Professional Documents
Culture Documents
Weiwei Li is with Shanghai University; Zhou Su is with Shanghai University and Xi’an Jiaotong University; Ruidong Li is with the National Institute of Digital Object Identifier:
Information and Communications Technology; Kuan Zhang is with the University of Nebraska–Lincoln; Yuntao Wang is with Xi’an Jiaotong University. 10.1109/MNET.021.1900629
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 17:44:27 UTC from IEEE Xplore. Restrictions apply.
SU_LAYOUT.indd 31 11/19/20 3:13 PM
tions from the blockchain security and data usage
perspectives.
Space
GEO tHe ArcHItecture oF 6g
MEO In this section, we present a potential architecture
LEO of 6G, which is a space-air-ground-underwater
integrated four-tier network shown in Fig. 1. The
6G features a satellite-based IoT rather than fiber
optics and BS, and satellite launch and deploy-
ment are mainly done in space. Satellite commu-
B
Balloon UAV nication plays an important and even critical role
Air
Cloud
flexible and unlimited space communications.
server BS
Space network. A large number of satellites
BS are deployed in the space network. According
mmWave to the different orbital altitude, communication
Edge satellites can be divided into low Earth orbit (LEO)
WiFi access 6G server at 500 km–2000 km, medium Earth orbit (MEO)
point V2V
Skyscraper at 2000 km–36,000 km, and high geostationary
Remote area Earth orbit (GEO) at 36,000 km. Communica-
6G tions among satellites in high orbits and commu-
nications between high orbits and UAVs can use
Underwater/sea
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 17:44:27 UTC from IEEE Xplore. Restrictions apply.
SU_LAYOUT.indd 32 11/19/20 3:13 PM
ON Office north
6G
Whe re am I? Case 1 LOWE’S Office s outh
Entrance 1 B OS
Case 4
Exit 1 Under ground
A C F parking lot
How to? Case 2 Fire
HOT WIND
HUAWEI D
G
I H K
E
CONGEE QUEEN
Case 3
Whe re is the water?
Exit 2
Food court
nofrills Washroom Elevator
Entrance 2
J Coffee machine
Vending machine
Information flow
AI APPlIcAtIons And motIVAtIon For blockcHAIn preferences of consumers and the popularity of
the shopping mall, which can offer powerful busi-
AI APPlIcAtIons ness benefits.
With the improvement of intelligence in 6G wire- In addition, 6G-based indoor positioning
less networks, more and more AI applications will technology combined with traditional position-
appear on the edge of the wireless network. The ing technology can provide seamless indoor and
6G networks can provide AI-enabled applications outdoor navigation services. For example, it not
for various mobile devices leveraging advanced only can it navigate mobile users to a shopping
wireless communications and mobile computing mall, but it can also localize a car in a large and
technologies. Specifically, 6G may realize human complex underground parking lot as shown in Fig.
brain level AI calculation and real-time control in 2, case 4.
some scenarios. In this section, we introduce two Autonomous Vehicle. 6G technology enables
key AI applications, indoor positioning and the a wide range of continuous collaboration between
autonomous vehicle, in the context of 6G wireless intelligent entities to deal with complex challeng-
networks. es in real time and discuss solutions to complex
Indoor Positioning. Indoor positioning is to problems together. Therefore, 6G combined with
know the real-time position or movement track of AI technology is expected to solve the problem
people indoors through technical means [7]. For of autonomous vehicle scheduling in smart cities.
example, you can utilize indoor positioning tech- In the 6G era, autonomous vehicles can uti-
nology to find the restaurant you want in a large lize onboard sensors to acquire the surrounding
shopping mall. At present, indoor positioning has environment, and control the direction and speed
been widely used in indoor navigation, mobile according to the information of a vehicle’s posi-
payment, in-store shopping guides, people flow tion, obstacles, and so on to safely and reliably
analysis, item tracking, and other human related drive on the road. Autonomous vehicles not only
activities. In Fig. 2, we present some scenarios for know their locations, surroundings, and road con-
indoor positioning. ditions, but also can communicate with other
Indoor positioning plays an important role in road users, such as cyclists, pedestrians, and other
emergency rescue, fire fighting, safety supervi- autonomous vehicles. For example, when an
sion, and so on. In the case of earthquakes, fires, autonomous vehicle comes to a specific intersec-
and other emergencies, the critical stage of res- tion, it can quickly establish a real-time dynamic
cue is to quickly localize the trapped people as network related to the intersection and immedi-
shown in Fig.2, case 1. Especially when the layout ately suspend the network after passing, as shown
of the building changes because of an emergen- in Fig. 3. Then the uploaded data can be explored
cy, it is difficult to quickly determine the location to plan the driving route and calculate the driving
of personnel with experience. Therefore, indoor time.
positioning technology can provide powerful Of course, the autonomous vehicle is just one
technical support and guarantee the safety of example of a large-scale intelligent entities collab-
trapped people during emergency rescue. oration in 6G networks. Other application fields
Indoor positioning can record a user’s activity may include financial market monitoring, health-
track, and link the user’s position with behavior care optimization planning, and advance forecast-
and interest preference behind it through ana- ing — the ability to anticipate events and quickly
lyzing these data, shown in Fig. 2, cases 2 and respond, a scope previously unimaginable.
3. Therefore, it has great commercial value and
application prospects to mine and analyze indoor motIVAtIon For blockcHAIn
location data. For example, through the analysis Big data analysis is indispensable for AI applica-
of consumers’ activities, we can obtain their fre- tions in 6G networks, and its data training through
quency and stay time in a shopping mall. As a customized servers is very popular. Without loss
result, we can further analyze the interests and of generality, the edge mobile devices upload the
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 17:44:27 UTC from IEEE Xplore. Restrictions apply.
SU_LAYOUT.indd 33 11/19/20 3:13 PM
Cloud server
V2X
6G
communication
P
Base
station
Manned
vehicle
Dynamic
network
Autonomous
vehicle
Network
link
Data flow
data they acquire to a third entity (i.e., a server). According to the different participants, block-
Then the server conducts lots of analysis accord- chain can be categorized into three types: public
ing to some learning algorithms. This is a central- blockchain, private blockchain, and consortium
ized training mode, that is, a server runs a specific blockchain [12]. The public blockchain indicates
model to train and verify the dataset. However, that the confirmed transaction can be sent from
the centralized storage and management feature any group or individual in the world. A private
in AI applications may incur threats to data secu- blockchain is a company or group that has exclu-
rity (e.g., stealing or malicious tampering due to sive access to the blockchain. A consortium
compromise of the server), resulting in privacy blockchain indicates that its consensus mecha-
violation and interference with normal network nism is controlled by pre-selected nodes. Specif-
function. Since the authenticity of source data ically, in addition to the distributed ledger and
cannot be guaranteed, it may easily lead to incor- cryptography algorithm, blockchain has two other
rect decision making in AI services. To solve this technological innovations, consensus mechanism
problem, the most common method is to encrypt and smart contract.
the data, which is presented in [8] by J. Gubbi • Consensus mechanism is how to reach a
et al. This method mainly focuses on limiting the consensus among all nodes participating
access of the untrusted cloud server to data, but in an account to find the effectiveness of
the cloud server cannot analyze big data in AI a record. It is a means of identification
applications due to its inability to handle encrypt- and tampering prevention. Two main dif-
ed data. Therefore, a decentralized and secure ferent consensus mechanisms are present-
data sharing technique without a so-called trust- ed in blockchain, proof of stake (PoS)
ed third entity or intermediary urgently needs to and proof of work (PoW), which are suit-
appear; hence, blockchain shows a good applica- able for different application scenarios to
tion prospect in future 6G. achieve a balance between effi ciency and
safety [13]. For example, PoW is adopt-
blockcHAIn-enAbled dAtA securItY ed in the Bitcoin system, and only when
Blockchain [9], as the underlying and key tech- more than 51 percent of accounting nodes
nology of Bitcoin, is essentially a distributed in the whole network are controlled is it
ledger, which can guarantee that each transac- likely to forge a nonexistent record. How-
tion’s information is immutable and unforgeable ever, when enough nodes are added to
through an encryption algorithm. Dai et al. [10] the blockchain, this is virtually impossible.
investigated the integration between blockchain Therefore, the consensus mechanism has
and AI in 6G wireless networks and proposed enough ability to eliminate the possibility
a secure architecture. Zhang et al. [11] inves- of fraud.
tigated blockchain-based spectrum sharing in • Smart contract is to automatically execute
6G wireless networks and presented the influ- some predefined rules and provisions based
ence of AI on the realization of autonomous and on the trusted and immutable data in block-
innovatively designed wireless networks. Nodes chain. It can be applied to many industries,
participating in the blockchain system may not such as insurance, healthcare, telecom-
belong to the same organization and also do not munications, and energy. In the insurance
need to trust each other. Blockchain data are industry, a predefined compensation rule is
jointly maintained by all nodes, and each node written into the smart contract in advance.
can obtain a full copy of records. Compared When the victim suffers a loss, the smart con-
to the traditional technology of bookkeeping, tract checks if the information, such as medi-
blockchain adopts a decentralized accounting cal expenses and the occurrence of risks, are
method, and consensus can be reached without authentic so that victims can automatically
centralized control. obtain compensation.
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 17:44:27 UTC from IEEE Xplore. Restrictions apply.
SU_LAYOUT.indd 34 11/19/20 3:13 PM
Block Block
Block
path 1 path 2
Normal Level-1 attacker
Key secret Key secret
Content flow path 3
Trusted authority Process flow Level-2 attacker
Requests Selection
Fog server
Results Results B
Requesters Aim to A
Reputation
Consensus
Workers Incorrect destination
1 A
Results
Destination
Feedback Block Parent
Dataset
header block hash
B
Smart
contractt Transit point
Blockchain platform
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 17:44:27 UTC from IEEE Xplore. Restrictions apply.
SU_LAYOUT.indd 35 11/19/20 3:13 PM
tion values decrease by R1 after service. When
attackers initiate a level-2 attack, offering a cor-
rect destination but with a detour, their reputa-
tion values decrease by R2 with R1 > R2. We
assume attackers and normal workers do not
change their identities in the whole service peri-
od. Obviously, the reputation values of attack-
ers may gradually decrease with the increasing
number of attacks, resulting in attackers tamper-
ing with their own reputation values in order to
increase service opportunities.
securItY dIscussIon
We analyze how blockchain technology ensures
the security of reputation values by smart contract
in the crowdsourced indoor navigation system. (a)
On one hand, to modify the reputation value in
one block, not only the PoW of the block but also
those of all subsequent blocks need to be recalcu-
lated, which is impossible for attackers to achieve.
On the other hand, each transaction record (i.e.,
each update of reputation value) needs to be veri-
fied by digital signature, which can prevent it from
being tampered with.
We compare the change of reputation value
between our system and a centralized data stor-
age system proposed in [15]. In Fig. 5, the sim-
ulation results show that the reputation values
of both level-1 attackers and level-2 attackers
decrease with time in our blockchain-enabled
system. Meanwhile, the reputation values of
attackers sometimes increase in the centralized (b)
data because of successful deliberate tamper-
FIGURE 5. Reputation comparison of attackers under
ing. In contrast, since our blockchain-enabled
different systems: a) reputation comparison of
system selects trustworthy workers based on
level-1 under different systems; b) reputation
reputation value in smart contract, it can eff ec-
comparison of level-2 under different systems.
tively avoid tampering with reputation value.
Both requesters and workers can participate in
the process of mining a new block. Due to the gers, which may lead to privacy issues. Although
nature of blockchain, it is impossible for attack- the introduction of private blockchain can per-
ers to have adequate resources and power to form privacy protection to some extent, it lim-
manipulate the blockchain platform in the sys- its the access and acquisition of data needed for
tem. Therefore, most of the miners are honest, AI processing, from which the acquired data can
and every update of the worker’s reputation perform accurate and real-time analysis. There-
value is safe. fore, it is still an open issue to balance the utility
and privacy of data in blockchain.
Future reseArcH dIrectIons Data Access and Usage Rule. Since data
In this section, we discuss some open research access and usage rules have gradually become
issues for blockchain and AI in 6G wireless net- an important method to obtain profits, it is imper-
works. ative to manage limitation of data. Creating a
Security of Smart Contract. Since blockchain system that can change the way data is collect-
adopts a decentralized consensus mechanism, its ed, prioritized, and shared helps to maximize the
security is relatively high. However, when block- value of data. However, it may cause serious pri-
chain is applied to a network, the security risk vacy or ethical issues in data usage because dif-
of a smart contract may face a serious challenge ferent users acquire data for different purposes.
due to attacks from every network protocol layer. Therefore, it is also a major challenge to deal with
Because the smart contract is a Turing complete data access and usage rules in highly intelligent
program, its behavior is extremely complex. When systems in order to utilize data to provide more
the code runs in the distributed network environ- services in the 6G era.
ment, the potential risk may be greatly increased.
Therefore, how to explore a more secure mecha- conclusIons
nism into the blockchain has become an urgent In this article, we have explored the AI application
problem to be solved. and blockchain technology in 6G wireless net-
Blockchain Privacy. The public blockchain works. We have first introduced the architecture
supports secure and reliable data transaction. of 6G, which is a space-air-ground-underwater
However, the stored data is public and available integrated four-tier network. Then we have inves-
to all visitors, which inevitably exposes the privacy tigated two AI applications, indoor positioning
of data owners through data mining. For example, and autonomous vehicle. Furthermore, we have
the ubiquitous sensor systems in IoT collect large thoroughly elaborated the increasing attention
amounts of personal data and put it on public led- on data security in AI applications through a case
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 17:44:27 UTC from IEEE Xplore. Restrictions apply.
SU_LAYOUT.indd 36 11/19/20 3:13 PM
study. Simulation results illustrate that data stored
on blockchain has strong resistance against tam- Simulation results illustrate that data stored on blockchain has strong resistance against tampering.
pering. In addition, we have pointed out several In addition, we have pointed out several potential research directions. We hope our article can
potential research directions. We hope our article
can contribute to the development of blockchain contribute to the development of blockchain and AI technology in future 6G networks, and inspire
and AI technology in future 6G networks, and more people to study the application and security of 6G networks.
inspire more people to study the application and
security of 6G networks.
Biographies
Acknowledgments Weiwei Li is working on her Ph.D. degree with the School of
Mechatronic Engineering and Automation of Shanghai Universi-
This work is supported in part by NSFC (nos. ty, P. R. China. Her research interests are in the general area of
U1808207 and 91746114), the 111 Proj- cyber security and wireless network architecture.
ect, no. D18003, JSPS KAKENHI Grant Num-
ber JP19H04105, and the Project of Shanghai Zhou Su received his Ph.D. degree from Waseda University,
Tokyo, Japan, in 2003. He is an Associate Editor of the IEEE
Municipal Science and Technology Commission, Internet of Things Journal and the IEEE Open Journal of the Com-
18510761000. puter Society. He is the Chair of the Multimedia Services and
Applications over Emerging Networks Interest Group (MENIG)
References of the IEEE Communications Society as well as the Multimedia
[1] K. Zhang et al., “Edge Intelligence and Blockchain Empow- Communications Technical Committee. He has also served as
ered 5G Beyond for the Industrial Internet of Things,“ IEEE the Co-Chair of several international conferences including IEEE
Network, vol. 33, no. 5, Sept./Oct. 2019, pp. 12–19. VTC Spring 2016, IEEE CCNC 2011, and others. He is a TPC
[2] K. Letaief et al., “The Roadmap to 6G: AI Empowered Wire- member of some flagship conferences including IEEE INFO-
less Networks,“ IEEE Commun. Mag., vol. 57, no. 8, Aug. COM, IEEE ICC, IEEE GLOBECOM, and others. His research
2019, pp. 84–90. interests include multimedia communication, wireless communi-
[3] D. He et al., “The Design and Applications of High-Perfor- cation, and network traffic. He received the best paper award of
mance Ray-Tracing Simulation Platform for 5G and Beyond IEEE ICC 2020, IEEE BigdataSE 2019, and others.
Wireless Communications: A Tutorial,“ IEEE Commun. Sur-
veys & Tutorials, vol. 21, no. 1, 2019, pp. 10–27. Ruidong Li received his Bachelor's degree in engineering from
[4] K. Zhang et al., “Artificial Intelligence Inspired Transmission Zhejiang University, China, in 2001, and his Doctor of Engi-
Scheduling in Cognitive Vehicular Communications and neering degree from the University of Tsukuba in 2008. He is
Networks,“ IEEE Internet of Things J., vol. 6, no. 2, 2019, pp. a senior researcher with the National Institute of Information
1987–97. and Communications Technology. His current research interests
[5] K. Zhang et al., “Security and Privacy in Smart City Applica- include future networks, big data networking, blockchain, the
tions: Challenges and Solutions,“ IEEE Commun. Mag., vol. Internet of Things, network security, and wireless networks. He
55, no. 1, Jan. 2017, pp. 122–29. is the Secretary of the IEEE ComSoc Internet Technical Com-
[6] N. Kato et al., “Optimizing Space-Air-Ground Integrated Net- mittee and the founder and Chair of the IEEE SIG on Big Data
works by Artificial Intelligence,“ IEEE Wireless Commun., vol. Intelligent Networking and the IEEE SIG on Intelligent Internet
26, no. 4, Aug. 2019, pp. 140–47. Edge. He serves as the Co-Chair for Young Professionals of
[7] W. Li et al., “Abnormal Crowd Traffic Detection for Crowd- the IEEE Tokyo Section and the Young Researcher Group in
sourced Indoor Positioning in Heterogeneous Commu- the Asia Future Internet Forum. He has been a Guest Editor
nications Networks,“ IEEE Trans. Network Science and for prestigious journals, such as IEEE Communications Maga-
Engineering (in press). zine, IEEE Network, and IEEE Transactions on Network Science
[8] J. Gubbi et al., “Internet of Things (IoT): A Vision, Architec- and Engineering, and has served/serves as Chair for internation-
tural Elements, and Future Directions,“ Future Gen. Comp. al conferences and workshops, such as BRAINS 2020, INFO-
Sys., vol. 29, no. 7, 2013, pp. 1645–60. COM ICCN Workshop 2019/2020, ICDCS NMIC Workshop
[9] Y. Liu et al., “LightChain: A Lightweight Blockchain System 2019/2020, GLOBECOM ICSTO Workshop, and ICCSSE 2019.
for Industrial Internet of Things,“ IEEE Trans. Industrial Infor- He is a member of IEICE.
matics, vol. 15, no. 6, 2019, pp. 3571–81.
[10] Y. Dai et al., “Blockchain and Deep Reinforcement Learn- Kuan Zhang has been an assistant professor in the Department
ing Empowered Intelligent 5G Beyond,“ IEEE Network, vol. of Electrical and Computer Engineering, University of Nebras-
33, no. 3, May/June 2019, pp. 10–17. ka-Lincoln since September 2017. He received his B.Sc. degree
[11] Z. Zhang et al., “6G Wireless Networks: Vision, Require- in communication engineering and his M.Sc. degree in com-
ments, Architecture, and Key Technologies,“ IEEE Vehic. puter applied technology from Northeastern University, China,
Tech. Mag., vol. 14, no. 3, 2019, pp. 28–41. in 2009 and 2011, respectively. He received his Ph.D. degree
[12] C. Xu, K. Wang, and M. Guo, “Intelligent Resource Man- in electrical and computer engineering from the University of
agement in Blockchain Based Cloud Data Centers,“ IEEE Waterloo, Canada, in 2016. He was also a postdoctoral fellow
Cloud Computing, vol. 4, no. 6, 2017, pp. 50–59. with the Broadband Communications Research (BBCR) group,
[13] Z. Su et al., “LVBS: Lightweight Vehicular Blockchain Department of Electrical and Computer Engineering, University
for Secure Data Sharing in Disaster Rescue,“ IEEE Trans. of Waterloo, Canada, from 2016 to 2017. His research inter-
Dependable and Secure Computing. DOI: 10.1109/ ests include security and privacy for mobile social networks,
TDSC.2020.2980255. e-healthcare systems, cloud/edge computing, and cyber physi-
[14] K. Zhang et al., “Deep Learning Empowered Task Offload- cal systems.
ing for Mobile Edge Computing in Urban Informatics,“ IEEE
Internet of Things J., vol. 6, no. 5, 2019, pp. 7635–47. Y untao W ang is working on his Ph.D degree in the School
[15] W. Li et al., “Anomalous Path Detection for Spatial Crowd- of Cyber Science and Engineering at Xi'an Jiaotong University,
sourcing-Based Indoor Navigation System,“ Proc. IEEE GLO- Xi'an, P. R. China. His research interests include security and
BECOM, 2018, pp. 1–7. privacy in wireless network architecture and vehicular networks.
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 17:44:27 UTC from IEEE Xplore. Restrictions apply.
SU_LAYOUT.indd 37 11/19/20 3:13 PM