6G networks are expected to provide one-microsecond latency communication with a billion devices competing for resources 1000 times faster than current standards. Increases in network speed, heterogeneity, virtualization, better radio requirements and adaptive communications will place new demands on physical layer security. Moreover, IoT, blockchain, and artificial intelligence are enabling technologies that require rapid data rates, raising a significant burden on the network's physical layer, requiring that security must be attained at a fast pace, and that the network must be resilient to accommodate sudden changes to the configurations or the load.
Physical layer (PHY) security solutions are needed that have the capacity to handle the new demands of 6G networks, whilst protecting those networks against risk factors such as interference, data spoofing, replay attacks, side-channel attacks, jamming, traffic analysis, and cyber-vandalism attacks. This comprehensive book addresses the PHY security challenges and proposes efficient and resilient physical layer security solutions for beyond 5G networks leading to 6G. Several topics have emerged that rely on PHY security in solving real-world network challenges such as ultra-dense networks, adaptive communication, distributed technology, and artificial intelligence.
Physical Layer Security for 6G Networks helps readers understand the expectations of 6G's physical layer security in supporting pervasive and integrated communication networks, AI convergence and utility, and develop better sensing solutions, which go beyond cognitive radio, device-to-device or mm-wave communications.
Les mer
Addressing the physical layer security challenges and proposing efficient and resilient physical layer security solutions for beyond 5G networks leading to 6G, this book will help readers better understand the expectations of 6G's physical layer security in supporting a range of communications and sensing technologies.
Les mer
Part I: Fundamental theories of physical layer securityChapter 1: Learned codes for dependent wiretap channelsChapter 2: Physical layer security in the terahertz bandChapter 3: Eavesdropping attacks for terahertz wireless linksChapter 4: Intelligent reflecting surface-aided physical layer security of wireless communications
Part II: Authentication using channel features and hardware impairmentsChapter 5: Intelligent physical layer authenticationChapter 6: Deep learning-enhanced radio frequency fingerprint identificationChapter 7: Radio frequency fingerprint-based wireless device identification
Part III: Key generation from wireless channelsChapter 8: Secret key generation from wireless channelsChapter 9: Impact of reconfigurable intelligent surfaces on physical layer key generation in NextG wireless networksChapter 10: Physical layer key generation for LoRa-enabled networksChapter 11: Robust secret key generation from stochastic fading in the presence of passive and active attackersChapter 12: Physical-layer key generation for multi-user massive MIMO wireless communications
Part IV: Applications of physical layer securityChapter 13: Physical layer security for UAV wireless networksChapter 14: Secure communication in mobile edge computing networks with RF energy harvestingChapter 15: Secure and private localization in 6G networksChapter 16: Radio frequency informed physical layer security - an augmented padlock to wireless transmission secrecyChapter 17: Physical layer security for non-orthogonal multiple access toward 6GChapter 18: Detecting unpredictable adversaries in the industrial network with blockchainChapter 19: Using support vector machines for detecting active spoofing attacks
Les mer
Produktdetaljer
ISBN
9781839536915
Publisert
2024-05-07
Utgiver
Vendor
Institution of Engineering and Technology
Høyde
234 mm
Bredde
156 mm
Aldersnivå
U, P, 05, 06
Språk
Product language
Engelsk
Format
Product format
Innbundet
Antall sider
596