6G Research Visions Webinar Series: Fundamental Research Challenges for Trust, Security and Privacy: where are we now and what needs to be done to have Trustworthy 6G

Wednesday, October 28, 2020

Wednesday 28 October 2020 at 5:00-6:30 PM (Helsinki, UTC/GMT +02:00, CET +01:00)

Join the webinar series highlighting the insights of the new 6G White Papers written by international Expert Groups!

As part of the 6G Research Visions Webinar Series, this webinar will address the fundamental research challenges for trust, security and privacy: where are we now and what needs to be done to have Trustworthy 6G. What is needed from specific security mechanisms, architecture, standardization and legal framework when moving towards 6G. These topics are discussed and introduced from several viewpoints.

The webinar is moderated by associate prof. Mika Ylianttila, who led the Expert Group that prepared the White Paper on Trust, Security and Privacy.

Speakers:

Raimo Kantola, Aalto University, Finland: Embedding Trust into the Network
Andrei Gurtov, Linköping University, Sweden: Security from network architecture perspective in 6G
Kimmo Halunen, VTT, Finland: Post-quantum cryptography: challenges and standardization
Lorenzo Mucchi, University of Florence, Italy: Physical layer security in 6G
Juha Röning, University of Oulu, Finland: Software security and testing: learnings from 5G cybersecurity hackathon

After the talks, a minimum of 30 minutes is reserved for discussion on the path towards trustworthy 6G. A recorded video of the webinar will be openly available after the event.

Registration:

The webinar series and individual webinars are free of charge and open to all experts and students interested in 6G research and development.  

Please register for the webinar at the latest on 27 October 2020. Registered participants will receive access information for Zoom via email.

Organizers:

The webinar series is organized by the Finnish 6G Flagship program and representatives of the 6G White Paper Expert Group. For more information please contact us via 6gflagship@oulu.fi.

Highlights of the 6G White Paper: Research Challenges for Trust, Security and Privacy:

The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary, spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses fundamental research challenges in three key areas – trust, security and privacy.

Trust: Under the current “open internet” regulation, the telco cloud can be used for trust services only equally for all users. The future 6G network must support embedded trust for increased level of information security in 6G. Trust modeling, trust policies and trust mechanisms need to be defined. 6G interlinks physical and digital worlds making safety dependent on information security. Therefore, we need a trustworthy 6G.

Security: In the 6G era, the dependence of the economy and societies on IT and networks will deepen. Their role in national and international security keeps rising as a continuation of what we see in 5G. The development towards cloud and edge native infrastructures is expected to continue in 6G networks, and we need holistic 6G network security architecture planning. Security automation, on the other hand, opens new questions. Machine learning can be used to make safer systems, but it also enables increasingly dangerous attacks. Physical layer security techniques can also represent efficient solutions for securing less investigated network segments as a first line of defense.

Privacy: There is currently no means to unambiguously determine when linked, deidentified datasets cross the threshold of becoming personally identifiable. This is a major, unaddressed problem for many digital technologies in different sectors. Courts in different parts of the world are making decisions about whether privacy is being infringed without formal measures of the level of personal information, while companies are seeking new ways to exploit private data to create new business revenues. As solution alternatives, we may consider blockchain, distributed ledger technologies and differential privacy approaches.

Add to calendar

Event location

Zoom Webinar

Back to events

Last updated: 27.10.2020