Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jung, Soyi | - |
dc.contributor.author | Park, Soohyun | - |
dc.contributor.author | Son, Seok Bin | - |
dc.contributor.author | Lee, Haemin | - |
dc.contributor.author | Kim, Joongheon | - |
dc.date.issued | 2024-01-01 | - |
dc.identifier.issn | 1860-4870 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/37083 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85179896133&origin=inward | - |
dc.description.abstract | In 6G, a range of new technologies will emerge based on intelligent network structures. The connection between 6G technology and AI-based intelligent networks will make communication more convenient for humans, but may also rise to new security threats. As a result, network security and trustworthiness will become a key challenges in 6G. This chapter categorizes security threats in 6G into four areas; openness, post quantum cryptography, privacy preserving, and auction threats. We will also introduce security solutions that can mitigate these security threats in 6G. | - |
dc.language.iso | eng | - |
dc.publisher | Springer Science and Business Media Deutschland GmbH | - |
dc.subject.mesh | Auction | - |
dc.subject.mesh | Deep learning | - |
dc.subject.mesh | Network structures | - |
dc.subject.mesh | Networks security | - |
dc.subject.mesh | Second price auction | - |
dc.subject.mesh | Second-price auction | - |
dc.subject.mesh | Security | - |
dc.subject.mesh | Security threats | - |
dc.subject.mesh | Split learning | - |
dc.subject.mesh | Trustworthiness | - |
dc.title | Network Security and Trustworthiness | - |
dc.type | Book Chapter | - |
dc.citation.endPage | 762 | - |
dc.citation.startPage | 747 | - |
dc.citation.title | Signals and Communication Technology | - |
dc.citation.volume | Part F1944 | - |
dc.identifier.bibliographicCitation | Signals and Communication Technology, Vol.Part F1944, pp.747-762 | - |
dc.identifier.doi | 10.1007/978-3-031-37920-8_30 | - |
dc.identifier.scopusid | 2-s2.0-85179896133 | - |
dc.identifier.url | https://www.springer.com/series/4748 | - |
dc.subject.keyword | Auction | - |
dc.subject.keyword | Deep Learning | - |
dc.subject.keyword | Second Price Auction (SPA) | - |
dc.subject.keyword | Security | - |
dc.subject.keyword | Split Learning | - |
dc.subject.keyword | Trustworthiness | - |
dc.type.other | Book Chapter | - |
dc.identifier.pissn | 1860-4862 | - |
dc.description.isoa | false | - |
dc.subject.subarea | Control and Systems Engineering | - |
dc.subject.subarea | Signal Processing | - |
dc.subject.subarea | Computer Networks and Communications | - |
dc.subject.subarea | Electrical and Electronic Engineering | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.