With the development of communication and networking technologies, the Internet of Vehicles (IoV) has become the foundation of smart transportation. The development of blockchain and Machine Learning (ML) has contributed to the pervasiveness of the IoV, and they can effectively address the current issues of decentralisation, cyber security and data privacy in the IoV. In this article, blockchain and ML in the IoV are both reviewed, and corresponding technologies to support blockchain intelligence in the IoV are summarized. Importantly, blockchain intelligence is proposed as a key to integrate blockchain and ML, combining the advantages of both to drive the rapid development of the IoV. We discuss general frameworks, issuses, requirements and advantages for the implementation of blockchain intelligence in the IoV. Driven by its advantages, we summarize solutions of blockchain intelligence in the IoV from four aspects, including reliable interaction, network security and data privacy, trustworthy environment and scalability. Finally, a summary of current unresolved issues and challenges of blockchain intelligence in the IoV is presented, which provides guidelines for the future development of the IoV.
{"title":"Blockchain Intelligence for Internet of Vehicles: Challenges and Solutions","authors":"Xiaojie Wang;Hailin Zhu;Zhaolong Ning;Lei Guo;Yan Zhang","doi":"10.1109/COMST.2023.3305312","DOIUrl":"10.1109/COMST.2023.3305312","url":null,"abstract":"With the development of communication and networking technologies, the Internet of Vehicles (IoV) has become the foundation of smart transportation. The development of blockchain and Machine Learning (ML) has contributed to the pervasiveness of the IoV, and they can effectively address the current issues of decentralisation, cyber security and data privacy in the IoV. In this article, blockchain and ML in the IoV are both reviewed, and corresponding technologies to support blockchain intelligence in the IoV are summarized. Importantly, blockchain intelligence is proposed as a key to integrate blockchain and ML, combining the advantages of both to drive the rapid development of the IoV. We discuss general frameworks, issuses, requirements and advantages for the implementation of blockchain intelligence in the IoV. Driven by its advantages, we summarize solutions of blockchain intelligence in the IoV from four aspects, including reliable interaction, network security and data privacy, trustworthy environment and scalability. Finally, a summary of current unresolved issues and challenges of blockchain intelligence in the IoV is presented, which provides guidelines for the future development of the IoV.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2325-2355"},"PeriodicalIF":35.6,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129841311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-14DOI: 10.1109/COMST.2023.3299519
Boubakr Nour;Makan Pourzandi;Mourad Debbabi
With the rapidly evolving technological landscape, the huge development of the Internet of Things, and the embracing of digital transformation, the world is witnessing an explosion in data generation and a rapid evolution of new applications that lead to new, wider, and more sophisticated threats that are complex and hard to be detected. Advanced persistence threats use continuous, clandestine, and sophisticated techniques to gain access to a system and remain hidden for a prolonged period of time, with potentially destructive consequences. Those stealthy attacks are often not detectable by advanced intrusion detection systems (e.g., LightBasin attack was detected in 2022 and has been active since 2016). Indeed, threat actors are able to quickly and intelligently alter their tactics to avoid being detected by security defense lines (e.g., prevention and detection mechanisms). In response to these evolving threats, organizations need to adopt new proactive defense approaches. Threat hunting is a proactive security line exercised to uncover stealthy attacks, malicious activities, and suspicious entities that could circumvent standard detection mechanisms. Additionally, threat hunting is an iterative approach to generate and revise threat hypotheses endeavoring to provide early attack detection in a proactive way. The proactiveness consists of testing and validating the initial hypothesis using various manual and automated tools/techniques with the objective of confirming/refuting the existence of an attack. This survey studies the threat hunting concept and provides a comprehensive review of the existing solutions for Enterprise networks. In particular, we provide a threat hunting taxonomy based on the used technique and a sub-classification based on the detailed approach. Furthermore, we discuss the existing standardization efforts. Finally, we provide a qualitative discussion on current advances and identify various research gaps and challenges that may be considered by the research community to design concrete and efficient threat hunting solutions.
{"title":"A Survey on Threat Hunting in Enterprise Networks","authors":"Boubakr Nour;Makan Pourzandi;Mourad Debbabi","doi":"10.1109/COMST.2023.3299519","DOIUrl":"10.1109/COMST.2023.3299519","url":null,"abstract":"With the rapidly evolving technological landscape, the huge development of the Internet of Things, and the embracing of digital transformation, the world is witnessing an explosion in data generation and a rapid evolution of new applications that lead to new, wider, and more sophisticated threats that are complex and hard to be detected. Advanced persistence threats use continuous, clandestine, and sophisticated techniques to gain access to a system and remain hidden for a prolonged period of time, with potentially destructive consequences. Those stealthy attacks are often not detectable by advanced intrusion detection systems (e.g., LightBasin attack was detected in 2022 and has been active since 2016). Indeed, threat actors are able to quickly and intelligently alter their tactics to avoid being detected by security defense lines (e.g., prevention and detection mechanisms). In response to these evolving threats, organizations need to adopt new proactive defense approaches. Threat hunting is a proactive security line exercised to uncover stealthy attacks, malicious activities, and suspicious entities that could circumvent standard detection mechanisms. Additionally, threat hunting is an iterative approach to generate and revise threat hypotheses endeavoring to provide early attack detection in a proactive way. The proactiveness consists of testing and validating the initial hypothesis using various manual and automated tools/techniques with the objective of confirming/refuting the existence of an attack. This survey studies the threat hunting concept and provides a comprehensive review of the existing solutions for Enterprise networks. In particular, we provide a threat hunting taxonomy based on the used technique and a sub-classification based on the detailed approach. Furthermore, we discuss the existing standardization efforts. Finally, we provide a qualitative discussion on current advances and identify various research gaps and challenges that may be considered by the research community to design concrete and efficient threat hunting solutions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2299-2324"},"PeriodicalIF":35.6,"publicationDate":"2023-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133981110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Low Earth Orbit (LEO) satellites undergo a period of rapid development driven by ever-increasing user demands, reduced costs, and technological progress. Since there is a lack of literature on the security and reliability issues of LEO Satellite Communication Systems (SCSs), we aim to fill this knowledge gap. Specifically, we critically appraise the inherent characteristics of LEO SCSs and elaborate on their security and reliability requirements. In light of this, we further discuss their vulnerabilities, including potential security attacks launched against them and reliability risks, followed by outlining the associated lessons learned. Subsequently, we discuss the corresponding security and reliability enhancement solutions, unveil a range of trade-offs, and summarize the lessons gleaned. Furthermore, we shed light on several promising future research directions for enhancing the security and reliability of LEO SCSs, such as integrated sensing and communication, computer vision aided communications, as well as challenges brought about by mega-constellation and commercialization. Finally, we summarize the lessons inferred and crystallize the take-away messages in our design guidelines.
{"title":"Low Earth Orbit Satellite Security and Reliability: Issues, Solutions, and the Road Ahead","authors":"Pingyue Yue;Jianping An;Jiankang Zhang;Jia Ye;Gaofeng Pan;Shuai Wang;Pei Xiao;Lajos Hanzo","doi":"10.1109/COMST.2023.3296160","DOIUrl":"https://doi.org/10.1109/COMST.2023.3296160","url":null,"abstract":"Low Earth Orbit (LEO) satellites undergo a period of rapid development driven by ever-increasing user demands, reduced costs, and technological progress. Since there is a lack of literature on the security and reliability issues of LEO Satellite Communication Systems (SCSs), we aim to fill this knowledge gap. Specifically, we critically appraise the inherent characteristics of LEO SCSs and elaborate on their security and reliability requirements. In light of this, we further discuss their vulnerabilities, including potential security attacks launched against them and reliability risks, followed by outlining the associated lessons learned. Subsequently, we discuss the corresponding security and reliability enhancement solutions, unveil a range of trade-offs, and summarize the lessons gleaned. Furthermore, we shed light on several promising future research directions for enhancing the security and reliability of LEO SCSs, such as integrated sensing and communication, computer vision aided communications, as well as challenges brought about by mega-constellation and commercialization. Finally, we summarize the lessons inferred and crystallize the take-away messages in our design guidelines.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1604-1652"},"PeriodicalIF":35.6,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-04DOI: 10.1109/COMST.2023.3302157
Abdeldjalil Tabouche;Badis Djamaa;Mustapha Reda Senouci
Recently, mission-critical Industrial Internet of Things (IIoT) applications such as system automation, predictive maintenance, and anomaly detection have come into the spotlight of Industry 4.0 thanks to the promised benefits. The IEEE 802.15.4 Time-Slotted Channel Hopping (TSCH) mode, along with the IPv6 over TSCH (6TiSCH) initiative, are two key standards to accommodate the diverse traffic patterns, reliability, latency, and power efficiency needs of such IIoT applications. To manage the allocation of communication resources in TSCH networks, a Scheduling Function (SF) is implemented. Even though scheduling in the IIoT has been the subject of numerous reviews, the potential of taking traffic-awareness into account has not been fully investigated. Motivated by these facts, we classify and analyze, in this systematic mapping review, prominent SFs dealing with traffic-awareness in TSCH networks published between 2012 and 2022. As a result, we provide a multi-dimensional map to identify the current trends in traffic-aware TSCH scheduling and help assess how far a given proposal is supported or contradicted by the empirical evidence in the field. Consequently, we discuss some open challenges that require community attention and point out potential future research directions regarding the design, implementation, and evaluation of new traffic-aware SFs.
最近,关键任务的工业物联网(IIoT)应用,如系统自动化、预测性维护和异常检测,由于其承诺的好处,已经成为工业4.0的焦点。IEEE 802.15.4时隙信道跳变(TSCH)模式以及IPv6 over TSCH (6TiSCH)倡议是适应此类IIoT应用的各种流量模式、可靠性、延迟和能效需求的两个关键标准。为了管理TSCH网络中通信资源的分配,调度功能(Scheduling Function, SF)被实现。尽管工业物联网中的调度已经成为众多审查的主题,但考虑到交通意识的潜力尚未得到充分调查。基于这些事实,我们对2012年至2022年期间发表的处理TSCH网络交通意识的杰出sf进行了分类和分析。因此,我们提供了一个多维地图,以确定交通感知的TSCH调度的当前趋势,并帮助评估给定建议在多大程度上得到了该领域经验证据的支持或反对。因此,我们讨论了一些需要社区关注的开放挑战,并指出了未来潜在的研究方向,包括设计、实施和评估新的交通感知安全系统。
{"title":"Traffic-Aware Reliable Scheduling in TSCH Networks for Industry 4.0: A Systematic Mapping Review","authors":"Abdeldjalil Tabouche;Badis Djamaa;Mustapha Reda Senouci","doi":"10.1109/COMST.2023.3302157","DOIUrl":"10.1109/COMST.2023.3302157","url":null,"abstract":"Recently, mission-critical Industrial Internet of Things (IIoT) applications such as system automation, predictive maintenance, and anomaly detection have come into the spotlight of Industry 4.0 thanks to the promised benefits. The IEEE 802.15.4 Time-Slotted Channel Hopping (TSCH) mode, along with the IPv6 over TSCH (6TiSCH) initiative, are two key standards to accommodate the diverse traffic patterns, reliability, latency, and power efficiency needs of such IIoT applications. To manage the allocation of communication resources in TSCH networks, a Scheduling Function (SF) is implemented. Even though scheduling in the IIoT has been the subject of numerous reviews, the potential of taking traffic-awareness into account has not been fully investigated. Motivated by these facts, we classify and analyze, in this systematic mapping review, prominent SFs dealing with traffic-awareness in TSCH networks published between 2012 and 2022. As a result, we provide a multi-dimensional map to identify the current trends in traffic-aware TSCH scheduling and help assess how far a given proposal is supported or contradicted by the empirical evidence in the field. Consequently, we discuss some open challenges that require community attention and point out potential future research directions regarding the design, implementation, and evaluation of new traffic-aware SFs.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2834-2861"},"PeriodicalIF":35.6,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126983809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-03DOI: 10.1109/COMST.2023.3301820
E. Khorov;A. Krasilov;M. Susloparov;L. Kong
Emerging wireless systems target to provide multi-Gbps data rates for each user, which can be achieved by utilizing ultra-wide channels available at mmWave, terahertz, and lightwave frequencies. In contrast to the traditional spectrum below 6 GHz, these high-frequency bands raise many issues, complicating their usage. For example, because of high signal attenuation and blockage by obstacles, the data rates in a high-frequency band may quickly vary by several orders of magnitude. This peculiarity is often considered a challenge for modern transport layer protocols, such as Transmission Control Protocol (TCP) or Quick UDP Internet Connections (QUIC). Their key component is the Congestion Control Algorithm (CCA), which tries to determine a data sending rate that maximizes throughput and avoids network congestion. Many recent studies show that the performance of the existing CCAs significantly degrades if mobile devices communicate with high-frequency bands and propose some solutions to address this problem. The goal of this survey is twofold. First, we classify the reasons for poor TCP & QUIC performance in high-frequency bands. Second, we comprehensively review the solutions already designed to solve these problems. In contrast to existing studies and reviews that mainly focus on the comparison of various CCAs, we consider solutions working at different layers of the protocol stack, i.e., from the transport layer down to the physical layer, as well as cross-layer solutions. Based on the analysis, we conclude the survey with recommendations on which solutions provide the highest gains in high-frequency bands.
{"title":"Boosting TCP & QUIC Performance in mmWave, Terahertz, and Lightwave Wireless Networks: A Survey","authors":"E. Khorov;A. Krasilov;M. Susloparov;L. Kong","doi":"10.1109/COMST.2023.3301820","DOIUrl":"10.1109/COMST.2023.3301820","url":null,"abstract":"Emerging wireless systems target to provide multi-Gbps data rates for each user, which can be achieved by utilizing ultra-wide channels available at mmWave, terahertz, and lightwave frequencies. In contrast to the traditional spectrum below 6 GHz, these high-frequency bands raise many issues, complicating their usage. For example, because of high signal attenuation and blockage by obstacles, the data rates in a high-frequency band may quickly vary by several orders of magnitude. This peculiarity is often considered a challenge for modern transport layer protocols, such as Transmission Control Protocol (TCP) or Quick UDP Internet Connections (QUIC). Their key component is the Congestion Control Algorithm (CCA), which tries to determine a data sending rate that maximizes throughput and avoids network congestion. Many recent studies show that the performance of the existing CCAs significantly degrades if mobile devices communicate with high-frequency bands and propose some solutions to address this problem. The goal of this survey is twofold. First, we classify the reasons for poor TCP & QUIC performance in high-frequency bands. Second, we comprehensively review the solutions already designed to solve these problems. In contrast to existing studies and reviews that mainly focus on the comparison of various CCAs, we consider solutions working at different layers of the protocol stack, i.e., from the transport layer down to the physical layer, as well as cross-layer solutions. Based on the analysis, we conclude the survey with recommendations on which solutions provide the highest gains in high-frequency bands.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2862-2891"},"PeriodicalIF":35.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132056102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid development of the Internet of Things (IoT) and the rise of 5G communication networks and automatic driving, millimeter wave (mmWave) sensing is emerging and starts impacting our life and workspace. mmWave sensing can sense humans and objects in a contactless way, providing fine-grained sensing ability. In the past few years, many mmWave sensing techniques have been proposed and applied in various human sensing applications (e.g., human localization, gesture recognition, and vital monitoring). We discover the need of a comprehensive survey to summarize the technology, platforms and applications of mmWave-based human sensing. In this survey, we first present the mmWave hardware platforms and some key techniques of mmWave sensing. We then provide a comprehensive review of existing mmWave-based human sensing works. Specifically, we divide existing works into four categories according to the sensing granularity: human tracking and localization, motion recognition, biometric measurement and human imaging. Finally, we discuss the potential research challenges and present future directions in this area.
{"title":"A Survey of mmWave-Based Human Sensing: Technology, Platforms and Applications","authors":"Jia Zhang;Rui Xi;Yuan He;Yimiao Sun;Xiuzhen Guo;Weiguo Wang;Xin Na;Yunhao Liu;Zhenguo Shi;Tao Gu","doi":"10.1109/COMST.2023.3298300","DOIUrl":"10.1109/COMST.2023.3298300","url":null,"abstract":"With the rapid development of the Internet of Things (IoT) and the rise of 5G communication networks and automatic driving, millimeter wave (mmWave) sensing is emerging and starts impacting our life and workspace. mmWave sensing can sense humans and objects in a contactless way, providing fine-grained sensing ability. In the past few years, many mmWave sensing techniques have been proposed and applied in various human sensing applications (e.g., human localization, gesture recognition, and vital monitoring). We discover the need of a comprehensive survey to summarize the technology, platforms and applications of mmWave-based human sensing. In this survey, we first present the mmWave hardware platforms and some key techniques of mmWave sensing. We then provide a comprehensive review of existing mmWave-based human sensing works. Specifically, we divide existing works into four categories according to the sensing granularity: human tracking and localization, motion recognition, biometric measurement and human imaging. Finally, we discuss the potential research challenges and present future directions in this area.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2052-2087"},"PeriodicalIF":35.6,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74285299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital twin for the industrial Internet of Things (DT-IIoT) creates a high-fidelity, fine-grained, low-cost digital replica of the cyber-physical integrated Internet for industry. Powered by artificial intelligence (AI) and security technologies, DT-IIoT provides advanced features such as real-time monitoring, predictive maintenance, remote diagnostics, and rapid response for smart IIoT systems. A systematic review of key enabling technologies such as digital twin, AI, and blockchain is essential to develop DT-IIoT and reveal pitfalls. This paper reviews the preliminaries, real-world applications, architectures and models of digital twin-driven IIoT. In addition, advanced technologies for intelligent and secure DT-IIoT are investigated, including state-of-the-art AI solutions such as transfer learning and federated learning, as well as blockchain-based security solutions. Moreover, software tools for high-fidelity digital twin modeling are proposed. A case study on reinforcement learning-based integrated-control, communication, and computing (3C) design is developed to demonstrate the AI-driven intelligent DT-IIoT. Finally, this paper outlines the prospective applications, challenges, and integrations with ABCDE (i.e., AI, Blockchain, cloud computing, big data, edge computing) as the future directions.
{"title":"A Survey on Digital Twin for Industrial Internet of Things: Applications, Technologies and Tools","authors":"Hansong Xu;Jun Wu;Qianqian Pan;Xinping Guan;Mohsen Guizani","doi":"10.1109/COMST.2023.3297395","DOIUrl":"10.1109/COMST.2023.3297395","url":null,"abstract":"Digital twin for the industrial Internet of Things (DT-IIoT) creates a high-fidelity, fine-grained, low-cost digital replica of the cyber-physical integrated Internet for industry. Powered by artificial intelligence (AI) and security technologies, DT-IIoT provides advanced features such as real-time monitoring, predictive maintenance, remote diagnostics, and rapid response for smart IIoT systems. A systematic review of key enabling technologies such as digital twin, AI, and blockchain is essential to develop DT-IIoT and reveal pitfalls. This paper reviews the preliminaries, real-world applications, architectures and models of digital twin-driven IIoT. In addition, advanced technologies for intelligent and secure DT-IIoT are investigated, including state-of-the-art AI solutions such as transfer learning and federated learning, as well as blockchain-based security solutions. Moreover, software tools for high-fidelity digital twin modeling are proposed. A case study on reinforcement learning-based integrated-control, communication, and computing (3C) design is developed to demonstrate the AI-driven intelligent DT-IIoT. Finally, this paper outlines the prospective applications, challenges, and integrations with ABCDE (i.e., AI, Blockchain, cloud computing, big data, edge computing) as the future directions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2569-2598"},"PeriodicalIF":35.6,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128215864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The centralization of baseband (BB) functions in a radio access network (RAN) towards data processing centres is receiving increasing interest as it enables the exploitation of resource pooling and statistical multiplexing gains among multiple cells, facilitates the introduction of collaborative techniques for different functions (e.g., interference coordination), and more efficiently handles the complex requirements of advanced features of the fifth generation (5G) new radio (NR) physical layer, such as the use of massive multiple input multiple output (MIMO). However, deciding the functional split (i.e., which BB functions are kept close to the radio units and which BB functions are centralized) embraces a trade-off between the centralization benefits and the fronthaul costs for carrying data between distributed antennas and data processing centres. Substantial research efforts have been made in standardization fora, research projects and studies to resolve this trade-off, which becomes more complicated when the choice of functional splits is dynamically achieved depending on the current conditions in the RAN. This paper presents a comprehensive tutorial on the characterisation, modelling and assessment of functional splits in a flexible RAN to establish a solid basis for the future development of algorithmic solutions of dynamic functional split optimisation in 5G and beyond systems. First, the paper explores the functional split approaches considered by different industrial fora, analysing their equivalences and differences in terminology. Second, the paper presents a harmonized analysis of the different BB functions at the physical layer and associated algorithmic solutions presented in the literature, assessing both the computational complexity and the associated performance. Based on this analysis, the paper presents a model for assessing the computational requirements and fronthaul bandwidth requirements of different functional splits. Last, the model is used to derive illustrative results that identify the major trade-offs that arise when selecting a functional split and the key elements that impact the requirements.
{"title":"A Tutorial on the Characterisation and Modelling of Low Layer Functional Splits for Flexible Radio Access Networks in 5G and Beyond","authors":"Jordi Pérez-Romero;Oriol Sallent;Antoni Gelonch;Xavier Gelabert;Bleron Klaiqi;Marcus Kahn;David Campoy","doi":"10.1109/COMST.2023.3296821","DOIUrl":"10.1109/COMST.2023.3296821","url":null,"abstract":"The centralization of baseband (BB) functions in a radio access network (RAN) towards data processing centres is receiving increasing interest as it enables the exploitation of resource pooling and statistical multiplexing gains among multiple cells, facilitates the introduction of collaborative techniques for different functions (e.g., interference coordination), and more efficiently handles the complex requirements of advanced features of the fifth generation (5G) new radio (NR) physical layer, such as the use of massive multiple input multiple output (MIMO). However, deciding the functional split (i.e., which BB functions are kept close to the radio units and which BB functions are centralized) embraces a trade-off between the centralization benefits and the fronthaul costs for carrying data between distributed antennas and data processing centres. Substantial research efforts have been made in standardization fora, research projects and studies to resolve this trade-off, which becomes more complicated when the choice of functional splits is dynamically achieved depending on the current conditions in the RAN. This paper presents a comprehensive tutorial on the characterisation, modelling and assessment of functional splits in a flexible RAN to establish a solid basis for the future development of algorithmic solutions of dynamic functional split optimisation in 5G and beyond systems. First, the paper explores the functional split approaches considered by different industrial fora, analysing their equivalences and differences in terminology. Second, the paper presents a harmonized analysis of the different BB functions at the physical layer and associated algorithmic solutions presented in the literature, assessing both the computational complexity and the associated performance. Based on this analysis, the paper presents a model for assessing the computational requirements and fronthaul bandwidth requirements of different functional splits. Last, the model is used to derive illustrative results that identify the major trade-offs that arise when selecting a functional split and the key elements that impact the requirements.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2791-2833"},"PeriodicalIF":35.6,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123325910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-14DOI: 10.1109/COMST.2023.3295384
Bo Deng;Jinrui Nan;Wanke Cao;Wenwei Wang
In the initial period of automobile development, the vast majority of researchers would never have guessed network communications would be applied to vehicles one day. After the advent of CAN, a tremendous amount of intra-vehicle network communication technologies have sprung up throughout the automobile industry. With the introduction of intelligent driving, inter-vehicle network communication technologies have been subsequently developed to complement intra-vehicle network communication technologies and achieve higher-level functions. However, communication and control seem to be advanced independently for a long time and are less connected in actual development. Thus, to promote the fusion of communication and control, this paper provides a comprehensive survey on vehicle real-time motion control considering the adverse influence of network communications (such as network-induced delay, packet dropout, and network congestion) from three aspects: intra-vehicle, inter-vehicle, and integration of these two. To benefit analysis and study, mainstream intra-vehicle and inter-vehicle network communication technologies are first summarized, also with their network architectures. As research is still emerging, several open issues and future challenges of Control over Communications (CoC) are emphasized for further development to enable intelligent driving in the true sense.
{"title":"A Survey on Integration of Network Communication into Vehicle Real-Time Motion Control","authors":"Bo Deng;Jinrui Nan;Wanke Cao;Wenwei Wang","doi":"10.1109/COMST.2023.3295384","DOIUrl":"10.1109/COMST.2023.3295384","url":null,"abstract":"In the initial period of automobile development, the vast majority of researchers would never have guessed network communications would be applied to vehicles one day. After the advent of CAN, a tremendous amount of intra-vehicle network communication technologies have sprung up throughout the automobile industry. With the introduction of intelligent driving, inter-vehicle network communication technologies have been subsequently developed to complement intra-vehicle network communication technologies and achieve higher-level functions. However, communication and control seem to be advanced independently for a long time and are less connected in actual development. Thus, to promote the fusion of communication and control, this paper provides a comprehensive survey on vehicle real-time motion control considering the adverse influence of network communications (such as network-induced delay, packet dropout, and network congestion) from three aspects: intra-vehicle, inter-vehicle, and integration of these two. To benefit analysis and study, mainstream intra-vehicle and inter-vehicle network communication technologies are first summarized, also with their network architectures. As research is still emerging, several open issues and future challenges of Control over Communications (CoC) are emphasized for further development to enable intelligent driving in the true sense.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2755-2790"},"PeriodicalIF":35.6,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130560796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-12DOI: 10.1109/COMST.2023.3294873
Jehyun Heo;Seungwoo Sung;Hyunwoo Lee;Incheol Hwang;Daesik Hong
The satellite communications (SatCom) system is a representative technology for global coverage and seamless communications in next-generation communication systems. This paper is a survey of basic studies and recent research trends for multiple input multiple output (MIMO) SatCom. Specifically, we describe and provide the differences between terrestrial networks and SatCom. Furthermore, we categorize the scenarios mainly considered in the MIMO SatCom systems and major research topics in those scenarios. We also summarize the most important technical issues currently being researched in MIMO SatCom systems, and list future works to be studied based on this. This survey is recommended for researchers who are starting research on SatCom systems or those who wish to understand the research trends associated with MIMO SatCom systems.
{"title":"MIMO Satellite Communication Systems: A Survey From the PHY Layer Perspective","authors":"Jehyun Heo;Seungwoo Sung;Hyunwoo Lee;Incheol Hwang;Daesik Hong","doi":"10.1109/COMST.2023.3294873","DOIUrl":"https://doi.org/10.1109/COMST.2023.3294873","url":null,"abstract":"The satellite communications (SatCom) system is a representative technology for global coverage and seamless communications in next-generation communication systems. This paper is a survey of basic studies and recent research trends for multiple input multiple output (MIMO) SatCom. Specifically, we describe and provide the differences between terrestrial networks and SatCom. Furthermore, we categorize the scenarios mainly considered in the MIMO SatCom systems and major research topics in those scenarios. We also summarize the most important technical issues currently being researched in MIMO SatCom systems, and list future works to be studied based on this. This survey is recommended for researchers who are starting research on SatCom systems or those who wish to understand the research trends associated with MIMO SatCom systems.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1543-1570"},"PeriodicalIF":35.6,"publicationDate":"2023-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}