Pub Date : 2024-12-25DOI: 10.1109/COMST.2024.3521647
Adeel Ahmed;Xingfu Wang;Ammar Hawbani;Weijie Yuan;Hina Tabassum;Yuanwei Liu;Muhammad Umar Farooq Qaisar;Zhiguo Ding;Naofal Al-Dhahir;Arumugam Nallanathan;Derrick Wing Kwan Ng
The revolutionary sixth-generation wireless communications technologies and applications, notably digital twin networks (DTN), connected autonomous vehicles (CAVs), space-air-ground integrated networks (SAGINs), zero-touch networks, industry 5.0, healthcare 5.0, agriculture 5.0, and more, are driving the evolution of next-generation wireless networks (NGWNs). These innovative technologies and groundbreaking innovative applications will generate a sheer volume of data that requires the swift transmission of massive data across wireless networks and the capability to connect trillions of devices, thereby fueling the use of sophisticated next-generation multiple access (NGMA) schemes. In particular, NGMA strives to cater to the massive connectivity in the 6G era, enabling the smooth and optimized operations of NGWNs compared to existing multiple access (MA) schemes. This survey showcases non-orthogonal multiple access (NOMA) as the frontrunner for NGMA, spotlighting its novel contributions within the existing literature in terms of “What has NOMA delivered?”, “What is NOMA currently providing?” and “What lies ahead for NOMA?”. We present different variants of NOMA in this comprehensive survey, detailing their fundamental operations. In addition, this survey highlights NOMA’s applicability in a broad range of wireless communications technologies such as multi-antenna systems, machine learning, reconfigurable intelligent surfaces (RIS), cognitive radio networks (CRN), integrated sensing and communications (ISAC), terahertz networks, autonomous aerial vehicles (AAVs), etc. This survey delves deeper by providing a comprehensive literature review of NOMA’s interplay with various state-of-the-art wireless technologies. Furthermore, despite the numerous perks and advantages of NOMA, we also highlight several technical challenges of NOMA, which NOMA-assisted NGWNs may encounter. Next, we unveil the research trends of NOMA in the 6G era, offering reliable, robust, and swift communications. Finally, we offer design recommendations and insights along with the future perspectives of NOMA as the leading choice for NGMA within the realm of NGWNs.
{"title":"Unveiling the Potential of NOMA: A Journey to Next-Generation Multiple Access","authors":"Adeel Ahmed;Xingfu Wang;Ammar Hawbani;Weijie Yuan;Hina Tabassum;Yuanwei Liu;Muhammad Umar Farooq Qaisar;Zhiguo Ding;Naofal Al-Dhahir;Arumugam Nallanathan;Derrick Wing Kwan Ng","doi":"10.1109/COMST.2024.3521647","DOIUrl":"10.1109/COMST.2024.3521647","url":null,"abstract":"The revolutionary sixth-generation wireless communications technologies and applications, notably digital twin networks (DTN), connected autonomous vehicles (CAVs), space-air-ground integrated networks (SAGINs), zero-touch networks, industry 5.0, healthcare 5.0, agriculture 5.0, and more, are driving the evolution of next-generation wireless networks (NGWNs). These innovative technologies and groundbreaking innovative applications will generate a sheer volume of data that requires the swift transmission of massive data across wireless networks and the capability to connect trillions of devices, thereby fueling the use of sophisticated next-generation multiple access (NGMA) schemes. In particular, NGMA strives to cater to the massive connectivity in the 6G era, enabling the smooth and optimized operations of NGWNs compared to existing multiple access (MA) schemes. This survey showcases non-orthogonal multiple access (NOMA) as the frontrunner for NGMA, spotlighting its novel contributions within the existing literature in terms of “What has NOMA delivered?”, “What is NOMA currently providing?” and “What lies ahead for NOMA?”. We present different variants of NOMA in this comprehensive survey, detailing their fundamental operations. In addition, this survey highlights NOMA’s applicability in a broad range of wireless communications technologies such as multi-antenna systems, machine learning, reconfigurable intelligent surfaces (RIS), cognitive radio networks (CRN), integrated sensing and communications (ISAC), terahertz networks, autonomous aerial vehicles (AAVs), etc. This survey delves deeper by providing a comprehensive literature review of NOMA’s interplay with various state-of-the-art wireless technologies. Furthermore, despite the numerous perks and advantages of NOMA, we also highlight several technical challenges of NOMA, which NOMA-assisted NGWNs may encounter. Next, we unveil the research trends of NOMA in the 6G era, offering reliable, robust, and swift communications. Finally, we offer design recommendations and insights along with the future perspectives of NOMA as the leading choice for NGMA within the realm of NGWNs.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"3099-3164"},"PeriodicalIF":34.4,"publicationDate":"2024-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142888810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-23DOI: 10.1109/COMST.2024.3521498
Dingzhu Wen;Yong Zhou;Xiaoyang Li;Yuanming Shi;Kaibin Huang;Khaled B. Letaief
The forthcoming generation of wireless technology, 6G, promises a revolutionary leap beyond traditional data-centric services. It aims to usher in an era of ubiquitous intelligent services, where everything is interconnected and intelligent. This vision requires the seamless integration of three fundamental modules: Sensing for information acquisition, communication for information sharing, and computation for information processing and decision-making. These modules are intricately linked, especially in complex tasks such as edge learning and inference. However, the performance of these modules is interdependent, creating a resource competition for time, energy, and bandwidth. Existing techniques like integrated communication and computation (ICC), integrated sensing and computation (ISC), and integrated sensing and communication (ISAC) have made partial strides in addressing this challenge, but they fall short of meeting the extreme performance requirements. To overcome these limitations, it is essential to develop new techniques that comprehensively integrate sensing, communication, and computation. This integrated approach, known as Integrated Sensing, Communication, and Computation (ISCC), offers a systematic perspective for enhancing task performance. This paper begins with a comprehensive survey of historic and related techniques such as ICC, ISC, and ISAC, highlighting their strengths and limitations. It then discusses the benefits, functions, and challenges of ISCC. Subsequently, the state-of-the-art signal designs for ISCC, along with network resource management strategies specifically tailored for ISCC are explored. Furthermore, this paper discusses the exciting research opportunities that lie ahead for implementing ISCC in future advanced networks, and the unresolved issues requiring further investigation. ISCC is expected to unlock the full potential of intelligent connectivity, paving the way for groundbreaking applications and services.
{"title":"A Survey on Integrated Sensing, Communication, and Computation","authors":"Dingzhu Wen;Yong Zhou;Xiaoyang Li;Yuanming Shi;Kaibin Huang;Khaled B. Letaief","doi":"10.1109/COMST.2024.3521498","DOIUrl":"10.1109/COMST.2024.3521498","url":null,"abstract":"The forthcoming generation of wireless technology, 6G, promises a revolutionary leap beyond traditional data-centric services. It aims to usher in an era of ubiquitous intelligent services, where everything is interconnected and intelligent. This vision requires the seamless integration of three fundamental modules: Sensing for information acquisition, communication for information sharing, and computation for information processing and decision-making. These modules are intricately linked, especially in complex tasks such as edge learning and inference. However, the performance of these modules is interdependent, creating a resource competition for time, energy, and bandwidth. Existing techniques like integrated communication and computation (ICC), integrated sensing and computation (ISC), and integrated sensing and communication (ISAC) have made partial strides in addressing this challenge, but they fall short of meeting the extreme performance requirements. To overcome these limitations, it is essential to develop new techniques that comprehensively integrate sensing, communication, and computation. This integrated approach, known as Integrated Sensing, Communication, and Computation (ISCC), offers a systematic perspective for enhancing task performance. This paper begins with a comprehensive survey of historic and related techniques such as ICC, ISC, and ISAC, highlighting their strengths and limitations. It then discusses the benefits, functions, and challenges of ISCC. Subsequently, the state-of-the-art signal designs for ISCC, along with network resource management strategies specifically tailored for ISCC are explored. Furthermore, this paper discusses the exciting research opportunities that lie ahead for implementing ISCC in future advanced networks, and the unresolved issues requiring further investigation. ISCC is expected to unlock the full potential of intelligent connectivity, paving the way for groundbreaking applications and services.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"3058-3098"},"PeriodicalIF":34.4,"publicationDate":"2024-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10812728","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142879804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-18DOI: 10.1109/COMST.2024.3519865
Muhammad Omair Butt;Nazar Waheed;Trung Q. Duong;Waleed Ejaz
The Internet of Things (IoT) drives an exponential surge in computing and communication devices. Consequently, it triggers capacity, coverage, interference, latency, and security issues in the existing communication networks. The forthcoming sixth-generation (6G) networks will address these issues by providing comprehensive solutions. In particular, quantum communication technology can potentially address the challenges of 6G networks. However, its implementation requires substantial infrastructure upgrades. Therefore, the quantum-inspired (QI) techniques offer an intermediate resort due to their ability to utilize the classical communication infrastructure for design and implementation. Hence, we review QI techniques in this survey that address radio resource optimization challenges across various communication aspects, including channel assignment, reconfigurable intelligent surfaces, spectrum sensing, uncrewed aerial vehicle-assisted networks, and related areas. The analysis explores diverse aspects, including objectives, constraints, problem characterization, proposed solutions, and lessons learnt. Research indicates that QI techniques offer advantages such as faster convergence and reduced complexity, providing promising solutions to complex optimization problems in communication networks. Furthermore, we identify the future directions, research gaps, and ongoing challenges from the QI radio resource optimization dataset.
{"title":"Quantum-Inspired Resource Optimization for 6G Networks: A Survey","authors":"Muhammad Omair Butt;Nazar Waheed;Trung Q. Duong;Waleed Ejaz","doi":"10.1109/COMST.2024.3519865","DOIUrl":"10.1109/COMST.2024.3519865","url":null,"abstract":"The Internet of Things (IoT) drives an exponential surge in computing and communication devices. Consequently, it triggers capacity, coverage, interference, latency, and security issues in the existing communication networks. The forthcoming sixth-generation (6G) networks will address these issues by providing comprehensive solutions. In particular, quantum communication technology can potentially address the challenges of 6G networks. However, its implementation requires substantial infrastructure upgrades. Therefore, the quantum-inspired (QI) techniques offer an intermediate resort due to their ability to utilize the classical communication infrastructure for design and implementation. Hence, we review QI techniques in this survey that address radio resource optimization challenges across various communication aspects, including channel assignment, reconfigurable intelligent surfaces, spectrum sensing, uncrewed aerial vehicle-assisted networks, and related areas. The analysis explores diverse aspects, including objectives, constraints, problem characterization, proposed solutions, and lessons learnt. Research indicates that QI techniques offer advantages such as faster convergence and reduced complexity, providing promising solutions to complex optimization problems in communication networks. Furthermore, we identify the future directions, research gaps, and ongoing challenges from the QI radio resource optimization dataset.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"2973-3019"},"PeriodicalIF":34.4,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-18DOI: 10.1109/COMST.2024.3519861
Razi Arshad;Muhammad Rizwan Asghar
The protection of user privacy in the digital age has become an important concern with the increase in data-driven technologies. These technologies generate large amounts of user data that provide opportunities for organisations to improve the quality of their user services. The publication of user-generated data creates risks for exposing an individual’s privacy. In the literature, identity theft and attribute disclosure are the two most common attacks on user-generated data. These privacy issues require data publishing organisations to protect user privacy. International regulatory standards provide consistent frameworks and guidelines that data publishing organisations can use to secure user-sensitive data. This survey discusses the characterisation and quantification of user privacy in compliance with international regulatory standards. We provide an overview of existing regulations and frameworks related to user privacy, highlighting their strengths, limitations, and implications for individuals and businesses. We discuss the steps involved in characterising and quantifying user privacy within the framework of international regulatory standards, privacy tools, and real-world case studies. Furthermore, we share promising directions for future research and development, including advancements in privacy techniques, interdisciplinary collaborations, and the role of emerging technologies. By addressing these challenges and creating a way forward, this work aims to contribute to the ongoing research on user privacy and promote the development of effective strategies for safeguarding user personal data in an increasingly interconnected world.
{"title":"Characterization and Quantification of User Privacy: Key Challenges, Regulations, and Future Directions","authors":"Razi Arshad;Muhammad Rizwan Asghar","doi":"10.1109/COMST.2024.3519861","DOIUrl":"10.1109/COMST.2024.3519861","url":null,"abstract":"The protection of user privacy in the digital age has become an important concern with the increase in data-driven technologies. These technologies generate large amounts of user data that provide opportunities for organisations to improve the quality of their user services. The publication of user-generated data creates risks for exposing an individual’s privacy. In the literature, identity theft and attribute disclosure are the two most common attacks on user-generated data. These privacy issues require data publishing organisations to protect user privacy. International regulatory standards provide consistent frameworks and guidelines that data publishing organisations can use to secure user-sensitive data. This survey discusses the characterisation and quantification of user privacy in compliance with international regulatory standards. We provide an overview of existing regulations and frameworks related to user privacy, highlighting their strengths, limitations, and implications for individuals and businesses. We discuss the steps involved in characterising and quantifying user privacy within the framework of international regulatory standards, privacy tools, and real-world case studies. Furthermore, we share promising directions for future research and development, including advancements in privacy techniques, interdisciplinary collaborations, and the role of emerging technologies. By addressing these challenges and creating a way forward, this work aims to contribute to the ongoing research on user privacy and promote the development of effective strategies for safeguarding user personal data in an increasingly interconnected world.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"3266-3307"},"PeriodicalIF":34.4,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-18DOI: 10.1109/COMST.2024.3519788
Shuai Han;Jinming Wang;Cheng Li;Ekram Hossain
Backscatter communication (BackCom) networks are expected to provide ultra-low-power transmission and massive connectivity in future wireless communication systems. Nevertheless, the double-fading effect significantly reduces signal intensity and is a primary problem of modern BackCom systems. Reconfigurable Intelligent Surface (RIS) can artificially modify the wireless environment through numerous controllable reflecting elements. With the help of RIS, the desired signals in the BackCom procedure can be captured and reflected in the specified direction, which is able to alleviate the double-fading problem. Specifically, RIS can be a backscatter device to send information instead of a collaborator to enhance transmission, yielding the RIS-BackCom mechanism. However, a comprehensive review of this technique still needs to be made available, dramatically limiting its development. This paper presents the fundamental principles and functions of legacy BackCom systems, the RIS technique, and RIS-BackCom networks. Then, we discuss the system-level performance with different modulation and channel estimation approaches. Further, we introduce symbiotic radio (SR) networks developed from the RIS-BackCom technique. After that, we provide a survey on diverse optimization issues existing in the applications of RIS-BackCom networks. Finally, we envision emerging use scenarios, potential challenges, and possible solutions in future wireless communication networks.
{"title":"Principles, Applications, and Challenges of Reconfigurable Intelligent Surface-Enabled Backscatter Communication: A Comprehensive Survey and Outlook","authors":"Shuai Han;Jinming Wang;Cheng Li;Ekram Hossain","doi":"10.1109/COMST.2024.3519788","DOIUrl":"10.1109/COMST.2024.3519788","url":null,"abstract":"Backscatter communication (BackCom) networks are expected to provide ultra-low-power transmission and massive connectivity in future wireless communication systems. Nevertheless, the double-fading effect significantly reduces signal intensity and is a primary problem of modern BackCom systems. Reconfigurable Intelligent Surface (RIS) can artificially modify the wireless environment through numerous controllable reflecting elements. With the help of RIS, the desired signals in the BackCom procedure can be captured and reflected in the specified direction, which is able to alleviate the double-fading problem. Specifically, RIS can be a backscatter device to send information instead of a collaborator to enhance transmission, yielding the RIS-BackCom mechanism. However, a comprehensive review of this technique still needs to be made available, dramatically limiting its development. This paper presents the fundamental principles and functions of legacy BackCom systems, the RIS technique, and RIS-BackCom networks. Then, we discuss the system-level performance with different modulation and channel estimation approaches. Further, we introduce symbiotic radio (SR) networks developed from the RIS-BackCom technique. After that, we provide a survey on diverse optimization issues existing in the applications of RIS-BackCom networks. Finally, we envision emerging use scenarios, potential challenges, and possible solutions in future wireless communication networks.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"2937-2972"},"PeriodicalIF":34.4,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the interconnected world of the Internet, IP geolocation - identifying the geographic location of a device, user, or data source given their IP - plays an essential role in numerous applications and services. Over the years, IP geolocation technology has evolved, and it is now a cornerstone of the digital age. However, attaining accurate IP geolocation is not without its challenges. Our comprehensive survey explores IP geolocation, focusing on emerging challenges in security, data geolocation in the cloud, and coping with proxies and VPNs that are used to hide the real IP geolocation. These topics have gained prominence as organizations grapple with safeguarding the location of sensitive information, complying with data privacy regulations, and adapting to the dynamic digital landscape. By synthesizing research, analyzing industry practices, and exploring trends, we equip readers with a taxonomy and insights into the multifaceted world of geolocation and its vital role in shaping the digital future. This comprehensive survey not only enriches understanding of IP geolocation and its challenges but also provides a roadmap for future research, fostering increased awareness and the development of informed strategies for addressing the evolving landscape of geospatial security on the Internet.
{"title":"A Survey on Geolocation on the Internet","authors":"Aviram Zilberman;Adi Offer;Bar Pincu;Yoni Glickshtein;Roi Kant;Oleg Brodt;Andikan Otung;Rami Puzis;Asaf Shabtai;Yuval Elovici","doi":"10.1109/COMST.2024.3518398","DOIUrl":"10.1109/COMST.2024.3518398","url":null,"abstract":"In the interconnected world of the Internet, IP geolocation - identifying the geographic location of a device, user, or data source given their IP - plays an essential role in numerous applications and services. Over the years, IP geolocation technology has evolved, and it is now a cornerstone of the digital age. However, attaining accurate IP geolocation is not without its challenges. Our comprehensive survey explores IP geolocation, focusing on emerging challenges in security, data geolocation in the cloud, and coping with proxies and VPNs that are used to hide the real IP geolocation. These topics have gained prominence as organizations grapple with safeguarding the location of sensitive information, complying with data privacy regulations, and adapting to the dynamic digital landscape. By synthesizing research, analyzing industry practices, and exploring trends, we equip readers with a taxonomy and insights into the multifaceted world of geolocation and its vital role in shaping the digital future. This comprehensive survey not only enriches understanding of IP geolocation and its challenges but also provides a roadmap for future research, fostering increased awareness and the development of informed strategies for addressing the evolving landscape of geospatial security on the Internet.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"3339-3381"},"PeriodicalIF":34.4,"publicationDate":"2024-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142832461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-13DOI: 10.1109/COMST.2024.3516819
Shaolong Guo;Yuntao Wang;Ning Zhang;Zhou Su;Tom H. Luan;Zhiyi Tian;Xuemin Shen
With the rapid advancement and deployment of intelligent agents and artificial general intelligence (AGI), a fundamental challenge for future networks is enabling efficient communications among agents. Unlike traditional human-centric, data-driven communication networks, the primary goal of agent-based communication is to facilitate coordination among agents. Therefore, task comprehension and collaboration become the key objectives of communications, rather than data synchronization. Semantic communication (SemCom) aims to align information and knowledge among agents to expedite task comprehension. While significant research has been conducted on SemCom for two-agent systems, the development of semantic communication networks (SemComNet) for multi-agent systems remains largely unexplored. In this paper, we provide a comprehensive and up-to-date survey of SemComNet, focusing on their fundamentals, security, and privacy aspects. We introduce a novel three-layer architecture for multi-agent interaction, comprising the control layer, semantic transmission layer, and cognitive sensing layer. We explore working modes and enabling technologies, and present a taxonomy of security and privacy threats, along with state-of-the-art defense mechanisms. Finally, we outline future research directions, paving the way toward intelligent, robust, and energy-efficient SemComNet. This survey represents the first comprehensive analysis of SemComNet, offering detailed insights into the core principles as well as associated security and privacy challenges.
{"title":"A Survey on Semantic Communication Networks: Architecture, Security, and Privacy","authors":"Shaolong Guo;Yuntao Wang;Ning Zhang;Zhou Su;Tom H. Luan;Zhiyi Tian;Xuemin Shen","doi":"10.1109/COMST.2024.3516819","DOIUrl":"10.1109/COMST.2024.3516819","url":null,"abstract":"With the rapid advancement and deployment of intelligent agents and artificial general intelligence (AGI), a fundamental challenge for future networks is enabling efficient communications among agents. Unlike traditional human-centric, data-driven communication networks, the primary goal of agent-based communication is to facilitate coordination among agents. Therefore, task comprehension and collaboration become the key objectives of communications, rather than data synchronization. Semantic communication (SemCom) aims to align information and knowledge among agents to expedite task comprehension. While significant research has been conducted on SemCom for two-agent systems, the development of semantic communication networks (SemComNet) for multi-agent systems remains largely unexplored. In this paper, we provide a comprehensive and up-to-date survey of SemComNet, focusing on their fundamentals, security, and privacy aspects. We introduce a novel three-layer architecture for multi-agent interaction, comprising the control layer, semantic transmission layer, and cognitive sensing layer. We explore working modes and enabling technologies, and present a taxonomy of security and privacy threats, along with state-of-the-art defense mechanisms. Finally, we outline future research directions, paving the way toward intelligent, robust, and energy-efficient SemComNet. This survey represents the first comprehensive analysis of SemComNet, offering detailed insights into the core principles as well as associated security and privacy challenges.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"2860-2894"},"PeriodicalIF":34.4,"publicationDate":"2024-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142820908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-11DOI: 10.1109/COMST.2024.3515051
Ozlem Ceviz;Sevil Sen;Pinar Sadioglu
Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to complete a number of tasks in cooperation with each other without need for human intervention. In recent years, UAVs, which are widely utilized in military missions, have begun to be deployed in civilian applications and mostly for commercial purposes. With their growing numbers and range of applications, UAVs are becoming more and more popular; on the other hand, they are also the target of various threats which can exploit various vulnerabilities of UAV systems in order to cause destructive effects. It is therefore critical that security is ensured for UAVs and the networks that provide communication between UAVs. This survey seeks to provide a comprehensive perspective on security within the domain of UAVs and Flying Ad Hoc Networks (FANETs). Our approach incorporates attack surface analysis and aligns it with the identification of potential threats. Additionally, we discuss countermeasures proposed in the existing literature in two categories: preventive and detection strategies. Our primary focus centers on the security challenges inherent to FANETs, acknowledging their susceptibility to insider threats due to their decentralized and dynamic nature. To provide a deeper understanding of these challenges, we simulate and analyze four distinct routing attacks on FANETs, using realistic parameters to evaluate their impact. Hence, this study transcends a standard review by integrating an attack analysis based on extensive simulations. Finally, we rigorously examine open issues, and propose research directions to guide future endeavors in this field.
{"title":"A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions","authors":"Ozlem Ceviz;Sevil Sen;Pinar Sadioglu","doi":"10.1109/COMST.2024.3515051","DOIUrl":"10.1109/COMST.2024.3515051","url":null,"abstract":"Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to complete a number of tasks in cooperation with each other without need for human intervention. In recent years, UAVs, which are widely utilized in military missions, have begun to be deployed in civilian applications and mostly for commercial purposes. With their growing numbers and range of applications, UAVs are becoming more and more popular; on the other hand, they are also the target of various threats which can exploit various vulnerabilities of UAV systems in order to cause destructive effects. It is therefore critical that security is ensured for UAVs and the networks that provide communication between UAVs. This survey seeks to provide a comprehensive perspective on security within the domain of UAVs and Flying Ad Hoc Networks (FANETs). Our approach incorporates attack surface analysis and aligns it with the identification of potential threats. Additionally, we discuss countermeasures proposed in the existing literature in two categories: preventive and detection strategies. Our primary focus centers on the security challenges inherent to FANETs, acknowledging their susceptibility to insider threats due to their decentralized and dynamic nature. To provide a deeper understanding of these challenges, we simulate and analyze four distinct routing attacks on FANETs, using realistic parameters to evaluate their impact. Hence, this study transcends a standard review by integrating an attack analysis based on extensive simulations. Finally, we rigorously examine open issues, and propose research directions to guide future endeavors in this field.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"3227-3265"},"PeriodicalIF":34.4,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142809326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-09DOI: 10.1109/COMST.2024.3513213
Hammad Ahmed Khan;Haibat Khan;Salman Ghafoor;Mansoor Ahmed Khan
This work delves into critical examination of the broadcast data safety of Automatic Dependent Surveillance-Broadcast (ADS-B) system, an essential protocol for aircraft identification and navigation. Globally mandated by civil aviation regulatory bodies, ADS-B plays a pivotal role in shaping the future of Air Traffic Management initiatives. This study thoroughly investigates the vulnerabilities inherent in the open and un-encrypted nature of ADS-B data transmission. Given the widespread availability of Software-Defined Radios (SDRs), these security threats pose significant risks to Air Traffic Services and passenger safety. In light of these challenges, the paper scrutinises existing research and industry documents to comprehensively understand ADS-B vulnerabilities and assess threat levels and potential attacks. We also review recent developments and analyze proposed countermeasures aimed at enhancing the security of ADS-B data, possibly through protocol modifications or infrastructure enhancements.
{"title":"A Survey on Security of Automatic Dependent Surveillance-Broadcast (ADS-B) Protocol: Challenges, Potential Solutions, and Future Directions","authors":"Hammad Ahmed Khan;Haibat Khan;Salman Ghafoor;Mansoor Ahmed Khan","doi":"10.1109/COMST.2024.3513213","DOIUrl":"10.1109/COMST.2024.3513213","url":null,"abstract":"This work delves into critical examination of the broadcast data safety of Automatic Dependent Surveillance-Broadcast (ADS-B) system, an essential protocol for aircraft identification and navigation. Globally mandated by civil aviation regulatory bodies, ADS-B plays a pivotal role in shaping the future of Air Traffic Management initiatives. This study thoroughly investigates the vulnerabilities inherent in the open and un-encrypted nature of ADS-B data transmission. Given the widespread availability of Software-Defined Radios (SDRs), these security threats pose significant risks to Air Traffic Services and passenger safety. In light of these challenges, the paper scrutinises existing research and industry documents to comprehensively understand ADS-B vulnerabilities and assess threat levels and potential attacks. We also review recent developments and analyze proposed countermeasures aimed at enhancing the security of ADS-B data, possibly through protocol modifications or infrastructure enhancements.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"3199-3226"},"PeriodicalIF":34.4,"publicationDate":"2024-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142796910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The recent Open Radio Access Network (O-RAN) specifications promote the evolution of RAN architecture by function disaggregation, adoption of open interfaces, and instantiation of a hierarchical closed-loop control architecture managed by RAN Intelligent Controllers (RICs) entities. This paves the road to novel data-driven network management approaches based on programmable logic. Aided by Artificial Intelligence (AI) and Machine Learning (ML), novel solutions targeting traditionally unsolved RAN management issues can be devised. Nevertheless, the adoption of such smart and autonomous systems is limited by the current inability of human operators to understand the decision process of such AI/ML solutions, affecting their trust in such novel tools. eXplainable AI (XAI) aims at solving this issue, enabling human users to better understand and effectively manage the emerging generation of artificially intelligent schemes, reducing the human-to-machine barrier. In this survey, we provide a summary of the XAI methods and metrics before studying their deployment over the O-RAN Alliance RAN architecture along with its main building blocks. We then present various use-cases and discuss the automation of XAI pipelines for O-RAN as well as the underlying security aspects. We also review some projects/standards that tackle this area. Finally, we identify different challenges and research directions that may arise from the heavy adoption of AI/ML decision entities in this context, focusing on how XAI can help to interpret, understand, and improve trust in O-RAN operational networks.
{"title":"Explainable AI in 6G O-RAN: A Tutorial and Survey on Architecture, Use Cases, Challenges, and Future Research","authors":"Bouziane Brik;Hatim Chergui;Lanfranco Zanzi;Francesco Devoti;Adlen Ksentini;Muhammad Shuaib Siddiqui;Xavier Costa-Pérez;Christos Verikoukis","doi":"10.1109/COMST.2024.3510543","DOIUrl":"10.1109/COMST.2024.3510543","url":null,"abstract":"The recent Open Radio Access Network (O-RAN) specifications promote the evolution of RAN architecture by function disaggregation, adoption of open interfaces, and instantiation of a hierarchical closed-loop control architecture managed by RAN Intelligent Controllers (RICs) entities. This paves the road to novel data-driven network management approaches based on programmable logic. Aided by Artificial Intelligence (AI) and Machine Learning (ML), novel solutions targeting traditionally unsolved RAN management issues can be devised. Nevertheless, the adoption of such smart and autonomous systems is limited by the current inability of human operators to understand the decision process of such AI/ML solutions, affecting their trust in such novel tools. eXplainable AI (XAI) aims at solving this issue, enabling human users to better understand and effectively manage the emerging generation of artificially intelligent schemes, reducing the human-to-machine barrier. In this survey, we provide a summary of the XAI methods and metrics before studying their deployment over the O-RAN Alliance RAN architecture along with its main building blocks. We then present various use-cases and discuss the automation of XAI pipelines for O-RAN as well as the underlying security aspects. We also review some projects/standards that tackle this area. Finally, we identify different challenges and research directions that may arise from the heavy adoption of AI/ML decision entities in this context, focusing on how XAI can help to interpret, understand, and improve trust in O-RAN operational networks.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"2826-2859"},"PeriodicalIF":34.4,"publicationDate":"2024-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142760601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}