Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems

被引:6
作者
Son, Bui Duc [1 ]
Hoa, Nguyen Tien [1 ]
Chien, Trinh Van [2 ]
Khalid, Waqas [3 ]
Ferrag, Mohamed Amine [4 ]
Choi, Wan [5 ]
Debbah, Merouane [6 ]
机构
[1] Hanoi Univ Sci & Technol, Sch Elect & Elect Engn, Hanoi 100000, Vietnam
[2] Hanoi Univ Sci & Technol, Sch Informat & Commun Technol, Hanoi 100000, Vietnam
[3] Korea Univ, Inst Ind Technol, Sejong, South Korea
[4] Technol Innovat Inst, Abu Dhabi, U Arab Emirates
[5] Seoul Natl Univ, Inst New Media & Commun, Dept Elect & Comp Engn, Seoul, South Korea
[6] Khalifa Univ Sci & Technol, Ctr 6G Technol, Abu Dhabi, U Arab Emirates
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 11期
基金
新加坡国家研究基金会;
关键词
Internet of Things; 6G mobile communication; Hardware; Performance evaluation; Security; Resource management; Protocols; Adversarial attack; adversarial defenses; deep learning (DL); sixth generation (6G); CHANNEL ESTIMATION; MASSIVE IOT; COMMUNICATION; SECURITY; CLASSIFICATION; ARCHITECTURE; ROBUSTNESS; CHALLENGES; ALLOCATION; PRIVACY;
D O I
10.1109/JIOT.2024.3373808
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) and massive IoT systems are key to sixth-generation (6G) networks due to dense connectivity, ultrareliability, low latency, and high throughput. Artificial intelligence, including deep learning and machine learning, offers solutions for optimizing and deploying cutting-edge technologies for future radio communications. However, these techniques are vulnerable to adversarial attacks, leading to degraded performance and erroneous predictions, outcomes unacceptable for ubiquitous networks. This survey extensively addresses adversarial attacks and defense methods in 6G network-assisted IoT systems. The theoretical background and up-to-date research on adversarial attacks and defenses are discussed. Furthermore, we provide Monte Carlo simulations to validate the effectiveness of adversarial attacks compared to jamming attacks. Additionally, we examine the vulnerability of 6G IoT systems by demonstrating attack strategies applicable to key technologies, including reconfigurable intelligent surfaces, massive multiple-input-multiple-output (MIMO)/cell-free massive MIMO, satellites, the metaverse, and semantic communications. Finally, we outline the challenges and future developments associated with adversarial attacks and defenses in 6G IoT systems.
引用
收藏
页码:19168 / 19187
页数:20
相关论文
共 130 条
  • [41] Certified Defense for Content Based Image Retrieval
    Kakizaki, Kazuya
    Fukuchi, Kazuto
    Sakuma, Jun
    [J]. 2023 IEEE/CVF WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV), 2023, : 4550 - 4559
  • [42] Kalbande D., 2019, P 3 INT C EL COMM AE, P1
  • [43] Reconfigurable Intelligent Surface for Physical Layer Security in 6G-IoT: Designs, Issues, and Advances
    Khalid, Waqas
    Rehman, Muhammad Atif Ur
    Chien, Trinh Van
    Kaleem, Zeeshan
    Lee, Howon
    Yu, Heejung
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (02): : 3599 - 3613
  • [44] Simultaneous Transmitting and Reflecting-Reconfigurable Intelligent Surface in 6G: Design Guidelines and Future Perspectives
    Khalid, Waqas
    Kaleem, Zeeshan
    Ullah, Rehmat
    Van Chien, Trinh
    Noh, Song
    Yu, Heejung
    [J]. IEEE NETWORK, 2023, 37 (05): : 173 - 181
  • [45] Security Improvement With QoS Provisioning Using Service Priority and Power Allocation for NOMA-IoT Networks
    Khalid, Waqas
    Yu, Heejung
    [J]. IEEE ACCESS, 2021, 9 : 9937 - 9948
  • [46] Maximum Damage Malware Attack in Mobile Wireless Networks
    Khouzani, M. H. R.
    Sarkar, Saswati
    Altman, Eitan
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (05) : 1347 - 1360
  • [47] Kim B., 2021, P IEEE GLOB WORKSH G, P1
  • [48] Countering Adversarial Attacks on Autonomous Vehicles Using Denoising Techniques: A Review
    Kloukiniotis, A.
    Papandreou, A.
    Lalos, A.
    Kapsalas, P.
    Nguyen, D. -V.
    Moustakas, K.
    [J]. IEEE OPEN JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 3 : 61 - 80
  • [49] Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network
    Kwon, Hyun
    Kim, Yongchul
    Park, Ki-Woong
    Yoon, Hyunsoo
    Choi, Daeseon
    [J]. IEEE ACCESS, 2018, 6 : 46084 - 46096
  • [50] Double RIS-Assisted MIMO Systems Over Spatially Correlated Rician Fading Channels and Finite Scatterers
    Le, Ha An
    Van Chien, Trinh
    Nguyen, Van Duc
    Choi, Wan
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2023, 71 (08) : 4941 - 4956