Security Requirements and Challenges of 6G Technologies and Applications

被引:85
作者
Hakeem, Shimaa A. Abdel [1 ,2 ]
Hussein, Hanan H. [2 ]
Kim, HyungWon [1 ]
机构
[1] Chungbuk Natl Univ, Sch Elect Engn, Cheongju 28644, South Korea
[2] Elect Res Inst ERI, Cairo 12622, Egypt
基金
新加坡国家研究基金会;
关键词
6G security; privacy; new challenges; security architecture; security threats; physical layer security; AI/ML security; VISIBLE-LIGHT COMMUNICATION; DECENTRALIZED NETWORK; LOW-LATENCY; 5G; BLOCKCHAIN; SYSTEMS; VISION; INTELLIGENCE; PRIVACY; OPPORTUNITIES;
D O I
10.3390/s22051969
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
After implementing 5G technology, academia and industry started researching 6th generation wireless network technology (6G). 6G is expected to be implemented around the year 2030. It will offer a significant experience for everyone by enabling hyper-connectivity between people and everything. In addition, it is expected to extend mobile communication possibilities where earlier generations could not have developed. Several potential technologies are predicted to serve as the foundation of 6G networks. These include upcoming and current technologies such as post-quantum cryptography, artificial intelligence (AI), machine learning (ML), enhanced edge computing, molecular communication, THz, visible light communication (VLC), and distributed ledger (DL) technologies such as blockchain. From a security and privacy perspective, these developments need a reconsideration of prior security traditional methods. New novel authentication, encryption, access control, communication, and malicious activity detection must satisfy the higher significant requirements of future networks. In addition, new security approaches are necessary to ensure trustworthiness and privacy. This paper provides insights into the critical problems and difficulties related to the security, privacy, and trust issues of 6G networks. Moreover, the standard technologies and security challenges per each technology are clarified. This paper introduces the 6G security architecture and improvements over the 5G architecture. We also introduce the security issues and challenges of the 6G physical layer. In addition, the AI/ML layers and the proposed security solution in each layer are studied. The paper summarizes the security evolution in legacy mobile networks and concludes with their security problems and the most essential 6G application services and their security requirements. Finally, this paper provides a complete discussion of 6G networks' trustworthiness and solutions.
引用
收藏
页数:43
相关论文
共 177 条
[91]   Comparison of Channel Coding Schemes for Molecular Communications Systems [J].
Lu, Yi ;
Higgins, Matthew D. ;
Leeson, Mark S. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (11) :3991-4001
[92]   Indoor Positioning Systems Based on Visible Light Communication: State of the Art [J].
Luo, Junhai ;
Fan, Liying ;
Li, Husheng .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (04) :2871-2893
[93]   Security and eavesdropping in terahertz wireless links [J].
Ma, Jianjun ;
Shrestha, Rabi ;
Adelberg, Jacob ;
Yeh, Chia-Yi ;
Hossain, Zahed ;
Knightly, Edward ;
Jornet, Josep Miquel ;
Mittleman, Daniel M. .
NATURE, 2018, 563 (7729) :89-+
[94]  
Mahmood N. H., 2020, arXiv:2004.14146, V11
[95]  
Mahmoodi T., 2015, 5G RADIO TECHNOLOGY, P1
[96]   Blockchain-Empowered Framework for Decentralized Network Management in 6G [J].
Maksymyuk, Taras ;
Gazda, Juraj ;
Volosin, Marcel ;
Bugar, Gabriel ;
Horvath, Denis ;
Klymash, Mykhailo ;
Dohler, Mischa .
IEEE COMMUNICATIONS MAGAZINE, 2020, 58 (09) :86-92
[97]   Study and Validation of Eavesdropping Scenarios over a Visible Light Communication Channel [J].
Marin-Garcia, Ignacio ;
Guerra, Victor ;
Perez-Jimenez, Rafael .
SENSORS, 2017, 17 (11)
[98]   Survey on Threats and Attacks on Mobile Networks [J].
Mavoungou, Silvere ;
Kaddoum, Georges ;
Taha, Mostafa ;
Matar, Georges .
IEEE ACCESS, 2016, 4 :4543-4572
[99]   CHALLENGES AND NOVEL SOLUTIONS FOR 5G NETWORK SECURITY, PRIVACY AND TRUST [J].
Mazurczyk, Wojciech ;
Bisson, Pascal ;
Jover, Roger Piqueras ;
Nakao, Koji ;
Cabaj, Krzysztof .
IEEE WIRELESS COMMUNICATIONS, 2020, 27 (04) :6-7
[100]   Ethical Challenges Associated with the Development and Deployment of Brain Computer Interface Technology [J].
McCullagh, Paul ;
Lightbody, Gaye ;
Zygierewicz, Jaroslaw ;
Kernohan, W. George .
NEUROETHICS, 2014, 7 (02) :109-122