Security and Privacy for 6G Massive IoT (eBook)
285 Seiten
Wiley (Verlag)
978-1-119-98798-7 (ISBN)
Anticipate the security and privacy threats of the future with this groundbreaking text
The development of the next generation of mobile networks (6G), which is expected to be widely deployed by 2030, promises to revolutionize the Internet of Things (IoT), interconnecting a massive number of IoT devices (massive IoT) on a scale never before envisioned. These devices will enable the operation of a wide spectrum of massive IoT applications such as immersive smart cities, autonomous supply chain, flexible manufacturing and more. However, the vast number of interconnected IoT devices in the emerging massive IoT applications will make them vulnerable to an unprecedented variety of security and privacy threats, which must be anticipated in order to harness the transformative potential of these technologies.
Security and Privacy for 6G Massive IoT addresses this new and expanding threat landscape and the challenges it poses for network security companies and professionals. It offers a unique and comprehensive understanding of these threats, their likely manifestations, and the solutions available to counter them. The result creates a foundation for future efforts to research and develop further solutions based on essential 6G technologies.
Readers will also find:
- Analysis based on the four-tier network architecture of 6G, enhanced by Edge Computing and Edge Intelligence
- Detailed coverage of 6G enabling technologies including blockchain, distributed machine learning, and many more
- Scenarios, use cases, and security and privacy requirements for 6G Massive IoT applications
Security and Privacy for 6G Massive IoT is ideal for research engineers working in the area of IoT security and designers working on new 6G security products, among many others.
Georgios Mantas (PhD) is a Researcher at the Instituto de Telecomunicações - Aveiro, Portugal, and a part-time Senior Lecturer in Digital Security & Management with the Faculty of Engineering and Science at the University of Greenwich, Chatham Maritime, UK. He is a member of the IEEE, and has published widely on IoT security and privacy subjects.
Firooz B. Saghezchi (PhD) is a Senior Researcher at the Chair for Distributed Signal Processing of RWTH Aachen University, Aachen, Germany. He is a Senior Member of the IEEE and has published widely on wireless communications and cybersecurity subjects.
Jonathan Rodriguez (PhD, DSc) is Professor of Mobile and Satellite Communications in the Faculty of Computing, Engineering, and Science at the University of South Wales, Pontypridd, UK. His career-long contribution and impact to mobile communications and security research have led to his DSc award in 2022.
Victor Sucasas (PhD) is a Senior Director in the Cryptography Research Center at the Technology Innovation Institute (TII), Abu Dhabi, UAE. He leads the Confidential Computing Team, covering privacy enhancing technologies. He is a Senior IEEE and ComSoc member, and an EAI fellow, and has published widely on security and privacy issues.
Anticipate the security and privacy threats of the future with this groundbreaking text The development of the next generation of mobile networks (6G), which is expected to be widely deployed by 2030, promises to revolutionize the Internet of Things (IoT), interconnecting a massive number of IoT devices (massive IoT) on a scale never before envisioned. These devices will enable the operation of a wide spectrum of massive IoT applications such as immersive smart cities, autonomous supply chain, flexible manufacturing and more. However, the vast number of interconnected IoT devices in the emerging massive IoT applications will make them vulnerable to an unprecedented variety of security and privacy threats, which must be anticipated in order to harness the transformative potential of these technologies. Security and Privacy for 6G Massive IoT addresses this new and expanding threat landscape and the challenges it poses for network security companies and professionals. It offers a unique and comprehensive understanding of these threats, their likely manifestations, and the solutions available to counter them. The result creates a foundation for future efforts to research and develop further solutions based on essential 6G technologies. Readers will also find: Analysis based on the four-tier network architecture of 6G, enhanced by Edge Computing and Edge Intelligence Detailed coverage of 6G enabling technologies including blockchain, distributed machine learning, and many more Scenarios, use cases, and security and privacy requirements for 6G Massive IoT applications Security and Privacy for 6G Massive IoT is ideal for research engineers working in the area of IoT security and designers working on new 6G security products, among many others.
| Erscheint lt. Verlag | 10.12.2024 |
|---|---|
| Sprache | englisch |
| Themenwelt | Technik ► Elektrotechnik / Energietechnik |
| Technik ► Nachrichtentechnik | |
| Schlagworte | 6G • 6G, 6G network architecture • 6G network architecture • Blockchain • federated learning • Intrusion Detection • massive IoT • Multi-Party Computation • Physical Layer Security • privacy • Privacy-Preserving Machine Learning • Quantum Security • secure edge intelligence • security • tactile Internet • threat analysis |
| ISBN-10 | 1-119-98798-9 / 1119987989 |
| ISBN-13 | 978-1-119-98798-7 / 9781119987987 |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich