Ensuring Security in the Age of Intelligent Connectivity: Strategic Insights for 6G Networks

Authors

  • Charlotte Roberts Junior Research Fellow, Australian Graduate School of Engineering (AGSE), UNSW, Sydney, Australia
  • Sridhar Reddy Yerram Technology Engineer, PNC Financial Services, 620, Liberty Ave, Pittsburg, PA-15222, USA

DOI:

https://doi.org/10.18034/ei.v11i1.705

Keywords:

Security, Intelligent Connectivity, 6G Networks, Cybersecurity, Network Protection, Data Privacy, Threat Mitigation

Abstract

The emergence of intelligent connection and 6G networks promises opportunities for advancement and creativity but poses serious cybersecurity risks. This paper offers tactical perspectives on protecting 6G networks in the face of intelligent connectivity's intricacies. The primary goals are to recognize new threats, evaluate strategic approaches to cyber resilience, investigate security solution innovations, and look at global cooperation and regulatory frameworks. The study's methodology involves synthesizing existing literature and scholarly works through secondary data analysis. Key conclusions highlight the changing nature of the threat landscape, the significance of cyber resilience, innovation's role in security solutions, and the need for robust regulatory frameworks and international cooperation. The consequences of policy highlight the necessity of adaptable regulatory frameworks, resource allocation for cybersecurity, and ongoing threat landscape modification. This research provides insightful information to help stakeholders in academia, business, and government negotiate the difficulties of maintaining security in the era of intelligent connection and 6G networks.

Downloads

Download data is not yet available.

References

Ahmadi, H., Arji, G., Shahmoradi, L., Safdari, R., Nilashi, M. (2019). The Application of Internet of Things in Healthcare: A Systematic Literature Review and Classification. Universal Access in the Information Society, 18(4), 837-869. https://doi.org/10.1007/s10209-018-0618-4 DOI: https://doi.org/10.1007/s10209-018-0618-4

Ahmed, R., Matin, M. A. (2020). Towards 6G Wireless Networks-challenges and Potential Technologies. Journal of Electrical Engineering, 71(4), 290-297. https://doi.org/10.2478/jee-2020-0040 DOI: https://doi.org/10.2478/jee-2020-0040

Alquhayz, H., Alalwan, N., Alzahrani, A. I., Al-Bayatti, A. H., Sharif, M. S. (2019). Policy-Based Security Management System for 5G Heterogeneous Networks. Wireless Communications & Mobile Computing (Online), 2019. https://doi.org/10.1155/2019/4582391 DOI: https://doi.org/10.1155/2019/4582391

Ande, J. R. P. K., & Khair, M. A. (2019). High-Performance VLSI Architectures for Artificial Intelligence and Machine Learning Applications. International Journal of Reciprocal Symmetry and Theoretical Physics, 6, 20-30. https://upright.pub/index.php/ijrstp/article/view/121

Bentz, W., Hoang, T., Bayasgalan, E., Panagou, D. (2018). Complete 3-D Dynamic Coverage in Energy-constrained Multi-UAV Sensor Networks. Autonomous Robots, 42(4), 825-851. https://doi.org/10.1007/s10514-017-9661-x DOI: https://doi.org/10.1007/s10514-017-9661-x

Carrascal, D., Rojas, E., Alvarez-Horcajo, J., Lopez-Pajares, D., Martínez-Yelmo, I. (2020). Analysis of P4 and XDP for IoT Programmability in 6G and Beyond. IoT, 1(2), 605. https://doi.org/10.3390/iot1020031 DOI: https://doi.org/10.3390/iot1020031

Chen, T-l., Chung, Y-f., Lin, F. Y. S. (2012). Deployment of Secure Mobile Agents for Medical Information Systems. Journal of Medical Systems, 36(4), 2493-503. https://doi.org/10.1007/s10916-011-9716-z DOI: https://doi.org/10.1007/s10916-011-9716-z

Choi, B-G., Jeong, E., Sang-Woo, K. (2019). Multiple Security Certification System between Blockchain Based Terminal and Internet of Things Device: Implication for Open Innovation. Journal of Open Innovation: Technology, Market, and Complexity, 5(4), 87. https://doi.org/10.3390/joitmc5040087 DOI: https://doi.org/10.3390/joitmc5040087

Deming, C., Khair, M. A., Mallipeddi, S. R., & Varghese, A. (2021). Software Testing in the Era of AI: Leveraging Machine Learning and Automation for Efficient Quality Assurance. Asian Journal of Applied Science and Engineering, 10(1), 66–76. https://doi.org/10.18034/ajase.v10i1.88 DOI: https://doi.org/10.18034/ajase.v10i1.88

Fadziso, T., Yerram, S. R., Mallipeddi, S. R. (2022). Analyzing the Progression from Digital Production to Digital Society: Industry 4.0 to Industry 5.0 Transition Evaluation. Journal of Fareast International University, 5(1), 11-22.

Khair, M. A. (2018). Security-Centric Software Development: Integrating Secure Coding Practices into the Software Development Lifecycle. Technology & Management Review, 3, 12-26. https://upright.pub/index.php/tmr/article/view/124

Khair, M. A., Ande, J. R. P. K., Goda, D. R., & Yerram, S. R. (2019). Secure VLSI Design: Countermeasures against Hardware Trojans and Side-Channel Attacks. Engineering International, 7(2), 147–160. https://doi.org/10.18034/ei.v7i2.699 DOI: https://doi.org/10.18034/ei.v7i2.699

Khair, M. A., Mahadasa, R., Tuli, F. A., & Ande, J. R. P. K. (2020). Beyond Human Judgment: Exploring the Impact of Artificial Intelligence on HR Decision-Making Efficiency and Fairness. Global Disclosure of Economics and Business, 9(2), 163-176. https://doi.org/10.18034/gdeb.v9i2.730 DOI: https://doi.org/10.18034/gdeb.v9i2.730

Khan, M. A., Jamali, M. M., Maksymyuk, T., Gazda, J. (2020). A Blockchain Token-Based Trading Model for Secondary Spectrum Markets in Future Generation Mobile Networks. Wireless Communications & Mobile Computing (Online), 2020. https://doi.org/10.1155/2020/7975393 DOI: https://doi.org/10.1155/2020/7975393

Lv, Z., Tang, J., Deng, W., Qiao, Z., Wen, H. (2020). Secure Data Communication for Wireless Mobile Edge Computing Based on Artificial Noise and Security Code. Journal of Physics: Conference Series, 1659(1). https://doi.org/10.1088/1742-6596/1659/1/012017 DOI: https://doi.org/10.1088/1742-6596/1659/1/012017

Maddula, S. S. (2018). The Impact of AI and Reciprocal Symmetry on Organizational Culture and Leadership in the Digital Economy. Engineering International, 6(2), 201–210. https://doi.org/10.18034/ei.v6i2.703 DOI: https://doi.org/10.18034/ei.v6i2.703

Maddula, S. S., Shajahan, M. A., & Sandu, A. K. (2019). From Data to Insights: Leveraging AI and Reciprocal Symmetry for Business Intelligence. Asian Journal of Applied Science and Engineering, 8(1), 73–84. https://doi.org/10.18034/ajase.v8i1.86 DOI: https://doi.org/10.18034/ajase.v8i1.86

Mahadasa, R., Ande, J. R. P. K., Varghese, A., & Khair, M. A. (2022). Application of High-Pressure Processing in Food Preservation: Impact on Microbial Safety and Nutritional Quality. Malaysian Journal of Medical and Biological Research, 9(2), 71-80. https://mjmbr.my/index.php/mjmbr/article/view/686

Mullangi, K. (2017). Enhancing Financial Performance through AI-driven Predictive Analytics and Reciprocal Symmetry. Asian Accounting and Auditing Advancement, 8(1), 57–66. https://4ajournal.com/article/view/89

Mullangi, K., Maddula, S. S., Shajahan, M. A., & Sandu, A. K. (2018). Artificial Intelligence, Reciprocal Symmetry, and Customer Relationship Management: A Paradigm Shift in Business. Asian Business Review, 8(3), 183–190. https://doi.org/10.18034/abr.v8i3.704 DOI: https://doi.org/10.18034/abr.v8i3.704

Nawaz, F., Ibrahim, J., Muhammad, A. A., Junaid, M., Kousar, S. (2020). A Review of Vision and Challenges of 6G Technology. International Journal of Advanced Computer Science and Applications, 11(2). https://doi.org/10.14569/IJACSA.2020.0110281 DOI: https://doi.org/10.14569/IJACSA.2020.0110281

Qamar, F., Siddiqui, M. U. A., Hindia, M. H. D. N., Hassan, R., Nguyen, Q. N. (2020). Issues, Challenges, and Research Trends in Spectrum Management: A Comprehensive Overview and New Vision for Designing 6G Networks. Electronics, 9(9), 1416. https://doi.org/10.3390/electronics9091416 DOI: https://doi.org/10.3390/electronics9091416

Sandu, A. K., Surarapu, P., Khair, M. A., & Mahadasa, R. (2018). Massive MIMO: Revolutionizing Wireless Communication through Massive Antenna Arrays and Beamforming. International Journal of Reciprocal Symmetry and Theoretical Physics, 5, 22-32. https://upright.pub/index.php/ijrstp/article/view/125

Shajahan, M. A. (2018). Fault Tolerance and Reliability in AUTOSAR Stack Development: Redundancy and Error Handling Strategies. Technology & Management Review, 3, 27-45. https://upright.pub/index.php/tmr/article/view/126

Sidi, B. E., Mrabet, H., Gharbi, H., Jemai, A., Trentesaux, D. (2020). A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0. Sustainability, 12(21), 9179. https://doi.org/10.3390/su12219179 DOI: https://doi.org/10.3390/su12219179

Varghese, A. (2022). AI-Driven Solutions for Energy Optimization and Environmental Conservation in Digital Business Environments. Asia Pacific Journal of Energy and Environment, 9(1), 49-60. https://doi.org/10.18034/apjee.v9i1.736 DOI: https://doi.org/10.18034/apjee.v9i1.736

Varghese, A., & Bhuiyan, M. T. I. (2020). Emerging Trends in Compressive Sensing for Efficient Signal Acquisition and Reconstruction. Technology & Management Review, 5, 28-44. https://upright.pub/index.php/tmr/article/view/119

Wang, S., Wu, J., Yang, W., Guo, L-h. (2018). Novel Architectures and Security Solutions of Programmable Software-defined Networking: A Comprehensive Survey. Frontiers of Information Technology & Electronic Engineering, 19(12), 1500-1521. https://doi.org/10.1631/FITEE.1800575 DOI: https://doi.org/10.1631/FITEE.1800575

Yerram, S. R. (2020). AI-Driven Inventory Management with Cryptocurrency Transactions. Asian Accounting and Auditing Advancement, 11(1), 71–86. https://4ajournal.com/article/view/86

Yerram, S. R. (2021). Driving the Shift to Sustainable Industry 5.0 with Green Manufacturing Innovations. Asia Pacific Journal of Energy and Environment, 8(2), 55-66. https://doi.org/10.18034/apjee.v8i2.733 DOI: https://doi.org/10.18034/apjee.v8i2.733

Yerram, S. R. (2022). Smart Contracts for Efficient Supplier Relationship Management in the Blockchain. American Journal of Trade and Policy, 9(3), 119–130. https://doi.org/10.18034/ajtp.v9i3.700 DOI: https://doi.org/10.18034/ajtp.v9i3.700

Yerram, S. R., & Varghese, A. (2018). Entrepreneurial Innovation and Export Diversification: Strategies for India’s Global Trade Expansion. American Journal of Trade and Policy, 5(3), 151–160. https://doi.org/10.18034/ajtp.v5i3.692

Yerram, S. R., & Varghese, A. (2018). Entrepreneurial Innovation and Export Diversification: Strategies for India’s Global Trade Expansion. American Journal of Trade and Policy, 5(3), 151–160. https://doi.org/10.18034/ajtp.v5i3.692 DOI: https://doi.org/10.18034/ajtp.v5i3.692

Yerram, S. R., Mallipeddi, S. R., Varghese, A., & Sandu, A. K. (2019). Human-Centered Software Development: Integrating User Experience (UX) Design and Agile Methodologies for Enhanced Product Quality. Asian Journal of Humanity, Art and Literature, 6(2), 203-218. https://doi.org/10.18034/ajhal.v6i2.732 DOI: https://doi.org/10.18034/ajhal.v6i2.732

Yrjölä, S., Ahokangas, P., Matinmikko-Blue, M. (2020). Sustainability as a Challenge and Driver for Novel Ecosystemic 6G Business Scenarios. Sustainability, 12(21), 8951. https://doi.org/10.3390/su12218951 DOI: https://doi.org/10.3390/su12218951

Zhang, L., Lin, G., Gao, B., Qin, Z., Tai, Y. (2020). Neural Model Stealing Attack to Smart Mobile Device on Intelligent Medical Platform. Wireless Communications & Mobile Computing (Online), 2020. https://doi.org/10.1155/2020/8859489 DOI: https://doi.org/10.1155/2020/8859489

Downloads

Published

2023-03-03

Issue

Section

Peer Reviewed Articles

How to Cite

Roberts, C., & Yerram, S. R. (2023). Ensuring Security in the Age of Intelligent Connectivity: Strategic Insights for 6G Networks. Engineering International, 11(1), 27-42. https://doi.org/10.18034/ei.v11i1.705

Similar Articles

1-10 of 59

You may also start an advanced similarity search for this article.