首页 > 最新文献

IEEE Communications Surveys and Tutorials最新文献

英文 中文
Covert Communications: A Comprehensive Survey 秘密通信:综合调查
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-04-03 DOI: 10.1109/COMST.2023.3263921
Xinying Chen;Jianping An;Zehui Xiong;Chengwen Xing;Nan Zhao;F. Richard Yu;Arumugam Nallanathan
Information security has always been a critical issue in wireless networks. Apart from other secure techniques, covert communication emerges as a potential solution to security for wireless networks owing to its high-security level. In covert communication networks, the transmitter hides the transmitted signals into environmental or artificial noise by introducing randomness to avoid detection at the warden. By eliminating the existence of transmitted signals at the warden, information security can be preserved more solidly than other secure transmission techniques, i.e., without noticing the existence. Due to the promising security protection, covert communication has been successfully utilized in tremendous wireless communication scenarios. However, fundamental challenges in its practical implementation still exist, e.g., the effectiveness of randomness utilization, the low signal-to-interference-plus-noise ratio at legitimate users, etc. In this survey, we demonstrate a comprehensive review concentrating on the applications, solutions, and future challenges of covert communications. Specifically, the covert principle and research categories are first introduced. Then, the applications in the networks with different topologies and the effective covert techniques in the existing literature are reviewed. We also discuss the potential implementation of covert communications in future networks and the open challenges.
信息安全一直是无线网络中的一个关键问题。除了其他安全技术外,隐蔽通信由于其高安全级别而成为无线网络安全的潜在解决方案。在隐蔽通信网络中,发射机通过引入随机性将传输的信号隐藏在环境或人工噪声中,以避免在监狱长处被检测到。通过消除监狱长处传输信号的存在,可以比其他安全传输技术更稳固地保持信息安全,即在不注意到存在的情况下。由于隐蔽通信具有良好的安全保护性能,已成功应用于各种无线通信场景中。然而,其实际实现中仍然存在根本挑战,例如随机性利用的有效性、合法用户的低信干噪比等。在这项调查中,我们展示了一个全面的综述,重点是秘密通信的应用、解决方案和未来挑战。具体而言,首先介绍了隐蔽原理和研究类别。然后,综述了现有文献中在不同拓扑网络中的应用以及有效的隐蔽技术。我们还讨论了在未来网络中实施秘密通信的可能性以及公开的挑战。
{"title":"Covert Communications: A Comprehensive Survey","authors":"Xinying Chen;Jianping An;Zehui Xiong;Chengwen Xing;Nan Zhao;F. Richard Yu;Arumugam Nallanathan","doi":"10.1109/COMST.2023.3263921","DOIUrl":"https://doi.org/10.1109/COMST.2023.3263921","url":null,"abstract":"Information security has always been a critical issue in wireless networks. Apart from other secure techniques, covert communication emerges as a potential solution to security for wireless networks owing to its high-security level. In covert communication networks, the transmitter hides the transmitted signals into environmental or artificial noise by introducing randomness to avoid detection at the warden. By eliminating the existence of transmitted signals at the warden, information security can be preserved more solidly than other secure transmission techniques, i.e., without noticing the existence. Due to the promising security protection, covert communication has been successfully utilized in tremendous wireless communication scenarios. However, fundamental challenges in its practical implementation still exist, e.g., the effectiveness of randomness utilization, the low signal-to-interference-plus-noise ratio at legitimate users, etc. In this survey, we demonstrate a comprehensive review concentrating on the applications, solutions, and future challenges of covert communications. Specifically, the covert principle and research categories are first introduced. Then, the applications in the networks with different topologies and the effective covert techniques in the existing literature are reviewed. We also discuss the potential implementation of covert communications in future networks and the open challenges.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 2","pages":"1173-1198"},"PeriodicalIF":35.6,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Tutorial on Immersive Video Delivery: From Omnidirectional Video to Holography 沉浸式视频传输教程:从全方位视频到全息
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-30 DOI: 10.1109/COMST.2023.3263252
Jeroen van der Hooft;Hadi Amirpour;Maria Torres Vega;Yago Sanchez;Raimund Schatz;Thomas Schierl;Christian Timmerer
Video services are evolving from traditional two-dimensional video to virtual reality and holograms, which offer six degrees of freedom to users, enabling them to freely move around in a scene and change focus as desired. However, this increase in freedom translates into stringent requirements in terms of ultra-high bandwidth (in the order of Gigabits per second) and minimal latency (in the order of milliseconds). To realize such immersive services, the network transport, as well as the video representation and encoding, have to be fundamentally enhanced. The purpose of this tutorial article is to provide an elaborate introduction to the creation, streaming, and evaluation of immersive video. Moreover, it aims to provide lessons learned and to point at promising research paths to enable truly interactive immersive video applications toward holography.
视频服务正在从传统的二维视频发展到虚拟现实和全息图,为用户提供六个自由度,使他们能够在场景中自由移动并根据需要改变焦点。然而,这种自由度的增加转化为对超高带宽(以每秒千兆比特为单位)和最小延迟(以毫秒为单位)的严格要求。要实现这种身临其境的服务,必须从根本上增强网络传输以及视频表示和编码。这篇教程文章的目的是详细介绍沉浸式视频的创建、流媒体和评估。此外,它旨在提供经验教训,并指出有希望的研究路径,以实现真正的交互式沉浸式视频全息应用。
{"title":"A Tutorial on Immersive Video Delivery: From Omnidirectional Video to Holography","authors":"Jeroen van der Hooft;Hadi Amirpour;Maria Torres Vega;Yago Sanchez;Raimund Schatz;Thomas Schierl;Christian Timmerer","doi":"10.1109/COMST.2023.3263252","DOIUrl":"https://doi.org/10.1109/COMST.2023.3263252","url":null,"abstract":"Video services are evolving from traditional two-dimensional video to virtual reality and holograms, which offer six degrees of freedom to users, enabling them to freely move around in a scene and change focus as desired. However, this increase in freedom translates into stringent requirements in terms of ultra-high bandwidth (in the order of Gigabits per second) and minimal latency (in the order of milliseconds). To realize such immersive services, the network transport, as well as the video representation and encoding, have to be fundamentally enhanced. The purpose of this tutorial article is to provide an elaborate introduction to the creation, streaming, and evaluation of immersive video. Moreover, it aims to provide lessons learned and to point at promising research paths to enable truly interactive immersive video applications toward holography.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 2","pages":"1336-1375"},"PeriodicalIF":35.6,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions 物联网网络防御的可解释入侵检测:机遇与解决方案
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-26 DOI: 10.1109/COMST.2023.3280465
Nour Moustafa;Nickolaos Koroniotis;Marwa Keshk;Albert Y. Zomaya;Zahir Tari
The field of Explainable Artificial Intelligence (XAI) has garnered considerable research attention in recent years, aiming to provide interpretability and confidence to the inner workings of state-of-the-art deep learning models. However, XAI-enhanced cybersecurity measures in the Internet of Things (IoT) and its sub-domains, require further investigation to provide effective discovery of attack surfaces, their corresponding vectors, and interpretable justification of model outputs. Cyber defence involves operations conducted in the cybersecurity field supporting mission objectives to identify and prevent cyberattacks using various tools and techniques, including intrusion detection systems (IDS), threat intelligence and hunting, and intrusion prevention. In cyber defence, especially anomaly-based IDS, the emerging applications of deep learning models require the interpretation of the models’ architecture and the explanation of models’ prediction to examine how cyberattacks would occur. This paper presents a comprehensive review of XAI techniques for anomaly-based intrusion detection in IoT networks. Firstly, we review IDSs focusing on anomaly-based detection techniques in IoT and how XAI models can augment them to provide trust and confidence in their detections. Secondly, we review AI models, including machine learning (ML) and deep learning (DL), for anomaly detection applications and IoT ecosystems. Moreover, we discuss DL’s ability to effectively learn from large-scale IoT datasets, accomplishing high performances in discovering and interpreting security events. Thirdly, we demonstrate recent research on the intersection of XAI, anomaly-based IDS and IoT. Finally, we discuss the current challenges and solutions of XAI for security applications in the cyber defence perspective of IoT networks, revealing future research directions. By analysing our findings, new cybersecurity applications that require XAI models emerge, assisting decision-makers in understanding and explaining security events in compromised IoT networks.
近年来,可解释人工智能(XAI)领域获得了相当多的研究关注,旨在为最先进的深度学习模型的内部工作提供可解释性和信心。然而,在物联网(IoT)及其子领域中,xai增强的网络安全措施需要进一步调查,以提供有效的攻击面发现,其相应的向量,以及模型输出的可解释理由。网络防御涉及在网络安全领域开展的行动,支持使用各种工具和技术识别和防止网络攻击的任务目标,包括入侵检测系统(IDS)、威胁情报和狩猎以及入侵防御。在网络防御中,特别是基于异常的入侵防御中,深度学习模型的新兴应用需要对模型的架构进行解释,并对模型的预测进行解释,以检查网络攻击将如何发生。本文全面回顾了用于物联网网络中基于异常的入侵检测的XAI技术。首先,我们回顾了专注于物联网中基于异常的检测技术的ids,以及XAI模型如何增强它们以提供对其检测的信任和信心。其次,我们回顾了人工智能模型,包括机器学习(ML)和深度学习(DL),用于异常检测应用和物联网生态系统。此外,我们还讨论了深度学习从大规模物联网数据集中有效学习的能力,从而在发现和解释安全事件方面实现高性能。第三,我们展示了最近关于XAI,基于异常的IDS和物联网交叉的研究。最后,我们从物联网网络防御的角度讨论了当前XAI在安全应用中的挑战和解决方案,揭示了未来的研究方向。通过分析我们的发现,需要XAI模型的新网络安全应用出现了,帮助决策者理解和解释受损物联网网络中的安全事件。
{"title":"Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions","authors":"Nour Moustafa;Nickolaos Koroniotis;Marwa Keshk;Albert Y. Zomaya;Zahir Tari","doi":"10.1109/COMST.2023.3280465","DOIUrl":"https://doi.org/10.1109/COMST.2023.3280465","url":null,"abstract":"The field of Explainable Artificial Intelligence (XAI) has garnered considerable research attention in recent years, aiming to provide interpretability and confidence to the inner workings of state-of-the-art deep learning models. However, XAI-enhanced cybersecurity measures in the Internet of Things (IoT) and its sub-domains, require further investigation to provide effective discovery of attack surfaces, their corresponding vectors, and interpretable justification of model outputs. Cyber defence involves operations conducted in the cybersecurity field supporting mission objectives to identify and prevent cyberattacks using various tools and techniques, including intrusion detection systems (IDS), threat intelligence and hunting, and intrusion prevention. In cyber defence, especially anomaly-based IDS, the emerging applications of deep learning models require the interpretation of the models’ architecture and the explanation of models’ prediction to examine how cyberattacks would occur. This paper presents a comprehensive review of XAI techniques for anomaly-based intrusion detection in IoT networks. Firstly, we review IDSs focusing on anomaly-based detection techniques in IoT and how XAI models can augment them to provide trust and confidence in their detections. Secondly, we review AI models, including machine learning (ML) and deep learning (DL), for anomaly detection applications and IoT ecosystems. Moreover, we discuss DL’s ability to effectively learn from large-scale IoT datasets, accomplishing high performances in discovering and interpreting security events. Thirdly, we demonstrate recent research on the intersection of XAI, anomaly-based IDS and IoT. Finally, we discuss the current challenges and solutions of XAI for security applications in the cyber defence perspective of IoT networks, revealing future research directions. By analysing our findings, new cybersecurity applications that require XAI models emerge, assisting decision-makers in understanding and explaining security events in compromised IoT networks.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1775-1807"},"PeriodicalIF":35.6,"publicationDate":"2023-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Coding Techniques for Backscatter Communications—A Contemporary Survey 后向散射通信的编码技术——当代综述
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-22 DOI: 10.1109/COMST.2023.3259224
Fatemeh Rezaei;Diluka Galappaththige;Chintha Tellambura;Sanjeewa Herath
Backscatter communication (BackCom) networks enable passive/battery-free Internet-of-Thing devices, providing reliable, massive connectivity while ensuring self-sustainability, low maintenance, and low costs. Effective channel codes and decoding algorithms are necessary to achieve these objectives. However, a comprehensive survey/review paper on such techniques for BackCom networks has not been available. This paper aims to fill this gap. Because tags have limited computational resources, traditional coding techniques may not suit them. We first describe the basics of BackCom, channel codes and their relevant design parameters, and codes for general communication networks. We address the BackCom limitations, requirements, and channel characteristics. As conventional codes may not seamlessly move to the BackCom arena, we identify the potential BackCom coding techniques and multiple access schemes. We further highlight potential approaches for addressing code implementation complexity and reliability. Finally, we discuss open issues, challenges, and potential future research directions.
反向散射通信(BackCom)网络实现了无源/无电池的物联网设备,提供了可靠的大规模连接,同时确保了自我可持续性、低维护和低成本。有效的信道编码和解码算法是实现这些目标所必需的。然而,尚未提供一份关于BackCom网络此类技术的全面调查/审查文件。本文旨在填补这一空白。由于标签的计算资源有限,传统的编码技术可能不适合它们。我们首先描述了BackCom的基本原理、信道代码及其相关设计参数,以及通用通信网络的代码。我们解决了BackCom的限制、要求和渠道特征。由于传统编码可能无法无缝转移到BackCom领域,我们确定了潜在的BackCom编码技术和多址方案。我们进一步强调了解决代码实现复杂性和可靠性的潜在方法。最后,我们讨论了悬而未决的问题、挑战和未来潜在的研究方向。
{"title":"Coding Techniques for Backscatter Communications—A Contemporary Survey","authors":"Fatemeh Rezaei;Diluka Galappaththige;Chintha Tellambura;Sanjeewa Herath","doi":"10.1109/COMST.2023.3259224","DOIUrl":"https://doi.org/10.1109/COMST.2023.3259224","url":null,"abstract":"Backscatter communication (BackCom) networks enable passive/battery-free Internet-of-Thing devices, providing reliable, massive connectivity while ensuring self-sustainability, low maintenance, and low costs. Effective channel codes and decoding algorithms are necessary to achieve these objectives. However, a comprehensive survey/review paper on such techniques for BackCom networks has not been available. This paper aims to fill this gap. Because tags have limited computational resources, traditional coding techniques may not suit them. We first describe the basics of BackCom, channel codes and their relevant design parameters, and codes for general communication networks. We address the BackCom limitations, requirements, and channel characteristics. As conventional codes may not seamlessly move to the BackCom arena, we identify the potential BackCom coding techniques and multiple access schemes. We further highlight potential approaches for addressing code implementation complexity and reliability. Finally, we discuss open issues, challenges, and potential future research directions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 2","pages":"1020-1058"},"PeriodicalIF":35.6,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Corrections to “On the Capacity of Intensity-Modulation Direct-Detection Gaussian Optical Wireless Communication Channels: A Tutorial” 对《论调强直接检测高斯光无线通信信道的容量:教程》的修正
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-22 DOI: 10.1109/COMST.2022.3214905
Anas Chaaban;Zouheir Rezki;Mohamed-Slim Alouini
In the above article [1], equations (116) and (122) appeared with errors. The correct equations and affected text follow.
在上述文章[1]中,方程(116)和(122)出现了错误。下面是正确的方程式和受影响的文本。
{"title":"Corrections to “On the Capacity of Intensity-Modulation Direct-Detection Gaussian Optical Wireless Communication Channels: A Tutorial”","authors":"Anas Chaaban;Zouheir Rezki;Mohamed-Slim Alouini","doi":"10.1109/COMST.2022.3214905","DOIUrl":"https://doi.org/10.1109/COMST.2022.3214905","url":null,"abstract":"In the above article \u0000<xref>[1]</xref>\u0000, \u0000<xref>equations (116)</xref>\u0000 and \u0000<xref>(122)</xref>\u0000 appeared with errors. The correct equations and affected text follow.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 2","pages":"1444-1444"},"PeriodicalIF":35.6,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9739/10130694/10130701.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial: Second Quarter 2023 IEEE Communications Surveys and Tutorials 编辑:第二季度2023 IEEE通信调查和教程
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-22 DOI: 10.1109/COMST.2023.3270753
Dusit Niyato
I welcome you to the second issue of the IEEE Communications Surveys and Tutorials in 2023. This issue includes 15 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications,” “Cyber Security,” “Internet Technologies,” “Network and Service Management and Green Communications,” “Multimedia Communications,” “Network Virtualization” and “Optical Communications.” A brief account for each of these papers is given below.
我欢迎您参加2023年第二期IEEE通信调查和教程。本期包括15篇涉及通信网络不同方面的论文。特别是,这些文章调查并指导了《无线通信》、《网络安全》、《互联网技术》、《网路与服务管理与绿色通信》、“多媒体通信”、“网络虚拟化”和“光通信”中的各种问题。下面简要介绍了每篇论文。
{"title":"Editorial: Second Quarter 2023 IEEE Communications Surveys and Tutorials","authors":"Dusit Niyato","doi":"10.1109/COMST.2023.3270753","DOIUrl":"https://doi.org/10.1109/COMST.2023.3270753","url":null,"abstract":"I welcome you to the second issue of the IEEE Communications Surveys and Tutorials in 2023. This issue includes 15 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications,” “Cyber Security,” “Internet Technologies,” “Network and Service Management and Green Communications,” “Multimedia Communications,” “Network Virtualization” and “Optical Communications.” A brief account for each of these papers is given below.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 2","pages":"i-v"},"PeriodicalIF":35.6,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9739/10130694/10130703.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49953123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Backscatter Communication Meets Practical Battery-Free Internet of Things: A Survey and Outlook 后向散射通信满足实用无电池物联网:调查与展望
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-19 DOI: 10.1109/COMST.2023.3278239
Tao Jiang;Yu Zhang;Wenyuan Ma;Miaoran Peng;Yuxiang Peng;Mingjie Feng;Guanghua Liu
Battery-free Internet-of-Things (BF-IoT), which is realized by harvesting ambient energy to power the IoT devices, has emerged to reduce the energy consumption, and alleviate environmental concerns caused by extensive battery usage. However, current wireless technologies for IoT, such as Bluetooth, ZigBee, and long range radio (LoRa), cannot be efficiently supported by ambient energy due to high power requirement, making them unfit for BF-IoT applications. Backscatter communication (BackCom) is a promising enabling technology for BF-IoT as it achieves microwatt power consumption by eliminating the need of power-hungry radio components such as analog to digital converters. The integration of BF-IoT and BackCom is expected to revolutionize IoT applications and has attracted significant attention recently. However, several fundamental issues need to be addressed to fully harvest the potential of such integration. In this article, we conduct a comprehensive and in-depth survey of BackCom enabled BF-IoT (BackCom-BF-IoT), aiming to provide useful guidance for future research and application from a practical perspective. Specifically, we first introduce the basics of BackCom-BF-IoT by presenting its hardware architecture and key components. Then, we review the existing BackCom-BF-IoT prototypes, from which four fundamental issues related to BackCom are discussed, including link performance enhancement, multi-device concurrent transmission, security guarantee, and interplay between BackCom-BF-IoT system and ambient RF communication systems. For each fundamental issue, we thoroughly review state-of-the-art advances and discuss their prospects for practical BF-IoT applications. Finally, we provide an outlook of future research directions and several case studies.
无电池物联网(BF IoT)是通过收集环境能量为物联网设备供电来实现的,它已经出现,以减少能源消耗,缓解因大量使用电池而引起的环境问题。然而,当前用于物联网的无线技术,如蓝牙、ZigBee和远程无线电(LoRa),由于高功率要求,无法由环境能源有效支持,使其不适合BF物联网应用。反向散射通信(BackCom)是BF IoT的一种很有前途的使能技术,因为它通过消除对模数转换器等耗电无线电组件的需求来实现微瓦功耗。BF IoT和BackCom的集成有望彻底改变IoT应用,并在最近引起了极大的关注。然而,需要解决几个根本问题,以充分挖掘这种一体化的潜力。在本文中,我们对支持BackCom的BF IoT(BackCom BF IoT)进行了全面深入的调查,旨在从实践的角度为未来的研究和应用提供有用的指导。具体来说,我们首先介绍了BackCom BF IoT的基础知识,介绍了其硬件架构和关键组件。然后,我们回顾了现有的BackCom BF物联网原型,从中讨论了与BackCom相关的四个基本问题,包括链路性能增强、多设备并发传输、安全保障以及BackCom BF-IoT系统与环境RF通信系统之间的相互作用。对于每一个基本问题,我们都会全面回顾最先进的进展,并讨论它们在实际BF物联网应用中的前景。最后,我们对未来的研究方向进行了展望,并进行了几个案例研究。
{"title":"Backscatter Communication Meets Practical Battery-Free Internet of Things: A Survey and Outlook","authors":"Tao Jiang;Yu Zhang;Wenyuan Ma;Miaoran Peng;Yuxiang Peng;Mingjie Feng;Guanghua Liu","doi":"10.1109/COMST.2023.3278239","DOIUrl":"https://doi.org/10.1109/COMST.2023.3278239","url":null,"abstract":"Battery-free Internet-of-Things (BF-IoT), which is realized by harvesting ambient energy to power the IoT devices, has emerged to reduce the energy consumption, and alleviate environmental concerns caused by extensive battery usage. However, current wireless technologies for IoT, such as Bluetooth, ZigBee, and long range radio (LoRa), cannot be efficiently supported by ambient energy due to high power requirement, making them unfit for BF-IoT applications. Backscatter communication (BackCom) is a promising enabling technology for BF-IoT as it achieves microwatt power consumption by eliminating the need of power-hungry radio components such as analog to digital converters. The integration of BF-IoT and BackCom is expected to revolutionize IoT applications and has attracted significant attention recently. However, several fundamental issues need to be addressed to fully harvest the potential of such integration. In this article, we conduct a comprehensive and in-depth survey of BackCom enabled BF-IoT (BackCom-BF-IoT), aiming to provide useful guidance for future research and application from a practical perspective. Specifically, we first introduce the basics of BackCom-BF-IoT by presenting its hardware architecture and key components. Then, we review the existing BackCom-BF-IoT prototypes, from which four fundamental issues related to BackCom are discussed, including link performance enhancement, multi-device concurrent transmission, security guarantee, and interplay between BackCom-BF-IoT system and ambient RF communication systems. For each fundamental issue, we thoroughly review state-of-the-art advances and discuss their prospects for practical BF-IoT applications. Finally, we provide an outlook of future research directions and several case studies.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"2021-2051"},"PeriodicalIF":35.6,"publicationDate":"2023-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Artificial Intelligence of Things for Smarter Healthcare: A Survey of Advancements, Challenges, and Opportunities 面向更智能医疗的物联网人工智能:进展、挑战和机遇调查
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-13 DOI: 10.1109/COMST.2023.3256323
Stephanie Baker;Wei Xiang
Healthcare systems are under increasing strain due to a myriad of factors, from a steadily ageing global population to the current COVID-19 pandemic. In a world where we have needed to be connected but apart, the need for enhanced remote and at-home healthcare has become clear. The Internet of Things (IoT) offers a promising solution. The IoT has created a highly connected world, with billions of devices collecting and communicating data from a range of applications, including healthcare. Due to these high volumes of data, a natural synergy with Artificial Intelligence (AI) has become apparent - big data both enables and requires AI to interpret, understand, and make decisions that provide optimal outcomes. In this extensive survey, we thoroughly explore this synergy through an examination of the field of the Artificial Intelligence of Things (AIoT) for healthcare. This work begins by briefly establishing a unified architecture of AIoT in a healthcare context, including sensors and devices, novel communication technologies, and cross-layer AI. We then examine recent research pertaining to each component of the AIoT architecture from several key perspectives, identifying promising technologies, challenges, and opportunities that are unique to healthcare. Several examples of real-world AIoT healthcare use cases are then presented to illustrate the potential of these technologies. Lastly, this work outlines promising directions for future research in AIoT for healthcare.
从全球人口稳步老龄化到当前的新冠肺炎大流行,由于多种因素,医疗保健系统正面临越来越大的压力。在一个我们需要联系但又需要分开的世界里,对增强远程和家庭医疗保健的需求已经变得显而易见。物联网(IoT)提供了一个很有前景的解决方案。物联网创造了一个高度互联的世界,数十亿台设备从包括医疗保健在内的一系列应用程序中收集和通信数据。由于这些大量的数据,与人工智能(AI)的自然协同作用已经变得明显——大数据使人工智能能够并需要人工智能来解释、理解和做出提供最佳结果的决策。在这项广泛的调查中,我们通过对医疗保健人工智能(AIoT)领域的研究,深入探讨了这种协同作用。这项工作首先简要建立了医疗保健背景下AIoT的统一架构,包括传感器和设备、新型通信技术和跨层人工智能。然后,我们从几个关键角度审视了与AIoT架构的每个组件相关的最新研究,确定了医疗保健特有的有前景的技术、挑战和机遇。然后介绍了几个真实世界AIoT医疗保健用例的例子,以说明这些技术的潜力。最后,这项工作概述了未来医疗保健AIoT研究的有希望的方向。
{"title":"Artificial Intelligence of Things for Smarter Healthcare: A Survey of Advancements, Challenges, and Opportunities","authors":"Stephanie Baker;Wei Xiang","doi":"10.1109/COMST.2023.3256323","DOIUrl":"https://doi.org/10.1109/COMST.2023.3256323","url":null,"abstract":"Healthcare systems are under increasing strain due to a myriad of factors, from a steadily ageing global population to the current COVID-19 pandemic. In a world where we have needed to be connected but apart, the need for enhanced remote and at-home healthcare has become clear. The Internet of Things (IoT) offers a promising solution. The IoT has created a highly connected world, with billions of devices collecting and communicating data from a range of applications, including healthcare. Due to these high volumes of data, a natural synergy with Artificial Intelligence (AI) has become apparent - big data both enables and requires AI to interpret, understand, and make decisions that provide optimal outcomes. In this extensive survey, we thoroughly explore this synergy through an examination of the field of the Artificial Intelligence of Things (AIoT) for healthcare. This work begins by briefly establishing a unified architecture of AIoT in a healthcare context, including sensors and devices, novel communication technologies, and cross-layer AI. We then examine recent research pertaining to each component of the AIoT architecture from several key perspectives, identifying promising technologies, challenges, and opportunities that are unique to healthcare. Several examples of real-world AIoT healthcare use cases are then presented to illustrate the potential of these technologies. Lastly, this work outlines promising directions for future research in AIoT for healthcare.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 2","pages":"1261-1293"},"PeriodicalIF":35.6,"publicationDate":"2023-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9739/10130694/10066875.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Survey on Scalable LoRaWAN for Massive IoT: Recent Advances, Potentials, and Challenges 大规模物联网可扩展LoRaWAN调查:最新进展、潜力和挑战
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-10 DOI: 10.1109/COMST.2023.3274934
Mohammed Jouhari;Nasir Saeed;Mohamed-Slim Alouini;El Mehdi Amhoud
Long-range (LoRa) technology is most widely used for enabling low-power wide area networks (WANs) on unlicensed frequency bands. Despite its modest data rates, it provides extensive coverage for low-power devices, making it an ideal communication system for many Internet of Things (IoT) applications. In general, LoRa is considered as the physical layer, whereas LoRaWAN is the medium access control (MAC) layer of the LoRa stack that adopts a star topology to enable communication between multiple end devices (EDs) and the network gateway. The chirp spread spectrum modulation deals with LoRa signal interference and ensures long-range communication. At the same time, the adaptive data rate mechanism allows EDs to dynamically alter some LoRa features, such as the spreading factor (SF), code rate, and carrier frequency to address the time variance of communication conditions in dense networks. Despite the high LoRa connectivity demand, LoRa signals interference and concurrent transmission collisions are major limitations. Therefore, to enhance LoRaWAN capacity, the LoRa Alliance released many LoRaWAN versions, and the research community has provided numerous solutions to develop scalable LoRaWAN technology. Hence, we thoroughly examine LoRaWAN scalability challenges and state-of-the-art solutions in both the physical and MAC layers. These solutions primarily rely on SF, logical, and frequency channel assignment, whereas others propose new network topologies or implement signal processing schemes to cancel the interference and allow LoRaWAN to connect more EDs efficiently. A summary of the existing solutions in the literature is provided at the end of the paper, describing the advantages and disadvantages of each solution and suggesting possible enhancements as future research directions.
远程(LoRa)技术最广泛地用于在未经许可的频段上实现低功耗广域网(wan)。尽管数据速率适中,但它为低功耗设备提供了广泛的覆盖范围,使其成为许多物联网(IoT)应用的理想通信系统。通常将LoRa视为物理层,而LoRaWAN则是LoRa堆栈的MAC层,采用星型拓扑结构,实现多个终端设备与网络网关之间的通信。啁啾扩频调制处理LoRa信号干扰,保证远程通信。同时,自适应的数据速率机制允许ed动态改变一些LoRa特性,如扩频因子(SF)、码率和载波频率,以解决密集网络中通信条件的时变问题。尽管LoRa连接需求很高,但LoRa信号干扰和并发传输冲突是主要的限制因素。因此,为了增强LoRaWAN的能力,LoRa联盟发布了许多版本的LoRaWAN,研究团体也提供了许多解决方案来开发可扩展的LoRaWAN技术。因此,我们将全面研究LoRaWAN在物理层和MAC层的可伸缩性挑战和最先进的解决方案。这些解决方案主要依赖于SF、逻辑和频率通道分配,而其他解决方案则提出新的网络拓扑结构或实施信号处理方案来消除干扰,并允许LoRaWAN有效地连接更多的ed。在论文的最后,对文献中现有的解决方案进行了总结,描述了每种解决方案的优缺点,并提出了可能的改进作为未来的研究方向。
{"title":"A Survey on Scalable LoRaWAN for Massive IoT: Recent Advances, Potentials, and Challenges","authors":"Mohammed Jouhari;Nasir Saeed;Mohamed-Slim Alouini;El Mehdi Amhoud","doi":"10.1109/COMST.2023.3274934","DOIUrl":"https://doi.org/10.1109/COMST.2023.3274934","url":null,"abstract":"Long-range (LoRa) technology is most widely used for enabling low-power wide area networks (WANs) on unlicensed frequency bands. Despite its modest data rates, it provides extensive coverage for low-power devices, making it an ideal communication system for many Internet of Things (IoT) applications. In general, LoRa is considered as the physical layer, whereas LoRaWAN is the medium access control (MAC) layer of the LoRa stack that adopts a star topology to enable communication between multiple end devices (EDs) and the network gateway. The chirp spread spectrum modulation deals with LoRa signal interference and ensures long-range communication. At the same time, the adaptive data rate mechanism allows EDs to dynamically alter some LoRa features, such as the spreading factor (SF), code rate, and carrier frequency to address the time variance of communication conditions in dense networks. Despite the high LoRa connectivity demand, LoRa signals interference and concurrent transmission collisions are major limitations. Therefore, to enhance LoRaWAN capacity, the LoRa Alliance released many LoRaWAN versions, and the research community has provided numerous solutions to develop scalable LoRaWAN technology. Hence, we thoroughly examine LoRaWAN scalability challenges and state-of-the-art solutions in both the physical and MAC layers. These solutions primarily rely on SF, logical, and frequency channel assignment, whereas others propose new network topologies or implement signal processing schemes to cancel the interference and allow LoRaWAN to connect more EDs efficiently. A summary of the existing solutions in the literature is provided at the end of the paper, describing the advantages and disadvantages of each solution and suggesting possible enhancements as future research directions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1841-1876"},"PeriodicalIF":35.6,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
A Concise Tutorial on Traffic Shaping and Scheduling in Time-Sensitive Networks 时间敏感网络中流量整形和调度的简明教程
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-10 DOI: 10.1109/COMST.2023.3275038
Yeongjae Kim
Over the last two decades, IEEE has been defining standards for Time-Sensitive Networking (TSN). These standards combine traffic shaping and scheduling mechanisms to guarantee bounded delays across an Ethernet network. Time-Sensitive Networks are designed for applications where delays are critical, such as process control, networks for vehicles and aircraft, and virtual reality applications. Many industrial companies are currently actively implementing TSN standards. The goal of this paper is to provide a concise and self-contained description of the TSN mechanisms and how they affect the network performance metrics. The paper is intended for practicing engineers wanting to improve their understanding of TSN and for students curious about these mechanisms.
在过去的二十年里,IEEE一直在为时间敏感网络(TSN)定义标准。这些标准结合了流量整形和调度机制,以保证以太网中的有界延迟。时间敏感网络是为延迟至关重要的应用而设计的,如过程控制、车辆和飞机网络以及虚拟现实应用。许多工业公司目前正在积极实施TSN标准。本文的目标是对TSN机制及其如何影响网络性能指标进行简洁而独立的描述。本文旨在为希望提高对TSN理解的实习工程师和对这些机制好奇的学生提供帮助。
{"title":"A Concise Tutorial on Traffic Shaping and Scheduling in Time-Sensitive Networks","authors":"Yeongjae Kim","doi":"10.1109/COMST.2023.3275038","DOIUrl":"https://doi.org/10.1109/COMST.2023.3275038","url":null,"abstract":"Over the last two decades, IEEE has been defining standards for Time-Sensitive Networking (TSN). These standards combine traffic shaping and scheduling mechanisms to guarantee bounded delays across an Ethernet network. Time-Sensitive Networks are designed for applications where delays are critical, such as process control, networks for vehicles and aircraft, and virtual reality applications. Many industrial companies are currently actively implementing TSN standards. The goal of this paper is to provide a concise and self-contained description of the TSN mechanisms and how they affect the network performance metrics. The paper is intended for practicing engineers wanting to improve their understanding of TSN and for students curious about these mechanisms.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1941-1953"},"PeriodicalIF":35.6,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Communications Surveys and Tutorials
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1