Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
TLDR
In this article, the authors provide a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses.Abstract:
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security and privacy issues for 6G remain largely in concept. This survey provides a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses. Two key lessons learned are as follows. First, other than inheriting vulnerabilities from the previous generations, 6G has new threat vectors from new radio technologies, such as the exposed location of radio stripes in ultra-massive MIMO systems at Terahertz bands and attacks against pervasive intelligence. Second, physical layer protection, deep network slicing, quantum-safe communications, artificial intelligence (AI) security, platform-agnostic security, real-time adaptive security, and novel data protection mechanisms such as distributed ledgers and differential privacy are the top promising techniques to mitigate the attack magnitude and personal data breaches substantially.read more
Citations
More filters
Journal ArticleDOI
Metaverse for Healthcare: A Survey on Potential Applications, Challenges and Future Directions
Rajeswari Chengoden,Nancy Victor,Thien Huynh-The,Gokul Yenduri,Rutvij H. Jhaveri,Mamoun Alazab,Sweta Bhattacharya,Pawankumar Hegde,Praveen Kumar Reddy Maddikunta,Thippa Reddy Gadekallu +9 more
TL;DR: This article provides a comprehensive review of the Metaverse for healthcare, emphasizing on the state of the art, the enabling technologies for adopting the MetaVERSE, the potential applications and the related projects.
Journal ArticleDOI
Multifunctional graphene/carbon fiber aerogels toward compatible electromagnetic wave absorption and shielding in gigahertz and terahertz bands with optimized radar cross section
TL;DR: In this article , ultralight and mechanically durable graphene/carbon fiber composite aerogels (CGAs) are synthesized via solvothermal reaction and freeze-drying.
Journal ArticleDOI
Five Facets of 6G: Research Challenges and Opportunities
TL;DR: In this paper , the authors provide a critical appraisal of the literature of promising techniques ranging from the associated architectures, networking, and applications, as well as designs, and advocate a further evolutionary step toward multi-component Pareto optimization.
Journal ArticleDOI
Future outlook on 6G technology for renewable energy sources (RES)
TL;DR: In this paper , the authors provide a detailed insight into the full potential in 6G for the acceleration of renewable energy sources (RES) with the faster and stable data bandwidth, including P2P energy trade market, vehicular network, wireless energy transfer, energy management system, smart grid, self-healing, smart batteries and AI-based weather forecasting.
Posted Content
Towards 6G Internet of Things: Recent Advances, Use Cases, and Open Challenges
TL;DR: In this article, the authors present recent advances in the 6G wireless networks, including the evolution from 1G to 5G communications, the research trends for 6G, enabling technologies, and state-of-the-art 6G projects.
References
More filters
Journal ArticleDOI
Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges
TL;DR: The current state of development of the PETs in various fields is identified and whether the existing PETs comply with the latest legal principles and privacy standards and reduce the threats to privacy is examined.
Journal ArticleDOI
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification
TL;DR: A novel Accumulative Authentication Tag (AAT) based on the symmetric-key cryptography to generate an authentication tag for each keyword is designed and the security analysis and the performance evaluation results show that the proposed scheme is secure and efficient.
Journal ArticleDOI
Ten Trends in the Cellular Industry and an Outlook on 6G
TL;DR: Light is shed on possible directions of 6G to help researchers jumpstart projects in this field while searching for new directions and breakthroughs.
Journal ArticleDOI
Pilot Spoofing Attack Detection and Countermeasure
TL;DR: This paper augments a recent approach with estimation of both legitimate receiver and eavesdropper channels, and secure beamforming, to mitigate the effects of pilot spoofing, and employs a random matrix theory-based source enumeration approach instead of MDL for spoofing detection, leading to improved detection performance.
Proceedings ArticleDOI
GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier
TL;DR: It is shown that an adversary can track subscribers’ location as in previous studies by using this predictability to show that the current implementation of the GUTI reallocation mechanism can provide enough security to protect subscriber’ privacy.