Understanding the Potential Privacy and Security Risks of 6G

6G: Speed vs. Security. The AI-driven future is rapidly expanding our attack surface. Is your organisation ready for the inevitable risk?

6G technology promises untold transformative capabilities. It’s projected to be over 100 times faster than 5G, with ultra-low latency and sophisticated, innovative AI-led applications, among others, which suggest industries worldwide will be on the brink of technological enhancement before long.

However, even as 6G is attracting a wealth of influence and investment (with the global market expected to reach nearly $11.4 billion by 2030), the security and privacy implications can and should not be overlooked. For all of its promise and potential with real-time data processing, automation, quantum communication, and more, there exists a wealth of severe and potentially irreparably damaging security threats from cyber attacks and data breaches to widespread network and infrastructure vulnerabilities. Cybercrime is, based on current predictions, expected to cost the world $15.63 trillion by 2029, which is far outpacing the amount of investment this groundbreaking technology is attracting.

With that in mind, it’s prudent to break down some of the more pressing threats that individuals and organisations face as this technology becomes closer to intertwining every aspect of our personal and professional lives.

The Double-Edged Sword of Connectivity

The allure of 6G is rooted primarily in its potential to dramatically enhance operational capacity and productivity. It will be the sixth generation of wireless technology, with experts suggesting its arrival could be as soon as 2030, and this is even following many organisations’ usage of advanced 5G last year.

However, the salient point remains that more connected devices means that the collective attack surface of them all (and thus, those of their users) grows exponentially larger. As the Internet of Things evolves into the Internet of Everything, the volume of data traversing 6G networks will be, to be frank, unprecedented. As 6G deploys the powerful Terahertz (THz) frequencies in real-time data transfers, the signal wavelengths are shorter and spatial multiplexing becomes easier. In short, it will facilitate ‌simultaneous information transfer while decreasing response times.

Users and organisations are enticed by the value propositions of 6G carriers, who are promising faster and better mobile connectivity. Theoretically, large files would be downloaded in a matter of seconds, streaming in UltraHD and 4K would be seamless, high-bandwidth activities would be lag-free, and web browsing and video calls will be stable, clear, and not pixelated. Furthermore, augmented and virtual reality (AR/VR) will be seamless and functions that require instantaneous response times will be profoundly improved.

However, for organisations handling sensitive personally identifiable information (PII), health, financial or other sensitive data over 6G networks, their security posture must remain a priority. In recent years, cyber threats have proliferated to such a degree that everyday processes and activities have become potentially devastating exploitation opportunities. Cyber threats include distributed denial-of-service (DDoS) attacks, man-in-the-middle (MiTM) attacks, location tracking, and more, which look set to grow as a result of increased connectivity, and the use of untrusted endpoints.

Currently, attackers can use connected IoT devices to create large botnets and launch attacks on target networks or sites, insert themselves into users’ data streams to eavesdrop on or intercept communications between client and user servers, and exploit certain parts on 5G connections (the standards of which are not promising end-to-end encryption network-wide), unveiling information about users’ devices.

This, coupled with the increased attention to financial cybercrime and authorised push payment fraud, suggests that users might be in volatile hands when relying solely on 5G connections. Basic activities like accessing bank accounts and sending or receiving funds may not be as secure when piggybacking off 5G or potentially 6G if end-to-end encryption isn’t promised. Even pension savings, which some sources have dubbed to be “major targets for fraudsters” in recent years, could be compromised if not adhering to the most stringent security protocols.

Types of Security and Privacy Threats Imposed by 6G

Network and Architecture

  • 6G is inherently decentralised, which introduces detection and risk mitigation challenges.
  • Hardware and software suppliers are vulnerable to 6G infrastructure exploitation if not properly secured.
  • AI is integral to 6G network management, but malicious actors can manipulate AI/ML algorithms to disrupt operations or create autonomous attack systems in real-time.
  • Quantum computing capabilities threaten to render current encryption methods obsolete, which is why post-quantum cryptography development is being spearheaded. The transition window is where data at rest is most vulnerable.
Data Privacy
  • 6G networks will process vast volumes of data, giving governments and organisations access to more personal information, which pose ethical and legal questions.
  • Data interception risks could intensify as hackers exploit vulnerable network nodes.
  • Identity theft and deepfake threats (powered predominantly by increased AI integration) create new categories of fraud and manipulation, posing organisational security and operational risks.
  • Global data breach costs now average $4.88 million per incident, and with 6G handling more data, these figures could surge upwards.

Supply Chain Vulnerabilities

  • The benefits of 6G in supply chain optimisation are abundantly clear (improved logistics, autonomous coordination, greater transparency etc.). But new attack vectors could emerge.
  • Cloud-based technologies such as route planning and dispatch, and real-time asset management and tracking, are inherently more efficient with 6G, but will require more human oversight to prevent disruption.
  • Legacy incumbent systems may prove incompatible with 6G security requirements, warranting possibly large-scale infrastructure upgrades, which certainly won’t always be cheap.

Geopolitical Uncertainty

  • According to the World Economic Forum, 93% of cybersecurity leaders predict that geopolitical instability will trigger a disastrous cyber event within the next two years.
  • Nation-state actors are weaponising digital infrastructure, and as such, state-sponsored attacks and supply chain compromises could become more common.

Building a 6G-Ready and Secure Defence

While the cyber threat landscape of 6G presents untold challenges, implementing security solutions at multiple layers of an organisation’s infrastructure will help mitigate them and ensure safer long-term adoption.

  • Advanced end-to-end 6G data encryption will ensure all data transmissions are encrypted from sender to receiver, reducing interception risks.
  • Post-quantum cryptography (PQC) will bolster the posture of quantum computing systems.
  • Decentralised blockchain authentication will minimise unauthorised data access and manipulation.
  • AI-powered systems must be equipped with real-time anomaly detection to identify and neutralise threats before they proliferate.
  • ML algorithms must be trained on legitimate data and countermeasures, which can, by extension, adapt to new attack methods.
  • Real-time threat detection with little to no human intervention will become vital, as resources can be saved and incidents can be kept from escalating.
  • Governments, tech companies and regulators must develop universal security standards for 6G, ethical AI usage, and threat intelligence sharing across borders.

6G holds genuine promise for advancing human capability and societal benefit. Yet enthusiasm must be tempered by a realism about the risks. The window to influence 6G standards and architecture is narrowing. Industry, academia, and policymakers must act decisively now to ensure that 6G becomes secure by default rather than a vehicle for unprecedented digital risk.