Journal article Open Access

A Review of the Development of 6th Generation Network Security Adapting Artificial Intelligence and Distributed Ledger Technology

Elegado, Angel Nica

MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="">
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">6g Communications</subfield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Network Security</subfield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Artificial Intelligence</subfield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Distributed Ledger Technology</subfield>
  <controlfield tag="005">20230109022638.0</controlfield>
  <controlfield tag="001">7500217</controlfield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">257271</subfield>
    <subfield code="z">md5:e2ad771063282539221dc2fec8270289</subfield>
    <subfield code="u"></subfield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2023-05-31</subfield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="o"></subfield>
  <datafield tag="909" ind1="C" ind2="4">
    <subfield code="c">1-6</subfield>
    <subfield code="n">1</subfield>
    <subfield code="p">Innovatus: A Journal on Computing Technology Innovations</subfield>
    <subfield code="v">6</subfield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">School of Advanced Studies, Saint Louis University, Baguio City, Philippines</subfield>
    <subfield code="a">Elegado, Angel Nica</subfield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">A Review of the Development of 6th Generation Network Security Adapting Artificial Intelligence and Distributed Ledger Technology</subfield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u"></subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2"></subfield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;This paper reviews the network security in 6G applied in various emerging technologies. The content of the paper discusses the 6G, which is expected to be merged with multiple sorts of slicing enabled by new technologies and paradigms to make the system more intelligent and safeguard the network infrastructure. This literature review was performed through a systematic review using a meta-analysis review to draw a conclusion. This paper identifies the issues and challenges of the 6G network and discusses the current research areas in network security, such as AI and DLT, which were found as solutions which can be employed for security at many cybersecurity protection and defense stages. The value of these technologies is based on the benefits of autonomy, increased accuracy, and predictive capabilities for security analytics. Additionally, this study compares which approach is the most viable solution to address network security issues. The researcher wants to investigate further 6G cloud computing for future work, addressed by centralized data centers accessed via the leading network.&lt;/p&gt;</subfield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">doi</subfield>
    <subfield code="i">isVersionOf</subfield>
    <subfield code="a">10.5281/zenodo.7500216</subfield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.5281/zenodo.7500217</subfield>
    <subfield code="2">doi</subfield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">article</subfield>
All versions This version
Views 4141
Downloads 4040
Data volume 10.3 MB10.3 MB
Unique views 3636
Unique downloads 3636


Cite as