2020 2nd 6G Wireless Summit (6G SUMMIT) 2020
DOI: 10.1109/6gsummit49458.2020.9083794
|View full text |Cite
|
Sign up to set email alerts
|

Six Key Features of Machine Type Communication in 6G

Abstract: While 5G is being rolled out in different parts of the globe, few research groups around the world − such as the Finnish 6G Flagship program − have already started posing the question: What will 6G be? The 6G vision is a data-driven society, enabled by near instant unlimited wireless connectivity. Driven by impetus to provide vertical-specific wireless network solutions, machine type communication encompassing both its mission critical and massive connectivity aspects is foreseen to be an important cornerstone… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
134
0
3

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 187 publications
(137 citation statements)
references
References 17 publications
0
134
0
3
Order By: Relevance
“…However, the boosting wireless connections, the prosperity of various delay-sensitive traffics as well as limitations of end-devices in energy, processing capability, storage, and hardware in 6G require more efficient and low-cost solutions for the security and privacy. Lightweight and flexible solutions such as group-based authentication and anonymous service-oriented authentication strategies [414,415] will be the main research and development direction of the cryptography-based security and privacy.…”
Section: Possible Countermeasures To the Security And Privacy Issues mentioning
confidence: 99%
“…However, the boosting wireless connections, the prosperity of various delay-sensitive traffics as well as limitations of end-devices in energy, processing capability, storage, and hardware in 6G require more efficient and low-cost solutions for the security and privacy. Lightweight and flexible solutions such as group-based authentication and anonymous service-oriented authentication strategies [414,415] will be the main research and development direction of the cryptography-based security and privacy.…”
Section: Possible Countermeasures To the Security And Privacy Issues mentioning
confidence: 99%
“…It is foreseen from the features of 6G-enabled IoT communications [23]- [25] that, RA procedure is one of the most frequently used and energy consuming operations in devices. As the foremost step in RA procedure, an appropriate design and effective detection of RA preamble can remarkably enhance the success probability of first access, and is consequently conducive to reducing both the energy consumption and average access delay, so as to improve the access efficiency for massive IoT devices.…”
Section: B Contributionmentioning
confidence: 99%
“…Networking patterns of 6G networks are outlined in [22]- [24], in which cell-less architecture, decentralized resource allocation, and three-dimensional super-connectivity are highly expected to exist in 6G networks. MTCs and vertical-specific wireless network solutions for 6G are studied in [25], which believes that 6G would facilitate the first wall-breaking standard to completely replace existing industry-specific communication standards and provide a unified solution enabling seamless connectivity for all needs in vertical industries.…”
Section: Current Research Progress Towards 6gmentioning
confidence: 99%
“…3) Secure Ultra-Reliable Low-Latency Communications (SURLLC): The SURLLC in 6G is a joint upgrade of the URLLC and the mMTC in 5G, but with higher requirements of reliability (higher than 99.9999999%, i.e., 'Seven Sigma' from the viewpoints of quality control and process improvement) and latency (less than 0.1 ms) [25], as well as an additional demand on security. The SURLLC mainly serves the industrial and military communications, e.g., a variety of robots, highprecision machine tools, and conveyor systems in the 6G era.…”
Section: J Summarymentioning
confidence: 99%