2 research outputs found
A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future
End-user privacy in mobile telephony systems is nowadays of great interest because of the envisaged hyper-connectivity and the potential of the unprecedented services (virtual reality, machine-type communication, vehicle-to-everything, IoT, etc.) being offered by the new 5G system. This paper reviews the state of subscription privacy in 5G systems. As the work on 5G Release 15 -- the first full set of 5G standards -- has recently been completed, this seems to be an appropriate occasion for such a review. The scope of the privacy study undertaken is limited to the wireless part of the 5G system which occurs between the service provider\u27s base station and the subscriber\u27s mobile phone. Although 5G offers better privacy guarantees than its predecessors, this work highlights that there still remain significant issues which need rectifying. We undertook an endeavor to (i) compile the privacy vulnerabilities that already existed in the previous mobile telephony generations. Thereafter, (ii) the privacy improvements offered by the recently finalized 5G standard were aggregated. Consequently, (iii) we were able to highlight privacy issues from previous generations that remain unresolved in 5G Release 15. For completeness, (iv) we also explore new privacy attacks which surfaced after the publication of the 5G standard. To address the identified privacy gaps, we also present future research directions in the form of proposed improvements
Context-Aware Security for 6G Wireless The Role of Physical Layer Security
Sixth generation systems are expected to face new security challenges, while
opening up new frontiers towards context awareness in the wireless edge. The
workhorse behind this projected technological leap will be a whole new set of
sensing capabilities predicted for 6G devices, in addition to the ability to
achieve high precision localization. The combination of these enhanced traits
can give rise to a new breed of context-aware security protocols, following the
quality of security (QoSec) paradigm. In this framework, physical layer
security solutions emerge as competitive candidates for low complexity,
low-delay and low-footprint, adaptive, flexible and context aware security
schemes, leveraging the physical layer of the communications in genuinely
cross-layer protocols, for the first time.Comment: arXiv admin note: text overlap with arXiv:2011.0732