Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses DOI
Mohamed Amine Ferrag, Othmane Friha, Burak Kantarcı

et al.

IEEE Communications Surveys & Tutorials, Journal Year: 2023, Volume and Issue: 25(4), P. 2654 - 2713

Published: Jan. 1, 2023

The deployment of the fifth-generation (5G) wireless networks in Internet Everything (IoE) applications and future (e.g., sixth-generation (6G) networks) has raised a number operational challenges limitations, for example terms security privacy. Edge learning is an emerging approach to training models across distributed clients while ensuring data Such when integrated network infrastructures 6G) can potentially solve challenging problems such as resource management behavior prediction. However, edge (including deep learning) are known be susceptible tampering manipulation. This survey article provides holistic review extant literature focusing on learning-related vulnerabilities defenses 6G-enabled Things (IoT) systems. Existing machine approaches 6G–IoT learning-associated threats broadly categorized based modes, namely: centralized, federated, distributed. Then, we provide overview enabling technologies intelligence. We also existing research attacks against classify threat into eight categories, backdoor attacks, adversarial examples, combined poisoning Sybil byzantine inference dropping attacks. In addition, comprehensive detailed taxonomy comparative summary state-of-the-art defense methods vulnerabilities. Finally, new realized, overall prospects IoT discussed.

Language: Английский

Mobility-Aware Cooperative Caching in Vehicular Edge Computing Based on Asynchronous Federated and Deep Reinforcement Learning DOI
Qiong Wu, Yu Zhao, Qiang Fan

et al.

IEEE Journal of Selected Topics in Signal Processing, Journal Year: 2022, Volume and Issue: 17(1), P. 66 - 81

Published: Nov. 10, 2022

The vehicular edge computing (VEC) can cache contents in different RSUs at the network to support real-time applications. In VEC, owing high-mobility characteristics of vehicles, it is necessary user data advance and learn most popular interesting for users. Since usually contains privacy information, users are reluctant share their with others. To solve this problem, traditional federated learning (FL) needs update global model synchronously through aggregating all users' local models protect privacy. However, vehicles may frequently drive out coverage area VEC before they achieve trainings thus cannot be uploaded as expected, which would reduce accuracy model. addition, caching capacity RSU limited diverse, size predicted exceeds RSU. Hence, should while considering content transmission delay. paper, we consider mobility propose a cooperative Caching scheme based on Asynchronous Federated deep Reinforcement (CAFR). We first an asynchronous FL algorithm obtain accurate model, then predict reinforcement optimal location order optimize Extensive experimental results have demonstrated that CAFR outperforms other baseline schemes.

Language: Английский

Citations

106

A review of IoT applications in healthcare DOI Creative Commons
Chunyan Li, Jiaji Wang, Shuihua Wang‎

et al.

Neurocomputing, Journal Year: 2023, Volume and Issue: 565, P. 127017 - 127017

Published: Nov. 9, 2023

Integrating Internet of Things (IoT) technologies in the healthcare industry represents a transformative shift with tangible benefits. This paper provides detailed examination IoT adoption healthcare, focusing on specific sensor types and communication methods. It underscores successful real-world applications, including remote patient monitoring, individualized treatment strategies, streamlined delivery. Furthermore, it delves into intricate challenges to realizing full potential healthcare. includes addressing data security concerns, ensuring seamless interoperability, optimizing use IoT-generated data. The seeks inspire practitioners researchers by highlighting practical implications emphasizing ways can enhance care, resource allocation, overall efficiency.

Language: Английский

Citations

91

Pushing AI to wireless network edge: an overview on integrated sensing, communication, and computation towards 6G DOI Open Access
Guangxu Zhu, Zhonghao Lyu,

Xiang Jiao

et al.

Science China Information Sciences, Journal Year: 2023, Volume and Issue: 66(3)

Published: Feb. 14, 2023

Language: Английский

Citations

87

Reconfiguring wireless environments via intelligent surfaces for 6G: reflection, modulation, and security DOI Open Access
Jindan Xu, Chau Yuen, Chongwen Huang

et al.

Science China Information Sciences, Journal Year: 2023, Volume and Issue: 66(3)

Published: Feb. 20, 2023

Language: Английский

Citations

76

Explainable AI Over the Internet of Things (IoT): Overview, State-of-the-Art and Future Directions DOI Creative Commons

Senthil Kumar Jagatheesaperumal,

Quoc‐Viet Pham, Rukhsana Ruby

et al.

IEEE Open Journal of the Communications Society, Journal Year: 2022, Volume and Issue: 3, P. 2106 - 2136

Published: Jan. 1, 2022

Explainable Artificial Intelligence (XAI) is transforming the field of (AI) by enhancing trust end-users in machines. As number connected devices keeps on growing, Internet Things (IoT) market needs to be trustworthy for end-users. However, existing literature still lacks a systematic and comprehensive survey work use XAI IoT. To bridge this lacking, paper, we address frameworks with focus their characteristics support We illustrate widely-used services IoT applications, such as security enhancement, Medical (IoMT), Industrial (IIoT), City (IoCT). also suggest implementation choice models over systems these applications appropriate examples summarize key inferences future works. Moreover, present cutting-edge development edge structures sixth-generation (6G) communication along inferences. In nutshell, paper constitutes first holistic compilation XAI-based tailored demands cases.

Language: Английский

Citations

75

Online Edge Learning Offloading and Resource Management for UAV-Assisted MEC Secure Communications DOI
Yu Ding, Yunqi Feng, Weidang Lu

et al.

IEEE Journal of Selected Topics in Signal Processing, Journal Year: 2022, Volume and Issue: 17(1), P. 54 - 65

Published: Nov. 17, 2022

The mobile and flexible unmanned aerial vehicle (UAV) with edge computing (MEC) can effectively relieve the pressure of massive data traffic in 5G Internet Things. In this paper, we propose a novel online learning offloading (OELO) scheme for UAV-assisted MEC secure communications, which improve computation performance. Moreover, problem information security is further considered since terminal users (TUs) may be eavesdropped due to light-of-sight characteristic UAV transmission. OELO scheme, maximize efficiency by optimizing TUs' binary decision resource management while guaranteeing dynamic task queue stability minimum requirement. Since optimization fractionally structured, constrained multi-variable coupled, first utilize Dinkelbach method transform structured into tractable form. Then, generates based on deep reinforcement (DRL) optimizes an iterative manner through successive convex approximation (SCA). Simulation results show that proposed achieves better performance enhances compared benchmarks.

Language: Английский

Citations

71

Task-Oriented Communications for 6G: Vision, Principles, and Technologies DOI
Yuanming Shi, Yong Zhou, Dingzhu Wen

et al.

IEEE Wireless Communications, Journal Year: 2023, Volume and Issue: 30(3), P. 78 - 85

Published: June 1, 2023

Driven by the interplay among artificial intelligence, digital twin, and wireless networks, 6G is envisaged to go beyond data-centric services provide intelligent immersive experiences. To efficiently support tasks with customized service requirements, it becomes critical develop novel information compression transmission technologies, which typically involve coupled sensing, communication, computation processes. this end, task-oriented communication stands out as a disruptive technology for system design exploiting task-specific structures folding goals into of task-level strategies. In article, developing extraction network resource orchestration strategies, we demonstrate effectiveness principles typical tasks, including federated learning, edge inference, semantic communication.

Language: Английский

Citations

65

Full-Duplex Communication for ISAC: Joint Beamforming and Power Optimization DOI
Zhenyao He, Wei Xu,

Hong Shen

et al.

IEEE Journal on Selected Areas in Communications, Journal Year: 2023, Volume and Issue: 41(9), P. 2920 - 2936

Published: June 23, 2023

Beamforming design has been widely investigated for integrated sensing and communication (ISAC) systems with full-duplex (FD) half-duplex (HD) communication, where the base station (BS) transmits receives radar signals simultaneously while operates in either downlink or uplink. To achieve higher spectral efficiency, this paper, we extend existing ISAC beamforming to a general case by considering FD capability both communication. Specifically, consider an system, BS performs target detection communicates multiple users uplink reusing same time frequency resources. We jointly optimize dual-functional transmit signal receive beamformers at power users. The problems are formulated under two criteria: consumption minimization sum rate maximization. transmissions tightly coupled due desired echo undesired interference received BS, making challenging. handle these issues cases, first determine optimal closed forms respect user power. Subsequently, invoke results obtain equivalent optimization propose iterative algorithms solve them. In addition, special criterion alternative low complexity design. Numerical demonstrate that optimized communication-based brings tremendous improvements terms of efficiency compared conventional HD

Language: Английский

Citations

60

Rethinking Wireless Communication Security in Semantic Internet of Things DOI
Hongyang Du, Jiacheng Wang, Dusit Niyato

et al.

IEEE Wireless Communications, Journal Year: 2023, Volume and Issue: 30(3), P. 36 - 43

Published: June 1, 2023

Semantic communication is an important component in the next generation of wireless networking. Enabled by this novel paradigm, conventional Internet-of-Things (IoT) evolving toward semantic IoT (SIoT) to achieve significant system performance improvements. However, traditional security techniques for bit transmission cannot be applied directly SIoT that focuses on information transmission. One key reason lack new indicators. Thus, we have rethink SIoT. As such, article, analyze and compare classical techniques, such as physical layer security, covert communications, encryption, from perspective security. We highlight differences among these when Novel indicators, secrecy outage probability (for techniques) detection failure are proposed. Considering communications can raise issues, then review attack defense methods at level. Lastly, present several promising directions future secure research.

Language: Английский

Citations

51

Noise-boosted weak signal detection in fractional nonlinear systems enhanced by increasing potential-well width and its application to mechanical fault diagnosis DOI
Zijian Qiao,

Yuanbiao He,

Changrong Liao

et al.

Chaos Solitons & Fractals, Journal Year: 2023, Volume and Issue: 175, P. 113960 - 113960

Published: Aug. 29, 2023

Language: Английский

Citations

44