Professional Documents
Culture Documents
Abstract
Wireless communication has already had a transformative impact on lifestyles, as well as the way of interacting and
communicating, throughout many years. This transformation is accelerated by technological drivers such as Artificial Intelligence
(AI) as well as the ever-increasing demand for bandwidth and throughput. However, it is already foreseeable that the Fifth
Generation (5G) cellular networks will not be sufficient to cope with the volume of mobile communication in 2030 and beyond.
This paper considers Beyond 5G (B5G) and Sixth Generation (6G) mobile communications and outlines challenges for them.
Alongside the technical requirements, the security, confidentiality and trustworthiness are of major importance. Therefore, the
paper discusses the various 6G research areas such as Visible Light Communication (VLC), Reconfigurable Intelligent Surfaces
(RISs) and (sub)Terahertz (THz) communication and highlights how the research areas contribute to Physical Layer Security
(PhySec) and how the development of 6G will act as catalyst for PhySec.
(d) By pushing communication to higher fre- (e) The use of higher frequencies allows (f) Link Integrity Monitoring and the use
quency ranges, the wavelengths will become accurate localization and sensing. In combi- of context-based information ensure the in-
smaller as well. Ultra-Massive MIMO will nation with radar it will allow localization in tegrity of the radio nodes. Counterfeiting can
allow tighter beams. (sub)centimeter range. thus be mitigated.
Fig. 1: 6G research areas which are capable of affecting PhySec methods beneficially
use-cases such as health monitoring, surveillance and auto- techniques provide better efficiency compared to conventional
mated/autonomous driving. techniques such as certificates or MACs, due to reduced
transmission overheads, while the detection probability of
F. Link Integrity Monitoring
potential attacks is nearly as good (e.g. > 99%). Further, it
PhySec based security functionalities in order to provide is still tolerable to allow a small amount of false alarm or
message authenticity and integrity have been widely stud- misdetections, since the respective applications are typically
ied recently. Compared to conventional techniques for such designed in an error tolerable way, such as e.g. robust control.
purposes, such as cryptographic certificates or Message Au-
thentication Codes (MACs), the physical layer characteristics V. C ONCLUSION AND O UTLOOK
resulting from a message transmission are evaluated in order Actually we are on the verge of developing a new standard
to obtain whether authenticity and integrity are guaranteed in mobile communication: as the Fifth Generation mobile net-
(Figure 1f). works is currently being implemented worldwide, it is worth
Typical physical layer parameters considered here are for already considering Beyond 5G and the Sixth Generation
instance Received Signal Strength Indicator (RSSI), Channel wireless systems. This development is accompanied by the
Impulse Response (CIR), carrier frequency offset or the angle- use of new spectra -mmWave, Terahertz, Visible Light Com-
of-arrival. In order to evaluate the transmitter of a message or munication-, changes in the network infrastructure -slicing,
whether it was altered during transmission various schemes Open RAN, softwarization and virtualization-, as well as new
can be used: Starting from statistical methods for Physical network paradigms -Artificial Intelligence, Digital Twin and
Layer Authentication (PLA), for instance in [18], where an Intelligent Edge Computing. Therefore, in this paper, we have
approach based on hypothesis testing is presented for static elaborated on the challenges for the mobile communications
scenarios towards ML based methods such as [19], where network of the future, but we have also highlighted six promis-
two approaches based on Support Vector Machines (SVMs) ing 6G research areas that can provide suitable approaches
and Linear Fisher Discriminant Analysis are presented. Also to meet these challenges and to contribute to Physical Layer
other ML based solutions have been studied for PLA such Security.
as Gaussian Mixture Models based techniques in [20] or Reconfigurable Intelligent Surfaces will be a very interesting
supervised learning in [4]. Especially in highly challenging field of research, with many possibilities, if the requirements
scenarios such us URLLC, ULBC and mULC PhySec based for the meta-materials, the (intelligent) control and the timing
can be solved. There will be major developments in this area in [15] C. Pan, H. Ren, K. Wang, J. F. Kolb, M. Elkashlan, M. Chen, M.
the near future. The same applies to Visible Light Communica- Di Renzo, Y. Hao, J. Wang, A. L. Swindlehurst, X. You, and L. Hanzo,
“Reconfigurable Intelligent Surfaces for 6G Systems: Principles, Ap-
tion, and the shift to the higher frequencies including (sub)THz plications, and Research Directions,” IEEE Communications Magazine,
and applications such as Ultra-Massive MIMO: frequencies in vol. 59, no. 6, pp. 14–20, 2021. DOI: 10.1109/MCOM.001.2001076.
the Terahertz range promise higher entropy for Secret Key [16] S. Duque Anton, D. Fraunholz, C. Lipps, and H. D. Schotten, “Putting
Things in Context: Securing Industrial Authentication with Context
Generation and (pencil sharp) beamforming and VLC render Information,” International Journal On Cyber Situational Awareness
it harder for an eavesdropper to compromise communication. (IJCSA), 2019. DOI: 10.22619/IJCSA.2018.100122.
However, many of the approaches mentioned are still re- [17] N. Chi, Y. Zhou, Y. Wei, and F. Hu, “Visible light communication in
6G: Advances, challenges, and prospects,” IEEE Vehicular Technology
search focuses, and are theoretical concepts. It will be highly Magazine, vol. 15, no. 4, pp. 93–102, 2020.
interesting to implement them and see how they perform [18] L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, “APhysical-
in real world environments. But nevertheless, it is already Layer Technique to Enhance Authentication for Mobile Terminals,” in
2008 IEEE International Conference on Communications, May 2008,
important to deal with the issues and to specify the direction pp. 1520–1524. DOI: 10.1109/ICC.2008.294.
in which the development should proceed. [19] C. Pei, N. Zhang, X. S. Shen, and J. W. Mark, “Channel-based physical
layer authentication,” in IEEE Global Communications Conference
R EFERENCES (GLOBECOM), 2014. DOI: 10.1109/GLOCOM.2014.7037452.
[1] “IMT Traffic estimates for the years 2020 to 2030,” International [20] N. Gulati, R. Greenstadt, K. R. Dandekar, and J. M. Walsh, “GMM
Telecommunication Union, M Series Mobile, radiodetermination, am- Based Semi-Supervised Learning for Channel-Based Authentication
ateur and related satellite services Report ITU-R M.2370-0, 2015. Scheme,” in IEEE Vehicular Technology Conference (VTC Fall), 2013.
DOI : 10.1109/VTCFall.2013.6692216.
[2] W. Jiang, B. Han, M. A. Habibi, and H. D. Schotten, “The Road
Towards 6G: A Comprehensive Survey,” IEEE Open Journal of the
Communications Society, vol. 2, pp. 334–366, 2021. DOI: 10 . 1109 /
OJCOMS.2021.3057679.
[3] C. Lipps, S. B. Mallikarjun, M. Strufe, C. Heinz, C. Grimm, and
H. D. Schotten, “Keep Private Networks Private: Secure Channel-
PUFs, and Physical Layer Security by Linear Regression Enhanced
Channel Profiles,” 3rd International Conference on Data Intelligence
and Security (ICDIS), 2020. DOI: 10.1109/ICDIS50059.2020.00019.
[4] A. Weinand, R. Sattiraju, M. Karrenbauer, and H. D. Schotten, “Su-
pervised Learning for Physical Layer Based Message Authentication
in URLLC Scenarios,” IEEE 90th Vehicular Technology Conference
(VTC2019-Fall), 2019. DOI: 10.1109/VTCFall.2019.8891424.
[5] C. Lipps, D. Krummacker, and H. D. Schotten, “Securing Industrial
Wireless Networks: Enhancing SDN with PhySec,” Conference on Next
Generation Computing Applications (NextComp), 2019. DOI: 10.1109/
NEXTCOMP.2019.8883600.
[6] C. Lipps, A. Weinand, D. Krummacker, C. Fischer, and H. D. Schotten,
“Proof of Concept for IoT Device Authentication Based on SRAM
PUFs Using ATMEGA 2560-MCU,” 1st International Conference on
Data Intelligence and Security (ICDIS), 2018. DOI: 10.1109/ICDIS.
2018.00013.
[7] J. D. V. Sánches, L. Urquiza-Aguiar, M. C. P. Paredes, and D. P. M.
Osorio, “Survey on physical layer security for 5G wireless networks,”
Annals of Telecommunications volume, no. 76, pp. 155–174, 2020.
DOI : 10.1007/s12243-020-00799-8.
[8] A. Weinand, A. de la Fuente, C. Lipps, and M. Karrenbauer, “Physical
Layer Security based Key Management for LoRaWAN,” Workshop on
Next Generation Networks and Applications, 2021. arXiv: 2101.02975.
[9] N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. Di Renzo,
“Safeguarding 5G Wireless Communication Networks using Physical
Layer Security,” IEEE Communications Magazine, vol. 53, no. 4,
pp. 20–27, 2015. DOI: 10.1109/MCOM.2015.7081071.
[10] Q. Qi, X. Chen, C. Zhong, and Z. Zhang, “Physical layer security
for massive access in cellular Internet of Things,” Science China
Information Sciences volume, no. 63, 2020. DOI: 10 . 1007 / s11432 -
019-2650-4.
[11] A. Chorti, A. Barreto, S. Kopsell, M. Zoli, M. Chafii, P. Sehier, G.
Fettweis, and H. Poor, “Context-Aware Security for 6G Wireless The
Role of Physical Layer Security,” 2021. arXiv: 2011.07323.
[12] S. Li, W. Sun, H. Zhang, and Y. Zhang, “Physical Layer Security
for Edge Caching in 6G Networks,” GLOBECOM 2020 - 2020
IEEE Global Communications Conference, 2020. DOI: 10 . 1109 /
GLOBECOM42002.2020.9322524.
[13] P. Porambage, G. Gür, D. Osoria, M. Liyanage, A. Gurtov, and M.
Ylianttila, “The Roadmap to 6G Security and Privacy,” IEEE Open
Journal of the Communications Society, vol. 2, pp. 1094–1122, 2021.
DOI : 10.1109/OJCOMS.2021.3078081.
[14] M. Matthaiou, O. Yurduseven, H. Q. Ngo, D. Morales-Jimenez, S. L.
Cotton, and V. F. Fusco, “The Road to 6G: Ten Physical Layer
Challenges for Communications Engineers,” 2020. arXiv: 2004.07130.