Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems

被引:6
作者
Son, Bui Duc [1 ]
Hoa, Nguyen Tien [1 ]
Chien, Trinh Van [2 ]
Khalid, Waqas [3 ]
Ferrag, Mohamed Amine [4 ]
Choi, Wan [5 ]
Debbah, Merouane [6 ]
机构
[1] Hanoi Univ Sci & Technol, Sch Elect & Elect Engn, Hanoi 100000, Vietnam
[2] Hanoi Univ Sci & Technol, Sch Informat & Commun Technol, Hanoi 100000, Vietnam
[3] Korea Univ, Inst Ind Technol, Sejong, South Korea
[4] Technol Innovat Inst, Abu Dhabi, U Arab Emirates
[5] Seoul Natl Univ, Inst New Media & Commun, Dept Elect & Comp Engn, Seoul, South Korea
[6] Khalifa Univ Sci & Technol, Ctr 6G Technol, Abu Dhabi, U Arab Emirates
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 11期
基金
新加坡国家研究基金会;
关键词
Internet of Things; 6G mobile communication; Hardware; Performance evaluation; Security; Resource management; Protocols; Adversarial attack; adversarial defenses; deep learning (DL); sixth generation (6G); CHANNEL ESTIMATION; MASSIVE IOT; COMMUNICATION; SECURITY; CLASSIFICATION; ARCHITECTURE; ROBUSTNESS; CHALLENGES; ALLOCATION; PRIVACY;
D O I
10.1109/JIOT.2024.3373808
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) and massive IoT systems are key to sixth-generation (6G) networks due to dense connectivity, ultrareliability, low latency, and high throughput. Artificial intelligence, including deep learning and machine learning, offers solutions for optimizing and deploying cutting-edge technologies for future radio communications. However, these techniques are vulnerable to adversarial attacks, leading to degraded performance and erroneous predictions, outcomes unacceptable for ubiquitous networks. This survey extensively addresses adversarial attacks and defense methods in 6G network-assisted IoT systems. The theoretical background and up-to-date research on adversarial attacks and defenses are discussed. Furthermore, we provide Monte Carlo simulations to validate the effectiveness of adversarial attacks compared to jamming attacks. Additionally, we examine the vulnerability of 6G IoT systems by demonstrating attack strategies applicable to key technologies, including reconfigurable intelligent surfaces, massive multiple-input-multiple-output (MIMO)/cell-free massive MIMO, satellites, the metaverse, and semantic communications. Finally, we outline the challenges and future developments associated with adversarial attacks and defenses in 6G IoT systems.
引用
收藏
页码:19168 / 19187
页数:20
相关论文
共 130 条
  • [51] DRLR: A Deep-Reinforcement-Learning-Based Recruitment Scheme for Massive Data Collections in 6G-Based IoT Networks
    Li, Ting
    Liu, Wei
    Zeng, Zhiwen
    Xiong, Neal N.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16) : 14595 - 14609
  • [52] Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction
    Liang, Bin
    Li, Hongcheng
    Su, Miaoqiang
    Li, Xirong
    Shi, Wenchang
    Wang, Xiaofeng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 72 - 85
  • [53] Exploratory Adversarial Attacks on Graph Neural Networks
    Lin, Xixun
    Zhou, Chuan
    Yang, Hong
    Wu, Jia
    Wang, Haibo
    Cao, Yanan
    Wang, Bin
    [J]. 20TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2020), 2020, : 1136 - 1141
  • [54] A Practical Black-Box Attack on Source Code Authorship Identification Classifiers
    Liu, Qianjun
    Ji, Shouling
    Liu, Changchang
    Wu, Chunming
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3620 - 3633
  • [55] Resource Allocation With Edge Computing in IoT Networks via Machine Learning
    Liu, Xiaolan
    Yu, Jiadong
    Wang, Jian
    Gao, Yue
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) : 3415 - 3426
  • [56] Privacy and Security Issues in Deep Learning: A Survey
    Liu, Ximeng
    Xie, Lehui
    Wang, Yaopeng
    Zou, Jian
    Xiong, Jinbo
    Ying, Zuobin
    Vasilakos, Athanasios V.
    [J]. IEEE ACCESS, 2021, 9 : 4566 - 4593
  • [57] On the Security of the One-and-a-Half-Class Classifier for SPAM Feature-Based Image Forensics
    Lorch, Benedikt
    Schirrmacher, Franziska
    Maier, Anatol
    Riess, Christian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2466 - 2479
  • [58] TRANSFORMATION-BASED ADVERSARIAL DEFENSE VIA SPARSE REPRESENTATION
    Lu, Bingyi
    Liu, Jiyuan
    Xiong, Huilin
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP, 2022, : 1726 - 1730
  • [59] Deep Learning Aided Robust Joint Channel Classification, Channel Estimation, and Signal Detection for Underwater Optical Communication
    Lu, Huaiyin
    Jiang, Ming
    Cheng, Julian
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (04) : 2290 - 2303
  • [60] Encrypted Semantic Communication Using Adversarial Training for Privacy Preserving
    Luo, Xinlai
    Chen, Zhiyong
    Tao, Meixia
    Yang, Feng
    [J]. IEEE COMMUNICATIONS LETTERS, 2023, 27 (06) : 1486 - 1490