Towards Intelligent Context-Aware 6G Security

Imagine interconnected objects with embedded artificial intelligence (AI), empowered to sense the environment, see it, hear it, touch it, interact with it, and move. As future networks of intelligent objects come to life, tremendous new challenges arise for security, but also new opportunities, allowing to address current, as well as future, pressing needs. In this paper we put forward a roadmap towards the realization of a new security paradigm that we articulate as intelligent context-aware security. The premise of this roadmap is that sensing and advanced AI will enable context awareness, which in turn can drive intelligent security mechanisms, such as adaptation and automation of security controls. This concept not only provides immediate answers to burning open questions, in particular with respect to non-functional requirements, such as energy or latency constraints, heterogeneity of radio frequency (RF) technologies and long life span of deployed devices, but also, more importantly, offers a viable answer to scalability by allowing such constraints to be met even in massive connectivity regimes. Furthermore, the proposed roadmap has to be designed ethically, by explicitly placing privacy concerns at its core. The path towards this vision and some of the challenges along the way are discussed in this contribution.

[1]  Dinesh Manocha,et al.  Multimodal and Context-Aware Emotion Perception Model With Multiplicative Fusion , 2021, IEEE MultiMedia.

[2]  Suman Banerjee,et al.  ivPair: context-based fast intra-vehicle device pairing for secure wireless connectivity , 2020, WISEC.

[3]  Zaixiang Zheng,et al.  Improving Self-Attention Networks With Sequential Relations , 2020, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[4]  Frederik Vercauteren,et al.  Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM , 2018, IACR Cryptol. ePrint Arch..

[5]  Jonathan Goldstein,et al.  When Is ''Nearest Neighbor'' Meaningful? , 1999, ICDT.

[6]  André Bourdoux,et al.  Convergent Communication, Sensing and Localization in 6G Systems: An Overview of Technologies, Opportunities and Challenges , 2021, IEEE Access.

[7]  Anup Kumar,et al.  Quality-of-Protection (QoP): A Quantitative Methodology to Grade Security Services , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[8]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[9]  Nei Kato,et al.  GT-QoSec: A Game-Theoretic Joint Optimization of QoS and Security for Differentiated Services in Next Generation Heterogeneous Networks , 2017, IEEE Transactions on Wireless Communications.

[10]  Semantics-Empowered Communication for Networked Intelligent Systems , 2020, ArXiv.

[11]  Emiliano De Cristofaro An Overview of Privacy in Machine Learning , 2020, ArXiv.

[12]  Cynthia E. Irvine,et al.  Security as a dimension of quality of service in active service environments , 2001, Proceedings Third Annual International Workshop on Active Middleware Services.

[13]  Ananthram Swami,et al.  The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).