ISBN-13: 9781119875406 / Angielski / Twarda / 2023 / 350 str.
ISBN-13: 9781119875406 / Angielski / Twarda / 2023 / 350 str.
Acronyms xviiAbout the Authors xixForeword xxPreface xxiiAcknowledgments xxvPart I Introduction 11 Evolution of Mobile Networks 31.1 Introduction 31.2 6G Mobile Communication Networks 41.2.1 6G as Envisioned Today 61.3 Key Driving Trends Toward 6G 61.4 6G Requirements/Vision 81.4.1 6G Development Timeline 10References 122 Key 6G Technologies 152.1 Radio Network Technologies 152.1.1 Beyond Sub 6 GHz Toward THz Communication 152.1.2 Nonterrestrial Networks Toward 3D Networking 172.2 AI/ML/FL 192.3 DLT/Blockchain 222.4 Edge Computing 242.5 Quantum Communication 272.6 Other New Technologies 292.6.1 Visible Light Communications 292.6.2 Large Intelligent Surfaces 302.6.3 Compressive Sensing 302.6.4 Zero-Touch Network and Service Management 312.6.5 Efficient Energy Transfer and Harvesting 32References 333 6G Security Vision 433.1 Overview of 6G Security Vision 433.1.1 New 6G Requirements 433.2 6G Security Vision and KPIs 453.2.1 Security Threat Landscape for 6G Architecture 47References 48Part II Security in 6G Architecture 514 6G Device Security 534.1 Overview of 6G Devices 534.2 6G Device Security Challenges 554.2.1 Growth of Data Collection 554.2.2 Cloud Connectivity 564.2.3 Device Capacity 564.2.4 Ultrasaturated Devices 564.3 Addressing Device Security in 6G 57References 585 Open RAN and RAN-Core Convergence 595.1 Introduction 595.2 Open RAN Architecture 625.3 Threat Vectors and Security Risks Associated with Open RAN 655.3.1 Threat Taxonomy 655.3.2 Risks Related to the Process 655.3.2.1 Prerequisites 655.3.2.2 General Regulations 675.3.2.3 Privacy 675.3.2.4 People 685.3.3 Risks Related to the Technology 685.3.3.1 Open Source Software 685.3.3.2 Radio/Open Interface 705.3.3.3 Intelligence 715.3.3.4 Virtualization 735.3.4 Global Risks 765.4 Security Benefits of Open RAN 775.4.1 Open RAN specific 775.4.1.1 Full Visibility 775.4.1.2 Selection of Best Modules 785.4.1.3 Diversity 785.4.1.4 Modularity 785.4.1.5 Enforcement of Security Controls 795.4.1.6 Open Interfaces 795.4.1.7 Open Source Software 795.4.1.8 Automation 795.4.1.9 Open Standards 805.4.2 V-RAN Specific 805.4.2.1 Isolation 805.4.2.2 Increased Scalability for Security Management 805.4.2.3 Control Trust 805.4.2.4 Less Dependency Between hardware [HW] and SW 805.4.2.5 Private Network 815.4.2.6 More Secure Storage of Key Material 815.4.3 5G Networks Related 815.4.3.1 Edge Oriented 815.4.3.2 Simpler Security Model 815.5 Conclusion 82References 826 Edge Intelligence 896.1 Overview of Edge Intelligence 896.2 State-of-the-Art Related to 5G 926.2.1 Denial of Service (DOS) 926.2.2 Man-in-the-Middle (MitM) Attack 926.2.3 Privacy Leakage 936.3 State-of-the-Art Related to 6G 946.3.1 Training Dataset Manipulation 946.3.2 Interception of Private Information 956.3.3 Attacks on Learning Agents 956.4 Edge Computing Security in Autonomous Driving 956.5 Future and Challenges 96References 977 Specialized 6G Networks and Network Slicing 1037.1 Overview of 6G Specialized Networks 1037.2 Network Slicing in 6G 1047.2.1 Trust in Network Slicing 1057.2.2 Privacy Aspects in Network Slicing 1067.2.3 Solutions for Privacy and Trust in NS 107References 1078 Industry 5.0 1098.1 Introduction 1098.2 Motivations Behind the Evolution of Industry 5.0 1118.3 Key Features of Industry 5.0 1128.3.1 Smart Additive Manufacturing 1128.3.2 Predictive Maintenance 1138.3.3 Hyper Customization 1138.3.4 Cyber-Physical Cognitive Systems 1148.4 Security of Industry 5.0 1158.4.1 Security Issues of Industry 5.0 1168.5 Privacy of Industry 5.0 118References 120Part III Security in 6G Use Cases 1259 Metaverse Security in 6G 1279.1 Overview of Metaverse 1279.2 What Is Metaverse? 1289.2.1 Metaverse Architecture 1299.2.2 Key Characteristics of Metaverse 1309.2.3 Role of 6G in Metaverse 1319.3 Security Threats in Metaverse 1329.4 Countermeasures for Metaverse Security Threats 1339.5 New Trends in Metaverse Security 13410 Society 5.0 and Security 13510.1 Industry and Society Evolution 13510.1.1 Industry 4.0 13610.1.2 Society 5.0 14010.2 Technical Enablers and Challenges 14410.2.1 Dependable Wireless Connectivity 14410.2.1.1 New Spectrum and Extreme Massive MIMO 14410.2.1.2 In-X Subnetworks 14610.2.1.3 Semantic Communication 14610.2.2 Integrated Communication, Control, Computation, and Sensing 14710.2.2.1 CoCoCo 14710.2.2.2 JCAS 14810.2.3 Intelligence Everywhere 14910.2.4 Energy Harvesting and Transfer 14910.2.4.1 Energy Harvesting 14910.2.4.2 Wireless Power Transfer 15010.3 Security in Society 5.0 151References 15211 6G-Enabled Internet of Vehicles 15711.1 Overview of V2X Communication and IoV 15711.2 IoV Use Cases 15911.3 Connected Autonomous Vehicles (CAV) 16011.4 Unmanned Aerial Vehicles in Future IoV 16111.5 Security Landscape for IoV 16111.5.1 Security Threats 16211.5.2 Security Requirements 163References 16412 Smart Grid 2.0 Security 16712.1 Introduction 16712.2 Evolution of SG 2.0 16812.3 Smart Grid 2.0 16912.3.1 Comparison of Smart Grids 1.0 and 2.0 17012.4 Role of 6G in SG 2.0 17112.5 Security Challenges of SG 2.0 17212.5.1 Physical Attacks 17212.5.2 Software Attacks 17412.5.3 Network Attacks 17412.5.4 Attacks to the Controller 17512.5.5 Encryption-Related Attacks 17612.5.6 AI- and ML-Related Attacks 17612.5.7 Stability and Reliability of Power Supply 17712.5.8 Secure and Transparent Energy Trading Among Prosumers and Consumers 17812.5.9 Efficient and Reliable Communication Topology for Information and Control Signal Exchange 17912.6 Privacy Issues of SG2. 0 17912.7 Trust Management 18012.8 Security and Privacy Standardization on SG 2.0 181References 182Part IV Privacy in 6G Vision 18513 6G Privacy 18713.1 Introduction 18713.2 Privacy Taxonomy 18813.3 Privacy in Actions on Data 18913.3.1 Information Collection 18913.3.2 Information Processing 19013.3.3 Information Dissemination 19113.3.4 Invasion 19113.4 Privacy Types for 6G 19113.4.1 Data 19113.4.2 Actions and Personal Behavior 19213.4.3 Image and Video 19213.4.4 Communication 19313.4.5 Location 19313.5 6G Privacy Goals 19413.5.1 Ensure of Privacy-Protected Big Data 19413.5.2 Privacy Guarantees for Edge Networks 19413.5.3 Achieving Balance Between Privacy and Performance of Services 19513.5.4 Standardization of Privacy in Technologies, and Applications 19513.5.5 Balance the Interests in Privacy Protection in Global Context 19613.5.6 Achieving Proper Utilization of Interoperability and Data Portability 19613.5.7 Quantifying Privacy and Privacy Violations 19713.5.7.1 Achieving Privacy Protected AI-Driven Automated Network Management Operations 19813.5.8 Getting Explanations of AI Actions for Privacy Requirements 198References 19814 6G Privacy Challenges and Possible Solution 20114.1 Introduction 20114.2 6G Privacy Challenges and Issues 20214.2.1 Advanced 6G Applications with New Privacy Requirements 20414.2.2 Privacy Preservation Limitations for B5G/6G Control and Orchestration Layer 20414.2.3 Privacy Attacks on AI Models 20514.2.4 Privacy Requirements in Cloud Computing and Storage Environments 20614.2.5 Privacy Issues in Edge Computing and Edge AI 20614.2.6 Cost on Privacy Enhancements 20714.2.7 Limited Availability of Explainable AI (XAI) Techniques 20814.2.8 Ambiguity in Responsibility of Data Ownership 20914.2.9 Data Communication Confidentiality Issues 20914.2.10 Private Data Access Limitations 21014.2.11 Privacy Differences Based on Location 21014.2.12 Lack of Understanding of Privacy Rights and Threats in General Public 21014.2.13 Difficulty in Defining Levels and Indicators for Privacy 21114.2.13.1 Proper Evaluation of Potential Privacy Leakages from Non-personal Data 21114.3 Privacy Solutions for 6G 21214.3.1 Privacy-Preserving Decentralized AI 21214.3.2 Edge AI 21214.3.3 Intelligent Management with Privacy 21314.3.4 XAI for Privacy 21314.3.5 Privacy Measures for Personally Identifiable Information 21414.3.6 Blockchain-Based Solutions 21514.3.7 Lightweight and Quantum Resistant Encryption Mechanisms 21514.3.8 Homomorphic Encryption 21614.3.9 Privacy-Preserving Data Publishing Techniques 21714.3.9.1 Syntactic Anonymization 21814.3.9.2 Differential Privacy 21814.3.10 Privacy by Design and Privacy by Default 21914.3.11 Regulation of Government, Industry, and Consumer 22014.3.12 Other Solutions 22114.3.12.1 Location Privacy Considerations 22114.3.12.2 Personalized Privacy 22214.3.12.3 Fog Computing Privacy 222References 22215 Legal Aspects and Security Standardization 22715.1 Legal 22715.2 Security Standardization 22915.2.1 ETSI 22915.2.2 ITU-T 23015.2.3 3GPP 23015.2.4 NIST 23115.2.5 IETF 23115.2.6 5G PPP 23115.2.7 NGMN 23115.2.8 IEEE 232References 232Part V Security in 6G Technologies 23516 Distributed Ledger Technologies (DLTs) and Blockchain 23716.1 Introduction 23716.2 What Is Blockchain 23816.2.1 Types of Blockchain 23916.3 What Is Smart Contracts 24016.4 Salient Features of Blockchain 24016.5 Key Security Challenges Which Blockchain Can Solve 24216.5.1 Role of Blockchain 24216.6 Key Privacy Challenges Which Blockchain Can Solve 24416.6.1 Key Challenges 24416.6.2 Role of Blockchain 24516.7 Threat Landscape of Blockchain 24616.8 Possible Solutions to Secure 6G Blockchains 248References 24917 AI/ML for 6G Security 25717.1 Overview of 6G Intelligence 25717.2 AI for 6G Security 25917.3 Use of AI to Identify/Mitigate Pre-6G Security Issues 25917.4 AI to Mitigate Security Issues of 6G Architecture 26117.5 AI to Mitigate Security Issues of 6G Technologies 26217.6 Security Issues in AI 26317.7 Using AI to Attack 6G 263References 26418 Role of Explainable AI in 6G Security 26718.1 What Is Explainable AI (XAI) 26718.1.1 Terminologies of XAI 26818.1.2 Taxonomy of XAI 26918.1.3 XAI Methods 27018.2 Use of XAI for 6G 27318.3 XAI for 6G Security 27518.3.1 XAI for 6G Devices and IoT Security 27718.3.2 XAI for 6G RAN 27718.3.3 XAI for 6G Edge 27818.3.4 XAI for 6G Core and Backhaul 27818.3.5 XAI for 6G Network Automation 27918.4 New Security Issues of XAI 28018.4.1 Increased Vulnerability to Adversarial ML Attacks 28018.4.2 Difficulty to Design Secure ML Applications 28118.4.3 New Attack Vector and Target 283References 28419 Zero Touch Network and Service Management (ZSM) Security 29119.1 Introduction 29119.1.1 Need of Zero-Touch Network and Service Management 29219.1.2 Importance of ZSM for 5G and Beyond 29219.2 ZSM Reference Architecture 29319.2.1 Components 29419.2.1.1 Management Services 29419.2.1.2 Management Functions 29519.2.1.3 Management Domains 29519.2.1.4 The E2E Service Management Domain 29519.2.1.5 Integration Fabric 29519.2.1.6 Data Services 29619.3 Security Aspects 29619.3.1 ML/AI-Based Attacks 29619.3.1.1 White-Box Attack 29719.3.1.2 Black-Box Attack 29719.3.2 Open API Security Threats 29719.3.2.1 Parameter Attacks 29819.3.3 Intent-Based Security Threats 29819.3.3.1 Data Exposure 29819.3.3.2 Tampering 29919.3.4 Automated Closed-Loop Network-Based Security Threats 29919.3.4.1 MITM Attack 29919.3.4.2 Deception Attacks 29919.3.5 Threats Due to Programmable Network Technologies 29919.3.6 Possible Threats on ZSM Framework Architecture 300References 30020 Physical Layer Security 30520.1 Introduction 30520.2 Physical Layer Security Background 30620.2.1 PLS Fundamentals 30620.2.2 PLS Approaches 30720.2.2.1 Confidentiality (Edgar) 30720.2.2.2 Physical Layer Authentication 30820.2.2.3 Secret Key Generation 30920.3 The Prospect of PLS in 6G 31020.3.1 Application Scenarios of PLS in 6G 31120.3.2 6G Technologies and PLS 31220.3.2.1 IRS 31220.3.2.2 Unmanned Aerial Vehicles 31320.3.3 Cell-Free mMIMO 31520.3.4 Visible Light Communication (VLC) 31620.3.5 Terahertz Communication 31720.3.6 Joint Communications and Sensing 318References 31921 Quantum Security and Postquantum Cryptography 32721.1 Overview of 6G and Quantum Computing 32721.2 Quantum Computing 32821.3 Quantum Security 32921.3.1 Quantum Key Distribution 33021.3.2 Information-Theoretic Security 33121.4 Postquantum Cryptography 33221.4.1 Background 33221.4.2 PQC Methods 33321.4.3 PQC Standardization 33521.4.4 Challenges with PQC 33521.4.5 Future Directions of PQC 33621.4.6 6G and PQC 337References 337Part VI Concluding Remarks 34122 Concluding Remarks 343Index 345
Pawani Porambage, D.Sc is Senior Scientist at the VTT Technical Research Centre of Finland and a Docent at University of Oulu. She has nearly a decade of network security experience and has authored or co-authored more than sixty publications.Madhusanka Liyanage, D.Sc is Assistant Professor in the School of Computer Science, University College Dublin, Ireland. He received the 2020 IEEE ComSoc Outstanding Young Researcher Award and has published widely on 6G, network security, and related subjects.
1997-2024 DolnySlask.com Agencja Internetowa