Ajou University repository

Network Security and Trustworthiness
  • Jung, Soyi ;
  • Park, Soohyun ;
  • Son, Seok Bin ;
  • Lee, Haemin ;
  • Kim, Joongheon
Citations

SCOPUS

0

Citation Export

Publication Year
2024-01-01
Journal
Signals and Communication Technology
Publisher
Springer Science and Business Media Deutschland GmbH
Citation
Signals and Communication Technology, Vol.Part F1944, pp.747-762
Keyword
AuctionDeep LearningSecond Price Auction (SPA)SecuritySplit LearningTrustworthiness
Mesh Keyword
AuctionDeep learningNetwork structuresNetworks securitySecond price auctionSecond-price auctionSecuritySecurity threatsSplit learningTrustworthiness
All Science Classification Codes (ASJC)
Control and Systems EngineeringSignal ProcessingComputer Networks and CommunicationsElectrical and Electronic Engineering
Abstract
In 6G, a range of new technologies will emerge based on intelligent network structures. The connection between 6G technology and AI-based intelligent networks will make communication more convenient for humans, but may also rise to new security threats. As a result, network security and trustworthiness will become a key challenges in 6G. This chapter categorizes security threats in 6G into four areas; openness, post quantum cryptography, privacy preserving, and auction threats. We will also introduce security solutions that can mitigate these security threats in 6G.
ISSN
1860-4870
Language
eng
URI
https://aurora.ajou.ac.kr/handle/2018.oak/37083
https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85179896133&origin=inward
DOI
https://doi.org/10.1007/978-3-031-37920-8_30
Journal URL
https://www.springer.com/series/4748
Type
Book Chapter
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Jung, Soyi Image
Jung, Soyi정소이
Department of Electrical and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.