Chapter 10

Security and Privacy of 6G

Chamitha de Alwis

Chamitha de Alwis

University of Bedfordshire, Luton, United Kingdom

Search for more papers by this author
Quoc-Viet Pham

Quoc-Viet Pham

Pusan National University, Busan, Korea

Search for more papers by this author
Madhusanka Liyanage

Madhusanka Liyanage

University College Dublin, Dublin, Ireland

Search for more papers by this author
First published: 25 November 2022

Summary

Sixth-generation (6G) is envisaged to rely on the advancements of Artificial Intelligence and data analytics to provide personalized and fully automated seamless communication services. However, this may lead to several security and privacy issues and concerns. This chapter discusses the security threat landscape of future 6G networks. In the fifth-generation (5G) architecture, security and privacy threats are caused at access, backhaul, and core networks. Cyberware and critical infrastructure threats, network functions virtualization and software-defined networking-related threats, and cloud computing-related threats are the most common security issues in 5G. The chapter discusses the security considerations, 6G security vision, and the potential security Key Performance Indicators. It describes the security landscape for the envisioned 6G architecture which is classified into four key areas such as functional architecture, edge intelligence and cloudification, specialized subnetworks, and network management and orchestration.

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.