Security and privacy in 6G communication technology /

Future-proof your knowledge and expertise in telecommunications with this essential guide, which provides a comprehensive analysis of the critical security and privacy challenges in the transition to 6G communication.

Bibliographic Details
Other Authors: Jain, Parita (Editor), Aggarwal, Puneet Kumar, Singh, Mandeep, Singh, Sushil Kumar, Singhal, Amit
Format: eBook
Language:English
Published: Hoboken, NJ : Beverly, MA : John Wiley & Sons, Inc. ; Scriverner Publishing LLC, 2026.
Subjects:
Online Access:Connect to the full text of this electronic book
Table of Contents:
  • Cover
  • Series Page
  • Title Page
  • Copyright Page
  • Contents
  • Preface
  • Chapter 1 A Comprehensive Study of Security and Privacy Issues of 6G Wireless Communications Networks
  • 1.1 Introduction
  • 1.1.1 History of Wireless Communication
  • 1.1.2 Overview of 6G Networks
  • 1.1.2.1 Advancement in 6G Technology
  • 1.1.2.2 Importance of Developing 6G Technology
  • 1.1.3 Features of 6G Networks
  • 1.1.4 Applications of 6G Networks
  • 1.1.5 Disadvantages of 6G Networks
  • 1.1.6 Challenges of 6G Networks
  • 1.2 Security Evolution of Communication Networks
  • 1.3 Privacy and Security Issues with 6G Networks
  • 1.3.1 Privacy Challenges in 6G Networks
  • 1.3.2 Security Challenges in 6G Networks
  • 1.4 Proposed Security Solution for 6G Networks
  • 1.4.1 Distributed and Scalable AI/ML Security
  • 1.4.2 Distributed Ledger Technology (DLT)
  • 1.4.3 Quantum Security
  • 1.4.4 Physical Layer Security (PLS)
  • 1.5 Conclusion
  • References
  • Chapter 2 Key Security Issues and Solutions in 6G Communications
  • 2.1 Introduction
  • 2.1.1 Security Considerations for 6G Communication
  • 2.1.2 Survey Objectives
  • 2.1.3 Overview of 6G Communication Paradigm
  • 2.1.3.1 Evolution from 5G to 6G
  • 2.1.3.2 Key Features of 6G Networks
  • 2.1.4 Emerging Technologies in 6G
  • 2.2 Security Challenges for 6G Communications
  • 2.2.1 Security Implications
  • 2.2.2 AI and Machine Learning Integration: Security Concerns
  • 2.2.3 Network Slicing: Isolation and Security Issues
  • 2.2.4 Security Implications with Ultra-Low Latency
  • 2.2.5 Terahertz Communications
  • 2.2.6 Unique Security Concerns
  • 2.2.7 Integration of Internet of Things and Edge Devices
  • 2.2.8 Expanded Attack Surface and Privacy Concerns
  • 2.2.9 User Data and Anonymity
  • 2.2.10 Quantum Computing Threats
  • 2.3 Legacy Security Concepts in 6G
  • 2.3.1 Confidentiality, Integrity, and Availability
  • 2.3.2 Authentication
  • 2.3.3 Access Control
  • 2.4 6G Security Innovations
  • 2.4.1 AI Integration
  • 2.4.2 Quantum Computing Impact
  • 2.4.3 Federated Learning Role
  • 2.5 Threat Models in 6G Communication
  • 2.5.1 Threat-Countering Techniques in 6G Communication
  • 2.5.1.1 Cryptographic Methods
  • 2.5.1.2 Quantum-Resistant Cryptography
  • 2.5.1.3 Homomorphic Encryption
  • 2.5.1.4 Entity Attributes
  • 2.5.1.5 Biometric Authentication
  • 2.5.1.6 Device Fingerprinting
  • 2.5.1.7 Intrusion Detection Systems (IDSs)
  • 2.6 Authentication Techniques in 6G Communication
  • 2.6.1 Handover Authentication
  • 2.6.2 Mutual Authentication
  • 2.6.3 Physical Layer
  • 2.6.4 Deniable Authentication
  • 2.6.5 Token-Based Authentication
  • 2.6.6 Authentication Using Certificates
  • 2.6.7 Key Agreement-Based Validation
  • 2.6.8 Multi-Factor Authentication
  • 2.7 Future Directions
  • 2.7.1 Improving AI Security in 6G and Developing Quantum-Safe Protocols
  • 2.7.2 Advancing Federated Learning for Privacy-Preserving Security
  • 2.8 Conclusion
  • References