مشخصات مقاله | |
ترجمه عنوان مقاله | یک معماری امنیت ارتقایافته نوین برای شبکه های سلولی نسل ششم (6G) با استفاده از احراز هویت و رویکرد تایید |
عنوان انگلیسی مقاله | A novel enhanced security architecture for sixth generation (6G) cellular networks using authentication and acknowledgement (AA) approach |
نشریه | الزویر |
انتشار | مقاله سال 2024 |
تعداد صفحات مقاله انگلیسی | 11 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
نوع نگارش مقاله |
مقاله پژوهشی (Research Article) |
مقاله بیس | این مقاله بیس نمیباشد |
نمایه (index) | scopus – Master Journals List – JCR – DOAJ |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
5.123 در سال 2022 |
شاخص H_index | 24 در سال 2024 |
شاخص SJR | 0.592 در سال 2022 |
شناسه ISSN | 2590-1230 |
شاخص Quartile (چارک) | Q2 در سال 2022 |
فرضیه | ندارد |
مدل مفهومی | ندارد |
پرسشنامه | ندارد |
متغیر | ندارد |
رفرنس | دارد |
رشته های مرتبط | فناوری اطلاعات و ارتباطات – کامپیوتر |
گرایش های مرتبط | دیتا و امنیت شبکه – امنیت اطلاعات |
نوع ارائه مقاله |
ژورنال |
مجله | Results in Engineering – یافته ها در مهندسی |
دانشگاه | Chennai Institute of Technology, India |
کلمات کلیدی | نسل پنجم شبکه تلفن همراه (5G)، نسل ششم شبکه تلفن همراه (6G)، انتقال امن، وای فای، اینترنت اشیا، معماری امنیت نسل ششم شبکه تلفن همراه (6G) |
کلمات کلیدی انگلیسی | 5G, 6G, Secure transmission, WiFi, Internet of things (IoT), 6G security architecture |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.rineng.2023.101669 |
لینک سایت مرجع | https://www.sciencedirect.com/science/article/pii/S259012302300796X |
کد محصول | e17684 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract 1 Introduction 2 Related works 3 Proposed authentication and acknowledgement (AA) approach 4 Proposed 6G security architecture 5 Secret key authentication 6 Results and discussion 7 Limitations and future recommendations for 6G cellular network security 8 Conclusion CRediT authorship contribution statement Declaration of competing interest Acknowledgements Data availability References |
بخشی از متن مقاله: |
Abstract The sixth generation (6G) of cellular transmission is extremely adaptable. 6G will equip everyone with pervasive wireless connectivity and meet the needs of a fully connected world. It is anticipated that revolutionary ideas will increase in support for a fast-expanding variety of smart devices and applications. The sophisticated characteristics of 5G portable cellular network infrastructures produce novel threats and requirements. Comparing 6G cellular network technologies to 5G cellular networks, this paper discusses various security and privacy issues in 6G cellular networks based numerous security services. Proposes AA approach to evaluate the effectiveness of the methodology. Propose a new 6G wireless security architecture based on the analysis of secret key authentication and flexible position based identification, which serves as the foundation for an examination of identity management and flexible authentication. Demonstrates the benefits of the proposed architecture, analyzes BER against SINR and Measure Throughput Against various SINR values. Finally, Limitations and future recommendation for 6G cellular network security is presented.
Introduction Over the past few years, wireless networks technologies have made significant technological advancement. The revolutionary changes brought about by the most recent 5G innovations have benefited a wide range of stakeholders, including commercial solution suppliers, university research organizations, standards bodies, and mobile-users [1,2]. In contrast, networks comprise a large number of Base Stations (BS) to enable high data transmission rates and adequate network capacity due to the low penetrability of high-frequency signals used in 5G [3,4]. The foundation of mobile network service continuity is multi-hop network technology, which allows users to seamlessly switch between source to destination that are outfitted with various access methods. The complexity of device changeover in 5G networks grows as a result of the diversity of service networks, increasing transmission times and affecting user experiences. As opposed to 5G networks, high-density access networks have a high transmission rate among tiny nodes. Existing wireless networks have been struggling to handle an increase in traffic due to the constant growth of data and devices in cellular networks [5,6]. In response, the 6G of cellular communication technologies has arisen to satisfy these high expectations. With many different communication networks, including Long Term Evolution, the Internet of Things, Mobile multi-hop Networks, wireless personal area networks and several versions of Wi-Fi, 6G is incredibly adaptable [7,8].
The 6G communication network is a network with several additional capabilities in addition to being an upgrade of the existing 5G network [9,10]. Research and development for 6G aims to provide a variety of advanced qualities, including greater bandwidth than existing 5G networks, higher mobile internet connection facilitating communication between devices among users as well as extensive technological communications [11,12]. Planned 6G networks also seeks to reduce energy consumption, latency and enhance security, for better wireless network deployment [13,14]. Additionally, a rise in connection density will lead to demands for higher energy efficiency, which 5G is not intended to provide. As a result, the research community has focused on solving the aforementioned key problems [15,16]. Accordingly, we assert that current work in the fields of terahertz band communications, intelligent surfaces and environments, and network automation. The general architecture of 6G wireless systems is shown in Fig. 1.
Conclusion Cellular networks have been successful because of their emphasis on secure transmission. When everyone’s access to the internet is ensured in 6G, the networks will grow to enormous sizes. We have presented a thorough analysis of current advancements in 6G wireless security in this paper. We proposed a 6G wireless security architecture based on existing research. From the suggested security framework, an analysis of position based identification and adaptable authentication based on different security architectures has been provided. Demonstrated the benefits of the proposed architecture, Analyzed the performance of BER at the User Interface is 94 % improved than the CoMP, GKM and OSPR. Furthermore, Enhanced Throughput 96 % achieved for AA Approach due to integration of data plane and control plane in the proposed architecture. The efficacy of this class of solution is verified by using Riverbed Modeler 17.5 simulation tool. |