Beyond Data Breaches: Enhancing Security in 6G Communications

Beyond Data Breaches: Enhancing Security in 6G Communications

Binay Kumar Pandey (College of Technology, Govind Ballabh Pant University of Agriculture and Technology, India), Digvijay Pandey (Department of Technical Education, Government of Uttar Pradesh, India), Ashi Agarwal (Department of Computer Science, ABES Engineering College, Ghaziabad, India), Darshan A. Mahajan (NICMAR University, Pune, India), Pankaj Dadheech Dadheech (Swami Keshvanand Institute of Technology, Management, and Gramothan, India), A. Shaji George (Almarai Company, Riyadh, Saudi Arabia), and Pankaj Kumar Rai (Loxoft, USA)
Copyright: © 2024 |Pages: 18
DOI: 10.4018/979-8-3693-2931-3.ch013
OnDemand:
(Individual Chapters)
Forthcoming
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter describes the different newly adopted 6G technologies, along with any security risks and potential fixes. The primary 6G technologies that will open up a whole new universe of possibilities are AI/ML, DLT, quantum computing, VLC, and THz communication. The emergence of new generation information and communication technologies, including blockchain technology, virtual reality/augmented reality/extended reality, internet of things, and artificial intelligence, gave rise to the 6G communication network. The intelligence process of communication development, which includes holographic, pervasive, deep, and intelligent connectivity, is significantly impacted by the development of 6G.
Chapter Preview

Complete Chapter List

Search this Book:
Reset