A Comprehensive Overview of Security and Privacy in the 6G Era

Shakila Zaman, Faisal Tariq, Muhammad Khandaker, Risala T. Khan

Research output: Chapter in Book/Report/Conference proceedingChapter


Cognitive security and privacy management are required to address the vulnerabilities of 6G networks. This chapter demonstrates a brief discussion of various potential attacks/threats in 6G networks. There are different potential attacks to compromise the physical layer, connection layer, and processing layer operations of a network including access control attack, eavesdropping, jamming, data modification, attack on internet of things devices, malicious code injection, location tracking, distributed denial of service, man-in-the-middle attack, poisoning, evasion, Sybil attack, etc. A successful Privilege Escalation Attacks is launched inside the Linux container mechanism, which is able to disable the protection methods of the system. In cell-free Massive Multiple Input Multiple Output networks, pilot spoofing attacks are the most frequent attacks. In contrast to traditional communication technology, reconfigurable intelligent surface can have a unique feature of controlling the propagation environment that ensures secure transmission.

Original languageEnglish
Title of host publication6G Wireless
Subtitle of host publicationThe Communication Paradigm Beyond 2030
PublisherCRC Press
Number of pages56
ISBN (Electronic)9781000882421
ISBN (Print)9781032251738
Publication statusPublished - 2023

ASJC Scopus subject areas

  • General Engineering
  • General Computer Science


Dive into the research topics of 'A Comprehensive Overview of Security and Privacy in the 6G Era'. Together they form a unique fingerprint.

Cite this