Secure Edge Intelligence in the 6G Era
Kumar, Tanesh; Partala, Juha; Nguyen, Tri; Agrawal, Lalita; Mondal, Ayan; Kumar, Abhishek; Ahmad, Ijaz; Peltonen, Ella; Pirttikangas, Susanna; Harjula, Erkki (2024-12-13)
Avaa tiedosto
Sisältö avataan julkiseksi: 13.12.2026
Kumar, Tanesh
Partala, Juha
Nguyen, Tri
Agrawal, Lalita
Mondal, Ayan
Kumar, Abhishek
Ahmad, Ijaz
Peltonen, Ella
Pirttikangas, Susanna
Harjula, Erkki
John Wiley & Sons
13.12.2024
Kumar, T., Partala, J., Nguyen, T., Agrawal, L., Mondal, A., Kumar, A., Ahmad, I., Peltonen, E., Pirttikangas, S., & Harjula, E. (2025). Secure edge intelligence in the 6g era. In G. Mantas, F. Saghezchi, J. Rodriguez, & V. Sucasas (Eds.), Security and Privacy for 6G Massive IoT (1st ed., pp. 35–52). Wiley. https://doi.org/10.1002/9781119988007.ch2
https://rightsstatements.org/vocab/InC/1.0/
© 2024 John Wiley & Sons, Inc. This is the peer reviewed version of the following article: Kumar, T., Partala, J., Nguyen, T., Agrawal, L., Mondal, A., Kumar, A., Ahmad, I., Peltonen, E., Pirttikangas, S., & Harjula, E. (2025). Secure edge intelligence in the 6g era. In G. Mantas, F. Saghezchi, J. Rodriguez, & V. Sucasas (Eds.), Security and Privacy for 6G Massive IoT (1st ed., pp. 35–52), which has been published in final form at https://doi.org/10.1002/9781119988007.ch2. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions. This article may not be enhanced, enriched or otherwise transformed into a derivative work, without express permission from Wiley or by statutory rights under applicable legislation. Copyright notices must not be removed, obscured or modified. The article must be linked to Wiley’s version of record on Wiley Online Library and any embedding, framing or otherwise making available the article or pages thereof by third parties from platforms, services and websites other than Wiley Online Library must be prohibited.
https://rightsstatements.org/vocab/InC/1.0/
© 2024 John Wiley & Sons, Inc. This is the peer reviewed version of the following article: Kumar, T., Partala, J., Nguyen, T., Agrawal, L., Mondal, A., Kumar, A., Ahmad, I., Peltonen, E., Pirttikangas, S., & Harjula, E. (2025). Secure edge intelligence in the 6g era. In G. Mantas, F. Saghezchi, J. Rodriguez, & V. Sucasas (Eds.), Security and Privacy for 6G Massive IoT (1st ed., pp. 35–52), which has been published in final form at https://doi.org/10.1002/9781119988007.ch2. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions. This article may not be enhanced, enriched or otherwise transformed into a derivative work, without express permission from Wiley or by statutory rights under applicable legislation. Copyright notices must not be removed, obscured or modified. The article must be linked to Wiley’s version of record on Wiley Online Library and any embedding, framing or otherwise making available the article or pages thereof by third parties from platforms, services and websites other than Wiley Online Library must be prohibited.
https://rightsstatements.org/vocab/InC/1.0/
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:oulu-202505163518
https://urn.fi/URN:NBN:fi:oulu-202505163518
Tiivistelmä
Summary
Future 6G networks are expected to enable smart and hyperconnected society where various digital services and applications will be ubiquitously available to the users. 6G networks will have diverse and strict requirements related to computation, communication, network, and resource, which may include ultralow latency, higher bandwidth, reliability, real-time data analytics, and intelligent decision-making among others. edge intelligence (EI) is among the potential technology enablers that can play a pivotal role in achieving these requirements for 6G networks. Since 6G networks will bring wider security threats landscape, their integration with the edge computing, artificial intelligence (AI) and other technologies will make them even more complex and highly vulnerable to various threats. Therefore, it is crucial to place strong, efficient, and intelligent security mechanisms for EI-enabled 6G networks. In this chapter, we discuss various potential security, privacy, and trust challenges for EI in the context of future 6G networks and briefly explore the relevant standardization activities.
Future 6G networks are expected to enable smart and hyperconnected society where various digital services and applications will be ubiquitously available to the users. 6G networks will have diverse and strict requirements related to computation, communication, network, and resource, which may include ultralow latency, higher bandwidth, reliability, real-time data analytics, and intelligent decision-making among others. edge intelligence (EI) is among the potential technology enablers that can play a pivotal role in achieving these requirements for 6G networks. Since 6G networks will bring wider security threats landscape, their integration with the edge computing, artificial intelligence (AI) and other technologies will make them even more complex and highly vulnerable to various threats. Therefore, it is crucial to place strong, efficient, and intelligent security mechanisms for EI-enabled 6G networks. In this chapter, we discuss various potential security, privacy, and trust challenges for EI in the context of future 6G networks and briefly explore the relevant standardization activities.
Kokoelmat
- Avoin saatavuus [38618]