Federated Learning For Enhanced Cybersecurity And Trustworthiness In 5G and 6G Networks: A Comprehensive Survey

In the fast-progressing field of wireless communications, the forthcoming 6G networks are expected to revolutionize the way we communicate, offering unparalleled speed, minimal latency, and seamless connectivity. However, amid this evolution, the paramount concern remains the security and privacy of...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE open journal of the Communications Society 2024-08, p.1-1
Hauptverfasser: Blika, Afroditi, Palmos, Stefanos, Doukas, George, Lamprou, Vangelis, Pelekis, Sotiris, Kontoulis, Michael, Ntanos, Christos, Askounis, Dimitris
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:In the fast-progressing field of wireless communications, the forthcoming 6G networks are expected to revolutionize the way we communicate, offering unparalleled speed, minimal latency, and seamless connectivity. However, amid this evolution, the paramount concern remains the security and privacy of the data traversing these networks. Traditional centralized artificial intelligence (AI) techniques already struggle to keep up with the vast amount of data of future 6G networks and deal with the increasing worries about privacy. Federated learning (FL), emerges as a key enabler of Trustworthy AI (TAI), empowering the engagement of distributed network nodes in AI training without the need for exchanging raw data, thereby mitigating the risks associated with centralized data processing. In this paper, we provide a comprehensive survey on the potential of FL in enhancing the security of 6G networks. Particularly, we begin by providing the necessary background on 5G networks and FL, setting the stage for understanding their current and future implications. We then explore the current state-of-the-art of FL applications within 5G networks and their relevance to the future threat landscape of 6G. Subsequently, we examine the inherent vulnerabilities of FL systems, major attacks against FL in the context of 5G networks, and corresponding defense mechanisms. Finally, we discuss the integration of advanced FL technologies and concepts towards enhanced cybersecurity and privacy in 6G networks, aiming to cover all aspects and future perspectives of FL within the context of the forthcoming 6G threat landscape.
ISSN:2644-125X
DOI:10.1109/OJCOMS.2024.3449563