Security and privacy in 6G networks: New areas and new challenges
Tài liệu tham khảo
Yang, 2019, 6g wireless communications: vision and potential techniques, IEEE Network, 33, 70, 10.1109/MNET.2019.1800418
Letaief, 2019, The roadmap to 6g: Ai empowered wireless networks, IEEE Commun. Mag., 57, 84, 10.1109/MCOM.2019.1900271
T. Zhu, P. Xiong, G. Li, W. Zhou, S. Y. Philip, Differentially private model publishing in cyber physical systems, Future Generat. Comput. Syst..
Chandra, 2011
I. Union, Imt traffic estimates for the years 2020 to 2030, Report ITU-R M. 2370–0, ITU-R Radiocommunication Sector of ITU.
Gupta, 2015, Survey of important issues in uav communication networks, IEEE Commun. Surv. Tutorials, 18, 1123, 10.1109/COMST.2015.2495297
G. Arunabha, J. Zhang, J. G. Andrews, R. Muhamed, Fundamentals of Lte, The Prentice Hall communications engineering and emerging technologies series.
Brookson, 1994, Gsm security: a description of the reasons for security and the techniques
Gindraux, 2002, From 2g to 3g: a guide to mobile security, 308
Cattaneo, 2013, Security issues and attacks on the gsm standard: a review, J. UCS, 19, 2437
Toorani, 2008, Solutions to the gsm security weaknesses, 576
Sharma, 2013, Evolution of mobile wireless communication networks-1g to 5g as well as future prospective of next generation communication network, Int. J. Comput. Sci. Mobile Comput., 2, 47
M. C. Chuah, Universal mobile telecommunications system (umts) quality of service (qos) supporting variable qos negotiation, uS Patent 7,668,176 (Feb. 23 2010)..
Varshney, 2012, 4g wireless networks, IT Prof., 14, 34, 10.1109/MITP.2012.71
Cao, 2013, A survey on security aspects for lte and lte-a networks, IEEE Commun. Surv. Tutorials, 16, 283, 10.1109/SURV.2013.041513.00174
Seddigh, 2010, Security advances and challenges in 4g wireless networks, 62
Mitra, 2015, 5g mobile technology: a survey, ICT Express, 1, 132, 10.1016/j.icte.2016.01.003
Panwar, 2016, A survey on 5g: the next generation of mobile communication, Phys. Commun., 18, 64, 10.1016/j.phycom.2015.10.006
Jaber, 2016, 5g backhaul challenges and emerging research directions: a survey, IEEE Access, 4, 1743, 10.1109/ACCESS.2016.2556011
Prados-Garzon, 2016, Handover implementation in a 5g sdn-based mobile network architecture, 1
Kim, 2017, 3gpp sa2 architecture and functions for 5g mobile communication system, ICT Express, 3, 1, 10.1016/j.icte.2017.03.007
N. Alliance, 5g security recommendations package, White paper.
P. Bisson, J. Waryet, 5g Ppp Phase1 Security Landscape, 5G PPP Security Group White Paper.
Ahmad, 2019, Security for 5g and beyond, IEEE Commun. Surv. Tutorials, 21, 3682, 10.1109/COMST.2019.2916180
Pattaranantakul, 2018, Nfv security survey: from use case driven threat analysis to state-of-the-art countermeasures, IEEE Commun. Surv. Tutorials, 20, 3330, 10.1109/COMST.2018.2859449
Huang, 2019, A survey on green 6g network: architecture and technologies, IEEE Access, 7, 175758, 10.1109/ACCESS.2019.2957648
M. Latva-aho, K. Leppanen, Key Drivers and Research Chal-¨ Lenges for 6g Ubiquitous Wireless Intelligence (White Paper), 6G Flagship Research Program, University of Oulu, Finland.
Kibria, 2018, Big data analytics, machine learning, and artificial intelligence in next-generation wireless networks, IEEE Access, 6, 32328, 10.1109/ACCESS.2018.2837692
F. Tariq, M. Khandaker, K.-K. Wong, M. Imran, M. Bennis, M. Debbah, A Speculative Study on 6g, arXiv Preprint arXiv:1902.06700.
F. Tang, Y. Kawamoto, N. Kato, J. Liu, Future intelligent and secure vehicular network toward 6g: machine-learning approaches, Proc. IEEE.
Tomkos, 2020, Toward the 6g network era: opportunities and challenges, IT Prof., 22, 34, 10.1109/MITP.2019.2963491
H. B. McMahan, E. Moore, D. Ramage, S. Hampson, et al., Communication-efficient learning of deep networks from decentralized data, arXiv Preprint arXiv:1602.05629.
Loven, 2019, 1
E. C. Strinati, S. Barbarossa, J. L. Gonzalez-Jimenez, D. Ktenas, N. Cassiau, C. Dehos, 6g: the Next Frontier, arXiv´ Preprint arXiv:1901.03239.
G. Gui, M. Liu, F. Tang, N. Kato, F. Adachi, 6g: opening new horizons for integration of comfort, security and intelligence, IEEE Wireless Commun..
Jiang, 2016, Machine learning paradigms for next-generation wireless networks, IEEE Wireless Commun., 24, 98, 10.1109/MWC.2016.1500356WC
Dang, 2020, What should 6g be?, Nat. Electron., 3, 20, 10.1038/s41928-019-0355-6
W. Saad, M. Bennis, M. Chen, A vision of 6g wireless systems: applications, trends, technologies, and open research problems, IEEE network.
Katz, 2019, Towards 6g: getting ready for the next decade, 714
Wei, 2019, Global voice chat over short message service of beidou navigation system, 1994
Yao, 2018, The space-terrestrial integrated network: an overview, IEEE Commun. Mag., 56, 178, 10.1109/MCOM.2018.1700038
Zeng, 2016, Wireless communications with unmanned aerial vehicles: opportunities and challenges, IEEE Commun. Mag., 54, 36, 10.1109/MCOM.2016.7470933
Chen, 2019, Android hiv: a study of repackaging malware for evading machine-learning detection, IEEE Trans. Inf. Forensics Secur., 15, 987, 10.1109/TIFS.2019.2932228
Grimmett, 2007, Message routing criteria for undersea acoustic communication networks, 1
R. Sattiraju, A. Weinand, H. D. Schotten, Ai-assisted Phy Technologies for 6g and beyond Wireless Networks, arXiv Preprint arXiv:1908.09523.
Hong, 2019, Machine learning based antenna design for physical layer security in ambient backscatter communications, Wireless Commun. Mobile Comput., 10.1155/2019/4870656
Nawaz, 2019, Quantum machine learning for 6g communication networks: state-of-the-art and vision for the fu-ture, IEEE Access, 7, 46317, 10.1109/ACCESS.2019.2909490
Farsad, 2016, A comprehensive survey of recent advancements in molecular communication, IEEE Commun. Surv. Tutorials, 18, 1887, 10.1109/COMST.2016.2527741
Lu, 2015, Comparison of channel coding schemes for molecular communications systems, IEEE Trans. Commun., 63, 3991, 10.1109/TCOMM.2015.2480752
Loscri, 2014, Security and privacy in molecular communication and networking: opportunities and challenges, IEEE Trans. NanoBioscience, 13, 198, 10.1109/TNB.2014.2349111
Hu, 2016, Experimental quantum secure direct communication with single photons, Light Sci. Appl., 5, 10.1038/lsa.2016.144
Kiyomoto, 2017, On blockchain-based authorization architecture for beyond-5g mobile services, 136
Kotobi, 2018, Secure blockchains for dynamic spectrum access: a decentralized database in moving cognitive radio networks enhances security and user access, IEEE Veh. Technol. Mag., 13, 32, 10.1109/MVT.2017.2740458
Ferraro, 2018, Distributed ledger technology for smart cities, the sharing economy, and social compliance, IEEE Access, 6, 62728, 10.1109/ACCESS.2018.2876766
Akyildiz, 2014, Terahertz band: next frontier for wireless communications, Phys. Commun., 12, 16, 10.1016/j.phycom.2014.01.006
Ma, 2018, Security and eavesdropping in terahertz wireless links, Nature, 563, 89, 10.1038/s41586-018-0609-x
Ucar, 2016, Secvlc: secure visible light communication for military vehicular networks, 123
Cho, 2019, Enhancement of physical layer security with simultaneous beamforming and jamming for visible light communication systems, IEEE Trans. Inf. Forensics Secur., 14, 2633, 10.1109/TIFS.2019.2904440
Zhu, 2019, Applying differential privacy mechanism in artificial intelligence, 1601
Zhang, 2019, 6g wireless networks: vision, requirements, architecture, and key technologies, IEEE Veh. Technol. Mag., 14, 28, 10.1109/MVT.2019.2921208
Zhou, 2018, Robust mobile crowd sensing: when deep learning meets edge computing, IEEE Network, 32, 54, 10.1109/MNET.2018.1700442
T. Zhang, T. Zhu, P. Xiong, H. Huo, Z. Tari, W. Zhou, Correlated differential privacy: feature selection in machine learning, IEEE Trans. Ind. Inf..
Zhu, 2017, Differentially private data publishing and analysis: a survey, IEEE Trans. Knowl. Data Eng., 29, 1619, 10.1109/TKDE.2017.2697856
Akan, 2016, Fundamentals of molecular information and communication science, Proc. IEEE, 105, 306, 10.1109/JPROC.2016.2537306
Nakano, 2019, Methods and applications of mobile molecular communication, Proc. IEEE, 107, 1442, 10.1109/JPROC.2019.2917625
Gyongyosi, 2018, A survey on quantum channel capacities, IEEE Commun. Surv. Tutorials, 20, 1149, 10.1109/COMST.2017.2786748
Zhang, 2017, Quantum secure direct communication with quantum memory, Phys. Rev. Lett., 118, 10.1103/PhysRevLett.118.220501
Ling, 2019, Blockchain radio access network (b-ran): towards decentralized secure radio access paradigm, IEEE Access, 7, 9714, 10.1109/ACCESS.2018.2890557
Puthal, 2018, The blockchain as a decentralized security framework [future directions], IEEE Consum. Electron. Mag., 7, 18, 10.1109/MCE.2017.2776459
Elmeadawy, 2019, 6g wireless communications: future technologies and research challenges, 1
Islim, 2017, Towards 10 gb/s orthogonal frequency division multiplexing-based visible light communication using a Gan violet micro-LED, Photon. Res., 5, A35, 10.1364/PRJ.5.000A35
Luo, 2017, Indoor positioning systems based on visible light communication: state of the art, IEEE Commun. Surv. Tutorials, 19, 2871, 10.1109/COMST.2017.2743228
Khan, 2017, Visible light communication: applications, architecture, standardization and research challenges, Digit. Commun. Network., 3, 78, 10.1016/j.dcan.2016.07.004
Pathak, 2015, Visible light communication, networking, and sensing: a survey, potential and challenges, IEEE Commun. Surv. Tutorials, 17, 2047, 10.1109/COMST.2015.2476474
Chen, 2018, Omnidirectional transmitter and receiver design for wireless infrared uplink transmission in lifi, 1
Mostafa, 2014, Physical-layer security for indoor visible light communications, 3342
Chen, 2019, Physical layer security for ultra-reliable and low-latency communications, IEEE Wireless Commun., 26, 6, 10.1109/MWC.001.1900051
Hamamreh, 2017, OFDM-subcarrier index selection for enhancing security and reliability of 5G URLLC services, IEEE Access, 5, 25863, 10.1109/ACCESS.2017.2768558
Al-Eryani, 2019, The d-oma method for massive multiple access in 6g: performance, security, and challenges, IEEE Veh. Technol. Mag., 14, 92, 10.1109/MVT.2019.2919279
Hooper, 2016, Securing commercial wifi-based uavs from common security attacks, 1213
Fotouhi, 2019, Survey on uav cellular communications: practical aspects, standardization advancements, regulation, and security challenges, IEEE Commun. Surv. Tutorials, 21, 3417, 10.1109/COMST.2019.2906228
Wang, 2018, Networking and communications in autonomous driving: a survey, IEEE Commun. Surv. Tutorials, 21, 1243, 10.1109/COMST.2018.2888904
Sanjab, 2017, Prospect theory for enhanced cyber-physical security of drone delivery systems: a network interdiction game, 1
Sun, 2019, Physical layer security in millimeter wave SWIPT UAV-based relay networks, IEEE Access, 7, 35851, 10.1109/ACCESS.2019.2904856
Ni, 2019, Toward privacy-preserving valet parking in autonomous driving era, IEEE Trans. Veh. Technol., 68, 2893, 10.1109/TVT.2019.2894720
Ramadan, 2017, Brain computer interface: control signals review, Neurocomputing, 223, 26, 10.1016/j.neucom.2016.10.024
Svogor, 2012, Two factor authentication using eegˇ augmented passwords, 373
Nguyen, 2020, Privacy-aware blockchain innovation for 6g: challenges and opportunities, 1
Chen, 2018, Ultra-low latency mobile networking, IEEE Network, 33, 181, 10.1109/MNET.2018.1800011
Yamakami, 2020, A privacy threat model in xr applications, 384
Pilz, 2018, Professional live audio production: a highly synchronized use case for 5g URLLC systems, IEEE Network, 32, 85, 10.1109/MNET.2018.1700230
Li, 2018, UAV communications for 5g and beyond: recent advances and future trends, IEEE Internet Things J., 6, 2241, 10.1109/JIOT.2018.2887086
Challita, 2019, Machine learning for wireless connectivity and security of cellular-connected UAVs, IEEE Wireless Commun., 26, 28, 10.1109/MWC.2018.1800155
Kim, 2019, Udipp: a framework for differential privacy preserving movements of unmanned aerial vehicles in smart cities, IEEE Trans. Veh. Technol., 68, 3933, 10.1109/TVT.2019.2897509
Xu, 2019, Efficient and privacy-preserving truth discovery in mobile crowd sensing systems, IEEE Trans. Veh. Technol., 68, 3854, 10.1109/TVT.2019.2895834
Ding, 2017, Greenplanner: planning personalized fuel-efficient driving routes using multi-sourced urban data, 207
Chen, 2015, High-speed spelling with a noninvasive brain–computer interface, Proc. Natl. Acad. Sci. Unit. States Am., 112, E6058, 10.1073/pnas.1508080112
McCullagh, 2014, Ethical challenges associated with the development and deployment of brain computer interface technology, Neuroethics, 7, 109, 10.1007/s12152-013-9188-6
Karthikeyan, 2011, Enhancement of multimodal biometric authentication based on iris and brain neuro image coding, Int. J. Biometric Bioinf. (IJBB), 5, 249
Dai, 2019, Blockchain and deep reinforcement learning empowered intelligent 5g beyond, IEEE Network, 33, 10, 10.1109/MNET.2019.1800376
X. Li, P. Jiang, T. Chen, X. Luo, Q. Wen, A Survey on the Security of Blockchain Systems, Future Generation Computer Systems.