Abstract
In the future, human society will enter the era of intelligence, and 6G will also achieve cross integration with information technologies such as artificial intelligence (AI). 6G uses primitive artificial intelligence to continuously empower the whole society in the future and realize true universal intelligence. How to use 6G native AI to intelligently manage and control the future network resources and wireless resources, and how to use 6G network security technology are both hot research directions and key directions of future communication networks. Artificial intelligence technology has created new opportunities for innovation and business model driven by machine learning technology in 6G network. The end-to-end network automation of the future communication requires the system to actively discover dangers and threats, apply intelligent mitigation technology, and ensure the self sustainment of the 6G network. But in fact, the alliance between 6G and AI is also a double-edged sword. In most cases, AI technology can protect the security and privacy of the network, and may be used by criminals to violate information security and privacy. This paper analyzes the role of AI in 6G network security, analyzes the challenges that AI technology may encounter in 6G security, and proposes solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shu, J., Peng, C.: Analysis of China's network security technology landscape. Mod. Comput. (6), 68–73 (2021)
Sun, H.: Research on network security technology based on blockchain. Changjiang Inf. Commun. 35(1), 167–169 (2022)
Swim the river application of network security technology in computer maintenance. Sci. Technol. Innov. Appl. 12(13), 189–192 (2022)
Xu, S.: CTF competition based on network security technology. Radio Television Inf. (z1), 50–52 (2021)
Sheng, Y.: Research on computer network security technology based on network security maintenance. Wirel. Internet Technol. 18(20), 100–101 (2021)
Li, Y.: Research on network security technology of computer laboratory under big data technology. Shihezi Sci. Technol. (6), 21–22 (2021)
Yu, Y.: Research on network security technology of computer laboratory under cloud computing technology. Electron. Manuf. (2), 95–97 (2021)
Huang, X.L., Cheng, S., Cao, K., et al.: A survey of deployment solutions and optimization strategies for hybrid SDN networks. IEEE Commun. Surv. Tutor. 21(2), 1483–1507 (2019)
Nencioni, G., Garroppo, R.G., Gonzalez, A.J., et al.: Orchestration and control in software-defined 5Gnetworks: research challenges. Wirel. Commun. Mob. Comput. 2018, 1–18 (2018)
Ziegler, V., Viswanathan, H., Flinck, H., et al.: 6Garchitecture to connect the worlds. IEEE Access 8, 173508–173520 (2020)
Wang, T., Wang, S.W., Zhou, Z.H.: Machine learning for5G and beyond: From model-based to data-driven mobile wireless networks. China Commun. 16(1), 165–175 (2019)
Blinowski, G.: Security of visible light communication systems—a survey. Phys. Commun. 34, 246–260 (2019)
Samuel, N., Diskin, T., Wiesel, A.: Deep MIMO detection. In: 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 3–6 July 2017, pp. 1–5. IEEE, Sapporo (2017)
Afolabi, I., Taleb, T., Samdanis, K., et al.: Network slicing and softwarization: a survey on principles, enabling technologies, and solutions. IEEE Commun. Surv. Tutor. 20(3), 2429–2453 (2018)
Ma, X., Gao, J.N., Yang, F., et al.: Integrated power line and visible light communication system compatible with multi-service transmission. IET Commun. 11(1), 104–111 (2017)
You, X.H., Wang, C.X., Huang, J., et al.: Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts. Sci. China Inf. Sci. 64(1), 1–74 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Li, X., Ling, C., Xu, Z. (2023). 6G Network Security Technology Based on Artificial Intelligence. In: Li, A., Shi, Y., Xi, L. (eds) 6GN for Future Wireless Networks. 6GN 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 505. Springer, Cham. https://doi.org/10.1007/978-3-031-36014-5_26
Download citation
DOI: https://doi.org/10.1007/978-3-031-36014-5_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-36013-8
Online ISBN: 978-3-031-36014-5
eBook Packages: Computer ScienceComputer Science (R0)