Balancing QoS and security in the edge: Existing practices, challenges, and 6G opportunities with machine learning

ZM Fadlullah, B Mao, N Kato - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
While the emerging 6G networks are anticipated to meet the high-end service quality
demands of the mobile edge users in terms of data rate and delay satisfaction, new attack …

A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G

S Zhang, W Huang, Y Liu - Computers & Security, 2024 - Elsevier
The 6G system is envisioned to support various new applications with diverse requirements
in terms of quality and security. To fulfill diverse and stringent requirements, reconfigurable …

[HTML][HTML] Cybersecurity for tactical 6G networks: Threats, architecture, and intelligence

J Suomalainen, I Ahmad, A Shajan… - Future Generation …, 2025 - Elsevier
Edge intelligence, network autonomy, broadband satellite connectivity, and other concepts
for private 6G networks are enabling new applications for public safety authorities, eg, for …

[HTML][HTML] AI based energy harvesting security methods: A survey

M Mohammadi, I Sohn - ICT Express, 2023 - Elsevier
Energy Harvesting (EH) as a power source plays a critical role in the advent of new
technologies such as the Internet of Things (IoT). But, by providing power within the …

Physical layer security in satellite communication: State-of-the-art and open problems

N Abdelsalam, S Al-Kuwari, A Erbad - arXiv preprint arXiv:2301.03672, 2023 - arxiv.org
Satellite communications emerged as a promising extension to terrestrial networks in future
6G network research due to their extensive coverage in remote areas and ability to support …

Network Intrusion Detection to Mitigate Jamming and Spoofing Attacks Using Federated Leading: A Comprehensive Survey

T Rehman, N Tariq, M Ashraf… - … Measures for Logistics …, 2024 - igi-global.com
Network intrusions through jamming and spoofing attacks have become increasingly
prevalent. The ability to detect such threats at early stages is necessary for preventing a …

Safeguarding the V2X Pathways: Exploring the Cybersecurity Landscape through Systematic Literature Review

KHM Gularte, JAR Vargas, JPJ Da Costa… - IEEE …, 2024 - ieeexplore.ieee.org
Vehicle-to-Everything (V2X) communication, essential for enhancing road safety, driving
efficiency, and traffic management, must be robust against cybersecurity threats for …

Security and Trust in the 6G Era: Risks and Mitigations

G Tripi, A Iacobelli, L Rinieri, M Prandini - Electronics, 2024 - mdpi.com
The ubiquitous diffusion of connected devices in every context of the daily life of citizens,
public bodies, and companies is stimulating the creation of new applications that require …

Cooperative Beamforming with Artificial Noise Injection for Physical-Layer Security

G Jang, D Kim, IH Lee, H Jung - IEEE Access, 2023 - ieeexplore.ieee.org
In the sixth-generation (6G) communications, how to deploy and manage massively
connected Internet-of-Things (IoT) nodes will be one of the key technical challenges …

[图书][B] Predicting Jamming Systems Frequency Hopping Sequences Using Artificial Neural Networks

CJ Strickland, RJ Haddad - 2023 - ieeexplore.ieee.org
This paper proposes a neural network architecture that was designed to predict and reverse
engineer frequency hopping jamming systems. The neural network was trained for …