Зарегистрироваться
Восстановить пароль
FAQ по входу

Porambage Pawani, Liyanage Madhusanka. Security and Privacy Vision in 6G: A Comprehensive Guid

  • Файл формата zip
  • размером 20,58 МБ
  • содержит документ формата epub
  • Добавлен пользователем
  • Описание отредактировано
Porambage Pawani, Liyanage Madhusanka. Security and Privacy Vision in 6G: A Comprehensive Guid
Wiley-IEEE Press, 2023. — 387 p. — ISBN 9781119875420.
6G is the next frontier in mobile communication, with development of 6G standards slated to begin as early as 2026. As telecommunications networks become faster and more intelligent, security and privacy concerns are critical. In an increasingly connected world, there is an urgent need for user data to be safeguarded and system security enhanced against a new generation of threats. Security and Privacy Vision in 6G provides a comprehensive survey of these threats and the emerging techniques for safeguarding against them. It includes mechanisms for prediction, detection, mitigation, and prevention, such that threats to privacy and security can be forestalled at any stage. Fully engaged with proposed 6G architectures, it is an essential resource for mobile communications professionals looking for a head start on the technology of the future. Security and Privacy Vision in 6G is a vital reference for network security professionals and for postgraduate and advanced undergraduate students in mobile communications and network security-related fields.
Introduction
Evolution of Mobile Networks
Key 6G Technologies
6G Security Vision
Security in 6G Architecture
6G Device Security
Open RAN and RAN‐Core Convergence
Edge Intelligence
Specialized 6G Networks and Network Slicing
Industry 5.0
Security in 6G Use Cases
Metaverse Security in 6G
Society 5.0 and Security
6G‐Enabled Internet of Vehicles
Smart Grid 2.0 Security
Privacy in 6G Vision
6G Privacy
6G Privacy Challenges and Possible Solution
Legal Aspects and Security Standardization
Security in 6G Technologies
Distributed Ledger Technologies (DLTs) and Blockchain
AI/ML for 6G Security
Role of Explainable AI in 6G Security
Zero Touch Network and Service Management (ZSM) Security
Physical Layer Security*
Quantum Security and Postquantum Cryptography
Concluding Remarks
Concluding Remarks
  • Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.
  • Регистрация