A comprehensive survey on 6G-security: physical connection and service layers
Abstract After adopting 5G technology, businesses and academia have started working on sixth-generation wireless networking (6G) technologies. Mobile communications options are expected to expand in areas where previous generations could not do so. 6G networks are anticipated to be constructed using...
Saved in:
| Main Authors: | , , , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer
2025-03-01
|
| Series: | Discover Internet of Things |
| Subjects: | |
| Online Access: | https://doi.org/10.1007/s43926-025-00123-7 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Abstract After adopting 5G technology, businesses and academia have started working on sixth-generation wireless networking (6G) technologies. Mobile communications options are expected to expand in areas where previous generations could not do so. 6G networks are anticipated to be constructed using various diverse technologies. These encompass diverse cutting-edge advancements, such as distributed ledger systems like blockchain, visible light communications (VLC), post-quantum cryptography, edge computing, molecular communication, THz, and other advances. These advances necessitate a reassessment of previous security strategies from a security perspective. In the future, networks must adhere to stricter criteria for authentication, encryption, access control, connectivity, and detection of harmful activities. Ensuring privacy and dependability necessitates the implementation of supplementary security protocols. The essay explores the primary concerns and challenges related to the security of the 6G network. This paper describes the improvements in security in communications from 1G through 6G. This paper divides security in the sixth generation into three layers: physical, connection, and service. Each layer-by-layer discusses the standard technologies and security issues for each technology proposed in each sixth-generation security layer. All proposed solutions for each of the three layers are discussed in Sixth Generation Security. It also reviews all proposed solutions for each layer, indicating the proposed solution and its limitations. |
|---|---|
| ISSN: | 2730-7239 |