Security and privacy in 6G networks: New areas and new challenges

Digital Communications and Networks - Tập 6 - Trang 281-291 - 2020
Minghao Wang1, Tianqing Zhu1, Tao Zhang1, Jun Zhang2, Shui Yu1, Wanlei Zhou1
1School of Computer Science, University of Technology Sydney, Ultimo, 2007, Australia
2School of Software and Electrical Engineering, Swinburne University of Technology, Australia

Tài liệu tham khảo

Yang, 2019, 6g wireless communications: vision and potential techniques, IEEE Network, 33, 70, 10.1109/MNET.2019.1800418 Letaief, 2019, The roadmap to 6g: Ai empowered wireless networks, IEEE Commun. Mag., 57, 84, 10.1109/MCOM.2019.1900271 T. Zhu, P. Xiong, G. Li, W. Zhou, S. Y. Philip, Differentially private model publishing in cyber physical systems, Future Generat. Comput. Syst.. Chandra, 2011 I. Union, Imt traffic estimates for the years 2020 to 2030, Report ITU-R M. 2370–0, ITU-R Radiocommunication Sector of ITU. Gupta, 2015, Survey of important issues in uav communication networks, IEEE Commun. Surv. Tutorials, 18, 1123, 10.1109/COMST.2015.2495297 G. Arunabha, J. Zhang, J. G. Andrews, R. Muhamed, Fundamentals of Lte, The Prentice Hall communications engineering and emerging technologies series. Brookson, 1994, Gsm security: a description of the reasons for security and the techniques Gindraux, 2002, From 2g to 3g: a guide to mobile security, 308 Cattaneo, 2013, Security issues and attacks on the gsm standard: a review, J. UCS, 19, 2437 Toorani, 2008, Solutions to the gsm security weaknesses, 576 Sharma, 2013, Evolution of mobile wireless communication networks-1g to 5g as well as future prospective of next generation communication network, Int. J. Comput. Sci. Mobile Comput., 2, 47 M. C. Chuah, Universal mobile telecommunications system (umts) quality of service (qos) supporting variable qos negotiation, uS Patent 7,668,176 (Feb. 23 2010).. Varshney, 2012, 4g wireless networks, IT Prof., 14, 34, 10.1109/MITP.2012.71 Cao, 2013, A survey on security aspects for lte and lte-a networks, IEEE Commun. Surv. Tutorials, 16, 283, 10.1109/SURV.2013.041513.00174 Seddigh, 2010, Security advances and challenges in 4g wireless networks, 62 Mitra, 2015, 5g mobile technology: a survey, ICT Express, 1, 132, 10.1016/j.icte.2016.01.003 Panwar, 2016, A survey on 5g: the next generation of mobile communication, Phys. Commun., 18, 64, 10.1016/j.phycom.2015.10.006 Jaber, 2016, 5g backhaul challenges and emerging research directions: a survey, IEEE Access, 4, 1743, 10.1109/ACCESS.2016.2556011 Prados-Garzon, 2016, Handover implementation in a 5g sdn-based mobile network architecture, 1 Kim, 2017, 3gpp sa2 architecture and functions for 5g mobile communication system, ICT Express, 3, 1, 10.1016/j.icte.2017.03.007 N. Alliance, 5g security recommendations package, White paper. P. Bisson, J. Waryet, 5g Ppp Phase1 Security Landscape, 5G PPP Security Group White Paper. Ahmad, 2019, Security for 5g and beyond, IEEE Commun. Surv. Tutorials, 21, 3682, 10.1109/COMST.2019.2916180 Pattaranantakul, 2018, Nfv security survey: from use case driven threat analysis to state-of-the-art countermeasures, IEEE Commun. Surv. Tutorials, 20, 3330, 10.1109/COMST.2018.2859449 Huang, 2019, A survey on green 6g network: architecture and technologies, IEEE Access, 7, 175758, 10.1109/ACCESS.2019.2957648 M. Latva-aho, K. Leppanen, Key Drivers and Research Chal-¨ Lenges for 6g Ubiquitous Wireless Intelligence (White Paper), 6G Flagship Research Program, University of Oulu, Finland. Kibria, 2018, Big data analytics, machine learning, and artificial intelligence in next-generation wireless networks, IEEE Access, 6, 32328, 10.1109/ACCESS.2018.2837692 F. Tariq, M. Khandaker, K.-K. Wong, M. Imran, M. Bennis, M. Debbah, A Speculative Study on 6g, arXiv Preprint arXiv:1902.06700. F. Tang, Y. Kawamoto, N. Kato, J. Liu, Future intelligent and secure vehicular network toward 6g: machine-learning approaches, Proc. IEEE. Tomkos, 2020, Toward the 6g network era: opportunities and challenges, IT Prof., 22, 34, 10.1109/MITP.2019.2963491 H. B. McMahan, E. Moore, D. Ramage, S. Hampson, et al., Communication-efficient learning of deep networks from decentralized data, arXiv Preprint arXiv:1602.05629. Loven, 2019, 1 E. C. Strinati, S. Barbarossa, J. L. Gonzalez-Jimenez, D. Ktenas, N. Cassiau, C. Dehos, 6g: the Next Frontier, arXiv´ Preprint arXiv:1901.03239. G. Gui, M. Liu, F. Tang, N. Kato, F. Adachi, 6g: opening new horizons for integration of comfort, security and intelligence, IEEE Wireless Commun.. Jiang, 2016, Machine learning paradigms for next-generation wireless networks, IEEE Wireless Commun., 24, 98, 10.1109/MWC.2016.1500356WC Dang, 2020, What should 6g be?, Nat. Electron., 3, 20, 10.1038/s41928-019-0355-6 W. Saad, M. Bennis, M. Chen, A vision of 6g wireless systems: applications, trends, technologies, and open research problems, IEEE network. Katz, 2019, Towards 6g: getting ready for the next decade, 714 Wei, 2019, Global voice chat over short message service of beidou navigation system, 1994 Yao, 2018, The space-terrestrial integrated network: an overview, IEEE Commun. Mag., 56, 178, 10.1109/MCOM.2018.1700038 Zeng, 2016, Wireless communications with unmanned aerial vehicles: opportunities and challenges, IEEE Commun. Mag., 54, 36, 10.1109/MCOM.2016.7470933 Chen, 2019, Android hiv: a study of repackaging malware for evading machine-learning detection, IEEE Trans. Inf. Forensics Secur., 15, 987, 10.1109/TIFS.2019.2932228 Grimmett, 2007, Message routing criteria for undersea acoustic communication networks, 1 R. Sattiraju, A. Weinand, H. D. Schotten, Ai-assisted Phy Technologies for 6g and beyond Wireless Networks, arXiv Preprint arXiv:1908.09523. Hong, 2019, Machine learning based antenna design for physical layer security in ambient backscatter communications, Wireless Commun. Mobile Comput., 10.1155/2019/4870656 Nawaz, 2019, Quantum machine learning for 6g communication networks: state-of-the-art and vision for the fu-ture, IEEE Access, 7, 46317, 10.1109/ACCESS.2019.2909490 Farsad, 2016, A comprehensive survey of recent advancements in molecular communication, IEEE Commun. Surv. Tutorials, 18, 1887, 10.1109/COMST.2016.2527741 Lu, 2015, Comparison of channel coding schemes for molecular communications systems, IEEE Trans. Commun., 63, 3991, 10.1109/TCOMM.2015.2480752 Loscri, 2014, Security and privacy in molecular communication and networking: opportunities and challenges, IEEE Trans. NanoBioscience, 13, 198, 10.1109/TNB.2014.2349111 Hu, 2016, Experimental quantum secure direct communication with single photons, Light Sci. Appl., 5, 10.1038/lsa.2016.144 Kiyomoto, 2017, On blockchain-based authorization architecture for beyond-5g mobile services, 136 Kotobi, 2018, Secure blockchains for dynamic spectrum access: a decentralized database in moving cognitive radio networks enhances security and user access, IEEE Veh. Technol. Mag., 13, 32, 10.1109/MVT.2017.2740458 Ferraro, 2018, Distributed ledger technology for smart cities, the sharing economy, and social compliance, IEEE Access, 6, 62728, 10.1109/ACCESS.2018.2876766 Akyildiz, 2014, Terahertz band: next frontier for wireless communications, Phys. Commun., 12, 16, 10.1016/j.phycom.2014.01.006 Ma, 2018, Security and eavesdropping in terahertz wireless links, Nature, 563, 89, 10.1038/s41586-018-0609-x Ucar, 2016, Secvlc: secure visible light communication for military vehicular networks, 123 Cho, 2019, Enhancement of physical layer security with simultaneous beamforming and jamming for visible light communication systems, IEEE Trans. Inf. Forensics Secur., 14, 2633, 10.1109/TIFS.2019.2904440 Zhu, 2019, Applying differential privacy mechanism in artificial intelligence, 1601 Zhang, 2019, 6g wireless networks: vision, requirements, architecture, and key technologies, IEEE Veh. Technol. Mag., 14, 28, 10.1109/MVT.2019.2921208 Zhou, 2018, Robust mobile crowd sensing: when deep learning meets edge computing, IEEE Network, 32, 54, 10.1109/MNET.2018.1700442 T. Zhang, T. Zhu, P. Xiong, H. Huo, Z. Tari, W. Zhou, Correlated differential privacy: feature selection in machine learning, IEEE Trans. Ind. Inf.. Zhu, 2017, Differentially private data publishing and analysis: a survey, IEEE Trans. Knowl. Data Eng., 29, 1619, 10.1109/TKDE.2017.2697856 Akan, 2016, Fundamentals of molecular information and communication science, Proc. IEEE, 105, 306, 10.1109/JPROC.2016.2537306 Nakano, 2019, Methods and applications of mobile molecular communication, Proc. IEEE, 107, 1442, 10.1109/JPROC.2019.2917625 Gyongyosi, 2018, A survey on quantum channel capacities, IEEE Commun. Surv. Tutorials, 20, 1149, 10.1109/COMST.2017.2786748 Zhang, 2017, Quantum secure direct communication with quantum memory, Phys. Rev. Lett., 118, 10.1103/PhysRevLett.118.220501 Ling, 2019, Blockchain radio access network (b-ran): towards decentralized secure radio access paradigm, IEEE Access, 7, 9714, 10.1109/ACCESS.2018.2890557 Puthal, 2018, The blockchain as a decentralized security framework [future directions], IEEE Consum. Electron. Mag., 7, 18, 10.1109/MCE.2017.2776459 Elmeadawy, 2019, 6g wireless communications: future technologies and research challenges, 1 Islim, 2017, Towards 10 gb/s orthogonal frequency division multiplexing-based visible light communication using a Gan violet micro-LED, Photon. Res., 5, A35, 10.1364/PRJ.5.000A35 Luo, 2017, Indoor positioning systems based on visible light communication: state of the art, IEEE Commun. Surv. Tutorials, 19, 2871, 10.1109/COMST.2017.2743228 Khan, 2017, Visible light communication: applications, architecture, standardization and research challenges, Digit. Commun. Network., 3, 78, 10.1016/j.dcan.2016.07.004 Pathak, 2015, Visible light communication, networking, and sensing: a survey, potential and challenges, IEEE Commun. Surv. Tutorials, 17, 2047, 10.1109/COMST.2015.2476474 Chen, 2018, Omnidirectional transmitter and receiver design for wireless infrared uplink transmission in lifi, 1 Mostafa, 2014, Physical-layer security for indoor visible light communications, 3342 Chen, 2019, Physical layer security for ultra-reliable and low-latency communications, IEEE Wireless Commun., 26, 6, 10.1109/MWC.001.1900051 Hamamreh, 2017, OFDM-subcarrier index selection for enhancing security and reliability of 5G URLLC services, IEEE Access, 5, 25863, 10.1109/ACCESS.2017.2768558 Al-Eryani, 2019, The d-oma method for massive multiple access in 6g: performance, security, and challenges, IEEE Veh. Technol. Mag., 14, 92, 10.1109/MVT.2019.2919279 Hooper, 2016, Securing commercial wifi-based uavs from common security attacks, 1213 Fotouhi, 2019, Survey on uav cellular communications: practical aspects, standardization advancements, regulation, and security challenges, IEEE Commun. Surv. Tutorials, 21, 3417, 10.1109/COMST.2019.2906228 Wang, 2018, Networking and communications in autonomous driving: a survey, IEEE Commun. Surv. Tutorials, 21, 1243, 10.1109/COMST.2018.2888904 Sanjab, 2017, Prospect theory for enhanced cyber-physical security of drone delivery systems: a network interdiction game, 1 Sun, 2019, Physical layer security in millimeter wave SWIPT UAV-based relay networks, IEEE Access, 7, 35851, 10.1109/ACCESS.2019.2904856 Ni, 2019, Toward privacy-preserving valet parking in autonomous driving era, IEEE Trans. Veh. Technol., 68, 2893, 10.1109/TVT.2019.2894720 Ramadan, 2017, Brain computer interface: control signals review, Neurocomputing, 223, 26, 10.1016/j.neucom.2016.10.024 Svogor, 2012, Two factor authentication using eegˇ augmented passwords, 373 Nguyen, 2020, Privacy-aware blockchain innovation for 6g: challenges and opportunities, 1 Chen, 2018, Ultra-low latency mobile networking, IEEE Network, 33, 181, 10.1109/MNET.2018.1800011 Yamakami, 2020, A privacy threat model in xr applications, 384 Pilz, 2018, Professional live audio production: a highly synchronized use case for 5g URLLC systems, IEEE Network, 32, 85, 10.1109/MNET.2018.1700230 Li, 2018, UAV communications for 5g and beyond: recent advances and future trends, IEEE Internet Things J., 6, 2241, 10.1109/JIOT.2018.2887086 Challita, 2019, Machine learning for wireless connectivity and security of cellular-connected UAVs, IEEE Wireless Commun., 26, 28, 10.1109/MWC.2018.1800155 Kim, 2019, Udipp: a framework for differential privacy preserving movements of unmanned aerial vehicles in smart cities, IEEE Trans. Veh. Technol., 68, 3933, 10.1109/TVT.2019.2897509 Xu, 2019, Efficient and privacy-preserving truth discovery in mobile crowd sensing systems, IEEE Trans. Veh. Technol., 68, 3854, 10.1109/TVT.2019.2895834 Ding, 2017, Greenplanner: planning personalized fuel-efficient driving routes using multi-sourced urban data, 207 Chen, 2015, High-speed spelling with a noninvasive brain–computer interface, Proc. Natl. Acad. Sci. Unit. States Am., 112, E6058, 10.1073/pnas.1508080112 McCullagh, 2014, Ethical challenges associated with the development and deployment of brain computer interface technology, Neuroethics, 7, 109, 10.1007/s12152-013-9188-6 Karthikeyan, 2011, Enhancement of multimodal biometric authentication based on iris and brain neuro image coding, Int. J. Biometric Bioinf. (IJBB), 5, 249 Dai, 2019, Blockchain and deep reinforcement learning empowered intelligent 5g beyond, IEEE Network, 33, 10, 10.1109/MNET.2019.1800376 X. Li, P. Jiang, T. Chen, X. Luo, Q. Wen, A Survey on the Security of Blockchain Systems, Future Generation Computer Systems.