http://www.cse.psu.edu/~sxz16/papers/survey.pdf, etc.
and a couple of RFCs: RFC 4046, RFC 2627 that describes the key management issues. Many deployment scenarios (D2D, Mobile, etc.) inherit the same problems.
You need to choose the suitable scheme that best fulfills the requirements of D2D environment.