Journal of Information Security Reserach ›› 2023, Vol. 9 ›› Issue (9): 822-.
Online:
2023-09-17
Published:
2023-09-24
李玲1朱立东1李卫榜2
通讯作者:
李玲
博士研究生.主要研究方向为网络空间安全.
174959172@qq.com
作者简介:
李玲
博士研究生.主要研究方向为网络空间安全.
174959172@qq.com
朱立东
博士,教授,博士生导师.主要研究方向为卫星通信、天地一体化网络.
zld@uestc.edu.cn
李卫榜
博士,讲师,硕士生导师,CCF会员.主要研究方向为大数据、人工智能.
wbli2003@163.com
[1]DeAlwis C, Kalla A, Pham Q V, et al. Survey on 6G frontiers: Trends, applications, requirements, technologies and future research[J]. IEEE Open Journal of the Communications Society, 2021, 2: 836886[2]Gui G, Liu M, Tang F, et al. 6G: Opening new horizons for integration of comfort, security, and intelligence[J]. IEEE Wireless Communications, 2020, 27(5): 126132[3]Ferrag M A, Maglaras L, Derhab A. Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends[J]. arXiv preprint, arXiv:1901.09374, 2019[4]Ji B, Han Y, Liu S, et al. Several key technologies for 6G: Challenges and opportunities[J]. IEEE Communications Standards Magazine, 2021, 5(2): 4451[5]Mucchi L, Jayousi S, Caputo S, et al. Physicallayer security in 6G networks[J]. IEEE Open Journal of the Communications Society, 2021, 2: 19011914[6]Marzetta T L. Noncooperative cellular wireless with unlimited numbers of base station antennas[J]. IEEE Trans on Wireless Communications, 2010, 9(11): 35903600[7]Bjrnson E, Sanguinetti L, Wymeersch H, et al. Massive MIMO is a reality—What is next?: Five promising research directions for antenna arrays[J]. Digital Signal Processing, 2019, 94: 320[8]Kapetanovic D, Zheng G, Rusek F. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks[J]. IEEE Communications Magazine, 2015, 53(6): 2127 [9]Timilsina S, Kudathanthirige D, Amarasuriya G. Physical layer security in cellfree massive MIMO[C] Proc of IEEE Global Communications Conf (GLOBECOM). Piscataway, NI: IEEE, 2018: 17[10]Hoang T M, Ngo H Q, Duong T Q, et al. Cellfree massive MIMO networks: Optimal power control against activeeavesdropping[J]. IEEE Trans on Communications, 2018, 66(10): 47244737[11]Zhang X,Guo D, An K. Secure communication in multigroup multicasting cellfree massive mimo networks with active spoofing attack[J]. Electronics Letters, 2019, 55(2): 9698[12]Huang C, Zappone A, Alexandropoulos G C, et al. Reconfigurable intelligent surfaces for energy efficiency in wireless communication[J]. IEEE Trans on Wireless Communications, 2019, 18(8): 41574170[13]Cui M, Zhang G, Zhang R. Secure wireless communication via intelligent reflectingsurface[J]. IEEE Wireless Communications Letters, 2019, 8(5): 14101414[14]Zhang S, Zhang H, Di B, et al. Beyond intelligent reflecting surfaces: Reflectivetransmissive metasurface aided communications for fulldimensional coverage extension[J]. IEEE Trans on Vehicular Technology, 2020, 69(11): 1390513909[15]Shen S, Yu C, Zhang K, et al. Adaptive and dynamic security in AIempowered 6G: From an energy efficiency perspective[J]. IEEE Communications Standards Magazine, 2021, 5(3): 8088[16]Tariq F, Khandaker M R A, Wong K K, et al. A speculative study on 6G[J]. IEEE Wireless Communications, 2020, 27(4): 118125[17]Mao B, Kawamoto Y, Kato N. AIbased joint optimization of QoS and security for 6G energy harvesting Internet of things[J]. IEEE Internet of Things Journal, 2020, 7(8): 70327042[18]Xiao Y, Shi G, Krunz M. Towards ubiquitous AI in 6G with federated learning[J]. arXiv preprint, arXiv:2004.13563, 2020[19]Liu Y, Yuan X, Xiong Z, et al. Federated learning for 6G communications: Challenges, methods, and future directions[J]. China Communications, 2020, 17(9): 105118[20]Song Z, Sun H, Yang H H, et al. Reputationbased federated learning for secure wireless networks[J]. IEEE Internet of Things Journal, 2021, 9(2): 12121226[21]Zhao R, Yin Y, Shi Y, et al. Intelligent intrusion detection based on federated learning aided long shorttermmemory[J]. Physical Communication, 2020, 42: 101157[22]Zhang Z, Cao Y, Cui Z, et al. A manyobjective optimization based intelligent intrusion detection algorithm for enhancing security of vehicular networks in 6G[J]. IEEE Trans on Vehicular Technology, 2021, 70(6): 52345243[23]Lv Z, Qiao L, Li J, et al. Deeplearningenabled security issues in the Internet of things[J]. IEEE Internet of Things Journal, 2020, 8(12): 95319538[24]Zheng Z, Wang L, Zhu F, et al. Potential technologies and applications based on deep learning in the 6G networks[J]. Computers & Electrical Engineering, 2021, 95: 107373[25]Ankita A, Rani S. Machine learning and deep learning for malware and ransomware attacks in 6G network[C] Proc of the 4th Int Conf on Computational Intelligence and Communication Technologies (CCICT). Piscataway, NJ: IEEE, 2021: 3944[26]Wang J, Ling X, Le Y, et al. Blockchainenabled wireless communications: A new paradigm towards 6G[J]. National Science Review, 2021, 8(9): nwab069[27]Sun W, Li S, Zhang Y. Edge caching inblockchain empowered 6G[J]. China Communications, 2021, 18(1): 117[28]Okon A A, Sholiyi O S, Elmirghani J M H, et al. Blockchain for spectrum management in 6G networks[M] Wireless Blockchain: Principles, Technologies and Applications. Hoboken, NJ: John Wiley & Sons, 2021: 137159[29]Hewa T, Gür G, Kalla A, et al. The role of blockchain in 6G: Challenges, opportunities and research directions[C] Proc of the 2nd 6G Wireless Summit (6G SUMMIT). Piscataway, NJ: IEEE, 2020: 15[30]Xu H, Klaine P V, Onireti O, et al. Blockchainenabled resource management and sharing for 6G communications[J]. Digital Communications and Networks, 2020, 6(3): 261269[31]Nguyen T, Tran N, Loven L, et al. Privacyaware blockchain innovation for 6G: Challenges and opportunities[C] Proc of the 2nd 6G Wireless Summit (6G SUMMIT). Piscataway, NJ: IEEE, 2020: 15[32]Velliangiri S, Manoharan R, Ramachandran S, et al. Blockchain based privacy preserving framework for emerging 6G wireless communications[J]. IEEE Trans on Industrial Informatics, 2021, 18(7): 48684874[33]Liu L, Liang W, Mang G, et al. Blockchain based spectrum sharing over 6G hybrid cloud[C] Proc of Int Wireless Communications and Mobile Computing (IWCMC). Piscataway, NJ: IEEE, 2021: 492497[34]Zhang H, Leng S, Wu F, et al. A DAG blockchain enhanced userautonomy spectrum sharing framework for 6Genabled IoT[J]. IEEE Internet of Things Journal, 2022, 9(11): 80128023[35]Aggarwal S, Kumar N, Tanwar S. Blockchainenvisioned UAV communication using 6G networks: Open issues, use cases, and future directions[J]. IEEE Internet of Things Journal, 2020, 8(7): 54165441[36]Patel F, Bhattacharya P, Tanwar S, et al. Block6Tel: Blockchainbased spectrum allocation scheme in 6Genvisioned communications[C] Proc of Int Wireless Communications and Mobile Computing (IWCMC). Piscataway, NJ: IEEE, 2021: 18231828[37]Sun Z, Liang W, Qi F, et al.Blockchainbased dynamic spectrum sharing for 6G UIoT networks[J]. IEEE Network, 2021, 35(5): 143149[38]Mukherjee M, Kumar V, Guo M, et al. The interplay of reconfigurable intelligent surfaces and mobile edge computing in future wireless networks: A winwin strategy to 6G[J]. arXiv preprint, arXiv:2106.11784, 2021[39]Huynh L N T, Huh E N. Envisioning edge computing in future 6G wireless networks[C] Proc of the 5th World Conf on Smart Trends in Systems Security and Sustainability (WorldS4). 2021: 307311[40]Bhat S A, Sofi I B, Chi C Y. Edge computing and its convergence with blockchain in 5G and beyond: Security, challenges, and opportunities[J]. IEEE Access, 2020, 8: 205340205373[41]Ishtiaq M, Saeed N, Khan M A. Edge computing in IoT: A 6G perspective[J]. arXiv preprint, arXiv:2111.08943, 2021[42]Mathew A. Edgecomputing and its convergence with blockchain in 6G: Security challenges[J]. International Journal of Computer Science and Mobile Computing, 2021, 10(8): 814[43]Prathiba S B, Raja G, Anbalagan S, et al. Cybertwindriven federated learning based personalized service provision for 6GV2X[J]. IEEE Trans on Vehicular Technology, 2021, 71(5): 46324641[44]Hui Y, Cheng N, Su Z, et al. Secure and personalized edge computing services in 6G heterogeneous vehicular networks[J]. IEEE Internet of Things Journal, 2021, 9(8): 59205931[45]Hu J, Chen C, Cai L, et al. UAVassisted vehicular edge computing for the 6G Internet of vehicles: Architecture, intelligence, and challenges[J]. IEEE Communications Standards Magazine, 2021, 5(2): 1218[46]AlAnsi A, AlAnsi A M, Muthanna A, et al. Survey on intelligence edge computing in 6G: Characteristics, challenges, potential use cases, and market drivers[J]. Future Internet, 2021, 13(5): 123[47]Ahmad I, Lembo S, Rodriguez F, et al. Security of micro MEC in 6G: A brief overview[C] Proc of the 19th IEEE Annual Consumer Communications & Networking Conf (CCNC). Piscatawy, NJ: IEEE, 2022: 332337 [48]Huynh L N T, Huh E N. Envisioning edge computing in future 6G wireless networks[C] Proc of the 5th World Conf on Smart Trends in Systems Security and Sustainability (WorldS4). Piscatawy, NJ: IEEE, 2021: 307311[49]Fadlullah Z M, Kato N. HCP: Heterogeneous computing platform for federated learning based collaborative content caching towards 6G networks[J]. IEEE Trans on Emerging Topics in Computing, 2020, 10(1): 112123[50]Wu X, Zhang Y, Shi M, et al. An adaptive federated learning scheme with differential privacypreserving[J]. Future Generation Computer Systems, 2022, 127: 362372[51]Yang M, Wang X, Qian H, et al. An improved federated learning algorithm for privacypreserving in cybertwindriven 6G system[J]. IEEE Trans on Industrial Informatics, 2022, 18(10): 67336742 [52]Wang Y, Su Z, Zhang N, et al. Learning in the air: Secure federated learning for UAVassistedcrowdsensing[J]. IEEE Trans on Network Science and Engineering, 2020, 8(2): 10551069[53]Ferrag M A, Friha O, Maglaras L, et al. Federated deep learning for cyber security in the Internet of things: Concepts, applications, and experimental analysis[J]. IEEE Access, 2021, 9: 138509138542[54]陈烨, 王永利. 基于区块链的5G隐私保护模型研究[J]. 信息安全研究, 2022, 8(1): 4348[55]仲蓓鑫, 林浩, 孔苏鹏, 等. 基于区块链技术的多源网络数据隐私保护方法[J]. 信息安全研究, 2021, 7(1): 8689[56]Zhou X, Liang W, She J, et al. Twolayer federated learning with heterogeneous model aggregation for 6G supported Internet of vehicles[J]. IEEE Trans on Vehicular Technology, 2021, 70(6): 53085317[57]Li Q, Lin X. Efficient andprivacypreserving speaker recognition for cybertwindriven 6G[J]. IEEE Internet of Things Journal, 2021, 8(22): 1619516206[58]Sun Y, Liu J, Wang J, et al. When machine learning meets privacy in 6G: A survey[J]. IEEE Communications Surveys & Tutorials, 2020, 22(4): 26942724[59]Ylianttila M, Kantola R, Gurtov A, et al. 6G white paper: Research challenges for trust, security and privacy[J]. arXiv preprint, arXiv:2004.11665, 2020[60]Porambage P, Gür G, Osorio D P M, et al. 6G security challenges and potential solutions[C] Proc of Joint European Conf on Networks and Communications & 6G Summit (EuCNC6G Summit). Piscataway, NJ: IEEE, 2021: 622627[61]Porambage P, Gür G, Osorio D P M, et al. The roadmap to 6G security and privacy[J]. IEEE Open Journal of the Communications Society, 2021, 2: 10941122[62]Sattiraju R, Weinand A, Schotten H D. Performance analysis of deep learning based on recurrent neural networks for channel coding[C] Proc of IEEE Int Conf on Advanced Networks and Telecommunications Systems (ANTS). Piscataway, NJ: IEEE, 2018: 16[63]Weinand A, Karrenbauer M, Lianghai J, et al. Physical layer authentication for mission critical machine type communication using Gaussian mixture model based clustering[J]. arXiv prepring, arXiv:1711.06101, 2017[64]Kang J, Xiong Z, Niyato D, et al. Incentive mechanism for reliable federated learning: A joint optimization approach to combining reputation and contract theory[J]. IEEE Internet of Things Journal, 2019, 6(6): 1070010714 |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||