Toward Trusted and Swift UAV Communication: ISAC-Enabled Dual Identity Mapping

The UAV network has recently emerged as a capable carrier for ubiquitous wireless intelligent communication in the B5G/6G era. Nevertheless, the separation of dual identity raises challenges from the perspective of communication efficiency and security, including tedious communication feedback and m...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE wireless communications 2023-02, Vol.30 (1), p.58-66
Hauptverfasser: Cui, Yanpeng, Feng, Zhiyong, Zhang, Qixun, Wei, Zhiqing, Xu, Chenlong, Zhang, Ping
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 66
container_issue 1
container_start_page 58
container_title IEEE wireless communications
container_volume 30
creator Cui, Yanpeng
Feng, Zhiyong
Zhang, Qixun
Wei, Zhiqing
Xu, Chenlong
Zhang, Ping
description The UAV network has recently emerged as a capable carrier for ubiquitous wireless intelligent communication in the B5G/6G era. Nevertheless, the separation of dual identity raises challenges from the perspective of communication efficiency and security, including tedious communication feedback and malicious Sybil attacks. Meanwhile, thanks to the emerging integrated sensing and communication (ISAC) technology, the sensing ability incorporated in communication advances crucial opportunities for accurately and efficiently mapping identity from dual domains. This tutorial discusses the exciting intersection of ISAC and the future intelligent and efficient UAV network. We first describe the motivation scenario and present the framework of the proposed novel ISAC-enabled dual identity solution. The detailed modules of identity production, mapping, management, and authentication are discussed. By endowing UAVs with an advanced capability: opening their eyes when communicating with each other, we detail three typical applications and the advantages of our proposal. Finally, a series of key enabling techniques, open challenges, and potential solutions for ISAC-enabled dual-domain identity are discussed. This tutorial for the intelligent and efficient UAV network brings new insight on providing dual-domain identity via ISAC technology, with an eye on trusted and swift communication research tailored for the 6G UAV network.
doi_str_mv 10.1109/MWC.003.2200207
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2789482120</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10077116</ieee_id><sourcerecordid>2789482120</sourcerecordid><originalsourceid>FETCH-LOGICAL-c290t-fb8a1e0c908160742a17046abb098f7d7396fd50b1b3fbef9bf5183c3b82a78f3</originalsourceid><addsrcrecordid>eNpNkDFPwzAQhS0EEqUwszBYYk57Zye2w1aFApVaGNrCaNmJjVK1SXESVf33BLUD073he--kj5B7hBEipOPFVzYC4CPGABjICzLAJFERCCUv_zIXETIVX5ObptkAoBSJGJD3VX0woaCr0DWtK6ipCro8lL6l68knzerdrqvK3LRlXT3R2XKSRdPK2G1PPndmS2eFq9qyPdKF2e_L6vuWXHmzbdzd-Q7J-mW6yt6i-cfrLJvMo5yl0EbeKoMO8hQUCpAxMyghFsZaSJWXheSp8EUCFi331vnU-gQVz7lVzEjl-ZA8nnb3of7pXNPqTd2Fqn-pmVRprBgy6KnxicpD3TTBeb0P5c6Eo0bQf9J0L0330vRZWt94ODVK59w_GqREFPwXtLhmmg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2789482120</pqid></control><display><type>article</type><title>Toward Trusted and Swift UAV Communication: ISAC-Enabled Dual Identity Mapping</title><source>IEEE Electronic Library (IEL)</source><creator>Cui, Yanpeng ; Feng, Zhiyong ; Zhang, Qixun ; Wei, Zhiqing ; Xu, Chenlong ; Zhang, Ping</creator><creatorcontrib>Cui, Yanpeng ; Feng, Zhiyong ; Zhang, Qixun ; Wei, Zhiqing ; Xu, Chenlong ; Zhang, Ping</creatorcontrib><description>The UAV network has recently emerged as a capable carrier for ubiquitous wireless intelligent communication in the B5G/6G era. Nevertheless, the separation of dual identity raises challenges from the perspective of communication efficiency and security, including tedious communication feedback and malicious Sybil attacks. Meanwhile, thanks to the emerging integrated sensing and communication (ISAC) technology, the sensing ability incorporated in communication advances crucial opportunities for accurately and efficiently mapping identity from dual domains. This tutorial discusses the exciting intersection of ISAC and the future intelligent and efficient UAV network. We first describe the motivation scenario and present the framework of the proposed novel ISAC-enabled dual identity solution. The detailed modules of identity production, mapping, management, and authentication are discussed. By endowing UAVs with an advanced capability: opening their eyes when communicating with each other, we detail three typical applications and the advantages of our proposal. Finally, a series of key enabling techniques, open challenges, and potential solutions for ISAC-enabled dual-domain identity are discussed. This tutorial for the intelligent and efficient UAV network brings new insight on providing dual-domain identity via ISAC technology, with an eye on trusted and swift communication research tailored for the 6G UAV network.</description><identifier>ISSN: 1536-1284</identifier><identifier>EISSN: 1558-0687</identifier><identifier>DOI: 10.1109/MWC.003.2200207</identifier><identifier>CODEN: IWCEAS</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>6G mobile communication ; Authentication ; Communication ; Domains ; Mapping ; Production ; Security ; Sensors ; Tutorials ; Ubiquitous computing ; Wireless communications</subject><ispartof>IEEE wireless communications, 2023-02, Vol.30 (1), p.58-66</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c290t-fb8a1e0c908160742a17046abb098f7d7396fd50b1b3fbef9bf5183c3b82a78f3</citedby><cites>FETCH-LOGICAL-c290t-fb8a1e0c908160742a17046abb098f7d7396fd50b1b3fbef9bf5183c3b82a78f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10077116$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54737</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10077116$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Cui, Yanpeng</creatorcontrib><creatorcontrib>Feng, Zhiyong</creatorcontrib><creatorcontrib>Zhang, Qixun</creatorcontrib><creatorcontrib>Wei, Zhiqing</creatorcontrib><creatorcontrib>Xu, Chenlong</creatorcontrib><creatorcontrib>Zhang, Ping</creatorcontrib><title>Toward Trusted and Swift UAV Communication: ISAC-Enabled Dual Identity Mapping</title><title>IEEE wireless communications</title><addtitle>WC-M</addtitle><description>The UAV network has recently emerged as a capable carrier for ubiquitous wireless intelligent communication in the B5G/6G era. Nevertheless, the separation of dual identity raises challenges from the perspective of communication efficiency and security, including tedious communication feedback and malicious Sybil attacks. Meanwhile, thanks to the emerging integrated sensing and communication (ISAC) technology, the sensing ability incorporated in communication advances crucial opportunities for accurately and efficiently mapping identity from dual domains. This tutorial discusses the exciting intersection of ISAC and the future intelligent and efficient UAV network. We first describe the motivation scenario and present the framework of the proposed novel ISAC-enabled dual identity solution. The detailed modules of identity production, mapping, management, and authentication are discussed. By endowing UAVs with an advanced capability: opening their eyes when communicating with each other, we detail three typical applications and the advantages of our proposal. Finally, a series of key enabling techniques, open challenges, and potential solutions for ISAC-enabled dual-domain identity are discussed. This tutorial for the intelligent and efficient UAV network brings new insight on providing dual-domain identity via ISAC technology, with an eye on trusted and swift communication research tailored for the 6G UAV network.</description><subject>6G mobile communication</subject><subject>Authentication</subject><subject>Communication</subject><subject>Domains</subject><subject>Mapping</subject><subject>Production</subject><subject>Security</subject><subject>Sensors</subject><subject>Tutorials</subject><subject>Ubiquitous computing</subject><subject>Wireless communications</subject><issn>1536-1284</issn><issn>1558-0687</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkDFPwzAQhS0EEqUwszBYYk57Zye2w1aFApVaGNrCaNmJjVK1SXESVf33BLUD073he--kj5B7hBEipOPFVzYC4CPGABjICzLAJFERCCUv_zIXETIVX5ObptkAoBSJGJD3VX0woaCr0DWtK6ipCro8lL6l68knzerdrqvK3LRlXT3R2XKSRdPK2G1PPndmS2eFq9qyPdKF2e_L6vuWXHmzbdzd-Q7J-mW6yt6i-cfrLJvMo5yl0EbeKoMO8hQUCpAxMyghFsZaSJWXheSp8EUCFi331vnU-gQVz7lVzEjl-ZA8nnb3of7pXNPqTd2Fqn-pmVRprBgy6KnxicpD3TTBeb0P5c6Eo0bQf9J0L0330vRZWt94ODVK59w_GqREFPwXtLhmmg</recordid><startdate>202302</startdate><enddate>202302</enddate><creator>Cui, Yanpeng</creator><creator>Feng, Zhiyong</creator><creator>Zhang, Qixun</creator><creator>Wei, Zhiqing</creator><creator>Xu, Chenlong</creator><creator>Zhang, Ping</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>L7M</scope></search><sort><creationdate>202302</creationdate><title>Toward Trusted and Swift UAV Communication: ISAC-Enabled Dual Identity Mapping</title><author>Cui, Yanpeng ; Feng, Zhiyong ; Zhang, Qixun ; Wei, Zhiqing ; Xu, Chenlong ; Zhang, Ping</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c290t-fb8a1e0c908160742a17046abb098f7d7396fd50b1b3fbef9bf5183c3b82a78f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>6G mobile communication</topic><topic>Authentication</topic><topic>Communication</topic><topic>Domains</topic><topic>Mapping</topic><topic>Production</topic><topic>Security</topic><topic>Sensors</topic><topic>Tutorials</topic><topic>Ubiquitous computing</topic><topic>Wireless communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Cui, Yanpeng</creatorcontrib><creatorcontrib>Feng, Zhiyong</creatorcontrib><creatorcontrib>Zhang, Qixun</creatorcontrib><creatorcontrib>Wei, Zhiqing</creatorcontrib><creatorcontrib>Xu, Chenlong</creatorcontrib><creatorcontrib>Zhang, Ping</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE wireless communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Cui, Yanpeng</au><au>Feng, Zhiyong</au><au>Zhang, Qixun</au><au>Wei, Zhiqing</au><au>Xu, Chenlong</au><au>Zhang, Ping</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Toward Trusted and Swift UAV Communication: ISAC-Enabled Dual Identity Mapping</atitle><jtitle>IEEE wireless communications</jtitle><stitle>WC-M</stitle><date>2023-02</date><risdate>2023</risdate><volume>30</volume><issue>1</issue><spage>58</spage><epage>66</epage><pages>58-66</pages><issn>1536-1284</issn><eissn>1558-0687</eissn><coden>IWCEAS</coden><abstract>The UAV network has recently emerged as a capable carrier for ubiquitous wireless intelligent communication in the B5G/6G era. Nevertheless, the separation of dual identity raises challenges from the perspective of communication efficiency and security, including tedious communication feedback and malicious Sybil attacks. Meanwhile, thanks to the emerging integrated sensing and communication (ISAC) technology, the sensing ability incorporated in communication advances crucial opportunities for accurately and efficiently mapping identity from dual domains. This tutorial discusses the exciting intersection of ISAC and the future intelligent and efficient UAV network. We first describe the motivation scenario and present the framework of the proposed novel ISAC-enabled dual identity solution. The detailed modules of identity production, mapping, management, and authentication are discussed. By endowing UAVs with an advanced capability: opening their eyes when communicating with each other, we detail three typical applications and the advantages of our proposal. Finally, a series of key enabling techniques, open challenges, and potential solutions for ISAC-enabled dual-domain identity are discussed. This tutorial for the intelligent and efficient UAV network brings new insight on providing dual-domain identity via ISAC technology, with an eye on trusted and swift communication research tailored for the 6G UAV network.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/MWC.003.2200207</doi><tpages>9</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1536-1284
ispartof IEEE wireless communications, 2023-02, Vol.30 (1), p.58-66
issn 1536-1284
1558-0687
language eng
recordid cdi_proquest_journals_2789482120
source IEEE Electronic Library (IEL)
subjects 6G mobile communication
Authentication
Communication
Domains
Mapping
Production
Security
Sensors
Tutorials
Ubiquitous computing
Wireless communications
title Toward Trusted and Swift UAV Communication: ISAC-Enabled Dual Identity Mapping
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T13%3A38%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Toward%20Trusted%20and%20Swift%20UAV%20Communication:%20ISAC-Enabled%20Dual%20Identity%20Mapping&rft.jtitle=IEEE%20wireless%20communications&rft.au=Cui,%20Yanpeng&rft.date=2023-02&rft.volume=30&rft.issue=1&rft.spage=58&rft.epage=66&rft.pages=58-66&rft.issn=1536-1284&rft.eissn=1558-0687&rft.coden=IWCEAS&rft_id=info:doi/10.1109/MWC.003.2200207&rft_dat=%3Cproquest_RIE%3E2789482120%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2789482120&rft_id=info:pmid/&rft_ieee_id=10077116&rfr_iscdi=true