Abstract

The sixth generation (6G) of cellular transmission is extremely adaptable. 6G will equip everyone with pervasive wireless connectivity and meet the needs of a fully connected world. It is anticipated that revolutionary ideas will increase in support for a fast-expanding variety of smart devices and applications. The sophisticated characteristics of 5G portable cellular network infrastructures produce novel threats and requirements. Comparing 6G cellular network technologies to 5G cellular networks, this paper discusses various security and privacy issues in 6G cellular networks based numerous security services. Proposes AA approach to evaluate the effectiveness of the methodology. Propose a new 6G wireless security architecture based on the analysis of secret key authentication and flexible position based identification, which serves as the foundation for an examination of identity management and flexible authentication. Demonstrates the benefits of the proposed architecture, analyzes BER against SINR and Measure Throughput Against various SINR values. Finally, Limitations and future recommendation for 6G cellular network security is presented.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call