2022
DOI: 10.1109/comst.2022.3191697
|View full text |Cite
|
Sign up to set email alerts
|

Balancing QoS and Security in the Edge: Existing Practices, Challenges, and 6G Opportunities With Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(5 citation statements)
references
References 200 publications
0
5
0
Order By: Relevance
“…Therefore, the design of the 6G network must not only address these emerging threats but also proactively anticipate and mitigate potential risks through adaptive and trust-oriented security measures [66]. Critical components of multi-level security in 6G networks may encompass diverse security measures, featuring adaptive authentication, authorization, and selective data encryption techniques [67]. This involves leveraging sustainable AI/ML algorithms for zero-touch security implementation [68], implementing energy-aware security policies, deploying distributed security measures with dynamic adjustments (e.g., moving target defence) [69], adopting zero-trust security models with fine-grained access control [70], and establishing hierarchical security architectures with security levels across a network of networks, incorporating edge-level security processing [71].…”
Section: ) Security and Privacymentioning
confidence: 99%
“…Therefore, the design of the 6G network must not only address these emerging threats but also proactively anticipate and mitigate potential risks through adaptive and trust-oriented security measures [66]. Critical components of multi-level security in 6G networks may encompass diverse security measures, featuring adaptive authentication, authorization, and selective data encryption techniques [67]. This involves leveraging sustainable AI/ML algorithms for zero-touch security implementation [68], implementing energy-aware security policies, deploying distributed security measures with dynamic adjustments (e.g., moving target defence) [69], adopting zero-trust security models with fine-grained access control [70], and establishing hierarchical security architectures with security levels across a network of networks, incorporating edge-level security processing [71].…”
Section: ) Security and Privacymentioning
confidence: 99%
“…The double Nakagami-m distribution extends the double Rayleigh distribution, which is included as a special case [26], by acting as a cascaded fading model. Additionally, a double Gamma distribution is followed by the square of a double Nakagamim distributed random variable, hk 2 . The density of this distribution can be expressed through a standard transformation of random variables as follows:…”
Section: Mmwave Channel Modelmentioning
confidence: 99%
“…The rapid proliferation of multimedia content and mobile edge computing necessitates effective content delivery and caching strategies. Integrating caching and NOMA techniques can enhance system performance and reduce latency in vehicular networks, thereby relieving pressure on backhaul links and improving overall network efficiency [2,3]. Although cache-aided NOMA holds the promise of improving spectral efficiency and QoS from a theoretical standpoint, its practical benefits in terms of managing sporadic network connectivity and reducing latency by serving frequently requested data locally are still underexplored.…”
Section: Introductionmentioning
confidence: 99%
“…Network planning and optimization are required for mobile network providers. There is the need to strike a balance between network operation, QoS, and radio coverage in various situations [9] The structure of radio refractive index, N, at the lower part of the atmosphere has helped in identifying the weather parameters likely to affect signal propagation and it is stated in Equation 1given as [10]…”
Section: Introductionmentioning
confidence: 99%