What Physical Layer Security Can Do for 6G Security

被引:55
|
作者
Mitev, Miroslav [1 ]
Chorti, Arsenia [1 ,2 ]
Poor, H. Vincent [3 ]
Fettweis, Gerhard P. [4 ]
机构
[1] Barkhausen Inst, D-01187 Dresden, Germany
[2] CY Cergy Paris Univ, ETIS, ENSEA, CNRS,UMR 8051, F-95000 Cergy, France
[3] Princeton Univ, Sch Engn & Appl Sci, Princeton, NJ 08544 USA
[4] Tech Univ Dresden, Vodafone Chair Mobile Commun Syst, D-01062 Dresden, Germany
基金
美国国家科学基金会;
关键词
Security; 6G mobile communication; Authentication; Ciphers; Semantics; Physical layer security; 5G mobile communication; 5G; 6G; physical layer security; wiretap coding; secret key generation; physical unclonable functions; SMART METER PRIVACY; COMMUNICATION; SYSTEMS;
D O I
10.1109/OJVT.2023.3245071
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
While existing security protocols were designed with a focus on the core network, the enhancement of the security of the B5G access network becomes of critical importance. Despite the strengthening of 5G security protocols with respect to LTE, there are still open issues that have not been fully addressed. This work is articulated around the premise that rethinking the security design bottom up, starting at the physical layer, is not only viable in 6G but importantly, arises as an efficient way to overcome security hurdles in novel use cases, notably massive machine type communications (mMTC), ultra reliable low latency communications (URLLC) and autonomous cyberphysical systems. Unlike existing review papers that treat physical layer security orthogonally to cryptography, we will try to provide a few insights of underlying connections. Discussing many practical issues, we will present a comprehensive review of the state-of the-art in i) secret key generation from shared randomness, ii) the wiretap channels and fundamental limits, iii) authentication of devices using physical unclonable functions (PUFs), localization and multi-factor authentication, and, iv) jamming attacks at the physical layer. We finally conclude with the proposers' aspirations for the 6G security landscape, in the hyper-connectivity and semantic communications era.
引用
收藏
页码:375 / 388
页数:14
相关论文
共 50 条
  • [21] Multi-RIS Aided VLC Physical Layer Security for 6G Wireless Networks
    Soderi, Simone
    Brighente, Alessandro
    Xu, Saiqin
    Conti, Mauro
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (12) : 15182 - 15195
  • [22] Improving Physical Layer Security for Reconfigurable Intelligent Surface Aided NOMA 6G Networks
    Zhang, Zhe
    Zhang, Chensi
    Jiang, Chengjun
    Jia, Fan
    Ge, Jianhua
    Gong, Fengkui
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (05) : 4451 - 4463
  • [23] A Survey on Jamming Techniques in Physical Layer Security and Anti-Jamming Strategies for 6G
    Vaishnavi, K.N.
    Khorvi, Shubham Dashrath
    Kishore, Rajalekshmi
    Gurugopinath, Sanjeev
    2021 28th International Conference on Telecommunications, ICT 2021, 2021,
  • [24] A Survey on Jamming Techniques in Physical Layer Security and Anti-Jamming Strategies for 6G
    Vaishnavi, K. N.
    Khorvi, Shubham Dashrath
    Kishore, Rajalekshmi
    Gurugopinath, Sanjeev
    2021 28TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2021, : 174 - 179
  • [25] Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions
    Irram, Fauzia
    Ali, Mudassar
    Naeem, Muhammad
    Mumtaz, Shahid
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 206
  • [26] The Roadmap to 6G Security and Privacy
    Porambage, Pawani
    Gur, Gurkan
    Osorio, Diana Pamela Moya
    Liyanage, Madhusanka
    Gurtov, Andrei
    Ylianttila, Mika
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2021, 2 : 1094 - 1122
  • [27] TRUST, SECURITY AND PRIVACY OF 6G
    Yan, Zheng
    Yang, Laurence T.
    Li, Tieyan
    Miche, Yoan
    Yu, Shui
    Yau, Stephen S.
    IEEE NETWORK, 2022, 36 (04): : 100 - 102
  • [28] 6G Security Challenges and Opportunities
    Gracia, Mulumba Banza
    Malele, Vusumuzi
    Ndlovu, Sphiwe Promise
    Mathonsi, Topside Ehleketani
    Maaka, Lebogang
    Muchenje, Tonderai
    2022 IEEE 13TH INTERNATIONAL CONFERENCE ON MECHANICAL AND INTELLIGENT MANUFACTURING TECHNOLOGIES (ICMIMT 2022), 2022, : 339 - 343
  • [29] Security and Trust in the 6G Era
    Ziegler, Volker
    Schneider, Peter
    Viswanathan, Harish
    Montag, Michael
    Kanugovi, Satish
    Rezaki, Ali
    IEEE ACCESS, 2021, 9 (09): : 142314 - 142327
  • [30] Artificial intelligence empowered physical layer security for 6G: State-of-the-art, challenges, and opportunities
    Zhang, Shunliang
    Zhu, Dali
    Liu, Yinlong
    COMPUTER NETWORKS, 2024, 242