The advent of 6G wireless communications is still about a decade away. Nonetheless, initial discussion around emerging technologies and potential applications for this next generation has already begun.
As with any new technologies, new threats will emerge that need to be addressed, in addition to any existing threats that will be carried over from past generation networks. The nature of these threats will depend, in large part, on any inherent vulnerabilities in the design, development, and implementation of 6G wireless communications; and on efforts to remediate existing vulnerabilities. As always with security, its successful application will depend on the due diligence of appropriate risk assessments and threat modeling.
Over 17 pages Conceptualizing Security in a 6G World will show you:
- The interplay between current and emerging security threats and the development of 6G
- Where new approaches and new thinking need to be brought to bear today
- Links to wider reading on an array of essential topics
- Recommendations for securing 6G