Pub Date : 2023-08-22DOI: 10.1109/COMST.2023.3301328
Dusit Niyato
I welcome you to the third issue of the IEEE Communications Surveys and Tutorials in 2023. This issue includes 18 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications,” “Cyber Security,” “IoT and M2M,” “Internet Technologies,” “Network Virtualization,” and “Network and Service Management and Green Communications.” A brief account for each of these papers is given below.
{"title":"Editorial: Third Quarter 2023 IEEE Communications Surveys and Tutorials","authors":"Dusit Niyato","doi":"10.1109/COMST.2023.3301328","DOIUrl":"https://doi.org/10.1109/COMST.2023.3301328","url":null,"abstract":"I welcome you to the third issue of the IEEE Communications Surveys and Tutorials in 2023. This issue includes 18 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications,” “Cyber Security,” “IoT and M2M,” “Internet Technologies,” “Network Virtualization,” and “Network and Service Management and Green Communications.” A brief account for each of these papers is given below.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"i-vi"},"PeriodicalIF":35.6,"publicationDate":"2023-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9739/10226436/10226448.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Low Earth Orbit (LEO) satellites undergo a period of rapid development driven by ever-increasing user demands, reduced costs, and technological progress. Since there is a lack of literature on the security and reliability issues of LEO Satellite Communication Systems (SCSs), we aim to fill this knowledge gap. Specifically, we critically appraise the inherent characteristics of LEO SCSs and elaborate on their security and reliability requirements. In light of this, we further discuss their vulnerabilities, including potential security attacks launched against them and reliability risks, followed by outlining the associated lessons learned. Subsequently, we discuss the corresponding security and reliability enhancement solutions, unveil a range of trade-offs, and summarize the lessons gleaned. Furthermore, we shed light on several promising future research directions for enhancing the security and reliability of LEO SCSs, such as integrated sensing and communication, computer vision aided communications, as well as challenges brought about by mega-constellation and commercialization. Finally, we summarize the lessons inferred and crystallize the take-away messages in our design guidelines.
{"title":"Low Earth Orbit Satellite Security and Reliability: Issues, Solutions, and the Road Ahead","authors":"Pingyue Yue;Jianping An;Jiankang Zhang;Jia Ye;Gaofeng Pan;Shuai Wang;Pei Xiao;Lajos Hanzo","doi":"10.1109/COMST.2023.3296160","DOIUrl":"https://doi.org/10.1109/COMST.2023.3296160","url":null,"abstract":"Low Earth Orbit (LEO) satellites undergo a period of rapid development driven by ever-increasing user demands, reduced costs, and technological progress. Since there is a lack of literature on the security and reliability issues of LEO Satellite Communication Systems (SCSs), we aim to fill this knowledge gap. Specifically, we critically appraise the inherent characteristics of LEO SCSs and elaborate on their security and reliability requirements. In light of this, we further discuss their vulnerabilities, including potential security attacks launched against them and reliability risks, followed by outlining the associated lessons learned. Subsequently, we discuss the corresponding security and reliability enhancement solutions, unveil a range of trade-offs, and summarize the lessons gleaned. Furthermore, we shed light on several promising future research directions for enhancing the security and reliability of LEO SCSs, such as integrated sensing and communication, computer vision aided communications, as well as challenges brought about by mega-constellation and commercialization. Finally, we summarize the lessons inferred and crystallize the take-away messages in our design guidelines.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1604-1652"},"PeriodicalIF":35.6,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-12DOI: 10.1109/COMST.2023.3294873
Jehyun Heo;Seungwoo Sung;Hyunwoo Lee;Incheol Hwang;Daesik Hong
The satellite communications (SatCom) system is a representative technology for global coverage and seamless communications in next-generation communication systems. This paper is a survey of basic studies and recent research trends for multiple input multiple output (MIMO) SatCom. Specifically, we describe and provide the differences between terrestrial networks and SatCom. Furthermore, we categorize the scenarios mainly considered in the MIMO SatCom systems and major research topics in those scenarios. We also summarize the most important technical issues currently being researched in MIMO SatCom systems, and list future works to be studied based on this. This survey is recommended for researchers who are starting research on SatCom systems or those who wish to understand the research trends associated with MIMO SatCom systems.
{"title":"MIMO Satellite Communication Systems: A Survey From the PHY Layer Perspective","authors":"Jehyun Heo;Seungwoo Sung;Hyunwoo Lee;Incheol Hwang;Daesik Hong","doi":"10.1109/COMST.2023.3294873","DOIUrl":"https://doi.org/10.1109/COMST.2023.3294873","url":null,"abstract":"The satellite communications (SatCom) system is a representative technology for global coverage and seamless communications in next-generation communication systems. This paper is a survey of basic studies and recent research trends for multiple input multiple output (MIMO) SatCom. Specifically, we describe and provide the differences between terrestrial networks and SatCom. Furthermore, we categorize the scenarios mainly considered in the MIMO SatCom systems and major research topics in those scenarios. We also summarize the most important technical issues currently being researched in MIMO SatCom systems, and list future works to be studied based on this. This survey is recommended for researchers who are starting research on SatCom systems or those who wish to understand the research trends associated with MIMO SatCom systems.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1543-1570"},"PeriodicalIF":35.6,"publicationDate":"2023-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Contrary to orthogonal multiple-access (OMA), non-orthogonal multiple-access (NOMA) schemes can serve a pool of users without exploiting the scarce frequency or time domain resources. This is useful in meeting the future network requirements (5G and beyond systems), such as, low latency, massive connectivity, users’ fairness, and high spectral efficiency. On the other hand, content caching restricts duplicate data transmission by storing popular contents in advance at the network edge which reduces data traffic. In this survey, we focus on cache-aided NOMA-based wireless networks which can reap the benefits of both cache and NOMA; switching to NOMA from OMA enables cache-aided networks to push additional files to content servers in parallel and improve the cache hit probability. Beginning with fundamentals of the cache-aided NOMA technology, we summarize the performance goals of cache-aided NOMA systems, present the associated design challenges, and categorize the recent related literature based on their application verticals. Concomitant standardization activities and open research challenges are highlighted as well.
{"title":"A Survey on Applications of Cache-Aided NOMA","authors":"Dipen Bepari;Soumen Mondal;Aniruddha Chandra;Rajeev Shukla;Yuanwei Liu;Mohsen Guizani;Arumugam Nallanathan","doi":"10.1109/COMST.2023.3293231","DOIUrl":"https://doi.org/10.1109/COMST.2023.3293231","url":null,"abstract":"Contrary to orthogonal multiple-access (OMA), non-orthogonal multiple-access (NOMA) schemes can serve a pool of users without exploiting the scarce frequency or time domain resources. This is useful in meeting the future network requirements (5G and beyond systems), such as, low latency, massive connectivity, users’ fairness, and high spectral efficiency. On the other hand, content caching restricts duplicate data transmission by storing popular contents in advance at the network edge which reduces data traffic. In this survey, we focus on cache-aided NOMA-based wireless networks which can reap the benefits of both cache and NOMA; switching to NOMA from OMA enables cache-aided networks to push additional files to content servers in parallel and improve the cache hit probability. Beginning with fundamentals of the cache-aided NOMA technology, we summarize the performance goals of cache-aided NOMA systems, present the associated design challenges, and categorize the recent related literature based on their application verticals. Concomitant standardization activities and open research challenges are highlighted as well.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1571-1603"},"PeriodicalIF":35.6,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-23DOI: 10.1109/COMST.2023.3288942
François De Keersmaeker;Yinan Cao;Gorby Kabasele Ndonda;Ramin Sadre
Publicly available datasets are an indispensable tool for researchers, as they allow testing new algorithms on a wide range of different scenarios and making scientific experiments verifiable and reproducible. Research in IoT security is no exception. In particular, the design of traffic classification and intrusion detection solutions for network security relies on network traces obtained from real networks or realistic testbeds. In this paper, we provide a detailed survey on the existing datasets containing IoT network traffic. We classify them according to several features that help researchers quickly find the datasets that fit their specific needs. In total, we survey 74 datasets that we found by analyzing more than 100 scientific articles. We also discuss the weaknesses of existing datasets, identify challenges, and point to future directions for creating new IoT datasets.
{"title":"A Survey of Public IoT Datasets for Network Security Research","authors":"François De Keersmaeker;Yinan Cao;Gorby Kabasele Ndonda;Ramin Sadre","doi":"10.1109/COMST.2023.3288942","DOIUrl":"https://doi.org/10.1109/COMST.2023.3288942","url":null,"abstract":"Publicly available datasets are an indispensable tool for researchers, as they allow testing new algorithms on a wide range of different scenarios and making scientific experiments verifiable and reproducible. Research in IoT security is no exception. In particular, the design of traffic classification and intrusion detection solutions for network security relies on network traces obtained from real networks or realistic testbeds. In this paper, we provide a detailed survey on the existing datasets containing IoT network traffic. We classify them according to several features that help researchers quickly find the datasets that fit their specific needs. In total, we survey 74 datasets that we found by analyzing more than 100 scientific articles. We also discuss the weaknesses of existing datasets, identify challenges, and point to future directions for creating new IoT datasets.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1808-1840"},"PeriodicalIF":35.6,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-19DOI: 10.1109/COMST.2023.3287431
Andrea Modenini;Barbara Ripani
This paper presents a tutorial on the Tracking, Telemetry, and Command (TT&C) for spacecraft and satellite missions. In particular, it provides a thorough summary of the design of the TT&C, starting from elementary system aspects and going down to the details of the on-board TT&C subsystem design, its units, and the physical layer. The paper is then complemented with a description of emerging TT&C techniques and technologies, the standardization framework, and practical examples of actual spacecraft design of European space missions. The here-presented tutorial is thought for professionals (also in other telecommunication engineering fields) willing to face the challenges and state-of-the-art of the TT&C, and know more about this fundamental function that allows us to control and monitor our spacecraft on a daily basis.
{"title":"A Tutorial on the Tracking, Telemetry, and Command (TT&C) for Space Missions","authors":"Andrea Modenini;Barbara Ripani","doi":"10.1109/COMST.2023.3287431","DOIUrl":"https://doi.org/10.1109/COMST.2023.3287431","url":null,"abstract":"This paper presents a tutorial on the Tracking, Telemetry, and Command (TT&C) for spacecraft and satellite missions. In particular, it provides a thorough summary of the design of the TT&C, starting from elementary system aspects and going down to the details of the on-board TT&C subsystem design, its units, and the physical layer. The paper is then complemented with a description of emerging TT&C techniques and technologies, the standardization framework, and practical examples of actual spacecraft design of European space missions. The here-presented tutorial is thought for professionals (also in other telecommunication engineering fields) willing to face the challenges and state-of-the-art of the TT&C, and know more about this fundamental function that allows us to control and monitor our spacecraft on a daily basis.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1510-1542"},"PeriodicalIF":35.6,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-02DOI: 10.1109/COMST.2023.3282264
Laurence T. Yang;Ruonan Zhao;Debin Liu;Wanli Lu;Xianjun Deng
The deep fusion of human-centered Cyber-Physical-Social Systems (CPSSs) has attracted widespread attention worldwide and big data as the blood of CPSSs could lay a solid data cornerstone for providing more proactive and accurate wisdom services. However, due to concerns about data privacy and security, traditional data centralized learning paradigm is no longer suitable. Federated Learning (FL) as an emerging distributed privacy-preserving machine learning paradigm would have great research significance and application values. Although few survey papers on FL already exist in the literature, the survey about FL from the perspective of human-centered CPSSs and tensor theory is lacking. Toward this end, we first introduce the CPSSs and deeply analyze the correlations among humans, cyber space, physical space and social space, as well as the opportunities brought by it. Afterwards, we present an overview of FL and then review extensive researches on FL in terms of resources management, communication, security and privacy protection, which provides a shortcut for readers to quickly understand and learn FL. Furthermore, the theory about tensor representation, operation and decomposition for handling massive, multi-source heterogeneous big data and corresponding applications are described. By leveraging the advantages of tensor in unified modeling, dimensionality reduction, and feature extraction, a framework and three tensor-empowered solutions are provided to solve these challenges about heterogeneous resource management, communication overhead together with security and privacy. Finally, some future research directions are listed for looking forward to inspiring more readers to devote themselves to researching tensor-empowered FL for human-centered CPSSs in the future.
{"title":"Tensor-Empowered Federated Learning for Cyber-Physical-Social Computing and Communication Systems","authors":"Laurence T. Yang;Ruonan Zhao;Debin Liu;Wanli Lu;Xianjun Deng","doi":"10.1109/COMST.2023.3282264","DOIUrl":"https://doi.org/10.1109/COMST.2023.3282264","url":null,"abstract":"The deep fusion of human-centered Cyber-Physical-Social Systems (CPSSs) has attracted widespread attention worldwide and big data as the blood of CPSSs could lay a solid data cornerstone for providing more proactive and accurate wisdom services. However, due to concerns about data privacy and security, traditional data centralized learning paradigm is no longer suitable. Federated Learning (FL) as an emerging distributed privacy-preserving machine learning paradigm would have great research significance and application values. Although few survey papers on FL already exist in the literature, the survey about FL from the perspective of human-centered CPSSs and tensor theory is lacking. Toward this end, we first introduce the CPSSs and deeply analyze the correlations among humans, cyber space, physical space and social space, as well as the opportunities brought by it. Afterwards, we present an overview of FL and then review extensive researches on FL in terms of resources management, communication, security and privacy protection, which provides a shortcut for readers to quickly understand and learn FL. Furthermore, the theory about tensor representation, operation and decomposition for handling massive, multi-source heterogeneous big data and corresponding applications are described. By leveraging the advantages of tensor in unified modeling, dimensionality reduction, and feature extraction, a framework and three tensor-empowered solutions are provided to solve these challenges about heterogeneous resource management, communication overhead together with security and privacy. Finally, some future research directions are listed for looking forward to inspiring more readers to devote themselves to researching tensor-empowered FL for human-centered CPSSs in the future.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1909-1940"},"PeriodicalIF":35.6,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-11DOI: 10.1109/COMST.2023.3264680
Marco Cook;Angelos Marnerides;Chris Johnson;Dimitrios Pezaros
Operational Technology (OT) systems have become increasingly interconnected and automated, consequently resulting in them becoming targets of cyber attacks, with the threat towards a range of critical national infrastructure (CNI) sectors becoming heightened. This is particularly the case for Industrial Control Systems (ICS), which control and operate the physical processes in CNI sectors such as water treatment, electrical generation and manufacturing. Unlike information technology (IT) systems, ICS have unique cyber-physical characteristics and related safety requirements, making them an attractive target for attacks given the physical consequences that can occur. As a result, the requirement to respond and learn from previous and new attacks is also increasing, with digital forensics playing a significant role in this process. The aim of this paper is to discuss the main issues and existing limitations related to ICS digital forensic. The field of ICS digital forensics is relatively under-developed and does not have the same levels of maturity as IT digital forensics. Although the amount of research on cyber security for ICS is increasing, many unique challenges still exist that pose as barriers to the development and deployment of ICS forensic capabilities. We provide an extensive discussion on these challenges, categorising them into technical, socio-technical, and operational and legal themes. Furthermore, the relationship between these challenge themes as well as the inter-challenge dependencies are also examined. Furthermore, this work discusses ICS forensic advances in relation to the digital forensics life chain, specifically forensic readiness and investigations. The areas of digital forensic training and processes models for ICS are given particular focus. Moreover, we assess the technologies and tools that have been either applied to or developed for ICS components and networks, giving special attention to forensic acquisition and analysis methods. An examination into the specific ICS digital forensic data sources and artefacts is also presented, highlighting that until recently, this was limited to descriptions of generic data formats. In addition, this paper provides an overview of several key ICS attacks, summarising the specific techniques used, data artefacts of interest, and proposing lessons learnt. Finally, this paper presents open discussions on future ICS digital forensics research directions and on-going issues, covering both short and long-term areas that can be addressed to improve the ICS digital forensics capability.
{"title":"A Survey on Industrial Control System Digital Forensics: Challenges, Advances and Future Directions","authors":"Marco Cook;Angelos Marnerides;Chris Johnson;Dimitrios Pezaros","doi":"10.1109/COMST.2023.3264680","DOIUrl":"https://doi.org/10.1109/COMST.2023.3264680","url":null,"abstract":"Operational Technology (OT) systems have become increasingly interconnected and automated, consequently resulting in them becoming targets of cyber attacks, with the threat towards a range of critical national infrastructure (CNI) sectors becoming heightened. This is particularly the case for Industrial Control Systems (ICS), which control and operate the physical processes in CNI sectors such as water treatment, electrical generation and manufacturing. Unlike information technology (IT) systems, ICS have unique cyber-physical characteristics and related safety requirements, making them an attractive target for attacks given the physical consequences that can occur. As a result, the requirement to respond and learn from previous and new attacks is also increasing, with digital forensics playing a significant role in this process. The aim of this paper is to discuss the main issues and existing limitations related to ICS digital forensic. The field of ICS digital forensics is relatively under-developed and does not have the same levels of maturity as IT digital forensics. Although the amount of research on cyber security for ICS is increasing, many unique challenges still exist that pose as barriers to the development and deployment of ICS forensic capabilities. We provide an extensive discussion on these challenges, categorising them into technical, socio-technical, and operational and legal themes. Furthermore, the relationship between these challenge themes as well as the inter-challenge dependencies are also examined. Furthermore, this work discusses ICS forensic advances in relation to the digital forensics life chain, specifically forensic readiness and investigations. The areas of digital forensic training and processes models for ICS are given particular focus. Moreover, we assess the technologies and tools that have been either applied to or developed for ICS components and networks, giving special attention to forensic acquisition and analysis methods. An examination into the specific ICS digital forensic data sources and artefacts is also presented, highlighting that until recently, this was limited to descriptions of generic data formats. In addition, this paper provides an overview of several key ICS attacks, summarising the specific techniques used, data artefacts of interest, and proposing lessons learnt. Finally, this paper presents open discussions on future ICS digital forensics research directions and on-going issues, covering both short and long-term areas that can be addressed to improve the ICS digital forensics capability.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1705-1747"},"PeriodicalIF":35.6,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-10DOI: 10.1109/COMST.2023.3265841
Antoine Grenier;Elena Simona Lohan;Aleksandr Ometov;Jari Nurmi
With the miniaturization of electronics, receivers are getting more and more embedded into devices with harsh energy constraints. This process has led to new signal processing challenges due to the limited processing power on battery-operated devices and to challenging wireless environments, such as deep urban canyons, tunnels and bridges, forest canopies, increased jamming and spoofing. The latter is typically tackled via new GNSS constellations and modernization of the GNSS signals. However, the increase in signal complexity leads to higher computation requirements to recover the signals; thus, the trade-off between precision and energy should be evaluated for each application. This paper dives into low-power GNSS, focusing on the energy consumption of satellite-based positioning receivers used in battery-operated consumer devices and Internet of Things (IoT) sensors. We briefly overview the GNSS basics and the differences between legacy and modernized signals. Factors dominating the energy consumption of GNSS receivers are then reviewed, with special attention given to the complexity of the processing algorithms. Onboard and offloaded (Cloud/Edge) processing strategies are explored and compared. Finally, we highlight the current challenges of today’s research in low-power GNSS.
{"title":"A Survey on Low-Power GNSS","authors":"Antoine Grenier;Elena Simona Lohan;Aleksandr Ometov;Jari Nurmi","doi":"10.1109/COMST.2023.3265841","DOIUrl":"https://doi.org/10.1109/COMST.2023.3265841","url":null,"abstract":"With the miniaturization of electronics, receivers are getting more and more embedded into devices with harsh energy constraints. This process has led to new signal processing challenges due to the limited processing power on battery-operated devices and to challenging wireless environments, such as deep urban canyons, tunnels and bridges, forest canopies, increased jamming and spoofing. The latter is typically tackled via new GNSS constellations and modernization of the GNSS signals. However, the increase in signal complexity leads to higher computation requirements to recover the signals; thus, the trade-off between precision and energy should be evaluated for each application. This paper dives into low-power GNSS, focusing on the energy consumption of satellite-based positioning receivers used in battery-operated consumer devices and Internet of Things (IoT) sensors. We briefly overview the GNSS basics and the differences between legacy and modernized signals. Factors dominating the energy consumption of GNSS receivers are then reviewed, with special attention given to the complexity of the processing algorithms. Onboard and offloaded (Cloud/Edge) processing strategies are explored and compared. Finally, we highlight the current challenges of today’s research in low-power GNSS.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1482-1509"},"PeriodicalIF":35.6,"publicationDate":"2023-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9739/10226436/10097786.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the growth of network applications such as 5G and artificial intelligence, network security techniques, i.e., the techniques that detect various attacks (e.g., well-known denial-of-service (DDoS) attacks) and prevent production networks (e.g., data center networks) from being attacked, become increasingly essential for network management and have gained great popularity in the networking community. Generally, these techniques are built on proprietary hardware appliances, i.e., middleboxes, or the paradigm that combines both software-defined networking (SDN) and network function virtualization (NFV) to implement security functions. However, the techniques built on middleboxes are proven to be hard-to-manage, costly, and inflexible, thereby making them an out-of-date choice in network security. For the techniques built on SDN and NFV, they virtualize and softwarize security functions on commodity servers, leading to non-trivial performance degradation. Fortunately, the recent emergence of programmable switches brings new opportunities of empowering network security techniques with the characteristics of easy-to-manage, low cost, high flexibility, and Tbps-level performance. In this survey, we focus on this promising trend in network security. More precisely, this survey first presents the preliminaries of programmable switches, which are the primary driver of next-generation network security techniques. Next, we comprehensively review existing techniques built on programmable switches, classify these techniques, and discuss their background, motivation, design, implementation, and limitations case-by-case. Finally, we summarize open issues and future research directions in this promising research topic of network security.
{"title":"Empowering Network Security With Programmable Switches: A Comprehensive Survey","authors":"Xiang Chen;Chunming Wu;Xuan Liu;Qun Huang;Dong Zhang;Haifeng Zhou;Qiang Yang;Muhammad Khurram Khan","doi":"10.1109/COMST.2023.3265984","DOIUrl":"https://doi.org/10.1109/COMST.2023.3265984","url":null,"abstract":"With the growth of network applications such as 5G and artificial intelligence, network security techniques, i.e., the techniques that detect various attacks (e.g., well-known denial-of-service (DDoS) attacks) and prevent production networks (e.g., data center networks) from being attacked, become increasingly essential for network management and have gained great popularity in the networking community. Generally, these techniques are built on proprietary hardware appliances, i.e., middleboxes, or the paradigm that combines both software-defined networking (SDN) and network function virtualization (NFV) to implement security functions. However, the techniques built on middleboxes are proven to be hard-to-manage, costly, and inflexible, thereby making them an out-of-date choice in network security. For the techniques built on SDN and NFV, they virtualize and softwarize security functions on commodity servers, leading to non-trivial performance degradation. Fortunately, the recent emergence of programmable switches brings new opportunities of empowering network security techniques with the characteristics of easy-to-manage, low cost, high flexibility, and Tbps-level performance. In this survey, we focus on this promising trend in network security. More precisely, this survey first presents the preliminaries of programmable switches, which are the primary driver of next-generation network security techniques. Next, we comprehensively review existing techniques built on programmable switches, classify these techniques, and discuss their background, motivation, design, implementation, and limitations case-by-case. Finally, we summarize open issues and future research directions in this promising research topic of network security.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1653-1704"},"PeriodicalIF":35.6,"publicationDate":"2023-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}