Physical layer security for 6G networks

Trung Q. Duong (Editor), Junqing Zhang (Editor), Nan Yang (Editor), Xiangyun Zhou (Editor), Vishal Sharma (Editor)

Research output: Book/ReportBook


6G networks are expected to provide one-microsecond latency communication with a billion devices competing for resources 1000 times faster than current standards. Increases in network speed, heterogeneity, virtualization, better radio requirements and adaptive communications will place new demands on physical layer security. Moreover, IoT, blockchain, and artificial intelligence are enabling technologies that require rapid data rates, raising a significant burden on the network's physical layer, requiring that security must be attained at a fast pace, and that the network must be resilient to accommodate sudden changes to the configurations or the load.

Physical layer (PHY) security solutions are needed that have the capacity to handle the new demands of 6G networks, whilst protecting those networks against risk factors such as interference, data spoofing, replay attacks, side-channel attacks, jamming, traffic analysis, and cyber-vandalism attacks. This comprehensive book addresses the PHY security challenges and proposes efficient and resilient physical layer security solutions for beyond 5G networks leading to 6G. Several topics have emerged that rely on PHY security in solving real-world network challenges such as ultra-dense networks, adaptive communication, distributed technology, and artificial intelligence.

Physical Layer Security for 6G Networks helps readers understand the expectations of 6G's physical layer security in supporting pervasive and integrated communication networks, AI convergence and utility, and develop better sensing solutions, which go beyond cognitive radio, device-to-device or mm-wave communications.

Original languageEnglish
PublisherInstitution of Engineering and Technology (IET)
Number of pages596
ISBN (Electronic)9781839536922
ISBN (Print)9781839536915
Publication statusPublished - 30 Apr 2024


Dive into the research topics of 'Physical layer security for 6G networks'. Together they form a unique fingerprint.

Cite this