Skip to main content
. 2022 Mar 2;22(5):1969. doi: 10.3390/s22051969

Table 4.

The 6G applications security challenges and the basic security requirements.

6G Application Security Challenges Security Requirements
UAV based mobility
  • High altitude and High mobility

  • Limited energy

  • Diversity of devices

  • Terrorist attacks

  • Physical tampering

  • Diversity of devices

  • Real-time operations with reduced operational cost

  • High scalability

  • End to End security system design

Telepresence holography
  • Limited resources

  • Limited energy

  • End to end security system design

  • High privacy

  • Real-time operation

  • Preventing terrorist attacks

Extended reality
  • Lack of security standards

  • Physical tampering attacks

  • Limited resources

  • Edge security

  • Lightweight privacy

  • Real-time operation

Connected Autonomous Vehicles (CAV)
  • High mobility

  • Physical attacks

  • Privacy challenges

  • Lightweight end to end security

  • Diversity of devices

  • Dynamic security solutions

  • Lightweight authentication

  • Ultra-Privacy-preserving

  • Proactive security

  • Real-time resistance against attacks

  • Low computation and communication

Industry 5.0
  • Denial of Service

  • Smart Security

  • Smart Factory

  • Supply chain and Extended Systems

  • Ultra-High privacy

  • Proactive security

  • Lightweight security

  • Confidential information and intellectual property

Smart grid 2.0
  • Smart grid attacks

  • Aggregation of data

  • Translation between protocols

  • Physical equipment attacks

  • Exploitation

  • Scalable IoT security and heterogeneity

  • Zero-touch security

  • High privacy

  • Reduced cost

  • Maintaining access

Artificial intelligence in health care
  • Novel approaches for dynamic security

  • Diversity of devices

  • Trustworthiness

  • Visibility

  • Ethical and legal aspects

  • Extensibility and viability

  • Controlled security tasks

  • Diversity of devices

  • High privacy

  • Zero-touch security

  • Edge security

  • Domain-specific security

Digital twins
  • Security of physical model

  • Security of digital model

  • Diversity of devices

  • Privacy-preserving

  • High mobility

  • Isolated security systems

  • High bandwidth

  • Ultra-privacy

  • Lightweight security

  • Scalability

  • Dynamic security systems

  • Robustness

Wireless brain–computer interactions
  • Structure design

  • Physical attacks

  • Privacy challenges

  • End to end security systems

  • Confidentiality

  • Availability

  • Safety

  • Integrity

Distributed ledger
applications
  • Double-spending

  • Majority vulnerability

  • Scalability

  • Quantum computing

  • Transaction privacy leakage

  • Preventing privacy leakage

  • Preventing double-spending attack