Distributed Ledger Technology in 6G Management Strategies for Threat Mitigation

Distributed Ledger Technology in 6G Management Strategies for Threat Mitigation

Chetan Thakar (Savitribai Phule Pune University, India), Rashi Saxena (Department of AIMLE, Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad, India), Modi Himabindu (Institute of Aeronautical Engineering, Dundigal, India), Rakesh C. (Department of Mechanical Engineering, New Horizon College of Engineering, Bangalore, India), Amit Dutt (Lovely Professional University, India), and Joshuva Arockia Dhanraj (Dayananda Sagar University, India)
Copyright: © 2024 |Pages: 17
DOI: 10.4018/979-8-3693-2931-3.ch010
OnDemand:
(Individual Chapters)
Forthcoming
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Establishing strong security protocols is crucial in the quickly changing internet of things (IoT) environment to reduce potential risks and weaknesses. It is possible to manage security risks more effectively, but there are also challenges because of the interconnected nature of IoT devices, the introduction of 6G networks, and the incorporation of distributed ledger technology (DLT). The focus of this note is on proactive methods of protecting infrastructure and sensitive data. It explores different management strategies that are intended to mitigate threats in IoT environments. Using a security-by-design methodology is a fundamental tactic for threat mitigation in internet of things settings. Every phase of the lifecycle of an IoT device, from design and development to deployment and operation, must incorporate security measures.
Chapter Preview

Complete Chapter List

Search this Book:
Reset