Intelligent Forensics in Next-Generation Mobile Networks: Evidence, Methods, and Applications
arXiv:2603.29364v1 Announce Type: new Abstract: This survey examines intelligent forensics in next-generation mobile networks, arguing that future wireless security must move beyond real-time detection toward accountable post-incident reconstruction. Unlike traditional digital forensics, wireless investigations rely on short-lived, distributed, and heterogeneous evidence, including radio waveforms, channel measurements, device-side artifacts, and network telemetry, affected by calibration, timing uncertainty, privacy constraints, and adversarial manipulation. To address this limitation, this paper develops an evidence-centric framework that treats wireless measurements as first-class forensic artifacts and organizes the field through a unified taxonomy spanning physical-layer, device-layer
View PDF HTML (experimental)
Abstract:This survey examines intelligent forensics in next-generation mobile networks, arguing that future wireless security must move beyond real-time detection toward accountable post-incident reconstruction. Unlike traditional digital forensics, wireless investigations rely on short-lived, distributed, and heterogeneous evidence, including radio waveforms, channel measurements, device-side artifacts, and network telemetry, affected by calibration, timing uncertainty, privacy constraints, and adversarial manipulation. To address this limitation, this paper develops an evidence-centric framework that treats wireless measurements as first-class forensic artifacts and organizes the field through a unified taxonomy spanning physical-layer, device-layer, network-layer, and cross-layer forensics. We further systematize the forensic workflow into readiness and preservation-by-design, acquisition, correlation and analysis, and reporting and reproducibility, while comparing the complementary roles of traditional methods and artificial intelligence-assisted techniques. Subsequently, we review major application areas, including anomaly discovery, attribution, provenance and localization, authenticity verification, and timeline reconstruction. Finally, we identify key open challenges, including domain shift, resource-aware evidence capture, and the benefits and admissibility risks of generative evidence. Overall, this paper positions wireless forensics as a foundational capability for trustworthy, auditable, and reproducible security in next-generation wireless systems. Readers can understand and streamline wireless forensics processes for specific applications, such as low-altitude wireless networks, vehicular communications, and edge general intelligence.
Subjects:
Signal Processing (eess.SP)
Cite as: arXiv:2603.29364 [eess.SP]
(or arXiv:2603.29364v1 [eess.SP] for this version)
https://doi.org/10.48550/arXiv.2603.29364
arXiv-issued DOI via DataCite (pending registration)
Submission history
From: Changyuan Zhao [view email] [v1] Tue, 31 Mar 2026 07:38:57 UTC (6,223 KB)
Sign in to highlight and annotate this article

Conversation starters
Daily AI Digest
Get the top 5 AI stories delivered to your inbox every morning.
More about
announceapplicationacquisition
Claude AI Source Code Leaked: Individual Rewriting in Rust to Address Security Concerns
<h2> Introduction & Background </h2> <p>In a turn of events that feels ripped from the pages of a tech thriller, the <strong>source code of Claude</strong>, Anthropic’s advanced AI model, has been <strong>accidentally leaked</strong>. Compounding the intrigue, an individual has taken it upon themselves to <strong>rewrite the codebase in Rust</strong>, a programming language celebrated for its <strong>memory safety</strong> and <strong>performance</strong>. This incident isn’t just a footnote in AI history—it’s a glaring spotlight on the <strong>systemic vulnerabilities</strong> in AI security and intellectual property protection. The stakes? Nothing short of the <strong>future of AI development</strong>, the <strong>competitive landscape of tech giants</strong>, and the <strong>public’

Compliance and Cost Governance for Landing Zones
<p>You’re seeing the usual symptoms: inconsistent or missing tags that wreck cost allocation, dozens of small misconfigurations that accumulate into significant spend, and audit trails that only tell you what went wrong after the bill lands. Those symptoms slow down teams, create finger-pointing between finance and engineering, and make continuous compliance a reactionary exercise instead of a platform feature .</p> <p>Contents</p> <ul> <li>[Why multi-account cost and compliance break down at scale]</li> <li>[Stop leaks with policy as code and tagging enforcement]</li> <li>[Detect cost anomalies and maintain continuous compliance reporting]</li> <li>[Make FinOps part of the landing zone lifecycle]</li> <li>[Practical checklist to operationalize cost governance in your landing zone]</li> </
Knowledge Map
Connected Articles — Knowledge Graph
This article is connected to other articles through shared AI topics and tags.
More in Analyst News

Today is the final day to save up to $150 on a PS5 before the price goes up
The cost of the PlayStation Portal and every PlayStation 5 console is going up tomorrow, April 2nd, by as much as $150 in some cases. That means time is running out if you want to save yourself the money you’d soon have to spend to secure a PS5, which is why I’m going to point […]
Opinion | Sayonara, Sora: OpenAI Says Fun Time Is Over - WSJ
<a href="https://news.google.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?oc=5" target="_blank">Opinion | Sayonara, Sora: OpenAI Says Fun Time Is Over</a> <font color="#6f6f6f">WSJ</font>
Raspberry Pi Hikes Prices By Up to $150 as the AI Bubble Hits Hard, Confirms Raspberry Pi 6 Plans - Hackster.io
<a href="https://news.google.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?oc=5" target="_blank">Raspberry Pi Hikes Prices By Up to $150 as the AI Bubble Hits Hard, Confirms Raspberry Pi 6 Plans</a> <font color="#6f6f6f">Hackster.io</font>
Discussion
Sign in to join the discussion
No comments yet — be the first to share your thoughts!