A Survey on Security of Ultra/Hyper Reliable Low Latency Communication: Recent Advancements, Challenges, and Future Directions (2404.08160v1)
Abstract: Ultra-reliable low latency communication (URLLC) is an innovative service offered by fifth-generation (5G) wireless systems. URLLC enables various mission-critical applications by facilitating reliable and low-latency signal transmission to support extreme Quality of Service (QoS) requirements. Apart from reliability and latency, ensuring secure data transmission for URLLC has been a prominent issue for researchers in recent years. Using finite blocklength signals to achieve the stringent reliability and latency criteria in URLLC eliminates the possibility of using conventional complex cryptographic security enhancement techniques based on encoding and decoding of secret keys. Thus, the development of lightweight security mechanisms is of paramount importance for URLLC. Recently, Physical-Layer Security (PLS) techniques have emerged as a powerful alternative to the complex cryptography-based security approaches for facilitating secure URLLC by exploiting the randomness of the wireless channel. Therefore, in this survey, we present a comprehensive and in-depth review of the state-of-the-art PLS enhancements utilized to unleash secure URLLC while analyzing the impact of various system design parameters on its performance. Moreover, the survey incorporates a detailed overview of the recent advancements in ensuring secure URLLC using PLS in various mission-critical applications, and 5G URLLC enabling technologies like non-orthogonal multiple access (NOMA), multi-antenna systems, cooperative communication using unmanned aerial vehicles (UAV), and intelligent reflective surfaces (IRS). Apart from this, we briefly discuss the role of advanced Machine Learning (ML) techniques in designing robust and intelligent PLS schemes for URLLC service.
- V. L. Nguyen, P. C. Lin, B. C. Cheng, R. H. Hwang, and Y. D. Lin, “Security and privacy for 6G: A survey on prospective technologies and challenges,” IEEE Communications Surveys & Tutorials, vol. 23, no. 4, pp. 2384–2428, Fourth quarter, 2021.
- P. Popovski, K. F. Trillingsgaard, O. Simeone, and G. Durisi, “5G wireless network slicing for eMBB, URLLC, and mMTC: A communication-theoretic view,” IEEE Access, vol. 6, pp. 55 765–55 779, Sep. 2018.
- J. Navarro-Ortiz, P. Romero-Diaz, S. Sendra, P. Ameigeiras, J. J. Ramos-Munoz, and J. M. Lopez-Soler, “A survey on 5G usage scenarios and traffic models,” IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 905–929, Second quarter, 2020.
- P. Yadav, S. Kumar, and R. Kumar, “A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challenges,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 9, p. e4270, Sep. 2021.
- R. Ali, Y. B. Zikria, A. K. Bashir, S. Garg, and H. S. Kim, “URLLC for 5G and beyond: Requirements, enabling incumbent technologies and network intelligence,” IEEE Access, vol. 9, pp. 67 064–67 095, Apr. 2021.
- H.-M. Wang, Q. Yang, Z. Ding, and H. V. Poor, “Secure short-packet communications for mission-critical IoT applications,” IEEE Transactions on Wireless Communications, vol. 18, no. 5, pp. 2565–2578, May 2019.
- C. Feng and H. M. Wang, “Secure Short-Packet Communications at the Physical Layer for 5G and Beyond,” IEEE Communications Standards Magazine, vol. 5, no. 3, pp. 96–102, Sep. 2021.
- Y. Ji, J. Yu, Y. Yao, K. Yu, H. Chen, and S. Zheng, “Securing wireless communications from the perspective of physical layer: A survey,” Internet of Things, vol. 19, p. 100524, Aug. 2022.
- J. Tang, H. Wen, H. Song, T. Zhang, and K. Qin, “On the security–reliability and secrecy throughput of random mobile user in Internet of Things,” IEEE Internet of Things Journal, vol. 7, no. 10, pp. 10 635–10 649, Jun. 2020.
- C. Feng, H.-M. Wang, and H. V. Poor, “Reliable and secure short-packet communications,” IEEE Transactions on Wireless Communications, vol. 21, no. 3, pp. 1913–1926, Mar. 2022.
- R. Chen, C. Li, S. Yan, R. Malaney, and J. Yuan, “Physical layer security for ultra-reliable and low-latency communications,” IEEE Wireless Communications, vol. 26, no. 5, pp. 6–11, Oct. 2019.
- Y. Xie, P. Ren, D. Xu, and Q. Li, “Security and reliability performance analysis for urllc with randomly distributed eavesdroppers,” in 2021 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 2021, pp. 1–6.
- Z. Xiang, W. Yang, Y. Cai, J. Xiong, Z. Ding, and Y. Song, “Secure transmission in a NOMA-assisted IoT network with diversified communication requirements,” IEEE Internet of Things Journal, vol. 7, no. 11, pp. 11 157–11 169, Nov. 2020.
- C. Cao, H. Li, Z. Hu, W. Liu, and X. Zhang, “Physical-layer secrecy performance in finite blocklength case,” in 2015 IEEE Global Communications Conference (GLOBECOM). IEEE, 2015, pp. 1–6.
- S. Zhang, D. Zhu, and Y. Liu, “Artificial intelligence empowered physical layer security for 6G: State-of-the-art, challenges, and opportunities,” Computer Networks, p. 110255, Feb. 2024.
- ITUR, “Framework and overall objectives of the future development of IMT for 2030 and beyond,” International Telecommunication Union (ITU) Recommendation (ITU-R), Tech. Rep., 2023.
- T. Tao, Y. Wang, D. Li, Y. Wan, P. Baracca, and A. Wang, “6G Hyper Reliable and Low-latency Communication–Requirement Analysis and Proof of Concept,” in 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall). IEEE, 2023, pp. 1–5.
- J. M. Hamamreh, H. M. Furqan, and H. Arslan, “Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1773–1828, Second quarter, 2019.
- E. Illi, M. Qaraqe, S. Althunibat, A. Alhasanat, M. Alsafasfeh, M. de Ree, G. Mantas, J. Rodriguez, W. Aman, and S. Al-Kuwari, “Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks,” IEEE Communications Surveys & Tutorials, vol. 26, no. 1, pp. 347–388, First quarter 2024.
- Y. Liu, H.-H. Chen, and L. Wang, “Physical layer security for next generation wireless networks: Theories, technologies, and challenges,” IEEE Communications Surveys & Tutorials, vol. 19, no. 1, pp. 347–376, First quarter, 2016.
- M. S. Kumar, R. Ramanathan, and M. Jayakumar, “Key less physical layer security for wireless networks: A survey,” Engineering Science and Technology, an International Journal, p. 101260, Sep. 2022.
- N. Wang, P. Wang, A. Alipour-Fanid, L. Jiao, and K. Zeng, “Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8169–8181, Oct. 2019.
- Y. Wu, A. Khisti, C. Xiao, G. Caire, K.-K. Wong, and X. Gao, “A survey of physical layer security techniques for 5G wireless networks and challenges ahead,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 4, pp. 679–695, Apr. 2018.
- J. D. V. Sánchez, L. Urquiza-Aguiar, M. C. P. Paredes, and D. P. M. Osorio, “Survey on physical layer security for 5G wireless networks,” Annals of Telecommunications, vol. 76, pp. 155–174, Apr. 2021.
- X. Zhou, M. R. McKay, B. Maham, and A. Hjørungnes, “Rethinking the secrecy outage formulation: A secure transmission design perspective,” IEEE Communications Letters, vol. 15, no. 3, pp. 302–304, Jan. 2011.
- M. U. A. Siddiqui, H. Abumarshoud, L. Bariah, S. Muhaidat, M. A. Imran, and L. Mohjazi, “URLLC in Beyond 5G and 6G Networks: An Interference Management Perspective,” IEEE Access, vol. 11, pp. 54 639–54 663, Jun. 2023.
- M. E. Haque, F. Tariq, M. R. Khandaker, K.-K. Wong, and Y. Zhang, “A Survey of Scheduling in 5G URLLC and Outlook for Emerging 6G Systems,” IEEE Access, vol. 11, pp. 34 372–34 396, Apr. 2023.
- G. J. Sutton, J. Zeng, R. P. Liu, W. Ni, D. N. Nguyen, B. A. Jayawickrama, X. Huang, M. Abolhasan, Z. Zhang, E. Dutkiewicz et al., “Enabling technologies for ultra-reliable and low latency communications: From PHY and MAC layer perspectives,” IEEE Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2488–2524, Third quarter 2019.
- T.-K. Le, U. Salim, and F. Kaltenberger, “An overview of physical layer design for ultra-reliable low-latency communications in 3GPP releases 15, 16, and 17,” IEEE access, vol. 9, pp. 433–444, Dec. 2020.
- A. Yener and S. Ulukus, “Wireless physical-layer security: Lessons learned from information theory,” Proceedings of the IEEE, vol. 103, no. 10, pp. 1814–1825, Oct. 2015.
- D. Wang, B. Bai, W. Zhao, and Z. Han, “A survey of optimization approaches for wireless physical layer security,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1878–1911, Nov. 2018.
- I. Ahmad, S. Shahabuddin, T. Kumar, J. Okwuibe, A. Gurtov, and M. Ylianttila, “Security for 5G and beyond,” IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3682–3722, Fourth quarter, 2019.
- R. Khan, P. Kumar, D. N. K. Jayakody, and M. Liyanage, “A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions,” IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 196–248, First quarter, 2020.
- Z. Xiang, W. Yang, Y. Cai, Z. Ding, Y. Song, and Y. Zou, “NOMA-assisted secure short-packet communications in IoT,” IEEE Wireless Communications, vol. 27, no. 4, pp. 8–15, Aug. 2020.
- X. Li, H.-N. Dai, M. K. Shukla, D. Li, H. Xu, and M. Imran, “Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications,” Computer Standards & Interfaces, vol. 78, p. 103540, Oct. 2021.
- P. Angueira, I. Val, J. Montalban, Ó. Seijo, E. Iradier, P. S. Fontaneda, L. Fanari, and A. Arriola, “A survey of physical layer techniques for secure wireless communications in industry,” IEEE Communications Surveys & Tutorials, vol. 24, no. 2, pp. 810–838, Second quarter, 2022.
- M. Mitev, A. Chorti, H. V. Poor, and G. Fettweis, “What physical layer security can do for 6G security,” IEEE Open Journal of Vehicular Technology, vol. 4, pp. 375–388, Feb. 2023.
- X. Sun, D. W. K. Ng, Z. Ding, Y. Xu, and Z. Zhong, “Physical layer security in UAV systems: Challenges and opportunities,” IEEE Wireless Communications, vol. 26, no. 5, pp. 40–47, Oct. 2019.
- C. E. Shannon, “Communication theory of secrecy systems,” The Bell system technical journal, vol. 28, no. 4, pp. 656–715, Oct. 1949.
- Z. Sheng, H. D. Tuan, A. A. Nasir, H. V. Poor, and E. Dutkiewicz, “Physical layer security aided wireless interference networks in the presence of strong eavesdropper channels,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3228–3240, Apr. 2021.
- Y. Xie and P. Ren, “Optimizing Training and Transmission Overheads for Secure URLLC Against Randomly Distributed Eavesdroppers,” IEEE Transactions on Vehicular Technology, vol. 71, no. 11, pp. 11 921–11 935, Nov. 2022.
- T. 3GPP, “Study on New Radio (NR) access technology (release 14),” 3GPP TR 38.912 VI4. 0.0, 2017.
- P. Popovski, Č. Stefanović, J. J. Nielsen, E. De Carvalho, M. Angjelichinoski, K. F. Trillingsgaard, and A.-S. Bana, “Wireless access in ultra-reliable low-latency communication (URLLC),” IEEE Transactions on Communications, vol. 67, no. 8, pp. 5783–5801, May 2019.
- M. A. Siddiqi, H. Yu, and J. Joung, “5G ultra-reliable low-latency communication implementation challenges and operational issues with IoT devices,” Electronics, vol. 8, no. 9, p. 981, Sep. 2019.
- Z. Sheng, H. D. Tuan, A. A. Nasir, and H. V. Poor, “Pls for wireless interference networks in the short blocklength regime with strong wiretap channels,” in GLOBECOM 2020-2020 IEEE Global Communications Conference. IEEE, 2020, pp. 1–6.
- Y. Polyanskiy, H. V. Poor, and S. Verdú, “Channel coding rate in the finite blocklength regime,” IEEE Transactions on Information Theory, vol. 56, no. 5, pp. 2307–2359, Apr. 2010.
- Y. Huo, Y. Tian, L. Ma, X. Cheng, and T. Jing, “Jamming strategies for physical layer security,” IEEE Wireless Communications, vol. 25, no. 1, pp. 148–153, Feb. 2018.
- A. D. Wyner, “The wire-tap channel,” Bell system technical journal, vol. 54, no. 8, pp. 1355–1387, Oct. 1975.
- H. Sharma, N. Kumar, and R. Tekchandani, “Mitigating Jamming Attack in 5G Heterogeneous Networks: A Federated Deep Reinforcement Learning Approach,” IEEE Transactions on Vehicular Technology, vol. 72, no. 2, pp. 2439–2452, Oct. 2022.
- C. Gong, X. Yue, Z. Zhang, X. Wang, and X. Dai, “Enhancing physical layer security with artificial noise in large-scale NOMA networks,” IEEE Transactions on Vehicular Technology, vol. 70, no. 3, pp. 2349–2361, Mar. 2021.
- X. Zhou and M. R. McKay, “Physical layer security with artificial noise: Secrecy capacity and optimal power allocation,” in 2009 3rd International Conference on Signal Processing and Communication Systems. IEEE, 2009, pp. 1–5.
- Y. Xie, T. Zhang, and P. Ren, “Secrecy Outage Analysis of Pilot-Assisted URLLC Systems With Randomly Distributed Eavesdroppers,” IEEE Communications Letters, vol. 27, no. 4, pp. 1095–1099, Apr. 2023.
- M. Cheng, Y. Ling, and W. Wu, “Time Series Analysis for Jamming Attack Detection in Wireless Networks. GLOBECOM 2017 2017 IEEE Global Communications Conference, 1-7,” 2017.
- H. Ren, C. Pan, Y. Deng, M. Elkashlan, and A. Nallanathan, “Transmit power minimization for secure short-packet transmission in a mission-critical IoT scenario,” in GLOBECOM 2020-2020 IEEE Global Communications Conference. IEEE, Dec. 2020, pp. 1–6.
- T.-X. Zheng, H.-M. Wang, D. W. K. Ng, and J. Yuan, “Physical-layer security in the finite blocklength regime over fading channels,” IEEE Transactions on Wireless Communications, vol. 19, no. 5, pp. 3405–3420, Feb. 2020.
- I. M. Tanash and T. Riihonen, “Global minimax approximations and bounds for the Gaussian Q-function by sums of exponentials,” IEEE Transactions on Communications, vol. 68, no. 10, pp. 6514–6524, Oct. 2020.
- W. Huang, S. Xiao, L. Wu, C. Kai, S. He, and C. Li, “Achievable Rate Region for uRLLC Interference Channel with Finite Blocklength Transmission,” IEEE Transactions on Vehicular Technology, vol. 72, no. 7, pp. 8857–8868, Jul. 2023.
- X. Zhang, J. Wang, and H. V. Poor, “Statistical QoS-driven energy-efficiency optimization for URLLC over 5G mobile wireless networks in the finite blocklength regime,” in 2019 53rd Annual Conference on Information Sciences and Systems (CISS). IEEE, 2019, pp. 1–6.
- Y. Xie, P. Ren, D. Xu, and Q. Li, “Optimizing training and transmission overheads of URLLC in industrial IoT networks,” in 2020 IEEE Globecom Workshops (GC Wkshps. IEEE, 2020, pp. 1–6.
- J. Cao, X. Zhu, Y. Jiang, Y. Liu, Z. Wei, S. Sun, and F.-C. Zheng, “Independent Pilots vs. Shared Pilot: Short Frame Structure Optimization for Heterogeneous-Traffic URLLC Networks,” IEEE Transactions on Wireless Communications, vol. 21, no. 8, pp. 5755–5769, Aug. 2022.
- X. Zhou, W. Xia, Q. Zhang, J. Zhang, and H. Zhu, “Power Allocation of Superimposed Pilots for URLLC With Short-Packet Transmission in IIoT,” IEEE Wireless Communications Letters, vol. 11, no. 11, pp. 2365–2369, Nov. 2022.
- J. Cao, X. Zhu, Y. Jiang, Y. Liu, and F.-C. Zheng, “Joint block length and pilot length optimization for URLLC in the finite block length regime,” in 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, 2019, pp. 1–6.
- Y. Lin, C. Shen, Y. Hu, B. Ai, and Z. Zhong, “Joint Design of Channel Training and Data Transmission for MISO-URLLC Systems,” IEEE Transactions on Wireless Communications, vol. 21, no. 10, pp. 8646–8659, Oct. 2022.
- H. Ren, C. Pan, Y. Deng, M. Elkashlan, and A. Nallanathan, “Joint pilot and payload power allocation for massive-MIMO-enabled URLLC IIoT networks,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 5, pp. 816–830, May 2020.
- J.-H. Cho, Y. Wang, R. Chen, K. S. Chan, and A. Swami, “A survey on modeling and optimizing multi-objective systems,” IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1867–1901, Third quarter 2017.
- Y. Chen, Z. Xiang, X. Qiao, T. Zhang, and J. Zhang, “Secure short-packet communications in cognitive Internet of Things,” in 2020 IEEE 3rd International Conference on Electronics and Communication Engineering (ICECE). IEEE, 2020, pp. 31–36.
- H. Ren, C. Pan, Y. Deng, M. Elkashlan, and A. Nallanathan, “Resource allocation for secure URLLC in mission-critical IoT scenarios,” IEEE Transactions on Communications, vol. 68, no. 9, pp. 5793–5807, Jun. 2020.
- N. Arı, N. Thomos, and L. Musavian, “Secrecy performance of short packet communications: Wiretap channel with multiple receivers and eavesdroppers,” in 2022 International Wireless Communications and Mobile Computing (IWCMC). IEEE, 2022, pp. 395–400.
- Y. Xie, P. Ren, and D. Xu, “Security-Oriented Pilot and Data Transmission for URLLC in Mission-Critical IoT Scenarios,” IEEE Internet of Things Journal, vol. 10, no. 15, pp. 13 697–13 715, Aug. 2023.
- R.-H. Gau, “Transmission policies for improving physical layer secrecy throughput in wireless networks,” IEEE communications letters, vol. 16, no. 12, pp. 1972–1975, Dec. 2012.
- L. Zhang and Y.-C. Liang, “Average throughput analysis and optimization in cooperative IoT networks with short packet communication,” IEEE Transactions on Vehicular Technology, vol. 67, no. 12, pp. 11 549–11 562, Dec. 2018.
- L. Wei, Y. Yang, and B. Jiao, “Secrecy throughput in full-duplex multiuser MIMO short-packet communications,” IEEE Wireless Communications Letters, vol. 10, no. 6, pp. 1339–1343, Mar. 2021.
- H. Lei, F. Yang, I. S. Ansari, H. Liu, K. J. Kim, and T. A. Tsiftsis, “Secrecy Outage Performance Analysis for Uplink CR-NOMA Systems with Hybrid SIC,” IEEE Internet of Things Journal, vol. 10, no. 15, pp. 13 181–13 195, Aug. 2023.
- K. Yu, J. Yu, and A. Dong, “Cooperative Communication and Mobility for Securing URLLC of Future Wireless Networks,” IEEE Transactions on Vehicular Technology, vol. 71, no. 5, pp. 5331–5342, May 2022.
- Z. Wei, C. Masouros, F. Liu, S. Chatzinotas, and B. Ottersten, “Energy-and cost-efficient physical layer security in the era of IoT: The role of interference,” IEEE Communications Magazine, vol. 58, no. 4, pp. 81–87, Apr. 2020.
- A. Pradhan, S. Das, and M. J. Piran, “Blocklength Optimization and Power Allocation for Energy-Efficient and Secure URLLC in Industrial IoT,” IEEE Internet of Things Journal, Oct. 2023.
- J. Zhao and W. P. Zhu, “Power allocation and scaling law analysis for secured and energy efficient URLLC IoT networks,” Physical Communication, vol. 45, p. 101293, Apr. 2021.
- H. Yang, “Secure energy efficiency maximization for dual-UAV-assisted intelligent reflecting surface system,” Physical Communication, vol. 52, p. 101622, Jan. 2022.
- C. Li, C. She, N. Yang, and T. Q. Quek, “Secure transmission rate of short packets with queueing delay requirement,” IEEE Transactions on Wireless Communications, vol. 21, no. 1, pp. 203–218, Jul. 2021.
- T. Yu, X. Sun, Y. Cai, and Z. Zhu, “Secure short-packet transmission in uplink massive MU-MIMO assisted URLLC under imperfect CSI,” China Communications, vol. 20, no. 12, pp. 196–211, May 2023.
- M. T. Mamaghani, X. Zhou, N. Yang, and A. L. Swindlehurst, “Secure short-packet communications via uav-enabled mobile relaying: Joint resource optimization and 3d trajectory design,” IEEE Transactions on Wireless Communications, Dec. 2023.
- J. M. Hamamreh, E. Basar, and H. Arslan, “OFDM-subcarrier index selection for enhancing security and reliability of 5G URLLC services,” IEEE Access, vol. 5, pp. 25 863–25 875, Nov. 2017.
- X. Lai, T. Wu, Q. Zhang, and J. Qin, “Average secure BLER analysis of NOMA downlink short-packet communication systems in flat Rayleigh fading channels,” IEEE Transactions on Wireless Communications, vol. 20, no. 5, pp. 2948–2960, May 2021.
- J. Zhao, X. Zhu, Y. Jiang, Z. Wei, and X. Wan, “A secure hybrid duplex relay system with joint optimization of finite blocklength and power,” in GLOBECOM 2020-2020 IEEE Global Communications Conference. IEEE, 2020, pp. 1–6.
- J. Farhat, G. Brante, R. D. Souza, and J. P. Vilela, “On the Secure Spectral Efficiency of URLLC With Randomly Located Colluding Eavesdroppers,” IEEE Internet of Things Journal, vol. 8, no. 19, pp. 14 672–14 682, Apr. 2021.
- H. Ma, J. Cheng, X. Wang, and P. Ma, “Robust MISO beamforming with cooperative jamming for secure transmission from perspectives of QoS and secrecy rate,” IEEE Transactions on Communications, vol. 66, no. 2, pp. 767–780, Feb. 2018.
- C. Wang, Z. Li, and D. W. K. Ng, “Optimal joint beamforming and jamming design for secure and covert URLLC,” in 2021 IEEE Global Communications Conference (GLOBECOM). IEEE, Dec. 2021, pp. 1–7.
- H. Yang, K. Zheng, K. Zhang, J. Mei, and Y. Qian, “Ultra-reliable and low-latency communications for connected vehicles: Challenges and solutions,” IEEE Network, vol. 34, no. 3, pp. 92–100, Jun. 2020.
- K. Yu, S. Zheng, G. Li, X. Liu, X. Yang, and X. Zhao, “The impact of mobility on physical layer security in 5G uRLLC,” International Journal of Intelligent Systems, vol. 37, no. 12, pp. 10 751–10 782, Dec. 2022.
- D. P. M. Osorio, I. Ahmad, J. D. V. Sánchez, A. Gurtov, J. Scholliers, M. Kutila, and P. Porambage, “Towards 6G-enabled internet of vehicles: Security and privacy,” IEEE Open Journal of the Communications Society, vol. 3, pp. 82–105, Jan. 2022.
- M. Hao, D. Ye, S. Wang, B. Tan, and R. Yu, “URLLC resource slicing and scheduling for trustworthy 6G vehicular services: A federated reinforcement learning approach,” Physical Communication, vol. 49, p. 101470, Dec. 2021.
- H. M. Furqan, M. S. J. Solaija, J. M. Hamamreh, and H. Arslan, “Intelligent physical layer security approach for V2X communication,” arXiv preprint arXiv:1905.05075, 2019.
- B. M. ElHalawany, A. A. A. El-Banna, and K. Wu, “Physical-layer security and privacy for vehicle-to-everything,” IEEE Communications Magazine, vol. 57, no. 10, pp. 84–90, Oct. 2019.
- T. M. Ho, T. D. Tran, T. T. Nguyen, S. Kazmi, L. B. Le, C. S. Hong, and L. Hanzo, “Next-generation wireless solutions for the smart factory, smart vehicles, the smart grid and smart cities,” arXiv preprint arXiv:1907.10102, 2019.
- P. Schwenteck, G. T. Nguyen, H. Boche, W. Kellerer, and F. H. Fitzek, “6g perspective of mobile network operators, manufacturers, and verticals,” IEEE Networking Letters, vol. 5, no. 3, pp. 169–172, Sep. 2023.
- Z. Ji, P. L. Yeoh, G. Chen, J. Zhang, Y. Zhang, Z. He, H. Yin, and Y. Li, “Physical-layer-based secure communications for static and low-latency industrial internet of things,” IEEE Internet of Things Journal, vol. 9, no. 19, pp. 18 392–18 405, Oct. 2022.
- W. Mao, Z. Zhao, Z. Chang, G. Min, and W. Gao, “Energy-efficient industrial Internet of Things: Overview and open issues,” IEEE transactions on industrial informatics, vol. 17, no. 11, pp. 7225–7237, Nov. 2021.
- S. N. Islam, Z. Baig, and S. Zeadally, “Physical layer security for the smart grid: Vulnerabilities, threats, and countermeasures,” IEEE Transactions on Industrial Informatics, vol. 15, no. 12, pp. 6522–6530, Dec. 2019.
- M. B. Hossain, S. R. Pokhrel, and J. Choi, “Orchestrating Smart Grid Demand Response Operations With URLLC and MuZero Learning,” IEEE Internet of Things Journal, vol. 11, no. 4, pp. 6692–6704, Feb. 2024.
- X. Yang, Z. Zho, and B. Huang, “URLLC key technologies and standardization for 6G power Internet of Things,” IEEE Communications Standards Magazine, vol. 5, no. 2, pp. 52–59, May 2021.
- S. F. Ahmed, M. S. B. Alam, S. Afrin, S. J. Rafa, S. B. Taher, M. Kabir, S. Muyeen, and A. H. Gandomi, “Towards a secure 5G-enabled Internet of Things: A survey on requirements, privacy, security, challenges, and opportunities,” IEEE Access, vol. 12, pp. 13 125–13 145, Jan. 2024.
- J. Zhu, Y. Zou, and B. Zheng, “Physical-layer security and reliability challenges for industrial wireless sensor networks,” IEEE access, vol. 5, pp. 5313–5320, Apr. 2017.
- T. Q. Duong, D. Van Huynh, S. R. Khosravirad, V. Sharma, O. A. Dobre, and H. Shin, “From digital twin to metaverse: The role of 6G ultra-reliable and low-latency communications with multi-tier computing,” IEEE Wireless Communications, vol. 30, no. 3, pp. 140–146, Jun. 2023.
- A. K. Yerrapragada, T. Eisman, and B. Kelley, “Physical layer security for beyond 5G: Ultra secure low latency communications,” IEEE Open Journal of the Communications Society, vol. 2, pp. 2232–2242, Aug. 2021.
- S. Yang, D. Yin, X. Song, X. Dong, G. Manogaran, G. Mastorakis, C. X. Mavromoustakis, and J. M. Batalla, “Security situation assessment for massive MIMO systems for 5G communications,” Future Generation Computer Systems, vol. 98, pp. 25–34, Sep. 2019.
- J. Östman, A. Lancho, G. Durisi, and L. Sanguinetti, “URLLC with massive MIMO: Analysis and design at finite blocklength,” IEEE Transactions on Wireless Communications, vol. 20, no. 10, pp. 6387–6401, Oct. 2021.
- T. Wu, J. Zeng, N. Ye, W. Feng, and T. Lv, “Accurate Asymptotic Characterization of α𝛼\alphaitalic_α-κ𝜅\kappaitalic_κ-μ𝜇\muitalic_μ Shadowed Fading Channel with Application to Secure URLLC,” IEEE Communications Letters, vol. 27, no. 4, pp. 1100–1104, Apr. 2023.
- C. Zhang, F. Jia, Z. Zhang, J. Ge, and F. Gong, “Physical layer security designs for 5G NOMA systems with a stronger near-end internal eavesdropper,” IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp. 13 005–13 017, Nov. 2020.
- K. Cao, B. Wang, H. Ding, L. Lv, R. Dong, T. Cheng, and F. Gong, “Improving physical layer security of uplink NOMA via energy harvesting jammers,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 786–799, Sep. 2020.
- S. Pakravan, J.-Y. Chouinard, X. Li, M. Zeng, W. Hao, Q.-V. Pham, and O. A. Dobre, “Physical Layer Security for NOMA Systems: Requirements, Issues, and Recommendations,” IEEE Internet of Things Journal, vol. 10, no. 24, pp. 21 721–21 737, Dec. 2023.
- Y. Feng, S. Yan, C. Liu, Z. Yang, and N. Yang, “Two-stage relay selection for enhancing physical layer security in non-orthogonal multiple access,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 6, pp. 1670–1683, Jun. 2019.
- A. Salem and L. Musavian, “NOMA in cooperative communication systems with energy-harvesting nodes and wireless secure transmission,” IEEE Transactions on Wireless Communications, vol. 20, no. 2, pp. 1023–1037, Feb. 2021.
- J. Farhat, G. Brante, and R. D. Souza, “Secure throughput optimization of selective decode-and-forward with finite blocklength,” in 2018 IEEE 87th Vehicular Technology Conference (VTC Spring). IEEE, 2018, pp. 1–5.
- H. Duan, Y. Jiang, X. Zhu, and F.-C. Zheng, “A Full-Duplex Relay System for URLLC with Adaptive Self-Interference Processing,” Ultra-Reliable and Low-Latency Communications (URLLC) Theory and Practice: Advances in 5G and Beyond, pp. 259–289, Mar. 2023.
- Y. Ji, K. Yu, J. Qiu, and J. Yu, “Massive MIMO and Secrecy Guard Zone Based Improving Physical Layer Security in UAV-Enabled uRLLC Networks,” IEEE Transactions on Vehicular Technology, vol. 72, no. 4, pp. 4553–4567, Apr. 2023.
- Q. Wu, J. Xu, Y. Zeng, D. W. K. Ng, N. Al-Dhahir, R. Schober, and A. L. Swindlehurst, “A comprehensive overview on 5G-and-beyond networks with UAVs: From communications to sensing and intelligence,” IEEE Journal on Selected Areas in Communications, vol. 39, no. 10, pp. 2912–2945, Jun. 2021.
- X. Chen, N. Zhao, Z. Chang, T. Hämäläinen, and X. Wang, “UAV-aided secure short-packet data collection and transmission,” IEEE Transactions on Communications, vol. 71, no. 4, pp. 2475–2486, Apr. 2023.
- A. Ranjha, M. A. Javed, G. Srivastava, and J. C.-W. Lin, “Intercell Interference Coordination for UAV enabled URLLC with perfect/imperfect CSI using cognitive radio,” IEEE Open Journal of the Communications Society, vol. 4, pp. 197–208, Dec. 2022.
- Y. Zhou, P. L. Yeoh, H. Chen, Y. Li, R. Schober, L. Zhuo, and B. Vucetic, “Improving physical layer security via a UAV friendly jammer for unknown eavesdropper location,” IEEE Transactions on Vehicular Technology, vol. 67, no. 11, pp. 11 280–11 284, Nov. 2018.
- W. U. Khan, E. Lagunas, Z. Ali, M. A. Javed, M. Ahmed, S. Chatzinotas, B. Ottersten, and P. Popovski, “Opportunities for physical layer security in UAV communication enhanced with intelligent reflective surfaces,” IEEE Wireless Communications, vol. 29, no. 6, pp. 22–28, Dec. 2022.
- H. K. Narsani, A. Ranjha, K. Dev, F. H. Memon, and N. M. F. Qureshi, “Leveraging UAV-assisted communications to improve secrecy for URLLC in 6G systems,” Digital Communications and Networks, Aug. 2022.
- P. Tedeschi, S. Sciancalepore, and R. Di Pietro, “Security in energy harvesting networks: A survey of current solutions and research challenges,” IEEE Communications Surveys & Tutorials, vol. 22, no. 4, pp. 2658–2693, Fourth quarter, 2020.
- A. Masaracchia, Y. Li, K. K. Nguyen, C. Yin, S. R. Khosravirad, D. B. Da Costa, and T. Q. Duong, “UAV-enabled ultra-reliable low-latency communications for 6G: A comprehensive survey,” IEEE Access, vol. 9, pp. 137 338–137 352, Oct. 2021.
- Z. Sheng, L. Cui, A. A. Nasir, R. Wang, and Y. Fang, “URLLC-oriented secure communication for UAV relay-assisted network,” Physical Communication, vol. 59, p. 102063, Aug. 2023.
- G. Xie, C. Yang, Y. Feng, G. Liu, and B. Dai, “Secure Finite Blocklength Coding Schemes for Reconfigurable Intelligent Surface Aided Wireless Channels with Feedback,” IEEE Transactions on Communications, vol. 71, no. 5, pp. 2931–2946, May 2023.
- M. Almekhlafi, M. A. Arfaoui, C. Assi, and A. Ghrayeb, “Enabling URLLC applications through reconfigurable intelligent surfaces: Challenges and potential,” IEEE Internet of Things Magazine, vol. 5, no. 1, pp. 130–135, Mar. 2022.
- B. Zhang, K. Wang, K. Yang, and G. Zhang, “IRS-assisted short packet wireless energy transfer and communications,” IEEE Wireless Communications Letters, vol. 11, no. 2, pp. 303–307, Feb. 2022.
- B. Ali, J. Mirza, S. H. Alvi, M. Z. Khan, M. A. Javed, and A. Noorwali, “IRS-Assisted Physical Layer Security for 5G Enabled Industrial Internet of Things,” IEEE Access, vol. 11, pp. 21 354–21 363, Feb. 2023.
- F. Naeem, G. Kaddoum, S. Khan, K. S. Khan, and N. Adam, “IRS-empowered 6G networks: deployment strategies, performance optimization, and future research directions,” IEEE Access, vol. 10, pp. 118 676–118 696, Nov. 2022.
- J. Jalali, A. Khalili, A. Rezaei, R. Berkvens, M. Weyn, and J. Famaey, “IRS-Based Energy Efficiency and Admission Control Maximization for IoT Users With Short Packet Lengths,” IEEE Transactions on Vehicular Technology, vol. 72, no. 9, pp. 12 379–12 384, Sep. 2023.
- J. H. I. de Souza, V. Croisfelt, R. Kotaba, T. Abrão, and P. Popovski, “Uplink Multiplexing of eMBB/URLLC Services Assisted by Reconfigurable Intelligent Surfaces,” arXiv preprint arXiv:2305.04629, 2023.
- F. Naeem, M. Ali, G. Kaddoum, C. Huang, and C. Yuen, “Security and Privacy for Reconfigurable Intelligent Surface in 6G: A Review of Prospective Applications and Challenges,” IEEE Open Journal of the Communications Society, vol. 4, pp. 1196–1217, May 2023.
- A. Almohamad, A. M. Tahir, A. Al-Kababji, H. M. Furqan, T. Khattab, M. O. Hasna, and H. Arslan, “Smart and secure wireless communications via reflecting intelligent surfaces: A short survey,” IEEE Open Journal of the Communications Society, vol. 1, pp. 1442–1456, Sep. 2020.
- H. Peng, Y. Zheng, P. He, Y. Cui, R. Wang, D. Wu, and L. Chen, “Intelligent Reflecting Surfaces Assisted UAV Reliable Communication,” in 2023 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2023, pp. 1–6.
- S. Yan, X. Zhou, D. W. K. Ng, J. Yuan, and N. Al-Dhahir, “Intelligent reflecting surface for wireless communication security and privacy,” arXiv preprint arXiv:2103.16696, 2021.
- Z. Yang, M. Zolanvari, and R. Jain, “A Survey of Important Issues in Quantum Computing and Communications,” IEEE Communications Surveys & Tutorials, vol. 25, no. 2, pp. 1059–1094, Second quarter, 2023.
- N. Romero-Zurita, D. McLernon, M. Ghogho, and A. Swami, “PHY layer security based on protected zone and artificial noise,” IEEE Signal Processing Letters, vol. 20, no. 5, pp. 487–490, May 2013.
- W. Liu, Z. Ding, T. Ratnarajah, and J. Xue, “On ergodic secrecy capacity of random wireless networks with protected zones,” IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6146–6158, Aug. 2016.
- M. T. Mamaghani, X. Zhou, N. Yang, and A. L. Swindlehurst, “Secure short-packet transmission with aerial relaying: Blocklength and trajectory co-design,” arXiv preprint arXiv:2310.05142, 2023.
- X. F. Cabezas, D. M. Osorio, and M. Latva-aho, “Weighted secrecy coverage analysis and the impact of friendly jamming over UAV-enabled networks,” in 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit). IEEE, 2021, pp. 124–129.
- I. Ahmad, S. Shahabuddin, H. Malik, E. Harjula, T. Leppänen, L. Loven, A. Anttonen, A. H. Sodhro, M. M. Alam, M. Juntti et al., “Machine learning meets communication networks: Current trends and future challenges,” IEEE Access, vol. 8, pp. 223 418–223 460, Dec. 2020.
- R. Shafin, L. Liu, V. Chandrasekhar, H. Chen, J. Reed, and J. C. Zhang, “Artificial intelligence-enabled cellular networks: A critical path to beyond-5G and 6G,” IEEE Wireless Communications, vol. 27, no. 2, pp. 212–217, Apr. 2020.
- Y. Wang, T. Sun, S. Li, X. Yuan, W. Ni, E. Hossain, and H. V. Poor, “Adversarial Attacks and Defenses in Machine Learning-Empowered Communication Systems and Networks: A Contemporary Survey,” IEEE Communications Surveys & Tutorials, vol. 25, no. 4, pp. 2245–2298, Fourth quarter, 2023.
- H. Sharma and N. Kumar, “Deep learning based physical layer security for terrestrial communications in 5G and beyond networks: A survey,” Physical Communication, p. 102002, Jan. 2023.
- J. Zhang, X. Xu, S. Han, K. Zhang, P. Zhang, and S. Ren, “Intelligent Ultra-Reliable and Low Latency Communications: Security and Flexibility,” IEEE Transactions on Wireless Communications, vol. 22, no. 11, pp. 8392–8406, Nov. 2023.
- C.-Y. Chen, G.-L. Hung, and H.-Y. Hsieh, “A study on a new type of DDoS attack against 5G ultra-reliable and low-latency communications,” in 2020 European Conference on Networks and Communications (EuCNC). IEEE, 2020, pp. 188–193.
- R. Dong, B. Wang, K. Cao, J. Tian, and T. Cheng, “Secure Transmission Design of RIS Enabled UAV Communication Networks Exploiting Deep Reinforcement Learning,” IEEE Transactions on Vehicular Technology, pp. 1–15, Jan. 2024.
- T. Bao, J. Zhu, H.-C. Yang, and M. O. Hasna, “Secrecy outage performance of ground-to-air communications with multiple aerial eavesdroppers and its deep learning evaluation,” IEEE Wireless Communications Letters, vol. 9, no. 9, pp. 1351–1355, Sep. 2020.
- R. Dong, B. Wang, and K. Cao, “Deep learning driven 3D robust beamforming for secure communication of UAV systems,” IEEE Wireless Communications Letters, vol. 10, no. 8, pp. 1643–1647, Aug. 2021.
- X. Wang and F. Liu, “Data-driven relay selection for physical-layer security: A decision tree approach,” IEEE Access, vol. 8, pp. 12 105–12 116, Jan. 2020.
- S. I. Alnagar, A. M. Salhab, and S. A. Zummo, “Q-learning-based power allocation for secure wireless communication in UAV-aided relay network,” IEEE Access, vol. 9, pp. 33 169–33 180, Feb. 2021.
- Y. Fu, S. Wang, C.-X. Wang, X. Hong, and S. McLaughlin, “Artificial intelligence to manage network traffic of 5G wireless networks,” IEEE Network, vol. 32, no. 6, pp. 58–64, Nov. 2018.
- Y. Liu, J. Peng, J. Kang, A. M. Iliyasu, D. Niyato, and A. A. Abd El-Latif, “A secure federated learning framework for 5G networks,” IEEE Wireless Communications, vol. 27, no. 4, pp. 24–31, Aug. 2020.
- N. Moustafa, N. Koroniotis, M. Keshk, A. Y. Zomaya, and Z. Tari, “Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions,” IEEE Communications Surveys & Tutorials, vol. 25, no. 3, pp. 1775–1807, Third quarter, 2023.
- Y. Xiao, Q. Du, W. Cheng, G. K. Karagiannidis, and Z. Zhao, “Model-ML Integrated IntellIgence In Urllc towards end-to-end delay FUlFIllMent over vehIcUlar networks,” IEEE Internet of Things Magazine, vol. 6, no. 3, pp. 62–68, Sep. 2023.
- X. Wang, S. Garg, H. Lin, J. Hu, G. Kaddoum, M. J. Piran, and M. S. Hossain, “Toward accurate anomaly detection in industrial internet of things using hierarchical federated learning,” IEEE Internet of Things Journal, vol. 9, no. 10, pp. 7110–7119, Apr. 2021.
- A. Zappone, M. Di Renzo, and M. Debbah, “Wireless networks design in the era of deep learning: Model-based, AI-based, or both?” IEEE Transactions on Communications, vol. 67, no. 10, pp. 7331–7376, Oct. 2019.
- S. H. A. Kazmi, F. Qamar, R. Hassan, K. Nisar, and M. A. Al-Betar, “Security of Federated Learning in 6G Era: A Review on Conceptual Techniques and Software Platforms used for Research and Analysis,” Computer Networks, p. 110358, Mar. 2024.
- Q. Li, Z. Wen, Z. Wu, S. Hu, N. Wang, Y. Li, X. Liu, and B. He, “A survey on federated learning systems: Vision, hype and reality for data privacy and protection,” IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 4, pp. 3347–3366, Apr. 2023.
- X. Liu, Y. Deng, A. Nallanathan, and M. Bennis, “Federated Learning and Meta Learning: Approaches, Applications, and Directions,” IEEE Communications Surveys & Tutorials, vol. 26, no. 1, pp. 571–618, First quarter 2024.
- K. Wei, J. Li, M. Ding, C. Ma, H. H. Yang, F. Farokhi, S. Jin, T. Q. Quek, and H. V. Poor, “Federated learning with differential privacy: Algorithms and performance analysis,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3454–3469, Apr. 2020.
- S. Gallenmüller, J. Naab, I. Adam, and G. Carle, “5G URLLC: A case study on low-latency intrusion prevention,” IEEE Communications Magazine, vol. 58, no. 10, pp. 35–41, Oct. 2020.
- R. Wang, J. Lai, X. Li, D. He, and M. K. Khan, “RPIFL: Reliable and Privacy-Preserving Federated Learning for the Internet of Things,” Journal of Network and Computer Applications, vol. 221, p. 103768, 2024.
- L. C. Mutalemwa and S. Shin, “A classification of the enabling techniques for low latency and reliable communications in 5G and beyond: AI-enabled edge caching,” IEEE Access, vol. 8, pp. 205 502–205 533, Nov. 2020.
- E. M. Ghourab, L. Bariah, S. Muhaidat, P. C. Sofotasios, M. Al-Qutayri, and E. Damiani, “Secure Relay Selection with Outdated CSI in Cooperative Wireless Vehicular Networks: A DQN Approach,” IEEE Access, vol. 12, pp. 12 424–1243, May 2023.
- Y. Zhang, Y. Lu, R. Zhang, B. Ai, and D. Niyato, “Deep Reinforcement Learning for Secrecy Energy Efficiency Maximization in RIS-Assisted Networks,” IEEE Transactions on Vehicular Technology, vol. 72, no. 9, pp. 12 413–12 418, Sep. 2023.
- C.-X. Wang, X. You, X. Gao, X. Zhu, Z. Li, C. Zhang, H. Wang, Y. Huang, Y. Chen, H. Haas et al., “On the road to 6G: Visions, requirements, key technologies and testbeds,” IEEE Communications Surveys & Tutorials, vol. 25, no. 2, pp. 905–974, Second quarter, 2023.
- W. Saad, M. Bennis, and M. Chen, “A vision of 6G wireless systems: Applications, trends, technologies, and open research problems,” IEEE network, vol. 34, no. 3, pp. 134–142, May 2020.
- I. F. Akyildiz, A. Kak, and S. Nie, “6G and beyond: The future of wireless communications systems,” IEEE Access, vol. 8, pp. 133 995–134 030, Jul. 2020.
- F. Tariq, M. R. Khandaker, K.-K. Wong, M. A. Imran, M. Bennis, and M. Debbah, “A speculative study on 6G,” IEEE Wireless Communications, vol. 27, no. 4, pp. 118–125, Aug. 2020.
- Y. Zhu, X. Yuan, Y. Hu, R. F. Schaefer, and A. Schmeink, “Trade Reliability for Security: Leakage-Failure Probability Minimization for Machine-Type Communications in URLLC,” IEEE Journal on Selected Areas in Communications, vol. 41, no. 7, pp. 2123–2137, Jul. 2023.
- P. Porambage, G. Gür, D. P. M. Osorio, M. Liyanage, A. Gurtov, and M. Ylianttila, “The roadmap to 6G security and privacy,” IEEE Open Journal of the Communications Society, vol. 2, pp. 1094–1122, May 2021.
- H. Lee, B. Lee, H. Yang, J. Kim, S. Kim, W. Shin, B. Shim, and H. V. Poor, “Towards 6G hyper-connectivity: Vision, challenges, and key enabling technologies,” Journal of Communications and Networks, vol. 25, no. 3, pp. 344–354, Jun. 2023.
- E. C. Strinati, S. Barbarossa, J. L. Gonzalez-Jimenez, D. Ktenas, N. Cassiau, L. Maret, and C. Dehos, “6G: The next frontier: From holographic messaging to artificial intelligence using subterahertz and visible light communication,” IEEE Vehicular Technology Magazine, vol. 14, no. 3, pp. 42–50, Sep. 2019.
- C. Lipps, S. Baradie, M. Noushinfar, J. Herbst, A. Weinand, and H. D. Schotten, “Towards the sixth generation (6G) wireless systems: Thoughts on physical layer security,” in Mobile Communication-Technologies and Applications; 25th ITG-Symposium. VDE, 2021, pp. 1–6.
- M. E. Morocho-Cayamcela, H. Lee, and W. Lim, “Machine learning for 5G/B5G mobile and wireless communications: Potential, limitations, and future directions,” IEEE Access, vol. 7, pp. 137 184–137 206, Sep. 2019.
- Z. Li, K. Xue, J. Li, L. Chen, R. Li, Z. Wang, N. Yu, D. S. Wei, Q. Sun, and J. Lu, “Entanglement-assisted quantum networks: Mechanics, enabling technologies, challenges, and research directions,” IEEE Communications Surveys & Tutorials, vol. 25, no. 4, pp. 2133–2189, Fourth quarter, 2023.
- D. Xu, K. Yu, L. Zhen, K.-K. R. Choo, and M. Guizani, “Quantum Learning on Structured Code with Computing Traps for Secure URLLC in Industrial IoT Scenarios,” IEEE Internet of Things Journal, vol. 10, no. 18, pp. 16 516–16 530, Sep. 2023.
- D. Xu and P. Ren, “Quantum learning based nonrandom superimposed coding for secure wireless access in 5G URLLC,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2429–2444, Feb. 2021.
- D. J. Bernstein and T. Lange, “Post-quantum cryptography,” Nature, vol. 549, no. 7671, pp. 188–194, Sep. 2017.
- R. G. D’Oliveira, A. Cohen, J. Robinson, T. Stahlbuhk, and M. Médard, “Post-quantum security for ultra-reliable low-latency heterogeneous networks,” in MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM). IEEE, 2021, pp. 933–938.
- S. Bhatt, B. Bhushan, T. Srivastava, and V. Anoop, “Post-Quantum Cryptographic Schemes for Security Enhancement in 5G and B5G (Beyond 5G) Cellular Networks,” in 5G and Beyond. Springer Nature Singapore Singapore, Aug. 2023, pp. 247–281.
- D. Chawla and P. S. Mehra, “A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions,” Internet of Things, p. 100950, Sep. 2023.
- D. Xu, L. Liu, N. Zhang, M. Dong, V. C. Leung, and J. A. Ritcey, “Nested Hash Access with Post Quantum Encryption for Mission-Critical IoT Communications,” IEEE Internet of Things Journal, vol. 10, no. 14, pp. 12 204–12 218, Jul. 2023.
- Y. Qu, X. Yuan, M. Ding, W. Ni, T. Rakotoarivelo, and D. Smith, “Learn to Unlearn: A Survey on Machine Unlearning,” arXiv preprint arXiv:2305.07512, 2023.
- H. Xu, T. Zhu, L. Zhang, W. Zhou, and P. S. Yu, “Machine unlearning: A survey,” ACM Computing Surveys, vol. 56, no. 1, pp. 1–36, Aug. 2023.
- V. S. Chundawat, A. K. Tarun, M. Mandal, and M. Kankanhalli, “Zero-shot machine unlearning,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 2345–2354, Apr. 2023.
- Y. Liu, Y. Deng, A. Nallanathan, and J. Yuan, “Machine Learning for 6G Enhanced Ultra-Reliable and Low-Latency Services,” IEEE Wireless Communications, vol. 30, no. 2, pp. 48–54, Apr. 2023.
- L. U. Khan, W. Saad, Z. Han, E. Hossain, and C. S. Hong, “Federated learning for internet of things: Recent advances, taxonomy, and open challenges,” IEEE Communications Surveys & Tutorials, vol. 23, no. 3, pp. 1759–1799, Thirdquarter, 2021.
- A. Kalla, C. De Alwis, P. Porambage, G. Gür, and M. Liyanage, “A survey on the use of blockchain for future 6G: Technical aspects, use cases, challenges and research directions,” Journal of Industrial Information Integration, p. 100404, Oct. 2022.
- H. Xu, P. V. Klaine, O. Onireti, B. Cao, M. Imran, and L. Zhang, “Blockchain-enabled resource management and sharing for 6G communications,” Digital Communications and Networks, vol. 6, no. 3, pp. 261–269, Aug. 2020.
- Y. Liu, F. R. Yu, X. Li, H. Ji, and V. C. Leung, “Blockchain and machine learning for communications and networking systems,” IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 1392–1431, Second quarter, 2020.
- P. Gandotra and R. K. Jha, “A survey on green communication and security challenges in 5G wireless communication networks,” Journal of Network and Computer Applications, vol. 96, pp. 39–61, Oct. 2017.
- A. Pradhan and S. Das, “Joint preference metric for efficient resource allocation in co-existence of eMBB and URLLC,” in 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, 2020, pp. 897–899.
- R. Dangi, A. Jadhav, G. Choudhary, N. Dragoni, M. K. Mishra, and P. Lalwani, “ML-based 5G network slicing security: A comprehensive survey,” Future Internet, vol. 14, no. 4, p. 116, Apr. 2022.