Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions

被引:18
作者
Kazmi, Syed Hussain Ali [1 ]
Hassan, Rosilah [1 ]
Qamar, Faizan [1 ]
Nisar, Kashif [2 ]
Ibrahim, Ag Asri Ag [3 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol FTSM, Ctr Cyber Secur, Bangi 43600, Selangor, Malaysia
[2] Victorian Inst Technol, Adelaide, SA 5000, Australia
[3] Univ Malaysia Sabah, Fac Comp & Informat, Jalan UMS, Kota Kinabalu 88400, Sabah, Malaysia
来源
SYMMETRY-BASEL | 2023年 / 15卷 / 06期
关键词
communication; security; vulnerabilities; 6G; authentication; threats; countermeasures; DENIABLE AUTHENTICATION; MILLIMETER-WAVE; PRIVACY; BLOCKCHAIN; NETWORKS; MANAGEMENT; INTERNET; SCHEME; 5G; TECHNOLOGIES;
D O I
10.3390/sym15061147
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Challenges faced in network security have significantly steered the deployment timeline of Fifth Generation (5G) communication at a global level; therefore, research in Sixth Generation (6G) security analysis is profoundly necessitated. The prerogative of this paper is to present a survey on the emerging 6G cellular communication paradigm to highlight symmetry with legacy security concepts along with asymmetric innovative aspects such Artificial Intelligence (AI), Quantum Computing, Federated Learning, etc. We present a taxonomy of the threat model in 6G communication in five security legacy concepts, including Confidentiality, Integrity, Availability, Authentication and Access control (CIA(3)). We also suggest categorization of threat-countering techniques specific to 6G communication into three types: cryptographic methods, entity attributes and Intrusion Detection System (IDS). Thus, with this premise, we distributed the authentication techniques in eight types, including handover authentication, mutual authentication, physical layer authentication, deniable authentication, token-based authentication, certificate-based authentication, key agreement-based authentication and multi-factor authentication. We specifically suggested a series of future research directions at the conclusive edge of this survey.
引用
收藏
页数:33
相关论文
共 46 条
  • [21] Network Security Threats and Defense Mechanisms for 6G Multi-Virtual Network Scenarios
    Zhou, Yu
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2025, 35 (02)
  • [22] The Role of Blockchain in 6G: Challenges, Opportunities and Research Directions
    Hewa, Tharaka
    Gur, Gurkan
    Kalla, Anshuman
    Ylianttila, Mika
    Braeken, An
    Liyanage, Madhusanka
    2020 2ND 6G WIRELESS SUMMIT (6G SUMMIT), 2020,
  • [23] Security risks and countermeasures of adversarial attacks on AI-driven applications in 6G networks: A survey
    Hoang, Van-Tam
    Ergu, Yared Abera
    Nguyen, Van-Linh
    Chang, Rong-Guey
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 232
  • [24] New directions for adapting intelligent communication and standardization towards 6G
    Kulkarni, Anjanabhargavi
    Goudar, R. H.
    Rathod, Vijayalaxmi
    Dhananjaya, G. M.
    Hukkeri, Geetabai S.
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2025, 12 (01):
  • [25] Emerging Technologies for 6G Communication Networks: Machine Learning Approaches
    Puspitasari, Annisa Anggun
    An, To Truong
    Alsharif, Mohammed H.
    Lee, Byung Moo
    SENSORS, 2023, 23 (18)
  • [26] Semantic Communication Empowered 6G Networks: Techniques, Applications, and Challenges
    Wang, Yining
    Han, Han
    Feng, Yixiao
    Zheng, Jianchao
    Zhang, Bo
    IEEE ACCESS, 2025, 13 : 28293 - 28314
  • [27] The Role of Optical Wireless Communication Technologies in 5G/6G and IoT Solutions: Prospects, Directions, and Challenges
    Chowdhury, Mostafa Zaman
    Shahjalal, Md
    Hasan, Moh Khalid
    Jang, Yeong Min
    APPLIED SCIENCES-BASEL, 2019, 9 (20):
  • [28] A Survey on Jamming Techniques in Physical Layer Security and Anti-Jamming Strategies for 6G
    Vaishnavi, K. N.
    Khorvi, Shubham Dashrath
    Kishore, Rajalekshmi
    Gurugopinath, Sanjeev
    2021 28TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2021, : 174 - 179
  • [29] Survey on Joint Paradigm of 5G and SDN Emerging Mobile Technologies: Architecture, Security, Challenges and Research Directions
    Kazmi, Syed Hussain Ali
    Qamar, Faizan
    Hassan, Rosilah
    Nisar, Kashif
    Chowdhry, Bhawani Shankar
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (04) : 2753 - 2800
  • [30] Metasurface Manipulation Attacks: Potential Security Threats of RIS-Aided 6G Communications
    Alakoca, Hakan
    Namdar, Mustafa
    Aldirmaz-Colak, Sultan
    Basaran, Mehmet
    Basgumus, Arif
    Durak-Ata, Lutfiye
    Yanikomeroglu, Halim
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (01) : 24 - 30