IEEE Communications Surveys and Tutorials最新文献

筛选
英文 中文
Security Analysis of Critical 5G Interfaces 关键 5G 接口的安全分析
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-13 DOI: 10.1109/COMST.2024.3377161
Mohammed Mahyoub;AbdulAziz AbdulGhaffar;Emmanuel Alalade;Ezekiel Ndubisi;Ashraf Matrawy
{"title":"Security Analysis of Critical 5G Interfaces","authors":"Mohammed Mahyoub;AbdulAziz AbdulGhaffar;Emmanuel Alalade;Ezekiel Ndubisi;Ashraf Matrawy","doi":"10.1109/COMST.2024.3377161","DOIUrl":"10.1109/COMST.2024.3377161","url":null,"abstract":"Interfaces play a crucial role in the Fifth Generation (5G) architecture as they interconnect Network Functions (NFs) to exchange data and services. Certain interfaces are particularly critical because they are involved in the exchange of sensitive data or are exposed externally. To the best of our knowledge, no literature work analyzes the 5G security from a network architecture or interface perspective. Therefore, existing research on 5G security may not be helpful when considering a certain component of the network or a specific interface. This paper reviews the security measures recommended by the selected Standardization Development Organizations (SDOs) for critical interfaces and classifies them based on security goals. It also identifies vulnerabilities and threats to these interfaces in the absence of security measures and categorizes them based on STRIDE model and impacted traffic types.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2382-2410"},"PeriodicalIF":34.4,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140123866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Deep Reinforcement Learning: A Tutorial on Generative Diffusion Models in Network Optimization 增强深度强化学习:网络优化中的生成扩散模型教程
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-10 DOI: 10.1109/COMST.2024.3400011
Hongyang Du;Ruichen Zhang;Yinqiu Liu;Jiacheng Wang;Yijing Lin;Zonghang Li;Dusit Niyato;Jiawen Kang;Zehui Xiong;Shuguang Cui;Bo Ai;Haibo Zhou;Dong In Kim
{"title":"Enhancing Deep Reinforcement Learning: A Tutorial on Generative Diffusion Models in Network Optimization","authors":"Hongyang Du;Ruichen Zhang;Yinqiu Liu;Jiacheng Wang;Yijing Lin;Zonghang Li;Dusit Niyato;Jiawen Kang;Zehui Xiong;Shuguang Cui;Bo Ai;Haibo Zhou;Dong In Kim","doi":"10.1109/COMST.2024.3400011","DOIUrl":"10.1109/COMST.2024.3400011","url":null,"abstract":"Generative Diffusion Models (GDMs) have emerged as a transformative force in the realm of Generative Artificial Intelligence (GenAI), demonstrating their versatility and efficacy across various applications. The ability to model complex data distributions and generate high-quality samples has made GDMs particularly effective in tasks such as image generation and reinforcement learning. Furthermore, their iterative nature, which involves a series of noise addition and denoising steps, is a powerful and unique approach to learning and generating data. This paper serves as a comprehensive tutorial on applying GDMs in network optimization tasks. We delve into the strengths of GDMs, emphasizing their wide applicability across various domains, such as vision, text, and audio generation. We detail how GDMs can be effectively harnessed to solve complex optimization problems inherent in networks. The paper first provides a basic background of GDMs and their applications in network optimization. This is followed by a series of case studies, showcasing the integration of GDMs with Deep Reinforcement Learning (DRL), incentive mechanism design, Semantic Communications (SemCom), Internet of Vehicles (IoV) networks, etc. These case studies underscore the practicality and efficacy of GDMs in real-world scenarios, offering insights into network design. We conclude with a discussion on potential future directions for GDM research and applications, providing major insights into how they can continue to shape the future of network optimization.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2611-2646"},"PeriodicalIF":34.4,"publicationDate":"2024-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140907362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transitioning From Federated Learning to Quantum Federated Learning in Internet of Things: A Comprehensive Survey 在物联网中从联邦学习过渡到量子联邦学习:全面调查
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-10 DOI: 10.1109/COMST.2024.3399612
Cheng Qiao;Mianjie Li;Yuan Liu;Zhihong Tian
{"title":"Transitioning From Federated Learning to Quantum Federated Learning in Internet of Things: A Comprehensive Survey","authors":"Cheng Qiao;Mianjie Li;Yuan Liu;Zhihong Tian","doi":"10.1109/COMST.2024.3399612","DOIUrl":"10.1109/COMST.2024.3399612","url":null,"abstract":"Quantum Federated Learning (QFL) recently becomes a promising approach with the potential to revolutionize Machine Learning (ML). It merges the established strengths of classical Federated Learning (FL) with the exceptional parallel mechanism and exponential speed enhancements characteristic of quantum computing. While this innovative fusion has garnered considerable attention, a notable gap in current research is the tendency to consider traditional FL and its quantum-enhanced counterpart, QFL, in isolation. This approach often overlooks the critical role of Quantum Machine Learning (QML) in effectively bridging these two domains. Recognizing this, there emerges a pressing need for a comprehensive survey that encompasses the entire spectrum of FL paradigms, from foundational FL concepts to the cutting-edge developments in QFL. Our survey aims to address this need by providing an in-depth exploration of the various facets of FL paradigms, ultimately leading to a thorough understanding of Quantum Federated Learning. We start by emphasizing the driving factors and prevalent research topics related to FL. To develop a more efficient, robust, and precise computing paradigm, we investigate the current solutions that address the concerns of heterogeneity, privacy, security, and evaluation in FL. After that, we explore the possibility of improving the computational efficiency of ML methods by leveraging the computational capabilities of quantum computers. In particular, we discuss the frameworks, evaluation, and applications for QML. Following that, we detail the integration of quantum computing technologies with standard FL, aiming to bolster computational performance and mitigate security and privacy risks. The potential solutions to improve the efficiency (i.e., slimming mechanism) and respect the privacy and security (i.e., quantum key distribution) for QFL are explored. Finally, we outline some critical future directions towards unlocking the full potential of QFL in distributed machine learning.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"509-545"},"PeriodicalIF":34.4,"publicationDate":"2024-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140907365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When Crowdsensing Meets Smart Cities: A Comprehensive Survey and New Perspectives 当群体感应遇上智慧城市:全面调查与新视角
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-10 DOI: 10.1109/COMST.2024.3400121
Zhenning Wang;Yue Cao;Kai Jiang;Huan Zhou;Jiawen Kang;Yuan Zhuang;Daxin Tian;Victor C. M. Leung
{"title":"When Crowdsensing Meets Smart Cities: A Comprehensive Survey and New Perspectives","authors":"Zhenning Wang;Yue Cao;Kai Jiang;Huan Zhou;Jiawen Kang;Yuan Zhuang;Daxin Tian;Victor C. M. Leung","doi":"10.1109/COMST.2024.3400121","DOIUrl":"10.1109/COMST.2024.3400121","url":null,"abstract":"Crowdsensing has received widespread attention in recent years. It is extensively employed in smart cities and intelligent transportation systems. This paper comprehensively surveys the latest research advancements in crowdsensing for smart cities from a novel perspective. Specifically, this paper is categorized according to sensing entities in smart cities, including human-oriented sensing, vehicle-oriented sensing, and infrastructure-oriented sensing. Meanwhile, the development of Unmanned Aerial Vehicle (UAV)-assisted sensing in recent years is also summarized, accompanied by a timeline of related research. To facilitate easy comprehension, we have positioned the reading flow into the corresponding architectures, resolved problems, existing technical solutions, and specific application scenarios for different sensing entities. In particular, the problems to be solved are further analyzed from four technical perspectives, namely mathematics and operational research, artificial intelligence and machine learning, incentive mechanisms, security and privacy protection. Based on the proposed taxonomy, recent studies are thoroughly investigated to illustrate the current state of research in crowdsensing. Furthermore, this paper highlights the emerging applications of human-oriented and vehicle-oriented sensing in smart cities, as well as the frameworks, platforms, simulators, and datasets involved in crowdsensing. Finally, this paper discusses research directions related to crowdsensing in smart cities, such as digital twins, metaverses, and artificial intelligence-generated content. The primary goal of this survey is to review and synthesize prior research, identify potential avenues for future research, and explore opportunities for collaboration with other relevant research domains.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 2","pages":"1101-1151"},"PeriodicalIF":34.4,"publicationDate":"2024-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140907244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Modal Fusion Sensing: A Comprehensive Review of Millimeter-Wave Radar and Its Integration With Other Modalities 多模态融合传感:毫米波雷达及其与其他模式融合的全面回顾
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-08 DOI: 10.1109/COMST.2024.3398004
Shuai Wang;Luoyu Mei;Ruofeng Liu;Wenchao Jiang;Zhimeng Yin;Xianjun Deng;Tian He
{"title":"Multi-Modal Fusion Sensing: A Comprehensive Review of Millimeter-Wave Radar and Its Integration With Other Modalities","authors":"Shuai Wang;Luoyu Mei;Ruofeng Liu;Wenchao Jiang;Zhimeng Yin;Xianjun Deng;Tian He","doi":"10.1109/COMST.2024.3398004","DOIUrl":"10.1109/COMST.2024.3398004","url":null,"abstract":"Millimeter-wave (mmWave) radar, with its high resolution, sensitivity to micro-vibrations, and adaptability to various environmental conditions, holds immense potential across multi-modal fusion sensing. Although there exist review papers on mmWave radar, there is a noticeable lack of comprehensive reviews focusing on its multi-modal fusion sensing capabilities. Addressing this gap, our review offers an extensive exploration of mmWave radar multi-modal fusion sensing, emphasizing its integration with other modalities. This review discusses the complex realm of millimeter-wave radar multi-modal fusion sensing, detailing its importance, hardware and software aspects, principles, and current potential and applications. It delves into data characteristics and datasets associated with mmWave radar, focusing on Doppler, point cloud, and multi-modal data formats. The review highlights how these data types enhance multi-modal fusion sensing and discusses methodologies, including signal processing and learning algorithms. Three categories of multi-modal fusion methodologies are proposed to optimally manage and interpret fused data. Various practical applications of mmWave radar multi-modal fusion sensing are illustrated, underlining the unique capabilities it provides when integrated with other sensors. The review concludes by identifying potential future research avenues, underscoring the immense potential of this field for further exploration and advancement.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"322-352"},"PeriodicalIF":34.4,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140895430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Human Profile Information Inference via Wireless Signals 通过无线信号推断人类特征信息的研究
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-07 DOI: 10.1109/COMST.2024.3373397
Qiuye He;Edwin Yang;Song Fang
{"title":"A Survey on Human Profile Information Inference via Wireless Signals","authors":"Qiuye He;Edwin Yang;Song Fang","doi":"10.1109/COMST.2024.3373397","DOIUrl":"10.1109/COMST.2024.3373397","url":null,"abstract":"Due to the ubiquitous deployment of wireless infrastructures, the radio signal nature of invisibility, and the elimination of the line-of-sight requirement, it has drawn increasing attention in both academia and industry to infer various human-motion related sensitive information, called human profile information (HPI). The basic idea of these techniques is that varying human profiles (i.e., physiological characteristics and motion patterns) may lead to unique and subtle disturbances in environmental wireless signals, which can be then measured and processed to learn HPI. In this survey, we comprehensively review different categories of existing studies based on (1) how they quantize the motion-induced wireless disturbances in concrete wireless measurements; (2) the signal processing techniques for building wireless HPI inference systems; and (3) practical applications that take advantage of inferred HPI. Also, the survey discusses the emerging challenges and future directions on wireless HPI inference.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2577-2610"},"PeriodicalIF":34.4,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140063929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Conservation in Passive Optical Networks: A Tutorial and Survey 无源光网络中的节能:教程与调查
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-07 DOI: 10.1109/COMST.2024.3397690
S. H. Shah Newaz;Ehsan Ahvar;Md. Shamim Ahsan;Joarder Kamruzzaman;Gour Karmakar;Gyu Myoung Lee
{"title":"Energy Conservation in Passive Optical Networks: A Tutorial and Survey","authors":"S. H. Shah Newaz;Ehsan Ahvar;Md. Shamim Ahsan;Joarder Kamruzzaman;Gour Karmakar;Gyu Myoung Lee","doi":"10.1109/COMST.2024.3397690","DOIUrl":"10.1109/COMST.2024.3397690","url":null,"abstract":"The Passive Optical Network (PON) has been evolving continuously in terms of architecture and capacity to keep up with the demand for high-speed Internet access in the access network segment. Recently, integration of Software-Defined Networking (SDN), which provides programmable and (logically) centralized network control, with PON has attracted intensive research interest to further enhance PON performance and reduce operational and capital expenditure. Although PON is regarded as an energy-efficient access network solution, it would be a major contributor for increasing energy consumption in the access network segment because of its higher penetration rate than other access network technologies. Over the past several years, the major standardization bodies like IEEE and ITU-T, and research communities have engaged in introducing energy-efficient PON solutions. This article familiarizes readers with PON evolution in terms of capacity, architecture, and its integration with virtualization and SDN based control. We present a comprehensive survey of the energy conservation research efforts in PON starting from conventional PON to SDN based PON leveraging virtual and physical network functions. This article also presents contemporary energy-efficient standardization activities in IEEE and ITU-T. To the best of our knowledge, to date, this article is the first most comprehensive survey on energy saving research and standardization on PON. We summarize the lessons learned from the recent advancements, identify important challenges ahead and outline several future research directions that can contribute to further advancement of energy-efficient PON.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"667-724"},"PeriodicalIF":34.4,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140890359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Brain-Computer Interface-Inspired Communications: Opportunities and Challenges 脑机接口通信调查:机遇与挑战
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-06 DOI: 10.1109/COMST.2024.3396847
Honglin Hu;Zhenyu Wang;Xi Zhao;Ruxue Li;Ang Li;Yuan Si;Jiaheng Wang;Ting Zhou;Tianheng Xu
{"title":"A Survey on Brain-Computer Interface-Inspired Communications: Opportunities and Challenges","authors":"Honglin Hu;Zhenyu Wang;Xi Zhao;Ruxue Li;Ang Li;Yuan Si;Jiaheng Wang;Ting Zhou;Tianheng Xu","doi":"10.1109/COMST.2024.3396847","DOIUrl":"10.1109/COMST.2024.3396847","url":null,"abstract":"Brain-computer interfaces (BCIs) aim to directly bridge the human brain and the outside world through acquiring and processing the brain signals in real time. In recent two decades, tremendous progress has been made in terms of BCI paradigms and decoding algorithms. The information transfer rate of the BCI systems has been significantly enhanced, and the communication community are considering including the BCI technologies into the 6G networks and beyond. However, some critical problems and challenges remain. To some extent, the BCI systems resemble the wireless communication systems, as brain signals are generated and transmitted by the neurons and received by the sensors, propagating through multiple brain tissues which cause inevitable attenuation and mixing effects. Therefore, by following this idea, a systematic review of the BCI technologies is provided through comparing it with wireless communications. The main challenges of BCI lie in brain channel modelling, modulation, signal processing and detection. The latest and some classic researches are covered. In addition, typical applications of BCIs such as the Quality-of-Experience (QoE) metric and Internet-of-Brains (IoB) are predicted. Then, we present a prospect of BCIs being integrated with future wireless communication systems. Also, the technical challenges regarding communication and computation to fulfill the prospect are discussed, as well as privacy, security and ethical concerns. Therefore, this review aims to comprehensively overview BCI-inspired communication on two levels, the BCI itself being a communication system and future integration of BCI and communication as a whole system.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"108-139"},"PeriodicalIF":34.4,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140845696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the IoT Application Layer From an MQTT Protocol Perspective: Challenges and Research Prospects 从 MQTT 协议的角度确保物联网应用层的安全:挑战与研究前景
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-04 DOI: 10.1109/COMST.2024.3372630
Sujitha Lakshminarayana;Amit Praseed;P. Santhi Thilagam
{"title":"Securing the IoT Application Layer From an MQTT Protocol Perspective: Challenges and Research Prospects","authors":"Sujitha Lakshminarayana;Amit Praseed;P. Santhi Thilagam","doi":"10.1109/COMST.2024.3372630","DOIUrl":"10.1109/COMST.2024.3372630","url":null,"abstract":"The Internet of Things (IoT) is one of the most promising new millennial technologies, having numerous applications in our surrounding environment. The fundamental goal of an IoT system is to ensure effective communication between users and their devices, which is accomplished through the application layer of IoT. For this reason, the security of protocols employed at the IoT application layer are extremely significant. Message Queuing Telemetry Transport (MQTT) is being widely adopted as the application layer protocol for resource-constrained IoT devices. The reason for the widespread usage of the MQTT protocol in IoT devices is its highly appealing features, such as packet-agnostic communication, high scalability, low power consumption, low implementation cost, fast and reliable message delivery. These capabilities of the MQTT protocol make it a potential and viable target for adversaries. Therefore, we initially emphasize on the emerging MQTT vulnerabilities and provide a classification of identified MQTT vulnerabilities for the IoT paradigm. Then, this paper reviews attacks against the MQTT protocol and the corresponding defense mechanisms for MQTT-based IoT deployments. Furthermore, MQTT attacks are categorized and investigated with reference to crucial characteristics that aid in comprehending how these attacks are carried out. The defense mechanisms are discussed in detail, with a particular focus on techniques for identifying vulnerabilities, detecting and preventing attacks against the MQTT protocol. This work also discloses lessons learned by identifying and providing insightful findings, open challenges, and future research directions. Such a discussion is anticipated to propel more research efforts in this burgeoning area and pave a secure path toward expanding and fully realizing the MQTT protocol in IoT technology.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2510-2546"},"PeriodicalIF":34.4,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visible Light Positioning as a Next-Generation Indoor Positioning Technology: A Tutorial 作为新一代室内定位技术的可见光定位:教程
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-01 DOI: 10.1109/COMST.2024.3372153
Sander Bastiaens;Morteza Alijani;Wout Joseph;David Plets
{"title":"Visible Light Positioning as a Next-Generation Indoor Positioning Technology: A Tutorial","authors":"Sander Bastiaens;Morteza Alijani;Wout Joseph;David Plets","doi":"10.1109/COMST.2024.3372153","DOIUrl":"10.1109/COMST.2024.3372153","url":null,"abstract":"Indoor positioning technology has become undisputedly pervasive in modern society. It can be used for numerous applications in various environments, ranging from agriculture to smart industry. Among the different indoor positioning technologies, the development of the indoor visible light positioning (VLP) system has gained momentum recently thanks to its low cost and centimetre-order accuracy. Moreover, VLP is a promising candidate technology for integration with Light Fidelity (Li-Fi), which relies on the optical spectrum to build future wireless networks and plays a significant role in sixth-generation (6G) wireless networks. This tutorial investigates VLP as a novel positioning technology in depth. The inherent characteristics and fundamentals of this technology are extensively described with the components of a VLP system and possible localization approaches being discussed. Furthermore, a mathematical and technical discussion of a simple minimum retrofit of the single photodiode (PD) received signal strength (RSS) VLP systems is provided. Finally, the paper concludes with open challenges and a future roadmap for VLP.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2867-2913"},"PeriodicalIF":34.4,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10457033","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140015504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信