Skip to main content

6G Network Security Technology Based on Artificial Intelligence

  • Conference paper
  • First Online:
6GN for Future Wireless Networks (6GN 2022)

Abstract

In the future, human society will enter the era of intelligence, and 6G will also achieve cross integration with information technologies such as artificial intelligence (AI). 6G uses primitive artificial intelligence to continuously empower the whole society in the future and realize true universal intelligence. How to use 6G native AI to intelligently manage and control the future network resources and wireless resources, and how to use 6G network security technology are both hot research directions and key directions of future communication networks. Artificial intelligence technology has created new opportunities for innovation and business model driven by machine learning technology in 6G network. The end-to-end network automation of the future communication requires the system to actively discover dangers and threats, apply intelligent mitigation technology, and ensure the self sustainment of the 6G network. But in fact, the alliance between 6G and AI is also a double-edged sword. In most cases, AI technology can protect the security and privacy of the network, and may be used by criminals to violate information security and privacy. This paper analyzes the role of AI in 6G network security, analyzes the challenges that AI technology may encounter in 6G security, and proposes solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shu, J., Peng, C.: Analysis of China's network security technology landscape. Mod. Comput. (6), 68–73 (2021)

    Google Scholar 

  2. Sun, H.: Research on network security technology based on blockchain. Changjiang Inf. Commun. 35(1), 167–169 (2022)

    Google Scholar 

  3. Swim the river application of network security technology in computer maintenance. Sci. Technol. Innov. Appl. 12(13), 189–192 (2022)

    Google Scholar 

  4. Xu, S.: CTF competition based on network security technology. Radio Television Inf. (z1), 50–52 (2021)

    Google Scholar 

  5. Sheng, Y.: Research on computer network security technology based on network security maintenance. Wirel. Internet Technol. 18(20), 100–101 (2021)

    Google Scholar 

  6. Li, Y.: Research on network security technology of computer laboratory under big data technology. Shihezi Sci. Technol. (6), 21–22 (2021)

    Google Scholar 

  7. Yu, Y.: Research on network security technology of computer laboratory under cloud computing technology. Electron. Manuf. (2), 95–97 (2021)

    Google Scholar 

  8. Huang, X.L., Cheng, S., Cao, K., et al.: A survey of deployment solutions and optimization strategies for hybrid SDN networks. IEEE Commun. Surv. Tutor. 21(2), 1483–1507 (2019)

    Article  Google Scholar 

  9. Nencioni, G., Garroppo, R.G., Gonzalez, A.J., et al.: Orchestration and control in software-defined 5Gnetworks: research challenges. Wirel. Commun. Mob. Comput. 2018, 1–18 (2018)

    Article  Google Scholar 

  10. Ziegler, V., Viswanathan, H., Flinck, H., et al.: 6Garchitecture to connect the worlds. IEEE Access 8, 173508–173520 (2020)

    Article  Google Scholar 

  11. Wang, T., Wang, S.W., Zhou, Z.H.: Machine learning for5G and beyond: From model-based to data-driven mobile wireless networks. China Commun. 16(1), 165–175 (2019)

    Google Scholar 

  12. Blinowski, G.: Security of visible light communication systems—a survey. Phys. Commun. 34, 246–260 (2019)

    Article  Google Scholar 

  13. Samuel, N., Diskin, T., Wiesel, A.: Deep MIMO detection. In: 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 3–6 July 2017, pp. 1–5. IEEE, Sapporo (2017)

    Google Scholar 

  14. Afolabi, I., Taleb, T., Samdanis, K., et al.: Network slicing and softwarization: a survey on principles, enabling technologies, and solutions. IEEE Commun. Surv. Tutor. 20(3), 2429–2453 (2018)

    Article  Google Scholar 

  15. Ma, X., Gao, J.N., Yang, F., et al.: Integrated power line and visible light communication system compatible with multi-service transmission. IET Commun. 11(1), 104–111 (2017)

    Article  Google Scholar 

  16. You, X.H., Wang, C.X., Huang, J., et al.: Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts. Sci. China Inf. Sci. 64(1), 1–74 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinlu Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, X., Ling, C., Xu, Z. (2023). 6G Network Security Technology Based on Artificial Intelligence. In: Li, A., Shi, Y., Xi, L. (eds) 6GN for Future Wireless Networks. 6GN 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 505. Springer, Cham. https://doi.org/10.1007/978-3-031-36014-5_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-36014-5_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-36013-8

  • Online ISBN: 978-3-031-36014-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics