Research Article
A Blockchain-Enabled Trusted Protocol Based on Whole-Process User Behavior in 6G Network
Table 2
User behavior grouping table.
| | Identity authentication stage | Access control stage | Traffic detection stage |
| Number of users | Normal auth. request | 100 | Normal acc. ctrl. request | 50 | Normal traffic | 25 | Abnormal traffic | | 5 | | 10 | | 10 | Abnormal acc. ctrl. request | | 10 | — | — | — | | 15 | — | — | — | | 25 | — | — | — | Abnormal auth. request | | 50 | — | — | — | — | — | — | | 50 | — | — | — | — | — | — |
|
|