scispace - formally typeset
Open AccessJournal ArticleDOI

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

TLDR
In this article, the authors provide a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses.
Abstract
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security and privacy issues for 6G remain largely in concept. This survey provides a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses. Two key lessons learned are as follows. First, other than inheriting vulnerabilities from the previous generations, 6G has new threat vectors from new radio technologies, such as the exposed location of radio stripes in ultra-massive MIMO systems at Terahertz bands and attacks against pervasive intelligence. Second, physical layer protection, deep network slicing, quantum-safe communications, artificial intelligence (AI) security, platform-agnostic security, real-time adaptive security, and novel data protection mechanisms such as distributed ledgers and differential privacy are the top promising techniques to mitigate the attack magnitude and personal data breaches substantially.

read more

Citations
More filters
Journal ArticleDOI

Metaverse for Healthcare: A Survey on Potential Applications, Challenges and Future Directions

TL;DR: This article provides a comprehensive review of the Metaverse for healthcare, emphasizing on the state of the art, the enabling technologies for adopting the MetaVERSE, the potential applications and the related projects.
Journal ArticleDOI

Multifunctional graphene/carbon fiber aerogels toward compatible electromagnetic wave absorption and shielding in gigahertz and terahertz bands with optimized radar cross section

TL;DR: In this article , ultralight and mechanically durable graphene/carbon fiber composite aerogels (CGAs) are synthesized via solvothermal reaction and freeze-drying.
Journal ArticleDOI

Five Facets of 6G: Research Challenges and Opportunities

TL;DR: In this paper , the authors provide a critical appraisal of the literature of promising techniques ranging from the associated architectures, networking, and applications, as well as designs, and advocate a further evolutionary step toward multi-component Pareto optimization.
Journal ArticleDOI

Future outlook on 6G technology for renewable energy sources (RES)

TL;DR: In this paper , the authors provide a detailed insight into the full potential in 6G for the acceleration of renewable energy sources (RES) with the faster and stable data bandwidth, including P2P energy trade market, vehicular network, wireless energy transfer, energy management system, smart grid, self-healing, smart batteries and AI-based weather forecasting.
Posted Content

Towards 6G Internet of Things: Recent Advances, Use Cases, and Open Challenges

TL;DR: In this article, the authors present recent advances in the 6G wireless networks, including the evolution from 1G to 5G communications, the research trends for 6G, enabling technologies, and state-of-the-art 6G projects.
References
More filters
Journal ArticleDOI

Physical Layer Secret Key Generation in Static Environments

TL;DR: In this paper, a low-complexity method called induced randomness is proposed to generate secret keys from the wireless channel in the presence of an eavesdropper, referred to as Eve, in order to use such keys for encryption and decryption.
Journal ArticleDOI

Semantic-Aware Searching Over Encrypted Data for Cloud Computing

TL;DR: This paper proposes ECSED, a novel semantic search scheme based on the concept hierarchy and the semantic relationship between concepts in the encrypted datasets, and employs the multi-keyword ranked search over encrypted cloud data as a basic frame to propose two secure schemes.
Journal ArticleDOI

Security and privacy in molecular communication and networking: opportunities and challenges.

TL;DR: The main motivation of this paper lies on providing some first insights about security and privacy aspects of MC systems by highlighting the open issues and challenges and above all by outlining some specific directions of potential solutions.
Proceedings ArticleDOI

Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations

TL;DR: In the process of unveiling the free data channels, this paper identifies a number of additional vulnerabilities of early VoLTE implementations, which lead to serious exploits, such as caller spoofing, over-billing, and denial-of-service attacks.
Journal ArticleDOI

Comparative Analysis of Control Plane Security of SDN and Conventional Networks

TL;DR: The concrete security analysis suggests that a distributed SDN architecture that supports fault tolerance and consistency checks is important for SDN control plane security, and provides a framework for comparative analysis which focuses on essential network properties required by typical production networks.