Abstract

Device to Device (D2D) communication was first considered in out-band to manage energy issues in the wireless sensor networks. The primary target was to secure information about system topology for successive communication. Now the D2D communication has been legitimated in in-band by the 3rd Generation Partnership Project (3GPP). To initiate D2D communication, Device Discovery (DD) is a primary task and every D2D application benefits from DD as an end to end link maintenance and data relay when the direct path is obstructed. The DD is facing new difficulties because of the mobility of the devices over static systems, and the mobility makes it more challenging for D2D communication. For in-band D2D, DD in a single cell and multi-cell, and dense area is not legitimated properly, causing latency, inaccuracy, and energy consumption. Among extensive studies on limiting energy consumption and latency, DD is one of the essential parts concentrating on access and communication. In this paper, a comprehensive survey on DD challenges, for example single cell/multi-cell and dense area DD, energy consumption during discovery, discovery delay, and discovery security, etc., has been presented to accomplish an effective paradigm of D2D networks. In order to undertake the device (user) needs, an architecture has been projected, which promises to overwhelm the various implementation challenges of DD. The paper mainly focuses on DD taxonomy and classification with an emphasis on discovery procedures and algorithms, a summary of advances and issues, and ways for potential enhancements. For ensuring a secure DD and D2D, auspicious research directions have been proposed, based on taxonomy.

Highlights

  • Device to Device (D2D) communication has been adopted in the out-band, it was not explored in the in-band for the initial three cellular eras

  • To make an effective comparison with past surveys, this work done is categorized in Device Discovery (DD) in terms of significant research difficulties, including DD in in-band and out-band, energy efficiency and discovery latency, device mobility, and it is a state of the art work done on DD for future generation network

  • The algorithms for moving devices is discussed for D2D scenarios where devices accessibility is not considered

Read more

Summary

INTRODUCTION

Device to Device (D2D) communication has been adopted in the out-band, it was not explored in the in-band for the initial three cellular eras. It is attractive to have low energy consumption and discovery latency at the same time; they are dependent on each other and this is a trade-off that makes energy effective neighbor DD challenging In this survey paper, DD algorithms, protocols, and associated parameters (energy consumption, discovery latency, accuracy) are surveyed, and based on the fundamental design they can be generally grouped by five basic standards: deterministic or probabilistic, synchronous or asynchronous, inband or out-band, energy triggered or time/angle of arrival and single/multi-cell or dense areas. DD algorithms, protocols, and associated parameters (energy consumption, discovery latency, accuracy) are surveyed, and based on the fundamental design they can be generally grouped by five basic standards: deterministic or probabilistic, synchronous or asynchronous, inband or out-band, energy triggered or time/angle of arrival and single/multi-cell or dense areas

MOTIVATIONS AND CONTRIBUTIONS
THE DEVICE DISCOVERY: A CHALLENGE
OPEN RESEARCH ISSUES IN DD
Initial DD signal
The frequency of initial DD signal
Synchronization
Multi-cell DD
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.