Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions.
Syed Hussain Ali KazmiRosilah HassanFaizan QamarKashif NisarAg Asri Ag IbrahimPublished in: Symmetry (2023)
Keyphrases
- countermeasures
- information security
- security measures
- security requirements
- cyber attacks
- security mechanisms
- user authentication
- security issues
- java card
- security breaches
- smart card
- network security
- security analysis
- resource constrained
- computer security
- intrusion detection
- secure communication
- information systems
- power analysis
- security threats
- communication systems
- fuzzy vault
- smart grid
- information warfare
- authentication protocol
- critical infrastructure
- security systems
- information sharing
- data security
- cyber security
- e government
- knowledge discovery
- sql injection
- data mining techniques
- data mining
- security services
- security management
- security protocols
- sensitive data