scispace - formally typeset
Open AccessJournal ArticleDOI

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

TLDR
In this article, the authors provide a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses.
Abstract
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security and privacy issues for 6G remain largely in concept. This survey provides a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses. Two key lessons learned are as follows. First, other than inheriting vulnerabilities from the previous generations, 6G has new threat vectors from new radio technologies, such as the exposed location of radio stripes in ultra-massive MIMO systems at Terahertz bands and attacks against pervasive intelligence. Second, physical layer protection, deep network slicing, quantum-safe communications, artificial intelligence (AI) security, platform-agnostic security, real-time adaptive security, and novel data protection mechanisms such as distributed ledgers and differential privacy are the top promising techniques to mitigate the attack magnitude and personal data breaches substantially.

read more

Citations
More filters
Journal ArticleDOI

Physical Layer Security Based Enabling Technologies for 6G Communications Values

TL;DR: In this paper , the security primitives built on physical layer parameters gain interest for the design of the wireless 6G networks, including safety, anonymity, scalability, sustainability, reliability, and resilience.
Journal ArticleDOI

A Survey of 6G Mobile Systems, Enabling Technologies, and Challenges

TL;DR: In this paper , the general characteristics of the sub-Terahertz band and channel losses are discussed along with the most significant 6G enabling technologies, including AI technology, Cell-Free Massive Multiple-Input-Multi-Output (CF massive MIMO), THz band antenna technologies, Non-Orthogonal Multiple Access (NOMA), energy harvesting scenarios, Free Space Optic (FSO) backhaul technology, and 6G security technologies.
Journal ArticleDOI

Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions

Sabih ur Rehman, +1 more
- 03 Apr 2023 - 
TL;DR: In this paper , a comprehensive literature review of existing research has identified five key areas that impact IoT security for futuristic next generation networks, including human-centric issues and the mechanisms that can lead to loss of confidentiality.
Journal ArticleDOI

Networking Architectures and Protocols for IoT Applications in Smart Cities: Recent Developments and Perspectives

TL;DR: In this paper , the authors identify the networking requirements and characteristics of smart city applications, as well as the networking protocols that can be utilized to serve the diverse data traffic flows that are required between the dissimilar mechanisms.
Journal ArticleDOI

Low-Latency Communication Using Delay-Aware Relays Against Reactive Adversaries

TL;DR: In this article , a delay-aware cooperative framework was proposed to solve the optimization problem of computing the near-optimal energy-splitting factors that minimize the joint error rates at the destination.
References
More filters
Journal ArticleDOI

A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research Problems

TL;DR: This article identifies the primary drivers of 6G systems, in terms of applications and accompanying technological trends, and identifies the enabling technologies for the introduced 6G services and outlines a comprehensive research agenda that leverages those technologies.
Book ChapterDOI

NTRU: A Ring-Based Public Key Cryptosystem

TL;DR: NTRU encryption and decryption use a mixing system suggested by polynomial algebra combined with a clustering principle based on elementary probability theory to create a new public key cryptosystem.
Journal ArticleDOI

Enhancing security and privacy in biometrics-based authentication systems

TL;DR: The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented.
Journal ArticleDOI

Wireless Communications and Applications Above 100 GHz: Opportunities and Challenges for 6G and Beyond

TL;DR: This paper offers the first in-depth look at the vast applications of THz wireless products and applications and provides approaches for how to reduce power and increase performance across several problem domains, giving early evidence that THz techniques are compelling and available for future wireless communications.
Journal ArticleDOI

6G Wireless Networks: Vision, Requirements, Architecture, and Key Technologies

TL;DR: This article presents a large-dimensional and autonomous network architecture that integrates space, air, ground, and underwater networks to provide ubiquitous and unlimited wireless connectivity and identifies several promising technologies for the 6G ecosystem.