Review on Device-to-Device Communication in Cellular based Network Systems
Keywords:data-to-data communication, cellular-to-device communications, network communications, celluar bases system, two-tier network.
In a traditional cellular-network based system, the devices are not allowed to be interconnected directly in the certified mobile bandwidth, and all communications are carried out via the base station (BS). At present, device terminal broadcasting allows devices in the distributed network to act as transmitting relays to each other and reach a massive ad hoc network of networks that is different from the previous cellular architecture that faces technical challenges. Therefore, this article explores the application of a cellular-based two-layer network system that includes a base station (BS) cellular layer, such as cellular-to-device communication and communication between devices. In the proposed two-tier cellular-based network system, user data is transmitted through other users' devices to implement the privacy protection that is lacking in prior communication between devices in cellular systems. To ensure a negligible impact on the performance of current communication between devices, a two-layer network is assimilated to autonomous interference management schemes and associated resource allocation schemes. The findings from this review provide an overview of the major challenges in two-tier networks and propose a two-tier cellular-based system in which user data is routed through other users' devices to implement privacy protection.
 M. Hicham, N. Abghour and M. Ouzzif, â€œDEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKS,â€ International Journal of Wireless & Mobile Networks (IJWMN), vol. 8, 2016, pp. 11-22.
 D. Feng, L. Lu, Y. Yuan-Wu, G.Y. Li, G. Feng and S. Li, â€œDevice-to-device communications underlaying cellular networks,â€ IEEE Transactions on Communications,vol. 61, 2013, pp.3541-3551.
 M. N. Tehrani, M. Uysal and H. Yanikomeroglu, â€œDevice-to-device communication in 5G cellular networks: challenges, solutions, and future directions,â€ IEEE Communications Magazine, vol. 52, 2014, pp.86-92.
 T. Bansal, K. Sundaresan, S Rangarajan and P. Sinha, â€œR2D2: Embracing device-to-device communication in next generation cellular networks,â€ 2014 Proceedings INFOCOM IEEE, pp. 1563-1571, 2014.
 G. George, R.K. Mungara, A. Lozano, â€œAn analytical framework for device-to-device communication in cellular networks,â€ IEEE Transactions on Wireless Communications, vol. 14, 2015, pp.6297-6310.
 J. Liu, Y. Kawamoto, H. Nishiyama, N. Kato and N. Kadowaki, â€œDevice-to-device communications achieve efficient load balancing in LTE-advanced networksâ€, IEEE Wireless Communications, vol. 21, 2014, pp.57-65.
 G. Fodor, A. Pradin and A. Gattami, â€œDevice-to-device communications and network coding: friends or foes,â€ IEEE Comsoc MMTC E-Letter, vol. 9, 2014, pp.33-35.
 P. Gandotra and R. K. Jha, â€œDevice-to-device communication in cellular networks: A survey,â€ Journal of Network and Computer Applications, vol. 71, 2016, pp.99-117.
 Y. Chen, S. He, F. Hou, Z. Shi and J. Chen, â€œPromoting device-to-device communication in cellular networks by contract-based incentive mechanisms,â€ IEEE Network, 2017.
 K. D. Saifuldun Mostafa, Hayder Saad, Mustafa Musa Jaber, Mohammed Hasan Ali, â€œThe Design Trends of Keystream Generator for Stream Cipher for High Immunity Attacks,â€ in Advanced Computer and Communication Engineering Technology, Springer International Publishing, 2016, pp. 877â€“889.
 M. H. Ali, M. F. Zolkipli, M. M. Jaber, and M. A. Mohammed, â€œIntrusion detection system based on machine learning in cloud computing,â€ J. Eng. Appl. Sci., vol. 12, no. 16, 2017.
 M. H. Ali, M. F. Zolkipli, M. A. Mohammed, and M. M. Jaber, â€œEnhance of extreme learning machine-genetic algorithm hybrid based on intrusion detection system,â€ J. Eng. Appl. Sci., vol. 12, no. 16, 2017.
 S. K. Abd, R. T. Salih, S. A. R. Al-Haddad, F. Hashim, A. B. H. Abdullah, and S. Yussof, â€œCloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol,â€ in IEEE Region 10 Annual International Conference, Proceedings/TENCON, 2016.
 S. K. Abd, S. A. R. Al-Haddad, F. Hashim, A. B. H. J. Abdullah, and S. Yussof, â€œEnergy-Aware Fault Tolerant Task offloading of Mobile Cloud Computing,â€ in Proceedings - 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2017, 2017.
 S.Y. Lien, C.C. Chien, F.M. Tseng and T.C. Ho, â€œ3GPP device-to-device communications for beyond 4G cellular networks,â€ IEEE Communications Magazine, vol. 54, 2016, pp.29-35.
 Z. Uykan and R. JÃ¤ntti, â€œTransmission-order optimization for bidirectional Device-To-Device (D2D) communications underlaying cellular TDD networksâ€”A graph theoretic approach,â€ IEEE Journal on Selected Areas in Communications, vol. 34, 2016, pp.1-14.
 H. Chen, L. Liu, T. Novlan, J.D. Matyjas, B.L. Ng and J. Zhang, â€œSpatial Spectrum Sensing-Based Device-to-Device Cellular Networks,â€ IEEE Transactions on Wireless Communications, vol. 15, 2016, pp.7299-7313.
 K.W. Choi, D.T. Wiriaatmadja and E. Hossain, â€œDiscovering mobile applications in cellular device-to-device communications: Hash function and bloom filter-based approach,â€ IEEE Transactions on Mobile Computing,vol. 15, 2016, pp.336-349.
 T. Zhang, H. Wang, X. Chu and J. He, â€œA Signaling-based Incentive Mechanism for Device-to-Device Content Sharing in Cellular Networks,â€ IEEE Communications Letters, 2017.
 J. Yao, T. Wang, X. Wu, L. Wang and B. Zheng, â€œBlind spot coverage strategy based on D2D communications for electric LTE network,â€ 8th International Conference on Wireless Communications & Signal Processing (WCSP), pp. 1-4, 2016.
 A. Hematian, W. Yu, C. Lu, D. Griffith and N. Golmie, â€œA Clustering-Based Device-to-Device Communication to Support Diverse Applications,â€ Proceedings of the International Conference on Research in Adaptive and Convergent Systems. pp. 97-102, 2016.