logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Security and Privacy Vision in 6g: A Comprehensive Guide

Security and Privacy Vision in 6g: A Comprehensive Guide (Hardcover)

Madhusanka Liyanage, Pawani Porambage (엮은이)
John Wiley and Sons Ltd
231,180원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
189,560원 -18% 0원
9,480원
180,080원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Security and Privacy Vision in 6g: A Comprehensive Guide
eBook 미리보기

책 정보

· 제목 : Security and Privacy Vision in 6g: A Comprehensive Guide (Hardcover) 
· 분류 : 외국도서 > 기술공학 > 기술공학 > 텔레커뮤니케이션
· ISBN : 9781119875406
· 쪽수 : 384쪽
· 출판일 : 2023-08-08

목차

Foreword

Preface

0.1 Book Organization

Acknowledgments

Acronyms

 

1 Evolution of Mobile Networks

1.1 Introduction

1.2 6G Mobile Communication Networks

1.2.1 6G as Envisioned Today

1.3 Key Driving Trends Towards 6G

1.4 6G Requirements/Vision

1.4.1 6G Development Timeline

 

2 Key 6G Technologies

2.1 Radio Network Technologies

2.1.1 Beyond sub 6 GHz towards THz Communication

2.1.2 Non-Terrestrial Networks Towards 3D Networking

2.2 AI/ML/FL

2.3 DLT/Blockchain

2.4 Edge Computing

2.5 Quantum Communication

2.6 Other New Technologies

2.6.1 Visible Light Communications

2.6.2 Large Intelligent Surfaces

2.6.3 Compressive Sensing

2.6.4 Zero-touch network and Service Management

2.6.5 Efficient Energy Transfer and Harvesting

 

3 6G Security Vision

3.1 Overview of 6G Security Vision

3.1.1 New 6G Requirements

3.2 6G Security Vision and KPIs

3.2.1 Security Threat Landscape for 6G Architecture

 

4 6G Device Security

4.1 Overview of 6G devices

4.2 6G Device Security Challenges

4.2.1 Growth of Data Collection

4.2.2 Cloud Connectivity

4.2.3 Device Capacity

4.2.4 Ultra Saturated Devices

4.3 Addressing Device Security in 6G

 

5 Open RAN and RAN-Core convergence

5.1 Introduction

5.2 Open RAN Architecture

5.3 Threat Vectors and Security Risks Associated with Open RAN

5.3.1 Threat Taxonomy

5.3.2 Risks related to the Process

5.3.3 Risks related to the Technology

5.3.4 Global Risks

5.4 Security Benefits of Open RAN

5.4.1 Open RAN specific

5.4.2 V-RAN specific

5.4.3 5G networks Related

5.5 Conclusion

 

6 Edge intelligence

6.1 Overview of edge intelligence

6.2 State-of-the-art related to 5G

6.2.1 Denial of Service (DOS)

6.2.2 Man-in-the-Middle (MitM) Attack

6.2.3 Privacy leakage

6.3 State-of-the-art related to 6G

6.3.1 Training dataset manipulation

6.3.2 Interception of Private Information

6.3.3 Attacks on learning Agents

6.4 Edge computing security in autonomous driving

6.5 Future and challenges

 

7 Specialized 6G Networks and Network Slicing

7.1 Overview of 6G Specialized Networks                

7.2 Network Slicing in 6G                         

7.2.1 Trust in Network Slicing                 

7.2.2 Privacy Aspects in Network Slicing           

7.2.3 Solutions for Privacy and Trust in NS   

     

8 Industry 5.0

8.1 Introduction                               

8.2 Motivations behind the Evolution of Industry 5.0         

8.3 Key Features of Industry 5.0                     

8.3.1 Smart Additive Manufacturing              

8.3.2 Predictive Maintenance                  

8.3.3 Hyper Customization                   

8.3.4 Cyber Physical Cognitive Systems            

8.4 Security of Industry 5.0                        

8.4.1 Security Issues of Industry 5.0              

8.5 Privacy of Industry 5.0                         

 

9 Metaverse Security in 6G

9.1 Overview of Metaverse                          

9.2 What is Metarverse?                          

9.2.1 Metaverse architecture                  

9.2.2 Key characteristics of metaverse             

9.2.3 Role of 6G in Metaverse                 

9.3 Security Threats in metaverse                      

9.4 Countermeasures for metaverse security threats          

9.5 New trends in metaverse security                   

 

10 Society 5.0 and Security

10.1 Industry and Society Evolution                    

10.1.1 Industry 4.0                         

10.1.2 Society 5.0                         

10.2 Technical Enablers and Challenges                  

10.2.1 Dependable Wireless Connectivity            

10.2.2 Integrated Communication, Control, Computation, and Sensing                         

10.2.3 Intelligence Everywhere                  

10.2.4 Energy Harvesting and Transfer             

10.3 Security in Society 5.0                         

 

11 6G-enabled Internet of Vehicles

11.1 Overview of V2X Communication and IoV             

11.2 IoV Use Cases                              

11.3 Connected Autonomous Vehicles (CAV)               

11.4 Unmanned Aerial Vehicles in Future IoV              

11.5 Security Landscape for IoV                      

11.5.1 Security Threats                      

11.5.2 Security Requirements                  

 

 

12 Smart Grid 2.0 Security

12.1 Introduction                               

12.2 Evolution of SG 2.0                           

12.3 Smart Grid 2.0                              

12.3.1 Comparison of Smart Grid 1.0 and 2.0         

12.4 Role of 6G in SG 2.0                          

12.5 Security Challenges of SG 2.0                     

12.5.1 Physical Attacks                      

12.5.2 Software Attacks                     

12.5.3 Network Attacks                     

12.5.4 Attacks to the Controller                

12.5.5 Encryption related Attacks               

12.5.6 AI and ML related Attacks                

12.5.7 Stability and Reliability of power supply        

12.5.8 Secure and transparent energy trading among pro-sumers and consumers                  

12.5.9 Efficient and reliable communication topology for information and control signal exchange        

12.6 Privacy issues of SG2.0                         

12.7 Trust Management                           

12.8 Security and Privacy Standardization on SG 2.0          

 

13 6G Privacy

13.1 Introduction                               

13.2 Privacy Taxonomy                            

13.3 Privacy in Actions on Data                      

13.3.1 Information Collection                   

13.3.2 Information Processing                  

13.3.3 Information Dissemination                

13.3.4 Invasion                            

13.4 Privacy Types for 6G                          

13.4.1 Data                             

13.4.2 Actions and Personal Behaviour             

13.4.3 Image and Video                      

13.4.4 Communication                      

13.4.5 Location                           

13.5 6G Privacy goals                            

13.5.1 Ensure of privacy-protected big data          

13.5.2 Privacy guarantees for edge networks          

13.5.3 Achieving balance between privacy and performance of services

13.5.4 Standardization of privacy in technologies, and applications                          

13.5.5 Balance the interests in privacy protection in global context                            

13.5.6 Achieving proper utilization of interoperability and data portability                       

13.5.7 Quantifying privacy and privacy violations       

13.5.8 Getting explanations of AI actions for privacy requirements                          

 

 

14 6G Privacy Challenges and Possible Solution

14.1 Introduction                               

14.2 6G Privacy Challenges and Issues                   

14.2.1 Advanced 6G applications with new privacy requirements                            

14.2.2 Privacy preservation limitations for B5G/6G control and orchestration layer                  

14.2.3 Privacy attacks on AI models              

14.2.4 Privacy requirements in cloud computing and storage environments                     

14.2.5 Privacy issues in edge computing and Edge AI    

14.2.6 Cost on privacy enhancements              

14.2.7 Limited availability of Explainable AI (XAI) techniques

14.2.8 Ambiguity in responsibility of data ownership     

14.2.9 Data communication confidentiality issues       

14.2.10 Private Data Access Limitations             

14.2.11 Privacy differences based on location          

14.2.12 Lack of understanding of privacy rights and threats

in general public                      

14.2.13 Difficulty in defining levels and indicators for privacy

14.3 Privacy Solutions for 6G                        

14.3.1 Privacy-preserving decentralized AI           

14.3.2 Edge AI                           

14.3.3 Intelligent management with privacy          

14.3.4 XAI for privacy                       

14.3.5 Privacy measures for Personally Identifiable Information                            

14.3.6 Blockchain-based Solutions                

14.3.7 Lightweight and quantum resistant encryption mechanisms                             

14.3.8 Homomorphic Encryption                 

14.3.9 Privacy-preserving data publishing techniques     

14.3.10 Privacy by design and Privacy by default        

14.3.11 Regulation of Government, Industry, and Consumer

14.3.12 Other solutions                       

 

15 Legal Aspects and Security Standardization

15.1 Legal                                   

15.2 Security Standardization                        

15.2.1 ETSI                             

15.2.2 ITU-T                             

15.2.3 3GPP                            

15.2.4 NIST                            

15.2.5 IETF                             

15.2.6 5G PPP                           

15.2.7 NGMN                           

15.2.8 IEEE                              

 

16 Distributed Ledger Technologies (DLTs) and Blockchain

16.1 Introduction                               

16.2 What is DLT                               

16.3 What is Blockchain                           

16.3.1 Types of Blockchain                     

16.4 What is Smart Contracts                       

16.5 Salient Features of Blockchain                    

16.6 Key Security Challenges which Blockchain can Solve       

16.6.1 Role of Blockchain                     

16.7 Key Privacy Challenges which Blockchain can Solve       

16.7.1 Key Challenges                       

16.7.2 Role of Blockchain                     

16.8 Threat Landscape of Blockchain                   

16.9 Possible Solutions to secure 6G Blockchains            

 

17 AI/ML for 6G Security

17.1 Overview of 6G intelligence                      

17.2 AI for 6G Security                            

17.3 Use of AI to Identify/Mitigate Pre-6G Security Issues       

17.4 AI to Mitigate Security Issues of 6G Architecture         

17.5 AI to Mitigate Security Issues of 6G Technologies         

17.6 Security Issues in AI                          

17.7 Using AI to Attack 6G                         

 

18 Role of Explainable AI in 6G Security

18.1 What is Explainable AI (XAI)                     

18.1.1 Terminologies of XAI                   

18.1.2 Taxonomy of XAI                     

18.1.3 XAI Methods                        

18.2 Use of XAI for 6G                           

18.3 XAI for 6G Security                           

18.3.1 XAI for 6G Devices and IoT Security          

18.3.2 XAI for 6G RAN                      

18.3.3 XAI for 6G Edge                      

18.3.4 XAI for 6G Core and Backhual              

18.3.5 XAI for 6G Network Automation            

18.4 New Security issues of XAI                      

18.4.1 Increased vulnerability to adversarial ML attacks   

18.4.2 Difficulty to design secure ML applications      

18.4.3 New attack vector and target              

 

19 Zero touch network and Service Management (ZSM) Security

19.1 Introduction                               

19.1.1 Need of Zero-Touch Network and Service Management                             

19.1.2 Importance of ZSM for 5G and Beyond        

19.2 ZSM Reference Architecture                     

19.2.1 Components                        

19.3 Security Aspects                            

19.3.1 ML/AI-based Attacks                   

19.3.2 Open API Security Threats               

19.3.3 Intent-based Security Threats              

19.3.4 Automated Closed-Loop Network based Security Threats

19.3.5 Threats due to Programmable Network Technologies

19.3.6 Possible Threats on ZSM Framework Architecture  

 

20 Physical Layer Security

20.1 Introduction                               

20.2 Physical layer security background                  

20.2.1 PLS fundamentals                     

20.2.2 PLS Approaches                      

20.3 The prospect of PLS in 6G                      

20.3.1 Application scenarios of PLS in 6G           

20.3.2 6G technologies and PLS                

20.3.3 Cell-free mMIMO                     

20.3.4 Visible Light Communication (VLC)          

20.3.5 Terahertz Communication                

20.3.6 Joint Communications and Sensing           

 

21 Quantum Security and Post-Quantum Cryptography

21.1 Overview of 6G and Quantum Computing              

21.2 Quantum Computing                          

21.3 Quantum Security                             

21.3.1 Quantum Key Distribution                

21.3.2 Information-theoretic security              

21.4 Post-Quantum Cryptography                     

21.4.1 Background                         

21.4.2 PQC methods                       

21.4.3 PQC standardisation                   

21.4.4 Challenges with PQC                   

21.4.5 Future directions of PQC                 

21.4.6 6G and PQC 

                      

22 Concluding Remarks

 

Index

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책