A Comprehensive Overview of Security and Privacy in the 6G Era

Shakila Zaman, Faisal Tariq, Muhammad Khandaker, Risala T. Khan

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Cognitive security and privacy management are required to address the vulnerabilities of 6G networks. This chapter demonstrates a brief discussion of various potential attacks/threats in 6G networks. There are different potential attacks to compromise the physical layer, connection layer, and processing layer operations of a network including access control attack, eavesdropping, jamming, data modification, attack on internet of things devices, malicious code injection, location tracking, distributed denial of service, man-in-the-middle attack, poisoning, evasion, Sybil attack, etc. A successful Privilege Escalation Attacks is launched inside the Linux container mechanism, which is able to disable the protection methods of the system. In cell-free Massive Multiple Input Multiple Output networks, pilot spoofing attacks are the most frequent attacks. In contrast to traditional communication technology, reconfigurable intelligent surface can have a unique feature of controlling the propagation environment that ensures secure transmission.

Original languageEnglish
Title of host publication6G Wireless
Subtitle of host publicationThe Communication Paradigm Beyond 2030
PublisherCRC Press
Pages203-258
Number of pages56
ISBN (Electronic)9781000882421
ISBN (Print)9781032251738
DOIs
Publication statusPublished - 2023

ASJC Scopus subject areas

  • General Engineering
  • General Computer Science

Fingerprint

Dive into the research topics of 'A Comprehensive Overview of Security and Privacy in the 6G Era'. Together they form a unique fingerprint.

Cite this