Journal of Network and Computer Applications: Pimmy Gandotra, Rakesh Kumar Jha, Sanjeev Jain
Journal of Network and Computer Applications: Pimmy Gandotra, Rakesh Kumar Jha, Sanjeev Jain
Review
A R T I C L E I N F O A BS T RAC T
Keywords: The number of devices is expected to radically increase in near future, with an estimate of above 50 billion
Device-to-device (D2D) communication connected devices by 2020. The subscribers demand improved data rates, with reduced latency and increased
Spectral efficiency system capacity. To endure the rising demands, cellular networks need to undergo suitable changes. For
Resource allocation fulfillment of the rising needs of users and efficient utilization of the available scarce resources, device-to-device
Security
(D2D) communication is being looked upon as an important emerging technology for present and future cellular
InternetProtocol Security (IP Sec)
networks. It allows peer-to-peer communication between users, with improved spectral efficiency, energy
efficiency and system throughput. In this paper, a detailed survey on device-to-device (D2D) communications
has been offered, along with the challenges which exist for D2D (like resource allocation, security, interference
management etc.) to become a successful paradigm of wireless networks. In order to fulfill the subscriber needs,
architecture has been proposed which assures overcoming the various implementation challenges of D2D
communication. The paper largely focuses on security in D2D communication and the possible attacks to which
the direct links are susceptible to. For ensuring a secure D2D communication, solution has been proposed,
based upon Internet Protocol Security (IP Sec).
⁎
Corresponding author.
E-mail addresses: [email protected] (P. Gandotra), [email protected] (R. Kumar Jha), [email protected] (S. Jain).
1
Assistant Professor, DoECE, Shri Mata Vaishno Devi University, Katra, J & K, India.
http://dx.doi.org/10.1016/j.jnca.2016.11.002
Received 26 July 2016; Received in revised form 13 October 2016; Accepted 4 November 2016
Available online 12 November 2016
1084-8045/ © 2016 Elsevier Ltd. All rights reserved.
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
WIRED LINK
PUBLIC
SAFETY CELLULAR LINK
SERVICES DEVICE RELAYING
DIRECT LINK
COMMUNICATION LINK FROM
SERVER SERVER
CELLULAR USER
D2D USER
D2D PAIR
BASE
STATION
SMALL CELL
SMALL
CRAN ~ Cloud Radio Access Network
CELL
D2D PAIR
environment, for better network performance. network. Resources must be available to the D2D users for carrying out
3GPP is investigating Proximity Service (ProSe) (Jin et al., 2014) communication over direct links. Transmission range can be enhanced
for enabling direct communication between proximate devices. Various with the placement of relays in a D2D scenario. Assuring security in the
use cases of D2D and its feasibility is discussed in 3GPP TR 22.803 D2D communication thus becomes essential, as relays and rest of the
(2012). Enabling D2D communication in cellular networks requires communicating devices, are susceptible to eavesdropping attack, jam-
certain architectural enhancements, which are investigated upon ming attack, etc. All these issues need special attention.
in 3GPP TR 23.703 (2013). FlashLinQ (Wu et al., 2010) from
Qualcomm propose PHY/MAC architecture for D2D networks. A
comprehensive survey on the standardization of D2D communication 1.1. Contributions
(3GPP Release 12) has been provided in Lien et al. (2016), which
includes architectures, discovery procedures, mobility, channels and Existing surveys on D2D communication have been complemented,
signals. and the missing pieces of information have been brought up in this
Numerous services can be associated with D2D communication, survey. An inclusive overview of 5 G technology is provided in Dohler
like, mobile cloud computing, cellular data offloading, disaster manage- and Nakamura (2016). In Asadi et al. (2014a), an extensive literature is
ment, etc. A general scenario of device-to-device (D2D) communication available on device-to-device (D2D) communication, with focus on
in cellular networks is depicted in Fig. 1. The figure depicts various use various under-explored and over-explored areas of research in D2D
cases of device-to-device (D2D) communication in a single cell, with communication. The authors of Liu et al. (2014) bring about a detailed
the base station at the centre. Vehicle-to-vehicle (V2V) communication survey of the existing research in this field, mentioning about the
with Internet of Vehicles (IoV), public safety services, offloading of various experimental prototypes, applications of D2D communication
cellular traffic from the base station, etc. are depicted in the figure. The and its open research areas. The authors in Mach et al. (2015) present a
Cloud Radio Access Network (CRAN) in the 5 G networks supports detailed survey on device-to-device (D2D) communication, primarily
flexible network architecture. It centralizes the network functionalities, focusing on Orthogonal Frequency Division Multiplexing Access
as per the application to be serviced. For 5 G cellular networks and (OFDMA) which is being considered for the future 5 G networks.
beyond, small cells in conjunction with D2D communication, can serve Architectural, business and technical aspects of D2D communication
as effective means of enhancing coverage and enabling traffic off- have been explained in Mumtaz (2014) comprehensively. Network
loading. As D2D communication allows sharing of local content, assisted multi hop, full duplex and multi-antenna D2D have been
without multiple base station requests, proactive caching (Pappalardo reviewed in Fodor et al. (2016). The authors argue that the challenges
et al., 2016) has been introduced, to reduce load on the backhaul of the information society beyond 2020 can be effectively met through a
networks. Caching can be performed at the base station, or at the user proper combination of cellular and adhoc technologies. Architecture
terminals, communicating over direct links (Gregori et al., 2016). A has been proposed for the next generation networks in Pimmy and
careful caching strategy in device-to-device (D2D) communication can Rakesh (2016).
greatly enhance Quality of Experience (QoE) (Bai et al., 2016). In this paper, an exhaustive literature on device-to-device (D2D)
Though D2D communication allows direct communication between communication has been studied and thoroughly reviewed. There is a
proximate devices and supports improved network performance, its lot of scope in this field for propelling the researchers all over the globe
implementation involves number of concerns. For setting up of direct to switch toward the D2D technology. A few important algorithms,
links, the users need to discover each other. The discovery mechanisms pertaining to the various issues in device-to-device (D2D) communica-
are being widely studied. There is a very high probability of inter- tion have been discussed. This paper has also shown a suitable network
ference between D2D users and cellular users, within the cellular model which is an integral part of basic resource allocation strategy.
But the prime focus of the paper is on the proposed architecture for
10
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
11
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
works are considered as a two-tier network, where the tiers are the
macro cell tier and device tier. The macro cell tier involves the
conventional cellular communication, through the base station (BS).
The device tier, on the other hand, involves direct communication
between the devices (D2D communication). The base station can have
different levels of control in the device tier network, which maybe full
or partial, or no control at all. As a result, device to device (D2D)
communication can be categorized into four types, depending upon the
degree of involvement of the base station in assisting the communica-
tion between devices (Tehrani et al., 2014), and are discussed below.
Case (i) Device Relaying with base station assisted con-
trolled link.
A device in an area of poor coverage or at the cell edge can
communicate with the base station by relaying information through
other devices. The allocation of resources and setting up of call in such
a scenario is done by the base station (BS). Also, interference can be
Fig. 2. Fundamental Network Architecture for D2D communication.
avoided between devices as a result of the centralized control. This
enhances the battery life of the device.
With D2D communication underlaying cellular networks, content
Case (ii) Direct communication between devices with base
sharing by a large number of users is possible by setting up of local
station assisted controlled link.
caching and sharing zones. This supports network management in a
The source and the destination devices communicate with each
distributive manner. Also, relaying of data is possible with device-to-
other directly, with the base station (BS) assisting them for link
device (D2D) communication. Device-to-device (D2D) communication
establishment by providing the control links. The BS primarily deals
has been identified as a key enabler for various 5 G services, by the
with access authentication, connection control, resource allocation and
METIS research project. As identified by METIS (Li et al., 2014),
interaction between devices.
device-to-device (D2D) communication can be utilized in a number of
Case (iii) Relaying device with device assisted controlled
scenarios, depending upon the requirements. These have been listed
link.
below as per the needs:
The source and destination communicate with each other via relays.
•
The entire communication is controlled and managed by the devices
For backhaul applications, D2D-B
•
themselves, thus eliminating the role of the base station in the
For critical applications, D2D-C
•
communication process.
For direct D2D, without involvement of the core network D2D-D
•
Case (iv) Direct D2D with device assisted controlled link.
For direct M2M communication, D2D-M
•
The source and destination devices communicate directly, without
For non-critical applications, D2D-N
provision of any control links from the base station at all. Thus, these
devices must be careful with respect to the management of interference
A complete overview of the METIS project is available in Dohler
within the device tier and, also with the macro cell tier. Before starting
and Nakamura (2016) and Fodor et al. (2016). METIS 5 G concepts are
the transmission of data, the devices need to find each other (device
evaluated in detail and their significance with D2D communication is
discovery) and then communicate. All these types are depicted in
presented.
Fig. 3.
Another classification of D2D communication is on the basis of the
3.1. Fundamental network architecture spectrum (licensed/unlicensed) accessed by the D2D users. When
device-to-device (D2D) communication occurs on the licensed spec-
The basic network architecture of D2D communication is divided trum, it is referred to as inband D2D and on the unlicensed spectrum,
into three parts (Alkurd et al., 2014): area network, network manage- outband D2D (Asadi et al., 2014a, 2014b). The inband D2D can be
ment and D2D applications. The fundamental architecture is depicted categorized as underlay or overlay. Underlay D2D uses the cellular
in Fig. 2. A large number of devices, communicating with each other via spectrum for cellular communication as well as for device-to-device
direct links form a part of the D2D area network. Aggregators are (D2D) communication, while, in overlay, a dedicated portion of the
available in the network architecture, which collect the data from all the entire spectrum is used for device-to-device (D2D) communication.
D2D devices and after aggregation, connect to the core network. Outband D2D communication can be autonomous or controlled. It is
Thereafter, the data is sent to the gateway, which connects to the said to be controlled when the radio interfaces are coordinated by the
access network. The access network can be wired or wireless. The base station, even though the direct communication is occurring in the
devices are connected to the service providers from the core network. unlicensed band. For autonomous D2D, these interfaces are coordi-
In order to enable working of D2D communication in the cellular nated by the users themselves. For outband D2D communication,
networks, new functionalities need to be added to the existing devices thus need two wireless interfaces, like LTE and Wi-Fi. The
structures. Certain enhancements in the LTE-Advanced (LTE-A) interfaces can be Wi-Fi Direct (Alliance, 2010), Bluetooth (Bluetooth,
architecture (Technical Specification Group Services, 2014) can enable 2001), Zigbee (Alliance, 2006). This categorization of D2D is shown in
the functioning of D2D communication in the existing cellular net- Fig. 4. Coexistence of number of modes increases complexity of the
works. Architecture supports for the next generation networks is system (Asadi et al., 2014b). As a result, the mode i.e. spectrum
described in Lien et al. (2016) and (Yang et al., 2013). Another accessible by the D2D devices should be decided, taking into con-
modified LTE-A network, to support D2D communication has been sideration the overall system conditions. Different types of D2D
discussed in Raghothaman et al. (2013), with the introduction of D2D communication (inband/outband) have their pros and cons. A compar-
server in the system. But security of communication must be ensured. ison between these has been given in Table 2.
Majority of the available literature on device-to-device (D2D)
3.2. D2D types communication is based on underlay inband D2D. It is efficient for
enhancing spectral efficiency, coverage area and other targets for better
Device-to-device (D2D) Communication enabled 5 G cellular net- performance of cellular networks.
12
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
13
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
the basis of the applications demanded by them. Pair 1 demands a on the basis of these types, different channel models exist. Channel
video application, being allocated the largest size time slot of all the modeling and measurements includes three steps: channel measure-
three. Pair 2 demands voice application, allocated a comparatively ment, raw data processing and channel modeling and simulations. The
smaller sized time slot. Pair 3 demands a text application, allocated existing channel models of cellular networks cannot be used in D2D
with the minimum sized time slot. This time, used by D2D pairs is communication directly. The suitability of channel models, in D2D
denoted by TD2D. At another instant, these pairs may demand a scenarios are discussed in Cheng et al. (2015) and different channel
different application, thus, will be allocated suitable sized time slots models for D2D have been presented in Table 3. These consider
then. Such an adaptive time slot allocation is performed using the indoor-to-indoor (I2I), outdoor-to-outdoor (O2O), line-of-sight (LOS)
Hidden Markov Model (HMM). After allocating time slots to the D2D and non-line-of-sight (NLOS) scenarios. The authors categorize the
users, time slots are adaptively allocated to the cellular users from the channel models as deterministic or stochastic. The need for new
remaining time duration. This allocation of time slots to the cellular channel models in D2D communication is the fact that in D2D
users is also adaptive, based on the applications (video, voice and text) communication, both the transmitter and receiver can be mobile and
they demand. The simulations for such a resource allocation can be they may be shadowed by human body.
performed in MATLAB. The time allocated to cellular users is denoted D2D channel modeling is affected by path loss and shadow fading.
by TCellular. A fast fading channel generation method has been proposed in Kim and
The architecture targets throughput maximization, latency mini- Oh (2014), based on Doppler frequency response and, the
mization, and better Quality of Service (QoS). It is an effective solution InternationalTelecommunication Union-Radio(ITU-R) channel model
for overcoming the various open issues in D2D communication. With is extended to the D2D channel. The Doppler effects and scattering are
the proposed approach, resources are shared between the two types of taken into consideration on both the sides, the D2D transmitter as well
users (CUEs and DUEs). Since D2D communication allows direct the D2D receiver. Double ring channel models have been proposed for
communication between proximate users, power consumed is less. As direct communication in Patel et al. (2005), and depicted in Fig. 6. This
a result, this architecture can optimize the overall power of the model assumes use of an Omni directional antenna at the transmitter
network. This proposed architecture is capable of performing direct as well as the receiver. The model considers the existence of uniformly
communication between devices efficiently, thereby improving the spaced scatters at both the ends, i.e. transmitter as well as receiver.
overall network performance and satisfying subscriber demands. The This is a mathematically convenient model. Such a model is particu-
primary focus of the architecture remains optimal resource allocation, larly useful for simulating scattering environments, but computational
so as to meet the subscriber demands in the most efficient manner. No load is high. A D2D model with Rician fading channel has been
single possible architecture can be clearly defined for D2D commu- investigated in Peng et al. (2014). In Li et al. (2015), a three-
nication. This fact becomes clear from Jin et al. (2014), Asadi et al. dimensional two-cylinder model has been proposed for D2D commu-
(2014b) and Rêgo and da (2012). Choice of architecture is dependent nication. From this model, more realistic results can be achieved. New
on a number of factors like, coverage extension, energy efficiency, channel models need to be evaluated, in order to realize the complete
Quality of Service, and other architecture related issues. potential of D2D communication. A number of challenges related to
channel modeling for D2D communication have to be dealt with, and is
an area of open research.
3.3. Channel models for D2D communication
14
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
15
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
Table 4
Different methods of peer discovery for D2D communication and their comparison.
16
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
reuse mode only. The radio resources are allocated using centralized or technique used in Kim et al. (2006). The second phase uses a heuristic
distributed techniques, in D2D communication. Centralized techniques sub channel allocation scheme, which takes into consideration, the
result in increased complexity in case of large networks, supporting a minimum data rate constraint for resource allocation. The incentive
large number of UEs. In these techniques of resource allocation, resource allocation scheme is proposed in Sun et al. (2015). It
resources are allocated to the D2D users and cellular users by the base introduces energy efficiency, as an incentive parameter and stimulates
station (BS). Distributed techniques, on the other hand, decrease the cooperation among users. For the users needing cooperation, DUE
device complexity, and reduce interference with the cellular networks. relays maximize the received signal-to-noise ratio (SNR) first. Then,
Some distributed techniques of resource allocation in D2D commu- the resource allocation problem is formulated for two users and finally
nication is studied in Zhang et al. (2013), Song et al. (2014), Kuang solved using a two-dimensional search method. A semi-control re-
et al. (2015), Zhang et al. (2013), and Mohammed and Hossain (2014). source scheduling algorithm has been proposed in Wang et al. (2013),
In cellular networks, information like channel gains, SINR measure- in which the boundary of the resource-assignment and resource-
ment etc. are uncertain and time-varying. Robust resource allocation contention area is adjusted dynamically. A proportional fair scheduling
can then deal with optimization problems under such circumstances, (PFS) technique is used for resource allocation, and maintaining
and can model the uncertainties by ellipsoids, polyhedrons and D-norm overall fairness of allocation. The simulation results show that the
methods (Kai et al., 2008). A number of resource allocation algorithms performance of this algorithm is far better than round-robin schedul-
have been proposed by the researchers for efficient utilization of the ing. The authors of Zheng et al. (2015) propose an adaptive time
spectrum. Hybrid solutions can also be provided and are an open area division scheduling algorithm which also is based on proportional
of research. An effective hybrid technique is discussed in Lee et al. fairness algorithm for adaptively scheduling D2D pairs. For reduction
(2014). of delay, wireless caching with D2D is a smart choice. A resource
In Zhou et al. (2013), intra cluster retransmission scheme has been allocation scheme, based on social interaction is addressed in Wu et al.
proposed for efficient resource utilization A Heuristic Location (2016), for improvement of the system efficiency. Heuristic algorithms
Dependent Resource Allocation Algorithm has been proposed for dynamic resource allocation have been investigated upon
in Botsov et al. (2014) and resource pooling in Fodor et al. (2012). in Belleschi et al. (2015).
Taking into consideration the spectral efficiency of LTE-A networks, A radio resource management scheme for V2X communications has
(Phunchongharn et al., 2013) proposes a resource allocation technique. been formulated in Sun et al. (2016). As V2X communications adhere
It minimizes the transmission length of the D2D links on increased to strict latency and reliability requirements, an NP hard optimization
power consumption. An NP-Complete problem is formulated (Garey problem is formulated, to enable robust resource allocation. Optimal
and Johnson, 1979) as a Mixed Integer Programming problem and a resource allocation for improving the delay performance of VANETs
column generation method allocated resources optimally, supporting has been discussed in Cao et al. (2016). Packet lifetime is checked
low complexity. In Koskela et al. (2010) and (Hakola et al., 2010), the periodically by each vehicle, and D2D links are setup, if needed. An
authors target the Signal-to-Interference-plus-Noise ratio (SINR). The optimal receiver vehicle is selected for the establishment of D2D links.
authors (Feng et al., 2013) provide a method for overall throughput The effectiveness of the proposed algorithm is validated by simulation
improvement and enhancement in spectral efficiency through power results. Resource allocation techniques for applying D2D communica-
allocation and admission control. A general resource scheduling tion in VANETs have been discussed in Weijun et al. (2014) also, which
problem is investigated in Asadi et al. (2014b). support high density of vehicles.
In Gjendemsjo et al. (2006), Chandrasekhar and She (2008), non- The authors of Ciou et al. (2015) propose a Greedy Throughput
orthogonal resource sharing is discussed, considering the maximum Maximization plus (GTM+) algorithm for resource allocation. It
transmit power constraint of the user devices. The authors of Wang considers multi-sharing resource allocation in cellular networks con-
et al. (2011) propose an optimal resource allocation technique that is taining D2D links. GTM+, which is an iterative algorithm, maximizes
able to significantly improve the sum throughput of D2D communica- throughput by taking into consideration conflict graph and maximal
tion as well as the cellular communication, in a network. In order to weight independent set. The system performance is better with the
improve the overall network throughput and user satisfaction ratio, the GTM+ algorithm, compared to other algorithms, in terms of system
authors of Chen et al. (2015) introduce a time-division scheduling throughput, percent D2D pairs permitted, and running time. The
algorithm for efficient utilization and allocation of resources, using authors of Chen et al. (2014) propose a distributed resource allocation
non-orthogonal sharing mode. In Liu et al. (2013), the authors propose and power control strategy for resource allocation to enhance the
a semi-persistent resource reuse algorithm in inter cell as well as intra system capacity. A brief overview of some of the mentioned algorithms
cell scenarios for improvement of throughput of the network. The has been given in Table 5. Different algorithms proposed by the various
authors of Yu and Tirkkonen (2012) introduce a rate splitting based researchers target optimization of various parameters. This has been
resource sharing algorithm, in which the message being transmitted is depicted in Table 6, which clearly depicts the particular parameter
divided into a public part and a private part. The private part of the maximized for every algorithm.
message can be decoded only by the receiver for which it is intended. On the basis of a comparative analysis of the various algorithms
The public part is available to all receivers. In comparison to other discussed so far, we have observed that compared to other well known
algorithms, it is possible to achieve higher sum rate with rate splitting schemes, (Lin et al., 2013; Liu et al., 2013) (Particle Swarm optimiza-
mode. A dynamic resource allocation scheme has been proposed in Liu tion and Semi-Persistent Scheduling) have provided the best perfor-
et al. (2015) with joint beamforming, routing and flow control. It is an mance. Taking throughput as the parameter of comparison, a compar-
efficient method for reducing the signaling overhead, and the overall ison of some of the discussed algorithms has been shown in Fig. 8.
latency. Other parameters for comparison of the algorithms can be: D2D access
The authors of Lin et al. (2013) aim at maximization of the system rate, user satisfaction ratio, spectral efficiency, energy efficiency etc (as
throughput, considering the minimum data rate requirement. To shown in Table 6). From the graph, it is clear that for the same
obtain the solution, particle swarm optimization (Kennedy, 2010) simulation parameters, maximum system throughput is achieved
method is used. D2D communication underlying cellular network is by Lin et al. (2013).
considered, and the results show that the system performance can Hence, it is one of the most efficient resource allocation algorithms
greatly improve with this technique of mode selection and resource of available in literature.
allocation. A two-phase resource allocation scheme for D2D commu- Any resource allocation strategy needs to follow a sequence of steps,
nication underlying cellular networks has been proposed in Le (2012). for optimal allocation of resources and throughput maximization.
The first phase performs optimal resource allocation, on the basis of the These have been depicted below, by using a simple network model
17
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
18
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
Table 5 (continued)
Table 6
Comparative analysis of resource allocation algorithms (Comparing Performance
Metrics).
PD (j ) GD (j )
D (j )=
σ0 + Pcu (i ) Rij ID (j ), cu (i ) (2)
where Rij € {0,1}, such that.
Rij=1 when jth pair shares resources with ith cellular user,
otherwise 0.
The minimum SINR requirements for the D2D pair and cellular
user within a network are stated as,
Fig. 8. Comparison of Throughput of Different resource allocation algorithms.
min
D (j ) ≥ έ D (3)
and mathematical equations. min
cu (i ) ≥ έ cu (4)
1) Network model In order to ensure fulfillment of these SINR conditions, when no
resources are shared between D2D users and cellular users, minimum
A single cell scenario with the base station at the centre is transmission power of the cellular users must be
considered having n number of D2D pairs and m number of cellular
min
users (Fig. 9). In D2D underlaying cellular communication networks, έ cu σ0
Pcumin(i ) =
interference between the CUEs and DUEs is high. This is controlled by Gb, cu (i ) (5)
the base station, acting as a controlling entity. A path loss model is
Similarly, for the D2D user, the minimum transmission power is
19
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
20
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
Table 8 sion power of UEs in cellular as well as D2D modes, with respect to
Power control algorithms in D2D communication. their positions within a cellular system. With D2D communication
underlaying cellular networks, there is considerable power saving in
Reference Algorithm Description Objective
No. the cellular network, as depicted. This benefit of D2D communication
has been investigated upon by the various algorithms discussed above.
(Wang Game theory based Stackelberg game Improvement in Thus, overcoming the challenge of power control in device-to-device
et al., power control model is used for the D2D
(D2D) communication is essential for the overall power optimization in
2014) scheme selecting source and transmission
controlling the power quality the network.
(Song et al., Joint Power and Maximize the sum rate Coexistence of
2015) Rate control for of the cellular users in both cellular and 4.4. Interference control
D2D the network, D2D users
communication in guaranteeing Quality of contributing
Device-to-device (D2D) communication, a competent technology
cellular networks Service (QoS) of D2D towards
communication at the improving system for the next generation networks (NGNs) promises lower delay, lower
same time throughput transmission power, increased system capacity, etc. Integration of D2D
(Lee et al., Centralized and Centralized power Improved technology with cellular networks results in interference, due to the
2015) distributed power control ensures throughput
sharing of same resources between them. When the cellular downlink
control algorithms sufficient coverage performance of
using stochastic probability of cellular cellular users resources are shared by the D2D users, the cellular users and their
geometry users and distributed achieved neighbors suffer interference. The receiver of the D2D pair is also
method maximizes sum susceptible to counter interference by the base station.
rate of D2D links When sharing cellular uplink resources, the base station suffers
(Fodor and Distributed Power ALPF method is used , Minimize the
interference by the D2D users. Interference between D2D users and
Reider, Control Scheme with optimal SINR overall power
2011) target, to control the consumption of cellular users may be intercell or intracell and needs to be mitigated for
user equipment power the network proper functioning of D2D communication in cellular networks. The
(Jiang Joint resource Penalty function Maximizing existing interference management schemes are not capable of inter-
et al., allocation and approach is adopted for energy efficiency
ference mitigation in the next generation networks. A survey, along
2015) power control power control in the of the network
technique network; the problem
with a comparison of various existing schemes has been provided
is formulated as a non- in Hossain et al. (2014), suggesting guidelines for modification of the
convex optimization various schemes and efficiently deal with the next generation networks.
problem, and solved Interference mitigation is possible through proper mode selection,
using a two-layer
optimum resource allocation and power control of the devices. The
scheme
(da Silva Binary Power A simple algorithm Improve spectral various approaches for interference mitigation are categorized into
and Control Scheme achieving near optimal efficiency and three types:
Fodor, utility , efficiently power efficiency
2015) supporting a large
number of D2D pairs in
• Interference Cancellation Techniques, which use advanced coding
the cellular network
and decoding methods for cancellation of interference signals at the
(Xiao et al., Distance based Access point selection, Better tradeoff CUE or DUE. Interference cancellation techniques have the ability to
2016) mobile association mode switching, relay achieved between enhance the capacity of cellular networks.
Scheme selection and power
control, all are
energy efficiency
and complexity, in
• Interference Avoidance Techniques, which avoid interference be-
tween cellular links and D2D links by using orthogonal time-
considered and basis of comparison to
this technique is the other techniques frequency resource allocation techniques.
location of UEs in the
network
• Interference Coordination Techniques, which mitigate interference
between D2D and cellular links with power control schemes and
(Xu et al., Revised Graph A fast converging Considerable proper scheduling.
2016) coloring based pilot algorithm proposed to reduction in pilot
allocation overcome pilot overhead
contamination by A number of algorithms have been proposed to overcome the
limiting D2D problem of interference in D2D underlaid cellular networks.
transmission power. It Interference management is studied in Guo et al. (2015), by consider-
is an optimal choice for
ing the Interference suppression area's range. Adjusting the interfer-
practical
considerations. ence suppression area adequately provides an optimal system perfor-
mance. Interference aware interference mitigation methods in D2D
communication have been discussed in Kwon et al. (2014), where the
interference information is known to the UE by the base station or
through a blind estimation. It is an efficient technique for improving
the system throughput. Another interference aware scheme has been
proposed in Janis et al. (2009), based on Hungarian algorithm and
aims at maximization of the number of permissible D2D pairs. The
authors in Yin et al. (2015) propose an interference coordination
scheme by joint spectrum allocation and power control. This scheme
guarantees Quality of service to the D2D users as well cellular users. An
interference cancellation technique has been proposed in Zhou et al.
(2015), where authors maximize the utility of the network by con-
sidering transmission powers of users in the network. In Xiao et al.
(2011), the authors propose a technique for interference reduction by a
Fig. 10. Power saving in D2D mode.
power optimization scheme.
Most of the existing literature on D2D communication exclusively
focuses on single-antenna systems. However, in the next generation
21
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
22
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
2) Secrecy Algorithms in D2D Communication trusted relay, via a secure beam forming design, which provides high
level of secrecy. The DUEs are not powerful enough to prevent attacks
To make D2D communication secure, physical layer security plays a from eavesdroppers, and fighting for attacks upon them. Wang et al.
key role. The concept of physical layer security came into picture to (2015) present a heuristic genetic algorithm to select jamming partners
describe the physical characteristics of wireless channels. Sensitive for DUEs in the network. The secrecy rate has been maximized, by a
information may be retrieved by the eavesdropper, in a communication two step approach: power allocation for worst case eavesdropper and
system. Physical layer security employs techniques which exploit the best jamming partner selection, which is clearly depicted in the
characteristics of the wireless channel, modulation, coding, and multi- simulation results. Using a cryptographic approach, Zhang et al.
ple antennas to avoid eavesdropping. Physical layer security is inves- (2015) introduce a secure data sharing protocol. This uses symmetric
tigated in Zhang et al. (2016) to improve secrecy performance of the encryption, along with public key based signature to achieve security.
system. The authors in Zhang et al. (2015) investigate physical layer Security goals fulfilled by this protocol are data confidentiality,
security in Cooperative D2D networks. Cooperation among cellular integrity, transmission and reception non-repudiation, entity authenti-
users and D2D users is formulated as a coalition game, based on Max- cation and free riding resistance. Accounting social relationships and
Coalition order for an efficient cooperation, along with guaranteed proximity between devices, a game theoretic approach is used in the
secrecy in the network. The physical layer security is proposed, proposed solution to improve the system performance, in terms of
considering an energy-constrained D2D transmitter. Wireless power throughput and latency. It is also efficient in enhancing network
transfer (WPT) model is used to ensure secrecy of transmissions. In coverage. The work in Wang and Wu (2015) investigates upon selection
order to ensure secure D2D communications, certain security require- of jamming partners for D2D users by taking into consideration full
ments need to be fulfilled. and partial channel state information (CSI). Heuristic genetic algo-
Another concept is secrecy capacity, which quantifies the security of rithm and low complexity optimization problems have been proposed
transmission. It defines the maximum rate of faithful information sent for maximizing the worst case eavesdropping in D2D communications.
from transmitter to receiver, in the presence of threat from eaves- Trust and social aware cooperation is mandatory for adoption of
dropper. In Zhang et al. (2014), secrecy capacity in cellular networks D2D communication on a large scale (Ometovy et al., 2016). For
with underlaying D2D communication has been explored. A graph- ensuring secure D2D communications, sociality of users and trust
based model is used for radio resource allocation problem and factors play an essential role. The trustworthiness of a device is given in
formulated as a matching problem in a weighted bipartite graph. To terms of its trust value, adjusted by the BS, as per the last transaction
obtain maximum secrecy capacity for DUEs and CUEs, the Kuhn over the D2D link. For any user, mth transaction of D2D pair, it is given
Munkres (KM) algorithm has been considered. This algorithm provides by using the Gompertz function (Kenney and Sydney Keeping, 1954),
better performance, in comparison to random or greedy spectrum as,
sharing.
ta (m)= ( −1t
For ensuring secure D2D transmissions, encryption of messages by a (m −1) )+∆ta (m ) (11)
cryptographic techniques is required. A secure key agreement protocol
where ᶃ(z) denotes the Gompertz function, for a vector z, denoted by
has been presented in Shen et al. (2014), enabling establishment of a
shared secret key between UEs, and is based on Diffie-Hellman key (z )= e−e
−CG (z )
(12)
agreement protocol. The main advantage of this protocol is low
computation and communication overhead. The simulation results where
show that a higher level of usability is possible with this protocol. CG(z) determines sensitivity of the trust value variation, along time.
With the increase in the number of eavesdropper, the D2D perfor- Also ∆ta (j ) denotes the device's behavior at mth transaction.
mance degrades. A solution is proposed in Abd-Elrahman et al. (2015) Relationships based on trust among users have been extensively
to secure D2D discovery and D2D communication in cellular networks, studied, of which an important one is discussed in Urama et al.
based on Identity Based Encryption (IBE). Ensuring security in cellular (2016). D2D communications require a sophisticated control to resist
networks with D2D communications is an open research area. This eavesdropping and other security attacks. Malicious behavior of devices
scheme is not useful, for multi-domain networks. As a result, Abd- in a D2D environment resulting in data loss is studied in Militano et al.
Elrahman et al. (2015) investigate upon ensuring security in discovery (2016) and 86% reduced data loss is achieved with the proposed trust
and communication phases of D2D communication in multicast group bases coalition game. Another technique to limit the impact of
communication. Group Key management has been studied, for ensur- malicious nodes has been proposed in Militano et al. (2016), and is
ing the security. This mechanism ensures high security, in comparison based on trust solutions. Simulation results show how filtering of
to other methods. In Liu et al. (2016), security in cognitive D2D malicious nodes is done with the proposed scheme, thereby increasing
networks is considered. Authors in Wang and Yan (2015) propose successful cooperative interactions in small-scale IoT environments.
security architecture for D2D communication and the requirements to Security of direct communication is a key concern, which determines
ensure security have also been suggested. Various applications and use ultimate adoption of this technology. Spatial and social notions of
cases of D2D communication have also been discussed. proximate users are addressed in Ometov et al. (2016) for improving
Since security is a major concern for device-to-device (D2D) the system performance using game-theoretic mechanisms. Although
communication, for D2D assisted cellular networks, secure throughput there was increased overhead, but seamless connectivity was provided
optimization solution has been proposed in Ometovy and Orsino to users outside the network coverage as well. This clearly depicts the
(2016). Public safety D2D communication over LTE Hetnets have been impact of social and spatial notions, on the performance of D2D
investigated in Tata and Kadoch (2014) for addressing the issue of networks.
secure network coding. Using data splitting mechanism, an algorithm The various security algorithms for device-to-device (D2D) com-
is presented, and named as Secure Network Coding based Data munication have been listed in Table 10. Security algorithms allow
Splitting Algorithm. It avoids passing of information to the eaves- transmission and reception of the information among intended users
dropper, without increase in overhead of the system. The sequence of only. Algorithms in Zhang et al. (2015) and Wang et al. (2015) prove to
the sent packets is known only to the source and destination, thus, not be highly efficient for securing D2D links. A comparison of achievable
allowing any useful data to be known to the attackers. A technique to secrecy capacity by different algorithms has been shown in Fig. 13.
prevent eavesdropping in MIMO D2D communication is investigated From the above discussion, it is quite clear that a very challenging task
in Jayasinghe et al. (2015). A relay in the network performs physical for the research community still remains securing the direct links.
layer network coding (PNC). The devices communicate through this Possible attacks on the links are becoming more threatening with the
23
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
24
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
Fig. 13. Comparison of secrecy capacity from different security algorithms in D2D.
25
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
networking, smart grids (Fey et al., 2012), D2D for e-health, D2D for networks (UDNs) is posing serious threat to the integrity, confidenti-
smart city etc. Some use cases of D2D communication have been ality and authenticity of the information transfer over direct links. This
addressed in Lei et al. (2012). D2D communication has the ability to needs special attention from the research community. Measures have
support a number of telecommunication applications as well. been proposed, yet, it remains a vital challenge, seeking further
In case of multiuser cooperative communication (MUCC), device- investigation. After this extensive survey on D2D communication, it
to-device (D2D) communication can provide innovative ideas for is quite eminent that security remains an exclusive research field for
enhancement of the network performance. Device-to-device (D2D) practicable implementation of D2D communication. The proposed
communication is an optimal choice for provision of energy efficient solutions and architectures may not be the only one, but are an
communication within cellular networks. If a group of users request the efficient means to target and solve the research challenges.
same services from the base station (BS), they can collectively form a
cluster. The content requested will be served by the base station to the 8. Conclusion
cluster head only, which can then be multi casted to the rest of the
users. This supports energy efficiency within the network and also In this paper, device-to-device (D2D) communication has been
reduces unnecessary overhead. comprehensively outlined. It is a promising technology of the next
D2D communication, in conjunction with Internet of Things (IoT) generation networks, which ensures increased system capacity, en-
results in a massive interconnected wireless network (Bello and hanced throughput, reduced latency and efficient spectrum utilization.
Zeadally, 2014) which has the ability to support numerous applica- Fundamentals of D2D communication have been discussed in depth,
tions. Achieving intelligent D2D communication in the IoT is over- including the basic D2D architecture. A number of key issues in D2D
viewed in Bello and Zeadally (2016). Device-to-device (D2D) commu- communication have been discussed. Architecture for D2D commu-
nication assures low energy consumption, thus supporting energy nication has been proposed, considering the scenario of NGNs, using
efficiency in the Internet of Things (IoT). The remarking potential of directional antennas at the base station, dividing the cell into three
D2D communication in IoT, for the next generation networks is studied sectors. Such a scenario provides better coverage, high spectral
in Militano et al. (2015). A distinctive application is Vehicle-to-Vehicle efficiency and enhanced network capacity, overcoming the various
(V2V) communication, playing a vital role in car crash warning systems open challenges of D2D communication. Possible security attacks on
(Hayami et al., 2015; Bohmländer et al., 2015), brake coordinating D2D communication have been described. The future networks contain
systems, intelligent transport systems (Warabino et al., 2005). Device- dense deployments, resulting in Ultra dense networks (UDNs), causing
to-device (D2D) communication has the ability to serve as an im- high risk of jamming attack in them. A solution for securing D2D
portant component for assuring public protection and disaster relief communication has also been proposed, which is based on IP security
(PPDR) and national security and public safety services (NSPS). The (IP Sec). A few examples have been quoted, where D2D communication
network requirements to support these are discussed in Fodor et al. plays a crucial role. Thus, D2D communication is an integral technol-
(2014). Therefore, D2D communication is an important emerging ogy of the future networks, motivating the researchers to overcome the
technology of the future networks. associated challenges in order to completely take advantage of its
utility.
7. Research challenges in D2D communication
References
Although D2D communication is an open research field for
academicians, as well as industrialists, but still there exists wide range Muraleedharan, Rajani, Lisa A. Osadciw, 2006. Jamming attack detection and
of challenges in its implementation. Modification is needed on the part countermeasures in wireless sensor network using ant system. In: Proceedings of the
Defense and Security Symposium. International Society for Optics and Photonics.
of the user equipments (UEs). This includes: UEs supporting device 3GPP TR 22.803, 2012. Feasibility study for proximity services (ProSe) (Release 12), v.
discovery; Proximity Services (ProSe); and relay functionality in the 12. 2. 0, June
relay scenario. The protocols for device discovery in D2D must consider 3GPP TR 23.703, 2013. Study on architecture enhancements to support proximity
services (ProSe) (Release 12), v. 1. 0. 0 , December.
reduction of energy consumption by the UEs. The issue of UE discovery Gjendemsjo, A., Gesbert, D., Oien, G.E., Kiani, S.G., 2006. Optimal power allocation and
and its power consumption is an open research problem. For efficient scheduling for two-cell capacity maximization. In: Proceedings of the International
utilization of the limited available spectrum, optimal resource alloca- Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless
Networks.
tion is required. While allocating the resources to the DUEs in the Abd-Elrahman, Emad, Hatem Ibn-khedher, Hossam Afifi. D2D group communications
cellular networks, for enabling them to communicate, care must be security. In: Proceedings of the 2015 International Conference on Protocol
taken that the same resources are not shared by the nearby CUEs. If it Engineering (ICPE) and International Conference on New Technologies of
Distributed Systems (NTDS), . IEEE, 2015.
is so, chances of interference are very high. Interference management is
Abd-Elrahman, Emad, et al., 2015. Fast group discovery and non-repudiation in D2D
being studied by the researchers but the nature of the interference is communications using IBE. In: Proceedings of the 2015 International Wireless
not completely exploited and understood. Interference management Communications and Mobile Computing Conference (IWCMC).
and avoidance involves addressing issues like collision issues, conges- Abrol, Akshita, Kumar Jha, Rakesh, 2016. Power optimization in 5G networks: a step
towards GrEEn communication. IEEE Access 4, 1355–1374.
tion, and power control. All these issues need to be addressed in an Akhil, Gupta, Kumar Jha, Rakesh, 2015. A survey of 5 G network: architecture and
accurately balanced manner. emerging technologies. IEEE Access 3, 1206–1232.
For enabling any type of communication, channel information must Alkurd, R., Shubair, R., Abualhaol, I., 2014. Survey on device-to-device communications:
Challenges and design issues. In: Proceedings of the 2014 IEEE 12th International
be precisely available. This is a challenging perspective for implemen- New Circuits and Systems Conference (NEWCAS). IEEE.
tation of D2D communication, as, for the direct communication, extra Alliance, N.G.M.N., 2015. 5G white paper. Gener. Mob. Netw. White Pap..
channel information is required, resulting in an increased overhead. Alliance, W., 2010. Wi-Fi Peer-to-Peer (P2P) Specification v1. 1, WI-FI ALLIANCE
SPECIFICATION, vol. 1, pp. 1–159.
Controlling and charging for D2D services is a vital concern for the Alliance, Z., 2006. Zigbee specification, Document 053474r06, Version, vol. 1
service providers. The service providers may charge for security. The Asadi, Arash, Wang, Qing, Mancuso, Vincenzo, 2014a. A survey on device-to-device
modulation format for D2D communication is yet to be addressed. communication in cellular networks. IEEE Commun. Surv. Tutor. 16.4, 1801–1819.
Asadi, Arash, Jacko, Peter, Mancuso, Vincenzo, 2014b. Modeling multi-mode D2D
Addressing these critical problems thoughtfully will help in practical communications in lte. arXiv Prepr. arXiv 1405., 6689.
implementation of D2D communication, in cellular networks. Astely, D., et al., 2013. LTE release 12 and beyond. IEEE Commun. Mag. 51 (7),
A critical research challenge, considering the practicality of D2D 154–160.
B. Raghothaman et al., 2013. Architecture and protocols for LTE-based device to device
communication, is security of the direct links. The D2D links are highly
communication. In: Proceedings of the ICNC, pp. 895–899
susceptible to various security attacks (listed in Table 8). As a result of Bagheri, H.. et al. 2015. Device-to-device proximity discovery for LTE systems. In:
densification of the cellular architecture, jamming in Ultra dense Proceedings of the 2015 IEEE International Conference on Communication
26
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
27
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
28
P. Gandotra et al. Journal of Network and Computer Applications 78 (2017) 9–29
Yu, C.-H., Doppler, K., Ribeiro, C., Tirkkonen, O., 2009. Power optimization of device-to- Dr. Rakesh Kumar Jha (S′10-M′13-SM’15) received
device communication underlaying cellular communication systems. In: Proceedings the B.Tech. degree in electronics and communication
of the IEEE International Conference on Communications, June. engineering in Bhopal, India, the M.Tech. degree from
Yu, Chia-Hao, Olav Tirkkonen, 2012. Device-to-device underlay cellular network based NIT Jalandhar, India, and the Ph.D. degree from NIT
on rate splitting. In: Proceedings of the IEEE Wireless Communications and Surat, India, in 2013. He is currently an Assistant
Networking Conference (WCNC). Professor with the School of Electronics and
Yue, Jianting, et al., 2013. Secrecy-based access control for device-to-device Communication Engineering, Shri Mata Vaishno Devi
communication underlaying cellular networks. IEEE Commun. Lett. 17.11, University, Jammu and Kashmir, India. He is carrying
2068–2071. out his research on wireless communication, power opti-
Zhang, Aiqing, et al., 2015. SeDS: secure data sharing strategy for D2D communication mizations, wireless security issues, and optical communi-
in LTE-AdvancedNetworks. IEEE Trans. Veh. Technol.. cations. He has authored over 30 international journal
Zhang, Bo, et al., 2015. Energy-efficient architecture and technologies for device to device papers and more than 20 international conference papers.
(D2D) based proximity service. China Commun. 12.12, 32–42. His area of interest is wireless communication, optical fiber
Zhang, H.. et al. 2014. Radio resource allocation for physical-layer security in D2D communication, computer networks, and security issues. Dr. Jha’s concept related to
underlay communications. In: Proceedings of the 2014 IEEE International router of wireless communication has been accepted by the International
Conference on Communications (ICC). IEEE. Telecommunication Union (ITU) in 2010. He received the Young Scientist Author
Zhang, J.. et al. 2013. Utility-maximization resource allocation for device-to-device Award from ITU in 2010, the APAN Fellowship in 2011 and 2012, and the Student Travel
communication underlaying cellular networks. Globecom Workshops (GC Wkshps), Grant from COMSNET in 2012. He is a Senior Member of the Global ICT Standardization
2013 IEEE. IEEE. Forum for India, Society for Industrial and Applied Mathematics, the International
Zhang, R., Cheng, X., Yang, L., 2015. Cooperation via Spectrum Sharing for Physical Association of Engineers, and the Advance Computing and Communication Society. He is
Layer Security in Device-to-DeviceCommunications Underlaying Cellular Networks. also a member of Association for Computing Machinery (ACM).
In: Proceedings of the 2015 IEEE Global Communications Conference
(GLOBECOM). IEEE.
Zhang, R., Cheng, X., Yang, L., 2016. Joint power and access control for physical layer Prof. Sanjeev Jain born at Vidisha in Madhya Pradesh in
security in D2D communications underlaying cellular networks. In: Proceedings of 1967, obtained his Post Graduate Degree in Computer
the IEEE International Conference on Communications (ICC). IEEE. Science and Engineering from Indian Institute of
Zhang, Rongqing, et al., 2013. Distributed resource allocation for device-to-device Technology, Delhi, in 1992. He later received his
communications underlaying cellular networks. In: Proceedings of the 2013 IEEE Doctorate Degree in Computer Science & Engineering
International Conference on Communications (ICC). IEEE, 2013. and has over 24 years’ experience in teaching and research.
Zheng, J., Chen, B., Zhang, Y., 2015. An Adaptive Time Division Scheduling Based He has served as Director, Madhav Institute of Technology
Resource Allocation Algorithm for D2D Communication Underlaying Cellular and Science (MITS), Gwalior. Presently, he is working as a
Networks. In: Proceedings of the 2015 IEEE Global Communications Conference vice chancellor at Shri Mata Vaishno Devi University,
(GLOBECOM). IEEE. Katra. Besides teaching at Post Graduate level Professor
Zhou, Bin, et al., 2013. Intracluster device-to-device relay algorithm with optimal Jain has the credit of making significant contribution to R
resource utilization. IEEE Trans. Veh. Technol. 62.5, 2315–2326. & D in the area of Image Processing and Mobile Adhoc
Zhou, L., Ruttik, K., Tirkkonen, O., 2015. Interference canceling power optimization for Network. He has guided Ph.D. Scholars and has under-
device to device communication. In: Proceedings of the 2015 IEEE 81st Vehicular taken a number of major R & D projects sponsored by the Government and Private
Technology Conference (VTC Spring). Agencies. His work on Digital Watermarking for Image Authentication is highly valued in
Zhou, Yun, Fang, Yuguang, Zhang, Yanchao, 2008. Securing wireless sensor networks: a the research field. He is also a member of Association for Computing Machinery (ACM).
survey. IEEE Commun. Surv. Tutor. 10.3, 6–28.
Zhou, Zhenyu, et al., 2016. Iterative energy-efficient stable matching approach for
context-aware resource allocation in D2D communications. IEEE Access.
Zou, Kingsley Jun, et al., 2014. Proximity discovery for device-to-device communications
over a cellular network. IEEE Commun. Mag. 5 (2.6), 98–107.
29