CLC number:
On-line Access: 2022-07-05
Received: 2022-02-18
Revision Accepted: 2022-06-14
Crosschecked: 0000-00-00
Cited: 0
Clicked: 38
Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN,Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG. Discussion on a new paradigm of endogenous security towards 6G networks[J]. Frontiers of Information Technology & Electronic Engineering, 1998, -1(-1): .
@article{title="Discussion on a new paradigm of endogenous security towards 6G networks",
author="Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN,Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="-1",
number="-1",
pages="",
year="1998",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2200060"
}
%0 Journal Article
%T Discussion on a new paradigm of endogenous security towards 6G networks
%A Xinsheng JI
%A Jiangxing WU
%A Liang JIN
%A Kaizhi HUANG
%A Yajun CHEN
%A Xiaoli SUN
%A Wei YOU
%A Shumin HUO
%A Jing YANG
%J Journal of Zhejiang University SCIENCE C
%V -1
%N -1
%P
%@ 2095-9184
%D 1998
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2200060
TY - JOUR
T1 - Discussion on a new paradigm of endogenous security towards 6G networks
A1 - Xinsheng JI
A1 - Jiangxing WU
A1 - Liang JIN
A1 - Kaizhi HUANG
A1 - Yajun CHEN
A1 - Xiaoli SUN
A1 - Wei YOU
A1 - Shumin HUO
A1 - Jing YANG
J0 - Journal of Zhejiang University Science C
VL - -1
IS - -1
SP -
EP -
%@ 2095-9184
Y1 - 1998
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2200060
Abstract: The sixth generation of mobile communication (6G) networks will face more complex endogenous security problems, and it is urgent to propose new universal security theories and establish new practice norms to deal with the "unknown unknown" security threats in cyberspace. This paper first expounds the new paradigm of cyberspace endogenous security and introduces the vision of 6G cyberspace security. Then, it analyzes the security problems faced by a 6G core network, a wireless access network, and the emerging associated technology in detail, as well as the corresponding security technology development status and the integrated development of endogenous security and traditional security; furthermore, this paper describes the relevant security theory and technical concept under the guidance of the new paradigm of endogenous security.
Open peer comments: Debate/Discuss/Question/Opinion
<1>