Pub Date : 2024-03-01DOI: 10.1109/JPROC.2024.3388037
{"title":"IEEE Membership","authors":"","doi":"10.1109/JPROC.2024.3388037","DOIUrl":"https://doi.org/10.1109/JPROC.2024.3388037","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 3","pages":"C3-C3"},"PeriodicalIF":20.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10517412","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140820281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-01DOI: 10.1109/JPROC.2024.3391988
Nowadays, the use of multimotor drives has become prevalent across various modern industries due to high production efficiency, high redundancy, marked flexibility, and so on. For example, in the manufacturing industry, multimotor systems are used in conveyor systems, automated assembly lines, material handling systems, and motor control centers. In robotics, multimotor systems are used to control the movement and manipulation of robotic arms and end-effectors. As for transportation electrification, multiple motors serve as the distributed propulsion systems in electric/hybrid vehicles and all/more-electric aircraft. To meet industrial application demands, the leading global technology companies, such as ABB and Rockwell Automation, not only have developed their own representative world-class multimotor products but also continue to improve them. Overall, in light of the swift progress of industrial automation and electrification, there exists a growing demand for multimotor drives, ultimately resulting in a growing significance of the associated research.
{"title":"Scanning the Issue","authors":"","doi":"10.1109/JPROC.2024.3391988","DOIUrl":"https://doi.org/10.1109/JPROC.2024.3391988","url":null,"abstract":"Nowadays, the use of multimotor drives has become prevalent across various modern industries due to high production efficiency, high redundancy, marked flexibility, and so on. For example, in the manufacturing industry, multimotor systems are used in conveyor systems, automated assembly lines, material handling systems, and motor control centers. In robotics, multimotor systems are used to control the movement and manipulation of robotic arms and end-effectors. As for transportation electrification, multiple motors serve as the distributed propulsion systems in electric/hybrid vehicles and all/more-electric aircraft. To meet industrial application demands, the leading global technology companies, such as ABB and Rockwell Automation, not only have developed their own representative world-class multimotor products but also continue to improve them. Overall, in light of the swift progress of industrial automation and electrification, there exists a growing demand for multimotor drives, ultimately resulting in a growing significance of the associated research.","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 3","pages":"182-183"},"PeriodicalIF":20.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10517497","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140820176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-01DOI: 10.1109/JPROC.2024.3388039
{"title":"Proceedings of the IEEE Publication Information","authors":"","doi":"10.1109/JPROC.2024.3388039","DOIUrl":"https://doi.org/10.1109/JPROC.2024.3388039","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 3","pages":"C2-C2"},"PeriodicalIF":20.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10517499","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140820177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-01DOI: 10.1109/JPROC.2024.3388031
{"title":"Proceedings of the IEEE: Stay Informed. Become Inspired","authors":"","doi":"10.1109/JPROC.2024.3388031","DOIUrl":"https://doi.org/10.1109/JPROC.2024.3388031","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 3","pages":"C4-C4"},"PeriodicalIF":20.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10517498","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140820410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often serve as the first step in a sophisticated sequence of attacks that target, among other things, victims’ credentials and can cause financial losses. The problem has received mounting attention in recent years, with many publications proposing defenses against SE attacks. Despite this, the situation has not improved. In this article, we aim to understand and explain this phenomenon by investigating the root cause of the problem. To this end, we examine Internet-based SE attacks and defenses through a unique lens based on psychological factors (PFs) and psychological techniques (PTs). We find that there is a key discrepancy between attacks and defenses: SE attacks have deliberately exploited 46 PFs and 16 PTs in total, but existing defenses have only leveraged 16 PFs and seven PTs in total. This discrepancy may explain why existing defenses have achieved limited success and prompt us to propose a systematic roadmap for future research.
{"title":"Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey","authors":"Theodore Tangie Longtchi;Rosana Montañez Rodriguez;Laith Al-Shawaf;Adham Atyabi;Shouhuai Xu","doi":"10.1109/JPROC.2024.3379855","DOIUrl":"10.1109/JPROC.2024.3379855","url":null,"abstract":"Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often serve as the first step in a sophisticated sequence of attacks that target, among other things, victims’ credentials and can cause financial losses. The problem has received mounting attention in recent years, with many publications proposing defenses against SE attacks. Despite this, the situation has not improved. In this article, we aim to understand and explain this phenomenon by investigating the root cause of the problem. To this end, we examine Internet-based SE attacks and defenses through a unique lens based on psychological factors (PFs) and psychological techniques (PTs). We find that there is a key discrepancy between attacks and defenses: SE attacks have deliberately exploited 46 PFs and 16 PTs in total, but existing defenses have only leveraged 16 PFs and seven PTs in total. This discrepancy may explain why existing defenses have achieved limited success and prompt us to propose a systematic roadmap for future research.","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 3","pages":"210-246"},"PeriodicalIF":20.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140352144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bitcoin’s success as a global cryptocurrency has paved the way for the emergence of blockchain, a revolutionary category of distributed systems. However, the growing popularity of blockchain has led to a significant divergence from its core principles in many systems labeled as “blockchain.” This divergence has introduced complexity into the blockchain ecosystem, exacerbated by a lack of comprehensive reviews on blockchain and its variants. Consequently, gaining a clear and updated understanding of the diverse spectrum of current blockchain and blockchain-like systems has become challenging. This situation underscores the necessity for an extensive literature review and the development of thematic taxonomies. This survey seeks to offer a comprehensive and current assessment of existing blockchains and their variations while delineating the boundaries between blockchain and blockchain-like systems. To achieve this objective, we propose a holistic reference model for conceptualizing and analyzing these systems. Our layer-wise framework envisions all distributed ledger technologies (DLTs) as composed of four principal layers: data, consensus, execution, and application (DCEA). In addition, we introduce a new taxonomy that enhances the classification of blockchain and blockchain-like systems, offering a more useful perspective than existing works. Furthermore, we conduct a state-of-the-art review from a layered perspective, employing 23 evaluative criteria predefined by our framework. We perform a qualitative and quantitative comparative analysis of 44 DLT solutions and 26 consensus mechanisms while discussing differences and boundaries between blockchain and blockchain-like systems. We emphasize the significant challenges and tradeoffs encountered by distributed ledger designers, decision-makers, and project managers during the design or adoption of a DLT solution. Finally, we outline crucial research challenges and directions in the field of DLTs.
{"title":"Drawing the Boundaries Between Blockchain and Blockchain-Like Systems: A Comprehensive Survey on Distributed Ledger Technologies","authors":"Badr Bellaj;Aafaf Ouaddah;Emmanuel Bertin;Noel Crespi;Abdellatif Mezrioui","doi":"10.1109/JPROC.2024.3386257","DOIUrl":"https://doi.org/10.1109/JPROC.2024.3386257","url":null,"abstract":"Bitcoin’s success as a global cryptocurrency has paved the way for the emergence of blockchain, a revolutionary category of distributed systems. However, the growing popularity of blockchain has led to a significant divergence from its core principles in many systems labeled as “blockchain.” This divergence has introduced complexity into the blockchain ecosystem, exacerbated by a lack of comprehensive reviews on blockchain and its variants. Consequently, gaining a clear and updated understanding of the diverse spectrum of current blockchain and blockchain-like systems has become challenging. This situation underscores the necessity for an extensive literature review and the development of thematic taxonomies. This survey seeks to offer a comprehensive and current assessment of existing blockchains and their variations while delineating the boundaries between blockchain and blockchain-like systems. To achieve this objective, we propose a holistic reference model for conceptualizing and analyzing these systems. Our layer-wise framework envisions all distributed ledger technologies (DLTs) as composed of four principal layers: data, consensus, execution, and application (DCEA). In addition, we introduce a new taxonomy that enhances the classification of blockchain and blockchain-like systems, offering a more useful perspective than existing works. Furthermore, we conduct a state-of-the-art review from a layered perspective, employing 23 evaluative criteria predefined by our framework. We perform a qualitative and quantitative comparative analysis of 44 DLT solutions and 26 consensus mechanisms while discussing differences and boundaries between blockchain and blockchain-like systems. We emphasize the significant challenges and tradeoffs encountered by distributed ledger designers, decision-makers, and project managers during the design or adoption of a DLT solution. Finally, we outline crucial research challenges and directions in the field of DLTs.","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 3","pages":"247-299"},"PeriodicalIF":20.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140820408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-01DOI: 10.1109/JPROC.2024.3388035
{"title":"Future Special Issues/Special Sections of the Proceedings","authors":"","doi":"10.1109/JPROC.2024.3388035","DOIUrl":"https://doi.org/10.1109/JPROC.2024.3388035","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 3","pages":"300-300"},"PeriodicalIF":20.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10517494","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140820409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Full-duplex (FD) technology is gaining popularity for integration into a wide range of wireless networks due to its demonstrated potential in recent studies. In contrast to half-duplex (HD) technology, the implementation of FD in networks necessitates considering internode interference (INI) from various network perspectives. When deploying FD technology in networks, several critical factors must be taken into account. These include self-interference (SI) and the requisite SI cancellation (SIC) processes, as well as the selection of multiple user equipment (UE) per time slot. In addition, INI, including cross-link interference (CLI) and intercell interference (ICI), becomes a crucial issue during concurrent uplink (UL) and downlink (DL) transmission and reception, similar to SI. Since most INIs are challenging to eliminate, a comprehensive investigation that covers radio resource control (RRC), medium access control (MAC), and the physical (PHY) layer is essential in the context of FD network design, rather than focusing on individual network layers and types. This article covers state-of-the-art studies, including protocols and documents from the third-generation partnership project (3GPP) for FD, MAC protocol, user scheduling, and CLI handling. The methods are also compared through a network-level system simulation based on 3-D ray tracing.
全双工(FD)技术在最近的研究中显示出了巨大的潜力,因此被越来越多地集成到各种无线网络中。与半双工(HD)技术相比,在网络中实施全双工技术需要从不同的网络角度考虑节点间干扰(INI)问题。在网络中部署 FD 技术时,必须考虑几个关键因素。这些因素包括自干扰(SI)和必要的 SI 消除(SIC)过程,以及每个时隙选择多个用户设备(UE)。此外,与 SI 类似,INI(包括跨链路干扰 (CLI) 和小区间干扰 (ICI))在同时进行上行链路 (UL) 和下行链路 (DL) 传输和接收时也是一个关键问题。由于大多数 INI 难以消除,因此在 FD 网络设计中,必须对无线电资源控制 (RRC)、介质访问控制 (MAC) 和物理层 (PHY) 进行全面研究,而不是只关注单个网络层和网络类型。本文介绍了最新的研究成果,包括第三代合作伙伴项目(3GPP)中有关 FD、MAC 协议、用户调度和 CLI 处理的协议和文件。还通过基于三维光线跟踪的网络级系统仿真对这些方法进行了比较。
{"title":"A State-of-the-Art Survey on Full-Duplex Network Design","authors":"Yonghwi Kim;Hyung-Joo Moon;Hanju Yoo;Byoungnam Kim;Kai-Kit Wong;Chan-Byoung Chae","doi":"10.1109/JPROC.2024.3363218","DOIUrl":"10.1109/JPROC.2024.3363218","url":null,"abstract":"Full-duplex (FD) technology is gaining popularity for integration into a wide range of wireless networks due to its demonstrated potential in recent studies. In contrast to half-duplex (HD) technology, the implementation of FD in networks necessitates considering internode interference (INI) from various network perspectives. When deploying FD technology in networks, several critical factors must be taken into account. These include self-interference (SI) and the requisite SI cancellation (SIC) processes, as well as the selection of multiple user equipment (UE) per time slot. In addition, INI, including cross-link interference (CLI) and intercell interference (ICI), becomes a crucial issue during concurrent uplink (UL) and downlink (DL) transmission and reception, similar to SI. Since most INIs are challenging to eliminate, a comprehensive investigation that covers radio resource control (RRC), medium access control (MAC), and the physical (PHY) layer is essential in the context of FD network design, rather than focusing on individual network layers and types. This article covers state-of-the-art studies, including protocols and documents from the third-generation partnership project (3GPP) for FD, MAC protocol, user scheduling, and CLI handling. The methods are also compared through a network-level system simulation based on 3-D ray tracing.","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 5","pages":"463-486"},"PeriodicalIF":23.2,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139988432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-01DOI: 10.1109/JPROC.2024.3380373
Daniel Bonilla Licea;Mounir Ghogho;Martin Saska
The importance of ground mobile robots (MRs) and unmanned aerial vehicles (UAVs) within the research community, industry, and society is growing fast. Nowadays, many of these agents are equipped with communication systems that are, in some cases, essential to successfully achieve certain tasks. In this context, we have begun to witness the development of a new interdisciplinary research field at the intersection of robotics and communications. This research field has been boosted by the intention of integrating UAVs within the 5G and 6G communication networks and will undoubtedly lead to many important applications in the near future. Nevertheless, one of the main obstacles to the development of this research area is that most researchers address these problems by oversimplifying either the robotics or the communications aspects. Doing so impedes the ability to reach the full potential of this new interdisciplinary research area. In this tutorial, we present some of the modeling tools necessary to address problems involving both robotics and communication from an interdisciplinary perspective. As an illustrative example of such problems, we focus on the issue of communication-aware trajectory planning in this tutorial.
{"title":"When Robotics Meets Wireless Communications: An Introductory Tutorial","authors":"Daniel Bonilla Licea;Mounir Ghogho;Martin Saska","doi":"10.1109/JPROC.2024.3380373","DOIUrl":"10.1109/JPROC.2024.3380373","url":null,"abstract":"The importance of ground mobile robots (MRs) and unmanned aerial vehicles (UAVs) within the research community, industry, and society is growing fast. Nowadays, many of these agents are equipped with communication systems that are, in some cases, essential to successfully achieve certain tasks. In this context, we have begun to witness the development of a new interdisciplinary research field at the intersection of robotics and communications. This research field has been boosted by the intention of integrating UAVs within the 5G and 6G communication networks and will undoubtedly lead to many important applications in the near future. Nevertheless, one of the main obstacles to the development of this research area is that most researchers address these problems by oversimplifying either the robotics or the communications aspects. Doing so impedes the ability to reach the full potential of this new interdisciplinary research area. In this tutorial, we present some of the modeling tools necessary to address problems involving both robotics and communication from an interdisciplinary perspective. As an illustrative example of such problems, we focus on the issue of communication-aware trajectory planning in this tutorial.","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 2","pages":"140-177"},"PeriodicalIF":20.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140340589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-01DOI: 10.1109/JPROC.2024.3381483
Gustav Fechner’s 1860 delineation of psychophysics, the measurement of sensation in relation to its stimulus, is widely considered to be the advent of modern psychological science. In psychophysics, a researcher parametrically varies some aspects of a stimulus and measures the resulting changes in a human subject’s experience of that stimulus; doing so gives insight to the determining relationship between a sensation and the physical input that evoked it. This approach is used heavily in perceptual domains, including signal detection, threshold measurement, and ideal observer analysis. Scientific fields, such as vision science, have always leaned heavily on the methods and procedures of psychophysics, but there is now growing appreciation of them by machine learning researchers, sparked by widening overlap between biological and artificial perception. Machine perception that is guided by behavioral measurements, as opposed to guidance restricted to arbitrarily assigned human labels, has significant potential to fuel further progress in artificial intelligence.
{"title":"Scanning the Issue","authors":"","doi":"10.1109/JPROC.2024.3381483","DOIUrl":"https://doi.org/10.1109/JPROC.2024.3381483","url":null,"abstract":"Gustav Fechner’s 1860 delineation of psychophysics, the measurement of sensation in relation to its stimulus, is widely considered to be the advent of modern psychological science. In psychophysics, a researcher parametrically varies some aspects of a stimulus and measures the resulting changes in a human subject’s experience of that stimulus; doing so gives insight to the determining relationship between a sensation and the physical input that evoked it. This approach is used heavily in perceptual domains, including signal detection, threshold measurement, and ideal observer analysis. Scientific fields, such as vision science, have always leaned heavily on the methods and procedures of psychophysics, but there is now growing appreciation of them by machine learning researchers, sparked by widening overlap between biological and artificial perception. Machine perception that is guided by behavioral measurements, as opposed to guidance restricted to arbitrarily assigned human labels, has significant potential to fuel further progress in artificial intelligence.","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 2","pages":"86-87"},"PeriodicalIF":20.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10496399","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140544085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}