2023
DOI: 10.1155/2023/8658278
|View full text |Cite
|
Sign up to set email alerts
|

AI-Enabled Learning Architecture Using Network Traffic Traces over IoT Network: A Comprehensive Review

Abstract: WiFi and private 5G networks, commonly referred to as P5G, provide Internet of Things (IoT) devices the ability to communicate at fast speeds, with low latency and with a high capacity. Will they coexist and share the burden of delivering a connection to devices at home, on the road, in the workplace, and at a park or a stadium? Or will one replace the other to manage the increase in endpoints and traffic in the enterprise, campus, and manufacturing environments? In this research, we describe IoT device testbe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 59 publications
0
3
0
Order By: Relevance
“…A detailed survey of historical review of networking technologies and the application of current trends in 6G networking was discussed in Wang et al 17 Moreover, four pivotal elements of 6G networks including, edge computing in real-time, distributed artificial intelligence, and also relevant security and privacy concerns were also detailed. A holistic and comprehensive review of AI-enabled attack detection using traces of network traffic was investigated in Aneja et al 18 From a security angle, a reassessment of prior security conventional methods is necessitated. Therefore novel authentication mechanism, encryption/decryption technique, access control, and malicious activity detection has to satisfy higher requirements of future networks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A detailed survey of historical review of networking technologies and the application of current trends in 6G networking was discussed in Wang et al 17 Moreover, four pivotal elements of 6G networks including, edge computing in real-time, distributed artificial intelligence, and also relevant security and privacy concerns were also detailed. A holistic and comprehensive review of AI-enabled attack detection using traces of network traffic was investigated in Aneja et al 18 From a security angle, a reassessment of prior security conventional methods is necessitated. Therefore novel authentication mechanism, encryption/decryption technique, access control, and malicious activity detection has to satisfy higher requirements of future networks.…”
Section: Related Workmentioning
confidence: 99%
“…A detailed survey of historical review of networking technologies and the application of current trends in 6G networking was discussed in Wang et al 17 Moreover, four pivotal elements of 6G networks including, edge computing in real‐time, distributed artificial intelligence, and also relevant security and privacy concerns were also detailed. A holistic and comprehensive review of AI‐enabled attack detection using traces of network traffic was investigated in Aneja et al 18 …”
Section: Related Workmentioning
confidence: 99%
“…Tese applications are made possible by NextGen networks' [2] improved communication, processing, and artifcial intelligence (AI) capabilities. AI is one of the 34 signifcant NextG network technical advancements that must be addressed to overcome upcoming 6G networks consist of issues with security and privacy [3]. Te recently proposed innovative 6G architectural framework is prone to a number of security vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%