Security and privacy in 6G communication technology /

Future-proof your knowledge and expertise in telecommunications with this essential guide, which provides a comprehensive analysis of the critical security and privacy challenges in the transition to 6G communication.

Bibliographic Details
Other Authors: Jain, Parita (Editor), Aggarwal, Puneet Kumar, Singh, Mandeep, Singh, Sushil Kumar, Singhal, Amit
Format: eBook
Language:English
Published: Hoboken, NJ : Beverly, MA : John Wiley & Sons, Inc. ; Scriverner Publishing LLC, 2026.
Subjects:
Online Access:Connect to the full text of this electronic book

MARC

Tag First Indicator Second Indicator Subfields
LEADER 00000nam a22000007i 4500
001 in00005690607
005 20260215001248.8
006 m o d
007 cr cnu---unuuu
008 251115t20262026nju o 000 0 eng d
035 |a wil6005422 
035 |a (NhCcYBP)wil6005422 
040 |a NhCcYBP  |b eng  |e rda  |c NhCcYBP 
020 |a 9781394311057  |q electronic book 
020 |a 1394311052  |q electronic book 
020 |a 9781394311033  |q electronic book 
020 |a 1394311036  |q electronic book 
020 |z 9781394311002  |q hardcover 
020 |z 1394311001  |q hardcover 
024 7 |a 10.1002/9781394311057  |2 doi 
037 |a 9781394311002  |b O'Reilly Media 
050 4 |a TK5103.252  |b .S43 2026 
082 0 4 |a 621.3845/6  |2 23/eng/20251203 
245 0 0 |a Security and privacy in 6G communication technology /  |c edited by Parita Jain... [and 4 others]. 
264 1 |a Hoboken, NJ :  |b John Wiley & Sons, Inc. ;  |a Beverly, MA :  |b Scriverner Publishing LLC,  |c 2026. 
264 4 |c ©2026 
300 |a 1 online resource (376 p.) 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
505 0 |a Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 A Comprehensive Study of Security and Privacy Issues of 6G Wireless Communications Networks -- 1.1 Introduction -- 1.1.1 History of Wireless Communication -- 1.1.2 Overview of 6G Networks -- 1.1.2.1 Advancement in 6G Technology -- 1.1.2.2 Importance of Developing 6G Technology -- 1.1.3 Features of 6G Networks -- 1.1.4 Applications of 6G Networks -- 1.1.5 Disadvantages of 6G Networks -- 1.1.6 Challenges of 6G Networks -- 1.2 Security Evolution of Communication Networks 
505 8 |a 1.3 Privacy and Security Issues with 6G Networks -- 1.3.1 Privacy Challenges in 6G Networks -- 1.3.2 Security Challenges in 6G Networks -- 1.4 Proposed Security Solution for 6G Networks -- 1.4.1 Distributed and Scalable AI/ML Security -- 1.4.2 Distributed Ledger Technology (DLT) -- 1.4.3 Quantum Security -- 1.4.4 Physical Layer Security (PLS) -- 1.5 Conclusion -- References -- Chapter 2 Key Security Issues and Solutions in 6G Communications -- 2.1 Introduction -- 2.1.1 Security Considerations for 6G Communication -- 2.1.2 Survey Objectives -- 2.1.3 Overview of 6G Communication Paradigm 
505 8 |a 2.1.3.1 Evolution from 5G to 6G -- 2.1.3.2 Key Features of 6G Networks -- 2.1.4 Emerging Technologies in 6G -- 2.2 Security Challenges for 6G Communications -- 2.2.1 Security Implications -- 2.2.2 AI and Machine Learning Integration: Security Concerns -- 2.2.3 Network Slicing: Isolation and Security Issues -- 2.2.4 Security Implications with Ultra-Low Latency -- 2.2.5 Terahertz Communications -- 2.2.6 Unique Security Concerns -- 2.2.7 Integration of Internet of Things and Edge Devices -- 2.2.8 Expanded Attack Surface and Privacy Concerns -- 2.2.9 User Data and Anonymity 
505 8 |a 2.2.10 Quantum Computing Threats -- 2.3 Legacy Security Concepts in 6G -- 2.3.1 Confidentiality, Integrity, and Availability -- 2.3.2 Authentication -- 2.3.3 Access Control -- 2.4 6G Security Innovations -- 2.4.1 AI Integration -- 2.4.2 Quantum Computing Impact -- 2.4.3 Federated Learning Role -- 2.5 Threat Models in 6G Communication -- 2.5.1 Threat-Countering Techniques in 6G Communication -- 2.5.1.1 Cryptographic Methods -- 2.5.1.2 Quantum-Resistant Cryptography -- 2.5.1.3 Homomorphic Encryption -- 2.5.1.4 Entity Attributes -- 2.5.1.5 Biometric Authentication -- 2.5.1.6 Device Fingerprinting 
505 8 |a 2.5.1.7 Intrusion Detection Systems (IDSs) -- 2.6 Authentication Techniques in 6G Communication -- 2.6.1 Handover Authentication -- 2.6.2 Mutual Authentication -- 2.6.3 Physical Layer -- 2.6.4 Deniable Authentication -- 2.6.5 Token-Based Authentication -- 2.6.6 Authentication Using Certificates -- 2.6.7 Key Agreement-Based Validation -- 2.6.8 Multi-Factor Authentication -- 2.7 Future Directions -- 2.7.1 Improving AI Security in 6G and Developing Quantum-Safe Protocols -- 2.7.2 Advancing Federated Learning for Privacy-Preserving Security -- 2.8 Conclusion -- References 
500 |a Chapter 3 Strategies for Ensuring Security and Privacy in 6G Networks 
520 |a Future-proof your knowledge and expertise in telecommunications with this essential guide, which provides a comprehensive analysis of the critical security and privacy challenges in the transition to 6G communication. 
532 1 |3 Wiley  |a "We measure accessibility according to the standards set by the Web Content Accessibility Guidelines (WCAG) 2.2 A/AA, Revised Section 508 of the US Rehabilitation Act, and EN 301 549." Source: https://onlinelibrary.wiley.com/accessibility. Last accessed April 22, 2025 
588 |a Description based on online resource; title from digital title page (viewed on December 03, 2025). 
650 0 |a Wireless communication systems  |x Security measures. 
655 0 |a Electronic books. 
700 1 |a Jain, Parita,  |e editor. 
700 1 |a Aggarwal, Puneet Kumar. 
700 1 |a Singh, Mandeep. 
700 1 |a Singh, Sushil Kumar. 
700 1 |a Singhal, Amit. 
776 0 8 |i Print version:  |a Jain, Parita  |t Security and Privacy in 6G Communication Technology  |d Newark : John Wiley & Sons, Incorporated,c2026  |z 9781394311002 
776 0 8 |i Print version:  |z 1394311001  |z 9781394311002 
856 4 0 |u http://proxy.library.tamu.edu/login?url=https://onlinelibrary.wiley.com/book/10.1002/9781394311057  |z Connect to the full text of this electronic book  |t 0 
955 |a Wiley EBA record 
975 |p Wiley UBCM Full Collection 
976 |a 6005422 
999 f f |i 7e86dba1-e2d3-458c-b157-8105b49a7a4c  |s 79fcea5d-fe18-4ebd-9975-1b5188c7becd  |t 0 
952 f f |a Texas A&M University  |b College Station  |c Electronic Resources  |s evans_pda  |d Available Online  |t 0  |e TK5103.252 .S43 2026  |h Library of Congress classification 
998 f f |a TK5103.252 .S43 2026  |t 0  |l Available Online