scispace - formally typeset
Open AccessJournal ArticleDOI

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

TLDR
In this article, the authors provide a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses.
Abstract
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security and privacy issues for 6G remain largely in concept. This survey provides a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses. Two key lessons learned are as follows. First, other than inheriting vulnerabilities from the previous generations, 6G has new threat vectors from new radio technologies, such as the exposed location of radio stripes in ultra-massive MIMO systems at Terahertz bands and attacks against pervasive intelligence. Second, physical layer protection, deep network slicing, quantum-safe communications, artificial intelligence (AI) security, platform-agnostic security, real-time adaptive security, and novel data protection mechanisms such as distributed ledgers and differential privacy are the top promising techniques to mitigate the attack magnitude and personal data breaches substantially.

read more

Citations
More filters
Journal ArticleDOI

Metaverse for Healthcare: A Survey on Potential Applications, Challenges and Future Directions

TL;DR: This article provides a comprehensive review of the Metaverse for healthcare, emphasizing on the state of the art, the enabling technologies for adopting the MetaVERSE, the potential applications and the related projects.
Journal ArticleDOI

Multifunctional graphene/carbon fiber aerogels toward compatible electromagnetic wave absorption and shielding in gigahertz and terahertz bands with optimized radar cross section

TL;DR: In this article , ultralight and mechanically durable graphene/carbon fiber composite aerogels (CGAs) are synthesized via solvothermal reaction and freeze-drying.
Journal ArticleDOI

Five Facets of 6G: Research Challenges and Opportunities

TL;DR: In this paper , the authors provide a critical appraisal of the literature of promising techniques ranging from the associated architectures, networking, and applications, as well as designs, and advocate a further evolutionary step toward multi-component Pareto optimization.
Journal ArticleDOI

Future outlook on 6G technology for renewable energy sources (RES)

TL;DR: In this paper , the authors provide a detailed insight into the full potential in 6G for the acceleration of renewable energy sources (RES) with the faster and stable data bandwidth, including P2P energy trade market, vehicular network, wireless energy transfer, energy management system, smart grid, self-healing, smart batteries and AI-based weather forecasting.
Posted Content

Towards 6G Internet of Things: Recent Advances, Use Cases, and Open Challenges

TL;DR: In this article, the authors present recent advances in the 6G wireless networks, including the evolution from 1G to 5G communications, the research trends for 6G, enabling technologies, and state-of-the-art 6G projects.
References
More filters
Journal ArticleDOI

Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges

TL;DR: The current state of development of the PETs in various fields is identified and whether the existing PETs comply with the latest legal principles and privacy standards and reduce the threats to privacy is examined.
Journal ArticleDOI

Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification

TL;DR: A novel Accumulative Authentication Tag (AAT) based on the symmetric-key cryptography to generate an authentication tag for each keyword is designed and the security analysis and the performance evaluation results show that the proposed scheme is secure and efficient.
Journal ArticleDOI

Ten Trends in the Cellular Industry and an Outlook on 6G

TL;DR: Light is shed on possible directions of 6G to help researchers jumpstart projects in this field while searching for new directions and breakthroughs.
Journal ArticleDOI

Pilot Spoofing Attack Detection and Countermeasure

TL;DR: This paper augments a recent approach with estimation of both legitimate receiver and eavesdropper channels, and secure beamforming, to mitigate the effects of pilot spoofing, and employs a random matrix theory-based source enumeration approach instead of MDL for spoofing detection, leading to improved detection performance.
Proceedings ArticleDOI

GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier

TL;DR: It is shown that an adversary can track subscribers’ location as in previous studies by using this predictability to show that the current implementation of the GUTI reallocation mechanism can provide enough security to protect subscriber’ privacy.