Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
169 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

A critical review of mobile device-to-device communication (2309.11871v1)

Published 21 Sep 2023 in cs.HC, cs.NI, and cs.SI

Abstract: Since the advent of mobile devices, both end-users and the IT industry have been longing for direct device-to-device (D2D) communication capabilities, expecting new kinds of interactive, personalized, and collaborative services. Fifteen years later, many D2D solutions have been implemented and deployed, but their availability and functionality are underwhelming. Arguably, the most widely-adopted D2D use case covers the pairing of accessories with smartphones; however, many other use cases-such as mobile media sharing-did not progress. Pervasive computing and cyber-physical convergence need local communication paradigms to scale. For inherently local use cases, they are even more appealing than ever: eschewing third-parties simultaneously fosters environmental sustainability, privacy and network resiliency. This paper proposes a survey on D2D communication, investigates its deployment and adoption, with the objective of easing the creation and adoption of modern D2D frameworks. We present the results of an online poll that estimates end-users' utilisation of D2D processes, and review enabling technologies and security models.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (93)
  1. Diane J. Cook and Sajal K. Das “Pervasive Computing at Scale: Transforming the State of the Art” In Pervasive and Mobile Computing 8.1, 2012, pp. 22–35 URL: https://www.sciencedirect.com/science/article/pii/S1574119211001416
  2. Marco Conti, Andrea Passarella and Sajal K. Das “The Internet of People (IoP): A New Wave in Pervasive Mobile Computing” In Pervasive and Mobile Computing 41, 2017, pp. 1–27 URL: https://www.sciencedirect.com/science/article/pii/S1574119217303723
  3. “A Survey of Device-to-Device Communications: Research Issues and Challenges” In IEEE Communications Surveys Tutorials 20.3, 2018, pp. 2133–2168 DOI: 10.1109/COMST.2018.2828120
  4. Cisco “Annual Interet Report (2018–2023) White Paper”, https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html, 2020
  5. Wikipedia “Internet Traffic” Last accessed on May 2023, 2023 URL: https://en.wikipedia.org/wiki/Internet_traffic
  6. Rob Price “Google Drive Now Hosts More than 2 Trillion Files” In Business Insider, https://www.businessinsider.com/2-trillion-files-google-drive-exec-prabhakar-raghavan-2017-5, 2017
  7. International Energy Agency (IEA) “The Role of Critical Minerals in Clean Energy Transitions”, 2021, pp. 287
  8. Jacqui Cheng “Over 3 Years Later, "Deleted" Facebook Photos Are Still Online” In Ars Technica, https://arstechnica.com/business/news/2012/02/nearly-3-years-later-deleted-facebook-photos-are-still-online.ars, 2012
  9. “Deep Packet Inspection: Effects of Regulation on Its Deployment by Internet Providers”, 2013 DOI: 10.2139/ssrn.2242463
  10. Court of Justice of the European Union “Judgment on Traffic Log Retention in the Face of National Security”, https://eur-lex.europa.eu/legal-content/fr/TXT/?uri=CELEX:62018CJ0511, 2020
  11. Shoshana Zuboff “The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power” New York: PublicAffairs, 2019
  12. Yeslam Al-Saggaf “The Use of Data Mining by Private Health Insurance Companies and Customers’ Privacy: An Ethical Analysis” In Cambridge Quarterly of Healthcare Ethics 24.3, 2015 DOI: 10.1017/S0963180114000607
  13. “For NSA Chief, Terrorist Threat Drives Passion to ‘Collect It All”’ In Washington Post, 2013
  14. Carole Cadwalladr “‘I Made Steve Bannon’s Psychological Warfare Tool’: Meet the Data War Whistleblower” In The Guardian, https://www.theguardian.com/news/2018/mar/17/data-war-whistleblower-christopher-wylie-faceook-nix-bannon-trump, 2018
  15. “Psychological Targeting as an Effective Approach to Digital Mass Persuasion” In Proceedings of the National Academy of Sciences 114.48, 2017 DOI: 10.1073/pnas.1710966114
  16. Adrien Luxey “E-Squads: A Novel Paradigm to Build Privacy-Preserving Ubiquitous Applications”, http://www.theses.fr/2019REN1S071/document, 2019, pp. 7–8\bibrangessep12
  17. United Nations “With Almost Half of World’s Population Still Offline, Digital Divide Risks Becoming ‘New Face of Inequality’, Deputy Secretary-General Warns General Assembly” Last accessed on Apr 2023, 2021 URL: https://www.un.org/press/en/2021/dsgsm1579.doc.htm
  18. GSMA “Over Half World’s Population Now Using Mobile Internet” Last accessed on Apr 2023, 2021 URL: https://www.gsma.com/newsroom/press-release/over-half-worlds-population-now-using-mobile-internet/
  19. Internet world stats “INTERNET USAGE STATISTICS” Last accessed on Apr 2023, 2021 URL: https://internetworldstats.com/stats.htm
  20. Emily A Vogels “Some digital divides persist between rural, urban and suburban America” In Pew Research Center, August 19, 2021
  21. Cable.co.uk “Worldwide mobile data pricing 2021” Last accessed on Apr 2023, 2021 URL: https://www.cable.co.uk/mobiles/worldwide-data-pricing/
  22. Colleen Mcclain “34% of Lower-Income Home Broadband Users Have Had Trouble Paying for Their Service amid COVID-19” In Pew Research Center, https://www.pewresearch.org/short-reads/2021/06/03/34-of-lower-income-home-broadband-users-have-had-trouble-paying-for-their-service-amid-covid-19/, 2021
  23. Infrared Data Association “Serial Infrared Physical Layer Specification”, https://www.irda.org/standards/pubs/IrPHY_1p4.pdf, 2001
  24. IEEE “IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications”, 1997 DOI: 10.1109/IEEESTD.1997.85951
  25. IEEE “IEEE Standard for Information Technology–Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks–Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 1: Enhancements for High-Efficiency WLAN”, 2021 DOI: 10.1109/IEEESTD.2021.9442429
  26. IEEE “IEEE Standard for Information Technology–Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks–Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 2: Enhanced Throughput for Operation in License-Exempt Bands above 45 GHz”, 2021 DOI: 10.1109/IEEESTD.2021.9502046
  27. Bluetooth SIG “Bluetooth Core Specification”, 1999
  28. Bluetooth SIG “Bluetooth Core Specification”, 2016
  29. Bluetooth SIG “Bluetooth Technology Overview” Last accessed on Apr 2023 In Bluetooth Technology Website, 2023 URL: https://www.bluetooth.com/learn-about-bluetooth/tech-overview/
  30. ISO Standards “ISO/IEC 18092:2004 — Information technology — Telecommunications and information exchange between systems — Near Field Communication — Interface and Protocol”, https://www.iso.org/standard/38578.html, 2004
  31. ISO Standards “ISO/IEC 26907:2007 — Information Technology — Automatic Telecommunications and information exchange between systems — High Rate Ultra Wideband PHY and MAC Standard”, https://www.iso.org/standard/43900.html, 2007
  32. ISO Standards “ISO/IEC 26908:2007 — Information Technology — Automatic Telecommunications and information exchange between systems — MAC-PHY Interface for ISO/IEC 26907”, https://www.iso.org/standard/43901.html, 2007
  33. Bluetooth SIG “Understanding Bluetooth Range” Last accessed on Apr 2023 In Bluetooth Technology Website, 2023 URL: https://www.bluetooth.com/learn-about-bluetooth/key-attributes/range/
  34. Michael Rowan-Robinson “Night Vision: Exploring the Infrared Universe” Cambridge: Cambridge University Press, 2012, pp. 23
  35. Nintendo Wiki “List of Nintendo Systems” Last accessed on Apr 2023, 2022 URL: https://nintendo.fandom.com/wiki/List%5C_of%5C_Nintendo%5C_systems
  36. Xiaomi Inc. “Mi Remote controller - for TV, STB, AC and more – Apps on Google Play” Last accessed on Apr 2023, 2022 URL: https://play.google.com/store/apps/details?id=com.duokan.phone.remotecontroller
  37. Neil Campbell “QR Code Contact Tracing, Vaccine Passports Becoming New Normal in Europe, America” In Vision Times, https://shorturl.at/gFIRZ, 2021
  38. ISO Standards “ISO/IEC 18004:2015 — Information Technology — Automatic Identification and Data Capture Techniques — QR Code Bar Code Symbology Specification”, https://www.iso.org/standard/62021.html, 2015
  39. Chai Keong Toh “Routing Method for Ad-Hoc Mobile Networks”, 1999
  40. IEEE “IEEE Standard for Telecommunications and Information Exchange Between Systems - LAN/MAN Specific Requirements - Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: High Speed Physical Layer in the 5 GHz Band”, 1999 DOI: 10.1109/IEEESTD.1999.90606
  41. IEEE “IEEE Standard for Information Technology - Telecommunications and Information Exchange between Systems - Local and Metropolitan Networks - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Higher Speed Physical Layer (PHY) Extension in the 2.4 GHz Band”, 2000 DOI: 10.1109/IEEESTD.2000.90914
  42. “Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”, 1999, pp. RFC2501 DOI: 10.17487/rfc2501
  43. “Experimenting with an Ad Hoc Wireless Network on Campus: Insights and Experiences” In ACM SIGMETRICS Performance Evaluation Review 28.3, 2000, pp. 21–29 DOI: 10.1145/377616.377622
  44. C.-K. Toh, M. Delwar and D. Allen “Evaluating the Communication Performance of an Ad Hoc Wireless Network” In IEEE Transactions on Wireless Communications 1.3, 2002, pp. 402–414 DOI: 10.1109/TWC.2002.800539
  45. Wi-Fi Alliance “Discover Wi-Fi Direct” Last accessed on Apr 2023, 2023 URL: https://www.wi-fi.org/discover-wi-fi/wi-fi-direct
  46. Wi-Fi Alliance “Wi-Fi Aware” Last accessed on Apr 2023, 2023 URL: https://www.wi-fi.org/discover-wi-fi/wi-fi-aware
  47. Google “Wi-Fi Aware Overview | Android Documentation” Last accessed on Apr 2023 In Android Developers, 2023 URL: https://developer.android.com/guide/topics/connectivity/wifi-aware
  48. Bluetooth SIG “Bluetooth® Core Specification Version 5.4 - Technical Overview” Last accessed on Apr 2023 In Bluetooth Technology Website, 2023 URL: https://www.bluetooth.com/bluetooth-resources/bluetooth-core-specification-version-5-4-technical-overview/
  49. Wikipedia “List of Bluetooth Profiles” Last accessed on Apr 2023, 2022 URL: https://en.wikipedia.org/wiki/List_of_Bluetooth_profiles
  50. K.V.S.S.S.S. Sairam, N. Gunasekaran and S.R. Redd “Bluetooth in Wireless Communication” In IEEE Communications Magazine 40.6, 2002, pp. 90–96 DOI: 10.1109/MCOM.2002.1007414
  51. Barbara A. Bays and Michael J Mc Gowan “Use of RFID for Tracking Government Property - Proof of Concept/Pilot” Last accessed on Apr 2023, 2017 URL: https://www.osti.gov/biblio/1456529
  52. Stephen A. Weis “RFID (Radio Frequency IDentification): Principles and Applications”, 2007
  53. Roy Want “An introduction to RFID technology” In IEEE Pervasive Computing 5, 2006 DOI: 10.1109/MPRV.2006.2
  54. “Introduction to Impulse Radio UWB Seamless Access Systems”, 2020, pp. 15
  55. Stephen Cooper “Ultra Wideband & You” Last accessed on Apr 2023, WLPC Phoenix, 2020 URL: https://www.youtube.com/watch?v=TR-rahy3Y2k
  56. Apple Support “Ultra Wideband Availability” Last accessed on Apr 2023, 2021 URL: https://support.apple.com/en-us/HT212274
  57. IEEE “IEEE Standard for Low-Rate Wireless Networks”, 2020 DOI: 10.1109/IEEESTD.2020.9144691
  58. Mohamed Sufyan Islim and Harald Haas “Modulation Techniques for Li-Fi” In ZTE Communications 14, 2016
  59. “A Study of LoRa: Long Range & Low Power Networks for the Internet of Things” In Sensors (Basel, Switzerland) 16.9, 2016, pp. 1466 DOI: 10.3390/s16091466
  60. Alexandru Lavric, Adrian I. Petrariu and Valentin Popa “SigFox Communication Protocol: The New Era of IoT?” In 2019 International Conference on Sensing and Instrumentation in IoT Era (ISSI), 2019, pp. 1–4 DOI: 10.1109/ISSI47111.2019.9043727
  61. “Overview of Cellular LPWAN Technologies for IoT Deployment: Sigfox, LoRaWAN, and NB-IoT” In 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2018, pp. 197–202 DOI: 10.1109/PERCOMW.2018.8480255
  62. “Sigfox and LoRaWAN Datasets for Fingerprint Localization in Large Urban and Rural Areas” In Data 3.2 Multidisciplinary Digital Publishing Institute, 2018, pp. 13 DOI: 10.3390/data3020013
  63. 3GPP “Release 12”, https://www.3gpp.org/specifications/releases/68-release-12, 2015
  64. 3GPP “Release 15”, https://www.3gpp.org/release-15, 2019
  65. U. Kar and Debarshi Kumar Sanyal “A Critical Review of 3GPP Standardization of Device-to-Device Communication in Cellular Networks” In SN Comput. Sci., 2020 DOI: 10.1007/s42979-019-0045-5
  66. Apple “AirPlay” Last accessed on Apr 2023, 2022 URL: https://www.apple.com/airplay/
  67. Milan Stute, David Kreitschmann and Matthias Hollick “The Open Wireless Link Project”, 2018 URL: https://owlink.org
  68. Milan Stute, David Kreitschmann and Matthias Hollick “One Billion Apples’ Secret Sauce: Recipe for the Apple Wireless Direct Link Ad Hoc Protocol” In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018, pp. 529–543 DOI: 10.1145/3241539.3241566
  69. “A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link” In 28th USENIX Security Symposium (USENIX Security 19), 2019, pp. 37–54
  70. Secure Mobile Networking Lab “OpenDrop: An Open Source AirDrop Implementation” Last accessed in Apr 2023, 2022 URL: https://github.com/seemoo-lab/opendrop
  71. Google “Nearby Connections API” Last accessed on Apr 2023, 2022 URL: https://developers.google.com/nearby/connections/
  72. Daniele Antonioli, Nils Ole Tippenhauer and Kasper B. Rasmussen “Nearby Threats: Reversing, Analyzing, and Attacking Google’s ’Nearby Connections’ on Android” In Proceedings 2019 Network and Distributed System Security Symposium San Diego, CA: Internet Society, 2019 DOI: 10.14722/ndss.2019.23367
  73. Apple Fandom “iPhone (1st generation)” Last accessed on Apr 2023, 2023 URL: https://apple.fandom.com/wiki/IPhone_(1st_generation)
  74. Richard Nieva “Google’s Pixel 6 Phones Are Coming with a Chip Designed in-House” Last accessed on Apr 2023 In CNET, 2021 URL: https://www.cnet.com/tech/mobile/googles-pixel-6-phones-are-coming-with-a-chip-the-apple-rival-designed-in-house/
  75. Abner Li “Pixel 6 Pro UWB, Adjust Assistant Long Press, Pixel Buds A-Series Bass Slider, & More” Last accessed on Apr 2023 In 9to5Google, 2021 URL: https://9to5google.com/2021/12/06/december-pixel-feature-drop-android-12/
  76. Apple “Nearby Interactions with U1” Last accessed on Apr 2023, 2022 URL: https://developer.apple.com/nearby-interaction/
  77. Brian Barrett “The Biggest iPhone News Is a Tiny New Chip Inside It” In Wired, 2019
  78. “Security and Privacy in Device-to-Device (D2D) Communication: A Review” In IEEE Communications Surveys Tutorials 19.2, 2017, pp. 1054–1079 DOI: 10.1109/COMST.2017.2649687
  79. “A Survey on Security in D2D Communications” In Mobile Networks and Applications 22.2, 2017, pp. 195–208 DOI: 10.1007/s11036-016-0741-5
  80. “The Long Road to Computational Location Privacy: A Survey” In IEEE Communications Surveys Tutorials 21.3, 2019, pp. 2772–2793 DOI: 10.1109/COMST.2018.2873950
  81. “Secure Key Establishment for Device-to-Device Communications” In 2014 IEEE Global Communications Conference, 2014, pp. 336–340 DOI: 10.1109/GLOCOM.2014.7036830
  82. “Physical Layer Security in Wireless Networks: A Tutorial” In IEEE Wireless Communications 18.2, 2011, pp. 66–74 DOI: 10.1109/MWC.2011.5751298
  83. Yehuda Lindell “Anonymous Authentication” In Journal of Privacy and Confidentiality 2.2, 2011 DOI: 10.29012/jpc.v2i2.590
  84. “Don’t Count Me Out: On the Relevance of IP Address In The Tracking Ecosystem” In Proceedings of The Web Conference 2020, WWW ’20 Taipei, Taiwan: ACM, 2020 DOI: 10.1145/3366423.3380161
  85. Roger Dingledine, Nick Mathewson and Paul Syverson “Tor: The Second-Generation Onion Router”, 2004 DOI: 10.21236/ADA465464
  86. Tails “MAC Address Anonymization” Last accessed on May 2023, 2022 URL: https://tails.boum.org/contribute/design/MAC_address/
  87. IEEE “IEEE P802.11 - TASK GROUP BH (RCM)” Last accessed on May 2023, 2022 URL: https://ieee802.org/11/Reports/tgbh%5C_update.htm
  88. Bluetooth SIG “Bluetooth Technology Protecting Your Privacy” Last accessed on May 2023, 2015 URL: https://www.bluetooth.com/blog/bluetooth-technology-protecting-your-privacy/
  89. “Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing” In IEEE Internet of Things Journal, 2020 DOI: 10.1109/JIOT.2020.3018878
  90. Stefan Viehböck “Brute Forcing Wi-Fi Protected Setup” Last accessed on May 2023, 2011 URL: https://www.cs.cmu.edu/~rdriley/330/papers/viehboeck_wps.pdf
  91. Wi-Fi Alliance “Discover Wi-Fi Easy Connect” Last accessed on Apr 2023, 2023 URL: https://www.wi-fi.org/discover-wi-fi/wi-fi-easy-connect
  92. “A Survey of Routing and Data Dissemination in Delay Tolerant Networks” In Journal of Network and Computer Applications 67, 2016 DOI: 10.1016/j.jnca.2016.01.002
  93. “A Decade of Research in Opportunistic Networks: Challenges, Relevance, and Future Directions” In IEEE Communications Magazine 55.1, 2017, pp. 168–173 DOI: 10.1109/MCOM.2017.1500527CM

Summary

We haven't generated a summary for this paper yet.