Fundamental Research Challenges for Trust, Security and Privacy: where are we now and what needs to be done to have Trustworthy 6G
Wednesday 28 October 2020 at 5:00-6:30 PM (Helsinki, UTC/GMT +02:00, CET +01:00)
As part of the 6G Research Visions Webinar Series, this webinar will address the fundamental research challenges for trust, security and privacy: where are we now and what needs to be done to have Trustworthy 6G. What is needed from specific security mechanisms, architecture, standardization and legal framework when moving towards 6G. These topics are discussed and introduced from several viewpoints.
The webinar is moderated by associate prof. Mika Ylianttila, who led the Expert Group that prepared the White Paper on Trust, Security and Privacy.
Expert Group representatives, presenting some of the group’s key discoveries, include Raimo Kantola (Aalto): Embedding Trust into the Network, Andrei Gurtov: Security from network architecture perspective in 6G, Kimmo Halunen (VTT, Finland): Post-quantum cryptography: challenges and standardization Lorenzo Mucchi (Italy): Physical layer security in 6G and Juha Röning (University of Oulu, Finland): Software security and testing: learnings from 5G cybersecurity hackathon.
After the talks, a minimum of 30 minutes is reserved for discussion on the path towards trustworthy 6G. A recorded video of the webinar will be openly available after the event.
Mika Ylianttila (M. Sc, Dr.Sc, eMBA) is a full-time associate professor (tenure track) at the Centre for Wireless Communications – Networks and Systems research unit, at the Faculty of Information Technology and Electrical Engineering (ITEE), University of Oulu, Finland, and he is the director of Communications Engineering Doctoral Degree Program. He leads NSOFT (Network security and softwarization) team which studies and develops secure, scalable and resource-efficient techniques for 5G and beyond 5G and IoT systems. His research focuses on network security in 5G and beyond, IoT and software-defined networking. He has co-authored more than 180 international peer-reviewed articles. He is a Senior Member of IEEE, editor in Wireless Networks and associate editor in IEEE Transactions on Information Forensics and Security.
Raimo Kantola is a full tenured professor at Aalto University, Finland. After some 15 years in the industry, he joined Helsinki University of Technology in 1996 and was tenured in 2006. He has held many positions at the University that is now called Aalto University including pioneering of international education and being the first Chairman of the Department of Communications and Networking at Aalto. His current research is on trust, security, privacy, application of distributed ledger technology for different use cases and Software Defined Networking in particular in the 5G/ 6G context. He has led the group that created the experimental Customer Edge Switching architecture that pioneers the idea of trust networking.
Andrei Gurtov is a Professor of Computer Science at Linköping University, Sweden. Previously he was at University of Oulu (3 years) and Aalto University (6 years) and visiting the International Computer Science Institute at Berkeley multiple times. He received his M.Sc (2000) and Ph.D. (2004) degrees in Computer Science from the University of Helsinki, Finland. Prof. Gurtov co-authored over 200 publications, including 4 books, 5 IETF RFCs, 6 patents, over 60 journal and 110 conference articles. He supervised 15 PhD theses. Professor Gurtov’s research interests are in network protocols, security of vehicular, airborne, industrial systems, mobile, wireless and IoT networks, SmartGrids. He is an ACM Distinguished Scientist, IEEE ComSoc Distinguished Lecturer and Vice-chair of IEEE Sweden section. He received best paper awards at IEEE CSCN’17 and IEEE Globecom’11, was co-adviser of the best Doctoral Thesis in CS in Finland in 2017. He had served on numerous journal editorial boards and conference program committees, including IEEE Internet of Things journal, MDPI Sensors, IEEE ICNP, ACM MSWiM, and IFIP Networking.
D. Sc. (Tech.) Kimmo Halunen is a Senior Scientist at the VTT Technical Research Centre of Finland in Oulu and Adjunct Professor at the University of Oulu. He has obtained his D. Sc. (Tech.) in computer engineering on hash function security in 2012 and has over 20 publications related to security, cryptography and blockchain technology in refereed conferences and journals.In the course of his research he has contributed to several national and international projects as a researcher and as an expert of information security and cryptography in a commercialization project in authentication. He leads a project on measuring the security of cryptographic primitives in the Finnish Defense Forces research program and has been leading cybersecurity growth initiatives at VTT from 2014 onwards.
Lorenzo Mucchi (M’98-SM’12) is an Associate Professor at the University of Florence, Italy. His research interests involve theory and experimentation of wireless systems and networks including physical-layer security, visible light communications, ultra-wideband techniques, body area networks, and interference management. Dr. Mucchi is serving as an associate editor of IEEE Communications Letter and IEEE Access, and he has been Editor-in-Chief for Elsevier Academic Press. He is a member of the European Telecommunications Standard Institute (ETSI) Smart Body Area Network (SmartBAN) group (2013), in which he is team leader of the work item on Security.
Juha Röning (M. Sc, Dr.Sc) is Professor of Embedded System at the University of Oulu. He serves also as Visiting Professor of Tianjin University of Technology, P. R. China. He is principal investigator of the Biomimetics and Intelligent Systems Group (BISG). In 1985 he received Asla/Fullbright scholarship. From 1985 to 1986 he was a visiting research scientist in the Center for Robotic Research at the University of Cincinnati. From1986 to1989 he held a Young Researcher Position in the Finnish Academy. In 2000 he was nominated as Fellow of SPIE. He has three patents and has published more than 300 papers in the areas of computer vision, robotics, intelligent signal analysis, and software security. He is currently serving as a Board of Director for euRobotics aisbl. He is also a steering board member of ARTMIS-IA.
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary, spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses fundamental research challenges in three key areas – trust, security and privacy.
Trust: Under the current “open internet” regulation, the telco cloud can be used for trust services only equally for all users. The future 6G network must support embedded trust for increased level of information security in 6G. Trust modeling, trust policies and trust mechanisms need to be defined. 6G interlinks physical and digital worlds making safety dependent on information security. Therefore, we need a trustworthy 6G.
Security: In the 6G era, the dependence of the economy and societies on IT and networks will deepen. Their role in national and international security keeps rising as a continuation of what we see in 5G. The development towards cloud and edge native infrastructures is expected to continue in 6G networks, and we need holistic 6G network security architecture planning. Security automation, on the other hand, opens new questions. Machine learning can be used to make safer systems, but it also enables increasingly dangerous attacks. Physical layer security techniques can also represent efficient solutions for securing less investigated network segments as a first line of defense.
Privacy: There is currently no means to unambiguously determine when linked, deidentified datasets cross the threshold of becoming personally identifiable. This is a major, unaddressed problem for many digital technologies in different sectors. Courts in different parts of the world are making decisions about whether privacy is being infringed without formal measures of the level of personal information, while companies are seeking new ways to exploit private data to create new business revenues. As solution alternatives, we may consider blockchain, distributed ledger technologies and differential privacy approaches.