Fig 3 - uploaded by Zeeshan Kaleem
Content may be subject to copyright.
D2D discovery frame structure: (a) 3GPP LTE HD mode frame structure; (b) Proposed IB-FD frame structure for D2D discovery.

D2D discovery frame structure: (a) 3GPP LTE HD mode frame structure; (b) Proposed IB-FD frame structure for D2D discovery.

Source publication
Article
Full-text available
Device-to-device (D2D) communications is the integral part of pub- lic safety (PS) communications. However, the most important requirement is the users’ rapid discovery to timely communicate the emergency information. The existing half-duplex (HD) results in large time delays because it cannot transceive during same time slot. In-band full duplex...

Contexts in source publication

Context 1
... structure design affects the reliability and efficiency of the D2D discovery scheme. In Fig. 3a, 3GPP LTE proposes the frame structure for D2D discovery in HD mode that reserves UL radio resources. To ensure QoS, 3GPP LTE has reserved 44 resource blocks (RBs) in frequency domain for the period of 64 ms (subframes). These resources are periodically repeated after every T = 10 sec in time domain and during this period, the ...
Context 2
... order to fill this gap, we propose the frame structure for IB-FD system. This frame structure enables the possibility of two way communication during the same time and frequency block. From Fig. 3b, it can be noticed that any user transmitting the beacon to find a neighbor can also listen or receive the beacon during the same time slot because of FD characteristics. Thus, in IB-FD mode more user can be discovered during the first 64ms as compared with HD mode. This results in less discovery time in IB-FD mode because of less ...

Similar publications

Article
Full-text available
Time–frequency localisation of intermittent dynamics in a bistable turbulent swirl flame - Volume 882 - Zhiyao Yin, Michael Stöhr
Article
Full-text available
With the rapid development of information technology, whether it is with regard to the personalized recommendation of the business or network warning by the public security organ, the identification of online users is a very important research topic. The user’s web browsing behavior data contains potential behavioral characteristics, in this paper,...
Article
This paper presents a new technique for discerning corrosion in steel bars using guided ultrasonic waves with an improved signal processing technique. A mild steel bar has been subjected to accelerated corrosion. Information concerning variation in spectral traits associated with the spread of corrosion has been discerned. Dispersion curves for the...

Citations

... This method will cause some interference, security, and synchronisation issues. In the literature, many device discovery algorithms are proposed for both centralised and distributed methods [89][90][91][92][93][94][95][96]. ...
... To improve spectrum efficiency and reduce device discovery delays, a public safety full-duplex device discovery scheme was proposed [95]. In this method, there is a possibility of switching the device discovery mode from full duplex to half duplex and vice versa based on the QoS requirements. ...
... Kallem, Z. et al. [95] Proposed a public safety priority based in-band full duplex frame structure. A time efficient resource allocation scheme is used to convert a half duplex mode of operation to a full duplex mode when the half duplex mode fails to support the available resources. ...
Article
Full-text available
Fifth generation (5G) is a recent wireless communication technology in mobile networks. The key parameters of 5G are enhanced coverage, ultra reliable low latency, high data rates, massive connectivity and better support to mobility. Enhanced coverage is one of the major issues in the 5G and beyond 5G networks, which will be affecting the overall system performance and end user experience. The increasing number of base stations may increase the coverage but it leads to interference between the cell edge users, which in turn impacts the coverage. Therefore, enhanced coverage is one of the future challenging issues in cellular networks. In this survey, coverage enhancement techniques are explored to improve the overall system performance, throughput, coverage capacity, spectral efficiency, outage probability, data rates, and latency. The main aim of this article is to highlight the recent developments and deployments made towards the enhanced network coverage and to discuss its future research challenges.
... All of the methods investigated maximize accuracy while minimizing algorithm complexity and discovery error, according to the simulation findings. A D2D system for priority-based full-duplex device detection in public safety was suggested by Kaleem et al. 22 The results show that in-band full duplexing outperforms half-duplexing on radio resources. The results show that the suggested strategy also decreased discovery time by 37%. ...
Article
Full-text available
Multihop device‐to‐device (D2D) communication is a promising advancement since it allows wireless users in close proximity to communicate directly with one another without using base stations (BSs). With two nearby users, this technology intends to keep up with the accelerating development of mobile devices and the rising demands of local traffic loads. High‐data‐rate short‐range transmission is made possible by this paradigm, which also lowers network backhaul expenses while improving end‐user experience, spectral efficiency (SE) and network coverage. In order to maximize the cell's overall sum rates, this article examines the problem of selecting the optimal M‐D2D linkages and cellular users (CUs) to form spectrum‐sharing partners while taking quality of service (QoS) and energy efficiency (EE) needs into consideration. This study examines the use of a channel assignment system and a power allocation technique to manage interference in D2D communication scenarios involving many hops (more than one hop). The suggested channel assignment approach is based on the Hungarian method, but the power allocation system is based on the time‐efficient enhanced Harris hawks optimization (HHO) and red fox (RF) algorithms. A genetic algorithm (GA)‐based methodology and various baseline approaches are used to compare the effectiveness of the suggested system. Because it combines exploitation and exploration using a memory‐based local search methodology and a perturbation mechanism, the suggested approach outperforms the GA in simulations. The results clearly demonstrate that the suggested method increases EE by up to 13% by producing the appropriate channel and power assignment for CUs and M‐D2D users.
... The performance analysis showed that the proposed scheme protects the privacy with an ideal efficiency. The authors in [27] proposed a public safety full duplex device discovery for the D2D system that is empowered time-efficiently using the IB-FD framework. The proposed framework emphasizes the aim to increase the spectral efficiency and minimize the delay in device discovery on public safety devices. ...
Article
Full-text available
Device-to-device (D2D) communication produces a new dimension in the mobile environment, easing the data exchange process between physically neighboring devices. To achieve an effective utilization of available resources, reduce latency, improve data rates, and increase system capacity, D2D communication utilizes nearby communicating devices. The mobile operator’s action to collect the short-range communications for maintenance of the proximity-based services and improve the performance of networks drives the development of D2D. This paper presents an extensive review of proposed solutions aiming to enhance the security in D2D communication. The main goal of the research is to present an extensive review of the recent advances in various D2D domains such as the discovery process, mode selection schemes, interference management, power control techniques and finally the mode selection for D2D applications for 5G technologies. Additionally, we highlight the open problems and identify the challenges with regard to the D2D communication problem.
... Recently, Kaleem et al. [7] proposed a D2D discovery maximization iterative algorithm to reduce the users' power consumption while the power-limited situations, they focused on discovering more users in public safety scenarios by adopting the concept of open-loop power control. In [8], in order to improve spectral efficiency, Kaleem et al. proposed the frame structure for in-band full-duplex (IB-FD) system with prioritized public safety (PS) users in resource allocation and time-efficient device discovery resource allocation scheme. ...
Article
Full-text available
In the scenario where multiple device-to-device (D2D) users and cellular users coexist, the large number of D2D users not only results in the shortage of spectrum resources but also brings interference to the communication of cellular users. In this paper, we establish a clustering model centered on cellular users and propose a resource allocation algorithm based on a D2D clustering model. On the basis of ensuring the throughput requirements of cellular users, this algorithm reconstructs various matrices in the graph theory through probability models, sets the priority of D2D pairs, and maximizes the number of user accesses under interference tolerance. Besides, on the optimization of the number of users, we adopt the Rubinstein game model to adjust the game order according to the priority and optimize the bandwidth allocation mode, so as to improve the overall throughput of the network. Simulation results show that the proposed algorithm can increase the number of users and the network throughput, while shortening the spectrum allocation time by more than half.
... Besides, anyhow continual searching, this issue turns out to be more basic. Hence, the researchers in [17][18][19] have been given energy efficiency device discovery schemes while enhancing the performance of the system. ...
Article
Full-text available
Proximal device discovery is an essential initial phase in the installment of a device-to-device communication system in cellular networks. Therefore, an efficient device discovery scheme must be proposed with characteristics of minimum latency, discover maximum devices, and energy-efficient discovery in dense areas. In this paper, a bat echolocation-based algorithm derived from the bat algorithm is proposed and analyzed to fulfill the requirement of a proximal device discovery procedure for the cellular networks. The algorithm is applied to multiple hops and cluster devices when they are in a poor coverage zone. In this proposed algorithm, devices are not required to have prior knowledge of proximal devices, nor device synchronization is needed. It allows devices to start discovering instantly at any time and terminate the proximal device discovery session on completion of the discovery of the required proximal devices. Finally, device feedback is utilized to discover the hop devices in the clusters and analyze proximal discovery in a multi-hop setting. Along with this, a random device mobility pattern is defined based on human movement, and the device discovery algorithm is applied. The device discovery probability is calculated based on the contact duration and meeting time of the devices. We set up an upper bound less than 10 ms in long-term evolution of running time of the bat echolocation-based algorithm; this upper bound signifies the maximum degree of device discovery (more than 75% of the system) and the total number of devices. The outcomes thus imply that the proposed bat echolocation-based algorithm upper bound is better than 10 ms.
... Performance results accomplish privacy defense with standard efficiency. A full-duplex allowed time-efficient DD protocol is proposed in [14] for public safety using IB-FD. A framework for IB-FD structure focus on public safety devices is recommended to reduce DD delay and rise spectral efficiency. ...
Article
Full-text available
Device to Device (D2D) communications is a candidate technology for the fifth-generation (5G) and beyond mobile networks and certainly that results in high throughput, less energy consumption, reduce delay, and data traffic offload. Proximity services are the key enablers of D2D communications. A D2D technology boosts the performance and capacity of a conventional cellular system through the proximity services. To initiate the proximity services, Device Discovery (DD) is one of the the primary tasks. A DD makes the decision for effective D2D communications in terms of accuracy, speed, and minimum energy consumption. To discover the neighbor devices, the discovery signal is transmitted directly or through some access points. The discovery signal is affected by invaders during transmission which causes inaccuracy, energy consumption, and latency. Therefore, security and privacy issues must be addressed, especially in discovery signal transmission. In this paper, security and privacy issues in DD are highlighted. It is comprehensive and proves that in-band is much better than out-band with practical and technological reasons. To enhance the scope of the research, network level, and system level Security and Privacy (S&P) issues in the distributed and centralized systems environment with or without central management are surveyed. Along with an extensive survey is provided for the most recent work on DD concerning security and privacy issues, and comparison among in-band and out-band DD is made. In the end, open issues are identified as future work on DD security and privacy in D2D communications. It is a novel survey in terms of the security and privacy aspects of DD with possible suggested solutions for readers' motivation.
... Meanwhile, due to the benefits and wide deployments of the relay networks [21], the integration of FD mode into the cooperative communication systems can provide promising improvements in signal coverage, transmission reliability, and spectral efficiency. Therefore, many efforts have been devoted to study the potential of the FD relay systems in the literature [22][23][24][25][26]. ...
... Fig. 7 shows the SEP of the considered AF-FD relay system versus the average SNR when BPSK modulation (α = 1, β = 2) and optimal power allocation are used. The analytical SEP is obtained using (24) for the case of fixed gain and (25) for the case of variable gain. We investigate two cases for the direct link channel gain and the RSI, i.e.Ω R = −20 dB, Ω 3 = 0.1 and Ω R = −10 dB, Ω 3 = 0.01. ...
... After some mathematical manipulations, we obtain the SEP f of the considered system as in (24). ...
Article
In this paper, we analyze the performance of a full-duplex (FD) amplify-and-forward (AF) relay system under various cases of relaying gains and channel state information conditions. Specifically, we consider the case that the FD relay node uses either fixed or variable gain for relaying under perfect and imperfect channel state information (CSI). For the case of imperfect CSI (I-CSI), we derive the exact expressions for the outage probability (OP), throughput, and symbol error probability (SEP) of the considered system. For the case of perfect CSI (P-CSI), we can provide approximate expressions of OP, throughput, SEP, and ergodic capacity. We also propose an effective power allocation scheme for the FD relay node to reduce the effect of residual self-interference (RSI). Both analytical and simulation results show a significant impact of RSI on the system performance. In particular, when RSI is small the variable-gain relaying can provide better performance than the fixed gain. However, when RSI becomes large these two relaying schemes have similar performance. In this situation, using the proposed optimal power allocation scheme can improve the system performance, especially for the case with weak direct link.
Article
Full-text available
To meet the growing demand for increased data traffic and support advanced services in various applications, the introduction of 5th generation (5G) networks offers enhanced flexibility compared to previous network generations. Docker's container-based platform plays a crucial role in enabling highly portable workloads for 5G communication. This study extends the implementation of Docker for IP security purposes, with the evaluation conducted using Free5GC. The paper presents two 5G deployment options: a Docker-based implementation using Ansible and a Virtual machine-based implementation utilizing Free5GC open source and UERANSIM. The evaluation of results is performed through the utilization of Python code and Linux commands. The proposed solution empowers network operators to ensure the confidentiality of users' data, addressing the need for secure communication in the 5G ecosystem.
Chapter
Device‐to‐device (D2D) is a key enabling technology for the fifth‐generation Internet‐of‐Things, where the global number of D2D connections specifically is expected to reach 14.7 billion devices by 2023. In D2D communication, the spectrum can be shared between D2D and cellular users via two methods, namely, in‐band (licensed) and out‐band (unlicensed) communication. The integration of D2D in the network requires a substantial modification in both core and access networks to support the smart services in future innovative infrastructures. User equipment communicates through radio network links and core network in conventional cellular communication. Efficient discovery of the nodes in proximity is fundamental to the D2D communications. Vehicle‐to‐vehicle communications have attracted great interest due to the potential of improving traffic safety, reducing energy consumption, and enabling new services related to intelligent transportation systems. Visible light communication‐based D2D can potentially be a venue for more structured research and development efforts in near future.