You are on page 1of 7

BLOCKCHAIN AND AI FOR BEYOND 5G NETWORKS

Blockchain-Based Data Security for Artificial Intelligence Applications in 6G Networks


Weiwei Li, Zhou Su, Ruidong Li, Kuan Zhang, and Yuntao Wang

Abstract dreds or even thousands of wireless connections.


Compared to previous generations, the future
The sixth generation (6G) networks are expect- 6G has many advantages [3]. First, 6G will be an
ed to provide a fully connected world with ter- autonomous network to bring people into a new
restrial wireless and satellite communications human- and machine-centric paradigm. Second,
integration. The design concept of 6G networks 6G will enable interaction and communication
is to leverage artificial intelligence (AI) to pro- with end devices in multiple ways, including neu-
mote the intelligent and agile development of ral signals, eyes, fingers, and so on. Third, 6G may
network services. Intelligent services inevitably have more stringent requirements on reliability,
involve the processing of large amounts of data, robustness, and resource efficiency to realize the
such as storage, computing, and analysis, such progress from network softwarization to intelli-
that the data may be vulnerable to tampering or gentization.
contamination by attackers. In this article, we pro- In addition to the above advantages, the most
pose a blockchain-based data security scheme significant breakthrough of 6G may come from
for AI applications in 6G networks. Specifical- artificial intelligence (AI). AI plays an important
ly, we first introduce the 6G architecture (i.e., a role in designing and optimizing 6G architecture,
space-air-ground-underwater integrated network). protocols, and resource allocation. Ubiquitous
Then we discuss two AI-enabled applications, AI applications, such as network resource man-
indoor positioning and autonomous vehicle, in agement, network maintenance, smart home,
the context of 6G. Through a case study of an intelligent navigation, and intelligent healthcare,
indoor navigation system, we demonstrate the will be provided from the core of 6G networks
effectiveness of blockchain in data security. The to terminals. AI application aims to realize fully
integration of AI and blockchain is developed to autonomous services to perform human intelli-
evaluate and optimize the quality of intelligent gence. The AI-enabled system can accurately ana-
service. Finally, we discuss several open issues lyze input data and learn from it in order to utilize
about data security in the upcoming 6G networks. that knowledge to flexibly tackle specific tasks
and goals [4]. We can expect that with the sup-
Introduction port of 6G networks, an unmanned aerial vehicle
6G is the sixth generation mobile communication (UAV) can reach the level of a top human pilot
standard/technology, which mainly promotes the through AI remote control under the condition of
development of the Internet of Things (IoT) [1]. its limited computing power. Similarly, a construc-
6G networks will create a fully connected world tion robot at a site can also complete a task with
that integrates terrestrial wireless and satellite AI. One of the important operations in all these
communication. By integrating satellite commu- applications is big data analysis, which can signifi-
nication into 6G mobile communication, global cantly improve the quality of service and optimize
and even underwater communications coverage the situational awareness of 6G networks. First,
will be seamless in the 6G era. For instance, the we can mine historical data to obtain insights on
network signal can reach any remote village so network performance, such as traffic evaluation
that patients in deep mountain areas can receive and energy efficiency. Second, the collected data
telemedicine and children can receive tele-edu- can be utilized to predict future events, such as
cation [2]. At present, many countries, including resource availability, and users’ preference and
China, the United States, the European Union, behavior, for decision making. Third, through an
and others, have intensively engaged in research AI algorithm (e.g., machine learning), we can train
of 6G networks, which are expected to be devel- the specific behavior model to carry out outlier
oped in 2020 and officially put into commercial detection or fault diagnosis.
use in 2030. Specifically, the two big technolog- In terms of guaranteeing accurate data analy-
ical innovations of 6G are THz band and spatial sis, the secure data storage faces a big challenge.
multiplexing. The THz frequency band refers to Intuitively, machine learning has recently enabled
100 GHz–10 THz, much higher than 5G, which large advances in AI, but its data storage pattern
has abundant frequency resources and large sys- tends to be highly centralized. The data is usually
tem capacity and can allow a large amount of stored in a third entity, which is not fully trusted
data to be transmitted in one second. The adop- and may be compromised through data leakage,
tion of spatial multiplexing technology will enable tampering, and so on, resulting in serious threats
a base station (BS) to simultaneously access hun- to network service and even network paralysis

Weiwei Li is with Shanghai University; Zhou Su is with Shanghai University and Xi’an Jiaotong University; Ruidong Li is with the National Institute of Digital Object Identifier:
Information and Communications Technology; Kuan Zhang is with the University of Nebraska–Lincoln; Yuntao Wang is with Xi’an Jiaotong University. 10.1109/MNET.021.1900629

IEEE Network • November/December 2020 0890-8044/20/$25.00 © 2020 IEEE 31

Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 17:44:27 UTC from IEEE Xplore. Restrictions apply.
SU_LAYOUT.indd 31 11/19/20 3:13 PM
tions from the blockchain security and data usage
perspectives.

Space
GEO tHe ArcHItecture oF 6g
MEO In this section, we present a potential architecture
LEO of 6G, which is a space-air-ground-underwater
integrated four-tier network shown in Fig. 1. The
6G features a satellite-based IoT rather than fiber
optics and BS, and satellite launch and deploy-
ment are mainly done in space. Satellite commu-
B
Balloon UAV nication plays an important and even critical role
Air

Aeroplane in 6G. Neil McRae, the chief network architect at


UAV BT group, regards 6G as a “5G + satellite“ net-
work; that is, the satellite network is integrated
on the basis of 5G to achieve global coverage.
Therefore, 6G networks can provide users with
Ground

Cloud
flexible and unlimited space communications.
server BS
Space network. A large number of satellites
BS are deployed in the space network. According
mmWave to the different orbital altitude, communication
Edge satellites can be divided into low Earth orbit (LEO)
WiFi access 6G server at 500 km–2000 km, medium Earth orbit (MEO)
point V2V
Skyscraper at 2000 km–36,000 km, and high geostationary
Remote area Earth orbit (GEO) at 36,000 km. Communica-
6G tions among satellites in high orbits and commu-
nications between high orbits and UAVs can use
Underwater/sea

Smart home V2X


Ship
visible light lasers. In the multi-layered satellite
Autonomous vehicle communication system, the broadcast and multi-
D2D 6G
cast technologies can be utilized to enhance the
Submarine network capacity and significantly mitigate traf-
fic burden. In addition, many services, including
FIGURE 1. The architecture of 6G. emergency rescue, Earth observation and naviga-
tion, and so on, are provided based on the global
coverage of the space network.
[5]. For example, for a dataset in the acquired Air network. The air network is equipped with
immune deficiency syndrome (AIDS) statistical many types of mobile aircraft (UAVs, drones,
system, the performance indicators of each data balloons, airplanes, etc.). These mobile aircraft
(blood pressure, HIV, etc.) are collected from the units are flying BSs in nature, running at different
clinical trials on AIDS patients. If the data is stolen altitudes. Aircraft among different altitudes or
or tampered, its analysis must be incorrect, which different varieties can establish aircraft–aircraft
affects the diagnosis of patients and reduces the links to provide services for the ground together.
level of intelligent treatment. In another example, The air network has the characteristics of low
in a vehicular network, vehicles need to obtain cost, convenient deployment, and wide cover-
the surrounding environment conditions in real age, which can provide regional wireless access
time, such as the distance from the nearest vehi- services [6].
cle and the congestion degree of the road ahead. Ground network. Because millimeter-wave
Sensing data should be uploaded to the cloud/ (mmWave) and THz communications suffer from
fog server for further analysis before instructions very big path loss, the density of BSs will be very
are provided to the vehicle. Once the server is high. Moreover, 6G will use nanoantennas, which
compromised by attackers, it may destroy the nor- are broadly deployed everywhere, including road-
mal driving of vehicles, which may even lead to sides, villages, shopping malls, airports, and other
death. Therefore, how to store data and keep it places, allowing people in remote areas to enjoy
secure becomes very important for AI-enabled intelligent network services. Combined with the
applications in 6G networks. aforementioned satellite communication network,
These emerging threats motivate our research 6G can basically achieve seamless global cover-
on data security for 6G networks with high intelli- age. In addition, user services will be more intel-
gence. In this article, we first introduce the wire- ligent, and mobile devices can directly achieve
less network architecture of 6G. Then we discuss device-to-device (D2D) communication with high
several AI-enabled applications in 6G networks information transmission rate.
including indoor positioning and autonomous Underwater network. An underwater network
vehicles. Considering the potential security risks, can offer communication services for wide-sea
such as data tampering and forgery, during the and deep-sea activities, which can promote the
data analysis, which is an essential stage of AI development of an ocean observation system.
applications, we propose a blockchain-enabled Furthermore, an underwater network can syn-
data storage scheme to secure the source data. thetically utilize all kinds of underwater commu-
Through a case study of a crowdsourcing-based nication means, including submarine, unmanned
indoor navigation system, we validate the immu- surface vehicle (USV) and sensor, and more, to
tability of workers’ reputation values using the build an underwater collaborative operation net-
smart contract in blockchain. Finally, we provide work, and realize intercommunication with the
an outlook on several potential research direc- other three-tier networks.

32 IEEE Network • November/December 2020

Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 17:44:27 UTC from IEEE Xplore. Restrictions apply.
SU_LAYOUT.indd 32 11/19/20 3:13 PM
ON Office north
6G
Whe re am I? Case 1 LOWE’S Office s outh
Entrance 1 B OS
Case 4
Exit 1 Under ground
A C F parking lot
How to? Case 2 Fire

MEAT AND EGG


How to?

HOT WIND

HUAWEI D
G
I H K
E

CONGEE QUEEN
Case 3
Whe re is the water?
Exit 2
Food court
nofrills Washroom Elevator

Entrance 2
J Coffee machine
Vending machine
Information flow

FIGURE 2. The AI application of indoor positioning in 6G.

AI APPlIcAtIons And motIVAtIon For blockcHAIn preferences of consumers and the popularity of
the shopping mall, which can offer powerful busi-
AI APPlIcAtIons ness benefits.
With the improvement of intelligence in 6G wire- In addition, 6G-based indoor positioning
less networks, more and more AI applications will technology combined with traditional position-
appear on the edge of the wireless network. The ing technology can provide seamless indoor and
6G networks can provide AI-enabled applications outdoor navigation services. For example, it not
for various mobile devices leveraging advanced only can it navigate mobile users to a shopping
wireless communications and mobile computing mall, but it can also localize a car in a large and
technologies. Specifically, 6G may realize human complex underground parking lot as shown in Fig.
brain level AI calculation and real-time control in 2, case 4.
some scenarios. In this section, we introduce two Autonomous Vehicle. 6G technology enables
key AI applications, indoor positioning and the a wide range of continuous collaboration between
autonomous vehicle, in the context of 6G wireless intelligent entities to deal with complex challeng-
networks. es in real time and discuss solutions to complex
Indoor Positioning. Indoor positioning is to problems together. Therefore, 6G combined with
know the real-time position or movement track of AI technology is expected to solve the problem
people indoors through technical means [7]. For of autonomous vehicle scheduling in smart cities.
example, you can utilize indoor positioning tech- In the 6G era, autonomous vehicles can uti-
nology to find the restaurant you want in a large lize onboard sensors to acquire the surrounding
shopping mall. At present, indoor positioning has environment, and control the direction and speed
been widely used in indoor navigation, mobile according to the information of a vehicle’s posi-
payment, in-store shopping guides, people flow tion, obstacles, and so on to safely and reliably
analysis, item tracking, and other human related drive on the road. Autonomous vehicles not only
activities. In Fig. 2, we present some scenarios for know their locations, surroundings, and road con-
indoor positioning. ditions, but also can communicate with other
Indoor positioning plays an important role in road users, such as cyclists, pedestrians, and other
emergency rescue, fire fighting, safety supervi- autonomous vehicles. For example, when an
sion, and so on. In the case of earthquakes, fires, autonomous vehicle comes to a specific intersec-
and other emergencies, the critical stage of res- tion, it can quickly establish a real-time dynamic
cue is to quickly localize the trapped people as network related to the intersection and immedi-
shown in Fig.2, case 1. Especially when the layout ately suspend the network after passing, as shown
of the building changes because of an emergen- in Fig. 3. Then the uploaded data can be explored
cy, it is difficult to quickly determine the location to plan the driving route and calculate the driving
of personnel with experience. Therefore, indoor time.
positioning technology can provide powerful Of course, the autonomous vehicle is just one
technical support and guarantee the safety of example of a large-scale intelligent entities collab-
trapped people during emergency rescue. oration in 6G networks. Other application fields
Indoor positioning can record a user’s activity may include financial market monitoring, health-
track, and link the user’s position with behavior care optimization planning, and advance forecast-
and interest preference behind it through ana- ing — the ability to anticipate events and quickly
lyzing these data, shown in Fig. 2, cases 2 and respond, a scope previously unimaginable.
3. Therefore, it has great commercial value and
application prospects to mine and analyze indoor motIVAtIon For blockcHAIn
location data. For example, through the analysis Big data analysis is indispensable for AI applica-
of consumers’ activities, we can obtain their fre- tions in 6G networks, and its data training through
quency and stay time in a shopping mall. As a customized servers is very popular. Without loss
result, we can further analyze the interests and of generality, the edge mobile devices upload the

IEEE Network • November/December 2020 33

Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 17:44:27 UTC from IEEE Xplore. Restrictions apply.
SU_LAYOUT.indd 33 11/19/20 3:13 PM
Cloud server

V2X
6G
communication
P
Base
station

Manned
vehicle
Dynamic
network
Autonomous
vehicle
Network
link
Data flow

FIGURE 3. The AI application of an autonomous vehicle in 6G.

data they acquire to a third entity (i.e., a server). According to the different participants, block-
Then the server conducts lots of analysis accord- chain can be categorized into three types: public
ing to some learning algorithms. This is a central- blockchain, private blockchain, and consortium
ized training mode, that is, a server runs a specific blockchain [12]. The public blockchain indicates
model to train and verify the dataset. However, that the confirmed transaction can be sent from
the centralized storage and management feature any group or individual in the world. A private
in AI applications may incur threats to data secu- blockchain is a company or group that has exclu-
rity (e.g., stealing or malicious tampering due to sive access to the blockchain. A consortium
compromise of the server), resulting in privacy blockchain indicates that its consensus mecha-
violation and interference with normal network nism is controlled by pre-selected nodes. Specif-
function. Since the authenticity of source data ically, in addition to the distributed ledger and
cannot be guaranteed, it may easily lead to incor- cryptography algorithm, blockchain has two other
rect decision making in AI services. To solve this technological innovations, consensus mechanism
problem, the most common method is to encrypt and smart contract.
the data, which is presented in [8] by J. Gubbi • Consensus mechanism is how to reach a
et al. This method mainly focuses on limiting the consensus among all nodes participating
access of the untrusted cloud server to data, but in an account to find the effectiveness of
the cloud server cannot analyze big data in AI a record. It is a means of identification
applications due to its inability to handle encrypt- and tampering prevention. Two main dif-
ed data. Therefore, a decentralized and secure ferent consensus mechanisms are present-
data sharing technique without a so-called trust- ed in blockchain, proof of stake (PoS)
ed third entity or intermediary urgently needs to and proof of work (PoW), which are suit-
appear; hence, blockchain shows a good applica- able for different application scenarios to
tion prospect in future 6G. achieve a balance between effi ciency and
safety [13]. For example, PoW is adopt-
blockcHAIn-enAbled dAtA securItY ed in the Bitcoin system, and only when
Blockchain [9], as the underlying and key tech- more than 51 percent of accounting nodes
nology of Bitcoin, is essentially a distributed in the whole network are controlled is it
ledger, which can guarantee that each transac- likely to forge a nonexistent record. How-
tion’s information is immutable and unforgeable ever, when enough nodes are added to
through an encryption algorithm. Dai et al. [10] the blockchain, this is virtually impossible.
investigated the integration between blockchain Therefore, the consensus mechanism has
and AI in 6G wireless networks and proposed enough ability to eliminate the possibility
a secure architecture. Zhang et al. [11] inves- of fraud.
tigated blockchain-based spectrum sharing in • Smart contract is to automatically execute
6G wireless networks and presented the influ- some predefined rules and provisions based
ence of AI on the realization of autonomous and on the trusted and immutable data in block-
innovatively designed wireless networks. Nodes chain. It can be applied to many industries,
participating in the blockchain system may not such as insurance, healthcare, telecom-
belong to the same organization and also do not munications, and energy. In the insurance
need to trust each other. Blockchain data are industry, a predefined compensation rule is
jointly maintained by all nodes, and each node written into the smart contract in advance.
can obtain a full copy of records. Compared When the victim suffers a loss, the smart con-
to the traditional technology of bookkeeping, tract checks if the information, such as medi-
blockchain adopts a decentralized accounting cal expenses and the occurrence of risks, are
method, and consensus can be reached without authentic so that victims can automatically
centralized control. obtain compensation.

34 IEEE Network • November/December 2020

Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 17:44:27 UTC from IEEE Xplore. Restrictions apply.
SU_LAYOUT.indd 34 11/19/20 3:13 PM
Block Block
Block
path 1 path 2
Normal Level-1 attacker
Key secret Key secret
Content flow path 3
Trusted authority Process flow Level-2 attacker

Requests Selection
Fog server
Results Results B
Requesters Aim to A
Reputation

Consensus
Workers Incorrect destination

1 A

Results
Destination
Feedback Block Parent
Dataset
header block hash
B
Smart
contractt Transit point

Blockchain platform

FIGURE 4. The blockchain-enabled crowdsourced indoor navigation system.

cAse studY oF tHe blockcHAIn-enAbled Participant users. Two types of participant


users exist in the navigation system: requesters
crowdsourced Indoor nAVIgAtIon sYstem and workers. Requesters are a crowd of people
In this section, we first take the indoor naviga- who demand location information. They take
tion system as an example to materialize how smartphones or other portable electronic equip-
blockchain can be explored to secure AI-enabled ment to send their location requirements to the
applications in 6G networks. We exploit the platform at random. At the end of each service,
crowdsourcing technology to select trustworthy they offer corresponding feedback ratings for
workers based on their reputation values to offer workers according to the quality of service. Work-
path services. Then, through the security discus- ers are responsible for providing the results (i.e.,
sion, we demonstrate that blockchain can effec- path information) to requesters.
tively prevent malicious workers (i.e., attackers) In the blockchain-enabled crowdsourced
from tampering with their reputation values. indoor navigation system, a smart contract can
be explored to describe the requester-worker
sYstem model relationship. The smart contract is created in the
The blockchain-enabled crowdsourced indoor blockchain platform when a requester has a loca-
navigation system consists of four entities — fog tion requirement and publishes its information.
server, blockchain platform, trusted authority, Here, we consider the requester uploading his/
and participant users — shown in Fig. 4. Request- her requirement with the private key while work-
ers can obtain the services they need simply ers obtain the task using the public key. When a
by uploading their location requests using their worker uj wants to respond to the requirement,
smartphones. the smart contract executes a validation function
Fog server. Since a fog server has powerful denoted by Rep() to check if the worker’s rep-
computing abilities, it can be utilized to conduct utation value satisfies the selection criterion. If
user management, task management, and outlier the worker is qualified, he/she can successfully
detection [14]. Meanwhile, the fog server plays respond to a task and follow contract function
the role of a computing node in the blockchain Rep(). Specifically, two important algorithms, the
environment, executing the consensus algorithm. path detection algorithm and reputation manage-
In addition, the fog server selects trustworthy ment algorithm, are performed in the fog server
workers based on reputation value, which can and blockchain platform, respectively. Regarding
effectively improve the quality of path services. the path detection algorithm, the fog server eval-
Blockchain platform. The blockchain platform uates the quality of the path provided, such as
serves as a medium for requesters and workers, whether it is the shortest path. When a worker
and can perform data storage in a decentralized completes a task, his/her reputation value is auto-
fashion. Requesters and workers can reach agree- matically updated by function Rep() based on
ment by transactions on the platform. the results of path detection.
Trusted authority (TA). The trusted authori-
ty is responsible for key secret management, AttAcker model
which can be explored to authorize valid regis- We consider two levels of attackers accord-
tration identities for participating users without ing to their offered path information. Normal
privacy exposure. Specifically, the introduction workers offer the shortest path, and their rep-
of TA enables blockchain to intensively perform utation values increase by  R 1 after service.
non-tamperable data storage and multitudinous When attackers initiate a level-1 attack, which
task transactions. is to offer an incorrect destination, their reputa-

IEEE Network • November/December 2020 35

Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 17:44:27 UTC from IEEE Xplore. Restrictions apply.
SU_LAYOUT.indd 35 11/19/20 3:13 PM
tion values decrease by R1 after service. When
attackers initiate a level-2 attack, offering a cor-
rect destination but with a detour, their reputa-
tion values decrease by R2 with R1 > R2. We
assume attackers and normal workers do not
change their identities in the whole service peri-
od. Obviously, the reputation values of attack-
ers may gradually decrease with the increasing
number of attacks, resulting in attackers tamper-
ing with their own reputation values in order to
increase service opportunities.

securItY dIscussIon
We analyze how blockchain technology ensures
the security of reputation values by smart contract
in the crowdsourced indoor navigation system. (a)
On one hand, to modify the reputation value in
one block, not only the PoW of the block but also
those of all subsequent blocks need to be recalcu-
lated, which is impossible for attackers to achieve.
On the other hand, each transaction record (i.e.,
each update of reputation value) needs to be veri-
fied by digital signature, which can prevent it from
being tampered with.
We compare the change of reputation value
between our system and a centralized data stor-
age system proposed in [15]. In Fig. 5, the sim-
ulation results show that the reputation values
of both level-1 attackers and level-2 attackers
decrease with time in our blockchain-enabled
system. Meanwhile, the reputation values of
attackers sometimes increase in the centralized (b)
data because of successful deliberate tamper-
FIGURE 5. Reputation comparison of attackers under
ing. In contrast, since our blockchain-enabled
different systems: a) reputation comparison of
system selects trustworthy workers based on
level-1 under different systems; b) reputation
reputation value in smart contract, it can eff ec-
comparison of level-2 under different systems.
tively avoid tampering with reputation value.
Both requesters and workers can participate in
the process of mining a new block. Due to the gers, which may lead to privacy issues. Although
nature of blockchain, it is impossible for attack- the introduction of private blockchain can per-
ers to have adequate resources and power to form privacy protection to some extent, it lim-
manipulate the blockchain platform in the sys- its the access and acquisition of data needed for
tem. Therefore, most of the miners are honest, AI processing, from which the acquired data can
and every update of the worker’s reputation perform accurate and real-time analysis. There-
value is safe. fore, it is still an open issue to balance the utility
and privacy of data in blockchain.
Future reseArcH dIrectIons Data Access and Usage Rule. Since data
In this section, we discuss some open research access and usage rules have gradually become
issues for blockchain and AI in 6G wireless net- an important method to obtain profits, it is imper-
works. ative to manage limitation of data. Creating a
Security of Smart Contract. Since blockchain system that can change the way data is collect-
adopts a decentralized consensus mechanism, its ed, prioritized, and shared helps to maximize the
security is relatively high. However, when block- value of data. However, it may cause serious pri-
chain is applied to a network, the security risk vacy or ethical issues in data usage because dif-
of a smart contract may face a serious challenge ferent users acquire data for different purposes.
due to attacks from every network protocol layer. Therefore, it is also a major challenge to deal with
Because the smart contract is a Turing complete data access and usage rules in highly intelligent
program, its behavior is extremely complex. When systems in order to utilize data to provide more
the code runs in the distributed network environ- services in the 6G era.
ment, the potential risk may be greatly increased.
Therefore, how to explore a more secure mecha- conclusIons
nism into the blockchain has become an urgent In this article, we have explored the AI application
problem to be solved. and blockchain technology in 6G wireless net-
Blockchain Privacy. The public blockchain works. We have first introduced the architecture
supports secure and reliable data transaction. of 6G, which is a space-air-ground-underwater
However, the stored data is public and available integrated four-tier network. Then we have inves-
to all visitors, which inevitably exposes the privacy tigated two AI applications, indoor positioning
of data owners through data mining. For example, and autonomous vehicle. Furthermore, we have
the ubiquitous sensor systems in IoT collect large thoroughly elaborated the increasing attention
amounts of personal data and put it on public led- on data security in AI applications through a case

36 IEEE Network • November/December 2020

Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 17:44:27 UTC from IEEE Xplore. Restrictions apply.
SU_LAYOUT.indd 36 11/19/20 3:13 PM
study. Simulation results illustrate that data stored
on blockchain has strong resistance against tam- Simulation results illustrate that data stored on blockchain has strong resistance against tampering.
pering. In addition, we have pointed out several In addition, we have pointed out several potential research directions. We hope our article can
potential research directions. We hope our article
can contribute to the development of blockchain contribute to the development of blockchain and AI technology in future 6G networks, and inspire
and AI technology in future 6G networks, and more people to study the application and security of 6G networks.
inspire more people to study the application and
security of 6G networks.
Biographies
Acknowledgments Weiwei Li is working on her Ph.D. degree with the School of
Mechatronic Engineering and Automation of Shanghai Universi-
This work is supported in part by NSFC (nos. ty, P. R. China. Her research interests are in the general area of
U1808207 and 91746114), the 111 Proj- cyber security and wireless network architecture.
ect, no. D18003, JSPS KAKENHI Grant Num-
ber JP19H04105, and the Project of Shanghai Zhou Su received his Ph.D. degree from Waseda University,
Tokyo, Japan, in 2003. He is an Associate Editor of the IEEE
Municipal Science and Technology Commission, Internet of Things Journal and the IEEE Open Journal of the Com-
18510761000. puter Society. He is the Chair of the Multimedia Services and
Applications over Emerging Networks Interest Group (MENIG)
References of the IEEE Communications Society as well as the Multimedia
[1] K. Zhang et al., “Edge Intelligence and Blockchain Empow- Communications Technical Committee. He has also served as
ered 5G Beyond for the Industrial Internet of Things,“ IEEE the Co-Chair of several international conferences including IEEE
Network, vol. 33, no. 5, Sept./Oct. 2019, pp. 12–19. VTC Spring 2016, IEEE CCNC 2011, and others. He is a TPC
[2] K. Letaief et al., “The Roadmap to 6G: AI Empowered Wire- member of some flagship conferences including IEEE INFO-
less Networks,“ IEEE Commun. Mag., vol. 57, no. 8, Aug. COM, IEEE ICC, IEEE GLOBECOM, and others. His research
2019, pp. 84–90. interests include multimedia communication, wireless communi-
[3] D. He et al., “The Design and Applications of High-Perfor- cation, and network traffic. He received the best paper award of
mance Ray-Tracing Simulation Platform for 5G and Beyond IEEE ICC 2020, IEEE BigdataSE 2019, and others.
Wireless Communications: A Tutorial,“ IEEE Commun. Sur-
veys & Tutorials, vol. 21, no. 1, 2019, pp. 10–27. Ruidong Li received his Bachelor's degree in engineering from
[4] K. Zhang et al., “Artificial Intelligence Inspired Transmission Zhejiang University, China, in 2001, and his Doctor of Engi-
Scheduling in Cognitive Vehicular Communications and neering degree from the University of Tsukuba in 2008. He is
Networks,“ IEEE Internet of Things J., vol. 6, no. 2, 2019, pp. a senior researcher with the National Institute of Information
1987–97. and Communications Technology. His current research interests
[5] K. Zhang et al., “Security and Privacy in Smart City Applica- include future networks, big data networking, blockchain, the
tions: Challenges and Solutions,“ IEEE Commun. Mag., vol. Internet of Things, network security, and wireless networks. He
55, no. 1, Jan. 2017, pp. 122–29. is the Secretary of the IEEE ComSoc Internet Technical Com-
[6] N. Kato et al., “Optimizing Space-Air-Ground Integrated Net- mittee and the founder and Chair of the IEEE SIG on Big Data
works by Artificial Intelligence,“ IEEE Wireless Commun., vol. Intelligent Networking and the IEEE SIG on Intelligent Internet
26, no. 4, Aug. 2019, pp. 140–47. Edge. He serves as the Co-Chair for Young Professionals of
[7] W. Li et al., “Abnormal Crowd Traffic Detection for Crowd- the IEEE Tokyo Section and the Young Researcher Group in
sourced Indoor Positioning in Heterogeneous Commu- the Asia Future Internet Forum. He has been a Guest Editor
nications Networks,“ IEEE Trans. Network Science and for prestigious journals, such as IEEE Communications Maga-
Engineering (in press). zine, IEEE Network, and IEEE Transactions on Network Science
[8] J. Gubbi et al., “Internet of Things (IoT): A Vision, Architec- and Engineering, and has served/serves as Chair for internation-
tural Elements, and Future Directions,“ Future Gen. Comp. al conferences and workshops, such as BRAINS 2020, INFO-
Sys., vol. 29, no. 7, 2013, pp. 1645–60. COM ICCN Workshop 2019/2020, ICDCS NMIC Workshop
[9] Y. Liu et al., “LightChain: A Lightweight Blockchain System 2019/2020, GLOBECOM ICSTO Workshop, and ICCSSE 2019.
for Industrial Internet of Things,“ IEEE Trans. Industrial Infor- He is a member of IEICE.
matics, vol. 15, no. 6, 2019, pp. 3571–81.
[10] Y. Dai et al., “Blockchain and Deep Reinforcement Learn- Kuan Zhang has been an assistant professor in the Department
ing Empowered Intelligent 5G Beyond,“ IEEE Network, vol. of Electrical and Computer Engineering, University of Nebras-
33, no. 3, May/June 2019, pp. 10–17. ka-Lincoln since September 2017. He received his B.Sc. degree
[11] Z. Zhang et al., “6G Wireless Networks: Vision, Require- in communication engineering and his M.Sc. degree in com-
ments, Architecture, and Key Technologies,“ IEEE Vehic. puter applied technology from Northeastern University, China,
Tech. Mag., vol. 14, no. 3, 2019, pp. 28–41. in 2009 and 2011, respectively. He received his Ph.D. degree
[12] C. Xu, K. Wang, and M. Guo, “Intelligent Resource Man- in electrical and computer engineering from the University of
agement in Blockchain Based Cloud Data Centers,“ IEEE Waterloo, Canada, in 2016. He was also a postdoctoral fellow
Cloud Computing, vol. 4, no. 6, 2017, pp. 50–59. with the Broadband Communications Research (BBCR) group,
[13] Z. Su et al., “LVBS: Lightweight Vehicular Blockchain Department of Electrical and Computer Engineering, University
for Secure Data Sharing in Disaster Rescue,“ IEEE Trans. of Waterloo, Canada, from 2016 to 2017. His research inter-
Dependable and Secure Computing. DOI: 10.1109/ ests include security and privacy for mobile social networks,
TDSC.2020.2980255. e-healthcare systems, cloud/edge computing, and cyber physi-
[14] K. Zhang et al., “Deep Learning Empowered Task Offload- cal systems.
ing for Mobile Edge Computing in Urban Informatics,“ IEEE
Internet of Things J., vol. 6, no. 5, 2019, pp. 7635–47. Y untao W ang is working on his Ph.D degree in the School
[15] W. Li et al., “Anomalous Path Detection for Spatial Crowd- of Cyber Science and Engineering at Xi'an Jiaotong University,
sourcing-Based Indoor Navigation System,“ Proc. IEEE GLO- Xi'an, P. R. China. His research interests include security and
BECOM, 2018, pp. 1–7. privacy in wireless network architecture and vehicular networks.

IEEE Network • November/December 2020 37

Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 17:44:27 UTC from IEEE Xplore. Restrictions apply.
SU_LAYOUT.indd 37 11/19/20 3:13 PM

You might also like