| Literature DB >> 35271113 |
Shimaa A Abdel Hakeem1,2, Hanan H Hussein2, HyungWon Kim1.
Abstract
After implementing 5G technology, academia and industry started researching 6th generation wireless network technology (6G). 6G is expected to be implemented around the year 2030. It will offer a significant experience for everyone by enabling hyper-connectivity between people and everything. In addition, it is expected to extend mobile communication possibilities where earlier generations could not have developed. Several potential technologies are predicted to serve as the foundation of 6G networks. These include upcoming and current technologies such as post-quantum cryptography, artificial intelligence (AI), machine learning (ML), enhanced edge computing, molecular communication, THz, visible light communication (VLC), and distributed ledger (DL) technologies such as blockchain. From a security and privacy perspective, these developments need a reconsideration of prior security traditional methods. New novel authentication, encryption, access control, communication, and malicious activity detection must satisfy the higher significant requirements of future networks. In addition, new security approaches are necessary to ensure trustworthiness and privacy. This paper provides insights into the critical problems and difficulties related to the security, privacy, and trust issues of 6G networks. Moreover, the standard technologies and security challenges per each technology are clarified. This paper introduces the 6G security architecture and improvements over the 5G architecture. We also introduce the security issues and challenges of the 6G physical layer. In addition, the AI/ML layers and the proposed security solution in each layer are studied. The paper summarizes the security evolution in legacy mobile networks and concludes with their security problems and the most essential 6G application services and their security requirements. Finally, this paper provides a complete discussion of 6G networks' trustworthiness and solutions.Entities:
Keywords: 6G security; AI/ML security; new challenges; physical layer security; privacy; security architecture; security threats
Mesh:
Year: 2022 PMID: 35271113 PMCID: PMC8914636 DOI: 10.3390/s22051969
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The 5G and 6G features comparison.
Figure 2The security evolution of mobile communications from 1G to the predicted future 6G.
Security and privacy issues in earlier mobile networks.
| Mobile Networks | Supported Services and Functions | Security and Privacy Issues |
|---|---|---|
| 1G |
Deliver voice communications services Uses analog modulation techniques, lacks a specified wireless standard |
Unencrypted nature of telephone services Unauthorized access and eavesdropping attacks Cloning attacks |
| 2G |
Enable voice and short messaging services Anonymity is achieved via anonymous identifiers TMSI privacy solution and radio path encryption |
Unauthorized access One-way authentication issue IMSI-catcher attacks Traceability attacks Eavesdropping attacks End to end encryption problem |
| 3G |
Provide internet access Advanced services such as TV streaming, internet browsing Air interface security and user authentication 3GPP supports various privacy considerations for 3G networks include securely locating, identifying |
Two-way authentication Authentication server attacks Integrity threats, Unauthorized data access, Denial of Service (dos) attacks Unauthorized service access AKA sniffing attacks |
| 4G |
Handle complex applications such as High-Definition Television (HD TV) Support diversity of intelligent mobile terminals 4G networks offered up to 1 Gbit per second for downlink transmission 500 Mbit per second for uplink communication |
Tampering hardware platforms Viruses and operating system attacks Medium Access Control (MAC) layer vulnerabilities Eavesdropping and replay attacks Data integrity attacks Unauthorized access attacks Authentication issues |
| 5G |
Connecting higher number of growing devices Delivering higher quality services to all network entities Enhanced Ultra-Reliable, Low Latency Communication (ERLLC) Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) Support high requirements to ensure service and resources availability and continuity |
DoS or resource attacks Hiding of active and passive eavesdropping using large MIMOs SDN threats and rogue applications NFV services security problems 5G-AKA attacks and issues IMSI-catcher attacks Voice IP attacks Traceability attacks Exploiting information from failure messages |
Figure 3The expected improvements and changes in the 6G security architecture.
Figure 4The 6G visible light communication technology attacks and threats.
Figure 5The 6G molecular communication attacks and threats.
Figure 6The 6G AI/ML security architecture, and different attacks in each layer.
Figure 7The 6G AI/ML security challenges and threat scope.
Figure 8The 6G blockchain technology attacks and threats.
The 6G technologies, security challenges, and related work basic contributions.
| 6G Physical Layer Technology | Related Work | Security and Privacy Challenges | Basic Contributions |
|---|---|---|---|
| THZ | Akyildiz et al. [ | Authentication |
They discuss the electromagnetic signatures of THz frequencies that may be employed in physical layer authentication procedures. |
| Ma et al. [ | Malicious |
They claim that an eavesdropper can capture a THz signal by using narrow beams. Moreover, they talk about a means of resisting this type of attack. | |
| VLC | Pathak et al. [ | Malicious |
They highlighted what the victim’s line of sight should be if the adversary intends to conduct an attack on the current VLC process. |
| Ucar et al. [ | Privacy of |
They introduced a SecVLC protocol to protect the privacy of data transmissions over vehicular networks. | |
| Mostafa et al. [ | Encryption |
They proposed a precoding technology that guarantees the efficiency of the physical layer and could improve the security. | |
| Cho et al. [ | Malicious |
They have proven that there could be a potential degrade in VLC safety by collaborating with eavesdroppers. | |
| Molecular communication | Farsad et al. [ | Malicious |
An extensive overview of current molecular communication developments. |
| Lu et al. [ | Molecular |
To improve the reliability of transferred data inside a molecular communication system, two different codes are used for the first time. Both codes are Euclidean-Geometry Parity-Check (EG-LDPC) and cyclic-Reed-Muller (C-RM) code. | |
| Loscri et al. [ | Authentication challenges and different attacks |
Offering some initial insights on the issues of MC system privacy and security. Explores numerous ways for attacking molecular medium at various levels. | |
| AI and ML technology | Dang et al. [ | Authentication |
Claim that AI design might support in identifying network problems in the 6G security and provide prevention approaches and protection solutions. |
| Zhou et al. [ | Access control and authentication |
Explores AI technologies as well, claimed to detect security risks in advanced computing in greater detail. | |
| Sattiraju et al. [ | Authentication |
They proposed an efficient learning approach to improve the security of the physical layer in the authentication process. | |
| Hong et al. [ | Communication |
Presented an antenna design for classification tasks that must be used in communication with the physical layers to prevent any information leakage. | |
| Nawaz et al. [ | Encryption |
The proposed protection for the communication links in 6G networks using machine learning techniques and quantum encryption solutions. | |
| Quantum communication | Hu et al. [ | Quantum secret sharing, key management, and security of direct communication |
Ensure the proper security of quantum communication. The experiment showed clearly the possibility of direct quantum-safe communication during a noisy and lossy environment. They also reported the first experiment based on a DL04 protocol and the coding for the frequency of a single-photon, which has validated block transmission. |
| Zhang et al. [ | Encryption |
They allow the transmission of encrypted messages through a direct channel without using a private key. Providing fundamental steps towards practical quantum secure direct communication (QSDC) for long-distance quantum communication using quantum memory. | |
| Nawaz et al. [ | Encryption of secret key |
Using machine learning techniques to support key security. | |
| Distributed ledger technology | Ling et al. [ | Authentication |
They proposed a novel network radio access architecture based on blockchain (B-RAN) to develop a secure efficient decentralized mechanism to manage authentication procedures and network access among many network components. |
| Kotobi et al. [ | Access control |
They presented a way to enhance media access protocol and cognitive radio safety by leveraging the blockchain to obtain access to the unused licensed spectrum. | |
| Ferraro et al. [ | Access control |
They provide a framework for the application of Distributed Ledger Technology (DLTs) as a social compliance control mechanism in smart city environments that can improve the security against double-spending attacks. |
Figure 9The most essential 6G applications in different technologies.
Figure 10The wireless brain-computer interaction attacks and threats.
The wireless brain communication attacks and their threat impact on 6G network security.
| BCI Attacks | Threat Impact | |
|---|---|---|
| Brain signal generation attacks | Adversarial |
Giving a machine learning system the wrong information to make it malfunction and generate inaccurate results. |
| Misleading |
Users are subjected to harmful sensory stimuli with the goal of inducing a certain brain reaction. | |
| Data acquisition | Sniffing |
Obtaining sensitive information through a communication link. When data are not protected, hackers may access and investigate anything, even the details of communication. |
| Spoofing attacks |
This is conducted by pretending to be a communication entity. IP and MAC spoofing are two common spoofing techniques in network communications. | |
| Data processing | Injection attacks |
Using the fact that input is not validated, provide an interpreter with input having multiple components that may alter how it is handled. |
| Battery drain |
Batteries may run out, and if they do, the device can no longer be utilized. | |
| Data conversion attacks |
It is possible to tamper with both neurological data collecting and stimulation. | |
| Data stimulation | Man-in-the-middle attacks |
Communication between two entities is adjusted such that the extremes believe they are speaking directly. |
| Replay attacks |
Sending the same data repeatedly to disrupt the network owing to lack of input verification | |
| Ransomware |
Encrypt user data and then demand a monetary ransom to be able to decode it is the goal. | |
The 6G applications security challenges and the basic security requirements.
| 6G Application | Security Challenges | Security Requirements |
|---|---|---|
| UAV based mobility |
High altitude and High mobility Limited energy Diversity of devices Terrorist attacks Physical tampering |
Diversity of devices Real-time operations with reduced operational cost High scalability End to End security system design |
| Telepresence holography |
Limited resources Limited energy End to end security system design |
High privacy Real-time operation Preventing terrorist attacks |
| Extended reality |
Lack of security standards Physical tampering attacks Limited resources |
Edge security Lightweight privacy Real-time operation |
| Connected Autonomous Vehicles (CAV) |
High mobility Physical attacks Privacy challenges Lightweight end to end security Diversity of devices Dynamic security solutions |
Lightweight authentication Ultra-Privacy-preserving Proactive security Real-time resistance against attacks Low computation and communication |
| Industry 5.0 |
Denial of Service Smart Security Smart Factory Supply chain and Extended Systems |
Ultra-High privacy Proactive security Lightweight security Confidential information and intellectual property |
| Smart grid 2.0 |
Smart grid attacks Aggregation of data Translation between protocols Physical equipment attacks Exploitation |
Scalable IoT security and heterogeneity Zero-touch security High privacy Reduced cost Maintaining access |
| Artificial intelligence in health care |
Novel approaches for dynamic security Diversity of devices Trustworthiness Visibility Ethical and legal aspects Extensibility and viability Controlled security tasks |
Diversity of devices High privacy Zero-touch security Edge security Domain-specific security |
| Digital twins |
Security of physical model Security of digital model Diversity of devices Privacy-preserving High mobility Isolated security systems |
High bandwidth Ultra-privacy Lightweight security Scalability Dynamic security systems Robustness |
| Wireless brain–computer interactions |
Structure design Physical attacks Privacy challenges End to end security systems |
Confidentiality Availability Safety Integrity |
| Distributed ledger |
Double-spending Majority vulnerability Scalability Quantum computing Transaction privacy leakage |
Preventing privacy leakage Preventing double-spending attack |
The security and privacy challenges of 6G application-related work and their contributions.
| 6G Applications | Related Work | Security and Privacy Challenges | Basic Contributions |
|---|---|---|---|
| Robotics and autonomous systems | Hooper et al. [ | Malicious Misbehavior | They mentioned WiFi attacks, which an adversary of Tiro may exploit. |
| Fotouhi et al. [ | Malicious Misbehavior | They study drone attacks through eavesdropping, spoofing, hijacking, and DoS attacks. | |
| Challita et al. [ | Attacks, security, and privacy issues | They proposed a network-based artificial neural system to provide secured real-time solutions for automated drone applications | |
| Sanjab et al. [ | Authentication and access control | They propose a new mathematical model that supports the trustworthiness of autonomous drone systems. | |
| Sun et al. [ | Communication | They introduce a novel way of communication that may avoid eavesdropping attempts. | |
| Kim et al. [ | Privacy and authorization | They proposed a framework that would protect the privacy of the UAV Network. | |
| Xu et al. [ | Privacy and authentication | They propose an (EPTD) protocol for V2X applications. | |
| Ni et al. [ | Authentication and Physical attacks | They provide an autonomous approach that enables two-factor authentication. | |
| Wang et al. [ | Malicious Misbehavior | They highlight the autonomous vehicle’s cyberattacks by employing attacks such as brute force and capturing of packets. | |
| Tang et al. [ | Authentication | They introduce a comprehensive paper survey for several machine learning approaches that could be used to improve the 6G security. | |
| Blockchain and distributed ledger technologies | Li et al. [ | Malicious Misbehavior, Encryption | They provide three categories of threats of harmful behaviors that affect blockchain-based solutions in 6G networks. |
| Dai et al. [ | Authentication and privacy | They remark that privately-owned blockchains are of poor security, and consortium blockchains are of high-security level. | |
| Multi-sensory XR applications | Chen et al. [ | Malicious behaviors and communication attacks | They observe that sensitive and confidential data can still be disclosed due to some attacks. They claim that the reliability and security of a network are satisfied through solving the 6G network dynamics. |
| Hamamreh et al. [ | Malicious behaviors and attacks | They proposed a method for intercepting and improving security against URLLC eavesdropping attacks. | |
| Al-Eryani et al. [ | Access control | They developed the multi-access approach DOMA for multi-sensory XR solutions to extend massive devices’ capability to simultaneously access the 6G networks that could enhance security and reliability. | |
| Dang et al. [ | Privacy and secrecy of eMBB applications | They provide details and consideration of privacy, security, and secrecy of eMBB. | |
| Yamakami et al. [ | Privacy and authentication issues | They propose a three-dimensional solution to the attacks posed to privacy in the XR solutions. | |
| Pilz et al. [ | Privacy | They prove that XR-sensory applications can manage services to improve privacy and security. | |
| Wireless brain–computer interactions | Mccullagh et al. [ | Encryption | They highlight that data protection in wireless BCI is one of the primary challenges. |
| Ramadan et al. [ | Malicious behaviors | They provide malware applications to obtain access to the sensitive neurological information. | |
| Švogor et al. [ | Encryption and Malicious behaviors | They have suggested a technique using a password that needs the user to reach a particular psychological condition to resist reply threats. | |
| Karthikeyan et al. [ | Access control | Proposing a security approach for BCI that increases security. |