scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Device-to-Device Communications for National Security and Public Safety

18 Dec 2014-IEEE Access (IEEE)-Vol. 2, pp 1510-1520
TL;DR: A clustering-procedure-based approach to the design of a system that integrates cellular and ad hoc operation modes depending on the availability of infrastructure nodes is proposed, and system simulations demonstrate the viability of the proposed design.
Abstract: Device-to-device (D2D) communications have been proposed as an underlay to long-term evolution (LTE) networks as a means of harvesting the proximity, reuse, and hop gains. However, D2D communications can also serve as a technology component for providing public protection and disaster relief (PPDR) and national security and public safety (NSPS) services. In the United States, for example, spectrum has been reserved in the 700-MHz band for an LTE-based public safety network. The key requirement for the evolving broadband PPDR and NSPS services capable systems is to provide access to cellular services when the infrastructure is available and to efficiently support local services even if a subset or all of the network nodes become dysfunctional due to public disaster or emergency situations. This paper reviews some of the key requirements, technology challenges, and solution approaches that must be in place in order to enable LTE networks and, in particular, D2D communications, to meet PPDR and NSPS-related requirements. In particular, we propose a clustering-procedure-based approach to the design of a system that integrates cellular and ad hoc operation modes depending on the availability of infrastructure nodes. System simulations demonstrate the viability of the proposed design. The proposed scheme is currently considered as a technology component of the evolving 5G concept developed by the European 5G research project METIS.
Citations
More filters
Patent
Stefan Parkvall1, Janne Peisa1, Gunnar Mildh1, Robert Baldemair1, Stefan Wager1, Jonas Kronander1, Karl Werner1, Richard Abrahamsson1, Ismet Aktas1, Peter Alriksson1, Junaid Ansari1, Ashraf Shehzad Ali1, Henrik Asplund1, Fredrik Athley1, Håkan Axelsson1, Joakim Axmon1, Johan Axnäs1, Kumar Balachandran1, Gunnar Bark1, Jan-Erik Berg1, Andreas Bergström1, Håkan Björkegren1, Nadia Brahmi1, Cagatay Capar1, Anders Carlsson1, Andreas Cedergren1, Mikael Coldrey1, Icaro L. J. da Silva1, Erik Dahlman1, Ali El Essaili1, Ulrika Engström1, Mårten Ericson1, Erik Eriksson1, Mikael Fallgren1, Fan Rui1, Gabor Fodor1, Pål Frenger1, Jonas Fridén1, Jonas Fröberg Olsson1, Anders Furuskär1, Johan Furuskog1, Virgile Garcia1, Ather Gattami1, Fredrik Gunnarsson1, Ulf Gustavsson1, Bo Hagerman1, Fredrik Harrysson1, Ning He1, Martin Hessler1, Kimmo Hiltunen1, Song-Nam Hong1, Dennis Hui1, Jörg Huschke1, Tim Irnich1, Sven Jacobsson1, Niklas Jaldén1, Simon Järmyr1, Zhiyuan Jiang1, Martin Johansson1, Niklas Johansson1, Du Ho Kang1, Eleftherios Karipidis1, Patrik Karlsson1, Ali S. Khayrallah1, Caner Kilinc1, Göran N. Klang1, Sara Landström1, Christina Larsson1, Gen Li1, Lars Lindbom1, Robert Lindgren1, Bengt Lindoff1, Fredrik Lindqvist1, Liu Jinhua1, Thorsten Lohmar1, Qianxi Lu1, Lars Manholm1, Ivana Maric1, Jonas Medbo1, Qingyu Miao1, Reza Moosavi1, Walter Müller1, Elena Myhre1, Karl Norrman1, Bengt-Erik Olsson1, Torgny Palenius1, Sven Petersson1, Jose Luis Pradas1, Mikael Prytz1, Olav Queseth1, Pradeepa Ramachandra1, Edgar Ramos1, Andres Reial1, Thomas Rimhagen1, Emil Ringh1, Patrik Rugeland1, Johan Rune1, Joachim Sachs1, Henrik Sahlin1, Vidit Saxena1, Nima Seifi1, Yngve Selén1, Eliane Semaan1, Sachin Sharma1, Shi Cong1, Johan Sköld1, Magnus Stattin1, Anders Stjernman1, Dennis Sundman1, Lars Sundström1, Miurel Isabel Tercero Vargas1, Claes Tidestav1, Sibel Tombaz1, Johan Torsner1, Hugo Tullberg1, Jari Vikberg1, Peter von Wrycza1, Thomas Walldeen1, Pontus Wallentin1, Wang Hai1, Ke Wang Helmersson1, Wang Jianfeng1, Yi-Pin Eric Wang1, Niclas Wiberg1, Wittenmark Emma1, Osman Nuri Can Yilmaz1, Ali A. Zaidi1, Zhang Zhan1, Zhang Zhang1, Zheng Yanli1 
13 May 2016
TL;DR: In this article, the uplink access configuration index is used to identify an uplink AP from among a predetermined plurality of AP configurations, and then the AP is transmitted to the wireless communications network according to the identified AP.
Abstract: Methods and apparatus in a fifth-generation wireless communications, including an example method, in a wireless device, that includes receiving a downlink signal comprising an uplink access configuration index, using the uplink access configuration index to identify an uplink access configuration from among a predetermined plurality of uplink access configurations, and transmitting to the wireless communications network according to the identified uplink access configuration. The example method further includes, in the same wireless device, receiving, in a first subframe, a first Orthogonal Frequency-Division Multiplexing (OFDM) transmission formatted according to a first numerology and receiving, in a second subframe, a second OFDM transmission formatted according to a second numerology, the second numerology differing from the first numerology. Variants of this method, corresponding apparatuses, and corresponding network-side methods and apparatuses are also disclosed.

453 citations

Journal ArticleDOI
TL;DR: The state-of-the-art and the potentials of these ten enabling technologies are extensively surveyed, and the challenges and limitations for each technology are treated in depth, while the possible solutions are highlighted.

365 citations

Journal ArticleDOI
TL;DR: A survey of the existing methodologies related to aspects such as interference management, network discovery, proximity services, and network security in D2D networks is presented and new dimensions with regard to D1D communication are introduced.
Abstract: The increasing number of mobile users has given impetus to the demand for high data rate proximity services. The fifth-generation (5G) wireless systems promise to improve the existing technology according to the future demands and provide a road map for reliable and resource-efficient solutions. Device-to-device (D2D) communication has been envisioned as an allied technology of 5G wireless systems for providing services that include live data and video sharing. A D2D communication technique opens new horizons of device-centric communications, i.e., exploiting direct D2D links instead of relying solely on cellular links. Offloading traffic from traditional network-centric entities to D2D network enables low computational complexity at the base station besides increasing the network capacity. However, there are several challenges associated with D2D communication. In this paper, we present a survey of the existing methodologies related to aspects such as interference management, network discovery, proximity services, and network security in D2D networks. We conclude by introducing new dimensions with regard to D2D communication and delineate aspects that require further research.

275 citations


Additional excerpts

  • ...ProSe, especially in D2D cluster environments [56]....

    [...]

Journal ArticleDOI
TL;DR: This paper presents an extensive review of the state-of-the-art solutions for enhancing security and privacy in D2D communication and identifies lessons to be learned from existing studies and derive a set of “best practices.”
Abstract: Device-to-device (D2D) communication presents a new paradigm in mobile networking to facilitate data exchange between physically proximate devices. The development of D2D is driven by mobile operators to harvest short range communications for improving network performance and supporting proximity-based services. In this paper, we investigate two fundamental and interrelated aspects of D2D communication, security and privacy, which are essential for the adoption and deployment of D2D. We present an extensive review of the state-of-the-art solutions for enhancing security and privacy in D2D communication. By summarizing the challenges, requirements, and features of different proposals, we identify lessons to be learned from existing studies and derive a set of “best practices.” The primary goal of our work is to equip researchers and developers with a better understanding of the underlying problems and the potential solutions for D2D security and privacy. To inspire follow-up research, we identify open problems and highlight future directions with regard to system and communication design. To the best of our knowledge, this is the first comprehensive review to address the fundamental security and privacy issues in D2D communication.

251 citations


Cites background from "Device-to-Device Communications for..."

  • ...4) Legal and Regulation Concerns: The ethical and legal requirements are non-negligible factors in D2D security and privacy research, due to the connection with national security and public safety [209], [210]....

    [...]

Journal ArticleDOI
TL;DR: An extensive survey on device-to-device (D2D) communication has been presented, including the plus points it offers; the key open issues associated with it like peer discovery, resource allocation etc, demanding special attention of the research community; some of its integrant technologies like millimeter wave D2D (mmWave), ultra dense networks (UDNs), cognitive D2d, handover procedure in D2 D and its numerous use cases.

247 citations


Cites background from "Device-to-Device Communications for..."

  • ...It has the ability to assure public protection and disaster relief (PPDR) and national security and public safety services (NSPS) [95]....

    [...]

References
More filters
Journal ArticleDOI
Klaus Doppler1, Mika Rinne1, Carl Wijting1, Cassio Ribeiro1, Klaus Hugl1 
TL;DR: Device-to-device (D2D) communication underlaying a 3GPP LTE-Advanced cellular network is studied as an enabler of local services with limited interference impact on the primary cellular network.
Abstract: In this article device-to-device (D2D) communication underlaying a 3GPP LTE-Advanced cellular network is studied as an enabler of local services with limited interference impact on the primary cellular network. The approach of the study is a tight integration of D2D communication into an LTE-Advanced network. In particular, we propose mechanisms for D2D communication session setup and management involving procedures in the LTE System Architecture Evolution. Moreover, we present numerical results based on system simulations in an interference limited local area scenario. Our results show that D2D communication can increase the total throughput observed in the cell area.

1,941 citations


"Device-to-Device Communications for..." refers background or methods in this paper

  • ...Early work on device-to-device (D2D) communications focused on so-called commercial or general use cases, in which some contents or real-time information needs to be exchanged between parties in close proximity to one another [1], [2]....

    [...]

  • ...Notice that in the cases of direct discovery when both direct D2D and infrastructure based communication is possible, so called mode selection algorithms select D2D or cellular communication mode [2], [3]....

    [...]

  • ...To benefit from network-controlled D2D communication [2], [3], we propose that the NSPS solution be based on network-assisted underlay D2D communication solutions in such a way that, in the absence of network coverage, PS UEs take over some of the functionality of the network....

    [...]

  • ...station controls the operation of D2D users by maintaining a control plane association [2]....

    [...]

Journal ArticleDOI
TL;DR: An on-demand distributed clustering algorithm for multi-hop packet radio networks that takes into consideration the ideal degree, transmission power, mobility, and battery power of mobile nodes, and is aimed to reduce the computation and communication costs.
Abstract: In this paper, we propose an on-demand distributed clustering algorithm for multi-hop packet radio networks. These types of networks, also known as i>ad hoc networks, are dynamic in nature due to the mobility of nodes. The association and dissociation of nodes to and from i>clusters perturb the stability of the network topology, and hence a reconfiguration of the system is often unavoidable. However, it is vital to keep the topology stable as long as possible. The i>clusterheads, form a i>dominant set in the network, determine the topology and its stability. The proposed weight-based distributed clustering algorithm takes into consideration the ideal degree, transmission power, mobility, and battery power of mobile nodes. The time required to identify the clusterheads depends on the diameter of the underlying graph. We try to keep the number of nodes in a cluster around a pre-defined threshold to facilitate the optimal operation of the medium access control (MAC) protocol. The non-periodic procedure for clusterhead election is invoked on-demand, and is aimed to reduce the computation and communication costs. The clusterheads, operating in “dual" power mode, connects the clusters which help in routing messages from a node to any other node. We observe a trade-off between the uniformity of the load handled by the clusterheads and the connectivity of the network. Simulation experiments are conducted to evaluate the performance of our algorithm in terms of the number of clusterheads, i>reaffiliation frequency, and dominant set updates. Results show that our algorithm performs better than existing ones and is also tunable to different kinds of network conditions.

1,419 citations


"Device-to-Device Communications for..." refers background or methods in this paper

  • ...As pointed out in [10] and subsequently by [15] a major challenge in the clustering based system design is the management of clusters in the presence of UE mobility....

    [...]

  • ...Specifically, [10] demonstrated that in order to avoid frequent CH changes, it is desirable to elect a CH that does not move quickly....

    [...]

  • ...CH selection algorithms for ad-hoc networks have long been a topic of research; see [10] and the references therein....

    [...]

  • ...We refer to the detailed algorithm descriptions and investigations related to highly mobile scenarios in clustering systems in [10] and [15]....

    [...]

  • ...Clustering algorithms for multi-hop packet radio, wireless sensor and adhoc networks have been the subject of much study; see [10] and its references....

    [...]

Journal ArticleDOI
TL;DR: The 3GPP Long Term Evolution system is used as a baseline for D2D design, some of the key design challenges are reviewed, and solution approaches that allow cellular devices and D1D pairs to share spectrum resources and thereby increase the spectrum and energy efficiency of traditional cellular networks are proposed.
Abstract: Device-to-device (D2D) communications underlaying a cellular infrastructure has been proposed as a means of taking advantage of the physical proximity of communicating devices, increasing resource utilization, and improving cellular coverage. Relative to the traditional cellular methods, there is a need to design new peer discovery methods, physical layer procedures, and radio resource management algorithms that help realize the potential advantages of D2D communications. In this article we use the 3GPP Long Term Evolution system as a baseline for D2D design, review some of the key design challenges, and propose solution approaches that allow cellular devices and D2D pairs to share spectrum resources and thereby increase the spectrum and energy efficiency of traditional cellular networks. Simulation results illustrate the viability of the proposed design.

1,391 citations


"Device-to-Device Communications for..." refers background or methods in this paper

  • ...To benefit from network-controlled D2D communication [2], [3], we propose that the NSPS solution be based on network-assisted underlay D2D communication solutions in such a way that, in the absence of network coverage, PS UEs take over some of the functionality of the network....

    [...]

  • ...Similarly, European agencies are working together in the Electronic Communications Committee of the the European Conference of Postal and Telecommunications Administrations to establish a harmonized frequency band for public safety broadband services and to evaluate the spectrum needs for a public protection and disaster relief (PPDR) communication system....

    [...]

  • ...In this context, continuous beacon transmission means that a PS UE transmits a beacon in every time slot that is defined as a PDR. Alternatively, a PS UE may transmit with a certain beacon transmission probability that helps reduce the overall beacon collisions in the system [11]....

    [...]

  • ...[9] ‘‘User requirements and spectrum needs for future European broadband PPDR systems (wide area networks),’’ Tech....

    [...]

  • ...However, the drawback is the higher beacon load in the system, which increases the PDR collisions and thereby the discovery and cluster formation time in addition to the energy consumption....

    [...]

Journal ArticleDOI
TL;DR: A novel edge caching scheme based on the concept of content-centric networking or information-centric networks is proposed and evaluated, using trace-driven simulations to evaluate the performance of the proposed scheme and validate the various advantages of the utilization of caching content in 5G mobile networks.
Abstract: The demand for rich multimedia services over mobile networks has been soaring at a tremendous pace over recent years. However, due to the centralized architecture of current cellular networks, the wireless link capacity as well as the bandwidth of the radio access networks and the backhaul network cannot practically cope with the explosive growth in mobile traffic. Recently, we have observed the emergence of promising mobile content caching and delivery techniques, by which popular contents are cached in the intermediate servers (or middleboxes, gateways, or routers) so that demands from users for the same content can be accommodated easily without duplicate transmissions from remote servers; hence, redundant traffic can be significantly eliminated. In this article, we first study techniques related to caching in current mobile networks, and discuss potential techniques for caching in 5G mobile networks, including evolved packet core network caching and radio access network caching. A novel edge caching scheme based on the concept of content-centric networking or information-centric networking is proposed. Using trace-driven simulations, we evaluate the performance of the proposed scheme and validate the various advantages of the utilization of caching content in 5G mobile networks. Furthermore, we conclude the article by exploring new relevant opportunities and challenges.

1,098 citations

Proceedings ArticleDOI
14 Sep 2003
TL;DR: This paper proposes the Unified Cellular and Ad-Hoc Network (UCAN) architecture for enhancing cell throughput, while maintaining fairness, and refine the 3G base station scheduling algorithm so that the throughput gains of active clients are distributed proportional to their average channel rate.
Abstract: In third-generation (3G) wireless data networks, mobile users experiencing poor channel quality usually have low data-rate connections with the base-station. Providing service to low data-rate users is required for maintaining fairness, but at the cost of reducing the cell's aggregate throughput. In this paper, we propose the Unified Cellular and Ad-Hoc Network (UCAN) architecture for enhancing cell throughput, while maintaining fairness. In UCAN, a mobile client has both 3G cellular link and IEEE 802.11-based peer-to-peer links. The 3G base station forwards packets for destination clients with poor channel quality to proxy clients with better channel quality. The proxy clients then use an ad-hoc network composed of other mobile clients and IEEE 802.11 wireless links to forward the packets to the appropriate destinations, thereby improving cell throughput. We refine the 3G base station scheduling algorithm so that the throughput gains of active clients are distributed proportional to their average channel rate, thereby maintaining fairness. With the UCAN architecture in place, we propose novel greedy and on-demand protocols for proxy discovery and ad-hoc routing that explicitly leverage the existence of the 3G infrastructure to reduce complexity and improve reliability. We further propose a secure crediting mechanism to motivate users to participate in relaying packets for others. Through extensive simulations with HDR and IEEE 802.11b, we show that the UCAN architecture can improve individual user's throughput by up to 310% and the aggregate throughput of the HDR downlink by up to 60%.

509 citations


"Device-to-Device Communications for..." refers background in this paper

  • ...Furthermore, ad-hoc relaying stations can not only increase the system capacity, but also reduce the transmission power for mobile hosts and extend the system coverage [5]....

    [...]