Security concepts in emerging 6G communication: threats, countermeasures, authentication techniques and research directions

Challenges faced in network security have significantly steered the deployment timeline of Fifth Generation (5G) communication at a global level; therefore, research in Sixth Generation (6G) security analysis is profoundly necessitated. The prerogative of this paper is to present a survey on the eme...

Full description

Bibliographic Details
Main Authors: Syed Hussain Ali Kazmi, Rosilah Hassan, Faizan Qamar, Kashif Nisar, Ag Asri Ag Ibrahim
Format: Article
Language:English
English
Published: MDPI AG 2023
Subjects:
Online Access:https://eprints.ums.edu.my/id/eprint/38211/1/ABSTRACT.pdf
https://eprints.ums.edu.my/id/eprint/38211/2/FULL%20TEXT.pdf
_version_ 1825715495993606144
author Syed Hussain Ali Kazmi
Rosilah Hassan
Faizan Qamar
Kashif Nisar
Ag Asri Ag Ibrahim
author_facet Syed Hussain Ali Kazmi
Rosilah Hassan
Faizan Qamar
Kashif Nisar
Ag Asri Ag Ibrahim
author_sort Syed Hussain Ali Kazmi
collection UMS
description Challenges faced in network security have significantly steered the deployment timeline of Fifth Generation (5G) communication at a global level; therefore, research in Sixth Generation (6G) security analysis is profoundly necessitated. The prerogative of this paper is to present a survey on the emerging 6G cellular communication paradigm to highlight symmetry with legacy security concepts along with asymmetric innovative aspects such Artificial Intelligence (AI), Quantum Computing, Federated Learning, etc. We present a taxonomy of the threat model in 6G communication in five security legacy concepts, including Confidentiality, Integrity, Availability, Authentication and Access control (CIA3 ). We also suggest categorization of threat-countering techniques specific to 6G communication into three types: cryptographic methods, entity attributes and Intrusion Detection System (IDS). Thus, with this premise, we distributed the authentication techniques in eight types, including handover authentication, mutual authentication, physical layer authentication, deniable authentication, token-based authentication, certificate-based authentication, key agreement-based authentication and multi-factor authentication. We specifically suggested a series of future research directions at the conclusive edge of this survey
first_indexed 2024-03-06T03:27:42Z
format Article
id ums.eprints-38211
institution Universiti Malaysia Sabah
language English
English
last_indexed 2024-03-06T03:27:42Z
publishDate 2023
publisher MDPI AG
record_format dspace
spelling ums.eprints-382112024-02-09T03:17:23Z https://eprints.ums.edu.my/id/eprint/38211/ Security concepts in emerging 6G communication: threats, countermeasures, authentication techniques and research directions Syed Hussain Ali Kazmi Rosilah Hassan Faizan Qamar Kashif Nisar Ag Asri Ag Ibrahim H1-99 Social sciences (General) TK5101-6720 Telecommunication Including telegraphy, telephone, radio, radar, television Challenges faced in network security have significantly steered the deployment timeline of Fifth Generation (5G) communication at a global level; therefore, research in Sixth Generation (6G) security analysis is profoundly necessitated. The prerogative of this paper is to present a survey on the emerging 6G cellular communication paradigm to highlight symmetry with legacy security concepts along with asymmetric innovative aspects such Artificial Intelligence (AI), Quantum Computing, Federated Learning, etc. We present a taxonomy of the threat model in 6G communication in five security legacy concepts, including Confidentiality, Integrity, Availability, Authentication and Access control (CIA3 ). We also suggest categorization of threat-countering techniques specific to 6G communication into three types: cryptographic methods, entity attributes and Intrusion Detection System (IDS). Thus, with this premise, we distributed the authentication techniques in eight types, including handover authentication, mutual authentication, physical layer authentication, deniable authentication, token-based authentication, certificate-based authentication, key agreement-based authentication and multi-factor authentication. We specifically suggested a series of future research directions at the conclusive edge of this survey MDPI AG 2023 Article NonPeerReviewed text en https://eprints.ums.edu.my/id/eprint/38211/1/ABSTRACT.pdf text en https://eprints.ums.edu.my/id/eprint/38211/2/FULL%20TEXT.pdf Syed Hussain Ali Kazmi and Rosilah Hassan and Faizan Qamar and Kashif Nisar and Ag Asri Ag Ibrahim (2023) Security concepts in emerging 6G communication: threats, countermeasures, authentication techniques and research directions. Symmetry, 15. pp. 1-33. ISSN 2073-8994 https://doi.org/10.3390/sym15061147
spellingShingle H1-99 Social sciences (General)
TK5101-6720 Telecommunication Including telegraphy, telephone, radio, radar, television
Syed Hussain Ali Kazmi
Rosilah Hassan
Faizan Qamar
Kashif Nisar
Ag Asri Ag Ibrahim
Security concepts in emerging 6G communication: threats, countermeasures, authentication techniques and research directions
title Security concepts in emerging 6G communication: threats, countermeasures, authentication techniques and research directions
title_full Security concepts in emerging 6G communication: threats, countermeasures, authentication techniques and research directions
title_fullStr Security concepts in emerging 6G communication: threats, countermeasures, authentication techniques and research directions
title_full_unstemmed Security concepts in emerging 6G communication: threats, countermeasures, authentication techniques and research directions
title_short Security concepts in emerging 6G communication: threats, countermeasures, authentication techniques and research directions
title_sort security concepts in emerging 6g communication threats countermeasures authentication techniques and research directions
topic H1-99 Social sciences (General)
TK5101-6720 Telecommunication Including telegraphy, telephone, radio, radar, television
url https://eprints.ums.edu.my/id/eprint/38211/1/ABSTRACT.pdf
https://eprints.ums.edu.my/id/eprint/38211/2/FULL%20TEXT.pdf
work_keys_str_mv AT syedhussainalikazmi securityconceptsinemerging6gcommunicationthreatscountermeasuresauthenticationtechniquesandresearchdirections
AT rosilahhassan securityconceptsinemerging6gcommunicationthreatscountermeasuresauthenticationtechniquesandresearchdirections
AT faizanqamar securityconceptsinemerging6gcommunicationthreatscountermeasuresauthenticationtechniquesandresearchdirections
AT kashifnisar securityconceptsinemerging6gcommunicationthreatscountermeasuresauthenticationtechniquesandresearchdirections
AT agasriagibrahim securityconceptsinemerging6gcommunicationthreatscountermeasuresauthenticationtechniquesandresearchdirections