Research Article
Blockchain Empowered Federated Learning for Distributed Network Security Behaviour Knowledge Base in 6G
Table 1
Comparison with related works.
| Ref. | Year | Security requirements of 6G network | Access authentication | Access control | Privacy protection | Trusted device | Safe life-cycle | Loop feedback |
| [22] | 2020 | × | × | √ | √ | × | × | [23] | 2020 | × | × | √ | √ | × | × | [24] | 2021 | × | × | √ | × | × | × | [25] | 2021 | √ | × | √ | × | × | × | [26] | 2021 | × | √ | √ | √ | × | × | [27] | 2021 | × | × | √ | × | × | × | [28] | 2021 | × | × | × | √ | √ | × | Ours | 2022 | √ | √ | √ | √ | √ | √ |
|
|