Distributed Ledger Technology in 6G Management Strategies for Threat Mitigation

Distributed Ledger Technology in 6G Management Strategies for Threat Mitigation

Chetan Thakar, Rashi Saxena, Modi Himabindu, Rakesh C., Amit Dutt, Joshuva Arockia Dhanraj
Copyright: © 2024 |Pages: 17
DOI: 10.4018/979-8-3693-2931-3.ch010
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Establishing strong security protocols is crucial in the quickly changing internet of things (IoT) environment to reduce potential risks and weaknesses. It is possible to manage security risks more effectively, but there are also challenges because of the interconnected nature of IoT devices, the introduction of 6G networks, and the incorporation of distributed ledger technology (DLT). The focus of this note is on proactive methods of protecting infrastructure and sensitive data. It explores different management strategies that are intended to mitigate threats in IoT environments. Using a security-by-design methodology is a fundamental tactic for threat mitigation in internet of things settings. Every phase of the lifecycle of an IoT device, from design and development to deployment and operation, must incorporate security measures.
Chapter Preview

Complete Chapter List

Search this Book:
Reset