• Corpus ID: 245329406

Towards Intelligent Context-Aware 6G Security

  title={Towards Intelligent Context-Aware 6G Security},
  author={Andr{\'e} noll Barreto and Stefan K{\"o}psell and Arsenia Chorti and Bertram Poettering and Jens Jelitto and Julia Hesse and Jonathan Boole and Konrad Rieck and Marios Kountouris and Dave Singel{\'e}e and Kumar Shrestha Ashwinee},
Imagine interconnected objects with embedded artificial intelligence (AI), empowered to sense the environment, see it, hear it, touch it, interact with it, and move. As future networks of intelligent objects come to life, tremendous new challenges arise for security, but also new opportunities, allowing to address current, as well as future, pressing needs. In this paper we put forward a roadmap towards the realization of a new security paradigm that we articulate as intelligent context-aware… 

Figures and Tables from this paper

Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation
A power domain decomposition that allows performing the two tasks simultaneously RF fingerprinting-based authentication and key distillation and semantically secure secret key generation, using autoencoders is proposed.


Semantics-Empowered Communication for Networked Intelligent Systems
This work envisions a communication paradigm shift, which makes the semantics of information the foundation of the communication process, and shows significant reduction in both reconstruction error and cost of actuation error, as well as in the number of uninformative samples generated.
Convergent Communication, Sensing and Localization in 6G Systems: An Overview of Technologies, Opportunities and Challenges
6G will be truly intelligent wireless systems that will provide not only ubiquitous communication but also empower high accuracy localization and high-resolution sensing services, where localization and sensing will coexist with communication, continuously sharing the available resources in time, frequency, and space.
ivPair: context-based fast intra-vehicle device pairing for secure wireless connectivity
The emergence of advanced in-vehicle infotainment (IVI) systems, such as Apple CarPlay and Android Auto, calls for fast and intuitive device pairing mechanisms to discover newly introduced devices
Security as a dimension of quality of service in active service environments
It is illustrated that a security mechanism like IPsec can be modulated to provide levels of security that are in harmony with QoSS requests, and an approach through which security can be treated as a QoS dimension is demonstrated.
An Overview of Privacy in Machine Learning
Privacy challenges in this space are reviewed, providing a systematic review of the relevant research literature, and exploring possible countermeasures, including possible adversarial models and settings, and recent results attempting to defend against such attacks are reviewed.
GT-QoSec: A Game-Theoretic Joint Optimization of QoS and Security for Differentiated Services in Next Generation Heterogeneous Networks
This paper addresses the problem of joint consideration of QoS and security in the next-generation Heterogeneous Networks, and envisions GT-QoSec, a game-theoretic joint optimization of QSOS and security.
Quality-of-Protection (QoP): A Quantitative Methodology to Grade Security Services
  • Yan Lindsay Sun, Anup Kumar
  • Computer Science
    2008 The 28th International Conference on Distributed Computing Systems Workshops
  • 2008
A tree based quality of protection (QoP) evaluation method for cyber system is presented and it is demonstrated how the proposed methodology can assess QoP from a holistic view.
The Limitations of Deep Learning in Adversarial Settings
This work formalizes the space of adversaries against deep neural networks (DNNs) and introduces a novel class of algorithms to craft adversarial samples based on a precise understanding of the mapping between inputs and outputs of DNNs.
Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
Saber is introduced, a package of cryptographic primitives whose security relies on the hardness of the Module Learning With Rounding problem (Mod-LWR), and the design goals were simplicity, efficiency and flexibility.
Multimodal and Context-Aware Emotion Perception Model With Multiplicative Fusion
The approach combines multiple human co-occurring modalities and two interpretations of context and uses multiplicative fusion to combine the modality and context channels, which learn to focus on the more informative input channels and suppress others for every incoming datapoint.