Cargando…

Security Requirements and Challenges of 6G Technologies and Applications

After implementing 5G technology, academia and industry started researching 6th generation wireless network technology (6G). 6G is expected to be implemented around the year 2030. It will offer a significant experience for everyone by enabling hyper-connectivity between people and everything. In add...

Descripción completa

Detalles Bibliográficos
Autores principales: Abdel Hakeem, Shimaa A., Hussein, Hanan H., Kim, HyungWon
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8914636/
https://www.ncbi.nlm.nih.gov/pubmed/35271113
http://dx.doi.org/10.3390/s22051969
_version_ 1784667766741008384
author Abdel Hakeem, Shimaa A.
Hussein, Hanan H.
Kim, HyungWon
author_facet Abdel Hakeem, Shimaa A.
Hussein, Hanan H.
Kim, HyungWon
author_sort Abdel Hakeem, Shimaa A.
collection PubMed
description After implementing 5G technology, academia and industry started researching 6th generation wireless network technology (6G). 6G is expected to be implemented around the year 2030. It will offer a significant experience for everyone by enabling hyper-connectivity between people and everything. In addition, it is expected to extend mobile communication possibilities where earlier generations could not have developed. Several potential technologies are predicted to serve as the foundation of 6G networks. These include upcoming and current technologies such as post-quantum cryptography, artificial intelligence (AI), machine learning (ML), enhanced edge computing, molecular communication, THz, visible light communication (VLC), and distributed ledger (DL) technologies such as blockchain. From a security and privacy perspective, these developments need a reconsideration of prior security traditional methods. New novel authentication, encryption, access control, communication, and malicious activity detection must satisfy the higher significant requirements of future networks. In addition, new security approaches are necessary to ensure trustworthiness and privacy. This paper provides insights into the critical problems and difficulties related to the security, privacy, and trust issues of 6G networks. Moreover, the standard technologies and security challenges per each technology are clarified. This paper introduces the 6G security architecture and improvements over the 5G architecture. We also introduce the security issues and challenges of the 6G physical layer. In addition, the AI/ML layers and the proposed security solution in each layer are studied. The paper summarizes the security evolution in legacy mobile networks and concludes with their security problems and the most essential 6G application services and their security requirements. Finally, this paper provides a complete discussion of 6G networks’ trustworthiness and solutions.
format Online
Article
Text
id pubmed-8914636
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-89146362022-03-12 Security Requirements and Challenges of 6G Technologies and Applications Abdel Hakeem, Shimaa A. Hussein, Hanan H. Kim, HyungWon Sensors (Basel) Review After implementing 5G technology, academia and industry started researching 6th generation wireless network technology (6G). 6G is expected to be implemented around the year 2030. It will offer a significant experience for everyone by enabling hyper-connectivity between people and everything. In addition, it is expected to extend mobile communication possibilities where earlier generations could not have developed. Several potential technologies are predicted to serve as the foundation of 6G networks. These include upcoming and current technologies such as post-quantum cryptography, artificial intelligence (AI), machine learning (ML), enhanced edge computing, molecular communication, THz, visible light communication (VLC), and distributed ledger (DL) technologies such as blockchain. From a security and privacy perspective, these developments need a reconsideration of prior security traditional methods. New novel authentication, encryption, access control, communication, and malicious activity detection must satisfy the higher significant requirements of future networks. In addition, new security approaches are necessary to ensure trustworthiness and privacy. This paper provides insights into the critical problems and difficulties related to the security, privacy, and trust issues of 6G networks. Moreover, the standard technologies and security challenges per each technology are clarified. This paper introduces the 6G security architecture and improvements over the 5G architecture. We also introduce the security issues and challenges of the 6G physical layer. In addition, the AI/ML layers and the proposed security solution in each layer are studied. The paper summarizes the security evolution in legacy mobile networks and concludes with their security problems and the most essential 6G application services and their security requirements. Finally, this paper provides a complete discussion of 6G networks’ trustworthiness and solutions. MDPI 2022-03-02 /pmc/articles/PMC8914636/ /pubmed/35271113 http://dx.doi.org/10.3390/s22051969 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Abdel Hakeem, Shimaa A.
Hussein, Hanan H.
Kim, HyungWon
Security Requirements and Challenges of 6G Technologies and Applications
title Security Requirements and Challenges of 6G Technologies and Applications
title_full Security Requirements and Challenges of 6G Technologies and Applications
title_fullStr Security Requirements and Challenges of 6G Technologies and Applications
title_full_unstemmed Security Requirements and Challenges of 6G Technologies and Applications
title_short Security Requirements and Challenges of 6G Technologies and Applications
title_sort security requirements and challenges of 6g technologies and applications
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8914636/
https://www.ncbi.nlm.nih.gov/pubmed/35271113
http://dx.doi.org/10.3390/s22051969
work_keys_str_mv AT abdelhakeemshimaaa securityrequirementsandchallengesof6gtechnologiesandapplications
AT husseinhananh securityrequirementsandchallengesof6gtechnologiesandapplications
AT kimhyungwon securityrequirementsandchallengesof6gtechnologiesandapplications