Hyppää sisältöön
    • FI
    • ENG
  • FI
  • /
  • EN
OuluREPO – Oulun yliopiston julkaisuarkisto / University of Oulu repository
Näytä viite 
  •   OuluREPO etusivu
  • Oulun yliopisto
  • Avoin saatavuus
  • Näytä viite
  •   OuluREPO etusivu
  • Oulun yliopisto
  • Avoin saatavuus
  • Näytä viite
JavaScript is disabled for your browser. Some features of this site may not work without it.

Secure Edge Intelligence in the 6G Era

Kumar, Tanesh; Partala, Juha; Nguyen, Tri; Agrawal, Lalita; Mondal, Ayan; Kumar, Abhishek; Ahmad, Ijaz; Peltonen, Ella; Pirttikangas, Susanna; Harjula, Erkki (2024-12-13)

 
Avaa tiedosto
nbnfioulu-202505163518.pdf (3.001Mt)
Huom!
Sisältö avataan julkiseksi
: 13.12.2026
URL:
https://doi.org/10.1002/9781119988007.ch2

Kumar, Tanesh
Partala, Juha
Nguyen, Tri
Agrawal, Lalita
Mondal, Ayan
Kumar, Abhishek
Ahmad, Ijaz
Peltonen, Ella
Pirttikangas, Susanna
Harjula, Erkki
John Wiley & Sons
13.12.2024

Kumar, T., Partala, J., Nguyen, T., Agrawal, L., Mondal, A., Kumar, A., Ahmad, I., Peltonen, E., Pirttikangas, S., & Harjula, E. (2025). Secure edge intelligence in the 6g era. In G. Mantas, F. Saghezchi, J. Rodriguez, & V. Sucasas (Eds.), Security and Privacy for 6G Massive IoT (1st ed., pp. 35–52). Wiley. https://doi.org/10.1002/9781119988007.ch2

https://rightsstatements.org/vocab/InC/1.0/
© 2024 John Wiley & Sons, Inc. This is the peer reviewed version of the following article: Kumar, T., Partala, J., Nguyen, T., Agrawal, L., Mondal, A., Kumar, A., Ahmad, I., Peltonen, E., Pirttikangas, S., & Harjula, E. (2025). Secure edge intelligence in the 6g era. In G. Mantas, F. Saghezchi, J. Rodriguez, & V. Sucasas (Eds.), Security and Privacy for 6G Massive IoT (1st ed., pp. 35–52), which has been published in final form at https://doi.org/10.1002/9781119988007.ch2. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions. This article may not be enhanced, enriched or otherwise transformed into a derivative work, without express permission from Wiley or by statutory rights under applicable legislation. Copyright notices must not be removed, obscured or modified. The article must be linked to Wiley’s version of record on Wiley Online Library and any embedding, framing or otherwise making available the article or pages thereof by third parties from platforms, services and websites other than Wiley Online Library must be prohibited.
https://rightsstatements.org/vocab/InC/1.0/
doi:https://doi.org/10.1002/9781119988007.ch2
Näytä kaikki kuvailutiedot
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:oulu-202505163518
Tiivistelmä
Summary

Future 6G networks are expected to enable smart and hyperconnected society where various digital services and applications will be ubiquitously available to the users. 6G networks will have diverse and strict requirements related to computation, communication, network, and resource, which may include ultralow latency, higher bandwidth, reliability, real-time data analytics, and intelligent decision-making among others. edge intelligence (EI) is among the potential technology enablers that can play a pivotal role in achieving these requirements for 6G networks. Since 6G networks will bring wider security threats landscape, their integration with the edge computing, artificial intelligence (AI) and other technologies will make them even more complex and highly vulnerable to various threats. Therefore, it is crucial to place strong, efficient, and intelligent security mechanisms for EI-enabled 6G networks. In this chapter, we discuss various potential security, privacy, and trust challenges for EI in the context of future 6G networks and briefly explore the relevant standardization activities.
Kokoelmat
  • Avoin saatavuus [38618]
oulurepo@oulu.fiOulun yliopiston kirjastoOuluCRISLaturiMuuntaja
SaavutettavuusselosteTietosuojailmoitusYlläpidon kirjautuminen
 

Selaa kokoelmaa

NimekkeetTekijätJulkaisuajatAsiasanatUusimmatSivukartta

Omat tiedot

Kirjaudu sisäänRekisteröidy
oulurepo@oulu.fiOulun yliopiston kirjastoOuluCRISLaturiMuuntaja
SaavutettavuusselosteTietosuojailmoitusYlläpidon kirjautuminen