You are on page 1of 29

Ad Hoc Networks 94 (2019) 101938

Contents lists available at ScienceDirect

Ad Hoc Networks
journal homepage: www.elsevier.com/locate/adhoc

A primer on design aspects, recent advances, and challenges in


cellular device-to-device communication
Oluwatosin Ahmed Amodu a,∗, Mohamed Othman a,b,∗, Nor Kamariah Noordin c,
Idawaty Ahmad a
a
Department of Communication Technology and Network, Universiti Putra Malaysia, 43400 UPM, Serdang, Selangor D.E., Malaysia
b
Laboratory of Computational Science and Mathematical Physics, Institute for Mathematical Research (INSPEM), Universiti Putra Malaysia, 43400 UPM,
Serdang, Selangor D.E., Malaysia
c
Department of Computer and Communication Systems Engineering, Faculty of Engineering, Universiti Putra Malaysia, 43400 UPM, Serdang, Selangor D.E.,
Malaysia

a r t i c l e i n f o a b s t r a c t

Article history: Device-to-Device (D2D) communication is one of the technologies on the spotlight for enhancing the
Received 23 February 2019 cellular network performance towards the fifth generation wireless systems. It has diverse potentials to
Revised 16 May 2019
cater for both critical and non-critical applications. For example, timely information dissemination can be
Accepted 27 June 2019
achieved during disasters using D2D communication. Also, content sharing and real-time applications can
Available online 28 June 2019
be effectively facilitated. Recently, new applications and technologies are beginning to embrace D2D to
Keywords: further improve their performance in terms of spectral efficiency, latency, and energy efficiency. However,
D2D this is not bereft of technical challenges due to the peculiar limitations of traditional D2D communication
Interference such as interference. In this paper, we focus on techniques for managing these challenges with regards
Metrics to mode selection, power control, and resource allocation. As compared with other contemporary works
Mode selection on this subject, we discuss these issues in line with some of the most recent research trends. In addition,
Power control
we compile pertinent design considerations of D2D discussed in literature while extracting new patterns
Resource allocation
to familiarize readers with applications, models, methods and metrics studied lately. Furthermore, we
highlight and classify some of the key challenges of D2D communication with respect to current and fu-
ture generation cellular technologies, giving a comprehensive outlook of new research problems recently
identified in this area.
© 2019 Elsevier B.V. All rights reserved.

1. Introduction core network in D2D communication [5–7]. This improves network


performance. Mobile operators can as well generate more revenue
Device-to-Device (D2D) communication coexisting with cellular through charges for D2D subscribers [8,9]. From the users perspec-
networks is attracting a lot of attention in academia and industry tive, it is advantageous since they can receive incentives when they
nowadays. This is due to its potential to leverage device proxim- relay data to other users [9]. Thus, D2D communication is con-
ity to increase the energy efficiency of the network. Similarly, it sidered an integral component of future fifth generation (5G) net-
can facilitate spectral reuse and hop gains [1–3]. D2D finds great works providing another network-tier and facilitating spectral re-
prospects to improve the spectral efficiency of the network when source reuse [6,10].
considering that most mobile users use applications with high data Another driving force behind the need for D2D communication
rates such as video sharing and proximity-aware social networking is the drastic increase in data traffic and content sharing among
[4]. mobile users. These contents demand high data rates and huge
In traditional networks, devices communicate through the base bandwidth as seen in video streaming and mobile computing. With
station (BS) even when they are very close to each other. Mean- the rate of traffic growth, it is onerous for the current cellular sys-
while, devices make mutual communication without traversing the tems to cope with this increase in traffic [11]. D2D communication
also comes with improved network performance in other aspects

Corresponding author. such as reduced delay, improved coverage, energy efficiency, in-
E-mail addresses: amoduahmedtosin@gmail.com, amodu_oa@ieee.org (O.A. creased throughput, reduced latency, improved fairness, and better
Amodu), mothman@upm.edu.my (M. Othman), nknordin@upm.edu.my (N.K. No- resource usage [4,6,7,12,13]. Similarly, in a controlled environment
ordin), idawaty@upm.edu.my (I. Ahmad).

https://doi.org/10.1016/j.adhoc.2019.101938
1570-8705/© 2019 Elsevier B.V. All rights reserved.
2 O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938

ity of devices proximity. Several technical issues related to D2D


communication, especially in Long-Term Evolution (LTE)/Long-Term
Evolution-Advanced (LTE-A) networks are due to its low level of
maturity.
A good glimpse of the D2D communication paradigm, its fun-
damental aspects and associated issues in light of current research
trends will require an exhaustive examination of several portions
of current literature. This motivates us to present a primer dis-
cussing some of the design guidelines, key aspects, and recent
trends in D2D communication research. In contrast to previous sur-
veys (Table 1), we focus on some of the most recent developments
in mode selection, resource allocation and power control which are
key to addressing the interference challenge in D2D communica-
tion. These three aspects are essential for optimizing network per-
formance [46].
Mode selection is the process of determining which mode a
particular D2D pair should communicate [46]. As such it sprouts
Fig. 1. Typical D2D communication scenarios with one base station in each cell. from the different mode choices available to devices for commu-
nication and aids energy efficiency [14]. It goes a long way to de-
where D2D underlays cellular networks, higher service guarantees termine the increase/decrease in frequency reuse factor and also
can be provided [14]. impacts the level of interference between cellular and D2D users
From an architectural point of view, D2D pairs may function [1]. Resource allocation involves strategies for allocating resources
autonomously while being partly or fully controlled by the oper- (such as time and frequency) to different user devices which is
ators. It can be used with other cooperative communication tech- highly essential to meet the instantaneous increase in resource de-
nologies such as the Internet of Things (IoT) and cognitive radios to mand [40]. Efficient resource allocation has the potential to achieve
enhance the spectral efficiency of the network. Also in centralized a better Quality of Service (QoS) for cellular and D2D users [47].
networking to improve network performance under the control of Through power control, the transmit power levels of D2D user
the network operator [6]. A multihop D2D cooperative communi- equipments (DUEs) and BS are adjusted in the uplink and down-
cation could be used to extend coverage during emergencies in no- link, respectively [14,40] to meet the network QoS requirement.
coverage zones and coverage-holes. For instance, Shaikh and Wis- With regards to these aspects, we summarize recent research
müller [9] mentioned the role of non-governmental organizations in terms of their application target, model, method and metrics
during disasters to provide communication services. To cater for considered. Distinctively from other surveys that have jointly dis-
the arrival delay in such services, local personnel can give first-aid cussed mode selection, power control and resource allocation (e.g.
to the injured and affected people by discovering proximate de- [1,2,30,40,42]), we present the fundamental design considerations
vices using D2D communication. They can also communicate with and also reveal new research challenges (see Table 2). In addi-
other concerned entities (such as close relatives and other person- tion, most of the articles referred to are very recent and have
nel) utilizing multihop D2D communication. not been reviewed prior to this survey. We exclude some of the
Other desired goals achievable by D2D communication are load early research papers which have been discussed severally in other
management and load balancing. To increase coverage and capac- surveys and introduce the most recent directions associated with
ity, devices having better coverage can function as relay nodes to the new paradigms where D2D communication would play vi-
support other user equipment (UE) having low coverage [13] as tal roles. Among these are caching, cloud radio access networks
depicted in Fig. 1 which is inspired by [1]. After frequency bands (C-RANs), edge-computing, simultaneous wireless information and
are properly allocated to D2D pairs and interference is managed, power transfer (SWIPT), multiple-input-multiple-output (MIMO),
it is possible to achieve network-wide performance optimization Fog computing and UAVs. The overall objective of this work is to
with the help of the operator. Common links among traffic routes present a concise precursory material that embraces the key is-
of several D2D pairs can be created to maximize the benefit of sues of D2D communication and some of the most recent trends
network coding techniques by properly allocating time-slots or in this area while presenting a rich set of design guidelines, chal-
scheduling transmissions for D2D communication [4,15]. Similarly, lenges and research directions to researchers interested in cellular
the backhaul reduction of small cells such as femtocells, eases D2D D2D communication.
discovery in some cases since users can be assumed to be in prox- The rest of this paper is organized as follows: The remaining
imity when they are served by small cells due to the small radii of of Section 1 briefs the origin of D2D communication, its similari-
those cells [1]. ties and differences with other networks, and its application use-
Despite the merits of D2D communication, it comes with sev- cases. A discussion on the classification of D2D communication is
eral challenges. One of the key concerns is the interference which presented in Section 2. Duplexing and issues related to network
occurs when D2D devices share spectrum with cellular users. control are also discussed in this section. Section 3 is dedicated
Although D2D can be used to effectively offload cellular data traf- to interference in D2D communication. The design aspects of D2D
fic and improve capacity and coverage, devices have a short com- communication relating to mode-selection, resource allocation, and
munication range which limits their performances and possibly in- power control are presented in Section 4. Recent works in this re-
creases interference [16]. Poor interference control could degrade gard are systematically summarized and harmonized. Challenges
the overall cellular network efficiency and capacity [2]. Similarly, associated with D2D communication are indicated in Section 5.
interference mitigation may require very complex techniques that Section 6 concludes this paper.
are difficult to implement in real network deployments [1]. An-
other major concern is that devices must continually discover each 1.1. Brief origin of D2D communication
other before they can communicate. During the discovery process,
devices must check for service compatibility as well as range [14]. With the second generation (2G), the existence of digital cel-
A sizeable density of devices is required to increase the probabil- lular communication began. The need then was to cater for a
O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938 3

Table 1
Overview of previous surveys on D2D based on year published. ( indicates journal publication.)

Year Brief description of the survey.

[4] is the first survey on D2D communication underlay and overlay.


[7] surveys D2D research and prototypes in LTE/LTE-A.
[14] examines technical challenges, standard advancements and research aspects of D2D underlay cellular networks.
2014 [17] overviews intelligent D2D communication for IoT with a focus on the deployment of existing routing algorithms.
[18] surveys global network offloading strategies. One of such is D2D communication.
[19] examines cooperative communication in D2D-assisted networks and associated challenges.
[20] reviews cooperative communication in D2D.

[1] surveys in-band D2D communication with a focus on 3GPP LTE/LTE-A.


[10] surveys control and data planes separation architecture, coordinated multipoint and D2D.
2015 [21] reviews research on D2D channel models.
[22] analyzes D2D security architecture in 3GPP LTE/LTE-A.
[23] overviews applications and advantages of interference alignment in D2D communication.

[24] discusses LTE-D2D application in neighborhood area networks and its applicabilityto power distribution grid.
[6] surveys D2D with a proposed D2D architecture. It also discusses security with a proposed solution which uses Internet Protocol Security.
2016 [25] reviews D2D research based on frequency and control.
[26] surveys D2D and ‘integrant’ technologies such as mmWave D2D, ultra-dense networks, cognitive D2D and handover in D2D.
[27] describes mmWave propagation for D2D communication.

[28] reviews security and privacy in D2D communication.


[29] examines D2D interference management, network discovery, proximity services and security.
[30] reviews optimization techniques for resource allocation in D2D communication.
[31] reviews and classifies proposed solutions for security in D2D.
[32] considers 3GPP LTE security architecture and requirements for D2D communication.
2017 [33]surveys D2D resource allocation with respect to optimization techniques and features.
[12] surveys D2D resource allocation, interference management, and mode selection.
[34] overviews D2D features and use cases.
[35] examines the application of D2D to recent solutions for LTE in unlicensed 5GHz band and its impact on the network.
[36] reviews relay selection techniques in D2D communication for 5G cellular networks.
[37] surveys distributed resource allocation schemes for D2D communication in cellular networks.

[38] reviews recent status of D2D with respect to 3GPP standardization.


[39] discusses approaches for implementing NOMA-based D2D in 5G and IoT.
[40] surveys research issues and challenges in D2D communication.
2018
[11] surveys and classifies socially-aware D2D communication with a discussion on its associated challenges.
[9] examines and classifies routing schemes for multihop D2D communication.
[41] surveys resource allocation methods, power conservation techniques and security mechanisms.

[42] surveys the prospects of social-ties on improving D2D communication as well as associated research gaps.
[43] surveys device discovery for D2D communication in terms of processes, methods, challenges and potential solutions with a proposed device
2019
discovery technique.
[44] studies challenges, research gaps and open issues relating to the integration of D2D and ultra-dense networks.
[45] reviews mobility-aware D2D communication and its associated problems and potential solutions.

few subscribers and provide voice and data services [6]. As time cation [4]. Unlike CRNs which are fully autonomous, D2D is mostly
passed by, a diverse need arose for data sharing from the existing managed by the network [1,52]. CRNs improve spectrum efficiency
2G till the fourth generation (4G). D2D communication originated from time and channel perspective while D2D could improve spec-
from adhoc and personal area networks in unlicensed Industrial trum utility from a space perspective. MANETs use the unlicensed
Scientific Medical (ISM) bands [10]. It was first proposed in the spectrum but D2D communication may work in the licensed or un-
academia in [48] so that multihop relays could be enabled in cellu- licensed band in different use-cases [28,32].
lar networks. The authors of [49] investigated its use in improving As compared with D2D communication which is mainly used
the throughput of cellular networks. As interference management for content sharing, Machine-to-machine (M2M) communication
is crucial to D2D communication in cellular networks, [50] stud- is mostly used for automatic collection and delivery of measure-
ied interference management in such a hybrid scenario. Currently, ment information [28,32]. M2M communication does not have dis-
D2D is supported in the 3rd Generation Partnership Project (3GPP) tance restrictions for mutual communication, however, commu-
to address the social and technological needs and provide support nication has to be routed through core networks, BS and M2M
for proximity-based services (ProSe) [1]. A feasibility study in this servers when machine devices connect; even when they are close
regard was presented in [51]. [28]. On the other hand, D2D is technology-dependent since it is
focused on connecting close devices while M2M is technology-
1.2. Between D2D communication and other networks independent and more application-based [4]. Bluetooth basically
uses the ISM band for data transmission between devices [53].
D2D is different from other networks from a number of angles. Wireless personal area networks (WPAN) and wireless local area
To begin with, cellular communication only occurs through BS in- network (WLAN) work in license-exempt band and support low-
tervention even when devices are close to each other, however di- cost local services. D2D however, enhances cellular spectral effi-
rect communication between devices can occur in D2D without ciency as it allows mutual device transmission in the cellular spec-
any major BS intervention [12]. D2D differs from Mobile Adhoc trum [6].
Networks (MANETs) and Cognitive Radio Networks (CRNs) in the
sense that the cellular network is involved in the control plane 1.3. Applications of D2D communication
of the communication network [4,6]. Also, challenges associated
with MANETs and CRNs such as detection of white space, colli- D2D communication can be used for commercial and pub-
sion avoidance, and synchronization are settled in D2D communi- lic safety purposes. A crucial objective of commercial D2D is
4 O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938

Ours




















[42]




[40]


[33]



[32]


[31]

Fig. 2. Some typical use cases of D2D communication.


[30]


[29]

meeting the QoS requirement of users to a reasonable level. The


public safety category of D2D helps to ensure that users out-


[28]

side the eNodeB coverage area are able to get reliable service.

Such cases could occur in areas where there are no network in-
frastructures; for example where the BS is destroyed as a result
[26]

of a disaster. D2D should incorporate other network technologies



such as unmanned aerial vehicles and movable deployable resource


[25]

units to connect such affected areas to ‘healthy’ unaffected ar-



eas [13,54,55]. Typical applications of D2D are cellular offloading


[17]

(where D2D is used to offload traffic from the BS [40]), multicas-


ting, video transmission and M2M communication (Fig. 2). Others


include gaming, public safety/national security, vehicle-to-vehicle
[14]

(V2V) communication and Internet-of-vehicles (IoV) [1,13,26].


3GPP has considered using LTE to connect vehicles and road-
[12]

side infrastructure (RSI) in vehicular communication [13]. A num-


Scope of challenges discussed in this survey compared with previous related surveys.

ber of cases considered by 3GPP for the LTE-based broadband


[11]

service and proximity service (i.e. LTE V2X) include V2V, vehicle-



to-device (such as devices carried by pedestrians, passengers and


[7]

drivers) and vehicle-to-infrastructure communications [56]. Proac-


tive caching for improving users quality of experience (QoE) as


[6]

well as mobile cloud computing are other typical applications



of D2D communication. Asides the aforementioned, D2D can be


References

[4]

used for proximity services such as proximity-based advertisement



where access points detect D2D users and send enticing advertise-
[1]

ment messages [6,13,57].



Energy Consumption
Resource Allocation

2. D2D classification
Energy Harvesting
Device Discovery
Mode Selection
Management

UAV-assisted
Social-aware
Interference

Several classifications of D2D communication is possible [1]. For


Challenges

Modelling

mmWave

In C-RAN
Relaying
Mobility

In UDNs

instance, D2D communication can be classified based on the spec-


Security

HetNets

Caching
In Edge
SWIPT

In Fog
MIMO

trum accessed by device users, duplexing, number of hops, and


CSI

level of control. Figs. 3(a) and (b) show a typical classification and
spectrum partition model, respectively based on Refs. [1,4,9,10].
Emerging
Classical

2.1. D2D communication modes


Table 2

As regards the spectrum usage, D2D communication is referred


to as inband in the licensed spectrum while it is outband in the
unlicensed spectrum. The inband consists of underlay and overlay
modes [1]. When devices cannot communicate in D2D mode, com-
munication is done via the BS as it occurs in traditional cellular
networks i.e., cellular mode.
O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938 5

Fig. 3. (a) D2D classification and (b) spectrum partition model.

2.1.1. Inband D2D • Power control and interference management techniques are
In inband D2D, the resource allocation could be centralized usually characterized by high complexity resource allocation so-
or distributed. For a centralized scheme, the eNodeB controls re- lutions.
source allocation while D2D users allocate resources in distributed • Simultaneous D2D and cellular transmission cannot be per-
resource allocation [13]. A driving force for the utilization of in- formed by a D2D user.
band D2D is the high control of licensed spectrum. D2D shares the • Resource utilization and spectrum efficiency are less in overlay
same radio resources with cellular users in underlay inband while mode.
they are allocated dedicated cellular resources in overlay commu-
nication. Like wireless fidelity (Wi-Fi) and LTE, devices require two 2.1.2. Outband D2D
wireless interfaces for overlay D2D [6]. The interference caused by Eliminating the interference that occurs between cellular and
D2D to cellular UE and cellular UE to D2D is the major drawback of D2D links is the motivation for outband D2D [4]. Thus, the unli-
inband D2D. Mitigating this interference may require complex re- censed spectrum is used to zero-down the interference between
source allocation schemes which increases the computational over- cellular and D2D users. TV white space is an example of an un-
head of D2D user or BS. Inband D2D has the following merits licensed spectrum which can be used by cellular users for short-
[4,6,13]: range D2D communication. It is advantageous because it is energy-
efficient and D2D can enjoy higher transmission range. This is
• Spatial diversity can be exploited by D2D underlay to increase because it has better propagation characteristics when compared
spectral efficiency. The underlay mode can use uplink or down- with 2.4 and 5GHz unlicensed band. Asides the aforementioned,
link similar to overlay. A benefit of this is that the reuse factor outband D2D scheduler does not have to put time, frequency and
in underlay is higher than a cellular or overlay mode. geographical location into consideration, which makes resource al-
• Inband D2D can be supported by any cellular device since out- location less complex [13]. Outband D2D can be controlled or
band frequencies are not usually supported by the cellular in- autonomous when the radio interface is BS-coordinated or user-
terface. coordinated, respectively. Outband D2D schemes are prone to be-
• Cellular spectrum can be fully managed by the BS which makes come more popular in the coming years when smartphones are
it easier for QoS management. equipped with multiple wireless interfaces [4]. On the other hand,
• Since the D2D communication is controlled by the cellular net- outband D2D has a number of demerits [4,13] some of which
work, sophisticated resource allocation and interference mitiga- are:
tion techniques can be used for guaranteeing QoS within the • BS does not control interference in unlicensed spectrum.
network. • Outband can only be used by cellular users possessing two in-
terfaces.
Inband D2D has a number of demerits including the following • Power consumption by devices may be high due to inefficient
[12,13]: management of power between two interfaces.
• As protocols used by different radio interfaces are not the same,
• Cellular resources could be wasted in overlay mode. packets (header at least) have to be encoded and decoded.
• In underlay mode, managing interference poses serious chal- • QoS cannot be fully guaranteed since interference is beyond eN-
lenges. odeB control.
6 O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938

• Similar to Bluetooth and Wi-Fi, the discovery process and setup the discrepancies in its transmit and receive signal powers having
connection in outband D2D is complex because it requires user a rating of over 100dB. A significant approach towards alleviating
intervention. self-interference is reducing its transmit power. A reconfigurable
• Operating in ISM band, interference of outband D2D will affect topology of D2D connection can be facilitated by FD user equip-
existing technology such as Wi-Fi and Bluetooth. ment in cooperative D2D networks [62].
Self-interference cancellation is a potential solution to improve
2.2. D2D control the performance of FD users. The efficacy of FD self-interference
cancellation can be enhanced by optimizing the link topology for
A network can have full, partial or no control of the device improved transmission and reception. This would help to boost
tier. This impacts on the level of signalling exchange, implemen- network coverage and throughput. In D2D networks, clusters of FD
tation complexity and how much modifications has to be made mode can be configured to form a cooperative relay network. Se-
to support D2D functionality [1]. In full network control, the net- lecting appropriate relays, FD or half duplex mode, and power con-
work takes care of D2D communication, radio resource manage- trol could help to improve energy efficiency and throughput. Half
ment, and power allocation. This way, individual transmissions can duplex (TDD or FDD) is preferred for direct connection of source
be prioritized. Similarly, harmful interference between cellular and and destination. However, this may come at the expense of spec-
device users can be mitigated. It can assist in device discovery as tral efficiency as compared with FD [62].
it has a global knowledge of the approximate location of devices
intending to communicate. However, this may come at the cost of 3. Interference
an increased signalling overhead. For instance, the channel state
information (CSI) of all the links has to be known by the eNodeB Usually, to establish a direct link between D2D users, the mini-
to apply proper interference avoidance techniques as assumed in mum signal-interference-to-noise ratio (SINR) requirements in the
[58]. network should be met. In this respect, the interference experi-
On the other hand, in a loose D2D control, devices can commu- enced by cellular users due to D2D users should be less than the
nicate autonomously between each other with very little network required threshold to ensure the network performance is balanced
intervention [59]. Resource allocation is basically handled by D2D [2]. Co-tier interference affects this SINR in orthogonal frequency-
users. In other to make this approach more feasible, unlicensed division multiple access (OFDMA) systems when the same set of
spectrum can be used such that the frequency is shared with Wi- resource blocks are allocated to a number of UEs. Regardless of the
Fi or Bluetooth [59]. Autonomous D2D discovery has the potential direction of resource reuse, interference is always generated by the
of reducing energy and interference associated with D2D discovery D2D transmitter to D2D receiver (see Fig. 4). Hence, a proper pair-
by utilizing the knowledge of the network layout [60]. In a hybrid ing of devices and frequency allocation can be effective to mitigate
D2D control [61], a good trade-off could be achieved by operators co-tier interference at the D2D receiver as a result of neighbouring
by setting restrictions on the maximum transmit power at the side D2D transmitters.
of D2D devices. Also, resource allocation can be done on a large Interference can occur between D2D and cellular links in in-
time scale. D2D UEs can distributively and autonomously schedule band communication. This is one of the most critical issues since
transmission, ‘set’ power control and handle resource management. D2D shares the licensed spectrum with cellular users [4]. A key
This could help to guarantee QoS at the expense of a reasonable question is who interferes with whom within the network? Inter-
overhead [1]. ference can occur from D2D to cellular network when the cellular
user and D2D links use same frequency resources in the uplink.
2.3. Duplexing A typical D2D transmitter causes interference to eNodeB while a
cellular user transmitting in the uplink might also cause interfer-
Time Division Duplexing (TDD) and Frequency Division Du- ence to the D2D receiver. On the other hand, interference can occur
plexing (FDD) are two different modes by which resources can from the cellular network to D2D users when they reuse downlink
be accessed by D2D underlaying cellular network. Research on resources of a licensed band. In this case, the eNodeB interferes
full duplex D2D communication is also ongoing. Devices can di- with D2D receivers while D2D transmitters interfere with cellular
rectly communicate using resources originally assigned for uplink, downlink users [1].
downlink, or both. Reuse of uplink resources is the most common
approach used in the literature. This has the advantage that it is
majorly underutilized as compared with the downlink [1]. This is
because most cellular transmissions occur in the downlink since it
is more common that devices download rather than upload data.
This provides an opportunity to reuse the uplink resources which
can improve the spectral efficiency [11].
It is imperative to note however that the interference between
D2D pairs still needs to be handled. Radio resource management
techniques should be efficient and adaptive, considering interfer-
ence and traffic patterns in the uplink and downlink. They should
also be easy and inexpensive to deploy [11]. Since eNodeB is the
sole ‘victim’ of D2D interference, it is much easier to resolve inter-
ference in the uplink. However, interference in downlink is a ‘sig-
nificant’ obstacle. The use of an appropriate TDD frame may par-
ticularly address the underutilization of uplink resources [1].
When UEs transmit and receive signals over the same frequency
at the same time, they are using full duplex (FD). This is advan-
tageous because it can double the spectral efficiency. However, it
has problems of self-interference which affects its practicality. An- Fig. 4. An illustration of transmitting — uplink (left) and downlink (right) -and in-
other issue in the deployment of FD transmission is as a result of terfering signals.
O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938 7

The use of several interference mitigation techniques to reduce transmission rates of D2D users would improve the overall sum-
the effects of interference when D2D and cellular networks coex- rate of network devices [14]. Other techniques for mitigating in-
ist (i.e., when D2D is introduced to cellular network) is referred terference include optimum resource allocation and proper mode
to as interference management in D2D-enabled cellular networks. selection [6]. Asides the aforementioned, major approaches to in-
When interference cannot be controlled, the problem is that the terference management and mitigation include interference avoid-
QoS of the network deteriorates [6]. As compared with the unli- ance techniques using orthogonal time-frequency resource alloca-
censed band, interference in the licensed band can be easily con- tion and interference cancellation techniques [6].
trolled since the eNodeB is involved in the licensed spectrum. The Heuristics could be used to develop simple interference avoid-
eNodeB can dedicate more resources which could be used by D2D ance/reduction schemes. To achieve better performance and higher
users in the overlay. However, this comes at the expense of lower gain, advanced mathematical techniques such as game theory and
spectral efficiency. Also, if transmissions overlap in time and fre- non-linear programming can be used. However, this is usually at
quency, interference can occur between the D2D users [1]. the expense of increased complexity and computational overhead.
In the unlicensed band, interference management helps to en- Thus, both complexity and performance (in terms of gain) should
sure that other communication technologies such as Bluetooth and be considered when proposed schemes are compared. Stochastic
Wi-Fi are not adversely affected by D2D transmission [12]. The cel- optimization or non-linear programming may not be the perfect
lular users are catered for while allocating frequency resources, choice to improve the performance of applications that are delay
by considering interference mitigation among neighbouring UEs critical (time-stringent) and have a limited computational capac-
[1]. Interference from eNodeB also greatly affects D2D commu- ity. Nevertheless, these schemes can derive sub-optimal solutions
nication [63] as it reduces energy efficiency. It becomes more which can improve the performance of such systems [4].
challenging when other tiers are added to the network such as
femtocells. 4. D2D design aspects
Near-far effect and co-channel interference depend on power
allocation to cellular users and device users. To mitigate the inter- In this section, we present design guidelines and important
ference in D2D communication, the transmit power threshold of issues to be considered with respect to (w.r.t.) interference man-
D2D users can be set subject to specific QoS target for the cellular agement such as mode selection, power control, and resource allo-
links. This is important as the quality of cellular communication cation. We also discuss some of the recent developments in this re-
should also be maintained. Thus, interference from D2D to cellu- spect. Tables 3–6 summarize some of these advancements in terms
lar users in inband D2D can be reduced when transmission power of application, model, method and metric considered. We note that
is well managed. This may require D2D users to properly regulate the categorization of the papers reviewed in this section is not per-
their power to meet the SINR requirements [6,64]. Proper control fectly orthogonal. For instance, Refs. [76,79–81] could be catego-
of power levels of D2D UEs can help improve the system capacity, rized under both mode selection and resource allocation and the
coverage and power consumption [2]. works in Refs. [82–87] are common to power control and resource
Although a wider coverage and better signal quality can be allocation.
achieved when a higher transmit power is assigned to D2D users,
it can cause interference to cellular network at the same time. 4.1. Mode selection
Also, managing interference using power control may not be the
most efficient approach for managing cross-tier interference be- To achieve different network performance objectives, devices
tween D2D pair and cellular network as it leads to a degradation could switch between different modes (such as cellular/D2D and
in the cellular network performance [2]. In some cases, the power unicast/multicast modes). Mode selection plays an important role
of the eNodeB in the downlink could be lowered as long as the in D2D communication. It affects the resource usage in the net-
performance of cellular users is not degraded. This is to ensure the work and the overall network performance [1]. Although these

Table 3
Recent advances of D2D mode selection: aspects, applications, models, methods and metrics.

Aspects References

[65] [66] [67] [68] [69] [70] [71] [72] [73] [74] [75] [76] [77] [78] [46]

Application Social   
Content Sharing     
Video-Streaming 
Physical Layer Security 
Caching  
Model Mobility-Aware  
Social-Aware  
Energy Harvesting
mmWave 
Relay-Assisted   
Multicast  
Method Stochastic Geometry 
Game theory  
Optimization       
Scheduling 
Artificial Intelligence 
Metrics Energy Efficiency   
Fairness 
Spectral Efficiency  
Throughput/Capacity/Data-rate  
Average Secrecy Capacity 
8
Table 4
Some recent advances of D2D resource allocation: aspects, applications, models, methods and metrics.

Aspects References

O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938
[97] [99] [110] [144] [122] [121] [131] [179] [140] [116] [137] [135] [111] [136] [129] [47] [134]

Application Social  
Content sharing 
Vehicular  
Caching 
Crowd sourcing 
Real-time 
Advertisement 
Model Edge 
Social-aware 
Energy Harvesting   
Wireless Powered 
massive MIMO 
UAV-assisted 
Underlay NOMA  
Underlay WPCN  
Relay-assisted  
Selfish nodes 
Clustered 
Joint UL/DL 
Multicast 
Method Game theory 
Optimization           
Graph Theory 
Metrics Energy Efficiency 
Spectral efficiency  
Delay/Latency   
Reliability 
Network Utility 
Throughput/Capacity/Sum-rate      
Table 5
Some recent Advances of D2D Resource allocation: aspects, applications, models, methods and metrics (continued).

Aspects References

[76] [118] [117] [126] [142] [146] [150] [151] [152] [157] [160] [80] [154] [158] [161] [162] [165]

Application Fog  
Vehicular 
Security 
Model C-RAN   
Social-aware 
RN-assisted 
Multi-cell  
Multicast 

O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938
Method Game theory    
Optimization            
AI/Heuristics   
Game Theory 
Graph Theory   
Metrics Energy-Efficiency  
Fairness 
Delay/Latency   
Secrecy Capacity 
Throughput / Capacity/ Sum-rate         

Table 6
Recent advances of D2D power control: aspects, applications, models, methods and metrics.

References
Aspects
[67] [113] [110] [173] [130] [169] [82] [140] [159] [124] [170] [174] [176] [177] [178] [183]

Application Social 
Video Streaming 
Vehicular  
Model Cognitive D2D 
UAV 
Small cells 
Energy Harvesting 
mmWave 
massive MIMO     
Underlay NOMA  
C-RAN 
Multicast  
Full duplex 
Method Game theory  
Optimization       
Scheduling  
Artificial Intelligence   
Metrics Energy Efficiency     
Spectral Efficiency   
Throughput/Capacity  

9
10 O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938

as well improve energy consumption [92]. Considering a social di-


§4.1.1 Caching
mension, caching could further promote offloading capability of
D2D communication, especially when transmit-receive pairs are
Mode Selection
§4.1.2 Social aware D2D nearby. Nevertheless, attention should be given to which content
to be cached and which UE should be seeded2 [93].
§4.1.3 Content sharing It is essential to solve caching problems to accommodate D2D
content delivery and its QoS requirements [95]. Also, since content
§4.1.4 Relay-assisted D2D caching and delivery help to facilitate content provisioning at the
edge [96], putting the diverse factors necessary for accurate net-
§4.1.5 Physical layer security work modelling is prime in the design of effective content dissem-
ination. For instance, characterizing content dissemination speed
Fig. 5. Recent advances in mode selection discussed in this paper. to improve its performance [57]. Studying the problems associated
with content delivery in D2D networks when deployed for caching,
devices can communicate directly, they could also communicate Xu et al. [67] concentrated on mode selection (w.r.t. unicast or
with the BS.1 This calls for proper resource management tech- multicast modes) and examined the energy-efficiency of these two
niques and methods to reduce network overload [40]. D2D under- modes. According to the authors, when there is a large density of
lay cellular networks can occur in different modes when commu- transmitters, there would be more devices to cater for content re-
nication is to occur between two UEs in the same cell [14,88]. De- quests. However, much more energy would be consumed to offset
vices could switch between these modes depending on the net- the level of interference as a result of these transmitters.
work conditions. They could communicate in silent mode when Effective caching is also important to deliver data in an ultra-
resources are not enough to accommodate D2D communication re- reliable manner. For example, in the course of the survey and in-
quest, or as a result of very strong interference due to primary cel- spection in industrial automation, IoT devices can produce heavy
lular users. sensor data as well as moving high-definition video. Thus, reliable
Similarly, mutual device communication may take place in the and high-rate radio links augmented by intelligent caching and de-
non-orthogonal sharing mode in situations where interference oc- livery mechanisms are required to transport massive content to the
curs between cellular and D2D users. The task of interference man- edge network infrastructure and the remote human operator. In
agement may become complicated when several D2D pairs share such circumstances, Orsino et al. [69] focused on content dissemi-
the same resources. On the other hand, it is possible to have D2D nation in such factory settings by using machines to assist in D2D
communication with ample resources such that no interference caching. The authors put forward a new approach which uses the
occurs between D2D and cellular users. However, when multiple anticipated conditions of the radio link to predict mode selection
D2D pairs share the same resources, interference is prone to occur. techniques. Development of ‘pragmatic’ incentive-aware D2D relay-
This is the case with orthogonal sharing mode where dedicated re- ing and mode selection schemes for industrial IoT applications are
sources are allocated to device users that are orthogonal to cellular identified as potential future directions.
users.
4.1.2. Social aware D2D
In addition, D2D UEs could communicate through the eNodeB
Social aware D2D networks have recently attracted the atten-
similar to traditional cellular users. Mode selection may be based
tion of researchers studying D2D communication. The idea is to
on several decision metrics such as CSI. SINR could be used to
consider the natural inclination of human beings to share interests.
maximize the system capacity, reduce transmission power and im-
For instance, people with like passions tend to share content espe-
prove energy efficiency. A number of factors such as mobility and
cially when they are in proximity. In this case, users having strong
signalling overhead impact on mode selection and should be con-
social ties could share files with those within their communica-
sidered in network design [12]. Distances between D2D pairs are
tion range using D2D communication. Note that even in the same
also essential considerations as recently studied in [73]. It is im-
social community, people have a diverse interest which also influ-
portant to note that depending on the network design objectives,
ences the variety of content they are interested in [97,98]. In this
novel mode selection schemes can be derived to include mode
context, Yang et al. [79] studied the problem of stimulating cellu-
switching condition that takes advantage of different modes. An
lar users to devote links for D2D communication, and how to fur-
example of such is Guo et al. [72] which proposed a novel mode
ther allocate these links to D2D pairs. Li et al. [99] selected specific
selection scheme while aiming at a fairness-aware and energy-
users and designed an algorithm for distributed caching optimiza-
efficient resource allocation for D2D networks. Some of the recent
tion to solve the cache allocation problem in D2D underlay cellu-
advances in mode selection are discussed below as organized in
lar networks with social awareness. Also, Cai et al. [77] proposed
Fig. 5.
a social-aware scheme for content downloading by constructing a
framework which takes physical transmission and social network-
4.1.1. Caching
ing domains into consideration. In this respect, they designed a
One approach by which the congestion of multimedia files
social-aware algorithm for mode selection which involves trans-
can be managed in 5G networks is through caching of popular
mission either through the BS, other devices (i.e., D2D) or multiple
files [89]. In this approach, no additional infrastructure is needed
collaborating D2D links.
[67]. Also, the extra cost of using the cellular bandwidth is saved
since files are retrieved from neighbouring devices having a locally 4.1.3. Content sharing
cached file [90]. Caching has been explored to facilitate the sharing Content sharing using D2D communication has the potential to
of non-real time content dissemination and has been widely stud- support local services as well as the increasing needs for file shar-
ied due to its merits in terms of data offloading [69,91]. The idea ing. For example, a user who needs popular files can get them di-
of offloading is intuitive as mobile devices surrounding a user can rectly from another device using D2D communication [65]. Typi-
function as ‘thin remote servers’ to execute offloadable tasks which cal use cases of content sharing also include teamwork requiring
reduces the execution time, packet loss, communication delay and
2
Seeding means to proactively push (‘seed’) content to specific users before it is
1
Note that devices can also communicate via relays. requested by them [94].
O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938 11

files to be synchronized among members, a teacher distributing as artificial noise to protect cellular users from eavesdroppers. Nev-
course contents to students, and traffic control information shared ertheless, different density of D2D pairs in underlay and diverse
by the police [97]. Wu et al. [78] introduced the concept of a spectrum partition setting affects physical layer security perfor-
‘social-aware rate’ which merges ‘social selfishness’3 with link rate. mance of CUE and D2D pairs [46].
Note that the the physical link performance of devices embodies Earlier works prior to Zhang et al. [46] focused on in-band D2D
the link rate. They investigated the problem of matching providers from physical layer security perspective without considering mode
and requesters of user content considering the random location of selection and spectrum partition4 . In this respect, [46] show the
content, the limitation of device storage, and users’ selfish or al- possibility of flexibly controlling the physical layer security per-
truistic behaviours. They developed a best-effort distributed algo- formance of CUE and D2D pairs. For instance, the secrecy outage
rithm framework having the potential to cater for various practical probability of CUEs can be reduced when more spectrum is allo-
‘needs’. cated to CUE with a trade-off on outage probability of D2D pair.
Reference [65] proposed a social-aware mode selection scheme They show that the impact of mode selection of D2D on the phys-
for content sharing by studying the problems associated with op- ical layer security of cellular users and D2D reliable communica-
timally matching devices that can likely provide these files to tion performance is complex as it heavily depends on the settings
those who demand them. According to the authors, the proposed of spatial distribution of users in the network and spectrum parti-
sharing mode selection can be further studied under diverse QoS tion. However, only one CUE and one D2D pair was assumed which
constraints (such as real-time constraints) and different popular- makes the considered scenario a very simple case.
ity distribution. In the same vein, Wu et al. [68] presented a
content sharing framework with cache-aided D2D communication 4.2. Resource allocation
and proposed a ‘sharing mode selection’ mechanism. The proposed
mechanism considers the use of incentives to motivate devices to Spectrum allocation is a critical aspect of resource allocation.
take part in content sharing while also maximizing social welfare. It could either be centralized or distributed [12]. In centralized
However, joint optimal solutions involving resource scheduling, spectrum allocation, the eNodeB assigns spectrum to connect links
provider-requester matching and content caching were not consid- within the network. This requires the eNodeB to have channel
ered. Zhou et al. [66] investigated the problems associated with quality information (CQI) of all these links which may come with
content dissemination in the internet of vehicles (IoV) paradigm an extra control overhead due to the periodic reporting of the CQI.
by considering both the physical and social layers of communi- For the distributed spectrum allocation scheme, UEs allocate spec-
cation w.r.t. connection probability and tightness of social rela- trum for D2D communication. This is characterized by very low
tionship. They formulated and solved a joint optimization problem complexity, flexibility and high adaptability as D2D pairs can au-
consisting of peer discovery, power control, and channel selection, tonomously select frequency resources [12]. However, the global
but did not consider multihop vehicular-to-vehicular communica- knowledge of the network is not available, which implies it may
tion as well as content caching and dissemination optimization. not perform as good as a centralized scheme.
To improve the spectral efficiency and capacity, the D2D users
4.1.4. Relay-assisted D2D could reuse CUEs resources as well as D2D resources. However, in-
Attaining efficient resource sharing within the D2D-enabled cel- terference management becomes a crucial concern. Underlay mode
lular network can be quite challenging especially when devices has higher spectral efficiency and higher frequency reuse factor.
could communicate directly, through the eNB, or using relays. The question of whether D2D users reuse the uplink or downlink
Thus, a highly critical issue is how to effectively select the com- impacts the level of interference in the system. To manage interfer-
munication modes for multiple D2D pairs in a cell while maximiz- ence, it is better for D2D users to communicate whenever they are
ing the cell capacity. With this in mind, Chen et al. [75] address close to each other, otherwise, they use the cellular mode. When-
the problem of efficient spectrum management when the cellu- ever the uplink is reused and the D2D devices are closer to the
lar user equipment (CUE) channels are reused by DUEs. Particu- eNB, there could be considerable interference to cellular commu-
larly, efforts were directed at obtaining the optimal modes of mul- nication. In such cases, it is better to use traditional cellular com-
tiple D2D pairs functioning in cellular, direct D2D, or relay-assisted munication. The same applies when the transmitting cellular users
D2D modes. The objective was to improve the total system capac- are very close to D2D users. Therefore, underlay mode should be
ity, therefore, achieving fairness was not considered. This implies used when the D2D users are at an appropriate distance from cel-
that D2D links with poor channel quality would not be assigned lular users and the eNB. In the downlink, when the D2D users are
radio resources. Along the same line, Ma et al. [74] proposed a too close to the cellular users, the shared mode would be affected
model to enhance the capacity of relay-enabled cellular assisted by mutual interference between these two systems, hence the cel-
D2D communication where relay-assisted and ‘local route’ (i.e., de- lular mode or dedicated mode is better in this case.
vices communicate using BS as a relay station) D2D were consid- Several metrics could be studied w.r.t. radio resource alloca-
ered. Through simulations, they showed that the proposed solution tion. These include energy efficiency, spectral efficiency, fairness,
is effective for improving the traffic offloading capacity of D2D ca- and system throughput [6]. D2D communication is targeted at us-
pable UEs in LTE-A cellular systems. ing existing cellular infrastructure for achieving better energy and
spectral efficiency. Energy efficiency is quite important in D2D net-
4.1.5. Physical layer security works as users are usually concerned about the battery life of their
Physical layer security techniques are promising security tech- devices [1]. Important factors affecting energy-efficiency are inter-
niques for future generation wireless systems. They exploit the in- ference from cellular users, device mobility and transmission dis-
herent uncertainties of the wireless channel and noise which help tance. Spectral efficiency is low in a pure cellular mode (when D2D
to achieve a stronger level of security. For instance, artificial noise is not enabled) but when dedicated resources are assigned for D2D
from helper devices could help to create a channel superior to users, the spectral efficiency may vary from medium to high [13].
that of eavesdropping nodes. In this case, interference is consid- Another metric associated with resource allocation is fairness.
ered beneficial since the interference from underlay D2D can serve It is decided by the fairness-index [6]. In D2D communication,

3 4
Social selfishness captures the selfishness of users and it is obtained based on Spectrum partition in this context refers to how the spectrum of the system
the knowledge of social ties [78]. should be partitioned between cellular and overlay D2D [46].
12 O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938

§4.2.1 Vehicular application ming technique. A noteworthy feature in the considered scenario is
that it is more spectrally efficient as a result of the reuse of cellular
§4.2.2 Video streaming spectrum.
As recent advances in wireless networks will tremendously
§4.2.3 Guaranteeing Quality of Service contribute to the improvement of vehicular networks, advances
in computing will also have significant impact. In view of this,
§4.2.4 Advertisements Cui et al. [111] proposed a multi-platform intelligent offloading
resource allocation algorithm that can organize the computing re-
§4.2.5 Real-time applications sources dynamically to improve the performance of next genera-
tion vehicular networks. The authors deployed the k-nearest neigh-
§4.2.6 Artificial intelligence
bour algorithm to select a task offloading platform which may be
any of cloud, mobile edge or local computing. However, the to-
§4.2.7 Energy Harvesting
tal energy consumption in the studied model can be further op-
Resource Allocation

§4.2.8 Non-orthogonal multiple access timized using a richer set of optimization indicators [111]. Simi-
larly, resource allocation problem in multi-mobile edge computing
§4.2.9 Graph theory for vehicular communication server and multi-local computing were left for future work.

§4.2.10 Game theory 4.2.2. Video streaming


Nowadays, social media conversations accessed using real-time
§4.2.11 D2D Multicast video streaming have become very common. Interviews, businesses
and news sharing are typical use-cases [112]. The requirements of
§4.2.12 Cloud radio access networks
emerging video streaming in future 5G cellular networks stimulate
the need for D2D communication support [113]. On this subject,
§4.2.13 Fog-Radio Access Networks
Vo et al. [113] put forth an optimal rate allocation scheme for video
§4.2.14 Fog computing streaming with the objective of attaining energy-efficiency and re-
ducing mutual interference between D2D pairs. The proposed so-
§4.2.15 Crowdsourcing lution is capable of supporting high-performance video stream-
ing in a dense 5G network with D2D communications. Similarly,
§4.2.16 Resource optimization Li et al. [76] considered a joint mode selection and resource allo-
cation mechanism for interference mitigation in order to improve
§4.2.17 Secrecy the experience of video subscribers. They focus on achieving a scal-
able video multicast transmission by using greedy and heuristic al-
Fig. 6. Recent advances in resource allocation discussed in this paper. gorithms. It was assumed that the eNB can perfectly obtain real-
time channel state information which may not be easy to achieve
in practice as this requires very accurate channel estimation.
one approach to defining fairness is the ability to provide equal
As the variety of algorithms proposed for multimedia services
throughput to all cellular users [100]. Details on fairness issues,
over D2D networks put signal-to-noise ratio into consideration
measures, and challenges in wireless networks are discussed in
while ignoring temporal requirements, the authors in [114] pro-
[101]. The system throughput (measured in bits/sec) is an indicator
posed a framework for cross-layer D2D link control. The scheme
of successful transfer of information within the network. A higher
can guarantee the QoE required in live video streaming applica-
throughput indicates a better system or algorithmic performance.
tions. Similarly, diverse priorities and delay constraints for such
D2D user capacity is the number of D2D users that a specific set
video streaming applications were taken into consideration. They
of cellular users in the network can accommodate with regards
showed that the proposed approach outperforms other methods
to the maximum data constraint. For a given resource allocation
with respect to average mean time to failure, average peak signal-
scheme, a higher user capacity is preferred [6]. Other metrics could
to-noise ratio and energy consumption.
be considered for D2D communication [4,7]. These include relia-
bility [102], coverage [103] and secrecy rate [104]. Some develop-
4.2.3. Guaranteeing Quality of Service
ments in resource allocation are discussed below as organized in
Effective admission control and resource allocation play cru-
Fig. 6.
cial roles in managing interference between cellular and D2D links
in D2D-enabled cellular networks. This way, the applicable QoS
4.2.1. Vehicular application requirements can be attained. In this respect, Cicalò and Tralli
Intelligent vehicular communication powered by 5G is receiv- [115] studied a joint admission control and resource allocation
ing more research attention [105]. D2D communication is expected strategy aimed at providing a lasting QoS support to both cellular
to be one of the forerunners towards supporting diverse applica- and D2D links within the network. Similarly, Guo et al. [116] stud-
tions in the future intelligent transportation systems (ITS) [106]. ied the possibility of using standby D2D devices which neither re-
Among others, ITS supports intra-vehicular and inter-vehicular in- quest cellular nor D2D connections to improve the sum rate of
teractions as well as interactions between vehicles and their en- multi-cell cellular users. Nevertheless, the paper assumed that only
vironments [107]. Vehicular communication has applications w.r.t. one relay node helps an active user at the same time and each user
safety and traffic optimization and as such been on the research has a single receive antenna.
spotlight [108,109]. When vehicular communication underlays cel- Reference [117] proposed optimal and suboptimal resource
lular network, it has the potential to improve the spectral effi- sharing schemes for D2D-enabled cellular networks to optimize
ciency of the network at the cost of interference with cellular links. channel allocation and power control while guaranteeing the QoS
On this subject, Liu et al. [110] focused on addressing the interfer- of cellular users. However, scenarios of DUEs with multiple an-
ence that occurs between cellular and V2V transmission in V2V- tennas were not examined. Other performance objectives such as
underlay massive MIMO cellular networks by formulating and solv- energy-efficient resource reuse in a D2D underlaying multi-channel
ing an optimal power control problem using geometric program- cellular network can be studied in the future [117]. Employing joint
O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938 13

mode selection, admission control and resource allocation, Orakzai allocation mechanism [125]. The model considers a single cell sce-
et al. [118] proposed an energy-efficient radio resource manage- nario, thus interference from other cells can be considered in fu-
ment scheme for D2D-assisted communication. Similarly, Gandotra ture work.
and Jha [119] proposed an adaptive resource allocation scheme us- For use in vehicular communications, Ye et al. [126] developed
ing a hidden Markov model to adaptively allocate resource blocks a resource allocation mechanism based on reinforcement learning
to D2D devices within a three-sectored cell architecture aiming at where V2V links are helped by an agent which autonomously de-
achieving resource-efficiency and energy efficiency. The idea of di- cides on the optimal sub-band and power levels for transmission.
viding the cell into sectors was to effectively manage the interfer- Using this decentralized solution, the authors show that stringent
ence within the ultra-dense 5G scenario considered. Future work latency constraint in V2V communication can be met. Also, the in-
can study other metrics such as fairness and secrecy [119]. terference existing between vehicle-to-infrastructure links can be
reduced. Although the use of reinforcement learning is quite ben-
eficial and has gained attention of recent6 , note that problems
4.2.4. Advertisements
in wireless optimization generally have constraints and trade-offs
The harmony between social-commerce and D2D communica-
to be balanced. Nevertheless, learning problems have a structure
tion can produce a tremendous effect. This is because voluntar-
which is quite similar to wireless optimization problems. In fact,
ily, D2D users can relay advertisement messages to neighbouring
wireless resource allocation can itself be regarded as a statistical
users to get a lot of discounts on products which could provide
learning problem [127]. Asides the aforementioned, the considera-
benefits for users based on purchase conditions. This could moti-
tion of quantum computing and machine learning is another po-
vate D2D users to broadcast data to neighbouring users [120]. An-
tential direction for resource allocation especially with respect to
other opportunity is getting revenue, which is one of the concerns
ultra-reliable low latency applications [128].
of commercial service providers. D2D provides an opportunity in
Seamless communication can be achieved by appropriate sig-
this regard as devices can use the underutilized spectrum of ser-
nal sensing and processing of tightly-coupled channels. Also, a
vice providers [121].
proper balance in channel allocation and selection bridges the
Among the existing feasible economic models, Kaliski and Wei
gap between signal processing systems and communication sys-
[121] deployed a localized advertisement coalition-based service in
tems. In this vein, Al-Makhadmeh and Tolba [129] optimally allo-
which spectrum can be leased and reused. Thus, D2D UEs pro-
cate and select channels for mobile users engaged in D2D com-
viding this service would form a coalition. Using game theory,
munication by deploying an intelligence-based recurrent learn-
the authors designed an incentive-compatible ‘resource determina-
ing scheme that selects a delay-controlled channel to satisfy the
tion mechanism’, and modulation and coding scheme-based auc-
data rate and power control requirements. Results show that the
tion where ‘localized advertisers’ vie for resources. According to
intelligence-based recurrent learning scheme improves the reliabil-
Kaliski and Wei [121], a potential drawback is that the channel
ity and throughput performance of the network in terms of delay,
model used, the consistency of prediction parameters and channel
outage and transmit power requirements.
coherence duration all affect the SINR prediction. Furthermore, the
proposed modulation and coding scheme auction is more applica-
4.2.7. Energy Harvesting
ble when there are more resource block sets demanded.
Energy harvesting has the potential to facilitate green commu-
nications because it provides an alternative supply of energy. D2D
4.2.5. Real-time applications devices could harvest energy from downlink cellular transmission
Real-time D2D communication has several applications in IoT to facilitate D2D communication. In this respect, Kusaladharma and
and ITS [122]. Real-time traffic management is quite significant in Tellambura [130] studied energy-harvesting schemes consisting of
the context of smart cities as it could help to reduce congestion single-slot, multi-slot, n-slot7 and a hybrid scheme. However, the
and ensure ‘timeliness’ of emergency information [123]. For a suc- authors did not consider interference on primary cellular users
cessful real-time packet transmission in D2D communication, the from D2D transmissions. Kuang et al. [131] also considered an en-
throughput and delay are vital metrics to judge the performance ergy harvesting model where CUEs downlink spectral resources are
of the systems. Xu and Guo [122] studied resource allocation of multiplexed by D2D user. They formulated and solved a resource
real-time D2D communications with the aim of maximizing the to- allocation problem to maximize the energy-efficiency of D2D links
tal packet utility to guarantee the required packet deadline.5 The while considering the D2D users’ energy harvesting constraints and
proposed resource allocation mechanism takes care of both slot maintaining the QoS of cellular users. We find that energy arrivals
assignment and channel allocation. However, the additional delay were modelled as a Poisson process and only one spectrum re-
due to the complexity of the proposed system was not considered source block is allocated to D2D links.
[114]. Wang et al. [179] studied how unmanned aerial vehicles
(UAVs) can be used to provide radio frequency energy to several
D2D pairs powered by energy harvesting modules. They used a
4.2.6. Artificial intelligence (AI)
harvest-transmit-store model as opposed to their previous work
Owing to the interference experienced by cellular communi-
[132] where a harvest-then-transmit model was deployed. They in-
cation due to D2D devices, Takshi et al. [124] proposed a ge-
dicated that future work could examine UAVs as mobile sources
netic algorithm-based approach to improve the spectral efficiency
of energy while putting their trajectories into consideration. The
as well as minimize the interference in D2D-enabled cellular net-
authors in [47] proposed an efficient resource allocation mecha-
works. They consider a ‘minimum’ SINR for cellular links due to
nism that concurrently addresses issues related to energy and in-
the SINR degradation caused by D2D underlaying cellular net-
terference in an energy harvesting-assisted underlay D2D commu-
works. The genetic algorithm is particularly interesting as it can
nication scenario. A deterministic model was proposed where DUE
evolve to a global maximum by its effective concurrent search
harvest energy only when needed. The resource allocation scheme
through the search space. This proposed algorithm shows better
jointly allocates resources and transmit power to devices within
performance when compared with a prior genetic-based resource

6
It is has been used in wireless optimization for diverse unconstrained problems
5 [127].
In this case, cellular users have a high throughput requirement while D2D users
7
have real-time hard deadlines. where a typical D2D node harvests energy for n-slots before transmission.
14 O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938

the system. Yu et al. [47] pointed out that an energy harvesting- be found in the modeling and analyzing of interference [142,143].
assisted D2D heterogeneous model, as well as mobility, can be Liang et al. [144] studied resource allocation in D2D-based ve-
considered in future as fading changes with time in such models. hicular communication. They used graph partitioning algorithms
Also, other works could consider multiple wireless energy harvest- to separate the interfering links into clusters in order to reduce
ing transmitters within the coverage of the cell and its impact on their mutual interference. An array of resource allocation algo-
D2D communication. rithms were proposed to improve network performance. Particu-
Simultaneous Wireless Information and Power Transfer (SWIPT) larly, they proposed baseline ‘graph-based’, greedy, and random-
is a key technology that would play a fundamental role in energy- ized algorithm to address trade-offs in performance complexity.
efficient communication systems in the future. One of the unique The authors further studied the resource allocation problem where
motivations of SWIPT is the challenges associated with replacing vehicular networks reduce signalling overhead by adapting to slow
batteries in scenarios such as wireless sensors inside the human fading CSI.
body. Using this technology, devices can capture ambient radio fre- Zhao et al. [142] proposed a novel interference graph chan-
quency (RF) signals and thus harvest energy from their environ- nel assignment algorithm to improve network capacity and fair-
ment [133]. ness among devices. However, the size of the frequency assign-
Wirelessly powered D2D communication can improve network ment considered is small when compared with that of cellular net-
capacity and prolong network lifetime. To achieve efficient con- works [145]. Authors in [146] also employed a graph colouring ap-
tent dissemination in a wireless powered D2D communication proach for resource sharing in full duplex D2D cellular networks
network with ‘self-interested’ nodes (which include D2D transmit- to effectively solve a joint resource block assignment and transmit
ters and power stations), [134] studied a dynamic resource allo- power allocation optimization problem with reasonable complex-
cation scheme aided by an incentive mechanism. Using stochas- ity. The consideration of a secrecy-based resource allocation is a
tic optimization, they aim to keep the average network utility potential research direction for future research. The security of CUE
maximized under constraints such as data buffer, energy capac- and D2D pairs also have to be put into consideration [147].
ity, and incentives. Furthermore, they proposed an online two-
timescale resource allocation algorithm to encourage cooperative 4.2.10. Game theory
content transmission and energy transfer among self-interested Game theory presents a set of mathematical tools which are
nodes, and a satisfactory long term network performance. The au- suitable for modeling and investigating the resource allocation
thors in [135] also studied resource allocation for D2D communica- problem of D2D communication. Specifically, it can be used to get
tion which underlays wireless powered communication networks. solutions for problems such as channel assignment, cooperation
The consideration of both uplink and downlink resource allocation enforcement, and power control [148]. The high energy consump-
would further improve on the total spectrum utilization in this tion of battery operated devices is a limiting factor for the success
scheme as only the downlink was considered [136]. of future networks. Game theoretical approach can be used with
optimization techniques to investigate optimal strategies for D2D
4.2.8. Non-Orthogonal Multiple Access (NOMA) wireless technologies. In this regard, low complexity heuristics are
Kim et al. [137] proposed a NOMA-based D2D aided cooper- required [149].
ative relaying scheme to improve the spectral efficiency of both For D2D underlaid cellular networks, Yuan et al. [150] studied
D2D and D2D-assisted cooperative communication. This scheme an iterative matching-Stackelberg game model for channel-power
improves on Kim and Lee [138] where a cooperative relaying sys- allocation to maximize the throughput of D2D pairs while simul-
tem using NOMA was developed. The proposed scheme improves taneously reducing the interference of cellular links. The proposed
the achievable rate of the network regardless of whether NOMA is scheme was shown to have a low overhead. Asheralieva et al.
present or not. A key contribution of this work is that the maxi- [151] also deployed game theory with a focus on distributed re-
mum sum capacity of the proposed scheme is log (SNR) while in source sharing in multi-cell D2D underlaid cellular network. In this
conventional systems, it is 23 log(SNR ). The paper assumes perfect respect, they presented a novel evolutionary Bayesian coalition for-
successive interference cancellation (SIC) receivers, thus, imperfect mation game. The proposed game is applicable when the rational-
channels at the SIC receivers can be later considered. Furthermore, ity of the players are bounded by the tractability of the channel de-
Kim and Lee [137] indicated that practical constraints such as a cision problem and in resource sharing problems with incomplete
minimum data rate and fairness constraints can be used to find information. Hu et al. [152] studied joint interference management
suitable parameters for the power allocation coefficients. Also, the and resource allocation problem in D2D-enabled cellular networks
consideration of different relay selection schemes and user pairing using an overlapping coalition game to improve the sum-rate of
techniques are other potential directions for improving the perfor- D2D while maintaining the required cellular and D2D QoS.
mance of the proposed scheme. The authors in [153] formulated a dynamic Stackelberg game to
With the aim of optimizing the total transmit power of all users address the basic problem of flexibility for application-driven dis-
in a NOMA-based D2D cellular network, the authors in [139] per- tributed resource allocation. The results show that significant im-
formed a joint subchannel assignment, user pairing and power provements can be achieved on D2D user QoS and cellular net-
control. From the results obtained, they show that subchannel as- work reliability. Furthermore, using this approach the D2D user
signment and user pairing play vital roles in reducing the net- data rate, energy consumption and resource block allocation were
work’s total transmit power which serves both cellular and D2D optimized. In a nutshell, a multi-criteria/multi-objective Stackel-
devices. Different from Pan et al. [140], the authors in [141] studied berg game having no scalarization across objectives was used to
resource allocation for NOMA users where power allocation and achieve an increase in throughput, reduction in transmit power
user clustering were mainly considered within the framework of and the ‘best’ D2D social welfare and satisfaction. Also, Mach et al.
D2D underlay cellular networks. A particular assumption here is [154] proposed a novel resource allocation scheme to maximize
that NOMA reuses the spectrum with D2D pairs which poses extra the sum capacity of D2D communication where multiple D2D pairs
constraints on the minimum SINR requirements. reuse multiple channels.

4.2.9. Graph theory for vehicular communication 4.2.11. D2D Multicast


Graph theory is an efficacious and widely accepted tool for Multicasting facilitates an efficient data transfer via a single
modeling network interactions. A practical use of graph theory can transmission and can yield significant performance for content
O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938 15

distribution [155]. In order to cope with the increasing traffic of learning process could also be improved to handle the dynamic na-
local content sharing (such as the request for a ‘viral’ media file), ture of user devices’ state. Also, joint uplink and downlink (UL/DL)
device-to-device multicast (D2MD) is being considered within the optimization of the system performance was identified as a poten-
5G cellular framework. The benefit of this paradigm is that traffic tial future direction.
can be offloaded from base stations to the device tiers, which in- Mo et al. [160] examined the use of D2D communication to al-
volves devices communicating with each other in a D2D fashion. leviate the burden of the fronthaul in C-RANs, thus reducing the
This improves spectral and energy efficiencies of the network as transmit latency. They considered dynamic traffic arrival and time-
well as user experience. However, the performance of the D2MD varying channel conditions. Zhang et al. [109] studied how D2D
model is affected by the social attributes peculiar to mobile users pairs and remote user heads of the heterogeneous C-RAN architec-
and the interference which occurs between cellular and D2MD ture are assigned sub-channels having different bandwidths. They
tiers [97]. On this subject, Feng et al. [97] developed a D2MD proposed algorithms which improve the system performance in
scheme which takes care of both the physical and social attributes terms of throughput, fairness, and number of admitted users.
of mobile users w.r.t. cluster formation in D2D underlay cellular
networks. They jointly optimized power and channel allocation for 4.2.13. Fog-Radio Access Networks (F-RANs)
D2MD clusters. Potential directions include content caching and This technology has emerged as a promising evolution for 5G
content sharing mode selection. Moreover, incentives can be con- networks and is aimed at satisfying the increase in demand for
sidered to encourage users to participate in content sharing [94]. high speed data services and massive device access. D2D commu-
Note that this work assumes a single cell and as such, interference nication compliments this technology as it brings benefit in terms
from other cells was not considered. of high transmission rate. However, two fundamental issues re-
quire proper consideration with regard to resource allocation in
4.2.12. Cloud radio access networks
this context [161]. Firstly, how mobile characteristics and social re-
C-RANs is one of the enabling technologies which is anticipated
lationships can be utilized among users for improving the through-
to improve on the cellular network performance towards the ef-
put. Secondly, how limited resources can be allocated to effectively
fective running of 5G networks. It is also expected that this tech-
guarantee user satisfaction. With the above in mind, the authors
nology would reduce both capital and operation expenditure. The
in [161] presented a dual-link enhanced communication model for
merger of C-RAN and D2D communication will further impact 5G
improving D2D and CUE throughput simultaneously. Using users’
through the coexistence of different devices, communication pro-
social relationship and mobility characteristics, they formed and
tocols, and services [156]. In fact, when D2D links are established
solved an optimization problem aimed at maximizing user satis-
using C-RAN, gains can be achieved in terms of spectral efficiency
faction under the constraint of the limited available spectrum re-
and reduction of energy consumption. In C-RANs, the baseband
sources.
unit (BBU) pool does centralized baseband signal processing which
lowers the costs of hardware and improves resource allocation per-
formance [157]. However, in heterogeneous C-RANs, ensuring ef- 4.2.14. Fog computing
ficient resource allocation is quite challenging and not much has Fog computing or mobile edge computing provides computation
been done in this regard [109]. and storage capabilities at the edge to reduce energy consumption
In C-RAN architectures, it is necessary to reduce the transmis- of wireless devices as well as computation latency. In the context
sion power of cell edge users, considering that a centralized al- of D2D and Fog, Xing et al. [162] studied a novel D2D-enabled
gorithm is used in the BBU pool. Reducing interference of devices multi-helper mobile edge computing system. In that system, a local
at the cell edge would require centralized interference mitigation user selects wireless devices nearby to ‘help’ execute cooperative
to be run frequently on the BBU pool which could make it over- computation. The authors identified a number of issues to be con-
loaded. Thus, when D2D underlays cellular C-RANs which is char- sidered in future research as follows: The work assumes that all
acterized by dense deployment of distributed RRHs (and conse- wireless devices are located at fixed positions having static wire-
quently a high spectral reuse), strong intra-cell interference and less channels. In this regard, mobility should be well incorporated
inter-cell interference become problems which greatly affect the and accounted for because, in reality, wireless channels fluctuate
energy efficiency and QoS performance of the system. In order to with time as a result of such mobility which may adversely af-
address this, Gui et al. [158] proposed an energy efficient mecha- fect the D2D connections. Subcarrier allocation design for OFDMA
nism for channel selection and power allocation. This was achieved and joint message decoding for NOMA are other issues that can be
by the introduction of a relay-assisted inband D2D communica- studied in the future. Similarly, a multi-user multi-helper mobile
tion mode and the use of a non-cooperative game to model the edge computing model through an appropriate design of multi-
resource allocation problem. The introduced scheme lowers the users scheduling and sophisticated incentive-based collaboration
transmission power of CUEs at the cell edge. schemes can be studied since the helpers were assumed to ‘agree
Motivated by the need to allocate resources to maximize utility to cooperate’ in computation offloading [162].
and mitigate interference when D2D shares spectrum with cellular
users, Alamouti and Sharafat [157] considered resource allocation 4.2.15. Crowdsourcing
in a multi-cell scenario using the centralized baseband processing Crowdsourcing is a new model for collecting and processing
in C-RANs. The authors maximized the total number of active D2D information. In this model, tasks such as ideas, solutions, ser-
pairs and minimized the total transmit power of cellular users and vices and data are outsourced to a large group of ‘generators’.
D2D pairs while maintaining their QoS. Sun et al. [159] proposed Applications of crowdsourcing include monitoring traffic conges-
a distributed mode selection and resource allocation scheme for tions, pollution measurement and tracking a crime suspect. Al-
uplink D2D-enabled C-RANs8 . According to the authors, reinforce- though crowdsourcing is not dependent on any particular net-
ment learning can be deployed for optimizing the latency perfor- work architecture, D2D can find its place when the one initiating
mance. As such, utility functions related to latency could be stud- the process cannot reach the generators of the data directly. An
ied in future works. The convergence of the developed distributed example of such is when infrastructure-based networks (such as
Wi-Fi) is unavailable, crowdsourcing may deploy D2D communi-
8
In this context, mode selection in C-RANs means that a pair of potential D2D cation to demand and transport data. In this respect, Han et al.
UEs can communicate directly or use the C-RAN to transmit the traffic. [163] fomulated and solved an optimal traffic allocation problem
16 O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938

while considering network resource constraints and delay sensi- §4.3.1 Multicast
tivity for a D2D-based mobile crowdsourcing application. The pro-
posed scheme is able to achieve near-optimal performance with a §4.3.2 Non-orthogonal multiple access
reasonable computation complexity.

Power Control
§4.3.3 Cognitive D2D
4.2.16. Resource optimization
D2D communication is one of the forerunner technologies for §4.3.4 Massive multiple input multiple output
the realization of 5G requirements. In this regard, researchers have
considered centralized schemes with a focus on improving spec- §4.3.5 Full duplex D2D
trum utilization and maximizing the network capacity for resource
allocation optimization. One major problem with centralized re- §4.3.6 UAV-assisted D2D
source allocation schemes, however, is the high level of signalling
overhead since DUEs will have to continuously report interference. Fig. 7. Recent advances in power control discussed in this paper.
This motivated the authors in [80] to propose a novel probabilistic
integrated resource allocation strategy as well as a quasi-convex al-
gorithm based on channel probability and statistics. The objective ting could be in the form of open loop power setting (OLPS) or
was to solve the problem of mode selection and resource optimiza- close loop power setting (CLPS) [2,168]. In OLPS, the transmission
tion under the joint ‘resource allocation mode’ targeted at the 5G power of the D2D user is adjusted based on pre-determined sys-
communication network. Thus, maintaining a balance between the tem settings or its measurement result. Meanwhile, in CLPS, the
channel resource utilization and user experience is a natural ex- adjusted transmission power is based on coordination with eN-
tension of this work [80]. odeB [2]. In designing power control schemes, different cases of
Lu et al. [164] studied D2D underlay cellular networks over interference have to be considered. For example, it is not appropri-
the Nakagami-m fading channel. In this context, they investigated ate to pose power restrictions to cellular users in the uplink. On
the sum-rate maximization of CUE and D2D pairs in a resource- the other hand, adapting eNodeB transmission is not a convenient
abundant setting. In such scenarios, the number of CUEs is more option in the downlink because the network coverage may be ad-
than D2D pairs, therefore, they considered the joint optimization versely affected [1].
of SINR and CU-D2D pairing. An interesting future direction relates The applicability of power control depends on the mutual dis-
to the consideration of the resource allocation to reduce energy tance between D2D pair, the distance from a cellular user to D2D
consumption in a time-variant channel. This requires putting the pair (when the downlink is reused), and the distance from D2D
transmit power into consideration in the optimization procedure. pair to the eNodeB (in case of uplink reuse) [1]. For example,
Furthermore, they highlighted that channel diversity characteristics whenever the mutual distance between D2D pair is very large and
of subcarriers could be further examined. the D2D pair is close to eNodeB, a further decrease in the trans-
mission power of device users could cause significant QoS degrada-
4.2.17. Secrecy tion or prevent the functionality and usage of D2D communication.
Another way by which interference can be beneficial is in phys- Thus, device users can only apply simple power control when they
ical layer security. This can be achieved without using heavy cryp- are significantly close to cellular user or eNodeB. Another option
tographic techniques by (purposefully) creating interference to the is using radio resource allocation techniques when power control
channel when DUEs access the cellular band. This makes it difficult cannot be used. Next, we discuss some recent advances in power
for malicious eavesdroppers to listen to the channel. Rudenko et al. control as organized in Fig. 7.
[165] identified that communication security has not been well
considered in system design for resource allocation optimization 4.3.1. Multicast
to improve spectral efficiency. The authors thus, take the secure In order to broadcast data to a group of users requesting the
resource allocation problem into consideration with the focus on same file from a local content holder, multicast transmission is an
assigning resources to cellular and D2D users to maximize system efficient approach for data dissemination, especially when these
security. The authors show through simulations that the method devices are within close range [97]. When facilitated by D2D com-
proposed can effectively improve system performance compared to munication, multicast service is an effective approach towards ef-
existing schemes. ficient management of data traffic. Particularly, when the data rate
becomes increasingly high, the energy consumed by enabling tech-
4.3. Power control nologies such as mmWave also becomes high. In an attempt to
mitigate this high energy consumption, Niu et al. [169] presented a
It is important to ensure that the transmit power of D2D de- multicast scheduling scheme using simultaneous transmissions of
vices is well managed. For instance, to achieve better D2D link directional links (which promote spatial re-use) to achieve energy-
quality, the power should not be too low [166]. Power control efficiency in mmWave small cells with D2D communication. The
is very crucial to achieve energy efficiency in wireless networks. scheduling scheme identifies a multihop path for transmitting D2D
Power control is essential in inband D2D to avoid interference be- data. The authors also used a proposed power control algorithm to
tween D2D users and cellular users. This interference problem is regulate and adjust the transmit power of these devices. The use of
non-existent in outband D2D. However, when the ISM bands be- a multilevel codebook for improving the performance of the net-
come more occupied, it becomes necessary to avoid congestion, work was a suggested future work.
collision and mutual interference between coexisting systems [4].
Several objectives of interference mitigation and energy efficiency 4.3.2. NOMA
are based on transmit power minimization [12,58,167]. The main Although D2D has been identified as one of the enabling tech-
weakness associated with power control is that its deployment can nologies for future 5G wireless systems, one of the main research
pose restrictions on the power transmission levels which might concerns is managing the interference it poses. This could be miti-
imply that D2D communication cannot be enabled always [1]. gated by optimal power control and resource allocation. When net-
Power control could either be fixed or dynamic. A fixed setting work resources are scarce, NOMA positions itself as a novel multi-
may be through a target signal-to-noise ratio while a dynamic set- ple access technology for achieving energy and spectral efficiencies
O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938 17

within the network. Specifically, NOMA uses superposition coding ing while the downlink was not considered. Furthermore, all UEs
at the transmitter and successive interference cancellation at the were assumed to have a single antenna.
receiver [170]. In the quest to improve the sum rate of D2D pair
in D2D underlay NOMA cellular networks, Pan et al. [140] inves- 4.3.5. Full duplex cellular networks with D2D and small cells
tigated the power control and channel assignment problem while Full duplex cellular and D2D communications have the poten-
considering the successive interference cancellation decoding order tial to meet the mobile traffic demands in urban small cell deploy-
constraints. Joint optimization of power and channel allocation was ments. In such small cell networks, an intelligent resource schedul-
not considered for both cellular and D2D users [171]. ing algorithm helps to achieve an increase in capacity and spectral
The authors in [170] studied the concept of sectorization in efficiency of small cell networks. Thus, the authors in [178] pro-
NOMA enabled-D2D communication. They introduced the concept posed two heuristic user selection and power assignment algo-
of multiple interference cancellation which involves optimal re- rithms where more simultaneous transmissions can occur in the
source allocation and facilitates the cancellation of ‘interference presence of D2D links. In the latter, they show that the throughput
levels’ within the network. The scheme shows promising results in performance obtained is better than that of half-duplex when full
terms of gains in total energy-efficiency, sum rate and fairness fac- duplex BS operates at maximum power with 65db self-interference
tor. The potential of multiple interference cancellation to achieve cancellation. The power control mechanism in the heuristics re-
a reduction in latency and the evaluation of energy consumption duces the consumed energy when compared to the case of a full
in future ultra-dense scenarios can as well be considered [170]. duplex base station operating at maximum power.
We note that only a single-cell scenario was considered in this pa-
per. In other words, a natural extension to this work is to consider
the case involving inter-cell interference. Furthermore, cellular and 4.3.6. UAV-assisted D2D
D2D pairs were assumed to be uniformly distributed within the UAV has proven to be quite beneficial for enhancing the per-
cell sector investigated. The fact that D2D users exhibit social rela- formance of D2D communication networks. For instance, UAV can
tionships and can function in scenarios with other spatial configu- provide energy for energy harvesting D2D devices [179]. Also, UAV
rations makes other distributions (which capture the social dimen- infrastructures can be flexible to meet the QoS requirements of
sion) considerable. D2D links [180]. For caching and content sharing applications,
UAVs can function as local content servers thus forming a D2D net-
4.3.3. Cognitive D2D work which supports these data sharing applications [180]. They
A potential solution to enhance the resource utilization effi- can provide service in areas without infrastructure [181] or in dis-
ciency and facilitate proper interference management amongst cel- aster scenarios when network infrastructure is damaged [182]. In
lular and D2D users in in-band D2D-enabled cellular networks is such situations, they help to improve the network performance
the use of cognitive spectrum access [172]. Cognitive D2D commu- when the traditional BS is not available [183]. UAV can assist ter-
nication using the LTE-A macro BS is a new direction studied by restrial networks such as D2D and can improve their reliability
Karunakaran and Gerstacker [173]. They show that when devices while also exploiting the associated transmission diversity [16]. It
are not too far apart, cognitive D2D is a feasible option through can enhance network coverage and capacity and on-demand com-
proper power control, synchronization and the use of guard bands. munications. A single UAV can provide downlink support for sev-
eral users within a geographic domain [184].
4.3.4. Massive multiple input multiple output (MIMO) Not only is UAV beneficial to D2D communications, D2D can
D2D communication and massive MIMO are two auspicious also benefit UAV communications. For instance, D2D has the po-
technologies for improving network performance in future genera- tential to reduce the capacity requirement of UAV backhaul. D2D
tion wireless networks [174]. This symbiosis brings benefits such as can help to support ubiquitous coverage in UAV-assisted commu-
improved capacity, reduced latency, and enhanced spectral and en- nication [185] and accommodate more users [182]. Coverage ex-
ergy efficiencies as it uses a large number of antennas per base sta- tension can be achieved using multi-hop D2D [186] assisted UAV
tion [175]. It thus has the potential to tackle issues associated with communication. Both D2D and UAV mobility can be used to en-
D2D underlay cellular communication such as D2D-to-cellular in- hance information dissemination to several ground nodes [185].
terference. When massive MIMO is underlaid with D2D communi- However, to achieve wide coverage and high throughput perfor-
cation, improvements can be achieved w.r.t. total channel through- mance, proper power control and power allocation are essential.
put and spectral efficiencies [176]. Considering pilot reuse among The power control must be designed to achieve the required data
D2D pairs, Xu et al. [82] proposed a scheduling and power con- rates [181].
trol algorithm with the criterion to minimize the sum mean-square- In this regard, Wang et al. [183] studied power control opti-
error of channel estimation of device-to-device links. The intuition is mization for a D2D underlay UAV-assisted ‘wireless-access’ system.
that this makes it feasible for devices which are far apart to share In the model, multiple users are served by UAV-enabled BS and the
the same pilot for channel estimation. This way, pilot reuse over- UAVs assist other DUEs in a D2D pair to communicate with each
head is reduced. other. A power control algorithm characterized by low complexity
Ghazanfari et al. [177] propose a power control and pilot al- was designed while bearing in mind the energy and computational
location scheme for D2D underlaid multi-cell massive MIMO net- limits of UAVs. Using simulations, the authors show that the pro-
works. In each cell, the cellular users fully reuse orthogonal pi- posed algorithms improve throughput performance of the system
lots while another set of orthogonal pilots are shared by D2D significantly. Huang et al. [187] maximize the data rate of D2D pair
pairs. They show that the proposed algorithm enhances the sum in a downlink UAV-assisted wireless system. They perform a joint
spectral efficiency for multi-cell massive MIMO system. Reference optimization of UAV and D2D transmit powers while putting the
[174] investigate the issues associated with BS precoder design and ground user bandwidth as well as the location and altitude of the
power allocation for D2D in the downlink of a single-cell network UAV into consideration.
with massive MIMO, while Ghadyani and Shahzadi [176] propose
a compressive sensing power control for managing interference in 4.4. Joint resource allocation and power control
D2D underlaid massive-MIMO systems. The proposed approach im-
proves the energy efficiency and collision avoidance of D2D under- Many joint resource allocation and power control schemes have
laid MIMO networks. The paper assumes uplink for spectrum shar- been proposed for D2D communication. Here, we focus on some of
18 O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938

these schemes studied very recently while emphasizing the met-


Interference Management
rics measured.

Mode Selection
4.4.1. Throughput
To address the problem of power control and resource alloca-
tion with multiple relay selection in dense CUEs and DUs scenar- Resource allocation
ios, Gao et al. [87] investigate joint resource allocation and power

Classical Challenges
control in cooperative D2D heterogeneous networks where D2D Device Discovery
users multiplex CUEs in the downlink network. The objective is
to develop an algorithm with universality where diverse system Relaying
parameters can be optimized. The proposed resource allocation
scheme allocates spectrum resource blocks and selects idle users to Mobility
relay data for D2D links. Similarly, power control helps to reduce
interference and improves QoS. A quantum coral reef optimization
Channel State Information
then guarantees QoS of CUEs by obtaining an optimal joint re-
source allocation and power control solution. This was shown to
perform excellently for different network scenarios studied. Energy Consumption
Sun et al. [83] deployed a coalition formation game for re-
source allocation in D2D uplink cellular networks to maximize D2D Modelling
throughput. They proposed a coalition initialization method based

D2D Challenges
on a priority sequence to reduce the number of switching op- Security
erations. The system was shown to have a near optimal perfor-
mance. Xu et al. [84] studied interference in D2D-enabled cellular Heterogeneous Networks
networks using a particle swarm optimization-based bio-inspired
power control and channel allocation mechanism for different sce-
Social-aware D2D
narios9 to maximize the network capacity and coordinate the mu-
tual interference of D2D communication. The authors provide effi-
cient fitness values to guarantee the feasibility of the solution. The
Ultra-Dense Networks
proposed algorithm jointly assigns channels and power for CUE
and D2D pairs. Emerging Challenges MIMO

4.4.2. Fairness target Millimeter Wave


Efforts have been made to study power and resource allocation
with the aim of improving the spectral efficiency, energy efficiency Edge-Computing
and data rate in wireless networks. However, researchers either as-
sume fixed power allocation or no power control without the con- SWIPT/Energy Harvesting
sideration of fairness in the overlay. To cater for this, Elsherief et al.
[85] propose a new resource and power allocation scheme for D2D
D2D-assisted C-RANs
overlaying cellular networks to achieve rate fairness among DUEs
in D2D overlaying cellular networks. This attains a higher level of
D2D-assisted Fog
fairness when compared with other ‘rival’ algorithms proposed in
the literature. Note that fixed distance was assumed for every D2D
pair, and Rayleigh flat fading was assumed at every sub-carrier for UAV-assisted D2D
all D2D users.
Caching
4.4.3. Energy-Efficiency
Liu et al. [86] propose a two-stage energy efficient approach to Fig. 8. Classification of D2D challenges.
jointly perform power control and channel allocation in D2D com-
munication. They focus on the maximization of energy with the
technologies for facilitating the next generation cellular networks
QoS constraints of both cellular and D2D links in mind. The pro-
are classed as ‘emergent’ while traditional challenges are catego-
posed algorithm guarantees not only the transmission rate of CUEs
rized as ‘classical’. Other D2D challenges requiring due attention
but also improves the D2D energy efficiency. However, only one
include standardization since it is essential to standardize several
D2D pair can reuse the channel resource of one cellular user (at
of its intrinsic facets such as device discovery, interface design, pri-
most).
vacy and security [14]. In the unlicensed band, issues relating to
connection establishment and poor service continuity also need to
5. D2D challenges: an overview be addressed.

D2D communication comes with several challenges, many of 5.1. Classical challenges
which are related to interference management and their associ-
ated techniques. We attempt to classify the challenges discussed in 5.1.1. Interference mitigation
this paper as ‘classical’ and ‘emergent’ in Fig. 8. Challenges associ- Interference is a crucial challenge as the cellular networks
ated with the co-existence of D2D and other future ‘sister’ cellular should deal with new interference challenges associated with
D2D communications. This includes issues relating to mode se-
9
i.e. one CU/one D2D, once CU/ multiple D2D pairs, multiple CU/multiple D2D lection, power control, and resource allocation. Managing collision
pairs. and congestion issues is also required [6,12]. Interference can be
O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938 19

experienced in different regions within the cell. Thus, all devices essential that even for large-scale networks, the complexity is kept
within the cell and at the cell edge would require interference mit- as low as possible. Resource allocation schemes must not only con-
igation techniques [40]. The use of fractional frequency reuse (FFR) sider the QoS of D2D users but also the cellular users [12].
is a potential approach to concurrently solve the interference be- For joint scheduling power and resource allocation algorithms,
tween D2D and cellular users. The challenge of FFR is that only it is essential to find the appropriate trade-off between effec-
a fraction of the entire bandwidth is assigned to a particular user tively high system performance and low algorithmic complexity
and this is not resource efficient. Furthermore, the location of users [1]. Proper deployment of interference cancellation technology and
should also be estimated which makes it less spectral efficient [1]. its inherent techniques to enhance the capacity of cellular net-
Approaches to resource management in the literature include works is required to mitigate interference in D2D-enabled cellular
the use of game theory, graph theory and linear optimization [40]. networks. This also poses its own challenges which include issues
Game theory is an advanced technique for interference mitigation related to robustness, and the definition of parameters and mod-
between cellular and D2D users. It is essential to note that the per- ulation schemes, to achieve maximum recovery [12]. Asides the
formance of this technique may be at the price of complexity in aforementioned, the investigation of scenarios where multiple D2D
terms of the number of bidders and allocated sub-bands. It may pairs share resources are required to be incorporated in studied
be more advisable to deploy suboptimal and less complex algo- models for resource sharing/reuse [1]. Also, improving data rate,
rithms. Proposed techniques for interference mitigation should also spectral and energy efficiencies, and reducing the transmission de-
not use overly simple scenarios such as one cellular user and one lay of proximity-aware devices [12] are all required.
(or very few) D2D pair(s) [1]. Considering a more versatile scenario D2D is one of the potential technologies for achieving ultra-
would help to reveal the insights required for more practical use- reliable low latency communication (URLLC) requirements in fu-
cases. In the social domain, both spectrum management and power ture networks as it can help to reduce the number of links on
control are required for different social relationships and ties to LTE. D2D can reduce end-to-end latency and thus improve relia-
achieve effective resource allocation [11]. bility since devices communicate within a short range [190]. In or-
der to effectively improve the performance of URLLC, highly effec-
5.1.2. Mode selection tive resource allocation techniques are required to achieve the high
It is essential to study the trade-off between the optimal mode availability and reliability requirements of URLLC. D2D-inspired ra-
(for different configurations and mode selection criteria) and the dio resource allocation could also be studied to facilitate collabo-
generated signalling overhead. The time scale where these deci- rative human in the loop networks where several users can col-
sions are made is also essential regardless of whether the mode lectively interact in a shared remote environment. Such a radio re-
selection mechanism is initiated by the D2D users or the net- source allocation mechanism should be able to support ultra-low
work [1]. Also, mode selection in varying channel conditions where latency communication which facilitates haptic human-in-the-loop
some D2D links are established and others have to switch to cellu- communication [191].
lar modes deserves further investigation [12]. Furthermore, mode
selection schemes which consider distance as the key parame- 5.1.4. Device discovery
ter for determining the selected mode should ensure an accurate Asides locating other devices in proximity to communicate
choice of distance. The use of very realistic network settings dur- with, devices have to identify the basis for communication in
ing the design and optimization of mode selection strategies would terms of services to be offered. They could exchange signalling
help to achieve full utility of the benefits of D2D communication. messages to inform others of their presence and also choose
For instance, many works put limitations to the priority of D2D whether to communicate or not. In order to find other devices to
transmissions, UE status, resource sharing strategy and the num- connect with, they would need to broadcast beacons which con-
ber of UEs or antennas [188]. sume time and energy. Devices may also have to exchange control
Mode selection can be achieved using a carrier sensing thresh- information with the BS to initiate peer discovery [8,17,192]. Device
old to manage interference among D2D pairs. This carrier sensing discovery protocols thus play a crucial role in achieving energy-
threshold would directly impact on the density of D2D pairs which efficiency in D2D communication. These protocols should be de-
consequently affects the interference among them. This approach signed such that the devices will not need to wake up too often
is distributive and has a less signalling overhead, therefore, it is es- to listen to the pairing request or transmit discovery messages [4].
sential to study different D2D device distributions in this respect. This is because when D2D devices monitor channels for peer and
One challenge with mode selection is its associated overhead due service discovery, a considerable amount of energy is consumed.
to channel estimation and control signalling. Minimizing this over- Another challenge of D2D discovery is related to designing ef-
head has the potential to improve the battery life of the devices ficient, less complex and inexpensive solutions [8]. The BS is more
within the network [40]. computationally intensive and could assist the D2D users so that
these devices do not lose considerable energy through the random
5.1.3. Resource allocation channel sensing procedure [4]. It is important to note that the fre-
Allocation of spectral resources is regarded as a fundamental quency of discovery and device synchronizations are typical chal-
(research) problem since multiple D2D links can spatially reuse a lenges that should be well-addressed [40]. These call for appropri-
resource block [189]. Therefore, the network should be designed ate radio resource management techniques [1]. For socially-aware
such that nearby UEs do not share the same resources. This would D2D communication, the choice of a suitable D2D peer is a typi-
help to achieve proper resource allocation to cellular UEs. Besides, cal challenge to be addressed for link admission. Realistic mobil-
using robust optimization techniques are required. Special atten- ity models should be incorporated into investigations on socially
tion should be given to the use of mixed integer non-linear pro- aware peer discovery proposals [11].
gramming. Note that its complexity and practicality in real de-
ployment settings should be borne in mind. Resource allocation 5.1.5. Relaying and multihop D2D
schemes should also consider the ‘stochastic nature of the gains More research are required to fully investigate multihop con-
of links’ and accommodate the varying number of D2D and cellu- nections in D2D networks. For instance, the throughput enhance-
lar links. For the schemes aiming to consider joint radio resource ment in multihop D2D architecture using network coding can be
allocation and power control algorithms for guaranteeing the QoS attempted. Study on synchronization at the cluster and global
of cellular users, D2D users can reuse CUE resources. However, it is levels, group communication in public safety applications, group
20 O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938

management, and network densification are also open for future is that the network operator loses control of the management of
research considerations [14]. Channel selection, next hop selec- the network [1].
tion and reducing end-to-end delay also poses challenges to relay-
assisted D2D communication [9]. Another main challenge in relay- 5.1.8. Energy consumption
assisted D2D is to convince users to function as relays [11]. This is As D2D is considered a key component of future cellular net-
because it comes at the cost of losing their battery energy as well works, prolonging the battery of mobile devices remains an is-
as limiting their capacity. Thus, convincing users to serve as relays sue of concern [195]. Thus, the reduction of power consumption
and providing an incentive to them is an active research direction for D2D communication requires further investigation [14]. This is
[1,11]. Furthermore, security concerns are another major obstacle to important as more energy is consumed in traditional direct com-
the use of relays. Studies on multihop socially-aware D2D commu- munication technologies leading to battery drain of devices [6].
nications should investigate the impact of different mobility pat- Improvement of energy-efficiency should be tackled wholesomely
terns [11]. and not restricted only to radio communication since the energy
consumption of a device does not solely depend on radio com-
5.1.6. Mobility and handover munication [1]. An approach to reducing the power consumption
The consideration of user mobility is a vital aspect of D2D (at the UE) is the joint optimization of mode selection, resource
communication research. Consider a scenario where a file is only allocation and power assignment. However, proposals using this
partially transmitted due to disconnection as a result of mobil- technique should ensure minimal complexity [1]. Implementation
ity. Such a file can be deemed useless [193]. This clearly shows of complex resource allocation techniques for mitigating interfer-
that user mobility could have a non-trivial impact on the efficiency ence between cellular and D2D communication could be feasible
of D2D communication. Thus, mobility and handover management for consideration. However, it is characterized by higher computa-
is a matter of concern, since mobile D2D devices within a cell tion overhead and complexity at the eNB [40].
have to handover links to cellular users. Determining the condi- It is also essential to minimize the energy in the downlink and
tions for efficient handover especially in scenarios with high mo- the eNB especially when devices are far from the eNB, and a lot
bility is an open research aspect [40]. For networks such as vehic- of power is consumed in the network. The transmission power
ular D2D applications with high mobility and frequent handovers, of devices can be decreased significantly if D2D users are close
it is important to ensure effective handovers and interference mit- to each other. It is also important to note that, the more in-
igation are simultaneously handled. This is due to the control and terference is experienced from the cellular transmission, the less
signalling frequencies associated with vertical handovers which energy-efficient the system becomes. Thus energy-efficiency should
could generate interference and deteriorate the instantaneous SNR be studied with mode selection and interference mitigation. How
[40]. the data to be relayed are multiplexed with the data of the re-
Traditional cellular communication can effectively accommo- lays should also be considered when studying the potential of re-
date mobile nodes even at high speeds. This can be considered lays for extending the battery life of devices [1]. Thus, minimizing
for the communication of single and multiple D2D pairs. The 3GPP power consumption of relay nodes is a challenge of relay-assisted
mobility models recommended for D2D is a good start [4]. Admis- D2D communication [196]. Investigation of energy-efficiency is also
sion control schemes designed for D2D communication should be of paramount concern in social-aware D2D communication when
able to admit as many D2D links as possible when compared to devices are sharing the wireless medium [11] and their social in-
a traditional random model where devices are admitted randomly teractions are taken into account. Finally, low-cost RF energy har-
[4]. With this in mind, it is necessary to study the impact of di- vesting modules could be considered for charging D2D user [40] to
verse mobility patterns on network performance metrics such as improve the energy-efficiency and throughput of the network.
coverage or throughput. Furthermore, there is a need for analyti-
cal models to study the velocity of mobile devices in applications 5.1.9. Modeling
such as vehicular D2D communications which support energy har- The dynamic mobile network will require sophisticated tech-
vesting, and characterize an accurate hand-off criteria for efficient niques and advanced algorithms when adopting D2D technol-
transfer of energy [194]. ogy [1]. Similarly, modeling UEs to support relay functionality is
paramount. For network models which assumes clustering, co-
5.1.7. Channel state information interference between clusters should be studied. Generally, mod-
A typical challenge in D2D communication is the CSI feedback els deployed for D2D communication should employ a more re-
requirement especially when there is an increased number of D2D alistic dynamic traffic flow as opposed to the full buffer assump-
and interfering links [197]. This is necessary as the device must tion [1,4]. The existing D2D channel measurements and models are
know the channel information of its neighbours [100]. We recall currently insufficient to properly describe their peculiar and di-
that a characteristic of autonomous D2D control is that resource al- verse channel characteristics with adequate accuracy when all di-
location and power control are taken care of by D2D users. The key mensions put into consideration. Realistic mobility models should
advantage of this approach is that the signalling overhead is less. be incorporated into investigations on socially aware peer discov-
However, the disadvantage is the amount of interference posed to ery proposals. Studies on multihop socially-aware D2D communi-
traditional cellular users [1]. Determining an optimal number of cations should also investigate the impact of different mobility pat-
D2D nodes in the network, exploiting common interest and a well- terns [11].
synchronized transition between D2D and cellular modes are also Considering the aforementioned, it is apparent that general, re-
required to achieve efficient device communication [10]. alistic, and easily deployable models are sought for D2D scenar-
In cases where the control of the network is centralized, the BS ios. For many of the schemes reviewed in this paper, optimization
is usually assumed to be computationally intensive. In such sce- techniques are widely deployed. Artificial intelligent techniques are
narios, proposed schemes should not leave the BS with too much also gaining popularity among researchers. These techniques could
computation overhead [4]. The main disadvantage of this full con- be used to realize a joint mode selection, power control and re-
trol is that the eNB needs to have knowledge of the exact CSI of all source allocation for single and multiple D2D pairs targeting real-
links involved, which generates signalling overhead. On the other time and ultra-low latency applications. In such scenarios, mobility,
hand, loosely controlled D2D has a lower signalling overhead and clustering, caching and social characteristics of users could also be
hence it is meritorious in this regard. However, the key challenge factored in. It is important to mention that asides mathematical
O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938 21

modeling of different aspects of D2D communication, more test In the context of a smart city, D2D communication would be
bed and realistic settings are encouraged to further reveal the able to play a key role in ensuring a more reliable transmis-
practical design challenges which may not be captured otherwise. sion of real-time data which applies to vehicular traffic manage-
These settings should take into account the diverse use-cases of ment [123]. Thus, proper resource allocation in real-time applica-
D2D communication [4]. Scenarios, where D2D users are located in tions should be considered [122]. Since D2D communication and
different cells require further consideration [1] and accurate mod- network infrastructure densification are considered notable ways
elling. of improving future cellular network performance, it is important
With regards to experimentation and test-beds, some of the that proper methods of mitigating interference in such settings
previous works in this area ([198–202] for example) have fo- are studied. Furthermore, the constructive use of interference such
cused on video/multimedia streaming application while Aoude as RF-energy harvesting should be considered to improve network
et al. [203] looked into the design of a social-aware android-based performance. In UAV-supported ultra-dense networks [208] coex-
crowdsourcing application using data obtained from the univer- isting with terrestrial D2D communication, proper spectrum reuse
sity campus. Experimentation on the expected delays using Wi-Fi using advanced spectrum sharing techniques is necessary. In this
direct is also presented in [204]. More experimental models are respect, efficient power control schemes are also required to max-
required to incorporate new technologies (such as mmWave and imize the benefits of UAV technology [209].
massive MIMO) while considering the social nature of human be-
ings in terms of willingness to relay and forming groups/clusters. 5.2.3. MIMO
One of the most significant technologies for 5G is MIMO as
5.1.10. Security it offers huge performance improvements in terms of energy and
Security is a fundamental issue in wireless communication. This spectral efficiencies [210]. The fact that D2D also brings spectral
is because it is necessary to guarantee the confidentiality and in- efficiency and energy efficiency gains makes the interplay between
tegrity of transferred information in a channel. Also, the receiver MIMO and D2D interesting. MIMO uses a large number of anten-
should be able to affirm that the data received is indeed trusted nas at each BS which helps to achieve gains in multiplexing and
and coming from the right source. ‘spatial interference suppression’ for cellular users. When D2D un-
Users privacy can be ensured by using anonymity techniques derlays is considered in MIMO-based cellular networks, the lat-
to protect their identity. Similarly flexible authentication and non- ter helps to mitigate extra interference of D2D communication,
repudiation schemes for devices joining or leaving the network is however, several problems emerge. For instance, interference oc-
essential. Security schemes should also be put in place such that curs when D2D reuse uplink resources of CUE in a D2D-enabled
malicious devices do not feign information to the BS which may be MIMO system which makes pilot signal overhead reduction crucial
detrimental to the security of the network [40]. The consideration in such circumstances [210]. The problem occurs because orthogo-
of suitable cryptographic techniques for D2D in LTE is an issue that nal pilots are usually transmitted by CUEs to obtain channel state
should be well studied. Realistic scenarios and accurate cryptanal- information. The introduction of D2D means that each D2D trans-
ysis are required for such investigation [1]. Physical layer security mitter uses orthogonal pilots to estimate the channel and this in-
techniques using imperfect CSI estimation is somewhat practical. creases the pilot overhead significantly. Also, cellular to D2D inter-
However, it is essential to study such techniques with a density ference ensues even though using MIMO supports the transmission
suitable for consideration in practical deployments [29]. of multiple users on the same time-frequency block [82].
The large number of spatial degrees of freedom which MIMO
5.2. Emergent challenges offers can be used to facilitate D2D/CUE coexistence. However, con-
trolling the parameters becomes challenging due to the compli-
5.2.1. Social-aware D2D cation and the interference dynamics of such networks.10 On the
Socially-aware D2D communication has unique applications in other hand, this is needed to estimate/determine the rates of data
places like the event centre and university campus where users transmission [211]. In such scenarios, novel learning techniques
have a common interest. Investigations on socially-aware D2D are needed for rate adaptation of massive MIMO cellular down-
communication should be directed at such scenarios. When de- link with underlaid D2D networks. Rate allocation/scheduling is
vices share the wireless medium, the interactions in the social very important especially under coordinated and uncoordinated
domain comes to play and the energy-efficiency in such circum- channel estimation schemes. Also, how D2D interference affects
stances should be investigated. The transmission duration for so- the downlink cellular performance in MIMO system having an in-
cially enabled D2D communication is an important attribute that creasing number of multiple D2D transmit antennas is an issue
should also be tackled [11]. [212]. Another problem relates to interference coordination in full
dimension-MIMO with D2D underlay. It is essential in such scenar-
5.2.2. Ultra-dense networks ios that CSI feedback be reduced and D2D to CUE interference be
Ultra-dense networks involve the dense deployment of a large mitigated. As such, effective interference coordination techniques
number of small cells to satisfy seamless coverage in 5G cellular are required to also mitigate interference at D2D pairs due to CUEs
networks [205]. In lay terms, it means bringing the BS and access [213]. Mitigating interference effect of pilot contamination is an-
points close to the end user. Network densification is expected to other new area. Pilot contamination refers to interference among
increase the network performance as it exploits spatial re-use as the same pilot sequences which are usually assigned to CUEs and
well as the proximity of the BS to end users. Similarly, network DUES. This requires effective pilot reuse schemes. Optimal pilot as-
densification has the potential to increase throughput. How the signment schemes are thus needed [214].
spectrum sharing improves the performance of the network is a
critical question to be answered in this respect [206]. Furthermore,
5.2.4. Heterogeneous networks
resource allocation is challenging in ultra-dense networks consid-
This involves operator-owned short range and low-power de-
ering that devices are massive in number and randomly located.
vices/nodes which are meant to improve the average capacity
The position of such devices tend to change frequently as a result
of their movements which makes it imperative to design schemes
to achieve efficient resource allocation while guaranteeing the QoS 10
For example, before transmission begins, it might be difficult to know the in-
of traditional network users [207]. terference statistics or interference power levels at the transmitters.
22 O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938

performance in cellular networks [215]. Heterogeneous cellular arise when this service is to be deployed for real-time applications
networks involving D2D, macro and micro base stations (such as where timely interactive responses are required. To address this
femtocells and picocells) deserve further research and investiga- problem, mobile edge computing is emerging as a promising solu-
tion for interference management and resource allocation [12]. Al- tion. It uses several devices at the network edge and can leverage
though femtocells provide benefits for cellular networks, it could on the ‘network-assisted D2D collaboration’ for facilitating commu-
pose interference challenges which adversely affect system perfor- nication and computation. The advantages include low latency and
mance when D2D also coexist in such networks [29]. Basically, cel- agile computation for mobile users. One of the prime objectives in
lular users can be prioritized while at the same time maximiz- such scenarios is to ensure tasks are assigned in an energy-efficient
ing the range of D2D users [12]. Similarly, D2D devices should be manner [217].
able to coordinate with other base stations for interference man- To achieve energy-efficient edge computing for the massive
agement [12,14]. number of data-hungry applications, a major constraint is the low
New schemes to mitigate this interference in heterogeneous computing capacity of devices. Similarly, the power supply poses
networks should study use cases where both femtocells and the concerns as well as the nature of wireless resources. In such
eNB share the channel. This is more realistic as opposed to when scenarios, D2D offloading architecture may be propitious. Relay-
they use dedicated channels [1]. Interference cancellation tech- assisted D2D could also produce further improvement especially
niques could be used to mitigate the interference of small cells in when multi-cell scenarios are considered [218].
Heterogeneous Networks (HetNets). However, prior knowledge of
the channel information is required [40]. For architectures which 5.2.7. SWIPT-enabled D2D communication
involve data offloading by sending data to the cloud, the advantage SWIPT is a key technology recently proposed to further achieve
is a reduction in the latency associated with the computation in energy-efficient communication in wireless systems. Smart devices
the cloud. However, it is also imperative to consider the energy ef- can harvest radio frequency energy from their energy access point
ficiency in such architectures since data would be periodically sent using this technology [219]. One of the advantages is that device
to the cloud [11]. lifetime can be prolonged as wireless devices can ‘scavenge’ en-
ergy while receiving data. Also, transmission efficiency in SWIPT is
5.2.5. mmWave-based D2D enhanced when compared with traditional TDD mechanism. More
The microwave spectrum below 3GHz is currently used by most interestingly, interference could be used in the course of energy
wireless systems today. However, the recent surge of the demand harvesting, and thus kept under control. For example, when there
for data makes this spectrum very crowded and thus it experi- is high transmission power which traditionally leads to a higher
ences a shortage. A potential solution of this problem towards the SINR, this increase in transmit power gives room for more energy
realization of 5G systems is the consideration of millimeter wave to be harvested. However, determining the most appropriate trans-
(mmWave)-band11 . mmWave can bring benefits in terms of high mission power in this setting is quite challenging. Other challenges
gigabit-per-second user data rates. However, it comes with techni- with regard to modeling SWIPT-enabled D2D are the time-varying
cal challenges which include coverage holes, limited non-line-of- channel conditions and node mobility which affects CSI availabil-
sight range, and weak diffraction and reflection. D2D has the po- ity. Thus, robust beamforming techniques are required to cope with
tential to solve these problems as it deploys short-range wireless the mobility issues [133].
links to connect devices [163]. The consideration of full-duplex D2D communication and
The use of mmWave-based D2D communication has huge SWIPT techniques is also another open direction [220]. Although
prospects and can create several opportunities. Specifically, fea- wirelessly powered D2D communication can improve network ca-
tures of mmWave such as high pathloss require directional beam- pacity and prolong network lifetime, it is not bereft of its typical
forming which makes it very suitable for D2D communication as challenges which include [134] (i) reluctance of the autonomous
this directional transmission reduces interference and facilitates power station to transmit its own power resource to D2D transmit-
spatial spectrum sharing. High bandwidth mmWave gives room for ter without getting any benefit. This requires incentives to encour-
D2D communication with high throughput performance without age D2D transmitters to engage in cooperative transmission and
interfering with traditional cellular users. Furthermore, the short- energy trading between the power stations and D2D transmitters.
range links help to improve the capacity which is adversely af- (ii) wireless link for D2D transmissions may be inversely affected
fected by the high density of D2D devices [216]. It also has the by fading. This requires dynamic resource allocation which jointly
potential to enhance the capacity of future generation D2D com- performs rate adaptation, transmit power control and energy trans-
munication. However, it is important to investigate how compati- fer. The constraints, in this case, include the energy capacity, incen-
ble this technology is to current resource management techniques. tives and limited data buffer. (iii) resource stations of D2D changes
Another challenge with this technology is managing peer dis- in a much slower manner than fading which warrants the need for
covery since mmWave based communication has limitations in two-time scale network decisions for coordinating different time-
terms of range. Furthermore, it is necessary to offload traffic from scale network states.
one frequency to another when the mmWave coexists with tradi-
tional cellular network. Changes in the hardware design of existing 5.2.8. D2D-assisted C-RANs
handheld devices would also be imperative and as such, effective C-RAN is considered one of the potential 5G solutions. Some of
interface design is required to support both D2D and cellular com- its attractive features are the ability to achieve a higher system ca-
munication. pacity and reduced power consumption since remote radio heads
(RRHs) are brought closer to the user and long distance propaga-
tion are not required. Furthermore, interference can be more easily
5.2.6. D2D-assisted edge computing
mitigated since the BBU is centralized. This is because cooperative
To facilitate task offloading which has received much atten-
processing can be adopted to mitigate interference. It is also more
tion in recent times, mobile cloud computing has been studied to
energy and cost efficient because it can leverage resource pooling
help mobile users offload computationally intensive tasks to the
and statistical multiplexing gain. As a sequel, the computing re-
remote clouds which are richer in resources. However, challenges
sources of each traditional BS do not require dimensioning based
on peak load conditions [221]. One of its problems, however, is the
11
At frequency range of 30 - 300 GHz. burden on the fronthaul which negatively impacts on the capacity
O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938 23

and time-delay performance. In this respect, D2D communication is important (and may be highly challenging) especially in dam-
can be introduced to facilitate direct communication between D2D aged regions with high D2D user density [182]. Particularly, it is
devices within proximity without passing through the RRH [222]. necessary to determine whether a user is associated with a UAV or
A key merit of D2D is its ability to improve the fronthaul de- a UAV-served user or such users should be left without coverage
lay in C-RANs. The merger of D2D and C-RAN will change the cur- to cater for other users having better conditions [182].
rent communication landscape paving the way for future 5G sys- Another major challenge is the nature of interference that re-
tems [156]. Although D2D can reduce the burden of fronthaul and sults from the coexistence of terrestrial devices and the flying
also improve latency performance, the dynamic traffic pattern and UAVs. For example, when D2D and UAV share the same spec-
time-varying channel conditions require proper resource allocation trum, interference in such scenarios is intricate [180] considering
techniques. D2D in C-RANs has problems with inter and intra-tier that it experiences frequent changes in topology [183]. The prob-
interference which could diminish the benefits produced by D2D lem of interference is even more critical when UAV underlays het-
communication in this context [160]. For instance, when D2D is erogeneous networks with D2D communication [181]. Managing
incorporated into heterogeneous cloud radio access networks (H- interference in such cases requires highly efficient resource allo-
CRANs), interference management becomes very challenging as the cation techniques which are quite demanding. Furthermore, effi-
H-CRAN architecture is different from traditional cellular networks cient resource allocation requires proper channel resource utiliza-
and HetNets. This is because the dense deployment of RRHs poses tion [180]. Parameters to be optimized include power, altitude, lo-
severe interference [109] to the network. In this respect, proper cation and bandwidth. The altitude of UAVs must neither be too
mode selection and resource management techniques are required high nor too low as this affects the performance of UAV-aided net-
to make the most benefit of these technologies. works in D2D underlay [187].
It is important to reiterate that the mobility of UAVs fur-
5.2.9. D2D-assisted Fog ther poses challenges [184] due to their diverse trajectories which
Fog has revolutionized a lot of mobile applications. In mobile might involve an infinite number of variables [179]. In highly dense
crowdsourcing, for example, task dissemination and data collection network deployments requiring clustering, efficient clustering algo-
can be deployed as services in fog nodes [223]. Fog enables IoT de- rithms are needed to improve the short-range communication of
vices to communicate using application device on a proximate fog D2D devices. Node clustering, path planning, coding and D2D file
node. Mobile fog nodes will move with IoT devices which will re- sharing can all be jointly optimized [185] in such cases. Issues re-
quire D2D communication to keep their connections intact. In this lating to energy efficiency and fairness are other potential research
regard, there is a need to study how D2D can be used to facilitate directions in UAV-assisted D2D networks [182].
the connection of fog and IoT devices and reveal the challenges
involved (one of which is the additional support required to al- 5.2.11. Caching and content sharing
low fog nodes preserve D2D links). D2D is also ideal to support One of the motivations for caching data is the threat to cellu-
M2M communication within fog clusters. It is important that effi- lar network capacity from the emergence of high popular contents
cient transmission schemes are designed to offload traffic from the in diverse mobile applications. Caching facilitates content shar-
backhaul of new servers [224]. As shown in [225], network cod- ing among mobile devices [228] and can naturally be facilitated
ing can be used in D2D cooperative fog data networks to achieve by D2D communication. The major issues associated with caching
this. data relate to how rational criteria can be set to characterize the
Fog computing is a ‘promising’ technology which can provide relationship between the content provider and the ‘downloader’.
cheaper and lower latency services. In those applications, devices Also selecting the proper downloading modes and candidates to
can offload computationally intensive tasks to other devices with provide content [77], and providing incentives to users to provide
idle resources for computation purposes [226]. Using multicast content [229] are challenging issues. Similarly, properly satisfying
communication, D2D can be used to support fog computing in requests for contents and effective message exchange between de-
LTE/LTE-A networks [224]. A problem arises when only devices vices is of prime concern [90]. In this respect, distributed caching
within the proximity of the offloading device (i.e., its neighbors) (e.g [91]) could play a key role in crowded regions where there
can offer the computation task where there may be other devices is a massive demand for online content. Also, social IoT and D2D
that do such tasks more effectively. In such settings, mechanisms caching can be studied to exploit the benefits of the two paradigms
to inform other devices should be put in place to encourage non- bearing download latency and successful delivery probability in
neighbor devices to perform such computational tasks. However, mind [230].
this requires the provision of incentives to neighbor devices to en- In a scenario where there is a heterogeneous preference for
courage them to inform other devices while also relaying their true content, the preference of a serving user and a neighbouring in-
prices. Pricing is essential here as the tasks of computation and of- terfering user might differ. Storing both requested and interfering
floading consume energy and storage [226]. Pipeline transmission content could pose a new research question since enhancing the
policies in F-RAN D2D can facilitate content delivery, as such, it requested signal is not always equal to reducing interfering signal
is essential to characterize latency reduction when D2D links are [231]. Also, there is a need for a joint design of caching policy and
used for modern F-RAN [227]. cooperative distance. Incorporating self-caching with D2D-caching
and the trade-offs involved should be revealed [232]. Motivating
5.2.10. UAV-assisted D2D UEs to cache, relay and share data even when they would have
The coexistence of UAV and D2D comes with its peculiar chal- to sacrifice their energy is another open problem to be addressed
lenges. For instance, the fact that UAV altitude is adjustable means [233].
the channel characteristics will differ from that of traditional cel- Caching has traditionally been used to facilitate the delivery of
lular BS [187] which poses new research challenges. For a glimpse non-real time data (such as on-demand video) [69]. Another typ-
into such challenges, note that in some cases establishing D2D ical scenario of content sharing is D2MD communication which
links would highly depend on the connection between UAV and leverage on broadcast communication. In this context, shared con-
a ground user which makes user association complex [182]. How- tents are delivered to multiple receivers in tandem. This is ad-
ever, traditional fading channels are not fit for UAV-assisted com- vantageous as it helps to offload traffic from the BS. However, to
munication as UAV links are air-to-ground links which are charac- fully maximize the benefit of this communication paradigm, the
terized by LOS and NLOS links [183]. Furthermore, user association interference between the D2MD groups and cellular users have
24 O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938

to be properly addressed since the D2MD links reuse the cellular enabled D2D networks. The mobility models should capture user
spectrum [97]. Other challenges related to D2D communication in behaviours in different scenarios with social considerations [242].
cache enabled networks are discussed below. For example, using comprehensive mobility models which take
Limited caching capacity: This is basically due to the storage con- into account interference from other transmitting nodes is neces-
straints in mobile devices which puts limitations to the amount sary for scenarios such as multicast clustering [57].
of content that could be cached in such devices. Considering the Clustering Clustering is beneficial in the context of caching and
limited caching capacity constraints, popular contents are mostly content sharing. In each cluster, cluster heads can perform cache
cached despite the fact that some users may require unpopular allocation [238] and popular files can be cached within the cluster
contents [234]. This calls for a proper and accurate caching deci- [240]. Cluster-users can be grouped based on content similarities
sion since it is not possible that all contents are cached due to the [246] and user preferences to satisfy users request [247]. In clus-
limited caching capacity of users [235]. Moreover, when using an tered networks, machine learning algorithms can be deployed to
edge server to determine important contents to be cached at the learn and extract information from user data (such as search key-
BS, cached replicas need to be constantly updated [236]. words) and service request. The request patterns can be learned
As a result of limited cached content, complete caching may to predict users future interests [247]. Also, each cluster can have
have to be done over several connections, especially for very large helpers which are directed at serving common users thereby pro-
files [234]. Therefore, the limited battery capacity of devices should viding content diversity and higher hit probability [238]. However,
be considered as devices may not be willing to help other devices choosing the devices which would cache the most important and
due to such energy constraint among other reasons [237]. Although popular files is challenging [248]. Proper cluster maintenance is re-
not all UEs will be willing to participate in caching and content de- quired as mobile users and helpers change frequently [238]. Fur-
livery [238], interested UEs could help to provide content diversity thermore, reliable clustering techniques should be developed to
as two helpers close to each other can cache different contents and improve clustered D2D for traffic offloading such as a proactive ap-
duplicate the caching of unpopular contents [238]. In this case, ap- proach which takes preventive measures during cluster formation
propriate content placement especially when devices cannot store [232]. Reactive mechanisms aimed at either recovering from fail-
all content is crucial [239]. ures or minimizing failures dynamically after clusters are formed
Content popularity: This is one of the primary considerations for are also necessary [249]. Robustness and failure recovery are es-
designing efficient cache-enabled D2D networks for improving 5G sential for D2D communication networks as moving devices can
performance. It is used to statistically characterize the interest of disrupt active D2D communications especially in very dense and
file requesters, however, it does not capture diverse users’ inter- busy ‘urban’ areas.
ests in a variety of content [234]. Content popularity and deter-
mining contents to cache play key roles to improve the hit prob-
6. Conclusion
ability of users at the edge, reduce power consumption and alle-
viate the burden of the backhaul [233]. Content popularity models
With the aim of presenting a primer on the fundamental is-
can either be static or dynamic. The static models do not reflect
sues and design guidelines for D2D communication in line with
the time-varying property of content popularity. In reality, con-
recent research trends, we: introduced D2D communication and
tent popularity varies with time and it is not known a priori. This
its applications; presented a classification of D2D communication
makes it necessary that it be tracked and estimated [240].
based on spectrum partition, level of control, duplexing and num-
Mobility modelling: Mobility constitutes some of the D2D big
ber of hops; and discussed interference and the design aspects of
data features12 which could facilitate accurate network modelling
D2D communication such as mode selection, power control and re-
[250]. Hence proper consideration of helper selection and mobil-
source allocation. We further highlight very recent research works
ity model can be used to effectively distribute content to con-
in this respect to bring the reader closer to the current trends.
sumers/users [241]. With the knowledge of user trajectories, DUEs
Amongst others, the application areas covered by these works in-
can be provided contents by other users along their trajectories.
clude vehicular communication, content sharing, video streaming,
Thus, user mobility has the potential to improve the cache hit ra-
social applications, real-time applications, and advertisements. The
tio [234]. Although mobility can enhance throughput performance,
techniques and models used, and their metrics were also sum-
practical assumption such as randomness has to be considered in-
marized. Finally, we described the challenges highlighted in sev-
stead of overly idealistic assumptions [242]. It is important to bear
eral portions of D2D literature while giving very recent technolo-
in mind that user mobility varies over time and thus affect the
gies special attention. This paper positions itself as a precursory
content sharing scenarios since the topology becomes dynamic.
material discussing the fundamental concepts, design issues and
Also, CSI changes due to mobility which can lead to incomplete
challenges in D2D research. In line with the research advance-
transmission of content as time passes [234].
ments in D2D communication, future surveys could focus more on
Implementing real-life scenarios require social patterns and
new developments associated with the interplay between D2D and
well descriptive mobility models which may be very challenging.
other emergent technologies discussed in this paper such as MIMO,
Also, mobility aware analyses that capture realistic scenarios with
mmWave, edge-computing, SWIPT, and UAV. Furthermore, tutorials
more than two file portions [243] and variation in contact du-
on methods (such as game theory, stochastic geometry, graph the-
ration during content delivery would be needed [244]. However,
ory, and artificial intelligence) for modeling and addressing practi-
channel and user mobility profile predictions need user mobility
cal design problems in D2D communication research could also be
interaction [245]. Hence, investigation of heterogeneous distribu-
put forward.
tion of contact and inter-contact time is important [234]. This is
because both contact duration and contact rate have to be consid-
ered in mobility-aware caching research to improve the hit per- Acknowledgment
formance [244]. It is prime to consider appropriate mobility mod-
els that provide the proper performance characterization of cache- We would like to appreciate everyone who provided valuable
suggestions and support to improve the content, quality, and pre-
sentation of this paper. This work has been supported by the
12
Other D2D big data features include content size, interest, time-varying popu- Malaysian Ministry of Higher Education under the Malaysian In-
larity and social relationships. ternational Scholarship scheme.
O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938 25

Conflict of interest [28] M. Haus, M. Waqas, A.Y. Ding, Y. Li, S. Tarkoma, J. Ott, Security and privacy in
device-to-device (d2d) communication: a review, IEEE Commun. Surv. Tutori-
als 19 (2) (2017) 1054–1079.
None. [29] R.I. Ansari, C. Chrysostomou, S.A. Hassan, M. Guizani, S. Mumtaz, J. Ro-
driguez, J.J.P.C. Rodrigues, 5G d2d networks: techniques, challenges, and fu-
ture prospects, IEEE Syst. J. 12 (4) (2018) 3970–3984.
References [30] M. Ahmad, M. Azam, M. Naeem, M. Iqbal, A. Anpalagan, M. Haneef, Resource
management in d2d communication: an optimization perspective, J. Netw.
[1] P. Mach, Z. Becvar, T. Vanek, In-band device-to-device communication in Comput. Appl. 93 (2017) 51–75.
OFDMA cellular networks: a survey and challenges, IEEE Commun. Surv. Tu- [31] O.N. Hamoud, T. Kenaza, Y. Challal, Security in device-to-device communica-
torials 17 (4) (2015) 1885–1922. tions: a survey, IET Netw. 7 (1) (2018) 14–22.
[2] M. Noura, R. Nordin, A survey on interference management for device-to-de- [32] M. Wang, Z. Yan, A survey on security in d2d communications, Mobile Netw.
vice (d2d) communication and its challenges in 5g networks, J. Netw. Com- Appl. 22 (2) (2017) 195–208.
put. Appl. 71 (2015) 130–150. [33] S. Yu, W. Ejaz, L. Guan, A. Anpalagan, Resource allocation schemes in d2d
[3] G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Miklós, Z. Turányi, communications: overview, classification, and challenges, Wireless Pers. Com-
Design aspects of network assisted device-to-device communications, IEEE mun. 96 (1) (2017) 303–322.
Commun. Mag. 50 (3) (2012) 170–177. [34] U.N. Kar, D.K. Sanyal, An overview of device-to-device communication in cel-
[4] A. Asadi, Q. Wang, V. Mancuso, A survey on device-to-device communication lular networks, ICT Express 4 (4) (2017) 203–208.
in cellular networks, IEEE Commun. Surv. Tutorials 16 (4) (2014) 1801–1819. [35] B. Ismaiel, M. Abolhasan, D. Smith, W. Ni, D. F-RANklin, A survey and compar-
[5] D. Feng, L. Lu, Y. Yuan-Wu, G.Y. Li, G. Feng, S. Li, Device-to-device commu- ison of device-to-device architecture using LTE unlicensed band, in: 2017 IEEE
nications underlaying cellular networks, IEEE Trans. Commun. 61 (8) (2013) 85th Vehicular Technology Conference (VTC Spring), Sydney, NSW, 2017,
3541–3551. pp. 1–5.
[6] P. Gandotra, R.K. Jha, S. Jain, A survey on device-to-device (d2d) communica- [36] K. Shamganth, M.J.N. Sibley, A survey on relay selection in cooperative de-
tion: architecture and security issues, J. Netw. Comput. Appl. 78 (2017) 9–29. vice-to-device (d2d) communication for 5g cellular networks, in: 2017 In-
[7] J. Liu, N. Kato, J. Ma, N. Kadowaki, Device-to-device communication in lte-ad- ternational Conference on Energy, Communication, Data Analytics and Soft
vanced networks: a survey, IEEE Commun. Surv. Tutorials 17 (4) (2015) Computing (ICECDS), Chennai, 2017, pp. 42–46.
1923–1940. [37] O. Yazdani, G. Mirjalily, A survey of distributed resource allocation for device–
[8] G.A. Safdar, M. Ur-Rehman, M. Muhammad, M.A. Imran, R. Tafazolli, Inter- to-device communication in cellular networks, in: 2017 Artificial Intelligence
ference mitigation in d2d communication underlaying LTE-a network, IEEE and Signal Processing Conference (AISP), Shiraz, 2017, pp. 236–239.
Access 4 (2016) 7967–7987. [38] M. Höyhtyä, O. Apilo, M. Lasanen, Review of latest advances in 3gpp stan-
[9] F.S. Shaikh, R. Wismüller, Routing in multihop cellular device-to-device (d2d) dardization: D2d communication in 5g systems and its energy consumption
networks: a survey, IEEE Commun. Surv. Tutorials 20 (4) (2018) 2622– models, Future Internet 10 (1) (2018) 3.
2657. [39] R. Elouafadi, M. Benjillali, Cooperative noma-based d2d communications: a
[10] H.A.U. Mustafa, M.A. Imran, M.Z. Shakir, A. Imran, R. Tafazolli, Separation survey in the 5g/iot context, in: 2018 19th IEEE Mediterranean Electrotechni-
framework: an enabler for cooperative and d2d communication for future 5g cal Conference (MELECON), Marrakech, 2018, pp. 132–137.
networks, IEEE Commun. Surv. Tutorials 18 (1) (2016) 419–445. [40] F. Jameel, Z. Hamid, F. Jabeen, S. Zeadally, M.A. Javed, A survey of device–
[11] M. Ahmed, Y. Li, M. Waqas, M. Sheraz, D. Jin, Z. Han, A survey on social- to-device communications: research issues and challenges, IEEE Commun.
ly-aware device-to-device communications, IEEE Commun. Surv. Tutorials 20 Surv. Tutorials 20 (3) (2018) 2133–2168.
(3) (2018) 2169–2197. [41] M.K. Pedhadiya, R.K. Jha, H.G. Bhatt, Device-to-device communication: a sur-
[12] S. Ali, A. Ahmad, Resource allocation, interference management, and mode vey, J. Netw. Comput. Appl. (2018), doi:10.1016/j.jnca.2018.10.012.
selection in device-to-device communication: a survey, Trans. Emerging [42] M. Nitti, G.A. Stelea, V. Popescu, M. Fadda, When social networks meet d2d
Telecommun.Technol. 28 (7) (2017) e3148. communications: a survey, Sensors 19 (2) (2019) 396.
[13] S.T. Shah, S.F. Hasan, B.-C. Seet, P.H.J. Chong, M.Y. Chung, Device-to-device [43] O. Hayat, R. Ngah, Y. Zahedi, In-band device to device (d2d) communica-
communications: a contemporary survey, Wireless Personal Commun. 98 (1) tion and device discovery: a survey, Wireless Pers. Commun. 106 (2) (2019)
(2017) 1247–1284. 451–472.
[14] L. Wei, R. Hu, Y. Qian, G. Wu, Enable device-to-device communications un- [44] M.F. Hashim, N.I. Abdul Razak, Ultra-dense networks: integration with de-
derlaying cellular networks: challenges and research aspects, IEEE Commun. vice to device (d2d) communication, Wireless Pers. Commun. 106 (2019) 911–
Mag. 52 (6) (2014) 90–96. 925.
[15] Z. Liu, T. Peng, Q. Lu, W. Wang, Transmission capacity of d2d communication [45] M. Waqas, Y. Niu, Y. Li, M. Ahmed, D. Jin, S. Chen, Z. Han, Mobility-aware
under heterogeneous networks with dual bands, in: 7th IEEE International device to device communications: principles, practice and challenges, IEEE
ICST Conference on Cognitive Radio Oriented Wireless Networks and Com- Commun. Surv. Tutorials (2019), doi:10.1109/COMST.2019.2923708.
munications (CROWNCOM), Stockholm, 2012, pp. 169–174. [46] Y. Zhang, Y. Shen, X. Jiang, S. Kasahara, Mode selection and spectrum parti-
[16] M. Mozaffari, W. Saad, M. Bennis, Y.H. Nam, M. Debbah, A tutorial on UAVs tion for d2d inband communications: a physical layer security perspective,
for wireless networks: applications, challenges, and open problems, IEEE IEEE Trans. Commun. 67 (1) (2019) 623–638.
Commun. Surv. Tutorials (2019), doi:10.1109/COMST.2019.2902862. [47] S. Yu, W. Ejaz, L. Guan, A. Anpalagan, I.A. Rizvi, Resource allocation in
[17] O. Bello, S. Zeadally, Intelligent device-to-device communication in the inter- RF energy harvesting-assisted underlay d2d communication, Transactions on
net of things, IEEE Syst. J. 10 (3) (2016) 1172–1182. Emerging Telecommunications Technologies, e3589, Wiley Online Library,
[18] R. Maallawi, N. Agoulmine, B. Radier, T.B. Meriem, A comprehensive survey 2019.
on offload techniques and management in wireless access and core networks, [48] Y.-D. Lin, Y.-C. Hsu, Multihop cellular: a new architecture for wireless com-
IEEE Commun. Surv. Tutorials 17 (3) (2015) 1582–1604. munications, in: Proceedings IEEE INFOCOM 20 0 0. Conference on Computer
[19] R. Alkurd, R.M. Shubair, I. Abualhaol, Survey on device-to-device commu- Communications. Nineteenth Annual Joint Conference of the IEEE Computer
nications: challenges and design issues, in: 2014 IEEE 12th International and Communications Societies (Cat. No.00CH37064), Tel Aviv, Israel, 20 0 0,
New Circuits and Systems Conference (NEWCAS), Trois-Rivieres, QC, 2014, pp. 1273–1282. 3
pp. 361–364. [49] B. Kaufman, B. Aazhang, Cellular networks with an overlaid device to device
[20] P. Li, S. Guo, Literature survey on cooperative device-to-device communica- network, in: 2008 42nd Asilomar Conference on Signals, Systems and Com-
tion, Cooperative Device-to-Device Communication in Cognitive Radio Cellu- puters, Pacific Grove, CA, 2008, pp. 1537–1541.
lar Networks, SpringerBriefs in Computer Science, Springer, Cham, 2014. 7–12 [50] T. Peng, Q. Lu, H. Wang, S. Xu, W. Wang, Interference avoidance mechanisms
[21] X. Cheng, Y. Li, B. Ai, X. Yin, Q. Wang, Device-to-device channel measure- in the hybrid cellular and device-to-device systems, in: 2009 IEEE 20th Inter-
ments and models: a survey, IET Commun. 9 (3) (2015) 312–325. national Symposium on Personal, Indoor and Mobile Radio Communications,
[22] M. Wang, Z. Yan, Security in d2d communications: a review, in: 2015 IEEE Tokyo, 2009, pp. 617–621.
Trustcom/BigDataSE/ISPA, Helsinki, 1, 2015, pp. 1199–1204. [51] Technical specification group services and system aspects; feasibility study
[23] Y. Li, Z. Kaleem, K. Chang, Applications of interference alignment in d2d com- for proximity services (prose), 2013,
munications, in: 2015 International Conference on Information and Commu- [52] P. Cheng, L. Deng, H. Yu, Y. Xu, H. Wang, Resource allocation for cognitive
nication Technology Convergence (ICTC), Jeju, 2015, pp. 993–995. networks with d2d communication: an evolutionary approach, in: 2012 IEEE
[24] C. Kalalas, L. Thrybom, J. Alonso-Zarate, Cellular communications for smart Wireless Communications and Networking Conference (WCNC), Shanghai,
grid neighborhood area networks: a survey, IEEE Access 4 (2015) 1469–1493. 2012, pp. 2671–2676.
[25] S. Umrao, A. Roy, N. Saxena, Device-to-device communication from control [53] Z. Lin, Y. Li, S. Wen, Y. Gao, X. Zhang, D. Yang, Stochastic geometry analysis
and frequency perspective: a composite review, IETE Tech. Rev. 34 (3) (2017) of achievable transmission capacity for relay-assisted device-to-device net-
286–297. works, in: 2014 IEEE International Conference on Communications (ICC), Syd-
[26] P. Gandotra, R.K. Jha, Device-to-device communication in cellular networks: a ney, NSW, 2014, pp. 2251–2256.
survey, J. Netw. Comput. Appl. 71 (2016) 99–117. [54] H. Nishiyama, M. Ito, N. Kato, Relay-by-smartphone: realizing multihop de-
[27] G. Misra, A. Agarwal, S. Misra, K. Agarwal, Device to device millimeter wave vice-to-device communications, IEEE Commun. Mag. 52 (4) (2014) 56–65.
communication in 5g wireless cellular networks (a next generation promising [55] T. Sakano, Z.M. Fadlullah, T. Ngo, H. Nishiyama, M. Nakazawa, F. Adachi,
wireless cellular technology), in: 2016 International Conference on Signal Pro- N. Kato, A. Takahara, T. Kumagai, H. Kasahara, S. Kurihara, Disaster-resilient
cessing, Communication, Power and Embedded System (SCOPES), Paralakhe- networking: a new vision based on movable and deployable resource units,
mundi, 2016, pp. 89–93. IEEE Netw. 27 (4) (2013) 40–46.
26 O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938

[56] 3gpp tr 36.885 3rd generation partnership project; technical specification [85] M. Elsherief, M. Elwekeil, M. Abd-Elnaby, Resource and power allocation for
group radio access network; study on lte-based v2x services; (release 14), achieving rate fairness in d2d communications overlaying cellular networks,
2015. Wireless Netw. (2019) 1–10, doi:10.1007/s11276- 018- 01935- y. Springer
[57] B. Bai, L. Wang, Z. Han, W. Chen, T. Svensson, Caching based socially-aware [86] S. Liu, Y. Wu, L. Li, X. Liu, W. Xu, A two-stage energy-efficient approach for
d2d communications in wireless content delivery networks: a hypergraph joint power control and channel allocation in d2d communication, IEEE Ac-
framework, IEEE Wireless Commun. 23 (4) (2016) 74–81. cess 7 (2019) 16940–16951.
[58] X. Xiao, X. Tao, J. Lu, A qos-aware power optimization scheme in ofdma sys- [87] H. Gao, S. Zhang, Y. Su, M. Diao, Joint resource allocation and power control
tems with integrated device-to-device (d2d) communications, in: 2011 IEEE algorithm for cooperative d2d heterogeneous networks, IEEE Access 7 (2019)
Vehicular Technology Conference (VTC Fall), San F-RANcisco, CA, 2011, 20632–20643.
pp. 1–5. [88] W. Zhao, S. Wang, Resource sharing scheme for device-to-device communi-
[59] L. Lei, Z. Zhong, C. Lin, X. Shen, Operator controlled device-to-device com- cation underlaying cellular networks, IEEE Trans. Commun. 63 (12) (2015)
munications in lte-advanced networks, IEEE Wireless Commun. 19 (3) (2012) 4838–4848.
96–104. [89] M. Chen, S. Ullah, L. Wang, J. Chen, X. Wei, K. Kim, J. Xu, Analysis and
[60] D. Xenakis, M. Kountouris, L. Merakos, N. Passas, C. Verikoukis, Performance scheduling in a 5g heterogeneous content delivery network, IEEE Access 6
analysis of network-assisted d2d discovery in random spatial networks, IEEE (2018) 44803–44814.
Trans. Wireless Commun. 15 (8) (2016) 5695–5707. [90] J. Jiang, S. Zhang, B. Li, B. Li, Maximized cellular traffic offloading via device–
[61] T. Chen, G. Charbit, S. Hakola, Time hopping for device-to-device communi- to-device content sharing, IEEE J. Sel. Areas Commun. 34 (1) (2016) 82–91.
cation in LTE cellular system, in: In 2010 IEEE Wireless Communications and [91] K. Machado, A. Boukerche, E. Cerqueira, A.A.F. Loureiro, A socially-aware in-
Networking Conference (WCNC), Sydney, 2010, pp. 1–6. -network caching framework for the next generation of wireless networks,
[62] L. Wang, F. Tian, T. Svensson, D. Feng, M. Song, S. Li, Exploiting full duplex for IEEE Commun. Mag. 55 (12) (2017) 38–43.
device-to-device communications in heterogeneous networks, IEEE Commun. [92] D. Chatzopoulos, C. Bermejo, E.u. Haq, Y. Li, P. Hui, D2d Task offloading: a
Mag. 53 (5) (2015) 146–152. dataset-based q&a, IEEE Commun. Mag. 57 (2) (2019) 102–107.
[63] S. Mumtaz, H. Lundqvist, K.M.S. Huq, J. Rodriguez, A. Radwan, Smart direc- [93] C. Yi, S. Huang, J. Cai, An incentive mechanism integrating joint power, chan-
t-lte communication: an energy saving perspective, Ad Hoc Netw. 13 (2014) nel and link management for social-aware d2d content sharing and proactive
296–311. caching, IEEE Trans. Mobile Comput. 17 (4) (2018) 789–802.
[64] H. Min, J. Lee, S. Park, D. Hong, Capacity enhancement using an interference [94] F. Malandrino, M. Kurant, A. Markopoulou, C. Westphal, U.C. Kozat, Proactive
limited area for device-to-device uplink underlaying cellular networks, IEEE seeding for information cascades in cellular networks, in: 2012 Proceedings
Trans. Wireless Commun. 10 (12) (2011) 3995–40 0 0. IEEE INFOCOM, 2012, pp. 1719–1727.
[65] D. Wu, L. Zhou, Y. Cai, Y. Qian, Optimal content sharing mode selection for [95] Y. Xu, Smart caching for qos-guaranteed device-to-device content delivery,
social-aware d2d communications, IEEE Wireless Commun. Lett. 7 (6) (2018) China Commun. 15 (1) (2018) 128–139.
910–913. [96] N. Wang, G. Shen, S.K. Bose, W. Shao, Zone-based cooperative content caching
[66] Z. Zhou, C. Gao, C. Xu, Y. Zhang, S. Mumtaz, J. Rodriguez, Social big– and delivery for radio access network with mobile edge computing, IEEE Ac-
data-based content dissemination in internet of vehicles, IEEE Trans. Ind. Inf. cess 7 (2019) 4031–4044.
14 (2) (2018) 768–777. [97] L. Feng, P. Zhao, F. Zhou, M. Yin, P. Yu, W. Li, X. Qiu, Resource allocation for 5g
[67] Y. Xu, X. Li, J. Zhang, Device-to-device content delivery in cellular networks: d2d multicast content sharing in social-aware cellular networks, IEEE Com-
multicast or unicast, IEEE Trans. Veh. Technol. 67 (5) (2018) 4401–4414. mun. Mag. 56 (3) (2018) 112–118.
[68] D. Wu, L. Zhou, Y. Cai, Y. Qian, Collaborative caching and matching for d2d [98] Y. He, F.R. Yu, N. Zhao, H. Yin, Secure social networks in 5g systems with
content sharing, IEEE Wireless Commun. 25 (3) (2018) 43–49. mobile edge computing, caching, and device-to-device communications, IEEE
[69] A. Orsino, R. Kovalchukov, A. Samuylov, D. Moltchanov, S. Andreev, Y. Kouch- Wireless Commun. 25 (3) (2018) 103–109.
eryavy, M. Valkama, Caching-aided collaborative d2d operation for predictive [99] J. Li, M. Liu, J. Lu, F. Shu, Y. Zhang, S. Bayat, D.N.K. Jayakody, On social-aware
data dissemination in industrial iot, IEEE Wireless Commun. 25 (3) (2018) content caching for d2d-enabled cellular networks with matching theory,
50–57. IEEE Internet Things J. 6 (1) (2019) 297–310.
[70] S. Wu, R. Atat, N. Mastronarde, L. Liu, Improving the coverage and spectral [100] O. Delgado, F. Labeau, D2d relay selection and fairness on 5g wireless net-
efficiency of millimeter-wave cellular networks using device-to-device relays, works, in: IEEE Globecom Workshops (GC Wkshps), Washington, DC, 2016,
IEEE Trans. Commun. 66 (5) (2018) 2251–2265. pp. 1–6.
[71] B. Klaiqi, X. Chu, J. Zhang, Energy- and spectral-efficient adaptive forward- [101] H. Shi, R.V. Prasad, E. Onur, I.G.M.M. Niemegeers, Fairness in wireless net-
ing strategy for multihop device-to-device communications overlaying cellu- works:issues, measures and challenges, IEEE Commun. Surv. Tutorials 16 (1)
lar networks, IEEE Trans. Wireless Commun. 17 (9) (2018) 5684–5699. (2014) 5–24.
[72] S. Guo, X. Zhou, S. Xiao, M. Sun, Fairness-aware energy-efficient resource al- [102] H. Min, W. Seo, J. Lee, S. Park, D. Hong, Reliability improvement using re-
location in d2d communication networks, IEEE Syst. J. (2018) 1–12, doi:10. ceive mode selection in the device-to-device uplink period underlaying cel-
1109/JSYST.2018.2838539. lular networks, IEEE Trans. Wireless Commun. 10 (2) (2011) 413–418.
[73] A. Omri, M.O. Hasna, A distance-based mode selection scheme for [103] K. Vanganuru, S. Ferrante, G. Sternberg, System capacity and coverage of a
d2d-enabled networks with mobility, IEEE Trans. Wireless Commun. 17 (7) cellular network with d2d mobile relays, in: MILCOM 2012 - 2012 IEEE Mili-
(2018) 4326–4340. tary Communications Conference, Orlando, FL, 2012, pp. 1–6.
[74] R. Ma, N. Xia, H. Chen, C. Chiu, C. Yang, Mode selection, radio resource allo- [104] M. Alibeigi, A. Taherpour, S. Gazor, Optimization of secrecy rate in coopera-
cation, and power coordination in d2d communications, IEEE Wireless Com- tive device to device communications, in: 2017 IEEE 30th Canadian Confer-
mun. 24 (3) (2017) 112–121. ence on Electrical and Computer Engineering (CCECE), Windsor, ON, 2017,
[75] C. Chen, C. Sung, H. Chen, Optimal mode selection algorithms in multiple pp. 1–5.
pair device-to-device communications, IEEE Wireless Commun. 25 (4) (2018) [105] X. Cheng, C. Chen, W. Zhang, Y. Yang, 5G-enabled cooperative intelligent ve-
82–87. hicular (5genciv) framework: when benz meets marconi, IEEE Intell. Syst. 32
[76] J. Li, R. Feng, W. Sun, L. Chen, X. Xu, Q. Li, Joint mode selection and resource (3) (2017) 53–59.
allocation for scalable video multicast in hybrid cellular and d2d network, [106] R. Zhang, Y. Li, C. Wang, Y. Ruan, Y. Fu, H. Zhang, Energy-spectral efficiency
IEEE Access 6 (2018) 64350–64358. trade-off in underlaying mobile d2d communications: an economic efficiency
[77] Y. Cai, D. Wu, W. Yang, Social-aware content downloading mode selection for perspective, IEEE Trans. Wireless Commun. 17 (7) (2018) 4288–4301.
d2d communications, in: 2015 IEEE International Conference on Communica- [107] X. Cheng, L. Yang, X. Shen, D2d for intelligent transportation systems: a fea-
tions (ICC), London, 2015, pp. 2931–2936. sibility study, IEEE Trans. Intell. Transp.Syst. 16 (4) (2015) 1784–1793.
[78] D. Wu, L. Zhou, Y. Cai, Social-aware rate based content sharing mode selec- [108] R. Zhang, X. Cheng, L. Yang, X. Shen, B. Jiao, A novel centralized tdma-based
tion for d2d content sharing scenarios, IEEE Trans. Multimedia 19 (11) (2017) scheduling protocol for vehicular networks, IEEE Trans. Intell. Transp.Syst. 16
2571–2582. (1) (2015) 411–416.
[79] L. Yang, D. Wu, H. Shi, Y. Long, Y. Cai, Social-aware joint mode selection and [109] B. Zhang, X. Mao, J. Yu, Z. Han, Resource allocation for 5g heterogeneous
link allocation for device-to-device communication underlaying cellular net- cloud radio access networks with d2d communication: a matching and coali-
works, China Commun. 15 (8) (2018) 92–107. tion approach, IEEE Trans. Veh. Technol. 67 (7) (2018) 5883–5894.
[80] J. Li, G. Lei, G. Manogaran, G. Mastorakis, C.X. Mavromoustakis, D2d Commu- [110] X. Liu, Y. Li, L. Xiao, J. Wang, Performance analysis and power control for
nication mode selection and resource optimization algorithm with optimal multi-antenna v2v underlay massive mimo, IEEE Trans. Wireless Commun.
throughput in 5g network, IEEE Access 7 (2019) 25263–25273. 17 (7) (2018) 4374–4387.
[81] P.S. Bithas, K. Maliatsos, F. Foukalas, An SINR-aware joint mode selection, [111] Y. Cui, Y. Liang, R. Wang, Resource allocation algorithm with multi-platform
scheduling, and resource allocation scheme for d2d communications, IEEE intelligent offloading in d2d-enabled vehicular networks, IEEE Access 7 (2019)
Trans. Veh. Technol. (2019), doi:10.1109/TVT.2019.2900176. 21246–21253.
[82] H. Xu, W. Xu, Z. Yang, J. Shi, M. Chen, Pilot reuse among d2d users in d2d [112] P.B. Prakash, C.K.S. Vijila, Novel scheduling based intelligent video stream-
underlaid massive mimo systems, IEEE Trans. Veh. Technol. 67 (1) (2018) ing for device-to-device communication in wireless networks, Wireless Pers.
467–482. Commun. 104 (2) (2019) 617–631.
[83] Y. Sun, F. Wang, Z. Liu, Coalition formation game for resource allocation in [113] N. Vo, T.Q. Duong, H.D. Tuan, A. Kortun, Optimal video streaming in dense 5g
d2d uplink underlaying cellular networks, IEEE Commun. Lett. 23 (5) (2019) networks with d2d communications, IEEE Access 6 (2018) 209–223.
888–891. [114] J. Yun, M.J. Piran, D.Y. Suh, Qoe-driven resource allocation for live video
[84] J. Xu, Bio-inspired power control and channel allocation for cellular networks streaming over d2d-underlaid 5g cellular networks, IEEE Access 6 (2018)
with D2D communications, Wireless Netw. 25 (3) (2019) 1273–1288. 72563–72580.
O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938 27

[115] S. Cicalò, V. Tralli, Qos-aware admission control and resource allocation for [144] L. Liang, S. Xie, G.Y. Li, Z. Ding, X. Yu, Graph-based resource sharing in vehic-
d2d communications underlaying cellular networks, IEEE Trans. Wireless ular communication, IEEE Trans. Wireless Commun. 17 (7) (2018) 4579–4592.
Commun. 17 (8) (2018) 5256–5269. [145] U.F. Siddiqi, S.M. Sait, An optimization heuristic based on non-dominated
[116] J. Guo, W. Yu, J. Yuan, Enhancing cellular performance through device-to-de- sorting and tabu search for the fixed spectrum frequency assignment prob-
vice distributed mimo, IEEE Trans. Commun. 66 (12) (2018) 6096–6109. lem, IEEE Access 6 (2018) 72635–72648.
[117] D. Zhu, Y. Guo, L. Wei, X. Wang, W. Huang, H. Jiang, C. Zhou, Optimal and sub- [146] T. Yang, R. Zhang, X. Cheng, L. Yang, Graph coloring based resource sharing
optimal resource sharing schemes for underlaid d2d communications, Wire- (gcrs) scheme for d2d communications underlaying full-duplex cellular net-
less Pers. Commun. 98 (3) (2018) 2799–2817. works, IEEE Trans. Veh. Technol. 66 (8) (2017) 7506–7517.
[118] F.A. Orakzai, M. Iqbal, M. Naeem, A. Ahmad, Energy efficient joint radio re- [147] M. Ahmed, H. Shi, X. Chen, Y. Li, M. Waqas, D. Jin, Socially aware secre-
source management in d2d assisted cellular communication, Telecommun. cy-ensured resource allocation in d2d underlay communication: an overlap-
Syst. 69 (4) (2018) 505–517. ping coalitional game scheme, IEEE Trans. Wireless Commun. 17 (6) (2018)
[119] P. Gandotra, R.K. Jha, Energy-efficient device-to-device communication using 4118–4133.
adaptive resource-block allocation, Int. J. Commun. Syst. (2019) e3922. [148] L. Song, D. Niyato, Z. Han, E. Hossain, Game-theoretic resource allocation
[120] J. Kim, H. Lee, Geographical proximity based target-group formation algo- methods for device-to-device communication, IEEE Wireless Commun. 21 (3)
rithm for d2d advertisement dissemination, in: 2015 IEEE International Con- (2014) 136–144.
ference on Pervasive Computing and Communication Workshops (PerCom [149] E. Yaacoub, L. Al-Kanj, Z. Dawy, S. Sharafeddine, F. Filali, A. Abu-Dayya, A nash
Workshops), St. Louis, MO, 2015, pp. 272–275. bargaining solution for energy-efficient content distribution over wireless
[121] R. Kaliski, H. Wei, Ladtram: a coalition funded framework for localized adver- networks with mobile-to-mobile cooperation, in: 2011 4th Joint IFIP Wireless
tisements over d2d, IEEE Trans. Veh. Technol. 67 (10) (2018) 9801–9815. and Mobile Networking Conference (WMNC 2011), 2011, pp. 1–7. IEEE
[122] J. Xu, C. Guo, Resource allocation for real-time d2d communications un- [150] Y. Yuan, T. Yang, H. Feng, B. Hu, An iterative matching-stackelberg game
derlaying cellular networks, IEEE Trans. Mobile Comput. 18 (4) (2019) 960– model for channel-power allocation in d2d underlaid cellular networks, IEEE
973. Trans. Wireless Commun. 17 (11) (2018) 7456–7471.
[123] X. Wang, Z. Ning, X. Hu, E.C.-H. Ngai, L. Wang, B. Hu, R.Y.K. Kwok, A city-wide [151] A. Asheralieva, T.Q.S. Quek, D. Niyato, An asymmetric evolutionary bayesian
real-time traffic management system: enabling crowdsensing in social inter- coalition formation game for distributed resource sharing in a multi-cell de-
net of vehicles, IEEE Commun. Mag. 56 (9) (2018) 19–25. vice-to-device enabled cellular network, IEEE Trans. Wireless Commun. 17 (6)
[124] H. Takshi, G.D. g, H. Arslan, Joint optimization of device to device resource (2018) 3752–3767.
and power allocation based on genetic algorithm, IEEE Access 6 (2018) [152] J. Hu, W. Heng, Y. Zhu, G. Wang, X. Li, J. Wu, Overlapping coalition forma-
21173–21183. tion games for joint interference management and resource allocation in d2d
[125] C. Yang, X. Xu, J. Han, W.u. Rehman, X. Tao, Ga based optimal resource al- communications, IEEE Access 6 (2018) 6341–6349.
location and user matching in device to device underlaying network, in: [153] N. Sawyer, D.B. Smith, Flexible resource allocation in device-to-device com-
2014 IEEE Wireless Communications and Networking Conference Workshops munications using stackelberg game theory, IEEE Trans. Commun. 67 (1)
(WCNCW), Istanbul, 2014, pp. 242–247. (2019) 653–667.
[126] H. Ye, G.Y. Li, Deep reinforcement learning for resource allocation in v2v [154] P. Mach, Z. Becvar, M. Najla, Resource allocation for d2d communication with
communications, in: 2018 IEEE International Conference on Communications multiple d2d pairs reusing multiple channels, IEEE Wireless Commun. Lett.
(ICC), Limassol, 2018, pp. 1–6. (2019), doi:10.1109/LWC.2019.2903798.
[127] M. Eisen, C. Zhang, L.F.O. Chamon, D.D. Lee, A. Ribeiro, Learning optimal re- [155] E. Yaacoub, Z. Dawy, S. Sharafeddine, A. Abu-Dayya, Joint energy-distortion
source allocations in wireless systems, IEEE Trans. Signal Process. 67 (10) aware algorithms for cooperative video streaming over LTE networks, Signal
(2019) 2775–2790. Process. 28 (9) (2013) 1114–1131.
[128] S.J. Nawaz, S.K. Sharma, S. Wyne, M.N. Patwary, M. Asaduzzaman, Quantum [156] K.M.S. Huq, S. Mumtaz, J. Rodriguez, P. Marques, B. Okyere, V. Frascolla, En-
machine learning for 6g communication networks: state-of-the-art and vision hanced c-ran using d2d network, IEEE Commun. Mag. 55 (3) (2017) 100–107.
for the future, IEEE Access 7 (2019) 46317–46350. [157] S. Alamouti, A.R. Sharafat, Device-to-device communications in multi-cell
[129] Z. Al-Makhadmeh, A. Tolba, An intelligence-based recurrent learning lte-advanced networks with cloud radio access network architecture, IEEE
scheme for optimal channel allocation and selection in device-to-device Commun. Stand. Mag. 2 (1) (2018) 90–94.
communications, Circuits Syst. Signal Process. (2019) 1–22, doi:10.1007/ [158] J. Gui, Z. Li, Z. Zeng, Improving energy-efficiency for resource allocation by re-
s0 0 034- 019- 01056- 7. lay-aided in-band d2d communications in c-RAN-based systems, IEEE Access
[130] S. Kusaladharma, C. Tellambura, Performance characterization of spatially ran- 7 (2019) 8358–8375.
dom energy harvesting underlay d2d networks with transmit power control, [159] Y. Sun, M. Peng, H.V. Poor, A distributed approach to improving spectral effi-
IEEE Trans. Green Commun.Netw. 2 (1) (2018) 87–99. ciency in uplink device-to-device enabled cloud radio access networks, IEEE
[131] Z. Kuang, G. Liu, G. Li, X. Deng, Energy efficient resource allocation algo- Trans. Commun. 66 (12) (2018) 6511–6526.
rithm in energy harvesting-based d2d heterogeneous networks, IEEE Internet [160] Y. Mo, M. Peng, H. Xiang, Y. Sun, X. Ji, Resource allocation in cloud radio ac-
Things J. 6 (1) (2019) 557–567. cess networks with device-to-device communications, IEEE Access 5 (2017)
[132] H. Wang, G. Ding, J. Wang, L. Wang, T.A. Tsiftsis, P.K. Sharma, Resource alloca- 1250–1262.
tion for energy harvesting-powered d2d communications underlaying cellular [161] D. Wu, J. Wu, H. Wang, R. Wang, User satisfaction-aware resource allocation
networks, in: 2017 IEEE International Conference on Communications (ICC), for d2d enhanced communication, IEEE Access 7 (2019) 528–539.
Paris, 2017, pp. 1–6. [162] H. Xing, L. Liu, J. Xu, A. Nallanathan, Joint task assignment and resource allo-
[133] J. Huang, C. Xing, C. Wang, Simultaneous wireless information and power cation for d2d-enabled mobile-edge computing, IEEE Trans. Commun. (2019),
transfer: technologies, applications, and research challenges, IEEE Commun. doi:10.1109/TCOMM.2019.2903088.
Mag. 55 (11) (2017) 26–32. [163] Y. Han, H. Wu, Network resource constrained traffic allocation for delay sen-
[134] L. Feng, Q. Yang, K. Kim, K.S. Kwak, Two-timescale resource allocation for sitive mobile crowdsourcing, IEEE Trans. Commun. 66 (8) (2018) 3471–3484.
wireless powered d2d communications with self-interested nodes, IEEE Ac- [164] B. Lu, S. Lin, J. Shi, Y. Wang, Resource allocation for d2d communications un-
cess 7 (2019) 10857–10869. derlaying cellular networks over nakagami-m fading channel, IEEE Access 7
[135] H. Wang, J. Wang, G. Ding, Z. Han, D2d communications underlaying wireless (2019) 21816–21825.
powered communication networks, IEEE Trans. Veh. Technol. 67 (8) (2018) [165] O. Rudenko, Y. Liu, C. Wang, S. Rahardja, An extensive game based resource
7872–7876. allocation for securing d2d underlay communications, IEEE Access 7 (2019)
[136] X. Song, X. Han, Y. Ni, L. Dong, L. Qin, Joint uplink and downlink resource 43052–43062.
allocation for d2d communications system, Future Internet 11 (1) (2019). 12 [166] S. Wen, X. Zhu, Y. Lin, Z. Lin, X. Zhang, D. Yang, Achievable transmission ca-
Multidisciplinary Digital Publishing Institute pacity of relay-assisted device-to-device (d2d) communication underlay cel-
[137] J. Kim, I. Lee, J. Lee, Capacity scaling for d2d aided cooperative relaying sys- lular networks, in: Vehicular Technology Conference (VTC Fall), 2013 IEEE
tems using noma, IEEE Wireless Commun. Lett. 7 (1) (2018) 42–45. 78th, Las Vegas, NV, 2013, pp. 1–5.
[138] J. Kim, I. Lee, Capacity analysis of cooperative relaying systems us- [167] A. Ghazanfari, A. Tölli, H. Pennanen, Sum power minimization for cellular sys-
ing non-orthogonal multiple access, IEEE Commun. Lett. 19 (11) (2015) tems with underlay d2d communications, in: 9th International Conference on
1949–1952. Cognitive Radio Oriented Wireless Networks and Communications (CROWN-
[139] T. Yoon, T.H. Nguyen, X.T. Nguyen, D. Yoo, B. Jang, Resource allocation for COM), Oulu, 2014, pp. 45–50.
NOMA-based d2d systems coexisting with cellular networks, IEEE Access 6 [168] H. Xing, S. Hakola, The investigation of power control schemes for a device–
(2018) 66293–66304. to-device communication integrated into ofdma cellular system, in: 21st An-
[140] Y. Pan, C. Pan, Z. Yang, M. Chen, Resource allocation for d2d communications nual IEEE International Symposium on Personal, Indoor and Mobile Radio
underlaying a noma-based cellular network, IEEE Wireless Commun. Lett. 7 Communications, Instanbul, 2010, pp. 1775–1780.
(1) (2018) 130–133. [169] Y. Niu, Y. Liu, Y. Li, X. Chen, Z. Zhong, Z. Han, Device-to-device communica-
[141] H. Zheng, S. Hou, H. Li, Z. Song, Y. Hao, Power allocation and user cluster- tions enabled energy efficient multicast scheduling in mmwave small cells,
ing for uplink MC-NOMA in D2D underlaid cellular networks, IEEE Wireless IEEE Trans. Commun. 66 (3) (2018) 1093–1109.
Commun. Lett. 7 (6) (2018) 1030–1033. [170] P. Gandotra, R.K. Jha, S. Jain, Green noma with multiple interference can-
[142] L. Zhao, H. Wang, X. Zhong, Interference graph based channel assignment al- cellation (mic) using sector-based resource allocation, IEEE Trans. Netw.
gorithm for d2d cellular networks, IEEE Access 6 (2018) 3270–3279. Serv.Manage. 15 (3) (2018) 1006–1017.
[143] R. Zhang, X. Cheng, Q. Yao, C.-X. Wang, Y. Yang, B. Jiao, Interference [171] X. Diao, J. Zheng, Y. Wu, Y. Cai, Joint computing resource, power, and channel
graph-based resource-sharing schemes for vehicular networks, IEEE Trans. allocations for D2D-Assisted and NOMA-Based mobile edge computing, IEEE
Veh. Technol. 62 (8) (2013) 4028–4039. Access 7 (2019) 9243–9257.
28 O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938

[172] A.H. Sakr, H. Tabassum, E. Hossain, D.I. Kim, Cognitive spectrum access in de- [201] C. Singhal, S. De, Em-SON: efficient multimedia service over self-organising
vice-to-device-enabled cellular networks, IEEE Commun. Mag. 53 (7) (2015) wi-fi network, IET Netw. 7 (4) (2018) 181–189.
126–133. [202] W. Cherif, M.A. Khan, F. Filali, S. Sharafeddine, Z. Dawy, P2p group forma-
[173] P. Karunakaran, W.H. Gerstacker, Sensing algorithms and protocol for simul- tion enhancement for opportunistic networks with wi-fi direct, in: 2017 IEEE
taneous sensing and reception-based cognitive d2d communications in lte-a Wireless Communications and Networking Conference (WCNC), pp. 1–6. IEEE.
systems, IEEE Trans. Cognit. Commun.Netw. 4 (1) (2018) 93–107. [203] L. Aoude, Z. Dawy, S. Sharafeddine, K. Frenn, K. Jahed, Social-aware device–
[174] B.S. Amin, A.S. Ibrahim, M.H. Ismail, H.-A.M. Mourad, Precoding and power to-device offloading based on experimental mobility and content similar-
allocation algorithms for device-to-device communication in massive mimo ity models, Wireless Commun. Mobile Comput. (2018). Vol. 2018, Article ID
networks, Wireless Netw. 24 (3) (2018) 925–942. 5606829, 16 pages
[175] E.G. Larsson, O. Edfors, F. Tufvesson, T.L. Marzetta, Massive mimo for next [204] D. Camps-Mur, A. Garcia-Saavedra, P. Serrano, Device-to-device communica-
generation wireless systems, IEEE Commun. Mag. 52 (2) (2014) 186–195. tions with wi-fi direct: overview and experimentation, IEEE Wireless Com-
[176] M. Ghadyani, A. Shahzadi, Compressive sensing power control for interfer- mun. 20 (3) (2013) 96–104.
ence management in d2d underlaid massive mimo systems, AEU-Int. J. Elec- [205] X. Ge, S. Tu, G. Mao, C.-X. Wang, T. Han, 5G ultra-dense cellular networks,
tron.Commun. 90 (2018) 79–87. IEEE Wireless Commun. 23 (1) (2016) 72–79.
[177] A. Ghazanfari, E. Bjöernson, E.G. Larsson, Power control for d2d underlay in [206] M.I. Poulakis, A.G. Gotsis, A. Alexiou, Multicell device-to-device communica-
multi-cell massive mimo networks, in: WSA 2018; 22nd International ITG tion: a spectrum-sharing and densification study, IEEE Veh. Technol. Mag. 13
Workshop on Smart Antennas, Bochum, 2018, pp. 1–6. (1) (2018) 85–96.
[178] A. Ramamurthy, V. Sathya, S. Ghosh, A. Franklin, B.R. Tamma, Dynamic power [207] X. Li, Y. Sun, L. Zhou, et al., A resource allocation scheme based on predatory
control and scheduling in full duplex cellular network with d2d, Wireless search algorithm for ultra-dense d2d communications, Wireless Netw. (2019),
Pers. Commun. 104 (2) (2019) 695–726. Springer doi:10.1007/s11276- 019- 02012- 8.
[179] H. Wang, J. Wang, G. Ding, L. Wang, T.A. Tsiftsis, P.K. Sharma, Resource alloca- [208] H. Wang, G. Ding, F. Gao, J. Chen, J. Wang, L. Wang, Power control in uav-sup-
tion for energy harvesting-powered d2d communication underlaying UAV-as- ported ultra-dense networks: communications, caching, and energy transfer,
sisted networks, IEEE Trans. Green Commun.Netw. 2 (1) (2018) 14–24. IEEE Commun. Mag. 56 (6) (2018) 28–34.
[180] F. Tang, Z.M. Fadlullah, N. Kato, F. Ono, R. Miura, AC-POCA: anticoordina- [209] H. Wang, J. Wang, G. Ding, J. Chen, Y. Li, Z. Han, Spectrum sharing plan-
tion game based partially overlapping channels assignment in combined ning for full-duplex uav relaying systems with underlaid d2d communica-
UAV and d2d-based networks, IEEE Trans. Veh. Technol. 67 (2) (2018) 1672– tions, IEEE J. Sel. Areas Commun. 36 (9) (2018) 1986–1999.
1683. [210] A. Ghazanfari, E. Björnson, E.G. Larsson, Optimized power control for massive
[181] M.M. Selim, M. Rihan, Y. Yang, L. Huang, Z. Quan, J. Ma, On the outage prob- MIMO with underlaid d2d communications, IEEE Trans. Commun. (2018).
ability and power control of d2d underlaying NOMA UAV-assisted networks, [211] Z. Zhang, Y. Li, R. Wang, K. Huang, Rate adaptation for downlink massive
IEEE Access 7 (2019) 16525–16536. MIMO networks and underlaid d2d links: a learning approach, IEEE Trans.
[182] F. Cheng, D. Zou, J. Liu, J. Wang, N. Zhao, Learning-based user association for Wireless Commun. 18 (3) (2019) 189–1833.
dual-UAV enabled wireless networks with D2D connections, IEEE Access 7 [212] A. Agarwal, S. Mukherjee, S.K. Mohammed, Impact of underlaid multi-an-
(2019) 30672–30682. tenna d2d on cellular downlink in massive MIMO systems, in: 2018 Twenty
[183] H. Wang, J. Chen, G. Ding, S. Wang, D2D communications underlaying Fourth National Conference on Communications (NCC), 2018, pp. 1–6. IEEE
UAV-assisted access networks, IEEE Access 6 (2018) 46244–46255. [213] X. Li, N. Qin, T. Sun, Interference coordination for FD-MIMO cellular network
[184] M. Mozaffari, W. Saad, M. Bennis, M. Debbah, Unmanned aerial vehicle with with d2d communications underlaying, China Commun. 15 (12) (2018) 75–88.
underlaid device-to-device communications: performance and tradeoffs, IEEE [214] H. Echigo, T. Ohtsuki, Graph coloring-based pilot reuse with AOA and distance
Trans. Wireless Commun. 15 (6) (2016) 3949–3963. in d2d underlay massive MIMO, in: 2018 IEEE 87th Vehicular Technology Con-
[185] Y. Zeng, R. Zhang, T.J. Lim, Wireless communications with unmanned aerial ference (VTC Spring), pp. 1–6. IEEE.
vehicles: opportunities and challenges, IEEE Commun. Mag. 54 (5) (2016) [215] F. Malandrino, C. Casetti, C. Chiasserini, Toward d2d-enhanced heterogeneous
36–42. networks, IEEE Commun. Mag. 52 (11) (2014) 94–100.
[186] X. Liu, Z. Li, N. Zhao, W. Meng, G. Gui, Y. Chen, F. Adachi, Transceiver design [216] G.H. Sim, A. Loch, A. Asadi, V. Mancuso, J. Widmer, 5g millimeterwave and
and multi-hop d2d for UAV iot coverage in disasters, IEEE Internet Things J. d2d symbiosis: 60 ghz for proximity-based services, IEEE Wireless Commun.
(2018), doi:10.1109/JIOT.2018.2877504. 24 (4) (2017) 140–145.
[187] W. Huang, Y. Zhaohui, P. Cunhua, P. Lu, C. Ming, S. Mohammad, E. Maged, [217] X. Chen, L. Pu, L. Gao, W. Wu, D. Wu, Exploiting massive d2d collaboration
N. Arumugam, Joint power, altitude, location and bandwidth optimization for for energy-efficient mobile edge computing, IEEE Wireless Commun. 24 (4)
UAV with underlaid d2d communications, IEEE Wireless Commun. Lett. 8 (2) (2017) 64–71.
(2018) 524–527. [218] J. Wen, C. Ren, A.K. Sangaiah, Energy-efficient device-to-device edge comput-
[188] J. Lin, Q. Shi, Q. Li, D. Zhao, Joint mode selection and transceiver design for ing network: an approach offloading both traffic and computation, IEEE Com-
device-to-device communications underlaying multi-user MIMO cellular net- mun. Mag. 56 (9) (2018) 96–102.
works, IEEE Trans. Wireless Commun. (2019), doi:10.1109/TWC.2019.2913858. [219] C. Weng, D. Yang, J. Wan, L. Xiao, C. Zhu, Transmission strategy design and
[189] X. Li, T. Pan, M.A. Alim, M.T. Thai, Resource allocation in highly dynamic resource allocation in d2d multicast cooperative communications with swipt,
device-to-device communication: an adaptive set multi-cover approach, IEEE Wireless Commun. Mobile Comput. 2018 (2018).
Trans. Wireless Commun. (2019), doi:10.1109/TWC.2019.2912963. [220] T.D.P. Perera, D.N.K. Jayakody, S.K. Sharma, S. Chatzinotas, J. Li, Simultaneous
[190] G.J. Sutton, J. Zeng, R.P. Liu, W. Ni, D.N. Nguyen, B.A. Jayawickrama, X. Huang, wireless information and power transfer (SWIPT): recent advances and future
M. Abolhasan, Z. Zhang, E. Dutkiewicz, T. Lv, Enabling technologies for ultra- challenges, in: IEEE Communications Surveys & Tutorials, volume 20, 2018,
reliable and low latency communications: from PHY and MAC layer perspec- pp. 264–302.
tives, IEEE Commun. Surv. Tutorials (2019), doi:10.1109/COMST.2019.2897800. [221] M. Peng, Y. Li, Z. Zhao, C. Wang, System architecture and key technologies
[191] A. Aijaz, Toward human-in-the-loop mobile networks: a radio resource allo- for 5g heterogeneous cloud radio access networks, IEEE Netw. 29 (2) (2015)
cation perspective on haptic communications, IEEE Trans. Wireless Commun. 6–14.
17 (7) (2018) 4493–4508. [222] M. Peng, S. Yan, K. Zhang, C. Wang, Fog-computing-based radio access net-
[192] M. Simsek, A. Merwaday, N. Correal, I. Güvenç, Device-to-device discovery works: issues and challenges, IEEE Netw. 30 (4) (2016) 46–53.
based on 3gpp system level simulations, in: 2013 IEEE Globecom Workshops [223] H. Hou, H. Jin, X. Liao, D. Zeng, Stochastic analysis on fog com-
(GC Wkshps), Atlanta, GA, 2013, pp. 555–560. puting empowered mobile crowdsensing with d2d communications, in:
[193] C. Jarray, A. Giovanidis, Successful file transmission in mobile d2d networks 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced &
with caches, Comput. Netw. 147 (2018) 162–179. Trusted Computing, Scalable Computing & Communications, Cloud & Big
[194] H. Tabassum, M. Salehi, E. Hossain, Fundamentals of mobility-aware perfor- Data Computing, Internet of People and Smart City Innovation (Smart-
mance characterization of cellular networks: a tutorial, IEEE Commun. Surv. World/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), 2018, pp. 656–663. IEEE
Tutorials (2019), doi:10.1109/COMST.2019.2907195. [224] A. Virdis, C. Vallati, G. Nardini, G. Tanganelli, G. Stea, E. Mingozzi, D2d Com-
[195] M.Z. Shakir, M. Ismail, X. Wang, K.A. Qaraqe, E. Serpedin, From d2d to ds2d: munications for large-scale fog platforms: enabling direct m2m interactions,
prolonging the battery life of mobile devices via ds2d communications, IEEE IEEE Veh. Technol. Mag. 13 (2) (2018) 24–33.
Wireless Commun. 24 (4) (2017) 55–63. [225] B. Quinton, N. Aboutorab, Network coding for backhaul offloading in d2d co-
[196] G.I. Tsiropoulos, A. Yadav, M. Zeng, O.A. Dobre, Cooperation in 5g hetnets: operative fog data networks, Wireless Commun. Mobile Comput. 2018 (2018).
advanced spectrum access and d2d assisted communications, IEEE Wireless Article ID 1245720, 11 pages
Commun. 24 (5) (2017) 110–117. [226] L. Yang, H. Zhu, H. Wang, H. Qian, Y. Yang, Incentive propagation mechanism
[197] G. Kiliç, T. Girici, Joint channel and power allocation for device-to-device un- of computation offloading in fog-enabled d2d networks, in: IEEE 23rd Inter-
derlay, Ad Hoc Networks 83 (2019) 158–167. national Conference on Digital Signal Processing (DSP), 2018, pp. 1–4. IEEE
[198] A. Le, L. Keller, H. Seferoglu, B. Cici, C. Fragouli, A. Markopoulou, Microcast: [227] R. Karasik, O. Simeone, S. Shamai, Information-theoretic analysis of d2d-aided
cooperative video streaming using cellular and local connections, IEEE/ACM pipelined content delivery in fog-RAN, in: 15th International Symposium on
Trans. Netw. (TON) 24 (5) (2016) 2983–2999. IEEE Press Wireless Communication Systems (ISWCS), 2018, pp. 1–5. IEEE
[199] K. Jahed, M. Younes, S. Sharafeddine, Energy measurements for mobile coop- [228] C. Wang, Y. He, F.R. Yu, Q. Chen, L. Tang, Integration of networking, caching,
erative video streaming, 2012 IFIP Wireless Days (2012) 1–3. IEEE. and computing in wireless systems: a survey, some research issues, and chal-
[200] S. Tipugade, C. Singhal, Adaptive multimedia streaming between heteroge- lenges, IEEE Commun. Surv. Tutorials 20 (1) (2018) 7–38.
neous users using d2d and dynamic wi-fi configuration, in: 2018 Interna- [229] A. Mete, S. Moharir, Caching policies for d2d-assisted content delivery sys-
tional Conference on Computing, Networking and Communications (ICNC), tems, in: Proceedings of the 2018 on Technologies for the Wireless Edge
IEEE, 2018. Pp 93–97 Workshop, 2018, pp. 3–7.
O.A. Amodu, M. Othman and N.K. Noordin et al. / Ad Hoc Networks 94 (2019) 101938 29

[230] B. Wang, Y. Sun, S. Li, Q. Cao, Hierarchical matching with peer effect for [250] X. Wang, Y. Zhang, V.C. Leung, N. Guizani, T. Jiang, D2d Big data: content
low-latency and high-reliable caching in social iot, IEEE Internet Things J. 6 deliveries over wireless device-to-device sharing in large-scale mobile net-
(1) (2019) 1193–1209. works, IEEE Wireless Commun. 25 (1) (2018) 32–38.
[231] Y. Li, Y. Zhang, K. Luo, T. Jiang, Z. Li, W. Peng, Ultra-dense hetnets meet big
data: green frameworks, techniques, and approaches, IEEE Commun. Mag. 56 Oluwatosin Ahmed Amodu received his Bachelor of
(6) (2018) 56–63. Technology degree in Electrical Electronics Engineering
[232] M.C. Lee, A.F. Molisch, Caching policy and cooperation distance design for from the Federal University of Technology Akure, Nige-
base station-assisted wireless d2d caching networks: throughput and energy ria, in 2012. He completed his master’s degree in Com-
efficiency optimization and tradeoff, IEEE Trans. Wireless Commun. 17 (11) puter Science with a specialization in distributed comput-
(2018) 7500–7514. ing at Universiti Putra Malaysia in 2016. He is currently
[233] Q. Wu, G.Y. Li, W. Chen, D.W.K. Ng, R. Schober, An overview of sustainable pursuing a Ph.D. Program in Wireless Communication and
green 5g networks, IEEE Wireless Commun. 24 (4) (2017) 72–80. Network Engineering. His research interests include sen-
[234] W. Zhang, D. Wu, W. Yang, Y. Cai, Caching on the move: a user interest– sor networks, machine-type communications, device-to-
driven caching strategy for d2d content sharing, IEEE Trans. Veh. Technol. 68 device communication, spectrum sharing networks, and
(3) (2019) 2958–2971. stochastic geometry.
[235] M. Sheraz, F. Wang, Y. Li, Enhancing mobile user performance through data
caching over edge computing wireless networks, in: 2018 14th International
Wireless Communications and Mobile Computing Conference (IWCMC), pp.
Mohamed Othman received his Ph.D. degree (Hons.)
1148–1153. IEEE.
from the National University of Malaysia. He is currently
[236] Q. Yuan, H. Zhou, J. Li, Z. Liu, F. Yang, X.S. Shen, Toward efficient content de-
a professor in computer science with the Department of
livery for automated driving services: an edge computing solution, IEEE Netw.
Communication Technology and Network, Universiti Pu-
32 (1) (2018) 80–86.
tra Malaysia (UPM). Prior to that, he was a Deputy Di-
[237] N. Deng, M. Haenggi, The benefits of hybrid caching in gauss-poisson d2d
rector of the Information Development and Communica-
networks, IEEE J. Sel. Areas Commun. 36 (6) (2018) 1217–1230.
tion Center, where he was in charge of UMPNet network
[238] A.C. Kazez, T. Girici, Clustering-based device-to-device cache placement, Ad
campus, uSport Wireless Communication Project, and the
Hoc Netw. 84 (2019) 170–177.
UPM DataCenter. He is also an Associate Researcher and
[239] B. Jiang, J. Yang, H. Xu, H. Song, G. Zheng, Multimedia data throughput max-
a coordinator of high-speed machines with the Labora-
imization in internet-of-things system based on optimization of cache-en-
tory of Computational Science and Informatics, Institute
abled UAV, IEEE Internet Things J. 6 (2) (2018) 3525–3532.
of Mathematical Science, UPM. In 2017, he received an
[240] S. Wang, X. Zhang, Y. Zhang, L. Wang, J. Yang, W. Wang, A survey on mo-
Honorable Professor from Silkway International University
bile edge networks: convergence of computing, caching and communications,
(SWIU), Shymkent, Kazakhstan, and was also a visiting professor with South Kaza-
IEEE Access 5 (2017) 6757–6779.
khstan State University, Shymkent, and L. N. Gumilyov Eurasian National University,
[241] G. Chandrasekaran, N. Wang, M. Hassanpour, M. Xu, R. Tafazolli, Mobility as
Astana, Kazakhstan. He has published in more than 300 International journals and
a service (MAAS): a d2d-based information centric network architecture for
330 proceeding papers. His main research interests are in the fields of computer
edge-controlled content distribution, IEEE Access 6 (2018) 2110–2129.
networks, parallel and distributed computing, highspeed interconnection networks,
[242] S. Hosny, A. Eryilmaz, A.A. Abouzeid, H. El Gamal, 725–732., Mobility-aware
network design and management (network security, wireless and traffic monitor-
centralized d2d caching networks, in: 2016 54th Annual Allerton Conference
ing), consensus in IoT, and mathematical modeling in scientific computing. He is
on Communication, Control, and Computing (Allerton), 2016. IEEE
a senior member of IEEE, and a life member of the Malaysian National Computer
[243] S. Krishnan, H.S. Dhillon, Effect of user mobility on the performance of de-
Confederation, and Malaysian Mathematical Society. He was a recipient of the Best
vice-to-device networks with distributed caching, in: IEEE Wireless Commu-
PhD Thesis in 20 0 0 by Sime Darby Malaysia and Malaysian Mathematical Science
nications Letters, volume 6, 2017, pp. 194–197.
Society. He has also filed six Malaysian, one Japanese, one South Korean, and three
[244] R. Wang, J. Zhang, S.H. Song, K.B. Letaief, Exploiting mobility in cache-assisted
U.S. patents.
d2d networks: performance analysis and optimization, IEEE Trans. Wireless
Commun. 17 (8) (2018) 5592–5605.
[245] M. Waqas, M. Zeng, Y. Li, D. Jin, Z. Han, Mobility assisted content transmis- Nor Kamariah Noordin received her B.Sc. degree in electrical engineering with a
sion for device-to-device communication underlaying cellular networks, IEEE major in telecommunications from University of Alabama, Tuscaloosa, USA, in 1987,
Trans. Veh. Technol. 67 (7) (2018) 6410–6423. a master’s degree from University Teknologi Malaysia, and a Ph.D. degree from Uni-
[246] M.S. ElBamby, M. Bennis, W. Saad, M. Latva-Aho, Content-aware user clus- versity Putra Malaysia (UPM). She has been with UPM since 1988 and was ap-
tering and caching in wireless small cell networks, in: 2014 11th Interna- pointed associate professor in 2006 and professor in 2012. During her tenure, she
tional Symposium on Wireless Communications Systems (ISWCS), pp. 945– has been the head of department, deputy dean of academics, director of corporate
949. IEEE. strategy and communication of the university and now the dean of faculty of engi-
[247] K.S. Khan, Y. Yin, A. Jamalipour, On the application of agglomerative hier- neering. During her more than 25 years with the university, she has published more
archical clustering for cache-assisted d2d networks, in: 2019 16th IEEE An- than 200 journals and conference papers and had secured more than 30 research
nual Consumer Communications and Networking Conference (CCNC), pp. 1–6. and consultancy projects.
IEEE.
[248] S.E. Hajri, M. Assaad, Caching improvement using adaptive user clustering, Idawaty Ahmad received the bachelor’s and master’s degrees in information sci-
in: 2016 IEEE 17th International Workshop on Signal Processing Advances in ence from Saga University, Japan, and the Ph.D. degree in computer networks from
Wireless Communications (SPAWC), pp. 1–5. IEEE. University Putra Malaysia, where she has been a Lecturer with the Faculty of Com-
[249] S. Sharafeddine, O. Farhat, A proactive scalable approach for reliable cluster puter Science and Information Technology, since 20 0 0. She specializes in the areas
formation in wireless networks with d2d offloading, Ad Hoc Netw. 2018 (77) of real-time systems, network protocols, and simulation/modeling which are core
(2018) 42–53. areas in computer science.

You might also like