Adaptive and Dynamic Security in AI-Empowered 6G: From an Energy Efficiency Perspective

被引:28
作者
Shen S. [1 ]
Yu C. [1 ]
Zhang K. [1 ]
Ni J. [2 ]
Ci S. [3 ]
机构
[1] University of Nebraska, Lincoln
来源
IEEE Communications Standards Magazine | 2021年 / 5卷 / 03期
关键词
D O I
10.1109/MCOMSTD.101.2000090
中图分类号
学科分类号
摘要
Emerging AI-empowered services and techniques, such as connected vehicle, intelligent industry, and smart city, are forthcoming with the sixth generation (6G) cellular network to benefit daily life, industry, and society. However, the increasing integration of the 6G network with the physical world leads to a plethora of new scenarios that bring new challenges to 6G, especially from the security and energy aspects. In 5G networks, security solutions across all devices and base stations are configured with universal settings for certain types of attacks. This one-size-fit-all strategy no longer suits 6G security due to the higher diversity in device capabilities, service features, energy conditions, attack vulnerabilities, and other time-varying attributes. Since each scenario may have unique security requirements and energy availability, the selection and configuration of security strategies need to be optimized for 6G networks in an adaptive and dynamic manner. In this article, we explore 6G security from an energy efficiency perspective by balancing the tradeoff between security and energy consumption in various scenarios. Specifically, we first investigate the AI-empowered 6G network architecture with promising applications and visions. Then we identify the challenges for adaptive and dynamic security optimization in 6G from the aspects of heterogeneity, dynamics, and modeling complexity. To balance security-energy trade-off, we propose an optimization framework that provides customized recommendations of security strategy to different user devices and base stations. Finally, open issues are discussed on 6G security from an energy efficiency perspective. © 2017 IEEE.
引用
收藏
页码:80 / 88
页数:8
相关论文
共 15 条
[1]  
Giordani M., Et al., Toward 6g networks: Use cases and technologies, Ieee Commun. Mag., 58, 3, pp. 55-61, (2020)
[2]  
Letaief K., Et al., The roadmap to 6g: Ai empowered wireless networks, Ieee Commun. Mag., 57, 8, pp. 84-90, (2019)
[3]  
Zhang Z., Et al., 6g wireless networks: Vision, requirements, architecture, and key technologies, Ieee Vehic. Technology Mag., 14, 3, pp. 28-41, (2019)
[4]  
Ahmad I., Et al., Overview of 5g security challenges and solutions, Ieee Commun. Standards Mag., 2, 1, pp. 36-43, (2018)
[5]  
Shen S., Et al., Security in edge-Assisted internet of things: Challenges and solutions, Science China Info. Sciences, 63, 12, pp. 1-14, (2020)
[6]  
Al-Dulaimi A., Lin X., Reshaping autonomous driving for the 6g era, Ieee Commun. Standards Mag., 4, 1, (2020)
[7]  
Mollah M., Et al., Blockchain for the internet of vehicles towards intelligent transportation systems: A survey, Ieee Internet of Things J., 8, 6, pp. 4157-4185, (2020)
[8]  
Bi Q., Ten trends in the cellular industry and an outlook on 6g, Ieee Commun. Mag., 57, 12, pp. 31-36, (2019)
[9]  
Tariq F., Et al., A speculative study on 6g, Ieee Wireless Commun., 27, 4, pp. 118-125, (2020)
[10]  
Zhang J., Et al., Poisongan: Generative poisoning attacks against federated learning in edge computing systems, Ieee Internet of Things J., 8, 5, pp. 3310-3322, (2020)