Security and privacy in 6G communication technology /
Future-proof your knowledge and expertise in telecommunications with this essential guide, which provides a comprehensive analysis of the critical security and privacy challenges in the transition to 6G communication.
| Other Authors: | , , , , |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Hoboken, NJ : Beverly, MA :
John Wiley & Sons, Inc. ; Scriverner Publishing LLC,
2026.
|
| Subjects: | |
| Online Access: | Connect to the full text of this electronic book |
Table of Contents:
- Cover
- Series Page
- Title Page
- Copyright Page
- Contents
- Preface
- Chapter 1 A Comprehensive Study of Security and Privacy Issues of 6G Wireless Communications Networks
- 1.1 Introduction
- 1.1.1 History of Wireless Communication
- 1.1.2 Overview of 6G Networks
- 1.1.2.1 Advancement in 6G Technology
- 1.1.2.2 Importance of Developing 6G Technology
- 1.1.3 Features of 6G Networks
- 1.1.4 Applications of 6G Networks
- 1.1.5 Disadvantages of 6G Networks
- 1.1.6 Challenges of 6G Networks
- 1.2 Security Evolution of Communication Networks
- 1.3 Privacy and Security Issues with 6G Networks
- 1.3.1 Privacy Challenges in 6G Networks
- 1.3.2 Security Challenges in 6G Networks
- 1.4 Proposed Security Solution for 6G Networks
- 1.4.1 Distributed and Scalable AI/ML Security
- 1.4.2 Distributed Ledger Technology (DLT)
- 1.4.3 Quantum Security
- 1.4.4 Physical Layer Security (PLS)
- 1.5 Conclusion
- References
- Chapter 2 Key Security Issues and Solutions in 6G Communications
- 2.1 Introduction
- 2.1.1 Security Considerations for 6G Communication
- 2.1.2 Survey Objectives
- 2.1.3 Overview of 6G Communication Paradigm
- 2.1.3.1 Evolution from 5G to 6G
- 2.1.3.2 Key Features of 6G Networks
- 2.1.4 Emerging Technologies in 6G
- 2.2 Security Challenges for 6G Communications
- 2.2.1 Security Implications
- 2.2.2 AI and Machine Learning Integration: Security Concerns
- 2.2.3 Network Slicing: Isolation and Security Issues
- 2.2.4 Security Implications with Ultra-Low Latency
- 2.2.5 Terahertz Communications
- 2.2.6 Unique Security Concerns
- 2.2.7 Integration of Internet of Things and Edge Devices
- 2.2.8 Expanded Attack Surface and Privacy Concerns
- 2.2.9 User Data and Anonymity
- 2.2.10 Quantum Computing Threats
- 2.3 Legacy Security Concepts in 6G
- 2.3.1 Confidentiality, Integrity, and Availability
- 2.3.2 Authentication
- 2.3.3 Access Control
- 2.4 6G Security Innovations
- 2.4.1 AI Integration
- 2.4.2 Quantum Computing Impact
- 2.4.3 Federated Learning Role
- 2.5 Threat Models in 6G Communication
- 2.5.1 Threat-Countering Techniques in 6G Communication
- 2.5.1.1 Cryptographic Methods
- 2.5.1.2 Quantum-Resistant Cryptography
- 2.5.1.3 Homomorphic Encryption
- 2.5.1.4 Entity Attributes
- 2.5.1.5 Biometric Authentication
- 2.5.1.6 Device Fingerprinting
- 2.5.1.7 Intrusion Detection Systems (IDSs)
- 2.6 Authentication Techniques in 6G Communication
- 2.6.1 Handover Authentication
- 2.6.2 Mutual Authentication
- 2.6.3 Physical Layer
- 2.6.4 Deniable Authentication
- 2.6.5 Token-Based Authentication
- 2.6.6 Authentication Using Certificates
- 2.6.7 Key Agreement-Based Validation
- 2.6.8 Multi-Factor Authentication
- 2.7 Future Directions
- 2.7.1 Improving AI Security in 6G and Developing Quantum-Safe Protocols
- 2.7.2 Advancing Federated Learning for Privacy-Preserving Security
- 2.8 Conclusion
- References