. Such an allocation avoids resource wastage and improves system throughput thereby enhancing the overall network performance.Display Omitted Fundamentals of D2D (Fundamental architecture, Classification on the basis of spectrum accessed and degree of involvement of base station, channel models).Proposed architecture for adaptive time slot allocation to all users (cellular as well as D2D users).Security in D2D communication: possible attacks, available literature and proposed solution for securing direct links using IP Sec.

References

[1]
Muraleedharan, Rajani, Lisa A. Osadciw, 2006. Jamming attack detection and countermeasures in wireless sensor network using ant system.¿In: Proceedings of the Defense and Security Symposium. International Society for Optics and Photonics.
[2]
3GPP TR 22.803, 2012. Feasibility study for proximity services (ProSe) (Release 12), v. 12. 2. 0, June
[3]
3GPP TR 23.703, 2013. Study on architecture enhancements to support proximity services (ProSe) (Release 12), v. 1. 0. 0, December.
[4]
Gjendemsjo, A., Gesbert, D., Oien, G.E., Kiani, S.G., 2006. Optimal power allocation and scheduling for two-cell capacity maximization. In: Proceedings of the International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks.
[5]
Abd-Elrahman, Emad, Hatem Ibn-khedher, Hossam Afifi. D2D group communications security. In: Proceedings of the 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), . IEEE, 2015.
[6]
Abd-Elrahman, Emad, et al., 2015. Fast group discovery and non-repudiation in D2D communications using IBE.¿In: Proceedings of the 2015 International'Wireless Communications and Mobile Computing Conference (IWCMC).
[7]
Akshita Abrol, Rakesh Kumar Jha, Power optimization in 5G networks: a step towards GrEEn communication, IEEE Access, 4 (2016) 1355-1374.
[8]
Gupta Akhil, Rakesh Kumar Jha, A survey of 5G network: architecture and emerging technologies, IEEE Access, 3 (2015) 1206-1232.
[9]
Alkurd, R., Shubair, R., Abualhaol, I., 2014. Survey on device-to-device communications: Challenges and design issues. In: Proceedings of the 2014 IEEE 12th International New Circuits and Systems Conference (NEWCAS). IEEE.
[10]
N.G.M.N. Alliance, 5G white paper, Gener. Mob. Netw. White Pap. (2015).
[11]
Alliance, W., 2010. Wi-Fi Peer-to-Peer (P2P) Specification v1. 1, WI-FI ALLIANCE SPECIFICATION, vol. 1, pp. 1-159.
[12]
Alliance, Z., 2006. Zigbee specification, Document 053474r06, Version, vol. 1
[13]
Arash Asadi, Qing Wang, Vincenzo Mancuso, A survey on device-to-device communication in cellular networks, IEEE Commun. Surv. Tutor., 16.4 (2014) 1801-1819.
[14]
Arash Asadi, Peter Jacko, Vincenzo Mancuso, Modeling multi-mode D2D communications in lte, arXiv Prepr. arXiv, 1405. (2014) 6689.
[15]
D. Astely, LTE release 12 and beyond, IEEE Commun. Mag., 51 (2013) 154-160.
[16]
B. Raghothaman et al., 2013. Architecture and protocols for LTE-based device to device communication.¿In: Proceedings of the ICNC,¿pp. 895-899
[17]
Bagheri, H. et al. 2015. Device-to-device proximity discovery for LTE systems. In: Proceedings of the 2015 IEEE International Conference on Communication Workshop (ICCW), . IEEE.
[18]
Bo Bai, Caching based socially-aware D2D communications in wireless content delivery networks: a hypergraph framework, IEEE Wirel. Commun., 23 (2016) 74-81.
[19]
X. Bao, U. Lee, I. Rimac, R.R. Choudhury, DataSpotting: offloading cellular traffic via managed device-to-device data transfer at data spots, ACM SIGMOBILE Mob. Comput. Commun., 14 (2010) 37-39.
[20]
Batista, R. et al. 2015. Interference Mitigation Using Band Selection for Network-Assisted D2D Communications. In: Proceedings of the 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).
[21]
Marco Belleschi, Benchmarking practical RRM algorithms for D2D communications in LTE advanced, Wirel. Pers. Commun., 82.2 (2015) 883-910.
[22]
Oladayo Bello, Sherali Zeadally, Intelligent Device-to-Device communication in the internet of things, IEEE Syst. J., 10 (2016).
[23]
Oladipupo Bello, Sherali Zeadally, Intelligent Device-to-Device communication in the internet of things, IEEE Syst. J. (2014).
[24]
Bluetooth, S., Bluetooth specification version 1.1, Available HTTP: {http://www.bluetooth.com}, 2001.
[25]
Bohmla¿nder, D. et al. 2015. Advantages in Crash Severity Prediction using Vehicle to Vehicle Communication. In: Proceedings of the 2015 IEEE International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE.
[26]
Botsov, Mladen, et al., 2014. Location dependent resource allocation for mobile device-to-device communications.¿In: Proceedings of the 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[27]
Xianghui Cao, On optimal device-to-device resource allocation for minimizing end-to-end delay in VANETs, IEEE Trans. Veh. Technol. (2016).
[28]
Inhyok Cha, Trust in M2M communication, IEEE Veh. Technol. Mag., 4.3 (2009) 69-75.
[29]
Chai, Yingqi, Qinghe Du, Pinyi Ren. 2013. Partial time-frequency resource allocation for device-to-device communications underlaying cellular networks. In: Proceedings of the 2013 IEEE International Conference on Communications (ICC).
[30]
V. Chandrasekhar, Z. She, Optimal uplink power control in two cell systems with rise-over-thermal constraints, IEEE Commun. Lett., 12 (2008).
[31]
Shih-Lung Chao, Bio-inspired proximity discovery and synchronization for D2D communications, IEEE Commun. Lett., 17 (2013) 2300-2303.
[32]
Chen, Biwei, Jun Zheng, Yuan Zhang, 2015. A time division scheduling resource allocation algorithm for D2D communication in cellular networks. In: Proceedings of the 2015 IEEE International Conference on Communications (ICC). IEEE.
[33]
Chen, Xue, Rose Qingyang Hu, Yi Qian, 2014. Distributed resource and power allocation for device-to-device communications underlaying cellular network. In: Proceedings of the 2014 IEEE Global Communications Conference (GLOBECOM).
[34]
Xiang Cheng, Device-to-device channel measurements and models: a survey, Communications, IET, 9.3 (2015) 312-325.
[35]
Cheng, Peng, et al., 2012 Resource allocation for cognitive networks with D2D communication: an evolutionary approach. In: Proceedings of the Wireless Communications and Networking Conference (WCNC), 2012 IEEE. IEEE.
[36]
Ciou, S. et al. 2015. Multi-sharing resource allocation for device-to-device communication underlaying 5G mobile networks. In: Proceedings of the 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2015 IEEE . IEEE.
[37]
Cisco, V.N.I., 2014. The Zettabyte Era: Trends and Analysis. Updated (29/05/2013),{http://www.cisco.com/c/en/us/solutions/collateral/serviceprovider/visual-networking-index-vni/VNI_Hyperconnectivity_WP}. html.
[38]
M. Scott Corson, Toward proximity-aware internetworking, IEEE Wirel. Commun., 17.6 (2010) 26-33.
[39]
Mischa Dohler, Takehiro Nakamura, 5G Mobile and Wireless Communications Technology, in: 5G Mobile and Wireless Communications Technology, Cambridge University Press, 2016.
[40]
Dongyu Wang, Wang, X., 2013. An interference management Scheme for device-to-device multicast spectrum sharing hybrid network. In: Proceedings of the 2013 IEEE 24rd International Symposium Personal Indoor and Mobile Radio Communications (PIMRC).
[41]
Doppler, K., Ribeiro, C., Kneckt, J., 2011. Advances in D2D communications: Energy efficient service and device discovery radio. In: Proceedings of the 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE). IEEE.
[42]
Du, J. et al. 2012. A compressed HARQ feedback for device-to-device multicast communications. In: Proceedings of the 2012 IEEE Vehicular Technology Conference (VTC Fall).
[43]
Waleed Ejaz, Najam ul Hasan, Hyung Seok Kim, Spectrum sensing in cognitive radio mobile Ad hoc networks: a survey, J. Korea Inst. Commun. Sci. Conf. (2011) 376-377.
[44]
Daquan Feng, Device-to-device communications underlaying cellular networks, IEEE Trans. Commun., 61.8 (2013) 3541-3551.
[45]
Daquan Feng, Device-to-device communications in cellular networks, IEEE Commun. Mag., 52.4 (2014) 49-55.
[46]
Fey, Simon, et al., 2012. Device-to-device communication for Smart Grid devices.¿In: Proceedings of the 2012 3rd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies (ISGT Europe). IEEE
[47]
Fodor, G., Reider, N., 2011. A distributed power control scheme for cellular network assisted D2D communications. In: Proceedings of the Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE. IEEE.
[48]
G.ábor Fodor, Design aspects of network assisted device-to-device communications, IEEE¿Commun. Mag., 50.3 (2012) 170-177.
[49]
G.ábor Fodor, Device-to-device communications for national security and public safety, IEEE Access, 2 (2014) 1510-1520.
[50]
G.ábor Fodor, An overview of device-to-device communications technology components in METIS, IEEE Access, 4 (2016) 3288-3299.
[51]
Fodor, Gabor, et al., 2013. A comparative study of power control approaches for device-to-device communications.¿In: Proceedings of the 2013 IEEE International Conference on Communications (ICC). IEEE, 2013.
[52]
M.R. Garey, D.S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness, W. H. Freeman and Co., 1979.
[53]
N. Golrezaei, A.F. Molisch, A.G. Dimakis, Base-station assisted device-to-device communications for high-throughput wireless video networks, Proc. IEEE ICC (2012) 7077-7081.
[54]
Maria Gregori, Wireless content caching for small cell and D2D networks, IEEE J. Sel. Areas Commun., 34.5 (2016) 1222-1234.
[55]
Kanika Grover, Alvin Lim, Qing Yang, Jamming and anti-jamming techniques in wireless networks: a survey, Int. J. Ad Hoc Ubiquitous Comput., 17 (2014) 197-215.
[56]
Bin Guo, Shaohui Sun, Qiubin Gao, Interference Management for D2D Communications Underlaying Cellular Networks at Cell Edge, ICWMC, 2015.
[57]
Akhil Gupta, Rakesh Kumar Jha, Power optimization using massive MIMO and small cells approach in different deployment scenarios, Wirel. Netw. (2016) 1-15.
[58]
Halperin, Daniel, et al., 2007. Interference Cancellation: Better Receivers for a New Wireless MAC. HotNets.
[59]
Hayami et al., 2015. Crash warning for intersection and head-on car collision in vehicle -to-vehicle communication. In: Proceedings of the¿International Conference on Connected Vehicles, (ICCVE), (2015).
[60]
Hong, J. et al. 2013. Analysis of Device-to-Device discovery and link setup in LTE networks. In: Proceedings of the 24th International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), 2013 IEEE. IEEE.
[61]
Ekram Hossain, Evolution toward 5G multi-tier cellular wireless networks: an interference management perspective, IEEE Wirel. Commun., 21.3 (2014) 118-127.
[62]
Rose Hu, Yi Qian, An energy efficient and spectrum efficient wireless heterogeneous network framework for 5G systems, Commun. Mag., 52.5 (2014).
[63]
Kennedy, J., 2010. Particle Swarm optimization. In: Encyclopedia of Machine Learning, Springer. pp. 760-766.
[64]
Janis, P. et al. 2009. "Interference-aware resource allocation for device-to-device radio underlaying cellular networks.¿In: Proceedings of the IEEE 69th Vehicular Technology Conference, 2009. VTC Spring 2009. IEEE.
[65]
Jänis, P. et al. 2009. Interference-avoiding MIMO schemes for device-to-device radio underlaying cellular networks. In: Proceedings of the IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.
[66]
Jayasinghe, K. et al. 2015.¿Physical layer security for relay assisted MIMO D2D communication. In: Proceedings of the IEEE 2015 IEEE International Conference on Communication Workshop (ICCW).
[67]
Yanxiang Jiang, Energy efficient joint resource allocation and power control for D2D communications, IEEE Trans. Veh. Technol. (2015).
[68]
X. Jin, J.G. Andrews, A. Ghosh, R. Ratasuk, An overview of 3GPP device-to-device proximity services, IEEE Commun. Mag. (2014).
[69]
Kai, Y. et al. 2008.¿Distributed robust optimization for communication networks. INFOCOM 2008. In: Proceedings of the 27th Conference on Computer Communications. IEEE. IEEE.
[70]
Kenney, John Francis, Ernest Sydney Keeping, 1954. Mathematics of statistics-part one.
[71]
Inhyoung Kim, In-Soon Park, Yong H. Lee, Use of linear programming for dynamic subcarrier and bit allocation in multiuser OFDM, IEEE Trans. Veh. Technol., 55.4 (2006) 1195-1207.
[72]
Kyung-Won Kim, Seong-Jun Oh, An efficient implementation of the ITU-R channel model for device-to-device simulation, IEEE Commun. Lett., 18.9 (2014) 1633-1636.
[73]
Kuang, Y., Lei, L., Zhong, Z., 2015.¿Delay-Optimal Distributed Resource Allocation for Device-to-Device Communications. In: Proceedings of the 2015 IEEE 82nd Vehicular Technology Conference (VTC Fall). IEEE.
[74]
Kwon, H., Lee, J., Kang, I., 2014. Interference-Aware Interference Mitigation for Device-to-Device Communications.¿In: Proceedings of the 2014 IEEE 79thVehicular Technology Conference (VTC Spring). IEEE.
[75]
Militano, L., Orsino, A., Araniti, G., Nitti, M., Atzori, L., Iera, A., 2016. Trusted D2D-based Data Uploading in In-band Narrowband-IoT with Social Awareness.¿In: Proceedings of the IEEE Workshop PIMRC.
[76]
Le, L., 2012.¿Fair resource allocation for device-to-device communications in wireless cellular networks. Global Communications Conference (GLOBECOM), 2012 IEEE. IEEE.
[77]
Dong Heon Lee, Two-stage semi-distributed resource management for device-to-device communication in cellular networks, IEEE Trans. Wirel. Commun., 13.4 (2014).
[78]
Namyoon Lee, Power control for D2D underlaid cellular networks: modeling, algorithms, and analysis, IEEE J. Sel. Areas Commun., 33.1 (2015) 1-13.
[79]
L. Lei, Operator controlled device-to-device communications in LTE-advancednetworks, IEEE Wirel. Commun., 19 (2012) 96-104.
[80]
J.C. Li, M. Lei, F. Gao, Device-to-device (D2D) communication in MU-MIMO cellular networks, Proc. IEEE GLOBECOM (2012) 3583-3587.
[81]
Li, Y. et al. 2015. Three-dimensional modeling, simulation and evaluation of Device-to-Device channels. In: Proceedings of the 2015 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting.
[82]
Li, Z. et al. 2014. Overview on initial METIS D2D concept. 5G for Ubiquitous Connectivity (5GU), 2014 In: Proceedings of the 1st International Conference on. IEEE.
[83]
Shao-Yu Lien, 3GPP device-to-device communications for beyond 4G cellular networks, IEEE Commun. Mag., 54.3 (2016) 29-35.
[84]
Lin, S. et al. 2013. Resource allocation using particle swarm optimization for D2D communication underlay of cellular networks. In: Poceedings of the¿Wireless Communications and Networking Conference (WCNC), 2013 IEEE. IEEE.
[85]
An Liu, Two timescale joint beamforming and routing for multi-antenna D2D networks via stochastic cutting plane, IEEE Trans. Signal Process., 63.18 (2015) 4854-4865.
[86]
Jia Liu, A resource reuse scheme of D2D communication Underlaying LTE network with Intercell interference, Commun. Netw., 5.03 (2013) 187.
[87]
Jiangchuan Liu, Device-to-device communication in LTE-advanced networks: a survey, IEEE Commun. Surv. Tutor., 17 (2014).
[88]
Yuanwei Liu, Secure D2D communication in large-scale cognitive cellular networks: a wireless power transfer model, IEEE Trans. Commun., 64 (2016).
[89]
Pavel Mach, Zdenek Becvar, Tomas Vanek, In-band device-to-device communication in OFDMA cellular networks: a survey and challenges, IEEE Commun. Surv. Tutor., 17.4 (2015) 1885-1922.
[90]
Meshgi, Hadi, Dongmei Zhao, Rong Zheng. Joint channel and power allocation in underlay multicast device-to-device communications. In: Proceedings of the¿2015 IEEE International Conference on Communications (ICC). IEEE, 2015.
[91]
L. Militano, A. Orsino, G. Araniti, M. Nitti, L. Atzori, A. Iera, Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems, Comput. Netw. (2016).
[92]
Militano, L., et al., 2015. Device-to-Device Communications for 5G Internet of Things.", IOT, EAI.
[93]
Hyunkee Min, Capacity enhancement using an interference limited area for device-to-device uplink underlaying cellular networks, IEEE Trans. Wirel. Commun., 10.12 (2011) 3995-4000.
[94]
Hasan Mohammed, Ekram Hossain, Distributed resource allocation for relay-aided device-to-device communication: a message passing approach, IEEE Wirel. Commun., 13.11 (2014) 6326-6341.
[95]
S. Mumtaz, K.M.S. Huq, J. Rodriguez, Direct mobile-to-mobile communication: Paradigm for 5G, IEEE Wireless Commun., 21 (2014) 14-23.
[96]
Namvar, N., Bahadori, N., Afghah, F., 2015. Context-aware D2D peer selection for load distribution in LTE networks. In: Proceedings of the 49th Asilomar Conference on Signals, Systems and Computers. IEEE.
[97]
Ngo, T., Kim, Y., 2015. Using Timing Advance to support proximity discovery in network-assisted D2D communication. In: Proceedings of the Seventh International Conference on Ubiquitous and Future Networks (ICUFN), 2015. IEEE.
[98]
Nguyen, P. et al. 2014. Network-assisted device discovery for LTE-based D2D communication systems. In: Proceedings of the 2014 IEEE International Conference on. Communications (ICC) IEEE.
[99]
Yiyang Ni, Beamforming and interference cancellation for D2D communication underlaying cellular networks, IEEE Trans. Commun., 64.2 (2016) 832-846.
[100]
Mahda Noura, Rosdiadee Nordin, A survey on interference management for device-to-device (D2D) communication and its challenges in 5G networks, J. Netw. Comput. Appl. (2016).
[101]
Aleksandr Ometov, A novel security-centric framework for D2D connectivity based on spatial and social proximity, Comput. Netw. (2016).
[102]
A. Ometovy, Towards trusted, social-aware D2D connectivity: bridging across technology and sociality realms, IEEE Wirel. Commun., PP (2016).
[103]
Ometovy, A., Orsino, A., 2016. Validating Information Security Framework for Offloading from LTE onto D2D Links. FRUCT In: Proceedings of the 18th Conference, /FRUCT-ISPIT.
[104]
Pappalardo, Irene, et al., 2016. Caching strategies in heterogeneous networks with D2D, small BS and macro BS communications. In: Proceedings of the 2016 IEEE International Conference on Communications (ICC).
[105]
C.S. Patel, G.L. Stuber, T.G. Pratt, Simulation of Rayleigh faded mobile-to-mobile communication channels, IEEE Trans. Commun., 53 (2005).
[106]
Mugen Peng, Device-to-device underlaid cellular networks under Rician fading channels, IEEE Trans. Wirel. Commun., 13.8 (2014) 4247-4259.
[107]
Adrian Perrig, John Stankovic, David Wagner, Security in wireless sensor networks, Commun. ACM, 47.6 (2004) 53-57.
[108]
Phond Phunchongharn, Ekram Hossain, Dong In Kim, Resource allocation for device-to-device communications underlaying LTE-advanced networks, IEEE Wirel. Commun., 20.4 (2013) 91-100.
[109]
N.K. Pratas, P. Popovski, Low-rate machine-type communication via wireless device-to-device (D2D)links, arXiv Prepr. arXiv, 1305. (2013) 6783.
[110]
Gandotra Pimmy, Kumar Jha Rakesh, Device-to-Device Communication in Cellular Networks: A Survey, J. Netw. Comput. Appl. (2016).
[111]
Pratas, Nuno K., Petar Popovski, 2015 "Network-Assisted Device-to-Device (D2D) Direct Proximity Discovery with Underlay Communication. In: Proceedings of the IEEE GLOBECOM.
[112]
Rêgo, Márzio G. da S., et al., 2012 "Performance analysis of power control for device-to-device communication in cellular MIMO systems.¿In: Proceedings of the 2012 International Symposium on Wireless Communication Systems (ISWCS). IEEE.
[113]
Yi Ren, Power control in D2D-based vehicular communication networks, IEEE Trans. Veh. Technol., 64.12 (2015) 5547-5562.
[114]
Hakola, S., Chen, T., Lehtom¿aki andki, J., Koskela, T., 2010. Device-todevice (D2D) communication in cellular network-performance analysis of optimum and practical communication mode selection. In: Proceedings of the IEEE Wireless Communications and Networking Conference, 2010
[115]
Shen, Wenlong, et al., 2014 "Secure key establishment for device-to-device communications. In: Proceedings of the 2014 IEEE Global Communications Conference (GLOBECOM).
[116]
Shin, Wonjae, KyungHun Jang,¿Hyun-Ho Choi, 2013. Device-to-device communication assisted interference mitigation for next generation cellular networks. In: Proceedings of the 2013 IEEE International Conference on Consumer Electronics (ICCE).
[117]
da Silva, J.M.B. et al., 2014. Performance analysis of network-assisted two-hop D2D communications, Globecom Workshops, December.
[118]
Jose Mairton B. da Silva, G.ábor Fodor, A binary power control scheme for D2D communications, IEEE Wirel. Commun. Lett., 4.6 (2015) 669-672.
[119]
Hojin Song, Joint power and rate control for device-to-device communications in cellular systems, IEEE Trans. Wireless Commun., 14.10 (2015) 5750-5762.
[120]
Lingyang Song, Game-theoretic resource allocation methods for device-to-device communication, IEEE Wirel. Commun., 21.3 (2014) 136-144.
[121]
Sun, Q. et al. 2015.¿Energy efficient incentive resource allocation in D2D cooperative communications. In: Proceedings of the¿2015 IEEE International Conference on Communications (ICC). IEEE.
[122]
Wanlu Sun, Cluster-based radio resource management for D2D-supported safety-critical V2X communications, IEEE Trans. Wirel. Commun., 15.4 (2016) 2756-2769.
[123]
Koskela, T., Hakola, S., Chen, T.,¿Lehtomaki, J., 2010. Clustering concept using device-to-device communication in cellular system. In: Proceedings of the IEEE Wireless Communications and Networking Conference.
[124]
Huan Tang, Zhi Ding, Bernard C. Levy, Enabling D2D communications through neighbor discovery in LTE cellular networks, IEEE Trans. Signal Process., 62.19 (2014) 5157-5170.
[125]
Rui Tang, Jihong Zhao, Hua Qu, Joint optimization of channel allocation, link assignment and power control for device-to-device communication underlaying cellular network, Communications, 12.12 (2015) 92-100.
[126]
Tata, C.H.A.F.I.K.A., Kadoch, M.I.C.H.E.L., 2014. Secure network coding based data splitting for public safety D2D communications over LTE heterogeneous networks. In: Proceedings of the 14th IEEE International Conference on Computer and Information Technology (CIT'14).
[127]
Technical Specification Group Services and System Aspects, 2014 Proximity-Based services (ProSe); Stage 2 (Release 12), 3GPP TS 23.303 V12.1.0,Jun.
[128]
Mohsen Tehrani, Mustafa Nader, Uysal, Halim Yanikomeroglu, Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions, IEEE Commun. Mag., 52.5 (2014) 86-92.
[129]
Urama, Jani, et al., 2016.¿Dynamic Social Trust Associations over D2D Communications: An Implementation Perspective. In: Proceedings of the¿5th IEEE International Conference on Mobile Services. San Francisco: InterContinental Mark Hopkins San Francisco. s. 186-189
[130]
Muhammad Usman, A software-defined device-to-device communication architecture for Public safety applications in 5GNetworks, IEEE Access, 3 (2015) 1649-1654.
[131]
Wang, H., Chen, J., Liu, Z., 2013.¿Resource allocation in central-controlled Device-to-Device communications networks. Global Communications Conference (GLOBECOM), 2013 IEEE. IEEE.
[132]
Wang, L. et al. 2015.¿Secrecy-oriented partner selection based on social trust in device-to-device communications. In: Proceedings of the 2015 IEEE International Conference on Communications (ICC).
[133]
Li Wang, Huaqing Wu, Jamming partner selection for maximising the worst D2D secrecy rate based on social trust, Trans. Emerg. Telecommun. Technol. (2015).
[134]
Qijie Wang, Quality-optimized joint source selection and power control for wireless multimedia D2D communication using stackelberg game, IEEE Trans. Veh. Technol., 64 (2014).
[135]
Wang, Bin, et al., 2011. Resource allocation optimization for device-to-device communication underlaying cellular networks. Vehicular Technology Conference (VTC Spring), 2011 IEEE 73rd. IEEE, 2011.
[136]
Wang, Mingjun,¿Zheng Yan, 2015. Security in D2D Communications: A Review. Trustcom/BigDataSE/ISPA, 2015 IEEE. Vol. 1. IEEE.
[137]
Warabino, T. et al. 2005. Adaptive media switching for future vehicle-to-vehicle communication. In: Proceedings of the 16th International Symposium on Personal, Indoor and Mobile Radio Communications, 2005. PIMRC. Vol. 2.
[138]
Weijun, X. et al. 2014. Resource allocation schemes for D2D communication used in VANETs.In: Proceedings of the 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall). IEEE.
[139]
Wen, S., Zhu, X., Lin, Z., Zhang, X., Yang, D., 2012.Optimization of interference coordination schemes in device -to-device (D2D) communication.¿In: Proceedings of the 7th International ICST Conference on Communications and Networking in China (CHINACOM). pp. 542-547.
[140]
Dan Wu, The role of mobility for D2D communications in LTE-advanced networks: energy vs¿bandwidth efficiency, IEEE Wirel. Commun., 21.2 (2014) 66-71.
[141]
Wu, H. et al. 2016. Resource allocation for wireless caching in socially-enabled D2D communications. In: Proceedings of the 2016 IEEE International Conference on Communications (ICC). IEEE.
[142]
Wu, X., Tavildar, S., Shakkottai, S., Richardson, T., Li, J., Laroia, R., Jovicic, A., 2010. FlashLinQ: A synchronous distributed scheduler for peer-to-peer ad hoc networks. In: Proceedings of the IEEE Allerton Conference on Communication, Control and Computing, pp. 514-521.
[143]
Sa Xiao, Energy-efficient mobile association in heterogeneous networks with device-to-device communications, IEEE Trans. Wirel. Commun., 15 (2016) 5260-5271.
[144]
Xiao, X., Tao, X., Lu, J., 2011. A QoS-aware power optimization scheme in OFDMA systems with integrated device-to-device (D2D) communications.¿In: Proceedings of the 2011 IEEE Vehicular Technology Conference (VTC Fall)
[145]
Hao Xu, Pilot allocation and PowerControl in D2D underlay massive MIMO systems, IEEE Commun. Lett. (2016).
[146]
Mi. Jeong Yang, Solving the data overload: device-to-device bearer control architecture for cellular data offloading, IEEE Veh. Technol. Mag., 8.1 (2013) 31-39.
[147]
Rui Yin, Pricing-based interference coordination for D2D communications in cellular networks, IEEE Trans. Wirel. Commun., 14.3 (2015) 1519-1532.
[148]
Yu, C.-H., Doppler, K., Ribeiro, C., Tirkkonen, O., 2009. Power optimization of device-to-device communication underlaying cellular communication systems. In: Proceedings of the IEEE International Conference on Communications, June.
[149]
Yu, Chia-Hao, Olav Tirkkonen, 2012. Device-to-device underlay cellular network based on rate splitting. In: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC).
[150]
Jianting Yue, Secrecy-based access control for device-to-device communication underlaying cellular networks, IEEE Commun. Lett., 17.11 (2013) 2068-2071.
[151]
Aiqing Zhang, SeDS: secure data sharing strategy for D2D communication in LTE-AdvancedNetworks, IEEE Trans. Veh. Technol. (2015).
[152]
Bo Zhang, Energy-efficient architecture and technologies for device to device (D2D) based proximity service, China Commun., 12.12 (2015) 32-42.
[153]
Zhang, H. et al. 2014. Radio resource allocation for physical-layer security in D2D underlay communications.¿In: Proceedings of the¿2014 IEEE International Conference on Communications (ICC). IEEE.
[154]
Zhang, J. et al. 2013. Utility-maximization resource allocation for device-to-device communication underlaying cellular networks. Globecom Workshops (GC Wkshps), 2013 IEEE. IEEE.
[155]
Zhang, R., Cheng, X., Yang, L., 2015. Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-DeviceCommunications Underlaying Cellular Networks. In: Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM). IEEE.
[156]
Zhang, R., Cheng, X., Yang, L., 2016. Joint power and access control for physical layer security in D2D communications underlaying cellular networks.¿In: Proceedings of the IEEE International Conference on Communications (ICC). IEEE.
[157]
Zhang, Rongqing, et al., 2013. Distributed resource allocation for device-to-device communications underlaying cellular networks. In: Proceedings of the 2013 IEEE International Conference on Communications (ICC). IEEE, 2013.
[158]
Zheng, J., Chen, B., Zhang, Y., 2015.¿An Adaptive Time Division Scheduling Based Resource Allocation Algorithm for D2D Communication Underlaying Cellular Networks. In: Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM). IEEE.
[159]
Bin Zhou, Intracluster device-to-device relay algorithm with optimal resource utilization, IEEE Trans. Veh. Technol., 62.5 (2013) 2315-2326.
[160]
Zhou, L., Ruttik, K., Tirkkonen, O., 2015. Interference canceling power optimization for device to device communication. In: Proceedings of the 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).
[161]
Yun Zhou, Yuguang Fang, Yanchao Zhang, Securing wireless sensor networks: a survey, IEEE Commun. Surv. Tutor., 10.3 (2008) 6-28.
[162]
Zhenyu Zhou, Iterative energy-efficient stable matching approach for context-aware resource allocation in D2D communications, IEEE Access (2016).
[163]
Kingsley Jun Zou, Proximity discovery for device-to-device communications over a cellular network, IEEE Commun. Mag., 5 (2014) 98-107.

Cited By

View all
  • (2024)Interference-Aware Resource Allocation Algorithm for D2D-Enabled Cellular Networks Using Matching TheoryIEEE Transactions on Network and Service Management10.1109/TNSM.2023.328399321:1(759-772)Online publication date: 1-Feb-2024
  • (2024)Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPANWireless Networks10.1007/s11276-024-03680-x30:4(2477-2509)Online publication date: 1-May-2024
  • (2023)Drone cybersecurity issues, solutions, trend insights and future perspectives: a surveyNeural Computing and Applications10.1007/s00521-023-08857-735:31(23063-23101)Online publication date: 31-Aug-2023
  • Show More Cited By
  1. A survey on device-to-device (D2D) communication

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Journal of Network and Computer Applications
      Journal of Network and Computer Applications  Volume 78, Issue C
      January 2017
      313 pages

      Publisher

      Academic Press Ltd.

      United Kingdom

      Publication History

      Published: 15 January 2017

      Author Tags

      1. Device-to-device (D2D) communication
      2. InternetProtocol Security (IP Sec)
      3. Resource allocation
      4. Security
      5. Spectral efficiency

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 16 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Interference-Aware Resource Allocation Algorithm for D2D-Enabled Cellular Networks Using Matching TheoryIEEE Transactions on Network and Service Management10.1109/TNSM.2023.328399321:1(759-772)Online publication date: 1-Feb-2024
      • (2024)Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPANWireless Networks10.1007/s11276-024-03680-x30:4(2477-2509)Online publication date: 1-May-2024
      • (2023)Drone cybersecurity issues, solutions, trend insights and future perspectives: a surveyNeural Computing and Applications10.1007/s00521-023-08857-735:31(23063-23101)Online publication date: 31-Aug-2023
      • (2022)A Taxonomy and Analysis on Internet of VehiclesWireless Communications & Mobile Computing10.1155/2022/92327842022Online publication date: 1-Jan-2022
      • (2022)Machine Learning Methods for Intrusive Detection of Wormhole Attack in Mobile Ad Hoc Network (MANET)Wireless Communications & Mobile Computing10.1155/2022/23757022022Online publication date: 1-Jan-2022
      • (2022)Multi-Channel Authentication for Secure D2D using Optical Camera Communication2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC)10.1109/CCNC49033.2022.9700695(858-863)Online publication date: 8-Jan-2022
      • (2022)Deep Learning Approach for Encryption Techniques in Vehicular NetworksWireless Personal Communications: An International Journal10.1007/s11277-022-09538-9125:1(1-27)Online publication date: 1-Jul-2022
      • (2022)Security aspects of device-to-device (D2D) networks in wireless communication: a comprehensive surveyTelecommunications Systems10.1007/s11235-022-00954-781:4(625-642)Online publication date: 1-Dec-2022
      • (2022)Joint optimal power allocation for D2D groups and underlaid non-orthogonal multiple access cellular usersTelecommunications Systems10.1007/s11235-019-00573-972:3(365-375)Online publication date: 11-Mar-2022
      • (2022)A security protocol for D2D communications in 5G networks using elliptic curve cryptographyInternational Journal of Information Security10.1007/s10207-022-00620-821:6(1389-1408)Online publication date: 1-Dec-2022
      • Show More Cited By

      View Options

      View options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media