Smart City Gnosys

Smart city article details

Title Cyber Security Technologies For Privacy In 6G Networks
ID_Doc 16947
Authors Tharun S.S.; Prajwal S.; Chethana H.T.; Aditya C.R.; Suresh H.
Year 2025
Published Advanced Sciences and Technologies for Security Applications, Part F458
DOI http://dx.doi.org/10.1007/978-3-031-85008-0_2
Abstract While civil society waits for 5G that is to bring dramatic improvement in data speed, connection density and application versatility, technical community is already looking forward to the future of 6G networks. Huge transformations are predicted with the introduction of 6G technology, where ultra-fast speed, extremely large and real-time connectivity together with real-time data processing will be the order of the day. But they come with unprecedented security and privacy issues that have to be solved to secure this revolutionary ecosystem. For 6G networks, the new application requirements for connectivity will be challenging to meet in terms of coverage of services, low latency, high data rate and the massive number of machine-to-machine connections that the newly proposed networks expect to support; hence, good secure frameworks will be expected. These frameworks should include the ability to incorporate enhanced form of encryption, secure form of user authentication and effective control of access to resources and data from new forms of cyber threats. Further, the novel form of 6G networks will entail uses of decentralized ledger technologies, quantum-safe communications and this calls for unique ways to guarantee data authenticity and user anonymity. It bears repeating that the implementation of AI and machine learning in these networks will enable the identification of probable security threats and subsequent security threat counteraction in real time. Also, the number and varieties of the use cases that are expected to be served by 6G, including self-driving cars, smart cities, and telemedicine and remote operations and control, will require strong security to protect data and regain users’ confidence. As researchers work in together with industry to explore the idea of 6G, there will be the need to ensure that the established network infrastructure is secure and can withstand any threat that may hamper the usage of this newest wireless connection. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
Author Keywords AI/ML security; Communication; Physical layer security; Privacy protection; Quantum cryptography; Security threats; Sixth-Generation (6G)


Similar Articles


Id Similarity Authors Title Published
47850 View0.892Mantas G.; Saghezchi F.B.; Rodriguez J.; Sucasas V.Security And Privacy For 6G Massive IotSecurity and Privacy for 6G Massive IoT (2025)
43072 View0.887Prajapati Y.; Gosai K.; Suthar O.; Singh S.K.; Usman M.T.; Khan H.Privacy And Security Concerns With 6G Smart City InfrastructureBuilding Tomorrow's Smart Cities With 6G Infrastructure Technology (2024)
6394 View0.876Sankalp M.R.; Lokapal G.; Mohan B.A.; Basavaraj G.N.Addressing Cybersecurity Challenges In 6G Networks Through Ai-Driven Adaptive Defense Mechanisms And Quantum-Resilient ProtocolsProceedings of 2025 International Conference on Computing for Sustainability and Intelligent Future, COMP-SIF 2025 (2025)
47561 View0.87Samanta S.; Sarkar A.; Bulo Y.Secure 6G Communication In Smart City Using BlockchainLecture Notes in Networks and Systems, 491 (2023)
39101 View0.87Lopez M.A.; Barbosa G.N.N.; Mattos D.M.F.New Barriers On 6G Networking: An Exploratory Study On The Security, Privacy And Opportunities For Aerial Networks2022 1st International Conference on 6G Networking, 6GNet 2022 (2022)
47763 View0.862Alotaibi A.; Barnawi A.Securing Massive Iot In 6G: Recent Solutions, Architectures, Future DirectionsInternet of Things (Netherlands), 22 (2023)
47843 View0.856Sharma K.; Singh N.Security And Privacy Challenges In 6G Enabled Smart CityBuilding Tomorrow's Smart Cities With 6G Infrastructure Technology (2024)
47713 View0.853Alauthman M.; Aldweesh A.; Al-Qerem A.; Alkasassbeh M.; Almomani A.Securing 5G Networks: Opportunities And Threats In Next-Generation ConnectivityComplexities and Challenges for Securing Digital Assets and Infrastructure (2025)
312 View0.85Meena P.; Pal M.B.; Jain P.K.; Pamula R.6G Communication Networks: Introduction, Vision, Challenges, And Future DirectionsWireless Personal Communications, 125, 2 (2022)