TY - GEN
T1 - An Overview of Security and Privacy Threats for Massive IoT Applications in the 6G Era
AU - Papaioannou, Maria
AU - Mantas, Georgios
AU - Rodriguez, Jonathan
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2025/4/7
Y1 - 2025/4/7
N2 - In recent years, global efforts have been directed toward defining the vision and research priorities for 6G mobile networks, expected to exceed the performance of 5G networks and effectively accommodate Internet of Everything (IoE) applications. Specifically, 6G networks are predicted to fulfill the demanding performance needs of emerging disruptive massive IoT applications that are beyond the capabilities of 5G due to its intrinsic constraints. Slated to be commercially available starting in 2030, 6G is set to support a wider array of applications by connecting hundreds of billions of IoT devices. However, the swift proliferation of 6G-enabled IoT devices and their escalating interconnections are likely to amplify the vulnerabilities in 6G-enabled massive IoT applications, leading to greater security and privacy concerns. Consequently, this paper provides a synopsis of the massive IoT applications projected for the 6G era that will enhance human life and outlines the potential security and privacy threats they face. The goal is to highlight critical security challenges that must be addressed to ensure that 6G-enabled massive IoT applications gain the trust of all key stakeholders and achieve their full potential.
AB - In recent years, global efforts have been directed toward defining the vision and research priorities for 6G mobile networks, expected to exceed the performance of 5G networks and effectively accommodate Internet of Everything (IoE) applications. Specifically, 6G networks are predicted to fulfill the demanding performance needs of emerging disruptive massive IoT applications that are beyond the capabilities of 5G due to its intrinsic constraints. Slated to be commercially available starting in 2030, 6G is set to support a wider array of applications by connecting hundreds of billions of IoT devices. However, the swift proliferation of 6G-enabled IoT devices and their escalating interconnections are likely to amplify the vulnerabilities in 6G-enabled massive IoT applications, leading to greater security and privacy concerns. Consequently, this paper provides a synopsis of the massive IoT applications projected for the 6G era that will enhance human life and outlines the potential security and privacy threats they face. The goal is to highlight critical security challenges that must be addressed to ensure that 6G-enabled massive IoT applications gain the trust of all key stakeholders and achieve their full potential.
KW - 6G
KW - 6G vision
KW - massive IoT applications
KW - security threats
U2 - 10.1109/CAMAD62243.2024.10942897
DO - 10.1109/CAMAD62243.2024.10942897
M3 - Conference contribution
AN - SCOPUS:105002833949
T3 - IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD
BT - 2024 IEEE 29th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2024
PB - Institute of Electrical and Electronics Engineers
T2 - 29th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2024
Y2 - 21 October 2024 through 23 October 2024
ER -