<p><span>This book covers need for 6G connectivity arising from the pursuit of higher data speeds, ultra-low latency, massive IoT connectivity, enhanced spectral efficiency, and the facilitation of new and transformative applications. By addressing these drivers and expectations, 6G aims to revoluti
6G Connectivity-Systems, Technologies, and Applications: Digitalization of New Technologies, 6G and Evolutio (River Publishers Series in Communications and Networking)
β Scribed by Ramjee Prasad (editor), Dnyaneshwar Shriranglal Mantri (editor), Sunil Kumar Pandey (editor), Albena Dimitrova Mihovska (editor)
- Publisher
- River Publishers
- Year
- 2024
- Tongue
- English
- Leaves
- 294
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book covers need for 6G connectivity arising from the pursuit of higher data speeds, ultra-low latency, massive IoT connectivity, enhanced spectral efficiency, and the facilitation of new and transformative applications. By addressing these drivers and expectations, 6G aims to revolutionize wireless communication, opening up a realm of possibilities for industries, societies, and individuals.
Technological improvements and evolutions are required beyond fifth-generation (5G) networks for wireless communications as well as in the industry where the involvement of collaborative robots (COBOT) will satisfy the personal needs of human beings as and when required leading to humanβmachine interactions. A considerable amount of effort has been devoted, both in industry and academia, towards the performance modelling, evaluation and prediction of convergent multi-service heterogeneous, future-generation networks such as 6G.
Technical topics discussed in the book include:
- Network security and attacks
- 6G applications and Industry 5.0
- Human centric interface
- Green computing in wireless cellular networks
- Next generation networks (IOT, Cloud Computing, Big Data, etc.)
β¦ Table of Contents
Cover
Half Title
Series Page
Title Page
Copyright Page
Table of Contents
Preface
List of Figures
List of Tables
List of Contributors
List of Acronyms
Chapter 1: Intelligent Security for DDoS in HetIoT (6G Perspective)
1.1: Introduction
1.2: DDoS in HetIoT with 6G Perspective
1.3: State-of-the-art Work: Intelligent Security (IS)
1.3.1: ML-based technique
1.3.2: DL-based technique
1.3.3: RL-based technique
1.3.4: FL-based technique
1.4: Open Issues, Challenges, and Solution in IS (DDoS)
1.4.1: Heterogeneous network architecture
1.4.2: Intelligent edge computing
1.4.3: Smart federated learning
1.5: Conclusion
Chapter 2: Industry 5.0: and 6G: Human-centric Approach
2.1: Introduction
2.2: Related Work
2.3: Industrial Revolutions
2.3.1: Industry 1.0
2.3.2: Industry 2.0
2.3.3: Industry 3.0
2.3.4: Industry 4.0
2.3.5: Industry 5.0
2.4: Industry 5.0: Human-centric Approach β Components
2.5: Technology Enablers of Industry 5.0
2.6: Opportunities and Challenges in Industry 5.0
2.6.1: Opportunities of Industry 5.0
2.6.2: Challenges of Industry 5.0
2.7: Integration of Industry 5.0: and 6G Technology Enhancements
2.8: Conclusion
Chapter 3: Role of 6G, IoT with Integration of AI and ML and Security in Agriculture
3.1: Introduction
3.1.1: Introduction of IoT
3.1.2: Major components of IoT-based system
3.1.3: 6G and IoT System
3.2: Integration of AI (Artificial Intelligence) in IoT Systems
3.2.1: Role of AI in the Internet of Things
3.2.2: Role of AI in the realm of 6G communication
3.2.3: Machine learning uses in agriculture
3.2.4: Security concerns in transition from 5G to 6G
3.2.5: Applications of IoT with AI and ML
3.3: Smart Agriculture with 6G, AI, and ML
3.4: Future Scope
3.5: Conclusion
Chapter 4: Visible Light Communications for 6G: Motivation, Configurations and New Materials
4.1: Introduction
4.2: Visible Light Communications System
4.2.1: Transmitter
4.2.2: Optical channel
4.2.3: Receiver
4.3: User-centric Approach and Hybrid VLC/RF Networks
4.4: Visible Light Communications for 6G
4.4.1: The concept of MIMO applied to VLC
4.4.2: Angle diversity receivers
4.4.3: Reconfigurable photodetector
4.4.4: Variable receiving orientation angle devices
4.4.5: Intelligent reconfigurable surfaces
4.4.6: Impact of angle and lens diversity in MIMO-VLC
4.5: Conclusions
Chapter 5: Access Security in 6G: The 6G-ACE Protocol (A Concept Proposal)
5.1: Introduction and Background
5.1.1: Visions for 6G
5.1.2: Access security and identity confidentiality
5.1.3: Goals for a 6G authentication and context establishment protocol
5.2: Principal Entities and Trust Relationships
5.2.1: Principal entity types
5.2.2: Trust relationships
5.3: History Lessons
5.3.1: The 1G systems
5.3.2: The 2G systems
5.3.3: The 3G systems
5.3.4: The 4G system
5.3.5: The 5G system
5.3.6: The SUCI scheme
5.3.7: Softwareization of the SIM
5.3.8: The evolution
5.3.9: Mutual entity authentication and perfect forward secrecy
5.4: Requirements Analysis and Underlying Assumptions
5.4.1: Technology drivers for 6G
5.4.2: Post-quantum cryptography (PQC)
5.4.3: Architectural assumptions
5.4.4: History lesson impetus and requirements
5.4.5: Performance requirements
5.4.6: Authentication goals
5.5: High-level Aspects
5.5.1: Principal entities
5.5.2: Trust relationships
5.5.3: Subscriber privacy to be retained and extended
5.5.4: Anchor keys
5.5.5: Principal entity identifiers
5.5.6: Functional split between the ACE-SIM and the ME
5.6: The 6G-ACE Protocol Elements
5.6.1: Pre-existing credentials and information elements
5.6.2: Symbols, etc.
5.6.3: Cryptographic functions and IEs
5.6.4: Context expiry
5.6.5: Challenge-response IEs
5.6.6: The 6G-ACE context identifier
5.6.7: Anchor keys
5.6.8: Concerning the use of asymmetric cryptography
5.7: An Alice-Bob Outline of the 6G-ACE Protocol
5.7.1: The Alice-Bob outline
5.8: Brief Analysis of the 6G-ACE Protocol Proposal
5.8.1: High-level summary
5.8.2: Comparison with SUCI + 5G-AKA
5.8.3: Authentication properties
5.8.4: Round-trip performance
5.8.5: Adherence to the history lesson requirements
5.9: On the Completeness of the 6G-ACE Concept Proposal
5.9.1: Key derivations and key hierarchies
5.9.2: Error handling
5.9.3: Context mapping and backwards
5.9.4: Future work
5.9.5: Cryptographic safety and agility
5.10: Summary
5.11: Conclusion
Chapter 6: ICT Applications in Health Monitoring
6.1: Introduction
6.2: Mobile Health Solutions
6.3: Hardware Requir
6.4: Textile Integration
6.5: Future Diagnostics
6.6: Conclusion
Chapter 7: Key Issues in NOMA from the 6G Perspective
7.1: Introduction
7.2: Fundamentals of NOMA
7.3: NOMA Challenges
7.4: Imperfect SIC
7.5: Interference Issues
7.6: Imperfect CSI (Channel State Information)
7.7: Signature Design
7.8: Physical Layer Security Concerns
7.9: Power Allocation and User-Pairing
7.10: High Receiver Complexity
7.11: NOMA Integration with 6G Heterogeneous Networks
7.12: Conclusion
Chapter 8: Green Computing: Importance, Approaches, and Practices
8.1: Introduction
8.2: Evolution of Green Computing
8.3: Green Computing Techniques and Industry 2023
8.3.1: Monitor the usage of energy consumption
8.3.2: Substitution of more power-consuming devices with less than one
8.3.3: Usage of virtual servers
8.3.4: Green disposal
8.3.5: Natural cooling system
8.4: Green Computing Toward Economic Development
8.4.1: Nano data centers
8.4.2: Scaling of dynamic voltage frequency
8.4.3: Virtualization
8.4.4: Storage and management technology for big data
8.4.5: Data analysis and mining technology for energy consumption
8.5: Energy Optimization at Data Centers
8.5.1: Technologies and approaches used for energy optimization at data centers
8.5.2: Energy optimization for IT infrastructure
8.5.3: Implement efficient data storage techniques
8.5.4: Utilize built-in server power management features
8.5.5: Control airflow for effective cooling
8.6: Industry Standard for Green Computing
8.6.1: EPA Energy Star
8.6.2: RoHS
8.6.3: WE
8.6.4: SpecPower
8.7: Renewable Green Energy
8.7.1: Working of green renewable energy
8.7.2: Types of green renewable energy
8.7.3: Importance of green renewable energy
8.8: Research Contribution to Green Computing
8.9: Case Studies of Green Computing
8.10: Conclusion
Chapter 9: Artificial Intelligence and Green 6G Network-enabled Architectures, Scenarios, and Applications for Autonomous Connected Vehicles
9.1: Introduction
9.2: Overview of Autonomous Connected Vehicles
9.3: Emerging Technologies in Autonomous Connected Vehicles
9.4: AI and Green 6G Network-enabled Architectures
9.5: AI and Green 6G Network-enabled Scenarios
9.6: Applications
9.7: Open Source Tools for Autonomous Connected Vehicles
9.8: Advantages
9.9: Challenges
9.10: Case Studies of AI and Green 6G Network-enabled Architectures
9.11: Future Perspectives
9.12: Conclusion
Chapter 10: Latest Advances on Deterministic Wired/Wireless Industrial Networks
10.1: Introduction
10.2: Traffic Profiles and Converged Industrial Networks Use-Cases
10.3: Key Mechanisms for Wireless Time Sensitive Networking
10.4: Time Synchronization
10.4.1: TM- and TA-based synchronization
10.4.2: TSF-based synchronization
10.4.3: Fine time measurement
10.4.4: Comparison of wireless time synchronization mechanisms
10.4.5: FTM-based time synchronization in converged networks
10.5: Resource Management
10.5.1: Resource unit allocation
10.5.2: Multi-AP resource coordination
10.5.3: Setup phase
10.5.4: Resource negotiation phase
10.5.5: Coordinated data transmission
10.6: Traffic Shaping and Scheduling
10.6.1: Traffic identification
10.6.2: Traffic preemption
10.6.3: Traffic Isolation
10.6.4: Flexible, time-aware scheduling support
10.7: Ultra Reliability
10.8: Simulating Wired/Wireless TSN Networks: the ns-3: DetNetWiFi Framework
10.8.1: Main components
10.8.2: Timing model, clock per node
10.8.3: FTM-PTP time synchronization
10.8.4: TWT-based time aware scheduling framework
10.8.5: Multi-AP co-OFDMA probabilistic coordinated transmission
10.9: Summary and Future Work
Chapter 11: Cyber Threat Detection in 6G Wireless Network using Ensemble Majority-Voting Classifier
11.1: Introduction
11.2: Related Work
11.3: Research Methodology
11.3.1: Dataset
11.3.2: Data preprocessing
11.3.3: Ensemble majority-voting classifier
11.4: Results and Discussion
11.5: Conclusion
Chapter 12: From Connectivity to Intelligence: Integrating IoT-6G for the Future
12.1: Introduction
12.2: Features of Integrated 6G-IoT
12.3: Enabling 6G Technologies for IoT
12.3.1: Massive URLLC (ultra-reliable low-latency communication)
12.3.2: Terahertz communications
12.3.3: Blockchain
12.3.4: Edge Intelligence
12.3.5: Reconfigurable intelligence surface
12.4: IoT Applications for 6G
12.5: Benefits of Integrated 6G-IoT
12.6: Limitations of Integrated 6G-IoT
12.7: Research Scope and Challenges
12.8: Conclusion
Index
About the Editors
π SIMILAR VOLUMES
<p><span>The sixth generation of wireless communication (6G), succeeding 5G cellular technology, opens up several possibilities in terms of technology and its offered services. 6G is expected to allow usage of available higher frequency spectrums to cater to increased capacity, throughput, and low l
<p><span>This book begins with a historical overview of the evolution of mobile technologies and addresses two key questions: why do we need 6G? and what will 6G be? The remaining chapters of this book are organized into three parts: Part I covers the foundation of an end-to-end 6G system by present
<p><span>In todayβs connected world, the demand for mobile communications and instant access to information, anytime and anywhere, has drastically changed the electronics landscape, both consumer and industrial. Novel 5G and 6G systems will enable connectivity in all forms between humans, devices, m
This book covers different topics from 5G and 6G mobile technologies, including: telecommunication, antenna and bandwidth aspects of 5G, business solutions enabled by 5G technology, different application scenarios of 5G, and topics from the 6G technology. Section 1 focuses on telecommunication, ante
<p><span>This book highlights future research directions and latent solutions by integrating AI and Blockchain 6G networks, comprising computation efficiency, algorithms robustness, hardware development and energy management. This book brings together leading researchers in Academia and industry fro