Skip to main content
Vai all'homepage della Commissione europea (si apre in una nuova finestra)
italiano it
CORDIS - Risultati della ricerca dell’UE
CORDIS

SmaRt, AutOmated, and ReliaBle SecUrity Service PlaTform for 6G

CORDIS fornisce collegamenti ai risultati finali pubblici e alle pubblicazioni dei progetti ORIZZONTE.

I link ai risultati e alle pubblicazioni dei progetti del 7° PQ, così come i link ad alcuni tipi di risultati specifici come dataset e software, sono recuperati dinamicamente da .OpenAIRE .

Risultati finali

Security Automation for 6G (si apre in una nuova finestra)

The document provides a report on the state of the art to identify the current mechanisms available to enable Zero-touch automation and how to use it to implement the concept of Security-as-a-Service (SaaS). Functional design ROBUST-6G security management mechanism with focus on security orchestration, flexible monitoring, and threat detection and notification. Available early implementation of the modules and interfaces with physical layer and AI/ML services will be also reported.

Use Cases, Requirements, ROBUST-6G Initial Architecture and Initial ROBUST-6G Dataspace (si apre in una nuova finestra)

A document detailing the use cases proposed in the scope of the project, along with their technical and business requirements, and the initial release of the ROBUST-6G architecture and the ROBUST-6G dataspace, aligned with the availability of the dataspace software. The document will feed WP6 with definition of use cases and will provide requirements for the implementation of cyber threat capabilities in WP3, WP4, and WP5.

6G Threat Analysis Report (si apre in una nuova finestra)

A document that will include: i) a review on the state of the art on existing solutions for threat detection and protection; and ii) an analysis of the characterization of security threats tin 6G networks. This document will serve as basis for the design of cyber threat capabilities implemented in WP3, WP4, and WP5.

Threat Assessment and Prevention Report (si apre in una nuova finestra)

The assessment of the threats presented in D2.1, specifically related to the AI-security threats, will be assessed in this deliverable, and AI-driven 6G security solutions and their prevention mechanisms will be presented aligning with the presented assessment.

Pubblicazioni

Beyond Post-Hoc: A SHAP-Based Feature Selection Framework for High-Accuracy, Class-Aware Intrusion Detection

Autori: Farah Abed Zadeh, Bartlomiej Siniarski, Shen Wang, Madhusanka Liyanage
Editore: IEEE

A Comparative Study of DDoS Attack Detection in Traditional Networks and SDN Using Time and Frequency Domain Features (si apre in una nuova finestra)

Autori: Esra Aksoy, Ramin Fadaei Fouladi, Behçet Uğur Töreyin
Pubblicato in: 2025 Innovations in Intelligent Systems and Applications Conference (ASYU), 2025
Editore: IEEE
DOI: 10.1109/ASYU67174.2025.11208349

Version Age-Based Client Scheduling Policy for Federated Learning (si apre in una nuova finestra)

Autori: Xinyi Hu, Nikolaos Pappas, Howard H. Yang
Pubblicato in: 2024 IEEE International Conference on Acoustics, Speech, and Signal Processing Workshops (ICASSPW), 2024
Editore: IEEE
DOI: 10.1109/ICASSPW62465.2024.10626990

MLN' 24

Autori: Bac Trinh-Nguyen, Sara Berri, Sin G. Teo, Tram Truong-Huu, Arsenia Chorti
Pubblicato in: Lecture Notes in Computer Science (LNCS), 2024
Editore: Springer

Physical Layer Authentication Using Information Reconciliation (si apre in una nuova finestra)

Autori: Atsu Kokuvi Angélo Passah, Rodrigo C. De Lamare, Arsenia Chorti
Pubblicato in: 2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring), 2024
Editore: IEEE
DOI: 10.1109/VTC2024-Spring62846.2024.10683567

A Novel Method to Mitigate Adversarial Attacks Against AI-as-a-Service Functionality (si apre in una nuova finestra)

Autori: Ömer Faruk Tuna, Leyli Karaçay, Utku Gülen
Pubblicato in: 2024 IEEE Middle East Conference on Communications and Networking (MECOM), 2024
Editore: IEEE
DOI: 10.1109/MECOM61498.2024.10880963

ROBUST-6G: Smart, Automated, and Reliable Security Service Platform for 6G (si apre in una nuova finestra)

Autori: Bartlomiej Siniarski, Chamara Sandeepa, Shen Wang, Madhusaska Liyanage, Cem Ayyildiz, Veli Can Yildirim, Hakan Alakoca, Fatma Günes Kesik, Betül Güvenç Paltun, Giovanni Perin, Michele Rossi, Stefano Tomasin, Arsenia Chorti, Pietro G. Giardina, Alberto García Pércz, José María Jorquera Valero, Tommy Svensson, Nikolaos Pappas, Marios Kountouris
Pubblicato in: 2024 Fifteenth International Conference on Ubiquitous and Future Networks (ICUFN), 2024
Editore: IEEE
DOI: 10.1109/ICUFN61752.2024.10624832

Secret Key Generation Rates for Line of Sight Multipath Channels in the Prescence of Eavesdroppers (si apre in una nuova finestra)

Autori: Amitha Mayya, Arsenia Chorti, Rafael F. Schaefer, Gerhard P. Fettweis
Pubblicato in: 27th InternationalWorkshop on Smart Antennas, 2024
Editore: IEEE
DOI: 10.48550/ARXIV.2404.16481

Security Analysis of RIS-Assisted Physical-Layer Authentication Over Multipath Channels

Autori: Linda Senigagliesi, Anna V. Guglielmi, Marco Baldi, and Stefano Tomasin
Editore: IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS2025)

SHERPA: Explainable Robust Algorithms for Privacy-Preserved Federated Learning in Future Networks to Defend Against Data Poisoning Attacks (si apre in una nuova finestra)

Autori: Chamara Sandeepa, Bartlomiej Siniarski, Shen Wang, Madhusanka Liyanage
Pubblicato in: 2024 IEEE Symposium on Security and Privacy (SP), 2024
Editore: IEEE
DOI: 10.1109/SP54263.2024.00271

Physical-Layer Challenge-Response Authentication with IRS and Single-Antenna Devices (si apre in una nuova finestra)

Autori: Anna V. Guglielmi, Laura Crosara, Stefano Tomasin, Nicola Laurenti
Pubblicato in: 2024 IEEE International Conference on Communications Workshops (ICC Workshops), 2024
Editore: IEEE
DOI: 10.1109/ICCWorkshops59551.2024.10615677

A Framework for Global Trust and Reputation Management in 6G Networks (si apre in una nuova finestra)

Autori: Bac Trinh-Nguyen, Sara Berri, Sin G. Teo, Tram Truong-Huu, Arsenia Chorti
Pubblicato in: Lecture Notes in Computer Science, Machine Learning for Networking, 2025
Editore: Springer Nature Switzerland
DOI: 10.1007/978-3-032-00552-6_4

Divergence-Minimizing Attack Against Challenge-Response Authentication with IRSs (si apre in una nuova finestra)

Autori: Laura Crosara, Anna V. Guglielmi, Nicola Laurenti, Stefano Tomasin
Pubblicato in: 2024 IEEE International Conference on Communications Workshops (ICC Workshops), 2024
Editore: IEEE
DOI: 10.1109/ICCWorkshops59551.2024.10615572

Decentralized LLM Inference over Edge Networks with Energy Harvesting (si apre in una nuova finestra)

Autori: Khoshsirat, Aria; Perin, Giovanni; Rossi, Michele
Pubblicato in: 2024
Editore: IEEE
DOI: 10.5281/ZENODO.13384764

Image-Based Frequency-Domain Analysis for Robust DDoS Detection in SDN (si apre in una nuova finestra)

Autori: Ramin Fuladi, Bilal Cicek
Pubblicato in: 2025 IEEE 11th International Conference on Network Softwarization (NetSoft), 2025
Editore: IEEE
DOI: 10.1109/NETSOFT64993.2025.11080612

S-VOTE: Similarity-based Voting for Client Selection in Decentralized Federated Learning

Autori: Pedro Miguel Sánchez Sánchez, Enrique Tomás Martínez Beltrán, Chao Feng, Gérôme Bovet, Gregorio Martínez Pérez, Alberto Huertas Celdrán
Editore: International Joint Conference on Neural Networks (IJCNN)

A Novel Method to Mitigate Adversarial Attacks Against AI-as-a-Service Functionality (si apre in una nuova finestra)

Autori: Tuna, Ömer Faruk; Karaçay, Leyli; Gülen, Utku
Pubblicato in: 2024 IEEE Middle East Conference on Communications and Networking (MECOM), 2024
DOI: 10.1109/MECOM61498.2024.10880963

Secure Status Updates under Eavesdropping: Age of Information-based Secrecy Metrics (si apre in una nuova finestra)

Autori: Qian Wang, He Chen, Parthajit Mohapatra, Nikolaos Pappas
Pubblicato in: IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2024
Editore: IEEE
DOI: 10.1109/INFOCOMWKSHPS61880.2024.10620867

From Insight to Action: XAI-Enhanced Detection of DDoS Attacks in Software Defined Networks (si apre in una nuova finestra)

Autori: Thulitha Senevirathna, Betül Güvenç Paltun, Ramin Fuladi, Shen Wang, Madhusanka Liyanage
Pubblicato in: 2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2025
Editore: IEEE
DOI: 10.1109/PIMRC62392.2025.11274964

Radio Frequency Fingerprint-Based Classification Performance Analysis with ML Models in the Presence of Hardware Impairments (si apre in una nuova finestra)

Autori: Melike Akbulut, Bilal Çiçek, Ramin Fuladi
Pubblicato in: 2025 33rd Signal Processing and Communications Applications Conference (SIU), 2025
Editore: IEEE
DOI: 10.1109/SIU66497.2025.11111857

Advancing Security for 6G Smart Networks and Services (si apre in una nuova finestra)

Autori: Madhusanka Liyanage, Pawani Porambage, Engin Zeydan, Thulitha Senavirathne, Yushan Siriwardhana, Awaneesh Kumar Yadav, Bartlomiej Siniarski
Pubblicato in: 2024 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 2024
Editore: IEEE
DOI: 10.1109/EuCNC/6GSummit60053.2024.10597131

Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones (si apre in una nuova finestra)

Autori: Francesco Ardizzon, Damiano Salvaterra, Mattia Piana, and Stefano Tomasin
Pubblicato in: 2024
Editore: IEEE
DOI: 10.48550/ARXIV.2410.00785

An Enhanced AI-driven Beam Selection Method for D-MIMO (si apre in una nuova finestra)

Autori: Bilal Çiçek, Ömer Faruk Tuna, Ömer Haliloğlu, Ramin Fuladi
Pubblicato in: 2025 33rd Signal Processing and Communications Applications Conference (SIU), 2025
Editore: IEEE
DOI: 10.1109/SIU66497.2025.11111812

Aprendizaje Federado Descentralizado y Conciencia Situacional para el Reconocimiento Aéreo Militar Seguro y Resiliente

Autori: Enrique Tomás Martínez Beltrán, Miguel Fernández Llamas, Anas Zine Boujemaoui, Gérôme Bovet, Gregorio Martínez Pérez, Alberto Huertas Celdrán
Editore: X Cybersecurity Research National Conference (JNIC)

Secret Key Generation on Aerial Rician Fading Channels Against a Curious Receiver

Autori: Mattia Piana, Stefano Tomasin
Editore: 2025 IEEE 26th International Workshop on Signal Processing and Artificial Intelligence for Wireless Communications (SPAWC)

A Latent Space Metric for Enhancing Prediction Confidence in Earth Observation Data (si apre in una nuova finestra)

Autori: I. Pitsiorlas, A. Tsantalidou, G. Arvanitakis, M. Kountouris, Ch. Kontoes
Pubblicato in: IGARSS 2024 - 2024 IEEE International Geoscience and Remote Sensing Symposium, 2024
Editore: IEEE
DOI: 10.1109/IGARSS53475.2024.10641865

A Generalized Multi-Layer IDS for Smart Buildings (si apre in una nuova finestra)

Autori: Marco Ruta, Pietro Giuseppe Giardina, Giada Landi, Rosario G. Garroppo
Pubblicato in: 2024 IEEE 29th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2025
Editore: IEEE
DOI: 10.1109/CAMAD62243.2024.10942818

Minimizing the Age of Missed and False Alarms in Remote Estimation of Markov Sources (si apre in una nuova finestra)

Autori: Jiping Luo and Nikolaos Pappas
Pubblicato in: MOBIHOC '24: Proceedings of the Twenty-fifth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, 2024
Editore: ACM
DOI: 10.1145/3641512.3690161

One-Class Classification as GLRT for Jamming Detection in Private 5G Networks (si apre in una nuova finestra)

Autori: Matteo Varotto, Stefan Valentin, Francesco Ardizzon, Samuele Marzotto, Stefano Tomasin
Pubblicato in: 2024 IEEE 25th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2024
Editore: IEEE
DOI: 10.1109/SPAWC60668.2024.10694335

Detecting 5G Signal Jammers Using Spectrograms with Supervised and Unsupervised Learning (si apre in una nuova finestra)

Autori: Matteo Varotto, Stefan Valentin, Stefano Tomasin
Pubblicato in: 2024 IEEE International Conference on Communications Workshops (ICC Workshops), 2024
Editore: IEEE
DOI: 10.1109/ICCWorkshops59551.2024.10615325

Divergence-Minimizing Attack Against Challenge-Response Authentication with IRSs (si apre in una nuova finestra)

Autori: Laura Crosara, Anna V. Guglielmi, Nicola Laurenti, Stefano Tomasin
Pubblicato in: 2024 IEEE International Conference on Communications Workshops (ICC Workshops), 2024
Editore: IEEE
DOI: 10.1109/ICCWORKSHOPS59551.2024.10615572

Enhanced Multiuser CSI-Based Physical Layer Authentication Based on Information Reconciliation (si apre in una nuova finestra)

Autori: Atsu Kokuvi Angélo Passah; Arsenia Chorti; Rodrigo C. de Lamare
Pubblicato in: IEEE Wireless Communications Letters, 2024, ISSN 2162-2345
Editore: IEEE
DOI: 10.1109/LWC.2024.3515840

A Survey on XAI for 5G and Beyond Security: Technical Aspects, Challenges and Research Directions (si apre in una nuova finestra)

Autori: Thulitha Senevirathna, Vinh Hoa La, Samuel Marchal, Bartlomiej Siniarski, Madhusanka Liyanage, Shen Wang
Pubblicato in: IEEE Communications Surveys & Tutorials, 2024, ISSN 1553-877X
Editore: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/COMST.2024.3437248

Federated Learning for 6G Networks: Navigating Privacy Benefits and Challenges (si apre in una nuova finestra)

Autori: Chamara Sandeepa; Engin Zeydan; Tharaka Samarasinghe; Madhusanka Liyanage
Pubblicato in: IEEE Open Journal of the Communications Society, 2025, ISSN 2644-125X
Editore: IEEE
DOI: 10.1109/OJCOMS.2024.3513832

WHACK: Adversarial Beamforming in MU-MIMO Through Compressed Feedback Poisoning (si apre in una nuova finestra)

Autori: Francesca Meneghello 0001; Francesco Restuccia 0001; Michele Rossi
Pubblicato in: IEEE Transactions on Wireless Communications, 2024, ISSN 1558-2248
Editore: IEEE
DOI: 10.1109/TWC.2024.3452438

Trustworthy AI and Federated Learning for Intrusion Detection in 6G-Connected Smart Buildings (si apre in una nuova finestra)

Autori: Rosario G. Garroppo; Pietro Giuseppe Giardina; Giada Landi; Marco Ruta
Pubblicato in: Future Internet, 2025, ISSN 1999-5903
Editore: MDPI
DOI: 10.3390/FI17050191

Detecting 5G Signal Jammers Using Spectrograms with Supervised and Unsupervised Learning (si apre in una nuova finestra)

Autori: Varotto, Matteo; Valentin, Stefan; Tomasin, Stefano
Pubblicato in: 2024 IEEE International Conference on Communications Workshops (ICC Workshops), 2024, ISSN 2164-7038
Editore: Cornell University
DOI: 10.48550/ARXIV.2405.10331

Decentralized LLM Inference over Edge Networks with Energy Harvesting (si apre in una nuova finestra)

Autori: Khoshsirat, Aria; Perin, Giovanni; Rossi, Michele
Pubblicato in: GLOBECOM 2024 - 2024 IEEE Global Communications Conference, 2024, ISSN 2576-6813
Editore: ZENODO
DOI: 10.5281/ZENODO.13384764

One-Class Classification as GLRT for Jamming Detection in Private 5G Networks (si apre in una nuova finestra)

Autori: Varotto, Matteo; Valentin, Stefan; Ardizzon, Francesco; Marzotto, Samuele; Tomasin, Stefano
Pubblicato in: 2024 IEEE 25th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2024, ISSN 1948-3252
Editore: CORNELL UNIVERSITY
DOI: 10.48550/ARXIV.2405.09565

Physical Layer-Based Device Fingerprinting for Wireless Security: From Theory to Practice (si apre in una nuova finestra)

Autori: Junqing Zhang, Francesco Ardizzon, Mattia Piana, Guanxiong Shen, Stefano Tomasin
Pubblicato in: IEEE Transactions on Information Forensics and Security, Numero 20, 2025, ISSN 1556-6013
Editore: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/TIFS.2025.3570118

DRACO: Decentralized Asynchronous Federated Learning Over Row-Stochastic Wireless Networks (si apre in una nuova finestra)

Autori: Eunjeong Jeong; Marios Kountouris
Pubblicato in: IEEE Open Journal of the Communications Society, 2025, ISSN 2644-125X
Editore: IEEE
DOI: 10.1109/OJCOMS.2025.3574098

Analysis of Challenge-Response Authentication With Reconfigurable Intelligent Surfaces (si apre in una nuova finestra)

Autori: Stefano Tomasin, Tarek N. M. M. Elwakeel, Anna Valeria Guglielmi, Robin Maes, Nele Noels, Marc Moeneclaey
Pubblicato in: IEEE Transactions on Information Forensics and Security, Numero 19, 2024, ISSN 1556-6013
Editore: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/TIFS.2024.3471185

Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach (si apre in una nuova finestra)

Autori: Mattia Piana; Francesco Ardizzon; Stefano Tomasin
Pubblicato in: IEEE Transactions on Information Forensics and Security, 2025, ISSN 1556-6021
Editore: IEEE
DOI: 10.48550/ARXIV.2410.00785

Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach (si apre in una nuova finestra)

Autori: Mattia Piana, Francesco Ardizzon, Stefano Tomasin
Pubblicato in: IEEE Transactions on Information Forensics and Security, Numero 20, 2025, ISSN 1556-6013
Editore: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/TIFS.2025.3566534

Explainable AI for 6G Use Cases: Technical Aspects and Research Challenges (si apre in una nuova finestra)

Autori: Shen Wang, M. Atif Qureshi, Luis Miralles-Pechuán, Thien Huynh-The, Thippa Reddy Gadekallu, Madhusanka Liyanage
Pubblicato in: IEEE Open Journal of the Communications Society, Numero 5, 2024, ISSN 2644-125X
Editore: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/OJCOMS.2024.3386872

On the Cost of Consecutive Estimation Error: Significance-Aware Non-Linear Aging (si apre in una nuova finestra)

Autori: Jiping Luo; Nikolaos Pappas
Pubblicato in: IEEE Transactions on Information Theory, 2025, ISSN 1557-9654
Editore: CORNELL UNIVERSITY
DOI: 10.48550/ARXIV.2410.03637

VREM-FL: mobility-aware computation-scheduling co-design for vehicular federated learning (si apre in una nuova finestra)

Autori: Ballotta, Luca; Dal Fabbro, Nicolò; Perin, Giovanni; Schenato, Luca; Rossi, Michele; Piro, Giuseppe
Pubblicato in: IEEE Transactions on Vehicular Technology, Numero Volume: 74, Numero: 2, February 2025, 2024, ISSN 1939-9359
Editore: IEEE
DOI: 10.1109/TVT.2024.3479780

Secret Key Generation on Aerial Rician Fading Channels Against a Curious Receiver (si apre in una nuova finestra)

Autori: Mattia Piana; Stefano Tomasin
Pubblicato in: 2025 IEEE 26th International Workshop on Signal Processing and Artificial Intelligence for Wireless Communications (SPAWC), 2025, ISSN 1948-3252
Editore: CORNELL UNIVERSITY
DOI: 10.48550/ARXIV.2512.04756

IEEE Network (si apre in una nuova finestra)

Autori: Xianfu Chen; Celimuge Wu; Yi Shen; Yusheng Ji; Tsutomu Yoshinaga; Qiang Ni; Charilaos C. Zarakovitis; Honggang Zhang 0001
Pubblicato in: IEEE Network, 2025, ISSN 0890-8044
Editore: Institute of Electrical and Electronics Engineers
DOI: 10.48550/ARXIV.2407.06227

SHERPA: Explainable Robust Algorithms for Privacy-Preserved Federated Learning in Future Networks to Defend Against Data Poisoning Attacks (si apre in una nuova finestra)

Autori: Chamara Sandeepa; Bartlomiej Siniarski; Shen Wang 0006; Madhusanka Liyanage
Pubblicato in: 2024 IEEE Symposium on Security and Privacy (SP), 2024, ISSN 1081-6011
Editore: IEEE
DOI: 10.1109/SP54263.2024.00271

Semantics-Aware Active Fault Detection in Status Updating Systems (si apre in una nuova finestra)

Autori: George Stamatakis; Nikolaos Pappas; Alexandros Fragkiadakis; Nikolaos Petroulakis; Apostolos Traganitis
Pubblicato in: IEEE Open Journal of the Communications Society, Vol 5, Pp 1182-1196 (2024), 2024, ISSN 2644-125X
Editore: IEEE
DOI: 10.1109/ojcoms.2024.3363731

Innovative Approaches for 6G Security: Challenges, Solutions, and Impact (si apre in una nuova finestra)

Autori: Pérez Palma, Noelia; Skarmeta Gómez, Antonio; Bisson, Pascal
Pubblicato in: 2025
Editore: N/A
DOI: 10.5281/ZENODO.14619619

AI/ML as a Key Enabler of 6G Networks: Methodology, Approach and AI-Mechanisms in SNS JU (si apre in una nuova finestra)

Autori: Trichias, Konstantinos; Christopoulou, Maria; Porambage, Pawani; Benzaid, Chafika; Vassiliou, Vasos; Artuñedo Guillén, David; Tsolkas, Dimitris; Avgeris, Marios; Papagianni, Chrysa; Jain, Akshay; Kilper, Daniel; Chen, Tao
Pubblicato in: 2025
Editore: N/A
DOI: 10.5281/ZENODO.14623109

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile

Il mio fascicolo 0 0