6G Technology for Indoor Localization by Deep Learning with Attention Mechanism DOI Creative Commons
Chien‐Ching Chiu, Hung‐Yu Wu, Po‐Hsiang Chen

et al.

Applied Sciences, Journal Year: 2024, Volume and Issue: 14(22), P. 10395 - 10395

Published: Nov. 12, 2024

This paper explores 6G technology for indoor positioning, focusing on accuracy and reliability using convolutional neural networks (CNN) with channel state information (CSI). Indoor positioning is critical smart applications the Internet of Things (IoT). expected to significantly enhance performance through use higher frequency bands, such as terahertz frequencies wider bandwidth. Preliminary results show that 6G-based systems are achieve centimeter-level due integration advanced artificial intelligence algorithms frequencies. In addition, this also investigates impact self-attention (SA) attention (CA) mechanisms systems. The combination these conventional CNNs has been proposed further improve robustness localization CNN SA demonstrates a 50% reduction in RMSE compared by capturing spatial dependencies more effectively.

Language: Английский

CYBERSECURITY ANALYTICS IN PROTECTING SATELLITE TELECOMMUNICATIONS NETWORKS: A CONCEPTUAL DEVELOPMENT OF CURRENT TRENDS, CHALLENGES, AND STRATEGIC RESPONSES DOI Creative Commons

Enyinaya Stefano Okafor,

Olatunji Akinrinola,

Favour Oluwadamilare Usman

et al.

International Journal of Applied Research in Social Sciences, Journal Year: 2024, Volume and Issue: 6(3), P. 254 - 266

Published: March 8, 2024

Cybersecurity is a critical concern in satellite telecommunications networks, given their vulnerability to cyber threats. This abstract presents conceptual development of current trends, challenges, and strategic responses using cybersecurity analytics protect these networks. The paper discusses the increasing reliance on telecommunications, making them attractive targets for attacks. It explores role detecting mitigating threats, highlighting importance proactive monitoring threat intelligence. Challenges networks are identified, including complexity systems, limited visibility into network traffic, evolving nature such as use advanced techniques, machine learning, artificial intelligence enhance detection response capabilities. Key trends examined, growing adoption cloud-based security solutions, rise insider need collaboration between operators experts. also regulatory compliance industry standards ensuring In conclusion, emphasizes protecting recommends approach that includes continuous monitoring, sharing, with experts. Keywords: Cybersecurity, Analytics, Satellite, Telecommunications, Conceptual Development.

Language: Английский

Citations

31

6G Enabled Advanced Transportation Systems DOI
Ruiqi Liu, Meng Hua, Ke Guan

et al.

IEEE Transactions on Intelligent Transportation Systems, Journal Year: 2024, Volume and Issue: 25(9), P. 10564 - 10580

Published: Feb. 19, 2024

With the emergence of communication services with stringent requirements such as autonomous driving or on-flight Internet, sixth-generation (6G) wireless network is envisaged to become an enabling technology for future transportation systems. In this paper, two ways interactions between 6G networks and are extensively investigated. On one hand, new usage scenarios capabilities over existing cellular firstly highlighted. Then, its potential in seamless ubiquitous connectivity across heterogeneous space-air-ground systems demonstrated, where railways, airplanes, high-altitude platforms satellites other we reveal that introduction guarantees a more intelligent, efficient secure system. Specifically, technical analysis on how can empower provided, based latest research standardization progresses localization, integrated sensing communications, security. The challenges insights road ahead also summarized possible inspirations enabled advanced transportation.

Language: Английский

Citations

22

The Role of 6G Technologies in Advancing Smart City Applications: Opportunities and Challenges DOI Open Access
Sanjeev Kumar Sharma,

Renu Popli,

Sajjan Singh

et al.

Sustainability, Journal Year: 2024, Volume and Issue: 16(16), P. 7039 - 7039

Published: Aug. 16, 2024

The deployment of fifth-generation (5G) wireless networks has already laid the ground-work for futuristic smart cities but along with this, it also triggered rapid growth a wide range applications, example, Internet Everything (IoE), online gaming, extended/virtual reality (XR/VR), telemedicine, cloud computing, and others, which require ultra-low latency, ubiquitous coverage, higher data rates, extreme device density, ultra-high capacity, energy efficiency, better reliability. Moreover, predicted explosive surge in mobile traffic until 2030 envisioned potential use-cases/scenarios city context will far exceed capabilities 5G was designed. Therefore, there is need to harness 6th Generation (6G) capabilities, not only meet stringent requirements megacities can open up new applications. Other crucial concerns that be addressed are related network security, privacy, interoperability, digital divide, other integration issues. In this article, we examine current emerging trends implementation 6G arena. Firstly, give an inclusive comprehensive review communication technologies find use cities. discussion each technology covers its benefits, challenges future research direction. Secondly, explore promising applications these technologies, such as, grids, healthcare, waste management, etc. conclusion part, have highlighted suggestions possible directions. So, single paper, attempted provide wider perspective on 6G-enabled by including both their This paper help readers gain holistic view ascertain opportunities bring diverse, massive

Language: Английский

Citations

15

Quantum cloud computing: Trends and challenges DOI Creative Commons
Muhammed Golec,

Emir Sahin Hatay,

Mustafa Golec

et al.

Journal of Economy and Technology, Journal Year: 2024, Volume and Issue: 2, P. 190 - 199

Published: June 1, 2024

Quantum computing is a new paradigm that will revolutionize various areas of computing, especially cloud computing. still in its infancy, costly technology can operate highly isolated environments because rapid response to environmental factors. This makes quantum challenging for researchers access. These problems be solved by integrating into an remote server, such as cloud, and making it available users. Furthermore, experts predict with ability swiftly resolve complex computationally intensive operations, offer significant benefits systems process large amounts data, like article presents the vision challenges emerge integration Next, we present advantages over classical applications. We analyze effects on systems, cost, security, scalability. Besides all these advantages, highlight research gaps qubit stability efficient resource allocation. identifies future research, highlighting gaps.

Language: Английский

Citations

8

Physical Layer Security for 6G: Towards Achieving Intelligent Native Security at Layer-1 DOI Creative Commons
Israt Ara, Brian Kelley

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 82800 - 82824

Published: Jan. 1, 2024

Language: Английский

Citations

6

Entanglement and teleportation in quantum key distribution for secure wireless systems DOI Creative Commons
Md. Ferdous Ahammed, Mohammad Ismat Kadir

IET Quantum Communication, Journal Year: 2024, Volume and Issue: unknown

Published: March 19, 2024

Abstract Entanglement‐assisted quantum key distribution (QKD) has attracted significant attention for its ability to provide highly secure wireless systems. This work explores the employment of teleportation and Fourier transform (QFT) in entanglement‐assisted QKD enhance security. By integrating concepts entanglement, teleportation, QFT, strategy is significantly improved, leading more communication. The system been thoroughly tested bit error rate, reconciliation efficiency. results show that this technique outperforms standard BB84 protocol. Based on their simulations, protocol appears be a promising providing quantum‐level security next‐generation communication

Language: Английский

Citations

5

Wireless quantum key distribution at terahertz frequencies: Opportunities and challenges DOI Creative Commons
Neel Kanth Kundu, Matthew R. McKay, Ranjan K. Mallik

et al.

IET Quantum Communication, Journal Year: 2024, Volume and Issue: unknown

Published: Jan. 13, 2024

Abstract Quantum key distribution (QKD) is one of the major applications quantum information technology. It can provide ultra‐secure with security guaranteed by laws physics. necessary to protect data transmission from computing attacks in future communication networks. The mechanics dictate that as opposed microwave frequencies, coherence preserved at room temperatures for terahertz (THz) frequencies. This makes THz band a promising solution room‐temperature QKD implementation wireless authors present principles continuous variable (CV‐QKD) systems and review latest developments design analysis CV‐QKD operating also discuss how multiple‐input multiple‐output be incorporated into communications framework improve secret rates increase coverage distances system. Furthermore, hardware challenges must surmounted practically realise are highlighted.

Language: Английский

Citations

4

Exploring a Smart City and the Epicenter of Megatrends in Innovation With Artificial Intelligence DOI

Maria Amparo Diaz-Llairo

Advances in marketing, customer relationship management, and e-services book series, Journal Year: 2024, Volume and Issue: unknown, P. 191 - 238

Published: Dec. 27, 2024

This article explores the transformative role of Artificial Intelligence (AI) in urban development, focusing on Dubai as a pioneering smart city at epicenter global technological trends. Through comprehensive case study, this research investigates Dubai's integration AI within its socio-economic and infrastructural frameworks, illustrating evolution from regional hub to leader innovations. The study highlights multifaceted applications public services, transportation, healthcare, environmental management, demonstrating how these initiatives enhance functionality set new standards for development. findings offer insights into strategic implementation AI, showcasing approach model future cities providing framework that blends advancements with sustainable planning.

Language: Английский

Citations

4

Revolutionizing Internet of Vehicles with Quantum Key Distribution on Blockchain for Unprecedented Security DOI

Hong Seng Phil

Journal of Machine and Computing, Journal Year: 2025, Volume and Issue: unknown, P. 496 - 508

Published: Jan. 3, 2025

Advanced connection and autonomous features are being made possible by the Internet of Vehicles (IoV), which is causing a revolution in transportation. Strong security measures required, however, because prevalence connected devices also increases likelihood cyberattacks data breaches. This study introduces new method for protecting IoV networks, combines Blockchain technology with Quantum Key Distribution (QKD), creating architecture two layers. (IoV) technologies enable driving real-time exchange connecting vehicles to infrastructure one another. These advancements make things safer more efficient, but they put sensitive information at risk cyberattacks. Modern essential since traditional encryption methods becoming insecure. To provide that theoretically unbreakable, suggested system uses QKD create distribute cryptographic keys based on principles quantum mechanics. improve trust transparency, blockchain used record these any subsequent transactions an immutable, distributed ledger. A hybrid architecture, securing key ensuring integrity authenticity communication, designed as part integration process. Improved speed have been shown simulations prototype implementations QKD-Blockchain networks. By preventing eavesdropping interception, technique kept communication channel secure. With average delay only about 2 milliseconds, performed admirably was well below permitted range vehicular communications. On average, validation durations were 5 little overhead due integration. The efficiently handled up 10,000 per second without affecting or performance, proving it can serve massive according scalability testing. Under high-load scenarios, framework maintained consistent performance security, its robustness stress tests. Together, scalable trustworthy option future results show how feasible robust use them protect systems. An intriguing approach issues plaguing systems technology. unparalleled level protection against cyber threats provided dual-layered system, guarantees strong integrity. fresh may lead improved networks establishing benchmarks secure communication. In order optimize implementation tackle arise, research development should be conducted.

Language: Английский

Citations

0

量子微波-光波相干转换实验系统与研究进展 DOI

苗强 Miao Qiang,

吴德伟 Wu Dewei

Laser & Optoelectronics Progress, Journal Year: 2025, Volume and Issue: 62(1), P. 0100004 - 0100004

Published: Jan. 1, 2025

Citations

0