Edge learning for 6G-enabled Internet of Things: A comprehensive survey of vulnerabilities, datasets, and defenses

MA Ferrag, O Friha, B Kantarci… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The deployment of the fifth-generation (5G) wireless networks in Internet of Everything (IoE)
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …

[HTML][HTML] Unleashing the potential of sixth generation (6G) wireless networks in smart energy grid management: A comprehensive review

MH Alsharif, A Jahid, R Kannadasan, MK Kim - Energy Reports, 2024 - Elsevier
As the world continues to seek sustainable and efficient energy solutions, the integration of
advanced technologies into smart energy grid management (SEGM) becomes a paramount …

Reconfigurable intelligent surface for physical layer security in 6G-IoT: Designs, issues, and advances

W Khalid, MAU Rehman, T Van Chien… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Sixth-generation (6G) networks pose substantial security risks because confidential
information is transmitted over wireless channels with a broadcast nature, and various attack …

Secure V2V communications in relay-assisted cognitive radio vehicular networks with imperfect CSI

Y Zhang, J Hou, X Zhao - IEEE Transactions on Intelligent …, 2023 - ieeexplore.ieee.org
This article considers a relay-based underlay cognitive radio vehicular network, where a
secondary source vehicle transmits information to a secondary destination vehicle with a …

Next-Generation Multiple Access: From Basic Principles to Modern Architectures

EA Jorswieck - Proceedings of the IEEE, 2024 - ieeexplore.ieee.org
The pressure to develop new network architectures and multiple access technologies is
driven by increasing demands on network performance, number of devices, network traffic …

Channel Prediction-Based Security Authentication for Artificial Intelligence of Things

X Qiu, J Yu, W Zhuang, G Li, X Sun - Sensors, 2023 - mdpi.com
The emerging physical-layer unclonable attribute-aided authentication (PLUA) schemes are
capable of outperforming traditional isolated approaches, with the advantage of having …

Physical layer security optimization with Cramér-Rao bound Metric in ISAC systems under sensing-specific imperfect CSI model

H Jia, X Li, L Ma - IEEE Transactions on Vehicular Technology, 2023 - ieeexplore.ieee.org
The integrated sensing and communication (ISAC) endows the next generation of wireless
networks with the new paradigm to the security communication. In this paper, the dual …

A physical layer security scheme for 6G wireless networks using post-quantum cryptography

W Abdallah - Computer Communications, 2024 - Elsevier
The sixth generation (6G) of mobile networks is poised to revolutionize communication
capabilities with its infinite-like reach. These networks will feature an ultra-dense topology …

Joint secure communication and sensing in 6G networks

M Mitev, A Mayya, A Chorti - arXiv preprint arXiv:2310.14624, 2023 - arxiv.org
Joint communication and sensing is expected to be one of the features introduced by the
sixth-generation (6G) wireless systems. This will enable a huge variety of new applications …

How physicality enables trust: A new era of trust-centered cyberphysical systems

S Gil, M Yemini, A Chorti, A Nedić, HV Poor… - arXiv preprint arXiv …, 2023 - arxiv.org
Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and
security. The unique characteristics of these systems prompt a reevaluation of their security …