6G White paper: Research challenges for Trust, Security and Privacy

Zheng Yan, Tri Hong Nguyen, Fei Liu, Andrei Gurtov, Tharaka Hewa, Madhusanka Liyanage, Ijaz Ahmad, Juha Partala, Robert Abbas, Artur Hecker, Sara Jayousi, Alessio Martinelli, Stefano Caputo, Jonathan Bechtold, Iván Morales, Andrei Stoica, Giuseppe Abreu, Shahriar Shahabuddin, Erdal Panayirci, Harald HaasTanesh Kumar, Basak Ozan Ozparlak, Juha Röning

Research output: Chapter in Book/Report/Conference proceedingChapter or book articleProfessional

Abstract

The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas:

Trust: Under the current “open internet” regulation, the telco cloud can be used for trust services only equally for all users. 6G network must support embedded trust for increased level of information security in 6G. Trust modeling, trust policies and trust mechanisms need to be defined. 6G interlinks physical and digital worlds making safety dependent on information security. Therefore, we need trustworthy 6G.

Security: In 6G era, the dependence of the economy and societies on IT and the networks will deepen. The role of IT and the networks in national security keeps rising – a continuation of what we see in 5G. The development towards cloud and edge native infrastructures is expected to continue in 6G networks, and we need holistic 6G network security architecture planning. Security automation opens new questions: machine learning can be used to make safer systems, but also more dangerous attacks. Physical layer security techniques can also represent efficient solutions for securing less investigated network segments as first line of defense.

Privacy: There is currently no way to unambiguously determine when linked, deidentified datasets cross the threshold to become personally identifiable. This is a major, unaddressed problem for many digital technologies in different sectors. Courts in different parts of the world are making decisions about whether privacy is being infringed without formal measures of the level of personal information, while companies are seeking new ways to exploit private data to create new business revenues. As solution alternatives, we may consider blockchain, distributed ledger technologies and differential privacy approaches.
Original languageEnglish
Title of host publicationarXiv
EditorsMika Ylianttila, Raimo Kantola, Andrei Gurtov, Lozenzo Mucchi, Ian Opperman
PublisherUniversity of Oulu
Publication statusSubmitted - 2020
MoE publication typeD2 Article in professional manuals or guides or professional information systems or text book material

Fingerprint Dive into the research topics of '6G White paper: Research challenges for Trust, Security and Privacy'. Together they form a unique fingerprint.

  • Cite this

    Yan, Z., Nguyen, T. H., Liu, F., Gurtov, A., Hewa, T., Liyanage, M., Ahmad, I., Partala, J., Abbas, R., Hecker, A., Jayousi, S., Martinelli, A., Caputo, S., Bechtold, J., Morales, I., Stoica, A., Abreu, G., Shahabuddin, S., Panayirci, E., ... Röning, J. (2020). 6G White paper: Research challenges for Trust, Security and Privacy. Manuscript submitted for publication. In M. Ylianttila, R. Kantola, A. Gurtov, L. Mucchi, & I. Opperman (Eds.), arXiv University of Oulu. https://arxiv.org/abs/2004.11665