Metaverse: Survey, applications, security, and opportunities

J Sun, W Gan, HC Chao, PS Yu - arXiv preprint arXiv:2210.07990, 2022 - arxiv.org
As a fusion of various emerging digital technologies, the Metaverse aims to build a virtual
shared digital space. It is closely related to extended reality, digital twin, blockchain, and …

Reinforcement learning-based physical cross-layer security and privacy in 6G

X Lu, L Xiao, P Li, X Ji, C Xu, S Yu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Sixth-generation (6G) cellular systems will have an inherent vulnerability to physical (PHY)-
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …

Cybersecurity of smart inverters in the smart grid: A survey

Y Li, J Yan - IEEE Transactions on Power Electronics, 2022 - ieeexplore.ieee.org
The penetration of distributed energy resources (DERs) in smart grids significantly increases
the number of field devices owned and controlled by consumers, aggregators, third parties …

A survey on network security for cyber–physical systems: From threats to resilient design

S Kim, KJ Park, C Lu - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are considered the integration of physical systems in the real
world and control software in computing systems. In CPS, the real world and the computing …

A survey of physical layer techniques for secure wireless communications in industry

P Angueira, I Val, J Montalban, Ó Seijo… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …

Big data meets metaverse: A survey

J Sun, W Gan, Z Chen, J Li, PS Yu - arXiv preprint arXiv:2210.16282, 2022 - arxiv.org
We are living in the era of big data. The Metaverse is an emerging technology in the future,
and it has a combination of big data, AI (artificial intelligence), VR (Virtual Reality), AR …

Man-in-the-middle attacks in mobile ad hoc networks (MANETs): Analysis and evaluation

MA Al-Shareeda, S Manickam - Symmetry, 2022 - mdpi.com
Mobile ad hoc networks (MANETs) are being used more and more in a variety of fields,
including the environment, energy efficiency, smart transportation, intelligent agriculture, and …

Machine and deep learning for iot security and privacy: applications, challenges, and future directions

S Bharati, P Podder - Security and communication networks, 2022 - Wiley Online Library
The integration of the Internet of Things (IoT) connects a number of intelligent devices with
minimum human interference that can interact with one another. IoT is rapidly emerging in …

Software-defined reconfigurable intelligent surfaces: From theory to end-to-end implementation

C Liaskos, L Mamatas, A Pourdamghani… - Proceedings of the …, 2022 - ieeexplore.ieee.org
Programmable wireless environments (PWEs) utilize internetworked intelligent
metasurfaces to transform wireless propagation into a software-controlled resource. In this …

Smart grid security and privacy: From conventional to machine learning issues (threats and countermeasures)

PH Mirzaee, M Shojafar, H Cruickshank… - IEEE access, 2022 - ieeexplore.ieee.org
Smart Grid (SG) is the revolutionised power network characterised by a bidirectional flow of
energy and information between customers and suppliers. The integration of power …