Cybersecurity for tactical 6G networks: threats, architecture, and intelligence

dc.contributorAalto-yliopistofi
dc.contributorAalto Universityen
dc.contributor.authorSuomalainen, Janien_US
dc.contributor.authorAhmad, Ijazen_US
dc.contributor.authorShajan, Annetteen_US
dc.contributor.authorSavunen, Tapioen_US
dc.contributor.departmentDepartment of Information and Communications Engineeringen
dc.contributor.organizationVTT Technical Research Centre of Finlanden_US
dc.date.accessioned2024-09-04T06:33:50Z
dc.date.available2024-09-04T06:33:50Z
dc.date.issued2025-01en_US
dc.descriptionPublisher Copyright: © 2024 The Author(s)
dc.description.abstractEdge intelligence, network autonomy, broadband satellite connectivity, and other concepts for private 6G networks are enabling new applications for public safety authorities, e.g., for police and rescue personnel. Enriched situational awareness, group communications with high-quality video, large scale IoT, and remote control of vehicles and robots will become available in any location and situation. We analyze cybersecurity in intelligent tactical bubbles, i.e., in autonomous rapidly deployable mobile networks for public safety operations. Machine learning plays major roles in enabling these networks to be rapidly orchestrated for different operations and in securing these networks from emerging threats, but also in enlarging the threat landscape. We explore applicability of different threat and risk analysis methods for mission-critical networked applications. We present the results of a joint risk prioritization study. We survey security solutions and propose a security architecture, which is founded on the current standardization activities for terrestrial and non-terrestrial 6G and leverages the concepts of machine learning-based security to protect mission-critical assets at the edge of the network.en
dc.description.versionPeer revieweden
dc.format.extent17
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationSuomalainen, J, Ahmad, I, Shajan, A & Savunen, T 2025, 'Cybersecurity for tactical 6G networks: threats, architecture, and intelligence', Future Generation Computer Systems, vol. 162, 107500. https://doi.org/10.1016/j.future.2024.107500en
dc.identifier.doi10.1016/j.future.2024.107500en_US
dc.identifier.issn0167-739X
dc.identifier.issn1872-7115
dc.identifier.otherPURE UUID: 8bc7ac2a-f34e-4745-9e93-d355979fba7aen_US
dc.identifier.otherPURE ITEMURL: https://research.aalto.fi/en/publications/8bc7ac2a-f34e-4745-9e93-d355979fba7aen_US
dc.identifier.otherPURE LINK: http://www.scopus.com/inward/record.url?scp=85202165003&partnerID=8YFLogxK
dc.identifier.otherPURE FILEURL: https://research.aalto.fi/files/156572648/1-s2.0-S0167739X24004643-main.pdfen_US
dc.identifier.urihttps://aaltodoc.aalto.fi/handle/123456789/130621
dc.identifier.urnURN:NBN:fi:aalto-202409046183
dc.language.isoenen
dc.publisherElsevier
dc.relation.ispartofseriesFuture Generation Computer Systemsen
dc.relation.ispartofseriesVolume 162en
dc.rightsopenAccessen
dc.subject.keyword6Gen_US
dc.subject.keywordCybersecurityen_US
dc.subject.keywordEdge intelligenceen_US
dc.subject.keywordMission-critical communicationsen_US
dc.subject.keywordPublic safetyen_US
dc.subject.keywordRisk analysisen_US
dc.subject.keywordSecurityen_US
dc.subject.keywordSecurity solutionsen_US
dc.subject.keywordSurveyen_US
dc.subject.keywordTactical networken_US
dc.subject.keywordThreatsen_US
dc.titleCybersecurity for tactical 6G networks: threats, architecture, and intelligenceen
dc.typeA1 Alkuperäisartikkeli tieteellisessä aikakauslehdessäfi
dc.type.versionpublishedVersion

Files