Skip to:Content
|
Bottom
Cover image for 6G-enabled technologies for next generation : fundamentals, applications, analysis and challenges
Title:
6G-enabled technologies for next generation : fundamentals, applications, analysis and challenges
Author:
Tyagi, Amit Kumar, 1988- author.
ISBN:
9781394258345

9781394258352

9781394258369
Physical Description:
1 online resource (xxvii, 428 pages) : illustrations (chiefly color)
Contents:
About the Authors xxiii -- Preface xxv -- Acknowledgments xxvii -- 1 6G-Enabled Technologies: An Introduction 1 -- 1.1 Introduction to 6G-Enabled Technologies 1 -- 1.1.1 Key Features and Advancements 1 -- 1.1.2 Challenges and Issues 2 -- 1.2 Evolution of Wireless Communication Systems 2 -- 1.3 Motivation for 6G Technology 4 -- 1.4 Literature Review 6 -- 1.5 Key Features and Objectives of 6G in Modern Era 8 -- 1.6 Advantages vs Disadvantages of 6G 10 -- 1.6.1 Advantages of 6G 10 -- 1.6.2 Disadvantages of 6G 12 -- 1.7 Open Issues and Important Challenges Toward 6G-Enabled Technologies 12 -- 1.8 Future Research Opportunities Toward 6G-Enabled Technologies in Near Future 14 -- 1.9 An Open Discussion for 6G-Enabled Technologies-Based Modern Society 15 -- 1.10 Summary 17 -- References 17 -- 2 Fundamentals of 6G Networks 21 -- 2.1 Introduction to 6G Networks 21 -- 2.2 Literature Review 21 -- 2.3 Terahertz (THz) Communication in 6G Networks 24 -- 2.4 Massive MIMO and Beamforming in 6G Networks 25 -- 2.5 Quantum Communication in 6G Networks 26 -- 2.6 Artificial Intelligence in 6G 27 -- 2.7 Spectrum Issues and Bandwidth Management in 6G Networks 29 -- 2.8 Massive MIMO and Beamforming Techniques in 6G Networks 30 -- 2.9 Ultra-Dense Networks and Small Cell Deployments in 6G Networks 31 -- 2.10 Open Issues and Challenges Toward 6G Networks 32 -- 2.11 Future Research Opportunities Toward 6G Networks 34 -- 2.12 Summary 36 -- References 36 -- 3 Next-Generation Air Interfaces for 6G 39 -- 3.1 Introduction to Next-Generation Air Interfaces for 6G 39 -- 3.2 Literature Review 41 -- 3.3 Spectrum and Air Interface for 6G 43 -- 3.3.1 Air Interface Design Issue 44 -- 3.4 Waveform Design and Modulation Schemes for 6G 45 -- 3.4.1 Challenges in 6G Waveform Design 46 -- 3.4.2 Evolution of Modulation Schemes 46 -- 3.5 Multiple Access Techniques for 6G Networks 47 -- 3.5.1 Challenges in 6G Multiple Access 47 -- 3.5.2 Evolution of Multiple Access Techniques 48 -- 3.6 Advanced Coding and Error Correction Schemes for 6G 48 -- 3.6.1 Challenges in 6G Communication 49 -- 3.6.2 Innovations in Coding and Error Correction 49 -- 3.7 Spectrum Challenges and Opportunities for 6G 50 -- 3.7.1 Spectrum Challenges for 6G 50 -- 3.7.2 Opportunities in Spectrum for 6G 50 -- 3.8 THz Band Communication for 6G 51 -- 3.8.1 Opportunities of THz Band Communication for 6G 51 -- 3.8.2 Challenges and Innovations in THz Band Communication 52 -- 3.9 Advanced Modulation Schemes for 6G 52 -- 3.9.1 Challenges in 6G Modulation 53 -- 3.10 Open Issues and Challenges Toward 6G 54 -- 3.10.1 Technological Challenges 54 -- 3.10.2 Security and Privacy Challenges 55 -- 3.10.3 Socioeconomic Issue 55 -- 3.11 Future Research Opportunities for 6G Network-Based Environment 56 -- 3.11.1 Technological Advancements 56 -- 3.11.2 Societal Implications 56 -- 3.11.3 Economic and Industry Perspectives 57 -- 3.12 Summary 57 -- References 58 -- 4 Enabling Technologies for 6G-Based Advanced Applications 61 -- 4.1 Introduction to Enabling Technologies and Their Role with 6G 61 -- 4.1.1 Enabling Technologies of the Future 61 -- 4.1.2 Role of 6G 63 -- 4.1.3 Evolution of 1G to 6G 63 -- 4.1.3.1 1G (First Generation) 64 -- 4.1.3.2 2G (Second Generation) 64 -- 4.1.3.3 3G (Third Generation) 64 -- 4.1.3.4 4G (Fourth Generation) 64 -- 4.1.3.5 5G (Fifth Generation) 65 -- 4.1.3.6 6G (Sixth Generation) 65 -- 4.2 Literature Review 65 -- 4.3 Artificial Intelligence and Machine Learning in 6G 68 -- 4.3.1 Data Analytics and AI in 6G 70 -- 4.3.2 Internet of Things (IoT) and Sensor Networks in 6G 72 -- 4.3.3 Mobile Cloud Computing in 6G 73 -- 4.3.4 Cloud, Edge, and Mist Computing in 6G 74 -- 4.3.4.1 Cloud Computing 74 -- 4.3.4.2 Edge Computing 75 -- 4.3.4.3 Mist Computing 75 -- 4.3.4.4 Integration of Cloud, Edge, and Mist Computing 76 -- 4.3.5 Spatial Computing in 6G 76 -- 4.3.6 Dew Computing in 6G 78 -- 4.3.7 Quantum Communications and Computing in 6G 80 -- 4.3.7.1 Quantum-Secured Communication 80 -- 4.3.7.2 Quantum Networking 80 -- 4.3.7.3 Quantum-Secured IoT 80 -- 4.3.7.4 Quantum-Computing Acceleration 80 -- 4.3.7.5 Quantum ml 81 -- 4.3.7.6 Quantum-Secured Edge Computing 81 -- 4.4 Blockchain and Security in 6G Networks 81 -- 4.4.1 Decentralized Identity Management 81 -- 4.4.2 Secure Authentication and Access Control 82 -- 4.4.3 Immutable Audit Trails and Forensics 82 -- 4.4.4 Secure Data Exchange and Sharing 82 -- 4.4.5 Resilient and Scalable Security Infrastructure 82 -- 4.4.6 Tokenization and Micropayments 82 -- 4.5 Photonic and Optical Technologies in 6G 83 -- 4.5.1 Terahertz Communication 83 -- 4.5.2 Optical Wireless Communication 84 -- 4.5.3 Integrated Photonics 84 -- 4.5.4 Optical Fiber Networks 84 -- 4.5.5 Optical Sensors and Sensing Networks 85 -- 4.6 Wireless Power Transfer and Energy Harvesting in 6G 85 -- 4.6.1 Wpt 85 -- 4.6.2 Energy Harvesting 86 -- 4.6.3 Harvesting Ambient RF Energy 86 -- 4.6.4 Integrated Power Management and Energy-Aware Networking 86 -- 4.6.5 Self-Powered IoT Networks 87 -- 4.7 Issues and Challenges Toward Implementing Emerging Technologies in 6G 87 -- 4.8 Future Research Opportunities Toward Implementing Emerging Technologies in 6G 88 -- 4.9 Summary 90 -- References 90 -- 5 Security and Privacy in 6G Networks 95 -- 5.1 Introduction to Security and Privacy 95 -- 5.1.1 Defining Security and Privacy 95 -- 5.1.2 The Interplay Between Security and Privacy 96 -- 5.1.3 Challenges in Ensuring Security and Privacy 96 -- 5.1.4 The Need for a Holistic Approach 97 -- 5.2 Types, Features, and Importance of Security and Privacy 97 -- 5.2.1 Types of Security and Privacy 97 -- 5.2.2 Features of Security and Privacy 98 -- 5.2.3 Importance of Security and Privacy 99 -- 5.3 Literature Review 99 -- 5.4 Quantum-Safe Encryption for 6G 101 -- 5.4.1 Principles of Quantum-Safe Encryption 101 -- 5.4.2 Importance of Quantum-Safe Encryption for 6G 102 -- 5.5 Privacy-Preserving Technologies for 6G 102 -- 5.5.1 Key Privacy-Preserving Technologies 103 -- 5.5.2 Challenges and Future Directions 104 -- 5.6 Threats and Vulnerabilities in 6G Networks 104 -- 5.6.1 Key Threats and Vulnerabilities 105 -- 5.6.2 Mitigation Strategies 106 -- 5.7 Authentication and Access Control Mechanisms for 6G 106 -- 5.7.1 Challenges and Requirements 107 -- 5.7.2 Authentication Mechanisms 107 -- 5.7.3 Access Control Mechanisms 107 -- 5.8 Issues and Challenges Toward Maintaining Security and Privacy in 6G 108 -- 5.8.1 Mitigation Strategies 109 -- 5.9 Future Research Opportunities for Improving Security and Privacy in 6G 110 -- 5.9.1 Future Research Opportunities 110 -- 5.10 Summary 111 -- References 111 -- 6 Applications and Use Cases of 6G Technology 115 -- 6.1 Introduction to 6G Technology Applications 115 -- 6.2 Literature Review 117 -- 6.3 IoT-Based Smart Cities and Smart Environment - In General 119 -- 6.4 Smart Cities and Urban Connectivity Using 6G 121 -- 6.5 Telemedicine and Healthcare - In General 123 -- 6.6 Modern Healthcare Services with 6G 125 -- 6.7 Autonomous Vehicles - In General 126 -- 6.8 Autonomous Vehicles and Transportation Systems in 6G Networks 128 -- 6.9 Virtual and Augmented Reality in 6G Networks 131 -- 6.10 Other Applications with 6G Technology in Next Decade 133 -- 6.11 Technical, Nontechnical Issues and Challenges Toward 6G-Based Applications 134 -- 6.11.1 Technical Issues 134 -- 6.11.2 Nontechnical Issues 135 -- 6.12 Future Research Opportunities Toward 6G-Based Applications in Near Future 136 -- 6.13 Summary 137 -- References 138 -- 7 Network Architecture and Protocols for 6G 143 -- 7.1 Introduction to Network Architecture and Protocols for 6G 143 -- 7.2 Literature Review 145 -- 7.3 Hexa-Cell and Nano-Cell Networks for 6G 148 -- 7.3.1 Hexa-Cell Networks 148 -- 7.3.2 Nano-Cell Networks 148 -- 7.4 Cloud/Fog/Edge Computing in 6G 149 -- 7.4.1 Cloud Computing in 6G 149 -- 7.4.2 Fog Computing in 6G 150 -- 7.4.3 Edge Computing in 6G 151 -- 7.5 Satellite Integration via 6G in Near Future 152 -- 7.6 Network Slicing via 6G 153 -- 7.7 Network Slicing and Service Differentiation Using 5G and 6G 154 -- 7.8 Multi-Connectivity and Heterogeneous Networks in 6G Technology 156 -- 7.8.1 Multi-Connectivity 156 -- 7.8.2 Heterogeneous Networks (HetNets) 156 -- 7.8.3 Integration and Interoperability 157 -- 7.8.4 Dynamic Resource Allocation 157 -- 7.8.5 Use Cases and Applications 157 -- 7.9 QoS and Resource Management in 6G Networks 158 -- 7.9.1 Dynamic QoS Provisioning 158 -- 7.9.2 Network Slicing 158 -- 7.9.3 AI-Driven Resource Optimization 158

-- 7.9.4 Edge Computing and Caching 159 -- 7.9.5 Interoperability and Standards 159 -- 7.10 Technical, Nontechnical Issues and Challenges Toward 6G-Based Protocols and Networks 159 -- 7.10.1 Technical Challenge 159 -- 7.10.2 Nontechnical Challenges 160 -- 7.11 Future Research Opportunities Toward 6G-Based Protocols and Networks 161 -- 7.11.1 Spectrum Exploration and Utilization 162 -- 7.11.2 Ultralow Latency Communication 162 -- 7.11.3 Massive Connectivity and IoT 162 -- 7.11.4 AI-Driven Networking and Opt ...
Abstract:
"This book delves into the analytical methods used to study the performance of 6G technologies, covering simulation techniques, performance metrics, and predictive modelling. Introducing the core principles of 6G technology, the author discusses the advantages and disadvantages of the technology and explains how wireless communications have evolved, from 1G through to 6G, with current open issues explained. With cyber security being at the heart of all technologies, this book offers a separate chapter on how to monitor 6G-based systems and designing technologies to ensure privacy from potential hackers; this is addressed thoroughly in chapter fourteen's Security by design'. The other topic at the heart of technology, sustainability, is presented with a complete review of energy-efficient hardware and the different types of green communication technologies, an important topic for the modern day and more importantly, the future designing technologies. A plethora of case studies are included throughout and popular applications such as AI and IoT are applied to 6G technology."-- Provided by publisher.
Local Note:
John Wiley and Sons
Holds:
Copies:

Available:*

Library
Material Type
Item Barcode
Shelf Number
Status
Item Holds
Searching...
E-Book 599666-1001 TK5103.252 .T93 2025
Searching...

On Order

Go to:Top of Page