2022
DOI: 10.32604/cmes.2022.021094
|View full text |Cite
|
Sign up to set email alerts
|

6G-Enabled Internet of Things: Vision, Techniques, and Open Issues

Abstract: There are changes in the development of wireless technology systems every decade. 6G (sixth generation) wireless networks improve on previous generations by increasing dependability, accelerating networks, increasing available bandwidth, decreasing latency, and increasing data transmission speed to standardize communication signals. The purpose of this article is to comprehend the current directions in 6G studies and their relationship to the Internet of Things (IoT). Also, this paper discusses the impacts of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 162 publications
0
6
0
Order By: Relevance
“…Blockchain technology may be used to address significant security flaws relating to data privacy breaches, cyberattacks, and access control for highly sophisticated information theft. 19,20 The issues raised motivated the writing of this article; therefore, we organized a systematic literature review (SLR) article to investigate the latest review and survey articles in terms of their aspects, contributions, findings, limitations, and strong points to address unsolved problems of Blockchain-based IoV (BIoV) networks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Blockchain technology may be used to address significant security flaws relating to data privacy breaches, cyberattacks, and access control for highly sophisticated information theft. 19,20 The issues raised motivated the writing of this article; therefore, we organized a systematic literature review (SLR) article to investigate the latest review and survey articles in terms of their aspects, contributions, findings, limitations, and strong points to address unsolved problems of Blockchain-based IoV (BIoV) networks.…”
Section: Introductionmentioning
confidence: 99%
“…Blockchain technology is therefore used to assure honesty and integrity among network users. Blockchain technology may be used to address significant security flaws relating to data privacy breaches, cyberattacks, and access control for highly sophisticated information theft 19,20 …”
Section: Introductionmentioning
confidence: 99%
“…Alternatively, social media may be considered a collection of web‐based tools that promote connectedness and social interactions. The development and sharing of user‐generated content have been encouraged by the widespread usage of modern software and cutting‐edge technology to access social media platforms online 1,6–8 …”
Section: Introductionmentioning
confidence: 99%
“…The development and sharing of user-generated content have been encouraged by the widespread usage of modern software and cutting-edge technology to access social media platforms online. 1,[6][7][8] Social media frameworks are currently considered to be one of the major global data producers. Big data is among the most important data generated by modern media.…”
mentioning
confidence: 99%
“…On the one hand, big data provides massive amounts of information in the training phase of ML, which improves the accuracy and applicability of model training. On the other hand, with the further development of 5G IoT technology, privacy and security have become critical points for the industry to consider [1]. FL [2] dramatically guarantees data privacy in the model training process [3] and provides an effective solution to the islanding effect in ML.…”
Section: Introductionmentioning
confidence: 99%