106G Systems in Secure Data Transmission
A.V.R. Mayuri*, Jyoti Chauhan, Abhinav Gadgil, Om Rajani and Soumya Rajadhyaksha
School of Computing Science and Engineering, VIT Bhopal University, Bhopal-Indore Highway, Kotrikalan, Sehore, Madhya Pradesh, India
Abstract
With the ever-growing increase in the technologies, the newer generation always has their eyes on the next level of every pre-existing technology that was ever made. Along with the improvement of 5G technologies, the industries and academia have commenced having their eyes on the 6th generation wireless network technology (6G), which is anticipated to have higher and numerous threat coping mechanisms. As the deployment of 5G networks have grown over the years, the number of limitations has also significantly increased. 6G networks are expected to have extended connectivity which the current generation might have not even thought of. The upcoming and cutting-edge technology together with post-quantum cryptography, artificial intelligence (AI), machine learning (ML), more advantageous edge computing, molecular communication, THz, visible light communication (VLC), and distributed ledger (DL) technology together with blockchain, is said to shape the spine of 6G networks. One critical element within the fulfillment of 6G can be security.
New novel authentication, encryption, get admission to control, communication, and malicious activity detection, new safety techniques are important to ensure trustworthiness and privacy ...
Get Wireless Communication in Cyber Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.