DaSilva | 6g Security | Buch | 978-1-394-29246-2 | www.sack.de

Buch, Englisch, 224 Seiten

DaSilva

6g Security

New Frontiers in Mobile Network Technologies and Verticals
1. Auflage 2026
ISBN: 978-1-394-29246-2
Verlag: Wiley

New Frontiers in Mobile Network Technologies and Verticals

Buch, Englisch, 224 Seiten

ISBN: 978-1-394-29246-2
Verlag: Wiley


An authoritative and up-to-date discussion of securing future 6G networks

This book delivers a comprehensive, one-stop reference for 6G security, explaining the major technologies and use cases being contemplated for 6G, as well as the security issues relevant to those technologies and application areas. It explores security issues associated with key 6G technologies, including softwarization, disaggregation, slicing, blockchain, federated learning, non-terrestrial networks, and millimeter-wave, as well as major verticals enabled by 6G technology.

The book articulates critical technical challenges and opportunities for securing 6G systems, like how to secure autonomous vehicles with machine learning, and covers essential areas of a looming technological revolution that will pose significant security challenges for stakeholders.

Readers will also find: - A thorough introduction to the new frontiers opened up by 6G technology
- Comprehensive explorations of securing radio access network slicing
- Practical discussions on how to secure management with blockchain-based federated learning
- Complete treatments of securing millimeter-wave communications and developing smart microgrids with distributed energy resources

Perfect for mobile network professionals and technologists, 6G Security: New Frontiers in Mobile Network Technologies and Verticals will also benefit service providers, researchers, and students with an interest in communications networks and their security.

DaSilva 6g Security jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


Contents

Contributors

Foreword

Bibliography

Acknowledgments

Acronyms

1 Securing 6G: New Frontiers

1.1 Introduction

1.2 Generational evolution of networks and security mechanisms

1.3 What is coming in 6G?

1.3.1 Standardization Timeline

1.3.2 Key features of 6G

1.3.3 Open RAN

1.3.4 AI-native

1.4 The Road to Resilient 6G

Introduction of New Technologies

Multi-vendor Operation

Artificial Intelligence Everywhere

1.5 Technologies and Verticals

Bibliography

2 Securing Softwarization and Disaggregation

2.1 Introduction

2.2 Preliminaries

2.2.1 VNF & VNF Chaining

2.2.2 Security and Trust Management in 5G - State of the Art

2.2.3 Limitations of Centralized 5G Trust Management

2.3 Disaggregated Trust Management Framework

2.3.1 Trust Management for NFV

2.3.2 Creating Secure VNFs with Disaggregated Trust

2.3.3 Creating a Function that Maps VNF Chains to a 5G Network

2.3.4 Challenges and Open Problems

2.4 Securing O-RAN Systems

2.5 Key Takeaways

Bibliography

3 Securing Radio Access Network Slicing

3.1 Introduction

3.2 Network Slicing Using Machine Learning

3.2.1 RAN Slicing Resource Management

3.2.2 RAN Slicing Security

3.3 Adversarial Machine Learning

3.4 Adversarial Machine Learning for Wireless Systems

3.5 Attacks on Reinforcement Learning for RAN Slicing

3.6 Multitask Learning for RAN Slicing Security

3.7 Adversarial Attacks on Single-Task and Multitask Learning for RAN Slicing

3.8 Adversarial Training as the Defense against Adversarial Attacks on RAN Slicing

3.9 Key Takeaways

Bibliography

4 Securing Management with Blockchain-based Federated Learning

4.1 Introduction

4.1.1 Challenges and Contributions

4.2 Background

4.2.1 Blockchain

4.2.2 Federated Learning

4.2.3 Blockchain-empowered FL

4.2.4 Critical Limitations of Blockchain-based FL

4.3 BlockFed Framework

4.3.1 System Overview

4.3.2 Key Steps in BlockFed

4.4 Experimental Results

4.4.1 Experimental Setting

4.4.2 Performance Comparison

4.5 Key Takeaways

Bibliography

5 Securing Non-Terrestrial Networks

5.1 Introduction

5.1.1 Non-Terrestrial Network: The Definition

5.1.2 Motivation for the Non-Terrestrial Networks (NTN)

5.1.3 NTNs – A Historical Perspective and Emerging Industry Trends

5.1.4 3rd Generation Partnership Project (3GPP) NTN Roadmap

5.2 3GPP NTN Architecture

5.2.1 Types of NTN platforms

5.2.2 Types of Beams

5.2.3 NTN Architectures

5.3 Unique NTN Challenges and Associated Candidate Solutions

5.3.1 NTN-Specific Challenges

5.3.2 3GPP-defined NTN Solutions

5.4 Security Vulnerabilities in the NTN

5.4.1 Overview of NTN-Specific Interfaces

5.4.2 Analysis of Jamming Attacks on Wireless Interfaces of the NTN

5.4.3 Candidate Strategies for Enhanced NTN Security

5.5 Evolution of the NTN in 5G-Advanced and 6G

5.5.1 5G NTN Enhancements in 3GPP Release and beyond

5.5.2 Role of the NTN in 6G

5.6 Key Takeaways

Bibliography

6 Securing Next G Millimeter-wave and Terahertz Communication

6.1 Introduction

6.2 Security Vulnerabilities in High-Band Communication Systems

6.2.1 Pilot contamination attack

6.2.2 Beam sweeping attack

6.2.3 Attack against AI/ML-based beam management

6.3 PHY-Layer Authentication for High-Band Communication

6.3.1 Hardware-based RF Fingerprinting

6.3.2 Channel/Location-based Authentication

6.3.3 Hybrid RF Fingerprinting

6.4 Localization of Malicious High-Band Devices

6.4.1 BS to RIS AoD Estimation

6.4.2 ToF Estimation and Different RIS Beam Sweeping Capabilities

6.5 Securing AI/ML-Driven Beam Management

6.5.1 Adaptive Reduction of Beam Sweeping Opportunities

6.5.2 Hardening the AI/ML

6.6 Key Takeaways

Bibliography

7 Securing Cyber-physical Systems Using Homomorphic Encryption

7.1 Introduction

7.2 Background

7.2.1 Cyber-physical Systems

7.2.2 Fully Homomorphic Encryption

7.3 Standardization and Implementation of FHE

7.3.1 Standardization

7.3.2 Implementation

7.3.3 FHE Implementation in NextG Use Case: Healthcare

7.4 Recent Advancements in Securing CPS using FHE

7.4.1 Critical Infrastructures

7.4.2 Internet Of Things (IoT)

7.4.3 Biometric-based Authentication

7.4.4 Mobile Spatial Computing

7.5 Key Takeaways

Bibliography  .

8 Securing Power Constrained Devices with Energy-Preserving Cryptography

8.1 Introduction

8.2 Task 1: Kinetic Energy Harvesting and Gait-based Node Authentication

8.2.1 Proposed Approach

8.2.2 Gait Signal

8.2.3 Experiments

8.3 Sub-threshold Computing for Cryptography

8.3.1 Proposed Approach

8.3.2 Experiments

8.4 Edge Based Re-configurable Cryptography

8.4.1 Background

8.4.2 Proposed Approach

8.4.3 Experiments

8.5 Key Takeaways

Bibliography

9 Securing Smart Microgrid with Distributed Energy Resources

9.1 Introduction

9.2 Microgrid: Overview

9.2.1 Microgrid Components

9.3 Energy Management System

9.3.1 Objective Function

9.3.2 Constraints

9.3.3 Simulation Model

9.3.4 Findings and Interpretation

9.4 Cybersecurity of Microgrids

9.4.1 Types of Cyber Threats

9.4.2 Detection of Security Threats

9.4.3 Adversarial Machine Learning Attack against Solar

PV Power Generation Forecasting

9.4.4 Findings and Interpretation

9.5 Key Takeaways

Bibliography

10. Securing Autonomous Vehicles with Machine Learning

10.1 Introduction

10.2 Machine learning for AVs

10.3 Adversarial Attacks against AVs

10.3.1 Overall Introduction

10.3.2 Adversarial Attack Categories

10.3.3 Adversarial Attacks

10.4 Performance Evaluation

10.4.1 Experimental Settings

10.4.2 Experimental Evaluations

10.5 Possible Defense Mechanisms

10.5.1 Approaches against Adversarial Attacks

10.5.2 Additional Measures for Securing ML for AVs in NextG

10.6 Key Takeaways

Bibliography


Luiz DaSilva is the Bradley Professor of Cybersecurity in the Department of Electrical and Computer Engineering at Virginia Tech, USA. He is also the inaugural Executive Director of the Commonwealth Cyber Initiative, which brings together 46 higher education institutions in Virginia with a common mission of research, innovation, and workforce development for cybersecurity. He has extensive experience in wireless communications and networks research.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.