2021
DOI: 10.1155/2021/1331428
|View full text |Cite
|
Sign up to set email alerts
|

Sixth Generation (6G) Cognitive Radio Network (CRN) Application, Requirements, Security Issues, and Key Challenges

Abstract: Recently, 5G installation has been started globally. Different capabilities are in the consistent procedure, like ultrareliability, mass connectivity, and specific low latency. Though, 5G is insufficient to meet all the necessities of the future technology in 2030 and so on. Next generation information and communication technology is playing an important role in attraction of researchers, industries, and technical people. With respect to 5G networks, sixth-generation (6G) CR networks are anticipated to familia… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 35 publications
(18 citation statements)
references
References 96 publications
(98 reference statements)
0
18
0
Order By: Relevance
“…An algorithm is discussed for the detection of deception attack in an application which could be remote state application, smart sensors used for data receiving [105]. Second application of such kind has been studied for the detection of bias injection attacks for stochastic rectilinear dynamical scheme [12,[106][107][108][109]. Multiclass support vector machine was discussed for building an intrusion detection model.…”
Section: Q 2 Detector Kalman Filtersmentioning
confidence: 99%
See 2 more Smart Citations
“…An algorithm is discussed for the detection of deception attack in an application which could be remote state application, smart sensors used for data receiving [105]. Second application of such kind has been studied for the detection of bias injection attacks for stochastic rectilinear dynamical scheme [12,[106][107][108][109]. Multiclass support vector machine was discussed for building an intrusion detection model.…”
Section: Q 2 Detector Kalman Filtersmentioning
confidence: 99%
“…Approach. GT deals with planned collaboration in between several named players and decision makes [107,140,141]. Each player preference order in between many options is increased in an impartial purpose for player, and all players try to optimize own impartial function.…”
Section: Game Eory (Gt)mentioning
confidence: 99%
See 1 more Smart Citation
“…Aslam et al studied a survey of current developments and upcoming trends. 13 They also studied the predicted applications, possible technologies, and security issues for 6G CR network communication. Salahdine and Kaabouch described and analyzed different attacks targeting the physical layer.…”
Section: Related Workmentioning
confidence: 99%
“…In their research, after secondary users are identified by the primary user to access the primary network, the secondary users are given the authorization to access the primary network. Aslam et al studied a survey of current developments and upcoming trends 13 . They also studied the predicted applications, possible technologies, and security issues for 6G CR network communication.…”
Section: Related Workmentioning
confidence: 99%