A comprehensive study on IoT privacy and security challenges with focus on spectrum sharing in Next-Generation networks (5G/6G/beyond)

被引:5
作者
Rachakonda, Lakshmi Priya [1 ]
Siddula, Madhuri [1 ]
Sathya, Vanlin [2 ]
机构
[1] North Carolina A&T State Univ, Dept Comp Sci, Greensboro, NC 27401 USA
[2] Celona Inc, San Francisco, CA 95008 USA
来源
HIGH-CONFIDENCE COMPUTING | 2024年 / 4卷 / 02期
关键词
Spectrum sharing; IoT devices; Security; Privacy; COGNITIVE RADIO NETWORKS; RESOURCE-ALLOCATION; WI-FI; 5G; MANAGEMENT; INTERNET; ACCESS; THINGS; RADAR; TECHNOLOGIES;
D O I
10.1016/j.hcc.2024.100220
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of the Internet of Things (IoT) has triggered a massive digital transformation across numerous sectors. This transformation requires efficient wireless communication and connectivity, which depend on the optimal utilization of the available spectrum resource. Given the limited availability of spectrum resources, spectrum sharing has emerged as a favored solution to empower IoT deployment and connectivity, so adequate planning of the spectrum resource utilization is thus essential to pave the way for the next generation of IoT applications, including 5G and beyond. This article presents a comprehensive study of prevalent wireless technologies employed in the field of the spectrum, with a primary focus on spectrum-sharing solutions, including shared spectrum. It highlights the associated security and privacy concerns when the IoT devices access the shared spectrum. This survey examines the benefits and drawbacks of various spectrum-sharing technologies and their solutions for various IoT applications. Lastly, it identifies future IoT obstacles and suggests potential research directions to address them. (c) 2024 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:17
相关论文
共 167 条
  • [1] Afghah F., 2020, MODELING DESIGN SECU, V1st, P79
  • [2] Afghah F, 2013, IEEE DECIS CONTR P, P3287, DOI 10.1109/CDC.2013.6760385
  • [3] Detection of De-authentication DoS attacks in Wi-Fi Networks: A Machine Learning Approach
    Agarwal, Mayank
    Biswas, Santosh
    Nandi, Sukumar
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2015): BIG DATA ANALYTICS FOR HUMAN-CENTRIC SYSTEMS, 2015, : 246 - 251
  • [4] A Survey on Radio Resource Allocation in Cognitive Radio Sensor Networks
    Ahmad, Ayaz
    Ahmad, Sadiq
    Rehmani, Mubashir Husain
    Ul Hassan, Naveed
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (02): : 888 - 917
  • [5] Spectrum Sharing Strategy for Radio Frequency-Based Medical Services
    Ahmed, Ammar
    Zhang, Shuimei
    Amin, Vaishali S.
    Zhang, Yimin D.
    [J]. 2019 IEEE SIGNAL PROCESSING IN MEDICINE AND BIOLOGY SYMPOSIUM (SPMB), 2019,
  • [6] Distributed Dual-Function Radar-Communication MIMO System with Optimized Resource Allocation
    Ahmed, Ammar
    Zhang, Yimin D.
    Himed, Braham
    [J]. 2019 IEEE RADAR CONFERENCE (RADARCONF), 2019,
  • [7] Ahmed A, 2019, CONF REC ASILOMAR C, P559, DOI [10.1109/ieeeconf44664.2019.9049009, 10.1109/IEEECONF44664.2019.9049009]
  • [8] Ahmed A, 2018, IEEE INT WORK SIGN P, P770
  • [9] Dual-function radar-communications using QAM-based sidelobe modulation
    Ahmed, Ammar
    Zhang, Yimin D.
    Gu, Yujie
    [J]. DIGITAL SIGNAL PROCESSING, 2018, 82 : 166 - 174
  • [10] Ahmed A, 2018, IEEE RAD CONF, P698, DOI 10.1109/RADAR.2018.8378644