2023
DOI: 10.1109/ojvt.2023.3245071
|View full text |Cite
|
Sign up to set email alerts
|

What Physical Layer Security Can Do for 6G Security

Abstract: While existing security protocols were designed with a focus on the core network, the enhancement of the security of the B5G access network becomes of critical importance. Despite the strengthening of 5G security protocols with respect to LTE, there are still open issues that have not been fully addressed. This work is articulated around the premise that rethinking the security design bottom up, starting at the physical layer, is not only viable in 6G but importantly, arises as an efficient way to overcome sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
14
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(14 citation statements)
references
References 29 publications
0
14
0
Order By: Relevance
“…PLS methods may be ineffective in unfavorable propagation conditions because they rely on noise and fading variations in wireless channels. Security can be enhanced in 6G-IoT networks with dynamically controlled channels provided by RIS [10]. For example, an RIS can completely exploit PLS advantages caused by channel propagation characteristics, spatial diversity, beamforming, and cooperative communications.…”
Section: Introductionmentioning
confidence: 99%
“…PLS methods may be ineffective in unfavorable propagation conditions because they rely on noise and fading variations in wireless channels. Security can be enhanced in 6G-IoT networks with dynamically controlled channels provided by RIS [10]. For example, an RIS can completely exploit PLS advantages caused by channel propagation characteristics, spatial diversity, beamforming, and cooperative communications.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, a new method called physical-layer security (PLS), which has low computational complexity, has been proposed and is used to aid cryptography in achieving secure communications in wireless networks with low computing capability. The principle of PLS is based on information theory, and uses the randomness of noise and wireless channels to achieve secure communications [ 7 ]. Compared with the cryptography method, PLS has a lower network resource overhead and computational complexity [ 8 ].…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, the complexity of devices and environments exposes IoT networks to malicious attacks that exploit security vulnerabilities [ 12 ]. Due to the large number of IoT sensor nodes and the openness of wireless networks, attackers can eavesdrop on communications, modify transmitted messages, and even send false data [ 13 , 14 , 15 ]. For instance, in unsupervised industrial IoT networks [ 16 , 17 , 18 ], clone node attacks can occur, where adversaries hijack control devices and deploy cloned nodes, leading to significant security risks by collecting sensitive information.…”
Section: Introductionmentioning
confidence: 99%
“…The AIoT network needs to verify the legitimacy of wireless sensors during the initial joining process of communication nodes. The increasing complexity of standard encryption methods has motivated the study of physical layer authentication techniques.Several security technologies have been proposed for IoT networks [ 13 ]. For instance, physical unclonable functions (PUF) and wireless fingerprinting (WF) have shown promise in improving authentication in challenging scenarios.…”
Section: Introductionmentioning
confidence: 99%