Abstract
Cognitive security and privacy management are required to address the vulnerabilities of 6G networks. This chapter demonstrates a brief discussion of various potential attacks/threats in 6G networks. There are different potential attacks to compromise the physical layer, connection layer, and processing layer operations of a network including access control attack, eavesdropping, jamming, data modification, attack on internet of things devices, malicious code injection, location tracking, distributed denial of service, man-in-the-middle attack, poisoning, evasion, Sybil attack, etc. A successful Privilege Escalation Attacks is launched inside the Linux container mechanism, which is able to disable the protection methods of the system. In cell-free Massive Multiple Input Multiple Output networks, pilot spoofing attacks are the most frequent attacks. In contrast to traditional communication technology, reconfigurable intelligent surface can have a unique feature of controlling the propagation environment that ensures secure transmission.
| Original language | English |
|---|---|
| Title of host publication | 6G Wireless |
| Subtitle of host publication | The Communication Paradigm Beyond 2030 |
| Publisher | CRC Press |
| Pages | 203-258 |
| Number of pages | 56 |
| ISBN (Electronic) | 9781000882421 |
| ISBN (Print) | 9781032251738 |
| DOIs | |
| Publication status | Published - 2023 |
ASJC Scopus subject areas
- General Engineering
- General Computer Science