图书简介
Whilst 5G coverage is not yet fully implemented, the vision for the sixth generation (6G) of mobile communication is already projected. It is envisioned that the 6G standardization will start somewhere in 2026 with its most significant vision being the added intelligence in telecommunication networks. 6G security needs to be built to not guard against threats to the foreseen 6G networks, but also to address the increased and evolving threat landscape. Adequate security will include prediction, detection, mitigation, and prevention mechanisms, and the ability to limit the propagation of such vulnerabilities with greater intelligence, visibility and real time protection. Security and privacy are two closely-coupled topics where security relates to the safeguarding of the actual data and privacy ensures the covering up of the identities related to that data. This book provides a reference to a comprehensive study of security and privacy of the 6G vision, offering a roadmap to the security and privacy threats of 6G and possible mechanisms to protect them. It covers the critical security considerations in the proposed 6G architectures and 6G use cases and how to relate them with the novel technologies.
Foreword Preface 0.1 Book Organization Acknowledgments Acronyms 1 Evolution of Mobile Networks 1.1 Introduction 1.2 6G Mobile Communication Networks 1.2.1 6G as Envisioned Today 1.3 Key Driving Trends Towards 6G 1.4 6G Requirements/Vision 1.4.1 6G Development Timeline 2 Key 6G Technologies 2.1 Radio Network Technologies 2.1.1 Beyond sub 6 GHz towards THz Communication 2.1.2 Non-Terrestrial Networks Towards 3D Networking 2.2 AI/ML/FL 2.3 DLT/Blockchain 2.4 Edge Computing 2.5 Quantum Communication 2.6 Other New Technologies 2.6.1 Visible Light Communications 2.6.2 Large Intelligent Surfaces 2.6.3 Compressive Sensing 2.6.4 Zero-touch network and Service Management 2.6.5 Efficient Energy Transfer and Harvesting 3 6G Security Vision 3.1 Overview of 6G Security Vision 3.1.1 New 6G Requirements 3.2 6G Security Vision and KPIs 3.2.1 Security Threat Landscape for 6G Architecture 4 6G Device Security 4.1 Overview of 6G devices 4.2 6G Device Security Challenges 4.2.1 Growth of Data Collection 4.2.2 Cloud Connectivity 4.2.3 Device Capacity 4.2.4 Ultra Saturated Devices 4.3 Addressing Device Security in 6G 5 Open RAN and RAN-Core convergence 5.1 Introduction 5.2 Open RAN Architecture 5.3 Threat Vectors and Security Risks Associated with Open RAN 5.3.1 Threat Taxonomy 5.3.2 Risks related to the Process 5.3.3 Risks related to the Technology 5.3.4 Global Risks 5.4 Security Benefits of Open RAN 5.4.1 Open RAN specific 5.4.2 V-RAN specific 5.4.3 5G networks Related 5.5 Conclusion 6 Edge intelligence 6.1 Overview of edge intelligence 6.2 State-of-the-art related to 5G 6.2.1 Denial of Service (DOS) 6.2.2 Man-in-the-Middle (MitM) Attack 6.2.3 Privacy leakage 6.3 State-of-the-art related to 6G 6.3.1 Training dataset manipulation 6.3.2 Interception of Private Information 6.3.3 Attacks on learning Agents 6.4 Edge computing security in autonomous driving 6.5 Future and challenges 7 Specialized 6G Networks and Network Slicing 7.1 Overview of 6G Specialized Networks 7.2 Network Slicing in 6G 7.2.1 Trust in Network Slicing 7.2.2 Privacy Aspects in Network Slicing 7.2.3 Solutions for Privacy and Trust in NS 8 Industry 5.0 8.1 Introduction 8.2 Motivations behind the Evolution of Industry 5.0 8.3 Key Features of Industry 5.0 8.3.1 Smart Additive Manufacturing 8.3.2 Predictive Maintenance 8.3.3 Hyper Customization 8.3.4 Cyber Physical Cognitive Systems 8.4 Security of Industry 5.0 8.4.1 Security Issues of Industry 5.0 8.5 Privacy of Industry 5.0 9 Metaverse Security in 6G 9.1 Overview of Metaverse 9.2 What is Metarverse? 9.2.1 Metaverse architecture 9.2.2 Key characteristics of metaverse 9.2.3 Role of 6G in Metaverse 9.3 Security Threats in metaverse 9.4 Countermeasures for metaverse security threats 9.5 New trends in metaverse security 10 Society 5.0 and Security 10.1 Industry and Society Evolution 10.1.1 Industry 4.0 10.1.2 Society 5.0 10.2 Technical Enablers and Challenges 10.2.1 Dependable Wireless Connectivity 10.2.2 Integrated Communication, Control, Computation, and Sensing 10.2.3 Intelligence Everywhere 10.2.4 Energy Harvesting and Transfer 10.3 Security in Society 5.0 11 6G-enabled Internet of Vehicles 11.1 Overview of V2X Communication and IoV 11.2 IoV Use Cases 11.3 Connected Autonomous Vehicles (CAV) 11.4 Unmanned Aerial Vehicles in Future IoV 11.5 Security Landscape for IoV 11.5.1 Security Threats 11.5.2 Security Requirements 12 Smart Grid 2.0 Security 12.1 Introduction 12.2 Evolution of SG 2.0 12.3 Smart Grid 2.0 12.3.1 Comparison of Smart Grid 1.0 and 2.0 12.4 Role of 6G in SG 2.0 12.5 Security Challenges of SG 2.0 12.5.1 Physical Attacks 12.5.2 Software Attacks 12.5.3 Network Attacks 12.5.4 Attacks to the Controller 12.5.5 Encryption related Attacks 12.5.6 AI and ML related Attacks 12.5.7 Stability and Reliability of power supply 12.5.8 Secure and transparent energy trading among pro-sumers and consumers 12.5.9 Efficient and reliable communication topology for information and control signal exchange 12.6 Privacy issues of SG2.0 12.7 Trust Management 12.8 Security and Privacy Standardization on SG 2.0 13 6G Privacy 13.1 Introduction 13.2 Privacy Taxonomy 13.3 Privacy in Actions on Data 13.3.1 Information Collection 13.3.2 Information Processing 13.3.3 Information Dissemination 13.3.4 Invasion 13.4 Privacy Types for 6G 13.4.1 Data 13.4.2 Actions and Personal Behaviour 13.4.3 Image and Video 13.4.4 Communication 13.4.5 Location 13.5 6G Privacy goals 13.5.1 Ensure of privacy-protected big data 13.5.2 Privacy guarantees for edge networks 13.5.3 Achieving balance between privacy and performance of services 13.5.4 Standardization of privacy in technologies, and applications 13.5.5 Balance the interests in privacy protection in global context 13.5.6 Achieving proper utilization of interoperability and data portability 13.5.7 Quantifying privacy and privacy violations 13.5.8 Getting explanations of AI actions for privacy requirements 14 6G Privacy Challenges and Possible Solution 14.1 Introduction 14.2 6G Privacy Challenges and Issues 14.2.1 Advanced 6G applications with new privacy requirements 14.2.2 Privacy preservation limitations for B5G/6G control and orchestration layer 14.2.3 Privacy attacks on AI models 14.2.4 Privacy requirements in cloud computing and storage environments 14.2.5 Privacy issues in edge computing and Edge AI 14.2.6 Cost on privacy enhancements 14.2.7 Limited availability of Explainable AI (XAI) techniques 14.2.8 Ambiguity in responsibility of data ownership 14.2.9 Data communication confidentiality issues 14.2.10 Private Data Access Limitations 14.2.11 Privacy differences based on location 14.2.12 Lack of understanding of privacy rights and threats in general public 14.2.13 Difficulty in defining levels and indicators for privacy 14.3 Privacy Solutions for 6G 14.3.1 Privacy-preserving decentralized AI 14.3.2 Edge AI 14.3.3 Intelligent management with privacy 14.3.4 XAI for privacy 14.3.5 Privacy measures for Personally Identifiable Information 14.3.6 Blockchain-based Solutions 14.3.7 Lightweight and quantum resistant encryption mechanisms 14.3.8 Homomorphic Encryption 14.3.9 Privacy-preserving data publishing techniques 14.3.10 Privacy by design and Privacy by default 14.3.11 Regulation of Government, Industry, and Consumer 14.3.12 Other solutions 15 Legal Aspects and Security Standardization 15.1 Legal 15.2 Security Standardization 15.2.1 ETSI 15.2.2 ITU-T 15.2.3 3GPP 15.2.4 NIST 15.2.5 IETF 15.2.6 5G PPP 15.2.7 NGMN 15.2.8 IEEE 16 Distributed Ledger Technologies (DLTs) and Blockchain 16.1 Introduction 16.2 What is DLT 16.3 What is Blockchain 16.3.1 Types of Blockchain 16.4 What is Smart Contracts 16.5 Salient Features of Blockchain 16.6 Key Security Challenges which Blockchain can Solve 16.6.1 Role of Blockchain 16.7 Key Privacy Challenges which Blockchain can Solve 16.7.1 Key Challenges 16.7.2 Role of Blockchain 16.8 Threat Landscape of Blockchain 16.9 Possible Solutions to secure 6G Blockchains 17 AI/ML for 6G Security 17.1 Overview of 6G intelligence 17.2 AI for 6G Security 17.3 Use of AI to Identify/Mitigate Pre-6G Security Issues 17.4 AI to Mitigate Security Issues of 6G Architecture 17.5 AI to Mitigate Security Issues of 6G Technologies 17.6 Security Issues in AI 17.7 Using AI to Attack 6G 18 Role of Explainable AI in 6G Security 18.1 What is Explainable AI (XAI) 18.1.1 Terminologies of XAI 18.1.2 Taxonomy of XAI 18.1.3 XAI Methods 18.2 Use of XAI for 6G 18.3 XAI for 6G Security 18.3.1 XAI for 6G Devices and IoT Security 18.3.2 XAI for 6G RAN 18.3.3 XAI for 6G Edge 18.3.4 XAI for 6G Core and Backhual 18.3.5 XAI for 6G Network Automation 18.4 New Security issues of XAI 18.4.1 Increased vulnerability to adversarial ML attacks 18.4.2 Difficulty to design secure ML applications 18.4.3 New attack vector and target 19 Zero touch network and Service Management (ZSM) Security 19.1 Introduction 19.1.1 Need of Zero-Touch Network and Service Management 19.1.2 Importance of ZSM for 5G and Beyond 19.2 ZSM Reference Architecture 19.2.1 Components 19.3 Security Aspects 19.3.1 ML/AI-based Attacks 19.3.2 Open API Security Threats 19.3.3 Intent-based Security Threats 19.3.4 Automated Closed-Loop Network based Security Threats 19.3.5 Threats due to Programmable Network Technologies 19.3.6 Possible Threats on ZSM Framework Architecture 20 Physical Layer Security 20.1 Introduction 20.2 Physical layer security background 20.2.1 PLS fundamentals 20.2.2 PLS Approaches 20.3 The prospect of PLS in 6G 20.3.1 Application scenarios of PLS in 6G 20.3.2 6G technologies and PLS 20.3.3 Cell-free mMIMO 20.3.4 Visible Light Communication (VLC) 20.3.5 Terahertz Communication 20.3.6 Joint Communications and Sensing 21 Quantum Security and Post-Quantum Cryptography 21.1 Overview of 6G and Quantum Computing 21.2 Quantum Computing 21.3 Quantum Security 21.3.1 Quantum Key Distribution 21.3.2 Information-theoretic security 21.4 Post-Quantum Cryptography 21.4.1 Background 21.4.2 PQC methods 21.4.3 PQC standardisation 21.4.4 Challenges with PQC 21.4.5 Future directions of PQC 21.4.6 6G and PQC 22 Concluding Remarks Index
Trade Policy 买家须知
- 关于产品:
- ● 正版保障:本网站隶属于中国国际图书贸易集团公司,确保所有图书都是100%正版。
- ● 环保纸张:进口图书大多使用的都是环保轻型张,颜色偏黄,重量比较轻。
- ● 毛边版:即书翻页的地方,故意做成了参差不齐的样子,一般为精装版,更具收藏价值。
关于退换货:
- 由于预订产品的特殊性,采购订单正式发订后,买方不得无故取消全部或部分产品的订购。
- 由于进口图书的特殊性,发生以下情况的,请直接拒收货物,由快递返回:
- ● 外包装破损/发错货/少发货/图书外观破损/图书配件不全(例如:光盘等)
并请在工作日通过电话400-008-1110联系我们。
- 签收后,如发生以下情况,请在签收后的5个工作日内联系客服办理退换货:
- ● 缺页/错页/错印/脱线
关于发货时间:
- 一般情况下:
- ●【现货】 下单后48小时内由北京(库房)发出快递。
- ●【预订】【预售】下单后国外发货,到货时间预计5-8周左右,店铺默认中通快递,如需顺丰快递邮费到付。
- ● 需要开具发票的客户,发货时间可能在上述基础上再延后1-2个工作日(紧急发票需求,请联系010-68433105/3213);
- ● 如遇其他特殊原因,对发货时间有影响的,我们会第一时间在网站公告,敬请留意。
关于到货时间:
- 由于进口图书入境入库后,都是委托第三方快递发货,所以我们只能保证在规定时间内发出,但无法为您保证确切的到货时间。
- ● 主要城市一般2-4天
- ● 偏远地区一般4-7天
关于接听咨询电话的时间:
- 010-68433105/3213正常接听咨询电话的时间为:周一至周五上午8:30~下午5:00,周六、日及法定节假日休息,将无法接听来电,敬请谅解。
- 其它时间您也可以通过邮件联系我们:customer@readgo.cn,工作日会优先处理。
关于快递:
- ● 已付款订单:主要由中通、宅急送负责派送,订单进度查询请拨打010-68433105/3213。
本书暂无推荐
本书暂无推荐