IEEE Communications Surveys and Tutorials最新文献

筛选
英文 中文
Precoding for High-Throughput Satellite Communication Systems: A Survey 高通量卫星通信系统的预编码:概览
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-09-20 DOI: 10.1109/COMST.2023.3316283
Malek Khammassi;Abla Kammoun;Mohamed-Slim Alouini
{"title":"Precoding for High-Throughput Satellite Communication Systems: A Survey","authors":"Malek Khammassi;Abla Kammoun;Mohamed-Slim Alouini","doi":"10.1109/COMST.2023.3316283","DOIUrl":"10.1109/COMST.2023.3316283","url":null,"abstract":"With the expanding demand for high data rates and extensive coverage, high throughput satellite (HTS) communication systems are emerging as a key technology for future communication generations. However, current frequency bands are increasingly congested. Until the maturity of communication systems to operate on higher bands, the solution is to exploit the already existing frequency bands more efficiently. In this context, precoding emerges as one of the prolific approaches to increasing spectral efficiency. This survey presents an overview and a classification of the recent precoding techniques for HTS communication systems from two main perspectives: 1) a problem formulation perspective and 2) a system design perspective. From a problem formulation point of view, precoding techniques are classified according to the precoding optimization problem, group, and level. From a system design standpoint, precoding is categorized based on the system architecture, the precoding implementation, and the type of the provided service. Further, practical system impairments are discussed, and robust precoding techniques are presented. Finally, future trends in precoding for satellites are addressed to spur further research.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 1","pages":"80-118"},"PeriodicalIF":35.6,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135556044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses 支持6g的物联网边缘学习:漏洞、数据集和防御的全面调查
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-09-19 DOI: 10.1109/COMST.2023.3317242
Mohamed Amine Ferrag;Othmane Friha;Burak Kantarci;Norbert Tihanyi;Lucas Cordeiro;Merouane Debbah;Djallel Hamouda;Muna Al-Hawawreh;Kim-Kwang Raymond Choo
{"title":"Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses","authors":"Mohamed Amine Ferrag;Othmane Friha;Burak Kantarci;Norbert Tihanyi;Lucas Cordeiro;Merouane Debbah;Djallel Hamouda;Muna Al-Hawawreh;Kim-Kwang Raymond Choo","doi":"10.1109/COMST.2023.3317242","DOIUrl":"10.1109/COMST.2023.3317242","url":null,"abstract":"The deployment of the fifth-generation (5G) wireless networks in Internet of Everything (IoE) applications and future networks (e.g., sixth-generation (6G) networks) has raised a number of operational challenges and limitations, for example in terms of security and privacy. Edge learning is an emerging approach to training models across distributed clients while ensuring data privacy. Such an approach when integrated in future network infrastructures (e.g., 6G) can potentially solve challenging problems such as resource management and behavior prediction. However, edge learning (including distributed deep learning) are known to be susceptible to tampering and manipulation. This survey article provides a holistic review of the extant literature focusing on edge learning-related vulnerabilities and defenses for 6G-enabled Internet of Things (IoT) systems. Existing machine learning approaches for 6G–IoT security and machine learning-associated threats are broadly categorized based on learning modes, namely: centralized, federated, and distributed. Then, we provide an overview of enabling emerging technologies for 6G–IoT intelligence. We also provide a holistic survey of existing research on attacks against machine learning and classify threat models into eight categories, namely: backdoor attacks, adversarial examples, combined attacks, poisoning attacks, Sybil attacks, byzantine attacks, inference attacks, and dropping attacks. In addition, we provide a comprehensive and detailed taxonomy and a comparative summary of the state-of-the-art defense methods against edge learning-related vulnerabilities. Finally, as new attacks and defense technologies are realized, new research and future overall prospects for 6G-enabled IoT are discussed.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2654-2713"},"PeriodicalIF":35.6,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135555969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized Federated Learning: Fundamentals, State of the Art, Frameworks, Trends, and Challenges 去中心化联邦学习:基础、现状、框架、趋势和挑战
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-09-15 DOI: 10.1109/COMST.2023.3315746
Enrique Tomás Martínez Beltrán;Mario Quiles Pérez;Pedro Miguel Sánchez Sánchez;Sergio López Bernal;Gérôme Bovet;Manuel Gil Pérez;Gregorio Martínez Pérez;Alberto Huertas Celdrán
{"title":"Decentralized Federated Learning: Fundamentals, State of the Art, Frameworks, Trends, and Challenges","authors":"Enrique Tomás Martínez Beltrán;Mario Quiles Pérez;Pedro Miguel Sánchez Sánchez;Sergio López Bernal;Gérôme Bovet;Manuel Gil Pérez;Gregorio Martínez Pérez;Alberto Huertas Celdrán","doi":"10.1109/COMST.2023.3315746","DOIUrl":"10.1109/COMST.2023.3315746","url":null,"abstract":"In recent years, Federated Learning (FL) has gained relevance in training collaborative models without sharing sensitive data. Since its birth, Centralized FL (CFL) has been the most common approach in the literature, where a central entity creates a global model. However, a centralized approach leads to increased latency due to bottlenecks, heightened vulnerability to system failures, and trustworthiness concerns affecting the entity responsible for the global model creation. Decentralized Federated Learning (DFL) emerged to address these concerns by promoting decentralized model aggregation and minimizing reliance on centralized architectures. However, despite the work done in DFL, the literature has not (i) studied the main aspects differentiating DFL and CFL; (ii) analyzed DFL frameworks to create and evaluate new solutions; and (iii) reviewed application scenarios using DFL. Thus, this article identifies and analyzes the main fundamentals of DFL in terms of federation architectures, topologies, communication mechanisms, security approaches, and key performance indicators. Additionally, the paper at hand explores existing mechanisms to optimize critical DFL fundamentals. Then, the most relevant features of the current DFL frameworks are reviewed and compared. After that, it analyzes the most used DFL application scenarios, identifying solutions based on the fundamentals and frameworks previously defined. Finally, the evolution of existing DFL solutions is studied to provide a list of trends, lessons learned, and open challenges.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2983-3013"},"PeriodicalIF":35.6,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136297476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
A Survey of Blockchain and Artificial Intelligence for 6G Wireless Communications 区块链与人工智能在6G无线通信中的应用研究
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-09-14 DOI: 10.1109/COMST.2023.3315374
Yiping Zuo;Jiajia Guo;Ning Gao;Yongxu Zhu;Shi Jin;Xiao Li
{"title":"A Survey of Blockchain and Artificial Intelligence for 6G Wireless Communications","authors":"Yiping Zuo;Jiajia Guo;Ning Gao;Yongxu Zhu;Shi Jin;Xiao Li","doi":"10.1109/COMST.2023.3315374","DOIUrl":"10.1109/COMST.2023.3315374","url":null,"abstract":"The research on the sixth-generation (6G) wireless communications for the development of future mobile communication networks has been officially launched around the world. 6G networks face multifarious challenges, such as resource-constrained mobile devices, difficult wireless resource management, high complexity of heterogeneous network architectures, explosive computing and storage requirements, privacy and security threats. To address these challenges, deploying blockchain and artificial intelligence (AI) in 6G networks may realize new breakthroughs in advancing network performances in terms of security, privacy, efficiency, cost, and more. In this paper, we provide a detailed survey of existing works on the application of blockchain and AI to 6G wireless communications. More specifically, we start with a brief overview of blockchain and AI. Then, we mainly review the recent advances in the fusion of blockchain and AI, and highlight the inevitable trend of deploying both blockchain and AI in wireless communications. Furthermore, we extensively explore integrating blockchain and AI for wireless communication systems, involving secure services and Internet of Things (IoT) smart applications. Particularly, some of the most talked-about key services based on blockchain and AI are introduced, such as spectrum management, computation allocation, content caching, and security and privacy. Moreover, we also focus on some important IoT smart applications supported by blockchain and AI, covering smart healthcare, smart transportation, smart grid, and unmanned aerial vehicles (UAVs). Moreover, we thoroughly discuss operating frequencies, visions, and requirements from the 6G perspective. We also analyze the open issues and research challenges for the joint deployment of blockchain and AI in 6G wireless communications. Lastly, based on lots of existing meaningful works, this paper aims to provide a comprehensive survey of blockchain and AI in 6G networks. We hope this survey can shed new light on the research of this newly emerging area and serve as a roadmap for future studies.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2494-2528"},"PeriodicalIF":35.6,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135784561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine Learning-Aided Operations and Communications of Unmanned Aerial Vehicles: A Contemporary Survey 无人驾驶飞行器的机器学习辅助操作和通信:当代调查
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-09-11 DOI: 10.1109/COMST.2023.3312221
Harrison Kurunathan;Hailong Huang;Kai Li;Wei Ni;Ekram Hossain
{"title":"Machine Learning-Aided Operations and Communications of Unmanned Aerial Vehicles: A Contemporary Survey","authors":"Harrison Kurunathan;Hailong Huang;Kai Li;Wei Ni;Ekram Hossain","doi":"10.1109/COMST.2023.3312221","DOIUrl":"10.1109/COMST.2023.3312221","url":null,"abstract":"Over the past decade, Unmanned Aerial Vehicles (UAVs) have provided pervasive, efficient, and cost-effective solutions for data collection and communications. Their excellent mobility, flexibility, and fast deployment enable UAVs to be extensively utilized in agriculture, medical, rescue missions, smart cities, and intelligent transportation systems. Machine learning (ML) has been increasingly demonstrating its capability of improving the automation and operation precision of UAVs and many UAV-assisted applications, such as communications, sensing, and data collection. The ongoing amalgamation of UAV and ML techniques is creating a significant synergy and empowering UAVs with unprecedented intelligence and autonomy. This survey aims to provide a timely and comprehensive overview of ML techniques used in UAV operations and communications and identify the potential growth areas and research gaps. We emphasize the four key components of UAV operations and communications to which ML can significantly contribute, namely, perception and feature extraction, feature interpretation and regeneration, trajectory and mission planning, and aerodynamic control and operation. We classify the latest popular ML tools based on their applications to the four components and conduct gap analyses. This survey also takes a step forward by pointing out significant challenges in the upcoming realm of ML-aided automated UAV operations and communications. It is revealed that different ML techniques dominate the applications to the four key modules of UAV operations and communications. While there is an increasing trend of cross-module designs, little effort has been devoted to an end-to-end ML framework, from perception and feature extraction to aerodynamic control and operation. It is also unveiled that the reliability and trust of ML in UAV operations and applications require significant attention before full automation of UAVs and potential cooperation between UAVs and humans come to fruition.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 1","pages":"496-533"},"PeriodicalIF":35.6,"publicationDate":"2023-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135784733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions 网络切片安全调查:攻击、挑战、解决方案和研究方向
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-09-06 DOI: 10.1109/COMST.2023.3312349
Chamitha De Alwis;Pawani Porambage;Kapal Dev;Thippa Reddy Gadekallu;Madhusanka Liyanage
{"title":"A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions","authors":"Chamitha De Alwis;Pawani Porambage;Kapal Dev;Thippa Reddy Gadekallu;Madhusanka Liyanage","doi":"10.1109/COMST.2023.3312349","DOIUrl":"10.1109/COMST.2023.3312349","url":null,"abstract":"The dawn of softwarized networks enables Network Slicing (NS) as an important technology towards allocating end-to-end logical networks to facilitate diverse requirements of emerging applications in fifth-generation (5G) mobile networks. However, the emergence of NS also exposes novel security and privacy challenges, primarily related to aspects such as NS life-cycle security, inter-slice security, intra-slice security, slice broker security, zero-touch network and management security, and blockchain security. Hence, enhancing NS security, privacy, and trust has become a key research area toward realizing the true capabilities of 5G. This paper presents a comprehensive and up-to-date survey on NS security. The paper articulates a taxonomy for NS security and privacy, laying the structure for the survey. Accordingly, the paper presents key attack scenarios specific to NS-enabled networks. Furthermore, the paper explores NS security threats, challenges, and issues while elaborating on NS security solutions available in the literature. In addition, NS trust and privacy aspects, along with possible solutions, are explained. The paper also highlights future research directions in NS security and privacy. It is envisaged that this survey will concentrate on existing research work, highlight research gaps and shed light on future research, development, and standardization work to realize secure NS in 5G and beyond mobile communication networks.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 1","pages":"534-570"},"PeriodicalIF":35.6,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10242032","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134157308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Networking Architecture and Key Supporting Technologies for Human Digital Twin in Personalized Healthcare: A Comprehensive Survey 个性化医疗中的人类数字双胞胎的网络架构和关键支持技术:全面调查
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-09-04 DOI: 10.1109/COMST.2023.3308717
Jiayuan Chen;Changyan Yi;Samuel D. Okegbile;Jun Cai;Xuemin Shen
{"title":"Networking Architecture and Key Supporting Technologies for Human Digital Twin in Personalized Healthcare: A Comprehensive Survey","authors":"Jiayuan Chen;Changyan Yi;Samuel D. Okegbile;Jun Cai;Xuemin Shen","doi":"10.1109/COMST.2023.3308717","DOIUrl":"10.1109/COMST.2023.3308717","url":null,"abstract":"Digital twin (DT), referring to a promising technique to digitally and accurately represent actual physical entities, has attracted explosive interests from both academia and industry. One typical advantage of DT is that it can be used to not only virtually replicate a system’s detailed operations but also analyze the current condition, predict the future behavior, and refine the control optimization. Although DT has been widely implemented in various fields, such as smart manufacturing and transportation, its conventional paradigm is limited to embody non-living entities, e.g., robots and vehicles. When adopted in human-centric systems, a novel concept, called human digital twin (HDT) has thus been proposed. Particularly, HDT allows in silico representation of individual human body with the ability to dynamically reflect molecular status, physiological status, emotional and psychological status, as well as lifestyle evolutions. These prompt the expected application of HDT in personalized healthcare (PH), which can facilitate the remote monitoring, diagnosis, prescription, surgery and rehabilitation, and hence significantly alleviate the heavy burden on the traditional healthcare system. However, despite the large potential, HDT faces substantial research challenges in different aspects, and becomes an increasingly popular topic recently. In this survey, with a specific focus on the networking architecture and key technologies for HDT in PH applications, we first discuss the differences between HDT and the conventional DTs, followed by the universal framework and essential functions of HDT. We then analyze its design requirements and challenges in PH applications. After that, we provide an overview of the networking architecture of HDT, including data acquisition layer, data communication layer, computation layer, data management layer and data analysis and decision making layer. Besides reviewing the key technologies for implementing such networking architecture in detail, we conclude this survey by presenting future research directions of HDT.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 1","pages":"706-746"},"PeriodicalIF":35.6,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131573664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Detection in the Automotive Domain: A Comprehensive Review 汽车领域的入侵检测:综述
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-08-29 DOI: 10.1109/COMST.2023.3309864
Brooke Lampe;Weizhi Meng
{"title":"Intrusion Detection in the Automotive Domain: A Comprehensive Review","authors":"Brooke Lampe;Weizhi Meng","doi":"10.1109/COMST.2023.3309864","DOIUrl":"10.1109/COMST.2023.3309864","url":null,"abstract":"The automotive domain has realized amazing advancements in communication, connectivity, and automation—and at a breakneck pace. Such advancements come with ample benefits, such as the reduction of traffic accidents and the refinement of transit efficiency. However, these new developments were not necessarily made with security in mind. Researchers have unearthed a number of security vulnerabilities in paradigms such as in-vehicle networks (IVNs), the Internet of Vehicles (IoV), and intelligent transportation systems (ITSs). As automotive technologies continue to evolve, it would be realistic to expect new vulnerabilities to arise—both vulnerabilities that are identified and vulnerabilities that are not. If—or more pragmatically, when—these vulnerabilities are exploited, intrusion detection will be paramount. Therefore, we find it prudent to review intrusion detection in the automotive domain. We explore a myriad of threats and intrusion detection techniques—from the boundaries of the vehicle’s own network to the wider Internet of Vehicles (IoV). Intrusion detection, while not a panacea, can be a cost-effective solution to many automotive security issues. Generally, such intrusion detection systems (IDSs) do not disrupt existing hardware, infrastructure, or communications; rather, they merely tap into the network and monitor for suspicious traffic. Given the very reasonable price tag, the implementation of intrusion detection systems would be an auspicious step by the automotive industry to assure the security—and safety—of the modern automobile. This paper volunteers a comprehensive review of intrusion detection technologies in the automotive domain.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2356-2426"},"PeriodicalIF":35.6,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10233928","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130422541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Cryptography in 5G Networks: A Comprehensive Overview 5G 网络中的量子密码学:全面概述
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-08-28 DOI: 10.1109/COMST.2023.3309051
Miralem Mehic;Libor Michalek;Emir Dervisevic;Patrik Burdiak;Matej Plakalovic;Jan Rozhon;Nerman Mahovac;Filip Richter;Enio Kaljic;Filip Lauterbach;Pamela Njemcevic;Almir Maric;Mirza Hamza;Peppino Fazio;Miroslav Voznak
{"title":"Quantum Cryptography in 5G Networks: A Comprehensive Overview","authors":"Miralem Mehic;Libor Michalek;Emir Dervisevic;Patrik Burdiak;Matej Plakalovic;Jan Rozhon;Nerman Mahovac;Filip Richter;Enio Kaljic;Filip Lauterbach;Pamela Njemcevic;Almir Maric;Mirza Hamza;Peppino Fazio;Miroslav Voznak","doi":"10.1109/COMST.2023.3309051","DOIUrl":"10.1109/COMST.2023.3309051","url":null,"abstract":"Every attempt to access to the Internet through a Web browser, email sent, VPN connection, VoIP call, instant message or other use of telecommunications systems involves cryptographic techniques. The most commonly applied technique is asymmetric cryptography, which is generally executed in the background without the user even being aware. It establishes a cryptographic code based on the computational complexity of mathematical problems. However, this type of cryptography, which is widely used in today’s telecommunications systems, is under threat as electronics and computing rapidly develop. The development of fifth-generation cellular networks (5G) is gaining momentum, and given its wide field of application, security requires special attention. This is especially true faced with the development of quantum computers. One solution to this security challenge is to use more advanced techniques to establish cryptographic keys that are not susceptible to attack. An essential part of quantum cryptography, Quantum Key Distribution (QKD) uses the principles of quantum physics to establish and distribute symmetric cryptographic keys between two geographically distant users. QKD establishes information-theoretically secure cryptographic keys that are resistant to eavesdropping when they are created. In this paper, we survey the security challenges and approaches in 5G networks concerning network protocols, interfaces and management organizations. We begin by examining the fundamentals of QKD and discuss the creation of QKD networks and their applications. We then outline QKD network architecture and its components and standards, following with a summary of QKD and post-quantum key distribution techniques and approaches for its integration into existing security frameworks such as VPNs (IPsec and MACsec). We also discuss the requirements, architecture and methods for implementing the FPGA-based encryptors needed to execute cryptographic algorithms with security keys. We discuss the performance and technologies of post-quantum cryptography, and finally, examine reported 5G demonstrations which have used quantum technologies, highlighting future research directions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 1","pages":"302-346"},"PeriodicalIF":35.6,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134259257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Holographic MIMO Communications: Theoretical Foundations, Enabling Technologies, and Future Directions 全息多输入多输出通信:理论基础、应用技术和未来方向
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2023-08-28 DOI: 10.1109/COMST.2023.3309529
Tierui Gong;Panagiotis Gavriilidis;Ran Ji;Chongwen Huang;George C. Alexandropoulos;Li Wei;Zhaoyang Zhang;Mérouane Debbah;H. Vincent Poor;Chau Yuen
{"title":"Holographic MIMO Communications: Theoretical Foundations, Enabling Technologies, and Future Directions","authors":"Tierui Gong;Panagiotis Gavriilidis;Ran Ji;Chongwen Huang;George C. Alexandropoulos;Li Wei;Zhaoyang Zhang;Mérouane Debbah;H. Vincent Poor;Chau Yuen","doi":"10.1109/COMST.2023.3309529","DOIUrl":"10.1109/COMST.2023.3309529","url":null,"abstract":"Future wireless systems are envisioned to create an endogenously holography-capable, intelligent, and programmable radio propagation environment, that will offer unprecedented capabilities for high spectral and energy efficiency, low latency, and massive connectivity. A potential and promising technology for supporting the expected extreme requirements of the sixth-generation (6G) communication systems is the concept of the holographic multiple-input multiple-output (HMIMO), which will actualize holographic radios with reasonable power consumption and fabrication cost. The HMIMO is facilitated by ultra-thin, extremely large, and nearly continuous surfaces that incorporate reconfigurable and sub-wavelength-spaced antennas and/or metamaterials. Such surfaces comprising dense electromagnetic (EM) excited elements are capable of recording and manipulating impinging fields with utmost flexibility and precision, as well as with reduced cost and power consumption, thereby shaping arbitrary-intended EM waves with high energy efficiency. The powerful EM processing capability of HMIMO opens up the possibility of wireless communications of holographic imaging level, paving the way for signal processing techniques realized in the EM-domain, possibly in conjunction with their digital-domain counterparts. However, in spite of the significant potential, the studies on HMIMO communications are still at an initial stage, its fundamental limits remain to be unveiled, and a certain number of critical technical challenges need to be addressed. In this survey, we present a comprehensive overview of the latest advances in the HMIMO communications paradigm, with a special focus on their physical aspects, their theoretical foundations, as well as the enabling technologies for HMIMO systems. We also compare the HMIMO with existing multi-antenna technologies, especially the massive MIMO, present various promising synergies of HMIMO with current and future candidate technologies, and provide an extensive list of research challenges and open directions for future HMIMO-empowered wireless applications.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 1","pages":"196-257"},"PeriodicalIF":35.6,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80680001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信