Ajou University repository

Network Security and Trustworthiness
  • Jung, Soyi ;
  • Park, Soohyun ;
  • Son, Seok Bin ;
  • Lee, Haemin ;
  • Kim, Joongheon
Citations

SCOPUS

0

Citation Export

DC Field Value Language
dc.contributor.authorJung, Soyi-
dc.contributor.authorPark, Soohyun-
dc.contributor.authorSon, Seok Bin-
dc.contributor.authorLee, Haemin-
dc.contributor.authorKim, Joongheon-
dc.date.issued2024-01-01-
dc.identifier.issn1860-4870-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/37083-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85179896133&origin=inward-
dc.description.abstractIn 6G, a range of new technologies will emerge based on intelligent network structures. The connection between 6G technology and AI-based intelligent networks will make communication more convenient for humans, but may also rise to new security threats. As a result, network security and trustworthiness will become a key challenges in 6G. This chapter categorizes security threats in 6G into four areas; openness, post quantum cryptography, privacy preserving, and auction threats. We will also introduce security solutions that can mitigate these security threats in 6G.-
dc.language.isoeng-
dc.publisherSpringer Science and Business Media Deutschland GmbH-
dc.subject.meshAuction-
dc.subject.meshDeep learning-
dc.subject.meshNetwork structures-
dc.subject.meshNetworks security-
dc.subject.meshSecond price auction-
dc.subject.meshSecond-price auction-
dc.subject.meshSecurity-
dc.subject.meshSecurity threats-
dc.subject.meshSplit learning-
dc.subject.meshTrustworthiness-
dc.titleNetwork Security and Trustworthiness-
dc.typeBook Chapter-
dc.citation.endPage762-
dc.citation.startPage747-
dc.citation.titleSignals and Communication Technology-
dc.citation.volumePart F1944-
dc.identifier.bibliographicCitationSignals and Communication Technology, Vol.Part F1944, pp.747-762-
dc.identifier.doi10.1007/978-3-031-37920-8_30-
dc.identifier.scopusid2-s2.0-85179896133-
dc.identifier.urlhttps://www.springer.com/series/4748-
dc.subject.keywordAuction-
dc.subject.keywordDeep Learning-
dc.subject.keywordSecond Price Auction (SPA)-
dc.subject.keywordSecurity-
dc.subject.keywordSplit Learning-
dc.subject.keywordTrustworthiness-
dc.type.otherBook Chapter-
dc.identifier.pissn1860-4862-
dc.description.isoafalse-
dc.subject.subareaControl and Systems Engineering-
dc.subject.subareaSignal Processing-
dc.subject.subareaComputer Networks and Communications-
dc.subject.subareaElectrical and Electronic Engineering-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Jung, Soyi Image
Jung, Soyi정소이
Department of Electrical and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.