{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T11:38:50Z","timestamp":1765280330336,"version":"3.37.3"},"reference-count":77,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T00:00:00Z","timestamp":1663632000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T00:00:00Z","timestamp":1663632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s11235-022-00954-7","type":"journal-article","created":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T10:13:31Z","timestamp":1663668811000},"page":"625-642","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Security aspects of device-to-device (D2D) networks in wireless communication: a comprehensive survey"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1298-628X","authenticated-orcid":false,"given":"Angshuman","family":"Khan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3713-2459","authenticated-orcid":false,"given":"Rupayan","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,20]]},"reference":[{"key":"954_CR1","doi-asserted-by":"publisher","unstructured":"Doppler, K., Ribeiro, C. B., & Kneckt, J. (2011). Advances in D2D communications: Energy efficient service and device discovery radio. In 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE) (pp. 1\u20136). https:\/\/doi.org\/10.1109\/WIRELESSVITAE.2011.5940857.","DOI":"10.1109\/WIRELESSVITAE.2011.5940857"},{"issue":"12","key":"954_CR2","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCOM.2009.5350367","volume":"47","author":"K Doppler","year":"2009","unstructured":"Doppler, K., Rinne, M., Wijting, C., Ribeiro, C. B., & Hugl, K. (2009). Device-to-device communication as an underlay to LTE-advanced networks. IEEE Communications Magazine, 47(12), 42\u201349. https:\/\/doi.org\/10.1109\/MCOM.2009.5350367","journal-title":"IEEE Communications Magazine"},{"key":"954_CR3","doi-asserted-by":"publisher","unstructured":"Li, Z., Moisio, M., Uusitalo, M. A., Lunden, P., Wijting, C., Moya, F. S., Yaver, A., & Venkatasubramanian, V. (2014). Overview on initial METIS D2D Concept. In 2014 1st international conference on 5G for ubiquitous connectivity (5GU) (203\u2013208). https:\/\/doi.org\/10.4108\/icst.5gu.2014.258096.","DOI":"10.4108\/icst.5gu.2014.258096"},{"key":"954_CR4","doi-asserted-by":"publisher","first-page":"6055","DOI":"10.1109\/ICC.2013.6655570","volume":"2013","author":"Y Chai","year":"2013","unstructured":"Chai, Y., Du, Q., & Ren, P. (2013). Partial time-frequency resource allocation for device-to-device communications underlaying cellular networks. IEEE International Conference on Communications (ICC), 2013, 6055\u20136059. https:\/\/doi.org\/10.1109\/ICC.2013.6655570","journal-title":"IEEE International Conference on Communications (ICC)"},{"issue":"10","key":"954_CR5","doi-asserted-by":"publisher","first-page":"4409","DOI":"10.1109\/TCOMM.2016.2601912","volume":"64","author":"KS Ali","year":"2016","unstructured":"Ali, K. S., ElSawy, H., & Alouini, M. (2016). Modeling cellular networks with full-duplex D2D communication: A Stochastic Geometry Approach. IEEE Transactions on Communications, 64(10), 4409\u20134424. https:\/\/doi.org\/10.1109\/TCOMM.2016.2601912","journal-title":"IEEE Transactions on Communications"},{"issue":"4","key":"954_CR6","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MCOM.2014.6807945","volume":"52","author":"X Lin","year":"2014","unstructured":"Lin, X., Andrews, J. G., Ghosh, A., & Ratasuk, R. (2014). An overview of 3GPP device-to-device proximity services. IEEE Communications Magazine, 52(4), 40\u201348. https:\/\/doi.org\/10.1109\/MCOM.2014.6807945","journal-title":"IEEE Communications Magazine"},{"issue":"4","key":"954_CR7","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2014.6807943","volume":"52","author":"S Andreev","year":"2014","unstructured":"Andreev, S., Pyattaev, A., Johnsson, K., Galinina, O., & Koucheryavy, Y. (2014). Cellular traffic offloading onto network-assisted device-to-device connections. IEEE Communications Magazine, 52(4), 20\u201331. https:\/\/doi.org\/10.1109\/MCOM.2014.6807943","journal-title":"IEEE Communications Magazine"},{"key":"954_CR8","doi-asserted-by":"publisher","first-page":"15717","DOI":"10.1109\/ACCESS.2017.2731805","volume":"5","author":"P Zhao","year":"2017","unstructured":"Zhao, P., Feng, L., Yu, P., Li, W., & Qiu, X. (2017). A social-aware resource allocation for 5G device-to-device multicast communication. IEEE Access, 5, 15717\u201315730. https:\/\/doi.org\/10.1109\/ACCESS.2017.2731805","journal-title":"IEEE Access"},{"issue":"3","key":"954_CR9","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MCOM.2016.7432168","volume":"54","author":"S-Y Lien","year":"2016","unstructured":"Lien, S.-Y., Chien, C.-C., Tseng, F.-M., & Ho, T.-C. (2016). 3GPP device-to-device communications for beyond 4G cellular networks. IEEE Communications Magazine, 54(3), 29\u201335. https:\/\/doi.org\/10.1109\/MCOM.2016.7432168","journal-title":"IEEE Communications Magazine"},{"issue":"8","key":"954_CR10","doi-asserted-by":"publisher","first-page":"4346","DOI":"10.1109\/TWC.2014.2320522","volume":"13","author":"X Lin","year":"2014","unstructured":"Lin, X., Ratasuk, R., Ghosh, A., & Andrews, J. G. (2014). Modeling, analysis, and optimization of multicast device-to-device transmissions. IEEE Transactions on Wireless Communications, 13(8), 4346\u20134359. https:\/\/doi.org\/10.1109\/TWC.2014.2320522","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"954_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICC.2016.7511330","volume":"2016","author":"I Pappalardo","year":"2016","unstructured":"Pappalardo, I., Quer, G., Rao, B. D., & Zorzi, M. (2016). Caching strategies in heterogeneous networks with D2D, small BS and macro BS communications. IEEE International Conference on Communications (ICC), 2016, 1\u20136. https:\/\/doi.org\/10.1109\/ICC.2016.7511330","journal-title":"IEEE International Conference on Communications (ICC)"},{"key":"954_CR12","doi-asserted-by":"publisher","unstructured":"Mumtaz, S., & Rodriguez, J. (2014). Introduction to D2D communication. In: Mumtaz, S., & Rodriguez, J. (Eds.) Smart device to smart device communication (pp. 1\u201322). Cham: Springer. https:\/\/doi.org\/10.1007\/978-3-319-04963-2_1.","DOI":"10.1007\/978-3-319-04963-2_1"},{"issue":"5","key":"954_CR13","doi-asserted-by":"publisher","first-page":"1222","DOI":"10.1109\/JSAC.2016.2545413","volume":"34","author":"M Gregori","year":"2016","unstructured":"Gregori, M., G\u00f3mez-Vilardeb\u00f3, J., Matamoros, J., & G\u00fcnd\u00fcz, D. (2016). Wireless content caching for small cell and D2D networks. IEEE Journal on Selected Areas in Communications, 34(5), 1222\u20131234. https:\/\/doi.org\/10.1109\/JSAC.2016.2545413","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"954_CR14","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MCOM.2014.6807948","volume":"52","author":"M Alam","year":"2014","unstructured":"Alam, M., Yang, D., Rodriguez, J., & Abd-alhameed, R. A. (2014). Secure device-to-device communication in LTE-A. IEEE Communications Magazine, 52(4), 66\u201373. https:\/\/doi.org\/10.1109\/MCOM.2014.6807948","journal-title":"IEEE Communications Magazine"},{"issue":"4","key":"954_CR15","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MWC.2016.7553029","volume":"23","author":"B Bai","year":"2016","unstructured":"Bai, B., Wang, L., Han, Z., Chen, W., & Svensson, T. (2016). Caching based socially-aware D2D communications in wireless content delivery networks: A hypergraph framework. IEEE Wireless Communications, 23(4), 74\u201381. https:\/\/doi.org\/10.1109\/MWC.2016.7553029","journal-title":"IEEE Wireless Communications"},{"key":"954_CR16","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11277-017-4168-5","volume":"96","author":"S Yu","year":"2017","unstructured":"Yu, S., Ejaz, W., Guan, L., et al. (2017). Resource allocation schemes in d2d communications: overview, classification, and challenges. Wireless Personal Communications, 96, 303\u2013322. https:\/\/doi.org\/10.1007\/s11277-017-4168-5","journal-title":"Wireless Personal Communications"},{"issue":"12","key":"954_CR17","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/MCOM.2016.1500670CM","volume":"54","author":"S-Y Lien","year":"2016","unstructured":"Lien, S.-Y., Chien, C.-C., Liu, G.S.-T., Tsai, H.-L., Li, R., & Wang, Y. J. (2016). Enhanced LTE device-to-device proximity services. IEEE Communications Magazine, 54(12), 174\u2013182. https:\/\/doi.org\/10.1109\/MCOM.2016.1500670CM","journal-title":"IEEE Communications Magazine"},{"issue":"4","key":"954_CR18","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.1109\/COMST.2014.2319555","volume":"16","author":"A Asadi","year":"2014","unstructured":"Asadi, A., Wang, Q., & Mancuso, V. (2014). A survey on Device-to-Device communication in cellular networks. IEEE Communications Surveys & Tutorials, 16(4), 1801\u20131819. https:\/\/doi.org\/10.1109\/COMST.2014.2319555","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"4","key":"954_CR19","doi-asserted-by":"publisher","first-page":"1923","DOI":"10.1109\/COMST.2014.2375934","volume":"17","author":"J Liu","year":"2015","unstructured":"Liu, J., Kato, N., Ma, J., & Kadowaki, N. (2015). Device-to-device communication in LTE-advanced networks: A survey. IEEE Communications Surveys & Tutorials, 17(4), 1923\u20131940. https:\/\/doi.org\/10.1109\/COMST.2014.2375934","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"954_CR20","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/GLOCOMW.2013.6825058","volume":"2013","author":"L Goratti","year":"2013","unstructured":"Goratti, L., Gomez, K. M., Fedrizzi, R., & Rasheed, T. (2013). A novel device-to-device communication protocol for public safety applications. IEEE Globecom Workshops (GC Wkshps), 2013, 629\u2013634. https:\/\/doi.org\/10.1109\/GLOCOMW.2013.6825058","journal-title":"IEEE Globecom Workshops (GC Wkshps)"},{"issue":"4","key":"954_CR21","doi-asserted-by":"publisher","first-page":"1885","DOI":"10.1109\/COMST.2015.2447036","volume":"17","author":"P Mach","year":"2015","unstructured":"Mach, P., Becvar, Z., & Vanek, T. (2015). In-Band device-to-device communication in OFDMA cellular networks: A survey and challenges. IEEE Communications Surveys & Tutorials, 17(4), 1885\u20131922. https:\/\/doi.org\/10.1109\/COMST.2015.2447036","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"954_CR22","doi-asserted-by":"publisher","first-page":"3288","DOI":"10.1109\/ACCESS.2016.2585188","volume":"4","author":"G Fodor","year":"2016","unstructured":"Fodor, G., Roger, S., Rajatheva, N., Slimane, S. B., Svensson, T., Popovski, P., Da Silva, J. M. B., & Ali, S. (2016). An overview of device-to-device communications technology components in METIS. IEEE Access, 4, 3288\u20133299. https:\/\/doi.org\/10.1109\/ACCESS.2016.2585188","journal-title":"IEEE Access"},{"key":"954_CR23","doi-asserted-by":"publisher","unstructured":"Rawat, P., Haddad, M., & Altman, E. (2015). Towards efficient disaster management: 5G and device to device communication. In 2015 2nd International conference on information and communication technologies for disaster management (ICT-DM) (pp. 79\u201387). https:\/\/doi.org\/10.1109\/ICT-DM.2015.7402056.","DOI":"10.1109\/ICT-DM.2015.7402056"},{"key":"954_CR24","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/ACCESS.2015.2461602","volume":"3","author":"A Gupta","year":"2015","unstructured":"Gupta, A., & Jha, R. K. (2015). A survey of 5G network: Architecture and emerging technologies. IEEE Access, 3, 1206\u20131232. https:\/\/doi.org\/10.1109\/ACCESS.2015.2461602","journal-title":"IEEE Access"},{"key":"954_CR25","doi-asserted-by":"publisher","first-page":"1414","DOI":"10.1109\/GLOCOMW.2014.7063632","volume":"2014","author":"W Sun","year":"2014","unstructured":"Sun, W., Str\u00f6m, E. G., Br\u00e4nnstr\u00f6m, F., Sui, Y., & Sou, K. C. (2014). D2D-based V2V communications with latency and reliability constraints. IEEE Globecom Workshops (GC Wkshps), 2014, 1414\u20131419. https:\/\/doi.org\/10.1109\/GLOCOMW.2014.7063632","journal-title":"IEEE Globecom Workshops (GC Wkshps)"},{"key":"954_CR26","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1109\/WCNC.2012.6214252","volume":"2012","author":"P Cheng","year":"2012","unstructured":"Cheng, P., Deng, L., Yu, H., Xu, Y., & Wang, H. (2012). Resource allocation for cognitive networks with D2D communication: An evolutionary approach. IEEE Wireless Communications and Networking Conference (WCNC), 2012, 2671\u20132676. https:\/\/doi.org\/10.1109\/WCNC.2012.6214252","journal-title":"IEEE Wireless Communications and Networking Conference (WCNC)"},{"issue":"7","key":"954_CR27","doi-asserted-by":"publisher","first-page":"3186","DOI":"10.1109\/TCOMM.2017.2699194","volume":"65","author":"L Liang","year":"2017","unstructured":"Liang, L., Li, G. Y., & Xu, W. (2017). Resource allocation for D2D-enabled vehicular communications. IEEE Transactions on Communications, 65(7), 3186\u20133197. https:\/\/doi.org\/10.1109\/TCOMM.2017.2699194","journal-title":"IEEE Transactions on Communications"},{"issue":"3","key":"954_CR28","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MNET.2017.1600081NM","volume":"31","author":"Y Meng","year":"2017","unstructured":"Meng, Y., Jiang, C., Chen, H.-H., & Ren, Y. (2017). Cooperative device-to-device communications: Social networking perspectives. IEEE Network, 31(3), 38\u201344. https:\/\/doi.org\/10.1109\/MNET.2017.1600081NM","journal-title":"IEEE Network"},{"key":"954_CR29","doi-asserted-by":"publisher","unstructured":"Abrardo, A., Fodor, G., & Tola, B. (2015). Network coding schemes for device-to-device communications based relaying for cellular coverage extension. In 2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (pp. 670\u2013674). https:\/\/doi.org\/10.1109\/SPAWC.2015.7227122.","DOI":"10.1109\/SPAWC.2015.7227122"},{"key":"954_CR30","doi-asserted-by":"publisher","unstructured":"Li, Z., Moisio, M., Uusitalo, M. A., Lund\u00e9n, P., Wijting, C., Moya, F. S., Yaver, A., & Venkatasubramanian, V. Overview on initial METIS D2D concept. In 1st International Conference on 5G for Ubiquitous Connectivity (pp. 203\u2013208). https:\/\/doi.org\/10.4108\/icst.5gu.2014.258096.","DOI":"10.4108\/icst.5gu.2014.258096"},{"key":"954_CR31","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/ICCW.2015.7247245","volume":"2015","author":"H Bagheri","year":"2015","unstructured":"Bagheri, H., Sartori, P., Desai, V., Classon, B., Al-Shalash, M., & Soong, A. (2015). Device-to-device proximity discovery for LTE systems. IEEE International Conference on Communication Workshop (ICCW), 2015, 591\u2013595. https:\/\/doi.org\/10.1109\/ICCW.2015.7247245","journal-title":"IEEE International Conference on Communication Workshop (ICCW)"},{"key":"954_CR32","doi-asserted-by":"publisher","unstructured":"Alkurd, R., Shubair, R. M., & Abualhaol, I. (2014). Survey on device-to-device communications: Challenges and design issues. In 2014 IEEE 12th International New Circuits and Systems Conference (NEWCAS) (pp. 361\u2013364). https:\/\/doi.org\/10.1109\/NEWCAS.2014.6934057.","DOI":"10.1109\/NEWCAS.2014.6934057"},{"key":"954_CR33","doi-asserted-by":"publisher","unstructured":"Safdar, G. A., Ur Rehman, M., & Chaudhry, M. A. R. (2022). Introduction to d2d communications. In Interference mitigation in device\u2010to\u2010device communications (pp. 1\u201312). Springer. https:\/\/doi.org\/10.1002\/9781119788829.ch1.","DOI":"10.1002\/9781119788829.ch1"},{"issue":"1","key":"954_CR34","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MVT.2012.2234052","volume":"8","author":"MJ Yang","year":"2013","unstructured":"Yang, M. J., Lim, S. Y., Park, H. J., & Park, N. H. (2013). Solving the data overload: Device-to-device bearer control architecture for cellular data offloading. IEEE Vehicular Technology Magazine, 8(1), 31\u201339. https:\/\/doi.org\/10.1109\/MVT.2012.2234052","journal-title":"IEEE Vehicular Technology Magazine"},{"key":"954_CR35","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.jnca.2016.04.021","volume":"71","author":"M Noura","year":"2016","unstructured":"Noura, M., & Nordin, R. (2016). A survey on interference management for device-to-device (D2D) communication and its challenges in 5G networks. Journal of Network and Computer Applications, 71, 130\u2013150. https:\/\/doi.org\/10.1016\/j.jnca.2016.04.021","journal-title":"Journal of Network and Computer Applications"},{"key":"954_CR36","doi-asserted-by":"publisher","unstructured":"Raghothaman, B., Deng, E., Pragada, R., Sternberg, G., Deng, T., & Vanganuru, K. (2013). Architecture and protocols for LTE-based device to device communication. In 2013 International Conference on Computing, Networking and Communications (ICNC) (pp. 895\u2013899). https:\/\/doi.org\/10.1109\/ICCNC.2013.6504208.","DOI":"10.1109\/ICCNC.2013.6504208"},{"issue":"5","key":"954_CR37","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MCOM.2014.6815897","volume":"52","author":"MN Tehrani","year":"2014","unstructured":"Tehrani, M. N., Uysal, M., & Yanikomeroglu, H. (2014). Device-to-device communication in 5G cellular networks: Challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), 86\u201392. https:\/\/doi.org\/10.1109\/MCOM.2014.6815897","journal-title":"IEEE Communications Magazine"},{"key":"954_CR38","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-017-0998-9","author":"K Zhou","year":"2017","unstructured":"Zhou, K., Gui, J., & Xiong, N. (2017). Improving cellular downlink throughput by multi-hop relay-assisted outband D2D communications. J Wireless Com Network. https:\/\/doi.org\/10.1186\/s13638-017-0998-9","journal-title":"J Wireless Com Network"},{"key":"954_CR39","doi-asserted-by":"publisher","unstructured":"R\u00eago, M. G. d. S., Maciel, T. F., Barros, H. d. H. M., Cavalcanti, F. R. P., & Fodor, G. (2012). Performance analysis of power control for device-to-device communication in cellular MIMO systems. In 2012 International Symposium on Wireless Communication Systems (ISWCS) (pp. 336\u2013340). https:\/\/doi.org\/10.1109\/ISWCS.2012.6328385.","DOI":"10.1109\/ISWCS.2012.6328385"},{"key":"954_CR40","doi-asserted-by":"publisher","unstructured":"Xing, H., & Hakola, S. (2010). The investigation of power control schemes for a device-to-device communication integrated into OFDMA cellular system. In 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (pp. 1775\u20131780) https:\/\/doi.org\/10.1109\/PIMRC.2010.5671643.","DOI":"10.1109\/PIMRC.2010.5671643"},{"issue":"3","key":"954_CR41","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1049\/iet-com.2014.0442","volume":"9","author":"X Cheng","year":"2015","unstructured":"Cheng, X., Li, Y., Ai, B., Yin, X., & Wang, Q. (2015). Device-to-device channel measurements and models: A survey. IET communications, 9(3), 312\u2013325. https:\/\/doi.org\/10.1049\/iet-com.2014.0442","journal-title":"IET communications"},{"issue":"9","key":"954_CR42","doi-asserted-by":"publisher","first-page":"1633","DOI":"10.1109\/LCOMM.2014.2344053","volume":"18","author":"K-W Kim","year":"2014","unstructured":"Kim, K.-W., & Oh, S.-J. (2014). An efficient implementation of the ITU-R channel model for device-to-device simulation. IEEE Communications Letters, 18(9), 1633\u20131636. https:\/\/doi.org\/10.1109\/LCOMM.2014.2344053","journal-title":"IEEE Communications Letters"},{"issue":"8","key":"954_CR43","doi-asserted-by":"publisher","first-page":"4247","DOI":"10.1109\/TWC.2014.2314115","volume":"13","author":"M Peng","year":"2014","unstructured":"Peng, M., Li, Y., Quek, T. Q. S., & Wang, C. (2014). Device-to-device underlaid cellular networks under rician fading channels. IEEE Transactions on Wireless Communications, 13(8), 4247\u20134259. https:\/\/doi.org\/10.1109\/TWC.2014.2314115","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"954_CR44","doi-asserted-by":"publisher","first-page":"1808","DOI":"10.1109\/APS.2015.7305293","volume":"2015","author":"Y Li","year":"2015","unstructured":"Li, Y., Ai, B., Wang, Q., Zhong, Z., & Michelson, D. G. (2015). Three-dimensional modeling, simulation and evaluation of Device-to-Device channels. IEEE International Symposium on Antennas and Propagation & USNC\/URSI National Radio Science Meeting, 2015, 1808\u20131809. https:\/\/doi.org\/10.1109\/APS.2015.7305293","journal-title":"IEEE International Symposium on Antennas and Propagation & USNC\/URSI National Radio Science Meeting"},{"issue":"4","key":"954_CR45","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MCOM.2014.6807946","volume":"52","author":"D Feng","year":"2014","unstructured":"Feng, D., Lu, L., Yuan-Wu, Y., Li, G. Y., Li, S., & Feng, G. (2014). Device-to-device communications in cellular networks. IEEE Communications Magazine, 52(4), 49\u201355. https:\/\/doi.org\/10.1109\/MCOM.2014.6807946","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"954_CR46","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/MCOM.2012.6163598","volume":"50","author":"G Fodor","year":"2012","unstructured":"Fodor, G., Dahlman, E., Mildh, G., Parkvall, S., Reider, N., Mikl\u00f3s, G., & Tur\u00e1nyi, Z. (2012). Design aspects of network assisted device-to-device communications. IEEE Communications Magazine, 50(3), 170\u2013177. https:\/\/doi.org\/10.1109\/MCOM.2012.6163598","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"954_CR47","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MWC.2012.6231164","volume":"19","author":"L Lei","year":"2012","unstructured":"Lei, L., Zhong, Z., Lin, C., & Shen, X. (2012). Operator controlled device-to-device communications in LTE-advanced networks. IEEE Wireless Communications, 19(3), 96\u2013104. https:\/\/doi.org\/10.1109\/MWC.2012.6231164","journal-title":"IEEE Wireless Communications"},{"key":"954_CR48","doi-asserted-by":"publisher","unstructured":"Hong, J., Park, S., Kim, H., Choi, S., & Lee, K. B. (2013). Analysis of Device-to-Device discovery and link setup in LTE networks. In 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) (pp. 2856\u20132860) https:\/\/doi.org\/10.1109\/PIMRC.2013.6666634.","DOI":"10.1109\/PIMRC.2013.6666634"},{"key":"954_CR49","doi-asserted-by":"publisher","first-page":"1510","DOI":"10.1109\/ACCESS.2014.2379938","volume":"2","author":"G Fodor","year":"2014","unstructured":"Fodor, G., Parkvall, S., Sorrentino, S., Wallentin, P., Lu, Q., & Brahmi, N. (2014). Device-to-device communications for national security and public safety. IEEE Access, 2, 1510\u20131520. https:\/\/doi.org\/10.1109\/ACCESS.2014.2379938","journal-title":"IEEE Access"},{"issue":"2","key":"954_CR50","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s11036-016-0741-5","volume":"22","author":"M Wang","year":"2017","unstructured":"Wang, M., & Yan, Z. (2017). A survey on security in D2D communications. Mobile Networks and Applications, 22(2), 195\u2013208. https:\/\/doi.org\/10.1007\/s11036-016-0741-5","journal-title":"Mobile Networks and Applications"},{"key":"954_CR51","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.jnca.2016.11.002","volume":"78","author":"P Gandotra","year":"2017","unstructured":"Gandotra, P., Jha, R. K., & Jain, S. (2017). A survey on device-to-device (D2D) communication: Architecture and security issues. Journal of Network and Computer Applications, 78, 9\u201329. https:\/\/doi.org\/10.1016\/j.jnca.2016.11.002","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"954_CR52","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1049\/iet-net.2017.0119","volume":"7","author":"ON Hamoud","year":"2018","unstructured":"Hamoud, O. N., Kenaza, T., & Challal, Y. (2018). Security in device-to-device communications: A survey. IET Networks, 7(1), 14\u201322. https:\/\/doi.org\/10.1049\/iet-net.2017.0119","journal-title":"IET Networks"},{"key":"954_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2020.102403","volume":"114","author":"C Suraci","year":"2021","unstructured":"Suraci, C., Pizzi, S., Garompolo, D., Araniti, G., Molinaro, A., & Iera, A. (2021). Trusted and secured D2D-aided communications in 5G networks. Ad Hoc Networks, 114, 1. https:\/\/doi.org\/10.1016\/j.adhoc.2020.102403","journal-title":"Ad Hoc Networks"},{"key":"954_CR54","doi-asserted-by":"publisher","unstructured":"Chow, M. C., & Ma, M. (2022). Secure d2d in 5G cellular networks: architecture, requirements and solution. In Advances in Computing, Informatics, Networking and Cybersecurity. Lecture Notes in Networks and Systems (Vol. 289, pp. 583\u2013616). Cham: Springer. https:\/\/doi.org\/10.1007\/978-3-030-87049-2_20.","DOI":"10.1007\/978-3-030-87049-2_20"},{"key":"954_CR55","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.comcom.2021.01.010","volume":"169","author":"GS Gaba","year":"2021","unstructured":"Gaba, G. S., Kumar, G., Kim, T.-H., Monga, H., & Kumar, P. (2021). Secure device-to-device communications for 5g enabled internet of things applications. Computer Communications, 169, 114\u2013128. https:\/\/doi.org\/10.1016\/j.comcom.2021.01.010","journal-title":"Computer Communications"},{"issue":"2","key":"954_CR56","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MCOM.001.1900089","volume":"58","author":"N Saxena","year":"2020","unstructured":"Saxena, N., Kumbhar, F. H., & Roy, A. (2020). Exploiting Social Relationships for Trustworthy D2D Relay in 5G Cellular Networks. IEEE Communications Magazine, 58(2), 48\u201353. https:\/\/doi.org\/10.1109\/MCOM.001.1900089","journal-title":"IEEE Communications Magazine"},{"key":"954_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2020.102275","volume":"108","author":"S Basak","year":"2020","unstructured":"Basak, S., & Acharya, T. (2020). On energy efficient secure routing in multi-hop underlay D2D communications for IoT applications. Ad Hoc Networks, 108, 1. https:\/\/doi.org\/10.1016\/j.adhoc.2020.102275","journal-title":"Ad Hoc Networks"},{"key":"954_CR58","doi-asserted-by":"publisher","first-page":"53575","DOI":"10.1109\/ACCESS.2020.2979848","volume":"8","author":"MH Khoshafa","year":"2020","unstructured":"Khoshafa, M. H., Ngatched, T. M. N., Ahmed, M. H., & Ibrahim, A. (2020). Improving physical layer security of cellular networks using full-duplex jamming relay-aided D2D communications. IEEE Access, 8, 53575\u201353586. https:\/\/doi.org\/10.1109\/ACCESS.2020.2979848","journal-title":"IEEE Access"},{"key":"954_CR59","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.ins.2019.06.067","volume":"503","author":"L Wang","year":"2019","unstructured":"Wang, L., Tian, Y., Zhang, D., & Lu, Y. (2019). Constant-round authenticated and dynamic group key agreement protocol for D2D group communications. Information Sciences, 503, 61\u201371. https:\/\/doi.org\/10.1016\/j.ins.2019.06.067","journal-title":"Information Sciences"},{"key":"954_CR60","doi-asserted-by":"publisher","unstructured":"Wang, M., Yan, Z., Song, B., & Atiquzzaman, M. (2019) AAKA-D2D: anonymous authentication and key agreement protocol in D2D communications. In 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI) (pp. 1356\u20131362). https:\/\/doi.org\/10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00248.","DOI":"10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00248"},{"issue":"7","key":"954_CR61","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1109\/JSAC.2018.2825658","volume":"36","author":"X Chen","year":"2018","unstructured":"Chen, X., Zhao, Y., Li, Y., Chen, X., Ge, N., & Chen, S. (2018). Social trust aided D2D communications: Performance bound and implementation mechanism. IEEE Journal on Selected Areas in Communications, 36(7), 1593\u20131608. https:\/\/doi.org\/10.1109\/JSAC.2018.2825658","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"954_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MoWNet.2018.8428890","volume":"2018","author":"M Cao","year":"2018","unstructured":"Cao, M., Chen, D., Yuan, Z., Qin, Z., & Lou, C. (2018). A lightweight key distribution scheme for secure D2D communication. International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT), 2018, 1\u20138. https:\/\/doi.org\/10.1109\/MoWNet.2018.8428890","journal-title":"International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)"},{"issue":"3","key":"954_CR63","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TIFS.2016.2631950","volume":"12","author":"A Zhang","year":"2017","unstructured":"Zhang, A., Wang, L., Ye, X., & Lin, X. (2017). Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems. IEEE Transactions on Information Forensics and Security, 12(3), 662\u2013675. https:\/\/doi.org\/10.1109\/TIFS.2016.2631950","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"954_CR64","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1109\/TCOMM.2015.2498171","volume":"64","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Wang, L., Raza Zaidi, S. A., Elkashlan, M., & Duong, T. Q. (2016). Secure D2D communication in large-scale cognitive cellular networks: A wireless power transfer model. IEEE Transactions on Communications, 64(1), 329\u2013342. https:\/\/doi.org\/10.1109\/TCOMM.2015.2498171","journal-title":"IEEE Transactions on Communications"},{"issue":"4","key":"954_CR65","doi-asserted-by":"publisher","first-page":"2659","DOI":"10.1109\/TVT.2015.2416002","volume":"65","author":"A Zhang","year":"2016","unstructured":"Zhang, A., Chen, J., Hu, R. Q., & Qian, Y. (2016). SeDS: Secure data sharing strategy for D2D communication in LTE-Advanced networks. IEEE Transactions on Vehicular Technology, 65(4), 2659\u20132672. https:\/\/doi.org\/10.1109\/TVT.2015.2416002","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"954_CR66","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/j.comnet.2016.03.013","volume":"107","author":"A Ometov","year":"2016","unstructured":"Ometov, A., Orsino, A., Militano, L., Araniti, G., Moltchanov, D., & Andreev, S. (2016). A novel security-centric framework for D2D connectivity based on spatial and social proximity. Computer Networks, 107, 327\u2013338. https:\/\/doi.org\/10.1016\/j.comnet.2016.03.013","journal-title":"Computer Networks"},{"key":"954_CR67","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/GLOCOM.2015.7417724","volume":"2015","author":"R Zhang","year":"2015","unstructured":"Zhang, R., Cheng, X., & Yang, L. (2015). Cooperation via spectrum sharing for physical layer security in device-to-device communications underlaying cellular networks. IEEE Global Communications Conference (GLOBECOM), 2015, 1\u20136. https:\/\/doi.org\/10.1109\/GLOCOM.2015.7417724","journal-title":"IEEE Global Communications Conference (GLOBECOM)"},{"key":"954_CR68","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1109\/ICCW.2015.7247255","volume":"2015","author":"K Jayasinghe","year":"2015","unstructured":"Jayasinghe, K., Jayasinghe, P., Rajatheva, N., & Latva-aho, M. (2015). Physical layer security for relay assisted MIMO D2D communication. IEEE International Conference on Communication Workshop (ICCW), 2015, 651\u2013656. https:\/\/doi.org\/10.1109\/ICCW.2015.7247255","journal-title":"IEEE International Conference on Communication Workshop (ICCW)"},{"key":"954_CR69","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1109\/GLOCOM.2014.7036830","volume":"2014","author":"W Shen","year":"2014","unstructured":"Shen, W., Hong, W., Cao, X., Yin, B., Shila, D. M., & Cheng, Y. (2014). Secure key establishment for Device-to-Device communications. IEEE Global Communications Conference, 2014, 336\u2013340. https:\/\/doi.org\/10.1109\/GLOCOM.2014.7036830","journal-title":"IEEE Global Communications Conference"},{"key":"954_CR70","doi-asserted-by":"publisher","first-page":"2319","DOI":"10.1109\/ICC.2014.6883669","volume":"2014","author":"H Zhang","year":"2014","unstructured":"Zhang, H., Wang, T., Song, L., & Han, Z. (2014). Radio resource allocation for physical-layer security in D2D underlay communications. IEEE International Conference on Communications (ICC), 2014, 2319\u20132324. https:\/\/doi.org\/10.1109\/ICC.2014.6883669","journal-title":"IEEE International Conference on Communications (ICC)"},{"key":"954_CR71","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/WCSP.2013.6677244","volume":"1","author":"J Yue","year":"2013","unstructured":"Yue, J., Ma, C., Yu, H., Yang, Z., & Gan, X. (2013). Secrecy-based channel assignment for device-to-device communication: An auction approach. International Conference on Wireless Communications and Signal Processing, 1, 1\u20136. https:\/\/doi.org\/10.1109\/WCSP.2013.6677244","journal-title":"International Conference on Wireless Communications and Signal Processing"},{"key":"954_CR72","doi-asserted-by":"publisher","first-page":"5047","DOI":"10.1007\/s11042-020-09799-1","volume":"80","author":"A Hussein","year":"2021","unstructured":"Hussein, A., El-Rabaie, S., & El-Mashed, M. G. (2021). Proactive discovery protocol with security enhancement for D2D communication system. Multimed Tools Appl, 80, 5047\u20135066. https:\/\/doi.org\/10.1007\/s11042-020-09799-1","journal-title":"Multimed Tools Appl"},{"key":"954_CR73","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comnet.2020.107192","volume":"178","author":"APG Lopes","year":"2020","unstructured":"Lopes, A. P. G., & Gondim, P. R. L. (2020). Group authentication protocol based on aggregated signatures for D2D communication. Computer Networks, 178, 1. https:\/\/doi.org\/10.1016\/j.comnet.2020.107192","journal-title":"Computer Networks"},{"issue":"5","key":"954_CR74","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/fi11050108","volume":"11","author":"A Abro","year":"2019","unstructured":"Abro, A., Deng, Z., & Memon, K. A. (2019). A lightweight elliptic-Elgamal-based authentication scheme for secure device-to-device communication. Future Internet, 11(5), 1. https:\/\/doi.org\/10.3390\/fi11050108","journal-title":"Future Internet"},{"issue":"8","key":"954_CR75","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/sym11080969","volume":"11","author":"H Tan","year":"2019","unstructured":"Tan, H., Song, Y., Xuan, S., Pan, S., & Chung, I. (2019). Secure D2D group authentication employing smartphone sensor behavior analysis. Symmetry, 11(8), 1. https:\/\/doi.org\/10.3390\/sym11080969","journal-title":"Symmetry"},{"key":"954_CR76","doi-asserted-by":"publisher","unstructured":"Sun, Y., Cao, J., Ma, M., Li, H., Niu, B., & Li, F. (2019). Privacy-preserving device discovery and authentication scheme for D2D communication in 3GPP 5G HetNet. In International Conference on Computing, Networking and Communications (ICNC) (pp. 425\u2013431). https:\/\/doi.org\/10.1109\/ICCNC.2019.8685499.","DOI":"10.1109\/ICCNC.2019.8685499"},{"issue":"1","key":"954_CR77","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/COMST.2019.2951818","volume":"22","author":"J Cao","year":"2020","unstructured":"Cao, J., Ma, M., Li, H., Ma, R., Sun, Y., Yu, P., & Xiong, L. (2020). A survey on security aspects for 3GPP 5G networks. IEEE Communications Surveys & Tutorials, 22(1), 170\u2013195. https:\/\/doi.org\/10.1109\/COMST.2019.2951818","journal-title":"IEEE Communications Surveys & Tutorials"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-022-00954-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-022-00954-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-022-00954-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T05:20:05Z","timestamp":1667884805000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-022-00954-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,20]]},"references-count":77,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["954"],"URL":"https:\/\/doi.org\/10.1007\/s11235-022-00954-7","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"type":"print","value":"1018-4864"},{"type":"electronic","value":"1572-9451"}],"subject":[],"published":{"date-parts":[[2022,9,20]]},"assertion":[{"value":"24 August 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"All data generated or analyzed during this study are included in this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Availability of data"}},{"value":"No code is used to this study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}