Recently, the proposed Cybertwin-driven 6G network architecture has attracted attentions from academia, which can support the communication anchor, security agent and other functions for physical devices. Especially, Cybertwin can provide… Click to show full abstract
Recently, the proposed Cybertwin-driven 6G network architecture has attracted attentions from academia, which can support the communication anchor, security agent and other functions for physical devices. Especially, Cybertwin can provide promising Vehicle-to-Everything (V2X) applications in future. However, security and privacy of Cybertwin still face various threats and challenges, which may impact future deployments for Cybertwin-driven 6G V2X. In this paper, we first introduce the architecture and promising applications of Cybertwin-driven 6G V2X. Then, we analyze essential data security and privacy preservation requirements for Cybertwin-driven 6G V2X. Particularly, we present the security reference architecture of Cybertwin-driven 6G V2X. As a case study, we investigate the migration of Cybertwin caused by vehicle mobility, and propose a handover authentication scheme to create new Cybertwin between vehicle and edge server based on proxy ring signature technique. Finally, we discuss several open research directions for achieving more secure Cybertwin-driven 6G V2X.
               
Click one of the above tabs to view related content.