期刊论文详细信息
IEEE Access 卷:9
Security and Trust in the 6G Era
Michael Montag1  Volker Ziegler1  Peter Schneider1  Harish Viswanathan2  Satish Kanugovi3  Ali Rezaki4 
[1] Nokia Bell Labs, Munich, Germany;
[2] Nokia Bell Labs, Murray Hill, NJ, USA;
[3] Nokia Standards, Bengaluru, India;
[4] Nokia Standards, Munich, Germany;
关键词: 6G;    security;    cyber-resilience;    privacy;    trustworthiness;    sub-networks;   
DOI  :  10.1109/ACCESS.2021.3120143
来源: DOAJ
【 摘 要 】

A comprehensive set of security technology enablers will be critically required for communication systems for the 6G era of the 2030s. Trustworthiness must be assured across IoT, heterogenous cloud and networks, devices, sub-networks, and applications. The 6G threat vector will be defined by 6G architectural disaggregation, open interfaces and an environment with multiple stakeholders. Broadly decomposed into domains of cyber-resilience, privacy and trust and their respective intersection, we explore relevant security technology enablers including automated software creation and automated closed-loop security operation, privacy preserving technologies, hardware and cloud embedded anchors of trust, quantum-safe security, jamming protection and physical layer security as well as distributed ledger technologies. Artificial intelligence and machine learning (AI/ML) as a key technology enabler will be pervasive and of pivotal relevance across the security technology stack and architecture. A novel vision for a trustworthy Secure Telecom Operation Map is developed as part of the automated closed loop operations paradigm.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次