Fig 1 - uploaded by Madhusanka Liyanage
Content may be subject to copyright.
Source publication
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the visionaries of the 6th generation (6G) echo systems have already come into the discussion. Therefore, in order to consolidate and solidify the security and privacy in 6G networks, we survey how security may impact the envisioned 6G wireless systems, possible...
Contexts in source publication
Context 1
... the security threat landscape has been evolved with more advanced attack scenarios and powerful attackers. The evolution of security landscape of telecommunication networks, from 4G towards the envisioned 6G era, is illustrated in Figure 1. 4G networks faced security and privacy threats mainly due to the execution of wireless applications. ...
Context 2
... there are many research opportunities for finding the correct balance between increasing data privacy and maintaining them with lower computation load which may reduce the speed and accuracy of the computation. In Figure 10, we describe illustrate a summary of 6G privacy with respect to privacy types, privacy violation, privacy protection, and related technologies. ...
Context 3
... Standards Developing Organizations (SDOs) which are relevant to 6G security as shown in Figure 11. ...
Context 4
... the security threat landscape has been evolved with more advanced attack scenarios and powerful attackers. The evolution of security landscape of telecommunication networks, from 4G towards the envisioned 6G era, is Figure 1. 4G networks faced security and privacy threats mainly due to the execution of wireless applications. ...
Context 5
... there are many research opportunities for finding the correct balance between increasing data privacy and maintaining them with lower computation load which may reduce the speed and accuracy of the computation. In Figure 10, we describe illustrate a summary of 6G privacy with respect to privacy types, privacy violation, privacy protection, and related technologies. ...
Similar publications
This paper introduces a novel physical layer (PHY-layer) authentication scheme, called Transfer Learning based PHY-layer Authentication (TL-PHA), aiming to achieve fast online user authentication that is highly desired for latency sensitive applications such as edge computing. The proposed TL-PHA scheme is characterized by incorporating with a nove...
Citations
... This helps address the current limitations in centralised cloud-based solutions by performing initial data filtering, processing, and analysis close to the data source using edge nodes [8]. While edge computing introduces security and management challenges due to increased network nodes, it also enhances privacy and security [9]. ...
Underwater cultural heritage (UCH) is a valuable resource that preserves humanity’s historical legacy, offering insights into traditions and civilisations. Despite its significance, UCH faces threats from inadequate regulatory frameworks, insufficient conservation technologies, and climate-induced environmental changes. This paper proposes an innovative platform combining the internet of underwater things and edge computing technologies to enhance UCH’s real-time monitoring, localisation, and management. The platform processes data through a central unit installed on a buoy near heritage sites, enabling efficient data analysis and decision making without relying on cloud connectivity. Integrating acoustic communication systems, LoRa technology, and nonterrestrial networks supports a robust multilayered communication infrastructure for continuous operation, even in remote maritime areas. The platform’s edge node deploys artificial intelligence models for real-time risk assessment, focusing on key environmental parameters to predict and mitigate corrosion rates and climate-related threats. A case study illustrates the system’s capabilities in underwater localisation, demonstrating how edge computing and acoustic triangulation techniques enable precise tracking.
... At the same time, several projects are funded under the Smart Networks and Services Joint Undertaking (SNS JU) 1 and Horizon 2020 programme [3], in order to facilitate the transition to 6G networks. As new requirements arise in the context of 6G networks, including latency, mobility, peak data rate, spectrum efficiency, area traffic capacity, and network energy efficiency, it must be noted that new attackers also arise [4]. Since, these attackers come with advanced characteristics, intelligent threat mitigation systems will be needed. ...
... We use the 5G-NIDD dataset to conduct our experiments [10]. This dataset has been collected using the 5G Test Network (5GTN) 4 . It contains both pcap files and network traffic data. ...
... As one can easily observe, in most cases by decreasing the number of experts, Accuracy presents also a decrease. Specifically, (64, 32) corresponds to an Accuracy of 0.99875, (64, 16) corresponds to an Accuracy of 0.99863, (32,16) corresponds to an Accuracy of 0.99881, (32,4) corresponds to an Accuracy of 0.99862, and (16,4) corresponds to an Accuracy of 0.99834. Therefore, having more experts leads to better performance for our task. ...
The advent of 6G/NextG networks comes along with a series of benefits, including extreme capacity, reliability, and efficiency. However, these networks may become vulnerable to new security threats. Therefore, 6G/NextG networks must be equipped with advanced Artificial Intelligence algorithms, in order to evade these attacks. Existing studies on the intrusion detection task rely on the train of shallow machine learning classifiers, including Logistic Regression, Decision Trees, and so on, yielding suboptimal performance. Others are based on deep neural networks consisting of static components, which are not conditional on the input. This limits their representation power and efficiency. To resolve these issues, we present the first study integrating Mixture of Experts (MoE) for identifying malicious traffic. Specifically, we use network traffic data and convert the 1D array of features into a 2D matrix. Next, we pass this matrix through convolutional neural network (CNN) layers followed by batch normalization and max pooling layers. After obtaining the representation vector via the CNN layers, a sparsely gated MoE layer is used. This layer consists of a set of experts (dense layers) and a router, where the router assigns weights to the output of each expert. Sparsity is achieved by choosing the most relevant experts of the total ones. Finally, we perform a series of ablation experiments to prove the effectiveness of our proposed model. Experiments are conducted on the 5G-NIDD dataset, a network intrusion detection dataset generated from a real 5G test network. Results show that our introduced approach reaches weighted F1-score up to 99.95% achieving comparable performance to existing approaches. Findings also show that our proposed model achieves multiple advantages over state-of-the-art approaches.
... Security is an intrinsic part of the future 6G architecture [8,13]. The potential 6G threat vector has many more components relative to 5G. ...
Mobile communications have been undergoing a generational change every ten years. While 5G network deployments are maturing, significant efforts are being made to standardize 6G, which is expected to be commercially introduced by 2030. This paper provides unique perspectives on the 6G network (radio and core) architecture(s) from the anticipated 6G use cases to meet the necessary performance requirements. To cater for the key 6G use cases, the 6G architecture must integrate different network-level functions in a multiplicity of virtual cloud environments, leveraging the advancements of distributed processing, artificial intelligence, and securely integrating different sub-networks e.g., terrestrial, and non-terrestrial networks into the overall 6G network. This paper characterizes the impact of 6G architectures from a deployment perspective with backwards compatibility in mind.
... Having in mind the discussion above, it is straightforward that 6G-driven high integration of technologies and ubiquity of services, along with massive exploitation of AI, will raise so many and non-trivial issues in terms of security, privacy and trust of data, that a dedicated PS (ES) is necessary for their counteraction and mitigation [27][28][29]. ...
The forthcoming paradigms of 6G, Future Networks (FN) and Super-Internet of Things (IoT), will bring disruption at various levels of the physical infrastructure. This work focuses on the network edge, stressing how the forecasted proliferation and technology innovation of the physical systems at the boundary of the network (edge), will pose crucial issues to be addressed in the next years. In particular, the continuity from the edge to the core of the network will be addressed, suggesting unprecedented design and development approaches. Along such a direction, the impact of Micro and Nanotechnologies as a Key Enabling Technology (KET) for the network edge of the future is sketched, including numerous examples of already existing micro/nano devices, components and systems. Afterwards, a practical study of how improving hardware technologies at the edge can be beneficial in terms of more efficient operation is reported. To this end, scattered intelligence shall be a key enabler with federated learning at the base station providing decisive assistance to adaptive downlink beamforming codebook design for mmWave massive MIMO set-ups as essential ingredients for enhanced link reliability in edge networks.
... Such delay becomes unacceptable in many use-cases of 6G (delay requirement of 0.01-0.10 ms [11]), including industrial automation applications or high-precision manufacturing [12]. If we aim to perform packet analysis for security reasons, the combined communication and processing delay will make it impossible to achieve the latency requirements foreseen for many use cases in 6G. ...
... As summarized in Table 2, Nguyen et al. [69] and Porambage et al. [79] conducted a comprehensive analysis of security and privacy issues in 6G networks. Specifically, Nguyen et al. [69] survey security and privacy challenges for 6G networks, focusing on new threats from advanced technologies like ultra-massive multiple-input multipleoutput (MIMO) and pervasive AI. ...
... The paper also explores the necessity for dynamic real-time security and innovative data protection methods such as distributed ledgers and differential privacy, providing a roadmap for future 6G security enhancements. Porambage et al. [79] explore future research directions in 6G security and privacy, focusing on trends, applications, requirements, and enabling technologies. It surveys security challenges and potential solutions, including distributed ledger technology (DLT), physical layer security, quantum communication, and distributed AI/ML. ...
... • Investigates the privacy and security challenges associated with these key technologies. [79] General 6G ...
The vision for 6G aims to enhance network capabilities with faster data rates, near-zero latency, and higher capacity, supporting more connected devices and seamless experiences within an intelligent digital ecosystem where artificial intelligence (AI) plays a crucial role in network management and data analysis. This advancement seeks to enable immersive mixed-reality experiences, holographic communications, and smart city infrastructures. However, the expansion of 6G raises critical security and privacy concerns, such as unauthorized access and data breaches. This is due to the increased integration of IoT devices, edge computing, and AI-driven analytics. This paper provides a comprehensive overview of 6G protocols, focusing on security and privacy, identifying risks, and presenting mitigation strategies. The survey examines current risk assessment frameworks and advocates for tailored 6G solutions. We further discuss industry visions, government projects, and standardization efforts to balance technological innovation with robust security and privacy measures.
... The vision of 6G networks is shaped by many new developments and advancements in terms of architecture, applications, technologies, policies, and standardization. Similar to the general vision of 6G, which includes additional intelligence on top of cloud-based and programmable 5G networks, the security vision of 6G also benefits from close integration with artificial intelligence, leading to security automation [26]. In [27] vision of 6G security, it is based on the integration of enabling factors for security technology in the fields of cyber resilience, privacy, trust, and its intersection. ...
The paper proposes a robust crypto-steganography approach that secures the data without affecting it and efficient anti-forgery tool. The proposed approach consists of main three security levels with n-round sub-levels. The hybridization of crypto-chaos based tools with various data hiding tools is performed perfectly. The paper carried out several simulation experiments using multi dataset (Math work, Yolov8 and others) to evaluate the proposed scenarios and find integration of these techniques that provides the best security performance without affecting the data. The best simulation experiments that provided the best data security performance were the integration between 2D Logistic map, SVD, and Baker Map, respectively. The proposed steganography performs better than the recent published related works and compared with the deep learning based steganography. The proposed combined system provided the better simulation results for image security. The simulation results indicated a perfect match between the original message and the decryption original message after applying the system. The results also indicated that there was no effect on the data and no loss of data. As clarified in the results, the proposed hybridization approach can be considered a perfect tool to combat the forgery and tampering attacks on the classified data and immune the data transferring over the various networks. This work is licensed under a Creative Commons Attribution Non-Commercial 4.0 International License.
... With the widespread application of wireless devices, the demand for information sharing and communication among multiple devices is increasing, making ensuring information security especially crucial. Physical layer key generation (PLKG), based on information theory, has gained extensive attention as an effective approach for safeguarding wireless communication [1][2][3][4][5][6][7][8]. Most of the existing studies focus on PLKG for two legitimate users. ...
This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference node. The channel between the relay and Alice serves as the reference channel. To enhance security during the channel measurement stage, a cooperative jamming-based scheme is proposed in this paper. This scheme allows the relay to obtain superimposed channel observations from both the reference channel and other relay channels. Then, a public discussion is utilized to enable all nodes to obtain estimates of the reference channel. Subsequently, the legitimate nodes can agree on a secret key (SK) that remains secret from the eavesdropper (Eve), or a private key (PK) that needs to be secret from both the relay and Eve. This paper also derives the lower and upper bounds of the SK/PK capacity. Notably, it demonstrates that there exists only a small constant difference between the SK/PK upper and lower bounds in the high signal-to-noise ratio (SNR) regime. Simulation results confirm the effectiveness of the proposed scheme for ensuring security and efficiency of group key generation.
... The progression of mobile networks has played a pivotal role in the digital revolution, with each generation bringing forth new technologies and capabilities. The fifth-generation (5G) networks have significantly enhanced mobile broadband and enabled massive machinetype communications with ultra-reliable low latency [23]. 5G networks leverages abstraction and virtualization techniques, such as Software-Defined Networking (SDN), Network Function Virtualization (NFV), and Network Slicing (NS), to provide flexible, efficient, and automated network management and services [18]. ...
... For the evolution from 5G to the sixth generation (6G) networks, network automation has become a necessity to meet the unprecedented demand for future network applications. 6G networks are expected to leverage Artificial Intelligence (AI), Machine Learning (ML), and automation techniques to provide functional modules and operational services, leading to self-organizing and autonomous networks [23]. Previous researchers have extensively dedicated efforts to developing network automation architectures, including Intent-Based Network Management (IBN), Self-Organizing Network Management (SON), and Autonomic Network Management (ANM), etc. [9]. ...
The rapid evolution of mobile networks from 5G to 6G has necessitated the development of autonomous network management systems, such as Zero-Touch Networks (ZTNs). However, the increased complexity and automation of these networks have also escalated cybersecurity risks. Existing Intrusion Detection Systems (IDSs) leveraging traditional Machine Learning (ML) techniques have shown effectiveness in mitigating these risks, but they often require extensive manual effort and expert knowledge. To address these challenges, this paper proposes an Automated Machine Learning (AutoML)-based autonomous IDS framework towards achieving autonomous cybersecurity for next-generation networks. To achieve autonomous intrusion detection, the proposed AutoML framework automates all critical procedures of the data analytics pipeline, including data pre-processing, feature engineering, model selection, hyperparameter tuning, and model ensemble. Specifically, it utilizes a Tabular Variational Auto-Encoder (TVAE) method for automated data balancing, tree-based ML models for automated feature selection and base model learning, Bayesian Optimization (BO) for hyperparameter optimization, and a novel Optimized Confidence-based Stacking Ensemble (OCSE) method for automated model ensemble. The proposed AutoML-based IDS was evaluated on two public benchmark network security datasets, CICIDS2017 and 5G-NIDD, and demonstrated improved performance compared to state-of-the-art cybersecurity methods. This research marks a significant step towards fully autonomous cybersecurity in next-generation networks, potentially revolutionizing network security applications. Github code: https://github.com/Western-OC2-Lab/AutonomousCyber-AutoML-based-Autonomous-Intrusion-Detection-System
... Current research attempts to combine security technologies such as quantum communication [137], blockchain [138], and 6G to ensure data security during data transmission. Many standardisation organisations, such as IEEE and ITUT, have proposed 6G system security architecture and process standards [139]. ...