首页 > 最新文献

IEEE Communications Surveys and Tutorials最新文献

英文 中文
Hardware Security for Internet of Things Identity Assurance 确保物联网身份的硬件安全
IF 35.6 1区 计算机科学 Q1 Engineering Pub Date : 2024-01-17 DOI: 10.1109/COMST.2024.3355168
André Cirne;Patrícia R. Sousa;João S. Resende;Luís Antunes
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to prioritize their security, especially in the context of identity and authentication mechanisms. However, IoT devices have unique limitations in terms of computational capabilities and susceptibility to hardware attacks, which pose significant challenges to establishing strong identity and authentication systems. Paradoxically, the very hardware constraints responsible for these challenges can also offer potential solutions. By incorporating hardware-based identity implementations, it is possible to overcome computational and energy limitations, while bolstering resistance against both hardware and software attacks. This research addresses these challenges by investigating the vulnerabilities and obstacles faced by identity and authentication systems in the IoT context, while also exploring potential technologies to address these issues. Each identified technology underwent meticulous investigation, considering known security attacks, implemented countermeasures, and an assessment of their pros and cons. Furthermore, an extensive literature survey was conducted to identify instances where these technologies have effectively supported device identity. The research also includes a demonstration that evaluates the effectiveness of hardware trust anchors in mitigating various attacks on IoT identity. This empirical evaluation provides valuable insights into the challenges developers encounter when implementing hardware-based identity solutions. Moreover, it underscores the substantial value of these solutions in terms of mitigating attacks and developing robust identity frameworks. By thoroughly examining vulnerabilities, exploring technologies, and conducting empirical evaluations, this research contributes to understanding and promoting the adoption of hardware-based identity and authentication systems in secure IoT environments. The findings emphasize the challenges faced by developers and highlight the significance of hardware trust anchors in enhancing security and facilitating effective identity solutions.
随着物联网(IoT)设备的激增,人们越来越需要优先考虑其安全性,特别是在身份和认证机制方面。然而,物联网设备在计算能力和易受硬件攻击方面有其独特的局限性,这给建立强大的身份和认证系统带来了巨大挑战。矛盾的是,造成这些挑战的硬件限制也可以提供潜在的解决方案。通过采用基于硬件的身份识别实施,有可能克服计算和能源限制,同时增强抵御硬件和软件攻击的能力。本研究通过调查物联网背景下身份和认证系统面临的漏洞和障碍来应对这些挑战,同时还探索了解决这些问题的潜在技术。每项确定的技术都经过了细致的调查,考虑了已知的安全攻击、已实施的应对措施以及对其利弊的评估。此外,还进行了广泛的文献调查,以确定这些技术有效支持设备身份识别的实例。研究还包括一个演示,评估硬件信任锚在减轻对物联网身份的各种攻击方面的有效性。这一实证评估为开发人员在实施基于硬件的身份识别解决方案时遇到的挑战提供了宝贵的见解。此外,它还强调了这些解决方案在减轻攻击和开发强大身份框架方面的巨大价值。通过彻底检查漏洞、探索技术和进行实证评估,本研究有助于理解和促进在安全的物联网环境中采用基于硬件的身份和认证系统。研究结果强调了开发人员面临的挑战,并突出了硬件信任锚在增强安全性和促进有效身份解决方案方面的重要性。
{"title":"Hardware Security for Internet of Things Identity Assurance","authors":"André Cirne;Patrícia R. Sousa;João S. Resende;Luís Antunes","doi":"10.1109/COMST.2024.3355168","DOIUrl":"10.1109/COMST.2024.3355168","url":null,"abstract":"With the proliferation of Internet of Things (IoT) devices, there is an increasing need to prioritize their security, especially in the context of identity and authentication mechanisms. However, IoT devices have unique limitations in terms of computational capabilities and susceptibility to hardware attacks, which pose significant challenges to establishing strong identity and authentication systems. Paradoxically, the very hardware constraints responsible for these challenges can also offer potential solutions. By incorporating hardware-based identity implementations, it is possible to overcome computational and energy limitations, while bolstering resistance against both hardware and software attacks. This research addresses these challenges by investigating the vulnerabilities and obstacles faced by identity and authentication systems in the IoT context, while also exploring potential technologies to address these issues. Each identified technology underwent meticulous investigation, considering known security attacks, implemented countermeasures, and an assessment of their pros and cons. Furthermore, an extensive literature survey was conducted to identify instances where these technologies have effectively supported device identity. The research also includes a demonstration that evaluates the effectiveness of hardware trust anchors in mitigating various attacks on IoT identity. This empirical evaluation provides valuable insights into the challenges developers encounter when implementing hardware-based identity solutions. Moreover, it underscores the substantial value of these solutions in terms of mitigating attacks and developing robust identity frameworks. By thoroughly examining vulnerabilities, exploring technologies, and conducting empirical evaluations, this research contributes to understanding and promoting the adoption of hardware-based identity and authentication systems in secure IoT environments. The findings emphasize the challenges faced by developers and highlight the significance of hardware trust anchors in enhancing security and facilitating effective identity solutions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-Quantum Blockchain Security for the Internet of Things: Survey and Research Directions 物联网的后量子区块链安全:调查与研究方向
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-17 DOI: 10.1109/COMST.2024.3355222
Hadi Gharavi;Jorge Granjal;Edmundo Monteiro
Blockchain is becoming increasingly popular in the business and academic communities because it can provide security for a wide range of applications. Therefore, researchers have been motivated to exploit blockchain characteristics, such as data immutability, transparency, and resistance to single-point failures in the Internet of Things (IoT), to increase the security of the IoT ecosystem. However, many existing blockchains rely on classical cryptosystems such as the Elliptic Curve Digital Signature Algorithm (ECDSA) and SHA-256 to validate transactions, which will be compromised by Shor and Grover’s algorithms running on quantum computers in the foreseeable future. Post-Quantum Cryptosystems (PQC) are an innovative solution for resisting quantum attacks that can be applied to blockchains, resulting in the creation of a new type of blockchain known as Post-Quantum Blockchains (PQB). In this survey, we will look at the different types of PQC and their recent standard primitives to determine whether they can enable security for blockchain-based IoT applications. It also briefly introduces blockchain and outlines recent blockchain-IoT application proposals. To the best of our knowledge, this is the first study to examine how post-quantum blockchains are being developed and how they can be used to create security mechanisms for different IoT applications. Finally, this study explores the main challenges and potential research directions that arise from integrating quantum-resistance blockchains into IoT ecosystems.
区块链在商业和学术界越来越受欢迎,因为它可以为广泛的应用提供安全性。因此,研究人员一直在积极利用区块链的特性,如数据不变性、透明度和抵御物联网(IoT)中单点故障的能力,以提高物联网生态系统的安全性。然而,现有的许多区块链都依赖于经典密码系统,如椭圆曲线数字签名算法(ECDSA)和 SHA-256 来验证交易,而在可预见的未来,这些系统将被运行在量子计算机上的 Shor 和 Grover 算法所破坏。后量子密码系统(PQC)是一种抵御量子攻击的创新解决方案,可应用于区块链,从而创建一种新型区块链,即后量子区块链(PQB)。在本调查中,我们将研究不同类型的 PQC 及其最新标准基元,以确定它们是否能确保基于区块链的物联网应用的安全性。它还简要介绍了区块链,并概述了最近的区块链物联网应用提案。据我们所知,这是第一项研究如何开发后量子区块链,以及如何利用它们为不同的物联网应用创建安全机制。最后,本研究探讨了将量子抗性区块链集成到物联网生态系统中所面临的主要挑战和潜在研究方向。
{"title":"Post-Quantum Blockchain Security for the Internet of Things: Survey and Research Directions","authors":"Hadi Gharavi;Jorge Granjal;Edmundo Monteiro","doi":"10.1109/COMST.2024.3355222","DOIUrl":"10.1109/COMST.2024.3355222","url":null,"abstract":"Blockchain is becoming increasingly popular in the business and academic communities because it can provide security for a wide range of applications. Therefore, researchers have been motivated to exploit blockchain characteristics, such as data immutability, transparency, and resistance to single-point failures in the Internet of Things (IoT), to increase the security of the IoT ecosystem. However, many existing blockchains rely on classical cryptosystems such as the Elliptic Curve Digital Signature Algorithm (ECDSA) and SHA-256 to validate transactions, which will be compromised by Shor and Grover’s algorithms running on quantum computers in the foreseeable future. Post-Quantum Cryptosystems (PQC) are an innovative solution for resisting quantum attacks that can be applied to blockchains, resulting in the creation of a new type of blockchain known as Post-Quantum Blockchains (PQB). In this survey, we will look at the different types of PQC and their recent standard primitives to determine whether they can enable security for blockchain-based IoT applications. It also briefly introduces blockchain and outlines recent blockchain-IoT application proposals. To the best of our knowledge, this is the first study to examine how post-quantum blockchains are being developed and how they can be used to create security mechanisms for different IoT applications. Finally, this study explores the main challenges and potential research directions that arise from integrating quantum-resistance blockchains into IoT ecosystems.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":34.4,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Learning-Empowered Mobile Network Management for 5G and Beyond Networks: From Access to Core 面向 5G 及更高网络的联合学习驱动型移动网络管理:从接入到核心
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-16 DOI: 10.1109/COMST.2024.3352910
Joohyung Lee;Faranaksadat Solat;Tae Yeon Kim;H. Vincent Poor
The fifth generation (5G) and beyond wireless networks are envisioned to provide an integrated communication and computing platform that will enable multipurpose and intelligent networks driven by a growing demand for both traditional end users and industry verticals. This evolution will be realized by innovations in both core and access capabilities, mainly from virtualization technologies and ultra-dense networks, e.g., software-defined networking (SDN), network slicing, network function virtualization (NFV), multi-access edge computing (MEC), terahertz (THz) communications, etc. However, those technologies require increased complexity of resource management and large configurations of network slices. In this new milieu, with the help of artificial intelligence (AI), network operators will strive to enable AI-empowered network management by automating radio and computing resource management and orchestration processes in a data-driven manner. In this regard, most of the previous AI-empowered network management approaches adopt a traditional centralized training paradigm where diverse training data generated at network functions over distributed base stations associated with MEC servers are transferred to a central training server. On the other hand, to exploit distributed and parallel processing capabilities of distributed network entities in a fast and secure manner, federated learning (FL) has emerged as a distributed AI approach that can enable many AI-empowered network management approaches by allowing for AI training at distributed network entities without the need for data transmission to a centralized server. This article comprehensively surveys the field of FL-empowered mobile network management for 5G and beyond networks from access to the core. Specifically, we begin with an introduction to the state-of-the-art of FL by exploring and analyzing recent advances in FL in general. Then, we provide an extensive survey of AI-empowered network management, including background on 5G network functions, mobile traffic prediction, and core/access network management regarding standardization and research activities. We then present an extensive survey of FL-empowered network management by highlighting how FL is adopted in AI-empowered network management. Important lessons learned from this review of AI and FL-empowered network management are also provided. Finally, we complement this survey by discussing open issues and possible directions for future research in this important emerging area.
根据设想,第五代(5G)及以后的无线网络将提供一个集成的通信和计算平台,在传统终端用户和垂直行业日益增长的需求推动下,实现多用途智能网络。这一演进将通过核心和接入能力的创新来实现,主要来自虚拟化技术和超密集网络,如软件定义网络(SDN)、网络切片、网络功能虚拟化(NFV)、多接入边缘计算(MEC)、太赫兹(THz)通信等。然而,这些技术要求增加资源管理的复杂性和网络切片的大型配置。在这一新环境中,网络运营商将借助人工智能(AI),以数据驱动的方式实现无线电和计算资源管理与协调流程的自动化,从而努力实现人工智能赋能的网络管理。在这方面,以往大多数人工智能驱动的网络管理方法都采用传统的集中式训练范例,将分布式基站上与 MEC 服务器相关联的网络功能产生的各种训练数据传输到中央训练服务器。另一方面,为了快速、安全地利用分布式网络实体的分布式并行处理能力,联合学习(FL)作为一种分布式人工智能方法应运而生,它可以在分布式网络实体进行人工智能训练,而无需将数据传输到集中式服务器,从而支持多种人工智能网络管理方法。本文全面探讨了从接入到核心的 5G 及更高网络的 FL 驱动型移动网络管理领域。具体来说,我们首先介绍了 FL 的最新进展,探索和分析了 FL 的总体发展情况。然后,我们对人工智能驱动的网络管理进行了广泛的调查,包括有关 5G 网络功能、移动流量预测以及核心/接入网络管理的标准化和研究活动的背景。然后,我们通过重点介绍人工智能网络管理中如何采用 FL,对人工智能网络管理进行了广泛的调查。我们还提供了从人工智能和 FL 驱动的网络管理回顾中汲取的重要经验。最后,我们讨论了这一重要新兴领域的开放性问题和未来可能的研究方向,以此补充本调查报告。
{"title":"Federated Learning-Empowered Mobile Network Management for 5G and Beyond Networks: From Access to Core","authors":"Joohyung Lee;Faranaksadat Solat;Tae Yeon Kim;H. Vincent Poor","doi":"10.1109/COMST.2024.3352910","DOIUrl":"10.1109/COMST.2024.3352910","url":null,"abstract":"The fifth generation (5G) and beyond wireless networks are envisioned to provide an integrated communication and computing platform that will enable multipurpose and intelligent networks driven by a growing demand for both traditional end users and industry verticals. This evolution will be realized by innovations in both core and access capabilities, mainly from virtualization technologies and ultra-dense networks, e.g., software-defined networking (SDN), network slicing, network function virtualization (NFV), multi-access edge computing (MEC), terahertz (THz) communications, etc. However, those technologies require increased complexity of resource management and large configurations of network slices. In this new milieu, with the help of artificial intelligence (AI), network operators will strive to enable AI-empowered network management by automating radio and computing resource management and orchestration processes in a data-driven manner. In this regard, most of the previous AI-empowered network management approaches adopt a traditional centralized training paradigm where diverse training data generated at network functions over distributed base stations associated with MEC servers are transferred to a central training server. On the other hand, to exploit distributed and parallel processing capabilities of distributed network entities in a fast and secure manner, federated learning (FL) has emerged as a distributed AI approach that can enable many AI-empowered network management approaches by allowing for AI training at distributed network entities without the need for data transmission to a centralized server. This article comprehensively surveys the field of FL-empowered mobile network management for 5G and beyond networks from access to the core. Specifically, we begin with an introduction to the state-of-the-art of FL by exploring and analyzing recent advances in FL in general. Then, we provide an extensive survey of AI-empowered network management, including background on 5G network functions, mobile traffic prediction, and core/access network management regarding standardization and research activities. We then present an extensive survey of FL-empowered network management by highlighting how FL is adopted in AI-empowered network management. Important lessons learned from this review of AI and FL-empowered network management are also provided. Finally, we complement this survey by discussing open issues and possible directions for future research in this important emerging area.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":34.4,"publicationDate":"2024-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139947841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unleashing the Power of Edge-Cloud Generative AI in Mobile Networks: A Survey of AIGC Services 在移动网络中释放边缘云生成式人工智能的力量:AIGC 服务调查
IF 35.6 1区 计算机科学 Q1 Engineering Pub Date : 2024-01-12 DOI: 10.1109/COMST.2024.3353265
Minrui Xu;Hongyang Du;Dusit Niyato;Jiawen Kang;Zehui Xiong;Shiwen Mao;Zhu Han;Abbas Jamalipour;Dong In Kim;Xuemin Shen;Victor C. M. Leung;H. Vincent Poor
Artificial Intelligence-Generated Content (AIGC) is an automated method for generating, manipulating, and modifying valuable and diverse data using AI algorithms creatively. This survey paper focuses on the deployment of AIGC applications, e.g., ChatGPT and Dall-E, at mobile edge networks, namely mobile AIGC networks, that provide personalized and customized AIGC services in real time while maintaining user privacy. We begin by introducing the background and fundamentals of generative models and the lifecycle of AIGC services at mobile AIGC networks, which includes data collection, training, fine-tuning, inference, and product management. We then discuss the collaborative cloud-edge-mobile infrastructure and technologies required to support AIGC services and enable users to access AIGC at mobile edge networks. Furthermore, we explore AIGC-driven creative applications and use cases for mobile AIGC networks. Additionally, we discuss the implementation, security, and privacy challenges of deploying mobile AIGC networks. Finally, we highlight some future research directions and open issues for the full realization of mobile AIGC networks.
人工智能生成内容(AIGC)是一种利用人工智能算法创造性地生成、处理和修改有价值的多样化数据的自动化方法。本调查报告重点介绍在移动边缘网络(即移动 AIGC 网络)部署 AIGC 应用程序(如 ChatGPT 和 Dall-E),实时提供个性化和定制的 AIGC 服务,同时维护用户隐私。我们首先介绍了生成模型的背景和基本原理,以及移动 AIGC 网络 AIGC 服务的生命周期,包括数据收集、训练、微调、推理和产品管理。然后,我们将讨论支持 AIGC 服务所需的云-边缘-移动协作基础设施和技术,并使用户能够在移动边缘网络访问 AIGC。此外,我们还探讨了 AIGC 驱动的创意应用以及移动 AIGC 网络的使用案例。此外,我们还讨论了部署移动 AIGC 网络所面临的实施、安全和隐私方面的挑战。最后,我们强调了全面实现移动 AIGC 网络的一些未来研究方向和未决问题。
{"title":"Unleashing the Power of Edge-Cloud Generative AI in Mobile Networks: A Survey of AIGC Services","authors":"Minrui Xu;Hongyang Du;Dusit Niyato;Jiawen Kang;Zehui Xiong;Shiwen Mao;Zhu Han;Abbas Jamalipour;Dong In Kim;Xuemin Shen;Victor C. M. Leung;H. Vincent Poor","doi":"10.1109/COMST.2024.3353265","DOIUrl":"10.1109/COMST.2024.3353265","url":null,"abstract":"Artificial Intelligence-Generated Content (AIGC) is an automated method for generating, manipulating, and modifying valuable and diverse data using AI algorithms creatively. This survey paper focuses on the deployment of AIGC applications, e.g., ChatGPT and Dall-E, at mobile edge networks, namely mobile AIGC networks, that provide personalized and customized AIGC services in real time while maintaining user privacy. We begin by introducing the background and fundamentals of generative models and the lifecycle of AIGC services at mobile AIGC networks, which includes data collection, training, fine-tuning, inference, and product management. We then discuss the collaborative cloud-edge-mobile infrastructure and technologies required to support AIGC services and enable users to access AIGC at mobile edge networks. Furthermore, we explore AIGC-driven creative applications and use cases for mobile AIGC networks. Additionally, we discuss the implementation, security, and privacy challenges of deploying mobile AIGC networks. Finally, we highlight some future research directions and open issues for the full realization of mobile AIGC networks.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139947827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization 关于匿名网络安全性的系统调查:漏洞、攻击、防御和形式化
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-04 DOI: 10.1109/COMST.2024.3350006
Daichong Chao;Dawei Xu;Feng Gao;Chuan Zhang;Weiting Zhang;Liehuang Zhu
The importance of safeguarding individuals’ privacy rights in online activities is unmistakable in today’s anonymity networks. Since the introduction of Mixnet by Chaum, numerous anonymity networks with different objectives and design principles have emerged, providing a diverse range of applications for privacy-conscious users. However, security issues in anonymity networks have persistently existed and continue to impact their survival and development. Each anonymity network presents distinct security challenges, making it more challenging for researchers to achieve a comprehensive and systematic understanding of their security. The current literature exhibits some unavoidable gaps, including the lack of vulnerability perspectives, a unified understanding of diverse attack types, defense perspectives, and theoretical perspectives. To address these gaps, we investigate prevailing attacks targeting anonymity networks from the viewpoint of network designers and operators. We use Tor, I2P, and Freenet (arguably the three most popular anonymity networks) as case studies. Starting with these attacks, we conduct an in-depth analysis of the vulnerabilities underlying them and explore related defense mechanisms and formal security. Specifically, we classify vulnerabilities into external and internal categories, utilizing the protocol stack of an anonymity network to guide the categorization of internal vulnerabilities. Furthermore, we examine their root causes. In addition to these aspects, we emphasize the importance of formal security in researching the security of anonymity networks by integrating the investigated vulnerabilities, attacks, and defenses. Through this comprehensive, thorough, and unified approach, this paper aims to provide insights into the security of anonymity networks and offer general research findings. Finally, we discuss ongoing challenges and future directions in this specific area.
在当今的匿名网络中,保障个人网上活动隐私权的重要性不言而喻。自 Chaum 推出 Mixnet 以来,出现了许多具有不同目标和设计原则的匿名网络,为注重隐私的用户提供了多样化的应用。然而,匿名网络的安全问题一直存在,并继续影响其生存和发展。每个匿名网络都提出了不同的安全挑战,这使得研究人员要全面系统地了解其安全性更具挑战性。目前的文献存在一些不可避免的空白,包括缺乏漏洞视角、对不同攻击类型的统一认识、防御视角和理论视角。为了弥补这些不足,我们从网络设计者和操作者的角度出发,研究了针对匿名网络的流行攻击。我们使用 Tor、I2P 和 Freenet(可以说是三个最流行的匿名网络)作为案例研究。从这些攻击入手,我们对其背后的漏洞进行了深入分析,并探讨了相关的防御机制和形式安全性。具体来说,我们将漏洞分为外部和内部两类,并利用匿名网络的协议栈来指导内部漏洞的分类。此外,我们还研究了这些漏洞的根本原因。除了这些方面,我们还通过整合所调查的漏洞、攻击和防御,强调了形式安全在匿名网络安全研究中的重要性。通过这种全面、彻底和统一的方法,本文旨在提供对匿名网络安全的见解,并提供一般性研究成果。最后,我们讨论了这一特定领域目前面临的挑战和未来的发展方向。
{"title":"A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization","authors":"Daichong Chao;Dawei Xu;Feng Gao;Chuan Zhang;Weiting Zhang;Liehuang Zhu","doi":"10.1109/COMST.2024.3350006","DOIUrl":"10.1109/COMST.2024.3350006","url":null,"abstract":"The importance of safeguarding individuals’ privacy rights in online activities is unmistakable in today’s anonymity networks. Since the introduction of Mixnet by Chaum, numerous anonymity networks with different objectives and design principles have emerged, providing a diverse range of applications for privacy-conscious users. However, security issues in anonymity networks have persistently existed and continue to impact their survival and development. Each anonymity network presents distinct security challenges, making it more challenging for researchers to achieve a comprehensive and systematic understanding of their security. The current literature exhibits some unavoidable gaps, including the lack of vulnerability perspectives, a unified understanding of diverse attack types, defense perspectives, and theoretical perspectives. To address these gaps, we investigate prevailing attacks targeting anonymity networks from the viewpoint of network designers and operators. We use Tor, I2P, and Freenet (arguably the three most popular anonymity networks) as case studies. Starting with these attacks, we conduct an in-depth analysis of the vulnerabilities underlying them and explore related defense mechanisms and formal security. Specifically, we classify vulnerabilities into external and internal categories, utilizing the protocol stack of an anonymity network to guide the categorization of internal vulnerabilities. Furthermore, we examine their root causes. In addition to these aspects, we emphasize the importance of formal security in researching the security of anonymity networks by integrating the investigated vulnerabilities, attacks, and defenses. Through this comprehensive, thorough, and unified approach, this paper aims to provide insights into the security of anonymity networks and offer general research findings. Finally, we discuss ongoing challenges and future directions in this specific area.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":34.4,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139947840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Tutorial on Extremely Large-Scale MIMO for 6G: Fundamentals, Signal Processing, and Applications 面向 6G 的超大规模 MIMO 教程:基础、信号处理和应用
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-02 DOI: 10.1109/COMST.2023.3349276
Zhe Wang;Jiayi Zhang;Hongyang Du;Dusit Niyato;Shuguang Cui;Bo Ai;Mérouane Debbah;Khaled B. Letaief;H. Vincent Poor
Extremely large-scale multiple-input-multiple-output (XL-MIMO), which offers vast spatial degrees of freedom, has emerged as a potentially pivotal enabling technology for the sixth generation (6G) of wireless mobile networks. With its growing significance, both opportunities and challenges are concurrently manifesting. This paper presents a comprehensive survey of research on XL-MIMO wireless systems. In particular, we introduce four XL-MIMO hardware architectures: uniform linear array (ULA)-based XL-MIMO, uniform planar array (UPA)-based XL-MIMO utilizing either patch antennas or point antennas, and continuous aperture (CAP)-based XL-MIMO. We comprehensively analyze and discuss their characteristics and interrelationships. Following this, we introduce several electromagnetic characteristics and general distance boundaries in XL-MIMO. Given the distinct electromagnetic properties of near-field communications, we present a range of channel models to demonstrate the benefits of XL-MIMO. We further discuss and summarize signal processing schemes for XL-MIMO. It is worth noting that the low-complexity signal processing schemes and deep learning empowered signal processing schemes are reviewed and highlighted to promote the practical implementation of XL-MIMO. Furthermore, we explore the interplay between XL-MIMO and other emergent 6G technologies. Finally, we outline several compelling research directions for future XL-MIMO wireless communication systems.
超大规模多输入多输出(XL-MIMO)可提供巨大的空间自由度,已成为第六代(6G)无线移动网络潜在的关键使能技术。随着其重要性的与日俱增,机遇与挑战并存。本文全面介绍了 XL-MIMO 无线系统的研究情况。我们特别介绍了四种 XL-MIMO 硬件架构:基于均匀线性阵列 (ULA) 的 XL-MIMO、基于均匀平面阵列 (UPA) 的 XL-MIMO (利用贴片天线或点阵天线)和基于连续孔径 (CAP) 的 XL-MIMO。我们全面分析和讨论了它们的特点和相互关系。随后,我们介绍了 XL-MIMO 的几种电磁特性和一般距离界限。鉴于近场通信的独特电磁特性,我们提出了一系列信道模型,以展示 XL-MIMO 的优势。我们进一步讨论并总结了 XL-MIMO 的信号处理方案。值得注意的是,我们回顾并强调了低复杂度信号处理方案和深度学习信号处理方案,以促进 XL-MIMO 的实际应用。此外,我们还探讨了 XL-MIMO 与其他新兴 6G 技术之间的相互作用。最后,我们概述了未来 XL-MIMO 无线通信系统的几个引人注目的研究方向。
{"title":"A Tutorial on Extremely Large-Scale MIMO for 6G: Fundamentals, Signal Processing, and Applications","authors":"Zhe Wang;Jiayi Zhang;Hongyang Du;Dusit Niyato;Shuguang Cui;Bo Ai;Mérouane Debbah;Khaled B. Letaief;H. Vincent Poor","doi":"10.1109/COMST.2023.3349276","DOIUrl":"10.1109/COMST.2023.3349276","url":null,"abstract":"Extremely large-scale multiple-input-multiple-output (XL-MIMO), which offers vast spatial degrees of freedom, has emerged as a potentially pivotal enabling technology for the sixth generation (6G) of wireless mobile networks. With its growing significance, both opportunities and challenges are concurrently manifesting. This paper presents a comprehensive survey of research on XL-MIMO wireless systems. In particular, we introduce four XL-MIMO hardware architectures: uniform linear array (ULA)-based XL-MIMO, uniform planar array (UPA)-based XL-MIMO utilizing either patch antennas or point antennas, and continuous aperture (CAP)-based XL-MIMO. We comprehensively analyze and discuss their characteristics and interrelationships. Following this, we introduce several electromagnetic characteristics and general distance boundaries in XL-MIMO. Given the distinct electromagnetic properties of near-field communications, we present a range of channel models to demonstrate the benefits of XL-MIMO. We further discuss and summarize signal processing schemes for XL-MIMO. It is worth noting that the low-complexity signal processing schemes and deep learning empowered signal processing schemes are reviewed and highlighted to promote the practical implementation of XL-MIMO. Furthermore, we explore the interplay between XL-MIMO and other emergent 6G technologies. Finally, we outline several compelling research directions for future XL-MIMO wireless communication systems.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":34.4,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139947839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive Tutorial on the Organization of a Standards-Aligned Network Slice/Subnet Design Process and Opportunities for Its Automation 关于标准统一网络片/子网设计流程的组织及其自动化机会的综合教程
IF 35.6 1区 计算机科学 Q1 Engineering Pub Date : 2023-12-28 DOI: 10.1109/COMST.2023.3341249
Przemysław Wyszkowski;Jan Kienig;Krzysztof Zieliński;Łukasz Czekierda;Mateusz Zawadzki
Building complex entities like Network Slices and their Subnets requires proper models and methods to allow their convenient design and deployment. Despite significant progress in the standardization of the basic Network Slicing concepts, for many it still remains unclear how to organize a Network Slice/Subnet design process that would be aligned to the currently standardized, declarative style of their provisioning. How to reflect the high-level, abstract service requirements into a technical description of a Network Slice/Subnet capable of fulfilling them? In what form should such a description be provided? What details should it cover and how to conduct a design process leading to the production of a concretized description of the desired Network Slice Instance (NSI) and/or Network Slice Subnet Instance (NSSI)? Unfortunately, the current standardization scope does not cover these challenging design-time aspects, leaving the telco community without clear guidelines in this complicated area. Also, the state-of-the-art research does not tackle the corresponding challenges in a generic and holistic way. We contribute to fill in this void by complementing the up-to-date standards with original concepts and systematizations compiled into a comprehensive tutorial on the Network Slicing design-time aspects. To this end, we deliver a broad study of the evolution of Network Slice/Subnet provisioning approaches and offering modes, explaining their impact on the design phase. Next, we provide a generic taxonomy of building blocks out of which an NSI/NSSI may be designed, followed by proposing precise definitions of the design process and its expected outcomes. Then, by elaborating on those definitions, we explain, in a technology-agnostic manner, the activities comprising the design process and the results it shall produce. Based on these fundamentals, we describe the opportunities for automating the design process, essential to support the declarative provisioning style and to offer the “dynamic slicing” capabilities by the Slicing orchestrators. All of the elaborated systematizations and concepts are vendor-agnostic and fully standards-aligned which makes them practically usable in a wide range of solutions.
构建复杂的实体(如网络切片及其子网)需要适当的模型和方法,以便于设计和部署。尽管在网络切片基本概念的标准化方面取得了重大进展,但对许多人来说,如何组织网络切片/子网的设计过程,使其与目前标准化的、声明式的网络切片/子网供应方式保持一致,仍然是一个未知数。如何将高层次的抽象服务要求反映到能够满足这些要求的网络片/子网的技术描述中?应以何种形式提供这种描述?它应涵盖哪些细节,以及如何开展设计流程,最终形成对所需网络片实例(NSI)和/或网络片子网实例(NSSI)的具体描述?遗憾的是,目前的标准化范围并未涵盖这些具有挑战性的设计时间方面,使得电信社区在这一复杂领域缺乏明确的指导方针。此外,最先进的研究也没有以通用和整体的方式应对相应的挑战。我们利用原创概念和系统化方法对最新标准进行了补充,并将其汇编成一本关于网络切片设计时方面的综合教程,从而填补了这一空白。为此,我们对网络分片/子网配置方法和提供模式的演变进行了广泛研究,并解释了它们对设计阶段的影响。接下来,我们提供了一个通用的构件分类法,NSI/NSSI 可以从这些构件中进行设计,然后提出了设计过程及其预期结果的精确定义。然后,通过对这些定义的阐述,我们以技术无关的方式解释了设计过程中的各项活动及其应产生的结果。基于这些基本原理,我们描述了设计流程自动化的机会,这对支持声明式供应风格和提供切片协调器的 "动态切片 "功能至关重要。所有阐述的系统化和概念都与供应商无关,并且完全与标准一致,因此可实际用于各种解决方案。
{"title":"Comprehensive Tutorial on the Organization of a Standards-Aligned Network Slice/Subnet Design Process and Opportunities for Its Automation","authors":"Przemysław Wyszkowski;Jan Kienig;Krzysztof Zieliński;Łukasz Czekierda;Mateusz Zawadzki","doi":"10.1109/COMST.2023.3341249","DOIUrl":"https://doi.org/10.1109/COMST.2023.3341249","url":null,"abstract":"Building complex entities like Network Slices and their Subnets requires proper models and methods to allow their convenient design and deployment. Despite significant progress in the standardization of the basic Network Slicing concepts, for many it still remains unclear how to organize a Network Slice/Subnet design process that would be aligned to the currently standardized, declarative style of their provisioning. How to reflect the high-level, abstract service requirements into a technical description of a Network Slice/Subnet capable of fulfilling them? In what form should such a description be provided? What details should it cover and how to conduct a design process leading to the production of a concretized description of the desired Network Slice Instance (NSI) and/or Network Slice Subnet Instance (NSSI)? Unfortunately, the current standardization scope does not cover these challenging design-time aspects, leaving the telco community without clear guidelines in this complicated area. Also, the state-of-the-art research does not tackle the corresponding challenges in a generic and holistic way. We contribute to fill in this void by complementing the up-to-date standards with original concepts and systematizations compiled into a comprehensive tutorial on the Network Slicing design-time aspects. To this end, we deliver a broad study of the evolution of Network Slice/Subnet provisioning approaches and offering modes, explaining their impact on the design phase. Next, we provide a generic taxonomy of building blocks out of which an NSI/NSSI may be designed, followed by proposing precise definitions of the design process and its expected outcomes. Then, by elaborating on those definitions, we explain, in a technology-agnostic manner, the activities comprising the design process and the results it shall produce. Based on these fundamentals, we describe the opportunities for automating the design process, essential to support the declarative provisioning style and to offer the “dynamic slicing” capabilities by the Slicing orchestrators. All of the elaborated systematizations and concepts are vendor-agnostic and fully standards-aligned which makes them practically usable in a wide range of solutions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10375939","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141084900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Metaverse Communications, Networking, Security, and Applications: Research Issues, State-of-the-Art, and Future Directions 元宇宙通信、网络、安全和应用:研究问题、最新技术和未来方向
IF 35.6 1区 计算机科学 Q1 Engineering Pub Date : 2023-12-25 DOI: 10.1109/COMST.2023.3347172
Mansoor Ali;Faisal Naeem;Georges Kaddoum;Ekram Hossain
Metaverse is an evolving orchestrator of the next-generation Internet architecture that produces an immersive and self-adapting virtual world in which humans perform activities similar to those in the real world, such as playing sports, doing work, and socializing. It is becoming a reality and is driven by ever-evolving advanced technologies such as extended reality, artificial intelligence, and blockchain. In this context, Metaverse will play an essential role in developing smart cities, which becomes more evident in the post-COVID-19-pandemic metropolitan setting. However, the new paradigm imposes new challenges, such as developing novel privacy and security threats that can emerge in the digital Metaverse ecosystem. Moreover, it requires the convergence of several media types with the capability to quickly process massive amounts of data to keep the residents safe and well-informed, which can raise issues related to scalability and interoperability. In light of this, this research study aims to review the literature on the state of the art of integrating the Metaverse architecture concepts in smart cities. First, this paper presents the theoretical architecture of Metaverse and discusses international companies’ interest in this emerging technology. It also examines the notion of Metaverse relevant to virtual reality, identifies the prevalent threats, and determines the importance of communication infrastructure in information gathering for efficient Metaverse operation. Next, the notion of blockchain technologies is discussed regarding privacy preservation and how it can provide tamper-proof content sharing among Metaverse users. Finally, the application of distributed Metaverse for social good is highlighted. Most importantly, the paper explores the reflections of this cutting-edge technology on the smart city, talks about the role and impact of the Metaverse in the production of urban policies, and eventually identifies the research gaps and the future research directions in this domain.
元宇宙(Metaverse)是下一代互联网架构中不断发展的协调器,它产生了一个身临其境、自适应的虚拟世界,人类在其中进行与现实世界类似的活动,如运动、工作和社交。扩展现实、人工智能和区块链等不断发展的先进技术正在推动它成为现实。在此背景下,Metaverse 将在发展智慧城市方面发挥至关重要的作用,这在后 COVID-19 时代的大都市环境中变得更加明显。然而,新范式也带来了新的挑战,例如在数字 Metaverse 生态系统中可能出现新的隐私和安全威胁。此外,它还要求融合多种媒体类型,并具备快速处理海量数据的能力,以确保居民的安全和知情权,这可能会引发与可扩展性和互操作性相关的问题。有鉴于此,本研究旨在回顾有关在智慧城市中整合 Metaverse 架构概念的文献。首先,本文介绍了 Metaverse 的理论架构,并讨论了国际公司对这一新兴技术的兴趣。本文还研究了与虚拟现实相关的 Metaverse 概念,指出了普遍存在的威胁,并确定了通信基础设施在信息收集方面的重要性,以实现 Metaverse 的高效运行。接下来,讨论了区块链技术在隐私保护方面的概念,以及如何在 Metaverse 用户之间提供防篡改的内容共享。最后,重点介绍了分布式 Metaverse 在社会公益方面的应用。最重要的是,本文探讨了这一尖端技术对智慧城市的影响,讨论了 Metaverse 在城市政策制定中的作用和影响,并最终确定了该领域的研究空白和未来研究方向。
{"title":"Metaverse Communications, Networking, Security, and Applications: Research Issues, State-of-the-Art, and Future Directions","authors":"Mansoor Ali;Faisal Naeem;Georges Kaddoum;Ekram Hossain","doi":"10.1109/COMST.2023.3347172","DOIUrl":"https://doi.org/10.1109/COMST.2023.3347172","url":null,"abstract":"Metaverse is an evolving orchestrator of the next-generation Internet architecture that produces an immersive and self-adapting virtual world in which humans perform activities similar to those in the real world, such as playing sports, doing work, and socializing. It is becoming a reality and is driven by ever-evolving advanced technologies such as extended reality, artificial intelligence, and blockchain. In this context, Metaverse will play an essential role in developing smart cities, which becomes more evident in the post-COVID-19-pandemic metropolitan setting. However, the new paradigm imposes new challenges, such as developing novel privacy and security threats that can emerge in the digital Metaverse ecosystem. Moreover, it requires the convergence of several media types with the capability to quickly process massive amounts of data to keep the residents safe and well-informed, which can raise issues related to scalability and interoperability. In light of this, this research study aims to review the literature on the state of the art of integrating the Metaverse architecture concepts in smart cities. First, this paper presents the theoretical architecture of Metaverse and discusses international companies’ interest in this emerging technology. It also examines the notion of Metaverse relevant to virtual reality, identifies the prevalent threats, and determines the importance of communication infrastructure in information gathering for efficient Metaverse operation. Next, the notion of blockchain technologies is discussed regarding privacy preservation and how it can provide tamper-proof content sharing among Metaverse users. Finally, the application of distributed Metaverse for social good is highlighted. Most importantly, the paper explores the reflections of this cutting-edge technology on the smart city, talks about the role and impact of the Metaverse in the production of urban policies, and eventually identifies the research gaps and the future research directions in this domain.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141084816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Tutorial on NYUSIM: Sub-Terahertz and Millimeter-Wave Channel Simulator for 5G, 6G, and Beyond 关于 NYUSIM 的教程:面向 5G、6G 及更高频率的次太赫兹和毫米波信道模拟器
IF 35.6 1区 计算机科学 Q1 Engineering Pub Date : 2023-12-21 DOI: 10.1109/COMST.2023.3344671
Hitesh Poddar;Shihao Ju;Dipankar Shakya;Theodore S. Rappaport
With the advancement of wireless communication to sub-terahertz (THz) and millimeter-wave (mmWave) bands, accurate channel models and simulation tools are becoming increasingly important for modeling a wide range of frequencies and scenarios. This paper provides a comprehensive tutorial on generating drop-based and spatial consistency-based channels using the open-source MATLAB-based NYU Channel Model Simulator (NYUSIM). NYUSIM is built on extensive real-world radio propagation measurements for the frequency range of 0.5–150 GHz, covering a variety of scenarios such as Urban Microcell (UMi), Urban Macrocell (UMa), Rural Macrocell (RMa), Indoor Hotspot (InH), and Indoor Factory (InF). Additionally, an overview of the evolution of simulators used to design and analyze wireless systems since the early days of cellular communication is also provided. We introduce the most popular types of simulators used in academia and industry, such as Channel Simulators (CSs), Link Level Simulators (LLSs), System Level Simulators (SLSs), and Network Simulators (NSs), to study wireless communication systems for 5G and beyond. Owing to the widespread adoption of the 3rd Generation Partnership Project (3GPP) Stochastic Channel Model (SCM) for channel generation in various simulators, we conduct a comparative analysis between the 3GPP SCM and NYUSIM channel model to highlight their differences. Moreover, NYUSIM’s versatility extends beyond its MATLAB implementation, as it can be implemented in various LLSs, SLSs, and NSs, enabling researchers to incorporate real-world measurement-based channels into their simulations. To illustrate this capability, we showcase NYUSIM’s implementation in ns-3, a widely used open-source discrete event network simulator. Additionally, we provide several applications of NYUSIM to highlight its potential uses.
随着无线通信向亚太赫兹(THz)和毫米波(mmWave)频段发展,精确的信道模型和仿真工具对于各种频率和场景的建模变得越来越重要。本文提供了使用基于开源 MATLAB 的纽约大学信道模型仿真器(NYUSIM)生成基于空投和空间一致性的信道的综合教程。NYUSIM 建立在 0.5-150 GHz 频率范围内大量实际无线电传播测量的基础上,涵盖城市微蜂窝 (UMi)、城市宏蜂窝 (UMa)、农村宏蜂窝 (RMa)、室内热点 (InH) 和室内工厂 (InF) 等多种场景。此外,我们还概述了自蜂窝通信早期以来用于设计和分析无线系统的模拟器的发展历程。我们介绍了学术界和工业界最常用的模拟器类型,如信道模拟器 (CS)、链路级模拟器 (LLS)、系统级模拟器 (SLS) 和网络模拟器 (NS),用于研究 5G 及以后的无线通信系统。由于各种模拟器广泛采用第三代合作伙伴计划(3GPP)随机信道模型(SCM)生成信道,我们对 3GPP SCM 和 NYUSIM 信道模型进行了比较分析,以突出它们之间的差异。此外,NYUSIM 的多功能性不仅限于其 MATLAB 实现,因为它可以在各种 LLS、SLS 和 NS 中实现,从而使研究人员能够将真实世界中基于测量的信道纳入其仿真中。为了说明这种能力,我们展示了 NYUSIM 在 ns-3 中的实现,ns-3 是一种广泛使用的开源离散事件网络模拟器。此外,我们还提供了 NYUSIM 的几个应用,以突出其潜在用途。
{"title":"A Tutorial on NYUSIM: Sub-Terahertz and Millimeter-Wave Channel Simulator for 5G, 6G, and Beyond","authors":"Hitesh Poddar;Shihao Ju;Dipankar Shakya;Theodore S. Rappaport","doi":"10.1109/COMST.2023.3344671","DOIUrl":"https://doi.org/10.1109/COMST.2023.3344671","url":null,"abstract":"With the advancement of wireless communication to sub-terahertz (THz) and millimeter-wave (mmWave) bands, accurate channel models and simulation tools are becoming increasingly important for modeling a wide range of frequencies and scenarios. This paper provides a comprehensive tutorial on generating drop-based and spatial consistency-based channels using the open-source MATLAB-based NYU Channel Model Simulator (NYUSIM). NYUSIM is built on extensive real-world radio propagation measurements for the frequency range of 0.5–150 GHz, covering a variety of scenarios such as Urban Microcell (UMi), Urban Macrocell (UMa), Rural Macrocell (RMa), Indoor Hotspot (InH), and Indoor Factory (InF). Additionally, an overview of the evolution of simulators used to design and analyze wireless systems since the early days of cellular communication is also provided. We introduce the most popular types of simulators used in academia and industry, such as Channel Simulators (CSs), Link Level Simulators (LLSs), System Level Simulators (SLSs), and Network Simulators (NSs), to study wireless communication systems for 5G and beyond. Owing to the widespread adoption of the 3rd Generation Partnership Project (3GPP) Stochastic Channel Model (SCM) for channel generation in various simulators, we conduct a comparative analysis between the 3GPP SCM and NYUSIM channel model to highlight their differences. Moreover, NYUSIM’s versatility extends beyond its MATLAB implementation, as it can be implemented in various LLSs, SLSs, and NSs, enabling researchers to incorporate real-world measurement-based channels into their simulations. To illustrate this capability, we showcase NYUSIM’s implementation in ns-3, a widely used open-source discrete event network simulator. Additionally, we provide several applications of NYUSIM to highlight its potential uses.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10367974","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141084809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advances in Machine Learning-Driven Cognitive Radio for Wireless Networks: A Survey 机器学习驱动的无线网络认知无线电技术的进展:概览
IF 35.6 1区 计算机科学 Q1 Engineering Pub Date : 2023-12-21 DOI: 10.1109/COMST.2023.3345796
Nada Abdel Khalek;Deemah H. Tashman;Walaa Hamouda
The next frontier in wireless connectivity lies at the intersection of cognitive radio (CR) technology and machine learning (ML), where intelligent networks can provide pervasive connectivity for an ever-expanding range of applications. In this regard, this survey provides an in-depth examination of the integration of ML-based CR in a wide range of emerging wireless networks, including the Internet of Things (IoT), mobile communications (vehicular and railway), and unmanned aerial vehicle (UAV) communications. By combining ML-based CR and emerging wireless networks, we can create intelligent, efficient, and ubiquitous wireless communication systems that satisfy spectrum-hungry applications and services of next-generation networks. For each type of wireless network, we highlight the key motivation for using intelligent CR and present a full review of the existing state-of-the-art ML approaches that address pressing challenges, including energy efficiency, interference, throughput, latency, and security. Our goal is to provide researchers and newcomers with a clear understanding of the motivation and methodology behind applying intelligent CR to emerging wireless networks. Moreover, problems and prospective research avenues are outlined, and a future roadmap is offered that explores possibilities for overcoming challenges through trending concepts.
无线连接的下一个前沿领域是认知无线电(CR)技术和机器学习(ML)技术的交汇点,智能网络可为不断扩大的应用提供无处不在的连接。在这方面,本调查报告深入探讨了基于 ML 的 CR 与各种新兴无线网络的整合,包括物联网 (IoT)、移动通信(车载和铁路)和无人机 (UAV) 通信。通过将基于 ML 的 CR 与新兴无线网络相结合,我们可以创建智能、高效和无处不在的无线通信系统,满足下一代网络对频谱的需求。对于每种类型的无线网络,我们都强调了使用智能 CR 的主要动机,并全面回顾了现有的最先进的 ML 方法,这些方法可解决能源效率、干扰、吞吐量、延迟和安全性等紧迫挑战。我们的目标是让研究人员和新手清楚地了解将智能 CR 应用于新兴无线网络背后的动机和方法。此外,我们还概述了存在的问题和前瞻性研究途径,并提供了未来路线图,探讨通过趋势概念克服挑战的可能性。
{"title":"Advances in Machine Learning-Driven Cognitive Radio for Wireless Networks: A Survey","authors":"Nada Abdel Khalek;Deemah H. Tashman;Walaa Hamouda","doi":"10.1109/COMST.2023.3345796","DOIUrl":"https://doi.org/10.1109/COMST.2023.3345796","url":null,"abstract":"The next frontier in wireless connectivity lies at the intersection of cognitive radio (CR) technology and machine learning (ML), where intelligent networks can provide pervasive connectivity for an ever-expanding range of applications. In this regard, this survey provides an in-depth examination of the integration of ML-based CR in a wide range of emerging wireless networks, including the Internet of Things (IoT), mobile communications (vehicular and railway), and unmanned aerial vehicle (UAV) communications. By combining ML-based CR and emerging wireless networks, we can create intelligent, efficient, and ubiquitous wireless communication systems that satisfy spectrum-hungry applications and services of next-generation networks. For each type of wireless network, we highlight the key motivation for using intelligent CR and present a full review of the existing state-of-the-art ML approaches that address pressing challenges, including energy efficiency, interference, throughput, latency, and security. Our goal is to provide researchers and newcomers with a clear understanding of the motivation and methodology behind applying intelligent CR to emerging wireless networks. Moreover, problems and prospective research avenues are outlined, and a future roadmap is offered that explores possibilities for overcoming challenges through trending concepts.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141084854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Communications Surveys and Tutorials
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1