Research Article

A Blockchain-Enabled Trusted Protocol Based on Whole-Process User Behavior in 6G Network

Table 1

Analysis of related work.

Ref.YearSecurity requirement of trusted protocol in 6G networks
Trusted user identityTrusted access actionsTrusted communication trafficClosed-loop feedbackPrivacy protectionBehavior traceability

[16]2019
[17]2019
[18]2021
[19]2022
[20]2021
[21]2021
[22]2021
[23]2021
[25]2021
[26]2022
[27]2021
[28]2022
Ours2022