Abstract

The sixth generation (6G) of mobile network will be composed by different nodes, from macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full connectivity fabric all around us. These heterogeneous nodes constitute an ultra dense network managing tons of information, often very sensitive. To trust the services provided by such network, security is a mandatory feature by design. In this scenario, physical-layer security (PLS) can act as a first line of defense, providing security even to low-resourced nodes in different environments. This paper discusses challenges, solutions and visions of PLS in beyond-5G networks.

Highlights

  • T HE 6TH GENERATION (6G) communication networks are portrayed to form a full connectivity fabric, with a high degree of operational flexibility and autonomy [1], [2]

  • The distributed thinking paradigm taken to the core of the radio heads and network deployment sparkled far by 5G will only intensify with the upcoming technologies beyond 5G (B5G) (e.g., cell-free multiple-input multipleoutput (MIMO), intelligent reflective surfaces (IRS) and self-aggregating networks, predictive resource management & link processing, etc.)

  • In [44], the authors have shown with mathematical analysis and Monte-Carlo simulations that active pilot contamination attack can be severely detrimental for provisioning physical-layer security (PLS) in cell-free massive MIMO systems. They compared co-located massive MIMO and cell-free massive MIMO, and the results revealed that cell-free systems are less resilient to pilot contamination attacks than conventional massive MIMO systems

Read more

Summary

INTRODUCTION

T HE 6TH GENERATION (6G) communication networks are portrayed to form a full connectivity fabric, with a high degree of operational flexibility and autonomy [1], [2]. PLS TECHNIQUES PLS provides security at the very first layer (physical), acting as a first line of defense, trying to make attackers’ job harder It provides confidentiality without assuming a limited computational power of the hostile node, by exploiting unique characteristics of the wireless channel. Some of the main PLS techniques consist of: i) signal processing (noisy modulations); ii) coding (wiretap codes); iii) artificial noise injection (friendly/cooperative jamming); iv) MIMO/IRS (beamforming destructive signal); v) HetNets (user/BS association to provide larger area of security); vi) visible light communications (VLC) (spatial confinement of signals) and vii) cipher-Key generation. PLS can be very helpful in the protection of the sensing capabilities of 6G nodes

Edge computing and learning
Indoor environments
Integrated sensing and communication
CONCLUSION AND FUTURE DIRECTIONS

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.