Ajou University repository

Deep learning techniques for enhanced security and privacy in 6G terrestrial–nonterrestrial network architecture
Citations

SCOPUS

5

Citation Export

DC Field Value Language
dc.contributor.authorKhalid, Maira-
dc.contributor.authorAli, Jehad-
dc.contributor.authorMohsin, Ahmed Raza-
dc.contributor.authorRoh, Byeong Hee-
dc.contributor.authorAlenazi, Mohammed J.F.-
dc.date.issued2025-03-01-
dc.identifier.issn1573-0484-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/38167-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=105000096441&origin=inward-
dc.description.abstractThe seamless integration of terrestrial networks (TNs) and non-terrestrial networks (NTNs) is a cornerstone in achieving the vision of ubiquitous connectivity in 6G systems. This native integration of TN and NTN components enables global coverage, ultrareliable low-latency communications, and massive device connectivity, but it also presents significant challenges. These challenges include ensuring robust security in distributed architectures, safeguarding privacy during cross-domain data handling, and managing complex interference scenarios in shared and adjacent spectrum environments. Artificial intelligence (AI) serves as a transformative enabler in overcoming these challenges, providing advanced capabilities for real-time threat detection, adaptive authentication, privacy-preserving mechanisms, and dynamic spectrum management. By leveraging advanced techniques such as bidirectional long short-term memory (BiLSTM) networks, multi-agent reinforcement learning (MARL), and federated learning (FL), the proposed solutions enable robust anomaly detection, dynamic spectrum allocation, and scalable privacy-preserving model training. These techniques collectively improve key performance metrics, including a 30% enhancement in signal-to-interference-plus-noise ratio (SINR), over 90% spectrum efficiency, and a privacy budget of ϵ<1, while reducing latency to below 50 ms. This paper explores the vulnerabilities inherent to TN–NTN architectures, identifies limitations of traditional approaches, and examines cutting-edge AI-driven solutions tailored for integrated TN–NTN systems. Key contributions include insights into AI’s role in addressing security, privacy, and interference challenges, and the development of decentralized intelligence frameworks for scalable and efficient network operations.-
dc.description.sponsorshipThis work was supported partially by the\u00A0Ajou University Research Fund, BK21 FOUR program of the National Research Foundation of Korea funded by the Ministry of Education (NRF5199991514504) and the authors extended their appreciation to Researcher Supporting Project Number (RSPD2025R582), King Saud University, Riyadh, Saudi Arabia.-
dc.language.isoeng-
dc.publisherSpringer-
dc.subject.mesh6g connectivity-
dc.subject.meshBidirectional long short-term memory-
dc.subject.meshLSTM-
dc.subject.meshNon-terrestrial network-
dc.subject.meshShort term memory-
dc.subject.meshSoftware defined network-
dc.subject.meshSoftware-defined networks-
dc.subject.meshTerrestrial network-
dc.subject.meshTerrestrial networks-
dc.titleDeep learning techniques for enhanced security and privacy in 6G terrestrial–nonterrestrial network architecture-
dc.typeArticle-
dc.citation.number4-
dc.citation.titleJournal of Supercomputing-
dc.citation.volume81-
dc.identifier.bibliographicCitationJournal of Supercomputing, Vol.81 No.4-
dc.identifier.doi10.1007/s11227-025-07097-x-
dc.identifier.scopusid2-s2.0-105000096441-
dc.identifier.urlhttps://www.springer.com/journal/11227-
dc.subject.keyword6G connectivity-
dc.subject.keywordArtificial intelligence-
dc.subject.keywordBiLSTM-
dc.subject.keywordLSTM-
dc.subject.keywordNon-terrestrial networks (NTNs)-
dc.subject.keywordSoftware defined network (SDNs)-
dc.subject.keywordTerrestrial networks (TNs)-
dc.type.otherArticle-
dc.identifier.pissn09208542-
dc.description.isoafalse-
dc.subject.subareaTheoretical Computer Science-
dc.subject.subareaSoftware-
dc.subject.subareaInformation Systems-
dc.subject.subareaHardware and Architecture-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

JEHAD, ALI Image
JEHAD, ALIALI JEHAD
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.