Device-to-device (D2D) communication is one of the most recent advancements in wireless communication technology. It was introduced in cellular communication technology by the 3rd Generation Partnership Project (3GPP) to lay a foundation for the evolving 5G architecture. It has now emerged as a promising technology for proximate devices. It enables proximate devices to communicate directly without the involvement of a third party network infrastructure. Researchers are analysing various methods to facilitate the smooth integration of D2D communication technology into the existing network system architecture. This paper lists all the different possible modes of operation in D2D communication based on the varying use-case scenarios and highlights the security and privacy requirements for D2D communication. Some of the recent authentication proposals for D2D communication technology are further reviewed, and their security and privacy capabilities are analysed. Apart from authentication, we also reviewed some recent proposals of access control in D2D and highlighted the security issues addressed. We then identified the open issues that prevail in implementing D2D technology in a real-world scenario for future researchers, emphasising the existing authentication and access control techniques in D2D communication.
翻译:设备对设备(D2D)通信是无线通信技术的最新进展之一,是第三代伙伴关系项目(3GPP)在蜂窝通信技术中引入的,为不断发展的5G结构奠定基础,现在它已成为有希望的近地装置技术,使近地装置能够在没有第三方网络基础设施参与的情况下直接通信。研究人员正在分析各种方法,促进D2D通信技术顺利融入现有的网络系统结构。本文根据不同的使用情况列出了D2D通信中所有可能的不同运作方式,并着重介绍了D2D通信的安全和隐私要求。最近对D2D通信技术的一些认证建议得到了进一步审查,并分析了其安全和隐私能力。除了认证外,我们还审查了最近在D2D接入控制方面提出的一些建议,并强调了所处理的安全问题。我们随后查明了未来研究人员在现实情景中应用D2D技术时普遍存在的未决问题,强调D2D通信中现有的认证和访问控制技术。