{"title":"利用人工智能算法隔离虚假数据的6G网络安全框架","authors":"Hariprasath Manoharan, Gayathri Devi P","doi":"10.1002/cpe.70182","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>This research aims to identify and explore the significance of security aspects in the transition to Sixth Generation (6G) networks. Due to the lack of security features and absence of a data discovery process in the current infrastructure, the proposed approach is being built to discover data under low latency conditions. Furthermore, data analysis is conducted using an artificial intelligence algorithm that incorporates distributed and various decision-making processes to monitor the outcomes. The analysis focuses on the impact of influential factors during data transmission units, employing normalizations to prevent unauthorized users from accessing such transmissions. In order to enhance the security of data in 6G networks, data pairing circumstances are assessed, resulting in increased delivery units at the receiver side and prevention of data drops. In order to conduct a thorough study, the parametric design is evaluated under four different scenarios. The performance analysis is then carried out using two case studies. The results show that the suggested method decreases data drops to 2%, whereas the previous methodology has a data drop rate of 10%.</p>\n </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 18-20","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2025-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security Frame Towards 6G Networks for Isolating False Data Using Artificial Intelligence Algorithm\",\"authors\":\"Hariprasath Manoharan, Gayathri Devi P\",\"doi\":\"10.1002/cpe.70182\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>This research aims to identify and explore the significance of security aspects in the transition to Sixth Generation (6G) networks. Due to the lack of security features and absence of a data discovery process in the current infrastructure, the proposed approach is being built to discover data under low latency conditions. Furthermore, data analysis is conducted using an artificial intelligence algorithm that incorporates distributed and various decision-making processes to monitor the outcomes. The analysis focuses on the impact of influential factors during data transmission units, employing normalizations to prevent unauthorized users from accessing such transmissions. In order to enhance the security of data in 6G networks, data pairing circumstances are assessed, resulting in increased delivery units at the receiver side and prevention of data drops. In order to conduct a thorough study, the parametric design is evaluated under four different scenarios. The performance analysis is then carried out using two case studies. The results show that the suggested method decreases data drops to 2%, whereas the previous methodology has a data drop rate of 10%.</p>\\n </div>\",\"PeriodicalId\":55214,\"journal\":{\"name\":\"Concurrency and Computation-Practice & Experience\",\"volume\":\"37 18-20\",\"pages\":\"\"},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2025-07-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Concurrency and Computation-Practice & Experience\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/cpe.70182\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, SOFTWARE ENGINEERING\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.70182","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
Security Frame Towards 6G Networks for Isolating False Data Using Artificial Intelligence Algorithm
This research aims to identify and explore the significance of security aspects in the transition to Sixth Generation (6G) networks. Due to the lack of security features and absence of a data discovery process in the current infrastructure, the proposed approach is being built to discover data under low latency conditions. Furthermore, data analysis is conducted using an artificial intelligence algorithm that incorporates distributed and various decision-making processes to monitor the outcomes. The analysis focuses on the impact of influential factors during data transmission units, employing normalizations to prevent unauthorized users from accessing such transmissions. In order to enhance the security of data in 6G networks, data pairing circumstances are assessed, resulting in increased delivery units at the receiver side and prevention of data drops. In order to conduct a thorough study, the parametric design is evaluated under four different scenarios. The performance analysis is then carried out using two case studies. The results show that the suggested method decreases data drops to 2%, whereas the previous methodology has a data drop rate of 10%.
期刊介绍:
Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of:
Parallel and distributed computing;
High-performance computing;
Computational and data science;
Artificial intelligence and machine learning;
Big data applications, algorithms, and systems;
Network science;
Ontologies and semantics;
Security and privacy;
Cloud/edge/fog computing;
Green computing; and
Quantum computing.