Security, Privacy and System-Level Resillience of 6G End-to-End System: Hexa-X-II Perspective

📅 2026-02-11
📈 Citations: 1
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses the critical security, privacy, and resilience (SPR) challenges confronting end-to-end 6G systems, which demand systematic control mechanisms to counter emerging threats. Building upon the EU’s Hexa-X-II flagship initiative, this study pioneers an integrated SPR co-control strategy tailored to the 6G architecture, synergistically combining system-level security modeling, privacy-enhancing technologies, and resilience verification methodologies. The research designs and experimentally validates an end-to-end control framework, successfully identifying key SPR control points and establishing a reusable, verifiable evaluation infrastructure. These contributions provide foundational technical support for the standardization and trustworthy deployment of future 6G networks.

Technology Category

Application Category

📝 Abstract
The sixth generation (6G) of mobile networks are being developed to overcome limitations in previous generations and meet emerging user demands. As a European project, the Smart Networks and Services Joint Undertaking (SNS JU) 6G Flagship project Hexa-X-II has a leading role for developing technologies and anchoring 6G end-to-end system. This paper summarizes the security, privacy and resilient (SPR) controls identified by Hexa-X-II project and their validation frameworks.
Problem

Research questions and friction points this paper is trying to address.

6G
security
privacy
resilience
end-to-end system
Innovation

Methods, ideas, or system contributions that make the work stand out.

6G end-to-end system
security
privacy
system-level resilience
validation framework
🔎 Similar Papers
No similar papers found.
Pawani Porambage
Pawani Porambage
Senior Scientist (VTT Technical Research Centre Finland) and Docent (University of Oulu)
Network Security5G/6G Security
D
Diego Lopez
Telefonica I+D
A
Antonio Pastor
Telefonica I+D
Bin Han
Bin Han
University of Kaiserslautern-Landau (RPTU)
Wireless CommunicationMobile NetworksMECCyber-SecuritySignal Processing
José María Jorquera Valero
José María Jorquera Valero
Senior Researcher, Universidad de Murcia
CybersecurityTrust5G SecurityContinuous AuthenticationMachine Learning
Manuel Gil Pérez
Manuel Gil Pérez
Associate Professor, University of Murcia, Spain
SDN/NFVCybersecurityBotnetsSecurity and Trust5G Networks
N
Noelia Pérez Palma
Universidad de Murcia
Antonio Skarmeta
Antonio Skarmeta
Universidad de Murcia
P
Prajnamaya Dass
Barkhausen Institut gGmbH
Stefan Köpsell
Stefan Köpsell
TU Dresden
Privacy Enhancing Technologies
S
Sonika Ujjwal
Oy LM Ericsson Ab
J
Javier José Díaz Rivera
Centre Tecnològic de Telecomunicacions de Catalunya (CTTC/CERCA)
P
Pol Alemany
Centre Tecnològic de Telecomunicacions de Catalunya (CTTC/CERCA)
Raul Muñoz
Raul Muñoz
CTTC
control and service management architectures and protocolsSDN & NFVGMPLS & PCEoptical networks
J
Jafar Mohammadi
Nokia Solutions and Networks GmbH & Co KG
C
Chaitanya Aggarwal
Nokia Solutions and Networks GmbH & Co KG
B
Betul Guvenc Paltun
Ericsson Research Türkiye
F
Ferhat Karakoc
Ericsson Research Türkiye