首页 > 最新文献

IEEE Communications Surveys and Tutorials最新文献

英文 中文
A Survey of Blockchain and Artificial Intelligence for 6G Wireless Communications 区块链与人工智能在6G无线通信中的应用研究
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-14 DOI: 10.1109/COMST.2023.3315374
Yiping Zuo;Jiajia Guo;Ning Gao;Yongxu Zhu;Shi Jin;Xiao Li
The research on the sixth-generation (6G) wireless communications for the development of future mobile communication networks has been officially launched around the world. 6G networks face multifarious challenges, such as resource-constrained mobile devices, difficult wireless resource management, high complexity of heterogeneous network architectures, explosive computing and storage requirements, privacy and security threats. To address these challenges, deploying blockchain and artificial intelligence (AI) in 6G networks may realize new breakthroughs in advancing network performances in terms of security, privacy, efficiency, cost, and more. In this paper, we provide a detailed survey of existing works on the application of blockchain and AI to 6G wireless communications. More specifically, we start with a brief overview of blockchain and AI. Then, we mainly review the recent advances in the fusion of blockchain and AI, and highlight the inevitable trend of deploying both blockchain and AI in wireless communications. Furthermore, we extensively explore integrating blockchain and AI for wireless communication systems, involving secure services and Internet of Things (IoT) smart applications. Particularly, some of the most talked-about key services based on blockchain and AI are introduced, such as spectrum management, computation allocation, content caching, and security and privacy. Moreover, we also focus on some important IoT smart applications supported by blockchain and AI, covering smart healthcare, smart transportation, smart grid, and unmanned aerial vehicles (UAVs). Moreover, we thoroughly discuss operating frequencies, visions, and requirements from the 6G perspective. We also analyze the open issues and research challenges for the joint deployment of blockchain and AI in 6G wireless communications. Lastly, based on lots of existing meaningful works, this paper aims to provide a comprehensive survey of blockchain and AI in 6G networks. We hope this survey can shed new light on the research of this newly emerging area and serve as a roadmap for future studies.
面向未来移动通信网络发展的第六代(6G)无线通信研究已在全球范围内正式启动。6G网络面临着移动设备资源受限、无线资源管理困难、异构网络架构高度复杂、计算和存储需求爆炸式增长、隐私和安全威胁等诸多挑战。为了应对这些挑战,在6G网络中部署区块链和人工智能(AI)可能会在提高网络性能方面实现新的突破,包括安全性、隐私性、效率、成本等。在本文中,我们对区块链和人工智能应用于6G无线通信的现有工作进行了详细的调查。更具体地说,我们从区块链和人工智能的简要概述开始。然后,我们主要回顾了区块链和人工智能融合的最新进展,并强调了区块链和人工智能在无线通信中同时部署的必然趋势。此外,我们广泛探索将区块链和人工智能集成到无线通信系统中,涉及安全服务和物联网(IoT)智能应用。特别介绍了一些最受关注的基于区块链和人工智能的关键服务,如频谱管理、计算分配、内容缓存、安全和隐私。此外,我们还关注了区块链和人工智能支持的一些重要物联网智能应用,包括智能医疗、智能交通、智能电网、无人机等。此外,我们还从6G的角度深入讨论了运行频率、愿景和需求。我们还分析了区块链和人工智能在6G无线通信中联合部署的开放性问题和研究挑战。最后,基于大量已有的有意义的工作,本文旨在对6G网络中的区块链和人工智能进行全面的调查。我们希望这项调查能够为这一新兴领域的研究提供新的思路,并为未来的研究提供路线图。
{"title":"A Survey of Blockchain and Artificial Intelligence for 6G Wireless Communications","authors":"Yiping Zuo;Jiajia Guo;Ning Gao;Yongxu Zhu;Shi Jin;Xiao Li","doi":"10.1109/COMST.2023.3315374","DOIUrl":"10.1109/COMST.2023.3315374","url":null,"abstract":"The research on the sixth-generation (6G) wireless communications for the development of future mobile communication networks has been officially launched around the world. 6G networks face multifarious challenges, such as resource-constrained mobile devices, difficult wireless resource management, high complexity of heterogeneous network architectures, explosive computing and storage requirements, privacy and security threats. To address these challenges, deploying blockchain and artificial intelligence (AI) in 6G networks may realize new breakthroughs in advancing network performances in terms of security, privacy, efficiency, cost, and more. In this paper, we provide a detailed survey of existing works on the application of blockchain and AI to 6G wireless communications. More specifically, we start with a brief overview of blockchain and AI. Then, we mainly review the recent advances in the fusion of blockchain and AI, and highlight the inevitable trend of deploying both blockchain and AI in wireless communications. Furthermore, we extensively explore integrating blockchain and AI for wireless communication systems, involving secure services and Internet of Things (IoT) smart applications. Particularly, some of the most talked-about key services based on blockchain and AI are introduced, such as spectrum management, computation allocation, content caching, and security and privacy. Moreover, we also focus on some important IoT smart applications supported by blockchain and AI, covering smart healthcare, smart transportation, smart grid, and unmanned aerial vehicles (UAVs). Moreover, we thoroughly discuss operating frequencies, visions, and requirements from the 6G perspective. We also analyze the open issues and research challenges for the joint deployment of blockchain and AI in 6G wireless communications. Lastly, based on lots of existing meaningful works, this paper aims to provide a comprehensive survey of blockchain and AI in 6G networks. We hope this survey can shed new light on the research of this newly emerging area and serve as a roadmap for future studies.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2494-2528"},"PeriodicalIF":35.6,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135784561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine Learning-Aided Operations and Communications of Unmanned Aerial Vehicles: A Contemporary Survey 无人驾驶飞行器的机器学习辅助操作和通信:当代调查
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-11 DOI: 10.1109/COMST.2023.3312221
Harrison Kurunathan;Hailong Huang;Kai Li;Wei Ni;Ekram Hossain
Over the past decade, Unmanned Aerial Vehicles (UAVs) have provided pervasive, efficient, and cost-effective solutions for data collection and communications. Their excellent mobility, flexibility, and fast deployment enable UAVs to be extensively utilized in agriculture, medical, rescue missions, smart cities, and intelligent transportation systems. Machine learning (ML) has been increasingly demonstrating its capability of improving the automation and operation precision of UAVs and many UAV-assisted applications, such as communications, sensing, and data collection. The ongoing amalgamation of UAV and ML techniques is creating a significant synergy and empowering UAVs with unprecedented intelligence and autonomy. This survey aims to provide a timely and comprehensive overview of ML techniques used in UAV operations and communications and identify the potential growth areas and research gaps. We emphasize the four key components of UAV operations and communications to which ML can significantly contribute, namely, perception and feature extraction, feature interpretation and regeneration, trajectory and mission planning, and aerodynamic control and operation. We classify the latest popular ML tools based on their applications to the four components and conduct gap analyses. This survey also takes a step forward by pointing out significant challenges in the upcoming realm of ML-aided automated UAV operations and communications. It is revealed that different ML techniques dominate the applications to the four key modules of UAV operations and communications. While there is an increasing trend of cross-module designs, little effort has been devoted to an end-to-end ML framework, from perception and feature extraction to aerodynamic control and operation. It is also unveiled that the reliability and trust of ML in UAV operations and applications require significant attention before full automation of UAVs and potential cooperation between UAVs and humans come to fruition.
过去十年来,无人飞行器(UAV)为数据收集和通信提供了普遍、高效和经济的解决方案。无人机具有出色的机动性、灵活性和快速部署能力,因此被广泛应用于农业、医疗、救援任务、智能城市和智能交通系统。机器学习(ML)在提高无人机的自动化程度和操作精度以及许多无人机辅助应用(如通信、传感和数据收集)方面的能力已日益显现。无人机和人工智能技术的不断融合正在产生巨大的协同效应,并赋予无人机前所未有的智能和自主性。本调查旨在及时、全面地概述无人机操作和通信中使用的 ML 技术,并确定潜在的增长领域和研究缺口。我们强调了人工智能可为无人机操作和通信做出重大贡献的四个关键组成部分,即感知和特征提取、特征解读和再生、轨迹和任务规划以及空气动力控制和操作。我们根据最新流行的人工智能工具在这四个方面的应用对其进行了分类,并进行了差距分析。这项调查还向前迈出了一步,指出了即将到来的人工智能辅助无人机自动操作和通信领域的重大挑战。调查显示,不同的 ML 技术在无人机操作和通信的四个关键模块的应用中占据主导地位。虽然跨模块设计的趋势日益明显,但从感知和特征提取到气动控制和操作,端到端的 ML 框架却鲜有问世。研究还表明,在实现无人机的全面自动化以及无人机与人类之间的潜在合作之前,需要高度重视人工智能在无人机操作和应用中的可靠性和可信度。
{"title":"Machine Learning-Aided Operations and Communications of Unmanned Aerial Vehicles: A Contemporary Survey","authors":"Harrison Kurunathan;Hailong Huang;Kai Li;Wei Ni;Ekram Hossain","doi":"10.1109/COMST.2023.3312221","DOIUrl":"10.1109/COMST.2023.3312221","url":null,"abstract":"Over the past decade, Unmanned Aerial Vehicles (UAVs) have provided pervasive, efficient, and cost-effective solutions for data collection and communications. Their excellent mobility, flexibility, and fast deployment enable UAVs to be extensively utilized in agriculture, medical, rescue missions, smart cities, and intelligent transportation systems. Machine learning (ML) has been increasingly demonstrating its capability of improving the automation and operation precision of UAVs and many UAV-assisted applications, such as communications, sensing, and data collection. The ongoing amalgamation of UAV and ML techniques is creating a significant synergy and empowering UAVs with unprecedented intelligence and autonomy. This survey aims to provide a timely and comprehensive overview of ML techniques used in UAV operations and communications and identify the potential growth areas and research gaps. We emphasize the four key components of UAV operations and communications to which ML can significantly contribute, namely, perception and feature extraction, feature interpretation and regeneration, trajectory and mission planning, and aerodynamic control and operation. We classify the latest popular ML tools based on their applications to the four components and conduct gap analyses. This survey also takes a step forward by pointing out significant challenges in the upcoming realm of ML-aided automated UAV operations and communications. It is revealed that different ML techniques dominate the applications to the four key modules of UAV operations and communications. While there is an increasing trend of cross-module designs, little effort has been devoted to an end-to-end ML framework, from perception and feature extraction to aerodynamic control and operation. It is also unveiled that the reliability and trust of ML in UAV operations and applications require significant attention before full automation of UAVs and potential cooperation between UAVs and humans come to fruition.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 1","pages":"496-533"},"PeriodicalIF":35.6,"publicationDate":"2023-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135784733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions 网络切片安全调查:攻击、挑战、解决方案和研究方向
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-06 DOI: 10.1109/COMST.2023.3312349
Chamitha De Alwis;Pawani Porambage;Kapal Dev;Thippa Reddy Gadekallu;Madhusanka Liyanage
The dawn of softwarized networks enables Network Slicing (NS) as an important technology towards allocating end-to-end logical networks to facilitate diverse requirements of emerging applications in fifth-generation (5G) mobile networks. However, the emergence of NS also exposes novel security and privacy challenges, primarily related to aspects such as NS life-cycle security, inter-slice security, intra-slice security, slice broker security, zero-touch network and management security, and blockchain security. Hence, enhancing NS security, privacy, and trust has become a key research area toward realizing the true capabilities of 5G. This paper presents a comprehensive and up-to-date survey on NS security. The paper articulates a taxonomy for NS security and privacy, laying the structure for the survey. Accordingly, the paper presents key attack scenarios specific to NS-enabled networks. Furthermore, the paper explores NS security threats, challenges, and issues while elaborating on NS security solutions available in the literature. In addition, NS trust and privacy aspects, along with possible solutions, are explained. The paper also highlights future research directions in NS security and privacy. It is envisaged that this survey will concentrate on existing research work, highlight research gaps and shed light on future research, development, and standardization work to realize secure NS in 5G and beyond mobile communication networks.
软化网络的到来使网络切片(NS)成为一项重要技术,可用于分配端到端逻辑网络,以满足第五代(5G)移动网络中新兴应用的各种需求。然而,网络切片的出现也带来了新的安全和隐私挑战,主要涉及网络切片生命周期安全、切片间安全、切片内安全、切片代理安全、零接触网络和管理安全以及区块链安全等方面。因此,增强 NS 的安全性、隐私性和信任度已成为实现 5G 真正功能的关键研究领域。本文对 NS 安全性进行了全面的最新研究。本文阐述了 NS 安全和隐私的分类法,为调查奠定了基础。因此,本文介绍了针对支持 NS 的网络的主要攻击场景。此外,本文还探讨了 NS 安全威胁、挑战和问题,同时阐述了文献中可用的 NS 安全解决方案。此外,还解释了 NS 信任和隐私方面的问题以及可能的解决方案。本文还强调了未来在 NS 安全和隐私方面的研究方向。预计本调查将集中于现有的研究工作,突出研究差距,并阐明未来的研究、开发和标准化工作,以实现 5G 及更先进的移动通信网络中的安全 NS。
{"title":"A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions","authors":"Chamitha De Alwis;Pawani Porambage;Kapal Dev;Thippa Reddy Gadekallu;Madhusanka Liyanage","doi":"10.1109/COMST.2023.3312349","DOIUrl":"10.1109/COMST.2023.3312349","url":null,"abstract":"The dawn of softwarized networks enables Network Slicing (NS) as an important technology towards allocating end-to-end logical networks to facilitate diverse requirements of emerging applications in fifth-generation (5G) mobile networks. However, the emergence of NS also exposes novel security and privacy challenges, primarily related to aspects such as NS life-cycle security, inter-slice security, intra-slice security, slice broker security, zero-touch network and management security, and blockchain security. Hence, enhancing NS security, privacy, and trust has become a key research area toward realizing the true capabilities of 5G. This paper presents a comprehensive and up-to-date survey on NS security. The paper articulates a taxonomy for NS security and privacy, laying the structure for the survey. Accordingly, the paper presents key attack scenarios specific to NS-enabled networks. Furthermore, the paper explores NS security threats, challenges, and issues while elaborating on NS security solutions available in the literature. In addition, NS trust and privacy aspects, along with possible solutions, are explained. The paper also highlights future research directions in NS security and privacy. It is envisaged that this survey will concentrate on existing research work, highlight research gaps and shed light on future research, development, and standardization work to realize secure NS in 5G and beyond mobile communication networks.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 1","pages":"534-570"},"PeriodicalIF":35.6,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10242032","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134157308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Networking Architecture and Key Supporting Technologies for Human Digital Twin in Personalized Healthcare: A Comprehensive Survey 个性化医疗中的人类数字双胞胎的网络架构和关键支持技术:全面调查
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-04 DOI: 10.1109/COMST.2023.3308717
Jiayuan Chen;Changyan Yi;Samuel D. Okegbile;Jun Cai;Xuemin Shen
Digital twin (DT), referring to a promising technique to digitally and accurately represent actual physical entities, has attracted explosive interests from both academia and industry. One typical advantage of DT is that it can be used to not only virtually replicate a system’s detailed operations but also analyze the current condition, predict the future behavior, and refine the control optimization. Although DT has been widely implemented in various fields, such as smart manufacturing and transportation, its conventional paradigm is limited to embody non-living entities, e.g., robots and vehicles. When adopted in human-centric systems, a novel concept, called human digital twin (HDT) has thus been proposed. Particularly, HDT allows in silico representation of individual human body with the ability to dynamically reflect molecular status, physiological status, emotional and psychological status, as well as lifestyle evolutions. These prompt the expected application of HDT in personalized healthcare (PH), which can facilitate the remote monitoring, diagnosis, prescription, surgery and rehabilitation, and hence significantly alleviate the heavy burden on the traditional healthcare system. However, despite the large potential, HDT faces substantial research challenges in different aspects, and becomes an increasingly popular topic recently. In this survey, with a specific focus on the networking architecture and key technologies for HDT in PH applications, we first discuss the differences between HDT and the conventional DTs, followed by the universal framework and essential functions of HDT. We then analyze its design requirements and challenges in PH applications. After that, we provide an overview of the networking architecture of HDT, including data acquisition layer, data communication layer, computation layer, data management layer and data analysis and decision making layer. Besides reviewing the key technologies for implementing such networking architecture in detail, we conclude this survey by presenting future research directions of HDT.
数字孪生(DT)指的是以数字方式准确呈现实际物理实体的一种前景广阔的技术,已引起学术界和工业界的极大兴趣。数字孪生的一个典型优势是,它不仅可以用来虚拟复制系统的详细操作,还可以分析当前状况、预测未来行为并完善控制优化。虽然 DT 已在智能制造和交通等多个领域得到广泛应用,但其传统范例仅限于体现非生命实体,如机器人和车辆。因此,在以人为中心的系统中采用数字孪生时,人们提出了一个新概念,即人类数字孪生(HDT)。特别是,HDT 可以对人体个体进行硅表示,能够动态反映分子状态、生理状态、情绪和心理状态以及生活方式的演变。这些都促使人们期待 HDT 在个性化医疗保健(PH)中的应用,它可以促进远程监测、诊断、处方、手术和康复,从而大大减轻传统医疗保健系统的沉重负担。然而,尽管潜力巨大,HDT 在不同方面都面临着巨大的研究挑战,近年来已成为一个日益热门的话题。在本研究中,我们首先讨论了 HDT 与传统 DT 的区别,然后介绍了 HDT 的通用框架和基本功能。然后,我们分析 HDT 在 PH 应用中的设计要求和挑战。随后,我们概述了 HDT 的网络架构,包括数据采集层、数据通信层、计算层、数据管理层和数据分析与决策层。除了详细回顾实现此类网络架构的关键技术外,我们还介绍了 HDT 的未来研究方向,以此作为本调查报告的结尾。
{"title":"Networking Architecture and Key Supporting Technologies for Human Digital Twin in Personalized Healthcare: A Comprehensive Survey","authors":"Jiayuan Chen;Changyan Yi;Samuel D. Okegbile;Jun Cai;Xuemin Shen","doi":"10.1109/COMST.2023.3308717","DOIUrl":"10.1109/COMST.2023.3308717","url":null,"abstract":"Digital twin (DT), referring to a promising technique to digitally and accurately represent actual physical entities, has attracted explosive interests from both academia and industry. One typical advantage of DT is that it can be used to not only virtually replicate a system’s detailed operations but also analyze the current condition, predict the future behavior, and refine the control optimization. Although DT has been widely implemented in various fields, such as smart manufacturing and transportation, its conventional paradigm is limited to embody non-living entities, e.g., robots and vehicles. When adopted in human-centric systems, a novel concept, called human digital twin (HDT) has thus been proposed. Particularly, HDT allows in silico representation of individual human body with the ability to dynamically reflect molecular status, physiological status, emotional and psychological status, as well as lifestyle evolutions. These prompt the expected application of HDT in personalized healthcare (PH), which can facilitate the remote monitoring, diagnosis, prescription, surgery and rehabilitation, and hence significantly alleviate the heavy burden on the traditional healthcare system. However, despite the large potential, HDT faces substantial research challenges in different aspects, and becomes an increasingly popular topic recently. In this survey, with a specific focus on the networking architecture and key technologies for HDT in PH applications, we first discuss the differences between HDT and the conventional DTs, followed by the universal framework and essential functions of HDT. We then analyze its design requirements and challenges in PH applications. After that, we provide an overview of the networking architecture of HDT, including data acquisition layer, data communication layer, computation layer, data management layer and data analysis and decision making layer. Besides reviewing the key technologies for implementing such networking architecture in detail, we conclude this survey by presenting future research directions of HDT.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 1","pages":"706-746"},"PeriodicalIF":35.6,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131573664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Detection in the Automotive Domain: A Comprehensive Review 汽车领域的入侵检测:综述
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-29 DOI: 10.1109/COMST.2023.3309864
Brooke Lampe;Weizhi Meng
The automotive domain has realized amazing advancements in communication, connectivity, and automation—and at a breakneck pace. Such advancements come with ample benefits, such as the reduction of traffic accidents and the refinement of transit efficiency. However, these new developments were not necessarily made with security in mind. Researchers have unearthed a number of security vulnerabilities in paradigms such as in-vehicle networks (IVNs), the Internet of Vehicles (IoV), and intelligent transportation systems (ITSs). As automotive technologies continue to evolve, it would be realistic to expect new vulnerabilities to arise—both vulnerabilities that are identified and vulnerabilities that are not. If—or more pragmatically, when—these vulnerabilities are exploited, intrusion detection will be paramount. Therefore, we find it prudent to review intrusion detection in the automotive domain. We explore a myriad of threats and intrusion detection techniques—from the boundaries of the vehicle’s own network to the wider Internet of Vehicles (IoV). Intrusion detection, while not a panacea, can be a cost-effective solution to many automotive security issues. Generally, such intrusion detection systems (IDSs) do not disrupt existing hardware, infrastructure, or communications; rather, they merely tap into the network and monitor for suspicious traffic. Given the very reasonable price tag, the implementation of intrusion detection systems would be an auspicious step by the automotive industry to assure the security—and safety—of the modern automobile. This paper volunteers a comprehensive review of intrusion detection technologies in the automotive domain.
汽车领域在通信、连接和自动化方面取得了惊人的进步,而且速度惊人。这些进步带来了很多好处,比如交通事故的减少和交通效率的提高。然而,这些新的发展并不一定是考虑到安全。研究人员在车载网络(IVNs)、车联网(IoV)和智能交通系统(ITSs)等范例中发现了许多安全漏洞。随着汽车技术的不断发展,预计新的漏洞将会出现——包括已识别的漏洞和未识别的漏洞。如果——或者更实际地说,当——这些漏洞被利用时,入侵检测将是至关重要的。因此,我们认为回顾汽车领域的入侵检测是明智的。我们探索了无数的威胁和入侵检测技术——从车辆自身网络的边界到更广泛的车联网(IoV)。入侵检测虽然不是万灵药,但对于许多汽车安全问题来说,它是一种经济有效的解决方案。一般来说,这种入侵检测系统(ids)不会破坏现有的硬件、基础设施或通信;相反,他们只是进入网络并监控可疑的流量。考虑到非常合理的价格标签,入侵检测系统的实施将是汽车行业确保现代汽车安全的一个吉祥的步骤。本文对汽车领域的入侵检测技术进行了综述。
{"title":"Intrusion Detection in the Automotive Domain: A Comprehensive Review","authors":"Brooke Lampe;Weizhi Meng","doi":"10.1109/COMST.2023.3309864","DOIUrl":"10.1109/COMST.2023.3309864","url":null,"abstract":"The automotive domain has realized amazing advancements in communication, connectivity, and automation—and at a breakneck pace. Such advancements come with ample benefits, such as the reduction of traffic accidents and the refinement of transit efficiency. However, these new developments were not necessarily made with security in mind. Researchers have unearthed a number of security vulnerabilities in paradigms such as in-vehicle networks (IVNs), the Internet of Vehicles (IoV), and intelligent transportation systems (ITSs). As automotive technologies continue to evolve, it would be realistic to expect new vulnerabilities to arise—both vulnerabilities that are identified and vulnerabilities that are not. If—or more pragmatically, when—these vulnerabilities are exploited, intrusion detection will be paramount. Therefore, we find it prudent to review intrusion detection in the automotive domain. We explore a myriad of threats and intrusion detection techniques—from the boundaries of the vehicle’s own network to the wider Internet of Vehicles (IoV). Intrusion detection, while not a panacea, can be a cost-effective solution to many automotive security issues. Generally, such intrusion detection systems (IDSs) do not disrupt existing hardware, infrastructure, or communications; rather, they merely tap into the network and monitor for suspicious traffic. Given the very reasonable price tag, the implementation of intrusion detection systems would be an auspicious step by the automotive industry to assure the security—and safety—of the modern automobile. This paper volunteers a comprehensive review of intrusion detection technologies in the automotive domain.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2356-2426"},"PeriodicalIF":35.6,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10233928","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130422541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Cryptography in 5G Networks: A Comprehensive Overview 5G 网络中的量子密码学:全面概述
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-28 DOI: 10.1109/COMST.2023.3309051
Miralem Mehic;Libor Michalek;Emir Dervisevic;Patrik Burdiak;Matej Plakalovic;Jan Rozhon;Nerman Mahovac;Filip Richter;Enio Kaljic;Filip Lauterbach;Pamela Njemcevic;Almir Maric;Mirza Hamza;Peppino Fazio;Miroslav Voznak
Every attempt to access to the Internet through a Web browser, email sent, VPN connection, VoIP call, instant message or other use of telecommunications systems involves cryptographic techniques. The most commonly applied technique is asymmetric cryptography, which is generally executed in the background without the user even being aware. It establishes a cryptographic code based on the computational complexity of mathematical problems. However, this type of cryptography, which is widely used in today’s telecommunications systems, is under threat as electronics and computing rapidly develop. The development of fifth-generation cellular networks (5G) is gaining momentum, and given its wide field of application, security requires special attention. This is especially true faced with the development of quantum computers. One solution to this security challenge is to use more advanced techniques to establish cryptographic keys that are not susceptible to attack. An essential part of quantum cryptography, Quantum Key Distribution (QKD) uses the principles of quantum physics to establish and distribute symmetric cryptographic keys between two geographically distant users. QKD establishes information-theoretically secure cryptographic keys that are resistant to eavesdropping when they are created. In this paper, we survey the security challenges and approaches in 5G networks concerning network protocols, interfaces and management organizations. We begin by examining the fundamentals of QKD and discuss the creation of QKD networks and their applications. We then outline QKD network architecture and its components and standards, following with a summary of QKD and post-quantum key distribution techniques and approaches for its integration into existing security frameworks such as VPNs (IPsec and MACsec). We also discuss the requirements, architecture and methods for implementing the FPGA-based encryptors needed to execute cryptographic algorithms with security keys. We discuss the performance and technologies of post-quantum cryptography, and finally, examine reported 5G demonstrations which have used quantum technologies, highlighting future research directions.
通过网络浏览器、发送电子邮件、VPN 连接、网络电话、即时信息或其他电信系统访问互联网的每一次尝试都涉及加密技术。最常用的技术是非对称加密技术,它通常在后台执行,用户根本不会察觉。它根据数学问题的计算复杂性建立加密代码。然而,随着电子技术和计算技术的飞速发展,这种广泛应用于当今电信系统的加密技术正受到威胁。第五代蜂窝网络(5G)的发展势头迅猛,鉴于其广泛的应用领域,安全性需要特别关注。面对量子计算机的发展,情况更是如此。应对这一安全挑战的一个解决方案是使用更先进的技术来建立不易受到攻击的加密密钥。量子密钥分发(QKD)是量子密码学的重要组成部分,它利用量子物理学原理在两个地理位置遥远的用户之间建立和分发对称密码密钥。QKD 可建立信息理论上安全的加密密钥,这些密钥在创建时不会被窃听。在本文中,我们将探讨 5G 网络中有关网络协议、接口和管理组织的安全挑战和方法。我们首先研究了 QKD 的基本原理,并讨论了 QKD 网络的创建及其应用。然后,我们概述了 QKD 网络架构及其组件和标准,接着总结了 QKD 和后量子密钥分发技术以及将其集成到 VPN(IPsec 和 MACsec)等现有安全框架中的方法。我们还讨论了执行带有安全密钥的加密算法所需的基于 FPGA 的加密器的要求、架构和实施方法。我们讨论了后量子加密技术的性能和技术,最后研究了已报道的使用量子技术的 5G 演示,强调了未来的研究方向。
{"title":"Quantum Cryptography in 5G Networks: A Comprehensive Overview","authors":"Miralem Mehic;Libor Michalek;Emir Dervisevic;Patrik Burdiak;Matej Plakalovic;Jan Rozhon;Nerman Mahovac;Filip Richter;Enio Kaljic;Filip Lauterbach;Pamela Njemcevic;Almir Maric;Mirza Hamza;Peppino Fazio;Miroslav Voznak","doi":"10.1109/COMST.2023.3309051","DOIUrl":"10.1109/COMST.2023.3309051","url":null,"abstract":"Every attempt to access to the Internet through a Web browser, email sent, VPN connection, VoIP call, instant message or other use of telecommunications systems involves cryptographic techniques. The most commonly applied technique is asymmetric cryptography, which is generally executed in the background without the user even being aware. It establishes a cryptographic code based on the computational complexity of mathematical problems. However, this type of cryptography, which is widely used in today’s telecommunications systems, is under threat as electronics and computing rapidly develop. The development of fifth-generation cellular networks (5G) is gaining momentum, and given its wide field of application, security requires special attention. This is especially true faced with the development of quantum computers. One solution to this security challenge is to use more advanced techniques to establish cryptographic keys that are not susceptible to attack. An essential part of quantum cryptography, Quantum Key Distribution (QKD) uses the principles of quantum physics to establish and distribute symmetric cryptographic keys between two geographically distant users. QKD establishes information-theoretically secure cryptographic keys that are resistant to eavesdropping when they are created. In this paper, we survey the security challenges and approaches in 5G networks concerning network protocols, interfaces and management organizations. We begin by examining the fundamentals of QKD and discuss the creation of QKD networks and their applications. We then outline QKD network architecture and its components and standards, following with a summary of QKD and post-quantum key distribution techniques and approaches for its integration into existing security frameworks such as VPNs (IPsec and MACsec). We also discuss the requirements, architecture and methods for implementing the FPGA-based encryptors needed to execute cryptographic algorithms with security keys. We discuss the performance and technologies of post-quantum cryptography, and finally, examine reported 5G demonstrations which have used quantum technologies, highlighting future research directions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 1","pages":"302-346"},"PeriodicalIF":35.6,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134259257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Holographic MIMO Communications: Theoretical Foundations, Enabling Technologies, and Future Directions 全息多输入多输出通信:理论基础、应用技术和未来方向
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-28 DOI: 10.1109/COMST.2023.3309529
Tierui Gong;Panagiotis Gavriilidis;Ran Ji;Chongwen Huang;George C. Alexandropoulos;Li Wei;Zhaoyang Zhang;Mérouane Debbah;H. Vincent Poor;Chau Yuen
Future wireless systems are envisioned to create an endogenously holography-capable, intelligent, and programmable radio propagation environment, that will offer unprecedented capabilities for high spectral and energy efficiency, low latency, and massive connectivity. A potential and promising technology for supporting the expected extreme requirements of the sixth-generation (6G) communication systems is the concept of the holographic multiple-input multiple-output (HMIMO), which will actualize holographic radios with reasonable power consumption and fabrication cost. The HMIMO is facilitated by ultra-thin, extremely large, and nearly continuous surfaces that incorporate reconfigurable and sub-wavelength-spaced antennas and/or metamaterials. Such surfaces comprising dense electromagnetic (EM) excited elements are capable of recording and manipulating impinging fields with utmost flexibility and precision, as well as with reduced cost and power consumption, thereby shaping arbitrary-intended EM waves with high energy efficiency. The powerful EM processing capability of HMIMO opens up the possibility of wireless communications of holographic imaging level, paving the way for signal processing techniques realized in the EM-domain, possibly in conjunction with their digital-domain counterparts. However, in spite of the significant potential, the studies on HMIMO communications are still at an initial stage, its fundamental limits remain to be unveiled, and a certain number of critical technical challenges need to be addressed. In this survey, we present a comprehensive overview of the latest advances in the HMIMO communications paradigm, with a special focus on their physical aspects, their theoretical foundations, as well as the enabling technologies for HMIMO systems. We also compare the HMIMO with existing multi-antenna technologies, especially the massive MIMO, present various promising synergies of HMIMO with current and future candidate technologies, and provide an extensive list of research challenges and open directions for future HMIMO-empowered wireless applications.
根据设想,未来的无线系统将创建一个内生全息、智能和可编程的无线电传播环境,为高频谱和高能效、低延迟和大规模连接提供前所未有的能力。全息多输入多输出(HMIMO)概念是支持第六代(6G)通信系统预期极端要求的一项潜在且有前途的技术,它将以合理的功耗和制造成本实现全息无线电。超薄、超大和近乎连续的表面,结合了可重新配置的亚波长间距天线和/或超材料,为 HMIMO 提供了便利。这种由密集电磁(EM)激发元件组成的表面能够以最大的灵活性和精确度记录和操纵冲击场,并降低成本和功耗,从而以较高的能效塑造任意意图的电磁波。HMIMO 强大的电磁处理能力为全息成像级无线通信提供了可能,为在电磁域实现信号处理技术铺平了道路,并可能与数字域的对应技术相结合。然而,尽管潜力巨大,有关 HMIMO 通信的研究仍处于起步阶段,其基本限制仍有待揭示,还有一些关键技术挑战亟待解决。在本调查报告中,我们全面概述了 HMIMO 通信范例的最新进展,特别关注其物理方面、理论基础以及 HMIMO 系统的使能技术。我们还将 HMIMO 与现有的多天线技术(尤其是大规模 MIMO)进行了比较,介绍了 HMIMO 与当前和未来候选技术的各种有前景的协同作用,并为未来的 HMIMO 无线应用提供了一份广泛的研究挑战和开放方向清单。
{"title":"Holographic MIMO Communications: Theoretical Foundations, Enabling Technologies, and Future Directions","authors":"Tierui Gong;Panagiotis Gavriilidis;Ran Ji;Chongwen Huang;George C. Alexandropoulos;Li Wei;Zhaoyang Zhang;Mérouane Debbah;H. Vincent Poor;Chau Yuen","doi":"10.1109/COMST.2023.3309529","DOIUrl":"10.1109/COMST.2023.3309529","url":null,"abstract":"Future wireless systems are envisioned to create an endogenously holography-capable, intelligent, and programmable radio propagation environment, that will offer unprecedented capabilities for high spectral and energy efficiency, low latency, and massive connectivity. A potential and promising technology for supporting the expected extreme requirements of the sixth-generation (6G) communication systems is the concept of the holographic multiple-input multiple-output (HMIMO), which will actualize holographic radios with reasonable power consumption and fabrication cost. The HMIMO is facilitated by ultra-thin, extremely large, and nearly continuous surfaces that incorporate reconfigurable and sub-wavelength-spaced antennas and/or metamaterials. Such surfaces comprising dense electromagnetic (EM) excited elements are capable of recording and manipulating impinging fields with utmost flexibility and precision, as well as with reduced cost and power consumption, thereby shaping arbitrary-intended EM waves with high energy efficiency. The powerful EM processing capability of HMIMO opens up the possibility of wireless communications of holographic imaging level, paving the way for signal processing techniques realized in the EM-domain, possibly in conjunction with their digital-domain counterparts. However, in spite of the significant potential, the studies on HMIMO communications are still at an initial stage, its fundamental limits remain to be unveiled, and a certain number of critical technical challenges need to be addressed. In this survey, we present a comprehensive overview of the latest advances in the HMIMO communications paradigm, with a special focus on their physical aspects, their theoretical foundations, as well as the enabling technologies for HMIMO systems. We also compare the HMIMO with existing multi-antenna technologies, especially the massive MIMO, present various promising synergies of HMIMO with current and future candidate technologies, and provide an extensive list of research challenges and open directions for future HMIMO-empowered wireless applications.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 1","pages":"196-257"},"PeriodicalIF":35.6,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80680001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial: Third Quarter 2023 IEEE Communications Surveys and Tutorials 编辑:第三季度2023 IEEE通信调查和教程
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-22 DOI: 10.1109/COMST.2023.3301328
Dusit Niyato
I welcome you to the third issue of the IEEE Communications Surveys and Tutorials in 2023. This issue includes 18 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications,” “Cyber Security,” “IoT and M2M,” “Internet Technologies,” “Network Virtualization,” and “Network and Service Management and Green Communications.” A brief account for each of these papers is given below.
我欢迎您参加2023年第三期IEEE通信调查和教程。本期包括18篇涉及通信网络不同方面的论文。特别是,这些文章调查并指导了《无线通信》、《网络安全》、《物联网与M2M》、《互联网技术》、《虚拟化》和《网络与服务管理与绿色通信》中的各种问题。下面简要介绍了每篇论文。
{"title":"Editorial: Third Quarter 2023 IEEE Communications Surveys and Tutorials","authors":"Dusit Niyato","doi":"10.1109/COMST.2023.3301328","DOIUrl":"https://doi.org/10.1109/COMST.2023.3301328","url":null,"abstract":"I welcome you to the third issue of the IEEE Communications Surveys and Tutorials in 2023. This issue includes 18 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications,” “Cyber Security,” “IoT and M2M,” “Internet Technologies,” “Network Virtualization,” and “Network and Service Management and Green Communications.” A brief account for each of these papers is given below.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"i-vi"},"PeriodicalIF":35.6,"publicationDate":"2023-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9739/10226436/10226448.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Control and Communication Strategies in Multi-Energy Generation Grid 多能发电电网的最优控制与通信策略
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-17 DOI: 10.1109/COMST.2023.3304982
Muhammad Waseem Khan;Guojie Li;Keyou Wang;Muhammad Numan;Linyun Xiong;Muhammad Azam Khan
Multi-energy generation grids (MEGGs) provide a promising solution for reliable operations of cooperative various distributed energy resources (DERs), supply environmentally friendly energy to remote/off-grid areas, and improve overall system performance in terms of efficiency, reliability, flexibility, and resiliency. However, with the penetration of grids and the presence of various DERs with unpredictable renewables-based power generation and intermittent power loads, the operational coordination and supervision tasks become more complex. The communication-based optimal distributed control approach plays a significant role in MEGGs for coordinating an assembly of spatially and heterogeneous DERs, which improves reliability, efficiency, scalability, robustness, and privacy-preserving compared with traditional centralized-based controls. Therefore, this article aims to study different grid architectures and provide a comprehensive survey of optimal control and communication strategies/systems (CCS) in MEGG. A well-organized and systematic discussion related to the topic has been provided and elaborated on: 1) energy production and distribution with various grid architectures and distributed generating units (DGUs) integration for sustainable power generation, importance of unit sizing and technologies selection, and their implementations and operations; 2) classification on numerous control architectures and techniques, their prominent features and impact on MEGG stability; 3) multiple advanced intelligent control strategies and their essential aspects and merits; 4) different promising communication networks and technologies with optimal communication protocols and standards along with their computational mechanism and potential operational objectives in MEGGs; 5) communication strategies features and reliability issues concerning data volume, data availability, data accuracy, data security and authentication, time synchronization, and the growth of countermeasures; and 6) finally, key research gaps are highlighted and some recommendations are provided for future research works to efficiently handle the MEGG control, security, and communication network requirements.
多能发电电网(MEGGs)为多种分布式能源(DERs)的合作可靠运行提供了一种有前景的解决方案,为偏远/离网地区提供环保能源,并在效率、可靠性、灵活性和弹性方面提高整个系统的性能。然而,随着电网的渗透和各种可再生能源发电不可预测和间歇性电力负荷的der的存在,运行协调和监管任务变得更加复杂。基于通信的最优分布式控制方法在megs中发挥了重要作用,可协调空间异构der的集合,与传统的基于集中式控制相比,提高了可靠性、效率、可扩展性、鲁棒性和隐私保护性。因此,本文旨在研究不同的网格体系结构,并提供MEGG中最优控制和通信策略/系统(CCS)的全面调查。与本主题相关的组织良好和系统的讨论已经提供并详细阐述了:1)能源生产和分配与各种电网架构和分布式发电机组(dgu)集成的可持续发电,机组规模和技术选择的重要性,以及它们的实施和操作;2)多种控制体系结构和技术的分类,它们的突出特点和对MEGG稳定性的影响;3)多种先进的智能控制策略及其基本方面和优点;4)具有最优通信协议和标准的不同有发展前景的通信网络和技术,以及它们的计算机制和潜在的megg操作目标;5)通信策略的特点和可靠性问题,涉及数据量、数据可用性、数据准确性、数据安全和认证、时间同步,以及对策的增长;6)最后指出了关键的研究空白,并为今后的研究工作提供了一些建议,以有效地处理MEGG控制、安全和通信网络的需求。
{"title":"Optimal Control and Communication Strategies in Multi-Energy Generation Grid","authors":"Muhammad Waseem Khan;Guojie Li;Keyou Wang;Muhammad Numan;Linyun Xiong;Muhammad Azam Khan","doi":"10.1109/COMST.2023.3304982","DOIUrl":"10.1109/COMST.2023.3304982","url":null,"abstract":"Multi-energy generation grids (MEGGs) provide a promising solution for reliable operations of cooperative various distributed energy resources (DERs), supply environmentally friendly energy to remote/off-grid areas, and improve overall system performance in terms of efficiency, reliability, flexibility, and resiliency. However, with the penetration of grids and the presence of various DERs with unpredictable renewables-based power generation and intermittent power loads, the operational coordination and supervision tasks become more complex. The communication-based optimal distributed control approach plays a significant role in MEGGs for coordinating an assembly of spatially and heterogeneous DERs, which improves reliability, efficiency, scalability, robustness, and privacy-preserving compared with traditional centralized-based controls. Therefore, this article aims to study different grid architectures and provide a comprehensive survey of optimal control and communication strategies/systems (CCS) in MEGG. A well-organized and systematic discussion related to the topic has been provided and elaborated on: 1) energy production and distribution with various grid architectures and distributed generating units (DGUs) integration for sustainable power generation, importance of unit sizing and technologies selection, and their implementations and operations; 2) classification on numerous control architectures and techniques, their prominent features and impact on MEGG stability; 3) multiple advanced intelligent control strategies and their essential aspects and merits; 4) different promising communication networks and technologies with optimal communication protocols and standards along with their computational mechanism and potential operational objectives in MEGGs; 5) communication strategies features and reliability issues concerning data volume, data availability, data accuracy, data security and authentication, time synchronization, and the growth of countermeasures; and 6) finally, key research gaps are highlighted and some recommendations are provided for future research works to efficiently handle the MEGG control, security, and communication network requirements.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2599-2653"},"PeriodicalIF":35.6,"publicationDate":"2023-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125556838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Substation Communications and Cybersecurity: A Comprehensive Survey 智能变电站通信与网络安全:综合调查
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-15 DOI: 10.1109/COMST.2023.3305468
José Gaspar;Tiago Cruz;Chan-Tong Lam;Paulo Simões
Electrical grids generate, transport, distribute and deliver electrical power to consumers through a complex Critical Infrastructure which progressively shifted from an air-gaped to a connected architecture. Specifically, Smart Substations are important parts of Smart Grids, providing switching, transforming, monitoring, metering and protection functions to offer a safe, efficient and reliable distribution of electrical power to consumers. The evolution of electrical power grids was closely followed by the digitization of all its parts and improvements in communication and computing infrastructures, leading to an evolution towards digital smart substations with improved connectivity. However, connected smart substations are exposed to cyber threats which can result in blackouts and faults which may propagate in a chain reaction and damage electrical appliances connected across the electrical grid. This work organizes and offers a comprehensive review of architectural, communications and cybersecurity standards for smart substations, complemented by a threat landscape analysis and the presentation of a Defense-in-Depth strategy blueprint. Furthermore, this work examines several defense mechanisms documented in the literature, existing datasets, testbeds and evaluation methodologies, identifying the most relevant open issues which may guide and inspire future research work.
电网通过复杂的关键基础设施产生、运输、分配和向消费者提供电力,这些基础设施逐步从气隙结构转变为连接结构。具体来说,智能变电站是智能电网的重要组成部分,具有开关、变换、监控、计量和保护等功能,为用户提供安全、高效、可靠的电力分配。电网的发展紧随其后的是其所有部件的数字化以及通信和计算基础设施的改进,从而导致向数字智能变电站的发展,并改善了连接。然而,连接的智能变电站面临网络威胁,这可能导致停电和故障,这些故障可能在连锁反应中传播,并损坏连接在电网上的电器。这项工作组织并提供了智能变电站的架构、通信和网络安全标准的全面审查,并辅以威胁形势分析和纵深防御战略蓝图的介绍。此外,本工作考察了文献中记录的几种防御机制、现有数据集、测试平台和评估方法,确定了最相关的开放问题,这些问题可能指导和启发未来的研究工作。
{"title":"Smart Substation Communications and Cybersecurity: A Comprehensive Survey","authors":"José Gaspar;Tiago Cruz;Chan-Tong Lam;Paulo Simões","doi":"10.1109/COMST.2023.3305468","DOIUrl":"10.1109/COMST.2023.3305468","url":null,"abstract":"Electrical grids generate, transport, distribute and deliver electrical power to consumers through a complex Critical Infrastructure which progressively shifted from an air-gaped to a connected architecture. Specifically, Smart Substations are important parts of Smart Grids, providing switching, transforming, monitoring, metering and protection functions to offer a safe, efficient and reliable distribution of electrical power to consumers. The evolution of electrical power grids was closely followed by the digitization of all its parts and improvements in communication and computing infrastructures, leading to an evolution towards digital smart substations with improved connectivity. However, connected smart substations are exposed to cyber threats which can result in blackouts and faults which may propagate in a chain reaction and damage electrical appliances connected across the electrical grid. This work organizes and offers a comprehensive review of architectural, communications and cybersecurity standards for smart substations, complemented by a threat landscape analysis and the presentation of a Defense-in-Depth strategy blueprint. Furthermore, this work examines several defense mechanisms documented in the literature, existing datasets, testbeds and evaluation methodologies, identifying the most relevant open issues which may guide and inspire future research work.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2456-2493"},"PeriodicalIF":35.6,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10217175","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113955447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
IEEE Communications Surveys and Tutorials
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1