Device to device communication: A survey

被引:47
|
作者
Pedhadiya, Mittal K. [1 ]
Jha, Rakesh Kumar [2 ]
Bhatt, Hetal G. [3 ]
机构
[1] SK Patel Inst Technol, Visnagar 384315, India
[2] Shri Mata Vaishno Devi Univ, Sch Elect & Commun Engn, Katra, Jammu & Kashmir, India
[3] SK Patel Univ, Elect & Commun Engn Dept, Visnagar 384315, India
关键词
Beamforming; D2D communication; Green communication; Intrusion detection system; RADIO RESOURCE-ALLOCATION; POWER-CONTROL SCHEME; CELLULAR NETWORKS; D2D COMMUNICATIONS; GREEN COMMUNICATION; MODE SELECTION; BATTERY LIFE; SECURITY; PRIVACY; CHANNEL;
D O I
10.1016/j.jnca.2018.10.012
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the advanced communication technology, the number of users and applications are increasing exponentially leading towards the scarcity of resources and an increase in power consumptions. The data traffic on the base station also rises with the number of users. For the reduction in the outage probability of the cellular users in 5G, device to device (D2D) communication considered as a prominent solution. D2D communication can occur as an underlay or overlay mode reusing the cellular licensed band. In this paper existing work on resource allocation for in-band underlay D2D communication mode is analyzed taking different scenarios for sharing of common resources among cellular and D2D users. Various methods for resource allocation for D2D communication are discussed extensively, including auction algorithm, game theory approach, graph theory, greedy water filling, fractional frequency reuse (FFR) and iterative method. The second important aspect of communication is power conservation, D2D communication does data offloading and battery life conservation. Along with the battery life conservation, power control techniques discussed at length. A summary of methods used in the existing research like energy harvesting with simultaneous wireless information and power transfer (SWIPT), the sleep mode of the base station (BS) is presented. Further, in the view of D2D this paper presents insight of green communication. The characteristic of D2D communication being to reuse resources attracts researchers, academia, and industries to work on security aspects. From a security perspective of D2D communication existing work on physical layer security, intrusion detection system and beamforming are discussed.
引用
收藏
页码:71 / 89
页数:19
相关论文
共 50 条
  • [41] Outage Analysis of Device-to-Device Communication System
    Hussain, Z.
    Khan, A. U. R.
    Mehdi, H.
    Saleem, S. M. A.
    VISNYK NTUU KPI SERIIA-RADIOTEKHNIKA RADIOAPARATOBUDUVANNIA, 2018, (74): : 36 - 43
  • [42] Opportunistic Device-to-Device Communication in Wireless Downlink
    Akarsu, Alper
    Girici, Tolga
    2015 23RD SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2015, : 1066 - 1069
  • [43] Device to Device Communication over 5G
    Khan, Md. Tabrej
    Adholiya, Ashish
    COMPUTING SCIENCE, COMMUNICATION AND SECURITY, 2022, 1604 : 255 - 273
  • [44] Overlaid Device-to-Device Communication in Cellular Networks
    George, Geordie
    Mungara, Ratheesh K.
    Lozano, Angel
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 3659 - 3664
  • [45] Opportunistic Discovery Scheme for Device-to-Device Communication
    Park, Kwon-Yeol
    Chang, Young-Bin
    Kim, Dong-Woo
    Kim, Jong-Han
    Hur, Woon-Haing
    2017 IEEE 22ND INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2017,
  • [46] Link Adaptation for Unicast Device-to-Device Communication
    Li, Yu-Ngok Ruyue
    He, Haigang
    Yuan, Yifei
    Wu, Shuanshuan
    2017 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2017,
  • [47] Full Duplex Device to Device Communication in Cellular Networks
    Kim, Sanghoon
    Stark, Wayne
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 721 - 725
  • [48] Device-to-Device Communication with Named Data Networking
    Shang, Wentao
    Afanasyev, Alex
    Li, Yanbiao
    Burke, Jeff
    Zhang, Lixia
    PROCEEDINGS OF THE 4TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN 2017), 2017, : 184 - 185
  • [49] Secure Device-to-Device Communication in LTE-A
    Alam, Muhammad
    Yang, Du
    Rodriguez, Jonathan
    Abd-Alhameed, Raed A.
    IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (04) : 66 - 73
  • [50] A secure Device-to-Device communication scheme for massive Machine Type Communication
    Roychoudhury, Probidita
    Roychoudhury, Basav
    Saikia, Dilip K.
    COMPUTERS & SECURITY, 2021, 108