Functional Security and Trust in Ultra-Connected 6G Ecosystem
DOI:
https://doi.org/10.4108/eetinis.v9i4.2846Keywords:
Security Functions, Network Security, 6G, Trust, AdversariesAbstract
Security and trust are the entangled role players in the future generation of wireless networks. Security in 5G networks is currently supported using several functions. Given the advantages of such a system, this article explores the functional security and trust for the 6G ecosystem with ultra-connectivity. Several associated challenges, application-specific domains, and consumer issues related to 6G security are discussed. The article highlights the network security-by-design and trust-by-design principles and performance expectations from the security protocols in supporting handover in an ultra-connected scenario. Finally, potential research directions are presented for a road towards the 6G ecosystem.
Downloads
References
U. Gustavsson, P. Frenger, C. Fager, T. Eriksson, H. Zirath, F. Dielacher, C. Studer, A. Pärssinen, R. Correia, J. N. Matos, et al., “Implementation challenges and opportunities in beyond-5G and 6G communication,” IEEE Journal of Microwaves, vol. 1, no. 1, pp. 86–100, 2021. DOI: https://doi.org/10.1109/JMW.2020.3034648
Z. Zhang, Y. Xiao, Z. Ma, M. Xiao, Z. Ding, X. Lei, G. K. Karagiannidis, and P. Fan, “6G wireless networks: Vision, requirements, architecture, and key technolo-gies,” IEEE Vehicular Technology Magazine, vol. 14, no. 3, pp. 28–41, 2019. DOI: https://doi.org/10.1109/MVT.2019.2921208
P. Porambage, G. Gür, D. P. M. Osorio, M. Liyanage, and M. Ylianttila, “6G security challenges and potential solutions,” in Proc. IEEE Joint Eur. Conf. Netw. Com-mun.(EuCNC) 6G Summit, pp. 1–6, 2021. DOI: https://doi.org/10.1109/EuCNC/6GSummit51104.2021.9482609
V. Sharma, I. You, and N. Guizani, “Security of 5g-v2x: Technologies, standardization, and research directions,” IEEE Network, vol. 34, no. 5, pp. 306–314, 2020. DOI: https://doi.org/10.1109/MNET.001.1900662
C. Cyrus, “IoT Cyberattacks Escalate in 2021, According to Kaspersky,” IoT World Today, https://www.iotworldtoday.com/2021/09/17/iot-cyberattacks-escalate-in-2021-according-to-kaspersky/, last accessed December 2021.
T. Osofsky, “2021 Mid-Year Phishing Trends Update: More Attacks, with Credential Theft Dominating," Security Boulevard https://securityboulevard.com/2021/09/2021-mid-year-phishing-trends-update-more-attacks-with-credential-theft-dominating/, last accessed December 2021.
V. Sharma, I. You, K. Andersson, F. Palmieri, M. H. Rehmani, and J. Lim, “Security, privacy and trust for smart mobile-internet of things (m-iot): A survey,” IEEE access, vol. 8, pp. 167123–167163, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3022661
J. Zhang, R. Woods, T. Q. Duong, A. Marshall, Y. Ding, Y. Huang, and Q. Xu, “Experimental study on key generation for physical layer security in wireless communications,” IEEE Access, vol. 4, pp. 4464–4477, 2016. DOI: https://doi.org/10.1109/ACCESS.2016.2604618
H. Xie, Y. Zhan, G. Zeng, and X. Pan, “LEO Mega-Constellations for 6G Global Coverage: Challenges and Opportunities,” IEEE Access, vol. 9, pp. 164223–164244, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3133301
V. Sharma, I. You, F.-Y. Leu, and M. Atiquzzaman, “Secure and efficient protocol for fast handover in 5g mobile xhaul networks,” Journal of Network and Computer Applications, vol. 102, pp. 38–57, 2018. DOI: https://doi.org/10.1016/j.jnca.2017.11.004
Y. Lu, X. Huang, K. Zhang, S. Maharjan, and Y. Zhang, “Low-latency federated learning and blockchain for edge association in digital twin empowered 6G networks,” IEEE Transactions on Industrial Informatics, vol. 17, no. 7, pp. 5098–5107, 2020. DOI: https://doi.org/10.1109/TII.2020.3017668
M. Grobler, R. Gaire, and S. Nepal, “User, usage and usability: Redefining human centric cyber security,” Frontiers in big Data, vol. 4, 2021. DOI: https://doi.org/10.3389/fdata.2021.583723
G. Ra, T. Kim, and I. Lee, “VAIM: Verifiable Anonymous Identity Management for Human-Centric Security and Privacy in the Internet of Things,” IEEE Access, vol. 9, pp. 75945–75960, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3080329
K.-Y. Lam, S. Mitra, F. Gondesen, and X. Yi, “ANT-Centric IoT Security Reference Architecture – Security-by-Design for Satellite-Enabled Smart Cities,” IEEE Internet of Things Journal, pp. 1–1, 2021.
J. Lockl, V. Schlatt, A. Schweizer, N. Urbach, and N. Harth, “Toward trust in Internet of Things ecosys-tems: Design principles for blockchain-based IoT appli-cations,” IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 1256–1270, 2020. DOI: https://doi.org/10.1109/TEM.2020.2978014
J.-H. Lee, J.-M. Bonnin, I. You, and T.-M. Chung, “Comparative handover performance analysis of IPv6 mobility management protocols,” IEEE Transactions on Industrial Electronics, vol. 60, no. 3, pp. 1077–1088, 2012. DOI: https://doi.org/10.1109/TIE.2012.2198035
R. Gupta, D. Reebadiya, and S. Tanwar, “6G-enabled Edge Intelligence for Ultra-Reliable Low Latency Applications: Vision and Mission,” Computer Standards & Interfaces, vol. 77, p. 103521, 2021. DOI: https://doi.org/10.1016/j.csi.2021.103521
A. A. Nasir, H. D. Tuan, T. Q. Duong, and H. V. Poor, “Secrecy rate beamforming for multicell networks with information and energy harvesting,” IEEE Transactions on Signal Processing, vol. 65, no. 3, pp. 677–689, 2016. DOI: https://doi.org/10.1109/TSP.2016.2621719
F. Kammüller, “Human centric security and privacy for the iot using formal techniques,” in International Conference on Applied Human Factors and Ergonomics, pp. 106–116, Springer, 2017. DOI: https://doi.org/10.1007/978-3-319-60585-2_12
F. Kammüller, J. C. Augusto, and S. Jones, “Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle,” in 15th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 401–406, IEEE, 2017. DOI: https://doi.org/10.1109/SERA.2017.7965758
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems
This work is licensed under a Creative Commons Attribution 3.0 Unported License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 3.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.