[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3491396.3506556acmconferencesArticle/Chapter ViewAbstractPublication PagesiceaConference Proceedingsconference-collections
research-article

Security Use-Cases for Countering Threats of CLA and UAV in 6G

Published: 07 January 2022 Publication History

Abstract

Recently1, 6G mobile communication technology has been actively researched and faces issues about security and privacy. The various technologies and applications to be used in 6G will bring new security issues. Among the technologies, CLA and UAV have a ripple effect that can cause severe damage to the entire network. In particular, in case of the UAV base station, there are various security points such as devices, software and communications to be considered. In this paper, the security use-cases and threats scenarios of both CLA and UAV in 6G environment are described. Initially, the major threats that can occur in each environment are described through system architecture and communication process. Afterwards, the security use-cases are described in consideration of the threats and characteristics of each environment respectively. Finally, the attacks and security use-cases of each environment are depicted as the respective scenarios.

References

[1]
3GPP. 2019. Technical Specification Group Services and System Aspects; Enhancement for Unmanned Aerial Vehicles; Stage 1. TR 22.829.
[2]
3GPP. 2021. Study on supporting Unmanned Aerial Systems (UAS) connectivity, Identification and tracking. TR 23.754.
[3]
3GPP. 2021. Study on application layer support for Unmanned Aerial Systems (UAS). TR 23.755.
[4]
C. Benzaid and T. Taleb. 2020. ZSM Security: Threat Surface and Best Practices. IEEE Network Magazine, volume 34, pages 124-133. https://doi.org/10.1109/MNET.001.1900273
[5]
ETSI. 2021. Zero-touch network and Service Management (ZSM); Closed-Loop Automation; Part 1: Enablers. GS ZSM 009-1.
[6]
ITU-T SG 17. 2021. 4th Revised baseline text for X.5Gsec-guide: Security guidelines for 5G communication system. Study Period 2017. Contribution 1133
[7]
M. Mozaffari, X. Lin, and S. Hayes. 2021. Towards 6G with connected sky: UAVs and beyond. arXiv:2103.01143. [Online]. https://arxiv.org/abs/2103.01143.
[8]
P. Porambage, G. Gür, D.P.M. Osorio, M. Liyanage, A. Gurtov, M. Ylianttila. 2021. The roadmap to 6G security and privacy, IEEE Open J. Commun. Soc. https://doi.org/10.1109/OJCOMS.2021.3078081
[9]
V.-L. Nguyen, P.-C. Lin, B.-C. Cheng, R.-H. Hwang and Y.-D. Lin. 2021. Security and privacy for 6G: A survey on prospective technologies and challenges, IEEE Communications Survey&Tutorials. https://doi.org/10.1109/COMST.2021.3108618

Index Terms

  1. Security Use-Cases for Countering Threats of CLA and UAV in 6G

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ACM ICEA '21: Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications
    December 2021
    241 pages
    ISBN:9781450391603
    DOI:10.1145/3491396
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 January 2022

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. 6G
    2. 6G Security
    3. CLA
    4. Mobile Communication Security
    5. UAV

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT)

    Conference

    ACM ICEA '21
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 157
      Total Downloads
    • Downloads (Last 12 months)29
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media