Tuesday, 28 October 2025

Cybersecurity and Privacy in 6G-Enabled Internet of Things (IoT) Ecosystems | Chapter 8 | New Horizons of Science, Technology and Culture Vol. 5

 

The advent of sixth-generation (6G) wireless networks marks a paradigm shift beyond incremental gains in speed and latency toward AI-native, hyper-connected ecosystems supporting trillions of Internet of Things (IoT) devices. With projected terabit-per-second throughput, sub-millisecond latency, and integration of terahertz communication, holographic MIMO, and distributed edge computing, 6G promises transformative applications in healthcare, transportation, smart cities, and immersive digital environments. However, this evolution also introduces unprecedented cybersecurity and privacy challenges. AI-driven network management creates new attack surfaces vulnerable to data poisoning, adversarial manipulation, and model inversion. Quantum computing threatens to render classical cryptography obsolete, while insecure IoT devices and distributed edge nodes amplify systemic risks. Moreover, centimetre-level localisation and behavioural profiling capabilities raise profound privacy concerns that existing regulatory frameworks, such as GDPR and CCPA, are ill-prepared to address. This study examines these multi-layered vulnerabilities and highlights mitigation strategies, including zero-trust architectures, post-quantum cryptography, blockchain-based accountability, and AI-enhanced defences. It further explores societal and policy implications, emphasising the need for international collaboration, ethical AI governance, and security-by-design principles. The findings underscore that the next decade represents a critical window to embed robust cybersecurity and privacy protections in 6G infrastructure, ensuring that the networks underpinning future digital societies are both innovative and trustworthy.

 

 

Author(s) Details

Emma Junior Emmanuel
Department of Computer Science, Prairie View A&M University, United States of America.

 

Please see the book here :- https://doi.org/10.9734/bpi/nhstc/v5/6425

No comments:

Post a Comment