Device-to-device (D2D) communication proposes a new epitome in mobile networking to avail data exchange between physically proximate devices. The exploitation of D2D communication enables mobile operators to harvest short range communications for improving network performance and corroborating proximity-based services. In this article, we investigate mobility aspects of D2D communication, which are indispensable for the adoption and implementation of D2D communication technology. We present an extensive review of the state-of-theart problems and the corresponding solutions for encouraging the exploitation of mobility to assist D2D communication. Specifically, by identifying the mobility models, traces, problems, requirements, and features of different proposals, we discuss the lessons learned and summarize the advantages of mobility-aware D2D communication. We also present open problems and highlight future research directions concerning D2D communication applications in real-life scenarios. To the best of our knowledge, this is the first comprehensive survey to address mobility-aware D2D communication, which offers insight to the underlying problems and provides the potential solutions. Index Terms-Device-to-device communication, mobility, mobile communication, mobile data traffic. I. INTRODUCTION D EVICE-to-device (D2D) communication takes the advantage of opportunistic encounters by mobile users with each other [1]. These opportunistic encounters' information between users are highly related to their movement. By exploiting users' movement, D2D enabled applications and services visualize highly opportunistic and unpredictable human mobility. Therefore, the challenges of exploiting mobility resides in the inherent complexity of users' mobility. It is mainly concerns with predicting the establishment of communication links among D2D users. For instance, two mobile users can establish a link at the time when they are in close proximity to each other. However, there are two key questions have to M.
Physical layer security (PLS) is a promising technology in device-to-device (D2D) communications by exploiting reciprocity and randomness of wireless channels, which attracts considerable research attention in the D2D communications community. In this paper, we investigated PLS for secure key generation rate (SKGR) in D2D communications based on cooperative trusted and non-trusted relays. By leveraging social ties, we exploit three social phenomena for secure communications, i.e., trusted scenario (social trust), non-trusted scenario (social reciprocity) and partially trusted scenario (mixed social trust and social reciprocity). The coalition game theory is further utilized to select the optimal relay pairs for improving SKGR. On the basis of social ties, we develop an algorithm for SKGR that protects the keys secret from both eavesdropper and nontrusted selected relays. We incorporate secure relays selection and system wide security for D2D communications. The stability and convergence of the proposed algorithm are also proved in our work. Both numerically and analytically results verify effectiveness and consistency of our proposed scheme, which ensures better SKGR performance in D2D communications.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.