{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T22:40:09Z","timestamp":1749940809874,"version":"3.41.0"},"publisher-location":"Cham","reference-count":93,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031957277","type":"print"},{"value":"9783031957284","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-95728-4_1","type":"book-chapter","created":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T22:01:07Z","timestamp":1749938467000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Critical Review of\u00a0Mobile Device-to-Device Communication"],"prefix":"10.1007","author":[{"given":"Lauric","family":"Desauw","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1777-307X","authenticated-orcid":false,"given":"Adrien","family":"Luxey-Bitri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8239-7683","authenticated-orcid":false,"given":"R\u00e9my","family":"Raes","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1771-8791","authenticated-orcid":false,"given":"Romain","family":"Rouvoy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6862-9046","authenticated-orcid":false,"given":"Olivier","family":"Ruas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2903-7600","authenticated-orcid":false,"given":"Walter","family":"Rudametkin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,15]]},"reference":[{"key":"1_CR1","unstructured":"3GPP: Release 12. Standard v0.2.0, 3GPP (2015)"},{"key":"1_CR2","unstructured":"3GPP: Release 15. Standard v15.0.0, 3GPP (2019)"},{"issue":"2","key":"1_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.3390\/data3020013","volume":"3","author":"M Aernouts","year":"2018","unstructured":"Aernouts, M., Berkvens, R., Van Vlaenderen, K., Weyn, M.: Sigfox and LoRaWAN datasets for fingerprint localization in large urban and rural areas. Data 3(2), 13 (2018). https:\/\/doi.org\/10.3390\/data3020013","journal-title":"Data"},{"issue":"3","key":"1_CR4","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1017\/S0963180114000607","volume":"24","author":"Y Al-Saggaf","year":"2015","unstructured":"Al-Saggaf, Y.: The use of data mining by private health insurance companies and customers\u2019 privacy: an ethical analysis. Cambridge Q. Healthcare Ethics 24(3), 281\u2013292 (2015). https:\/\/doi.org\/10.1017\/S0963180114000607","journal-title":"Cambridge Q. Healthcare Ethics"},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Antonioli, D., Tippenhauer, N.O., Rasmussen, K.B.: Nearby threats: reversing, analyzing, and attacking Google\u2019s \u2018nearby connections\u2019 on android. In: Proceedings 2019 Network and Distributed System Security Symposium. Internet Society, San Diego, CA (2019). https:\/\/doi.org\/10.14722\/ndss.2019.23367","DOI":"10.14722\/ndss.2019.23367"},{"key":"1_CR6","unstructured":"Apple: AirPlay (2022). https:\/\/www.apple.com\/airplay\/. Accessed Apr 2023"},{"key":"1_CR7","unstructured":"Apple: Nearby interactions with u1 (2022). https:\/\/developer.apple.com\/nearby-interaction\/. Accessed Apr 2023"},{"key":"1_CR8","unstructured":"Apple Fandom: iPhone (1st generation) (2023). https:\/\/apple.fandom.com\/wiki\/IPhone_(1st_generation). Accessed Apr 2023"},{"key":"1_CR9","unstructured":"Apple Support: Ultra Wideband Availability (2021). https:\/\/support.apple.com\/en-us\/HT212274. Accessed Apr 2023"},{"key":"1_CR10","doi-asserted-by":"publisher","unstructured":"Asghari, H., van Eeten, M., Bauer, J.M., Mueller, M.: Deep packet inspection: effects of regulation on its deployment by internet providers. SSRN Scholarly Paper ID 2242463, Social Science Research Network, Rochester, NY, September 2013. https:\/\/doi.org\/10.2139\/ssrn.2242463","DOI":"10.2139\/ssrn.2242463"},{"issue":"9","key":"1_CR11","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.3390\/s16091466","volume":"16","author":"A Augustin","year":"2016","unstructured":"Augustin, A., Yi, J., Clausen, T., Townsley, W.M.: A study of LoRa: long range & low power networks for the Internet of Things. Sensors (Basel, Switzerland) 16(9), 1466 (2016). https:\/\/doi.org\/10.3390\/s16091466","journal-title":"Sensors (Basel, Switzerland)"},{"key":"1_CR12","unstructured":"Barrett, B.: The Biggest iPhone News Is a Tiny New Chip Inside It. Wired, December 2019)"},{"key":"1_CR13","unstructured":"Bays, B.A., Mc\u00a0Gowan, M.J.: Use of RFID for tracking government property - proof of concept\/pilot (2017). https:\/\/www.osti.gov\/biblio\/1456529. Accessed Apr 2023"},{"key":"1_CR14","unstructured":"Bluetooth SIG: Bluetooth Core Specification. Standard v 1.0B, Bluetooth SIG (1999)"},{"key":"1_CR15","unstructured":"Bluetooth SIG: Bluetooth Technology Protecting Your Privacy (2015). https:\/\/www.bluetooth.com\/blog\/bluetooth-technology-protecting-your-privacy\/. Accessed May 2023"},{"key":"1_CR16","unstructured":"Bluetooth SIG: Bluetooth Core Specification. Standard v 5.0, Bluetooth SIG (2016)"},{"key":"1_CR17","unstructured":"Bluetooth SIG: Bluetooth Technology Overview (2023). https:\/\/www.bluetooth.com\/learn-about-bluetooth\/tech-overview\/. Accessed Apr 2023"},{"key":"1_CR18","unstructured":"Bluetooth SIG: Bluetooth\u00ae Core Specification Version 5.4 - Technical Overview, February 2023. https:\/\/www.bluetooth.com\/bluetooth-resources\/bluetooth-core-specification-version-5-4-technical-overview\/. Accessed Apr 2023"},{"key":"1_CR19","unstructured":"Bluetooth SIG: Understanding Bluetooth Range (2023). https:\/\/www.bluetooth.com\/learn-about-bluetooth\/key-attributes\/range\/. Accessed Apr 2023"},{"key":"1_CR20","unstructured":"Cable.co.uk: Worldwide mobile data pricing 2021 (2021). https:\/\/www.cable.co.uk\/mobiles\/worldwide-data-pricing\/. Accessed Apr 2023"},{"key":"1_CR21","unstructured":"Cadwalladr, C.: \u2018I Made Steve Bannon\u2019s Psychological Warfare Tool\u2019: Meet the Data War Whistleblower. The Guardian, March 2018"},{"key":"1_CR22","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.jnca.2016.01.002","volume":"67","author":"S Cc","year":"2016","unstructured":"Cc, S., Raychoudhury, V., Marfia, G., Singla, A.: A survey of routing and data dissemination in delay tolerant networks. J. Netw. Comput. App. 67, 128\u2013146 (2016). https:\/\/doi.org\/10.1016\/j.jnca.2016.01.002","journal-title":"J. Netw. Comput. App."},{"key":"1_CR23","unstructured":"Cheng, J.: Over 3 Years Later, \u201cDeleted\u201d Facebook Photos Are Still Online. Ars Technica, February 2012"},{"key":"1_CR24","unstructured":"Cisco: Annual Interet Report (2018-2023) White Paper. Technical report, Cisco (2020)"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Conti, M., Passarella, A., Das, S.K.: The Internet of People (IoP): a new wave in pervasive mobile computing. Pervas. Mobile Comput. 41, 1\u201327 (2017). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1574119217303723","DOI":"10.1016\/j.pmcj.2017.07.009"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Cook, D.J., Das, S.K.: Pervasive computing at scale: transforming the state of the art. Pervas. Mobile Comput. 8(1), 22\u201335 (2012). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1574119211001416","DOI":"10.1016\/j.pmcj.2011.10.004"},{"key":"1_CR27","doi-asserted-by":"publisher","unstructured":"Corson, S., Macker, J.: Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. Technical report. RFC2501, RFC Editor, January 1999. https:\/\/doi.org\/10.17487\/rfc2501","DOI":"10.17487\/rfc2501"},{"key":"1_CR28","unstructured":"Court of Justice of the European Union: Judgment on traffic log retention in the face of national security. Court judgment ECLI:EU:C:2020:791, October 2020"},{"key":"1_CR29","doi-asserted-by":"publisher","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. Technical report, Defense Technical Information Center, Fort Belvoir, VA, January 2004. https:\/\/doi.org\/10.21236\/ADA465464","DOI":"10.21236\/ADA465464"},{"key":"1_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3018878","author":"W Feng","year":"2020","unstructured":"Feng, W., Yan, Z., Yang, L.T., Zheng, Q.: Anonymous authentication on trust in blockchain-based mobile crowdsourcing. IEEE Internet Things J. (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.3018878","journal-title":"IEEE Internet Things J."},{"key":"1_CR31","unstructured":"Google: Nearby Connections API (2022). https:\/\/developers.google.com\/nearby\/connections\/. Accessed Apr 2023"},{"key":"1_CR32","unstructured":"Google: Wi-Fi Aware overview | Android Documentation (2023). https:\/\/developer.android.com\/guide\/topics\/connectivity\/wifi-aware. Accessed Apr 2023"},{"key":"1_CR33","unstructured":"GSMA: Over half world\u2019s population now using mobile internet (2021). https:\/\/www.gsma.com\/newsroom\/press-release\/over-half-worlds-population-now-using-mobile-internet\/. Accessed Apr 2023"},{"issue":"2","key":"1_CR34","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/COMST.2017.2649687","volume":"19","author":"M Haus","year":"2017","unstructured":"Haus, M., Waqas, M., Ding, A.Y., Li, Y., Tarkoma, S., Ott, J.: Security and privacy in device-to-device (D2D) communication: a review. IEEE Commun. Surv. Tutor. 19(2), 1054\u20131079 (2017). https:\/\/doi.org\/10.1109\/COMST.2017.2649687","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1_CR35","doi-asserted-by":"publisher","unstructured":"IEEE: IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. Standard, IEEE Std 802.11-1997, November 1997. https:\/\/doi.org\/10.1109\/IEEESTD.1997.85951","DOI":"10.1109\/IEEESTD.1997.85951"},{"key":"1_CR36","doi-asserted-by":"publisher","unstructured":"IEEE: IEEE Standard for Telecommunications and Information Exchange Between Systems - LAN\/MAN Specific Requirements - Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: High Speed Physical Layer in the 5 GHz band. Standard, IEEE Std 802.11a-1999, December 1999. https:\/\/doi.org\/10.1109\/IEEESTD.1999.90606","DOI":"10.1109\/IEEESTD.1999.90606"},{"key":"1_CR37","doi-asserted-by":"publisher","unstructured":"IEEE: IEEE Standard for Information Technology - Telecommunications and information exchange between systems - Local and Metropolitan networks - Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Higher Speed Physical Layer (PHY) Extension in the 2.4 GHz band. Standard, IEEE Std 802.11b-1999, January 2000. https:\/\/doi.org\/10.1109\/IEEESTD.2000.90914","DOI":"10.1109\/IEEESTD.2000.90914"},{"key":"1_CR38","doi-asserted-by":"publisher","unstructured":"IEEE: IEEE Standard for Low-Rate Wireless Networks. Standard, IEEE Std 802.15.4-2020 (Revision of IEEE Std 802.15.4-2015), July 2020. https:\/\/doi.org\/10.1109\/IEEESTD.2020.9144691","DOI":"10.1109\/IEEESTD.2020.9144691"},{"key":"1_CR39","doi-asserted-by":"publisher","unstructured":"IEEE: IEEE Standard for Information Technology\u2013Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks\u2013Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 1: Enhancements for High-Efficiency WLAN. Standard, IEEE Std 802.11ax-2021 (Amendment to IEEE Std 802.11-2020), May 2021. https:\/\/doi.org\/10.1109\/IEEESTD.2021.9442429","DOI":"10.1109\/IEEESTD.2021.9442429"},{"key":"1_CR40","doi-asserted-by":"publisher","unstructured":"IEEE: IEEE Standard for Information Technology\u2013Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks\u2013Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 2: Enhanced Throughput for Operation in License-exempt Bands above 45 GHz. Standard, IEEE Std 802.11ay-2021 (Amendment to IEEE Std 802.11-2020 as amendment by IEEE Std 802.11ax-2021), July 2021. https:\/\/doi.org\/10.1109\/IEEESTD.2021.9502046","DOI":"10.1109\/IEEESTD.2021.9502046"},{"key":"1_CR41","unstructured":"IEEE: IEEE P802.11 - TASK GROUP BH (RCM). Meeting update (2022). https:\/\/ieee802.org\/11\/Reports\/tgbh_update.htm. Accessed May 2023"},{"key":"1_CR42","unstructured":"Infrared Data Association: Serial Infrared Physical Layer Specification. Standard\u00a0v1.4 (2001)"},{"key":"1_CR43","unstructured":"International Energy Agency (IEA): The Role of Critical Minerals in Clean Energy Transitions. Technical report, May 2021"},{"key":"1_CR44","unstructured":"Internet world stats: Internet usage statistics (2021). https:\/\/internetworldstats.com\/stats.htm, Accessed Apr 2023"},{"key":"1_CR45","unstructured":"Islim, M.S., Haas, H.: Modulation techniques for Li-Fi. ZTE Commun. 14 (2016)"},{"key":"1_CR46","unstructured":"ISO Standards: ISO\/IEC 18092:2004 \u2014 Information technology \u2014 Telecommunications and information exchange between systems \u2014 Near Field Communication \u2014 Interface and Protocol. Standard (2004)"},{"key":"1_CR47","unstructured":"ISO Standards: ISO\/IEC 26907:2007 \u2014 Information technology \u2014 Automatic Telecommunications and information exchange between systems \u2014 High Rate Ultra Wideband PHY and MAC Standard. Standard (2007)"},{"key":"1_CR48","unstructured":"ISO Standards: ISO\/IEC 26908:2007 \u2014 Information technology \u2014 Automatic Telecommunications and information exchange between systems \u2014 MAC-PHY Interface for ISO\/IEC 26907. Standard (2007)"},{"key":"1_CR49","unstructured":"ISO Standards: ISO\/IEC 18004:2015 \u2014 Information technology \u2014 Automatic identification and data capture techniques \u2014 QR Code bar code symbology specification. Standard, February 2015"},{"issue":"3","key":"1_CR50","doi-asserted-by":"publisher","first-page":"2133","DOI":"10.1109\/COMST.2018.2828120","volume":"20","author":"F Jameel","year":"2018","unstructured":"Jameel, F., Hamid, Z., Jabeen, F., Zeadally, S., Javed, M.A.: A survey of device-to-device communications: research issues and challenges. IEEE Commun. Surv. Tutor. 20(3), 2133\u20132168 (2018). https:\/\/doi.org\/10.1109\/COMST.2018.2828120","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"1_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-019-0045-5","volume":"1","author":"UN Kar","year":"2019","unstructured":"Kar, U.N., Sanyal, D.K.: A critical review of 3GPP standardization of device-to-device communication in cellular networks. SN Comput. Sci. 1(1), 1\u201318 (2019). https:\/\/doi.org\/10.1007\/s42979-019-0045-5","journal-title":"SN Comput. Sci."},{"key":"1_CR52","doi-asserted-by":"publisher","unstructured":"Lavric, A., Petrariu, A.I., Popa, V.: SigFox Communication Protocol: The New Era of IoT? In: 2019 International Conference on Sensing and Instrumentation in IoT Era (ISSI), pp.\u00a01\u20134, August 2019. https:\/\/doi.org\/10.1109\/ISSI47111.2019.9043727","DOI":"10.1109\/ISSI47111.2019.9043727"},{"key":"1_CR53","unstructured":"Li, A.: Pixel 6 Pro UWB, adjust Assistant long press, Pixel Buds A-Series bass slider, & more, December 2021. https:\/\/9to5google.com\/2021\/12\/06\/december-pixel-feature-drop-android-12\/. Accessed Apr 2023"},{"key":"1_CR54","doi-asserted-by":"publisher","unstructured":"Lindell, Y.: Anonymous authentication. J. Priv. Confid. 2(2), 1-10 (2011). https:\/\/doi.org\/10.29012\/jpc.v2i2.590","DOI":"10.29012\/jpc.v2i2.590"},{"key":"1_CR55","unstructured":"Luxey, A.: E-Squads: A Novel Paradigm to Build Privacy-Preserving Ubiquitous Applications. Ph.D. thesis, Universit\u00e9 de Rennes, November 2019"},{"issue":"48","key":"1_CR56","doi-asserted-by":"publisher","first-page":"12714","DOI":"10.1073\/pnas.1710966114","volume":"114","author":"SC Matz","year":"2017","unstructured":"Matz, S.C., Kosinski, M., Nave, G., Stillwell, D.J.: Psychological targeting as an effective approach to digital mass persuasion. Proc. Natl. Acad. Sci. 114(48), 12714\u201312719 (2017). https:\/\/doi.org\/10.1073\/pnas.1710966114","journal-title":"Proc. Natl. Acad. Sci."},{"key":"1_CR57","unstructured":"Mcclain, C.: 34% of Lower-Income Home Broadband Users Have Had Trouble Paying for Their Service amid COVID-19. Pew Research Center, June 2021"},{"key":"1_CR58","doi-asserted-by":"publisher","unstructured":"Mekki, K., Bajic, E., Chaxel, F., Meyer, F.: Overview of cellular LPWAN technologies for IoT deployment: Sigfox, LoRaWAN, and NB-IoT. In: 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 197\u2013202, March 2018. https:\/\/doi.org\/10.1109\/PERCOMW.2018.8480255","DOI":"10.1109\/PERCOMW.2018.8480255"},{"key":"1_CR59","doi-asserted-by":"publisher","unstructured":"Mishra, V., Laperdrix, P., Vastel, A., Rudametkin, W., Rouvoy, R., Lopatka, M.: Don\u2019t count me out: on the relevance of IP address in the tracking ecosystem. In: Proceedings of The Web Conference 2020. WWW 2020, ACM, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3366423.3380161","DOI":"10.1145\/3366423.3380161"},{"key":"1_CR60","unstructured":"Nakashima, E., Warrick, J.: For NSA Chief, Terrorist Threat Drives Passion to \u2018Collect It All\u2019. Washington Post, July 2013"},{"key":"1_CR61","unstructured":"Campbell, N.: QR Code Contact Tracing. Vaccine Passports Becoming New Normal in Europe. America, Vision Times, January 2021"},{"key":"1_CR62","unstructured":"Nieva, R.: Google\u2019s Pixel 6 phones are coming with a chip designed in-house, August 2021. https:\/\/www.cnet.com\/tech\/mobile\/googles-pixel-6-phones-are-coming-with-a-chip-the-apple-rival-designed-in-house\/. Accessed Apr 2023"},{"key":"1_CR63","unstructured":"Nintendo Wiki: List of Nintendo systems (2022). https:\/\/nintendo.fandom.com\/wiki\/List_of_Nintendo_systems. Accessed Apr 2023"},{"key":"1_CR64","volume-title":"Introduction to Impulse Radio UWB Seamless Access Systems","author":"HJ Pirch","year":"2020","unstructured":"Pirch, H.J., Leong, F.: Introduction to Impulse Radio UWB Seamless Access Systems. White paper, FiRa Consortium (2020)"},{"key":"1_CR65","unstructured":"Price, R.: Google Drive now hosts more than 2 trillion files. Business Insider, May 2017"},{"issue":"3","key":"1_CR66","doi-asserted-by":"publisher","first-page":"2772","DOI":"10.1109\/COMST.2018.2873950","volume":"21","author":"V Primault","year":"2019","unstructured":"Primault, V., Boutet, A., Mokhtar, S.B., Brunie, L.: The long road to computational location privacy: a survey. IEEE Commun. Surv. Tutor. 21(3), 2772\u20132793 (2019). https:\/\/doi.org\/10.1109\/COMST.2018.2873950","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1_CR67","volume-title":"Night Vision: Exploring the Infrared Universe","author":"M Rowan-Robinson","year":"2012","unstructured":"Rowan-Robinson, M.: Night Vision: Exploring the Infrared Universe. Cambridge University Press, Cambridge (2012)"},{"issue":"6","key":"1_CR68","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCOM.2002.1007414","volume":"40","author":"K Sairam","year":"2002","unstructured":"Sairam, K., Gunasekaran, N., Redd, S.: Bluetooth in wireless communication. IEEE Commun. Mag. 40(6), 90\u201396 (2002). https:\/\/doi.org\/10.1109\/MCOM.2002.1007414","journal-title":"IEEE Commun. Mag."},{"key":"1_CR69","unstructured":"Secure Mobile Networking Lab: OpenDrop: An Open Source AirDrop Implementation, August 2022. https:\/\/github.com\/seemoo-lab\/opendrop. Accessed Apr 2023"},{"key":"1_CR70","doi-asserted-by":"publisher","unstructured":"Shen, W., Hong, W., Cao, X., Yin, B., Shila, D.M., Cheng, Y.: Secure key establishment for device-to-device communications. In: 2014 IEEE Global Communications Conference, pp. 336\u2013340, December 2014. https:\/\/doi.org\/10.1109\/GLOCOM.2014.7036830","DOI":"10.1109\/GLOCOM.2014.7036830"},{"issue":"2","key":"1_CR71","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MWC.2011.5751298","volume":"18","author":"YS Shiu","year":"2011","unstructured":"Shiu, Y.S., Chang, S., Wu, H.C., Huang, S., Chen, H.H.: Physical layer security in wireless networks: a tutorial. IEEE Wirel. Commun. 18(2), 66\u201374 (2011). https:\/\/doi.org\/10.1109\/MWC.2011.5751298","journal-title":"IEEE Wirel. Commun."},{"key":"1_CR72","unstructured":"Cooper, S.: Ultra Wideband & You. WLPC Phoenix, March 2020. https:\/\/www.youtube.com\/watch?v=TR-rahy3Y2k. Accessed Apr 2023"},{"key":"1_CR73","doi-asserted-by":"publisher","unstructured":"Stute, M., Kreitschmann, D., Hollick, M.: One billion apples\u2019 secret sauce: recipe for the apple wireless direct link ad hoc protocol. In: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, pp. 529\u2013543, October 2018. https:\/\/doi.org\/10.1145\/3241539.3241566","DOI":"10.1145\/3241539.3241566"},{"key":"1_CR74","unstructured":"Stute, M., Kreitschmann, D., Hollick, M.: The Open Wireless Link Project (2018). https:\/\/owlink.org"},{"key":"1_CR75","unstructured":"Stute, M., et al.: A billion open interfaces for eve and Mallory: MitM, DoS, and tracking attacks on iOS and macOS through apple wireless direct link. In: 28th USENIX Security Symposium (USENIX Security 2019), pp. 37\u201354 (2019)"},{"key":"1_CR76","unstructured":"Tails: MAC address anonymization. Documentation (2022). https:\/\/tails.boum.org\/contribute\/design\/MAC_address\/. Accessed May 2023"},{"issue":"3","key":"1_CR77","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/377616.377622","volume":"28","author":"CK Toh","year":"2000","unstructured":"Toh, C.K., Chen, R., Delwar, M., Allen, D.: Experimenting with an Ad Hoc wireless network on campus: insights and experiences. ACM SIGMETRICS Perform. Eval. Rev. 28(3), 21\u201329 (2000). https:\/\/doi.org\/10.1145\/377616.377622","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"issue":"3","key":"1_CR78","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/TWC.2002.800539","volume":"1","author":"CK Toh","year":"2002","unstructured":"Toh, C.K., Delwar, M., Allen, D.: Evaluating the communication performance of an Ad Hoc wireless network. IEEE Trans. Wirel. Commun. 1(3), 402\u2013414 (2002). https:\/\/doi.org\/10.1109\/TWC.2002.800539","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"1_CR79","unstructured":"Toh, C.K.: Routing Method for Ad-Hoc Mobile Networks, November 1999"},{"issue":"1","key":"1_CR80","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1109\/MCOM.2017.1500527CM","volume":"55","author":"S Trifunovic","year":"2017","unstructured":"Trifunovic, S., Kouyoumdjieva, S.T., Distl, B., Pajevic, L., Karlsson, G., Plattner, B.: A decade of research in opportunistic networks: challenges, relevance, and future directions. IEEE Commun. Mag. 55(1), 168\u2013173 (2017). https:\/\/doi.org\/10.1109\/MCOM.2017.1500527CM","journal-title":"IEEE Commun. Mag."},{"key":"1_CR81","unstructured":"United Nations: With almost half of world\u2019s population still offline, digital divide risks becoming \u2018new face of inequality\u2019, deputy secretary-general warns general assembly (2021). https:\/\/www.un.org\/press\/en\/2021\/dsgsm1579.doc.htm. Accessed Apr 2023"},{"key":"1_CR82","unstructured":"Viehb\u00f6ck, S.: Brute forcing Wi-Fi Protected Setup, December 2011. https:\/\/www.cs.cmu.edu\/~rdriley\/330\/papers\/viehboeck_wps.pdf. Accessed May 2023"},{"key":"1_CR83","unstructured":"Vogels, E.A.: Some digital divides persist between rural, urban and suburban America. Pew Res. Center 19 (2021)"},{"issue":"2","key":"1_CR84","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s11036-016-0741-5","volume":"22","author":"M Wang","year":"2016","unstructured":"Wang, M., Yan, Z.: A survey on security in D2D communications. Mobile Netw. App. 22(2), 195\u2013208 (2016). https:\/\/doi.org\/10.1007\/s11036-016-0741-5","journal-title":"Mobile Netw. App."},{"key":"1_CR85","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MPRV.2006.2","volume":"5","author":"R Want","year":"2006","unstructured":"Want, R.: An introduction to RFID technology. IEEE Pervas. Comput. 5, 25\u201333 (2006). https:\/\/doi.org\/10.1109\/MPRV.2006.2","journal-title":"IEEE Pervas. Comput."},{"key":"1_CR86","volume-title":"RFID","author":"SA Weis","year":"2007","unstructured":"Weis, S.A.: RFID. Radio Frequency IDentification, Principles and Applications (2007)"},{"key":"1_CR87","unstructured":"Wi-Fi Alliance: Discover Wi-Fi Direct (2023). https:\/\/www.wi-fi.org\/discover-wi-fi\/wi-fi-direct. Accessed Apr 2023"},{"key":"1_CR88","unstructured":"Wi-Fi Alliance: Discover Wi-Fi Easy Connect (2023). https:\/\/www.wi-fi.org\/discover-wi-fi\/wi-fi-easy-connect. Accessed Apr 2023"},{"key":"1_CR89","unstructured":"Wi-Fi Alliance: Wi-Fi Aware (2023). https:\/\/www.wi-fi.org\/discover-wi-fi\/wi-fi-aware. Accessed Apr 2023"},{"key":"1_CR90","unstructured":"Wikipedia: List of Bluetooth profiles (2022). https:\/\/en.wikipedia.org\/wiki\/List_of_Bluetooth_profiles. Accessed Apr 2023"},{"key":"1_CR91","unstructured":"Wikipedia: Internet traffic (2023). https:\/\/en.wikipedia.org\/wiki\/Internet_traffic. Accessed May 2023"},{"key":"1_CR92","unstructured":"Xiaomi Inc.: Mi Remote controller - for TV, STB, AC and more \u2013 Apps on Google Play (2022). https:\/\/play.google.com\/store\/apps\/details?id=com.duokan.phone.remotecontroller. Accessed Apr 2023"},{"key":"1_CR93","volume-title":"The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power","author":"S Zuboff","year":"2019","unstructured":"Zuboff, S.: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs, New York (2019)"}],"container-title":["Lecture Notes in Computer Science","Distributed Applications and Interoperable Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-95728-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T22:01:18Z","timestamp":1749938478000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-95728-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031957277","9783031957284"],"references-count":93,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-95728-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Distributed Applications and Interoperable Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lille","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dais2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.discotec.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}