4.7 Article

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Stacked Autoencoder-Based Intrusion Detection System to Combat Financial Fraudulent

Ghulam Muhammad et al.

Summary: With the rapid growth of the Internet of Things (IoT) and the increase in data volume and network traffic, it has become easier for intruders to launch network attacks. This article proposes an intrusion detection system (IDS) based on stacked autoencoders (AE) and deep neural networks (DNN) to address this issue. The system achieved high accuracy rates of 94.2%, 99.7%, and 99.9% for multiclass classification on different datasets.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Automation & Control Systems

ContainerGuard: A Real-Time Attack Detection System in Container-Based Big Data Platform

Yulong Wang et al.

Summary: This article proposes a noise-resilient and real-time detection system called ContainerGuard to detect Meltdown and Spectre attacks in container-based big data platforms. ContainerGuard collects performance data of processes in containers and uses generative neural networks to learn representations of normal patterns, achieving excellent detection performance.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Artificial Intelligence

MFFFLD: A Multimodal-Feature-Fusion-Based Fingerprint Liveness Detection

Chengsheng Yuan et al.

Summary: In this article, a more robust and accurate biometrics liveness detection strategy is proposed by using weighted multimodal convolutional neural networks to extract deep features. The proposed algorithm achieves outstanding results in fingerprint evaluations and face anti-spoofing evaluations, surpassing previous methods. The experimental results demonstrate the accuracy and effectiveness of the approach.

IEEE TRANSACTIONS ON COGNITIVE AND DEVELOPMENTAL SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

Reward is enough

David Silver et al.

Summary: In this article, the hypothesis is made that intelligence and its associated abilities serve the maximization of reward, driving behavior that exhibits various abilities. It is suggested that agents learning through trial and error to maximize reward could exhibit most, if not all, of these abilities, potentially constituting a solution to artificial general intelligence.

ARTIFICIAL INTELLIGENCE (2021)

Article Engineering, Electrical & Electronic

The Vulnerability of Semantic Segmentation Networks to Adversarial Attacks in Autonomous Driving: Enhancing Extensive Environment Sensing

Andreas Baer et al.

Summary: Enabling autonomous driving through environment perception using CNNs for semantic segmentation is a complex task with vulnerabilities to adversarial attacks. Understanding the advantages and disadvantages of CNNs in this context is crucial for future research in the field.

IEEE SIGNAL PROCESSING MAGAZINE (2021)

Article Computer Science, Hardware & Architecture

A Study on the Security Implications of Information Leakages in Container Clouds

Xing Gao et al.

Summary: Container technology has revolutionized the development and deployment of multi-tier distributed applications. However, security concerns arise when multiple containers share the same operating system kernel due to incomplete system resource isolation mechanisms. Information leakage channels within containers can expose host information, making it easier for malicious attacks to impact cloud services.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification

Xinrui Ge et al.

Summary: Verifiable Searchable Symmetric Encryption is an important cloud security technique allowing users to retrieve encrypted data through keywords and verify the results. This paper proposes a practical scheme for achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. By designing a novel Accumulative Authentication Tag and a new secure index, efficient data update and verification are achieved, ensuring both security and efficiency.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Engineering, Electrical & Electronic

Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure

Ke-Wen Huang et al.

Summary: This paper discusses the pilot contamination attack (PCA) in wireless communication systems and proposes a new PCA scheme called IRS-PCA, which uses an intelligent reflecting surface to increase the eavesdropper's capability. The scheme disables existing countermeasures and presents challenges in detection and secure transmission under IRS-PCA.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2021)

Article Computer Science, Hardware & Architecture

5G network slicing with QKD and quantum-safe security

Paul Wright et al.

Summary: The research demonstrates how to enhance the 5G network slicing model to address data security requirements, with two different slice configurations designed for diverse networking use-cases and a modified SDN orchestrator for automatic provisioning. The setup and teardown times of the network slices are shown to be around 1-2 minutes, a significant improvement in efficiency compared to manual provisioning.

JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING (2021)

Article Multidisciplinary Sciences

An integrated space-to-ground quantum communication network over 4,600 kilometres

Yu-Ao Chen et al.

Summary: Quantum key distribution has shown promise in enabling secure communication, with successful demonstrations in the laboratory and small-scale networks tested outside. However, global deployment faces challenges due to current technological limitations, although quantum repeaters could potentially provide a solution.

NATURE (2021)

Article Engineering, Electrical & Electronic

Hybrid Satellite-UAV-Terrestrial Networks for 6G Ubiquitous Coverage: A Maritime Communications Perspective

Yanmin Wang et al.

Summary: This study explores the benefits of deployable base stations to enhance maritime communication coverage in the smart ocean era. It presents a joint link scheduling and rate adaptation scheme to minimize total energy consumption with quality of service guarantees. By using large-scale channel state information for prediction, the problem is solved suboptimally through Min-Max transformation and iterative problem relaxation, achieving efficient communication coverage with reduced system overhead.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)

Article Engineering, Civil

BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks

Chao Lin et al.

Summary: While VANETs have the potential to improve driver safety and traffic management efficiency, security and privacy issues persist. This paper proposes a novel BCPPA protocol based on Ethereum blockchain to address these challenges, providing effective certificate management and reducing the need for storing a large number of private keys. The protocol supports batch verification and meets security requirements, demonstrated through implementation in the Ethereum test network and simulations showing feasibility in milliseconds.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2021)

Article Computer Science, Information Systems

Scalar Product Lattice Computation for Efficient Privacy-Preserving Systems

Yogachandran Rahulamathavan et al.

Summary: The research developed an efficient PP system using lattice structures, which is not only more efficient in computation compared to existing techniques but also provides a high level of security against quantum attacks. Concrete parameters have been established to achieve security of 128-b and 256-b.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Hardware & Architecture

Deep learning for privacy preservation in autonomous moving platforms enhanced 5G heterogeneous networks

Yulei Wu et al.

Summary: 5G heterogeneous networks have become a promising platform to connect a growing number of Internet-of-Things devices and accommodate various vertical services. Deep learning is widely used to enhance network quality-of-service and user quality-of-experience, while addressing privacy preservation issues in this environment.

COMPUTER NETWORKS (2021)

Article Automation & Control Systems

Deep Learning-Based DDoS-Attack Detection for Cyber-Physical System Over 5G Network

Bilal Hussain et al.

Summary: The article proposes a comprehensive framework utilizing deep convolutional neural networks and real network data for early detection of DDoS attacks orchestrated by botnets, achieving over 91% accuracy in detecting normal and under attack cells.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Telecommunications

6G: A comprehensive survey on technologies, applications, challenges, and research problems

Haitham Hassan H. Mahmoud et al.

Summary: 6G is driven by the limitations of current cellular networks and aims to integrate important rate-hungry applications, handle large data transmission, and reduce latency to provide higher data rates for ultra-reliable and low-latency communications.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2021)

Article Computer Science, Information Systems

A Comprehensive Survey on the E2E 5G Network Slicing Model

Mohammed Chahbar et al.

Summary: This article addresses the lack of consideration for Network Slice (NS) modeling details from Standards Developing Organizations (SDOs) in End-to-End (E2E) NS implementations. It provides a general architecture for E2E network slicing functionality before delving into domain-specific visions and surveys the NS modeling works in Radio Access Networks (RAN), Core Networks (CN), and Transport Networks (TN). The goal is to clarify the E2E Network Slicing process and propose integrating data models developed by IETF working groups in the context of the ACTN architecture for managing Transport NSs.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)

Article Quantum Science & Technology

Experimental quantum homomorphic encryption

Jonas Zeuner et al.

Summary: Quantum computers promise to excel classical machines and safeguard privacy of computation, with blind quantum computing protocol and homomorphic encryption being common secure methods. Demonstrations show the potential application of homomorphic-encrypted quantum computations in delegated quantum computing using photons.

NPJ QUANTUM INFORMATION (2021)

Article Computer Science, Information Systems

A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things

Abdulmalik Alwarafy et al.

Summary: This article conducts a comprehensive survey on security and privacy issues in the context of EC-assisted IoT, including definitions, attack classifications, solutions, and open challenges. Furthermore, it provides future research directions for the secure EC-assisted IoT paradigm.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Weaponized AI for cyber attacks

Muhammad Mudassar Yamin et al.

Summary: Artificial intelligence technologies are actively being used for both cyber defense and offensive purposes, with attacks ranging from tampering with medical images to influencing the safety of autonomous vehicles. This research investigates recent cyberattacks utilizing AI techniques, identifies mitigation strategies, and explores future scenarios for controlling such attacks by analyzing existing trends in AI-based cyberattacks.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2021)

Article Engineering, Electrical & Electronic

Massive Access in Secure NOMA Under Imperfect CSI: Security Guaranteed Sum-Rate Maximization With First-Order Algorithm

Zongze Li et al.

Summary: This article introduces a novel approach to address channel uncertainties in secure NOMA schemes by transforming probabilistic constraints and decoupling variables. This method maximizes the total rate while enhancing security.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)

Article Engineering, Electrical & Electronic

Intelligent Reflecting Surface-Aided Wireless Communications: A Tutorial

Qingqing Wu et al.

Summary: Intelligent reflecting surface (IRS) is a technology that can alter wireless signal propagation in wireless networks by dynamically changing wireless channels to enhance communication performance. The future hybrid wireless network aided by IRS, comprising both active and passive components, is expected to achieve sustainable capacity growth cost-effectively.

IEEE TRANSACTIONS ON COMMUNICATIONS (2021)

Article Engineering, Electrical & Electronic

Physical Layer Secret Key Generation Using Joint Interference and Phase Shift Keying Modulation

Najme Ebrahimi et al.

Summary: In this study, a novel approach for physical layer security and key generation based on full-duplex communication was proposed, which utilizes random secret key exchange to provide efficient protection mechanisms without the need for node location information, effectively defending against eavesdropper attacks.

IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES (2021)

Article Computer Science, Information Systems

A Survey on Supply Chain Security: Application Areas, Security Threats, and Solution Architectures

Vikas Hassija et al.

Summary: The rapid improvement in global connectivity standards has increased trade activities among different parties, allowing goods and services from one region to enter foreign markets. To achieve a connected world with no boundary restrictions in trade, transparent, secure, and trustworthy supply chains are essential. Emerging technologies such as blockchain, machine learning, and physically unclonable functions are being proposed as solutions to vulnerabilities in the supply chain infrastructure.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Privacy-Preserving Federated Learning Framework Based on Chained Secure Multiparty Computing

Yong Li et al.

Summary: The proposed privacy-preserving FL framework chain-PPFL utilizes single-masking and chained-communication mechanisms to achieve practical privacy preservation with some communication cost, while maintaining the accuracy and convergence speed of the training model. Extensive experiments demonstrate the effectiveness of the scheme in protecting sensitive information of participants in FL.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Privacy-Preserving Multiobjective Sanitization Model in 6G IoT Environments

Jerry Chun-Wei Lin et al.

Summary: The next revolution in the smart industry will be driven by the emergence of Industrial Internet of Things (IoT) and 5G/6G technology, changing our perspective on information and communication. Security of data and privacy of information remain significant challenges in critical and high-sensitive environments. An ant colony optimization approach is proposed to secure 6G IoT networks, aiming to protect confidential and sensitive information.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Telecommunications

Physical Layer Security for Intelligent Reflecting Surface Assisted Two-Way Communications

Mevan Wijewardena et al.

Summary: This letter explores the use of intelligent reflecting surfaces (IRS) for secure communication in a network with an untrusted user. The transmit powers and phase shifts of each element of the IRS are optimized to maximize the sum-secrecy rate, causing destructive interference at the untrusted user. The proposed iterative algorithm quickly converges to a highly accurate solution, demonstrating up to 120% improvement in sum-secrecy rate compared to naive or partially optimized schemes.

IEEE COMMUNICATIONS LETTERS (2021)

Article Engineering, Electrical & Electronic

On Deep Reinforcement Learning for Traffic Engineering in SD-WAN

Sebastian Troia et al.

Summary: The demand for reliable and efficient WANs is increasing, with SD-WAN technology offering new opportunities. SD-WAN dynamically reconfigures network devices based on real-time measurements and service needs, reducing costs while maintaining reliability. However, implementing Traffic Engineering methods to improve network performance is crucial in SD-WAN deployment.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)

Article Engineering, Electrical & Electronic

Physical Layer Security for MISO NOMA VLC System Under Eavesdropper Collusion

Hao Peng et al.

Summary: This paper investigates physical layer security for a MISO NOMA VLC system, proposing a precoding scheme to suppress collusive eavesdroppers' rate and extending it to unknown eavesdroppers' locations. Introducing artificial noise in the scheme further suppresses eavesdroppers' average rate, and an iterative algorithm based on concave-convex procedure is proposed to solve the non-convex optimization problem, showing the effectiveness of the proposed schemes in guaranteeing PLS for the system.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Optics

Twin-field quantum key distribution over a 511km optical fibre linking two distant metropolitan areas

Jiu-Peng Chen et al.

Summary: The study achieved twin-field QKD through a new protocol, successfully distributing secure keys over a 511 km long-haul fibre trunk.

NATURE PHOTONICS (2021)

Article Computer Science, Information Systems

DRL-QOR: Deep Reinforcement Learning-Based QoS/QoE-Aware Adaptive Online Orchestration in NFV-Enabled Networks

Jing Chen et al.

Summary: This study proposes an adaptive online orchestration method based on deep reinforcement learning, which effectively considers QoS and QoE in solving low-cost orchestration models in NFV-enabled networks. Experimental results demonstrate the method's excellent performance in handling real-time network variations, optimizing long-term profits, and providing QoE while meeting QoS requirements.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)

Article Computer Science, Information Systems

BED: A New Data Set for EEG-Based Biometrics

Pablo Arnau-Gonzalez et al.

Summary: The research provides a specifically designed dataset for new biometric approaches using EEG signals captured by inexpensive devices. The dataset includes EEG recordings and responses from 21 individuals under 12 different stimuli. The study aims to facilitate future research on the influence of emotions on EEG signals in biometrics.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Differential Privacy for Industrial Internet of Things: Opportunities, Applications, and Challenges

Bin Jiang et al.

Summary: The development of IoT has brought new changes and IIoT is promoting a new industrial revolution. With more IIoT applications, privacy protection issues are emerging. Differential privacy is used to protect user-terminal privacy, requiring in-depth research.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Hybrid Satellite-Terrestrial Communication Networks for the Maritime Internet of Things: Key Technologies, Opportunities, and Challenges

Te Wei et al.

Summary: With the increasing marine activities, there is a growing demand for high-speed and reliable maritime communications. Existing communication technologies may lead to performance loss when used on the ocean, requiring customization for the maritime environment. Future maritime communications are envisioned to be environment-aware, service-driven, and integrated satellite-air-ground networks.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Privacy-Preserving Deep Learning Based on Multiparty Secure Computation: A Survey

Qiao Zhang et al.

Summary: Deep learning has achieved significant success in various applications, but privacy concerns have emerged as a result, leading to the need for privacy-preserving techniques. This article reviews the latest research in privacy-preserving deep learning, summarizes the techniques applied in the training and inference phases, and discusses promising directions for future research.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Enabling Massive IoT Toward 6G: A Comprehensive Survey

Fengxian Guo et al.

Summary: The article provides a comprehensive survey on 6G-enabled massive IoT, covering the drivers and requirements, visions of 6G, new network architecture, and breakthrough technologies.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Engineering, Electrical & Electronic

Molecular Physical Layer for 6G in Wave-Denied Environments

Weisi Guo et al.

Summary: Molecular signals have potential to be a new physical layer for 6G wireless systems, with applications in defense, security, and cyber-physical systems like health monitoring. These new technologies require innovations ranging from DNA encoding to molecular signal processing, demonstrating their potential in traditional engineering areas.

IEEE COMMUNICATIONS MAGAZINE (2021)

Article Computer Science, Information Systems

Hybrid LiFi and WiFi Networks: A Survey

Xiping Wu et al.

Summary: HLWNets, a combination of LiFi and WiFi networks, offer high-speed data transmission and ubiquitous coverage. The article presents the system design framework, performance metrics, achievements, challenges, and potential applications of HLWNets.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Computer Science, Information Systems

Survey on Multi-Access Edge Computing Security and Privacy

Pasika Ranaweera et al.

Summary: This paper analyzes the security and privacy of the Multi-Access Edge Computing (MEC) system, identifying threat vectors and vulnerabilities, proposing security solutions, defining privacy objectives, and presenting future directives to enhance the security and privacy of MEC services.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Computer Science, Information Systems

A Survey of Physical-Layer Authentication in Wireless Communications

Ning Xie et al.

Summary: This article provides a detailed survey of features and techniques that can be used in Physical-Layer Authentication (PLA), categorizing existing PLA schemes into passive and active categories. Different verification methods in passive and active schemes are discussed, along with future research directions.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Computer Science, Information Systems

A Comprehensive Survey of the Tactile Internet: State-of-the-Art and Research Directions

Nattakorn Promwongsa et al.

Summary: With the evolution of the internet, the Tactile Internet has emerged which goes beyond traditional data transmission and communication, enabling haptic communication and skill delivery. While there are existing studies on related technologies and applications, there is a lack of comprehensive investigation and critical review on the architectures and algorithms of the Tactile Internet.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Computer Science, Theory & Methods

Artificial Noise-Aided MIMO Physical Layer Authentication With Imperfect CSI

Jake Bailey Perazzone et al.

Summary: Fingerprint embedding at the physical layer is a highly tunable authentication framework that achieves information-theoretic security by hiding a traditional HMAC tag in noise. The use of artificial noise (AN) in a multiantenna scenario to obscure the tag relies on perfect knowledge of the channel state information (CSI) between legitimate users. Research shows that while utilizing AN can greatly improve security, it may suffer from diminishing returns when the quality of CSI knowledge is poor.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Information Systems

Privacy in the Cloud: A Survey of Existing Solutions and Research Challenges

Paulo Silva et al.

Summary: This article discusses the issues of security and privacy assurances in the transmission and storage of private data online, analyzing various privacy threats, concepts, regulations, and personal data types, as well as Privacy Enhancing Technologies and anonymization mechanisms. Additionally, it also discusses privacy tools, models, and metrics, along with the current research challenges in achieving higher privacy levels in cloud services.

IEEE ACCESS (2021)

Article Computer Science, Theory & Methods

Comparison of Statistical and Machine Learning Techniques for Physical Layer Authentication

Linda Senigagliesi et al.

Summary: In this study, authentication at the physical layer using different methods under various channel conditions was considered. It was found that one-class classification algorithms perform best when there is small spatial correlation between channels, while statistical methods are advantageous in cases with large spatial correlation.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Theory & Methods

On Pilot Spoofing Attack in Massive MIMO Systems: Detection and Countermeasure

Weiyang Xu et al.

Summary: This paper proposes a PSA detection method based on pilot manipulation, where pilot sequences are randomly partitioned and manipulated to increase the likelihood of detecting malicious nodes. Results show a significant improvement in detection accuracy, with the potential for performance enhancement through joint detection discussed. Additionally, a jamming-resistant receiver is designed based on pilot manipulation, with extensive simulations validating the proposed algorithms.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Theory & Methods

Deep Hashing for Secure Multimodal Biometrics

Veeru Talreja et al.

Summary: The paper presents a deep learning framework for feature-level fusion to generate secure multimodal templates using face and iris biometrics, integrating deep hashing and cancelable biometrics techniques. The proposed approach enhances matching performance and privacy, while also providing cancelability and unlinkability of templates. Additionally, the proposed hashing function is tested for image retrieval application, with a focus on combining multimodal fusion and biometric security, specifically for face and iris data.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Theory & Methods

Pilot Contamination Attack Detection for 5G MmWave Grant-Free IoT Networks

Ning Wang et al.

Summary: The study introduces a new method to counter pilot contamination attacks in 5G IoT networks, using channel virtual representation (CVR) and a single-hidden-layer multiple measurement (SHMM) Siamese network for efficient PCA detection. This approach overcomes the challenges of channel randomness and massive connectivity in mMTC IoT networks, while also supporting small sample learning.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Theory & Methods

Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas

Jie Tang et al.

Summary: In this work, a practical physical layer MIMO secure communication scheme is proposed to defend against eavesdroppers with arbitrary number of antennas. The transmitter encrypts confidential information using a random binary sequence as key bits, which are mapped to legitimate receiver for decryption. Legitimate receiver obtains key bits from activated antenna indexes and decrypts the information received.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Theory & Methods

Evaluation of the Time Stability and Uniqueness in PPG-Based Biometric System

Dae Yon Hwang et al.

Summary: This study demonstrates the feasibility of using PPG signals for human verification applications and develops robust time-stable features using deep learning models. By deploying different deep learning models with datasets, the system shows superior performance in terms of accuracy.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Engineering, Electrical & Electronic

The Road to 6G: Ten Physical Layer Challenges for Communications Engineers

Michail Matthaiou et al.

Summary: While 5G deployment will continue into the next decade, there is already strong interest in technologies for its successor, 6G. Despite the transformative impact of 5G, it is still far from supporting the Internet of Everything. Some fundamental problems for 6G include intelligent reflecting surfaces, cell-free massive MIMO, and THz communications, with signal processing playing a critical role.

IEEE COMMUNICATIONS MAGAZINE (2021)

Article Computer Science, Theory & Methods

Physical-Layer Authentication Using Multiple Channel-Based Features

Ning Xie et al.

Summary: This paper proposes two multiple Channel Impulse Response (CIR) based PLA schemes to effectively overcome the limitations of prior schemes. The MCP scheme uses multiple CIRs to realize the PLA, while the EMCP scheme further improves authentication performance by exploiting the channel correlation coefficient. Rigorous performance analysis and extensive performance comparisons through simulations demonstrate that the EMCP scheme has the best authentication performance.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Engineering, Electrical & Electronic

Intelligent Reflecting Surface Assisted Secret Key Generation

Xinjin Lu et al.

Summary: This paper investigates intelligent reflecting surface (IRS)-assisted secret key generation to maximize key capacity by adjusting the placement of IRS units based on channel state information (CSI). Simulation results demonstrate significant enhancement in the quality of secret key generation with our proposed scheme.

IEEE SIGNAL PROCESSING LETTERS (2021)

Article Computer Science, Artificial Intelligence

Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues

Arwa Aldweesh et al.

KNOWLEDGE-BASED SYSTEMS (2020)

Article Computer Science, Theory & Methods

The Al-Based Cyber Threat Landscape: A Survey

Nektaria Kaloudi et al.

ACM COMPUTING SURVEYS (2020)

Article Engineering, Electrical & Electronic

Future Intelligent and Secure Vehicular Network Toward 6G: Machine-Learning Approaches

Fengxiao Tang et al.

PROCEEDINGS OF THE IEEE (2020)

Article Engineering, Electrical & Electronic

The Security of Autonomous Driving: Threats, Defenses, and Future Directions

Kui Ren et al.

PROCEEDINGS OF THE IEEE (2020)

Article Engineering, Multidisciplinary

Adversarial Attacks and Defenses in Deep Learning

Kui Ren et al.

ENGINEERING (2020)

Article Optics

Advances in Quantum Cryptography

Stefano Pirandola et al.

Advances in Optics and Photonics (2020)

Article Engineering, Electrical & Electronic

Deep Neural Network-Based Active User Detection for Grant-Free NOMA Systems

Wonjun Kim et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Physical-Layer Security With Optical Generalized Space Shift Keying

Erdal Panayirci et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Spatial Anti-Jamming Scheme for Internet of Satellites Based on the Deep Reinforcement Learning and Stackelberg Game

Chen Han et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Information Systems

Covert Wireless Communication in IoT Network: From AWGN Channel to THz Band

Zhihong Liu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Engineering, Electrical & Electronic

When Machine Learning Meets Wireless Cellular Networks: Deployment, Challenges, and Applications

Ursula Challita et al.

IEEE COMMUNICATIONS MAGAZINE (2020)

Article Engineering, Electrical & Electronic

Dynamic Traffic Management for SD-WAN Inter-Cloud Communication

Zbigniew Dulinski et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)

Article Computer Science, Hardware & Architecture

A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research Problems

Walid Saad et al.

IEEE NETWORK (2020)

Article Engineering, Electrical & Electronic

A Two-Timescale Approach for Network Slicing in C-RAN

He Zhang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Hardware & Architecture

Physical-Layer Authentication in Non-Orthogonal Multiple Access Systems

Ning Xie et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2020)

Review Computer Science, Information Systems

From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things

Tiago M. Fernandez-Carames

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Telecommunications

Federated learning for 6G communications: Challenges, methods, and future directions

Yi Liu et al.

China Communications (2020)

Article Computer Science, Information Systems

A taxonomy of AI techniques for 6G communication networks

Karan Sheth et al.

COMPUTER COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Blockchain-Empowered Framework for Decentralized Network Management in 6G

Taras Maksymyuk et al.

IEEE COMMUNICATIONS MAGAZINE (2020)

Article Engineering, Electrical & Electronic

DeepPR: Progressive Recovery for Interdependent VNFs With Deep Reinforcement Learning

Genya Ishigaki et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Cooperative Jamming for Secure Transmission With Both Active and Passive Eavesdroppers

Jiangbo Si et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Enhancing Misbehavior Detection in 5G Vehicle-to-Vehicle Communications

Van-Linh Nguyen et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Information Systems

Secure Transmission for Intelligent Reflecting Surface-Assisted mmWave and Terahertz Systems

Jingping Qiao et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2020)

Article Computer Science, Hardware & Architecture

Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities

Shunliang Zhang et al.

COMPUTER NETWORKS (2020)

Article Engineering, Electrical & Electronic

Artificial-Noise-Aided Secure MIMO Wireless Communications via Intelligent Reflecting Surface

Sheng Hong et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Exploring a Brain-Based Cancelable Biometrics for Smart Headwear: Concept, Implementation, and Evaluation

Feng Lin et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2020)

Article Engineering, Electrical & Electronic

Device Association for RAN Slicing Based on Hybrid Federated Deep Reinforcement Learning

Yi-Jing Liu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Engineering, Electrical & Electronic

Visible Light Communication in 6G: Advances, Challenges, and Prospects

Nan Chi et al.

IEEE VEHICULAR TECHNOLOGY MAGAZINE (2020)

Article Computer Science, Hardware & Architecture

TOWARD SECURE AND LIGHTWEIGHT ACCESS AUTHENTICATION IN SAGINS

Su Yao et al.

IEEE WIRELESS COMMUNICATIONS (2020)

Review Computer Science, Hardware & Architecture

Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

Nesrine Kaaniche et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Proceedings Paper Computer Science, Information Systems

IMP4GT: IMPersonation Attacks in 4G NeTworks

David Rupprecht et al.

27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020) (2020)

Proceedings Paper Computer Science, Theory & Methods

Smart Jamming Attacks in 5G New Radio: A Review

Youness Arjoune et al.

2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC) (2020)

Article Computer Science, Hardware & Architecture

Decentralized Public Key Infrastructures atop Blockchain

Yannan Li et al.

IEEE NETWORK (2020)

Article Computer Science, Information Systems

When Machine Learning Meets Privacy in 6G: A Survey

Yuanyuan Sun et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Artificial Intelligence

Securing Vehicle-to-Everything (V2X) Communication Platforms

Monowar Hasan et al.

IEEE TRANSACTIONS ON INTELLIGENT VEHICLES (2020)

Article Computer Science, Hardware & Architecture

Artificial-Intelligence-Enabled Intelligent 6G Networks

Helin Yang et al.

IEEE NETWORK (2020)

Article Computer Science, Information Systems

A Survey of Moving Target Defenses for Network Security

Sailik Sengupta et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Telecommunications

Blockchain-enabled resource management and sharing for 6G communications

Hao Xu et al.

DIGITAL COMMUNICATIONS AND NETWORKS (2020)

Proceedings Paper Computer Science, Theory & Methods

Physical-Layer Security in Visible Light Communications

Anil Yesilkaya et al.

2020 2ND 6G WIRELESS SUMMIT (6G SUMMIT) (2020)

Article Computer Science, Information Systems

Data Security and Privacy Protection for Cloud Storage: A Survey

Pan Yang et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A Survey on Security Aspects for 3GPP 5G Networks

Jin Cao et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

Differential Privacy Techniques for Cyber Physical Systems: A Survey

Muneeb Ul Hassan et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Telecommunications

Security and privacy in 6G networks: New areas and new challenges

Minghao Wang et al.

DIGITAL COMMUNICATIONS AND NETWORKS (2020)

Article Computer Science, Artificial Intelligence

A System-Driven Taxonomy of Attacks and Defenses in Adversarial Machine Learning

Koosha Sadeghi et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2020)

Article Computer Science, Information Systems

Federated Learning in Mobile Edge Networks: A Comprehensive Survey

Wei Yang Bryan Lim et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Hardware & Architecture

6G: Opening New Horizons for Integration of Comfort, Security, and Intelligence

Guan Gui et al.

IEEE WIRELESS COMMUNICATIONS (2020)

Article Computer Science, Hardware & Architecture

Holographic MIMO Surfaces for 6G Wireless Networks: Opportunities, Challenges, and Trends

Chongwen Huang et al.

IEEE WIRELESS COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Network Slicing: Recent Advances, Taxonomy, Requirements, and Open Research Challenges

Latif U. Khan et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

Physical Layer Secret Key Generation in Static Environments

Nasser Aldaghri et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Information Systems

A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems

Ivan Farris et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security

Furqan Jameel et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Engineering, Electrical & Electronic

Learning-Aided Physical Layer Authentication as an Intelligent Process

He Fang et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2019)

Article Automation & Control Systems

Deep Learning Aided Grant-Free NOMA Toward Reliable Low-Latency Access in Tactile Internet of Things

Neng Ye et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Review Computer Science, Information Systems

Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends

Mohamed Amine Ferrag et al.

SECURITY AND COMMUNICATION NETWORKS (2019)

Article Computer Science, Information Systems

Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges

Shi-Cho Cha et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond

Yueyue Dai et al.

IEEE NETWORK (2019)

Article Computer Science, Hardware & Architecture

6G Wireless Communications: Vision and Potential Techniques

Ping Yang et al.

IEEE NETWORK (2019)

Article Engineering, Electrical & Electronic

Intelligent Resource Scheduling for 5G Radio Access Network Slicing

Mu Yan et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Engineering, Electrical & Electronic

6G WIRELESS NETWORKS Vision, Requirements, Architecture, and Key Technologies

Zhengquan Zhang et al.

IEEE VEHICULAR TECHNOLOGY MAGAZINE (2019)

Article Engineering, Electrical & Electronic

6G TECHNOLOGIES Key Drivers, Core Requirements, System Architectures, and Enabling Technologies

Baiqing Zong et al.

IEEE VEHICULAR TECHNOLOGY MAGAZINE (2019)

Review Computer Science, Information Systems

Blockchain for Internet of Things: A Survey

Hong-Ning Dai et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

Ten Trends in the Cellular Industry and an Outlook on 6G

Qi Bi

IEEE COMMUNICATIONS MAGAZINE (2019)

Article Computer Science, Information Systems

Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey

Jehad M. Hamamreh et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Proceedings Paper Telecommunications

vrAIn: A Deep Learning Approach Tailoring Computing and Radio Resources in Virtualized RANs

Jose A. Ayala-Romero et al.

MOBICOM'19: PROCEEDINGS OF THE 25TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (2019)

Article Computer Science, Information Systems

Network Intrusion Detection for IoT Security Based on Learning Techniques

Nadia Chaabouni et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Energy Depletion Attacks in Low Power Wireless Networks

Van-Linh Nguyen et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Security for 5G and Beyond

Ijaz Ahmad et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Telecommunications

Deep Learning for Launching and Mitigating Wireless Jamming Attacks

Tugba Erpek et al.

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING (2019)

Article Computer Science, Information Systems

Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations

Nataliia Neshenko et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Wireless Communications and Applications Above 100 GHz: Opportunities and Challenges for 6G and Beyond

Theodore S. Rappaport et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Security and Protocol Exploit Analysis of the 5G Specifications

Roger Piqueras Jover et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Space-Air-Ground Integrated Network: A Survey

Jiajia Liu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Computer Science, Information Systems

Comparative Analysis of Control Plane Security of SDN and Conventional Networks

AbdelRahman Abdou et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Computer Science, Information Systems

On Security Research Towards Future Mobile Network Generations

David Rupprecht et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Computer Science, Information Systems

Deep Learning for Intelligent Wireless Networks: A Comprehensive Survey

Qian Mao et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Computer Science, Information Systems

A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions

Imtiaz Parvez et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Engineering, Electrical & Electronic

Pilot Spoofing Attack Detection and Countermeasure

Jitendra K. Tugnait

IEEE TRANSACTIONS ON COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Detection of Pilot Contamination Attack based on Uncoordinated Frequency Shifts

Weile Zhang et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2018)

Article Computer Science, Theory & Methods

Semantic-Aware Searching Over Encrypted Data for Cloud Computing

Zhangjie Fu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Engineering, Electrical & Electronic

A New Wireless Communication Paradigm through Software-Controlled Metasurfaces

Christos Liaskos et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Multidisciplinary Sciences

Security and eavesdropping in terahertz wireless links

Jianjun Ma et al.

NATURE (2018)

Proceedings Paper Computer Science, Theory & Methods

A Formal Analysis of 5G Authentication

David Basin et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Article Engineering, Electrical & Electronic

NFV: Security Threats and Best Practices

Shankar Lal et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Computer Science, Information Systems

Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges

S. M. Riazul Islam et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Information Systems

Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges

Yiliang Liu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Information Systems

5G: Adaptable Networks Enabled by Versatile Radio Access Technologies

Conor Sexton et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Engineering, Electrical & Electronic

Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks

Yuanwei Liu et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2017)

Review Multidisciplinary Sciences

Post-quantum cryptography

Daniel J. Bernstein et al.

NATURE (2017)

Article Computer Science, Theory & Methods

Group Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization

Peng Xu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Engineering, Electrical & Electronic

ECG Authentication for Mobile Devices

Juan Sebastian Arteaga-Falconi et al.

IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT (2016)

Review Computer Science, Hardware & Architecture

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service

Salman Iqbal et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Information Systems

Survey on Threats and Attacks on Mobile Networks

Silvere Mavoungou et al.

IEEE ACCESS (2016)

Article Computer Science, Information Systems

Securing the Industrial-Tactile Internet of Things With Deterministic Silicon Photonics Switches

Ted H. Szymanski

IEEE ACCESS (2016)

Article Computer Science, Artificial Intelligence

CloudID: Trustworthy cloud-based and cross-enterprise biometric identification

Mohammad Haghighat et al.

EXPERT SYSTEMS WITH APPLICATIONS (2015)

Article Computer Science, Information Systems

Pseudonym Schemes in Vehicular Networks: A Survey

Jonathan Petit et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)

Article Engineering, Electrical & Electronic

Physical-Layer Security for MISO Visible Light Communication Channels

Ayman Mostafa et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2015)

Proceedings Paper Computer Science, Theory & Methods

How Secure and Quick is QUIC? Provable Security and Performance Analyses

Robert Lychev et al.

2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015 (2015)

Article Computer Science, Information Systems

Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation

Hongbo Liu et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2014)

Article Biochemical Research Methods

Security and Privacy in Molecular Communication and Networking: Opportunities and Challenges

Valeria Loscri et al.

IEEE TRANSACTIONS ON NANOBIOSCIENCE (2014)

Article Computer Science, Software Engineering

Security Challenges for the Public Cloud

Kui Ren et al.

IEEE INTERNET COMPUTING (2012)

Article Engineering, Electrical & Electronic

Towards security in nano-communication: Challenges and opportunities

Falko Dressler et al.

Nano Communication Networks (2012)

Article Engineering, Electrical & Electronic

Terahertz Terabit Wireless Communication

Kao-Cheng Huang et al.

IEEE MICROWAVE MAGAZINE (2011)

Article Computer Science, Hardware & Architecture

Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks

Patrick Traynor et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2009)

Article Engineering, Electrical & Electronic

Using the physical layer for wireless authentication in time-variant channels

Liang Xiao et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2008)

Article Computer Science, Information Systems

A study of the energy consumption characteristics of cryptographic algorithms and security protocols

NR Potlapally et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2006)

Article Computer Science, Information Systems

Enhancing security and privacy in biometrics-based authentication systems

NK Ratha et al.

IBM SYSTEMS JOURNAL (2001)