DEVELOPMENT OF A MULTI-MODAL AI ALGORITHM FOR PROACTIVE AUTHENTICA-TION THREAT DETECTION IN 6G NETWORKS

Cargbo Daniel Bartolomeo
University of Sierra Leone, Freetown, Sierra Leone;
Moscow Technical University of Communications and Informatics, Moscow, Russia
danielsondaniels25@gmail.com

V. B. Kreyndelin
Moscow Technical University of Communications and Informatics, Moscow, Russia
Institute of Radio and Information Systems (IRIS), Vienna, Austria

DOI: 10.36724/2664-066X-2026-12-1-41-49

SYNCHROINFO JOURNAL. Volume 12, Number 1 (2026). P. 41-49.

Abstract

This research paper presents a comprehensive design and evaluation of a multi-modal artificial intelligence (AI) algorithm aimed at achieving proactive authentication threat detection in sixth-generation (6G) networks. The evolution of 6G networks introduces high data throughput, extremely low latency, and ubiquitous connectivity, creating complex security challenges. To mitigate these, the proposed algorithm leverages multiple modalities biometric, behavioral, contextual, and network data to construct an adaptive, self-learning authentication framework. The algorithm integrates deep neural networks (DNNs), graph-based modeling, and reinforcement learning (RL) to dynamically detect potential threats before breaches occur. Comprehensive simulations conducted in a virtual 6G environment demonstrate superior detection accuracy (98.2%) and reduced false-positive rates compared to existing methods. The results suggest that multi-modal AI represents a viable approach for predictive and intelligent security in 6G environment.

Keywords 6G networks, authentication, multi-modal AI, proactive security, intrusion detection, deep learning

References

[1] L. Zhang, Y. -C. Liang and D. Niyato, “6G Vi-sions: Mobile ultra-broadband, super internet-of-things, and artificial intelligence,” China Communications, vol. 16, no. 8, pp. 1-14, Aug. 2019, doi: 10.23919/JCC.2019.08.001.

[2] N. Omheni, H. Koubaa, F. Zarai, “Artificial In-telligence for 5G and 6G Networks: A Taxonomy-Based Survey of Applications, Trends, and Chal-lenges,” Technologies 2025, 13, 559. https://doi.org/10.3390/technologies13120559

[3] W. Saad, M. Bennis and M. Chen, “A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research Problems,” IEEE Network, vol. 34, no. 3, pp. 134-142, May/June 2020, doi: 10.1109/MNET.001.1900287.

[4] S. Wang et al., “Robotic Wireless Energy Trans-fer in Dynamic Environments: System Design and Experimental Validation,” IEEE Communications Magazine, vol. 60, no. 3, pp. 40-46, March 2022, doi: 10.1109/MCOM.001.2100738.

[5] M.G. Bakulin, T.B.K. Ben Rejeb, V.B. Kreindelin, et al. Mobile communications on the threshold of 6G. Moscow: Hotline – Telecom, 2024. 248 p.

[6] M.G. Bakulin, T.B.K. Ben Rejeb, V.B. Kreindelin et al. Non-orthogonal multiple access (NOMA) as a basis for 5G and 6G communication systems. Moscow: Hot Line – Telecom, 2024. 264 p.

[7] V. B. Kreindelin, V. A. Usachev, “LTE-Advanced Pro as a basis for new M2M scenarios,” T-Comm. 2017. Vol. 11, no. 3, pp. 28-32.

[8] A. O. Hashesh, S. Hashima, R. M. Zaki, M. M. Fouda, K. Hatano and A. S. T. Eldien, “AI-Enabled UAV Communications: Challenges and Future Directions,” IEEE Access, vol. 10, pp. 92048-92066, 2022, doi: 10.1109/ACCESS.2022.3202956.

[9] M. Li, S. He and H. Li, “Minimizing Mission Completion Time of UAVs by Jointly Optimizing the Flight and Data Collection Trajectory in UAV-Enabled WSNs,” IEEE Internet of Things Journal, vol. 9, no. 15, pp. 13498-13510, 1 Aug.1, 2022, doi: 10.1109/JIOT.2022.3142764.

[10] B. Narottama et al., “Quantum Deep Rein-forcement Learning for Digital Twin-Enabled 6G Networks and Semantic Communications: Considerations for Adoption and Security,” IEEE Transactions on Network Science and Engineering, vol. 13, pp. 2053-2076, 2026, doi: 10.1109/TNSE.2025.3609198.

[11] Dr. Deepak Tomar, “AI-powered security for 5G and 6G communication networks”, Int. J. Sci. Inno. Eng., vol. 2, no. 10, pp. 1292–1306, Oct. 2025, doi: 10.70849/IJSCI02102025142.

[12] H. Yan, X. Pang, S. Zhou, H. Fan, “Transformer-Based Intrusion Detection for Post-5G and 6G Telecommunication Networks Using Dynamic Semantic Embedding,” Future Internet, 2025, 17, 544. https://doi.org/10.3390/fi17120544

[13] Bui Duc Son, Trinh Van Chien, and Dong In Kim, “Trustworthy GenAI over 6G: Integrated Applications and Security Frameworks,” https://arxiv.org/html/2511.15206v1

[14] Helena Rifa-Pous, Victor Garcia-Font, Carlos Nunez-Gomez, Julian Salas, “Security, Trust and Privacy challenges in AI-driven 6G Networks,” https://arxiv.org/abs/2409.10337v1

[15] M. A. Rahman, L. Alqahtani, A. Albooq and A. Ainousah, “A Survey on Security and Privacy of Large Multimodal Deep Learning Models: Teaching and Learning Perspective,” 2024 21st Learning and Technology Conference (L&T), Jeddah, Saudi Arabia, 2024, pp. 13-18, doi: 10.1109/LT60077.2024.10469434.

[16] P. H. Basha, G. Prathyusha, D. N. Rao, V. Gopikrishna, P. Peddi, and V. Saritha, “AI-Driven Multi-Factor Authentication and Dynamic Trust Management for Securing Massive Machine Type Communication in 6G Networks,” Int J Intell Syst Appl Eng, vol. 12, no. 1s, pp. 361–374, Sep. 2023.

[17] S. Kumar, S. Bawankar, and S. Balraj, “Federated learning-based intrusion detection for 6 g-enabled internet of things in smart cities,” Archives for Technical Sciences, vol. 3, no. 34, pp. 215-225, Dec. 2025, doi: 10.70102/afts.2025.1834.215.

[18] V. B. Kreindelin, N. A. Legkov, “Protection of authentication data for websites and web applications,” Telecommunications and Information Technology. 2022. Vol. 9, no. 1, pp. 6-10.

[19] V. B. Kreindelin, A. D. Avidzba, “Wi-Fi protected access encryption,” Information Society Technologies: XI International Industry Scientific and Technical Conference: Proceedings, March 15-16, 2017. Moscow: Media Publisher, 2017. 294 p.

[20] M.G. Bakulin, T.B.C. Ben Rejeb, V.B.v Kreyndelin, D.Y. Pankratov, A.E. Smirnov, “Code domain NOMA in 3GPP specifications: 5G or 6G?,” T-Comm, vol. 16, no.1, pр. 4-14.