ABSTRACT

Key Lab of Broadband Wireless Communication and Sensor Network Technology

(Nanjing University of Posts and Telecommunications),Ministry of Education, China

A. Zhang is also with the Anhui Normal University, China

13.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412 13.2 D2D Communication Technical Specifications . . . . . . . . . . . . . . . . . . . . . . 413

13.2.1 Network Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413 13.2.2 Key Technologies of D2D Communication . . . . . . . . . . . . . . . . . 414

13.3 Content Dissemination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416 13.3.1 System Architecture of Content Dissemination . . . . . . . . . . . . . 416 13.3.2 Content Dissemination Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . 417 13.3.3 Challenges and Open Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418

13.4 Security in D2D Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419 13.4.1 Threat Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419 13.4.2 Security Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420

13.4.3 Security Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421 13.4.4 Challenges and Open Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424

13.5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425

Device-to-device (D2D) communication has been proposed as a promising data

offloading solution in future networks. The key technologies, including peer dis-

covery, mode selection, resource allocation, power control, and interference man-

agement, have been widely investigated in the research community, while data dis-

semination and security solutions are rarely directly considered. In this chapter, we

address the above two issues by reviewing the current contributions in other wireless

networks, which may shed a light on constructing the corresponding mechanisms in

a D2D communication system. Furthermore, we put forward the challenges and open

issues for future research.