Security and Privacy Vision in 6G A Comprehensive Guide

by ;
Edition: 1st
Format: Hardcover
Pub. Date: 2023-08-08
Publisher(s): Wiley-IEEE Press
  • eCampus.com Device Compatibility Matrix

    Click the device icon to install or view instructions

    Apple iOS | iPad, iPhone, iPod
    Apple iOS | iPad, iPhone, iPod
    Android Devices | Android Tables & Phones OS 2.2 or higher | *Kindle Fire
    Android Devices | Android Tables & Phones OS 2.2 or higher | *Kindle Fire
    Windows 10 / 8 / 7 / Vista / XP
    Windows 10 / 8 / 7 / Vista / XP
    Mac OS X | **iMac / Macbook
    Mac OS X | **iMac / Macbook
    Enjoy offline reading with these devices
    Apple Devices
    Android Devices
    Windows Devices
    Mac Devices
    iPad, iPhone, iPod
    Our reader is compatible
     
     
     
    Android 2.2 +
     
    Our reader is compatible
     
     
    Kindle Fire
     
    Our reader is compatible
     
     
    Windows
    10 / 8 / 7 / Vista / XP
     
     
    Our reader is compatible
     
    Mac
     
     
     
    Our reader is compatible
List Price: $154.96

Buy New

Usually Ships in 8 - 10 Business Days.
$147.58

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$129.60
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$129.60*

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Prepare for the future of mobile communication with this comprehensive study

6G is the next frontier in mobile communication, with development of 6G standards slated to begin as early as 2026. As telecommunications networks become even faster and more intelligent, security and privacy concerns will become all the more critical. In an increasingly connected world, there is an urgent need for user data to be safeguarded and system security enhanced against a new generation of threats.

6G Security and Privacy provides a comprehensive survey of these threats and the emerging techniques for safeguarding against them. It includes mechanisms for prediction, detection, mitigation, and prevention, such that threats to privacy and security can be forestalled at any stage. Fully engaged with proposed 6G architectures, it is an essential resource for mobile communications professionals looking for a head start on the technology of the future.

6G Security and Privacy readers will also find:

  • Detailed coverage of topics including edge intelligence and cloudification, industrial automation, collaborative robots, and more
  • Treatment balancing the practical and the theoretical
  • And editorial team with decades of international network technology experience in both industry and academia

6G Security and Privacy is a vital reference for network security professionals and for postgraduate and advanced undergraduate students in mobile communications and network security-related fields.

Author Biography

Pawani Porambage, D.Sc is Senior Scientist at the VTT Technical Research Centre of Finland. She has nearly a decade of network security experience and has authored or co-authored more than fifty publications.

Madhusanka Liyanage, D.Sc is Assistant Professor in the School of Computer Science, University College Dublin, Ireland. He received the 2020 IEEE ComSoc Outstanding Young Researcher Award and has published widely on 6G, network security, and related subjects.

Table of Contents

Foreword

Preface

0.1 Book Organization

Acknowledgments

Acronyms

 

1 Evolution of Mobile Networks

1.1 Introduction

1.2 6G Mobile Communication Networks

1.2.1 6G as Envisioned Today

1.3 Key Driving Trends Towards 6G

1.4 6G Requirements/Vision

1.4.1 6G Development Timeline

 

2 Key 6G Technologies

2.1 Radio Network Technologies

2.1.1 Beyond sub 6 GHz towards THz Communication

2.1.2 Non-Terrestrial Networks Towards 3D Networking

2.2 AI/ML/FL

2.3 DLT/Blockchain

2.4 Edge Computing

2.5 Quantum Communication

2.6 Other New Technologies

2.6.1 Visible Light Communications

2.6.2 Large Intelligent Surfaces

2.6.3 Compressive Sensing

2.6.4 Zero-touch network and Service Management

2.6.5 Efficient Energy Transfer and Harvesting

 

3 6G Security Vision

3.1 Overview of 6G Security Vision

3.1.1 New 6G Requirements

3.2 6G Security Vision and KPIs

3.2.1 Security Threat Landscape for 6G Architecture

 

4 6G Device Security

4.1 Overview of 6G devices

4.2 6G Device Security Challenges

4.2.1 Growth of Data Collection

4.2.2 Cloud Connectivity

4.2.3 Device Capacity

4.2.4 Ultra Saturated Devices

4.3 Addressing Device Security in 6G

 

5 Open RAN and RAN-Core convergence

5.1 Introduction

5.2 Open RAN Architecture

5.3 Threat Vectors and Security Risks Associated with Open RAN

5.3.1 Threat Taxonomy

5.3.2 Risks related to the Process

5.3.3 Risks related to the Technology

5.3.4 Global Risks

5.4 Security Benefits of Open RAN

5.4.1 Open RAN specific

5.4.2 V-RAN specific

5.4.3 5G networks Related

5.5 Conclusion

 

6 Edge intelligence

6.1 Overview of edge intelligence

6.2 State-of-the-art related to 5G

6.2.1 Denial of Service (DOS)

6.2.2 Man-in-the-Middle (MitM) Attack

6.2.3 Privacy leakage

6.3 State-of-the-art related to 6G

6.3.1 Training dataset manipulation

6.3.2 Interception of Private Information

6.3.3 Attacks on learning Agents

6.4 Edge computing security in autonomous driving

6.5 Future and challenges

 

7 Specialized 6G Networks and Network Slicing

7.1 Overview of 6G Specialized Networks                

7.2 Network Slicing in 6G                         

7.2.1 Trust in Network Slicing                 

7.2.2 Privacy Aspects in Network Slicing           

7.2.3 Solutions for Privacy and Trust in NS   

     

8 Industry 5.0

8.1 Introduction                               

8.2 Motivations behind the Evolution of Industry 5.0         

8.3 Key Features of Industry 5.0                     

8.3.1 Smart Additive Manufacturing              

8.3.2 Predictive Maintenance                  

8.3.3 Hyper Customization                   

8.3.4 Cyber Physical Cognitive Systems            

8.4 Security of Industry 5.0                        

8.4.1 Security Issues of Industry 5.0              

8.5 Privacy of Industry 5.0                         

 

9 Metaverse Security in 6G

9.1 Overview of Metaverse                          

9.2 What is Metarverse?                          

9.2.1 Metaverse architecture                  

9.2.2 Key characteristics of metaverse             

9.2.3 Role of 6G in Metaverse                 

9.3 Security Threats in metaverse                      

9.4 Countermeasures for metaverse security threats          

9.5 New trends in metaverse security                   

 

10 Society 5.0 and Security

10.1 Industry and Society Evolution                    

10.1.1 Industry 4.0                         

10.1.2 Society 5.0                         

10.2 Technical Enablers and Challenges                  

10.2.1 Dependable Wireless Connectivity            

10.2.2 Integrated Communication, Control, Computation, and Sensing                         

10.2.3 Intelligence Everywhere                  

10.2.4 Energy Harvesting and Transfer             

10.3 Security in Society 5.0                         

 

11 6G-enabled Internet of Vehicles

11.1 Overview of V2X Communication and IoV             

11.2 IoV Use Cases                              

11.3 Connected Autonomous Vehicles (CAV)               

11.4 Unmanned Aerial Vehicles in Future IoV              

11.5 Security Landscape for IoV                      

11.5.1 Security Threats                      

11.5.2 Security Requirements                  

 

 

12 Smart Grid 2.0 Security

12.1 Introduction                               

12.2 Evolution of SG 2.0                           

12.3 Smart Grid 2.0                              

12.3.1 Comparison of Smart Grid 1.0 and 2.0         

12.4 Role of 6G in SG 2.0                          

12.5 Security Challenges of SG 2.0                     

12.5.1 Physical Attacks                      

12.5.2 Software Attacks                     

12.5.3 Network Attacks                     

12.5.4 Attacks to the Controller                

12.5.5 Encryption related Attacks               

12.5.6 AI and ML related Attacks                

12.5.7 Stability and Reliability of power supply        

12.5.8 Secure and transparent energy trading among pro-sumers and consumers                  

12.5.9 Efficient and reliable communication topology for information and control signal exchange        

12.6 Privacy issues of SG2.0                         

12.7 Trust Management                           

12.8 Security and Privacy Standardization on SG 2.0          

 

13 6G Privacy

13.1 Introduction                               

13.2 Privacy Taxonomy                            

13.3 Privacy in Actions on Data                      

13.3.1 Information Collection                   

13.3.2 Information Processing                  

13.3.3 Information Dissemination                

13.3.4 Invasion                            

13.4 Privacy Types for 6G                          

13.4.1 Data                             

13.4.2 Actions and Personal Behaviour             

13.4.3 Image and Video                      

13.4.4 Communication                      

13.4.5 Location                           

13.5 6G Privacy goals                            

13.5.1 Ensure of privacy-protected big data          

13.5.2 Privacy guarantees for edge networks          

13.5.3 Achieving balance between privacy and performance of services

13.5.4 Standardization of privacy in technologies, and applications                          

13.5.5 Balance the interests in privacy protection in global context                            

13.5.6 Achieving proper utilization of interoperability and data portability                       

13.5.7 Quantifying privacy and privacy violations       

13.5.8 Getting explanations of AI actions for privacy requirements                          

 

 

14 6G Privacy Challenges and Possible Solution

14.1 Introduction                               

14.2 6G Privacy Challenges and Issues                   

14.2.1 Advanced 6G applications with new privacy requirements                            

14.2.2 Privacy preservation limitations for B5G/6G control and orchestration layer                  

14.2.3 Privacy attacks on AI models              

14.2.4 Privacy requirements in cloud computing and storage environments                     

14.2.5 Privacy issues in edge computing and Edge AI    

14.2.6 Cost on privacy enhancements              

14.2.7 Limited availability of Explainable AI (XAI) techniques

14.2.8 Ambiguity in responsibility of data ownership     

14.2.9 Data communication confidentiality issues       

14.2.10 Private Data Access Limitations             

14.2.11 Privacy differences based on location          

14.2.12 Lack of understanding of privacy rights and threats

in general public                      

14.2.13 Difficulty in defining levels and indicators for privacy

14.3 Privacy Solutions for 6G                        

14.3.1 Privacy-preserving decentralized AI           

14.3.2 Edge AI                           

14.3.3 Intelligent management with privacy          

14.3.4 XAI for privacy                       

14.3.5 Privacy measures for Personally Identifiable Information                            

14.3.6 Blockchain-based Solutions                

14.3.7 Lightweight and quantum resistant encryption mechanisms                             

14.3.8 Homomorphic Encryption                 

14.3.9 Privacy-preserving data publishing techniques     

14.3.10 Privacy by design and Privacy by default        

14.3.11 Regulation of Government, Industry, and Consumer

14.3.12 Other solutions                       

 

15 Legal Aspects and Security Standardization

15.1 Legal                                   

15.2 Security Standardization                        

15.2.1 ETSI                             

15.2.2 ITU-T                             

15.2.3 3GPP                            

15.2.4 NIST                            

15.2.5 IETF                             

15.2.6 5G PPP                           

15.2.7 NGMN                           

15.2.8 IEEE                              

 

16 Distributed Ledger Technologies (DLTs) and Blockchain

16.1 Introduction                               

16.2 What is DLT                               

16.3 What is Blockchain                           

16.3.1 Types of Blockchain                     

16.4 What is Smart Contracts                       

16.5 Salient Features of Blockchain                    

16.6 Key Security Challenges which Blockchain can Solve       

16.6.1 Role of Blockchain                     

16.7 Key Privacy Challenges which Blockchain can Solve       

16.7.1 Key Challenges                       

16.7.2 Role of Blockchain                     

16.8 Threat Landscape of Blockchain                   

16.9 Possible Solutions to secure 6G Blockchains            

 

17 AI/ML for 6G Security

17.1 Overview of 6G intelligence                      

17.2 AI for 6G Security                            

17.3 Use of AI to Identify/Mitigate Pre-6G Security Issues       

17.4 AI to Mitigate Security Issues of 6G Architecture         

17.5 AI to Mitigate Security Issues of 6G Technologies         

17.6 Security Issues in AI                          

17.7 Using AI to Attack 6G                         

 

18 Role of Explainable AI in 6G Security

18.1 What is Explainable AI (XAI)                     

18.1.1 Terminologies of XAI                   

18.1.2 Taxonomy of XAI                     

18.1.3 XAI Methods                        

18.2 Use of XAI for 6G                           

18.3 XAI for 6G Security                           

18.3.1 XAI for 6G Devices and IoT Security          

18.3.2 XAI for 6G RAN                      

18.3.3 XAI for 6G Edge                      

18.3.4 XAI for 6G Core and Backhual              

18.3.5 XAI for 6G Network Automation            

18.4 New Security issues of XAI                      

18.4.1 Increased vulnerability to adversarial ML attacks   

18.4.2 Difficulty to design secure ML applications      

18.4.3 New attack vector and target              

 

19 Zero touch network and Service Management (ZSM) Security

19.1 Introduction                               

19.1.1 Need of Zero-Touch Network and Service Management                             

19.1.2 Importance of ZSM for 5G and Beyond        

19.2 ZSM Reference Architecture                     

19.2.1 Components                        

19.3 Security Aspects                            

19.3.1 ML/AI-based Attacks                   

19.3.2 Open API Security Threats               

19.3.3 Intent-based Security Threats              

19.3.4 Automated Closed-Loop Network based Security Threats

19.3.5 Threats due to Programmable Network Technologies

19.3.6 Possible Threats on ZSM Framework Architecture  

 

20 Physical Layer Security

20.1 Introduction                               

20.2 Physical layer security background                  

20.2.1 PLS fundamentals                     

20.2.2 PLS Approaches                      

20.3 The prospect of PLS in 6G                      

20.3.1 Application scenarios of PLS in 6G           

20.3.2 6G technologies and PLS                

20.3.3 Cell-free mMIMO                     

20.3.4 Visible Light Communication (VLC)          

20.3.5 Terahertz Communication                

20.3.6 Joint Communications and Sensing           

 

21 Quantum Security and Post-Quantum Cryptography

21.1 Overview of 6G and Quantum Computing              

21.2 Quantum Computing                          

21.3 Quantum Security                             

21.3.1 Quantum Key Distribution                

21.3.2 Information-theoretic security              

21.4 Post-Quantum Cryptography                     

21.4.1 Background                         

21.4.2 PQC methods                       

21.4.3 PQC standardisation                   

21.4.4 Challenges with PQC                   

21.4.5 Future directions of PQC                 

21.4.6 6G and PQC 

                      

22 Concluding Remarks

 

Index

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.