Next Article in Journal
A Limit Load Solution for Anisotropic Welded Cracked Plates in Pure Bending
Next Article in Special Issue
Method of Colors and Secure Fonts Used for Source Shaping of Valuable Emissions from Projector in Electromagnetic Eavesdropping Process
Previous Article in Journal
D-Stability of the Initial Value Problem for Symmetric Nonlinear Functional Differential Equations
Previous Article in Special Issue
Dynamic Job Scheduling Strategy Using Jobs Characteristics in Cloud Computing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Device-To-Device Communication in 5G Environment: Issues, Solutions, and Challenges

by
Mohd Hirzi Adnan
1,2,* and
Zuriati Ahmad Zukarnain
1,*
1
Faculty of Computer Science and Information Technology, University Putra Malaysia, Seri Kembangan 43400, Malaysia
2
Department of Information Security, Faculty of Computer Science and Information Technology, University Putra Malaysia, Seri Kembangan 43400, Malaysia
*
Authors to whom correspondence should be addressed.
Symmetry 2020, 12(11), 1762; https://doi.org/10.3390/sym12111762
Submission received: 10 September 2020 / Revised: 30 September 2020 / Accepted: 30 September 2020 / Published: 24 October 2020
(This article belongs to the Special Issue Symmetry and Asymmetry in Communications Engineering)

Abstract

:
Device-to-device (D2D) communication produces a new dimension in the mobile environment, easing the data exchange process between physically neighboring devices. To achieve an effective utilization of available resources, reduce latency, improve data rates, and increase system capacity, D2D communication utilizes nearby communicating devices. The mobile operator’s action to collect the short-range communications for maintenance of the proximity-based services and improve the performance of networks drives the development of D2D. This paper presents an extensive review of proposed solutions aiming to enhance the security in D2D communication. The main goal of the research is to present an extensive review of the recent advances in various D2D domains such as the discovery process, mode selection schemes, interference management, power control techniques and finally the mode selection for D2D applications for 5G technologies. Additionally, we highlight the open problems and identify the challenges with regard to the D2D communication problem.

1. Introduction

New technologies fundamentally change the way people exchange information with each other, especially in wireless communication and mobile computing. Despite this, cellular mobile environment is still infrastructure-dependent. The mobile users’ connection is restricted depending on the base station (BS) coverage, and does not permit direct communication among mobile devices [1]. Even though the source and the destination are in close proximity to each other, the routing traffic is routed through the core network. Due to this inability, the possibility of exchanging data among mobile users is limited, especially considering the transformation process of personal computing from desktop computers to laptops and finally to mobile devices. Due to the trend of shifting toward mobile devices, the traffic for mobile data is expected to increase to 30.6 exabytes per month by 2020, estimated an eight-time increment over 2015 [2].
New communication technologies must be capable of exchanging data on-demand over proper network connections, and must be able to scale the network capacity. Device-to-device (D2D) communications are considered to be a promising technique that allow mobile devices to communicate with one another directly without going through access points or BSs [1]. There are several studies that have been conducted to analyze the use of D2D in cellular networks. For example, the authors in [3] proposed a machine-learning-based code dissemination (MLCD) scheme to reduce the costs of ground control stations (GCSs) arising from the need to organize vehicles in large quantities as code disseminators. The scheme works by selecting the higher coverage ratio and reliability of vehicles as code disseminators. Liu et al., in [4], reduced the service response delay and redundancy of data by proposing a service orchestration and data aggregation framework (SODA) that is able to provide services in organizing the data and combining data packets.
However, a conventional cellular system requires all that communication to go through the BSs and does not allow devices to communicate directly with one another [5]. D2D aims to use the communicating devices’ physical range to increase the signal for mobile devices in a sparse environment. To complement each other, D2D communication should work together with cellular networking services. The critical factor that must be considered when designing D2D is resource-sharing, in terms of energy and spectrum, between D2D and cellular communication [6]. For example, the authors in [7] use a security disjoint routing-based verified message (SDRVM) scheme to set up two separate connected dominating sets (CDSs), which are v-messages and data CDSs. The sender nodes send data packets and the v-message to destination nodes at the same time using data CDS and v-message CDS. Only when the sensor nodes’ energy is high enough to improve the successful arrival ratio of data will the number of data packets that are retransmitted be increased.
One of the benefits derived from D2D is content privacy and strong anonymity. These are provided because the central storage is not responsible for storing the shared information. D2D communications also have the potential to improve energy efficiency, throughput, fairness, and delay [8]. Furthermore, by enhancing the system throughput and spectrum reusage due to the D2D traffic direct routing, the performance of D2D improves significantly [1]. D2D offloads the cellular traffic by switching the path from infrastructures to direct transmissions. These attributes produce low transmission delay, energy savings, and a high data rate [6]. Standalone D2D is one the drawbacks of D2D because it only uses links that are managed by devices where there is no possibility of channel management and centralized relay, whereas for network-assisted D2D, the BS, together with the help of operator-controlled links, can only partially maintain channel selections and relay. Thus, in-depth research attention is needed to manage the interference in D2D communication [9].
There are many challenges that should be tackled in order to successfully execute D2D communication technology. Specifically, D2D communications require complex resource management techniques, efficient device discovery mechanisms, intelligent mode selection algorithms, robust security protocols, and mobility management procedures. There have been many research studies in D2D communications that aimed to improve spectral efficiency and interference management. Nevertheless, extensive reviews of comprehensive studies that examine various aspects of D2D communications, including the requirements and challenges, are largely missing. The authors in [10] provided a thorough survey on under-explored and over-explored domains in D2D communications. In [11], the authors discussed a literature review and recent advances in D2D communications from the interference management perspectives. The authors in [12] present a survey that emphasizes different technologies and studied cases that support D2D communications. The authors also discussed the power control, interference management and resource allocation issues in D2D communications.
A good overview of the foundational principles in the D2D communication model and its related issues in view of recent advances will need a comprehensive analysis of the existing literature. The motivation of this paper is to equip readers with a primer addressing to some of the problems, solutions, recent advances and challenges in D2D communications. Contrary to the existing surveys, as shown in Table 1, we classified the previous surveys and challenges in D2D communications into the specific domains of device discovery, interference management, privacy and security, power control, and mode selection. These domains are considered crucial for improving network optimization [13].
Regarding these features, we draw conclusions from recent works focusing on their problem areas, proposed methods, and the techniques considered. Contradictory to previous surveys that have collectively discussed device discovery, interference management, privacy and security, power control, and mode selection, this paper focuses on presenting the recent problems, solution techniques and limitations of the proposed solutions, and also analyzes new challenges in D2D communications. Moreover, the majority of the research cited in this paper is up to date, and has not been discussed ahead of this survey. We have eliminated some previous outdated papers that have been cited in other existing surveys, and present the latest directions related to the domain in the 5G environment in which D2D communication will play a pivotal role.
The main objective of this paper is to equip readers with the latest and state-of-the-art papers of proposed solutions (proposed schemes, outcomes, and limitations) on D2D communications and the challenges that still need to be addressed. To be more specific, the contributions of this paper are as follows:
  • Presenting an extensive literature review of the recent advances in specific D2D domains, which are security and privacy, discovery process, interference management, power control techniques and mode selection schemes for D2D applications in 5G technologies;
  • Highlighting open research issues or challenges that need further potential research studies in the future.
The remaining sections of the paper are organized as follows. Section 2 provides an analysis and review on D2D device discovery techniques. Section 3 presents a review of interference management in D2D communication. In Section 4, we discuss the security techniques and mechanisms along with recent advances in D2D security. Section 5 provides a review of power control schemes in D2D communications. In Section 6, we discuss mode selection schemes and the recent advances in the mode selection works. We provide discussion on challenging D2D issues for D2D communication in Section 7, and lastly we summarize the observation conclusion in Section 8.

2. Device Discovery

The device discovery process occurs when the devices transmit a discovery signal through a base station to discover the neighboring devices. There are several integrating technologies related to communication that are being considered by 5G as having potential in helping the discovery process. A device discovery procedure can be divided into centralized and distributed device discovery [16]. These categories are the basis of all the remaining technique functions [17]. For the centralized device discovery, a centralized entity will assist the devices in discovering one another, usually at an access point or a base station. The intended device informs the base station about its purpose to connect with adjacent devices. The base station needs to acquire specific information such as channel conditions, power and also the interference control policy that depends on the system prerequisites.
The full or partial participation of the BS during device discovery depends on the predesigned protocols. The device is not permitted to initiate device discovery with another device if the BS is also included. The BS facilitates all the discovery signals among each device. For this situation, to start the device discovery process, the devices use the discovery signals that had been transmitted by BS and transmitted the discovery signal back to the BS. For the partial involvement of BS, the device transmitted the discovery signal without obtaining prior authorization from the BS. Nonetheless, BS is included to exchange the quantity of Signal-to-Interference Noise Ratio (SINR) and gain path of each device. This mechanism will assist the BS in deciding the communication plausibility for each device. Finally, both devices will be asked by the BS to begin the correspondence.
For the distributed device discovery, the devices have permission to discover other devices without including the BS. The device communicates with the control signals in irregular intervals for the purpose of discovering the neighboring devices. However, the problems that always associate in the distributed mode are interference, power of discovery signal and synchronization issues. That is why the in-band device discovery is considered to be more efficient in D2D design. There are many device discovery schemes that have been proposed based on centralized and distributed device discovery. The in-band category includes network-assisted discovery, beacon-based discovery, and direct discovery, while the remaining is for the out-band category. Table 2 shows the comparative summary of device discovery schemes in D2D communications.

Recent Advances in Device Discovery

Kaleem et al., in [24], proposed an energy-efficient device discovery for a public safety scenario. The proposed solution works in D2D networks where the authors considered a simultaneous user access of resources and major constraints on overlay interference. The results produce a great number of energy-efficient discovered devices and increased the number of discovered devices over static or random back-off patterns. The authors in [25] suggested a D2D neighborhood device discovery by a device where, out of network, static device discovery is discussed, and the times of discovery are examined. The authors developed a mathematical model that can be used by moving D2D devices. The results were verified by Monte-Carlo simulations. Sun et al., in [26], suggested an authentication method for D2D and privacy-preserving device discovery in a 5G heterogeneous network. The authors proposed an authentication scheme using identity-based and integrated privacy protection for device discovery using Elliptic-Curve Diffie–Hellman (ECDH) methods. The performance analysis showed that the proposed scheme protects the privacy with an ideal efficiency. The authors in [27] proposed a public safety full duplex device discovery for the D2D system that is empowered time-efficiently using the IB-FD framework. The proposed framework emphasizes the aim to increase the spectral efficiency and minimize the delay in device discovery on public safety devices. The transmission mode of the proposed framework is able to switch to a full-duplex from half-duplex. The results from the simulation are then verified and compared with the typical random-access technique. The result shows that around 37 percent of the device discovery time is saved using the public safety priority method instead of the random-access technique. Masood et al., in [28], suggested a device discovery and localization in public safety systems that is supported by UAVs. The direct discovery used a proximity service, and in the case of core network failure such as in a disaster situation, the discovery signal to the device link is transmitted over UAVs. The MUSIC algorithm is applied to achieve the optimum accuracy in simulation results. Furthermore, the throughput and the packet error rate are calculated for the performance results. The authors in [29] analyze various device discovery algorithms for D2D communication to produce performance analysis where the accuracy and RMSE metrics are defined. Results from the simulation show that all the algorithms studied maximize the accuracy and minimize the discovery error and complexity of the algorithm. Kaleem et al., in [14], suggested a public safety full-duplex device discovery for a D2D system that is based on priority. The results showed that in-band full-duplexing performs well on the radio resources in comparison to the half-duplex. The results also showed that the proposed scheme decreases the discovery time by about 37 percent.

3. Interference Management

The interference from cellular users is one of the major weaknesses affecting D2D communication. The coexistence of CUs and D2D pairs that use the same cellular resources leads to an interference issue. Depending on the D2D network’s operation mode such as uplink and downlink situations, the D2D users will suffer from intracellular and intercellular interference. The transmission success can be damaged by interference that compromises the signal-to-interference-plus-noise ratio (SINR) [30]. There are various proposed interference management techniques discussed in this section. The interference management scheme can be broken down into three categories, which are interference cancellation, interference avoidance and interference coordination. Table 3 shows the brief summarization of the management of interference in D2D communications.

3.1. Recent Advances in Interference Management

3.1.1. Interference Avoidance

Interference avoidance techniques are used to avoid interference between D2D links and cellular links. Chui et al. in [37] embrace the simultaneous D2D transmissions and proposed a multiuser D2D system that is called “MD2D”. The authors also leverage MIMO techniques to eliminate the interference across multiuser D2D environments. The system checks the antenna combinations whether it is able to eliminate the cross-pair interference and then applies a bucket-based degree of freedom (DoF) algorithm for an effective antenna usage configuration to eliminate the interference. The result shows that by using MD2D, the throughput was improved by 87.39 percent and for the large-scale simulations, the improvement is up to 218.84 percent compared to the traditional interference avoidance scheme. Zihan et al., in [38], chose a distributed scheme as a proper interference control mechanism because it has advantages in terms of responsiveness to traffic demands and smaller control overhead. The authors then proceeded by proposing a fully distributed random-access protocol for D2D links in cellular networks. The proposed interference avoidance mechanism works by prohibiting the interferers from transmitting a signal around the D2D receiver. The result shows that the proposed distributed D2D scheme performs better than the conventional distributed D2D scheme by a very large margin. However, for this simulation, the authors only considered the locations of devices in order to follow a Poisson point process. The authors in [39] highlighted the confidentiality aspect of the security problem between the cellular users and D2D users. The authors proposed a security-embedded interference avoidance scheme by modifying the constellation rotation technique to mitigate these issues. In the testing, the authors did not explore situations where there might be multiple D2D pairs and CUs in the same environment. Furthermore, the evaluation performance of the proposed scheme does not consider channel estimation errors in the evaluation calculation. Melki et al., in [40], proposed a radio resource allocation scheme for multihop D2D links that is based on interference avoidance techniques in LTE-A networks. The authors stated that the concept is to expand the components of the key enabling technology of a single-hop D2D to multi-hop D2D communications. The results demonstrate that by using the proposed mechanisms and proper power control, the established D2D links can reuse the cellular band and still produce minimum interference for the cellular communication.

3.1.2. Interference Coordination

Interference coordination schemes have significant advantages in Inband D2D communication. For the Centralized Interference Coordination (CIC) scheme, this involves the monitoring from the BS. However, for the Decentralized Interference Coordination (DIC) scheme, the monitoring from the BS is minimized due to the participation of D2D nodes in the coordination mechanism. Interference coordination techniques are used to mitigate interference between cellular links and D2D links. Yang et al. in [41] used the full-duplex communication technique in D2D communication environment. The authors presented the interference issue for devices operating in full duplex mode. To solve the joint optimization problem with a minimum complexity, the authors proposed a graph-coloring-based resource sharing (GCRS) scheme. The scheme was adopted to optimize the spectrum utilization. Xu et al., in [42], presented the interference management for D2D communication in heterogenous networks. The authors proposed a feasible set scheme to handle the interference in the D2D communication link and to guarantee the QoS requirements. The proposed scheme shows that it can reduce the average outage probability by up to 92 percent. In [43], Sun et al. proposed a D2D management scheme that is based on the interference limited area (ILA) combined with a power control algorithm to mitigate the interference that may be inflicted on the cellular users caused by activated D2D links. Under the proposed ILA scheme, the authors produced a mathematical expressions of the average coverage probability for D2D links and cellular links. Then, the authors proposed a resource allocation algorithm that depends on the changes in the power control mechanism. The results show that the proposed scheme is able to outperform the conventional scheme especially in a high D2D density and signal-to-interference-plus-noise ratio in terms of the sum data rate and coverage probability.

3.1.3. Interference Cancellation

Interference cancellation techniques use advanced decoding and coding schemes for the cancellation of interference signals at the DUE or CUE. The techniques used can enhance the cellular network’s capacity. In [44], Lv et al. proposed an interference mitigation algorithm that is based on the guard zone by allowing the capabilities of successive interference cancellation at the BSs. The D2D users are obligated to use the original cellular mode when they are in the range of a specific geographical area inside a cell. The result shows the improvement in the average throughput of a user equipment (UE) and the successful transmission probability achieved using the proposed scheme. Ni et al. in [45] investigated the performance analysis of interference cancellation and beamforming with multiple antennas equipped at the BS. However, the authors equipped the users with a single antenna. For the system analysis, the ergodic process is used with some appropriate approximations. The result is quite similar to the Monte-Carlo results. In [46], Wu et al. proposed a peer-to-peer (P2P) system called “Lunius” that is based on a harvesting data approach in a multihop D2D communications community. The system improves the user experience, optimizes P2P local-file-sharing in the D2D communications, and offloads traffic from the BSs. The system features cross-layer integration of the application layer P2P protocols based on interference cancellation scheme, Bittorrent protocol, and also an enhanced multihop D2D routing scheme called the Greedy Parameter Stateless Routing Protocol (GPSR), in order to maintain Radio Resource Management (RRM) mechanism and multihop communications to increase the total throughput while, at the same time, assuring the QoS requirements of user equipment. Gandotra et al. [47] investigate nonorthogonal multiple access (NOMA) in a D2D 5G environment. The authors proposed an improved NOMA-based approach that uses multiple interference cancellation (MIC) techniques instead of the successive interference cancellation (SIC). The results show that MIC is better than SIC in terms of providing better performance and low complexity. The proposed MIC scheme demonstrates its effectiveness by optimizing the power consumption of the overall circuit. However, the authors did not highlight the reduction in the latency of the network. In [48], Ni et al. study the D2D communication using a two-way decode-and-forward relay node. Beamforming and Interference Cancellation (IC) strategies were analyzed for asymmetric and symmetric outage probabilities. The result shows that there are some factors that correlate with the system performance, such as the installation of a large number of antennas in the BS, which will lead to outage probability of the cellular link prone to be zero.

4. Security and Privacy in D2D Communications

To date, many of the standardization efforts and research studies are mainly focused on resource management, interference management and the architecture in D2D communication. Both industry and academia largely ignored the security aspect of the D2D communication environment. D2D communications offers a hybrid framework where the centralized and the distributed approaches are paired together. That is why it is risky to some of the privacy and security threats that are being identified by both the ad-hoc wireless and the cellular networks. Some of the security threats faced by D2D communications can affect the confidentiality, authenticity, availability, and also integrity of the network. Furthermore, the need for efficient security solutions to allow private, secure, and also trusted data exchange among cellular network and devices including direct proximity-based communication without any help from the cellular network. Table 4 shows the overview of security issues and, recently, solutions proposed by the researchers in D2D communications.

Recent Advances in Security Schemes

Ying He et al. (2018) [15] investigate the effect of recent advances of content-centric networking, device-to-device (D2D) communication, and mobile edge computing on Mobile Social Networks (MSNs). The authors found that in order to improve the sharing, efficiency and the security of data exchange, and delivery in the MSN, the knowledge of social relationships among users are ignored. The authors proposed a social trust scheme that enhances the security of the MSN by applying a novel deep reinforcement learning approach to automatically make the decision to optimally allocate the network resources. The solutions begin with an agent receiving a set of observations including the value of trust for each node, the cache contents, the conditions of wireless channel, and the capacity of vacant computation from the integrated network. Then, the agent transmits the parameters to the deep neural network and produces the optimal actions. The revenue of resulting operators is then observed and retransmitted as a reward to the agent. Based on the obtained reward, the agent trains and updates the deep neural network model. The step is repeated until the optimal actions are delivered. The authors use uncertain reasoning to derive trust values due to the uncertainty in trust evaluation. The trust evaluation from direct observations and indirect observations is derived by using the Bayesian inference approach and Dempster–Shafer theory. Ferrag et al. (2017), in [55], examine various existing authentication and privacy-preserving schemes for 4G and 5G cellular networks to present a comprehensive survey regarding that topic. The issue that the authors identify in the 4G and 5G environment is the lack of restriction in the network and the fast-vertical handover, which leads the devices likely to vulnerabilities like privacy, data confidentiality, communication security, access control, and availability. The reason for this is that the devices will be exposed to all the vulnerabilities that are IP-specific since the environment of 5G cellular networks is IP-based. The authors also identify the countermeasures in the form of cryptography methods, intrusion detection methods, and human factors. The authors investigate six different types of privacy-preserving and authentication schemes and proposed six open directions on how to secure communication in 4G and 5G cellular networks in the future, which focus on the privacy-preserving and authentication schemes. Cao et al. in [56] considered battery-powered wireless devices to designed a secured lightweight D2D system using multiple sensors in the wireless devices. For securing the D2D communications by leveraging the sensors in the devices, the authors proposed a lightweight and efficient key distribution scheme. The experiments show that the communications with low energy consumption and computing resources can be achieved using the proposed scheme. Hsu et al. [57] study the problem of group information exposure when the devices in proximity identify other devices in the same group by their group identity. The exposure will lead the eavesdroppers to analyze the usage of the applications. From the study, the authors proposed the network-covered and the network-absent protocol using the authenticated key exchange for D2D communications. The aim is to guarantee end-to-end security to network operators, accountable group anonymity, revocability, and traceability for management and accounting requirements. The performance analysis shows that the cost of both communication protocols is low even after providing the new security properties. Jiang et al., in [58], proposed a new data sharing framework using the blockchain technology named the D2D blockchain. The proposed framework works by deploying Access Points (APs) that will verify the transactions of end users. The authors proceed with designing a two-stage contract theory-based joint optimization scheme for the transaction relaying phase and the block verification phase. The testing result shows that the proposed framework can improve privacy and security protection in D2D data sharing. The result also indicated that the proposed scheme could improve the local AP utility while reducing the delay under information asymmetry.

5. Power Control

Power control can be defined as the process of adjusting the BS’s power levels during DownLink (DL) transmissions and the user equipment (UE) during UpLink (UL) transmissions. The need to increase the transmission power of a device exists because it can also increase the link capacity. However, this will lead to incremental interference among the devices that share the same resources. One of the benefits of power control techniques is its help protecting energy resources. These techniques allocate radio resources that have been used in resource allocation to different users or devices. Examples of the radio resources are time slots in Time Division Multiple Access (TDMA) or frequency bands in Frequency Division Multiple Access (FDMA). The role of resource allocation is important in fulfilling the immediate increase in resource demand. To improve the overall system throughput and system capacity, resource utilization and joint optimization are considered crucial. This section presents resource management techniques and various power control schemes that highlight the importance of combining power control and mode selection together with link adaption techniques to achieve an optimal system performance. Power control algorithms can be split into two broad categories, which are centralized and distributed. For centralized algorithms, the BS is responsible for making the decisions for resource allocation and power control, while for distributed algorithms, user equipment is responsible. One of the examples for the centralized algorithm is LTE power control. Important parameters that need to be considered to produce a structured power control algorithm are maximum transmit power, target-received power per resource block, number of resource blocks, and path loss. Table 5 offers a summary of the power control issues and proposed solutions in D2D communications.

Recent Advances in Power Control Schemes

The benefits of the D2D technique are obscured with the interference problem over D2D links and cellular links. That is why there are plenty of proposed methods and schemes to minimize the interference, such as using resource allocation, power control, signal processing, mode selection, etc. Wang et al. in [66] used the interior point scheme to assess the optimal power of D2D communications. By approximating the interior point method, the authors are aiming to reduce the computation complexity. To achieve the goals, the inversion of the Hessain matrix will be replaced with a diagonal metric. This simplified process causes the updating of the Newton method. The results show that by using lower computational complexity, near-optimal throughput can be achieved. The authors in [67] highlight the problem of nonconvexity of sum-rates maximization to power constraints. The authors then emphasize this problem using the problem of power allocation model as a potential game. The authors proposed two iterative algorithms using the potential games convergence properties. The proposed solutions are better than the traditional rate maximization scheme because the solutions are confluent with the objective function local maxima. Abdallah et al., in [68], proposed a channel allocation (CA) scheme and a set of three power control (PC) schemes to manage the interference in D2D as a random network model based on stochastic geometry. According to the authors, it is possible to obtain a closed-form analytical expression for ergodic sum-rates and coverage probabilities, which shows the interactions of various network parameters that affect the link performance and the service quality. However, the proposed schemes are examined in single-cell scenarios only. The authors in [69,70] use Peukert’s Law (which shows the capacity of batteries changes at different discharging rates) to model the battery lifetime and to distinguish the nonlinear effects in batteries. Multiple D2D pairs are allowed to simultaneously share the same channel, which leads to the increase in channel utilization. From the test results, it shows that the D2D user equipment (UE) battery life is lower than the cellular UE if the distance of D2D UEs is more than 0.8 of the cell radius. When the UE is at a certain distance, it is advantageous to control the devices by communicating directly. Memmi et al. in [60] highlight that the main shortcoming in most of the papers in the literature is that the consideration of unrealistic assumptions. For example, most of the authors rely on deterministic values such as fixed transmission power, fixed distance between the receiver and D2D transmitter, and fixed SINR targets. Furthermore, they typically consider only just one cellular user that shares the resources with the D2D links. That is why in this paper, the authors present a centralized and distributed power control algorithm in a one-cell random-network model. Ding et al., in [71], aim to maximize the energy efficiency (EE) collection of cellular users’ equipment (CUEs) and the D2D user equipment (DUE) using a network-centric method. For the objectives of DUE, the authors present a price-based cost function to protect the CUE’s uplink transmission. The result from the testing shows the proposed scheme performs fast converging and a better than nominal solution for network-centric and user-centric problems.

6. Mode Selection

The user equipment can communicate with the BS directly in the D2D cellular network. This capability is beneficial, and it significantly improves the network performance in terms of delay and network throughput. Nevertheless, D2D also creates other new challenges in terms of resource management and network overloading. Besides, the network management becomes more complex as two or more pieces of user equipment use the same mode, hybrid mode, and different mode to communicate. Table 6 shows a brief summary of mode selection issues and proposed solutions in D2D communication. Generally, there are four modes of communication for the user equipment:
  • Pure cellular mode—used when low resources are available and there is high interference because there is no D2D communication. This does not allow D2D users to transfer their data;
  • Partial cellular mode—without sharing the co-channel spectrum, this mode allows the UEs to communicate through the BS;
  • Dedicated mode—allows the user equipment to communicate with other user equipment using dedicated spectrum resources;
  • Underlay mode—allows D2D users and cellular user equipment to share the uplink and downlink resources.

Recent Advances in Mode Selection

Wu et al., in [78], proposed an optimal content sharing mode selection scheme for socially aware D2D communications. The authors exploit social reciprocity in order to encourage mutual cooperation, and also refining the average link rate to achieve a successful content delivery. To ease the optimal matching between potential providers and demanders, the authors used the attributes of total unimodularity to develop a number of online implementations according to the existing linear programming algorithms. However, the authors did not take into consideration the sharing mode selection scheme under different popularity distributions, individual QoS constraints, etc. The authors in [79] present a novel partial channel state information (CSI) model that has a lower overhead of feeding back the cross-link CSI. The authors proceed to propose a throughput-optimal, joint mode selection scheme, user scheduling, and the rate adaptation policy called CLISAA for D2D systems that exploit information about interference statistics from cross-links and integrate inter-cell interference. The authors produce the closed-form expressions to be used for feedback-conditioned goodput in the underlay mode that drives this optimal policy. However, the authors only consider single antennas at the BS and the user equipment in the simulation scenarios. Chen et al., in [80], identify the challenges of selecting the suitable communication modes for all user equipment pairs in the D2D network. The authors analyzed the problem in the mode selection aspect for a multipair and multimode D2D network, in which the eNB is able to select one of the three modes in D2D communication (direct D2D mode, relay D2D mode, and local route mode) for each D2D pair. The authors proceeded to propose an optimal mode selection algorithm to achieve the maximum capacity. This paper aims to share the uplink channels of cellular users. The optimal mode selection issue can be replicated using an integer programming problem. The authors in [81] proposed an interlay mode for the nonorthogonal multiple access (NOMA) system, which allows power domain multiplexing of cellular users and D2D pairs using successive interference cancellation (SIC) decoding to eliminate interference between them. The authors proposed a resource allocation scheme and a joint D2D mode selection that makes up as a combinatorial optimization problem to increase the system sum rate and at the same time fulfill the SIC decoding constraint. Haider et al., in [82], proposed an optimal mode selection scheme for full-duplex D2D cognitive networks that depends on its impact towards primary users. The authors study the impact towards D2D users in the proximity of active cellular users using the stochastic geometry tools. The authors then proceed with defining the crucial region where, if the receiver is inside of the guard zone, D2D links are able to operate in the half-duplex mode, whereas if the transmitter and receiver are both outside of the guard zone, D2D link can operate in the full-duplex mode.

7. Challenges in D2D Communication

There are various open issues and challenges that need attention in securing a D2D communication in 5G environments. Even though there extensive work has been carried out regarding interference management for D2D communication according to the previous legacy networks (LTE, WiMAX, and LTE-A), interference management for D2D communication in 5G cellular networks however is still considered as a new research topic. The open issues and challenges are highlighted in the following discussion.

7.1. Challenges in Device Discovery

Some of the challenges identified in devices discovery are presented as open research issues.

7.1.1. Synchronization

The synchronization in D2D communication occurs between devices in the system and the BS. The time frame and the scheduling will be shown by the BS. However, the device discovery will face a challenge when the secondary device that are associated with the primary devices are outside of the BS coverage. The devices in the asynchronous discovery situation require continuous searching for different devices in proximity [10].

7.1.2. Initial Device Discovery Signal

This refers to the devices communicating with an initial discovery signal to discover the neighboring devices. However, any proximal device can effectively obtain this signal. The unsuitable scheduling allows the initial discovery of signals information to influence other devices. In certain situations, such as designing parameters, constructing the initial signal for the radio resources is considered a critical job.

7.1.3. Multicell Device Discovery

The device discovery will become a big challenge if a device belonging to a different cell in the cellular network has that device mobility, as a result of how the radio resources are being provided and who will benefit from it. The authors in [83] proposed one multicell DD scheme for the solution. The proposed method made involve core network along with the BS. Thus, it is essential and critical to propose the discovery of signal scheduling.

7.1.4. Discovery Messages Frequencies

Device synchronizations and the frequencies of discoveries are considered the common challenges that need to be well-addressed [8]. The amount of discovery messages has a direct impact to the performance of D2D users. Even though there are discovery messages with prespecified designs and structures, the distribution of devices can lead to significant interference to the network for other devices. On the contrary, the information about the neighboring devices will become stale when the number of discovery messages is very low. To mitigate this issue, an appropriate scheduling scheme can be proposed to minimize the discovery message frequencies.

7.2. Challenges in Interference Management

This paper also highlights the challenges in interference management for D2D communications in the 5G environment for future studies.

7.2.1. Cell Densification and Offloading

Network densification can be defined as a simple but important instrument that is used in increasing the capacity of network capacity in 5G cellular networks [84]. This approach has been used over several cellular generations to enhance the network capacities [85]. Furthermore, ultra-dense networks make resource allocation more challenging because of the massive number of devices and the random device locations. Due to the frequent recurring movements that lead to change of device positions, it is essential to develop an efficient resource allocation scheme that can ensure the QoS of conventional network users [86]. Generally, the idea for performance enhancement in network densification proposes small coverage cells, such as picocels and femtocells, to be deployed into close range with the intended devices, which leads to multiple favorable channel conditions between receivers and transmitters. As a result, the transmission power can be reduced, which results in reduced interference with other network elements that co-exist. However, the main issue in the integration of small cells and D2D technology that supports in-band D2D communication is the interference management. Resource allocation and interference management issues in multi-tier heterogeneous networks are considered more challenging compared to the proposed solution in the literature that caters to traditional single-tier systems due to the different transmission power of each BS. Additionally, different tiers produce different levels of interference due to the different access restrictions (private, public, hybrid, etc.). The interference among small-cell cellular links, macro-cell cellular links, and D2D links all need to be considered and managed efficiently to enhance the spectrum efficiency. Besides, the algorithms that are used in the mode selection need to be modified for this heterogeneous environment so that it can make a dynamic decision depending on the condition of the networks. Therefore, it is important to consider how effective interference management can be obtained.

7.2.2. D2D in mmWave Communication

One of the features that are considered crucial in 5G cellular networks that recently gained notable attention is the mmWave band communication [87]. It is fully anticipated that for future 5G cellular networks, mmWave mesh networks will replace the traditional structure that used copper or fiber, in order to offer mesh-like connectivity and rapid deployment [88]. An mmWave communication has the capacity to offer exceptionally high data rates, which lead to significant network capacity because mmWave communication runs on a larger frequency band. However, it can lead to interference management challenges due to some important propagation characteristics in the mmWave band communication that are inconsistent with the microwave band. Different interference conditions are initiated inside each cell in D2D-enabled mmWave cellular networks. The majority of previous studies focused on enhancing resource sharing algorithms to maintain the interference. However, the requirement for interference management schemes that consider the direction in mmWave 5G cellular networks is crucial in order to allow multiple D2D communication.

7.3. Challenges in Security

Research challenges for D2D security that need to be highlighted in the future are also discussed.

7.3.1. Balancing Security-Energy Trade-off

It is impractical to utilize security techniques that use a lot of energy in a limited resource D2D devices. Therefore, to ensure the optimal device resources usage, a secure energy-efficient protocol needs to be implemented. In order to secure authentication and message integrity, a cryptographic scheme, which usually depends on the key generation complexity, is put into work. The provision of the security and privacy by using just one type of algorithm is not considered best practice in terms of the energy point of view. For that reason, future research should focus more on the hybrid protocols that work for dynamic algorithm selections depending on network conditions.

7.3.2. Nonrepudiation

In the D2D network, it is crucial to maintain nonrepudiation so that data integrity is preserved. However, the current research on D2D communication lacks a complete security architecture that can be used for the device authentication and users. What is more, the cooperation from mobile nodes that leave and join the network with current network members is required to optimize network performance. Specifically, it is necessary to create a flexible and scalable authentication framework that supports a rapid authentication for mobile users when they are joining or leaving the network.

7.3.3. Lack of Standardization

To ensure the secure communication of D2D user equipment, there are no global standards or policies available. Furthermore, the mechanism that is used to authenticate different applications could vary, which makes it is difficult to guarantee interoperability. Therefore, there is a vital need for standardized documentations that highlight issues like the procedure in securing an interaction between a user and a particular application, and the amount of the user’s data that needs to be shared to protect the security and privacy of the information database management. Especially in the decentralized D2D network environment, these issues are becoming crucial and need to be mitigated.

7.3.4. Decentralized Anonymity Schemes

Due to the nature of D2D communications, which are peer-to-peer, opportunistic, and self-organizing, an anonymity scheme that is independent and not reliant on centralized third parties is required. Additionally, these schemes are required to highlight the problem of anonymity abuse without the presence of a single trusted center. There is an author who proposed distributed privacy scheme in ad-hoc and vehicular networks [84]. However, the issue is not being fully explored in D2D communications.

7.3.5. Privacy and Security

Elliptic Curve Cryptography, AES-128, and access points are some of the cryptography techniques that are traditionally used for protecting privacy and security [89]. These cryptography techniques are not suitable for a distributed network and heterogenous network environment. Since D2D communication allows mobile users to directly connect with other devices, it will create privacy and security concerns due to malicious users that pose threats to the privacy of users. This issue raises the demand for trust management schemes that are efficient and effective, which assess the merit of trust in every device before establishing a connection.

7.4. Challenges in Power Control

Several challenges of the power control aspect that can be used as a reference for future studies are identified as follows.

7.4.1. One Large Network or Multiple Small Networks

The resource management challenges such as power control are associated directly with the user volume in the network. Power and frequency resources can be managed equally in small networks. However, it has become very hard for a single network to serve all users as the number of users keep growing. To be exact, the performance of networks usually degrades due to the increasing number of antennas, high complexity of decoding, CSI feedback large overhead and precoding metrics. Some of the crucial issues that need to be highlighted are the total number of users that should be allowed in the network, the methods used to allocate the resources in a subnetwork and the ways to come up with a decision, whether it is centralized or distributed.

7.4.2. Optimal Transmission Power

Making sure that the transmission power of D2D devices is well maintained is extremely crucial. For example, the transmission power should not be too low in order to attain a superior quality of D2D links [90]. There are certain requirements to minimize the transmission power if the users want to obtain higher battery life for the equipment. Researchers are interested in the area where the transmission power is set to the optimum because the power allocation can be divided into dynamic and static power allocation. For static power allocation, the transmission power is static and does not change with any situation. However, for the dynamic power allocation, the transmission power is flexible and can be changed depending on the proximity between the devices. In the case of uplink transmission, power management plays an essential part in minimizing the co-channel interference and near-far effect [91]. The QoS of the cellular users can be maintained if the upper power level is set to the D2D users in the network. Mitigating interferences in underlaying D2D cellular networks can be done using an effective power control method. There is a constant need to determine the D2D link optimum power level to minimize the interference and maintain the link quality.

7.5. Challenges in Mode Selection

Some of the research challenges in the mode selection of D2D communication is highlighted in the next part.

7.5.1. Mode Alterations Volume

One of the specific challenges in mode selection is the frequencies of the mode alteration that have to be done. Due to the wireless channel random nature, the mode alteration can happen as frequent depending on the mobility of devices and the number of scatterers. Furthermore, most of the papers related to D2D studied a single-cell scenario (D2D pairs and a single BS are attached to each other) to make the analyzing process easy to follow and straightforward. Therefore, there is a need for more research studies that focus on provisioning lasting solutions so that the number of alterations can be minimized in the mode selection process.

7.5.2. Mode Selection Overhead

A high amount of overhead can be incurred by the mode selection process. The overhead includes control signaling and channel estimation. Channel estimation can be generated based on the CSI of the links. However, when the CSI becomes outdated, it can greatly affect the network performance. To be exact, it is important to minimize the selection mode overhead to increase the device’s lifetime.

7.5.3. Dynamic Mode Selection

The majority of studies consider the static network scenario. These studies primarily focus on the downlink scenarios in which the BS becomes the mediator for the D2D pairs to communicate. It is obvious that the modes that switch dynamically, either using brute force or heuristically, can bring suboptimal changes to the network performance gains. These observations show the need for a more complex mode selection scheme so that it can be dynamically used in realistic scenarios.

8. Conclusions

There are many benefits that are expected to be provided by the D2D communication when compared to the traditional cellular networks. D2D technologies show great potential to be the most favorable and promising paradigm for future networks. We have highlighted, in the survey, a detailed review of the current existing D2D technologies together with their characteristics, such as device discovery, interference management, security, mode selection, and power control. We review various proposed solutions with a goal to achieve a secure Device-to-Device (D2D) communication in 5G. We summarize the existing solutions by highlighting the issues or problems of the research and the proposed solutions. Based on the comprehensive analysis, we further identified the open problems and challenges that deserve future research. Even though D2D communication is considered a relatively new idea, the remarkable amount of studies and research in D2D has triggered various aspects of related research problems and challenges that can be explored in the future. The detailed discussion in this extensive review hopefully will help the future reader to gain a better understanding of D2D technologies, concepts, research gaps and future works that have been highlighted within the scope of D2D communication domain.

Author Contributions

Authors contributed equally to this work. Present a primer addressing to some of the problems, solutions, recent advances and challenges in D2D communications specifically in device discovery, interference management, privacy and security, power control, and mode selection domain. The author focuses on their problem areas, proposed methods, and techniques considered. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding. This research is self-funded by the authors since it is part of the requirement for Research Method subject in University Putra Malaysia for postgraduate students.

Acknowledgments

We thank the anonymous reviewers for their valuable comments and suggestions, which helped us to improve the content, organization, and presentation of this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Haus, M.; Waqas, M.; Ding, A.Y.; Li, Y.; Tarkoma, S.; Ott, J. Security and privacy in device-to-device (D2D) communication: A review. IEEE Commun. Surv. Tutor. 2017, 19, 1054–1079. [Google Scholar] [CrossRef]
  2. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2015–2020. Available online: http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/mobile-white-paper-c11-520862.html (accessed on 2 June 2016).
  3. Li, T.; Zhao, M.; Wong, K.K. Machine learning based code dissemination by selection of reliability mobile vehicles in 5G networks. Comput. Commun. 2020, 152, 109–118. [Google Scholar] [CrossRef]
  4. Liu, Y.; Zeng, Z.; Liu, X.; Zhu, X.; Alam Bhuiyan, Z. A novel load balancing and low response delay framework for edge-cloud network based on SDN. IEEE Internet Things J. 2019, 7, 1. [Google Scholar] [CrossRef]
  5. Ansari, R.I.; Chrysostomou, C.; Hassan, S.A.; Guizani, M.; Mumtaz, S.; Rodriguez, J.; Rodrigues, J.J.P.C. 5G D2D networks: Techniques, challenges, and future prospects. IEEE Syst. J. 2018, 12, 3970–3984. [Google Scholar] [CrossRef]
  6. Wang, M.; Yan, Z. A survey on security in D2D communications. Mob. Netw. Appl. 2016, 22, 195–208. [Google Scholar] [CrossRef]
  7. Liu, X.; Liu, A.; Wang, T.; Ota, K.; Dong, M.; Liu, Y.; Cai, Z. Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks. J. Parallel Distrib. Comput. 2020, 135, 140–155. [Google Scholar] [CrossRef]
  8. Asadi, A.; Wang, Q.; Mancuso, V. A survey on Device-to-Device communication in cellular networks. IEEE Commun. Surv. Tutor. 2014, 16, 1801–1819. [Google Scholar] [CrossRef] [Green Version]
  9. Kato, N. On Device-to-Device (D2D) communication [Editor’s note]. IEEE Netw. 2016, 30, 2. [Google Scholar] [CrossRef]
  10. Jameel, F.; Hamid, Z.; Jabeen, F.; Zeadally, S.; Javed, M.A. A survey of Device-to-Device communications: Research issues and challenges. IEEE Commun. Surv. Tutor. 2018, 20, 2133–2168. [Google Scholar] [CrossRef]
  11. Noura, M.; Nordin, R. A survey on interference management for Device-to-Device (D2D) communication and its challenges in 5G networks. J. Netw. Comput. Appl. 2016, 71, 130–150. [Google Scholar] [CrossRef]
  12. Gandotra, P.; Jha, R.K. Device-to-Device communication in cellular networks: A survey. J. Netw. Comput. Appl. 2016, 71, 99–117. [Google Scholar] [CrossRef] [Green Version]
  13. Zhang, Y.; Shen, Y.; Jiang, X.; Kasahara, S. Mode selection and spectrum partition for D2D inband communications: A physical layer security perspective. IEEE Trans. Commun. 2018, 67, 623–638. [Google Scholar] [CrossRef] [Green Version]
  14. Chang, K.; Yousaf, M.; Hassan, S.A.; Vo, N.-S.; Duong, T.Q. Priority-Based device discovery in public safety D2D networks with full duplexing. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Springer Science and Business Media LLC: Berlin, Germany, 2019; Volume 272, pp. 102–108. [Google Scholar]
  15. He, Y.; Yu, F.R.; Zhao, N.; Yin, H. Secure Social Networks in 5G Systems with mobile edge computing, caching, and Device-to-Device communications. IEEE Wirel. Commun. 2018, 25, 103–109. [Google Scholar] [CrossRef]
  16. Hayat, O.; Ngah, R.; Hashim, S.Z.M.; Dahri, M.H.; Malik, R.F.; Rahayu, Y. Device discovery in D2D communication: A survey. IEEE Access 2019, 7, 131114–131134. [Google Scholar] [CrossRef]
  17. Yan, Y.; Zhang, B.; Li, C. Opportunistic network coding based cooperative retransmissions in D2D communications. Comput. Netw. 2017, 113, 72–83. [Google Scholar] [CrossRef]
  18. Zhang, J.; Deng, L.; Li, X.; Zhou, Y.; Liang, Y.; Liu, Y. Novel Device-to-Device discovery scheme based on random backoff in LTE-advanced networks. IEEE Trans. Veh. Technol. 2017, 66, 11404–11408. [Google Scholar] [CrossRef] [Green Version]
  19. Chour, H.; Nasser, Y.; Artail, H.; Kachouh, A.; Al-Dubai, A. VANET aided D2D discovery: Delay analysis and performance. IEEE Trans. Veh. Technol. 2017, 66, 8059–8071. [Google Scholar] [CrossRef]
  20. Li, B.; Guo, W.; Liang, Y.-C.; An, C.; Zhao, C. Asynchronous device detection for cognitive Device-to-Device communications. IEEE Trans. Wirel. Commun. 2018, 17, 2443–2456. [Google Scholar] [CrossRef] [Green Version]
  21. Nguyen, N.T.; Choi, K.W.; Song, L.; Han, Z. ROOMMATEs: An unsupervised indoor peer discovery approach for LTE D2D communications. IEEE Trans. Veh. Technol. 2018, 67, 5069–5083. [Google Scholar] [CrossRef]
  22. Ben-Mosbah, A.; Hammami, S.E.; Moungla, H.; Afifi, H.; Kamal, A.E.; Hammami, S.E. Enhancing Device-to-Device direct discovery based on predicted user density patterns. Comput. Netw. 2019, 151, 245–259. [Google Scholar] [CrossRef]
  23. Long, Y.; Yamamoto, R.; Yamazaki, T.; Tanaka, Y. A deep learning based social-aware D2D peer discovery mechanism. In Proceedings of the 2019 21st International Conference on Advanced Communication Technology (ICACT), PyeongChang, Kwangwoon_Do, Korea, 17–20 February 2019; Institute of Electrical and Electronics Engineers (IEEE): New York, NY, USA, 2019; pp. 91–97. [Google Scholar]
  24. Kaleem, Z.; Qadri, N.N.; Duong, T.Q.; Karagiannidis, G.K. Energy-efficient device discovery in D2D cellular networks for public safety scenario. IEEE Syst. J. 2019, 13, 2716–2719. [Google Scholar] [CrossRef]
  25. Jaffry, S.; Zaidi, S.K.; Shah, S.T.; Hasan, S.F.; Gui, X. D2D Neighborhood Discovery by a Mobile Device. In Proceedings of the ICC 2019–2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; Institute of Electrical and Electronics Engineers (IEEE): New York, NY, USA, 2019; pp. 1–6. [Google Scholar]
  26. Sun, Y.; Cao, J.; Ma, M.; Li, H.; Niu, B.; Li, F. Privacy-preserving device discovery and authentication scheme for D2D communication in 3GPP 5G HetNet. In Proceedings of the 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 18–21 February 2019; Institute of Electrical and Electronics Engineers (IEEE): New York, NY, USA, 2019; pp. 425–431. [Google Scholar]
  27. Kaleem, Z.; Khan, A.; Hassan, S.A.; Vo, N.-S.; Nguyen, L.D.; Nguyen, H.M. Full-duplex enabled time-efficient device discovery for public safety communications. Mob. Netw. Appl. 2019, 25, 341–349. [Google Scholar] [CrossRef]
  28. Masood, A.; Sharma, N.; Alam, M.M.; Le Moullec, Y.; Scazzoli, D.; Reggiani, L.; Magarini, M.; Ahmad, R. Device-to-Device discovery and localization assisted by UAVs in pervasive public safety networks. In Proceedings of the ACM MobiHoc Workshop on Innovative Aerial Communication Solutions for FIrst REsponders Network in Emergency Scenarios-iFIRE ’19, Catania, Italy, 2–5 July 2019; Association for Computing Machinery (ACM): New York, NY, USA, 2019; pp. 6–11. [Google Scholar]
  29. Hayat, O.; Ngah, R.; Hashim, S.Z.M. Performance analysis of device discovery algorithms for D2D communication. Arab. J. Sci. Eng. 2019, 45, 1457–1471. [Google Scholar] [CrossRef]
  30. Liu, J.; Kato, N.; Ma, J.; Kadowaki, N. Device-to-Device communication in LTE-advanced networks: A survey. IEEE Commun. Surv. Tutor. 2014, 17, 1. [Google Scholar] [CrossRef]
  31. Liu, Y.; Wang, R.; Han, Z. Interference-constrained pricing for D2D networks. IEEE Trans. Wirel. Commun. 2017, 16, 475–486. [Google Scholar] [CrossRef]
  32. Yang, T.; Cheng, X.; Shen, X.; Chen, S.; Yang, L. Qos-aware interference management for vehicular D2D relay networks. J. Commun. Inf. Netw. 2017, 2, 75–90. [Google Scholar] [CrossRef] [Green Version]
  33. Celik, A.; Radaydeh, R.M.; Al-Qahtani, F.S.; Alouini, M.-S. Resource allocation and interference management for D2D-enabled DL/UL decoupled Het-Nets. In IEEE Access 2017, 5, 22735–22749. [Google Scholar] [CrossRef] [Green Version]
  34. Zhao, L.; Wang, H.; Zhong, X. Interference graph based channel assignment algorithm for D2D cellular networks. In IEEE Access 2018, 6, 3270–3279. [Google Scholar] [CrossRef]
  35. Shamaei, S.; Bayat, S.; Hemmatyar, A.M.A. Interference management in D2D-enabled heterogeneous cellular networks using matching theory. IEEE Trans. Mob. Comput. 2018, 18, 2091–2102. [Google Scholar] [CrossRef]
  36. Doumiati, S.; Assaad, M.; Artail, H. A framework of topological interference management and clustering for D2D networks. IEEE Trans. Commun. 2019, 67, 7856–7871. [Google Scholar] [CrossRef]
  37. Chiu, S.-L.; Lin, K.C.-J.; Lin, G.-X.; Wei, H.-Y. Empowering Device-to-Device networks with cross-link interference management. IEEE Trans. Mob. Comput. 2017, 16, 950–963. [Google Scholar] [CrossRef]
  38. Zihan, E.; Choi, K.W.; Kim, D.I. Distributed random access scheme for collision avoidance in cellular Device-to-Device communication. IEEE Trans. Wirel. Commun. 2015, 14, 1. [Google Scholar] [CrossRef]
  39. Sun, L.; Du, Q.; Ren, P.; Wang, Y. Two birds with one stone: Towards secure and interference-free D2D transmissions via constellation rotation. IEEE Trans. Veh. Technol. 2015, 65, 8767–8774. [Google Scholar] [CrossRef]
  40. Melki, L.; Najeh, S.; Besbes, H. Radio resource management scheme and outage analysis for network-assisted multi-hop D2D communications. Digit. Commun. Netw. 2016, 2, 225–232. [Google Scholar] [CrossRef] [Green Version]
  41. Yang, T.; Zhang, R.; Cheng, X.; Yang, L. Graph coloring based resource sharing (GCRS) scheme for D2D communications underlaying full-duplex cellular networks. IEEE Trans. Veh. Technol. 2017, 66, 7506–7517. [Google Scholar] [CrossRef]
  42. Xu, Y.; Liu, F.; Wu, P. Interference management for D2D communications in heterogeneous cellular networks. Pervasive Mob. Comput. 2018, 51, 138–149. [Google Scholar] [CrossRef]
  43. Sun, J.; Zhang, Z.; Xiao, H.; Xing, C. Uplink interference coordination management with power control for D2D underlaying cellular networks: Modeling, algorithms, and analysis. IEEE Trans. Veh. Technol. 2018, 67, 8582–8594. [Google Scholar] [CrossRef]
  44. Lv, S.; Xing, C.; Long, K.; Zhang, Z. Guard zone based interference management for D2D-aided underlaying cellular networks. IEEE Trans. Veh. Technol. 2016, 66, 1. [Google Scholar] [CrossRef]
  45. Ni, Y.; Jin, S.; Xu, W.; Wang, Y.; Matthaiou, M.; Zhu, H. Beamforming and interference cancellation for D2D communication underlaying cellular networks. IEEE Trans. Commun. 2015, 64, 832–846. [Google Scholar] [CrossRef]
  46. Wu, Y.; Wang, S.; Liu, W.; Guo, W.; Chu, X. Iunius: A cross-layer peer-to-peer system with Device-to-Device communications. IEEE Trans. Wirel. Commun. 2016, 15, 7005–7017. [Google Scholar] [CrossRef]
  47. Gandotra, P.; Jha, R.K.; Jain, S. Green NOMA with multiple interference cancellation (MIC) using sector-based resource allocation. IEEE Trans. Netw. Serv. Manag. 2018, 15, 1006–1017. [Google Scholar] [CrossRef]
  48. Ni, Y.; Zhao, J.; Wang, Y.; Zhu, H. Beamforming and interference cancellation for D2D communication assisted by two-way decode-and-forward relay node. China Commun. 2018, 15, 100–111. [Google Scholar] [CrossRef]
  49. Zhang, H.; Liao, Y.; Song, L. D2D-U: Device-to-Device communications in unlicensed bands for 5G system. IEEE Trans. Wirel. Commun. 2017, 16, 3507–3519. [Google Scholar] [CrossRef]
  50. Wang, L.; Liu, J.; Chen, M.; Gui, G.; Sari, H. Optimization-based access assignment scheme for physical-layer security in D2D communications underlaying a cellular network. IEEE Trans. Veh. Technol. 2018, 67, 5766–5777. [Google Scholar] [CrossRef]
  51. Jin, B.; Jiang, D.; Xiong, J.; Chen, L.; Li, Q. D2D data privacy protection mechanism based on reliability and homomorphic encryption. IEEE Access 2018, 6, 51140–51150. [Google Scholar] [CrossRef]
  52. Wang, M.; Yan, Z. Privacy-preserving authentication and key agreement protocols for D2D group communications. IEEE Trans. Ind. Inform. 2017, 14, 3637–3647. [Google Scholar] [CrossRef] [Green Version]
  53. Waqas, M.; Ahmed, M.; Li, Y.; Jin, D.; Chen, S. Social-aware secret key generation for secure Device-to-device communication via trusted and non-trusted relays. IEEE Trans. Wirel. Commun. 2018, 17, 3918–3930. [Google Scholar] [CrossRef] [Green Version]
  54. Wang, L.; Tian, Y.; Zhang, D.; Lu, Y. Constant-round authenticated and dynamic group key agreement protocol for D2D group communications. Inf. Sci. 2019, 503, 61–71. [Google Scholar] [CrossRef]
  55. Ferrag, M.A.; Maglaras, L.; Argyriou, A.; Kosmanos, D.; Janicke, H. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 2018, 101, 55–82. [Google Scholar] [CrossRef] [Green Version]
  56. Cao, M.; Wang, L.; Xu, H.; Chen, D.; Lou, C.; Zhang, N.; Zhu, Y.; Qin, Z. Sec-D2D: A secure and lightweight D2D communication system with multiple sensors. IEEE Access 2019, 7, 33759–33770. [Google Scholar] [CrossRef]
  57. Hsu, R.-H.; Lee, J.; Quek, T.Q.S.; Chen, J.-C. GRAAD: Group anonymous and accountable D2D communication in mobile networks. IEEE Trans. Inf. Forensics Secur. 2018, 13, 449–464. [Google Scholar] [CrossRef] [Green Version]
  58. Jiang, L.; Xie, S.; Maharjan, S.; Zhang, Y. Joint transaction relaying and block verification optimization for blockchain empowered D2D communication. IEEE Trans. Veh. Technol. 2020, 69, 828–841. [Google Scholar] [CrossRef]
  59. Yang, C.; Li, J.; Semasinghe, P.; Hossain, E.; Perlaza, S.M.; Han, Z. Distributed interference and energy-aware power control for ultra-dense D2D networks: A mean field game. IEEE Trans. Wirel. Commun. 2017, 16, 1205–1217. [Google Scholar] [CrossRef]
  60. Memmi, A.; Rezki, Z.; Alouini, M.-S. Power control for D2D underlay cellular networks with channel uncertainty. IEEE Trans. Wirel. Commun. 2017, 16, 1330–1343. [Google Scholar] [CrossRef]
  61. Xu, H.; Huang, N.; Yang, Z.; Shi, J.; Wu, B.; Chen, M. Pilot allocation and power control in D2D underlay massive MIMO systems. IEEE Commun. Lett. 2017, 21, 112–115. [Google Scholar] [CrossRef]
  62. Zhai, D.; Sheng, M.; Wang, X.; Sun, Z.; Xu, C.; Li, J. Energy-saving resource management for D2D and cellular coexisting networks enhanced by hybrid multiple access technologies. IEEE Trans. Wirel. Commun. 2017, 16, 1. [Google Scholar] [CrossRef]
  63. Xu, J.; Guo, C.; Zhang, H. Joint channel allocation and power control based on PSO for cellular networks with D2D communications. Comput. Netw. 2018, 133, 104–119. [Google Scholar] [CrossRef]
  64. Lim, D.-W.; Kang, J.; Kim, H.-M. Adaptive power control for D2D communications in downlink SWIPT networks with partial CSI. IEEE Wirel. Commun. Lett. 2019, 8, 1333–1336. [Google Scholar] [CrossRef]
  65. Gao, X.; Yang, K.; Yang, N.; Wu, J. Energy-efficient resource block assignment and power control for underlay Device-to-Device communications in multi-cell networks. Comput. Netw. 2019, 149, 240–251. [Google Scholar] [CrossRef]
  66. Wang, H.; Ding, G.; Wang, J.; Wang, S.; Wang, L. Power control for multiple interfering D2D communications underlaying cellular networks: An approximate interior point approach. In Proceedings of the 2017 IEEE International Conference on Communications Workshops (ICC Workshops), Paris, France, 21–25 May 2017; Institute of Electrical and Electronics Engineers (IEEE): New York, NY, USA, 2017; pp. 1346–1351. [Google Scholar]
  67. Abrardo, A.; Moretti, M. Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks. IEEE Trans. Wirel. Commun. 2016, 16, 1. [Google Scholar] [CrossRef] [Green Version]
  68. Abdallah, A.; Mansour, M.M.; Chehab, A. Power control and channel allocation for D2D underlaid cellular networks. IEEE Trans. Commun. 2018, 66, 3217–3234. [Google Scholar] [CrossRef] [Green Version]
  69. Liu, C.; Wang, X.; Wu, X.; Guo, J. Economic scheduling model of microgrid considering the lifetime of batteries. IET Gener. Transm. Distrib. 2017, 11, 759–767. [Google Scholar] [CrossRef]
  70. Tao, L.; Ma, J.; Cheng, Y.; Noktehdan, A.; Chong, J.; Lu, C. A review of stochastic battery models and health management. Renew. Sustain. Energy Rev. 2017, 80, 716–732. [Google Scholar] [CrossRef]
  71. Ding, J.; Jiang, L.; He, C. Energy-efficient power control for underlaying D2D communication with channel uncertainty: User-centric versus network-centric. J. Commun. Netw. 2016, 18, 589–599. [Google Scholar] [CrossRef]
  72. Hoang, T.D.; Le, L.B.; Le-Ngoc, T. Joint mode selection and resource allocation for relay-based D2D communications. IEEE Commun. Lett. 2016, 21, 398–401. [Google Scholar] [CrossRef]
  73. Chou, H.-J.; Chang, R.Y. Joint mode selection and interference management in Device-to-Device communications underlaid MIMO cellular networks. IEEE Trans. Wirel. Commun. 2017, 16, 1120–1134. [Google Scholar] [CrossRef]
  74. Yang, L.; Wu, D.; Shi, H.; Long, Y.; Cai, Y. Social-aware joint mode selection and link allocation for device-to-device communication underlaying cellular networks. China Commun. 2018, 15, 92–107. [Google Scholar] [CrossRef]
  75. Li, Y.; Song, W.; Su, Z.; Huang, L.; Gao, Z. A distributed mode selection approach based on evolutionary game for Device-to-Device communications. IEEE Access 2018, 6, 60045–60058. [Google Scholar] [CrossRef]
  76. Tian, C.; Qian, Z.; Wang, X.; Hu, L. Analysis of joint relay selection and resource allocation scheme for relay-aided D2D communication networks. IEEE Access 2019, 7, 142715–142725. [Google Scholar] [CrossRef]
  77. Bithas, P.S.; Maliatsos, K.; Foukalas, F. An SINR-aware joint mode selection, scheduling, and resource allocation scheme for D2D communications. IEEE Trans. Veh. Technol. 2019, 68, 4949–4963. [Google Scholar] [CrossRef] [Green Version]
  78. Wu, D.; Zhou, L.; Cai, Y.; Qian, Y. Optimal content sharing mode selection for social-aware D2D communications. IEEE Wirel. Commun. Lett. 2018, 7, 910–913. [Google Scholar] [CrossRef]
  79. Bulusu, S.; Mehta, N.B.; Kalyanasundaram, S. Rate adaptation, scheduling, and mode selection in D2D systems with partial channel knowledge. IEEE Trans. Wirel. Commun. 2018, 17, 1053–1065. [Google Scholar] [CrossRef]
  80. Chen, C.-Y.; Sung, C.-A.; Chen, H.-H. Capacity maximization based on optimal mode selection in multi-mode and multi-pair D2D communications. IEEE Trans. Veh. Technol. 2019, 68, 6524–6534. [Google Scholar] [CrossRef]
  81. Dai, Y.; Sheng, M.; Liu, J.; Cheng, N.; Shen, X.; Yang, Q. Joint mode selection and resource allocation for D2D-enabled NOMA cellular networks. IEEE Trans. Veh. Technol. 2019, 68, 6721–6733. [Google Scholar] [CrossRef]
  82. Haider, N.; Ali, A.; Suarez-Rodriguez, C.; Dutkiewicz, E. Optimal mode selection for full-duplex enabled D2D cognitive networks. IEEE Access 2019, 7, 57298–57311. [Google Scholar] [CrossRef]
  83. Hayat, O.; Ngah, R.; Zahedi, Y. Cooperative GPS and neighbors awareness based device discovery for D2D communication in in-band cellular networks. Int. J. Eng. Technol. 2018, 7, 700–703. [Google Scholar] [CrossRef]
  84. Akyildiz, I.F.; Nie, S.; Lin, S.-C.; Chandrasekaran, M. 5G roadmap: 10 key enabling technologies. Comput. Netw. 2016, 106, 17–48. [Google Scholar] [CrossRef]
  85. Hossain, E.; Hasan, M. 5G cellular: Key enabling technologies and research challenges. IEEE Instrum. Meas. Mag. 2015, 18, 11–21. [Google Scholar] [CrossRef] [Green Version]
  86. Wen, S.; Zhu, X.; Lin, Y.; Lin, Z.; Zhang, X.; Yang, D. Achievable transmission capacity of relay-assisted Device-to-Device (D2D) communication underlay cellular networks. In Proceedings of the 2013 IEEE 78th Vehicular Technology Conference (VTC Fall), Las Vegas, NV, USA, 2–5 September 2013; Institute of Electrical and Electronics Engineers (IEEE): New York, NY, USA, 2013; pp. 1–5. [Google Scholar]
  87. Niu, Y.; Gao, C.; Li, Y.; Su, L.; Jin, D.; Vasilakos, A.V. Exploiting Device-to-Device communications in joint scheduling of access and backhaul for mmWave small cells. J. Sel. Areas Commun. 2015, 33, 2052–2069. [Google Scholar] [CrossRef] [Green Version]
  88. Ghosh, A.; Thomas, T.A.; Cudak, M.C.; Ratasuk, R.; Moorut, P.; Vook, F.W.; Rappaport, T.S.; MacCartney, G.R.; Sun, S.; Nie, S. Millimeter-wave enhanced local area systems: A high-data-rate approach for future wireless networks. IEEE J. Sel. Areas Commun. 2014, 32, 1152–1163. [Google Scholar] [CrossRef]
  89. Amin, R.; Islam, S.K.H.; Biswas, G.P.; Khan, M.K.; Kumar, N. An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography. J. Med. Syst. 2015, 39, 180. [Google Scholar] [CrossRef]
  90. Li, X.; Sun, Y.; Zhou, L.; Xu, Y.; Zhou, S. A resource allocation scheme based on predatory search algorithm for ultra-dense D2D communications. Wirel. Netw. 2019, 5, 1–9. [Google Scholar] [CrossRef]
  91. Wang, X.; Li, S.; Zhao, S.; Xia, Z.; Bai, L. A vehicular ad hoc network privacy protection scheme without a trusted third party. Int. J. Distrib. Sens. Netw. 2017, 13. [Google Scholar] [CrossRef]
Table 1. Comparison with existing related surveys.
Table 1. Comparison with existing related surveys.
ChallengesReferences
[1][5][6][8][9][10][11][12][13][14][15]Ours
Device Discovery X X XX X
Interference Management X XX X X
Privacy and SecurityX X XX
Power Control XXX X X
Mode Selection X X
Table 2. Comparative summary of device discovery schemes in device-to-device (D2D) communication.
Table 2. Comparative summary of device discovery schemes in device-to-device (D2D) communication.
Ref.Proposed MethodProsConsObjectives
Easy DiscoverabilityReduced LatencyEnergy/Power EfficiencyThroughput Enhancement
[18]Direct D2D discovery scheme based on the random back-off procedure.Increases the average number of User Equipments (UEs) discovered and can reduce the D2D discovery delay and collision probability.Further analysis on the impact of backoff window on the average delay of D2D UEs.
[19]Novel D2D discovery schemes, based on the VANET network.Low discovery latency is achieved.The average delay for highly depends on the inter-RSUs distance and the RSU coverage.
[20]Novel sequential estimation scheme.Detection performance significantly improved.Need to consider shared capacity between primary and secondary links.
[21]ROOMMATE, the enabler for indoor D2D communications in LTE networks.ROOMMATE is energy-efficient and signal-to-interference-plus-noise ratio are improved.Requires modifications of existing standards and the security aspects.
[22]Adaptive D2D discovery algorithm.Energy consumption savings are achieved by reducing overall discovery messages signaling in the network.The users’ behavior in different scenarios.
[23]Social aware peer discovery mechanism.The probability of encountering malicious devices are decreased and the probability to recognize trusted devices are increased.Instability of connection influences the communication channel and Signal Noise Ratio (SNR).
Table 3. Brief summary of interference management in D2D communication.
Table 3. Brief summary of interference management in D2D communication.
Ref.ProblemAlgorithm UsedFindingsReuse ResourcesInterference Control Level
[31]Utilize throughput to an interference temperature constraint.Stackelberg game theoretic optimization.Improves resource allocation and interference management in spectrum-sharing D2D communications.Uplink (UL)Centralized
[32]Quality of Service (QoS) interference management.Graph theory-based solution for relay selection and power adoption.Improves QoS satisfaction with high energy efficiency.Uplink and Downlink (UL&DL) Distributed
[33]Interference management and performance enhancement.Concatenated Bi-partite Matching (CBM) graph theory-based solution.Reducing the average number of cellular user equipment (CUEs) in outage.Uplink or Downlink (UL/DL)Centralized
[34]Distribution of random devices in cellular networks lead to critical interferences.Novel greedy-based channel assignment algorithm.Increases the network capacity and improves the fairness among devices with low computational complexity.Uplink (UL)Centralized
[35]Co/cross-tier resource sharing interferences problem.Matching theory-based distributed resource allocation algorithm.Achieves optimum network performance with much lower overhead and complexity.Downlink (DL)Distributed
[36]Dependency on CSI and high signaling.Joint clustering and topological interference management (TIM) framework.Computation time is reduced.Uplink and Downlink (UL&DL)Centralized
Table 4. Overview of security issues and recently proposed solutions.
Table 4. Overview of security issues and recently proposed solutions.
Ref.ProblemAlgorithmAttack AddressedFindingsLimitations
[49]Interference among LTE-U network, D2D users, and the opportunistic feature of unlicensed channel access in existing Wi-Fi systems.User-Subchannel Matching Algorithm for LTE and D2D users.Address SpoofingSignificantly improve the system sum rate.Need to consider Wi-Fi performance degradation.
[50]Lack of protection for cellular users against eavesdropping.Optimization-Based Access Assignment Scheme for D2D users.EavesdroppingImproves the physical-layer security of cellular users and achieved maximum secrecy throughput with the optimal threshold.Consider protecting only single cellular user in the presence of multiple eavesdroppers.
[51]Lack of trusted devices to execute secure data aggregation without a base station.Security protection mechanism of private data based on homomorphic encryption.Packet SniffingImproves the security and optimizes the resources allocation in D2D network.Further studies on election factors and the impact of the dynamics of wireless devices on D2D networks.
[52]Lack of privacy-preserving and secure scheme in D2D group communications.Key Agreement and two privacy-preserving authentication protocols.Replay AttackImproves the security, efficiency, and effectiveness of the protocols.No real applicability evaluation in a 5G D2D communication.
[53]Maturity of key generation in the physical layer security (PLS) technique.Secure Key Generation (SKG) scheme.EavesdroppingImproves information confidentiality.Need to combine authentication of higher layer and information confidentiality.
[54]Unassisted third-party devices mutual communication.Dynamic group key agreement protocol.Masquerade AttackAchieves high entropy group session key for D2D group communication and improved the security.No real applicability evaluation in a 5G D2D communication.
Table 5. Summary of power control issues and proposed solutions.
Table 5. Summary of power control issues and proposed solutions.
Ref.ProblemProposed MethodFindingsLimitations
[59]Power control distribution.Theoretic framework using Mean Field Game (MFG).Achieves higher energy efficiency compared with the blind power control scheme.Increasing the energy means increasing the interference power and decreases the spectrum efficiency.
[60]Imperfect wireless Channel State Information (CSI) power control.Truncated channel inversion and ON-OFF power control scheme.Imperfect CSI and misinformation lead to the degradation of performance especially for high target SINR.Estimation error is a key parameter that should be consider during network design.
[61]Contamination and training sequence overhead reduction in D2D underlay massive MIMO networks.Revised Graph Coloring-based Pilot Allocation (RGCPA) algorithm.Pilot overhead is reduced and the effect of pilot contamination is cancelled.The sum power monotonically decreases and converges rapidly for different value.
[62]Sparse Code Multiple Access (SCMA) power allocation.Graph theoretic approach.Energy efficiency performance is enhanced and network capacity is upgraded.Need to compare the algorithms with different schemes.
[63]Power control under different constraints.Power control scheme using Particle Swarm Optimization (PSO).Achieves higher throughout than the optimal strategy.Combine the admission control into power control scheme and the joint channel allocation.
[64]Power control is non-convex and intractable.D2D transmit power control schemes.D2D rates converge to a rate ceiling at high signal-to-noise ratio.The energy signal transmission is less effective when performance gaps are small.
[65]Non- convex mixed-integer fractional program.Sequential Geometric Programming (SGP) algorithm.Reduces energy efficiency (EE) loss.The network EE first increases and then decreases when the transmit power increases.
Table 6. Brief summary of mode selection issues and proposed solutions in D2D communication.
Table 6. Brief summary of mode selection issues and proposed solutions in D2D communication.
Ref.ProblemSolutionsContributionsLimitations
[72]Joint mode selection, power control problem, and resource group (RG) assignment for D2D underlaid cellular networks.RG assignment, joint optimal mode selection, and power allocation design for D2D.Improves the system sum rate significantly compared to the conventional schemes.Focus more on optimizing the communications mode in relay-based D2D communication.
[73]The effects of network interference profile to D2D mode selection and vice versa.IA-based coding strategy and DoF-based mode selection.Better performance than in high SNR regime, low interference environment, large MIMO systems, and small-cell networks.Further analysis on small/medium antenna systems and large-cell networks.
[74]Link allocation and mode selection problem under coalition formation game.Distributed coalition formation algorithm.Achieves better performance for cellular users.Need to extend the single cell scenario to a multi-cell scenario, and implement some joint optimal solutions.
[75]Problem in evolutionary game formulation in mode selection.Evolutionary game-based distributed D2D mode selection algorithm.Achieves higher utilities than the baseline schemes.Need to consider other D2D communication modes.
[13]Spectrum partition and mode selection problem from physical layer.Theoretical framework for optimization of both D2D pairs and cellular users (CUs), and the performance modeling.PLS performances of the CUE and D2D pair can be flexibly controlled by mode selection and spectrum partition.Need to consider the performance evaluation for the case with two CUEs and two D2D pairs.
[76]Resource allocation and joint relay selection problem for relay-assisted D2D.Greedy-based mode selection and channel allocation algorithm.Transmission data rates is maximized while guaranteeing the minimum QoS requirements for both CUs and D2D users (DUs).Study the impact of social attributes among users on the performance of D2D communication networks.
[77]Quality of service in mode selection.Mode selection scheme based on greedy heuristic algorithm.Improves sum rate and average UE SINR, with no increase in signaling overhead or complexity.UEs with very low SINR (both modes of operation) not benefit from the increase in DUE number.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Adnan, M.H.; Ahmad Zukarnain, Z. Device-To-Device Communication in 5G Environment: Issues, Solutions, and Challenges. Symmetry 2020, 12, 1762. https://doi.org/10.3390/sym12111762

AMA Style

Adnan MH, Ahmad Zukarnain Z. Device-To-Device Communication in 5G Environment: Issues, Solutions, and Challenges. Symmetry. 2020; 12(11):1762. https://doi.org/10.3390/sym12111762

Chicago/Turabian Style

Adnan, Mohd Hirzi, and Zuriati Ahmad Zukarnain. 2020. "Device-To-Device Communication in 5G Environment: Issues, Solutions, and Challenges" Symmetry 12, no. 11: 1762. https://doi.org/10.3390/sym12111762

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop