6G应用的安全与隐私入侵检测技术

Priya Kohli, Sachin Sharma, Priya Matta
{"title":"6G应用的安全与隐私入侵检测技术","authors":"Priya Kohli, Sachin Sharma, Priya Matta","doi":"10.1109/ICSCCC58608.2023.10176740","DOIUrl":null,"url":null,"abstract":"With its extraordinarily high speed, high computational cost, and significant requirement, 6G is an emerging technology. It has security and privacy issues as a result of being wireless and dynamic. Real-time data about legally registered cars and their drivers can be compromised by an unauthorized intrusion into a node over a fully connected network. Such actions could slow down the network or jeopardize its reliability. The unauthorized invasion of a node across a network is described in relation to many popular algorithms and strategies. Regressive along with the discussion of upcoming work, comparative examination of previously offered methodologies is conducted.","PeriodicalId":359466,"journal":{"name":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Intrusion Detection Techniques For Security and Privacy of 6G Applications\",\"authors\":\"Priya Kohli, Sachin Sharma, Priya Matta\",\"doi\":\"10.1109/ICSCCC58608.2023.10176740\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With its extraordinarily high speed, high computational cost, and significant requirement, 6G is an emerging technology. It has security and privacy issues as a result of being wireless and dynamic. Real-time data about legally registered cars and their drivers can be compromised by an unauthorized intrusion into a node over a fully connected network. Such actions could slow down the network or jeopardize its reliability. The unauthorized invasion of a node across a network is described in relation to many popular algorithms and strategies. Regressive along with the discussion of upcoming work, comparative examination of previously offered methodologies is conducted.\",\"PeriodicalId\":359466,\"journal\":{\"name\":\"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCCC58608.2023.10176740\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCCC58608.2023.10176740","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

6G是一项新兴技术,具有极高的速度、高计算成本和巨大的需求。由于无线和动态,它存在安全和隐私问题。合法注册的车辆及其驾驶员的实时数据可能会因未经授权入侵完全连接的网络上的节点而遭到破坏。这种行为可能会降低网络速度或危及其可靠性。描述了与许多流行的算法和策略有关的跨网络节点的未经授权的入侵。随着对即将开展的工作的讨论,对先前提供的方法进行了比较检查。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Intrusion Detection Techniques For Security and Privacy of 6G Applications
With its extraordinarily high speed, high computational cost, and significant requirement, 6G is an emerging technology. It has security and privacy issues as a result of being wireless and dynamic. Real-time data about legally registered cars and their drivers can be compromised by an unauthorized intrusion into a node over a fully connected network. Such actions could slow down the network or jeopardize its reliability. The unauthorized invasion of a node across a network is described in relation to many popular algorithms and strategies. Regressive along with the discussion of upcoming work, comparative examination of previously offered methodologies is conducted.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信