2022 IEEE Globecom Workshops (GC Wkshps) 2022
DOI: 10.1109/gcwkshps56602.2022.10008585
|View full text |Cite
|
Sign up to set email alerts
|

6G E2E Architecture Framework with Sustainability and Security Considerations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…An attacker using a false identity might even masquerade as a genuine endpoint to connect to the network if the authorization mechanisms are not adequate. Security is heavily investigated in many 5G/6G research projects (notably INSPIRE-5Gplus 1 and HEXA-X 2 ) but these initiatives do not sufficiently address the end-to-end perspective for deterministic networking [75]- [78]. Furthermore, few research efforts are ongoing to develop security solutions for TSN/DetNet.…”
Section: Applications Requiring Determinism Have Differentmentioning
confidence: 99%
“…An attacker using a false identity might even masquerade as a genuine endpoint to connect to the network if the authorization mechanisms are not adequate. Security is heavily investigated in many 5G/6G research projects (notably INSPIRE-5Gplus 1 and HEXA-X 2 ) but these initiatives do not sufficiently address the end-to-end perspective for deterministic networking [75]- [78]. Furthermore, few research efforts are ongoing to develop security solutions for TSN/DetNet.…”
Section: Applications Requiring Determinism Have Differentmentioning
confidence: 99%
“…Network stratum is consisted of network functions in control plan (CP) and user plan (UP) that are responsible for delivering the expected QoS, efficiently allowing user equipment (UE) to exchange data with the network. CP and UP entail novel access technologies, which may also include the ones leveraging subterahertz bands and visible light communications; AI-native air interface, arranged in specific ways (e.g., cell free networks [33,34]), and even including extreme edge functions like the ones that are managing and reconfiguring intelligent metasurfaces.…”
Section: End-to-end Architecturementioning
confidence: 99%
“…Overview of the essential 6G security architectural components[33]. The new 6G security technology enablers highlighted in red, and the more traditional building blocks are in blue.…”
mentioning
confidence: 99%
“…With the increased automation of management functionalities, more capable devices and integration of different potential technologies such as Distributed Ledger Technology (DLT), Native Artificial Intelligence (AI), THz communications and quantum computing, an attack surface will be exposed that will be more complex and challenging to defend compared to current 5G networks [1], [2]. The expected complexity will require to advance or complement traditional management security with AI/ML-driven and automated closed-loop mechanisms [3]. These developments should be based on widely accepted standards.…”
Section: Introductionmentioning
confidence: 99%