A comprehensive survey on 6G-security: physical connection and service layers

Abstract After adopting 5G technology, businesses and academia have started working on sixth-generation wireless networking (6G) technologies. Mobile communications options are expected to expand in areas where previous generations could not do so. 6G networks are anticipated to be constructed using...

Full description

Saved in:
Bibliographic Details
Main Authors: Mamoon M. Saeed, Rashid A. Saeed, Mohammad Kamrul Hasan, Elmustafa Sayed Ali, Tehseen Mazha, Tariq Shahzad, Sunawar Khan, Habib Hamam
Format: Article
Language:English
Published: Springer 2025-03-01
Series:Discover Internet of Things
Subjects:
Online Access:https://doi.org/10.1007/s43926-025-00123-7
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849390266355548160
author Mamoon M. Saeed
Rashid A. Saeed
Mohammad Kamrul Hasan
Elmustafa Sayed Ali
Tehseen Mazha
Tariq Shahzad
Sunawar Khan
Habib Hamam
author_facet Mamoon M. Saeed
Rashid A. Saeed
Mohammad Kamrul Hasan
Elmustafa Sayed Ali
Tehseen Mazha
Tariq Shahzad
Sunawar Khan
Habib Hamam
author_sort Mamoon M. Saeed
collection DOAJ
description Abstract After adopting 5G technology, businesses and academia have started working on sixth-generation wireless networking (6G) technologies. Mobile communications options are expected to expand in areas where previous generations could not do so. 6G networks are anticipated to be constructed using various diverse technologies. These encompass diverse cutting-edge advancements, such as distributed ledger systems like blockchain, visible light communications (VLC), post-quantum cryptography, edge computing, molecular communication, THz, and other advances. These advances necessitate a reassessment of previous security strategies from a security perspective. In the future, networks must adhere to stricter criteria for authentication, encryption, access control, connectivity, and detection of harmful activities. Ensuring privacy and dependability necessitates the implementation of supplementary security protocols. The essay explores the primary concerns and challenges related to the security of the 6G network. This paper describes the improvements in security in communications from 1G through 6G. This paper divides security in the sixth generation into three layers: physical, connection, and service. Each layer-by-layer discusses the standard technologies and security issues for each technology proposed in each sixth-generation security layer. All proposed solutions for each of the three layers are discussed in Sixth Generation Security. It also reviews all proposed solutions for each layer, indicating the proposed solution and its limitations.
format Article
id doaj-art-81a86544464343ddaee4a42e60918b2d
institution Kabale University
issn 2730-7239
language English
publishDate 2025-03-01
publisher Springer
record_format Article
series Discover Internet of Things
spelling doaj-art-81a86544464343ddaee4a42e60918b2d2025-08-20T03:41:43ZengSpringerDiscover Internet of Things2730-72392025-03-015113010.1007/s43926-025-00123-7A comprehensive survey on 6G-security: physical connection and service layersMamoon M. Saeed0Rashid A. Saeed1Mohammad Kamrul Hasan2Elmustafa Sayed Ali3Tehseen Mazha4Tariq Shahzad5Sunawar Khan6Habib Hamam7Department of Communications and Electronics Engineering, Faculty of Engineering, University of Modern Sciences (UMS)Department of Computer Engineering, College of Computers and Information Technology, Taif UniversityCenter for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM)Department of Electrical and Electronic Engineering, Faculty of Engineering, Red Sea UniversitySchool of Computer Science, National College of Business Administration and EconomicsDepartment of Computer Engineering, COMSATS University Islamabad, Sahiwal CampusDepartment of Computer Science and Software Engineering, International Islamic UniversityFaculty of Engineering, Uni de MonctonAbstract After adopting 5G technology, businesses and academia have started working on sixth-generation wireless networking (6G) technologies. Mobile communications options are expected to expand in areas where previous generations could not do so. 6G networks are anticipated to be constructed using various diverse technologies. These encompass diverse cutting-edge advancements, such as distributed ledger systems like blockchain, visible light communications (VLC), post-quantum cryptography, edge computing, molecular communication, THz, and other advances. These advances necessitate a reassessment of previous security strategies from a security perspective. In the future, networks must adhere to stricter criteria for authentication, encryption, access control, connectivity, and detection of harmful activities. Ensuring privacy and dependability necessitates the implementation of supplementary security protocols. The essay explores the primary concerns and challenges related to the security of the 6G network. This paper describes the improvements in security in communications from 1G through 6G. This paper divides security in the sixth generation into three layers: physical, connection, and service. Each layer-by-layer discusses the standard technologies and security issues for each technology proposed in each sixth-generation security layer. All proposed solutions for each of the three layers are discussed in Sixth Generation Security. It also reviews all proposed solutions for each layer, indicating the proposed solution and its limitations.https://doi.org/10.1007/s43926-025-00123-76G securityPhysical layer securityConnection layer securityService layer securityAI/ML security
spellingShingle Mamoon M. Saeed
Rashid A. Saeed
Mohammad Kamrul Hasan
Elmustafa Sayed Ali
Tehseen Mazha
Tariq Shahzad
Sunawar Khan
Habib Hamam
A comprehensive survey on 6G-security: physical connection and service layers
Discover Internet of Things
6G security
Physical layer security
Connection layer security
Service layer security
AI/ML security
title A comprehensive survey on 6G-security: physical connection and service layers
title_full A comprehensive survey on 6G-security: physical connection and service layers
title_fullStr A comprehensive survey on 6G-security: physical connection and service layers
title_full_unstemmed A comprehensive survey on 6G-security: physical connection and service layers
title_short A comprehensive survey on 6G-security: physical connection and service layers
title_sort comprehensive survey on 6g security physical connection and service layers
topic 6G security
Physical layer security
Connection layer security
Service layer security
AI/ML security
url https://doi.org/10.1007/s43926-025-00123-7
work_keys_str_mv AT mamoonmsaeed acomprehensivesurveyon6gsecurityphysicalconnectionandservicelayers
AT rashidasaeed acomprehensivesurveyon6gsecurityphysicalconnectionandservicelayers
AT mohammadkamrulhasan acomprehensivesurveyon6gsecurityphysicalconnectionandservicelayers
AT elmustafasayedali acomprehensivesurveyon6gsecurityphysicalconnectionandservicelayers
AT tehseenmazha acomprehensivesurveyon6gsecurityphysicalconnectionandservicelayers
AT tariqshahzad acomprehensivesurveyon6gsecurityphysicalconnectionandservicelayers
AT sunawarkhan acomprehensivesurveyon6gsecurityphysicalconnectionandservicelayers
AT habibhamam acomprehensivesurveyon6gsecurityphysicalconnectionandservicelayers
AT mamoonmsaeed comprehensivesurveyon6gsecurityphysicalconnectionandservicelayers
AT rashidasaeed comprehensivesurveyon6gsecurityphysicalconnectionandservicelayers
AT mohammadkamrulhasan comprehensivesurveyon6gsecurityphysicalconnectionandservicelayers
AT elmustafasayedali comprehensivesurveyon6gsecurityphysicalconnectionandservicelayers
AT tehseenmazha comprehensivesurveyon6gsecurityphysicalconnectionandservicelayers
AT tariqshahzad comprehensivesurveyon6gsecurityphysicalconnectionandservicelayers
AT sunawarkhan comprehensivesurveyon6gsecurityphysicalconnectionandservicelayers
AT habibhamam comprehensivesurveyon6gsecurityphysicalconnectionandservicelayers