Skip to main content
Top

2022 | OriginalPaper | Chapter

Role of Blockchain and AI in Security and Privacy of 6G

Authors : Hany F. Atlam, Muhammad Ajmal Azad, Manar Altamimi, Nawfal Fadhel

Published in: AI and Blockchain Technology in 6G Wireless Network

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the coming era, 6G is expected to bring a new reality that contains billions of things, humans, connected cars, robots and drones that will produce Zettabytes of digital data. 6G is mainly used to design an inclusive digital and physical environment, which is able to sense it, understand it and programme it. Several countries around the world are competing to own 6G infrastructures and solutions since this new technology provides huge capabilities that will reshape how enterprises operate. Although 6G provides several advantages over existing technologies, security and privacy issues still need to be addressed. This is because 6G provides automatization of most critical processes, which produce a more wide and complex attack surface. Also, with 6G, the network becomes more vulnerable not only to direct security attacks but also to misbehaviour of automated processes that require to be recognized, and their effect should be minimized. This chapter provides a discussion of security and privacy issues in 6G and how the integration of blockchain and Artificial Intelligence (AI) with 6G can provide possible solutions to overcome these issues. The chapter starts by providing an overview of wireless communications technologies from 0 to 6G. This is followed by discussing the main security and privacy issues in 6G networks. Then, the integration of blockchain with 6G will be discussed by highlighting possible solutions to overcome security and privacy issues associated with 6G. The integration of 6G with AI will be also discussed by highlighting the importance of AI in 6G and how AI with 6G can provide better and effective security and privacy solutions. In the end, healthcare with 6G is presented as a use case by highlighting security issues and discussing the role of AI and blockchain in providing effective security solutions in the healthcare sector.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
8.
go back to reference Meraj M, Mir I, Kumar S (2015) Evolution of Mobile Wireless Technology from 0G to 5G. Int. J. Comput. Sci. Inf. Technol. 6(3):2545–2551 Meraj M, Mir I, Kumar S (2015) Evolution of Mobile Wireless Technology from 0G to 5G. Int. J. Comput. Sci. Inf. Technol. 6(3):2545–2551
9.
go back to reference Lopa M, Vora J (2015) Evolution of mobile generation technology: 1G to 5G. Int. J. Mod. Trends Eng. Res. 02:281–291 Lopa M, Vora J (2015) Evolution of mobile generation technology: 1G to 5G. Int. J. Mod. Trends Eng. Res. 02:281–291
11.
go back to reference J. H. Schiller (2003) Mobile Communications. 2nd Edition, Pearson Education Limited. J. H. Schiller (2003) Mobile Communications. 2nd Edition, Pearson Education Limited.
12.
go back to reference Stojmenovic I (2002) Handbook of Wireless Networks and Mobile Computing. John Wiley & Sons Inc.CrossRef Stojmenovic I (2002) Handbook of Wireless Networks and Mobile Computing. John Wiley & Sons Inc.CrossRef
13.
go back to reference J. G. Shinde, P. Shamuvel, K. Sunil (2018) Review Paper on Development of Rice Transplanter, IRE Journals 2(5), pp. 94–100 J. G. Shinde, P. Shamuvel, K. Sunil (2018) Review Paper on Development of Rice Transplanter, IRE Journals 2(5), pp. 94–100
14.
go back to reference A. K. Pachauri, O. Singh (2021) G Technology—Redefining wireless Communication in upcoming years, Int. J. Comput. Sci. Manag. Res., 1(1) A. K. Pachauri, O. Singh (2021) G Technology—Redefining wireless Communication in upcoming years, Int. J. Comput. Sci. Manag. Res., 1(1)
15.
go back to reference Nguyen VG, Brunstrom A, Grinnemo KJ, Taheri J (2017) SDN/NFV-Based Mobile Packet Core Network Architectures: A Survey. IEEE Commun. Surv. Tutorials 19(3):1567–1602CrossRef Nguyen VG, Brunstrom A, Grinnemo KJ, Taheri J (2017) SDN/NFV-Based Mobile Packet Core Network Architectures: A Survey. IEEE Commun. Surv. Tutorials 19(3):1567–1602CrossRef
17.
go back to reference Nitesh GS, Kakkar A (2016) Generations of Mobile Communication. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 6(3):320–324 Nitesh GS, Kakkar A (2016) Generations of Mobile Communication. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 6(3):320–324
18.
go back to reference Karla B, C. DK, (2014) A comparative study of mobile wireless communication network: 1g to 5g. Int. J. Comput. Sci. Inf. Technol. Res. 2:430–433 Karla B, C. DK, (2014) A comparative study of mobile wireless communication network: 1g to 5g. Int. J. Comput. Sci. Inf. Technol. Res. 2:430–433
19.
go back to reference Eluwole OT, Udoh N, Ojo M, Okoro C, Akinyoade AJ (2018) From 1G to 5G, what next? IAENG Int J Comput Sci 45(3):413–434 Eluwole OT, Udoh N, Ojo M, Okoro C, Akinyoade AJ (2018) From 1G to 5G, what next? IAENG Int J Comput Sci 45(3):413–434
23.
go back to reference V. Ziegler, P. Schneider, H. Viswanathan, M. Montag, S. Kanugovi, A. Rezaki (2020) Security and trust in the 6G era, NOKIA Bell Labs. V. Ziegler, P. Schneider, H. Viswanathan, M. Montag, S. Kanugovi, A. Rezaki (2020) Security and trust in the 6G era, NOKIA Bell Labs.
25.
go back to reference Y. Section, A. Gurtov, L. Mucchi, I. Oppermann (2020) 6G-White-Paper-Trust-Security-Privacy. Y. Section, A. Gurtov, L. Mucchi, I. Oppermann (2020) 6G-White-Paper-Trust-Security-Privacy.
26.
go back to reference Atlam HF, Walters RJ, Wills GB (2018) Fog Computing and the Internet of Things: A Review, big data Cognitive. Computing 2(2):1–18 Atlam HF, Walters RJ, Wills GB (2018) Fog Computing and the Internet of Things: A Review, big data Cognitive. Computing 2(2):1–18
27.
go back to reference H. F. Atlam, G. B. Wills (2018) Technical aspects of blockchain and IoT, In Role of Blockchain Technology in IoT Applications, Advances in Computers, pp. 1–35. H. F. Atlam, G. B. Wills (2018) Technical aspects of blockchain and IoT, In Role of Blockchain Technology in IoT Applications, Advances in Computers, pp. 1–35.
30.
go back to reference Atlam HF, Wills GB (2019) Intersections between IoT and distributed ledger, In Role of Blockchain Technology in IoT Applications. Adv Comput 115:2019 Atlam HF, Wills GB (2019) Intersections between IoT and distributed ledger, In Role of Blockchain Technology in IoT Applications. Adv Comput 115:2019
33.
go back to reference H. F. Atlam, M. O. Alassafi, A.Alenezi, R.Walters, G. B. Wills (2018) XACML for Building Access Control Policies in Internet of Things, In Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security (IoTBDS 2018), pp. 253 -260. H. F. Atlam, M. O. Alassafi, A.Alenezi, R.Walters, G. B. Wills (2018) XACML for Building Access Control Policies in Internet of Things, In Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security (IoTBDS 2018), pp. 253 -260.
34.
go back to reference Chen S, Liang YC, Sun S, Kang S, Cheng W, Peng M (2020) Vision, Requirements, and Technology Trend of 6G: How to Tackle the Challenges of System Coverage, Capacity, User Data-Rate and Movement Speed. IEEE Wirel Commun 27(2):218–228CrossRef Chen S, Liang YC, Sun S, Kang S, Cheng W, Peng M (2020) Vision, Requirements, and Technology Trend of 6G: How to Tackle the Challenges of System Coverage, Capacity, User Data-Rate and Movement Speed. IEEE Wirel Commun 27(2):218–228CrossRef
38.
go back to reference Chowdhury MZ, Shahjalal M, Ahmed S, Jang YM (2020) 6G Wireless Communication Systems: Applications, Requirements, Technologies, Challenges, and Research Directions, IEEE Open. J. Commun. Soc. 1:957–975 Chowdhury MZ, Shahjalal M, Ahmed S, Jang YM (2020) 6G Wireless Communication Systems: Applications, Requirements, Technologies, Challenges, and Research Directions, IEEE Open. J. Commun. Soc. 1:957–975
39.
go back to reference Jiang W, Han B, Habibi MA, Schotten HD (2021) The Road Towards 6G: A Comprehensive Survey, IEEE Open. J. Commun. Soc. 2:334–366 Jiang W, Han B, Habibi MA, Schotten HD (2021) The Road Towards 6G: A Comprehensive Survey, IEEE Open. J. Commun. Soc. 2:334–366
41.
go back to reference H. F. Atlam, A. Alenezi, R. J. Walters, G. B. Wills (2017) An overview of risk estimation techniques in risk-based access control for the internet of things, In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security (IoTBDS 2017), pages 254–260. H. F. Atlam, A. Alenezi, R. J. Walters, G. B. Wills (2017) An overview of risk estimation techniques in risk-based access control for the internet of things, In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security (IoTBDS 2017), pages 254–260.
45.
go back to reference Amaizu GC, Nwakanma CI, Bhardwaj S, Lee JM, Kim DS (2021) Composite and efficient DDoS attack detection framework for B5G networks. Comput. Networks 188:107871CrossRef Amaizu GC, Nwakanma CI, Bhardwaj S, Lee JM, Kim DS (2021) Composite and efficient DDoS attack detection framework for B5G networks. Comput. Networks 188:107871CrossRef
46.
go back to reference X. Liang, S. Shetty, D. Tosh, C. Kamhoua, K. Kwiat, L. Njilla (2017) ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability, Proc. - 2017 17th IEEE/ACM Int. Symp. Clust. Cloud Grid Comput, pp. 468–477, doi: https://doi.org/10.1109/CCGRID.2017.8. X. Liang, S. Shetty, D. Tosh, C. Kamhoua, K. Kwiat, L. Njilla (2017) ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability, Proc. - 2017 17th IEEE/ACM Int. Symp. Clust. Cloud Grid Comput, pp. 468–477, doi: https://​doi.​org/​10.​1109/​CCGRID.​2017.​8.
49.
go back to reference Bhatnagar S (2018) The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation Authors are listed in order of contribution Design Direction. Cornell Univ, New York Bhatnagar S (2018) The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation Authors are listed in order of contribution Design Direction. Cornell Univ, New York
52.
go back to reference Dua S, Du X (2011) Data mining and machine learning in cybersecurity. Taylor & FrancisMATH Dua S, Du X (2011) Data mining and machine learning in cybersecurity. Taylor & FrancisMATH
57.
go back to reference Ma C (2019) On Safeguarding Privacy and Security in the Framework of Federated Learning. IEEE Netw 34(4):242–248CrossRef Ma C (2019) On Safeguarding Privacy and Security in the Framework of Federated Learning. IEEE Netw 34(4):242–248CrossRef
62.
go back to reference Nayak S, Patgiri R, Member S (2020) 6G Communication Technology: A Vision on Intelligent Healthcare. IEEE Internet of Things Journal. Nayak S, Patgiri R, Member S (2020) 6G Communication Technology: A Vision on Intelligent Healthcare. IEEE Internet of Things Journal.
63.
go back to reference Saad W, Bennis M, Chen M (2019) A vision of 6g wireless systems: Applications, trends, technologies, and open research problems. IEEE Netw 1–9. Saad W, Bennis M, Chen M (2019) A vision of 6g wireless systems: Applications, trends, technologies, and open research problems. IEEE Netw 1–9.
66.
go back to reference Partala J, Nguyen TH, Pirttikangas S (2020) Non-interactive zero knowledge for blockchain: a survey. IEEE Access 8:227945–227961CrossRef Partala J, Nguyen TH, Pirttikangas S (2020) Non-interactive zero knowledge for blockchain: a survey. IEEE Access 8:227945–227961CrossRef
Metadata
Title
Role of Blockchain and AI in Security and Privacy of 6G
Authors
Hany F. Atlam
Muhammad Ajmal Azad
Manar Altamimi
Nawfal Fadhel
Copyright Year
2022
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-2868-0_5