Pub Date : 2024-04-16DOI: 10.1109/COMST.2024.3389728
Rongxin Zhu;Azzedine Boukerche;Libo Long;Qiuling Yang
In recent years, significant advancements in wireless underwater communication and acoustic sensor technology have spurred the exploration and utilization of the ocean’s vast natural resources. underwater wireless sensor networks (UWSNs) are increasingly deployed in unattended and hostile environments, demanding robust security measures. Secure communication environments are essential for a range of UWSN applications, including coastal defense, underwater communication, and marine exploration. Trust models have emerged as effective security mechanisms to assess the reliability of individual nodes in UWSNs during adverse attacks. Unlike Wireless Sensor Networks (WSNs), UWSNs encounter distinct challenges, including constrained resources, harsh underwater conditions, and unreliable acoustic communication, making it crucial to establish a reliable trust-based system. In this paper, we review existing work on UWSN security, discuss security and trust challenges, and explore trust-based applications. Furthermore, we evaluate diverse trust models suited for UWSNs of recent years, categorizing and comparing approaches like weighted sum methods, logic-based techniques, probability and statistics models, and machine learning paradigms. Finally, we discuss contemporary challenges and future directions in UWSN trust management. By offering a systematic overview and classification of trust management approaches, this paper contributes to the understanding and development of effective trust mechanisms for UWSNs, ultimately enhancing their reliability, security, and successful operation in diverse marine applications.
{"title":"Design Guidelines on Trust Management for Underwater Wireless Sensor Networks","authors":"Rongxin Zhu;Azzedine Boukerche;Libo Long;Qiuling Yang","doi":"10.1109/COMST.2024.3389728","DOIUrl":"10.1109/COMST.2024.3389728","url":null,"abstract":"In recent years, significant advancements in wireless underwater communication and acoustic sensor technology have spurred the exploration and utilization of the ocean’s vast natural resources. underwater wireless sensor networks (UWSNs) are increasingly deployed in unattended and hostile environments, demanding robust security measures. Secure communication environments are essential for a range of UWSN applications, including coastal defense, underwater communication, and marine exploration. Trust models have emerged as effective security mechanisms to assess the reliability of individual nodes in UWSNs during adverse attacks. Unlike Wireless Sensor Networks (WSNs), UWSNs encounter distinct challenges, including constrained resources, harsh underwater conditions, and unreliable acoustic communication, making it crucial to establish a reliable trust-based system. In this paper, we review existing work on UWSN security, discuss security and trust challenges, and explore trust-based applications. Furthermore, we evaluate diverse trust models suited for UWSNs of recent years, categorizing and comparing approaches like weighted sum methods, logic-based techniques, probability and statistics models, and machine learning paradigms. Finally, we discuss contemporary challenges and future directions in UWSN trust management. By offering a systematic overview and classification of trust management approaches, this paper contributes to the understanding and development of effective trust mechanisms for UWSNs, ultimately enhancing their reliability, security, and successful operation in diverse marine applications.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2547-2576"},"PeriodicalIF":34.4,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140603938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this survey paper, we first provide insights on the evolution of radio access networks (RANs) through investigating the existing paradigms and future trends towards 6G. We then present the fully-decoupled RAN (FD-RAN), which aligns with the trends by integrating existing paradigms and introducing new features such as physical decoupling of uplink and downlink base stations. We also discuss the key technologies enabled by different architectures for further performance improvement and some open issues. We hope that this survey can stimulate more in-depth research on transforming 6G RAN so as to unleash the power of state-of-the-art technologies and meet higher performance requirements in the future.
在本调查报告中,我们首先通过研究现有范例和 6G 的未来趋势,深入探讨了无线接入网(RAN)的演进。然后,我们介绍了完全解耦 RAN(FD-RAN),它通过整合现有范例和引入新功能(如上行链路和下行链路基站的物理解耦)来适应发展趋势。我们还讨论了不同架构为进一步提高性能而采用的关键技术以及一些开放性问题。我们希望这份调查报告能促进对 6G RAN 变革的更深入研究,从而释放最先进技术的力量,满足未来更高的性能需求。
{"title":"Evolution of RAN Architectures Toward 6G: Motivation, Development, and Enabling Technologies","authors":"Jiacheng Chen;Xiaohu Liang;Jianzhe Xue;Yu Sun;Haibo Zhou;Xuemin Shen","doi":"10.1109/COMST.2024.3388511","DOIUrl":"10.1109/COMST.2024.3388511","url":null,"abstract":"In this survey paper, we first provide insights on the evolution of radio access networks (RANs) through investigating the existing paradigms and future trends towards 6G. We then present the fully-decoupled RAN (FD-RAN), which aligns with the trends by integrating existing paradigms and introducing new features such as physical decoupling of uplink and downlink base stations. We also discuss the key technologies enabled by different architectures for further performance improvement and some open issues. We hope that this survey can stimulate more in-depth research on transforming 6G RAN so as to unleash the power of state-of-the-art technologies and meet higher performance requirements in the future.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 3","pages":"1950-1988"},"PeriodicalIF":34.4,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140556972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Extremely large-scale multiple-input multiple-output (XL-MIMO) is a promising technology for the sixth-generation (6G) mobile communication networks. By significantly boosting the antenna number or size to at least an order of magnitude beyond current massive MIMO systems, XL-MIMO is expected to unprecedentedly enhance the spectral efficiency and spatial resolution for wireless communication. The evolution from massive MIMO to XL-MIMO is not simply an increase in the array size, but faces new design challenges, in terms of near-field channel modeling, performance analysis, channel estimation, and practical implementation. In this article, we give a comprehensive tutorial overview on near-field XL-MIMO communications, aiming to provide useful guidance for tackling the above challenges. First, the basic near-field modeling for XL-MIMO is established, by considering the new characteristics of non-uniform spherical wave (NUSW) and spatial non-stationarity. Next, based on the near-field modeling, the performance analysis of XL-MIMO is presented, including the near-field signal-to-noise ratio (SNR) scaling laws, beam focusing pattern, achievable rate, and degrees-of-freedom (DoF). Furthermore, various XL-MIMO design issues such as near-field beam codebook, beam training, channel estimation, and delay alignment modulation (DAM) transmission are elaborated. Finally, we point out promising directions to inspire future research on near-field XL-MIMO communications.
{"title":"A Tutorial on Near-Field XL-MIMO Communications Toward 6G","authors":"Haiquan Lu;Yong Zeng;Changsheng You;Yu Han;Jiayi Zhang;Zhe Wang;Zhenjun Dong;Shi Jin;Cheng-Xiang Wang;Tao Jiang;Xiaohu You;Rui Zhang","doi":"10.1109/COMST.2024.3387749","DOIUrl":"10.1109/COMST.2024.3387749","url":null,"abstract":"Extremely large-scale multiple-input multiple-output (XL-MIMO) is a promising technology for the sixth-generation (6G) mobile communication networks. By significantly boosting the antenna number or size to at least an order of magnitude beyond current massive MIMO systems, XL-MIMO is expected to unprecedentedly enhance the spectral efficiency and spatial resolution for wireless communication. The evolution from massive MIMO to XL-MIMO is not simply an increase in the array size, but faces new design challenges, in terms of near-field channel modeling, performance analysis, channel estimation, and practical implementation. In this article, we give a comprehensive tutorial overview on near-field XL-MIMO communications, aiming to provide useful guidance for tackling the above challenges. First, the basic near-field modeling for XL-MIMO is established, by considering the new characteristics of non-uniform spherical wave (NUSW) and spatial non-stationarity. Next, based on the near-field modeling, the performance analysis of XL-MIMO is presented, including the near-field signal-to-noise ratio (SNR) scaling laws, beam focusing pattern, achievable rate, and degrees-of-freedom (DoF). Furthermore, various XL-MIMO design issues such as near-field beam codebook, beam training, channel estimation, and delay alignment modulation (DAM) transmission are elaborated. Finally, we point out promising directions to inspire future research on near-field XL-MIMO communications.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2213-2257"},"PeriodicalIF":34.4,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140550426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-10DOI: 10.1109/COMST.2024.3387124
Howe Yuan Zhu;Nguyen Quang Hieu;Dinh Thai Hoang;Diep N. Nguyen;Chin-Teng Lin
The growing interest in the Metaverse has generated momentum for members of academia and industry to innovate toward realizing the Metaverse world. The Metaverse is a unique, continuous, and shared virtual world where humans embody a digital form within an online platform. Through a digital avatar, Metaverse users should have a perceptual presence within the environment and can interact and control the virtual world around them. Thus, a human-centric design is a crucial element of the Metaverse. The human users are not only the central entity but also the source of multi-sensory data that can be used to enrich the Metaverse ecosystem. In this survey, we study the potential applications of Brain-Computer Interface (BCI) technologies that can enhance the experience of Metaverse users. By directly communicating with the human brain, the most complex organ in the human body, BCI technologies hold the potential for the most intuitive human-machine system operating at the speed of thought. BCI technologies can enable various innovative applications for the Metaverse through this neural pathway, such as user cognitive state monitoring, digital avatar control, virtual interactions, and imagined speech communications. This survey first outlines the fundamental background of the Metaverse and BCI technologies. We then discuss the current challenges of the Metaverse that can potentially be addressed by BCI, such as motion sickness when users experience virtual environments or the negative emotional states of users in immersive virtual applications. After that, we propose and discuss a new research direction called Human Digital Twin, in which digital twins can create an intelligent and interactable avatar from the user’s brain signals. We also present the challenges and potential solutions in synchronizing and communicating between virtual and physical entities in the Metaverse. Finally, we highlight the challenges, open issues, and future research directions for BCI-enabled Metaverse systems.
{"title":"A Human-Centric Metaverse Enabled by Brain-Computer Interface: A Survey","authors":"Howe Yuan Zhu;Nguyen Quang Hieu;Dinh Thai Hoang;Diep N. Nguyen;Chin-Teng Lin","doi":"10.1109/COMST.2024.3387124","DOIUrl":"10.1109/COMST.2024.3387124","url":null,"abstract":"The growing interest in the Metaverse has generated momentum for members of academia and industry to innovate toward realizing the Metaverse world. The Metaverse is a unique, continuous, and shared virtual world where humans embody a digital form within an online platform. Through a digital avatar, Metaverse users should have a perceptual presence within the environment and can interact and control the virtual world around them. Thus, a human-centric design is a crucial element of the Metaverse. The human users are not only the central entity but also the source of multi-sensory data that can be used to enrich the Metaverse ecosystem. In this survey, we study the potential applications of Brain-Computer Interface (BCI) technologies that can enhance the experience of Metaverse users. By directly communicating with the human brain, the most complex organ in the human body, BCI technologies hold the potential for the most intuitive human-machine system operating at the speed of thought. BCI technologies can enable various innovative applications for the Metaverse through this neural pathway, such as user cognitive state monitoring, digital avatar control, virtual interactions, and imagined speech communications. This survey first outlines the fundamental background of the Metaverse and BCI technologies. We then discuss the current challenges of the Metaverse that can potentially be addressed by BCI, such as motion sickness when users experience virtual environments or the negative emotional states of users in immersive virtual applications. After that, we propose and discuss a new research direction called Human Digital Twin, in which digital twins can create an intelligent and interactable avatar from the user’s brain signals. We also present the challenges and potential solutions in synchronizing and communicating between virtual and physical entities in the Metaverse. Finally, we highlight the challenges, open issues, and future research directions for BCI-enabled Metaverse systems.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 3","pages":"2120-2145"},"PeriodicalIF":34.4,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10496440","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140545115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-08DOI: 10.1109/COMST.2024.3385908
Wei Jiang;Qiuheng Zhou;Jiguang He;Mohammad Asif Habibi;Sergiy Melnyk;Mohammed El-Absi;Bin Han;Marco Di Renzo;Hans Dieter Schotten;Fa-Long Luo;Tarek S. El-Bawab;Markku Juntti;Mérouane Debbah;Victor C. M. Leung
Next-generation cellular technologies, commonly referred to as the sixth generation (6G), are envisioned to support a higher system capacity, better performance, and network sensing capabilities. The terahertz (THz) band is one potential enabler to this end due to the large unused frequency bands and the high spatial resolution enabled by the short signal wavelength and large bandwidth. Different from earlier surveys, this paper presents a comprehensive treatment and technology survey on THz communications and sensing in terms of advantages, applications, propagation characterization, channel modeling, measurement campaigns, antennas, transceiver devices, beamforming, networking, the integration of communications and sensing, and experimental testbeds. Starting from the motivation and use cases, we survey the development and historical perspective of THz communications and sensing with the anticipated 6G requirements. We explore the radio propagation, channel modeling, and measurement for the THz band. The transceiver requirements, architectures, technological challenges, and state-of-the-art approaches to compensate for the high propagation losses, including appropriate antenna design and beamforming solutions. We overview several related technologies that either are required by or are beneficial for THz systems and networks. The synergistic design of sensing and communications is explored in depth. Practical trials, demonstrations, and experiments are also summarized. The paper gives a holistic view of the current state of the art and highlights the open research challenges towards 6G and beyond.
{"title":"Terahertz Communications and Sensing for 6G and Beyond: A Comprehensive Review","authors":"Wei Jiang;Qiuheng Zhou;Jiguang He;Mohammad Asif Habibi;Sergiy Melnyk;Mohammed El-Absi;Bin Han;Marco Di Renzo;Hans Dieter Schotten;Fa-Long Luo;Tarek S. El-Bawab;Markku Juntti;Mérouane Debbah;Victor C. M. Leung","doi":"10.1109/COMST.2024.3385908","DOIUrl":"10.1109/COMST.2024.3385908","url":null,"abstract":"Next-generation cellular technologies, commonly referred to as the sixth generation (6G), are envisioned to support a higher system capacity, better performance, and network sensing capabilities. The terahertz (THz) band is one potential enabler to this end due to the large unused frequency bands and the high spatial resolution enabled by the short signal wavelength and large bandwidth. Different from earlier surveys, this paper presents a comprehensive treatment and technology survey on THz communications and sensing in terms of advantages, applications, propagation characterization, channel modeling, measurement campaigns, antennas, transceiver devices, beamforming, networking, the integration of communications and sensing, and experimental testbeds. Starting from the motivation and use cases, we survey the development and historical perspective of THz communications and sensing with the anticipated 6G requirements. We explore the radio propagation, channel modeling, and measurement for the THz band. The transceiver requirements, architectures, technological challenges, and state-of-the-art approaches to compensate for the high propagation losses, including appropriate antenna design and beamforming solutions. We overview several related technologies that either are required by or are beneficial for THz systems and networks. The synergistic design of sensing and communications is explored in depth. Practical trials, demonstrations, and experiments are also summarized. The paper gives a holistic view of the current state of the art and highlights the open research challenges towards 6G and beyond.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2326-2381"},"PeriodicalIF":34.4,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140538209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-04DOI: 10.1109/COMST.2024.3385347
Thien Thi Thanh Le;Naveed Ul Hassan;Xiaoming Chen;Mohamed-Slim Alouini;Zhu Han;Chau Yuen
Low-Earth orbit (LEO) satellites can play an important role in providing seamless coverage for the Internet of Things (IoT). In satellite-based IoT (SIoT) networks, IoT devices can communicate directly with a satellite or through a gateway, which is called direct-access SIoT and indirect-access SIoT, respectively. As the number of IoT devices requiring satellite access is increasing, the role of medium access control (MAC) protocols becomes critical in reducing the latency and improving the quality of service (QoS). In this tutorial, we provide a comprehensive review of random access (RA) protocols, more specifically, grant-free RA (GFRA) protocols, which are more efficient in handling the communication requirements of SIoT networks. We discuss the challenges that arise in designing RA protocols under time-frequency resource and preamble limitations, high mobility of satellites, sporadic traffic from IoT networks, and diverse QoS requirements of IoT applications. We also highlight future research directions, including cross-layer optimization, joint activity detection and channel estimation (JAD-CE), reinforcement-learning-based solution, protocol design for dense LEO satellite networks, and reconfigurable intelligent surface (RIS) aided SIoT.
{"title":"A Survey on Random Access Protocols in Direct-Access LEO Satellite-Based IoT Communication","authors":"Thien Thi Thanh Le;Naveed Ul Hassan;Xiaoming Chen;Mohamed-Slim Alouini;Zhu Han;Chau Yuen","doi":"10.1109/COMST.2024.3385347","DOIUrl":"10.1109/COMST.2024.3385347","url":null,"abstract":"Low-Earth orbit (LEO) satellites can play an important role in providing seamless coverage for the Internet of Things (IoT). In satellite-based IoT (SIoT) networks, IoT devices can communicate directly with a satellite or through a gateway, which is called direct-access SIoT and indirect-access SIoT, respectively. As the number of IoT devices requiring satellite access is increasing, the role of medium access control (MAC) protocols becomes critical in reducing the latency and improving the quality of service (QoS). In this tutorial, we provide a comprehensive review of random access (RA) protocols, more specifically, grant-free RA (GFRA) protocols, which are more efficient in handling the communication requirements of SIoT networks. We discuss the challenges that arise in designing RA protocols under time-frequency resource and preamble limitations, high mobility of satellites, sporadic traffic from IoT networks, and diverse QoS requirements of IoT applications. We also highlight future research directions, including cross-layer optimization, joint activity detection and channel estimation (JAD-CE), reinforcement-learning-based solution, protocol design for dense LEO satellite networks, and reconfigurable intelligent surface (RIS) aided SIoT.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"426-462"},"PeriodicalIF":34.4,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140541587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-01DOI: 10.1109/COMST.2024.3384132
Joseph Clancy;Darragh Mullins;Brian Deegan;Jonathan Horgan;Enda Ward;Ciarán Eising;Patrick Denny;Edward Jones;Martin Glavin
Autonomous vehicles and Intelligent Transport Systems (ITS) have started to become a reality in recent years. However, shortcomings of these early intelligent vehicles demonstrate a need to increase an intelligent vehicle’s perceptual bubble beyond the vehicle’s onboard sensors. Vehicle-to-Everything (V2X) communications is a technology intended to enable intelligent vehicles to increase their perceptive range via communication with the outside world, i.e., other vehicles, road users, and infrastructure. One of the critical layers of V2X communications is that of the underlying wireless access. There remains an open debate on which technology (or technologies) will ultimately be adopted as the de facto wireless access technology for V2X communications. Presently, a myriad of unconnected threads of work are being undertaken to this end, resulting in an unclear picture of the current state of wireless access for V2X communications. In this tutorial review, we collate current research on wireless access for V2X communications to showcase recent developments and the challenges facing candidate technologies. To allow the reader to engage with the debate, we present an overview of the field of V2X communications, its history, and standardisation. Following this, we provide an overview of the key candidate wireless access technologies that may enable V2X communications. Through this work, we aim to provide a comprehensive first step into the discipline of wireless access for V2X communications.
{"title":"Wireless Access for V2X Communications: Research, Challenges and Opportunities","authors":"Joseph Clancy;Darragh Mullins;Brian Deegan;Jonathan Horgan;Enda Ward;Ciarán Eising;Patrick Denny;Edward Jones;Martin Glavin","doi":"10.1109/COMST.2024.3384132","DOIUrl":"10.1109/COMST.2024.3384132","url":null,"abstract":"Autonomous vehicles and Intelligent Transport Systems (ITS) have started to become a reality in recent years. However, shortcomings of these early intelligent vehicles demonstrate a need to increase an intelligent vehicle’s perceptual bubble beyond the vehicle’s onboard sensors. Vehicle-to-Everything (V2X) communications is a technology intended to enable intelligent vehicles to increase their perceptive range via communication with the outside world, i.e., other vehicles, road users, and infrastructure. One of the critical layers of V2X communications is that of the underlying wireless access. There remains an open debate on which technology (or technologies) will ultimately be adopted as the de facto wireless access technology for V2X communications. Presently, a myriad of unconnected threads of work are being undertaken to this end, resulting in an unclear picture of the current state of wireless access for V2X communications. In this tutorial review, we collate current research on wireless access for V2X communications to showcase recent developments and the challenges facing candidate technologies. To allow the reader to engage with the debate, we present an overview of the field of V2X communications, its history, and standardisation. Following this, we provide an overview of the key candidate wireless access technologies that may enable V2X communications. Through this work, we aim to provide a comprehensive first step into the discipline of wireless access for V2X communications.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 3","pages":"2082-2119"},"PeriodicalIF":34.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140340576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-31DOI: 10.1109/COMST.2024.3405075
Ning Yang;Shuo Chen;Haijun Zhang;Randall Berry
Mobile Edge Computing (MEC) broadens the scope of computation and storage beyond the central network, incorporating edge nodes close to end devices. This expansion facilitates the implementation of large-scale “connected things” within edge networks. The advent of applications necessitating real-time, high-quality service presents several challenges, such as low latency, high data rate, reliability, efficiency, and security, all of which demand resolution. The incorporation of reinforcement learning (RL) methodologies within MEC networks promotes a deeper understanding of mobile user behaviors and network dynamics, thereby optimizing resource use in computing and communication processes. This paper offers an exhaustive survey of RL applications in MEC networks, initially presenting an overview of RL from its fundamental principles to the latest advanced frameworks. Furthermore, it outlines various RL strategies employed in offloading, caching, and communication within MEC networks. Finally, it explores open issues linked with software and hardware platforms, representation, RL robustness, safe RL, large-scale scheduling, generalization, security, and privacy. The paper proposes specific RL techniques to mitigate these issues and provides insights into their practical applications.
{"title":"Beyond the Edge: An Advanced Exploration of Reinforcement Learning for Mobile Edge Computing, Its Applications, and Future Research Trajectories","authors":"Ning Yang;Shuo Chen;Haijun Zhang;Randall Berry","doi":"10.1109/COMST.2024.3405075","DOIUrl":"10.1109/COMST.2024.3405075","url":null,"abstract":"Mobile Edge Computing (MEC) broadens the scope of computation and storage beyond the central network, incorporating edge nodes close to end devices. This expansion facilitates the implementation of large-scale “connected things” within edge networks. The advent of applications necessitating real-time, high-quality service presents several challenges, such as low latency, high data rate, reliability, efficiency, and security, all of which demand resolution. The incorporation of reinforcement learning (RL) methodologies within MEC networks promotes a deeper understanding of mobile user behaviors and network dynamics, thereby optimizing resource use in computing and communication processes. This paper offers an exhaustive survey of RL applications in MEC networks, initially presenting an overview of RL from its fundamental principles to the latest advanced frameworks. Furthermore, it outlines various RL strategies employed in offloading, caching, and communication within MEC networks. Finally, it explores open issues linked with software and hardware platforms, representation, RL robustness, safe RL, large-scale scheduling, generalization, security, and privacy. The paper proposes specific RL techniques to mitigate these issues and provides insights into their practical applications.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"546-594"},"PeriodicalIF":34.4,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141185273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-30DOI: 10.1109/COMST.2024.3406990
Winfried Stock;Robert T. Schwarz;Christian A. Hofmann;Andreas Knopp
Positioning, Navigation, and Timing (PNT) is an essential service for modern societies, their industries, and governmental organizations. Mobility, logistics, and agriculture, among others, depend heavily on reliable PNT and will do so even more in the future. However, the predominant Global Navigation Satellite Systems (GNSS) are highly susceptible to jamming and spoofing, a threat that has increased in the recent years. As a result, there is a growing need for a robust, independent PNT backup system. A promising approach to meet this demand is to use the communication signals of satellites in Low Earth Orbit (LEO) as signals of opportunity (opportunistic LEO-PNT). In recent years, opportunistic LEO-PNT has gained relevance in academic research due to the emergence of megaconstellations. This survey provides an holistic overview of opportunistic LEO-PNT and an exhaustive review of the academic work in the field. Error sources and challenges with respect to the development of operational systems are evaluated, and the state of the art performance is analyzed. System-level strategies to mitigate the error sources and challenges are identified, including the combination of opportunistic LEO-PNT with GNSS or other sensors, or the use of base stations. Future research directions, such as the investigation of non-accuracy related KPIs, the required receiver hardware, or the use in low SNR scenarios, are derived.
{"title":"Survey on Opportunistic PNT With Signals From LEO Communication Satellites","authors":"Winfried Stock;Robert T. Schwarz;Christian A. Hofmann;Andreas Knopp","doi":"10.1109/COMST.2024.3406990","DOIUrl":"10.1109/COMST.2024.3406990","url":null,"abstract":"Positioning, Navigation, and Timing (PNT) is an essential service for modern societies, their industries, and governmental organizations. Mobility, logistics, and agriculture, among others, depend heavily on reliable PNT and will do so even more in the future. However, the predominant Global Navigation Satellite Systems (GNSS) are highly susceptible to jamming and spoofing, a threat that has increased in the recent years. As a result, there is a growing need for a robust, independent PNT backup system. A promising approach to meet this demand is to use the communication signals of satellites in Low Earth Orbit (LEO) as signals of opportunity (opportunistic LEO-PNT). In recent years, opportunistic LEO-PNT has gained relevance in academic research due to the emergence of megaconstellations. This survey provides an holistic overview of opportunistic LEO-PNT and an exhaustive review of the academic work in the field. Error sources and challenges with respect to the development of operational systems are evaluated, and the state of the art performance is analyzed. System-level strategies to mitigate the error sources and challenges are identified, including the combination of opportunistic LEO-PNT with GNSS or other sensors, or the use of base stations. Future research directions, such as the investigation of non-accuracy related KPIs, the required receiver hardware, or the use in low SNR scenarios, are derived.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"77-107"},"PeriodicalIF":34.4,"publicationDate":"2024-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141182899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-29DOI: 10.1109/COMST.2024.3383093
Jingru Tan;Tom H. Luan;Wenbo Guan;Yuntao Wang;Haixia Peng;Yao Zhang;Dongmei Zhao;Ning Lu
The digital transformation within the automotive industry is accelerating towards an era dominated by autonomous vehicles, with vehicle-to-everything (V2X) communications being a fundamental enabler for this advancement. As vehicular networks evolve to meet the complex demands of autonomous driving, traditional communication systems encounter limitations in bandwidth and data transfer rates. Millimeter-wave (mmWave) communication emerges as a pivotal solution, offering the extensive bandwidth required for the high data throughput and low latency essential in modern vehicular communications. However, challenges loom, with beam alignment in mmWave V2X becoming a time-consuming process and the mmWave’s blockage effect impeding consistent and reliable vehicular communication links. Therefore, the development of efficient, real-time, and robust beam alignment technology is crucial for mmWave V2X communication. In this paper, we present a comprehensive survey of beam alignment techniques in mmWave V2X communication. We explore various approaches including beam sweeping, angle of arrival (AoA)/angle of direction (AoD) estimation, black-box optimization, and side information. Subsequently, we introduce performance metrics for assessing beam alignment performance and compare the performance of four beam alignment methods under different metrics. Finally, we summarize the future research directions and challenges faced by beam alignment techniques in mmWave V2X communication, offering valuable insights for researchers in this field.
{"title":"Beam Alignment in mmWave V2X Communications: A Survey","authors":"Jingru Tan;Tom H. Luan;Wenbo Guan;Yuntao Wang;Haixia Peng;Yao Zhang;Dongmei Zhao;Ning Lu","doi":"10.1109/COMST.2024.3383093","DOIUrl":"10.1109/COMST.2024.3383093","url":null,"abstract":"The digital transformation within the automotive industry is accelerating towards an era dominated by autonomous vehicles, with vehicle-to-everything (V2X) communications being a fundamental enabler for this advancement. As vehicular networks evolve to meet the complex demands of autonomous driving, traditional communication systems encounter limitations in bandwidth and data transfer rates. Millimeter-wave (mmWave) communication emerges as a pivotal solution, offering the extensive bandwidth required for the high data throughput and low latency essential in modern vehicular communications. However, challenges loom, with beam alignment in mmWave V2X becoming a time-consuming process and the mmWave’s blockage effect impeding consistent and reliable vehicular communication links. Therefore, the development of efficient, real-time, and robust beam alignment technology is crucial for mmWave V2X communication. In this paper, we present a comprehensive survey of beam alignment techniques in mmWave V2X communication. We explore various approaches including beam sweeping, angle of arrival (AoA)/angle of direction (AoD) estimation, black-box optimization, and side information. Subsequently, we introduce performance metrics for assessing beam alignment performance and compare the performance of four beam alignment methods under different metrics. Finally, we summarize the future research directions and challenges faced by beam alignment techniques in mmWave V2X communication, offering valuable insights for researchers in this field.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 3","pages":"1676-1709"},"PeriodicalIF":34.4,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140329103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}