On 6G and trustworthiness


Konferenz / Medium


Gerhard Paul Fettweis Holger Boche

Research Hub

Research Hub A: Kryptographie der Zukunft
Research Hub B: Eingebettete Sicherheit

Research Challenges

RC 2: Quantum-Resistant Cryptography
RC 5: Physical-Layer Security


The first two generations of cellular-1G/2G - enabled ubiquitous voice connectivity. 3G/4G enabled broadband Internet. Even generations introduced services for business customers, and odd generations democratized them for consumers. 5G is enabling network-controlled robotics and XR, the Tactile Internet for business verticals, and 6G will democratize this for consumers. One main avenue for achieving this is cost reduction. Another avenue is radio access with joint communications and sensing. New services are
envisioned, such as low-altitude air traffic control, detecting, for example, bird migration and adapting drone services accordingly. Not only data but physical and virtual objects will be controlled with 6G. This requires addressing trustworthiness of the system and its services at an unprecedented level.


Coding Theory
Complexity Theory
Information Theory
Implementation Attacks
Post-Quantum Cryptography