Abstract
Cognitive security and privacy management are required to address the vulnerabilities of 6G networks. This chapter demonstrates a brief discussion of various potential attacks/threats in 6G networks. There are different potential attacks to compromise the physical layer, connection layer, and processing layer operations of a network including access control attack, eavesdropping, jamming, data modification, attack on internet of things devices, malicious code injection, location tracking, distributed denial of service, man-in-the-middle attack, poisoning, evasion, Sybil attack, etc. A successful Privilege Escalation Attacks is launched inside the Linux container mechanism, which is able to disable the protection methods of the system. In cell-free Massive Multiple Input Multiple Output networks, pilot spoofing attacks are the most frequent attacks. In contrast to traditional communication technology, reconfigurable intelligent surface can have a unique feature of controlling the propagation environment that ensures secure transmission.
Original language | English |
---|---|
Title of host publication | 6G Wireless |
Subtitle of host publication | The Communication Paradigm Beyond 2030 |
Publisher | CRC Press |
Pages | 203-258 |
Number of pages | 56 |
ISBN (Electronic) | 9781000882421 |
ISBN (Print) | 9781032251738 |
DOIs | |
Publication status | Published - 2023 |
ASJC Scopus subject areas
- General Engineering
- General Computer Science