{"title":"Editorial: Fourth Quarter 2024 IEEE Communications Surveys and Tutorials","authors":"Dusit Niyato","doi":"10.1109/COMST.2024.3464708","DOIUrl":"https://doi.org/10.1109/COMST.2024.3464708","url":null,"abstract":"I welcome you to the fourth issue of the IEEE Communications Surveys and Tutorials in 2024. This issue includes 19 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications”, “Cyber Security”, “IoT and M2M”, “Vehicular and Sensor Communications”, “Internet Technologies”, “Network and Service Management and Green Communications”, “Network Virtualization”, “Optical Communications”, and “Multimedia Communications”. A brief account of each of these papers is given below.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"i-vi"},"PeriodicalIF":34.4,"publicationDate":"2024-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10762798","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142679407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blind Carrier Frequency Offset Estimation Techniques for Next-Generation Multicarrier Communication Systems: Challenges, Comparative Analysis, and Future Prospects","authors":"Shivani Singh;Sushant Kumar;Sudhan Majhi;Udit Satija;Chau Yuen","doi":"10.1109/COMST.2024.3472109","DOIUrl":"10.1109/COMST.2024.3472109","url":null,"abstract":"Frequency synchronization is essential to achieving the intended performance for single and multicarrier wireless systems. Blind techniques, which don’t require prior channel knowledge or pilot symbols, are crucial for dynamic environments where self-adaptive synchronization is needed. A key objective of this paper is to provide the readers as well as the industry’s professionals with a comprehensive understanding of the carrier frequency offset (CFO) problem in multicarrier communication systems like orthogonal frequency division multiplexing (OFDM), single carrier-frequency division multiple access (SC-FDMA), multiple input multiple output (MIMO)-OFDM, and MIMO-SC-FDMA. These waveforms are used in today’s and future wireless communication systems such as wireless-fidelity (Wi-Fi), fifth-generation, and sixth-generation. Moreover, this paper also develops a taxonomy of the available solutions to address the CFO issue. We study blind techniques for CFO estimation presented in the recent literature and give potential future directions. We summarize various statistical methods and deep learning algorithms for CFO estimation and emphasize their advantages and limitations. We also incorporate the CFO impact on next-generation wireless systems such as orthogonal time frequency space and reconfigurable intelligent surface-assisted communication systems and provide a broader and deeper knowledge of the area. We provide simulation results of some existing estimators and their performance comparison in terms of mean square error for better understanding. Therefore, this paper is perfectly adapted to provide a comprehensive information source on blind CFO estimation techniques.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"1-36"},"PeriodicalIF":34.4,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142362839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Editorial: Third Quarter 2024 IEEE Communications Surveys and Tutorials","authors":"Dusit Niyato","doi":"10.1109/COMST.2024.3430588","DOIUrl":"https://doi.org/10.1109/COMST.2024.3430588","url":null,"abstract":"I welcome you to the third issue of the IEEE Communications Surveys and Tutorials in 2024. This issue includes 19 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications”, “Cyber Security”, “Network Virtualization”, “Vehicular and Sensor Communications”, “Multimedia Communications”, “Network and Service Management and Green Communications”, and “Internet Technologies”. A brief account of each of these papers is given below.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 3","pages":"i-vii"},"PeriodicalIF":34.4,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10643728","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142041438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fazal E. Subhan;Abid Yaqoob;Cristina Hava Muntean;Gabriel-Miro Muntean
{"title":"A Survey on Artificial Intelligence Techniques for Improved Rich Media Content Delivery in a 5G and Beyond Network Slicing Context","authors":"Fazal E. Subhan;Abid Yaqoob;Cristina Hava Muntean;Gabriel-Miro Muntean","doi":"10.1109/COMST.2024.3442149","DOIUrl":"10.1109/COMST.2024.3442149","url":null,"abstract":"Network slicing is an emerging paradigm driven by an objective to provide support for personalized services in the highly evolving and dynamic 5G and beyond network environment. The management of network functions and resources under network slicing architecture for rich media content delivery is a challenging task that requires an efficient decision at all network levels to maintain the required Quality of Service (QoS) and Quality of Experience (QoE). Integrating Artificial Intelligence (AI) in the network slice architecture for taking efficient network decision is one of the potential solutions to the problem. In this paper, we summarize the network slicing enabling technologies such as Software Defined Network (SDN), Network Function Virtualization (NFV), Multi-access Edge Computing (MEC) in the context of AI for improving the rich media content delivery. In addition, we present a comprehensive survey on content-centric networking and delivery solutions based on network slicing technologies i.e., MPEG-DASH-enabled Information Centric Networking (ICN) and Content Delivery Network (CDN) for intelligent rich media content caching and prefetching, predictive analysis, content preference optimization, secure resource allocation, and dynamic traffic steering. Several standardization and orchestration mechanisms of 5G network slicing proposed by 3GPP are then presented. Finally, the challenges of AI-enabled 5G network slicing for immersive content delivery are outlined with potential solutions and future research opportunities.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 2","pages":"1427-1487"},"PeriodicalIF":34.4,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10636754","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141986578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zikai Chang;Yuntao Xu;Junjie Chen;Ning Xie;Yejun He;Hongbin Li
{"title":"Modeling, Estimation, and Applications of Phase Noise in Wireless Communications: A Survey","authors":"Zikai Chang;Yuntao Xu;Junjie Chen;Ning Xie;Yejun He;Hongbin Li","doi":"10.1109/COMST.2024.3443158","DOIUrl":"10.1109/COMST.2024.3443158","url":null,"abstract":"Phase noise is inevitably present in wireless communications, arising from both hardware impairments and imperfect channel estimation, and has substantial implications on the integrity and efficiency of communication systems. However, phase noise brings more to wireless systems than just negative effects. For instance, phase noise can be used as a physical layer feature to authenticate received signals and as a source for random number generation. There is a surprising lack of a comprehensive overview of the state-of-the-art estimation methods and applications of phase noise in wireless communications. In this paper, we conduct the first comprehensive survey on the modeling, estimation, and applications of phase noise in wireless communications. We review the state-of-the-art phase-noise models, phase-noise estimation, and mitigation techniques via joint transmit-receive design, as well as applications of phase noise in wireless communications, while highlighting contributions and critical issues of each reviewed work. Finally, we provide an expansive set of research directions, accompanying challenges, and potential solutions related to phase noise that could shape the future of phase noise research in wireless communications.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 2","pages":"912-940"},"PeriodicalIF":34.4,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141980812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Phishing Webpage Detection: Unveiling the Threat Landscape and Investigating Detection Techniques","authors":"Aditya Kulkarni;Vivek Balachandran;Tamal Das","doi":"10.1109/COMST.2024.3441752","DOIUrl":"10.1109/COMST.2024.3441752","url":null,"abstract":"In the realm of cybersecurity, phishing stands as a prevalent cyber attack, where attackers employ various tactics to deceive users into gathering their sensitive information, potentially leading to identity theft or financial gain. Researchers have been actively working on advancing phishing webpage detection approaches to detect new phishing URLs, bolstering user protection. Nonetheless, the ever-evolving strategies employed by attackers, aimed at circumventing existing detection approaches and tools, present an ongoing challenge to the research community. This survey presents a systematic categorization of diverse phishing webpage detection approaches, encompassing URL-based, webpage content-based, third-party-based and visual techniques. Through a comprehensive review of these approaches and an in-depth analysis of existing literature, our study underscores current research gaps in phishing webpage detection. Furthermore, we suggest potential solutions to address some of these gaps, contributing valuable insights to the ongoing efforts to combat phishing attacks.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 2","pages":"974-1007"},"PeriodicalIF":34.4,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141974018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abeer Awadallah;Khouloud Eledlebi;Mohamed Jamal Zemerly;Deepak Puthal;Ernesto Damiani;Kamal Taha;Tae-Yeon Kim;Paul D. Yoo;Kim-Kwang Raymond Choo;Man-Sung Yim;Chan Yeob Yeun
{"title":"Artificial Intelligence-Based Cybersecurity for the Metaverse: Research Challenges and Opportunities","authors":"Abeer Awadallah;Khouloud Eledlebi;Mohamed Jamal Zemerly;Deepak Puthal;Ernesto Damiani;Kamal Taha;Tae-Yeon Kim;Paul D. Yoo;Kim-Kwang Raymond Choo;Man-Sung Yim;Chan Yeob Yeun","doi":"10.1109/COMST.2024.3442475","DOIUrl":"10.1109/COMST.2024.3442475","url":null,"abstract":"The metaverse, known as the next-generation 3D Internet, represents virtual environments that mirror the physical world. It is supported by innovative technologies such as digital twins and extended reality (XR), which elevate user experiences across various fields. However, the metaverse also introduces significant cybersecurity and privacy challenges that remain underexplored. Due to its complex multi-tech infrastructure, the metaverse requires sophisticated, automated, and intelligent cybersecurity measures to mitigate emerging threats effectively. Therefore, this paper is the first to explore Artificial Intelligence (AI)-driven cybersecurity techniques for the metaverse, examining academic and industrial perspectives. First, we provide an overview of the metaverse, presenting a detailed system model, diverse use cases, and insights into its current industrial status. We then present attack models and cybersecurity threats derived from the unique characteristics and technologies of the metaverse. Next, we review AI-driven cybersecurity solutions based on three critical aspects: User authentication, intrusion detection systems (IDS), and the security of digital assets, specifically for Blockchain and Non-fungible Tokens (NFTs). Finally, we highlight challenges and suggest future research opportunities to enhance metaverse security, privacy, and digital asset transactions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 2","pages":"1008-1052"},"PeriodicalIF":34.4,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10634174","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141974056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Navigating the Road Ahead: A Comprehensive Survey of Radio Resource Allocation for Vehicle Platooning in C-V2X Communications","authors":"Chenyu Yang;Chiew Foong Kwong;David Chieng;Pushpendu Kar;Kok-Lim Alvin Yau;Yusen Chen","doi":"10.1109/COMST.2024.3440033","DOIUrl":"10.1109/COMST.2024.3440033","url":null,"abstract":"Vehicle-to-everything (V2X) communications have emerged as an indispensable component of the Intelligent Transportation Systems (ITS), fostering innovations that enhance road safety and traffic efficiency. Within this transformative landscape, vehicle platooning has been identified by the Cellular-V2X (C-V2X) standards as an advanced V2X use case with the potential to reshape the future of ITS. However, the stringent requirements of such applications necessitate an optimized spectrum efficiency. Consequently, Radio Resource Allocation (RRA) has emerged as a critical and central component in addressing this challenge. This paper provides a comprehensive examination of RRA tailored specifically to the context of vehicle platooning. It presents an overview of fundamental concepts, including V2X communications, vehicle platooning, and RRA standards, which is followed by an in-depth review of the state-of-the-art, categorized based on the underlying communication technologies, RRA modes, and coverage conditions. By analyzing the existing literature, this paper identifies several key research challenges and potential opportunities, offering insightful guidance for shaping future research in this field.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 2","pages":"1326-1362"},"PeriodicalIF":34.4,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141904441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}