Research on security scenarios and security models for 6G networking
The concept of 6G has been proposed and has attracted the wide attention of academe.Generally speaking, the 6G network will optimize the performance of 5G, and expand the network scenarios which are difficult to achieve within 5G.However, the introduction of new scenarios and technologies will also...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2021-02-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021004 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529928406794240 |
---|---|
author | Chenglei ZHANG Yulong FU Hui LI Jin CAO |
author_facet | Chenglei ZHANG Yulong FU Hui LI Jin CAO |
author_sort | Chenglei ZHANG |
collection | DOAJ |
description | The concept of 6G has been proposed and has attracted the wide attention of academe.Generally speaking, the 6G network will optimize the performance of 5G, and expand the network scenarios which are difficult to achieve within 5G.However, the introduction of new scenarios and technologies will also bring new security threats to cyber security.The research progress on the key technologies and implementation methods of the 6G were conducted.To summarize a vision of core technologies of 6G, the research work of major 5G/6G research institutions, companies and enterprises were focused on .On this basis, the possible security problems and security challenges in 6G network were put forward.Finally, according to the existing network techniques, the possible solutions and proposed a general security model for 6G networks were discussed. |
format | Article |
id | doaj-art-f19db281b9674457ad5ff8cbbb18a554 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2021-02-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-f19db281b9674457ad5ff8cbbb18a5542025-01-15T03:14:37ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2021-02-017284559562495Research on security scenarios and security models for 6G networkingChenglei ZHANGYulong FUHui LIJin CAOThe concept of 6G has been proposed and has attracted the wide attention of academe.Generally speaking, the 6G network will optimize the performance of 5G, and expand the network scenarios which are difficult to achieve within 5G.However, the introduction of new scenarios and technologies will also bring new security threats to cyber security.The research progress on the key technologies and implementation methods of the 6G were conducted.To summarize a vision of core technologies of 6G, the research work of major 5G/6G research institutions, companies and enterprises were focused on .On this basis, the possible security problems and security challenges in 6G network were put forward.Finally, according to the existing network techniques, the possible solutions and proposed a general security model for 6G networks were discussed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.20210046Gnetwork securitywireless communication security |
spellingShingle | Chenglei ZHANG Yulong FU Hui LI Jin CAO Research on security scenarios and security models for 6G networking 网络与信息安全学报 6G network security wireless communication security |
title | Research on security scenarios and security models for 6G networking |
title_full | Research on security scenarios and security models for 6G networking |
title_fullStr | Research on security scenarios and security models for 6G networking |
title_full_unstemmed | Research on security scenarios and security models for 6G networking |
title_short | Research on security scenarios and security models for 6G networking |
title_sort | research on security scenarios and security models for 6g networking |
topic | 6G network security wireless communication security |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021004 |
work_keys_str_mv | AT chengleizhang researchonsecurityscenariosandsecuritymodelsfor6gnetworking AT yulongfu researchonsecurityscenariosandsecuritymodelsfor6gnetworking AT huili researchonsecurityscenariosandsecuritymodelsfor6gnetworking AT jincao researchonsecurityscenariosandsecuritymodelsfor6gnetworking |