The Roadmap to 6G Security and Privacy

DC FieldValueLanguage
dc.contributor.authorPorambage, Pawani-
dc.contributor.authorGur, Gurkan-
dc.contributor.authorOsorio, Diana Pamela Moya-
dc.contributor.authorLiyanage, Madhusanka-
dc.contributor.authorGurtov, Andrei-
dc.contributor.authorYlianttila, Mika-
dc.date.accessioned2021-05-17T15:36:21Z-
dc.date.available2021-05-17T15:36:21Z-
dc.date.issued2021-05-10-
dc.identifier.citationIEEE Open Journal of the Communications Societyen_US
dc.identifier.urihttp://hdl.handle.net/10197/12160-
dc.description.abstractAlthough the fifth generation (5G) wireless networks are yet to be fully investigated, the visionaries of the 6th generation (6G) echo systems have already come into the discussion. Therefore, in order to consolidate and solidify the security and privacy in 6G networks, we survey how security may impact the envisioned 6G wireless systems, possible challenges with different 6G technologies, and the potential solutions. We provide our vision on 6G security and security key performance indicators (KPIs) with the tentative threat landscape based on the foreseen 6G network architecture. Moreover, we discuss the security and privacy challenges that may encounter with the available 6G requirements and potential 6G applications. We also give the reader some insights into the standardization efforts and research-level projects relevant to 6G security. In particular, we discuss the security considerations with 6G enabling technologies such as distributed ledger technology (DLT), physical layer security, distributed AI/ML, visible light communication (VLC), THz, and quantum computing. All in all, this work intends to provide enlightening guidance for the subsequent research of 6G security and privacy at this initial phase of vision towards reality.en_US
dc.description.sponsorshipEuropean Commission Horizon 2020en_US
dc.description.sponsorshipUniversity College Dublinen_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subject6Gen_US
dc.subjectSecurityen_US
dc.subjectSecurity threatsen_US
dc.subjectAI/ML securityen_US
dc.subjectDLTen_US
dc.subjectPhysical layer securityen_US
dc.subjectPrivacyen_US
dc.subjectQuantum computingen_US
dc.titleThe Roadmap to 6G Security and Privacyen_US
dc.typeJournal Articleen_US
dc.internal.authorcontactothermadhusanka@ucd.ieen_US
dc.statusPeer revieweden_US
dc.check.date2021-11-13-
dc.identifier.doi10.1109/ojcoms.2021.3078081-
dc.neeo.contributorPorambage|Pawani|aut|-
dc.neeo.contributorGur|Gurkan|aut|-
dc.neeo.contributorOsorio|Diana Pamela Moya|aut|-
dc.neeo.contributorLiyanage|Madhusanka|aut|-
dc.neeo.contributorGurtov|Andrei|aut|-
dc.neeo.contributorYlianttila|Mika|aut|-
dc.description.othersponsorship6Genesis Flagshipen_US
dc.description.othersponsorship5GEARen_US
dc.description.adminUpdate citation details during checkdate report - ACen_US
dc.date.updated2021-05-11T23:50:14Z-
dc.identifier.grantid871808-
dc.rights.licensehttps://creativecommons.org/licenses/by/3.0/ie/en_US
item.grantfulltextopen-
item.fulltextWith Fulltext-
Appears in Collections:Computer Science Research Collection
Files in This Item:
 File SizeFormat
Download6G_Security___OJCOMS__submission_2_ (6).pdf9.52 MBAdobe PDF
Show simple item record

Page view(s)

56
Last Week
2
Last month
18
checked on Jul 24, 2021

Download(s)

36
checked on Jul 24, 2021

Google ScholarTM

Check

Altmetric


If you are a publisher or author and have copyright concerns for any item, please email research.repository@ucd.ie and the item will be withdrawn immediately. The author or person responsible for depositing the article will be contacted within one business day.