Details

Security and Privacy Vision in 6G


Security and Privacy Vision in 6G

A Comprehensive Guide
1. Aufl.

von: Pawani Porambage, Madhusanka Liyanage

103,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 19.07.2023
ISBN/EAN: 9781119875413
Sprache: englisch
Anzahl Seiten: 384

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>SECURITY AND PRIVACY VISION IN 6G</b> <p><b>Prepare for the future of mobile communication with this comprehensive study</b> <p>6G is the next frontier in mobile communication, with development of 6G standards slated to begin as early as 2026. As telecommunications networks become faster and more intelligent, security and privacy concerns are critical. In an increasingly connected world, there is an urgent need for user data to be safeguarded and system security enhanced against a new generation of threats. <p><i>Security and Privacy Vision in 6G</i> provides a comprehensive survey of these threats and the emerging techniques for safeguarding against them. It includes mechanisms for prediction, detection, mitigation, and prevention, such that threats to privacy and security can be forestalled at any stage. Fully engaged with proposed 6G architectures, it is an essential resource for mobile communications professionals looking for a head start on the technology of the future. <p><i>Security and Privacy Vision in 6G</i> readers will also find: <ul><li>Detailed coverage of topics including edge intelligence and cloudification, industrial automation, collaborative robots, and more</li> <li>Treatment balancing the practical and the theoretical</li> <li>An editorial team with decades of international network technology experience in both industry and academia</li></ul> <p><i>Security and Privacy Vision in 6G</i> is a vital reference for network security professionals and for postgraduate and advanced undergraduate students in mobile communications and network security-related fields.
<p>Acronyms xvii</p> <p>About the Authors xix</p> <p>Foreword xx</p> <p>Preface xxii</p> <p>Acknowledgments xxv</p> <p><b>Part I Introduction 1</b></p> <p><b>1 Evolution of Mobile Networks 3</b></p> <p>1.1 Introduction 3</p> <p>1.2 6G Mobile Communication Networks 4</p> <p>1.2.1 6G as Envisioned Today 6</p> <p>1.3 Key Driving Trends Toward 6G 6</p> <p>1.4 6G Requirements/Vision 8</p> <p>1.4.1 6G Development Timeline 10</p> <p>References 12</p> <p><b>2 Key 6G Technologies 15</b></p> <p>2.1 Radio Network Technologies 15</p> <p>2.1.1 Beyond Sub 6 GHz Toward THz Communication 15</p> <p>2.1.2 Nonterrestrial Networks Toward 3D Networking 17</p> <p>2.2 AI/ML/FL 19</p> <p>2.3 DLT/Blockchain 22</p> <p>2.4 Edge Computing 24</p> <p>2.5 Quantum Communication 27</p> <p>2.6 Other New Technologies 29</p> <p>2.6.1 Visible Light Communications 29</p> <p>2.6.2 Large Intelligent Surfaces 30</p> <p>2.6.3 Compressive Sensing 30</p> <p>2.6.4 Zero-Touch Network and Service Management 31</p> <p>2.6.5 Efficient Energy Transfer and Harvesting 32</p> <p>References 33</p> <p><b>3 6G Security Vision 43</b></p> <p>3.1 Overview of 6G Security Vision 43</p> <p>3.1.1 New 6G Requirements 43</p> <p>3.2 6G Security Vision and KPIs 45</p> <p>3.2.1 Security Threat Landscape for 6G Architecture 47</p> <p>References 48</p> <p><b>Part II Security in 6G Architecture 51</b></p> <p><b>4 6G Device Security 53</b></p> <p>4.1 Overview of 6G Devices 53</p> <p>4.2 6G Device Security Challenges 55</p> <p>4.2.1 Growth of Data Collection 55</p> <p>4.2.2 Cloud Connectivity 56</p> <p>4.2.3 Device Capacity 56</p> <p>4.2.4 Ultrasaturated Devices 56</p> <p>4.3 Addressing Device Security in 6G 57</p> <p>References 58</p> <p><b>5 Open RAN and RAN-Core Convergence 59</b></p> <p>5.1 Introduction 59</p> <p>5.2 Open RAN Architecture 62</p> <p>5.3 Threat Vectors and Security Risks Associated with Open RAN 65</p> <p>5.3.1 Threat Taxonomy 65</p> <p>5.3.2 Risks Related to the Process 65</p> <p>5.3.2.1 Prerequisites 65</p> <p>5.3.2.2 General Regulations 67</p> <p>5.3.2.3 Privacy 67</p> <p>5.3.2.4 People 68</p> <p>5.3.3 Risks Related to the Technology 68</p> <p>5.3.3.1 Open Source Software 68</p> <p>5.3.3.2 Radio/Open Interface 70</p> <p>5.3.3.3 Intelligence 71</p> <p>5.3.3.4 Virtualization 73</p> <p>5.3.4 Global Risks 76</p> <p>5.4 Security Benefits of Open RAN 77</p> <p>5.4.1 Open RAN specific 77</p> <p>5.4.1.1 Full Visibility 77</p> <p>5.4.1.2 Selection of Best Modules 78</p> <p>5.4.1.3 Diversity 78</p> <p>5.4.1.4 Modularity 78</p> <p>5.4.1.5 Enforcement of Security Controls 79</p> <p>5.4.1.6 Open Interfaces 79</p> <p>5.4.1.7 Open Source Software 79</p> <p>5.4.1.8 Automation 79</p> <p>5.4.1.9 Open Standards 80</p> <p>5.4.2 V-RAN Specific 80</p> <p>5.4.2.1 Isolation 80</p> <p>5.4.2.2 Increased Scalability for Security Management 80</p> <p>5.4.2.3 Control Trust 80</p> <p>5.4.2.4 Less Dependency Between hardware [HW] and SW 80</p> <p>5.4.2.5 Private Network 81</p> <p>5.4.2.6 More Secure Storage of Key Material 81</p> <p>5.4.3 5G Networks Related 81</p> <p>5.4.3.1 Edge Oriented 81</p> <p>5.4.3.2 Simpler Security Model 81</p> <p>5.5 Conclusion 82</p> <p>References 82</p> <p><b>6 Edge Intelligence 89</b></p> <p>6.1 Overview of Edge Intelligence 89</p> <p>6.2 State-of-the-Art Related to 5G 92</p> <p>6.2.1 Denial of Service (DOS) 92</p> <p>6.2.2 Man-in-the-Middle (MitM) Attack 92</p> <p>6.2.3 Privacy Leakage 93</p> <p>6.3 State-of-the-Art Related to 6G 94</p> <p>6.3.1 Training Dataset Manipulation 94</p> <p>6.3.2 Interception of Private Information 95</p> <p>6.3.3 Attacks on Learning Agents 95</p> <p>6.4 Edge Computing Security in Autonomous Driving 95</p> <p>6.5 Future and Challenges 96</p> <p>References 97</p> <p><b>7 Specialized 6G Networks and Network Slicing 103</b></p> <p>7.1 Overview of 6G Specialized Networks 103</p> <p>7.2 Network Slicing in 6G 104</p> <p>7.2.1 Trust in Network Slicing 105</p> <p>7.2.2 Privacy Aspects in Network Slicing 106</p> <p>7.2.3 Solutions for Privacy and Trust in NS 107</p> <p>References 107</p> <p><b>8 Industry 5.0 109</b></p> <p>8.1 Introduction 109</p> <p>8.2 Motivations Behind the Evolution of Industry 5.0 111</p> <p>8.3 Key Features of Industry 5.0 112</p> <p>8.3.1 Smart Additive Manufacturing 112</p> <p>8.3.2 Predictive Maintenance 113</p> <p>8.3.3 Hyper Customization 113</p> <p>8.3.4 Cyber-Physical Cognitive Systems 114</p> <p>8.4 Security of Industry 5.0 115</p> <p>8.4.1 Security Issues of Industry 5.0 116</p> <p>8.5 Privacy of Industry 5.0 118</p> <p>References 120</p> <p><b>Part III Security in 6G Use Cases 125</b></p> <p><b>9 Metaverse Security in 6G 127</b></p> <p>9.1 Overview of Metaverse 127</p> <p>9.2 What Is Metaverse? 128</p> <p>9.2.1 Metaverse Architecture 129</p> <p>9.2.2 Key Characteristics of Metaverse 130</p> <p>9.2.3 Role of 6G in Metaverse 131</p> <p>9.3 Security Threats in Metaverse 132</p> <p>9.4 Countermeasures for Metaverse Security Threats 133</p> <p>9.5 New Trends in Metaverse Security 134</p> <p><b>10 Society 5.0 and Security 135</b></p> <p>10.1 Industry and Society Evolution 135</p> <p>10.1.1 Industry 4.0 136</p> <p>10.1.2 Society 5.0 140</p> <p>10.2 Technical Enablers and Challenges 144</p> <p>10.2.1 Dependable Wireless Connectivity 144</p> <p>10.2.1.1 New Spectrum and Extreme Massive MIMO 144</p> <p>10.2.1.2 In-X Subnetworks 146</p> <p>10.2.1.3 Semantic Communication 146</p> <p>10.2.2 Integrated Communication, Control, Computation, and Sensing 147</p> <p>10.2.2.1 CoCoCo 147</p> <p>10.2.2.2 JCAS 148</p> <p>10.2.3 Intelligence Everywhere 149</p> <p>10.2.4 Energy Harvesting and Transfer 149</p> <p>10.2.4.1 Energy Harvesting 149</p> <p>10.2.4.2 Wireless Power Transfer 150</p> <p>10.3 Security in Society 5.0 151</p> <p>References 152</p> <p><b>11 6G-Enabled Internet of Vehicles 157</b></p> <p>11.1 Overview of V2X Communication and IoV 157</p> <p>11.2 IoV Use Cases 159</p> <p>11.3 Connected Autonomous Vehicles (CAV) 160</p> <p>11.4 Unmanned Aerial Vehicles in Future IoV 161</p> <p>11.5 Security Landscape for IoV 161</p> <p>11.5.1 Security Threats 162</p> <p>11.5.2 Security Requirements 163</p> <p>References 164</p> <p><b>12 Smart Grid 2.0 Security 167</b></p> <p>12.1 Introduction 167</p> <p>12.2 Evolution of SG 2.0 168</p> <p>12.3 Smart Grid 2.0 169</p> <p>12.3.1 Comparison of Smart Grids 1.0 and 2.0 170</p> <p>12.4 Role of 6G in SG 2.0 171</p> <p>12.5 Security Challenges of SG 2.0 172</p> <p>12.5.1 Physical Attacks 172</p> <p>12.5.2 Software Attacks 174</p> <p>12.5.3 Network Attacks 174</p> <p>12.5.4 Attacks to the Controller 175</p> <p>12.5.5 Encryption-Related Attacks 176</p> <p>12.5.6 AI- and ML-Related Attacks 176</p> <p>12.5.7 Stability and Reliability of Power Supply 177</p> <p>12.5.8 Secure and Transparent Energy Trading Among Prosumers and Consumers 178</p> <p>12.5.9 Efficient and Reliable Communication Topology for Information and Control Signal Exchange 179</p> <p>12.6 Privacy Issues of SG2. 0 179</p> <p>12.7 Trust Management 180</p> <p>12.8 Security and Privacy Standardization on SG 2.0 181</p> <p>References 182</p> <p><b>Part IV Privacy in 6G Vision 185</b></p> <p><b>13 6G Privacy 187</b></p> <p>13.1 Introduction 187</p> <p>13.2 Privacy Taxonomy 188</p> <p>13.3 Privacy in Actions on Data 189</p> <p>13.3.1 Information Collection 189</p> <p>13.3.2 Information Processing 190</p> <p>13.3.3 Information Dissemination 191</p> <p>13.3.4 Invasion 191</p> <p>13.4 Privacy Types for 6G 191</p> <p>13.4.1 Data 191</p> <p>13.4.2 Actions and Personal Behavior 192</p> <p>13.4.3 Image and Video 192</p> <p>13.4.4 Communication 193</p> <p>13.4.5 Location 193</p> <p>13.5 6G Privacy Goals 194</p> <p>13.5.1 Ensure of Privacy-Protected Big Data 194</p> <p>13.5.2 Privacy Guarantees for Edge Networks 194</p> <p>13.5.3 Achieving Balance Between Privacy and Performance of Services 195</p> <p>13.5.4 Standardization of Privacy in Technologies, and Applications 195</p> <p>13.5.5 Balance the Interests in Privacy Protection in Global Context 196</p> <p>13.5.6 Achieving Proper Utilization of Interoperability and Data Portability 196</p> <p>13.5.7 Quantifying Privacy and Privacy Violations 197</p> <p>13.5.7.1 Achieving Privacy Protected AI-Driven Automated Network Management Operations 198</p> <p>13.5.8 Getting Explanations of AI Actions for Privacy Requirements 198</p> <p>References 198</p> <p><b>14 6G Privacy Challenges and Possible Solution 201</b></p> <p>14.1 Introduction 201</p> <p>14.2 6G Privacy Challenges and Issues 202</p> <p>14.2.1 Advanced 6G Applications with New Privacy Requirements 204</p> <p>14.2.2 Privacy Preservation Limitations for B5G/6G Control and Orchestration Layer 204</p> <p>14.2.3 Privacy Attacks on AI Models 205</p> <p>14.2.4 Privacy Requirements in Cloud Computing and Storage Environments 206</p> <p>14.2.5 Privacy Issues in Edge Computing and Edge AI 206</p> <p>14.2.6 Cost on Privacy Enhancements 207</p> <p>14.2.7 Limited Availability of Explainable AI (XAI) Techniques 208</p> <p>14.2.8 Ambiguity in Responsibility of Data Ownership 209</p> <p>14.2.9 Data Communication Confidentiality Issues 209</p> <p>14.2.10 Private Data Access Limitations 210</p> <p>14.2.11 Privacy Differences Based on Location 210</p> <p>14.2.12 Lack of Understanding of Privacy Rights and Threats in General Public 210</p> <p>14.2.13 Difficulty in Defining Levels and Indicators for Privacy 211</p> <p>14.2.13.1 Proper Evaluation of Potential Privacy Leakages from Non-personal Data 211</p> <p>14.3 Privacy Solutions for 6G 212</p> <p>14.3.1 Privacy-Preserving Decentralized AI 212</p> <p>14.3.2 Edge AI 212</p> <p>14.3.3 Intelligent Management with Privacy 213</p> <p>14.3.4 XAI for Privacy 213</p> <p>14.3.5 Privacy Measures for Personally Identifiable Information 214</p> <p>14.3.6 Blockchain-Based Solutions 215</p> <p>14.3.7 Lightweight and Quantum Resistant Encryption Mechanisms 215</p> <p>14.3.8 Homomorphic Encryption 216</p> <p>14.3.9 Privacy-Preserving Data Publishing Techniques 217</p> <p>14.3.9.1 Syntactic Anonymization 218</p> <p>14.3.9.2 Differential Privacy 218</p> <p>14.3.10 Privacy by Design and Privacy by Default 219</p> <p>14.3.11 Regulation of Government, Industry, and Consumer 220</p> <p>14.3.12 Other Solutions 221</p> <p>14.3.12.1 Location Privacy Considerations 221</p> <p>14.3.12.2 Personalized Privacy 222</p> <p>14.3.12.3 Fog Computing Privacy 222</p> <p>References 222</p> <p><b>15 Legal Aspects and Security Standardization 227</b></p> <p>15.1 Legal 227</p> <p>15.2 Security Standardization 229</p> <p>15.2.1 ETSI 229</p> <p>15.2.2 ITU-T 230</p> <p>15.2.3 3GPP 230</p> <p>15.2.4 NIST 231</p> <p>15.2.5 IETF 231</p> <p>15.2.6 5G PPP 231</p> <p>15.2.7 NGMN 231</p> <p>15.2.8 IEEE 232</p> <p>References 232</p> <p><b>Part V Security in 6G Technologies 235</b></p> <p><b>16 Distributed Ledger Technologies (DLTs) and Blockchain 237</b></p> <p>16.1 Introduction 237</p> <p>16.2 What Is Blockchain 238</p> <p>16.2.1 Types of Blockchain 239</p> <p>16.3 What Is Smart Contracts 240</p> <p>16.4 Salient Features of Blockchain 240</p> <p>16.5 Key Security Challenges Which Blockchain Can Solve 242</p> <p>16.5.1 Role of Blockchain 242</p> <p>16.6 Key Privacy Challenges Which Blockchain Can Solve 244</p> <p>16.6.1 Key Challenges 244</p> <p>16.6.2 Role of Blockchain 245</p> <p>16.7 Threat Landscape of Blockchain 246</p> <p>16.8 Possible Solutions to Secure 6G Blockchains 248</p> <p>References 249</p> <p><b>17 AI/ML for 6G Security 257</b></p> <p>17.1 Overview of 6G Intelligence 257</p> <p>17.2 AI for 6G Security 259</p> <p>17.3 Use of AI to Identify/Mitigate Pre-6G Security Issues 259</p> <p>17.4 AI to Mitigate Security Issues of 6G Architecture 261</p> <p>17.5 AI to Mitigate Security Issues of 6G Technologies 262</p> <p>17.6 Security Issues in AI 263</p> <p>17.7 Using AI to Attack 6G 263</p> <p>References 264</p> <p><b>18 Role of Explainable AI in 6G Security 267</b></p> <p>18.1 What Is Explainable AI (XAI) 267</p> <p>18.1.1 Terminologies of XAI 268</p> <p>18.1.2 Taxonomy of XAI 269</p> <p>18.1.3 XAI Methods 270</p> <p>18.2 Use of XAI for 6G 273</p> <p>18.3 XAI for 6G Security 275</p> <p>18.3.1 XAI for 6G Devices and IoT Security 277</p> <p>18.3.2 XAI for 6G RAN 277</p> <p>18.3.3 XAI for 6G Edge 278</p> <p>18.3.4 XAI for 6G Core and Backhaul 278</p> <p>18.3.5 XAI for 6G Network Automation 279</p> <p>18.4 New Security Issues of XAI 280</p> <p>18.4.1 Increased Vulnerability to Adversarial ML Attacks 280</p> <p>18.4.2 Difficulty to Design Secure ML Applications 281</p> <p>18.4.3 New Attack Vector and Target 283</p> <p>References 284</p> <p><b>19 Zero Touch Network and Service Management (ZSM) Security 291</b></p> <p>19.1 Introduction 291</p> <p>19.1.1 Need of Zero-Touch Network and Service Management 292</p> <p>19.1.2 Importance of ZSM for 5G and Beyond 292</p> <p>19.2 ZSM Reference Architecture 293</p> <p>19.2.1 Components 294</p> <p>19.2.1.1 Management Services 294</p> <p>19.2.1.2 Management Functions 295</p> <p>19.2.1.3 Management Domains 295</p> <p>19.2.1.4 The E2E Service Management Domain 295</p> <p>19.2.1.5 Integration Fabric 295</p> <p>19.2.1.6 Data Services 296</p> <p>19.3 Security Aspects 296</p> <p>19.3.1 ML/AI-Based Attacks 296</p> <p>19.3.1.1 White-Box Attack 297</p> <p>19.3.1.2 Black-Box Attack 297</p> <p>19.3.2 Open API Security Threats 297</p> <p>19.3.2.1 Parameter Attacks 298</p> <p>19.3.3 Intent-Based Security Threats 298</p> <p>19.3.3.1 Data Exposure 298</p> <p>19.3.3.2 Tampering 299</p> <p>19.3.4 Automated Closed-Loop Network-Based Security Threats 299</p> <p>19.3.4.1 MITM Attack 299</p> <p>19.3.4.2 Deception Attacks 299</p> <p>19.3.5 Threats Due to Programmable Network Technologies 299</p> <p>19.3.6 Possible Threats on ZSM Framework Architecture 300</p> <p>References 300</p> <p><b>20 Physical Layer Security 305</b></p> <p>20.1 Introduction 305</p> <p>20.2 Physical Layer Security Background 306</p> <p>20.2.1 PLS Fundamentals 306</p> <p>20.2.2 PLS Approaches 307</p> <p>20.2.2.1 Confidentiality (Edgar) 307</p> <p>20.2.2.2 Physical Layer Authentication 308</p> <p>20.2.2.3 Secret Key Generation 309</p> <p>20.3 The Prospect of PLS in 6G 310</p> <p>20.3.1 Application Scenarios of PLS in 6G 311</p> <p>20.3.2 6G Technologies and PLS 312</p> <p>20.3.2.1 IRS 312</p> <p>20.3.2.2 Unmanned Aerial Vehicles 313</p> <p>20.3.3 Cell-Free mMIMO 315</p> <p>20.3.4 Visible Light Communication (VLC) 316</p> <p>20.3.5 Terahertz Communication 317</p> <p>20.3.6 Joint Communications and Sensing 318</p> <p>References 319</p> <p><b>21 Quantum Security and Postquantum Cryptography 327</b></p> <p>21.1 Overview of 6G and Quantum Computing 327</p> <p>21.2 Quantum Computing 328</p> <p>21.3 Quantum Security 329</p> <p>21.3.1 Quantum Key Distribution 330</p> <p>21.3.2 Information-Theoretic Security 331</p> <p>21.4 Postquantum Cryptography 332</p> <p>21.4.1 Background 332</p> <p>21.4.2 PQC Methods 333</p> <p>21.4.3 PQC Standardization 335</p> <p>21.4.4 Challenges with PQC 335</p> <p>21.4.5 Future Directions of PQC 336</p> <p>21.4.6 6G and PQC 337</p> <p>References 337</p> <p><b>Part VI Concluding Remarks 341</b></p> <p><b>22 Concluding Remarks 343</b></p> <p>Index 345</p>
<p><b>Pawani Porambage, D.Sc</b> is Senior Scientist at the VTT Technical Research Centre of Finland and a Docent at University of Oulu. She has nearly a decade of network security experience and has authored or co-authored more than sixty publications. <p><b>Madhusanka Liyanage, D.Sc</b> is Assistant Professor in the School of Computer Science, University College Dublin, Ireland. He received the 2020 IEEE ComSoc Outstanding Young Researcher Award and has published widely on 6G, network security, and related subjects.
<p><b>Prepare for the future of mobile communication with this comprehensive study</b> <p>6G is the next frontier in mobile communication, with development of 6G standards slated to begin as early as 2026. As telecommunications networks become faster and more intelligent, security and privacy concerns are critical. In an increasingly connected world, there is an urgent need for user data to be safeguarded and system security enhanced against a new generation of threats. <p><i>Security and Privacy Vision in 6G</i> provides a comprehensive survey of these threats and the emerging techniques for safeguarding against them. It includes mechanisms for prediction, detection, mitigation, and prevention, such that threats to privacy and security can be forestalled at any stage. Fully engaged with proposed 6G architectures, it is an essential resource for mobile communications professionals looking for a head start on the technology of the future. <p><i>Security and Privacy Vision in 6G</i> readers will also find: <ul><li>Detailed coverage of topics including edge intelligence and cloudification, industrial automation, collaborative robots, and more</li> <li>Treatment balancing the practical and the theoretical</li> <li>An editorial team with decades of international network technology experience in both industry and academia</li></ul> <p><i>Security and Privacy Vision in 6G</i> is a vital reference for network security professionals and for postgraduate and advanced undergraduate students in mobile communications and network security-related fields.

Diese Produkte könnten Sie auch interessieren:

Open RAN Explained
Open RAN Explained
von: Jyrki T. J. Penttinen, Michele Zarri, Dongwook Kim
PDF ebook
102,99 €
Open RAN Explained
Open RAN Explained
von: Jyrki T. J. Penttinen, Michele Zarri, Dongwook Kim
EPUB ebook
102,99 €
DCC for Railway Modellers
DCC for Railway Modellers
von: Fiona Forty
EPUB ebook
22,49 €