Foreword
Preface
0.1 Book Organization
Acknowledgments
Acronyms
1 Evolution of Mobile Networks
1.1 Introduction
1.2 6G Mobile Communication Networks
1.2.1 6G as Envisioned Today
1.3 Key Driving Trends Towards 6G
1.4 6G Requirements/Vision
1.4.1 6G Development Timeline
2 Key 6G Technologies
2.1 Radio Network Technologies
2.1.1 Beyond sub 6 GHz towards THz Communication
2.1.2 Non-Terrestrial Networks Towards 3D Networking
2.2 AI/ML/FL
2.3 DLT/Blockchain
2.4 Edge Computing
2.5 Quantum Communication
2.6 Other New Technologies
2.6.1 Visible Light Communications
2.6.2 Large Intelligent Surfaces
2.6.3 Compressive Sensing
2.6.4 Zero-touch network and Service Management
2.6.5 Efficient Energy Transfer and Harvesting
3 6G Security Vision
3.1 Overview of 6G Security Vision
3.1.1 New 6G Requirements
3.2 6G Security Vision and KPIs
3.2.1 Security Threat Landscape for 6G Architecture
4 6G Device Security
4.1 Overview of 6G devices
4.2 6G Device Security Challenges
4.2.1 Growth of Data Collection
4.2.2 Cloud Connectivity
4.2.3 Device Capacity
4.2.4 Ultra Saturated Devices
4.3 Addressing Device Security in 6G
5 Open RAN and RAN-Core convergence
5.1 Introduction
5.2 Open RAN Architecture
5.3 Threat Vectors and Security Risks Associated with Open RAN
5.3.1 Threat Taxonomy
5.3.2 Risks related to the Process
5.3.3 Risks related to the Technology
5.3.4 Global Risks
5.4 Security Benefits of Open RAN
5.4.1 Open RAN specific
5.4.2 V-RAN specific
5.4.3 5G networks Related
5.5 Conclusion
6 Edge intelligence
6.1 Overview of edge intelligence
6.2 State-of-the-art related to 5G
6.2.1 Denial of Service (DOS)
6.2.2 Man-in-the-Middle (MitM) Attack
6.2.3 Privacy leakage
6.3 State-of-the-art related to 6G
6.3.1 Training dataset manipulation
6.3.2 Interception of Private Information
6.3.3 Attacks on learning Agents
6.4 Edge computing security in autonomous driving
6.5 Future and challenges
7 Specialized 6G Networks and Network Slicing
7.1 Overview of 6G Specialized Networks
7.2 Network Slicing in 6G
7.2.1 Trust in Network Slicing
7.2.2 Privacy Aspects in Network Slicing
7.2.3 Solutions for Privacy and Trust in NS
8 Industry 5.0
8.1 Introduction
8.2 Motivations behind the Evolution of Industry 5.0
8.3 Key Features of Industry 5.0
8.3.1 Smart Additive Manufacturing
8.3.2 Predictive Maintenance
8.3.3 Hyper Customization
8.3.4 Cyber Physical Cognitive Systems
8.4 Security of Industry 5.0
8.4.1 Security Issues of Industry 5.0
8.5 Privacy of Industry 5.0
9 Metaverse Security in 6G
9.1 Overview of Metaverse
9.2 What is Metarverse?
9.2.1 Metaverse architecture
9.2.2 Key characteristics of metaverse
9.2.3 Role of 6G in Metaverse
9.3 Security Threats in metaverse
9.4 Countermeasures for metaverse security threats
9.5 New trends in metaverse security
10 Society 5.0 and Security
10.1 Industry and Society Evolution
10.1.1 Industry 4.0
10.1.2 Society 5.0
10.2 Technical Enablers and Challenges
10.2.1 Dependable Wireless Connectivity
10.2.2 Integrated Communication, Control, Computation, and Sensing
10.2.3 Intelligence Everywhere
10.2.4 Energy Harvesting and Transfer
10.3 Security in Society 5.0
11 6G-enabled Internet of Vehicles
11.1 Overview of V2X Communication and IoV
11.2 IoV Use Cases
11.3 Connected Autonomous Vehicles (CAV)
11.4 Unmanned Aerial Vehicles in Future IoV
11.5 Security Landscape for IoV
11.5.1 Security Threats
11.5.2 Security Requirements
12 Smart Grid 2.0 Security
12.1 Introduction
12.2 Evolution of SG 2.0
12.3 Smart Grid 2.0
12.3.1 Comparison of Smart Grid 1.0 and 2.0
12.4 Role of 6G in SG 2.0
12.5 Security Challenges of SG 2.0
12.5.1 Physical Attacks
12.5.2 Software Attacks
12.5.3 Network Attacks
12.5.4 Attacks to the Controller
12.5.5 Encryption related Attacks
12.5.6 AI and ML related Attacks
12.5.7 Stability and Reliability of power supply
12.5.8 Secure and transparent energy trading among pro-sumers and consumers
12.5.9 Efficient and reliable communication topology for information and control signal exchange
12.6 Privacy issues of SG2.0
12.7 Trust Management
12.8 Security and Privacy Standardization on SG 2.0
13 6G Privacy
13.1 Introduction
13.2 Privacy Taxonomy
13.3 Privacy in Actions on Data
13.3.1 Information Collection
13.3.2 Information Processing
13.3.3 Information Dissemination
13.3.4 Invasion
13.4 Privacy Types for 6G
13.4.1 Data
13.4.2 Actions and Personal Behaviour
13.4.3 Image and Video
13.4.4 Communication
13.4.5 Location
13.5 6G Privacy goals
13.5.1 Ensure of privacy-protected big data
13.5.2 Privacy guarantees for edge networks
13.5.3 Achieving balance between privacy and performance of services
13.5.4 Standardization of privacy in technologies, and applications
13.5.5 Balance the interests in privacy protection in global context
13.5.6 Achieving proper utilization of interoperability and data portability
13.5.7 Quantifying privacy and privacy violations
13.5.8 Getting explanations of AI actions for privacy requirements
14 6G Privacy Challenges and Possible Solution
14.1 Introduction
14.2 6G Privacy Challenges and Issues
14.2.1 Advanced 6G applications with new privacy requirements
14.2.2 Privacy preservation limitations for B5G/6G control and orchestration layer
14.2.3 Privacy attacks on AI models
14.2.4 Privacy requirements in cloud computing and storage environments
14.2.5 Privacy issues in edge computing and Edge AI
14.2.6 Cost on privacy enhancements
14.2.7 Limited availability of Explainable AI (XAI) techniques
14.2.8 Ambiguity in responsibility of data ownership
14.2.9 Data communication confidentiality issues
14.2.10 Private Data Access Limitations
14.2.11 Privacy differences based on location
14.2.12 Lack of understanding of privacy rights and threats
in general public
14.2.13 Difficulty in defining levels and indicators for privacy
14.3 Privacy Solutions for 6G
14.3.1 Privacy-preserving decentralized AI
14.3.2 Edge AI
14.3.3 Intelligent management with privacy
14.3.4 XAI for privacy
14.3.5 Privacy measures for Personally Identifiable Information
14.3.6 Blockchain-based Solutions
14.3.7 Lightweight and quantum resistant encryption mechanisms
14.3.8 Homomorphic Encryption
14.3.9 Privacy-preserving data publishing techniques
14.3.10 Privacy by design and Privacy by default
14.3.11 Regulation of Government, Industry, and Consumer
14.3.12 Other solutions
15 Legal Aspects and Security Standardization
15.1 Legal
15.2 Security Standardization
15.2.1 ETSI
15.2.2 ITU-T
15.2.3 3GPP
15.2.4 NIST
15.2.5 IETF
15.2.6 5G PPP
15.2.7 NGMN
15.2.8 IEEE
16 Distributed Ledger Technologies (DLTs) and Blockchain
16.1 Introduction
16.2 What is DLT
16.3 What is Blockchain
16.3.1 Types of Blockchain
16.4 What is Smart Contracts
16.5 Salient Features of Blockchain
16.6 Key Security Challenges which Blockchain can Solve
16.6.1 Role of Blockchain
16.7 Key Privacy Challenges which Blockchain can Solve
16.7.1 Key Challenges
16.7.2 Role of Blockchain
16.8 Threat Landscape of Blockchain
16.9 Possible Solutions to secure 6G Blockchains
17 AI/ML for 6G Security
17.1 Overview of 6G intelligence
17.2 AI for 6G Security
17.3 Use of AI to Identify/Mitigate Pre-6G Security Issues
17.4 AI to Mitigate Security Issues of 6G Architecture
17.5 AI to Mitigate Security Issues of 6G Technologies
17.6 Security Issues in AI
17.7 Using AI to Attack 6G
18 Role of Explainable AI in 6G Security
18.1 What is Explainable AI (XAI)
18.1.1 Terminologies of XAI
18.1.2 Taxonomy of XAI
18.1.3 XAI Methods
18.2 Use of XAI for 6G
18.3 XAI for 6G Security
18.3.1 XAI for 6G Devices and IoT Security
18.3.2 XAI for 6G RAN
18.3.3 XAI for 6G Edge
18.3.4 XAI for 6G Core and Backhual
18.3.5 XAI for 6G Network Automation
18.4 New Security issues of XAI
18.4.1 Increased vulnerability to adversarial ML attacks
18.4.2 Difficulty to design secure ML applications
18.4.3 New attack vector and target
19 Zero touch network and Service Management (ZSM) Security
19.1 Introduction
19.1.1 Need of Zero-Touch Network and Service Management
19.1.2 Importance of ZSM for 5G and Beyond
19.2 ZSM Reference Architecture
19.2.1 Components
19.3 Security Aspects
19.3.1 ML/AI-based Attacks
19.3.2 Open API Security Threats
19.3.3 Intent-based Security Threats
19.3.4 Automated Closed-Loop Network based Security Threats
19.3.5 Threats due to Programmable Network Technologies
19.3.6 Possible Threats on ZSM Framework Architecture
20 Physical Layer Security
20.1 Introduction
20.2 Physical layer security background
20.2.1 PLS fundamentals
20.2.2 PLS Approaches
20.3 The prospect of PLS in 6G
20.3.1 Application scenarios of PLS in 6G
20.3.2 6G technologies and PLS
20.3.3 Cell-free mMIMO
20.3.4 Visible Light Communication (VLC)
20.3.5 Terahertz Communication
20.3.6 Joint Communications and Sensing
21 Quantum Security and Post-Quantum Cryptography
21.1 Overview of 6G and Quantum Computing
21.2 Quantum Computing
21.3 Quantum Security
21.3.1 Quantum Key Distribution
21.3.2 Information-theoretic security
21.4 Post-Quantum Cryptography
21.4.1 Background
21.4.2 PQC methods
21.4.3 PQC standardisation
21.4.4 Challenges with PQC
21.4.5 Future directions of PQC
21.4.6 6G and PQC
22 Concluding Remarks
Index