IEEE Communications Surveys and Tutorials最新文献

筛选
英文 中文
Tensor-Empowered Federated Learning for Cyber-Physical-Social Computing and Communication Systems 面向网络-物理-社会计算和通信系统的张量授权联邦学习
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-06-02 DOI: 10.1109/COMST.2023.3282264
Laurence T. Yang;Ruonan Zhao;Debin Liu;Wanli Lu;Xianjun Deng
{"title":"Tensor-Empowered Federated Learning for Cyber-Physical-Social Computing and Communication Systems","authors":"Laurence T. Yang;Ruonan Zhao;Debin Liu;Wanli Lu;Xianjun Deng","doi":"10.1109/COMST.2023.3282264","DOIUrl":"https://doi.org/10.1109/COMST.2023.3282264","url":null,"abstract":"The deep fusion of human-centered Cyber-Physical-Social Systems (CPSSs) has attracted widespread attention worldwide and big data as the blood of CPSSs could lay a solid data cornerstone for providing more proactive and accurate wisdom services. However, due to concerns about data privacy and security, traditional data centralized learning paradigm is no longer suitable. Federated Learning (FL) as an emerging distributed privacy-preserving machine learning paradigm would have great research significance and application values. Although few survey papers on FL already exist in the literature, the survey about FL from the perspective of human-centered CPSSs and tensor theory is lacking. Toward this end, we first introduce the CPSSs and deeply analyze the correlations among humans, cyber space, physical space and social space, as well as the opportunities brought by it. Afterwards, we present an overview of FL and then review extensive researches on FL in terms of resources management, communication, security and privacy protection, which provides a shortcut for readers to quickly understand and learn FL. Furthermore, the theory about tensor representation, operation and decomposition for handling massive, multi-source heterogeneous big data and corresponding applications are described. By leveraging the advantages of tensor in unified modeling, dimensionality reduction, and feature extraction, a framework and three tensor-empowered solutions are provided to solve these challenges about heterogeneous resource management, communication overhead together with security and privacy. Finally, some future research directions are listed for looking forward to inspiring more readers to devote themselves to researching tensor-empowered FL for human-centered CPSSs in the future.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey on Industrial Control System Digital Forensics: Challenges, Advances and Future Directions 工业控制系统数字取证研究:挑战、进展与未来方向
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-04-11 DOI: 10.1109/COMST.2023.3264680
Marco Cook;Angelos Marnerides;Chris Johnson;Dimitrios Pezaros
{"title":"A Survey on Industrial Control System Digital Forensics: Challenges, Advances and Future Directions","authors":"Marco Cook;Angelos Marnerides;Chris Johnson;Dimitrios Pezaros","doi":"10.1109/COMST.2023.3264680","DOIUrl":"https://doi.org/10.1109/COMST.2023.3264680","url":null,"abstract":"Operational Technology (OT) systems have become increasingly interconnected and automated, consequently resulting in them becoming targets of cyber attacks, with the threat towards a range of critical national infrastructure (CNI) sectors becoming heightened. This is particularly the case for Industrial Control Systems (ICS), which control and operate the physical processes in CNI sectors such as water treatment, electrical generation and manufacturing. Unlike information technology (IT) systems, ICS have unique cyber-physical characteristics and related safety requirements, making them an attractive target for attacks given the physical consequences that can occur. As a result, the requirement to respond and learn from previous and new attacks is also increasing, with digital forensics playing a significant role in this process. The aim of this paper is to discuss the main issues and existing limitations related to ICS digital forensic. The field of ICS digital forensics is relatively under-developed and does not have the same levels of maturity as IT digital forensics. Although the amount of research on cyber security for ICS is increasing, many unique challenges still exist that pose as barriers to the development and deployment of ICS forensic capabilities. We provide an extensive discussion on these challenges, categorising them into technical, socio-technical, and operational and legal themes. Furthermore, the relationship between these challenge themes as well as the inter-challenge dependencies are also examined. Furthermore, this work discusses ICS forensic advances in relation to the digital forensics life chain, specifically forensic readiness and investigations. The areas of digital forensic training and processes models for ICS are given particular focus. Moreover, we assess the technologies and tools that have been either applied to or developed for ICS components and networks, giving special attention to forensic acquisition and analysis methods. An examination into the specific ICS digital forensic data sources and artefacts is also presented, highlighting that until recently, this was limited to descriptions of generic data formats. In addition, this paper provides an overview of several key ICS attacks, summarising the specific techniques used, data artefacts of interest, and proposing lessons learnt. Finally, this paper presents open discussions on future ICS digital forensics research directions and on-going issues, covering both short and long-term areas that can be addressed to improve the ICS digital forensics capability.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Survey on Low-Power GNSS 低功率GNSS研究进展
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-04-10 DOI: 10.1109/COMST.2023.3265841
Antoine Grenier;Elena Simona Lohan;Aleksandr Ometov;Jari Nurmi
{"title":"A Survey on Low-Power GNSS","authors":"Antoine Grenier;Elena Simona Lohan;Aleksandr Ometov;Jari Nurmi","doi":"10.1109/COMST.2023.3265841","DOIUrl":"https://doi.org/10.1109/COMST.2023.3265841","url":null,"abstract":"With the miniaturization of electronics, receivers are getting more and more embedded into devices with harsh energy constraints. This process has led to new signal processing challenges due to the limited processing power on battery-operated devices and to challenging wireless environments, such as deep urban canyons, tunnels and bridges, forest canopies, increased jamming and spoofing. The latter is typically tackled via new GNSS constellations and modernization of the GNSS signals. However, the increase in signal complexity leads to higher computation requirements to recover the signals; thus, the trade-off between precision and energy should be evaluated for each application. This paper dives into low-power GNSS, focusing on the energy consumption of satellite-based positioning receivers used in battery-operated consumer devices and Internet of Things (IoT) sensors. We briefly overview the GNSS basics and the differences between legacy and modernized signals. Factors dominating the energy consumption of GNSS receivers are then reviewed, with special attention given to the complexity of the processing algorithms. Onboard and offloaded (Cloud/Edge) processing strategies are explored and compared. Finally, we highlight the current challenges of today’s research in low-power GNSS.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2023-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9739/10226436/10097786.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Empowering Network Security With Programmable Switches: A Comprehensive Survey 赋予网络安全与可编程交换机:一个全面的调查
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-04-10 DOI: 10.1109/COMST.2023.3265984
Xiang Chen;Chunming Wu;Xuan Liu;Qun Huang;Dong Zhang;Haifeng Zhou;Qiang Yang;Muhammad Khurram Khan
{"title":"Empowering Network Security With Programmable Switches: A Comprehensive Survey","authors":"Xiang Chen;Chunming Wu;Xuan Liu;Qun Huang;Dong Zhang;Haifeng Zhou;Qiang Yang;Muhammad Khurram Khan","doi":"10.1109/COMST.2023.3265984","DOIUrl":"https://doi.org/10.1109/COMST.2023.3265984","url":null,"abstract":"With the growth of network applications such as 5G and artificial intelligence, network security techniques, i.e., the techniques that detect various attacks (e.g., well-known denial-of-service (DDoS) attacks) and prevent production networks (e.g., data center networks) from being attacked, become increasingly essential for network management and have gained great popularity in the networking community. Generally, these techniques are built on proprietary hardware appliances, i.e., middleboxes, or the paradigm that combines both software-defined networking (SDN) and network function virtualization (NFV) to implement security functions. However, the techniques built on middleboxes are proven to be hard-to-manage, costly, and inflexible, thereby making them an out-of-date choice in network security. For the techniques built on SDN and NFV, they virtualize and softwarize security functions on commodity servers, leading to non-trivial performance degradation. Fortunately, the recent emergence of programmable switches brings new opportunities of empowering network security techniques with the characteristics of easy-to-manage, low cost, high flexibility, and Tbps-level performance. In this survey, we focus on this promising trend in network security. More precisely, this survey first presents the preliminaries of programmable switches, which are the primary driver of next-generation network security techniques. Next, we comprehensively review existing techniques built on programmable switches, classify these techniques, and discuss their background, motivation, design, implementation, and limitations case-by-case. Finally, we summarize open issues and future research directions in this promising research topic of network security.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2023-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey on Over-the-Air Computation 无线计算研究综述
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-04-05 DOI: 10.1109/COMST.2023.3264649
Alphan Şahin;Rui Yang
{"title":"A Survey on Over-the-Air Computation","authors":"Alphan Şahin;Rui Yang","doi":"10.1109/COMST.2023.3264649","DOIUrl":"https://doi.org/10.1109/COMST.2023.3264649","url":null,"abstract":"Communication and computation are often viewed as separate tasks. This approach is very effective from the perspective of engineering as isolated optimizations can be performed. However, for many computation-oriented applications, the main interest is a function of the local information at the devices, rather than the local information itself. In such scenarios, information theoretical results show that harnessing the interference in a multiple access channel for computation, i.e., over-the-air computation (OAC), can provide a significantly higher achievable computation rate than separating communication and computation tasks. Moreover, the gap between OAC and separation in terms of computation rate increases with more participating nodes. Given this motivation, in this study, we provide a comprehensive survey on practical OAC methods. After outlining fundamentals related to OAC, we discuss the available OAC schemes with their pros and cons. We provide an overview of the enabling mechanisms for achieving reliable computation in the wireless channel. Finally, we summarize the potential applications of OAC and point out some future directions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Survey on Controller Area Network Reverse Engineering 控制器区域网络逆向工程综述
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-04-05 DOI: 10.1109/COMST.2023.3264928
Alessio Buscemi;Ion Turcanu;German Castignani;Andriy Panchenko;Thomas Engel;Kang G. Shin
{"title":"A Survey on Controller Area Network Reverse Engineering","authors":"Alessio Buscemi;Ion Turcanu;German Castignani;Andriy Panchenko;Thomas Engel;Kang G. Shin","doi":"10.1109/COMST.2023.3264928","DOIUrl":"https://doi.org/10.1109/COMST.2023.3264928","url":null,"abstract":"Controller Area Network (CAN) is a masterless serial bus designed and widely used for the exchange of mission and time-critical information within commercial vehicles. In-vehicle communication is based on messages sent and received by Electronic Control Units (ECUs) connected to this serial bus network. Although unencrypted, CAN messages are not easy to interpret. In fact, Original Equipment Manufacturers (OEMs) attempt to achieve security through obscurity by encoding the data in their proprietary format, which is kept secret from the general public. As a result, the only way to obtain clear data is to reverse engineer CAN messages. Driven by the need for in-vehicle message interpretation, which is highly valuable in the automotive industry, researchers and companies have been working to make this process automated, fast, and standardized. In this paper, we provide a comprehensive review of the state of the art and summarize the major advances in CAN bus reverse engineering. We are the first to provide a taxonomy of CAN tokenization and translation techniques. Based on the reviewed literature, we highlight an important issue: the lack of a public and standardized dataset for the quantitative evaluation of translation algorithms. In response, we define a complete set of requirements for standardizing the data collection process. We also investigate the risks associated with the automation of CAN reverse engineering, in particular with respect to the security network and the safety and privacy of drivers and passengers. Finally, we discuss future research directions in CAN reverse engineering.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Covert Communications: A Comprehensive Survey 秘密通信:综合调查
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-04-03 DOI: 10.1109/COMST.2023.3263921
Xinying Chen;Jianping An;Zehui Xiong;Chengwen Xing;Nan Zhao;F. Richard Yu;Arumugam Nallanathan
{"title":"Covert Communications: A Comprehensive Survey","authors":"Xinying Chen;Jianping An;Zehui Xiong;Chengwen Xing;Nan Zhao;F. Richard Yu;Arumugam Nallanathan","doi":"10.1109/COMST.2023.3263921","DOIUrl":"https://doi.org/10.1109/COMST.2023.3263921","url":null,"abstract":"Information security has always been a critical issue in wireless networks. Apart from other secure techniques, covert communication emerges as a potential solution to security for wireless networks owing to its high-security level. In covert communication networks, the transmitter hides the transmitted signals into environmental or artificial noise by introducing randomness to avoid detection at the warden. By eliminating the existence of transmitted signals at the warden, information security can be preserved more solidly than other secure transmission techniques, i.e., without noticing the existence. Due to the promising security protection, covert communication has been successfully utilized in tremendous wireless communication scenarios. However, fundamental challenges in its practical implementation still exist, e.g., the effectiveness of randomness utilization, the low signal-to-interference-plus-noise ratio at legitimate users, etc. In this survey, we demonstrate a comprehensive review concentrating on the applications, solutions, and future challenges of covert communications. Specifically, the covert principle and research categories are first introduced. Then, the applications in the networks with different topologies and the effective covert techniques in the existing literature are reviewed. We also discuss the potential implementation of covert communications in future networks and the open challenges.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Tutorial on Immersive Video Delivery: From Omnidirectional Video to Holography 沉浸式视频传输教程:从全方位视频到全息
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-03-30 DOI: 10.1109/COMST.2023.3263252
Jeroen van der Hooft;Hadi Amirpour;Maria Torres Vega;Yago Sanchez;Raimund Schatz;Thomas Schierl;Christian Timmerer
{"title":"A Tutorial on Immersive Video Delivery: From Omnidirectional Video to Holography","authors":"Jeroen van der Hooft;Hadi Amirpour;Maria Torres Vega;Yago Sanchez;Raimund Schatz;Thomas Schierl;Christian Timmerer","doi":"10.1109/COMST.2023.3263252","DOIUrl":"https://doi.org/10.1109/COMST.2023.3263252","url":null,"abstract":"Video services are evolving from traditional two-dimensional video to virtual reality and holograms, which offer six degrees of freedom to users, enabling them to freely move around in a scene and change focus as desired. However, this increase in freedom translates into stringent requirements in terms of ultra-high bandwidth (in the order of Gigabits per second) and minimal latency (in the order of milliseconds). To realize such immersive services, the network transport, as well as the video representation and encoding, have to be fundamentally enhanced. The purpose of this tutorial article is to provide an elaborate introduction to the creation, streaming, and evaluation of immersive video. Moreover, it aims to provide lessons learned and to point at promising research paths to enable truly interactive immersive video applications toward holography.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions 物联网网络防御的可解释入侵检测:机遇与解决方案
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-03-26 DOI: 10.1109/COMST.2023.3280465
Nour Moustafa;Nickolaos Koroniotis;Marwa Keshk;Albert Y. Zomaya;Zahir Tari
{"title":"Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions","authors":"Nour Moustafa;Nickolaos Koroniotis;Marwa Keshk;Albert Y. Zomaya;Zahir Tari","doi":"10.1109/COMST.2023.3280465","DOIUrl":"https://doi.org/10.1109/COMST.2023.3280465","url":null,"abstract":"The field of Explainable Artificial Intelligence (XAI) has garnered considerable research attention in recent years, aiming to provide interpretability and confidence to the inner workings of state-of-the-art deep learning models. However, XAI-enhanced cybersecurity measures in the Internet of Things (IoT) and its sub-domains, require further investigation to provide effective discovery of attack surfaces, their corresponding vectors, and interpretable justification of model outputs. Cyber defence involves operations conducted in the cybersecurity field supporting mission objectives to identify and prevent cyberattacks using various tools and techniques, including intrusion detection systems (IDS), threat intelligence and hunting, and intrusion prevention. In cyber defence, especially anomaly-based IDS, the emerging applications of deep learning models require the interpretation of the models’ architecture and the explanation of models’ prediction to examine how cyberattacks would occur. This paper presents a comprehensive review of XAI techniques for anomaly-based intrusion detection in IoT networks. Firstly, we review IDSs focusing on anomaly-based detection techniques in IoT and how XAI models can augment them to provide trust and confidence in their detections. Secondly, we review AI models, including machine learning (ML) and deep learning (DL), for anomaly detection applications and IoT ecosystems. Moreover, we discuss DL’s ability to effectively learn from large-scale IoT datasets, accomplishing high performances in discovering and interpreting security events. Thirdly, we demonstrate recent research on the intersection of XAI, anomaly-based IDS and IoT. Finally, we discuss the current challenges and solutions of XAI for security applications in the cyber defence perspective of IoT networks, revealing future research directions. By analysing our findings, new cybersecurity applications that require XAI models emerge, assisting decision-makers in understanding and explaining security events in compromised IoT networks.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2023-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Coding Techniques for Backscatter Communications—A Contemporary Survey 后向散射通信的编码技术——当代综述
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-03-22 DOI: 10.1109/COMST.2023.3259224
Fatemeh Rezaei;Diluka Galappaththige;Chintha Tellambura;Sanjeewa Herath
{"title":"Coding Techniques for Backscatter Communications—A Contemporary Survey","authors":"Fatemeh Rezaei;Diluka Galappaththige;Chintha Tellambura;Sanjeewa Herath","doi":"10.1109/COMST.2023.3259224","DOIUrl":"https://doi.org/10.1109/COMST.2023.3259224","url":null,"abstract":"Backscatter communication (BackCom) networks enable passive/battery-free Internet-of-Thing devices, providing reliable, massive connectivity while ensuring self-sustainability, low maintenance, and low costs. Effective channel codes and decoding algorithms are necessary to achieve these objectives. However, a comprehensive survey/review paper on such techniques for BackCom networks has not been available. This paper aims to fill this gap. Because tags have limited computational resources, traditional coding techniques may not suit them. We first describe the basics of BackCom, channel codes and their relevant design parameters, and codes for general communication networks. We address the BackCom limitations, requirements, and channel characteristics. As conventional codes may not seamlessly move to the BackCom arena, we identify the potential BackCom coding techniques and multiple access schemes. We further highlight potential approaches for addressing code implementation complexity and reliability. Finally, we discuss open issues, challenges, and potential future research directions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":null,"pages":null},"PeriodicalIF":35.6,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信