4.7 Article

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

Journal

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
Volume 23, Issue 4, Pages 2384-2428

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/COMST.2021.3108618

Keywords

Security; 6G mobile communication; Privacy; 5G mobile communication; Computer architecture; Systematics; Standards; 6G; security and privacy; AI security; physical layer security; connection security; service security

Funding

  1. Ministry of Science and Technology (MOST) of Taiwan [110-2811-E-194-501-MY2, 108-2221-E-194-022-MY3, 108-2221-E-194-019-MY3]
  2. Advanced Institute of Manufacturing with High-Tech Innovations (AIM-HI) through the Featured Areas Research Center Program by the Ministry of Education (MOE) in Taiwan
  3. Ministry of Education and Training (MOET) of Vietnam [B2021-TNA-02]
  4. Thai Nguyen University [B2021-TNA-02]

Ask authors/readers for more resources

6G mobile networks need to address diverse threats in a space-air-ground integrated network environment, with security and privacy issues still largely conceptual. Lessons learned from existing security architectures reveal new threat vectors from new technologies, with promising techniques like physical layer protection, quantum-safe communications, and AI security to mitigate attack magnitude.
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security and privacy issues for 6G remain largely in concept. This survey provides a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses. Two key lessons learned are as follows. First, other than inheriting vulnerabilities from the previous generations, 6G has new threat vectors from new radio technologies, such as the exposed location of radio stripes in ultra-massive MIMO systems at Terahertz bands and attacks against pervasive intelligence. Second, physical layer protection, deep network slicing, quantum-safe communications, artificial intelligence (AI) security, platform-agnostic security, real-time adaptive security, and novel data protection mechanisms such as distributed ledgers and differential privacy are the top promising techniques to mitigate the attack magnitude and personal data breaches substantially.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available