IEEE Communications Surveys & Tutorials,
Journal Year:
2023,
Volume and Issue:
25(4), P. 2654 - 2713
Published: Jan. 1, 2023
The
deployment
of
the
fifth-generation
(5G)
wireless
networks
in
Internet
Everything
(IoE)
applications
and
future
(e.g.,
sixth-generation
(6G)
networks)
has
raised
a
number
operational
challenges
limitations,
for
example
terms
security
privacy.
Edge
learning
is
an
emerging
approach
to
training
models
across
distributed
clients
while
ensuring
data
Such
when
integrated
network
infrastructures
6G)
can
potentially
solve
challenging
problems
such
as
resource
management
behavior
prediction.
However,
edge
(including
deep
learning)
are
known
be
susceptible
tampering
manipulation.
This
survey
article
provides
holistic
review
extant
literature
focusing
on
learning-related
vulnerabilities
defenses
6G-enabled
Things
(IoT)
systems.
Existing
machine
approaches
6G–IoT
learning-associated
threats
broadly
categorized
based
modes,
namely:
centralized,
federated,
distributed.
Then,
we
provide
overview
enabling
technologies
intelligence.
We
also
existing
research
attacks
against
classify
threat
into
eight
categories,
backdoor
attacks,
adversarial
examples,
combined
poisoning
Sybil
byzantine
inference
dropping
attacks.
In
addition,
comprehensive
detailed
taxonomy
comparative
summary
state-of-the-art
defense
methods
vulnerabilities.
Finally,
new
realized,
overall
prospects
IoT
discussed.
IEEE Journal of Selected Topics in Signal Processing,
Journal Year:
2022,
Volume and Issue:
17(1), P. 66 - 81
Published: Nov. 10, 2022
The
vehicular
edge
computing
(VEC)
can
cache
contents
in
different
RSUs
at
the
network
to
support
real-time
applications.
In
VEC,
owing
high-mobility
characteristics
of
vehicles,
it
is
necessary
user
data
advance
and
learn
most
popular
interesting
for
users.
Since
usually
contains
privacy
information,
users
are
reluctant
share
their
with
others.
To
solve
this
problem,
traditional
federated
learning
(FL)
needs
update
global
model
synchronously
through
aggregating
all
users'
local
models
protect
privacy.
However,
vehicles
may
frequently
drive
out
coverage
area
VEC
before
they
achieve
trainings
thus
cannot
be
uploaded
as
expected,
which
would
reduce
accuracy
model.
addition,
caching
capacity
RSU
limited
diverse,
size
predicted
exceeds
RSU.
Hence,
should
while
considering
content
transmission
delay.
paper,
we
consider
mobility
propose
a
cooperative
Caching
scheme
based
on
Asynchronous
Federated
deep
Reinforcement
(CAFR).
We
first
an
asynchronous
FL
algorithm
obtain
accurate
model,
then
predict
reinforcement
optimal
location
order
optimize
Extensive
experimental
results
have
demonstrated
that
CAFR
outperforms
other
baseline
schemes.
Neurocomputing,
Journal Year:
2023,
Volume and Issue:
565, P. 127017 - 127017
Published: Nov. 9, 2023
Integrating
Internet
of
Things
(IoT)
technologies
in
the
healthcare
industry
represents
a
transformative
shift
with
tangible
benefits.
This
paper
provides
detailed
examination
IoT
adoption
healthcare,
focusing
on
specific
sensor
types
and
communication
methods.
It
underscores
successful
real-world
applications,
including
remote
patient
monitoring,
individualized
treatment
strategies,
streamlined
delivery.
Furthermore,
it
delves
into
intricate
challenges
to
realizing
full
potential
healthcare.
includes
addressing
data
security
concerns,
ensuring
seamless
interoperability,
optimizing
use
IoT-generated
data.
The
seeks
inspire
practitioners
researchers
by
highlighting
practical
implications
emphasizing
ways
can
enhance
care,
resource
allocation,
overall
efficiency.
IEEE Open Journal of the Communications Society,
Journal Year:
2022,
Volume and Issue:
3, P. 2106 - 2136
Published: Jan. 1, 2022
Explainable
Artificial
Intelligence
(XAI)
is
transforming
the
field
of
(AI)
by
enhancing
trust
end-users
in
machines.
As
number
connected
devices
keeps
on
growing,
Internet
Things
(IoT)
market
needs
to
be
trustworthy
for
end-users.
However,
existing
literature
still
lacks
a
systematic
and
comprehensive
survey
work
use
XAI
IoT.
To
bridge
this
lacking,
paper,
we
address
frameworks
with
focus
their
characteristics
support
We
illustrate
widely-used
services
IoT
applications,
such
as
security
enhancement,
Medical
(IoMT),
Industrial
(IIoT),
City
(IoCT).
also
suggest
implementation
choice
models
over
systems
these
applications
appropriate
examples
summarize
key
inferences
future
works.
Moreover,
present
cutting-edge
development
edge
structures
sixth-generation
(6G)
communication
along
inferences.
In
nutshell,
paper
constitutes
first
holistic
compilation
XAI-based
tailored
demands
cases.
IEEE Journal of Selected Topics in Signal Processing,
Journal Year:
2022,
Volume and Issue:
17(1), P. 54 - 65
Published: Nov. 17, 2022
The
mobile
and
flexible
unmanned
aerial
vehicle
(UAV)
with
edge
computing
(MEC)
can
effectively
relieve
the
pressure
of
massive
data
traffic
in
5G
Internet
Things.
In
this
paper,
we
propose
a
novel
online
learning
offloading
(OELO)
scheme
for
UAV-assisted
MEC
secure
communications,
which
improve
computation
performance.
Moreover,
problem
information
security
is
further
considered
since
terminal
users
(TUs)
may
be
eavesdropped
due
to
light-of-sight
characteristic
UAV
transmission.
OELO
scheme,
maximize
efficiency
by
optimizing
TUs'
binary
decision
resource
management
while
guaranteeing
dynamic
task
queue
stability
minimum
requirement.
Since
optimization
fractionally
structured,
constrained
multi-variable
coupled,
first
utilize
Dinkelbach
method
transform
structured
into
tractable
form.
Then,
generates
based
on
deep
reinforcement
(DRL)
optimizes
an
iterative
manner
through
successive
convex
approximation
(SCA).
Simulation
results
show
that
proposed
achieves
better
performance
enhances
compared
benchmarks.
IEEE Wireless Communications,
Journal Year:
2023,
Volume and Issue:
30(3), P. 78 - 85
Published: June 1, 2023
Driven
by
the
interplay
among
artificial
intelligence,
digital
twin,
and
wireless
networks,
6G
is
envisaged
to
go
beyond
data-centric
services
provide
intelligent
immersive
experiences.
To
efficiently
support
tasks
with
customized
service
requirements,
it
becomes
critical
develop
novel
information
compression
transmission
technologies,
which
typically
involve
coupled
sensing,
communication,
computation
processes.
this
end,
task-oriented
communication
stands
out
as
a
disruptive
technology
for
system
design
exploiting
task-specific
structures
folding
goals
into
of
task-level
strategies.
In
article,
developing
extraction
network
resource
orchestration
strategies,
we
demonstrate
effectiveness
principles
typical
tasks,
including
federated
learning,
edge
inference,
semantic
communication.
IEEE Journal on Selected Areas in Communications,
Journal Year:
2023,
Volume and Issue:
41(9), P. 2920 - 2936
Published: June 23, 2023
Beamforming
design
has
been
widely
investigated
for
integrated
sensing
and
communication
(ISAC)
systems
with
full-duplex
(FD)
half-duplex
(HD)
communication,
where
the
base
station
(BS)
transmits
receives
radar
signals
simultaneously
while
operates
in
either
downlink
or
uplink.
To
achieve
higher
spectral
efficiency,
this
paper,
we
extend
existing
ISAC
beamforming
to
a
general
case
by
considering
FD
capability
both
communication.
Specifically,
consider
an
system,
BS
performs
target
detection
communicates
multiple
users
uplink
reusing
same
time
frequency
resources.
We
jointly
optimize
dual-functional
transmit
signal
receive
beamformers
at
power
users.
The
problems
are
formulated
under
two
criteria:
consumption
minimization
sum
rate
maximization.
transmissions
tightly
coupled
due
desired
echo
undesired
interference
received
BS,
making
challenging.
handle
these
issues
cases,
first
determine
optimal
closed
forms
respect
user
power.
Subsequently,
invoke
results
obtain
equivalent
optimization
propose
iterative
algorithms
solve
them.
In
addition,
special
criterion
alternative
low
complexity
design.
Numerical
demonstrate
that
optimized
communication-based
brings
tremendous
improvements
terms
of
efficiency
compared
conventional
HD
IEEE Wireless Communications,
Journal Year:
2023,
Volume and Issue:
30(3), P. 36 - 43
Published: June 1, 2023
Semantic
communication
is
an
important
component
in
the
next
generation
of
wireless
networking.
Enabled
by
this
novel
paradigm,
conventional
Internet-of-Things
(IoT)
evolving
toward
semantic
IoT
(SIoT)
to
achieve
significant
system
performance
improvements.
However,
traditional
security
techniques
for
bit
transmission
cannot
be
applied
directly
SIoT
that
focuses
on
information
transmission.
One
key
reason
lack
new
indicators.
Thus,
we
have
rethink
SIoT.
As
such,
article,
analyze
and
compare
classical
techniques,
such
as
physical
layer
security,
covert
communications,
encryption,
from
perspective
security.
We
highlight
differences
among
these
when
Novel
indicators,
secrecy
outage
probability
(for
techniques)
detection
failure
are
proposed.
Considering
communications
can
raise
issues,
then
review
attack
defense
methods
at
level.
Lastly,
present
several
promising
directions
future
secure
research.