{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T13:56:54Z","timestamp":1774965414360,"version":"3.50.1"},"reference-count":179,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T00:00:00Z","timestamp":1646179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>After implementing 5G technology, academia and industry started researching 6th generation wireless network technology (6G). 6G is expected to be implemented around the year 2030. It will offer a significant experience for everyone by enabling hyper-connectivity between people and everything. In addition, it is expected to extend mobile communication possibilities where earlier generations could not have developed. Several potential technologies are predicted to serve as the foundation of 6G networks. These include upcoming and current technologies such as post-quantum cryptography, artificial intelligence (AI), machine learning (ML), enhanced edge computing, molecular communication, THz, visible light communication (VLC), and distributed ledger (DL) technologies such as blockchain. From a security and privacy perspective, these developments need a reconsideration of prior security traditional methods. New novel authentication, encryption, access control, communication, and malicious activity detection must satisfy the higher significant requirements of future networks. In addition, new security approaches are necessary to ensure trustworthiness and privacy. This paper provides insights into the critical problems and difficulties related to the security, privacy, and trust issues of 6G networks. Moreover, the standard technologies and security challenges per each technology are clarified. This paper introduces the 6G security architecture and improvements over the 5G architecture. We also introduce the security issues and challenges of the 6G physical layer. In addition, the AI\/ML layers and the proposed security solution in each layer are studied. The paper summarizes the security evolution in legacy mobile networks and concludes with their security problems and the most essential 6G application services and their security requirements. Finally, this paper provides a complete discussion of 6G networks\u2019 trustworthiness and solutions.<\/jats:p>","DOI":"10.3390\/s22051969","type":"journal-article","created":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T22:53:25Z","timestamp":1646261605000},"page":"1969","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":186,"title":["Security Requirements and Challenges of 6G Technologies and Applications"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8945-8664","authenticated-orcid":false,"given":"Shimaa A.","family":"Abdel Hakeem","sequence":"first","affiliation":[{"name":"School of Electronics Engineering, Chungbuk National University, Cheongju 28644, Korea"},{"name":"Electronics Research Institute (ERI), El Nozha, Cairo 12622, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3198-8587","authenticated-orcid":false,"given":"Hanan H.","family":"Hussein","sequence":"additional","affiliation":[{"name":"Electronics Research Institute (ERI), El Nozha, Cairo 12622, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2602-2075","authenticated-orcid":false,"given":"HyungWon","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering, Chungbuk National University, Cheongju 28644, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2022,3,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","article-title":"A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions","volume":"22","author":"Khan","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"121","DOI":"10.52953\/IKVY9186","article-title":"6G vision: An ultra-flexible perspective, ITU","volume":"1","author":"Yazar","year":"2020","journal-title":"J. Future Evol. Technol."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"836","DOI":"10.1109\/OJCOMS.2021.3071496","article-title":"Survey on 6G Frontiers: Trends, Applications, Requirements, Technologies and Future Research","volume":"2","author":"Alwis","year":"2021","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/MWC.001.2000384","article-title":"A Vision on 6G-Enabled NIB: Requirements, Technologies, Deployments, and Prospects","volume":"28","author":"Ray","year":"2021","journal-title":"IEEE Wirel. Commun."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/MWC.001.1900516","article-title":"6G: Opening new horizons for integration of comfort, security, and intelligence","volume":"27","author":"Gui","year":"2020","journal-title":"IEEE Wirel. Commun."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MCOM.2019.1900271","article-title":"The Roadmap to 6G: AI Empowered Wireless Networks","volume":"57","author":"Letaief","year":"2019","journal-title":"IEEE Commun. Mag."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/j.comcom.2020.07.035","article-title":"A taxonomy of AI techniques for 6G communication networks","volume":"161","author":"Sheth","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1109\/MNET.011.2000195","article-title":"Artificial-Intelligence-Enabled Intelligent 6G Networks","volume":"34","author":"Yang","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"175758","DOI":"10.1109\/ACCESS.2019.2957648","article-title":"A Survey on Green 6G Network: Architecture and Technologies","volume":"7","author":"Huang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2518","DOI":"10.1109\/COMST.2018.2820728","article-title":"On security research towards future mobile network generations","volume":"20","author":"Rupprecht","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_11","unstructured":"Pereira, V., and Sousa, T. (2004). Evolution of Mobile Communications: From 1G to 4G, Department of Informatics Engineering, University of Coimbra."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Goyal, J., Singla, K., and Singh, S. (2019). A Survey of Wireless Communication Technologies from 1G to 5G. Seond International Conference on Computer Networks and Inventive Communication Technologies, Springer.","DOI":"10.1007\/978-3-030-37051-0_69"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"106871","DOI":"10.1016\/j.comnet.2019.106871","article-title":"Towards secure 5G networks: A Survey","volume":"162","author":"Zhang","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/MWC.001.2000318","article-title":"Security and Privacy for Edge Intelligence in 5G and Beyond Networks: Challenges and Solutions","volume":"28","author":"Li","year":"2021","journal-title":"IEEE Wirel. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MWC.001.1900476","article-title":"Ten Challenges in Advancing Machine Learning Technologies toward 6G","volume":"27","author":"Kato","year":"2020","journal-title":"IEEE Wirel. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MNET.2017.1700006","article-title":"Toward the Evolution of Wireless Powered Communication Networks for the Future Internet of Things","volume":"31","author":"Ramezani","year":"2017","journal-title":"IEEE Netw."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1080\/13501760110056059","article-title":"The GSM Standard: Explaining a success story","volume":"8","author":"Pelkmans","year":"2001","journal-title":"J. Eur. Public Policy"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Cattaneo, G., Maio, G., Faruolo, P., and Petrillo, U.F. (2013). A review of security attacks on the gsm standard. Information and Communication Technology, Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-642-36818-9_58"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2231","DOI":"10.1007\/s11277-015-2344-z","article-title":"Enhanced secure mutual authentication and key AGREEMENT scheme preserving user anonymity in global mobile networks","volume":"82","author":"Gope","year":"2015","journal-title":"Wirel. Pers. Commun."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Brookson, C. (1994, January 3). Gsm security: A description of the reasons for security and the techniques. Proceedings of the IEE Colloquium on Security and Cryptography Applications to Radio Systems, London, UK.","DOI":"10.1049\/ic:19950131"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Arapinis, M., Mancini, L.I., Ritter, E., and Ryan, M. (2014, January 23\u201326). Privacy through pseudonymity in mobile telephony systems. Proceedings of the 2014 Network and Distributed System Security Symposium, San Diego, CA, USA.","DOI":"10.14722\/ndss.2014.23082"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"91","DOI":"10.7903\/cmr.653","article-title":"An investigation of third Generation (3g) mobile technologies and services","volume":"2","author":"Karjaluoto","year":"2007","journal-title":"Contemp. Manag. Res."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.1007\/s11277-014-1821-0","article-title":"Secure-aka: An efficient aka protocol for umts networks","volume":"78","author":"Saxena","year":"2014","journal-title":"Wirel. Pers. Commun."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Jefferies, N. (1995, January 3). Security in Third-Generation mobile systems. Proceedings of the IEE Colloquium on Security in Networks, London, UK.","DOI":"10.1049\/ic:19950136"},{"key":"ref_25","unstructured":"La Porta, T.F. (2005, January 17\u201319). Security and IP-based 3G wireless networks. Proceedings of the 14th International Conference on Computer Communications and Networks, San Diego, CA, USA."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MWC.2003.1224973","article-title":"(R)evolution toward 4G mobile communication systems","volume":"10","author":"Zahariadis","year":"2003","journal-title":"IEEE Wirel. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MSP.2012.136","article-title":"LTE\/SAE security issues on 4G wireless networks","volume":"11","author":"Bikos","year":"2013","journal-title":"IEEE Secur. Priv."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Park, Y., and Park, T. (2007, January 26\u201330). A survey of security threats on 4G networks. Proceedings of the 2007 IEEE Globecom Workshops, Washington, DC, USA.","DOI":"10.1109\/GLOCOMW.2007.4437813"},{"key":"ref_29","first-page":"11","article-title":"A literature review of security attack in mobile ad-hoc networks","volume":"9","author":"Goyal","year":"2010","journal-title":"Int. J. Comput. Appl."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"77","DOI":"10.17703\/IJACT.2015.3.2.77","article-title":"A Study of 4G Network for Security System","volume":"3","author":"Kim","year":"2015","journal-title":"Int. J. Adv. Cult. Technol."},{"key":"ref_31","first-page":"61","article-title":"Comprehensive survey of possible security issues on 4G networks","volume":"7","author":"Mohapatra","year":"2015","journal-title":"Int. J. Netw. Secur. Its Appl."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.phycom.2015.10.006","article-title":"A survey on 5G: The next generation of mobile communication","volume":"18","author":"Panwar","year":"2016","journal-title":"Phys. Commun."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"3619","DOI":"10.1109\/ACCESS.2017.2779844","article-title":"A survey on 5G networks for the internet of things: Communication technologies and challenges","volume":"6","author":"Akpakwu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/MCOM.2014.6736752","article-title":"Cellular architecture and key technologies for 5G wireless communication networks","volume":"52","author":"Wang","year":"2014","journal-title":"IEEE Commun. Mag."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MCOM.2014.6736744","article-title":"5G wireless communication Systems: Prospects and challenges","volume":"52","author":"Thompson","year":"2014","journal-title":"IEEE Commun. Mag."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Soldani, D., and Innocenti, M. (2019). 5G communication systems and Connected healthcare. Enabling 5G Communication Systems to Support Vertical Industries, Wiley.","DOI":"10.1002\/9781119515579.ch7"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1155\/2016\/5974586","article-title":"5G: Vision and requirements for mobile communication system towards year 2020","volume":"2016","author":"Liu","year":"2016","journal-title":"Chin. J. Eng."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Mahmoodi, T. (2015, January 17). 5G and Software-Defined Networking (SDN). Proceedings of the 5G Radio Technology Seminar. Exploring Technical Challenges in the Emerging 5G Ecosystem, London, UK.","DOI":"10.1049\/ic.2015.0034"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"49","DOI":"10.14445\/22312803\/IJCTT-V68I10P109","article-title":"A literature review of network function Virtualization (NFV) in 5G networks","volume":"68","author":"Sridharan","year":"2020","journal-title":"Int. J. Comput. Trends Technol."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"6015","DOI":"10.1007\/s11276-020-02419-8","article-title":"5G-V2X: Standardization, architecture, use cases, network-slicing, and edge-computing","volume":"26","author":"Hakeem","year":"2020","journal-title":"Wirel. Netw."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1007\/s11235-020-00704-7","article-title":"Current and future developments to improve 5G-newradio performance in Vehicle-to-everything communications","volume":"75","author":"Hakeem","year":"2020","journal-title":"Telecommun. Syst."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MWC.2020.9170261","article-title":"Challenges and novel solutions for 5G network security, privacy and trust","volume":"27","author":"Mazurczyk","year":"2020","journal-title":"IEEE Wirel. Commun."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/COMST.2020.2971781","article-title":"A survey on 5G usage scenarios and traffic models","volume":"22","author":"Sendra","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_44","unstructured":"(2021, August 10). Huawei 5G Security Assurance. Available online: https:\/\/www-file.huawei.com\/-\/media\/corporate\/pdf\/trust-center\/huawei-5G-security-white-paper4th.pdf?la=en."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"3098","DOI":"10.1109\/COMST.2018.2841349","article-title":"A survey on low latency towards 5G: Ran, core network and caching solutions","volume":"20","author":"Parvez","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Shaik, A., Borgaonkar, R., Asokan, N., Niemi, V., and Seifert, J. (2015). Practical attacks against privacy and availability in 4G\/LTE mobile communication systems. arXiv.","DOI":"10.14722\/ndss.2016.23236"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"24956","DOI":"10.1109\/ACCESS.2019.2899254","article-title":"Security and protocol exploit analysis of the 5G specifications","volume":"7","author":"Jover","year":"2019","journal-title":"IEEE Access"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., and Weippl, E. (2014, January 8\u201312). Imsi-catch me if you can: Imsi-catcher-catchers. Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC\u201914, New Orleans, LA, USA.","DOI":"10.1145\/2664243.2664272"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"4543","DOI":"10.1109\/ACCESS.2016.2601009","article-title":"Survey on threats and attacks on mobile networks","volume":"4","author":"Mavoungou","year":"2016","journal-title":"IEEE Access"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"3183","DOI":"10.1007\/s11276-019-02131-2","article-title":"Intensive Benchmarking of D2D communication over 5G cellular networks: Prototype, integrated features, challenges, and main applications","volume":"26","author":"Hussein","year":"2019","journal-title":"Wirel. Netw."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Hussain, S.R., Echeverria, M., Chowdhury, O., Li, N., and Bertino, E. (2019, January 24\u201327). Privacy attacks to the 4G and 5G cellular paging protocols using side channel information. Proceedings of the Network and Distributed Systems Security (NDSS) Symposium, San Diego, CA, USA.","DOI":"10.14722\/ndss.2019.23442"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/TNET.2008.925939","article-title":"Mitigating attacks on open functionality in sms-capable cellular networks","volume":"17","author":"Traynor","year":"2009","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"van den Broek, F., Verdult, R., and de Ruiter, J. (2015, January 12\u201316). Defeating imsi catchers. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver Colorado, CO, USA.","DOI":"10.1145\/2810103.2813615"},{"key":"ref_54","first-page":"7","article-title":"Comparative study on 4G\/LTE cryptographic algorithms based on different factors","volume":"5","author":"Sulaiman","year":"2014","journal-title":"Int. J. Comput. Sci. Telecommun."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.future.2020.04.013","article-title":"Defending network intrusion detection systems against adversarial evasion attacks","volume":"110","author":"Pawlicki","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/MNET.001.1900273","article-title":"ZSM security: Threat surface and best practices","volume":"34","author":"Benzaid","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_57","unstructured":"(2022, January 11). ETSI ISG ZSM, ETSI GS ZSM 002: ZSM Reference Architecture. Available online: https:\/\/www.etsi.org\/deliver\/etsigs\/ZSM\/001099\/002\/01.01.0160\/gsZSM002v010101p.pdf."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MCOM.001.1900411","article-title":"Toward 6g Networks: Use cases and technologies","volume":"58","author":"Giordani","year":"2020","journal-title":"IEEE Commun. Mag."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"160004","DOI":"10.1109\/ACCESS.2021.3130030","article-title":"6G Vision, Value, Use Cases and Technologies from European 6G Flagship Project Hexa-X","volume":"9","author":"Uusitalo","year":"2021","journal-title":"IEEE Access"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"107930","DOI":"10.1016\/j.comnet.2021.107930","article-title":"6G networks: Beyond Shannon towards semantic and goal-oriented communications","volume":"190","author":"Strinati","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_61","unstructured":"(2022, January 11). Wireless Environment as a Service Enabled by Reconfigurable Intelligent Surfaces: The RISE-6G Perspectiv. Available online: https:\/\/ieeexplore.ieee.org\/document\/9482474\/."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/MCOM.001.2100070","article-title":"Reconfigurable, Intelligent, and Sustainable Wireless Environments for 6G Smart Connectivity","volume":"59","author":"Strinati","year":"2021","journal-title":"IEEE Commun. Mag."},{"key":"ref_63","first-page":"1","article-title":"Smart radio environments empowered by reconfigurable AI meta-surfaces: An idea whose time has come","volume":"2019","author":"Debbah","year":"2019","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_64","unstructured":"Castro, C. (2022, January 11). 6G Gains Momentum with Initiatives Launched Across the World. 6GWorld, Available online: https:\/\/www.6gworld.com\/exclusives\/6g-gains-momentum-with-initiatives-launched-across-the-world\/."},{"key":"ref_65","unstructured":"(2021, October 14). Next G Alliance FAQ. ATIS. Available online: https:\/\/nextgalliance.org\/about\/."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Penttinen, J. (2021). On 6G Visions and Requirements. J. ICT Stand., 311\u2013326.","DOI":"10.13052\/jicts2245-800X.931"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/COMST.2016.2598968","article-title":"Physical layer security for next generation wireless networks: Theories, technologies, and challenges","volume":"19","author":"Liu","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_68","unstructured":"Jover, R.P. (2019). The current state of affairs in 5G security and the main remaining security challenges. arXiv."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1109\/OJCOMS.2021.3057679","article-title":"The road towards 6G: A comprehensive survey","volume":"2","author":"Jiang","year":"2021","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MVT.2019.2922512","article-title":"Defining 6G: Challenges and Opportunities [From the Guest Editors]","volume":"14","author":"David","year":"2019","journal-title":"IEEE Veh. Technol. Mag."},{"key":"ref_71","first-page":"3130","article-title":"An overview on evolution of mobile wireless communication networks: 1G\u20136G","volume":"3","author":"Gawas","year":"2015","journal-title":"Int. J. Recent Innov. Trends Comput. Commun."},{"key":"ref_72","first-page":"263","article-title":"Mimo-terahertz in 6G nano-communications: Channel Modeling and Analysis","volume":"66","author":"Bashir","year":"2020","journal-title":"Comput. Mater. Contin."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MCOM.001.2000310","article-title":"THz radio communication: Link budget analysis toward 6G","volume":"58","author":"Rikkinen","year":"2020","journal-title":"IEEE Commun. Mag."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1109\/MWC.001.1900333","article-title":"Vision, requirements, and technology trend of 6G: How to tackle the challenges of system coverage, capacity, user data-rate and movement speed","volume":"27","author":"Chen","year":"2020","journal-title":"IEEE Wirel. Commun."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Tarable, A., Malandrino, F., Dossi, L., Nebuloni, R., Virone, G., and Nordio, A. (2020, January 7\u201311). Meta-surface optimization in 6G sub-thz communications. Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops), Dublin, Ireland.","DOI":"10.1109\/ICCWorkshops49005.2020.9145267"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Singh, R., and Sicker, D. (2020). THz Communications\u2014A Boon and\/or Bane for Security, Privacy, and National Security. SSRN Electron. J., Available online: https:\/\/doi.org\/10.2139\/ssrn.3750493.","DOI":"10.2139\/ssrn.3750493"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1038\/s41586-018-0609-x","article-title":"Security and eavesdropping in terahertz wireless links","volume":"563","author":"Ma","year":"2018","journal-title":"Nature"},{"key":"ref_78","unstructured":"Petrov, V., Moltchanov, D., Jornet, J.M., and Koucheryavy, Y. (May, January 29). Exploiting multipath terahertz communications for physical layer security in beyond 5G networks. Proceedings of the IEEE INFOCOM Conference on Computer Communications Workshops (INFOCOM WKSHPS), Paris, France."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MVT.2019.2921162","article-title":"6G: The Next Frontier: From holographic messaging to artificial intelligence using subterahertz and visible light communication","volume":"14","author":"Strinati","year":"2019","journal-title":"IEEE Veh. Technol. Mag."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MCOMSTD.001.2000048","article-title":"3D network modeling for thz-enabled ultra-fast dense networks: A 6G perspective","volume":"5","author":"Huq","year":"2021","journal-title":"IEEE Commun. Stand. Mag."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.phycom.2014.01.006","article-title":"Terahertz band: Next Frontier for Wireless Communications","volume":"12","author":"Akyildiz","year":"2014","journal-title":"Phys. Commun."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Katz, M., and Ahmed, I. (2020, January 8\u201311). Opportunities and challenges for visible light communications in 6G. Proceedings of the 2020 2nd 6G Wireless Summit (6G SUMMIT), Porto, Portugal.","DOI":"10.1109\/6GSUMMIT49458.2020.9083805"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Ariyanti, S., and Suryanegara, M. (2020, January 27\u201328). Visible light communication (VLC) for 6G technology: The potency and research challenges. Proceedings of the 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK.","DOI":"10.1109\/WorldS450073.2020.9210383"},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"2871","DOI":"10.1109\/COMST.2017.2743228","article-title":"Indoor positioning systems based on visible light communication: State of the art","volume":"19","author":"Luo","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Basnayaka, D.A., and Haas, H. (2015, January 11\u201314). Hybrid RF and VLC systems: Improving user data rate performance of VLC systems. Proceedings of the 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), Glasgow, UK.","DOI":"10.1109\/VTCSpring.2015.7145863"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1016\/j.phycom.2019.04.003","article-title":"Security of Visible Light Communication Systems\u2014A survey","volume":"34","author":"Blinowski","year":"2019","journal-title":"Phys. Commun."},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Chen, C., Bian, R., and Haas, H. (2018, January 20\u201324). Omnidirectional transmitter and receiver design for wireless infrared uplink transmission in lifi. Proceedings of the 2018 IEEE International Conference on Communications Workshops (ICC Workshops), Kansas City, MO, USA.","DOI":"10.1109\/ICCW.2018.8403727"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Marin-Garcia, I., Guerra, V., and Perez-Jimenez, R. (2017). Study and validation of eavesdropping scenarios over a visible light communication channel. Sensors, 17.","DOI":"10.3390\/s17112687"},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1109\/TWC.2019.2944144","article-title":"Secrecy performance of the MIMO VLC wiretap channel with randomly located eavesdropper","volume":"19","author":"Arfaoui","year":"2020","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Soderi, S. (2020, January 17\u201320). Enhancing security in 6G visible light communications. Proceedings of the 2nd 6G Wireless Summit (6G SUMMIT), Levi, Finland.","DOI":"10.1109\/6GSUMMIT49458.2020.9083740"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"2047","DOI":"10.1109\/COMST.2015.2476474","article-title":"Visible light communication, networking, and sensing: A survey, potential and challenges","volume":"17","author":"Pathak","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Ucar, S., Ergen, S.C., Ozkasap, O., Tsonev, D., and Burchardt, H. (2016, January 13\u201317). Secvlc: Secure visible light communication for military vehicular networks. Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access, Malta, Malta.","DOI":"10.1145\/2989250.2989259"},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Mostafa, A., and Lampe, L. (2014, January 7\u201311). Physical-layer security for indoor visible light communications. Proceedings of the 2014 IEEE International Conference on Communications (ICC), Dublin, Ireland.","DOI":"10.1109\/ICC.2014.6883837"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"1442","DOI":"10.1109\/JPROC.2019.2917625","article-title":"Methods and applications of mobile molecular communication","volume":"107","author":"Nakano","year":"2019","journal-title":"Proc. IEEE"},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"2633","DOI":"10.1109\/TIFS.2019.2904440","article-title":"Enhancement of physical layer security with simultaneous beamforming and jamming for visible light communication systems","volume":"14","author":"Cho","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"1887","DOI":"10.1109\/COMST.2016.2527741","article-title":"A comprehensive survey of recent advancements in molecular communication","volume":"18","author":"Farsad","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"3991","DOI":"10.1109\/TCOMM.2015.2480752","article-title":"Comparison of channel coding schemes for Molecular Communications Systems","volume":"63","author":"Lu","year":"2015","journal-title":"IEEE Trans. Commun."},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TNB.2014.2349111","article-title":"Security and privacy in molecular communication and networking: Opportunities and challenges","volume":"13","author":"Loscri","year":"2014","journal-title":"IEEE Trans. Nano Biosci."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MVT.2019.2921398","article-title":"6G technologies: Key Drivers, core requirements, system architectures, and Enabling Technologies","volume":"14","author":"Zong","year":"2019","journal-title":"IEEE Veh. Technol. Mag."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1109\/MNET.011.2000493","article-title":"Non-Terrestrial networks in the 6g Era: Challenges and opportunities","volume":"35","author":"Giordani","year":"2021","journal-title":"IEEE Netw."},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"105","DOI":"10.23919\/JCC.2020.09.009","article-title":"Federated learning for 6G communications: Challenges, methods, and future directions","volume":"17","author":"Liu","year":"2020","journal-title":"China Commun."},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Wikstr\u00f6m, G., Peisa, J., Rugeland, P., Johansson, N., Parkvall, S., Girnyk, M., Mildh, G., and da Silva, I.L. (2020, January 8\u201311). Challenges and Technologies for 6G. Proceedings of the 2020 2nd 6G wireless summit (6G SUMMIT), Porto, Portugal.","DOI":"10.1109\/6GSUMMIT49458.2020.9083880"},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Plastiras, G., Terzi, M., Kyrkou, C., and Theocharidcs, T. (2018, January 10\u201312). Edge intelligence: Challenges and opportunities of near-sensor machine learning applications. Proceedings of the 2018 IEEE 29th International Conference on Application Specific Systems, Architectures and Processors (ASAP), Milan, Italy.","DOI":"10.1109\/ASAP.2018.8445118"},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"6249","DOI":"10.1109\/TVT.2021.3078803","article-title":"Physical layer security for miso noma vlc system under eavesdropper collusion","volume":"1","author":"Peng","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TGCN.2021.3057247","article-title":"AI as an Essential Element of a Green 6G","volume":"5","year":"2021","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Tang, F., Kawamoto, Y., Kato, N., and Liu, J. (2020). Future Intelligent and Secure Vehicular Network Toward 6G: Machine-Learning Approaches, IEEE.","DOI":"10.1109\/JPROC.2019.2954595"},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"107556","DOI":"10.1016\/j.comnet.2020.107556","article-title":"Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities","volume":"183","author":"Zhang","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MIC.2020.2987738","article-title":"6G vision: AN AI-DRIVEN decentralized network and service architecture","volume":"24","author":"Qiao","year":"2020","journal-title":"IEEE Internet Comput."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MVT.2019.2921208","article-title":"6G wireless networks: Vision, requirements, architecture, and key technologies","volume":"14","author":"Zhang","year":"2019","journal-title":"IEEE Veh. Technol. Mag."},{"key":"ref_110","unstructured":"Sattiraju, R., Weinand, A., and Schotten, H.D. (2019). Ai-assisted Phy Technologies for 6G and beyond Wireless Networks. arXiv."},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2019\/4870656","article-title":"Machine learning based antenna design for physical layer security in ambient backscatter communications","volume":"2019","author":"Hong","year":"2019","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"46317","DOI":"10.1109\/ACCESS.2019.2909490","article-title":"Quantum machine learning for 6G Communication NETWORKS: State-of-the-art and vision for the future","volume":"7","author":"Nawaz","year":"2019","journal-title":"IEEE Access"},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MNET.2018.1700442","article-title":"Robust mobile crowd sensing: When deep learning meets edge computing","volume":"32","author":"Zhou","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1038\/s41928-019-0355-6","article-title":"What should 6G be?","volume":"3","author":"Dang","year":"2020","journal-title":"Nat. Electron."},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MITP.2019.2963491","article-title":"Toward the 6G network era: Opportunities and challenges","volume":"22","author":"Tomkos","year":"2020","journal-title":"IT Prof."},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"164639","DOI":"10.1016\/j.ijleo.2020.164639","article-title":"Feasibility of quantum communications in aquatic scenarios","volume":"216","author":"Tarantino","year":"2020","journal-title":"Optik"},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1109\/COMST.2017.2786748","article-title":"A survey on quantum channel capacities","volume":"20","author":"Gyongyosi","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Partala, J. (2021). Post-quantum cryptography in 6G. Comput. Commun. Netw.","DOI":"10.1007\/978-3-030-72777-2_20"},{"key":"ref_119","first-page":"e16144","article-title":"Experimental quantum secure direct communication with single photons Light","volume":"5","author":"Hu","year":"2016","journal-title":"Sci. Appl."},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"220501","DOI":"10.1103\/PhysRevLett.118.220501","article-title":"Quantum secure direct communication with quantum memory","volume":"118","author":"Zhang","year":"2017","journal-title":"Phys. Rev. Lett."},{"key":"ref_121","doi-asserted-by":"crossref","first-page":"147029","DOI":"10.1109\/ACCESS.2020.3015289","article-title":"6G wireless systems: A vision, architectural elements, and Future Directions","volume":"8","author":"Khan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MNET.021.1900629","article-title":"Blockchain-based data security for artificial intelligence applications in 6G networks","volume":"34","author":"Li","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MCOM.001.2000175","article-title":"Blockchain-empowered framework for decentralized network management in 6G","volume":"58","author":"Maksymyuk","year":"2020","journal-title":"IEEE Commun. Mag."},{"key":"ref_124","unstructured":"Velliangiri, S., Manoharn, R., Ramachandran, S., and Rajasekar, V.R. (2021). Blockchain based privacy preserving framework for emerging 6G Wireless Communications. IEEE Transactions on Industrial Informatics, IEEE."},{"key":"ref_125","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1016\/j.dcan.2020.06.002","article-title":"Blockchain-enabled resource management and sharing for 6G communications","volume":"6","author":"Xu","year":"2020","journal-title":"Digit. Commun. Netw."},{"key":"ref_126","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Wang, M., Huang, J., Lin, S., and Lv, Z. (2021). Blockchain in Big Data Security for Intelligent Transportation with 6G. IEEE Transactions on Industrial Informatics, IEEE.","DOI":"10.1109\/TITS.2021.3107011"},{"key":"ref_127","doi-asserted-by":"crossref","first-page":"nwab069","DOI":"10.1093\/nsr\/nwab069","article-title":"Blockchain-enabled wireless communications: A new paradigm towards 6G","volume":"8","author":"Wang","year":"2021","journal-title":"Natl. Sci. Rev."},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"166959","DOI":"10.4108\/eai.11-11-2020.166959","article-title":"6G communication: Envisioning the key issues and challenges","volume":"6","author":"Nayak","year":"2021","journal-title":"EAI Endorsed Trans. Internet Things"},{"key":"ref_129","doi-asserted-by":"crossref","unstructured":"Bo\u017eani\u0107, M., and Sinha, S. (2021). Futuristic technological aspects of 6G networks. Lecture Notes in Electrical Engineering, Springer.","DOI":"10.1007\/978-3-030-69273-5_7"},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"9714","DOI":"10.1109\/ACCESS.2018.2890557","article-title":"Blockchain Radio Access Network (B-ran): Towards decentralized secure radio access paradigm","volume":"7","author":"Ling","year":"2019","journal-title":"IEEE Access"},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MVT.2017.2740458","article-title":"Secure blockchains for Dynamic Spectrum Access: A decentralized database in moving cognitive radio networks enhances security and User Access","volume":"13","author":"Kotobi","year":"2018","journal-title":"IEEE Veh. Technol. Mag."},{"key":"ref_132","doi-asserted-by":"crossref","unstructured":"Qiao, L., Dang, S., Shihada, B., Alouini, M.-S., Nowak, R., and Lv, Z. (2021). Can blockchain link the future?. Digit. Commun. Netw.","DOI":"10.1016\/j.dcan.2021.07.004"},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"62728","DOI":"10.1109\/ACCESS.2018.2876766","article-title":"Distributed Ledger Technology for smart cities, the sharing economy, and social compliance","volume":"6","author":"Ferraro","year":"2018","journal-title":"IEEE Access"},{"key":"ref_134","doi-asserted-by":"crossref","unstructured":"Pencheva, E., Atanasov, I., and Asenov, I. (2020, January 23\u201324). Toward network intellectualization in 6G. Proceedings of the 2020 XI National Conference with International Participation (Electronica), Sofia, Bulgaria.","DOI":"10.1109\/ELECTRONICA50406.2020.9305118"},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"790","DOI":"10.1109\/TR.2021.3062045","article-title":"Transfer learning promotes 6G wireless communications: Recent advances and future challenges","volume":"70","author":"Wang","year":"2021","journal-title":"IEEE Trans. Reliab."},{"key":"ref_136","first-page":"1","article-title":"UAV-supported clustered Noma for 6G-enabled internet of things: Trajectory planning and resource allocation","volume":"8","author":"Na","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_137","doi-asserted-by":"crossref","first-page":"2241","DOI":"10.1109\/JIOT.2018.2887086","article-title":"UAV Communications for 5G and beyond: Recent advances and future trends","volume":"6","author":"Li","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_138","doi-asserted-by":"crossref","unstructured":"Hooper, M., Tian, Y., Zhou, R., Cao, B., Lauf, A.P., Watkins, L., and Alexis, W. (2016, January 1\u20133). Securing commercial wifi-based uavs from common security attacks. Proceedings of the MILCOM 2016\u20132016 IEEE Military Communications Conference IEEE, Baltimore, MD, USA.","DOI":"10.1109\/MILCOM.2016.7795496"},{"key":"ref_139","doi-asserted-by":"crossref","first-page":"3417","DOI":"10.1109\/COMST.2019.2906228","article-title":"Survey on UAV cellular communications: Practical aspects, standardization advancements, regulation and security challenges","volume":"21","author":"Fotouhi","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_140","doi-asserted-by":"crossref","first-page":"91119","DOI":"10.1109\/ACCESS.2021.3092039","article-title":"6G enabled Unmanned Aerial Vehicle Traffic Management: A perspective","volume":"9","author":"Shrestha","year":"2021","journal-title":"IEEE Access"},{"key":"ref_141","doi-asserted-by":"crossref","unstructured":"Stoynov, V., Ivanov, A., and Mihaylova, D. (2021, January 26\u201329). Conceptual Framework for Quality Assessment in human-centric 6G XR services. Proceedings of the IOP Conference Series: Materials Science and Engineering, Borovets, Bulgaria.","DOI":"10.1088\/1757-899X\/1032\/1\/012009"},{"key":"ref_142","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MNET.2018.8329617","article-title":"5G for ultra-reliable low-latency communications","volume":"32","author":"Soldani","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_143","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MWC.001.1900051","article-title":"Physical layer security for ultra-reliable and low-latency communications","volume":"26","author":"Chen","year":"2019","journal-title":"IEEE Wirel. Commun."},{"key":"ref_144","doi-asserted-by":"crossref","first-page":"25863","DOI":"10.1109\/ACCESS.2017.2768558","article-title":"OFDM-subcarrier index selection for Enhancing Security and Reliability of 5G URLLC services","volume":"5","author":"Hamamreh","year":"2017","journal-title":"IEEE Access"},{"key":"ref_145","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MVT.2019.2919279","article-title":"The D-OMA method for massive multiple access in 6G: Performance, security, and challenges","volume":"14","author":"Hossain","year":"2019","journal-title":"IEEE Veh. Technol. Mag."},{"key":"ref_146","unstructured":"Mahmood, N.H., B\u00f6cker, S., Munari, A., Clazzer, F., Moerman, I., Mikhaylov, K., Lopez, O., Park, O.S., Mercier, E., and Bartz, H. (2020). White paper on critical and massive machine type communication towards 6G. arXiv."},{"key":"ref_147","doi-asserted-by":"crossref","unstructured":"Yamakami, T. (2020). A privacy threat model in xr applications. International Conference on Emerging Internetworking, Data & Web Technologies, Springer.","DOI":"10.1007\/978-3-030-39746-3_40"},{"key":"ref_148","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/MNET.2018.1700230","article-title":"Professional Live Audio Production: A highly synchronized use case for 5G Urllc Systems","volume":"32","author":"Pilz","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_149","doi-asserted-by":"crossref","unstructured":"Jamwal, A., Agrawal, R., Sharma, M., and Giallanza, A. (2021). Industry 4.0 technologies for manufacturing sustainability: A systematic review and Future Research Directions. Appl. Sci., 11.","DOI":"10.3390\/app11125725"},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MWC.2018.1800155","article-title":"Machine learning for wireless connectivity and security of cellular-connected uavs","volume":"26","author":"Challita","year":"2019","journal-title":"IEEE Wirel. Commun."},{"key":"ref_151","doi-asserted-by":"crossref","unstructured":"Sanjab, A., Saad, W., and Ba\u015far, T. (2017, January 21\u201325). Prospect theory for enhanced cyber-physical security of drone delivery systems: A network interdiction game. Proceedings of the 2017 IEEE International Conference on Communications (ICC) IEEE, Paris, France.","DOI":"10.1109\/ICC.2017.7996862"},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"35851","DOI":"10.1109\/ACCESS.2019.2904856","article-title":"Physical layer security in millimeter wave SWIPT UAV-based Relay Networks","volume":"7","author":"Sun","year":"2019","journal-title":"IEEE Access"},{"key":"ref_153","doi-asserted-by":"crossref","first-page":"3933","DOI":"10.1109\/TVT.2019.2897509","article-title":"UDIPP: A framework for differential privacy preserving movements of unmanned aerial vehicles in Smart Cities","volume":"68","author":"Kim","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_154","doi-asserted-by":"crossref","first-page":"3854","DOI":"10.1109\/TVT.2019.2895834","article-title":"Efficient and privacy-preserving truth discovery in mobile crowd sensing systems","volume":"68","author":"Xu","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_155","doi-asserted-by":"crossref","first-page":"2893","DOI":"10.1109\/TVT.2019.2894720","article-title":"Toward privacy-preserving valet parking in autonomous driving era","volume":"68","author":"Ni","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_156","unstructured":"Ding, Y., Chen, C., Zhang, S., Guo, B., Yu, Z., and Wang, Y. (2017, January 13\u201317). Greenplanner: Planning personalized fuel-efficient driving routes using multi-sourced urban data. Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom), Kona, HI, USA."},{"key":"ref_157","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1109\/COMST.2018.2888904","article-title":"Networking and communications in Autonomous Driving: A Survey","volume":"21","author":"Wang","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_158","doi-asserted-by":"crossref","unstructured":"Hakeem, S.A., and Kim, H.W. (2021). Multi-zone authentication and privacy-preserving protocol (MAPP) based on the bilinear pairing cryptography for 5G-V2X. Sensors, 21.","DOI":"10.3390\/s21020665"},{"key":"ref_159","doi-asserted-by":"crossref","unstructured":"Hakeem, S.A., El-Kader, S.M., and Kim, H.W. (2021). A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks. Sensors, 21.","DOI":"10.3390\/s21175838"},{"key":"ref_160","doi-asserted-by":"crossref","first-page":"119689","DOI":"10.1109\/ACCESS.2019.2937182","article-title":"A decentralized lightweight authentication and privacy protocol for vehicular networks","volume":"7","author":"Hakeem","year":"2019","journal-title":"IEEE Access"},{"key":"ref_161","doi-asserted-by":"crossref","unstructured":"Hakeem, S.A., El-Gawad, M.A.A., and Kim, H.W. (2020). Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography. Sensors, 20.","DOI":"10.3390\/s20195719"},{"key":"ref_162","unstructured":"Hakeem, S.A., Hady, A.A., and Kim, H.W. (2021). Optimizing 5G in V2X communications: Technologies, requirements, challenges, and standards. Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society, IGI Global."},{"key":"ref_163","doi-asserted-by":"crossref","unstructured":"Hakeem, S.A., and Kim, H.W. (2022). Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication. Sensors, 22.","DOI":"10.3390\/s22010331"},{"key":"ref_164","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.repl.2019.04.001","article-title":"Progression to the next Industrial Revolution: Industry 4.0 for Composites","volume":"63","author":"Snudden","year":"2019","journal-title":"Reinf. Plast."},{"key":"ref_165","doi-asserted-by":"crossref","unstructured":"Nahavandi, S. (2019). Industry 5.0\u2014A human-centric solution. Sustainability, 11.","DOI":"10.3390\/su11164371"},{"key":"ref_166","doi-asserted-by":"crossref","first-page":"107367","DOI":"10.1016\/j.epsr.2021.107367","article-title":"Smart Grid Evolution and mobile communications\u2014scenarios on the Finnish Power Grid","volume":"199","author":"Borenius","year":"2021","journal-title":"Electr. Power Syst. Res."},{"key":"ref_167","doi-asserted-by":"crossref","first-page":"5468","DOI":"10.1109\/JIOT.2020.3042090","article-title":"Vulnerability assessment of 6G-enabled Smart grid cyber\u2013physical systems","volume":"8","author":"Tariq","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_168","doi-asserted-by":"crossref","first-page":"174049","DOI":"10.1109\/ACCESS.2020.3025235","article-title":"Control Networks and smart grid teleprotection: Key aspects, technologies, protocols, and case-studies","volume":"8","author":"Santos","year":"2020","journal-title":"IEEE Access"},{"key":"ref_169","doi-asserted-by":"crossref","first-page":"995","DOI":"10.3390\/electronics4040995","article-title":"Runtime-monitoring for Industrial Control Systems","volume":"4","author":"Janicke","year":"2015","journal-title":"Electronics"},{"key":"ref_170","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/MCOM.001.2000050","article-title":"Explainable artificial intelligence for 6G: Improving trust between human and Machine","volume":"58","author":"Guo","year":"2020","journal-title":"IEEE Commun. Mag."},{"key":"ref_171","doi-asserted-by":"crossref","unstructured":"Lu, Y., Maharjan, S., and Zhang, Y. (2021). Adaptive Edge Association for Wireless Digital Twin Networks in 6G. IEEE Internet Things J., 1.","DOI":"10.1109\/JIOT.2021.3098508"},{"key":"ref_172","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1080\/2326263X.2017.1297192","article-title":"Riemannian geometry for EEG-based brain-computer interfaces; A Primer and a Review","volume":"4","author":"Congedo","year":"2017","journal-title":"Brain-Comput. Interfaces"},{"key":"ref_173","doi-asserted-by":"crossref","first-page":"E6058","DOI":"10.1073\/pnas.1508080112","article-title":"High-speed spelling with a noninvasive brain\u2013computer interface","volume":"112","author":"Chen","year":"2015","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_174","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s12152-013-9188-6","article-title":"Ethical challenges associated with the development and deployment of Brain Computer Interface Technology","volume":"7","author":"McCullagh","year":"2013","journal-title":"Neuroethics"},{"key":"ref_175","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.neucom.2016.10.024","article-title":"Brain Computer Interface: Control Signals Review","volume":"223","author":"Ramadan","year":"2017","journal-title":"Neurocomputing"},{"key":"ref_176","unstructured":"\u0160vogor, I., and Ki\u0161asondi, T. (2012, January 25\u201328). Two factor authentication using EEG augmented passwords. Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces, Cavtat, Croatia."},{"key":"ref_177","first-page":"249","article-title":"Enhancement of multi-modal biometric authentication based on iris and brain neuro image coding","volume":"5","author":"Arthikeyan","year":"2011","journal-title":"Int. J. Biom. Bioinform. (IJBB)"},{"key":"ref_178","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","article-title":"A survey on the security of Blockchain Systems","volume":"107","author":"Li","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_179","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MNET.2019.1800376","article-title":"Blockchain and deep reinforcement learning empowered intelligent 5G beyond","volume":"33","author":"Dai","year":"2019","journal-title":"IEEE Netw."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/5\/1969\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:30:58Z","timestamp":1760135458000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/5\/1969"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,2]]},"references-count":179,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2022,3]]}},"alternative-id":["s22051969"],"URL":"https:\/\/doi.org\/10.3390\/s22051969","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,2]]}}}