What Physical Layer Security Can Do for 6G Security

12/01/2022
by   Miroslav Mitev, et al.
0

While existing security protocols were designed with a focus on the core network, the enhancement of the security of the B5G access network becomes of critical importance. Despite the strengthening of 5G security protocols with respect to LTE, there are still open issues that have not been fully addressed. This work is articulated around the premise that rethinking the security design bottom up, starting at the physical layer, is not only viable in 6G but importantly, arises as an efficient way to overcome security hurdles in novel use cases, notably massive machine type communications (mMTC), ultra reliable low latency communications (URLLC) and autonomous cyberphysical systems. Unlike existing review papers that treat physical layer security orthogonally to cryptography, we will try to provide a few insights of underlying connections. Discussing many practical issues, we will present a comprehensive review of the state-of-the-art in i) secret key generation from shared randomness, ii) the wiretap channel and fundamental limits, iii) authentication of devices using physical unclonable functions (PUFs), localization and multi-factor authentication, and, iv) jamming attacks at the physical layer. We finally conclude with the proposers' aspirations for the 6G security landscape, in the hyper-connectivity and semantic communications era.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/20/2020

Physical Layer Security: Authentication, Integrity and Confidentiality

The goal of physical layer security (PLS) is to make use of the properti...
research
10/24/2022

Physical Layer Security – from Theory to Practice

A large spectrum of technologies are collectively dubbed as physical lay...
research
11/14/2020

Brief Report on QoSec, Context Aware Security and the Role of Physical Layer Security in 6G Wireless

While the security literature predominantly focuses on the core network,...
research
01/20/2020

Authenticated Secret Key Generation in Delay Constrained Wireless Systems

With the emergence of 5G low latency applications, such as haptics and V...
research
02/11/2019

Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers

The 5th generation (5G) network adopts a great number of revolutionary t...
research
06/30/2022

Security and Privacy vulnerabilities of 5G/6G and WiFi 6: Survey and Research Directions from a Coexistence Perspective

Spectrum scarcity has been a major concern for achieving the desired qua...
research
05/03/2022

Physical Layer Security for 6G Systems why it is needed and how to make it happen

Sixth generations (6G) systems will be required to meet diverse constrai...

Please sign up or login with your details

Forgot password? Click here to reset