In a more sinister scenario, an active attack leveraging metasurfaces involves an attacker sending fake data to a user while surreptitiously monitoring the connection. Through metasurfaces, attackers can amplify the rate at which fake data is transmitted, effectively weakening the legitimacy of the connection. The insidious nature of these attacks lies in their ability to remain undetected.
Lianlin Li, Vincenzo Galdi, and Tie Jun Cui, the researchers behind the study, emphasize the urgency of addressing these security concerns as programmable metasurfaces become integral to the development of 6G technology. The 6G rollout, anticipated around 2030, necessitates a proactive approach to safeguarding these networks against potential threats.