Professional Documents
Culture Documents
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. <VOL>, NO. <NO>, <MONTH> 2017 1
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
2 IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. <VOL>, NO. <NO>, <MONTH> 2017
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
MANZOOR et al.: A SURVEY ON SOCIAL-AWARE D2D COMMUNICATIONS 3
SA D2D Throughput
Social-Tie Optimization
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
4 IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. <VOL>, NO. <NO>, <MONTH> 2017
uplink or downlink, or even both can be reused for D2D information becomes available to the public. There are also
communications as an underlay. As per the recent available some cases, where we need grouping mechanism based on
literature, the most common approach is to exploit the cellular relative distance and additional context data. Thus, the protec-
networks’ uplink spectral resources [37], [38]. The uplink tion mechanism for D2D communications must be considered.
radio resources are mostly underutilized as compared to the As proximate devices are more vulnerable due to the limited
downlink radio resources, because most CUs would rather computational capacity of mobile devices for security and
download data from the cellular network. In underlay mode, privacy related computation. D2D communications security
the system spectral efficiency can be improved drastically. and privacy issues are still an open challenge.
However, the interference caused due to the co-channel D2D 5) Energy Efficiency: A major concern that originates in
deployment with CUs becomes quite challenging. The existing cooperative D2D communications is the energy consumption
research looks at only the choice when the radio resources of mobile D2D nodes, as they are typically battery powered.
are applied statistically, without considering present load con- Therefore, from proximity peer discovery process to the design
ditions in uplink/downlink and interference patterns. Such of resource allocation schemes need to be energy efficient
dynamic features bring further complexity and challenges. [45]. Moreover, an additional challenge of power consumption
Hence, it requires designing of adaptive, efficient, simple, and has emerged due to the penetration of mobile social network
low-cost resource allocation approaches. based applications such as Facebook, Weibo, and Twitter.
3) Interference Management: Among different technical These applications generate a steady flow of data traffic that
challenges in D2D communications, interference management is continuously causing the mobile nodes to constantly shift
is considered as one of the most critical issues in the underlay between idle and connected states. Thus, such transitions
cellular networks. CU spectral resource sharing is the preferred from one state to another not only cost energy consumption,
mode to increase the overall system spectral efficiency but but also induce too much signaling overhead in the cellular
induces a severe interference problem [39]–[41]. For instance, system [35], [46]–[49]. Therefore, for D2D communications
when multiple D2D pairs and CU share the same spectrum successful implementation in practical scenario necessitates
portion, each observes an elevated interference. The intro- energy efficient solutions.
duction of D2D communications underlay cellular network
changes to two-tier infrastructure, which includes conventional
macrocell layer and D2D layer communication. However, the B. Socially-Unaware D2D Communications’ Applications
D2D layer is an unplanned and random distribution of D2D
nodes. This new architecture introduces significant gains in The emergence of affordable wireless smart devices, cou-
terms of system throughput, coverage, end to end latency, QoS pled with innovative applications and new services, brings
and energy efficiency if designed carefully. Nonetheless, it new challenges to cope with the explosive data growth rate in
brings in several technical challenges and issues for both D2D wireless cellular networks. D2D communication is anticipated
nodes and CUs in terms of interference management between to be one of the main supported technologies to offload the
the network elements in sharing (underlay) mode. Hence, the tremendous mobile traffic at the base station (BS) and future
system necessitates managing of new interference situations. proximity communication needs. It is envisioned that D2D
It is doubted that if such elevated interference is not properly communications’ scenarios will further flourish. This includes
controlled, it would deteriorate the prospective gains promised emergency, public safety circumstances and vehicle-to-vehicle
by D2D communication layer. (V2V) improved traffic safety situations. Moreover, it covers
4) Security and Privacy of D2D Communications: Due social-networking and peer-to-peer connections during cover-
to the exposed nature of wireless communication between age issue or in case of congestion. D2D communication is
D2D users, the information exchange between them becomes also considered economical and energy efficient, when sharing
more vulnerable to threats. The security threats comprise or disseminating specific contents between proximity wireless
of impersonation attack, threats related to data transmission devices or for other purposes such as online gaming [35].
and D2D users’ privacy [42], [43]. In addition, the greater Similarly, for disseminating information to multiple devices in
the number of D2D communication devices, the greater is close proximity, D2D enables broadcasts/multicasts or relays
the number of adversaries to attack the D2D networks. This traffic using intermediate devices to forward data to edge nodes
stresses the importance of security and privacy in the design involving multi-hoping. In addition, the surplus resources
of new wireless mobile communication. Furthermore, D2D (communication and computation) on cellular mobile devices
communication is mostly dynamic and the status of sur- can be utilized to stimulate beneficial cooperation among D2D
rounding environment may change frequently [44]. There are users [50].
numerous possibilities of communication that share data with Undoubtedly, D2D communication is a promising opportu-
diverse levels of sensitivity depending on context factors i.e., nity for the cellular network operators. It holds huge potential
social-relationship. We share our different data context during in contributing significant new revenue streams at the heart
D2D communications e.g., our location, time and spectrum of future internet services. These services include valuable
among different people. For example, consulting with friends, communication mode for public safety organizations and ex-
colleagues, and family is much less sensitive, because the citing commercial (e.g., marketing) use cases. It has enormous
information remained available among known people. On prospects to support the design of a wide range of new local
contrary, consulting a stranger is more sensitive, because the services for CUs that can bring new revenue opportunities.
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
MANZOOR et al.: A SURVEY ON SOCIAL-AWARE D2D COMMUNICATIONS 5
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
6 IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. <VOL>, NO. <NO>, <MONTH> 2017
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
MANZOOR et al.: A SURVEY ON SOCIAL-AWARE D2D COMMUNICATIONS 7
Community 2
Socially-Aware D2D Resource Community 1 Peer Discovery Based on Social
Socially-Aware D2D Peer Discovery
Allocation and Interference Community
and Link Admission
Management
Figure 4: Categorization of technical problems in socially- Figure 5: An illustration of socially-aware D2D peer discovery.
aware D2D communications The upper part of the figure shows the social-ties and trust
scenario while the lower part of the figure represents social-
community based peer discovery.
resource allocation and interference management are highly
dependent on each other, thus, combined together. computations. Consequently, it reduces energy consumption
and also facilitates the core network by offloading the peer
A. Socially-Aware D2D Peer Discovery and Link Admission discovery process. Although, the proposed mechanism offers
D2D communication is an effective proximity based an improvement in peer discovery as compared to conventional
paradigm that enables a user to enjoy the benefits of direct direct mechanisms. However, it is suitable only for the users
communication with high data rates and low delays. However, having the same application subscriptions and interests, which
before availing such a favorable service, it is needed to find cannot cope more generalized D2D scenarios. Further, since
a suitable peer within the proximity as presented in Figure user devices are resource constrained, they cannot perform
5, which is a challenging task. There are several issues within challenging computations. A suitable solution is to delegate
this domain that needs to be coherently addressed. Trust is the the computation task to the cloud while not compromising
foremost issue that has attracted the attention of the scholastic user’s privacy. Focusing on this point, Mass et al. [113] put
community. To address this issue, Mao et al. [111] proposed forward a client-server system that utilizes the audio data of
a solution that suggests social and position based cooperation users having social-ties in order to automatically activate D2D
among users to select a trusted peer. In more detail, the communications among them. More specifically, the audio
authors introduced a joint closeness metric that measures the data is sent to the cloud to check whether the devices share
two-layered social position relationship in a unified manner. same proximity. Cloud performs machine learning analysis
After calculating the metric scores of possible peers, the over audio data in terms of grouping the devices by audio
values are sorted and finally the most suitable peer is selected similarity. If the devices are detected in the same proximity,
for enabling D2D communications. Somehow, this proposal the cloud server notifies the devices to make a peer based on
resolves the trust issue while incorporating social-relationship, the coordination plan. Once the users obtain such information
but it assumes that all the possible users are cooperative, which from the cloud server, they build a connection with their group
is not a realistic scenario. mates through Bluetooth connections and finally share their
Conventional networks are needed to perform a periodic files. Although this proposal provides a low latency framework
check as well as to update its geographical vicinity. This to offload computation, it is not energy efficient as it needs to
task requires continuous signaling, and thus causes higher send data to the cloud in a periodic manner.
battery consumption. Furthermore, finding an appropriate peer A parallel direction in D2D communications is to make
with the same application subscription within the proximity is groups of peers based on their social-ties of affinities. In such
also troublesome. To address these issues, cloud computation schemes, users are considered as nodes and the relationships
could be a better choice for offloading the computation of among them are taken as links. Thus, these models make a
finding a most suitable peer with the same application sub- network topology. Choi et al. [114] introduced the concept
scription. Working towards this direction, Prasad et al. [112] of device sociality, which is based on social-relationships.
proposed an application-based peer discovery mechanism that More precisely, to check the strengths of these relationships,
takes the advantage of cloud-based social-proximity. More the authors formulated the concept of social-affinity models.
precisely, a fine-grained proximity tracing mechanism helps Three types of such models are proposed including personal,
UE for D2D peer discovery, only when it shares the same organizational and mixture of the two. Moreover, most salient
proximity to the peer with the same application subscription. predicting variables are found as SMS and emails for personal
Formally, a user obtains assistance from cloud to offload and organizational affinity, respectively.
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
8 IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. <VOL>, NO. <NO>, <MONTH> 2017
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
MANZOOR et al.: A SURVEY ON SOCIAL-AWARE D2D COMMUNICATIONS 9
the authors proposed to utilize physical resource blocks as optimal structure of the beamformer, as a linear combination
a resource unit. Initially, the regular CUs’ resource blocks of weighted channel vectors. Also, the transmit beamformer is
are taken as orthogonal. The transmission power of D2D obtained in a closed form as a function of the trust degree for
transmitters and CUs are considered as constant. Next, the an achievable rate. This can explicitly show an effect of the
objective is to assign appropriate resource blocks of CUs to trust degree on the beam-forming design. Comparing to the
D2D for achieving better social-group utility. Although, the conventional schemes, the performance enhancement of the
system aggregate utility rate is increased from 16% to 56% proposed beam-forming is verified by the numerical results.
without compromising the fairness of resource sharing. In the pursuit to enhance the spectrum efficiency and energy
Different from [117] and [118], Li et al. [119] consid- efficiency of D2D-based wireless caching networks, Wu et al.
ered the social-information to assist resource allocation by [122] focused on the social-interaction based resource alloca-
establishing a socially-aware resource allocation. Specifically, tion to guarantee the quality of service (QoS) requirements of
the social-characteristics of community and centrality are involved D2D users. Taking both the physical link condition
utilized to aid resource allocation for multiple D2D pairs and and social-information into consideration, the authors first nar-
CUs. Then, the authors proposed an optimal social-community row the candidate set of content servers (CSs) for each content
aware resource allocation algorithm. In this algorithm, D2D requester (CR) to reduce the computational complexity. Then a
pairs are stimulated to share the resources of the CUs in the proper selection of CSs is executed for each CR by evaluating
same community or outside the community. The presented the probability of successful data delivery via D2D links. The
approach results showed 20% to 50% reduction in time CR has to seek help from the BS to receive desired contents in
complexity compared to prevalent works while still providing case of data transmission failed through D2D communications.
an optimal solution. Since the permission for jointly using In this scenario, the dedicated spectrum is assigned for data
the resources of underlying communities enhances the system transmission. In actual terms, resource allocation including
performance. Therefore, the connected communities utilizing spectrum and power are implemented for system performance
social-interactions outperformed the isolated one while reduc- enhancement, while guaranteeing the signal-to-interference-to-
ing the time complexity from 36% to 82%. However, the noise ratio (SINR) requirement. However, the authors over-
work only focused on controlling D2D spectrum resources looked to consider flexible contents’ caching probability and
and ignored the power control mechanism for social-ties. limited storage space of CUs.
A little different from the aforementioned works, Wang et The authors in [123] demonstrated the use of network
al. [120] studied the graph matching theory in the social net- knowledge from underlying MSNs to improve local D2D
work analysis to systematically enhance the design of wireless services in the cellular networks. Particularly, social-ties and
networks. The authors focused on radio resource allocation file centrality measures are incorporated from social-domain
and presented a systematic approach of generalizing social to present the socially-aware D2D communication scheme for
networks. The bipartite graph theory is applied for appropriate the LTE-A networks. Here, the authors dealt with D2D users’
resource allocation in the wireless networks. A bipartite graph- cluster formation, cluster head selection, and radio resource
ical method was introduced for dynamic spectrum allocation allocation problems. More precisely, clusters are formed itera-
in wireless mesh networks for simultaneous consideration of tively. The cluster head selection is based on two factors, such
bandwidth utilization and starvation problems. More precisely, as UEs’ closest relationships with other UEs, and the cached
partner selection is made on contents interest similarity, trust files are requested by more users. Subsequently, half and full
or strong connection, and channel selection that could transmit duplex approaches are employed for radio resource allocation.
the required contents completely. Such scenario is sketched by The simulation results showed that the proposed D2D com-
incorporating bipartite graph in the underlying proposal. The munication scheme can significantly improve the spectrum and
hierarchical bipartite-based pairing and clustering are consid- energy efficiency of LTE-A cellular networks. It is observed
ered for multi-dimensional factors in terms of two stages. In that incentive for data sharing among the UEs is proportional
the first stage, a partner is selected and resource allocation is to the social-closeness. In addition, an effective method is also
optimized in the second stage. The consideration of multiple provided to employ the data extracted from underlying MSNs
domain factors (including physical distance, interest similarity, to improve network performance. In continuation of the same
mutual social-trust and cache capability of UEs) in stage 1, concept of OSN network information utilization, Semiari et
along with the incorporation of physical distance and accurate al. [124] investigated resource allocation optimization in D2D-
social-trust between cellular and D2D links in stage 2, ensure enabled small cell network. For that a two-sided one-to-one
the superiority of the presented system. Since the contents matching game problem is formulated, where every UE gets
sharing and resource allocation can be time-varying as well as one resource block (RB). In this game, users’ OSN profiles are
prone to estimation errors, therefore, improvement in terms of utilized considering the similarity between users’ interactions
robustness is still required to be investigated. (such as tagging or wall posting), interests and activities. In
For the multiple-input single-output (MISO) cooperative this proposed scheme, the authors allow exploitation of the
communication system, the authors in [121] provided a frame- fact that mobile users who are intensely connected in an
work for the trust degree based on beam-forming design. OSN are probably demanding similar types of data over the
Specifically, a trust degree quantifies the trustworthiness be- wireless physical network. Based on this fact, a matching game
tween nodes on relaying action and wireless channels. To is framed with peer effects, and the strategy of every user
maximize the expected achievable rate, the authors derived an is affected by the decisions of its peers. Its performance is
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
10 IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. <VOL>, NO. <NO>, <MONTH> 2017
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
MANZOOR et al.: A SURVEY ON SOCIAL-AWARE D2D COMMUNICATIONS 11
leveraged to improve D2D communications. While the social- cooperation quality, respectively. As cooperation throughput
reciprocity phenomenon is also considered a dominant social is not the only function of the wireless channel, therefore,
perspective. Social-reciprocity is usually noticed in general for throughput analysis, the corresponding function is derived,
public. It can be leveraged to promote cooperation among a and the notion of generalized degrees of freedom is utilized to
set of individuals having no social-trust. This will enable D2D investigate the system performance behavior. Particularly, an
nodes to exchange mutually beneficial dealings and making explicit formulation between generalized degrees of freedom,
all such users more contented. For instance, a user device is the social, and position relationships is established.
located at a place where the user has no trusted relations within Pan et al. [134] focused on D2D users’ relations, distance
the vicinity. Then he/she may cooperate with the strangers and their combined effects on relay selections. In this regard,
in the close vicinity by providing relay assistance to one three relay selection schemes are proposed, known as social-
another and get a better quality of D2D communications. based, distance-based and hybrid. However, the first two relay
The proposed approach was evaluated under real social data selection schemes consider social-ties and distance, respec-
sets (traces). The authors exhibited that the social-ties based tively. While the third scheme considers both the attributes
game solution is computationally efficient, immune to group (i.e., social-ties and distance together) when selecting a relay.
deviation, and offer a performance gain of 122% over the Moreover, social-ties strength among the users is gauged via
case of non-cooperative D2Ds. Similarly, Zhang et al. [130], contact history. Among the three relay selection schemes, it is
leveraged the social aspect among D2D users for cooperative observed that the hybrid approach can significantly enhance
networking to enhance the throughput gain. Specifically, the the performance of D2D cooperative communications.
social-tie structure knowledge among CUs is utilized, and Chen et al. [135] put forward a potential game-based
framed a social-trust based D2D relay selection mechanism. framework for cooperative networking known as social-group
The optimal solution is achieved considering the optimal utility maximization (SGUM) to investigate three network
stopping theory (finite-horizon), and a threshold structure is applications. These network applications are random access
presented that is stage dependent and monotonically non- control, database-assisted spectrum access and power control.
increasing. SGUM formulation takes into account both the users’ physical
Different from [6], [59] and [130], Wang et al. [131] coupling and social-interactions for making decisions in a
investigated the influence of selfish behavior on the overall distributive manner. In addition, both the social-group utility of
performance of D2D cooperative communications. For this, a each user and the weighted sum of the utilities of other users
physical-social model is presented, coupled with a graph to having social-ties are maximized. The authors showed that
get a matching solution between relay nodes and non-relay there exists a unique social-aware Nash equilibrium (SNE) for
nodes. In the proposed setup, a relay node is selected to assist both the applications, which include power control and random
in forwarding data to a non-relay node, which is supposed to access control. Moreover, it is demonstrated that when social-
get such information directly from the BS. Consequently, the ties strength increases player’s SNE migrates from the Nash
proposed arrangement of D2D nodes extended the coverage equilibrium strategy ( non-cooperative game) to the socially-
and enhanced the system throughput. From the evaluation optimal strategy in network utility maximization.
results, it is observed that those communities comprising Ometov et al. [136] aimed at promoting and further ad-
of more members are less vulnerable to social-selfishness. vancing the social-domain for D2D communications, while
However, the selected relay nodes are severely impacted by focusing on social-trust and sociality. They indicated that it is
the social-selfishness, when both the relay and non-relay nodes unlikely for D2D communications to be adopted extensively,
are equal in number. without leveraging the concept of sociality and trust cooper-
Socially-aware D2D communication is required to convert ation between the end users and the network operators. Con-
the social-relationship among users into useful information for sequent upon surveying several types of underlying incentives
the decision making processes of the corresponding physical with a main focus on sociality and trust. The authors proposed
D2D networks. In this regard, Xiao et al. [132] proposed belief a novel framework appropriate to build highly required in-
based stable marriage game to analyze socially-aware D2D centive aware D2D applications. The performance evaluations
communications. This framework enables each user to set up suggest that trust and social-aware direct connectivity have
a belief function with all other users. Furthermore, the function tremendous potential to ameliorate the network performance.
is utilized further to formulate a socially-aware preference The users’ mobility and D2D communications’ small cover-
for all possible actions. Here, belief function represents a age induce frequent handovers that cause network evaluation,
probability distribution over the potential social-connections mode, and peer selection problems. In this work [137], the
with other users. This can be public, private, static, and authors addressed the aforementioned issues by incorporating
dynamic belief functions. In addition, the authors investigated social-interactions. First, social-relationships are formed based
spectrum sharing problem for in-band D2D communications, on physical-social mode and the social-relationship metrics.
and presented how to leverage this framework and optimize This metric depends on contact history, social-similarity and
the socially-aware D2D communications. Mao et al. [133] in- contribution history. The social-learning based cooperative
vestigated the cooperation throughput among multiple mobile network evaluation enables users to lie together in a social-
nodes. The authors analyzed the cooperation signal via a ran- community for sharing and fusing local beliefs. Non-Bayesian
dom variable, which embodies joint effect of both social and social-learning is exploited for this purpose, in which both
position relationships to decide the cooperation probability and state space and signal space are considered as discrete and
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
12 IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. <VOL>, NO. <NO>, <MONTH> 2017
time is slotted for computation. Finally, social-relationship Unlike the works in [112] and [116], Datsika et al. [140]
dependent mode and peer selection are performed due to presented a socially-aware cooperative D2D MAC protocol
a dynamic environment, and improved the efficiency with (SCD2D) for D2D cooperation. It utilizes sociable UEs as
enhanced data rates. relays that improve the energy efficiency of D2D coopera-
tion by reducing power consumption. The SCD2D protocol
considers social-information of users for D2D cooperation,
D. Socially-Aware D2D Energy Efficiency
which results in a green energy efficient MAC protocol.
Energy efficiency of D2D communications is also a major The authors compared the results with existing works that
concern that arises in socially-aware D2D networks, since don’t consider the social-ties, and found that SCD2D protocol
mobile wireless devices are usually powered by a battery. utilized up to 44% and 58% lower battery power than the
Thus, proper selection in the pairing of D2D nodes should existing protocols. These results can help to develop more
be performed for D2D cooperation to utilize resources ef- efficient cooperative D2D protocols for both the cellular and
ficiently. To ensure fairness, the social-connections between D2D networks simultaneously.
users should be utilized to improve the QoS and the overall Nowadays, all smart-phones are usually equipped with
energy efficiency of D2D communications [10], [45], [138]. multiple radio access technologies (RAT) including LTE-A,
Therefore, both energy efficiency and QoS can be simultane- WiFi, and Bluetooth, which enable D2D communications.
ously improved by a proper grouping of D2D users in socially- Therefore, for framing energy efficiency optimization and
aware D2D structures [139]. resource utilization problems in D2D communications [138],
In socially-aware D2D communications, multiple devices air interfaces play a major role. Therefore, the authors in [141]
located in same proximity attempt to access the wireless deemed it necessary to analyze energy efficiency of WiFi and
medium. These interactions are affected by the users’ social LTE interfaces in different socially-aware D2D environments,
features. Since, such socially connected users have more and proposed a new model for WiFi. They explored that
possibilities to involve in D2D cooperation, however, the en- WiFi interface is a better option than LTE in many scenarios,
ergy consumption of mobile devices affects D2D cooperation. particularly if there is no requirement of high data rates. It is
In this regard, some research efforts are made to optimize realized by the authors that a mobile social network always
energy efficiency under socially-aware D2D network. Here, attempts to reduce the number of active interfaces that results
we present a brief review of such efforts. Wang et al. [72] in reduced power consumption. So, it is recommended that the
put forward a neighbor discovery technique for overlapping smartphones can be developed in such a way that the static
communities in D2D communication networks. This approach part in power utilization should be close to zero. Otherwise
uses the connection status between D2D nodes to detect the power consumption during communication would remain
overlapping community structure. Then overlapping nodes act linearly dependent on the data rate for a known distance.
as communication bridges to improve data sharing between In [142], the authors proposed a new architecture for the
the communities. It helps to adjust beacon detection rates dy- 5G cellular networks, which integrates both the energy har-
namically, which results in improved neighbor discovery rates vesting techniques and the social networking features in D2D
and reduced power consumption. However, achievement of communications. More precisely, they proposed two socially-
optimum beacon detection rates for overlapping users through aware D2D communication schemes; one is based on device
such technique is still challenging. In another work, Prasad relay and the other on device multicast. The device relay based
et al. [112] designed a social-application specific mechanism scheme only improved system throughput, while the device
for discovery, which enables D2D nodes to achieve 70% multicast based scheme improves both energy efficiency and
energy savings in a social-cloud region due to reduced fre- spectral efficiency.
quency of discovery procedures. In such social-cloud region, Summary: According to the state-of-the-art research con-
the probability of detection increases only when nodes are tributions in each aforementioned categories of technical prob-
sufficiently close to other nodes, while sharing the same lems; we propose a classification, in order to summarize the
application-specific interests. Such utilization of the cloud contributions as shown in Table I and Table II considering
application helps off-load the discovery phenomenon from the the employed techniques and utilized social features. All
LTE network as well as from the D2D network. Thus, a cloud- the research contributions in terms of technical solutions in
based solution is employed, which enables UEs to save battery different categories showed the interplay of the social-domain
consumption through reduced signaling loads. and physical domain. Among the social features, the majority
In [116], the authors proposed a cluster formation in which of the contributed solutions are based on social-ties and then
both physical and social-relationships between D2D nodes are comes social-trust. However, selfishness feature is mainly
incorporated. For this purpose, two multi-objective clustering used in throughput optimization problems. It is pertinent to
approaches are proposed, which include "Chinese restaurant mention here that all these contributions are merely based
process” (CRP) and other is an enhanced version of CRP that on human social-interactions, which include both offline and
is "distance-dependent Chinese restaurant process” (DCRP). online relationships. However, devices’ social-interactions are
Such a cluster formation approach enables each new node almost missing in the literature. Sociality of the device can
to select a cluster to improve its link data rate. It achieves be utilized where human-interactions are not required, for
significant energy efficiency over the existing physical distance instance, users’ applications at leisure, which include enter-
based techniques. tainment and gaming, non-confidential data sharing, and non-
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
MANZOOR et al.: A SURVEY ON SOCIAL-AWARE D2D COMMUNICATIONS 13
Table I: Classification of Socially-aware D2D communications’ technical problems based on social features
Technical Problems Utilized Social features
Technical issues References Year Employed Techniques Ties Trust Community Selfishness
Wang et al. [72] 2016 Overlapping communities detection method in D2D network, from - - Y -
which beacon detection rates can be identified.
Zhang et al. [74] 2015 Utilized beacon mechanism and leveraged social interaction - - Y -
information of community and centrality of cellular user.
Mao et al. [111] 2014 Joint social-position cooperation and partner selection algorithm - Y - -
based on available social and position information at mobile
terminals.
Peer discovery and Mass et al. [113] 2014 Mobile cloud based client-server system, where audio data from - Y - -
link admission D2D environment is used for proximity check in terms of grouping
the devices by audio similarity.
Prasad et 2014 Cloud based social proximity tracing, which offloads computation, Y - - -
al.[112] helps the UE trigger D2D pair discovery.
Choi et al. [114] 2015 Device sociality concept based on social relationships among Y - - -
network devices. Most salient predicting variables includes SMS and
emails for personal and organizational affinity.
Tan et al.[115] 2016 Peer discovery and match mechanism. Residual energy is leveraged - - Y -
for matching process.
Wang et al.[116] 2015 Admission policy using statistical information among D2D users, Y - - -
such as contact frequency and contact duration.
Gong et al. [117] 2013 SGUM game model utilizing social-relationships. Strength of Y - - -
social-ties greatly impacts SGUM.
Zhao et al. [118] 2015 Distributed algorithm based on SGUM game. - - Y -
Li et al. [119] 2015 Optimal social-community aware resource allocation algorithm - - Y -
leveraging the social-characteristics of community and centrality .
Wang et al. 2015 Hierarchical bipartite-based pairing and clustering under the umbrella Y - - -
[120] of graph matching theory are considered for resource allocation.
Ryu et al. [121] 2015 For MISO cooperative communication, trust degree based beam - Y - -
forming is designed.
Resource allocation Wu et al. [122] 2016 Taking physical link condition and social-information of D2D users, Y - - -
and interference system computational complexity is reduced.
management
Zhang et al. 2016 Cluster formation for the categorization of multiple D2D groups. Y - - -
[123] Half-duplex scheme and a full-duplex scheme are used for channel
sharing between the cellular links and the D2D links.
Semiariet al. 2016 Matching game for context-aware resource allocation problem is Y - - -
[124] formulated, based on utility functions that captures both physical and
social metrics.
Huang et al. 2017 Evolutionary game based subcarrier and power is framed Y - - -
[125] distributively, considering content, device and social domains.
Li et al. [126] 2016 Game theory is employed to reduce interference and framed utility Y - - -
maximization problem utilizing social and physical distance.
Mustafa et al. 2016 For interference management proximity based Poisson Point Process Y - - -
[127] is leveraged to model the spatial distribution of BS and D2D users,
while social interaction is modeled as Zipf based marks.
Chen et al. [6] 2016 Coalitional game approach for relay selection considering social-trust Y - - -
and reciprocity under real data traces.
Chen et al. [59] 2013 Coalitional game approach for relay selection considering social-trust - Y - Y
and reciprocity.
Zhang et al. 2014 Relay selection scheme leveraging social-tie structure knowledge Y Y - -
[130] among cellular users based on finite-horizon optimal stopping
criteria.
Wang et al. 2015 Graph theory based cooperative relay matching scheme for - - Y Y
[131] community and checking influence of selfishness.
Throughput Xiao et al. [132] 2015 Belief based stable marriage game to analyze socially aware D2D - Y Y Y
optimization communication
Mao et al. [133] 2016 Generalized degrees of freedom (GDOF) is used to study the - Y - -
behavior of the throughput in the linear region.
Pan et al. [134] 2016 Two relay selection schemes considering contact history (social-tie) Y - - -
alone and combined with distance for social-based relay and hybrid
based relay respectively.
Chen et al. [135] 2016 SGUM for relay selection and randomized distributed spectrum Y - - -
access algorithm.
Ometov et al. 2016 Towards Trusted, Social-Aware D2D Connectivity: Bridging Across - Y Y Y
[136] Technology and Sociality Realms
Meng et al.[137] 2017 Social-relationship metrics such as contact history, social similarity Y - - -
and contribution history are used, and then social learning based
cooperative network evaluation is performed.
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
14 IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. <VOL>, NO. <NO>, <MONTH> 2017
Table II: Classification of Socially-aware D2D communications’ technical problems based on social features
Technical Problems Utilized Social features
Technical issues References Year Employed Technique Ties Trust Community Selfishness
Wang et al. [72] 2016 D2D node discovery via overlapping communities detection method, - - Y -
which reduces power consumption.
Prasad et al. 2014 Exploiting cloud computing benefits for social application based Y - - -
[112] D2D node discovery that increases the probability of detection when
devices are in close proximity.
Wang et al. 2015 Cluster formation approach via multi-objective clustering i.e., CRP Y Y - -
[116] and DCRP.
Energy efficiency Datsika et 2016 D2D MAC protocol design, where sociable UEs cooperate as relays Y - - -
al.[140] that improve the energy efficiency of D2D communication by
reducing power consumption.
Hoeyhtyae et al. 2016 Analysis of power-efficient transmission mode, which includes LTE Y - - -
[141] and Wifi in different social-aware scenarios.
Jiang et al. [142] 2016 Efficient data dissemination via social-ties based energy harvesting Y - - -
device relaying scheme and the social-community-based energy
harvesting device multicast scheme.
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
MANZOOR et al.: A SURVEY ON SOCIAL-AWARE D2D COMMUNICATIONS 15
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
16 IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. <VOL>, NO. <NO>, <MONTH> 2017
mobility paths represent long contact duration for a D2D link. as a coalitional game for cooperative video multicasting. Then
Thus, different social impacts result in different content dis- distributed algorithm is devised for core solution (group for-
semination performances. Hence, hypergraph based socially- mation) for the coalition game. Finally, resource allocation is
aware framework exploited social-characteristics of mobile proposed for BS to deal with the nodes’ requests. The SoCast
users and abstracted multilayer information for improving framework has two phases, i.e., multicast and D2D phase.
content-centric delivery and caching capabilities. During the multicast phase BS multicasts packets and during
In case of a delay tolerant network (DTN), accessing data the D2D phase, nodes share missing packets among each other
is the main challenge because of changing mobility pattern through D2D links. Most of the cooperative video multicasting
of users’ devices. Hence, accessing data via conventional approaches demand for modification to air interface or video
cooperative caching technique is not adequate. As there is encoding schemes, or components of the system. However,
limited contact duration between user nodes, therefore, large SoCast has a much easy implementation on the client side,
data contents or data files cannot be transmitted from one node and has no compatibility issue with existing air interfaces and
to another during single contact duration. On the other hand, video encoding schemes. The performance of SoCast is tested
if data is fragmented and only part of a file is transmitted on real traces, which shows great improvement in the video
during each contact, then coupon collector problem arises perception quality for users.
that severely degrades data accessing performance. Owing to Conventional flooding of content requests and reply packets
which there is a serious issue of where to cache, and how generate overhead due to a large number of transmissions,
much data to cache in a DTNs. In this regard, Zhu et al. which don’t hold in a mobility scenario or content-centric en-
[153] addressed the problem by proposing a duration aware vironment. Therefore, Pu et al. proposed social-aware named
caching (DAC) protocol. The protocol utilizes community and data framework (sNDN) for enhancing cooperative content
centrality features of the social networking that is relatively retrieval [156]. sNDN groups together users to create a
stable to deal with the unpredictable or unstable network topol- friendship circle by utilizing social factors, such as similarity
ogy in DTN. Those nodes belonging to the same community in mobility pattern and requested contents. Then, routing
have a better probability to share their cached data contents tables are constructed containing friendship circles, encounter
with other nodes within the same community. Therefore, first frequency to navigate content request and reply between
nodes’ caching capability is calculated, since, within the same friendship circles. Finally, social properties are leveraged in
community some nodes have higher ability to share their friendship circle for searching final target as inner-friendship
cached data to same community members. Next, depending circle routing. The evaluation of sNDN results show not
on the nodes’ contact patterns data contents are cached. Trace- only conservation of cellular capacity but also outperform the
driven simulations show improvement in data access with DAC comparative social-unaware content retrieval mechanisms.
protocol. In social-trust based cooperative D2D communication, re-
2) Socially-Aware D2D Traffic Offloading: Mobile traffic laying users have heterogeneous physical distances and diverse
or data offloading is a compelling network technology for social distances. Those relay users having long social or physi-
mobile network operators (MNOs) to shed BS data traffic loads cal distances are less effective for cooperative communication.
over the D2D network without any capital and operational Therefore, relay probing is used for all the users to determine
expenditure. It is also very appealing to mobile users that cooperative communications gain. This problem is addressed
desires low delay experience and high data rates. Since mobile by Zhang et al in [130], as the authors leveraged social-ties
devices are carried by humans, which are connected with among device users. A cooperative D2D relaying framework
each other through online and offline social networks. Their is designed on the basis of social-trust taking both the physical
social-interactions can be devised in the D2D environment for distances and social-ties into consideration. Optimal stopping
increasing reliability, system capacity and overall system per- theory is implemented for deriving an optimal socially enabled
formance [154]. Social-relations among users play a vital role relay selection scheme, while maintaining a balance between
in linking proximate wireless devices. Social networking has performance and cost of relay probing. The simulation re-
the capability to redefine the approaches to access data through sults depict that underlying framework achieves a significant
the exploitation of social-ties among users. Subsequently, it throughput.
will help to utilize the network resources optimally. If the network connection is sensitive due to users’ mobility
There are two main issues in cooperative data offloading. then data cannot be offloaded successfully. To achieve an
One is how to motivate mobile users to help other mobile efficient data transmission, a stable network connection is re-
users, and second is how to implement coordination among quired. This approach is addressed by many researchers while
users for cooperation. To deal with these two critical issues, the exploiting social-ties among users, which is a characteristic of
authors in [155] have proposed social-aware video multi-cast the social networking. Social-ties can be strong or weak on
framework (SoCast) by leveraging social-ties for motivating the basis of contact duration or/and inter-contact time. Plenty
users to cooperate in data offloading. The SoCast framework of works focus on strong social-ties as it provides optimum
incorporates both the physical and social-domains, and two information about users’ request and mobility patterns, but
types of social-ties are considered i.e. social-trust and social- no sufficient work is done in terms of utilizing weak-ties.
reciprocity. The nodes are grouped together for sharing miss- Ioannidis et al. [157] dealt this problem by covering a large
ing video frames with each other on the basis of trust and reci- number of data requests and exploiting weak-ties in a mobile
procity. Initially, social-ties based group formation is framed social network. Users utilize their scarcely used contacts on
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
MANZOOR et al.: A SURVEY ON SOCIAL-AWARE D2D COMMUNICATIONS 17
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
18 IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. <VOL>, NO. <NO>, <MONTH> 2017
(e.g., a mobile device with sufficient energy budget) assists one Selfish User Selfish User
relay (e.g., mobile device with sufficient data usage budget).
However, in practical scenarios, surrogate/relay can assist
Strong Tie
multiple relays/surrogates for the joint task-data offloading Weak Tie
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
MANZOOR et al.: A SURVEY ON SOCIAL-AWARE D2D COMMUNICATIONS 19
considered a promising scheme. This is due to the fact that it communication overhead.
can be used to propose forwarding strategies for numerous dif- Selfish users pose adverse effects due to objective reasons,
ferent applications, such as single-source-multiple-destinations including UEs’ limited energy and buffer, device malfunction-
and multiple-sources-multiple-destinations. The performance ing, along with subjective reasons including social-relations
of GROUPS-NET (which includes opportunistic protocol and and privacy. For promoting cooperation of socially-selfish (SS)
parameter-free algorithm) reveals that in large-scale scenarios, communication nodes to relay messages in MSNs, a game-
it achieves roughly the same delivery ratio with 40 percent theoretic incentive scheme for social-aware routing (GISSO)
less network overhead in comparison to the existing socially- is proposed in [174]. First of all, GISSO leverages the social-
unaware solutions. tie information and content knowledge to identify the social
Unlike the previous studies that deal with the incentive utility of a message to an intermediate node. Next, alternating-
problem of D2D-based data dissemination by means of mon- offers bargaining game is applied, where SS nodes trade
etary incentive mechanism or auction-based scheme [171]. their messages with the objective to maximize their own
These are faced with a challenge to decide the distribu- social utility function. The performance is evaluated with two
tion of content requests and corresponding payments to the real-world datasets, and compared it with some benchmark
helpers nodes to guarantee truthfulness. The work presented socially-aware routing protocols. The authors verify through
in [172] studied a III phase mechanism to further improve simulation results that in terms of the message delivery ratio
data dissemination efficiency in D2D communications. The III and delay, the proposed approach outperforms Selfish SCORP,
phase mechanism includes seeds selection in the first phase, SSAR, and Selfish dlife schemes. In another work [175],
and data forwarding by leveraging both physical contacts Wu et al. formulated a socially-aware incentive mechanism
and users’ social-relationships in the remaining II phases. for stimulating selfish users to distribute video. Pricing-based
Actually, the authors concentrated on truthful money-less multicast and grid-based cluster distribution system of videos
incentive mechanism for more lightweight implementation. are designed to offload BS. Users cooperating with BS to
Initially, a social-physical graph is developed based on edge- distribute videos are known as core users. They are selected
betweenness using the Girvan-Newman algorithm. It is then based on familiarity or social-relations that depends on users’
partitioned into communities, and based on vertex-closeness, social-interactions and mobility. As the core users are selfish,
one seed is selected for each community. In the subsequent two they first evaluate their own benefits before distributing the
phases, accommodating their altruistic and selfish incentive videos. Therefore, it is a cumbersome problem to design
constraints, data forwarding among users are carried out. The incentive mechanism. For that purpose, a Stackelberg game-
effectiveness of the approach is verified through simulation based pricing mechanism is formulated for motivating core
results with diverse synthetic and real-trace datasets. users to take part in videos distribution. Stackelberg game
Many researchers focused on mitigating selfish behavior of comprises of the leader (BS) and the followers (core users).
user through different incentive mechanisms. Among which Therefore, in the beginning the BS determines initial price
most of them are based on centralized trusted authority for and provides it to the core users. In response, the core users
managing rewards, which seems impractical with the intermit- send back their strategies to the BS. Through negotiations
tent network connections. The authors in [173] proposed copy and adjustments, a balance of benefits is achieved between
adjustable incentive scheme (CAIS) that utilizes virtual credits the core users and the BS. The core users benefit depend
for motivating selfish users to take part in data forwarding. on the number of videos forwarded that will motivate core
All the nodes are divided into communities based on social- users for videos distribution. Results depict that the proposed
relations among nodes. Intermediate nodes that relay data for mechanism alleviates overhead from the BS, and also enhances
other nodes inside or outside community are rewarded with reliability and the performance of video transmission.
social and non-social credits, respectively. On the basis of Considering the power limitation of mobile devices, Zhao
earned credits and cooperation level, messages are replicated et al. [176] developed an energy efficient solution for data
to other nodes. Those nodes obtaining high credits generate dissemination over the D2D communication networks. The
and replicate messages to other nodes; on the other hand, solution makes a balance between the total energy consump-
nodes with low credits have a decreased utility and are not tion and the transmission completion time. Two algorithms
able to forward messages. Credits are attached to the relayed are proposed for the selection of the seed and transmission
messages and awarded to intermediate nodes for delivering the scheduling (for both single seed or multiple seeds). The results
message to the destination. The number of copies of messages reveal that the presented solution outperforms random and
is determined by social and non-social credits. The number of coalition game based schemes, and at the same time achieves
social credit represents social-contacts of node within its own a good balance for transmission completion time. However,
community. Single-copy data replication policy is adopted by static scenarios are considered without incorporating dynamics
CAIS, which does not involve third-party authority center. By of a practical scenario such as users mobility patterns.
this technique, the source node can forward a copy of its own Wu et al. [177] proposed an approach based on physi-
data, but the intermediate node is not able to replicate received cal proximity constraint, interplay of the social-connections,
messages, except delivering to the destination node. Synthetic and user common interests. The authors argued that these
and trace-driven simulations reveal that CAIS is efficient in parameters will establish their combined effects on D2D
dealing with the selfish behavior of nodes, while improving user clustering. Specifically, the set of powerful UEs (i.e.,
data delivery ratio, reducing data delivery latency and lowering socially) in a cluster are identified. In fact, the authors leverage
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
20 IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. <VOL>, NO. <NO>, <MONTH> 2017
closeness centrality by incorporating social-trust and interest delivering streams of HD videos, SoCast system is proposed
similarity jointly among UEs. For clustering the D2D network, in [182], which is based on social phenomena known as
CRP is utilized and interest based social-graph is introduced. social-trust and social-reciprocity. Coalition game framework
Consequently, the selected socially powerful UEs work as is used for the SoCast system, where clients are attracted with
relays or transmission sources in a given cluster. The proposed incentives to share video packets with one another in view of
clustering scheme performance is demonstrated both in terms social-ties among them and considering the video encoding
of the content dissemination time and system throughput. structure. SoCast performance is verified through numerical
The information dissemination in MSN is considered a new studies with real video traces.
challenge when the diverse features of social-ties and users’ Summary: To summarize the state-of-the-art research
behaviors are taken into account [178]. Particularly, users’ contributions in each application category, we propose clas-
interested information may diverge that can substantially affect sification as shown in Table III considering the approaches
the information diffusion. In this regard, an analytical model is and utilized social features. Based on the social features
developed to evaluate the epidemic information dissemination classification, which include social-ties, trust, community, and
in MSNs. The change of mobile users’ interests are also selfishness, it is revealed from Table III that majority (84%)
considered by introducing two novel elements known as pre- researchers utilized social-ties feature in their approaches.
immunity and immunity. Moreover, through extensive trace- Especially, the social feature ties is utilized in almost all
driven simulations, the proposed model accuracy is verified. contributions of caching and traffic offloading. Furthermore,
Wang et al. [179] demonstrated that socially-aware file shar- the second feature that gained the attention of researchers is
ing approach can reduce delay and offload the overburdened social-trust, and it is used together with the social-ties in max-
BS. The authors first divided the users into several groups imum contributions. However, community feature is merely
according to their data requirements. Then, in each group a used in the content dissemination application. In content
central user (i.e., seed) bearing largest trust degree receives the dissemination subsection, selfishness feature is just used twice.
target files first. Subsequently, the files are shared with other Generally, there is a primitive assumption that mobile cellular
users based on their social-relationships. The authors verify nodes are fully cooperative in D2D communications. However,
via theoretical analysis and simulation results that the social- in practical scenarios and applications, nodes may not be
connections among users tremendously improve the network always available due to diverse reasons, including limitation
throughput and the users’ QoE. of resources, privacy concerns, or other social targets. In other
The authors in [180] framed the performance improvement words, mobile users may exhibit selfish behavior for all or
problem of information diffusion over the online socially- some nodes [63]. The promise of widespread adoption for
aware networks utilizing the cascade model. From the perspec- socially-aware D2D communications paradigm can only be
tive of network science, both the value-strength and social- realized; when the cellular network operators offer adequate
strength were defined. Further, the connection between the incentives that engage human beings, and their devices into a
information diffusion performances and value/social strengths plethora of collective activities.
is highlighted in both the networks, i.e., static and mobile net-
works. Also, a mobility model based on the time-varying graph V. D ISCUSSION
is designed. Coupled with mobility model and social-strength, In this section, we summarize the technical problems
a socially-aware information transmission approach is framed. and applications of D2D communications based on social-
The proposed approach not only ameliorates the propagation awareness. Next, we discuss the learned lessons, followed by
efficiency, but also improves the mobile networks’ information technical challenges and open problems for future investiga-
coverage ratio. For validation of theoretical analysis, numer- tion.
ous experiments are conducted in terms of the information
coverage ratio over different networks. These networks are the
Barabási-Albert scale-free network, the Watts-Strogatz small- A. Summarizing Socially-Aware D2D Communications
world network, the real-world Flickr network, and over the As discussed before, we categorize the solutions of the
TVG-based mobile network. technical problems in socially-aware D2D communications
In another work, Orsino et al. [181] put forward a novel based on social features as shown in Tables I and II . We focus
scheme for content diffusion by combining D2D commu- on different social-connections with regard to physical con-
nications with multicasting and social-notions. Specifically, nectivity. The socially-aware D2D communications’ technical
the LTE network is considered and a scenario is assumed, problems are categorized in peer discovery and link admission,
where a content is to be distributed among the users. During resource allocation and interference management, throughput
the process, various transmission modes such as multicast, optimization, and energy efficiency. The considered or applied
unicast and D2D communications can be leveraged by the social features in addressing these technical issues include
user to collect and forward the information in the system social-ties, social-trust, social-community and selfishness. By
efficiently. The proposed scheme performance is compared categorizing social features, we conclude that majority of the
with legacy multicast technology. It is demonstrated that research contributions are based on social-ties and social-trust,
considerable benefits are achieved, such as reduced average while few works leveraged social-community and selfishness.
diffusion time per UE, increased average UE throughput, and Also, we highlight the main techniques employed in each
showed fairness. Similarly, to meet unprecedented demand on proposal against corresponding technical issues.
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
MANZOOR et al.: A SURVEY ON SOCIAL-AWARE D2D COMMUNICATIONS 21
Wang et al. 2016 Selection of forwading nodes based on time varying graph (TVG) Y - - -
[180] and social strength.
Orsino et al. 2016 Viral information diffusion for minimizing the content delivery time Y - - -
[181] called social inter network contact time.
Cao et al. [182] 2016 So-Cast approach to motivate effective cooperation among mobile Y - - -
users using coalition game theory and distributed algorithm.
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
22 IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. <VOL>, NO. <NO>, <MONTH> 2017
For socially-aware D2D applications shown in Table III. We limited battery may be reluctant to do collaboration. Neverthe-
also categorized the applications based on social features. The less, encouraging the users’ involvement is not a trivial task, as
socially-aware based applications include caching and traf- it needs observation of social-characteristics and behavior in
fic offloading, computational offloading and content dissem- order to put together the reward for D2D cooperation enchant-
ination. For improving D2D communications’ applications, ing. Selfish users pose adverse effects due to objective reasons
social-ties, social-trust, social-community and selfishness are including limited energy, buffer, device malfunctioning, and
considered. Comparing the different socially-aware D2D appli- subjective reasons including social-relations and privacy. It is
cations based on social features, we find that maximum works observed that selfish users are merely focused and interested
are based on social-ties, while few works utilized other social in maximizing their own gains or profits. Therefore, incentive
features. mechanisms need to be incorporated to stimulate such users’
We include all the latest relevant works in order to reflect the collaboration and entice more users to contribute in improving
latest advancements of socially-aware D2D communications. D2D communications. Such as in [189], it is generally con-
For each cited paper, we summarize the research techniques sidered that all nodes are interested in the similar category
employed for D2D communications’ technical problems and of payoff or reward, such as monetary, enhanced QoS or
applications as shown in Tables I, II and III. different types of discounts in already provided services [190].
Though, there are diverse approaches that combine incentive
mechanisms in D2D communication design. Among them
B. Lessons Learned
some incentive schemes are based on credit [191], self-interest
It is impossible to realize widespread adoption of socially- [192], reputation [193], pricing [194] and game theoretic
aware D2D communications until trust is established among frameworks including GISSO [174] and SoCast [182]. While,
the involved communicating entities. Apart from the trust, the other schemes are proposed to offer monetary incentives,
MNOs should offer adequate incentives to achieve users’ will- which include money-less and virtual checks or credits [171],
ingness. In this subsection, first, we show how to establish trust [173], [195].
among the system entities. Second, we discuss the number of
ways to incentivize the users. For effective D2D communication network, incentive mech-
1) Trust Establishment: In order to achieve universal anism design should jointly consider users’ altruistic and
implementation of the socially-aware D2D communication selfish behaviors. Since data dissemination involves mobile
paradigm, it is unlikely without embracing the trust con- nodes’ limited resources, therefore, the majority of the re-
cept among users, and between the network operators and search works considered that users behavior are completely
the end users. To alleviate the risks of users’ distrust and altruistic. It implies that users transmit messages to anybody
refusal, socially-aware D2D communication has to preserve they encounter, or consider users are completely selfish and
high degrees of trustworthiness in data distribution among demand ample incentives to contribute in data dissemination.
the concerned nodes. The concept of trust is quite complex, Actually, the mobile user has a tendency to play a double
multifaceted, and context dependent. In spite of the fact that role, for instance, he/she shows selfishness when dealing with
our everyday life decisions are mainly trust-based, but still strangers, and otherwise, shows altruism with other close
trust creation and administration in D2D communications are social-connections.
facing challenges. This is because of severe resource limita-
tions, wireless medium open nature, social, and the application Still, it is an open problem to design an effective incentive
networks. In socially-aware D2D communications’ literature, mechanism for the reluctant device users, and get most of
following metrics are used to measure social-trust properties, the potential gains of user cooperation. Three potential levels
which include nodes’ communication frequency, malicious or of user incentives are identified in [136] including social
benevolent behaviors, revealing of private information, and incentives, pragmatic incentives and indirect incentives, which
quality of reputation. One of the possibly prolific research can be applied to specific D2D scenarios. As we all know
trends in building trust relationships among entities is to lever- that D2D communications can bring significant monetary
age social-interactions by using the concept of OSNs. In this benefits (i.e., CAPEX and OPEX) to cellular operators apart
regard, Golbeck [183]–[185] presents the concept of social- from augmentation in QoS. When smart user devices with
trust by recommending the use of social networks as a bridge improved computational powers, storage and caching capabili-
to form trust-relations among communication entities. The ties, supporting multiple radio access technologies and sensing
concept of social-trust is being unified into the communication capability are utilized in their networks. Therefore, adequate
networks. Some trust propagation models built on the ideas sources of motivation or concrete incentives that facilitate the
of social networking have been put forward in multi-agent device-users’ decisions to extend their personal devices are
systems [186]–[188]. A combined trust metric that captures required to be involved. Moreover, the promise of widespread
aspects of wireless communications, OSNs, and corresponding adoption for socially-aware D2D communications paradigm
trust management, trust distribution and trust measurement can can only be realized, when the cellular network operators
be interesting research directions. offer adequate incentives (For example, MNOs can offer user’s
2) Social User Incentives: Social-incentive symbolizes the data plan discounts and dynamic pricing techniques [196])
social-connections based on reward. Taking into account co- that engage human beings and their devices into a plethora
operation cost and reward, two users lacking social-trust or of collective activities.
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
MANZOOR et al.: A SURVEY ON SOCIAL-AWARE D2D COMMUNICATIONS 23
C. Technical Challenges and Open Problems the nodes. Hence, capacity in such network increases due to
node mobility [211]. Also, it is observed that delay in such
Social networks constitute of complex interactions among networks is inversely proportional to the mobile node speed.
different individuals, and hence are difficult to scrutinize. Since human beings are social animals, and for that reason,
Incorporating social-domain into D2D communications intro- their mobility is mostly influenced by social aspects and the
duces many technical challenges and open problems. Along community to which they belong. Thus, incorporating both the
with the existing work, we still need to pay attention to the social-domain and mobility factor will open new avenues, and
following issues. help in better understanding the practical D2D communication
1) Security and Privacy: Social networks are evolving networks.
continuously and recognized with a multitude of rich infor- For studying mobility traces, considerable research efforts
mation. This can reflect intricate social-interactions among are done to propose new mobility models that can emulate
a huge number of users with different individual interests real life movement features of humans [212]. There are several
and characteristics. Moreover, in any OSN, personal profile parameters leading the nature of mobility such as contact time,
of users may comprise of confidential personal information inter-contact time, remaining inter-contact time, return time,
coupled with many other day to day activities. In this regard, and flight length [213]. Through analysis of such parameters,
a question arises that how one can extract simple and valuable researchers attempted to generate different models that have
social-information, without violating users’ privacy is still the same character of movement as noticed in real life mobility
an open problem. OSN comprises of confidential personal traces. Similarly, several mobility models are proposed moti-
information. Therefore, to ensure secrecy and privacy, social vated by sociology and the social networks. These mobility
network operators should establish secure interfaces between models are based on the fact that human mobility mostly
their network infrastructure and D2D communications to avoid depends on its social-community and characteristics of social-
leakage of such information to unintended UEs. structure.
The security and privacy of D2D communications need 3) Modeling Practical and Efficient Approaches: There are
a perfect solution of key management and authentication, various issues when considering traffic-offloading via D2D
confidentiality and integrity, availability and dependability, communications, but initializing the content diffusion by suit-
personal information, access control and device location and able users (seeds) selection is one of the vital issues. The seeds
application privacy. For instance, key agreement and batch must be extremely potential ones to download the required
authentication and attribute-based encryption (ABE) for D2D content files and further to move around for sharing. Keeping
communications based on the social networks can be used for this in view, some more challenges need to be solved i.e.,
less routing messages to authenticate several users [98], [197]– (1) how to model and foretell the content sharing pattern
[202]. Key generation to ensure confidentiality and integrity of each user over interested content concerning individual
via physical layer is a special and interesting case to secure social-activities and life patterns? (2) how to know/quantify the
D2D communications. The key generation takes the benefit of similarity of the content? (3) how to devise efficient content
randomness and reciprocity of the wireless channels to assure distribution approach by leveraging rational social-interactions
security [42]. The key extraction protocol based on CSI is also among users when mobility is considered?
another interesting method to avoid leakage of key information To know/quantify the similarity of the content, the authors
[203]. For user personal information, personal data storage is [214] used the method to identify redundancy. In this ap-
an interesting idea to store, manage and deploy all important proach, a packet-level detection utilizes a cache, and traffic
and secret data in a systematic and secure method [204], [205]. payloads are fingerprinted by an improved version of the
In order to keep the device location anonymous and ensure the Jenkins hash. Data redundancy/similarity is detected through
application privacy, anonymity techniques (e.g., pseudonyms) comparison of the indexed payloads of each packet with the
[206]–[208] are preferred. These techniques don’t rely on already cached data. The same approach can be used for
centralized entities due to the opportunistic D2D communi- quantifying similar contents within D2D networks with little
cations. Multi-party and distributed cryptographic protocols amendments.
are necessary for D2D communications because users are dis- 4) Distributed Efficient Schemes: It is impossible for every
tributed without mutual trust in infrastructure less environment UE to obtain the global knowledge of social network structure.
[209]. Homomorphic encryption can also be used for D2D An alternative is to rely on centralized schemes that necessi-
communications authentication and integrity. It performs an tate to acquiring global information. It is enviable to adopt
operation on encrypted data without knowing the original data distributed formulation that allows each UE to take decisions
[210]. independently based on its own observations and information.
2) Mobility impact: Mobility factor is negligibly considered Then, it is pertinent to ask here that how to devise an efficient
in the socially-aware D2D communications. For instance, scheme that can make available reasonable incentive for each
while studying the capacity of ad-hoc networks, the nodes UE to enforce the required fairness in the decision-making
are considered immobile in maximum frameworks. The sys- process. This is still an open problem.
tem performance can be significantly improved by exploiting
user mobility coupled with social-awareness of devices. As VI. C ONCLUSION
we know that data forwarding in D2D communication is D2D communication is considered as a key technology for
extremely dependent on the path availability and mobility of the 5G landscape to economically tackle one of the most
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
24 IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. <VOL>, NO. <NO>, <MONTH> 2017
engaging challenges faced by the cellular operators today; i.e., [17] C.-H. Yu, K. Doppler, C. B. Ribeiro, and O. Tirkkonen, “Resource
how to deal with the unprecedented mobile data traffic growth sharing optimization for device-to-device communication underlaying
cellular networks,” IEEE Transactions on Wireless Communications,
caused by the mobile social networks and other applications. vol. 10, no. 8, pp. 2752–2763, Aug. 2011.
To make this possible, social-domain is leveraged and coupled [18] B. Zhou, H. Hu, S.-Q. Huang, and H.-H. Chen, “Intracluster device-
with physical domain to exploit the hidden benefits, and to to-device relay algorithm with optimal resource utilization,” IEEE
transactions on vehicular technology, vol. 62, no. 5, pp. 2315–2326,
cope with the next communication generation demands. This June 2013.
survey on socially-aware D2D communications covers both [19] M. Botsov, M. Klügel, W. Kellerer, and P. Fertl, “Location dependent
its technical issues and applications. We categorized the state- resource allocation for mobile device-to-device communications,” in
2014 IEEE Wireless Communications and Networking Conference
of-the-art literature based on socially-aware D2D communica- (WCNC). IEEE, Apr. 2014, pp. 1679–1684.
tions’ technical issues and applications. Moreover, technical [20] J. Liu, B. Li, B. Lan, and J. Chang, “A resource reuse scheme of D2D
problems and applications are classified on the basis of the communication underlaying LTE network with intercell interference,”
Communications and Network, vol. 5, no. 03, p. 187, Sept. 2013.
utilized social features, such as social-ties, social-community, [21] L. Zhou, K. Ruttik, and O. Tirkkonen, “Interference canceling power
social-trust, and selfishness. Finally, we summarize the survey, optimization for device to device communication,” in 2015 IEEE 81st
discussed the lessons learned, open research challenges, and Vehicular Technology Conference (VTC Spring). IEEE, May 2015,
pp. 1–5.
future directions. [22] D. Wang, X. Wang, and Y. Zhao, “An interference coordination scheme
for device-to-device multicast in cellular networks,” in Vehicular Tech-
nology Conference (VTC Fall), 2012 IEEE. IEEE, Sept. 2012, pp.
1–5.
R EFERENCES [23] S. Wang, R. Hou, K.-S. Lui, H. Li, and J. Li, “A novel interference
management scheme in underlay D2D communication,” in Vehicular
[1] C. V. Mobile, “Cisco visual networking index: global mobile data traffic Technology Conference (VTC Fall), 2015 IEEE 82nd. IEEE, Sept.
forecast update, 2011–2016,” San Jose, CA, vol. 1, 2014. 2015, pp. 1–5.
[2] K. W. Choi and Z. Han, “Device-to-device discovery for proximity- [24] C.-H. Yu, O. Tirkkonen, K. Doppler, and C. Ribeiro, “On the perfor-
based service in LTE-Advanced system,” IEEE Journal on Selected mance of device-to-device underlay communication with simple power
Areas in Communications, vol. 33, no. 1, pp. 55–66, Jan. 2015. control,” in Vehicular Technology Conference, 2009. VTC Spring 2009.
[3] A. Patil and H. Sawant, “Technical specification group services and IEEE 69th. IEEE, Apr. 2009, pp. 1–5.
system aspects, ip multimedia subsystem (ims),” Int J Electron Com- [25] S. Wen, X. Zhu, Z. Lin, X. Zhang, and D. Yang, “Optimization of
mun Comput Eng, vol. 3, pp. 234–238, Mar. 2012. interference coordination schemes in device-to-device (D2D) commu-
[4] X. Lin, J. G. Andrews, A. Ghosh, and R. Ratasuk, “An overview nication,” in Communications and Networking in China (CHINACOM),
of 3GPP device-to-device proximity services,” IEEE Communications 2012 7th International ICST Conference on. IEEE, Aug. 2012, pp.
Magazine, vol. 52, no. 4, pp. 40–48, April 2014. 542–547.
[5] N. Kayastha, D. Niyato, P. Wang, and E. Hossain, “Applications, [26] D. Wang and X. Wang, “An interference management scheme for
architectures, and protocol design issues for mobile social networks: device-to-device multicast in spectrum sharing hybrid network,” in
A survey,” Proceedings of the IEEE, vol. 99, no. 12, pp. 2130–2158, 2013 IEEE 24th Annual International Symposium on Personal, Indoor,
Dec. 2011. and Mobile Radio Communications (PIMRC). IEEE, Sept. 2013, pp.
[6] X. Chen, B. Proulx, X. Gong, and J. Zhang, “Exploiting social ties for 3213–3217.
cooperative D2D communications: a mobile social networking case,” [27] G. Fodor and N. Reider, “A distributed power control scheme for
IEEE/ACM Transactions on Networking, vol. 23, no. 5, pp. 1471–1484, cellular network assisted D2D communications,” in Global Telecom-
Oct. 2015. munications Conference (GLOBECOM 2011), 2011 IEEE. IEEE, Dec.
[7] Y. Li, T. Wu, P. Hui, D. Jin, and S. Chen, “Social-aware D2D 2011, pp. 1–6.
communications: qualitative insights and quantitative analysis,” IEEE [28] Q. Wang, W. Wang, S. Jin, H. Zhu, and N. T. Zhang, “Quality-
Communications Magazine, vol. 52, no. 6, pp. 150–158, June 2014. optimized joint source selection and power control for wireless mul-
timedia D2D communication using stackelberg game,” IEEE Transac-
[8] N. Y. Asabere, “Towards a viewpoint of context-aware recommender
tions on Vehicular Technology, vol. 64, no. 8, pp. 3755–3769, Aug.
systems (cars) and services,” International Journal of Computer Sci-
2015.
ence and Telecommunications, vol. 4, no. 1, pp. 10–29, 2013.
[29] O. Osanaiye, K.-K. R. Choo, and M. Dlodlo, “Distributed denial of
[9] J. Liu, N. Kato, J. Ma, and N. Kadowaki, “Device-to-device commu-
service (ddos) resilience in cloud: review and conceptual cloud ddos
nication in LTE-Advanced networks: a survey,” IEEE Communications
mitigation framework,” Journal of Network and Computer Applica-
Surveys & Tutorials, vol. 17, no. 4, pp. 1923–1940, Dec. 2014.
tions, vol. 67, pp. 147–165, May 2016.
[10] A. Asadi, Q. Wang, and V. Mancuso, “A survey on device-to-device [30] D. Zhu, A. L. Swindlehurst, S. A. A. Fakoorian, W. Xu, and C. Zhao,
communication in cellular networks,” IEEE Communications Surveys “Device-to-device communications: The physical layer security advan-
& Tutorials, vol. 16, no. 4, pp. 1801–1819, April 2014. tage,” in 2014 IEEE International Conference on Acoustics, Speech
[11] P. Gandotra and R. K. Jha, “Device-to-device communication in cellular and Signal Processing (ICASSP). IEEE, May 2014, pp. 1606–1610.
networks: A survey,” Journal of Network and Computer Applications, [31] M. Wang and Z. Yan, “Security in D2D communications: A review,”
June 2016. in Trustcom/BigDataSE/ISPA, 2015 IEEE, vol. 1. IEEE, Aug. 2015,
[12] S. Singh, N. Saxena, A. Roy, and H. Kim, “A survey on 5g network pp. 1199–1204.
technologies from social perspective,” IETE Technical Review, pp. 1– [32] J. Shen, H.-W. Tan, J. Wang, J.-W. Wang, and S.-Y. Lee, “A novel
10, Feb. 2016. routing protocol providing good transmission reliability in underwater
[13] E. Ahmed, I. Yaqoob, A. Gani, M. Imran, and M. Guizani, “Social- sensor networks,” Journal of Internet Technology, vol. 16, no. 1, pp.
aware resource allocation and optimization for D2D communication,” 171–178, Jan. 2015.
IEEE Wireless Communications, 2017. [33] F. Zhangjie, S. Xingming, L. Qi, Z. Lu, and S. Jiangang, “Achieving
[14] D. Feng, L. Lu, Y. Yuan-Wu, G. Y. Li, G. Feng, and S. Li, “Device-to- efficient cloud search services: multi-keyword ranked search over en-
device communications underlaying cellular networks,” IEEE Transac- crypted cloud data supporting parallel computing,” IEICE Transactions
tions on Communications, vol. 61, no. 8, pp. 3541–3551, Aug. 2013. on Communications, vol. 98, no. 1, pp. 190–200, Jan. 2015.
[15] H. Tang, Z. Ding, and B. C. Levy, “Enabling D2D communications [34] L. Lei, J. Zhao, Z. Zhong, and K. Zheng, “Flow-level analysis of energy
through neighbor discovery in LTE cellular networks,” IEEE Trans- efficiency performance for device-to-device communications in ofdm
actions on Signal Processing, vol. 62, no. 19, pp. 5157–5170, Oct. cellular networks,” The Computer Journal, p. bxt001, Jan. 2013.
2014. [35] L. Lei, Z. Zhong, C. Lin, and X. Shen, “Operator controlled device-
[16] K. J. Zou, M. Wang, K. W. Yang, J. Zhang, W. Sheng, Q. Chen, and to-device communications in LTE-Advanced networks,” IEEE Wireless
X. You, “Proximity discovery for device-to-device communications Communications, vol. 19, no. 3, p. 96, June 2012.
over a cellular network,” IEEE Communications Magazine, vol. 52, [36] Y. Li, Z. Wang, D. Jin, and S. Chen, “Optimal mobile content
no. 6, pp. 98–107, June 2014. downloading in device-to-device communication underlaying cellular
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
MANZOOR et al.: A SURVEY ON SOCIAL-AWARE D2D COMMUNICATIONS 25
networks,” IEEE Transactions on Wireless Communications, vol. 13, [59] X. Chen, B. Proulx, X. Gong, and J. Zhang, “Social trust and social
no. 7, pp. 3596–3608, 2014. reciprocity based cooperative D2D communications,” in Proceedings
[37] S. Xu, H. Wang, T. Chen, Q. Huang, and T. Peng, “Effective in- of the fourteenth ACM international symposium on Mobile ad hoc
terference cancellation scheme for device-to-device communication networking and computing. ACM, July 2013, pp. 187–196.
underlaying cellular networks,” in Vehicular Technology Conference [60] J.-H. Cho, A. Swami, and R. Chen, “A survey on trust management for
Fall (VTC 2010-Fall), 2010 IEEE 72nd. IEEE, 2010, pp. 1–5. mobile ad hoc networks,” IEEE Communications Surveys & Tutorials,
[38] H. Min, J. Lee, S. Park, and D. Hong, “Capacity enhancement using vol. 13, no. 4, pp. 562–583, 2011.
an interference limited area for device-to-device uplink underlaying [61] J.-H. Cho, K. Chan, and S. Adali, “A survey on trust modeling,” ACM
cellular networks,” IEEE Transactions on Wireless Communications, Computing Surveys (CSUR), vol. 48, no. 2, p. 28, 2015.
vol. 10, no. 12, pp. 3995–4000, 2011. [62] B. M. Muir, “Trust in automation: Part i. theoretical issues in the study
[39] M. Noura and R. Nordin, “A survey on interference management of trust and human intervention in automated systems,” Ergonomics,
for device-to-device (D2D) communication and its challenges in 5g vol. 37, no. 11, pp. 1905–1922, 1994.
networks,” Journal of Network and Computer Applications, 2016. [63] Q. Li, W. Gao, S. Zhu, and G. Cao, “A routing protocol for socially
[40] M. Ahmed, M. Peng, M. Abana, S. Yan, and C. Wang, “Interference selfish delay tolerant networks,” Ad Hoc Networks, vol. 10, no. 8, pp.
coordination in heterogeneous small-cell networks: A coalition forma- 1619–1632, 2012.
tion game approach,” IEEE Sys. Journal, vol. PP, no. 99, pp. 1–12, [64] Z. Wang, J. Liu, and W. Zhu, “Social-aware video delivery: challenges,
2017. approaches, and directions,” IEEE Network, vol. 30, pp. 35–39, 2016.
[41] M. Ahmed, W. Wang, B. Zhang, C. Sun, I. Ahmad, Y. Sun, S. Yan [65] X. Wang, M. Chen, Z. Han, D. O. Wu, and T. T. Kwon, “Toss: Traffic
et al., “A dynamic coalition formation framework for interference offloading by social network service-based opportunistic sharing in
management in dense small-cell networks,” Transactions on Emerging mobile social networks,” IEEE INFOCOM 2014 - IEEE Conference
Telecommunications Technologies, vol. 26, no. 4, pp. 718–731, 2015. on Computer Communications, pp. 2346–2354, 2014.
[42] M. Wang and Z. Yan, “A survey on security in D2D communications,” [66] X. Chen, B. Proulx, X. Gong, and J. Zhang, “Exploiting social ties for
Mobile Networks and Applications, pp. 1–14, 2016. cooperative D2D communications: A mobile social networking case,”
[43] M. Haus, M. Waqas, A. Y. Ding, Y. Li, S. Tarkoma, and J. Ott, IEEE/ACM Transactions on Networking, vol. 23, pp. 1471–1484, 2015.
“Security and privacy in device-to-device (D2D) communication: A [67] H. Wang, S. Wang, Y. Zhang, X. Wang, K. Li, and T. Jiang, “Mea-
review,” IEEE Communications Surveys & Tutorials, 2017. surement and analytics on social groups of device-to-device sharing in
[44] R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen, “Pseudonym mobile social networks,” in ICC, 2017.
changing at social spots: An effective strategy for location privacy in
[68] X. Wang, H. Wang, K. Li, S. Yang, and T. Jiang, “Serendipity of shar-
vanets,” IEEE transactions on vehicular technology, vol. 61, no. 1, pp.
ing: Large-scale measurement and analytics for device-to-device (D2D)
86–96, 2012.
content sharing in mobile social networks,” 2017 14th Annual IEEE
[45] A. Antonopoulos and C. Verikoukis, “Multi-player game theoretic mac
International Conference on Sensing, Communication, and Networking
strategies for energy efficient data dissemination,” IEEE Transactions
(SECON), pp. 1–9, 2017.
on Wireless Communications, vol. 13, no. 2, pp. 592–603, Feb. 2014.
[69] Y. Cao, X. Chen, T. Jiang, and J. Zhang, “Socast: Social ties based co-
[46] M. Gupta, S. C. Jha, A. T. Koc, and R. Vannithamby, “Energy impact
operative video multicast,” IEEE INFOCOM 2014 - IEEE Conference
of emerging mobile internet applications on LTE networks: issues and
on Computer Communications, pp. 415–423, 2014.
solutions,” IEEE communications magazine, vol. 51, no. 2, pp. 90–97,
2013. [70] Y. Cao, T. Jiang, X. Chen, and J. Zhang, “Social-aware video multicast
based on device-to-device communications,” IEEE Transactions on
[47] A. T. Koc, S. C. Jha, R. Vannithamby, and M. Torlak, “Device
Mobile Computing, vol. 15, pp. 1528–1539, 2016.
power saving and latency optimization in LTE-A networks through
drx configuration,” IEEE Transactions on Wireless Communications, [71] Y. Li, T. Wu, P. Hui, D. Jin, and S. Chen, “Social-aware D2D
vol. 13, no. 5, pp. 2614–2625, May 2014. communications: qualitative insights and quantitative analysis,” IEEE
[48] E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, “Massive Communications Magazine, vol. 52, pp. 150–158, 2014.
mimo for next generation wireless systems,” IEEE Communications [72] F. Wang, Y. Li, Z. Wang, and Z. Yang, “Social-community-aware
Magazine, vol. 52, no. 2, pp. 186–195, 2014. resource allocation for D2D communications underlaying cellular net-
[49] I. Chih-Lin, C. Rowell, S. Han, Z. Xu, G. Li, and Z. Pan, “Toward works,” IEEE Transactions on Vehicular Technology, vol. 65, no. 5,
green and soft: a 5g perspective,” IEEE Communications Magazine, pp. 3628–3640, 2016.
vol. 52, no. 2, pp. 66–73, Feb. 2014. [73] A. Roy, P. De, and N. Saxena, “Location-based social video sharing
[50] P. Mach, Z. Becvar, and T. Vanek, “In-band device-to-device commu- over next generation cellular networks,” IEEE Communications Mag-
nication in ofdma cellular networks: A survey and challenges,” IEEE azine, vol. 53, no. 10, pp. 136–143, Oct. 2015.
Communications Surveys & Tutorials, vol. 17, no. 4, pp. 1885–1922, [74] B. Zhang, Y. Li, D. Jin, P. Hui, and Z. Han, “Social-aware peer
June 2015. discovery for D2D communications underlaying cellular networks,”
[51] X. Wang, M. Chen, T. T. Kwon, L. Jin, and V. C. M. Leung, “Mobile IEEE Transactions on Wireless Communications, vol. 14, no. 5, pp.
traffic offloading by exploiting social network services and leverag- 2426–2439, May 2015.
ing opportunistic device-to-device sharing,” IEEE Wireless Commun., [75] C. Xu, L. Song, Z. Han, Q. Zhao, X. Wang, X. Cheng, and B. Jiao,
vol. 21, pp. 28–36, 2014. “Efficiency resource allocation for device-to-device underlay commu-
[52] P. Hui, J. Crowcroft, and E. Yoneki, “Bubble rap: Social-based for- nication systems: a reverse iterative combinatorial auction based ap-
warding in delay-tolerant networks,” IEEE Transactions on Mobile proach,” IEEE Journal on Selected Areas in Communications, vol. 31,
Computing, vol. 10, pp. 1576–1589, 2008. no. 9, pp. 348–358, Sept. 2013.
[53] F. Radicchi, C. Castellano, F. Cecconi, V. Loreto, and D. Parisi, [76] Y. Zhang, L. Song, W. Saad, Z. Dawy, and Z. Han, “Exploring
“Defining and identifying communities in networks.” Proceedings of social ties for enhanced device-to-device communications in wire-
the National Academy of Sciences of the United States of America, vol. less networks,” in 2013 IEEE Global Communications Conference
101 9, pp. 2658–63, 2004. (GLOBECOM). IEEE, Dec. 2013, pp. 4597–4602.
[54] M. E. J. Newman, “Fast algorithm for detecting community structure [77] L. Atzori, A. Iera, G. Morabito, and M. Nitti, “The social internet of
in networks.” Physical review. E, Statistical, nonlinear, and soft matter things (siot)–when social networks meet the internet of things: Con-
physics, vol. 69 6 Pt 2, p. 066133, 2004. cept, architecture and network characterization,” Computer Networks,
[55] G. Palla, I. Derényi, I. Farkas, and T. Vicsek, “Uncovering the overlap- vol. 56, no. 16, pp. 3594–3608, Aug. 2012.
ping community structure of complex networks in nature and society,” [78] M. Nitti, L. Atzori, and I. P. Cvijikj, “Friendship selection in the social
arXiv preprint physics/0506133, 2005. internet of things: challenges and possible strategies,” IEEE Internet of
[56] R. M. Bond, C. J. Fariss, J. J. Jones, A. D. Kramer, C. Marlow, J. E. Things Journal, vol. 2, no. 3, pp. 240–247, June 2015.
Settle, and J. H. Fowler, “A 61-million-person experiment in social [79] J. An, X. Gui, W. Zhang, J. Jiang, and J. Yang, “Research on social
influence and political mobilization,” Nature, vol. 489, no. 7415, pp. relations cognitive model of mobile nodes in internet of things,” Journal
295–298, 2012. of Network and Computer Applications, vol. 36, no. 2, pp. 799–810,
[57] D. J. Watts and S. H. Strogatz, “Collective dynamics of ‘small- Jan 2013.
world’networks,” nature, vol. 393, no. 6684, pp. 440–442, 1998. [80] L. Atzori, A. Iera, and G. Morabito, “Siot: Giving a social structure to
[58] M. S. Granovetter, “The strength of weak ties,” American journal of the internet of things,” IEEE communications letters, vol. 15, no. 11,
sociology, vol. 78, no. 6, pp. 1360–1380, 1973. pp. 1193–1195, Nov. 2011.
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
26 IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. <VOL>, NO. <NO>, <MONTH> 2017
[81] L. Atzori, D. Carboni, and A. Iera, “Smart things in the social loop: [102] O. Johny, S. Sotiriadis, E. Asimakopoulou, and N. Bessis, “Towards
Paradigms, technologies, and potentials,” Ad Hoc Networks, vol. 18, a social graph approach for modeling risks in big data and internet
pp. 121–132, July 2014. of things (iot),” in Intelligent Networking and Collaborative Systems
[82] M. Nitti, R. Girau, and L. Atzori, “Trustworthiness management in the (INCoS), 2014 International Conference on. IEEE, Mar. 2014, pp.
social internet of things,” IEEE Transactions on knowledge and data 439–444.
engineering, vol. 26, no. 5, pp. 1253–1266, May 2014. [103] J. C. Tsai, N. Y. Yen, and T. Hayashi, “Social network based smart grids
[83] A. M. Ortiz, D. Hussein, S. Park, S. N. Han, and N. Crespi, “The analysis,” in Independent Computing (ISIC), 2014 IEEE International
cluster between internet of things and social networks: Review and Symposium on. IEEE, Dec. 2014, pp. 1–6.
research challenges,” IEEE Internet of Things Journal, vol. 1, no. 3, [104] A. Cassidy and A. Nehorai, “Modeling smart grid adoption via a social
pp. 206–215, June 2014. network model,” in 2014 IEEE PES General Meeting| Conference &
[84] R. Chen, F. Bao, and J. Guo, “Trust-based service management for Exposition. IEEE, July 2014, pp. 1–5.
social internet of things systems,” Dec. 2015. [105] I. G. Ciuciu, R. Meersman, and T. Dillon, “Social network of smart-
[85] H. Ning and Z. Wang, “Future internet of things architecture: like metered homes and smes for grid-based renewable energy exchange,”
mankind neural system or social organization framework?” IEEE in 2012 6th IEEE International Conference on Digital Ecosystems and
Communications Letters, vol. 15, no. 4, pp. 461–463, Apr. 2011. Technologies (DEST). IEEE, June 2012, pp. 1–6.
[86] A. Zelenkauskaite, N. Bessis, S. Sotiriadis, and E. Asimakopoulou, [106] A. Cassidy, M. Strube, and A. Nehorai, “A framework for exploring so-
“Interconnectedness of complex systems of internet of things through cial network and personality-based predictors of smart grid diffusion,”
social network analysis for disaster management,” in Intelligent Net- IEEE Transactions on Smart Grid, vol. 6, no. 3, pp. 1314–1322, May
working and Collaborative Systems (INCoS), 2012 4th International 2015.
Conference on. IEEE, Sept. 2012, pp. 503–508. [107] Q. Huang, X. Li, J. Zhao, D. Wu, and X.-Y. Li, “Social networking
[87] M. Tinghuai, Z. Jinjuan, T. Meili, T. Yuan, A.-D. Abdullah, A.-R. reduces peak power consumption in smart grid,” IEEE Transactions on
Mznah, and L. Sungyoung, “Social network and tag sources based Smart Grid, vol. 6, no. 3, pp. 1403–1413, May 2015.
augmenting collaborative recommender system,” IEICE transactions [108] M. Wolsink, “The research agenda on social acceptance of distributed
on Information and Systems, vol. 98, no. 4, pp. 902–910, Apr. 2015. generation in smart grids: Renewable as common pool resources,”
[88] M. Nitti, R. Girau, A. Floris, and L. Atzori, “On adding the social Renewable and Sustainable Energy Reviews, vol. 16, no. 1, pp. 822–
dimension to the internet of vehicles: Friendship and middleware,” in 835, Jan. 2012.
Communications and Networking (BlackSeaCom), 2014 IEEE Interna- [109] F. Skopik, “The social smart grid: Dealing with constrained energy re-
tional Black Sea Conference on. IEEE, May 2014, pp. 134–138. sources through social coordination,” Journal of Systems and Software,
[89] T. H. Luan, X. S. Shen, F. Bai, and L. Sun, “Feel bored? join verse! vol. 89, pp. 3–18, Mar. 2014.
engineering vehicular proximity social networks,” IEEE Transactions [110] B. Han, P. Hui, V. A. Kumar, M. V. Marathe, J. Shao, and A. Srinivasan,
on Vehicular Technology, vol. 64, no. 3, pp. 1120–1131, Mar. 2015. “Mobile data offloading through opportunistic communications and
social participation,” IEEE Transactions on Mobile Computing, vol. 11,
[90] T. H. Luan, R. Lu, X. Shen, and F. Bai, “Social on the road: Enabling
no. 5, pp. 821–834, 2012.
secure and efficient social networking on highways,” IEEE Wireless
[111] H. Mao, W. Feng, Y. Zhao, and N. Ge, “Joint social-position relation-
Communications, vol. 22, no. 1, pp. 44–51, Feb. 2015.
ship based cooperation among mobile terminals,” IEEE Communica-
[91] I. Lequerica, M. G. Longaron, and P. M. Ruiz, “Drive and share:
tions Letters, vol. 18, no. 12, pp. 2165–2168, Dec. 2014.
efficient provisioning of social networks in vehicular scenarios,” IEEE
[112] A. Prasad, K. Samdanis, A. Kunz, and J. Song, “Energy efficient device
Communications Magazine, vol. 48, no. 11, pp. 90–97, Nov. 2010.
discovery for social cloud applications in 3GPP LTE-Advanced net-
[92] K. M. Alam, M. Saini, and A. El Saddik, “Toward social internet of
works,” in 2014 IEEE Symposium on Computers and Communications
vehicles: Concept, architecture, and applications,” IEEE Access, vol. 3,
(ISCC). IEEE, Sept. 2014, pp. 1–6.
pp. 343–357, Mar. 2015.
[113] J. Mass, S. N. Srirama, H. Flores, and C. Chang, “Proximal and social-
[93] C. Zhu, H. Wang, V. C. Leung, L. Shu, and L. T. Yang, “An evaluation aware device-to-device communication via audio detection on cloud,”
of user importance when integrating social networks and mobile cloud in Proceedings of the 13th International Conference on Mobile and
computing,” in 2014 IEEE Global Communications Conference. IEEE, Ubiquitous Multimedia. ACM, Nov. 2014, pp. 143–150.
Dec. 2014, pp. 2935–2940. [114] J.-H. Choi, D.-O. Kang, J. Y. Jung, and C. Bae, “Estimating social tie
[94] Y.-T. Yu, C.-M. Huang, and Y.-T. Lee, “An intelligent touring system strength for autonomous D2D collaborations,” International Journal of
based on mobile social network and cloud computing for travel rec- Future Computer and Communication, vol. 4, no. 1, pp. 7–12, Feb.
ommendation,” in Advanced Information Networking and Applications 2015.
Workshops (WAINA), 2014 28th International Conference on. IEEE, [115] Z. Tan, X. Li, H. Ji, K. Wang, and H. Zhang, “Social-aware peer
May 2014, pp. 19–24. discovery and resource allocation for device-to-device communication,”
[95] A. Q. Gill, D. Bunker, and P. Seltsikas, “An empirical analysis of cloud, in Digital Media Industry & Academic Forum (DMIAF). IEEE, Sept.
mobile, social and green computing: Financial services it strategy 2016, pp. 83–88.
and enterprise architecture,” in Dependable, Autonomic and Secure [116] L. Wang, G. Araniti, C. Cao, W. Wang, and Y. Liu, “Device-to-
Computing (DASC), 2011 IEEE Ninth International Conference on. device users clustering based on physical and social characteristics,”
IEEE, Dec. 2011, pp. 697–704. International Journal of Distributed Sensor Networks, vol. 2015, Feb.
[96] Z. Li and M. Li, “An efficient social based data forwarding mechanism 2015.
for mobile cloud computing,” in Mobile Ad-hoc and Sensor Networks [117] X. Gong, X. Chen, and J. Zhang, “Social group utility maximization
(MSN), 2013 IEEE Ninth International Conference on. IEEE, Dec. game with applications in mobile social networks,” in Communication,
2013, pp. 365–372. Control, and Computing (Allerton), 2013 51st Annual Allerton Confer-
[97] Y. Wu, Z. Zhang, C. Wu, Z. Li, and F. C. Lau, “Cloudmov: cloud-based ence on. IEEE, Oct. 2013, pp. 1496–1500.
mobile social tv,” IEEE Transactions on Multimedia, vol. 15, no. 4, pp. [118] Y. Zhao, Y. Li, Y. Cao, T. Jiang, and N. Ge, “Social-aware resource
821–832, June 2013. allocation for device-to-device communications underlaying cellular
[98] Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic networks,” IEEE Transactions on Wireless Communications, vol. 14,
multi-keyword ranked search scheme over encrypted cloud data,” IEEE no. 12, pp. 6621–6634, Dec. 2015.
Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. [119] Y. Li, S. Su, and S. Chen, “Social-aware resource allocation for
340–352, Jan. 2016. device-to-device communications underlaying cellular networks,” IEEE
[99] W. Tan, M. B. Blake, I. Saleh, and S. Dustdar, “Social-network-sourced Wireless Communications Letters, vol. 4, no. 3, pp. 293–296, June
big data analytics,” IEEE Internet Computing, vol. 17, no. 5, pp. 62–69, 2015.
Sept. 2013. [120] L. Wang, H. Wu, W. Wang, and K.-C. Chen, “Socially enabled wireless
[100] C. Gao and N. Iwane, “A social network model for big data privacy pre- networks: resource allocation via bipartite graph matching,” IEEE
serving and accountability assurance,” in 2015 12th Annual IEEE Con- Communications Magazine, vol. 53, no. 10, pp. 128–135, Oct. 2015.
sumer Communications and Networking Conference (CCNC). IEEE, [121] J. Y. Ryu, J. Lee, and T. Q. Quek, “Trust degree based beamforming
July 2015, pp. 19–22. for miso cooperative communication system,” IEEE Communications
[101] A. N. Choudhary, J. C. Lui, and K. Ross, “Keynote speakers: Big data Letters, vol. 19, no. 11, pp. 1957–1960, Nov. 2015.
science and social networks—accelerating insights and building value,” [122] H. Wu, L. Wang, T. Svensson, and Z. Han, “Resource allocation for
in 2014 23rd International Conference on Computer Communication wireless caching in socially-enabled D2D communications,” in ICC ,
and Networks (ICCCN), Aug. 2014. July 2016, pp. 1–6.
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
MANZOOR et al.: A SURVEY ON SOCIAL-AWARE D2D COMMUNICATIONS 27
[123] G. Zhang, K. Yang, and H.-H. Chen, “Socially aware cluster forma- [146] N. Golrezaei, A. G. Dimakis, and A. F. Molisch, “Device-to-device
tion and radio resource allocation in D2D networks,” IEEE Wireless collaboration through distributed storage,” in Global Communications
Communications, vol. 23, no. 4, pp. 68–73, Aug. 2016. Conference (GLOBECOM), 2012 IEEE. IEEE, Dec. 2012, pp. 2397–
[124] O. Semiari, W. Saad, S. Valentin, M. Bennis, and H. V. Poor, “Context- 2402.
aware small cell networks: How social metrics improve wireless [147] N. Golrezaei, A. G. Dimakis, A. F. Molisch, “Scaling behaviors of
resource allocation,” IEEE Trans. Wireless Communications, vol. 14, wireless device-to-device communications with distributed caching,”
pp. 5927–5940, 2015. arXiv preprint arXiv:1208.1290, May 2012.
[125] Z. Huang, H. Tian, S. Fan, Z. Xing, and X. Zhang, “Social-aware re- [148] E. Bastug, M. Bennis, and M. Debbah, “Living on the edge: The role
source allocation for content dissemination networks: An evolutionary of proactive caching in 5g wireless networks,” IEEE Communications
game approach,” IEEE Access, vol. 5, pp. 9568–9579, 2017. Magazine, vol. 52, no. 8, pp. 82–89, Aug. 2014.
[126] Y. Li, Z. Zhang, and H. Wang, “Transmission mode selection and [149] K. Zhu, W. Zhi, L. Zhang, X. Chen, and X. Fu, “Social-aware
interference mitigation for social aware D2D communication,” GLOBE- incentivized caching for D2D communications,” IEEE Access, vol. 4,
COM, 2016, pp. 1–6. pp. 7585–7593, Oct. 2016.
[127] H. A. Mustafa, M. Z. Shakir, M. A. Imran, and R. Tafazolli, “Spatial [150] C. Ma, Z. Lin, L. Marini, J. Li, and B. Vucetic, “Learning automaton
and social paradigms for interference and coverage analysis in underlay based distributed caching for mobile social networks,” in Wireless
D2D network,” arXiv preprint arXiv:1606.03668, Jan. 2016. Communications and Networking Conference (WCNC), 2016 IEEE.
[128] T. Govier, Social trust and human communities. McGill-Queen’s IEEE, April 2016, pp. 1–6.
Press-MQUP, 1997. [151] E. Baştuğ, M. Bennis, and M. Debbah, “Social and spatial proactive
[129] H. Gintis, “Strong reciprocity and human sociality,” Journal of theo- caching for mobile data offloading,” in 2014 IEEE international
retical biology, vol. 206, no. 2, pp. 169–179, Mar. 2000. conference on communications workshops (ICC). IEEE, June 2014,
[130] M. Zhang, X. Chen, and J. Zhang, “Social-aware relay selection for pp. 581–586.
cooperative networking: An optimal stopping approach,” in 2014 IEEE [152] B. Bai, L. Wang, Z. Han, W. Chen, and T. Svensson, “Caching
International Conference on Communications (ICC). IEEE, Aug. based socially-aware D2D communications in wireless content delivery
2014, pp. 2257–2262. networks: a hypergraph framework,” IEEE Wireless Communications,
[131] F. Wang, Z. Wang, and Z. Yang, “Evaluating the influence of social vol. 23, no. 4, pp. 74–81, Aug. 2016.
selfishness on cooperative D2D communications,” in Proceedings of [153] X. Zhuo, Q. Li, G. Cao, Y. Dai, B. Szymanski, and T. La Porta,
the 7th International Workshop on Planet-scale mObile computing and “Social-based cooperative caching in dtns: A contact duration aware
online Social neTworking. ACM, June 2015, pp. 49–54. approach,” in Mobile Adhoc and Sensor Systems (MASS), 2011 IEEE
[132] Y. Xiao, D. Niyato, K.-C. Chen, and Z. Han, “Enhance device-to-device 8th International Conference on. IEEE, 2011, pp. 92–101.
communication with social awareness: a belief-based stable marriage [154] A. Ometov, A. Orsino, L. Militano, D. Moltchanov, G. Araniti, E. Ol-
game framework,” IEEE Wireless Communications, vol. 23, no. 4, pp. shannikova, G. Fodor, S. Andreev, T. Olsson, A. Iera et al., “Towards
36–44, Aug. 2016. trusted, social-aware D2D connectivity: Bridging across technology and
sociality realms,” IEEE Wireless Communications, vol. 23, no. 4, pp.
[133] H. Mao, W. Feng, and N. Ge, “Performance of social-position relation-
103–111, Aug. 2016.
ships based cooperation among mobile terminals,” IEEE Transactions
[155] Y. Cao, X. Chen, T. Jiang, and J. Zhang, “Socast: social ties based co-
on Vehicular Technology, vol. 65, no. 5, pp. 3128–3138, May 2016.
operative video multicast,” in IEEE INFOCOM 2014-IEEE Conference
[134] X. Pan and H. Wang, “On the performance analysis and relay algorithm
on Computer Communications. IEEE, July 2014, pp. 415–423.
design in social-aware D2D cooperated communications,” in Vehicular
[156] L. Pu, X. Chen, J. Xu, and X. Fu, “Content retrieval at the edge: A
Technology Conference (VTC Spring), 2016 IEEE 83rd. IEEE, July
social-aware and named data cooperative framework,” June 2016.
2016, pp. 1–5.
[157] S. Ioannidis and A. Chaintreau, “On the strength of weak ties in mobile
[135] X. Chen, X. Gong, L. Yang, and J. Zhang, “Exploiting social tie
social networks,” in Proceedings of the Second ACM EuroSys Workshop
structure for cooperative wireless networking: A social group utility
on Social Network Systems. ACM, 2009, pp. 19–25.
maximization framework,” Dec. 2016.
[158] X. Wang, X. Li, and V. C. Leung, “Tasa: traffic offloading by tag-
[136] A. Ometov, A. Orsino, L. Militano, D. Moltchanov, G. Araniti, E. Ol- assisted social-aware opportunistic sharing in mobile social networks,”
shannikova, G. Fodor, S. Andreev, T. Olsson, A. Iera et al., “Toward in The 21st IEEE International Workshop on Local and Metropolitan
trusted, social-aware D2D connectivity: bridging across the technology Area Networks. IEEE, April 2015, pp. 1–6.
and sociality realms,” IEEE Wireless Communications, vol. 23, no. 4, [159] M. A. Alim, T. Pan, M. T. Thai, and W. Saad, “Leveraging social
pp. 103–111, 2016. communities for optimizing cellular device-to-device communications,”
[137] Y. Meng, C. Jiang, H.-H. Chen, and Y. Ren, “Cooperative device-to- IEEE Transactions on Wireless Communications, vol. 16, no. 1, pp.
device communications: Social networking perspectives,” IEEE Net- 551–564, 2017.
work, 2017. [160] U. Drolia, R. Martins, J. Tan, A. Chheda, M. Sanghavi, R. Gandhi,
[138] N. Balasubramanian, A. Balasubramanian, and A. Venkataramani, and P. Narasimhan, “The case for mobile edge-clouds,” in Ubiquitous
“Energy consumption in mobile phones: a measurement study and Intelligence and Computing, 2013 IEEE 10th International Conference
implications for network applications,” in Proceedings of ACM SIG- on and 10th International Conference on Autonomic and Trusted
COMM. Nov. 2009, pp. 280–293. Computing (UIC/ATC). IEEE, 2013, pp. 209–215.
[139] A. Bourdena, C. Mavromoustakis, G. Mastorakis, J. Rodrigues, and [161] A. Mtibaa, K. A. Harras, and A. Fahim, “Towards computational
C. Dobre, “Using socio-spatial context in mobile cloud offload process offloading in mobile device clouds,” in Cloud Computing Technology
for energy conservation in wireless devices,” Dec. 2015. and Science (CloudCom), 2013 IEEE 5th International Conference on,
[140] E. Datsika, A. Antonopoulos, N. Zorba, and C. Verikoukis, “Green vol. 1. IEEE, 2013, pp. 331–338.
cooperative device–to–device communication: A social–aware perspec- [162] K. Habak, M. Ammar, K. A. Harras, and E. Zegura, “Femto clouds:
tive,” IEEE Access, vol. 4, pp. 3697–3707, June 2016. Leveraging mobile devices to provide cloud service at the edge,” in
[141] M. Hoeyhtyae, A. Mämmelä, U. Celentano, and J. Roening, “Power- Cloud Computing (CLOUD), 2015 IEEE 8th International Conference
efficiency in social-aware D2D communications,” in European Wireless on. IEEE, 2015, pp. 9–16.
2016; 22th European Wireless Conference; Proceedings of. VDE [163] I. Yaqoob, E. Ahmed, A. Gani, S. Mokhtar, M. Imran, and S. Guizani,
VERLAG GmbH, June 2016, pp. 1–6. “Mobile ad hoc cloud: A survey,” Wireless Communications and Mobile
[142] L. Jiang, H. Tian, Z. Xing, K. Wang, K. Zhang, S. Maharjan, S. Gjess- Computing, vol. 16, no. 16, pp. 2572–2589, 2016.
ing, and Y. Zhang, “Social-aware energy harvesting device-to-device [164] C. Ragona, F. Granelli, C. Fiandrino, D. Kliazovich, and P. Bouvry,
communications in 5g networks,” IEEE Wireless Communications, “Energy-efficient computation offloading for wearable devices and
vol. 23, no. 4, pp. 20–27, Aug. 2016. smartphones in mobile cloud computing,” GLOBECOM, 2015, pp. 1–6.
[143] H. Ahlehagh and S. Dey, “Hierarchical video caching in wireless cloud: [165] Y. Cao, C. Long, T. Jiang, and S. Mao, “Share communication and
Approaches and algorithms,” in 2012 IEEE International Conference computation resources on mobile devices: a social awareness perspec-
on Communications (ICC). IEEE, June 2012, pp. 7082–7087. tive,” IEEE Wireless Comm., vol. 23, no. 4, pp. 52–59, Aug. 2016.
[144] C. Xu, L. Song, and Z. Han, Resource management for device-to-device [166] H. Flores, D. Ferreira, C. Luo, V. Kostakos, P. Hui, R. Sharma,
underlay communication. Springer, Nov. 2014. S. Tarkoma, and Y. Li, “Social-aware device-to-device communication:
[145] L. Wang and H. Wu, “Fast pairing of device-to-device link underlay for a contribution for edge and fog computing?” in Proceedings of the
spectrum sharing with cellular users,” IEEE Communications Letters, 2016 ACM International Joint Conference on Pervasive and Ubiquitous
vol. 18, no. 10, pp. 1803–1806, Oct. 2014. Computing: Adjunct. ACM, Sept. 2016, pp. 1466–1471.
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
28 IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. <VOL>, NO. <NO>, <MONTH> 2017
[167] H. Flores, R. Sharma, D. Ferreira, V. Kostakos, J. Manner, S. Tarkoma, [191] G. Liu, S. Ji, and Z. Cai, “Strengthen nodal cooperation for data
P. Hui, and Y. Li, “Social-aware hybrid mobile offloading,” Pervasive dissemination in mobile social networks,” Personal and ubiquitous
and Mobile Computing, vol. 36, pp. 25–43, 2017. computing, vol. 18, no. 8, pp. 1797–1811, 2014.
[168] M. Waqas, M. Zeng, Y. Li, D. Jin, and Z. Han, “Mobility assisted [192] T. Ning, Z. Yang, H. Wu, and Z. Han, “Self-interest-driven incentives
content transmission for device-to-device communication underlaying for ad dissemination in autonomous mobile social networks,” in IN-
cellular networks,” IEEE Transactions on Vehicular Technology, 2018. FOCOM, 2013 Proceedings IEEE. IEEE, 2013, pp. 2310–2318.
[169] I. Koutsopoulos, E. Noutsi, and G. Iosifidis, “Dijkstra goes social: [193] G. Bigwood and T. Henderson, “Ironman: Using social networks to
Social-graph-assisted routing in next generation wireless networks,” add incentives and reputation to opportunistic networks,” in Privacy,
in European Wireless 2014; 20th European Wireless Conference; Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational
Proceedings of. VDE, June 2014, pp. 1–7. Conference on Social Computing (SocialCom), 2011 IEEE Third In-
[170] I. O. Nunes, P. O. V. de Melo, and A. A. Loureiro, “Leveraging D2D ternational Conference on. IEEE, 2011, pp. 65–72.
multi-hop communication through social group meetings awareness,” [194] D. Wu, L. Zhou, and Y. Cai, “Social-aware rate based content sharing
IEEE Wireless Communications, vol. 23, no. 4, Aug. 2016. mode selection for D2D content sharing scenarios,” IEEE Transactions
[171] Y. Zhu, J. Jiang, B. Li, and B. Li, “Rado: A randomized auction on Multimedia, 2017.
approach for data offloading via D2D communication,” in Mobile [195] W. Song and Y. Zhao, “A randomized reverse auction for cost-
Ad Hoc and Sensor Systems (MASS), 2015 IEEE 12th International constrained D2D content distribution,” in Global Communications
Conference on. IEEE, Oct. 2015, pp. 1–9. Conference (GLOBECOM), 2016 IEEE. IEEE, 2016, pp. 1–6.
[172] Y. Zhao, W. Song, and Z. Han, “Social-aware data dissemination via [196] R. Schoenen, H. Sokun, and H. Yanikomeroglu, “Effective quantum
device-to-device communications: Fusing social and mobile networks (ebit) tariff–a novel approach to enable smart data pricing,” IEEE
with incentive constraints,” IEEE Tran. on Services Comp., Aug. 2016. Network Magazine, Special Issue on Smart Data Pricing, 2015.
[173] Z. Ning, L. Liu, F. Xia, B. Jedari, I. Lee, and W. Zhang, “Cais: a [197] J.-R. Shih, Y. Hu, M.-C. Hsiao, M.-S. Chen, W.-C. Shen, B.-Y. Yang,
copy adjustable incentive scheme in community-based socially aware A.-Y. Wu, and C.-M. Cheng, “Securing m2m with post-quantum
networking,” IEEE Tran. on Vehicular Technology, vol. 66, no. 4, pp. public-key cryptography,” IEEE Journal on Emerging and Selected
3406–3419, 2017. Topics in Circuits and Systems, vol. 3, no. 1, pp. 106–116, 2013.
[174] B. Jedari, L. Liu, T. Qiu, A. Rahim, and F. Xia, “A game-theoretic [198] L.-Y. Yeh, Y.-L. Huang, A. D. Joseph, S. W. Shieh, and W.-J. Tsaur,
incentive scheme for social-aware routing in selfish mobile social “A batch-authenticated and key agreement framework for p2p-based
networks,” Future Generation Computer Systems, July 2016. online social networks,” IEEE Transactions on Vehicular Technology,
[175] D. Wu, J. Yan, H. Wang, D. Wu, and R. Wang, “Social attribute aware vol. 61, no. 4, pp. 1907–1924, 2012.
incentive mechanism for device-to-device video distribution,” IEEE [199] H. Yang and V. A. Oleshchuk, “An improvement of the batch-
Trans. Multimedia, vol. 19, pp. 1908–1920, 2017. authentication and key agreement framework for p2p-based online
[176] Y. Zhao and W. Song, “Social-aware energy-efficient data dissemi- social networks,” in 2014 International Conference on Privacy and
nation with D2D communications,” in Proc. IEEE VTC Spring, July Security in Mobile Systems (PRISMS), 2014.
2016. [200] S. Tu and Y. Huang, “Towards efficient and secure access control
[177] Z. Wu, L. Wang, G. Araniti, and Z. Han, “Exploiting social-interest system for mobile cloud computing,” China Communications, vol. 12,
interactions on user clustering and content dissemination in device-to- no. 12, pp. 43–52, 2015.
device communications,” in 2015 IEEE/CIC International Conference [201] S.-s. Tu, S.-z. Niu, and H. Li, “A fine-grained access control and
on Communications in China (ICCC). IEEE, Nov. 2015, pp. 1–6. revocation scheme on clouds,” Concurrency and Computation: Practice
and Experience, 2012.
[178] Q. Xu, Z. Su, K. Zhang, P. Ren, and X. S. Shen, “Epidemic information
[202] Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized
dissemination in mobile social networks with opportunistic links,”
search over encrypted outsourced data with efficiency improvement,”
IEEE Transactions on Emerging Topics in Computing, vol. 3, no. 3,
2015.
pp. 399–409, Sept. 2015.
[203] W. Xi, X.-Y. Li, C. Qian, J. Han, S. Tang, J. Zhao, and K. Zhao, “Keep:
[179] L. Wang, L. Gao, A. Zhang, and M. Chen, “Social-aware file-sharing
Fast secret key extraction protocol for D2D communication,” in 2014
mechanism for device-to-device communications,” in Wireless Commu-
IEEE 22nd International Symposium of Quality of Service (IWQoS).
nications & Signal Processing (WCSP), 2015 International Conference
IEEE, 2014, pp. 350–359.
on. IEEE, Oct. 2015, pp. 1–5.
[204] Y.-A. de Montjoye, E. Shmueli, S. S. Wang, and A. S. Pentland,
[180] J. Wang, C. Jiang, T. Q. Quek, X. Wang, and Y. Ren, “The value “openpds: Protecting the privacy of metadata through safeanswers,”
strength aided information diffusion in socially-aware mobile net- PloS one, vol. 9, no. 7, 2014.
works,” IEEE Access, vol. 4, pp. 3907–3919, Aug. 2016. [205] H. Haddadi, H. Howard, A. Chaudhry, J. Crowcroft, A. Madhavapeddy,
[181] A. Orsino, L. Militano, G. Araniti, and A. Iera, “Social-aware content and R. Mortier, “Personal data: thinking inside the box,” arXiv preprint
delivery with D2D communications support for emergency scenarios arXiv:1501.04737, 2015.
in 5g systems,” May 2016. [206] D. L. Iglesias, J. Marques, G. Cabrera, H. Rifà-Pous, X. Q. Liang,
[182] Y. Cao, T. Jiang, X. Chen, and J. Zhang, “Social-aware video multicast K. Zhang, X. Y. Shen, X. Lin, B. Li, L. Liao, H. Leung, G. Liu,
based on device-to-device communications,” IEEE Transactions on Y. Wang, and M. A. Orgun, “Trust aware system for social networks:
Mobile Computing, vol. 15, no. 6, pp. 1528–1539, June 2016. A comprehensive survey,” 2017.
[183] J. Golbeck, “Computing with trust: Definition, properties, and algo- [207] J. Petit, F. Schaub, M. Feiri, and F. Kargl, “Pseudonym schemes
rithms,” in Securecomm and Workshops, 2006. IEEE, 2006, pp. 1–7. in vehicular networks: A survey,” IEEE communications surveys &
[184] J. Golbeck and J. Hendler, “Inferring binary trust relationships in tutorials, vol. 17, no. 1, pp. 228–255, 2015.
web-based social networks,” ACM Transactions on Internet Technology [208] A. Pfitzmann and M. Hansen, “A terminology for talking about pri-
(TOIT), vol. 6, no. 4, pp. 497–529, 2006. vacy by data minimization: Anonymity, unlinkability, undetectability,
[185] J. Golbeck, “Introduction to computing with social trust,” Computing unobservability, pseudonymity, and identity management,” 2010.
with social trust, pp. 1–5, 2009. [209] A. Kate, G. M. Zaverucha, and U. Hengartner, “Anonymity and security
[186] R. Guha, R. Kumar, P. Raghavan, and A. Tomkins, “Propagation of in delay tolerant networks,” in Security and Privacy in Communica-
trust and distrust,” in Proceedings of the 13th international conference tions Networks and the Workshops, 2007. SecureComm 2007. Third
on World Wide Web. ACM, 2004, pp. 403–412. International Conference on. IEEE, 2007, pp. 504–513.
[187] Y. Wang and M. P. Singh, “Trust representation and aggregation in a [210] C.-T. Huang, L. Huang, Z. Qin, H. Yuan, L. Zhou, V. Varadharajan, and
distributed agent system,” in AAAI, vol. 6, 2006, pp. 1425–1430. C.-C. J. Kuo, “Survey on securing data storage in the cloud,” APSIPA
[188] Y. Wang, and M, Sing, “Formal trust model for multiagent systems.” Transactions on Signal and Information Processing, vol. 3, p. e7, 2014.
in IJCAI, vol. 7, 2007, pp. 1551–1556. [211] M. Grossglauser and D. Tse, “Mobility increases the capacity of ad-hoc
[189] Y. Zhang, L. Song, W. Saad, Z. Dawy, and Z. Han, “Contract-based wireless networks,” in INFOCOM, 2001, pp. 1360–1369.
incentive mechanisms for device-to-device communications in cellu- [212] S. Batabyal and P. Bhaumik, “Mobility models, traces and impact of
lar networks,” IEEE Journal on Selected Areas in Communications, mobility on opportunistic routing algorithms: A survey,” IEEE Comm.
vol. 33, no. 10, pp. 2144–2155, May 2015. Surveys & Tutorials, vol. 17, no. 3, pp. 1679–1707, 2015.
[190] M. N. Tehrani, M. Uysal, and H. Yanikomeroglu, “Device-to-device [213] M. Waqas, M. Zeng, and Y. Li, “Mobility-assisted device to device
communication in 5g cellular networks: challenges, solutions, and communications for content transmission,” in 2017 13th Interna-
future directions,” IEEE Communications Magazine, vol. 52, no. 5, tional Wireless Communications and Mobile Computing Conference
pp. 86–92, May 2014. (IWCMC), June 2017, pp. 206–211.
1553-877X (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2820069, IEEE
Communications Surveys & Tutorials
MANZOOR et al.: A SURVEY ON SOCIAL-AWARE D2D COMMUNICATIONS 29
[214] X. Hu and A. Striegel, “Redundancy elimination might be overrated: Zhu Han (S’01–M’04-SM’09-F’14) received the
A quantitative study on real-world wireless traffic,” CoRR, 2016. B.S. degree in electronic engineering from Tsinghua
University, in 1997, and the M.S. and Ph.D. degrees
in electrical and computer engineering from the
University of Maryland, College Park, in 1999 and
Manzoor Ahmed received the B.E. (1996) and M.S 2003, respectively.
(2010) degrees in Electrical Engineering and Com- From 2000 to 2002, he was an R&D Engineer of
puter Science from Balochistan Engineering Univer- JDSU, Germantown, Maryland. From 2003 to 2006,
sity, and Ph.D. (2015) degree in communication and he was a Research Associate at the University of
information systems from the Beijing University of Maryland. From 2006 to 2008, he was an assistant
Posts and Telecommunications, China. From 1997 professor at Boise State University, Idaho. Currently,
to 2000, he served as a lecturer in Balochistan he is a Professor in the Electrical and Computer Engineering Department as
Engineering University, Khuzdar, Pakistan. well as in the Computer Science Department at the University of Houston,
From 2000 to 2011, he served as a telecomm Texas. His research interests include wireless resource allocation and man-
engineer in government owned telecommunication agement, wireless communications and networking, game theory, big data
service provider NTC, Pakistan. Since 2015, he is analysis, security, and smart grid. Dr. Han received an NSF Career Award
working as a Post-doctorate researcher in the Electrical Engineering Depart- in 2010, the Fred W. Ellersick Prize of the IEEE Communication Society
ment at the University of Tsinghua, China. His research interests include in 2011, the EURASIP Best Paper Award for the Journal on Advances in
resource allocation and interference management in wireless communications Signal Processing in 2015, IEEE Leonard G. Abraham Prize in the field of
and networking, 5G, socially aware D2D communication, physical layer Communications Systems (best paper award in IEEE JSAC) in 2016, and
security, Fog and edge computing. He has several research publications in several best paper awards in IEEE conferences. Currently, Dr. Han is an IEEE
IEEE top Journals and Conferences. Dr. Manzoor received several awards, Communications Society Distinguished Lecturer.
which include distinction award from President of Pakistan, best employee
award in NTC, and the Best Paper Award in 2014 GameNets Conference.