Security and Privacy of 6G
Chamitha de Alwis
University of Bedfordshire, Luton, United Kingdom
Search for more papers by this authorChamitha de Alwis
University of Bedfordshire, Luton, United Kingdom
Search for more papers by this authorSummary
Sixth-generation (6G) is envisaged to rely on the advancements of Artificial Intelligence and data analytics to provide personalized and fully automated seamless communication services. However, this may lead to several security and privacy issues and concerns. This chapter discusses the security threat landscape of future 6G networks. In the fifth-generation (5G) architecture, security and privacy threats are caused at access, backhaul, and core networks. Cyberware and critical infrastructure threats, network functions virtualization and software-defined networking-related threats, and cloud computing-related threats are the most common security issues in 5G. The chapter discusses the security considerations, 6G security vision, and the potential security Key Performance Indicators. It describes the security landscape for the envisioned 6G architecture which is classified into four key areas such as functional architecture, edge intelligence and cloudification, specialized subnetworks, and network management and orchestration.
References
- “ 6G Flagship ,” University of Oulu, 2020 , [Accessed on 29.03.2021]. [Online]. Available: https://www.oulu.fi/6gflagship/ .
- M. Giordani , M. Polese , M. Mezzavilla , S. Rangan , and M. Zorzi , “ Toward 6G networks: Use cases and technologies ,” IEEE Communications Magazine , vol. 58 , no. 3 , pp. 55 – 61 , 2020 .
- M. Latva-Aho and K. Leppänen , “ Key drivers and research challenges for 6G ubiquitous wireless intelligence (white paper) ,” Oulu, Finland : 6G Flagship , 2019 .
- Z. Zhang , Y. Xiao , Z. Ma , M. Xiao , Z. Ding , X. Lei , G. K. Karagiannidis , and P. Fan , “ 6G wireless networks: Vision, requirements, architecture, and key technologies ,” IEEE Vehicular Technology Magazine , vol. 14 , no. 3 , pp. 28 – 41 , 2019 .
- M. Wang , T. Zhu , T. Zhang , J. Zhang , S. Yu , and W. Zhou , “ Security and privacy in 6G networks: New areas and new challenges ,” Digital Communications and Networks , vol. 6 , pp. 281 – 291 , 2020 .
-
S. J. Nawaz
,
S. K. Sharma
,
S. Wyne
,
M. N. Patwary
, and
M. Asaduzzaman
, “
Quantum machine learning for 6G communication networks: state-of-the-art and vision for the future
,”
IEEE Access
, vol.
7
, pp.
46 317
–
46 350
,
2019
.
10.1109/ACCESS.2019.2909490 Google Scholar
- E. Peltonen , M. Bennis , M. Capobianco , M. Debbah , A. Ding , F. Gil-Casti neira , M. Jurmu , T. Karvonen , M. Kelanti , A. Kliks et al ., “ 6G White Paper on Edge Intelligence ,” arXiv preprint arXiv:2004.14850 , 2020 .
- V. Ziegler , H. Viswanathan , H. Flinck , M. Hoffmann , V. Räisänen , and K. Hätönen , “ 6G architecture to connect the worlds ,” IEEE Access , vol. 8 , pp. 173 508 – 173 520 , 2020 .
- F. Tariq , M. R. Khandaker , K.-K. Wong , M. A. Imran , M. Bennis , and M. Debbah , “ A speculative study on 6G ,” IEEE Wireless Communications , vol. 27 , no. 4 , pp. 118 – 125 , 2020 .
- W. Li , Z. Su , R. Li , K. Zhang , and Y. Wang , “ Blockchain-based data security for artificial intelligence applications in 6G networks ,” IEEE Network , vol. 34 , no. 6 , pp. 31 – 37 , 2020 .
- C. Benzaid and T. Taleb , “ ZSM security: Threat surface and best practices ,” IEEE Network , vol. 34 , no. 3 , pp. 124 – 133 , 2020 .
- R. Khan , P. Kumar , D. N. K. Jayakody , and M. Liyanage , “ A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions ,” IEEE Communication Surveys and Tutorials , vol. 22 , no. 1 , pp. 196 – 248 , 2019 .
- S. Zhang and D. Zhu , “ Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities ,” Computer Networks , vol. 183 , p. 107556 , 2020 .
- G. Gui , M. Liu , F. Tang , N. Kato , and F. Adac hi , “ 6G: Opening new horizons for integration of comfort, security and intelligence ,” IEEE Wireless Communications , vol. 27 , pp. 126 – 132 , 2020 .
-
M. Liyanage
,
I. Ahmad
,
A. B. Abro
,
A. Gurtov
, and
M. Ylianttila
,
A Comprehensive Guide to 5G Security
.
John Wiley & Sons
,
2018
.
10.1002/9781119293071 Google Scholar
- M. Liyanage , A. B. Abro , M. Ylianttila , and A. Gurtov , “ Opportunities and challenges of software-defined mobile networks in network security ,” IEEE Security & Privacy , vol. 14 , no. 4 , pp. 34 – 44 , 2016 .
- B. Schneier , “ Artificial intelligence and the attack/defense balance ,” IEEE Security & Privacy , vol. 16 , no. 2 , pp. 96 – 96 , 2018 .
- A. Pouttu , F. Burkhardt , C. Patachia , L. Mendes , G. R. Brazil , S. Pirttikangas , E. Jou , P. Kuvaja , F. T. Finland , M. Heikkilä et al ., “ 6G White Paper on Validation and Trials for Verticals Towards 2030's .” [Online]. Available: https://www.6gchannel.com/wp-content/uploads/2020/04/6g-white-paper-validation-trials.pdf .
- United Nations (UN) #Envision2030 Sustainable Development Goals , “United Nations (UN).” [Online]. Available: https://sdgs.un.org/goals .
- K. B. Letaief , W. Chen , Y. Shi , J. Zhang , and Y. A. Zhang , “ The roadmap to 6G: AI empowered wireless networks ,” IEEE Communications Magazine , vol. 57 , no. 8 , pp. 84 – 90 , 2019 .
- M. Yao , M. Sohul , V. Marojevic , and J. H. Reed , “ Artificial intelligence defined 5G radio access networks ,” IEEE Communications Magazine , vol. 57 , no. 3 , pp. 14 – 20 , 2019 .
- H. Viswanathan and P. E. Mogensen , “ Communications in the 6G era ,” IEEE Access , vol. 8 , pp. 57 063 – 57 074 , 2020 .
- S. Deng , H. Zhao , W. Fang , J. Yin , S. Dustdar , and A. Y. Zomaya , “ Edge intelligence: The confluence of edge computing and artificial intelligence ,” IEEE Internet of Things Journal , vol. 7 , no. 8 , pp. 7457 – 7469 , 2020 .
- G. Plastiras , M. Terzi , C. Kyrkou , and T. Theocharidcs , “Edge intelligence: Challenges and opportunities of near-sensor machine learning applications,” in 2018 IEEE 29th International Conference on Application-specific Systems, Architectures and Processors (ASAP) , 2018 , pp. 1 – 7 .
- S. Xu , Y. Qian , and R. Q. Hu , “ Edge intelligence assisted gateway defense in cyber security ,” IEEE Network , vol. 34 , no. 4 , pp. 14 – 19 , 2020 .
- M. Mukherjee , R. Matam , C. X. Mavrom oustakis , H. Jiang , G. Mastorakis , and M. Guo , “ Intelligent edge computing: Security and privacy challenges ,” IEEE Communications Magazine , vol. 58 , no. 9 , pp. 26 – 31 , 2020 .
-
R. Kalaiprasath
,
R. Elankavi
, and
R. Udayakumar
, “
Cloud security and compliance-a semantic approach in end to end security
.”
International Journal on Smart Sensing & Intelligent Systems
, vol.
10
, pp.
482
–
494
,
2017
.
10.21307/ijssis-2017-265 Google Scholar
- G. ETSI , “ 004, Zero-touch network and service management (ZSM) ,” Reference Architecture , 2020 . [Online]. Available: https://www.etsi.org/deliver/etsi_gs/ZSM/001_099/002/01.01.01_60/gs_ZSM002v010101p.pdf .
- M. Ylianttila , R. Kantola , A. Gurtov , L. Mucchi , I. Oppermann , Z. Yan , T. H. Nguyen , F. Liu , T. Hewa , M. Liyanage et al ., “ 6G White Paper: Research Challenges for Trust, Security and Privacy ,” arXiv preprint arXiv:2004.11665 , 2020 .
- R. Yasmin , J. Petäjäjärvi , K. Mikhaylov , and A. Pouttu , “On the integration of lorawan with the 5G test network,” in 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) IEEE, 2017 , pp. 1 – 6 .
-
B. Deebak
and
F. Al-Turjman
, “
Drone of
IoT in 6G wireless communications: Technology, challenges, and future aspects
,” in
Unmanned Aerial Vehicles in Smart Cities
.
Springer
,
2020
, pp.
153
–
165
.
10.1007/978-3-030-38712-9_9 Google Scholar
- P. B. Johnston and A. K. Sarbahi , “ The impact of US drone strikes on terrorism in Pakistan ,” International Studies Quarterly , vol. 60 , no. 2 , pp. 203 – 219 , 2016 .
-
I. Petrov
and
T. Janevski
, “
5G mobile technologies and early 6G viewpoints
,”
European Journal of Engineering Research and Science
, vol.
5
, no.
10
, pp.
1240
–
1246
,
2020
.
10.24018/ejers.2020.5.10.2169 Google Scholar
- K. Lebeck , K. Ruth , T. Kohno , and F. Roesner , “Towards security and privacy for multi-user augmented reality: Foundations with end users,” in 2018 IEEE Symposium on Security and Privacy (SP) IEEE, 2018 , pp. 392 – 408 .
- C. Insights , “ 40+ corporations working on autonomous vehicles ,” 2019 .
- H. Shahinzadeh , J. Moradi , G. B. Gharehpetian , H. Nafisi , and M. Abedi , “Internet of energy (IoE) in smart power systems,” in 2019 5th Conference on Knowledge Based Engineering and Innovation (KBEI) IEEE, 2019 , pp. 627 – 636 .
- I. Andrea , C. Chrysostomou , and G. Hadjichristofi , “Internet of things: Security vulnerabilities and challenges,” in Proceedings - IEEE Symposium on Computers and Communications , vol. 2016-February, no. August 2017, pp. 180 – 187 , 2016 .
- D. Pliatsios , P. Sarigiannidis , T. Lagkas , and A. G. Sarigiannidis , “ A survey on SCADA systems: Secure protocols, incidents, threats and tactics ,” IEEE Communication Surveys and Tutorials , vol. 22 , no. 3 , pp. 1942 – 1976 , 2020 .
-
E. Hossain
,
I. Khan
,
F. Un-Noor
,
S. S. Sikander
, and M.
S. H. Sunny
, “
Application of big data and machine learning in smart grid, and associated security concerns: A review
,”
IEEE Access
, vol.
7
, no.
c
, pp.
13 960
–
13 988
,
2019
.
10.1109/ACCESS.2019.2894819 Google Scholar
- Z. Li , J. Kang , R. Yu , D. Ye , Q. Deng , a nd Y. Zhang , “ Consortium blockchain for secure energy trading in industrial Internet of Things ,” IEEE Transactions on Industrial Informatics , vol. 14 , no. 8 , pp. 3690 – 3700 , 2018 .
- A. Miglani , N. Kumar , V. Chamola , and S. Zeadally , “ Blockchain for internet of energy management: Review, solutions, and challenges ,” Computer Communications , vol. 151 , pp. 395 – 418 , 2020 .
- S. Nahavandi , “ Industry 5.0–A human-centric solution ,” Sustainability , vol. 11 , no. 16 , p. 4371 , 2019 .
- X. Xu , “ From cloud computing to cloud manufacturing ,” Robotics and Computer-integrated Manufacturing , vol. 28 , no. 1 , pp. 75 – 86 , 2012 .
-
M. Grieves
and
J. Vickers
, “
Digital twin: Mitigating unpredictable, undesirable emergent behavior in complex systems
,” in
Transdisciplinary Perspectives on Complex Systems
.
Springer
,
2017
, pp.
85
–
113
.
10.1007/978-3-319-38756-7_4 Google Scholar
- T. Hewa , M. Ylianttila , and M. Liyanage , “ Survey on blockchain based smart contracts: Applications, opportunities and challenges ,” Journal of Network and Computer Applications , vol. 177 , p. 102857 , 2020 .
- M. Barreno , B. Nelson , R. Sears , A. D. Joseph , and J. D. Tygar , “Can machine learning be secure?” in Proceedings of the 2006 ACM Symposium on Information, computer and communications security , 2006 , pp. 16 – 25 .
- H. Kim , J. Park , M. Bennis , and S.-L. Kim , “ On-device Federated Learning Via Blockchain and its Latency Analysis ,” arXiv preprint arXiv:1808.03949 , 2018 .
-
N. Weerasinghe
,
T. Hewa
,
M. Liyanage
,
S. S. Kanhere
, and
M. Ylianttila
, “
A novel blockchain-as-a-service (BaaS) platform for local 5G operators
,”
IEEE Open Journal of the Communications Society
, vol.
2
, pp.
575
–
601
,
2021
.
10.1109/OJCOMS.2021.3066284 Google Scholar
- J. Liu and Z. Liu , “ A survey on security verification of blockchain smart contracts ,” IEEE Access , vol. 7 , pp. 77 894 – 77 904 , 2019 .
- T. M. Hewa , Y. Hu , M. Liyanage , S. Kanhare , and M. Ylianttila , “ Survey on blockchain based smart contracts: Technical aspects and future research ,” IEEE Access , vol. 9 , pp. 87643 – 87662 , 2021 .
- S. Dey , “Securing majority-attack in blockchain using machine learning and algorithmic game theory: A proof of work,” in 2018 10th Computer Science and Electronic Engineering (CEEC) IEEE, 2018 , pp. 7 – 10 .
- J. Moubarak , E. Filiol , and M. Chamoun , “On blockchain security and relevant attacks,” in 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM) IEEE, 2018 , pp. 1 – 6 .
-
D. Efanov
and
P. Roschin
, “
The all-pervasiveness of the blockchain technology
,”
Procedia Computer Science
, vol.
123
, pp.
116
–
121
,
2018
.
10.1016/j.procs.2018.01.019 Google Scholar
- U. W. Chohan , “ The double spending probl em and cryptocurrencies ,” Available at SSRN 3090174 , 2017 .
- S. Zhang and J.-H. Lee , “ Double-spending with a sybil attack in the bitcoin decentralized network ,” IEEE Transactions on Industrial Informatics , vol. 15 , no. 10 , pp. 5715 – 5722 , 2019 .
- M. I. Mehar , C. L. Shier , A. Giambattista , E. Gong , G. Fletcher , R. Sanayhie , H. M. Kim , and M. Laskowski , “ Understanding a revolutionary and flawed grand experiment in blockchain: The dao attack ,” Journal of Cases on Information Technology (JCIT) , vol. 21 , no. 1 , pp. 19 – 32 , 2019 .
- P. Otte , M. de Vos , and J. Pouwelse , “ Trustchain: A sybil-resistant scalable blockchain ,” Future Generation Computer Systems , vol. 107 , pp. 770 – 780 , 2020 .
-
Y. Cai
and
D. Zhu
, “
Fraud detections for online businesses: A perspective from blockchain technology
,”
Financial Innovation
, vol.
2
, no.
1
, p.
20
,
2016
.
10.1186/s40854-016-0039-4 Google Scholar
- Q. Feng , D. He , S. Zeadally , M. K. Khan , and N. Kumar , “ A survey on privacy protection in blockchain system ,” Journal of Network and Computer Applications , vol. 126 , pp. 45 – 58 , 2019 .
- B. Bünz , S. Agrawal , M. Zamani , and D. Boneh , “Zether: Towards privacy in a smart contract world,” in International Conference on Financial Cryptography and Data Security Springer, 2020 , pp. 423 – 443 .
- A. Dorri , M. Steger , S. S. Kanhere , and R. Jurdak , “ Blockchain: A distributed solution to automotive security and privacy ,” IEEE Communications Magazine , vol. 55 , no. 12 , pp. 119 – 125 , 2017 .
- Z. Bao , Q. Wang , W. Shi , L. Wang , H. Lei , and B. Chen , “ When blockchain meets SGX: An overview, challenges, and open issues ,” IEEE Access , vol. 8 , pp. 170404 – 170420 , 2020 .
- A. Groce , J. Feist , G. Grieco , and M. Colburn , “What are the actual flaws in important smart contracts (and how can we find them)?” in International Conference on Financial Cryptography and Data Security Springer, 2020 , pp. 634 – 653 .
- C. Liu , J. Gao , Y. Li , H. Wang , and Z. Chen , “ Studying gas exceptions in blockchain-based cloud applications ,” Journal of Cloud Computing , vol. 9 , no. 1 , pp. 1 – 25 , 2020 .
- X. Li , P. Jiang , T. Chen , X. Luo , and Q. Wen , “ A survey on the security of blockchain systems ,” Future Generation Computer Systems , vol. 107 , pp. 841 – 853 , 2020 .
- K. Chatterjee , A. K. Goharshady , and A. Pourdamghani , “Probabilistic smart contracts: Secure randomness on the blockchain,” in 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) IEEE, 2019 , pp. 403 – 412 .
- C. G. Harris , “The risks and challenge s of implementing ethereum smart contracts,” in 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) IEEE, 2019 , pp. 104 – 107 .
-
H. Poston
, “
Mapping the owasp top ten to blockchain
,”
Procedia Computer Science
, vol.
177
, pp.
613
–
617
,
2020
.
10.1016/j.procs.2020.10.087 Google Scholar
-
G. Karame
and
S. Capkun
, “
Blockchain security and privacy
,”
IEEE Security & Privacy
, vol.
16
, no.
04
, pp.
11
–
12
,
2018
.
10.1109/MSP.2018.3111241 Google Scholar
- F. H. Pohrmen , R. K. Das , and G. Saha , “ Blockchain-based security aspects in heterogeneous internet-of-things networks: A survey ,” Transactions on Emerging Telecommunications Technologies , vol. 30 , no. 10 , p. e3741 , 2019 .
- A. Singh , R. M. Parizi , Q. Zhang , K.-K. R. Choo , and A. Dehghantanha , “ Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities ,” Computers & Security , vol. 88 , p. 101654 , 2020 .
- Y. Zhang , S. Ma , J. Li , K. Li , S. Nepal , and D. Gu , “SMARTSHIELD: Automatic smart contract protection made easy,” in 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER) IEEE, 2020 , pp. 23 – 34 .
- N. Atzei , M. Bartoletti , and T. Cimoli , “A Survey of attacks on ethereum smart contracts (SOK),” in International Conference on Principles of Security and Trust Springer, 2017 , pp. 164 – 186 .
- C. Liu , H. Liu , Z. Cao , Z. Chen , B. Chen , and B. Roscoe , “ReGuard: Finding reentrancy bugs in smart contracts,” in Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings ACM, 2018 , pp. 65 – 68 .
- K. Bhargavan , A. Delignat-Lavaud , C. Fournet , A. Gollamudi , G. Gonthier , N. Kobeissi , A. Rastogi , T. Sibut-Pinote , N. Swamy , and S. Zanella-Béguelin , “Short paper: Formal verification of smart contracts,” in Proceedings of the 11th ACM Workshop on Programming Languages and Analysis for Security (PLAS), in Conjunction with ACM CCS , 2016 , pp. 91 – 96 .
-
P. Schaar
, “
Privacy by design
,”
Identity in the Information Society
, vol.
3
, no.
2
, pp.
267
–
274
,
2010
.
10.1007/s12394-010-0055-x Google Scholar
- R. Cheng , F. Zhang , J. Kos , W. He , N. Hynes , N. Johnson , A. Juels , A. Miller , and D. Song , “ Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts ,” 1804 .
- R. Gupta , S. Tanwar , F. Al-Turjman , P. Italiya , A. Nauman , and S. W. Kim , “ Smart contract privacy protection using AI in cyber-physical systems: Tools, techniques and challenges ,” IEEE Access , vol. 8 , pp. 24 746 – 24 772 , 2020 .
-
M. Niranjanamurthy
,
B. Nithya
, and
S. Jagannatha
, “
Analysis of Blockchain technology: pros, cons and SWOT
,”
Cluster Computing
, vol.
22
, no.
6
, pp.
14 743
–
14 757
,
2019
.
10.1007/s10586-018-2387-5 Google Scholar
- M. Roetteler , M. Naehrig , K. M. Svore , and K. Lauter , “Quantum resource estimates for computing elliptic curve discrete logarithms,” in International Conference on the Theory and Application of Cryptology and Information Security Springer, 2017 , pp. 241 – 270 .
- D. J. Bernstein and T. Lange , “ Post-quantum cryptography ,” Nature , vol. 549 , no. 7671 , pp. 188 – 194 , 2017 .
- S. Tarantino , B. Da Lio , D. Cozzolino , and D. Bacco , “ Feasibility of quantum communications in aquatic scenarios ,” Optik , vol. 216 , p. 164639 , 2020 .
- F. Bouchard , R. Fickler , R. W. Boyd , and E. Karimi , “ High-dimensional quantum cloning and applications to quantum hacking ,” Science advances , vol. 3 , no. 2 , e1601915 , 2017 .
-
A. Lohachab
,
A. Lohachab
, and
A. Jang ra
, “
A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum iot networks
,”
Internet of Things
, vol.
9
, p.
100174
,
2020
.
10.1016/j.iot.2020.100174 Google Scholar
- T. Saito , K. Xagawa , and T. Yamakawa , “Tightly-secure key-encapsulation mechanism in the quantum random oracle model,” in Annual International Conference on the Theory and Applications of Cryptographic Techniques Springer, 2018 , pp. 520 – 551 .
- ENISA , “ Artificial intelligence cybersecurity challenges ,” ENISA, Tech. Rep., December 2020 .
- R. S. S. Kumar , D. O. Brien , K. Albert , S. Viljöen , and J. Snover , “ Failure Modes in Machine Learning Systems ,” arXiv e-prints , arXiv:1911.11034, Nov. 2019 .
- M. S. Jere , T. Farnan , and F. Koushanfar , “ A taxonomy of attacks on federated learning ,” IEEE Security & Privacy , vol. 19 , no. 2 , pp. 20 – 28 , 2021 .
- N. Khurana , S. Mittal , A. Piplai , and A. Joshi , “Preventing poisoning attacks on ai based threat intelligence systems,” in 2019 IEEE 29th International Workshop on Machine Learning for Signal Processing (MLSP) IEEE, 2019 , pp. 1 – 6 .
- H. Xiao , B. Biggio , G. Brown , G. Fumera , C. Eckert , and F. Roli , “Is feature selection secure against training data poisoning?” in Proceedings of the 32nd International Conference on International Conference on Machine Learning - Volume 37 , ser. ICML'15 JMLR.org, 2015 , pp. 1689 – 1698 .
- A. Kurakin , D. Boneh , F. Tramèr , I. Goodfellow , N. Papernot , and P. McDaniel , “ Ensemble adversarial training: Attacks and defenses ,” 2018 . [Online]. Available: https://openreview.net/pdf?id=rkZvSe-RZ .
-
M. Soll
,
T. Hinz
,
S. Magg
, and
S. Wermter
, “
Evaluating defensive distillation for defending text processing neural networks against adversarial examples
,” in
Artificial Neural Networks and Machine Learning – ICANN 2019: Image Processing
,
I. V. Tetko
,
V. Kůrková
,
P. Karpov
, and
F. Theis
, Eds
Cham
:
Springer International Publishing
,
2019
, pp.
685
–
696
.
10.1007/978-3-030-30508-6_54 Google Scholar
-
A. Roy
,
A. Chhabra
,
C. A. Kamhoua
, and
P. Mohapatra
, “A moving target defense against adversarial machine learning,” in
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing
, ser. SEC '19
New York, NY, USA
: Association for Computing Machinery, 2019, pp.
383
–
388
. [Online]. Available:
https://doi.org/10.1145/3318216.3363338
.
10.1145/3318216.3363338 Google Scholar
- J. Liu , L. Chen , A. Miné , and J. Wang , “ Input Validation for Neural Networks Via Runtime Local Robustness Verification ,” CoRR , vol. abs/2002.03339, 2020 . [Online]. Available: https://arxiv.org/abs/2002.03339 .
- B. Li , C. Chen , W. Wang , and L. Carin , “ Certified Adversarial Robustness with Additive Noise ,” arXiv e-prints , p. arXiv:1809.03113, Sep. 2018 .
- J. Ma , R. Shrestha , J. Adelberg , C.-Y. Yeh , E. K. Zahed Hossain , J. M. Jornet , and D. M. Mittleman , “ Security and eavesdropping in terahertz wireless links ,” Nature , vol. 563 , no. 8 , pp. 89 – 93 , 2018 .
- V. Petrov , D. Moltchanov , J. M. Jornet , and Y. Koucheryavy , “Exploiting multipath terahertz communications for physical layer security in beyond 5G networks,” in IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) , 2019 , pp. 865 – 872 .
- M. M. U. Rahman , Q. H. Abbasi , N. Chopra , K. Qaraqe , and A. Alomainy , “ Physical layer authentication in nano networks at terahertz frequencies for biomedical applications ,” IEEE Access , vol. 5 , pp. 7808 – 7815 , 2017 .
- M. S. Saud , H. Chowdhury , and M. Katz , “Heterogeneous software-defined networks: Implementation of a hybrid radio-optical wireless network,” in 2017 IEEE Wireless Communications and Networking Conference (WCNC) , 2017 , pp. 1 – 6 .
- M. A. Arfaoui , M. D. Soltani , I. Tavakkolnia , A. Ghrayeb , M. Safari , C. M. Assi , and H. Haas , “ Physical layer security for visible light communication systems: A survey ,” IEEE Communication Surveys and Tutorials , vol. 22 , no. 3 , pp. 1887 – 1908 , 2020 .
- M. A. Arfaoui , A. Ghrayeb , and C. M. Assi , “ Secrecy performance of the MIMO VLC wiretap channel with randomly located eavesdropper ,” IEEE Transactions on Wireless Communications , vol. 19 , no. 1 , pp. 265 – 278 , 2020 .
- J. Chen and T. Shu , “ Statistical modeling and analysis on the confidentiality of indoor VLC systems ,” IEEE Transactions on Wireless Communications , vol. 19 , no. 7 , pp. 4744 – 4757 , 2020 .
- S. Soderi , “Enhancing security in 6G visible light communications,” in 2020 2nd 6G Wireless Summit (6G SUMMIT) , 2020 , pp. 1 – 5 .
- Q. Wu and R. Zhang , “ Intelligent reflecting surface enhanced wireless network via joint active and passive beamforming ,” IEEE Transactions on Wireless Communications , vol. 18 , no. 11 , pp. 5394 – 5409 , 2019 .
- M. Cui , G. Zhang , and R. Zhang , “ Secure wireless communication via intelligent reflecting surface ,” IEEE Wireless Communications Letters , vol. 8 , no. 5 , pp. 1410 – 1414 , 2019 .
- Z. Ji , P. L. Yeoh , D. Zhang , G. Chen , Y. Zhang , Z. He , H. Yin , and Y. Li , “ Secret key generation for intelligent reflecting surface assisted wireless communication networks ,” IEEE Transact ions on Vehicular Technology , vol. 70 , no. 1 , pp. 1030 – 1034 , 2021 .
- T. Nakano , Y. Okaie , S. Kobayashi , T. Hara , Y. Hiraoka , and T. Haraguchi , “ Methods and applications of mobile molecular communication ,” Proceedings of the IEEE , vol. 107 , no. 7 , pp. 1442 – 1456 , 2019 .
-
F. Dressler
and
F. Kargl
, “
Towards security in nano-communication: Challenges and opportunities
,”
Nano Communication Networks
, vol.
3
, no.
3
, pp.
151
–
160
,
2012
.
10.1016/j.nancom.2012.08.001 Google Scholar
- L. Mucchi , A. Martinelli , S. Jayousi , S. Caputo , and M. Pierobon , “ Secrecy capacity and secure distance for diffusion-based molecular communication systems ,” IEEE Access , vol. 7 , pp. 110 687 – 110 697 , 2019 .
- Y. Qu , L. Gao , T. H. Luan , Y. Xiang , S. Yu , B. Li , and G. Zheng , “ Decentralized privacy using blockchain-enabled federated learning in fog computing ,” IEEE Internet of Things Journal , vol. 7 , no. 6 , pp. 5171 – 5183 , 2020 .
-
C. Dwork
,
A. Roth
et al
., “
The algorithmic foundations of differential privacy
.”
Foundations and Trends in Theoretical Computer Science
, vol.
9
, no.
3–4
, pp.
211
–
407
,
2014
.
10.1561/0400000042 Google Scholar
- S. Li , S. Zhao , G. Min , L. Qi , and G. Liu , “ Lightweight privacy-preserving scheme using homomorphic encryption in industrial Internet of Things ,” IEEE Internet of Things Journal , vol. 9 , pp. 14542 – 14550 , 2021 .
- T. Nguyen , N. Tran , L. Loven , J. Partala , M.-T. Kechadi , and S. Pirttikangas , “Privacy-aware blockchain innovation for 6G: Challenges and opportunities,” in 2020 2nd 6G Wireless Summit (6G SUMMIT) IEEE, 2020 , pp. 1 – 5 .
- Y. Sun , J. Liu , J. Wang , Y. Cao , and N. Kato , “ When machine learning meets privacy in 6G: A survey ,” IEEE Communication Surveys and Tutorials , vol. 22 , no. 4 , pp. 2694 – 2724 , 2020 .
- A. A. Abd EL-Latif , B. Abd-El-Atty , E. M. Abou-Nassar , and S. E. Venegas-Andraca , “ Controlled alternate quantum walks based privacy preserving healthcare images in Internet of Things ,” Optics & Laser Technology , vol. 124 , p. 105942 , 2020 .
- D. Dharminder and D. Mishra , “ LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication ,” Transactions on Emerging Telecommunications Technologies , vol. 31 , no. 2 , p. e3810 , 2020 .
- Y. Du , M.-H. Hsieh , T. Liu , D. Tao , and N. Liu , “ Quantum Noise Protects Quantum Classifiers Against Adversaries ,” arXiv preprint arXiv:2003.09416 , 2020 .
- M. Diaz , H. Wang , F. P. Calmon , and L. Sankar , “ On the robustness of information-theoretic privacy measures and mechanisms ,” IEEE Transactions on Information Theory , vol. 66 , no. 4 , pp. 1949 – 1978 , 2020 .
-
M. Bloch
,
O. Günlü
,
A. Yener
,
F. Oggie r
,
H. V. Poor
,
L. Sankar
, and
R. F. Schaefer
, “
An overview of information-theoretic security and privacy: Metrics, limits and applications
,”
IEEE Journal on Selected Areas in Information Theory
, vol.
2
, no.
1
, pp.
5
–
22
,
2021
.
10.1109/JSAIT.2021.3062755 Google Scholar