Research Article
A Blockchain-Enabled Trusted Protocol Based on Whole-Process User Behavior in 6G Network
Table 1
Analysis of related work.
| Ref. | Year | Security requirement of trusted protocol in 6G networks | Trusted user identity | Trusted access actions | Trusted communication traffic | Closed-loop feedback | Privacy protection | Behavior traceability |
| [16] | 2019 | ✓ | ✕ | ✕ | ✕ | ✓ | ✓ | [17] | 2019 | ✓ | ✕ | ✕ | ✕ | ✓ | ✓ | [18] | 2021 | ✓ | ✕ | ✕ | ✕ | ✓ | ✓ | [19] | 2022 | ✓ | ✓ | ✕ | ✕ | ✓ | ✓ | [20] | 2021 | ✕ | ✓ | ✕ | ✕ | ✓ | ✓ | [21] | 2021 | ✕ | ✓ | ✕ | ✕ | ✓ | ✓ | [22] | 2021 | ✓ | ✓ | ✕ | ✕ | ✓ | ✓ | [23] | 2021 | ✕ | ✓ | ✕ | ✕ | ✓ | ✓ | [25] | 2021 | ✕ | ✓ | ✓ | ✕ | ✓ | ✓ | [26] | 2022 | ✕ | ✕ | ✓ | ✕ | ✓ | ✓ | [27] | 2021 | ✕ | ✕ | ✓ | ✕ | ✓ | ✓ | [28] | 2022 | ✕ | ✕ | ✓ | ✕ | ✓ | ✓ | Ours | 2022 | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
|
|