From Security-Enhanced 5G Systems to Security-By-Design 6G Systems – Rakuten Symphony
In this white paper, Dr David Soldani explores the differences between security and privacy integration in 5G and 6G, outlining how the two generations differ and also makes some practical recommendations for how to pursue the development of secure telecoms today.
Towards Dependable 6G Networks – TechRxiv
6G communication networks must be highly dependable. We take four dependability concepts such as reliability, availability, safety and security, and discuss the dependability of 6G networks. This
article, in summary, provides interesting insights into existing
challenges and advocates future research through highlighting
the most important research directions to make 6G dependable.
Securing ArtificiaI Intelligence (SAI); The role of hardware in security of AI – ETSI
ETSI’s newly published report gives an overview of the roles of general-purpose and specialized hardware, such as neural processors and neural networks, in enabling the security of AI. The report identifies hardware vulnerabilities and common weaknesses in AI systems and outlines the mitigations available in hardware to prevent attacks, as well as the general requirements on hardware to support the security of AI (SAI).
6G Fundamentals: Vision and Enabling Technologies – David Soldani
This research article, published in the “Journal of Telecommunications and the Digital Economy”, covers off some of the key elements for 6G’s development, including elements such as security by design.
ETSI – MEC Security White Paper: Status of Standards Support & Future Evolutions
This White Paper, the very first initiative in this domain, aims to identify aspects of security where the nature of edge computing leaves typical industry approaches to cloud security insufficient.
Edge computing environments are characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment and both HW and SW devices. Given this overall level of system heterogeneity, security, trust and privacy are key topics for the edge environments.
In this heterogeneous scenario, end-to-end MEC security considers the impact on the elements coming from all stakeholders involved in the system. The paper provides an overview of ETSI MEC standards and current support for security, also complemented by a description of other relevant standards in the domain (e.g. ETSI TC CYBER, ETSI ISG NFV, 3GPP SA3) and cybersecurity regulation potentially applicable to edge computing. The White Paper concludes on a general perspective of future evolutions and standard directions on MEC security.