Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems

Bui Duc Son, Nguyen Tien Hoa, Trinh Van Chien, Waqas Khalid, Mohamed Amine Ferrag, Wan Choi, Merouane Debbah

Research output: Journal PublicationArticlepeer-review

29 Citations (Scopus)

Abstract

The Internet of Things (IoT) and massive IoT systems are key to sixth-generation (6G) networks due to dense connectivity, ultrareliability, low latency, and high throughput. Artificial intelligence, including deep learning and machine learning, offers solutions for optimizing and deploying cutting-edge technologies for future radio communications. However, these techniques are vulnerable to adversarial attacks, leading to degraded performance and erroneous predictions, outcomes unacceptable for ubiquitous networks. This survey extensively addresses adversarial attacks and defense methods in 6G network-assisted IoT systems. The theoretical background and up-to-date research on adversarial attacks and defenses are discussed. Furthermore, we provide Monte Carlo simulations to validate the effectiveness of adversarial attacks compared to jamming attacks. Additionally, we examine the vulnerability of 6G IoT systems by demonstrating attack strategies applicable to key technologies, including reconfigurable intelligent surfaces, massive multiple-input-multiple-output (MIMO)/cell-free massive MIMO, satellites, the metaverse, and semantic communications. Finally, we outline the challenges and future developments associated with adversarial attacks and defenses in 6G IoT systems.

Original languageEnglish
Pages (from-to)19168-19187
Number of pages20
JournalIEEE Internet of Things Journal
Volume11
Issue number11
DOIs
Publication statusPublished - 1 Jun 2024
Externally publishedYes

Keywords

  • Adversarial attack
  • adversarial defenses
  • deep learning (DL)
  • sixth generation (6G)

ASJC Scopus subject areas

  • Signal Processing
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems'. Together they form a unique fingerprint.

Cite this