Enhancing 6G Network Security with Elliptic Curve Cryptography


Authors : Jury O. Balgoon; Kulud H.Ma Chung; Latifah M.Alharthi

Volume/Issue : Volume 10 - 2025, Issue 7 - July


Google Scholar : https://tinyurl.com/ez6exvf7

Scribd : https://tinyurl.com/4p4a2fvc

DOI : https://doi.org/10.38124/ijisrt/25jul1664

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 30 to 40 days to display the article.


Abstract : With a rapid influx of endeavors into the sixth-generation (6G) wireless realm, network security is becoming of paramount importance. This work investigates strategies to couple Elliptic Curve Cryptography (ECC) with potentially reinforcing the existing 6G security architecture. ECC constitutes a highly secure and efficient key exchange and authentication mechanism, requiring much smaller keys for excellent-level encryption. With such properties, ECC fits very well in the resource-constrained environments envisioned with 6G, such as the Internet of Things (IoT) ecosystem and smart home applications. With the active consideration of performance, scalability, and lightweight communication security, ECC- based strategies will render the required protection against adversarial attacks in high-speed and high-density networks. The strengths of ECC in securing communication, protecting user data, and ensuring privacy in multiple 6G applications have been elucidated in this paper.

Keywords : 6G Security, 6G Protection, Anomaly Detection, Threat Forecasting.

References :

  1. C. de Alwis, A. Kalla, Q. V. Pham, P. Kumar, K. Dev, W. J. Hwang, and M. Liyanage, "Survey on 6G Frontiers: Trends, Applications, Requirements, Technologies, and Future Research," IEEE Open Journal of the Communications Society, pp. 1–1, 2021.
  2. G. Gui, M. Liu, F. Tang, N. Kato, and F. Adachi, "6G: Opening new horizons for integration of comfort, security, and intelligence," IEEE Wireless Communications, 2020.
  3. McKinsey&Company, The road to 5G: The inevitable growth of infrastructure cost, https://www.mckinsey.com/industries/technology-media and-telecommunications/our-insights/the-road-to-5g-the-inevitable-growth-of infrastructure-cost.
  4. Lionel Sujay Vailshery, Global IoT market size, https://www.statista.com/ statistics/976313/global-iot-market-size/.
  5. Nikolay Pankov, Protect networked IoT devices or protect the network from IoT devices? https://www.kaspersky.com/blog/rsa2021-dangerous-iot/40161/.
  6. El Sayed Amer, M.S.M., El Hefnawy, N., Mohamed Abdual-Kader, H. (2024). "Enhance Fog-Based E-learning System Security Using Elliptic Curve Cryptography (ECC) and SQL Database." International Conference on Innovative Computing and Communications. ICICC 2023. Lecture Notes in Networks and Systems, vol 731. Springer, Singapore. https://doi.org/10.1007/978-981-99-4071-4_34.
  7. Christos Tzagkarakis, Nikolaos Petroulakis, Sotiris Ioannidis, Botnet attack detection at the IoT edge based on sparse representation, in: 2019 Global IoT Summit, GIoTS, 2019, pp. 1–6, http://dx.doi.org/10.1109/GIOTS.2019.8766388.
  8. Ying Liu, Ting Zhi, Ming Shen, Lu Wang, Yikun Li, Ming Wan, Software-defined DDoS detection with information entropy analysis and optimized deep learning, Future Gener. Comput. Syst. 129 (2022) 99–114, http://dx.doi.org/10.1016/j. future.2021.11.009.
  9. Ulitzsch, V.Q.; Park, S.; Marzougui, S.; Seifert, J.-P. A Post-Quantum Secure Subscription Concealed Identifier for 6G. In Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, 16–19 May 2022; pp. 157–168.
  10. David Candal-Ventureira, Pablo Fondo-Ferreiro, Felipe Gil-Castiñeira, Fran cisco Castaño, Quarantining malicious IoT devices in intelligent sliced mobile networks, Sensors (Basel, Switzerland) 20 (2020) http://dx.doi.org/10.3390/ s20185054.
  11. W. H. Bussey (1910) "Tables of Galois fields of order < 1000", Bulletin of the American Mathematical Society 16(4): 188–206, doi:10.1090/S0002-9904-1910-01888-7.
  12. Mullen, Gary L.; Mummert, Carl (2007), Finite Fields and Applications I, Student Mathematical Library (AMS), ISBN 978-0-8218-4418-2.

With a rapid influx of endeavors into the sixth-generation (6G) wireless realm, network security is becoming of paramount importance. This work investigates strategies to couple Elliptic Curve Cryptography (ECC) with potentially reinforcing the existing 6G security architecture. ECC constitutes a highly secure and efficient key exchange and authentication mechanism, requiring much smaller keys for excellent-level encryption. With such properties, ECC fits very well in the resource-constrained environments envisioned with 6G, such as the Internet of Things (IoT) ecosystem and smart home applications. With the active consideration of performance, scalability, and lightweight communication security, ECC- based strategies will render the required protection against adversarial attacks in high-speed and high-density networks. The strengths of ECC in securing communication, protecting user data, and ensuring privacy in multiple 6G applications have been elucidated in this paper.

Keywords : 6G Security, 6G Protection, Anomaly Detection, Threat Forecasting.

CALL FOR PAPERS


Paper Submission Last Date
31 - December - 2025

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe