Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems

被引:6
作者
Son, Bui Duc [1 ]
Hoa, Nguyen Tien [1 ]
Chien, Trinh Van [2 ]
Khalid, Waqas [3 ]
Ferrag, Mohamed Amine [4 ]
Choi, Wan [5 ]
Debbah, Merouane [6 ]
机构
[1] Hanoi Univ Sci & Technol, Sch Elect & Elect Engn, Hanoi 100000, Vietnam
[2] Hanoi Univ Sci & Technol, Sch Informat & Commun Technol, Hanoi 100000, Vietnam
[3] Korea Univ, Inst Ind Technol, Sejong, South Korea
[4] Technol Innovat Inst, Abu Dhabi, U Arab Emirates
[5] Seoul Natl Univ, Inst New Media & Commun, Dept Elect & Comp Engn, Seoul, South Korea
[6] Khalifa Univ Sci & Technol, Ctr 6G Technol, Abu Dhabi, U Arab Emirates
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 11期
基金
新加坡国家研究基金会;
关键词
Internet of Things; 6G mobile communication; Hardware; Performance evaluation; Security; Resource management; Protocols; Adversarial attack; adversarial defenses; deep learning (DL); sixth generation (6G); CHANNEL ESTIMATION; MASSIVE IOT; COMMUNICATION; SECURITY; CLASSIFICATION; ARCHITECTURE; ROBUSTNESS; CHALLENGES; ALLOCATION; PRIVACY;
D O I
10.1109/JIOT.2024.3373808
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) and massive IoT systems are key to sixth-generation (6G) networks due to dense connectivity, ultrareliability, low latency, and high throughput. Artificial intelligence, including deep learning and machine learning, offers solutions for optimizing and deploying cutting-edge technologies for future radio communications. However, these techniques are vulnerable to adversarial attacks, leading to degraded performance and erroneous predictions, outcomes unacceptable for ubiquitous networks. This survey extensively addresses adversarial attacks and defense methods in 6G network-assisted IoT systems. The theoretical background and up-to-date research on adversarial attacks and defenses are discussed. Furthermore, we provide Monte Carlo simulations to validate the effectiveness of adversarial attacks compared to jamming attacks. Additionally, we examine the vulnerability of 6G IoT systems by demonstrating attack strategies applicable to key technologies, including reconfigurable intelligent surfaces, massive multiple-input-multiple-output (MIMO)/cell-free massive MIMO, satellites, the metaverse, and semantic communications. Finally, we outline the challenges and future developments associated with adversarial attacks and defenses in 6G IoT systems.
引用
收藏
页码:19168 / 19187
页数:20
相关论文
共 130 条
  • [21] Semantically Stealthy Adversarial Attacks against Segmentation Models
    Chen, Zhenhua
    Wang, Chuhua
    Crandall, David
    [J]. 2022 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV 2022), 2022, : 2846 - 2855
  • [22] Cheng S., 2019, Proc. Adv. Neural Inf. Process. Syst., V32, P1
  • [23] Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack
    Cheng, Yupeng
    Guo, Qing
    Juefei-Xu, Felix
    Lin, Shang-Wei
    Feng, Wei
    Lin, Weisi
    Liu, Yang
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2022, 24 : 3807 - 3822
  • [24] EEJE: Two-Step Input Transformation for Robust DNN Against Adversarial Examples
    Choi, Seok-Hwan
    Shin, Jinmyeong
    Liu, Peng
    Choi, Yoon-Ho
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 908 - 920
  • [25] Secure Beamforming and Jamming for Multibeam Satellite Systems With Correlated Wiretap Channels
    Cui, Gaofeng
    Zhu, Qiping
    Xu, Lexi
    Wang, Weidong
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (10) : 12348 - 12353
  • [26] Denoising the Optical Fiber Seismic Data by Using Convolutional Adversarial Network Based on Loss Balance
    Dong, Xintong
    Li, Yue
    [J]. IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2021, 59 (12): : 10544 - 10554
  • [27] Boosting Adversarial Attacks with Momentum
    Dong, Yinpeng
    Liao, Fangzhou
    Pang, Tianyu
    Su, Hang
    Zhu, Jun
    Hu, Xiaolin
    Li, Jianguo
    [J]. 2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, : 9185 - 9193
  • [28] Dong YS, 2023, Arxiv, DOI arXiv:2311.02757
  • [29] Cell-Free Massive MIMO: A Survey
    Elhoushy, Salah
    Ibrahim, Mohamed
    Hamouda, Walaa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (01): : 492 - 523
  • [30] Euler S., 2023, Ericsson Technol. Rev, V2023, P2