Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses

被引:20
作者
Ferrag, Mohamed Amine [1 ]
Friha, Othmane [2 ]
Kantarci, Burak [3 ]
Tihanyi, Norbert [1 ]
Cordeiro, Lucas [4 ]
Debbah, Merouane [5 ]
Hamouda, Djallel [6 ]
Al-Hawawreh, Muna [7 ]
Choo, Kim-Kwang Raymond [8 ]
机构
[1] Technol Innovat Inst, AI & Digital Sci Res Ctr, Abu Dhabi, U Arab Emirates
[2] Badji Mokhtar Annaba Univ, Networks & Syst Lab, Annaba 23000, Algeria
[3] Univ Ottawa, Sch Elect Engn & Comp Sci, Ottawa, ON K1N 6N5, Canada
[4] Univ Manchester, Dept Comp Sci, Manchester M13 9PL, England
[5] Khalifa Univ Sci & Technol, Khalifa Univ 6G Res Ctr, Abu Dhabi, U Arab Emirates
[6] Guelma Univ, Dept Comp Sci, Labst Lab, Guelma 24000, Algeria
[7] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
[8] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2023年 / 25卷 / 04期
基金
英国工程与自然科学研究理事会;
关键词
6G mobile communication; Security; Internet of Things; Surveys; Peer-to-peer computing; Image edge detection; Federated learning; Edge learning; 6G; IoT; federated learning; AI vulnerabilities; security; RECONFIGURABLE INTELLIGENT SURFACE; DATA POISONING ATTACKS; SECURITY THREATS; 6G; PRIVACY; COMMUNICATION; CHALLENGES; WIRELESS; IOT; COUNTERMEASURES;
D O I
10.1109/COMST.2023.3317242
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The deployment of the fifth-generation (5G) wireless networks in Internet of Everything (IoE) applications and future networks (e.g., sixth-generation (6G) networks) has raised a number of operational challenges and limitations, for example in terms of security and privacy. Edge learning is an emerging approach to training models across distributed clients while ensuring data privacy. Such an approach when integrated in future network infrastructures (e.g., 6G) can potentially solve challenging problems such as resource management and behavior prediction. However, edge learning (including distributed deep learning) are known to be susceptible to tampering and manipulation. This survey article provides a holistic review of the extant literature focusing on edge learning-related vulnerabilities and defenses for 6G-enabled Internet of Things (IoT) systems. Existing machine learning approaches for 6G-IoT security and machine learning-associated threats are broadly categorized based on learning modes, namely: centralized, federated, and distributed. Then, we provide an overview of enabling emerging technologies for 6G-IoT intelligence. We also provide a holistic survey of existing research on attacks against machine learning and classify threat models into eight categories, namely: backdoor attacks, adversarial examples, combined attacks, poisoning attacks, Sybil attacks, byzantine attacks, inference attacks, and dropping attacks. In addition, we provide a comprehensive and detailed taxonomy and a comparative summary of the state-of-the-art defense methods against edge learning-related vulnerabilities. Finally, as new attacks and defense technologies are realized, new research and future overall prospects for 6G-enabled IoT are discussed.
引用
收藏
页码:2654 / 2713
页数:60
相关论文
共 50 条
  • [41] A Dispersed Federated Learning Framework for 6G-Enabled Autonomous Driving Cars
    Khan, Latif U.
    Tun, Yan Kyaw
    Alsenwi, Madyan
    Imran, Muhammad
    Han, Zhu
    Hong, Choong Seon
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (06): : 5656 - 5667
  • [42] A comprehensive survey on data aggregation techniques in UAV-enabled Internet of things
    Raivi, Asif Mahmud
    Moh, Sangman
    COMPUTER SCIENCE REVIEW, 2023, 50
  • [43] A Comprehensive Survey on Revolutionizing Connectivity Through Artificial Intelligence-Enabled Digital Twin Network in 6G
    Sheraz, Muhammad
    Chuah, Teong Chee
    Lee, Ying Loong
    Alam, Muhammad Mahtab
    Al-Habashna, Ala'a
    Han, Zhu
    IEEE ACCESS, 2024, 12 : 49184 - 49215
  • [44] A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures
    Obaidat, Muath A.
    Obeidat, Suhaib
    Holst, Jennifer
    Al Hayajneh, Abdullah
    Brown, Joseph
    COMPUTERS, 2020, 9 (02)
  • [45] Allocation of power in NOMA based 6G-enabled internet of things using multi-objective based genetic algorithm
    Saraswat, Shelesh Krishna
    Deolia, Vinay Kumar
    Shukla, Aasheesh
    JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2023, 74 (02): : 95 - 101
  • [46] 6G-Enabled Edge AI for Metaverse: Challenges, Methods, and Future Research Directions
    Chang L.
    Zhang Z.
    Li P.
    Xi S.
    Guo W.
    Shen Y.
    Xiong Z.
    Kang J.
    Niyato D.
    Qiao X.
    Wu Y.
    Journal of Communications and Information Networks, 2022, 7 (02)
  • [47] Cost-Effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT)
    Mahmood, Khalid
    Obaidat, Mohammad S.
    Shamshad, Salman
    Alenazi, Mohammed J. F.
    Kumar, Gulshan
    Anisi, Mohammad Hossein
    Conti, Mauro
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (13): : 23977 - 23984
  • [48] Machine Learning Enabled Intrusion Detection for Edge Devices in the Internet of Things
    Alsharif, Maram
    Rawat, Danda B.
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 361 - 367
  • [49] Uplink Resource Allocation for NOMA-Based Hybrid Spectrum Access in 6G-Enabled Cognitive Internet of Things
    Liu, Xin
    Ding, Hua
    Hu, Su
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (20) : 15049 - 15058
  • [50] Internet-of-things-enabled serious games: A comprehensive survey
    Ahmad, Shabir
    Umirzakova, Sabina
    Jamil, Faisal
    Whangbo, Taeg Keun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 136 : 67 - 83