Deep Learning in the Ubiquitous Human–Computer Interactive 6G Era: Applications, Principles and Prospects
Abstract
:1. Introduction
1.1. Background
1.2. Related Works
1.3. Main Contributions and Outline
2. Applications and Challenges of the Envisioned 6G Context
2.1. Typical Application Scenarios
- Next-generation mobile communications. Owing to the vision of ubiquitous human–computer interaction, mobile communications still occupy the dominant position in 6G and conventional cellular phones will continue to play a pivotal role. Challenges may come from several aspects: First, raising the network coverage in a prompt and cost-effective manner. Second, maintaining a super-speed data rate and lower transmission latency with highly reliable connections. Third, expanding the battery duration of mobile devices. Fourth, decreasing the cost of mobile communication. Fifth, accomplishing a systematic design to integrate features of security, secret and privacy, as well as effectively addressing the aforementioned challenges.
- Holographic communications. 6G is expected to convert traditional video conferences into virtual immersive interactive meetings, which need to transmit holographic data with negligible latency. In this scenario, an unprecedentedly large bandwidth is a necessity due to the fact that three-dimensional images and stereo audio need to be conveyed and reconfigured as required.
- Tactile Communication. In addition to the visual and auditive data, haptic data can further enhance the interactivity of virtual immersive applications. Tactile communication can capacitate the real-time remote exchange of haptic data. Typical applications cover healthcare, teleoperation and collaborative automatic driving, where the 6G-enabled tactile communication network can be a high-speed channel as part of the control loop. For example, healthcare applications like remote robot surgeries rely heavily on 6G-powered IoT (Internet of Things). Diversified network nodes and devices are integrated to accommodate healthcare applications, which propose high demand on reliability and latency of the communication network [28]. Meticulous cross-layer orchestration should be performed to reshape the communication network such that the strict constraints of these applications can be satisfied. For instance, novel physical layer solutions should be proposed to redesign the underlying circuits of the communication system. All delay sources should be elaborately reviewed throughout the communication protocol stack.
- Human bond communications. Since 6G is supposed to be the cornerstone of human-centric communications, the concept of human bond communications is to enable users to interact with devices with the human five senses or even breathing. Consequently, the devices may recognize human bio-profile and biological features in a remote manner. Moreover, hybrid communication technologies are required to not only identify and replicate human biological features but also convert the features into various physical signals and transmit them.
- Efficient indoor positioning. Nowadays, outdoor positioning is proven to be full-blown and accurate in common application scenarios. Nevertheless, indoor positioning is yet in its infancy, due to the complicated indoor electromagnetic environment [29,30]. Precise and robust indoor positioning technologies will thoroughly reinvent the living habit of mobile users and create new increasing spots of economic boom. Additionally, the academic and industrial communities are reaching a consensus that mere RF (Radio Frequency) communication technologies cannot meet the demands put forwards by indoor positioning. By contrast, novel non-RF communication technologies are already in the vision of the 6G era.
- High-quality on-board communication. Despite the significant success of 4G and 5G, on-board communication is still a challenging topic. The quality of onboard communication is hampered by enormous factors, including high-speed motion, Doppler shift, frequency handover, insufficient coverage, etc. Satellite communications endow onboard communication with an acceptable quality of service, yet the cost is excessively high, especially under in-flight environments. High-quality on-board communication requires both innovative communication technologies and brand-new network architectures.
2.2. Arising Challenges
2.2.1. Broad Bandwidth and High Transmission Rate
- Limitations on the traditional carrier wave technologies. In the past decades, research works on mobile communications mainly concentrated on the microwave band or an even narrower band, which is dedicated to boosting spectrum efficiency using a relatively low frequency. In this era, representative solutions include CDMA (code-division multiple access), OFDM (orthogonal frequency-division multiplexing), multi-level modulation, etc. On one hand, such solutions have raised spectrum efficiency; on the other hand, performance improvement is increasingly impeded by physical limits.
- mmWave and THz communication: advantages and challenges. Adopting broader bandwidth becomes an inevitable routine to further increase the data rate and capacity. Higher frequency spectra like mmWave and THz wave band will enable unprecedentedly broader bandwidth for 6G [19,20]. However, mmWave and THz wave are facing unneglectable challenges like signal attenuation and RF chips.
2.2.2. Latency and Reliability
- The perspective of carrier wave and coding. Resource scheduling costs account for unneglectable latency in wireless communication. GF (Grant-Free) resource allocation [38] has been proposed by 3GPP (3rd Generation Partnership Project) [39], which is dedicated to accommodating low latency transmission in both uplink and downlink. In terms of uplink, it is a problem of CG (Configured Grant); with regards to downlink, it is Semi-Persistent Scheduling. In CG, UE (User Equipment) sends data through PUSCH (Physical Uplink Shared Channel) resources with the absence of requesting from the gNB (gNodeB). The PUSCH resources are configured and assigned to UEs in advance via downlink control messages. A downlink control message can be a DCI (Downlink Control Signal) or RRC (Radio Resource Control) signaling. This circumvents signal exchanging, like SR (Scheduling Request) or BSR (Buffer Status Report). Such signal exchanging can otherwise induce higher latency. In the era of 5G, the 2-step RACH (Random Access Channel) procedure is introduced to transmit data over shared resources with a higher data rate [40]. Nevertheless, this method merely works in initial access and is not available for data transmission during the connected mode. Alternative representative methods include a repetitive transmission [41], NOMA (Non-Orthogonal Multiple Access) [42,43] and advanced receivers [44]. The former two methods can achieve acceptable performance when network traffic is low yet face dramatic performance degradation under intensive traffic. Despite the advances, receivers are confronted with increased hardware complexity and power consumption hinder its wide application.
- Propagation environment. In order to achieve URLLC for eMBB (enhanced Mobile Broadband) and mMTC (massive Machine-Type Communication), spectrum efficiency are indispensable issues. However, the tradeoff among reliability, latency and spectrum efficiency is a challenging task. Enormous researchers have proposed solutions to address the challenge. For instance, new air interface accesses like cell-free with massive multiple-input multiple-output, non-orthogonal multiple accesses, and rate-splitting multiple accesses. These solutions mainly focus on the transmitter and/or receiver side [23]. Nevertheless, the performance improvement may be limited by the propagation environment. IRS is a recently emerged solution to address this issue. IRS can adapt to the propagation environment in a cost-effective and energy-efficient way. Whereas, it is not a trivial job to integrate IRS into the wireless network architecture. Moreover, the design and optimization of the IRS is a daunting job due to the high complexity [24].
- NFV-level tradeoff. Challenges to latency issues come from not only the radio-wave level but also the application level [45]. NFV (Network Function Virtualization) is a promising technology in the emerging 6G era [46]. NFV can leverage general-purpose hardware to virtualize network functions like routers and firewalls, which conventionally rely on dedicated hardware. With the growing adoption of URLLA (Ultra-Reliable Low Latency Applications) in the next-generation wireless networks, reliability and latency are increasingly important in a NFV context. However, efforts on optimizing reliability and latency typically face a dilemma, due to the fact that the two-performance metrics are somewhat in opposition to each other. Although the optimization can be formulated as an integer linear programming problem [47,48,49], the solving process is excessively time-consuming.
2.2.3. Energy Efficiency
- 1.
- 2.
- The tradeoff between energy efficiency and other performance metrics. Low power dissipation and long battery duration are two research priorities in 6G. However, optimizing the power consumption of 6G devices is a daunting task due to the fact that power consumption and other performance metrics may have negative effects on one another [26]. For example, the tradeoff between power efficiency and spectral efficiency is probably an eternal problem in wireless communication, including 6G.
2.2.4. Security
- 1.
- Physical layers. A sheer number of research works propose to integrate newly emerged underlying technologies like THz communication, VLC (Visible Light Communication) and quantum computing to address security and privacy concerns. Such integrations are rooted in the physical layer. Nevertheless, some new threats arise due to the physical features of the new technologies [54]. In the frequency band of THz, the signal exhibits high directionality and enables LoS (Line of Sight) transmission. Unfortunately, an eavesdropper can set an object in the transmission path to scatter the radio wave to him [55]. Thus, THz communication is vulnerable to access control attacks and data theft. In addition to THz communication, VLC is also a promising support technology of 6G due to its advantages such as resistance to interference, high availability of spectrum and high transmission speed. However, VLC is also prone to eavesdropping due to its broadcasting nature and inherent LoS propagation.
- 2.
- Network information layers. In terms of the network information layer, tremendous novel network-layer technologies are already adopted in 5G. Such technologies are widely believed to still play indispensable roles in the envisioned 6G. Representative technologies include NFV, SDN (Software-Defined Networking), cloud computing, etc. However, SDN may be confronted with threats such as exposure of sensitive APIs (Application Programming Interfaces) to unauthorized software and DoS (Denial of Service) attacks [56]. Another instance is source location exposure. The envisioned physical-cyber continuum will open the way to social IoT, which involves the entire human society and facilitates the continuum with novel services [57]. However, such services may allow the acquisition of ubiquitous data flows and induce the risk of source location exposure. Such location exposure of assets or other targets may result in vulnerability to network attacks.
- 3.
- Application layer. On the application layer, the 6G applications typically collect and transmit sensitive and crucial data. Undoubtedly, the security and privacy issues of the forthcoming 6G networks should be tackled.
2.2.5. Edge Computing
- Heterogeneity and variability. An increasing number of computational resources are accumulating among the edge nodes due to the constant performance enhancement of mobile devices. High QoS (Quality of Service) and efficient utilization of decentralized resources rely on the adaptive and real-time schedule of heterogeneous resources. However, resource heterogeneity, dynamic network status and strict performance constraints significantly challenge resource scheduling.
- Mobility and dependability. The 6G network should facilitate high-motion application scenarios, including vehicular networks and aerial networks. In such circumstances, the network nodes are in constant motion. Therefore, it is a daunting job to guarantee URLLC due to the fact that the network topology is time-varying, and the channels are unstable. Novel solutions are yet to be investigated to ensure the reliability of services for mobile network nodes in the dynamic context.
- Security and confidentiality. In the envisioned 6G network, the edge nodes will accumulate a large amount of data. These data can be not only the foundation for improving the network performance but also an inducement of malicious attacks and privacy violations. Novel security and privacy protection schemes are imperative necessities with regard to 6G edge computing.
2.2.6. Heterogenous Service Request Handling
3. Investigation of Existing Works
3.1. IRS and Spectrum Efficiency
- 1.
- Intelligent Reflecting Surface. The forthcoming 6G era is expecting various burgeoning human–computer interactive applications, including not only immersive applications like metaverse but also IoT applications like V2X (Vehicle to Everything) applications. Facing the unparalleled challenges put forward by ultra-high-speed communications and tremendous IoT linkages, THz MIMO-NOMA (massive multiple-input-multiple output non-orthogonal multiple access) has been proven to be an indispensable technology for 6G [60]. The THz MIMO-NOMA system leverages a large-scale antenna array supported by hybrid beamforming infrastructure, which can significantly alleviate attenuation on the THz bands and decrease the hardware complexity and energy consumption. Moreover, users can be categorized into clusters pursuant to the spatial correlation and every cluster is accommodated by a single RF (radio frequency) chain. This clustered mechanism can markedly boost spectral efficiency and connective density. User categorizing can be achieved through clustering algorithms [61,62]. Nevertheless, due to high sensitivity to obscuration, the THz MIMO-NOMA network may be degraded by instability and intermittence caused by either building blockage or life-body blockage. Such instability and intermittence can affect the user experience of reliability-demanding 6G immersive applications. Fortunately, the IRS is a prospective solution to conquer the problems. IRS can dynamically achieve beamforming and thus circumvent blockage by building virtual LoS (Line of Sight) connectivity between transmitters and receivers. Moreover, an intelligent radio context can be set up to observably improve spectrum and power efficiency, as well as induce adaptive scheduling. Currently, IRS has been successfully applied in low-frequency MIMO-NOMA networks. Unfortunately, it is infeasible to directly transplant existing solutions to 6G THz MIMO-NOMA networks. First, existing IRS schemes are unable to handle extraordinarily heterogenous quality-of-service (QoS) demands of 6G users, due to the fact that 6G networks must capacitate diversified devices and services. Second, THz MIMO-NOMA communications are facing a significantly higher probability of unreliability than low-frequency MIMO communications. Third, THz MIMO-NOMA networks conventionally contain high-dimensional channel information. Consequently, the existing centralized and iteratively optimized schemes will result in extremely high complexities and data exchange costs under the unprecedentedly complex THz MIMO-NOMA scenario.
- 2.
- Spectrum efficiency. IRSs and enabling techniques like beamforming and DoA estimation build the physical foundations of broad bandwidth and high data rates. In order to fully utilize this underlying support, spectrum efficiency is another vital issue.
3.2. Ultra-Low Latency and Reliable Communication
- 1.
- Concerns on URLLC. Next-generation communication technologies like 6G highlight the scenario of URLLC. URLLC is indispensable for the development of diversified prospective applications including non-terrestrial communication networks, virtual reality, augmented reality, extended reality, automatic driving, all-region emergency communication, tactile Internet and industrial automatic control. In the traditional communication network, random latency in upper network layers contributes a large fraction to the end-to-end delay. Typical causes of such random latency include queuing, data processing and access delay, while the transmission latency only occupies a minor percentage of the end-to-end delay.
- 2.
- Radio access and diversity. Filali et al. propose a scheme to achieve URLLC in O-RAN (open radio access network), where the latter is a promising mechanism of computational and communication resource sharing in the network slicing [66]. The network slicing problem is modeled as a single-agent Markov decision process. Subsequently, the process is resolved using deep reinforcement learning. Aiming at URLLC services, both computation slicing and communication slicing should be efficiently accomplished, even if the network contains enormous devices. In order to conquer this predicament, DRL is an efficient solution due to the fact that DRL is capable of handling the curse of dimension.
- 3.
- Data processing. Works of [66,68] explore URLLC from the perspective of radio waves and antennas. Based on these works, data processing latency can be further investigated, which is liable to be neglected by conventional research works. Works of [69,70] investigated over the Air Computing [71,72] and data processing latency optimization, respectively.
- 4.
- Geographical coverage and pervasive context. In some time-critical applications like Holographic data transmission, merely “low” latency is not sufficient. Instead, the latency should be “deterministic” and thus ensure reliability. Yu et al. elaborate on the upcoming DetNet-enabled ITNTN (Deterministic Networking enabled Integrated Terrestrial and Non-Terrestrial) and discuss the interaction among bandwidth, latency and computational power [67]. Under the support of NTN (Non-Terrestrial Networks), traffic flows generated by terrestrial network nodes can travel along routines that may comprise UAVs (Unmanned Aerial Vehicles), satellites and aerial platforms like aerostat. The NTN nodes may form uncongested paths compared to the terrestrial network nodes. However, it is a non-trivial job to ensure deterministic performances even if in terrestrial networks. It is even more challenging to obtain determinacy in NTNs. Fortunately, DNSR (Deterministic Network Selection and Routing) is supposed to be a memoryless process, and thus can be modeled as status transitions along Markov chains within a state space. Consequently, they propose a DRL-based scheme for DNSR. The end-to-end latency of integrated holographic flows can be confined to a deterministic range. The aerial platforms are also known as HAPS (High Altitude Platform Stations) [74].
3.3. Energy Efficiency
- 1.
- Energy efficiency under the background of a smart city. A smart city is a typical scenario of the envisioned interactive 6G era, where ultra-dense networks are widely deployed. Despite that, UDN (Ultra-Dense Network) has significant advantages, but a boom in power consumption seriously hinders the practical deployment of UDNs. High power consumption induced by the dense deployment of tiny cells has become a key barrier to the target of UDNs, namely achieving a throughput growth of two orders of magnitude in 5G/6G networks. Recently, the sleep mode technique has been proposed in academia. This technique decreases the power consumption of BS by selectively powering off the light-loaded BSs. Nevertheless, it is a challenging task to dynamically determine and convert the modes (working/sleeping) of BSs. The reason lies in the fact that decision-making is extremely time-consuming and frequent mode alterations of enormous tiny cells result in nonnegligible time and power costs. Ju et al. adopt deep QNet to decrease the power consumption of UDNs [76]. They propose a decision selection network to filter inappropriate mode alterations from the action space of QNet model: a feasibility test is used to eliminate the mode alteration that disobeys the rate constraints; the energy test is used to avoid the mode switching that induces excessive power consumption. Experiments show that this scheme can achieve significantly lower power consumption under the rate constraints.
- 2.
- UAV-assisted communication. UAV-assisted stations or relay nodes can conquer terrain limitations, and thus achieve high flexibility for human–computer interaction. However, it is challenging to integrate UAVs into the communication network due to their limited battery capacity.
3.4. Security
- Physical layer. Despite that, interactive 6G applications exhibit significant diversity, security of applications essentially relies on hardware security. Due to the dramatic progresses of programmable meta-material technologies, spectral and power efficiency is increasingly important. It has been an active research topic of 5G/6G networks to integrate IRS into SWIPT (simultaneous wireless information and power transfer) systems [81]. Moreover, an IRS-based SWIPT system is facing security vulnerabilities that can be readily leveraged by eavesdroppers. Thien et al.’s research on the physical-layer security and transmission optimization problems of an IRS-based SWIPT system [82]. And, they presume that a PS (power-splitting) scheme is deployed in the UE. The aim of their research is to maximize the system secrecy rate through jointly optimizing the following variables: transmitter power, PS factor of UE and IRS phase shifts matrix. And, the optimization is accomplished under the constraints of minimum harvested energy and maximum transmitter power. They put forward an AO (alternative optimization)-based scheme to resolve the optimal solutions. The AO-based scheme is an effective solution to either convex or non-convex problems. Nevertheless, this scheme typically induces high time complexity and overhead, due to the fact that enormous mathematic transformations are performed, and a larger number of iterations are required before convergence. As a result, the authors adopt deep learning to train a deep FFN (forward feedback network) model based on labeled data obtained by the AO-based scheme. The deep-learning-based scheme can achieve similar performance to its AO-based counterpart, yet with dramatically low time cost.
- Networking layer. The heterogeneity of interactive applications necessitates SDN (software-defined networks) and NFV (network function virtualization). Furthermore, SDN and NFV are the foundations of network slicing, which is a promising solution for dealing with heterogeneity. Since network slices must share limited resources, energy efficiency, security and QoS are extremely important performance metrics. As a result, it is vital to address the energy/security/QoS issues under SDN/NFV-aided 6G network slicing environment. However, security is a challenging issue in 6G, due to the fact that traditional methods are not directly portable to 6G networks. Abdulqadder et al. propose a 6G-oriented security scheme based on various state-of-the-art technologies [83]. Firstly, GAN (Generative Adversarial Network) is adopted to achieve deep network slicing. Concretely, GAN can predict the suitable slice and connections for network traffic, pursuant to the capacity, priority and QoS requirements of the slice. Moreover, the DAG (Directed Acyclic Graph) based blockchain technology is integrated to ensure security. The DAG blockchain replaces conventional consensus with the PoS (proof of space) algorithm and conquers the constraints on elasticity and resource overhead in traditional blockchains. Aiming at stronger security, the proposed scheme uses context-aware authentication and secure handover, where the former is based on Markov Decision Making and the latter relies on Weighted Product Model. Afterwards, intrusion packet classification and packet migration are utilized to alleviate the heavy workload on the SDN controllers and switches. The classification and migration are implemented by HyDNT (Hybrid Neural Decision Tree) and HPoHO (Hybrid Political Optimizer with Heap-based Optimizer), respectively. Eventually, the SAC (Soft Actor Critic) algorithm is leveraged to predict the load.
- Application layer. Despite that, VR and AR can provide an immersive interactive environment, interactions ultimately occur between humans and the real physical world. Moreover, almost any device integrated into the 6G network can interact with users, including traditional industrial devices. However, traditional industrial devices are inherently pregnable to cyberspace attack, when integrated into the 6G network.
3.5. Edge Computing
- 1.
- Caching. Efficient edge-side caching is a cornerstone of edge computing. To address the urgent challenges to IoT applications, edge-side caching has been proven to be a prospective method to boost application performance in terms of time overhead and power consumption. Whereas, cache capacity is limited in edge-computing scenarios. Moreover, user preferences are frequently changing over both minor and large time scales under real time and interactive contexts, like Twitter and Meta. It is still a challenging task to set up an efficient universal caching framework for diversified user requirements. Nyuyen et al. design a novel content caching scheme to ensure a high-hit ratio through adaptive prediction in variant network and user context [88]. They adopt a hierarchical online learning framework to support a proactive content caching control scheme and thus achieve adaptive caching. This scheme can handle the frequent fluctuations in content popularity and user preference. The online learning framework comprises local LSTM learning, as well as ensemble meta-learning. With the assistance of STL (seasonal-trend decomposition and loess)-based preprocessing, the LSTM is used to extract temporal-specific features and deal with the time fluctuations in popularity. As a result, the dynamic content preferences of each user group are identified in real time. Subsequently, a regression-based meta resembling learning method is adopted to convert the previously resolved multiple demographic user preferences into a unitary online caching scheme. This scheme relies on an online convex optimization framework and achieves sublinear-regret performance.
- 2.
- Node/edge server selection. Node/edge server selection is an important problem in terms of the collaboration among edge nodes and edge servers (like task offloading), etc.
- 3.
- Task offloading. Edge computing has recently witnessed dramatic progress in both academia and industry. In addition, edge computing is believed to be a prospective scheme to improve the information processing ability of edge devices for the 5G/6G networks. Owing to the wide application of enormous low-power dissipation intelligent devices and the rapid increase of data volume, it is a vital job to offload intensive computation to edge devices. Aiming at jointly leveraging the advantages of both deep RNN and LSTM, Kashyap et al. propose the DECENT framework (Deep-Learning-Enabled green Computation for Edge centric Next generation 6G Networks) [94]. They model data offloading as a Markov decision process. Since the 6G network accounts for countless states and actions, it is a daunting job to record entire Q-values in a table. They adopt LSTM to simplify the original state-action space and produce an approximate state-action space. Moreover, this process jointly optimizes the following performances: power consumption, computation overhead and offloading rate for network utility in the 6G context. This proposed algorithm boosts the training stage and achieves a higher convergence speed.
- 4.
- Decentralized learning and pervasive intelligence. The rapid development of artificial intelligence has dramatically boosted the evolution of wireless networks. As a promising technology, 6G will undoubtedly induce a revolution of wireless networks from “connected devices” to “connected intelligence”. AI/data-driven technologies are essential to almost every 6G applications [96]. Nevertheless, mainstream deep-learning techniques typically demand massive computational resources and high communication bandwidth and thus induce non-negligible time overhead, power consumption and privacy risks. By integrating machine learning abilities into the network edge, AI-enabled edge devices rise up as a ground-breaking solution to fuse diversified cutting-edge technologies including digital sensors, next-generation communication, computation and AI. Letaief et al. show a vision for adaptive and reliable edge AI systems, with integrated consideration of wireless communication solutions and distributed machine learning models (FL, decentralized learning and model split learning) [97]. They propose new design standards for wireless networks, service-driven resource allocation strategies and a supportive framework for edge AI. Moreover, they also discuss standardization, platforms and application context, facilitating industrialization and commercialization.
3.6. Heterogenous Service Requests
- 1.
- SDN and VNF. IoT vertical applications supply out-of-the-box utilities to address the challenges raised by diversified domains. Such vertical applications enjoy broad prospects yet put forward requirements in latency awareness, privacy protection and scalable intelligence. With the rapidly increasing amount of IoT links, intelligent and real-time-deployable VNF configurations will set the cornerstone for the persuasive network context. Emu et al. comprehensively take into consideration the prospective service configuration requirements [99]. They emphasize the urgency of surpassing the conventional service deployment architecture and propose to allocate VNFs using edge cloudlet mini-scale data center. Emu et al. systematically integrate various technologies to achieve automatic VNF configuration and apply deep learning to enhance the VNF configuration model. This model opens a new way to handle 6G-network challenges through deep learning.
- 2.
- Network slicing. As is aforementioned, the transition from the 4G/5G to 6G is evolving from “connected devices” to “connected intelligence”. As a result, 6G networks inevitably face enormous application requirements, which may be significantly different. For example, a smart sensor network typically puts forwards high demand on network capacity while being tolerant to low bandwidth and high latency. By contrast, autopilot systems require an instantaneous response. In other words, 6G networks must simultaneously hold various applications that may raise different or even contradictory QoS (quality of service) requirements. Network slicing enables 6G to answer the challenge by establishing multiple virtual networks on a single hardware infrastructure. We can ensure QoS by reconfiguration and optimization of the networks. Machine-learning-enabled 6G networks can achieve intelligent decision-making and efficiently handle slice failures. Khan et al. propose a slicing model using CNN and LSTM. CNN supports accurate slice assignment to both known and unknown devices and copes with slice failure. LSTM is used to predict slice requests, the workload of the network and the probable slice failure [100]. Simulation on NS2 validates the performance of the proposed model.
4. Problem Study
4.1. Systematic Concerns
4.2. Source of Training Data
4.3. Relationship between Analytical and Deep Learning Methods
4.4. Frequently Used Techniques
5. Open Problems
- Material of chip manufacture. Nowadays, it is almost a consensus of both academia and industry that THz communication will be the cornerstone of 6G. However, traditional electronic chips are facing barriers due to their physical limitations. Currently, the THz chips are hindered by some serious disadvantages including but not limited to the following: constrained data rate, crosstalk, scattering loss and inadequate tunability. Phototunable topological photonics open a way to rescue this situation. Future practical 6G communication relies on the fundamental support of semiconductor technologies [105] or even nano technologies [106]. CMOS (complementary metal oxide semiconductor) is a promising type of material for photonic chip manufacture. In the work of [107], an optical governable demultiplexer is achieved through topological protection and a critically coupled high-quality cavity. And thus, two carrier-waves can be modulated into signals with the absence of crosstalk. This demultiplexer is built using a Silicon Valley photonic crystal and can enhance compatible THz communications. Furthermore, integrating photonic components into a single chip is still a challenging task [108].
- Stable THz Source. The stable THz source is indispensable to precision-demanding THz applications such as tactile communications, millimeter wave radar and onboard communications. Nonetheless, constructing stable and precise THz sources is a challenging task in terms of ensuring low-phase noise and sufficient frequency stability. The work of [109] applied photonic technologies and designed a THz synthesis solution to achieve optical frequency comb stabilization within the THz region.
- THz signal demultiplexing. Due to the massive-connection vision of 6G communications, frequency bands are becoming scarce resources. Schemes like MIMO (multi-input and multi-output) adopt space-division multiplexing to pursue full utilization of the spectrum. Nevertheless, simultaneous signal transmission using closely spaced frequencies conventionally results in spectral congestion and induces problems like crosstalk. The BSS (blind source separation) can distinguish and recover unknown signals out of their mixture, with minimum prior knowledge. Existing traditional electronic BSS solutions can only work efficiently under narrow-band and low-frequency scenarios. Due to the physical limitation of RF (radio frequency) technology, electronic BSS is impeded to handle broad-bandwidth applications. The work of [110] explored the advantages of optical communication and proposed a mirroring-weight-bank-based BSS chip which achieves high-resolving power.
- Incurred security issues in the channel. Under the THz communication environment, broad bandwidth and high frequency induce some unneglectable challenges to be investigated. Such challenges include but are not limited to the following. First, high-grain antenna design; second, atmospheric attenuation during high-frequency propagation; third, radio wave scattering and material absorption. Such challenges require novel solutions, yet potential solutions may induce even new challenges. For instance, the Silicon-CMOS-based dense reflect arrays can be a promising scheme to reshape the propagation environment and resolve the issue of the THz wave blockage [111]. Nevertheless, the reflect arrays may be vulnerable to new security threats like meta-surface in the middle attack.
- Potential deep-learning-enabled directions. Deep learning methods are almost applicable to all realms due to the current empirical paradigm. With regards to the material composition of chips, the novel CMOS material is critical for high-frequency chip manufacture. Nevertheless, the trial-and-error cost is significantly high in traditional material science and engineering. Fortunately, the work of [112] has proven the feasibility of generating and screening semiconductor materials via GAN-based deep learning.
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Filali, A.; Nour, B.; Cherkaoui, S.; Kobbane, A. Communication and Computation O-RAN Resource Slicing for URLLC Services Using Deep Reinforcement Learning. IEEE Commun. Stand. Mag. 2023, 7, 66–73. [Google Scholar] [CrossRef]
- Dang, S.; Amin, O.; Shihada, B.; Alouini, M.-S. What Should 6G Be. Nat. Electron. 2020, 3, 20–29. [Google Scholar] [CrossRef] [Green Version]
- Wang, M.; Zhu, T.; Zhang, T.; Zhang, J.; Yu, S.; Zhou, W. Security and privacy in 6G networks: New areas and new challenges. Digit. Commun. Netw. 2020, 6, 281–291. [Google Scholar] [CrossRef]
- Singh, D. Features Architecture and Security Issues in 5G and 6G Communication. In Proceedings of the 2022 8th International Conference on Signal Processing and Communication (ICSC), Noida, India, 1–3 December2022. [Google Scholar]
- Porambage, P.; Gur, G.; Osorio, D.P.M.; Liyanage, M.; Gurtov, A.; Ylianttila, M. The Roadmap to 6G Security and Privacy. IEEE Open J. Commun. Soc. 2021, 2, 1094–1122. [Google Scholar] [CrossRef]
- Sheng, M.; Zhou, D.; Bai, W.; Liu, J.; Li, J. 6G Service Coverage with Mega Satellite Constellations. China Commun. 2022, 19, 64–76. [Google Scholar] [CrossRef]
- Lu, Y.; Zheng, X. 6G: A Survey on Technologies, Scenarios, Challenges, and the Related Issues. J. Ind. Inf. Integr. 2020, 19, 100158. [Google Scholar]
- Patil, A.; Iyer, S.; Pandya, R.J. A Survey of Machine Learning Algorithms for 6G Wireless Networks. arXiv 2022, arXiv:2203.08429. [Google Scholar]
- Salh, A.; Audah, L.; Shah, N.S.M.; Alhammadi, A.; Abdullah, Q.; Kim, Y.H.; Al-Gailani, S.A.; Hamzah, S.A.; Esmail, B.A.F.; Almohammedi, A.A. A Survey on Deep Learning for Ultra-Reliable and Low-Latency Communications Challenges on 6G Wireless Systems. IEEE Access 2021, 9, 55098–55131. [Google Scholar] [CrossRef]
- Yoo, J.H.; Jeong, H.; Lee, J.; Chung, T.-M. Open problems in medical federated learning. Int. J. Web Inf. Syst. 2022, 18, 77–99. [Google Scholar] [CrossRef]
- Mucchi, L.; Shahabuddin, S.; Albreem, M.A.; Abdallah, S.; Caputo, S.; Panayirci, E.; Juntti, M. Signal Processing Techniques for 6G. J. Signal. Process. Syst. 2023, 95, 435–457. [Google Scholar] [CrossRef]
- Brahma, D.W.P.P.; She, Y. Why deep learning works: A manifold disentanglement perspective. IEEE Trans. Neural Netw. Learn. Syst. 2016, 27, 1997–2008. [Google Scholar] [CrossRef] [PubMed]
- Bayle, M.R.Y.; Hanna, P. SATIN: A persistentmusical database for music information retrieval and asupporting deep learning experiment on song instrumentalclassification. Multimed. Tools Appl. 2019, 78, 2703–2718. [Google Scholar] [CrossRef]
- Chua, T.J.; Yu, W.; Zhao, J. Resource Allocation for Mobile Metaverse with the Internet of Vehicles over 6G Wireless Communications: A Deep Reinforcement Learning Approach. In Proceedings of the 2022 IEEE 8th World Forum on Internet of Things (WF-IoT), Yokohama, Japan, 26 October–11 November 2022. [Google Scholar]
- Cao, J.; Zhu, X.; Sun, S.; Wei, Z.; Jiang, Y.; Wang, J.; Lau, V.K. Toward Industrial Metaverse: Age of Information, Latency and Reliability of Short-Packet Transmission in 6G. IEEE Wirel. Commun. 2023, 30, 40–47. [Google Scholar] [CrossRef]
- Beniiche, A.; Rostami, S.; Maier, M. Society 5.0: Internet as if People Mattered. IEEE Wirel. Commun. 2022, 29, 160–168. [Google Scholar] [CrossRef]
- Mucchi, L.; Jayousi, S.; Caputo, S.; Paoletti, E.; Zoppi, P.; Geli, S.; Dioniso, P. How 6G Technology Can Change the Future Wireless Healthcare. In Proceedings of the 2020 2nd 6G Wireless Summit (6G SUMMIT), Levi, Finland, 17–20 March 2020. [Google Scholar]
- Gupta, M.; Jha, R.K.; Sabraj, M. Touch-Interfacing Middleware Network Design in 6G. In Proceedings of the 2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS), Bangalore, India, 3–8 January 2023. [Google Scholar]
- Tang, F.; Chen, X.; Zhao, M.; Kato, N. The Roadmap of Communication and Networking in 6G for the Metaverse. IEEE Wirel. Commun. 2022, 1–15. [Google Scholar] [CrossRef]
- Azari, M.M.; Solanki, S.; Chatzinotas, S.; Bennis, M. THz-Empowered UAVs in 6G: Opportunities, Challenges, and Trade-offs. IEEE Commun. Mag. 2022, 60, 24–30. [Google Scholar] [CrossRef]
- Okazaki, H.; Suzuki, Y.; Suyama, S.; Asai, T. THz Transport Technologies and Strategists Beyond 5G 6G Systems. In Proceedings of the Optical Fiber Communication Conference (OFC) 2022, San Diego, CA, USA, 6–10 March 2022. [Google Scholar]
- Qi, F.; Li, W.; Yu, P.; Feng, L.; Zhou, F. Deep learning-based BackCom multiple beamforming for 6G UAV IoT networks. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 50. [Google Scholar] [CrossRef]
- Zhao, X.; Zhang, Y.-J.A. Joint Beamforming and Scheduling for Integrated Sensing and Communication Systems in URLLC. In Proceedings of the GLOBECOM 2022—2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 4–8 December 2022. [Google Scholar]
- Almekhlafi, M.; Arfaoui, M.A.; Assi, C.; Ghrayeb, A. Enabling URLLC Applications Through Reconfigurable Intelligent Surfaces: Challenges and Potential. IEEE Internet Things Mag. 2022, 5, 130–135. [Google Scholar] [CrossRef]
- She, C.; Sun, C.; Gu, Z.; Li, Y.; Yang, C.; Poor, H.V.; Vucetic, B. A Tutorial on Ultrareliable and Low-Latency Communications in 6G: Integrating Domain Knowledge Into Deep Learning. Proc. IEEE 2021, 109, 202–246. [Google Scholar] [CrossRef]
- Li, Y.; Wang, F.; Zhang, X.; Guo, S. IRS-Based MEC for Delay-Constrained QoS Over RF-Powered 6G Mobile Wireless Networks. IEEE Trans. Veh. Technol. 2023, 72, 1–16. [Google Scholar] [CrossRef]
- Malta, S.; Pinto, P.; Fernandez-Veiga, M. Using Reinforcement Learning to Reduce Energy Consumption of Ultra-Dense Networks With 5G Use Cases Requirements. IEEE Access 2023, 11, 5417–5428. [Google Scholar] [CrossRef]
- Chang, H.H.; Liu, L.; Yi, Y. Deep Echo State Q-Network (DEQN) and Its Application in Dynamic Spectrum Sharing for 5G and Beyond. IEEE Trans. Neural Netw. Learn. Syst. 2022, 33, 929–939. [Google Scholar] [CrossRef] [PubMed]
- Srinivasu, P.N.; Ijaz, M.F.; Shafi, J.; Woźniak, M.; Sujatha, R. 6G Driven Fast Computational Networking Framework for Healthcare Applications. IEEE Access 2022, 10, 94235–94248. [Google Scholar] [CrossRef]
- Moon, S.R.; Kim, E.S.; Sung, M.; Rha, H.Y.; Lee, E.S.; Lee, I.M.; Park, K.H.; Lee, J.K.; Cho, S.H. 6G Indoor Network Enabled by Photonics- and Electronics-Based sub-THz Technology. J. Light. Technol. 2022, 40, 499–510. [Google Scholar] [CrossRef]
- Sung, M.; Kim, S.; Kim, E.-S.; Moon, S.-R.; Kim, M. Design of RoF-based Fiber-Wireless System for THz-Band 6G Indoor Network. In Proceedings of the 2022 European Conference on Optical Communication (ECOC), Basel, Switzerland, 18–22 September 2022. [Google Scholar]
- Strinati, E.C.; Peeters, M.; Neve, C.R.; Gomony, M.D.; Cathelin, A.; Boldi, M.R.; Ingels, M.; Banerjee, A.; Chevalier, P.; Kozicki, B.; et al. The Hardware Foundation of 6G: The NEW-6G Approach. In Proceedings of the 2022 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), Grenoble, France, 7–10 June 2022. [Google Scholar]
- Nguyen, T.V.; Truong, T.P.; Nguyen, T.M.T.; Noh, W.; Cho, S. Achievable Rate Analysis of Two-Hop Interference Channel With Coordinated IRS Relay. IEEE Trans. Wirel. Commun. 2022, 21, 7055–7071. [Google Scholar] [CrossRef]
- Cicchetti, R.; Petrarca, M.; Perticaroli, S.; Testa, O. A Novel THz CMOS Chip Composed of 64 Antenna-Detectors Array toward 6G Applications. In Proceedings of the 2022 61st FITCE International Congress Future Telecommunications: Infrastructure and Sustainability (FITCE), Rome, Italy, 29–30 September 2022. [Google Scholar]
- Oh, S.; Kim, J.; Oh, J. Sub-THz Switch-less Reconfigurable Triple-/Push-push Dual-band VCO for 6G Communication. In Proceedings of the 2022 IEEE Radio Frequency Integrated Circuits Symposium (RFIC), Denver, CO, USA, 19–21 June 2022. [Google Scholar]
- Zhang, J.; Zhu, M.; Hua, B.; Lei, M.; Cai, Y. 6G Oriented 100 GbE Real-time Demonstration of Fiber-THz-Fiber Seamless Communication Enabled by Photonics. In Proceedings of the 2022 Optical Fiber Communications Conference and Exhibition (OFC), San Diego, CA, USA, 6–10 March 2022. [Google Scholar]
- Singh, R. Silicon THz Topological Photonics for 6G communications. In Proceedings of the 2022 47th International Conference on Infrared, Millimeter and Terahertz Waves (IRMMW-THz), Delft, The Netherlands, 28 August–2 September 2022. [Google Scholar]
- Naeem, F.; Kaddoum, G.; Khan, S.; Khan, K.S.; Adam, N. IRS-Empowered 6G Networks: Deployment Strategies, Performance Optimization, and Future Research Directions. IEEE Access 2022, 10, 118676–118696. [Google Scholar] [CrossRef]
- Seth, S.; Singh, B. Sensing Based Contention Access for 6G Low Latency Networks. In Proceedings of the 2022 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), Grenoble, France, 7–10 June 2022. [Google Scholar]
- Jang, T.; Chae, J.; Cho, J.H. Low-Complexity Equalization of 3GPP High-Speed Train Channel. In Proceedings of the 2022 13th International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 19–21 October 2022. [Google Scholar]
- Dutta, A.; Weber, S. Throughput Optimized Random Access Channel Assignment. In Proceedings of the 2022 58th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 27–30 September 2022. [Google Scholar]
- Zhao, L.; Ma, S.; Chen, W.; Hu, F. Optimal Probabilistic Repetition for Massive MIMO-Aided Grant-Free Short-Packet Transmissions. IEEE Trans. Veh. Technol. 2022, 71, 12407–12412. [Google Scholar] [CrossRef]
- Ramesh, P.; Bhuvaneswari, P.T.V. Non Orthogonal Multiple Access Requirements for 5G and Its Myths. In Proceedings of the 2022 IEEE Delhi Section Conference (DELCON), New Delhi, India, 11–13 February 2022. [Google Scholar]
- Sarkar, D.; Yadav, S.S.; Pal, V.; Yogita; Kumar, N. Intelligent Reflecting Surface Aided NOMA-HARQ Based IoT Framework for Future Wireless Networks. IEEE Trans. Veh. Technol. 2023, 72, 6268–6280. [Google Scholar] [CrossRef]
- Zhu, Y.; Sun, G.; Wang, W.; You, L.; Wei, F.; Wang, L.; Chen, Y. Massive Grant-free Receiver Design For OFDM-based Transmission Over Frequency-selective Fading Channels. In Proceedings of the 2022 IEEE International Conference on Communications (ICC), Seoul, Republic of Korea, 16–20 May 2022. [Google Scholar]
- Erbati, M.M.; Schiele, G. A novel reliable low-latency service function chaining to enable URLLC in NFV. In Proceedings of the 2022 IEEE Ninth International Conference on Communications and Networking (ComNet), Hammamet, Tunisia, 1–4 November 2022. [Google Scholar]
- Liu, M.; Alias, S.B. Cost-Efficient Virtual Network Function Placement in an Industrial Edge System: A Proposed Method. IEEE Syst. Man Cybern. Mag. 2023, 9, 10–17. [Google Scholar] [CrossRef]
- Jia, Z.; Sheng, M.; Li, J.; Zhu, Y.; Bai, W.; Han, Z. Virtual Network Functions Orchestration in Software Defined LEO Small Satellite Networks. In Proceedings of the 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020. [Google Scholar]
- Shoura, F.; Gharaibeh, A.; Alouneh, S. Optimization of Migration Cost for Network Function Virtualization Replacement. In Proceedings of the 2020 21st International Arab Conference on Information Technology (ACIT), Giza, Egypt, 28–30 November 2021. [Google Scholar]
- Umrao, B.K.; Yadav, D.K. Algorithms for functionalities of virtual network: A survey. J. Supercomput. 2021, 77, 7368–7439. [Google Scholar] [CrossRef]
- Mao, B.; Tang, F.; Kawamoto, Y.; Kato, N. AI Models for Green Communications Towards 6G. IEEE Commun. Surv. Tutor. 2022, 24, 210–247. [Google Scholar] [CrossRef]
- Sekaran, R.; Ramachandran, M.; Patan, R.; Al-Turjman, F. Multivariate regressive deep stochastic artificial learning for energy and cost efficient 6G communication. Sustain. Comput. Inform. Syst. 2021, 30, 100522. [Google Scholar] [CrossRef]
- Moon, J.; Kim, S.; Ju, H.; Shim, B. Energy-Efficient User Association in mmWave/THz Ultra-Dense Network via Multi-Agent Deep Reinforcement Learning. IEEE Trans. Green Commun. Netw. 2023, 7, 692–706. [Google Scholar] [CrossRef]
- Shen, S.; Yu, C.; Zhang, K.; Ni, J.; Ci, S. Adaptive and Dynamic Security in AI-Empowered 6G: From an Energy Efficiency Perspective. IEEE Commun. Stand. Mag. 2021, 5, 80–88. [Google Scholar] [CrossRef]
- Kang, M.S. Potential Security Concerns at the Physical Layer of 6G Cellular Systems. In Proceedings of the 2022 13th International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 19–21 October 2022. [Google Scholar]
- Li, J.; Sun, G.; Kang, H.; Wang, A.; Liang, S.; Liu, Y.; Zhang, Y. Multi-Objective Optimization Approaches for Physical Layer Secure Communications Based on Collaborative Beamforming in UAV Networks. IEEE/ACM Trans. Netw. 2023, 1–16. [Google Scholar] [CrossRef]
- Maleh, Y.; Qasmaoui, Y.; Gholami, K.E.; Sadqi, Y.; Mounir, S. A comprehensive survey on SDN security: Threats, mitigations, and future directions. J. Reliab. Intell. Environ. 2022, 9, 201–239. [Google Scholar] [CrossRef]
- Hussain, T.; Yang, B.; Rahman, H.U.; Iqbal, A.; Ali, F.; shah, B. Improving Source location privacy in social Internet of Things using a hybrid phantom routing technique. Comput. Secur. 2022, 123, 14. [Google Scholar] [CrossRef]
- Gao, H.; Huang, W.; Liu, T.; Yin, Y.; Li, Y. PPO2: Location Privacy-Oriented Task Offloading to Edge Computing Using Reinforcement Learning for Intelligent Autonomous Transport Systems. IEEE Trans. Intell. Transp. Syst. 2023, 24, 7599–7612. [Google Scholar] [CrossRef]
- Joshi, P.; Hasanuzzaman, M.; Thapa, C.; Afli, H.; Scully, T. Enabling All In-Edge Deep Learning: A Literature Review. IEEE Access 2023, 11, 3431–3460. [Google Scholar] [CrossRef]
- Xu, X.; Chen, Q.; Mu, X.; Liu, Y.; Jiang, H. Graph-Embedded Multi-Agent Learning for Smart Reconfigurable THz MIMO-NOMA Networks. IEEE J. Sel. Areas Commun. 2022, 40, 259–275. [Google Scholar] [CrossRef]
- He, L.; Ray, N.; Guan, Y.; Zhang, H. Fast Large-Scale Spectral Clustering via Explicit Feature Mapping. IEEE Trans. Cybernet 2019, 49, 1058–1071. [Google Scholar] [CrossRef] [PubMed]
- He, L.; Zhang, H. Doubly Stochastic Distance Clustering. IEEE Trans. Circuits Syst. Video Technol. 2023. Available online: https://ieeexplore.ieee.org/abstract/document/10103699 (accessed on 30 June 2023). [CrossRef]
- Chen, Y.; Yan, L.; Han, C.; Tao, M. Millidegree-Level Direction-of-Arrival Estimation and Tracking for Terahertz Ultra-Massive MIMO Systems. IEEE Trans. Wirel. Commun. 2022, 21, 869–883. [Google Scholar] [CrossRef]
- Fozi, M.; Sharafat, A.R.; Bennis, M. Fast MIMO Beamforming via Deep Reinforcement Learning for High Mobility mmWave Connectivity. IEEE J. Sel. Areas Commun. 2022, 40, 127–142. [Google Scholar] [CrossRef]
- Huang, J.; Yang, Y.; Gao, Z.; He, D.; Ng, D.W.K. Dynamic Spectrum Access for D2D-Enabled Internet of Things: A Deep Reinforcement Learning Approach. IEEE Internet Things J. 2022, 9, 17793–17807. [Google Scholar] [CrossRef]
- Yu, H.; Taleb, T.; Samdanis, K.; Song, J. Towards Supporting Holographic Services over Deterministic 6G Integrated Terrestrial & Non-Terrestrial Networks. IEEE Netw. 2023, 1–10. [Google Scholar] [CrossRef]
- Onishi, T.; Takahashi, E.; Nishikawa, Y.; Maruyama, S. AppDAS: An Application QoS-Aware Distributed Antenna Selection for 5G Industrial Applications. In Proceedings of the 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2023. [Google Scholar]
- Bouzinis, P.S.; Mitsiou, N.A.; Diamantoulakis, P.D.; Tyrovolas, D.; Karagiannidis, G.K. Intelligent Over-the-Air Computing Environment. IEEE Wirel. Commun. Lett. 2023, 12, 134–137. [Google Scholar] [CrossRef]
- Hieu, N.Q.; Nguyen, D.N.; Hoang, D.T.; Dutkiewicz, E. When Virtual Reality Meets Rate Splitting Multiple Access: A Joint Communication and Computation Approach. IEEE J. Sel. Areas Commun. 2023, 41, 1536–1548. [Google Scholar] [CrossRef]
- Frey, M.; Bjelakovic, I.; Stanczak, S. Over-The-Air Computation in Correlated Channels. In Proceedings of the 2020 IEEE Information Theory Workshop (ITW), Riva del Garda, Italy, 11–15 April 2021; pp. 1–5. [Google Scholar]
- Abari, O.; Rahul, H.; Katabi, D. Over-the-air Function Computation in Sensor Networks. arXiv 2016, arXiv:1612.0230. [Google Scholar]
- Sun, Y.; Shao, J.; Mao, Y.; Wang, J.H.; Zhang, J. Semi-Decentralized Federated Edge Learning with Data and Device Heterogeneity. IEEE Trans. Netw. Serv. Manag. 2023, 20, 1487–1501. [Google Scholar] [CrossRef]
- Abbasi, O.; Yadav, A.; Yanikomeroglu, H.; Dao, N.D.; Senarath, G.; Zhu, P. HAPS for 6G Networks: Potential Use Cases, Open Challenges, and Possible Solutions. arXiv 2023, arXiv:2301.08863. [Google Scholar]
- Fantacci, R.; Picano, B. A D2D-Aided Federated Learning Scheme With Incentive Mechanism in 6G Networks. IEEE Access 2023, 11, 107–117. [Google Scholar] [CrossRef]
- Ju, H.; Kim, S.; Kim, Y.; Shim, B. Energy-Efficient Ultra-Dense Network with Deep Reinforcement Learning. IEEE Trans. Wirel. Commun. 2022, 21, 6539–6552. [Google Scholar] [CrossRef]
- Yang, P.; Hou, J.; Yu, L.; Chen, W.; Wu, Y. Edge-coordinated energy-efficient video analytics for digital twin in 6G. China Commun. 2023, 20, 14–25. [Google Scholar] [CrossRef]
- Islam, S.; Zografopoulos, I.; Hossain, M.T.; Badsha, S.; Konstantinou, C. A Resource Allocation Scheme for Energy Demand Management in 6G-enabled Smart Grid. In Proceedings of the 2023 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 16–19 January 2023. [Google Scholar]
- Lee, S.; Lee, H. MUSK-DQN: Multi-UBS Selective-K Deep Q-Network for Maximizing Energy-Efficiency. In Proceedings of the 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2023. [Google Scholar]
- Hassan, S.S.; Park, S.B.; Huh, E.N.; Hong, C.S. Seamless and Intelligent Resource Allocation in 6G Maritime Networks Framework via Deep Reinforcement Learning. In Proceedings of the 2023 International Conference on Information Networking (ICOIN), Bangkok, Thailand, 11–14 January 2023. [Google Scholar]
- Ma, R.; Tang, J.; Zhang, X.; Wong, K.-K.; Chambers, J.A. Energy Efficiency Optimization for Mutual-Coupling-Aware Wireless Communication System based on RIS-enhanced SWIPT. IEEE Internet Things J. 2023. Available online: https://ieeexplore.ieee.org/abstract/document/10032536 (accessed on 10 March 2023). [CrossRef]
- Thien, H.T.; Tuan, P.-V.; Koo, I. A Secure-Transmission Maximization Scheme for SWIPT Systems Assisted by an Intelligent Reflecting Surface and Deep Learning. IEEE Access 2022, 10, 31851–31867. [Google Scholar] [CrossRef]
- Abdulqadder, I.H.; Zhou, S. SliceBlock: Context-Aware Authentication Handover and Secure Network Slicing Using DAG-Blockchain in Edge-Assisted SDN/NFV-6G Environment. IEEE Internet Things J. 2022, 9, 18079–18097. [Google Scholar] [CrossRef]
- Basnet, M.; Poudyal, S.; Ali, M.H.; Dasgupta, D. Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station. In Proceedings of the 2021 IEEE PES Innovative Smart Grid Technologies Conference—Latin America (ISGT Latin America), Lima, Peru, 15–17 September 2021. [Google Scholar]
- Mustafa Hilal, A.; Alzahrani, J.S.; Abunadi, I.; Nemri, N.; Al-Wesabi, F.N.; Motwakel, A.; Yaseen, I.; Sarwar Zamani, A. Intelligent Deep Learning Model for Privacy Preserving IIoT on 6G Environment. Comput. Mater. Contin. 2022, 72, 333–348. [Google Scholar] [CrossRef]
- Asef, P.; Taheri, R.; Shojafar, M.; Mporas, I.; Tafazolli, R. SIEMS: A Secure Intelligent Energy Management System for Industrial IoT Applications. IEEE Trans. Ind. Inform. 2023, 19, 1039–1050. [Google Scholar] [CrossRef]
- Envelope, C.; Envelope, X.; Envelope, L.; Envelope, Z.; Envelope, W. Multimodal semantic communication accelerated bidirectional caching for 6G MEC. Future Gener. Comput. Syst. 2023, 140, 225–237. [Google Scholar]
- Nguyen, T.-V.; Dao, N.-N.; Tuong, V.D.; Noh, W.; Cho, S. User-Aware and Flexible Proactive Caching Using LSTM and Ensemble Learning in IoT-MEC Networks. IEEE Internet Things J. 2022, 9, 3251–3269. [Google Scholar] [CrossRef]
- Gao, H.; Wu, Y.; Xu, Y.; Li, R.; Jiang, Z. Neural Collaborative Learning for User Preference Discovery From Biased Behavior Sequences. IEEE Trans. Comput. Soc. Syst. 2023, 1–11. [Google Scholar] [CrossRef]
- MovieLens. Available online: https://movielens.org/ (accessed on 10 March 2023).
- Dib, B.; Kalloubi, F.; Nfaoui, E.H.; Boulaalam, A. Incorporating LDA with LSTM for followee recommendation on Twitter network. Int. J. Web Inf. Syst. 2021, 17, 250–260. [Google Scholar] [CrossRef]
- Mohammed, A.S.; Venkatachalam, K.; Hubálovský, S.; Trojovský, P.; Prabu, P. Smart Edge Computing for 5 g/6 g Satellite IOT for Reducing Inter Transmission Delay. Mob. Netw. Appl. 2022, 27, 1050–1059. [Google Scholar] [CrossRef]
- Liu, T.; Tang, L.; Wang, W.; Chen, Q.; Zeng, X. Digital-Twin-Assisted Task Offloading Based on Edge Collaboration in the Digital Twin Edge Network. IEEE Internet Things J. 2022, 9, 1427–1444. [Google Scholar] [CrossRef]
- Kashyap, P.K.; Kumar, S.; Jaiswal, A.; Kaiwartya, O.; Kumar, M.; Dohare, U.; Gandomi, A.H. DECENT: Deep Learning Enabled Green Computation for Edge Centric 6G Networks. IEEE Trans. Netw. Serv. Manag. 2022, 19, 2163–2177. [Google Scholar] [CrossRef]
- Gong, Y.; Yao, H.; Wang, J.; Li, M.; Guo, S. Edge Intelligence-driven Joint Offloading and Resource Allocation for Future 6G Industrial Internet of Things. IEEE Trans. Netw. Sci. Eng. 2022. Available online: https://ieeexplore.ieee.org/abstract/document/9676470 (accessed on 10 March 2023). [CrossRef]
- Bandi, A. A Review Towards AI Empowered 6G Communication Requirements, Applications, and Technologies in Mobile Edge Computing. In Proceedings of the 2022 6th International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 29–31 March 2022. [Google Scholar]
- Letaief, K.B.; Shi, Y.; Lu, J.; Lu, J. Edge Artificial Intelligence for 6G: Vision, Enabling Technologies, and Applications. IEEE J. Sel. Areas Commun. 2022, 40, 5–36. [Google Scholar] [CrossRef]
- Gong, Y.; Yao, H.; Wang, J.; Jiang, L.; Yu, F.R. Multi-Agent Driven Resource Allocation and Interference Management for Deep Edge Networks. IEEE Trans. Veh. Technol. 2022, 71, 2018–2030. [Google Scholar] [CrossRef]
- Emu, M.; Choudhury, S. Towards 6G Networks: Ensemble Deep Learning Empowered VNF Deployment for IoT Services. In Proceedings of the 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 9–12 January 2021. [Google Scholar]
- Khan, S.; Khan, S.; Ali, Y.; Khalid, M.; Ullah, Z.; Mumtaz, S. Highly Accurate and Reliable Wireless Network Slicing in 5th Generation Networks: A Hybrid Deep Learning Approach. J. Netw. Syst. Manag. 2022, 30, 29. [Google Scholar] [CrossRef]
- Bhandari, S.; Ranjan, N.; Kim, Y.C.; Khan, P.; Kim, H. A Fairness of Data Combination in Wireless Packet Scheduling. Sensors 2022, 22, 1658. [Google Scholar] [CrossRef] [PubMed]
- Khan, L.U.; Saad, W.; Niyato, D.; Han, Z.; Hong, C.S. Digital-Twin-Enabled 6G: Vision, Architectural Trends, and Future Directions. IEEE Commun. Mag. 2022, 60, 74–80. [Google Scholar] [CrossRef]
- VirusTotal. Available online: https://www.virustotal.com/gui/home/upload (accessed on 10 March 2023).
- Khowaja, S.A.; Khuwaja, P.; Dev, K.; Lee, I.H.; Khan, W.U.; Wang, W.; Qureshi, N.M.F.; Magarini, M. A Secure Data Sharing Scheme in Community Segmented Vehicular Social Networks for 6G. IEEE Trans. Ind. Inform. 2023, 19, 890–899. [Google Scholar] [CrossRef]
- Cahoon, N.; Srinivasan, P.; Guarin, F. 6G Roadmap for Semiconductor Technologies: Challenges and Advances. In Proceedings of the 2022 IEEE International Reliability Physics Symposium (IRPS), Dallas, TX, USA, 27–31 March 2022. [Google Scholar]
- Iannacci, J. A Perspective Vision of Micro/Nano Systems and Technologies as Enablers of 6G, Super-IoT, and Tactile Internet. Proc. IEEE 2022, 111, 55428–55458. [Google Scholar] [CrossRef]
- Kumar, A.; Gupta, M.; Pitchappa, P.; Wang, N.; Szriftgiser, P.; Ducournau, G.; Singh, R. Phototunable chip-scale topological photonics: 160 Gbps waveguide and demultiplexer for THz 6G communication. Nat. Commun. 2022, 13, 5404. [Google Scholar] [CrossRef]
- Daulay, O.; Liu, G.; Ye, K.; Botter, R.; Klaver, Y.; Tan, Q.; Yu, H.; Hoekman, M.; Klein, E.; Roeloffzen, C.; et al. Ultrahigh dynamic range and low noise figure programmable integrated microwave photonic filter. Nat. Commun. 2022, 13, 7798. [Google Scholar] [CrossRef]
- Shin, D.C.; Kim, B.S.; Jang, H.; Kim, Y.J.; Kim, S.W. Photonic comb-rooted synthesis of ultra-stable terahertz frequencies. Nat. Commun. 2023, 14, 790. [Google Scholar] [CrossRef]
- Zhang, W.; Tait, A.; Huang, C.; Ferreira de Lima, T.; Bilodeau, S.; Blow, E.C.; Jha, A.; Shastri, B.J.; Prucnal, P. Broadband physical layer cognitive radio with an integrated photonic processor for blind source separation. Nat. Commun. 2023, 14, 1107. [Google Scholar] [CrossRef]
- Jornet, J.M.; Knightly, E.W.; Mittleman, D.M. Wireless communications sensing and security above 100 GHz. Nat. Commun. 2023, 14, 841. [Google Scholar] [CrossRef]
- Siriwardane, E.M.D.; Zhao, Y.; Perera, I.; Hu, J. Generative design of stable semiconductor materials using deep learning and density functional theory. npj Comput. Mater. 2022, 8, 164. [Google Scholar] [CrossRef]
- Yun, J.; Kim, S.; So, S.; Kim, M.; Rho, J. Deep learning for topological photonics. Adv. Phys. X 2022, 7, 2046156. [Google Scholar] [CrossRef]
- Ashtiani, F.; Geers, A.J.; Aflatouni, F. An on-chip photonic deep neural network for image classification. Nat. Electron. 2022, 606, 501–506. [Google Scholar] [CrossRef] [PubMed]
- Ma, W.; Liu, Z.; Kudyshev, Z.A. Deep learning for the design of photonic structures. Nat. Photonics 2021, 15, 77–90. [Google Scholar] [CrossRef]
- de Silva, B.M.; Higdon, D.M.; Brunton, S.L.; Kutz, J.N. Discovery of Physics From Data: Universal Laws and Discrepancies. Front. Artif. Intell. 2020, 3, 25. [Google Scholar] [CrossRef] [PubMed]
Deep Learning Method(s) | Challenge(s) Addressed | Focused Performance Metric of 6G | Representative Iterature |
---|---|---|---|
DRL (Deep Reinforcement Learning), DDQN (Double Deep QNet) | Device-to-device communication: lacking prior knowledge of cellular users in Location-based Spectrum Access (LSA) (resolved by DRL); fairness of resource allocation in inter-device communication (resolved by DDQN) | High data rate and broad bandwidth | [65] |
QNet | In ultra-dense networks, selectively powering off light-loaded base stations to raise power efficiency | Power efficiency | [76] |
MUSK-DQN (Multi-UBS Selective-K control Deep Q Network) | Optimizing energy efficiency of UBS networks under the scenario of ground user mobility | Power efficiency | [79] |
Centralized DRL | Beam forming of high-speed mobile devices | High data rate and broad bandwidth | [64] |
DRL based Federal Learning | High communication overhead in the centralized DRL | High data rate and broad bandwidth | [64] |
Muti-agent DRL (MADRL) | A NP-hard MINLP (mix-integer nonlinear programming) problem: IRS element selection, phase-shift control and power allocation | High data rate and broad bandwidth | [60] |
DRL trained by MADDPG (Multi-Agent Deterministic Policy Gradient) | Tradeoff among energy consumption, video quality configuration and accuracy in a camera network | Power efficiency | [77] |
DRL-based FL (Federal Learning), Decentralized Learning, Model Split Learning | Excessively high time over-head, power consumption and privacy risks in edge computing | Edge computing | [97] |
MADDPG (Multi-Agent-assisted Deep Deterministic Policy Gradient) | Integration of computation and communication into edge nodes of the deep edge network, pursuing pervasive intelligence in edge computing | Edge computing | [98] |
DRL, RNN, echo state network | DSS (Dynamic Spectrum Sharing) in 6G: highly dynamic but limited training data (resolved by DRL); temporal data handling in a Non-Markov environment (resolved by RNN); high training overhead of RNN (resolved by echo state network) | High data rate and broad bandwidth | [27] |
DRL | Modeling of network slicing in O-RAN (open radio access network) | URLLC | [66] |
DRL | Ensuring low transmision latency in high dynamic NTN (Non-Terrestrial Networks) | URLLC | [67] |
DRL | URLLC of DAS (Distributed Antenna System) | URLLC | [68] |
DRL | Integrate UAVs into an aerial backhauling network, which performs as relay nodes in the marine communication | Power efficiency | [80] |
DRL | Offload resource-demanding EDM (Energy Demand Management) workload to edge servers in a 6G-enabled power grid | Power efficency | [78] |
DRL training in the digital twin of 6G networks | Execessively high resource cost in training DRL in terms of mobile server selection. | Edge computing | [102] |
DRL, PPO (Proximal Policy Optimization), DNN (Deep Neural Network) | Joint optimization of 6G VR applications, covering the latency, interference management and computational resource management. Modeling of the optimization problem (resolved by DRL); instability of training convergence within a huge continuous action space (resolved by PPO); heterogenity of input data (resolved by DNN as a nonlinear function approximator) | URLLC | [70] |
DRL, LSTM | Joint optimization of task offloading rate, power consumption and computational overhead: offloading scheme selection by DRL; simplification of original state-action space by LSTM. | Edge computing | [94] |
DRL | Optimization of task offloading and resource allocation in IIoT (Industrial Internet of Things) | Edge computing | [95] |
Deep CNN (Convolution Neural Network) and convLSTM (Convolution Long Short-term Memory) | DoA (Direction-of-arrival) estimation (resolved by DeepCNN), millisecond-level beam tracking (resolved by convLSTM) and training data are obtained by Monte Carlo simulation | High data rate and broad bandwidth | [63] |
DNN (Deep neural network), CNN (convolution neural network) and LSTM (long short-term memory) | Ransomware recognition in SCADA-governed electric vehicle charging station (EVCS), training data are obtained from the VirusTotal website | Security | [84] |
Online Deep CNN | Minimizing error of over-the-air computing through joint optimization of following factors: phase-shift vector of IRS and scaling factors of transmitters/receivers; training data are obtained by numerical simulation | URLLC | [69] |
E-CNN (Ensemble Convolution Neural Network) | Reallocation of VNFs among cloudlets: training data are obtained by traditional ILP (Integer Linear Programming); E-CNN is trained based on the data | QoS heterogeneity | [99] |
CNN, LSTM | Slice prediction and assignment: slice requirement prediction by LSTM; slice assignment by CNN; the already-made DeepSlice dataset is used as training data. | QoS heterogeneity | [100] |
CNN | Fairness of data package scheduling; training data are generated by numerical simulation. | QoS heterogeneity | [101] |
BiGRNN (Bidirectional Gated Recurrent Neural Network), CGO (Chaos Game Optimization) | Industrial Internet of Things intrusion detection: intrusion detection by BiGRNN; hyperparameter tuning by CGO; training is based on already-made dataset. | Security | [85] |
GAN (Generative Adversarial Network) | Prediction of the suitable slicing under the SDN/VNF environment, according to performance metrics including security; training data are generated by TeraSim simulator (in NS3) | Security | [83] |
FFNN (FeedForward Neural Network) | Maximizing the secrecy rate of SWIPT (simultaneous wireless information and power transfer) systems through joint optmization of the following factors: transmitter power, PS factor of UE and IRS phase shifts matrix. (train a deep FFNN based on labeled data obtained by the traditional analytical AO (alternative optimization-based scheme)) | Security | [82] |
LSTM, Ensemble Metalearning | Edge side local caching in MEC (Multiple/Multi-access Edge Computing): dynamic content preferences of each user group are identified by LSTM; combination of multiple demographic user preferences into caching scheme by Ensemble Metalearning; training data are from real word datasets MovieLens | Edge computing | [88] |
Typical Technique | Summary | Representative Work |
---|---|---|
Multi-objective optimization | Phase-shift vector of IRS and scaling factors of transmitters/receivers | [69] |
IRS element selection, phase-shift control and power allocation | [60] | |
Transmitter power, PS factor of UE and IRS phase shifts matrix | [82] | |
Task offloading rate, power consumption and computational overhead | [94] | |
Task offloading and resource allocation | [95] | |
Latency, interference management and computational resource management | [70] | |
Simplification of DRL decision space | Adopt a decision selection network to filter inappropriate mode alterations from the action space of QNet model | [75] |
Adopt LSTM to simplify the original state–action space and produce an approximate state–action space | [94] | |
Adopt the concept of rolling horizon control to slow down the growth of action aggregations | [95] | |
Deep learning as an alternative to traditional analytical methods | Obtain training data by AO (alternative optimization)-based scheme) to train a FFNN | [82] |
Obtain training data from traditional ILP (Integer Linear Programming) to train an E-CNN | [99] | |
Resolve a NP-hard MINLP (Mix-Integer Nonlinear Programming) problem using MADRL | [60] | |
Distributed deep learning | Beam forming by DRL-based Federal Learning, to reduce communication overhead and avoid phase synchronization | [64] |
Use muti-agent DRL (MADRL) to efficiently coordinate multi-AP and multi-IRS in a distributed manner, at lower information exchange costs | [60] | |
DRL trained by MADDPG to tradeoff between energy efficiency and accuracy | [77] | |
FL (distributed DRL) to cope with the dynamic context of 6G | [97] | |
MADDPG to integrate computation and communication into edge nodes of deep edge network, aiming at pervasive intelligence in edge computing | [98] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chen, C.; Zhang, H.; Hou, J.; Zhang, Y.; Zhang, H.; Dai, J.; Pang, S.; Wang, C. Deep Learning in the Ubiquitous Human–Computer Interactive 6G Era: Applications, Principles and Prospects. Biomimetics 2023, 8, 343. https://doi.org/10.3390/biomimetics8040343
Chen C, Zhang H, Hou J, Zhang Y, Zhang H, Dai J, Pang S, Wang C. Deep Learning in the Ubiquitous Human–Computer Interactive 6G Era: Applications, Principles and Prospects. Biomimetics. 2023; 8(4):343. https://doi.org/10.3390/biomimetics8040343
Chicago/Turabian StyleChen, Chunlei, Huixiang Zhang, Jinkui Hou, Yonghui Zhang, Huihui Zhang, Jiangyan Dai, Shunpeng Pang, and Chengduan Wang. 2023. "Deep Learning in the Ubiquitous Human–Computer Interactive 6G Era: Applications, Principles and Prospects" Biomimetics 8, no. 4: 343. https://doi.org/10.3390/biomimetics8040343
APA StyleChen, C., Zhang, H., Hou, J., Zhang, Y., Zhang, H., Dai, J., Pang, S., & Wang, C. (2023). Deep Learning in the Ubiquitous Human–Computer Interactive 6G Era: Applications, Principles and Prospects. Biomimetics, 8(4), 343. https://doi.org/10.3390/biomimetics8040343