🤖 AI Summary
In future 6G networks, Integrated Sensing and Communication (ISAC) enables cyber-physical convergence but introduces novel security threats: adversaries can manipulate physical perception outcomes—e.g., via sensing eavesdropping or phantom signal injection—causing direct real-world harm, rendering conventional data-centric security paradigms ineffective. To address this, we propose a new “perception security” paradigm that transcends data protection, establishing a multi-layered defense framework spanning the physical, environmental, intelligent, and architectural layers. Key innovations include sensing eavesdropping detection, environment-aware perception consistency verification, and active defense against camouflaged physical signals. We systematically identify perception integrity risks across ISAC applications—including digital twin and autonomous driving—and develop standardized mitigation pathways and a trustworthy ecosystem blueprint. This work provides both theoretical foundations and a practical governance framework for global ISAC security.
📝 Abstract
Future G network's new reality is a widespread cyber-physical environment created by Integrated Sensing and Communication (ISAC). It is a crucial technology that transforms wireless connections into ubiquitous sensors. ISAC unlocks transformative new capabilities, powering autonomous systems, augmented human sensing, and next-generation immersive applications, such as digital twins. However, this new reality fundamentally reshapes the security landscape. The primary security concern shifts from the traditional focus on data protection to a new priority: safeguarding the integrity of the system's perception of physical reality itself. This perception can be perilously manipulated by sophisticated attacks such as sensing eavesdropping, phantom dangers, and invisible threats, potentially resulting in direct and catastrophic physical harm. Traditional security measures, such as signature-based detection, are insufficient to counter these perception-level threats that mimic genuine physical signals. A proactive, layered, defense-in-depth strategy is required, integrating physical, environmental, intelligence, and architectural security measures to build a trustworthy ecosystem. Additionally, realizing ISAC's potential responsibly also depends on parallel efforts in global standardization and strong governance to address the significant challenges of privacy, liability, and the technology's dual-use.