Security and Privacy Vision in 6G
Wiley-IEEE Press (Verlag)
978-1-119-87540-6 (ISBN)
6G is the next frontier in mobile communication, with development of 6G standards slated to begin as early as 2026. As telecommunications networks become faster and more intelligent, security and privacy concerns are critical. In an increasingly connected world, there is an urgent need for user data to be safeguarded and system security enhanced against a new generation of threats.
Security and Privacy Vision in 6G provides a comprehensive survey of these threats and the emerging techniques for safeguarding against them. It includes mechanisms for prediction, detection, mitigation, and prevention, such that threats to privacy and security can be forestalled at any stage. Fully engaged with proposed 6G architectures, it is an essential resource for mobile communications professionals looking for a head start on the technology of the future.
Security and Privacy Vision in 6G readers will also find:
Detailed coverage of topics including edge intelligence and cloudification, industrial automation, collaborative robots, and more
Treatment balancing the practical and the theoretical
An editorial team with decades of international network technology experience in both industry and academia
Security and Privacy Vision in 6G is a vital reference for network security professionals and for postgraduate and advanced undergraduate students in mobile communications and network security-related fields.
Pawani Porambage, D.Sc is Senior Scientist at the VTT Technical Research Centre of Finland and a Docent at University of Oulu. She has nearly a decade of network security experience and has authored or co-authored more than sixty publications. Madhusanka Liyanage, D.Sc is Assistant Professor in the School of Computer Science, University College Dublin, Ireland. He received the 2020 IEEE ComSoc Outstanding Young Researcher Award and has published widely on 6G, network security, and related subjects.
Acronyms xvii
About the Authors xix
Foreword xx
Preface xxii
Acknowledgments xxv
Part I Introduction 1
1 Evolution of Mobile Networks 3
1.1 Introduction 3
1.2 6G Mobile Communication Networks 4
1.2.1 6G as Envisioned Today 6
1.3 Key Driving Trends Toward 6G 6
1.4 6G Requirements/Vision 8
1.4.1 6G Development Timeline 10
References 12
2 Key 6G Technologies 15
2.1 Radio Network Technologies 15
2.1.1 Beyond Sub 6 GHz Toward THz Communication 15
2.1.2 Nonterrestrial Networks Toward 3D Networking 17
2.2 AI/ML/FL 19
2.3 DLT/Blockchain 22
2.4 Edge Computing 24
2.5 Quantum Communication 27
2.6 Other New Technologies 29
2.6.1 Visible Light Communications 29
2.6.2 Large Intelligent Surfaces 30
2.6.3 Compressive Sensing 30
2.6.4 Zero-Touch Network and Service Management 31
2.6.5 Efficient Energy Transfer and Harvesting 32
References 33
3 6G Security Vision 43
3.1 Overview of 6G Security Vision 43
3.1.1 New 6G Requirements 43
3.2 6G Security Vision and KPIs 45
3.2.1 Security Threat Landscape for 6G Architecture 47
References 48
Part II Security in 6G Architecture 51
4 6G Device Security 53
4.1 Overview of 6G Devices 53
4.2 6G Device Security Challenges 55
4.2.1 Growth of Data Collection 55
4.2.2 Cloud Connectivity 56
4.2.3 Device Capacity 56
4.2.4 Ultrasaturated Devices 56
4.3 Addressing Device Security in 6G 57
References 58
5 Open RAN and RAN-Core Convergence 59
5.1 Introduction 59
5.2 Open RAN Architecture 62
5.3 Threat Vectors and Security Risks Associated with Open RAN 65
5.3.1 Threat Taxonomy 65
5.3.2 Risks Related to the Process 65
5.3.2.1 Prerequisites 65
5.3.2.2 General Regulations 67
5.3.2.3 Privacy 67
5.3.2.4 People 68
5.3.3 Risks Related to the Technology 68
5.3.3.1 Open Source Software 68
5.3.3.2 Radio/Open Interface 70
5.3.3.3 Intelligence 71
5.3.3.4 Virtualization 73
5.3.4 Global Risks 76
5.4 Security Benefits of Open RAN 77
5.4.1 Open RAN specific 77
5.4.1.1 Full Visibility 77
5.4.1.2 Selection of Best Modules 78
5.4.1.3 Diversity 78
5.4.1.4 Modularity 78
5.4.1.5 Enforcement of Security Controls 79
5.4.1.6 Open Interfaces 79
5.4.1.7 Open Source Software 79
5.4.1.8 Automation 79
5.4.1.9 Open Standards 80
5.4.2 V-RAN Specific 80
5.4.2.1 Isolation 80
5.4.2.2 Increased Scalability for Security Management 80
5.4.2.3 Control Trust 80
5.4.2.4 Less Dependency Between hardware [HW] and SW 80
5.4.2.5 Private Network 81
5.4.2.6 More Secure Storage of Key Material 81
5.4.3 5G Networks Related 81
5.4.3.1 Edge Oriented 81
5.4.3.2 Simpler Security Model 81
5.5 Conclusion 82
References 82
6 Edge Intelligence 89
6.1 Overview of Edge Intelligence 89
6.2 State-of-the-Art Related to 5G 92
6.2.1 Denial of Service (DOS) 92
6.2.2 Man-in-the-Middle (MitM) Attack 92
6.2.3 Privacy Leakage 93
6.3 State-of-the-Art Related to 6G 94
6.3.1 Training Dataset Manipulation 94
6.3.2 Interception of Private Information 95
6.3.3 Attacks on Learning Agents 95
6.4 Edge Computing Security in Autonomous Driving 95
6.5 Future and Challenges 96
References 97
7 Specialized 6G Networks and Network Slicing 103
7.1 Overview of 6G Specialized Networks 103
7.2 Network Slicing in 6G 104
7.2.1 Trust in Network Slicing 105
7.2.2 Privacy Aspects in Network Slicing 106
7.2.3 Solutions for Privacy and Trust in NS 107
References 107
8 Industry 5.0 109
8.1 Introduction 109
8.2 Motivations Behind the Evolution of Industry 5.0 111
8.3 Key Features of Industry 5.0 112
8.3.1 Smart Additive Manufacturing 112
8.3.2 Predictive Maintenance 113
8.3.3 Hyper Customization 113
8.3.4 Cyber-Physical Cognitive Systems 114
8.4 Security of Industry 5.0 115
8.4.1 Security Issues of Industry 5.0 116
8.5 Privacy of Industry 5.0 118
References 120
Part III Security in 6G Use Cases 125
9 Metaverse Security in 6G 127
9.1 Overview of Metaverse 127
9.2 What Is Metaverse? 128
9.2.1 Metaverse Architecture 129
9.2.2 Key Characteristics of Metaverse 130
9.2.3 Role of 6G in Metaverse 131
9.3 Security Threats in Metaverse 132
9.4 Countermeasures for Metaverse Security Threats 133
9.5 New Trends in Metaverse Security 134
10 Society 5.0 and Security 135
10.1 Industry and Society Evolution 135
10.1.1 Industry 4.0 136
10.1.2 Society 5.0 140
10.2 Technical Enablers and Challenges 144
10.2.1 Dependable Wireless Connectivity 144
10.2.1.1 New Spectrum and Extreme Massive MIMO 144
10.2.1.2 In-X Subnetworks 146
10.2.1.3 Semantic Communication 146
10.2.2 Integrated Communication, Control, Computation, and Sensing 147
10.2.2.1 CoCoCo 147
10.2.2.2 JCAS 148
10.2.3 Intelligence Everywhere 149
10.2.4 Energy Harvesting and Transfer 149
10.2.4.1 Energy Harvesting 149
10.2.4.2 Wireless Power Transfer 150
10.3 Security in Society 5.0 151
References 152
11 6G-Enabled Internet of Vehicles 157
11.1 Overview of V2X Communication and IoV 157
11.2 IoV Use Cases 159
11.3 Connected Autonomous Vehicles (CAV) 160
11.4 Unmanned Aerial Vehicles in Future IoV 161
11.5 Security Landscape for IoV 161
11.5.1 Security Threats 162
11.5.2 Security Requirements 163
References 164
12 Smart Grid 2.0 Security 167
12.1 Introduction 167
12.2 Evolution of SG 2.0 168
12.3 Smart Grid 2.0 169
12.3.1 Comparison of Smart Grids 1.0 and 2.0 170
12.4 Role of 6G in SG 2.0 171
12.5 Security Challenges of SG 2.0 172
12.5.1 Physical Attacks 172
12.5.2 Software Attacks 174
12.5.3 Network Attacks 174
12.5.4 Attacks to the Controller 175
12.5.5 Encryption-Related Attacks 176
12.5.6 AI- and ML-Related Attacks 176
12.5.7 Stability and Reliability of Power Supply 177
12.5.8 Secure and Transparent Energy Trading Among Prosumers and Consumers 178
12.5.9 Efficient and Reliable Communication Topology for Information and Control Signal Exchange 179
12.6 Privacy Issues of SG2. 0 179
12.7 Trust Management 180
12.8 Security and Privacy Standardization on SG 2.0 181
References 182
Part IV Privacy in 6G Vision 185
13 6G Privacy 187
13.1 Introduction 187
13.2 Privacy Taxonomy 188
13.3 Privacy in Actions on Data 189
13.3.1 Information Collection 189
13.3.2 Information Processing 190
13.3.3 Information Dissemination 191
13.3.4 Invasion 191
13.4 Privacy Types for 6G 191
13.4.1 Data 191
13.4.2 Actions and Personal Behavior 192
13.4.3 Image and Video 192
13.4.4 Communication 193
13.4.5 Location 193
13.5 6G Privacy Goals 194
13.5.1 Ensure of Privacy-Protected Big Data 194
13.5.2 Privacy Guarantees for Edge Networks 194
13.5.3 Achieving Balance Between Privacy and Performance of Services 195
13.5.4 Standardization of Privacy in Technologies, and Applications 195
13.5.5 Balance the Interests in Privacy Protection in Global Context 196
13.5.6 Achieving Proper Utilization of Interoperability and Data Portability 196
13.5.7 Quantifying Privacy and Privacy Violations 197
13.5.7.1 Achieving Privacy Protected AI-Driven Automated Network Management Operations 198
13.5.8 Getting Explanations of AI Actions for Privacy Requirements 198
References 198
14 6G Privacy Challenges and Possible Solution 201
14.1 Introduction 201
14.2 6G Privacy Challenges and Issues 202
14.2.1 Advanced 6G Applications with New Privacy Requirements 204
14.2.2 Privacy Preservation Limitations for B5G/6G Control and Orchestration Layer 204
14.2.3 Privacy Attacks on AI Models 205
14.2.4 Privacy Requirements in Cloud Computing and Storage Environments 206
14.2.5 Privacy Issues in Edge Computing and Edge AI 206
14.2.6 Cost on Privacy Enhancements 207
14.2.7 Limited Availability of Explainable AI (XAI) Techniques 208
14.2.8 Ambiguity in Responsibility of Data Ownership 209
14.2.9 Data Communication Confidentiality Issues 209
14.2.10 Private Data Access Limitations 210
14.2.11 Privacy Differences Based on Location 210
14.2.12 Lack of Understanding of Privacy Rights and Threats in General Public 210
14.2.13 Difficulty in Defining Levels and Indicators for Privacy 211
14.2.13.1 Proper Evaluation of Potential Privacy Leakages from Non-personal Data 211
14.3 Privacy Solutions for 6G 212
14.3.1 Privacy-Preserving Decentralized AI 212
14.3.2 Edge AI 212
14.3.3 Intelligent Management with Privacy 213
14.3.4 XAI for Privacy 213
14.3.5 Privacy Measures for Personally Identifiable Information 214
14.3.6 Blockchain-Based Solutions 215
14.3.7 Lightweight and Quantum Resistant Encryption Mechanisms 215
14.3.8 Homomorphic Encryption 216
14.3.9 Privacy-Preserving Data Publishing Techniques 217
14.3.9.1 Syntactic Anonymization 218
14.3.9.2 Differential Privacy 218
14.3.10 Privacy by Design and Privacy by Default 219
14.3.11 Regulation of Government, Industry, and Consumer 220
14.3.12 Other Solutions 221
14.3.12.1 Location Privacy Considerations 221
14.3.12.2 Personalized Privacy 222
14.3.12.3 Fog Computing Privacy 222
References 222
15 Legal Aspects and Security Standardization 227
15.1 Legal 227
15.2 Security Standardization 229
15.2.1 ETSI 229
15.2.2 ITU-T 230
15.2.3 3GPP 230
15.2.4 NIST 231
15.2.5 IETF 231
15.2.6 5G PPP 231
15.2.7 NGMN 231
15.2.8 IEEE 232
References 232
Part V Security in 6G Technologies 235
16 Distributed Ledger Technologies (DLTs) and Blockchain 237
16.1 Introduction 237
16.2 What Is Blockchain 238
16.2.1 Types of Blockchain 239
16.3 What Is Smart Contracts 240
16.4 Salient Features of Blockchain 240
16.5 Key Security Challenges Which Blockchain Can Solve 242
16.5.1 Role of Blockchain 242
16.6 Key Privacy Challenges Which Blockchain Can Solve 244
16.6.1 Key Challenges 244
16.6.2 Role of Blockchain 245
16.7 Threat Landscape of Blockchain 246
16.8 Possible Solutions to Secure 6G Blockchains 248
References 249
17 AI/ML for 6G Security 257
17.1 Overview of 6G Intelligence 257
17.2 AI for 6G Security 259
17.3 Use of AI to Identify/Mitigate Pre-6G Security Issues 259
17.4 AI to Mitigate Security Issues of 6G Architecture 261
17.5 AI to Mitigate Security Issues of 6G Technologies 262
17.6 Security Issues in AI 263
17.7 Using AI to Attack 6G 263
References 264
18 Role of Explainable AI in 6G Security 267
18.1 What Is Explainable AI (XAI) 267
18.1.1 Terminologies of XAI 268
18.1.2 Taxonomy of XAI 269
18.1.3 XAI Methods 270
18.2 Use of XAI for 6G 273
18.3 XAI for 6G Security 275
18.3.1 XAI for 6G Devices and IoT Security 277
18.3.2 XAI for 6G RAN 277
18.3.3 XAI for 6G Edge 278
18.3.4 XAI for 6G Core and Backhaul 278
18.3.5 XAI for 6G Network Automation 279
18.4 New Security Issues of XAI 280
18.4.1 Increased Vulnerability to Adversarial ML Attacks 280
18.4.2 Difficulty to Design Secure ML Applications 281
18.4.3 New Attack Vector and Target 283
References 284
19 Zero Touch Network and Service Management (ZSM) Security 291
19.1 Introduction 291
19.1.1 Need of Zero-Touch Network and Service Management 292
19.1.2 Importance of ZSM for 5G and Beyond 292
19.2 ZSM Reference Architecture 293
19.2.1 Components 294
19.2.1.1 Management Services 294
19.2.1.2 Management Functions 295
19.2.1.3 Management Domains 295
19.2.1.4 The E2E Service Management Domain 295
19.2.1.5 Integration Fabric 295
19.2.1.6 Data Services 296
19.3 Security Aspects 296
19.3.1 ML/AI-Based Attacks 296
19.3.1.1 White-Box Attack 297
19.3.1.2 Black-Box Attack 297
19.3.2 Open API Security Threats 297
19.3.2.1 Parameter Attacks 298
19.3.3 Intent-Based Security Threats 298
19.3.3.1 Data Exposure 298
19.3.3.2 Tampering 299
19.3.4 Automated Closed-Loop Network-Based Security Threats 299
19.3.4.1 MITM Attack 299
19.3.4.2 Deception Attacks 299
19.3.5 Threats Due to Programmable Network Technologies 299
19.3.6 Possible Threats on ZSM Framework Architecture 300
References 300
20 Physical Layer Security 305
20.1 Introduction 305
20.2 Physical Layer Security Background 306
20.2.1 PLS Fundamentals 306
20.2.2 PLS Approaches 307
20.2.2.1 Confidentiality (Edgar) 307
20.2.2.2 Physical Layer Authentication 308
20.2.2.3 Secret Key Generation 309
20.3 The Prospect of PLS in 6G 310
20.3.1 Application Scenarios of PLS in 6G 311
20.3.2 6G Technologies and PLS 312
20.3.2.1 IRS 312
20.3.2.2 Unmanned Aerial Vehicles 313
20.3.3 Cell-Free mMIMO 315
20.3.4 Visible Light Communication (VLC) 316
20.3.5 Terahertz Communication 317
20.3.6 Joint Communications and Sensing 318
References 319
21 Quantum Security and Postquantum Cryptography 327
21.1 Overview of 6G and Quantum Computing 327
21.2 Quantum Computing 328
21.3 Quantum Security 329
21.3.1 Quantum Key Distribution 330
21.3.2 Information-Theoretic Security 331
21.4 Postquantum Cryptography 332
21.4.1 Background 332
21.4.2 PQC Methods 333
21.4.3 PQC Standardization 335
21.4.4 Challenges with PQC 335
21.4.5 Future Directions of PQC 336
21.4.6 6G and PQC 337
References 337
Part VI Concluding Remarks 341
22 Concluding Remarks 343
Index 345
Erscheinungsdatum | 05.08.2023 |
---|---|
Sprache | englisch |
Gewicht | 1102 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Technik ► Elektrotechnik / Energietechnik | |
ISBN-10 | 1-119-87540-4 / 1119875404 |
ISBN-13 | 978-1-119-87540-6 / 9781119875406 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich