Matches in SemOpenAlex for { <https://semopenalex.org/work/W3199833857> ?p ?o ?g. }
Showing items 1 to 68 of
68
with 100 items per page.
- W3199833857 endingPage "138" @default.
- W3199833857 startingPage "136" @default.
- W3199833857 abstract "While the commercial deployment of 5G networks and beyond is a reality, the first work for the definition and study of 6G networks has started. The scientific community agrees that these networks will be characterised by a very high spatial density of access points, heterogeneity of access technologies, an increased number of users per access point, and demand for ubiquitous connectivity that must combine ultra-low latency, very high bandwidth, and high energy efficiency [1, 2]. Among the emerging challenges, holographic communications, high-precision manufacturing, the ubiquitous introduction of intelligence, and the incorporation of new technologies based on sub-terahertz (THz) or Visible Light Communications (VLC) are real issues. These are taking place in a truly three-dimensional coverage framework, integrating terrestrial and aerial radio to meet the needs with cloud-based capabilities where and when needed (on-demand). Radio frequencies are used in wireless telecommunications, but the need for very high throughput requires wider bandwidths, hence very high frequencies, in particular THz bands. Moving to a higher frequency range—from 100 GHz to 10 THz—is expected to significantly increase the bandwidth of the radio channel, which will make it possible to serve a significant number of users. In this case, we are not talking about the connection of cell phones, tablets, or computers (and even smart cars)—we are considering the use of Internet of Things (IoT) devices, which within one base station can be quite a lot. Therefore, the technologies for beamforming, device location, etc., developed for the 5G generation that is just being implemented now should also remain but will be used at higher frequencies [3]. For which 6G is primarily intended, IoT solutions have been given a particular name: ‘human-machine-things’. They involve three elements in the system: a person as a physical carrier; an intelligent device with which the person interacts; collects data and executes commands from an application running on the person's device [4]. The 6G radio networks will provide the means of communication and data gathering necessary to accumulate information. Still, a system's approach will be required for the 6G technology market as a whole involving data analytics, artificial intelligence (AI), and next-generation computation capabilities via HPC and quantum computing [3, 5]. This tremendous amount of data may be harnessed, with strong processing and learning capabilities, to manage the network at different levels. To this end, quantum computing methods can play a significant enabling role and can provide a guaranteed security platform. Towards provisioning this massive connectivity and efficiently processing the voluminous data available at the user and network sides, quantum-powered computing methods have a strong potential in realising the ambitions of a service-driven, fully intelligent 6G communication network. There is every reason to believe that the integration of quantum technology can improve the throughput, efficiency, and security of 6G networks. In addition to the advantages mentioned above, this technology also has benefits in computing speed, guaranteed security, and minimal storage requirements. This makes it ideally suited for various future quantum communication network applications. Research is needed on many fronts to evaluate the potential opportunities of quantum computing in 6G applications. In 5G, a functional division is operated in both the RAN and core networks to meet the ultra-low latency and ultra-high efficiency requirements of 5G verticals. Notably, RAN functions are split into cloud-deployed services with interfacing capabilities. This new architecture has a significant impact on the efficient implementation of security processes [6]. One of the key challenges in deploying secure 5G networks is analysing how current cryptographic algorithms for secure authentication and data transmission can adapt to provide secure authentication between services and secure data encryption while ensuring that stringent efficiency requirements are met [7]. The powerful parallel processing capability of quantum search algorithms can be leveraged to solve large-scale wireless optimisation problems. (1) Is this ‘beyond 5G?’ This topic is highly exploratory and undoubtedly beyond the boundaries of core 5G R&D. (2) What are the new features and key challenges? Classically, the mutual information between the channel input and output must be maximised. For quantum channels, the capacity must be redefined. Quantum channels can increase the achievable capacity. As a result, error correction without redundancy is possible on noisy channels. Quantum computers can enable exponentially complex combinatorial ML decoding in classical systems [5, 6]. To cope with latency-critical scenarios such as automated cars and medical applications, communication must be accomplished in a concise time. Achieving latency of only a few milliseconds is a real challenge. To achieve low latency and ultra-high reliability, it is essential to develop powerful high-end processors that consume little power. Quantum computing seems to be a reliable solution to this issue [8]. With variable quality of service (QoS) requirements, a variable radio resource must be allocated to the user. This can be of variable bandwidth, variable power, or both. Another challenging aspect of 6G is that with the propagation frequency, the signal can attenuate quickly and have a high penetration loss at high frequencies [9]. The signal is also automatically attenuated when accessing homes, residences, or workplaces. As the frequency increases, radio waves attenuate and may have difficulty penetrating the walls of buildings and homes while affecting users' QoS requirements. Therefore, it is very important to develop stable, fast and accurate quantum algorithms to handle 6G communication requirements by dynamically allocating variable resources [10]. The current 5G standard does not address the issue of quantum computing but relies on traditional cryptography. The development towards cloud and edge native infrastructures is expected to continue in 6G networks. While large-scale quantum computing can be expected to take a longer duration, it is time to prepare for the shift to cryptography that is secure in the post-quantum world. According to current knowledge, contemporary symmetric cryptography remains secure for the most part, even after the advent of quantum computing. Furthermore, authentication by a physical layer signature, such as RF fingerprinting, and some other technologies, such as randomisation of MIMO transmission coefficients, coding, etc., could potentially be used in 6G [5, 11]. Whether it is for the optimisation of heterogeneous resources in 6G networks that result in the solution of ‘NP-complete’ combinatorial problems, for the compensation of non-linear effects of a communication chain or the optimisation of MIMO transmitter pre-coding matrix, future network nodes and devices will have to be equipped with learning and decision-making capabilities through AI and machine learning, so that they autonomously optimise their operation in response to changes in the environment [5]. In this context, the use of optimisation techniques based on quantum computing and AI applied to the field of 6G networks could be of considerable interest. Besides, quantum computing allows NP-hard optimisation problems to be solved in linear time, making it possible to solve and execute network optimisation problems in a much faster time, even in real-time [5, 11]. Regulatory and standardisation work will impact our future technology solutions in 5G networks and beyond. Protecting individual privacy and identity has long been a challenge for standards bodies, as countries have very different perspectives and regulations in this area. International standards bodies such as JTC 1 have committees working on privacy frameworks and are making progress, but there is still much to be done [13]. To conclude, we believe that our readers will find this opinion piece useful in giving an overview of the importance of Quantum Computing/communications in shaping the next communication systems and its security platforms. This is a technology in its infancy and a lot of research remains to be carried out to achieve sustainable solutions and overcome the current challenges. The use of intelligent systems (AI, ML and other techniques) will be essential in achieving solutions faster and providing sustainable outcomes. But IoT devices as well as cloud and edges nodes must be AI-ready and be able to support the use of intelligent algorithms." @default.
- W3199833857 created "2021-09-27" @default.
- W3199833857 creator A5056209905 @default.
- W3199833857 creator A5057916222 @default.
- W3199833857 date "2021-09-01" @default.
- W3199833857 modified "2023-10-18" @default.
- W3199833857 title "An overview of quantum computing and quantum communication systems" @default.
- W3199833857 cites W2929612105 @default.
- W3199833857 cites W2965824823 @default.
- W3199833857 cites W2981096252 @default.
- W3199833857 cites W3045086480 @default.
- W3199833857 cites W3046449146 @default.
- W3199833857 cites W3091752016 @default.
- W3199833857 cites W3094019951 @default.
- W3199833857 cites W3112680140 @default.
- W3199833857 cites W3127807476 @default.
- W3199833857 cites W3131790995 @default.
- W3199833857 cites W3145188657 @default.
- W3199833857 doi "https://doi.org/10.1049/qtc2.12021" @default.
- W3199833857 hasPublicationYear "2021" @default.
- W3199833857 type Work @default.
- W3199833857 sameAs 3199833857 @default.
- W3199833857 citedByCount "4" @default.
- W3199833857 countsByYear W31998338572022 @default.
- W3199833857 countsByYear W31998338572023 @default.
- W3199833857 crossrefType "journal-article" @default.
- W3199833857 hasAuthorship W3199833857A5056209905 @default.
- W3199833857 hasAuthorship W3199833857A5057916222 @default.
- W3199833857 hasBestOaLocation W31998338571 @default.
- W3199833857 hasConcept C121040770 @default.
- W3199833857 hasConcept C121332964 @default.
- W3199833857 hasConcept C186468114 @default.
- W3199833857 hasConcept C41008148 @default.
- W3199833857 hasConcept C5320026 @default.
- W3199833857 hasConcept C58053490 @default.
- W3199833857 hasConcept C62520636 @default.
- W3199833857 hasConcept C84114770 @default.
- W3199833857 hasConceptScore W3199833857C121040770 @default.
- W3199833857 hasConceptScore W3199833857C121332964 @default.
- W3199833857 hasConceptScore W3199833857C186468114 @default.
- W3199833857 hasConceptScore W3199833857C41008148 @default.
- W3199833857 hasConceptScore W3199833857C5320026 @default.
- W3199833857 hasConceptScore W3199833857C58053490 @default.
- W3199833857 hasConceptScore W3199833857C62520636 @default.
- W3199833857 hasConceptScore W3199833857C84114770 @default.
- W3199833857 hasIssue "3" @default.
- W3199833857 hasLocation W31998338571 @default.
- W3199833857 hasLocation W31998338572 @default.
- W3199833857 hasLocation W31998338573 @default.
- W3199833857 hasOpenAccess W3199833857 @default.
- W3199833857 hasPrimaryLocation W31998338571 @default.
- W3199833857 hasRelatedWork W2010442806 @default.
- W3199833857 hasRelatedWork W2046916349 @default.
- W3199833857 hasRelatedWork W2318822066 @default.
- W3199833857 hasRelatedWork W2493443336 @default.
- W3199833857 hasRelatedWork W2623774622 @default.
- W3199833857 hasRelatedWork W2801595638 @default.
- W3199833857 hasRelatedWork W3010817373 @default.
- W3199833857 hasRelatedWork W3119323601 @default.
- W3199833857 hasRelatedWork W4292949192 @default.
- W3199833857 hasRelatedWork W4301394259 @default.
- W3199833857 hasVolume "2" @default.
- W3199833857 isParatext "false" @default.
- W3199833857 isRetracted "false" @default.
- W3199833857 magId "3199833857" @default.
- W3199833857 workType "article" @default.