Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems

被引:6
作者
Son, Bui Duc [1 ]
Hoa, Nguyen Tien [1 ]
Chien, Trinh Van [2 ]
Khalid, Waqas [3 ]
Ferrag, Mohamed Amine [4 ]
Choi, Wan [5 ]
Debbah, Merouane [6 ]
机构
[1] Hanoi Univ Sci & Technol, Sch Elect & Elect Engn, Hanoi 100000, Vietnam
[2] Hanoi Univ Sci & Technol, Sch Informat & Commun Technol, Hanoi 100000, Vietnam
[3] Korea Univ, Inst Ind Technol, Sejong, South Korea
[4] Technol Innovat Inst, Abu Dhabi, U Arab Emirates
[5] Seoul Natl Univ, Inst New Media & Commun, Dept Elect & Comp Engn, Seoul, South Korea
[6] Khalifa Univ Sci & Technol, Ctr 6G Technol, Abu Dhabi, U Arab Emirates
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 11期
基金
新加坡国家研究基金会;
关键词
Internet of Things; 6G mobile communication; Hardware; Performance evaluation; Security; Resource management; Protocols; Adversarial attack; adversarial defenses; deep learning (DL); sixth generation (6G); CHANNEL ESTIMATION; MASSIVE IOT; COMMUNICATION; SECURITY; CLASSIFICATION; ARCHITECTURE; ROBUSTNESS; CHALLENGES; ALLOCATION; PRIVACY;
D O I
10.1109/JIOT.2024.3373808
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) and massive IoT systems are key to sixth-generation (6G) networks due to dense connectivity, ultrareliability, low latency, and high throughput. Artificial intelligence, including deep learning and machine learning, offers solutions for optimizing and deploying cutting-edge technologies for future radio communications. However, these techniques are vulnerable to adversarial attacks, leading to degraded performance and erroneous predictions, outcomes unacceptable for ubiquitous networks. This survey extensively addresses adversarial attacks and defense methods in 6G network-assisted IoT systems. The theoretical background and up-to-date research on adversarial attacks and defenses are discussed. Furthermore, we provide Monte Carlo simulations to validate the effectiveness of adversarial attacks compared to jamming attacks. Additionally, we examine the vulnerability of 6G IoT systems by demonstrating attack strategies applicable to key technologies, including reconfigurable intelligent surfaces, massive multiple-input-multiple-output (MIMO)/cell-free massive MIMO, satellites, the metaverse, and semantic communications. Finally, we outline the challenges and future developments associated with adversarial attacks and defenses in 6G IoT systems.
引用
收藏
页码:19168 / 19187
页数:20
相关论文
共 130 条
  • [71] Practical Black-Box Attacks against Machine Learning
    Papernot, Nicolas
    McDaniel, Patrick
    Goodfellow, Ian
    Jha, Somesh
    Celik, Z. Berkay
    Swami, Ananthram
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 506 - 519
  • [72] Deep-Learning-Based Resource Allocation for Transmit Power Minimization in Uplink NOMA IoT Cellular Networks
    Park, Hyun Jung
    Kim, Hyeon Woong
    Chae, Sung Ho
    [J]. IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2023, 9 (03) : 708 - 721
  • [73] Park Ji-Young, 2022, 2022 IEEE International Conference on Big Data (Big Data), P1080, DOI 10.1109/BigData55660.2022.10020163
  • [74] Qin Y., 2021, IEEE IPCCC, P1, DOI DOI 10.1109/IPCCC51483.2021.9679424
  • [75] Mitigating Malicious Adversaries Evasion Attacks in Industrial Internet of Things
    Rafiq, Husnain
    Aslam, Nauman
    Ahmed, Usman
    Lin, Jerry Chun-Wei
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 960 - 968
  • [76] Adversarial Attacks and Defenses in Deep Learning
    Ren, Kui
    Zheng, Tianhang
    Qin, Zhan
    Liu, Xue
    [J]. ENGINEERING, 2020, 6 (03) : 346 - 360
  • [77] Physical Adversarial Attacks Against End-to-End Autoencoder Communication Systems
    Sadeghi, Meysam
    Larsson, Erik G.
    [J]. IEEE COMMUNICATIONS LETTERS, 2019, 23 (05) : 847 - 850
  • [78] Adversarial Attacks on Deep-Learning Based Radio Signal Classification
    Sadeghi, Meysam
    Larsson, Erik G.
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (01) : 213 - 216
  • [79] IoT Network Security from the Perspective of Adversarial Deep Learning
    Sagduyu, Yalin E.
    Shi, Yi
    Erpek, Tugba
    [J]. 2019 16TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2019,
  • [80] Deep-Learning-Assisted IoT-Based RIS for Cooperative Communications
    Sagir, Bulent
    Aydin, Erdogan
    Ilhan, Haci
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (12) : 10471 - 10483