Cybersecurity for tactical 6G networks: threats, architecture, and intelligence

Jani Suomalainen*, Ijaz Ahmad, Annette Shajan, Tapio Savunen

*Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

18 Downloads (Pure)

Abstract

Edge intelligence, network autonomy, broadband satellite connectivity, and other concepts for private 6G networks are enabling new applications for public safety authorities, e.g., for police and rescue personnel. Enriched situational awareness, group communications with high-quality video, large scale IoT, and remote control of vehicles and robots will become available in any location and situation. We analyze cybersecurity in intelligent tactical bubbles, i.e., in autonomous rapidly deployable mobile networks for public safety operations. Machine learning plays major roles in enabling these networks to be rapidly orchestrated for different operations and in securing these networks from emerging threats, but also in enlarging the threat landscape. We explore applicability of different threat and risk analysis methods for mission-critical networked applications. We present the results of a joint risk prioritization study. We survey security solutions and propose a security architecture, which is founded on the current standardization activities for terrestrial and non-terrestrial 6G and leverages the concepts of machine learning-based security to protect mission-critical assets at the edge of the network.

Original languageEnglish
Article number107500
Number of pages17
JournalFuture Generation Computer Systems
Volume162
DOIs
Publication statusPublished - Jan 2025
MoE publication typeA1 Journal article-refereed

Keywords

  • 6G
  • Cybersecurity
  • Edge intelligence
  • Mission-critical communications
  • Public safety
  • Risk analysis
  • Security
  • Security solutions
  • Survey
  • Tactical network
  • Threats

Fingerprint

Dive into the research topics of 'Cybersecurity for tactical 6G networks: threats, architecture, and intelligence'. Together they form a unique fingerprint.

Cite this