Functional Security and Trust in Ultra-Connected 6G Ecosystem




Security Functions, Network Security, 6G, Trust, Adversaries


Security and trust are the entangled role players in the future generation of wireless networks. Security in 5G networks is currently supported using several functions. Given the advantages of such a system, this article explores the functional security and trust for the 6G ecosystem with ultra-connectivity. Several associated challenges, application-specific domains, and consumer issues related to 6G security are discussed. The article highlights the network security-by-design and trust-by-design principles and performance expectations from the security protocols in supporting handover in an ultra-connected scenario. Finally, potential research directions are presented for a road towards the 6G ecosystem.


Download data is not yet available.


U. Gustavsson, P. Frenger, C. Fager, T. Eriksson, H. Zirath, F. Dielacher, C. Studer, A. Pärssinen, R. Correia, J. N. Matos, et al., “Implementation challenges and opportunities in beyond-5G and 6G communication,” IEEE Journal of Microwaves, vol. 1, no. 1, pp. 86–100, 2021. DOI:

Z. Zhang, Y. Xiao, Z. Ma, M. Xiao, Z. Ding, X. Lei, G. K. Karagiannidis, and P. Fan, “6G wireless networks: Vision, requirements, architecture, and key technolo-gies,” IEEE Vehicular Technology Magazine, vol. 14, no. 3, pp. 28–41, 2019. DOI:

P. Porambage, G. Gür, D. P. M. Osorio, M. Liyanage, and M. Ylianttila, “6G security challenges and potential solutions,” in Proc. IEEE Joint Eur. Conf. Netw. Com-mun.(EuCNC) 6G Summit, pp. 1–6, 2021. DOI:

V. Sharma, I. You, and N. Guizani, “Security of 5g-v2x: Technologies, standardization, and research directions,” IEEE Network, vol. 34, no. 5, pp. 306–314, 2020. DOI:

C. Cyrus, “IoT Cyberattacks Escalate in 2021, According to Kaspersky,” IoT World Today,, last accessed December 2021.

T. Osofsky, “2021 Mid-Year Phishing Trends Update: More Attacks, with Credential Theft Dominating," Security Boulevard, last accessed December 2021.

V. Sharma, I. You, K. Andersson, F. Palmieri, M. H. Rehmani, and J. Lim, “Security, privacy and trust for smart mobile-internet of things (m-iot): A survey,” IEEE access, vol. 8, pp. 167123–167163, 2020. DOI:

J. Zhang, R. Woods, T. Q. Duong, A. Marshall, Y. Ding, Y. Huang, and Q. Xu, “Experimental study on key generation for physical layer security in wireless communications,” IEEE Access, vol. 4, pp. 4464–4477, 2016. DOI:

H. Xie, Y. Zhan, G. Zeng, and X. Pan, “LEO Mega-Constellations for 6G Global Coverage: Challenges and Opportunities,” IEEE Access, vol. 9, pp. 164223–164244, 2021. DOI:

V. Sharma, I. You, F.-Y. Leu, and M. Atiquzzaman, “Secure and efficient protocol for fast handover in 5g mobile xhaul networks,” Journal of Network and Computer Applications, vol. 102, pp. 38–57, 2018. DOI:

Y. Lu, X. Huang, K. Zhang, S. Maharjan, and Y. Zhang, “Low-latency federated learning and blockchain for edge association in digital twin empowered 6G networks,” IEEE Transactions on Industrial Informatics, vol. 17, no. 7, pp. 5098–5107, 2020. DOI:

M. Grobler, R. Gaire, and S. Nepal, “User, usage and usability: Redefining human centric cyber security,” Frontiers in big Data, vol. 4, 2021. DOI:

G. Ra, T. Kim, and I. Lee, “VAIM: Verifiable Anonymous Identity Management for Human-Centric Security and Privacy in the Internet of Things,” IEEE Access, vol. 9, pp. 75945–75960, 2021. DOI:

K.-Y. Lam, S. Mitra, F. Gondesen, and X. Yi, “ANT-Centric IoT Security Reference Architecture – Security-by-Design for Satellite-Enabled Smart Cities,” IEEE Internet of Things Journal, pp. 1–1, 2021.

J. Lockl, V. Schlatt, A. Schweizer, N. Urbach, and N. Harth, “Toward trust in Internet of Things ecosys-tems: Design principles for blockchain-based IoT appli-cations,” IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 1256–1270, 2020. DOI:

J.-H. Lee, J.-M. Bonnin, I. You, and T.-M. Chung, “Comparative handover performance analysis of IPv6 mobility management protocols,” IEEE Transactions on Industrial Electronics, vol. 60, no. 3, pp. 1077–1088, 2012. DOI:

R. Gupta, D. Reebadiya, and S. Tanwar, “6G-enabled Edge Intelligence for Ultra-Reliable Low Latency Applications: Vision and Mission,” Computer Standards & Interfaces, vol. 77, p. 103521, 2021. DOI:

A. A. Nasir, H. D. Tuan, T. Q. Duong, and H. V. Poor, “Secrecy rate beamforming for multicell networks with information and energy harvesting,” IEEE Transactions on Signal Processing, vol. 65, no. 3, pp. 677–689, 2016. DOI:

F. Kammüller, “Human centric security and privacy for the iot using formal techniques,” in International Conference on Applied Human Factors and Ergonomics, pp. 106–116, Springer, 2017. DOI:

F. Kammüller, J. C. Augusto, and S. Jones, “Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle,” in 15th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 401–406, IEEE, 2017. DOI:




How to Cite

Sharma, V. (2022). Functional Security and Trust in Ultra-Connected 6G Ecosystem. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 9(4), e5.