Malicious Reconfigurable Intelligent Surfaces: Security Threats in 6G Networks

  • Waqas Khalid
  • , Trinh Van Chien
  • , Wali Ullah Khan
  • , Zeeshan Kaleem
  • , Yousaf Bin Zikria
  • , Taejoon Kim
  • , Heejung Yu

Research output: Journal PublicationArticlepeer-review

2 Citations (Scopus)

Abstract

Reconfigurable intelligent surfaces (RISs) are emerging as a transformative technology for sixth-generation (6G) wireless networks. They enable dynamic manipulation of the propagation environment to enhance signal coverage, mitigate interference, and improve spectral and energy efficiencies. However, this flexibility introduces significant security vulnerabilities when RISs are maliciously controlled. This study explores the threats posed by such RISs, focusing on their potential to compromise the security and integrity of 6G networks. From an adversarial perspective, we analyze key attack vectors, including sophisticated jamming attacks that disrupt communication, eavesdropping attacks that intercept communications, and pilot contamination attacks that impair channel estimation accuracy, all contributing to severe performance degradation. For each attack, we detail the underlying mechanisms and adversarial optimization strategies designed to maximize impact. A case study quantifies the practical effects of these malicious RIS-based attacks in a simulated 6G network scenario. This research emphasizes the critical need for robust defense mechanisms and proposes essential research directions to address the evolving threats from malicious RISs, ensuring the security of 6G networks.

Original languageEnglish
Pages (from-to)30063-30085
Number of pages23
JournalIEEE Internet of Things Journal
Volume12
Issue number15
DOIs
Publication statusPublished - 2025
Externally publishedYes

Free Keywords

  • Eavesdropping attacks
  • jamming attacks
  • malicious reconfigurable intelligent surface (RIS)
  • pilot contamination attacks (PCA)
  • sixth-generation (6G)

ASJC Scopus subject areas

  • Signal Processing
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Malicious Reconfigurable Intelligent Surfaces: Security Threats in 6G Networks'. Together they form a unique fingerprint.

Cite this