Abstract:
Tremendous influx of novel technologies to enhance the global connectivity leads to vulnerability to security breaches by organized malicious actors. Hence, the need of a secure future communication system is becoming mandatory. This study is carved out into four phases. In Phase I, literature review was done to identify threats and challenges in emerging technologies and how they can pose challenges to 6G’s security. In Phase II, data was collected by publicly available resources. Then, threats were classified based on their severity, impact, and likelihood of occurrence. Taxonomy was developed based on specific network layers, protocols, and applications. In Phase III, by reviewing the best practices and existing solutions. A robust and adaptable security framework for 6G network was formulated, which should satisfy all security measures regarding confidentiality, integrity, and availability. In this paper, all possible areas of 6G security were discussed, but still it is in these initial stages and a lot of research is required in future is required. Potential future research areas of 6G communication are also highlighted. Today’s communication system having enhanced global connectivity is more and more vulnerable to security breaches by organized and complicated malicious actors. Hence a secure communication system is becoming need of the hour. In this research, work was carried out in four phases. In phase I & II, different types of security threats were identified by literature review and categorized according to their impact on confidentiality, integrity and availability of data. Security threats were prioritized according to their likelihood of occurrence and severity of impact in phase III. In phase IV, best practices were reviewed and latest security trends introduced in 5G technologies were analyzed. In the last phase, a framework was formulated, highlighting important steps to be taken for a secure upcoming 6G network. Finally, few recommendations were suggested.