Physical-Layer Security in 6G Networks
Physical-Layer Security in 6G Networks
2 Department of Electrical and Electronics Engineering, Kadir Has University, 3408 Istanbul, Turkey
5 Department of Electrical Engineering and Computer Science, Jacobs University Bremen, 28759 Bremen, Germany
6 LiFi Research and Development Centre, Department of Electronic and Electrical Engineering, University of Strathclyde, Glasgow G1 1XW, U.K.
ABSTRACT The sixth generation (6G) of mobile network will be composed by different nodes, from
macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full connectivity
fabric all around us. These heterogeneous nodes constitute an ultra dense network managing tons of
information, often very sensitive. To trust the services provided by such network, security is a mandatory
feature by design. In this scenario, physical-layer security (PLS) can act as a first line of defense, providing
security even to low-resourced nodes in different environments. This paper discusses challenges, solutions
and visions of PLS in beyond-5G networks.
INDEX TERMS 6G, physical-layer security, MIMO, IRS, visible light communications, authentication,
key distribution.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
• pushing intelligence towards the edge of the network one key feature of the future mobile communica-
will open additional security threats? tion network. Understand the surrounding situation and
In this context, stronger protection can be achieved by imple- localize precisely the users is a key-enabler of future
menting security at the physical layer. Integrating physical 6G services, but on the other hand it opens new security
layer with cybersecurity is the key to face security challenges issues, since sensing can also be target of attacks, and
of future 6G networks. An overview of security and privacy it can be the way to distort the communication. PLS
threats and challenges in 6G networks can be found in [28]. can be very helpful in the protection of the sensing
capabilities of 6G nodes.
6. Edge computing and learning: The data from users will
B. PLS TECHNIQUES
be more and more computed as nearest as possible to
PLS provides security at the very first layer (physical), acting
the users, which produce and consume data/information.
as a first line of defense, trying to make attackers’ job harder.
The edge computing together with federated learning
It provides confidentiality without assuming a limited com-
technique will be an enabler of future 6G wireless
putational power of the hostile node, by exploiting unique
services for mobile users, but this opens also new secu-
characteristics of the wireless channel. In the quantum com-
rity threats: malicious end-user devices can attack edge
puting and AI era applied to networks, it is important not to
node or provide adversarial training which could distort
rely on unfair assumptions about the attackers for providing
the learning model. PLS can be one important actor in
security.
protecting the edge nodes as well as the user equipment
Some of the main PLS techniques consist of: i) signal
by exploiting features such as the fingerprinting authen-
processing (noisy modulations); ii) coding (wiretap codes);
tication or the fast cipher key generation by means of
iii) artificial noise injection (friendly/cooperative jamming);
channel reciprocity.
iv) MIMO/IRS (beamforming destructive signal); v) HetNets
(user/BS association to provide larger area of security); vi)
visible light communications (VLC) (spatial confinement of III. IMPLEMENTATIONS OF PLS
signals) and vii) cipher-Key generation. In this section examples of implementation of PLS are
An overview of PLS techniques and applications is illustrated.
provided by [15].
A. PLS FOR LOW-RESOURCED DEVICES
C. PLS IN 6G SCENARIOS Many of the approaches described in Section I are based
In order to highlight what PLS can do for 6G and on assumptions that make them not easily implementable
how the previously listed PLS techniques can be mapped in a real world: some of those require that a common a
into different application contexts, four main scenarios are priori secret is shared by the legitimate users or exchanged
defined: in the start-up phase through insecure channels, and some
1. Low-resourced devices: It includes both dry and wet others assume to know that an eavesdropper is present and
nano-scale devices and the adoption of signal process- where it is located. As a matter of fact, almost all existing
ing and coding PLS techniques represent a promising results on secret channel capacity are based on some kinds of
solution to be considered. Dry and wet devices refer assumptions that appear impractical. It has been a challenge
to biological or artificial nano-scale machines. For in information theory for decades to find practical ways to
example, synthetic biology can design and implement realize information-theoretic secrecy.
biological particles (wet) to interact with the natural First proposals deal with the exploitation of the wireless
cells following a programmed plan. Similarly, artifi- channel between legitimate users in order to extract a key to
cial nano-scale robots (dry) can be designed to provide be used for encrypting the message [29]. The information-
actions inside the human body. theoretical secrecy ensures that if the extraction is made
2. Massive deployed devices with mobility: The exploita- under the assumption to have an advantage over Eve’s chan-
tion of Massive Cell-Free MIMO and Intelligent reflect- nel, the key is not recoverable by Eve in any way. An
ing surfaces (IRS) shall be taken into account to satisfy exhaustive review of cross-layer techniques for enhancing the
the security requirements of such context. security can be found in [29]. In [30], the security issues and
3. Indoor environments: The spatial confinement that vis- solutions are reviewed for what concerns the IoT topic area.
ible light communications offers can be very useful to The physical-layer security anyway is not taken into account
guarantee indoor secure communications. as information-theoretical secrecy. An overview of the chal-
4. Opportunistic/self-organizing networks: Fast generation lenges facing physical-layer security is reported in [31]. A
of PhySec-based crypto-key for symmetric encryption review of cooperative techniques for enhancing the security
can represent a completely decentralized solution for can be found in [32].
key creation. Moving beyond the 5G technology, 6G will enhance the
5. Integrated sensing and communication: Radar as well key performance indicators of 5G, enabling the definition
as high-resolution localization capabilities will be of more demanding applications, ranging from augmented
FIGURE 3. Molecular communications scheme with eavesdropper. FIGURE 5. Secret Key Generation resilience against key sniffing.
C. CELL-FREE MASSIVE MIMO AND IRS contamination attack can be severely detrimental for pro-
The most successful PHY technology for 5G networks is visioning PLS in cell-free massive MIMO systems. They
massive MIMO. A massive MIMO base station (BS) sup- compared co-located massive MIMO and cell-free massive
ports a large number of antennas that cover a large number MIMO, and the results revealed that cell-free systems are
of terminals [42]. Massive MIMO technology is popular less resilient to pilot contamination attacks than conventional
among network vendors due to their superior spectral effi- massive MIMO systems.
ciency and throughput. Network vendors adopted massive The research on PLS for cell-free massive MIMO system
MIMO for pre-5G products which have been displayed is at a very early stage and the existing literature on this
on numerous trials in last few years. For example, Nokia topic is scarce. In [45], the security aspects of the cell-
and Sprint demonstrated massive MIMO with 64 anten- free systems are studied. The authors consider the problem
nas connected for both uplink and downlink through their of maximizing achievable data rate of the attacked user.
AirScale products in Mobile World Congress (MWC) 2017. The corresponding problems of minimizing the power con-
Ericsson and Huawei also have similar products for massive sumption subject to security constraints are also considered.
MIMO such as AIR 6468 and Huawei AAU, respectively. In [46], a secure communication in multigroup multicasting
The research community have already shifted their focus cell-free systems with active spoofing attack is investigated.
on post-5G networks and PHY technologies that grabbed A distributed conjugate beamforming with normalized power
most attention for 6G are: 1) Cell-free massive MIMO and constraint policy is exploited for downlink secure transmis-
2) IRS. They are currently the two strongest candidates sion. Similar works can also be found in [47], [48]. These
for physical layer of sixth generation (6G) communication papers propose PLS exploiting information theory and signal
systems. Both are currently strong candidates for PLS in 6G processing rather than traditional higher-layer cryptographic
networks. techniques.
The biggest security issue associated with a cell-free mas-
sive MIMO is the exposed location of the antennas. It is
1) CELL-FREE MASSIVE MIMO
easier to get physical access to cell-free system through
The biggest drawback of conventional massive MIMO is the exposed antennas and cables compared to a remotely
their distance from users, which cause large variations of located massive MIMO BS. Hence, it is easier to inject
received signal strength between different users. Distance malicious software and configuration parameters by direct
from users is the biggest drawback of conventional mas- wiretapping. The attacker could change the configuration of
sive MIMO, since different users experience large variations beamforming parameters so that the antenna arrays focus
of received signal strength. Typically, a bulky and expen- their signals towards an unwanted user. This also enables a
sive massive MIMO BS is placed in an elevated location to passive attacker to get access on user-specific keys, short-
increase the cell radius and to cover a large number of users. term session keys and authentication keys. The requirement
The cell/coverage radius is usually increased by placing a of a cell-free system dictates that the fronthaul circuitry
bulky and expensive massive MIMO BS in an elevated loca- connected with the antenna stripes should be simple. It is
tion. Cell-free massive MIMO eliminates this drawback by not possible to accommodate sophisticated encryption meth-
having antennnas distributed among different locations. The ods between the fronthaul and baseband unit. Thus, if an
baseband functionalities are performed by a centralized base- antenna stripe is compromised, it is very challenging to pro-
band processing unit which is connected to all the antennas vide data confidentiality of the baseband transmissions or
through cables [43]. This concept was displayed by Ericsson receptions. The cell-free systems are also vulnerable to phys-
at MWC 2019, where they developed antenna stripes as small ical attacks due to their exposed location and miniature size.
as matchbox and can be integrated in an adhesive tape to It is much easier to destroy antenna stripes and disrupt the
place in any locations. Ericsson, at the MWC 2019, dis- communication of a cell-free system than a remotely located
played this concept: a matchbox-size antenna stripes were bulky massive MIMO BS. It is much harder to destroy a
integrated into an adhesive tape which can be placed in any remotely located bulky massive MIMO BS than an antenna
location. stripes, and thus disrupt the communication of a cell-free
As cell-free systems are also based on large number of system.
antenna systems, the cell-free systems are also inherently
robust against passive eavesdropping [19]. Cell-free massive
2) INTELLIGENT REFLECTIVE SURFACE
MIMO systems provide PLS for passive eavesdropping with-
out any extra effort. However, the eavesdropper can pretend Intelligent Reflective Surface (IRS) is novel concept which
to be a legitimate user and launch an active attack by send- provides an alternative path of transmission and can be
ing a pilot sequence of his own. This pilot contamination used to change amplitude, phase and frequency of incident
attack is more challenging for a cell-free systems, because signals [49], [50], [51]. IRS is a new technique provid-
an amount of pilot contamination pre-exists in a cell-free ing alternative path of transmission by changing amplitude,
systems. In [44], the authors have shown with mathemat- phase and frequency of incident signals. It is particularly use-
ical analysis and Monte-Carlo simulations that active pilot ful for high frequency communication which suffers from
semishpere. The semispheres, which act as access points, [7] A. Francillon, B. Danev, and S. Čapkun, Relay Attacks on Passive
are assumed to be placed on the ceiling of the room. The Keyless Entry and Start Systems in Modern Cars, IACR, Lyon, France,
2011. [Online]. Available: https://eprint.iacr.org/2010/332.pdf
distribution of the APs on the ceiling of the room follows [8] Y.-S. Shiu, S. Y. Chang, H.-C. Wu, S. C.-H. Huang, and H.-H. Chen,
the deployment schemes mentioned above. “Physical layer security in wireless networks: A tutorial,” IEEE
Three different radii of HCPP deployment are assumed: Wireless Commun., vol. 18, no. 2, pp. 66–74, Apr. 2011.
1 m, 1.7 m and 2.4 m. Legitimate users and eavesdrop- [9] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst,
“Principles of physical layer security in multiuser wireless networks: A
pers are assumed to be distributed as 2-D homogeneous survey,” IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550–1573,
PPPs in the room. As it can be seen in Fig. 12, LiFi trans- 3rd Quart. 2014.
mitter with HEX deployment with 18-element transmitters [10] Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security:
Technical challenges, recent advances, and future trends,” Proc. IEEE,
can achieve over 8 times secrecy throughput improvement vol. 104, no. 9, pp. 1727–1765, Sep. 2016.
compared to WiFi. The 18 LED elements generates nar- [11] K. Zeng, K. Govindan, and P. Mohapatra, “Non-cryptographic authen-
rower light beams which can strongly reduce the SINR of tication and identification in wireless networks,” IEEE Wireless
Commun., vol. 17, no. 5, pp. 56–62, Oct. 2010.
eavesdroppers.
[12] X. Duan and X. Wang, “Authentication handover and privacy pro-
tection in 5G HetNets using software-defined networking,” IEEE
Commun. Mag., vol. 53, no. 4, pp. 28–35, Apr. 2015.
IV. CONCLUSION AND FUTURE DIRECTIONS [13] Q. Xu, R. Zheng, W. Saad, and Z. Han, “Device fingerprinting in wire-
This paper envisioned the use of physical-layer secu- less networks: Challenges and opportunities,” IEEE Commun. Surveys
rity in future 6G networks. The unique characteristics of Tuts., vol. 18, no. 1, pp. 94–104, 1st Quart., 2016.
[14] M. Husák, J. Komárková, E. Bou-harb, and P. Čeleda, “Survey of
PLS can help in facing the significant security challenges attack projection, prediction, and forecasting in cyber security,” IEEE
raised by ubiquitous ultra-dense heterogeneous networks. Commun. Surveys Tuts., vol. 21, no. 1, pp. 640–660, 1st Quart., 2019.
The security features as well as practical implementations [15] J. M. Hamamreh, H. M. Furqan, and H. Arslan,
“Classifications and applications of physical layer security techniques
of PLS for 6G networks are discussed. Massive MIMO, for confidentiality: A comprehensive survey,” IEEE Commun. Surveys
IRS, LiFi or distributed and cooperative protocols are Tuts., vol. 21, no. 2, pp. 1773–1828, 2nd Quart., 2019.
seen as possible PLS techniques to meet the 6G security [16] X. Wang, P. Hao, and L. Hanzo, “Physical-layer authentication
requirements. for wireless security enhancement: Current challenges and future
developments,” IEEE Commun. Mag., vol. 54, no. 6, pp. 152–158,
Open problems are still present: from the complete inte- Jun. 2016.
gration of PLS and higher-layers security protocols to the [17] A. Hyadi, Z. Rezki, and M. Alouini, “An overview of physical layer
integration with AI, which is one of the main driver of security in wireless communication systems with CSIT uncertainty,”
IEEE Access, vol. 4, pp. 6121–6132, 2016.
6G. The pervasive use of AI will surely provide bene- [18] L. Sun and Q. Du, “A review of physical layer security techniques
fits from security point of view, it also opens additional for Internet of Things: Challenges and solutions,” Entropy, vol. 20,
challenges since new threats could be opened, not known no. 10, p. 730, Sep. 2018.
nowadays. PLS is envisioned to address the security threats [19] D. Kapetanovic, G. Zheng, and F. Rusek, “Physical layer security for
massive MIMO: An overview on passive eavesdropping and active
coming from future 6G network. By applying AI technology, attacks,” IEEE Commun. Mag., vol. 53, no. 6, pp. 21–27, Jun. 2015.
the PLS paradigm can be further improved compared with [20] W. K. Harrison, J. Almeida, M. R. Bloch, S. W. McLaughlin, and
conventional security technologies. J. Barros, “Coding for secrecy: An overview of error-control coding
techniques for physical-layer security,” IEEE Signal Process. Mag.,
In 5G the security-by-design approach has started to be vol. 30, no. 5, pp. 41–50, Sep. 2013.
considered, but the same treatment has not been given to the [21] W. Wang, K. C. Teh, K. H. Li, and S. Luo, “On the impact of adaptive
privacy. In a 360◦ security approach, as 6G is foreseen to eavesdroppers in multi-antenna cellular networks,” IEEE Trans. Inf.
Forensics Security, vol. 13, no. 2, pp. 269–279, Feb. 2018.
provide, not only security-by-design has to be considered,
[22] K.-W. Huang, H.-M. Wang, Y. Wu, and R. Schober, “Pilot spoofing
but also privacy-by-design should be addressed. attack by multiple eavesdroppers,” IEEE Trans. Wireless Commun.,
vol. 17, no. 10, pp. 6433–6447, Oct. 2018.
[23] X. Zhou, B. Maham, and A. Hjorungnes, “Pilot contamination for
REFERENCES active eavesdropping,” IEEE Trans. Wireless Commun., vol. 11, no. 3,
[1] M. Latva-Aho and K. Leppänen, “Key drivers and research challenges pp. 903–907, Mar. 2012.
for 6G ubiquitous wireless intelligence,” Oulu, Finland, 6G Res. Vis., [24] Y. Wu, R. Schober, D. W. K. Ng, C. Xiao, and G. Caire, “Secure mas-
Univ. Oulu, White Paper, 2019. sive MIMO transmission with an active eavesdropper,” IEEE Trans.
[2] R. A. Stoica and G. T. F. de Abreu, “6G: The wireless communica- Inf. Theory, vol. 62, no. 7, pp. 3880–3900, Jul. 2016.
tions network for collaborative and AI applications,” 2019. [Online]. [25] W. Wang, N. Cheng, K. C. Teh, X. Lin, W. Zhuang, and X. Shen, “On
Available: arXiv:1904.03413. countermeasures of pilot spoofing attack in massive MIMO systems:
[3] P. Botsinis et al., “Quantum algorithms for wireless communica- A double channel training based approach,” IEEE Trans. Veh. Technol.,
tions,” IEEE Commmun. Surveys Tuts., vol. 21, no. 2, pp. 1209–1242, vol. 68, no. 7, pp. 6697–6708, Jul. 2019.
2nd Quart., 2018. [26] Q. Xiong, Y.-C. Liang, K. H. Li, and Y. Gong, “An energy-ratio-
[4] I. Ahmad, S. Shahabuddin, T. Kumar, J. Okwuibe, A. Gurtov, and based approach for detecting pilot spoofing attack in multiple-antenna
M. Ylianttila, “Security for 5G and beyond,” IEEE Commun. Surveys systems,” IEEE Trans. Inf. Forensics Security, vol. 10, pp. 932–940,
Tuts., vol. 21, no. 4, 3682–3722, 4th Quart., 2019. 2015.
[5] T. Pecorella, L. Brilli, and L. Mucchi, “The role of physical layer secu- [27] Y. Liu, H.-H. Chen, and L. Wang, “Physical layer security for next
rity in IoT: A novel perspective,” MDPI Inf., vol. 7, no. 3, pp. 49–66, generation wireless networks: Theories, technologies, and challenges,”
2016. IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 347–376, 1st Quart.,
[6] S. Severi, G. T. F de Abreu, P. Gianni, and D. Dardari, “A secret 2017.
key exchange scheme for near field communication,” in Proc. IEEE [28] M. Ylianttila et al., “6G white paper: Research challenges for trust,
Wireless Commun. Netw. Conf. (WCNC), 2014, pp. 428–433. security and privacy,” 2020. [Online]. Available: arXiv:2004.11665.
[71] X. Jiang, M. Wen, H. Hai, J. Li, and S. Kim, “Secrecy-enhancing [78] N. Su, E. Panayirci, H. V. Poor, and M. Koca, “Spatial con-
scheme for spatial modulation,” IEEE Commun. Lett., vol. 22, no. 3, stellation design based generalized space shift keying for physical
pp. 550–553, Mar. 2018. layer security of multi-user MIMO communication system,” IEEE
[72] N. Valliappan, A. Lozano, and R. W. Heath, “Antenna subset modula- Wireless Commun. Lett., vol. 10, no. 8, pp. 1785–1789, Aug. 2021,
tion for secure millimeter-wave wireless communication,” IEEE Trans. doi: 10.1109/LWC.2021.3079875.
Commun., vol. 61, no. 8, pp. 3231–3245, Aug. 2013. [79] G. Pan, J. Ye, and Z. Ding, “Secure hybrid VLC-RF systems with
[73] F. Wang et al., “Secrecy analysis of generalized space-shift key- light energy harvesting,” IEEE Trans. Commun., vol. 65, no. 10,
ing aided visible light communication,” IEEE Access, vol. 6, pp. 4348–4359, Oct. 2017.
pp. 18310–18324, 2018. [80] L. Li, Y. Zhang, B. Fan, and H. Tian, “Mobility-aware load balancing
[74] J. Wang, H. Ge, M. Lin, J. Wang, J. Dai, and M. Alouini, “On the scheme in hybrid VLC-LTE networks,” IEEE Commun. Lett., vol. 20,
secrecy rate of spatial modulation-based indoor visible light communi- no. 11, pp. 2276–2279, Nov. 2016.
cations,” IEEE J. Sel. Areas Commun., vol. 37, no. 9, pp. 2087–2101, [81] M. Kashef, M. Abdallah, and N. Al-Dhahir, “Transmit power
Sep. 2019. optimization for a hybrid PLC/VLC/RF communication system,”
[75] F. Shu, Z. Wang, R. Chen, Y. Wu, and J. Wang, “Two high- IEEE Trans. Green Commun. Netw., vol. 2, no. 1, pp. 234–245,
performance schemes of transmit antenna selection for secure spatial Mar. 2018.
modulation,”IEEE Trans. Veh. Technol., vol. 67, no. 9, pp. 8969–8973, [82] J. Al-khori, G. Nauryzbayev, M. Abdallah, and M. Hamdi, “Physical
Sep. 2018. layer security for hybrid RF/VLC DF relaying systems,” in Proc. IEEE
[76] A. A. Purwita, M. D. Soltani, M. Safari, and H. Haas, “Handover 88th Veh. Technol. Conf. (VTC-Fall), Aug. 2018, pp. 1–6.
probability of hybrid LiFi/RF-based networks with randomly-oriented [83] M. A. Arfaoui et al., “Physical layer security for visible light commu-
devices,” in Proc. IEEE 87th Veh. Technol. Conf. (VTC Spring), Porto, nication systems: A survey,” IEEE Commun. Surveys Tuts., vol. 22,
Portugal, Jun. 2018, pp. 1–5. no. 3, pp. 1887–1908, 3rd Quart., 2020.
[77] E. Panayirci, “Optical index-coded space shift keying [84] Z. Chen and H. Haas, “Physical layer security for optical attocell
(IC/SSK),” IEEE Commun. Lett., early access, May 25, 2021, networks,” in Proc. IEEE Int. Conf. Commun. (ICC), 2017, pp. 1–6.
doi: 10.1109/LCOMM.2021.3082866.