About the Author xiiiPreface xv1 Technologies and Development for the Next Information Age 11.1 Introduction 11.2 Roadmap to 6G 11.2.1 Society 5.0 41.2.2 Extended Reality 41.2.3 Wireless Brain-Computer 51.2.4 Haptic Communication 51.2.5 Smart Healthcare 51.2.6 Five-Sense Information 61.2.7 The Internet of Everything 61.2.8 5G to 6G 61.3 AI and Cybersecurity: Paving the Way for the Future 101.4 Fusion of IoT, AI, and Cybersecurity 101.4.1 Where Did AI Begin? 121.4.2 Role of AI 121.4.3 Disadvantages of AI 121.4.4 Advantages of AI 121.4.5 Threats from Hackers 141.5 How AI Can Help Solve These Problems 151.6 Connected Devices and Cybersecurity 161.7 Solutions for Data Management in Cybersecurity 171.8 Conclusion 17References 182 Networks of the Future 212.1 Introduction 212.2 The Motive for Energy-Efficient ICTs 222.2.1 Approaches 232.3 Wireless Networks 242.3.1 Wi-Fi 262.3.2 Lte 282.3.3 Heterogeneous Networks 292.3.4 Femtocell Repeater 292.3.5 The Dawn of 5G Wireless Systems 302.3.6 Advancing from 5G to 6G Networks 322.4 Cognitive Networking 332.4.1 Zero-Touch Network and Service Management 342.4.2 Zero-Trust Networking 352.4.3 Information-Centric Networking 352.4.3.1 Basic Concepts of ICN 362.4.4 In-Network Computing 362.4.5 Active Networking 362.5 Mobile Edge Computing 372.6 Quantum Communications 372.6.1 Quantum Computing and 6G Wireless 382.7 Cybersecurity of 6G 382.8 Massive Machine-Type Communications (MTC) 392.9 Edge-Intelligence and Pervasive Artificial Intelligence in 6G 402.10 Blockchain: Foundations and Role in 6G 402.11 Role of Open-Source Platforms in 6G 402.11.1 PHY Technologies for 6G Wireless 402.11.2 Reconfigurable Intelligent Surface for 6G Wireless Networks 412.11.3 Millimeter-Wave and Terahertz Spectrum for 6G Wireless 412.11.4 Challenges in Transport Layer for Terabit Communications 412.11.5 High-Capacity Backhaul Connectivity for 6G Wireless 422.11.6 Cloud-Native Approach for 6G Wireless Networks 422.11.7 Machine Type Communications in 6G 422.11.8 Impact of 5G and 6G on Health and Environment 422.12 Integration of 5G with AI and IoT and Roadmap to 6G 432.13 3gpp 472.14 Conclusion 49References 493 The Future of Wireless Communication with 6G 533.1 Introduction 533.2 Recent Trends Leading to 6G Technology Evolution 533.3 Security and Privacy Challenges in 6G Wireless Communications 533.4 The Impact of 6G on Healthcare Systems 563.5 The Impact of 6G on Space Technology and Satellite Communication 583.6 The Impact of 6G on Other Industries 603.7 Terahertz Wireless Systems and Networks with 6G 613.8 The Future of 6G and Its Role in IT 62References 624 Artificial Intelligence and Machine Learning in the Era of 5G and 6G Technology 654.1 Artificial Intelligence and Machine Learning: Definitions, Applications, and Challenges 664.1.1 Application of Machine Learning and Artificial Intelligence 664.1.2 Challenges for Machine Learning and Artificial Intelligence 664.2 Artificial Intelligence: Laws, Regulations, and Ethical Issues 674.2.1 Ethical Governance in Artificial Intelligence 674.2.2 The Future of Regulation for AI 674.3 Potentials of Artificial Intelligence in Wireless 5G and 6G: Benefits and Challenges 684.3.1 Artificial Intelligence in Wireless 5G and 6G 684.3.2 Benefits and Challenges of AI in 5G and 6G 684.3.3 How Can AI Be Used to Enhance 6G Wireless Security? 684.3.4 The 6G Era's Edge Intelligence and Cloudification 694.3.5 Distributed Artificial Intelligence in 6G Security 694.4 Cybersecurity Issues in Advanced 5G and 6G 704.5 Benefits and Challenges of Using AI in Cybersecurity: Help or Hurt? 704.6 How Can AI Be Used by Hackers Attacking Networks? 714.7 Conclusion 72References 725 6G Wireless Communication Systems: Emerging Technologies, Architectures, Challenges, and Opportunities 735.1 Introduction 735.2 Important Aspects of Sixth-Generation Communication Technology 735.2.1 A Much Higher Data Rate 745.2.2 A Much Lower Latency 745.2.3 Network Reliability and Accuracy 745.2.4 Energy Efficiency 745.2.5 Focus on Machines as Primary Users 745.2.6 AI Wireless Communication Tools 745.2.7 Personalized Network Experience 745.3 Enabling Technologies Behind the Drive for 6G 765.3.1 Artificial Intelligence 765.3.2 Terahertz Communications 785.3.3 Optical Wireless Technology 785.4 Extreme Performance Technologies in 6G Connectivity 795.4.1 Quantum Communication and Quantum ml 795.4.2 Blockchain 805.4.2.1 Internal Network Operations 805.4.2.2 Ecosystem for Productive Collaboration 805.4.2.3 Tactile Internet 805.4.2.4 Spectrum Sharing (FDSS) and Free Duplexing 805.5 6G Communications Using Intelligent Platforms 815.5.1 Integrated Intelligence 825.5.2 Satellite-Based Integrated Network 825.5.3 Wireless Information and Energy Transfer Are Seamlessly Integrated 835.6 Artificial Intelligence and a Data-Driven Approach to Networks 835.6.1 Zero-Touch Network 845.6.2 AI by Design 855.6.3 Technological Fundamentals for Zero-Touch Systems 855.7 Sensing for 6G 855.7.1 A Bandwidth as Well as Carrier Frequency Rise 855.7.2 Chip Technologies of the Future 865.7.3 Models of Consistent Channels 865.7.4 X-Haul and Transport Network for 6G 875.8 Applications 875.9 Innovative 6G Network Architectures 895.10 Conclusion 89References 906 6G: Architecture, Applications, and Challenges 916.1 Introduction 916.2 6G Network Architecture Vision 936.2.1 6G Use Cases, Requirements, and Metrics 946.2.2 What 5G Is Currently Covering 956.3 6th Generation Networks: A Step Beyond 5G 976.3.1 6G and the Fundamental Features 986.4 Emerging Applications of 6G Wireless Networks 996.4.1 Virtual, Augmented, and Mixed Reality 996.4.2 Holographic Telepresence 1006.4.3 Automation: The Future of Factories 1016.4.4 Smart Lifestyle with the Integration of the Internet of Things 1016.4.5 Autonomous Driving and Connected Devices 1016.4.6 Healthcare 1016.4.7 Nonterrestrial Communication 1016.4.8 Underwater Communication 1026.4.9 Disaster Management 1026.4.10 Environment 1026.5 The Requirements and KPI Targets of 6G 1026.5.1 Extremely Low Latency 1026.5.2 Low Power Consumption 1026.5.3 High Data Rates 1036.5.4 High-Frequency Bands 1036.5.5 Ultra-Reliability 1036.5.6 Security and Privacy 1036.5.7 Massive Connection Density 1046.5.8 Extreme Coverage Extension 1046.5.9 Mobility 1046.6 6G Applications 1046.7 Challenges in 6G: Standardization, Design, and Deployment 104References 1067 Cybersecurity in Digital Transformation Era: Security Risks and Solutions 1097.1 Introduction 1097.2 Digital Transformation and Mesh Networks of Networks 1097.3 Security as the Enemy of Digital Transformation 1117.4 The Current State of Cybercrime 1137.5 Security and Technologies of the Digital Transformation Economy 1157.6 Tackling the Cybersecurity Maturity Challenges to Succeed with Digital Transformation 1167.7 Security Maturity and Optimization: Perception versus Reality 1177.7.1 Why Cybersecurity Maturity Is Not What It Should Be in the Digital Business and Transformation Reality 1187.7.2 Why Cybersecurity Maturity and Strategy Are Lagging 1197.8 Changing Security Parameters and Cyber Risks Demand a Holistic Security Approach for Digital Business 1207.9 Cybersecurity Challenges and Digital Risks for the Future 1217.10 Conclusion 122References 1228 Next Generations Networks: Integration, Trustworthiness, Privacy, and Security 1258.1 Introduction 1258.2 The State of 5G Networks 1278.2.1 Applications and Services of 5G Technologies 1288.3 6G: Key Technologies 1308.4 6G: Application and Services 1348.5 Benefits of 6G over 5G: A Comparison 1358.5.1 Artificial Intelligence in 5G and 6G: Benefits and Challenges 1358.5.2 Artificial Intelligence and Cybersecurity 1368.5.3 Benefits and Challenges of AI and 6G for Cybersecurity as Defense and Offense 1368.6 6G: Integration and Roadmap 1378.7 Key Words in Safeguarding 6G 1378.7.1 Trust 1378.7.2 Security 1378.7.3 Privacy 1388.8 Trustworthiness in 6G 1388.8.1 Is Trust Networking Needed? 1388.8.2 Benefits of Trust Networking for 6G 1388.8.3 Constraints of Trust Networking in 6G 1388.8.4 Principles for Trust Networking 1398.8.5 Challenges in Trust Networking for 6G 1398.9 Network Security Architecture for 6G 1408.9.1 Privacy and Security in IoT for 6G 1408.10 6G Wireless Systems 1418.10.1 Advances 1418.10.2 Physical Layer Security as a Means of Confidentiality 1428.10.3 Challenges of Implementing Federated Learning 1438.10.4 Physical Layer Security for Six-Generation Connectivity 1438.10.5 Physical Layer Security Using Light Communications 1448.10.6 Challenges for Physical Layer Security 1448.10.7 Privacy Requirements for 6G 1458.10.8 Is Personal Information Really Personal? 1458.11 Fifth Generation vs. Sixth Generation 1458.12 Conclusion 146References 1479 Artificial Intelligence: Cybersecurity and Security Threats 1499.1 Introduction 1499.2 5G and 6G 1509.3 Cybersecurity in Its Current State 1519.4 AI as a Concept 1539.5 AI: A Solution for Cybersecurity 1549.6 AI: New Challenges in Cybersecurity 1549.7 Conclusion 156References 15610 Impact of Artificial Intelligence and Machine Learning on Cybersecurity 15910.1 Introduction 15910.2 What Is Artificial Intelligence (AI)? 16010.2.1 Reactive Machines 16010.2.2 Limited Memory 16010.2.3 Theory of Mind 16010.2.4 Self-Awareness 16110.3 The Transformative Power of AI 16110.4 Understanding the Relationship Between AI and Cybersecurity 16110.5 The Promise and Challenges of AI for Cybersecurity 16210.5.1 Risks and Impacts of AI on Cybersecurity (Threats and Solutions) 16310.5.1.1 Domestic Risks 16410.5.1.2 Local Risks 16410.5.1.3 National Risks 16410.5.1.4 Why Prediction and Prevention 16410.6 Broad Domain of AI Security (Major Themes in the AI Security Landscape) 16410.6.1 Digital/Physical 16510.6.2 Protection from Malicious Use of AI and Automated Cyberattacks 16510.6.3 Other Technologies with AI and Their Integration 16510.6.4 Political 16510.6.5 Manipulation and Disinformation Protection 16510.6.6 Infrastructure Based on AI and Digital Expertise of Government 16610.6.6.1 Economic 16610.6.6.2 Labor Displacement and Its Mitigation 16610.6.6.3 Promotion of AI R&D 16610.6.6.4 Education and Training That Is Updated 16710.7 Transparency of Artificial Intelligence and Accountability Societal Aspects 16710.7.1 Rights of Privacy and Data 16710.8 Global AI Security Priorities 16810.8.1 Global Economy 16810.8.2 Global Privacy and Data Rights 16810.8.2.1 AI and Ethics 16910.8.3 Automation of Cyberattacks or Social Engineering Attacks 17010.8.4 Target Prioritizing with Machine Learning 17010.9 Automation of Services in Cybercriminal Offense 17010.9.1 Increased Scale of Attacks 17010.10 The Future of AI in Cybersecurity 17110.11 Conclusion 171References 17211 AI and Cybersecurity: Paving the Way for the Future 17511.1 Introduction 17511.2 IoT Security and the Role of AI 17611.3 Cybercrime and Cybersecurity 17911.4 How Can AI Help Solve These Problems? 18111.5 The Realm of Cyberspace 18111.6 Connected Devices and Cybersecurity 18211.7 Solutions for Data Management in Cybersecurity 18311.8 Conclusion 183References 18412 Future 6G Networks 18512.1 Introduction 18512.2 Vision, Challenges, and Key Features for Future 6G Networks 18612.2.1 Fourth Generation Long-Term Evolution (4G-LTE) 18712.3 Rationale for 6G Networks with Prevailing and Future Success of 5G 18812.4 Missing Units from LTE and 5G That 6G Will Integrate 18912.5 Features of 6G Networks 18912.5.1 Large Bandwidth 18912.5.2 Artificial Intelligence 18912.5.3 Operational Intelligence 19012.6 Wireless Networks 19012.6.1 Beyond 5G and Toward 6G 19012.6.2 Visible-Light Communications 19112.6.3 E-MBB Plus 19112.6.4 Big Communications 19112.6.5 Secure Ultra-Reliable Low-Latency Communications 19212.6.6 Three-Dimensional Integrated Communications 19212.6.7 Underwater Communication 19312.6.8 Space Communication 19412.6.9 UAV-Based Communication 19412.6.10 Unconventional Data Communications 19412.6.11 Tactical Communications 19512.6.12 Holographic Communications 19512.6.13 Human-Bond Communications 19612.7 Challenges for 6G Networks 19612.7.1 Potential Health Issues 19612.7.2 Security and Privacy Concerns 19712.7.3 Research Activities and Trends 19712.8 Conclusion 198References 200Index 203
Abdulrahman Yarali, PhD is Professor of Cybersecurity and Network Management at Murray State University, Kentucky, USA. He also has extensive industry experience in wireless communications, with his research teams completing contracts for AT&T, Nortel, Spring PCS, and more.
1997-2024 DolnySlask.com Agencja Internetowa