Please login to be able to save your searches and receive alerts for new content matching your search criteria.
The prospect of information and communication technology (ICT) has given rise to widespread attention and in-depth research on 6G. It is estimated that 6G will not be implemented until 2030; it is currently at the research and foundation stage. Based on the development of the previous five generations, from 1G to 5G, 6G has the potential to provide customized services through a holographic and ubiquitous network. 6G’s achievement will need the support of various technologies. One important factor in the success of 6G will be security. Specifically, 6G’s key enabling technologies include terahertz, a very large scale antenna, a tactile Internet, etc. This study addresses the fundamental principles of 6G security, discusses major technologies related to 6G security, and presents several issues regarding 6G security. This paper will offer value to anyone who is paying attention to the security issues in 6G.
Since the commercialization of the 5G network, the number of research papers related to 6G IoT has increased rapidly due to researchers’ growing interest in next-generation technologies, 6G networks, and IoT technology. Due to the rapidly growing number of research papers in this area, it is difficult to grasp the overall research directions and topics. Therefore, this study has suggested a method of efficiently identifying the topics of 6G-related papers using data mining and presents the topics discovered through this technique. As a result, we extracted nine topics from 623 papers on 6G IoT using the LDA model technique, and we described the studies related to each topic.