Professional Documents
Culture Documents
SIX-Trust For 6G: Towards A Secure and Trustworthy 6G Network
SIX-Trust For 6G: Towards A Secure and Trustworthy 6G Network
SIX-Trust For 6G: Towards A Secure and Trustworthy 6G Network
Abstract— Recent years have witnessed a digital explosion with may introduce new security threats from multiple aspects: open
the deployment of 5G and proliferation of 5G-enabled innovations. interfaces, pervasive usage of NFV and VNF, the integration of
Compared with 5G, 6G is envisioned to achieve much higher sensing and computing, extensive usage of cloud and edges, the
performance in terms of latency, data rate, connectivity, energy
complicated relationship among human, things, and connected
efficiency, coverage and mobility. To fulfil these expectations, 6G
will experience a number of paradigm shifts, such as exploiting intelligence, and the entangled relationship among various
new spectrum, applying ubiquitous ML/AI technologies and involved stakeholders. Millions of connected devices and
building a space-air-ground-sea integrated network. However, sensors, forming the base layer of threats, will increase the
these paradigm shifts may lead to numerous new security and vulnerability to the impact of attacks. More threats are likely to
privacy issues, which traditional security measures may not be appear with the extensive use of AL/ML. For instance, the
able to deal with. To tackle these issues and build a trustworthy
training procedure of AI models requires substantial amount of
6G network, we introduce a novel trust framework named as SIX-
Trust, which composes of 3 layers: sustainable trust (S-Trust), data, which may lead to data leakage or malicious usage of
infrastructure trust (I-Trust) and xenogenesis trust (X-Trust). sensitive and confidential information.
Each layer plays a different role, and the importance of each layer To deal with all aforementioned potential threats, it is
varies for different application scenarios of 6G. For each layer, we believed that 6G needs to be designed as a trustworthy network
briefly introduce its related enabling technologies, and in nature. Trust needs to be evaluated across end-devices,
demonstrate how these technologies can be applied to enhance
access networks, and core networks. However, trust is a very
trust and security of the 6G network. In general, SIX-Trust
provides a holistic framework for defining and modeling trust of complicated concept and still under-studied in both academia
6G, which can facilitate establishing a trustworthy 6G network. and industry. Thus, how to build a trustworthy 6G network
becomes a challenging research problem. In this paper, we
Index Terms—Trust, Trustworthiness, 6G, Security, Privacy present our points of view on how to build a trustworthy 6G
network. We adopt a systematic approach to investigate and
I. INTRODUCTION analyze trust challenges of 6G in a layer-wise manner, and we
T HE rapid development of 5G has opened up a world of propose a three-layer novel trust framework for 6G to assure the
low-latency communication, high-speed data delivery, 6G network trustworthiness. The proposed trust framework,
and exponentially increased connectivity among consisting of Sustainable trust (S-Trust), Infrastructure trust (I-
numerous devices and sensors. Deployment of network Trust) and Xenogenesis trust (X-Trust), is named as SIX-Trust.
function virtualization (NFV) and virtual network functions Each layer plays a different role, and the importance of each
(VNF) in 5G offers a dynamic network architecture and enables layer varies for different application scenarios of 6G. For each
flexible resource allocation by separating service from layer, we share our views on relevant technologies as potential
hardware. Due to unprecedented growth of data volume and solutions to address the security and trust challenges. The
expanding demand for ubiquitous connectivity, researchers proposed framework is envisioned to provide a comprehensive
have been driven to put much effort on developing 6G overview of 6G trust and offer insights into viable methods that
technologies. It is expected that 6G needs to offer at least 20 can be applied to assure 6G network’s trustworthiness.
times more network capacity, and 50 times more data
transmission rate than 5G. Besides, 6G is envisioned to add one II. SIX-TRUST FOR 6G
more dimension to create a three-dimensional network covering From our perspective, to build a trustworthy 6G network, we
from terrestrial to non-terrestrial, from space to underwater, and need a multi-layer hierarchical trust architecture, consisting of
form the so-called space-air-ground-sea integrated network. a root layer, a foundation layer and a representation layer. Based
Moreover, as an essential enabler, Artificial Intelligence (AI) on these, we propose the three-layer SIX-Trust, comprising of
empowers automation of network element creation and S-Trust, I-Trust and X-Trust.
operation, anomaly detection and ubiquitous system
monitoring. Proliferation of pervasive intelligence will drive A. Sustainable Trust (S-Trust)
the transformation of mobile communications from “connected Sustainable trust (S-Trust) embodies trust representation,
everything” to “connected intelligence” [1]. which measures the degree of trust of users. In the context of
However, the expanding connectivity and new features of 6G 6G, continual and tenable trust representation and evaluation
2
2) Dynamic Trust Evaluation which has been announced by W3C as an official Web standard.
Dynamic trust evaluation is usually used for continuously DID is not dependent on any central issuing agency (e.g., CA),
monitoring users, devices, and applications’ behaviors. To and are verifiable cryptographically. The decentralized IDM is
assure security and trustworthiness of communication in a envisioned to enable key management without CAs across
highly connected and heterogenous environment, an integrated network slices, facilitate trustworthy and secure mutual
real-time dynamic trust evaluation framework that is applicable authentication for massive IoT devices, with interoperability
in diverse scenarios is essentially needed. As shown in Fig. 3, provided, and offer better privacy protection.
in our opinion, the dynamic trust evaluation framework can be 2) Federated Trust
divided into four modules that are interconnected: As 6G networks will encompass unprecedented amount of
Data collection module continually collects data generated heterogenous devices and diversified services, federated trust
by the evaluatee and stores raw data in database. Intelligent becomes extremely critical to network security. To address the
context-awareness module pre-processes stored data, and then issue of cumbersome management of numerous user credentials,
apply AI/ML algorithms for feature extraction. Feature identity federation has been proposed as a feasible solution to
selection module contains multiple feature libraries that will be provide a more cohesive authentication process. More
updated by previously-extracted features. Appropriate feature importantly, it establishes federated trust relationship between
parameters for current scenario are selected by feature selection an identity provider (IdP) and a service provider (SP). The SPs
engine, and passed to next module to build and train AI/ML do not need to directly handle users’ credentials, but rather
models. Trust evaluation and decision-making module takes authenticate users based on federated trust on the IdP. Related
in selected feature parameters and finetunes AI/ML models for standards include but does not limit to OAuth 2.0 and OpenID
trust evaluation. Decisions will be made based on trust values Connect, both of which can be applied to implement single
after evaluation, and will be used to support the policy control sign-on (SSO) scheme. Another way to build federated trust is
for different 6G scenarios. to form network service federation by orchestrating network
services across multiple domains.
C. Trust Relationship Establishing federated trust relationship will bring numerous
In this subsection, we discuss two promising trust relationships, benefits to 6G networks, one of which is that network security
decentralized trust and federated trust, for secure and seamless will be strengthened, since simplification of registration process
6G identity management. will reduce security breaches caused by numerous user
1) Decentralized Trust credentials and login interfaces. In addition, users will have a
In existing networks, identity management (IDM) of network seamless experience across multiple domains and applications,
devices are mainly supported by a centralized PKI where as the operators are projected to orchestrate services of external
certificates are issued from a certificate authority (CA). The domains. Federation also facilitates secure and effective
trust relationship between the CA and related entities is highly resource sharing among different entities, increases network
centralized, which may lead to many security issues, such as flexibility, as well as reduces operational cost.
single point of failure. For instance, a compromised root CA
will result in sharp decrease of trustworthiness of sub-CAs as IV. INFRASTRUCTURE TRUST
well as issued certificates. In this section, we present the potential technologies that are
To build a more trustworthy 6G network, IDM for network crucial to reinforce infrastructure trust.
devices should be structured in a decentralized manner. One
promising enabler would be the decentralized identifiers (DID),
5