Skip to content
Home » Blogposts » Page 3

Blogposts

A Framework for Global Trust and Reputation Management in 6G Networks

This paper examines how future 6G networks—expected to function as large-scale cyber-physical systems—will require more advanced trust and reputation management mechanisms than those used today. As autonomous vehicles, drones, robots, and other intelligent agents collaborate in real time, the accuracy… Read More »A Framework for Global Trust and Reputation Management in 6G Networks

Analysis of Challenge-Response Authentication With Reconfigurable Intelligent Surfaces

This paper examines how Reconfigurable Intelligent Surfaces (RIS) can be used to strengthen wireless challenge–response physical-layer authentication (CR-PLA). In CR-PLA, the receiver verifies a transmitter by sending a challenge and checking whether the resulting channel response matches the expected physical… Read More »Analysis of Challenge-Response Authentication With Reconfigurable Intelligent Surfaces

One-Class Classification as GLRT for Jamming Detection in Private 5G Networks

This paper explores a machine-learning approach for detecting jamming attacks in private 5G networks by framing the problem as one-class classification. Rather than relying on prior knowledge of attacker behavior, the authors aim to detect whether a received signal deviates… Read More »One-Class Classification as GLRT for Jamming Detection in Private 5G Networks

A Novel Method to Mitigate Adversarial Attacks Against AI-as-a-Service Functionality

This paper proposes a lightweight defense mechanism to protect AI models exposed through AI-as-a-Service (AIaaS) from black-box adversarial attacks. As future networks rely more on remotely accessed AI functions, models become vulnerable to malicious queries that subtly manipulate inputs and… Read More »A Novel Method to Mitigate Adversarial Attacks Against AI-as-a-Service Functionality

SHERPA: Explainable Robust Algorithms for Privacy-Preserved Federated Learning in Future Networks to Defend Against Data Poisoning Attacks

This paper presents SHERPA, an explainability-driven defense framework designed to protect Federated Learning (FL) systems from data poisoning attacks. FL allows distributed devices to collaboratively train a global model without sharing raw data, but this also opens the door for… Read More »SHERPA: Explainable Robust Algorithms for Privacy-Preserved Federated Learning in Future Networks to Defend Against Data Poisoning Attacks

Advancing Security for 6G Smart Networks and Services

This paper provides a concise overview of how security must evolve as we move toward 6G smart networks, where communication, sensing, and computing become tightly integrated. It highlights that future systems will rely heavily on distributed AI/ML, making the protection… Read More »Advancing Security for 6G Smart Networks and Services

ROBUST-6G: Smart, Automated, and Reliable Security Service Platform for 6G

This paper introduces ROBUST-6G, a European research initiative aimed at designing a comprehensive security platform for future 6G networks. As 6G moves toward deeply integrated digital: physical systems, the project focuses on building security mechanisms that are data-driven, automated, trustworthy,… Read More »ROBUST-6G: Smart, Automated, and Reliable Security Service Platform for 6G

Explainable AI for 6G Use Cases: Technical Aspects and Research Challenges

As wireless systems evolve toward 6G, AI becomes increasingly central to how networks operate, optimize themselves, and deliver advanced services. But with greater autonomy and complexity comes a critical requirement: the decisions made by AI models must be understandable, transparent,… Read More »Explainable AI for 6G Use Cases: Technical Aspects and Research Challenges

Secure Status Updates under Eavesdropping: Age of Information-based Secrecy Metrics

This paper introduces a new perspective on securing wireless status-update systems by combining physical-layer security with the concept of information freshness. Instead of relying on traditional secrecy metrics such as secrecy capacity or outage probability, the authors focus on Age… Read More »Secure Status Updates under Eavesdropping: Age of Information-based Secrecy Metrics