2021
DOI: 10.1109/comst.2021.3108618
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
132
0
4

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 259 publications
(136 citation statements)
references
References 188 publications
0
132
0
4
Order By: Relevance
“…Then, there will be many protocols, algorithms, and different device brands that will increase the complexity of the network. The work in [6] shows as B5G/6G networks will be having this increased network heterogeneity, there will be more concerns on privacy than the previous generations. For example, they show the involvement of connected devices in every aspect of humans, such as medical implants, which could pose serious concerns of potential leaks of personal information such as health records.…”
Section: A Why Privacy Is Critical In B5g/6gmentioning
confidence: 99%
See 1 more Smart Citation
“…Then, there will be many protocols, algorithms, and different device brands that will increase the complexity of the network. The work in [6] shows as B5G/6G networks will be having this increased network heterogeneity, there will be more concerns on privacy than the previous generations. For example, they show the involvement of connected devices in every aspect of humans, such as medical implants, which could pose serious concerns of potential leaks of personal information such as health records.…”
Section: A Why Privacy Is Critical In B5g/6gmentioning
confidence: 99%
“…The advent of the study of the next generation of mobile networks has already begun in the research community as we see a lot of related work in the B5G/6G. All of the surveys in [6]- [15] have a clear focus on B5G/6G networks. The work in [6] gives an overview of both privacy and security issues related to 6G networks.…”
Section: B Motivationmentioning
confidence: 99%
“…The number of cores present in the multi-core fiber (MCF) is larger than in the single-core fiber (SCF), but the presence of additional modes also increases the cost of MCF [344]. Currently, 5G and Beyond-5G (B5G) wireless network architectures have been revolutionized due to IoT applications, and the number of user devices and amount of data created by these devices is increasing exponentially [345,346]. This wireless interconnection model of numerous devices is observed and controlled using the internet.…”
mentioning
confidence: 99%
“…One of the current concerns in designing crypto-based systems is the impact that the advance of quantum computing may have in them, so this is an issue that must be taken in consideration when proposing a new system [36]. As far as our e-voting system is concerned, the Shamir secret sharing scheme should not be impacted by the advances on quantum computing.…”
mentioning
confidence: 99%
“…For asymmetric encryption to be usable in practice, a PKI infrastructure must be in place for citizens and political parties. In a similar way, actual device protection is out of the scope of our work, but there are plenty of security mechanisms that could be used to protect the computation if needed, such as security enclaves like the ones used in [36]).…”
mentioning
confidence: 99%