{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T16:11:33Z","timestamp":1778947893440,"version":"3.51.4"},"reference-count":91,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2020,10,24]],"date-time":"2020-10-24T00:00:00Z","timestamp":1603497600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Device-to-device (D2D) communication produces a new dimension in the mobile environment, easing the data exchange process between physically neighboring devices. To achieve an effective utilization of available resources, reduce latency, improve data rates, and increase system capacity, D2D communication utilizes nearby communicating devices. The mobile operator\u2019s action to collect the short-range communications for maintenance of the proximity-based services and improve the performance of networks drives the development of D2D. This paper presents an extensive review of proposed solutions aiming to enhance the security in D2D communication. The main goal of the research is to present an extensive review of the recent advances in various D2D domains such as the discovery process, mode selection schemes, interference management, power control techniques and finally the mode selection for D2D applications for 5G technologies. Additionally, we highlight the open problems and identify the challenges with regard to the D2D communication problem.<\/jats:p>","DOI":"10.3390\/sym12111762","type":"journal-article","created":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T03:51:47Z","timestamp":1603684307000},"page":"1762","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":65,"title":["Device-To-Device Communication in 5G Environment: Issues, Solutions, and Challenges"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0771-4597","authenticated-orcid":false,"given":"Mohd Hirzi","family":"Adnan","sequence":"first","affiliation":[{"name":"Faculty of Computer Science and Information Technology, University Putra Malaysia, Seri Kembangan 43400, Malaysia"},{"name":"Department of Information Security, Faculty of Computer Science and Information Technology, University Putra Malaysia, Seri Kembangan 43400, Malaysia"}]},{"given":"Zuriati","family":"Ahmad Zukarnain","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Information Technology, University Putra Malaysia, Seri Kembangan 43400, Malaysia"}]}],"member":"1968","published-online":{"date-parts":[[2020,10,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1054","DOI":"10.1109\/COMST.2017.2649687","article-title":"Security and privacy in device-to-device (D2D) communication: A review","volume":"19","author":"Haus","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_2","unstructured":"(2016, June 02). Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2015\u20132020. Available online: http:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/mobile-white-paper-c11-520862.html."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.comcom.2020.01.034","article-title":"Machine learning based code dissemination by selection of reliability mobile vehicles in 5G networks","volume":"152","author":"Li","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_4","first-page":"1","article-title":"A novel load balancing and low response delay framework for edge-cloud network based on SDN","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"3970","DOI":"10.1109\/JSYST.2017.2773633","article-title":"5G D2D networks: Techniques, challenges, and future prospects","volume":"12","author":"Ansari","year":"2018","journal-title":"IEEE Syst. J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/s11036-016-0741-5","article-title":"A survey on security in D2D communications","volume":"22","author":"Wang","year":"2016","journal-title":"Mob. Netw. Appl."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.jpdc.2019.08.012","article-title":"Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks","volume":"135","author":"Liu","year":"2020","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1801","DOI":"10.1109\/COMST.2014.2319555","article-title":"A survey on Device-to-Device communication in cellular networks","volume":"16","author":"Asadi","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_9","first-page":"2","article-title":"On Device-to-Device (D2D) communication [Editor\u2019s note]","volume":"30","author":"Kato","year":"2016","journal-title":"IEEE Netw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2133","DOI":"10.1109\/COMST.2018.2828120","article-title":"A survey of Device-to-Device communications: Research issues and challenges","volume":"20","author":"Jameel","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.jnca.2016.04.021","article-title":"A survey on interference management for Device-to-Device (D2D) communication and its challenges in 5G networks","volume":"71","author":"Noura","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.jnca.2016.06.004","article-title":"Device-to-Device communication in cellular networks: A survey","volume":"71","author":"Gandotra","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1109\/TCOMM.2018.2865930","article-title":"Mode selection and spectrum partition for D2D inband communications: A physical layer security perspective","volume":"67","author":"Zhang","year":"2018","journal-title":"IEEE Trans. Commun."},{"key":"ref_14","first-page":"102","article-title":"Priority-Based device discovery in public safety D2D networks with full duplexing","volume":"Volume 272","author":"Chang","year":"2019","journal-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/MWC.2018.1700274","article-title":"Secure Social Networks in 5G Systems with mobile edge computing, caching, and Device-to-Device communications","volume":"25","author":"He","year":"2018","journal-title":"IEEE Wirel. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"131114","DOI":"10.1109\/ACCESS.2019.2941138","article-title":"Device discovery in D2D communication: A survey","volume":"7","author":"Hayat","year":"2019","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.comnet.2016.12.004","article-title":"Opportunistic network coding based cooperative retransmissions in D2D communications","volume":"113","author":"Yan","year":"2017","journal-title":"Comput. Netw."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"11404","DOI":"10.1109\/TVT.2017.2727078","article-title":"Novel Device-to-Device discovery scheme based on random backoff in LTE-advanced networks","volume":"66","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"8059","DOI":"10.1109\/TVT.2017.2690238","article-title":"VANET aided D2D discovery: Delay analysis and performance","volume":"66","author":"Chour","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2443","DOI":"10.1109\/TWC.2018.2796553","article-title":"Asynchronous device detection for cognitive Device-to-Device communications","volume":"17","author":"Li","year":"2018","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"5069","DOI":"10.1109\/TVT.2018.2832223","article-title":"ROOMMATEs: An unsupervised indoor peer discovery approach for LTE D2D communications","volume":"67","author":"Nguyen","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.comnet.2019.01.015","article-title":"Enhancing Device-to-Device direct discovery based on predicted user density patterns","volume":"151","author":"Hammami","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Long, Y., Yamamoto, R., Yamazaki, T., and Tanaka, Y. A deep learning based social-aware D2D peer discovery mechanism. Proceedings of the 2019 21st International Conference on Advanced Communication Technology (ICACT), PyeongChang, Kwangwoon_Do, Korea, 17\u201320 February 2019.","DOI":"10.23919\/ICACT.2019.8701911"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2716","DOI":"10.1109\/JSYST.2019.2899922","article-title":"Energy-efficient device discovery in D2D cellular networks for public safety scenario","volume":"13","author":"Kaleem","year":"2019","journal-title":"IEEE Syst. J."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Jaffry, S., Zaidi, S.K., Shah, S.T., Hasan, S.F., and Gui, X. D2D Neighborhood Discovery by a Mobile Device. Proceedings of the ICC 2019\u20132019 IEEE International Conference on Communications (ICC), Shanghai, China, 20\u201324 May 2019.","DOI":"10.1109\/ICC.2019.8761940"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Sun, Y., Cao, J., Ma, M., Li, H., Niu, B., and Li, F. Privacy-preserving device discovery and authentication scheme for D2D communication in 3GPP 5G HetNet. Proceedings of the 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 18\u201321 February 2019.","DOI":"10.1109\/ICCNC.2019.8685499"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/s11036-019-01289-5","article-title":"Full-duplex enabled time-efficient device discovery for public safety communications","volume":"25","author":"Kaleem","year":"2019","journal-title":"Mob. Netw. Appl."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Masood, A., Sharma, N., Alam, M.M., Le Moullec, Y., Scazzoli, D., Reggiani, L., Magarini, M., and Ahmad, R. Device-to-Device discovery and localization assisted by UAVs in pervasive public safety networks. Proceedings of the ACM MobiHoc Workshop on Innovative Aerial Communication Solutions for FIrst REsponders Network in Emergency Scenarios-iFIRE \u201919, Catania, Italy, 2\u20135 July 2019.","DOI":"10.1145\/3331053.3335031"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1007\/s13369-019-04006-2","article-title":"Performance analysis of device discovery algorithms for D2D communication","volume":"45","author":"Hayat","year":"2019","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_30","first-page":"1","article-title":"Device-to-Device communication in LTE-advanced networks: A survey","volume":"17","author":"Liu","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1109\/TWC.2016.2625255","article-title":"Interference-constrained pricing for D2D networks","volume":"16","author":"Liu","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s41650-017-0026-6","article-title":"Qos-aware interference management for vehicular D2D relay networks","volume":"2","author":"Yang","year":"2017","journal-title":"J. Commun. Inf. Netw."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"22735","DOI":"10.1109\/ACCESS.2017.2760350","article-title":"Resource allocation and interference management for D2D-enabled DL\/UL decoupled Het-Nets","volume":"5","author":"Celik","year":"2017","journal-title":"In IEEE Access"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3270","DOI":"10.1109\/ACCESS.2018.2789423","article-title":"Interference graph based channel assignment algorithm for D2D cellular networks","volume":"6","author":"Zhao","year":"2018","journal-title":"In IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"2091","DOI":"10.1109\/TMC.2018.2871073","article-title":"Interference management in D2D-enabled heterogeneous cellular networks using matching theory","volume":"18","author":"Shamaei","year":"2018","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"7856","DOI":"10.1109\/TCOMM.2019.2931319","article-title":"A framework of topological interference management and clustering for D2D networks","volume":"67","author":"Doumiati","year":"2019","journal-title":"IEEE Trans. Commun."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"950","DOI":"10.1109\/TMC.2016.2582169","article-title":"Empowering Device-to-Device networks with cross-link interference management","volume":"16","author":"Chiu","year":"2017","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TWC.2015.2408326","article-title":"Distributed random access scheme for collision avoidance in cellular Device-to-Device communication","volume":"14","author":"Zihan","year":"2015","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"8767","DOI":"10.1109\/TVT.2015.2505715","article-title":"Two birds with one stone: Towards secure and interference-free D2D transmissions via constellation rotation","volume":"65","author":"Sun","year":"2015","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.dcan.2016.09.007","article-title":"Radio resource management scheme and outage analysis for network-assisted multi-hop D2D communications","volume":"2","author":"Melki","year":"2016","journal-title":"Digit. Commun. Netw."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"7506","DOI":"10.1109\/TVT.2017.2657791","article-title":"Graph coloring based resource sharing (GCRS) scheme for D2D communications underlaying full-duplex cellular networks","volume":"66","author":"Yang","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.pmcj.2018.10.005","article-title":"Interference management for D2D communications in heterogeneous cellular networks","volume":"51","author":"Xu","year":"2018","journal-title":"Pervasive Mob. Comput."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"8582","DOI":"10.1109\/TVT.2018.2853602","article-title":"Uplink interference coordination management with power control for D2D underlaying cellular networks: Modeling, algorithms, and analysis","volume":"67","author":"Sun","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_44","first-page":"1","article-title":"Guard zone based interference management for D2D-aided underlaying cellular networks","volume":"66","author":"Lv","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1109\/TCOMM.2015.2507574","article-title":"Beamforming and interference cancellation for D2D communication underlaying cellular networks","volume":"64","author":"Ni","year":"2015","journal-title":"IEEE Trans. Commun."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"7005","DOI":"10.1109\/TWC.2016.2594225","article-title":"Iunius: A cross-layer peer-to-peer system with Device-to-Device communications","volume":"15","author":"Wu","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1006","DOI":"10.1109\/TNSM.2018.2848595","article-title":"Green NOMA with multiple interference cancellation (MIC) using sector-based resource allocation","volume":"15","author":"Gandotra","year":"2018","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/CC.2018.8331994","article-title":"Beamforming and interference cancellation for D2D communication assisted by two-way decode-and-forward relay node","volume":"15","author":"Ni","year":"2018","journal-title":"China Commun."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"3507","DOI":"10.1109\/TWC.2017.2683479","article-title":"D2D-U: Device-to-Device communications in unlicensed bands for 5G system","volume":"16","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"5766","DOI":"10.1109\/TVT.2017.2789022","article-title":"Optimization-based access assignment scheme for physical-layer security in D2D communications underlaying a cellular network","volume":"67","author":"Wang","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"51140","DOI":"10.1109\/ACCESS.2018.2869575","article-title":"D2D data privacy protection mechanism based on reliability and homomorphic encryption","volume":"6","author":"Jin","year":"2018","journal-title":"IEEE Access"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"3637","DOI":"10.1109\/TII.2017.2778090","article-title":"Privacy-preserving authentication and key agreement protocols for D2D group communications","volume":"14","author":"Wang","year":"2017","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"3918","DOI":"10.1109\/TWC.2018.2817607","article-title":"Social-aware secret key generation for secure Device-to-device communication via trusted and non-trusted relays","volume":"17","author":"Waqas","year":"2018","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.ins.2019.06.067","article-title":"Constant-round authenticated and dynamic group key agreement protocol for D2D group communications","volume":"503","author":"Wang","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.jnca.2017.10.017","article-title":"Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes","volume":"101","author":"Ferrag","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"33759","DOI":"10.1109\/ACCESS.2019.2900727","article-title":"Sec-D2D: A secure and lightweight D2D communication system with multiple sensors","volume":"7","author":"Cao","year":"2019","journal-title":"IEEE Access"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1109\/TIFS.2017.2756567","article-title":"GRAAD: Group anonymous and accountable D2D communication in mobile networks","volume":"13","author":"Hsu","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1109\/TVT.2019.2950221","article-title":"Joint transaction relaying and block verification optimization for blockchain empowered D2D communication","volume":"69","author":"Jiang","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"1205","DOI":"10.1109\/TWC.2016.2641959","article-title":"Distributed interference and energy-aware power control for ultra-dense D2D networks: A mean field game","volume":"16","author":"Yang","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1109\/TWC.2016.2645210","article-title":"Power control for D2D underlay cellular networks with channel uncertainty","volume":"16","author":"Memmi","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/LCOMM.2016.2597236","article-title":"Pilot allocation and power control in D2D underlay massive MIMO systems","volume":"21","author":"Xu","year":"2017","journal-title":"IEEE Commun. Lett."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TWC.2017.2671863","article-title":"Energy-saving resource management for D2D and cellular coexisting networks enhanced by hybrid multiple access technologies","volume":"16","author":"Zhai","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.comnet.2018.01.017","article-title":"Joint channel allocation and power control based on PSO for cellular networks with D2D communications","volume":"133","author":"Xu","year":"2018","journal-title":"Comput. Netw."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1109\/LWC.2019.2916352","article-title":"Adaptive power control for D2D communications in downlink SWIPT networks with partial CSI","volume":"8","author":"Lim","year":"2019","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1016\/j.comnet.2018.12.007","article-title":"Energy-efficient resource block assignment and power control for underlay Device-to-Device communications in multi-cell networks","volume":"149","author":"Gao","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Wang, H., Ding, G., Wang, J., Wang, S., and Wang, L. Power control for multiple interfering D2D communications underlaying cellular networks: An approximate interior point approach. Proceedings of the 2017 IEEE International Conference on Communications Workshops (ICC Workshops), Paris, France, 21\u201325 May 2017.","DOI":"10.1109\/ICCW.2017.7962846"},{"key":"ref_67","first-page":"1","article-title":"Distributed power allocation for D2D communications underlaying\/overlaying OFDMA cellular networks","volume":"16","author":"Abrardo","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"3217","DOI":"10.1109\/TCOMM.2018.2812731","article-title":"Power control and channel allocation for D2D underlaid cellular networks","volume":"66","author":"Abdallah","year":"2018","journal-title":"IEEE Trans. Commun."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1049\/iet-gtd.2016.0772","article-title":"Economic scheduling model of microgrid considering the lifetime of batteries","volume":"11","author":"Liu","year":"2017","journal-title":"IET Gener. Transm. Distrib."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1016\/j.rser.2017.05.127","article-title":"A review of stochastic battery models and health management","volume":"80","author":"Tao","year":"2017","journal-title":"Renew. Sustain. Energy Rev."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1109\/JCN.2016.000082","article-title":"Energy-efficient power control for underlaying D2D communication with channel uncertainty: User-centric versus network-centric","volume":"18","author":"Ding","year":"2016","journal-title":"J. Commun. Netw."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1109\/LCOMM.2016.2617863","article-title":"Joint mode selection and resource allocation for relay-based D2D communications","volume":"21","author":"Hoang","year":"2016","journal-title":"IEEE Commun. Lett."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"1120","DOI":"10.1109\/TWC.2016.2639017","article-title":"Joint mode selection and interference management in Device-to-Device communications underlaid MIMO cellular networks","volume":"16","author":"Chou","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/CC.2018.8438276","article-title":"Social-aware joint mode selection and link allocation for device-to-device communication underlaying cellular networks","volume":"15","author":"Yang","year":"2018","journal-title":"China Commun."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"60045","DOI":"10.1109\/ACCESS.2018.2874815","article-title":"A distributed mode selection approach based on evolutionary game for Device-to-Device communications","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Access"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"142715","DOI":"10.1109\/ACCESS.2019.2944403","article-title":"Analysis of joint relay selection and resource allocation scheme for relay-aided D2D communication networks","volume":"7","author":"Tian","year":"2019","journal-title":"IEEE Access"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"4949","DOI":"10.1109\/TVT.2019.2900176","article-title":"An SINR-aware joint mode selection, scheduling, and resource allocation scheme for D2D communications","volume":"68","author":"Bithas","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1109\/LWC.2018.2836446","article-title":"Optimal content sharing mode selection for social-aware D2D communications","volume":"7","author":"Wu","year":"2018","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1109\/TWC.2017.2773616","article-title":"Rate adaptation, scheduling, and mode selection in D2D systems with partial channel knowledge","volume":"17","author":"Bulusu","year":"2018","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"6524","DOI":"10.1109\/TVT.2019.2913987","article-title":"Capacity maximization based on optimal mode selection in multi-mode and multi-pair D2D communications","volume":"68","author":"Chen","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"6721","DOI":"10.1109\/TVT.2019.2916395","article-title":"Joint mode selection and resource allocation for D2D-enabled NOMA cellular networks","volume":"68","author":"Dai","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"57298","DOI":"10.1109\/ACCESS.2019.2913538","article-title":"Optimal mode selection for full-duplex enabled D2D cognitive networks","volume":"7","author":"Haider","year":"2019","journal-title":"IEEE Access"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"700","DOI":"10.14419\/ijet.v7i2.29.14001","article-title":"Cooperative GPS and neighbors awareness based device discovery for D2D communication in in-band cellular networks","volume":"7","author":"Hayat","year":"2018","journal-title":"Int. J. Eng. Technol."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.comnet.2016.06.010","article-title":"5G roadmap: 10 key enabling technologies","volume":"106","author":"Akyildiz","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MIM.2015.7108393","article-title":"5G cellular: Key enabling technologies and research challenges","volume":"18","author":"Hossain","year":"2015","journal-title":"IEEE Instrum. Meas. Mag."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Wen, S., Zhu, X., Lin, Y., Lin, Z., Zhang, X., and Yang, D. Achievable transmission capacity of relay-assisted Device-to-Device (D2D) communication underlay cellular networks. Proceedings of the 2013 IEEE 78th Vehicular Technology Conference (VTC Fall), Las Vegas, NV, USA, 2\u20135 September 2013.","DOI":"10.1109\/VTCFall.2013.6692074"},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"2052","DOI":"10.1109\/JSAC.2015.2435273","article-title":"Exploiting Device-to-Device communications in joint scheduling of access and backhaul for mmWave small cells","volume":"33","author":"Niu","year":"2015","journal-title":"J. Sel. Areas Commun."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"1152","DOI":"10.1109\/JSAC.2014.2328111","article-title":"Millimeter-wave enhanced local area systems: A high-data-rate approach for future wireless networks","volume":"32","author":"Ghosh","year":"2014","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/s10916-015-0351-y","article-title":"An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography","volume":"39","author":"Amin","year":"2015","journal-title":"J. Med. Syst."},{"key":"ref_90","first-page":"1","article-title":"A resource allocation scheme based on predatory search algorithm for ultra-dense D2D communications","volume":"5","author":"Li","year":"2019","journal-title":"Wirel. Netw."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Wang, X., Li, S., Zhao, S., Xia, Z., and Bai, L. (2017). A vehicular ad hoc network privacy protection scheme without a trusted third party. Int. J. Distrib. Sens. Netw., 13.","DOI":"10.1177\/1550147717743696"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/11\/1762\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:27:22Z","timestamp":1760178442000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/11\/1762"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,24]]},"references-count":91,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2020,11]]}},"alternative-id":["sym12111762"],"URL":"https:\/\/doi.org\/10.3390\/sym12111762","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,24]]}}}