论文标题
5G/6G和WiFi 6的安全性和隐私漏洞6:从共存的角度来看的调查和研究说明
Security and Privacy vulnerabilities of 5G/6G and WiFi 6: Survey and Research Directions from a Coexistence Perspective
论文作者
论文摘要
Spectrum Scarcity在下一代(5G/6G及以后)网络中实现所需的经验质量(QOE)一直是一个主要关注,这些网络支持大量具有低延迟和无缝连接性的移动设备和物联网设备。因此,在满足QoE需求时,频谱共享系统被认为是下一代无线网络的主要推动者。尽管大多数当前的共存解决方案和标准都集中在绩效改进和QOE优化上,但文献中忽略了此类网络环境的新兴安全挑战。独立网络的安全框架(5G或WIFI)假设从频谱到核心功能的整个网络资源拥有。因此,所有访问网络的访问均应在网络内安全系统内进行身份验证和授权,否则将其视为非法。但是,共存网络环境可能会导致前所未有的安全漏洞和漏洞,因为独立网络应容忍未知和网络外访问,特别是在中型访问中。在本文中,我们首次回顾了5G/WiFi共存网络环境中一些关键和新兴的安全漏洞,这些漏洞以前尚未在独立网络中观察到。具体而言,独立的媒体访问控制(MAC)协议以及所得的隐藏节点问题可能会导致剥削,例如服务阻塞,流氓基站的部署以及窃听的攻击。我们从物理层身份验证,网络访问安全性和跨层身份验证机制的角度研究潜在漏洞。这项研究为安全框架的分析和设计开辟了一个新的研究方向,该框架可以解决共存网络的独特挑战。
Spectrum scarcity has been a major concern for achieving the desired quality of experience (QoE) in next-generation (5G/6G and beyond) networks supporting a massive volume of mobile and IoT devices with low-latency and seamless connectivity. Hence, spectrum sharing systems have been considered as a major enabler for next-generation wireless networks in meeting QoE demands. While most current coexistence solutions and standards focus on performance improvement and QoE optimization, the emerging security challenges of such network environments have been ignored in the literature. The security framework of standalone networks (either 5G or WiFi) assumes the ownership of entire network resources from spectrum to core functions. Hence, all accesses to the network shall be authenticated and authorized within the intra-network security system and is deemed illegal otherwise. However, coexistence network environments can lead to unprecedented security vulnerabilities and breaches as the standalone networks shall tolerate unknown and out-of-network accesses, specifically in the medium access. In this paper, for the first time in literature, we review some of the critical and emerging security vulnerabilities in the 5G/WiFi coexistence network environment which have not been observed previously in standalone networks. Specifically, independent medium access control (MAC) protocols and the resulting hidden node issues can result in exploitation such as service blocking, deployment of rogue base-stations, and eavesdropping attacks. We study potential vulnerabilities in the perspective of physical layer authentication, network access security, and cross-layer authentication mechanisms. This study opens a new direction of research in the analysis and design of a security framework that can address the unique challenges of coexistence networks.