首页 > 最新文献

IEEE Communications Surveys and Tutorials最新文献

英文 中文
Survey on Unified Threat Management (UTM) Systems for Home Networks 家庭网络统一威胁管理 (UTM) 系统调查
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-28 DOI: 10.1109/COMST.2024.3382470
Asif Siddiqui;Bhaskar P. Rimal;Martin Reisslein;Yong Wang
Home networks increasingly support important networked applications with limited professional network administration support, while sophisticated attacks pose enormous security risks for networked applications. A Unified Threat Management (UTM) system strives to comprehensively protect a network by providing firewall, intrusion detection and prevention, as well as antibot protection in an integrated, easy-to-configure manner. Previous surveys have extensively covered the individual components of a UTM system, i.e., there is extensive literature on firewall surveys, intrusion detection and prevention surveys, and antibot protection surveys. Importantly, the previous surveys covered these protection services separately, without considering their integration (however, this integration is critical for comprehensive home network protection). In contrast, the present survey covers for the first time home network UTM systems, i.e., the integrated network security services provided by a UTM system for a home network. This UTM survey is organized according to the UTM components, i.e., we comprehensively survey the firewall methods, the intrusion detection and prevention methods, as well as the antibot protection methods that are suitable for a UTM system for a home network. Throughout, we view these methods from the perspective of integration into a UTM system with limited computational resources and limited network administration support. Our survey includes the protection capabilities, as well as the design and deployment aspects and software/hardware limitations of available off-the-shelf and open-source UTM systems. We find that effective integrated home network protection where the UTM system components synergistically support each other while operating with limited computational resources and network administration support still requires extensive future research and development.
家庭网络越来越多地支持重要的网络应用,但专业的网络管理支持却很有限,而复杂的攻击却给网络应用带来了巨大的安全风险。统一威胁管理(UTM)系统以易于配置的集成方式提供防火墙、入侵检测和防御以及反僵尸保护,力求全面保护网络。以往的调查广泛涉及 UTM 系统的各个组成部分,例如,有大量文献涉及防火墙调查、入侵检测和防御调查以及反僵尸程序保护调查。重要的是,以前的调查单独涵盖了这些保护服务,而没有考虑它们之间的整合(然而,这种整合对于全面的家庭网络保护至关重要)。相比之下,本调查首次涵盖了家庭网络 UTM 系统,即家庭网络 UTM 系统提供的集成网络安全服务。本UTM调查报告按照UTM组件进行组织,即我们全面调查了适用于家庭网络UTM系统的防火墙方法、入侵检测和防御方法以及反僵尸保护方法。自始至终,我们都从将这些方法集成到计算资源有限、网络管理支持有限的 UTM 系统的角度来看待这些方法。我们的调查包括现有现成和开源 UTM 系统的保护能力、设计和部署方面以及软件/硬件限制。我们发现,在有限的计算资源和网络管理支持条件下,UTM 系统各组件相互协同、相互支持,这种有效的集成式家庭网络保护仍需要广泛的研究和开发。
{"title":"Survey on Unified Threat Management (UTM) Systems for Home Networks","authors":"Asif Siddiqui;Bhaskar P. Rimal;Martin Reisslein;Yong Wang","doi":"10.1109/COMST.2024.3382470","DOIUrl":"10.1109/COMST.2024.3382470","url":null,"abstract":"Home networks increasingly support important networked applications with limited professional network administration support, while sophisticated attacks pose enormous security risks for networked applications. A Unified Threat Management (UTM) system strives to comprehensively protect a network by providing firewall, intrusion detection and prevention, as well as antibot protection in an integrated, easy-to-configure manner. Previous surveys have extensively covered the individual components of a UTM system, i.e., there is extensive literature on firewall surveys, intrusion detection and prevention surveys, and antibot protection surveys. Importantly, the previous surveys covered these protection services separately, without considering their integration (however, this integration is critical for comprehensive home network protection). In contrast, the present survey covers for the first time home network UTM systems, i.e., the integrated network security services provided by a UTM system for a home network. This UTM survey is organized according to the UTM components, i.e., we comprehensively survey the firewall methods, the intrusion detection and prevention methods, as well as the antibot protection methods that are suitable for a UTM system for a home network. Throughout, we view these methods from the perspective of integration into a UTM system with limited computational resources and limited network administration support. Our survey includes the protection capabilities, as well as the design and deployment aspects and software/hardware limitations of available off-the-shelf and open-source UTM systems. We find that effective integrated home network protection where the UTM system components synergistically support each other while operating with limited computational resources and network administration support still requires extensive future research and development.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2459-2509"},"PeriodicalIF":34.4,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140321893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Tutorial on Radio System-Level Simulations With Emphasis on 3GPP 5G-Advanced and Beyond 无线电系统级仿真教程,重点介绍 3GPP 5G-Advanced 及其他技术
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-27 DOI: 10.1109/COMST.2024.3381669
Klaus I. Pedersen;Roberto Maldonado;Guillermo Pocovi;Enric Juan;Mads Lauridsen;István Z. Kovács;Mads Brix;Jeroen Wigard
In this tutorial we present recipes for dynamic system-level simulations (SLSs) of 5G and beyond cellular radio systems. A key ingredient for such SLSs is selection of proper models to make sure that the performance determining effects are properly reflected to ensure output of realistic radio performance results. We therefore present a significant number of SLS models and related methodologies for a variety of use cases. Our focus is on generally accepted models that are largely supported by academia and industrial players and adopted by 3GPP as being realistic. Among others, we touch on deployment models, traffic models, non-terrestrial cellular networks with satellites, SLS methodologies for Machine Learning (ML) enabled air-interface solutions, and many more. We also present several recommendations for best practices related to preparing and running detailed SLS campaigns, and agile software engineering considerations. Throughout the article we use the 3GPP defined 5G and 5G-Advanced systems to illustrate our points, extending it also into the 6G-era that is predicted to build on alike SLS methodologies and best practices.
在本教程中,我们将介绍 5G 及更先进蜂窝无线电系统的动态系统级仿真 (SLS) 方法。此类 SLS 的一个关键要素是选择适当的模型,以确保正确反映性能决定效应,从而确保输出逼真的无线电性能结果。因此,我们针对各种用例介绍了大量 SLS 模型和相关方法。我们的重点是公认的模型,这些模型在很大程度上得到了学术界和产业界的支持,并被 3GPP 采纳为现实的模型。其中包括部署模型、流量模型、卫星非地面蜂窝网络、支持机器学习(ML)的空中接口解决方案的 SLS 方法等。我们还就准备和运行详细 SLS 活动的最佳实践以及敏捷软件工程注意事项提出了一些建议。在整篇文章中,我们使用 3GPP 定义的 5G 和 5G-Advanced 系统来说明我们的观点,并将其扩展到 6G 时代,预计 6G 时代将以类似的 SLS 方法和最佳实践为基础。
{"title":"A Tutorial on Radio System-Level Simulations With Emphasis on 3GPP 5G-Advanced and Beyond","authors":"Klaus I. Pedersen;Roberto Maldonado;Guillermo Pocovi;Enric Juan;Mads Lauridsen;István Z. Kovács;Mads Brix;Jeroen Wigard","doi":"10.1109/COMST.2024.3381669","DOIUrl":"10.1109/COMST.2024.3381669","url":null,"abstract":"In this tutorial we present recipes for dynamic system-level simulations (SLSs) of 5G and beyond cellular radio systems. A key ingredient for such SLSs is selection of proper models to make sure that the performance determining effects are properly reflected to ensure output of realistic radio performance results. We therefore present a significant number of SLS models and related methodologies for a variety of use cases. Our focus is on generally accepted models that are largely supported by academia and industrial players and adopted by 3GPP as being realistic. Among others, we touch on deployment models, traffic models, non-terrestrial cellular networks with satellites, SLS methodologies for Machine Learning (ML) enabled air-interface solutions, and many more. We also present several recommendations for best practices related to preparing and running detailed SLS campaigns, and agile software engineering considerations. Throughout the article we use the 3GPP defined 5G and 5G-Advanced systems to illustrate our points, extending it also into the 6G-era that is predicted to build on alike SLS methodologies and best practices.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2290-2325"},"PeriodicalIF":34.4,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140310527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two Decades of Research Progress in Resource Allocation for PLC Systems: From Core Concepts to Frontiers PLC 系统资源分配研究二十年的进展:从核心概念到前沿领域
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-25 DOI: 10.1109/COMST.2024.3380901
Yan F. Coutinho;ândrei Camponogara;Mateus de L. Filomeno;Marcello L. R. de Campos;Andrea M. Tonello;Moisés V. Ribeiro
In this paper, we review the current state-of-the-art of resource allocation for power line communication systems. The study systematically presents the advancements achieved in this field over the past decades. To achieve this, we adopt two complementary perspectives: a power line communication-centric view and an optimization-centric view. The former highlights resource allocation within the eye of the power line communication community, while the latter emphasizes optimization principles, focusing on the technical aspects of resource allocation. Subsequently, we meticulously present the progress made in both single- and multi-user scenarios, employing a chronological approach to provide readers with a coherent narrative of the evolution and important findings. Furthermore, we accentuate critical insights and valuable lessons gathered from these developments. In conclusion, we explore future trends and prospects within the scope of resource allocation for power line communication systems, intending to inspire research initiatives that push the boundaries beyond the existing state-of-the-art.
本文回顾了当前电力线通信系统资源分配的最新进展。研究系统地介绍了过去几十年来该领域取得的进展。为此,我们采用了两个互补的视角:以电力线通信为中心的视角和以优化为中心的视角。前者强调电力线通信领域的资源分配,后者强调优化原则,侧重于资源分配的技术层面。随后,我们采用时间顺序的方法,细致地介绍了在单用户和多用户场景中取得的进展,为读者提供了有关演变和重要发现的连贯叙述。此外,我们还强调了从这些发展中获得的重要见解和宝贵经验。最后,我们探讨了电力线通信系统资源分配方面的未来趋势和前景,旨在激发研究人员的研究热情,推动研究工作超越现有的最先进水平。
{"title":"Two Decades of Research Progress in Resource Allocation for PLC Systems: From Core Concepts to Frontiers","authors":"Yan F. Coutinho;ândrei Camponogara;Mateus de L. Filomeno;Marcello L. R. de Campos;Andrea M. Tonello;Moisés V. Ribeiro","doi":"10.1109/COMST.2024.3380901","DOIUrl":"10.1109/COMST.2024.3380901","url":null,"abstract":"In this paper, we review the current state-of-the-art of resource allocation for power line communication systems. The study systematically presents the advancements achieved in this field over the past decades. To achieve this, we adopt two complementary perspectives: a power line communication-centric view and an optimization-centric view. The former highlights resource allocation within the eye of the power line communication community, while the latter emphasizes optimization principles, focusing on the technical aspects of resource allocation. Subsequently, we meticulously present the progress made in both single- and multi-user scenarios, employing a chronological approach to provide readers with a coherent narrative of the evolution and important findings. Furthermore, we accentuate critical insights and valuable lessons gathered from these developments. In conclusion, we explore future trends and prospects within the scope of resource allocation for power line communication systems, intending to inspire research initiatives that push the boundaries beyond the existing state-of-the-art.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 3","pages":"1710-1747"},"PeriodicalIF":34.4,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140291467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial: Second Quarter 2024 IEEE Communications Surveys and Tutorials 编辑:2024 年第二季度《IEEE 通信概览与教程
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-22 DOI: 10.1109/COMST.2024.3396689
Dusit Niyato
I welcome you to the second issue of the IEEE Communications Surveys and Tutorials in 2024. This issue includes 18 articles covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications”, “Cyber Security”, “IoT and M2M”, “Internet Technologies”, “Network Virtualization” and “Optical Communications”. A brief account for each of these articles is given below.
欢迎您阅读 2024 年第二期《IEEE 通信概览与教程》。本期包括 18 篇文章,涉及通信网络的各个方面。特别是,这些文章对 "无线通信"、"网络安全"、"物联网和 M2M"、"互联网技术"、"网络虚拟化 "和 "光通信 "中的各种问题进行了调查和辅导。下文简要介绍了每篇文章。
{"title":"Editorial: Second Quarter 2024 IEEE Communications Surveys and Tutorials","authors":"Dusit Niyato","doi":"10.1109/COMST.2024.3396689","DOIUrl":"https://doi.org/10.1109/COMST.2024.3396689","url":null,"abstract":"I welcome you to the second issue of the IEEE Communications Surveys and Tutorials in 2024. This issue includes 18 articles covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications”, “Cyber Security”, “IoT and M2M”, “Internet Technologies”, “Network Virtualization” and “Optical Communications”. A brief account for each of these articles is given below.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 2","pages":"i-vi"},"PeriodicalIF":35.6,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10536696","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141084863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Can Optical Communications Shape the Future of Deep Space Communications? A Survey 光通信如何塑造深空通信的未来?调查
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-21 DOI: 10.1109/COMST.2024.3403873
Sarah Karmous;Nadia Adem;Mohammed Atiquzzaman;Sumudu Samarakoon
With a large number of deep space (DS) missions anticipated by the end of this decade, reliable and high-capacity DS communications are needed more than ever. Nevertheless, existing technologies are far from meeting such a goal. Improving current systems does not only require engineering leadership, but also, very crucially, investigating potential technologies that overcome the unique challenges of ultra-long DS links. To the best of our knowledge, there has not been any comprehensive surveys of DS communications technologies over the last decade. Free space optical (FSO) is an emerging DS technology, proven to acquire lower communications systems size weight and power (SWaP) and achieve a very high capacity compared to its counterpart radio frequency (RF), the currently used DS technology. In this survey, we discuss the pros and cons of deep space optical communications (DSOC) and review their physical and networking characteristics. Furthermore, we provide, for the first time, thoughtful discussions about implementing orbital angular momentum (OAM) and quantum communications (QC) for DS. We elaborate on how these technologies among other field advances including interplanetary network (IPN) and RF/FSO systems improve reliability, capacity, and security. This paper provides a holistic survey of DSOC technologies gathering 247 fragmented pieces of literature and including novel perspectives aiming to set the stage for more developments in the field.
{"title":"How Can Optical Communications Shape the Future of Deep Space Communications? A Survey","authors":"Sarah Karmous;Nadia Adem;Mohammed Atiquzzaman;Sumudu Samarakoon","doi":"10.1109/COMST.2024.3403873","DOIUrl":"10.1109/COMST.2024.3403873","url":null,"abstract":"With a large number of deep space (DS) missions anticipated by the end of this decade, reliable and high-capacity DS communications are needed more than ever. Nevertheless, existing technologies are far from meeting such a goal. Improving current systems does not only require engineering leadership, but also, very crucially, investigating potential technologies that overcome the unique challenges of ultra-long DS links. To the best of our knowledge, there has not been any comprehensive surveys of DS communications technologies over the last decade. Free space optical (FSO) is an emerging DS technology, proven to acquire lower communications systems size weight and power (SWaP) and achieve a very high capacity compared to its counterpart radio frequency (RF), the currently used DS technology. In this survey, we discuss the pros and cons of deep space optical communications (DSOC) and review their physical and networking characteristics. Furthermore, we provide, for the first time, thoughtful discussions about implementing orbital angular momentum (OAM) and quantum communications (QC) for DS. We elaborate on how these technologies among other field advances including interplanetary network (IPN) and RF/FSO systems improve reliability, capacity, and security. This paper provides a holistic survey of DSOC technologies gathering 247 fragmented pieces of literature and including novel perspectives aiming to set the stage for more developments in the field.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"725-747"},"PeriodicalIF":34.4,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141079062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Blockchain Scalability: From Hardware to Layer-Two Protocols 区块链可扩展性调查:从硬件到第二层协议
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-18 DOI: 10.1109/COMST.2024.3376252
Gabriel Antonio F. Rebello;Gustavo F. Camilo;Lucas Airam C. de Souza;Maria Potop-Butucaru;Marcelo Dias de Amorim;Miguel Elias M. Campista;Luís Henrique M. K. Costa
Despite the great success of blockchain systems in recent years, blockchains still struggle to provide the same level of latency and throughput as centralized financial systems. The core of this problem lies in the inefficiency of consensus protocols. In this paper, we provide a survey on recent efforts to improve the scalability of blockchains. We focus on layer-two protocols, such as payment channel networks and transaction rollups, which process computations off-chain and only use consensus for dispute resolution. Layer-two protocols are expected to process microtransactions with sub-second latency and reduced fees, allowing blockchains to scale. Much of this work addresses the open challenges of payment channel networks, such as payment routing, channel rebalancing, network design strategies, security and privacy, payment scheduling, congestion control, simulators, and support for light nodes. We also dedicate a section to the existing implementations of smart-contract-based transaction rollups. Our work systematizes the state-of-the-art layer-two protocols, paving the way for future advances.
尽管近年来区块链系统取得了巨大成功,但区块链仍难以提供与集中式金融系统相同的延迟和吞吐量。这一问题的核心在于共识协议效率低下。在本文中,我们对最近为提高区块链可扩展性所做的努力进行了调查。我们重点关注第二层协议,如支付通道网络和交易卷积,这些协议在链外处理计算,仅在解决争议时使用共识。第二层协议有望以亚秒级的延迟和更低的费用处理微交易,从而使区块链具有可扩展性。这项工作的大部分内容涉及支付通道网络的公开挑战,如支付路由、通道再平衡、网络设计策略、安全性和隐私性、支付调度、拥堵控制、模拟器和对轻节点的支持。我们还专门用一个章节介绍了基于智能合约的交易卷积的现有实现。我们的工作将最先进的第二层协议系统化,为未来的进步铺平了道路。
{"title":"A Survey on Blockchain Scalability: From Hardware to Layer-Two Protocols","authors":"Gabriel Antonio F. Rebello;Gustavo F. Camilo;Lucas Airam C. de Souza;Maria Potop-Butucaru;Marcelo Dias de Amorim;Miguel Elias M. Campista;Luís Henrique M. K. Costa","doi":"10.1109/COMST.2024.3376252","DOIUrl":"10.1109/COMST.2024.3376252","url":null,"abstract":"Despite the great success of blockchain systems in recent years, blockchains still struggle to provide the same level of latency and throughput as centralized financial systems. The core of this problem lies in the inefficiency of consensus protocols. In this paper, we provide a survey on recent efforts to improve the scalability of blockchains. We focus on layer-two protocols, such as payment channel networks and transaction rollups, which process computations off-chain and only use consensus for dispute resolution. Layer-two protocols are expected to process microtransactions with sub-second latency and reduced fees, allowing blockchains to scale. Much of this work addresses the open challenges of payment channel networks, such as payment routing, channel rebalancing, network design strategies, security and privacy, payment scheduling, congestion control, simulators, and support for light nodes. We also dedicate a section to the existing implementations of smart-contract-based transaction rollups. Our work systematizes the state-of-the-art layer-two protocols, paving the way for future advances.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2411-2458"},"PeriodicalIF":34.4,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140161573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empowering Cloud Computing With Network Acceleration: A Survey 通过网络加速增强云计算能力:调查
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-14 DOI: 10.1109/COMST.2024.3377531
Lorenzo Rosa;Luca Foschini;Antonio Corradi
Modern interactive and data-intensive applications must operate under demanding time constraints, prompting a shift toward the adoption of specialized software and hardware network acceleration technologies. This specialization, however, poses significant scalability, flexibility, security, and economic sustainability challenges for application developers. Cloud computing holds the potential to overcome these obstacles by offering the cost-effective option to access specialized acceleration technologies through standard cloud interfaces. Nevertheless, that integration is still challenging for cloud providers. In the cloud, physical resources are hidden behind a virtualization layer, whereas acceleration technologies make applications directly interact with the hardware. To bridge this gap, recent literature explores the possibility of empowering cloud platforms with accelerated networking as a commodity, thus offering the innovative option of Network Acceleration as a Service. This survey reviews these recent research efforts by adopting popular technologies like XDP, DPDK, and RDMA as a reference. To organize the surveyed research in a comprehensive framework, we identify four key aspects that pose critical problems to the integration of acceleration options in cloud computing - access interfaces, virtualization techniques, serviceability, and security - and systematically discuss the associated challenges. Then, we present the issues to be further addressed and outline the most promising research directions for the full integration of network acceleration within next-generation cloud computing platforms.
现代交互式和数据密集型应用必须在苛刻的时间限制下运行,这促使人们转向采用专门的软件和硬件网络加速技术。然而,这种专业化给应用开发人员带来了可扩展性、灵活性、安全性和经济可持续性方面的巨大挑战。云计算为通过标准云接口访问专用加速技术提供了具有成本效益的选择,从而有可能克服这些障碍。然而,对于云计算提供商来说,这种集成仍然具有挑战性。在云计算中,物理资源隐藏在虚拟化层之后,而加速技术则使应用程序与硬件直接交互。为了弥合这一差距,最近的文献探讨了将加速网络作为商品赋予云平台的可能性,从而提供了网络加速即服务的创新选择。本调查报告以 XDP、DPDK 和 RDMA 等流行技术为参考,回顾了近期的研究工作。为了在一个全面的框架内组织所调查的研究,我们确定了对云计算中加速选项的集成构成关键问题的四个关键方面--访问接口、虚拟化技术、可服务性和安全性--并系统地讨论了相关的挑战。然后,我们提出了有待进一步解决的问题,并概述了最有希望在下一代云计算平台中全面集成网络加速的研究方向。
{"title":"Empowering Cloud Computing With Network Acceleration: A Survey","authors":"Lorenzo Rosa;Luca Foschini;Antonio Corradi","doi":"10.1109/COMST.2024.3377531","DOIUrl":"10.1109/COMST.2024.3377531","url":null,"abstract":"Modern interactive and data-intensive applications must operate under demanding time constraints, prompting a shift toward the adoption of specialized software and hardware network acceleration technologies. This specialization, however, poses significant scalability, flexibility, security, and economic sustainability challenges for application developers. Cloud computing holds the potential to overcome these obstacles by offering the cost-effective option to access specialized acceleration technologies through standard cloud interfaces. Nevertheless, that integration is still challenging for cloud providers. In the cloud, physical resources are hidden behind a virtualization layer, whereas acceleration technologies make applications directly interact with the hardware. To bridge this gap, recent literature explores the possibility of empowering cloud platforms with accelerated networking as a commodity, thus offering the innovative option of Network Acceleration as a Service. This survey reviews these recent research efforts by adopting popular technologies like XDP, DPDK, and RDMA as a reference. To organize the surveyed research in a comprehensive framework, we identify four key aspects that pose critical problems to the integration of acceleration options in cloud computing - access interfaces, virtualization techniques, serviceability, and security - and systematically discuss the associated challenges. Then, we present the issues to be further addressed and outline the most promising research directions for the full integration of network acceleration within next-generation cloud computing platforms.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2729-2768"},"PeriodicalIF":34.4,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10472517","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140135628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of Critical 5G Interfaces 关键 5G 接口的安全分析
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-13 DOI: 10.1109/COMST.2024.3377161
Mohammed Mahyoub;AbdulAziz AbdulGhaffar;Emmanuel Alalade;Ezekiel Ndubisi;Ashraf Matrawy
Interfaces play a crucial role in the Fifth Generation (5G) architecture as they interconnect Network Functions (NFs) to exchange data and services. Certain interfaces are particularly critical because they are involved in the exchange of sensitive data or are exposed externally. To the best of our knowledge, no literature work analyzes the 5G security from a network architecture or interface perspective. Therefore, existing research on 5G security may not be helpful when considering a certain component of the network or a specific interface. This paper reviews the security measures recommended by the selected Standardization Development Organizations (SDOs) for critical interfaces and classifies them based on security goals. It also identifies vulnerabilities and threats to these interfaces in the absence of security measures and categorizes them based on STRIDE model and impacted traffic types.
接口在第五代(5G)架构中发挥着至关重要的作用,因为它们将网络功能(NF)互连起来,以交换数据和服务。某些接口尤为重要,因为它们涉及敏感数据的交换或暴露于外部。据我们所知,还没有文献从网络架构或接口的角度分析 5G 安全性。因此,现有的 5G 安全研究在考虑网络的某个组件或特定接口时可能没有帮助。本文回顾了选定的标准化发展组织(SDO)针对关键接口推荐的安全措施,并根据安全目标对其进行了分类。本文还确定了在没有安全措施的情况下这些接口的漏洞和威胁,并根据 STRIDE 模型和受影响的流量类型对其进行了分类。
{"title":"Security Analysis of Critical 5G Interfaces","authors":"Mohammed Mahyoub;AbdulAziz AbdulGhaffar;Emmanuel Alalade;Ezekiel Ndubisi;Ashraf Matrawy","doi":"10.1109/COMST.2024.3377161","DOIUrl":"10.1109/COMST.2024.3377161","url":null,"abstract":"Interfaces play a crucial role in the Fifth Generation (5G) architecture as they interconnect Network Functions (NFs) to exchange data and services. Certain interfaces are particularly critical because they are involved in the exchange of sensitive data or are exposed externally. To the best of our knowledge, no literature work analyzes the 5G security from a network architecture or interface perspective. Therefore, existing research on 5G security may not be helpful when considering a certain component of the network or a specific interface. This paper reviews the security measures recommended by the selected Standardization Development Organizations (SDOs) for critical interfaces and classifies them based on security goals. It also identifies vulnerabilities and threats to these interfaces in the absence of security measures and categorizes them based on STRIDE model and impacted traffic types.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2382-2410"},"PeriodicalIF":34.4,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140123866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Deep Reinforcement Learning: A Tutorial on Generative Diffusion Models in Network Optimization 增强深度强化学习:网络优化中的生成扩散模型教程
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-10 DOI: 10.1109/COMST.2024.3400011
Hongyang Du;Ruichen Zhang;Yinqiu Liu;Jiacheng Wang;Yijing Lin;Zonghang Li;Dusit Niyato;Jiawen Kang;Zehui Xiong;Shuguang Cui;Bo Ai;Haibo Zhou;Dong In Kim
Generative Diffusion Models (GDMs) have emerged as a transformative force in the realm of Generative Artificial Intelligence (GenAI), demonstrating their versatility and efficacy across various applications. The ability to model complex data distributions and generate high-quality samples has made GDMs particularly effective in tasks such as image generation and reinforcement learning. Furthermore, their iterative nature, which involves a series of noise addition and denoising steps, is a powerful and unique approach to learning and generating data. This paper serves as a comprehensive tutorial on applying GDMs in network optimization tasks. We delve into the strengths of GDMs, emphasizing their wide applicability across various domains, such as vision, text, and audio generation. We detail how GDMs can be effectively harnessed to solve complex optimization problems inherent in networks. The paper first provides a basic background of GDMs and their applications in network optimization. This is followed by a series of case studies, showcasing the integration of GDMs with Deep Reinforcement Learning (DRL), incentive mechanism design, Semantic Communications (SemCom), Internet of Vehicles (IoV) networks, etc. These case studies underscore the practicality and efficacy of GDMs in real-world scenarios, offering insights into network design. We conclude with a discussion on potential future directions for GDM research and applications, providing major insights into how they can continue to shape the future of network optimization.
生成扩散模型(GDM)已成为生成人工智能(GenAI)领域的一股变革力量,在各种应用中展示了其多功能性和有效性。GDM 能够对复杂的数据分布进行建模并生成高质量的样本,因此在图像生成和强化学习等任务中尤为有效。此外,GDM 的迭代性质涉及一系列噪声添加和去噪步骤,是一种强大而独特的学习和生成数据的方法。本文将全面介绍如何在网络优化任务中应用 GDM。我们深入探讨了 GDM 的优势,强调了它在视觉、文本和音频生成等不同领域的广泛适用性。我们将详细介绍如何有效利用 GDM 解决网络中固有的复杂优化问题。本文首先介绍了 GDM 的基本背景及其在网络优化中的应用。随后是一系列案例研究,展示了 GDM 与深度强化学习 (DRL)、激励机制设计、语义通信 (SemCom)、车联网 (IoV) 网络等的整合。这些案例研究强调了 GDM 在现实世界场景中的实用性和有效性,为网络设计提供了启示。最后,我们讨论了 GDM 研究和应用的未来潜在方向,并就如何继续塑造网络优化的未来提出了重要见解。
{"title":"Enhancing Deep Reinforcement Learning: A Tutorial on Generative Diffusion Models in Network Optimization","authors":"Hongyang Du;Ruichen Zhang;Yinqiu Liu;Jiacheng Wang;Yijing Lin;Zonghang Li;Dusit Niyato;Jiawen Kang;Zehui Xiong;Shuguang Cui;Bo Ai;Haibo Zhou;Dong In Kim","doi":"10.1109/COMST.2024.3400011","DOIUrl":"10.1109/COMST.2024.3400011","url":null,"abstract":"Generative Diffusion Models (GDMs) have emerged as a transformative force in the realm of Generative Artificial Intelligence (GenAI), demonstrating their versatility and efficacy across various applications. The ability to model complex data distributions and generate high-quality samples has made GDMs particularly effective in tasks such as image generation and reinforcement learning. Furthermore, their iterative nature, which involves a series of noise addition and denoising steps, is a powerful and unique approach to learning and generating data. This paper serves as a comprehensive tutorial on applying GDMs in network optimization tasks. We delve into the strengths of GDMs, emphasizing their wide applicability across various domains, such as vision, text, and audio generation. We detail how GDMs can be effectively harnessed to solve complex optimization problems inherent in networks. The paper first provides a basic background of GDMs and their applications in network optimization. This is followed by a series of case studies, showcasing the integration of GDMs with Deep Reinforcement Learning (DRL), incentive mechanism design, Semantic Communications (SemCom), Internet of Vehicles (IoV) networks, etc. These case studies underscore the practicality and efficacy of GDMs in real-world scenarios, offering insights into network design. We conclude with a discussion on potential future directions for GDM research and applications, providing major insights into how they can continue to shape the future of network optimization.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2611-2646"},"PeriodicalIF":34.4,"publicationDate":"2024-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140907362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transitioning From Federated Learning to Quantum Federated Learning in Internet of Things: A Comprehensive Survey 在物联网中从联邦学习过渡到量子联邦学习:全面调查
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-10 DOI: 10.1109/COMST.2024.3399612
Cheng Qiao;Mianjie Li;Yuan Liu;Zhihong Tian
Quantum Federated Learning (QFL) recently becomes a promising approach with the potential to revolutionize Machine Learning (ML). It merges the established strengths of classical Federated Learning (FL) with the exceptional parallel mechanism and exponential speed enhancements characteristic of quantum computing. While this innovative fusion has garnered considerable attention, a notable gap in current research is the tendency to consider traditional FL and its quantum-enhanced counterpart, QFL, in isolation. This approach often overlooks the critical role of Quantum Machine Learning (QML) in effectively bridging these two domains. Recognizing this, there emerges a pressing need for a comprehensive survey that encompasses the entire spectrum of FL paradigms, from foundational FL concepts to the cutting-edge developments in QFL. Our survey aims to address this need by providing an in-depth exploration of the various facets of FL paradigms, ultimately leading to a thorough understanding of Quantum Federated Learning. We start by emphasizing the driving factors and prevalent research topics related to FL. To develop a more efficient, robust, and precise computing paradigm, we investigate the current solutions that address the concerns of heterogeneity, privacy, security, and evaluation in FL. After that, we explore the possibility of improving the computational efficiency of ML methods by leveraging the computational capabilities of quantum computers. In particular, we discuss the frameworks, evaluation, and applications for QML. Following that, we detail the integration of quantum computing technologies with standard FL, aiming to bolster computational performance and mitigate security and privacy risks. The potential solutions to improve the efficiency (i.e., slimming mechanism) and respect the privacy and security (i.e., quantum key distribution) for QFL are explored. Finally, we outline some critical future directions towards unlocking the full potential of QFL in distributed machine learning.
{"title":"Transitioning From Federated Learning to Quantum Federated Learning in Internet of Things: A Comprehensive Survey","authors":"Cheng Qiao;Mianjie Li;Yuan Liu;Zhihong Tian","doi":"10.1109/COMST.2024.3399612","DOIUrl":"10.1109/COMST.2024.3399612","url":null,"abstract":"Quantum Federated Learning (QFL) recently becomes a promising approach with the potential to revolutionize Machine Learning (ML). It merges the established strengths of classical Federated Learning (FL) with the exceptional parallel mechanism and exponential speed enhancements characteristic of quantum computing. While this innovative fusion has garnered considerable attention, a notable gap in current research is the tendency to consider traditional FL and its quantum-enhanced counterpart, QFL, in isolation. This approach often overlooks the critical role of Quantum Machine Learning (QML) in effectively bridging these two domains. Recognizing this, there emerges a pressing need for a comprehensive survey that encompasses the entire spectrum of FL paradigms, from foundational FL concepts to the cutting-edge developments in QFL. Our survey aims to address this need by providing an in-depth exploration of the various facets of FL paradigms, ultimately leading to a thorough understanding of Quantum Federated Learning. We start by emphasizing the driving factors and prevalent research topics related to FL. To develop a more efficient, robust, and precise computing paradigm, we investigate the current solutions that address the concerns of heterogeneity, privacy, security, and evaluation in FL. After that, we explore the possibility of improving the computational efficiency of ML methods by leveraging the computational capabilities of quantum computers. In particular, we discuss the frameworks, evaluation, and applications for QML. Following that, we detail the integration of quantum computing technologies with standard FL, aiming to bolster computational performance and mitigate security and privacy risks. The potential solutions to improve the efficiency (i.e., slimming mechanism) and respect the privacy and security (i.e., quantum key distribution) for QFL are explored. Finally, we outline some critical future directions towards unlocking the full potential of QFL in distributed machine learning.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"509-545"},"PeriodicalIF":34.4,"publicationDate":"2024-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140907365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Communications Surveys and Tutorials
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1