首页|A survey of secure semantic communications

A survey of secure semantic communications

扫码查看
Semantic communication (SemCom) is regarded as a promising and revolutionary technology in 6G, aiming to transcend the constraints of "Shannon's trap" by filtering out redundant information and extracting the core of effective data. Compared to traditional communication paradigms, SemCom offers several notable advantages, such as reducing the burden on data transmission, enhancing network management efficiency, and optimizing resource allocation. Numerous researchers have extensively explored SemCom from various perspectives, including network architecture, theoretical analysis, potential technologies, and future applications. However, as SemCom continues to evolve, a multitude of security and privacy concerns have arisen, posing threats to the confidentiality, integrity, and availability of SemCom systems. This paper presents a comprehensive survey of the technologies that can be utilized to secure SemCom. Firstly, we elaborate on the entire life cycle of SemCom, which includes the model training, model transfer, and semantic information transmission phases. Then, we identify the security and privacy issues that emerge during these three stages. Furthermore, we summarize the techniques available to mitigate these security and privacy threats, including data cleaning, robust learning, defensive strategies against backdoor attacks, adversarial training, differential privacy, cryptography, blockchain technology, model compression, and physical-layer security. Lastly, this paper outlines future research directions to guide researchers in related fields.

Semantic communicationWireless securityPrivacy6GFEDERATED LEARNING FRAMEWORKSECRET KEY GENERATIONARTIFICIAL-NOISEPRIVATESYSTEMINTERNET6G

Meng, Rui、Gao, Song、Fan, Dayu、Gao, Haixiao、Wang, Yining、Xu, Xiaodong、Wang, Bizhu、Lv, Suyu、Zhang, Zhidi、Sun, Mengying、Han, Shujun、Dong, Chen、Tao, Xiaofeng、Zhang, Ping

展开 >

State Key Laboratory of Networking and Switching Technology

State Key Laboratory of Networking and Switching Technology||Peng Cheng Lab

Beijing Univ Technol

Beijing Univ Posts & Telecommun

展开 >

2025

Journal of network and computer applications

Journal of network and computer applications

SCI
ISSN:1084-8045
年,卷(期):2025.239(Jul.)
  • 289