Security and privacy vision in 6G : a comprehensive guide için kapak resmi
Başlık:
Security and privacy vision in 6G : a comprehensive guide
Yazar:
Porambage, Pawani, author.
ISBN:
9781119875437

9781119875420

9781119875413
Fiziksel Tanımlama:
1 online resource (xxv, 358 pages) : illustrations (chiefly color), color map
İçerik:
Foreword -- Preface -- 0.1 Book Organization -- Acknowledgments -- Acronyms -- -- 1 Evolution of Mobile Networks -- 1.1 Introduction -- 1.2 6G Mobile Communication Networks -- 1.2.1 6G as Envisioned Today -- 1.3 Key Driving Trends Towards 6G -- 1.4 6G Requirements/Vision -- 1.4.1 6G Development Timeline -- -- 2 Key 6G Technologies -- 2.1 Radio Network Technologies -- 2.1.1 Beyond sub 6 GHz towards THz Communication -- 2.1.2 Non-Terrestrial Networks Towards 3D Networking -- 2.2 AI/ML/FL -- 2.3 DLT/Blockchain -- 2.4 Edge Computing -- 2.5 Quantum Communication -- 2.6 Other New Technologies -- 2.6.1 Visible Light Communications -- 2.6.2 Large Intelligent Surfaces -- 2.6.3 Compressive Sensing -- 2.6.4 Zero-touch network and Service Management -- 2.6.5 Efficient Energy Transfer and Harvesting -- -- 3 6G Security Vision -- 3.1 Overview of 6G Security Vision -- 3.1.1 New 6G Requirements -- 3.2 6G Security Vision and KPIs -- 3.2.1 Security Threat Landscape for 6G Architecture -- -- 4 6G Device Security -- 4.1 Overview of 6G devices -- 4.2 6G Device Security Challenges -- 4.2.1 Growth of Data Collection -- 4.2.2 Cloud Connectivity -- 4.2.3 Device Capacity -- 4.2.4 Ultra Saturated Devices -- 4.3 Addressing Device Security in 6G -- -- 5 Open RAN and RAN-Core convergence -- 5.1 Introduction -- 5.2 Open RAN Architecture -- 5.3 Threat Vectors and Security Risks Associated with Open RAN -- 5.3.1 Threat Taxonomy -- 5.3.2 Risks related to the Process -- 5.3.3 Risks related to the Technology -- 5.3.4 Global Risks -- 5.4 Security Benefits of Open RAN -- 5.4.1 Open RAN specific -- 5.4.2 V-RAN specific -- 5.4.3 5G networks Related -- 5.5 Conclusion -- -- 6 Edge intelligence -- 6.1 Overview of edge intelligence -- 6.2 State-of-the-art related to 5G -- 6.2.1 Denial of Service (DOS) -- 6.2.2 Man-in-the-Middle (MitM) Attack -- 6.2.3 Privacy leakage -- 6.3 State-of-the-art related to 6G -- 6.3.1 Training dataset manipulation -- 6.3.2 Interception of Private Information -- 6.3.3 Attacks on learning Agents -- 6.4 Edge computing security in autonomous driving -- 6.5 Future and challenges -- -- 7 Specialized 6G Networks and Network Slicing -- 7.1 Overview of 6G Specialized Networks -- 7.2 Network Slicing in 6G -- 7.2.1 Trust in Network Slicing -- 7.2.2 Privacy Aspects in Network Slicing -- 7.2.3 Solutions for Privacy and Trust in NS -- -- 8 Industry 5.0 -- 8.1 Introduction -- 8.2 Motivations behind the Evolution of Industry 5.0 -- 8.3 Key Features of Industry 5.0 -- 8.3.1 Smart Additive Manufacturing -- 8.3.2 Predictive Maintenance -- 8.3.3 Hyper Customization -- 8.3.4 Cyber Physical Cognitive Systems -- 8.4 Security of Industry 5.0 -- 8.4.1 Security Issues of Industry 5.0 -- 8.5 Privacy of Industry 5.0 -- -- 9 Metaverse Security in 6G -- 9.1 Overview of Metaverse -- 9.2 What is Metarverse? -- 9.2.1 Metaverse architecture -- 9.2.2 Key characteristics of metaverse -- 9.2.3 Role of 6G in Metaverse -- 9.3 Security Threats in metaverse -- 9.4 Countermeasures for metaverse security threats -- 9.5 New trends in metaverse security -- -- 10 Society 5.0 and Security -- 10.1 Industry and Society Evolution -- 10.1.1 Industry 4.0 -- 10.1.2 Society 5.0 -- 10.2 Technical Enablers and Challenges -- 10.2.1 Dependable Wireless Connectivity -- 10.2.2 Integrated Communication, Control, Computation, and Sensing -- 10.2.3 Intelligence Everywhere -- 10.2.4 Energy Harvesting and Transfer -- 10.3 Security in Society 5.0 -- -- 11 6G-enabled Internet of Vehicles -- 11.1 Overview of V2X Communication and IoV -- 11.2 IoV Use Cases -- 11.3 Connected Autonomous Vehicles (CAV) -- 11.4 Unmanned Aerial Vehicles in Future IoV -- 11.5 Security Landscape for IoV -- 11.5.1 Security Threats -- 11.5.2 Security Requirements -- -- 12 Smart Grid 2.0 Security -- 12.1 Introduction -- 12.2 Evolution of SG 2.0 -- 12.3 Smart Grid 2.0& -- 12.3.1 Comparison of Smart Grid 1.0 and 2.0 -- 12.4 Role of 6G in SG 2.0 -- 12.5 Security Challenges of SG 2.0 -- 12.5.1 Physical Attacks -- 12.5.2 Software Attacks -- 12.5.3 Network Attacks -- 12.5.4 Attacks to the Controller -- 12.5.5 Encryption related Attacks -- 12.5.6 AI and ML related Attacks -- 12.5.7 Stability and Reliability of power supply -- 12.5.8 Secure and transparent energy trading among pro-sumers and consumers -- 12.5.9 Efficient and reliable communication topology for information and control signal exchange -- 12.6 Privacy issues of SG2.0 -- 12.7 Trust Management -- 12.8 Security and Privacy Standardization on SG 2.0 -- -- 13 6G Privacy -- 13.1 Introduction -- 13.2 Privacy Taxonomy -- 13.3 Privacy in Actions on Data -- 13.3.1 Information Collection -- 13.3.2 Information Processing -- 13.3.3 Information Dissemination -- 13.3.4 Invasion -- 13.4 Privacy Types for 6G -- 13.4.1 Data -- 13.4.2 Actions and Personal Behaviour -- 13.4.3 Image and Video -- 13.4.4 Communication -- 13.4.5 Location -- 13.5 6G Privacy goals -- 13.5.1 Ensure of privacy-protected big data -- 13.5.2 Privacy guarantees for edge networks -- 13.5.3 Achieving balance between privacy and performance of services -- 13.5.4 Standardization of privacy in technologies, and applications -- 13.5.5 Balance the interests in privacy protection in global context -- 13.5.6 Achieving proper utilization of interoperability and data portability -- 13.5.7 Quantifying privacy and privacy violations -- 13.5.8 Getting explanations of AI actions for privacy requirements -- -- 14 6G Privacy Challenges and Possible Solution -- 14.1 Introduction -- 14.2 6G Privacy Challenges and Issues -- 14.2.1 Advanced 6G applications with new privacy requirements -- 14.2.2 Privacy preservation limitations for B5G/6G control and orchestration layer -- 14.2.3 Privacy attacks on AI models -- 14.2.4 Privacy requirements in cloud computing and storage environments -- 14.2.5 Privacy issues in edge computing and Edge AI -- 14.2.6 Cost on privacy enhancements -- 14.2.7 Limited availability of Explainable AI (XAI) techniques -- 14.2.8 Ambiguity in responsibility of data ownership -- 14.2.9 Data communication confidentiality issues -- 14.2.10 Private Data Access Limitations -- 14.2.11 Privacy differences based on location -- 14.2.12 Lack of understanding of privacy rights and threats in general public -- 14.2.13 Difficulty in defining levels and indicators for privacy -- 14.3 Privacy Solutions for 6G -- 14.3.1 Privacy-preserving decentralized AI -- 14.3.2 Edge AI -- 14.3.3 Intelligent management with privacy -- 14.3.4 XAI for privacy -- 14.3.5 Privacy measures for Personally Identifiable Information -- 14.3.6 Blockchain-based Solutions -- 14.3.7 Lightweight and quantum resistant encryption mechanisms -- 14.3.8 Homomorphic Encryption -- 14.3.9 Privacy-preserving data publishing techniques -- 14.3.10 Privacy by design and Privacy by default -- 14.3.11 Regulation of Government, Industry, and Consumer -- 14.3.12 Other solutions -- -- 15 Legal Aspects and Security Standardization -- 15.1 Legal -- 15.2 Security Standardization -- 15.2.1 ETSI -- 15.2.2 ITU-T -- 15.2.3 3GPP -- 15.2.4 NIST -- 15.2.5 IETF -- 15.2.6 5G PPP -- 15.2.7 NGMN -- 15.2.8 IEEE -- -- 16 Distributed Ledger Technologies (DLTs) and Blockchain -- 16.1 Introduction -- 16.2 What is DLT -- 16.3 What is Blockchain -- 16.3.1 Types of Blockchain -- 16.4 What is Smart Contracts -- 16.5 Salient Features of Blockchain -- 16.6 Key Security Challenges which Blockchain can Solve -- 16.6.1 Role of Blockchain -- 16.7 Key Privacy Challenges which Blockchain can Solve -- 16.7.1 Key Challenges -- 16.7.2 Role of Blockchain -- 16.8 Threat Landscape of Blockchain -- 16.9 Possible Solutions to secure 6G Blockchains -- -- 17 AI/ML for 6G Security -- 17.1 Overview of 6G intelligence -- 17.2 AI for 6G Security -- 17.3 Use of AI to Identify/Mitigate Pre-6G Security Issues -- 17.4 AI to Mitigate Security Issues of 6G Architecture -- 17.5 AI to Mitigate Security Issues of 6G Technologies -- 17.6 Security Issues in AI -- 17.7 Using AI to Attack 6G -- -- 18 Role of Explainable AI in 6G Security -- 18.1 What is Explainable AI (XAI) -- 18.1.1 Terminologies of XAI -- 18.1.2 Taxonomy of XAI -- 18.1.3 XAI Methods -- 18.2 Use of XAI for 6G -- 18.3 XAI for 6G Security -- 18.3.1 XAI for 6G Devices and IoT Security -- 18.3.2 XAI for 6G RAN -- 18.3.3 XAI for 6G Edge -- 18.3.4 XAI for 6G Core and Backhual -- 18.3.5 XAI for 6G Network Automation -- 18.4 New Security issues of XAI -- 18.4.1 Increased vulnerability to adversarial ML attacks -- 18.4.2 Difficulty to design secure ML applications -- 18.4.3 New attack vector

and target -- -- 19 Zero touch network and Service Management (ZSM) Security -- 19.1 Introduction -- 19.1.1 Need of Zero-Touch Network and Service Management -- 19.1.2 Importance of ZSM for 5G and Beyond -- 19.2 ZSM Reference Architecture -- 19.2.1 Components -- 19.3 Security Aspects -- 19.3.1 ML/AI-based Attacks -- 19.3.2 Open API Security Threats -- 19.3.3 Intent-based Security Threats -- 19.3.4 Automated Closed-Loop Network based Security Threats -- 19.3.5 Threats due to Programmable Network Technologies -- 19.3.6 Possible Threats on ZSM Framework Architecture -- -- 20 Physical Layer Security -- 20.1 Introduction -- 20.2 Physical layer security background -- 20.2.1 PLS fundamentals -- 20.2.2 PLS Approaches -- 20.3 The prospect of PLS in 6G -- 20.3.1 Application scenarios of PLS in 6G -- 20.3.2 6G technologies and PLS -- 20.3.3 Cell-free mMIMO -- 20.3.4 Visible Light Communication (VLC) -- 20.3.5 Terahertz Communication -- 20.3.6 Joint Communications and Sensing -- -- 21 Quantum Security and Post-Quantum Cryptography -- 21.1 Overview of 6G and Quantum Computing -- 21.2 Quantum Computing -- 21.3 Quantum Security -- 21.3.1 Quantum Key Distribution -- 21.3.2 Information-theoretic security -- 21.4 Post-Quantum Cryptography -- 21.4.1 Background -- 21.4.2 PQC methods -- 21.4.3 PQC standardisa ...
Özet:
"Whilst 5G coverage is not yet fully implemented, the vision for the sixth generation (6G) of mobile communication is already projected. It is envisioned that the 6G standardization will start somewhere in 2026 with its most significant vision being the added intelligence in telecommunication networks. 6G security needs to be built to not guard against threats to the foreseen 6G networks, but also to address the increased and evolving threat landscape. Adequate security will include prediction, detection, mitigation, and prevention mechanisms, and the ability to limit the propagation of such vulnerabilities with greater intelligence, visibility and real time protection. Security and privacy are two closely-coupled topics where security relates to the safeguarding of the actual data and privacy ensures the covering up of the identities related to that data. This book provides a reference to a comprehensive study of security and privacy of the 6G vision, offering a roadmap to the security and privacy threats of 6G and possible mechanisms to protect them. It covers the critical security considerations in the proposed 6G architectures and 6G use cases and how to relate them with the novel technologies."-- Provided by publisher.
Notlar:
John Wiley and Sons
Yazar Ek Girişi:
Ayırtma:
Kopya:

Rafta:*

Kütüphane
Materyal Türü
Demirbaş Numarası
Yer Numarası
Durumu/İade Tarihi
Materyal Ayırtma
Arıyor...
E-Kitap 598347-1001 TK5103.252 .P67 2023
Arıyor...

On Order