Skip to main content
Top

2024 | OriginalPaper | Chapter

Protocol Security in 6th Generation (6G) Networks

Authors : Tanya Garg, Gurjinder Kaur, Prashant Singh Rana

Published in: Computational Intelligence and Network Systems

Publisher: Springer Nature Switzerland

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

6th generation networks are expected to be there most probably in year 2030. It is believed that their existence will enable the technology of Internet of Everything. People are already using the 5G Networks and facing several issues in that due to which the 6G networks are very important to develop. 6G technology ensures to connect every device present in the world with the internet providing Quality of Service. The 6G networks are still in discussion stage and it is identified that there is need of tackling the several issues related to security and implementation to get better and secure services from 6G Network. A lot of research is being carried out to ensure the security and integrity of 6G Technology. Various issues need to be addressed before implementing 6G Networks. The security is the main aspect behind the 6G Networks so security must be ensured at each layer of network model. The protocol security is very crucial issue to be considered. In this article, the security is the major concern that has been discussed in detail. Very few researchers have done the work on 6G protocol security in last three years. So, in this article, the main focus is to explore the security protocols and the issues related with the protocols to provide 6G network security have been elaborated to provide the way to the researchers to explore and resolve the 6G Security protocols. The future issues and challenges that need to be focused have also been discussed in this work.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sheth, K., Patel, K., Shah, H., Tanwar, S., Gupta, R., Kumar, N.: A taxonomy of AI techniques for 6G communication networks. Comput. Commun. 161, 279–303 (2020)CrossRef Sheth, K., Patel, K., Shah, H., Tanwar, S., Gupta, R., Kumar, N.: A taxonomy of AI techniques for 6G communication networks. Comput. Commun. 161, 279–303 (2020)CrossRef
2.
go back to reference Yang, P., Xiao, Y., Xiao, M., Li, S.: 6G wireless communications: vision and potential techniques. IEEE Netw. 33(4), 70–75 (2019)MathSciNetCrossRef Yang, P., Xiao, Y., Xiao, M., Li, S.: 6G wireless communications: vision and potential techniques. IEEE Netw. 33(4), 70–75 (2019)MathSciNetCrossRef
4.
5.
go back to reference Chorti, A., et al.:. Context-aware security for 6g wireless the role of physical layer security. arXiv preprint arXiv:2101.01536 (2021) Chorti, A., et al.:. Context-aware security for 6g wireless the role of physical layer security. arXiv preprint arXiv:​2101.​01536 (2021)
6.
go back to reference Wang, M., Zhu, T., Zhang, T., Zhang, J., Shui, Yu., Zhou, W.: Security and privacy in 6G networks: new areas and new challenges. Digit. Commun. Netw. 6(3), 281–291 (2020)CrossRef Wang, M., Zhu, T., Zhang, T., Zhang, J., Shui, Yu., Zhou, W.: Security and privacy in 6G networks: new areas and new challenges. Digit. Commun. Netw. 6(3), 281–291 (2020)CrossRef
7.
go back to reference Shahraki, A., et al.: A comprehensive survey on 6G networks: applications, core services, enabling technologies, and future challenges. arXiv preprint arXiv:2101.12475 (2021) Shahraki, A., et al.: A comprehensive survey on 6G networks: applications, core services, enabling technologies, and future challenges. arXiv preprint arXiv:​2101.​12475 (2021)
8.
go back to reference Tongyi Huang, W., Yang, J.W., Ma, J., Zhang, X., Zhang, D.: A survey on green 6G network: architecture and technologies. IEEE Access 7, 175758–175768 (2019)CrossRef Tongyi Huang, W., Yang, J.W., Ma, J., Zhang, X., Zhang, D.: A survey on green 6G network: architecture and technologies. IEEE Access 7, 175758–175768 (2019)CrossRef
9.
go back to reference Soderi, S.: Enhancing security in 6g visible light communications. In: 2020 2nd 6G wireless summit (6G SUMMIT), pp. 1–5. IEEE (2020) Soderi, S.: Enhancing security in 6g visible light communications. In: 2020 2nd 6G wireless summit (6G SUMMIT), pp. 1–5. IEEE (2020)
10.
go back to reference Long, Q., Chen, Y., Zhang, H., Lei, X.: Software defined 5G and 6G networks: a survey. Mob. Netw. Appl. 1–21 (2019) Long, Q., Chen, Y., Zhang, H., Lei, X.: Software defined 5G and 6G networks: a survey. Mob. Netw. Appl. 1–21 (2019)
11.
go back to reference Mucchi, L., et al.: Physical-layer security in 6G networks. IEEE Open J. Commun. Soc. 2, 1901–1914 (2021)CrossRef Mucchi, L., et al.: Physical-layer security in 6G networks. IEEE Open J. Commun. Soc. 2, 1901–1914 (2021)CrossRef
12.
go back to reference Nguyen, T., Tran, N., Loven, L., Partala, J., Kechadi, M.T., Pirttikangas, S.: Privacy-aware blockchain innovation for 6G: challenges and opportunities. In: 2020 2nd 6G Wireless Summit (6G SUMMIT), pp. 1–5. IEEE (2020) Nguyen, T., Tran, N., Loven, L., Partala, J., Kechadi, M.T., Pirttikangas, S.: Privacy-aware blockchain innovation for 6G: challenges and opportunities. In: 2020 2nd 6G Wireless Summit (6G SUMMIT), pp. 1–5. IEEE (2020)
13.
go back to reference Kantola, R.: Trust networking for beyond 5G and 6G. In: 2020 2nd 6G Wireless Summit (6G SUMMIT), pp. 1–6. IEEE (2020) Kantola, R.: Trust networking for beyond 5G and 6G. In: 2020 2nd 6G Wireless Summit (6G SUMMIT), pp. 1–6. IEEE (2020)
14.
go back to reference You, X., et al.: Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts. Sci. Chin Inf. Sci. 64(1), 1–74 (2021)CrossRef You, X., et al.: Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts. Sci. Chin Inf. Sci. 64(1), 1–74 (2021)CrossRef
15.
go back to reference Kantola, R.: 6G network needs to support embedded trust. In: Proceedings of the 14th International Conference on Availability, Reliability and Security, pp. 1–5 (2019) Kantola, R.: 6G network needs to support embedded trust. In: Proceedings of the 14th International Conference on Availability, Reliability and Security, pp. 1–5 (2019)
16.
go back to reference Gui, G., Liu, M., Tang, F., Kato, N., Adachi, F.: 6G: opening new horizons for integration of comfort, security, and intelligence. IEEE Wirel. Commun. 27(5), 126–132 (2020)CrossRef Gui, G., Liu, M., Tang, F., Kato, N., Adachi, F.: 6G: opening new horizons for integration of comfort, security, and intelligence. IEEE Wirel. Commun. 27(5), 126–132 (2020)CrossRef
17.
go back to reference Guo, F., Yu, F.R., Zhang, H., Li, X., Ji, H., Leung, V.C.: Enabling massive IoT toward 6G: a comprehensive survey. IEEE Internet Things J. 8, 11891–11915 (2021)CrossRef Guo, F., Yu, F.R., Zhang, H., Li, X., Ji, H., Leung, V.C.: Enabling massive IoT toward 6G: a comprehensive survey. IEEE Internet Things J. 8, 11891–11915 (2021)CrossRef
18.
go back to reference Alsharif, M.H., Kelechi, A.H., Albreem, M.A., Chaudhry, S.A., Zia, M.S., Kim, S.: Sixth generation (6G) wireless networks: vision, research activities, challenges and potential solutions. Symmetry 12(4), 676 (2020)CrossRef Alsharif, M.H., Kelechi, A.H., Albreem, M.A., Chaudhry, S.A., Zia, M.S., Kim, S.: Sixth generation (6G) wireless networks: vision, research activities, challenges and potential solutions. Symmetry 12(4), 676 (2020)CrossRef
19.
go back to reference Yang, L.: Security in 6G: the prospects and the relevant technologies. J. Ind. Integr. Manage. 5(03), 271–289 (2020)CrossRef Yang, L.: Security in 6G: the prospects and the relevant technologies. J. Ind. Integr. Manage. 5(03), 271–289 (2020)CrossRef
20.
go back to reference Akhtar, M.W., Hassan, S.A., Ghaffar, R., Jung, H., Garg, S., Hossain, M.S.: The shift to 6G communications: vision and requirements. Hum. Centric Comput. Inf. Sci. 10(1), 1–27 (2020)CrossRef Akhtar, M.W., Hassan, S.A., Ghaffar, R., Jung, H., Garg, S., Hossain, M.S.: The shift to 6G communications: vision and requirements. Hum. Centric Comput. Inf. Sci. 10(1), 1–27 (2020)CrossRef
21.
go back to reference Saad, W., Bennis, M., Chen, M.: A vision of 6G wireless systems: applications, trends, technologies and open research problems. IEEE Netw. 34(3), 134–142 (2019)CrossRef Saad, W., Bennis, M., Chen, M.: A vision of 6G wireless systems: applications, trends, technologies and open research problems. IEEE Netw. 34(3), 134–142 (2019)CrossRef
22.
go back to reference Bernardos, C.J., Uusitalo, M.A.: European vision for the 6G network ecosystem (2021) Bernardos, C.J., Uusitalo, M.A.: European vision for the 6G network ecosystem (2021)
Metadata
Title
Protocol Security in 6th Generation (6G) Networks
Authors
Tanya Garg
Gurjinder Kaur
Prashant Singh Rana
Copyright Year
2024
DOI
https://doi.org/10.1007/978-3-031-48984-6_5

Premium Partner