Balancing QoS and Security in the Edge: Existing Practices, Challenges, and 6G Opportunities With Machine Learning

While the emerging 6G networks are anticipated to meet the high-end service quality demands of the mobile edge users in terms of data rate and delay satisfaction, new attack surfaces and zero-day attacks continue to pose significant threats to their successful realization and rollouts. Traditionally, most service provisioning techniques considered security metrics separately from the Quality of Service (QoS) and Quality of Expectation (QoE) parameters. The QoS/QoE parameters include data throughput, experienced delay, tolerable latency, jitter, resource utilization rate, spectral efficiency, energy efficiency, fairness, and other emerging key performance indicators (KPIs). Also, there are various security attributes, such as encryption key strength, authentication strength, network anomaly score, privacy metric, and so on. Typically, the resource allocation optimization techniques to maximize the security aspects to protect the communication of mobile users or user equipment (UEs) have an adverse effect on the service quality. Therefore, a key research gap exists in balancing service quality and security levels in communication networks that has been either overlooked or identified in a rather scattered manner by researchers in the recent decade. Thus, a comprehensive survey of the state-of-the-art to clearly address this research gap and outline the possible solutions is yet to appear in the existing literature. In this paper, we address this by surveying the existing practices, challenges, and opportunities in the emerging 6G (i.e., beyond 5G) networks, where various AI (Artificial Intelligence)-based techniques such as deep learning meet the classical optimization techniques, to balance the service performance and security levels. Several networking topologies with relevant use-cases are included in the survey to discuss the existing and emerging trends of isolated as well as joint treatment of service and security levels. Lessons learned from each use-case are provided to demonstrate a clear road map for the interested readers and researchers in emerging networks to construct a natively combined service and security ecosystem, specifically in the network edge.

[1]  Ashok Kumar Turuk,et al.  Autonomous Vehicles: Resource Allocation, Security, and Data Privacy , 2022, IEEE Transactions on Green Communications and Networking.

[2]  Biplab Sikdar,et al.  Machine-Learning-Assisted Security and Privacy Provisioning for Edge Computing: A Survey , 2022, IEEE Internet of Things Journal.

[3]  Nei Kato,et al.  HCP: Heterogeneous Computing Platform for Federated Learning Based Collaborative Content Caching Towards 6G Networks , 2022, IEEE Transactions on Emerging Topics in Computing.

[4]  Z. Fadlullah,et al.  Joint Provisioning of QoS and Security in IoD Networks: Classical Optimization Meets AI , 2021, IEEE Internet of Things Magazine.

[5]  M. Debbah,et al.  Spectrum-Learning-Aided Reconfigurable Intelligent Surfaces for “Green” 6G Networks , 2021, IEEE Network.

[6]  Nei Kato,et al.  On Smart IoT Remote Sensing over Integrated Terrestrial-Aerial-Space Networks: An Asynchronous Federated Learning Approach , 2021, IEEE Network.

[7]  Ren-Hung Hwang,et al.  Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges , 2021, IEEE Communications Surveys & Tutorials.

[8]  H. Vincent Poor,et al.  6G Internet of Things: A Comprehensive Survey , 2021, IEEE Internet of Things Journal.

[9]  E. Sasikala,et al.  Learning based Latency Minimization Techniques in Mobile Edge Computing (MEC) systems: A Comprehensive Survey , 2021, 2021 International Conference on System, Computation, Automation and Networking (ICSCAN).

[10]  Nei Kato,et al.  Optimizing Computation Offloading in Satellite-UAV-Served 6G IoT: A Deep Learning Approach , 2021, IEEE Network.

[11]  H. Vincent Poor,et al.  Blockchain and 6G: The Future of Secure and Ubiquitous Communication , 2021, IEEE Wireless Communications.

[12]  Ramon Canal,et al.  A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks , 2021, IEEE Communications Surveys & Tutorials.

[13]  Sanjeev Gurugopinath,et al.  A Survey on Jamming Techniques in Physical Layer Security and Anti-Jamming Strategies for 6G , 2021, 2021 28th International Conference on Telecommunications (ICT).

[14]  Chunguo Li,et al.  Several Key Technologies for 6G: Challenges and Opportunities , 2021, IEEE Communications Standards Magazine.

[15]  Weihai Zhang,et al.  Indefinite Mean-Field Stochastic Cooperative Linear-Quadratic Dynamic Difference Game With Its Application to the Network Security Model , 2021, IEEE Transactions on Cybernetics.

[16]  Zibin Zheng,et al.  Deep Reinforcement Learning for Internet of Things: A Comprehensive Survey , 2021, IEEE Communications Surveys & Tutorials.

[17]  Samir Saoudi,et al.  On the Role of Stochastic Geometry in Sixth Generation Wireless Networks , 2021, 2020 10th International Symposium on Signal, Image, Video and Communications (ISIVC).

[18]  Jorge Navarro-Ortiz,et al.  Performance Modeling of Softwarized Network Services Based on Queuing Theory With Experimental Validation , 2021, IEEE Transactions on Mobile Computing.

[19]  Neeraj Kumar,et al.  Blockchain-Envisioned UAV Communication Using 6G Networks: Open Issues, Use Cases, and Future Directions , 2021, IEEE Internet of Things Journal.

[20]  Ying-Chang Liang,et al.  Blockchain and Artificial Intelligence for Dynamic Resource Sharing in 6G and Beyond , 2021, IEEE Wireless Communications.

[21]  Victor C. M. Leung,et al.  Enabling Massive IoT Toward 6G: A Comprehensive Survey , 2021, IEEE Internet of Things Journal.

[22]  M. Conti,et al.  A Survey on Industrial Control System Testbeds and Datasets for Security Research , 2021, IEEE Communications Surveys & Tutorials.

[23]  H. Poor,et al.  Context-Aware Security for 6G Wireless: The Role of Physical Layer Security , 2021, IEEE Communications Standards Magazine.

[24]  Mostafa Rahimi Azghadi,et al.  Internet of Underwater Things and Big Marine Data Analytics—A Comprehensive Survey , 2020, IEEE Communications Surveys & Tutorials.

[25]  Salama Ikki,et al.  Centralized Versus Heuristic-Based Distributed Channel Allocation to Minimize Packet Transmission Delay for Multiband Relay Networks , 2020, IEEE Networking Letters.

[26]  Chunxiao Jiang,et al.  Machine Learning for 6G Wireless Networks: Carrying Forward Enhanced Bandwidth, Massive Access, and Ultrareliable/Low-Latency Service , 2020, IEEE Vehicular Technology Magazine.

[27]  Arsenia Chorti,et al.  Brief Report on QoSec, Context Aware Security and the Role of Physical Layer Security in 6G Wireless , 2020, ArXiv.

[28]  Ekram Hossain,et al.  Single and Multi-Agent Deep Reinforcement Learning for AI-Enabled Wireless Networks: A Tutorial , 2020, IEEE Communications Surveys and Tutorials.

[29]  Xiqi Gao,et al.  6G Wireless Channel Measurements and Models: Trends and Challenges , 2020, IEEE Vehicular Technology Magazine.

[30]  Yue Tian,et al.  MANE: Model-Agnostic Non-linear Explanations for Deep Learning Model , 2020, 2020 IEEE World Congress on Services (SERVICES).

[31]  Katya Scheinberg,et al.  Adaptive Stochastic Optimization: A Framework for Analyzing Stochastic Optimization Algorithms , 2020, IEEE Signal Processing Magazine.

[32]  Pedro Miguel S'anchez S'anchez,et al.  A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets , 2020, IEEE Communications Surveys & Tutorials.

[33]  Ingrid Chieh Yu,et al.  EXPLAN: Explaining Black-box Classifiers using Adaptive Neighborhood Generation , 2020, 2020 International Joint Conference on Neural Networks (IJCNN).

[34]  Scott Ruoti,et al.  SenCAPTCHA , 2020, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[35]  Stefan Köpsell,et al.  Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation , 2020, EURASIP Journal on Wireless Communications and Networking.

[36]  Kang An,et al.  Secure Communications Over Cell-Free Massive MIMO Networks With Hardware Impairments , 2020, IEEE Systems Journal.

[37]  Hassan N. Noura,et al.  Security analysis of drones systems: Attacks, limitations, and recommendations , 2020, Internet of Things.

[38]  Qinping Zhao,et al.  Contextualized CNN for Scene-Aware Depth Estimation From Single RGB Image , 2020, IEEE Transactions on Multimedia.

[39]  Xiaojing Huang,et al.  White Paper on Broadband Connectivity in 6G , 2020, 2004.14247.

[40]  Shahin Shahrampour,et al.  On Distributed Nonconvex Optimization: Projected Subgradient Method for Weakly Convex Problems in Networks , 2020, IEEE Transactions on Automatic Control.

[41]  Alagan Anpalagan,et al.  Dynamic Power–Latency Tradeoff for Mobile Edge Computation Offloading in NOMA-Based Networks , 2020, IEEE Internet of Things Journal.

[42]  Nei Kato,et al.  AI-Based Joint Optimization of QoS and Security for 6G Energy Harvesting Internet of Things , 2020, IEEE Internet of Things Journal.

[43]  Dinh C. Nguyen,et al.  Enabling AI in Future Wireless Networks: A Data Life Cycle Perspective , 2020, IEEE Communications Surveys & Tutorials.

[44]  Jun Zhang,et al.  Communication-Efficient Edge AI: Algorithms and Systems , 2020, IEEE Communications Surveys & Tutorials.

[45]  Yequn Wang,et al.  On Delay-Aware Resource Control With Statistical QoS Provisioning By Dual Connectivity in Heterogeneous Aeronautical Network , 2020, IEEE Transactions on Vehicular Technology.

[46]  Wei Wu,et al.  Distributed Queueing-Based Random Access Protocol for LoRa Networks , 2020, IEEE Internet of Things Journal.

[47]  Joao Xavier,et al.  Primal–Dual Methods for Large-Scale and Distributed Convex Optimization and Data Analytics , 2019, Proceedings of the IEEE.

[48]  Xiao Lu,et al.  Toward Smart Wireless Communications via Intelligent Reflecting Surfaces: A Contemporary Survey , 2019, IEEE Communications Surveys & Tutorials.

[49]  Jun Wu,et al.  A Survey on Green 6G Network: Architecture and Technologies , 2019, IEEE Access.

[50]  Gaurav Choudhary,et al.  5G wireless P2MP backhaul security protocol: an adaptive approach , 2019, EURASIP J. Wirel. Commun. Netw..

[51]  Xiangpeng Xie,et al.  Resilient Event-Triggered Controller Synthesis of Networked Control Systems Under Periodic DoS Jamming Attacks , 2019, IEEE Transactions on Cybernetics.

[52]  Biplab Sikdar,et al.  Data Provenance for IoT With Light Weight Authentication and Privacy Preservation , 2019, IEEE Internet of Things Journal.

[53]  Ali Kashif Bashir,et al.  A Quantum-Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario , 2019, IEEE Transactions on Industrial Informatics.

[54]  Xiangdong Jia,et al.  Interference Graph-Based Resource Management for Vehicular Communications , 2019, 2019 International Conference on Electronic Engineering and Informatics (EEI).

[55]  Bartlomiej Blaszczyszyn,et al.  Performance Analysis of Cellular Networks With Opportunistic Scheduling Using Queueing Theory and Stochastic Geometry , 2019, IEEE Transactions on Wireless Communications.

[56]  Choong Seon Hong,et al.  Infotainment Enabled Smart Cars: A Joint Communication, Caching, and Computation Approach , 2019, IEEE Transactions on Vehicular Technology.

[57]  Yue Tan,et al.  Deep Reinforcement Learning for Autonomous Internet of Things: Model, Applications and Challenges , 2019, IEEE Communications Surveys & Tutorials.

[58]  Syed Ali Hassan,et al.  Machine Learning for Resource Management in Cellular and IoT Networks: Potentials, Current Solutions, and Open Challenges , 2019, IEEE Communications Surveys & Tutorials.

[59]  Xiaofei Wang,et al.  Convergence of Edge Computing and Deep Learning: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[60]  Gerhard Bauch,et al.  Prioritized Multistream Traffic in Uplink IoT Networks: Spatially Interacting Vacation Queues , 2019, IEEE Internet of Things Journal.

[61]  P. Fan,et al.  6G Wireless Networks: Vision, Requirements, Architecture, and Key Technologies , 2019, IEEE Vehicular Technology Magazine.

[62]  Kato Nei,et al.  Physical Layer Security in Large–Scale Probabilistic Caching: Analysis and Optimization , 2019, IEEE Communications Letters.

[63]  Bo Zhao,et al.  A survey: Typical security issues of software-defined networking , 2019, China Communications.

[64]  Geoffrey Ye Li,et al.  Resource Allocation for Vehicular Communications With Low Latency and High Reliability , 2019, IEEE Transactions on Wireless Communications.

[65]  Antti Ylä-Jääski,et al.  Folo: Latency and Quality Optimized Task Allocation in Vehicular Fog Computing , 2019, IEEE Internet of Things Journal.

[66]  Per Knudsen,et al.  Trajectory Generation Using Semidefinite Programming For Multi-Rotors , 2019, 2019 18th European Control Conference (ECC).

[67]  Andrei Gurtov,et al.  Security for 5G and Beyond , 2019, IEEE Communications Surveys & Tutorials.

[68]  Jingjing Yao,et al.  QoS-Aware Power Control in Internet of Drones for Data Collection Service , 2019, IEEE Transactions on Vehicular Technology.

[69]  Massimo Alioto,et al.  Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff , 2019, IEEE Internet of Things Journal.

[70]  Sundeep Rangan,et al.  Towards 6G Networks: Use Cases and Technologies , 2019, ArXiv.

[71]  Syed Ali Hassan,et al.  Machine Learning in IoT Security: Current Solutions and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.

[72]  Emmanuel Vincent,et al.  CRNN-Based Multiple DoA Estimation Using Acoustic Intensity Features for Ambisonics Recordings , 2019, IEEE Journal of Selected Topics in Signal Processing.

[73]  Qingqing Wu,et al.  Safeguarding Wireless Network with UAVs: A Physical Layer Security Perspective , 2019, IEEE Wireless Communications.

[74]  Weihua Zhuang,et al.  End-to-End Delay Modeling for Embedded VNF Chains in 5G Core Networks , 2019, IEEE Internet of Things Journal.

[75]  Nei Kato,et al.  Multi-Hop Wireless Transmission in Multi-Band WLAN Systems: Proposal and Future Perspective , 2019, IEEE Wireless Communications.

[76]  Mugen Peng,et al.  Recent Advances of Edge Cache in Radio Access Networks for Internet of Things: Techniques, Performances, and Challenges , 2019, IEEE Internet of Things Journal.

[77]  Chunxiao Jiang,et al.  Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks , 2019, IEEE Communications Surveys & Tutorials.

[78]  Dong Wang,et al.  A Survey of Optimization Approaches for Wireless Physical Layer Security , 2019, IEEE Communications Surveys & Tutorials.

[79]  Yichen Wang,et al.  A Unified QoS and Security Provisioning Framework for Wiretap Cognitive Radio Networks: A Statistical Queueing Analysis Approach , 2019, IEEE Transactions on Wireless Communications.

[80]  Halil Yetgin,et al.  Machine Learning for Wireless Link Quality Estimation: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[81]  Norbert Wehn,et al.  When Channel Coding Hits the Implementation Wall , 2018, 2018 IEEE 10th International Symposium on Turbo Codes & Iterative Information Processing (ISTC).

[82]  Ying-Chang Liang,et al.  Applications of Deep Reinforcement Learning in Communications and Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[83]  Mohamed-Slim Alouini,et al.  Spatiotemporal Model for Uplink IoT Traffic: Scheduling and Random Access Paradox , 2018, IEEE Transactions on Wireless Communications.

[84]  Emil Björnson,et al.  How Energy-Efficient Can a Wireless Communication System Become? , 2018, 2018 52nd Asilomar Conference on Signals, Systems, and Computers.

[85]  Abdellatif Kobbane,et al.  Graph-Based Computing Resource Allocation for Mobile Blockchain , 2018, 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM).

[86]  Mohamed-Slim Alouini,et al.  On Optimizing VLC Networks for Downlink Multi-User Transmission: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[87]  Yasir Abdelgadir Mohamed,et al.  An Enhancement of Data Encryption Standards Algorithm (DES) , 2018, 2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE).

[88]  Xiaojiang Du,et al.  A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security , 2018, IEEE Communications Surveys & Tutorials.

[89]  Yan Zhang,et al.  Joint Offloading and Resource Allocation in Vehicular Edge Computing and Networks , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[90]  Jakub Marecek,et al.  A Two-Step Pre-Processing for Semidefinite Programming , 2018, 2020 59th IEEE Conference on Decision and Control (CDC).

[91]  Vishal Sharma,et al.  A Survey on the Security of Pervasive Online Social Networks (POSNs) , 2018, J. Internet Serv. Inf. Secur..

[92]  Qi Hao,et al.  Deep Learning for Intelligent Wireless Networks: A Comprehensive Survey , 2018, IEEE Communications Surveys & Tutorials.

[93]  Xiaoli Xu,et al.  Optimal Scheduling for Multi-Hop Video Streaming with Network Coding in Vehicular Networks , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).

[94]  Thrasyvoulos Spyropoulos,et al.  A Two-Step Chunk-Based Algorithm for Offloading Streaming Traffic Through a Vehicular Cloud , 2018, 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[95]  Nei Kato,et al.  Space-Air-Ground Integrated Network: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[96]  Soumaya Cherkaoui,et al.  SDN Controller Assignment and Load Balancing with Minimum Quota of Processing Capacity , 2018, 2018 IEEE International Conference on Communications (ICC).

[97]  Weihua Zhuang,et al.  Traffic Offloading for Online Video Service in Vehicular Networks: A Cooperative Approach , 2018, IEEE Transactions on Vehicular Technology.

[98]  Gabriel-Miro Muntean,et al.  Family-Aware Pricing Strategy for Accelerating Video Dissemination over Information-Centric Vehicular Networks , 2018, 2018 IEEE International Conference on Communications (ICC).

[99]  Hamed Haddadi,et al.  Deep Learning in Mobile and Wireless Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[100]  Abderrahim Sekkaki,et al.  A Graph Theory Based Network Selection Algorithm in Heterogeneous Wireless Networks , 2018, 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS).

[101]  Jian Yang,et al.  Security-Aware Resource Allocation With Delay Constraint for NOMA-Based Cognitive Radio Network , 2018, IEEE Transactions on Information Forensics and Security.

[102]  Hongke Zhang,et al.  GrIMS: Green Information-Centric Multimedia Streaming Framework in Vehicular Ad Hoc Networks , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[103]  Lin Chen,et al.  Heterogeneous Spectrum Aggregation: Coexistence From a Queue Stability Perspective , 2018, IEEE Transactions on Wireless Communications.

[104]  Jeff Reeve,et al.  The Security Trade-Offs in Resource Constrained Nodes for IoT Application , 2018 .

[105]  Mohsen Guizani,et al.  Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[106]  Ashwin Ashok,et al.  Vehicular Cloud Computing through Dynamic Computation Offloading , 2017, Comput. Commun..

[107]  Giuseppe Caire,et al.  Physical-Layer Schemes for Wireless Coded Caching , 2017, IEEE Transactions on Information Theory.

[108]  Antti Tölli,et al.  Multi-Antenna Interference Management for Coded Caching , 2017, IEEE Transactions on Wireless Communications.

[109]  Fang Ye,et al.  Graph-based femtocell enhanced universal resource allocation strategy for LTE-A HetNets , 2017, 2017 Progress in Electromagnetics Research Symposium - Fall (PIERS - FALL).

[110]  Qing Ling,et al.  Decentralized bundle method for nonsmooth consensus optimization , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[111]  Thrasyvoulos Spyropoulos,et al.  Per-Chunk Caching for Video Streaming from a Vehicular Cloud , 2017, CHANTS@MOBICOM.

[112]  Ursula Challita,et al.  Artificial Neural Networks-Based Machine Learning for Wireless Networks: A Tutorial , 2017, IEEE Communications Surveys & Tutorials.

[113]  Halim Yanikomeroglu,et al.  Efficient resource allocation for video streaming for 5G network-to-vehicle communications , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[114]  Julio Hernandez-Castro,et al.  No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation , 2017, IEEE Transactions on Information Forensics and Security.

[115]  Nei Kato,et al.  State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow’s Intelligent Network Traffic Control Systems , 2017, IEEE Communications Surveys & Tutorials.

[116]  Ioannis Dimitriou,et al.  Stable Throughput and Delay Analysis of a Random Access Network With Queue-Aware Transmission , 2017, IEEE Transactions on Wireless Communications.

[117]  Lin Cai,et al.  Utility Maximization for Multimedia Data Dissemination in Large-Scale VANETs , 2017, IEEE Transactions on Mobile Computing.

[118]  Zhangdui Zhong,et al.  Integrity-Oriented Content Offloading in Vehicular Sensor Network , 2017, IEEE Access.

[119]  Jianhua Lu,et al.  Contact-Aware Optimal Resource Allocation for Mobile Data Offloading in Opportunistic Vehicular Networks , 2017, IEEE Transactions on Vehicular Technology.

[120]  Nei Kato,et al.  GT-QoSec: A Game-Theoretic Joint Optimization of QoS and Security for Differentiated Services in Next Generation Heterogeneous Networks , 2017, IEEE Transactions on Wireless Communications.

[121]  Mohamed Grissa,et al.  Location Privacy in Cognitive Radio Networks: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[122]  Xuemin Shen,et al.  Secrecy-Based Energy-Efficient Data Offloading via Dual Connectivity Over Unlicensed Spectrums , 2016, IEEE Journal on Selected Areas in Communications.

[123]  Thrasyvoulos Spyropoulos,et al.  Streaming content from a vehicular cloud , 2016, CHANTS@MOBICOM.

[124]  Guoqing Zhang,et al.  Enabling QoE-aware mobile cloud video recording over roadside vehicular networks , 2016, China Communications.

[125]  Wei Quan,et al.  ICN based vehicle-to-cloud delivery for multimedia streaming in urban vehicular networks , 2016, China Communications.

[126]  Yun Rui,et al.  A QoE centric distributed caching approach for vehicular video streaming in cellular networks , 2016, Wirel. Commun. Mob. Comput..

[127]  Xuemin Shen,et al.  WhiteFi Infostation: Engineering Vehicular Media Streaming With Geolocation Database , 2016, IEEE Journal on Selected Areas in Communications.

[128]  Thrasyvoulos Spyropoulos,et al.  Storage on wheels: Offloading popular contents through a vehicular cloud , 2016, 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[129]  Marwan Krunz,et al.  Exploiting Full-Duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks , 2016, IEEE Transactions on Communications.

[130]  Toni Janevski,et al.  Lyapunov Optimization Framework for 5G Mobile Nodes With Multi-Homing , 2016, IEEE Communications Letters.

[131]  Yadigar N. Imamverdiyev,et al.  QUEUING MODEL FOR INFORMATION SECURITY MONITORING SYSTEMS , 2016 .

[132]  Huiming Wang,et al.  Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.

[133]  Tho Le-Ngoc,et al.  Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.

[134]  Hao Zhou,et al.  Resource allocation for scalable video streaming in highway VANET , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[135]  Zhangdui Zhong,et al.  MMS-MVN: a multimedia multicast scheduling method for multi-hop vehicular networks , 2015, Int. J. Ad Hoc Ubiquitous Comput..

[136]  Qiang Li,et al.  Kalman Filter and Its Application , 2015, 2015 8th International Conference on Intelligent Networks and Intelligent Systems (ICINIS).

[137]  Alejandro Ribeiro,et al.  Interior point method for dynamic constrained optimization in continuous time , 2015, 2016 American Control Conference (ACC).

[138]  Sennur Ulukus,et al.  Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.

[139]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[140]  Stefano Paris,et al.  Optimal caching of encoded data for content distribution in vehicular networks , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[141]  Giuseppe Carlo Calafiore,et al.  Lagrangian duality in 3D SLAM: Verification techniques and optimal solutions , 2015, 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[142]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[143]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[144]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[145]  Javier López,et al.  Analysis and taxonomy of security/QoS tradeoff solutions for the future internet , 2014, Secur. Commun. Networks.

[146]  Walid Saad,et al.  Matching theory for future wireless networks: fundamentals and applications , 2014, IEEE Communications Magazine.

[147]  Sung-Min Oh,et al.  Interference avoidance resource allocation for D2D communication based on graph-coloring , 2014, 2014 International Conference on Information and Communication Technology Convergence (ICTC).

[148]  Mianxiong Dong,et al.  MMCD: Max-throughput and min-delay cooperative downloading for Drive-thru Internet systems , 2014, 2014 IEEE International Conference on Communications (ICC).

[149]  Sébastien Bubeck,et al.  Convex Optimization: Algorithms and Complexity , 2014, Found. Trends Mach. Learn..

[150]  Moraru Vasile,et al.  A second order-cone programming relaxation for facility location problem , 2014, 2014 International Conference on Development and Application Systems (DAS).

[151]  Eduardo Rocha,et al.  A Survey of Payload-Based Traffic Classification Approaches , 2014, IEEE Communications Surveys & Tutorials.

[152]  Jin Cao,et al.  A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.

[153]  Mohammad Reza Nakhai,et al.  Second-order cone programming for robust downlink beamforming with imperfect CSI , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[154]  Raffaele Bruno,et al.  Robust and efficient data collection schemes for vehicular multimedia sensor Networks , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[155]  P. W. Wani,et al.  Hardware Implementation of Algorithm for Cryptanalysis , 2013, ArXiv.

[156]  Urs Niesen,et al.  Fundamental limits of caching , 2012, 2013 IEEE International Symposium on Information Theory.

[157]  Derrick Wing Kwan Ng,et al.  Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.

[158]  M. Abdallah,et al.  MIMO/OFDM convex optimization applications , 2012, 2012 IEEE Long Island Systems, Applications and Technology Conference (LISAT).

[159]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[160]  Noémie Floissac,et al.  From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks on Key Expansion , 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.

[161]  Abraham O. Fapojuwo,et al.  Optimal and Efficient Graph-Based Resource Allocation Algorithms for Multiservice Frame-Based OFDMA Networks , 2011, IEEE Transactions on Mobile Computing.

[162]  Jing Wang,et al.  Optimal Power Allocation for Joint Beamforming and Artificial Noise Design in Secure Wireless Communications , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[163]  Stephen P. Boyd,et al.  Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..

[164]  Nam P. Nguyen,et al.  A Graph-Theoretic QoS-Aware Vulnerability Assessment for Network Topologies , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[165]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[166]  Hakima Chaouchi,et al.  On the Integration of LTE and Mobile WiMAX Networks , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.

[167]  Nick McKeown,et al.  A network in a laptop: rapid prototyping for software-defined networks , 2010, Hotnets-IX.

[168]  Athanasios V. Vasilakos,et al.  DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.

[169]  Li Na,et al.  A Design and Implementation of High-Speed 3DES Algorithm System , 2009, 2009 Second International Conference on Future Information Technology and Management Engineering.

[170]  Tarik Taleb,et al.  Exploring the security requirements for quality of service in combined wired and wireless networks , 2009, IWCMC.

[171]  Asuman E. Ozdaglar,et al.  Distributed Subgradient Methods for Multi-Agent Optimization , 2009, IEEE Transactions on Automatic Control.

[172]  Dharma P. Agrawal,et al.  Graph Theoretic Approach to QoS-Guaranteed Spectrum Allocation in Cognitive Radio Networks , 2008, 2008 IEEE International Performance, Computing and Communications Conference.

[173]  Karl Henrik Johansson,et al.  Subgradient methods and consensus algorithms for solving convex optimization problems , 2008, 2008 47th IEEE Conference on Decision and Control.

[174]  Johnson P. Thomas,et al.  Security and QoS Self-Optimization in Mobile Ad Hoc Networks , 2008, IEEE Transactions on Mobile Computing.

[175]  Yonina C. Eldar,et al.  Introduction to the Issue on Convex Optimization Methods for Signal Processing , 2007, J. Sel. Topics Signal Processing.

[176]  Rajarathnam Chandramouli,et al.  Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks , 2007, IEEE Transactions on Dependable and Secure Computing.

[177]  Wei Yu,et al.  An introduction to convex optimization for communications and signal processing , 2006, IEEE Journal on Selected Areas in Communications.

[178]  Valérie Gay,et al.  Improving the SLA-Based Management of QoS for Secure Multimedia Services , 2005, MMNS.

[179]  Wenye Wang,et al.  Measuring performance impact of security protocols in wireless local area networks , 2005, 2nd International Conference on Broadband Networks, 2005..

[180]  David A. Wagner,et al.  Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.

[181]  Kazuo Tanaka,et al.  A multiple Lyapunov function approach to stabilization of fuzzy control systems , 2003, IEEE Trans. Fuzzy Syst..

[182]  Cynthia E. Irvine,et al.  Security as a dimension of quality of service in active service environments , 2001, Proceedings Third Annual International Workshop on Active Middleware Services.

[183]  Cynthia E. Irvine,et al.  Calculating costs for quality of security service , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[184]  W.-S. Lu,et al.  Semidefinite programming: a versatile tool for analysis and design of digital filters , 1999, Engineering Solutions for the Next Millennium. 1999 IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No.99TH8411).

[185]  Jongan Park,et al.  The improved data encryption standard (DES) algorithm , 1996, Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications.

[186]  Roy E. Marsten,et al.  The interior-point method for linear programming , 1992, IEEE Software.

[187]  Salimur Choudhury,et al.  A Resource Allocation Model Based on Trust Evaluation in Multi-Cloud Environments , 2021, IEEE Access.

[188]  Nei Kato,et al.  Survey on Machine Learning for Intelligent End-to-End Communication Toward 6G: From Network Access, Routing to Traffic Control and Streaming Adaption , 2021, IEEE Communications Surveys & Tutorials.

[189]  Ainuddin Wahid Abdul Wahab,et al.  Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges , 2021, IEEE Access.

[190]  Lorenzo Mucchi,et al.  Physical-Layer Security in 6G Networks , 2021, IEEE Open Journal of the Communications Society.

[191]  Nei Kato,et al.  Comprehensive Survey on Machine Learning in Vehicular Network: Technology, Applications and Challenges , 2021, IEEE Communications Surveys & Tutorials.

[192]  Nirwan Ansari,et al.  Leveraging Deep Reinforcement Learning for Traffic Engineering: A Survey , 2021, IEEE Communications Surveys & Tutorials.

[193]  Andrei Gurtov,et al.  The Roadmap to 6G Security and Privacy , 2021, IEEE Open Journal of the Communications Society.

[194]  Nguyen H. Tran,et al.  Network Slicing: Recent Advances, Taxonomy, Requirements, and Open Research Challenges , 2020, IEEE Access.

[195]  Dushantha Nalin K. Jayakody,et al.  A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions , 2020, IEEE Communications Surveys & Tutorials.

[196]  Furqan Jameel,et al.  A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security , 2019, IEEE Communications Surveys & Tutorials.

[197]  Haji M. Furqan,et al.  Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[198]  Tarik Taleb,et al.  A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems , 2019, IEEE Communications Surveys & Tutorials.

[199]  Li Wang,et al.  The Design of 3-DES Encryption System Using Optimizing Keys , 2019, 2019 China-Qatar International Workshop on Artificial Intelligence and Applications to Intelligent Manufacturing (AIAIM).

[200]  A. Dewilde,et al.  Enabling Practical Wireless Tb/s Communications with Next Generation Channel Coding , 2018 .

[201]  Jianli Chen,et al.  Lagrange Dual Method for Sparsity Constrained Optimization , 2018, IEEE Access.

[202]  Richard Demo Souza,et al.  Energy Efficiency of Repetition Coding and Parallel Coding Relaying Under Partial Secrecy Regime , 2016, IEEE Access.

[203]  Haibo Zhou,et al.  A QoE supportive distributed caching management for vehicular video streaming in cellular networks , 2014, 2014 IEEE/CIC International Conference on Communications in China (ICCC).

[204]  Zhenfu Cao,et al.  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .

[205]  Piming Ma,et al.  Convex analysis based beamforming of decode-and-forward cooperation for improving wireless physical layer security , 2012, 2012 14th International Conference on Advanced Communication Technology (ICACT).

[206]  Aboubaker Lasebae,et al.  Security and QoS integration for protecting service providers in hterogeneous environments , 2011 .

[207]  Aboubaker Lasebae,et al.  Enhancing naming and location services to support multi-homed devices in heterogeneous environments , 2011 .

[208]  Fiolitakis Antonios,et al.  Hardware Implementation of Triple-DES Encryption / Decryption Algorithm , 2006 .