With the deployment of more and more 5g networks,the limitations of 5g networks have been found,which undoubtedly promotes the exploratory research of 6G networks as the next generation solutions.These investigations ...With the deployment of more and more 5g networks,the limitations of 5g networks have been found,which undoubtedly promotes the exploratory research of 6G networks as the next generation solutions.These investigations include the fundamental security and privacy problems associated with 6G technologies.Therefore,in order to consolidate and solidify this foundational research as a basis for future investigations,we have prepared a survey on the status quo of 6G security and privacy.The survey begins with a historical review of previous networking technologies and how they have informed the current trends in 6G networking.We then discuss four key aspects of 6G networks–real-time intelligent edge computing,distributed artificial intelligence,intelligent radio,and 3D intercoms–and some promising emerging technologies in each area,along with the relevant security and privacy issues.The survey concludes with a report on the potential use of 6G.Some of the references used in this paper along and further details of several points raised can be found at:security-privacyin5g-6g.github.io.展开更多
Cyber-physical electrical energy systems(CPEES)combine computation,communication and control technologies with physical power system,and realize the efficient fusion of power,information and control.This paper summari...Cyber-physical electrical energy systems(CPEES)combine computation,communication and control technologies with physical power system,and realize the efficient fusion of power,information and control.This paper summarizes and analyzes related critical scientific problems and technologies,which are needed to be addressed with the development of CPEES.Firstly,since the co-simulation is an effective method to investigate infrastructure interdependencies,the co-simulation platform establishment of CPEES and its evaluation is overviewed.Then,a critical problem of CPEES is the interaction between energy and information flow,especially the influence of failures happening in information communication technology(ICT)on power system.In order to figure it out,the interaction is analyzed and the current analysis methods are summarized.For the solution of power system control and protection in information network environment,this paper outlines different control principles and illustrates the concept of distributed coordination control.Moreover,mass data processing and cluster analysis,architecture of communication network,information transmission technology and security of CPEES are summarized and analyzed.By solving the above problems and technologies,the development of CPEES will be significantly promoted.展开更多
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ...Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.展开更多
基金This work was supported by an ARC Linkage Project(LP180101150)from the Australian Research Council,Australia.
文摘With the deployment of more and more 5g networks,the limitations of 5g networks have been found,which undoubtedly promotes the exploratory research of 6G networks as the next generation solutions.These investigations include the fundamental security and privacy problems associated with 6G technologies.Therefore,in order to consolidate and solidify this foundational research as a basis for future investigations,we have prepared a survey on the status quo of 6G security and privacy.The survey begins with a historical review of previous networking technologies and how they have informed the current trends in 6G networking.We then discuss four key aspects of 6G networks–real-time intelligent edge computing,distributed artificial intelligence,intelligent radio,and 3D intercoms–and some promising emerging technologies in each area,along with the relevant security and privacy issues.The survey concludes with a report on the potential use of 6G.Some of the references used in this paper along and further details of several points raised can be found at:security-privacyin5g-6g.github.io.
基金supported by the national Natural Science Foundation of China(NSFC)under Grant 61233008 and 51377001by the International Science and Technology Cooperation Program of China under Grant 2015DFA70580by the State Grid Science and Technology Project of China under Grant 5216A213509X.
文摘Cyber-physical electrical energy systems(CPEES)combine computation,communication and control technologies with physical power system,and realize the efficient fusion of power,information and control.This paper summarizes and analyzes related critical scientific problems and technologies,which are needed to be addressed with the development of CPEES.Firstly,since the co-simulation is an effective method to investigate infrastructure interdependencies,the co-simulation platform establishment of CPEES and its evaluation is overviewed.Then,a critical problem of CPEES is the interaction between energy and information flow,especially the influence of failures happening in information communication technology(ICT)on power system.In order to figure it out,the interaction is analyzed and the current analysis methods are summarized.For the solution of power system control and protection in information network environment,this paper outlines different control principles and illustrates the concept of distributed coordination control.Moreover,mass data processing and cluster analysis,architecture of communication network,information transmission technology and security of CPEES are summarized and analyzed.By solving the above problems and technologies,the development of CPEES will be significantly promoted.
基金the Deanship of Scientific Research,Vice Presidency for Graduate Studies and Scientific Research,King Faisal University,Saudi Arabia(Grant No.GRANT5,208).
文摘Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.