Table 2.
6G Physical Layer Technology | Related Work | Security and Privacy Challenges | Basic Contributions |
---|---|---|---|
THZ | Akyildiz et al. [81] | Authentication |
|
Ma et al. [82] | Malicious behaviors |
|
|
VLC | Pathak et al. [91] | Malicious behaviors |
|
Ucar et al. [92] | Privacy of communication |
|
|
Mostafa et al. [93] | Encryption |
|
|
Cho et al. [95] | Malicious behaviors and security of the physical layer |
|
|
Molecular communication | Farsad et al. [96] | Malicious behaviors and authentication problems |
|
Lu et al. [97] | Molecular communication reliability and encryption |
|
|
Loscri et al. [98] | Authentication challenges and different attacks |
|
|
AI and ML technology | Dang et al. [114] | Authentication |
|
Zhou et al. [113] | Access control and authentication |
|
|
Sattiraju et al. [110] | Authentication |
|
|
Hong et al. [111] | Communication |
|
|
Nawaz et al. [112] | Encryption |
|
|
Quantum communication | Hu et al. [119] | Quantum secret sharing, key management, and security of direct communication |
|
Zhang et al. [120] | Encryption |
|
|
Nawaz et al. [112] | Encryption of secret key |
|
|
Distributed ledger technology | Ling et al. [130] | Authentication |
|
Kotobi et al. [131] | Access control |
|
|
Ferraro et al. [133] | Access control |
|