AI and Security in 5G Cooperative Cognitive Radio Networks

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: 20 December 2024 | Viewed by 6140

Special Issue Editors


E-Mail Website
Guest Editor
The William States Lee College of Engineering, Electrical and Computer Engineering Department, University of North Carolina at Charlotte, Charlotte, NC 28223, USA
Interests: spectrum sensing; compressive sensing; cognitive radio; wireless communication; cybersecurity; machine learning; LoRa, internet of things; federated learning; adversarial attacks; edge computing

E-Mail Website
Guest Editor
Department of Computer Science and Engineering, University of North Dakota, Grand Forks, ND 58202, USA
Interests: wireless communication and networking; security; autonomous systems; internet of things; wireless sensor networks; smart grids; modeling; optimization; artificial intelligence

E-Mail Website
Guest Editor
Computer Sciences department in High School of Technology at the Hassan II University, Casablanca 20000, Morocco
Interests: wireless communications; machine learning; data science & smart system

Special Issue Information

Dear Collogues,

5G cooperative cognitive radio continues to be a subject of great interest to researchers in wireless communications. It mitigates the radio spectrum scarcity by enabling opportunistic access to the spectrum. With spectrum sensing techniques, unlicensed users detect the available spectrum and use it for their transmissions without interfering with the licensed users.

In cooperative scenarios, unlicensed users collaborate and report their sensing results to a fusion center for the final decision about the spectrum occupancy. However, malicious users can easily interfere by eavesdropping or reporting falsified measurements to impact the sensing decision. These attacks negatively impact spectrum sensing accuracy. Examples of these attacks include primary user emulation, belief manipulation, eavesdropping, and malicious traffic injection. Therefore, detecting and effectively mitigating these attacks is required toward securing the cooperative spectrum sensing.

Artificial intelligence technology has been heralded as the revolutionary technology needed to successfully solve any problem of today’s networks. Integrating artificial intelligence into 5G networks allows efficiently detecting the presence of malicious users and other security concerns facing the 5G cooperative cognitive radio networks. In this context, this Special Issue is an opportunity to investigate how artificial intelligence can detect and mitigate security challenges facing cooperative spectrum sensing.

Dr. Fatima Salahdine
Dr. Hassan El Alami
Dr. Mohammed Ridouani
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • 5G and beyond
  • cooperative networks
  • cognitive radio networks
  • security
  • artificial intelligence
  • machine learning
  • deep learning
  • federated learning

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

16 pages, 457 KiB  
Article
Modeling and Analyzing Preemption-Based Service Prioritization in 5G Networks Slicing Framework
by Yves Adou, Ekaterina Markova and Yuliya Gaidamaka
Future Internet 2022, 14(10), 299; https://doi.org/10.3390/fi14100299 - 18 Oct 2022
Cited by 5 | Viewed by 3434
Abstract
The Network Slicing (NS) technology, recognized as one of the key enabling features of Fifth Generation (5G) wireless systems, provides very flexible ways to efficiently accommodate common physical infrastructures, e.g., Base Station (BS), multiple logical networks referred to as Network Slice Instances (NSIs). [...] Read more.
The Network Slicing (NS) technology, recognized as one of the key enabling features of Fifth Generation (5G) wireless systems, provides very flexible ways to efficiently accommodate common physical infrastructures, e.g., Base Station (BS), multiple logical networks referred to as Network Slice Instances (NSIs). To ensure the required Quality of Service (QoS) levels, the NS-technology relies on classical Resource Reservation (RR) or Service Prioritization schemes. Thus, the current paper aims to propose a Preemption-based Prioritization (PP) scheme “merging” the classical RR and Service Prioritization schemes. The proposed PP-scheme efficiency is evaluated or estimated given a Queueing system (QS) model analyzing the operation of multiple NSIs with various requirements at common 5G BSs. As a key result, the proposed PP-scheme can provide up to 100% gain in terms of blocking probabilities of arriving requests with respect to some baseline. Full article
(This article belongs to the Special Issue AI and Security in 5G Cooperative Cognitive Radio Networks)
Show Figures

Figure 1

Review

Jump to: Research

42 pages, 2733 KiB  
Review
A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks
by Hassan Khazane, Mohammed Ridouani, Fatima Salahdine and Naima Kaabouch
Future Internet 2024, 16(1), 32; https://doi.org/10.3390/fi16010032 - 19 Jan 2024
Cited by 2 | Viewed by 1932
Abstract
With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem. Among these use cases is IoT security, where numerous systems are deployed to identify or thwart attacks, [...] Read more.
With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem. Among these use cases is IoT security, where numerous systems are deployed to identify or thwart attacks, including intrusion detection systems (IDSs), malware detection systems (MDSs), and device identification systems (DISs). Machine Learning-based (ML-based) IoT security systems can fulfill several security objectives, including detecting attacks, authenticating users before they gain access to the system, and categorizing suspicious activities. Nevertheless, ML faces numerous challenges, such as those resulting from the emergence of adversarial attacks crafted to mislead classifiers. This paper provides a comprehensive review of the body of knowledge about adversarial attacks and defense mechanisms, with a particular focus on three prominent IoT security systems: IDSs, MDSs, and DISs. The paper starts by establishing a taxonomy of adversarial attacks within the context of IoT. Then, various methodologies employed in the generation of adversarial attacks are described and classified within a two-dimensional framework. Additionally, we describe existing countermeasures for enhancing IoT security against adversarial attacks. Finally, we explore the most recent literature on the vulnerability of three ML-based IoT security systems to adversarial attacks. Full article
(This article belongs to the Special Issue AI and Security in 5G Cooperative Cognitive Radio Networks)
Show Figures

Figure 1

Back to TopTop