The race towards the sixth generation of mobile networks (6G), expected to roll out starting in 2030, not only opens new opportunities in connectivity and intelligent applications but also poses serious challenges regarding global cybersecurity. Governments, operators, and technology companies face a scenario where technological sophistication intertwines with increasing geopolitical fragmentation and more complex cyber threats.
An Unprecedented Technological Leap
6G networks promise transmission speeds up to 100 times faster than 5G, ultra-low latency (in the order of microseconds), and massive connectivity capacity that will enable a true expansion of the Internet of Things (IoT), distributed artificial intelligence, and real-time immersive experiences. We’re talking about holographic communications, remote control of critical infrastructure, and fully coordinated connected autonomous vehicles.
However, this evolution entails a significantly larger attack surface. As the density of devices, sensors, and interconnected nodes increases, so do the opportunities for malicious actors, both state and non-state, to compromise system security.
New Threats on the Horizon
Cybersecurity experts warn that 6G will bring risks that extend beyond traditional challenges. Potential threats include:
- Real-time data manipulation through attacks on AI embedded in the network.
- Intrusions into quantum or terahertz-based communications, technologies that are still immature from a protection standpoint.
- Vulnerabilities in the digital twin network, as many 6G infrastructures will rely on real-time simulations for critical decision-making.
- Attacks on distributed identity, with systems of authentication replacing static keys with biometric and contextual credentials becoming more popular.
One of the most disturbing risks is the remote control or sabotage of physical devices in real time, such as drones, industrial machinery, or autonomous vehicles, which could have devastating consequences.
Geopolitics and Technological Fragmentation
The transition to 6G also occurs within a context of growing geopolitical fragmentation. As China, the United States, South Korea, Japan, and the European Union compete to lead the standardization of 6G, each block is betting on its own standards, national consortia, and exclusive strategic alliances.
This lack of international consensus could lead to incompatible technological ecosystems, with different rules for security, encryption, and oversight. In practice, this may weaken global cooperation in the face of massive cyber incidents and complicate the creation of a truly interoperable security architecture.
Is the World Prepared for Cybersecurity in 6G?
The main challenge is not just technical but also organizational and strategic. According to a report from the European Union Agency for Cybersecurity (ENISA), “the success of the transition to 6G will depend on whether stakeholders can adopt a ‘secure by design’ approach, integrating cybersecurity from the outset of technology development.”
Some countries and companies are already taking steps in this direction:
- South Korea has announced that 6G will be a critical infrastructure monitored by its National Security Agency.
- The European Union is promoting the Hexa-X initiative, a public-private consortium focused on designing secure, resilient, and ethical 6G networks.
- Companies like Ericsson, Nokia, Huawei, and Qualcomm are investing in protection mechanisms based on machine learning and post-quantum cryptography to fortify future networks.
A New Paradigm: Defensive Artificial Intelligence and Autonomous Networks
In 6G networks, artificial intelligence will be natively integrated for the management, maintenance, and autonomous operation of infrastructure. This means that cyber defenses will also need to evolve.
A surge in defensive AI is expected, capable of identifying anomalous patterns, responding in real-time to incidents, and even anticipating attacks through predictive simulation. The so-called “cognitive networks” of 6G could, in theory, self-recover after a security breach without direct human intervention.
However, this presents a new dilemma: how to ensure that an AI responsible for defending a 6G network cannot be manipulated by an attacker? Trust in algorithms and training data will be key.
Conclusion: A Race of Innovation with Rules Yet to Be Written
Cybersecurity in the 6G era will not simply be an evolution of the current paradigm, but a radical transformation requiring new architectures, new global alliances, and a shared ethics.
As deployment approaches, it will be crucial for legal, technical, and operational frameworks to evolve at the same pace as technology. In this context, collaboration among governments, regulators, industry, and the research community will be essential.
6G will not only mark a new phase in connectivity but also in balancing digital freedom, privacy, national security, and technological sovereignty.
And cybersecurity will, more than ever, be the central axis of this new digital contract.