-
Editorial: Third Quarter 2023 IEEE Communications Surveys and Tutorials IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-08-22 Dusit Niyato
I welcome you to the third issue of the IEEE Communications Surveys and Tutorials in 2023. This issue includes 18 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications,” “Cyber Security,” “IoT and M2M,” “Internet Technologies,” “Network Virtualization,” and “Network and Service Management and Green Communications
-
Low Earth Orbit Satellite Security and Reliability: Issues, Solutions, and the Road Ahead IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-08-04 Pingyue Yue, Jianping An, Jiankang Zhang, Jia Ye, Gaofeng Pan, Shuai Wang, Pei Xiao, Lajos Hanzo
Low Earth Orbit (LEO) satellites undergo a period of rapid development driven by ever-increasing user demands, reduced costs, and technological progress. Since there is a lack of literature on the security and reliability issues of LEO Satellite Communication Systems (SCSs), we aim to fill this knowledge gap. Specifically, we critically appraise the inherent characteristics of LEO SCSs and elaborate
-
MIMO Satellite Communication Systems: A Survey From the PHY Layer Perspective IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-07-12 Jehyun Heo, Seungwoo Sung, Hyunwoo Lee, Incheol Hwang, Daesik Hong
The satellite communications (SatCom) system is a representative technology for global coverage and seamless communications in next-generation communication systems. This paper is a survey of basic studies and recent research trends for multiple input multiple output (MIMO) SatCom. Specifically, we describe and provide the differences between terrestrial networks and SatCom. Furthermore, we categorize
-
A Survey on Applications of Cache-Aided NOMA IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-07-07 Dipen Bepari, Soumen Mondal, Aniruddha Chandra, Rajeev Shukla, Yuanwei Liu, Mohsen Guizani, Arumugam Nallanathan
Contrary to orthogonal multiple-access (OMA), non-orthogonal multiple-access (NOMA) schemes can serve a pool of users without exploiting the scarce frequency or time domain resources. This is useful in meeting the future network requirements (5G and beyond systems), such as, low latency, massive connectivity, users’ fairness, and high spectral efficiency. On the other hand, content caching restricts
-
A Survey of Public IoT Datasets for Network Security Research IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-06-23 François De Keersmaeker, Yinan Cao, Gorby Kabasele Ndonda, Ramin Sadre
Publicly available datasets are an indispensable tool for researchers, as they allow testing new algorithms on a wide range of different scenarios and making scientific experiments verifiable and reproducible. Research in IoT security is no exception. In particular, the design of traffic classification and intrusion detection solutions for network security relies on network traces obtained from real
-
A Tutorial on the Tracking, Telemetry, and Command (TT&C) for Space Missions IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-06-19 Andrea Modenini, Barbara Ripani
This paper presents a tutorial on the Tracking, Telemetry, and Command (TT&C) for spacecraft and satellite missions. In particular, it provides a thorough summary of the design of the TT&C, starting from elementary system aspects and going down to the details of the on-board TT&C subsystem design, its units, and the physical layer. The paper is then complemented with a description of emerging TT&C
-
Tensor-Empowered Federated Learning for Cyber-Physical-Social Computing and Communication Systems IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-06-02 Laurence T. Yang, Ruonan Zhao, Debin Liu, Wanli Lu, Xianjun Deng
The deep fusion of human-centered Cyber-Physical-Social Systems (CPSSs) has attracted widespread attention worldwide and big data as the blood of CPSSs could lay a solid data cornerstone for providing more proactive and accurate wisdom services. However, due to concerns about data privacy and security, traditional data centralized learning paradigm is no longer suitable. Federated Learning (FL) as
-
Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-05-26 Nour Moustafa, Nickolaos Koroniotis, Marwa Keshk, Albert Y. Zomaya, Zahir Tari
The field of Explainable Artificial Intelligence (XAI) has garnered considerable research attention in recent years, aiming to provide interpretability and confidence to the inner workings of state-of-the-art deep learning models. However, XAI-enhanced cybersecurity measures in the Internet of Things (IoT) and its sub-domains, require further investigation to provide effective discovery of attack surfaces
-
Editorial: Second Quarter 2023 IEEE Communications Surveys and Tutorials IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-05-22 Dusit Niyato
I welcome you to the second issue of the IEEE Communications Surveys and Tutorials in 2023. This issue includes 15 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications,” “Cyber Security,” “Internet Technologies,” “Network and Service Management and Green Communications,” “Multimedia Communications,” “Network
-
Corrections to “On the Capacity of Intensity-Modulation Direct-Detection Gaussian Optical Wireless Communication Channels: A Tutorial” IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-05-22 Anas Chaaban, Zouheir Rezki, Mohamed-Slim Alouini
In the above article [1] , equations (116) and (122) appeared with errors. The correct equations and affected text follow.
-
Backscatter Communication Meets Practical Battery-Free Internet of Things: A Survey and Outlook IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-05-19 Tao Jiang, Yu Zhang, Wenyuan Ma, Miaoran Peng, Yuxiang Peng, Mingjie Feng, Guanghua Liu
Battery-free Internet-of-Things (BF-IoT), which is realized by harvesting ambient energy to power the IoT devices, has emerged to reduce the energy consumption, and alleviate environmental concerns caused by extensive battery usage. However, current wireless technologies for IoT, such as Bluetooth, ZigBee, and long range radio (LoRa), cannot be efficiently supported by ambient energy due to high power
-
A Survey on Scalable LoRaWAN for Massive IoT: Recent Advances, Potentials, and Challenges IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-05-10 Mohammed Jouhari, Nasir Saeed, Mohamed-Slim Alouini, El Mehdi Amhoud
Long-range (LoRa) technology is most widely used for enabling low-power wide area networks (WANs) on unlicensed frequency bands. Despite its modest data rates, it provides extensive coverage for low-power devices, making it an ideal communication system for many Internet of Things (IoT) applications. In general, LoRa is considered as the physical layer, whereas LoRaWAN is the medium access control
-
A Concise Tutorial on Traffic Shaping and Scheduling in Time-Sensitive Networks IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-05-10 Yeongjae Kim
Over the last two decades, IEEE has been defining standards for Time-Sensitive Networking (TSN). These standards combine traffic shaping and scheduling mechanisms to guarantee bounded delays across an Ethernet network. Time-Sensitive Networks are designed for applications where delays are critical, such as process control, networks for vehicles and aircraft, and virtual reality applications. Many industrial
-
Machine Learning for Service Migration: A Survey IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-05-08 Nassima Toumi, Miloud Bagaa, Adlen Ksentini
Future communication networks are envisioned to satisfy increasingly granular and dynamic requirements to accommodate the application and user demands. Indeed, novel immersive and mission-critical services necessitate increased computing and network resources, reduced communication latency, and guaranteed reliability. Thus, efficient and adaptive resource management schemes are required to provide
-
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-05-05 Nan Sun, Ming Ding, Jiaojiao Jiang, Weikang Xu, Xiaoxing Mo, Yonghang Tai, Jun Zhang
Today’s cyber attacks have become more severe and frequent, which calls for a new line of security defenses to protect against them. The dynamic nature of new-generation threats, which are evasive, resilient, and complex, makes traditional security systems based on heuristics and signatures struggle to match. Organizations aim to gather and share real-time cyber threat information and then turn it
-
Toward Addressing Training Data Scarcity Challenge in Emerging Radio Access Networks: A Survey and Framework IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-05-01 Haneya Naeem Qureshi, Usama Masood, Marvin Manalastas, Syed Muhammad Asad Zaidi, Hasan Farooq, Julien Forgeat, Maxime Bouton, Shruti Bothe, Per Karlsson, Ali Rizwan, Ali Imran
The future of cellular networks is contingent on artificial intelligence (AI) based automation, particularly for radio access network (RAN) operation, optimization, and troubleshooting. To achieve such zero-touch automation, a myriad of AI-based solutions are being proposed in literature to leverage AI for modeling and optimizing network behavior to achieve the zero-touch automation goal. However,
-
A Survey on Industrial Control System Digital Forensics: Challenges, Advances and Future Directions IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-04-11 Marco Cook, Angelos Marnerides, Chris Johnson, Dimitrios Pezaros
Operational Technology (OT) systems have become increasingly interconnected and automated, consequently resulting in them becoming targets of cyber attacks, with the threat towards a range of critical national infrastructure (CNI) sectors becoming heightened. This is particularly the case for Industrial Control Systems (ICS), which control and operate the physical processes in CNI sectors such as water
-
A Survey on Low-Power GNSS IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-04-10 Antoine Grenier, Elena Simona Lohan, Aleksandr Ometov, Jari Nurmi
With the miniaturization of electronics, receivers are getting more and more embedded into devices with harsh energy constraints. This process has led to new signal processing challenges due to the limited processing power on battery-operated devices and to challenging wireless environments, such as deep urban canyons, tunnels and bridges, forest canopies, increased jamming and spoofing. The latter
-
Empowering Network Security With Programmable Switches: A Comprehensive Survey IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-04-10 Xiang Chen, Chunming Wu, Xuan Liu, Qun Huang, Dong Zhang, Haifeng Zhou, Qiang Yang, Muhammad Khurram Khan
With the growth of network applications such as 5G and artificial intelligence, network security techniques, i.e., the techniques that detect various attacks (e.g., well-known denial-of-service (DDoS) attacks) and prevent production networks (e.g., data center networks) from being attacked, become increasingly essential for network management and have gained great popularity in the networking community
-
A Survey on Controller Area Network Reverse Engineering IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-04-05 Alessio Buscemi, Ion Turcanu, German Castignani, Andriy Panchenko, Thomas Engel, Kang G. Shin
Controller Area Network (CAN) is a masterless serial bus designed and widely used for the exchange of mission and time-critical information within commercial vehicles. In-vehicle communication is based on messages sent and received by Electronic Control Units (ECUs) connected to this serial bus network. Although unencrypted, CAN messages are not easy to interpret. In fact, Original Equipment Manufacturers
-
A Survey on Over-the-Air Computation IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-04-05 Alphan Şahin, Rui Yang
Communication and computation are often viewed as separate tasks. This approach is very effective from the perspective of engineering as isolated optimizations can be performed. However, for many computation-oriented applications, the main interest is a function of the local information at the devices, rather than the local information itself. In such scenarios, information theoretical results show
-
Covert Communications: A Comprehensive Survey IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-04-03 Xinying Chen, Jianping An, Zehui Xiong, Chengwen Xing, Nan Zhao, F. Richard Yu, Arumugam Nallanathan
Information security has always been a critical issue in wireless networks. Apart from other secure techniques, covert communication emerges as a potential solution to security for wireless networks owing to its high-security level. In covert communication networks, the transmitter hides the transmitted signals into environmental or artificial noise by introducing randomness to avoid detection at the
-
A Tutorial on Immersive Video Delivery: From Omnidirectional Video to Holography IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-03-30 Jeroen van der Hooft, Hadi Amirpour, Maria Torres Vega, Yago Sanchez, Raimund Schatz, Thomas Schierl, Christian Timmerer
Video services are evolving from traditional two-dimensional video to virtual reality and holograms, which offer six degrees of freedom to users, enabling them to freely move around in a scene and change focus as desired. However, this increase in freedom translates into stringent requirements in terms of ultra-high bandwidth (in the order of Gigabits per second) and minimal latency (in the order of
-
Coding Techniques for Backscatter Communications—A Contemporary Survey IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-03-22 Fatemeh Rezaei REZAEIDINDARLOO, Diluka Galappaththige, Chintha Tellambura, Sanjeewa Herath
Backscatter communication (BackCom) networks enable passive/battery-free Internet-of-Thing devices, providing reliable, massive connectivity while ensuring self-sustainability, low maintenance, and low costs. Effective channel codes and decoding algorithms are necessary to achieve these objectives. However, a comprehensive survey/review paper on such techniques for BackCom networks has not been available
-
Artificial Intelligence of Things for Smarter Healthcare: A Survey of Advancements, Challenges, and Opportunities IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-03-13 Stephanie Baker, Wei Xiang
Healthcare systems are under increasing strain due to a myriad of factors, from a steadily ageing global population to the current COVID-19 pandemic. In a world where we have needed to be connected but apart, the need for enhanced remote and at-home healthcare has become clear. The Internet of Things (IoT) offers a promising solution. The IoT has created a highly connected world, with billions of devices
-
A Survey of Important Issues in Quantum Computing and Communications IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-03-08 Zebo Yang, Maede Zolanvari, Raj Jain
Driven by the rapid progress in quantum hardware, recent years have witnessed a furious race for quantum technologies in both academia and industry. Universal quantum computers have supported up to hundreds of qubits, while the scale of quantum annealers has reached three orders of magnitude (i.e., thousands of qubits). Quantum computing power keeps climbing. Race has consequently generated an overwhelming
-
Security of Wide-Area Monitoring, Protection, and Control (WAMPAC) Systems of the Smart Grid: A Survey on Challenges and Opportunities IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-03-08 Saghar Vahidi, Mohsen Ghafouri, Minh Au, Marthe Kassouf, Arash Mohammadi, Mourad Debbabi
The evolution of power generation systems, along with their related increase in complexity, led to the critical necessity of Wide-Area Monitoring, Protection, and Control (WAMPAC) systems in today’s smart grid. Recent developments in smart measurement devices coupled with data communication technologies allow for significant improvements in power systems’ reliability, efficiency, and security. These
-
On the Road to 6G: Visions, Requirements, Key Technologies, and Testbeds IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-02-27 Cheng-Xiang Wang, Xiaohu You, Xiqi Gao, Xiuming Zhu, Zixin Li, Chuan Zhang, Haiming Wang, Yongming Huang, Yunfei Chen, Harald Haas, John S. Thompson, Erik G. Larsson, Marco Di Renzo, Wen Tong, Peiying Zhu, Xuemin Shen, H. Vincent Poor, Lajos Hanzo
Fifth generation (5G) mobile communication systems have entered the stage of commercial deployment, providing users with new services, improved user experiences as well as a host of novel opportunities to various industries. However, 5G still faces many challenges. To address these challenges, international industrial, academic, and standards organizations have commenced research on sixth generation
-
Editorial: First Quarter 2023 IEEE Communications Surveys and Tutorials IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-02-23 Dusit Niyato
Iwelcome you to the first issue of the IEEE COMMUNICATIONS SURVEYS AND TUTORIALS in 2023. This issue includes 25 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications”, “Cyber Security”, “IoT and M2M”, “Internet Technologies”, “Network Virtualization”, “Network and Service Management and Green Communications”
-
A Tutorial on Internet of Behaviors: Concept, Architecture, Technology, Applications, and Challenges IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-02-22 Qinglin Zhao, Guangcheng Li, Jincheng Cai, MengChu Zhou, Li Feng
In his blogs of 2012, Dr. Göte Nyman coined Internet of Behaviors (IoB). In his idea, people’s behaviors are very good predictors of their needs, and hence technology companies can network human behaviors and construct behavior-based systems to deliver more timely, responsive, and intelligent services with privacy protection. In 2020, Gartner ranked IoB first among its top nine strategic technology
-
Survey on Machine Learning for Traffic-Driven Service Provisioning in Optical Networks IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-02-22 Tania Panayiotou, Maria Michalopoulou, Georgios Ellinas
The unprecedented growth of the global Internet traffic, coupled with the large spatio-temporal fluctuations that create, to some extent, predictable tidal traffic conditions, are motivating the evolution from reactive to proactive and eventually towards adaptive optical networks. In these networks, traffic-driven service provisioning can address the problem of network over-provisioning and better
-
Aerospace Integrated Networks Innovation for Empowering 6G: A Survey and Future Challenges IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-02-16 Di Zhou, Min Sheng, Jiandong Li, Zhu Han
The ever-increasing demand for ubiquitous and differentiated services at anytime and anywhere emphasizes the necessity of aerospace integrated networks (AINs) which consist of multi-tiers, e.g., high-altitude platforms (HAPs) tier, unmanned aerial vehicles (UAVs) tier, low earth orbit (LEO) satellites tier, etc. for wide coverage and high capacity. However, the inherent heterogeneity, time-variability
-
Security and Privacy on 6G Network Edge: A Survey IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-02-14 Bomin Mao, Jiajia Liu, Yingying Wu, Nei Kato
To meet the stringent service requirements of 6G applications such as immersive cloud eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that an increasing number of servers will be deployed on the network edge. Then, the techniques, edge computing, edge caching, and edge intelligence will be more widely utilized for intelligent local data storage and processing generated
-
Twelve Scientific Challenges for 6G: Rethinking the Foundations of Communications Theory IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-02-10 Marwa Chafii, Lina Bariah, Sami Muhaidat, Merouane Debbah
The research in the sixth generation of wireless networks needs to tackle new challenges in order to meet the requirements of emerging applications in terms of high data rate, low latency, high reliability, and massive connectivity. To this end, the entire communication chain needs to be optimized, including the channel and the surrounding environment, as it is no longer sufficient to control the transmitter
-
Offloading Using Traditional Optimization and Machine Learning in Federated Cloud–Edge–Fog Systems: A Survey IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-01-25 Binayak Kar, Widhi Yahya, Ying-Dar Lin, Asad Ali
The huge amount of data generated by the Internet of Things (IoT) devices needs the computational power and storage capacity provided by cloud, edge, and fog computing paradigms. Each of these computing paradigms has its own pros and cons. Cloud computing provides enhanced data storage and computing power but causes high communication latency. Edge and fog computing provide similar services with lower
-
Understanding O-RAN: Architecture, Interfaces, Algorithms, Security, and Research Challenges IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-01-23 Michele Polese, Leonardo Bonati, Salvatore D’Oro, Stefano Basagni, Tommaso Melodia
The Open Radio Access Network (RAN) and its embodiment through the O-RAN Alliance specifications are poised to revolutionize the telecom ecosystem. O-RAN promotes virtualized RANs where disaggregated components are connected via open interfaces and optimized by intelligent controllers. The result is a new paradigm for the RAN design, deployment, and operations: O-RAN networks can be built with multi-vendor
-
A Survey on Machine Learning-Based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-01-12 Abdelwahab Boualouache, Thomas Engel
Advances in Vehicle-to-Everything (V2X) technology and onboard sensors have significantly accelerated deploying Connected and Automated Vehicles (CAVs). Integrating V2X with 5G has enabled Ultra-Reliable Low Latency Communications (URLLC) to CAVs. However, while communication performance has been enhanced, security and privacy issues have increased. Attacks have become more aggressive, and attackers
-
Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2023-01-03 Ke He, Dan Dongseong Kim, Muhammad Rizwan Asghar
Network-based Intrusion Detection System (NIDS) forms the frontline defence against network attacks that compromise the security of the data, systems, and networks. In recent years, Deep Neural Networks (DNNs) have been increasingly used in NIDS to detect malicious traffic due to their high detection accuracy. However, DNNs are vulnerable to adversarial attacks that modify an input example with imperceivable
-
A Critical Survey of EEG-Based BCI Systems for Applications in Industrial Internet of Things IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-12-28 Rahul Ajmeria, Mayukh Mondal, Reya Banerjee, Tamesh Halder, Pallav Kumar Deb, Debasish Mishra, Pravanjan Nayak, Sudip Misra, Surjya Kanta Pal, Debashish Chakravarty
Industrial Internet of Things (IIoT) and its applications have seen a paradigm shift since the advent of artificial intelligence and machine learning. However, these methods are mostly data-centric and lack flexibility. Brain-Computer Interface (BCI) is envisioned as an efficient solution that may overcome the shortcomings of data-centric techniques by introducing human intuition in the process loop
-
A Comprehensive Study on LPWANs With a Focus on the Potential of LoRa/LoRaWAN Systems IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-12-16 Christos Milarokostas, Dimitris Tsolkas, Nikos Passas, Lazaros Merakos
The Internet of Things (IoT) ecosystem emerges rapidly and paves the way towards collecting huge amounts of data that can feed innovative information-based systems. The connectivity infrastructure that will support the IoT ecosystem encompasses deployments that define the so-called Low-Power Wide Area Networks (LPWANs). LPWANs are an attractive solution for IoT service provisioning, since they incorporate
-
RIS-Assisted Visible Light Communication Systems: A Tutorial IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-12-01 Sylvester Aboagye, Alain R. Ndjiongue, Telex M. N. Ngatched, Octavia A. Dobre, H. Vincent Poor
Recent intensive and extensive development of the fifth-generation (5G) of cellular networks has led to their deployment throughout much of the world. As part of this implementation, one of the challenges that must be addressed is the skip-zone problem, which occurs when objects such as trees, people, animals, and vehicles obstruct the transmission of signals. In free-space optical (FSO) and radio
-
A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-11-28 Senming Yan, Jing Ren, Wei Wang, Limin Sun, Wei Zhang, Quan Yu
Malware poses a severe threat to cyber security. Attackers use malware to achieve their malicious purposes, such as unauthorized access, stealing confidential data, blackmailing, etc. Machine learning-based defense methods are applied to classify malware examples. However, such methods are vulnerable to adversarial attacks, where attackers aim to generate adversarial examples that can evade detection
-
A Survey on Blockchain for Healthcare: Challenges, Benefits, and Future Directions IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-11-24 Mohammad Salar Arbabi, Chhagan Lal, Narasimha Raghavan Veeraragavan, Dusica Marijan, Jan F. Nygård, Roman Vitenberg
Continuously generated volumes of health data make healthcare a data-intensive domain. This data needs to be collected, stored, and shared among different healthcare actors for various purposes, such as reporting, analysis, collaborative research, and personalized healthcare services. However, the existing data storage and exchange solutions in the healthcare domain exhibit several challenges related
-
Reinforcement Learning-Based Physical Cross-Layer Security and Privacy in 6G IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-11-23 Xiaozhen Lu, Liang Xiao, Pengmin Li, Xiangyang Ji, Chenren Xu, Shui Yu, Weihua Zhuang
Sixth-generation (6G) cellular systems will have an inherent vulnerability to physical (PHY)-layer attacks and privacy leakage, due to the large-scale heterogeneous networks with booming time-sensitive applications. Important wireless techniques including non-orthogonal multiple access, mobile edge computing, millimeter-wave, massive multiple-input and multiple-output, visible light communication,
-
Editorial: Fourth Quarter 2022 IEEE Communications Surveys and Tutorials IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-11-21 Dusit Tao Niyato
I Welcome you to the fourth issue of the IEEE Communications Surveys and Tutorials in 2022. This issue includes 19 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications,” “Network Security,” “IoT and M2M,” “Network and Service Management and Green Communications,” and “Internet Technologies.” A brief account
-
Semantic Communications for Future Internet: Fundamentals, Applications, and Challenges IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-11-18 Wanting Yang, Hongyang Du, Zi Qin Liew, Wei Yang Bryan Lim, Zehui Xiong, Dusit Niyato, Xuefen Chi, Xuemin Shen, Chunyan Miao
With the increasing demand for intelligent services, the sixth-generation (6G) wireless networks will shift from a traditional architecture that focuses solely on a high transmission rate to a new architecture that is based on the intelligent connection of everything. Semantic communication (SemCom), a revolutionary architecture that integrates user as well as application requirements and the meaning
-
Integration of Blockchain and Auction Models: A Survey, Some Applications, and Challenges IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-11-16 Zeshun Shi, Cees de Laat, Paola Grosso, Zhiming Zhao
In recent years, blockchain has gained widespread attention as an emerging technology for decentralization, transparency, and immutability in advancing online activities over public networks. As an essential market process, auctions have been well studied and applied in many business fields due to their efficiency and contributions to fair trade. Complementary features between blockchain and auction
-
A Full Dive Into Realizing the Edge-Enabled Metaverse: Visions, Enabling Technologies, and Challenges IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-11-10 Minrui Xu, Wei Chong Ng, Wei Yang Bryan Lim, Jiawen Kang, Zehui Xiong, Dusit Niyato, Qiang Yang, Xuemin Shen, Chunyan Miao
Dubbed “the successor to the mobile Internet,” the concept of the Metaverse has grown in popularity. While there exist lite versions of the Metaverse today, they are still far from realizing the full vision of an immersive, embodied, and interoperable Metaverse. Without addressing the issues of implementation from the communication and networking, as well as computation perspectives, the Metaverse
-
A Top-Down Survey on Optical Wireless Communications for the Internet of Things IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-11-08 Abdulkadir Celik, Imene Romdhane, Georges Kaddoum, Ahmed M. Eltawil
The Internet of Things (IoT) is a transformative technology marking the beginning of a new era where physical, biological, and digital worlds are integrated by connecting a plethora of uniquely identifiable smart objects. Although the Internet of Terrestrial Things (IoTT) has been at the center of our IoT perception, it has been recently extended to different environments, such as the Internet of Underwater
-
Distributed Artificial Intelligence Empowered by End-Edge-Cloud Computing: A Survey IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-11-01 Sijing Duan, Dan Wang, Ju Ren, Feng Lyu, Ye Zhang, Huaqing Wu, Xuemin Shen
As the computing paradigm shifts from cloud computing to end-edge-cloud computing, it also supports artificial intelligence evolving from a centralized manner to a distributed one. In this paper, we provide a comprehensive survey on the distributed artificial intelligence (DAI) empowered by end-edge-cloud computing (EECC), where the heterogeneous capabilities of on-device computing, edge computing
-
A Survey on DRX Mechanism: Device Power Saving From LTE and 5G New Radio to 6G Communication Systems IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-10-28 Kuang-Hsun Lin, He-Hsuan Liu, Kai-Hsin Hu, An Huang, Hung-Yu Wei
The Discontinuous Reception (DRX) is the most effective timer-based mechanism for User Equipment (UE) power saving. In Long Term Evolution (LTE) systems, the development of the DRX mechanism enormously extends the UE battery life. With the DRX mechanism, a UE is allowed to enter a dormant state. Given a DRX cycle, the UE needs to wake up periodically during the dormancy to check whether it receives
-
AI-Driven Packet Forwarding With Programmable Data Plane: A Survey IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-10-27 Wei Quan, Ziheng Xu, Mingyuan Liu, Nan Cheng, Gang Liu, Deyun Gao, Hongke Zhang, Xuemin Shen, Weihua Zhuang
The existing packet forwarding technology cannot meet the increasing requirements of Internet development due to its rigid framework. Application of artificial intelligence (AI) for efficient packet forwarding is gaining more and more interest as a new direction. Recently, the explosive development of programmable data plane (PDP) has provided a potential impetus to packet forwarding driven by AI.
-
A Survey on Intent-Based Networking IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-10-20 Aris Leivadeas, Matthias Falkner
Current and future network services and applications are expected to revolutionize our society and lifestyle. At the same time, the abundant possibilities that new network technologies offer to end users, network operators and administrators have created a cumbersome network configuration process to accommodate all different stakeholders and applications. Thus, lately, there is a need to simplify the
-
A Survey on In-Network Computing: Programmable Data Plane and Technology Specific Applications IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-10-14 Somayeh Kianpisheh, Tarik Taleb
In comparison with cloud computing, edge computing offers processing at locations closer to end devices and reduces the user experienced latency. The new recent paradigm of in-network computing employs programmable network elements to compute on the path and prior to traffic reaching the edge or cloud servers. It advances common edge/cloud server based computing through proposing line rate processing
-
Zero Touch Management: A Survey of Network Automation Solutions for 5G and 6G Networks IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-10-06 Estefanía Coronado, Rasoul Behravesh, Tejas Subramanya, Adriana Fernàndez-Fernàndez, Muhammad Shuaib Siddiqui, Xavier Costa-Pérez, Roberto Riggio
Mobile networks are facing an unprecedented demand for high-speed connectivity originating from novel mobile applications and services and, in general, from the adoption curve of mobile devices. However, coping with the service requirements imposed by current and future applications and services is very difficult since mobile networks are becoming progressively more heterogeneous and more complex.
-
A Survey on Mobility of Edge Computing Networks in IoT: State-of-the-Art, Architectures, and Challenges IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-10-04 Forough Shirin Abkenar, Parisa Ramezani, Saeid Iranmanesh, Sarumathi Murali, Donpiti Chulerttiyawong, Xinyu Wan, Abbas Jamalipour, Raad Raad
Edge computing leverages computing resources closer to the end-users at the edge of the network, rather than distant cloud servers in the centralized IoT architecture. Edge computing nodes (ECNs), experience less transmission latency and usually save on energy while network overheads are mitigated. The ECNs can be fixed or mobile in their positions. We will focus on mobile ECNs in this survey. This
-
WiFi Sensing on the Edge: Signal Processing Techniques and Challenges for Real-World Systems IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-09-23 Steven M. Hernandez, Eyuphan Bulut
In this work, we evaluate the feasibility of deploying ubiquitous WiFi sensing systems at the edge and consider the applicability of existing techniques on constrained edge devices and what challenges still exist for deploying WiFi sensing devices outside of laboratory environments. Through an extensive survey of existing literature in the area of WiFi sensing, we discover common signal processing
-
Digital Twins: A Survey on Enabling Technologies, Challenges, Trends and Future Prospects IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-09-22 Stefan Mihai, Mahnoor Yaqoob, Dang V. Hung, William Davis, Praveer Towakel, Mohsin Raza, Mehmet Karamanoglu, Balbir Barn, Dattaprasad Shetve, Raja V. Prasad, Hrishikesh Venkataraman, Ramona Trestian, Huan X. Nguyen
Digital Twin (DT) is an emerging technology surrounded by many promises, and potentials to reshape the future of industries and society overall. A DT is a system-of-systems which goes far beyond the traditional computer-based simulations and analysis. It is a replication of all the elements, processes, dynamics, and firmware of a physical system into a digital counterpart. The two systems (physical
-
Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-09-20 Meng Shen, Ke Ye, Xingtong Liu, Liehuang Zhu, Jiawen Kang, Shui Yu, Qi Li, Ke Xu
Traffic analysis is the process of monitoring network activities, discovering specific patterns, and gleaning valuable information from network traffic. It can be applied in various fields such as network assert probing and anomaly detection. With the advent of network traffic encryption, however, traffic analysis becomes an arduous task. Due to the invisibility of packet payload, traditional traffic
-
A Comprehensive Survey on Radio Resource Management in 5G HetNets: Current Solutions, Future Trends and Open Issues IEEE Commun. Surv. Tutor. (IF 35.6) Pub Date : 2022-09-20 Bharat Agarwal, Mohammed Amine Togou, Marco Marco, Gabriel-Miro Muntean
The 5G network technologies are intended to accommodate innovative services with a large influx of data traffic with lower energy consumption and increased quality of service and user quality of experience levels. In order to meet 5G expectations, heterogeneous networks (HetNets) have been introduced. They involve deployment of additional low power nodes within the coverage area of conventional high