Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control l...Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential infrastructures.The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised.While full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and vulnerabilities.In particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control loops.Additionally,Denialof-Service attacks can be executed by inundating the network with valueless noise.Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models.Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow.Standard models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors transparently.This paper introduces a probabilistic trust model and control algorithm designed to address this gap.The model determines the probability of any node to be trustworthy.Communication channels are pruned for those nodes whose probability is below a given threshold.The trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and combined.Initially,anomalous nodes are identified using Gaussian mixture models and clustering technologies.Next,traffic patterns are studied using digital Bessel functions and the functional scalar product.Finally,the information coherence and content are analyzed.The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters.An experimental validation based on simulation tools and environments was carried out.Results show the proposed solution can successfully detect up to 92%of malicious data injection attacks.展开更多
The race to develop the next generation of wireless networks,known as Sixth Generation(6G)wireless,which will be operational in 2030,has already begun.To realize its full potential over the next decade,6G will undoubt...The race to develop the next generation of wireless networks,known as Sixth Generation(6G)wireless,which will be operational in 2030,has already begun.To realize its full potential over the next decade,6G will undoubtedly necessitate additional improvements that integrate existing solutions with cutting-edge ones.However,the studies about 6G are mainly limited and scattered,whereas no bibliometric study covers the 6G field.Thus,this study aims to review,examine,and summarize existing studies and research activities in 6G.This study has examined the Scopus database through a bibliometric analysis of more than 1,000 papers published between 2017 and 2021.Then,we applied the bibliometric analysis methods by including(1)document type,(2)subject area,(3)author,and(4)country of publication.The study’s results reflect the research 6G community’s trends,highlight important research challenges,and elucidate potential directions for future research in this interesting area.展开更多
In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with...In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with a constant power supply,transmits energy to charge the IoT devices on the ground,whereas UAV-B serves the IoT devices by data collection as a base station.In this framework,the system's energy efficiency is maximized,which we define as a ratio of the sum rate of IoT devices to the energy consumption of two UAVs during a fixed working duration.With the constraints of duration,transmit power,energy,and mobility,a difficult non-convex issue is presented by optimizing the trajectory,time duration allocation,and uplink transmit power of concurrently.To tackle the non-convex fractional optimization issue,we deconstruct it into three subproblems and we solve each of them iteratively using the descent method in conjunction with sequential convex approximation(SCA)approaches and the Dinkelbach algorithm.The simulation findings indicate that the suggested cooperative design has the potential to greatly increase the energy efficiency of the 6G intelligent UAV-assisted wireless powered IoT system when compared to previous benchmark systems.展开更多
Since around 1980,a new generation of wireless technology has arisen approximately every 10 years.First-generation(1G)and secondgeneration(2G)began with voice and eventually introduced more and more data in third-gene...Since around 1980,a new generation of wireless technology has arisen approximately every 10 years.First-generation(1G)and secondgeneration(2G)began with voice and eventually introduced more and more data in third-generation(3G)and became highly popular in the fourthgeneration(4G).To increase the data rate along with low latency and mass connectivity the fifth-generation(5G)networks are being installed from 2020.However,the 5G technology will not be able to fulfill the data demand at the end of this decade.Therefore,it is expected that 6G communication networks will rise,providing better services through the implementation of new enabling technologies and allowing users to connect everywhere.6G technology would not be confined to cellular communications networks,but would also comply with non-terrestrial communication system requirements,such as satellite communication.The ultimate objectives of this work are to address the major challenges of the evolution of cellular communication networks and to discourse the recent growth of the industry based on the key scopes of application and challenges.The main areas of research topics are summarized into(i)major 6G wireless networkmilestones;(ii)key performance indicators;(iii)future new applications;and(iv)potential fields of research,challenges,and open issues.展开更多
In recent years,the need for a fast,efficient and a reliable wireless network has increased dramatically.Numerous 5G networks have already been tested while a few are in the early stages of deployment.In noncooperativ...In recent years,the need for a fast,efficient and a reliable wireless network has increased dramatically.Numerous 5G networks have already been tested while a few are in the early stages of deployment.In noncooperative communication scenarios,the recognition of digital signal modulations assists people in identifying the communication targets and ensures an effective management over them.The recent advancements in both Machine Learning(ML)and Deep Learning(DL)models demand the development of effective modulation recognition models with self-learning capability.In this background,the current research article designs aDeep Learning enabled Intelligent Modulation Recognition of Communication Signal(DLIMR-CS)technique for next-generation networks.The aim of the proposed DLIMR-CS technique is to classify different kinds of digitally-modulated signals.In addition,the fractal feature extraction process is appliedwith the help of the Sevcik Fractal Dimension(SFD)approach.Then,the extracted features are fed into the Deep Variational Autoencoder(DVAE)model for the classification of the modulated signals.In order to improve the classification performance of the DVAE model,the Tunicate Swarm Algorithm(TSA)is used to finetune the hyperparameters involved in DVAE model.A wide range of simulations was conducted to establish the enhanced performance of the proposed DLIMR-CS model.The experimental outcomes confirmed the superior recognition rate of the DLIMR-CS model over recent state-of-the-art methods under different evaluation parameters.展开更多
The 5 th generation(5 G)mobile networks has been put into services across a number of markets,which aims at providing subscribers with high bit rates,low latency,high capacity,many new services and vertical applicatio...The 5 th generation(5 G)mobile networks has been put into services across a number of markets,which aims at providing subscribers with high bit rates,low latency,high capacity,many new services and vertical applications.Therefore the research and development on 6 G have been put on the agenda.Regarding demands and characteristics of future 6 G,artificial intelligence(A),big data(B)and cloud computing(C)will play indispensable roles in achieving the highest efficiency and the largest benefits.Interestingly,the initials of these three aspects remind us the significance of vitamin ABC to human body.In this article we specifically expound on the three elements of ABC and relationships in between.We analyze the basic characteristics of wireless big data(WBD)and the corresponding technical action in A and C,which are the high dimensional feature and spatial separation,the predictive ability,and the characteristics of knowledge.Based on the abilities of WBD,a new learning approach for wireless AI called knowledge+data-driven deep learning(KD-DL)method,and a layered computing architecture of mobile network integrating cloud/edge/terminal computing,is proposed,and their achievable efficiency is discussed.These progress will be conducive to the development of future 6 G.展开更多
6G IoT networks aim for providing significantly higher data rates and extremely lower latency.However,due to the increasingly scarce spectrum bands and ever-growing massive number IoT devices(IoDs)deployed,6G IoT netw...6G IoT networks aim for providing significantly higher data rates and extremely lower latency.However,due to the increasingly scarce spectrum bands and ever-growing massive number IoT devices(IoDs)deployed,6G IoT networks face two critical challenges,i.e.,energy limitation and severe signal attenuation.Simultaneous wireless information and power transfer(SWIPT)and cooperative relaying provide effective ways to address these two challenges.In this paper,we investigate the energy self-sustainability(ESS)of 6G IoT network and propose an OFDM based bidirectional multi-relay SWIPT strategy for 6G IoT networks.In the proposed strategy,the transmission process is equally divided into two phases.Specifically,in phase1 two source nodes transmit their signals to relay nodes which will then use different subcarrier sets to decode information and harvest energy,respectively.In phase2 relay nodes forward signals to corresponding destination nodes with the harvested energy.We maximize the weighted sum transmission rate by optimizing subcarriers and power allocation.Our proposed strategy achieves larger weighted sum transmission rate comparing with the benchmark scheme.展开更多
Intent-Based Networks(IBNs),which are originally proposed to introduce Artificial Intelligence(AI)into the sixth-generation(6G)wireless networks,can effectively solve the challenges of traditional networks in terms of...Intent-Based Networks(IBNs),which are originally proposed to introduce Artificial Intelligence(AI)into the sixth-generation(6G)wireless networks,can effectively solve the challenges of traditional networks in terms of efficiency,flexibility,and security.IBNs are mainly used to transform users’business intent into network configuration,operation,and maintenance strategies,which are prominent for designing the AI-enabled 6G networks.In particular,in order to meet the massive,intelligent service demands and overcome the time-varying radio propagation,IBNs can continuously learn and adapt to the time-varying network environment based on the massive collected network data in real-time.From the aspects of both the core network and radio access network,this article comprehensively surveys the architectures and key techniques of IBNs for 6G.In particular,the demonstration platforms of IBNs,such as the Apstra Operating System,Forward Networks Verification Platform,and One Convergence Service Interaction Platform,are presented.Moreover,the industrial development of IBNs is elaborated,including the emerging new products and startups to solve the problems of open data platforms,automated network operations,and preemptive network fault diagnosis.Finally,several open issues and challenges are identified as well to spur future researches.展开更多
Future networks communication scenarios by the 2030s will include notable applications are three-dimensional(3D)calls,haptics communications,unmanned mobility,tele-operated driving,bio-internet of things,and the Nanoi...Future networks communication scenarios by the 2030s will include notable applications are three-dimensional(3D)calls,haptics communications,unmanned mobility,tele-operated driving,bio-internet of things,and the Nanointernet of things.Unlike the current scenario in which megahertz bandwidth are sufficient to drive the audio and video components of user applications,the future networks of the 2030s will require bandwidths in several gigahertzes(GHz)(from tens of gigahertz to 1 terahertz[THz])to perform optimally.Based on the current radio frequency allocation chart,it is not possible to obtain such a wide contiguous radio spectrum below 90 GHz(0.09 THz).Interestingly,these contiguous blocks of radio spectrum are readily available in the higher electromagnetic spectrum,specifically in the Terahertz(THz)frequency band.The major contribution of this study is discussing the substantial issues and key features of THz waves,which include(i)key features and significance of THz frequency;(ii)recent regulatory;(iii)the most promising applications;and(iv)possible open research issues.These research topics were deeply investigated with the aim of providing a specific,synopsis,and encompassing conclusion.Thus,this article will be as a catalyst towards exploring new frontiers for future networks of the 2030s.展开更多
Non-orthogonal multiple access (NOMA), multiple-input multiple-output (MIMO) and mobile edge computing (MEC) are prominent technologies to meet high data rate demand in the sixth generation (6G) communication networks...Non-orthogonal multiple access (NOMA), multiple-input multiple-output (MIMO) and mobile edge computing (MEC) are prominent technologies to meet high data rate demand in the sixth generation (6G) communication networks. In this paper, we aim to minimize the transmission delay in the MIMO-MEC in order to improve the spectral efficiency, energy efficiency, and data rate of MEC offloading. Dinkelbach transform and generalized singular value decomposition (GSVD) method are used to solve the delay minimization problem. Analytical results are provided to evaluate the performance of the proposed Hybrid-NOMA-MIMO-MEC system. Simulation results reveal that the H-NOMA-MIMO-MEC system can achieve better delay performance and lower energy consumption compared to OMA.展开更多
Modern society has been widely benefiting from the advances in wireless technology. During the past decade, extensive research efforts have been dedicated to develop the fifth-generation (5G) wireless mobile networks....Modern society has been widely benefiting from the advances in wireless technology. During the past decade, extensive research efforts have been dedicated to develop the fifth-generation (5G) wireless mobile networks. This resulted in enabling technologies for the three generic connectivity types in 5G (broadband, massive Internet-of-things connectivity and ultra-reliable low latency communication) as well as their coexistence.展开更多
With the evolution of the sixth generation(6G)mobile communication technology,ample attention has gone to the integrated terrestrial-satellite networks.This paper notes that four typical application scenarios of integ...With the evolution of the sixth generation(6G)mobile communication technology,ample attention has gone to the integrated terrestrial-satellite networks.This paper notes that four typical application scenarios of integrated terrestrial-satellite networks are integrated into ultra dense satellite-enabled 6G networks architecture.Then the subchannel and power allocation schemes for the downlink of the ultra dense satellite-enabled 6G heterogeneous networks are introduced.Satellite mobile edge computing(SMEC)with edge caching in three-layer heterogeneous networks serves to reduce the link traffic of networks.Furthermore,a scheme for interference management is presented,involving quality-of-service(QoS)and co-tier/cross-tier interference constraints.The simulation results show that the proposed schemes can significantly increase the total capacity of ultra dense satellite-enabled 6G heterogeneous networks.展开更多
The Internet of Things(IoT)is the fourth technological revolution in the global information industry after computers,the Internet,and mobile communication networks.It combines radio-frequency identification devices,in...The Internet of Things(IoT)is the fourth technological revolution in the global information industry after computers,the Internet,and mobile communication networks.It combines radio-frequency identification devices,infrared sensors,global positioning systems,and various other technologies.Information sensing equipment is connected via the Internet,thus forming a vast network.When these physical devices are connected to the Internet,the user terminal can be extended and expanded to exchange information,communicate with anything,and carry out identification,positioning,tracking,monitoring,and triggering of corresponding events on each device in the network.In real life,the IoT has a wide range of applications,covering many fields,such as smart homes,smart logistics,fine agriculture and animal husbandry,national defense,and military.One of the most significant factors in wireless channels is interference,which degrades the system performance.Although the existing QR decomposition-based signal detection method is an emerging topic because of its low complexity,it does not solve the problem of poor detection performance.Therefore,this study proposes a maximumlikelihood-based QR decomposition algorithm.The main idea is to estimate the initial level of detection using the maximum likelihood principle,and then the other layer is detected using a reliable decision.The optimal candidate is selected from the feedback by deploying the candidate points in an unreliable scenario.Simulation results show that the proposed algorithm effectively reduces the interference and propagation error compared with the algorithms reported in the literature.展开更多
An“Intrusion Detection System”(IDS)is a security measure designed to perceive and be aware of unauthorized access or malicious activity on a computer system or network.Signature-based IDSs employ an attack signature...An“Intrusion Detection System”(IDS)is a security measure designed to perceive and be aware of unauthorized access or malicious activity on a computer system or network.Signature-based IDSs employ an attack signature database to identify intrusions.This indicates that the system can only identify known attacks and cannot identify brand-new or unidentified assaults.In Wireless 6G IoT networks,signature-based IDSs can be useful to detect a wide range of known attacks such as viruses,worms,and Trojans.However,these networks have specific requirements and constraints,such as the need for real-time detection and low-power operation.To meet these requirements,the IDS algorithm should be designed to be efficient in terms of resource usage and should include a mechanism for updating the attack signatures to keep up with evolving threats.This paper provides a solution for a signature-based intrusion detection system in wireless 6G IoT Networks,in which three different algorithms were used and implemented by using python and JavaScript programming languages and an accuracy of 98.9%is achieved.展开更多
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development...To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.展开更多
6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is...6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is leveraged to enhance computer vision applications’security,trustworthiness,and transparency.With the widespread use of mobile devices equipped with cameras,the ability to capture and recognize Chinese characters in natural scenes has become increasingly important.Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount,such as facial recognition or personal healthcare monitoring.Users can control their visual data and grant or revoke access as needed.Recognizing Chinese characters from images can provide convenience in various aspects of people’s lives.However,traditional Chinese character text recognition methods often need higher accuracy,leading to recognition failures or incorrect character identification.In contrast,computer vision technologies have significantly improved image recognition accuracy.This paper proposed a Secure end-to-end recognition system(SE2ERS)for Chinese characters in natural scenes based on convolutional neural networks(CNN)using 6G technology.The proposed SE2ERS model uses the Weighted Hyperbolic Curve Cryptograph(WHCC)of the secure data transmission in the 6G network with the blockchain model.The data transmission within the computer vision system,with a 6G gradient directional histogram(GDH),is employed for character estimation.With the deployment of WHCC and GDH in the constructed SE2ERS model,secure communication is achieved for the data transmission with the 6G network.The proposed SE2ERS compares the performance of traditional Chinese text recognition methods and data transmission environment with 6G communication.Experimental results demonstrate that SE2ERS achieves an average recognition accuracy of 88%for simple Chinese characters,compared to 81.2%with traditional methods.For complex Chinese characters,the average recognition accuracy improves to 84.4%with our system,compared to 72.8%with traditional methods.Additionally,deploying the WHCC model improves data security with the increased data encryption rate complexity of∼12&higher than the traditional techniques.展开更多
In this paper,ambient IoT is used as a typical use case of massive connections for the sixth generation(6G)mobile communications where we derive the performance requirements to facilitate the evaluation of technical s...In this paper,ambient IoT is used as a typical use case of massive connections for the sixth generation(6G)mobile communications where we derive the performance requirements to facilitate the evaluation of technical solutions.A rather complete design of unsourced multiple access is proposed in which two key parts:a compressed sensing module for active user detection,and a sparse interleaver-division multiple access(SIDMA)module are simulated side by side on a same platform at balanced signal to noise ratio(SNR)operating points.With a proper combination of compressed sensing matrix,a convolutional encoder,receiver algorithms,the simulated performance results appear superior to the state-of-the-art benchmark,yet with relatively less complicated processing.展开更多
With the 5th Generation(5G)Mobile network being rolled out gradually in 2019,the research for the next generation mobile network has been started and targeted for 2030.To pave the way for the development of the 6th Ge...With the 5th Generation(5G)Mobile network being rolled out gradually in 2019,the research for the next generation mobile network has been started and targeted for 2030.To pave the way for the development of the 6th Generation(6G)mobile network,the vision and requirements should be identified first for the potential key technology identification and comprehensive system design.This article first identifies the vision of the society development towards 2030 and the new application scenarios for mobile communication,and then the key performance requirements are derived from the service and application perspective.Taken into account the convergence of information technology,communication technology and big data technology,a logical mobile network architecture is proposed to resolve the lessons from 5G network design.To compromise among the cost,capability and flexibility of the network,the features of the 6G mobile network are proposed based on the latest progress and applications of the relevant fields,namely,on-demand fulfillment,lite network,soft network,native AI and native security.Ultimately,the intent of this article is to serve as a basis for stimulating more promising research on 6G.展开更多
As the fifth-generation(5G)mobile communication network may not meet the requirements of emerging technologies and applications,including ubiquitous coverage,industrial internet of things(IIoT),ubiquitous artificial i...As the fifth-generation(5G)mobile communication network may not meet the requirements of emerging technologies and applications,including ubiquitous coverage,industrial internet of things(IIoT),ubiquitous artificial intelligence(AI),digital twins(DT),etc.,this paper aims to explore a novel space-air-ground integrated network(SAGIN)architecture to support these new requirements for the sixth-generation(6G)mobile communication network in a flexible,low-latency and efficient manner.Specifically,we first review the evolution of the mobile communication network,followed by the application and technology requirements of 6G.Then the current 5G non-terrestrial network(NTN)architecture in supporting the new requirements is deeply analyzed.After that,we proposes a new flexible,low-latency and flat SAGIN architecture,and presents corresponding use cases.Finally,the future research directions are discussed.展开更多
基金funding by Comunidad de Madrid within the framework of the Multiannual Agreement with Universidad Politécnica de Madrid to encourage research by young doctors(PRINCE project).
文摘Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential infrastructures.The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised.While full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and vulnerabilities.In particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control loops.Additionally,Denialof-Service attacks can be executed by inundating the network with valueless noise.Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models.Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow.Standard models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors transparently.This paper introduces a probabilistic trust model and control algorithm designed to address this gap.The model determines the probability of any node to be trustworthy.Communication channels are pruned for those nodes whose probability is below a given threshold.The trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and combined.Initially,anomalous nodes are identified using Gaussian mixture models and clustering technologies.Next,traffic patterns are studied using digital Bessel functions and the functional scalar product.Finally,the information coherence and content are analyzed.The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters.An experimental validation based on simulation tools and environments was carried out.Results show the proposed solution can successfully detect up to 92%of malicious data injection attacks.
基金The authors received Universiti Malaysia Pahang Al-Sultan Abdullah(UMPSA)grant under Internal Research Grant with Grant Number PDU223209.Author received grant is:Ahmad Firdaus Website of the sponsor:https://www.ump.edu.my/en.
文摘The race to develop the next generation of wireless networks,known as Sixth Generation(6G)wireless,which will be operational in 2030,has already begun.To realize its full potential over the next decade,6G will undoubtedly necessitate additional improvements that integrate existing solutions with cutting-edge ones.However,the studies about 6G are mainly limited and scattered,whereas no bibliometric study covers the 6G field.Thus,this study aims to review,examine,and summarize existing studies and research activities in 6G.This study has examined the Scopus database through a bibliometric analysis of more than 1,000 papers published between 2017 and 2021.Then,we applied the bibliometric analysis methods by including(1)document type,(2)subject area,(3)author,and(4)country of publication.The study’s results reflect the research 6G community’s trends,highlight important research challenges,and elucidate potential directions for future research in this interesting area.
基金supported by the Natural Science Foundation of Beijing Municipality under Grant L192034。
文摘In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with a constant power supply,transmits energy to charge the IoT devices on the ground,whereas UAV-B serves the IoT devices by data collection as a base station.In this framework,the system's energy efficiency is maximized,which we define as a ratio of the sum rate of IoT devices to the energy consumption of two UAVs during a fixed working duration.With the constraints of duration,transmit power,energy,and mobility,a difficult non-convex issue is presented by optimizing the trajectory,time duration allocation,and uplink transmit power of concurrently.To tackle the non-convex fractional optimization issue,we deconstruct it into three subproblems and we solve each of them iteratively using the descent method in conjunction with sequential convex approximation(SCA)approaches and the Dinkelbach algorithm.The simulation findings indicate that the suggested cooperative design has the potential to greatly increase the energy efficiency of the 6G intelligent UAV-assisted wireless powered IoT system when compared to previous benchmark systems.
基金This research was supported by the National Research Foundation(NRF),Korea(2019R1C1C1007277)funded by the Ministry of Science and ICT(MSIT),Korea.
文摘Since around 1980,a new generation of wireless technology has arisen approximately every 10 years.First-generation(1G)and secondgeneration(2G)began with voice and eventually introduced more and more data in third-generation(3G)and became highly popular in the fourthgeneration(4G).To increase the data rate along with low latency and mass connectivity the fifth-generation(5G)networks are being installed from 2020.However,the 5G technology will not be able to fulfill the data demand at the end of this decade.Therefore,it is expected that 6G communication networks will rise,providing better services through the implementation of new enabling technologies and allowing users to connect everywhere.6G technology would not be confined to cellular communications networks,but would also comply with non-terrestrial communication system requirements,such as satellite communication.The ultimate objectives of this work are to address the major challenges of the evolution of cellular communication networks and to discourse the recent growth of the industry based on the key scopes of application and challenges.The main areas of research topics are summarized into(i)major 6G wireless networkmilestones;(ii)key performance indicators;(iii)future new applications;and(iv)potential fields of research,challenges,and open issues.
文摘In recent years,the need for a fast,efficient and a reliable wireless network has increased dramatically.Numerous 5G networks have already been tested while a few are in the early stages of deployment.In noncooperative communication scenarios,the recognition of digital signal modulations assists people in identifying the communication targets and ensures an effective management over them.The recent advancements in both Machine Learning(ML)and Deep Learning(DL)models demand the development of effective modulation recognition models with self-learning capability.In this background,the current research article designs aDeep Learning enabled Intelligent Modulation Recognition of Communication Signal(DLIMR-CS)technique for next-generation networks.The aim of the proposed DLIMR-CS technique is to classify different kinds of digitally-modulated signals.In addition,the fractal feature extraction process is appliedwith the help of the Sevcik Fractal Dimension(SFD)approach.Then,the extracted features are fed into the Deep Variational Autoencoder(DVAE)model for the classification of the modulated signals.In order to improve the classification performance of the DVAE model,the Tunicate Swarm Algorithm(TSA)is used to finetune the hyperparameters involved in DVAE model.A wide range of simulations was conducted to establish the enhanced performance of the proposed DLIMR-CS model.The experimental outcomes confirmed the superior recognition rate of the DLIMR-CS model over recent state-of-the-art methods under different evaluation parameters.
基金supported by Key Program of Natural Science Foundation of China(Grant No.61631018)Anhui Provincial Natural Science Foundation(Grant No.1908085MF177)Huawei Technology Innovative Research(YBN2018095087)。
文摘The 5 th generation(5 G)mobile networks has been put into services across a number of markets,which aims at providing subscribers with high bit rates,low latency,high capacity,many new services and vertical applications.Therefore the research and development on 6 G have been put on the agenda.Regarding demands and characteristics of future 6 G,artificial intelligence(A),big data(B)and cloud computing(C)will play indispensable roles in achieving the highest efficiency and the largest benefits.Interestingly,the initials of these three aspects remind us the significance of vitamin ABC to human body.In this article we specifically expound on the three elements of ABC and relationships in between.We analyze the basic characteristics of wireless big data(WBD)and the corresponding technical action in A and C,which are the high dimensional feature and spatial separation,the predictive ability,and the characteristics of knowledge.Based on the abilities of WBD,a new learning approach for wireless AI called knowledge+data-driven deep learning(KD-DL)method,and a layered computing architecture of mobile network integrating cloud/edge/terminal computing,is proposed,and their achievable efficiency is discussed.These progress will be conducive to the development of future 6 G.
基金This work was supported by China National Science Foundation under Grant No.61871348by University Key Laboratory of Advanced Wireless Communications of Guangdong Province,by the Project funded by China Postdoctoral Science Foundation under Grant 2019T120531+1 种基金by the Science and Technology Development Fund,Macao,China under Grant 0162/2019/A3by the Fundamental Research Funds for the Provincial Universities of Zhejiang under Grant RFA2019001.
文摘6G IoT networks aim for providing significantly higher data rates and extremely lower latency.However,due to the increasingly scarce spectrum bands and ever-growing massive number IoT devices(IoDs)deployed,6G IoT networks face two critical challenges,i.e.,energy limitation and severe signal attenuation.Simultaneous wireless information and power transfer(SWIPT)and cooperative relaying provide effective ways to address these two challenges.In this paper,we investigate the energy self-sustainability(ESS)of 6G IoT network and propose an OFDM based bidirectional multi-relay SWIPT strategy for 6G IoT networks.In the proposed strategy,the transmission process is equally divided into two phases.Specifically,in phase1 two source nodes transmit their signals to relay nodes which will then use different subcarrier sets to decode information and harvest energy,respectively.In phase2 relay nodes forward signals to corresponding destination nodes with the harvested energy.We maximize the weighted sum transmission rate by optimizing subcarriers and power allocation.Our proposed strategy achieves larger weighted sum transmission rate comparing with the benchmark scheme.
基金This work was supported in part by the State Major Science and Technology Special Project(Grant No.2018ZX03001002-004 and 2018ZX03001023)the National Natural Science Foundation of China under No.61921003,61925101,61831002,and 61901044+1 种基金the Beijing Natural Science Foundation under No.JQ18016and the National Program for Special Support of Eminent Professionals.
文摘Intent-Based Networks(IBNs),which are originally proposed to introduce Artificial Intelligence(AI)into the sixth-generation(6G)wireless networks,can effectively solve the challenges of traditional networks in terms of efficiency,flexibility,and security.IBNs are mainly used to transform users’business intent into network configuration,operation,and maintenance strategies,which are prominent for designing the AI-enabled 6G networks.In particular,in order to meet the massive,intelligent service demands and overcome the time-varying radio propagation,IBNs can continuously learn and adapt to the time-varying network environment based on the massive collected network data in real-time.From the aspects of both the core network and radio access network,this article comprehensively surveys the architectures and key techniques of IBNs for 6G.In particular,the demonstration platforms of IBNs,such as the Apstra Operating System,Forward Networks Verification Platform,and One Convergence Service Interaction Platform,are presented.Moreover,the industrial development of IBNs is elaborated,including the emerging new products and startups to solve the problems of open data platforms,automated network operations,and preemptive network fault diagnosis.Finally,several open issues and challenges are identified as well to spur future researches.
基金the Research Program through the National Research Foundation of Korea(NRF-2019R1A2C1005920).
文摘Future networks communication scenarios by the 2030s will include notable applications are three-dimensional(3D)calls,haptics communications,unmanned mobility,tele-operated driving,bio-internet of things,and the Nanointernet of things.Unlike the current scenario in which megahertz bandwidth are sufficient to drive the audio and video components of user applications,the future networks of the 2030s will require bandwidths in several gigahertzes(GHz)(from tens of gigahertz to 1 terahertz[THz])to perform optimally.Based on the current radio frequency allocation chart,it is not possible to obtain such a wide contiguous radio spectrum below 90 GHz(0.09 THz).Interestingly,these contiguous blocks of radio spectrum are readily available in the higher electromagnetic spectrum,specifically in the Terahertz(THz)frequency band.The major contribution of this study is discussing the substantial issues and key features of THz waves,which include(i)key features and significance of THz frequency;(ii)recent regulatory;(iii)the most promising applications;and(iv)possible open research issues.These research topics were deeply investigated with the aim of providing a specific,synopsis,and encompassing conclusion.Thus,this article will be as a catalyst towards exploring new frontiers for future networks of the 2030s.
基金supported by Republic of Turkey Ministry of National Education
文摘Non-orthogonal multiple access (NOMA), multiple-input multiple-output (MIMO) and mobile edge computing (MEC) are prominent technologies to meet high data rate demand in the sixth generation (6G) communication networks. In this paper, we aim to minimize the transmission delay in the MIMO-MEC in order to improve the spectral efficiency, energy efficiency, and data rate of MEC offloading. Dinkelbach transform and generalized singular value decomposition (GSVD) method are used to solve the delay minimization problem. Analytical results are provided to evaluate the performance of the proposed Hybrid-NOMA-MIMO-MEC system. Simulation results reveal that the H-NOMA-MIMO-MEC system can achieve better delay performance and lower energy consumption compared to OMA.
文摘Modern society has been widely benefiting from the advances in wireless technology. During the past decade, extensive research efforts have been dedicated to develop the fifth-generation (5G) wireless mobile networks. This resulted in enabling technologies for the three generic connectivity types in 5G (broadband, massive Internet-of-things connectivity and ultra-reliable low latency communication) as well as their coexistence.
基金supported in part by the National Key R&D Program of China(2020YFB1806103)the National Natural Science Foundation of China under Grant 62225103 and U22B2003+1 种基金Beijing Natural Science Foundation(L212004)China University Industry-University-Research Collaborative Innovation Fund(2021FNA05001).
文摘With the evolution of the sixth generation(6G)mobile communication technology,ample attention has gone to the integrated terrestrial-satellite networks.This paper notes that four typical application scenarios of integrated terrestrial-satellite networks are integrated into ultra dense satellite-enabled 6G networks architecture.Then the subchannel and power allocation schemes for the downlink of the ultra dense satellite-enabled 6G heterogeneous networks are introduced.Satellite mobile edge computing(SMEC)with edge caching in three-layer heterogeneous networks serves to reduce the link traffic of networks.Furthermore,a scheme for interference management is presented,involving quality-of-service(QoS)and co-tier/cross-tier interference constraints.The simulation results show that the proposed schemes can significantly increase the total capacity of ultra dense satellite-enabled 6G heterogeneous networks.
基金This study is supported by Fujitsu-Waseda Digital Annealer FWDA Research Project and Fujitsu Co-Creation Research Laboratory at Waseda University(Joint Research between Waseda University and Fujitsu Lab).The study was also partly supported by the School of Fundamental Science and Engineering,Faculty of Science and Engineering,Waseda University,Japan.This study was supported by the Institute for Information&Communications Technology Planning&Evaluation(IITP)Grant funded by the Korean government(MSIT)(No.2019-0-01343,Training Key Talents in Industrial Convergence Security)and Research Cluster Project,R20143,by the Zayed University Research Office.
文摘The Internet of Things(IoT)is the fourth technological revolution in the global information industry after computers,the Internet,and mobile communication networks.It combines radio-frequency identification devices,infrared sensors,global positioning systems,and various other technologies.Information sensing equipment is connected via the Internet,thus forming a vast network.When these physical devices are connected to the Internet,the user terminal can be extended and expanded to exchange information,communicate with anything,and carry out identification,positioning,tracking,monitoring,and triggering of corresponding events on each device in the network.In real life,the IoT has a wide range of applications,covering many fields,such as smart homes,smart logistics,fine agriculture and animal husbandry,national defense,and military.One of the most significant factors in wireless channels is interference,which degrades the system performance.Although the existing QR decomposition-based signal detection method is an emerging topic because of its low complexity,it does not solve the problem of poor detection performance.Therefore,this study proposes a maximumlikelihood-based QR decomposition algorithm.The main idea is to estimate the initial level of detection using the maximum likelihood principle,and then the other layer is detected using a reliable decision.The optimal candidate is selected from the feedback by deploying the candidate points in an unreliable scenario.Simulation results show that the proposed algorithm effectively reduces the interference and propagation error compared with the algorithms reported in the literature.
文摘An“Intrusion Detection System”(IDS)is a security measure designed to perceive and be aware of unauthorized access or malicious activity on a computer system or network.Signature-based IDSs employ an attack signature database to identify intrusions.This indicates that the system can only identify known attacks and cannot identify brand-new or unidentified assaults.In Wireless 6G IoT networks,signature-based IDSs can be useful to detect a wide range of known attacks such as viruses,worms,and Trojans.However,these networks have specific requirements and constraints,such as the need for real-time detection and low-power operation.To meet these requirements,the IDS algorithm should be designed to be efficient in terms of resource usage and should include a mechanism for updating the attack signatures to keep up with evolving threats.This paper provides a solution for a signature-based intrusion detection system in wireless 6G IoT Networks,in which three different algorithms were used and implemented by using python and JavaScript programming languages and an accuracy of 98.9%is achieved.
基金supported by the National Key R&D Program of China(Project Number:2022YFB2902100).
文摘To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.
基金supported by the Inner Mongolia Natural Science Fund Project(2019MS06013)Ordos Science and Technology Plan Project(2022YY041)Hunan Enterprise Science and Technology Commissioner Program(2021GK5042).
文摘6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is leveraged to enhance computer vision applications’security,trustworthiness,and transparency.With the widespread use of mobile devices equipped with cameras,the ability to capture and recognize Chinese characters in natural scenes has become increasingly important.Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount,such as facial recognition or personal healthcare monitoring.Users can control their visual data and grant or revoke access as needed.Recognizing Chinese characters from images can provide convenience in various aspects of people’s lives.However,traditional Chinese character text recognition methods often need higher accuracy,leading to recognition failures or incorrect character identification.In contrast,computer vision technologies have significantly improved image recognition accuracy.This paper proposed a Secure end-to-end recognition system(SE2ERS)for Chinese characters in natural scenes based on convolutional neural networks(CNN)using 6G technology.The proposed SE2ERS model uses the Weighted Hyperbolic Curve Cryptograph(WHCC)of the secure data transmission in the 6G network with the blockchain model.The data transmission within the computer vision system,with a 6G gradient directional histogram(GDH),is employed for character estimation.With the deployment of WHCC and GDH in the constructed SE2ERS model,secure communication is achieved for the data transmission with the 6G network.The proposed SE2ERS compares the performance of traditional Chinese text recognition methods and data transmission environment with 6G communication.Experimental results demonstrate that SE2ERS achieves an average recognition accuracy of 88%for simple Chinese characters,compared to 81.2%with traditional methods.For complex Chinese characters,the average recognition accuracy improves to 84.4%with our system,compared to 72.8%with traditional methods.Additionally,deploying the WHCC model improves data security with the increased data encryption rate complexity of∼12&higher than the traditional techniques.
文摘In this paper,ambient IoT is used as a typical use case of massive connections for the sixth generation(6G)mobile communications where we derive the performance requirements to facilitate the evaluation of technical solutions.A rather complete design of unsourced multiple access is proposed in which two key parts:a compressed sensing module for active user detection,and a sparse interleaver-division multiple access(SIDMA)module are simulated side by side on a same platform at balanced signal to noise ratio(SNR)operating points.With a proper combination of compressed sensing matrix,a convolutional encoder,receiver algorithms,the simulated performance results appear superior to the state-of-the-art benchmark,yet with relatively less complicated processing.
文摘With the 5th Generation(5G)Mobile network being rolled out gradually in 2019,the research for the next generation mobile network has been started and targeted for 2030.To pave the way for the development of the 6th Generation(6G)mobile network,the vision and requirements should be identified first for the potential key technology identification and comprehensive system design.This article first identifies the vision of the society development towards 2030 and the new application scenarios for mobile communication,and then the key performance requirements are derived from the service and application perspective.Taken into account the convergence of information technology,communication technology and big data technology,a logical mobile network architecture is proposed to resolve the lessons from 5G network design.To compromise among the cost,capability and flexibility of the network,the features of the 6G mobile network are proposed based on the latest progress and applications of the relevant fields,namely,on-demand fulfillment,lite network,soft network,native AI and native security.Ultimately,the intent of this article is to serve as a basis for stimulating more promising research on 6G.
基金supported in part by the National Key Research and Development Program under grant number 2020YFB1806800the Beijing Natural Science Foundation under grant number L212003the National Natural Science Foundation of China(NSFC)under grant numbers 62171010 and 61827901.
文摘As the fifth-generation(5G)mobile communication network may not meet the requirements of emerging technologies and applications,including ubiquitous coverage,industrial internet of things(IIoT),ubiquitous artificial intelligence(AI),digital twins(DT),etc.,this paper aims to explore a novel space-air-ground integrated network(SAGIN)architecture to support these new requirements for the sixth-generation(6G)mobile communication network in a flexible,low-latency and efficient manner.Specifically,we first review the evolution of the mobile communication network,followed by the application and technology requirements of 6G.Then the current 5G non-terrestrial network(NTN)architecture in supporting the new requirements is deeply analyzed.After that,we proposes a new flexible,low-latency and flat SAGIN architecture,and presents corresponding use cases.Finally,the future research directions are discussed.