2022
DOI: 10.1631/fitee.2200060
|View full text |Cite
|
Sign up to set email alerts
|

Discussion on a new paradigm of endogenous security towards 6G networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 70 publications
0
5
0
Order By: Relevance
“…7. The off-chain time is the process of transferring data to the local area after matching, which is Step (6) in Fig. 7.…”
Section: Devicementioning
confidence: 99%
See 1 more Smart Citation
“…7. The off-chain time is the process of transferring data to the local area after matching, which is Step (6) in Fig. 7.…”
Section: Devicementioning
confidence: 99%
“…Hu et al [5] integrated bionic immunity and artificial intelligence into endogenous security system. Ji et al [6] built the secure and trusted 6G endogenous security network using blockchain and zerotrust mechanism and conducted experimental analysis of lightweight encryption algorithms on resourceconstrained devices. Therefore, combining the federated learning specific to this paper with the above techniques and methods, we focus on identification authentication and management, zero-trust mechanism, computer immunity, federated learning, blockchain, complexity and cost, and experiment as the comparison item.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, the DHR architecture is extended to WESS to address ESS challenges in wireless communication systems, demonstrating improvements in signal-to-noise ratio and anti-interference capabilities. In [15], to tackle complex ESS issues in 6G networks, the DHR architecture 6G polymorphic network is devised. Here, both the control plane and user plane of the 6G core network are based on the DHR architecture.…”
Section: Related Workmentioning
confidence: 99%
“…From this perspective, the DHR architecture system is a specified multi-heterogeneous system. Due to the superiority, the ESS theory along with the DHR architecture have been introduced to the fields of wireless communications systems [14], sixth-generation mobile communication (6G) networks [15], embedded systems [16], industrial control systems [17], zero trust systems [18], etc.…”
Section: Introductionmentioning
confidence: 99%
“…According to the literature [12], the term "endogenous" refers to factors (or variables) within a system or model that are inherently interrelated and inseparable. Unlike factors that can be embedded or added externally, endogenous factors constitute core components that are integral to the system or model.…”
Section: Approaches To Endogenous Securitymentioning
confidence: 99%