You are on page 1of 7

ACCEPTED FROM OPEN CALL

6G: Opening New Horizons for Integration of


Comfort, Security, and Intelligence
Guan Gui, Miao Liu, Fengxiao Tang, Nei Kato, and Fumiyuki Adachi

Abstract technologies, architecture, potential challenges,


promising solutions, opportunities, and future
The innovations provided by sixth generation developmental direction. These issues are dis-
wireless communication (6G) as compared to cussed in this article along with new concepts for
fifth generation (5G) are considered in this arti- integrating comfort, security, and intelligence in
cle based on analysis of related works. With the 6G.
aim of achieving diverse performance improve-
ments for the various 6G requirements, five 6G Core Services for 6G
core services are identified. Two centricities and
eight key performance indices (KPIs) are detailed Distinction: 5G, B5G, and 6G
to describe these services, then enabling technol- To provide a foundation for the discussion of 6G
ogies to fulfill the KPIs are discussed. A 6G archi- services, 5G core services of enhanced mobile
tecture is proposed as an integrated system of the broadband (eMBB), ultra-reliable low latency
enabling technologies and is then illustrated using communications (URLLC), and massive machine
four typical urban application scenarios. Potential type communications (mMTC) are first reviewed.
challenges in the development of 6G technology Three basic performance requirements for 5G
are then discussed and possible solutions are pro- services are high data rate, low transmission
posed. Finally, opportunities for exploring 6G are latency, and massive connectivity, which address
analyzed in order to guide future research. the most urgent wireless communication issues
for present demand. Numerous studies have
Introduction explored the effects of various 5G technologies
Commercial approvals have been officially such as orthogonal frequency division multiple
declared for the deployment of fifth generation access (OFDMA), polar code, massive multi-
(5G) wireless systems in numerous countries, ple input multiple output (MIMO), millimeter
with 5G enabled smart phones and infrastruc- wave (mmWave), and software defined network
tures already appearing in the market. Prior to (SDN) on the basic requirements. Various addi-
recently emerging commercial applications of tional techniques for supporting 5G performanc-
5G, research exploring future wireless systems es include full duplex, non-orthogonal multiple
has already extended to the concept of beyond access (NOMA), and mobile edge computing
5G (B5G) [1]. Furthermore, since 2018, scholars (MEC). From this perspective, B5G can be con-
have begun to focus on the concept of 6G and sidered as an evolution to further enhance 5G
its applications [2]. B. Zong et al. have explored performance.
the key drivers and new logical start of 6G [3]. To fulfill the demands of service quality
Z. Zhang et al. have also analyzed 6G, detailing improvement, an increasing number of wireless
a number of promising techniques such as tera- services must be optimized for more than one
hertz (THz) communications, large intelligent sur- requirement. New radio lite (NR-Lite) for 5G has
faces (LISs), orbital angular momentum (OAM), been proposed by the third Generation Partner-
blockchain-based spectrum sharing, quantum ship Project (3GPP) for Release 17 [10]. The
communications and computing, and molecular NR-Lite service complements eMBB, URLLC, and
communications [4]. R. Heath described three mMTC through satisfying multiple requirements
key directions for 6G in the physical layer [5], on data rate, transmission latency, and connec-
while P. Yang et al. detailed several advanced tivity. However, NR-Lite is only able to achieve
techniques of 6G in the transmission and network performance tradeoffs among these requirements,
layer [6]. Additionally, K. Letaief et al. provided a and struggles to improve them simultaneously.
development roadmap of 6G with artificial intel- Hence, NR-Lite can only be applied to low tier
ligence (AI) based technologies [7]. In [8] and users with multiple medium requirements and
[9], trends and potential problems of 6G were cannot satisfy multiple high performance require-
discussed further. ments. To support higher requirements for 6G
However, to the extent of the authors’ knowl- users on multiple performances, considering 6G
edge, there is a lack of comprehensive analysis of with multiple performance improvements rather
the 6G roadmap which extends to its relationships than tradeoffs has become a popular research
with B5G, core services, required KPIs, enabling direction [2][4][9].

Digital Object Identifier: Guan Gui and Miao Liu (corresponding author) are with Nanjing University of Posts and Telecommunications;
10.1109/MWC.001.1900516 Fengxiao Tang, Nei Kato, and Fumiyuki Adachi are with Tohoku University

126 1536-1284/20/$25.00 © 2020 IEEE IEEE Wireless Communications • October 2020

GUI_LAYOUT.indd 126
Authorized licensed use limited to: National YunLin University Of Technology. Downloaded on January 15,2022 at 12:40:49 UTC from IEEE Xplore. Restrictions10/21/20
apply. 11:23 PM
evolutIon: scenArIo centrIc And coMfort bAsed 6G eMBB
Data rate
6G limit
Four kinds of 6G core services are identified for URLLC Evolution of
enhanced performance combined with 5G. These mMTC 6G-Lite performance
include enhanced eMBB + URLLC, enhanced NR-Lite
B5G limit
requirements
eMBB + mMTC, enhanced URLLC + mMTC, performance
5G limit
from 5G and
and tradeoff based enhanced eMBB + URLLC + bounds of B5G B5G to 6G
mMTC. In this article, the services are denoted as MBBL NR-Lite
MBBLL (mobile broad bandwidth and low latency), L
mBBM
mBBMT (massive broad bandwidth machine type), T
mLLM
mLLMT (massive low latency machine type), and T
6G-Lite
6G-Lite. Furthermore, to prove the rationality of the
proposed 6G core services, potential killer applica-
tions for the 6G services are evaluated as follows.
Typical applications of MBBLL include mobile
augmented reality (AR), virtual reality (VR), and
holographic teleconferencing [3]. Such applica- Latency Connectivity
tions demand high data rates (downlink peak rate
>1 terabit per second (Tbit/s), user experienced FIGURE 1. Evolution of the core services from 5G to 6G based on the perfor-
rate >10 gigabit per second (Gbit/s) [4]) for high mance requirements.
definition video streams and large amounts of
interactive instructions, as well as low latencies
for real-time voices (<0.1 millisecond (ms)) and
revolutIon: coMPutInG centrIc And securItY bAsed
immediate control responses (<1ms) [8]. These 6G dIGItAl servIce
requirements must also be guaranteed in high-mo- Contrasting with the scenario centric services based
bility scenarios (>1000 kilometer per hour (km/h) on 5G and B5G evolutions, the fifth 6G core service
[4]) for future use in space exploration, traveling is focused on providing secure wireless computing
over the air and sea, and maglev transportation. in the digital world. With the development of data
For mBBMT, the tactile Internet of Things (IoT) mining, cloud-edge computing, mobile caching, and
will be an important use scenario by the 2030s deep learning (DL), general computing has become
[4], demanding higher data rates to support touch an important service objective of wireless commu-
related experiences. The IoT also requires massive nications. The utilization of network function visu-
connectivity for the densely deployed (e.g., 100 alization and network slicing means that wireless
per cubic meter (/m3)) sensors and devices to systems must be scheduled more flexibly. Therefore,
capture tactile sensations and transform them into wireless computing is also essential for networks to
digital data. Subsequently, mLLMT will attract a self-optimize transceiver schemes globally. This kind
large amount of attention for use in the large scale of service applies to computing data non-locally and
industrial IoT (IIoT), with applications including transmitting results, without specific requirements to
smart manufacturing and automatic transportation. achieve concrete experiences in actual events and
These applications will require massive connectiv- scenarios. Thus, data rate, latency, and connectivity
ity for communications among staff, sensors, and are not the basic requirements of computing and
actuators, but also low latency to deal with the must be considered as a new service class with cor-
frequent interactions between these devices. responding performance requirements in the 6G
Considering the complex diversification and per- system.
sonalization demands with multiple social and indi- Cyber and physical layer security issues within
vidual orientations, intelligent driving will provide wireless networks are widespread in daily life. As
the best scenario for 6G-Lite. In intelligent driving a result, for wireless computing among individuals
scenarios, multiple events must be jointly consid- and communities, privacy leakage is a predominant
ered, including path planning, automatic driving, concern caused by perpetual data uploading, cach-
obstacle detection, vehicle monitoring, mobile ing, and transmitting. Providing wireless computing
entertainment, and emergency rescue operations. with trusted communications is a crucial objective.
High rate, low latency, and massive connectivity Security should therefore be considered as a basic
must all be achieved under high-mobility conditions performance requirement of wireless computing in
to support the 6G applications. However, consid- 6G, and is referred to as secure wireless computing
ering the current capabilities of 5G NR-Lite, it is for private data (SWCPD).
impossible to satisfy the three performance require- By combining the evolutionary and revolu-
ments to the maximum extent. Thus, tradeoffs must tionary services detailed above, a comprehensive
be optimized for 6G-Lite among different perfor- vision of 6G core services can be identified. The
mance requirements for various scenarios. aim of these services is not only to provide com-
The evolution of core services from 5G to 6G fortable experiences to human and machines, but
is illustrated in Fig. 1 and is based on the increas- also guarantee security for general computing. To
ing wireless performance requirements in different intelligently support comfortable and secure 6G
scenarios. In particular, the evolutionary services services, KPIs are introduced next, as illustrated in
detailed above work to improve joint quality Fig. 2. As shown in the figure, KPIs include both
of experiences (QoEs) of human and machines distinctive KPIs for specific services and common
based on multiple performance requirements in KPIs for general services. Specifically, the exact
complex physical scenarios. They can be collec- units of KPIs are bit/s for data rate, ms for latency,
tively referred to as scenario centric services in m3 for connectivity range, /m3 for connectivity
the physical world for providing users with high density, bit/s for capacity, bit/s per hertz (bit/s/Hz)
quality wireless experiences. for SE, and bps per watt (bit/s/W) for EE. Multiple

IEEE Wireless Communications • October 2020 127

GUI_LAYOUT.indd 127
Authorized licensed use limited to: National YunLin University Of Technology. Downloaded on January 15,2022 at 12:40:49 UTC from IEEE Xplore. Restrictions10/21/20
apply. 11:23 PM
Assigning more band- underground networks, molecule based Nano-
width is a direct meth- mBBMT mLLMT IoT, and the physiological tissue based body
od to improve data access network. Three main directions require
rate. As the spectrum Latency Connectivity exploration to address density issues. First, com-
MBBLL SWCPD pressed sensing and sparse coding can reduce the
of present frequency communication data volume for users by com-
band is increasingly pressing information. Edge caching and social net-
Data rate 6G-Lite Security
scarce, developing new work can then proactively store popular content
frequency bands higher Distinctive KPI in partial communities, thus reducing centric rate
than the extremely Common KPI demands. Similarly, transfer learning can reduce
transmitted data volume for computing services
high frequency (EHF) through shared DNN models. Optical fibers are
Capacity Intelligence
band, such as sub- also an efficient way to reduce the wireless rate
mmWave, terahertz, demands in backhaul networks and extremely
Spectrum Energy dense wireless networks (eDWNs). Improving SE
and visible light, is a efficiency efficiency
critical process. and capacity can also address density problems
Traditional basic requirement New KPI and is discussed in latter subsections.
For Enlarging System Capacity: According
FIGURE 2. KPIs for 6G services to Shannon’s theory, the system capacity can
be improved through enhancing bandwidth, sig-
aspects need to be considered when analyzing nal-to-interference plus noise ratio (SINR), and
security, including physical layer security, network SE. Utilizing EHF is the most direct method to
information security, and deep learning related improve capacity, while channel enhancement
security. Taking security capacity as an example, and interference-noise management are import-
its unit is bit/s. For intelligence, the most used mea- ant techniques to increase SINR. Channel state
surement is accuracies, thus the unit is percentage. can be improved through applying meta-materi-
Methods to enable technologies to improve these al based reconfigurable intelligent antennas and
KPIs are discussed in the following section. meta-surfaces to optimize the beams and the
propagation channels. Additionally, unmanned
Enabling Technologies for 6G aerial vehicle (UAV), balloon, and satellite based
For Improving Data Rate: Advanced modulation air-to-ground (A2G) communications are also able
schemes are required to improve the data rate for to improve channel conditions due to line of sight
users. The most promising schemes are index mod- (LoS) with few obstacles and paths.
ulation and spatial modulation, which utilize the indi- For Enlarging SE: As mentioned above, index
ces of resource blocks and antennas to deliver extra and spatial modulations are effective physical layer
bits. As no additional resources are required, the methods to enlarge SE. As EHF and eDWN are
corresponding spectrum efficiency (SE) and ener- promising for use in the 6G system, super massive
gy efficiency (EE) can also be improved. Assigning MIMO (sm-MIMO) can also be considered to
more bandwidth is a direct method to improve data enhance the system SE further. On the link layer,
rate. As the spectrum of present frequency band novel multiple access methods can accommodate
is increasingly scarce, developing new frequency more links on the same spectrum. Among these
bands higher than the extremely high frequency advanced multiple access methods, NOMA and
(EHF) band, such as sub-mmWave, terahertz, and rate splitting multiple access (RSMA) are based
visible light, is a critical process. on non-orthogonal spectrum access, while OAM
For Reducing Latency and Guaranteeing mode assignment provides the foundation for uti-
Reliability: An emerging technique for reducing lizing OAM-based vortex waves. More flexible
latency is DL based transmission prediction. Data spectrum management and sharing schemes can
driven DL systems can proactively predict the also be adopted among heterogeneous services
user’s requests and time-varying channel states, and users in order to replace traditional schemes
leading to shorter transmission latency. To reduce like cognitive radio networks, long term evolution
operation latency, model driven DL can be used in unlicensed spectrum (LTE-U), and full duplex. In
to train deep neural networks (DNNs) and replace addition to individual network solutions, eDWN
traditional algorithms with online accelerated and the SAGSI network can further improve the
DNNs. Distributed and cooperative processing spatial three-dimensional (3D) SE through reusing
are also important methods to reduce operation frequency more densely in adjacent networks.
latency based on local and cooperative operations For Enhancing EE: Index and spatial modula-
on edge devices. Obstacles cause an additional tions have been noted as effective physical layer
problem for reliability, and as frequency becomes methods to enhance EE. Wireless power transfer-
higher, obstacles between transceivers block the ring (WPT) and simultaneous wireless information
signals more frequently. To improve reliability, and power transferring (SWIPT) are also promis-
reconfigurable meta-surface can control the prop- ing technologies for supplying energy to wireless
agation environment during communications. receivers based on energy harvesting. Utilizing
For Increasing Connectivity: Connective interference power as an energy source is a nota-
range and density can be improved to increase ble potential method. Additionally, low-resolution
the connectivity of the system. For the aspect multiple antenna architectures for MIMO systems
of range, the most promising technique is the are effective for reducing power consumption
space-air-ground-sea integrated (SAGSI) network. and raising EE. Distributed and cooperative mul-
Additional media based networks must also be tiple point transmissions can then reduce power
integrated into 6G systems, including sonar based consumption for dense cell based communica-
underwater networks, magnetic induction based tions, while relay and multi-hop transmissions can

128 IEEE Wireless Communications • October 2020

GUI_LAYOUT.indd 128
Authorized licensed use limited to: National YunLin University Of Technology. Downloaded on January 15,2022 at 12:40:49 UTC from IEEE Xplore. Restrictions10/21/20
apply. 11:23 PM
lower power consumption for long distance com- Phone user Passenger Pedestrian Traveler
Worker
munications at the cost of higher latencies. Animal
Micro base
For Promoting Security: Multiple novel Base station
station
Access points Buoy Autonomous
vehicle
High-speed
railway
schemes have been considered to manage differ- Aircraft
Unmanned
Ship
LEO satellite GEO satellite Balloon
ent kinds of threats in order to improve data pri- aerial vehicle
Meta
vacy and communication security for 6G services, Smart beam Optic cable Centric cloud Public fog Private fog surface
especially threats specific to computing. Secure Holographic
Actuator Wearable device
Implantable
Robot
Smart

channel coding, channel based adaptation, arti- captor device home


Quantum
ficial interfering signals, and secret sequence Terahertz
wave
Millimeter
wave communication
Regular wave Visible light SWIPT/WPT
extraction are the principal physical layer tech-
niques based on classical information theory [11]. GEO
Based on the no-cloning theorem and entangle-
ment nature in quantum physics, information
can be securely transmitted with classical bits
LEO
and channels using quantum key distribution and
quantum teleportation. According to the trends of Air
computing centric services and 6C convergence,
cyber-attacks will present another critical problem Over
sea
for 6G security. For detecting malicious activities,
Ground
DL based attack prediction methods are promis-
Under-
ing potential solutions for these constantly chang- ground
Under-
ing environments [12]. water
For Realizing Intelligence: The significance
of DL in 6G systems is illustrated by the var-
Remote Coastal
ious enabling technologies detailed above. ocean sea
Urban area Rural area
Wireless communication systems have become
increasingly intelligent at all levels, assisted by FIGURE 3. Proposed 6G architecture.
DL. Popular earlier techniques on the physical
layer include data-driven DL methods for auto-
matic modulation classification, channel state integrated 6G coverage, the different types of the
estimation and prediction, adaptive encoding networks must also be integrated in both aspects of
and decoding, intelligent beamforming, and con- protocol and organization. Particularly in the devel-
stellation design. For the data link layer, deep opment of 6G technologies, it is vital to integrate
reinforcement learning (DRL) based resource current HetNets first, including macrocell, femto-
allocation has been widely researched, and for cell, wireless-fidelity (Wi-Fi), wireless sensor network
the transportation layer, intelligent traffic predic- (WSN), IoT, and Internet of Vehicular (IoV).
tion and route computing have been proposed Wireless Spectrum Integration: Different types
to replace inflexible protocols. To reduce the of networks will always work on the licensed and
caching and computing costs of learning, light- unlicensed frequencies exclusively, leading to inef-
weight DNNs and distributed learning has been ficient spectrum utilization. Employing visible light
subsequently applied in wireless networks. and EHF requires new scheduling policies. Thus,
all available spectrums must be integrated and
ArchItecture for 6G: managed flexibly with higher SE to facilitate the
integration of different networks.
connectIon And InteGrAtIon Communication Medium Integration: Radio
To provide comfortable, secure, and intelligent signals cannot be propagated everywhere and
6G services, enabling technologies must be inte- will not work in areas including underwater,
grated as an organic whole. For this purpose, a underground, and in the human body. As vary-
novel 6G architecture is illustrated in Fig. 3, with ing networks may require different media, addi-
four typical urban scenarios including: 1) intel- tional media must also be integrated into the 6G
ligent traffic system; 2) secure and private busi- framework, including optical fiber for backhaul
ness; 3) large scale intelligent IIoT; 4) smart home. networks, magnetic induction for underground
Methods to achieve technical integrations to sup- networks, sonar for underwater networks, physio-
port this 6G architecture are then discussed. logical tissue for body access network, and molec-
Network Coverage Integration: To connect ser- ular for Nano-IoT.
vices anywhere, the varied coverage of the net- Interactive Function Integration: For achiev-
works must be integrated. Space, air, and remote ing comfortable, secure, and intelligent wireless
areas can be connected into the 6G core network service targets, six fundamental functions of
using satellites. To improve the performance of capturing, communication, caching, cognition,
these long range communications that are far away computing, and controlling (6C) are essential.
from the ground, relays can be deployed on bal- Capturing generally denotes high level sensing,
loons, UAVs, ships, and buoys. Alternatively, in and it is critical for acquiring holographic stimu-
urban areas, users can be served by macro base lations from the scenarios. The captured states
station (BS), micro BS, and simple access points are then transformed into digital data and cached
(APs) directly, or relayed by UAVs and other users. locally or transformed into physical signals and
Network Type Integration: As there are no inte- transmitted to the other devices for further pro-
grated frameworks for heterogeneous networks cessing. Before processing the data, cognition
(HetNets), jointly considering users and services should be applied to formulate feasible determi-
in the same scenarios but in different types of net- nations according to the input samples, then com-
works is challenging. To connect everything under puting can accomplish the tasks securely, based

IEEE Wireless Communications • October 2020 129

GUI_LAYOUT.indd 129
Authorized licensed use limited to: National YunLin University Of Technology. Downloaded on January 15,2022 at 12:40:49 UTC from IEEE Xplore. Restrictions10/21/20
apply. 11:23 PM
Worlds: Physical World Digital World Challenges and Possible Solutions
Elements: Scenario Devices Functions The new proposals also present a series of addi-
tional problems. In this section, foreseeable chal-
Actuator Controlling lenges for 6G implementation are discussed and
possible solutions are presented.
Signal
Signal Order
Action Peak Data Rate: The 6G radio must be
Tactile designed to utilize EHF to increase the peak data
stimulation Computer Computing rate. It is also critical to build EHF mobile channel
models and consider flexible spectrum manage-
Signal Result
Determination
ment methods according to the various 6G sce-
Signal narios. Another more serious concern is how to
Information
exchanging Scenario Agent Cognition guarantee accurate beam arrivals in high-mobility
scenarios. Signals on EHF bands experience large
Signal Sample path losses and the communication range is very
Holographic short. Thus, a massive number of APs must be
Cache Caching deployed, leading to eDWN. With the deploy-
stimulation
ment of eDWNs, frequent handoffs will be anoth-
Signal State er problem in mobile scenarios, along with the
Sensor economic drawbacks of continuously deploying
Capturing eDWNs over entire service areas.
Potential solutions to these issues are intro-
Sensor duced as follows. First, DL can be employed as
Carriers: Transceiver Communication
Actuator a powerful tool for designing hardware and soft-
ware. The benefits of DL for managing resourc-
FIGURE 4. Convergent loops for 6C. es intelligently have been witnessed during the
communication trends of digitalization and visu-
alization. Outdoor positioning technology with
on intelligent determinations. Finally, the comput- centimeter level accuracy is also proposed for
ing results can be fed back to the former stages achieving accurate beam arrivals. In addition,
for further computing centric utilization. Alterna- macro BS, micro BS, and multi-AP based coopera-
tively, the computed orders will be sent to the tive transmissions are possible solutions to reduce
actuators for controlling the scenarios and devices the frequency of handoffs.
with tactile stimulations and wireless signals. The Latency and Reliability: Although cooperative
convergent loops of 6C interacting with the sce- processing can reduce computing latency, it rais-
nario in the physical and the digital worlds are es the cost of communications for link negotiating
depicted in Fig. 4. As illustrated, by considering and data sharing, increasing communication over-
the integrations for the functions, the targets of heads and transmission latency. Similarly, current
comfort and security can be improved globally DL based predictions rely on big data, which also
by intelligence, leading to improved interactive introduces more overheads for data collection.
experiences for humans and devices in the same Most DL schemes must train DNNs offline. Thus,
scenarios. if the channel state, network topology, and user
Core Service Integration: It can be observed policy change, the DNN must be retrained, lead-
from Fig. 4 that it is necessary to provide both ing to latency for online applications. Hierarchi-
computing and scenario centric services for 6C cal execution of tasks is an excellent solution for
interactions. Scenario centric services produce reducing the overheads and latency caused by
large amounts of data for wireless computing cooperation. Cross layer optimization and end-to-
and analyzing, while computing centric services end DL schemes are helpful to optimize the trans-
feed back computed results to improve the per- ceiver and propagation environment as a whole
formance of the scenario centric services. In and control it with meta-surfaces for improving
particular, intelligence is a common technology communication reliability.
to improve the performance of both scenar- Connectivity: There are numerous challeng-
io and computing centric services. Therefore, es involved in integrating networks with different
scenario and computing centric services will media to increase the quality of connectivity,
also be considered as integrations for globally including hardware issues of device compatibility
improving system performance and user expe- and software issues of system generality. Digitali-
rience. This integrated service relationship is zation, visualization, and DL are possible answers.
illustrated in Fig. 5. To increase the density of connectivity, the main
Layer Integration: It is necessary to improve challenge is to improve positioning accuracy, par-
individual service KPIs globally in addition to mul- ticularly in outdoor and mobile situations, as near-
tiple-service integration. Based on the commu- ly 100 devices should be connected in the space
nication models with multiple-layers (i.e., open of 1 m3. Advanced positioning technology with
system interconnection (OSI) and transmission centimeter level accuracy should thus be utilized
control protocol/Internet protocol (TCP/IP) ref- for managing densely deployed devices.
erence models), traditional schemes are always System Capacity: The challenges of enlarg-
considered for optimizing KPIs on a single layer. ing capacity lie in optimizing link quality for A2G
Previous research into communications with DL networks and taking advantage of interference
have also encountered this issue. As a result, it is power. Both DRL and intelligent meta-surface are
necessary to integrate the layers and jointly opti- proposed to address these issues as technologies
mize the KPIs for each service. based on intelligent policy and environment opti-

130 IEEE Wireless Communications • October 2020

GUI_LAYOUT.indd 130
Authorized licensed use limited to: National YunLin University Of Technology. Downloaded on January 15,2022 at 12:40:49 UTC from IEEE Xplore. Restrictions10/21/20
apply. 11:23 PM
Federated learning is
Physical task’s Local Global a possible solution
Scenario optimization optimization
Physical centricity: based on distributed
world
learning and transfer-
Information form (Multi-objective, cross ring learning, meaning
Holographic signal Comfort
in physical world: layer, end to end, etc. )
that all user data is
saved locally, and only
Hardware for Captor, transceiver, actuator, abstracted models will
processing signal: computer, cache be shared. Endogenous
Intelligence security has also been
put forward as a way
Digital Software for Neural network, dataset, algorithm, to assist systems to
world processing data: protocol establish protection
strategies proactively
Information form Secure and automatically
in digital world: Big data through joint consid-
eration of physical
Digital task’s layer-cyber securities
centricity: Computing and classical-quantum
channels.
FIGURE 5. Integrated scenario centric and computing centric services for global optimization.

mizations, respectively. Global power, subchan- designing a joint secure framework will be the
nel, and beam optimization are also crucial, and main challenge for promoting total security of the
can jointly control interference in 6G systems. 6G system. Federated learning is a possible solu-
SE: Dense reuse of the same frequency to tion based on distributed learning and transfer-
enhance SE will introduce additional interfer- ring learning, meaning that all user data is saved
ence. In addition, sm-MIMO has high demands locally, and only abstracted models will be shared.
for beam optimization, channel modeling, and Endogenous security has also been put forward
transceiver design. Challenges for OAM include as a way to assist systems to establish protection
the limited number of available OAM modes, strategies proactively and automatically through
joint OAM-mode, and frequency/time partition joint consideration of physical layer-cyber securi-
and channel estimation for different OAM modes ties and classical-quantum channels.
[13]. A common and critical challenge for fre- Network Intelligence: The current DNNs are
quency reusing among users and systems lies in almost black box and heavily rely on training
effective interference utilization. To solve these datasets. Developed DNN models for wireless
challenges, detailed methods related to OAM communication are also limited [15-18], and are
have been provided in [13]. For the interference mainly borrowed from the fields of computer
related challenge, DRL, intelligent surface, and vision. As a result, DL based wireless communi-
global resource optimization are also potential cation networks only focus on simple tasks with
solutions. a single objective. The majority of schemes also
EE: The main challenges when applying the require offline training with a large data set and
technology to raising EE lie in the hardware lack of generalization ability, limiting the capabili-
design. It is first necessary to improve harvest- ties of instant deployment and dynamic self-adap-
ing efficiencies of WPT and SWIPT. With the tion. The existing intelligent communication
utilization of EHF, new hardware must then be research works have only aimed at optimization
developed for energy harvesting. It is also diffi- of the performance of 5G and B5G schemes.
cult to design feasible antenna architectures for For 6G, the systems and schemes must be
complicated environments, leading to a waste of originally produced by cognition, instead of opti-
transmitting power. To deal with the hardware mization. Additionally, existing DL and DRL based
designing difficulties, DL, function digitalization, methods rely heavily on formulated datasets and
and reconfigurable meta-materials have recent- fixed spaces of states and policies, and cannot
ly been proposed as solutions for significantly operate in unpredictable situations. Current DL
improving EE. methods also only teach agents the best policies
Promote Security: Numerous issues remain under different determined conditions, thus it is
in classical physical layer security, DL related difficult to carry out tradeoffs among various per-
cyber security, and quantum based communi- formance optimizations in dynamic and compli-
cation security. As the challenges and potential cated 6G environments. To solve the explainability
solutions have been summarized in [11], [12] and and generalization problems, models based on
[14], they are not explored again in this work. The DL schemes, such as deep unfolding neural net-
necessity of jointly considering the physical layer works, are potential choices, and should be devel-
and cyber security with quantum methods for 6G oped based on strict mathematical deductions.
services is emphasized here, however, particular- Model driven DNNs, such as deep unfolding neu-
ly for those scenarios related to computing and ral networks, also provide better explainability for
DL. With the popularity and necessity of data col- utilization, while transfer learning can improve the
lecting for learning in computing centric services, generalization capability. In addition, DL cooper-

IEEE Wireless Communications • October 2020 131

GUI_LAYOUT.indd 131
Authorized licensed use limited to: National YunLin University Of Technology. Downloaded on January 15,2022 at 12:40:49 UTC from IEEE Xplore. Restrictions10/21/20
apply. 11:23 PM
Future research will not ating with analysis of game theory could possibly [9] W. Saad, M. Bennis, and M. Chen, “A Vision of 6G Wire-
less Systems: Applications, Trends, Technologies, and Open
only rely on optimiza- achieve tradeoff policies among various perfor- Research Problems,” IEEE Netw., to be published, doi:
tion algorithms, com- mance requirements for multiple agents. 10.1109/MNET.001.1900287
[10] Qualcomm, “NR-Lite for Rel-17 Qualcomm views,” New-
pressive sensing, and
game theory for digital
Opportunities and Future Research Trends port Beach, 2019.
[11] J. M. Hamamreh, H. M. Furqan, and H. Arslan, “Classifica-
In this section promising opportunities for 6G are tions and Applications of Physical Layer Security Techniques
processing, but will discussed based on related science and technol- for Confidentiality: A Comprehensive Survey,” IEEE Com-
also require biology, ogy. According to the enabling technologies and mun. Surv. Tutorials, vol. 21, no. 2, 2019, pp. 1773–1828.
possible solutions, AI will significantly improve [12] M. Husák et al., “Survey of Attack Projection, Prediction,
energy, and material and Forecasting in Cyber Security,” IEEE Commun. Surv.
science technologies to the system performance of 6G. Blockchain is Tutorials, vol. 21, no. 1, 2019, pp. 640–60.
another potentially useful method to manage the [13] W. Cheng et al., “Orbital Angular Momentum for Wireless
develop friendly devic- 6G systems flexibly and securely, while quantum Communications,” IEEE Wireless Commun., vol. 6, 2018, pp.
es for humans and the computing will also provide increased comput- 2732–245.
[14] L. Gyongyosi et al., “A Survey on Quantum Channel Capac-
environment, aiming ing efficiency. Furthermore, future developments ities,” IEEE Commun. Surv. Tutorials, vol. 20, no. 2, 2018, pp.
at health protection, in mathematics, biology, psychology, sociology, 1149–1205.
convenient operation, and energy and material sciences will also provide [15] G. Gui et al., “Deep Learning for an Effective Nonorthogo-
possible inspirations for progress in 6G. nal Multiple Access Scheme,” IEEE Trans. Veh. Technol., vol.
service life extension, 67, no. 9, Sept. 2018, pp. 8440-50.
Future research trends such as applying [16] N. Kato et al., “The Deep Learning Vision for Heteroge-
pollution prevention, meta-learning, lightweight NN, graph NN, capsule neous Network Traffic Control: Proposal, Challenges, and
and energy consump- NN, and NN architecture searching to intelligent Future Perspective,” IEEE Wireless Commun., vol. 24, no.3,
6G research is also of significance. Based on block- 2017, pp. 146-153.
tion reduction. [17] F. Tang et al., “Future Intelligent and Secure Vehicular Net-
chain, all available resources including spectrum work Towards 6G: Machine-Learning Approaches,” Proc.
and data can then be stored and shared through IEEE, vol. 108, no. 2, Feb. 2020, pp. 292–307.
distributed blockchain transactions and protected [18] H. Huang et al., “Fast Beamforming Design via Deep Learn-
by consensus protocols and cryptographic secu- ing,” IEEE Trans. Veh. Technol., vol. 69, no. 1, 2020, pp.
1065–69.
rity, with no need to entrust any central party for
ledger maintenance. Quantum computing can Biographies
Guan Gui [SM’17] received the Ph.D. degree from the Univer-
also be used to accelerate the speed of informa-
sity of Electronic Science and Technology of China, Chengdu,
tion processing, leading to more optimal solutions China, in 2012. Since 2015, he has been a professor with the
for 6G communications with shorter time. Further- Nanjing University of Posts and Telecommunications, Nanjing,
more, future research will not only rely on optimi- China. His recent research interests include artificial intelligence,
zation algorithms, compressive sensing, and game deep learning, and intelligent communications. He has pub-
lished more than 200 IEEE journal/conference papers and won
theory for digital processing, but will also require several best paper awards, e.g., ICC 2017, ICC 2014 and VTC
biology, energy, and material science technologies 2014-Spring. He received Member and Global Activities Con-
to develop friendly devices for humans and the tributions Award in 2018, the Top Editor Award of IEEE Transac-
environment, aiming at health protection, conve- tions on Vehicular Technology in 2019.
nient operation, service life extension, pollution Miao Liu [M’18] received the B.Sc. degree in communication
prevention, and energy consumption reduction. engineering from the University of Electric Science and Technol-
Additionally, psychology and sociology are essen- ogy of China, Chengdu, China in 2003, the M.Sc. degree and
tial for improved understanding of individual user Ph.D. degree in communication engineering from Southeast
University, Nanjing, China and 2006 and 2018, respectively.
and societal demands within the 6G scenarios. He is an assistant professor with Nanjing University of Posts
and Telecommunications, Nanjing, China. His research interests
Conclusion include cognitive radio networks, heterogeneous networks, and
resource allocation in 5G communication.
Future 6G issues were explored in this article,
including core services, use cases, KPIs, enabling F engxiao T ang [M’19] received the B.E. degree in measure-
technologies, architectures, typical scenarios, ment and control technology and instruments from Wuhan Uni-
existing challenges, possible solutions, opportu- versity of Technology, Wuhan, China, in 2012, the M.S. degree
nities, and research directions. Through opening in software engineering from Central South University, Chang-
sha, China, in 2015, and the Ph.D. degree from the Graduate
new horizons for integration of comfort, security, School of Information Sciences (GSIS), Tohoku University, Sen-
and intelligence, the content of paper aims to pro- dai, Japan, in 2019. He is currently an assistant professor with
vide inspiration for future research into 6G. GSIS, Tohoku University. He was a recipient of the prestigious
Dean’s and President’s Awards from Tohoku University in 2019
References and several best paper awards at conferences, including IEEE
IC-NIDC 2018 and IEEE GLOBECOM 2017/2018.
[1] L. Song et al., “Resource Management in Non-Orthogonal
Multiple Access Networks for 5G and Beyond,” IEEE Netw.,
vol. 31, no. 4, Jul. 2017, pp. 8-14. Nei Kato [F’13] is a full professor with the Graduate School of
[2] K. David and H. Berndt, “6G Vision and Requirements,” IEEE Information Sciences, Tohoku University. He has been engaged
Veh. Technol. Mag., vol. 13, no. 9, 2018, pp. 72–80. in research on wireless mobile communications, AI, IoT, Big
[3] B. Zong et al., “6G Technologies: Key Drivers, Core Require- Data, and pattern recognition. He has published more than
ments, System Architectures, and Enabling Technologies,” 400 papers in prestigious peer-reviewed journals and confer-
IEEE Veh. Technol. Mag., vol. 14, no. 3, 2019, pp. 18–27. ences. He is a Vice-President of IEEE Communications Society
[4] Z. Zhang et al., “6G Wireless Networks: Vision, Require- (2018-2021), the Editor-in-Chief of IEEE Transactions on Vehic-
ments, Architecture, and Key Technologies,” IEEE Veh. Tech- ular Technology (2017-), and the Chair of the IEEE Communica-
nol. Mag., vol. 14, no. 3, 2019, pp. 28–41. tions Society Sendai Chapter. He is a Fellow of The Engineering
[5] R. W. Heath, “Going Toward 6G,” IEEE Signal Process. Mag., Academy of Japan and a Fellow of IEICE.
vol. 36, no. 3, 2019, pp. 3–4.
[6] P. Yang et al., “6G Wireless Communications: Vision and Fumiyuki Adachi [LF’16] received the B.S. and Dr. Eng. degrees
Potential Techniques,” IEEE Netw., vol. 33, no. 4, 2019, pp. in electrical engineering from Tohoku University, Sendai, Japan,
70–75. in 1973 and 1984, respectively. Since 2000, he has been with
[7] K. B. Letaief et al., “The Roadmap to 6G – AI Empowered Tohoku University, where he was a full professor with the Depart-
Wireless Networks,” IEEE Commun. Mag., vol. 57, no. 8, ment of Communications Engineering until March 2016. He
2019, pp. 84–90. is currently a Specially Appointed Professor with the Research
[8] F. Tariq et al., “A Speculative Study on 6G,” avaliable online: Organization of Electrical Communication. His research interests
https://arxiv.org/abs/1902.06700 include the area of wireless signal processing and networking.

132 IEEE Wireless Communications • October 2020

GUI_LAYOUT.indd 132
Authorized licensed use limited to: National YunLin University Of Technology. Downloaded on January 15,2022 at 12:40:49 UTC from IEEE Xplore. Restrictions10/21/20
apply. 11:23 PM

You might also like