Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions

被引:18
作者
Kazmi, Syed Hussain Ali [1 ]
Hassan, Rosilah [1 ]
Qamar, Faizan [1 ]
Nisar, Kashif [2 ]
Ibrahim, Ag Asri Ag [3 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol FTSM, Ctr Cyber Secur, Bangi 43600, Selangor, Malaysia
[2] Victorian Inst Technol, Adelaide, SA 5000, Australia
[3] Univ Malaysia Sabah, Fac Comp & Informat, Jalan UMS, Kota Kinabalu 88400, Sabah, Malaysia
来源
SYMMETRY-BASEL | 2023年 / 15卷 / 06期
关键词
communication; security; vulnerabilities; 6G; authentication; threats; countermeasures; DENIABLE AUTHENTICATION; MILLIMETER-WAVE; PRIVACY; BLOCKCHAIN; NETWORKS; MANAGEMENT; INTERNET; SCHEME; 5G; TECHNOLOGIES;
D O I
10.3390/sym15061147
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Challenges faced in network security have significantly steered the deployment timeline of Fifth Generation (5G) communication at a global level; therefore, research in Sixth Generation (6G) security analysis is profoundly necessitated. The prerogative of this paper is to present a survey on the emerging 6G cellular communication paradigm to highlight symmetry with legacy security concepts along with asymmetric innovative aspects such Artificial Intelligence (AI), Quantum Computing, Federated Learning, etc. We present a taxonomy of the threat model in 6G communication in five security legacy concepts, including Confidentiality, Integrity, Availability, Authentication and Access control (CIA(3)). We also suggest categorization of threat-countering techniques specific to 6G communication into three types: cryptographic methods, entity attributes and Intrusion Detection System (IDS). Thus, with this premise, we distributed the authentication techniques in eight types, including handover authentication, mutual authentication, physical layer authentication, deniable authentication, token-based authentication, certificate-based authentication, key agreement-based authentication and multi-factor authentication. We specifically suggested a series of future research directions at the conclusive edge of this survey.
引用
收藏
页数:33
相关论文
共 46 条
  • [41] A survey on the use of blockchain for future 6G: Technical aspects, use cases, challenges and research directions
    Kalla, Anshuman
    de Alwis, Chamitha
    Porambage, Pawani
    Gur, Gurkan
    Liyanage, Madhusanka
    JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2022, 30
  • [42] IRS-Empowered 6G Networks: Deployment Strategies, Performance Optimization, and Future Research Directions
    Naeem, Faisal
    Kaddoum, Georges
    Khan, Saud
    Khan, Komal S.
    Adam, Nadir
    IEEE ACCESS, 2022, 10 : 118676 - 118696
  • [43] Multi-Antenna Array-Based Massive MIMO for B5G/6G: State of the Art, Challenges, and Future Research Directions
    Qamar, Faizan
    Kazmi, Syed Hussain Ali
    Ariffin, Khairul Akram Zainol
    Tayyab, Muhammad
    Nguyen, Quang Ngoc
    INFORMATION, 2024, 15 (08)
  • [44] A Survey From 1G to 5G Including the Advent of 6G: Architectures, Multiple Access Techniques, and Emerging Technologies
    Shah, A. F. M. Shahen
    2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 1117 - 1123
  • [45] A Fine-Grained Access Control and Security Approach for Intelligent Vehicular Transport in 6G Communication System
    Zhou, Zhili
    Gaurav, Akshat
    Gupta, Brij Bhooshan
    Lytras, Miltiadis D.
    Razzak, Imran
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (07) : 9726 - 9735
  • [46] Ultra-wideband fiber-THz-fiber seamless integration communication system toward 6G: architecture, key techniques, and testbed implementation
    Zhu, Min
    Zhang, Jiao
    Hua, Bingchang
    Lei, Mingzheng
    Cai, Yuancheng
    Tian, Liang
    Wang, Dongming
    Xu, Wei
    Zhang, Chuan
    Huang, Yongming
    Yu, Jianjun
    You, Xiaohu
    SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (01)