Researchers find worrying vulnerabilities in key 6G technology

6G
(Image credit: Shutterstock)

Hackers may be able to launch two novel types of attack by exploiting weaknesses in programmable metasurfaces – a technology that will become key in the rollout of 6G networks.

Programmable metasurfaces are electromagnetic surfaces designed to integrate into everyday objects like wallpaper or window glass and aim to optimize communication channels. 

This technology could become key to maximizing the potential of 6G in the future. Speeds are expected to be orders of magnitude faster than even some of the best 5G home broadband and wireless networks.

Metasurface attacks

But metasurfaces can also be exploited to launch attacks on wireless networks, according to researchers with Peking University, University of Sannio and Southeast University. Their paper, published in Nature Electronics, demonstrates two kinds of attacks – active and passive – with metasurfaces at the heart of both. 

"The open nature of wireless communication means that data and signals are essentially out in the open, making the risk of physical level attacks a major concern,” researchers Lianlin Li, Vincenzo Galdi, and Tie Jun Cui told Tech Xplore

“Our project focuses on identifying some potential risks associated with programmable metasurfaces—a key enabling technology in the envisioned 6G landscape."

In one scenario, a user can passively use a metasurface to spy on wireless interactions between two devices and interfere with the signal. By rapidly shifting the properties of a metasurface, they could disrupt the communication between a router and its user too, grinding down data transfer speeds.

An active attack, meanwhile, could see an attacker generate and send fake data to a user while eavesdropping on a connection. Exploiting metasurfaces, in this scenario, can ramp up the rate at which fake data is transmitted, while winding down the efficacy of the legitimate connection. This can all happen while the attacker remains hard to detect.

The researchers hope their work can inform the industry to incorporate protective cybersecurity measures into metasurfaces as they’re developed over the coming years, ahead of a likely 2030 launch date for 6G.

"Continuing our research, we are dedicated to shaping secure 6G networks, taking into account both the benefits and challenges associated with programmable metasurfaces," Li, Galdi, and Cui said. "Currently, we are focused on developing targeted defenses against physical-layer attacks, by exploiting strategies such as beamforming, cooperative jamming with artificial noise, index modulation, and adaptive modulation."

READ MORE

TOPICS
Keumars Afifi-Sabet
Channel Editor (Technology), Live Science

Keumars Afifi-Sabet is the Technology Editor for Live Science. He has written for a variety of publications including ITPro, The Week Digital and ComputerActive. He has worked as a technology journalist for more than five years, having previously held the role of features editor with ITPro. In his previous role, he oversaw the commissioning and publishing of long form in areas including AI, cyber security, cloud computing and digital transformation.

Read more
A representative abstraction of artificial intelligence
Researchers want to give some common sense to AI to turn it into artificial general intelligence
Global network connection 6G on hand business man.Global network connection 6G with icon concept, technology network wireless systems and internet of things, new technologies coming up in the future.
What is 6G and what does it mean for businesses?
Crowdstrike logo
Will Chinese cyberespionage be more aggressive in 2025? CrowdStrike thinks so
A graphic showing fleet tracking locations over a city.
From smart cities to streaming: 2025 wireless tech predictions
A VPN runs on a mobile phone placed on a laptop keyboard
Major new online tunneling vulnerability could put millions of devices at risk
China
Chinese hackers targeting Juniper Networks routers, so patch now
Latest in Pro
Isometric demonstrating multi-factor authentication using a mobile device.
NCSC gets influencers to sing the praises of 2FA
Sam Altman and OpenAI
OpenAI is upping its bug bounty rewards as security worries rise
Context Windows
Why are AI context windows important?
BERT
What is BERT, and why should we care?
A person holding out their hand with a digital AI symbol.
AI is booming — but are businesses seeing real impact?
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Dangerous new CoffeeLoader malware executes on your GPU to get past security tools
Latest in News
Nintendo Switch 2 Joy-Con up-close from app store
Nintendo's new app gave us another look at the Switch 2, and there's something different with the Joy-Con
cheap Nintendo Switch game deals sales
Nintendo didn't anticipate that Mario Kart 8 Deluxe was 'going to be the juggernaut' for the Nintendo Switch when it was ported to the console, according to former employees
Three angles of the Apple MacBook Air 15-inch M4 laptop above a desk
Apple MacBook Air 15-inch (M4) review roundup – should you buy Apple's new lightweight laptop?
Witchbrook
Witchbrook, the life-sim I've been waiting years for, finally has a release window and it's sooner than you think
Amazon Echo Smart Speaker
Amazon is experimenting with renaming Echo speakers to Alexa speakers, and it's about time
Shigeru Miyamoto presents Nintendo Today app
Nintendo Today smartphone app is out now on iOS and Android devices – and here's what it does