IEEE Access (Jan 2024)

Security of 6G-Enabled Vehicle-to-Everything Communication in Emerging Federated Learning and Blockchain Technologies

  • Myoungsu Kim,
  • Insu Oh,
  • Kangbin Yim,
  • Mahdi Sahlabadi,
  • Zarina Shukur

DOI
https://doi.org/10.1109/ACCESS.2023.3348409
Journal volume & issue
Vol. 12
pp. 33972 – 34001

Abstract

Read online

Sixth-generation (6G) communication is emerging as a seamless and massive connection of almost all digital devices. Vehicles, which are extensively linked with human mobility, must keep up with a certain technological pace to maintain compatibility with the 6G era. 6G is also expected to potentially revolutionize Vehicle-to-Everything (V2X) communication. However, this modernization will surface several security challenges in the complex heterogeneous architecture of V2X communication in 6G. Similarly, the expansion of V2X is expected to introduce its own unconventional security risks and vulnerabilities. Therefore, the current paper aims to provide an overview of the security challenges associated with and solutions for V2X communication in the upcoming 6G era to visualize the future of this research domain. This paper discusses the architecture and standards utilized in 6G-enabled V2X communications and provisions a comprehensive analysis of V2X security in the Confidentiality, Integrity, Availability, Authentication, and Access Control (CIA3) domains. Through this process, we analyze the impact of the emerging technological concepts of Blockchain and Federated Learning (FL) in 6G-enabled V2X communication. Therefore, we propose a Blockchain-enabled FL-based generic security architecture for V2X communication in 6G networks. Ultimately, this review highlights the key lessons that have been learned and the future research directions in the domain of security of V2X communications in the 6G including Privacy in 3D Fog Computing, Privacy in Augmented Reality, Secure Software Defined Networking (SDN), Physical Layer Security in the THz Spectrum, SUMO (Simulation of Urban MObility), and Intrusion Detection using AI.

Keywords