Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
TLDR
In this article, the authors provide a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses.Abstract:
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security and privacy issues for 6G remain largely in concept. This survey provides a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses. Two key lessons learned are as follows. First, other than inheriting vulnerabilities from the previous generations, 6G has new threat vectors from new radio technologies, such as the exposed location of radio stripes in ultra-massive MIMO systems at Terahertz bands and attacks against pervasive intelligence. Second, physical layer protection, deep network slicing, quantum-safe communications, artificial intelligence (AI) security, platform-agnostic security, real-time adaptive security, and novel data protection mechanisms such as distributed ledgers and differential privacy are the top promising techniques to mitigate the attack magnitude and personal data breaches substantially.read more
Citations
More filters
Journal ArticleDOI
Physical Layer Security Based Enabling Technologies for 6G Communications Values
TL;DR: In this paper , the security primitives built on physical layer parameters gain interest for the design of the wireless 6G networks, including safety, anonymity, scalability, sustainability, reliability, and resilience.
Journal ArticleDOI
A Survey of 6G Mobile Systems, Enabling Technologies, and Challenges
TL;DR: In this paper , the general characteristics of the sub-Terahertz band and channel losses are discussed along with the most significant 6G enabling technologies, including AI technology, Cell-Free Massive Multiple-Input-Multi-Output (CF massive MIMO), THz band antenna technologies, Non-Orthogonal Multiple Access (NOMA), energy harvesting scenarios, Free Space Optic (FSO) backhaul technology, and 6G security technologies.
Journal ArticleDOI
Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions
Sabih ur Rehman,M. A. Khan +1 more
TL;DR: In this paper , a comprehensive literature review of existing research has identified five key areas that impact IoT security for futuristic next generation networks, including human-centric issues and the mechanisms that can lead to loss of confidentiality.
Journal ArticleDOI
Networking Architectures and Protocols for IoT Applications in Smart Cities: Recent Developments and Perspectives
TL;DR: In this paper , the authors identify the networking requirements and characteristics of smart city applications, as well as the networking protocols that can be utilized to serve the diverse data traffic flows that are required between the dissimilar mechanisms.
Journal ArticleDOI
Low-Latency Communication Using Delay-Aware Relays Against Reactive Adversaries
TL;DR: In this article , a delay-aware cooperative framework was proposed to solve the optimization problem of computing the near-optimal energy-splitting factors that minimize the joint error rates at the destination.
References
More filters
Journal ArticleDOI
A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research Problems
TL;DR: This article identifies the primary drivers of 6G systems, in terms of applications and accompanying technological trends, and identifies the enabling technologies for the introduced 6G services and outlines a comprehensive research agenda that leverages those technologies.
Book ChapterDOI
NTRU: A Ring-Based Public Key Cryptosystem
TL;DR: NTRU encryption and decryption use a mixing system suggested by polynomial algebra combined with a clustering principle based on elementary probability theory to create a new public key cryptosystem.
Journal ArticleDOI
Enhancing security and privacy in biometrics-based authentication systems
TL;DR: The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented.
Journal ArticleDOI
Wireless Communications and Applications Above 100 GHz: Opportunities and Challenges for 6G and Beyond
Theodore S. Rappaport,Yunchou Xing,Ojas Kanhere,Shihao Ju,Arjuna Madanayake,Soumyajit Mandal,Ahmed Alkhateeb,Georgios C. Trichopoulos +7 more
TL;DR: This paper offers the first in-depth look at the vast applications of THz wireless products and applications and provides approaches for how to reduce power and increase performance across several problem domains, giving early evidence that THz techniques are compelling and available for future wireless communications.
Journal ArticleDOI
6G Wireless Networks: Vision, Requirements, Architecture, and Key Technologies
Zhengquan Zhang,Yue Xiao,Zheng Ma,Ming Xiao,Zhiguo Ding,Xianfu Lei,George K. Karagiannidis,Pingzhi Fan +7 more
TL;DR: This article presents a large-dimensional and autonomous network architecture that integrates space, air, ground, and underwater networks to provide ubiquitous and unlimited wireless connectivity and identifies several promising technologies for the 6G ecosystem.