Journal article Open Access

A Review of the Development of 6th Generation Network Security Adapting Artificial Intelligence and Distributed Ledger Technology

Elegado, Angel Nica

DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="" xmlns="" xsi:schemaLocation="">
  <identifier identifierType="DOI">10.5281/zenodo.7500217</identifier>
      <creatorName>Elegado, Angel Nica</creatorName>
      <givenName>Angel Nica</givenName>
      <affiliation>School of Advanced Studies, Saint Louis University, Baguio City, Philippines</affiliation>
    <title>A Review of the Development of 6th Generation Network Security Adapting Artificial Intelligence and Distributed Ledger Technology</title>
    <subject>6g Communications</subject>
    <subject>Network Security</subject>
    <subject>Artificial Intelligence</subject>
    <subject>Distributed Ledger Technology</subject>
    <date dateType="Issued">2023-05-31</date>
  <resourceType resourceTypeGeneral="JournalArticle"/>
    <alternateIdentifier alternateIdentifierType="url"></alternateIdentifier>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.5281/zenodo.7500216</relatedIdentifier>
    <rights rightsURI="">Creative Commons Attribution 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
    <description descriptionType="Abstract">&lt;p&gt;This paper reviews the network security in 6G applied in various emerging technologies. The content of the paper discusses the 6G, which is expected to be merged with multiple sorts of slicing enabled by new technologies and paradigms to make the system more intelligent and safeguard the network infrastructure. This literature review was performed through a systematic review using a meta-analysis review to draw a conclusion. This paper identifies the issues and challenges of the 6G network and discusses the current research areas in network security, such as AI and DLT, which were found as solutions which can be employed for security at many cybersecurity protection and defense stages. The value of these technologies is based on the benefits of autonomy, increased accuracy, and predictive capabilities for security analytics. Additionally, this study compares which approach is the most viable solution to address network security issues. The researcher wants to investigate further 6G cloud computing for future work, addressed by centralized data centers accessed via the leading network.&lt;/p&gt;</description>
All versions This version
Views 4141
Downloads 4040
Data volume 10.3 MB10.3 MB
Unique views 3636
Unique downloads 3636


Cite as