SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "L773:1553 877X "

Sökning: L773:1553 877X

  • Resultat 1-39 av 39
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Ahmed, Ijaz, et al. (författare)
  • Security for 5G and Beyond
  • 2019
  • Ingår i: IEEE Communications Surveys and Tutorials. - USA : Institute of Electrical and Electronics Engineers (IEEE). - 1553-877X. ; 21:4, s. 3682-3722
  • Tidskriftsartikel (refereegranskat)abstract
    • The development of the Fifth Generation (5G) wireless networks is gaining momentum to connect almost all aspects of life through the network with much higher speed, very low latency and ubiquitous connectivity. Due to its crucial role in our lives, the network must secure its users, components, and services. The security threat landscape of 5G has grown enormously due to the unprecedented increase in types of services and in the number of devices. Therefore, security solutions if not developed yet must be envisioned already to cope with diverse threats on various services, novel technologies, and increased user information accessible by the network. This article outlines the 5G network threat landscape, the security vulnerabilities in the new technological concepts that will be adopted by 5G, and provides either solutions to those threats or future directions to cope with those security challenges. We also provide a brief outline of the post-5G cellular technologies and their security vulnerabilities which is referred to as Future Generations (XG) in this paper. In brief, this article highlights the present and future security challenges in wireless networks, mainly in 5G, and future directions to secure wireless networks beyond 5G.
  •  
2.
  • Alodeh, M., et al. (författare)
  • Symbol-level and multicast precoding for multiuser multiantenna downlink : A state-of-the-art, classification, and challenges
  • 2018
  • Ingår i: IEEE Communications Surveys and Tutorials. - : Institute of Electrical and Electronics Engineers (IEEE). - 1553-877X. ; 20:3, s. 1733-1757
  • Tidskriftsartikel (refereegranskat)abstract
    • Precoding has been conventionally considered as an effective means of mitigating or exploiting the interference in the multiantenna downlink channel, where multiple users are simultaneously served with independent information over the same channel resources. The early works in this area were focused on transmitting an individual information stream to each user by constructing weighted linear combinations of symbol blocks (codewords). However, more recent works have moved beyond this traditional view by: 1) transmitting distinct data streams to groups of users and 2) applying precoding on a symbol-per-symbol basis. In this context, the current survey presents a unified view and classification of precoding techniques with respect to two main axes: 1) the switching rate of the precoding weights, leading to the classes of block-level and symbol-level precoding and 2) the number of users that each stream is addressed to, hence unicast, multicast, and broadcast precoding. Furthermore, the classified techniques are compared through representative numerical results to demonstrate their relative performance and uncover fundamental insights. Finally, a list of open theoretical problems and practical challenges are presented to inspire further research in this area1.1The concepts of precoding and beamforming are used interchangeably throughout this paper.
  •  
3.
  • Asghar, Muhammad Rizwan, et al. (författare)
  • Smart Meter Data Privacy : A Survey
  • 2017
  • Ingår i: IEEE Communications Surveys and Tutorials. - 1553-877X. ; 19:4, s. 2820-2835
  • Tidskriftsartikel (refereegranskat)abstract
    • Automated and smart meters are devices that are able to monitor the energy consumption of electricity consumers in near real-time. They are considered key technological enablers of the smart grid, as the real-time consumption data that they can collect could enable new sophisticated billing schemes, could facilitate more efficient power distribution system operation and could give rise to a variety of value-added services. At the same time, the energy consumption data that the meters collect are sensitive consumer information; thus, privacy is a key concern and is a major inhibitor of real-time data collection in practice. In this paper, we review the different uses of metering data in the smart grid and the related privacy legislation. We then provide a structured overview, shortcomings, recommendations, and research directions of security solutions that are needed for privacy-preserving meter data delivery and management. We finally survey recent work on privacy-preserving technologies for meter data collection for the three application areas: 1) billing; 2) operations; and 3) value-added services including demand response.
  •  
4.
  • Azari, Amin, 1988- (författare)
  • Cellular, Wide-Area, and Non-Terrestrial IoT: A Survey on 5G Advances and the Road Towards 6G
  • 2022
  • Ingår i: IEEE Communications Surveys and Tutorials. - IEEE. - 1553-877X.
  • Tidskriftsartikel (refereegranskat)abstract
    • —The next wave of wireless technologies is proliferating in connecting things among themselves as well as to humans. In the era of the Internet of things (IoT), billions of sensors, machines, vehicles, drones, and robots will be connected, making the world around us smarter. The IoT will encompass devices that must wirelessly communicate a diverse set of data gathered from the environment for myriad new applications. The ultimate goal is to extract insights from this data and develop solutions that improve quality of life and generate new revenue. Providing large-scale, long-lasting, reliable, and near real-time connectivity is the major challenge in enabling a smart connected world. This paper provides a comprehensive survey on existing and emerging communication solutions for serving IoT applications in the context of cellular, wide-area, as well as non-terrestrial networks. Specifically, wireless technology enhancements for providing IoT access in fifth-generation (5G)and beyond cellular networks, and communication networks over the unlicensed spectrum are presented. Aligned with the main key performance indicators of 5G and beyond 5G networks, we investigate solutions and standards that enable energy efficiency, reliability, low latency, and scalability (connection density) of current and future IoT networks. The solutions include grant-free access and channel coding for short-packet communications, nonorthogonal multiple access, and on-device intelligence. Further, a vision of new paradigm shifts in communication networks in the 2030s is provided, and the integration of the associated new technologies like artificial intelligence, non-terrestrial networks, and new spectra is elaborated. In particular, the potential of using emerging deep learning and federated learning techniques for enhancing the efficiency and security of IoT communication are discussed, and their promises and challenges are introduced. Finally, future research directions toward beyond 5G IoT networks are pointed out. 
  •  
5.
  • Azari, M. Mahdi, et al. (författare)
  • Evolution of Non-Terrestrial Networks from 5G to 6G : A Survey
  • 2022
  • Ingår i: IEEE Communications Surveys & Tutorials. - : Institute of Electrical and Electronics Engineers (IEEE). - 1553-877X. ; 24:4, s. 2633-2672
  • Tidskriftsartikel (refereegranskat)abstract
    • Non-terrestrial networks (NTNs) traditionally have certain limited applications. However, the recent technological advancements and manufacturing cost reduction opened up myriad applications of NTNs for 5G and beyond networks, especially when integrated into terrestrial networks (TNs). This article comprehensively surveys the evolution of NTNs highlighting their relevance to 5G networks and essentially, how it will play a pivotal role in the development of 6G ecosystem. We discuss important features of NTNs integration into TNs and the synergies by delving into the new range of services and use cases, various architectures, technological enablers, and higher layer aspects pertinent to NTNs integration. Moreover, we review the corresponding challenges arising from the technical peculiarities and the new approaches being adopted to develop efficient integrated ground-air-space (GAS) networks. Our survey further includes the major progress and outcomes from academic research as well as industrial efforts representing the main industrial trends, field trials, and prototyping towards the 6G networks.
  •  
6.
  • Baltaci, Aygun, et al. (författare)
  • A Survey of Wireless Networks for Future Aerial Communications (FACOM)
  • 2021
  • Ingår i: IEEE Communications Surveys and Tutorials. - : Institute of Electrical and Electronics Engineers (IEEE). - 1553-877X. ; 23:4, s. 2833-2884
  • Tidskriftsartikel (refereegranskat)abstract
    • Electrification turned over a new leaf in aviation by introducing new types of aerial vehicles along with new means of transportation. Addressing a plethora of use cases, drones are gaining attention in the industry and increasingly appear in the sky. Emerging concepts of flying taxi enable passengers to be transported over several tens of kilometers. Therefore, unmanned traffic management systems are under development to cope with the complexity of future airspace, thereby resulting in unprecedented communication needs. Moreover, the long-term increase in the number of commercial airplanes pushes the limits of voice-oriented communications, and future options such as single-pilot operations demand robust connectivity. In this survey, we provide a comprehensive review and vision for enabling the connectivity applications of aerial vehicles utilizing current and future communication technologies. We begin by categorizing the connectivity use cases per aerial vehicle and analyzing their connectivity requirements. By reviewing more than 500 related studies, we aim for a comprehensive approach to cover wireless communication technologies, and provide an overview of recent findings from the literature toward the possibilities and challenges of employing the wireless communication standards. After analyzing the proposed network architectures, we list the open-source testbed platforms to facilitate future investigations by researchers. This study helped us observe that while numerous works focused on cellular technologies to enable connectivity for aerial platforms, a single wireless technology is not sufficient to meet the stringent connectivity demands of the aerial use cases, especially for the piloting operations. We identified the need of further investigations on multi-technology heterogeneous network architectures to enable robust and real-time connectivity in the sky. Future works should consider suitable technology combinations to develop unified aerial networks that can meet the diverse quality of service demands of the aerial use cases.
  •  
7.
  • Briscoe, Bob, et al. (författare)
  • Reducing Internet Latency : A Survey of Techniques and Their Merits
  • 2016
  • Ingår i: IEEE Communications Surveys and Tutorials. - : IEEE. - 1553-877X. ; 18:3, s. 2149-2196
  • Tidskriftsartikel (refereegranskat)abstract
    • Latency is increasingly becoming a performance bottleneck for Internet Protocol (IP) networks, but historically, networks have been designed with aims of maximizing throughput and utilization. This paper offers a broad survey of techniques aimed at tackling latency in the literature up to August 2014, as well as their merits. A goal of this work is to be able to quantify and compare the merits of the different Internet latency reducing techniques, contrasting their gains in delay reduction versus the pain required to implement and deploy them. We found that classifying techniques according to the sources of delay they alleviate provided the best insight into the following issues: 1) The structural arrangement of a network, such as placement of servers and suboptimal routes, can contribute significantly to latency; 2) each interaction between communicating endpoints adds a Round Trip Time (RTT) to latency, particularly significant for short flows; 3) in addition to base propagation delay, several sources of delay accumulate along transmission paths, today intermittently dominated by queuing delays; 4) it takes time to sense and use available capacity, with overuse inflicting latency on other flows sharing the capacity; and 5) within end systems, delay sources include operating system buffering, head-of-line blocking, and hardware interaction. No single source of delay dominates in all cases, and many of these sources are spasmodic and highly variable. Solutions addressing these sources often both reduce the overall latency and make it more predictable.
  •  
8.
  • Butun, Ismail, et al. (författare)
  • Security of the Internet of Things : Vulnerabilities, Attacks, and Countermeasures
  • 2020
  • Ingår i: IEEE Communications Surveys and Tutorials. - 1553-877X. ; 22:1, s. 616-644
  • Tidskriftsartikel (refereegranskat)abstract
    • Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have tremendously appealing features, e.g., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. WSNs have started to merge with the Internet of Things (IoT) through the introduction of Internet access capability in sensor nodes and sensing ability in Internet-connected devices. Thereby, the IoT is providing access to huge amount of data, collected by the WSNs, over the Internet. Hence, the security of IoT should start with foremost securing WSNs ahead of the other components. However, owing to the absence of a physical line-of-defense, i.e., there is no dedicated infrastructure such as gateways to watch and observe the flowing information in the network, security of WSNs along with IoT is of a big concern to the scientific community. More specifically, for the application areas in which CIA (confidentiality, integrity, availability) has prime importance, WSNs and emerging IoT technology might constitute an open avenue for the attackers. Besides, recent integration and collaboration of WSNs with IoT will open new challenges and problems in terms of security. Hence, this would be a nightmare for the individuals using these systems as well as the security administrators who are managing those networks. Therefore, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper. In this text, attacks are categorized and treated into mainly two parts, most or all types of attacks towards WSNs and IoT are investigated under that umbrella: 'Passive Attacks' and 'Active Attacks'. Understanding these attacks and their associated defense mechanisms will help paving a secure path towards the proliferation and public acceptance of IoT technology. 
  •  
9.
  • Chen, Hui, 1992, et al. (författare)
  • A Tutorial on Terahertz-Band Localization for 6G Communication Systems
  • 2022
  • Ingår i: IEEE Communications Surveys and Tutorials. - 1553-877X. ; 24:3, s. 1780-1815
  • Tidskriftsartikel (refereegranskat)abstract
    • Terahertz (THz) communications are celebrated as key enablers for converged localization and sensing in future sixth-generation (6G) wireless communication systems and beyond. Instead of being a byproduct of the communication system, localization in 6G is indispensable for location-aware communications. Towards this end, we aim to identify the prospects, challenges, and requirements of THz localization techniques. We first review the history and trends of localization methods and discuss their objectives, constraints, and applications in contemporary communication systems. We then detail the latest advances in THz communications and introduce THz-specific channel and system models. Afterward, we formulate THz-band localization as a 3D position/orientation estimation problem, detailing geometry-based localization techniques and describing potential THz localization and sensing extensions. We further formulate the offline design and online optimization of THz localization systems, provide numerical simulation results, and conclude by providing lessons learned and future research directions. Preliminary results illustrate that under the same transmission power and array footprint, THz-based localization outperforms millimeter wave-based localization. In other words, the same level of localization performance can be achieved at THz-band with less transmission power or a smaller footprint.
  •  
10.
  • Chiesa, Marco, et al. (författare)
  • A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks
  • 2021
  • Ingår i: IEEE Communications Surveys and Tutorials. - : Institute of Electrical and Electronics Engineers (IEEE). - 1553-877X. ; 23:2, s. 1253-1301
  • Tidskriftsartikel (refereegranskat)abstract
    • In order to meet their stringent dependability requirements, most modern packet-switched communication networks support fast-recovery mechanisms in the data plane. While reactions to failures in the data plane can be significantly faster compared to control plane mechanisms, implementing fast recovery in the data plane is challenging, and has recently received much attention in the literature. This survey presents a systematic, tutorial-like overview of packet-based fast-recovery mechanisms in the data plane, focusing on concepts but structured around different networking technologies, from traditional link-layer and IP-based mechanisms, over BGP and MPLS to emerging software-defined networks and programmable data planes. We examine the evolution of fast-recovery standards and mechanisms over time, and identify and discuss the fundamental principles and algorithms underlying different mechanisms. We then present a taxonomy of the state of the art, summarize the main lessons learned, and propose a few concrete future directions.
  •  
11.
  • Chude-Okonkwo, Uche A.K., et al. (författare)
  • Molecular Communication and Nanonetwork for Targeted Drug Delivery : a survey
  • 2017
  • Ingår i: IEEE Communications Surveys and Tutorials. - : Institute of Electrical and Electronics Engineers (IEEE). - 1553-877X. ; 19:4, s. 3046-3096
  • Tidskriftsartikel (refereegranskat)abstract
    • Molecular communication (MC) and molecular network (MN) are communication paradigms that use biochemical signalling to achieve information exchange among naturally and artificially synthesized nanosystems. Among the envisaged application areas of MC and MN is the field of nanomedicine where the subject of targeted drug delivery (TDD) is at the forefront. Typically, when someone gets sick, therapeutic drugs are administered to the person for healing purpose. Since no therapeutic drug can be effective until it is delivered to the target site in the body, different modalities to improve the delivery of drugs to the targeted sites are being explored in contemporary research. The most promising of these modalities is TDD. TDD modality promises a smart localization of appropriate dose of therapeutic drugs to the targeted part of the body at reduced system toxicity. Research in TDD has been going on for many years in the field of medical science; however, the translation of expectations and promises to clinical reality has not been satisfactorily achieved because of several challenges. The exploration of TDD ideas under the MC and MN paradigms is considered as an option to addressing these challenges and to facilitate the translation of TDD from the bench to the patients’ bedsides. Over the past decade, there have been some research efforts made in exploring the ideas of TDD on the MC and MN platforms. While the number of research output in terms of scientific articles is few at the moment, the desire in the scientific community to participate in realizing the goal of TDD is quite high as is evidence from the rise in research output over the last few years. To increase awareness and provide the multidisciplinary research community with the necessary background information on TDD, this paper presents a visionary survey of this subject within the domain of MC and MN. We start by introducing in an elaborate manner, the motivation behind the application of MC and MN paradigms to the study and implementation of TDD. Specifically, an explanation on how MC-based TDD concepts differ from traditional TDD being explored under the field of medical science is provided. We also summarize the taxonomy of the different perspectives through which MC-based TDD research can be viewed. System models and design challenges/requirements for developing MC-based TDD are discussed. Various metrics that can be used to evaluate the performance of MC-based TDD systems are highlighted. We also provide a discussion on the envisaged path from contemporary research activities to clinical implementation of the MC-based TDD. Finally, we discuss issues such as informatics and software tools, as well as issues that border on the requirement for standards and regulatory policies in MC-based TDD research and practice.
  •  
12.
  • Conti, Mauro, et al. (författare)
  • A Survey of Man In The Middle Attacks
  • 2016
  • Ingår i: IEEE Communications Surveys and Tutorials. - : IEEE Communications Society. - 1553-877X. ; 18:3, s. 2027-2051
  • Tidskriftsartikel (refereegranskat)abstract
    • The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself. In this paper, we extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS. In particular, we classify MITM attacks based on several parameters, like location of an attacker in the network, nature of a communication channel, and impersonation techniques. Based on an impersonation techniques classification, we then provide execution steps for each MITM class. We survey existing countermeasures and discuss the comparison among them. Finally, based on our analysis, we propose a categorisation of MITM prevention mechanisms, and we identify some possible directions for future research.
  •  
13.
  • Coronado, Estefanía, et al. (författare)
  • Zero Touch Management : A Survey of Network Automation Solutions for 5G and 6G Networks
  • 2022
  • Ingår i: IEEE Communications Surveys & Tutorials. - : Institute of Electrical and Electronics Engineers (IEEE). - 1553-877X .- 2373-745X. ; 24:4, s. 2535-2578
  • Tidskriftsartikel (refereegranskat)abstract
    • Mobile networks are facing an unprecedented demand for high-speed connectivity originating from novel mobile applications and services and, in general, from the adoption curve of mobile devices. However, coping with the service requirements imposed by current and future applications and services is very difficult since mobile networks are becoming progressively more heterogeneous and more complex. In this context, a promising approach is the adoption of novel network automation solutions and, in particular, of zero-touch management techniques. In this work, we refer to zero-touch management as a fully autonomous network management solution with human oversight. This survey sits at the crossroad between zero-touch management and mobile and wireless network research, effectively bridging a gap in terms of literature review between the two domains. In this paper, we first provide a taxonomy of network management solutions. We then discuss the relevant state-of-the-art on autonomous mobile networks. The concept of zero-touch management and the associated standardization efforts are then introduced. The survey continues with a review of the most important technological enablers for zero-touch management. The network automation solutions from the RAN to the core network, including end-to-end aspects such as security, are then surveyed. Finally, we close this article with the current challenges and research directions.
  •  
14.
  • Dritan, Nace, et al. (författare)
  • Max-min fairness and its applications to routing and load-balancing in communication networks - a tutorial
  • 2008
  • Ingår i: IEEE Communications Surveys and Tutorials. - 1553-877X. ; 10:4, s. 5-17
  • Tidskriftsartikel (refereegranskat)abstract
    • This tutorial is devoted to the notion of max-min fairness (MMF), associated optimization problems, and their applications to multi-commodity flow networks.We first introduce a theoretical background for a generic MMF optimization problem and discuss its relation to lexicographic optimization. We next present resolution algorithms for convex MMF optimization, and analyze their properties. In the second half of the tutorial we discuss its applications to communication networks, in particular to routing and load-balancing. We state several properties with respect to each of the studied problems and analyze the behavior of the algorithms.
  •  
15.
  • Du, Rong, 1989-, et al. (författare)
  • The sensable city : A survey on the deployment and management for smart city monitoring
  • 2019
  • Ingår i: IEEE Communications Surveys and Tutorials. - : IEEE. - 1553-877X. ; 21:2, s. 1533-1560
  • Tidskriftsartikel (refereegranskat)abstract
    • In last two decades, various monitoring systems have been designed and deployed in urban environments, toward the realization of the so called smart cities. Such systems are based on both dedicated sensor nodes, and ubiquitous but not dedicated devices such as smart phones and vehicles’ sensors. When we design sensor network monitoring systems for smart cities, we have two essential problems: node deployment and sensing management. These design problems are challenging, due to large urban areas to monitor, constrained locations for deployments, and heterogeneous type of sensing devices. There is a vast body of literature from different disciplines that have addressed these challenges. However, we do not have yet a comprehensive understanding and sound design guidelines. This article addresses such a research gap and provides an overview of the theoretical problems we face, and what possible approaches we may use to solve these problems. Specifically, this paper focuses on the problems on both the deployment of the devices (which is the system design/configuration part) and the sensing management of the devices (which is the system running part). We also discuss how to choose the existing algorithms in different type of monitoring applications in smart cities, such as structural health monitoring, water pipeline networks, traffic monitoring. We finally discuss future research opportunities and open challenges for smart city monitoring.
  •  
16.
  • Fischer, Andreas, et al. (författare)
  • Virtual Network Embedding : A Survey
  • 2013
  • Ingår i: IEEE Communications Surveys and Tutorials. - : IEEE. - 1553-877X. ; 15:4, s. 1888-1906
  • Tidskriftsartikel (refereegranskat)abstract
    • Network virtualization is recognized as an enabling technology for the future Internet. It aims to overcome the resistance of the current Internet to architectural change. Application of this technology relies on algorithms that can instantiate virtualized networks on a substrate infrastructure, optimizing the layout for service-relevant metrics. This class of algorithms is commonly known as “Virtual Network Embedding (VNE)” algorithms. This paper presents a survey of current research in the VNE area. Based upon a novel classification scheme for VNE algorithms a taxonomy of current approaches to the VNE problem is provided and opportunities for further research are discussed.
  •  
17.
  • Fizza, Kaneez, et al. (författare)
  • A Survey on Evaluating the Quality of Autonomic Internet of Things Applications
  • 2023
  • Ingår i: IEEE Communications Surveys and Tutorials. - : Institute of Electrical and Electronics Engineers Inc.. - 1553-877X. ; 25:1, s. 567-590
  • Forskningsöversikt (refereegranskat)abstract
    • The rapid evolution of the Internet of Things (IoT) facilitates the development of IoT applications in domains such as manufacturing, smart cities, retail, agriculture, etc. Such IoT applications collect data, analyze, and extract insightful information to enable decision-making and actuation. There is an unprecedented growth of IoT applications that automate decision-making and actuation without requiring human intervention, which we term autonomic IoT applications. The increasing scale of such applications necessitates holistic measurement and evaluation of application quality. Existing literature has evaluated quality from an end-user perspective, which may be unsuitable when dealing with the complexity of modern IoT applications, especially when they are autonomic. In this paper, we refer to IoT application quality as the aggregate quantitative value of various IoT quality metrics measured at each stage of the autonomic IoT application life cycle. We present an in-depth survey of current state-of-the-art techniques and approaches for evaluating quality of IoT applications. In particular, we survey various definitions to identify the factors that contribute to understanding and evaluating quality in IoT. Furthermore, we present open issues and identify future research directions towards realizing fine-grained quality evaluation of IoT applications. We envision that the identified research directions will, in turn, enable real-time diagnostics of IoT applications and make them quality-aware. This survey can serve as the basis for designing and developing modern, resilient quality-aware autonomic IoT applications.
  •  
18.
  •  
19.
  • Kouyoumdjieva, Sylvia T., et al. (författare)
  • Survey of Non-Image-Based Approaches for Counting People
  • 2020
  • Ingår i: IEEE Communications Surveys and Tutorials. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 1553-877X. ; 22:2, s. 1305-1336
  • Tidskriftsartikel (refereegranskat)abstract
    • Accurate people count estimation, potentially in real-time, both for indoor and outdoor environments, is said to be of major importance in the smart cities of tomorrow. Application areas, such as public transportation, urban analytics, building automation, as well as disaster management are all expected to benefit if they were to have a better understanding of occupancy in public premises. A large body of work has been concentrated into providing people counting solutions based on images captured by surveillance cameras. However, image-based approaches are costly, as they require devoted hardware installations, and are often privacy intruding. Thus, academic and industry researchers are looking into alternative solutions for people counting. In this paper, we present a comprehensive study of non-image-based people counting techniques. Our goal with this paper is twofold: 1) to serve as an introduction to everyone interested in gaining a better understanding on non-image-based people counting techniques and 2) to serve as a guideline to practitioners interested in implementing and testing specific solutions in their everyday practice. To this end, we provide a novel classification of available approaches, and outline the requirements they need to meet. We further discuss in detail different academic solutions, and provide comparisons between them. Furthermore, we provide a discussion on available industrial approaches and compare them to academic proposals. Finally, we discuss open challenges and future directions in the field of non-image-based people counting.
  •  
20.
  • Laoudias, Christos, et al. (författare)
  • A Survey of Enabling Technologies for Network Localization, Tracking, and Navigation
  • 2018
  • Ingår i: IEEE Communications Surveys and Tutorials. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 1553-877X. ; 20:4, s. 3607-3644
  • Tidskriftsartikel (refereegranskat)abstract
    • Location information for events, assets, and individuals, mostly focusing on two dimensions so far, has triggered a multitude of applications across different verticals, such as consumer, networking, industrial, health care, public safety, and emergency response use cases. To fully exploit the potential of location awareness and enable new advanced location-based services, localization algorithms need to be combined with complementary technologies including accurate height estimation, i.e., three dimensional location, reliable user mobility classification, and efficient indoor mapping solutions. This survey provides a comprehensive review of such enabling technologies. In particular, we present cellular localization systems including recent results on 5G localization, and solutions based on wireless local area networks, highlighting those that are capable of computing 3D location in multi-floor indoor environments. We overview range-free localization schemes, which have been traditionally explored in wireless sensor networks and are nowadays gaining attention for several envisioned Internet of Things applications. We also present user mobility estimation techniques, particularly those applicable in cellular networks, that can improve localization and tracking accuracy. Regarding the mapping of physical space inside buildings for aiding tracking and navigation applications, we study recent advances and focus on smartphone-based indoor simultaneous localization and mapping approaches. The survey concludes with service availability and system scalability considerations, as well as security and privacy concerns in location architectures, discusses the technology roadmap, and identifies future research directions.
  •  
21.
  • Laya, Andres, et al. (författare)
  • Is the Random Access Channel of LTE and LTE-A Suitable for M2M Communications? A Survey of Alternatives
  • 2014
  • Ingår i: IEEE Communications Surveys and Tutorials. - : IEEE Communications Society. - 1553-877X. ; 16:1, s. 4-16
  • Tidskriftsartikel (refereegranskat)abstract
    • The 3GPP has raised the need to revisit the design of next generations of cellular networks in order to make them capable and efficient to provide M2M services. One of the key challenges that has been identified is the need to enhance the operation of the random access channel of LTE and LTE-A. The current mechanism to request access to the system is known to suffer from congestion and overloading in the presence of a huge number of devices. For this reason, different research groups around the globe are working towards the design of more efficient ways of managing the access to these networks in such circumstances. This paper aims to provide a survey of the alternatives that have been proposed over the last years to improve the operation of the random access channel of LTE and LTE-A. A comprehensive discussion of the different alternatives is provided, identifying strengths and weaknesses of each one of them, while drawing future trends to steer the efforts over the same shooting line. In addition, while existing literature has been focused on the performance in terms of delay, the energy efficiency of the access mechanism of LTE will play a key role in the deployment of M2M networks. For this reason, a comprehensive performance evaluation of the energy efficiency of the random access mechanism of LTE is provided in this paper. The aim of this computer-based simulation study is to set a baseline performance upon which new and more energy-efficient mechanisms can be designed in the near future.
  •  
22.
  • Lee, Ying Loong, et al. (författare)
  • Recent Advances in Radio Resource Managementfor Heterogeneous LTE/LTE-A Networks
  • 2014
  • Ingår i: IEEE Communications Surveys and Tutorials. - New York, NY : IEEE Communications Society. - 1553-877X. ; 16:4, s. 2142-2180
  • Tidskriftsartikel (refereegranskat)abstract
    • As heterogeneous networks (HetNets) emerge as one of the most promising developments toward realizing the target specifications of Long Term Evolution (LTE) and LTE-Advanced (LTE-A) networks, radio resource management (RRM) research for such networks has, in recent times, been intensively pursued. Clearly, recent research mainly concentrates on the aspect of interference mitigation. Other RRM aspects, such as radio resource utilization, fairness, complexity, and QoS, have not been given much attention. In this paper, we aim to provide an overview of the key challenges arising from HetNets and highlight their importance. Subsequently, we present a comprehensive survey of the RRM schemes that have been studied in recent years for LTE/LTE-A HetNets, with a particular focus on those for femtocells and relay nodes. Furthermore, we classify these RRM schemes according to their underlying approaches. In addition, these RRM schemes are qualitatively analyzed and compared to each other. We also identify a number of potential research directions for future RRM development. Finally, we discuss the lack of current RRM research and the importance of multi-objective RRM studies. ©2014 IEEE.
  •  
23.
  • Li, A., et al. (författare)
  • A Tutorial on Interference Exploitation via Symbol-Level Precoding : Overview, State-of-the-Art and Future Directions
  • 2020
  • Ingår i: IEEE Communications Surveys and Tutorials. - : Institute of Electrical and Electronics Engineers (IEEE). - 1553-877X. ; 22:2, s. 796-839
  • Tidskriftsartikel (refereegranskat)abstract
    • Interference is traditionally viewed as a performance limiting factor in wireless communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of work has shown that by manipulating the interfering signals such that they add up constructively at the receiver side, known interference can be made beneficial and further improve the system performance in a variety of wireless scenarios, achieved by symbol-level precoding (SLP). This paper aims to provide a tutorial on interference exploitation techniques from the perspective of precoding design in a multi-antenna wireless communication system, by beginning with the classification of constructive interference (CI) and destructive interference (DI). The definition for CI is presented and the corresponding mathematical characterization is formulated for popular modulation types, based on which optimization-based precoding techniques are discussed. In addition, the extension of CI precoding to other application scenarios as well as for hardware efficiency is also described. Proof-of-concept testbeds are demonstrated for the potential practical implementation of CI precoding, and finally a list of open problems and practical challenges are presented to inspire and motivate further research directions in this area.
  •  
24.
  • Nguyen, Van-Giang, 1989-, et al. (författare)
  • SDN/NFV-Based Mobile Packet Core Network Architectures : A Survey
  • 2017
  • Ingår i: IEEE Communications Surveys and Tutorials. - : IEEE Communications Society. - 1553-877X. ; 19:3, s. 1567-1602
  • Tidskriftsartikel (refereegranskat)abstract
    • The emergence of two new technologies, namely Software Defined Networking (SDN) and Network Function Virtualization (NFV) have radically changed the development of network functions and the evolution of network architectures. These two technologies bring to mobile operators the promises of reducing costs, enhancing network flexibility and scalability, and shortening the time-to-market of new applications and services. With the advent of SDN and NFV and their offered benefits, the mobile operators are gradually changing the way how they architect their mobile networks to cope with ever-increasing growth of data traffic, massive number of new devices and network accesses, and to pave the way towards the upcoming fifth generation (5G) networking. This paper aims at providing a comprehensive survey of state-of-the-art research work, which leverages SDN and NFV into the most recent mobile packet core network architecture, Evolved Packet Core (EPC). The research work is categorized into smaller groups according to a proposed four-dimensional taxonomy reflecting the (1) architectural ap- proach, (2) technology adoption, (3) functional implementation, and (4) deployment strategy. Thereafter, the research work is exhaustively compared based on the proposed taxonomy and some added attributes and criteria. Finally, the paper identifies and discusses some major challenges and open issues such as scalability and reliability, optimal resource scheduling and allocation, management and orchestration, network sharing and slicing that raise from the taxonomy and comparison tables that need to be further investigated and explored. 
  •  
25.
  • Nomikos, Nikolaos, et al. (författare)
  • A Survey on Buffer-Aided Relay Selection
  • 2016
  • Ingår i: IEEE Communications Surveys and Tutorials. - : Institute of Electrical and Electronics Engineers (IEEE). - 1553-877X. ; 18:2, s. 1073-1097
  • Tidskriftsartikel (refereegranskat)abstract
    • Relays receive and retransmit signals between one or more sources and one or more destinations. Cooperative relaying is a novel technique for wireless communications that increases throughput and extends the coverage of networks. The task of relay selection serves as a building block to realize cooperative relaying. Recently, relays with buffers have been incorporated into cooperative relaying providing extra degrees of freedom in selection, thus improving various performance metrics, such as outage probability, power reduction, and throughput, at the expense of tolerating an increase in packet delay. In this survey, we review and classify various buffer-aided relay selection policies and discuss their importance through applications. The classification is mainly based on the following aspects: 1) duplexing capabilities, 2) channel state information (CSI), 3) transmission strategies, 4) relay mode, and 5) performance metrics. Relay selection policies for enhanced physical-layer security and cognitive communications with reduced interference are also discussed. Then, a framework for modeling such algorithms is presented based on Markov Chain theory. In addition, performance evaluation is conducted for various buffer-aided relay selection algorithms. To provide a broad perspective on the role of buffer-aided relay selection, various issues relevant to fifth-generation (5G) networks are discussed. Finally, we draw conclusion and discuss current challenges, possible future directions, and emerging technologies.
  •  
26.
  • Papastergiou, Giorgos, et al. (författare)
  • De-Ossifying the Internet Transport Layer: A Survey and Future Perspectives
  • 2017
  • Ingår i: IEEE Communications Surveys and Tutorials. - : IEEE. - 1553-877X. ; 19:1, s. 619-639
  • Tidskriftsartikel (refereegranskat)abstract
    • It is widely recognized that the Internet transport layer has become ossified, where further evolution has become hard or even impossible. This is a direct consequence of the ubiquitous deployment of middleboxes that hamper the deployment of new transports, aggravated further by the limited flexibility of the application programming interface (API) typically presented to applications. To tackle this problem, a wide range of solutions have been proposed in the literature, each aiming to address a particular aspect. Yet, no single proposal has emerged that is able to enable evolution of the transport layer. In this paper, after an overview of the main issues and reasons for transport-layer ossification, we survey proposed solutions and discuss their potential and limitations. The survey is divided into five parts, each covering a set of point solutions for a different facet of the problem space: (1) designing middlebox-proof transports; (2) signaling for facilitating middlebox traversal; (3) enhancing the API between the applications and the transport layer; (4) discovering and exploiting end-to-end capabilities; and (5) enabling user-space protocol stacks. Based on this analysis, we then identify further development needs toward an overall solution. We argue that the development of a comprehensive transport layer framework, able to facilitate the integration and cooperation of specialized solutions in an application-independent and flexible way, is a necessary step toward making the Internet transport architecture truly evolvable. To this end, we identify the requirements for such a framework and provide insights for its development
  •  
27.
  • Park, Pangun, et al. (författare)
  • Wireless Network Design for Control Systems : A Survey
  • 2018
  • Ingår i: IEEE Communications Surveys and Tutorials. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 1553-877X. ; 20:2, s. 978-1013
  • Tidskriftsartikel (refereegranskat)abstract
    • Wireless networked control systems (WNCSs) are composed of spatially distributed sensors, actuators, and controllers communicating through wireless networks instead of conventional point-to-point wired connections. Due to their main benefits in the reduction of deployment and maintenance costs, large flexibility and possible enhancement of safety, WNCS are becoming a fundamental infrastructure technology for critical control systems in automotive electrical systems, avionics control systems, building management systems, and industrial automation systems. The main challenge in WNCS is to jointly design the communication and control systems considering their tight interaction to improve the control performance and the network lifetime. In this survey, we make an exhaustive review of the literature on wireless network design and optimization for WNCS. First, we discuss what we call the critical interactive variables including sampling period, message delay, message dropout, and network energy consumption. The mutual effects of these communication and control variables motivate their joint tuning. We discuss the analysis and design of control systems taking into account the effect of the interactive variables on the control system performance. Moreover, we discuss the effect of controllable wireless network parameters at all layers of the communication protocols on the probability distribution of these interactive variables. We also review the current wireless network standardization for WNCS and their corresponding methodology for adapting the network parameters. Finally, we present the state-of-the-art wireless network design and optimization for WNCS, while highlighting the tradeoff between the achievable performance and complexity of various approaches. We conclude the survey by highlighting major research issues and identifying future research directions.
  •  
28.
  • Qadri, Yazdan Ahmad, et al. (författare)
  • The Future of Healthcare Internet of Things: A Survey of Emerging Technologies
  • 2020
  • Ingår i: IEEE Communications Surveys and Tutorials. - : IEEE. - 1553-877X. ; 22:2, s. 1121-1167
  • Tidskriftsartikel (refereegranskat)abstract
    • The impact of the Internet of Things (IoT) on the advancement of the healthcare industry is immense. The ushering of the Medicine 4.0 has resulted in an increased effort to develop platforms, both at the hardware level as well as the underlying software level. This vision has led to the development of Healthcare IoT (H-IoT) systems. The basic enabling technologies include the communication systems between the sensing nodes and the processors; and the processing algorithms for generating an output from the data collected by the sensors. However, at present, these enabling technologies are also supported by several new technologies. The use of Artificial Intelligence (AI) has transformed the H-IoT systems at almost every level. The fog/edge paradigm is bringing the computing power close to the deployed network and hence mitigating many challenges in the process. While the big data allows handling an enormous amount of data. Additionally, the Software Defined Networks (SDNs) bring flexibility to the system while the blockchains are finding the most novel use cases in H-IoT systems. The Internet of Nano Things (IoNT) and Tactile Internet (TI) are driving the innovation in the H-IoT applications. This paper delves into the ways these technologies are transforming the H-IoT systems and also identifies the future course for improving the Quality of Service (QoS) using these new technologies.
  •  
29.
  • Rezaei Aghdam, Sina, 1989, et al. (författare)
  • An Overview of Physical Layer Security with Finite Alphabet Signaling
  • 2018
  • Ingår i: IEEE Communications Surveys and Tutorials. - 1553-877X.
  • Tidskriftsartikel (refereegranskat)abstract
    • Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and discuss some open problems and directions for future research.
  •  
30.
  • Roozbeh, Amir, 1983-, et al. (författare)
  • Software-Defined "Hardware" Infrastructures : A Survey on Enabling Technologies and Open Research Directions
  • 2018
  • Ingår i: IEEE Communications Surveys and Tutorials. - : Institute of Electrical and Electronics Engineers (IEEE). - 1553-877X. ; 20:3, s. 2454-2485
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper provides an overview of software-defined "hardware" infrastructures (SDHI). SDHI builds upon the concept of hardware (HW) resource disaggregation. HW resource disaggregation breaks today's physical server-oriented model where the use of a physical resource (e.g., processor or memory) is constrained to a physical server's chassis. SDHI extends the definition of of software-defined infrastructures (SDI) and brings greater modularity, flexibility, and extensibility to cloud infrastructures, thus allowing cloud operators to employ resources more efficiently and allowing applications not to be bounded by the physical infrastructure's layout. This paper aims to be an initial introduction to SDHI and its associated technological advancements. This paper starts with an overview of the cloud domain and puts into perspective some of the most prominent efforts in the area. Then, it presents a set of differentiating use-cases that SDHI enables. Next, we state the fundamentals behind SDI and SDHI, and elaborate why SDHI is of great interest today. Moreover, it provides an overview of the functional architecture of a cloud built on SDHI, exploring how the impact of this transformation goes far beyond the cloud infrastructure level in its impact on platforms, execution environments, and applications. Finally, an in-depth assessment is made of the technologies behind SDHI, the impact of these technologies, and the associated challenges and potential future directions of SDHI.
  •  
31.
  • Sallouha, Hazem, et al. (författare)
  • On the Ground and in the Sky: A Tutorial on Radio Localization in Ground-Air-Space Networks
  • 2024
  • Ingår i: IEEE Communications Surveys and Tutorials. - 1553-877X. ; In Press
  • Tidskriftsartikel (refereegranskat)abstract
    • The inherent limitations in scaling up ground infrastructure for future wireless networks, combined with decreasing operational costs of aerial and space networks, are driving considerable research interest in multisegment ground-air-space (GAS) networks. In GAS networks, where ground and aerial users share network resources, ubiquitous and accurate user localization becomes indispensable, not only as an end-user service but also as an enabler for location-aware communications. This breaks the convention of having localization as a byproduct in networks primarily designed for communications. To address these imperative localization needs, the design and utilization of ground, aerial, and space anchors require thorough investigation. In this tutorial, we provide an in-depth systemic analysis of the radio localization problem in GAS networks, considering ground and aerial users as targets to be localized. Starting from a survey of the most relevant works, we then define the key characteristics of anchors and targets in GAS networks. Subsequently, we detail localization fundamentals in GAS networks, considering 3D positions, orientations, and velocities. Afterward, we thoroughly analyze radio localization systems in GAS networks, detailing the system model, design aspects, and considerations for each of the three GAS anchors. Preliminary results are presented to provide a quantifiable perspective on key design aspects in GAS-based localization scenarios. We then identify the vital roles 6G enablers are expected to play in radio localization in GAS networks.
  •  
32.
  • Sharma, S. K., et al. (författare)
  • Application of Compressive Sensing in Cognitive Radio Communications : A Survey
  • 2016
  • Ingår i: IEEE Communications Surveys and Tutorials. - : Institute of Electrical and Electronics Engineers (IEEE). - 1553-877X. ; 18:3, s. 1838-1860
  • Tidskriftsartikel (refereegranskat)abstract
    • Compressive sensing (CS) has received much attention in several fields such as digital image processing, wireless channel estimation, radar imaging, and cognitive radio (CR) communications. Out of these areas, this survey paper focuses on the application of CS in CR communications. Due to the under-utilization of the allocated radio spectrum, spectrum occupancy is usually sparse in different domains such as time, frequency, and space. Such a sparse nature of the spectrum occupancy has inspired the application of CS in CR communications. In this regard, several researchers have already applied the CS theory in various settings considering the sparsity in different domains. In this direction, this survey paper provides a detailed review of the state of the art related to the application of CS in CR communications. Starting with the basic principles and the main features of CS, it provides a classification of the main usage areas based on the radio parameter to be acquired by a wideband CR. Subsequently, we review the existing CS-related works applied to different categories such as wideband sensing, signal parameter estimation and radio environment map (REM) construction, highlighting the main benefits and the related issues. Furthermore, we present a generalized framework for constructing the REM in compressive settings. Finally, we conclude this survey paper with some suggested open research challenges and future directions.
  •  
33.
  • Sharma, S. K., et al. (författare)
  • Cognitive Radio Techniques Under Practical Imperfections : A Survey
  • 2015
  • Ingår i: IEEE Communications Surveys and Tutorials. - 1553-877X. ; 17:4, s. 1858-1884
  • Tidskriftsartikel (refereegranskat)abstract
    • Cognitive radio (CR) has been considered as a potential candidate for addressing the spectrum scarcity problem of future wireless networks. Since its conception, several researchers, academic institutions, industries, and regulatory and standardization bodies have put their significant efforts toward the realization of CR technology. However, as this technology adapts its transmission based on the surrounding radio environment, several practical issues may need to be considered. In practice, several imperfections, such as noise uncertainty, channel/interference uncertainty, transceiver hardware imperfections, signal uncertainty, and synchronization issues, may severely deteriorate the performance of a CR system. To this end, the investigation of realistic solutions toward combating various practical imperfections is very important for the successful implementation of cognitive technology. In this direction, first, this survey paper provides an overview of the enabling techniques for CR communications. Subsequently, it discusses the main imperfections that may occur in the most widely used CR paradigms and then reviews the existing approaches toward addressing these imperfections. Finally, it provides some interesting open research issues.
  •  
34.
  • Sharma, S. K., et al. (författare)
  • Dynamic Spectrum Sharing in 5G Wireless Networks With Full-Duplex Technology : Recent Advances and Research Challenges
  • 2018
  • Ingår i: IEEE Communications Surveys and Tutorials. - : IEEE. - 1553-877X. ; 20:1, s. 674-707
  • Tidskriftsartikel (refereegranskat)abstract
    • Full-duplex (FD) wireless technology enables a radio to transmit and receive on the same frequency band at the same time, and it is considered to be one of the candidate technologies for the fifth generation (5G) and beyond wireless communication systems due to its advantages, including potential doubling of the capacity and increased spectrum utilization efficiency. However, one of the main challenges of FD technology is the mitigation of strong self-interference (SI). Recent advances in different SI cancellation techniques, such as antenna cancellation, analog cancellation, and digital cancellation methods, have led to the feasibility of using FD technology in different wireless applications. Among potential applications, one important application area is dynamic spectrum sharing (DSS) in wireless systems particularly 5G networks, where FD can provide several benefits and possibilities such as concurrent sensing and transmission (CST), concurrent transmission and reception, improved sensing efficiency and secondary throughput, and the mitigation of the hidden terminal problem. In this direction, first, starting with a detailed overview of FD-enabled DSS, we provide a comprehensive survey of recent advances in this domain. We then highlight several potential techniques for enabling FD operation in DSS wireless systems. Subsequently, we propose a novel communication framework to enable CST in DSS systems by employing a power control-based SI mitigation scheme and carry out the throughput performance analysis of this proposed framework. Finally, we discuss some open research issues and future directions with the objective of stimulating future research efforts in the emerging FD-enabled DSS wireless systems.
  •  
35.
  • Shastri, Anish, et al. (författare)
  • A Review of Millimeter Wave Device-based Localization and Device-free Sensing Technologies and Applications
  • 2022
  • Ingår i: IEEE Communications Surveys and Tutorials. - 1553-877X. ; 24:3, s. 1708-1749
  • Tidskriftsartikel (refereegranskat)abstract
    • The commercial availability of low-cost millimeterwave (mmWave) communication and radar devices is starting to improve the adoption of such technologies in consumer markets, paving the way for large-scale and dense deployments in fifthgeneration (5G)-and-beyond as well as 6G networks. At the same time, pervasive mmWave access will enable device localization and device-free sensing with unprecedented accuracy, especially with respect to sub-6 GHz commercial-grade devices. This paper surveys the state of the art in device-based localization and device-free sensing using mmWave communication and radar devices, with a focus on indoor deployments. We overview key concepts about mmWave signal propagation and system design, detailing approaches, algorithms and applications for mmWave localization and sensing. Several dimensions are considered, including the main objectives, techniques, and performance of each work, whether they reached an implementation stage, and which hardware platforms or software tools were used. We analyze theoretical (including signal processing and machine learning), technological, and implementation (hardware and prototyping) aspects, exposing under-performing or missing techniques and items towards enabling a highly effective sensing of human parameters, such as position, movement, activity and vital signs. Among many interesting findings, we observe that device-based localization systems would greatly benefit from commercial-grade hardware that exposes channel state information, as well as from a better integration between standardcompliant mmWave initial access and localization algorithms, especially with multiple access points (APs). Moreover, more advanced algorithms requiring zero-initial knowledge of the environment would greatly help improve the adoption of mmWave simultaneous localization and mapping (SLAM). Machine learning (ML)-based algorithms are gaining momentum, but still require the collection of extensive training datasets, and do not yet generalize to any indoor environment, limiting their applicability. Device-free (i.e., radar-based) sensing systems still have to be improved in terms of: improved accuracy in the detection of vital signs (respiration and heart rate) and enhanced robustness/generalization capabilities across different environments; moreover, improved support is needed for the tracking of multiple users, and for the automatic creation of radar networks to enable largescale sensing applications. Finally, integrated systems performing joint communications and sensing are still in their infancy: theoretical and practical advancements are required to add sensing functionalities to mmWave-based channel access protocols based on orthogonal frequency-division multiplexing (OFDM) and multi-antenna technologies.
  •  
36.
  • Sichitiu, Mihail, et al. (författare)
  • Inter-Vehicle Communication Systems: A Survey
  • 2008
  • Ingår i: IEEE Communications Surveys and Tutorials. - 1553-877X.
  • Tidskriftsartikel (refereegranskat)abstract
    • Inter-vehicle communication (IVC) systems (i.e., systems not relying on road-side infrastructure) have the potential to radically improve the safety, efficiency and comfort of every day road-travel. Their main advantage is that they bypass the need for expensive infrastructure; their major drawback is the comparatively complex network- ing protocols and the need for a significant penetration before their applications can become effective. In this paper we present several major classes of applications and the types of services they require from underlying network. We then proceed to analyze ex- isting networking protocols in a bottom-up fashion, from the physical to the transport layers, as well as security aspects related to IVC systems. We conclude the paper by presenting several projects related to IVC as well as a review of common performance evaluation techniques for IVC systems.
  •  
37.
  • Tange, Koen, et al. (författare)
  • A Systematic Survey of Industrial Internet of Things Security : Requirements and Fog Computing Opportunities
  • 2020
  • Ingår i: IEEE Communications Surveys and Tutorials. - : IEEE. - 1553-877X. ; 22:4, s. 2489-2520
  • Tidskriftsartikel (refereegranskat)abstract
    • A key application of the Internet of Things (IoT) paradigm lies within industrial contexts. Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry 4.0, promises to revolutionize production and manufacturing through the use of large numbers of networked embedded sensing devices, and the combination of emerging computing technologies, such as Fog/Cloud Computing and Artificial Intelligence. The IIoT is characterized by an increased degree of inter-connectivity, which not only creates opportunities for the industries that adopt it, but also for cyber-criminals. Indeed, IoT security currently represents one of the major obstacles that prevent the widespread adoption of IIoT technology. Unsurprisingly, such concerns led to an exponential growth of published research over the last few years. To get an overview of the field, we deem it important to systematically survey the academic literature so far, and distill from it various security requirements as well as their popularity. This paper consists of two contributions: our primary contribution is a systematic review of the literature over the period 2011-2019 on IIoT Security, focusing in particular on the security requirements of the IIoT. Our secondary contribution is a reflection on how the relatively new paradigm of Fog computing can be leveraged to address these requirements, and thus improve the security of the IIoT.
  •  
38.
  • Voicu, Andra M., et al. (författare)
  • Survey of Spectrum Sharing for Inter-Technology Coexistence
  • 2019
  • Ingår i: IEEE Communications Surveys and Tutorials. - : Institute of Electrical and Electronics Engineers (IEEE). - 1553-877X. ; 21:2, s. 1112-1144
  • Tidskriftsartikel (refereegranskat)abstract
    • Increasing capacity demands in emerging wireless technologies are expected to be met by network densification and spectrum bands open to multiple technologies. These will, in turn, increase the level of interference and also result in more complex inter-technology interactions, which will need to be managed through spectrum sharing mechanisms. Consequently, novel spectrum sharing mechanisms should be designed to allow spectrum access for multiple technologies, while efficiently utilizing the spectrum resources overall. Importantly, it is not trivial to design such efficient mechanisms, not only due to technical aspects, but also due to regulatory and business model constraints. In this survey we address spectrum sharing mechanisms for wireless inter-technology coexistence by means of a technology circle that incorporates in a unified, system-level view the technical and nontechnical aspects. We thus systematically explore the spectrum sharing design space consisting of parameters at different layers. Using this framework, we present a literature review on inter-technology coexistence with a focus on wireless technologies with equal spectrum access rights, i.e., (i) primary/primary, (ii) secondary/secondary, and (iii) technologies operating in a spectrum commons. Moreover, we reflect on our literature review to identify possible spectrum sharing design solutions and performance evaluation approaches useful for future coexistence cases. Finally, we discuss spectrum sharing design challenges and suggest future research directions.
  •  
39.
  • Wang, Cheng-Xiang, et al. (författare)
  • On the Road to 6G: Visions, Requirements, Key Technologies, and Testbeds
  • 2023
  • Ingår i: IEEE Communications Surveys and Tutorials. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 1553-877X. ; 25:2, s. 905-974
  • Tidskriftsartikel (refereegranskat)abstract
    • Fifth generation (5G) mobile communication systems have entered the stage of commercial deployment, providing users with new services, improved user experiences as well as a host of novel opportunities to various industries. However, 5G still faces many challenges. To address these challenges, international industrial, academic, and standards organizations have commenced research on sixth generation (6G) wireless communication systems. A series of white papers and survey papers have been published, which aim to define 6G in terms of requirements, application scenarios, key technologies, etc. Although ITU-R has been working on the 6G vision and it is expected to reach a consensus on what 6G will be by mid-2023, the related global discussions are still wide open and the existing literature has identified numerous open issues. This paper first provides a comprehensive portrayal of the 6G vision, technical requirements, and application scenarios, covering the current common understanding of 6G. Then, a critical appraisal of the 6G network architecture and key technologies is presented. Furthermore, existing testbeds and advanced 6G verification platforms are detailed for the first time. In addition, future research directions and open challenges are identified to stimulate the on-going global debate. Finally, lessons learned to date concerning 6G networks are discussed.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-39 av 39
Typ av publikation
tidskriftsartikel (37)
forskningsöversikt (2)
Typ av innehåll
refereegranskat (39)
Författare/redaktör
Ottersten, Björn, 19 ... (6)
Chatzinotas, S. (5)
Brunström, Anna, 196 ... (3)
Vasilakos, Athanasio ... (3)
Fischione, Carlo (3)
Wang, X. (2)
visa fler...
Grinnemo, Karl-Johan ... (2)
Wymeersch, Henk, 197 ... (2)
Spano, D. (2)
Tsinos, C. G. (2)
Vinel, Alexey, 1983- (1)
Loo, Jonathan (1)
Li, Y. (1)
Tufvesson, Fredrik (1)
Tataria, Harsh (1)
Lagunas, Eva (1)
Chatzinotas, Symeon (1)
Fischer, Andreas (1)
Larsson, Erik G., Pr ... (1)
Taheri, Javid (1)
Johansson, Karl H., ... (1)
Alouini, Mohamed-Sli ... (1)
Kihl, Maria (1)
Maguire Jr., Gerald ... (1)
Pioro, Michal (1)
Hurtig, Per, 1980- (1)
Ngai, Edith C.-H. (1)
Schmid, Stefan (1)
Okwuibe, Jude (1)
Ylianttila, Mika (1)
Ahmed, Ijaz (1)
Shahabuddin, Shahria ... (1)
Tanesh, Kumar (1)
Gurtov, Andrei, 1979 ... (1)
Cavdar, Cicek, 1977- (1)
Hanzo, Lajos (1)
Dán, György (1)
Alabbasi, Abdulrahma ... (1)
Petrova, Marina (1)
Ranjan, Rajiv (1)
Mitra, Karan (1)
Jayaraman, Prem Prak ... (1)
Georgakopoulos, Dimi ... (1)
Kim, Sung Won (1)
Petlund, Andreas (1)
Johansson, Mikael (1)
Soares, Joao (1)
Alodeh, M. (1)
Kalantari, Ashkan (1)
Christopoulos, D. (1)
visa färre...
Lärosäte
Kungliga Tekniska Högskolan (18)
Chalmers tekniska högskola (5)
Luleå tekniska universitet (4)
Karlstads universitet (4)
Linköpings universitet (3)
Lunds universitet (3)
visa fler...
Örebro universitet (2)
Uppsala universitet (1)
Högskolan i Halmstad (1)
Mittuniversitetet (1)
RISE (1)
visa färre...
Språk
Engelska (39)
Forskningsämne (UKÄ/SCB)
Teknik (30)
Naturvetenskap (14)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy