Abstract

After implementing 5G technology, academia and industry started researching 6th generation wireless network technology (6G). 6G is expected to be implemented around the year 2030. It will offer a significant experience for everyone by enabling hyper-connectivity between people and everything. In addition, it is expected to extend mobile communication possibilities where earlier generations could not have developed. Several potential technologies are predicted to serve as the foundation of 6G networks. These include upcoming and current technologies such as post-quantum cryptography, artificial intelligence (AI), machine learning (ML), enhanced edge computing, molecular communication, THz, visible light communication (VLC), and distributed ledger (DL) technologies such as blockchain. From a security and privacy perspective, these developments need a reconsideration of prior security traditional methods. New novel authentication, encryption, access control, communication, and malicious activity detection must satisfy the higher significant requirements of future networks. In addition, new security approaches are necessary to ensure trustworthiness and privacy. This paper provides insights into the critical problems and difficulties related to the security, privacy, and trust issues of 6G networks. Moreover, the standard technologies and security challenges per each technology are clarified. This paper introduces the 6G security architecture and improvements over the 5G architecture. We also introduce the security issues and challenges of the 6G physical layer. In addition, the AI/ML layers and the proposed security solution in each layer are studied. The paper summarizes the security evolution in legacy mobile networks and concludes with their security problems and the most essential 6G application services and their security requirements. Finally, this paper provides a complete discussion of 6G networks’ trustworthiness and solutions.

Highlights

  • By 2020, fifth-generation (5G) radio networks had been implemented globally, with features such as mass connection, extreme dependability, and guaranteed low latency specified [1]. 5G, on the other hand, will fall short of meeting all future needs beyond2030

  • Following are the significant issues learned from legacy network security challenges and improvements

  • This paper introduces an intensive study on security challenges and requirements for the 6G network

Read more

Summary

Introduction

By 2020, fifth-generation (5G) radio networks had been implemented globally, with features such as mass connection, extreme dependability, and guaranteed low latency specified [1]. 5G, on the other hand, will fall short of meeting all future needs beyond. Big data technologies in response to the massive datasets generated by heterogeneous networks with different communication scenarios, wide bandwidths, a higher number of antennas, and new 6G applications’ requirements [4–7]. This paper presents the 6G security trends and challenges of other upcoming technologies and applications. High requirements need highly efficient security solutions that ensure service and resource availability. The study presents the 6G technologies and applications’ security issues and requirements. This paper considers one of the first studies that includes an extensive survey for the 6G new technology security potential solutions [13,14]. Presenting the 6G applications security problems and proposed solutions.

Security Evolution of Mobile Cellular Networks
Security Issues in 1G, 2G, and 3G
Security Issues in 4G and 5G
Conclusions of Mobile Networks Security
The 6G Essential Projects
Proposed Security Architecture of 6G
AI/ML Technology
Quantum Communication
Distributed Ledger Technology
Related Work
Unmanned Aerial Vehicle (UAV) Applications
Holographic Applications
Extended Reality
Connected Autonomous Vehicles
Digital Healthcare
Digital Twins (a Digital Reflection of the Real World)
Brain–Computer Interactions (BCI)
6.10. Distributed Ledger Applications
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call