Abstract

A comprehensive set of security technology enablers will be critically required for communication systems for the 6G era of the 2030s. Trustworthiness must be assured across IoT, heterogenous cloud and networks, devices, sub-networks, and applications. The 6G threat vector will be defined by 6G architectural disaggregation, open interfaces and an environment with multiple stakeholders. Broadly decomposed into domains of cyber-resilience, privacy and trust and their respective intersection, we explore relevant security technology enablers including automated software creation and automated closed-loop security operation, privacy preserving technologies, hardware and cloud embedded anchors of trust, quantum-safe security, jamming protection and physical layer security as well as distributed ledger technologies. Artificial intelligence and machine learning (AI/ML) as a key technology enabler will be pervasive and of pivotal relevance across the security technology stack and architecture. A novel vision for a trustworthy Secure Telecom Operation Map is developed as part of the automated closed loop operations paradigm.

Highlights

  • Communications in the 2030s will be heavily influenced by 6G technology and its architecture, which will hold significant potential and opportunity to expand and augment human potential

  • It should be noted that physical layer security (PLS) methods may provide security that is provable by means of information theory, while cryptographic methods rely on the assumption that certain mathematical problems cannot be solved with reasonable effort

  • While the distributed ledger technologies provide a good framework to simplify establishment of trust across heterogenous operator domains and enhance 6G era use cases as well as cumulative trust building based on verified device behavior, a key challenge for practical deployments would be the limits of scalability, energy efficiency and latency of Distributed ledger technologies (DLT) operations

Read more

Summary

INTRODUCTION

Communications in the 2030s will be heavily influenced by 6G technology and its architecture, which will hold significant potential and opportunity to expand and augment human potential. Other use cases in this category include high resolution mapping for remote driving and transport purposes both indoors (e.g., in manufacturing) and outdoors This kind of mixed reality co-design is likely to take Industry 4.0 to the level in the 2030s, but it will need holistic security mechanisms. Such industrial use case scenarios will require enhanced mechanism for assurance of identity and privacy of the new autonomous machines and devices to protect intellectual property of the companies involved. Trustworthiness in the 6G era will require automated software (SW) creation and automated closed-loop security operations including a vision for a comprehensive Secure Telecom Operation Map (SecTOM) Privacy preserving technologies such as homomorphic encryption and federated learning will be crucial for various use case scenarios as described above and will complement technology enablers such as hardware (HW) and cloudembedded anchors of trust.

EVOLUTION OF THE 5G SECURITY PARADIGM
THREATS AND TRUSTWORTHINESS CHALLENGE
AUTOMATED SW CREATION
AUTOMATED SECURITY OPERATIONS
PRIVACY PRESERVING TECHNOLOGIES
HW AND CLOUD EMBEDDED ANCHORS OF TRUST
QUANTUM SAFE SECURITY
JAMMING PROTECTION AND PHYSICAL LAYER SECURITY
DISTRIBUTED LEDGER TECHNOLOGIES
CHALLENGES OF SECURITY FUTURE RESEARCH
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call