You are on page 1of 36

IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO.

3, THIRD QUARTER 2018 2133

A Survey of Device-to-Device Communications:


Research Issues and Challenges
Furqan Jameel , Zara Hamid, Farhana Jabeen, Sherali Zeadally, and Muhammad Awais Javed

Abstract—Device-to-Device (D2D) communication has emerged the increasing capacity demands of future mobile users in
as a promising technology for optimizing spectral efficiency in close proximity to each other, such as in a shopping mall
future cellular networks. D2D takes advantage of the proxim- or a concert. Discussions of a new standard (referred to as
ity of communicating devices for efficient utilization of available
resources, improving data rates, reducing latency, and increasing 5G) are underway in the academia and industry in order to
system capacity. The research community is actively investigat- meet the requirements of future cellular networks. The exact
ing the D2D paradigm to realize its full potential and enable its definition of 5G is not clear but it takes into consideration a
smooth integration into the future cellular system architecture. wider range of use cases. 5G networks are expected to support
Existing surveys on this paradigm largely focus on interference existing and emerging technologies as well as integrate new
and resource management. We review recently proposed solutions
in over explored and under explored areas in D2D. These solu- solutions to meet the increasing demand for data rates [2].
tions include protocols, algorithms, and architectures in D2D. These drivers have motivated research efforts toward efficient
Furthermore, we provide new insights on open issues in these spectrum utilization in 5G cellular networks.
areas. Finally, we discuss potential future research directions. One solution for improving spectral efficiency is densifi-
Index Terms—Device-to-device (D2D) communication, device cation of existing cellular networks by reducing cell size [3]
discovery, mobility management, mobile networks, resource and adding more network resources. Reducing cell size also
allocation, security. leads to higher data rates, lower power consumption and
lower delays due to the close proximity of cell users and
Base Stations (BSs). However, additional infrastructure is
I. I NTRODUCTION required to implement small cells, which results in increase
HE INCREASING number of mobile devices along with
T the plethora of multimedia applications such as mobile
gaming, High Definition (HD) movies and video conferenc-
in deployment and maintenance cost [4].
Another promising solution for improving spectrum utiliza-
tion in next generation cellular networks is Device-to-Device
ing have triggered rapid advances in cellular technology and (D2D) communication. D2D communication enables direct
services. These developments coupled with the need for data communication between nearby mobile devices without the
access anytime, anywhere from any device have led to an involvement of a BS or the evolved NodeB (the radio part of
increase in demand for higher data rates and Quality of Service an E-UMTS radio transmission site). D2D is being considered
(QoS) provisioning. Today, it is not uncommon to see multiple as a key enabling technology in 5G cellular networks due to
devices owned by same user being connected to the Internet, the inherent need for high data rate, delay constrained, and
through cellular network, wireless networks and so on all of QoS specific communication.
which are generating large amounts of traffic. It is estimated D2D communication has always been present in the unli-
that between 2010 and 2020 there will be a 500-fold increase censed spectrum, but it was not investigated in the licensed
in wireless cellular data traffic [1] which will in turn stress the spectrum for the first three cellular generations. D2D was
available network resources. introduced in the fourth generation, after LTE release 12
Cellular networks have so far been able to maintain QoS in 2012 [5]. In earliest works on D2D communication,
and provide good user experience in isolated areas, but cur- Lin and Hsu [6] proposed a multi hop cellular network to
rent techniques in these networks will not be able to meet improve throughput by using cellular devices as relays. Later,
Jänis et al. [7] proposed a D2D radio that works to enable peer
Manuscript received August 28, 2017; revised December 28, 2017
and March 14, 2018; accepted April 15, 2018. Date of publication to peer communication between mobile nodes by reducing
April 18, 2018; date of current version August 21, 2018. (Corresponding interference. In addition, the power level of D2D communi-
author: Muhammad Awais Javed.) cation is selected based on the cellular UpLink (UL) power
F. Jameel and M. A. Javed are with the Department of Electrical
Engineering, COMSATS Institute of Information Technology, control information to limit the interference to the cellular BS.
Islamabad 45550, Pakistan (e-mail: furqanjameel01@gmail.com; Doppler et al. [8] also presented a mode selection algorithm to
awais.javed@comsats.edu.pk). improve reliability of D2D communication, where a mode is
Z. Hamid and F. Jabeen are with the Department of Computer Science,
COMSATS Institute of Information Technology, Islamabad 45550, Pakistan either a dedicated resource assignment for D2D communica-
(e-mail: zarahamid@comsats.edu.pk; farhanakhan@comsats.edu.pk). tions or shared resource assignment for D2D communications
S. Zeadally is with the College of Communication and Information, with the cellular traffic. In this work, the BS has knowledge of
University of Kentucky, Lexington, KY 40506 USA (e-mail:
szeadally@uky.edu). the state information of all involved channels to help it select
Digital Object Identifier 10.1109/COMST.2018.2828120 the optimal resource sharing mode between the cellular user
1553-877X  c 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2134 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

Fig. 1. (a) Inband and (b) Outband Overview.

and the D2D pair and to coordinate the transmit power so that cluster. Data offloading also presents as an interesting use case,
the expected throughput is maximized. where a device having good Internet connectivity can act as a
5G is expected to be the most widely used wireless technol- hotspot. Base station can offload/cache data at such a device
ogy which will provide data transfer rates higher than 1 Gbps, during peak hours and other devices can download data from
better spectral efficiency, lower power consumption and solve this device using direct links. D2D communication is clas-
the devices’ limited storage capacity issues. Direct commu- sified as Inband D2D (occurring on cellular spectrum) and
nication between devices in proximity will result in higher Outband D2D (occurring on unlicensed spectrum) as shown
throughput and lower latency as compared to communica- in Fig. 1.
tion of these devices through the nearest base station which 1) Inband D2D Communication: In the case of inband
could be congested due to high traffic load. This will also communication the cellular spectrum is shared by both D2D
help alleviate load on backhaul network and improve over- and cellular communications. Inband D2D is further catego-
all network capacity. By narrowing radio transmissions to the rized into underlay and overlay.
point-to-point connection between devices, D2D communica- • Underlay inband communication: In this case, D2D
tion can provide better reuse of available spectrum. Moreover, User Equipments (DUEs) compete with Cellular
direct transmission between devices can be achieved with User Equipments (CUEs) and opportunistically access
lower transmission power, resulting in improved energy effi- resources occupied by cellular users, resulting in
ciency. Furthermore, D2D communication can provide many improved spectral efficiency. Dedicated resource blocks
more benefits such as fairness, congestion control and QoS are assigned to the cellular users, and the D2D
guarantees. D2D communication is particularly advantageous transmitter reuses these resource blocks for direct
at enhancing cell coverage and throughput at the cell edge communication [14]. Underlay communication enhances
area where the signals are much weaker. Although, D2D the performance of cellular networks by providing high
communication has many advantages, there are still many spectral efficiency, however it causes interference in
open challenges to successfully implement this technology. In cellular communication by D2D communication and vice
particular, D2D communication will require efficient device versa. Although this limitation can be removed by the
discovery mechanisms, intelligent mode selection (D2D or implementation of complex resource allocation methods,
cellular) algorithms, complex resource management tech- the latter results in higher computation overhead at the
niques, mobility management procedures and robust security base station.
protocols. • Overlay inband communication: In overlay communi-
cations, a portion of the cellular spectrum is dedicated
for D2D communication. This reduces the interference
A. Fundamentals of D2D Communications problem as both types of communications take place
The potential of D2D to revolutionize next generation cel- in their separate spectral bands. The advantage of this
lular communication has resulted in the integration of D2D scheme is that it improves the scheduling and power
in many areas including public safety services [9], vehicular control in direct D2D communication [15] and it offers
networks [10], cellular offloading [11], multi hop relaying [12] improved spectral efficiency and signal strength in relay
and proximity based services [13]. D2D communication can assisted networks [16], [17].The major limitation of over-
support local data services efficiently through unicast, group- lay inband communication is that the portion of cellular
cast and broadcast mechanisms. Tinder, Waze and Facebook spectrum dedicated for D2D communication might be
are suitable examples of social proximity based applications used inefficiently which leads to poor resource utilization
for D2D communication. Streaming services like Google and system throughput.
Chromecast, IPTV, etc. can be facilitated by D2D commu- 2) Outband D2D Communication: In Outband D2D, cellu-
nication by forming clusters and groupcasting data within a lar devices use licensed cellular spectrum for communication

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
JAMEEL et al.: SURVEY OF D2D COMMUNICATIONS: RESEARCH ISSUES AND CHALLENGES 2135

TABLE I TABLE I
L IST OF ACRONYMS C ONTINUED

outband communication completely eliminates the spectrum


interference issue in cellular link caused by D2D pair and
vice versa. However, outband D2D faces issues in coordinat-
ing communications over two different bands because D2D
communication occurs on a second radio interface. Outband
D2D communication has two subcategories: Controlled D2D
and Autonomous D2D.
• Controlled outband communication: In this type of com-
munication, the coordination between radio interfaces
such as Bluetooth, ZigBee or Wi-Fi Direct is controlled
by the cellular network. Spectrum resources are pre-
allocated to D2D users so that they can fairly contend
and utilize the ISM band resources [26]. In addition, BS
can can prioritize the transmission of particular users to
meet the QoS requirements. This, consequently, increases
the performance of the system in terms of throughput
and resource management. However, one evident draw-
back of this approach is increased signaling overhead
with the increase in network size. This deteriorates the
performance of network due to considerably long delay.
• Autonomous outband communication: In autonomous
outband, cellular links are controlled by the base sta-
tion while the devices communicating in D2D mode
are responsible for the control of D2D communication.
This approach significantly lessens the workload of cel-
lular network and since no major changes are required
during BS deployment, this is also an attractive solu-
tion for operators and mobile service providers. The
Continued D2D network is responsible for resource allocation to
newly entering devices and which reduces the signal-
ing overhead of the system [27]. This inherent benefit
while the D2D communication takes place through unli- also makes the deployment of BS relatively easier as the
censed spectrum, usually ISM bands. As the cellular and D2D devices can spread different traffic requests among them-
communications occur in different spectrum bands, so the selves [28]. This reduces the overhead on the cellular

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2136 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

TABLE II
C OMPARISON OF O UR S URVEY W ITH E XISTING S URVEYS

network. A significant challenge in outband D2D com- issues that still remain to be addressed. More specifically, the
munication is in coordinating the communication over major contributions of this paper can be summarized as:
two different bands because usually D2D communication 1) We present several ongoing D2D research projects which
happens on a second radio interface (e.g., WiFi Direct will be useful for motivated readers interested in the field
and Bluetooth). Data packets need to be encoded and of D2D communication.
decoded because the two interfaces use different proto- 2) We describe the fundamentals and discuss research
cols. Also the uncontrolled nature of unlicensed spectrum results achieved so far on various important D2D topics
increases security risks and imposes constraints on QoS including: centralized/decentralized discovery process,
provisioning. Additionally, the devices can use D2D and mode selection schemes, resource allocation techniques
cellular communication simultaneously only if they have that leverage interference management and power con-
two wireless interfaces (e.g., Wi-Fi and LTE). trol techniques, mobility management frameworks and
handover strategies, security issues with an emphasis
on physical layer security techniques, economic aspects
B. Motivation and Contributions of D2D communications with a particular focus on
There has been a plethora of work on interference man- game theoretic pricing strategies and finally D2D appli-
agement and improving spectral efficiency in D2D commu- cations for 5G technologies. For all these D2D areas,
nications. However, comprehensive surveys that discussed all we also identify open research issues that need further
aspects, requirements and challenges of D2D communications investigation in the future.
are largely missing. In [18] the existing literature on D2D is The rest of the paper is organized as follows. In Section II,
categorized under inband and outband D2D communication. we present D2D enabling technologies and research projects.
Liu et al. [20] have provided a detailed survey on experimen- Section III provides discussion on D2D device discovery meth-
tal prototypes and current state-of-art in D2D communications ods. In Section IV, we discuss mode selection techniques
for LTE. Noura and Nordin [22] presented a literature review along with related works. Section V and VI present a review
and current state of art on D2D communication from the per- of resource allocation and mobility management techniques
spective of interference management. Gandotra and Jha [23] in D2D communication. In Section VII, we discuss security
focused on different use cases and technologies that sup- and privacy related issues. Section VIII discusses economic
port D2D communications. They also highlighted interference aspects of D2D communications. The application of D2D in
management, power control and resource allocation issues in future 5G technologies is presented in Section IX. Finally,
D2D communications. Section X provides concluding remarks. Table I provides the
Table II compares the contributions of this survey over list of acronyms used in this paper.
other past surveys on D2D. In contrast to these past sur-
veys, we categorize the work done in D2D in terms of
major research challenges including device discovery, mode
II. D2D U SE C ASES , E NABLING T ECHNOLOGIES ,
selection, resource management (interference management and
R ESEARCH P ROJECTS AND TAXONOMY
power control), mobility management and security. Our main
objective is to provide the reader an up-to-date, state-of-the- A. D2D Communications Use Cases
art paper of what has been done (protocols, proposed solutions The research attention given to D2D communication is not
and algorithms) on D2D communications to date and identify only because of its performance gains but also due to new

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
JAMEEL et al.: SURVEY OF D2D COMMUNICATIONS: RESEARCH ISSUES AND CHALLENGES 2137

Fig. 2. Common use cases of D2D communications.

applications’ practical requirements. Figure 2 shows some of 3) Extension of Cellular Coverage: Cellular users at the
the key applications and use cases of D2D communications. edge of the cell or out of cell coverage area generally expe-
1) Traffic Offloading: In this scenario, the devices are in rience poor received signal strength and increased channel
the communication range of the BS and are using the licensed fading. The cellular device can relay its transmission to the
spectrum for D2D communication. In this communication sce- BS by establishing a D2D link with a device in proximity.
nario, D2D communication can be used to reduce the load of This can significantly improve the throughput of the network
BS. For instance, if the users are mobile and it is difficult which is commonly affected by the edge users.
to maintain the QoS, the best option is to use delay-tolerant 4) Reliable Health Monitoring: Reliable communication is
services for network offloading. However, if one or both the an important requirement of future health monitoring appli-
communicating parties are stationary, then D2D links can be cations. Devices attached to patients need to continually
used for offloading peer-to-peer services such as social gaming communicate with the sink nodes to monitor the health of
and cooperative streaming with improved results [29]. the patients. The short range communication through D2D
2) Provision of Emergency Services: This type of applica- links can provide sufficient reliability and security to achieve
tion scenario occurs when there is no network coverage. A a fully operating health monitoring system. Moreover, since
typical example of this use case would be in emergency situa- the devices can communicate with the BS and access the
tions when the cellular infrastructure is completely or partially Internet, doctors can remotely access the record of a particular
damaged due to a natural disaster (such as flood, hurricane, patient.
and earthquake). The devices in proximity can autonomously 5) Mobile Tracking and Positioning: Accurate positioning
establish connection with each other and start D2D communi- and object tracking are an important part of wireless com-
cation even in the absence of network operator or any central munications as many location-based routing protocols heavily
entity such as a BS. This use case is quite similar to Mobile depend on this information [30], [31]. Conventionally, wire-
Ad-hoc NETworks (MANETs). However, there is a key differ- less devices are located with the help of satellite services. In
ence between these two approaches. For instance, MANETs addition to a higher cost of these services, satellite-based posi-
use unlicensed spectrum for communication whereas D2D tioning performs poorly for indoor conditions due to increased
communications occur on reserved licensed spectrum. fading. D2D communication has the potential to solve this

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2138 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

TABLE III
OVERVIEW OF D IFFERENT D2D T ECHNOLOGIES

problem by deploying common outdoor terminals. If the loca- technology and is able to communicate with iPods. RFID
tion of these pre-deployed terminals is known, then various and Rubee have been implemented on small silicon ships and
trilateration and multilateration [32] based positioning tech- have been used for tracking objects. They are also consid-
niques can be used to estimate the position of both outdoor ered to be one of the most cost effective low-power solutions
and indoor mobile devices with good accuracy. for short-range communications. Table III provides brief com-
6) Data Dissemination: Another emerging application parison of the aforementioned technologies with relatively
of D2D communications is data dissemination which use well-established and standard technologies such as Zigbee,
direct data and proximity-based transmission features. Besides Bluetooth Low Energy (BLE), Bluetooth 4.0, Ultra-Wide
improving the probability of reception of data, the aforemen- Band (UWB) communications for distributed, short-range data
tioned service can also generate new sources of revenue for the transfers.
operators. For instance, shopping malls can forward promotion 1) ZigBee: Zigbees operation is based on the IEEE
and discount offers to the people who walk around the mall. 802.15.4 standard and targets low-data rate applications. The
Theaters can send the information regarding movie release Zigbee alliance has been working on industrial automation,
dates and show times to the people who walk into the cinema. smart home and office solutions as they normally operate at
Additionally, advertising agencies can target a specific group data rates between 20 to 250 kb/sec. Zigbee can provide multi-
of people using social-aware D2D communications [33], [34] hop routing and supports three types of network topologies,
for promoting a particular product. i.e., mesh, cluster tree, and star. Some recent studies have also
suggested their use in wireless body area networks for indoor
B. Enabling Technologies environments such as homes or hospitals [38].
Cellular communication systems are presently characterized 2) BLE Technology: BLE is an improved version of Wibree
by the BS and cellular devices. A novel architecture was and Bluetooth Low End Extension (BLEE). It was first intro-
proposed in [35] to allow mobile devices to communicate with duced by Nokia in 2004 in order to provide connection
each other using a short-range communication architecture. between small devices and mobile terminals. It can provide
They also proposed to use the term “mobile devices” instead of improved data rates (i.e., up to 1 Mb/sec) with faster synchro-
“mobile terminals” because, in contrast to conventional cellu- nization as compared to Bluetooth 2.0. BLE products can be
lar architecture, the services do not terminate at the device. The divided in two categories namely standalone chips and dual-
idea of combining cellular and ad-hoc architecture was also mode chips. The standalone chips can only communicate with
proposed by Fitzek et al. [36]. The architecture was proposed each other while the dual-mode chips can also communicate
for multi-player gaming, whereby ad-hoc links were used for with other devices.
the actual game and the cellular links were used for updating 3) Bluetooth 4.0: Initially, Bluetooth technology was
maps and distribution of high scores in the network. In sub- designed to replace RS232 cables for connecting personal
sequent years, the same authors proposed Cellular Controlled devices through wireless medium. It has the capability to
Short-Range Communications (CCSRC) [37] which combined support both data and audio traffic which is one of the rea-
features of both licensed and unlicensed spectrum. They sons of popularity of Bluetooth headsets. Bluetooth 4.0 has
also exploited intra-network and inter-network cooperation to also incorporated the 802.11 protocol adaption layer which
achieve benefits of security, energy efficiency, and spectrum allows the file transfer rate up to 24 Mb/sec. However, a sin-
efficiency. The requirements of short-range (D2D) links were gle piconet supports only a small number of active slaves
also discussed besides air interface and multi-mode platform (i.e., seven). Therefore, it is often considered when a large
requirements to enable CCSRC. amount of data needs to be transferred for a short dura-
Based on above-mentioned studies, some ad-hoc short-range tion. Some commercial products such as Sony’s PlayStation
communications technologies have also been proposed which 3, digital cameras, printers and carkits are already using
include RuBee, Z-Wave, ANT, Insteon and RFID. Both Z- Bluetooth 4.0.
Wave and Insteon are proprietary technologies and work on 4) UWB Communications: As per the Federal
2.4 GHz and 900 MHz respectively. ANT has a simple pro- Communications Commission (FCC), UWB communi-
tocol stack and was used in some Nike shoes for collecting cations take place below the bandwidth limit of 500 MHz
data of athletes during workout. ANT is also a proprietary from 3.1 to 10.6 GHz frequency range. This makes UWB

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
JAMEEL et al.: SURVEY OF D2D COMMUNICATIONS: RESEARCH ISSUES AND CHALLENGES 2139

particularly suitable for environment sensitive indoor com- several applications. CODEC aims to provide resource man-
munications. Commercial products such as video players agement in two use cases namely, direct D2D communications
and wireless monitors use the aforementioned range for and D2D relay communications to support proximity-based,
transferring data up to 480 Mb/sec. UWB is also considered multicast, broadcast and unicast applications in D2D com-
to be an ideal contender for precise localization in the indoor munications. The road map of this project is that first a
environment which can complement the functions of a Global generic analytical framework will be proposed to analyze the
Positioning System (GPS). performance of resource management techniques in both use
cases. Once the framework has been designed and tested,
resource management techniques will be initially developed
C. Large-Scale Projects for a single cell and then extended to a multicellular network.
The practical implementation and deployment of D2D com- So far the project has investigated many aspects of D2D com-
munications in the real world are only possible through munication including D2D based caching and traffic offloading
the integration of different enabling technologies. It may be based on users’ content preference and willingness to share the
worth mentioning that a comprehensive discussion of each content, The project has also evaluated the improvement in
D2D enabling technology is beyond the scope of this paper. QoS especially for real-time video transmission when adopt-
However, our objective here is to highlight the role that each ing D2D communications. The framework has been extended
technology is likely to play in the future deployment and adop- by the researchers to accompany fractional frequency reuse.
tion of D2D communications. Further, we discuss real testbeds 3) WiFiUS: In 2011, the National Science Foundation
and standardization efforts for D2D communications in 5G. (NSF) Directorate for Computer and Information Science and
1) Mobile and Wireless Communication Enables for the Engineering (CISE), through its Division of Computer and
Twenty Information Security (METIS I & II): METIS is a Network Systems (CNS), Tekes - the Finnish Funding Agency
research project under the research Framework Programme for Innovation, and the Academy of Finland came together to
7 (FP7) [2]. The project aims toward a future world where jointly fund the Wireless innovation between Finland and U.S.
all users can share data, access and interact with anything (WiFiUS) [41]. NSF, Tekes, and the Academy of Finland have
anywhere and anytime. Its main objective is to lay the founda- supported a set of projects in the area of wireless networking,
tions for a 5G mobile and wireless communications system for establishing new collaborations among researchers from the
which it has designed a system concept that delivers the nec- U.S. and Finland under the Science Across Virtual Institutes
essary efficiency, versatility, and scalability. METIS I project (SAVI) program. After the success of initial collaborations,
described a set of five Horizontal Topics (HTs) to develop the the NSF, Tekes and Academy of Finland has set out to
overall system concept. An HT integrates a subset of the tech- broaden the scope of the collaboration by including a wider
nology components to provide the most promising solution to set of issues related to wireless networking. The program
one or more test cases. Direct D2D communications is one of has also included NSF CISE Division of Computing and
the HTs. Communication Foundations (CCF) and NSF Directorate for
METIS project aims to leverage direct D2D communi- Engineering’s Division of Electrical, Communications and
cation as an “all connected world” communication system. Cyber Systems (ECCS) under its umbrella to address a wider
The main goals of METIS D2D are: maximize coverage in set of topics related to wireless networking.
terms of availability and reliability, cost efficiency in term of One of the collaborations under this program is between
traffic loading, spectrum efficiency and supporting emerging Aalto University, Finland and University of Southern
new services such as Vehicle to Vehicle (V2V), Vehicle-to- California, USA [42]. The project aims to investigate D2D
Infrastructure (V2I) and Vehicle-to-Pedestrian (V2X). METIS communications at millimeter-wave (mm-wave) frequencies.
D2D concept further focuses on optimizing selected key In particular, the project aims to address four main challenges:
technological components to address different technical chal- (i) measurement of D2D propagation channels at mm-wave
lenges. METIS proposes a flexible air interface management frequencies, (ii) neighbor discovery, iii) implementation of
scheme that will allow the air interface to be individually dynamic beam tracking as per the changes in strongest
configured based on system conditions and service require- multipath component, and iv) improving the reliability of
ments. Moreover, a hybrid device discovery scheme is being transmission.
investigated that can benefit from the advantages of both cen- 4) Wi-Fi Direct: Bluetooth and Wi-Fi both operate in the
tralized and distributed discovery schemes. Different forms unlicensed spectrum and are widely adopted technology for
of D2D relay communications will also be supported by direct communication between devices. Traditional utilization
METIS. METIS I project was completed in 2015 and METIS of Wi-Fi and Bluetooth for D2D Communication does not
II [39] project will continue the activities that were initiated guarantee security or QoS.
in METIS I, including efforts to allow the support for D2D To address the D2D usability problem, Wi-Fi-Direct (WFD)
communications in 5G. has been introduced recently [43]. WFD does not require
2) CODEC: The Cellular Network based Device-to-Device a Wi-Fi infrastructure and it enables direct communication
Wireless Communication (CODEC) project [40] is funded with the least possible user cooperation and interaction. WFD
under FP7 framework. It focuses on efficient resource man- allows for D2D link setup and communication without the
agement in D2D Cellular communications which is essential involvement of an AP. WFD leverages the infrastructure mode
for achieving energy efficiency, spectral efficiency and QoS for of WiFi and lets devices negotiate who will take over the

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2140 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

responsibilities of an AP, thus allowing devices to dynamically • Out of coverage: This scenario occurs when the UE is
establish peer-to-peer groups. WFD provides the same QoS out of the coverage of eNBs.
and energy conserving mechanisms as in Wi-Fi infrastructure • Partial coverage: This scenario occurs when some UEs
mode. However there are several challenges in securing WFD are within the coverage of eNBs and some UEs are not.
technology [44].
Commercial demand of WFD keeps increasing as a cellular- D. Taxonomy
assisted D2D communication technology. In WFD, devices can
dynamically take up the roles of an AP or a client. These roles The taxonomy of D2D communications is mainly com-
could be undertaken by a device simultaneously if the device posed of five aspects of networking namely, device discovery,
consists of multiple physical radios or implements mechanism mode selection, resource management, mobility and security,
for time sharing the channel. as shown in Figure 3. The main aspects of device discovery in
5) 3GPP LTE Standardization: The main cellular system D2D communications are asynchronous and quick device dis-
that is expected to implement the D2D communications covery schemes. Besides rapid discovery, these schemes also
is Long Term Evolution - Advanced (LTE-A) which was need to be energy-efficient. However, the main challenges are
proposed by the 3G Partnership Project (3GPP) as a new the frequency of discovery and the synchronization of devices.
network standard to provide support for the increasing num- Mode selection is also important for efficient D2D commu-
ber of wireless applications and services. The 3rd Generation nications, however, main schemes are distance cut-off, link
Partnership Project (3GPP) unites (seven) telecommunications gain and guard zone schemes. Despite these advances, chal-
standard development organizations (ARIB, ATIS, CCSA, lenges such as mode alteration overhead and stable mode
ETSI, TSDSI, TTA, TTC), known as Organizational Partners selection still exist. Resource management for power con-
and provides their members with a stable environment to trol and reduced interference have been explored in-depth in
produce reports and specifications that define 3GPP technolo- the literature and several approaches such as game theoretic
gies. It has played a pivotal role in the success of LTE and optimization, linear optimization, admission control and graph
its widespread adoption by mobile industry. The standard- theoretic optimizations have been previously proposed. But
ization work on D2D technologies in 3GPP started in 2011 issues such as device densification and role of interference
as part of the 3GPP Release 12 (Rel12). The work is done in D2D communications are still under-explored. Handover is
under the Work Item Proximity Services (ProSe) and has another issue and handover schemes such as D2D handover
made significant progress so far. But the number of required assistance and QoS-aware D2D have been proposed. Rapid
specifications that meet the identified requirements is largely mobility and determination of suitable handover criteria are
exceeding the capabilities of 3GPP for Rel12 (given also the major issues that require further research in the future. Security
other topics of Rel12). The work on D2D technologies in is another issue in D2D communications. Both physical and
3GPP has focused on a set of use cases which were identified application layer authentication schemes have been proposed.
to fit the needs of both public safety and commercial mobile However, their full acceptance and deployment are hindered
networks. by a lack of standardization effort and they also do not really
LTE-A promises to provide true 4G speeds, allowing bigger address the security and energy tradeoff issue.
data payloads and faster speed. Providing local area services is
an important design consideration for future network technolo- III. D EVICE D ISCOVERY
gies, but unlicensed spectrum reuse may be inconvenient for A fundamental design requirement for D2D networks is
local service providers because it may lead to inefficient uti- device discovery which enables devices to discover potential
lization of resources and compromise the QoS in the absence candidates in the proximity and establish a direct connection
of a base station or a central controller. Therefore, incorpo- with them. To accomplish this task, devices share beacon sig-
rating D2D communications in licensed bands has been more nals among themselves to gather information such as device
attractive. In licensed band, LTE-A technology is the most location/ distance, channel state and device ID etc. This
suitable candidate for realizing efficient D2D communications. information is used by devices to evaluate the feasibility of
With D2D capability, LTE-A-enabled devices will be able to grouping into a pair with each other. If the discovery phase and
discover other physical devices in the physical proximity of communication phase take place simultaneously, it is called
each other and communicate with each other using a direct a-posteriori discovery, whereas device (peer) discovery is the
path. precondition for D2D communication in a-priori discovery.
In addition to increasing the capacity of the network, another Generally, device discovery in D2D communication can be
design goal of 3GPP is to provide provision for public safety categorized in two types (1) Centralized Discovery and (2)
networks that require support for urgent communications in the Distributed Discovery.
case when the BS has been degraded due to a natural calamity.
Therefore, 3GPP has identified two main areas to use LTE for
public safety applications: Group communications and ProSe. A. Classification of Device Discovery Schemes
After Release 12, ProSe will support urgent D2D in following 1) Centralized Discovery: In centralized discovery, devices
three scenarios: discover each other with the help of a centralized entity or
• In-coverage: This scenario occurs when the User typically a BS. The device informs the BS regarding its inten-
Equipment (UE) is within the range of eNodeB (eNB). tion to communicate with nearby devices. The BS initiates

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
JAMEEL et al.: SURVEY OF D2D COMMUNICATIONS: RESEARCH ISSUES AND CHALLENGES 2141

Fig. 3. Challenges, solutions, open issues of D2D communications.

the message exchange between two devices to obtain essen- Orthogonal Frequency Division Multiple Access (OFDMA).
tial information such as channel conditions, interference and Devices scan for beacon signals to discover other devices in
power control policies based on the network requirements. The proximity during device discovery phase. In this beaconing
participation of the BS during the device discovery process scheme, slots are selected based on the criterion of minimum
can be complete or partial based on the pre-configured suite interference. Tang et al. [47] proposed a discovery process
of protocols [45]. where neighboring devices detect potential D2D partners by
If the BS is completely involved, the devices are not allowed overhearing Sounding Reference Signal (SRS) symbols during
to initiate device discovery with each other. Every message UL transmissions. In LTE, each device is scheduled on the
among devices is coordinated by the BS. In this case, the SRS channel regularly to allow the eNB to collect information
devices only listen to the messages transmitted by the BS and for UL channel scheduling. The devices can identify other
send messages to it in order to initiate the device discovery devices which have a high SRS as their neighbors.
process. If the BS is only partially involved, the devices send Zhang et al. [48], [49] proposed adaptive approaches to dis-
messages to each other for device discovery without obtaining cover devices in the nearby proximity. In [48], the probing
prior permission from BS. However, the devices involve the BS rate of device discovery is varied based on the information
to communicate the path gains and Signal to Interference and obtained from the social domain. The social domain informa-
Noise Ratio (SINR) level of each device. This helps the BS to tion consist of community and centrality of a particular device.
determine the feasibility of communication between devices. In [49], nodes stay asleep until the probability of contact with
Finally, the BS requests both devices to start the communi- device is low and wake up to probe for nearby devices when
cation. Fig. 4 shows the discovery procedures for both the the probability of device discovery is high. It was also found
complete and partial involvement of BS. that the lifetime of devices can be increased by varying the
2) Distributed Discovery: The distributed discovery accuracy of device discovery.
approach allows the devices to locate each other without the Hong et al. [50] proposed a novel power control method
involvement of BS. The devices transmit the control messages for efficient D2D communication. Lin et al. [51] proposed
periodically to locate the nearby devices. However, issues the resource selection scheme namely sensing based selection
of synchronization, interference and power of beacon signal and compared it with random selection for LTE application.
frequently arise in the distributed mode. An example of LTE resource allocation, depicting discovery
resource unit and discovery period, for device discovery is
B. Recent Advances in Device Discovery Schemes provided in Figure 5. It was shown that the performance for
A beaconing device discovery scheme was presented in [46] sensing based selection degrades when sensing result are out-
where devices transmit beacon signals in parallel slots using dated or when mobility of devices is rapid. However, the

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2142 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

Fig. 4. Centralized device discovery (a) Complete involvement of BS (b) Partial involvement of BS.

proposed by Zou et al. [56]. The paper provides an efficient


way to minimize the collisions during discovery phase while
using minimum physical resources. Autonomous device
discovery method based on FlashLinQ [57] was proposed
by Baccelli et al. [53]. Significant energy consumption
of devices is a serious concern during device discovery
phase. Furthermore, in the face of continual probing, this
issue becomes more critical. Therefore, Drula et al. [58],
Vigato et al. [59], Seo et al. [60], and Bracciale et al. [61]
provided energy efficient device discovery schemes while
improving performance of the network.
Kushalad et al. [62] proposed the Tic-Toc discovery ren-
dezvous protocol for nodes to transmit and listen. This protocol
provides better average-case and worst-case discovery latency
compared to the existing protocols. An oblivious neighbor dis-
covery protocol was presented by Chen et al. [63]. It was found
that the oblivious neighbor discovery protocol guaranteed dis-
Fig. 5. Device discovery resources in LTE.
covery with minimal discovery delay in the asynchronous
and heterogeneous environment. In a similar work on asyn-
chronous device discovery, Lin et al. [64] compared and
sensing based selection scheme generally out performs the discussed four possible solutions to mitigate the loss of
random selection scheme in distributed D2D networks. orthogonality of subcarriers in Orthogonal Frequency Division
Lee et al. [52] presented a novel device discovery scheme Multiplexing (OFDM) Networks. These solutions include
based on the correlation of wireless channels. The BS makes extended cyclic prefix, advanced receiver timing, dynamic
a rough estimate of the location of users by comparing these receiver timing positioning, and semi-static receiver timing
channel components with the referenced UL measurements. positioning with multiple timing hypotheses. Arcia et al.
Beacons are scheduled to be transmitted based on the val- proposed an architecture for asynchronous assistance for topol-
ues of Delay Spread (DS) and Azimuth Spread (AZ) nearby ogy discovery. In their work, a Topology Manager is used to
users. Baccelli et al. [53] found that power consumption can be generate an optimal scanning sequence. Their results yielded
reduced by up to 70% in comparison to conventional technique a 30% to 70% improvement in discovery rate in chaotic
FlashLinQ, when using their proposed scheme. deployments. Pozza et al. [65] leverage Q-Learning [66], [67]
In order to ensure quick device discovery, techniques to extend the functionalities of asynchronous neigh-
Wang and Wu [54] proposed a fast pairing approach by bor discovery protocols while minimizing energy consumption
using Inverse Popularity Pairing Order (IPPO) technique and discovery latency.
instead of conventionally used Kuhn-Munkres algorithm There is an extensive literature on minimization of device
by [55]. Signature based device discovery method was discovery delays in D2D communication. Li et al. [68]

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
JAMEEL et al.: SURVEY OF D2D COMMUNICATIONS: RESEARCH ISSUES AND CHALLENGES 2143

TABLE IV
OVERVIEW OF D IFFERENT S OCIAL R ELATIONSHIPS [73] system energy efficiency and neighbor discovery rates. It was
shown that these overlapping community users can act as a
bridge to improve data sharing during device discovery pro-
cess. Table V presents an overview of the works discussed
above along with some other significant studies on device
discovery.

C. Open Research Issues in Device Discovery


Next, we present some of the challenges of device discovery.
1) Pilot Discovery: In order to discover other devices in
close proximity, a pilot discovery signal is transmitted by
the device. However, this signal can be easily picked up by
nearby devices. The information carried by pilot signals can
proposed a method that outperforms traditional device discov-
also affect other devices in case of an inappropriate schedul-
ery methods even when the congestion occurs in the network.
ing. In this context, design parameters such as radio resources
Specifically, the initiating peer device transmits the discov-
and the structure of pilot message play significant role.
ery request frame and responding peer device reply with a
2) Frequency of Discovery Messages: The performance of
responding frame. Both of these frames are transmitted using
D2D users is affected by the number of discovery messages.
a common channel and in accordance with a superframe struc-
Even when the discovery messages have a pre-specified design
ture. This results in a quick discovery of devices even for large
and structure, the frequent dissemination of discovery mes-
congested networks. Campolo et al. [69] modeled a device dis-
sages by devices can cause significant interference for other
covery scenario. In their model, the authors used dual-radio
devices in the network. In contrast, if the number of discovery
devices, and computed the mean service discovery time and
messages is very low, then the information regarding neigh-
the service channel utilization by considering the disruption
boring devices can become stale. To address this problem,
periods. The model also takes into account different chan-
proper scheduling schemes in the network can be introduced to
nel and mobility conditions of devices. Li [70] proposed the
minimize frequency of discovery messages. Another solution
Connected Open plAtform for Smart objecTs (COAST) which
can be in the form of social interaction between communities
includes remote sensing by on-demand deployment of addi-
to speed up the device discovery using minimum number of
tional (possibly involving a 3rd party) services on the same
discovery messages.
or another smart object. COAST also provides the necessary
3) Synchronization: Typically, in D2D communication, the
platform services to support run-time adaptation, monitoring,
devices in the network are synchronous with the BS. This
and data analysis.
implies that scheduling and frame timings are specified by the
Prasad et al. [71] investigated energy-efficient device
BS. However, it becomes a challenge during the discovery of
discovery techniques. The proposed scheme in [71] per-
devices when second device lies outside the coverage range
forms D2D discovery procedures only when there is a high
of the BS with which the first device is connected. In the case
probability to find other UEs subscribed to the same ser-
of asynchronous discovery, the devices have to continuously
vice. The results show that significant energy savings can
search for other devices in the neighborhood.
be obtained using their proposed discovery mechanism. In
another work [72], Prasad et al. proposed a scheme that
offloads the discovery process from not only UEs but also to IV. M ODE S ELECTION
the LTE core network. The authors also analyzed the energy In contrast to conventional cellular networks, in D2D, UEs
consumption profiles of various discovery mechanisms. can communicate directly with the BS. This ability of devices
Zhou et al. [73] proposed a three-dimensional iterative to communicate with the BS and with each other significantly
matching algorithm to maximize the sum rate (which is the improves the performance of network in terms of throughput
sum of channel rates) of D2D pairs weighted by the intensity and delays. However, it also introduces new design chal-
of social relationships (a list of social relationships is pro- lenges such as network overloading and resource management.
vided in table IV) while guaranteeing the QoS requirements Moreover, two communicating UEs can work in the same,
of both cellular and D2D links simultaneously. In cellular different or hybrid mode, which makes network management
networks, the users have multi-dimensional social attributes more complex. Typically, UEs can choose one of the following
and multiple interests, due to which they may have similari- four modes of communication as shown in Fig. 6:
ties with more than one community. These multi-dimensional • Pure cellular mode: When the availability of resources
social attributes of the users effects their social relationship is low and when interference is very high due to which
which leads them to form overlapping communities. In this D2D communication is not possible, pure cellular mode
context, Wang et al. [74] proposed a scheme to dynamically is used. In this mode D2D users cannot transmit their
estimate the roles of overlapping community users in vari- data.
ous communities. The scheme dynamically adjusts the beacon • Partial cellular mode: In this case, two UEs are able
detection rates according to the connection status of other to communicate through the BS without co-channel
intra-community and inter-community users to improve the spectrum sharing.

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2144 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

TABLE V
OVERVIEW OF D EVICE D ISCOVERY I SSUES AND R ECENTLY P ROPOSED S OLUTIONS

• Dedicated mode: In this mode, UEs communicate with A. Reference System Model
each other using dedicated spectrum resources. In this subsection we present a brief overview of the refer-
• Underlay mode: In this mode, D2D users and CUEs share ence system model for mode selection. We assume a cellular
the UL and DL resources. network in which CUEs communicate in UL or DL modes

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
JAMEEL et al.: SURVEY OF D2D COMMUNICATIONS: RESEARCH ISSUES AND CHALLENGES 2145

Fig. 6. Modes of communication in D2D networks (a) Pure cellular mode (b) Partial cellular mode (c) Dedicated mode (d) Underlay mode.

TABLE VI
S UM R ATE FOR E ACH M ODE

using the orthogonal resource block. Let U = {Uj |j =


1, 2, 3, . . . , N } and D = {Di |i = 1, 2, 3, . . . , M } represent
the set of CUEs and D2D pairs, respectively. Additionally, let
R = {Rk |k = 1, 2, 2N − 1, 2N , . . . , L} be the resource pool,
where 1 to 2N − 1 represents the UL chunk and 2N to L
represents the DL chunk. The distance between a potential
D2D user and the BS is represented as rc,i . Also, the link
distance between a single D2D pair and the path loss expo-
nent are given by rd,i and α, respectively. The UL rate and
DL rate for above mentioned 4 modes are given in Table VI
where Pb , Pc and Pd represents the transmit power of BS,
CUE and D2D pair, respectively. Moreover, hi , hib , hic and
hcb represents the channel between D2D pair, BS and DUEs,
Fig. 7. The success probability at the BS versus the success probability at
DUE and CUE and BS and CUE, respectively. Also, f and the D2D Receiver [85].
g are the BS transmit precoder and receive precoder, respec-
tively. Based on this preliminary model, the mode selection
schemes can be broadly classified into three categories: 3) Guard Zone Scheme [84]: A potential D2D transmitter
1) Distance Cut-Off Scheme [82]: This is the simplest chooses the D2D mode if the cellular link distance is greater
selection criteria. A potential D2D transmitter selects the D2D than the guard distance. It is represented as
mode if the link distance for a D2D pair is less than a spec-
ified threshold, otherwise the cellular mode is selected. It is rd,i > Rg , (3)
mathematically given as where Rg is the guard zone radius centered at the BS. To
avoid severe interference at the BSs, potential D2D transmit-
rd,i < γ, (1)
ters located within the guard zones are required to operate
where γ is the pre-defined threshold. in cellular mode and share the UL resource with the origi-
2) Link Gain Scheme [83]: A potential D2D transmitter nal cellular UEs in a Time Division Multiple Access (TDMA)
chooses the D2D mode if the biased D2D link quality is at fashion. These UEs are referred to as D2D transferred cellular
least as good as the cellular UL link quality. It is can be written UEs in the rest of the paper. The DLs of these UEs share the
as original cellular DL. In contrast, potential D2D UEs located
outside the guard zones operate in D2D mode and reuse the
−α −α
rc,i < Td rd,i , (2) cellular UL frequency for transmitting.
We can compare the selection mode schemes in terms of
where Td is the bias factor that controls traffic offloading from their effect on the BS (i.e., the success probability at BS) and
the cellular infrastructure to the D2D mode of communication. the D2D UEs (i.e., the success probability at the cell-edge-
At one extreme, setting Td = 0 disables the D2D communi- located D2D receiver, which is the worst case scenario). Fig. 7
cation. At the other extreme, setting Td = ∞ forces each depicts the success probability at the D2D receiver versus the
potential D2D UE to communicate via the D2D mode. success probability at the BS. From the figure, we can see that,

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2146 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

under the same value of BS success probability, the distance


cut-off scheme has the highest success probability at D2D,
followed by the guard zone scheme and the link gain scheme.
This is because D2D UEs with less power are in D2D mode,
thereby reducing the interference at the D2D receiver for the
distance cut-off scheme.

B. Recent Advances in D2D Mode Selection


Many works in the D2D literature propose to use joint mode
selection and resource allocation to improve the capacity of the
network via traffic offloading. Present studies on D2D have
focused on three modes [86]. One mode is pure cellular and
the other modes are reuse D2D and dedicated modes [87]. The
interference for each sharing mode along with D2D and cellu-
lar link quality was considered in [88]. Yu et al. [89] presented
a joint power control and optimum resource allocation between
D2D and cellular users. The cellular user with better channel
conditions shares the resources with the D2D pair to minimize
the interference. Liu et al. [90] studied the overlay and under-
lay mode selection in the presence of relay. They showed that
the underlay mode is more appropriate when cellular users are
close to the BS than the D2D users. Yu et al. [91] maximized
Fig. 8. Relay-based modes of communication in D2D networks (a) Relay-
the throughput of system while guaranteeing QoS require- assisted (b) Local route.
ments of cellular and D2D users. Finally, Morattab et al. [92]
used Multiple Input Multiple Output (MIMO) precoding tech-
niques to achieve higher throughput in all modes by reducing
C. Open Research Issues in D2D Mode Selection
interference.
From above discussion we observe that the direct D2D mode Now we discuss some research challenges in mode selection
may not be completely advantageous due to the restricted in D2D.
offloading capability of devices. It is due to the possibility 1) Number of Mode Alterations: One particular challenge
of a large separation between the communicating devices and when considering mode selection is how often the mode alter-
the poor channel quality of the D2D pair [16], [93]. In this ation should be done. Due to the random nature of wireless
case, the coverage range of the network can be increased using channel, mode alteration may take place frequently depending
intermediate relays which also enable the traffic offloading on the number of scatterers and mobility of devices. In addi-
capability of the network [94], [95]. In particular, the possi- tion to this, most studies consider single cell scenario (where
bility of using intermediate relays also introduces two new D2D pairs are attached to a single BS) to make the analy-
modes in addition to the conventional D2D modes. One of sis straightforward and easy to follow. Hence, more research
these modes is the relay-assisted D2D mode, which can be efforts need to focus on the provisioning of lasting solutions to
used for communication between the source and the destina- minimize the number of alterations in mode selection process.
tion D2D devices with the help of a relay. The other mode is 2) Mode Selection Overhead: Mode selection can incur
the local route mode, which enables the source and the des- a significant amount of overhead. This overhead includes
tination D2D devices to communicate using the intermediate channel estimation and control signaling. It is worth noting
BS as a relay station. Both the relay-assisted and local route that channel estimation can be done based on the Channel
modes are shown in Figure 8. In order to support all the modes State Information (CSI) of links. However, it will greatly
of communication, there is a strong need to design robust and affect the performance of network because the CSI of links
adaptive protocols. These protocols should be designed for can become outdated. More precisely, minimizing the mode
both independent UEs and relay-capable UEs. However, cur- selection overhead is important to increase the lifetime of
rent releases of D2D standards failed to provide any clear devices.
definitions of Radio Protocol Architectures (RPAs) in relay- 3) Dynamic Mode Selection: Most of the studies in lit-
based D2D modes. In addition to this, the involvement of erature take static network scenario into account. These
relay-enabled D2D modes also makes the channel assess- studies mostly focus on downlink scenario [96]–[98] where
ment and subsequent scheduling procedures more complex. D2D pairs communicate through BS. As it is apparent, that
Hence, designing a low powered and minimal overhead signal- the dynamic switching between different modes either per-
ing scheme remains a challenge. Moreover, the BS should be formed heuristically [96], [97] or using brute force [98] brings
able to optimize the communication by changing the mode of sub-optimal improvements in the performance gains of the
devices in each subframe while maintaining a fair distribution network. Similarly, the works of [86], [99], although present
of resources [91]. non-static mode selection, do not consider any mobility of

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
JAMEEL et al.: SURVEY OF D2D COMMUNICATIONS: RESEARCH ISSUES AND CHALLENGES 2147

TABLE VII
B RIEF S UMMARY OF R ESOURCE M ANAGEMENT M ETHODS FOR D2D

the user devices. These observations call for requirement of Table VII presents a brief summary of some of the challenges
complex mode selection schemes that can be dynamically and solutions related to resource management in the recent
applied to realistic scenarios. literature.

V. R ESOURCE M ANAGEMENT A. Interference Management


Resource management typically takes place simultane- Proper allocation of spectrum resources is of critical
ously with mode selection. Efficient management of resources importance for maintaining the required level of QoS in
can significantly mitigate interference, conserve power and the network. With the addition of D2D users in cellular
maximize throughput. Interference mitigation and power con- networks, the issue of interference becomes more com-
sumption are related to the issue of resource management. plex [100]–[103], [105]–[107], [110]. Future cellular networks
We briefly present both of these topics in this section. will have to support various heterogeneous devices and large

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2148 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

scale deployment of macro-small cell networks (where conven- strong signal interference. Cell edge users face interference
tional cellular network is overlaid with many low power base from strong and weak signals from adjacent cell UEs and
stations), thereby making management of interference more eNBs. This situation becomes even more complex in macro-
critical as well as challenging. With the integration of D2D small cell deployment, where cell users within the small cell
communication, the cellular architecture has evolved into a try to attach itself to the high powered eNB of the macro cell
two tier cellular system. A two-tier cellular network consists instead of the low powered eNB of the small cell. The same
of a macro cell tier and a device tier. A macro cell tier con- scenario occurs when a cell edge user tries to attach itself to
sists of cellular communications from base station to cellular the eNB of another small cell in the proximity. D2D communi-
users and a device tier involves D2D communications. Two cation introduces additional inter cell interference in both UL
types of interference can occur in this two-tier scenario: co- and DL communication. In the case where UL resources are
tier and cross-tier. Co-tier interference occurs between D2D being used for D2D communications, D2D transmissions near
pairs when the same resource block is allocated to more the cell edge cause interference to neighboring eNBs and sim-
than one D2D user within the same tier network. Cross tier ilarly D2D receivers receive interference from cellular devices
interference occurs between cellular users and D2D users. transmitting to the eNB at the cell edge. In the case where DL
Cross-tier interference arises when a resource block dedicated resources are being used for D2D transmissions, D2D trans-
to a cellular user is reused by one or multiple D2D users. If mitting devices interfere with cellular devices receiving normal
cellular users and D2D users share the same channel resources communications on DL resources. Conversely, in the same
in the UL communication then the source of interference is scenario eNBs interfere with ongoing D2D communications.
the D2D transmitter and the victim is the cellular base sta- 1) Recent Advances in Interference Management:
tion. In the same situation the cellular user also becomes the Lv et al. [138] proposed a guard zone based interference
source of interference and the D2D user becomes the victim. mitigation scheme in which D2D users within a certain geo-
In the case of a DL communication the base station causes graphical area inside a cell are forced to operate in the
interference to D2D receivers and D2D transmitters interfere pure cellular mode. Theoretical and numerical results of
with DL cellular communication. performance metrics such as successful transmission probabil-
Different interference mitigation approaches exist in lit- ity and average throughput of CUEs validated the improvement
erature, which can be broadly categorized into central- achieved by the proposed scheme.
ized [105], [125], [126], distributed [111], [127]–[133] and Chui et al. [139] discussed the interference cost of D2D
semi-distributed [134]–[137]. In the centralized approach, a offloading. Here, the authors leverage MIMO techniques in
central controller (eNB) is responsible for allocating resources a multiuser D2D environment. A systematic strategy was
to both cellular and D2D users while monitoring cell-wide adopted to check the cross-pair interference at the antenna
information regarding SNR, channel state information and combinations. Furthermore, a bucket based Degree of Freedom
interference level of each user. However, the complexity of algorithm was introduced for effective usage of multiple anten-
centralized interference management approach increases with nas to eliminate interference. It was shown that throughput was
increasing number of users because a single entity needs to improved upto 218.8% as compared to traditional interference
collect and process large amounts of information. Therefore, mitigation techniques.
a centralized approach is considered more suitable for small An interference mitigation technique for distributed D2D
size networks. systems was presented by Rim et al. [131]. The authors
In the distributed approach there is no central entity and the used frequency spreading technique in order to satisfy the
devices opportunistically access the channel that is actively outage probability constraint and hence, reduce interference.
in use by cellular users. This approach requires frequent The results show that the proposed technique is suitable for
exchange of information between neighboring D2D users. The interference mitigation for devices present at the edge of the
approach also requires the devices to overhear ongoing cellu- cell. However, it is not much effective for devices in the central
lar communications to collect information regarding channel region of the cell. Yang et al. [140] addressed the interference
quality and free resource blocks which can cause devices issue for devices operating in full duplex mode. A graph theory
to consume a lot of power. The distributed approach scales based approach was adopted to optimize spectrum utilization.
well to larger networks but requires complex interference More specifically, a graph Coloring based Resource Sharing
avoidance algorithms to ensure high quality cellular commu- (GCRS) scheme was presented to optimize the problem with
nications along with reliable D2D communications. The semi- minimum complexity.
distributed approach is a hybrid approach where interference Wu et al. [141] proposed a cross-layer system for Peer-
management is done at different levels of network involve- to-Peer (P2P) file sharing approach among devices. The
ment. These approaches focus on reducing signaling overhead cross-layer framework jointly considers context information
and computational complexity at the eNB. of physical layer transmissions, an interference cancellation
Inter cell device-to device interference is another impor- scheme, an enhanced Greedy Parameter Stateless Routing
tant issue that needs to be addressed particularly in LTE-A Protocol (GPSR) to support multi-hop communications and
networks. As the same frequency is reused across the cell, the a Radio Resource Management (RRM) scheme to maximize
edge UEs may be allocated the same sub-carriers, thus caus- throughput while guaranteeing the QoS of cellular users.
ing inter cell interference between users at the cell edge. These Baidya and Levorato [142], considered the transmission of
UEs at the cell edge use high power to reach the eNB, causing video messages through D2D infrastructure. An optimization

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
JAMEEL et al.: SURVEY OF D2D COMMUNICATIONS: RESEARCH ISSUES AND CHALLENGES 2149

problem was formulated using peak signal to noise ratio as a 1) Recent Advances in Power Control Schemes:
constraint. The resulting optimal policy proposed in the paper Jung et al. [98] proposed a power efficient mode selection
greatly improves throughput as compared to undifferentiated and a power allocation scheme for cellular networks where
interference strategy. The optimal policy is then applied to the same cellular spectrum is used for D2D transmission and
real world video streaming application where improvements cellular communications. The mode selection method decides
in throughput are also observed. whether the device will operate in cellular mode or D2D mode.
Zhao et al. [143] proposed a two-stage relay selection The power efficiency is defined by the ratio of system capac-
scheme to maximize the total throughput and guarantee QoS ity and total available power of the system. The proposed
requirements. In the first stage, the candidate relay nodes are scheme measures the power efficiency for all possible modes
determined based on a selected cell coverage range. In the of the devices communicating in cellular and D2D mode.
second stage, the optimum relay node is selected from the Once the power efficiency is computed, a mode sequence with
candidate nodes based on the transmission power and the maximum power efficiency is selected.
SINR to guarantee QoS. Another relay selection scheme is Xiao et al. [96] proposed an algorithm that reduces the
presented in [144] where resources are allocated to two-hop power consumption of OFDMA based systems with integrated
relay links based on the maximum received SINR. Then an D2D communication. This algorithm forms a CSI matrix
optimal relay node is selected according to the max − min based on the UL and DL subcarrier in OFDMA-based cel-
criteria of channel capacity of the D2D relay link. lular networks. The CSI matrix consist of generalized grid of
Li et al. [145] proposed a call admission control algo- M ×N , where M is the number of users and N is the number
rithm based on interference analysis. Whenever a new DUE of subcarriers. The authors considered two modes of commu-
pair wants to access the network, the latter will calculate nication namely, cellular mode and direct mode. The proposed
the QoS of all existing cellular and D2D communications scheme first allocates the joint resource to the users communi-
to determine if the new call is allowed or not. If the new cating in cellular mode and then it performs the mode selection
call creates interference with the existing cellular and D2D and resource allocation for the users communicating in D2D
communications and compromises their QoS, the call is not mode. Devices using cellular links will operate in the same
allowed. way as the traditional cellular systems but the devices in direct
mode can communicate in both modes. Direct communication
between the devices is only allowed if the two communicating
B. Power Control devices are in close proximity (so that the required transmis-
The process of adjusting power levels in base stations dur- sion power level is below a pre-defined threshold) and far
ing DL transmissions and in UEs during UL transmissions from the base station. The results show that the proposed
is known as power control [83], [104], [111]–[122], [132]. solution reduces the power consumption of OFDMA based
Increasing the transmit power of a device is desirable because D2D networks in DL transmission by 20% compared with the
it increases the link capacity but it will also cause an increase traditional OFDMA systems without D2D integration.
in the interference between the devices sharing the same cel- Wang et al. [152] utilized the interior point method to
lular resources. Power control strategies also help conserve evaluate optimal power for D2D communications. The aim
energy resources. Resource allocation involves strategies that of the authors is to minimize the computation complexity
are used to allocate radio resources (such as time slots in for which the interior point method was approximated. This
TDMA or frequency bands in Frequency Division Multiple was achieved by replacing inversion of Hessain matrix with
Access (FDMA)) to different users/devices. Resource allo- a diagonal metrics. This simplification led to quick updation
cation plays an important role in meeting the instantaneous of Newton method. The results demonstrate that near optimal
increase in demand for resources. Joint optimization of power throughput is achieved with relatively lower computational
control and resource utilization are vital to improve system complexity. Abrardo and Moretti [153] addressed the non-
capacity and the overall system throughput. In this section, convexity of sum rate maximization problem subject to power
we discuss different power control and resource manage- constraints. The authors address this problem by modeling the
ment approaches [111], [146]–[150] that emphasize combining power allocation problem as a potential game. By using the
power control with mode selection and link adaptation tech- convergence property of potential games, two iterative algo-
niques for achieving optimal system performance. rithms were proposed. The proposed solutions converge to one
There are two broad categories of power control algo- of the local maxima of the objective function while outper-
rithms which include centralized [83], [151] and dis- forming the conventional rate maximization schemes in the
tributed [111], [132]. In centralized algorithms, the power literature.
control and resource allocation decisions are made by the Wang et al. [154] proposed a scheme to allocate power
BS, whereas in the distributed approach power control and and radio resources efficiently to improve the power effi-
resource allocation are performed independently by the UEs. ciency of cellular devices communicating in the network. The
LTE power control is an example of a centralized algorithm. authors proposed an iterative combinatorial auctioneer algo-
An efficient power control algorithm should consider impor- rithm where the D2D users (also called bidders) contend for
tant parameters such as maximum transmit power, number of the channel access and the cellular wireless medium is consid-
resource block, target received power per resource block and ered as the auctioneer. Liu et al. [155] and Tao et al. [156] used
path loss. the Peukert’s Law (which expresses the change in capacity of

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2150 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

batteries at different discharging rates) to characterize the non-


linear effects in battery and also modeled the battery lifetime.
They allowed multiple D2D pairs to share the same chan-
nel simultaneously thereby increasing the channel utilization.
By using simulation tests, they showed that the battery life
of D2D UEs becomes lower than that of cellular UEs if the
distance between D2D UEs becomes greater than 0.8 of the
cell radius. Thus it is beneficial to restrict devices to com-
municate directly if they are at certain specific distance from
each other.

C. Open Research Issues in D2D Resource Management


Some research challenges regarding resource management
Fig. 9. Typical handoff scenario in D2D Communication.
are listed below.
1) Device Ensification in Multi-Tier Networks: In a dense
heterogeneous network, interference management is a crit-
VI. M OBILITY M ANAGEMENT
ical issue. This is because the underlay spectrum sharing
becomes more difficult than the existing single-tier systems Mobility management is an essential component of D2D
when multiple BS are involved in the network. Moreover, due communication paradigm. Since UEs may change their loca-
to various access restrictions (such as public and private, and tion while communicating with each other, their connectivity
so on), interference level varies in cells. The dynamic nature of could get interrupted. Therefore, a mechanism is required that
heterogeneous networks also requires adaptive resource allo- handles the communication when UEs are mobile. For D2D
cation strategies. Therefore, it is critical to manage resources applications such as bulk data transfer or cellular offloading
efficiently in D2D heterogeneous network. between devices in close proximity, evaluating mobility pat-
2) Interference, Friend or Foe?: Interference in D2D terns of UEs and their impact on communication reliability is
networks can be used to gain various advantages in terms a key challenge [162]–[174].
of security and RF energy harvesting [157]–[159]. For secu-
rity, the interfering signal can be used for friendly jamming A. Fundamentals of Mobility Management in D2D
in order to deteriorate the receiving signal at the potential Communication
eavesdropper [160], [161]. Specifically, this use of interference Mobility management consists of two complementary
provides secrecy of data by decreasing the SINR at the eaves- operations namely, location management and handoff man-
dropper which results in high decoding errors. In addition to agement [175], [176]. Location management enables the
this, interference signal can be used for ambient RF energy network to track the attachment points of mobile terminals
harvesting. This RF energy can be used to charge devices at between consecutive communications as they roam around
the edge of the cell. However, doing so can increase the cost the networks. Handoff (or handover) management enables
of the hardware because the circuitry used for information the network to maintain the users’ connection as the user
decoding cannot be used for energy harvesting. Therefore, a moves from one attachment point to another (as shown
separate energy harvesting module is required to be employed in Fig. 9). Horizontal handoff arises between homogeneous
inside the receiver such that the power of received RF sig- networks/systems when the signal strength of the serving base
nal is divided into two streams; one for energy harvesting and station deteriorates below some threshold. Vertical handoff
the other for information decoding. Moreover, to date, there arises between heterogeneous systems and can be user ini-
is not much work done in D2D literature that takes advantage tiated or network initiated. In the former case, user initiates
of efficient utilization of interference for provisioning of link the handoff. In the latter case, the network initiates the hand-
security or energy harvesting. off when it decides to distribute the overall network load
3) Multiple Small Networks or One Large Network: The among different systems. The vertical handoff decision relies
issue of resource management in D2D is directly connected to on multiple factors such as type of application (streaming, con-
the number of users in the network. The resources (both power versational), minimum bandwidth, delay preferences, power
and frequency) can be fairly managed in small networks, how- requirements, observed network load, estimated data rates, and
ever as the number of users increases, it becomes very difficult so on. Such contextual information can be used to create pro-
to accommodate all users in a single network. Technically, files and make trajectory predictions that can assist in making
the network performance mainly degrades due to increased optimized handover decisions.
number of antennas, large overhead of CSI feedback and A popular feature of future cellular networks is the design
high complexity of decoding and precoding metrics. How of multiple small cells (femto/pico) which create multilayer
many users should be allowed to enter the network, how to topologies. Another feature is the existence of user devices
make decision (centralized or distributed) and how to allocate that support multiple Radio Access Technologies (RATs). Such
resources within a sub-network, are some of the critical issues multi-layer topologies and multi-RAT environment enable
that need to be addressed. network densification which results in higher spatial frequency

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
JAMEEL et al.: SURVEY OF D2D COMMUNICATIONS: RESEARCH ISSUES AND CHALLENGES 2151

reuse and higher network capacity but makes the handover pair of devices involved in D2D communications. In the han-
decision more complex and challenging. The existence of co- dover phase, the source eNB sends a handover request message
channel interference along with small cells appearing and dis- to the target eNB. On receiving the request message, the target
appearing quickly as UE devices move in a multi-RAT/multi- eNB determines if it can provide the same QoS as the source
layer environment bring about additional challenges to execute eNB. If it can provide the required QoS, then it notifies the
the handover process in a timely manner. Hence, the users ProSe function about the D2D handover. The ProSe function
mobility can diminish the expected densification gain. In order authenticates the identity of the ProSe UEs prior to allow-
to improve the densification gains, it is necessary to design ing the UEs to handoff. Then the target eNB reserves Radio
handover solutions that reduce the handover rate and control Resource Control (RRC) resources for the UE to use over
overheads. The implementation of separate control and user the radio link and allocates a Cell Radio Network Temporary
planes have demonstrated to provide lower control overhead Identifier (CRNTI) to the moving UEs. Once the target eNB
and handover failure rate in [177]. The separation of con- has allocated resources, it sends a message to the source eNB
trol and user planes also provides flexibility to take handover indicating that it has allocated resources for the mobile UE.
decision with the help of very little control information. Next, the source eNB requests the UE to perform a handover.
Yilmaz et al. [181] proposed two solutions to D2D handover
in an underlay network. The first solution is the D2D-aware
handover solution, where the serving BS postpones handover
B. Recent Advances in D2D Mobility Management of a pair of DUEs (moving out of coverage of the BS) to
Most of the work in D2D mobility management is related another BS until the signal quality of the serving BS falls
to efficient handover selection. Doppler et al. [178] recom- below a pre-defined threshold. The pre-defined threshold is
mended that D2D should be created or designed for station- the minimum requirement in terms of link quality to main-
ary link with restricted mobility as an underlay in cellular tain the D2D control. On the contrary, if the DUEs perform
networks. The handoff can take place inside a cell, either when a handover and move under the control of another BSs, it
interference is high or when D2D transceivers are out of range can lead to significant performance degradation. Once the link
such that the communication between devices is not possible quality of the serving BS falls, pair of DUEs jointly han-
due to fading and signal attenuation. Through vertical hand- dover to the other BS. The second solution called the D2D
off and mode selection, handoff can be executed from D2D triggered handover solution clusters the members of a D2D
links to the cellular link. D2D transmission links provide direct group within a minimum number of cells or BSs. This results
communication when moving from one cell to another cell or in reduced network signaling overhead caused by the inter-BS
by switching to the cellular mode before horizontal handoff. information exchange.
IP connections are handed over from D2D links to cellular The impact of mobility on the relationship between Energy
links and vice versa. This could work well when we have Efficiency (EE) and Bandwidth Efficiency (BE) in D2D com-
have multiple valid IP addresses which allow routing in the munications is investigated in [182]. The authors proposed
user plane through either a direct D2D link or an IP tunnel of an EE-BE aware scheduling scheme with a dynamic relay
the cellular network. selection strategy. In addition to the above studies, some
Orsino et al. [179] proposed a handover scheme that utilizes other solutions for mobility management problems are listed
direct D2D communication to assist cellular users at the cell- in Table VIII which highlight the proposed solutions and
edge avoid interruption and minimize delays while moving performance metrics used for evaluation.
between cells. Users that move to a different cell can establish
D2D links with devices in close proximity to take advantage
of better channel quality and get uninterrupted downloading. C. Open Research Issues in D2D Mobility Management
The eNB is responsible for D2D session establishment, power This section discusses some of the mobility management
control and resource management functions. The handover challenges for D2D UEs that need to addressed in future.
decision is triggered by the eNB based on Channel Quality 1) Appropriate Selection of Open System Interconnection
Indicator (CQI) feedback given to it by the UEs. The han- (OSI) Layer: To handle mobility management, each layer of
dover process can be divided in to three phases: handover OSI model provides possible solutions [183]. Protocols such
preparation, execution, and completion. In the first phase, the as Session Initiation Protocol (SIP) and Mobile Stream Control
UE sends the channel related information to its serving eNB, Transmission Protocol (mSCTP) support mobility services at
which decides whether to initiate the handover process based the application layer and transport layer respectively. Similarly,
on certain conditions such as average fade duration and aver- Mobile IP (MIP) at the network layer and many data link
age level crossing rate. The execution is the phase where layer access technologies implement functions to deal with
the information of UE and its behavior is transferred to the mobility issues. In the context of D2D, selection of an appro-
other cell. In the completion phase, the acknowledgments are priate layer to handle mobility management is a critical issue
exchanged between cells and the status of UE is updated in which may be different for different modes and require further
the new cell. investigation.
Considering that D2D communication occurs between 2) Suitable Handover Criteria: Since D2D UEs experience
devices in close proximity, Chen et al. [180] proposed a seam- interference from multiple sources in the network, therefore,
less handover scheme that jointly considers the handover of the handover from one cell to another cell should consider the

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2152 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

TABLE VIII
B RIEF S UMMARY OF M OBILITY M ANAGEMENT IN D2D C OMMUNICATION

QoS requirements of the devices as well as the availability of security and privacy threats being faced by both cellular and
resources in the new cell. Moreover, future D2D UEs are likely ad-hoc wireless networks. D2D communications face several
to be equipped with energy harvesting capabilities. Therefore, security threats that can affect authentication, confidentiality,
the criteria of handover can drastically change if the amount of integrity and availability of the network. Thus, D2D commu-
harvested energy is also taken into consideration. Suitable han- nications require efficient security solutions to enable secure,
dover criteria can hence enhance the lifetime and performance private, and trusted data exchange between devices and cellular
of devices. network; and proximity-based direct communication without
3) Handover Techniques for Highly Mobile UEs: For verti- any assistance from cellular network.
cal handover, UEs need to operate on controlling and signaling In scenarios where the cellular network is responsi-
frequencies. However, this results in a significant increase in ble/engaged in coordinating D2D communications it is nec-
interference and deterioration of instantaneous SNR especially essary to secure connections between the user and the base
when the mobility of devices in the network is high. Since station. Existing cryptographic mechanisms that encrypt mes-
D2D UEs are envisaged to be highly mobile (e.g., in Vehicular sages being sent over the physical interface can be used to
Ad-hoc Networks (VANETs)), therefore frequent handovers secure radio channels from well-known security threats such
are likely to be made, which may increase the interference as eavesdropping, replay attacks, message modification, and
level in the network. So, joint interference mitigation and node impersonation. Current cryptographic solutions encrypt
handover techniques need to be developed that can improve messages by using a shared secret (either a symmetric shared
overall performance of D2D communications. key or public key) which mandates the involvement of the
base station or a Trusted Third Party (TTP). In this case,
security functions are managed by Public Key Infrastructure
VII. S ECURITY AND P RIVACY IN (PKI). Such security mechanism is not feasible in the case of
D2D C OMMUNICATIONS direct D2D communications because of absence of the cellu-
So far research and standardization efforts in D2D com- lar infrastructure. Further, due to the large numbers of mobile
munication have focused mainly on architecture, interference, devices, the variety of manufacturers and differences in stan-
and resource management. Security aspects for the D2D envi- dards; preloading secret keys in the devices is not a practical
ronment have been largely ignored by both academia and solution.
industry. D2D communications present a hybrid architecture For D2D communications, application layer security com-
where both distributed and centralized approaches are cou- bined with physical layer security could provide an efficient
pled together. It is therefore vulnerable to some of the same and secure solution. A cross layer security framework such as

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
JAMEEL et al.: SURVEY OF D2D COMMUNICATIONS: RESEARCH ISSUES AND CHALLENGES 2153

approach that assigns a persistent pseudonym to each user to


mask his/her identity. However, anonymity schemes usually
require a TTP, but the assumption of a central TTP author-
ity is unrealistic for D2D communications. The opportunistic
nature of D2D communications requires decentralized privacy
preserving schemes. These schemes also need to consider how
privacy can be maintained during the exchange of context
information in group communications.
Proximity-based D2D communications give rise to several
privacy issues such as location privacy and device specific pri-
vacy. Location privacy refers to the sensitive association of a
user identity with his/her location. However, providing loca-
tion privacy is challenging, because in order to perform device
discovery and make use of proximity based services it is nec-
essary to exchange location information with nearby devices.
Fig. 10. Joint Physical-Application Layer Security Scheme [184]. Device specific privacy refers to the mobile platform that
can provide certain basic security mechanisms. These basic
security requirements include securely storing data using a
the one proposed in [184] could improve reliability of D2D device specific key, ensuring software operate in isolation from
communications. In the cross layer security framework, phys- each other and that each external device is able to confirm a
ical layer provides wireless link security, whereas, application compliant platform version. We need to consider important
layer ensures authentication through watermarking. Together, privacy requirements such as anonymization, encryption of
both layers can ensure confidentiality and integrity of data as client side data, minimizing personal data and defining pri-
it passes through the wireless channel. A graphical illustration vacy policies for access control, during the design phase of
of their proposed model is shown in Fig. 10. device architecture.
When a user device is far from the base station, the user Privacy schemes present a significant challenge also because
cannot directly communicate with it. In this case, the user can they contradict with certain security requirements. For exam-
communicate with the BS by relaying messages through the ple, pseudonymization hides a users true identity which may
intermediate devices. D2D relay communication expands the be necessary to perform authentication. Further, anonymity
coverage of cellular network and also improves the service schemes must ensure that malicious users are not able to take
quality at cellular edges. But at the same time, D2D commu- advantage of anonymity to perform illegal actions.
nication faces serious security challenges. The intermediate
nodes involved pose some risks to the integrity and confiden-
tiality of the data in transit. To keep the users data secure from A. Recent Advances in D2D Security and Privacy
the malicious intermediate nodes is also a challenge in D2D Physical layer security is a recent concept which proposes to
communication. shift the security functions from the upper layers to the phys-
Privacy is another impeding challenge for adoption of D2D ical layer. As shown in table IX, this technique has proven
communications, because D2D presents a dynamic environ- to be very successful to ensure security against threats like
ment where communication between different devices has eavesdropping (both passive and active) and man-in-the mid-
different context-specific sensitivity level. The extent to which dle attacks. More specifically, physical layer security refers to
a user might want his personal data to be published is highly techniques that exploit the physical characteristics of wireless
context-dependent. It is important to design access control channels and multiple antennas. In the context of D2D com-
schemes that allow users to specify which data is transmit- munication, physical layer security is emerging as a prominent
ted and to whom. A lot of important personal information is solution for provisioning of wireless link security between pair
being implicitly shared (e.g., location, time of communication) of devices [185]–[188]. It is also being used for jamming
during D2D communications. Any adversary eavesdropping to reduce the ability of eavesdroppers to intercept sensitive
on these communications might not be able to understand communications [189], [190].
the encrypted content but mining seemingly innocent look- Spectrum sharing in D2D can produce a significant amount
ing data collected over a long period of time will allow the of interference among CUEs. Therefore, several research
adversary to reveal useful information regarding users commu- efforts have been exploring novel techniques that can mini-
nication patterns. Cellular devices are exclusively associated mize interference in order to enable secure and reliable D2D
to a single person and therefore, communication patterns such communication [191]. Interestingly, as we mentioned earlier,
as location, time, duration of communication, device type, interference in D2D communication can be used to enhance
type of service request and so on, generated from informa- network security by using it as artificial interference [192]. To
tion, can be used to identify a particular user of the device. be more specific, the interference generated from a D2D user
Anonymity preserving methods are employed to disassociate can be used against eavesdroppers to confuse their reception
personal information such as location from the users identity to capability. Yue et al. [193] jointly optimized the access con-
preserve privacy. Pseudonymity is a special type of anonymity trol and power of RF links when the links were subjected to

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2154 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

TABLE IX
VARIOUS A PPLICATIONS OF P HYSICAL L AYER S ECURITY

an eavesdropping attack. Later, Ma et al. [194] extended their


work by applying the same optimization strategy for large-
scale D2D networks. For the case of multiple eavesdroppers
and multiple antennas, Chu et al. [195] considered the DL
transmission and provided a robust beamforming technique to
maximize the secrecy rate (i.e., the difference between the rate
of legitimate and eavesdropping links) using minimum amount
of power.
Zhang et al. [212] proposed a secure data sharing protocol
for D2D in LTE Advanced networks. The application scenar-
ios related to this protocol is time deterministic (i.e., the data
is available for a certain time) and specific. To share data,
the content providing server must pre-register and join the
cellular network. The content providing server is subject to
malicious attacks in its unprotected domain. However, Zhang’s
protocol [212] does not ensure availability and dependability.
Goratti et al. [213] proposed a security protocol related to Fig. 11. D2D friendly jamming network setup [160].
the establishment of direct communication links among D2D
devices. The proposed protocol addressed LTE security issues
such as authentication and identification. The key idea of the of AN. This asks for algorithms to be developed for opti-
protocol was broadcasting beacons containing security related mum power allocation. The jamming signal generated by D2D
information to the nearby devices. Based on a pre-distribution transmitted can also act against any potential eavesdropper
key management scheme, the protocol gets a random encryp- in the near vicinity. Ma et al. [194] extended their previous
tion key from wireless sensor network. This pre-distribution work [193] to exploit the interference generated by D2D trans-
scheme helps D2D in selecting the encryption key from a pool mitter. Analytical results and weak performance criterion were
of keys owned and managed by eNB. The key information is derived to find the secrecy regions. However, mode selection
embedded into the subfield of the beacon frames and broadcast was preset and non-colluding eavesdroppers were considered
to the network. in the system model. Ouyang et al. [214] provided maxi-
The importance of Artificial Noise (AN) in the area of phys- mal ratio transmission strategy along with power allocation
ical layer security is enormous. In fact, it is the AN that schemes to provide link security during D2D communication
if added in a controlled manner, will make the whole dif- from a friendly jammer. Subsequently, Wang et al. [160], [215]
ference between the way signal is interpreted at legitimate provide friendly jammer selection method and derive upper
receiver and eavesdropper. The magnitude of AN that adds and lower bounds of power allocation an illustration is shown
to the signal therefore distribution of this AN is an impor- in Fig. 11. Here, M eavesdroppers listen the legitimate com-
tant concerns. It may be noted that in ideal case, the power munication between transmitting and receiving device through
to transmit signal should be minimized, however, in order to wiretap link. In order to deteriorate the reception of these
secure the message, additional power is added in the form eavesdroppers, N helper/ jammer nodes transmit jamming

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
JAMEEL et al.: SURVEY OF D2D COMMUNICATIONS: RESEARCH ISSUES AND CHALLENGES 2155

TABLE X
S OCIAL R ELATIONSHIP FACTORS B ETWEEN D EVICES [221]

signals over the jamming link which cause large decoding Mishra and Pandey [220] presented a trust-based relay node
errors at the eavesdroppers. selection scheme. The trust value at each node is calculated by
Jung et al. [216] proposed a communication protocol to taking into consideration past experience (such as successful
overcome the issue of secure routing in D2D ad-hoc communi- delivery of messages and decoding errors at relay) from direct
cation by integrating group key agreement and routing control interactions and knowledge from other users. Each node main-
information. The group key agreement procedure is initiated tains a trust table of all of its neighbors and selects a relay
whenever a new node joins the network or when two networks node based on updated trust values in the device reputation
merge. Each node in the network is authorized by a certificate table. The trust values are calculated based on three param-
authority. Each new node joining the network is provided the eters namely, SNR, energy, buffer capacity and reliability of
group key upon successful authentication. The group key is device. The relay selection is then divided into two cases:
used to secure group routing messages. Each group key has a 1) Relay selection with two parameters, 2) Relay selection
validity time after which the group key agreement process is with the combination of three parameters.
re-initiated. Ometov et al. [221] proposed a social-based trust com-
Panaousis et al. [217] proposed a secure message deliv- putation scheme that divides different social features in two
ery protocol to discover route with the shortest path and the classes namely: user-based and device-based social features.
lowest security risk in D2D ad-hoc communication. The selec- The authors introduced different social features such as human
tion of the most secure route is made not only by detecting social relationship, market pricing relationship, co-location
malicious messages for every route but also by taking into object relationship, co-work object relationship that are par-
consideration the QoS and the energy cost. Route and device ticularly relevant to D2D communications. A brief description
configuration matrices are used to support authentication and of these social features and their corresponding values are pro-
non-repudiation security requirements. Route dependability vided in table X. The authors proposed a weighted function
and availability are supported through QoS, energy cost, and that considers both classes of social features. The functions
risk management. behavior depends on the weights that are assigned. Higher
Two group anonymous authentication and key exchange weights can be assigned to either user-based social metrics
protocols are proposed for both network covered and network or device-based metrics depending on the requirements of a
absent D2D communications in [218]. In the first scenario, particular application.
different UEs authenticate each other with group information
regarding public safety services provided by the core network
whereas in the second scenario, the k-anonymity secret hand- B. Open Research Issues in D2D Security and Privacy
shake scheme, public key encryption and zero-knowledge Based on the security issues we have identified above, next
proof are used to provide group anonymous authentication. we present some research challenges for D2D security that
The group anonymous protocol supports revocability and need to be addressed in the future.
traceability to revoke and expose the identity of malicious 1) Balancing Security-Energy Tradeoff: For resource-
D2D user. The zero-knowledge prover computes the random constrained D2D devices, it is not beneficial to use security
number generated by the Authentication Center (AuC) or the techniques that consume a lot of energy. As a result, energy-
Home Subscriber Server (HSS) and compares it with the num- efficient secure protocols must be developed in order to
ber generated by secure hash function. By comparing these ensure optimal usage of the devices’ resources. Cryptographic
two numbers, identity of suspicious D2D users are detected. schemes (for message integrity and authentication) often rely
Sun et al. [219] proposed a privacy preserving spatiotempo- on the complexity of key generation. This complexity in
ral scheme. Spatiotemporal matching is based on the location algorithm results in high energy consumption and increased
of D2D devices. The spatiotemporal profile of each device hardware complexity. It is worthwhile to note that the energy
is maintained by keeping track of the devices’ whereabouts. cost of asymmetric key generation algorithms is highest, fol-
The spatiotemporal profile matching of two devices determines lowed by symmetric key generation and hash algorithms [222].
the mutual level of trust. Devices with similar spatiotempo- This proves that using only one type of algorithms for provi-
ral profiles are more likely to stay longer within each other’s sioning of security and privacy may not be a suitable approach
transmission range. from energy point of view. Therefore, research efforts should

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2156 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

be focused towards hybrid protocols which can be used where several devices want to communicate within a
for dynamic selection of algorithms based on the network cell, the D2D pairs with largest information value can
conditions. be chosen to optimize network performance.
2) Non-Repudiation: Non-repudiation is critical for ensur- • Information gain (which is the difference between value
ing data integrity inside the D2D network. However, current of information and the cost of collecting that information)
efforts on D2D communication lack complete security archi- can be maximized for D2D networks.
tecture for user and device authentication. Moreover, mobile
nodes leaving and joining the network need to cooperate with B. Issue of Information’s Price
existing network members to optimize the performance of
After determining the value of information, the next step is
network. More specifically, there is need to develop a scal-
assigning it a price tag. Information, like other tangible things,
able and flexible authentication framework that can support
can be treated as goods which can be sold in the market. There
fast authentication of mobile devices and users as they join or
are several characteristics of information as an economic good
leave the network. A suitable trust management and authenti-
which we describe below:
cation system will help in securing data of existing members
• There are different levels of cost. For instance, the
of the network.
fixed cost incurred from the deployment and system
3) Lack of Standardization: There are no standards and
design is usually higher than the variable cost of main-
global policies to ensure secure interaction of D2D user
tenance, distribution and reproductions of information.
equipment. Moreover, authentication mechanism for different
D2D is considered to be a cost effective solution because
applications could vary which makes it difficult to ensure inter-
the deployment cost is minimal as it uses the existing
operability. Therefore, a standard document is required that
infrastructure.
addresses issues such as procedure for secure user interaction
• Quality dependency is another aspect when it comes to
with a particular application, amount of data users need to
pricing the information. Different consumers value the
share for ensuring privacy and security information database
information differently which depends on the quantity,
management. These issues become even more critical espe-
quality, and reputation (reliability of information source).
cially in the decentralized D2D communication environment.
• Different sets of information can be combined together
4) Decentralized Anonymity Schemes: The opportunistic,
to enhance the value of information. For instance, a D2D
self-organizing and peer-to-peer nature of D2D communi-
relay can broadcast the video with different resolutions
cations, require anonymity schemes that are not dependent
based on the incentive provided to it.
on centralized third parties. Further, these schemes need to
• Timing and the amount of information are also important
address the issue of anonymity abuse in the absence of a sin-
aspects of information economics. Both transaction-based
gle trusted center. There exist some proposals of distributed
and subscription-based pricing models exist which pro-
privacy schemes in adhoc and vehicular networks [223], [224],
vide access to services and information at different time
but so far this issue has not been fully explored in the context
and rates. For instance, a subscription-based pricing
of D2D communications.
model would be suitable for streaming the video among
devices.
VIII. E CONOMIC A SPECTS OF D2D C OMMUNICATIONS
This section discusses various issues of D2D commu- C. Review of Incentive-Based Solutions for D2D
nications with respect to economics. First, we look at Communications
various aspects of information economics such as the
The economic features of D2D communications are dif-
importance of information and the price of information. Then,
ferent from the conventional cellular networks. Moreover,
we provide review of recent works on incentive-based D2D
due to existence of CUEs and DUEs within the same cells,
communications.
competition is inevitable. The unique characteristics of D2D
communications make it difficult to determine an appropriate
A. Importance of Information optimization technique for them. Therefore, the optimization
Gathering information is an important aspect of economic techniques adopted for cellular networks may not be suit-
models. Specifically, the information is used for making deci- able for D2D communications. Additionally, the complex
sions about a particular device in the network. Moreover, the interaction of devices allows them to adapt their choices
decision about whether or not a particular resource needs to be according to the network requirements, which is difficult to
assigned to an entity in the network, is generally made based model using existing economic models. Game theory has
on the given information about that entity. Depending on the recently offered several solutions to analyze, model and design
quality of information, the value of information can be nega- the competitive situations between DUEs and CUEs. It is
tive, zero, or positive. The value of this information helps the worth pointing out that in game theory, prices are fictitious and
system design in the following ways: used to control and coordinate the transmission of information
• An optimal decision to maximize the payoff can be made in the network. In other words, the prices in game-theoretic
if the knowledge of system states is available. models are system parameters, but they do have economic
• An optimal information source can be selected among interpretations. Some of the recent incentive based solutions
many sources. For instance, in D2D communications are discussed below.

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
JAMEEL et al.: SURVEY OF D2D COMMUNICATIONS: RESEARCH ISSUES AND CHALLENGES 2157

1) Non-Cooperative Solutions: In this type of game, the increased when the players of the game cooperate with each
DUEs are commonly competing for resources and can be other.
viewed as players. Huang et al. [225] investigated the resource The problem of resource allocation in large-scale D2D
allocation issue when a DUE is located at the edge of two networks was investigated in [235]. Specifically, the authors
cells. With the help of a non-cooperative Cournot game, they addressed the resource allocation problem among CUEs and
were able to mitigate the inter-cell interference. The authors DUEs by using a coalition game. As a result, it was found that
considered three possible scenarios: the sum rate can be improved from 20% to 65%. However,
• CUEs in both cells use UL resources. they only considered single-cell scenarios and analyzed intra-
• CUEs in both cells use DL resources. cell interference.
• CUEs in one cell use DL while the CUEs in the other Wu et al. [237] investigated the problem of uplink resource
cell use UL resources. sharing in D2D communications. The authors proposed a
Based on the concept of leaders and followers, non-transferable coalition game for D2D multimedia commu-
Wang et al. [226] used the Stackelberg game to optimize the nications. The energy efficiency and the cost (in terms of
allocation of resources. The CUEs were considered as the mutual interferences) were considered for the players coop-
leaders while the DUEs were assumed to be the followers in eration, which considerably improved the performance of
the game. The leaders own the channel resources and charge networks as compared to other state-of-the-art solutions.
some fee if any follower requires the resources. The same 3) Auction-Based Solutions: The auction-based games uti-
authors extended their work in [129], by incorporating D2D lize the concept of buyers and sellers to address the resource
sum rate with the Stackelberg game. allocation issues. In particular, Xu et al. [238] proposed a
In a similar work, Liu et al. [227] modeled interactions resource allocation method which was inspired by the sequen-
between D2D-tier and cellular-tier using the Stackelberg game. tial second price auction scheme. Spectrum resources were
They also noted that the relationship between a BS and DUEs auctioned by the pairs in sequence which also improved the
is similar to the hierarchical (leader/follower) structure. The user fairness.
authors proposed to maximize their profit using tolerance mar- Xu et al. [238] extended their work in [239] by propos-
gin. It was shown that the minimum exchange of information ing an iterative combinatorial auction technique which allows
is required when using uniform pricing algorithm. efficient allocation of DL resources in D2D networks. More
Due to the increase in the number of multimedia files, specifically, the bidders are allowed to submit multiple bids
traditional link capacity improvements methods are not suf- and ask the prices in each auction round. The D2D links
ficient. Therefore, Wang et al. [228] explored the behaviors of act as goods and by assigning these links to appropriate
people for buying and selling online videos in the D2D com- bidders the sum rate utility function is maximized. Similar
munications environment. They modeled a file competition to [239], Xu et al. [240] proposed a reverse iterative combi-
mechanism where data is managed by DUEs with mini- natorial auction scheme to maximize the sum rate in DL D2D
mum involvement of the BS. Then, they used the Stackelberg networks.
game to maximize the utility of both the buyers and sellers Islam et al. [241] proposed a two-phase auction-based
of videos. resource allocation scheme. This scheme maximizes the fair-
Based on the work of [229], [230], and Awad et al. [231] ness while simultaneously minimizing the interference. The
considered different application requirements to improve the auction-based distributed resource allocation scheme was
performance of heterogeneous D2D networks. A user-centric proposed for multi-tier D2D communications in [128]. The
association scheme was proposed and an energy-efficient solu- main emphasis was on maximizing spectral efficiency without
tion was provided using a two-stage Stackelberg game. The leaking interference in the macro-BS network. The reverse
proposed solution was compared with the exhaustive search auction mechanism for load balancing in D2D communica-
method. The authors observed that the proposed optimal algo- tions was proposed in [242] and [243]. These works analyzed
rithm requires a smaller number of iterations to adapt to improved resource management and enhanced the power con-
changes in the network. trol in D2D communications. Li et al. [244] designed a
2) Cooperative Solutions: Using social aware cooperative multi-hop communication scenario to address the comple-
games, Wang et al. [232] mitigated the cross-tier and co-tier tion among secondary service providers. The authors proposed
interferences. A resource allocation problem was formulated. an opportunistic auction scheme to minimize the uncertainty
To maximize the utility of the social group, the authors of spectrum availability. Through simulations, the authors
proposed a Social Group Utility Maximization (SGUM) showed that the opportunistic auction scheme can improve the
game [233], [234]. The results show that the SGUM solution efficiency of cognitive mesh assisted cellular network.
increases the utility up to 50%. The authors also pointed out
that the fairness was also improved as compared to random
selection and coalition game [235] solutions.
Zhang et al. [236] proposed a coalition game based resource D. Open Research Issues in Economics of D2D
allocation scheme and developed a transferable utility func- Communications
tion. Although each user intends to maximize his/her own This section discusses some challenges related to the
utility, there is an incentive in cooperating with other users. economic aspects of D2D that need to addressed in the
The authors showed that the spectrum efficiency can be future.

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2158 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

Fig. 12. Uses of D2D communications in 5G technologies.

1) Enhancing Social Welfare Performance: From an eco- IX. D2D C OMMUNICATIONS IN 5G T ECHNOLOGIES
nomic perspective, social welfare refers to the sum of Although unprecedented progress has been made in D2D
economic surplus which includes both consumer and operator communication over the last few years, there are many chal-
surplus. An efficient pricing policy for D2D communications lenges that still need to be addressed before this technology
should be aimed at improving social and Pareto-optimality. can be used for 5G networks. As illustrated in Figure 12, we
The pricing methodology needs to coordinate between dif- now discuss how D2D communication can be applied to future
ferent network entities to maximize social welfare. Service 5G technologies and applications.
pricing schemes that exploit the relationship between pric-
ing and resource management (interference and power control)
need to be further investigated to enhance the overall network A. Hyper-Dense Networks
performance as well as improve customer satisfaction and Next generation networks are expected to move from the
maximize revenues. centralized based networks to a more random and non-linear
2) Preventing Untruthful Behaviors: The BS is responsi- Heterogeneous Networks (HetNets) [245]. Private organiza-
ble for collecting all the information related to power costs, tions are likely to deploy a mixture of networks component
content availability, interference and channel gain from UEs. (including femto-cells, Road Side Units (RSUs) and Wi-
However, information communication is asymmetric and the Fi access points) in an ultra dense network environment.
BS may not be completely aware of the true situation of A dense network environment such as the one in Hetnet
a UE. A malicious/selfish UE may exploit this limitation presents different kinds of opportunities and challenges in con-
and take undue rewards from the BS by sending false infor- trast to traditional cellular networks [246]. The co-existence
mation to the BS (e.g., falsely portraying services provided of large number of devices can also be used to exploit
as a D2D transmitter). Hence there is a need for well- social networking. More specifically, trust based hyper dense
designed schemes that can prevent DUEs from any untruthful networks can be used to ensure secure exchange of information
behaviors. between devices [48] while consuming minimum resources

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
JAMEEL et al.: SURVEY OF D2D COMMUNICATIONS: RESEARCH ISSUES AND CHALLENGES 2159

of the network. The devices can also adjust themselves in found to increase the sum-rate in comparison to the sum-
way such that users demanding common content can be rate of baseline protocols. The work of [256] was extended
timely facilitated. This can resultantly ensure efficient utiliza- for limited CSI sharing and dual regularized feedback cases
tion of resources while simultaneously reducing the burden of in [257] and [258], respectively. Though these advances are
BS [247] by reducing the transmission of redundant content significant, yet problems like poor channel estimation due
to the users. Li et al. [248] exploited the social networking by to interference and the tradeoff between D2D users scaling
providing incentives to relays. It was shown that the proposed require more focused research efforts.
incentive based relaying mechanism considerably improves the
energy efficiency of D2D networks. Despite these advances, C. Energy Harvesting in D2D Communication
special attention should be provided to design issues [249] per-
The detrimental effects of exponential rise in mobile com-
taining to authentication, trust matrix formulation and mobility
munication on the atmosphere of earth have started to become
of devices in the network.
more apparent with each passing day. The prognosis pro-
Interference in Hetnets is another concerning issue. In this
vided by [259], indicates that the carbon footprint of mobile
context, interference from nearby access points and small
communications will annually increase upto 11 Mto CO2 by
networks is expected to increase exponentially which will
2020, which is equal to the carbon footprint of 2.5 million
degrade the performance of D2D users. Although network-
households in entire Europe. Although mobile communica-
coded interference cancellation schemes can be useful, these
tion footprint currently contributes a portion of global CO2,
techniques require a priori knowledge of the channel.
yet it is imperative to lessen its linear rise in the future [260].
Additionally, the practicability of power adaptation strategies
Thus, to lower this energy consumption solutions like dedi-
may also need to be re-evaluated because small interval of
cated and ambient energy harvesting have been proposed. In
coherent time can affect the power adaptive transmissions per
this regard, RF energy harvesting (i.e., storing energy via elec-
time-slot.
tromagnetic waves) has gained considerable research interest.
It is mainly due to dual nature of RF signal, i.e., ability
B. Multi User MIMO (MU-MIMO) and Massive MIMO to transfer information and power simultaneously. This is
why this technique has recently been investigated in mobile
MU-MIMO is a key technology that has been applied
networks [261], cognitive networks [262], [263] and relay
to numerous systems including LTE UL to obtain higher
assisted networks [264], [265].
user diversity gain. The integration of MU-MIMO with D2D
D2D devices are typically powered by pre-charged batteries.
can further improve spectral efficiency but it also results in
Due to the frequent transmission of messages, most of their
an increase in intra-cell and inter-cell interference. Several
energy is dissipated while transmitting and processing RF sig-
works [250] proposed resource allocation and interference
nal. These devices become idle once their batteries are fully
management schemes to achieve higher performance gains.
drained. One promising solution to address this challenge is to
However, tradeoff between performance and complexity [251]
enable these devices to harvest energy from renewable energy
can significantly increase with the integration of D2D in 5G
sources. The harvested energy can significantly improve the
MU-MIMO.
lifetime of the device and the network. Despite few pioneer-
In addition to MU-MIMO, massive MIMO techniques can
ing works [107], [186], [266] in energy harvesting aimed at
be appealing to improve the uplink reliability of D2D com-
D2D communication, research in this area is still in its infancy.
munication in cellular networks. For the case of massive
Sakr et al. [107] proposed spectrum access techniques to har-
MIMO, an antenna array of very large size is used at BS
vest RF energy for D2D DL and UL channels. In another work,
to serve multiple users in the network for given resource
Liu et al. [186] proposed power transfer techniques for a D2D
block [252]. It is ensured that channel for all the users is nearly
communication network. In particular, their proposed approach
orthogonal. This allows simple transmission or reception sig-
harvests energy from power beacons using the spectrum of the
nal processing techniques while mitigating the impact of
primary BS. Yang et al. [266] proposed an energy harvesting
interference [253], [254]. This consequently implies that using
assisted relaying protocol for mobile relays that can support
massive MIMO along with D2D for uplink communication
D2D communication. A low complexity transmission proto-
can perform close-to-zero interference using energy efficient
col was presented based on the CSI of the energy harvesting
techniques at the devices. Despite this distinctive advantage of
relays.
using massive MIMO for D2D communication, the effect of
interference for cellular-to-D2D links still exist. Specifically,
for a particular size of antenna array and increasing number D. Leveraging Other Spectrum Bands
of devices, the D2D uplink can experience considerably large In recent years, several research efforts have focused on
interference. In this regard, Yin et al. [255] performed analy- exploiting the spectrum bands which have not been used in
sis of D2D communication for cooperative feedback schemes the earlier generation of networks [267]–[269]. A promising
under Frequency Division Duplexing (FDD). It was shown that solution for the future 5G cellular network is mmWave com-
cooperative feedback schemes provide improved sum rate as munication [270]. mmWave contains a wide range of carrier
compared to non-cooperative feedback techniques. In a similar frequencies operating over the frequency band of 3-300 GHz.
work [256], Cottatellucci proposed optimal power allocation It provides short range, high bandwidth (multi-gigabits-per
algorithm for D2D aided massive MIMO systems which was second) connectivity for cellular devices. The mmWave band

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2160 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

has several desirable features which include high bandwidth, resource management schemes assuming perfect channel esti-
compatibility with directional transmissions, reasonable isola- mation cannot produce optimal performance [118]. The IEEE
tion, and dense deployment. In mmWave cellular networks, 802.11p standard which is based on Dedicated Short-Range
by using D2D communication, direct concurrent links can be Communication (DSRC) technology has been introduced to
supported, resulting in an enhanced network capacity [271]. support Intelligent Transportation System (ITS) applications
Niu et al. [272] discussed challenges of implementation of in VANETs. However, IEEE 802.11p suffers from intermit-
mmWave technology for 5G technologies and emphasized on tent connectivity due to insufficient transmission range and
the impact of users mobility on the performance deterioration. lacks widespread deployment. In contrast LTE provides a good
However, to address this concern, Omar et al. [273] noted solution to the problem of intermittent connectivity due to the
that directional antennas would be needed for successful inte- high mobility in VANETs [283]. However, in the case of high
gration of D2D networks underlying mmWave architecture. It vehicle density, the eNB will be overwhelmed by the large
is evident that mmWave along with D2D communication can number of safety critical beacon messages directed towards
generate significant revenue for network operators and mobile it. In such scenarios it may be more feasible for vehicles to
service providers [274], yet the high absorption rate and pro- directly communicate with each other rather than through the
long exposure to mmWave can be detrimental for human race. eNB. In this regard, the schemes developed for D2D commu-
In this backdrop, Gapeyenko et al. [274], while emphasiz- nication have emerged as strong contender for provisioning of
ing on blockage of mmWave transmission in highly populated reliable and secure V2V communication. As a partial solu-
areas and its impact on human health, suggested to conform tion, Sun et al. [284] provide power control and resource
the mmWave technology with the predefined regulations/ stan- allocation scheme for V2V communication while schemes for
dards of FCC. However, mmWave technology also suffers optimization of data rates and minimization of latency were
from certain limitations which include: coverage, capacity and proposed in [285]. D2D links can also be utilized to develop
QoS guarantees. mmWave suffers from high propagation loss communication links between futuristic autonomous vehicles
which needs to be compensated by high gain with directional as a mean of failure recovery mechanism [286]. Specifically,
antennas. this setup can act as adhoc network for provisioning of services
The mmWave channels suffer from significant attenua- where the backhaul cellular media is not available. However,
tion due to inability of short mmWave band wavelengths to more efforts are required in the domain of standardization
diffract around obstacles. Interruption in Line of Sight (LoS) to materialize this useful concept. Undoubtedly, D2D offers
communication due to a moving obstacle can cause link out- an opportunity to utilize the radio interface to directly com-
age. Furthermore, limited penetration capability could restrict municate between devices in a vehicular network with low
mmWave connectivity to a confined space. For example out- end-to-end delay and high reliability [287]. This is particularly
door mmWave signals may be confined to outdoor structures useful because VANETs depend on real-time information and
such as car park or street and limited signals may pene- D2D communication can provide significant benefits without
trate inside buildings [275]. In view of capacity enhancements negatively affecting the cellular network [288].
offered by mmWave in D2D networks, it is required that more
research efforts be aligned to optimize the design of hardware
interfaces and to minimize the hazardous effect of mmWave F. IoT Communication
transmission. In this regard, hybrid RF/mmWave for point- Rapid developments in IoT technologies have opened up
to-point and multi-point communications can be exploited to many opportunities with respect to energy management and
mitigate the effects of mmWave. Similar to mmWave, Free green communication [289]. IoT includes different type of
Space Optical (FSO) communication [276] is also expected to communication architectures such as D2D, human to device,
provide an increase in network bandwidth. However, as with and device to human. In this context, communication between
mmWave, FSO also faces challenges such as heavy rain and devices can be either intra-domain or inter-domain for hetero-
fog. The performance of FSO quickly degrades in non-LOS geneous networks [290]. The D2D networks have close resem-
conditions [276], [277]. In the GHz band, D2D communica- blance to future IoT networks. Particularly, D2D networks are
tion can be used to forward data at higher rates which can considered to be an integral part of wider concept of IoT
also reduce delays and drainage of current spectrum bands. implementation. Furthermore, D2D communication in IoT can
significantly improve the robustness of applications and con-
nectivity among IoT devices [291]. It is, therefore, necessary
E. Vehicular Ad-Hoc Network that the deployment of D2D networks be made compatible
In VANETs a large number of safety and warning mes- with the requirements/ protocols of IoT [292]. However, owing
sages are exchanged among vehicles and between the vehi- to lack of standardization, the wide spread implementation of
cles and RSUs [278]–[280]. But high mobility of vehicles, IoT and subsequently D2D integration with IoT is still a far
dynamic road topologies, high multi-path fading, collisions cry [293], [294]. In a multi-node scenario, the communica-
due to hidden node etc. are challenges for reliable VANET tion between devices can be single hop or multiple hops. For
communications [281], [282]. The variations in shadow- single-hop communication, network infrastructure such as BS
ing and fading are more prevalent in Vehicle-to-Vehicle or access point is used. In case of multi-hop communication,
(V2V) communication as compared to D2D communica- inter-device communication is used to enable end-to-end com-
tions, especially in densely populated urban environments. The munication between the transmitting device and the receiving

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
JAMEEL et al.: SURVEY OF D2D COMMUNICATIONS: RESEARCH ISSUES AND CHALLENGES 2161

device [295]. Since IoT applications require global access to [11] L. Al-Kanj, H. V. Poor, and Z. Dawy, “Optimal cellular offloading via
the wireless channel, efficient wireless access mechanism need device-to-device communication networks with fairness constraints,”
IEEE Trans. Wireless Commun., vol. 13, no. 8, pp. 4628–4643,
to be developed. Moreover, IoT applications require efficient Aug. 2014.
and distributed scheduling techniques at devices to provide [12] S. Wen et al., “Achievable transmission capacity of relay-assisted
flexible transmission of data. By addressing these aforemen- device-to-device (D2D) communication underlay cellular networks,”
in Proc. 78th Veh. Technol. Conf. (VTC Fall), Las Vegas, NV, USA,
tioned issues, D2D communication can be leveraged as a vital 2013, pp. 1–5.
technology for future IoT communications. [13] S. Doumiati, H. Artail, and D. M. Gutierrez-Estevez, “A framework
for LTE-A proximity-based device-to-device service registration and
discovery,” Procedia Comput. Sci., vol. 34, pp. 87–94, Dec. 2014.
X. C ONCLUSION [14] C. Vitale, V. Mancuso, and G. Rizzo, “Modelling D2D communica-
tions in cellular access networks via coupled processors,” in Proc. 7th
D2D communication is expected to provide many bene- Int. Conf. Commun. Syst. Netw. (COMSNETS), Bengaluru, India, 2015,
fits over conventional cellular networks. D2D communication pp. 1–8.
shows great promise as one of the most promising and favor- [15] G. Fodor et al., “Design aspects of network assisted device-to-device
able paradigms for future networks. In this survey, we have communications,” IEEE Commun. Mag., vol. 50, no. 3, pp. 170–177,
Mar. 2012.
provided a detailed review of existing D2D technologies along [16] Y. Pei and Y.-C. Liang, “Resource allocation for device-to-device
with its various characteristics such as device discovery, mode communications overlaying two-way cellular networks,” IEEE Trans.
selection, resource management, mobility management and Wireless Commun., vol. 12, no. 7, pp. 3611–3621, Jul. 2013.
[17] B. Zhou, H. Hu, S.-Q. Huang, and H.-H. Chen, “Intracluster device-to-
security. This paper has also demonstrated the advantages of device relay algorithm with optimal resource utilization,” IEEE Trans.
D2D in forthcoming 5G technologies. Although D2D com- Veh. Technol., vol. 62, no. 5, pp. 2315–2326, Jun. 2013.
munication is a relatively new idea, but significant amount of [18] A. Asadi, Q. Wang, and V. Mancuso, “A survey on device-to-device
communication in cellular networks,” IEEE Commun. Surveys Tuts.,
research in D2D has recently opened up a range of related vol. 16, no. 4, pp. 1801–1819, 4th Quart., 2014.
research issues that should be investigated in the future. This [19] R. Alkurd, R. M. Shubair, and I. Abualhaol, “Survey on device-to-
survey will help future readers better understand the D2D con- device communications: Challenges and design issues,” in Proc. IEEE
cepts and technologies and enable them to have a good grasp 12th Int. New Circuits Syst. Conf. (NEWCAS), 2014, pp. 361–364.
[20] J. Liu, N. Kato, J. Ma, and N. Kadowaki, “Device-to-device communi-
of future research opportunities that have been identified in cation in LTE-advanced networks: A survey,” IEEE Commun. Surveys
the field of D2D communication. Tuts., vol. 17, no. 4, pp. 1923–1940, 4th Quart., 2015.
[21] P. Mach, Z. Becvar, and T. Vanek, “In-band device-to-device communi-
cation in OFDMA cellular networks: A survey and challenges,” IEEE
ACKNOWLEDGMENT Commun. Surveys Tuts., vol. 17, no. 4, pp. 1885–1922, 4th Quart.,
2015.
The authors thank the anonymous reviewers for their valu- [22] M. Noura and R. Nordin, “A survey on interference management
able comments and suggestions which helped us to improve for device-to-device (D2D) communication and its challenges in 5G
the content, organization and presentation of this paper. networks,” J. Netw. Comput. Appl., vol. 71, pp. 130–150, Aug. 2016.
[23] P. Gandotra and R. K. Jha, “Device-to-device communication in cellular
networks,” J. Netw. Comput. Appl., vol. 71, pp. 99–117, Aug. 2016.
R EFERENCES [24] M. Haus et al., “Security and privacy in device-to-device (D2D) com-
munication: A review,” IEEE Commun. Surveys Tuts., vol. 19, no. 2,
[1] T. Nakamura et al., “Trends in small cell enhancements in LTE pp. 1054–1079, 2nd Quart., 2017.
advanced,” IEEE Commun. Mag., vol. 51, no. 2, pp. 98–105, Feb. 2013. [25] M. Wang and Z. Yan, “A survey on security in D2D communications,”
[2] E. Hossain and M. Hasan, “5G cellular: Key enabling technologies Mobile Netw. Appl., vol. 22, no. 2, pp. 195–208, 2017.
and research challenges,” IEEE Instrum. Meas. Mag., vol. 18, no. 3, [26] B. Zhou, S. Ma, J. Xu, and Z. Li, “Group-wise channel sensing and
pp. 11–21, Jun. 2015. resource pre-allocation for LTE D2D on ISM band,” in Proc. Wireless
[3] A. Pattavina, S. Quadri, and V. Trecordi, “Spectral efficiency improve- Commun. Netw. Conf. (WCNC), Shanghai, China, 2013, pp. 118–122.
ment of enhanced assignment techniques in cellular networks,” in Proc.
[27] L. Lei, Z. Zhong, C. Lin, and X. Shen, “Operator controlled device-
Glob. Telecommun. Conf., vol. 2. London, U.K., 1996, pp. 1031–1035.
to-device communications in LTE-advanced networks,” IEEE Wireless
[4] S. F. Yunas, T. Isotalo, J. Niemelä, and M. Valkama, “Impact of
Commun., vol. 19, no. 3, pp. 96–104, Jun. 2012.
macrocellular network densification on the capacity, energy and cost
efficiency in dense urban environment,” Int. J. Wireless Mobile Netw., [28] Q. Wang and B. Rengarajan, “Recouping opportunistic gain in dense
vol. 5, no. 5, pp. 99–118, 2013. base station layouts through energy-aware user cooperation,” in Proc.
[5] D. Feng et al., “Device-to-device communications underlaying cellu- IEEE Int. Symp. Workshops World Wireless Mobile Multimedia Netw.
lar networks,” IEEE Trans. Commun., vol. 61, no. 8, pp. 3541–3551, (WoWMoM), Madrid, Spain, 2013, pp. 1–9.
Aug. 2013. [29] S. Andreev, A. Pyattaev, K. Johnsson, O. Galinina, and Y. Koucheryavy,
[6] Y.-D. Lin and Y.-C. Hsu, “Multihop cellular: A new architecture for “Cellular traffic offloading onto network-assisted device-to-device con-
wireless communications,” in Proc. INFOCOM Annu. Joint Conf. IEEE nections,” IEEE Commun. Mag., vol. 52, no. 4, pp. 20–31, Apr. 2014.
Comput. Commun. Soc., vol. 3, 2000, pp. 1273–1282. [30] N. P. Kuruvatti et al., “Robustness of location based D2D resource
[7] P. Jänis et al., “Device-to-device communication underlaying cellular allocation against positioning errors,” in Proc. IEEE 81st Veh. Technol.
communications systems,” Int. J. Commun. Netw. Syst. Sci., vol. 2, Conf. (VTC Spring), Glasgow, U.K., 2015, pp. 1–6.
no. 3, pp. 169–247, 2009. [31] X. Chen, B. Proulx, X. Gong, and J. Zhang, “Exploiting social ties for
[8] K. Doppler, C.-H. Yu, C. B. Ribeiro, and P. Janis, “Mode selec- cooperative D2D communications: A mobile social networking case,”
tion for device-to-device communication underlaying an LTE-advanced IEEE/ACM Trans. Netw., vol. 23, no. 5, pp. 1471–1484, Oct. 2015.
network,” in Proc. Wireless Commun. Netw. Conf., Sydney, NSW, [32] F. Jameel, Faisal, M. A. A. Haider, and A. A. Butt, “Robust localization
Australia, 2010, pp. 1–6. in wireless sensor networks using RSSI,” in Proc. Int. Conf. Emerg.
[9] M. Usman, A. A. Gebremariam, U. Raza, and F. Granelli, “A software- Technol. (ICET), Dec. 2017, pp. 1–6.
defined device-to-device communication architecture for public safety [33] I. O. Nunes, C. Celes, I. Nunes, P. O. V. de Melo, and A. A. F. Loureiro,
applications in 5G networks,” IEEE Access, vol. 3, pp. 1649–1654, “Combining spatial and social awareness in D2D opportunistic rout-
2015. ing,” IEEE Commun. Mag., vol. 56, no. 1, pp. 128–135, Jan. 2018.
[10] G. Piro et al., “D2D in LTE vehicular networking: System model [34] B. Ying and A. Nayak, “A power-efficient and social-aware relay
and upper bound performance,” in Proc. 7th Int. Congr. Ultra Modern selection method for multi-hop D2D communications,” IEEE Commun.
Telecommun. Control Syst. Workshops (ICUMT), 2015, pp. 281–286. Lett., to be published.

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2162 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

[35] H. Frank and F. Katz, Cooperation in Wireless Networks: Principles [60] J. Seo, K. Cho, W. Cho, G. Park, and K. Han, “A discovery scheme
and Applications: Real Egoistic Behavior is to Cooperate! New York, based on carrier sensing in self-organizing Bluetooth low energy
NY, USA: Springer-Verlag, 2006. networks,” J. Netw. Comput. Appl., vol. 65, pp. 72–83, Apr. 2016.
[36] F. Fitzek, G. Schulte, and M. Reisslein, “System architecture for billing [61] L. Bracciale, P. Loreti, and G. Bianchi, “The sleepy bird catches more
of multi-player games in a wireless environment using GSM/UMTS worms: Revisiting energy efficient neighbor discovery,” IEEE Trans.
and WLAN services,” in Proc. 1st Workshop Netw. Syst. Support Mobile Comput., vol. 15, no. 7, pp. 1812–1825, Jul. 2016.
Games, 2002, pp. 58–64. [62] K. Kushalad, M. Sarkar, and P. Patel, “Asynchronous device discovery
[37] F. H. P. Fitzek, M. Katz, and Q. Zhang, “Cellular controlled short- and rendezvous protocol for D2D communication,” in Proc. IEEE Conf.
range communication for cooperative P2P networking,” Wireless Pers. Comput. Commun. Workshops (INFOCOM WKSHPS), San Francisco,
Commun., vol. 48, no. 1, pp. 141–155, 2009. CA, USA, 2016, pp. 199–200.
[38] H. Cao, V. Leung, C. Chow, and H. Chan, “Enabling technologies for [63] L. Chen, Y. Li, and A. V. Vasilakos, “Oblivious neighbor discovery for
wireless body area networks: A survey and outlook,” IEEE Commun. wireless devices with directional antennas,” in Proc. IEEE Int. Conf.
Mag., vol. 47, no. 12, pp. 84–93, Dec. 2009. Comput. Commun., San Francisco, CA, USA, 2016, pp. 1–9.
[39] (2020). METIS-II: Mobile and Wireless Communications Enablers [64] X. Lin, L. Jiang, and J. G. Andrews, “Performance analysis of
for Twenty-Twenty. Accessed: Apr. 5, 2018. [Online]. Available: asynchronous multicarrier wireless networks,” IEEE Trans. Commun.,
https://metis-ii.5g-ppp.eu/ vol. 63, no. 9, pp. 3377–3390, Sep. 2015.
[40] Cellular Network based Device-to-Device Wireless [65] R. Pozza et al., “CARD: Context-aware resource discovery for
Communications. Accessed: May 4, 2018. [Online]. Available: mobile Internet of Things scenarios,” in Proc. IEEE 15th Int. Symp.
https://cordis.europa.eu/project/rcn/186734_en.html World Wireless Mobile Multimedia Netw. (WoWMoM), Sydney, NSW,
[41] Wireless Innovation Between Finland and U.S. Accessed: May 4, 2018. Australia, 2014, pp. 1–10.
[Online]. Available: http://www.wifius.org/ [66] Q. Wei, F. L. Lewis, Q. Sun, P. Yan, and R. Song, “Discrete-time
[42] WiFiUS: Device-to-Device Communications at Millimeter-Wave deterministic Q-learning: A novel convergence analysis,” IEEE Trans.
Frequencies. Accessed: May 4, 2018. [Online]. Available: Cybern., vol. 47, no. 5, pp. 1224–1237, May 2017.
http://grantome.com/grant/NSF/CNS-1457340# [67] Q. Wei, R. Song, B. Li, and X. Lin, “A novel policy iteration-based
[43] M. Seyedebrahimi et al., “A centralised Wi-Fi management framework deterministic Q-learning for discrete-time nonlinear systems,” in Self-
for D2D communications in dense Wi-Fi networks,” in Proc. Conf. Learning Optimal Control of Nonlinear Systems. Singapore: Springer,
Stand. Commun. Netw. (CSCN), Berlin, Germany, 2016, pp. 1–6. 2017, pp. 85–109.
[44] W. Shen, B. Yin, X. Cao, L. X. Cai, and Y. Cheng, “Secure device-to- [68] H.-B. Li, R. Miura, and F. Kojima, “Channel access proposal for
device communications over WiFi direct,” IEEE Netw., vol. 30, no. 5, enabling quick discovery for D2D wireless networks,” in Proc. IEEE
pp. 4–9, Sep./Oct. 2016. Int. Conf. Comput. Netw. Commun. (ICNC), Santa Clara, CA, USA,
[45] S. Mumtaz and J. Rodriguez, Smart Device to Smart Device 2017, pp. 1012–1016.
Communication. Cham, Switzerland: Springer, 2014. [69] C. Campolo, A. Molinaro, A. Vinel, N. Lyamin, and M. Jonsson,
“Service discovery and access in vehicle-to-roadside multi-channel
[46] K. Doppler, C. B. Ribeiro, and J. Kneckt, “Advances in D2D com-
VANETs,” in Proc. IEEE Int. Conf. Commun. Workshop (ICCW),
munications: Energy efficient service and device discovery radio,” in
London, U.K., 2015, pp. 2477–2482.
Proc. 2nd Int. Conf. Wireless Commun. Veh. Technol. Inf. Theory
[70] Z. Li, “COAST: A connected open platform for smart objects,” in Proc.
Aerosp. Electron. Syst. Technol. (Wireless VITAE), 2011, pp. 1–6.
IEEE 2nd Int. Conf. Inf. Commun. Technol. Disaster Manag. (ICT-DM),
[47] H. Tang, Z. Ding, and B. C. Levy, “Enabling D2D communications
Rennes, France, 2015, pp. 166–172.
through neighbor discovery in LTE cellular networks,” IEEE Trans.
[71] A. Prasad, A. Kunz, G. Velev, K. Samdanis, and J. Song, “Energy-
Signal Process., vol. 62, no. 19, pp. 5157–5170, Oct. 2014.
efficient D2D discovery for proximity services in 3GPP LTE-advanced
[48] B. Zhang, Y. Li, D. Jin, P. Hui, and Z. Han, “Social-aware peer dis-
networks: ProSe discovery mechanisms,” IEEE Veh. Technol. Mag.,
covery for D2D communications underlaying cellular networks,” IEEE
vol. 9, no. 4, pp. 40–50, Dec. 2014.
Trans. Wireless Commun., vol. 14, no. 5, pp. 2426–2439, May 2015.
[72] A. Prasad, K. Samdanis, A. Kunz, and J. Song, “Energy efficient
[49] B. Zhang, Y. Li, D. Jin, and Z. Han, “Network science approach for device discovery for social cloud applications in 3GPP LTE-advanced
device discovery in mobile device-to-device communications,” IEEE networks,” in Proc. IEEE Symp. Comput. Commun. (ISCC), 2014,
Trans. Veh. Technol., vol. 65, no. 7, pp. 5665–5679, Jul. 2016. pp. 1–6.
[50] J. Hong, S. Park, and S. Choi, “Novel power control and collision [73] Z. Zhou, C. Gao, and C. Xu, “Joint peer discovery and resource allo-
resolution schemes for device-to-device discovery,” Peer Peer Netw. cation for social-aware D2D communications: A matching approach,”
Appl., vol. 9, no. 5, pp. 913–922, 2016. in Proc. IEEE Int. Conf. Commun. Syst. (ICCS), 2016, pp. 1–6.
[51] X. Lin, J. Andrews, A. Ghosh, and R. Ratasuk, “An overview of 3GPP [74] R. Wang, H. Yang, H. Wang, and D. Wu, “Social overlapping
device-to-device proximity services,” IEEE Commun. Mag., vol. 52, community-aware neighbor discovery for D2D communications,” IEEE
no. 4, pp. 40–48, Apr. 2014. Wireless Commun., vol. 23, no. 4, pp. 28–34, Aug. 2016.
[52] W. Lee, J. Kim, and S.-W. Choi, “New D2D peer discovery scheme [75] K. Wang, X. Mao, and Y. Liu, “BlindDate: A neighbor discovery pro-
based on spatial correlation of wireless channel,” IEEE Trans. Veh. tocol,” IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 4, pp. 949–959,
Technol., vol. 65, no. 12, pp. 10120–10125, Dec. 2016. Apr. 2015.
[53] F. Baccelli et al., “On the design of device-to-device autonomous dis- [76] F. Tian et al., “Pure asynchronous neighbor discovery algorithms
covery,” in Proc. IEEE Int. Conf. Commun. Syst. Netw. (COMSNETS), in ad hoc networks using directional antennas,” in Proc. IEEE
Bengaluru, India, 2012, pp. 1–9. Glob. Commun. Conf. (GLOBECOM), Atlanta, GA, USA, 2013,
[54] L. Wang and H. Wu, “Fast pairing of device-to-device link underlay pp. 498–503.
for spectrum sharing with cellular users,” IEEE Commun. Lett., vol. 18, [77] A. Arcia-Moret, A. Sathiaseelan, A. Araujo, J. Aguilar, and L. Molina,
no. 10, pp. 1803–1806, Oct. 2014. “Assisted network discovery for next generation wireless networks,” in
[55] S. M. Alamouti and A. R. Sharafat, “Resource allocation for energy- Proc. IEEE Annu. Consum. Commun. Netw. Conf. (CCNC), Las Vegas,
efficient device-to-device communication in 4G networks,” in Proc. Int. NV, USA, 2016, pp. 800–801.
Symp. Telecommun. (IST), Tehran, Iran, 2014, pp. 1058–1063. [78] S. B. Seo, J. Y. Kim, and W. S. Jeon, “Robust and fast device dis-
[56] K. J. Zou et al., “Proximity discovery for device-to-device communi- covery in OFDMA-based cellular networks for disaster environment,”
cations over a cellular network,” IEEE Commun. Mag., vol. 52, no. 6, in Proc. IEEE 18th Int. Conf. Adv. Commun. Technol. (ICACT), 2016,
pp. 98–107, Jun. 2014. pp. 498–502.
[57] X. Wu et al., “FlashLinQ: A synchronous distributed scheduler for [79] M. Ruta, F. Scioscia, and E. Di Sciascio, “A mobile matchmaker for
peer-to-peer ad hoc networks,” IEEE/ACM Trans. Netw., vol. 21, no. 4, resource discovery in the ubiquitous semantic Web,” in Proc. IEEE Int.
pp. 1215–1228, Aug. 2013. Conf. Mobile Services (MS), New York, NY, USA, 2015, pp. 336–343.
[58] C. Drula, C. Amza, F. Rousseau, and A. Duda, “Adaptive energy con- [80] C. Xu, C. Gao, Z. Zhou, Z. Chang, and Y. Jia, “Social network-based
serving algorithms for neighbor discovery in opportunistic Bluetooth content delivery in device-to-device underlay cellular networks using
networks,” IEEE J. Sel. Areas Commun., vol. 25, no. 1, pp. 96–107, matching theory,” IEEE Access, vol. 5, pp. 924–937, 2017.
Jan. 2007. [81] D. Xenakis, M. Kountouris, L. Merakos, N. Passas, and C. Verikoukis,
[59] A. Vigato, L. Vangelista, C. Measson, and X. Wu, “Joint discovery in “Performance analysis of network-assisted D2D discovery in random
synchronous wireless networks,” IEEE Trans. Commun., vol. 59, no. 8, spatial networks,” IEEE Trans. Wireless Commun., vol. 15, no. 8,
pp. 2296–2305, Aug. 2011. pp. 5695–5707, Aug. 2016.

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
JAMEEL et al.: SURVEY OF D2D COMMUNICATIONS: RESEARCH ISSUES AND CHALLENGES 2163

[82] X. Lin, J. G. Andrews, and A. Ghosh, “Spectrum sharing for device- [102] Y. Liu, R. Wang, and Z. Han, “Interference-constrained pricing for D2D
to-device communication in cellular networks,” IEEE Trans. Wireless networks,” IEEE Trans. Wireless Commun., vol. 16, no. 1, pp. 475–486,
Commun., vol. 13, no. 12, pp. 6727–6740, Dec. 2014. Jan. 2017.
[83] H. ElSawy, E. Hossain, and M.-S. Alouini, “Analytical modeling of [103] P. Cheng, L. Deng, H. Yu, Y. Xu, and H. Wang, “Resource alloca-
mode selection and power control for underlay D2D communica- tion for cognitive networks with D2D communication: An evolutionary
tion in cellular networks,” IEEE Trans. Commun., vol. 62, no. 11, approach,” in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC),
pp. 4147–4161, Nov. 2014. Shanghai, China, 2012, pp. 2671–2676.
[84] J. Ye and Y. J. Zhang, “A guard zone based scalable mode selection [104] S. Wen, X. Zhu, Z. Lin, X. Zhang, and D. Yang, “Optimization of
scheme in D2D underlaid cellular networks,” in Proc. IEEE Int. Conf. interference coordination schemes in device-to-device(D2D) commu-
Commun. (ICC), London, U.K., 2015, pp. 2110–2116. nication,” in Proc. IEEE 7th Int. ICST Conf. Commun. Netw. China
[85] D. Marshall, S. Durrani, J. Guo, and N. Yang, “Performance com- (CHINACOM), 2012, pp. 542–547.
parison of device-to-device mode selection schemes,” in Proc. IEEE [105] N. Lee, X. Lin, J. G. Andrews, and R. W. Heath, “Power control for
26th Annu. Int. Symp. Pers. Indoor Mobile Radio Commun. (PIMRC), D2D underlaid cellular networks: Modeling, algorithms, and analysis,”
Hong Kong, 2015, pp. 1536–1541. IEEE J. Sel. Areas Commun., vol. 33, no. 1, pp. 1–13, Jan. 2015.
[86] L. Lei, X. S. Shen, M. Dohler, C. Lin, and Z. Zhong, “Queuing models [106] T. Huynh, T. Onuma, K. Kuroda, M. Hasegawa, and W.-J. Hwang,
with applications to mode selection in device-to-device communica- “Joint downlink and uplink interference management for device to
tions underlaying cellular networks,” IEEE Trans. Wireless Commun., device communication underlaying cellular networks,” IEEE Access,
vol. 13, no. 12, pp. 6697–6715, Dec. 2014. vol. 4, pp. 4420–4430, 2016.
[87] C. Gao et al., “Joint mode selection, channel allocation and power [107] A. H. Sakr, H. Tabassum, E. Hossain, and D. I. Kim, “Cognitive
assignment for green device-to-device communications,” in Proc. spectrum access in device-to-device-enabled cellular networks,” IEEE
IEEE Int. Conf. Commun. (ICC), Sydney, NSW, Australia, 2014, Commun. Mag., vol. 53, no. 7, pp. 126–133, Jul. 2015.
pp. 178–183. [108] T. Yang, X. Cheng, X. Shen, S. Chen, and L. Yang, “QoS-aware
[88] M. Zulhasnine, C. Huang, and A. Srinivasan, “Efficient resource allo- interference management for vehicular D2D relay networks,” J.
cation for device-to-device communication underlaying LTE network,” Commun. Inf. Netw., vol. 2, no. 2, pp. 75–90, 2017.
in Proc. IEEE 6th Int. Conf. Wireless Mobile Comput. Netw. Commun. [109] A. Celik, R. M. Radaydeh, F. S. Al-Qahtani, and M.-S. Alouini,
(WiMob), 2010, pp. 368–375. “Resource allocation and interference management for D2D-enabled
[89] C.-H. Yu, K. Doppler, C. B. Ribeiro, and O. Tirkkonen, “Resource DL/UL decoupled Het-Nets,” IEEE Access, vol. 5, pp. 22735–22749,
sharing optimization for device-to-device communication underlaying 2017.
cellular networks,” IEEE Trans. Wireless Commun., vol. 10, no. 8, [110] W. Sun, D. Yuan, E. G. Ström, and F. Brännström, “Cluster-based
pp. 2752–2763, Aug. 2011. radio resource management for D2D-supported safety-critical V2X
[90] Z. Liu, T. Peng, S. Xiang, and W. Wang, “Mode selection for device- communications,” IEEE Trans. Wireless Commun., vol. 15, no. 4,
to-device (D2D) communication under LTE-advanced networks,” in pp. 2756–2769, Apr. 2016.
Proc. IEEE Int. Conf. Commun. (ICC), Ottawa, ON, Canada, 2012, [111] C. Yang et al., “Distributed interference and energy-aware power con-
pp. 5563–5567. trol for ultra-dense D2D networks: A mean field game,” IEEE Trans.
[91] G. Yu et al., “Joint mode selection and resource allocation for device- Wireless Commun., vol. 16, no. 2, pp. 1205–1217, Feb. 2017.
to-device communications,” IEEE Trans. Commun., vol. 62, no. 11,
[112] A. Memmi, Z. Rezki, and M.-S. Alouini, “Power control for D2D
pp. 3814–3824, Nov. 2014.
underlay cellular networks with channel uncertainty,” IEEE Trans.
[92] A. Morattab, Z. Dziong, K. Sohraby, and M. H. Islam, “An optimal
Wireless Commun., vol. 16, no. 2, pp. 1330–1343, Feb. 2017.
MIMO mode selection method for D2D transmission in cellular
[113] H. Xu et al., “Pilot allocation and power control in D2D underlay mas-
networks,” in Proc. IEEE 11th Int. Conf. Wireless Mobile Comput.
sive MIMO systems,” IEEE Commun. Lett., vol. 21, no. 1, pp. 112–115,
Netw. Commun. (WiMob), 2015, pp. 392–398.
Jan. 2017.
[93] M. Hasan, E. Hossain, and D. I. Kim, “Resource allocation under
channel uncertainties for relay-aided device-to-device communication [114] X. Li, W. Zhang, H. Zhang, and W. Li, “A combining call admission
underlaying LTE-A cellular networks,” IEEE Trans. Wireless Commun., control and power control scheme for D2D communications underlay-
vol. 13, no. 4, pp. 2322–2338, Apr. 2014. ing cellular networks,” China Commun., vol. 13, no. 10, pp. 137–145,
[94] L. Wei, R. Q. Hu, Y. Qian, and G. Wu, “Energy efficiency and spectrum Oct. 2016.
efficiency of multihop device-to-device communications underlay- [115] J. Ding, L. Jiang, and C. He, “Energy-efficient power control for under-
ing cellular networks,” IEEE Trans. Veh. Technol., vol. 65, no. 1, laying D2D communication with channel uncertainty: User-centric
pp. 367–380, Jan. 2016. versus network-centric,” J. Commun. Netw., vol. 18, no. 4, pp. 589–599,
[95] P. Li, S. Guo, T. Miyazaki, and W. Zhuang, “Fine-grained resource Aug. 2016.
allocation for cooperative device-to-device communication in cellu- [116] M. Azam et al., “Joint admission control, mode selection, and power
lar networks,” IEEE Wireless Commun., vol. 21, no. 5, pp. 35–40, allocation in D2D communication systems,” IEEE Trans. Veh. Technol.,
Oct. 2014. vol. 65, no. 9, pp. 7322–7333, Sep. 2016.
[96] X. Xiao, X. Tao, and J. Lu, “A QoS-aware power optimization scheme [117] Y. Huang, A. A. Nasir, S. Durrani, and X. Zhou, “Mode selection,
in OFDMA systems with integrated device-to-device (D2D) communi- resource allocation, and power control for D2D-enabled two-tier cel-
cations,” in Proc. IEEE Veh. Technol. Conf. (VTC Fall), San Francisco, lular network,” IEEE Trans. Commun., vol. 64, no. 8, pp. 3534–3547,
CA, USA, 2011, pp. 1–5. Aug. 2016.
[97] M. Belleschi, G. Fodor, and A. Abrardo, “Performance analysis of [118] Y. Ren, F. Liu, Z. Liu, C. Wang, and Y. Ji, “Power control in D2D-
a distributed resource allocation scheme for D2D communications,” based vehicular communication networks,” IEEE Trans. Veh. Technol.,
in Proc. IEEE GLOBECOM Workshops (GC Wkshps), Houston, TX, vol. 64, no. 12, pp. 5547–5562, Dec. 2015.
USA, 2011, pp. 358–362. [119] J. M. B. da Silva and G. Fodor, “A binary power control scheme for
[98] M. Jung, K. Hwang, and S. Choi, “Joint mode selection and power D2D communications,” IEEE Wireless Commun. Lett., vol. 4, no. 6,
allocation scheme for power-efficient device-to-device (D2D) commu- pp. 669–672, Dec. 2015.
nication,” in Proc. IEEE Veh. Technol. Conf. (VTC Spring), Yokohama, [120] Y. Wu, J. Wang, L. Qian, and R. Schober, “Optimal power control for
Japan, 2012, pp. 1–5. energy efficient D2D communication and its distributed implementa-
[99] M.-H. Han, B.-G. Kim, and J.-W. Lee, “Subchannel and transmission tion,” IEEE Commun. Lett., vol. 19, no. 5, pp. 815–818, May 2015.
mode scheduling for D2D communication in OFDMA networks,” in [121] D. Zhai et al., “Energy-saving resource management for D2D and cel-
Proc. IEEE Veh. Technol. Conf. (VTC Fall), Quebec City, QC, Canada, lular coexisting networks enhanced by hybrid multiple access technolo-
2012, pp. 1–5. gies,” IEEE Trans. Wireless Commun., vol. 16, no. 4, pp. 2678–2692,
[100] H.-J. Chou and R. Y. Chang, “Joint mode selection and interference Apr. 2017.
management in device-to-device communications underlaid MIMO [122] K. Yang, S. Martin, C. Xing, J. Wu, and R. Fan, “Energy-efficient
cellular networks,” IEEE Trans. Wireless Commun., vol. 16, no. 2, power control for device-to-device communications,” IEEE J. Sel.
pp. 1120–1134, Feb. 2017. Areas Commun., vol. 34, no. 12, pp. 3208–3220, Dec. 2016.
[101] L. Su, Y. Ji, P. Wang, and F. Liu, “Resource allocation using parti- [123] K. Yang, S. Martin, L. Boukhatem, J. Wu, and X. Bu, “Energy-efficient
cle swarm optimization for D2D communication underlay of cellular resource allocation for device-to-device communications overlaying
networks,” in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), LTE networks,” in Proc. IEEE Veh. Technol. Conf. (VTC Fall), Boston,
Shanghai, China, 2013, pp. 129–133. MA, USA, 2015, pp. 1–6.

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2164 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

[124] K. Yang, J. Wu, X. Gao, X. Bu, and S. Guo, “Energy-efficient power [145] X. Li, H. Zhang, W. Zhang, and F. Yan, “A call admission control
control for device-to-device communications with max–min fairness,” scheme on the uplink of D2D communications underlaying cellular
in Proc. IEEE Veh. Technol. Conf. (VTC-Fall), Montreal, QC, Canada, networks,” Intell. Autom. Soft Comput., vol. 22, no. 4, pp. 605–612,
2016, pp. 1–5. 2016.
[125] Z. Zhou, M. Dong, K. Ota, G. Wang, and L. T. Yang, “Energy-efficient [146] Y. Jiang, Q. Liu, F. Zheng, X. Gao, and X. You, “Energy-efficient joint
resource allocation for D2D communications underlaying cloud-RAN- resource allocation and power control for D2D communications,” IEEE
based LTE-A networks,” IEEE Internet Things J., vol. 3, no. 3, Trans. Veh. Technol., vol. 65, no. 8, pp. 6119–6127, Aug. 2016.
pp. 428–438, Jun. 2016. [147] C. Lee, “A collaborative power control and resources allocation
[126] S. Andreev, O. Galinina, A. Pyattaev, K. Johnsson, and Y. Koucheryavy, for D2D (device-to-device) communication underlaying LTE cellular
“Analyzing assisted offloading of cellular user sessions onto D2D links networks,” Cluster Comput., vol. 20, no. 1, pp. 559–567, 2017.
in unlicensed bands,” IEEE J. Sel. Areas Commun., vol. 33, no. 1, [148] M. Wang, H. Gao, X. Su, and T. Lv, “Joint channel allocation, mode
pp. 67–80, Jan. 2015. selection and power control in D2D-enabled femtocells,” in Proc.
[127] R. Yin, G. Yu, H. Zhang, Z. Zhang, and G. Y. Li, “Pricing- IEEE Mil. Commun. Conf. (MILCOM), Baltimore, MD, USA, 2016,
based interference coordination for D2D communications in cel- pp. 454–459.
lular networks,” IEEE Trans. Wireless Commun., vol. 14, no. 3, [149] Q. Wang, W. Wang, S. Jin, H. Zhu, and N. T. Zhang, “Unified low-
pp. 1519–1532, Mar. 2015. layer power allocation and high-layer mode control for video delivery
[128] M. Hasan and E. Hossain, “Distributed resource allocation in D2D- in device-to-device network with multi-antenna relays,” IET Commun.,
enabled multi-tier cellular networks: An auction approach,” in Proc. vol. 10, no. 10, pp. 1196–1205, Jul. 2016.
IEEE Int. Conf. Commun. (ICC), London, U.K., 2015, pp. 2949–2954. [150] J. Zhao, K. K. Chai, Y. Chen, J. Schormans, and J. Alonso-Zarate,
[129] Q. Ye, M. Al-Shalash, C. Caramanis, and J. G. Andrews, “Distributed “Joint mode selection and resource allocation for machine-type D2D
resource allocation in device-to-device enhanced cellular networks,” links,” Trans. Emerg. Telecommun. Technol., vol. 28, no. 2, p. 3000,
IEEE Trans. Commun., vol. 63, no. 2, pp. 441–454, Feb. 2015. 2017.
[130] S. Huang, B. Liang, and J. Li, “Distributed interference and delay aware [151] J. Huang et al., A Priority-Based Access Control Model for Device-to-
design for D2D communication in large wireless networks with adap- Device Communications Underlaying Cellular Network Using Network
tive interference estimation,” IEEE Trans. Wireless Commun., vol. 16, Calculus. Cham, Switzerland: Springer Int., 2014, pp. 613–623.
no. 6, pp. 3924–3939, Jun. 2017. [152] H. Wang, G. Ding, J. Wang, S. Wang, and L. Wang, “Power con-
[131] M. Rim, S. Chae, and C. G. Kang, “Interference mitigation and trol for multiple interfering D2D communications underlaying cellular
D2D parameter estimation for distributed-control D2D underlay networks: An approximate interior point approach,” in Proc. IEEE
systems,” Trans. Emerg. Telecommun. Technol., vol. 28, no. 1, 2017, Int. Conf. Commun. Workshops (ICC Workshops), Paris, France, 2017,
Art. no. e2927. pp. 1346–1351.
[132] G. Zhang, J. Hu, W. Heng, X. Li, and G. Wang, “Distributed power [153] A. Abrardo and M. Moretti, “Distributed power allocation for D2D
control for D2D communications underlaying cellular network using communications underlaying/overlaying OFDMA cellular networks,”
Stackelberg game,” in Proc. Wireless Commun. Netw. Conf. (WCNC), IEEE Trans. Wireless Commun., vol. 16, no. 3, pp. 1466–1479,
San Francisco, CA, USA, 2017, pp. 1–6. Mar. 2017.
[133] F. Boabang, H.-H. Nguyen, Q.-V. Pham, and W.-J. Hwang, “Network- [154] F. Wang, C. Xu, L. Song, and Z. Han, “Energy-efficient resource
assisted distributed fairness-aware interference coordination for device- allocation for device-to-device underlay communication,” IEEE Trans.
to-device communication underlaid cellular networks,” Mobile Inf. Wireless Commun., vol. 14, no. 4, pp. 2082–2092, Apr. 2015.
Syst., vol. 2017, p. 11, Jan. 2017.
[155] C. Liu, X. Wang, X. Wu, and J. Guo, “Economic scheduling model
[134] E. Pateromichelakis and C. Peng, “Selection and dimensioning of slice-
of microgrid considering the lifetime of batteries,” IET Gener. Transm.
based RAN controller for adaptive radio resource management,” in
Distrib., vol. 11, no. 3, pp. 759–767, Feb. 2017.
Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), San Francisco,
[156] L. Tao et al., “A review of stochastic battery models and health
CA, USA, 2017, pp. 1–6.
management,” Renew. Sustain. Energy Rev., vol. 80, pp. 716–732,
[135] Z.-Y. Yang and Y.-W. Kuo, “Efficient resource allocation algorithm for
Dec. 2017.
overlay D2D communication,” Comput. Netw., vol. 124, pp. 61–71,
Sep. 2017. [157] F. K. Shaikh and S. Zeadally, “Energy harvesting in wireless sen-
[136] L. Ferdouse, W. Ejaz, K. Raahemifar, A. Anpalagan, and sor networks: A comprehensive review,” Renew. Sustain. Energy Rev.,
M. Markandaier, “Interference and throughput aware resource alloca- vol. 55, pp. 1041–1054, Mar. 2016.
tion for multi-class D2D in 5G networks,” IET Commun., vol. 11, no. 8, [158] T. X. Doan, T. M. Hoang, T. Q. Duong, and H. Q. Ngo, “Energy
pp. 1241–1250, Jun. 2017. harvesting-based D2D communications in the presence of interference
[137] S. Hamdoun, A. Rachedi, and Y. Ghamri-Doudane, “A flexible and ambient RF sources,” IEEE Access, vol. 5, pp. 5224–5234, 2017.
M2M radio resource sharing scheme in LTE networks within an [159] S. Gupta, R. Zhang, and L. Hanzo, “Energy harvesting aided device-
H2H/M2M coexistence scenario,” in Proc. Int. Conf. Commun. (ICC), to-device communication underlaying the cellular downlink,” IEEE
Kuala Lumpur, Malaysia, 2016, pp. 1–7. Access, vol. 5, pp. 7405–7413, 2017.
[138] S. Lv, C. Xing, Z. Zhang, and K. Long, “Guard zone based interference [160] L. Wang and H. Wu, “Jamming partner selection for maximising
management for D2D-aided underlaying cellular networks,” IEEE the worst D2D secrecy rate based on social trust,” Trans. Emerg.
Trans. Veh. Technol., vol. 66, no. 6, pp. 5466–5471, Jun. 2017. Telecommun. Technol., vol. 28, no. 2, 2017, Art. no. e2992.
[139] S.-L. Chiu, K. C.-J. Lin, G.-X. Lin, and H.-Y. Wei, “Empowering [161] W. Zhang, W. He, D. Wu, and Y. Cai, “Joint mode selection,
device-to-device networks with cross-link interference management,” link allocation and power control in underlaying D2D communica-
IEEE Trans. Mobile Comput., vol. 16, no. 4, pp. 950–963, Apr. 2017. tion,” KSII Trans. Internet Inf. Syst., vol. 10, no. 11, pp. 5209–5228,
[140] T. Yang, R. Zhang, X. Cheng, and L. Yang, “Graph coloring based 2016.
resource sharing (GCRS) scheme for D2D communications underlay- [162] A. Orsino et al., “Effects of heterogeneous mobility on D2D- and
ing full-duplex cellular networks,” IEEE Trans. Veh. Technol., vol. 66, drone-assisted mission-critical MTC in 5G,” IEEE Commun. Mag.,
no. 8, pp. 7506–7517, Aug. 2017. vol. 55, no. 2, pp. 79–87, Feb. 2017.
[141] Y. Wu, S. Wang, W. Liu, W. Guo, and X. Chu, “Iunius: A cross-layer [163] Z. Wang et al., “Propagation- and mobility-aware D2D social con-
peer-to-peer system with device-to-device communications,” IEEE tent replication,” IEEE Trans. Mobile Comput., vol. 16, no. 4,
Trans. Wireless Commun., vol. 15, no. 10, pp. 7005–7017, Oct. 2016. pp. 1107–1120, Apr. 2017.
[142] S. Baidya and M. Levorato, “Content-based interference management [164] R. Wang, J. Zhang, S. H. Song, and K. B. Letaief, “Mobility-aware
for video transmission in D2D communications underlaying LTE,” in caching in D2D networks,” IEEE Trans. Wireless Commun., vol. 16,
Proc. Int. Conf. Comput. Netw. Commun. (ICNC), Santa Clara, CA, no. 8, pp. 5001–5015, Aug. 2017.
USA, 2017, pp. 144–149. [165] K. Ouali, M. Kassar, T. M. T. Nguyen, K. Sethom, and B. Kervella,
[143] M. Zhao, X. Gu, D. Wu, and L. Ren, “A two-stages relay selection “Modeling D2D handover management in 5G cellular networks,” in
and resource allocation joint method for D2D communication system,” Proc. 13th Int. Wireless Commun. Mobile Comput. Conf. (IWCMC),
in Proc. Wireless Commun. Netw. Conf., Doha, Qatar, 2016, pp. 1–6. Valencia, Spain, 2017, pp. 196–201.
[144] C. Zhengwen, Z. Su, and S. Shixiang, “Research on relay selection [166] S. Krishnan and H. S. Dhillon, “Effect of user mobility on
in device-to-device communications based on maximum capacity,” in the performance of device-to-device networks with distributed
Proc. Int. Conf. Inf. Sci. Electron. Elect. Eng. (ISEEE), vol. 3, 2014, caching,” IEEE Wireless Commun. Lett., vol. 6, no. 2, pp. 194–197,
pp. 1429–1434. Apr. 2017.

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
JAMEEL et al.: SURVEY OF D2D COMMUNICATIONS: RESEARCH ISSUES AND CHALLENGES 2165

[167] M. Waqas, M. Zeng, and Y. Li, “Mobility-assisted device to device [189] Y. Luo, L. Cui, Y. Yang, and B. Gao, “Power control and channel access
communications for Content Transmission,” in Proc. 13th Int. Wireless for physical-layer security of D2D underlay communication,” in Proc.
Commun. Mobile Comput. Conf. (IWCMC), Valencia, Spain, 2017, Int. Conf. Wireless Commun. Signal Process. (WCSP), Nanjing, China,
pp. 206–211. 2015, pp. 1–5.
[168] D. S. Gurjar and P. K. Upadhyay, “Overlay spectrum sharing for [190] W. Wang, K. C. Teh, and K. H. Li, “Enhanced physical layer security
device-to-device communications in two-way cellular networks with in D2D spectrum sharing networks,” IEEE Wireless Commun. Lett.,
nodes mobility,” Trans. Emerg. Telecommun. Technol., vol. 28, no. 10, vol. 6, no. 1, pp. 106–109, Feb. 2017.
pp. 1–11, 2017. [191] Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security:
[169] C. Jarray and A. Giovanidis, “The effects of mobility on the hit Technical challenges, recent advances, and future trends,” Proc. IEEE,
performance of cached D2D networks,” in Proc. 14th Int. Symp. Model. vol. 104, no. 9, pp. 1727–1765, Sep. 2016.
Optim. Mobile Ad Hoc Wireless Netw. (WiOpt), Tempe, AZ, USA, [192] K. Zhang, M. Peng, P. Zhang, and X. Li, “Secrecy-optimized resource
2016, pp. 1–8. allocation for device-to-device communication underlaying hetero-
[170] X. Xu, Y. Zhang, Z. Sun, Y. Hong, and X. Tao, “Analytical modeling geneous networks,” IEEE Trans. Veh. Technol., vol. 66, no. 2,
of mode selection for moving D2D-enabled cellular networks,” IEEE pp. 1822–1834, Feb. 2017.
Commun. Lett., vol. 20, no. 6, pp. 1203–1206, Jun. 2016. [193] J. Yue, C. Ma, H. Yu, and W. Zhou, “Secrecy-based access control for
[171] C. Gao, Y. Li, and D. Jin, “Mobility assisted device-to-device commu- device-to-device communication underlaying cellular networks,” IEEE
nications underlaying cellular networks,” in Proc. Int. Conf. Comput. Commun. Lett., vol. 17, no. 11, pp. 2068–2071, Nov. 2013.
Netw. Commun. (ICNC), 2016, pp. 1–6. [194] C. Ma et al., “Interference exploitation in D2D-enabled cellular
[172] S. Ferretti, G. D’Angelo, and V. Ghini, “Smart multihoming in smart networks: A secrecy perspective,” IEEE Trans. Commun., vol. 63, no. 1,
shires: Mobility and communication management for smart services pp. 229–242, Jan. 2015.
in countrysides,” in Proc. Symp. Comput. Commun. (ISCC), 2016, [195] Z. Chu, K. Cumanan, M. Xu, and Z. Ding, “Robust secrecy rate optimi-
pp. 970–975. sations for multiuser multiple-input-single-output channel with device-
[173] S. Barua and R. Braun, “A novel approach of mobility management to-device communications,” IET Commun., vol. 9, no. 3, pp. 396–403,
for the D2D communications in 5G mobile cellular network system,” Feb. 2014.
in Proc. 18th Asia–Pac. Netw. Oper. Manag. Symp. (APNOMS), [196] H. Wen, Y. Wang, X. Zhu, J. Li, and L. Zhou, “Physical layer assist
Kanazawa, Japan, 2016, pp. 1–4. authentication technique for smart meter system,” IET Commun., vol. 7,
[174] W. Lin, C. Yu, and X. Zhang, “RAM: Resource allocation in mobility no. 3, pp. 189–197, Feb. 2013.
for device-to-device communications,” in Proc. Int. Conf. Big Data [197] G. Verma, P. Yu, and B. M. Sadler, “Physical layer authentication via
Comput. Commun., Taiyuan, China, 2015, pp. 491–502. fingerprint embedding using software-defined radios,” IEEE Access,
[175] F. Siddiqui and S. Zeadally, “Mobility management across hybrid wire- vol. 3, pp. 81–88, 2015.
less networks: Trends and challenges,” Comput. Commun., vol. 29, [198] L. Y. Paul, G. Verma, and B. M. Sadler, “Wireless physical layer
no. 9, pp. 1363–1385, 2006. authentication via fingerprint embedding,” IEEE Commun. Mag.,
[176] M. Bouaziz and A. Rachedi, “A survey on mobility management pro- vol. 53, no. 6, pp. 48–53, Jun. 2015.
tocols in wireless sensor networks based on 6LoWPAN technology,” [199] L. Shi, M. Li, S. Yu, and J. Yuan, “BANA: Body area network authenti-
Comput. Commun., vol. 74, pp. 3–15, Jan. 2016. cation exploiting channel characteristics,” IEEE J. Sel. Areas Commun.,
[177] H. Ishii, Y. Kishiyama, and H. Takahashi, “A novel architec- vol. 31, no. 9, pp. 1803–1816, Sep. 2013.
ture for LTE-B :C-plane/U-plane split and Phantom Cell concept,” [200] L. Shi, J. Yuan, S. Yu, and M. Li, “ASK-BAN: Authenticated secret
in Proc. IEEE Globecom Workshops, Anaheim, CA, USA, 2012, key extraction utilizing channel characteristics for body area networks,”
pp. 624–630. in Proc. 6th ACM Conf. Security Privacy Wireless Mobile Netw.,
[178] K. Doppler, M. P. Rinne, P. Janis, C. Ribeiro, and K. Hugl, “Device- Budapest, Hungary, 2013, pp. 155–166.
to-device communications; functional prospects for LTE-advanced [201] W. Hou, X. Wang, J.-Y. Chouinard, and A. Refaey, “Physical layer
networks,” in Proc. Int. Conf. Commun. Workshops, Dresden, Germany, authentication for mobile systems with time-varying carrier frequency
2009, pp. 1–6. offsets,” IEEE Trans. Commun., vol. 62, no. 5, pp. 1658–1667,
[179] A. Orsino et al., “Assisted handover based on device-to-device commu- May 2014.
nications in 3GPP LTE systems,” in Proc. IEEE Globecom Workshops [202] K. M. Borle, B. Chen, and W. K. Du, “Physical layer spectrum
(GC Wkshps), San Diego, CA, USA, 2015, pp. 1–6. usage authentication in cognitive radio: Analysis and implementation,”
[180] H.-Y. Chen, M.-J. Shih, and H.-Y. Wei, “Handover mechanism for IEEE Trans. Inf. Forensics Security, vol. 10, no. 10, pp. 2225–2235,
device-to-device communication,” in Proc. Conf. Stand. Commun. Oct. 2015.
Netw. (CSCN), Tokyo, Japan, 2015, pp. 72–77. [203] P. Huang and X. Wang, “Fast secret key generation in static wire-
[181] O. N. C. Yilmaz et al., “Smart mobility management for D2D com- less networks: A virtual channel approach,” in Proc. IEEE INFOCOM,
munications in 5G networks,” in Proc. Wireless Commun. Netw. Conf. Turin, Italy, 2013, pp. 2292–2300.
Workshops (WCNCW), Istanbul, Turkey, 2014, pp. 219–223. [204] A. Zhang, L. Wang, X. Ye, and X. Lin, “Light-weight and robust
[182] D. Wu, L. Zhou, Y. Cai, R. Q. Hu, and Y. Qian, “The role of mobility security-aware D2D-assist data transmission protocol for mobile-
for D2D communications in LTE-advanced networks: Energy vs. band- health systems,” IEEE Trans. Inf. Forensics Security, vol. 12, no. 3,
width efficiency,” IEEE Wireless Commun., vol. 21, no. 2, pp. 66–71, pp. 662–675, Mar. 2017.
Apr. 2014. [205] Y.-W. P. Hong, L.-M. Huang, and H.-T. Li, “Vector quantization
[183] S. Chen, Y. Shi, B. Hu, and M. Ai, Mobility Management Reference and clustered key mapping for channel-based secret key generation,”
Models. Heidelberg, Germany: Springer, 2016, pp. 29–62. IEEE Trans. Inf. Forensics Security, vol. 12, no. 5, pp. 1170–1181,
[184] L. Zhou, D. Wu, B. Zheng, and M. Guizani, “Joint physical-application May 2017.
layer security for wireless multimedia delivery,” IEEE Commun. Mag., [206] L. Wang, H. Wu, and G. L. Stüber, “Cooperative jamming-aided
vol. 52, no. 3, pp. 66–72, Mar. 2014. secrecy enhancement in P2P communications with social interaction
[185] D. Zhu, A. L. Swindlehurst, S. A. A. Fakoorian, W. Xu, and C. Zhao, constraints,” IEEE Trans. Veh. Technol., vol. 66, no. 2, pp. 1144–1158,
“Device-to-device communications: The physical layer security advan- Feb. 2017.
tage,” in Proc. Int. Conf. Acoust. Speech Signal Process. (ICASSP), [207] F. Jameel, S. Wyne, and I. Krikidis, “Secrecy outage for wireless sen-
Florence, Italy, 2014, pp. 1606–1610. sor networks,” IEEE Commun. Lett., vol. 21, no. 7, pp. 1565–1568,
[186] Y. Liu, L. Wang, S. A. R. Zaidi, M. Elkashlan, and T. Q. Duong, Jul. 2017.
“Secure D2D communication in large-scale cognitive cellular networks: [208] L. Wan, G. Han, J. Jiang, C. Zhu, and L. Shu, “A DOA esti-
A wireless power transfer model,” IEEE Trans. Commun., vol. 64, mation approach for transmission performance guarantee in D2D
no. 1, pp. 329–342, Jan. 2016. communication,” Mobile Netw. Appl., vol. 22, no. 6, pp. 998–1009,
[187] L. Jiang, C. Qin, X. Zhang, and H. Tian, “Secure beamforming design 2017.
for SWIPT in cooperative D2D communications,” China Commun., [209] X. Wang, Q. Liang, J. Mu, W. Wang, and B. Zhang, “Physical layer
vol. 14, no. 1, pp. 20–33, Jan. 2017. security in wireless smart grid,” Security Commun. Netw., vol. 8, no. 14,
[188] K. Zhang, M. Peng, P. Zhang, and X. Li, “Secrecy-optimized resource pp. 2431–2439, 2015.
allocation for device-to-device communication underlaying hetero- [210] Z. Shu, Y. Qian, and S. Ci, “On physical layer security for cog-
geneous networks,” IEEE Trans. Veh. Technol., vol. 66, no. 2, nitive radio networks,” IEEE Netw., vol. 27, no. 3, pp. 28–33,
pp. 1822–1834, Feb. 2017. May/Jun. 2013.

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2166 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

[211] G. Geraci, H. S. Dhillon, J. G. Andrews, J. Yuan, and I. B. Collings, [233] X. Gong, X. Chen, and J. Zhang, “Social group utility maximization
“A new model for physical layer security in cellular networks,” in game with applications in mobile social networks,” in Proc. IEEE Annu.
Proc. IEEE Int. Conf. Commun. (ICC), Sydney, NSW, Australia, 2014, Allerton Conf. Commun. Control Comput. (Allerton), Monticello, IL,
pp. 2147–2152. USA, 2013, pp. 1496–1500.
[212] A. Zhang, J. Chen, R. Q. Hu, and Y. Qian, “SeDS: Secure [234] X. Chen, X. Gong, L. Yang, and J. Zhang, “A social group utility
data sharing strategy for D2D communication in LTE-advanced maximization framework with applications in database assisted spec-
networks,” IEEE Trans. Veh. Technol., vol. 65, no. 4, pp. 2659–2672, trum access,” in Proc. IEEE INFOCOM, Toronto, ON, Canada, 2014,
Apr. 2016. pp. 1959–1967.
[213] L. Goratti, G. Steri, K. M. Gomez, and G. Baldini, “Connectivity and [235] Y. Li, D. Jin, J. Yuan, and Z. Han, “Coalitional games for resource allo-
security in a D2D communication protocol for public safety appli- cation in the device-to-device uplink underlaying cellular networks,”
cations,” in Proc. 11th Int. Symp. Wireless Commun. Syst. (ISWCS), IEEE Trans. Wireless Commun., vol. 13, no. 7, pp. 3965–3977,
Barcelona, Spain, 2014, pp. 548–552. Jul. 2014.
[214] J. Ouyang, M. Lin, W.-P. Zhu, K. An, and L. Wang, “Improving secrecy [236] R. Zhang, L. Song, Z. Han, X. Cheng, and B. Jiao, “Distributed
performance via device-to-device jamming in cellular networks,” in resource allocation for device-to-device communications underlaying
Proc. IEEE Int. Conf. Wireless Commun. Signal Process. (WCSP), cellular networks,” in Proc. IEEE Int. Conf. Commun. (ICC), Budapest,
Yangzhou, China, 2016, pp. 1–5. Hungary, 2013, pp. 1889–1893.
[215] L. Wang, H. Wu, and G. Stuber, “Resource allocation with cooperative [237] D. Wu, J. Wang, R. Q. Hu, Y. Cai, and L. Zhou, “Energy-efficient
jamming in socially interactive secure D2D underlay,” in Proc. IEEE resource sharing for mobile device-to-device multimedia communi-
Veh. Technol. Conf. (VTC Spring), Nanjing, China, 2016, pp. 1–5. cations,” IEEE Trans. Veh. Technol., vol. 63, no. 5, pp. 2093–2103,
[216] Y. Jung, E. Festijo, and M. Peradilla, “Joint operation of routing control Jun. 2014.
and group key management for 5G ad hoc D2D networks,” in Proc. [238] C. Xu et al., “Interference-aware resource allocation for device-to-
Int. Conf. Privacy Security Mobile Syst. (PRISMS), Aalborg, Denmark, device communications as an underlay using sequential second price
2014, pp. 1–8. auction,” in Proc. IEEE Int. Conf. Commun. (ICC), Ottawa, ON,
[217] E. Panaousis, T. Alpcan, H. Fereidooni, and M. Conti, Secure Canada, 2012, pp. 445–449.
Message Delivery Games for Device-to-Device Communications. [239] C. Xu et al., “Efficiency resource allocation for device-to-device
Cham, Switzerland: Springer Int., 2014, pp. 195–215. underlay communication systems: A reverse iterative combinatorial
[218] R.-H. Hsu and J. Lee, “Group anonymous D2D communication with auction based approach,” IEEE J. Sel. Areas Commun., vol. 31, no. 9,
end-to-end security in LTE-A,” in Proc. Conf. Commun. Netw. Security pp. 348–358, Sep. 2013.
(CNS), Florence, Italy, 2015, pp. 451–459. [240] C. Xu, L. Song, Z. Han, D. Li, and B. Jiao, “Resource allocation
[219] J. Sun, R. Zhang, and Y. Zhang, “Privacy-preserving spatiotemporal using a reverse iterative combinatorial auction for device-to-device
matching for secure device-to-device communications,” IEEE Internet underlay cellular networks,” in Proc. IEEE Glob. Commun. Conf.
Things J., vol. 3, no. 6, pp. 1048–1060, Dec. 2016. (GLOBECOM), Anaheim, CA, USA, 2012, pp. 4542–4547.
[220] P. K. Mishra and S. Pandey, “A method for network assisted relay [241] M. T. Islam, A.-E. M. Taha, S. Akl, and S. Choudhury, “A two-phase
selection in device to device communication for the 5G,” Int. J. Appl. auction-based fair resource allocation for underlaying D2D commu-
Eng. Res., vol. 11, no. 10, pp. 7125–7131, Dec. 2016. nications,” in Proc. IEEE Int. Conf. Commun. (ICC), Kuala Lumpur,
[221] A. Ometov et al., “Toward trusted, social-aware D2D connectivity: Malaysia, 2016, pp. 1–6.
Bridging across the technology and sociality realms,” IEEE Wireless [242] Y. Zhu, J. Jiang, B. Li, and B. Li, “Rado: A randomized auction
Commun., vol. 23, no. 4, pp. 103–111, Aug. 2016. approach for data offloading via D2D communication,” in Proc. Int.
[222] N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, “Analyzing Conf. Mobile Ad Hoc Sensor Syst. (MASS), Dallas, TX, USA, 2015,
the energy consumption of security protocols,” in Proc. ACM Int. pp. 1–9.
Symp. Low Power Electron. Design, Seoul, South Korea, 2003, [243] M. H. Hajiesmaili, L. Deng, M. Chen, and Z. Li, “Incentivizing device-
pp. 30–35. to-device load balancing for cellular networks: An online auction
[223] A. Michalas, V. A. Oleshchuk, N. Komninos, and N. R. Prasad, design,” IEEE J. Sel. Areas Commun., vol. 35, no. 2, pp. 265–279,
“Privacy-preserving scheme for mobile ad hoc networks,” Feb. 2017.
in Proc. IEEE Symp. Comput. Commun. (ISCC), Jun. 2011, [244] M. Li et al., “Economic-robust transmission opportunity auction for
pp. 752–757. D2D communications in cognitive mesh assisted cellular networks,”
[224] X. Wang, S. Li, S. Zhao, Z. Xia, and L. Bai, “A vehicular ad hoc IEEE Trans. Mobile Comput., to be published.
network privacy protection scheme without a trusted third party,” Int. [245] P. Demestichas et al., “5G on the horizon: Key challenges for the radio-
J. Distrib. Sensor Netw., vol. 13, no. 12, p. 1, 2017. access network,” IEEE Veh. Technol. Mag., vol. 8, no. 3, pp. 47–53,
[225] J. Huang et al., “A game-theoretic resource allocation approach Sep. 2013.
for intercell device-to-device communications in cellular networks,” [246] N. Bhushan et al., “Network densification: The dominant theme for
IEEE Trans. Emerg. Topics Comput., vol. 4, no. 4, pp. 475–486, wireless evolution into 5G,” IEEE Commun. Mag., vol. 52, no. 2,
Oct./Dec. 2016. pp. 82–89, Feb. 2014.
[226] F. Wang, L. Song, Z. Han, Q. Zhao, and X. Wang, “Joint scheduling and [247] Y. Zhang et al., “Social network aware device-to-device communication
resource allocation for device-to-device underlay communication,” in in wireless networks,” IEEE Trans. Wireless Commun., vol. 14, no. 1,
Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), Shanghai, China, pp. 177–190, Jan. 2015.
2013, pp. 134–139. [248] C. Li, F. Jiang, X. Wang, and B. Shen, “Optimal relay selection
[227] Y. Liu, R. Wang, and Z. Han, “Interference-constrained pricing for D2D based on social threshold for D2D communications underlay cellular
networks,” IEEE Trans. Wireless Commun., vol. 16, no. 1, pp. 475–486, networks,” in Proc. IEEE Int. Conf. Wireless Commun. Signal Process.
Jan. 2017. (WCSP), Yangzhou, China, 2016, pp. 1–6.
[228] J. Wang, C. Jiang, Z. Bie, T. Q. S. Quek, and Y. Ren, “Mobile data [249] E. Datsika, A. Antonopoulos, N. Zorba, and C. Verikoukis, “Green
transactions in device-to-device communication networks: Pricing and cooperative device–to–device communication: A social–aware perspec-
auction,” IEEE Wireless Commun. Lett., vol. 5, no. 3, pp. 300–303, tive,” IEEE Access, vol. 4, pp. 3697–3707, 2016.
Jun. 2016. [250] Q. Wang, C. Lai, Y. Dong, Y. Shu, and X. Xu, “Joint user clustering
[229] G. Zhang, K. Yang, P. Liu, and J. Wei, “Power allocation for full-duplex and resource allocation for device-to-device communication underlay-
relaying-based D2D communication underlaying cellular networks,” ing MU-MIMO cellular networks,” EURASIP J. Wireless Commun.
IEEE Trans. Veh. Technol., vol. 64, no. 10, pp. 4911–4916, Oct. 2015. Netw., vol. 2015, no. 1, p. 145, 2015.
[230] S. Xiao et al., “Energy-efficient mobile association in heterogeneous [251] S. Shalmashi, E. Björnson, M. Kountouris, K. W. Sung, and M. Debbah,
networks with device-to-device communications,” IEEE Trans. Wireless “Energy efficiency and sum rate tradeoffs for massive MIMO
Commun., vol. 15, no. 8, pp. 5260–5271, Aug. 2016. systems with underlaid device-to-device communications,” EURASIP
[231] A. Awad, A. Mohamed, C.-F. Chiasserini, and T. Elfouly, “Network J. Wireless Commun. Netw., vol. 2016, no. 1, p. 175, 2016.
association with dynamic pricing over D2D-enabled heterogeneous [252] T. L. Marzetta, “Noncooperative cellular wireless with unlimited num-
networks,” in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), bers of base station antennas,” IEEE Trans. Wireless Commun., vol. 9,
San Francisco, CA, USA, 2017, pp. 1–6. no. 11, pp. 3590–3600, Nov. 2010.
[232] L. Wang, L. Liu, X. Cao, X. Tian, and Y. Cheng, “Sociality-aware [253] H. Q. Ngo, E. G. Larsson, and T. L. Marzetta, “Energy and spec-
resource allocation for device-to-device communications in cellular tral efficiency of very large multiuser MIMO systems,” IEEE Trans.
networks,” IET Commun., vol. 9, no. 3, pp. 342–349, Feb. 2015. Commun., vol. 61, no. 4, pp. 1436–1449, Apr. 2013.

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
JAMEEL et al.: SURVEY OF D2D COMMUNICATIONS: RESEARCH ISSUES AND CHALLENGES 2167

[254] J. Hoydis, S. T. Brink, and M. Debbah, “Massive MIMO in the UL/DL [277] Y. Wang et al., “5G mobile: Spectrum broadening to higher-frequency
of cellular networks: How many antennas do we need?” IEEE J. Sel. bands to support high data rates,” IEEE Veh. Technol. Mag., vol. 9,
Areas Commun., vol. 31, no. 2, pp. 160–171, Feb. 2013. no. 3, pp. 39–46, Sep. 2014.
[255] H. Yin, L. Cottatellucci, and D. Gesbert, “Enabling massive MIMO [278] M. A. Javed and E. B. Hamida, “On the interrelation of security,
systems in the FDD mode thanks to D2D communications,” in Proc. QoS, and safety in cooperative ITS,” IEEE Trans. Intell. Transp. Syst.,
IEEE Asilomar Conf. Signals Syst. Comput., Pacific Grove, CA, USA, vol. 18, no. 7, pp. 1943–1957, Jul. 2017.
2014, pp. 656–660. [279] J. Contreras-Castillo, S. Zeadally, and J. A. G. Ibañez, “Solving vehic-
[256] L. Cottatellucci, “D2D CSI feedback for D2D aided massive MIMO ular ad hoc network challenges with Big Data solutions,” IET Netw.,
communications,” in Proc. IEEE Sensor Array Multichannel Signal vol. 5, no. 4, pp. 81–84, Jul. 2016.
Process. Workshop (SAM), 2016, pp. 1–5. [280] S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, and A. Hassan,
[257] J. Chen, H. Yin, L. Cottatellucci, and D. Gesbert, “Feedback mech- “Vehicular ad hoc networks (VANETS): Status, results, and chal-
anisms for FDD massive MIMO with D2D-based limited CSI shar- lenges,” Telecommun. Syst., vol. 50, no. 4, pp. 217–241, 2012.
ing,” IEEE Trans. Wireless Commun., vol. 16, no. 8, pp. 5162–5175, [281] M. A. Javed and J. Y. Khan, “A cooperative safety zone approach to
Aug. 2017. enhance the performance of VANET applications,” in Proc. IEEE Veh.
[258] J. Chen, H. Yin, L. Cottatellucci, and D. Gesbert, “Dual-regularized Technol. Conf. (VTC Spring), Dresden, Germany, 2013, pp. 1–5.
feedback and precoding for D2D-assisted MIMO systems,” IEEE [282] M. A. Javed and E. B. Hamida, “Measuring safety awareness in coop-
Trans. Wireless Commun., vol. 16, no. 10, pp. 6854–6867, Oct. 2017. erative its applications,” in Proc. IEEE Wireless Commun. Netw. Conf.
[259] A. Fehske, G. Fettweis, J. Malmodin, and G. Biczok, “The global (WCNC), Doha, Qatar, 2016, pp. 1–7.
footprint of mobile communications: The ecological and economic per- [283] Z. Hashim and N. Gupta, “Futuristic device-to-device communication
spective,” IEEE Commun. Mag., vol. 49, no. 8, pp. 55–62, Aug. 2011. paradigm in vehicular ad-hoc network,” in Proc. IEEE Int. Conf. Inf.
[260] S. Zeadally, S. U. Khan, and N. Chilamkurti, “Energy-efficient Technol. (InCITe), Noida, India, 2016, pp. 209–214.
networking: Past, present, and future,” J. Supercomput., vol. 62, no. 3, [284] W. Sun, E. G. Ström, F. Brännström, Y. Sui, and K. C. Sou, “D2D-
pp. 1093–1118, Dec. 2012. based V2V communications with latency and reliability constraints,”
[261] K. Huang and V. K. N. Lau, “Enabling wireless power transfer in cel- in Proc. IEEE Globecom Workshops (GC Wkshps), Austin, TX, USA,
lular networks: Architecture, modeling and deployment,” IEEE Trans. 2014, pp. 1414–1419.
Wireless Commun., vol. 13, no. 2, pp. 902–912, Feb. 2014. [285] W. Sun, E. G. Ström, F. Brännström, K. C. Sou, and Y. Sui, “Radio
[262] P. N. Son and H. Y. Kong, “Exact outage analysis of energy harvest- resource management for D2D-based V2V communication,” IEEE
ing underlay cooperative cognitive networks,” IEICE Trans. Commun., Trans. Veh. Technol., vol. 65, no. 8, pp. 6636–6650, Aug. 2016.
vol. E98-B, no. 4, pp. 661–672, 2015. [286] E. Abd-Elrahman, A. M. Said, T. Toukabri, H. Afifi, and M. Marot,
[263] T. T. Duy and H. Y. Kong, “Outage analysis of cognitive spectrum “Assisting V2V failure recovery using device-to-device communica-
sharing for two-way relaying schemes with opportunistic relay selec- tions,” in Proc. IFIP Wireless Days (WD), Rio de Janeiro, Brazil, 2014,
tion over i.n.i.d. Rayleigh fading channels,” IEICE Trans. Commun., pp. 1–3.
vol. E96-B, no. 1, pp. 348–351, 2013. [287] X. Cao, L. Liu, Y. Cheng, L. X. Cai, and C. Sun, “On optimal
[264] T. N. Nguyen, D.-T. Do, P. T. Tran, and M. Vozňák, “Time switch- device-to-device resource allocation for minimizing end-to-end delay in
ing for wireless communications with full-duplex relaying in imper- VANETs,” IEEE Trans. Veh. Technol., vol. 65, no. 10, pp. 7905–7916,
fect CSI condition,” KSII Trans. Internet Inf. Syst., vol. 10, no. 9, Oct. 2016.
pp. 4223–4239, 2016. [288] Y. Gu, L. X. Cai, M. Pan, L. Song, and Z. Han, “Exploiting the stable
[265] A. A. Nasir, X. Zhou, S. Durrani, and R. A. Kennedy, “Relaying proto- fixture matching game for content sharing in D2D-based LTE-V2X
cols for wireless energy harvesting and information processing,” IEEE communications,” in Proc. IEEE Glob. Commun. Conf. (GLOBECOM),
Trans. Wireless Commun., vol. 12, no. 7, pp. 3622–3636, Jul. 2013. Washington, DC, USA, 2016, pp. 1–6.
[266] H. H. Yang, J. Lee, and T. Q. S. Quek, “Heterogeneous cellular [289] F. K. Shaikh, S. Zeadally, and E. Exposito, “Enabling technologies for
network with energy harvesting-based D2D communication,” IEEE green Internet of Things,” IEEE Syst. J., vol. 11, no. 2, pp. 983–994,
Trans. Wireless Commun., vol. 15, no. 2, pp. 1406–1419, Feb. 2016. Jun. 2017.
[267] J. Deng, O. Tirkkonen, R. Freij-Hollanti, T. Chen, and N. Nikaein, [290] X. Liu and N. Ansari, “Green relay assisted D2D communications
“Resource allocation and interference management for opportunis- with dual battery for IoT,” in Proc. IEEE Glob. Commun. Conf.
tic relaying in integrated mmWave/sub-6 GHz 5G networks,” IEEE (GLOBECOM), Washington, DC, USA, 2016, pp. 1–6.
Commun. Mag., vol. 55, no. 6, pp. 94–101, Jun. 2017. [291] O. Bello and S. Zeadally, “Intelligent device-to-device communication
[268] W. Lin and R. W. Ziolkowski, “Compact, omni-directional, circularly- in the Internet of Things,” IEEE Syst. J., vol. 10, no. 3, pp. 1172–1182,
polarized mm-Wave antenna for device-to-device (D2D) communica- Sep. 2016.
tions in future 5G cellular systems,” in Proc. IEEE 10th Glob. Symp. [292] C. Zhu, V. C. M. Leung, L. Shu, and E. C.-H. Ngai, “Green Internet of
Millimeter Waves, Hong Kong, 2017, pp. 115–116. Things for smart world,” IEEE Access, vol. 3, pp. 2151–2162, 2015.
[269] A. Alnoman and A. Anpalagan, “Towards the fulfillment of 5G [293] P. Pirinen, “A brief overview of 5G research activities,” in Proc. IEEE
network requirements: Technologies and challenges,” Telecommun. Int. Conf. 5G Ubiquitous Connectivity (5GU), Äkäslompolo, Finland,
Syst., vol. 65, no. 1, pp. 101–116, 2017. 2014, pp. 17–22.
[270] C. Gao et al., “Evaluating the impact of user behavior on D2D commu- [294] S. Talwar et al., “Enabling technologies and architectures for 5G
nications in millimeter-wave small cells,” IEEE Trans. Veh. Technol., wireless,” in Proc. IEEE Int. Microw. Symp. (IMS), 2014, pp. 1–4.
vol. 66, no. 7, pp. 6362–6377, Jul. 2017. [295] L. Militano et al., “Trusted D2D-based data uploading in in-band
[271] N. Wei, X. Lin, and Z. Zhang, “Optimal relay probing in millimeter- narrowband-IoT with social awareness,” in Proc. 27th Annu. Int. Symp.
wave cellular systems with device-to-device relaying,” IEEE Trans. Pers. Indoor Mobile Radio Commun. (PIMRC), Valencia, Spain, 2016,
Veh. Technol., vol. 65, no. 12, pp. 10218–10222, Dec. 2016. pp. 1–6.
[272] Y. Niu, Y. Li, D. Jin, L. Su, and A. V. Vasilakos, “A survey of mil-
limeter wave communications (mmWave) for 5G: Opportunities and
challenges,” Wireless Netw., vol. 21, no. 8, pp. 2657–2676, 2015.
[273] M. S. Omar, M. A. Anjum, S. A. Hassan, H. Pervaiz, and Q. Niv,
“Performance analysis of hybrid 5G cellular networks exploiting Furqan Jameel received the B.S. degree in electrical
mmWave capabilities in suburban areas,” in Proc. IEEE Int. Conf. engineering (under ICT Research and Development
Commun. (ICC), Kuala Lumpur, Malaysia, 2016, pp. 1–6. funded Program) from the Lahore Campus of
[274] M. Gapeyenko et al., “Analysis of human-body blockage in urban COMSATS Institute of Information Technology
millimeter-wave cellular communications,” in Proc. IEEE Int. Conf. (CIIT), Pakistan, in 2013 and the master’s degree
Commun. (ICC), Kuala Lumpur, Malaysia, 2016, pp. 1–7. in electrical engineering (funded by prestigious
[275] Y. Niu et al., “Exploiting device-to-device communications to enhance Higher Education Commission Scholarship) from
spatial reuse for popular content downloading in directional mmWave the Islamabad Campus of CIIT in 2017. His research
small cells,” IEEE Trans. Veh. Technol., vol. 65, no. 7, pp. 5538–5550, contributions have been published over 20 inter-
Jul. 2016. national peer reviewed journals and conferences.
[276] F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta, and P. Popovski, His current research interests include modeling and
“Five disruptive technology directions for 5G,” IEEE Commun. Mag., performance enhancement of vehicular networks, physical layer security,
vol. 52, no. 2, pp. 74–80, Feb. 2014. nonorthogonal multiple access, and wireless information and power transfer.

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.
2168 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 3, THIRD QUARTER 2018

Zara Hamid is currently an Assistant Professor with Sherali Zeadally received the bachelor’s degree in
the Department of Computer Science, COMSATS computer science from the University of Cambridge,
Institute of Information Technology, Islamabad, England, and the Doctorate degree in computer sci-
Pakistan. Her research interests include modeling, ence from the University of Buckingham, England.
cross-layer optimization, and performance evalua- He is an Associate Professor with the College
tion of wireless ad hoc and sensor networks, infor- of Communication and Information, University of
mation centric networking, vehicular networks and Kentucky, Lexington, KY, USA. He is a fellow of
security issues in these networks. the British Computer Society and the Institution of
Engineering Technology, England.

Muhammad Awais Javed received the B.Sc. degree


in electrical engineering from the University of
Engineering and Technology Lahore, Pakistan, in
Farhana Jabeen received the Ph.D. degree from
2008 and the Ph.D. degree in electrical engineer-
the School of Computer Science, Manchester
ing from the University of Newcastle, Australia, in
University, U.K., in 2011. She is currently an
2015. He is currently an Assistant Professor with
Assistant Professor with the COMSATS Institute of
the COMSATS Institute of Information Technology,
Information Technology, Islamabad, Pakistan. Her
Pakistan. From 2015 to 2016, he was a Post-Doctoral
research interests include distributed query process-
Research Scientist with Qatar Mobility Innovations
ing, distributed algorithms, privacy and security
Center on SafeITS project. His research interests
protocols in wireless ad hoc and sensor networks and
include algorithms for efficient communications in
Internet of Things, and software defined networks.
mobile ad hoc networks, protocol design for emerging wireless technologies,
and Internet of Things.

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 17,2022 at 10:20:23 UTC from IEEE Xplore. Restrictions apply.

You might also like