the emergence of 6G communications brings forth both unprecedented opportunities and security challenges. this work introduces a novel method, dynamic adversarial training incorporating real-time feedback (DAT-RTF), t...
详细信息
ISBN:
(纸本)9798350369458;9798350369441
the emergence of 6G communications brings forth both unprecedented opportunities and security challenges. this work introduces a novel method, dynamic adversarial training incorporating real-time feedback (DAT-RTF), to bolster the resilience of machine learning models in 6G mmWave beamforming prediction against adversarial attacks. By enabling models to adapt to new threats, DAT-RTF maintains their robustness. this dynamic approach, leveraging continuous feedback from the network, adjusts and refines defense mechanisms to remain effective against a range of adversarial strategies. We tackle the issues of resource demand and overfitting, offering strategies to enhance performance without sacrificing security. Our method represents a significant advancement in protecting 6G networks from evolving adversarial threats.
the 6G wireless networks are already being studied and their main novelties are beginning to emerge. the 6G network promises 100% network coverage in every area, including wilderness areas such as the ocean, desert, o...
详细信息
ISBN:
(纸本)9798350369458;9798350369441
the 6G wireless networks are already being studied and their main novelties are beginning to emerge. the 6G network promises 100% network coverage in every area, including wilderness areas such as the ocean, desert, or remote areas, as it will be a fully 3D network, i.e., it will integrate space, air, and terrestrial networks. Also, with all these types of devices, the complexity of 6G networks increases, and Artificial Intelligence (AI) techniques will be mandatory for all the 6G's potential data and parameters. Hence, a Space-Air-Ground Integrated Network (SAGIN) is a potential alternative to enable all the network coverage as drones and satellites can cover large areas and fill possible network coverage gaps. the 6G network coverage also includes post-disaster regions with no network infrastructure and no network coverage, making SAGIN very suitable for them. thus, in this work, we expand CAIN, a post-disaster 6G routing protocol, so it can also be used in SAGIN scenarios, increasing even more network coverage. With drones as relays, SAGIN-CAIN routes the CAIN's Cluster Head's messages until it reaches a satellite.
Withthe rapid development of intelligent devices in wireless communication, the fifth generation (5G) mobile networks have limited high data rates, low latency, high availability demands. the sixth -generation (6G) m...
详细信息
ISBN:
(纸本)9781665495127
Withthe rapid development of intelligent devices in wireless communication, the fifth generation (5G) mobile networks have limited high data rates, low latency, high availability demands. the sixth -generation (6G) mobile network can use Digital -twin (DT) techniques to meet these demands. DT is the virtual representation of physical aspects such as 6G edge nodes. DT optimize the 6G edge nodes parameters using artificial intelligence (AI) and especially machine learning (ML) algorithms. However, AI and ML bring along privacy and security concerns. therefore, user data must be protected from unauthorized persons during the 6G edge network recovery and expansion phases. In this paper, we proposed a new reliable Digital Twin -based 6G edge network recovery framework using Blockchain technology. We applied the Transfer Learning (TL) technique to improve our proposed framework's performance. We ensured data privacy and security using TL and Blockchain.
the highly beneficial contribution of intelligent systems in the industrial domain is undeniable. Automation, supervision, remote control, and fault reduction are some of the various advantages new technologies offer....
详细信息
ISBN:
(纸本)9781665495127
the highly beneficial contribution of intelligent systems in the industrial domain is undeniable. Automation, supervision, remote control, and fault reduction are some of the various advantages new technologies offer. A protocol demonstrating high utility in industrial settings, and specifically, in smart grids, is distributed Network Protocol 3 (DNP3), a multi-tier, application layer protocol. Notably, multiple industrial protocols are not as securely designed as expected, considering the highly critical operations occurring in their application domain. In this paper, we explore the internal vulnerabilities-by-design of DNP3, and proceed withthe implementation of the attacks discovered, demonstrated through 8 DNP3 attack scenarios. Finally, we design and demonstrate a Deep Neural Network (DNN)-based, multi-model Intrusion Detection systems (IDS), trained with our experimental network flow cyberattack dataset, and compare our solution with multiple machine learning algorithms used for classification. Our solution demonstrates a high efficiency in the classification of DNP3 cyberattacks, showing an accuracy of 99.0%.
this paper uses a variety of research methods to investigate the implementation effect of online physical education teaching in a primary school during the new crown pneumonia epidemic. the results found that the onli...
详细信息
Wireless sensor networking is a key enabler of Industrial IoT. IETF (Internet Engineering Task Force) has standardized a protocol suite called 6TiSCH (IPv6 over the TSCH mode of ieee802.15.4e). 6TiSCH builds an IPv6 m...
详细信息
ISBN:
(纸本)9781665439299
Wireless sensor networking is a key enabler of Industrial IoT. IETF (Internet Engineering Task Force) has standardized a protocol suite called 6TiSCH (IPv6 over the TSCH mode of ieee802.15.4e). 6TiSCH builds an IPv6 multi-hop wireless network withthe ieee802.15.4 radio, which achieves low energy consumption and high reliability. Although network formation time is one of key performance indicators of wireless sensor networks, it has not been studied well with6TiSCH standard protocols such as MSF (6TiSCH Minimal Scheduling Function) and CoJP (Constrained Join Protocol). In this paper, we propose a scheduling function called SF-Fastboot which shortens network formation time of 6TiSCH. We evaluate SF-Fastboot by simulation comparing with MSF, the state-of-the-art scheduling function. the simulation shows SF-Fastboot reduces network formation time by 41 % - 80 %.
Despite the growing interest in cross-technology communication, its application to real-world systems is still limited, as existing schemes are mostly unidirectional and technology-specific. the lack of generic soluti...
详细信息
ISBN:
(纸本)9781665439299
Despite the growing interest in cross-technology communication, its application to real-world systems is still limited, as existing schemes are mostly unidirectional and technology-specific. the lack of generic solutions as well as the complexity of their integration reduces the applicability in a broader scope. In this paper, we propose a solution to augment Wi-Fi, BLE, and ZigBee devices withthe ability to transmit and receive cross-technology broadcast frames alongside their existing functionality. After experimentally evaluating the performance of our solution on a variety of hardware platforms, we leverage it to build a gateway-free smart home, where a smartphone can simultaneously control heterogeneous smart objects. the smart objects, which include an off-the-shelf ZigBee light bulb and a BLE-enabled door lock from different vendors, perform cross-technology communication while retaining their original functionality and can maintain duty-cycled operations.
Withthe growth of cities and population, urban corporation faces potential challenges. One such challenge is regulating parking spaces. this become a tedious job during weekends and festival season. Improper regulati...
详细信息
A large number of hubs are used in a Wireless sensor Network to keep tabs on the physical and territorial conditions of a certain region. It's safe to say that most of them are self-employed. In the past, WSN has ...
详细信息
暂无评论