Professional Documents
Culture Documents
Several Key Technologies For 6G Challenges and Opportunities
Several Key Technologies For 6G Challenges and Opportunities
Baofeng Ji is with Henan University of Science and Technology,LAGEO, Chinese Academy of Sciences, and the University of Electronic Science and
Digital Object Identifier: Technology of China; Ying Han, Shuwen Liu, Fazhan Tao, Gaoyuan Zhang, Zhumu Fu are with Henan University of Science and Technology;
10.1109/MCOMSTD.001.2000038 Chunguo Li is with Henan University of Science and Technology and Xizang Minzu University.
feedback
Secure wireless
Propose an efficient algorithm to Applying the alternating
communication via One user; one Passive Outperform a heuristic
obtain high-quality suboptimal optimization and semidefinite
intelligent reflecting eavesdropper (Eve) beamforming scheme
solution relaxation methods.
surface
MISO wireless
Maximize the spectral efficiency; Large-scale IRSs is more
communication systems Passive Jointly optimize the Access
One user; one Eve solve the resulting non-convex efficient than increasing
via intelligent reflecting scatter Point and the IRS phase shifts
optimization problem the antenna array size
surfaces
Intelligent reflecting
High rates and/or large IRS needs hundreds of
surface vs. decode-and- One user,single input
Scatter metasurfaces are needed to Comparing DF relaying to IRSs reconfigurable elements to
forward: are large surfaces single output (SISO)
outperform DF relaying be competitive
needed to beat relaying?
the proposed error-based aggregation rules have Gai and co-author in [14] shared the privacy
stronger anti-attack ability and lower computa- protection scheme of IoT edge computing based
tional complexity in different private scenarios. It on blockchain technology using differential pri-
is a system to solve privacy, security, and perfor- vacy technology in the blockchain system to
mance issues. Network sharding is an on-chain achieve task allocation, privacy protection, and
capacity expansion technology. Through mod- anti-tampering functions, effectively preventing
eling the blockchain network sharding, research illegal attacks. Moreover, in the big environment
shows that under a certain degree of credibility, of medical data sharing, blockchain can be used
blockchain network sharding can reach the opti- to protect the security of cloud medical data.
mal scale and realize the sharding network. The In addition to security, a blockchain-based
development from credibility to credibility of the decentralized control mechanism can establish
entire network and the evolution of a more large- direct communication links between network enti-
scale fragmented network credibility solution is ties, which not only reduces management costs,
analyzed. but also improves spectrum efficiency [15]. More-