Privacy-Aware Blockchain Innovation for 6G: Challenges and Opportunities

被引:50
作者
Nguyen, Tri [1 ]
Tran, Ngoc [2 ]
Loven, Lauri [1 ]
Partala, Juha [4 ]
Kechadi, M-Tahar [3 ]
Pirttikangas, Susanna [1 ]
机构
[1] Univ Oulu, Ctr Ubiquitous Comp, Oulu, Finland
[2] Univ Coll Dublin, Insight Ctr Data Analyt, Dublin, Ireland
[3] Univ Coll Dublin, Sch Comp Sci, Dublin, Ireland
[4] Univ Oulu, Ctr Machine Vis & Signal Anal, Oulu, Finland
来源
2020 2ND 6G WIRELESS SUMMIT (6G SUMMIT) | 2020年
基金
芬兰科学院; 爱尔兰科学基金会;
关键词
5G; 6G; blockchain; privacy; security; SECURITY;
D O I
10.1109/6gsummit49458.2020.9083832
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
6G wireless networks improve on 5G by further increasing reliability, speeding up the networks and increasing the available bandwidth. These evolutionary enhancements, together with a number of revolutionary improvements such as high precision 3D localization, ultra-high reliability and extreme mobility, introduce a new generation of 6G-native applications. Such application can be based on, for example, distributed, ubiquitous Artificial Intelligence (AI) and ultra-reliable, low-latency Internet of Things (IoT). Along with the enhanced connectivity and novel applications, privacy and security of the networks and the applications must be ensured. Distributed ledger technologies such as blockchain provide one solution for application security and privacy, but introduce their own set of security and privacy risks. In this work, we discuss the opportunities and challenges related to blockchain usage in 6G, and map out possible directions for overtaking the challenges.
引用
收藏
页数:5
相关论文
共 46 条
[1]  
Aazhang B., 2019, White Paper
[2]   Overview of 5G Security Challenges and Solutions [J].
Ahmad I. ;
Kumar T. ;
Liyanage M. ;
Okwuibe J. ;
Ylianttila M. ;
Gurtov A. .
IEEE Communications Standards Magazine, 2018, 2 (01) :36-43
[3]  
[Anonymous], 2019, QUANTUM REP
[4]   A Survey of Attacks on Ethereum Smart Contracts (SoK) [J].
Atzei, Nicola ;
Bartoletti, Massimo ;
Cimoli, Tiziana .
PRINCIPLES OF SECURITY AND TRUST (POST 2017), 2017, 10204 :164-186
[5]   Security and Privacy Frameworks for Access Control Big Data Systems [J].
Centonze, Paolina .
CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 59 (02) :361-374
[6]   On Scaling Decentralized Blockchains (A Position Paper) [J].
Croman, Kyle ;
Decker, Christian ;
Eyal, Ittay ;
Gencer, Adem Efe ;
Juels, Ari ;
Kosba, Ahmed ;
Miller, Andrew ;
Saxena, Prateek ;
Shi, Elaine ;
Sirer, Emin Gun ;
Song, Dawn ;
Wattenhofer, Roger .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2016, 9604 :106-125
[7]   Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond [J].
Dai, Yueyue ;
Xu, Du ;
Maharjan, Sabita ;
Chen, Zhuang ;
He, Qian ;
Zhang, Yan .
IEEE NETWORK, 2019, 33 (03) :10-17
[8]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260
[9]  
Ducas L, 2013, LECT NOTES COMPUT SC, V8042, P40, DOI 10.1007/978-3-642-40041-4_3
[10]   A Single Coin Monetary Mechanism for Distributed Cooperative Interference Management [J].
El Gamal, Aly ;
El Gamal, Hesham .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (03) :757-760