Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    Security in 6G: The Prospects and the Relevant Technologies

    The prospect of information and communication technology (ICT) has given rise to widespread attention and in-depth research on 6G. It is estimated that 6G will not be implemented until 2030; it is currently at the research and foundation stage. Based on the development of the previous five generations, from 1G to 5G, 6G has the potential to provide customized services through a holographic and ubiquitous network. 6G’s achievement will need the support of various technologies. One important factor in the success of 6G will be security. Specifically, 6G’s key enabling technologies include terahertz, a very large scale antenna, a tactile Internet, etc. This study addresses the fundamental principles of 6G security, discusses major technologies related to 6G security, and presents several issues regarding 6G security. This paper will offer value to anyone who is paying attention to the security issues in 6G.

  • articleFree Access

    6G and the Internet of Things: Topic Analysis

    Since the commercialization of the 5G network, the number of research papers related to 6G IoT has increased rapidly due to researchers’ growing interest in next-generation technologies, 6G networks, and IoT technology. Due to the rapidly growing number of research papers in this area, it is difficult to grasp the overall research directions and topics. Therefore, this study has suggested a method of efficiently identifying the topics of 6G-related papers using data mining and presents the topics discovered through this technique. As a result, we extracted nine topics from 623 papers on 6G IoT using the LDA model technique, and we described the studies related to each topic.