首页 > 最新文献

IEEE Communications Surveys and Tutorials最新文献

英文 中文
Unveiling the Potential of NOMA: A Journey to Next-Generation Multiple Access 揭示NOMA的潜力:通往下一代多址的旅程
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-25 DOI: 10.1109/COMST.2024.3521647
Adeel Ahmed;Xingfu Wang;Ammar Hawbani;Weijie Yuan;Hina Tabassum;Yuanwei Liu;Muhammad Umar Farooq Qaisar;Zhiguo Ding;Naofal Al-Dhahir;Arumugam Nallanathan;Derrick Wing Kwan Ng
The revolutionary sixth-generation wireless communications technologies and applications, notably digital twin networks (DTN), connected autonomous vehicles (CAVs), space-air-ground integrated networks (SAGINs), zero-touch networks, industry 5.0, healthcare 5.0, agriculture 5.0, and more, are driving the evolution of next-generation wireless networks (NGWNs). These innovative technologies and groundbreaking innovative applications will generate a sheer volume of data that requires the swift transmission of massive data across wireless networks and the capability to connect trillions of devices, thereby fueling the use of sophisticated next-generation multiple access (NGMA) schemes. In particular, NGMA strives to cater to the massive connectivity in the 6G era, enabling the smooth and optimized operations of NGWNs compared to existing multiple access (MA) schemes. This survey showcases non-orthogonal multiple access (NOMA) as the frontrunner for NGMA, spotlighting its novel contributions within the existing literature in terms of “What has NOMA delivered?”, “What is NOMA currently providing?” and “What lies ahead for NOMA?”. We present different variants of NOMA in this comprehensive survey, detailing their fundamental operations. In addition, this survey highlights NOMA’s applicability in a broad range of wireless communications technologies such as multi-antenna systems, machine learning, reconfigurable intelligent surfaces (RIS), cognitive radio networks (CRN), integrated sensing and communications (ISAC), terahertz networks, autonomous aerial vehicles (AAVs), etc. This survey delves deeper by providing a comprehensive literature review of NOMA’s interplay with various state-of-the-art wireless technologies. Furthermore, despite the numerous perks and advantages of NOMA, we also highlight several technical challenges of NOMA, which NOMA-assisted NGWNs may encounter. Next, we unveil the research trends of NOMA in the 6G era, offering reliable, robust, and swift communications. Finally, we offer design recommendations and insights along with the future perspectives of NOMA as the leading choice for NGMA within the realm of NGWNs.
革命性的第六代无线通信技术和应用,特别是数字孪生网络(DTN)、联网自动驾驶汽车(cav)、空-空-地集成网络(SAGINs)、零接触网络、工业5.0、医疗5.0、农业5.0等,正在推动下一代无线网络(NGWNs)的发展。这些创新技术和突破性的创新应用将产生大量数据,需要通过无线网络快速传输海量数据,并具备连接数万亿设备的能力,从而推动复杂的下一代多址(NGMA)方案的使用。特别是NGMA致力于满足6G时代的海量连接需求,与现有的多址接入(multiple access, MA)方案相比,使NGWNs的运行更加流畅和优化。这项调查显示了非正交多址(NOMA)作为NGMA的领跑者,突出了它在现有文献中的新贡献,即“NOMA带来了什么?”、“NOMA目前提供什么?”和“NOMA的未来是什么?”在这个全面的调查中,我们提出了NOMA的不同变体,详细介绍了它们的基本操作。此外,该调查还强调了NOMA在广泛的无线通信技术中的适用性,如多天线系统、机器学习、可重构智能表面(RIS)、认知无线电网络(CRN)、集成传感和通信(ISAC)、太赫兹网络、自主飞行器(aav)等。本调查通过提供NOMA与各种最先进的无线技术相互作用的全面文献综述,进行了更深入的研究。此外,尽管NOMA有许多好处和优势,但我们也强调了NOMA辅助NGWNs可能遇到的一些技术挑战。接下来,我们将揭示6G时代NOMA的研究趋势,提供可靠、稳健、快速的通信。最后,我们提供了设计建议和见解,以及NOMA作为ngnn领域中NGMA的主要选择的未来前景。
{"title":"Unveiling the Potential of NOMA: A Journey to Next-Generation Multiple Access","authors":"Adeel Ahmed;Xingfu Wang;Ammar Hawbani;Weijie Yuan;Hina Tabassum;Yuanwei Liu;Muhammad Umar Farooq Qaisar;Zhiguo Ding;Naofal Al-Dhahir;Arumugam Nallanathan;Derrick Wing Kwan Ng","doi":"10.1109/COMST.2024.3521647","DOIUrl":"10.1109/COMST.2024.3521647","url":null,"abstract":"The revolutionary sixth-generation wireless communications technologies and applications, notably digital twin networks (DTN), connected autonomous vehicles (CAVs), space-air-ground integrated networks (SAGINs), zero-touch networks, industry 5.0, healthcare 5.0, agriculture 5.0, and more, are driving the evolution of next-generation wireless networks (NGWNs). These innovative technologies and groundbreaking innovative applications will generate a sheer volume of data that requires the swift transmission of massive data across wireless networks and the capability to connect trillions of devices, thereby fueling the use of sophisticated next-generation multiple access (NGMA) schemes. In particular, NGMA strives to cater to the massive connectivity in the 6G era, enabling the smooth and optimized operations of NGWNs compared to existing multiple access (MA) schemes. This survey showcases non-orthogonal multiple access (NOMA) as the frontrunner for NGMA, spotlighting its novel contributions within the existing literature in terms of “What has NOMA delivered?”, “What is NOMA currently providing?” and “What lies ahead for NOMA?”. We present different variants of NOMA in this comprehensive survey, detailing their fundamental operations. In addition, this survey highlights NOMA’s applicability in a broad range of wireless communications technologies such as multi-antenna systems, machine learning, reconfigurable intelligent surfaces (RIS), cognitive radio networks (CRN), integrated sensing and communications (ISAC), terahertz networks, autonomous aerial vehicles (AAVs), etc. This survey delves deeper by providing a comprehensive literature review of NOMA’s interplay with various state-of-the-art wireless technologies. Furthermore, despite the numerous perks and advantages of NOMA, we also highlight several technical challenges of NOMA, which NOMA-assisted NGWNs may encounter. Next, we unveil the research trends of NOMA in the 6G era, offering reliable, robust, and swift communications. Finally, we offer design recommendations and insights along with the future perspectives of NOMA as the leading choice for NGMA within the realm of NGWNs.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"3099-3164"},"PeriodicalIF":34.4,"publicationDate":"2024-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142888810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Integrated Sensing, Communication, and Computation 传感、通信与计算集成研究综述
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-23 DOI: 10.1109/COMST.2024.3521498
Dingzhu Wen;Yong Zhou;Xiaoyang Li;Yuanming Shi;Kaibin Huang;Khaled B. Letaief
The forthcoming generation of wireless technology, 6G, promises a revolutionary leap beyond traditional data-centric services. It aims to usher in an era of ubiquitous intelligent services, where everything is interconnected and intelligent. This vision requires the seamless integration of three fundamental modules: Sensing for information acquisition, communication for information sharing, and computation for information processing and decision-making. These modules are intricately linked, especially in complex tasks such as edge learning and inference. However, the performance of these modules is interdependent, creating a resource competition for time, energy, and bandwidth. Existing techniques like integrated communication and computation (ICC), integrated sensing and computation (ISC), and integrated sensing and communication (ISAC) have made partial strides in addressing this challenge, but they fall short of meeting the extreme performance requirements. To overcome these limitations, it is essential to develop new techniques that comprehensively integrate sensing, communication, and computation. This integrated approach, known as Integrated Sensing, Communication, and Computation (ISCC), offers a systematic perspective for enhancing task performance. This paper begins with a comprehensive survey of historic and related techniques such as ICC, ISC, and ISAC, highlighting their strengths and limitations. It then discusses the benefits, functions, and challenges of ISCC. Subsequently, the state-of-the-art signal designs for ISCC, along with network resource management strategies specifically tailored for ISCC are explored. Furthermore, this paper discusses the exciting research opportunities that lie ahead for implementing ISCC in future advanced networks, and the unresolved issues requiring further investigation. ISCC is expected to unlock the full potential of intelligent connectivity, paving the way for groundbreaking applications and services.
即将到来的新一代无线技术6G有望实现超越传统数据中心服务的革命性飞跃。它的目标是开创一个无处不在的智能服务时代,在这个时代,一切都是互联和智能的。这一愿景需要三个基本模块的无缝集成:用于信息获取的感知,用于信息共享的通信,以及用于信息处理和决策的计算。这些模块错综复杂地联系在一起,特别是在边缘学习和推理等复杂任务中。然而,这些模块的性能是相互依赖的,造成了时间、精力和带宽的资源竞争。现有的集成通信与计算(ICC)、集成传感与计算(ISC)和集成传感与通信(ISAC)等技术在解决这一挑战方面取得了部分进展,但它们无法满足极端的性能要求。为了克服这些限制,必须开发综合集成传感、通信和计算的新技术。这种集成的方法,被称为集成传感、通信和计算(ISCC),为提高任务性能提供了系统的视角。本文首先对历史和相关技术如ICC、ISC和ISAC进行了全面的调查,突出了它们的优势和局限性。然后讨论了ISCC的好处、功能和挑战。随后,探索了最先进的ISCC信号设计,以及专门为ISCC量身定制的网络资源管理策略。此外,本文还讨论了在未来先进网络中实现ISCC的令人兴奋的研究机会,以及需要进一步研究的未解决问题。ISCC有望释放智能连接的全部潜力,为突破性的应用和服务铺平道路。
{"title":"A Survey on Integrated Sensing, Communication, and Computation","authors":"Dingzhu Wen;Yong Zhou;Xiaoyang Li;Yuanming Shi;Kaibin Huang;Khaled B. Letaief","doi":"10.1109/COMST.2024.3521498","DOIUrl":"10.1109/COMST.2024.3521498","url":null,"abstract":"The forthcoming generation of wireless technology, 6G, promises a revolutionary leap beyond traditional data-centric services. It aims to usher in an era of ubiquitous intelligent services, where everything is interconnected and intelligent. This vision requires the seamless integration of three fundamental modules: Sensing for information acquisition, communication for information sharing, and computation for information processing and decision-making. These modules are intricately linked, especially in complex tasks such as edge learning and inference. However, the performance of these modules is interdependent, creating a resource competition for time, energy, and bandwidth. Existing techniques like integrated communication and computation (ICC), integrated sensing and computation (ISC), and integrated sensing and communication (ISAC) have made partial strides in addressing this challenge, but they fall short of meeting the extreme performance requirements. To overcome these limitations, it is essential to develop new techniques that comprehensively integrate sensing, communication, and computation. This integrated approach, known as Integrated Sensing, Communication, and Computation (ISCC), offers a systematic perspective for enhancing task performance. This paper begins with a comprehensive survey of historic and related techniques such as ICC, ISC, and ISAC, highlighting their strengths and limitations. It then discusses the benefits, functions, and challenges of ISCC. Subsequently, the state-of-the-art signal designs for ISCC, along with network resource management strategies specifically tailored for ISCC are explored. Furthermore, this paper discusses the exciting research opportunities that lie ahead for implementing ISCC in future advanced networks, and the unresolved issues requiring further investigation. ISCC is expected to unlock the full potential of intelligent connectivity, paving the way for groundbreaking applications and services.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"3058-3098"},"PeriodicalIF":34.4,"publicationDate":"2024-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10812728","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142879804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum-Inspired Resource Optimization for 6G Networks: A Survey 量子启发的 6G 网络资源优化:调查
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-18 DOI: 10.1109/COMST.2024.3519865
Muhammad Omair Butt;Nazar Waheed;Trung Q. Duong;Waleed Ejaz
The Internet of Things (IoT) drives an exponential surge in computing and communication devices. Consequently, it triggers capacity, coverage, interference, latency, and security issues in the existing communication networks. The forthcoming sixth-generation (6G) networks will address these issues by providing comprehensive solutions. In particular, quantum communication technology can potentially address the challenges of 6G networks. However, its implementation requires substantial infrastructure upgrades. Therefore, the quantum-inspired (QI) techniques offer an intermediate resort due to their ability to utilize the classical communication infrastructure for design and implementation. Hence, we review QI techniques in this survey that address radio resource optimization challenges across various communication aspects, including channel assignment, reconfigurable intelligent surfaces, spectrum sensing, uncrewed aerial vehicle-assisted networks, and related areas. The analysis explores diverse aspects, including objectives, constraints, problem characterization, proposed solutions, and lessons learnt. Research indicates that QI techniques offer advantages such as faster convergence and reduced complexity, providing promising solutions to complex optimization problems in communication networks. Furthermore, we identify the future directions, research gaps, and ongoing challenges from the QI radio resource optimization dataset.
物联网(IoT)推动了计算和通信设备的指数级增长。因此,它会引发现有通信网络中的容量、覆盖范围、干扰、延迟和安全问题。即将到来的第六代(6G)网络将通过提供全面的解决方案来解决这些问题。特别是,量子通信技术可以潜在地解决6G网络的挑战。然而,它的实施需要大量的基础设施升级。因此,量子启发(QI)技术提供了一种中间手段,因为它们能够利用经典通信基础设施进行设计和实现。因此,我们在本调查中回顾了QI技术,这些技术解决了各种通信方面的无线电资源优化挑战,包括信道分配、可重构智能表面、频谱传感、无人驾驶飞行器辅助网络和相关领域。分析探讨了不同的方面,包括目标、约束、问题特征、建议的解决方案和吸取的教训。研究表明,QI技术具有更快的收敛速度和降低复杂性等优点,为通信网络中的复杂优化问题提供了有希望的解决方案。此外,我们从QI无线电资源优化数据集确定了未来的方向、研究差距和正在面临的挑战。
{"title":"Quantum-Inspired Resource Optimization for 6G Networks: A Survey","authors":"Muhammad Omair Butt;Nazar Waheed;Trung Q. Duong;Waleed Ejaz","doi":"10.1109/COMST.2024.3519865","DOIUrl":"10.1109/COMST.2024.3519865","url":null,"abstract":"The Internet of Things (IoT) drives an exponential surge in computing and communication devices. Consequently, it triggers capacity, coverage, interference, latency, and security issues in the existing communication networks. The forthcoming sixth-generation (6G) networks will address these issues by providing comprehensive solutions. In particular, quantum communication technology can potentially address the challenges of 6G networks. However, its implementation requires substantial infrastructure upgrades. Therefore, the quantum-inspired (QI) techniques offer an intermediate resort due to their ability to utilize the classical communication infrastructure for design and implementation. Hence, we review QI techniques in this survey that address radio resource optimization challenges across various communication aspects, including channel assignment, reconfigurable intelligent surfaces, spectrum sensing, uncrewed aerial vehicle-assisted networks, and related areas. The analysis explores diverse aspects, including objectives, constraints, problem characterization, proposed solutions, and lessons learnt. Research indicates that QI techniques offer advantages such as faster convergence and reduced complexity, providing promising solutions to complex optimization problems in communication networks. Furthermore, we identify the future directions, research gaps, and ongoing challenges from the QI radio resource optimization dataset.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"2973-3019"},"PeriodicalIF":34.4,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterization and Quantification of User Privacy: Key Challenges, Regulations, and Future Directions 用户隐私的特征和量化:关键挑战、法规和未来方向
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-18 DOI: 10.1109/COMST.2024.3519861
Razi Arshad;Muhammad Rizwan Asghar
The protection of user privacy in the digital age has become an important concern with the increase in data-driven technologies. These technologies generate large amounts of user data that provide opportunities for organisations to improve the quality of their user services. The publication of user-generated data creates risks for exposing an individual’s privacy. In the literature, identity theft and attribute disclosure are the two most common attacks on user-generated data. These privacy issues require data publishing organisations to protect user privacy. International regulatory standards provide consistent frameworks and guidelines that data publishing organisations can use to secure user-sensitive data. This survey discusses the characterisation and quantification of user privacy in compliance with international regulatory standards. We provide an overview of existing regulations and frameworks related to user privacy, highlighting their strengths, limitations, and implications for individuals and businesses. We discuss the steps involved in characterising and quantifying user privacy within the framework of international regulatory standards, privacy tools, and real-world case studies. Furthermore, we share promising directions for future research and development, including advancements in privacy techniques, interdisciplinary collaborations, and the role of emerging technologies. By addressing these challenges and creating a way forward, this work aims to contribute to the ongoing research on user privacy and promote the development of effective strategies for safeguarding user personal data in an increasingly interconnected world.
随着数据驱动技术的发展,数字时代的用户隐私保护已成为一个重要问题。这些技术产生了大量的用户数据,为组织提供了提高用户服务质量的机会。发布用户生成的数据会带来暴露个人隐私的风险。在文献中,身份盗窃和属性泄露是对用户生成数据的两种最常见的攻击。这些隐私问题要求数据发布组织保护用户隐私。国际监管标准提供了一致的框架和指导方针,数据发布组织可以使用这些框架和指导方针来保护用户敏感数据。本调查讨论了符合国际监管标准的用户隐私的特征和量化。我们概述了与用户隐私相关的现有法规和框架,重点介绍了它们的优势、局限性以及对个人和企业的影响。我们讨论了在国际监管标准、隐私工具和现实世界案例研究的框架内描述和量化用户隐私所涉及的步骤。此外,我们还分享了未来研究和发展的有希望的方向,包括隐私技术的进步、跨学科合作和新兴技术的作用。通过解决这些挑战并创造前进的道路,这项工作旨在为正在进行的用户隐私研究做出贡献,并促进在日益互联的世界中保护用户个人数据的有效策略的发展。
{"title":"Characterization and Quantification of User Privacy: Key Challenges, Regulations, and Future Directions","authors":"Razi Arshad;Muhammad Rizwan Asghar","doi":"10.1109/COMST.2024.3519861","DOIUrl":"10.1109/COMST.2024.3519861","url":null,"abstract":"The protection of user privacy in the digital age has become an important concern with the increase in data-driven technologies. These technologies generate large amounts of user data that provide opportunities for organisations to improve the quality of their user services. The publication of user-generated data creates risks for exposing an individual’s privacy. In the literature, identity theft and attribute disclosure are the two most common attacks on user-generated data. These privacy issues require data publishing organisations to protect user privacy. International regulatory standards provide consistent frameworks and guidelines that data publishing organisations can use to secure user-sensitive data. This survey discusses the characterisation and quantification of user privacy in compliance with international regulatory standards. We provide an overview of existing regulations and frameworks related to user privacy, highlighting their strengths, limitations, and implications for individuals and businesses. We discuss the steps involved in characterising and quantifying user privacy within the framework of international regulatory standards, privacy tools, and real-world case studies. Furthermore, we share promising directions for future research and development, including advancements in privacy techniques, interdisciplinary collaborations, and the role of emerging technologies. By addressing these challenges and creating a way forward, this work aims to contribute to the ongoing research on user privacy and promote the development of effective strategies for safeguarding user personal data in an increasingly interconnected world.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"3266-3307"},"PeriodicalIF":34.4,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Principles, Applications, and Challenges of Reconfigurable Intelligent Surface-Enabled Backscatter Communication: A Comprehensive Survey and Outlook 可重构智能表面支持的反向散射通信的原理、应用和挑战:全面调查与展望
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-18 DOI: 10.1109/COMST.2024.3519788
Shuai Han;Jinming Wang;Cheng Li;Ekram Hossain
Backscatter communication (BackCom) networks are expected to provide ultra-low-power transmission and massive connectivity in future wireless communication systems. Nevertheless, the double-fading effect significantly reduces signal intensity and is a primary problem of modern BackCom systems. Reconfigurable Intelligent Surface (RIS) can artificially modify the wireless environment through numerous controllable reflecting elements. With the help of RIS, the desired signals in the BackCom procedure can be captured and reflected in the specified direction, which is able to alleviate the double-fading problem. Specifically, RIS can be a backscatter device to send information instead of a collaborator to enhance transmission, yielding the RIS-BackCom mechanism. However, a comprehensive review of this technique still needs to be made available, dramatically limiting its development. This paper presents the fundamental principles and functions of legacy BackCom systems, the RIS technique, and RIS-BackCom networks. Then, we discuss the system-level performance with different modulation and channel estimation approaches. Further, we introduce symbiotic radio (SR) networks developed from the RIS-BackCom technique. After that, we provide a survey on diverse optimization issues existing in the applications of RIS-BackCom networks. Finally, we envision emerging use scenarios, potential challenges, and possible solutions in future wireless communication networks.
反向散射通信(BackCom)网络有望在未来的无线通信系统中提供超低功耗传输和大规模连接。然而,双重衰落效应显著降低了信号强度,是现代BackCom系统的主要问题。可重构智能表面(RIS)可以通过众多可控反射元素人为地改变无线环境。在RIS的帮助下,可以捕获BackCom过程中所需的信号并在指定方向上反射,从而可以缓解双衰落问题。具体来说,RIS可以作为反向散射设备来发送信息,而不是作为协作器来增强传输,从而产生RIS- backcom机制。然而,仍然需要对这项技术进行全面的审查,这极大地限制了它的发展。本文介绍了传统BackCom系统、RIS技术和RIS-BackCom网络的基本原理和功能。然后,我们讨论了不同调制和信道估计方法的系统级性能。此外,我们还介绍了从RIS-BackCom技术发展而来的共生无线电(SR)网络。然后,对RIS-BackCom网络应用中存在的各种优化问题进行了综述。最后,我们展望了未来无线通信网络中出现的使用场景、潜在挑战和可能的解决方案。
{"title":"Principles, Applications, and Challenges of Reconfigurable Intelligent Surface-Enabled Backscatter Communication: A Comprehensive Survey and Outlook","authors":"Shuai Han;Jinming Wang;Cheng Li;Ekram Hossain","doi":"10.1109/COMST.2024.3519788","DOIUrl":"10.1109/COMST.2024.3519788","url":null,"abstract":"Backscatter communication (BackCom) networks are expected to provide ultra-low-power transmission and massive connectivity in future wireless communication systems. Nevertheless, the double-fading effect significantly reduces signal intensity and is a primary problem of modern BackCom systems. Reconfigurable Intelligent Surface (RIS) can artificially modify the wireless environment through numerous controllable reflecting elements. With the help of RIS, the desired signals in the BackCom procedure can be captured and reflected in the specified direction, which is able to alleviate the double-fading problem. Specifically, RIS can be a backscatter device to send information instead of a collaborator to enhance transmission, yielding the RIS-BackCom mechanism. However, a comprehensive review of this technique still needs to be made available, dramatically limiting its development. This paper presents the fundamental principles and functions of legacy BackCom systems, the RIS technique, and RIS-BackCom networks. Then, we discuss the system-level performance with different modulation and channel estimation approaches. Further, we introduce symbiotic radio (SR) networks developed from the RIS-BackCom technique. After that, we provide a survey on diverse optimization issues existing in the applications of RIS-BackCom networks. Finally, we envision emerging use scenarios, potential challenges, and possible solutions in future wireless communication networks.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"2937-2972"},"PeriodicalIF":34.4,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Geolocation on the Internet 互联网地理定位调查
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-16 DOI: 10.1109/COMST.2024.3518398
Aviram Zilberman;Adi Offer;Bar Pincu;Yoni Glickshtein;Roi Kant;Oleg Brodt;Andikan Otung;Rami Puzis;Asaf Shabtai;Yuval Elovici
In the interconnected world of the Internet, IP geolocation - identifying the geographic location of a device, user, or data source given their IP - plays an essential role in numerous applications and services. Over the years, IP geolocation technology has evolved, and it is now a cornerstone of the digital age. However, attaining accurate IP geolocation is not without its challenges. Our comprehensive survey explores IP geolocation, focusing on emerging challenges in security, data geolocation in the cloud, and coping with proxies and VPNs that are used to hide the real IP geolocation. These topics have gained prominence as organizations grapple with safeguarding the location of sensitive information, complying with data privacy regulations, and adapting to the dynamic digital landscape. By synthesizing research, analyzing industry practices, and exploring trends, we equip readers with a taxonomy and insights into the multifaceted world of geolocation and its vital role in shaping the digital future. This comprehensive survey not only enriches understanding of IP geolocation and its challenges but also provides a roadmap for future research, fostering increased awareness and the development of informed strategies for addressing the evolving landscape of geospatial security on the Internet.
在互联的互联网世界中,IP地理定位——确定给定IP的设备、用户或数据源的地理位置——在许多应用程序和服务中起着至关重要的作用。多年来,IP地理定位技术不断发展,现在已成为数字时代的基石。然而,获得准确的IP地理位置并非没有挑战。我们的全面调查探讨了IP地理位置,重点关注安全方面的新挑战,云中的数据地理位置,以及用于隐藏真实IP地理位置的代理和vpn的处理。随着组织努力保护敏感信息的位置、遵守数据隐私法规以及适应动态数字环境,这些主题变得越来越突出。通过综合研究、分析行业实践和探索趋势,我们为读者提供了地理定位的分类和见解,以及它在塑造数字未来中的重要作用。这项全面的调查不仅丰富了对IP地理定位及其挑战的理解,而且为未来的研究提供了路线图,促进了对互联网地理空间安全不断发展的认识和知情战略的发展。
{"title":"A Survey on Geolocation on the Internet","authors":"Aviram Zilberman;Adi Offer;Bar Pincu;Yoni Glickshtein;Roi Kant;Oleg Brodt;Andikan Otung;Rami Puzis;Asaf Shabtai;Yuval Elovici","doi":"10.1109/COMST.2024.3518398","DOIUrl":"10.1109/COMST.2024.3518398","url":null,"abstract":"In the interconnected world of the Internet, IP geolocation - identifying the geographic location of a device, user, or data source given their IP - plays an essential role in numerous applications and services. Over the years, IP geolocation technology has evolved, and it is now a cornerstone of the digital age. However, attaining accurate IP geolocation is not without its challenges. Our comprehensive survey explores IP geolocation, focusing on emerging challenges in security, data geolocation in the cloud, and coping with proxies and VPNs that are used to hide the real IP geolocation. These topics have gained prominence as organizations grapple with safeguarding the location of sensitive information, complying with data privacy regulations, and adapting to the dynamic digital landscape. By synthesizing research, analyzing industry practices, and exploring trends, we equip readers with a taxonomy and insights into the multifaceted world of geolocation and its vital role in shaping the digital future. This comprehensive survey not only enriches understanding of IP geolocation and its challenges but also provides a roadmap for future research, fostering increased awareness and the development of informed strategies for addressing the evolving landscape of geospatial security on the Internet.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"3339-3381"},"PeriodicalIF":34.4,"publicationDate":"2024-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142832461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Semantic Communication Networks: Architecture, Security, and Privacy 语义通信网络概览:架构、安全和隐私
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-13 DOI: 10.1109/COMST.2024.3516819
Shaolong Guo;Yuntao Wang;Ning Zhang;Zhou Su;Tom H. Luan;Zhiyi Tian;Xuemin Shen
With the rapid advancement and deployment of intelligent agents and artificial general intelligence (AGI), a fundamental challenge for future networks is enabling efficient communications among agents. Unlike traditional human-centric, data-driven communication networks, the primary goal of agent-based communication is to facilitate coordination among agents. Therefore, task comprehension and collaboration become the key objectives of communications, rather than data synchronization. Semantic communication (SemCom) aims to align information and knowledge among agents to expedite task comprehension. While significant research has been conducted on SemCom for two-agent systems, the development of semantic communication networks (SemComNet) for multi-agent systems remains largely unexplored. In this paper, we provide a comprehensive and up-to-date survey of SemComNet, focusing on their fundamentals, security, and privacy aspects. We introduce a novel three-layer architecture for multi-agent interaction, comprising the control layer, semantic transmission layer, and cognitive sensing layer. We explore working modes and enabling technologies, and present a taxonomy of security and privacy threats, along with state-of-the-art defense mechanisms. Finally, we outline future research directions, paving the way toward intelligent, robust, and energy-efficient SemComNet. This survey represents the first comprehensive analysis of SemComNet, offering detailed insights into the core principles as well as associated security and privacy challenges.
随着智能代理和通用人工智能(AGI)的快速发展和部署,未来网络面临的一个根本挑战是实现代理之间的有效通信。与传统的以人为中心、数据驱动的通信网络不同,基于代理的通信的主要目标是促进代理之间的协调。因此,任务理解和协作成为通信的关键目标,而不是数据同步。语义通信(SemCom)旨在协调智能体之间的信息和知识,以加快任务理解。虽然针对双智能体系统的语义通信网络已经进行了大量的研究,但针对多智能体系统的语义通信网络(SemComNet)的开发在很大程度上仍未得到探索。在本文中,我们提供了一个全面的和最新的SemComNet调查,重点是他们的基础,安全和隐私方面。提出了一种新的三层多智能体交互体系结构,包括控制层、语义传输层和认知感知层。我们探讨了工作模式和启用技术,并提出了安全和隐私威胁的分类,以及最先进的防御机制。最后,我们概述了未来的研究方向,为智能,稳健和节能的SemComNet铺平了道路。这项调查是对SemComNet的首次全面分析,提供了对核心原则以及相关安全和隐私挑战的详细见解。
{"title":"A Survey on Semantic Communication Networks: Architecture, Security, and Privacy","authors":"Shaolong Guo;Yuntao Wang;Ning Zhang;Zhou Su;Tom H. Luan;Zhiyi Tian;Xuemin Shen","doi":"10.1109/COMST.2024.3516819","DOIUrl":"10.1109/COMST.2024.3516819","url":null,"abstract":"With the rapid advancement and deployment of intelligent agents and artificial general intelligence (AGI), a fundamental challenge for future networks is enabling efficient communications among agents. Unlike traditional human-centric, data-driven communication networks, the primary goal of agent-based communication is to facilitate coordination among agents. Therefore, task comprehension and collaboration become the key objectives of communications, rather than data synchronization. Semantic communication (SemCom) aims to align information and knowledge among agents to expedite task comprehension. While significant research has been conducted on SemCom for two-agent systems, the development of semantic communication networks (SemComNet) for multi-agent systems remains largely unexplored. In this paper, we provide a comprehensive and up-to-date survey of SemComNet, focusing on their fundamentals, security, and privacy aspects. We introduce a novel three-layer architecture for multi-agent interaction, comprising the control layer, semantic transmission layer, and cognitive sensing layer. We explore working modes and enabling technologies, and present a taxonomy of security and privacy threats, along with state-of-the-art defense mechanisms. Finally, we outline future research directions, paving the way toward intelligent, robust, and energy-efficient SemComNet. This survey represents the first comprehensive analysis of SemComNet, offering detailed insights into the core principles as well as associated security and privacy challenges.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"2860-2894"},"PeriodicalIF":34.4,"publicationDate":"2024-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142820908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions 无人机和卫星网络安全调查:问题、威胁、攻击分析和解决方案
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-11 DOI: 10.1109/COMST.2024.3515051
Ozlem Ceviz;Sevil Sen;Pinar Sadioglu
Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to complete a number of tasks in cooperation with each other without need for human intervention. In recent years, UAVs, which are widely utilized in military missions, have begun to be deployed in civilian applications and mostly for commercial purposes. With their growing numbers and range of applications, UAVs are becoming more and more popular; on the other hand, they are also the target of various threats which can exploit various vulnerabilities of UAV systems in order to cause destructive effects. It is therefore critical that security is ensured for UAVs and the networks that provide communication between UAVs. This survey seeks to provide a comprehensive perspective on security within the domain of UAVs and Flying Ad Hoc Networks (FANETs). Our approach incorporates attack surface analysis and aligns it with the identification of potential threats. Additionally, we discuss countermeasures proposed in the existing literature in two categories: preventive and detection strategies. Our primary focus centers on the security challenges inherent to FANETs, acknowledging their susceptibility to insider threats due to their decentralized and dynamic nature. To provide a deeper understanding of these challenges, we simulate and analyze four distinct routing attacks on FANETs, using realistic parameters to evaluate their impact. Hence, this study transcends a standard review by integrating an attack analysis based on extensive simulations. Finally, we rigorously examine open issues, and propose research directions to guide future endeavors in this field.
由于技术的快速发展,无人驾驶飞行器(uav)能够在不需要人工干预的情况下相互合作完成许多任务。近年来,广泛用于军事任务的无人机已经开始在民用领域部署,主要用于商业目的。随着无人机数量的增长和应用范围的扩大,无人机越来越受欢迎;另一方面,它们也是各种威胁的目标,这些威胁可以利用无人机系统的各种漏洞来造成破坏性影响。因此,确保无人机和提供无人机之间通信的网络的安全性至关重要。本调查旨在为无人机和飞行自组织网络(fanet)领域的安全提供一个全面的视角。我们的方法结合了攻击面分析,并将其与潜在威胁的识别相结合。此外,我们还讨论了现有文献中提出的两类对策:预防和检测策略。我们的主要焦点集中在fanet固有的安全挑战上,承认由于其分散和动态的性质,它们容易受到内部威胁。为了更深入地了解这些挑战,我们模拟和分析了对fanet的四种不同的路由攻击,使用现实参数来评估其影响。因此,本研究通过整合基于广泛模拟的攻击分析而超越了标准审查。最后,我们严格审查开放的问题,并提出研究方向,以指导该领域的未来努力。
{"title":"A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions","authors":"Ozlem Ceviz;Sevil Sen;Pinar Sadioglu","doi":"10.1109/COMST.2024.3515051","DOIUrl":"10.1109/COMST.2024.3515051","url":null,"abstract":"Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to complete a number of tasks in cooperation with each other without need for human intervention. In recent years, UAVs, which are widely utilized in military missions, have begun to be deployed in civilian applications and mostly for commercial purposes. With their growing numbers and range of applications, UAVs are becoming more and more popular; on the other hand, they are also the target of various threats which can exploit various vulnerabilities of UAV systems in order to cause destructive effects. It is therefore critical that security is ensured for UAVs and the networks that provide communication between UAVs. This survey seeks to provide a comprehensive perspective on security within the domain of UAVs and Flying Ad Hoc Networks (FANETs). Our approach incorporates attack surface analysis and aligns it with the identification of potential threats. Additionally, we discuss countermeasures proposed in the existing literature in two categories: preventive and detection strategies. Our primary focus centers on the security challenges inherent to FANETs, acknowledging their susceptibility to insider threats due to their decentralized and dynamic nature. To provide a deeper understanding of these challenges, we simulate and analyze four distinct routing attacks on FANETs, using realistic parameters to evaluate their impact. Hence, this study transcends a standard review by integrating an attack analysis based on extensive simulations. Finally, we rigorously examine open issues, and propose research directions to guide future endeavors in this field.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"3227-3265"},"PeriodicalIF":34.4,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142809326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Security of Automatic Dependent Surveillance-Broadcast (ADS-B) Protocol: Challenges, Potential Solutions, and Future Directions 自动依赖监视广播(ADS-B)协议的安全性研究:挑战、潜在解决方案和未来方向
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-09 DOI: 10.1109/COMST.2024.3513213
Hammad Ahmed Khan;Haibat Khan;Salman Ghafoor;Mansoor Ahmed Khan
This work delves into critical examination of the broadcast data safety of Automatic Dependent Surveillance-Broadcast (ADS-B) system, an essential protocol for aircraft identification and navigation. Globally mandated by civil aviation regulatory bodies, ADS-B plays a pivotal role in shaping the future of Air Traffic Management initiatives. This study thoroughly investigates the vulnerabilities inherent in the open and un-encrypted nature of ADS-B data transmission. Given the widespread availability of Software-Defined Radios (SDRs), these security threats pose significant risks to Air Traffic Services and passenger safety. In light of these challenges, the paper scrutinises existing research and industry documents to comprehensively understand ADS-B vulnerabilities and assess threat levels and potential attacks. We also review recent developments and analyze proposed countermeasures aimed at enhancing the security of ADS-B data, possibly through protocol modifications or infrastructure enhancements.
这项工作深入研究了自动相关监视广播(ADS-B)系统广播数据安全性的关键检查,ADS-B系统是飞机识别和导航的基本协议。ADS-B由全球民航监管机构授权,在塑造空中交通管理举措的未来方面发挥着关键作用。本研究深入探讨了ADS-B数据传输的开放和非加密特性所固有的漏洞。鉴于软件定义无线电(sdr)的广泛可用性,这些安全威胁对空中交通服务和乘客安全构成重大风险。鉴于这些挑战,本文仔细审查了现有的研究和行业文件,以全面了解ADS-B漏洞,并评估威胁级别和潜在攻击。我们还回顾了最近的发展,并分析了旨在提高ADS-B数据安全性的建议对策,可能通过修改协议或增强基础设施。
{"title":"A Survey on Security of Automatic Dependent Surveillance-Broadcast (ADS-B) Protocol: Challenges, Potential Solutions, and Future Directions","authors":"Hammad Ahmed Khan;Haibat Khan;Salman Ghafoor;Mansoor Ahmed Khan","doi":"10.1109/COMST.2024.3513213","DOIUrl":"10.1109/COMST.2024.3513213","url":null,"abstract":"This work delves into critical examination of the broadcast data safety of Automatic Dependent Surveillance-Broadcast (ADS-B) system, an essential protocol for aircraft identification and navigation. Globally mandated by civil aviation regulatory bodies, ADS-B plays a pivotal role in shaping the future of Air Traffic Management initiatives. This study thoroughly investigates the vulnerabilities inherent in the open and un-encrypted nature of ADS-B data transmission. Given the widespread availability of Software-Defined Radios (SDRs), these security threats pose significant risks to Air Traffic Services and passenger safety. In light of these challenges, the paper scrutinises existing research and industry documents to comprehensively understand ADS-B vulnerabilities and assess threat levels and potential attacks. We also review recent developments and analyze proposed countermeasures aimed at enhancing the security of ADS-B data, possibly through protocol modifications or infrastructure enhancements.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"3199-3226"},"PeriodicalIF":34.4,"publicationDate":"2024-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142796910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explainable AI in 6G O-RAN: A Tutorial and Survey on Architecture, Use Cases, Challenges, and Future Research 6G O-RAN中可解释的AI:关于架构、用例、挑战和未来研究的教程和调查
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-02 DOI: 10.1109/COMST.2024.3510543
Bouziane Brik;Hatim Chergui;Lanfranco Zanzi;Francesco Devoti;Adlen Ksentini;Muhammad Shuaib Siddiqui;Xavier Costa-Pérez;Christos Verikoukis
The recent Open Radio Access Network (O-RAN) specifications promote the evolution of RAN architecture by function disaggregation, adoption of open interfaces, and instantiation of a hierarchical closed-loop control architecture managed by RAN Intelligent Controllers (RICs) entities. This paves the road to novel data-driven network management approaches based on programmable logic. Aided by Artificial Intelligence (AI) and Machine Learning (ML), novel solutions targeting traditionally unsolved RAN management issues can be devised. Nevertheless, the adoption of such smart and autonomous systems is limited by the current inability of human operators to understand the decision process of such AI/ML solutions, affecting their trust in such novel tools. eXplainable AI (XAI) aims at solving this issue, enabling human users to better understand and effectively manage the emerging generation of artificially intelligent schemes, reducing the human-to-machine barrier. In this survey, we provide a summary of the XAI methods and metrics before studying their deployment over the O-RAN Alliance RAN architecture along with its main building blocks. We then present various use-cases and discuss the automation of XAI pipelines for O-RAN as well as the underlying security aspects. We also review some projects/standards that tackle this area. Finally, we identify different challenges and research directions that may arise from the heavy adoption of AI/ML decision entities in this context, focusing on how XAI can help to interpret, understand, and improve trust in O-RAN operational networks.
最近的开放无线接入网(O-RAN)规范通过功能分解、开放接口的采用以及由RAN智能控制器(RICs)实体管理的分层闭环控制体系结构的实例化,促进了RAN体系结构的发展。这为基于可编程逻辑的新型数据驱动网络管理方法铺平了道路。在人工智能(AI)和机器学习(ML)的帮助下,可以设计针对传统未解决的RAN管理问题的新解决方案。然而,这种智能和自主系统的采用受到人类操作员目前无法理解这种AI/ML解决方案的决策过程的限制,影响了他们对这种新型工具的信任。可解释AI (eXplainable AI, XAI)旨在解决这一问题,使人类用户能够更好地理解和有效地管理新一代人工智能方案,减少人机障碍。在本调查中,在研究它们在O-RAN联盟RAN体系结构及其主要构建块上的部署之前,我们提供了XAI方法和指标的摘要。然后,我们展示了各种用例,并讨论了用于O-RAN的XAI管道的自动化以及底层安全方面。我们还回顾了一些解决这个问题的项目/标准。最后,我们确定了在这种情况下大量采用AI/ML决策实体可能带来的不同挑战和研究方向,重点关注XAI如何帮助解释、理解和提高O-RAN运营网络中的信任。
{"title":"Explainable AI in 6G O-RAN: A Tutorial and Survey on Architecture, Use Cases, Challenges, and Future Research","authors":"Bouziane Brik;Hatim Chergui;Lanfranco Zanzi;Francesco Devoti;Adlen Ksentini;Muhammad Shuaib Siddiqui;Xavier Costa-Pérez;Christos Verikoukis","doi":"10.1109/COMST.2024.3510543","DOIUrl":"10.1109/COMST.2024.3510543","url":null,"abstract":"The recent Open Radio Access Network (O-RAN) specifications promote the evolution of RAN architecture by function disaggregation, adoption of open interfaces, and instantiation of a hierarchical closed-loop control architecture managed by RAN Intelligent Controllers (RICs) entities. This paves the road to novel data-driven network management approaches based on programmable logic. Aided by Artificial Intelligence (AI) and Machine Learning (ML), novel solutions targeting traditionally unsolved RAN management issues can be devised. Nevertheless, the adoption of such smart and autonomous systems is limited by the current inability of human operators to understand the decision process of such AI/ML solutions, affecting their trust in such novel tools. eXplainable AI (XAI) aims at solving this issue, enabling human users to better understand and effectively manage the emerging generation of artificially intelligent schemes, reducing the human-to-machine barrier. In this survey, we provide a summary of the XAI methods and metrics before studying their deployment over the O-RAN Alliance RAN architecture along with its main building blocks. We then present various use-cases and discuss the automation of XAI pipelines for O-RAN as well as the underlying security aspects. We also review some projects/standards that tackle this area. Finally, we identify different challenges and research directions that may arise from the heavy adoption of AI/ML decision entities in this context, focusing on how XAI can help to interpret, understand, and improve trust in O-RAN operational networks.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"2826-2859"},"PeriodicalIF":34.4,"publicationDate":"2024-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142760601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Communications Surveys and Tutorials
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1