Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems

被引:6
作者
Son, Bui Duc [1 ]
Hoa, Nguyen Tien [1 ]
Chien, Trinh Van [2 ]
Khalid, Waqas [3 ]
Ferrag, Mohamed Amine [4 ]
Choi, Wan [5 ]
Debbah, Merouane [6 ]
机构
[1] Hanoi Univ Sci & Technol, Sch Elect & Elect Engn, Hanoi 100000, Vietnam
[2] Hanoi Univ Sci & Technol, Sch Informat & Commun Technol, Hanoi 100000, Vietnam
[3] Korea Univ, Inst Ind Technol, Sejong, South Korea
[4] Technol Innovat Inst, Abu Dhabi, U Arab Emirates
[5] Seoul Natl Univ, Inst New Media & Commun, Dept Elect & Comp Engn, Seoul, South Korea
[6] Khalifa Univ Sci & Technol, Ctr 6G Technol, Abu Dhabi, U Arab Emirates
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 11期
基金
新加坡国家研究基金会;
关键词
Internet of Things; 6G mobile communication; Hardware; Performance evaluation; Security; Resource management; Protocols; Adversarial attack; adversarial defenses; deep learning (DL); sixth generation (6G); CHANNEL ESTIMATION; MASSIVE IOT; COMMUNICATION; SECURITY; CLASSIFICATION; ARCHITECTURE; ROBUSTNESS; CHALLENGES; ALLOCATION; PRIVACY;
D O I
10.1109/JIOT.2024.3373808
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) and massive IoT systems are key to sixth-generation (6G) networks due to dense connectivity, ultrareliability, low latency, and high throughput. Artificial intelligence, including deep learning and machine learning, offers solutions for optimizing and deploying cutting-edge technologies for future radio communications. However, these techniques are vulnerable to adversarial attacks, leading to degraded performance and erroneous predictions, outcomes unacceptable for ubiquitous networks. This survey extensively addresses adversarial attacks and defense methods in 6G network-assisted IoT systems. The theoretical background and up-to-date research on adversarial attacks and defenses are discussed. Furthermore, we provide Monte Carlo simulations to validate the effectiveness of adversarial attacks compared to jamming attacks. Additionally, we examine the vulnerability of 6G IoT systems by demonstrating attack strategies applicable to key technologies, including reconfigurable intelligent surfaces, massive multiple-input-multiple-output (MIMO)/cell-free massive MIMO, satellites, the metaverse, and semantic communications. Finally, we outline the challenges and future developments associated with adversarial attacks and defenses in 6G IoT systems.
引用
收藏
页码:19168 / 19187
页数:20
相关论文
共 130 条
  • [31] Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses
    Ferrag, Mohamed Amine
    Friha, Othmane
    Kantarci, Burak
    Tihanyi, Norbert
    Cordeiro, Lucas
    Debbah, Merouane
    Hamouda, Djallel
    Al-Hawawreh, Muna
    Choo, Kim-Kwang Raymond
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (04): : 2654 - 2713
  • [32] Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks
    Ferrag, Mohamed Amine
    Debbah, Merouane
    Al-Hawawreh, Muna
    [J]. 2023 IEEE/ACM 23RD INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW, 2023, : 16 - 25
  • [33] Ferrag Mohamed Amine., 2023, 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), P196, DOI 10.1109/deoss-iot58021.2023.00042
  • [34] Fischer M., 2020, NeurIPS'20
  • [35] Ftaimi A, 2021, INT J ADV COMPUT SC, V12, P639
  • [36] AdvDDoS: Zero-Query Adversarial Attacks Against Commercial Speech Recognition Systems
    Ge, Yunjie
    Zhao, Lingchen
    Wang, Qian
    Duan, Yiheng
    Du, Minxin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3647 - 3661
  • [37] CIIDefence: Defeating Adversarial Attacks by Fusing Class-specific Image Inpainting and Image Denoising
    Gupta, Puneet
    Rahtu, Esa
    [J]. 2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019), 2019, : 6707 - 6716
  • [38] Dynamic Offloading for Edge Computing-Assisted Metaverse Systems
    Hoa, Nguyen Tien
    Huy, Le Van
    Son, Bui Duc
    Luong, Nguyen Cong
    Niyato, Dusit
    [J]. IEEE COMMUNICATIONS LETTERS, 2023, 27 (07) : 1749 - 1753
  • [39] Machine Learning in IoT Security: Current Solutions and Future Challenges
    Hussain, Fatima
    Hussain, Rasheed
    Hassan, Syed Ali
    Hossain, Ekram
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1686 - 1721
  • [40] Jalalinour Shayan, 2023, 2023 Fifth International Conference on Transdisciplinary AI (TransAI), P50, DOI 10.1109/TransAI60598.2023.00018