Towards a Security Plane for 6G Ecosystems
- URL: http://arxiv.org/abs/2512.20733v1
- Date: Tue, 23 Dec 2025 19:41:50 GMT
- Title: Towards a Security Plane for 6G Ecosystems
- Authors: Xavi Masip-Bruin, Eva RodrÃguez, Admela Jukan, Panos Trakadas,
- Abstract summary: 6G networks promise to support a wide deployment of highly demanding services.<n>There is no service to support if the network is not reliable enough.<n>Traditional security approaches have focused on providing specific and attack-tailored solutions.
- Score: 2.0893165682070416
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: 6G networks promise to be the proper technology to support a wide deployment of highly demanding services, satisfying key users-related aspects such as extremely high quality, and persistent communications. However, there is no service to support if the network is not reliable enough. In this direction, it is with no doubt that security guarantees become a must. Traditional security approaches have focused on providing specific and attack-tailored solutions that will not properly meet the uncertainties driven by a technology yet under development and showing an attack surface not completely identified either. In this positioning paper we propose a softwarized solution, defining a Security Plane built on a top of programmable and adaptable set of live Security Functions under a proactive strategy. In addition, in order to address the inaccuracies driven by the predictive models a pre-assessment scenario is also considered ensuring that no action will be deployed if not previously verified. Although more efforts are required to develop this initiative, we think that such a shift paradigm is the only way to face security provisioning challenges in 6G ecosystems.
Related papers
- ORCA -- An Automated Threat Analysis Pipeline for O-RAN Continuous Development [57.61878484176942]
Open-Radio Access Network (O-RAN) integrates numerous software components in a cloud-like deployment, opening the radio access network to previously unconsidered security threats.<n>Current vulnerability assessment practices often rely on manual, labor-intensive, and subjective investigations, leading to inconsistencies in the threat analysis.<n>We propose an automated pipeline that leverages Natural Language Processing (NLP) to minimize human intervention and associated biases.
arXiv Detail & Related papers (2026-01-20T07:31:59Z) - Advancing LLM-Based Security Automation with Customized Group Relative Policy Optimization for Zero-Touch Networks [56.2003512635877]
6G Zero-Touch Networks (ZTNs) represent a transformative paradigm toward fully automated and intelligent network management.<n>Security automation aims to enable intelligent security management across dynamic and complex environments.
arXiv Detail & Related papers (2025-12-10T10:04:11Z) - SAFER-D: A Self-Adaptive Security Framework for Distributed Computing Architectures [4.348518238715115]
The rise of the Internet of Things and Cyber-Physical Systems has introduced new challenges on ensuring secure and robust communication.<n>We present our holistic self-adaptive security framework which combines different adaptation strategies to create comprehensive and efficient defense mechanisms.
arXiv Detail & Related papers (2025-06-19T19:02:35Z) - Towards provable probabilistic safety for scalable embodied AI systems [79.31011047593492]
Embodied AI systems are increasingly prevalent across various applications.<n> Ensuring their safety in complex operating environments remains a major challenge.<n>This Perspective offers a pathway toward safer, large-scale adoption of embodied AI systems in safety-critical applications.
arXiv Detail & Related papers (2025-06-05T15:46:25Z) - LLM Agents Should Employ Security Principles [60.03651084139836]
This paper argues that the well-established design principles in information security should be employed when deploying Large Language Model (LLM) agents at scale.<n>We introduce AgentSandbox, a conceptual framework embedding these security principles to provide safeguards throughout an agent's life-cycle.
arXiv Detail & Related papers (2025-05-29T21:39:08Z) - Measuring Security in 5G and Future Networks [0.0]
Mobile networks, such as 5G and future generations such as 6G, play a pivotal role and must be considered as critical infrastructures.<n>We introduce a state machine model designed to capture the security life cycle of network functions.<n>We identify three essential security metrics -- attack surface exposure, impact of system vulnerabilities, and effectiveness of applied security controls.
arXiv Detail & Related papers (2025-05-09T04:24:17Z) - An LLM-based Self-Evolving Security Framework for 6G Space-Air-Ground Integrated Networks [49.605335601285496]
6G space-air-ground integrated networks (SAGINs) offer ubiquitous coverage for various mobile applications.<n>We propose a novel security framework for SAGINs based on Large Language Models (LLMs)<n>Our framework produces highly accurate security strategies that remain robust against a variety of unknown attacks.
arXiv Detail & Related papers (2025-05-06T04:14:13Z) - Bridging the Security Gap: Lessons from 5G and What 6G Should Do Better [1.3505077405741583]
This paper provides a set of security recommendations for 6G networks.<n>It focuses on access and handover procedures, which often lack encryption and integrity protection.<n>It concludes with actionable recommendations to enhance the security, resilience, and robustness of 6G access and handover mechanisms.
arXiv Detail & Related papers (2025-01-19T13:44:17Z) - ACRIC: Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
Recent security incidents in safety-critical industries exposed how the lack of proper message authentication enables attackers to inject malicious commands or alter system behavior.<n>These shortcomings have prompted new regulations that emphasize the pressing need to strengthen cybersecurity.<n>We introduce ACRIC, a message authentication solution to secure legacy industrial communications.
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - Penetration Testing of 5G Core Network Web Technologies [53.89039878885825]
We present the first security assessment of the 5G core from a web security perspective.
We use the STRIDE threat modeling approach to define a complete list of possible threat vectors and associated attacks.
Our analysis shows that all these cores are vulnerable to at least two of our identified attack vectors.
arXiv Detail & Related papers (2024-03-04T09:27:11Z) - Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach [4.552065156611815]
Unmanned Aerial Vehicles (UAVs) have evolved into indispensable tools for effectively managing disasters and responding to emergencies.
It is substantial to identify and consider the different security challenges in the research and development associated with advanced UAV-based B5G/6G architectures.
arXiv Detail & Related papers (2023-12-12T01:55:04Z) - Sustainable Adaptive Security [11.574868434725117]
We propose the notion of Sustainable Adaptive Security (SAS) which reflects enduring protection by augmenting adaptive security systems with the capability of mitigating newly discovered threats.
We use a smart home example to showcase how we can engineer the activities of the MAPE (Monitor, Analysis, Planning, and Execution) loop of systems satisfying sustainable adaptive security.
arXiv Detail & Related papers (2023-06-05T08:48:36Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.