BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
DTSTART:20240310T030000
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:PDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20231105T010000
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:PST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20231219T043216Z
UID:0F25E407-08D9-49DA-A2AA-FE18E8A5ACB6
DTSTART;TZID=America/Los_Angeles:20231218T164500
DTEND;TZID=America/Los_Angeles:20231218T183000
DESCRIPTION:The sixth generation (6G) of wireless technology promises to re
 volutionize various sectors such as connected vehicles\, smart buildings\,
  and secure mobile enterprises. However\, the development of 6G must learn
  from the mistakes of the fifth generation (5G) and prioritize security fr
 om the outset. In this talk\, we will explore the promise of 6G applicatio
 ns and the importance of avoiding the security mistakes of 5G. One of the 
 primary concerns with 5G is its lack of security\, particularly in connect
 ed vehicles\, smart buildings\, and secure mobile enterprises. For instanc
 e\, researchers have demonstrated the ease of hacking into 5G-connected ca
 rs and taking control of their systems. Similarly\, smart buildings and se
 cure mobile enterprises are also vulnerable to cyber-attacks\, which can h
 ave severe consequences. These examples highlight the urgent need for robu
 st security measures in 6G to prevent similar breaches. The evolution of m
 obile security technology has come a long way\, from 4G to 5G and now 6G. 
 However\, each generation has brought new security challenges\, and 5G is 
 no exception. The lack of a good security architecture in 5G has resulted 
 in vulnerabilities that can be exploited by attackers. Therefore\, it is e
 ssential to build 6G security from the ground up\, incorporating lessons l
 earned from past generations and integrating advanced security features. T
 o build 6G security from the ground up\, we must prioritize security in th
 e design and development of 6G networks and devices. This includes impleme
 nting robust encryption\, authentication\, and access control mechanisms. 
 Additionally\, we must adopt a zero-trust approach\, assuming that all dev
 ices and networks are vulnerable and must be verified and authenticated co
 ntinuously. Furthermore\, we must invest in research and development to st
 ay ahead of emerging threats and develop new security technologies. In con
 clusion\, 6G security must avoid the mistakes of 5G and prioritize securit
 y from the outset. We must learn from the vulnerabilities of connected veh
 icles\, smart buildings\, and secure mobile enterprises and integrate adva
 nced security features into 6G networks and devices. By building 6G securi
 ty from the ground up\, we can ensure the safety and privacy of users and 
 prevent cyber-attacks. Therefore\, we must take a proactive approach to 6G
  security and work together to develop a secure and reliable sixth generat
 ion of wireless technology. We must act now to secure our future.\n\nSpeak
 er(s): \, Mahbubul Alam\n\nAgenda: \nNetworking: 4:45 to 5:15\n\nPresentat
 ion: 5:15 to 6:00\n\nQ&amp;A: 6:00 to 6:15\n\nNetworking: 6:15 to 6:30\n\nRoom
 : 1301\, Bldg: SCDI \, 500 El Camino Real\, Santa Clara University\, Santa
  Clara\, California\, United States\, 95053
LOCATION:Room: 1301\, Bldg: SCDI \, 500 El Camino Real\, Santa Clara Univer
 sity\, Santa Clara\, California\, United States\, 95053
ORGANIZER:bdezfouli@scu.edu
SEQUENCE:27
SUMMARY:The 6G Security Goals: Avoiding The 5G Mistakes
URL;VALUE=URI:https://events.vtools.ieee.org/m/390509
X-ALT-DESC:Description: &lt;br /&gt;&lt;p style=&quot;font-weight: 400\;&quot;&gt;The sixth gener
 ation (6G) of wireless technology promises to revolutionize various sector
 s such as connected vehicles\, smart buildings\, and secure mobile enterpr
 ises. However\, the development of 6G must learn from the mistakes of the 
 fifth generation (5G) and prioritize security from the outset. In this tal
 k\, we will explore the promise of 6G applications and the importance of a
 voiding the security mistakes of 5G.&amp;nbsp\;One of the primary concerns wit
 h 5G is its lack of security\, particularly in connected vehicles\, smart 
 buildings\, and secure mobile enterprises. For instance\, researchers have
  demonstrated the ease of hacking into 5G-connected cars and taking contro
 l of their systems. Similarly\, smart buildings and secure mobile enterpri
 ses are also vulnerable to cyber-attacks\, which can have severe consequen
 ces. These examples highlight the urgent need for robust security measures
  in 6G to prevent similar breaches.&amp;nbsp\;The evolution of mobile security
  technology has come a long way\, from 4G to 5G and now 6G. However\, each
  generation has brought new security challenges\, and 5G is no exception. 
 The lack of a good security architecture in 5G has resulted in vulnerabili
 ties that can be exploited by attackers. Therefore\, it is essential to bu
 ild 6G security from the ground up\, incorporating lessons learned from pa
 st generations and integrating advanced security features. To build 6G sec
 urity from the ground up\, we must prioritize security in the design and d
 evelopment of 6G networks and devices. This includes implementing robust e
 ncryption\, authentication\, and access control mechanisms. Additionally\,
  we must adopt a zero-trust approach\, assuming that all devices and netwo
 rks are vulnerable and must be verified and authenticated continuously. Fu
 rthermore\, we must invest in research and development to stay ahead of em
 erging threats and develop new security technologies.&amp;nbsp\;In conclusion\
 , 6G security must avoid the mistakes of 5G and prioritize security from t
 he outset. We must learn from the vulnerabilities of connected vehicles\, 
 smart buildings\, and secure mobile enterprises and integrate advanced sec
 urity features into 6G networks and devices. By building 6G security from 
 the ground up\, we can ensure the safety and privacy of users and prevent 
 cyber-attacks. Therefore\, we must take a proactive approach to 6G securit
 y and work together to develop a secure and reliable sixth generation of w
 ireless technology. We must act now to secure our future.&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;A
 genda: &lt;br /&gt;&lt;p&gt;Networking: 4:45 to 5:15&lt;/p&gt;\n&lt;p&gt;Presentation: 5:15 to 6:0
 0&lt;/p&gt;\n&lt;p&gt;Q&amp;amp\;A: 6:00 to 6:15&lt;/p&gt;\n&lt;p&gt;Networking: 6:15 to 6:30&lt;/p&gt;\n&lt;p&gt;
 &amp;nbsp\;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

