edited by Agbotiname Lucky Imoize, Chandrashekhar Meshram, Dinh-Thuan Do, Seifedine Kadry and Lakshmanan Muthukaruppan
The Institution of Engineering and Technology, 2023
eISBN: 978-1-83953-664-9 | Cloth: 978-1-83953-663-2

ABOUT THIS BOOK | TOC
ABOUT THIS BOOK
Fifth generation (5G) wireless networks are now commercialized, and the research focus has shifted towards sixth generation (6G) wireless systems. The integration of sensor nodes and massive machine type communication (MTC) devices (MDs) in ubiquitous 5G networks has facilitated the design of critical enabling technologies to support billions of data-hungry applications. By leveraging sensor nodes in wireless sensor networks (WSNs), sensitive user information can be harvested and transmitted to receivers via WSN-assisted channels, which are often not well secured. Consequently, sensitive user information can be intercepted and used unlawfully. The security and confidentiality measures used for data transmission over existing 5G WSN-assisted channels are limited. 6G systems are envisaged to face fiercer security challenges. In 6G wireless networks, a new set of sensing and precise localization techniques are predicted. Thus, the need to secure user information against adversarial attacks needs to be implemented at the design stage.