2
II. TRUSTWORTHY AND RESILIENT 6G AND THE
ROLE OF THE PHYSICAL LAYER
The sixth generation of wireless will interconnect
intelligent and autonomous cyberphysical systems, like
robots, drones, vehicles, platoons, etc. In this emerging
“fusion” of the digital and physical worlds, standard
authentication and access control schemes do not suf-
fice to build trust and evaluate the trustworthiness of
autonomous agents. In essence, building a trustworthy
and resilient 6G boils down to trusting:
1) The autonomous multi-agents;
2) Their sensing inputs (that drive their decisions);
3) The communication links between them;
4) The computations performed (including learning
and optimization);
Until recently, trust for the autonomous agents has
primarily focused on the trustworthiness and explainabil-
ity of the artificial intelligence algorithms that govern
them, e.g., using coalitional game theory tools such as
Shapley values, evidence theory, etc.[12]. At the same
time, reputation-based and crowd-vetting approaches
have been widely investigated, e.g., [13], [14].
A game changer in this area is that it has been recently
shown that anomalies in the behaviour of cyberphysical
agents can be actually inadvertently identified from be-
havioural aspects; first to be explored is naturally related
to agent positioning. As an example in [15], the angle of
arrival has been used to identify Sybil attacks in robotic
systems, while in the same direction range estimation
has been used in [11] to provide resilience against
more general impersonation attacks. This direction of
research, hinges to the potential incorporation of PLS-
based authentication approaches in trust measures for
autonomous agents in 6G. Opportunities to provide not
only high data rates, but also high-precision ranging and
localization to enhance trust need to be systematized by
our community.
With respect to trustworthy computation, a key as-
pect has to do with decentralization, e.g., blockchain
technologies, federated learning, crowd-sourcing, pri-
vate computation [16], [17], [18] and private infor-
mation retrieval are among the technologies currently
explored [19], in conjunction with isolation and com-
posability of hardware platforms. Up to now, evaluating
the trustworthiness of computation is a task perceived
to belong entirely to the digital domain. It remains
to be seen whether hardware monitoring will in the
future allow to identify untrustworthy computation and
importantly help recognise the existence of backdoors in
hardware originating from untrusted vendors.
Challenges also arise to securing the sensing layer
itself and rendering it resilient to denial of service and
man-in-the-middle attacks. Aspects related to distributed
anomaly detection in software defined wireless sensor
networks [20] have demonstrated that it is possible in
large scale IoT networks to monitor hardware behaviour
(memory usage, power consumption, Tx/Rx times, etc.)
to identify compromised or faulty sensors. Exploring fur-
ther aspects including passive and active attacks to sens-
ing, along with related privacy concerns is paramount
for a trustworthy 6G.
Finally, the links between autonomous cyberphysical
agents will be vital to determine their behaviour, e.g.,
in the case of platooning. To this end, unarguably, the
security protocols of fifth generation systems are a signif-
icant improvement with respect to LTE, resolving many,
albeit not all, open issues in older generations of wire-
less. In particular, securing wireless links under overly
aggressive latency constraints, scaling authentication and
key distribution to massive numbers to accommodate
massive Internet of things (IoT) while providing quan-
tum resistance for constrained devices, persist as open
challenges at present, despite recent standardization of
four post-quantum cryptographic algorithms from NIST.
To address all of these issues, PLS technologies emerge
as competitive alternatives or complementary schemes to
standard cryptography.
We have showcased that 6G trustworthiness needs to
include trust of the physical world and infrastructure
across the board. A glimpse towards some of the security
features that PLS can bring into the 6G world is given
in Fig. 1. The figure illustrates that physical aspects,
e.g., hardware, location, link, behavior, sensing, could
bring an additional (and important) asset of properties
that could help in ensuring trustworthiness in 6G. In the
following sections, we focus entirely on the trsutworthi-
ness of the communications links. In particular, delving
deeper in PLS, we provide an overview of the state-
of-the-art and explain how current limitations can be
overcome to fulfill the need, as well as the promise, for
security controls at all layers, including at the physical
layer, for the first time in 6G.
III. PLS - STATE-OF-THE-ART AND OPEN ISSUES
In this section, we will review only some of the key
contributions in the PLS literature. More importantly, we
will identify key open issues that should be addressed
before practical deployment.
A. Keyless transmission of confidential messages
The interest in PLS research is motivated by two pi-
oneering works by Shannon and Wyner who introduced