首页 > 最新文献

IEEE Communications Surveys and Tutorials最新文献

英文 中文
Online Network DoS/DDoS Detection: Sampling, Change Point Detection, and Machine Learning Methods 在线网络 DoS/DDoS 检测:采样、变化点检测和机器学习方法
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-30 DOI: 10.1109/COMST.2024.3488580
Evans Owusu;Mohamed Rahouti;Senthil Kumar Jagatheesaperumal;Kaiqi Xiong;Yufeng Xin;Lu Lu;D. Frank Hsu
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks continue to pose significant threats to networked systems, causing disruptions that can lead to substantial financial losses. These attacks exploit vulnerabilities in network architecture to overwhelm systems, rendering them unavailable to legitimate users. The complexity and evolving nature of DoS/DDoS attacks necessitate advanced detection techniques that can operate effectively in real-time environments. This paper comprehensively examines current methodologies for online DoS/DDoS attack detection. We explore integrating sampling techniques and Change Point Detection (CPD) with Machine Learning (ML) approaches to enhance the detection and identification of DoS/DDoS activities in network traffic. We further assess the various sampling methods and their impact on the performance of online detection, considering both the efficiency and accuracy of these techniques in real-world applications. Lastly, we delve into the challenges of deploying these technologies in operational network environments, highlighting practical implications and future research directions. Our review synthesizes findings from recent studies, providing a critical analysis of existing strategies and proposing a unified framework that leverages CPD, ML, and targeted sampling to improve the resilience of networks against these disruptive cyber threats.
拒绝服务(DoS)和分布式拒绝服务(DDoS)攻击继续对网络系统构成重大威胁,造成中断,可能导致大量经济损失。这些攻击利用网络架构中的漏洞使系统不堪重负,使合法用户无法访问这些系统。DoS/DDoS攻击的复杂性和不断发展的性质需要能够在实时环境中有效运行的先进检测技术。本文全面考察了当前在线DoS/DDoS攻击检测的方法。我们探索将采样技术和变化点检测(CPD)与机器学习(ML)方法相结合,以增强对网络流量中DoS/DDoS活动的检测和识别。我们进一步评估了各种采样方法及其对在线检测性能的影响,同时考虑了这些技术在实际应用中的效率和准确性。最后,我们深入研究了在运营网络环境中部署这些技术所面临的挑战,强调了实际意义和未来的研究方向。我们的综述综合了最近的研究结果,对现有策略进行了批判性分析,并提出了一个统一的框架,该框架利用CPD、ML和有针对性的抽样来提高网络对这些破坏性网络威胁的弹性。
{"title":"Online Network DoS/DDoS Detection: Sampling, Change Point Detection, and Machine Learning Methods","authors":"Evans Owusu;Mohamed Rahouti;Senthil Kumar Jagatheesaperumal;Kaiqi Xiong;Yufeng Xin;Lu Lu;D. Frank Hsu","doi":"10.1109/COMST.2024.3488580","DOIUrl":"10.1109/COMST.2024.3488580","url":null,"abstract":"Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks continue to pose significant threats to networked systems, causing disruptions that can lead to substantial financial losses. These attacks exploit vulnerabilities in network architecture to overwhelm systems, rendering them unavailable to legitimate users. The complexity and evolving nature of DoS/DDoS attacks necessitate advanced detection techniques that can operate effectively in real-time environments. This paper comprehensively examines current methodologies for online DoS/DDoS attack detection. We explore integrating sampling techniques and Change Point Detection (CPD) with Machine Learning (ML) approaches to enhance the detection and identification of DoS/DDoS activities in network traffic. We further assess the various sampling methods and their impact on the performance of online detection, considering both the efficiency and accuracy of these techniques in real-world applications. Lastly, we delve into the challenges of deploying these technologies in operational network environments, highlighting practical implications and future research directions. Our review synthesizes findings from recent studies, providing a critical analysis of existing strategies and proposing a unified framework that leverages CPD, ML, and targeted sampling to improve the resilience of networks against these disruptive cyber threats.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 4","pages":"2543-2580"},"PeriodicalIF":34.4,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142555981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Overview on UWB Radar: Applications, Standards, Signal Processing Techniques, Datasets, Radio Chips, Trends and Future Research Directions 关于超宽带波雷达的全面概述:应用、标准、信号处理技术、数据集、无线电芯片、趋势和未来研究方向
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-30 DOI: 10.1109/COMST.2024.3488173
Mohammad Cheraghinia;Adnan Shahid;Stijn Luchie;Gert-Jan Gordebeke;Olivier Caytan;Jaron Fontaine;Ben Van Herbruggen;Sam Lemey;Eli De Poorter
Due to their large bandwidth, relatively low cost, and robust performance, Ultra-Wideband (UWB) radio chips can be used for a wide variety of applications, including localization, communication, and radar. This article offers an exhaustive survey of recent progress in UWB radar technology. The goal of this survey is to provide a comprehensive view of the technical fundamentals and emerging trends in UWB radar. Our analysis is categorized into multiple parts. Firstly, we explore the fundamental concepts of UWB radar technology from a technology and standardization point of view. Secondly, we examine the most relevant UWB applications and use cases, such as device-free localization, activity recognition, presence detection, and vital sign monitoring, discussing each time the bandwidth requirements, processing techniques, algorithms, latest developments, relevant example papers, and trends. Next, we steer readers toward relevant datasets and available radio chipsets. Finally, we discuss ongoing challenges and potential future research avenues. As such, this overview paper is designed to be a cornerstone reference for researchers charting the course of UWB radar technology over the last decade.
由于其大带宽,相对较低的成本和强大的性能,超宽带(UWB)无线电芯片可用于各种各样的应用,包括定位,通信和雷达。本文对超宽带雷达技术的最新进展进行了详尽的综述。本调查的目的是提供超宽带雷达的技术基础和新兴趋势的全面观点。我们的分析分为多个部分。首先,从技术和标准化的角度探讨了超宽带雷达技术的基本概念。其次,我们研究了最相关的超宽带应用和用例,如无设备定位、活动识别、存在检测和生命体征监测,讨论了每次的带宽需求、处理技术、算法、最新发展、相关的示例论文和趋势。接下来,我们将引导读者了解相关数据集和可用的无线电芯片组。最后,我们讨论了当前的挑战和潜在的未来研究途径。因此,这篇综述论文旨在成为研究人员在过去十年中绘制超宽带雷达技术进程的基础参考。
{"title":"A Comprehensive Overview on UWB Radar: Applications, Standards, Signal Processing Techniques, Datasets, Radio Chips, Trends and Future Research Directions","authors":"Mohammad Cheraghinia;Adnan Shahid;Stijn Luchie;Gert-Jan Gordebeke;Olivier Caytan;Jaron Fontaine;Ben Van Herbruggen;Sam Lemey;Eli De Poorter","doi":"10.1109/COMST.2024.3488173","DOIUrl":"10.1109/COMST.2024.3488173","url":null,"abstract":"Due to their large bandwidth, relatively low cost, and robust performance, Ultra-Wideband (UWB) radio chips can be used for a wide variety of applications, including localization, communication, and radar. This article offers an exhaustive survey of recent progress in UWB radar technology. The goal of this survey is to provide a comprehensive view of the technical fundamentals and emerging trends in UWB radar. Our analysis is categorized into multiple parts. Firstly, we explore the fundamental concepts of UWB radar technology from a technology and standardization point of view. Secondly, we examine the most relevant UWB applications and use cases, such as device-free localization, activity recognition, presence detection, and vital sign monitoring, discussing each time the bandwidth requirements, processing techniques, algorithms, latest developments, relevant example papers, and trends. Next, we steer readers toward relevant datasets and available radio chipsets. Finally, we discuss ongoing challenges and potential future research avenues. As such, this overview paper is designed to be a cornerstone reference for researchers charting the course of UWB radar technology over the last decade.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 4","pages":"2283-2324"},"PeriodicalIF":34.4,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142555983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RIS-Assisted Physical Layer Security in Emerging RF and Optical Wireless Communications Systems: A Comprehensive Survey 新兴射频和光无线通信系统中的 RIS 辅助物理层安全:全面调查
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-28 DOI: 10.1109/COMST.2024.3487112
Majid H. Khoshafa;Omar Maraqa;Jules M. Moualeu;Sylvester Aboagye;Telex M. N. Ngatched;Mohamed H. Ahmed;Yasser Gadallah;Marco Di Renzo
Security and latency are crucial aspects in the design of future wireless networks. Physical layer security (PLS) has received a growing interest from the research community in recent years for its ability to safeguard data confidentiality without relying on key distribution or encryption/decryption, and for its latency advantage over bit-level cryptographic techniques. However, the evolution towards the fifth generation wireless technology and beyond poses new security challenges that must be addressed in order to fulfill the unprecedented performance requirements of future wireless communications networks. Among the potential key-enabling technologies, reconfigurable intelligent surface (RIS) has attracted extensive attention due to its ability to proactively and intelligently reconfigure the wireless propagation environment to combat dynamic channel impairments. Consequently, the RIS technology can be adopted to improve the information-theoretic security of both radio frequency (RF) and optical wireless communications (OWC) systems. It is worth noting that the configuration of RIS in RF communications is different from that in optical systems at many levels (e.g., RIS materials, signal characteristics, and functionalities). This survey article provides a comprehensive overview of the information-theoretic security of RIS-based RF and optical systems. The article first discusses the fundamental concepts of PLS and RIS technologies, followed by their combination in both RF and OWC systems. Subsequently, some optimization techniques are presented in the context of the underlying system model, followed by an assessment of the impact of RIS-assisted PLS through a comprehensive performance analysis. Given that the computational complexity of future communications systems that adopt RIS-assisted PLS is likely to increase rapidly as the number of interactions between the users and infrastructure grows, machine learning (ML) is seen as a promising approach to address this complexity issue while sustaining or improving the network performance. A discussion of recent research studies on RIS-assisted PLS-based systems embedded with ML is presented. Furthermore, some important open research challenges are proposed and discussed to provide insightful future research directions, with the aim of moving a step closer towards the development and implementation of the forthcoming sixth-generation (6G) wireless technology.
安全性和延迟是未来无线网络设计的重要方面。物理层安全(PLS)近年来受到了研究团体越来越多的关注,因为它能够在不依赖于密钥分发或加密/解密的情况下保护数据机密性,而且它比位级加密技术具有延迟优势。然而,向第五代及以上无线技术的发展提出了新的安全挑战,必须解决这些挑战,以满足未来无线通信网络前所未有的性能要求。在潜在的关键使能技术中,可重构智能表面(RIS)由于能够主动和智能地重新配置无线传播环境以对抗动态信道损伤而引起了广泛的关注。因此,RIS技术可以用于提高射频(RF)和光无线通信(OWC)系统的信息论安全性。值得注意的是,射频通信中RIS的配置在许多层面上与光学系统中的配置不同(例如,RIS材料、信号特性和功能)。本文对基于ris的射频和光学系统的信息安全进行了全面的综述。本文首先讨论了PLS和RIS技术的基本概念,然后讨论了它们在RF和OWC系统中的组合。随后,在基础系统模型的背景下提出了一些优化技术,然后通过全面的性能分析评估ris辅助PLS的影响。考虑到采用ris辅助PLS的未来通信系统的计算复杂性可能会随着用户和基础设施之间交互数量的增加而迅速增加,机器学习(ML)被视为一种有前途的方法,可以在维持或改善网络性能的同时解决这一复杂性问题。本文讨论了近年来基于gis辅助pls的嵌入式机器学习系统的研究进展。此外,还提出并讨论了一些重要的开放式研究挑战,以提供有见地的未来研究方向,目的是朝着即将到来的第六代(6G)无线技术的开发和实施迈进一步。
{"title":"RIS-Assisted Physical Layer Security in Emerging RF and Optical Wireless Communications Systems: A Comprehensive Survey","authors":"Majid H. Khoshafa;Omar Maraqa;Jules M. Moualeu;Sylvester Aboagye;Telex M. N. Ngatched;Mohamed H. Ahmed;Yasser Gadallah;Marco Di Renzo","doi":"10.1109/COMST.2024.3487112","DOIUrl":"10.1109/COMST.2024.3487112","url":null,"abstract":"Security and latency are crucial aspects in the design of future wireless networks. Physical layer security (PLS) has received a growing interest from the research community in recent years for its ability to safeguard data confidentiality without relying on key distribution or encryption/decryption, and for its latency advantage over bit-level cryptographic techniques. However, the evolution towards the fifth generation wireless technology and beyond poses new security challenges that must be addressed in order to fulfill the unprecedented performance requirements of future wireless communications networks. Among the potential key-enabling technologies, reconfigurable intelligent surface (RIS) has attracted extensive attention due to its ability to proactively and intelligently reconfigure the wireless propagation environment to combat dynamic channel impairments. Consequently, the RIS technology can be adopted to improve the information-theoretic security of both radio frequency (RF) and optical wireless communications (OWC) systems. It is worth noting that the configuration of RIS in RF communications is different from that in optical systems at many levels (e.g., RIS materials, signal characteristics, and functionalities). This survey article provides a comprehensive overview of the information-theoretic security of RIS-based RF and optical systems. The article first discusses the fundamental concepts of PLS and RIS technologies, followed by their combination in both RF and OWC systems. Subsequently, some optimization techniques are presented in the context of the underlying system model, followed by an assessment of the impact of RIS-assisted PLS through a comprehensive performance analysis. Given that the computational complexity of future communications systems that adopt RIS-assisted PLS is likely to increase rapidly as the number of interactions between the users and infrastructure grows, machine learning (ML) is seen as a promising approach to address this complexity issue while sustaining or improving the network performance. A discussion of recent research studies on RIS-assisted PLS-based systems embedded with ML is presented. Furthermore, some important open research challenges are proposed and discussed to provide insightful future research directions, with the aim of moving a step closer towards the development and implementation of the forthcoming sixth-generation (6G) wireless technology.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 4","pages":"2156-2203"},"PeriodicalIF":34.4,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142536825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Preserving Data-Driven Learning Models for Emerging Communication Networks: A Comprehensive Survey 新兴通信网络的隐私保护数据驱动学习模型:全面调查
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-28 DOI: 10.1109/COMST.2024.3486690
Mostafa M. Fouda;Zubair Md Fadlullah;Mohamed I. Ibrahem;Nei Kato
With the proliferation of Beyond 5G (B5G) communication systems and heterogeneous networks, mobile broadband users are generating massive volumes of data that undergo fast processing and computing to obtain actionable insights. While analyzing this huge amount of data typically involves machine and deep learning-based data-driven Artificial Intelligence (AI) models, a key challenge arises in terms of providing privacy assurances for user-generated data. Even though data-driven techniques have been widely utilized for network traffic analysis and other network management tasks, researchers have also identified that applying AI techniques may often lead to severe privacy concerns. Therefore, the concept of privacy-preserving data-driven learning models has recently emerged as a hot area of research to facilitate model training on large-scale datasets while guaranteeing privacy along with the security of the data. In this paper, we first demonstrate the research gap in this domain, followed by a tutorial-oriented review of data-driven models, which can be potentially mapped to privacy-preserving techniques. Then, we provide preliminaries of a number of privacy-preserving techniques (e.g., differential privacy, functional encryption, Homomorphic encryption, secure multi-party computation, and federated learning) that can be potentially adopted for emerging communication networks. The provided preliminaries enable us to showcase the subset of data-driven privacy-preserving models, which are gaining traction in emerging communication network systems. We provide a number of relevant networking use cases, ranging from the B5G core and Radio Access Networks (RANs) to semantic communications, adopting privacy-preserving data-driven models. Based on the lessons learned from the pertinent use cases, we also identify several open research challenges and hint toward possible solutions.
随着超5G (B5G)通信系统和异构网络的普及,移动宽带用户正在生成大量数据,这些数据经过快速处理和计算,以获得可操作的见解。虽然分析这些大量数据通常涉及基于机器和深度学习的数据驱动的人工智能(AI)模型,但在为用户生成的数据提供隐私保证方面出现了一个关键挑战。尽管数据驱动技术已被广泛用于网络流量分析和其他网络管理任务,但研究人员也发现,应用人工智能技术可能经常导致严重的隐私问题。因此,保护隐私的数据驱动学习模型的概念近年来成为研究的热点,以促进大规模数据集上的模型训练,同时保证数据的隐私和安全性。在本文中,我们首先展示了该领域的研究差距,然后对数据驱动模型进行了面向教程的回顾,这些模型可以潜在地映射到隐私保护技术。然后,我们提供了一些隐私保护技术(例如,差分隐私、功能加密、同态加密、安全多方计算和联邦学习)的初步介绍,这些技术可能被用于新兴的通信网络。所提供的初步说明使我们能够展示数据驱动的隐私保护模型的子集,这些模型在新兴的通信网络系统中越来越受到关注。我们提供了许多相关的网络用例,从B5G核心和无线接入网络(ran)到语义通信,采用保护隐私的数据驱动模型。基于从相关用例中获得的经验教训,我们还确定了几个开放的研究挑战,并暗示了可能的解决方案。
{"title":"Privacy-Preserving Data-Driven Learning Models for Emerging Communication Networks: A Comprehensive Survey","authors":"Mostafa M. Fouda;Zubair Md Fadlullah;Mohamed I. Ibrahem;Nei Kato","doi":"10.1109/COMST.2024.3486690","DOIUrl":"10.1109/COMST.2024.3486690","url":null,"abstract":"With the proliferation of Beyond 5G (B5G) communication systems and heterogeneous networks, mobile broadband users are generating massive volumes of data that undergo fast processing and computing to obtain actionable insights. While analyzing this huge amount of data typically involves machine and deep learning-based data-driven Artificial Intelligence (AI) models, a key challenge arises in terms of providing privacy assurances for user-generated data. Even though data-driven techniques have been widely utilized for network traffic analysis and other network management tasks, researchers have also identified that applying AI techniques may often lead to severe privacy concerns. Therefore, the concept of privacy-preserving data-driven learning models has recently emerged as a hot area of research to facilitate model training on large-scale datasets while guaranteeing privacy along with the security of the data. In this paper, we first demonstrate the research gap in this domain, followed by a tutorial-oriented review of data-driven models, which can be potentially mapped to privacy-preserving techniques. Then, we provide preliminaries of a number of privacy-preserving techniques (e.g., differential privacy, functional encryption, Homomorphic encryption, secure multi-party computation, and federated learning) that can be potentially adopted for emerging communication networks. The provided preliminaries enable us to showcase the subset of data-driven privacy-preserving models, which are gaining traction in emerging communication network systems. We provide a number of relevant networking use cases, ranging from the B5G core and Radio Access Networks (RANs) to semantic communications, adopting privacy-preserving data-driven models. Based on the lessons learned from the pertinent use cases, we also identify several open research challenges and hint toward possible solutions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 4","pages":"2505-2542"},"PeriodicalIF":34.4,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142536857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Odor-Based Molecular Communications: State-of-the-Art, Vision, Challenges, and Frontier Directions 基于气味的分子通讯:技术现状、愿景、挑战和前沿方向
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-28 DOI: 10.1109/COMST.2024.3487472
Dilara Aktas;Beyza E. Ortlek;Meltem Civas;Elham Baradari;Ahmet B. Kilic;Fatih E. Bilgen;Ayse S. Okcu;Melanie Whitfield;Oktay Cetinkaya;Ozgur B. Akan
Humankind mimics the processes and strategies that nature has perfected and uses them as a model to address its problems. This has led to a new communication technology, molecular communication (MC), using molecules to encode, transmit, and receive information. Despite extensive research, an innate MC method found abundantly in nature-olfactory or odor communication-has not been thoroughly studied using information and communication technologies (ICT). Existing studies focus on digitizing this sense and developing actuators without examining odor-based information coding and MC principles, significantly limiting its application potential. Hence, cross-disciplinary research is needed to uncover the fundamentals of this unconventional communication modality from an ICT perspective. The ways of natural odor MC in nature need to be anatomized and engineered for end-to-end communication among humans and human-made things to enable several multi-sense augmented reality technologies reinforced with olfactory senses for novel applications and solutions in the Internet of Everything (IoE). This paper introduces odor-based molecular communication (OMC) and thoroughly examines olfactory systems, exploring odor communication in nature, including odor information, channels, reception, spatial perception, and cognitive functions. Additionally, a comprehensive comparison of various communication systems sets the foundation for further investigation. By highlighting OMC’s unique characteristics, advantages, and potential applications, this paper lays the groundwork for modeling end-to-end OMC channels, designing OMC transmitters and receivers, and developing innovative OMC techniques.
人类模仿大自然完善的过程和策略,并将其作为解决问题的模式。这导致了一种新的通信技术,分子通信(MC),利用分子来编码、传输和接收信息。尽管进行了广泛的研究,但在自然界中发现的一种先天MC方法-嗅觉或气味交流-尚未利用信息和通信技术(ICT)进行深入研究。现有的研究主要集中在将这种感觉数字化和开发执行器上,而没有研究基于气味的信息编码和MC原理,这大大限制了其应用潜力。因此,需要跨学科的研究来从ICT的角度揭示这种非传统通信方式的基础。自然界中自然气味MC的方式需要被解剖学和工程化,以实现人类和人造物之间的端到端通信,从而使几种以嗅觉增强的多感官增强现实技术在万物互联(IoE)中获得新的应用和解决方案。本文介绍了基于气味的分子通信(OMC),并对嗅觉系统进行了深入的研究,探讨了自然界中的气味通信,包括气味信息、通道、接收、空间感知和认知功能。此外,对各种通信系统的全面比较为进一步研究奠定了基础。通过强调OMC的独特特点、优势和潜在应用,为端到端OMC信道建模、OMC发射机和接收机设计以及开发创新的OMC技术奠定了基础。
{"title":"Odor-Based Molecular Communications: State-of-the-Art, Vision, Challenges, and Frontier Directions","authors":"Dilara Aktas;Beyza E. Ortlek;Meltem Civas;Elham Baradari;Ahmet B. Kilic;Fatih E. Bilgen;Ayse S. Okcu;Melanie Whitfield;Oktay Cetinkaya;Ozgur B. Akan","doi":"10.1109/COMST.2024.3487472","DOIUrl":"10.1109/COMST.2024.3487472","url":null,"abstract":"Humankind mimics the processes and strategies that nature has perfected and uses them as a model to address its problems. This has led to a new communication technology, molecular communication (MC), using molecules to encode, transmit, and receive information. Despite extensive research, an innate MC method found abundantly in nature-olfactory or odor communication-has not been thoroughly studied using information and communication technologies (ICT). Existing studies focus on digitizing this sense and developing actuators without examining odor-based information coding and MC principles, significantly limiting its application potential. Hence, cross-disciplinary research is needed to uncover the fundamentals of this unconventional communication modality from an ICT perspective. The ways of natural odor MC in nature need to be anatomized and engineered for end-to-end communication among humans and human-made things to enable several multi-sense augmented reality technologies reinforced with olfactory senses for novel applications and solutions in the Internet of Everything (IoE). This paper introduces odor-based molecular communication (OMC) and thoroughly examines olfactory systems, exploring odor communication in nature, including odor information, channels, reception, spatial perception, and cognitive functions. Additionally, a comprehensive comparison of various communication systems sets the foundation for further investigation. By highlighting OMC’s unique characteristics, advantages, and potential applications, this paper lays the groundwork for modeling end-to-end OMC channels, designing OMC transmitters and receivers, and developing innovative OMC techniques.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 4","pages":"2658-2692"},"PeriodicalIF":34.4,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142536802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding Wireless Charger Networks: Concepts, Current Research, and Future Directions 了解无线充电器网络:概念、当前研究和未来方向
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-28 DOI: 10.1109/COMST.2024.3486820
Meixuan Ren;Haipeng Dai;Tang Liu;Xianjun Deng;Wanchun Dou;Yuanyuan Yang;Guihai Chen
Wireless Charger Network (WCN) emerges as a promising networking paradigm, employing wireless chargers with Wireless Power Transfer (WPT) technology to provide long-term and sustainable energy supply for future networks. Although extensive research has been conducted in this area over the last decade, there is currently no comprehensive survey to compile the latest literature and provide insights into future research directions. To fill this gap, our survey explores the recent developments in the active research area of WCNs. This paper starts by providing a framework of WCNs in detail, covering aspects of network architecture, various charging models, network design issues, and typical applications of WCNs. Then, we give an overview of charger deployment schemes, focusing on omnidirectional, directional, non-radiative, and heterogeneous charger deployments. We also provide an overview of charging scheduling schemes, encompassing power control, time allocation, energy beamforming, and multi-resource scheduling. Moreover, we explore communication optimization schemes, including Medium Access Control (MAC) protocols, routing protocols, broadcast transmission, and data collection. Finally, we highlight some future research directions and present corresponding open issues to advance the research on WCNs.
无线充电器网络(Wireless Charger Network, WCN)是一种极具发展前景的网络模式,它采用无线充电器和无线电力传输(Wireless Power Transfer, WPT)技术,为未来网络提供长期、可持续的能源供应。虽然在过去的十年中在这一领域进行了广泛的研究,但目前还没有全面的调查来汇编最新的文献并为未来的研究方向提供见解。为了填补这一空白,我们的调查探讨了WCNs活跃研究领域的最新发展。本文首先详细介绍了无线网络网络的框架,包括网络架构、各种收费模式、网络设计问题以及无线网络网络的典型应用。然后,我们概述了充电器部署方案,重点是全向,定向,非辐射和异构充电器部署。我们还概述了充电调度方案,包括功率控制、时间分配、能量波束形成和多资源调度。此外,我们还探讨了通信优化方案,包括介质访问控制(MAC)协议、路由协议、广播传输和数据收集。最后,对未来的研究方向进行了展望,并提出了相应的开放性问题,以促进WCNs的研究。
{"title":"Understanding Wireless Charger Networks: Concepts, Current Research, and Future Directions","authors":"Meixuan Ren;Haipeng Dai;Tang Liu;Xianjun Deng;Wanchun Dou;Yuanyuan Yang;Guihai Chen","doi":"10.1109/COMST.2024.3486820","DOIUrl":"10.1109/COMST.2024.3486820","url":null,"abstract":"Wireless Charger Network (WCN) emerges as a promising networking paradigm, employing wireless chargers with Wireless Power Transfer (WPT) technology to provide long-term and sustainable energy supply for future networks. Although extensive research has been conducted in this area over the last decade, there is currently no comprehensive survey to compile the latest literature and provide insights into future research directions. To fill this gap, our survey explores the recent developments in the active research area of WCNs. This paper starts by providing a framework of WCNs in detail, covering aspects of network architecture, various charging models, network design issues, and typical applications of WCNs. Then, we give an overview of charger deployment schemes, focusing on omnidirectional, directional, non-radiative, and heterogeneous charger deployments. We also provide an overview of charging scheduling schemes, encompassing power control, time allocation, energy beamforming, and multi-resource scheduling. Moreover, we explore communication optimization schemes, including Medium Access Control (MAC) protocols, routing protocols, broadcast transmission, and data collection. Finally, we highlight some future research directions and present corresponding open issues to advance the research on WCNs.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 4","pages":"2247-2282"},"PeriodicalIF":34.4,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142536791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interference Burden in Wireless Communications: A Comprehensive Survey From PHY Layer Perspective 无线通信中的干扰负担:从物理层角度全面考察
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-28 DOI: 10.1109/COMST.2024.3487068
Armed Tusha;Hüseyin Arslan
Interference represents one of the most common barriers for the wireless communications society to bring the fully connected world to life, where everybody and everything is connected at any time, aiming to support a wide range of services and applications with increasing demand in terms of data rate with a higher degree of reliability and security, while keeping an affordable overall system capacity, complexity, and latency. Essentially, interference clearly explains the primitive nature of the wireless communications systems, where there is always an unwanted physical signal that disrupts the communication link, occurring from the physical layer (PHY) architecture of transmission signal, its interaction with the wireless channel and transceiver architecture in particular. Therefore, in past wireless technologies, waveform design along with wireless channel impairments and handset architecture define the main sources of interference, leading to inter-symbol interference (ISI), inter-carrier interference (ICI) and co-channel interference (CCI) types. In this line, recent advances in wireless technologies have revealed unprecedented interference types including inter-numerology interference (INI), inter-antenna interference (IAI), inter-waveform interference (IWI), cross-link interference (CLI) and inter-Doppler interference (IDI), while additional unique interference types are expected in near future. Consequently, a broader view of the interference has become a crucial need in order to avoid and relax its impact towards beyond 5G radio access technologies. Despite the extensive research in the literature performed by academia and industry, to the best of the authors’ knowledge, there is no work that provides a comprehensive taxonomy framework of interference sources and types, and a review of management techniques from the perspective of the PHY layer. This work aims to fill this gap in the literature. With this notation, in this survey, we propose an intuitive, generic, and expandable framework that categorizes the interference sources and their corresponding management solutions. In particular, we split the interference sources into two main groups by taking into account the user of interest such as self-user-interference (SUI) and other-user-interference (OUI), which we further classify considering the user’s intention about the presence of interference named intentional SUI (I-SUI), unintentional SUI (U-SUI), intentional OUI (I-OUI), and unintentional OUI (U-OUI). In line with this, we offer a classification of the interference management techniques regarding the source of interference. Lastly, the survey presents open research perspectives for beyond 5G wireless systems and concluding remarks.
干扰是无线通信社会将完全连接的世界带入生活的最常见障碍之一,在这个世界中,每个人和所有事物都随时连接,旨在支持各种服务和应用程序,这些服务和应用程序在数据速率方面的需求不断增加,具有更高的可靠性和安全性,同时保持可负担的整体系统容量,复杂性和延迟。从本质上讲,干扰清楚地解释了无线通信系统的原始性质,其中总是有不需要的物理信号破坏通信链路,发生在传输信号的物理层(PHY)体系结构中,特别是与无线信道和收发器体系结构的相互作用。因此,在过去的无线技术中,波形设计以及无线信道损伤和手机架构定义了主要的干扰源,导致了符号间干扰(ISI)、载波间干扰(ICI)和同信道干扰(CCI)类型。在这方面,无线技术的最新进展揭示了前所未有的干扰类型,包括数字间干扰(INI)、天线间干扰(IAI)、波形间干扰(IWI)、交联干扰(CLI)和多普勒间干扰(IDI),而预计在不久的将来还会出现其他独特的干扰类型。因此,为了避免和减轻其对5G以外无线接入技术的影响,更广泛地看待干扰已成为一项至关重要的需求。尽管学术界和工业界在文献中进行了广泛的研究,但据作者所知,还没有一项工作提供了干扰源和类型的全面分类框架,以及从物理层的角度对管理技术的回顾。本书旨在填补这一文献空白。在这个调查中,我们提出了一个直观的、通用的、可扩展的框架,对干扰源及其相应的管理解决方案进行分类。特别是,我们将干扰源分为两大类,考虑到用户的兴趣,如自用户干扰(SUI)和其他用户干扰(OUI),我们进一步分类考虑用户对干扰存在的意图,命名为有意SUI (I-SUI),无意SUI (U-SUI),有意OUI (I-OUI)和无意OUI (U-OUI)。据此,我们对干扰源的干扰管理技术进行了分类。最后,该调查提出了5G以外无线系统的开放研究前景和结束语。
{"title":"Interference Burden in Wireless Communications: A Comprehensive Survey From PHY Layer Perspective","authors":"Armed Tusha;Hüseyin Arslan","doi":"10.1109/COMST.2024.3487068","DOIUrl":"10.1109/COMST.2024.3487068","url":null,"abstract":"Interference represents one of the most common barriers for the wireless communications society to bring the fully connected world to life, where everybody and everything is connected at any time, aiming to support a wide range of services and applications with increasing demand in terms of data rate with a higher degree of reliability and security, while keeping an affordable overall system capacity, complexity, and latency. Essentially, interference clearly explains the primitive nature of the wireless communications systems, where there is always an unwanted physical signal that disrupts the communication link, occurring from the physical layer (PHY) architecture of transmission signal, its interaction with the wireless channel and transceiver architecture in particular. Therefore, in past wireless technologies, waveform design along with wireless channel impairments and handset architecture define the main sources of interference, leading to inter-symbol interference (ISI), inter-carrier interference (ICI) and co-channel interference (CCI) types. In this line, recent advances in wireless technologies have revealed unprecedented interference types including inter-numerology interference (INI), inter-antenna interference (IAI), inter-waveform interference (IWI), cross-link interference (CLI) and inter-Doppler interference (IDI), while additional unique interference types are expected in near future. Consequently, a broader view of the interference has become a crucial need in order to avoid and relax its impact towards beyond 5G radio access technologies. Despite the extensive research in the literature performed by academia and industry, to the best of the authors’ knowledge, there is no work that provides a comprehensive taxonomy framework of interference sources and types, and a review of management techniques from the perspective of the PHY layer. This work aims to fill this gap in the literature. With this notation, in this survey, we propose an intuitive, generic, and expandable framework that categorizes the interference sources and their corresponding management solutions. In particular, we split the interference sources into two main groups by taking into account the user of interest such as self-user-interference (SUI) and other-user-interference (OUI), which we further classify considering the user’s intention about the presence of interference named intentional SUI (I-SUI), unintentional SUI (U-SUI), intentional OUI (I-OUI), and unintentional OUI (U-OUI). In line with this, we offer a classification of the interference management techniques regarding the source of interference. Lastly, the survey presents open research perspectives for beyond 5G wireless systems and concluding remarks.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 4","pages":"2204-2246"},"PeriodicalIF":34.4,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142536826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols CAN 身份验证协议安全特性调查与比较分析
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-25 DOI: 10.1109/COMST.2024.3486367
Alessandro Lotto;Francesco Marchiori;Alessandro Brighente;Mauro Conti
Modern cars’ complexity and increased reliance on electronic components have made them a prime target for attackers. In particular, the in-vehicle communication system is one of the major attack surfaces, with the Controller Area Network (CAN) being the most used protocol. CAN connects electronic components with each other, allowing them to communicate and carry out control functions, as well as managing the vehicle state. However, these components, called Electronic Control Units (ECUs), can also be exploited for malicious purposes. Indeed, since the CAN bus was not designed with security features, attackers can exploit its vulnerabilities to compromise ECUs and corrupt the communication, allowing for remote vehicle control, disabling breaks, and engine shutdowns, causing significant safety threats. In response to the absence of standardized authentication protocols within the automotive domain, researchers propose diverse solutions, each with unique strengths and vulnerabilities. However, the continuous influx of new protocols and potential oversights in meeting security requirements and essential operational features further complicate the implementability of these protocols. This paper comprehensively reviews and compares the 15 most prominent authentication protocols for the CAN bus. Our analysis emphasizes their strengths and weaknesses, evaluating their alignment with critical security requirements for automotive authentication. Additionally, we evaluate protocols based on essential operational criteria that contribute to ease of implementation in predefined infrastructures, enhancing overall reliability and reducing the probability of successful attacks. Our study reveals a prevalent focus on defending against external attackers in existing protocols, exposing vulnerabilities to internal threats. Notably, authentication protocols employing hash chains, Mixed Message Authentication Codes, and asymmetric encryption techniques emerge as the most effective approaches. Through our comparative study, we classify the considered protocols based on their security attributes and suitability for implementation, providing valuable insights for future developments in the field.
现代汽车的复杂性和对电子元件的日益依赖使它们成为攻击者的主要目标。特别是车载通信系统是主要的攻击面之一,其中控制器局域网(CAN)是使用最多的协议。CAN将电子元件彼此连接起来,使它们能够通信并执行控制功能,以及管理车辆状态。然而,这些被称为电子控制单元(ecu)的组件也可以被恶意利用。事实上,由于CAN总线没有设计安全功能,攻击者可以利用其漏洞来破坏ecu并破坏通信,从而允许远程车辆控制,禁用中断和发动机关闭,从而造成重大的安全威胁。针对汽车领域缺乏标准化认证协议的问题,研究人员提出了多种解决方案,每种解决方案都有其独特的优势和漏洞。然而,新协议的不断涌入以及在满足安全要求和基本业务特性方面可能出现的疏忽使这些协议的可执行性进一步复杂化。本文全面回顾和比较了15种最重要的CAN总线认证协议。我们的分析强调了它们的优点和缺点,评估了它们与汽车身份验证的关键安全需求的一致性。此外,我们基于基本的操作标准来评估协议,这些标准有助于在预定义的基础设施中轻松实现,提高整体可靠性并降低成功攻击的可能性。我们的研究揭示了在现有协议中防御外部攻击者的普遍关注,暴露了内部威胁的漏洞。值得注意的是,使用哈希链、混合消息身份验证码和非对称加密技术的身份验证协议是最有效的方法。通过我们的比较研究,我们根据其安全属性和实现的适用性对考虑的协议进行分类,为该领域的未来发展提供有价值的见解。
{"title":"A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols","authors":"Alessandro Lotto;Francesco Marchiori;Alessandro Brighente;Mauro Conti","doi":"10.1109/COMST.2024.3486367","DOIUrl":"10.1109/COMST.2024.3486367","url":null,"abstract":"Modern cars’ complexity and increased reliance on electronic components have made them a prime target for attackers. In particular, the in-vehicle communication system is one of the major attack surfaces, with the Controller Area Network (CAN) being the most used protocol. CAN connects electronic components with each other, allowing them to communicate and carry out control functions, as well as managing the vehicle state. However, these components, called Electronic Control Units (ECUs), can also be exploited for malicious purposes. Indeed, since the CAN bus was not designed with security features, attackers can exploit its vulnerabilities to compromise ECUs and corrupt the communication, allowing for remote vehicle control, disabling breaks, and engine shutdowns, causing significant safety threats. In response to the absence of standardized authentication protocols within the automotive domain, researchers propose diverse solutions, each with unique strengths and vulnerabilities. However, the continuous influx of new protocols and potential oversights in meeting security requirements and essential operational features further complicate the implementability of these protocols. This paper comprehensively reviews and compares the 15 most prominent authentication protocols for the CAN bus. Our analysis emphasizes their strengths and weaknesses, evaluating their alignment with critical security requirements for automotive authentication. Additionally, we evaluate protocols based on essential operational criteria that contribute to ease of implementation in predefined infrastructures, enhancing overall reliability and reducing the probability of successful attacks. Our study reveals a prevalent focus on defending against external attackers in existing protocols, exposing vulnerabilities to internal threats. Notably, authentication protocols employing hash chains, Mixed Message Authentication Codes, and asymmetric encryption techniques emerge as the most effective approaches. Through our comparative study, we classify the considered protocols based on their security attributes and suitability for implementation, providing valuable insights for future developments in the field.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 4","pages":"2470-2504"},"PeriodicalIF":34.4,"publicationDate":"2024-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10735339","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142490474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey of Wireless Time-Sensitive Networking (TSN): Architecture, Technologies, Applications, and Open Issues 无线时敏网络 (TSN) 综合调查:架构、技术、应用和未决问题
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-25 DOI: 10.1109/COMST.2024.3486618
Kouros Zanbouri;Md. Noor-A-Rahim;Jobish John;Cormac J. Sreenan;H. Vincent Poor;Dirk Pesch
Time-sensitive networking (TSN) is expected to be a key component of critical machine-type communication networks in areas such as Industry 4.0, robotics and autonomous vehicles. With rising mobility requirements in industrial applications and the prevalence of wireless networks, wireless network integration into TSN is becoming increasingly important. This survey article presents a comprehensive review of the current literature on wireless TSN, including an overview of the architecture of a wireless TSN network and an examination of the various wireless technologies and protocols that can be or are used in such networks. In addition, the article discusses industrial applications of wireless TSN, among them industrial automation, robotics, and autonomous vehicles. The article concludes by summarizing the challenges and open issues related to the integration of TSN into wireless networks, and by offering suggestions for future research directions.
时间敏感网络(TSN)有望成为工业4.0、机器人和自动驾驶汽车等领域关键机器类型通信网络的关键组成部分。随着工业应用对移动性要求的提高和无线网络的普及,无线网络集成到TSN中变得越来越重要。这篇调查文章对无线TSN的当前文献进行了全面的回顾,包括对无线TSN网络的体系结构的概述,以及对可以或正在这种网络中使用的各种无线技术和协议的检查。此外,本文还讨论了无线TSN的工业应用,其中包括工业自动化、机器人和自动驾驶汽车。最后总结了TSN与无线网络融合所面临的挑战和有待解决的问题,并对未来的研究方向提出了建议。
{"title":"A Comprehensive Survey of Wireless Time-Sensitive Networking (TSN): Architecture, Technologies, Applications, and Open Issues","authors":"Kouros Zanbouri;Md. Noor-A-Rahim;Jobish John;Cormac J. Sreenan;H. Vincent Poor;Dirk Pesch","doi":"10.1109/COMST.2024.3486618","DOIUrl":"10.1109/COMST.2024.3486618","url":null,"abstract":"Time-sensitive networking (TSN) is expected to be a key component of critical machine-type communication networks in areas such as Industry 4.0, robotics and autonomous vehicles. With rising mobility requirements in industrial applications and the prevalence of wireless networks, wireless network integration into TSN is becoming increasingly important. This survey article presents a comprehensive review of the current literature on wireless TSN, including an overview of the architecture of a wireless TSN network and an examination of the various wireless technologies and protocols that can be or are used in such networks. In addition, the article discusses industrial applications of wireless TSN, among them industrial automation, robotics, and autonomous vehicles. The article concludes by summarizing the challenges and open issues related to the integration of TSN into wireless networks, and by offering suggestions for future research directions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 4","pages":"2129-2155"},"PeriodicalIF":34.4,"publicationDate":"2024-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10735349","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142490472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game Theory and Reinforcement Learning for Anti-Jamming Defense in Wireless Communications: Current Research, Challenges, and Solutions 博弈论和强化学习用于无线通信中的抗干扰防御:当前研究、挑战和解决方案
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-24 DOI: 10.1109/COMST.2024.3482973
Luliang Jia;Nan Qi;Zhe Su;Feihuang Chu;Shengliang Fang;Kai-Kit Wong;Chan-Byoung Chae
Due to the inherently open and shared nature of the wireless channels, wireless communication networks are vulnerable to jamming attacks, and effective anti-jamming measures are of utmost importance to realize reliable communications. Game theory and reinforcement learning (RL) are powerful mathematical tools in anti-jamming field. This article investigates the anti-jamming problem from the perspective of game theory and RL. First, different anti-jamming domains and anti-jamming strategies are discussed, and technological challenges are globally analyzed from different perspectives. Second, an in-depth systematic and comprehensive survey of each kind of anti-jamming solutions (i.e., game theory and RL) is presented. To be specific, some game models are discussed for game theory based solutions, including Bayesian anti-jamming game, Stackelberg anti-jamming game, stochastic anti-jamming game, zero-sum anti-jamming game, graphical/hypergraphical anti-jamming game, etc. For RL-based anti-jamming solutions, different kinds of RL are given, including Q-learning, multi-armed bandit, deep RL and transfer RL. Third, the strengths and limitations are analyzed for each type of anti-jamming solutions. Finally, we discuss the deep integration of the game theory and RL in solving anti-jamming problems, and a few future research directions are illustrated.
由于无线信道固有的开放性和共享性,无线通信网络容易受到干扰攻击,有效的抗干扰措施对实现可靠通信至关重要。博弈论和强化学习(RL)是抗干扰领域强有力的数学工具。本文从博弈论和强化学习的角度研究了系统的抗干扰问题。首先,讨论了不同的抗干扰领域和抗干扰策略,并从不同角度分析了全球范围内的技术挑战。其次,对各种抗干扰解决方案(即博弈论和RL)进行了深入系统的全面调查。具体来说,讨论了基于博弈论解决方案的一些博弈模型,包括贝叶斯抗干扰对策、Stackelberg抗干扰对策、随机抗干扰对策、零和抗干扰对策、图形/超图形抗干扰对策等。针对基于强化学习的抗干扰方案,给出了不同类型的强化学习,包括q学习、多臂强盗、深度强化学习和转移强化学习。第三,分析了各种抗干扰方案的优势和局限性。最后,我们讨论了博弈论与强化学习在解决抗干扰问题中的深度融合,并指出了未来的研究方向。
{"title":"Game Theory and Reinforcement Learning for Anti-Jamming Defense in Wireless Communications: Current Research, Challenges, and Solutions","authors":"Luliang Jia;Nan Qi;Zhe Su;Feihuang Chu;Shengliang Fang;Kai-Kit Wong;Chan-Byoung Chae","doi":"10.1109/COMST.2024.3482973","DOIUrl":"10.1109/COMST.2024.3482973","url":null,"abstract":"Due to the inherently open and shared nature of the wireless channels, wireless communication networks are vulnerable to jamming attacks, and effective anti-jamming measures are of utmost importance to realize reliable communications. Game theory and reinforcement learning (RL) are powerful mathematical tools in anti-jamming field. This article investigates the anti-jamming problem from the perspective of game theory and RL. First, different anti-jamming domains and anti-jamming strategies are discussed, and technological challenges are globally analyzed from different perspectives. Second, an in-depth systematic and comprehensive survey of each kind of anti-jamming solutions (i.e., game theory and RL) is presented. To be specific, some game models are discussed for game theory based solutions, including Bayesian anti-jamming game, Stackelberg anti-jamming game, stochastic anti-jamming game, zero-sum anti-jamming game, graphical/hypergraphical anti-jamming game, etc. For RL-based anti-jamming solutions, different kinds of RL are given, including Q-learning, multi-armed bandit, deep RL and transfer RL. Third, the strengths and limitations are analyzed for each type of anti-jamming solutions. Finally, we discuss the deep integration of the game theory and RL in solving anti-jamming problems, and a few future research directions are illustrated.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 3","pages":"1798-1838"},"PeriodicalIF":34.4,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142489681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Communications Surveys and Tutorials
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1