{"title":"Functional Security and Trust in Ultra-Connected 6G Ecosystem","authors":"Vishal Sharma","doi":"10.4108/eetinis.v9i4.2846","DOIUrl":null,"url":null,"abstract":"Security and trust are the entangled role players in the future generation of wireless networks. Security in 5G networks is currently supported using several functions. Given the advantages of such a system, this article explores the functional security and trust for the 6G ecosystem with ultra-connectivity. Several associated challenges, application-specific domains, and consumer issues related to 6G security are discussed. The article highlights the network security-by-design and trust-by-design principles and performance expectations from the security protocols in supporting handover in an ultra-connected scenario. Finally, potential research directions are presented for a road towards the 6G ecosystem.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"27 1","pages":"e5"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4108/eetinis.v9i4.2846","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 1
Abstract
Security and trust are the entangled role players in the future generation of wireless networks. Security in 5G networks is currently supported using several functions. Given the advantages of such a system, this article explores the functional security and trust for the 6G ecosystem with ultra-connectivity. Several associated challenges, application-specific domains, and consumer issues related to 6G security are discussed. The article highlights the network security-by-design and trust-by-design principles and performance expectations from the security protocols in supporting handover in an ultra-connected scenario. Finally, potential research directions are presented for a road towards the 6G ecosystem.