Cover image for Security and privacy in 6G communication technology
Title:
Security and privacy in 6G communication technology
Author:
Jain, Parita, editor.
ISBN:
9781394311057

9781394311033
Physical Description:
1 online resource (376 p.)
General Note:
Chapter 3 Strategies for Ensuring Security and Privacy in 6G Networks
Contents:
Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 A Comprehensive Study of Security and Privacy Issues of 6G Wireless Communications Networks -- 1.1 Introduction -- 1.1.1 History of Wireless Communication -- 1.1.2 Overview of 6G Networks -- 1.1.2.1 Advancement in 6G Technology -- 1.1.2.2 Importance of Developing 6G Technology -- 1.1.3 Features of 6G Networks -- 1.1.4 Applications of 6G Networks -- 1.1.5 Disadvantages of 6G Networks -- 1.1.6 Challenges of 6G Networks -- 1.2 Security Evolution of Communication Networks

1.3 Privacy and Security Issues with 6G Networks -- 1.3.1 Privacy Challenges in 6G Networks -- 1.3.2 Security Challenges in 6G Networks -- 1.4 Proposed Security Solution for 6G Networks -- 1.4.1 Distributed and Scalable AI/ML Security -- 1.4.2 Distributed Ledger Technology (DLT) -- 1.4.3 Quantum Security -- 1.4.4 Physical Layer Security (PLS) -- 1.5 Conclusion -- References -- Chapter 2 Key Security Issues and Solutions in 6G Communications -- 2.1 Introduction -- 2.1.1 Security Considerations for 6G Communication -- 2.1.2 Survey Objectives -- 2.1.3 Overview of 6G Communication Paradigm

2.1.3.1 Evolution from 5G to 6G -- 2.1.3.2 Key Features of 6G Networks -- 2.1.4 Emerging Technologies in 6G -- 2.2 Security Challenges for 6G Communications -- 2.2.1 Security Implications -- 2.2.2 AI and Machine Learning Integration: Security Concerns -- 2.2.3 Network Slicing: Isolation and Security Issues -- 2.2.4 Security Implications with Ultra-Low Latency -- 2.2.5 Terahertz Communications -- 2.2.6 Unique Security Concerns -- 2.2.7 Integration of Internet of Things and Edge Devices -- 2.2.8 Expanded Attack Surface and Privacy Concerns -- 2.2.9 User Data and Anonymity

2.2.10 Quantum Computing Threats -- 2.3 Legacy Security Concepts in 6G -- 2.3.1 Confidentiality, Integrity, and Availability -- 2.3.2 Authentication -- 2.3.3 Access Control -- 2.4 6G Security Innovations -- 2.4.1 AI Integration -- 2.4.2 Quantum Computing Impact -- 2.4.3 Federated Learning Role -- 2.5 Threat Models in 6G Communication -- 2.5.1 Threat-Countering Techniques in 6G Communication -- 2.5.1.1 Cryptographic Methods -- 2.5.1.2 Quantum-Resistant Cryptography -- 2.5.1.3 Homomorphic Encryption -- 2.5.1.4 Entity Attributes -- 2.5.1.5 Biometric Authentication -- 2.5.1.6 Device Fingerprinting

2.5.1.7 Intrusion Detection Systems (IDSs) -- 2.6 Authentication Techniques in 6G Communication -- 2.6.1 Handover Authentication -- 2.6.2 Mutual Authentication -- 2.6.3 Physical Layer -- 2.6.4 Deniable Authentication -- 2.6.5 Token-Based Authentication -- 2.6.6 Authentication Using Certificates -- 2.6.7 Key Agreement-Based Validation -- 2.6.8 Multi-Factor Authentication -- 2.7 Future Directions -- 2.7.1 Improving AI Security in 6G and Developing Quantum-Safe Protocols -- 2.7.2 Advancing Federated Learning for Privacy-Preserving Security -- 2.8 Conclusion -- References
Abstract:
Future-proof your knowledge and expertise in telecommunications with this essential guide, which provides a comprehensive analysis of the critical security and privacy challenges in the transition to 6G communication.
Local Note:
John Wiley and Sons
Holds:
Copies:

Available:*

Library
Material Type
Item Barcode
Shelf Number
Status
Item Holds
Searching...
E-Book 600322-1001 TK5103.252 .S43 2026
Searching...

On Order