Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions

被引:27
作者
Kazmi, Syed Hussain Ali [1 ]
Hassan, Rosilah [1 ]
Qamar, Faizan [1 ]
Nisar, Kashif [2 ]
Ibrahim, Ag Asri Ag [3 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol FTSM, Ctr Cyber Secur, Bangi 43600, Selangor, Malaysia
[2] Victorian Inst Technol, Adelaide, SA 5000, Australia
[3] Univ Malaysia Sabah, Fac Comp & Informat, Jalan UMS, Kota Kinabalu 88400, Sabah, Malaysia
来源
SYMMETRY-BASEL | 2023年 / 15卷 / 06期
关键词
communication; security; vulnerabilities; 6G; authentication; threats; countermeasures; DENIABLE AUTHENTICATION; MILLIMETER-WAVE; PRIVACY; BLOCKCHAIN; NETWORKS; MANAGEMENT; INTERNET; SCHEME; 5G; TECHNOLOGIES;
D O I
10.3390/sym15061147
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Challenges faced in network security have significantly steered the deployment timeline of Fifth Generation (5G) communication at a global level; therefore, research in Sixth Generation (6G) security analysis is profoundly necessitated. The prerogative of this paper is to present a survey on the emerging 6G cellular communication paradigm to highlight symmetry with legacy security concepts along with asymmetric innovative aspects such Artificial Intelligence (AI), Quantum Computing, Federated Learning, etc. We present a taxonomy of the threat model in 6G communication in five security legacy concepts, including Confidentiality, Integrity, Availability, Authentication and Access control (CIA(3)). We also suggest categorization of threat-countering techniques specific to 6G communication into three types: cryptographic methods, entity attributes and Intrusion Detection System (IDS). Thus, with this premise, we distributed the authentication techniques in eight types, including handover authentication, mutual authentication, physical layer authentication, deniable authentication, token-based authentication, certificate-based authentication, key agreement-based authentication and multi-factor authentication. We specifically suggested a series of future research directions at the conclusive edge of this survey.
引用
收藏
页数:33
相关论文
共 172 条
[1]   Priority based dynamic spectrum management using Virtual Utility Functions in Cognitive Radio enabled Internet of Things [J].
Abbas, Laraib ;
Shoaib, Umar ;
Bashir, Ali Kashif .
COMPUTER COMMUNICATIONS, 2022, 196 :239-248
[2]  
Abdelhaq M., 2011, P 2011 INT C EL ENG, P1
[3]   Handover authentication latency reduction using mobile edge computing and mobility patterns [J].
Abdullah, Fatima ;
Kimovski, Dragi ;
Prodan, Radu ;
Munir, Kashif .
COMPUTING, 2021, 103 (11) :2667-2686
[4]  
Ahmed S., 2021, Data-Driven Mining, Learning and Analytics for Secured Smart Cities: Trends and Advances, P23, DOI [10.1007/978-3-030-72139-82, DOI 10.1007/978-3-030-72139-82]
[5]  
Al Mousa A., 2020, P 2020 2 INT C COMP, P1
[6]   THE D-OMA METHOD FOR MASSIVE MULTIPLE ACCESS IN 6G Performance, Security, and Challenges [J].
Al-Eryani, Yasser ;
Hossein, Ekram .
IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2019, 14 (03) :92-99
[7]  
Al-Mekhlafi Z.G., 2011, P 2011 7 INT C INFOR, P1
[8]   On The Use of Quantum Communications for Securing IoT Devices in the 6G Era [J].
Al-Mohammed, Hasan Abbas ;
Yaacoub, Elias .
2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
[9]   Interference Challenges and Management in B5G Network Design: A Comprehensive Review [J].
Alzubaidi, Osamah Thamer Hassan ;
Hindia, M. H. D. Nour ;
Dimyati, Kaharudin ;
Noordin, Kamarul Ariffin ;
Wahab, Amelia Natasya Abdul ;
Qamar, Faizan ;
Hassan, Rosilah .
ELECTRONICS, 2022, 11 (18)
[10]   Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff [J].
Aman, Muhammad Naveed ;
Taneja, Sachin ;
Sikdar, Biplab ;
Chua, Kee Chaing ;
Alioto, Massimo .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :2843-2859