2022
DOI: 10.3390/app12073551
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-based Multifactor Authentication for Future 6G Cellular Networks: A Systematic Review

Abstract: There are continued advances in the internet and communication fields regarding the deployment of 5G-based applications. It is expected that by 2030, 6G applications will emerge as a continued evolution of the mobile network. Blockchain technology is one of the leading supporting technologies predicted to provide a secure and unique network to 6G-enabled devices, transactions, and applications. It is anticipated that the 6G mobile networks will be virtualized, have cloud-based systems, and aim to be the founda… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 96 publications
0
6
0
Order By: Relevance
“…At this time, many security techniques, such as firewalls, authentication systems, various encryption methods, and various antiviruses, are utilized in order to shield sensitive data from the possibility of being compromised by a security breach. 10,[43][44][45] The network was protected from DoS attacks by Shoeb and Chithralekha 46 using a trust-based method. For each new packet, an IP-based trust value was applied based on the packet's communication history.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…At this time, many security techniques, such as firewalls, authentication systems, various encryption methods, and various antiviruses, are utilized in order to shield sensitive data from the possibility of being compromised by a security breach. 10,[43][44][45] The network was protected from DoS attacks by Shoeb and Chithralekha 46 using a trust-based method. For each new packet, an IP-based trust value was applied based on the packet's communication history.…”
Section: Related Workmentioning
confidence: 99%
“…Each procedure will separately and jointly generate a solution based on different attributes, all of which will be used to identify and react to the messages. At this time, many security techniques, such as firewalls, authentication systems, various encryption methods, and various antiviruses, are utilized in order to shield sensitive data from the possibility of being compromised by a security breach 10,43–45 …”
Section: Related Workmentioning
confidence: 99%
“…There is prior discussion and research on 6G with regard to security issues, specifically proposing multifactor authentication for 6G or utilizing blockchain technologies to assist in mitigating several communication attacks. We have conducted an extensive systematic literature review on security issues with regard to 6G addressing security mechanisms for cell-free environments [7], [8]. Besides our works, other researchers also contribute to addressing security concerns in 6G networks [9], [10], [11].…”
Section: Introductionmentioning
confidence: 99%
“…It contains many IoT devices (called Things) that have limited storage, computation, and communication capabilities and are embedded with various types of sensors and actuators to gather and share sensitive information over the conventional Internet 2 . The IoT market is predicted to generate massive revenue over the next decade, starting with 2 billion U.S. dollars in 2020 to grow to 8.131 trillion U.S. dollars by 2030 3 . This prediction attracts stakeholders, such as suppliers, vendors, corporations, manufacturers, etc., to invest in such ground‐breaking technology 1,4 …”
Section: Introductionmentioning
confidence: 99%
“…2 The IoT market is predicted to generate massive revenue over the next decade, starting with 2 billion U.S. dollars in 2020 to grow to 8.131 trillion U.S. dollars by 2030. 3 This prediction attracts stakeholders, such as suppliers, vendors, corporations, manufacturers, etc., to invest in such ground-breaking technology. 1,4 In an IoT network, a massive amount of critical and sensitive data is captured by the IoT devices and then exchanged over the internet with other IoT devices or cloud data centers for storage and processing purposes.…”
Section: Introductionmentioning
confidence: 99%