Security Requirements and Challenges of 6G Technologies and Applications
<p>The 5G and 6G features comparison.</p> "> Figure 2
<p>The security evolution of mobile communications from 1G to the predicted future 6G.</p> "> Figure 3
<p>The expected improvements and changes in the 6G security architecture.</p> "> Figure 4
<p>The 6G visible light communication technology attacks and threats.</p> "> Figure 5
<p>The 6G molecular communication attacks and threats.</p> "> Figure 6
<p>The 6G AI/ML security architecture, and different attacks in each layer.</p> "> Figure 7
<p>The 6G AI/ML security challenges and threat scope.</p> "> Figure 8
<p>The 6G blockchain technology attacks and threats.</p> "> Figure 9
<p>The most essential 6G applications in different technologies.</p> "> Figure 10
<p>The wireless brain-computer interaction attacks and threats.</p> ">
Abstract
:1. Introduction
- Introducing the security issues in the earlier legacy mobile networks.
- Presenting the 5G security architecture improvements and their effect on the new architecture of 6G.
- Presenting the trending 6G technologies and studying the security requirements of each technology.
- Studying the 6G applications and services requirements.
- Presenting the 6G applications security problems and proposed solutions.
2. Security Evolution of Mobile Cellular Networks
2.1. Security Issues in 1G, 2G, and 3G
2.2. Security Issues in 4G and 5G
2.3. 5G Security Improvements
2.4. Conclusions of Mobile Networks Security
- Improving technology security before deployment is crucial. Support for an old protocol by a new protocol may reveal flaws. The fundamental cause is the incompatibility of two network security standards.
- Compatibility is frequently circumvented by requesting outdated architecture authentication. This access control method may reveal previous issues. Unwanted downgrades [52,53,54] push 4G-LTE devices onto old networks. Based on the absence of mutual verification between UE and authentication servers in 2G/3G standards, the attacker may then access the UE’s IMSI. It should be noted that dual network access authentication and identity management are security problems for 6G. More changes in protocol implementations than protocol designs decrease new vulnerabilities while improving vulnerability repairs.
- Large-scale essential equipment upgrades are necessary for AKA and subscriber identity management. Many operators and consumers may be financially impacted. Extensive security testing is required before implementing a new architectural or protocol design. Implementing protocol security patches or upgrading intrusion prevention systems at endpoints is feasible.
- A long-term design change is still necessary to fix the present architecture’s flaws and weaknesses.
- Mutual authentication and end to end encryption remain unsolved issues. Lack of these two properties causes false operators, eavesdropping, and tracing attacks. Due to high computational and communication demands, 5G is unlikely to meet these security standards. Encryption and mutual authentication in 6G may damage latency-sensitive services.
3. 6G Network Vision and Essential Research Projects
3.1. 6G Network Vision
3.2. The 6G Essential Projects
- Hexa-x
- RISE 6G
- New-6G
- Network architecture and optimization.
- Protocols and data flow.
- Security of information and infrastructures.
- Integrated circuits, digital components, high-performance radio frequencies, and low energy consumption.
- Dedicated, high-performance, and sustainable semiconductor technologies.
- New mechanisms will be offered by NEW-6G to exploit nano-electronics technology. Nano-electronics technology will be explored to open new research issues for academia and industries.
- Next G Alliance
4. 6G Security Requirements and Proposed Security Architecture
4.1. 6G Security Architecture Requirements
- Virtualization Security Solution: Virtualization security concerns need the use of a system with a secure virtualization layer, which includes a security technology that identifies concealed harmful software, such as rootkits. In addition, the hypervisor must enable total separation of computing, storage, and the network of different network services using secure protocols such as TLS, SSH, VPN, and so forth. Virtual machine introspection (VMI) is a feature of the hypervisor that examines and identifies security risks by analyzing the vCPU register information, file IO, and communication packets of each virtual machine (VM) to prevent infiltration. When using containerization, the operating system should appropriately set the different containers’ privileges and prevent the mounting of essential system directories and direct access to the host device file container.
- Automated Management System: To manage vulnerabilities caused by the use, update, and disposal of open sources is the most important thing to do when addressing open source security issues. That is why fast detection of threats necessitates an automated management system that can discover vulnerabilities and apply patches. An additional step is needed to ensure that the patched software is applied quickly and securely using the secure OTA technique. Furthermore, a security governance framework must be established to handle (1) open source vulnerabilities from a long-term view, (2) changes in the developer’s perception, and (3) the deployment of security solutions.
- Data security using AI: To guarantee that AI systems are safe from AML, they must be transparent about how they safeguard their users and the mobile communication system from AML. Creating AI models in a dependable system is the first step in the process. Additionally, a method such as digital signatures must be used to verify if the AI models running in user equipment (UE), radio access networks (RAN), and the core have been maliciously updated or altered by a hostile assault. When a harmful AI model is found, a system must conduct self-healing or recovery operations. The system should also restrict the data gathering for AI training to trustworthy network parts.
- Users’ Privacy-preserving: Users’ personal information should be stored and used in accordance with agreed-upon protocols between the service provider, the mobile network operator (MNO), the subscriber, and the MNO in order to ensure their safety. Personal information is kept secure in a trusted execution environment (TEE) and dependable SW by the 6G system, which also reduces or anonymizes the amount of information that is made publicly available when it is used. Authenticity and authorization must be verified before MNO releases personal information. Another option is to utilize homomorphic encryption (HE) when dealing with user information so that the data may be accessed in an encrypted form. AI-based solutions, such as a learning-based privacy-aware offloading scheme, may also be used to preserve the privacy of the user’s location and use patterns.
- Post-Quantum Cryptography: The 6G system has to get rid of existing asymmetric key encryption techniques since quantum computers will make them insecure. Post-quantum cryptography (PQC) solutions, such as lattice-based cryptography, code-based cryptography, multivariate polynomial cryptography, and hash-based signature, have been the focus of many researchers. As part of its PQC study, the US National Institute of Standards and Technology (NIST) is scheduled to pick the best PQC algorithms between 2022 and 2024. In comparison to Rivest–Shamir–Adleman (RSA), the key length presently under consideration for PQC is projected to be many times larger. PQCs are likely to have a larger computational cost than the current RSA method. As a result, it is essential that PQC be appropriately integrated into the 6G network’s HW/SW performance and service needs.
4.2. Proposed Security Architecture of 6G
- Network Access Security: 6G demands new authentication and cryptography systems. They are 6G-AKA, quantum-safe cryptography, and physical layer security. The motivation for cloud-based and open-programmable networking technologies in 6G necessitates a new authentication so that 6G may use 5G’s security concepts, such as a single authentication platform for open-access networks. Numerous additional functions are required to complete them. For example, a 6G-AKA protocol must guarantee which component, Authentication Server Function (AUSF) or Security Anchor Function (SEAF), would determine authentication in cross-slice communications. 6G-AKA must be able to authenticate an endpoint’s claimed identification in a deep-sliced, programmable networking infrastructure. Physical layer security can defend 6G IoT networks from dangers, including impersonation attacks, and improve network access management. The most significant difference in 6G subscriber administration compared to 5G is introducing a new user identity management approach.
- Network Domain Security: There will be a need for new open authentication methods because of the extension of 6G to non-terrestrial networks such as satellite and marine communications.
- User Domain Security: Authentication using biometrics or a password-free service to access control mechanisms has been a long-awaited feature for 6G security. Many applications have relied on password-based security methods for decades. Unfortunately, there are several drawbacks. Some may be easily hacked, expensive to store, and difficult to remember. Brainwave/heartbeat-based authentication might deliver a more secure and improved user experience in the future.
- Application domain security: Both parties must authenticate themselves for 6G trust networks to operate. Symmetric-key mutual authentication is still in use in 5G. However, 6G networks may benefit from blockchain and Distributed Ledger Technologies (DLT).
- Service-based architecture security: When it comes to 6G, the service-based security architecture used in 5G is updated to an end to end, service-based, and policy-based security architecture. Domain security is a pillar of the 5G security architecture built on a service-based architecture. Taking this feature to the next level, 6G will use end to end service-based architecture, or perhaps policy-based architecture domain security, to meet the needs of personalization and micro-deployment flexibility while maintaining high levels of security.
5. 6G Promising Technologies Security Challenges and Possible Attacks
5.1. 6G Physical Layer Technologies
- Terahertz communications (THz)
- Firstly, the THz communication technology may support 100 Gbps or greater data.
- Secondly, eavesdropping would be decreased, resulting in greater communication security due to the narrow beam and short pulse length of the transmitters.
- Thirdly, it is constrained to attenuate THz vibrations by specific materials.
- Visible light communications (VLC)
- Confidentiality: It restricts the access to data only for intended recipients and prevents the information from being disclosed to side organizations.
- Integrity: To ensure the correctness of the information sent while the authenticity verifies the network node identification.
- Authentication: Depends on identity authentication and information authentication. The first one is to ensure the identity of the access person, while information authenticity provides that no one changes the transmitted information. Both authentication parts are required to ensure the security of the information and resources.
- Availability: Is the ability of users to connect to the wireless network at any time and from any location.
- Molecular communication
5.2. AI/ML Technology
- Trustworthiness: The reliability of machine learning models and components becomes important when AI handles network security.
- Visibility: Monitoring security functions based on AI and ML in real time to ensure control and credibility.
- Ethical and Legal Aspects: Optimization techniques based on AI can limit some customers or applications. AI-powered security solutions are uniform in their protection of all users or not; who is responsible for security services’ failure controlled by AI.
- Extensibility and viability: Secure data transfers are necessary to ensure the privacy of federated learners. Scalability of the required computing, communication, and storage resources is a challenge for AI/ML.
- Controlled security tasks: Much overhead may result when AI/ML security solutions are associated with significant data processes.
- Models’ flexibility should be secure and flexible in the learning and inference steps.
- Intelligent sensing layer (Radio layer)
- Intelligent edge layer
- Intelligent control layer
- Intelligent application layer
5.3. Quantum Communication
5.4. Distributed Ledger Technology
- Attack of majority: This is called a 51% attack; when malicious people take 51 percent or more of blockchain nodes, they may succeed in network control. By majority attack, attackers may modify the transaction history and block the confirmation of future official transactions. Therefore, the majority voting blockchain systems based on consensus are generally vulnerable to 51% attacks [125].
- Double-spending attack: A key component of most blockchain systems is spending the cryptographic token. However, since there are no physical notes, there is a threat that a user spends a single ticket several times. These are recognized as double-spending attacks, and systems based on the blockchain should provide solutions to prevent them [125].
- A re-entrance attack: This happens when a smart contract contacts another smart contract frequently. The secondary smart contract that was initiated may be vulnerable. Such an attack, for example, was conducted against the Decentralized Autonomous Organization (DAO) in 2016. Unknown hackers stole USD 50 million in Ethers [125].
- Sybil attacks: This type of attack happens when attackers or many attackers try to capture a peer-to-peer blockchain network by establishing fake identifications. Sybil attacks are more common in blockchain systems with restricted and automated member addition methods [125].
- Privacy attacks: Smart contracts and blockchains are prone to security and privacy concerns, including transaction data leakage, smart contract logic leakage, user privacy leakage, and privacy leakage during smart contract execution.
6. 6G Applications’ Security Challenges
6.1. Unmanned Aerial Vehicle (UAV) Applications
- (1)
- High altitude: UAV systems always fly higher than typical mobile users and base stations. There are no obstacles in the wireless connection between the base station and the UAV. Thus, air–ground channels are less susceptible to scattering and have lower route losses than the traditional terrestrial channels. The Line of Sight (LoS) channels provide more excellent dependability and lower route loss in air–ground transmissions than non-Line of Sight (NLoS) terrestrial communications. However, LoS channels cause significant interference with other nodes coexisting in the wireless network. Hence, the three-dimensional location in the space for UAVs must be studied to take advantage of the LoS channels.
- (2)
- High mobility: Typically, nodes in traditional communications are located in fixed places. UAVs are controlled to fly at high speeds in three-dimensional space remotely. UAVs can be deployed in diverse ways to create wireless connections. This feature is more worthwhile for emergency cases such as military activity and disaster relief. Moreover, the mobility of UAVs may be used to maneuver closer to the targeted user to maximize the gain of the channel and avoid obstructions. Thus, the UAV’s trajectory may be optimized for improved communication performance.
- (3)
- Limited Energy: UAVs have limited energy due to their weight and size limitations. Additionally, UAVs must supply energy for both communications and push simultaneously. Thus, the propulsion energy consumption required to keep the UAV flying is much more than the conventional energy consumption. Consequently, it requires an energy-efficient design to maximize its lifetime.
6.2. Holographic Applications
6.3. Extended Reality
6.4. Connected Autonomous Vehicles
6.5. Industry 5.0
6.6. Smart Grid 2.0
6.7. Digital Healthcare
6.8. Digital Twins (a Digital Reflection of the Real World)
6.9. Brain–Computer Interactions (BCI)
6.10. Distributed Ledger Applications
7. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Khan, R.; Kumar, P.; Jayakody, D.; Liyanage, M. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions. IEEE Commun. Surv. Tutor. 2020, 22, 196–248. [Google Scholar] [CrossRef] [Green Version]
- Yazar, A.; Dogan-Tusha, S.; Arslan, H. 6G vision: An ultra-flexible perspective, ITU. J. Future Evol. Technol. 2020, 1, 121–140. [Google Scholar]
- Alwis, C.; Kalla, A.; Pham, Q.-V.; Kumar, P.; Dev, K.; Hwang, W.-J.; Liyanage, M. Survey on 6G Frontiers: Trends, Applications, Requirements, Technologies and Future Research. IEEE Open J. Commun. Soc. 2021, 2, 836–886. [Google Scholar] [CrossRef]
- Ray, P.; Kumar, N.; Guizani, M. A Vision on 6G-Enabled NIB: Requirements, Technologies, Deployments, and Prospects. IEEE Wirel. Commun. 2021, 28, 120–127. [Google Scholar] [CrossRef]
- Gui, G.; Liu, M.; Tang, F.; Kato, N.; Adachi, F. 6G: Opening new horizons for integration of comfort, security, and intelligence. IEEE Wirel. Commun. 2020, 27, 126–132. [Google Scholar] [CrossRef]
- Letaief, K.B.; Chen, W.; Shi, Y.; Zhang, J.; Zhang, Y.-J.A. The Roadmap to 6G: AI Empowered Wireless Networks. IEEE Commun. Mag. 2019, 57, 84–90. [Google Scholar] [CrossRef] [Green Version]
- Sheth, K.; Patel, K.; Shah, H.; Tanwar, S.; Gupta, R.; Kumar, N. A taxonomy of AI techniques for 6G communication networks. Comput. Commun. 2020, 161, 279–303. [Google Scholar] [CrossRef]
- Yang, H.; Alphones, A.; Xiong, Z.; Niyato, D.; Zhao, J.; Wu, K. Artificial-Intelligence-Enabled Intelligent 6G Networks. IEEE Netw. 2020, 34, 272–280. [Google Scholar] [CrossRef]
- Huang, T.; Yang, W.; Wu, J.; Ma, J.; Zhang, X.; Zhang, D. A Survey on Green 6G Network: Architecture and Technologies. IEEE Access 2019, 7, 175758–175768. [Google Scholar] [CrossRef]
- Rupprecht, D.; Dabrowski, A.; Holz, T.; Weippl, E.; Popper, C. On security research towards future mobile network generations. IEEE Commun. Surv. Tutor. 2018, 20, 2518–2542. [Google Scholar] [CrossRef] [Green Version]
- Pereira, V.; Sousa, T. Evolution of Mobile Communications: From 1G to 4G; Department of Informatics Engineering, University of Coimbra: Coimbra, Portugal, 2004. [Google Scholar]
- Goyal, J.; Singla, K.; Singh, S. A Survey of Wireless Communication Technologies from 1G to 5G. In Seond International Conference on Computer Networks and Inventive Communication Technologies; Springer: Berlin/Heidelberg, Germany, 2019; pp. 613–624. [Google Scholar]
- Zhang, S.; Wang, Y.; Zhou, W. Towards secure 5G networks: A Survey. Comput. Netw. 2019, 162, 106871. [Google Scholar] [CrossRef]
- Li, Y.; Yu, Y.; Susilo, W.; Hong, Z.; Guizani, M. Security and Privacy for Edge Intelligence in 5G and Beyond Networks: Challenges and Solutions. IEEE Wirel. Commun. 2021, 28, 63–69. [Google Scholar] [CrossRef]
- Kato, N.; Mao, B.; Tang, F.; Kawamoto, Y.; Liu, J. Ten Challenges in Advancing Machine Learning Technologies toward 6G. IEEE Wirel. Commun. 2020, 27, 96–103. [Google Scholar] [CrossRef]
- Ramezani, P.; Jamalipour, A. Toward the Evolution of Wireless Powered Communication Networks for the Future Internet of Things. IEEE Netw. 2017, 31, 62–69. [Google Scholar] [CrossRef]
- Pelkmans, J. The GSM Standard: Explaining a success story. J. Eur. Public Policy 2001, 8, 432–453. [Google Scholar] [CrossRef]
- Cattaneo, G.; Maio, G.; Faruolo, P.; Petrillo, U.F. A review of security attacks on the gsm standard. In Information and Communication Technology; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2013; pp. 507–512. [Google Scholar]
- Gope, P.; Hwang, T. Enhanced secure mutual authentication and key AGREEMENT scheme preserving user anonymity in global mobile networks. Wirel. Pers. Commun. 2015, 82, 2231–2245. [Google Scholar] [CrossRef]
- Brookson, C. Gsm security: A description of the reasons for security and the techniques. In Proceedings of the IEE Colloquium on Security and Cryptography Applications to Radio Systems, London, UK, 3 June 1994; pp. 2/1–2/4. [Google Scholar]
- Arapinis, M.; Mancini, L.I.; Ritter, E.; Ryan, M. Privacy through pseudonymity in mobile telephony systems. In Proceedings of the 2014 Network and Distributed System Security Symposium, San Diego, CA, USA, 23–26 February 2014. [Google Scholar]
- Karjaluoto, H. An investigation of third Generation (3g) mobile technologies and services. Contemp. Manag. Res. 2007, 2, 91. [Google Scholar] [CrossRef]
- Saxena, N.; Chaudhari, N.S. Secure-aka: An efficient aka protocol for umts networks. Wirel. Pers. Commun. 2014, 78, 1345–1373. [Google Scholar] [CrossRef]
- Jefferies, N. Security in Third-Generation mobile systems. In Proceedings of the IEE Colloquium on Security in Networks, London, UK, 3 February 1995. [Google Scholar]
- La Porta, T.F. Security and IP-based 3G wireless networks. In Proceedings of the 14th International Conference on Computer Communications and Networks, San Diego, CA, USA, 17–19 October 2005; p. 211. [Google Scholar]
- Zahariadis, T.; Kazakos, D. (R)evolution toward 4G mobile communication systems. IEEE Wirel. Commun. 2003, 10, 6–7. [Google Scholar] [CrossRef]
- Bikos, A.N.; Sklavos, N. LTE/SAE security issues on 4G wireless networks. IEEE Secur. Priv. 2013, 11, 55–62. [Google Scholar] [CrossRef]
- Park, Y.; Park, T. A survey of security threats on 4G networks. In Proceedings of the 2007 IEEE Globecom Workshops, Washington, DC, USA, 26–30 November 2007; IEEE: Piscataway, NJ, USA, 2007; pp. 1–6. [Google Scholar]
- Goyal, P.; Batra, S.; Singh, A. A literature review of security attack in mobile ad-hoc networks. Int. J. Comput. Appl. 2010, 9, 11–15. [Google Scholar] [CrossRef]
- Kim, S.J.; Lee, H.; Lee, M. A Study of 4G Network for Security System. Int. J. Adv. Cult. Technol. 2015, 3, 77–86. [Google Scholar] [CrossRef] [Green Version]
- Mohapatra, S.K.; Swain, B.R.; Das, P. Comprehensive survey of possible security issues on 4G networks. Int. J. Netw. Secur. Its Appl. 2015, 7, 61–69. [Google Scholar] [CrossRef]
- Panwar, N.; Sharma, S.; Singh, A.K. A survey on 5G: The next generation of mobile communication. Phys. Commun. 2016, 18, 64–84. [Google Scholar] [CrossRef] [Green Version]
- Akpakwu, G.A.; Silva, B.J.; Hancke, G.P.; Abu-Mahfouz, A.M. A survey on 5G networks for the internet of things: Communication technologies and challenges. IEEE Access 2018, 6, 3619–3647. [Google Scholar] [CrossRef]
- Wang, C.-X.; Haider, F.; Gao, X.; You, X.-H.; Yang, Y.; Yuan, D.; Aggoune, H.; Haas, H.; Fletcher, S.; Hepsaydir, E. Cellular architecture and key technologies for 5G wireless communication networks. IEEE Commun. Mag. 2014, 52, 122–130. [Google Scholar] [CrossRef] [Green Version]
- Thompson, J.; Ge, X.; Wu, H.-C.; Irmer, R.; Jiang, H.; Fettweis, G.; Alamouti, S. 5G wireless communication Systems: Prospects and challenges. IEEE Commun. Mag. 2014, 52, 62–64. [Google Scholar] [CrossRef]
- Soldani, D.; Innocenti, M. 5G communication systems and Connected healthcare. In Enabling 5G Communication Systems to Support Vertical Industries; Wiley: New York, NY, USA, 2019; pp. 149–177. [Google Scholar]
- Liu, G.; Jiang, D. 5G: Vision and requirements for mobile communication system towards year 2020. Chin. J. Eng. 2016, 2016, 8. [Google Scholar] [CrossRef] [Green Version]
- Mahmoodi, T. 5G and Software-Defined Networking (SDN). In Proceedings of the 5G Radio Technology Seminar. Exploring Technical Challenges in the Emerging 5G Ecosystem, London, UK, 17 March 2015. [Google Scholar]
- Sridharan, S. A literature review of network function Virtualization (NFV) in 5G networks. Int. J. Comput. Trends Technol. 2020, 68, 49–55. [Google Scholar] [CrossRef]
- Hakeem, S.A.; Hady, A.A.; Kim, H.W. 5G-V2X: Standardization, architecture, use cases, network-slicing, and edge-computing. Wirel. Netw. 2020, 26, 6015–6041. [Google Scholar] [CrossRef]
- Hakeem, S.A.; Hady, A.A.; Kim, H.W. Current and future developments to improve 5G-newradio performance in Vehicle-to-everything communications. Telecommun. Syst. 2020, 75, 331–353. [Google Scholar] [CrossRef]
- Mazurczyk, W.; Bisson, P.; Jover, R.P.; Nakao, K.; Cabaj, K. Challenges and novel solutions for 5G network security, privacy and trust. IEEE Wirel. Commun. 2020, 27, 6–7. [Google Scholar] [CrossRef]
- Navarro-Ortiz, J.; Romero-Diaz, P.; Sendra, S.; Ameigeiras, P.; Ramos-Munoz, J.J.; Lopez-Soler, J.M. A survey on 5G usage scenarios and traffic models. IEEE Commun. Surv. Tutor. 2020, 22, 905–929. [Google Scholar] [CrossRef]
- Huawei 5G Security Assurance. Available online: https://www-file.huawei.com/-/media/corporate/pdf/trust-center/huawei-5G-security-white-paper4th.pdf?la=en (accessed on 10 August 2021).
- Parvez, I.; Rahmati, A.; Guvenc, I.; Sarwat, A.I.; Dai, H. A survey on low latency towards 5G: Ran, core network and caching solutions. IEEE Commun. Surv. Tutor. 2018, 20, 3098–3130. [Google Scholar] [CrossRef]
- Shaik, A.; Borgaonkar, R.; Asokan, N.; Niemi, V.; Seifert, J. Practical attacks against privacy and availability in 4G/LTE mobile communication systems. arXiv 2015, arXiv:1510.07563. [Google Scholar]
- Jover, R.P.; Marojevic, V. Security and protocol exploit analysis of the 5G specifications. IEEE Access 2019, 7, 24956–24963. [Google Scholar] [CrossRef]
- Dabrowski, A.; Pianta, N.; Klepp, T.; Mulazzani, M.; Weippl, E. Imsi-catch me if you can: Imsi-catcher-catchers. In Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC’14, New Orleans, LA, USA, 8–12 December 2014; Association for Computing Machinery: New York, NY, USA, 2014; pp. 246–255. [Google Scholar]
- Mavoungou, S.; Kaddoum, G.; Taha, M.; Matar, G. Survey on threats and attacks on mobile networks. IEEE Access 2016, 4, 4543–4572. [Google Scholar] [CrossRef]
- Hussein, H.; Elsayed, H.; Abd El-kader, S. Intensive Benchmarking of D2D communication over 5G cellular networks: Prototype, integrated features, challenges, and main applications. Wirel. Netw. 2019, 26, 3183–3202. [Google Scholar] [CrossRef]
- Hussain, S.R.; Echeverria, M.; Chowdhury, O.; Li, N.; Bertino, E. Privacy attacks to the 4G and 5G cellular paging protocols using side channel information. In Proceedings of the Network and Distributed Systems Security (NDSS) Symposium, San Diego, CA, USA, 24–27 February 2019. [Google Scholar]
- Traynor, P.; Enck, W.; McDaniel, P.; la Porta, T. Mitigating attacks on open functionality in sms-capable cellular networks. IEEE/ACM Trans. Netw. 2009, 17, 40–53. [Google Scholar] [CrossRef]
- van den Broek, F.; Verdult, R.; de Ruiter, J. Defeating imsi catchers. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver Colorado, CO, USA, 12–16 October 2015. [Google Scholar]
- Sulaiman, A.G.; al Shaikhli, I.F. Comparative study on 4G/LTE cryptographic algorithms based on different factors. Int. J. Comput. Sci. Telecommun. 2014, 5, 7–10. [Google Scholar]
- Pawlicki, M.; Choras, M.; Kozik, R. Defending network intrusion detection systems against adversarial evasion attacks. Future Gener. Comput. Syst. 2020, 110, 148–154. [Google Scholar] [CrossRef]
- Benzaid, C.; Taleb, T. ZSM security: Threat surface and best practices. IEEE Netw. 2020, 34, 124–133. [Google Scholar] [CrossRef]
- ETSI ISG ZSM, ETSI GS ZSM 002: ZSM Reference Architecture. 2019. Available online: https://www.etsi.org/deliver/etsigs/ZSM/001099/002/01.01.0160/gsZSM002v010101p.pdf (accessed on 11 January 2022).
- Giordani, M.; Polese, M.; Mezzavilla, M.; Rangan, S.; Zorzi, M. Toward 6g Networks: Use cases and technologies. IEEE Commun. Mag. 2020, 58, 55–61. [Google Scholar] [CrossRef]
- Uusitalo, M.A.; Rugeland, P.; Boldi, M.R.; Strinati, E.C.; Demestichas, P.; Ericson, M.; Fettweis, G.P.; Filippou, M.C.; Gati, A.; Hamon, M.H.; et al. 6G Vision, Value, Use Cases and Technologies from European 6G Flagship Project Hexa-X. IEEE Access 2021, 9, 160004–160020. [Google Scholar] [CrossRef]
- Strinati, E.C.; Barbarossa, S. 6G networks: Beyond Shannon towards semantic and goal-oriented communications. Comput. Netw. 2021, 190, 107930. [Google Scholar] [CrossRef]
- Wireless Environment as a Service Enabled by Reconfigurable Intelligent Surfaces: The RISE-6G Perspectiv. 2022. Available online: https://ieeexplore.ieee.org/document/9482474/ (accessed on 11 January 2022).
- Strinati, E.; Alexandropoulos, G.C.; Wymeersch, H.; Denis, B.; Sciancalepore, V.; D’Errico, R.; Clemente, A.; Phan-Huy, D.-T.; De Carvalho, E.; Popovski, P. Reconfigurable, Intelligent, and Sustainable Wireless Environments for 6G Smart Connectivity. IEEE Commun. Mag. 2021, 59, 99–105. [Google Scholar] [CrossRef]
- Di Renzo, M.; Debbah, M.; Phan-Huy, D.T.; Zappone, A.; Alouini, M.S.; Yuen, C.; Fink, M. Smart radio environments empowered by reconfigurable AI meta-surfaces: An idea whose time has come. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 1–20. [Google Scholar] [CrossRef] [Green Version]
- Castro, C. 6G Gains Momentum with Initiatives Launched Across the World. 6GWorld. 2022. Available online: https://www.6gworld.com/exclusives/6g-gains-momentum-with-initiatives-launched-across-the-world/ (accessed on 11 January 2022).
- Next G Alliance FAQ. ATIS. Available online: https://nextgalliance.org/about/ (accessed on 14 October 2021).
- Penttinen, J. On 6G Visions and Requirements. J. ICT Stand. 2021, 311–326. [Google Scholar] [CrossRef]
- Liu, Y.; Chen, H.; Wang, L. Physical layer security for next generation wireless networks: Theories, technologies, and challenges. IEEE Commun. Surv. Tutor. 2017, 19, 347–376. [Google Scholar] [CrossRef]
- Jover, R.P. The current state of affairs in 5G security and the main remaining security challenges. arXiv 2019, arXiv:1904.08394. [Google Scholar]
- Jiang, W.; Han, B.; Habibi, M.A.; Schotten, H.D. The road towards 6G: A comprehensive survey. IEEE Open J. Commun. Soc. 2021, 2, 334–366. [Google Scholar] [CrossRef]
- David, K.; Elmirghani, J.; Haas, H.; You, X.-H. Defining 6G: Challenges and Opportunities [From the Guest Editors]. IEEE Veh. Technol. Mag. 2019, 14, 14–16. [Google Scholar] [CrossRef]
- Gawas, A.U. An overview on evolution of mobile wireless communication networks: 1G–6G. Int. J. Recent Innov. Trends Comput. Commun. 2015, 3, 3130–3133. [Google Scholar]
- Bashir, S.; Alsharif, M.H.; Khan, I.; Albreem, M.A.; Sali, A.; Ali, B.M.; Noh, W. Mimo-terahertz in 6G nano-communications: Channel Modeling and Analysis. Comput. Mater. Contin. 2020, 66, 263–274. [Google Scholar] [CrossRef]
- Rikkinen, K.; Kyosti, P.; Leinonen, M.E.; Berg, M.; Parssinen, A. THz radio communication: Link budget analysis toward 6G. IEEE Commun. Mag. 2020, 58, 22–27. [Google Scholar] [CrossRef]
- Chen, S.; Liang, Y.-C.; Sun, S.; Kang, S.; Cheng, W.; Peng, M. Vision, requirements, and technology trend of 6G: How to tackle the challenges of system coverage, capacity, user data-rate and movement speed. IEEE Wirel. Commun. 2020, 27, 218–228. [Google Scholar] [CrossRef] [Green Version]
- Tarable, A.; Malandrino, F.; Dossi, L.; Nebuloni, R.; Virone, G.; Nordio, A. Meta-surface optimization in 6G sub-thz communications. In Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops), Dublin, Ireland, 7–11 June 2020. [Google Scholar]
- Singh, R.; Sicker, D. THz Communications—A Boon and/or Bane for Security, Privacy, and National Security. SSRN Electron. J. 2020. Available online: https://doi.org/10.2139/ssrn.3750493 (accessed on 11 January 2022). [CrossRef]
- Ma, J.; Shrestha, R.; Adelberg, J.; Yeh, C.-Y.; Hossain, Z.; Knightly, E.; Jornet, J.M.; Mittleman, D.M. Security and eavesdropping in terahertz wireless links. Nature 2018, 563, 89–93. [Google Scholar] [CrossRef]
- Petrov, V.; Moltchanov, D.; Jornet, J.M.; Koucheryavy, Y. Exploiting multipath terahertz communications for physical layer security in beyond 5G networks. In Proceedings of the IEEE INFOCOM Conference on Computer Communications Workshops (INFOCOM WKSHPS), Paris, France, 29 April–2 May 2019; pp. 865–872. [Google Scholar]
- Strinati, E.C.; Barbarossa, S.; Gonzalez-Jimenez, J.L.; Ktenas, D.; Cassiau, N.; Maret, L.; Dehos, C. 6G: The Next Frontier: From holographic messaging to artificial intelligence using subterahertz and visible light communication. IEEE Veh. Technol. Mag. 2019, 14, 42–50. [Google Scholar] [CrossRef]
- Huq, K.M.; Rodriguez, J.; Otung, I.E. 3D network modeling for thz-enabled ultra-fast dense networks: A 6G perspective. IEEE Commun. Stand. Mag. 2021, 5, 84–90. [Google Scholar] [CrossRef]
- Akyildiz, I.F.; Jornet, J.M.; Han, C. Terahertz band: Next Frontier for Wireless Communications. Phys. Commun. 2014, 12, 16–32. [Google Scholar] [CrossRef]
- Katz, M.; Ahmed, I. Opportunities and challenges for visible light communications in 6G. In Proceedings of the 2020 2nd 6G Wireless Summit (6G SUMMIT), Porto, Portugal, 8–11 June 2020. [Google Scholar]
- Ariyanti, S.; Suryanegara, M. Visible light communication (VLC) for 6G technology: The potency and research challenges. In Proceedings of the 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK, 27–28 July 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 490–493. [Google Scholar]
- Luo, J.; Fan, L.; Li, H. Indoor positioning systems based on visible light communication: State of the art. IEEE Commun. Surv. Tutor. 2017, 19, 2871–2893. [Google Scholar] [CrossRef]
- Basnayaka, D.A.; Haas, H. Hybrid RF and VLC systems: Improving user data rate performance of VLC systems. In Proceedings of the 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), Glasgow, UK, 11–14 May 2015. [Google Scholar]
- Blinowski, G. Security of Visible Light Communication Systems—A survey. Phys. Commun. 2019, 34, 246–260. [Google Scholar] [CrossRef]
- Chen, C.; Bian, R.; Haas, H. Omnidirectional transmitter and receiver design for wireless infrared uplink transmission in lifi. In Proceedings of the 2018 IEEE International Conference on Communications Workshops (ICC Workshops), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
- Marin-Garcia, I.; Guerra, V.; Perez-Jimenez, R. Study and validation of eavesdropping scenarios over a visible light communication channel. Sensors 2017, 17, 2687. [Google Scholar] [CrossRef] [Green Version]
- Arfaoui, M.A.; Ghrayeb, A.; Assi, C.M. Secrecy performance of the MIMO VLC wiretap channel with randomly located eavesdropper. IEEE Trans. Wirel. Commun. 2020, 19, 265–278. [Google Scholar] [CrossRef]
- Soderi, S. Enhancing security in 6G visible light communications. In Proceedings of the 2nd 6G Wireless Summit (6G SUMMIT), Levi, Finland, 17–20 March 2020; pp. 1–5. [Google Scholar]
- Pathak, P.H.; Feng, X.; Hu, P.; Mohapatra, P. Visible light communication, networking, and sensing: A survey, potential and challenges. IEEE Commun. Surv. Tutor. 2015, 17, 2047–2077. [Google Scholar] [CrossRef]
- Ucar, S.; Ergen, S.C.; Ozkasap, O.; Tsonev, D.; Burchardt, H. Secvlc: Secure visible light communication for military vehicular networks. In Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access, Malta, Malta, 13–17 November 2016; pp. 123–129. [Google Scholar]
- Mostafa, A.; Lampe, L. Physical-layer security for indoor visible light communications. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2014; pp. 3342–3347. [Google Scholar]
- Nakano, T.; Okaie, Y.; Kobayashi, S.; Hara, T.; Hiraoka, Y.; Haraguchi, T. Methods and applications of mobile molecular communication. Proc. IEEE 2019, 107, 1442–1456. [Google Scholar] [CrossRef]
- Cho, S.; Chen, G.; Coon, J.P. Enhancement of physical layer security with simultaneous beamforming and jamming for visible light communication systems. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2633–2648. [Google Scholar] [CrossRef] [Green Version]
- Farsad, N.; Yilmaz, H.B.; Eckford, A.; Chae, C.-B.; Guo, W. A comprehensive survey of recent advancements in molecular communication. IEEE Commun. Surv. Tutor. 2016, 18, 1887–1919. [Google Scholar] [CrossRef] [Green Version]
- Lu, Y.; Higgins, M.D.; Leeson, M.S. Comparison of channel coding schemes for Molecular Communications Systems. IEEE Trans. Commun. 2015, 63, 3991–4001. [Google Scholar] [CrossRef]
- Loscri, V.; Marchal, C.; Mitton, N.; Fortino, G.; Vasilakos, A.V. Security and privacy in molecular communication and networking: Opportunities and challenges. IEEE Trans. Nano Biosci. 2014, 13, 198–207. [Google Scholar] [CrossRef] [PubMed]
- Zong, B.; Fan, C.; Wang, X.; Duan, X.; Wang, B.; Wang, J. 6G technologies: Key Drivers, core requirements, system architectures, and Enabling Technologies. IEEE Veh. Technol. Mag. 2019, 14, 18–27. [Google Scholar] [CrossRef]
- Giordani, M.; Zorzi, M. Non-Terrestrial networks in the 6g Era: Challenges and opportunities. IEEE Netw. 2021, 35, 244–251. [Google Scholar] [CrossRef]
- Liu, Y.; Yuan, X.; Xiong, Z.; Kang, J.; Wang, X.; Niyato, D. Federated learning for 6G communications: Challenges, methods, and future directions. China Commun. 2020, 17, 105–118. [Google Scholar] [CrossRef]
- Wikström, G.; Peisa, J.; Rugeland, P.; Johansson, N.; Parkvall, S.; Girnyk, M.; Mildh, G.; da Silva, I.L. Challenges and Technologies for 6G. In Proceedings of the 2020 2nd 6G wireless summit (6G SUMMIT), Porto, Portugal, 8–11 June 2020; pp. 1–5. [Google Scholar]
- Plastiras, G.; Terzi, M.; Kyrkou, C.; Theocharidcs, T. Edge intelligence: Challenges and opportunities of near-sensor machine learning applications. In Proceedings of the 2018 IEEE 29th International Conference on Application Specific Systems, Architectures and Processors (ASAP), Milan, Italy, 10–12 July 2018; pp. 1–7. [Google Scholar]
- Peng, H.; Wang, Z.; Han, S.; Jiang, Y. Physical layer security for miso noma vlc system under eavesdropper collusion. IEEE Trans. Veh. Technol. 2021, 1, 6249–6254. [Google Scholar] [CrossRef]
- Chih-Lin, I. AI as an Essential Element of a Green 6G. IEEE Trans. Green Commun. Netw. 2021, 5, 1–3. [Google Scholar]
- Tang, F.; Kawamoto, Y.; Kato, N.; Liu, J. Future Intelligent and Secure Vehicular Network Toward 6G: Machine-Learning Approaches; IEEE: Piscataway, NJ, USA, 2020; Volume 108, pp. 292–307. [Google Scholar]
- Zhang, S.; Zhu, D. Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities. Comput. Netw. 2020, 183, 107556. [Google Scholar] [CrossRef]
- Qiao, X.; Huang, Y.; Dustdar, S.; Chen, J.; Dustdar, S. 6G vision: AN AI-DRIVEN decentralized network and service architecture. IEEE Internet Comput. 2020, 24, 33–40. [Google Scholar] [CrossRef]
- Zhang, Z.; Xiao, Y.; Ma, Z.; Xiao, M.; Ding, Z.; Lei, X.; Fan, P. 6G wireless networks: Vision, requirements, architecture, and key technologies. IEEE Veh. Technol. Mag. 2019, 14, 28–41. [Google Scholar] [CrossRef]
- Sattiraju, R.; Weinand, A.; Schotten, H.D. Ai-assisted Phy Technologies for 6G and beyond Wireless Networks. arXiv 2019, arXiv:1908.09523. [Google Scholar]
- Hong, T.; Liu, C.; Kadoch, M. Machine learning based antenna design for physical layer security in ambient backscatter communications. Wirel. Commun. Mob. Comput. 2019, 2019, 1–10. [Google Scholar] [CrossRef]
- Nawaz, S.J.; Sharma, S.K.; Wyne, S.; Patwary, M.N.; Asaduzzaman, M. Quantum machine learning for 6G Communication NETWORKS: State-of-the-art and vision for the future. IEEE Access 2019, 7, 46317–46350. [Google Scholar] [CrossRef]
- Zhou, Z.; Liao, H.; Gu, B.; Huq, K.M.; Mumtaz, S.; Rodriguez, J. Robust mobile crowd sensing: When deep learning meets edge computing. IEEE Netw. 2018, 32, 54–60. [Google Scholar] [CrossRef]
- Dang, S.; Amin, O.; Shihada, B.; Alouini, M.-S. What should 6G be? Nat. Electron. 2020, 3, 20–29. [Google Scholar] [CrossRef] [Green Version]
- Tomkos, I.; Klonidis, D.; Pikasis, E.; Theodoridis, S. Toward the 6G network era: Opportunities and challenges. IT Prof. 2020, 22, 34–38. [Google Scholar] [CrossRef]
- Tarantino, S.; da Lio, B.; Cozzolino, D.; Bacco, D. Feasibility of quantum communications in aquatic scenarios. Optik 2020, 216, 164639. [Google Scholar] [CrossRef]
- Gyongyosi, L.; Imre, S.; Nguyen, H.V. A survey on quantum channel capacities. IEEE Commun. Surv. Tutor. 2018, 20, 1149–1205. [Google Scholar] [CrossRef]
- Partala, J. Post-quantum cryptography in 6G. Comput. Commun. Netw. 2021. [Google Scholar] [CrossRef]
- Hu, J.Y.; Yu, B.; Jing, M.Y.; Xiao, L.T.; Jia, S.T.; Qin, G.Q.; Long, G.L. Experimental quantum secure direct communication with single photons Light. Sci. Appl. 2016, 5, e16144. [Google Scholar]
- Zhang, W.; Ding, D.S.; Sheng, Y.B.; Zhou, L.; Shi, B.S.; Guo, G.C. Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 2017, 118, 220501. [Google Scholar] [CrossRef]
- Khan, L.U.; Yaqoob, I.; Imran, M.; Han, Z.; Hong, C.S. 6G wireless systems: A vision, architectural elements, and Future Directions. IEEE Access 2020, 8, 147029–147044. [Google Scholar] [CrossRef]
- Li, W.; Su, Z.; Li, R.; Zhang, K.; Wang, Y. Blockchain-based data security for artificial intelligence applications in 6G networks. IEEE Netw. 2020, 34, 31–37. [Google Scholar] [CrossRef]
- Maksymyuk, T.; Gazda, J.; Volosin, M.; Bugar, G.; Horvath, D.; Klymash, M.; Dohler, M. Blockchain-empowered framework for decentralized network management in 6G. IEEE Commun. Mag. 2020, 58, 86–92. [Google Scholar] [CrossRef]
- Velliangiri, S.; Manoharn, R.; Ramachandran, S.; Rajasekar, V.R. Blockchain based privacy preserving framework for emerging 6G Wireless Communications. In IEEE Transactions on Industrial Informatics; IEEE: Piscataway, NJ, USA, 2021; p. 1. [Google Scholar]
- Xu, H.; Klaine, P.V.; Onireti, O.; Cao, B.; Imran, M.; Zhang, L. Blockchain-enabled resource management and sharing for 6G communications. Digit. Commun. Netw. 2020, 6, 261–269. [Google Scholar] [CrossRef]
- Zhou, Z.; Wang, M.; Huang, J.; Lin, S.; Lv, Z. Blockchain in Big Data Security for Intelligent Transportation with 6G. In IEEE Transactions on Industrial Informatics; IEEE: Piscataway, NJ, USA, 2021; pp. 1–11. [Google Scholar]
- Wang, J.; Ling, X.; Le, Y.; Huang, Y.; You, X. Blockchain-enabled wireless communications: A new paradigm towards 6G. Natl. Sci. Rev. 2021, 8, nwab069. [Google Scholar] [CrossRef] [PubMed]
- Nayak, S.; Patgiri, R. 6G communication: Envisioning the key issues and challenges. EAI Endorsed Trans. Internet Things 2021, 6, 166959. [Google Scholar] [CrossRef]
- Božanić, M.; Sinha, S. Futuristic technological aspects of 6G networks. In Lecture Notes in Electrical Engineering; Springer: Cham, Switzerland, 2021; pp. 221–248. [Google Scholar]
- Ling, X.; Wang, J.; Bouchoucha, T.; Levy, B.C.; Ding, Z. Blockchain Radio Access Network (B-ran): Towards decentralized secure radio access paradigm. IEEE Access 2019, 7, 9714–9723. [Google Scholar] [CrossRef]
- Kotobi, K.; Bilen, S.G. Secure blockchains for Dynamic Spectrum Access: A decentralized database in moving cognitive radio networks enhances security and User Access. IEEE Veh. Technol. Mag. 2018, 13, 32–39. [Google Scholar] [CrossRef]
- Qiao, L.; Dang, S.; Shihada, B.; Alouini, M.-S.; Nowak, R.; Lv, Z. Can blockchain link the future? Digit. Commun. Netw. 2021. [Google Scholar] [CrossRef]
- Ferraro, P.; King, C.; Shorten, R. Distributed Ledger Technology for smart cities, the sharing economy, and social compliance. IEEE Access 2018, 6, 62728–62746. [Google Scholar] [CrossRef]
- Pencheva, E.; Atanasov, I.; Asenov, I. Toward network intellectualization in 6G. In Proceedings of the 2020 XI National Conference with International Participation (Electronica), Sofia, Bulgaria, 23–24 July 2020. [Google Scholar]
- Wang, M.; Lin, Y.; Tian, Q.; Si, G. Transfer learning promotes 6G wireless communications: Recent advances and future challenges. IEEE Trans. Reliab. 2021, 70, 790–807. [Google Scholar] [CrossRef]
- Na, Z.; Liu, Y.; Shi, J.; Liu, C.; Gao, Z. UAV-supported clustered Noma for 6G-enabled internet of things: Trajectory planning and resource allocation. IEEE Internet Things J. 2020, 8, 1. [Google Scholar] [CrossRef]
- Li, B.; Fei, Z.; Zhang, Y. UAV Communications for 5G and beyond: Recent advances and future trends. IEEE Internet Things J. 2019, 6, 2241–2263. [Google Scholar] [CrossRef] [Green Version]
- Hooper, M.; Tian, Y.; Zhou, R.; Cao, B.; Lauf, A.P.; Watkins, L.; Alexis, W. Securing commercial wifi-based uavs from common security attacks. In Proceedings of the MILCOM 2016–2016 IEEE Military Communications Conference IEEE, Baltimore, MD, USA, 1–3 November 2016; pp. 1213–1218. [Google Scholar]
- Fotouhi, A.; Qiang, H.; Ding, M.; Hassan, M.; Giordano, L.G.; Garcia-Rodriguez, A.; Yuan, J. Survey on UAV cellular communications: Practical aspects, standardization advancements, regulation and security challenges. IEEE Commun. Surv. Tutor. 2019, 21, 3417–3442. [Google Scholar] [CrossRef] [Green Version]
- Shrestha, R.; Bajracharya, R.; Kim, S. 6G enabled Unmanned Aerial Vehicle Traffic Management: A perspective. IEEE Access 2021, 9, 91119–91136. [Google Scholar] [CrossRef]
- Stoynov, V.; Ivanov, A.; Mihaylova, D. Conceptual Framework for Quality Assessment in human-centric 6G XR services. In Proceedings of the IOP Conference Series: Materials Science and Engineering, Borovets, Bulgaria, 26–29 November 2021; Volume 1032, p. 012009. [Google Scholar]
- Soldani, D.; Guo, Y.J.; Barani, B.; Mogensen, P.; Chih-Lin, I.; Das, S.K. 5G for ultra-reliable low-latency communications. IEEE Netw. 2018, 32, 6–7. [Google Scholar] [CrossRef]
- Chen, R.; Li, C.; Yan, S.; Malaney, R.; Yuan, J. Physical layer security for ultra-reliable and low-latency communications. IEEE Wirel. Commun. 2019, 26, 6–11. [Google Scholar] [CrossRef] [Green Version]
- Hamamreh, J.M.; Basar, E.; Arslan, H. OFDM-subcarrier index selection for Enhancing Security and Reliability of 5G URLLC services. IEEE Access 2017, 5, 25863–25875. [Google Scholar] [CrossRef]
- Al-Eryani, Y.; Hossain, E. The D-OMA method for massive multiple access in 6G: Performance, security, and challenges. IEEE Veh. Technol. Mag. 2019, 14, 92–99. [Google Scholar] [CrossRef]
- Mahmood, N.H.; Böcker, S.; Munari, A.; Clazzer, F.; Moerman, I.; Mikhaylov, K.; Lopez, O.; Park, O.S.; Mercier, E.; Bartz, H.; et al. White paper on critical and massive machine type communication towards 6G. arXiv 2020, arXiv:2004.14146. [Google Scholar]
- Yamakami, T. A privacy threat model in xr applications. In International Conference on Emerging Internetworking, Data & Web Technologies; Springer: Cham, Switzerland, 2020; pp. 384–394. [Google Scholar]
- Pilz, J.; Holfeld, B.; Schmidt, A.; Septinus, K. Professional Live Audio Production: A highly synchronized use case for 5G Urllc Systems. IEEE Netw. 2018, 32, 85–91. [Google Scholar] [CrossRef]
- Jamwal, A.; Agrawal, R.; Sharma, M.; Giallanza, A. Industry 4.0 technologies for manufacturing sustainability: A systematic review and Future Research Directions. Appl. Sci. 2021, 11, 5725. [Google Scholar] [CrossRef]
- Challita, U.; Ferdowsi, A.; Chen, M.; Saad, W. Machine learning for wireless connectivity and security of cellular-connected uavs. IEEE Wirel. Commun. 2019, 26, 28–35. [Google Scholar] [CrossRef] [Green Version]
- Sanjab, A.; Saad, W.; Başar, T. Prospect theory for enhanced cyber-physical security of drone delivery systems: A network interdiction game. In Proceedings of the 2017 IEEE International Conference on Communications (ICC) IEEE, Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar]
- Sun, X.; Yang, W.; Cai, Y.; Ma, R.; Tao, L. Physical layer security in millimeter wave SWIPT UAV-based Relay Networks. IEEE Access 2019, 7, 35851–35862. [Google Scholar] [CrossRef]
- Kim, H.; Ben-Othman, J.; Mokdad, L. UDIPP: A framework for differential privacy preserving movements of unmanned aerial vehicles in Smart Cities. IEEE Trans. Veh. Technol. 2019, 68, 3933–3943. [Google Scholar] [CrossRef]
- Xu, G.; Li, H.; Liu, S.; Wen, M.; Lu, R. Efficient and privacy-preserving truth discovery in mobile crowd sensing systems. IEEE Trans. Veh. Technol. 2019, 68, 3854–3865. [Google Scholar] [CrossRef]
- Ni, J.; Lin, X.; Shen, X. Toward privacy-preserving valet parking in autonomous driving era. IEEE Trans. Veh. Technol. 2019, 68, 2893–2905. [Google Scholar] [CrossRef]
- Ding, Y.; Chen, C.; Zhang, S.; Guo, B.; Yu, Z.; Wang, Y. Greenplanner: Planning personalized fuel-efficient driving routes using multi-sourced urban data. In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom), Kona, HI, USA, 13–17 March 2017; pp. 207–216. [Google Scholar]
- Wang, J.; Liu, J.; Kato, N. Networking and communications in Autonomous Driving: A Survey. IEEE Commun. Surv. Tutor. 2019, 21, 1243–1274. [Google Scholar] [CrossRef]
- Hakeem, S.A.; Kim, H.W. Multi-zone authentication and privacy-preserving protocol (MAPP) based on the bilinear pairing cryptography for 5G-V2X. Sensors 2021, 21, 665. [Google Scholar] [CrossRef]
- Hakeem, S.A.; El-Kader, S.M.; Kim, H.W. A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks. Sensors 2021, 21, 5838. [Google Scholar] [CrossRef]
- Hakeem, S.A.; El-Gawad, M.A.A.; Kim, H.W. A decentralized lightweight authentication and privacy protocol for vehicular networks. IEEE Access 2019, 7, 119689–119705. [Google Scholar] [CrossRef]
- Hakeem, S.A.; El-Gawad, M.A.A.; Kim, H.W. Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography. Sensors 2020, 20, 5719. [Google Scholar] [CrossRef] [PubMed]
- Hakeem, S.A.; Hady, A.A.; Kim, H.W. Optimizing 5G in V2X communications: Technologies, requirements, challenges, and standards. In Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society; IGI Global: Hershey, PA, USA, 2021; pp. 972–1011. [Google Scholar]
- Hakeem, S.A.; Kim, H.W. Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication. Sensors 2022, 22, 331. [Google Scholar] [CrossRef] [PubMed]
- Snudden, J. Progression to the next Industrial Revolution: Industry 4.0 for Composites. Reinf. Plast. 2019, 63, 136–142. [Google Scholar] [CrossRef]
- Nahavandi, S. Industry 5.0—A human-centric solution. Sustainability 2019, 11, 4371. [Google Scholar] [CrossRef] [Green Version]
- Borenius, S.; Hämmäinen, H.; Lehtonen, M.; Ahokangas, P. Smart Grid Evolution and mobile communications—scenarios on the Finnish Power Grid. Electr. Power Syst. Res. 2021, 199, 107367. [Google Scholar] [CrossRef]
- Tariq, M.; Ali, M.; Naeem, F.; Poor, H.V. Vulnerability assessment of 6G-enabled Smart grid cyber–physical systems. IEEE Internet Things J. 2021, 8, 5468–5475. [Google Scholar] [CrossRef]
- de Almeida, L.F.; Santos, J.R.; Pereira, L.A.; Sodre, A.C.; Mendes, L.L.; Rodrigues, J.J.; Rabelo, R.A.; Alberti, A.M. Control Networks and smart grid teleprotection: Key aspects, technologies, protocols, and case-studies. IEEE Access 2020, 8, 174049–174079. [Google Scholar] [CrossRef]
- Janicke, H.; Nicholson, A.; Webber, S.; Cau, A. Runtime-monitoring for Industrial Control Systems. Electronics 2015, 4, 995–1017. [Google Scholar] [CrossRef]
- Guo, W. Explainable artificial intelligence for 6G: Improving trust between human and Machine. IEEE Commun. Mag. 2020, 58, 39–45. [Google Scholar] [CrossRef]
- Lu, Y.; Maharjan, S.; Zhang, Y. Adaptive Edge Association for Wireless Digital Twin Networks in 6G. IEEE Internet Things J. 2021, 1. [Google Scholar] [CrossRef]
- Congedo, M.; Barachant, A.; Bhatia, R. Riemannian geometry for EEG-based brain-computer interfaces; A Primer and a Review. Brain-Comput. Interfaces 2017, 4, 155–174. [Google Scholar] [CrossRef]
- Chen, X.; Wang, Y.; Nakanishi, M.; Gao, X.; Jung, T.P.; Gao, S. High-speed spelling with a noninvasive brain–computer interface. Proc. Natl. Acad. Sci. USA 2015, 112, E6058–E6067. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- McCullagh, P.; Lightbody, G.; Zygierewicz, J.; Kernohan, W.G. Ethical challenges associated with the development and deployment of Brain Computer Interface Technology. Neuroethics 2013, 7, 109–122. [Google Scholar] [CrossRef]
- Ramadan, R.A.; Vasilakos, A.V. Brain Computer Interface: Control Signals Review. Neurocomputing 2017, 223, 26–44. [Google Scholar] [CrossRef]
- Švogor, I.; Kišasondi, T. Two factor authentication using EEG augmented passwords. In Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces, Cavtat, Croatia, 25–28 June 2012; pp. 373–378. [Google Scholar]
- Arthikeyan, D.T.K.; Sabarigiri, B. Enhancement of multi-modal biometric authentication based on iris and brain neuro image coding. Int. J. Biom. Bioinform. (IJBB) 2011, 5, 249. [Google Scholar]
- Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A survey on the security of Blockchain Systems. Future Gener. Comput. Syst. 2020, 107, 841–853. [Google Scholar] [CrossRef] [Green Version]
- Dai, Y.; Xu, D.; Maharjan, S.; Chen, Z.; He, Q.; Zhang, Y. Blockchain and deep reinforcement learning empowered intelligent 5G beyond. IEEE Netw. 2019, 33, 10–17. [Google Scholar] [CrossRef]
Mobile Networks | Supported Services and Functions | Security and Privacy Issues |
---|---|---|
1G |
|
|
2G |
|
|
3G |
|
|
4G |
|
|
5G |
|
|
6G Physical Layer Technology | Related Work | Security and Privacy Challenges | Basic Contributions |
---|---|---|---|
THZ | Akyildiz et al. [81] | Authentication |
|
Ma et al. [82] | Malicious behaviors |
| |
VLC | Pathak et al. [91] | Malicious behaviors |
|
Ucar et al. [92] | Privacy of communication |
| |
Mostafa et al. [93] | Encryption |
| |
Cho et al. [95] | Malicious behaviors and security of the physical layer |
| |
Molecular communication | Farsad et al. [96] | Malicious behaviors and authentication problems |
|
Lu et al. [97] | Molecular communication reliability and encryption |
| |
Loscri et al. [98] | Authentication challenges and different attacks |
| |
AI and ML technology | Dang et al. [114] | Authentication |
|
Zhou et al. [113] | Access control and authentication |
| |
Sattiraju et al. [110] | Authentication |
| |
Hong et al. [111] | Communication |
| |
Nawaz et al. [112] | Encryption |
| |
Quantum communication | Hu et al. [119] | Quantum secret sharing, key management, and security of direct communication |
|
Zhang et al. [120] | Encryption |
| |
Nawaz et al. [112] | Encryption of secret key |
| |
Distributed ledger technology | Ling et al. [130] | Authentication |
|
Kotobi et al. [131] | Access control |
| |
Ferraro et al. [133] | Access control |
|
BCI Attacks | Threat Impact | |
---|---|---|
Brain signal generation attacks | Adversarial attacks |
|
Misleading Stimuli attacks |
| |
Data acquisition attacks | Sniffing attacks |
|
Spoofing attacks |
| |
Data processing attacks | Injection attacks |
|
Battery drain attacks |
| |
Data conversion attacks |
| |
Data stimulation attacks | Man-in-the-middle attacks |
|
Replay attacks |
| |
Ransomware attacks |
|
6G Application | Security Challenges | Security Requirements |
---|---|---|
UAV based mobility |
|
|
Telepresence holography |
|
|
Extended reality |
|
|
Connected Autonomous Vehicles (CAV) |
|
|
Industry 5.0 |
|
|
Smart grid 2.0 |
|
|
Artificial intelligence in health care |
|
|
Digital twins |
|
|
Wireless brain–computer interactions |
|
|
Distributed ledger applications |
|
|
6G Applications | Related Work | Security and Privacy Challenges | Basic Contributions |
---|---|---|---|
Robotics and autonomous systems | Hooper et al. [138] | Malicious Misbehavior | They mentioned WiFi attacks, which an adversary of Tiro may exploit. |
Fotouhi et al. [139] | Malicious Misbehavior | They study drone attacks through eavesdropping, spoofing, hijacking, and DoS attacks. | |
Challita et al. [150] | Attacks, security, and privacy issues | They proposed a network-based artificial neural system to provide secured real-time solutions for automated drone applications | |
Sanjab et al. [151] | Authentication and access control | They propose a new mathematical model that supports the trustworthiness of autonomous drone systems. | |
Sun et al. [152] | Communication | They introduce a novel way of communication that may avoid eavesdropping attempts. | |
Kim et al. [153] | Privacy and authorization | They proposed a framework that would protect the privacy of the UAV Network. | |
Xu et al. [154] | Privacy and authentication | They propose an (EPTD) protocol for V2X applications. | |
Ni et al. [147] | Authentication and Physical attacks | They provide an autonomous approach that enables two-factor authentication. Reducing physical attacks. | |
Wang et al. [157] | Malicious Misbehavior | They highlight the autonomous vehicle’s cyberattacks by employing attacks such as brute force and capturing of packets. | |
Tang et al. [106] | Authentication | They introduce a comprehensive paper survey for several machine learning approaches that could be used to improve the 6G security. | |
Blockchain and distributed ledger technologies | Li et al. [137] | Malicious Misbehavior, Encryption | They provide three categories of threats of harmful behaviors that affect blockchain-based solutions in 6G networks. |
Dai et al. [179] | Authentication and privacy | They remark that privately-owned blockchains are of poor security, and consortium blockchains are of high-security level. | |
Multi-sensory XR applications | Chen et al. [143] | Malicious behaviors and communication attacks | They observe that sensitive and confidential data can still be disclosed due to some attacks. They claim that the reliability and security of a network are satisfied through solving the 6G network dynamics. |
Hamamreh et al. [144] | Malicious behaviors and attacks | They proposed a method for intercepting and improving security against URLLC eavesdropping attacks. | |
Al-Eryani et al. [145] | Access control | They developed the multi-access approach DOMA for multi-sensory XR solutions to extend massive devices’ capability to simultaneously access the 6G networks that could enhance security and reliability. | |
Dang et al. [114] | Privacy and secrecy of eMBB applications | They provide details and consideration of privacy, security, and secrecy of eMBB. | |
Yamakami et al. [147] | Privacy and authentication issues | They propose a three-dimensional solution to the attacks posed to privacy in the XR solutions. | |
Pilz et al. [148] | Privacy | They prove that XR-sensory applications can manage services to improve privacy and security. | |
Wireless brain–computer interactions | Mccullagh et al. [174] | Encryption | They highlight that data protection in wireless BCI is one of the primary challenges. |
Ramadan et al. [175] | Malicious behaviors | They provide malware applications to obtain access to the sensitive neurological information. | |
Švogor et al. [176] | Encryption and Malicious behaviors | They have suggested a technique using a password that needs the user to reach a particular psychological condition to resist reply threats. | |
Karthikeyan et al. [177] | Access control | Proposing a security approach for BCI that increases security. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Abdel Hakeem, S.A.; Hussein, H.H.; Kim, H. Security Requirements and Challenges of 6G Technologies and Applications. Sensors 2022, 22, 1969. https://doi.org/10.3390/s22051969
Abdel Hakeem SA, Hussein HH, Kim H. Security Requirements and Challenges of 6G Technologies and Applications. Sensors. 2022; 22(5):1969. https://doi.org/10.3390/s22051969
Chicago/Turabian StyleAbdel Hakeem, Shimaa A., Hanan H. Hussein, and HyungWon Kim. 2022. "Security Requirements and Challenges of 6G Technologies and Applications" Sensors 22, no. 5: 1969. https://doi.org/10.3390/s22051969