{"title":"Study on Zero-Trust Architecture, Application Areas & Challenges of 6G Technology in Future","authors":"Richa Singh, Gaurav Srivastav, Rekha Kashyap, Satvik Vats","doi":"10.1109/ICDT57929.2023.10150745","DOIUrl":null,"url":null,"abstract":"Intelligent network orchestration and management are crucial components of the 6G network. Therefore, machine learning and artificial intelligence play a big part in the 6G paradigm that is being imagined. However, the combination of 6G and AIML utilization may frequently be a double-edged sword because AI has the capacity to either protect or compromise security and privacy. Proactive threat detection, the use of mitigating intelligent techniques, and network automation in future are needed to enable the achievement of independent networks in 6G. As a result, this paper has detailed focus on the ongoing projects based on 6G and factors that make 6G technology necessary. The role of ZT architecture is discussed in detail, use of AIML in 6G, Various application areas and challenges associated in 6G has been mentioned in this paper.","PeriodicalId":266681,"journal":{"name":"2023 International Conference on Disruptive Technologies (ICDT)","volume":"319 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Disruptive Technologies (ICDT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDT57929.2023.10150745","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Intelligent network orchestration and management are crucial components of the 6G network. Therefore, machine learning and artificial intelligence play a big part in the 6G paradigm that is being imagined. However, the combination of 6G and AIML utilization may frequently be a double-edged sword because AI has the capacity to either protect or compromise security and privacy. Proactive threat detection, the use of mitigating intelligent techniques, and network automation in future are needed to enable the achievement of independent networks in 6G. As a result, this paper has detailed focus on the ongoing projects based on 6G and factors that make 6G technology necessary. The role of ZT architecture is discussed in detail, use of AIML in 6G, Various application areas and challenges associated in 6G has been mentioned in this paper.