Western governments launch 6G security push to avoid 5G mistakes
#Security

Western governments launch 6G security push to avoid 5G mistakes

Privacy Reporter
4 min read

US, UK, and allies unveil 6G security principles at MWC to shape next-gen networks before vendor lock-in occurs, focusing on supply chain controls, quantum-resistant crypto, and AI integration risks.

Western governments have launched a coordinated effort to shape the security architecture of 6G mobile networks before they become commercially entrenched, unveiling a set of security and resilience principles at Mobile World Congress in Barcelona.

The Global Coalition on Telecoms, comprising the US, UK, Canada, Japan, Australia, Sweden, and Finland, introduced the 6G Security and Resilience Principles as a preemptive measure to avoid repeating the vendor dependency issues that plagued 5G deployments.

Early intervention strategy

The coalition's approach represents a significant shift from the reactive stance taken during the 5G era, when governments found themselves scrambling to unwind dependencies on vendors deemed high-risk after networks were already live. By intervening at the research and standardization phase, policymakers aim to embed security controls from the ground up.

"The security model can't simply be inherited from 4G and 5G," the coalition stated, emphasizing that 6G's expanded capabilities create new vulnerabilities that require fresh thinking. The principles target the broader attack surface introduced by disaggregated architectures, heavier software layers, embedded AI functions, and integrated sensing features.

Key security requirements

The principles call for several critical security enhancements:

  • Stronger authentication mechanisms to verify network components and users
  • Tighter data integrity and confidentiality controls to protect sensitive information
  • Network designs that contain breaches rather than allowing lateral movement across systems
  • Quantum-resistant cryptography to future-proof networks against emerging decryption capabilities

The quantum cryptography requirement reflects the coalition's long-term thinking, acknowledging that networks deployed in the 2030s will likely still be operational when current encryption standards become vulnerable to quantum computing attacks.

Industry response and AI integration concerns

Major industry players including Qualcomm, Nvidia, Ericsson, Nokia, Samsung, BT, and Vodafone have voiced support for the principles, though their endorsement comes amid aggressive marketing of 6G as "AI-native" from the outset. This positioning creates an inherent tension between innovation and security.

Just days before the security principles announcement, Qualcomm and Nvidia were touting plans to build next-generation wireless networks around tightly integrated AI and software-defined platforms. The coalition's timing suggests awareness that "AI everywhere" also means "risk everywhere" - a reality that vendors may be downplaying in their marketing materials.

Voluntary framework with limited enforcement

Critically, the principles stop well short of binding commitments. There are no enforcement mechanisms, no new procurement rules, and no immediate penalties for vendors that choose to chart their own path. The coalition is essentially betting that coordinated messaging from major telecoms markets will influence standards bodies and commercial roadmaps through soft power rather than regulation.

This voluntary approach reflects the complex international nature of telecommunications standards development, where no single government can unilaterally dictate technical specifications. Instead, the coalition hopes to create a critical mass of aligned markets that will shape the direction of 6G development.

Timing advantage

The current timing provides a unique opportunity for intervention. Unlike 5G, where security concerns emerged only after significant infrastructure deployment, 6G exists primarily in research papers and standardization discussions. This early stage makes it easier for policymakers to influence technical direction before networks are locked in and retrofits become the only option.

The coalition's strategy acknowledges a fundamental truth about telecommunications infrastructure: once deployed, networks tend to remain in service for decades. The security decisions made today will have ramifications well into the 2040s and beyond.

Broader context

The 6G security push comes amid broader concerns about telecommunications supply chains and vendor dependencies. The 5G experience taught governments that security cannot be bolted on after deployment - it must be designed into the architecture from the beginning. With 6G promising even greater integration with critical infrastructure and AI systems, the stakes for getting security right are higher than ever.

As research continues and standards bodies begin formal work on 6G specifications, the coalition's principles will likely serve as a reference point for discussions about security requirements. Whether this early intervention will prove more effective than the reactive approach taken with 5G remains to be seen, but the attempt to learn from past mistakes represents a significant evolution in how governments approach telecommunications security.

Featured image

The challenge now is translating these high-level principles into concrete technical standards and implementation guidelines that can be adopted globally without stifling innovation or creating new forms of vendor lock-in under different names.

Comments

Loading comments...