{"id":"https://openalex.org/W3206160551","doi":"https://doi.org/10.1109/mcomstd.011.2000065","title":"Toward 6G Security: Technology Trends, Threats, and Solutions","display_name":"Toward 6G Security: Technology Trends, Threats, and Solutions","publication_year":2021,"publication_date":"2021-09-01","ids":{"openalex":"https://openalex.org/W3206160551","doi":"https://doi.org/10.1109/mcomstd.011.2000065","mag":"3206160551"},"language":"en","primary_location":{"id":"doi:10.1109/mcomstd.011.2000065","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcomstd.011.2000065","pdf_url":null,"source":{"id":"https://openalex.org/S4210170334","display_name":"IEEE Communications Standards Magazine","issn_l":"2471-2825","issn":["2471-2825","2471-2833"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Standards Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042957233","display_name":"Dong-Hyun Je","orcid":null},"institutions":[{"id":"https://openalex.org/I2250650973","display_name":"Samsung (South Korea)","ror":"https://ror.org/04w3jy968","country_code":"KR","type":"company","lineage":["https://openalex.org/I2250650973"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"DongHyun Je","raw_affiliation_strings":["Samsung Electronics"],"affiliations":[{"raw_affiliation_string":"Samsung Electronics","institution_ids":["https://openalex.org/I2250650973"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004407964","display_name":"Jungsoo Jung","orcid":null},"institutions":[{"id":"https://openalex.org/I2250650973","display_name":"Samsung (South Korea)","ror":"https://ror.org/04w3jy968","country_code":"KR","type":"company","lineage":["https://openalex.org/I2250650973"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jungsoo Jung","raw_affiliation_strings":["Samsung Electronics"],"affiliations":[{"raw_affiliation_string":"Samsung Electronics","institution_ids":["https://openalex.org/I2250650973"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047706011","display_name":"Sunghyun Choi","orcid":"https://orcid.org/0000-0003-0279-445X"},"institutions":[{"id":"https://openalex.org/I2250650973","display_name":"Samsung (South Korea)","ror":"https://ror.org/04w3jy968","country_code":"KR","type":"company","lineage":["https://openalex.org/I2250650973"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sunghyun Choi","raw_affiliation_strings":["Samsung Electronics"],"affiliations":[{"raw_affiliation_string":"Samsung Electronics","institution_ids":["https://openalex.org/I2250650973"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5042957233"],"corresponding_institution_ids":["https://openalex.org/I2250650973"],"apc_list":null,"apc_paid":null,"fwci":6.8035,"has_fulltext":false,"cited_by_count":42,"citation_normalized_percentile":{"value":0.97841505,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"5","issue":"3","first_page":"64","last_page":"71"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6721944808959961},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.667992115020752},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5795693397521973},{"id":"https://openalex.org/keywords/network-virtualization","display_name":"Network virtualization","score":0.5042189359664917},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.44110727310180664},{"id":"https://openalex.org/keywords/openness-to-experience","display_name":"Openness to experience","score":0.4355366826057434},{"id":"https://openalex.org/keywords/containerization","display_name":"Containerization","score":0.4217420816421509},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.20602378249168396}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6721944808959961},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.667992115020752},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5795693397521973},{"id":"https://openalex.org/C2779898492","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Network virtualization","level":4,"score":0.5042189359664917},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.44110727310180664},{"id":"https://openalex.org/C84976871","wikidata":"https://www.wikidata.org/wiki/Q2015673","display_name":"Openness to experience","level":2,"score":0.4355366826057434},{"id":"https://openalex.org/C2779821363","wikidata":"https://www.wikidata.org/wiki/Q428072","display_name":"Containerization","level":3,"score":0.4217420816421509},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.20602378249168396},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mcomstd.011.2000065","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcomstd.011.2000065","pdf_url":null,"source":{"id":"https://openalex.org/S4210170334","display_name":"IEEE Communications Standards Magazine","issn_l":"2471-2825","issn":["2471-2825","2471-2833"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Standards Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W2005430048","https://openalex.org/W2539572905","https://openalex.org/W2895879715","https://openalex.org/W2919682937","https://openalex.org/W2963207607","https://openalex.org/W2969695741","https://openalex.org/W2981096252","https://openalex.org/W3011852199","https://openalex.org/W3091056778","https://openalex.org/W3110989801","https://openalex.org/W6600428322","https://openalex.org/W6760047977","https://openalex.org/W6787466503"],"related_works":["https://openalex.org/W4206663896","https://openalex.org/W2589534713","https://openalex.org/W3215732957","https://openalex.org/W2461440407","https://openalex.org/W4385366942","https://openalex.org/W2317094215","https://openalex.org/W3038066677","https://openalex.org/W2947277503","https://openalex.org/W112648010","https://openalex.org/W2038957884"],"abstract_inverted_index":{"Toward":[0],"6G,":[1],"we":[2,123],"are":[3,30],"witnessing":[4],"various":[5],"technology":[6,78],"trends":[7,29],"including":[8],"network":[9,18,40,67],"openness":[10,38],"and":[11,23,25,42,92,100,136],"open":[12,47],"source":[13,48],"SW-based":[14],"mobile":[15,118],"communication":[16],"systems,":[17],"AI,":[19],"privacy":[20,87],"protection,":[21],"virtualization":[22,91],"containerization,":[24],"quantum":[26,103],"computing.":[27],"These":[28],"expected":[31,106],"to":[32,61,68,85,107,140],"bring":[33],"new":[34,97,127,134],"security":[35,110],"threats.":[36,143],"The":[37],"of":[39,46,90,102,111,133],"architecture":[41],"the":[43,51,55,83,109,131],"wide":[44],"adoption":[45],"may":[49,59],"increase":[50],"attack":[52,98],"surface":[53],"in":[54,79,116],"system.":[56],"An":[57],"attacker":[58],"attempt":[60],"fool":[62],"AI-based":[63],"radio":[64],"access":[65],"network/core":[66],"cause":[69],"malfunction":[70],"using":[71],"adversarial":[72],"machine":[73],"learning":[74],"(AML)":[75],"techniques.":[76],"Personalization":[77],"6G":[80],"also":[81,94],"opens":[82],"door":[84],"fine-grained":[86],"invasion.":[88],"Adoption":[89],"containerization":[93],"introduces":[95],"a":[96],"path,":[99],"introduction":[101,132],"computing":[104],"is":[105],"affect":[108],"existing":[112],"cryptographic":[113],"algorithms":[114],"used":[115],"today's":[117],"networks.":[119],"In":[120],"this":[121],"article,":[122],"analyze":[124],"these":[125,142],"potential":[126],"threats":[128],"caused":[129],"by":[130],"technologies":[135],"present":[137],"possible":[138],"mitigation":[139],"address":[141]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":5}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
