• Title/Summary/Keyword: 6G trustworthy

Search Result 1, Processing Time 0.013 seconds

Study on Trusted Models and Intelligent Intrusion Detection Systems for 6G Mobile Networks (6G 환경을 고려한 트러스트 모델 및 지능형 침입 탐지 기술 동향)

  • C.H. Park;K.M. Park;J.H. Song;J.H. Kim;S.H. Kim
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.5
    • /
    • pp.74-85
    • /
    • 2024
  • The advent of 6G mobile communication technologies promises to surpass the capabilities of existing 5G by offering ultra high-speed data transmission, ultra low latency, and extensive connectivity, enabling a new wave of digital transformation across various fields. However, the openness and decentralized nature of 6G systems, which enhance their flexibility and scalability, can expand the attack surface and increase security threats from cyber-attacks. In this article, we analyze the current research trends related to security in the 6G mobile communication landscape.