Securing 6G Wireless Communications

shape
shape
shape
shape
shape
shape
shape
shape

The increasing number of applications and devices in the Sixth-generation (6G) networks and the diversity of mobile data, architectures, and technologies make security and privacy a critical concern. Advanced metaheuristics algorithms (MHAs) have recently become a viable solution for optimizing security and privacy in wireless networks, combining game theory and convex optimization, and several other advanced models. As a subfield of Artificial Intelligence (AI), MHAs are inspired by concepts from Evolutionary Algorithms (EAs), Trajectory-based Algorithms (TAs), and Swarm Intelligence (SI). Recent implementations of MHAs in the 6G networks have effectively solved complex security and privacy problems.

image
image

This project aims to improve wireless networks' security and privacy by utilizing advanced metaheuristic algorithms. The project aims to achieve several objectives, including developing optimization frameworks for enhancing network performance and reducing security risks, developing robust models that can adapt to various attacks while maintaining accuracy. Additionally, the project seeks to optimize network parameters using hybrid metaheuristic algorithms, such as Particle Swarm Optimization (PSO) or Multi-Verse Optimizer (MVO), to improve network security and efficiency. The proposed methods will be evaluated through extensive simulations to assess their effectiveness in improving network security and robustness against adversarial attacks. The results of this project will contribute to developing more secure and efficient wireless networks in various fields, such as telecommunications, healthcare, and transportation.

  • What are the benefits of using metaheuristic algorithms for optimizing security and privacy in wireless networks?

    Metaheuristic algorithms offer a flexible and efficient approach to solving complex optimization problems in wireless networks. They are inspired by concepts from various fields, such as Evolutionary Algorithms (EAs), Trajectory-based Algorithms (TAs), and Swarm Intelligence (SI), and have been successfully implemented in various wireless network scenarios. By using metaheuristic algorithms, it is possible to optimize security and privacy in wireless networks more effectively than traditional optimization methods.

  • How do optimization frameworks and trust score adaptation enhance security and privacy in wireless networks?

    Optimization frameworks and trust score adaptation are two methods used to enhance security and privacy in wireless networks using metaheuristic algorithms. Optimization frameworks, such as the one proposed in this project for Deep Learning (DL) hyperparameters in 6G millimeter-wave (mmWave) networks, optimize network performance through intelligent selection of network parameters. Trust score adaptation, such as the method proposed in this project for reducing the security risk of Fast Gradient Sign Method (FGSM) attacks in Federated Learning (FL), adjusts the trust scores of clients to prevent malicious attacks and maintain network integrity. These methods are optimized using metaheuristic algorithms, enhancing wireless networks' security and privacy.

  • Members
  • Journal Articles
  • Conference Papers
  • Citations
  • A. K. Abasi, M. Aloqaily, M. Guizani, and B. Ouni, Metaheuristic Algorithms for Securing 6G Wireless Communications: Recent Advances and Applications, ACM Computing Surveys, 2023.

    DOI:N.B submitted
    Source Code:-
    PDF Download:Upcoming
  • Citations
  • A. K. Abasi, M. Aloqaily, M. Guizani, B. Ouni, M. Debbah, and F. Karray, A Survey on Securing 6G Wireless Communications based Optimization Techniques, In International Wireless Communications & Mobile Computing Conference (IWCMC), 2023.

    DOI:Upcoming
    Source Code:-
    PDF Download
  • A. K. Abasi, M. Aloqaily, and M. Guizani, Mitigating Security Risks in 6G Networks-based Optimization of Deep Learning, In GLOBECOM 2023-2023 IEEE Global Communications Conference, 2023.

    DOI:N.B submitted
    Source Code:https://github.com/Artifitialleap-MBZUAI/Mitigating-Security-Risks-in-6G-Networks-based-Optimization-of-Deep-Learning.git
    PDF Download:Upcoming
  • A. K. Abasi, N. Hijazi, M. Aloqaily, and M. Guizani, Securing Federated Learning against FGSM Attacks with Adaptive Trust Scores and Blockchain Updates, In International Conference on Blockchain Computing and Applications (BCCA), 2023.

    DOI:N.B To be submitted soon
    Source Code:https://github.com/Artifitialleap-MBZUAI/Mitigating-Security-Risks-in-6G-Networks-based-Optimization-of-Deep-Learning.git
    PDF Download:Upcoming