www.design-reuse-embedded.com
Find Top SoC Solutions
for AI, Automotive, IoT, Security, Audio & Video...

6G Cybersecurity Will Transform How We Deal with Cyberattacks

While 6G technology is still being defined by international standards bodies, research into ways to enhance cybersecurity in 6G has quickly become a priority.

eetasia.com, Nov. 29, 2022 – 

To realize the vision of 6G, researchers are developing novel approaches to spectrum regulation, antennas, machine learning, artificial intelligence, and digital twins all of which will require robust cybersecurity elements to enable their widespread adoption by industry, academia, and consumers.

According to a report by Accenture, cyberattacks targeting companies grew 31 percent from 2020 to 2021. Organizations that have seen successful breaches through their supply chains increased from 44 percent to 61 percent over the period, demonstrating that the threat of third-party risks has become an increasingly worrying reality.

This scenario is likely to become more common as countries deploy 5G worldwide. 5G is the first technology to enable critical applications [house care, smart cities], and services like ultra-reliable low latencies or machine-to-machine communications.

5G marks the beginning of a revolution in network security design. 6G will continue the network cybersecurity enhancement efforts begun with 5G. While 6G technology is still being defined by international standards bodies, research into ways to enhance cybersecurity in 6G has quickly become a priority, including research investigating ways to optimize cybersecurity in the internet of things (IoT), user data security, and ways to better leverage machine learning and artificial intelligence to train cybersecurity systems and algorithms.

click here to read more...

 Back

Partner with us

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2024 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse.