[HTML][HTML] Security requirements and challenges of 6G technologies and applications

SA Abdel Hakeem, HH Hussein, HW Kim - Sensors, 2022 - mdpi.com
After implementing 5G technology, academia and industry started researching 6th
generation wireless network technology (6G). 6G is expected to be implemented around the …

Zero touch management: A survey of network automation solutions for 5G and 6G networks

E Coronado, R Behravesh… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Mobile networks are facing an unprecedented demand for high-speed connectivity
originating from novel mobile applications and services and, in general, from the adoption …

[HTML][HTML] Security and privacy in 6G networks: New areas and new challenges

M Wang, T Zhu, T Zhang, J Zhang, S Yu… - Digital Communications …, 2020 - Elsevier
With the deployment of more and more 5g networks, the limitations of 5g networks have
been found, which undoubtedly promotes the exploratory research of 6G networks as the …

[HTML][HTML] Machine learning in beyond 5G/6G networks—State-of-the-art and future trends

VP Rekkas, S Sotiroudis, P Sarigiannidis, S Wan… - Electronics, 2021 - mdpi.com
Artificial Intelligence (AI) and especially Machine Learning (ML) can play a very important
role in realizing and optimizing 6G network applications. In this paper, we present a brief …

[HTML][HTML] Anomaly detection in 6G networks using machine learning methods

MM Saeed, RA Saeed, M Abdelhaq, R Alsaqour… - Electronics, 2023 - mdpi.com
While the cloudification of networks with a micro-services-oriented design is a well-known
feature of 5G, the 6G era of networks is closely related to intelligent network orchestration …

A comprehensive survey of 6G wireless communications

Y Zhao, W Zhai, J Zhao, T Zhang, S Sun… - arXiv preprint arXiv …, 2020 - arxiv.org
While fifth-generation (5G) communications are being rolled out worldwide, sixth-generation
(6G) communications have attracted much attention from both the industry and the …

6G survey on challenges, requirements, applications, key enabling technologies, use cases, AI integration issues and security aspects

MS Akbar, Z Hussain, QZ Sheng… - arXiv preprint arXiv …, 2022 - arxiv.org
The fifth-generation (5G) network is likely to bring in high data rates, more reliability, and low
delays for mobile, personal and local area networks. Alongside the rapid growth of smart …

Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices

S Kumari, M Singh, R Singh, H Tewari - Knowledge-Based Systems, 2022 - Elsevier
Great extent of modernization in intelligent device automation and wireless sensor network
have encouraged the augmentation of IoTs to interconnect millions of actual devices to the …

Utilizing the eSIM for public key cryptography: A network security solution for 6G

A Al Mousa, M Al Qomri, S Al Hajri… - 2020 2nd International …, 2020 - ieeexplore.ieee.org
The future brings a whole suite of technical challenges that are no match for the current
standard, 5G. Therefore, those challenges must be resolved by the next generation, 6G …

Towards artificial intelligence empowered security and privacy issues in 6G communications

A Bandi, S Yalamarthi - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Applications of wireless networks beyond 5G are vulnerable to various security and privacy
concerns. This research aims to identify the security and privacy flaws beyond 5G network …