4.7 Article

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

期刊

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
卷 23, 期 4, 页码 2384-2428

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/COMST.2021.3108618

关键词

Security; 6G mobile communication; Privacy; 5G mobile communication; Computer architecture; Systematics; Standards; 6G; security and privacy; AI security; physical layer security; connection security; service security

资金

  1. Ministry of Science and Technology (MOST) of Taiwan [110-2811-E-194-501-MY2, 108-2221-E-194-022-MY3, 108-2221-E-194-019-MY3]
  2. Advanced Institute of Manufacturing with High-Tech Innovations (AIM-HI) through the Featured Areas Research Center Program by the Ministry of Education (MOE) in Taiwan
  3. Ministry of Education and Training (MOET) of Vietnam [B2021-TNA-02]
  4. Thai Nguyen University [B2021-TNA-02]

向作者/读者索取更多资源

6G mobile networks need to address diverse threats in a space-air-ground integrated network environment, with security and privacy issues still largely conceptual. Lessons learned from existing security architectures reveal new threat vectors from new technologies, with promising techniques like physical layer protection, quantum-safe communications, and AI security to mitigate attack magnitude.
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security and privacy issues for 6G remain largely in concept. This survey provides a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses. Two key lessons learned are as follows. First, other than inheriting vulnerabilities from the previous generations, 6G has new threat vectors from new radio technologies, such as the exposed location of radio stripes in ultra-massive MIMO systems at Terahertz bands and attacks against pervasive intelligence. Second, physical layer protection, deep network slicing, quantum-safe communications, artificial intelligence (AI) security, platform-agnostic security, real-time adaptive security, and novel data protection mechanisms such as distributed ledgers and differential privacy are the top promising techniques to mitigate the attack magnitude and personal data breaches substantially.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据