Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems

被引:6
作者
Son, Bui Duc [1 ]
Hoa, Nguyen Tien [1 ]
Chien, Trinh Van [2 ]
Khalid, Waqas [3 ]
Ferrag, Mohamed Amine [4 ]
Choi, Wan [5 ]
Debbah, Merouane [6 ]
机构
[1] Hanoi Univ Sci & Technol, Sch Elect & Elect Engn, Hanoi 100000, Vietnam
[2] Hanoi Univ Sci & Technol, Sch Informat & Commun Technol, Hanoi 100000, Vietnam
[3] Korea Univ, Inst Ind Technol, Sejong, South Korea
[4] Technol Innovat Inst, Abu Dhabi, U Arab Emirates
[5] Seoul Natl Univ, Inst New Media & Commun, Dept Elect & Comp Engn, Seoul, South Korea
[6] Khalifa Univ Sci & Technol, Ctr 6G Technol, Abu Dhabi, U Arab Emirates
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 11期
基金
新加坡国家研究基金会;
关键词
Internet of Things; 6G mobile communication; Hardware; Performance evaluation; Security; Resource management; Protocols; Adversarial attack; adversarial defenses; deep learning (DL); sixth generation (6G); CHANNEL ESTIMATION; MASSIVE IOT; COMMUNICATION; SECURITY; CLASSIFICATION; ARCHITECTURE; ROBUSTNESS; CHALLENGES; ALLOCATION; PRIVACY;
D O I
10.1109/JIOT.2024.3373808
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) and massive IoT systems are key to sixth-generation (6G) networks due to dense connectivity, ultrareliability, low latency, and high throughput. Artificial intelligence, including deep learning and machine learning, offers solutions for optimizing and deploying cutting-edge technologies for future radio communications. However, these techniques are vulnerable to adversarial attacks, leading to degraded performance and erroneous predictions, outcomes unacceptable for ubiquitous networks. This survey extensively addresses adversarial attacks and defense methods in 6G network-assisted IoT systems. The theoretical background and up-to-date research on adversarial attacks and defenses are discussed. Furthermore, we provide Monte Carlo simulations to validate the effectiveness of adversarial attacks compared to jamming attacks. Additionally, we examine the vulnerability of 6G IoT systems by demonstrating attack strategies applicable to key technologies, including reconfigurable intelligent surfaces, massive multiple-input-multiple-output (MIMO)/cell-free massive MIMO, satellites, the metaverse, and semantic communications. Finally, we outline the challenges and future developments associated with adversarial attacks and defenses in 6G IoT systems.
引用
收藏
页码:19168 / 19187
页数:20
相关论文
共 130 条
  • [1] Language Model Agnostic Gray-Box Adversarial Attack on Image Captioning
    Aafaq, Nayyer
    Akhtar, Naveed
    Liu, Wei
    Shah, Mubarak
    Mian, Ajmal
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 626 - 638
  • [2] Physical Invariant Based Attack Detection for Autonomous Vehicles: Survey, Vision, and Challenges
    Akowuah, Francis
    Kong, Fanxin
    [J]. 2021 FOURTH INTERNATIONAL CONFERENCE ON CONNECTED AND AUTONOMOUS DRIVING (METROCAD 2021), 2021,
  • [3] Alatwi HA, 2021, 2021 IEEE WORLD AI IOT CONGRESS (AIIOT), P34, DOI [10.1109/AIIoT52608.2021.9454214, 10.1109/AIIOT52608.2021.9454214]
  • [4] Reinforcement-Learning-Enabled Massive Internet of Things for 6G Wireless Communications
    Ali R.
    Ashraf I.
    Bashir A.K.
    Zikria Y.B.
    [J]. IEEE Communications Standards Magazine, 2021, 5 (02): : 126 - 131
  • [5] A survey on adversarial attacks and defenses for object detection and their applications in autonomous vehicles
    Amirkhani, Abdollah
    Karimi, Mohammad Parsa
    Banitalebi-Dehkordi, Amin
    [J]. VISUAL COMPUTER, 2023, 39 (11) : 5293 - 5307
  • [6] SIEMS: A Secure Intelligent Energy Management System for Industrial IoT Applications
    Asef, Pedram
    Taheri, Rahim
    Shojafar, Mohammad
    Mporas, Iosif
    Tafazolli, Rahim
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 1039 - 1050
  • [7] Physical Adversarial Attacks Against Deep Learning Based Channel Decoding Systems
    Babu, Surabhi Ashok
    Ameer, P. M.
    [J]. 2020 IEEE REGION 10 SYMPOSIUM (TENSYMP) - TECHNOLOGY FOR IMPACTFUL SUSTAINABLE DEVELOPMENT, 2020, : 1511 - 1514
  • [8] Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems
    Bahramali, Alireza
    Nasr, Milad
    Houmansadr, Amir
    Goeckel, Dennis
    Towsley, Don
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 126 - 140
  • [9] Bharati S, 2020, Arxiv, DOI arXiv:2006.08723
  • [10] Hardware Trojan Attacks: Threat Analysis and Countermeasures
    Bhunia, Swarup
    Hsiao, Michael S.
    Banga, Mainak
    Narasimhan, Seetharam
    [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1229 - 1247