Article (Scientific journals)
Malicious Reconfigurable Intelligent Surfaces: Security Threats in 6G Networks
Khalid, Waqas; Van Chien, Trinh; KHAN, Wali Ullah et al.
2025In IEEE Internet of Things Journal, 12 (15), p. 30063 - 30085
Peer Reviewed verified by ORBi Dataset
 

Files


Full Text
Malicious_Reconfigurable_Intelligent_Surfaces_Security_Threats_in_6G_Networks.pdf
Publisher postprint (5.76 MB)
Download

All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
Eavesdropping attacks; jamming attacks; malicious reconfigurable intelligent surface (RIS); pilot contamination attacks (PCA); sixth-generation (6G); Jamming attacks; Malicious reconfigurable intelligent surface; Pilot contamination attack; Pilot contaminations; Propagation environment; Reconfigurable; Security threats; Signal coverage; Sixth-generation (6g); Signal Processing; Information Systems; Hardware and Architecture; Computer Science Applications; Computer Networks and Communications; Security; 6G mobile communication; Communication system security; Jamming; Interference; Reconfigurable intelligent surfaces; Eavesdropping; Optimization; Internet of Things; Contamination
Abstract :
[en] Reconfigurable intelligent surfaces (RISs) are emerging as a transformative technology for sixth-generation (6G) wireless networks. They enable dynamic manipulation of the propagation environment to enhance signal coverage, mitigate interference, and improve spectral and energy efficiencies. However, this flexibility introduces significant security vulnerabilities when RISs are maliciously controlled. This study explores the threats posed by such RISs, focusing on their potential to compromise the security and integrity of 6G networks. From an adversarial perspective, we analyze key attack vectors, including sophisticated jamming attacks that disrupt communication, eavesdropping attacks that intercept communications, and pilot contamination attacks that impair channel estimation accuracy, all contributing to severe performance degradation. For each attack, we detail the underlying mechanisms and adversarial optimization strategies designed to maximize impact. A case study quantifies the practical effects of these malicious RIS-based attacks in a simulated 6G network scenario. This research emphasizes the critical need for robust defense mechanisms and proposes essential research directions to address the evolving threats from malicious RISs, ensuring the security of 6G networks.
Disciplines :
Electrical & electronics engineering
Author, co-author :
Khalid, Waqas ;  Korea University, Institute of Industrial Technology, Sejong, South Korea
Van Chien, Trinh ;  Hanoi University of Science and Technology, School of Information and Communications Technology, Hanoi, Viet Nam
KHAN, Wali Ullah  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SigCom
Kaleem, Zeeshan ;  King Fahd University of Petroleum and Minerals, Department of Computer Engineering, Interdisciplinary Research Center for Smart Mobility and Logistics, Dhahran, Saudi Arabia
Zikria, Yousaf Bin ;  Institute of International Studies, Department of IT and Cyber Security, Sydney, Australia
Kim, Taejoon ;  Chungbuk National University, School of Information and Communication Engineering, Cheongju, South Korea
Yu, Heejung ;  Korea University, Department of Electronics and Information Engineering, Sejong, South Korea
External co-authors :
yes
Language :
English
Title :
Malicious Reconfigurable Intelligent Surfaces: Security Threats in 6G Networks
Publication date :
2025
Journal title :
IEEE Internet of Things Journal
eISSN :
2327-4662
Publisher :
Institute of Electrical and Electronics Engineers Inc.
Volume :
12
Issue :
15
Pages :
30063 - 30085
Peer reviewed :
Peer Reviewed verified by ORBi
Funders :
National Research Foundation of Korea (NRF) Grant funded by the Korea Government
Korea University
Funding text :
Received 4 March 2025; revised 25 April 2025; accepted 9 May 2025. Date of publication 15 May 2025; date of current version 25 July 2025. This work was supported in part by the National Research Foundation of Korea (NRF) Grant funded by the Korea Government (MSIT) under Grant RS-2025-00514779, and in part by the Korea University Grant. (Corresponding authors: Heejung Yu; Taejoon Kim.) Waqas Khalid is with the Institute of Industrial Technology, Korea University, Sejong 30019, Republic of Korea (e-mail: waqas283@korea.ac.kr; waqas283@gmail.com).
Available on ORBilu :
since 07 December 2025

Statistics


Number of views
7 (1 by Unilu)
Number of downloads
1 (0 by Unilu)

Scopus citations®
 
0
Scopus citations®
without self-citations
0
OpenCitations
 
0
OpenAlex citations
 
2
WoS citations
 
0

Bibliography


Similar publications



Contact ORBilu