Towards Dependable 6G Networks – TechRxiv

6G communication networks must be highly dependable. We take four dependability concepts such as reliability, availability, safety and security, and discuss the dependability of 6G networks. This
article, in summary, provides interesting insights into existing
challenges and advocates future research through highlighting
the most important research directions to make 6G dependable.

Securing ArtificiaI Intelligence (SAI); The role of hardware in security of AI – ETSI

ETSI’s newly published report gives an overview of the roles of general-purpose and specialized hardware, such as neural processors and neural networks, in enabling the security of AI. The report identifies hardware vulnerabilities and common weaknesses in AI systems and outlines the mitigations available in hardware to prevent attacks, as well as the general requirements on hardware to support the security of AI (SAI).

ETSI – MEC Security White Paper: Status of Standards Support & Future Evolutions

This White Paper, the very first initiative in this domain, aims to identify aspects of security where the nature of edge computing leaves typical industry approaches to cloud security insufficient.
Edge computing environments are characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment and both HW and SW devices. Given this overall level of system heterogeneity, security, trust and privacy are key topics for the edge environments.
In this heterogeneous scenario, end-to-end MEC security considers the impact on the elements coming from all stakeholders involved in the system. The paper provides an overview of ETSI MEC standards and current support for security, also complemented by a description of other relevant standards in the domain (e.g. ETSI TC CYBER, ETSI ISG NFV, 3GPP SA3) and cybersecurity regulation potentially applicable to edge computing. The White Paper concludes on a general perspective of future evolutions and standard directions on MEC security.