Decentralizing 6G Security: Existing Challenges and Future Opportunities

Ijaz Ahmad*, Muzammal Hoque, Jyrki Huusko, Jani Suomalainen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Abstract

6G communications networks will be highly decentralized and distributed in nature. Existing security policies, procedures, and technologies, however, are mostly based on centralized control. Such centralized security will have serious consequences from two perspectives in 6G. First, the security systems will not be able to meet the strict requirements, such as latency, of emerging services, for example industrial and vehicular communications. Second, centralized security will lead to high consumption of resources, such as spectrum, in securing distributed systems in 6G. Therefore, in this paper we discuss intriguing challenges arising from security centralization that lead to another pressing challenge of the time, i.e., sustainability, as a consequence. Furthermore, we evaluate centralized and decentralized artificial intelligence (AI)-based security to demonstrate the resource and efficiency trade-off. Ultimately, this paper presents important research insights and visions that can pave the way toward distributed security in 6G.

Original languageEnglish
Title of host publication2024 IEEE Future Networks World Forum, FNWF
PublisherIEEE Institute of Electrical and Electronic Engineers
Pages32-37
Number of pages6
ISBN (Electronic)9798350379495
DOIs
Publication statusPublished - 2024
MoE publication typeA4 Article in a conference publication
Event2024 IEEE Future Networks World Forum, FNWF 2024 - Dubai, United Arab Emirates
Duration: 15 Oct 202417 Oct 2024

Conference

Conference2024 IEEE Future Networks World Forum, FNWF 2024
Country/TerritoryUnited Arab Emirates
CityDubai
Period15/10/2417/10/24

Funding

This work was supported by the SUNSET-6G project funded by Business Finland.

Keywords

  • 6G
  • 6G security
  • distributed security
  • Security
  • sustainability

Fingerprint

Dive into the research topics of 'Decentralizing 6G Security: Existing Challenges and Future Opportunities'. Together they form a unique fingerprint.

Cite this