Device-To-Device Communication in 5G Environment: Issues, Solutions, and Challenges
Abstract
:1. Introduction
- Presenting an extensive literature review of the recent advances in specific D2D domains, which are security and privacy, discovery process, interference management, power control techniques and mode selection schemes for D2D applications in 5G technologies;
- Highlighting open research issues or challenges that need further potential research studies in the future.
2. Device Discovery
Recent Advances in Device Discovery
3. Interference Management
3.1. Recent Advances in Interference Management
3.1.1. Interference Avoidance
3.1.2. Interference Coordination
3.1.3. Interference Cancellation
4. Security and Privacy in D2D Communications
Recent Advances in Security Schemes
5. Power Control
Recent Advances in Power Control Schemes
6. Mode Selection
- Pure cellular mode—used when low resources are available and there is high interference because there is no D2D communication. This does not allow D2D users to transfer their data;
- Partial cellular mode—without sharing the co-channel spectrum, this mode allows the UEs to communicate through the BS;
- Dedicated mode—allows the user equipment to communicate with other user equipment using dedicated spectrum resources;
- Underlay mode—allows D2D users and cellular user equipment to share the uplink and downlink resources.
Recent Advances in Mode Selection
7. Challenges in D2D Communication
7.1. Challenges in Device Discovery
7.1.1. Synchronization
7.1.2. Initial Device Discovery Signal
7.1.3. Multicell Device Discovery
7.1.4. Discovery Messages Frequencies
7.2. Challenges in Interference Management
7.2.1. Cell Densification and Offloading
7.2.2. D2D in mmWave Communication
7.3. Challenges in Security
7.3.1. Balancing Security-Energy Trade-off
7.3.2. Nonrepudiation
7.3.3. Lack of Standardization
7.3.4. Decentralized Anonymity Schemes
7.3.5. Privacy and Security
7.4. Challenges in Power Control
7.4.1. One Large Network or Multiple Small Networks
7.4.2. Optimal Transmission Power
7.5. Challenges in Mode Selection
7.5.1. Mode Alterations Volume
7.5.2. Mode Selection Overhead
7.5.3. Dynamic Mode Selection
8. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Haus, M.; Waqas, M.; Ding, A.Y.; Li, Y.; Tarkoma, S.; Ott, J. Security and privacy in device-to-device (D2D) communication: A review. IEEE Commun. Surv. Tutor. 2017, 19, 1054–1079. [Google Scholar] [CrossRef]
- Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2015–2020. Available online: http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/mobile-white-paper-c11-520862.html (accessed on 2 June 2016).
- Li, T.; Zhao, M.; Wong, K.K. Machine learning based code dissemination by selection of reliability mobile vehicles in 5G networks. Comput. Commun. 2020, 152, 109–118. [Google Scholar] [CrossRef]
- Liu, Y.; Zeng, Z.; Liu, X.; Zhu, X.; Alam Bhuiyan, Z. A novel load balancing and low response delay framework for edge-cloud network based on SDN. IEEE Internet Things J. 2019, 7, 1. [Google Scholar] [CrossRef]
- Ansari, R.I.; Chrysostomou, C.; Hassan, S.A.; Guizani, M.; Mumtaz, S.; Rodriguez, J.; Rodrigues, J.J.P.C. 5G D2D networks: Techniques, challenges, and future prospects. IEEE Syst. J. 2018, 12, 3970–3984. [Google Scholar] [CrossRef]
- Wang, M.; Yan, Z. A survey on security in D2D communications. Mob. Netw. Appl. 2016, 22, 195–208. [Google Scholar] [CrossRef]
- Liu, X.; Liu, A.; Wang, T.; Ota, K.; Dong, M.; Liu, Y.; Cai, Z. Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks. J. Parallel Distrib. Comput. 2020, 135, 140–155. [Google Scholar] [CrossRef]
- Asadi, A.; Wang, Q.; Mancuso, V. A survey on Device-to-Device communication in cellular networks. IEEE Commun. Surv. Tutor. 2014, 16, 1801–1819. [Google Scholar] [CrossRef] [Green Version]
- Kato, N. On Device-to-Device (D2D) communication [Editor’s note]. IEEE Netw. 2016, 30, 2. [Google Scholar] [CrossRef]
- Jameel, F.; Hamid, Z.; Jabeen, F.; Zeadally, S.; Javed, M.A. A survey of Device-to-Device communications: Research issues and challenges. IEEE Commun. Surv. Tutor. 2018, 20, 2133–2168. [Google Scholar] [CrossRef]
- Noura, M.; Nordin, R. A survey on interference management for Device-to-Device (D2D) communication and its challenges in 5G networks. J. Netw. Comput. Appl. 2016, 71, 130–150. [Google Scholar] [CrossRef]
- Gandotra, P.; Jha, R.K. Device-to-Device communication in cellular networks: A survey. J. Netw. Comput. Appl. 2016, 71, 99–117. [Google Scholar] [CrossRef] [Green Version]
- Zhang, Y.; Shen, Y.; Jiang, X.; Kasahara, S. Mode selection and spectrum partition for D2D inband communications: A physical layer security perspective. IEEE Trans. Commun. 2018, 67, 623–638. [Google Scholar] [CrossRef] [Green Version]
- Chang, K.; Yousaf, M.; Hassan, S.A.; Vo, N.-S.; Duong, T.Q. Priority-Based device discovery in public safety D2D networks with full duplexing. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Springer Science and Business Media LLC: Berlin, Germany, 2019; Volume 272, pp. 102–108. [Google Scholar]
- He, Y.; Yu, F.R.; Zhao, N.; Yin, H. Secure Social Networks in 5G Systems with mobile edge computing, caching, and Device-to-Device communications. IEEE Wirel. Commun. 2018, 25, 103–109. [Google Scholar] [CrossRef]
- Hayat, O.; Ngah, R.; Hashim, S.Z.M.; Dahri, M.H.; Malik, R.F.; Rahayu, Y. Device discovery in D2D communication: A survey. IEEE Access 2019, 7, 131114–131134. [Google Scholar] [CrossRef]
- Yan, Y.; Zhang, B.; Li, C. Opportunistic network coding based cooperative retransmissions in D2D communications. Comput. Netw. 2017, 113, 72–83. [Google Scholar] [CrossRef]
- Zhang, J.; Deng, L.; Li, X.; Zhou, Y.; Liang, Y.; Liu, Y. Novel Device-to-Device discovery scheme based on random backoff in LTE-advanced networks. IEEE Trans. Veh. Technol. 2017, 66, 11404–11408. [Google Scholar] [CrossRef] [Green Version]
- Chour, H.; Nasser, Y.; Artail, H.; Kachouh, A.; Al-Dubai, A. VANET aided D2D discovery: Delay analysis and performance. IEEE Trans. Veh. Technol. 2017, 66, 8059–8071. [Google Scholar] [CrossRef]
- Li, B.; Guo, W.; Liang, Y.-C.; An, C.; Zhao, C. Asynchronous device detection for cognitive Device-to-Device communications. IEEE Trans. Wirel. Commun. 2018, 17, 2443–2456. [Google Scholar] [CrossRef] [Green Version]
- Nguyen, N.T.; Choi, K.W.; Song, L.; Han, Z. ROOMMATEs: An unsupervised indoor peer discovery approach for LTE D2D communications. IEEE Trans. Veh. Technol. 2018, 67, 5069–5083. [Google Scholar] [CrossRef]
- Ben-Mosbah, A.; Hammami, S.E.; Moungla, H.; Afifi, H.; Kamal, A.E.; Hammami, S.E. Enhancing Device-to-Device direct discovery based on predicted user density patterns. Comput. Netw. 2019, 151, 245–259. [Google Scholar] [CrossRef]
- Long, Y.; Yamamoto, R.; Yamazaki, T.; Tanaka, Y. A deep learning based social-aware D2D peer discovery mechanism. In Proceedings of the 2019 21st International Conference on Advanced Communication Technology (ICACT), PyeongChang, Kwangwoon_Do, Korea, 17–20 February 2019; Institute of Electrical and Electronics Engineers (IEEE): New York, NY, USA, 2019; pp. 91–97. [Google Scholar]
- Kaleem, Z.; Qadri, N.N.; Duong, T.Q.; Karagiannidis, G.K. Energy-efficient device discovery in D2D cellular networks for public safety scenario. IEEE Syst. J. 2019, 13, 2716–2719. [Google Scholar] [CrossRef]
- Jaffry, S.; Zaidi, S.K.; Shah, S.T.; Hasan, S.F.; Gui, X. D2D Neighborhood Discovery by a Mobile Device. In Proceedings of the ICC 2019–2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; Institute of Electrical and Electronics Engineers (IEEE): New York, NY, USA, 2019; pp. 1–6. [Google Scholar]
- Sun, Y.; Cao, J.; Ma, M.; Li, H.; Niu, B.; Li, F. Privacy-preserving device discovery and authentication scheme for D2D communication in 3GPP 5G HetNet. In Proceedings of the 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 18–21 February 2019; Institute of Electrical and Electronics Engineers (IEEE): New York, NY, USA, 2019; pp. 425–431. [Google Scholar]
- Kaleem, Z.; Khan, A.; Hassan, S.A.; Vo, N.-S.; Nguyen, L.D.; Nguyen, H.M. Full-duplex enabled time-efficient device discovery for public safety communications. Mob. Netw. Appl. 2019, 25, 341–349. [Google Scholar] [CrossRef]
- Masood, A.; Sharma, N.; Alam, M.M.; Le Moullec, Y.; Scazzoli, D.; Reggiani, L.; Magarini, M.; Ahmad, R. Device-to-Device discovery and localization assisted by UAVs in pervasive public safety networks. In Proceedings of the ACM MobiHoc Workshop on Innovative Aerial Communication Solutions for FIrst REsponders Network in Emergency Scenarios-iFIRE ’19, Catania, Italy, 2–5 July 2019; Association for Computing Machinery (ACM): New York, NY, USA, 2019; pp. 6–11. [Google Scholar]
- Hayat, O.; Ngah, R.; Hashim, S.Z.M. Performance analysis of device discovery algorithms for D2D communication. Arab. J. Sci. Eng. 2019, 45, 1457–1471. [Google Scholar] [CrossRef]
- Liu, J.; Kato, N.; Ma, J.; Kadowaki, N. Device-to-Device communication in LTE-advanced networks: A survey. IEEE Commun. Surv. Tutor. 2014, 17, 1. [Google Scholar] [CrossRef]
- Liu, Y.; Wang, R.; Han, Z. Interference-constrained pricing for D2D networks. IEEE Trans. Wirel. Commun. 2017, 16, 475–486. [Google Scholar] [CrossRef]
- Yang, T.; Cheng, X.; Shen, X.; Chen, S.; Yang, L. Qos-aware interference management for vehicular D2D relay networks. J. Commun. Inf. Netw. 2017, 2, 75–90. [Google Scholar] [CrossRef] [Green Version]
- Celik, A.; Radaydeh, R.M.; Al-Qahtani, F.S.; Alouini, M.-S. Resource allocation and interference management for D2D-enabled DL/UL decoupled Het-Nets. In IEEE Access 2017, 5, 22735–22749. [Google Scholar] [CrossRef] [Green Version]
- Zhao, L.; Wang, H.; Zhong, X. Interference graph based channel assignment algorithm for D2D cellular networks. In IEEE Access 2018, 6, 3270–3279. [Google Scholar] [CrossRef]
- Shamaei, S.; Bayat, S.; Hemmatyar, A.M.A. Interference management in D2D-enabled heterogeneous cellular networks using matching theory. IEEE Trans. Mob. Comput. 2018, 18, 2091–2102. [Google Scholar] [CrossRef]
- Doumiati, S.; Assaad, M.; Artail, H. A framework of topological interference management and clustering for D2D networks. IEEE Trans. Commun. 2019, 67, 7856–7871. [Google Scholar] [CrossRef]
- Chiu, S.-L.; Lin, K.C.-J.; Lin, G.-X.; Wei, H.-Y. Empowering Device-to-Device networks with cross-link interference management. IEEE Trans. Mob. Comput. 2017, 16, 950–963. [Google Scholar] [CrossRef]
- Zihan, E.; Choi, K.W.; Kim, D.I. Distributed random access scheme for collision avoidance in cellular Device-to-Device communication. IEEE Trans. Wirel. Commun. 2015, 14, 1. [Google Scholar] [CrossRef]
- Sun, L.; Du, Q.; Ren, P.; Wang, Y. Two birds with one stone: Towards secure and interference-free D2D transmissions via constellation rotation. IEEE Trans. Veh. Technol. 2015, 65, 8767–8774. [Google Scholar] [CrossRef]
- Melki, L.; Najeh, S.; Besbes, H. Radio resource management scheme and outage analysis for network-assisted multi-hop D2D communications. Digit. Commun. Netw. 2016, 2, 225–232. [Google Scholar] [CrossRef] [Green Version]
- Yang, T.; Zhang, R.; Cheng, X.; Yang, L. Graph coloring based resource sharing (GCRS) scheme for D2D communications underlaying full-duplex cellular networks. IEEE Trans. Veh. Technol. 2017, 66, 7506–7517. [Google Scholar] [CrossRef]
- Xu, Y.; Liu, F.; Wu, P. Interference management for D2D communications in heterogeneous cellular networks. Pervasive Mob. Comput. 2018, 51, 138–149. [Google Scholar] [CrossRef]
- Sun, J.; Zhang, Z.; Xiao, H.; Xing, C. Uplink interference coordination management with power control for D2D underlaying cellular networks: Modeling, algorithms, and analysis. IEEE Trans. Veh. Technol. 2018, 67, 8582–8594. [Google Scholar] [CrossRef]
- Lv, S.; Xing, C.; Long, K.; Zhang, Z. Guard zone based interference management for D2D-aided underlaying cellular networks. IEEE Trans. Veh. Technol. 2016, 66, 1. [Google Scholar] [CrossRef]
- Ni, Y.; Jin, S.; Xu, W.; Wang, Y.; Matthaiou, M.; Zhu, H. Beamforming and interference cancellation for D2D communication underlaying cellular networks. IEEE Trans. Commun. 2015, 64, 832–846. [Google Scholar] [CrossRef]
- Wu, Y.; Wang, S.; Liu, W.; Guo, W.; Chu, X. Iunius: A cross-layer peer-to-peer system with Device-to-Device communications. IEEE Trans. Wirel. Commun. 2016, 15, 7005–7017. [Google Scholar] [CrossRef]
- Gandotra, P.; Jha, R.K.; Jain, S. Green NOMA with multiple interference cancellation (MIC) using sector-based resource allocation. IEEE Trans. Netw. Serv. Manag. 2018, 15, 1006–1017. [Google Scholar] [CrossRef]
- Ni, Y.; Zhao, J.; Wang, Y.; Zhu, H. Beamforming and interference cancellation for D2D communication assisted by two-way decode-and-forward relay node. China Commun. 2018, 15, 100–111. [Google Scholar] [CrossRef]
- Zhang, H.; Liao, Y.; Song, L. D2D-U: Device-to-Device communications in unlicensed bands for 5G system. IEEE Trans. Wirel. Commun. 2017, 16, 3507–3519. [Google Scholar] [CrossRef]
- Wang, L.; Liu, J.; Chen, M.; Gui, G.; Sari, H. Optimization-based access assignment scheme for physical-layer security in D2D communications underlaying a cellular network. IEEE Trans. Veh. Technol. 2018, 67, 5766–5777. [Google Scholar] [CrossRef]
- Jin, B.; Jiang, D.; Xiong, J.; Chen, L.; Li, Q. D2D data privacy protection mechanism based on reliability and homomorphic encryption. IEEE Access 2018, 6, 51140–51150. [Google Scholar] [CrossRef]
- Wang, M.; Yan, Z. Privacy-preserving authentication and key agreement protocols for D2D group communications. IEEE Trans. Ind. Inform. 2017, 14, 3637–3647. [Google Scholar] [CrossRef] [Green Version]
- Waqas, M.; Ahmed, M.; Li, Y.; Jin, D.; Chen, S. Social-aware secret key generation for secure Device-to-device communication via trusted and non-trusted relays. IEEE Trans. Wirel. Commun. 2018, 17, 3918–3930. [Google Scholar] [CrossRef] [Green Version]
- Wang, L.; Tian, Y.; Zhang, D.; Lu, Y. Constant-round authenticated and dynamic group key agreement protocol for D2D group communications. Inf. Sci. 2019, 503, 61–71. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Maglaras, L.; Argyriou, A.; Kosmanos, D.; Janicke, H. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 2018, 101, 55–82. [Google Scholar] [CrossRef] [Green Version]
- Cao, M.; Wang, L.; Xu, H.; Chen, D.; Lou, C.; Zhang, N.; Zhu, Y.; Qin, Z. Sec-D2D: A secure and lightweight D2D communication system with multiple sensors. IEEE Access 2019, 7, 33759–33770. [Google Scholar] [CrossRef]
- Hsu, R.-H.; Lee, J.; Quek, T.Q.S.; Chen, J.-C. GRAAD: Group anonymous and accountable D2D communication in mobile networks. IEEE Trans. Inf. Forensics Secur. 2018, 13, 449–464. [Google Scholar] [CrossRef] [Green Version]
- Jiang, L.; Xie, S.; Maharjan, S.; Zhang, Y. Joint transaction relaying and block verification optimization for blockchain empowered D2D communication. IEEE Trans. Veh. Technol. 2020, 69, 828–841. [Google Scholar] [CrossRef]
- Yang, C.; Li, J.; Semasinghe, P.; Hossain, E.; Perlaza, S.M.; Han, Z. Distributed interference and energy-aware power control for ultra-dense D2D networks: A mean field game. IEEE Trans. Wirel. Commun. 2017, 16, 1205–1217. [Google Scholar] [CrossRef]
- Memmi, A.; Rezki, Z.; Alouini, M.-S. Power control for D2D underlay cellular networks with channel uncertainty. IEEE Trans. Wirel. Commun. 2017, 16, 1330–1343. [Google Scholar] [CrossRef]
- Xu, H.; Huang, N.; Yang, Z.; Shi, J.; Wu, B.; Chen, M. Pilot allocation and power control in D2D underlay massive MIMO systems. IEEE Commun. Lett. 2017, 21, 112–115. [Google Scholar] [CrossRef]
- Zhai, D.; Sheng, M.; Wang, X.; Sun, Z.; Xu, C.; Li, J. Energy-saving resource management for D2D and cellular coexisting networks enhanced by hybrid multiple access technologies. IEEE Trans. Wirel. Commun. 2017, 16, 1. [Google Scholar] [CrossRef]
- Xu, J.; Guo, C.; Zhang, H. Joint channel allocation and power control based on PSO for cellular networks with D2D communications. Comput. Netw. 2018, 133, 104–119. [Google Scholar] [CrossRef]
- Lim, D.-W.; Kang, J.; Kim, H.-M. Adaptive power control for D2D communications in downlink SWIPT networks with partial CSI. IEEE Wirel. Commun. Lett. 2019, 8, 1333–1336. [Google Scholar] [CrossRef]
- Gao, X.; Yang, K.; Yang, N.; Wu, J. Energy-efficient resource block assignment and power control for underlay Device-to-Device communications in multi-cell networks. Comput. Netw. 2019, 149, 240–251. [Google Scholar] [CrossRef]
- Wang, H.; Ding, G.; Wang, J.; Wang, S.; Wang, L. Power control for multiple interfering D2D communications underlaying cellular networks: An approximate interior point approach. In Proceedings of the 2017 IEEE International Conference on Communications Workshops (ICC Workshops), Paris, France, 21–25 May 2017; Institute of Electrical and Electronics Engineers (IEEE): New York, NY, USA, 2017; pp. 1346–1351. [Google Scholar]
- Abrardo, A.; Moretti, M. Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks. IEEE Trans. Wirel. Commun. 2016, 16, 1. [Google Scholar] [CrossRef] [Green Version]
- Abdallah, A.; Mansour, M.M.; Chehab, A. Power control and channel allocation for D2D underlaid cellular networks. IEEE Trans. Commun. 2018, 66, 3217–3234. [Google Scholar] [CrossRef] [Green Version]
- Liu, C.; Wang, X.; Wu, X.; Guo, J. Economic scheduling model of microgrid considering the lifetime of batteries. IET Gener. Transm. Distrib. 2017, 11, 759–767. [Google Scholar] [CrossRef]
- Tao, L.; Ma, J.; Cheng, Y.; Noktehdan, A.; Chong, J.; Lu, C. A review of stochastic battery models and health management. Renew. Sustain. Energy Rev. 2017, 80, 716–732. [Google Scholar] [CrossRef]
- Ding, J.; Jiang, L.; He, C. Energy-efficient power control for underlaying D2D communication with channel uncertainty: User-centric versus network-centric. J. Commun. Netw. 2016, 18, 589–599. [Google Scholar] [CrossRef]
- Hoang, T.D.; Le, L.B.; Le-Ngoc, T. Joint mode selection and resource allocation for relay-based D2D communications. IEEE Commun. Lett. 2016, 21, 398–401. [Google Scholar] [CrossRef]
- Chou, H.-J.; Chang, R.Y. Joint mode selection and interference management in Device-to-Device communications underlaid MIMO cellular networks. IEEE Trans. Wirel. Commun. 2017, 16, 1120–1134. [Google Scholar] [CrossRef]
- Yang, L.; Wu, D.; Shi, H.; Long, Y.; Cai, Y. Social-aware joint mode selection and link allocation for device-to-device communication underlaying cellular networks. China Commun. 2018, 15, 92–107. [Google Scholar] [CrossRef]
- Li, Y.; Song, W.; Su, Z.; Huang, L.; Gao, Z. A distributed mode selection approach based on evolutionary game for Device-to-Device communications. IEEE Access 2018, 6, 60045–60058. [Google Scholar] [CrossRef]
- Tian, C.; Qian, Z.; Wang, X.; Hu, L. Analysis of joint relay selection and resource allocation scheme for relay-aided D2D communication networks. IEEE Access 2019, 7, 142715–142725. [Google Scholar] [CrossRef]
- Bithas, P.S.; Maliatsos, K.; Foukalas, F. An SINR-aware joint mode selection, scheduling, and resource allocation scheme for D2D communications. IEEE Trans. Veh. Technol. 2019, 68, 4949–4963. [Google Scholar] [CrossRef] [Green Version]
- Wu, D.; Zhou, L.; Cai, Y.; Qian, Y. Optimal content sharing mode selection for social-aware D2D communications. IEEE Wirel. Commun. Lett. 2018, 7, 910–913. [Google Scholar] [CrossRef]
- Bulusu, S.; Mehta, N.B.; Kalyanasundaram, S. Rate adaptation, scheduling, and mode selection in D2D systems with partial channel knowledge. IEEE Trans. Wirel. Commun. 2018, 17, 1053–1065. [Google Scholar] [CrossRef]
- Chen, C.-Y.; Sung, C.-A.; Chen, H.-H. Capacity maximization based on optimal mode selection in multi-mode and multi-pair D2D communications. IEEE Trans. Veh. Technol. 2019, 68, 6524–6534. [Google Scholar] [CrossRef]
- Dai, Y.; Sheng, M.; Liu, J.; Cheng, N.; Shen, X.; Yang, Q. Joint mode selection and resource allocation for D2D-enabled NOMA cellular networks. IEEE Trans. Veh. Technol. 2019, 68, 6721–6733. [Google Scholar] [CrossRef]
- Haider, N.; Ali, A.; Suarez-Rodriguez, C.; Dutkiewicz, E. Optimal mode selection for full-duplex enabled D2D cognitive networks. IEEE Access 2019, 7, 57298–57311. [Google Scholar] [CrossRef]
- Hayat, O.; Ngah, R.; Zahedi, Y. Cooperative GPS and neighbors awareness based device discovery for D2D communication in in-band cellular networks. Int. J. Eng. Technol. 2018, 7, 700–703. [Google Scholar] [CrossRef]
- Akyildiz, I.F.; Nie, S.; Lin, S.-C.; Chandrasekaran, M. 5G roadmap: 10 key enabling technologies. Comput. Netw. 2016, 106, 17–48. [Google Scholar] [CrossRef]
- Hossain, E.; Hasan, M. 5G cellular: Key enabling technologies and research challenges. IEEE Instrum. Meas. Mag. 2015, 18, 11–21. [Google Scholar] [CrossRef] [Green Version]
- Wen, S.; Zhu, X.; Lin, Y.; Lin, Z.; Zhang, X.; Yang, D. Achievable transmission capacity of relay-assisted Device-to-Device (D2D) communication underlay cellular networks. In Proceedings of the 2013 IEEE 78th Vehicular Technology Conference (VTC Fall), Las Vegas, NV, USA, 2–5 September 2013; Institute of Electrical and Electronics Engineers (IEEE): New York, NY, USA, 2013; pp. 1–5. [Google Scholar]
- Niu, Y.; Gao, C.; Li, Y.; Su, L.; Jin, D.; Vasilakos, A.V. Exploiting Device-to-Device communications in joint scheduling of access and backhaul for mmWave small cells. J. Sel. Areas Commun. 2015, 33, 2052–2069. [Google Scholar] [CrossRef] [Green Version]
- Ghosh, A.; Thomas, T.A.; Cudak, M.C.; Ratasuk, R.; Moorut, P.; Vook, F.W.; Rappaport, T.S.; MacCartney, G.R.; Sun, S.; Nie, S. Millimeter-wave enhanced local area systems: A high-data-rate approach for future wireless networks. IEEE J. Sel. Areas Commun. 2014, 32, 1152–1163. [Google Scholar] [CrossRef]
- Amin, R.; Islam, S.K.H.; Biswas, G.P.; Khan, M.K.; Kumar, N. An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography. J. Med. Syst. 2015, 39, 180. [Google Scholar] [CrossRef]
- Li, X.; Sun, Y.; Zhou, L.; Xu, Y.; Zhou, S. A resource allocation scheme based on predatory search algorithm for ultra-dense D2D communications. Wirel. Netw. 2019, 5, 1–9. [Google Scholar] [CrossRef]
- Wang, X.; Li, S.; Zhao, S.; Xia, Z.; Bai, L. A vehicular ad hoc network privacy protection scheme without a trusted third party. Int. J. Distrib. Sens. Netw. 2017, 13. [Google Scholar] [CrossRef]
Challenges | References | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
[1] | [5] | [6] | [8] | [9] | [10] | [11] | [12] | [13] | [14] | [15] | Ours | |
Device Discovery | X | X | X | X | X | |||||||
Interference Management | X | X | X | X | X | |||||||
Privacy and Security | X | X | X | X | ||||||||
Power Control | X | X | X | X | X | |||||||
Mode Selection | X | X |
Ref. | Proposed Method | Pros | Cons | Objectives | |||
---|---|---|---|---|---|---|---|
Easy Discoverability | Reduced Latency | Energy/Power Efficiency | Throughput Enhancement | ||||
[18] | Direct D2D discovery scheme based on the random back-off procedure. | Increases the average number of User Equipments (UEs) discovered and can reduce the D2D discovery delay and collision probability. | Further analysis on the impact of backoff window on the average delay of D2D UEs. | ✓ | ✓ | ||
[19] | Novel D2D discovery schemes, based on the VANET network. | Low discovery latency is achieved. | The average delay for highly depends on the inter-RSUs distance and the RSU coverage. | ✓ | ✓ | ✓ | |
[20] | Novel sequential estimation scheme. | Detection performance significantly improved. | Need to consider shared capacity between primary and secondary links. | ✓ | ✓ | ✓ | |
[21] | ROOMMATE, the enabler for indoor D2D communications in LTE networks. | ROOMMATE is energy-efficient and signal-to-interference-plus-noise ratio are improved. | Requires modifications of existing standards and the security aspects. | ✓ | ✓ | ||
[22] | Adaptive D2D discovery algorithm. | Energy consumption savings are achieved by reducing overall discovery messages signaling in the network. | The users’ behavior in different scenarios. | ✓ | ✓ | ✓ | |
[23] | Social aware peer discovery mechanism. | The probability of encountering malicious devices are decreased and the probability to recognize trusted devices are increased. | Instability of connection influences the communication channel and Signal Noise Ratio (SNR). | ✓ |
Ref. | Problem | Algorithm Used | Findings | Reuse Resources | Interference Control Level |
---|---|---|---|---|---|
[31] | Utilize throughput to an interference temperature constraint. | Stackelberg game theoretic optimization. | Improves resource allocation and interference management in spectrum-sharing D2D communications. | Uplink (UL) | Centralized |
[32] | Quality of Service (QoS) interference management. | Graph theory-based solution for relay selection and power adoption. | Improves QoS satisfaction with high energy efficiency. | Uplink and Downlink (UL&DL) | Distributed |
[33] | Interference management and performance enhancement. | Concatenated Bi-partite Matching (CBM) graph theory-based solution. | Reducing the average number of cellular user equipment (CUEs) in outage. | Uplink or Downlink (UL/DL) | Centralized |
[34] | Distribution of random devices in cellular networks lead to critical interferences. | Novel greedy-based channel assignment algorithm. | Increases the network capacity and improves the fairness among devices with low computational complexity. | Uplink (UL) | Centralized |
[35] | Co/cross-tier resource sharing interferences problem. | Matching theory-based distributed resource allocation algorithm. | Achieves optimum network performance with much lower overhead and complexity. | Downlink (DL) | Distributed |
[36] | Dependency on CSI and high signaling. | Joint clustering and topological interference management (TIM) framework. | Computation time is reduced. | Uplink and Downlink (UL&DL) | Centralized |
Ref. | Problem | Algorithm | Attack Addressed | Findings | Limitations |
---|---|---|---|---|---|
[49] | Interference among LTE-U network, D2D users, and the opportunistic feature of unlicensed channel access in existing Wi-Fi systems. | User-Subchannel Matching Algorithm for LTE and D2D users. | Address Spoofing | Significantly improve the system sum rate. | Need to consider Wi-Fi performance degradation. |
[50] | Lack of protection for cellular users against eavesdropping. | Optimization-Based Access Assignment Scheme for D2D users. | Eavesdropping | Improves the physical-layer security of cellular users and achieved maximum secrecy throughput with the optimal threshold. | Consider protecting only single cellular user in the presence of multiple eavesdroppers. |
[51] | Lack of trusted devices to execute secure data aggregation without a base station. | Security protection mechanism of private data based on homomorphic encryption. | Packet Sniffing | Improves the security and optimizes the resources allocation in D2D network. | Further studies on election factors and the impact of the dynamics of wireless devices on D2D networks. |
[52] | Lack of privacy-preserving and secure scheme in D2D group communications. | Key Agreement and two privacy-preserving authentication protocols. | Replay Attack | Improves the security, efficiency, and effectiveness of the protocols. | No real applicability evaluation in a 5G D2D communication. |
[53] | Maturity of key generation in the physical layer security (PLS) technique. | Secure Key Generation (SKG) scheme. | Eavesdropping | Improves information confidentiality. | Need to combine authentication of higher layer and information confidentiality. |
[54] | Unassisted third-party devices mutual communication. | Dynamic group key agreement protocol. | Masquerade Attack | Achieves high entropy group session key for D2D group communication and improved the security. | No real applicability evaluation in a 5G D2D communication. |
Ref. | Problem | Proposed Method | Findings | Limitations |
---|---|---|---|---|
[59] | Power control distribution. | Theoretic framework using Mean Field Game (MFG). | Achieves higher energy efficiency compared with the blind power control scheme. | Increasing the energy means increasing the interference power and decreases the spectrum efficiency. |
[60] | Imperfect wireless Channel State Information (CSI) power control. | Truncated channel inversion and ON-OFF power control scheme. | Imperfect CSI and misinformation lead to the degradation of performance especially for high target SINR. | Estimation error is a key parameter that should be consider during network design. |
[61] | Contamination and training sequence overhead reduction in D2D underlay massive MIMO networks. | Revised Graph Coloring-based Pilot Allocation (RGCPA) algorithm. | Pilot overhead is reduced and the effect of pilot contamination is cancelled. | The sum power monotonically decreases and converges rapidly for different value. |
[62] | Sparse Code Multiple Access (SCMA) power allocation. | Graph theoretic approach. | Energy efficiency performance is enhanced and network capacity is upgraded. | Need to compare the algorithms with different schemes. |
[63] | Power control under different constraints. | Power control scheme using Particle Swarm Optimization (PSO). | Achieves higher throughout than the optimal strategy. | Combine the admission control into power control scheme and the joint channel allocation. |
[64] | Power control is non-convex and intractable. | D2D transmit power control schemes. | D2D rates converge to a rate ceiling at high signal-to-noise ratio. | The energy signal transmission is less effective when performance gaps are small. |
[65] | Non- convex mixed-integer fractional program. | Sequential Geometric Programming (SGP) algorithm. | Reduces energy efficiency (EE) loss. | The network EE first increases and then decreases when the transmit power increases. |
Ref. | Problem | Solutions | Contributions | Limitations |
---|---|---|---|---|
[72] | Joint mode selection, power control problem, and resource group (RG) assignment for D2D underlaid cellular networks. | RG assignment, joint optimal mode selection, and power allocation design for D2D. | Improves the system sum rate significantly compared to the conventional schemes. | Focus more on optimizing the communications mode in relay-based D2D communication. |
[73] | The effects of network interference profile to D2D mode selection and vice versa. | IA-based coding strategy and DoF-based mode selection. | Better performance than in high SNR regime, low interference environment, large MIMO systems, and small-cell networks. | Further analysis on small/medium antenna systems and large-cell networks. |
[74] | Link allocation and mode selection problem under coalition formation game. | Distributed coalition formation algorithm. | Achieves better performance for cellular users. | Need to extend the single cell scenario to a multi-cell scenario, and implement some joint optimal solutions. |
[75] | Problem in evolutionary game formulation in mode selection. | Evolutionary game-based distributed D2D mode selection algorithm. | Achieves higher utilities than the baseline schemes. | Need to consider other D2D communication modes. |
[13] | Spectrum partition and mode selection problem from physical layer. | Theoretical framework for optimization of both D2D pairs and cellular users (CUs), and the performance modeling. | PLS performances of the CUE and D2D pair can be flexibly controlled by mode selection and spectrum partition. | Need to consider the performance evaluation for the case with two CUEs and two D2D pairs. |
[76] | Resource allocation and joint relay selection problem for relay-assisted D2D. | Greedy-based mode selection and channel allocation algorithm. | Transmission data rates is maximized while guaranteeing the minimum QoS requirements for both CUs and D2D users (DUs). | Study the impact of social attributes among users on the performance of D2D communication networks. |
[77] | Quality of service in mode selection. | Mode selection scheme based on greedy heuristic algorithm. | Improves sum rate and average UE SINR, with no increase in signaling overhead or complexity. | UEs with very low SINR (both modes of operation) not benefit from the increase in DUE number. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Adnan, M.H.; Ahmad Zukarnain, Z. Device-To-Device Communication in 5G Environment: Issues, Solutions, and Challenges. Symmetry 2020, 12, 1762. https://doi.org/10.3390/sym12111762
Adnan MH, Ahmad Zukarnain Z. Device-To-Device Communication in 5G Environment: Issues, Solutions, and Challenges. Symmetry. 2020; 12(11):1762. https://doi.org/10.3390/sym12111762
Chicago/Turabian StyleAdnan, Mohd Hirzi, and Zuriati Ahmad Zukarnain. 2020. "Device-To-Device Communication in 5G Environment: Issues, Solutions, and Challenges" Symmetry 12, no. 11: 1762. https://doi.org/10.3390/sym12111762