خلاصه
1. معرفی
2. آثار مرتبط
3. روش احراز هویت و تصدیق پیشنهادی (AA).
4. معماری امنیتی 6G پیشنهادی
5. احراز هویت کلید مخفی
6. نتایج و بحث
7. محدودیت ها و توصیه های آینده برای امنیت شبکه سلولی 6G
8. نتیجه گیری
بیانیه مشارکت نویسنده CRediT
اعلامیه منافع رقابتی
سپاسگزاریها
در دسترس بودن داده ها
منابع
Abstract
1. Introduction
2. Related works
3. Proposed authentication and acknowledgement (AA) approach
4. Proposed 6G security architecture
5. Secret key authentication
6. Results and discussion
7. Limitations and future recommendations for 6G cellular network security
8. Conclusion
CRediT authorship contribution statement
Declaration of competing interest
Acknowledgements
Data availability
References
چکیده
نسل ششم (6G) انتقال سلولی بسیار سازگار است. 6G همه را به اتصال بی سیم فراگیر مجهز می کند و نیازهای یک دنیای کاملاً متصل را برآورده می کند. پیشبینی میشود که ایدههای انقلابی در حمایت از انواع دستگاهها و برنامههای هوشمند که به سرعت در حال گسترش هستند، افزایش یابد. ویژگی های پیچیده زیرساخت های شبکه سلولی قابل حمل 5G تهدیدها و الزامات جدیدی را ایجاد می کند. با مقایسه فناوریهای شبکه سلولی 6G با شبکههای سلولی 5G، این مقاله مسائل مختلف امنیتی و حریم خصوصی را در شبکههای سلولی 6G مبتنی بر خدمات امنیتی متعدد مورد بحث قرار میدهد. رویکرد AA را برای ارزیابی اثربخشی روش پیشنهاد می کند. یک معماری امنیتی بیسیم 6G جدید بر اساس تجزیه و تحلیل احراز هویت کلید مخفی و شناسایی مبتنی بر موقعیت انعطافپذیر پیشنهاد کنید، که به عنوان پایهای برای بررسی مدیریت هویت و احراز هویت انعطافپذیر عمل میکند. مزایای معماری پیشنهادی را نشان می دهد، BER را در برابر SINR تجزیه و تحلیل می کند و توان عملیاتی را در برابر مقادیر مختلف SINR اندازه گیری می کند. در نهایت، محدودیت ها و توصیه های آینده برای امنیت شبکه سلولی 6G ارائه شده است.
Abstract
The sixth generation (6G) of cellular transmission is extremely adaptable. 6G will equip everyone with pervasive wireless connectivity and meet the needs of a fully connected world. It is anticipated that revolutionary ideas will increase in support for a fast-expanding variety of smart devices and applications. The sophisticated characteristics of 5G portable cellular network infrastructures produce novel threats and requirements. Comparing 6G cellular network technologies to 5G cellular networks, this paper discusses various security and privacy issues in 6G cellular networks based numerous security services. Proposes AA approach to evaluate the effectiveness of the methodology. Propose a new 6G wireless security architecture based on the analysis of secret key authentication and flexible position based identification, which serves as the foundation for an examination of identity management and flexible authentication. Demonstrates the benefits of the proposed architecture, analyzes BER against SINR and Measure Throughput Against various SINR values. Finally, Limitations and future recommendation for 6G cellular network security is presented.
Introduction
Over the past few years, wireless networks technologies have made significant technological advancement. The revolutionary changes brought about by the most recent 5G innovations have benefited a wide range of stakeholders, including commercial solution suppliers, university research organizations, standards bodies, and mobile-users [1,2]. In contrast, networks comprise a large number of Base Stations (BS) to enable high data transmission rates and adequate network capacity due to the low penetrability of high-frequency signals used in 5G [3,4]. The foundation of mobile network service continuity is multi-hop network technology, which allows users to seamlessly switch between source to destination that are outfitted with various access methods. The complexity of device changeover in 5G networks grows as a result of the diversity of service networks, increasing transmission times and affecting user experiences. As opposed to 5G networks, high-density access networks have a high transmission rate among tiny nodes. Existing wireless networks have been struggling to handle an increase in traffic due to the constant growth of data and devices in cellular networks [5,6]. In response, the 6G of cellular communication technologies has arisen to satisfy these high expectations. With many different communication networks, including Long Term Evolution, the Internet of Things, Mobile multi-hop Networks, wireless personal area networks and several versions of Wi-Fi, 6G is incredibly adaptable [7,8].
The 6G communication network is a network with several additional capabilities in addition to being an upgrade of the existing 5G network [9,10]. Research and development for 6G aims to provide a variety of advanced qualities, including greater bandwidth than existing 5G networks, higher mobile internet connection facilitating communication between devices among users as well as extensive technological communications [11,12]. Planned 6G networks also seeks to reduce energy consumption, latency and enhance security, for better wireless network deployment [13,14]. Additionally, a rise in connection density will lead to demands for higher energy efficiency, which 5G is not intended to provide. As a result, the research community has focused on solving the aforementioned key problems [15,16]. Accordingly, we assert that current work in the fields of terahertz band communications, intelligent surfaces and environments, and network automation. The general architecture of 6G wireless systems is shown in Fig. 1.
Conclusion
Cellular networks have been successful because of their emphasis on secure transmission. When everyone's access to the internet is ensured in 6G, the networks will grow to enormous sizes. We have presented a thorough analysis of current advancements in 6G wireless security in this paper. We proposed a 6G wireless security architecture based on existing research. From the suggested security framework, an analysis of position based identification and adaptable authentication based on different security architectures has been provided. Demonstrated the benefits of the proposed architecture, Analyzed the performance of BER at the User Interface is 94 % improved than the CoMP, GKM and OSPR. Furthermore, Enhanced Throughput 96 % achieved for AA Approach due to integration of data plane and control plane in the proposed architecture. The efficacy of this class of solution is verified by using Riverbed Modeler 17.5 simulation tool.