Забезпечення інформаційного захисту в телекомунікаційних мережах 6G

Keywords: telecommunication network architecture, dynamic intellectual protection, reliability of information data transmission process, deep neural network, artificial intelligence system

Abstract

Autonomous information security, which will be one of the key functions of creating a reliable architecture of the 6G telecommunication network, is considered. Features of system and end-user protection against attacker attacks as they occur using the proposed network architecture and proactive approach are determined. By combining autonomous information security technologies with system architecture, the possibility of creating dynamic intelligent protection using machine learning and an artificial immune system is considered. Prospects for the wide spread of technologies based on artificial intelligence and machine learning for solving information security problems are considered. In particular, the detection of information security problems has been improved, recommendations have been offered to analysts, which will reduce the incident response time from hundreds of hours to seconds and increase the productivity of analysts from one or two incidents to thousands per day. The reliability of the information data transfer process is considered as a determining factor of information protection from the point of view of communication. The main scientific evidence to form a correct conclusion about whether a 6G telecommunications network is trustworthy is based on its functional parameters, which indicate the level of reliability expected from the implementation of 6G technologies. As a result, it is determined that the reliability of the 6G telecommunication network inherits the excellent functionality and best practices of the previous generation networks, and also takes into account various disciplines and social issues. The impact of deep neural network (DNN) reliability on the evaluation of artificial intelligence systems is investigated, taking into account that massive real-world data sets are used to train artificial intelligence, which can lead to data leakage, forgery, theft, and misuse due to lack of proper protection.

References

1. ITU-T, Draft Recommendation X.5Gsec-t, Security framework based on trust relationship for 5G ecosystem, 2019.
2. M. Balduccini, E. Griffor, M. Huth, C. Vishik, M. Burns, and D. Wollman, Ontology based reasoning about the trustworthiness of cyber-physical systems, IET Journal of IoT, June 2018.
3. M. Grieves, Digital twin: Manufacturing excellence through virtual factory replication, White paper, vol. 1, pp. 1–7, 2014.
4. M. J. Vermeer and E. D. Peet, Securing communications in the quantum computing age: Managing the risks to encryption, RAND Corporation, 2020.
5. Васильківський, М., Нікітович, Д., & Болдирева, О. (2022). Керування доступом до інформаційних даних в інтелектуальних інфокомунікаційних мережах. Measuring and computing devices in technological processes, (4), 5–17.

Abstract views: 0
PDF Downloads: 0
Published
2023-04-01
How to Cite
Vasylkivskyi , M., Budash , M., & Boldyreva , O. (2023). Забезпечення інформаційного захисту в телекомунікаційних мережах 6G. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (50), 142-150. https://doi.org/10.36910/6775-2524-0560-2023-50-22
Section
Telecommunications and radio engineering