首页 > 最新文献

IEEE Communications Surveys and Tutorials最新文献

英文 中文
A Survey on Over-the-Air Computation 无线计算研究综述
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-04-05 DOI: 10.1109/COMST.2023.3264649
Alphan Şahin;Rui Yang
Communication and computation are often viewed as separate tasks. This approach is very effective from the perspective of engineering as isolated optimizations can be performed. However, for many computation-oriented applications, the main interest is a function of the local information at the devices, rather than the local information itself. In such scenarios, information theoretical results show that harnessing the interference in a multiple access channel for computation, i.e., over-the-air computation (OAC), can provide a significantly higher achievable computation rate than separating communication and computation tasks. Moreover, the gap between OAC and separation in terms of computation rate increases with more participating nodes. Given this motivation, in this study, we provide a comprehensive survey on practical OAC methods. After outlining fundamentals related to OAC, we discuss the available OAC schemes with their pros and cons. We provide an overview of the enabling mechanisms for achieving reliable computation in the wireless channel. Finally, we summarize the potential applications of OAC and point out some future directions.
通信和计算通常被看作是独立的任务。从工程的角度来看,这种方法非常有效,因为可以执行孤立的优化。然而,对于许多面向计算的应用程序,主要关注的是设备上本地信息的功能,而不是本地信息本身。在这种情况下,信息理论结果表明,利用多址信道中的干扰进行计算,即空中计算(OAC),可以提供比分离通信和计算任务更高的可实现计算率。而且,随着参与节点的增加,OAC与分离在计算率上的差距也会增大。鉴于这一动机,在本研究中,我们对实用的OAC方法进行了全面的调查。在概述了与OAC相关的基础知识之后,我们讨论了可用的OAC方案及其优缺点。我们概述了在无线信道中实现可靠计算的启用机制。最后,总结了OAC的应用前景,并指出了未来的发展方向。
{"title":"A Survey on Over-the-Air Computation","authors":"Alphan Şahin;Rui Yang","doi":"10.1109/COMST.2023.3264649","DOIUrl":"https://doi.org/10.1109/COMST.2023.3264649","url":null,"abstract":"Communication and computation are often viewed as separate tasks. This approach is very effective from the perspective of engineering as isolated optimizations can be performed. However, for many computation-oriented applications, the main interest is a function of the local information at the devices, rather than the local information itself. In such scenarios, information theoretical results show that harnessing the interference in a multiple access channel for computation, i.e., over-the-air computation (OAC), can provide a significantly higher achievable computation rate than separating communication and computation tasks. Moreover, the gap between OAC and separation in terms of computation rate increases with more participating nodes. Given this motivation, in this study, we provide a comprehensive survey on practical OAC methods. After outlining fundamentals related to OAC, we discuss the available OAC schemes with their pros and cons. We provide an overview of the enabling mechanisms for achieving reliable computation in the wireless channel. Finally, we summarize the potential applications of OAC and point out some future directions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1877-1908"},"PeriodicalIF":35.6,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Survey on Controller Area Network Reverse Engineering 控制器区域网络逆向工程综述
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-04-05 DOI: 10.1109/COMST.2023.3264928
Alessio Buscemi;Ion Turcanu;German Castignani;Andriy Panchenko;Thomas Engel;Kang G. Shin
Controller Area Network (CAN) is a masterless serial bus designed and widely used for the exchange of mission and time-critical information within commercial vehicles. In-vehicle communication is based on messages sent and received by Electronic Control Units (ECUs) connected to this serial bus network. Although unencrypted, CAN messages are not easy to interpret. In fact, Original Equipment Manufacturers (OEMs) attempt to achieve security through obscurity by encoding the data in their proprietary format, which is kept secret from the general public. As a result, the only way to obtain clear data is to reverse engineer CAN messages. Driven by the need for in-vehicle message interpretation, which is highly valuable in the automotive industry, researchers and companies have been working to make this process automated, fast, and standardized. In this paper, we provide a comprehensive review of the state of the art and summarize the major advances in CAN bus reverse engineering. We are the first to provide a taxonomy of CAN tokenization and translation techniques. Based on the reviewed literature, we highlight an important issue: the lack of a public and standardized dataset for the quantitative evaluation of translation algorithms. In response, we define a complete set of requirements for standardizing the data collection process. We also investigate the risks associated with the automation of CAN reverse engineering, in particular with respect to the security network and the safety and privacy of drivers and passengers. Finally, we discuss future research directions in CAN reverse engineering.
控制器局域网(CAN)是一种无主串行总线,设计并广泛用于商用车内任务和时间关键信息的交换。车载通信基于连接到此串行总线网络的电子控制单元(ECU)发送和接收的信息。虽然未加密,但CAN消息并不容易解释。事实上,原始设备制造商(OEM)试图通过以其专有格式对数据进行编码来实现隐蔽性,而这种格式对公众保密。因此,获得清晰数据的唯一方法是对CAN消息进行逆向工程。在汽车行业极具价值的车内信息解释需求的推动下,研究人员和公司一直在努力使这一过程自动化、快速和标准化。在本文中,我们全面回顾了CAN总线逆向工程的现状,并总结了CAN总线反向工程的主要进展。我们是第一个提供CAN标记化和翻译技术的分类。基于回顾的文献,我们强调了一个重要问题:缺乏一个用于定量评估翻译算法的公共和标准化数据集。作为回应,我们定义了一整套标准化数据收集过程的要求。我们还调查了与CAN逆向工程自动化相关的风险,特别是在安全网络以及驾驶员和乘客的安全和隐私方面。最后,我们讨论了CAN逆向工程的未来研究方向。
{"title":"A Survey on Controller Area Network Reverse Engineering","authors":"Alessio Buscemi;Ion Turcanu;German Castignani;Andriy Panchenko;Thomas Engel;Kang G. Shin","doi":"10.1109/COMST.2023.3264928","DOIUrl":"https://doi.org/10.1109/COMST.2023.3264928","url":null,"abstract":"Controller Area Network (CAN) is a masterless serial bus designed and widely used for the exchange of mission and time-critical information within commercial vehicles. In-vehicle communication is based on messages sent and received by Electronic Control Units (ECUs) connected to this serial bus network. Although unencrypted, CAN messages are not easy to interpret. In fact, Original Equipment Manufacturers (OEMs) attempt to achieve security through obscurity by encoding the data in their proprietary format, which is kept secret from the general public. As a result, the only way to obtain clear data is to reverse engineer CAN messages. Driven by the need for in-vehicle message interpretation, which is highly valuable in the automotive industry, researchers and companies have been working to make this process automated, fast, and standardized. In this paper, we provide a comprehensive review of the state of the art and summarize the major advances in CAN bus reverse engineering. We are the first to provide a taxonomy of CAN tokenization and translation techniques. Based on the reviewed literature, we highlight an important issue: the lack of a public and standardized dataset for the quantitative evaluation of translation algorithms. In response, we define a complete set of requirements for standardizing the data collection process. We also investigate the risks associated with the automation of CAN reverse engineering, in particular with respect to the security network and the safety and privacy of drivers and passengers. Finally, we discuss future research directions in CAN reverse engineering.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1445-1481"},"PeriodicalIF":35.6,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Covert Communications: A Comprehensive Survey 秘密通信:综合调查
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-04-03 DOI: 10.1109/COMST.2023.3263921
Xinying Chen;Jianping An;Zehui Xiong;Chengwen Xing;Nan Zhao;F. Richard Yu;Arumugam Nallanathan
Information security has always been a critical issue in wireless networks. Apart from other secure techniques, covert communication emerges as a potential solution to security for wireless networks owing to its high-security level. In covert communication networks, the transmitter hides the transmitted signals into environmental or artificial noise by introducing randomness to avoid detection at the warden. By eliminating the existence of transmitted signals at the warden, information security can be preserved more solidly than other secure transmission techniques, i.e., without noticing the existence. Due to the promising security protection, covert communication has been successfully utilized in tremendous wireless communication scenarios. However, fundamental challenges in its practical implementation still exist, e.g., the effectiveness of randomness utilization, the low signal-to-interference-plus-noise ratio at legitimate users, etc. In this survey, we demonstrate a comprehensive review concentrating on the applications, solutions, and future challenges of covert communications. Specifically, the covert principle and research categories are first introduced. Then, the applications in the networks with different topologies and the effective covert techniques in the existing literature are reviewed. We also discuss the potential implementation of covert communications in future networks and the open challenges.
信息安全一直是无线网络中的一个关键问题。除了其他安全技术外,隐蔽通信由于其高安全级别而成为无线网络安全的潜在解决方案。在隐蔽通信网络中,发射机通过引入随机性将传输的信号隐藏在环境或人工噪声中,以避免在监狱长处被检测到。通过消除监狱长处传输信号的存在,可以比其他安全传输技术更稳固地保持信息安全,即在不注意到存在的情况下。由于隐蔽通信具有良好的安全保护性能,已成功应用于各种无线通信场景中。然而,其实际实现中仍然存在根本挑战,例如随机性利用的有效性、合法用户的低信干噪比等。在这项调查中,我们展示了一个全面的综述,重点是秘密通信的应用、解决方案和未来挑战。具体而言,首先介绍了隐蔽原理和研究类别。然后,综述了现有文献中在不同拓扑网络中的应用以及有效的隐蔽技术。我们还讨论了在未来网络中实施秘密通信的可能性以及公开的挑战。
{"title":"Covert Communications: A Comprehensive Survey","authors":"Xinying Chen;Jianping An;Zehui Xiong;Chengwen Xing;Nan Zhao;F. Richard Yu;Arumugam Nallanathan","doi":"10.1109/COMST.2023.3263921","DOIUrl":"https://doi.org/10.1109/COMST.2023.3263921","url":null,"abstract":"Information security has always been a critical issue in wireless networks. Apart from other secure techniques, covert communication emerges as a potential solution to security for wireless networks owing to its high-security level. In covert communication networks, the transmitter hides the transmitted signals into environmental or artificial noise by introducing randomness to avoid detection at the warden. By eliminating the existence of transmitted signals at the warden, information security can be preserved more solidly than other secure transmission techniques, i.e., without noticing the existence. Due to the promising security protection, covert communication has been successfully utilized in tremendous wireless communication scenarios. However, fundamental challenges in its practical implementation still exist, e.g., the effectiveness of randomness utilization, the low signal-to-interference-plus-noise ratio at legitimate users, etc. In this survey, we demonstrate a comprehensive review concentrating on the applications, solutions, and future challenges of covert communications. Specifically, the covert principle and research categories are first introduced. Then, the applications in the networks with different topologies and the effective covert techniques in the existing literature are reviewed. We also discuss the potential implementation of covert communications in future networks and the open challenges.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 2","pages":"1173-1198"},"PeriodicalIF":35.6,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Tutorial on Immersive Video Delivery: From Omnidirectional Video to Holography 沉浸式视频传输教程:从全方位视频到全息
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-30 DOI: 10.1109/COMST.2023.3263252
Jeroen van der Hooft;Hadi Amirpour;Maria Torres Vega;Yago Sanchez;Raimund Schatz;Thomas Schierl;Christian Timmerer
Video services are evolving from traditional two-dimensional video to virtual reality and holograms, which offer six degrees of freedom to users, enabling them to freely move around in a scene and change focus as desired. However, this increase in freedom translates into stringent requirements in terms of ultra-high bandwidth (in the order of Gigabits per second) and minimal latency (in the order of milliseconds). To realize such immersive services, the network transport, as well as the video representation and encoding, have to be fundamentally enhanced. The purpose of this tutorial article is to provide an elaborate introduction to the creation, streaming, and evaluation of immersive video. Moreover, it aims to provide lessons learned and to point at promising research paths to enable truly interactive immersive video applications toward holography.
视频服务正在从传统的二维视频发展到虚拟现实和全息图,为用户提供六个自由度,使他们能够在场景中自由移动并根据需要改变焦点。然而,这种自由度的增加转化为对超高带宽(以每秒千兆比特为单位)和最小延迟(以毫秒为单位)的严格要求。要实现这种身临其境的服务,必须从根本上增强网络传输以及视频表示和编码。这篇教程文章的目的是详细介绍沉浸式视频的创建、流媒体和评估。此外,它旨在提供经验教训,并指出有希望的研究路径,以实现真正的交互式沉浸式视频全息应用。
{"title":"A Tutorial on Immersive Video Delivery: From Omnidirectional Video to Holography","authors":"Jeroen van der Hooft;Hadi Amirpour;Maria Torres Vega;Yago Sanchez;Raimund Schatz;Thomas Schierl;Christian Timmerer","doi":"10.1109/COMST.2023.3263252","DOIUrl":"https://doi.org/10.1109/COMST.2023.3263252","url":null,"abstract":"Video services are evolving from traditional two-dimensional video to virtual reality and holograms, which offer six degrees of freedom to users, enabling them to freely move around in a scene and change focus as desired. However, this increase in freedom translates into stringent requirements in terms of ultra-high bandwidth (in the order of Gigabits per second) and minimal latency (in the order of milliseconds). To realize such immersive services, the network transport, as well as the video representation and encoding, have to be fundamentally enhanced. The purpose of this tutorial article is to provide an elaborate introduction to the creation, streaming, and evaluation of immersive video. Moreover, it aims to provide lessons learned and to point at promising research paths to enable truly interactive immersive video applications toward holography.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 2","pages":"1336-1375"},"PeriodicalIF":35.6,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions 物联网网络防御的可解释入侵检测:机遇与解决方案
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-26 DOI: 10.1109/COMST.2023.3280465
Nour Moustafa;Nickolaos Koroniotis;Marwa Keshk;Albert Y. Zomaya;Zahir Tari
The field of Explainable Artificial Intelligence (XAI) has garnered considerable research attention in recent years, aiming to provide interpretability and confidence to the inner workings of state-of-the-art deep learning models. However, XAI-enhanced cybersecurity measures in the Internet of Things (IoT) and its sub-domains, require further investigation to provide effective discovery of attack surfaces, their corresponding vectors, and interpretable justification of model outputs. Cyber defence involves operations conducted in the cybersecurity field supporting mission objectives to identify and prevent cyberattacks using various tools and techniques, including intrusion detection systems (IDS), threat intelligence and hunting, and intrusion prevention. In cyber defence, especially anomaly-based IDS, the emerging applications of deep learning models require the interpretation of the models’ architecture and the explanation of models’ prediction to examine how cyberattacks would occur. This paper presents a comprehensive review of XAI techniques for anomaly-based intrusion detection in IoT networks. Firstly, we review IDSs focusing on anomaly-based detection techniques in IoT and how XAI models can augment them to provide trust and confidence in their detections. Secondly, we review AI models, including machine learning (ML) and deep learning (DL), for anomaly detection applications and IoT ecosystems. Moreover, we discuss DL’s ability to effectively learn from large-scale IoT datasets, accomplishing high performances in discovering and interpreting security events. Thirdly, we demonstrate recent research on the intersection of XAI, anomaly-based IDS and IoT. Finally, we discuss the current challenges and solutions of XAI for security applications in the cyber defence perspective of IoT networks, revealing future research directions. By analysing our findings, new cybersecurity applications that require XAI models emerge, assisting decision-makers in understanding and explaining security events in compromised IoT networks.
近年来,可解释人工智能(XAI)领域获得了相当多的研究关注,旨在为最先进的深度学习模型的内部工作提供可解释性和信心。然而,在物联网(IoT)及其子领域中,xai增强的网络安全措施需要进一步调查,以提供有效的攻击面发现,其相应的向量,以及模型输出的可解释理由。网络防御涉及在网络安全领域开展的行动,支持使用各种工具和技术识别和防止网络攻击的任务目标,包括入侵检测系统(IDS)、威胁情报和狩猎以及入侵防御。在网络防御中,特别是基于异常的入侵防御中,深度学习模型的新兴应用需要对模型的架构进行解释,并对模型的预测进行解释,以检查网络攻击将如何发生。本文全面回顾了用于物联网网络中基于异常的入侵检测的XAI技术。首先,我们回顾了专注于物联网中基于异常的检测技术的ids,以及XAI模型如何增强它们以提供对其检测的信任和信心。其次,我们回顾了人工智能模型,包括机器学习(ML)和深度学习(DL),用于异常检测应用和物联网生态系统。此外,我们还讨论了深度学习从大规模物联网数据集中有效学习的能力,从而在发现和解释安全事件方面实现高性能。第三,我们展示了最近关于XAI,基于异常的IDS和物联网交叉的研究。最后,我们从物联网网络防御的角度讨论了当前XAI在安全应用中的挑战和解决方案,揭示了未来的研究方向。通过分析我们的发现,需要XAI模型的新网络安全应用出现了,帮助决策者理解和解释受损物联网网络中的安全事件。
{"title":"Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions","authors":"Nour Moustafa;Nickolaos Koroniotis;Marwa Keshk;Albert Y. Zomaya;Zahir Tari","doi":"10.1109/COMST.2023.3280465","DOIUrl":"https://doi.org/10.1109/COMST.2023.3280465","url":null,"abstract":"The field of Explainable Artificial Intelligence (XAI) has garnered considerable research attention in recent years, aiming to provide interpretability and confidence to the inner workings of state-of-the-art deep learning models. However, XAI-enhanced cybersecurity measures in the Internet of Things (IoT) and its sub-domains, require further investigation to provide effective discovery of attack surfaces, their corresponding vectors, and interpretable justification of model outputs. Cyber defence involves operations conducted in the cybersecurity field supporting mission objectives to identify and prevent cyberattacks using various tools and techniques, including intrusion detection systems (IDS), threat intelligence and hunting, and intrusion prevention. In cyber defence, especially anomaly-based IDS, the emerging applications of deep learning models require the interpretation of the models’ architecture and the explanation of models’ prediction to examine how cyberattacks would occur. This paper presents a comprehensive review of XAI techniques for anomaly-based intrusion detection in IoT networks. Firstly, we review IDSs focusing on anomaly-based detection techniques in IoT and how XAI models can augment them to provide trust and confidence in their detections. Secondly, we review AI models, including machine learning (ML) and deep learning (DL), for anomaly detection applications and IoT ecosystems. Moreover, we discuss DL’s ability to effectively learn from large-scale IoT datasets, accomplishing high performances in discovering and interpreting security events. Thirdly, we demonstrate recent research on the intersection of XAI, anomaly-based IDS and IoT. Finally, we discuss the current challenges and solutions of XAI for security applications in the cyber defence perspective of IoT networks, revealing future research directions. By analysing our findings, new cybersecurity applications that require XAI models emerge, assisting decision-makers in understanding and explaining security events in compromised IoT networks.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1775-1807"},"PeriodicalIF":35.6,"publicationDate":"2023-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Coding Techniques for Backscatter Communications—A Contemporary Survey 后向散射通信的编码技术——当代综述
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-22 DOI: 10.1109/COMST.2023.3259224
Fatemeh Rezaei;Diluka Galappaththige;Chintha Tellambura;Sanjeewa Herath
Backscatter communication (BackCom) networks enable passive/battery-free Internet-of-Thing devices, providing reliable, massive connectivity while ensuring self-sustainability, low maintenance, and low costs. Effective channel codes and decoding algorithms are necessary to achieve these objectives. However, a comprehensive survey/review paper on such techniques for BackCom networks has not been available. This paper aims to fill this gap. Because tags have limited computational resources, traditional coding techniques may not suit them. We first describe the basics of BackCom, channel codes and their relevant design parameters, and codes for general communication networks. We address the BackCom limitations, requirements, and channel characteristics. As conventional codes may not seamlessly move to the BackCom arena, we identify the potential BackCom coding techniques and multiple access schemes. We further highlight potential approaches for addressing code implementation complexity and reliability. Finally, we discuss open issues, challenges, and potential future research directions.
反向散射通信(BackCom)网络实现了无源/无电池的物联网设备,提供了可靠的大规模连接,同时确保了自我可持续性、低维护和低成本。有效的信道编码和解码算法是实现这些目标所必需的。然而,尚未提供一份关于BackCom网络此类技术的全面调查/审查文件。本文旨在填补这一空白。由于标签的计算资源有限,传统的编码技术可能不适合它们。我们首先描述了BackCom的基本原理、信道代码及其相关设计参数,以及通用通信网络的代码。我们解决了BackCom的限制、要求和渠道特征。由于传统编码可能无法无缝转移到BackCom领域,我们确定了潜在的BackCom编码技术和多址方案。我们进一步强调了解决代码实现复杂性和可靠性的潜在方法。最后,我们讨论了悬而未决的问题、挑战和未来潜在的研究方向。
{"title":"Coding Techniques for Backscatter Communications—A Contemporary Survey","authors":"Fatemeh Rezaei;Diluka Galappaththige;Chintha Tellambura;Sanjeewa Herath","doi":"10.1109/COMST.2023.3259224","DOIUrl":"https://doi.org/10.1109/COMST.2023.3259224","url":null,"abstract":"Backscatter communication (BackCom) networks enable passive/battery-free Internet-of-Thing devices, providing reliable, massive connectivity while ensuring self-sustainability, low maintenance, and low costs. Effective channel codes and decoding algorithms are necessary to achieve these objectives. However, a comprehensive survey/review paper on such techniques for BackCom networks has not been available. This paper aims to fill this gap. Because tags have limited computational resources, traditional coding techniques may not suit them. We first describe the basics of BackCom, channel codes and their relevant design parameters, and codes for general communication networks. We address the BackCom limitations, requirements, and channel characteristics. As conventional codes may not seamlessly move to the BackCom arena, we identify the potential BackCom coding techniques and multiple access schemes. We further highlight potential approaches for addressing code implementation complexity and reliability. Finally, we discuss open issues, challenges, and potential future research directions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 2","pages":"1020-1058"},"PeriodicalIF":35.6,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Corrections to “On the Capacity of Intensity-Modulation Direct-Detection Gaussian Optical Wireless Communication Channels: A Tutorial” 对《论调强直接检测高斯光无线通信信道的容量:教程》的修正
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-22 DOI: 10.1109/COMST.2022.3214905
Anas Chaaban;Zouheir Rezki;Mohamed-Slim Alouini
In the above article [1], equations (116) and (122) appeared with errors. The correct equations and affected text follow.
在上述文章[1]中,方程(116)和(122)出现了错误。下面是正确的方程式和受影响的文本。
{"title":"Corrections to “On the Capacity of Intensity-Modulation Direct-Detection Gaussian Optical Wireless Communication Channels: A Tutorial”","authors":"Anas Chaaban;Zouheir Rezki;Mohamed-Slim Alouini","doi":"10.1109/COMST.2022.3214905","DOIUrl":"https://doi.org/10.1109/COMST.2022.3214905","url":null,"abstract":"In the above article \u0000<xref>[1]</xref>\u0000, \u0000<xref>equations (116)</xref>\u0000 and \u0000<xref>(122)</xref>\u0000 appeared with errors. The correct equations and affected text follow.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 2","pages":"1444-1444"},"PeriodicalIF":35.6,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9739/10130694/10130701.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial: Second Quarter 2023 IEEE Communications Surveys and Tutorials 编辑:第二季度2023 IEEE通信调查和教程
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-22 DOI: 10.1109/COMST.2023.3270753
Dusit Niyato
I welcome you to the second issue of the IEEE Communications Surveys and Tutorials in 2023. This issue includes 15 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications,” “Cyber Security,” “Internet Technologies,” “Network and Service Management and Green Communications,” “Multimedia Communications,” “Network Virtualization” and “Optical Communications.” A brief account for each of these papers is given below.
我欢迎您参加2023年第二期IEEE通信调查和教程。本期包括15篇涉及通信网络不同方面的论文。特别是,这些文章调查并指导了《无线通信》、《网络安全》、《互联网技术》、《网路与服务管理与绿色通信》、“多媒体通信”、“网络虚拟化”和“光通信”中的各种问题。下面简要介绍了每篇论文。
{"title":"Editorial: Second Quarter 2023 IEEE Communications Surveys and Tutorials","authors":"Dusit Niyato","doi":"10.1109/COMST.2023.3270753","DOIUrl":"https://doi.org/10.1109/COMST.2023.3270753","url":null,"abstract":"I welcome you to the second issue of the IEEE Communications Surveys and Tutorials in 2023. This issue includes 15 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications,” “Cyber Security,” “Internet Technologies,” “Network and Service Management and Green Communications,” “Multimedia Communications,” “Network Virtualization” and “Optical Communications.” A brief account for each of these papers is given below.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 2","pages":"i-v"},"PeriodicalIF":35.6,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9739/10130694/10130703.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49953123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Backscatter Communication Meets Practical Battery-Free Internet of Things: A Survey and Outlook 后向散射通信满足实用无电池物联网:调查与展望
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-19 DOI: 10.1109/COMST.2023.3278239
Tao Jiang;Yu Zhang;Wenyuan Ma;Miaoran Peng;Yuxiang Peng;Mingjie Feng;Guanghua Liu
Battery-free Internet-of-Things (BF-IoT), which is realized by harvesting ambient energy to power the IoT devices, has emerged to reduce the energy consumption, and alleviate environmental concerns caused by extensive battery usage. However, current wireless technologies for IoT, such as Bluetooth, ZigBee, and long range radio (LoRa), cannot be efficiently supported by ambient energy due to high power requirement, making them unfit for BF-IoT applications. Backscatter communication (BackCom) is a promising enabling technology for BF-IoT as it achieves microwatt power consumption by eliminating the need of power-hungry radio components such as analog to digital converters. The integration of BF-IoT and BackCom is expected to revolutionize IoT applications and has attracted significant attention recently. However, several fundamental issues need to be addressed to fully harvest the potential of such integration. In this article, we conduct a comprehensive and in-depth survey of BackCom enabled BF-IoT (BackCom-BF-IoT), aiming to provide useful guidance for future research and application from a practical perspective. Specifically, we first introduce the basics of BackCom-BF-IoT by presenting its hardware architecture and key components. Then, we review the existing BackCom-BF-IoT prototypes, from which four fundamental issues related to BackCom are discussed, including link performance enhancement, multi-device concurrent transmission, security guarantee, and interplay between BackCom-BF-IoT system and ambient RF communication systems. For each fundamental issue, we thoroughly review state-of-the-art advances and discuss their prospects for practical BF-IoT applications. Finally, we provide an outlook of future research directions and several case studies.
无电池物联网(BF IoT)是通过收集环境能量为物联网设备供电来实现的,它已经出现,以减少能源消耗,缓解因大量使用电池而引起的环境问题。然而,当前用于物联网的无线技术,如蓝牙、ZigBee和远程无线电(LoRa),由于高功率要求,无法由环境能源有效支持,使其不适合BF物联网应用。反向散射通信(BackCom)是BF IoT的一种很有前途的使能技术,因为它通过消除对模数转换器等耗电无线电组件的需求来实现微瓦功耗。BF IoT和BackCom的集成有望彻底改变IoT应用,并在最近引起了极大的关注。然而,需要解决几个根本问题,以充分挖掘这种一体化的潜力。在本文中,我们对支持BackCom的BF IoT(BackCom BF IoT)进行了全面深入的调查,旨在从实践的角度为未来的研究和应用提供有用的指导。具体来说,我们首先介绍了BackCom BF IoT的基础知识,介绍了其硬件架构和关键组件。然后,我们回顾了现有的BackCom BF物联网原型,从中讨论了与BackCom相关的四个基本问题,包括链路性能增强、多设备并发传输、安全保障以及BackCom BF-IoT系统与环境RF通信系统之间的相互作用。对于每一个基本问题,我们都会全面回顾最先进的进展,并讨论它们在实际BF物联网应用中的前景。最后,我们对未来的研究方向进行了展望,并进行了几个案例研究。
{"title":"Backscatter Communication Meets Practical Battery-Free Internet of Things: A Survey and Outlook","authors":"Tao Jiang;Yu Zhang;Wenyuan Ma;Miaoran Peng;Yuxiang Peng;Mingjie Feng;Guanghua Liu","doi":"10.1109/COMST.2023.3278239","DOIUrl":"https://doi.org/10.1109/COMST.2023.3278239","url":null,"abstract":"Battery-free Internet-of-Things (BF-IoT), which is realized by harvesting ambient energy to power the IoT devices, has emerged to reduce the energy consumption, and alleviate environmental concerns caused by extensive battery usage. However, current wireless technologies for IoT, such as Bluetooth, ZigBee, and long range radio (LoRa), cannot be efficiently supported by ambient energy due to high power requirement, making them unfit for BF-IoT applications. Backscatter communication (BackCom) is a promising enabling technology for BF-IoT as it achieves microwatt power consumption by eliminating the need of power-hungry radio components such as analog to digital converters. The integration of BF-IoT and BackCom is expected to revolutionize IoT applications and has attracted significant attention recently. However, several fundamental issues need to be addressed to fully harvest the potential of such integration. In this article, we conduct a comprehensive and in-depth survey of BackCom enabled BF-IoT (BackCom-BF-IoT), aiming to provide useful guidance for future research and application from a practical perspective. Specifically, we first introduce the basics of BackCom-BF-IoT by presenting its hardware architecture and key components. Then, we review the existing BackCom-BF-IoT prototypes, from which four fundamental issues related to BackCom are discussed, including link performance enhancement, multi-device concurrent transmission, security guarantee, and interplay between BackCom-BF-IoT system and ambient RF communication systems. For each fundamental issue, we thoroughly review state-of-the-art advances and discuss their prospects for practical BF-IoT applications. Finally, we provide an outlook of future research directions and several case studies.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"2021-2051"},"PeriodicalIF":35.6,"publicationDate":"2023-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Artificial Intelligence of Things for Smarter Healthcare: A Survey of Advancements, Challenges, and Opportunities 面向更智能医疗的物联网人工智能:进展、挑战和机遇调查
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-13 DOI: 10.1109/COMST.2023.3256323
Stephanie Baker;Wei Xiang
Healthcare systems are under increasing strain due to a myriad of factors, from a steadily ageing global population to the current COVID-19 pandemic. In a world where we have needed to be connected but apart, the need for enhanced remote and at-home healthcare has become clear. The Internet of Things (IoT) offers a promising solution. The IoT has created a highly connected world, with billions of devices collecting and communicating data from a range of applications, including healthcare. Due to these high volumes of data, a natural synergy with Artificial Intelligence (AI) has become apparent - big data both enables and requires AI to interpret, understand, and make decisions that provide optimal outcomes. In this extensive survey, we thoroughly explore this synergy through an examination of the field of the Artificial Intelligence of Things (AIoT) for healthcare. This work begins by briefly establishing a unified architecture of AIoT in a healthcare context, including sensors and devices, novel communication technologies, and cross-layer AI. We then examine recent research pertaining to each component of the AIoT architecture from several key perspectives, identifying promising technologies, challenges, and opportunities that are unique to healthcare. Several examples of real-world AIoT healthcare use cases are then presented to illustrate the potential of these technologies. Lastly, this work outlines promising directions for future research in AIoT for healthcare.
从全球人口稳步老龄化到当前的新冠肺炎大流行,由于多种因素,医疗保健系统正面临越来越大的压力。在一个我们需要联系但又需要分开的世界里,对增强远程和家庭医疗保健的需求已经变得显而易见。物联网(IoT)提供了一个很有前景的解决方案。物联网创造了一个高度互联的世界,数十亿台设备从包括医疗保健在内的一系列应用程序中收集和通信数据。由于这些大量的数据,与人工智能(AI)的自然协同作用已经变得明显——大数据使人工智能能够并需要人工智能来解释、理解和做出提供最佳结果的决策。在这项广泛的调查中,我们通过对医疗保健人工智能(AIoT)领域的研究,深入探讨了这种协同作用。这项工作首先简要建立了医疗保健背景下AIoT的统一架构,包括传感器和设备、新型通信技术和跨层人工智能。然后,我们从几个关键角度审视了与AIoT架构的每个组件相关的最新研究,确定了医疗保健特有的有前景的技术、挑战和机遇。然后介绍了几个真实世界AIoT医疗保健用例的例子,以说明这些技术的潜力。最后,这项工作概述了未来医疗保健AIoT研究的有希望的方向。
{"title":"Artificial Intelligence of Things for Smarter Healthcare: A Survey of Advancements, Challenges, and Opportunities","authors":"Stephanie Baker;Wei Xiang","doi":"10.1109/COMST.2023.3256323","DOIUrl":"https://doi.org/10.1109/COMST.2023.3256323","url":null,"abstract":"Healthcare systems are under increasing strain due to a myriad of factors, from a steadily ageing global population to the current COVID-19 pandemic. In a world where we have needed to be connected but apart, the need for enhanced remote and at-home healthcare has become clear. The Internet of Things (IoT) offers a promising solution. The IoT has created a highly connected world, with billions of devices collecting and communicating data from a range of applications, including healthcare. Due to these high volumes of data, a natural synergy with Artificial Intelligence (AI) has become apparent - big data both enables and requires AI to interpret, understand, and make decisions that provide optimal outcomes. In this extensive survey, we thoroughly explore this synergy through an examination of the field of the Artificial Intelligence of Things (AIoT) for healthcare. This work begins by briefly establishing a unified architecture of AIoT in a healthcare context, including sensors and devices, novel communication technologies, and cross-layer AI. We then examine recent research pertaining to each component of the AIoT architecture from several key perspectives, identifying promising technologies, challenges, and opportunities that are unique to healthcare. Several examples of real-world AIoT healthcare use cases are then presented to illustrate the potential of these technologies. Lastly, this work outlines promising directions for future research in AIoT for healthcare.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 2","pages":"1261-1293"},"PeriodicalIF":35.6,"publicationDate":"2023-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9739/10130694/10066875.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
IEEE Communications Surveys and Tutorials
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1