TY - JOUR
T1 - Security and Privacy for 6G
T2 - A Survey on Prospective Technologies and Challenges
AU - Nguyen, Van Linh
AU - Lin, Po Ching
AU - Cheng, Bo Chao
AU - Hwang, Ren Hung
AU - Lin, Ying Dar
N1 - Publisher Copyright:
© 2022 IEEE.
PY - 2021
Y1 - 2021
N2 - Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security and privacy issues for 6G remain largely in concept. This survey provides a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses. Two key lessons learned are as follows. First, other than inheriting vulnerabilities from the previous generations, 6G has new threat vectors from new radio technologies, such as the exposed location of radio stripes in ultra-massive MIMO systems at Terahertz bands and attacks against pervasive intelligence. Second, physical layer protection, deep network slicing, quantum-safe communications, artificial intelligence (AI) security, platform-agnostic security, real-time adaptive security, and novel data protection mechanisms such as distributed ledgers and differential privacy are the top promising techniques to mitigate the attack magnitude and personal data breaches substantially.
AB - Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security and privacy issues for 6G remain largely in concept. This survey provides a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses. Two key lessons learned are as follows. First, other than inheriting vulnerabilities from the previous generations, 6G has new threat vectors from new radio technologies, such as the exposed location of radio stripes in ultra-massive MIMO systems at Terahertz bands and attacks against pervasive intelligence. Second, physical layer protection, deep network slicing, quantum-safe communications, artificial intelligence (AI) security, platform-agnostic security, real-time adaptive security, and novel data protection mechanisms such as distributed ledgers and differential privacy are the top promising techniques to mitigate the attack magnitude and personal data breaches substantially.
KW - 6G
KW - AI security
KW - connection security
KW - physical layer security
KW - security and privacy
KW - service security
UR - http://www.scopus.com/inward/record.url?scp=85119646151&partnerID=8YFLogxK
U2 - 10.1109/COMST.2021.3108618
DO - 10.1109/COMST.2021.3108618
M3 - Article
AN - SCOPUS:85119646151
SN - 1553-877X
VL - 23
SP - 2384
EP - 2428
JO - IEEE Communications Surveys and Tutorials
JF - IEEE Communications Surveys and Tutorials
IS - 4
ER -