Information and Communications Technology and Policy

Information and Communications Technology and Policy

Information and Communications Technology and Policy ›› 2025, Vol. 51 ›› Issue (1): 52-55.doi: 10.12267/j.issn.2096-5931.2025.01.008

Previous Articles     Next Articles

Discussion on 6G security requirements and key technologies

LU Dan, CUI Ying, HE Yizhou, HAN Wenting   

  1. Security Research Institute, China Academy of Information and Communications Technology, Beijing 100191, China
  • Received:2024-07-01 Online:2025-01-25 Published:2025-02-14

Abstract:

Currently, global 6G research is in a highly active period, and all parties are continuously promoting 6G security work. This article firstly reviews the international standardization of 6G security and the progress about key technologies of 6G security. Then, starting from the typical application scenarios of 6G released by the International Telecommunication Union, the security requirements of 6G networks are analyzed. Finally, based on the security requirements of 6G, the key technologies that need to be studied in 6G security are discussed, and the future development and research directions of 6G security are proposed.

Key words: 6G security, post-quantum cryptography algorithm, privacy protection technology

CLC Number: