A comprehensive survey on 6G-security: physical connection and service layers
Abstract After adopting 5G technology, businesses and academia have started working on sixth-generation wireless networking (6G) technologies. Mobile communications options are expected to expand in areas where previous generations could not do so. 6G networks are anticipated to be constructed using...
Saved in:
| Main Authors: | , , , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer
2025-03-01
|
| Series: | Discover Internet of Things |
| Subjects: | |
| Online Access: | https://doi.org/10.1007/s43926-025-00123-7 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849390266355548160 |
|---|---|
| author | Mamoon M. Saeed Rashid A. Saeed Mohammad Kamrul Hasan Elmustafa Sayed Ali Tehseen Mazha Tariq Shahzad Sunawar Khan Habib Hamam |
| author_facet | Mamoon M. Saeed Rashid A. Saeed Mohammad Kamrul Hasan Elmustafa Sayed Ali Tehseen Mazha Tariq Shahzad Sunawar Khan Habib Hamam |
| author_sort | Mamoon M. Saeed |
| collection | DOAJ |
| description | Abstract After adopting 5G technology, businesses and academia have started working on sixth-generation wireless networking (6G) technologies. Mobile communications options are expected to expand in areas where previous generations could not do so. 6G networks are anticipated to be constructed using various diverse technologies. These encompass diverse cutting-edge advancements, such as distributed ledger systems like blockchain, visible light communications (VLC), post-quantum cryptography, edge computing, molecular communication, THz, and other advances. These advances necessitate a reassessment of previous security strategies from a security perspective. In the future, networks must adhere to stricter criteria for authentication, encryption, access control, connectivity, and detection of harmful activities. Ensuring privacy and dependability necessitates the implementation of supplementary security protocols. The essay explores the primary concerns and challenges related to the security of the 6G network. This paper describes the improvements in security in communications from 1G through 6G. This paper divides security in the sixth generation into three layers: physical, connection, and service. Each layer-by-layer discusses the standard technologies and security issues for each technology proposed in each sixth-generation security layer. All proposed solutions for each of the three layers are discussed in Sixth Generation Security. It also reviews all proposed solutions for each layer, indicating the proposed solution and its limitations. |
| format | Article |
| id | doaj-art-81a86544464343ddaee4a42e60918b2d |
| institution | Kabale University |
| issn | 2730-7239 |
| language | English |
| publishDate | 2025-03-01 |
| publisher | Springer |
| record_format | Article |
| series | Discover Internet of Things |
| spelling | doaj-art-81a86544464343ddaee4a42e60918b2d2025-08-20T03:41:43ZengSpringerDiscover Internet of Things2730-72392025-03-015113010.1007/s43926-025-00123-7A comprehensive survey on 6G-security: physical connection and service layersMamoon M. Saeed0Rashid A. Saeed1Mohammad Kamrul Hasan2Elmustafa Sayed Ali3Tehseen Mazha4Tariq Shahzad5Sunawar Khan6Habib Hamam7Department of Communications and Electronics Engineering, Faculty of Engineering, University of Modern Sciences (UMS)Department of Computer Engineering, College of Computers and Information Technology, Taif UniversityCenter for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM)Department of Electrical and Electronic Engineering, Faculty of Engineering, Red Sea UniversitySchool of Computer Science, National College of Business Administration and EconomicsDepartment of Computer Engineering, COMSATS University Islamabad, Sahiwal CampusDepartment of Computer Science and Software Engineering, International Islamic UniversityFaculty of Engineering, Uni de MonctonAbstract After adopting 5G technology, businesses and academia have started working on sixth-generation wireless networking (6G) technologies. Mobile communications options are expected to expand in areas where previous generations could not do so. 6G networks are anticipated to be constructed using various diverse technologies. These encompass diverse cutting-edge advancements, such as distributed ledger systems like blockchain, visible light communications (VLC), post-quantum cryptography, edge computing, molecular communication, THz, and other advances. These advances necessitate a reassessment of previous security strategies from a security perspective. In the future, networks must adhere to stricter criteria for authentication, encryption, access control, connectivity, and detection of harmful activities. Ensuring privacy and dependability necessitates the implementation of supplementary security protocols. The essay explores the primary concerns and challenges related to the security of the 6G network. This paper describes the improvements in security in communications from 1G through 6G. This paper divides security in the sixth generation into three layers: physical, connection, and service. Each layer-by-layer discusses the standard technologies and security issues for each technology proposed in each sixth-generation security layer. All proposed solutions for each of the three layers are discussed in Sixth Generation Security. It also reviews all proposed solutions for each layer, indicating the proposed solution and its limitations.https://doi.org/10.1007/s43926-025-00123-76G securityPhysical layer securityConnection layer securityService layer securityAI/ML security |
| spellingShingle | Mamoon M. Saeed Rashid A. Saeed Mohammad Kamrul Hasan Elmustafa Sayed Ali Tehseen Mazha Tariq Shahzad Sunawar Khan Habib Hamam A comprehensive survey on 6G-security: physical connection and service layers Discover Internet of Things 6G security Physical layer security Connection layer security Service layer security AI/ML security |
| title | A comprehensive survey on 6G-security: physical connection and service layers |
| title_full | A comprehensive survey on 6G-security: physical connection and service layers |
| title_fullStr | A comprehensive survey on 6G-security: physical connection and service layers |
| title_full_unstemmed | A comprehensive survey on 6G-security: physical connection and service layers |
| title_short | A comprehensive survey on 6G-security: physical connection and service layers |
| title_sort | comprehensive survey on 6g security physical connection and service layers |
| topic | 6G security Physical layer security Connection layer security Service layer security AI/ML security |
| url | https://doi.org/10.1007/s43926-025-00123-7 |
| work_keys_str_mv | AT mamoonmsaeed acomprehensivesurveyon6gsecurityphysicalconnectionandservicelayers AT rashidasaeed acomprehensivesurveyon6gsecurityphysicalconnectionandservicelayers AT mohammadkamrulhasan acomprehensivesurveyon6gsecurityphysicalconnectionandservicelayers AT elmustafasayedali acomprehensivesurveyon6gsecurityphysicalconnectionandservicelayers AT tehseenmazha acomprehensivesurveyon6gsecurityphysicalconnectionandservicelayers AT tariqshahzad acomprehensivesurveyon6gsecurityphysicalconnectionandservicelayers AT sunawarkhan acomprehensivesurveyon6gsecurityphysicalconnectionandservicelayers AT habibhamam acomprehensivesurveyon6gsecurityphysicalconnectionandservicelayers AT mamoonmsaeed comprehensivesurveyon6gsecurityphysicalconnectionandservicelayers AT rashidasaeed comprehensivesurveyon6gsecurityphysicalconnectionandservicelayers AT mohammadkamrulhasan comprehensivesurveyon6gsecurityphysicalconnectionandservicelayers AT elmustafasayedali comprehensivesurveyon6gsecurityphysicalconnectionandservicelayers AT tehseenmazha comprehensivesurveyon6gsecurityphysicalconnectionandservicelayers AT tariqshahzad comprehensivesurveyon6gsecurityphysicalconnectionandservicelayers AT sunawarkhan comprehensivesurveyon6gsecurityphysicalconnectionandservicelayers AT habibhamam comprehensivesurveyon6gsecurityphysicalconnectionandservicelayers |