论文标题

6G白皮书:信任,安全和隐私的研究挑战

6G White paper: Research challenges for Trust, Security and Privacy

论文作者

Ylianttila, Mika, Kantola, Raimo, Gurtov, Andrei, Mucchi, Lozenzo, Oppermann, Ian, Yan, Zheng, Nguyen, Tri Hong, Liu, Fei, Hewa, Tharaka, Liyanage, Madhusanka, Ijaz, Ahmad, Partala, Juha, Abbas, Robert, Hecker, Artur, Jayousi, Sara, Martinelli, Alessio, Caputo, Stefano, Bechtold, Jonathan, Morales, Ivan, Stoica, Andrei, Abreu, Giuseppe, Shahabuddin, Shahriar, Panayirci, Erdal, Haas, Harald, Kumar, Tanesh, Ozparlak, Basak Ozan, Röning, Juha

论文摘要

信任,安全和隐私的角色有些相互联系,但下一代网络的不同方面。创建值得信赖的6G的挑战是多学科的跨越技术,法规,技术经济学,政治和道德。这份白皮书解决了他们在三个关键领域的基本研究挑战。信任:根据当前的“开放互联网”法规,电信云可用于所有用户的信任服务。 6G网络必须支持嵌入式信任,以增加6G的信息安全水平。需要定义信任建模,信任政策和信任机制。 6G将物理和数字世界互联,从而使安全性取决于信息安全。因此,我们需要值得信赖的6G。安全:在6G时代,经济和社会对其和网络的依赖将加深。 IT和网络在国家安全中的作用一直在上升 - 我们在5G中看到的延续。对云和边缘本地基础架构的开发预计将在6G网络中继续进行,我们需要整体6G网络安全体系结构计划。安全自动化打开了新的问题:机器学习可用于制造更安全的系统,但也可以使用更危险的攻击。物理层安全技术还可以代表有效的解决方案,以确保较少研究的网络段作为第一道防线。隐私:当前无法明确确定链接何时链接,去识别数据集越过阈值以成为个人身份。世界各地的法院正在决定是否侵犯隐私,而公司正在寻求新的方法来利用私人数据来创造新的业务收入。作为解决方案替代方案,我们可以考虑区块链,分布式分类帐技术和差异隐私方法。

The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust: Under the current "open internet" regulation, the telco cloud can be used for trust services only equally for all users. 6G network must support embedded trust for increased level of information security in 6G. Trust modeling, trust policies and trust mechanisms need to be defined. 6G interlinks physical and digital worlds making safety dependent on information security. Therefore, we need trustworthy 6G. Security: In 6G era, the dependence of the economy and societies on IT and the networks will deepen. The role of IT and the networks in national security keeps rising - a continuation of what we see in 5G. The development towards cloud and edge native infrastructures is expected to continue in 6G networks, and we need holistic 6G network security architecture planning. Security automation opens new questions: machine learning can be used to make safer systems, but also more dangerous attacks. Physical layer security techniques can also represent efficient solutions for securing less investigated network segments as first line of defense. Privacy: There is currently no way to unambiguously determine when linked, deidentified datasets cross the threshold to become personally identifiable. Courts in different parts of the world are making decisions about whether privacy is being infringed, while companies are seeking new ways to exploit private data to create new business revenues. As solution alternatives, we may consider blockchain, distributed ledger technologies and differential privacy approaches.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源