Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions
Author:
Kazmi Syed Hussain Ali1ORCID, Hassan Rosilah1ORCID, Qamar Faizan1ORCID, Nisar Kashif2, Ibrahim Ag Asri Ag3ORCID
Affiliation:
1. Center for Cyber Security, Faculty of Information Science and Technology (FTSM), Universiti Kebangsaan Malaysia (UKM), Bangi 43600, Selangor, Malaysia 2. Victorian Institute of Technology, Adelaide, SA 5000, Australia 3. Faculty of Computing and Informatics, University Malaysia Sabah, Jalan UMS, Kota Kinabalu 88400, Sabah, Malaysia
Abstract
Challenges faced in network security have significantly steered the deployment timeline of Fifth Generation (5G) communication at a global level; therefore, research in Sixth Generation (6G) security analysis is profoundly necessitated. The prerogative of this paper is to present a survey on the emerging 6G cellular communication paradigm to highlight symmetry with legacy security concepts along with asymmetric innovative aspects such Artificial Intelligence (AI), Quantum Computing, Federated Learning, etc. We present a taxonomy of the threat model in 6G communication in five security legacy concepts, including Confidentiality, Integrity, Availability, Authentication and Access control (CIA3). We also suggest categorization of threat-countering techniques specific to 6G communication into three types: cryptographic methods, entity attributes and Intrusion Detection System (IDS). Thus, with this premise, we distributed the authentication techniques in eight types, including handover authentication, mutual authentication, physical layer authentication, deniable authentication, token-based authentication, certificate-based authentication, key agreement-based authentication and multi-factor authentication. We specifically suggested a series of future research directions at the conclusive edge of this survey.
Funder
Universiti Kebangsaan Malaysia Geran Galakan Penyelidik Muda Universiti of Malaysia Sabah
Subject
Physics and Astronomy (miscellaneous),General Mathematics,Chemistry (miscellaneous),Computer Science (miscellaneous)
Reference172 articles.
1. Hassan, R., Qamar, F., Hasan, M.K., Aman, A.H.M., and Ahmed, A.S. (2020). Internet of Things and its applications: A comprehensive survey. Symmetry, 12. 2. Snehi, J., Snehi, M., Prasad, D., Simaiya, S., Kansal, I., and Baggan, V. (2022). Software Defined Networks: Architecture and Applications, Wiley-Scrivener Publishing. 3. Katz, M., Matinmikko-Blue, M., and Latva-Aho, M. (2018, January 14–16). 6Genesis flagship program: Building the bridges towards 6G-enabled wireless smart society and ecosystem. Proceedings of the 2018 IEEE 10th Latin-American Conference on Communications (LATINCOM), Guadalajara, Mexico. 4. Uusitalo, M.A., Ericson, M., Richerzhagen, B., Soykan, E.U., Rugeland, P., Fettweis, G., Sabella, D., Wikström, G., Boldi, M., and Hamon, M.-H. (2021, January 8–11). Hexa-X the European 6G flagship project. Proceedings of the 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), Porto, Portugal. 5. Strinati, E.C., Alexandropoulos, G.C., Sciancalepore, V., Di Renzo, M., Wymeersch, H., Phan-huy, D.-T., Crozzoli, M., D’Errico, R., De Carvalho, E., and Popovski, P. (2021). Wireless environment as a service enabled by reconfigurable intelligent surfaces: The RISE-6G perspective. arXiv.
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|