Research Article

A Blockchain-Enabled Trusted Protocol Based on Whole-Process User Behavior in 6G Network

Table 2

User behavior grouping table.

Identity authentication stageAccess control stageTraffic detection stage

Number of usersNormal auth. request100Normal acc. ctrl. request50Normal traffic25
Abnormal traffic5
10
10
Abnormal acc. ctrl. request10
15
25
Abnormal auth. request50
50