Toward Trusted and Swift UAV Communication: ISAC-Enabled Dual Identity Mapping
The UAV network has recently emerged as a capable carrier for ubiquitous wireless intelligent communication in the B5G/6G era. Nevertheless, the separation of dual identity raises challenges from the perspective of communication efficiency and security, including tedious communication feedback and m...
Gespeichert in:
Veröffentlicht in: | IEEE wireless communications 2023-02, Vol.30 (1), p.58-66 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 66 |
---|---|
container_issue | 1 |
container_start_page | 58 |
container_title | IEEE wireless communications |
container_volume | 30 |
creator | Cui, Yanpeng Feng, Zhiyong Zhang, Qixun Wei, Zhiqing Xu, Chenlong Zhang, Ping |
description | The UAV network has recently emerged as a capable carrier for ubiquitous wireless intelligent communication in the B5G/6G era. Nevertheless, the separation of dual identity raises challenges from the perspective of communication efficiency and security, including tedious communication feedback and malicious Sybil attacks. Meanwhile, thanks to the emerging integrated sensing and communication (ISAC) technology, the sensing ability incorporated in communication advances crucial opportunities for accurately and efficiently mapping identity from dual domains. This tutorial discusses the exciting intersection of ISAC and the future intelligent and efficient UAV network. We first describe the motivation scenario and present the framework of the proposed novel ISAC-enabled dual identity solution. The detailed modules of identity production, mapping, management, and authentication are discussed. By endowing UAVs with an advanced capability: opening their eyes when communicating with each other, we detail three typical applications and the advantages of our proposal. Finally, a series of key enabling techniques, open challenges, and potential solutions for ISAC-enabled dual-domain identity are discussed. This tutorial for the intelligent and efficient UAV network brings new insight on providing dual-domain identity via ISAC technology, with an eye on trusted and swift communication research tailored for the 6G UAV network. |
doi_str_mv | 10.1109/MWC.003.2200207 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2789482120</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10077116</ieee_id><sourcerecordid>2789482120</sourcerecordid><originalsourceid>FETCH-LOGICAL-c290t-fb8a1e0c908160742a17046abb098f7d7396fd50b1b3fbef9bf5183c3b82a78f3</originalsourceid><addsrcrecordid>eNpNkDFPwzAQhS0EEqUwszBYYk57Zye2w1aFApVaGNrCaNmJjVK1SXESVf33BLUD073he--kj5B7hBEipOPFVzYC4CPGABjICzLAJFERCCUv_zIXETIVX5ObptkAoBSJGJD3VX0woaCr0DWtK6ipCro8lL6l68knzerdrqvK3LRlXT3R2XKSRdPK2G1PPndmS2eFq9qyPdKF2e_L6vuWXHmzbdzd-Q7J-mW6yt6i-cfrLJvMo5yl0EbeKoMO8hQUCpAxMyghFsZaSJWXheSp8EUCFi331vnU-gQVz7lVzEjl-ZA8nnb3of7pXNPqTd2Fqn-pmVRprBgy6KnxicpD3TTBeb0P5c6Eo0bQf9J0L0330vRZWt94ODVK59w_GqREFPwXtLhmmg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2789482120</pqid></control><display><type>article</type><title>Toward Trusted and Swift UAV Communication: ISAC-Enabled Dual Identity Mapping</title><source>IEEE Electronic Library (IEL)</source><creator>Cui, Yanpeng ; Feng, Zhiyong ; Zhang, Qixun ; Wei, Zhiqing ; Xu, Chenlong ; Zhang, Ping</creator><creatorcontrib>Cui, Yanpeng ; Feng, Zhiyong ; Zhang, Qixun ; Wei, Zhiqing ; Xu, Chenlong ; Zhang, Ping</creatorcontrib><description>The UAV network has recently emerged as a capable carrier for ubiquitous wireless intelligent communication in the B5G/6G era. Nevertheless, the separation of dual identity raises challenges from the perspective of communication efficiency and security, including tedious communication feedback and malicious Sybil attacks. Meanwhile, thanks to the emerging integrated sensing and communication (ISAC) technology, the sensing ability incorporated in communication advances crucial opportunities for accurately and efficiently mapping identity from dual domains. This tutorial discusses the exciting intersection of ISAC and the future intelligent and efficient UAV network. We first describe the motivation scenario and present the framework of the proposed novel ISAC-enabled dual identity solution. The detailed modules of identity production, mapping, management, and authentication are discussed. By endowing UAVs with an advanced capability: opening their eyes when communicating with each other, we detail three typical applications and the advantages of our proposal. Finally, a series of key enabling techniques, open challenges, and potential solutions for ISAC-enabled dual-domain identity are discussed. This tutorial for the intelligent and efficient UAV network brings new insight on providing dual-domain identity via ISAC technology, with an eye on trusted and swift communication research tailored for the 6G UAV network.</description><identifier>ISSN: 1536-1284</identifier><identifier>EISSN: 1558-0687</identifier><identifier>DOI: 10.1109/MWC.003.2200207</identifier><identifier>CODEN: IWCEAS</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>6G mobile communication ; Authentication ; Communication ; Domains ; Mapping ; Production ; Security ; Sensors ; Tutorials ; Ubiquitous computing ; Wireless communications</subject><ispartof>IEEE wireless communications, 2023-02, Vol.30 (1), p.58-66</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c290t-fb8a1e0c908160742a17046abb098f7d7396fd50b1b3fbef9bf5183c3b82a78f3</citedby><cites>FETCH-LOGICAL-c290t-fb8a1e0c908160742a17046abb098f7d7396fd50b1b3fbef9bf5183c3b82a78f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10077116$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54737</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10077116$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Cui, Yanpeng</creatorcontrib><creatorcontrib>Feng, Zhiyong</creatorcontrib><creatorcontrib>Zhang, Qixun</creatorcontrib><creatorcontrib>Wei, Zhiqing</creatorcontrib><creatorcontrib>Xu, Chenlong</creatorcontrib><creatorcontrib>Zhang, Ping</creatorcontrib><title>Toward Trusted and Swift UAV Communication: ISAC-Enabled Dual Identity Mapping</title><title>IEEE wireless communications</title><addtitle>WC-M</addtitle><description>The UAV network has recently emerged as a capable carrier for ubiquitous wireless intelligent communication in the B5G/6G era. Nevertheless, the separation of dual identity raises challenges from the perspective of communication efficiency and security, including tedious communication feedback and malicious Sybil attacks. Meanwhile, thanks to the emerging integrated sensing and communication (ISAC) technology, the sensing ability incorporated in communication advances crucial opportunities for accurately and efficiently mapping identity from dual domains. This tutorial discusses the exciting intersection of ISAC and the future intelligent and efficient UAV network. We first describe the motivation scenario and present the framework of the proposed novel ISAC-enabled dual identity solution. The detailed modules of identity production, mapping, management, and authentication are discussed. By endowing UAVs with an advanced capability: opening their eyes when communicating with each other, we detail three typical applications and the advantages of our proposal. Finally, a series of key enabling techniques, open challenges, and potential solutions for ISAC-enabled dual-domain identity are discussed. This tutorial for the intelligent and efficient UAV network brings new insight on providing dual-domain identity via ISAC technology, with an eye on trusted and swift communication research tailored for the 6G UAV network.</description><subject>6G mobile communication</subject><subject>Authentication</subject><subject>Communication</subject><subject>Domains</subject><subject>Mapping</subject><subject>Production</subject><subject>Security</subject><subject>Sensors</subject><subject>Tutorials</subject><subject>Ubiquitous computing</subject><subject>Wireless communications</subject><issn>1536-1284</issn><issn>1558-0687</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkDFPwzAQhS0EEqUwszBYYk57Zye2w1aFApVaGNrCaNmJjVK1SXESVf33BLUD073he--kj5B7hBEipOPFVzYC4CPGABjICzLAJFERCCUv_zIXETIVX5ObptkAoBSJGJD3VX0woaCr0DWtK6ipCro8lL6l68knzerdrqvK3LRlXT3R2XKSRdPK2G1PPndmS2eFq9qyPdKF2e_L6vuWXHmzbdzd-Q7J-mW6yt6i-cfrLJvMo5yl0EbeKoMO8hQUCpAxMyghFsZaSJWXheSp8EUCFi331vnU-gQVz7lVzEjl-ZA8nnb3of7pXNPqTd2Fqn-pmVRprBgy6KnxicpD3TTBeb0P5c6Eo0bQf9J0L0330vRZWt94ODVK59w_GqREFPwXtLhmmg</recordid><startdate>202302</startdate><enddate>202302</enddate><creator>Cui, Yanpeng</creator><creator>Feng, Zhiyong</creator><creator>Zhang, Qixun</creator><creator>Wei, Zhiqing</creator><creator>Xu, Chenlong</creator><creator>Zhang, Ping</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>L7M</scope></search><sort><creationdate>202302</creationdate><title>Toward Trusted and Swift UAV Communication: ISAC-Enabled Dual Identity Mapping</title><author>Cui, Yanpeng ; Feng, Zhiyong ; Zhang, Qixun ; Wei, Zhiqing ; Xu, Chenlong ; Zhang, Ping</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c290t-fb8a1e0c908160742a17046abb098f7d7396fd50b1b3fbef9bf5183c3b82a78f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>6G mobile communication</topic><topic>Authentication</topic><topic>Communication</topic><topic>Domains</topic><topic>Mapping</topic><topic>Production</topic><topic>Security</topic><topic>Sensors</topic><topic>Tutorials</topic><topic>Ubiquitous computing</topic><topic>Wireless communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Cui, Yanpeng</creatorcontrib><creatorcontrib>Feng, Zhiyong</creatorcontrib><creatorcontrib>Zhang, Qixun</creatorcontrib><creatorcontrib>Wei, Zhiqing</creatorcontrib><creatorcontrib>Xu, Chenlong</creatorcontrib><creatorcontrib>Zhang, Ping</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE wireless communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Cui, Yanpeng</au><au>Feng, Zhiyong</au><au>Zhang, Qixun</au><au>Wei, Zhiqing</au><au>Xu, Chenlong</au><au>Zhang, Ping</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Toward Trusted and Swift UAV Communication: ISAC-Enabled Dual Identity Mapping</atitle><jtitle>IEEE wireless communications</jtitle><stitle>WC-M</stitle><date>2023-02</date><risdate>2023</risdate><volume>30</volume><issue>1</issue><spage>58</spage><epage>66</epage><pages>58-66</pages><issn>1536-1284</issn><eissn>1558-0687</eissn><coden>IWCEAS</coden><abstract>The UAV network has recently emerged as a capable carrier for ubiquitous wireless intelligent communication in the B5G/6G era. Nevertheless, the separation of dual identity raises challenges from the perspective of communication efficiency and security, including tedious communication feedback and malicious Sybil attacks. Meanwhile, thanks to the emerging integrated sensing and communication (ISAC) technology, the sensing ability incorporated in communication advances crucial opportunities for accurately and efficiently mapping identity from dual domains. This tutorial discusses the exciting intersection of ISAC and the future intelligent and efficient UAV network. We first describe the motivation scenario and present the framework of the proposed novel ISAC-enabled dual identity solution. The detailed modules of identity production, mapping, management, and authentication are discussed. By endowing UAVs with an advanced capability: opening their eyes when communicating with each other, we detail three typical applications and the advantages of our proposal. Finally, a series of key enabling techniques, open challenges, and potential solutions for ISAC-enabled dual-domain identity are discussed. This tutorial for the intelligent and efficient UAV network brings new insight on providing dual-domain identity via ISAC technology, with an eye on trusted and swift communication research tailored for the 6G UAV network.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/MWC.003.2200207</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1536-1284 |
ispartof | IEEE wireless communications, 2023-02, Vol.30 (1), p.58-66 |
issn | 1536-1284 1558-0687 |
language | eng |
recordid | cdi_proquest_journals_2789482120 |
source | IEEE Electronic Library (IEL) |
subjects | 6G mobile communication Authentication Communication Domains Mapping Production Security Sensors Tutorials Ubiquitous computing Wireless communications |
title | Toward Trusted and Swift UAV Communication: ISAC-Enabled Dual Identity Mapping |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T13%3A38%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Toward%20Trusted%20and%20Swift%20UAV%20Communication:%20ISAC-Enabled%20Dual%20Identity%20Mapping&rft.jtitle=IEEE%20wireless%20communications&rft.au=Cui,%20Yanpeng&rft.date=2023-02&rft.volume=30&rft.issue=1&rft.spage=58&rft.epage=66&rft.pages=58-66&rft.issn=1536-1284&rft.eissn=1558-0687&rft.coden=IWCEAS&rft_id=info:doi/10.1109/MWC.003.2200207&rft_dat=%3Cproquest_RIE%3E2789482120%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2789482120&rft_id=info:pmid/&rft_ieee_id=10077116&rfr_iscdi=true |