You are on page 1of 19

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/336673278

A Critical Review of 3GPP Standardization of Device-to-Device


Communication in Cellular Networks

Article in SN Computer Science · October 2019


DOI: 10.1007/s42979-019-0045-5

CITATIONS READS

32 2,882

2 authors, including:

Udit Kar
VIT-AP University
20 PUBLICATIONS 230 CITATIONS

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

National Digital Library of India View project

Design and development of Rate Control Protocol View project

All content following this page was uploaded by Udit Kar on 18 February 2020.

The user has requested enhancement of the downloaded file.


SN Computer Science (2020) 1:37
https://doi.org/10.1007/s42979-019-0045-5

SURVEY ARTICLE

A Critical Review of 3GPP Standardization of Device‑to‑Device


Communication in Cellular Networks
Udit Narayana Kar1 · Debarshi Kumar Sanyal2

Received: 10 July 2019 / Accepted: 11 October 2019


© Springer Nature Singapore Pte Ltd 2019

Abstract
Device-to-device (D2D) communication is rapidly evolving into a viable method of information exchange in a cellular
network. It has a very low end-to-end latency and can increase spectral efficiency of a cellular network. The latest releases
of 3GPP specification have given considerable attention to standardize this mode of communication and integrate it in the
ecosystem of LTE advanced. This will give more impetus to the development of D2D technologies and their adoption by
mobile operators. This paper presents a discussion and critical analysis of the main features of D2D communication as defined
in Release 12 and subsequent releases of 3GPP specifications.

Keywords Device-to-device (D2D) · 3GPP · LTE-direct · LTE-advanced · Cellular network · 5G

Introduction across the D2D users and the cellular users. To avoid this
problem, a new approach known as the overlay D2D com-
One of the biggest challenges faced by telecom operators is munication mode has been proposed that allows the D2D
the continuous increase in demand for high data rate and low users to use a certain fraction of cellular resources that is
end-to-end delay. One way to achieve it is through device-to- not assigned to the normal cellular users. The overlay mode
device (D2D) communication. D2D communication enables focuses on the effective resource allocation, so the spec-
direct communication between proximate devices bypassing trum wastage can be avoided. In terms of performance, D2D
the base station. As D2D communication promises ultra-low communication, when it is technically feasible, offers more
latency for communication among the users, it has attracted benefits compared to the conventional cellular communica-
great attention from researchers working on the forthcoming tion. First, it is a transparent communication technique and is
5th generation cellular networks [24, 25]. D2D communica- very efficient with a high spectral efficiency and low latency.
tion can operate using both licensed cellular spectrum and Therefore, managing local traffic becomes easy for the user
unlicensed spectrum; the two modes are known as in-band equipments (UEs) communicating directly in a given prox-
communication and out-band communication, respectively. imity. Computational offloading is one more benefit of D2D
In the first case, the D2D communication and the cellular communication. D2D users under a static network environ-
communication can both operate over the entire licensed ment can use D2D links to offload computation-heavy tasks
cellular spectrum; this is known as the underlay D2D com- to nearby D2D users [34]. In D2D communication, the mode
munication mode. But it leads to heightened interference selection technique allows the devices to switch from the
infrastructure path to direct path easily. This reduces the
congestion in the network. From an econometric point of
* Udit Narayana Kar
uditnarayankar@gmail.com view, D2D communication can play a big role in commercial
applications, social networking applications, e-commerce,
Debarshi Kumar Sanyal
debarshisanyal@gmail.com etc., where users can directly share the required information
locally [32, 31].
1
School of Computer Engineering, Kalinga Institute Researchers have proposed many novel applications
of Industrial Technology (Deemed to be University), and models for D2D communication. The 3rd Genera-
Bhubaneswar, Odisha 751024, India
tion Partnership Project (3GPP) has adopted a relatively
2
Indian Institute of Technology Kharagpur, simple architecture that fits easily in the existing long
Kharagpur 721302, India

SN Computer Science
Vol.:(0123456789)
37 Page 2 of 18 SN Computer Science (2020) 1:37

term evolution-advanced (LTE-A) ecosystem so it can be


adopted seamlessly by cellular operators. The integration
of D2D communication into LTE-A began with the 3GPP
Release 12. In the USA, this release has been adopted for
the next-generation public safety network with a 700 MHz
of dedicated spectrum allocated by Federal Communica-
tions Commission (FCC) [29]. The following releases
of 3GPP standards have enhanced the support for D2D
communication.
This paper gives an overview of the standardization of
D2D communication based on 3GPP Release 12 and sub-
sequent 3GPP releases. We describe the general features
of 3GPP releases in the context of D2D communication
in Sect. 2. Section 3 illustrates the use case scenarios. We
describe the reference architecture in Sect. 4, channel struc-
ture in Sect. 5, and the core features of D2D communication
as outlined in the 3GPP Release 12 in Sect. 6. We present a Fig. 1  3GPP Releases. The circles along the periphery show the
critical discussion in Sect. 7 and conclude in Sect. 8. 3GPP releases and the year (or tentative year) of publication of the
corresponding release. Blue circles indicate frozen releases, while
orange circles indicate open ones (color figure online)
Features of 3GPP Releases
The most important feature of Release 15 is the support for
General Features 5G radio systems. Work on Release 16 is in progress; it
aims to increase support of vertical industries such as V2X,
Standardization of technologies is very important as it public safety, and Industrial Internet of Things (IIoT) [37].
ensures their interoperability across products and services Although the 3GPP releases specify a bevy of features for
manufactured by different vendors. Standardization makes cellular communication, in the subsequent sections of this
the technology commercially viable [41]. The 3GPP stand- paper we concentrate on its D2D specifications exclusively.
ards organization develops protocols for mobile telephony.
It has made monumental contributions in developing and Features Specific to D2D Communication
maintaining telecommunications standards from 2G to 5G.
Figure 1 shows the current and upcoming 3GPP releases Key Motivations for D2D Communication
along with their year of release and current status. The initial
LTE architecture was standardized as 3GPP LTE Release 3GPP Release 12 focuses on developing a communication
8/9. Releases 8 and 9 both used a bandwidth of 1.4 MHz, framework to meet public safety needs that can be used by
3 MHz, 5 MHz, 15 MHz, and 20 MHz to support various police, fire fighters, ambulance drivers and other person-
deployment scenarios. LTE-advanced or LTE-A arrived nel handling emergency situations. The goal is to reduce
with 3GPP Release 10, which focused on enhancing the dependency on network infrastructure that can fail in times
network capacity using carrier aggregation techniques [20]. and areas of disaster, limit operational costs, and enable
It enhanced the overall bandwidth of existing cellular net- broadband communication. It supports two key technolo-
works by combining two or more component carriers for gies as explained below [9].
higher data rates [58]. Coordinated multipoint transmission
and reception (CoMP), and heterogeneous deployments 1. Proximity services (ProSe): Proximity services in 3GPP
(HetNet) are supported since 3GPP Release 11. Network Release 12 allow devices in physical proximity to dis-
capacity enhancement, increase in coverage area, cell cover each other and communicate in an optimized
coordination, and cost reduction are some of the impor- manner. They are essentially supported with D2D com-
tant enhancements in 3GPP Release 12. Along with that, munication that comprises D2D discovery and direct
3GPP Release 12 introduced D2D communication in the communication. In D2D discovery, a UE discovers
LTE-A architecture; its major targeted application is public another UE in its proximity. D2D discovery may be
safety. Release 13 added support for other D2D functions performed at the EPC level or done directly by the UEs.
and unveiled the first set of specifications covering mission In direct communication, two UEs that have discovered
critical services. Release 14 focused on mission critical each other communicate directly via the LTE air inter-
enhancements and LTE support for vehicular (V2X) service. face without routing the signal through the eNodeB

SN Computer Science
SN Computer Science (2020) 1:37 Page 3 of 18 37

(eNB) and the core network. This avoids network con- 2. Out-of-coverage: In this scenario, none of the UEs are
gestion and allows devices to communicate even when under the coverage of the eNB.
the network coverage is absent. Note that device discov- 3. Partial-coverage: In partial-coverage, some UEs are in
ery is not a prerequisite to direct communication as the coverage of the eNB while other UEs are not. UEs in-
latter can also happen through broadcasting. Proximity coverage communicate with UEs not under the coverage
services can be used for both public safety and com- of the eNB.
mercial applications.
2. Group communication: To meet public safety demands, 3GPP Release 12 supports D2D discovery for only in-
group communication is considered as one of the most coverage scenario in public safety and commercial use (i.e.,
important requirements. It provides services like one- non-public safety). Release 13 extends D2D discovery to
to-many calling that can easily disseminate messages all 3 scenarios in case of public safety. 3GPP Release 12
to a large group of people. 3GPP standardization and supports direct communication for all 3 scenarios. Note
releases have focused heavily on the enhancement of that direct communication between UEs occurs through
group communications techniques. Generally in group broadcast (without feedback channels) at layer 1. At layer
communication, all UEs in a group receive a common 2, destination UE identifier (in short, UE ID) is used for
downlink stream to communicate. Therefore, the overall unicast transmission and Group ID is leveraged for groupcast
resource utilization can be optimized. To enable effi- transmission.
cient and flexible group communication, 3GPP stand-
ardization activities have consistently paid attention to Other Characteristics of D2D Communication in 3GPP
optimized broadcast and multicast techniques. Note that
group communication can be achieved with D2D com- 3GPP Release 13 adds support for UE-to-network relay at
munication, or with existing or enhanced 3GPP mul- layer 3 as shown in Fig. 3. It helps to increase the coverage
timedia broadcast/multicast services (MBMS) in LTE/ of the network [30]. Release 13 also introduces ProSe per
LTE-A. packet priority (PPPP) to support QoS across traffic streams.
The subsequent 3GPP releases study how D2D links can
Scenarios for D2D Communication be exploited for other applications like IIoT and how their
quality can be improved.
3GPP Release 12 defines features that support D2D com-
munication with or without the help of eNB and the core
network. In particular, three coverage scenarios are consid- D2D Use Cases
ered as shown in Fig. 2.
3GPP Release 12 discusses D2D communication as a
1. In-coverage: In this type of communication, all UEs are mechanism for proximity services (ProSe) and formulates
in the coverage of the eNB. procedures for D2D discovery and D2D communication.
As shown in Fig. 4, D2D use cases encompass both public
safety use and commercial applications. Group communica-
tion, a prominent feature of the public safety use case, is one

Fig. 3  Relay-aided D2D communication scenarios supported in 3GPP


Fig. 2  D2D communication scenarios supported in 3GPP Release 12 Release 13

SN Computer Science
37 Page 4 of 18 SN Computer Science (2020) 1:37

Fig. 5  MUCC communication (from [36])

Fig. 4  Use cases for D2D communication in 3GPP Release 12 enabled UEs about their proximity. 3GPP Release 12 also
allows network-independent discovery of UEs where they
perform the discovery procedure autonomously, without
of the thrust areas in 3GPP standardization and D2D is one assistance from the network. Therefore, it is useful when
way to achieve it. D2D communication between UEs may both UEs lie outside the network coverage.
be 1:many or 1:1. In 1:1 communication, a device trans- • Switching between two different communication paths:
mits data directly to a specific receiver, whereas 1:many is a This is a very important use case of 3GPP Release 12. In
groupcast or group communication service between devices this case, the operator can easily switch the user traffic
[41]. from an infrastructure path to a ProSe communication
As far as D2D communication scenarios are concerned, path. Therefore, all the proximity criteria can be dynami-
various new terminologies are defined under 3GPP Release cally controlled by the operator.
12 [4, 51]. Some of the most important terms are • ProSe-Based WLAN and WiFi-Direct: In this use case,
there is a direct communication between ProSe-ena-
• ProSe-Enabled UEs: ProSe-enabled UEs are the UEs bled UEs and WLAN under WiFi-Direct communica-
which support the requirements and procedures for tions. Here, the operator can switch the network session
proximity services as defined in 3GPP Release 12. They between infrastructure path and WLAN ProSe commu-
may be associated with both public safety and non-pub- nication path.
lic safety applications. The ProSe-enabled public safety
UEs can be used for both public safety and other ProSe Apart from public safety, various other use cases for D2D
services, whereas ProSe-enabled non-public safety UEs communication are envisaged in the 3GPP standards. We
cannot be used for public safety ProSe services. enlist some of them below.
• ProSe discovery: ProSe discovery is a mechanism in
which a UE discovers other UEs in a given proximity • Multiuser cooperative communication (MUCC) in Het-
using Evolved UMTS Terrestrial Radio Access Net- Nets: a simplified diagram of MUCC is given in Fig. 5.
work (E-UTRAN). This ProSe discovery can be either In this case, there are two users categorized as the ben-
open discovery or restricted discovery. In open dis- efited user and the supporting user. The benefited user
covery mechanism, UEs discover each other without lies under a weak network signal, whereas the supporting
any authorization. In restricted discovery mechanism, user is under a strong network signal; the latter helps
UEs need to acquire permissions to discover the nearby the former in improving its signal. There are two paths
devices. Similarly, network-assisted ProSe discovery is defined, one is from the benefited user to the eNB and
a mechanism where the mobile network operator verifies another from the supporting user to the small cell. The
if the UE is authorized to discover another UE or not. benefited user and the supporting user communicate with
The assistance is provided by the Evolved Packet Core each other using LTE-A D2D communication.
(EPC) and the mechanism called EPC-level ProSe dis- • D2D offloading: D2D provides opportunistic data off-
covery since the EPC determines and informs the ProSe- loading facility that can reduce the overall network over-

SN Computer Science
SN Computer Science (2020) 1:37 Page 5 of 18 37

head. This also allows the network operators to save the   The main aim is to retain the connectivity between the
spectrum resources and optimize the downlink transmis- remote devices like sensors or smart wearables and the
sion overhead for the network operators. If one UE with network through a relay-assisted D2D communication.
a poor channel conditions identifies a neighboring UE • Maritime communication: Activities on 3GPP Release
in its close proximity with a good channel condition, the 16 focus on the development of a maritime communica-
former can offload its data to the latter using D2D com- tion system known as LTE-Maritime. The overall cov-
munication and data can be relayed further with the help erage area will be up to 100 kilometers and there will
of cellular communication [43, 44]. be seamless communication between the existing 3GPP
• V2V communication and V2X communication (LTE-V): system and the maritime radio communication system.
In 3GPP standardization, D2D-based V2V network is It will also support voice communication and data com-
an active area of investigation. A feasibility study has munication between different vessels at sea [19]. This
been conducted in Release 13. A vehicle running at high inter-vehicular communication can occur using D2D
speed can warn nearby vehicles using D2D links before communication technology.
it changes the lane. Depending on the received message,
the nearby vehicles can slow down and avoid accidents.
Based on the Release 12 sidelink communication pro- Reference Architecture for D2D
tocols, Release 14 specified V2X communication in the Communication
year 2017. V2X in 3GPP release 14 supports vehicle-
to-vehicle (V2V), vehicle-to-pedestrian (V2P), vehicle- Figure 6 gives a detailed architecture of 3GPP Release 12
to-infrastructure (V2I) and vehicle-to-network (V2N) that identifies the main components and the reference points
communication [14]. Both cellular communication and of the system. Some of the most important entities of the
D2D communication are part of LTE-V services. Vehicle given architecture are
platooning, automated and remote driving are some of
the extended features of V2X communication supported 1. ProSe App server: The ProSe App server consists of the
by 3GPP release 15. In comparison to conventional cel- basic capabilities of ProSe (e.g., public safety answering
lular communication, the LTE-V is somewhat different point or PSAP) used for public safety or various com-
in terms of deployment and traffic characteristics. Inter- mercial use cases. The application server can directly
ference coordination, collision avoidance, and efficient communicate with an application defined in UE and it
resource allocation are some of the biggest challenges in is generally defined outside of the 3GPP architecture.
LTE-V communication. 2. ProSe UE App: It is an application in a UE that can use
• Security in data communication: D2D communication ProSe capability.
allows uses to receive data that are saved in the nearby 3. ProSe Function: The ProSe Function acts as the refer-
trusted UEs. This avoids accessing potentially insecure ence point for ProSe App Server, EPC and UEs. Verifi-
links to third-party databases like those in the cloud. cation, authorization and configuration of UEs are the
Hence, it can provide a great deal of security. basic functionalities of ProSe Functions. It also allows
• Machine type communication or MTC: D2D commu- EPC level discovery for direct communication between
nication protocols specified in LTE-A 3GPP standards devices.
provides a promising solution for MTC. 3GPP Release
13 and above allow cellular operators to multiplex the As discussed in Sect. 3, the use cases for D2D commu-
bandwidth between MTC devices and regular devices nication not only support public safety services but also
[45]. can be very helpful for social and commercial applications.
• Indoor installation and positioning: Indoor positioning is Release 12 supports urgent D2D communications especially
one of the key features in 3GPP Release 13. Earlier the for public safety communications. Some of the important
accuracy level of indoor positioning was low and it was functionalities are
a great concern for the operators. Basically, in indoor
conditions multipath propagation is difficult. Therefore, 1. It gives the complete permission to the Home Public
3GPP is consistently working to facilitate both location land mobile network (HPLMN) operator to authorize
service and mission critical voice service on LTE devices all the ProSe-enabled UEs to use the ProSe communica-
based on the ProSe D2D standard. tion path separately for HPLMNs and visited public land
• Enhancement of D2D for UE-to-network relaying: The mobile networks (VPLMNs).
3GPP release 15 focuses on the enhancements of D2D 2. The architecture of 3GPP Release 12 is so well designed
communication for network relaying. that it can control the ProSe-enabled UEs communicat-

SN Computer Science
37 Page 6 of 18 SN Computer Science (2020) 1:37

Fig. 6  D2D architecture in


3GPP specification

ing together, irrespective of whether they are being coverage and partial-coverage. PC5 supports sidelink
served by the same eNB or different eNBs. transmission at layer 1.
3. It grants permission to the operator to authenticate and 7. PC6: If the UEs are registered under different PLMNs
authorize the third-party applications before they use the and with multiple ProSe Functions, then the D2D dis-
ProSe features. covery mechanism can be done using the PC6 inter-
face.
Therefore, to support the above conditions various reference 8. PC7: It is the interface between different ProSe func-
points are given in the architecture shown in Fig. 6. tionalities in the visiting PLMN and the home PLMN.
It also helps the home PLMN to handle the authoriza-
1. PC1: In D2D communication, various types of ProSe tion of ProSe services.
applications can be installed and used in a UE. The 9. PC8: The PC8 interface is used for ProSe Function
PC1 interface allows the ProSe applications to in HPLMN to configure D2D communication of UEs.
exchange data with the ProSe application server. It acts as an interface between the ProSe Function of
2. PC2: The PC2 interface normally allows ProSe Func- HPLMN and a roaming UE.
tion to update its ProSe application data for ProSe 10. S1: It is the interface between the eNB and the EPC.
database. This will help the EPC to support all the 11. SGi: SGi is the interface used for exchange of applica-
ProSe functionalities used for direct communication. tion level data and control information between the
3. PC3: The PC3 is the reference point between the UE EPS and the ProSe application server.
and ProSe Function; it acts as an interface for D2D
discovery and communication. If due to any reason two Thus, UEs communication between a pair of UEs is executed
devices are connected to different PLMNs, the D2D over the PC5 interface. If a UE is out of the coverage area of
discovery mechanism will completely rely upon PC3. eNB, but the signal strength is good enough for the UEs to
4. PC4: The communication between the ProSe Func- communicate with each other, then they can exchange data
tion and the EPC occurs through PC4. Session control directly among themselves by creating an ad hoc network;
and mobility management are also handled by the PC4 here, UEs communicate using a lower level interface called
interface. PC5ah [30].
5. Uu: The Uu interface supports uplink and downlink
transmissions between the eNB and a UE.
6. PC5: To enable direct communication between a
pair of UEs, the PC5 interface is used. It allows D2D
communication in scenarios like in-coverage, out-of-

SN Computer Science
SN Computer Science (2020) 1:37 Page 7 of 18 37

Basic Channel Structure

In the previous section, we have seen that UEs can com-


municate directly with each other using the sidelink (SL)
(which corresponds to the PC5 interface in terms of the ref-
erence architecture). It is a new feature in 3GPP Release 12
and is distinct from the uplink (UL) and downlink (DL) on
the Uu interface over which a UE communicates with the
eNB.

Reuse of Uplink Resources

The SL supports a new set of physical signals, physical chan-


nels, transport channels, logical channels, and messages.
Since a UE transmits on the SL, the latter closely resembles
the UL. Before we discuss the details of SL, we note that Fig. 7  D2D channel structure
broadcast in D2D communication reuses the Physical Uplink
Shared Channel (PUSCH) through the eNB-UE (Uu) link in
LTE. The reasons are as follows. When the eNB is receiv- forms more efficiently (e.g., power consumption and
ing data in PUSCH from a UE, another UE in proximity can interference would be low) than if they are not synchro-
engage in direct communication with its peer if the interfer- nized. The primary/secondary synchronization signal
ence caused at the latter is not too high. The interference (PSS/SSS) is the synchronization signal sent out by the
that the transmitter UE in D2D communication causes at the eNB in LTE, and is also used as synchronization sig-
eNB can be handled by the latter as it is considerably more nal for D2D communication if the UEs are within the
powerful. Instead, if D2D communication reuses the Physi- eNB coverage. Instead, if both the UEs are not inside
cal Downlink Shared Channel (PDSCH), the D2D UE trans- the eNB coverage, they can still synchronize to the
mitter will produce high co-channel interference to the UE Primary/Secondary Sidelink Synchronization Signals
receiving data on the downlink from the eNB. Moreover, UL (PSSS/SSSS) transmitted by one of the UEs; if one of
frames are usually less utilized than DL frames. So using the the UEs is in network coverage, it can send PSSS/SSSS
UL will increase spectral efficiency. PUSCH uses single car- based on the eNB synchronization signal. The eNB or
rier frequency division multiple access (SC-FDMA) whereas the UE that transmits its own synchronization signal is
PDSCH uses orthogonal frequency division multiple access called a D2D synchronization source. The PSSS/SSSS is
(OFDMA) that has a higher PAPR than that of SC-FDMA. sent out on the PSBCH. The PSBCH from a UE is also
Hence, using PUSCH incurs lower power consumption [30]. used to broadcast information like the ID and type (i.e.,
The downside is that constructing an SC-FDMA receiver is whether it is eNB or UE) of the synchronization source,
more difficult than constructing an OFDMA transmitter as the system bandwidth, the TDD or FDD configuration,
the former needs a complex equalization. An important type the frame and subframe number of the synchronization
of signal is the DeModulation Reference Signal (DMRS), signal, and whether the UE lies in network coverage.
transmitted on a fixed symbol position in each slot (in time 2. Physical Sidelink Discovery Channel (PSDCH): A UE
domain) of PUSCH, that a receiver UE uses to estimate discovers another UE in its proximity with the discovery
the channel. DMRS signals are also associated with the SL signal in layer 1, transmitted via the PSDCH. Note that
channels defined below (Fig. 7). the discovery procedure is initiated by the application
layer of a UE. The radio resources for transmitting the
discovery signal may be shared by all UEs or may be
Physical Channels allocated on a per-UE basis by the eNB. Only the first of
the two methods can be used when the UEs are outside
The physical channels or layer 1 channels that are part of the eNB coverage.
the SL are 3. Physical Sidelink Control Channel (PSCCH): PSCCH
is responsible for uplink transmission control. The D2D
1. Physical Sidelink Broadcast Channel (PSBCH): If the transmitter transmits a sidelink control information
eNB and the UEs in a cellular network are synchronized (SCI) that includes modulation and coding schemes, the
to the same timing reference, the network usually per- frequency hopping flag, the resource block allocation,

SN Computer Science
37 Page 8 of 18 SN Computer Science (2020) 1:37

the hopping resource allocation, and the timing assistant Logical Channels
to differentiate between the uplink time and downlink
time [40]. 1. Sidelink Traffic Channel (STCH): Side link traffic chan-
4. Physical Sidelink Shared Channel (PSSCH): A UE nel is a point-to-multipoint logical channel that is used
sends data to other UEs in D2D communication via to transfer user information from one UE to other UE.
the PSSCH. The PSSCH follows the PSCCH in time 2. Sidelink Broadcast Control Channel (SBCCH): SBCCH
domain. The SCI message transmitted in the PSCCH is a logical channel that broadcasts the sidelink system
announces the PSSCH resources where the data trans- information from one UE to another UE.
mission will occur. For in-coverage UEs, PSSCH
resources may be allocated by the eNB, or selected ran-
domly and autonomously by the UEs from a resource Important Features of D2D Communication
pool pre-configured by the eNB for this purpose. In case in 3GPP
of out-of-coverage UEs, PSSCH resources are chosen
randomly by the UEs from a resource pool. There is a To enable efficient direct transmission between two UEs,
possibility of conflict when resources are chosen autono- it is very important that they are synchronized and can dis-
mously by the UEs. cover each other easily. Hence, D2D synchronization, D2D
discovery, and direct communication are the most important
features in 3GPP specification. In this section, we explain
Transport Channels them in detail.

1. Sidelink Broadcast Channel (SL-BCH): SL-BCH is the D2D Synchronization


transport channel that maps to the PSBCH in the physi-
cal layer. The SL-BCH carries some important informa- The synchronization procedure for D2D communication
tion needed for out-of-coverage devices to setup side- in 3GPP Release 12 consists of a few simple steps [30]:
link connectivity. The required information is carried (1) After a UE powers on, if it detects a synchronization
through Sidelink Master Information Block (SL-MIB). signal (PSS/SSS) from an eNB, it synchronizes to it. (2)
The information carried out in SL-MIB consists of car- Otherwise, if it detects synchronization signals (PSSS/SSSS)
rier bandwidth, TDD configuration, transmitted frame and PSBCH from other UEs, it synchronizes to the signals
number and in-coverage indicator [8]. from one of them. (3) Otherwise, it becomes a D2D syn-
2. Sidelink Shared Channel (SL-SCH): SL-SCH follows chronization source and transmits synchronization signals
the same techniques as downlink shared channel. It is a and PSBCH. The first case occurs when the UE is under the
transport that may have chances of collision depending coverage of an eNB while the other cases occur if the UE is
upon the resources assigned through eNB. It also inter- not under the coverage of an eNB. In case (1), if a UE has
faces physical sidelink shared channel, that transports synchronized to an eNB but has detected synchronization
data from air. signal and PSBCH from a UE (as indicated by the source
3. Sidelink Discovery Channel (SL-DCH): The SL-DCH type in the synchronization signal), it understands that there
belongs to the transport layer of basic channel structure is an out-of-coverage UE that is acting as a synchronization
of sidelink communications and is used for discovery source. Hence, it becomes a D2D synchronization source
announcements. It is directly mapped with PSDCH in itself so the out-of-coverage UEs can synchronize to the
physical layer [8]. Depending on the sidelink transport eNB. The above cases are illustrated in Fig. 8.
format, the sidelink physical layer processing is con-
figured and processed by the UE. The basic function D2D Discovery
of SL-DCH is the scheduling of resource allocation. If
the scheduled resources allocation of SL-DCH is non- A UE has to discover a neighboring UE in close proximity
autonomous, then the complete scheduling is done by before it can communicate with it directly. Alternatively,
the network side, else the scheduling is done by the UE D2D discovery can be used as a standalone service enabler,
side [11]. e.g., it can be used to get information like whether there is a
4. Sidelink Control Information (SCI): The SCI gener- vehicle nearby; once the appropriate information is discov-
ally carries all the relevant information required for the ered from a nearby UE, the discoverer can use it for other
receiving UE. It also helps the UE in demodulating the applications provided it is permitted to do so. Device dis-
physical sidelink shared channel (PSSCH). covery is essentially an application layer procedure where
specific messages are exchanged between two UEs. At
layer 1, UEs use PSDCH for device discovery. The device

SN Computer Science
SN Computer Science (2020) 1:37 Page 9 of 18 37

As shown in the Fig. 9, UE A makes a proximity request,


i.e., a request to be alerted with the proximity of UE
B. In response to the request of UE A, ProSe Function
A requests the Secure User Plane Location Platform
(SLP)-A about the location updates of both UE A and
B. To generate the location of UE B, ProSe Function A
contacts ProSe Function B. The generated report is then
forwarded to the EPC. The EPC informs the requesting
devices about their proximity and initiates a proximity
alert in PC3 interface [12, 40]. Clearly, the main task
here is to analyze the location of UEs in the network and
alert the corresponding the interested users. This task is
managed by the EPC. Thus, EPC-level device discov-
ery reduces periodical announcements for the UEs and,
hence, their power consumption. The above network-
assisted discovery mechanism can work only if network
Fig. 8  D2D synchronization
coverage is available. When coverage is not available,
direct discovery may be performed.
2. Direct discovery: The network-assisted discovery mech-
discovery techniques are categorized into the following two anism can work only if network coverage available. If
types based on whether the eNB assists it. the network access fails the D2D discovery procedure
cannot sustain [60]. Hence, to overcome such type of
1. Network-assisted discovery or EPC-level discovery: In problem direct discovery mechanism has been provided
EPC-level discovery, the eNB acts an entrusted facilita- in 3GPP Release 12. The direct discovery procedure can
tor in determining the proximity of UEs. The proximity work for both in-coverage and out-of coverage scenarios.
of the UEs is derived from the frequent location updates. It is the procedure by which a UE detects and identifies

Fig. 9  D2D EPC-level discov-


ery (from [40])

SN Computer Science
37 Page 10 of 18 SN Computer Science (2020) 1:37

another UE physically close to it, using E-UTRA direct tion broadcasts a message containing the infor-
radio signals. Depending on whether the discoverer mation it needs. Another UE that receives the
needs explicit permission from the discovery, it is of message can respond to the discoverer with the
two types: relevant information as shown in Fig. 11.

(a) Open discovery: No special authorization is


needed by the discoverer UE from the remote UE Generally, the transmission and reception of the discovery
being discovered. packets in D2D communication are very complex. This is
(b) Restricted discovery: For discovering the remote because of the size of the discovery packets. If the size of the
UE, explicit permission is needed by the discov- discovery packet is small, the UEs may be able to transmit
erer from the remote UE. certain sequences of discovery information. Even though
for the smaller packets, the information regarding the UEs
  In direct discovery, there are two discovery models— may be limited but the complexity is relatively low. If the
Model A and Model B—and corresponding messages discovery information packet is too large, sending periodical
for device discovery. beacons may be too difficult for the UEs. Hence, the trans-
mission of larger discovery packets is difficult task.
(a) Model A (“I am here”): In this model, the
announcing UE broadcasts the discovery mes- Direct Communication
sages at predetermined intervals of time. Monitor-
ing and announcement are two important steps in 3GPP standards describe the procedures for direct communi-
direct discovery. In the announcement procedure, cation for in-coverage, partial-coverage, and out-of-coverage
the UEs intended to discover the nearby devices scenarios. The control signals for direct communication are
announce the required information. The other UEs exchanged using PSCCH, while the data are transmitted using
in the given proximity with discovery authoriza- PSSCH via the PC5 interface at layer 1. The communication
tion can use this information. The interested users can be 1:1 (i.e, unicast) or 1:many (i.e., broadcast and group-
can monitor and process them as shown in Fig. 10. cast). In 1:many communication, groupcast is supported with
Model A supports both open and restricted discov- a destination Group ID at layer 2. Further, 3GPP Release 13
ery mechanisms. supports UE-to-network relay at layer 3; this two-hop com-
(b) Model B (“who is there?” / “are you there?”): In munication helps extend the coverage of a network. UE pro-
this model, the UE that needs to discover informa- visioning for direct communication requires several network

Fig. 10  D2D direct discovery


Model A for in-coverage sce-
nario (from [40])

SN Computer Science
SN Computer Science (2020) 1:37 Page 11 of 18 37

Fig. 11  D2D direct discovery


Model B for in-coverage sce-
nario (from [40])

Critical Discussion

The technical specifications provided in 3GPP standards are


very well organized and globally approved. After a deep
survey on recent standardization efforts, we find that they are
many critical issues and scope of improvement in D2D com-
munication. We also highlight the benefits that D2D com-
munication can afford in the upcoming 5G cellular network.

Important Issues in D2D Communication

In this subsection, we discuss various challenges in D2D


communication [6, 50].

1. User mobility: To handle the mobility in D2D com-


munication, a lot of time has been invested in profi-
cient handoff (or handover) selection. Handoff can be
Fig. 12  1: many direct traffic in D2D Communication (from [12]) categorized into two types: (1) horizontal handoff and
(2) vertical Handoff. Horizontal handoff takes place
within the same type of network and is dependent on
the signal strength of the eNB. If the signal strength
goes below a given threshold value, horizontal hando-
ver takes place. Vertical handoff takes place when user
parameters like ProSe layer-2 Group ID, ProSe Group IP mul- moves across networks, for example, from WLAN to
ticast address, security parameter for group communication, cellular connectivity to access the Internet. It can either
whether the UE is authorized to perform direct communica- be either network initiated or user initiated [21]. Under
tion when out-of-coverage, and the radio parameters to use a dense heterogeneous network where mobility is very
when the UE is out-of-coverage. The network performs the high, vertical handover depends on the controlling and
provisioning when the UEs are in-coverage. To handle out-of- signalling frequencies that a UE needs to operate. For
coverage scenarios, values for these parameters may be stored UEs to function using controlling and signalling fre-
in the device or the USIM (Fig. 12). quencies quickly deteriorates the signal to noise ratio

SN Computer Science
37 Page 12 of 18 SN Computer Science (2020) 1:37

(SNR) and so is the performance. Hence, selection of 4. Hybrid Automatic Repeat Request (HARQ) proto-
appropriate handover criteria is still a question. The col: HARQ protocol is the combination of Automatic
standardization mechanism should focus on developing Repeat Request (ARQ) and forward error correction. In
appropriate handover criteria for D2D communication. D2D communication, both direct and indirect HARQ
Generally in D2D communication, UE mobility pos- can be used [35]. In indirect HARQ, the D2D receiver
sesses significant challenges. This is because constant transmits the ACK to the eNB. The eNB relays the
mobility increases the Doppler spread. It can also same message to the D2D transmitter. This increases
affect the temporal correlation of shadowing as well the overhead of the network. In case of direct HARQ,
as the fast fading techniques used for communication. the D2D receiver transmits the ACK to the D2D trans-
Therefore, 3GPP standardization techniques should mitter directly; however, the uplink and downlink
focus on user mobility for efficient D2D communica- channels cannot be utilized. D2D standardization ini-
tion where the energy consumption can be minimized tiatives should focus on incorporating HARQ protocol
and the lifetime of devices can be enhanced. in D2D communication so that the robustness of D2D
2. D2D synchronization: In the in-coverage scenario, it is communication is enhanced.
sometimes difficult to achieve complete synchroniza- 5. Resource allocation: Generally efficient resource allo-
tion. This is because there may be multiple D2D links cation schemes and the reuse of resources enhance
available and it is confusing to choose between uplink the scalability of D2D network. If resources can be
time and downlink time for D2D transmission. Due to managed effectively, the power consumption can be
different distances of various UEs from an eNB and the minimized, the throughput can be enhanced, and the
availability of multiple eNBs, none of the uplink time interference can be reduced. Both orthogonal and non-
and downlink time guarantees a complete synchroni- orthogonal resource allocation schemes are easier to
zation. Synchronization in out-of-coverage scenario is manage in static conditions than in dynamic condi-
even more difficult as it needs periodic transmission tions. Public safety communication typically uses
of synchronization signals from UEs, which increases dedicated resources (spectrum), while commercial
the power consumption of the UEs. There are chances D2D services share the spectrum with cellular users.
of UEs in out-of-coverage not being synchronized; if a The problem of resource allocation gets more com-
UE that is being searched for by a discoverer UE is not plicated in a dense network where many base stations
synchronized with the discoverer, i.e., the synchroniza- are involved. Involvement of multiple number of base
tion information is not available before discovery, the stations makes it more difficult for D2D users to share
discovery is likely to fail. the underlay spectrum [21, 38]. Therefore, upcom-
3. D2D discovery signal: D2D discovery signal can be ing releases in 3GPP standardization should focus on
sequence-based in which limited information is con- developing a versatile resource allocation strategy that
veyed, or packet-based in which synchronization infor- can be adopted under various network conditions.
mation is not limited but the transmission scheme is 6. Mode selection: D2D-capable users in a cellular net-
very complicated. In terms of the discovery mecha- work can communicate using D2D mode or infrastruc-
nism, device discovery is classified into two types: ture mode (i.e., conventional cellular communication
EPC-level discovery and direct discovery. EPC-level using eNB) [16]. In D2D mode, cellular and D2D users
discovery is a centralized discovery mechanism where can share resources (reuse mode) or can have their own
the message flow is handled by the eNB. In direct dis- dedicated resources (dedicated mode). Mode selec-
covery which is a distributed approach, the message tion is a mechanism by which D2D users choose an
passing scheme is handled by the devices directly and appropriate mode of communication. Mode selection
there is no involvement of eNB [21]. In direct discov- criteria for D2D communication are not clearly defined
ery, a pilot signal is transmitted by the UEs to dis- in 3GPP standards. Mode selection possesses several
cover the nearby UEs in given proximity. For network- challenges. We detail two of them below:
assisted discovery, the transmission power of the pilot
signal depends on the range of the D2D users inside a (a) High overhead: The selection of the mode of com-
given cell [36]. However, continuous transmission of munication depends upon various factors like
discovery messages affects the performance of D2D channel quality, distance, and channel state infor-
communication as it consumes power and may lead mation. Every time the channel quality alters, the
to interference with other devices present in the same mode of communication could potentially change.
cell. Standardization mechanisms should focus on But frequent alteration of modes generates an
appropriate scheduling of pilot signals so that other enormous amount of overhead in the network;
devices in the cell are not affected.

SN Computer Science
SN Computer Science (2020) 1:37 Page 13 of 18 37

therefore, mode switch is generally activated compared to the D2D users, there is a strong interfer-
infrequently [21, 38]. ence to D2D users.
(b) Mode selection in dynamic conditions: Most of
the existing literature focuses on mode selection   Similarly, if multiple D2D users under a given cell
in a static networking environment. The selec- share the same resources, there will be co-channel
tion of the mode of communication under highly interference from the transmitting D2D user of one pair
dynamic conditions is more complex and needs to to the receiving D2D user of another pair [33]. There-
be adequately explored [38]. fore, interference between cellular users and D2D users
holds a great risk. In in-band D2D communications,
7. Interference management: In in-band communication, there are several approaches proposed by the research-
cellular and D2D links can interfere with each other, ers to avoid the interference. We have enlisted some of
depending on the frequency sharing mechanisms [38]. them below.
We illustrate the situation in Fig. 13 where UE1 (D2D
transmitter) and UE2 (D2D receiver) are in close prox- (a) Power control: At higher transmission power, the
imity and intend to communicate using a direct link. D2D users can cause significant interference to
For communication, the devices can reuse the licensed cellular communication. If there is interference
spectrum allocated for the cellular user. In this type from D2D UEs to cellular UEs, the power of the
of scenario, the connection establishment between D2D UEs can be reduced to mitigate the interfer-
UE1 and UE2 will be controlled by the eNB. Higher ence [33, 54]. The power control mechanisms can
spectral efficiency and lower power consumption are be used in both static and dynamic manner. In the
some of the benefits in a scenario. We describe the static case, the power and signal-to-interference-
interference scenario depicted in Fig. 13. Interference plus-noise-ratio (SINR) stay fixed for D2D users,
is caused by D2D users to cellular user and vice versa. whereas in dynamic state, open loop power con-
When UE1 transmits data to UE2, the eNB may also trol and closed-loop power control schemes are
broadcast data to the cellular UE. In such a condition, provided. In the initial scheme, the D2D users can
two types of interference arise fine-tune the power based on some of the prede-
fined system parameters as mentioned in [53]. In
• Case 1: There will be interference from UE1 to cel- closed loop power control scheme, the D2D users
lular UE. It is also quite possible that the UE2 may can adjust their power in coordination with the
face interference due to eNB. This affects the overall eNB. An in-depth study of power control schemes
performance of the network. Both D2D users and provided in [38]. The power control scheme com-
cellular user suffer due to interference. The transmis- bined with efficient mode selection technique
sion power of the UE1 is much lower as compared to and resource allocation mechanisms can be more
eNB; therefore, the interference from UE1 to cellular effective in avoiding the interference in D2D ena-
UE will result in inconsequential loss in terms of bled cellular communications.
performance but UE2 will be significantly affected. (b) Mode selection: Mode selection can play a vital
• Case 2: While sharing the downlink resources, the role in avoiding the interference from D2D UEs
eNB acts as an aggressor. As eNB is more powerful to cellular UEs and vice versa. Although the D2D
users may be in close proximity, looking at the
level of interference, operation in the D2D mode
may not be the best idea. The mode selection
scheme allows the D2D users to choose the best
mode of communication under a cellular net-
work. The multiple D2D pairs operating under
the same cell using D2D mode of communication
use the same frequency resources. Hence, there is
an interference between the D2D users. To over-
come such a problem, the D2D users can evaluate
the D2D spectrum and fix an energy consump-
tion threshold. If the evaluated energy goes below
the threshold, the D2D users can communicate
using D2D mode, else they can go to the cellular
Fig. 13  Interference between D2D and cellular transmissions mode of communication [7]. Mode selection is

SN Computer Science
37 Page 14 of 18 SN Computer Science (2020) 1:37

an integral part of D2D communication. Various can operate almost over the whole coverage area of
approaches for selection of an appropriate mode the eNB (except where other devices using same unli-
of communication, interference avoidance using censed band are in operation). At the same time, it
modes selection and recent advances of mode can achieve an improved network-wide capacity [52].
selection in D2D communication are presented in 3GPP Release 13 includes study item (SI) to study the
[16, 21, 38]. feasibility in LTE-A to apply and enable LAA applica-
(c) Spectrum splitting: In a D2D enabled cellular tion in unlicensed spectrum, and work item (WI) that
communication, spectrum splitting is one of the specifies the LTE enhancements to be applied in unli-
simplest mechanisms to avoid interference. Divid- censed spectrum [1, 13, 26].
ing the spectrum into two parts where one part is 9. MIMO: MIMO can help enhance the spectral efficiency
dedicated to the D2D users and another part is in LTE-A. Although MIMO with up to 8 antenna ports
dedicated to cellular users can reduce the interfer- is common, 3GPP Release 13 introduced Full Dimen-
ence among the cellular users and D2D users [46]. sional MIMO (FD-MIMO) which utilizes up to 64
Spectrum splitting mechanism does not work well antenna ports at the transmitter side [22]. FD-MIMO
when multiple D2D pairs communicate under the is hailed as an important enabling technology in the
same cell using the same resources. evolution from 4G to 5G [28]. Implementation of large
antenna arrays at eNB can allow the D2D users and the
  Apart from power control and mode selection cellular users to transmit simultaneously at the same
schemes, several other approaches like radio resource time–frequency resources without interference [15].
allocation, implementation of multiple input multiple 10. Superposition coding: wireless systems have tradition-
output (MIMO) and enhanced antenna schemes, joint ally used orthogonal multiple access techniques like
mode selection and power allocation, and channel con- frequency division multiple access, time division mul-
trol are available to avoid interference in in-band D2D tiple access, etc. In non-orthogonal multiple access,
communication. [16, 21, 33, 38]. In out-band com- UEs transmit using non-orthogonal resources. This
munication, D2D users operate using unlicensed spec- increases the spectral efficiency but there is a chance
trum. Here, the communication between the D2D users of interference at the receiver. 3GPP Release 13 has
can either be network assisted or autonomous. One of identified LTE enhancements to enable downlink mul-
the major benefits of out-band D2D communication is tiuser superposition transmission [10], which uses the
that there is no interference between D2D users and concept of superposition coding. For example, if there
cellular users. However, WiFi and Bluetooth operate are two UEs, one at the cell center and the other at the
in the same unlicensed spectrum. Simultaneous opera- cell boundary, the downlink transmissions to both of
tion of multiple entities at the same frequency band them can be scheduled using the same beam. However,
generates interference. Under LTE-Unlicensed (LTE- the transmit power allocated in the first case is lower
U) spectrum, interference avoidance using clear chan- than that in the second case. One way to use superpo-
nel assessment (CCA) or listen before talk (LBT) has sition coding in D2D communication is to make the
been presented in [52]. The suggested mechanism says D2D link act as an in-band relay to cellular link [47],
that an unlicensed D2D UE before transmitting should i.e., the D2D link shares the radio resources with a cel-
perform a carrier sensing mechanism. By doing this, lular downlink. A D2D transmitter acting as an in-band
the unlicensed UE can identify the other users operat- relay can transmit its own data linearly combined with
ing on the same channel. The UE measures the energy the data from the eNB for a remote cellular user who
level of the channel due to other unlicensed UEs. If the is far away from the eNB. This technique can improve
energy level is lower than a threshold, the UE transmits both spectral efficiency and network coverage.
a channel occupancy time (COT), else it waits for a 11. Security: Security in D2D communication is one of the
random period of time after which it retries. most important aspects that need a consistent focus.
8. LTE-U or LTE Licence-Assisted Access (LAA): In comparison to traditional cellular communication,
Licensed spectrum and operation control provide D2D communication is highly vulnerable to security
advanced services and good user experience in mobile threats because D2D communication bypasses the core
communications. However, D2D communication in network. It is prone to various security attacks like
licensed band using the cellular UL/DL resources eavesdropping, man-in-middle, and impersonation. In
cannot operate close to the eNB as the eNB transmits network-assisted D2D communication, cellular opera-
with high power on the DL, and near the cell edge tors can provide security to the D2D users. But for
where the UEs transmit with high power on the UL. D2D users outside the coverage area, it is difficult to
In contrast, if D2D communication uses LTE-U, it provide desired security measures. In such scenarios,

SN Computer Science
SN Computer Science (2020) 1:37 Page 15 of 18 37

relay-assisted D2D communication can be used and in each route. The protocol also provides support
the security signals can be relayed from the eNB to for non-repudiation and user authentication. For
the D2D users. However, the relayed signals might be a secured unlicensed D2D communication in 5G
vulnerable to security attacks. In 3GPP standardiza- communication, a combined operation of routing
tion, the discussion related to security is very limited control and group key management is presented
although many researchers have advanced various in [23]. The proposed approach uses the home IP
schemes to address the security needs of D2D com- address of the ad hoc nodes to manage the group
munication. In particular, D2D users must satisfy key and performs authentication using the public
the basic security requirements such as confidential- key infrastructure of cellular networks.
ity, authorization, non-repudiation, availability, and
dependability [18, 55, 56]. We have enlisted some of   Most of the D2D security-related proposals in the
the proposed schemes below. literature deal with specific security issues and are
not integrated into a single protocol. Especially for
(a) Key management: Key management scheme is out-of-coverage scenario, most of the algorithms pro-
one of the common cryptographic mechanisms posed are quite equivalent to the security algorithms
used in network security. To attain a secured data for MANETs and wireless sensor networks [17]. Pri-
communication between two D2D users in an vacy preservation and appropriate security measures
LTE-A cellular network, a data sharing protocol for multi-hop D2D communication still need proper
is designed in [55]. The protocol uses both public investigation and analysis. As D2D communication is
key cryptography and symmetric encryption. Uti- likely to be an integral part of 5G cellular networks, it
lization of public key cryptography ensured UE is important to design appropriate security protocols
authentication, data authority and integrity while for D2D users [16, 39, 59].
using symmetric key encryption guaranteed data
confidentiality. The man-in-middle attack is a D2D Communication in 5G Networks
common security threat in case of out-of-coverage
D2D communication. In such situations, efficient Since 3GPP Release 12, 3GPP is publishing a release
key management schemes can be very helpful roughly once a year. As far as 5G mobile systems are con-
for secured communication. A secret key can be cerned, 3GPP is working according to the timeline of Inter-
shared between two D2D users and authentication national Telecommunication Union—Radio Communication
can be attained by verbal or visual comparison of (ITU-R) to complete the standardization process. Currently,
the secret key [48]. 3GPP is focusing on the Radio Access Network (RAN) and
(b) Physical layer security: To ensure a secured com- the core aspects of 5G. The standardization phase of 5G is
munication between D2D users, it is very impor- divided into two parts. The first part focuses on the deploy-
tant to secure the physical layer of D2D commu- ment requirements and second part focuses on enhancing the
nication. The physical layer deals with coding and capabilities of 5G wireless communication systems. After
modulation, antennas, and characteristics of wire- significant efforts, the first complete set of 5G standards
less channels [17].The wireless channel proper- was published in 3GPP Release 15 in the year 2018. It cov-
ties can be known from channel state information ers the 5G New Radio (NR) system. 3GPP’s focus has now
(CSI). A secret key generation mechanism using shifted to the first stage of Release 16 because Release 15
CSI has been proposed in [2]. To set up the shared is mature and near closure. Release 17 work will proceed
secret schemes in between two D2D users in the mainly through the years 2020 and 2021. Some important
physical layer, a cooperative key generation mech- areas of interaction between 5G and D2D communication
anism has been presented in [27]. By securing the are the following.
physical layer, the confidentiality and integrity of
D2D communication can be enhanced. 1. mmWave communications: In upcoming 5G cellular
(c) Secured routing: To provide security measures to networks, mmWave communications is a promising
out-of-coverage D2D users, relay-assisted D2D and one of the most emerging technologies. It can oper-
communication can be used. As relay assisted ate between 30 GHz and 300 GHz frequency band and
D2D communication is more prone to security thereby offer higher data rate to 5G enabled mobile
threats, it is important to choose a secure routing devices. One of the major demerits of mmWave com-
mechanism between the source and the destina- munications is its shorter wavelength. Due to the shorter
tion. The secure message delivery protocol pre- wavelength, the difficulty in penetrating the nearby
sented in [42] can detect the malicious messages obstacle increases. In such a scenario, however, relay-

SN Computer Science
37 Page 16 of 18 SN Computer Science (2020) 1:37

assisted D2D communication can be very helpful. Estab- Compliance with Ethical Standards
lishment of a D2D relay between two mobile devices
and between mobile devices and a mmWave enabled Conflict of Interest The authors declare that they have no conflict of
base station can be done to extend the overall coverage interest.
area even if these devices do not have a clear connecting
line of sight (LOS) [49]. If D2D communication can be
integrated properly with mmWave communication, the
overall network capacity can be enhanced. References
2. D2D communication in social networks: The volume of
1. 3GPP, RP-140808. Review of regulatory requirements for Unli-
mobile data will be way higher in 5G communication censed Spectrum, Alcatel-Lucent, Alcatel-Lucent Shanghai
as of now. The majority of data will be carried on by Bell, Ericsson, Huawei, HiSilicon, IAESI, LG, Nokia, NSN,
social networks. Analysis of the social ties, users’ simi- Qualcomm, NTT Docomo, Technical report. 2014.
larities and their interest can be helpful in identifying 2. Abualhaol I, Muegge S. Securing d2d wireless links by con-
tinuous authenticity with legitimacy patterns. In: Proceedings
their geographical locations [5]. D2D communication of 49th Hawaii international conference on system sciences
together with the social network can ensure a trusted (HICSS). IEEE; 2016. p. 5763–71.
connection setup [57]. Data dissemination which is one 3. Ansari RI, Chrysostomou C, Hassan SA, Guizani M, Mumtaz S,
of the important features of D2D communication can Rodriguez J, Rodrigues JJ. 5G D2D networks: techniques, chal-
lenges, and future prospects. IEEE Syst J. 2017;12(4):3970–84.
be used in social networks for effective content sharing 4. Araniti G, Raschellà A, Orsino A, Militano L, Condoluci M.
between the users with similar interest. This can weigh Device-to-device communications over 5G systems: standardi-
down the load of the BS and can increase the spectral zation, challenges and open issues. In: 5G mobile communica-
tions. Springer; 2017. p. 337–60
efficiency as well [57]. The combination of D2D net-
5. Bastug E, Bennis M, Debbah M. Living on the edge: the role of
works and social networks can be a great boon for the proactive caching in 5g wireless networks. IEEE Commun Mag.
proximity services in 5G cellular communication [3]. 2014;52(8):82–9.
For that purpose, D2D discovery mechanisms could be 6. Câmara D, Nikaein N. Wireless public safety networks volume
1: overview and challenges. Amsterdam: Elsevier; 2015.
designed exploit social networks at the application layer.
7. Cho B, Koufos K, Jäntti R. Spectrum allocation and mode selec-
3. D2D communication in ultra-dense networks: Ultra-den- tion for overlay d2d using carrier sensing threshold. In: Pro-
sification of nodes is expected in 5G cellular networks. ceedings of the 9th international conference on cognitive radio
Hence, it is considered as one of the major paradigms of oriented wireless networks and communications (CROWN-
COM). IEEE; 2014. p. 26–31.
5G communication. In an ultra-dense network, a large
8. Dahlman E, Parkvall S, Skld J. Chapter 2—device-to-device
number of active small cells will be deployed to increase connectivity. In: Dahlman E, Parkvall S, Skld J, editors. 4G
communication efficiency. To have convenient traffic LTE-advanced pro and the road to 5G. New York: Academic
offloading, D2D communication can be integrated with Press; 2016. p. 461–86.
9. Doumi T, Dolan MF, Tatesh S, Casati A, Tsirtsis G, Anchan K,
small cells to reduce the load on the eNB [49].
Flore D. Lte for public safety networks. IEEE Commun Mag.
2013;51(2):106–12.
10. ETSI 3GPP. Study on downlink multiuser superposition trans-
mission for LTE; (Release 13), 3GPP TR 36.859 V13.0.0. 2017.
11. ETSI 3GPP. Evolved Universal Terrestrial Radio Access
Conclusion (E-UTRA); Services provided by the physical layer; (Release
12), TS 36.302 V 12.4.0. 2015.
D2D communication is going to play a major role in the 12. ETSI 3GPP. Universal mobile telecommunications system
upcoming 5G cellular network. In this article, we have pre- (UMTS); LTE; proximity-based services (ProSe); (Release 13)
Stage 2, 3GPP TS 23.303 V 13.3.0. 2016.
sented a brief overview on the standardization of D2D com-
13. ETSI 3GPP. 3rd generation partnership project; Technical
munication. The standardization is based on 3GPP Release Specification Group Radio Access Network; Study on Licensed-
12 and subsequent releases. We have discussed in detail Assisted Access to Unlicensed Spectrum;(Release 13), Techni-
the architecture, discovery procedure, synchronization, and cal report 36.889. 2015.
14. ETSI 3GPP: Evolved Universal Terrestrial Radio Access
direct communication technique of D2D communication.
(E-UTRA); User Equipment (UE) radio transmission and recep-
We have also highlighted some critical issues in D2D com- tion; (Release 14), TS 36.102 V14.5.0. 2017.
munication. It is expected that D2D communication will 15. Feng D, Lu L, Yuan-Wu Y, Li GY, Li S, Feng G. Device-to-
play a pivotal role in both public safety and various com- device communications in cellular networks. IEEE Commun
Mag. 2014;52(4):49–55.
mercial use cases in future cellular networks.
16. Gandotra P, Jha RK. Device-to-device communication in cel-
lular networks: a survey. J Netw Comput Appl. 2016;71:99–117.
17. Hamoud ON, Kenaza T, Challal Y. Security in device-to-device
Funding This study is partially funded by the Ph.D. scholarship offered communications: a survey. IET Netw. 2017;7(1):14–22.
by KIIT Deemed University to the first author.

SN Computer Science
SN Computer Science (2020) 1:37 Page 17 of 18 37

18. Haus M, Waqas M, Ding AY, Li Y, Tarkoma S, Ott J. Security and (release b) WP 6-Dissemination, standardization, and exploitation.
privacy in device-to-device (d2d) communication: a review. IEEE http://www.fp7mot​ o.eu/wp-conten​ t/upload​ s/2015/12/D6.2.2..pdf.
Commun Surv Tutor. 2017;19(2):1054–79. Accessed 4 Aug 2019.
19. Höyhtyä M, Apilo O, Lasanen M. Review of latest advances in 41. Panaitopol D, Mouton C, Lecroart B, Lair Y, Delahaye P. Recent
3GPP standardization: D2D communication in 5G systems and advances in 3GPP Rel-12 standardization related to D2D and
its energy consumption models. Future Internet. 2018;10(1):3. public safety communications. arXiv preprint arXiv​:1505.07140​
20. Iwamura M, Etemad K, Fong MH, Nory R, Love R. Carrier aggre- (2015).
gation framework in 3g pp lte-advanced [wimax/lte update]. IEEE 42. Panaousis E, Alpcan T, Fereidooni H, Conti M. Secure message
Commun Mag. 2010;48(8):60–7. delivery games for device-to-device communications. In: Proceed-
21. Jameel F, Hamid Z, Jabeen F, Zeadally S, Javed MA. A survey of ings of international conference on decision and game theory for
device-to-device communications: research issues and challenges. security. Springer; 2014. p. 195–215.
IEEE Commun Surv Tutor. 2018;20(3):2133–68. 43. Panigrahi B, Ramamohan R, Rath HK, Simha A. Efficient device-
22. Ji H, Kim Y, Lee J, Onggosanusi E, Nam Y, Zhang J, Lee B, to-device (d2d) offloading mechanism in lte networks. arXiv pre-
Shim B. Overview of full-dimension MIMO in LTE-advanced print. arXiv​:1612.02926​ (2016).
pro. IEEE Commun Mag. 2016;55(2):176–84. 44. Pyattaev A, Johnsson K, Andreev S, Koucheryavy Y. 3GPP LTE
23. Jung Y, Festijo E, Peradilla M. Joint operation of routing control traffic offloading onto WiFi direct. In: Proceedings of the wire-
and group key management for 5g ad hoc d2d networks. In: 2014 less communications and networking conference workshops
international conference on privacy and security in mobile sys- (WCNCW), 2013 IEEE. IEEE; 2013. p. 135–40.
tems (PRISMS). IEEE; 2014. p. 1–8. 45. Rigazzi G, Pratas NK, Popovski P, Fantacci R. Aggregation and
24. Kar UN, Sanyal DK. An overview of device-to-device communi- trunking of m2m traffic via d2d connections. In: Proceedings of
cation in cellular networks. ICT Express. 2018;4(4):203–8. the IEEE international conference on communications (ICC).
25. Kar UN, Sanyal DK. A sneak peek into 5G communications. IEEE; 2015. p. 2973–8.
Resonance. 2018;23(5):555–72. 46. Safdar GA, Ur-Rehman M, Muhammad M, Imran MA, Tafazolli
26. Kwon HJ, Jeon J, Bhorkar A, Ye Q, Harada H, Jiang Y, Liu L, R. Interference mitigation in d2d communication underlaying lte-a
Nagata S, Ng BL, Novlan T, et al. Licensed-assisted access to network. IEEE Access. 2016;4:7967–87.
unlicensed spectrum in LTE release 13. IEEE Commun Mag. 47. Shalmashi S, Slimane SB. Cooperative device-to-device commu-
2017;55(2):201–7. nications in the downlink of cellular networks. In: Proceedings of
27. Lai L, Liang Y, Du W. Cooperative key generation in wireless the IEEE wireless communications and networking conference
networks. IEEE J Sel Areas Commun. 2012;30(8):1578–88. (WCNC). IEEE; 2014. p. 2265–70.
28. Lee J, Kwak Y. 5G standard development: technology and road- 48. Shen W, Hong W, Cao X, Yin B, Shila DM, Cheng Y. Secure key
map, chap. 23. New York: Wiley; 2016. p. 561–76. establishment for device-to-device communications. In: Proceed-
29. Lien SY, Chien CC, Liu GST, Tsai HL, Li R, Wang YJ. Enhanced ings of IEEE global communications conference. IEEE; 2014. p.
lte device-to-device proximity services. IEEE Commun Mag. 336–40.
2016;54(12):174–82. 49. Shen X. Device-to-device communication in 5G cellular networks.
30. Lien SY, Chien CC, Tseng FM, Ho TC. 3GPP device-to-device IEEE Netw. 2015;29(2):2–3.
communications for beyond 4G cellular networks. IEEE Commun 50. Thompson J, Ge X, Wu HC, Irmer R, Jiang H, Fettweis G, Alam-
Mag. 2016;54(3):29–35. outi S. 5g wireless communication systems: prospects and chal-
31. Lin X, Andrews J, Ghosh A, Ratasuk R. An overview of 3GPP lenges [guest editorial]. IEEE Commun Mag. 2014;52(2):62–4.
device-to-device proximity services. IEEE Commun Mag. 51. Tsolkas D, Liotou E, Passas N, Merakos L. Lte-a access, core, and
2014;52(4):40–8. protocol architecture for d2d communication. In: Smart device to
32. Lin X, Andrews JG, Ghosh A. A comprehensive framework for smart device communication. Springer; 2014. p. 23–40.
device-to-device communications in cellular networks. 2013. 52. Wu Y, Guo W, Yuan H, Li L, Wang S, Chu X, Zhang J.
arXiv​:1305.4219. Device-to-device meets lte-unlicensed. IEEE Commun Mag.
33. Mach P, Becvar Z, Vanek T. In-band device-to-device communi- 2016;54(5):154–9.
cation in ofdma cellular networks: a survey and challenges. IEEE 53. Xu S, Wang H, Chen T, Huang Q, Peng T. Effective interfer-
Commun Surv Tutor. 2015;17(4):1885–922. ence cancellation scheme for device-to-device communication
34. Mittal D, Kar UN, Sanyal DK. A novel matching theory-based underlaying cellular networks. In: Proceedings of the IEEE 72nd
framework for computation offloading in device-to-device com- vehicular technology conference-fall. IEEE; 2010. p. 1–5.
munication. In: Proceedings of the 14th IEEE India council inter- 54. Yu CH, Tirkkonen O, Doppler K, Ribeiro C. On the performance
national conference (INDICON). IEEE; 2017. p. 1–6. of device-to-device underlay communication with simple power
35. Mumtaz S, Huq KMS, Rodriguez J. Direct mobile-to-mobile control. In: Proceedings of the VTC Spring 2009-IEEE 69th
communication: paradigm for 5G. IEEE Wirel Commun. vehicular technology conference. IEEE; 2009. p. 1–5.
2014;21(5):14–23. 55. Zhang A, Chen J, Hu RQ, Qian Y. Seds: secure data sharing strat-
36. Mumtaz S, Rodriguez J. Smart device to smart device communi- egy for d2d communication in lte-advanced networks. IEEE Trans
cation. Berlin: Springer; 2014. Veh Technol. 2015;65(4):2659–72.
37. National Instruments. 3GPP release 15 overview. https:​ //spectr​ um. 56. Zhang A, Zhou L, Wang L. Security-aware device-to-device com-
ieee.org/telec​om/wirel​ess/3gpp-relea​se-15-overv​iew. Accessed 4 munications underlaying cellular networks. New York: Springer;
Aug 2019. 2016.
38. Noura M, Nordin R. A survey on interference management for 57. Zhang B, Li Y, Jin D, Hui P, Han Z. Social-aware peer discovery
device-to-device (d2d) communication and its challenges in 5g for d2d communications underlaying cellular networks. IEEE
networks. J Netw Comput Appl. 2016;71:130–50. Trans Wirel Commun. 2014;14(5):2426–39.
39. Osanaiye O, Choo KKR, Dlodlo M. Distributed denial of service 58. Zheng K, Liu F, Xiang W, Xin X. Dynamic downlink aggregation
(DDoS) resilience in cloud: review and conceptual cloud ddos carrier scheduling scheme for wireless networks. IET Commun.
mitigation framework. J Netw Comput Appl. 2016;67:147–65. 2014;8(1):114–23.
40. Oscar L, Ivn P, Patricia O, Vania C, David V, Engin Z, Leandro 59. Zhu D, Swindlehurst AL, Fakoorian SAA, Xu W, Zhao C. Device-
D. D6.2.2 standardization and communication activity report to-device communications: the physical layer security advantage.

SN Computer Science
37 Page 18 of 18 SN Computer Science (2020) 1:37

In: Proceedings of the IEEE international conference on acoustics, Publisher’s Note Springer Nature remains neutral with regard to
speech and signal processing (ICASSP). IEEE; 2014. p. 1606–10. jurisdictional claims in published maps and institutional affiliations.
60. Zou KJ, Wang M, Yang KW, Zhang J, Sheng W, Chen Q, You X.
Proximity discovery for device-to-device communications over a
cellular network. IEEE Commun Mag. 2014;52(6):98–107.

SN Computer Science

View publication stats

You might also like