Back to Search Start Over

A Survey of Secure Semantic Communications

Authors :
Meng, Rui
Gao, Song
Fan, Dayu
Gao, Haixiao
Wang, Yining
Xu, Xiaodong
Wang, Bizhu
Lv, Suyu
Zhang, Zhidi
Sun, Mengying
Han, Shujun
Dong, Chen
Tao, Xiaofeng
Zhang, Ping
Publication Year :
2025

Abstract

Semantic communication (SemCom) is regarded as a promising and revolutionary technology in 6G, aiming to transcend the constraints of ``Shannon's trap" by filtering out redundant information and extracting the core of effective data. Compared to traditional communication paradigms, SemCom offers several notable advantages, such as reducing the burden on data transmission, enhancing network management efficiency, and optimizing resource allocation. Numerous researchers have extensively explored SemCom from various perspectives, including network architecture, theoretical analysis, potential technologies, and future applications. However, as SemCom continues to evolve, a multitude of security and privacy concerns have arisen, posing threats to the confidentiality, integrity, and availability of SemCom systems. This paper presents a comprehensive survey of the technologies that can be utilized to secure SemCom. Firstly, we elaborate on the entire life cycle of SemCom, which includes the model training, model transfer, and semantic information transmission phases. Then, we identify the security and privacy issues that emerge during these three stages. Furthermore, we summarize the techniques available to mitigate these security and privacy threats, including data cleaning, robust learning, defensive strategies against backdoor attacks, adversarial training, differential privacy, cryptography, blockchain technology, model compression, and physical-layer security. Lastly, this paper outlines future research directions to guide researchers in related fields.<br />Comment: 123 pages, 27 figures

Details

Database :
arXiv
Publication Type :
Report
Accession number :
edsarx.2501.00842
Document Type :
Working Paper