Hexa-X: Trustworthy Networking Beyond 5G

Diego López, Carlos J. Bernardos, Bin Han, Cédric Morin, Antonio de la Oliva, Antonio Pastor, Cao-Thanh Phan, Pawani Porambage, Peter Schneider, Hans Dieter Schotten, Elif Ustundag Soykan, Emrah Tomur
2021 Zenodo  
Trustworthiness is one of the six main research challenges the HEXA-X project is committed to address to set the foundations of 6G networks. Security forms a basic foundation for all systematization of trust in connectivity, and security considerations must encompass all aspects of cybersecurity: resilience against attacks, preservation of privacy, and ethical, safe application of automation to network operations and applications. Security also depends on active management of threat surfaces,
more » ... cluding proactive measures such as threat prevention and protection as well as reactive measures such as attack discovery and mitigation. As network services consolidate as essential components in a growing number of application scenarios, their dependability and, equally important, the perception of such dependability as an achievable characteristic, becomes a key feature for network operators, service providers, application developers and, above all, end users. A realistic approach to this trustworthiness challenge must acknowledge that complete security is not achievable, and that all security measures comes with a cost inTrustworthiness is one of the six main research challenges the HEXA-X project is committed to address to set the foundations of 6G networks. Security forms a basic foundation for all systematization of trust in connectivity, and security considerations must encompass all aspects of cybersecurity: resilience against attacks, preservation of privacy, and ethical, safe application of automation to network operations and applications. Security also depends on active management of threat surfaces, including proactive measures such as threat prevention and protection as well as reactive measures such as attack discovery and mitigation. As network services consolidate as essential components in a growing number of application scenarios, their dependability and, equally important, the perception of such dependability as an achievable characteristic, becomes a key feature for network operators, service provider [...]
doi:10.5281/zenodo.5589577 fatcat:ug3vssr4y5akde3kumzomienai