ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Edge Computing and Its Convergence with Blockchain in 6G: Security Challenges

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.10, No. 8)

Publication Date:

Authors : ;

Page : 8-14

Keywords : Quantum computing; Privacy; Physical Layer Security; ML/AI security; Security threats; Security; 6G;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Even though the wireless network of 5G has not been investigated exhaustively, the sixth generation (6G) echo systems' visionaries are already being debated. Therefore, to solidify and consolidate privacy and security within 6G networks, this paper examines edge computing and its convergence with blockchain in 6G: security challenges. Moreover, the paper examines how security might affect the wireless systems of the 6G, potential obstacles characterizing various 6G technologies, alongside possible remedies. This paper unveils the 6G security vision alongside key indicators of performance with tentative landscape threat premised upon predicted sixth generation infrastructure. Furthermore, a discussion of the privacy and security challenges that might emerge from the existing sixth generation applications and demands is presented. Additionally, the paper sheds light into the researchlevel projects and standardization efforts. Specific attention is accorded to discussion on the security consideration with 6G enhancing technologies, including quantum computing, visible light communication (VLC), distributed ML/AI, physical layer security, and distributed ledger technology (DLT). Overall, this paper seeks to guide the subsequent investigation of sixth generation privacy and security in the early stage of envisioning to practicality.

Last modified: 2021-08-17 17:15:57