6G-oriented endogenous security architecture and key technologies
Strong security is one of the industry's important expectations for the development of sixth-generation wireless(6G)networks.This study first analyzes the security problems that 6G networks may suffer and classifies them into two types:endogenous and nonendogenous security problems.The former are security issues introduced by new 6G features(such as 6G new service scenarios represented by intelligent services and data services,and 6G new business ecosystems represented by openness,collaboration,and compliance with laws and regulations).The latter mainly includes security issues caused by technological advances in other fields(such as artificial intelligence and quantum computing)except 6G.Next,this study proposes an inherent security architecture for 6G networks.Two types of security components are defined to carry the security technologies required by 6G networks,namely the"trusted engine"and"security capability"units,to support sustainable evolution and flexible orchestration of security and flexibly integrate the security architecture and network architecture.We strive to solve both endogenous and nonendogenous security problems in a unified manner.Based on the architecture proposed,we further detail the 6G network security technology.Security technologies are also classified as endogenous and nonendogenous.The former mainly refers to the physical layer security technology in which security mechanisms and communication networks cannot be decoupled.For this type of technology,we propose the concept of"approaching one-time pad"upon analyzing the limitations of the existing physical layer security mechanism.In addition,we systematically elaborate on aspects such as the index system,implementation architecture,and key technology.The latter mainly refers to the security technology in which the security mechanism is superimposed on the communication network,including trust systems with multiple modes,digital identity mechanisms based on trust systems,active security defense technologies against unknown threats,and global security assessment technologies.These technologies support each other and form a self-aware,self-operating,self-evolving endogenous security system for 6G networks.