Course Hero Logo

6g Security Architecture.docx - Abstract Traditional...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 3 out of 6 pages.

AbstractAs more 5G networks are implemented, the limits of5G networks are becoming evident, motivating anexploratory research of 6G networks as the nextgeneration option. These analyses emphasize thebasic privacy and security concerns connected with6G technology. As a consequence, researchers createda survey on the current status of 6G architecture,privacy, and security to consolidate and establish thisfundamental study as a foundation for future studies.The research look back at prior technologies ofnetworking and the way inspired contemporaryimprovements in 6G networking. Researchers then gothrough four key parts of 6G networks: distributedartificial intelligence, intelligent radio, real-timeintelligent edge computing, and 3D intercoms, plusseveral exciting new technology in each sector, plusthe privacy and security risks that come with them.The research comes to an end with a conclusion onthe future use of 6G.Keywords: IoT, AI, communication technologies,holographic communication, blockchain, DistributedDenial of Service (DDOS), Zero Trust Architecture(ZTA), real-time intelligent edge, intelligent radio,3D intercomsINTRODUCTIONSixth generation (6G) networks are expected to bemore open and diverse than previous generations.Traditional security designs, which frequently rely onthe creation of a security perimeter at networkboundaries, are challenged by this. Researchersdescribe a software-defined zero trust architecture(ZTA) for 6G networks in this paper, which has thepotential to build an elastic and scalable securityregime [1]. Safe access control is enabled throughadaptive partnerships across the related controldomains, and this architecture may effectivelyprevent hostile access behaviors including distributeddenial of service (DDoS) attacks, malwaredistribution, and zero-day vulnerabilities. Researchersalso go through key design elements of thisarchitecture and provide simulation results from acase study that demonstrate ZTA's effectiveness androbustness for 6G [11]. In addition, they look intounresolved issues in order to further market thiscreative design.
Fig. 1. Security and Privacy Issues in the 6G Network [2]The circles in Fig. 1 represent the four majorcomponents of a 6G network, which comprise real-time intelligent edge, distributed AI, intelligent radio,and 3D intercoms. Experts picked these four topics toconcentrate on since they encompass the most criticalcomponents of previous 6G research [10]. They alsoface the most rigorous security and privacyconsiderations. It includes AI-based software,quantum communications, molecular

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 6 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
JoeNadan
Tags

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture