Papers
Topics
Authors
Recent
Search
2000 character limit reached

Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling Concepts

Published 24 May 2024 in cs.NI | (2405.17480v2)

Abstract: The sixth generation (6G) mobile communication networks are expected to intelligently integrate into various aspects of modern digital society, including smart cities, homes, health-care, transportation, and factories. While offering a multitude of services, it is likely that societies become increasingly reliant on 6G infrastructure. Any disruption to these digital services, whether due to human or technical failures, natural disasters, or terrorism, would significantly impact citizens' daily lives. Hence, 6G networks need not only to provide high-performance services but also to be resilient in maintaining essential services in the face of potentially unknown challenges. This paper provides a general review of the state of the art on resilient systems, definitions, concepts, and approaches. Moreover, it introduces a comprehensive concept, i.e., resilience-by-design (RBD), in three different levels for designing resilient 6G communication networks, summarizing our initial studies within the German Open6GHub project. First, we outline the general RBD enabling principles and discuss their related sub-categories. Next, adopting an interdisciplinary approach, we propose to embed these principles across all 6G layers/perspectives including electronics, physical channel, network components and functions, networks, services, and cross-layer and cross-infrastructure considerations and discuss their challenges. We further elaborate the RBD principles and their realizations along with several 6G use-cases. The paper is concluded by presenting a comprehensive list of open problems for future research on 6G resilience.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (118)
  1. “Project Hexa-X”, Accessed date: Oct. 5, 2023. [Online]. Available: https://hexa-x.eu/.
  2. “Project RISE-6G”, Accessed date: Oct. 5, 2023. [Online]. Available: https://rise-6g.eu/.
  3. “REINDEER — Resilient interactive applications through hyper diversity in energy efficient RadioWeaves technology”, Accessed date: Oct. 5, 2023. [Online]. Available: https://reindeer-project.eu/.
  4. “6GStart: Starting the sustainable 6G SNS initiative for Europe”, Accessed date: Oct. 5, 2023. [Online]. Available: https://5g-ppp.eu/6gstart/.
  5. “6GTandem: A dual-frequency distributed MIMO approach for future 6G applications”, Accessed date: Oct. 5, 2023. [Online]. Available: https://security-link.se/6gtandem/.
  6. “TERA6G”, Accessed date: Oct. 5, 2023. [Online]. Available: https: //www.hhi.fraunhofer.de/en/departments/pc/projects/tera6g.html.
  7. “Open6GHub – 6G for Society and Sustainability”, Accessed date: Oct. 5, 2023. [Online]. Available: https://www.open6ghub.de/en/.
  8. “6G-RIC – 6G research and innovation cluster”, Accessed date: Oct. 5, 2023. [Online]. Available: https://6g-ric.de/.
  9. “6G-life – Digital transformation and sovereignty of future communication networks”, Accessed date: Oct. 5, 2023. [Online]. Available: https://6g-life.de/.
  10. “6GEM – 6G research hub for open, efficient and secure mobile communications systems”, Accessed date: Oct. 5, 2023. [Online]. Available: https://www.6gem.de/en/.
  11. “6G-ANNA – Holistic approaches for 6th generation mobile networks”, Accessed date: Apr. 10, 2024. [Online]. Available: https://6g-anna.de/en/.
  12. “6G flagship, key drivers and research challenges for 6G ubiquitous wireless intelligence, white paper, Sep. 2019”. [Online]. Available: https://www.6gflagship.com/key-drivers-and-research-challenges-for-6g-ubiquitous-wireless-intelligence/.
  13. “RINGS”, Accessed date: Oct. 5, 2023. [Online]. Available: https://beta.nsf.gov/funding/opportunities/resilient-intelligent-nextg-systems-rings.
  14. “Key R&D projects 2019: Wideband communications and new networks”, Accessed date: Oct. 5, 2023. [Online]. Available: https://service.most.gov.cn/u/cms/static/201812/12164952skqa.pdf.
  15. “Research and development on satellite-terrestrial integration technology for beyond 5G”, Accessed date: Oct. 5, 2023. [Online]. Available: https://www2.nict.go.jp/spacelab/en/pj_stit.html.
  16. “KT and Hanwha systems are jointly developing 6G quantum cryptography technology”, Accessed date: Oct. 5, 2023. [Online]. Available: https://www.ajudaily.com/view/20220712111419400.
  17. B. Cassottana, M. M. Roomi, D. Mashima, and G. Sansavini, “Resilience analysis of cyber-physical systems: A review of models and methods,” Risk Analysis, 2023.
  18. S. D. Gribble, “Robustness in complex systems,” in Proceedings Eighth Workshop on Hot Topics in Operating Systems, IEEE, Elmau, Germany, 2001, pp. 21–26.
  19. V. Maklachkova, A. Shvedov, and S. Alyev, “Analysis of resilience indicators in corporate networks and possible ways to improve it,” in Systems of Signals Generating and Processing in the Field of on Board Communications, IEEE, 2022, pp. 1–5.
  20. M. Pajic, J. Weimer, N. Bezzo, O. Sokolsky, G. J. Pappas, and I. Lee, “Design and implementation of attack-resilient cyberphysical systems: With a focus on attack-resilient state estimators,” IEEE Control Systems Magazine, vol. 37, no. 2, pp. 66–81, 2017.
  21. Z. Yang, A. Gang, and W. U. Bajwa, “Adversary-resilient distributed and decentralized statistical inference and machine learning: An overview of recent advances under the Byzantine threat model,” IEEE Signal Processing Magazine, vol. 37, no. 3, pp. 146–159, 2020.
  22. D. Hutchison and J. P. Sterbenz, “Architecture and design for resilient networked systems,” Computer Communications, vol. 131, pp. 13–21, 2018.
  23. E. Benkhelifa, T. Welsh, and W. Hamouda, “A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems,” IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 3496–3509, 2018.
  24. M. Khodaei and P. Papadimitratos, “Scalable & resilient vehicle-centric certificate revocation list distribution in vehicular communication systems,” IEEE Transactions on Mobile Computing, vol. 20, no. 7, pp. 2473–2489, 2020.
  25. I. Banerjee, M. Warnier, F. M. Brazier, and D. Helbing, “Introducing participatory fairness in emergency communication can support self-organization for survival,” Scientific Reports, vol. 11, no. 1, p. 7209, 2021.
  26. C. Berger, P. Eichhammer, H. P. Reiser, J. Domaschka, F. J. Hauck, and G. Habiger, “A survey on resilience in the IoT: Taxonomy, classification, and discussion of resilience mechanisms,” ACM Computing Surveys (CSUR), vol. 54, no. 7, pp. 1–39, 2021.
  27. I. Banerjee, M. Warnier, and F. M. Brazier, “Designing inclusion and continuity for resilient communication during disasters,” Sustainable and Resilient Infrastructure, vol. 7, no. 6, pp. 955–970, 2022.
  28. S. Dietzel, E. Schoch, B. Konings, M. Weber, and F. Kargl, “Resilient secure aggregation for vehicular networks,” IEEE Network, vol. 24, no. 1, pp. 26–31, 2010.
  29. C. Stefanovic, M. Angjelichinoski, P. Danzi, and P. Popovski, “Resilient and secure low-rate connectivity for smart energy applications through power talk in DC microgrids,” IEEE Communications Magazine, vol. 55, no. 10, pp. 83–89, 2017.
  30. J. Liu, H. Guo, and L. Zhao, “Resilient and low-latency information acquisition for FiWi enhanced smart grid,” IEEE Network, vol. 31, no. 5, pp. 80–86, 2017.
  31. B. Kantarci and H. T. Mouftah, “Resilient design of a cloud system over an optical backbone,” IEEE Network, vol. 29, no. 4, pp. 80–87, 2015.
  32. J. P. Sterbenz, “Smart city and IoT resilience, survivability, and disruption tolerance: Challenges, modelling, and a survey of research opportunities,” in 9th International Workshop on Resilient Networks Design and Modeling (RNDM), IEEE, Alghero, Italy, 2017, pp. 1–6.
  33. G. Deepak, A. Ladas, Y. A. Sambo, H. Pervaiz, C. Politis, and M. A. Imran, “An overview of post-disaster emergency communication systems in the future networks,” IEEE Wireless Communications, vol. 26, no. 6, pp. 132–139, 2019.
  34. S. A. R. Naqvi, S. A. Hassan, H. Pervaiz, and Q. Ni, “Drone-aided communication as a key enabler for 5G and resilient public safety networks,” IEEE Communications Magazine, vol. 56, no. 1, pp. 36–42, 2018.
  35. K. Miranda, A. Molinaro, and T. Razafindralambo, “A survey on rapidly deployable solutions for post-disaster networks,” IEEE Communications Magazine, vol. 54, no. 4, pp. 117–123, 2016.
  36. H. Zhang, C. Jiang, R. Q. Hu, and Y. Qian, “Self-organization in disaster-resilient heterogeneous small cell networks,” IEEE Network, vol. 30, no. 2, pp. 116–121, 2016.
  37. G. Tyson, E. Bodanese, J. Bigham, and A. Mauthe, “Beyond content delivery: Can icns help emergency scenarios?” IEEE Network, vol. 28, no. 3, pp. 44–49, 2014.
  38. M. A. Thompson, M. J. Ryan, J. Slay, and A. C. McLucas, “A new resilience taxonomy,” in INCOSE International Symposium, Wiley Online Library, vol. 26, Edinburgh, Scotland, 2016, pp. 1318–1330.
  39. M. Witti and D. Konstantas, “A secure and privacy-preserving internet of things framework for smart city,” in Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, Hong Kong, China, 2018, pp. 145–150.
  40. E. D. Vugrin, D. E. Warren, and M. A. Ehlen, “A resilience assessment framework for infrastructure and economic systems: Quantitative and qualitative resilience analysis of petrochemical supply chains to a hurricane,” Process Safety Progress, vol. 30, no. 3, pp. 280–290, 2011.
  41. A. Avizienis, J.-C. Laprie, and B. Randell, “Fundamental concepts of dependability,” Department of Computing Science Technical Report Series, 2001.
  42. A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, “Basic concepts and taxonomy of dependable and secure computing,” IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 11–33, 2004.
  43. M. Brinkmeier, M. Fischer, S. Grau, G. Schäfer, and T. Strufe, “Methods for improving resilience in communication networks and P2P overlays,” Praxis der Informationsverarbeitung und Kommunikation: PIK: Fachzeitschrift für den Einsatz von Informationssystemen, vol. 32, no. 1, pp. 64–78, 2009.
  44. M. Bishop, M. Carvalho, R. Ford, and L. M. Mayron, “Resilience is more than availability,” in Proceedings of the 2011 New Security Paradigms Workshop, Marin County, California, USA, 2011, pp. 95–104.
  45. O. Erdene-Ochir, A. Kountouris, M. Minier, and F. Valois, “A new metric to quantify resiliency in networking,” IEEE Communications Letters, vol. 16, no. 10, pp. 1699–1702, 2012.
  46. Z. A. Khan, J. Ullrich, A. G. Voyiatzis, and P. Herrmann, “A trust-based resilient routing mechanism for the internet of things,” in Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, 2017, pp. 1–6.
  47. A. Modarresi and J. P. Sterbenz, “Multilevel IoT model for smart cities resilience,” in Proceedings of the 12th International Conference on Future Internet Technologies, Fukuoka, Japan, 2017, pp. 1–7.
  48. J.-C. Laprie, “Dependable computing and fault-tolerance,” Digest of Papers FTCS-15, vol. 10, no. 2, p. 124, 1985.
  49. J.-C. Laprie, “From dependability to resilience,” in 38th IEEE/IFIP Int. Conf. on Dependable Systems and Networks, Anchorage, Alaska, USA, 2008, G8–G9.
  50. K. A. Delic, “On resilience of IoT systems: The internet of things (ubiquity symposium),” Ubiquity, vol. 2016, no. February, pp. 1–7, 2016.
  51. X. Chen, K. Makki, K. Yen, and N. Pissinou, “Sensor network security: A survey,” IEEE Communications Surveys & Tutorials, vol. 11, no. 2, pp. 52–73, 2009.
  52. “Strategic foresight report – Charting the course towards a more resilient Europe,” European Commission, 2020. [Online]. Available: https://commission.europa.eu/system/files/2021-04/strategic_foresight_report_2020_1_0.pdf.
  53. C. E. Landwehr, “Computer security,” International journal of information security, vol. 1, no. 1, pp. 3–13, 2001.
  54. V. K. Rai, “Temperature sensors and optical sensors,” Applied Physics B, vol. 88, pp. 297–303, 2007.
  55. B. A. Kuzubasoglu and S. K. Bahadir, “Flexible temperature sensors: A review,” Sensors and Actuators A: Physical, vol. 315, pp. 112–282, 2020.
  56. W. A. Catterall, “Ion channel voltage sensors: Structure, function, and pathophysiology,” Neuron, vol. 67, no. 6, pp. 915–928, 2010.
  57. R. Rajachandrasekar, X. Besseron, and D. K. Panda, “Monitoring and predicting hardware failures in HPC clusters with FTB-IPMI,” in IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum, IEEE, Shanghai, China, 2012, pp. 1136–1143.
  58. A. Amouri and M. Tahoori, “A low-cost sensor for aging and late transitions detection in modern FPGAs,” in 21st Int. Conference on Field Programmable Logic and Applications, Chania, Greece, 2011.
  59. N. Rahmanikia, A. Amiri, H. Noori, and F. Mehdipour, “Performance evaluation metrics for ring-oscillator-based temperature sensors on FPGAs: A quality factor,” Integration, the VLSI Journal, vol. 57, pp. 81–100, 2017.
  60. J. L. Keedy, “On structuring operating systems with monitors,” ACM SIGOPS Operating Systems Review, vol. 13, no. 1, pp. 5–9, 1979.
  61. Q. Xu, Y. Han, B. Wang, M. Wu, and K. R. Liu, “Indoor events monitoring using channel state information time series,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4977–4990, 2019.
  62. H. Cai, Q. Zhang, Q. Li, and J. Qin, “Proactive monitoring via jamming for rate maximization over MIMO Rayleigh fading channels,” IEEE Communications Letters, vol. 21, no. 9, pp. 2021–2024, 2017.
  63. D. Hu, Q. Zhang, P. Yang, and J. Qin, “Proactive monitoring via jamming in amplify-and-forward relay networks,” IEEE Signal Processing Letters, vol. 24, no. 11, pp. 1714–1718, 2017.
  64. M. Housh and Z. Ohar, “Model-based approach for cyber-physical attack detection in water distribution systems,” Water research, vol. 139, pp. 132–143, 2018.
  65. Z. Zhang, S. Gong, A. D. Dimitrovski, and H. Li, “Time synchronization attack in smart grid: Impact and analysis,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 87–98, 2013.
  66. S. O. Uwagbole, W. J. Buchanan, and L. Fan, “Applied machine learning predictive analytics to SQL injection attack detection and prevention,” in IFIP/IEEE Symposium on Integrated Network and Service Management (IM), IEEE, Lisbon, Portugal, 2017, pp. 1087–1090.
  67. A. Silva, E. Pontes, F. Zhou, A. Guelf, and S. Kofuji, “PRBS/EWMA based model for predicting burst attacks (Brute Froce, DoS) in computer networks,” in Ninth International Conference on Digital Information Management (ICDIM 2014), IEEE, Phitsanulok, Thailand, 2014, pp. 194–200.
  68. Z. Zhan, M. Xu, and S. Xu, “Predicting cyber attack rates with extreme values,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1666–1677, 2015.
  69. J. Lundberg and B. Johansson, “Resilience, stability and requisite interpretation in accident investigations,” in Proceedings of the Second Resilience Engineering Symposium, Juan-les-Pins, France, 2006, pp. 191–198.
  70. H. Amrouch, V. M. van Santen, T. Ebi, V. Wenzel, and J. Henkel, “Towards interdependencies of aging mechanisms,” in Int. Conference on Computer-Aided Design (ICCAD), San Jose, California, USA, 2014. R. C.
  71. R. C. Baumann, “Radiation-induced soft errors in advanced semiconductor Technologies,” IEEE Transactions on Device and Materials Reliability, vol. 100–101, 2005.
  72. S. Sethumadhavan, A. Waksman, M. Suozzo, Y. Huang, and J. Eum, “Trustworthy hardware from untrusted components,” Communications of the ACM, vol. 58, no. 9, pp. 60–71, 2015.
  73. P. Walther, E. Franz, and T. Strufe, “Blind synchronization of channel impulse responses for channel reciprocity-based key generation,” in IEEE 44th Conference on Local Computer Networks (LCN), Osnabrueck, Germany, 2019, pp. 76–83.
  74. P. Walther, M. Richter, and T. Strufe, “Ray-tracing based inference attacks on physical layer security,” Electronic Communications of the EASST, vol. 80, 2021.
  75. A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou, “A survey on jamming attacks and countermeasures in WSNs,” IEEE communications surveys & tutorials, vol. 11, no. 4, pp. 42–56, 2009.
  76. G. K. Pandey, D. S. Gurjar, H. H. Nguyen, and S. Yadav, “Security threats and mitigation techniques in UAV communications: A comprehensive survey,” IEEE Access, vol. 10, pp. 112 858–112 897, 2022.
  77. D. Kapetanovic, G. Zheng, and F. Rusek, “Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks,” IEEE Communications Magazine, vol. 53, no. 6, pp. 21–27, 2015.
  78. H. Pirayesh and H. Zeng, “Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey,” IEEE communications surveys & tutorials, vol. 24, no. 2, pp. 767–809, 2022.
  79. K. Grover, A. Lim, and Q. Yang, “Jamming and anti–jamming techniques in wireless networks: A survey,” International Journal of Ad Hoc and Ubiquitous Computing, vol. 17, no. 4, pp. 197–215, 2014.
  80. M. Shakiba-Herfeh, A. Chorti, and H. Vincent Poor, “Physical layer security: Authentication, integrity, and confidentiality,” Physical layer security, pp. 129–150, 2021.
  81. J. Jeung, S. Jeong, and J. Lim, “Adaptive rapid channel-hopping scheme mitigating smart jammer attacks in secure WLAN,” in 2011-MILCOM 2011 Military Communications Conference, IEEE, Baltimore, MD, USA, 2011, pp. 1231–1236.
  82. J. Pinola, J. Prokkola, and E. Piri, “An experimental study on jamming tolerance of 3G/WCDMA,” in MILCOM 2012-2012 IEEE Military Communications Conf., IEEE, Orlando, FL, USA, 2012, pp. 1–7.
  83. K. Davaslioglu, S. Soltani, T. Erpek, and Y. E. Sagduyu, “DeepWiFi: Cognitive WiFi with deep learning,” IEEE Transactions on Mobile Computing, vol. 20, no. 2, pp. 429–444, 2019.
  84. Q. Yan, H. Zeng, T. Jiang, M. Li, W. Lou, and Y. T. Hou, “MIMO- based jamming resilient communication in wireless networks,” in IEEE INFOCOM 2014-IEEE Conference on Computer Communications, IEEE, Toronto, ON, Canada, 2014, pp. 2697–2706.
  85. Q. Yan, H. Zeng, T. Jiang, M. Li, W. Lou, and Y. T. Hou, “Jamming resilient communication using MIMO interference cancellation,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 7, pp. 1486–1499, 2016.
  86. Z. Rezki, M. Zorgui, B. Alomair, and M.-S. Alouini, “Secret key agreement: Fundamental limits and practical challenges,” IEEE Wireless Communications, vol. 24, no. 3, pp. 72–79, 2017.
  87. T. Wang, Y. Liu, and A. V. Vasilakos, “Survey on channel reciprocity based key establishment techniques for wireless systems,” Wireless Networks, vol. 21, pp. 1835–1846, 2015.
  88. X. Huang, S.-B. Zhang, Y. Chang, C. Qiu, D.-M. Liu, and M. Hou, “Quantum key agreement protocol based on quantum search algorithm,” International Journal of Theoretical Physics, vol. 60, pp. 838–847, 2021.
  89. O. Amer, V. Garg, and W. O. Krawec, “An introduction to practical quantum key distribution,” IEEE Aerospace and Electronic Systems Magazine, vol. 36, no. 3, pp. 30–55, 2021.
  90. T. M. Hoang, T. Q. Duong, H. D. Tuan, S. Lambotharan, and L. Hanzo, “Physical layer security: Detection of active eavesdropping attacks by support vector machines,” IEEE Access, vol. 9, pp. 31 595–31 607, 2021.
  91. Q. Wu and R. Zhang, “Towards smart and reconfigurable environment: Intelligent reflecting surface aided wireless network,” IEEE Communications Magazine, vol. 58, no. 1, pp. 106–112, 2019.
  92. X. Yu, V. Jamali, D. Xu, D. W. K. Ng, and R. Schober, “Smart and reconfigurable wireless communications: From IRS modeling to algorithm design,” IEEE Wireless Communications, vol. 28, no. 6, pp. 118–125, 2021.
  93. X. Yu, D. Xu, Y. Sun, D. W. K. Ng, and R. Schober, “Robust and secure wireless communications via intelligent reflecting surfaces,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 11, pp. 2637–2652, 2020.
  94. K. Abedi, G. T. Nguyen, and T. Strufe, “Improving resilience of future mobile network generations implementing zero trust paradigm,” in Proceedins of IEEE NOMS, 2024.
  95. A. Osman, J. Born, and T. Strufe, “Mitigating internal, stealthy DoS attacks in microservice networks,” in Stabilization, Safety, and Security of Distributed Systems: 23rd International Symposium, SSS 2021, Virtual Event, November 17–20, 2021, Proceedings 23, Springer, 2021, pp. 500–504.
  96. M. Schuchard, A. Mohaisen, D. Foo Kune, N. Hopper, Y. Kim, and E. Y. Vasserman, “Losing control of the internet: Using the data plane to attack the control plane,” in Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA, 2010, pp. 726–728.
  97. S. Freitas, D. Yang, S. Kumar, H. Tong, and D. H. Chau, “Graph vulnerability and robustness: A survey,” IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 6, pp. 5915–5934, 2022.
  98. R. Cohen, R. Hess-Green, and G. Nakibly, “Small lies, lots of damage: a partition attack on link-state routing protocols,” in IEEE Conference on Communications and Network Security (CNS), IEEE, Florence, Italy, 2015, pp. 397–405.
  99. N. Alexiou, S. Basagiannis, P. Katsaros, T. Dashpande, and S. A. Smolka, “Formal analysis of the kaminsky DNS cache-poisoning attack using probabilistic model checking,” in IEEE 12th International Symposium on High Assurance Systems Engineering, IEEE, San Jose, CA, USA, 2010, pp. 94–103.
  100. A. Herzberg and H. Shulman, “Security of patched DNS,” in Computer Security–ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings 17, Springer, 2012, pp. 271–288.
  101. K. Man, Z. Qian, Z. Wang, X. Zheng, Y. Huang, and H. Duan, “Dns cache poisoning attack reloaded: Revolutions with side channels,” in Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event USA, 2020, pp. 1337–1350.
  102. D. Borbor, L. Wang, S. Jajodia, and A. Singhal, “Optimizing the network diversity to improve the resilience of networks against unknown attacks,” Computer Communications, vol. 145, pp. 96–112, 2019.
  103. V. Stafford, “Zero trust architecture,” NIST special publication, vol. 800, p. 207, 2020.
  104. R. Bless, M. Zitterbart, Z. Despotovic, and A. Hecker, “KIRA: Distributed scalable ID-based routing with fast forwarding,” in 21st IFIP Networking Conference, IEEE, Catania, Italy, 2022, pp. 1–9.
  105. N. Bhusal, M. Abdelmalak, M. Kamruzzaman, and M. Benidris, “Power system resilience: Current practices, challenges, and future directions,” IEEE Access, vol. 8, pp. 18 064–18 086, 2020.
  106. F. Blaabjerg, Y. Yang, D. Yang, and X. Wang, “Distributed power-generation systems and protection,” Proceedings of the IEEE, vol. 105, no. 7, pp. 1311–1331, 2017.
  107. Z. Bie, Y. Lin, G. Li, and F. Li, “Battling the extreme: A study on the power system resilience,” Proceedings of the IEEE, vol. 105, no. 7, pp. 1253–1266, 2017.
  108. D. Hutchison, D. Pezaros, J. Rak, and P. Smith, “On the importance of resilience engineering for networked systems in a changing world,” IEEE Communications Magazine, 2023.
  109. K. B. Letaief, Y. Shi, J. Lu, and J. Lu, “Edge artificial intelligence for 6G: Vision, enabling technologies, and applications,” IEEE Journal on Selected Areas in Communications, vol. 40, no. 1, pp. 5–36, 2021.
  110. M. R. Mahmood, M. A. Matin, P. Sarigiannidis, and S. K. Goudos, “A comprehensive review on artificial intelligence/machine learning algorithms for empowering the future IoT toward 6G era,” IEEE Access, vol. 10, pp. 87 535–87 562, 2022.
  111. L. U. Khan, W. Saad, D. Niyato, Z. Han, and C. S. Hong, “Digital-twin-enabled 6G: Vision, architectural trends, and future directions,” IEEE Communications Magazine, vol. 60, no. 1, pp. 74–80, 2022.
  112. A. Aguiar, O. Altintas, F. Dressler, G. Karlsson, and F. Klingler, “Inter-vehicular communication-from edge support to vulnerable road users II (Dagstuhl seminar 22512),” in Dagstuhl Reports, Schloss Dagstuhl-Leibniz-Zentrum für Informatik, vol. 12, 2023.
  113. G. S. Pannu, S. Ucar, T. Higuchi, O. Altintas, and F. Dressler, “Data sharing in virtual edge computing using coded caching,” in IEEE Vehicular Networking Conference (VNC), IEEE, Istanbul, Turkiye, 2023, pp. 104–111.
  114. J. Rak, M. Jonsson, and A. Vinel, “A taxonomy of challenges to resilient message dissemination in VANETs,” in 17th International Telecommunications Network Strategy and Planning Symposium (Networks), Montreal, QC, Canada, 2016, pp. 127–132.
  115. K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy, “Denial of service attacks in wireless networks: The case of jammers,” IEEE Communications Surveys & Tutorials, vol. 13, no. 2, pp. 245–257, 2011.
  116. A. Chattopadhyay, K.-Y. Lam, and Y. Tavva, “Autonomous vehicle: Security by design,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 11, pp. 7015–7029, 2020.
  117. V. Casola, A. De Benedictis, M. Rak, and E. Rios, “Security-by-design in clouds: A security-SLA driven methodology to build secure cloud applications,” Procedia Computer Science, vol. 97, pp. 53–62, 2016.
  118. C. Simoiu, “Secure by default: A behavioral approach to cyber security”. Stanford University, 2020.
Citations (2)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 2 tweets with 0 likes about this paper.