Research on security scenarios and security models for 6G networking

The concept of 6G has been proposed and has attracted the wide attention of academe.Generally speaking, the 6G network will optimize the performance of 5G, and expand the network scenarios which are difficult to achieve within 5G.However, the introduction of new scenarios and technologies will also...

Full description

Saved in:
Bibliographic Details
Main Authors: Chenglei ZHANG, Yulong FU, Hui LI, Jin CAO
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2021-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021004
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529928406794240
author Chenglei ZHANG
Yulong FU
Hui LI
Jin CAO
author_facet Chenglei ZHANG
Yulong FU
Hui LI
Jin CAO
author_sort Chenglei ZHANG
collection DOAJ
description The concept of 6G has been proposed and has attracted the wide attention of academe.Generally speaking, the 6G network will optimize the performance of 5G, and expand the network scenarios which are difficult to achieve within 5G.However, the introduction of new scenarios and technologies will also bring new security threats to cyber security.The research progress on the key technologies and implementation methods of the 6G were conducted.To summarize a vision of core technologies of 6G, the research work of major 5G/6G research institutions, companies and enterprises were focused on .On this basis, the possible security problems and security challenges in 6G network were put forward.Finally, according to the existing network techniques, the possible solutions and proposed a general security model for 6G networks were discussed.
format Article
id doaj-art-f19db281b9674457ad5ff8cbbb18a554
institution Kabale University
issn 2096-109X
language English
publishDate 2021-02-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-f19db281b9674457ad5ff8cbbb18a5542025-01-15T03:14:37ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2021-02-017284559562495Research on security scenarios and security models for 6G networkingChenglei ZHANGYulong FUHui LIJin CAOThe concept of 6G has been proposed and has attracted the wide attention of academe.Generally speaking, the 6G network will optimize the performance of 5G, and expand the network scenarios which are difficult to achieve within 5G.However, the introduction of new scenarios and technologies will also bring new security threats to cyber security.The research progress on the key technologies and implementation methods of the 6G were conducted.To summarize a vision of core technologies of 6G, the research work of major 5G/6G research institutions, companies and enterprises were focused on .On this basis, the possible security problems and security challenges in 6G network were put forward.Finally, according to the existing network techniques, the possible solutions and proposed a general security model for 6G networks were discussed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.20210046Gnetwork securitywireless communication security
spellingShingle Chenglei ZHANG
Yulong FU
Hui LI
Jin CAO
Research on security scenarios and security models for 6G networking
网络与信息安全学报
6G
network security
wireless communication security
title Research on security scenarios and security models for 6G networking
title_full Research on security scenarios and security models for 6G networking
title_fullStr Research on security scenarios and security models for 6G networking
title_full_unstemmed Research on security scenarios and security models for 6G networking
title_short Research on security scenarios and security models for 6G networking
title_sort research on security scenarios and security models for 6g networking
topic 6G
network security
wireless communication security
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021004
work_keys_str_mv AT chengleizhang researchonsecurityscenariosandsecuritymodelsfor6gnetworking
AT yulongfu researchonsecurityscenariosandsecuritymodelsfor6gnetworking
AT huili researchonsecurityscenariosandsecuritymodelsfor6gnetworking
AT jincao researchonsecurityscenariosandsecuritymodelsfor6gnetworking