Fr. 175.00

6g Security - New Frontiers in Mobile Network Technologies and Verticals

Inglese · Copertina rigida

Pubblicazione il 24.03.2026

Descrizione

Ulteriori informazioni

Informationen zum Autor Luiz DaSilva is the Bradley Professor of Cybersecurity in the Department of Electrical and Computer Engineering at Virginia Tech, USA. He is also the inaugural Executive Director of the Commonwealth Cyber Initiative, which brings together 46 higher education institutions in Virginia with a common mission of research, innovation, and workforce development for cybersecurity. He has extensive experience in wireless communications and networks research. Klappentext An authoritative and up-to-date discussion of securing future 6G networks This book delivers a comprehensive, one-stop reference for 6G security, explaining the major technologies and use cases being contemplated for 6G, as well as the security issues relevant to those technologies and application areas. It explores security issues associated with key 6G technologies, including softwarization, disaggregation, slicing, blockchain, federated learning, non-terrestrial networks, and millimeter-wave, as well as major verticals enabled by 6G technology. The book articulates critical technical challenges and opportunities for securing 6G systems, like how to secure autonomous vehicles with machine learning, and covers essential areas of a looming technological revolution that will pose significant security challenges for stakeholders. Readers will also find: A thorough introduction to the new frontiers opened up by 6G technology Comprehensive explorations of securing radio access network slicing Practical discussions on how to secure management with blockchain-based federated learning Complete treatments of securing millimeter-wave communications and developing smart microgrids with distributed energy resources Perfect for mobile network professionals and technologists, 6G Security: New Frontiers in Mobile Network Technologies and Verticals will also benefit service providers, researchers, and students with an interest in communications networks and their security. Inhaltsverzeichnis Contents Contributors Foreword Bibliography Acknowledgments Acronyms 1 Securing 6G: New Frontiers 1.1 Introduction 1.2 Generational evolution of networks and security mechanisms 1.3 What is coming in 6G? 1.3.1 Standardization Timeline 1.3.2 Key features of 6G 1.3.3 Open RAN 1.3.4 AI-native 1.4 The Road to Resilient 6G Introduction of New Technologies Multi-vendor Operation Artificial Intelligence Everywhere 1.5 Technologies and Verticals Bibliography 2 Securing Softwarization and Disaggregation 2.1 Introduction 2.2 Preliminaries 2.2.1 VNF & VNF Chaining 2.2.2 Security and Trust Management in 5G - State of the Art 2.2.3 Limitations of Centralized 5G Trust Management 2.3 Disaggregated Trust Management Framework 2.3.1 Trust Management for NFV 2.3.2 Creating Secure VNFs with Disaggregated Trust 2.3.3 Creating a Function that Maps VNF Chains to a 5G Network 2.3.4 Challenges and Open Problems 2.4 Securing O-RAN Systems 2.5 Key Takeaways Bibliography 3 Securing Radio Access Network Slicing 3.1 Introduction 3.2 Network Slicing Using Machine Learning 3.2.1 RAN Slicing Resource Management 3.2.2 RAN Slicing Security 3.3 Adversarial Machine Learning 3.4 Adversarial Machine Learning for Wireless Systems 3.5 Attacks on Reinforcement Learning for RAN Slicing 3.6 Multitask Learning for RAN Slicing Security 3.7 Adversarial Attacks on Single-Task and Multitask Learning for RAN Slicing 3.8 Adversarial Training as the Defense against Adversarial Attacks on RAN Slicing 3.9 Key Takeaways Bibliography 4 Securing Management with Blockchain-based Federated Learning 4.1 Introduction 4.1.1 ...

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.