2021
DOI: 10.1109/ojcoms.2021.3103735
|View full text |Cite
|
Sign up to set email alerts
|

Physical-Layer Security in 6G Networks

Abstract: The sixth generation (6G) of mobile network will be composed by different nodes, from macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full connectivity fabric all around us. These heterogeneous nodes constitute an ultra dense network managing tons of information, often very sensitive. To trust the services provided by such network, security is a mandatory feature by design. In this scenario, physical-layer security (PLS) can act as a first line of defense, providing secur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 73 publications
(32 citation statements)
references
References 80 publications
(106 reference statements)
0
32
0
Order By: Relevance
“…Eliminating PLS design and implementations flaws that might otherwise allow attackers to break it may turn out to be more difficult compared to implementations of cryptographical methods, where much broader knowledge and experience, both in theory and practice, is available. Building on the vast amount of literature on PLS and proposals to leverage PLS for node authentication, message integrity, message confidentiality and availability enhancements [39], first papers providing a comprehensive overview and analysis of PLS applicability in 6G have been recently published such as in [40].…”
Section: ) Physical Layer Securitymentioning
confidence: 99%
“…Eliminating PLS design and implementations flaws that might otherwise allow attackers to break it may turn out to be more difficult compared to implementations of cryptographical methods, where much broader knowledge and experience, both in theory and practice, is available. Building on the vast amount of literature on PLS and proposals to leverage PLS for node authentication, message integrity, message confidentiality and availability enhancements [39], first papers providing a comprehensive overview and analysis of PLS applicability in 6G have been recently published such as in [40].…”
Section: ) Physical Layer Securitymentioning
confidence: 99%
“…In this context, 6G communication systems should automatically detect proactive threats with intelligent risk mitigation and self-sustaining operation. To this end, AI-based trust and security become promising solutions to accurately identify and quickly respond to potential threats in an automatic manner [80]. Besides some new threats, 6G networks must cope with existing security issues in formergeneration networks, e.g., SDN, multi-access edge computing (MEC), and NFV.…”
Section: B Trust and Securitymentioning
confidence: 99%
“…This implies that the eavesdropper does not obtain any information about the message and it also implies that the legitimate receiver is always able to correctly decode. Physical layer security mechanisms are the first line of defense [ 20 ] for future wireless communications systems. The ZOSC provides a very strong first line of defense.…”
Section: Introductionmentioning
confidence: 99%