Professional Documents
Culture Documents
3 Digital - Twin - of - Wireless - Systems - Overview - Taxonomy - Challenges - and - Opportunities
3 Digital - Twin - of - Wireless - Systems - Overview - Taxonomy - Challenges - and - Opportunities
Abstract—Future wireless services will focus on improving Index Terms—Digital twin, wireless system, machine learning,
the quality of life by enabling various applications, such as federated learning, virtual modeling.
extended reality, brain-computer interaction, and healthcare.
These applications will have diverse performance requirements
(e.g., user-defined quality of experience metrics, latency, and
I. I NTRODUCTION
reliability) which will be challenging to be fulfilled by exist-
MERGING Internet of Everything (IoE) applications,
ing wireless systems. To meet the diverse requirements of the
emerging applications, the concept of digital twins has been
recently proposed. A digital twin uses a virtual representation
E such as haptics, brain-computer interaction, flying vehi-
cles, and extended reality (XR), among others, will enable a
along with security-related technologies (e.g., blockchain), com-
munication technologies (e.g., 6G), computing technologies (e.g., merger of digital and physical worlds [1], [2], [3], [4]. These
edge computing), and machine learning, so as to enable the IoE applications have widely diverse requirements (e.g., user
smart applications. In this tutorial, we present a comprehensive experience, reliability, and latency). To meet these diverse
overview on digital twins for wireless systems. First, we present requirements, there is a need to assist the wireless systems
the fundamental concepts (i.e., design aspects, high-level archi- by novel technologies. These new technologies will enable
tecture, and frameworks) of digital twins for wireless systems.
Second, a comprehensive taxonomy is devised for two aspects, the wireless systems to meet the diverse requirements via
namely, twins for wireless and wireless for twins. For the twins enabling two main trends: self-configuring wireless systems
for wireless aspect, we consider issues related to design of twin and proactive-online-learning-enabled systems [5]. Generally,
objects, physical devices, and interface, as well as prototyping, wireless systems rely on intelligent, seamless, and ubiquitous
deployment trends, incentive mechanism, isolation of twins, and connectivity for meeting the diverse requirements of end-users.
decoupling. For the wireless for twins aspect, we consider issues
related to accessing twin objects, security and privacy, and air To enable wireless systems with these features, there is a
interface design are considered. Finally, open research challenges need for self-configuring wireless systems. Self-configuring
and opportunities are discussed. wireless systems will offer efficient management of wire-
less systems with minimum possible intervention from the
network operators/end-users. On the other hand, IoE services
have highly dynamic requirements in terms of user-defined
metrics, latency, data rate, and reliability, among others. To
Manuscript received 4 February 2022; revised 18 May 2022; accepted meet these highly dynamic requirements, there is a need to
8 July 2022. Date of publication 11 August 2022; date of current version
22 November 2022. This work was supported in part by the National Research efficiently enable interaction among various entities of wire-
Foundation of Korea (NRF) Grant funded by the Korea Government (Ministry less systems and technologies which include wireless chan-
of Science and ICT: MSIT) under Grant 2020R1A4A1018607; in part by nel resources, security-related technologies (e.g., blockchain),
the Institute of Information and Communications Technology Planning and
Evaluation (IITP) Grant funded by the Korea Government (MSIT, Evolvable computing technologies (e.g., edge computing). Therefore,
Deep Learning Model Generation Platform for Edge Computing) under Grant upon request from the end-users, e.g., for latency-constrained
2019-0-01287; and in part by IITP Grant funded by the Korea Government services (e.g., extended reality), intelligent analytics may need
(MSIT, Artificial Intelligence Innovation Hub) under Grant 2021-0-02068.
(Corresponding author: Choong Seon Hong.) to be performed for efficient resource management. Therefore,
Latif U. Khan and Choong Seon Hong are with the Department of Computer proactive-online learning-based wireless systems will need to
Science and Engineering, Kyung Hee University, Yongin 17104, South Korea be developed.
(e-mail: cshong@khu.ac.kr).
Zhu Han is with the Electrical and Computer Engineering Department and To design a self-configuring and proactive-online-learning-
the Computer Science Department, University of Houston, Houston, TX 77004 enabled wireless system, we can create a digital twin to
USA, and also with the Department of Computer Science and Engineering, represent the wireless system [5]. A digital twin will use a
Kyung Hee University, Seoul 02447, South Korea.
Walid Saad is with the Wireless@VT, Bradley Department of Electrical virtual representation of the physical system to enable IoE
and Computer Engineering, Virginia Tech, Blacksburg, VA 24061 USA, and applications [5], [6], [7]. A digital twin takes inputs from
also with the Department of Computer Science and Engineering, Kyung Hee a real world and makes predictions and/or control decisions.
University, Seoul 02447, South Korea.
Ekram Hossain is with the Department of Electrical and Computer For this, in addition to the virtual representation of a wireless
Engineering, University of Manitoba, Winnipeg, MB R3T 5V6, Canada. system, a digital twin-based wireless system will use tools
Mohsen Guizani is with the Machine Learning Department, Mohamed from optimization theory, game theory, and machine learning.
Bin Zayed University of Artificial Intelligence, Abu Dhabi, UAE (e-mail:
mguizani@ieee.org). Additionally, to enable transparent and immutable handling of
Digital Object Identifier 10.1109/COMST.2022.3198273 data, a digital twin-based system will use blockchain. Note that
1553-877X
c 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
KHAN et al.: DIGITAL TWIN OF WIRELESS SYSTEMS: OVERVIEW, TAXONOMY, CHALLENGES, AND OPPORTUNITIES 2231
a digital twin is different from traditional simulation tools that Sections II-C and III-C). Depending the latency constraints, a
enable us to test systems, processes, and concepts and effects digital twin can be deployed either at the network edge or at
of different system variables using computer-based models the network core. A twin at the network edge can be prefer-
and/or mathematical concepts. A digital twin can use real- ably used for latency-constrained applications, whereas a twin
time (i.e., actual) data generated at the sensors attached to the deployed at the network core can be used for applications that
physical objects and run simulations and analysis for online requires more computing power.
control of wireless systems. The two-way flow of information
between the twin and the sensors can increase the accuracy of
predictive analytical models. A digital twin provides a more A. Market Statistics and Research Trends
general platform for simulations and decision making. The Internet of Things (IoT) market will grow at a
An overview of digital twin-based wireless systems is given Compound Annual Growth Rate (CAGR) of 26.9% during
in Fig. 1. We can divide the twin-based wireless systems archi- the period of 2017-2022 [8]. The market share will grow
tecture into the physical interaction layer and the twin layer. from 170.6 Billion USD in 2017 to 561.0 Billion USD in
The physical interaction layer covers all the physical objects 2022. The main causes of an increase in the IoT market are
(i.e., end-devices, edge/cloud servers, base stations, and core smart buildings, smart grids, smart industries, and intelligent
network elements) necessary for a given wireless system appli- transportation. The key players in the IoT market are General
cation. On the other hand, the twin layer is a logical layer Electric (U.S.), Bosch Software Innovation GmbH (Stuttgart,
that contains logical twin objects. A more detailed discus- Germany), Amazon Web Services Inc. (U.S.), Hewlett-Packard
sion about the creation of twin objects will be provided in Enterprise (U.S.), Google Inc. (U.S.), PTC Inc. (U.S.),
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
2232 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 24, NO. 4, FOURTH QUARTER 2022
TABLE I
S UMMARY OF E XISTING S URVEYS AND T UTORIALS AND T HEIR P RIMARY F OCUS
Fig. 2. Publications count for (a) digital twin and (b) IoT.
B. Existing Surveys and Tutorials
Few surveys and tutorials have reviewed digital
twins [5], [13], [14], [15], [16], [17]. The authors in [13]
International Business Machine (IBM) Corporation (U.S.), focused on digital twins in the context of IoT. They discussed
Oracle Corporation (U.S.), Microsoft Corporation (U.S.), the digital twin concept with architectural elements as well as
Cisco Systems, Inc. (U.S.), SAP SE (Walldorf, Germany), key enablers. Another work [14] surveyed the key technolo-
and Intel Corporation (U.S.). Among different regions (i.e., gies along with the use cases of digital twins toward enabling
Latin America, MEA, APAC, Europe, and North America) IoT applications. Barricelli et al. in [15] presented the key
it is expected that China will lead the IoT market in APAC concepts, applications, and design implications. Furthermore,
region [9]. Globally, the U.S. will have the highest share in they presented few open research challenges. On the other
the IoT market by 2029 [10] and will be followed by China, hand, the works in [16] and [17] focused mainly on the role
Japan, and Germany. of blockchain in enabling digital twins. The authors in [16]
According to statistics of Markets and Markets, the market presented the key benefits of using blockchain for digital
of digital twins will grow at a CAGR rate of 58% during the twins. Additionally, they devised taxonomy and presented
period of 2020-2026 [11]. The market value of digital twin a few open challenges. Suhail et al. in [17] systematically
in 2020 was 3.1 Billion USD and it will reach 48.2 Billion reviewed the role of blockchain in enabling digital twins.
USD by 2026. The key factors in the rise of the digital twin The work in [5] presented the role of the digital twin toward
market include the rise in the demand for manufacturing mon- enabling of 6G wireless system. Additionally, the authors
itoring assets, intelligent analytics-based healthcare systems, provided architectural trends for twin-based wireless systems.
smart warehouses, and intelligent transportation, among oth- Different from the existing surveys and tutorials on digital
ers [11], [12]. Due to the increasing importance of digital twins [5], [13], [14], [15], [16], [17], the goal of our survey
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
KHAN et al.: DIGITAL TWIN OF WIRELESS SYSTEMS: OVERVIEW, TAXONOMY, CHALLENGES, AND OPPORTUNITIES 2233
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
2234 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 24, NO. 4, FOURTH QUARTER 2022
TABLE II
D IGITAL T WIN C ATEGORIES : S OURCE , T YPE , AND E XPLANATION
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
KHAN et al.: DIGITAL TWIN OF WIRELESS SYSTEMS: OVERVIEW, TAXONOMY, CHALLENGES, AND OPPORTUNITIES 2235
C. High-Level Architecture
Fig. 6. Digital twin and wireless system: design aspects and challenges. A high-level architecture of a digital twin for wire-
less systems based on logical twin objects is shown in
Fig. 7 [5], [14], [30]. The architecture can be divided into
virtual model. After virtual modeling, the virtual design needs three layers, such as the physical devices interaction layer, the
to be verified by simulating the virtual model and comparing twin objects layer, and the services layer. The services layer
the performance with the physical system. In this phase, the contains interfaces for applications. One can request a service
virtual model may need o be modified to make it as close as from a twin-based wireless system. In response to the user
possible to the physical system. The final phase is the opera- request, semantic reasoning schemes are used to translate the
tion phase that involves controlling the real-time system using request, which is then passed to the twin layer. The twin layer
a digital twin. contains logical twin objects which use a virtual representation
of the physical object/ phenomenon. For a digital twin, there
B. Design Aspects can be different models for the physical objects/ phenomenon,
We consider both of the following aspects: (a) twins for such as mathematical model, 3D model, and data-driven
wireless and (b) wireless for twins, as shown in Fig. 6. model [31], [32]. Representing a physical object using a math-
The former deals with the design of twins to enable vari- ematical model needs several assumptions [33]. Another way
ous network functions/ applications. On the other hand, the can be to use 3D modeling. However, both mathematical and
latter deals with efficient communication methods to enable 3D models (e.g., 3D content in AR) may not accurately model
signaling for implementation of twins. A twin-enabled wireless the physical model/ phenomenon. To address these limitations,
network will have a variety of players to enable the success- data-driven models based on machine learning can be used to
ful operation of IoE services. These players are blockchain effectively model the physical objects [34], [35], [36], [37].
networks, edge/cloud servers, data decoupling interfaces, func- Note that the twin layer objects can be implemented using con-
tion decoupling interfaces, and physical devices. Furthermore, tainer/s or virtual machine/s [5], [38]. Also, twin objects can
the requirements of various IoE applications can be signifi- be deployed either at the network edge or at the remote cloud.
cantly diverse. Implementing a twin object at the remote cloud can offer more
Wireless resources can be used in twinning mainly for computing power but at the cost of high latency [39], [40]. On
two operations: (a) training of twin objects and (b) sig- the other hand, twin objects deployed at the network edge
naling for twin operation. Twins training will use wireless can have low computing power [41], [42]. The last layer
resources to transfer data and learning updates. For central- is the devices’ physical interaction layer, which contains all
ized learning, a wireless channel is used to migrate the data the physical devices, such as end-devices, edge/cloud servers,
from end-devices to the shared storage (i.e., servers installed base stations, miners, and core network switches, among oth-
at the edge/cloud). However, some practical scenarios (e.g., ers. Effective interfaces are required between different layers
autonomous driving cars) frequently generate a significant of in a twin-based wireless system. These interfaces can be
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
2236 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 24, NO. 4, FOURTH QUARTER 2022
twin-to-physical object interface, twin-to-twin interface, and be used for this [44], [45], [46]. A digital twin can be used
twin-to-service interface. for predictive maintenance of 6G systems to avoid system
For a digital-twin-enabled wireless system, there are two malfunctions and cyber-attacks through artificial intelligence
aspects of reliability: twin reliability and twin-based service analytics and simulation. The summary of the steps for a
reliability [43]. Twin reliability refers to the operation of a twin-based wireless system operation is as follows.
twin with minimum possible interruption due to the failure • First of all, the end-user will request a service. This
of the edge/cloud server running the twin object. An IoT request will be translated using semantic reasoning
service based on a single twin deployed at the cloud has schemes to make it compatible with the twin object-based
lower reliability than an IoT service based on multiple twin architecture.
objects deployed at edge servers. However, the management of • Next, the twin object will be created to serve the end-user.
multiple twins for a certain service will incur more complexity. • Finally, the twin object uses mathematical optimization
Additionally, to ensure a reliable twin signaling in presence and machine learning schemes in addition to virtual rep-
of wireless channel fading and interference, channel coding resentation to enable efficient resource optimization for
schemes (e.g., URLLC codes) and other techniques such as various services. The twin objects will use pre-trained
multi-connectivity, packet duplication may need to be used. twin model to serve the requesting user. Meanwhile,
On the other hand, twin service reliability mainly depends on the newly generated data may be used by twin object
wireless channel reliability and reliability of edge/cloud com- to further train the pre-trained model for performance
puting. Similar to twin signaling, channel coding schemes can enhancement. After training, the twin model will be
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
KHAN et al.: DIGITAL TWIN OF WIRELESS SYSTEMS: OVERVIEW, TAXONOMY, CHALLENGES, AND OPPORTUNITIES 2237
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
2238 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 24, NO. 4, FOURTH QUARTER 2022
III. TAXONOMY: T WINS FOR W IRELESS players that act in a complex environment. To classify the
For twin-based wireless systems, both aspects (i.e., “twins areas for study related to both aspects, in Fig. 8, we devise a
for wireless” and “wireless for twins”) involve a variety of taxonomy. The taxonomy is divided into two layers, namely,
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
KHAN et al.: DIGITAL TWIN OF WIRELESS SYSTEMS: OVERVIEW, TAXONOMY, CHALLENGES, AND OPPORTUNITIES 2239
the physical interaction layer and the twin layer. The main primary challenges in digital twinning over wireless networks.
aspects related to designing twins for wireless systems are Physical objects are characterized by a set of attributes (e.g.,
identified to be: twin isolation, incentive design, twin object shape, mass, energy). These attributes are difficult to model
design, twin object prototyping, twin object deployment, phys- exactly [58]. In experimental modeling, a series of experiments
ical end-device design, decoupling, and interface design. A are performed to find out the various parameters of a physical
digital twin-based wireless system will use the shared physical wireless system [59]. Various entities of a wireless system
resources (e.g., edge servers, end-devices) for various services. can be modeled using experimental data. For instance, the
Therefore, there must be twin isolation to enable the seamless work in [59] modeled the free-space path-loss for intelligent
operation of twins for various services without interrupting reflecting surfaces using a series of experiments. Alternatively,
the performance of each other. Next, twin object design helps mathematical modeling can be used that is based on a math-
in the on-demand creation of twins using existing computing ematical representation of a wireless phenomenon. Typical
hardware for various applications, whereas twin object proto- mathematical models are based on various assumptions that
typing helps in the creation of virtual models of the wireless need to be valid for a real-life scenario so that a more practical
systems. Twin object deployment is about the placement (e.g., model of the digital twin can be developed.
cloud or edge) of twin objects. Decoupling allows the seamless There are some scenarios which are difficult to model math-
operation of the twin-based services with minimum possible ematically [33]. In these scenarios, data-driven modeling can
dependency on the underlying hardware. On the other hand, be used. Wireless system applications (e.g., XR) can generate
interfaces are used for various types of communications, such a significant amount of data that can be used in modeling their
as those among twin objects, and those between twin objects behavior [38]. One can use the data to train machine learning
and physical devices. To motivate the participation of different models. However, training of a machine learning model within
devices in twinning, incentive mechanisms will be required. a certain period of time for a certain data set may require
a significant amount of computing resource (CPU-cycle/sec).
A. Design of Twin Objects An increase in computing resources will minimize the training
time but at the cost of an increased energy consumption.
Twin objects are instantiated upon request from the end-
There are two types of machine learning models, namely,
users. Therefore, there must be an efficient way to deploy on-
centralized machine and distributed machine learning models.
demand twin objects at the edge/cloud. There are two ways to
Centralized machine learning relies on centralized training at
instantiate the twin objects, such as virtual machine-based twin
the remote cloud or edge server. With centralized machine
objects and container-based twin objects [38], [41]. A virtual
learning, there is an issue of privacy leakage because of trans-
machine can be defined as the architecture that is independent
ferring end-devices’ data to the centralized cloud/edge server.
of the underlying hardware. Virtual machines can be mainly of
To mitigate this problem, distributed machine learning can be
two types, such as system virtual machine and process virtual
used, in which case the end-devices iteratively train the global
machine [52]. In the context of a twin-based wireless system,
model using their local data sets. The local model updates are
the system virtual machine can be used to model a complete
then sent to the edge/cloud server for aggregation to yield a
IoT service (e.g., AR-based healthcare system), whereas the
global model.
process virtual machine can be used to model the particular
portion (e.g., edge caching [53] module for smart infotainment
system) of digital twin-based system. Modeling a complete C. Deployment Approaches for Twins
system may be easier than modeling a particular part.
Depending on the application requirements, twins can be
Note that the virtual machine is different from the oper-
mainly deployed either at the network edge or cloud. Every
ating system. In an operating system, language-independent
application has distinct requirements in terms of latency,
extensions of hardware are created, whereas a virtual
quality of physical experience, computing resource require-
machine creates a machine-independent instruction set. Virtual
ment, and reliability, among others. Twins deployed at the
machine-based virtualization can be seen as an infrastructure-
network edge can enable services with low latency compared
as-a-service (IaaS) that can enable the same hardware via
to those deployed at the cloud. Also, the twins at the edge can
virtualization for running multiple operating systems (e.g.,
have more context awareness (e.g., locations of end-devices,
twins). This operational approach has the main drawback of
mobility-awareness). However, the edge-based twins have lim-
high management complexity. To address this issue, container-
itations in terms of low computing resources. When deployed
based twin objects can be used. Containers can help minimize
in the cloud, there could be more computing resources.
management complexity by running multiple twins on the
To benefit from both edge-based twins and cloud-based
same operating system [54], [55]. However, container-based
twins, a hybrid approach can be used in which twins are
twin objects may be more prone to security attacks than the
deployed at both network edge and cloud. For instance,
virtual machine-based design [56], [57].
consider the digital-twin-enabled infotainment system for
autonomous cars. One can use caching assisted by a hybrid
B. Prototyping of Twin Objects twin that consists of two twins deployed at both the network
Prototyping twin objects involves estimating the parame- edge and the cloud. The edge twin will make the caching
ters of virtual twin models for the physical system coun- decisions for infotainment users where latency is stringent.
terparts. True prototyping of twin objects is one of the Meanwhile, due to limited storage capacity at the edge, one
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
2240 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 24, NO. 4, FOURTH QUARTER 2022
TABLE III
C OMPARISON A MONG T WIN O BJECT D EPLOYMENT M ETHODS [5]
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
KHAN et al.: DIGITAL TWIN OF WIRELESS SYSTEMS: OVERVIEW, TAXONOMY, CHALLENGES, AND OPPORTUNITIES 2241
Fig. 10. Overview of incentive mechanisms for digital twin-based wireless systems.
end-users and the system. The interface can be of various and can be used in the future to serve the requesting users.
types, such as voice interface (e.g., Amazon Echo), touch Upon request from end-users, the twin-based system serves
interface (e.g., smartphone), and physical button interface [69]. the end-users by controlling the network entities for efficient
These interfaces enable users to interact with the twin-based management of resources. To do so, there must be incentives
system. For instance, smartphones use iOS, Samsung One UI, for various entities. Incentive mechanism design for digital
OxygenOS, Android One, and Indus OS [70]. For a smart- twin-based wireless systems will include the following cases:
phone, one can use any of the aforementioned interfaces of incentive mechanism design for pre-training of twin models,
operating systems. However, for applications based on dig- incentive mechanism design for blockchain mining, and incen-
ital twins, new interfaces may be required because of their tive mechanism design for SDN switches operators, as shown
different architecture from the existing ones. in Fig. 10. In these cases, the players involved are end-devices,
aggregation servers, edge/cloud servers running twin objects,
and blockchain miners used for storing pre-trained models and
F. Incentive Mechanism training data.
To motivate the participation of a variety of players in When using distributed learning for digital twins, end-
enabling digital twin-based wireless systems, there must be devices participate in learning local models [74]. Moreover,
attractive incentive mechanisms. Here, we consider the high- edge/cloud servers run twin objects and also assist (i.e., aggre-
level architecture of digital twin-enabled wireless systems gate local models) distributed learning. Therefore, there is a
(Fig. 7) presented in Section II-C. The different types of incen- need to give end-devices rewards for performing their jobs.
tives required in digital twin-enabled wireless systems are For distributed learning-based twins, the edge/cloud servers
presented in Fig. 10. As described in Section II-C, a digital will interact with the end-devices for learning a global model.
twin-based wireless system can use distributed learning to train End-devices perform model updates locally and the edge/cloud
twin models. These pre-trained twin models are stored using a server performs aggregation of the end-devices’ local model
blockchain network in an immutable and transparent manner, updates to yield a global model. The global model is then
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
2242 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 24, NO. 4, FOURTH QUARTER 2022
TABLE IV
I NCENTIVE M ECHANISMS FOR F EDERATED L EARNING [62]
shared with the end-devices. Such an iterative process takes for storage to store pre-trained twin models for various appli-
place until convergence is achieved. One can design an incen- cations. Additionally, sufficient communication resources are
tive mechanism for such a scenario by defining a utility at required for the signaling of twin instructions. There can be
the edge/cloud server. The utility of edge/cloud servers can mainly two ways of enabling twins: using dedicated hardware,
be to maximize the global model accuracy. Meanwhile, the and using shared hardware. Isolated operation of twin-based
end-devices (i.e., used for running the local learning model) applications is required for shared hardware-based operations.
with high local accuracy can be given more monetary rewards. Isolation in digital twin-enabled wireless systems can be
Various works proposed incentive mechanism design for dis- divided into twin object isolation, core network isolation, and
tributed learning using Stackelberg game, auction theory, and access network isolation [81], [82]. Radio access network
contract theory [62]. An overview of these incentive mech- isolation refers to using the same access network for vari-
anisms is given in Table IV. Additionally, details about the ous twins without affecting the performance of other twins.
incentive model approach, motivation, device utilities, and Access network isolation can be achieved using radio resource
aggregation server utilities are given. virtualization (i.e., slicing) [83], [84], [85]. In resource vir-
In digital twin-based architecture, pre-trained twin models tualization, a mobile virtual network operator (MVNO) will
must be stored using blockchain for future use [5]. Miners buy radio resources from multiple network operators and
used for performing blockchain consensus algorithms and stor- then sell the resources to various twins based on their
age must be given attractive incentives [75]. In [75], a Fee requirements. A twin can also buy resources from multiple
and Waiting Tax scheme was proposed to provide miners with MVNOs. The interactions between the MVNOs and the
incentives for mining and storage of the generated blockchain twins can be modeled, analyzed, and optimized based on
blocks. With the existing blockchain protocols, selecting a heuristic schemes [76], deep reinforcement learning-based
transaction by a certain miner will impose storage cost on schemes [77], game-theoretic schemes including matching
other miners and a user’s high rate of transaction generation game-based schemes [78], [79], [80].
may increase the waiting time for other users. The Fee and Similar to radio access network isolation, in theory, core
Waiting Tax scheme offers a set of fee-per-byte choices for network isolation can also be achieved through service
users while ensuring the miners get sufficient fees for their differentiation or end-to-end resource reservation schemes.
work. Also, it charges a waiting tax on users proportional to However, with the current IP technology, it would be more
their negative impact on other users. This incentivizes the users challenging to achieve efficient isolation. On the other hand,
to become more conservative while generating transactions. twin object isolation can be performed using shared computing
hardware (e.g., cloud) for multiple virtual machines running
twin objects. Isolation of such twin objects is necessary for
G. Isolation of Twins improving performance and reducing the chance of security
Twin isolation deals with the operation of a twin- attacks [86], [87]. For instance, if the twin objects are not
based application (e.g., extended reality) without affect- well isolated, then the security attack instantiated within a twin
ing the performance of other twin-based applications (e.g., object can easily affect other twin objects.
brain-computer interaction). Note that twinning for various
applications can be performed simultaneously using shared
physical resources. Therefore, the twins for different applica- H. Decoupling
tions should be designed (i.e., isolated) such that they meet the Twinning of wireless networks for various applications
quality of service without interrupting the operation of each requires successful and efficient interaction between the twin
other. The operation of various twins for different applications layer and physical interaction layer. For such an efficient
requires computing, storage, and communication resources. interaction, decoupling is necessary. Decoupling in digital
The computing resources are used for performing blockchain twin-enabled wireless systems can be of two types, such as
mining as mentioned in architecture (for more details, please function decoupling and data decoupling [5]. Data decoupling
refer to Fig. 7) in Section II-C. Meanwhile, there is a need can be performed using data homogenization techniques. This
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
KHAN et al.: DIGITAL TWIN OF WIRELESS SYSTEMS: OVERVIEW, TAXONOMY, CHALLENGES, AND OPPORTUNITIES 2243
TABLE V
V IRTUALIZATION S CHEMES FOR R ADIO ACCESS N ETWORKS
will enable the twin-based system design to be independent of dedicated hardware for better performance. Controlling SDN-
the underlying network smart devices. The layered architec- based devices using a single centralized controller may suffer
ture of twin-based wireless system is discussed in Section II-C. from low scalability and low reliability. An increase in the
Fig. 7 shows that there will be a variety of smart devices (e.g., number of devices will increase the signaling between SDN-
temperature sensors, image sensors) at the physical interaction based devices and the centralized controller. To address this
layer. To transform this data into homogenized data, an effi- limitation, a distributed control plane, that consists of multiple
cient data homogenization technique will need to be used. On SDN controllers [102], [103] can be used. However, using
the other hand, functions decoupling enables the twin-based multiple controllers will lead to an increase in control plane
system to decouple the management functions from the physi- management complexity. To reap the advantages of both cen-
cal interaction layer to the twin layer. Function decoupling can tralized control and distributed control planes, a hybrid control
be implemented by network slicing that is based on software- plane approach can be used, which will use both centralized
defined networking (SDN) and network function virtualization and distributed controllers [104], [105]. In the hybrid control
(NFV) [88], [89], [90], [91], [92], [93]. NFV is based on plane, the main controller controls the local controllers. Each
implementing various network functions using generic hard- local controller controls its small set of devices. All the func-
ware. To implement the physical devices using the NFV-based tions that are local to the devices are handled by the local
approach, there may be few limitations, such as through- controller, whereas the functions that require global network
put and latency deterioration [91]. The per-instance capacity knowledge are controlled by the main controller. An overview
of the NFV-based device may not be similar to the actual of the centralized, distributed, and hybrid control planes is
physical device. Other challenges faced by NFV-based design given in Fig. 11. Meanwhile, a tabular comparison is given in
are reliability and security issues. Multiple NFVs for various Table VI.
network functions running on the same hardware might result
in failure due to a physical damage/ security attack [94]. To
address this issue, the NFV can be migrated to a new device.
However, migration may introduce a delay that is undesirable I. Lessons Learned and Recommendations
in many IoE/IoT applications [95], [96], [97]. Additionally, We have devised a taxonomy of “twins for wireless”, which
mobility of the end-devices also requires the migration of considers twin isolation, incentive design, twin object design,
NFV-based functions to the new network edge. To enable twin object prototyping, twin object deployment options, phys-
such migration, we can use machine learning-based mobility ical design of end-devices, decoupling, and interface design.
prediction schemes to proactively determine the next loca- The lessons learned are as follows.
tion [38]. On the other hand, security must be ensured for • There is a need to consider hardware and software
the NFV-based functions running on the cloud. In a typical co-design for the end-devices. For example, hardware
SDN control plane, a single centralized controller is used designs for different neural network architectures can be
to control multiple switches for performing various func- considered along with the learning algorithm.
tions (e.g., routing) [98], [99], [100], [101]. These switches • Efficient deployment of twin objects (at the network edge
intended to control wireless system devices can be installed on and/or cloud) is critical. Analysis and optimization of
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
2244 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 24, NO. 4, FOURTH QUARTER 2022
Fig. 11. Twin function decoupling using (a) centralized controller, (b) distributed controllers, and (c) hybrid controllers.
TABLE VI
C OMPARISON A MONG T WIN F UNCTION D ECOUPLING M ETHODS Accessing the twin objects relates to association between twins
and physical devices. Finally, there must be effective security
and privacy mechanism for twin-based wireless systems.
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
KHAN et al.: DIGITAL TWIN OF WIRELESS SYSTEMS: OVERVIEW, TAXONOMY, CHALLENGES, AND OPPORTUNITIES 2245
the learning model updates between the end-devices and In a centralized learning scenario, there may be a loss of
the aggregation server. Wireless resource allocation prob- privacy during training of the twin models. To mitigate this
lems can be solved by using heuristic algorithms [28], problem, twin models can be trained in a distributed man-
relaxation-based schemes [113], and matching theory-based ner, which is based on-device training. Although end-devices
schemes [114], [115], [116]. For twin signaling, wireless do not send their data to the remote cloud/edge server for
resources are required for the transfer of control signals (e.g., training, they still require privacy preservation techniques. A
signaling to/from SDN controllers). Also, blockchain min- malicious aggregation server can infer the end-devices’ sensi-
ers will use wireless resources for sharing blocks during the tive information using their local learning model updates, and
consensus algorithm. Additionally, computing resources are thus result in privacy leakage [62], [74], [119]. To address this
required for twin processing tasks, e.g., for running machine issue, schemes based on differential privacy and homomorphic
learning models at edge/cloud, blockchain consensus algo- encryption can be used. In differential privacy, noise is added
rithms, and analysis of the virtual twin model prior to applying to the local learning model updates prior to sending them to the
for real-time applications. aggregation server. Although differential privacy can enhance
privacy preservation, it can slow down the convergence rate of
global learning [60]. To avoid this, homomorphic encryption
B. Security and Privacy can be used, which is based on encrypting the local learning
An overview of various security attacks along with their models prior to sending them to the aggregation server. Similar
possible solutions for digital twin-based wireless systems is to differential privacy, homomorphic encryption works at the
given in Fig. 12. The security attacks in digital twins-based cost of communication overhead [74]. Other than differential
wireless systems can be categorized into two types, namely, privacy and homomorphic encryption, few works [120], [121],
physical device security [38] and interface security. Effective [122] proposed over-the-air computation. In over-the-air com-
authentication schemes are required to avoid unauthorized putation, the channel noise is considered a differential privacy
access to devices, edge/cloud servers, and blockchains. In an noise for preserving the distributed learning privacy. On the
SDN-based architecture, the security threats include vulner- other hand, the work in [74] proposed a dispersed federated
ability of network controllers, forged control packet injec- learning scheme that is based on computing sub-global models
tion, misconfigured policy enforcement, and weak network within groups, as shown in Fig. 13. The computation of the
devices authentication [117]. Misconfigured interfaces (e.g., sub-global model is performed iteratively. Then, the sub-global
twin-to-twin interface) and protocols (twin packet routing pro- models are shared among each other, and finally, the global
tocols) result in various security vulnerabilities [118]. Weak or model is computed. Note that dispersed federated learning
improper authentication schemes and plain text channels may offers enhanced privacy protection compared to traditional fed-
lead to security attacks. erated learning. In traditional federated learning, a malicious
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
2246 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 24, NO. 4, FOURTH QUARTER 2022
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
KHAN et al.: DIGITAL TWIN OF WIRELESS SYSTEMS: OVERVIEW, TAXONOMY, CHALLENGES, AND OPPORTUNITIES 2247
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
2248 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 24, NO. 4, FOURTH QUARTER 2022
this, twin machine learning models can be trained using a D. Incentive Mechanisms for Twinning
more general data set (e.g., ImageNet data set) to enable its How to motivate various players of a twin-based wireless
applicability to different services/applications (e.g., classifica- system for successful and effective operation? In digital twin-
tion task for mini-ImageNet data set). Also, the concept of ning, a variety of players, such as edge/cloud servers, miners,
meta-learning can be used to train them efficiently. Such a end-devices, and network operators, interact with each other to
general dynamic twin model can be based on either central- enable wireless services. These players interact to perform var-
ized machine learning or distributed machine learning (e.g., ious tasks, such as pretraining of twin models, twin operation,
federated learning). However, training a twin machine learn- and mining for management of twin pre-trained models. For
ing model for general data might not perform well for some pretraining of twin models using distributed machine learn-
scenarios [133], [134]. ing, there will be two main players, namely, end-devices and
edge/cloud servers. End-devices compute their local model and
expect incentives for their contributions toward learning of a
B. Interoperability for Migration of Twin Objects
global model. To model and design an incentive for such a
How to enable a seamless operation of end-devices served scenario, for example, a Stackelberg game model with a sin-
by edge-based twin objects? Mostly, end-devices in wire- gle leader and multiple followers can be used. The edge/cloud
less systems are mobile. For instance, one device connected server will act as a leader and devices will follow it. The
to a small cell base station (equipped with an edge server utility of the edge/cloud server can be a function of global
running twin objects) may move to the coverage area of accuracy of the machine learning model and the end-devices’
another base station. There can be two ways to serve the utility can be the difference between cost (i.e., communica-
mobile device. One can be to connect to the existing edge tion and computation) and reward [71]. Furthermore, contract
server through the core network via the newly associated theory and auction theory can be used to design incentives for
base station. However, this approach will suffer from latency pretraining of twin models [72], [73].
that might not be desirable due to strict latency constraints
of some of the IoE applications. To address this issue, the E. Twinning Forensics and Security
twin object can be migrated to the newly associated small
cell base station. Twin objects based on virtual machines How to investigate and take measures to counter the secu-
can be migrated dynamically depending on the location of rity attacks in a digital twin-enabled wireless system? Digital
mobile devices [135]. Note that, transferring a virtual machine twin-based wireless systems will involve a wide variety of
from one edge/cloud server to another may face interoperabil- entities, such as edge/cloud computing servers, end-devices,
ity issues. Two edge/cloud servers must be interoperable to various interfaces (e.g., twin to device and twin to twin), and
ease migration of virtual machines running twin objects to twin objects, among others. They are prone to various kinds of
tackle the mobility of end-devices. To enable easier migra- new attacks (e.g., twin object attacks and twin to twin interface
tion, a common architecture can be used such as unified attacks) in addition to existing attacks (e.g., a man in the mid-
cloud interface/cloud broker, enterprise cloud Orchestration dle attack). Therefore, effective forensic schemes need to be
platform/orchestration layer, and open cloud computing used to enable the successful operation of twin-based wireless
interface [136]. systems. Forensic techniques for a digital twin-based system
can be blockchain-based forensics schemes [137] and video-
based evidence analysis [138]. On the other hand, there may
C. Prototyping of Physical Objects be challenges in implementing forensics schemes due to the
How to prototype the physical object attributes (e.g., fea- mobility of nodes. To address this issue, mobility-aware foren-
tures, data, actions, and events) into twin objects for various sics schemes can be used. Security schemes for the edge/cloud
applications? For twin modeling, it is necessary to estimate servers running the twin objects could be different from those
the measurable aspects of the physical objects. However, it (e.g., encryption/decryption schemes) used for twin signaling.
is challenging to accurately measure the aspects of a physi-
cal system. During modeling of a physical object, to reduce F. Efficient Chaining of Twin Objects
the complexity, we can focus on a limited set of parame- How to chain various twins to enable efficient operation of
ters. Various modeling schemes are experimental modeling, wireless system functions? Generally, designing a twin object
three-dimensional modeling, and data-driven modeling [31]. requires extensive efforts and time. For instance, twin-based
Experimental modeling involves full-scale experimentation of AR service may require multiple twin objects deployed at
a physical phenomenon. In three-dimensional modeling, the network edge. It may be more efficient to reuse the existing
goal is to develop mathematical models of physical objects twins to enable a complete twin-based AR service. However,
using various techniques (e.g., 3D scanning). However, exact combining multiple twins for enabling a service may incur
representation using a mathematical model is challenging. On communication and computing cost. Similar twin objects run-
the other hand, data-driven modeling uses data for deriving the ning at edge and cloud server can have different latencies. The
functional form of physical objects. Machine learning can be available computing power can also be different depending on
used to model physical objects using data. However, proper the location of twin objects. These factors need to be taken
selection and training of a machine learning model can be into consideration while chaining twin objects for a certain
challenging. service/function.
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
KHAN et al.: DIGITAL TWIN OF WIRELESS SYSTEMS: OVERVIEW, TAXONOMY, CHALLENGES, AND OPPORTUNITIES 2249
TABLE IX
S UMMARY OF THE O PEN R ESEARCH C HALLENGES AND S OLUTION G UIDELINES
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
2250 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 24, NO. 4, FOURTH QUARTER 2022
upper bound minimization (BSUM) or deep reinforcement [4] M. Ge, H. Bangui, and B. Buhnova, “Big data for Internet of Things:
learning [74], [140], [141]. A survey,” Future Gener. Comput. Syst., vol. 87, pp. 601–614, Oct.
2018.
[5] L. U. Khan, W. Saad, D. Niyato, Z. Han, and C. S. Hong, “Digital-
H. Hardware-Software Co-Design of Devices twin-enabled 6G: Vision, architectural trends, and future directions,”
IEEE Commun. Mag., vol. 60, no. 1, pp. 74–80, Jan. 2022.
For a digital twin of a wireless system, how to efficiently [6] F. Tao, H. Zhang, A. Liu, and A. Y. C. Nee, “Digital twin in indus-
design devices of physical interaction space? Designing of try: State-of-the-art,” IEEE Trans. Ind. Informat., vol. 15, no. 4,
physical interaction space has two main aspects, namely, hard- pp. 2405–2415, Apr. 2019.
[7] S. Haag and R. Anderl, “Digital twin—Proof of concept,” Manuf. Lett.,
ware design and software design. For improved performance, vol. 15, pp. 64–66, Jan. 2018.
there is a need to consider hardware-software co-design. Such [8] “Internet of Things Market.” Markets and Markets. Sep. 2021.
a design can be obtained by using methods such as vir- [Online]. Available: https://www.marketsandmarkets.com/Market-
Reports/internet-of-things-market-573.html
tual prototyping, co-verification-based embedded systems, and [9] “Spending on Internet of Things (IoT) in Selected Countries of
high-level synthesis [38]. A virtual prototyping-based design the Asia-Pacific Region in 2019.” Statistica. Sep. 2021. [Online].
uses computing automated design, computer-aided design, and Available: https://www.statista.com/statistics/1037118/apac-internet-of-
things-spending-by-country/
computer-aided engineering before implementing the devices. [10] “IoT Spending Worldwide 2019, by Country.” Sep. 2021. [Online].
A high-level synthesis design uses algorithmic description to Available: https://www.statista.com/statistics/1118256/iot-spending-
create automated digital hardware. With co-verification-based worldwide-by-country/
[11] “Digital TWin Market.” Markets and Markets. Sep. 2021.
design, testing and debugging of both hardware and software [Online]. Available: https://www.marketsandmarkets.com/Market-
are performed at the same time during the design. Reports/digital-twin-market-225269522.html?
[12] “Global Digital Twin Market.” Sep. 2021. [Online]. Available:
https://www.marketsandmarkets.com/Market-Reports/digital-twin-
VI. C ONCLUSION market-225269522.html?
We have presented a comprehensive tutorial on digital twins [13] R. Minerva, G. M. Lee, and N. Crespi, “Digital twin in the IoT context:
A survey on technical features, scenarios, and architectural models,”
and wireless systems. We have presented the key design Proc. IEEE, vol. 108, no. 10, pp. 1785–1824, Oct. 2020.
aspects and a high-level framework for digital-twin-based [14] Y. Wu, K. Zhang, and Y. Zhang, “Digital twin networks: A survey,”
wireless systems. Also, we have outlined currently available IEEE Internet Things J., vol. 8, no. 18, pp. 13789–13804, Sep. 2021.
[15] B. R. Barricelli, E. Casiraghi, and D. Fogli, “A survey on digital twin:
digital twinning frameworks. Additionally, a comprehensive Definitions, characteristics, applications, and design implications,”
taxonomy has been devised using various parameters. Finally, IEEE Access, vol. 7, pp. 167653–167671, 2019.
we have presented several open research challenges and pos- [16] I. Yaqoob, K. Salah, M. Uddin, R. Jayaraman, M. Omar, and M. Imran,
“Blockchain for digital twins: Recent advances and future research
sible solutions. The integration of digital twins and wireless challenges,” IEEE Netw., vol. 34, no. 5, pp. 290–298, Sep./Oct. 2020.
systems will enable advanced IoE applications. Digital twin- [17] S. Suhail et al., “Blockchain-based digital twins: Research trends,
ning will enable wireless systems to proactively manage issues, and future challenges,” ACM Comput. Surveys, to be published.
[18] “Digital Twins are Mission Critical.” [Online]. Available: https://www.
the network resources for strict latency applications (e.g., ge.com/digital/applications/digital-twin (Accessed: May 16, 2021).
XR). Furthermore, the reusability of generalized digital twins [19] “What is Digital Twin?” 2021. [Online]. Available: https://www.twi-
will make them attractive for use in many new emerging global.com/technical-knowledge/faqs/what-is-digital-twin
[20] “Compare Simulation & CAE Software.” 2021. [Online]. Available:
applications. https://www.g2.com/categories/simulation-cae
Digital twins are expected to be one of the most promising [21] “Best Digital Twin Software.” Jun. 2021. [Online]. Available:
technology for 6G and beyond wireless systems. 6G services https://www.g2.com/categories/digital-twin
[22] “The History and Creation of the Digital Twin Concept.” Jun.
will have diverse requirements for novel applications (e.g., 2021. [Online]. Available: https://www.challenge.org/insights/digital-
human-computer interaction, XR). These requirements include twin-history/
user-defined quality of physical experiences, extremely low [23] “Digital Twins.” Siemens. May 2021. [Online]. Available: https://www.
plm.automation.siemens.com/global/en/our-story/glossary/digital-twin/
latency, and ultra-reliability, among others. Enabling a wireless 24465#
system to meet the aforementioned requirements needs proac- [24] “Digital Twins: The Ultimate Guide.” XMPRO. May 2021. [Online].
tive analysis and machine learning-based schemes. The digital Available: https://xmpro.com/digital-twins-the-ultimate-guide//
[25] “How to Make a Digital Twin: The Options, Types and Outputs.”
twin will enable us to proactively analyze the system and train Vercator. 2021. [Online]. Available: https://info.vercator.com/blog/how-
effective machine learning models. The pre-trained machine to-make-a-digital-twin-the-options-types-and-outputs
learning models at the digital twin will enable the wireless [26] “The Digital Twin—An Introduction.” Vercator. 2021. [Online].
Available: https://www.tributech.io/blog/the-digital-twin
system to make on-demand decisions for different wireless [27] M. Chen, Z. Yang, W. Saad, C. Yin, H. V. Poor, and S. Cui, “A joint
services and applications. Furthermore, the pre-trained twin learning and communications framework for federated learning over
models can be further trained to more effectively incorporate wireless networks,” IEEE Trans. Wireless Commun., vol. 20, no. 1,
pp. 269–283, Jan. 2021.
the newly generated data. [28] L. U. Khan, M. Alsenwi, Z. Han, and C. S. Hong, “Self organizing
federated learning over wireless networks: A socially aware clustering
R EFERENCES approach,” in Proc. Int. Conf. Inf. Netw. (ICOIN), 2020, pp. 453–458.
[29] Z. Han, D. Niyato, W. Saad, T. Başar, and A. Hjørungnes, Game
[1] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and Theory in Wireless and Communication Networks: Theory, Models, and
M. Ayyash, “Internet of Things: A survey on enabling technologies, Applications. Cambridge, U.K.: Cambridge Univ. Press, 2012.
protocols, and applications,” IEEE Commun. Surveys Tuts., vol. 17, [30] F. Pires, A. Cachada, J. Barbosa, A. P. Moreira, and P. Leitão, “Digital
no. 4, pp. 2347–2376, 4th Quart., 2015. twin in industry 4.0: Technologies, applications and challenges,” in
[2] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Proc. IEEE 17th Int. Conf. Ind. Inform. (INDIN), vol. 1, Jan. 2019,
Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct. 2010. pp. 721–726.
[3] S. Li, L. Da Xu, and S. Zhao, “5G Internet of Things: A survey,” J. [31] A. Rasheed, O. San, and T. Kvamsdal, “Digital twin: Values, challenges
Ind. Inf. Integr., vol. 10, pp. 1–9, Jun. 2018. and enablers,” 2019, arXiv:1910.01719.
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
KHAN et al.: DIGITAL TWIN OF WIRELESS SYSTEMS: OVERVIEW, TAXONOMY, CHALLENGES, AND OPPORTUNITIES 2251
[32] H. Elayan, M. Aloqaily, and M. Guizani, “Digital twin for intelligent [56] “What is Container Security and How to Secure Containers?”
context-aware IoT Healthcare systems,” IEEE Internet Things J., vol. 8, Nov. 2022. [Online]. Available: https://www.decipherzone.com/blog-
no. 23, pp. 16749–16757, Dec. 2021. detail/what-why-how-container-security
[33] S. Ali et al., “6G white paper on machine learning in wireless [57] “Containers vs. Virtual Machines.” Nov. 2022. [Online]. Available:
communication networks,” 2020, arXiv:2004.13875. https://www.atlassian.com/microservices/cloud-computing/containers-
[34] D. P. Kumar, T. Amgoth, and C. S. R. Annavarapu, “Machine learning vs-vms#
algorithms for wireless sensor networks: A survey,” Inf. Fusion, vol. 49, [58] A. S. Khan and F. U. Khan, “A survey of wearable energy harvesting
pp. 1–25, Sep. 2019. systems,” Int. J. Energy Res., vol. 46, no. 3, pp. 2277–2329, 2022.
[35] J. Jagannath, N. Polosky, A. Jagannath, F. Restuccia, and T. Melodia, [59] W. Tang et al., “Wireless communications with reconfigurable intelli-
“Machine learning for wireless communications in the Internet of gent surface: Path loss modeling and experimental measurement,” IEEE
Things: A comprehensive survey,” Ad Hoc Netw., vol. 93, Oct. 2019, Trans. Wireless Commun., vol. 20, no. 1, pp. 421–439, Jan. 2021.
Art. no. 101913. [60] L. U. Khan et al., “Federated learning for edge networks: Resource
[36] M. S. Mahdavinejad, M. Rezvan, M. Barekatain, P. Adibi, P. Barnaghi, optimization and incentive mechanism,” IEEE Commun. Mag., vol. 58,
and A. P. Sheth, “Machine learning for Internet of Things data analysis: no. 10, pp. 88–93, Oct. 2020.
A survey,” Digit. Commun. Netw., vol. 4, no. 3, pp. 161–175, Aug. [61] “Designing for Extreme Low Power.” Oct. 2021. [Online]. Available:
2018. https://semiengineering.com/designing-for-extreme-low-power/
[37] B. Sudharsan and P. Patel, “Machine learning meets Internet of Things: [62] “Federated learning for Internet of Things: Recent advances, taxonomy,
From theory to practice,” in Proc. Eur. Conf. Mach. Learn. Principles and open challenges,” IEEE Commun. Surveys Tuts., vol. 23, no. 3,
Pract. Knowl. Disc. Databases, 2021, pp. 1–3. pp. 1759–1799, 3rd Quart., 2021.
[38] L. U. Khan, I. Yaqoob, N. H. Tran, S. A. Kazmi, T. N. Dang, and [63] L. Ceze, M. D. Hill, and T. F. Wenisch, “Arch2030: A vision
C. S. Hong, “Edge-computing-enabled smart cities: A comprehensive of computer architecture research over the next 15 years,” 2016,
survey,” IEEE Internet Things J., vol. 7, no. 10, pp. 10200–10232, Oct. arXiv:1612.03182.
2020. [64] R. G. Kim, J. R. Doppa, and P. P. Pande, “Machine learning for design
[39] N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: space exploration and optimization of manycore systems,” in Proc.
A survey,” Future Gener. Comput. Syst., vol. 29, no. 1, pp. 84–106, IEEE/ACM Int. Conf. Comput.-Aided Design (ICCAD), 2018, pp. 1–6.
Jan. 2013. [65] C. Liu et al., “Progressive neural architecture search,” in Proc. Eur.
[40] E. F. Coutinho, F. R. de Carvalho Sousa, P. A. L. Rego, D. G. Gomes, Conf. Comput. Vis. (ECCV), 2018, pp. 19–34.
and J. N. de Souza, “Elasticity in cloud computing: A survey,” Ann. [66] Y. Zhou et al., “EPNAS: Efficient progressive neural architecture
Telecommun., vol. 70, no. 7, pp. 289–309, 2015. search,” 2019, arXiv:1907.04648.
[41] W. Z. Khan, E. Ahmed, S. Hakak, I. Yaqoob, and A. Ahmed, [67] T. Elsken, J. H. Metzen, and F. Hutter, “Neural architecture search:
“Edge computing: A survey,” Future Gener. Comput. Syst., vol. 97, A survey,” J. Mach. Learn. Res., vol. 20, no. 1, pp. 1997–2017, Mar.
pp. 219–235, Aug. 2019. 2019.
[42] N. Abbas, Y. Zhang, A. Taherkordi, and T. Skeie, “Mobile edge com- [68] H. Pham, M. Guan, B. Zoph, Q. Le, and J. Dean, “Efficient neural
puting: A survey,” IEEE Internet Things J., vol. 5, no. 1, pp. 450–465, architecture search via parameters sharing,” in Proc. Int. Conf. Mach.
Feb. 2018. Learn., 2018, pp. 4095–4104.
[43] “Digital Twins for Aerospace: Better Fleet Reliability and [69] “How IoT Works—Part 4: User Interface.” 2021. [Online]. Available:
Performance.” 2021. [Online]. Available: https://www.altoros. https://trackinno.com/iot/how-iot-works-part-4-user-interface/
com/blog/digital-twins-for-aerospace-better-fleet-reliability-and- [70] “How a VM is Really Isolated?” 2021. [Online]. Available:
performance/ https://www.business-standard.com/
[44] D. S. Lun, M. Médard, R. Koetter, and M. Effros, “On coding for [71] S. R. Pandey, N. H. Tran, M. Bennis, Y. K. Tun, A. Manzoor,
reliable communication over packet networks,” Phys. Commun., vol. 1, and C. S. Hong, “A crowdsourcing framework for on-device fed-
no. 1, pp. 3–20, 2008. erated learning,” IEEE Trans. Wireless Commun., vol. 19, no. 5,
[45] Z. Guo, J. Huang, B. Wang, S. Zhou, J.-H. Cui, and P. Willett, “A pp. 3241–3256, May 2020.
practical joint network-channel coding scheme for reliable communi- [72] T. H. T. Le, N. H. Tran, Y. K. Tun, Z. Han, and C. S. Hong, “Auction
cation in wireless networks,” IEEE Trans. Wireless Commun., vol. 11, based incentive design for efficient federated learning in cellular wire-
no. 6, pp. 2084–2094, Jun. 2012. less networks,” in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC),
[46] C. Hausl, “Joint network-channel coding for the multiple-access relay 2020, pp. 1–6.
channel based on turbo codes,” Eur. Trans. Telecommun., vol. 20, no. 2, [73] J. Kang, Z. Xiong, D. Niyato, S. Xie, and J. Zhang, “Incentive mech-
pp. 175–181, 2009. anism for reliable federated learning: A joint optimization approach
[47] E. Ditto. “Digital Twins: The Ultimate Guide.” 2021. [Online]. to combining reputation and contract theory,” IEEE Internet Things J.,
Available: https://www.eclipse.org/ditto/ vol. 6, no. 6, pp. 10700–10714, Dec. 2019.
[48] “COMEA-TUAS/MCX-Public.” 2021. [Online]. Available: [74] L. U. Khan, Y. K. Tun, M. Alsenwi, M. Imran, Z. Han, and C. S. Hong,
https://github.com/COMEA-TUAS/mcx-public “A dispersed federated learning framework for 6G-enabled autonomous
[49] “MCX—An Open-Source Framework for Digital Twins.” 2021. driving cars,” 2021, arXiv:2105.09641.
[Online]. Available: https://research.utu.fi/converis/portal/detail/ [75] Y. Liu, Z. Fang, M. H. Cheung, W. Cai, and J. Huang, “An
Publication/66484819? incentive mechanism for sustainable blockchain storage,” 2021,
[50] “Experience the Future with Mago3D.” Jul. 2021. [Online]. Available: arXiv:2103.05866v3.
http://mago3d.com/en/index.html [76] K. Ludwig, A. Fendt, and B. Bauer, “An efficient online heuristic for
[51] “State of mago3D, An Open Source Based Digital Twin Platform.” mobile network slice embedding,” in Proc. 23rd Conf. Innov. Clouds
Jul. 2021. [Online]. Available: https://callforpapers.2021.foss4g.org/ Internet Netw. Workshops (ICIN), 2020, pp. 139–143.
foss4g2021/talk/MJPNQC/ [77] S. De Bast, R. Torrea-Duran, A. Chiumento, S. Pollin, and H. Gacanin,
[52] “Lecture #19: Virtual Machine Design & Implementation.” Oct. 2021. “Deep reinforcement learning for dynamic network slicing in IEEE
[Online]. Available: http://course.ece.cmu.edu/ ece600/fall17/lectures/ 802.11 networks,” in Proc. IEEE INFOCOM Conf. Comput. Commun.
lecture19.pdf Workshops (INFOCOM WKSHPS), 2019, pp. 264–269.
[53] R. W. L. Coutinho and A. Boukerche, “Modeling and analysis of [78] D. H. Kim, S. M. A. Kazmi, A. Ndikumana, A. Manzoor, W. Saad,
a shared edge caching system for connected cars and industrial and C. S. Hong, “Distributed radio slice allocation in wireless network
IoT-based applications,” IEEE Trans. Ind. Informat., vol. 16, no. 3, virtualization: Matching theory meets auctions,” IEEE Access, vol. 8,
pp. 2003–2012, Mar. 2020. pp. 73494–73507, 2020.
[54] “Containers vs. Virtual Machines (VMs): What’s the Difference?” [79] T. M. Ho, N. H. Tran, L. B. Le, Z. Han, S. A. Kazmi, and C. S. Hong,
NetApp. Oct. 2021. [Online]. Available: https://www.netapp.com/blog/ “Network virtualization with energy efficiency optimization for wire-
containers-vs-vms/ less heterogeneous networks,” IEEE Trans. Mobile Comput., vol. 18,
[55] “To Containerize or Not to Containerize, That is the Question, no. 10, pp. 2386–2400, Oct. 2019.
or Containers vs VMs: The Eternal Debate.” Oct. 2021. [Online]. [80] S. M. A. Kazmi and C. S. Hong, “A matching game approach for
Available: https://www.mirantis.com/blog/containers-vs-vms-eternal- resource allocation in wireless network virtualization,” in Proc. 11th
debate/ Int. Conf. Ubiquitous Inf. Manage. Commun., 2017, pp. 1–6.
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
2252 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 24, NO. 4, FOURTH QUARTER 2022
[81] S. A. Kazmi, L. U. Khan, N. H. Tran, and C. S. Hong, Network Slicing [106] Z. Zhou, K. Ota, M. Dong, and C. Xu, “Energy-efficient matching for
for 5G and Beyond Networks, vol. 1. Cham, Switzerland: Springer, resource allocation in D2D enabled cellular networks,” IEEE Trans.
2019. Veh. Technol., vol. 66, no. 6, pp. 5256–5268, Jun. 2017.
[82] L. U. Khan, I. Yaqoob, N. H. Tran, Z. Han, and C. S. Hong, “Network [107] H. Zhang, Y. Xiao, S. Bu, D. Niyato, F. R. Yu, and Z. Han, “Computing
slicing: Recent advances, taxonomy, requirements, and open research resource allocation in three-tier IoT fog networks: A joint optimization
challenges,” IEEE Access, vol. 8, pp. 36009–36028, 2020. approach combining Stackelberg game and matching,” IEEE Internet
[83] C.-Y. Chang, N. Nikaein, and T. Spyropoulos, “Radio access Things J., vol. 4, no. 5, pp. 1204–1215, Oct. 2017.
network resource slicing for flexible service execution,” in Proc. [108] A. Ahmed, M. Awais, T. Akram, S. Kulac, M. Alhussein, and
IEEE INFOCOM Conf. Comput. Commun. Workshops (INFOCOM K. Aurangzeb, “Joint placement and device association of UAV base
WKSHPS), 2018, pp. 668–673. stations in IoT networks,” Sensors, vol. 19, no. 9, p. 2157, 2019.
[84] E. Datsika, A. Antonopoulos, N. Zorba, and C. Verikoukis, “Matching [109] H. Zhang, S. Huang, C. Jiang, K. Long, V. C. Leung, and H. V. Poor,
game based virtualization in shared LTE-A networks,” in Proc. IEEE “Energy efficient user association and power allocation in millimeter-
Global Commun. Conf. (GLOBECOM), 2016, pp. 1–6. wave-based ultra dense networks with energy harvesting base stations,”
[85] S. A. Kazmi, N. H. Tran, T. M. Ho, and C. S. Hong, “Hierarchical IEEE J. Sel. Areas Commun., vol. 35, no. 9, pp. 1936–1947, Sep. 2017.
matching game for service selection and resource purchasing in wire- [110] A. Azizi, N. Mokari, and M. R. Javan, “Joint radio resource alloca-
less network virtualization,” IEEE Commun. Lett., vol. 22, no. 1, tion, 3D placement and user association of aerial base stations in IoT
pp. 121–124, Jan. 2018. networks,” 2017, arXiv:1710.05315.
[86] “How a VM is Really Isolated?” 2021. [Online]. Available:
[111] A. K. Bairagi, M. S. Munir, M. Alsenwi, N. H. Tran, and C. S. Hong,
https://vinfrastructure.it/2017/04/vm-really-isolated/
“A matching based coexistence mechanism between eMBB and uRLLC
[87] “VMware Cloud Director Documentation.” 2021. [Online]. Available:
in 5G wireless networks,” in Proc. 34th ACM/SIGAPP Symp. Appl.
https://docs.vmware.com/en/VMware-Cloud-Director/index.html
Comput., 2019, pp. 2377–2384.
[88] S. Bera, S. Misra, and A. V. Vasilakos, “Software-defined networking
for Internet of Things: A survey,” IEEE Internet Things J., vol. 4, no. 6, [112] K. Kim and C. S. Hong, “Optimal task-UAV-edge matching for com-
pp. 1994–2008, Dec. 2017. putation offloading in UAV assisted mobile edge computing,” in Proc.
[89] A. H. Mohammed, R. M. Khaleefah, M. K. Hussein, and 20th Asia-Pac. Netw. Oper. Manage. Symp. (APNOMS), 2019, pp. 1–4.
I. A. Abdulateef, “A review software defined networking for Internet of [113] R. O. Afolabi, A. Dadlani, and K. Kim, “Multicast scheduling and
Things,” in Proc. Int. Congr. Human-Comput. Interact. Optim. Robotic resource allocation algorithms for OFDMA-based systems: A sur-
Appl. (HORA), 2020, pp. 1–8. vey,” IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 240–254, 1st
[90] K. Kalkan and S. Zeadally, “Securing Internet of Things with software Quart., 2013.
defined networking,” IEEE Commun. Mag., vol. 56, no. 9, pp. 186–192, [114] B. Di, S. Bayat, L. Song, and Y. Li, “Radio resource alloca-
Sep. 2018. tion for downlink non-orthogonal multiple access (NOMA) networks
[91] B. Han, V. Gopalakrishnan, L. Ji, and S. Lee, “Network function using matching theory,” in Proc. IEEE Global Commun. Conf.
virtualization: Challenges and opportunities for innovations,” IEEE (GLOBECOM), 2015, pp. 1–6.
Commun. Mag., vol. 53, no. 2, pp. 90–97, Feb. 2015. [115] T. LeAnh et al., “Matching theory for distributed user association and
[92] R. Mijumbi, J. Serrat, J.-L. Gorricho, N. Bouten, F. De Turck, and resource allocation in cognitive femtocell networks,” IEEE Trans. Veh.
R. Boutaba, “Network function virtualization: State-of-the-art and Technol., vol. 66, no. 9, pp. 8413–8428, Sep. 2017.
research challenges,” IEEE Commun. Surveys Tuts., vol. 18, no. 1, [116] A. Zakeri, M. Moltafet, and N. Mokari, “Joint radio resource alloca-
pp. 236–262, 1st Quart., 2016. tion and SIC ordering in NOMA-based networks using submodularity
[93] K. Joshi and T. Benson, “Network function virtualization,” IEEE and matching theory,” IEEE Trans. Veh. Technol., vol. 68, no. 10,
Internet Comput., vol. 20, no. 6, pp. 7–9, Nov. 2016. pp. 9761–9773, Oct. 2019.
[94] S. Lal, T. Taleb, and A. Dutta, “NFV: Security threats and best [117] J. C. C. Chica, J. C. Imbachi, and J. F. B. Vega, “Security in SDN: A
practices,” IEEE Commun. Mag., vol. 55, no. 8, pp. 211–217, Aug. comprehensive survey,” J. Netw. Comput. Appl., vol. 159, Jun. 2020,
2017. Art. no. 102595.
[95] S. Wang, J. Xu, N. Zhang, and Y. Liu, “A survey on service migration [118] K. K. R. Kendall, “A database of computer attacks for the evaluation
in mobile edge computing,” IEEE Access, vol. 6, pp. 23511–23528, of intrusion detection systems,” Ph.D. dissertation, Dept. Electr. Eng.
2018. Comput. Sci., Massachusetts Inst. Technol., Cambridge, MA, USA,
[96] N. Hassan, K.-L. A. Yau, and C. Wu, “Edge computing in 5G: A 1999.
review,” IEEE Access, vol. 7, pp. 127276–127289, 2019. [119] L. U. Khan, Z. Han, D. Niyato, and C. S. Hong, “Socially-aware-
[97] Y. C. Hu, M. Patel, D. Sabella, N. Sprecher, and V. Young, “Mobile clustering-enabled federated learning for edge networks,” IEEE Trans.
edge computing—A key technology towards 5G,” ETSI, Sophia Netw. Service Manag., vol. 18, no. 3, pp. 2641–2658, Sep. 2021.
Antipolis, France, White Paper, 2015. [120] K. Yang, T. Jiang, Y. Shi, and Z. Ding, “Federated learning via over-
[98] M. Karakus and A. Durresi, “A survey: Control plane scalability the-air computation,” IEEE Trans. Wireless Commun., vol. 19, no. 3,
issues and approaches in software-defined networking (SDN),” Comput. pp. 2022–2035, Mar. 2020.
Netw., vol. 112, pp. 279–293, Jan. 2017. [121] W. Liu, X. Zang, Y. Li, and B. Vucetic, “Over-the-air computa-
[99] E. Amiri, E. Alizadeh, and K. Raeisi, “An efficient hierarchical dis- tion systems: Optimization, analysis and scaling laws,” IEEE Trans.
tributed SDN controller model,” in Proc. 5th Conf. Knowl. Based Eng. Wireless Commun., vol. 19, no. 8, pp. 5488–5502, Aug. 2020.
Innov. (KBEI), 2019, pp. 553–557.
[122] T. Jiang and Y. Shi, “Over-the-air computation via intelligent reflecting
[100] D. E. Sarmiento, A. Lebre, L. Nussbaum, and A. Chari, “Decentralized
surfaces,” in Proc. IEEE Global Commun. Conf. (GLOBECOM), 2019,
SDN control plane for a distributed cloud-edge infrastructure: A sur-
pp. 1–6.
vey,” IEEE Commun. Surveys Tuts., vol. 23, no. 1, pp. 256–281, 1st
Quart., 2021. [123] M. Chen, H. V. Poor, W. Saad, and S. Cui, “Wireless communications
[101] F. Bannour, S. Souihi, and A. Mellouk, “Distributed SDN control: for collaborative federated learning,” IEEE Commun. Mag., vol. 58,
Survey, taxonomy, and challenges,” IEEE Commun. Surveys Tuts., no. 12, pp. 48–54, Dec. 2020.
vol. 20, no. 1, pp. 333–354, 1st Quart., 2018. [124] U. Majeed, L. U. Khan, and C. S. Hong, “Cross-silo horizontal fed-
[102] M. A. Togou, D. A. Chekired, L. Khoukhi, and G.-M. Muntean, “A erated learning for flow-based time-related-features oriented traffic
hierarchical distributed control plane for path computation scalability classification,” in Proc. 21st Asia-Pac. Netw. Oper. Manage. Symp.
in large scale software-defined networks,” IEEE Trans. Netw. Service (APNOMS), 2020, pp. 389–392.
Manag., vol. 16, no. 3, pp. 1019–1031, Sep. 2019. [125] L. U. Khan, Z. Sabir, S. A. Mahmud, and G. M. Khan, “Comparison
[103] S. Ahmad and A. H. Mir, “Scalability, consistency, reliability and secu- of three interpolation techniques in comb-type pilot-assisted channel
rity in sdn controllers: A survey of diverse sdn controllers,” J. Netw. coded OFDM system,” in Proc. 27th Int. Conf. Adv. Inf. Netw. Appl.
Syst. Manage., vol. 29, no. 1, pp. 1–59, Nov. 2021. Workshops, 2013, pp. 977–981.
[104] S. Huang, J. Zhao, and X. Wang, “HybridFlow: A lightweight control [126] Z. Wei, J. Yuan, D. W. K. Ng, M. Elkashlan, and Z. Ding, “A
plane for hybrid SDN in enterprise networks,” in Proc. IEEE/ACM 24th survey of downlink non-orthogonal multiple access for 5G wireless
Int. Symp. Qual. Service (IWQoS), Jun. 2016, pp. 1–2. communication networks,” 2016, arXiv:1609.01856.
[105] Y. Fu et al., “A hybrid hierarchical control plane for flow-based large- [127] J. Zhao, “A survey of intelligent reflecting surfaces (IRSs): Towards
scale software-defined networks,” IEEE Trans. Netw. Service Manag., 6G wireless communication networks with massive MIMO 2.0,” 2019,
vol. 12, no. 2, pp. 117–131, Jun. 2015. arXiv:1907.04789.
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
KHAN et al.: DIGITAL TWIN OF WIRELESS SYSTEMS: OVERVIEW, TAXONOMY, CHALLENGES, AND OPPORTUNITIES 2253
[128] E. Basar, M. D. Renzo, J. De Rosny, M. Debbah, M.-S. Alouini, and Zhu Han (Fellow, IEEE) received the B.S. degree
R. Zhang, “Wireless communications through reconfigurable intelligent in electronic engineering from Tsinghua University
surfaces,” IEEE Access, vol. 7, pp. 116753–116773, 2019. in 1997, and the M.S. and Ph.D. degrees in electri-
[129] P. Wang, J. Fang, H. Duan, and H. Li, “Compressed channel estima- cal and computer engineering from the University of
tion for intelligent reflecting surface-assisted millimeter wave systems,” Maryland, College Park, in 1999 and 2003, respec-
IEEE Signal Process. Lett., vol. 27, pp. 905–909, May 2020. tively. From 2000 to 2002, he was a Research and
[130] Q.-U.-A. Nadeem, A. Kammoun, A. Chaaban, M. Debbah, and Development Engineer with JDSU, Germantown,
M.-S. Alouini, “Intelligent reflecting surface assisted wireless commu- MD, USA. From 2003 to 2006, he was a Research
nication: Modeling and channel estimation,” 2019, arXiv:1906.02360. Associate with the University of Maryland. From
[131] S. Liu, Z. Gao, J. Zhang, M. Di Renzo, and M.-S. Alouini, “Deep 2006 to 2008, he was an Assistant Professor with
denoising neural network assisted compressive channel estimation for Boise State University, Boise, ID, USA. He is
mmWave intelligent reflecting surfaces,” IEEE Trans. Veh. Technol., Currently a John and Rebecca Moores Professor with the Electrical and
vol. 69, no. 8, pp. 9223–9228, Aug. 2020. Computer Engineering Department as well as Computer Science Department,
[132] S. Gong et al., “Toward smart wireless communications via intelligent University of Houston, Houston, TX, USA. His research interests include
reflecting surfaces: A contemporary survey,” IEEE Commun. Surveys wireless resource allocation and management, wireless communications and
Tuts., vol. 22, no. 4, pp. 2283–2314, 4th Quart., 2020. networking, game theory, big data analysis, security, and smart grid. He
[133] F. Emmert-Streib, Z. Yang, H. Feng, S. Tripathi, and M. Dehmer, “An received the NSF Career Award in 2010, the Fred W. Ellersick Prize of the
introductory review of deep learning for prediction models with big IEEE Communication Society in 2011, the EURASIP Best Paper Award for
data,” Front. Artif. Intell., vol. 3, p. 4, Feb. 2020. the Journal on Advances in Signal Processing in 2015, the IEEE Leonard G.
[134] S. Pouyanfar et al., “A survey on deep learning: Algorithms, techniques, Abraham Prize in the field of Communications Systems (Best Paper Award in
and applications,” ACM Comput. Surveys, vol. 51, no. 5, pp. 1–36, Sep. IEEE JSAC) in 2016, and several Best Paper Awards in IEEE conferences. He
2019. is also the winner of 2021 IEEE Kiyo Tomiyasu Award, for outstanding early
[135] M. Masdari, S. S. Nabavi, and V. Ahmadi, “An overview of virtual to mid-career contributions to technologies holding the promise of innovative
machine placement schemes in cloud computing,” J. Netw. Comput. applications, with the following citation: “for Contributions to Game Theory
Appl., vol. 66, pp. 106–127, May 2016. and Distributed Management of Autonomous Communication Networks." He
[136] P. Thakur and D. K. Shrivastava, “Interoperability issues and standard has been a 1% Highly Cited Researcher since 2017 according to Web of
architecture for service delivery in federated cloud: A review,” in Proc. Science. He was an IEEE Communications Society Distinguished Lecturer
Int. Conf. Comput. Intell. Commun. Netw., 2015, pp. 908–912. from 2015 to 2018. He has been an AAAS Fellow and an ACM Distinguished
[137] H. F. Atlam, A. Alenezi, M. O. Alassafi, and G. B. Wills, “Blockchain Member since 2019.
with Internet of Things: Benefits, challenges, and future directions,”
Int. J. Intell. Syst. Appl., vol. 10, no. 6, pp. 40–48, 2018.
[138] M. Stoyanova, Y. Nikoloudakis, S. Panagiotakis, E. Pallis, and
E. K. Markakis, “A survey on the Internet of Things (IoT) foren-
sics: Challenges, approaches, and open issues,” IEEE Commun. Surveys
Tuts., vol. 22, no. 2, pp. 1191–1221, 2nd Quart., 2020.
[139] C. S. Hong, L. U. Khan, M. Chen, D. Chen, W. Saad, and Z. Han,
“Resource optimization for wireless federated learning,” in Federated
Learning for Wireless Networks. Singapore: Springer, 2021, pp. 27–69.
[140] N. C. Luong et al., “Applications of deep reinforcement learning in
communications and networking: A survey,” IEEE Commun. Surveys Walid Saad (Fellow, IEEE) received the Ph.D.
Tuts., vol. 21, no. 4, pp. 3133–3174, 4th Quart., 2019. degree from the University of Oslo, Oslo, Norway,
[141] C. S. Hong, L. U. Khan, M. Chen, D. Chen, W. Saad, and in 2010. He is currently a Professor with the
Z. Han, “Smart industries and intelligent reflecting surfaces,” in Department of Electrical and Computer Engineering,
Federated Learning for Wireless Networks. Singapore: Springer, 2021, Virginia Tech, Blacksburg, VA, USA, where he
pp. 221–239. leads the Network sciEnce, Wireless, and Security
Laboratory. He was named the Stephen O. Lane
Junior Faculty Fellow with Virginia Tech from 2015
to 2017. In 2017, he was named as the College of
Engineering Faculty Fellow. His research interests
include wireless networks, machine learning, game
theory, security, unmanned aerial vehicles, cyber-physical systems, and
network science. He was a recipient of the NSF CAREER Award in 2013,
the Air Force Office of Scientific Research Summer Faculty Fellowship in
2014, and the Young Investigator Award from the Office of Naval Research
Latif U. Khan received the M.S. degree in in 2015. He was the author/coauthor of eight conference best paper awards
electrical engineering with distinction from UET at WiOpt in 2009, the International Conference on Internet Monitoring and
Peshawar, Pakistan, in 2017, and the Ph.D. degree in Protection in 2010, the IEEE Wireless Communications and Networking
computer engineering from Kyung Hee University Conference in 2012, the IEEE International Symposium on Personal, Indoor
(KHU), South Korea, in 2021. He worked as a and Mobile Radio Communications in 2015, IEEE SmartGridComm in 2015,
Leading Researcher with the intelligent Networking EuCNC in 2017, IEEE GLOBECOM in 2018, and the International Federation
Laboratory under a project jointly funded by the for Information Processing International Conference on New Technologies,
prestigious Brain Korea 21st Century Plus and Mobility and Security in 2019. He was also a recipient of the 2015 Fred
Ministry of Science and ICT, South Korea. Prior to W. Ellersick Prize from the IEEE Communications Society, the 2017 IEEE
joining the KHU, he has served as a Faculty Member ComSoc Best Young Professional in Academia award, the 2018 IEEE ComSoc
and a Research Associate with UET Peshawar. He Radio Communications Committee Early Achievement Award, and the 2019
has published his works in highly reputable conferences and journals. He is the IEEE ComSoc Communication Theory Technical Committee. He received
author/coauthor of two conference best paper awards. He is also the author the Dean’s Award for Research Excellence from Virginia Tech in 2019.
of two books titled “Network Slicing for 5G and Beyond Networks” and He also serves as an Editor for the IEEE T RANSACTIONS ON W IRELESS
“Federated Learning for Wireless Networks”. His research interests include C OMMUNICATIONS, the IEEE T RANSACTIONS ON M OBILE C OMPUTING,
analytical techniques of optimization and game theory to edge computing, and the IEEE T RANSACTIONS ON C OGNITIVE C OMMUNICATIONS AND
end-to-end network slicing, digital twins, and federated learning for wireless N ETWORKING. He is an Editor-at-Large for the IEEE T RANSACTIONS ON
networks. He is the recipient of KHU best thesis award. C OMMUNICATIONS and an IEEE Distinguished Lecturer.
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.
2254 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 24, NO. 4, FOURTH QUARTER 2022
Ekram Hossain (Fellow, IEEE) is a Professor Choong Seon Hong (Senior Member, IEEE)
with the Department of Electrical and Computer received the B.S. and M.S. degrees in electronic
Engineering, University of Manitoba, Canada engineering from Kyung Hee University, Seoul,
(https://home.cc.umanitoba.ca/ hossaina/). He is a South Korea, in 1983 and 1985, respectively, and the
member (Class of 2016) of the College of the Ph.D. degree from Keio University, Tokyo, Japan,
Royal Society of Canada, a Fellow of the Canadian in 1997. In 1988, he joined with KT, Gyeonggi-do,
Academy of Engineering, and a Fellow of the South Korea, where he was involved in broadband
Engineering Institute of Canada. He was elevated networks as a member of the Technical Staff. Since
to an IEEE Fellow “for Contributions to Spectrum 1993, he has been with Keio University. He was
Management and Resource Allocation in Cognitive with the Telecommunications Network Laboratory,
and Cellular Radio Networks”. He was listed as a KT, as a Senior Member of Technical Staff and
Clarivate Analytics Highly Cited Researcher in Computer Science in 2017, as the Director of the Networking Research Team until 1999. Since 1999,
2018, 2019, 2020, and 2021. He served as the Editor-in-Chief for the IEEE he has been a Professor with the Department of Computer Science and
C OMMUNICATIONS S URVEYS AND T UTORIALS from 2012 to 2016, and the Engineering, Kyung Hee University. His research interests include future
IEEE Press from 2018 to 2021. Internet, intelligent edge computing, network management, and network secu-
rity. He is a member of the Association for Computing Machinery, the Institute
of Electronics, Information and Communication Engineers, the Information
Processing Society of Japan, the Korean Institute of Information Scientists and
Engineers, the Korean Institute of Communications and Information Sciences,
Mohsen Guizani (Fellow, IEEE) received the B.S. the Korean Information Processing Society, and the Open Standards and ICT
(with distinction) and M.S. degrees in electrical Association. He has served as the General Chair, the TPC Chair/Member,
engineering, and the M.S. and Ph.D. degrees in or an Organizing Committee Member of international conferences, such
computer engineering from Syracuse University, as the Network Operations and Management Symposium, International
New York, in 1984, 1986, 1987, and 1990, Symposium on Integrated Network Management, Asia-Pacific Network
respectively. He is currently a Professor with Operations and Management Symposium , End-to-End Monitoring Techniques
the Machine Learning Department, Mohamed Bin and Services, IEEE Consumer Communications and Networking Conference,
Zayed University of Artificial Intelligence, Abu Assurance in Distributed Systems and Networks, International Conference
Dhabi, UAE. Previously, he served in different on Parallel Processing, Data Integration and Mining, World Conference
academic and administrative positions with the on Information Security Applications, Broadband Convergence Network,
University of Idaho, Western Michigan University, Telecommunication Information Networking Architecture, International
the University of West Florida, the University of Missouri-Kansas City, the Symposium on Applications and the Internet, and International Conference
University of Colorado-Boulder, and Syracuse University. He is currently an on Information Networking. He was an Associate Editor of the IEEE
IEEE ComSoc Distinguished Lecturer. He is the author of nine books and T RANSACTIONS ON N ETWORK AND S ERVICE M ANAGEMENT and the IEEE
more than 500 publications in refereed journals and conferences. His research J OURNAL OF C OMMUNICATIONS AND N ETWORKS. He currently serves as
interests include wireless communications and mobile computing, computer an Associate Editor for the International Journal of Network Management.
networks, mobile cloud computing, security, and smart grid. He serves on
the Editorial Boards of several international technical journals, and is the
Founder and the Editor-in-Chief of the Wireless Communications and Mobile
Computing journal (Wiley). He has also served as a TPC member, the Chair,
and the General Chair of a number of international conferences. Throughout
his career, he received three teaching awards and four research awards. He also
received the 2017 IEEE Communications Society WTC Recognition Award
as well as the 2018 AdHoc Technical Committee Recognition Award for
his contribution to outstanding research in wireless communications and ad
hoc sensor networks. He served as a IEEE Computer Society Distinguished
Speaker. He was the Chair of the IEEE Communications Society Wireless
Technical Committee and the Chair of the TAOS Technical Committee. He
was the Editor-in-Chief of IEEE N ETWORK. He has guest edited a number
of Special Issues in IEEE journals and magazines. He is a Senior Member of
ACM.
Authorized licensed use limited to: KAUST. Downloaded on May 07,2023 at 18:12:47 UTC from IEEE Xplore. Restrictions apply.