Call for Chapters: Security Issues and Solutions in 6G Communications and Beyond


Dr(h.c) Digvijay Pandey, Department of Technical Education (Government of U.P), India
Tanveer Ahmad, Tata Consultancy Services, United Kingdom
Binay Pandey, Govind Ballabh Pant University of Agriculture and Technology, India

Call for Chapters

Proposals Submission Deadline: December 31, 2023
Full Chapters Due: March 3, 2024
Submission Date: March 3, 2024


The 6G Communication network emerged with the developments in new generation Information and Communication Technologies such as Artificial Intelligence, Virtual Reality/Augmented Reality/Extended Reality, Internet of Things, and blockchain technology. The development of 6G has a profound impact on the intelligence process of communication development that consists of intelligent connectivity, deep connectivity, holographic connectivity, and ubiquitous connectivity. The security and privacy challenges discussed may be encountered with the expected 6G requirements, security key performance indicators (KPIs), novel network architecture, new applications and enabling technologies. The challenges arise due to UAV-based mobility, Holographic Telepresence, Extended Reality, Connected Autonomous Vehicles, Smart Grid 2.0, Industry 5.0, Intelligent Healthcare, Digital Twin, etc. The security solutions for distributed ledger technology (DLT), physical layer security, quantum communication, and distributed AI/ML are provided. The Distributed Ledger Technology threats include Majority attacks / 51% attacks, double spending attacks, Re-entrance Attacks, Sybil attacks, Privacy Leakages, other attacks, etc. The possible solutions include proper access control and authentication mechanisms, selecting the proper blockchain/DLT type according to the 6G application and services, etc. The Physical Layer Security requires line of sight transmission which can be overcome by multipath transmission in Terahertz Technology, broadcast nature of visible light communications which can be overcome by enhancing secrecy performance by using multiple input multiple output technology, Quantum cloning attacks and quantum collision attacks in Quantum Computing which can be overcome by lattice-based, code-based, hash-based and multivariate-based cryptography, etc, poisoning attacks, evasion attacks, API - based attacks that can affect Distributed and Scalable AI/ML that can be overcome by Adversarial training injects, Defensive distillation, etc. Finally, the road map for materializing 6G security visions into a reality is provided.


The emergence of new generation information and communication technologies, including blockchain technology, virtual reality/augmented reality/extended reality, Internet of Things, and artificial intelligence, gave rise to the 6G communication network. The intelligence process of communication development, which includes holographic, pervasive, deep, and intelligent connectivity, is significantly impacted by the development of 6G. The security and privacy issues that could arise with the anticipated 6G specifications, security KPIs, unique network architecture, new apps, and enabling technologies are explored. The problems stem from the mobility of UAVs, holographic telepresence, digital twins, connected autonomous vehicles, extended reality, smart grid 2.0, industry 5.0, intelligent healthcare, etc. Distributed ledger technology (DLT), physical layer security, quantum communication, and other security solutions

Target Audience

Academics, managers, public and private organizations, and the general public are the target audiences who will gain the most from the findings presented in this book. This publication will be helpful to develop and inspire additional research studies by postgraduate students with research interests in accounting and other social sciences by disseminating research findings on "Security Issues and Solutions in 6G Communications and Beyond Transformation" in the New Era.

Recommended Topics

Reconfigurable Intelligent Surface Assisted Localization: Technologies, Challenges Network Slicing Architectures with Machine Learning, Security, Sustainability Recent Advances in Security and Privacy for 6G Networks A New Approach to Cloud-Native Observability, Networking and Security for Current (5G) and Future Mobile Networks (6G and Beyond) Data Access Control and Sharing Scheme in Fog and Cloud Computing Environments for the 6G Systems Energy-efficient Edge Association in Digital Twin empowered 6G Networks. 6G security challenges and potential solutions

Submission Procedure

Researchers and practitioners are invited to submit on or before December 31, 2023, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by January 14, 2024 about the status of their proposals and sent chapter guidelines.Full chapters are expected to be submitted by March 3, 2024, and all interested authors must consult the guidelines for manuscript submissions at prior to submission. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Security Issues and Solutions in 6G Communications and Beyond. All manuscripts are accepted based on a double-blind peer review editorial process.

All proposals should be submitted through the eEditorial Discovery® online submission manager.


This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), an international academic publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. IGI Global specializes in publishing reference books, scholarly journals, and electronic databases featuring academic research on a variety of innovative topic areas including, but not limited to, education, social science, medicine and healthcare, business and management, information science and technology, engineering, public administration, library and information science, media and communication studies, and environmental science. For additional information regarding the publisher, please visit This publication is anticipated to be released in 2024.

Important Dates

December 31, 2023: Proposal Submission Deadline
January 14, 2024: Notification of Acceptance
March 3, 2024: Full Chapter Submission
April 7, 2024: Review Results Returned
May 5, 2024: Final Acceptance Notification
May 12, 2024: Final Chapter Submission


Dr(h.c) Digvijay Pandey
Department of Technical Education (Government of U.P)

Tanveer Ahmad
Tata Consultancy Services

Binay Pandey
Govind Ballabh Pant University of Agriculture and Technology


Computer Science and Information Technology; Computer Science and Information Technology; Security and Forensics; Security and Forensics; Science and Engineering; Science and Engineering
Back to Call for Papers List