
Title:
Security and Privacy for 6G Massive IoT.
Author:
Mantas, Georgios.
ISBN:
9781119988007
9781119987987
9781119987994
Edition:
1st ed.
Physical Description:
1 online resource (285 pages)
Contents:
Cover -- Title Page -- Copyright -- Contents -- List of Contributors -- Acknowledgments -- Introduction -- Chapter 1 Threat Landscape for 6G-Enabled Massive IoT -- 1.1 Introduction -- 1.2 6G Vision and Core Values -- 1.3 Emerging Massive IoT Applications Enabled by 6G -- 1.3.1 Enabling Sustainability -- 1.3.1.1 E-health for All -- 1.3.1.2 Institutional Coverage -- 1.3.1.3 Earth Monitor -- 1.3.1.4 Autonomous Supply Chains -- 1.3.1.5 Sustainable Food Production -- 1.3.1.6 Network Trade-Offs for Minimized Environmental Impact -- 1.3.1.7 Network Functionality for Crisis Resilience -- 1.3.2 Massive Twinning -- 1.3.2.1 Digital Twins for Manufacturing -- 1.3.2.2 Immersive Smart Cities -- 1.3.2.3 Internet of Tags -- 1.3.3 Telepresence -- 1.3.3.1 Fully Merged Cyber-Physical Worlds -- 1.3.3.2 Mixed Reality Co-design -- 1.3.3.3 Immersive Sport Event -- 1.3.3.4 Merged Reality Game/Work -- 1.3.4 From Robots to Cobots -- 1.3.4.1 Consumer Robots
Abstract:
Anticipate the security and privacy threats of the future with this groundbreaking text The development of the next generation of mobile networks (6G), which is expected to be widely deployed by 2030, promises to revolutionize the Internet of Things (IoT), interconnecting a massive number of IoT devices (massive IoT) on a scale never before envisioned. These devices will enable the operation of a wide spectrum of massive IoT applications such as immersive smart cities, autonomous supply chain, flexible manufacturing and more. However, the vast number of interconnected IoT devices in the emerging massive IoT applications will make them vulnerable to an unprecedented variety of security and privacy threats, which must be anticipated in order to harness the transformative potential of these technologies. Security and Privacy for 6G Massive IoT addresses this new and expanding threat landscape and the challenges it poses for network security companies and professionals. It offers a unique and comprehensive understanding of these threats, their likely manifestations, and the solutions available to counter them. The result creates a foundation for future efforts to research and develop further solutions based on essential 6G technologies. Readers will also find: Analysis based on the four-tier network architecture of 6G, enhanced by Edge Computing and Edge Intelligence Detailed coverage of 6G enabling technologies including blockchain, distributed machine learning, and many more Scenarios, use cases, and security and privacy requirements for 6G Massive IoT applications Security and Privacy for 6G Massive IoT is ideal for research engineers working in the area of IoT security and designers working on new 6G security products, among many others.
Local Note:
John Wiley and Sons
Genre:
Electronic Access:
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007Copies:
Available:*
Library | Material Type | Item Barcode | Shelf Number | Status | Item Holds |
|---|---|---|---|---|---|
Searching... | E-Book | 599629-1001 | TK5103.252 | Searching... | Searching... |
