Information and Communications Technology and Policy ›› 2025, Vol. 51 ›› Issue (1): 52-55.doi: 10.12267/j.issn.2096-5931.2025.01.008
Previous Articles Next Articles
LU Dan, CUI Ying, HE Yizhou, HAN Wenting
Received:
Online:
Published:
Abstract:
Currently, global 6G research is in a highly active period, and all parties are continuously promoting 6G security work. This article firstly reviews the international standardization of 6G security and the progress about key technologies of 6G security. Then, starting from the typical application scenarios of 6G released by the International Telecommunication Union, the security requirements of 6G networks are analyzed. Finally, based on the security requirements of 6G, the key technologies that need to be studied in 6G security are discussed, and the future development and research directions of 6G security are proposed.
Key words: 6G security, post-quantum cryptography algorithm, privacy protection technology
CLC Number:
TN929
LU Dan, CUI Ying, HE Yizhou, HAN Wenting. Discussion on 6G security requirements and key technologies[J]. Information and Communications Technology and Policy, 2025, 51(1): 52-55.
Add to citation manager EndNote|Ris|BibTeX
http://ictp.caict.ac.cn/EN/10.12267/j.issn.2096-5931.2025.01.008