Security and trust for the 6G era
14 October 2021
Communication systems required for expanding human possibilities in the post-pandemic future of the 2030s will critically depend on a comprehensive set of security technology enablers. The 6G threat vector will be defined by 6G architectural disaggregation, open interfaces and a multiple stakeholders environment with trustworthiness to be assured across devices, sub-networks, het-cloud and applications. Broadly decomposed into domains of cyber-resilience, privacy and trust and their respective intersection, we explore relevant security technology enablers including automated software creation and automated closed loop security operation, privacy preserving technologies, hardware and cloud embedded anchors of trust, quantum safe security, jamming protection and physical layer security as well as distributed ledger technologies. A vision for a trustworthy Secure Telecom Operation Map is developed as part of the automated closed loop operations paradigm. Artificial intelligence and machine learning (AI/ML) will be pervasive and of key relevance across the security technology stack and architecture.