Professional Documents
Culture Documents
Introduction
Chapiter 1: Evolution of Wireless Communication 1G to 5G
Chapiter 2: Road To 6G
1. Specifications
2. Requirements
Chapiter 3: Fundamental Enabling Of 6G
1. The Expanding Role of Artificial Intelligence and Machine Learning
1.1. Self-Optimizing Transmitters and Receivers
1.2. Cognitive Spectrum Use
1.3. Context Awareness
2. The Network with the Sixth Sense
Chapiter 4: Expected Product 6G
1. Design
2. Architecture
2.2 Sub-Networks
2.3 Hyper-Specialized Slicing
2.4 RAN-Core Convergence
Chapiter 5: Impact of 6G On Cyber Security
1. New Security, Privacy and Trust Paradigms
2. Network security architecture and cryptographic technologies
2.1 Network Security Architecture in 6G
2.2 Post-Quantum Crypto-Security in the 6G Architecture
3 Privacy protection in 6G
3.1 Privacy Requirements
3.2 Standardization and Regulatory Aspects
Conclusion
1
Introduction
Since antiquity, man has not stopped looking for different means to convey
the message to his correspondent and therefore to communicate. Thus, the human
being, through these successive eras, has provided his intellectual as well as
physical efforts in order to discover adequate methods of communication. At the
start of the 20th century, the inventions of basic electronic components and
circuits (transistors, integrated circuits, etc.) and of good quality which pushed
telecommunications towards computer networks.
With the deployment of 5G systems in full swing, the research focus toward
6G mobile cellular systems has begun. Keeping up with the tradition of a new
generation of cellular system once every ten years or so, there is an expectation
that a 6G system will be standardized with deployments starting before 2030. Since
it often takes more than ten years for a novel technology to see the commercial
daylight, it is time to begin research on novel technology components for 6G.
2
But what is a 6G network? And how will it differ from 5G networks? So far,
the 6G network has no standard functions or specifications, just many possibilities.
Some people contend that 6G networks should be more than just a faster
version of a 5G network, but rather the improvement of the 5G technology in all
aspects. For example, coverage should not be limited to the ground level, as is the
case with the 5G network. Instead, it should provide full space undersea surface
coverage. The 6G network should also have much higher Artificial Intelligence (AI)
capabilities.
3
CHAPTER 1: Evolution of Wireless Communication 1G to 5G
1G:
The 1G network was introduced in the 1980s and designed for voice services. It
relies on analogy signals to transmit information and has no established wireless
standard. This leads to many disadvantages, including hard handovers, a lack of
security and privacy guarantees, and low transmission efficiency. Phone services are
not encrypted, meaning that data transmissions and phone conversations can
neither be secure nor private. As a result, the entire network and its users face
significant security and privacy challenges, including cloning, eavesdropping, and
illegal access.
2G:
The 2G network is based on digital modulation techniques, such as Time
Division Multiple Access (TDMA) and Code Division Multiple Access (CDMA), which
can support both voice and short message services. The most important and widely
used mobile communication standard in 2G is GSM (Global System for Mobile
Communications). The purpose of the GSM is to make the system as secure as a
4
Public Switched Telephone Network (PSTN). Its security and privacy services include:
anonymity, authentication, signalling protection, and user data protection.
However, despite the great improvements in security and privacy over 1G, 2G
still suffers from many weaknesses. One important security issue is that the
authentication is one-way; the network authenticates the user, but users cannot
authenticate the network, which results in security holes. Illegal devices, such as
base stations, can disguise themselves as legitimate network members, deceiving
users and stealing their information. Moreover, the encryption is not end-to-end.
Only part of the wireless channel is encrypted, and there is also no encryption in the
fixed network, which provides adversaries with an opportunity for attack. In terms
of privacy, the radio path encryption and TMSI have some limitations and are
exposed to various types of attacks, such as eavesdropping.
3G:
The 3G network emerged in 2000 to provide “high-speed” data transmission
and access to the internet, which means at least 2 Mbps. However, this speed could
support advanced services that are not possible in the 1G and 2G networks,
including web browsing, TV streaming, and video services.
However, the 3G networks are still vulnerable to threats associated with the
Internet Protocol (IP) traffic and encryption keys. Further, the radio interface
between the terminal equipment and the service network also provides
opportunities for a set of attacks. Threats related to wireless interface attacks fall
into the following categories: unauthorized access to data; threats to integrity;
Denial of Service (DOS); unauthorized access to services. Privacy issues are mostly
related to certain types of attacks, such as AKA error messages, designed to destroy
user identities and confidential or sensitive information.
4G:
The 4G of Long-Term Evolution (LTE) networks were introduced in 2009,
providing the data rate of up to 1 Gbit/s on the downlink and up to 500 Mbits/s on
the uplink. These networks provide better spectrum efficiency and reduced latency,
which means they can meet the requirements of advanced applications, such as
Digital Video Broadcasting (DVB), High Definition Television (HD TV) content and
video chat. The LTE integrates a mix of existing and new technologies, such as
Coordinated Multi-Point Transmission and Reception (CoMR), Multiple Input
Multiple Output (MIMO) and Orthogonal Frequency Division Multiplexing (OFDM).
The 4G network is more vulnerable to security and privacy threats than the
previous networks because users interact more closely with mobile terminals. As
participants of all wireless protocols and executors of various wireless applications,
interactions via 4G become more complex, and threats become more widespread.
6
Moreover, due to improvements of computing and storage capabilities of mobile
terminals, an increasing number of malicious programs can be executed, which may
cause more damage. Typical examples include viruses, tampering with hardware
platforms, operating system vulnerabilities, etc.
5G:
As we stand on the brink of the 5G network, we can look forward to faster
speeds, more complete systems, and more secure architectures. The main
advancement of 5G networks is to facilitate the connection of an increasing number
of devices and provide high-quality services for all devices simultaneously.
Moreover, the supported devices will not be limited to smartphones; other devices
like IoT equipment can also connect to the network.
The security and privacy issues in 5G networks can perhaps best be divided by
network architecture and, more specifically, into three tiers of the architecture: the
access networks, the backhaul networks, and the core network. In access networks,
the diversity of nodes and access mechanisms give rise to some new security
challenges as handovers between different access technologies increase the risk of
attack.
There are also new privacy issues to contend with due to the diversity of
business types and application scenarios in 5G networks. The openness of the
platform can mean that a user’s sensitive information can easily and frequently
change from a closed state to an open state. Accordingly, the contact state changes
from offline to online, greatly increasing the risk of leaks. Therefore, the privacy
issues we will inevitably face with 5G will become a problem that must be faced and
solved in the next few years. Fortunately, advancements in data mining and
machine learning technologies mean that privacy protection methods have been
well trained and will only become more powerful in the future.
8
CHAPTER 2: Road To 6G
1. Specifications:
5G technologies are associated with trade-offs of several issues, such as
throughput, delay, energy efficiency, deployment costs, reliability, and hardware
complexity. Likely, 5G will not be able to meet the market demands after 2030
then 6G will fill the gap between 5G and market demand. Based on the previous
trends and predictions of future needs, the main objectives for the 6G systems are
extremely high data rates per device, a very large number of connected devices,
global connectivity, very low latency, lowering the energy consumption with
battery-free Internet of Things (IoT) devices, ultra-high reliable connectivity, and
connected intelligence with machine learning capability.
9
previous generation of communication systems. Some researchers from academia
and industry target the KPIs for 6G communication as follows: peak data rate of 1
Tbps, radio latency of 0.1 ms, the battery lifetime of 20 years, device connectivity
of 100/m3, traffic increase of 10,00 times, the energy efficiency of 10 times,
maximum outage of 1 out of 1 million, and 10 cm indoor and 1 m outdoor precision
in positioning. The initial 6G KPIs can be broadly classified into two categories
namely, (i) technology and productivity-driven KPIs and (ii) sustainability and
societal driven KPIs. The first category includes KPIs for several parameters such as
jitter, link budget, extended range/coverage, 3D-mapping, mobile broadband,
positioning accuracy, cost, and energy-saving. The second category includes KPIs
for several facts such as standardization, privacy/security/trust, open-source
everything, ethics, intelligence, and global use case.
2. Requirements:
The 6G communication systems are expected to be featured by the following
types of KPI associated services: Ubiquitous mobile ultra-broadband (uMUB), Ultra-
high-speed with low-latency communications (uHSLLC), massive machine-type
communication (mMTC), Ultra-high data density (uHDD) The following key factors
will characterize the 6G communication system, AI integrated communication,
Tactile Internet, High energy efficiency, Low backhaul and access network
congestion.
Enhanced data security has estimated that the 6G system will have 1000
times higher simultaneous wireless connectivity than the 5G system. Compared to
the enhanced mobile broadband in 5G, it is expected that 6G will include
ubiquitous services, Ultra-reliable low-latency communications, which is a key 5G
feature, will be an essential driver again in 6G communication providing uHSLLC by
adding features such as E2E delay of less than 1 ms, more than 99.99999%
reliability, and 1 Tbps peak data rate.
11
learning technique, in addition to an overview of Quantum computing and
communications.
In addition to the use of AI/ML in the RAN, AI/ML will become essential for the 5G
end-to-end network automation dealing with the complexity of orchestration
across multiple network domains and layers. This will allow for dynamic adaptation
of network and cloud resources according to changing demands, rapid deployment
of new services and fast mitigation of failures, while significantly reducing
operational expenditures.
13
opportunistically, especially in indoor environments, and new methods are required
to exploit this for improving communications. Determining optimal control of these
elements using model-based optimization methods may be intractable. It will be
challenging to exactly model signal propagation incorporating their collective
effects, which in turn depend on how they are controlled. AI/ML techniques will
likely be used to solve such complex problems in the 6G era. Higher-level semantic
knowledge of how the communication is being used, for example whether it is for
robot control or augmented reality in a factory or for gaming, can be learned from
traffic patterns and device characteristics, and appropriate services can be provided
automatically. Accurate service personalization down to the lower layers of the
communication can be achieved through learning techniques. Moving from AI for 5G
to AI native 6G, we expect that various forms of learning will be employed to realize
the above applications. Transfer learning and federated learning will play critical
roles. Systems will have to be trained offline in simulation environments to a
sufficient extent first so that basic communications can be established, and then be
subsequently trained in the field to optimize performance. So, there will be transfer
of learning from the simulation to the field environment. Devices and network
infrastructure have to co-learn to incorporate end-to-end operations, and here,
federated learning will play a role. Rather than sharing large data sets between
various devices and the network, models will be shared.
14
capabilities to improve localization accuracy and can become the single system for
both URLLC and localization in industrial automation environments.
6G systems will be used for imaging of passive objects. System design will not
only be optimized for communication but will also incorporate special capabilities
for sensing. For example, waveforms suitable for sensing such as chirp signals can be
multiplexed with waveforms optimized for communications. Large antenna arrays
deployed for massive MIMO communications can be leveraged for forming narrow
beams that can be periodically swept for sensing. Multiple transmitters and
receivers can coordinate to enhance the sensing capabilities of the network. The
evolution to sub-terahertz and terahertz bands, with the associated large signaling
bandwidth, increases the opportunity for precision sensing. Millimeter-precision
imaging using terahertz-band infrastructure will enable a significant number of new
use cases in industry automation and health care, such as fault detection in
extrusion manufacturing processes or detection of cancerous tissue and tooth
cavities.
There are plenty of applications that will benefit from radio points being turned
into sensors, such as food quality control in supermarkets, or invisible metal
detectors in airport or event infrastructures to replace the current security gate
systems.
15
CHAPTER 4: Expected Product 6G
1.Design
1.2. Architecture:
1.2.1. Sub-Networks:
16
meeting the challenging requirements through new architectural evolutions such as
supporting time-sensitive networking (TSN) bridge functionality.
To build on the road paved by 5G, and become truly entrenched in the
industrial environment and replace wired connectivity everywhere, 6G should
provide deterministic wire-grade reliability for a variety of connectivity scenarios ,
from static, isolated devices, to inter-related locally interacting devices, to rapidly
moving swarms of robots and drones that need to inter-connect but also connect
directly to the network when separated from the swarm. To ensure both high time
and spatial domain reliability and determinism, we see the need for semi-
autonomous 6G sub-networks, where at least the most critical services in the sub-
network will continue uninterrupted despite poor or no connectivity to the wider
network. Multiple path connectivity employing infrastructure and opportunistic
device-to-device connections will be required for the ultra-reliability, potentially
leading to truly cell-less architectures. Integration of these sub-networks to 6G as
one holistic architecture has some advantages:
The 6G sub-network will ensure high data rates, extreme low latency,
reliability and resilience
In 5G, the base station has been compartmentalized into the distributed unit
(DU) and centralized unit (CU). The DU includes the lower layers of the user and
control plane protocol stack, namely the physical Layer 1 and real-time Layer 2,
while the CU includes the non-real-time Layer 2 and Layer 3 functions. The CU is
further split into the control plane and user plane, with a well-defined interface
between the two.
18
CHAPTER 5:The impact of 6G On Cyber Security
The roles of trust, security and privacy are somewhat interconnected, but
different facets of next generation networks. The challenges in creating a
trustworthy 6G are multidisciplinary spanning technology, regulation, techno-
economics, politics and ethics. This white paper addresses their fundamental
research challenges in three key areas. Trust: Under the current "open internet"
regulation, the telco cloud can be used for trust services only equally for all users.
6G network must support embedded trust for increased level of information
security in 6G. Trust modeling, trust policies and trust mechanisms need to be
defined. 6G interlinks physical and digital worlds making safety dependent on
information security. Therefore, we need trustworthy 6G. Security: In 6G era, the
dependence of the economy and societies on IT and the networks will deepen. The
role of IT and the networks in national security keeps rising - a continuation of what
we see in 5G. The development towards cloud and edge native infrastructures is
expected to continue in 6G networks, and we need holistic 6G network security
architecture planning. Security automation opens new questions: machine learning
can be used to make safer systems, but also more dangerous attacks. Physical layer
security techniques can also represent efficient solutions for securing less
investigated network segments as first line of defense. Privacy: There is currently no
way to unambiguously determine when linked, deidentified datasets cross the
threshold to become personally identifiable. Courts in different parts of the world
are making decisions about whether privacy is being infringed, while companies are
seeking new ways to exploit private data to create new business revenues. As
solution alternatives, we may consider blockchain, distributed ledger technologies
and differential privacy approaches.
Wireline-grade reliability also implies that the network must be designed with
new security and privacy measures. Jamming in industrial networks is a new threat
that the networks will have to be protected against. Attackers could attempt to jam
networks from outside the industrial facility, and so physical security will be
insufficient. In the future, jamming may also take the form of simply delaying packet
delivery by creating interference only sporadically. This can seriously impact
19
industrial operations relying on time-sensitive networks. 6G networks will be
designed to protect against such new threats.
The current 5G standard does not address the issue of quantum computing, but
relies on traditional cryptography such as ECC. However, the elliptic curve discrete
logarithm problem (ECDLP) can be solved in polynomial time on a quantum
computer. The development towards cloud and edge native infrastructures is
expected to continue in 6G networks. Compared to earlier generations, the security
architecture of 6G will be more complex, dominated by current transport layer
security standards and be increasingly dependent on the PKI. This development will
make the core network completely reliant on the functionality and security of the
underlying PKI. However, currently there are no post-quantum secure primitives, for
example, in TLS. There are public-key primitives considered to be quantum-safe.
These include for example, code-based encryption schemes such as McEliece and
lattice-based NTRU. Many of these suggestions have survived decades of attacks
and can thus be considered secure both in the classical and the quantum setting.
However, their efficiency is poor and key sizes big compared to, for example, ECDLP-
based schemes. Replacement of contemporary asymmetric cryptography with post-
quantum secure schemes will incur costs both in the communication and
operational efficiency of the network. Research is needed to identify the correct
application of post-quantum secure cryptography in order to satisfy the envisioned
performance and functionality of the 6G architecture. In addition, research into
new, more efficient post-quantum secure asymmetric schemes is needed in order to
reach this goal Standardization efforts for post-quantum cryptography are ongoing.
Whilst legally speaking the customers of the security industry often bear the
legal responsibility for complying with data protection rules their providers also bear
some responsibility for data protection from a societal and ethical point of view.
These involve those who design technical specifications and those who actually build
or implement applications or operating systems.” The interconnectedness of global
markets means that “Privacy by Design” will likely prevail in many future products
and communication techniques, and impact how we will live.. According to the
GDPR, if data is collected directly from the data subject, there is a duty to provide
the data immediately to the data subject. If, as expected, the GDPR continues to
provide a data protection framework for 6G, the digital twins of the data subjects
may well be assumed to be data subjects as well as their physical, real world
counterparts. If this question is left without an answer, the choice may well be
determined by the private sector. Big tech companies already have significant data
and control power and are well prepared to decried how the digital world will
operate through control of data and even through digital currencies. If this question
is left unanswered; human rights may be jeopardized and 6G may not achieve the
expected social benefits. A future which sees us working via our digital avatars or by
telepresence will also have health and safety issues. While the right of employees to
‘disconnect’ is beginning to be accepted as a legal norm through some European
countries such as France, Finland’s Working Hour Act came into force January 2020.
This Act allows workers the right to determine how and where to work for half of
their yearly working time. 6G communication is expected to have benefits for
workers on this flexible working system. However, new legal consequences may
arise around industrial relations matters in a digital, mirror workplace where
telepresence and avatars are essential parts of the production system where human
employees work in collaboration. Furthermore, the Future digital and physical
worlds will be deeply entangled, malicious cyber activities could lead to loss of
property and life. Attribution of responsibility in case of a physical harm caused by a
digital twin or an automated system against a human is a compelling legal issue. A
critical question will always remain: Who is liable? After answering this question, the
next is the type of liability which will be applied to the case. Liability occurs either
from a contractual relationship or tort or unjust enrichment. Tort on the other hand,
may depend on fault or strict liability. Multiple liability issues may appear related to
Work health and safety, data protection and cyber security.
24
Conclusion
The tradition of deploying a new cellular generation approximately every
decade will continue into the future, with 6G becoming a reality in the 2030s. 6G will
be optimized and cost-reduced for the new use cases introduced in 5G, driving their
adoption at scale. At the same time, it will enable new use cases that we cannot yet
imagine or describe in detail. The expansion of mobile cellular to verticals that
began with the introduction of low-cost IoT technologies in 4G and ultra-reliable low
latency IIoT in 5G will continue, becoming both broader and deeper in 6G. The rapid
advance of AI/ML technology and its effectiveness in solving problems in several
domains points toward a 6G system that
will fundamentally exploit these new capabilities to improve performance by
better adapting to the operational environment. The inexorable demand for higher
capacity and peak rates points toward technologies that will exploit ever-higher
bands. As the density of infrastructure increases, coupled with the use of wider
bandwidth signals at high-band spectrum, especially indoors, new opportunities to
utilize this for localization and sensing will encourage a 6G design that is not only
optimized for communication but also for perception and understanding of the
physical world and people’s needs, thus augmenting human existence in the most
intuitive way. In this paper, we identified the following key technology
transformations as having the highest potential to be defining for the 6G system:
AI/ML-driven air interface design and optimization; (expansion into new spectrum
bands and new cognitive spectrum sharing methods; the integration of localization
and sensing capabilities into system definition; the achievement of extreme
performance requirements on latency and reliability; new network architecture
paradigms involving sub-networks and RAN-Core convergence; and new security
and privacy schemes. Finally, the expansion into many varied use cases calls for a
shift to a platform approach to the network, with decoupling of the air interface
from networking.
25