Abstract
The proliferation of technology is now exponential. Developments in technology, the increase in computer power and the reduction of cost, has allowed for greater accessibility, use and implementation of this technology in all sectors and industries. The evolution of smart and autonomous technologies, such as artificial intelligence and machine learning, has enabled traditionally labour intensive data analytical tasks to be conducted, quickly and efficiently. Multiple datasets and data lakes that have been siloed, are now being utilised and interconnected. Digital twin, AI, metaverse, virtual technologies are being immersed into all sectors and more importantly merged into humans where the line between reality and virtual are seeming to be the same. However, in order to succeed utilising these amazing and emerging technologies, it means that there has to be an incredible backbone and capacity to carry data; and instantaneously delivery at high speed and securely. 5G is already in its rollout and has to achieve its objectives in order for 6G to be fully onboarded and implemented in a methodical manner. The European Commission has 5G objectives and is applying funding for strategic initiatives, such as Horizon 2020. There are huge benefits for all with 5G/6G but only if they are implemented in a manner that decreases the risk they can pose to security, privacy and trust, which are core pillars that must be maintained. Smart cities will mean the data that is being collected can be analysed and in the wrong hands it poses security risks to the data/individual/nation. With such an intertwining of technologies interacting with humans and the abundance of IoT and eIoT in smart cities, there has to be a clear governance plan in place and way to manage 5G/6G to ensure success. This chapter explains the 5G/6G background, risks, benefits and highlights the need for robust governance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rodriguez J (2015) Fundamentals of 5G mobile networks, 1st edn. Wiley, Chichester/West Sussex
Al-Dulaimi A, Chih-Lin I, Wang X (2018) 5G networks: fundamental requirements, enabling technologies, and operations management. 1st edn. New Jersey: Wiley
Edfors O, Larsson E-G, Marzetta T-L, Tufvesson F (2014) Massive MIMO for next generation wireless systems. IEEE Commun Mag, pp 186–195
Ge X, Mao G, Han T, Tu S, Wang C-X (2016) 5G ultra-dense cellular networks. In: IEEE wireless communications. 23(1):72–79
Ylianttila M et al 6g white paper: research challenges for trust, security and privacy. arXiv:2004.11665
Shlezinger N et al (2021) Dynamic metasurface antennas for 6G extreme massive MIMO communications. IEEE Wirel Commun 28(2):106–113
Rajatheva et al (2020) White paper on broadband connectivity in 6G. arXiv:2004.14247v1[eess.SP]. https://arxiv.org/abs/2004.14247
Chen M et al (2019) Artificial neural networks-based machine learning for wireless networks: a tutorial. IEEE Commun Surv Tutorials 21(4):3039–3071
Khan LU et al (2020) Network slicing: recent advances, taxonomy, requirements, and open research challenges. IEEE Access 8:36009–36028. https://doi.org/10.1109/ACCESS.2020.2975072
Giordani M et al (2020) Toward 6G networks: use cases and technologies. In: IEEE communications magazine 58(3):55–61. https://doi.org/10.1109/MCOM.001.1900411
Nayak S, Patgiri R (2020) 6G communication: envisioning the key issues and challenges. arXiv:2004.04024
Jagannath A, Jagannath J, Melodia T (2021) Redefining wireless communication for 6G: signal processing meets deep learning with deep unfolding. IEEE Trans Artif Intell 2(6):528–536. https://doi.org/10.1109/TAI.2021.3108129
Yue C et al (2022) Efficient decoders for short block length codes in 6G URLLC. arXiv:2206.09572
European Commission (2021) Shaping Europe’s digital future: 5G. https://digital-strategy.ec.europa.eu/en/policies/5g. Accessed 19 Jan 2023
IEEE (2018) IEEE standards association: IEEE standards activities in 5G”. Available at https://standards.ieee.org/content/dam/ieee-standards/standards/web/documents/other/5G.pdf. Accessed 18 Aug 2019
GSMA (2019) Intelligent connectivity: how the combination of 5G, AI, big data and IoT is set to change everything. Available at https://www.gsma.com/IC/wp-content/uploads/2019/02/22209-Intelligent-connectivity-report.pdf. Accessed 19 Jan 2023
Seeburn K (2019) 5G and AI: a potentially potent combination. Available at http://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=1146#Comments. Accessed 20 Jan 2023
Drechsler et al (2020) At the crossroads between digital innovation and digital transformation. https://www.researchgate.net/publication/341412594_At_the_Crossroads_between_Digital_Innovation_and_Digital_Transformation. Accessed 20 Jan 2023
Kokolek et al (2019) Data protection in the EU. https://commission.europa.eu/law/law-topic/data-protection/data-protection-eu_en https://commission.europa.eu/law/law-topic/data-protection/data-protection-eu_en
Forradellas R, Gallastegui L (2021) Digital transformation and artificial intelligence applied to business: legal regulations, economic impact and perspective. https://www.mdpi.com/2075-471X/10/3/70. Accessed 19 Jan 2023
Fedrecheski G et al (2020) Self-sovereign identity for IoT environments: a perspective. In: 2020 global internet of things summit (GIoTS). IEEE
Harper KE, Ganz C, Malakuti S (2019) Digital twin architecture and standards. IIC J Innov 12(2019):72–83
Bhowmik D, Feng T (2017) The multimedia blockchain: a distributed and tamper-proof media transaction framework. In: 2017 22nd international conference on digital signal processing (DSP). IEEE
Bakre A, Patil N, Gupta S (2017) Implementing decentralized digital identity using blockchain. Int J Eng Technol Sci Res 4(10):379–385
Yaqoob I et al (2020) Blockchain for digital twins: recent advances and future research challenges. IEEE Netw 34(5):290–298
Vast R et al (2021) Artificial intelligence based security orchestration, automation and response system. In: 2021 6th international conference for convergence in technology (I2CT). IEEE
Ahmad I, Gurtov A, Kumar T, Liyanage M, Okwuibe J, Ylianttila M (2017) [online] Available at http://jultika.oulu.fi/files/nbnfi-fe201902124647.pdf. Accessed 23 Jan 2023
Yesuf AS (2017) A review of risk identification approaches in the telecommunication domain. https://www.researchgate.net/publication/314392917_A_Review_of_Risk_Identification_Approaches_in_the_Telecommunication_Domain [PDF] In: Conference paper. Conference: the 3rd international conference on information systems security and privacy—ICISSP. Accessed 20 Jan 2023
Reuters (2017) Cyberattack hits 200,000 in at least 150 countries: Europol https://www.reuters.com/article/us-cyber-attack-europol-idUSKCN18A0FX. Accessed 20 Jan 2023
Brewster T (2017) How hackers broke equifax: exploiting a patchable vulnerability. forbes. https://www.forbes.com/sites/thomasbrewster/2017/09/14/equifax-hack-the-result-of-patched-vulnerability/?sh=ce0ddce5cda4. Accessed 20 Jan 2023
Wang A (2018) ‘I’m in your baby’s room’: a hacker took over a baby monitor and broadcast threats, parents say. Washington Post. https://www.washingtonpost.com/technology/2018/12/20/nest-cam-baby-monitor-hacked-kidnap-threat-came-device-parents-say/
Shu X et al (2017) Breaking the target: an analysis of target data breach and lessons learned. arXiv preprint. https://arxiv.org/pdf/1701.04940.pdf. Accessed 20 Jan 2023
Gara T, Warzel C (2014) A look through the sony pictures data hack: this is as bad as it gets. BuzzfeedNews. https://www.docketalarm.com/cases/PTAB/CBM2015-00030/Covered_Business_Method_Patent_Review_of_U.S._Pat._6321201/03-10-2015-Patent_Owner/Exhibit-2002-Exhibit_2002___A_Look_Through_The_Sony_Pictures_Data_Hack___BuzzFeed_News/
SDxCentral (2019) What are the top 5G security. Challenges”. Available at https://www.sdxcentral.com/5g/definitions/top-5g-security-challenges/. Accessed 17 Aug 2019
Zhang Y (2018) Network function virtualization concepts and applicability in 5G networks, 1st edn. Wiley, New Jersey
Condoluci M, Mahmoodi T (2018) Softwarization and virtualization in 5G mobile networks: benefits, trends and challenges. Comput Netw 146(1):65–84
Huawei (2018) 5G security: forward thinking Huawei white paper. Available at https://www.huawei.com/minisite/5g/img/5G_Security_Whitepaper_en.pdf. Accessed 19 Jan 2023
Calder A, Watkins S (2015) IT governance: an international guide to data security and ISO27001/ISO27002, 6th edn. Kogan Page, London
Miller L (2016) IoT security for dummies, inside secure edition, 1st edn. John Wiley & Sons, Chichester/West Sussex
Blum JJ, Lawson-Jenkins K, Hoffman L-J (2006) Trust beyond security: An expanded trust model. Commun ACM 49(7):95–101
Fogg BJ, Tseng S (1999) Credibility and computing technology. Commun ACM 42(5):39–44
GOV.UK (2022) Cyber Security Breaches Survey 2022. https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2022/cyber-security-breaches-survey-2022#chapter-5-incidence-and-impact-of-breaches-or-attacks https://www.ncsc.gov.uk/news/data-breach-500m-yahoo-accounts https://hoteltechreport.com/news/marriott-data-breach. Accessed 19 Jan 2023
Confessore N (2018) Cambridge analytica and facebook: the scandal and the fallout so far https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html. Accessed 19 Jan 2023
Aïmeur E, Schőnfeld D (2011) The ultimate invasion of privacy: identity theft. In: 2011 ninth annual international conference on privacy, security and trust. IEEE. https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html Accessed 23 Jan 2023
Privacy International (2017) 101: data protection. https://privacyinternational.org/explainer/41/101-data-protection. Accessed 23 Jan 2023
Masombuka M, Grobler M, Watson B (2018) Towards an artificial intelligence framework to actively defend cyberspace. In: European conference on cyber warfare and security. Academic conferences international limited. https://search.proquest.com/openview/f6ccddd62973bd89da756a6c4f7272f0/1?pq-origsite=gscholar&cbl=396497&casa_token=fefF24OzjlcAAAAA:lW8TZptX9KGeshqbVXXBk1MBmrm0zyKHj5mmY62oPWdizJiYTe0WcDk4RMFtG2P0ZsuzdvAtZBo
Babiceanu RF, Seker R (2023) Big data and virtualization for manufacturing cyber-physical systems: a survey of the current status and future outlook. Computers in industry 81:128–137. https://www.sciencedirect.com/science/article/pii/S0166361516300471?casa_token=S59wxZXqps8AAAAA:SudkZGNExVlneS0cwzOiJPq3T6peQI63_K3I1fFNKuIkNz4hhlaAt4IKbxWnjFT9WBwX37vxlII. Accessed 22 Jan 2023
Hicks A et al (2019) Global mapping of citizen science projects for disaster risk reduction. Frontiers Earth Sci 7:226. https://doi.org/10.3389/feart.2019.00226/full. Accessed 19 Jan 2023
ISO/IEC (2022) https://www.iso.org/standard/82875.html
NIST (2018) https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
ISO (2019) https://www.iso.org/standard/75106.html
BS (2007) https://knowledge.bsigroup.com/products/business-continuity-management-specification-1/standard
Schlehahn E (2020) Cybersecurity and the state. The ethics of cybersecurity. Springer, Cham, 205–225
Eltringham M (2017) UK organisations remain unprepared to deal with effects of cyber attack. UK organisations remain unprepared to deal with effects of cyber attack—Workplace Insight. Accessed 19 Jan 2023
Caulkins B, Marlowe T, Reardon A (2018) Cybersecurity skills to address today’s threats. In: Ahram T, Nicholson D (eds) Advances in human factors in cybersecurity, AHFE 2018. Advances in intelligent systems and computing, pp 782–788. https://doi.org/10.1007/978-3-319-94782-2_18
Panda A, Bower A (2020) Cyber security and the disaster resilience framework. Int J Disaster Resilience Built Environ 11(4):507–518
Goodwin C et al (2015) A framework for cybersecurity information sharing and risk reduction. Microsoft
Landry BJL, Koger MS (2006) Dispelling 10 common disaster recovery myths: Lessons learned from hurricane katrina and other disasters. J Educ Resour Comput (JERIC) 6(4):6-es
Hyslop M (2007) Comments on standards in information security, disaster recovery, business continuity and business resilience. Crit Inf Infrastruct Resilience Prot (2007):94–144
Schmidt CG, Wagner SM (2019) Blockchain and supply chain relations: a transaction cost theory perspective. J Purch Supply Manag 25(4):100552
Pickles J, Zhu S (2013) The California transparency in supply chains act. SSRN Electron J. https://doi.org/10.2139/ssrn.2237437
Cheung K-F, Bell MGH, Bhattacharjya J (2021) Cybersecurity in logistics and supply chain management: an overview and future research directions. Transp Res Part E Logistics Transp Rev 146:102217. https://doi.org/10.1016/j.tre.2020.102217
Kendzierskyj et al (2021) Cyber security and supply chain management, pp 147–174. https://doi.org/10.1142/9789811233128_0007. Accessed 22 Jan 2023
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Jahankhani, H., Kendzierskyj, S., Hussien, O. (2023). Approaches and Methods for Regulation of Security Risks in 5G and 6G. In: Jahankhani, H., El Hajjar, A. (eds) Wireless Networks . Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-33631-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-33631-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-33630-0
Online ISBN: 978-3-031-33631-7
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)