A critical review of mobile device-to-device communication (2309.11871v1)
Abstract: Since the advent of mobile devices, both end-users and the IT industry have been longing for direct device-to-device (D2D) communication capabilities, expecting new kinds of interactive, personalized, and collaborative services. Fifteen years later, many D2D solutions have been implemented and deployed, but their availability and functionality are underwhelming. Arguably, the most widely-adopted D2D use case covers the pairing of accessories with smartphones; however, many other use cases-such as mobile media sharing-did not progress. Pervasive computing and cyber-physical convergence need local communication paradigms to scale. For inherently local use cases, they are even more appealing than ever: eschewing third-parties simultaneously fosters environmental sustainability, privacy and network resiliency. This paper proposes a survey on D2D communication, investigates its deployment and adoption, with the objective of easing the creation and adoption of modern D2D frameworks. We present the results of an online poll that estimates end-users' utilisation of D2D processes, and review enabling technologies and security models.
- Diane J. Cook and Sajal K. Das “Pervasive Computing at Scale: Transforming the State of the Art” In Pervasive and Mobile Computing 8.1, 2012, pp. 22–35 URL: https://www.sciencedirect.com/science/article/pii/S1574119211001416
- Marco Conti, Andrea Passarella and Sajal K. Das “The Internet of People (IoP): A New Wave in Pervasive Mobile Computing” In Pervasive and Mobile Computing 41, 2017, pp. 1–27 URL: https://www.sciencedirect.com/science/article/pii/S1574119217303723
- “A Survey of Device-to-Device Communications: Research Issues and Challenges” In IEEE Communications Surveys Tutorials 20.3, 2018, pp. 2133–2168 DOI: 10.1109/COMST.2018.2828120
- Cisco “Annual Interet Report (2018–2023) White Paper”, https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html, 2020
- Wikipedia “Internet Traffic” Last accessed on May 2023, 2023 URL: https://en.wikipedia.org/wiki/Internet_traffic
- Rob Price “Google Drive Now Hosts More than 2 Trillion Files” In Business Insider, https://www.businessinsider.com/2-trillion-files-google-drive-exec-prabhakar-raghavan-2017-5, 2017
- International Energy Agency (IEA) “The Role of Critical Minerals in Clean Energy Transitions”, 2021, pp. 287
- Jacqui Cheng “Over 3 Years Later, "Deleted" Facebook Photos Are Still Online” In Ars Technica, https://arstechnica.com/business/news/2012/02/nearly-3-years-later-deleted-facebook-photos-are-still-online.ars, 2012
- “Deep Packet Inspection: Effects of Regulation on Its Deployment by Internet Providers”, 2013 DOI: 10.2139/ssrn.2242463
- Court of Justice of the European Union “Judgment on Traffic Log Retention in the Face of National Security”, https://eur-lex.europa.eu/legal-content/fr/TXT/?uri=CELEX:62018CJ0511, 2020
- Shoshana Zuboff “The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power” New York: PublicAffairs, 2019
- Yeslam Al-Saggaf “The Use of Data Mining by Private Health Insurance Companies and Customers’ Privacy: An Ethical Analysis” In Cambridge Quarterly of Healthcare Ethics 24.3, 2015 DOI: 10.1017/S0963180114000607
- “For NSA Chief, Terrorist Threat Drives Passion to ‘Collect It All”’ In Washington Post, 2013
- Carole Cadwalladr “‘I Made Steve Bannon’s Psychological Warfare Tool’: Meet the Data War Whistleblower” In The Guardian, https://www.theguardian.com/news/2018/mar/17/data-war-whistleblower-christopher-wylie-faceook-nix-bannon-trump, 2018
- “Psychological Targeting as an Effective Approach to Digital Mass Persuasion” In Proceedings of the National Academy of Sciences 114.48, 2017 DOI: 10.1073/pnas.1710966114
- Adrien Luxey “E-Squads: A Novel Paradigm to Build Privacy-Preserving Ubiquitous Applications”, http://www.theses.fr/2019REN1S071/document, 2019, pp. 7–8\bibrangessep12
- United Nations “With Almost Half of World’s Population Still Offline, Digital Divide Risks Becoming ‘New Face of Inequality’, Deputy Secretary-General Warns General Assembly” Last accessed on Apr 2023, 2021 URL: https://www.un.org/press/en/2021/dsgsm1579.doc.htm
- GSMA “Over Half World’s Population Now Using Mobile Internet” Last accessed on Apr 2023, 2021 URL: https://www.gsma.com/newsroom/press-release/over-half-worlds-population-now-using-mobile-internet/
- Internet world stats “INTERNET USAGE STATISTICS” Last accessed on Apr 2023, 2021 URL: https://internetworldstats.com/stats.htm
- Emily A Vogels “Some digital divides persist between rural, urban and suburban America” In Pew Research Center, August 19, 2021
- Cable.co.uk “Worldwide mobile data pricing 2021” Last accessed on Apr 2023, 2021 URL: https://www.cable.co.uk/mobiles/worldwide-data-pricing/
- Colleen Mcclain “34% of Lower-Income Home Broadband Users Have Had Trouble Paying for Their Service amid COVID-19” In Pew Research Center, https://www.pewresearch.org/short-reads/2021/06/03/34-of-lower-income-home-broadband-users-have-had-trouble-paying-for-their-service-amid-covid-19/, 2021
- Infrared Data Association “Serial Infrared Physical Layer Specification”, https://www.irda.org/standards/pubs/IrPHY_1p4.pdf, 2001
- IEEE “IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications”, 1997 DOI: 10.1109/IEEESTD.1997.85951
- IEEE “IEEE Standard for Information Technology–Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks–Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 1: Enhancements for High-Efficiency WLAN”, 2021 DOI: 10.1109/IEEESTD.2021.9442429
- IEEE “IEEE Standard for Information Technology–Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks–Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 2: Enhanced Throughput for Operation in License-Exempt Bands above 45 GHz”, 2021 DOI: 10.1109/IEEESTD.2021.9502046
- Bluetooth SIG “Bluetooth Core Specification”, 1999
- Bluetooth SIG “Bluetooth Core Specification”, 2016
- Bluetooth SIG “Bluetooth Technology Overview” Last accessed on Apr 2023 In Bluetooth Technology Website, 2023 URL: https://www.bluetooth.com/learn-about-bluetooth/tech-overview/
- ISO Standards “ISO/IEC 18092:2004 — Information technology — Telecommunications and information exchange between systems — Near Field Communication — Interface and Protocol”, https://www.iso.org/standard/38578.html, 2004
- ISO Standards “ISO/IEC 26907:2007 — Information Technology — Automatic Telecommunications and information exchange between systems — High Rate Ultra Wideband PHY and MAC Standard”, https://www.iso.org/standard/43900.html, 2007
- ISO Standards “ISO/IEC 26908:2007 — Information Technology — Automatic Telecommunications and information exchange between systems — MAC-PHY Interface for ISO/IEC 26907”, https://www.iso.org/standard/43901.html, 2007
- Bluetooth SIG “Understanding Bluetooth Range” Last accessed on Apr 2023 In Bluetooth Technology Website, 2023 URL: https://www.bluetooth.com/learn-about-bluetooth/key-attributes/range/
- Michael Rowan-Robinson “Night Vision: Exploring the Infrared Universe” Cambridge: Cambridge University Press, 2012, pp. 23
- Nintendo Wiki “List of Nintendo Systems” Last accessed on Apr 2023, 2022 URL: https://nintendo.fandom.com/wiki/List%5C_of%5C_Nintendo%5C_systems
- Xiaomi Inc. “Mi Remote controller - for TV, STB, AC and more – Apps on Google Play” Last accessed on Apr 2023, 2022 URL: https://play.google.com/store/apps/details?id=com.duokan.phone.remotecontroller
- Neil Campbell “QR Code Contact Tracing, Vaccine Passports Becoming New Normal in Europe, America” In Vision Times, https://shorturl.at/gFIRZ, 2021
- ISO Standards “ISO/IEC 18004:2015 — Information Technology — Automatic Identification and Data Capture Techniques — QR Code Bar Code Symbology Specification”, https://www.iso.org/standard/62021.html, 2015
- Chai Keong Toh “Routing Method for Ad-Hoc Mobile Networks”, 1999
- IEEE “IEEE Standard for Telecommunications and Information Exchange Between Systems - LAN/MAN Specific Requirements - Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: High Speed Physical Layer in the 5 GHz Band”, 1999 DOI: 10.1109/IEEESTD.1999.90606
- IEEE “IEEE Standard for Information Technology - Telecommunications and Information Exchange between Systems - Local and Metropolitan Networks - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Higher Speed Physical Layer (PHY) Extension in the 2.4 GHz Band”, 2000 DOI: 10.1109/IEEESTD.2000.90914
- “Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”, 1999, pp. RFC2501 DOI: 10.17487/rfc2501
- “Experimenting with an Ad Hoc Wireless Network on Campus: Insights and Experiences” In ACM SIGMETRICS Performance Evaluation Review 28.3, 2000, pp. 21–29 DOI: 10.1145/377616.377622
- C.-K. Toh, M. Delwar and D. Allen “Evaluating the Communication Performance of an Ad Hoc Wireless Network” In IEEE Transactions on Wireless Communications 1.3, 2002, pp. 402–414 DOI: 10.1109/TWC.2002.800539
- Wi-Fi Alliance “Discover Wi-Fi Direct” Last accessed on Apr 2023, 2023 URL: https://www.wi-fi.org/discover-wi-fi/wi-fi-direct
- Wi-Fi Alliance “Wi-Fi Aware” Last accessed on Apr 2023, 2023 URL: https://www.wi-fi.org/discover-wi-fi/wi-fi-aware
- Google “Wi-Fi Aware Overview | Android Documentation” Last accessed on Apr 2023 In Android Developers, 2023 URL: https://developer.android.com/guide/topics/connectivity/wifi-aware
- Bluetooth SIG “Bluetooth® Core Specification Version 5.4 - Technical Overview” Last accessed on Apr 2023 In Bluetooth Technology Website, 2023 URL: https://www.bluetooth.com/bluetooth-resources/bluetooth-core-specification-version-5-4-technical-overview/
- Wikipedia “List of Bluetooth Profiles” Last accessed on Apr 2023, 2022 URL: https://en.wikipedia.org/wiki/List_of_Bluetooth_profiles
- K.V.S.S.S.S. Sairam, N. Gunasekaran and S.R. Redd “Bluetooth in Wireless Communication” In IEEE Communications Magazine 40.6, 2002, pp. 90–96 DOI: 10.1109/MCOM.2002.1007414
- Barbara A. Bays and Michael J Mc Gowan “Use of RFID for Tracking Government Property - Proof of Concept/Pilot” Last accessed on Apr 2023, 2017 URL: https://www.osti.gov/biblio/1456529
- Stephen A. Weis “RFID (Radio Frequency IDentification): Principles and Applications”, 2007
- Roy Want “An introduction to RFID technology” In IEEE Pervasive Computing 5, 2006 DOI: 10.1109/MPRV.2006.2
- “Introduction to Impulse Radio UWB Seamless Access Systems”, 2020, pp. 15
- Stephen Cooper “Ultra Wideband & You” Last accessed on Apr 2023, WLPC Phoenix, 2020 URL: https://www.youtube.com/watch?v=TR-rahy3Y2k
- Apple Support “Ultra Wideband Availability” Last accessed on Apr 2023, 2021 URL: https://support.apple.com/en-us/HT212274
- IEEE “IEEE Standard for Low-Rate Wireless Networks”, 2020 DOI: 10.1109/IEEESTD.2020.9144691
- Mohamed Sufyan Islim and Harald Haas “Modulation Techniques for Li-Fi” In ZTE Communications 14, 2016
- “A Study of LoRa: Long Range & Low Power Networks for the Internet of Things” In Sensors (Basel, Switzerland) 16.9, 2016, pp. 1466 DOI: 10.3390/s16091466
- Alexandru Lavric, Adrian I. Petrariu and Valentin Popa “SigFox Communication Protocol: The New Era of IoT?” In 2019 International Conference on Sensing and Instrumentation in IoT Era (ISSI), 2019, pp. 1–4 DOI: 10.1109/ISSI47111.2019.9043727
- “Overview of Cellular LPWAN Technologies for IoT Deployment: Sigfox, LoRaWAN, and NB-IoT” In 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2018, pp. 197–202 DOI: 10.1109/PERCOMW.2018.8480255
- “Sigfox and LoRaWAN Datasets for Fingerprint Localization in Large Urban and Rural Areas” In Data 3.2 Multidisciplinary Digital Publishing Institute, 2018, pp. 13 DOI: 10.3390/data3020013
- 3GPP “Release 12”, https://www.3gpp.org/specifications/releases/68-release-12, 2015
- 3GPP “Release 15”, https://www.3gpp.org/release-15, 2019
- U. Kar and Debarshi Kumar Sanyal “A Critical Review of 3GPP Standardization of Device-to-Device Communication in Cellular Networks” In SN Comput. Sci., 2020 DOI: 10.1007/s42979-019-0045-5
- Apple “AirPlay” Last accessed on Apr 2023, 2022 URL: https://www.apple.com/airplay/
- Milan Stute, David Kreitschmann and Matthias Hollick “The Open Wireless Link Project”, 2018 URL: https://owlink.org
- Milan Stute, David Kreitschmann and Matthias Hollick “One Billion Apples’ Secret Sauce: Recipe for the Apple Wireless Direct Link Ad Hoc Protocol” In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018, pp. 529–543 DOI: 10.1145/3241539.3241566
- “A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link” In 28th USENIX Security Symposium (USENIX Security 19), 2019, pp. 37–54
- Secure Mobile Networking Lab “OpenDrop: An Open Source AirDrop Implementation” Last accessed in Apr 2023, 2022 URL: https://github.com/seemoo-lab/opendrop
- Google “Nearby Connections API” Last accessed on Apr 2023, 2022 URL: https://developers.google.com/nearby/connections/
- Daniele Antonioli, Nils Ole Tippenhauer and Kasper B. Rasmussen “Nearby Threats: Reversing, Analyzing, and Attacking Google’s ’Nearby Connections’ on Android” In Proceedings 2019 Network and Distributed System Security Symposium San Diego, CA: Internet Society, 2019 DOI: 10.14722/ndss.2019.23367
- Apple Fandom “iPhone (1st generation)” Last accessed on Apr 2023, 2023 URL: https://apple.fandom.com/wiki/IPhone_(1st_generation)
- Richard Nieva “Google’s Pixel 6 Phones Are Coming with a Chip Designed in-House” Last accessed on Apr 2023 In CNET, 2021 URL: https://www.cnet.com/tech/mobile/googles-pixel-6-phones-are-coming-with-a-chip-the-apple-rival-designed-in-house/
- Abner Li “Pixel 6 Pro UWB, Adjust Assistant Long Press, Pixel Buds A-Series Bass Slider, & More” Last accessed on Apr 2023 In 9to5Google, 2021 URL: https://9to5google.com/2021/12/06/december-pixel-feature-drop-android-12/
- Apple “Nearby Interactions with U1” Last accessed on Apr 2023, 2022 URL: https://developer.apple.com/nearby-interaction/
- Brian Barrett “The Biggest iPhone News Is a Tiny New Chip Inside It” In Wired, 2019
- “Security and Privacy in Device-to-Device (D2D) Communication: A Review” In IEEE Communications Surveys Tutorials 19.2, 2017, pp. 1054–1079 DOI: 10.1109/COMST.2017.2649687
- “A Survey on Security in D2D Communications” In Mobile Networks and Applications 22.2, 2017, pp. 195–208 DOI: 10.1007/s11036-016-0741-5
- “The Long Road to Computational Location Privacy: A Survey” In IEEE Communications Surveys Tutorials 21.3, 2019, pp. 2772–2793 DOI: 10.1109/COMST.2018.2873950
- “Secure Key Establishment for Device-to-Device Communications” In 2014 IEEE Global Communications Conference, 2014, pp. 336–340 DOI: 10.1109/GLOCOM.2014.7036830
- “Physical Layer Security in Wireless Networks: A Tutorial” In IEEE Wireless Communications 18.2, 2011, pp. 66–74 DOI: 10.1109/MWC.2011.5751298
- Yehuda Lindell “Anonymous Authentication” In Journal of Privacy and Confidentiality 2.2, 2011 DOI: 10.29012/jpc.v2i2.590
- “Don’t Count Me Out: On the Relevance of IP Address In The Tracking Ecosystem” In Proceedings of The Web Conference 2020, WWW ’20 Taipei, Taiwan: ACM, 2020 DOI: 10.1145/3366423.3380161
- Roger Dingledine, Nick Mathewson and Paul Syverson “Tor: The Second-Generation Onion Router”, 2004 DOI: 10.21236/ADA465464
- Tails “MAC Address Anonymization” Last accessed on May 2023, 2022 URL: https://tails.boum.org/contribute/design/MAC_address/
- IEEE “IEEE P802.11 - TASK GROUP BH (RCM)” Last accessed on May 2023, 2022 URL: https://ieee802.org/11/Reports/tgbh%5C_update.htm
- Bluetooth SIG “Bluetooth Technology Protecting Your Privacy” Last accessed on May 2023, 2015 URL: https://www.bluetooth.com/blog/bluetooth-technology-protecting-your-privacy/
- “Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing” In IEEE Internet of Things Journal, 2020 DOI: 10.1109/JIOT.2020.3018878
- Stefan Viehböck “Brute Forcing Wi-Fi Protected Setup” Last accessed on May 2023, 2011 URL: https://www.cs.cmu.edu/~rdriley/330/papers/viehboeck_wps.pdf
- Wi-Fi Alliance “Discover Wi-Fi Easy Connect” Last accessed on Apr 2023, 2023 URL: https://www.wi-fi.org/discover-wi-fi/wi-fi-easy-connect
- “A Survey of Routing and Data Dissemination in Delay Tolerant Networks” In Journal of Network and Computer Applications 67, 2016 DOI: 10.1016/j.jnca.2016.01.002
- “A Decade of Research in Opportunistic Networks: Challenges, Relevance, and Future Directions” In IEEE Communications Magazine 55.1, 2017, pp. 168–173 DOI: 10.1109/MCOM.2017.1500527CM